Current Issue : January-March Volume : 2024 Issue Number : 1 Articles : 5 Articles
How to perform efficient service migration in a mobile edge environment has become one of the research hotspots in the field of service computing. Most service migration approaches assume that the mobile edge network on which the migration depends is stable. However, in practice, these networks often fluctuate greatly due to the fault of edge devices, resulting in unexpected service interruptions during the migration process. Besides, most of the existing solutions do not consider the migration cost and path selection in the event of edge network fault. Aiming at the above problems, we propose a service migration approach based on network fault prediction (SMNFP) for mobile edge environment. The SMNFP method first introduces the software-defined network as a global controller, which is used to monitor and collect the changing of the edge network and schedule the migration tasks. Second, a network fault prediction model based on Wide&Deep model is proposed to predict the upcoming faults in the network according to the alarm information of network equipment. Finally, the service migration problem is constructed as a Markov decision process, and a fault penalty function is introduced to avoid faulty nodes, together with the deep Q-learning method to solve the migration strategy. Simulation experiments are conducted on the public metro network fault dataset, and results show the proposed method can effectively predict network faults and complete service migration....
6G networks can be truly intelligent wireless systems that have the flexibility for continuous technological improvements. However, security events affecting information systems have grown increasingly complicated and sophisticated. Intruders may be able to operate due to a lack of evidence authenticity. Using network forensics methods can solve many cybercrime instances. These methods can be used to locate the intruder and to determine the intrusion’s origin and how it can be avoided in the future. Existing network forensics techniques confront security threats and vulnerabilities in several networks, such as personal area networks, local area networks, wide area networks, and wireless wide area networks under telecom networks, in practice, but cannot operate in 6G and beyond telecom networks, which are critical at this moment. Thus, a comprehensive literature analysis of telecom networks is conducted to identify existing concerns and challenges in conducting digital communication forensics. Hence, a digital forensics system for 6G and beyond networks is proposed as an initial idea on the basis of the highlighted issues, thereby assessing security incidents and providing justified evidence that explains the footprints of the attackers....
Quantum computing, an emerging paradigm based on the principles of quantum mechanics, has the potential to revolutionise various industries, including Telecommunications. This paper explores the transformative impact of quantum computing on the telecommunication market, focusing on its applications in solving computationally intensive problems. By leveraging the inherent properties of quantum systems, such as superposition and entanglement, quantum computers offer the promise of exponential computational speedup and enhanced problem-solving capabilities. This paper provides an in-depth analysis of the current state of quantum computing in telecommunication, examining key algorithms and approaches, discussing potential use cases, and highlighting the challenges and future prospects of this disruptive technology....
To achieve the atomistic control of two-dimensional materials for emerging technological applications, such as valleytronics, spintronics, and single-photon emission, it is of paramount importance to gain an in-depth understanding of their structure–property relationships. In this work, we present a systematic analysis, carried out in the framework of density-functional theory, on the influence of uniaxial strain on the electronic and optical properties of monolayer MoTe2. By spanning a ±10% range of deformation along the armchair and zigzag direction of the twodimensional sheet, we inspect how the fundamental gap, the dispersion of the bands, the frontier states, and the charge distribution are affected by strain. Under tensile strain, the system remains a semiconductor but a direct-to-indirect band gap transition occurs above 7%. Compressive strain, instead, is highly direction-selective. When it is applied along the armchair edge, the material remains a semiconductor, while along the zigzag direction a semiconductor-to-metal transition happens above 8%. The characteristics of the fundamental gap and wave function distribution are also largely dependent on the strain direction, as demonstrated by a thorough analysis of the band structure and of the charge density. Additional ab initio calculations based on many-body perturbation theory confirm the ability of strained MoTe2 to absorb radiation in the telecom range, thus suggesting the application of this material as a photon absorber upon suitable strain modulation....
The rapid development and market rivalry eventually posed massive challenges in determining the future development trend of organizations to become market winners. Several types of research were conducted exploring the factors affecting investment in telecommunication companies. One has found significant relevance in financial management, which consists of financing, investment, and dividend decisions in private sector mobile telecom businesses. This study aimed to examine the impact of financial performance on the stock price of telecommunication companies listed on the IDX (Indonesia Stock Exchange) in the period of 2014-2020. The financial fundamentals used are current ratio (liquidity), return on asset (profitability), total asset turnover ratio (activity), and debt to asset ratio (solvency). This research applies qualitative data method. The population in this study is nine telecommunication companies listed on the IDX (Indonesia Stock Exchange) for seven-year period, and the sample selection technique used was purposive sampling. It resulted in 63 samples in total being obtained in this study. Moreover, the data type of this research uses secondary data, which is the annual financial report. The data analysis method in this study is descriptive analysis, classical assumption test, and multiple linear regression analysis processed using e-views 12. This research result is based on the fixed-effect method run since it is more suitable for the model of this research. The result shows that the financial fundamentals variables mutually have a significant impact on the stock performance. Yet, not all variables are significant individually....
Loading....