首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 187 毫秒
1.
The Internet today was designed in 1970s and is suffering various serious issues such as security, mobility and scalability. In order to deal with these issues, a national research project, supported by the prestigious National Basic Research Program (also called the "973 program") of China, was launched in May 2007. This project adopts a clean-slate approach and aims to design a novel future Internet that not only inherits the merit of the Internet today but also overcomes the drawbacks of the current Internet. In this paper, we make an overview of this project with a focus on its objectives, basic ideas, and progresses. Although this is a basic research project, its success will bring significant benefits to China as well as all other countries in the world.  相似文献   

2.
Remote state preparation is increasingly becoming attractive in recent years, people have already started theoretical and experimental research, and have made valuable research results. Recently, a scheme for probabilistic remote preparation of a general two-qubit state was proposed (Wang Z Y in Quantum Inf Process. 11:1585, 2012)). In this paper, we present a modified scheme for probabilistic remote preparation of a general two-qubit state. To complete the scheme, the new and feasible complete orthogonal basis vectors have been introduced. Compared with the previous schemes, the advantage of our schemes is that the total success probability of remote state preparation will be greatly improved. The probability of success regarding this scheme is calculated in both general and particular cases. The results show that the success probability of remote state preparation can be improved a little. However, in certain special cases, the success probability of preparation can be greatly improved. In special cases, the success probability of preparation can be improved to 1. The security analysis of the scheme is provided in details.  相似文献   

3.
4.
The rapid development of bulk β-Ga_2O_3 crystals has attracted much attention to their use as ultra-wide bandgap materials for next-generation power devices owing to its large bandgap(~ 4.9 eV) and large breakdown electric field of about8 MV/cm. Low cost and high quality of large β-Ga_2O_3 single-crystal substrates can be attained by melting growth techniques widely used in the industry. In this paper, we first present an overview of the properties of β-Ga_2O_3 crystals in bulk form. We then describe the various methods for producing bulk β-Ga_2O_3 crystals and their applications. Finally, we will present a future perspective of the research in the area in the area of single crystal growth.  相似文献   

5.
ZTE is the first Chinese telecom equipment vendor to do research on Softswitch technology and to develop Softswitch-based products. With great efforts for several years, ZTE and its Softswitch products have got a general recognition in the industry. Its Softswitch products are playing an important role in NGN construction for fixed networks, which lay a solid basis for the wide application of Softswitch in the future.h TU has approved three 3G systems: WCDMA, CDMA2000 and TD-SCDMA…  相似文献   

6.
NDN is an important instance of Information-Centric Networking.When integrating NDN into MANET,exploring new routing is a necessary task for this research area.The LSAs flooding is a common method to obtain network topology during route establishment.However,the LSAs flooding often results in a broadcast storm in high-density MANET.Using the MPR set proposed in the OLSR can effectively reduce the number of LSAs in the process of route establishment and can further solve the broadcast storm.In this paper,an enhanced neighbor discovery protocol firstly is designed to establish a MPR set.The new protocol can effectively avoid the problem incurred by unidirectional links that impact the network performance in a wireless environment.And then a new and proactive routing NOLSR based on OLSR for NDN-MANET is proposed to support NDN in MANET.And another important work is that NOLSR is implemented on top of NDN Forwarding Daemon NFD.Finally,we make a comparative analysis between NOLSR and the two most relative schemes such as traditional LSA-flooding and the scheme[1]by emulation experiments in the NDN emulator mini-NDN.  相似文献   

7.
The major challenge faced by wireless mesh networks is the capacity reduction caused by interference,and interference can be reduced or even eliminated through appropriate channel assignment.This article presents a comprehensive survey of channel assignment schemes for multicast in multi-radio multi-channel wireless mesh networks.We analyze the state-of-the-art channel assignment schemes for multicast and provide comprehensive taxonomy of the latest work.In general,we classify the channel assignment schemes for multicast into two types,that is,sequential multicast routing and channel assignment(SMRCA)and joint multicast routing and channel assignment(JMRCA).Detailed review of channel assignment schemes in each category is provided.Possible future research directions and corresponding solutions are also explored to motivate research interests in the field of channel assignment for multicast in wireless mesh networks.  相似文献   

8.
Security is one of the most critical issues to Vehicular Ad-hoc Networks(VANETs) since the information transmitted is asynchronous and distributed.Vulnerability and instability are two of the challenges remain to be addressed by the research community and the industry. In this paper, we first proposed a trust reliability based model and extended the GPSR protocol to TM-GPSR protocol. Then, we improved the LET-GPSR protocol based on the link connection time prediction. On this basis, combined the...  相似文献   

9.
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.  相似文献   

10.
An ultra-thin multi-LED package is designed,manufactured and its thermal performance is characterized. The objective of this study is to develop an efficient thermal modelling approach for this system which can be used for optimization of the thermal-performance of future ultra-thin designs.A high-resolution thermal imaging camera and thermocouples were used to measure the temperature distribution of the multi-LED package and the LED-die temperature for different operating powers.Finally,we compare the thermal measurements with the finite element simulation results.It is concluded that the modelling approach can assist in the thermal optimization of future multi-LED package designs.  相似文献   

11.
This paper, as a preface to this special issue, gives an overview of recent developments in Korean telecommunication market and industry. It provides background information that is helpful for understanding the motivations behind research papers contained in this issue. In particular, we discuss the transition of the market structure from monopoly to deregulated competition, the activities in telecommunications R&D, and the building of nationwide telecommunication infrastructure in Korea. A taxonomy of the papers presented in this issue is given at the end. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   

