Microwave Frequency Fiber Interferometry in Submarine Deployed Telecommunication Cables
A. Bogris, C. Simos, I. Simos
et al.
We operated a microwave frequency fiber interferometer in a telecommunication cable in the Ionian Sea, Greece, for two months. The capability of detecting undersea micro earthquakes (magnitude~1.5), tides and ocean waves is reported
Emergence of the Traffic Autonomous Zone (TAZ) for Telecommunication Operations from Spatial Heterogeneity in Cellular Networks
Liyan Xu, Jintong Tang, Hezhishi Jiang
et al.
In the field of telecommunications, various operations are driven by different physical quantities. Each has its own patterns in time and space, but all show some clustered structures in their spatial distribution. This reflects a unified rule of human mobility, suggesting the consistency among different telecommunication regionalization objectives. With this in mind, regionalization can be used to identify these patterns and can be applied to improve management efficiency in the context of "autonomous networks". This article introduces the "Traffic Autonomous Zone (TAZ)" concept. This approach aims to create a reasonable unified regionalization scheme by identifying spatial clusters. It is not just a practical way to partition cities based on telecommunications needs, but it also captures self-organization structure of cities in essence. We present examples of this regionalization method using real data. Compared to the popular Louvain community detection method, our approach is on the Pareto frontier, allowing for a balance among various metrics in telecommunications.
ABCD: advanced blockchain DSR algorithm for MANET to mitigate the different security threats
Sayan Majumder, Debika Bhattacharyya, Swati Chowdhuri
Abstract Mobile ad hoc networks (MANETs) facilitate data communication across multiple nodes and hop stations, characterized by their dynamic topology. This inherent flexibility, however, makes MANETs vulnerable to various security threats, notably blackhole and wormhole attacks, where malicious nodes can intercept and manipulate data. This study investigates the security vulnerabilities of MANETs, particularly against blackhole, Sybil, and wormhole attacks, and introduces the Advanced Blockchain Dynamic Source Routing (ABCD) algorithm to address these challenges. Motivated by the need for robust and decentralized security solutions in MANETs, the proposed algorithm integrates blockchain technology and homomorphic encryption to secure data communication without intermediate decryption. The ABCD algorithm leverages Dijkstra’s algorithm for optimal routing and employs a tamper-proof, decentralized data storage approach. Comparative analysis under attack scenarios reveals that the ABCD algorithm outperforms the standard DSR protocol across multiple quality of service metrics, demonstrating a significant improvement in MANET security over equivalent studies. The packet delivery rate is also improved from 81 to 92% using the modified ABCD algorithm.
Telecommunication, Electronics
Telco-RAG: Navigating the Challenges of Retrieval-Augmented Language Models for Telecommunications
Andrei-Laurentiu Bornea, Fadhel Ayed, Antonio De Domenico
et al.
The application of Large Language Models (LLMs) and Retrieval-Augmented Generation (RAG) systems in the telecommunication domain presents unique challenges, primarily due to the complex nature of telecom standard documents and the rapid evolution of the field. The paper introduces Telco-RAG, an open-source RAG framework designed to handle the specific needs of telecommunications standards, particularly 3rd Generation Partnership Project (3GPP) documents. Telco-RAG addresses the critical challenges of implementing a RAG pipeline on highly technical content, paving the way for applying LLMs in telecommunications and offering guidelines for RAG implementation in other technical domains.
Unsupervised Deep Anomaly Detection for Industrial Multivariate Time Series Data
Wenqiang Liu, Li Yan, Ningning Ma
et al.
With the rapid development of deep learning, researchers are actively exploring its applications in the field of industrial anomaly detection. Deep learning methods differ significantly from traditional mathematical modeling approaches, eliminating the need for intricate mathematical derivations and offering greater flexibility. Deep learning technologies have demonstrated outstanding performance in anomaly detection problems and gained widespread recognition. However, when dealing with multivariate data anomaly detection problems, deep learning faces challenges such as large-scale data annotation and handling relationships between complex data variables. To address these challenges, this study proposes an innovative and lightweight deep learning model—the Attention-Based Deep Convolutional Autoencoding Prediction Network (AT-DCAEP). The model consists of a characterization network based on convolutional autoencoders and a prediction network based on attention mechanisms. The AT-DCAEP exhibits excellent performance in multivariate time series data anomaly detection without the need for pre-labeling large-scale datasets, making it an efficient unsupervised anomaly detection method. We extensively tested the performance of AT-DCAEP on six publicly available datasets, and the results show that compared to current state-of-the-art methods, AT-DCAEP demonstrates superior performance, achieving the optimal balance between anomaly detection performance and computational cost.
Technology, Engineering (General). Civil engineering (General)
Experimental feasibility analysis of quantum/classical coexistence over fibre and free space links
Aristeidis Stathis, Argiris Ntanos, Panagiotis Toumasis
et al.
Abstract The authors present a novel approach to Quantum Key Distribution (QKD) research, emphasising cost‐effectiveness and practicality using a single photon polarisation‐encoded system employing mainly commercial off‐the‐shelf components. This study diverges from previous high‐cost, high‐end setups by exploring the viability of QKD in more accessible and realistic settings. Our approach focuses on practical measurements of the signal‐to‐noise ratio by analysing polarisation‐encoded photonic qubits over various transmission scenarios. The authors introduce a simplified evaluation method that incorporates experimental measurements, such as noise sources and losses, into a semi‐empirical theoretical framework. This framework simulates the standard DS‐BB84 protocol to estimate Secure Key Rates (SKRs), offering an alternative approach on the evaluation of the practical implementation of QKD. Specifically, the authors examine the feasibility of QKD over a 2.2 km intra‐campus fibre link in coexistence scenarios, identifying optimal Wavelength‐Division Multiplexing allocations to minimise Raman noise, achieving an expected SKR of up to 300 bps. Additionally, the authors’ study extends to 40 m indoor and 100 m outdoor Free‐Space Optical (FSO) links using low‐cost components, where the authors recorded Quantum Bit Error Rate (QBER) values below 3.2%, allowing for possible SKRs up to 600 bps even in daylight operation. The converged fibre/FSO scenario demonstrated robust performance, with QBER values below 3.7% and an expected SKR of over 200 bps. Our research bridges the gap between high‐end and economical QKD solutions, providing valuable insights into the feasibility of QKD in everyday scenarios, especially within metropolitan fibre based and FSO links. By leveraging cost‐effective components and a simplified single photon exchange setup, the authors work paves the way for the effortless characterisation of deployed infrastructure, highlighting its potential in diverse settings and its accessibility for widespread implementation.
Attribute-Based Management of Secure Kubernetes Cloud Bursting
Mauro Femminella, Martina Palmucci, Gianluca Reali
et al.
In modern cloud computing, the need for flexible and scalable orchestration of services, combined with robust security measures, is paramount. In this paper, we propose an innovative approach for managing secure cloud bursting in Kubernetes, combining Attribute-Based Encryption (ABE) with Kubernetes labeling. Our model addresses the challenges of complexity, cost, and data protection compliance by leveraging both Kubernetes and ABE. We introduce an attribute-based bursting component that uses Kubernetes labels for orchestration, and an encryption component that employs ABE for data protection. This unified management model ensures data confidentiality while enabling efficient cloud bursting. Our approach combines the strengths of label-based orchestration with fine-grained encryption, providing a technologically advanced yet user-friendly solution for secure cloud bursting. We present a proof-of-concept implementation that demonstrates the feasibility and effectiveness of our model. Our approach offers a unified solution that complies with security and privacy laws while meeting the needs of contemporary cloud-based systems.
Telecommunication, Transportation and communications
A comparative analysis of data preparation algorithms for customer churn prediction: A case study in the telecommunication industry
Kristof Coussement, S. Lessmann, G. Verstraeten
201 sitasi
en
Computer Science
Customer Churn Prediction in Telecommunication Sector using Rough Set Approach
Adnan Amin, S. Anwar, A. Adnan
et al.
