Please wait a minute...

Current Issue

    15 March 2015, Volume 31 Issue 3
    Topics: terminal and the smart card technology
    Analysis of Intelligent Pipeline Perception Technology Based on Terminal
    Binfeng Yan,Hui Dong,Yuhua Hou
    2015, 31(3):  1-7.  doi:10.11959/j.issn.1000-0801.2015078
    Asbtract ( 277 )   HTML ( 2)   PDF (1293KB) ( 524 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The background of the intelligent pipeline was briefly introduced,the multidimensional perception technology of intelligent pipeline was analyzed,the perception technology based on terminal was focused on,the corresponding solutions were put forward,that these solutions would be beneficial to realize the intelligent pipeline and finally the difficulties and challenges of these solutions were analyzed.It has carried on the beneficial exploration for the further technology research and practical deployment of the intelligent pipeline.

    Security Problems and Solutions of Smart Terminal Mobile Operating System
    Yuhua Hou,Xiaolong Zhou
    2015, 31(3):  8-12.  doi:10.11959/j.issn.1000-0801.2015077
    Asbtract ( 308 )   HTML ( 2)   PDF (1181KB) ( 787 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The present situation of the smart terminal operating system security was described.The security problem of the existing operating system and the present status of research and development of domestic independent operating system were analyzed.Solution of the security reinforcement based on domestic TIOS,which reinforces kernel,system support library,GUI,application framework of TIOS,was discussed.The nine basic safety application programming were introduced.Finally,security requirements of different users and different security level of operating system were proposed.It provides reference for the development of all types of secure mobile phone.

    Existing Voice Solutions and Evolution for LTE Terminal
    Jing Zhou,Yu Shi
    2015, 31(3):  13-21.  doi:10.11959/j.issn.1000-0801.2015074
    Asbtract ( 259 )   HTML ( 0)   PDF (3114KB) ( 874 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the final voice solution for LTE,VoLTE has become the key research point of the industry.Several existing voice solutions of LTE user equipment were compared and analyzed in details.Technical advantages and unsolved problems of VoLTE which is based on pure PS network and IMS system were mainly discussed from the prospective of the LTE terminal.The technical characteristics and evolution direction of VoLTE were mentioned in the end.

    Key Technology and Application of Next-Generation UICC with Remote Management Capability
    Ling Han,Minxia Gu,Binfeng Yan,Wei Kuang
    2015, 31(3):  28-35.  doi:10.11959/j.issn.1000-0801.2015069
    Asbtract ( 300 )   HTML ( 1)   PDF (2397KB) ( 877 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Supporting remote management will be one of the key technologies of next-generation UICC.The relative research developments of remote management of UICC were introduced.The key technology of eUICC with remote management capability was analyzed.The service model,scenes and business model of UICC were discussed.Finally,a feasible service architecture based on operator's network architecture and typical business requirements was proposed.The architecture provides an exploration and practice for further study and large-scale commercial of UICC with remote management capability.

    Research on NFC End-to-End Compatibility Test
    Yiwei Gao,Yu Sun
    2015, 31(3):  36-41.  doi:10.11959/j.issn.1000-0801.2015079
    Asbtract ( 352 )   HTML ( 9)   PDF (1281KB) ( 415 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    NFC has a long industry chain with many manufacturers involved in,which brings a significant challenge to the compatibility.Four testing methods were presented to improve the compatibility of NFC terminals and POS terminals.These testing methods include more rigorous conformance testing method,instrument compatibility testing method,R/W compatibility testing method and POS compatibility testing method.Industry participants can use one or more of these four methods to improve NFC end-to-end compatibility based on their own needs,which can help optimize the NFC mobile pay environment.

    Technology and Application of High-Capacity USIM Card
    Shuanghe Dong,Binfeng Yan,Bo Hu,Xiaohua Guo
    2015, 31(3):  42-47.  doi:10.11959/j.issn.1000-0801.2015075
    Asbtract ( 365 )   HTML ( 4)   PDF (1343KB) ( 552 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Abstract: A new high-capacity USIM card was introduced and discussed in detail and depth. Its key technology (IC-USB interface, integrated NAND flash chips)was introduced. Compared to traditional SIM card, the high-capacity USIM card has higher transmission rates, larger storage space, and data security storage. The structure and functions of supporting client and management platform were discussed. The influence of this technology may have caused was analyzed.Appropriate suggestions and plantings to the future of business model and application scenario were given.

    Ressearch and development
    Research on Energy Saving Algorithm of 5G Relay Cellular Network
    Yangbo Guo,Zhizhong Zhang,Haonan Hu,Fang Cheng
    2015, 31(3):  48-53.  doi:10.11959/j.issn.1000-0801.2015052
    Asbtract ( 388 )   HTML ( 11)   PDF (2045KB) ( 306 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The energy saving issue of 5G relay cellular network was discussed.Relay technology is an important technology in the fifth generation mobile communication network(5G).By switching some base stations with low traffic into sleep mode,the energy can be saved.Therefore,the state of base stations in 5G may convert usually,the network topology and business changed over time.Considering both quality of service(QoS)and power consumption of the whole network,a dynamic energy saving(DES)algorithm was proposed to optimize the overall performance of QoS and energy efficiency for 5G relay cellular network.Simulation results under different traffic conditions demonstrate that the DES algorithm can reconfigure the network,shut down part of the base station and relay nodes to significantly reduce energy consumption,especially when the network load is low.

    Hybrid CoMP Mode Selection Algorithm Based on Pure User
    Jihong Zhao,Xiaoting Ding,Wei Wang,Hua Qu
    2015, 31(3):  54-60.  doi:10.11959/j.issn.1000-0801.2015065
    Asbtract ( 188 )   HTML ( 2)   PDF (2857KB) ( 302 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    CoMP-JP and CoMP-CB are two transmission modes for coordinated multi-point and have different gains incapacity requirements and improving the system performance. Aimed at the backhaul capacity shortage, a hybrid CoMPmode selection algorithm was proposed under the traditional transmission mode selection based on the user’s group. The algorithm selects the optimal transmission mode for individual user. It can be full use of the backhaul capacity and achieve the maximal system throughput. Simulation results show that the proposed algorithm enhanced the system performance under the limited backhaul capacity at a large extent, and with the increase of users, the higher performance gain.

    Research on Radio Network Intelligent Frequency Selection Technology Based on an Adaptive Genetic Algorithm
    Wenjun Wang
    2015, 31(3):  61-66.  doi:10.11959/j.issn.1000-0801.2015056
    Asbtract ( 215 )   HTML ( 3)   PDF (3088KB) ( 283 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of selecting frequency more and more difficultly for radio network,an intelligent frequency selection technology based on an adaptive genetic algorithm was proposed.Frequencies were selected for whole radio network from the perspective of intelligent optimization.On the basis of the standard genetic algorithm,this novel method improved genetic operators,and the preservation of the optimal individual algorithm to ensure the diversity of the population was introduced.Therefore,the arithmetic which did well in avoiding some deficiencies of the traditional frequency selection algorithm prevented local optimization and ran into overall optimization ultimately.Theoretical analysis and simulation results show that the new algorithm in solving the problem of frequency selection for large-scale network has higher efficiency and precision than the traditional algorithm,and stability is significantly enhanced.

    Adversarial Drift Detection in Intrusion Detection System
    Yaguan Qian,Xiaohui Guan
    2015, 31(3):  67-73.  doi:10.11959/j.issn.1000-0801.2015058
    Asbtract ( 252 )   HTML ( 2)   PDF (2539KB) ( 684 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The recent intrusion detection systems based on machine learning generally assume that the intrusion traffic always satisfies stationary of statistics.However,this assumption is not always held when adversaries arbitrarily alter the distribution of traffic data,or develop new attack techniques,which may reduce the detection rate.To overcome this adversarial drift,a novel drift detection approach based on weighted Rényi distance was suggested.The experiment on KDD Cup99 shows that the weighted Rényi distance is able to perfectly detect the adversarial drift,and improve the intrusion detection rate by retraining the model.

    Resource Allocation for Two-Way Relay Network Based on Cognitive Radio
    Shuang Liang,Shouyi Yang,Wanming Hao
    2015, 31(3):  74-82.  doi:10.11959/j.issn.1000-0801.2015061
    Asbtract ( 207 )   HTML ( 2)   PDF (4450KB) ( 401 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The resource allocation issue for sensing-based spectrum opportunistic access and sensing-based spectrum sharing access in two-way relay cognitive network with imperfect spectrum sensing was discussed.Different from the traditional resource allocation methods for two-way relay network,new algorithm jointly considering sensing time and transmission power in secondary system.Under the condition of the sensing time and the transmission power,the maximal throughput of the secondary system can be obtained.To protect the primary user effectively from interference,the average interference power constraint in each hop was considered.The total transmission power constraint of the secondary system is also considered.The proposed algorithms can acquire the optimal sensing time and power allocation under imperfect spectrum sensing for the sensing-based spectrum opportunistic access and sensing-based spectrum sharing access.Finally,the performance of the two schemes was compared and the effectiveness of the proposed algorithm was verified.

    A Two-Step Compressed Spectrum Sensing Scheme for Wideband Cognitive Radio
    Shengnan Yan
    2015, 31(3):  83-88.  doi:10.11959/j.issn.1000-0801.2015064
    Asbtract ( 203 )   HTML ( 5)   PDF (1705KB) ( 329 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A two-step compressed spectrum sensing scheme for wideband cognitive radio was proposed in order to reduce the huge data transmission overhead of the traditional DCS scheme.The CS reconstruction of this scheme was divided into two steps,i.e.the information fusion for the support set and the joint recovery of multiple signals,and the prior information obtained from the former step can guide the joint recovery of the latter step.Simulation results show that this scheme can achieve better performance than the traditional DCS scheme as long as 50% of users are involved in the joint recovery,which means that this scheme can reduce the data transmission overhead and save energy consumed greatly.

    Research on Smart Scaling Mechanism and Structure for Big Data Network Server Groups
    Hongyao Ju
    2015, 31(3):  89-97.  doi:10.11959/j.issn.1000-0801.2015073
    Asbtract ( 237 )   HTML ( 0)   PDF (2456KB) ( 596 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The principle and construction of the structure of smart telescopic on big data network server groups were elaborated.The key technologies involved in the smart scaling of big data network server groups were discussed.After investigating key technologies,including the monitoring of the workload of the server group,the smart control of the number of servers,and the scheduling of access loads,the principle and realization method for the smart scaling of big data network server groups were proposed and technical supports were provided for the smart scaling and effective energy conservation of big data network server groups.According to the proposed construction method and key technologies,a smart scaling model for big data network server groups was provided as well.

    Variable Transmission Range Routing Protocol Based on Vehicle Density in VANET
    Rong Cai,Guoan Zhang,Yuebo Wu
    2015, 31(3):  98-103.  doi:10.11959/j.issn.1000-0801.2015067
    Asbtract ( 217 )   HTML ( 1)   PDF (1823KB) ( 433 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of unstable connectivity and high bit error rate,which are caused by rapid changes in the density of vehicles on the road,while the transmission radius remained unchanged,a variable transmission range routing protocols based on vehicle density in vehicular Ad-Hoc network was proposed.According to different vehicle density,node could adjust the farthest transmission distance and reduce the transmission latency of the message,which could ensure high connection probability of the network.Based on homogeneous poisson point process model,the change conditions of transmission range with different vehicle density were deduced,and its feasible was proved.Furthermore,mathematical calculate formula of average latency was obtained according to the theoretical analysis.At last,variable transmission range routing protocol based on vehicle density and fixed transmission range routing protocol were compared by simulation.The simulated results show that the proposed protocol can be applied in actual environments,and the message can be transmitted fast from source node to destination node under the condition of high connection probability.

    A Discriminatory Channel Estimation Scheme Based on the Aid of Friendly Jammer
    Rong Zhang,Xianzhong Xie,Weijia Lei
    2015, 31(3):  104-108.  doi:10.11959/j.issn.1000-0801.2015072
    Asbtract ( 245 )   HTML ( 0)   PDF (1413KB) ( 344 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the physical layer security,that inhibiting the accuracy of channel estimation at eavesdropper can indirectly enhance the received signal quality difference between the legitimate receiver and the eavesdropper,thus improving signal transmission security.The proposed discriminatory channel estimation scheme was based on the help of friendly jammer,which was based on artificial noise emitted by friendly jammer to interfere the channel estimation process of the eavesdropper.Further,the optimal power allocation was given between training sequence and artificial noise by maximizing the channel estimation error of the eavesdropper,which can suppress the channel estimation quality of the eavesdropper more effectively.Simulation results show that this method can effectively restrain the channel estimation performance of the eavesdropper,and it can improve the received signal quality gap between the legitimate receiver and the eavesdropper.

    Channel Assignment Strategy Based on the Sustained-Transmission Rule of Nodes in Cognitive Radio Sensor Network
    Xinbin Li,Zequn Huang,Song Han,Jianmei Chen
    2015, 31(3):  109-114.  doi:10.11959/j.issn.1000-0801.2015062
    Asbtract ( 207 )   HTML ( 0)   PDF (1732KB) ( 358 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the success rate of data packet transmission in heterogeneous and hierarchical cognitive radio sensor network,the nodes were divided into sustained-transmission and non-sustained-transmission conditions.The ways of improving the success rate of data packet transmission are more energy consumption and better channel assignment,so that there is a type of centralized channel assignment strategies.At the same time,in order to reduce the energy consumption per bit in information transmission process of nodes,the packet size adaptation mechanism was optimized,ensuring the optimal packet size of non-sustained-transmission nodes.Simulation results demonstrate that the channel assignment strategy and the optimization mechanism improve the efficiency of energy utilization and the performance of network.

    summarize
    Study on Pattern Matching in Network Security
    Dongliang Xu,Hongli Zhang,Lei Zhang,Chongchong Yao
    2015, 31(3):  115-123.  doi:10.11959/j.issn.1000-0801.2015068
    Asbtract ( 243 )   HTML ( 1)   PDF (1547KB) ( 759 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Pattern matching is the core module in network security system,it's the highest occupancy rate of system resources is more than 70%.According to problem and challenges of pattern matching in the network security system,taking 2000 as the boundary,the pattern matching was divided into the traditional pattern matching method and the new pattern matching method.Through the analysis of the principle and the computational complexity of different pattern matching method and the development and evolution of the new pattern matching method,applicable environment of different methods was concluded.A comprehensive review and evaluation of pattern matching in network security system was presented.Finally,a conclusion and some suggestions for future research were summarized and prospected.

    Electric power information column
    Active Operation and Maintenance Platform for Information System Based on User Experience
    Shun Wu,Dawei Xu,Zheng Wei,Chengchen Hu,Wanhong Xiang,Qian Guo,Yazhe Tang
    2015, 31(3):  124-129.  doi:10.11959/j.issn.1000-0801.2015059
    Asbtract ( 198 )   HTML ( 0)   PDF (1496KB) ( 600 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The traditional monitoring maintenance system only watches the running metrics.However,these metrics is not sufficient to reflect the status of the whole system for fine-grained monitoring of the system at users and application level.An active operation and maintenance platform based on user experiences was proposed.Through the mining of big network data,the platform can recognize a variety of user behaviors,and measure the user experience time along with the system performance at user's level.Tests and experiments show that the platform works well with large throughput and low memory occupation.The application level performance monitoring,which provides an efficient way to improve user experience,was realized.

    Communication System for Electric Energy Data Acquisition System of SGWM-Based 230 MHz Wireless Broadband Communications Key Technology
    Lijun Dong,Qian Zhang,Enguo Zhu,Xuan Liu
    2015, 31(3):  130-135.  doi:10.11959/j.issn.1000-0801.2015080
    Asbtract ( 185 )   HTML ( 0)   PDF (1090KB) ( 420 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Electric energy data acquisition system is an important part of smart grid.Against the problem of the communication way of the 230 MHz wireless private network in the electric energy data acquisition system,low communication rate,fewer access points,low acquisition success rate,poor real-time performance,the technical proposal of the SGWM-based 230 MHz wireless broadband communications key technology of the communication system for the electric energy data acquisition system was proposed.The communication network technologies,such as the carrier aggregation technology,smart routing technology,networking technology,were discussed.The SGWM wireless communications technology in the electric energy data acquisition system was elaborated.By designing and analyzing networking scheme,the result indicates that the field application effect of the SGWM-based 230 MHz wireless broadband communications key technology in the electric energy data acquisition system is very good.Thus it provided technical support for the propel of the information bidirectional interaction and construction of the strong smart grid.

    Trust-Based Cooperative Spectrum Sensing Algorithm in Power Dedicated Network
    Jinping Cao,Wei Li,Yiying Zhang
    2015, 31(3):  136-141.  doi:10.11959/j.issn.1000-0801.2015082
    Asbtract ( 208 )   HTML ( 0)   PDF (1296KB) ( 344 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To fulfill the communication needs of smart distribution and utilization system,a novel power dedicated network has been developed.The system faces a problem that it may operate coexisted with a 230 data transceiver system.In order to keep the two systems operating stably and efficiently at the same time,a trust-based cooperative spectrum sensing algorithm was presented.According to the characteristics of user behavior,cognitive radio users were classified into fiduciary users,lapsed users and malicious users.By analyzing the relationship among detection result,credibility of cognitive radio users and communication channel signal-to-noise ratio,the credibility weight of cognitive radio users was given,and a trust-based cooperative spectrum sensing algorithm was proposed.The simulation results show that the algorithm improves detection performance effectively.

    Resource Scheduling for Cloud Data Center Based on Data Mining in Smart Grid
    Songtao Peng
    2015, 31(3):  142-147.  doi:10.11959/j.issn.1000-0801.2015084
    Asbtract ( 266 )   HTML ( 2)   PDF (1911KB) ( 540 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Since the wide use of virtual technology,the resource use rate in cloud data center has been improved effectively than ever before.However,there is still a large space for improvement due to the resources usually are pre-started and pre-allocated by the user demand rather than the actual needs.In order to allocate available resource more accurately,two algorithms were proposed to meet the needs of the daily use in most of time.The available virtual resources would be arranged according the forecast using the algorithms of hierarchical composition of loading and the peek resources needs would be dynamic allocated using the algorithms of stochastic equilibrium and queuing theory.The results of experiment via the system based upon above theories show that the solution provides a kind of very effective advanced means for the optimal use of resources and energy saves.

    An Effective Method to Evaluate the Planning Achievements of Electric Power Communication Network
    Jing Zhou,Guojun Liu
    2015, 31(3):  148-152.  doi:10.11959/j.issn.1000-0801.2015083
    Asbtract ( 200 )   HTML ( 0)   PDF (1159KB) ( 436 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Electric power communication network is an important support platform of electric power grid,and its development level is closely with the latter.An evaluation method of the adaptability of electric power communication network and the power grid was put forward.With grey relational analysis method and based on the statistical data,the rule between each area communication network construction scale and grid development level was revealed.It is a meaningful research on evaluating the development of electric power communication network and its investment.

    Research and Implementation of Quality Management System for ERP System
    Shuo Shan,Guanxun Guo,Jing Mai
    2015, 31(3):  153-158.  doi:10.11959/j.issn.1000-0801.2015070
    Asbtract ( 271 )   HTML ( 2)   PDF (2126KB) ( 817 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The applications and business of CGN ERP system is in-depth expansion.The critical path and advantages of ITIL,ISO20000,CMMI and other standard system were analyzed.CGN ERP quality management system was implemented.It runs ERP systems as the thinking of running power station.The nuclear safety culture was blended into the quality level and process control of system.Through the successful implementation of quality management system,to protect the ERP system is in safe and stable operation,to ensure the core business processes are in the continuation and development,to bring the information values to the users.

    Discussion on Integration of Data Warehouse and Big Data
    Juan Yu
    2015, 31(3):  159-163.  doi:10.11959/j.issn.1000-0801.2015066
    Asbtract ( 347 )   HTML ( 23)   PDF (1754KB) ( 1561 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the traditional enterprise couldn't use such unstructured data efficiently,a big data solutions based on integration of data warehouse and big data was discussed.Based on the theory of data warehouse construction and architecture of the next-generation EDW,Hadoop was used to collection,processing and storage for unstructured data.By big data technology work together with traditional data warehouse and BI,to help enterprises to solve difficulties that applied.Integration of data warehouse and big data can resolve the difficulty on data processing and promote the implementation of big data projects.

    Research on Energy Saving Algorithm of 5G Relay Cellular Network
    Guo Yangbo,Zhang Zhizhong,Hu Haonan and Cheng Fang
    2015, 31(3):  2015052. 
    Asbtract ( 663 )   Knowledge map   
    Related Articles | Metrics
    Aiming at energy saving for of 5G relay cellular network. Relay technology is an important technology in the fifth generation mobile communication network (5G). By switching some base stations with low traffic into sleep mode for energy saving in 5G. Therefore, the state of base stations in 5G may convert usually, the network topology changes over time and the change of business. Considering both quality of service (QoS) and power consumption of the whole network, a dynamic energy saving (DES) algorithm was proposed to optimize the overall performance of QoS and energy efficiency for 5G relay cellular network. Simulation results under different traffic conditions demonstrate that the DES algorithm can reconfigure the network, shut down part of the base station and relay nodes to significantly reduce energy consumption, especially when the network load is low.


    论文引用格式:郭杨波,张治中,胡昊南等.关于5G中继技术的节能算法研究.电信科学,2015052
    Guo Y B,Zhang Z Z,Hu H N,et al.Research on energy saving algorithm of 5G relay cellular network.Telecommunications Science,2015052
    Research on Radio Network Intelligent Frequency Selection Technology Based on an Adaptive Genetic Algorithm
    Wang Wenjun
    2015, 31(3):  2015056. 
    Asbtract ( 476 )   Knowledge map   
    Related Articles | Metrics
    In order to solve the problem of selecting frequency more and more difficultly for radio network, an intelligent frequency selection technology based on an adaptive genetic algorithm was proposed. Frequencies were selected for whole radio network from the perspective of intelligent optimization. On the basis of the standard genetic algorithm, this novel method improved genetic operators, and the preservation of the optimal individual algorithm to ensure the diversity of the population was introduced. Therefore, the arithmetic which did well in avoiding some deficiencies of the traditional frequency selection algorithm prevented local optimization and ran into overall optimization ultimately. Theoretical analysis and simulation results show that the new algorithm in solving the problem of frequency selection for large-scale network has higher efficiency and precision than the traditional algorithm, and stability is significantly enhanced.


    论文引用格式:王文君.基于自适应遗传算法的无线网络智能选频技术研究.电信科学,2015056
    Wang W J.Research on radio network intelligent frequency selection technology based on an adaptive genetic algorithm.Telecommunications Science,2015056
    Adversarial Drift Detection in Intrusion Detection System
    Qian Yaguan and Guan Xiaohui
    2015, 31(3):  2015058. 
    Asbtract ( 599 )   Knowledge map   
    Related Articles | Metrics
    The recent intrusion detection systems based on machine learning generally assume that the intrusion traffic always satisfies stationary of statistics. However, this assumption is not always held when adversaries arbitrarily alter the distribution of traffic data, or develop new attack techniques, which may reduce the detection rate. To overcome this adversarial drift, a novel drift detection approach based on weighted Rényi distance was suggested. The experiment on KDD Cup99 shows that the weighted Rényi distance is able to perfectly detect the adversarial drift, and improve the intrusion detection rate by retraining the model.


    论文引用格式:钱亚冠,关晓惠.网络入侵检测系统中的漂移检测.电信科学,2015058
    Qian Y G,Guan X H.Adversarial drift detection in intrusion detection system.Telecommunications Science,2015058
    Active Operation and Maintenance Platform for Information Systems Based on User Experience
    Wu Shun,Xu Dawei,Wei Zheng,Hu Chengchen,Xiang Wanhong,Guo Qian and Tang Yazhe
    2015, 31(3):  2015059. 
    Asbtract ( 480 )   Knowledge map   
    Related Articles | Metrics
    The traditional monitoring maintenance system only watches the running metrics like CPU usage. However, these metrics is not sufficient to reflect the status of the whole system for fine-grained monitoring of the system at users and application level. An active operation and maintenance platform based on user experiences was proposed. Through the mining of big network data, the platform can recognize a variety of user behaviors, and measure the user experience time along with the system performance at user’s level. Tests and experiments show that the platform works well with large throughput and low memory occupation. The application level performance monitoring, which provides an efficient way to improve user experience, was realized.


    论文引用格式:吴 舜,许大卫,魏 征等.基于用户体验的信息系统主动运维平台.电信科学,2015059
    Wu S,Xu D W,Wei Z,et al.Active operation and maintenance platform for information systems based on user experience.Telecommunications Science,2015059
    Resource Allocation for Two-Way Relay Network Based on Cognitive Radio
    Liang Shuang,Yang Shouyi and Hao Wanming
    2015, 31(3):  2015061. 
    Asbtract ( 351 )   Knowledge map   
    Related Articles | Metrics
    The resource allocation issue for sensing-based spectrum opportunistic access and sensing-based spectrum sharing access in two-way relay cognitive network with imperfect spectrum sensing was discussed. Different from the traditional resource allocation methods for two-way relay network, new algorithm jointly considering sensing time and transmission power in secondary system. Under the condition of the sensing time and the transmission power, the maximal throughput of the secondary system can be obtained.?To protect the primary user effectively from interference, the average interference power constraint in each hop was considered. The total transmission power constraint of the secondary system is also considered. The proposed algorithms can acquire the optimal sensing time and power allocation under imperfect spectrum sensing for the sensing-based spectrum opportunistic access and sensing-based spectrum sharing access. Finally, the performance of the two schemes was compared and the effectiveness of the proposed algorithm was verified.


    论文引用格式:梁 爽,杨守义,郝万明.基于认知无线电的双向中继网络的资源分配.电信科学,2015061
    Liang S,Yang S Y,Hao W M.Resource allocation for two-way relay network based on cognitive radio.Telecommunications Science,2015061
    Channel Assignment Strategy Based on the Sustained-Transmission Rule of Nodes in Cognitive Radio Sensor Network
    Li Xinbin,Huang Zequn,Han Song and Chen Jianmei
    2015, 31(3):  2015062. 
    Asbtract ( 397 )   Knowledge map   
    Related Articles | Metrics
    In order to improve the success rate of data packet transmission in heterogeneous and hierarchical cognitive radio sensor networks, the nodes were divided into sustained-transmission and non-sustained-transmission conditions. The ways of improving the success rate of data packet transmission are more energy consumption and better channel assignment, so that there is a type of centralized channel assignment strategies. At the same time, in order to reduce the energy consumption per bit in information transmission process of nodes, the packet size adaptation mechanism was optimized, ensuring the optimal packet size of non-sustained-transmission nodes. Simulation results demonstrate that the channel assignment strategy and the optimization mechanism improve the efficiency of energy utilization and the performance of network.


    论文引用格式:李鑫滨,黄泽群,韩 松等.基于节点持续传输准则的认知传感器网络信道分配策略.电信科学,2015062
    Li X B,Huang Z Q,Han S,et al. Channel assignment strategy based on the sustained-transmission rule of nodes in cognitive radio sensor network.Telecommunications Science,2015062
    A Two-Step Compressed Spectrum Sensing Scheme for Wideband Cognitive Radio
    Yan Shengnan
    2015, 31(3):  2015064. 
    Asbtract ( 418 )   Knowledge map   
    Related Articles | Metrics
    A two-step compressed spectrum sensing scheme for wideband cognitive radio was proposed in order to reduce the huge data transmission overhead of the traditional DCS scheme. The CS reconstruction of this scheme was divided into two steps, i.e. the information fusion for the support set and the joint recovery of multiple signals, and the prior information obtained from the former step can guide the joint recovery of the latter step. Simulation results show that this scheme can achieve better performance than the traditional DCS scheme as long as 50% of users are involved in the joint recovery, which means that this scheme can reduce the data transmission overhead and save energy consumed greatly.


    论文引用格式:闫盛楠.基于两步式融合重构的压缩频谱检测方法.电信科学,2015064
    Yan S N.A two-step compressed spectrum sensing scheme for wideband cognitive radio.Telecommunications Science,2015064
    Hybrid CoMP Mode Selection Algorithm Based on Pure User
    Zhao Jihong,Ding Xiaoting,Wang Wei and Qu Hua
    2015, 31(3):  2015065. 
    Asbtract ( 480 )   Knowledge map   
    Related Articles | Metrics
    CoMP-JP and CoMP-CB are two transmission modes for coordinated multi-point and have different gains in capacity requirements and improving the system performance. Aimed at the backhaul capacity shortage, a hybrid CoMP mode selection algorithm was proposed under the traditional transmission mode selection based on the user’s group. The algorithm selects the optimal transmission mode for individual user. It can be full use of the backhaul capacity and achieve the maximal system throughput. Simulation results show that the proposed algorithm enhanced the system performance under the limited backhaul capacity at a large extent, and with the increase of users, the higher performance gain.


    论文引用格式:赵季红,丁小婷,王 炜等.基于用户个体的混合CoMP模式选择算法.电信科学,2015065
    Zhao J H,Ding X T,Wang W,et al.Hybrid CoMP mode selection algorithm based on pure user.Telecommunications Science,2015065
    Discussion on Integration of Data Warehouse and Big Data
    Yu Juan
    2015, 31(3):  2015066. 
    Asbtract ( 862 )   Knowledge map   
    Related Articles | Metrics
    In view of the traditional enterprise couldn’t use such unstructured data efficiently, a big data solutions based on integration of data warehouse and big data was discussed. Based on the theory of data warehouse construction and architecture of the next-generation EDW, Hadoop was used to collection, processing and storage for unstructured data. By big data technology work together with traditional data warehouse and BI, to help enterprises to solve difficulties that applied. Integration of data warehouse and big data can resolve the difficulty on data processing and promote the implementation of big data projects.


    论文引用格式:于 鹃.数据仓库与大数据融合的探讨.电信科学,2015066
    Yu J.Discussion on integration of data warehouse and big data.Telecommunications Science,2015066
    Key Technology of Mobile Intelligent Terminal Support Reading Service
    Yang Ziwen,Yan Binfeng,Zhang Chengyan and Qiu Jianshu
    2015, 31(3):  2015067. 
    Asbtract ( 448 )   Knowledge map   
    Related Articles | Metrics
    Mobile reading, as a new way of reading is gradually widely used in people’s daily life. For the better user experience, mobile intelligent terminal to support reading service need to improve. The requirements of mobile reading services were analyzed. The requirements of the key technologies of mobile intelligent terminal supports reading business were presented. Finally, the situation of reading services on the existing mobile intelligent terminals was analyzed.


    论文引用格式:杨子文,严斌峰,张成岩等.支持阅读业务的移动智能终端关键技术.电信科学,2015067
    Yang Z W,Yan B F,Zhang C Y,et al.Key technology of mobile intelligent terminal support reading service.Telecommunications Science,2015067
    Study on Pattern Matching in Network Security
    Xu dongliang,Zhang Hongli,Zhang Lei and Yao Chongchong
    2015, 31(3):  2015068. 
    Asbtract ( 453 )   Knowledge map   
    Related Articles | Metrics
    Pattern matching is the core module in network security system, it’s the highest occupancy rate of system resources is more than 70%. According to problem and challenges of pattern matching in the network security system, taking 2000 as the boundary, the pattern matching was divided into the traditional pattern matching method and the new pattern matching method. Through the analysis of the principle and the computational complexity of different pattern matching method and the development and evolution of the new pattern matching method, applicable environment of different methods was concluded. A comprehensive review and evaluation of pattern matching in network security system was presented. Finally, a conclusion and some suggestions for future research were summarized and prospected.


    论文引用格式:徐东亮,张宏莉,张 磊等.模式匹配在网络安全中的研究.电信科学,2015068
    Xu D L,Zhang H L,Zhang L,et al.Study on pattern matching in network security.Telecommunications Science,2015068
    Key Technology and Application of Next-Generation UICC with Remote Management Capability
    Han Ling,Gu Minxia,Yan Binfeng and Kuang Wei
    2015, 31(3):  2015069. 
    Asbtract ( 375 )   Knowledge map   
    Related Articles | Metrics
    Supporting remote management will be one of the key technologies of next-generation UICC. The relative research developments of remote management of UICC were introduced. The key technology of eUICC with remote management capability was analyzed. The service model, scenes and business model of UICC were discussed. Finally, a feasible service architecture based on operator’s network architecture and typical business requirements was proposed. The architecture provides an exploration and practice for further study and large-scale commercial of UICC with remote management capability.


    论文引用格式:韩 玲,顾旻霞,严斌峰等.支持远程管理的下一代智能卡关键技术及应用.电信科学,2015069
    Han L,Gu M X,Yan B F,et al.Key technology and application of next-generation UICC with remote management capability.Telecommunications Science,2015069
    Research and Implementation of Quality Management System for ERP System
    Shan Shuo,Guo Guanxun and Mai Jing
    2015, 31(3):  2015070. 
    Asbtract ( 448 )   Knowledge map   
    Related Articles | Metrics
    The applications and business of CGN ERP system is in-depth expansion. The critical path and advantages of ITIL, ISO20000, CMMI and other standard system were analyzed. CGN ERP quality management system was implemented. It runs ERP systems as the thinking of running power station. The nuclear safety culture was blended into the quality level and process control of system. Through the successful implementation of quality management system, to protect the ERP system is in safe and stable operation, to ensure the core business processes are in the continuation and development, to bring the information values to the users.


    论文引用格式:闪 烁,郭冠勋,麦 菁.ERP系统质量管控体系的研究与实现.电信科学,2015070
    Shan S,Guo G X,Mai J.Research and implementation of quality management system for ERP system.Telecommunications Science,2015070
    Variable Transmission Range Routing Protocol Based on Vehicle Density in VANET
    Cai Rong,Zhang Guoan and Wu Yuebo
    2015, 31(3):  2015071. 
    Asbtract ( 452 )   Knowledge map   
    Related Articles | Metrics
    In order to solve the problem of unstable connectivity and high bit error rate, which are caused by rapid changes in the density of vehicles on the road, while the transmission radius remained unchanged, a variable transmission range routing protocols based on vehicle density in vehicular Ad Hoc network was proposed. According to different vehicle density, node could adjust the farthest transmission distance and reduce the transmission latency of the message, which could ensure high connection probability of the network. It was proved feasible based on the change conditions of transmission range with different vehicle density, which was deduced on the basis of homogeneous Poisson point process model. Furthermore, mathematical calculate formula of average latency was obtained according to the theoretical analysis. At last, variable transmission range routing protocol based on vehicle density and fixed transmission range routing protocol were compared by simulation. The simulated results show that the proposed protocol can be applied in actual environments, and the message can be transmitted fast from source node to destination node under the condition of high connection probability.


    论文引用格式:蔡 蓉,章国安,吴月波.车载网中基于车辆密度的可变传输范围路由协议.电信科学,2015071
    Cai R,Zhang G A,Wu Y B.Variable transmission range routing protocol based on vehicle density in VANET.Telecommunications Science,2015071
    A Discriminatory Channel Estimation Scheme Based on the Aid of Friendly Jammer
    Zhang Rong,Xie Xianzhong and Lei Weijia
    2015, 31(3):  2015072. 
    Asbtract ( 443 )   Knowledge map   
    Related Articles | Metrics
    In the physical layer security, that inhibiting the accuracy of channel estimation at eavesdropper can indirectly enhance the received signal quality difference between the legitimate receiver and the eavesdropper, thus improving signal transmission security. The proposed discriminatory channel estimation scheme was based on the help of friendly jammer, which was based on artificial noise emitted by friendly jammer to interfere the channel estimation process of the eavesdropper. Further, the optimal power allocation was given between training sequence and artificial noise by maximizing the channel estimation error of the eavesdropper, which can suppress the channel estimation quality of the eavesdropper more effectively. Simulation results show that this method can effectively restrain the channel estimation performance of the eavesdropper, and it can improve the received signal quality gap between the legitimate receiver and the eavesdropper.


    论文引用格式:张 蓉,谢显中,雷维嘉.一种基于友好干扰者协助的区别信道估计机制.电信科学,2015072
    Zhang R,Xie X Z,Lei W J.A aiscriminatory channel estimation scheme based on the aid of friendly jammer.Telecommunications Science,2015072
    Research on Smart Scaling Mechanism and Structure for Big Data Network Server Groups
    Ju Hongyao
    2015, 31(3):  2015073. 
    Asbtract ( 490 )   Knowledge map   
    Related Articles | Metrics
    The principle and construction of the structure of smart telescopic on big data network server groups were elaborated. The key technologies involved in the smart scaling of big data network server groups were discussed. After investigating key technologies, including the monitoring of the workload of the server group, the smart control of the number of servers, and the scheduling of access loads, the principle and realization method for the smart scaling of big data network server groups were proposed and technical supports were provided for the smart scaling and effective energy conservation of big data network server groups. According to the proposed construction method and key technologies, a smart scaling model for big data network server groups was provided as well.


    论文引用格式:鞠洪尧.大数据网络服务器群智能伸缩机制与架构研究.电信科学,2015073
    Ju H Y.Smart scaling mechanism and structure for big data network server groups.Telecommunications Science,2015073
    Existing Voice Solutions and Evolution for LTE Terminal
    Zhou Jing and Shi Yu
    2015, 31(3):  2015074. 
    Asbtract ( 466 )   Knowledge map   
    Related Articles | Metrics
    As the final voice solution for LTE, VoLTE has become the key research point of the industry. Several existing voice solutions of LTE user equipment were compared and analyzed in details. Technical advantages and unsolved problems of VoLTE which is based on pure PS network and IMS system were mainly discussed from the prospective of the LTE terminal. The technical characteristics and evolution direction of VoLTE were mentioned in the end.


    论文引用格式:周 晶,师 瑜.LTE终端语音解决方案现状及下一步演进.电信科学,2015074
    Zhou J,Shi Y.Existing voice solutions and evolution for LTE terminal.Telecommunications Science,2015074
    Technology and Application of High-Capacity USIM Card
    Dong Shuanghe,Yan Binfeng,Hu Bo and Guo Xiaohua
    2015, 31(3):  2015075. 
    Asbtract ( 459 )   Knowledge map   
    Related Articles | Metrics
    A new high-capacity USIM card was introduced and discussed in detail and depth. Its key technology (IC-USB interface, integrated NAND flash chips) was introduced. Compared to traditional SIM card, the high-capacity USIM card has higher transmission rates, larger storage space, and data security storage. The structure and functions of supporting client and management platform were discussed. The influence of this technology may have caused was analyzed. Appropriate suggestions and plantings to the future of business model and application scenario were given.


    论文引用格式:董双赫,严斌峰,胡 博等.大容量USIM智能卡技术及应用.电信科学,2015075
    Dong S H,Yan B F,Hu B,et al.Technology and application of high-capacity USIM card.Telecommunications Science,2015075
    Security Problems and Solutions of Smart Terminal Mobile Operating System
    Hou Yuhua and Zhou Xiaolong
    2015, 31(3):  2015077. 
    Asbtract ( 475 )   Knowledge map   
    Related Articles | Metrics
    The present situation of the smart terminal operating system security was described. The security problem of the existing operating system and the present status of research and development of domestic independent operating system were analyzed. Solution of the security reinforcement based on domestic TIOS, which reinforces kernel, system support library, GUI, application framework of TIOS, was discussed. The nine basic safety application programming were introduced. Finally, security requirements of different users and different security level of operating system were proposed. It provides reference for the development of all types of secure mobile phone.


    论文引用格式:侯玉华,周晓龙.智能终端操作系统安全问题及解决方案.电信科学,2015077
    Hou Y H,Zhou X L.Security problems and solutions of smart terminal mobile operating system.Telecommunications Science,2015077
    Analysis of Intelligent Pipeline Perception Technology Based on Terminal
    Yan Binfeng,Dong Hui and Hou Yuhua
    2015, 31(3):  2015078. 
    Asbtract ( 433 )   Knowledge map   
    Related Articles | Metrics
    The background of the intelligent pipeline was briefly introduced, the multidimensional perception technology of intelligent pipeline was analyzed, the perception technology based on terminal was focused on, the corresponding solutions were put forward, that these solutions would be beneficial to realize the intelligent pipeline and finally the difficulties and challenges of these solutions were analyzed. It has carried on the beneficial exploration for the further technology research and practical deployment of the intelligent pipeline.


    论文引用格式:严斌峰,董 慧,侯玉华.基于终端的感知技术浅析.电信科学,2015078
    Yan B F,Dong H,Hou Y H.Analysis of intelligent pipeline perception technology based on terminal.Telecommunications Science,2015078
    Research on NFC End-to-End Compatibility Test
    Gao Yiwei and Sun Yu
    2015, 31(3):  2015079. 
    Asbtract ( 376 )   Knowledge map   
    Related Articles | Metrics
    NFC has a long industry chain with many manufacturers involved in, which brings a significant challenge to the compatibility. Four testing methods were presented to improve the compatibility of NFC terminals and POS terminals. These testing methods include more rigorous conformance testing method, instrument compatibility testing method, R/W compatibility testing method and POS compatibility testing method. Industry participants can use one or more of these four methods to improve NFC end-to-end compatibility based on their own needs, which can help optimize the NFC mobile pay environment.


    论文引用格式:高一维,孙 宇.NFC端到端兼容性测试研究,电信科学,2015079
    Gao Y W,Sun Y.Research on NFC end-to-end compatibility test.Telecommunications Science,2015079
    Communication System for Electric Energy Data Acquisition System of SGWM-Based 230 MHz Wireless Broadband Communications Key Technology
    Dong Lijun,Zhang Qian,Zhu Enguo and Liu Xuan
    2015, 31(3):  2015080. 
    Asbtract ( 461 )   Knowledge map   
    Related Articles | Metrics
    Electric energy data acquisition system is an important part of smart grid. Against the problem of the communication way of the 230 MHz wireless private network in the electric energy data acquisition system, low communication rate, fewer access points, low acquisition success rate, poor real-time performance, the technical proposal of the SGWM-based 230 MHz wireless broadband communications key technology of the communication system for the electric energy data acquisition system was proposed. The communication network technologies, such as the carrier aggregation technology, smart routing technology, networking technology, were discussed. The SGWM wireless communications technology in the electric energy data acquisition system was elaborated. By designing and analyzing networking scheme, the result indicates that the field application effect of the SGWM-based 230 MHz wireless broadband communications key technology in the electric energy data acquisition system is very good. Thus it provided technical support for the propel of the information bidirectional interaction and construction of the strong smart grid.


    论文引用格式:董俐君,张 芊,祝恩国等.基于SGWM的230 MHz无线宽带通信技术的用电信息采集系统的通信系统设计.电信科学,2015080
    Dong L J,Zhang Q,Zhu E G,et al.Communication system for electric energy data acquisition system of SGWM-based 230 MHz wireless broadband communications key technology.Telecommunications Science,2015080
    Trust-Based Cooperative Spectrum Sensing Algorithm in Power Dedicated Network
    Cao Jinping,Li Wei and Zhang Yiying
    2015, 31(3):  2015082. 
    Asbtract ( 452 )   Knowledge map   
    Related Articles | Metrics
    To fulfill the communication needs of smart distribution and utilization system, a novel power dedicated network has been developed. The system faces a problem that it may operate coexisted with a 230 data transceiver system. In order to keep the two systems operating stably and efficiently at the same time, a trust-based cooperative spectrum sensing algorithm was presented. According to the characteristics of user behavior, cognitive radio users were classified into fiduciary users, lapsed users and malicious users. By analyzing the relationship among detection result, credibility of cognitive radio users and communication channel signal-to-noise ratio, the credibility weight of cognitive radio users was given, and a trust-based cooperative spectrum sensing algorithm was proposed. The simulation results show that the algorithm improves detection performance effectively.


    论文引用格式:曹津平,李 伟,张翼英.一种应用于电力无线专网的基于信任度的协作频谱感知算法.电信科学,2015082
    Cao J P,Li W,Zhang Y Y.Trust-based cooperative spectrum sensing algorithm in power dedicated network.Telecommunications Science,2015082
    An Effective Method to Evaluate the Planning Achievements of Electric Power Communication Network
    Zhou Jing and Liu Guojun
    2015, 31(3):  2015083. 
    Asbtract ( 445 )   Knowledge map   
    Related Articles | Metrics
    Electric power communication network is an important support platform of electric power grid, and its development level is closely with the latter. An evaluation method of the adaptability of electric power communication network and the power grid was put forward. With grey relational analysis method and based on the statistical data, the rule between each area communication network construction scale and grid development level was revealed. It is a meaningful research on evaluating the development of electric power communication network and its investment.


    论文引用格式:周 静,刘国军.一种电力通信网规划成效评价方法.电信科学,2015083
    Zhou J,Liu G J.An effective method to evaluate the planning achievements of electric power communication network.Telecommunications Science,2015083
    Resource Scheduling for Cloud Data Center Based on Data Mining in Smart Grid
    Pang Songtao
    2015, 31(3):  2015084. 
    Asbtract ( 425 )   Knowledge map   
    Related Articles | Metrics
    Since the wide use of virtual technology, the resource use rate in cloud data center has been improved effectively than ever before. However, there is still a large space for improvement due to the resources usually are pre-started and pre-allocated by the user demand rather than the actual needs. In order to allocate available resource more accurately, two algorithms were proposed to meet the needs of the daily use in most of time. The available virtual resources would be arranged according the forecast using the algorithms of hierarchical composition of loading and the peek resources needs would be dynamic allocated using the algorithms of stochastic equilibrium and queuing theory. The results of experiment via the system based upon above theories show that the solution provides a kind of very effective advanced means for the optimal use of resources and energy saves.


    论文引用格式:庞松涛.基于数据挖掘的电力云资源规划调度.电信科学,2015084
    Pang S T.Resource scheduling for cloud data center based on data mining in smart grid.Telecommunications Science,2015084
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: