Please wait a minute...

Current Issue

    20 February 2023, Volume 39 Issue 2
    Topic: 6G Space Internet
    UAV-enabled integrated sensing and communication:architecture, techniques, and future vision
    Chenxi LIU, Rui MA, Mugen PENG
    2023, 39(2):  1-9.  doi:10.11959/j.issn.1000-0801.2023029
    Asbtract ( 538 )   HTML ( 85)   PDF (2380KB) ( 782 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    UAV emergency communication has been regarded as a typical application of the sixth generation mobile communication system (6G), and it can be flexible deployed and provide on-demand services.Meanwhile, integrated sensing and communication (ISAC) is a key feature and enabling technology for 6G.With the aid of the ISAC techniques, the spectral efficiency and the sensing accuracy of UAV emergency communication can be improved, while the system costs can be simultaneously reduced.However, how to efficiently integrate the ISAC techniques into the UAV emergency communication remains a hot and challenging research issue for both the academia and industry.Against these backdrops, a UAV-enabled ISAC architecture was proposed.Then, the fundamental principles that supported the proposed architecture were discussed.Finally, the future directions and challenges in UAV-enabled ISAC were provided.

    A survey on AI techniques applied in the satellite communication/satellite Internet field
    Yaqiong LIU, Zhe LYU, Yafei ZHAO, Guochu SHOU
    2023, 39(2):  10-24.  doi:10.11959/j.issn.1000-0801.2023030
    Asbtract ( 707 )   HTML ( 119)   PDF (2027KB) ( 869 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The birth of satellite Internet brings new development opportunities, but also many challenges.How artificial intelligence, as an important auxiliary tool, was widely used in the field of satellite communication/satellite Internet in the context of the development of space-air-ground integration, was investigated, which involved communication anti-jamming, communication routing, satellite-terrestrial network system architecture, constellation operation and management and other scenarios.The AI algorithms included traditional machine learning, deep learning, reinforcement learning and so on.Finally, by taking the development trend of the AI applied in the satellite field into consideration, several future research directions were put forward, which provided new ideas and technical solutions for the intelligent development of satellite field in our country.

    Low earth orbit satellite communication supporting direct connection with mobile phones: key technologies, recent progress and future directions
    Yaohua SUN, Mugen PENG
    2023, 39(2):  25-36.  doi:10.11959/j.issn.1000-0801.2023031
    Asbtract ( 710 )   HTML ( 102)   PDF (1647KB) ( 936 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to realize anytime and anywhere communication, low earth orbit (LEO) satellite communication becomes a key component in 6G.Through the adaptive enhancement of terrestrial mobile communication protocol, LEO satellites can provide direct connection services for mobile phones.The related key technologies and the recent progress of various commercial programs were introduced, and future issues were also identified together with potential technical solutions.

    A survey on networking key technologies for LEO satellite network
    Ruihong JIANG, Yizhe FENG, Yaohua SUN, Haina ZHENG
    2023, 39(2):  37-47.  doi:10.11959/j.issn.1000-0801.2023032
    Asbtract ( 650 )   HTML ( 143)   PDF (1273KB) ( 761 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the continuous development of information and communication technology, the requirements for expanding network coverage and reducing communication delay are becoming higher and higher.Low earth orbit (LEO) satellite networking, as a network system constructed by satellites with low orbital altitudes, has the advantages of wide coverage and small communication delay.Firstly, the development status of LEO satellite network around and the challenges faced by LEO satellite networking were summarized.Then, the key technical difficulties and suggestions of LEO satellite networking were described.Finally, some potentially feasible LEO satellite networking schemes were discussed, combined with the theory and methods of distribution, game and artificial intelligence.

    Analysis on waypoint-segment routing and performance evaluation for LEO satellite networks
    Xin ZHAO, Guang ZHAO, Rui CHEN, Wennai WANG
    2023, 39(2):  48-58.  doi:10.11959/j.issn.1000-0801.2023020
    Asbtract ( 136 )   HTML ( 17)   PDF (1536KB) ( 191 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A waypoint-segment routing (WSR) algorithm was proposed.Based on the predictable periodicity of the topological changes of satellite network, the location of satellite waypoints based on the link state of satellite nodes at the current moment was determined by WSR algorithm.The mechanism of flexible planning of packet transmission paths was responded by segment routing to changes in satellite network topology in advance, and a packet transmission path that was not affected by network topology snapshot switch was calculated.Simulation experiment was based on the NS-3, and the optimized link state routing (OLSR) algorithm and the shortest path algorithm were selected to compare with WSR in order to analyze the delay jitter and packet loss rate.It was proved that compared with OLSR, the maximum delay jitter of WSR was reduced by 46 ms and 126 ms respectively in the two scenarios, the packet loss rate was reduced by 30% and 21% respectively, and the problem of packet transmission path interruption caused by topology snapshot switching can be solved.

