Current Issue : October-December Volume : 2022 Issue Number : 4 Articles : 5 Articles
In the new era, the arrival of 5G has added a lot of fun and beauty to our lives, allowing us to enjoy the happiness brought by the network even more. The 5th Generation mobile technology (5G for short) is a new generation of broadband mobile communication technology with features such as higher speed, lower latency, and massive connectivity. Moreover, this is a network infrastructure that, in fact, realizes the interconnections among humans, computer machines, and sensors/things, i.e., Internet of things. The world can now be characterized as a whole global village. The 5 G, mobile edge computing networks, and cloud-edge collaborative computing allow us to communicate and share information on the cloud networks, allowing us to better understand the global village. Based on cloud-edge collaborative computing for 5G edge networks, this study builds a task scheduling algorithm, which will help us to check network defects and make better use of the 5G technology to serve customers. Experimental results demonstrate the extra efficiency of the proposed algorithm over the closest rivals....
Current progress in the development of new subterahertz instruments discussed in this paper, including antennas, high-power gyrotrons, and low-noise receivers, provides a wide range of possible applications. Atmospheric absorption has now become a major limitation in the application of such high-performance subTHz systems, and the choice of the optimal location of antennas for astronomical, radar, and communication systems is important. The latest results of studying the microwave astroclimate in northern Eurasia are presented. Based on these studies, new perspectives and corrected plans for installing new antennas at the Suffa Plateau and in the Caucasus are formulated, and possible applications of new instruments such as radars for locating space debris and communication hubs for deep space communications, which are based on extremely-high-power gyrotrons and low-noise superconducting receivers, are discussed....
We report on single-photon emitters for the telecommunication O-band (1260–1360 nm), which comprise an InAs/(In)GaAs quantum dot with asymmetric barriers, placed inside a semiconductor tapered nanocolumn acting as a photonic nanoantenna. The implemented design of the barriers provides a shift in the quantum dot radiation wavelength towards the O-band, while the nanoantenna collects the radiation and ensures its effective output. With non-resonant optical pumping, the average count rate of emitted single photons exceeds 10 MHz with the second-order correlation function g(2)(0) = 0.18 at 8 K....
With the diversification of information data in the information age of big data and the integration of network technology and the development of different industries, criminals who carry out telecommunication fraud are also using the technical loopholes existing in the process of integration of big data with different industries as an opportunity to commit crimes. This paper studies the investigation process and countermeasures of telecom network fraud through big data technology. This paper first introduces the characteristics of big data, analyzes the challenge of personal information security under the background of big data, warns people to protect their personal information in the era of big data, puts forward the clustering algorithm based on big data, introduces the concrete steps based on big data clustering algorithm, and then puts forward the specific steps of big data clustering algorithm. The current situation of telecom network fraud is analyzed, and the telecommunication network fraud is clustered based on big data. The experimental results show that, based on the clustering analysis of telecommunication network fraud based on big data, it is found that through the information age of big data, as long as big data are used rationally, it can effectively suppress telecommunications fraud and reduce it by 80%....
This paper considers simultaneous wireless information and power transfer (SWIPT) from a base station to multiple Internet of Things (IoT) nodes via orthogonal frequency-division multiple access (OFDMA), where every node can eavesdrop on the subcarriers allocated to other nodes. Application layer encryption is unsuitable for IoT nodes relying on energy harvesting, and physical layer secrecy should be deployed. The different channels among users on every subcarrier can be exploited to obtain physical layer secrecy without using artificial noise. We propose an algorithm to maximize the secrecy rate of IoT nodes by jointly optimizing the power splitting ratio and subcarrier allocation. For fairness, the lowest total secrecy rate among users is maximized. Through simulations, the proposed algorithm is compared with the minimum effort approach, which allocates each subcarrier to the strongest node and selects the minimum sufficient power splitting ratio. The obtained secrecy rate is 3 times (4.5 over 1.5 bps/Hz) higher than that of the minimum effort approach in every case of parameters: the base station’s transmit power, the minimum harvested energy requirement of an IoT node and the energy harvesting efficiency....
Loading....