Welcome to Francis Academic Press

The Frontiers of Society, Science and Technology, 2023, 5(15); doi: 10.25236/FSST.2023.051502.

Thinking on the integration of 5G and industrial applications

Author(s)

Shaofei Zhang

Corresponding Author:
Shaofei Zhang
Affiliation(s)

Yanbian University, Yanji City, Jilin Province, 136200, China

Abstract

With the rapid development of 5G technology, new breakthroughs have been made in artificial intelligence, Internet of Things, cloud computing and other fields, and new development opportunities have also been brought to industries such as medical and industrial manufacturing. This article discusses the thinking of 5G and industrial convergence applications. 5G technology has great potential in the field of industrial manufacturing, but there are also challenges such as the need to strengthen the digital transformation of industrial infrastructure, equipment compatibility and standardization, and the lack of effective demand-pull power. Solving these challenges requires the joint efforts of all parties to promote the development of 5G in the industrial field and achieve intelligent and digital transformation.

Keywords

5G technology; industrial convergence; Challenge; development

Cite This Paper

Shaofei Zhang. Thinking on the integration of 5G and industrial applications. The Frontiers of Society, Science and Technology (2023) Vol. 5, Issue 15: 6-11. https://doi.org/10.25236/FSST.2023.051502.

References

[1] Lou Li, Fan Jianhua, Hu Yongyang, Li Ran, “Military Ad Hoc Network Hierarchical Architecture and Security Protocol” [J]. Computer Engineering, 2022, 09(4): 7-8. 

[2] Jin Linqiao, Zhu Peijie, Li Shubin. Research on 5G communication technology under the situation of Internet of Things [J]. New Industrialization, 2021, 11(3):87-89. 

[3] Amponis G, et al. Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications, EURASIP J Wireless Commun Networking, 2019(6):50-53.

[4] Xiang Hongyu, Xiao Yangwen, Zhang Xian, et al. 5G edge computing and network slicing technology [J]. Telecommunications Science, 2017, 33(6):54-63. 

[5] Chen Jun, Li Hao. 5G edge computing patent data analysis [J]. New Industrialization, 2020, 10(6): 93-94, 97. 

[6] Paul Harrigan, Timothy M. Daly, Kristof Coussement, Julie A. Lee, Geoffrey N. Soutar, Uwana Evers, Identifying influencers on social media[J]. International Journal of Information Management. 2021, 11(7):83-84, 87. 

[7] Sonal Purohit, Justin Paul, Rikee Mishra, Rethinking the bottom of the pyramid: Towards a new marketing mix [J]. Journal of Retailing and Consumer Services. 2022, 01(6):13-14. 

[8] Eunyoung (Christine) Sung. The effects of augmented reality mobile app advertising: Viral marketing via shared social experience[J]. Journal of Business Research. 2018, 30(5):57-63. 

[9] Arora A, Belenzon S, Patacconi A. The decline of science in corporate R&D[J]. Strategic Management Journal, 2018, 39(1): 3-32. 

[10] Kalaignanam Kartik, Tuli Kapil R., Kushwaha Tarun, Lee Leonard, Gal David. Marketing Agility: The Concept, Antecedents, and a Research Agenda[J]. Journal of Marketing. 2020, 09(4):12-14.

[11] Li Chen, Swaminathan Srinivasan, Kim Junhee. The role of marketing channels in consumers’ promotional point redemption decisions[J]. Journal of Business Research. 2019, 09(9):19-20.

[12] Seo HaeJin, Song Tae Ho. The differential motivation and context effects of cause-related marketing in the hotel industry: The moderating role of consumption value [J]. International Journal of Hospitality Management. 2019, 09(1):12-13.

[13] Tang Tanya (Ya), Zhang Shaoling (Katee), Peng Jianping. The value of marketing innovation: Market-driven versus market-driving[J]. Journal of Business Research. 2016, 09(18):12-13.

[14] Mandler Timo, Sezen Burcu, Chen Jieke, Özsomer Ayşegül.  Performance consequences of marketing standardization/adaptation: A systematic literature review and future research agenda[J]. Journal of Business Research. 2014, 311(6):47-53. 

[15] Ahanger T. A. et al. Internet of things: A comprehensive study of security issues and defense mechanisms IEEE Access. 2019, 20 (4):17-20. 

[16] Hong Tao, Zhu Yueqin, Guo Yanjun, Jiao Shoutao, Qiang Weifan, Gao Zhenji. Research on Interactive Geological Scene Model Construction Method Based on XR Technology[J]. Geological bulletin 2020, 21 (5):15-20. 

[17] Boon W, Edler J. Demand, challenges, and innovation. Making sense of new trends in innovation policy[J]. Science and Public Policy, 2018, 45(4): 435-447.

[18] Wang Yafeng, Liang Chunhua, Zhu Lanlan, Wang Xiaoping. Research on private network solution for 5G banking industry[J]. Telecommunications Science. 2020, 21 (2):25-30.

[19] Zhang Junming, Wang Junyi, Peng Jie, Li Ran. Research on green unloading and processing scheme for multiple applications[J]. Radio Engineering. 2022, 21 (5):35-40. 

[20] Song Xin. Research on expansion scheme of Shuohuang railway data center[J]. Railway Transport and Economy, 2017, 21 (5):15-20. 

[21] Tang Xiaojun, Sun Chun, Zhao Zhenqing, Zhou Min, Ma Junqi, Zhou Enyu, Wang Jianfeng, He Hui. Key technical challenges of optical communication in the next 10 years [J]. Optical communication technology. 2018, 21 (6):9-14.

[22] Fang Min, Duan Xiangyang, Hu Liujun. 6G Technology Challenges, Innovation and Prospects [J]. ZTE Technology. 2016, 21 (8):15-20.

[23] Liu Zheming, Wu Yunfei, Wei Xiao, Zhang Jing, Lu Zhou. Application scenarios, architecture and key technical challenges of 6G satellite-ground converged network[J]. Radiocommunication technology. 2019, 25 (9): 7-11. 

[24] Guo Feng, Ji Yenan, Huang Xiaoyi. EU Strategy and Practice of 5G Network Security [J]. Telecommunications Science. 2021, 23 (2): 2-6. 

[25] Dodgson M, Hughes A, Foster J, et al. Systems thinking, market failure, and the development of innovation policy: The case of Australia[J]. Research Policy, 2011, 40(9): 1145-1156. 

[26] Yang Hongyu, Han Yue. A Wireless Mesh Network Security Routing Mechanism Based on Dynamic Reputation [J]. Journal on Communications. 2021, 3 (2): 11-16. 

[27] John Didada, Network security performance analysis of TSR untrusted relay on Nakagami-m channel [J]. Stone Club, Computer Engineering and Applications. 2021, 3 (2): 21-26. 

[28] Feng Youhong, Li Qiqi, Yang Zhi. Network Security Performance Analysis of Collaborative Relay Based on NOMA[J]. Radiocommunication technology. 2020, 4 (1): 31-36. 

[29] Wang Sai'e, Liu Caixia, Liu Shuxin, Bai Yi. A 4G Network Security Risk Assessment Method Based on Attack Tree [J]. Computer Engineering. 2022, 12 (1): 11-12. 

[30] Yu Changhong, Lu Ya, Wang Haixin, Traffic Classification Algorithm for IoT Devices Based on Sliding Time Window [J]. Brilliant. Computer Engineering. 2021, 5 (11): 39-45. 

[31] Du Wenjie. Adaptive Key Extraction Method for Wireless Network Based on Received Signal Strength [J]. Journal of North University of China (Natural Science Edition), 2022(01): 41-45. 

[32] Zhang Wenbo, Huang Wenhua, Feng Jingyu. Network Security Communication Mechanism of Connected Vehicles Based on Certificateless Signing [J]. Journal on Communications. 2021(06): 1-5.