    Research and Development
    Just noticeable distortion model based on entropy masking in DCT domain
    Qionghua LUO, Hongkui WANG, Haibing YIN, Yafen XING
    2023, 39(2):  59-70.  doi:10.11959/j.issn.1000-0801.2023014
    Asbtract ( 92 )   HTML ( 15)   PDF (7071KB) ( 57 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the threshold accuracy of JND (just noticeable distortion) model in DCT (discrete cosine transform) domain and avoid cross-domain operation, entropy masking effect was introduced into DCT-based JND model.Firstly, starting from the free-energy theory and the Bayesian inference, an autoregressive model based on texture-energy similarity in DCT domain was designed to simulate the spontaneous prediction behavior of visual perception.Secondly, the mapping relationship between visual perception and prediction residuals were explored to obtain the disorder intensity in block level.Thirdly, the entropy masking effect was modeled as a JND threshold modulation factor of disorder intensity.Finally, the JND model in DCT domain for the entropy masking was proposed by fusing the contrast sensitivity function, the luminance adaptive masking, the contrast masking.Compared with the existing JND model in DCT domain, the proposed model performed all operations in DCT domain, which was more efficient and concise.The subjective and objective experimental results indicate that the proposed JND model shows greater tolerance to distortion with better perceptual quality.

    Cost optimization model for multi-cloud network based on Kubernetes
    Ming GAO, Ming LIU, Yangting CHEN, Weiming WANG
    2023, 39(2):  71-82.  doi:10.11959/j.issn.1000-0801.2023028
    Asbtract ( 237 )   HTML ( 40)   PDF (1899KB) ( 283 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The cloud-native scheduling system, represented by Kubernetes, is widely used by cloud tenants in a multi-cloud environment.The problem of network observation becomes more and more serious, especially the cost of network traffic across cloud and region.In Kubernetes, the eBPF technology was introduced to collect the network data features of kernel state of operating system to solve the network observation problem, and then the network data features were modeled as QAP, a combination of heuristic and stochastic optimization was used to obtain the best near optimal solution in a real-time computing scenario.This model is superior to the Kubernetes native scheduler in the cost optimization of network resources, which is based on the scheduling strategy of computing resources only, and increases the complexity of scheduling links in a controllable range, effectively reduces the cost of network resources in a multi-cloud area deployment environment.

    Periodic low-power communication technology scheme for large-scale transmission line condition monitoring sensor network
    Yabo ZHAN, Qian XU, Jun LI, Zhen ZONG
    2023, 39(2):  83-91.  doi:10.11959/j.issn.1000-0801.2023022
    Asbtract ( 81 )   HTML ( 15)   PDF (1190KB) ( 211 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to realize the purpose of low energy consumption, long service life and green development of transmission line monitoring, a periodic low-power communication technology scheme of large-scale transmission line condition monitoring sensor network was proposed.According to the networking characteristics of sensor networks in large-scale transmission line condition monitoring networks and the characteristics of node operation condition conversion, sleep timers were set to make the communication nodes of sensor networks switch between initialization, sleep and activation states in a periodic operation mode.The communication nodes entered the sleep state when there was no transmission demand for transmission line condition monitoring data, so as to save communication energy consumption.Sink nodes in sensor networks used gradients to create uplink routes and source routes to create downlink routes.Based on the number of hops and residual energy, sink nodes transmitted uplink and downlink routing data packets, to reduce node energy consumption and prolong communication running time.Experiments show that after the large-scale transmission line condition monitoring sensor network applies the technical solution, the communication energy consumption is significantly reduced, the running time is significantly prolonged, and the data transmission performance of the monitoring sensor network is not affected, and the service life of the monitoring sensor network is prolonged.

    Spoof speech detection based on context information and attention feature
    Jia CHEN, Jianwu ZHANG, Zheliang ZHANG
    2023, 39(2):  92-102.  doi:10.11959/j.issn.1000-0801.2023006
    Asbtract ( 225 )   HTML ( 41)   PDF (1763KB) ( 227 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of speech synthesis and speech conversion technology, methods of spoof speech detection still have problems such as low spoof detection accuracy and poor generality.Therefore, an end-to-end spoof detection method based on context information and attention feature was proposed.Based on deep residual shrinkage network (DRSN), the proposed method used the dual-branch context information coordination fusion module (DCCM) to aggregate rich context information, and fused features based on coordinate time-frequency attention (CTFA) to obtain cross-dimensional interaction features with context information, thus maximizing the potential of capturing artifacts.Compared with the best baseline system, in the ASVspoof 2019 LA dataset, the proposed method had reduced the EER and t-DCF performance indicators by 68% and 65% respectively, in the ASVspoof 2021 LA dataset, the EER and t-DCF of the proposed method were 4.81 and 0.311 5 and dropped by 48% and 10% separately.The experimental results show that this method can effectively improve the accuracy and generalization ability of spoof speech detection.

    Secondary throughput maximization scheme for non-linear energy harvesting cognitive radio networks
    Haijiang GE, Ning JIA, Kaikai CHI, Yunzhi CHEN
    2023, 39(2):  103-117.  doi:10.11959/j.issn.1000-0801.2023033
    Asbtract ( 105 )   HTML ( 14)   PDF (940KB) ( 248 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at a cognitive radio network (CRN) consisting of a pair of primary users and M pairs of secondary users, the secondary throughput maximization for CRN based on the non-linear energy harvesting model was studied.Specifically, in the case of considering secondary transmitter (ST) circuit power, the secondary throughput maximization (STM) problem with primary users’ throughput demands was first modeled as a non-linear optimization problem and then transformed into a convex optimization problem.Finally, a low-complexity algorithm combining the golden section and dichotomy was proposed.By applying this low-complexity algorithm, the optimal time allocation of the primary transmitter (PT)’s energy transmission and secondary users’ information transmission, and the optimal transmission power of PT were obtained.In addition, for the case of neglecting the ST circuit power, the convex property of the STM problem was first proved, and then a more efficient algorithm was designed to solve it.The simulation results show that compared with the equal time allocation method and the link gain priority method, the proposed design algorithm significantly improves the throughput of secondary users.

    A model of RD-IHSAT rumor dissemination based on coupling network
    Yishi HAN, Yuxin XU, Tiantian LU
    2023, 39(2):  118-131.  doi:10.11959/j.issn.1000-0801.2023023
    Asbtract ( 140 )   HTML ( 16)   PDF (1475KB) ( 261 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To explore the spread of rumors in social network, based on the principles of coupling network, the model of RD-IHSAT was established on Barabási-Albert (BA) scale free network and Watts-Strogatz (WS) small world network.The classic model of SIR was optimized, by combining it with three concerns, the interest decay, the social consensus and the spiral of silence effect, and adding four roles, hesitated, adherent, reticent and debunker.Results of numerical simulations are as follows: an information outbreak can be triggered by coupling network, not only the spreading speed but the scale as well; the dissemination can be markedly suppressed when the probability of rumor-refuting for the hesitated and spreaders arises; the chances of transition from spreaders to adherents drop; increasing the proportion of silent groups is a key part of curbing the spread of rumors; the control of the time lag in refuting rumors will greatly affect the effect of refuting rumors.

    A triple joint extraction method combining hybrid embedding and relational label embedding
    Jianfeng DAI, Xingyu CHEN, Ligang DONG, Xian JIANG
    2023, 39(2):  132-144.  doi:10.11959/j.issn.1000-0801.2023021
    Asbtract ( 153 )   HTML ( 29)   PDF (1982KB) ( 325 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The purpose of triple extraction is to obtain relationships between entities from unstructured text and apply them to downstream tasks.The embedding mechanism has a great impact on the performance of the triple extraction model, and the embedding vector should contain rich semantic information that is closely related to the relationship extraction task.In Chinese datasets, the information contained between words is very different, and in order to avoid the loss of semantic information problems generated by word separation errors, a triple joint extraction method combining hybrid embedding and relational label embedding (HEPA) was designed, and a hybrid embedding means that combines letter embedding and word embedding was proposed to reduce the errors generated by word separation errors.A relational embedding mechanism that fuses text and relational labels was added, and an attention mechanism was used to distinguish the relevance of entities in a sentence with different relational labels, thus improving the matching accuracy.The method of matching entities with pointer annotation was used, which improved the extraction effect on relational overlapping triples.Comparative experiments are conducted on the publicly available DuIE dataset, and the F1 value of HEPA is improved by 2.8% compared to the best performing baseline model (CasRel).

    Synthesis of shared aperture thinned interleaved arrays with elements in concentric rings
    Zhigang GU, Longjun LI, Jikuan HU
    2023, 39(2):  145-156.  doi:10.11959/j.issn.1000-0801.2023034
    Asbtract ( 104 )   HTML ( 13)   PDF (4893KB) ( 117 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Among planar array antennas, concentric ring array (CRA) antennas have received considerable interest since it is symmetric and provides invariant beam pattern for 360° azimuthal coverage.In case of limited antenna aperture, there is great value to thinned interleaved CRA with low peak side lobe levels and a narrow main beam.The application of the cubic interpolation and density-weighting method in shared aperture array design was demonstrated by the low peak side lobe level synthesis of CRA.By adopting the Fourier-Bessel transform the relationship between the element’s excitation and array pattern, thinned interleaved problems were formulated as time-frequency synthesis problems.On the basis of the density-weighting method, element excitations of interleaved sub-array were carefully selected in an odd-even manner, which ensured the pattern matching of the generated sub-array.The iterative FFT algo rithm was adopted to thin the concentric ring array.Simulation results show that the proposed algorithm can achieve a favorable thinned and interleaved concentric ring array design with matched power patterns and low peak sidelobe levels.The problem of thinned and interleaved concentric ring arrays is solved, and the design of multi-function shared aperture thinned interleaved arrays with elements in concentric rings is realized.

    A prediction model of massive 5G network users’ revisit behavior based on telecom big data
    Yudi SUN
    2023, 39(2):  157-162.  doi:10.11959/j.issn.1000-0801.2023026
    Asbtract ( 134 )   HTML ( 33)   PDF (837KB) ( 267 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Users in 5G networks will generate a large amount of access data, which makes it difficult to accurately predict users’ revisit behavior.Therefore, a prediction model of massive 5G network users’ revisit behavior based on telecom big data was proposed.The user’s historical online behavior characteristic data was extracted from the telecom big data to build a data set.Multi order weighted Markov chain model was introduced.The model weight value was obtained by calculating the autocorrelation coefficient of each order, and the statistics of the model were calculated.After analysis, the one-step transition probability matrix of Markov chain with each step size was obtained, so as to accurately predict the revisit behavior of massive users in 5G network.The experimental results show that the proposed model has the lowest mean error and standard deviation, as well as the highest accuracy, recall, precision and F1 indicators, which can prove that the proposed method has a very obvious advantage in predicting users’ revisit behavior.

    Engineering and Application
    Resource scheduling optimization in cloud-edge collaboration
    Shuling WANG, Jie SUN, Peng WANG, Aidong YANG
    2023, 39(2):  163-170.  doi:10.11959/j.issn.1000-0801.2023027
    Asbtract ( 411 )   HTML ( 99)   PDF (1329KB) ( 684 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the enrichment and diversification of business types, low latency, high bandwidth, data privacy and high reliability have become common requirements.Edge computing, fog computing, distributed cloud, computing power network and other solutions have been proposed, and have triggered in-depth research and exploration in industry, academia and research.There is a consensus within and outside the industry on the view that “multi-level computing power distribution and collaboration of computing power will be the mainstream of computing power structure in the future”.The problems related to resource scheduling optimization, such as computing power management, allocation, scheduling, have also become the current research hotspot and key research direction.Therefore, for the future computing power supply structure, focuses on the latest progress of resource scheduling optimization in academia and industry, the current main methodology and engineering implementation architecture was summarized.And then, for the two typical cloud edge collaboration scenarios, the analysis was carried out from the perspective of scene splitting, scheduling objectives, and solutions in turn, and the resource scheduling optimization reference schemes that adapted to the characteristics of the scenarios were analyzed and discussed respectively.

    5G millimeter wave UE test method and analysis
    Jian GONG, Yu ZHANG
    2023, 39(2):  171-177.  doi:10.11959/j.issn.1000-0801.2023025
    Asbtract ( 133 )   HTML ( 32)   PDF (1892KB) ( 195 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the 5G millimeter wave UE OTA RF conformance test, EIRP and TRP type of tests are important OTA items.Currently, this method relying on 3GPP-defined random scan to lock the beam to determine the maximum EIRP and TRP, but this method is time-consuming and lacks accuracy.A non-signaling test method was proposed, which could not only achieve more accurate measurements compared with the current EIRP and TRP test methods but also make it possible to use the non-directional OTA site as the measurement environment, further reducing the test cost and time cost, and increasing the flexibility of the test environment selection.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: