2021
DOI: 10.3390/jtaer16070158
|View full text |Cite
|
Sign up to set email alerts
|

Study of the Operation Process of the E-Commerce Oriented Ecosystem of 5Ge Base Station, Which Supports the Functioning of Independent Virtual Network Segments

Abstract: According to specifications, flexible services for traffic management should be implemented within the 5G platform in order to improve its efficiency, which is and will remain an actual task. For the first time, the article presented here proposes a mathematical model for the operation process of an e-commerce-oriented ecosystem of a 5Ge base station, the information environment of which supports the operation of independent virtual network segments that provide terminal–segment information interaction service… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 42 publications
0
9
0
Order By: Relevance
“…In it, the eMBB service supports multimedia streams from surveillance cameras and the mMTC service supports the operation of a sensor network, the sensors of which are located at traffic lights in the city. A detailed description of the network architecture used by the authors for experiments was made earlier in 27 , 31 , 32 .…”
Section: Methodsmentioning
confidence: 99%
“…In it, the eMBB service supports multimedia streams from surveillance cameras and the mMTC service supports the operation of a sensor network, the sensors of which are located at traffic lights in the city. A detailed description of the network architecture used by the authors for experiments was made earlier in 27 , 31 , 32 .…”
Section: Methodsmentioning
confidence: 99%
“…Separately, we note the research direction of analyzing the process of functioning communication systems with different mixed types of traffic [ 8 16 ]. The results of such studies are summarized in the form of analytically determined metrics of qualitative indicators, calculating which can assess the effectiveness of the profile application of specific instances of communication systems.…”
Section: State-of-the-artmentioning
confidence: 99%
“…Cyber-attacks are one of the consecutive evolving complications with emphasized algorithms with enhanced software programs, hardware set, and other network topology. 1 These types of malicious-cyber-attacks expose crucial security problems which necessitate for reliable, flexible CPS model. In the present decade, the process of automation is essential in this modern world.…”
Section: Introductionmentioning
confidence: 99%
“…An interactive methodology for network intrusion visualization three-dimensionally facilitates the employment of a supervised enhanced machine-learning model. 1 Hence the study is focused to concentrate on this concept to provide a representation of different network-traffic categories relationships. The ML techniques would differentiate normal network data and the abnormal intrusion data at a higher accuracy level.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation