首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
It is noted that the revolutionary development of technologies,fundamentalchange of traffic composition,trend of network convergence as well asmarket opening and competition have become the driving forces to developNext Generation Networks (NGN).After introducing the concepts andcharacteristics of NGN,the paper details its 5 strategic developmentdirections:evolution to softswitch-based next generation switching network,evolution to next generation mobile communication network represented by3G,evolution to IPv6-based next generation Internet,evolution to diversifiedbroadband access network,and evolution to next generation transportnetwork based on optical networking.Finally,it briefs the strategic thinkingon NGN of China Telecom,the largest fixed network carrier in the world.  相似文献   

2.
A public key infrastructure (PKI) is a credential verification scheme based upon public/private key-pair cryptography. This paper explores the PKI story so far and then goes on to identify some of the problems that stand in the way of globalisation and truly successful commercial PKI interworking. Current solutions to these problems are explained, with their respective benefits and limitations, and a much broader picture is evolved to show the likely destiny of the PKI as it begins to become really useful and fit into a wider commercial security context.  相似文献   

3.
Social Internet of Things (SIoT) is a young paradigm that integrates Internet of Things and Social Networks. Social Internet of Things is defined as a social network of intelligent objects. SIoT has led to autonomous decision making and communication between object peers. SIoT has created and opened many research avenues in the recent years and it is vital to understand the impact of SIoT in the real world. In this paper, we have mined twitter to evaluate the user awareness and impact of SIoT among the public. We use R for mining twitter and perform extensive sentiment analysis using supervised and semi supervised algorithms to evaluate the user’s perception about SIoT. Experimental results show that the proposed Fragment Vector model, a semi supervised classification algorithm is better when compared to supervised classification algorithms namely Improved Polarity Classifier (IPC) and SentiWordNet Classifier (SWNC). We also evaluate the combined performance of IPC and SWNC and propose a hybrid classifier (IPC?+?SWNC). Our analysis was challenged by limited number of tweets with respect to our study. Experimental results using R has produced evidences of its social influences.  相似文献   

4.
The enterprise resource planning (ERP) system has evolved from material requirements planning (MRP) and manufacturing resource planning (MRPII), and combines both the business processes of the organization and IT into one integrated solution[1]. The ERP system can help enterprises alleviate incompatibility issues by making disparate computer hardware and software systems communicate with one another, shift from a traditional functional mode to a business process mode and can optimize the…  相似文献   

5.
6.
Efficient perception of the real world is a long-standing effort of computer vision.Mod?ern visual computing techniques have succeeded in attaching semantic labels to thousands of daily objects and reconstructing dense depth maps of complex scenes.However,simultaneous se?mantic and spatial joint perception,so-called dense 3D semantic mapping,estimating the 3D ge?ometry of a scene and attaching semantic labels to the geometry,remains a challenging problem that,if solved,would make structured vision understanding and editing more widely accessible.Concurrently,progress in computer vision and machine learning has motivated us to pursue the capability of understanding and digitally reconstructing the surrounding world.Neural metric-se?mantic understanding is a new and rapidly emerging field that combines differentiable machine learning techniques with physical knowledge from computer vision,e.g.,the integration of visualinertial simultaneous localization and mapping(SLAM),mesh reconstruction,and semantic un?derstanding.In this paper,we attempt to summarize the recent trends and applications of neural metric-semantic understanding.Starting with an overview of the underlying computer vision and machine learning concepts,we discuss critical aspects of such perception approaches.Specifical?ly,our emphasis is on fully leveraging the joint semantic and 3D information.Later on,many im?portant applications of the perception capability such as novel view synthesis and semantic aug?mented reality(AR)contents manipulation are also presented.Finally,we conclude with a dis?cussion of the technical implications of the technology under a 5G edge computing scenario.  相似文献   

7.
Mobile Networks and Applications - The world is going to be more and more digital with effective utilization of information and communication technologies in government services to provide services...  相似文献   