12.
This special issue serves as a stimulus to promote and accelerate technological evolution toward 4G networking. The response to the call for papers for this issue is indicative of the great interest with which the community views this topic. Of the many high quality in depth and breadth papers received from both academia and industry around the world, we could only accommodate a selected few in this issue. The research on the next generation wireless networking involves many cutting-edge research topics, which are presented in some articles included in this special issue  相似文献   

13.
In today’s Internet reliant services, the issue of users’ information privacy awareness is being raised. Despite the fact that in many cases internet users claim to be cognizant of privacy issues, they tend to jeopardize their privacy and take no actions to protection it. This paper reports a systematic literature review of existing studies related to Internet users’ information privacy awareness, towards enhancing respective initiatives and defining the attributes that a user should have so as to be privacy aware. We created a five-concept classification framework for the research topics that the academic community raises as important to be further investigated and the main challenges inhibiting information privacy awareness, and we classified all the selected papers according to this framework. Based on the analysis of the literature, we identify five main attributes that constitute a “Profile for the Information Privacy Aware User”, stemming from the classification framework, and further, we suggest the way this profile can be beneficial for internet users, Internet providers and designers of privacy awareness enhancing technologies. Additionally, we highlight research gaps and we provide useful insights for future research, such as the need for a concrete definition (theme 1), the need for the proposal of privacy preventive technologies (theme 3 and 4) and the need for investigation of information privacy awareness in multiple contexts (theme 5).  相似文献   

14.
Today, the Internet of Things (IoT) becomes a heterogeneous and highly distributed structure which can respond to the daily needs of people and different organizations. With the fast development of IT‐based technologies such as IoT and cloud computing, low‐cost health services and their support, efficient supervision of the centralized management, and monitoring of public health can be realized. Therefore, there has been increasing attention in the integration of IoT and health care both in academic and the business world. However, while the health care service industry fully holds the welfares of information systems for its personnel and patients, there is a need for an improved understanding of the issues and opportunities related to IoT‐based health care systems. But, as far as we know, the detailed review and deep discussion in this field are very rare. Hence, in this paper, we presented a literature review on the IoT‐based health care services from papers published until 2018. Moreover, the drawbacks and benefits of the reviewed mechanisms have been discussed, and the main challenges of these mechanisms are highlighted for developing more efficient IoT techniques over health care services in the future. The results of this paper will be valuable for both practitioners and academicians, and it can provide visions into future research areas in this domain. By providing comparative information and analyzing the current developments in this area, this paper will directly support academics and working professionals for better knowing the progress in IoT mechanisms. As a general result, we found that IoT could help the governments to improve health services in society and commercial interactions.  相似文献   

15.
Belgian politicians, the National Telecommunications Administration (RTT), and the telecommunication industry in general fully realize the major economic, industrial, and social importance of an advanced telecommunications infrastructure for the future of the country. A national effort is therefore underway. This paper describes the specific Belgian telecommunications environment, its development towards an ISDN infrastructure, and evolution towards the integration of telecommunication and distribution services into a uniform broad-band communication network. The present network structures for both telecommunication and distribution services are briefly discussed in this paper. Furthermore, plans and experiments in the area of ISDN are also described. Explanations related to the basic concepts of a national integrated broad-band communication network and possible architectures for a demonstration project are given.  相似文献   

16.
本文以信息系统审计与控制协会(ISACA)发布的IT内部控制目标(C0BIT)框架为理论基础,结合国内运营商信息技术内部控制的现状,提出了系统构建电信企业信息技术内部控制体系的方法,设计了基于COBIT框架的信息技术内部控制体系,并对其实施策略和应用前景进行了探讨.  相似文献   

17.
电信资费的管制及变革   总被引:1,自引:1,他引:0  
电信资费一直是社会各界普遍关注的热点问题之一,消费者、企业、专家和政府在这一问题上争论很多,意见差距很大.本文对我国电信资费管制的历史进行了分析,借鉴国外的电信资费管制经验,提出应该从整个电信市场发展和市场结构出发来研究电信资费政策,进而提出未来电信资费管制的具体建议.  相似文献   

18.
New global trends in telecommunications technology and liberalization will force dramatic changes in the national telecommunications of the East European countries. Some of them are described in this article. Mainly the technical issues of shaping telecommunication systems evolution in the region are considered. The major trends in regional telecommunication networks evolution-deregulation, new end user demands, and technological innovations are described first . Next, we deal with today's network structure. Finally, we describe the possible transformation of the network infrastructure in the near future.  相似文献   

19.
Standardization of mobile phone positioning for 3G systems   总被引:11,自引:0,他引:11  
Finding the location of the mobile phone is one of the important features of the 3G mobile communication system. Many valuable location-based services can be enabled by this new feature. Telecommunication managers and engineers are often puzzled by location terminologies and techniques as well as how to implement them, since location systems are not natural evolution from past generations of telecommunication systems. In this paper, we discuss briefly why locating mobile phone becomes a hot topic and what technologies are being studied. We then describe and clarify the latest standards issues surrounding the positioning methods specified for 3G systems. These include cell-ID-based, assisted GPS, and TDOA-based methods, such as OTDOA, E-OTD, and A-FLT  相似文献   

20.
作为未来网络领域的关键技术,SDN/NFV在工业互联网、5G切片、云化电信网络等应用场景先后成熟。2019年,SDN/NFV技术正式进入v2.0发展阶段。梳理了SDN/NFV技术的演进历程,归纳了其v2.0阶段的整体架构和关键技术,给出了我国产业界发展的建议。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号