Although reconfigurable intelligent surface (RIS) is a promising technology for shaping the propagation environment, it consists of a single-layer structure within inherent limitations regarding the number of beam ste...
详细信息
The recent combination of the rising architectures, known as stacked intelligent metasurface (SIM) and holographic multiple-input multiple-output (HMIMO), drives toward breakthroughs for next-generation wireless commu...
详细信息
The provision of services such as credit card facilities using Intelligent networks (IN) depends upon the ability to process real-time data. If their data is deliberately delayed during transit, these services may not...
详细信息
The provision of services such as credit card facilities using Intelligent networks (IN) depends upon the ability to process real-time data. If their data is deliberately delayed during transit, these services may not be able to function accurately. This paper examines INs and highlights their vulnerability to network delay attacks. In particular, the nature of rear-time communications and the main approach that has been developed to determine whether received data is being sent in real-time or not is discussed. The deficiencies in this approach in terms of its ability to counteract the different forms of a network delay attack are highlighted and an alternative method which addresses these drawbacks is presented. Finally, the results achieved following the implementation and subsequent testing of the alternative approach are discussed. (C) 1997 Elsevier Science B.V.
Security management is one of the key functional areas in open systems network management. Two key aspects of security management are managing user security services and providing security to network management system...
详细信息
Security management is one of the key functional areas in open systems network management. Two key aspects of security management are managing user security services and providing security to network management systems. These are examined in tum to give the reader an overview of the state-of-the-art in security management. The ISO OSI Reference Model is used as a basis to present the security threats, security services and mechanisms which have to be managed. Telecommunications management networks are used as an example of management applications which both provide management and require the provision of security and security management services. The OSI approach to network management is examined in detail. This is followed by a survey of the categories of OSI security management activities, and a discussion of the security management needs of various common security services. The need for security for network management systems is examined.
Several international standards for asynchronous data compression are available today. In 1993 the International Telecommunication Union (ITU) started to research possible ways to compress synchronous data. Special at...
详细信息
Several international standards for asynchronous data compression are available today. In 1993 the International Telecommunication Union (ITU) started to research possible ways to compress synchronous data. Special attention was given to compatibility with previous asynchronous standards, namely V.42bis. In September 1993 a proposal for modification of the V.42bis standard to make ii applicable to synchronous data was published. In this paper a prototype of a synchronous data link layer protocol based on the ITU proposals is described. The protocol chosen is HDLC based. The V.42bis compression standard is adapted to serve the needs of a synchronous protocol. A functional model is designed followed by a performance analysis of the protocol. The analysis shows a decrease of the compression ratio due to the adaption of the compression algorithm. (C) 1997 Elsevier Science B.V.
As a cutting-edge technology of low-altitude Artificial Intelligence of Thing (AIoT), UAV object detection significantly enhances the surveillance services capabilities of low-altitude AIoT. However, the difficulty of...
详细信息
Cooperation among various types of management functions is necessary to allow management functions to interwork in providing and using information services for systems management. To understand these tasks from the po...
详细信息
Cooperation among various types of management functions is necessary to allow management functions to interwork in providing and using information services for systems management. To understand these tasks from the point of view of cooperative working, this article discusses the requirements and presents the concept of cooperative system management.
Low-cost reconfigurable intelligent surfaces (RISs) are being considered as promising physical-layer technology for next-generation wireless networks due to their ability to re-engineer the propagation environment by ...
详细信息
Low-cost reconfigurable intelligent surfaces (RISs) are being considered as promising physical-layer technology for next-generation wireless networks due to their ability to re-engineer the propagation environment by tuning their elements. Although RIS-aided systems have many advantages, one of their major bottlenecks is that they can provide coverage only in front of the surface. Fortunately, simultaneous transmitting and reflecting surface (STARS)-assisted systems have emerged to fill this gap by providing 360° wireless coverage. In parallel, full-duplex (FD) communication offers a higher achievable rate through efficient spectrum utilization compared to the half-duplex (HD) counterpart. Moreover, two-way/bi-directional communications in an FD system can further enhance the system's spectral efficiency. Hence, in this paper, we propose a STARS-enabled massive MIMO deployment in an FD two-way communication network for highly efficient spectrum utilization, while covering the dead zones around the STARS. This model enables simultaneous information exchange between multiple nodes, while potentially doubling the spectral efficiency (SE). By invoking the use-and-then-forget (UaTF) combining scheme, we derive a closed-form expression for an achievable SE at each user of the system considering both uplink and downlink communications based on statistical channel state information (CSI), while also accounting for imperfect CSI and correlated fading conditions. Moreover, we formulate an optimization problem to obtain an optimal passive beamforming matrix design at the STARS that maximizes the sum achievable SE. The considered problem is non-convex and we propose a provably-convergent low-complexity algorithm, termed as projected gradient ascent method (ProGrAM), to obtain a stationary solution. Extensive numerical results are provided to establish the performance superiority of the FD STARS-enabled system over the HD STARS-enabled and FD conventional RIS (cRIS)-enabled coun
This paper presents an approach to the specification of external interfaces of an electronic broker used in the Architecture for Electronic Brokerage systems (AEBS). The external interface specified by the AEBS archit...
详细信息
The recent combination of the rising architectures, known as stacked intelligent metasurface (SIM) and holographic multiple-input multiple-output (HMIMO), drives toward breakthroughs for next-generation wireless commu...
详细信息
暂无评论