8.
9.
The objective of the present paper is to give an analytic approximation of the performance of elastic traffic in wireless cellular networks accounting for user’s mobility. To do so we build a Markovian model for users arrivals, departures and mobility in such networks; which we call WET model. We firstly consider intracell mobility where each user is confined to remain within its serving cell. Then we consider the complete mobility where users may either move within each cell or make a handover (i.e. change to another cell). We propose to approximate the WET model by a Whittle one for which the performance is expressed analytically. We validate the approximation by simulating an OFDMA cellular network. We observe that the Whittle approximation underestimates the throughput per user of the WET model. Thus it may be used for a conservative dimensioning of the cellular networks. Moreover, when the traffic demand and the user speed are moderate, the Whittle approximation is good and thus leads to a precise dimensioning.  相似文献   

10.
A new non-topological information diffusion model of social network was proposed,called non-topological influence-interest diffusion model (NT-II).Representation learning was exploited to construct two hidden spaces for NT-II,called the user-influence space and the user-interest space,each user and each propagation item was mapped into a vector in space.The model predicted the probability of a user receiving a propagated item,considering not only the degree of influence from other users,but also the user's preference for propagated item.The experimental results show that the model can simulate the propagation process and predict the propagation results more accurately.  相似文献   

11.
Existing telecommunication networks and classical roles of operators are subject to fundamental change. Many network operators are currently seeking for new sources to generate revenue by exposing network capabilities to 3rd party service providers. At the same time we can observe that services on the World Wide Web (WWW) are becoming mature in terms of the definition of APIs that are offered towards other services. The combinations of those services are commonly referred to as Web 2.0 mash-ups. Rapid service design and creation becomes therefore important to meet the requirements in a changing technology and competitive market environment. This report describes our approach to include Next Generation Networks (NGN)-based telecommunications application enabler into complex services by defining a service broker that mediates between 3rd party applications and NGN service enablers. It provides policy-driven orchestration mechanisms for service enablers, a service authorization functionality, and a service discovery interface for Service Creation Environments. The work has been implemented as part of the Open SOA Telco Playground testbed at Fraunhofer FOKUS.  相似文献   

12.
Future user verification and validation for networked access to computer applications, trust services and e-commerce could rely upon biometrics-based user authentication. This paper discusses requirements for networked biometrics access, based on experience with iris recognition systems. Also described is the development of a prototype WindowsNT log-on system using iris recognition.  相似文献   

13.
A theorem by Hadamard gives a two-part condition under which a map from one Banach space to another is a homeomorphism. The theorem, while often very useful, is incomplete in the sense that it does not explicitly specify the family of maps for which the condition is met. Here, under a typically weak additional assumption on the map, we show that Hadamards condition is met if and only if the map is a homeomorphism with a Lipschitz continuous inverse. An application is given concerning the relation between the stability of a nonlinear system and the stability of related linear systems.  相似文献   

14.
Social media, as a subaltern public sphere (Fraser, 1990), have a democratic function in providing an alternative platform for minorities and marginalized to defy mainstream discourses in the public sphere. However, social media have been found to have an echo chamber effect, which may be detrimental to democracy. They may help to accelerate the ascendancy of a “post-truth” era in which objective facts are less influential in shaping public opinion than appeals to emotion and personal belief. A study on political polarization, however, showed that selective exposure and avoidance in social media are weak indicators of polarization (Johnson et al., 2017). This study examines the role of social media in democracy and partisan politics. The authors considered that despite the echo chamber effect, social media have a limited part to play in the formation of polarized stances compared with other factors, such as demographics, political orientation, and mass media use. The study tested two main hypotheses: H1: Social media use is associated with political stance that is marginalized in the mainstream media; H2: Political orientation has a stronger relationship than social media use with the stance toward political values and social issues.The results supported both hypotheses. Social media are associated with political stance that is marginalized in the mainstream media. However, when compared with other factors, the relationship between social media and stance becomes less obvious. Although the echo chamber effect may reinforce the original stance, social media do not exhibit a strong relationship with the stance toward political values and social issues. Partisan orientation and use of partisan mass media are found to have stronger links with variations in stance. Social media, however, provide a subaltern public sphere for those excluded from the dominant public sphere, thus extending the public sphere to accommodate multiple opinions and perspectives.  相似文献   

15.
A Method for Anomaly Detection of User Behaviors Based on Machine Learning   总被引:1,自引:0,他引:1  
1Introduction Intrusiondetectiontechniquescanbecategorizedinto misusedetectionandanomalydetection.Misusedetec tionsystemsmodelattacksasspecificpatterns,anduse thepatternsofknownattackstoidentifyamatchedac tivityasanattackinstance.Anomalydetectionsystems u…  相似文献   

16.
Autonomic Computing for Pervasive ICT — A Whole-System Perspective   总被引:1,自引:0,他引:1  
It is unlikely that we can expect to apply traditional centralised management approaches to large-scale pervasive computing scenarios. Approaches that require manual intervention for system management will similarly not be sustainable in the context of future deployments considering their scale and their dynamic (or mobile) nature. This situation motivates the need to apply autonomic techniques to system management, where the behaviour of whole systems results from the inherent properties that have been engineered in, i.e. such systems need to be adaptive, reliable and self-managing at the whole system level.In this paper we outline a number of design principles that can be applied to create systems that are autonomic in their operation. We focus particularly on generating (and analysing) global system behaviour that arises from the carefully designed interactions of the system components, rather than on the individual behaviour of the components themselves. The design heuristics that we derive (which are often nature-inspired) are illustrated in the context of a number of examples that show how the use of the appropriate principles can lead to the inherent global behaviours that we desire. The result is self-managing, self-repairing systems that can be easily deployed, thus reducing total cost of ownership and increasing overall system reliability.  相似文献   

17.
As an indispensable part of intelligent transportation system (ITS), inter-vehicle communication (IVC) emerges as an important research topic. The inter-vehicle communication works based on vehicular ad hoc networking (VANET), and provides communications among different vehicles. The wide applications of VANET helps to improve driving safety with the help of traffic information updates. To ensure that messages can be delivered effectively, the security in VANET becomes a critical issue. Conventional security systems rely heavily on centralized infrastructure to perform security operations such as key assignment and management, which may not suit well for VANET due to its high mobility and ad hoc links. Some works suggested that vehicles should be connected to fixed devices such as road side units (RSUs), but this requires deployment of a large number of costly RSUs in a specific area. This paper is focused on the issues on decentralized IVC without fixed infrastructure and proposes a method for Dynamic Establishment of Secure Communications in VANET (DESCV), which works in particular well for VANET communication key management when centralistic infrastructure or RSU is not available. We will demonstrate through synergy analysis and simulations that DESCV performs well in providing secure communications among vehicles traveling at a relative velocity as high as 240 km/h.  相似文献   

18.
ZTE, a leading globalprovider oftelecommunicationsequipment and network solutions, launched its new WCDMAO&MPlant operations and management solution at ITUTelecom World. The new system has been developed inaccordance with low cost construction trends, as smaller andlower power consumption base stations become increasinglyattractive to operators.In ZTE’s booth, the comparatively smallsize ofthe newgeneration Baseband Band Unit (BBU) and Radio ResearchUnit (RRU) was shown to the pub…  相似文献   

19.
ZTE, a leading globalprovider oftelecommunicationsequipment and network solutions, launched its ZXG10 8000base stations family at ITU Telecom World 2006. ZTE’s"green"multi- carrier 8000 base stations family integrates allthe technicaladvantages ofthird generation base stations.Because it adopts a multiple density frequencies module,the power consumption is lower and the dimension is smaller.An optimalbalance between capacity and coverage isachieved, supporting the smooth evolution to 3G …  相似文献   

20.
There has been a significant body of U.S. federal case law where jurisdictional issues concerning the 1958 Convention on Recognition and Enforcement of Foreign Arbitral Awards have been litigated in the U.S. This article focuses on federal courts' interpretation on certain—not all—of those jurisdictional issues in connection with the Federal Arbitration Act—state law and state courts are out of the scope of this article.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号