-
Chapter and Conference Paper
Implementation of Switch Slicing in 5G/B5G/6G Networks
The 5th/B5Gth/6th generation mobile networks (5G for short) virtualize a physical device into n virtual components to support packet transmission, n ≥ 1. 5G further classifies a network into three major categorie...
-
Chapter and Conference Paper
Base-Station Resource Allocation Based on Frame/Sub-Frame
In recent years, with the rapid development of network technology, human beings request high quality of wireless services. The demands for self-driving cars, remote medical surgeries and real-time ward monitor...
-
Chapter and Conference Paper
5G Network Base Station Timeline Scheduling
Currently, the main applications of 5G networks are divided into three types, including: Enhanced Mobile Broadband (eMBB), Ultra-reliable and Low Latency Communications (uRLLC) and Massive Machine Type Communi...
-
Article
A Q-learning-based downlink scheduling in 5G systems
Nowadays, due to the rapid growth of network service requests and popularity of IoT device deployment, wireless networks currently suffer from huge traffic produced by these requests and devices. On the other ...
-
Chapter and Conference Paper
Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense
Nowadays, 5G networks has gradually entered human’s everyday lives. But network services re quested by users continuously grow. On the other hand, hackers can be found everywhere. Our information systems and n...
-
Chapter and Conference Paper
CIRC Model Based on Audiovisual Local Wisdom on Ability to Write Malay Pantun
One of the factors causing the low ability of students in writing literature is because learning is centered on the teacher (teacher center) and not focused on students (student center). Generally, teachers us...
-
Chapter and Conference Paper
Asymmetric Cryptography Among Different 5G Core Networks
In 5G networks, packets transmitted from local UPF of a 5G network to another UPF in different destination 5G network is not encrypted. This conducts a risk of data leakage, particularly along the connection ...
-
Chapter and Conference Paper
The Implementation of Dynamical Shortest Path and Resource Management for Network Slicing in 5G Networks
With the fast development of network technology, nowadays mobile communication is popularly employed all over the world. Mobile network services, e.g., Multimedia programs and Internet surfing, have so far enr...
-
Chapter and Conference Paper
Combining Pipeline Quality with Automation to CI/CD Process for Improving Quality and Efficiency of Software Maintenance
In Taiwan, the regular software maintenance is the essential procedure in general commercial banks. However, during system maintenance, the banking system must be suspended and stop related services. Maintenan...
-
Chapter and Conference Paper
5G Base Station Scheduling
5G base stations (BS) distribute resources to User Equipments (UEs) by dividing the BS’s spectrum into sub-channels of different sizes, and then allocate them to UE’s flows for uploading or downloading data ba...
-
Chapter and Conference Paper
Project Management Mechanism Based on Burndown Chart to Reduce the Risk of Software Project Failure
The failure rate of software projects has always been high. One of the key factors is the inability to detect and effectively solve the progress delay problem in time. Progress delay problems will continuous t...
-
Chapter and Conference Paper
A Q-Learning Based Downlink Scheduling Algorithm for Multiple Traffics in 5G NR Systems
Nowadays, due to the rapid growth and popularity of IoT devices, current wireless networks suffer from the huge traffic produced by these devices. On the other hand, with the availably of 5G networks, people e...
-
Chapter and Conference Paper
Small Object Detection Based on SSD-ResNeXt101
Object detection is closely related to video analysis and image retention, which has attracted many researchers to research in this field
-
Chapter and Conference Paper
Detection and Defense of DDoS Attack and Flash Events by Using Shannon Entropy
Nowadays, Hackers are everywhere. Current information systems often suffer from attacks anytime. Also, 5G network have gradually entered human lives to satisfy our network-service needs. At present, without hu...
-
Article
A Fault Tolerant Mechanism for UE Authentication in 5G Networks
Generally, the 5th Generation (5G) network will be soon available in the near future. It will be one with the feature that some of its network functions are handled by Virtual Machines (VMs), rather than by a ...
-
Chapter and Conference Paper
News Collection and Analysis on Public Political Opinions
With the fast development of news media and freedom of speech in Taiwan, some news is not objectively reported. In fact, in order to attract people’s attention and increase the click rates of news, many journa...
-
Chapter and Conference Paper
System Implementation of AUSF Fault Tolerance
In this study, we deal with two topics. The first is that a machine, named Mediator, is added to a 5G system for managing and kee** track of UE’s authentication. The purpose is that when an AUSF fails, other...
-
Chapter and Conference Paper
Mobile Physiological Sensor Cloud System for Long-Term Care
In this study, we propose a Mobile Physiological Sensor Cloud System for Long-term Care (MPCLC), the main functions of which are collecting carereceiver’s physiological data by using sensors and analyzing and ...
-
Chapter and Conference Paper
Revealing Storage and Speed Transmission Emerging Technology of Big Data
The study highlighted the storage of data and the ability to transmit it at a faster speed securely. It is acknowledged that Big Data represents a large volume of data, and this brings a matter of ways on how ...
-
Chapter and Conference Paper
Migration of Edge Computing Services in 5G Networks – Firewall as a Service Example
According to Ericsson Mobility Report announced in 2017, by 2022, billions of User Equipment (UE) and IoT devices will connect to IoT networks for collecting our environmental and surrounding data. Since foll...