A Pure and indistinguishable single-photon source at telecommunication wavelength
Beatrice Da Lio, Carlos Faurby, Xiaoyan Zhou
et al.
On-demand single-photon sources emitting pure and indistinguishable photons at the telecommunication wavelength are a critical asset towards the deployment of fiber-based quantum networks. Indeed, single photons may serve as flying qubits, allowing communication of quantum information over long distances. Self-assembled InAs quantum dots embedded in GaAs constitute an excellent nearly deterministic source of high quality single photons, but the vast majority of sources operate in the 900-950 nm wavelength range, precluding their adoption in a quantum network. Here, we present a quantum frequency conversion scheme for converting single photons from quantum dots to the telecommunication C band, around 1550 nm, achieving 40.8% end-to-end efficiency, while maintaining both high purity and a high degree of indistinguishability during conversion with measured values of $g^{(2)}(0)=2.4\%$ and $V^{\text{corr}}=94.8\%$, respectively.
Identification and evaluation of the effective criteria for detection of congestion in a smart city
Anita Mohanty, Subrat Kumar Mohanty, Bhagyalaxmi Jena
et al.
Abstract The delay in transportation of necessary items is due to traffic congestion throughout the world. This is a serious phenomenon which results in waste of time and fuel. The detection of road conditions and dissemination of traffic information efficiently and effectively is a big challenge to authorities. Recently, the technologies of vehicular ad hoc networks (VANETs) have been utilized and become an important part of the intelligent transportation system (ITS). For this existing problem, vehicle‐to‐vehicle (V2V) communication provides a means for cooperation and route management in transport networks. This paper proposed a novel congestion detection system based on the combination of k‐means clustering and analytical hierarchy process. In the simulation of urban mobility (SUMO) simulator, a transport network is created and parameters of vehicles facing congestion are taken to extract the key parameter by using the k‐means clustering technique and mathematical mean algorithm. This parameter is utilized in analytical hierarchy process to detect the highest priorities parameter and based on that the congestion is detected in particular lane. The result can be a better technique for congestion detection as it requires low installation cost and can be incorporate in vehicles for congestion avoidance which will alternatively improve the traffic flow.
Self-Matrix N-Doped Room Temperature Phosphorescent Carbon Dots Triggered by Visible and Ultraviolet Light Dual Modes
Huiyong Wang, Hongmei Yu, Ayman AL-Zubi
et al.
The synthesis of room temperature phosphorescent carbon dots (RTP-CDs) without any matrix is important in various applications. In particular, RTP-CDs with dual modes of excitation are more interesting. Here, we successfully synthesized matrix-free carbonized polymer dots (CPDs) that can generate green RTP under visible and ultraviolet light dual-mode excitation. Using acrylic acid (AA) and ammonium oxalate as precursors, a simple one-pot hydrothermal method was selected to prepare AA-CPDs. Here, acrylic acid is easy to polymerize under high temperature and high pressure, which makes AA-CPDs form a dense cross-linked internal structure. Ammonium oxalate as a nitrogen source can form amino groups during the reaction, which reacts with a large number of pendant carboxyl groups on the polymer chains to further form a cross-linked structure. The carboxyl and amino groups on the surface of AA-CPDs are connected by intermolecular hydrogen bonds. These hydrogen bonds can provide space protection (isolation of oxygen) around the AA-CPDs phosphor, which can stably excite the triplet state. This self-matrix structure effectively inhibits the non-radiative transition by blocking the intramolecular motion of CPDs. Under the excitation of WLED and 365 nm ultraviolet light, AA-CPDs exhibit the phosphorescence emission at 464 nm and 476 nm, respectively. The naked-eye observation exceeds 5 s and 10 s, respectively, and the average lifetime at 365 nm excitation wavelength is as long as 412.03 ms. In addition, it successfully proved the potential application of AA-CPDs in image anti-counterfeiting.
An overview of the reliability metrics for power grids and telecommunication networks
Yanfu Li, Chuanzhou Jia
29 sitasi
en
Computer Science
Telecommunication devices use, screen time and sleep in adolescents
Alba Cabré-Riera, M. Torrent, David Donaire-Gonzalez
et al.
Purpose: To investigate the association between telecommunication and other screen devices use and subjective and objective sleep measures in adolescents at 17–18 years. Methods: Cross‐sectional study on adolescents aged 17–18 years from a Spanish population‐based birth cohort established in Menorca in 1997–1998. Information on devices use was collected using self‐reported questionnaires. Mobile Phone Problematic Use Scale was used to assess mobile phone use dependency. Pittsburgh Sleep Quality Index was used to assess subjective sleep (n = 226). ActiGraph wGT3X‐BT for 7 nights was used to assess objective sleep (n = 110). Results: One or more cordless phone calls/week was associated with a lower sleep quality [Prevalence Ratio (PR) 1.30 (95%Confidence Interval (CI) 1.04; 1.62)]. Habitual and frequent problematic mobile phone use was associated with a lower sleep quality [PR 1.55 (95%CI 1.03; 2.33) and PR 1.67 (95%CI 1.09; 2.56), respectively]. Higher tablet use was associated with decreased sleep efficiency and increased minutes of wake time after sleep onset [&bgr;‐1.15 (95%CI −1.99; −0.31) and &bgr; 7.00 (95%CI 2.40; 11.60) per increase of 10 min/day of use, respectively]. No associations were found between other devices and sleep measures. Conclusions: Frequency of cordless phone calls, mobile phone dependency, and tablet use were related to an increase of subjective and objective sleep problems in adolescents. These results seem to indicate that sleep displacement, mental arousal, and exposure to blue light screen emission might play a more important role on sleep than a high RF‐EMF exposure to the brain. However, more studies are needed assessing personal RF‐EMF levels to draw conclusions. HighlightsTelecommunication and other screen devices use was collected in adolescents.Both subjective and objective sleep measures were assessed.Tablet use and mobile phone dependency were associated with poorer sleep.Frequency of cordless phone calls was associated with poorer sleep.Public health recommendations on telecommunication devices use should be a priority.
Activities of the local government units in the scope of telecommunication
M. Karpiuk
The public sphere which is the closest to the inhabitants is managed by the local government. The legislator entrusted this local government with a number of tasks that should certainly be defined as basic from the point of view of the local and regional communities. These tasks having the nature of a public interest include also tasks related to telecommunication. The local government units as entities financed to a large extent from the public funds could abuse their market position by competing with telecommunication companies, therefore, they were obliged by the legislator to comply with the rules of the market game, including fair competition. They cannot, therefore, abuse their position in the scope of telecommunication activities or in the case of developing telecommunication infrastructure or sharing it with others.
Blockchain for 5G: A Prelude to Future Telecommunication
G. Praveen, V. Chamola, Vikas Hassija
et al.
5G and Blockchain are potentially revolutionizing future technologies. 5G promises high rates and QoS to the users and blockchain guarantees a high level of trust and security among the peers. Applications that would be using 5G have varying needs in terms of speed, bandwidth, latency and various other factors. Augmented reality, self-driving vehicles and other ioT applications tend to use 5G for reliable and fast communication. To work seamlessly and securely in such scenarios a more specialized and efficient approach would be required. in this article, we have identified the specific areas where blockchain could be utilized to enhance the security and privacy of the 5G services offered to the users. The current challenges faced in deployment and upliftment of 5G and their related solutions based on blockchain are discussed. A model for Multi-Operator Network Slicing in 5G using blockchain is also presented along with 5G blockchain implementation.
58 sitasi
en
Computer Science
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods
Adnan Amin, B. Shah, A. Khattak
et al.
Abstract Cross-Company Churn Prediction (CCCP) is a domain of research where one company (target) is lacking enough data and can use data from another company (source) to predict customer churn successfully. To support CCCP, the cross-company data is usually transformed to a set of similar normal distribution of target company data prior to building a CCCP model. However, it is still unclear which data transformation method is most effective in CCCP. Also, the impact of data transformation methods on CCCP model performance using different classifiers have not been comprehensively explored in the telecommunication sector. In this study, we devised a model for CCCP using data transformation methods (i.e., log, z-score, rank and box-cox) and presented not only an extensive comparison to validate the impact of these transformation methods in CCCP, but also evaluated the performance of underlying baseline classifiers (i.e., Naive Bayes (NB), K-Nearest Neighbour (KNN), Gradient Boosted Tree (GBT), Single Rule Induction (SRI) and Deep learner Neural net (DP)) for customer churn prediction in telecommunication sector using the above mentioned data transformation methods. We performed experiments on publicly available datasets related to the telecommunication sector. The results demonstrated that most of the data transformation methods (e.g., log, rank, and box-cox) improve the performance of CCCP significantly. However, the Z-Score data transformation method could not achieve better results as compared to the rest of the data transformation methods in this study. Moreover, it is also investigated that the CCCP model based on NB outperform on transformed data and DP, KNN and GBT performed on the average, while SRI classifier did not show significant results in term of the commonly used evaluation measures (i.e., probability of detection, probability of false alarm, area under the curve and g-mean).
85 sitasi
en
Computer Science
Nexus between telecommunication infrastructures, economic growth and development in Africa: Panel vector autoregression (P-VAR) analysis
O. O. David
This study examines the causal-effect relationship between telecommunication infrastructures, economic growth and development in selected African countries. It further estimates the trivariate impacts of telecommunication infrastructures, economic growth and development in the region. The analysis considers a panel of forty-six African countries from 2000 to 2015. To measure economic growth, real gross domestic product serves as the proxy, while economic development is measured by the Human Development Index, and telecommunication infrastructures by a composite index of telecommunication computed from mobile line, fixed line and internet access penetration via principal component analysis (PCA). The empirical results suggest the existence of a bidirectional long-run relationship between telecommunication infrastructures, economic growth and development. The causality tests reveal that there is feedback causality between telecommunication infrastructures, economic growth and development. Telecommunication infrastructures promote economic growth and development in Africa and vice versa. Thus, there is need to promote inclusive and holistic policies that will enhance digital provide, economic growth and development simultaneously in Africa. An increase in telecommunication infrastructures will encourage aggregate output and standard of living to move in the same direction in Africa.
A MoSe2/WSe2 Heterojunction‐Based Photodetector at Telecommunication Wavelengths
Hui Xue, Yadong Wang, Yunyun Dai
et al.
van der Waals (vdW) heterojunctions enable arbitrary combinations of different layered semiconductors with unique band structures, offering distinctive band engineering for photonic and optoelectronic devices with new functionalities and superior performance. Here, an interlayer photoresponse of a few‐layer MoSe2/WSe2 vdW heterojunction is reported. With proper electrical gating and bias, the heterojunction exhibits high‐sensitivity photodetection with the operation wavelength extended up to the telecommunication band (i.e. 1550 nm). The photoresponsivity and normalized photocurrent‐to‐dark current ratio reach up to 127 mA W−1 and 1.9 × 104 mW−1, respectively. The results not only provide a promising solution to realize high‐performance vdW telecommunication band photodetectors, but also pave the way for using sub‐bandgap engineering of two‐dimensional layered materials for photonic and optoelectronic applications.
115 sitasi
en
Materials Science
Antiresonant Hollow Core Fibre with 0.65 dB/km Attenuation across the C and L Telecommunication Bands
T. Bradley, G. Jasion, J. Hayes
et al.
We report a hollow core Nested Antiresonant Nodeless Fibre (NANF) with a loss of 0.65dB/km across the full C and L telecommunication bands. The fabricated fibre is 1.23km long, it is effectively single moded over sufficiently long lengths, and is able to transmit data.
81 sitasi
en
Materials Science