The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devic...The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devices.However,the performance of current 6G network intelligence technologies and its level of integration with the architecture,along with the system-level requirements for the number of access devices and limitations on energy consumption,have impeded further improvements in the 6G smart F-RAN.To better analyze the root causes of the network problems and promote the practical development of the network,this study used structured methods such as segmentation to conduct a review of the topic.The research results reveal that there are still many problems in the current 6G smart F-RAN.Future research directions and difficulties are also discussed.展开更多
In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this neces...In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this necessitates effective management of computation and wireless resources tailored to the requirements of various services.The heterogeneity of computation resources and interference among shared wireless resources pose significant coordination and management challenges.To solve these problems,this work provides an overview of multi-dimensional resource management in 6G SIG RAN,including computation and wireless resource.Firstly it provides with a review of current investigations on computation and wireless resource management and an analysis of existing deficiencies and challenges.Then focusing on the provided challenges,the work proposes an MEC-based computation resource management scheme and a mixed numerology-based wireless resource management scheme.Furthermore,it outlines promising future technologies,including joint model-driven and data-driven resource management technology,and blockchain-based resource management technology within the 6G SIG network.The work also highlights remaining challenges,such as reducing communication costs associated with unstable ground-to-satellite links and overcoming barriers posed by spectrum isolation.Overall,this comprehensive approach aims to pave the way for efficient and effective resource management in future 6G networks.展开更多
Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user requirements.In this paper,computational offloading in F-RAN is con...Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user requirements.In this paper,computational offloading in F-RAN is considered,where multiple User Equipments(UEs)offload their computational tasks to the F-RAN through fog nodes.Each UE can select one of the fog nodes to offload its task,and each fog node may serve multiple UEs.The tasks are computed by the fog nodes or further offloaded to the cloud via a capacity-limited fronhaul link.In order to compute all UEs'tasks quickly,joint optimization of UE-Fog association,radio and computation resources of F-RAN is proposed to minimize the maximum latency of all UEs.This min-max problem is formulated as a Mixed Integer Nonlinear Program(MINP).To tackle it,first,MINP is reformulated as a continuous optimization problem,and then the Majorization Minimization(MM)method is used to find a solution.The MM approach that we develop is unconventional in that each MM subproblem is solved inexactly with the same provable convergence guarantee as the exact MM,thereby reducing the complexity of MM iteration.In addition,a cooperative offloading model is considered,where the fog nodes compress-and-forward their received signals to the cloud.Under this model,a similar min-max latency optimization problem is formulated and tackled by the inexact MM.Simulation results show that the proposed algorithms outperform some offloading strategies,and that the cooperative offloading can exploit transmission diversity better than noncooperative offloading to achieve better latency performance.展开更多
Security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)mechanisms.However,when dealing with massive volumes of unstructured text big data resources,the current attribut...Security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)mechanisms.However,when dealing with massive volumes of unstructured text big data resources,the current attribute management methods based on manual extraction face several issues,such as high costs for attribute extraction,long processing times,unstable accuracy,and poor scalability.To address these problems,this paper proposes an attribute mining technology for access control institutions based on hybrid capsule networks.This technology leverages transfer learning ideas,utilizing Bidirectional Encoder Representations from Transformers(BERT)pre-trained language models to achieve vectorization of unstructured text data resources.Furthermore,we have designed a novel end-to-end parallel hybrid network structure,where the parallel networks handle global and local information features of the text that they excel at,respectively.By employing techniques such as attention mechanisms,capsule networks,and dynamic routing,effective mining of security attributes for access control resources has been achieved.Finally,we evaluated the performance level of the proposed attribute mining method for access control institutions through experiments on the medical referral text resource dataset.The experimental results show that,compared with baseline algorithms,our method adopts a parallel network structure that can better balance global and local feature information,resulting in improved overall performance.Specifically,it achieves a comprehensive performance enhancement of 2.06%to 8.18%in the F1 score metric.Therefore,this technology can effectively provide attribute support for access control of unstructured text big data resources.展开更多
The 6G network architecture introduces the paradigm of Trust+Security,representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement.While ZTNs(zerotrust netw...The 6G network architecture introduces the paradigm of Trust+Security,representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement.While ZTNs(zerotrust networks)have demonstrated significant advancements in constructing trust-centric frameworks,most existing ZTN implementations lack comprehensive integration of security deployment and traffic monitoring capabilities.Furthermore,current ZTN designs generally do not facilitate dynamic assessment of user reputation.To address these limitations,this study proposes a DPZTN(Data-plane-based Zero Trust Network).DPZTN framework extends traditional ZTN models by incorporating security mechanisms directly into the data plane.Additionally,blockchain infrastructure is used to enable decentralized identity authentication and distributed access control.A pivotal element within the proposed framework is ZTNE(Zero-Trust Network Element),which executes access control policies and performs real-time user traffic inspection.To enable dynamic and fine-grained evaluation of user trustworthiness,this study introduces BBEA(Bayesian-based Behavior Evaluation Algorithm).BBEA provides a framework for continuous user behavior analysis,supporting adaptive privilege management and behavior-informed access control.Experimental results demonstrate that ZTNE combined with BBEA,can effectively respond to both individual and mixed attack types by promptly adjusting user behavior scores and dynamically modifying access privileges based on initial privilege levels.Under conditions supporting up to 10,000 concurrent users,the control system maintains approximately 65%CPU usage and less than 60%memory usage,with average user authentication latency around 1 s and access control latency close to 1 s.展开更多
Using native CMOS technology,EDA tool,and adopting full-custom design methodology,a laser diode driver for the use of STM-1 and STM-4 optical access network,is realized by CSMC-HJ 0.6μm CMOS technology to modulate la...Using native CMOS technology,EDA tool,and adopting full-custom design methodology,a laser diode driver for the use of STM-1 and STM-4 optical access network,is realized by CSMC-HJ 0.6μm CMOS technology to modulate laser diodes at 155Mb/s (STM-1),622Mb/s (STM-4) with adjustable modulation current from 0 to 50mA for an equivalent 50Ω load.The maximum modulation voltage is over 2.5V pp corresponding to a 3V DC bias for output stage.The time range of rise and fall from 360ps to 471ps is measured from the output voltage pulse.The RMS jitter is no more than 30ps for four bit rates.The power consumption is less than 410mW under a power supply voltage of 5V.According to the experimental results,the laser diode driver achieves the same level as their counterparts worldwide.展开更多
Dynamic spectrum access(DSA) based on cognitive radios(CR) technique is an effective approach to address the "spectrum scarcity" issue. However, traditional CR-enabled DSA system employs only single DSA stra...Dynamic spectrum access(DSA) based on cognitive radios(CR) technique is an effective approach to address the "spectrum scarcity" issue. However, traditional CR-enabled DSA system employs only single DSA strategy, which might not be suited to the dynamic network environment. In this paper, we propose a multi-strategy DSA(MS-DSA) system, where the primary and the secondary system share spectrum resources with multiple DSA strategies simultaneously. To analyze the performance of the proposed MS-DSA system, we model it as a continuous-time Markov chain(CTMC) and derive the expressions to compute the corresponding performance metrics. Based on this, we define a utility function involving the concerns of effective throughput, interference quantity on primary users, and spectrum leasing cost. Two optimization schemes, named as spectrum allocation and false alarm probability selection, are proposed to maximize the utility function. Finally, numerical simulations are provided to validate our analysis and demonstrate that the performance can be significantly improved caused by virtues of the proposed MS-DSA system.展开更多
In a given district, the accessibility of any point should be the synthetically evaluation of the internal and external accessibilities. Using MapX component and Delphi, the author presents an information system to ca...In a given district, the accessibility of any point should be the synthetically evaluation of the internal and external accessibilities. Using MapX component and Delphi, the author presents an information system to calculate and analyze regional accessibility according to the shortest travel time, generating thus a mark diffusing figure. Based on land traffic network, this paper assesses the present and the future regional accessibilities of sixteen major cities in the Yangtze River Delta. The result shows that the regional accessibility of the Yangtze River Delta presents a fan with Shanghai as its core. The top two most accessible cities are Shanghai and Jiaxing, and the bottom two ones are Taizhou (Zhejiang province) and Nantong With the construction of Sutong Bridge, Hangzhouwan Bridge and Zhoushan Bridge, the regional internal accessibility of all cities will be improved. Especially for Shaoxing, Ningbo and Taizhou (Jiangsu province), the regional internal accessibility will be decreased by one hour, and other cities will be shortened by about 25 minutes averagely. As the construction of Yangkou Harbor in Nantong, the regional external accessibility of the harbor cities in Jiangsu province will be speeded up by about one hour.展开更多
Before the emergence of modern modes of transport, the traditional road infra structure was the major historical means of carrying out nationwide socioeconomic exchange However, the history of transport infrastructure...Before the emergence of modern modes of transport, the traditional road infra structure was the major historical means of carrying out nationwide socioeconomic exchange However, the history of transport infrastructure has received little attention from researchers. Given this background, the work reported here examined the longterm development of transport networks in China. The national road network was selected for study and the 3500 years from 1600 BC to 1900 AD was chosen as the study period. Indicators were designed for the maturity level of road networks and an accessibility model was developed for the paths of the shortest distance. The evolution of the road network in China since the Shang Dynasty (1600 BC) was described and its major features were summarized to reveal longterm regu larities. The maturity level of the road network and its accessibility was assessed and regions with good and poor networks were identified. The relationship between China's natural, social and economic systems and the road network were discussed. Our analysis shows that the road network in China has a number of longterm regularities. The continuously expanding road network follows a path of inland expansion especially towards the border areas. How ever, its coverage and accessibility are characterized by a coreperipheral configuration, which has close relationships with, not only the natural conditions, but also national defense and warfare. The centralization of national power, national land governance, postal transport, the transport of specialized cargos, and international trade are also related to the develop ment of the road network. This research draws attention to the evolving regularities of trans port networks.展开更多
In order to alleviate capacity constraints on the fronthaul and decrease the transmit latency, a hierarchical content caching paradigm is applied in the fog radio access networks(F-RANs). In particular, a specific clu...In order to alleviate capacity constraints on the fronthaul and decrease the transmit latency, a hierarchical content caching paradigm is applied in the fog radio access networks(F-RANs). In particular, a specific cluster of remote radio heads is formed through a common centralized cloud at the baseband unit pool, while the local content is directly delivered at fog access points with edge cache and distributed radio signal processing capability. Focusing on a downlink F-RAN, the explicit expressions of ergodic rate for the hierarchical paradigm is derived. Meanwhile, both the waiting delay and latency ratio for users requiring a single content are exploited. According to the evaluation results of ergodic rate on waiting delay, the transmit latency can be effectively reduced through improving the capacity of both fronthaul and radio access links. Moreover, to fully explore the potential of hierarchical content caching, the transmit latency for users requiring multiple content objects is optimized as well in three content transmission cases with different radio access links. The simulation results verify the accuracy of the analysis, further show the latency decreases significantly due to the hierarchical paradigm.展开更多
To solve the contradiction between limited spectrum resources and increasing communication demand,this paper proposes a wireless resource allocation scheme based on the Deep Q Network(DQN)to allocate radio resources i...To solve the contradiction between limited spectrum resources and increasing communication demand,this paper proposes a wireless resource allocation scheme based on the Deep Q Network(DQN)to allocate radio resources in a downlink multi-user cognitive radio(CR)network with slicing.Secondary users(SUs)are multiplexed using non-orthogonal multiple access(NOMA).The SUs use the hybrid spectrum access mode to improve the spectral efficiency(SE).Considering the demand for multiple services,the enhanced mobile broadband(eMBB)slice and ultrareliable low-latency communication(URLLC)slice were established.The proposed scheme can maximize the SE while ensuring Quality of Service(QoS)for the users.This study established a mapping relationship between resource allocation and the DQN algorithm in the CR-NOMA network.According to the signal-to-interference-plusnoise ratio(SINR)of the primary users(PUs),the proposed scheme can output the optimal channel selection and power allocation.The simulation results reveal that the proposed scheme can converge faster and obtain higher rewards compared with the Q-Learning scheme.Additionally,the proposed scheme has better SE than both the overlay and underlay only modes.展开更多
The computation resources at a single node in Edge Computing(EC)are commonly limited,which cannot execute large scale computation tasks.To face the challenge,an Offloading scheme leveraging on NEighboring node Resourc...The computation resources at a single node in Edge Computing(EC)are commonly limited,which cannot execute large scale computation tasks.To face the challenge,an Offloading scheme leveraging on NEighboring node Resources(ONER)for EC over Fiber-Wireless(FiWi)access networks is proposed in this paper.In the ONER scheme,the FiWi network connects edge computing nodes with fiber and converges wireless and fiber connections seamlessly,so that it can support the offloading transmission with low delay and wide bandwidth.Based on the ONER scheme supported by FiWi networks,computation tasks can be offloaded to edge computing nodes in a wider range of area without increasing wireless hops(e.g.,just one wireless hop),which achieves low delay.Additionally,an efficient Computation Resource Scheduling(CRS)algorithm based on the ONER scheme is also proposed to make offloading decision.The results show that more offloading requests can be satisfied and the average completion time of computation tasks decreases significantly with the ONER scheme and the CRS algorithm.Therefore,the ONER scheme and the CRS algorithm can schedule computation resources at neighboring edge computing nodes for offloading to meet the challenge of large scale computation tasks.展开更多
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a...In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations.展开更多
As a promising paradigm of the fifth generation networks,fog radio access network(F-RAN)has attracted lots of attention nowadays.To fully utilize the promising gain of F-RANs,the acquisition of accurate channel state ...As a promising paradigm of the fifth generation networks,fog radio access network(F-RAN)has attracted lots of attention nowadays.To fully utilize the promising gain of F-RANs,the acquisition of accurate channel state information is significant.However,conventional channel estimation approaches are not suitable in F-RANs due to the large training and feedback overhead.In this paper,we consider the channel estimation in F-RANs with fog access point(F-AP)equipped with massive antennas.Thanks to the computing ability of F-AP and the sparsity of channel matrices in angular domain,Gated Recurrent Unit(GRU),a data-driven based channel estimation is proposed at F-AP to reduce the training and feedback overhead.The GRU-based method can capture the hidden sparsity structure automatically through the network training.Moreover,to further improve the channel estimation,a bidirectional GRU based method is proposed,whose target channel structure is decided by previous and subsequent structures.We compare the performance of our proposed channel estimation with traditional methods(Orthogonal Matching Pursuit(OMP)and Simultaneous OMP(SOMP)).Simulation results show that the proposed approaches have better performance compared with the traditional OMP and SOMP methods.展开更多
Coordinated signal processing can obtain a huge transmission gain for Fog Radio Access Networks(F-RANs).However,integrating into large scale,it will lead to high computation complexity in channel estimation and spectr...Coordinated signal processing can obtain a huge transmission gain for Fog Radio Access Networks(F-RANs).However,integrating into large scale,it will lead to high computation complexity in channel estimation and spectral efficiency loss in transmission performance.Thus,a joint cluster formation and channel estimation scheme is proposed in this paper.Considering research remote radio heads(RRHs)centred serving scheme,a coalition game is formulated in order to maximize the spectral efficiency of cooperative RRHs under the conditions of balancing the data rate and the cost of channel estimation.As the cost influences to the necessary consumption of training length and estimation error.Particularly,an iterative semi-blind channel estimation and symbol detection approach is designed by expectation maximization algorithm,where the channel estimation process is initialized by subspace method with lower pilot length.Finally,the simulation results show that a stable cluster formation is established by our proposed coalition game method and it outperforms compared with full coordinated schemes.展开更多
Relay in full-duplex(FD) mode can achieve higher spectrum efficiency than that in half-duplex mode,while it is crucial to suppress relay self-interference to ensure transmission quality which requires instantaneous ch...Relay in full-duplex(FD) mode can achieve higher spectrum efficiency than that in half-duplex mode,while it is crucial to suppress relay self-interference to ensure transmission quality which requires instantaneous channel state information(CSI). In this paper,the channel estimation issue in FD amplify-andforward relay networks is considered,where the training-based estimation technique is adopted. Firstly,the least square(LS) estimation is implemented to obtain composite channel coefficients of source-relay-destination(SRD) channel and relay loop-interference(LI) channel in order to assist destination in performing data detection. Secondly,both LS and maximum likelihood estimation methods are utilized to perform individual channel estimation aiming at supporting successive interference cancelation at destination. Finally,simulation results demonstrate the effectiveness of both composite and individual channel estimation,and the presented ML method can achieve lower MSEs than LS solution.展开更多
From the development of modern transportation to the current era of high-speed transportation networks, the Beijing-Tianjin-Hebei(BTH) region has always played a national leading role in land transportation developmen...From the development of modern transportation to the current era of high-speed transportation networks, the Beijing-Tianjin-Hebei(BTH) region has always played a national leading role in land transportation development of China. In order to explore the long-term evolutionary characteristics of land transportation in the BTH region, this paper utilized a temporal scale of 100 years to systematically interpret the development process of the land transportation network. Taking 13 cities within the BTH region as research anchor cities, we took into account "leaping" mode of transportation in order to investigate the evolution of accessibility. Our research shows the following results:(1) The land transportation network in the BTH region has undergone five stages of development: the initial period of modernization(1881–1937); the period of stagnation of transportation development(1937–1949); the network expansion period(1949–1980); the period of trunk construction(1980–1995), and the period of high-speed transportation network development(1995–present). The network structure centered around Beijing has existed from the outset of modern transportation development.(2) The accessibility spatial pattern of land transportation in BTH region has evolved from expansion along traffic corridors to the formation of concentric circles. The stratified circular structure of transportation in anchor cities has gradually developed into a contiguous development pattern.(3) There are clear hierarchical differences in the transportation structures of anchor cities. Beijing has always been at the top of this hierarchy, while the hierarchical position of Zhangjiakou has fallen noticeably since 1949. The Beijing-Tianjin region was the first region to form a short-duration transportation circle structure, while the transportation advantages of the central part of Hebei Province, which is located in the center of the BTH transportation region, have yet to be realized.展开更多
Based on space syntax theory, the spatial accessibility of the road network in Wuhan Metropolitan Area has been quantitatively analyzed by building a series of accessibility variables. Topologic connectivity in the ac...Based on space syntax theory, the spatial accessibility of the road network in Wuhan Metropolitan Area has been quantitatively analyzed by building a series of accessibility variables. Topologic connectivity in the accessible rings appears to be broken;traffic axis network is in spatial structure of hub-and-spoke and fishbone-like. Meanwhile, the differences in classified road network have led to inefficiency of its network servo and its ever-worsening capability to respond to traffic jams. Besides, two band-like integrated cores of which one is east to west along the Yangtze River and the other is north to south along Beijing to Guangzhou Railway, have become the first level traffic axis in the whole network, which is responsible for the connectivity of the entire metropolitan area network. This consequently has strengthened the dominant position of Wuhan which is located on the bands’ crossing. In short, the spatial accessibility of that classified space morphology, the urban system, the transport infrastructure as well as the social and economic development of Wuhan Metropolitan Area are highly interrelated to each other, especially to the high level highway network featured by freeways, the development level of which is well in line with that of road network accessibility.展开更多
The interplay between artificial intelligence(AI) and fog radio access networks(F-RANs) is investigated in this work from two perspectives: how F-RANs enable hierarchical AI to be deployed in wireless networks and how...The interplay between artificial intelligence(AI) and fog radio access networks(F-RANs) is investigated in this work from two perspectives: how F-RANs enable hierarchical AI to be deployed in wireless networks and how AI makes F-RANs smarter to better serve mobile devices. Due to the heterogeneity of processing capability, the cloud, fog, and device layers in F-RANs provide hierarchical intelligence via centralized, distributed, and federated learning. In addition, cross-layer learning is also introduced to further reduce the demand for the memory size of the mobile devices. On the other hand, AI provides F-RANs with technologies and methods to deal with massive data and make smarter decisions. Specifically, machine learning tools such as deep neural networks are introduced for data processing, while reinforcement learning(RL) algorithms are adopted for network optimization and decisions. Then, two examples of AI-based applications in F-RANs, i.e., health monitoring and intelligent transportation systems, are presented, followed by a case study of an RL-based caching application in the presence of spatio-temporal unknown content popularity to showcase the potential of applying AI to F-RANs.展开更多
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,...MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system.展开更多
基金supported by the National Natural Science Foundation of China(62202215)Liaoning Province Applied Basic Research Program(Youth Special Project,2023JH2/101600038)+2 种基金Shenyang Youth Science and Technology Innovation Talent Support Program(RC220458)Guangxuan Program of Shenyang Ligong University(SYLUGXRC202216)Basic Research Special Funds for Undergraduate Universities in Liaoning Province(LJ212410144067).
文摘The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devices.However,the performance of current 6G network intelligence technologies and its level of integration with the architecture,along with the system-level requirements for the number of access devices and limitations on energy consumption,have impeded further improvements in the 6G smart F-RAN.To better analyze the root causes of the network problems and promote the practical development of the network,this study used structured methods such as segmentation to conduct a review of the topic.The research results reveal that there are still many problems in the current 6G smart F-RAN.Future research directions and difficulties are also discussed.
基金supported by the National Key Research and Development Program of China(No.2021YFB2900504).
文摘In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this necessitates effective management of computation and wireless resources tailored to the requirements of various services.The heterogeneity of computation resources and interference among shared wireless resources pose significant coordination and management challenges.To solve these problems,this work provides an overview of multi-dimensional resource management in 6G SIG RAN,including computation and wireless resource.Firstly it provides with a review of current investigations on computation and wireless resource management and an analysis of existing deficiencies and challenges.Then focusing on the provided challenges,the work proposes an MEC-based computation resource management scheme and a mixed numerology-based wireless resource management scheme.Furthermore,it outlines promising future technologies,including joint model-driven and data-driven resource management technology,and blockchain-based resource management technology within the 6G SIG network.The work also highlights remaining challenges,such as reducing communication costs associated with unstable ground-to-satellite links and overcoming barriers posed by spectrum isolation.Overall,this comprehensive approach aims to pave the way for efficient and effective resource management in future 6G networks.
基金supported in part by the Natural Science Foundation of China (62171110,U19B2028 and U20B2070)。
文摘Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user requirements.In this paper,computational offloading in F-RAN is considered,where multiple User Equipments(UEs)offload their computational tasks to the F-RAN through fog nodes.Each UE can select one of the fog nodes to offload its task,and each fog node may serve multiple UEs.The tasks are computed by the fog nodes or further offloaded to the cloud via a capacity-limited fronhaul link.In order to compute all UEs'tasks quickly,joint optimization of UE-Fog association,radio and computation resources of F-RAN is proposed to minimize the maximum latency of all UEs.This min-max problem is formulated as a Mixed Integer Nonlinear Program(MINP).To tackle it,first,MINP is reformulated as a continuous optimization problem,and then the Majorization Minimization(MM)method is used to find a solution.The MM approach that we develop is unconventional in that each MM subproblem is solved inexactly with the same provable convergence guarantee as the exact MM,thereby reducing the complexity of MM iteration.In addition,a cooperative offloading model is considered,where the fog nodes compress-and-forward their received signals to the cloud.Under this model,a similar min-max latency optimization problem is formulated and tackled by the inexact MM.Simulation results show that the proposed algorithms outperform some offloading strategies,and that the cooperative offloading can exploit transmission diversity better than noncooperative offloading to achieve better latency performance.
基金supported by National Natural Science Foundation of China(No.62102449).
文摘Security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)mechanisms.However,when dealing with massive volumes of unstructured text big data resources,the current attribute management methods based on manual extraction face several issues,such as high costs for attribute extraction,long processing times,unstable accuracy,and poor scalability.To address these problems,this paper proposes an attribute mining technology for access control institutions based on hybrid capsule networks.This technology leverages transfer learning ideas,utilizing Bidirectional Encoder Representations from Transformers(BERT)pre-trained language models to achieve vectorization of unstructured text data resources.Furthermore,we have designed a novel end-to-end parallel hybrid network structure,where the parallel networks handle global and local information features of the text that they excel at,respectively.By employing techniques such as attention mechanisms,capsule networks,and dynamic routing,effective mining of security attributes for access control resources has been achieved.Finally,we evaluated the performance level of the proposed attribute mining method for access control institutions through experiments on the medical referral text resource dataset.The experimental results show that,compared with baseline algorithms,our method adopts a parallel network structure that can better balance global and local feature information,resulting in improved overall performance.Specifically,it achieves a comprehensive performance enhancement of 2.06%to 8.18%in the F1 score metric.Therefore,this technology can effectively provide attribute support for access control of unstructured text big data resources.
基金funded by the Basic Research Operating Expenses Postgraduate Innovation Programme(Grant No.W24YJS00010,received by J.Yan)the National Key R&D Program of China(Grant No.2018YFA0701604,received by H.Zhou)the National Natural Science Foundation of China(NSFC)(Grant No.62341102,received by H.Zhou).
文摘The 6G network architecture introduces the paradigm of Trust+Security,representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement.While ZTNs(zerotrust networks)have demonstrated significant advancements in constructing trust-centric frameworks,most existing ZTN implementations lack comprehensive integration of security deployment and traffic monitoring capabilities.Furthermore,current ZTN designs generally do not facilitate dynamic assessment of user reputation.To address these limitations,this study proposes a DPZTN(Data-plane-based Zero Trust Network).DPZTN framework extends traditional ZTN models by incorporating security mechanisms directly into the data plane.Additionally,blockchain infrastructure is used to enable decentralized identity authentication and distributed access control.A pivotal element within the proposed framework is ZTNE(Zero-Trust Network Element),which executes access control policies and performs real-time user traffic inspection.To enable dynamic and fine-grained evaluation of user trustworthiness,this study introduces BBEA(Bayesian-based Behavior Evaluation Algorithm).BBEA provides a framework for continuous user behavior analysis,supporting adaptive privilege management and behavior-informed access control.Experimental results demonstrate that ZTNE combined with BBEA,can effectively respond to both individual and mixed attack types by promptly adjusting user behavior scores and dynamically modifying access privileges based on initial privilege levels.Under conditions supporting up to 10,000 concurrent users,the control system maintains approximately 65%CPU usage and less than 60%memory usage,with average user authentication latency around 1 s and access control latency close to 1 s.
文摘Using native CMOS technology,EDA tool,and adopting full-custom design methodology,a laser diode driver for the use of STM-1 and STM-4 optical access network,is realized by CSMC-HJ 0.6μm CMOS technology to modulate laser diodes at 155Mb/s (STM-1),622Mb/s (STM-4) with adjustable modulation current from 0 to 50mA for an equivalent 50Ω load.The maximum modulation voltage is over 2.5V pp corresponding to a 3V DC bias for output stage.The time range of rise and fall from 360ps to 471ps is measured from the output voltage pulse.The RMS jitter is no more than 30ps for four bit rates.The power consumption is less than 410mW under a power supply voltage of 5V.According to the experimental results,the laser diode driver achieves the same level as their counterparts worldwide.
基金supported in part by the National Natural Sciences Foundation of China (NSFC) under Grant 61525103the National Natural Sciences Foundation of China under Grant 61501140the Shenzhen Fundamental Research Project under Grant JCYJ20150930150304185
文摘Dynamic spectrum access(DSA) based on cognitive radios(CR) technique is an effective approach to address the "spectrum scarcity" issue. However, traditional CR-enabled DSA system employs only single DSA strategy, which might not be suited to the dynamic network environment. In this paper, we propose a multi-strategy DSA(MS-DSA) system, where the primary and the secondary system share spectrum resources with multiple DSA strategies simultaneously. To analyze the performance of the proposed MS-DSA system, we model it as a continuous-time Markov chain(CTMC) and derive the expressions to compute the corresponding performance metrics. Based on this, we define a utility function involving the concerns of effective throughput, interference quantity on primary users, and spectrum leasing cost. Two optimization schemes, named as spectrum allocation and false alarm probability selection, are proposed to maximize the utility function. Finally, numerical simulations are provided to validate our analysis and demonstrate that the performance can be significantly improved caused by virtues of the proposed MS-DSA system.
基金National Natural Science Foundation of China, No.40371044 No.70573053
文摘In a given district, the accessibility of any point should be the synthetically evaluation of the internal and external accessibilities. Using MapX component and Delphi, the author presents an information system to calculate and analyze regional accessibility according to the shortest travel time, generating thus a mark diffusing figure. Based on land traffic network, this paper assesses the present and the future regional accessibilities of sixteen major cities in the Yangtze River Delta. The result shows that the regional accessibility of the Yangtze River Delta presents a fan with Shanghai as its core. The top two most accessible cities are Shanghai and Jiaxing, and the bottom two ones are Taizhou (Zhejiang province) and Nantong With the construction of Sutong Bridge, Hangzhouwan Bridge and Zhoushan Bridge, the regional internal accessibility of all cities will be improved. Especially for Shaoxing, Ningbo and Taizhou (Jiangsu province), the regional internal accessibility will be decreased by one hour, and other cities will be shortened by about 25 minutes averagely. As the construction of Yangkou Harbor in Nantong, the regional external accessibility of the harbor cities in Jiangsu province will be speeded up by about one hour.
基金Key Research Program of the Chinese Academy of Sciences, No.KZZD-EW-06-02 Exploratory Forefront Project for the Strategic Science Plan in IGSNRR, CAS, No.2012QY004 National Natural Science Foundation of China, No.41171108
文摘Before the emergence of modern modes of transport, the traditional road infra structure was the major historical means of carrying out nationwide socioeconomic exchange However, the history of transport infrastructure has received little attention from researchers. Given this background, the work reported here examined the longterm development of transport networks in China. The national road network was selected for study and the 3500 years from 1600 BC to 1900 AD was chosen as the study period. Indicators were designed for the maturity level of road networks and an accessibility model was developed for the paths of the shortest distance. The evolution of the road network in China since the Shang Dynasty (1600 BC) was described and its major features were summarized to reveal longterm regu larities. The maturity level of the road network and its accessibility was assessed and regions with good and poor networks were identified. The relationship between China's natural, social and economic systems and the road network were discussed. Our analysis shows that the road network in China has a number of longterm regularities. The continuously expanding road network follows a path of inland expansion especially towards the border areas. How ever, its coverage and accessibility are characterized by a coreperipheral configuration, which has close relationships with, not only the natural conditions, but also national defense and warfare. The centralization of national power, national land governance, postal transport, the transport of specialized cargos, and international trade are also related to the develop ment of the road network. This research draws attention to the evolving regularities of trans port networks.
基金supported in part by the National Natural Science Foundation of China (Grant No.61361166005)the State Major Science and Technology Special Projects (Grant No.2016ZX03001020006)the National Program for Support of Top-notch Young Professionals
文摘In order to alleviate capacity constraints on the fronthaul and decrease the transmit latency, a hierarchical content caching paradigm is applied in the fog radio access networks(F-RANs). In particular, a specific cluster of remote radio heads is formed through a common centralized cloud at the baseband unit pool, while the local content is directly delivered at fog access points with edge cache and distributed radio signal processing capability. Focusing on a downlink F-RAN, the explicit expressions of ergodic rate for the hierarchical paradigm is derived. Meanwhile, both the waiting delay and latency ratio for users requiring a single content are exploited. According to the evaluation results of ergodic rate on waiting delay, the transmit latency can be effectively reduced through improving the capacity of both fronthaul and radio access links. Moreover, to fully explore the potential of hierarchical content caching, the transmit latency for users requiring multiple content objects is optimized as well in three content transmission cases with different radio access links. The simulation results verify the accuracy of the analysis, further show the latency decreases significantly due to the hierarchical paradigm.
基金the National Natural Science Foundation of China(Grant No.61971057).
文摘To solve the contradiction between limited spectrum resources and increasing communication demand,this paper proposes a wireless resource allocation scheme based on the Deep Q Network(DQN)to allocate radio resources in a downlink multi-user cognitive radio(CR)network with slicing.Secondary users(SUs)are multiplexed using non-orthogonal multiple access(NOMA).The SUs use the hybrid spectrum access mode to improve the spectral efficiency(SE).Considering the demand for multiple services,the enhanced mobile broadband(eMBB)slice and ultrareliable low-latency communication(URLLC)slice were established.The proposed scheme can maximize the SE while ensuring Quality of Service(QoS)for the users.This study established a mapping relationship between resource allocation and the DQN algorithm in the CR-NOMA network.According to the signal-to-interference-plusnoise ratio(SINR)of the primary users(PUs),the proposed scheme can output the optimal channel selection and power allocation.The simulation results reveal that the proposed scheme can converge faster and obtain higher rewards compared with the Q-Learning scheme.Additionally,the proposed scheme has better SE than both the overlay and underlay only modes.
基金supported by National Natural Science Foundation of China(Grant No.61471053,61901052)Fundamental Research Funds for the Central Universities(Grant 2018RC03)Beijing Laboratory of Advanced Information Networks
文摘The computation resources at a single node in Edge Computing(EC)are commonly limited,which cannot execute large scale computation tasks.To face the challenge,an Offloading scheme leveraging on NEighboring node Resources(ONER)for EC over Fiber-Wireless(FiWi)access networks is proposed in this paper.In the ONER scheme,the FiWi network connects edge computing nodes with fiber and converges wireless and fiber connections seamlessly,so that it can support the offloading transmission with low delay and wide bandwidth.Based on the ONER scheme supported by FiWi networks,computation tasks can be offloaded to edge computing nodes in a wider range of area without increasing wireless hops(e.g.,just one wireless hop),which achieves low delay.Additionally,an efficient Computation Resource Scheduling(CRS)algorithm based on the ONER scheme is also proposed to make offloading decision.The results show that more offloading requests can be satisfied and the average completion time of computation tasks decreases significantly with the ONER scheme and the CRS algorithm.Therefore,the ONER scheme and the CRS algorithm can schedule computation resources at neighboring edge computing nodes for offloading to meet the challenge of large scale computation tasks.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 61103231 and 61103230)the Natural Science Foundation of Jiangsu Province, China (Grant No. BK2012082)+2 种基金the Innovation Program of Graduate Scientific Research in Institution of Higher Education of Jiangsu Province,China (Grant No. CXZZ11 0401)the Natural Science Basic Research Plan in Shaanxi Province of China (Grant No. 2011JM8012)the Basic Research Foundation of Engineering University of the Chinese People’s Armed Police Force (Grant No. WJY201218)
文摘In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations.
基金supported in part by the State Major Science and Technology Special Project(Grant No.2018ZX03001023)the National Natural Science Foundation of China under No.61831002+1 种基金the National Science Foundation for Postdoctoral Scientists of China(Grant No.2018M641279)FundamentalResearch Funds for the Central Universities under Grant No.2018XKJC01
文摘As a promising paradigm of the fifth generation networks,fog radio access network(F-RAN)has attracted lots of attention nowadays.To fully utilize the promising gain of F-RANs,the acquisition of accurate channel state information is significant.However,conventional channel estimation approaches are not suitable in F-RANs due to the large training and feedback overhead.In this paper,we consider the channel estimation in F-RANs with fog access point(F-AP)equipped with massive antennas.Thanks to the computing ability of F-AP and the sparsity of channel matrices in angular domain,Gated Recurrent Unit(GRU),a data-driven based channel estimation is proposed at F-AP to reduce the training and feedback overhead.The GRU-based method can capture the hidden sparsity structure automatically through the network training.Moreover,to further improve the channel estimation,a bidirectional GRU based method is proposed,whose target channel structure is decided by previous and subsequent structures.We compare the performance of our proposed channel estimation with traditional methods(Orthogonal Matching Pursuit(OMP)and Simultaneous OMP(SOMP)).Simulation results show that the proposed approaches have better performance compared with the traditional OMP and SOMP methods.
基金supported in part by the State Major Science and Technology Special Project(Grant No.2018ZX03001025)the National Natural Science Foundation of China(No.61831002 and No.61671074)the Fundamental Research Funds for the Central Universities under Grant No.2018XKJC01
文摘Coordinated signal processing can obtain a huge transmission gain for Fog Radio Access Networks(F-RANs).However,integrating into large scale,it will lead to high computation complexity in channel estimation and spectral efficiency loss in transmission performance.Thus,a joint cluster formation and channel estimation scheme is proposed in this paper.Considering research remote radio heads(RRHs)centred serving scheme,a coalition game is formulated in order to maximize the spectral efficiency of cooperative RRHs under the conditions of balancing the data rate and the cost of channel estimation.As the cost influences to the necessary consumption of training length and estimation error.Particularly,an iterative semi-blind channel estimation and symbol detection approach is designed by expectation maximization algorithm,where the channel estimation process is initialized by subspace method with lower pilot length.Finally,the simulation results show that a stable cluster formation is established by our proposed coalition game method and it outperforms compared with full coordinated schemes.
基金supported in part by the National High Technology Research and Development Program of China(Grant No.2014AA01A707)the Beijing Natural Science Foundation(Grant No.4131003)+1 种基金the Specialized Research Fund for the Doctoral Program of Higher Education (SRFDP)(Grant No.20120005140002)the Key Program of Science and Technology Development Project of Beijing Municipal Education Commission of China (KZ201511232036)
文摘Relay in full-duplex(FD) mode can achieve higher spectrum efficiency than that in half-duplex mode,while it is crucial to suppress relay self-interference to ensure transmission quality which requires instantaneous channel state information(CSI). In this paper,the channel estimation issue in FD amplify-andforward relay networks is considered,where the training-based estimation technique is adopted. Firstly,the least square(LS) estimation is implemented to obtain composite channel coefficients of source-relay-destination(SRD) channel and relay loop-interference(LI) channel in order to assist destination in performing data detection. Secondly,both LS and maximum likelihood estimation methods are utilized to perform individual channel estimation aiming at supporting successive interference cancelation at destination. Finally,simulation results demonstrate the effectiveness of both composite and individual channel estimation,and the presented ML method can achieve lower MSEs than LS solution.
基金National Natural Science Foundation of China,No.41701122,No.41430635China Postdoctoral Science Foundation,No.2017M611854,No.2016M600356
文摘From the development of modern transportation to the current era of high-speed transportation networks, the Beijing-Tianjin-Hebei(BTH) region has always played a national leading role in land transportation development of China. In order to explore the long-term evolutionary characteristics of land transportation in the BTH region, this paper utilized a temporal scale of 100 years to systematically interpret the development process of the land transportation network. Taking 13 cities within the BTH region as research anchor cities, we took into account "leaping" mode of transportation in order to investigate the evolution of accessibility. Our research shows the following results:(1) The land transportation network in the BTH region has undergone five stages of development: the initial period of modernization(1881–1937); the period of stagnation of transportation development(1937–1949); the network expansion period(1949–1980); the period of trunk construction(1980–1995), and the period of high-speed transportation network development(1995–present). The network structure centered around Beijing has existed from the outset of modern transportation development.(2) The accessibility spatial pattern of land transportation in BTH region has evolved from expansion along traffic corridors to the formation of concentric circles. The stratified circular structure of transportation in anchor cities has gradually developed into a contiguous development pattern.(3) There are clear hierarchical differences in the transportation structures of anchor cities. Beijing has always been at the top of this hierarchy, while the hierarchical position of Zhangjiakou has fallen noticeably since 1949. The Beijing-Tianjin region was the first region to form a short-duration transportation circle structure, while the transportation advantages of the central part of Hebei Province, which is located in the center of the BTH transportation region, have yet to be realized.
文摘Based on space syntax theory, the spatial accessibility of the road network in Wuhan Metropolitan Area has been quantitatively analyzed by building a series of accessibility variables. Topologic connectivity in the accessible rings appears to be broken;traffic axis network is in spatial structure of hub-and-spoke and fishbone-like. Meanwhile, the differences in classified road network have led to inefficiency of its network servo and its ever-worsening capability to respond to traffic jams. Besides, two band-like integrated cores of which one is east to west along the Yangtze River and the other is north to south along Beijing to Guangzhou Railway, have become the first level traffic axis in the whole network, which is responsible for the connectivity of the entire metropolitan area network. This consequently has strengthened the dominant position of Wuhan which is located on the bands’ crossing. In short, the spatial accessibility of that classified space morphology, the urban system, the transport infrastructure as well as the social and economic development of Wuhan Metropolitan Area are highly interrelated to each other, especially to the high level highway network featured by freeways, the development level of which is well in line with that of road network accessibility.
基金supported in part by the National Natural Science Foundation of China under Grants U1805262,61871446,and 61671251。
文摘The interplay between artificial intelligence(AI) and fog radio access networks(F-RANs) is investigated in this work from two perspectives: how F-RANs enable hierarchical AI to be deployed in wireless networks and how AI makes F-RANs smarter to better serve mobile devices. Due to the heterogeneity of processing capability, the cloud, fog, and device layers in F-RANs provide hierarchical intelligence via centralized, distributed, and federated learning. In addition, cross-layer learning is also introduced to further reduce the demand for the memory size of the mobile devices. On the other hand, AI provides F-RANs with technologies and methods to deal with massive data and make smarter decisions. Specifically, machine learning tools such as deep neural networks are introduced for data processing, while reinforcement learning(RL) algorithms are adopted for network optimization and decisions. Then, two examples of AI-based applications in F-RANs, i.e., health monitoring and intelligent transportation systems, are presented, followed by a case study of an RL-based caching application in the presence of spatio-temporal unknown content popularity to showcase the potential of applying AI to F-RANs.
文摘MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system.