Please wait a minute...

Current Issue

    20 November 2015, Volume 31 Issue 11
    research and development
    Online Popularity Prediction Scheme Based on Converging Property in Content Aware Soft Real Time Media Broadcast System
    Huangqing Chen,Xiaofeng Zhong,Jian Sun,Jing Wang
    2015, 31(11):  1-6.  doi:10.11959/j.issn.1000-0801.2015221
    Asbtract ( 279 )   HTML ( 4)   PDF (1695KB) ( 385 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A small number of online popular contents are often clicked by a great quantity of users in a short period,and take the most of the wireless cellular network traffic.With popularity prediction,the popular contents would be broadcasted to the potential users for saving a lot of transmitting resource,as illustrated in content aware soft real time media broadcast(CASoRT)system.With the data set collected from the Chinese commercial cellular network,the converging property of web contents,users and geographic positions in online news was shown.Then,two prediction schemes such as linear log and constant scaling model were proposed to estimate the popularity of online news,and improved by an optimal observation threshold.After comparison of simulation results,the linear log model performs better.

    An Consistent Routing Policy Based on Ant Algorithm in Software Defined Networking
    Yuwei Wang,Julong Lan,Xiaoqiang Xi,Ximian Fan,Yiming Jiang
    2015, 31(11):  7-14.  doi:10.11959/j.issn.1000-0801.2015206
    Asbtract ( 335 )   HTML ( 6)   PDF (1677KB) ( 597 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Software defined networking updated data through distributing flow table to switches.But the installation of flow table had delay and may lead to wrong forwarding.An consistent routing policy based on ant algorithm was proposed.The inconsistent delay was introduced in routing parameter.The sequence of flow setup was adjusted through the controller,so as to avoid the inconsistency of the control logic in switches.Results show that,compared with Dijstra algorithm,when the inconsistency problem happens,the proposed policy has less actual delay and the packet lost rate and the wrong forwarding rate have been increasinglydecreased.

    Application of the Extension RBAC Model in the Family Open Platform
    We Li,Jing Wang
    2015, 31(11):  15-22.  doi:10.11959/j.issn.1000-0801.2015249
    Asbtract ( 298 )   HTML ( 2)   PDF (2635KB) ( 533 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Role-based access control(RBAC)technology is one of the hotspots in the research of access control.It is of great flexibility and high efficiency.The permission of RBAC model was refined,and four elements such as object,action,domain and group were added to the model.The inheritance of domain was put forward.The extended model(ODG-RBAC)provided a more fine-grained access control.Through using ODG-RBAC model in the family open platform STB manage system,the problem of access control was resolved.Meanwhile,by providing diversified design scheme of permissions and roles,the complex responsibility assignment was implemented.

    A Novel Secret Sharing Method Based on Binary Sequence
    Yexia Cheng,Yuejin Du,Kai Yang,Shen He,Jin Peng,Wen Jiang
    2015, 31(11):  23-29.  doi:10.11959/j.issn.1000-0801.2015251
    Asbtract ( 403 )   HTML ( 9)   PDF (1019KB) ( 470 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel secret sharing method was proposed based on binary sequence,which was quite different from the traditional secret sharing method.This secret sharing method was based on binary secret sequence using bit operations.The secret here included but not limited to key,message,etc,meanwhile the secret sequence included but not limited to key sequence,message sequence and so on.And two new concepts which were called non-M sequence and non-M sequence rule method were defined.By using the non-M sequence rule method,the elements of sub-secret sequence M' of secret sharing were computed.The method for generating sub-secrets and the method for recovering secret was proposed based on binary sequence.The method was practical and effective.

    Optimal Relay Selection Strategy in Cognitive Cooperative Relaying Network
    Yinshan Liu,Xiaofeng Zhong,Jing Wang
    2015, 31(11):  30-35.  doi:10.11959/j.issn.1000-0801.2015228
    Asbtract ( 280 )   HTML ( 2)   PDF (1824KB) ( 361 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cognitive cooperative relaying communication significantly improves the performance of wireless communication networks and spectral efficiency.Optimal relay selection problem,which characterize the desired tradeoff between the probing cost for establishing cooperative transmission and hence higher reward via cooperative diversity,is a hard issue when the number of relay nodes is large.Optimal relay selection strategy was established by using optimal stopping theory with a finite horizon.Furthermore,a pure SNR(signal-to-noise ratio)threshold structure was exhibited.Theoretical analysis and numerical results indicate that proposed optimal relay selection strategy is effective in reducing the number of probing candidate relays and improving the reward of source.

    Virtual Network Resource Allocation Algorithm Based on Load Balance in Carrier-SDN
    Li Wang,Jihong Zhao,Hua Qu,Ya Guo
    2015, 31(11):  36-42.  doi:10.11959/j.issn.1000-0801.2015255
    Asbtract ( 403 )   HTML ( 7)   PDF (2164KB) ( 460 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Resource allocation algorithm for virtual networks in carrier-SDN based on load balance was proposed.Firstly,multiple-layered model of carrier-SDN was constructed.Secondly,the binaryzation of particle swarm optimization algorithm with the characteristic of virtual network embedding(VNE)algorithm was realized.Finally,load balance was set as optimization object,then the solution of VNE problem was got.The simulation results demonstrate that the proposed algorithm has superior performance in terms of load balance,acceptance ratio and average compared with existing methods.

    An Error Tolerated Congestion Control Algorithm Based on Packet Loss Rate Measurement in Deep Space Communication Network
    Junrong Yan,Yulong Lu,Peng Pan
    2015, 31(11):  43-47.  doi:10.11959/j.issn.1000-0801.2015257
    Asbtract ( 316 )   HTML ( 7)   PDF (1190KB) ( 601 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Congestion control algorithms of TCP protocol previously used in space communications are mostly based on TCP Vegas algorithm.They always require accurately measurement of RTT,but it's very difficult to achieve in deep space communication networks which have very long and variable delay channel characteristics.An errors tolerated congestion control algorithm is proposed based on packet loss rate measurement.The algorithm sends data in the form of data blocks and gives an errors tolerated degree based on the history data.It measures the congestion state based on the current packet loss rate measurement,so it can achieve a smaller overhead and higher transmission efficiency.In addition,the usage of mathematical modeling methods simplifies the networks and simulates the real network traffic.The mentioned algorithm is compared with the classical congestion control algorithm.Analysis and simulation prove that thethroughput of improved algorithm is 34 percent better than Tahoe and 22 percent better than Reno,so it gets a better performance.

    Design and Research of S-Box Based on Dynamic Strategy
    Zhouquan Du,Qijian Xu,Jie Zhang,Xudong Zhong,Zhulin An
    2015, 31(11):  48-54.  doi:10.11959/j.issn.1000-0801.2015288
    Asbtract ( 382 )   HTML ( 6)   PDF (1297KB) ( 623 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the entire cipher algorithm.In order to improve the secure strength of the block cipher algorithm with the limited resource,a lot researches on it and analyses of S-box structure design had been done,then the design scheme of dynamic S-box which can improve the security of S-layer by learning from the architecture of Feistel and the reconstruction of S-box came out.The result of the test showed that the project really can work on the increasing of security.

    A STBC-BF Transmit Scheme in Massive MIMO System
    Tao Kang,Jinlong Zhan
    2015, 31(11):  55-59.  doi:10.11959/j.issn.1000-0801.2015263
    Asbtract ( 526 )   HTML ( 7)   PDF (1407KB) ( 1014 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A STBC-BF transmit scheme in massive MIMO system was proposed.Firstly,the signal was space-time block coded,then passed into the eigen-beamformers,respectively.At the receiver,the space-time decoding was performed on two orthogonal beams.The diversity gain and beamforming gain can be obtained simultaneously.Both theory analysis and simulation results confirm the validity of the proposed scheme.

    A Spread Spectrum Sequence for MC-CDMA System
    Zhicheng Zhang,Xiaona Huang,Li Xiong
    2015, 31(11):  60-66.  doi:10.11959/j.issn.1000-0801.2015305
    Asbtract ( 353 )   HTML ( 6)   PDF (2215KB) ( 872 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The MC-CDMA system takes the advantages of the OFDM system and the CDMA system.The MC-CDMA system is a kind of wireless communication aroused an ongoing and growing research interests,which has the characteristics of high bit transmission rate,high bandwidth efficiency,anti-jamming,and a large system capacity.Since the MC-CDMA system includes the multi-carrier modulation,it is difficult to design a spread spectrum sequence performing not only a high level of self-correlation and cross-correlation but also a low peak-to-average power ratio in the MC-CDMA system.To solve this problem,a spread spectrum sequence which was modulated by Golay code and m sequence was proposed.The spread spectrum sequence proposed owned a good performance in self-correlation,cross-correlation and peak-to-average power ratio.The simulation results show the effectiveness and the superiority of the proposed spread spectrum sequence.

    Service-Aware Algorithm Based on DT-KSVM
    Hao Dong,Hua Qu,Jihong Zhao,Liangjun Chen,Huijun Dai
    2015, 31(11):  67-71.  doi:10.11959/j.issn.1000-0801.2015227
    Asbtract ( 323 )   HTML ( 4)   PDF (1091KB) ( 720 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel service-aware method based on decision tree kernel support vector machine(DT-KSVM) algorithm was proposed.A service-aware model was developed by using ReliefF algorithm to extract service characteristics,and proposing the separable degree between samples to simply the service-aware process.Through experiment comparison between this proposed model and traditional one-versus-one SVM method,it is shown that the proposed method has a better service-aware accuracy and time performance.

    Design of Compact Circularly-Polarized and Broadband Slot-Loaded Microstrip Patch Antenna
    Fang Yang,Mingfei Wei,Min Wang,Chun Wang,Junni Zhou
    2015, 31(11):  72-76.  doi:10.11959/j.issn.1000-0801.2015222
    Asbtract ( 541 )   HTML ( 23)   PDF (1815KB) ( 1298 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The design method of a compact cross slot broadband or and circularly polarized microstrip patch antenna was presented.A wide cross-shaped slot was embedded on the square patch for size reduction.The substrate was a stacked structure of an FR4 and an air layer.An L-shaped strip was added in the slot and only by changing the feeding point on the strip,circular polarization or broad impedance bandwidth can be obtained.ANSYS HFSS simulation results show that the circular polarization bandwidth(AR≤3 dB)and impedance bandwidth(VSWR≤2) were 1.7% and 5.8%,respectively.The antenna had stable power gain within a broad bandwidth and its peak power gain was 7.8 dB.Meanwhile,52.3% patch area reduction can be achieved.The impedance bandwidth can be improved to 9.4 % by varying the feeding location and adjusting the two resonance frequencies of the antenna.Compared with traditional microstrip patch antennas,the impedance bandwidth was improved 114%.

    Stereo Image Segmentation Based on Graph Cut and Visual Correlation
    Qingyan Dai,Zhongjie Zhu
    2015, 31(11):  77-84.  doi:10.11959/j.issn.1000-0801.2015226
    Asbtract ( 355 )   HTML ( 5)   PDF (2219KB) ( 496 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Stereo image segmentation is a crucial and difficult issue in the field of object-based stereo image processing.By improving the Grabcut algorithm and exploiting the inter-view correlations,a novel stereo image segmentation scheme was proposed.The original left image was firstly transformed into a super-pixel image by improving the Slic algorithm.Then the super-pixel image was segmented and the foreground object in the left image is extracted based on the framework of Grabcut,where the energy function was rebuilt.Finally,by exploiting the inter-view correlations between the left and the right images,the foreground object in the right image was obtained based on contour correspondence by fusing color and texture features.The experimental results show that the proposed algorithm is more efficient and can achieve better segmentation results than the existing methods.

    An Association Rule Mining Scheme Based on Bit Operation and Reverse Index
    Yulei Huang,Xiaoxia Luo,Qing Lin
    2015, 31(11):  85-90.  doi:10.11959/j.issn.1000-0801.2015230
    Asbtract ( 323 )   HTML ( 3)   PDF (1395KB) ( 581 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An improved Apriori algorithm for association rule mining called Apriori-BR was proposed,which was based on bit operation and reverse index.Specifically,the reverse index from frequent itemsets to transactions was constructed firstly by scanning twice of database,and the reverse index was grouped by the length of transactions.Then in the mining process,bit operation was adopted to accelerate subset detection together with the dynamical elimination of invalid low-dimensional transactions.The numerical results show that the Apriori-BR proposed can substantially improve mining efficiency when compared with the conventional Apriori algorithm and the improved ones in the literature.

    A Spectrum Sharing Mechanism Between Narrowband M2M System and LTE System
    Guoping Chen,Qingbo Du
    2015, 31(11):  91-97.  doi:10.11959/j.issn.1000-0801.2015290
    Asbtract ( 354 )   HTML ( 3)   PDF (2083KB) ( 391 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Long term evolution(LTE)networks is an advanced mobile broadband network defined in 3GPP(3rd Generation Partnership Project),to satisfy the human to human communication requirement.With the quick developing of machine to machine communication requirement,how to deploy the M2M networks with a high speed,low cost and efficient manner is the definite requirement in the industry.A low cost M2M network which deploy co-sited with MBB networks and shared spectrum with MBB network was proposed.System simulations show the spectrum sharing mechanism can solve the inter-RAT interference influence and ensure the acceptable performance loss.And the mechanism is low cost and technical reasonable.

    Covariance Blind Detection Method Based on Eigenvector in Cognitive Radio Network
    Yingxue Li,Jing Lei,Shiyuan Zhong,Chunming Huang,Chao Huang
    2015, 31(11):  98-102.  doi:10.11959/j.issn.1000-0801.2015306
    Asbtract ( 309 )   HTML ( 5)   PDF (1135KB) ( 502 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the blind detection algorithm has the shortcoming that they need information about the channel and more than two cognitive users to detect the primary user,a new blind detection algorithm based on eigenvector using the difference of correlation between the primary user signal and noise signal covariance matrix was presented,and a closed expression was derived for the probability of false alarm and threshold.The proposed method overcomes the noise uncertainty problem only with two cognitive relays and performs well without information about the channel,primary user and noise.Numerical simulations show that the new detector performs better than other detectors.

    Column: family wisdom
    Construction of Smart Home System Architecture for Operating
    Jianting Han
    2015, 31(11):  103-109.  doi:10.11959/j.issn.1000-0801.2015310
    Asbtract ( 546 )   HTML ( 12)   PDF (2187KB) ( 834 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of the terminal and broadband network technology,smart home related services have been developed rapidly.The latest development of the smart home applications and related home network technology trends were analyzed firstly,and the key elements of the operating services of the smart home were demonstrated.On this basis,the system architecture of the operators to build smart home services was presented,and the related key technologies involved were analyzed,and the feasibility of the system was verified.

    Architecture and Key Capabilities of Management System of Smart Home Device
    Tao Guo,Jianting Han,Xiaoling Yang
    2015, 31(11):  110-115.  doi:10.11959/j.issn.1000-0801.2015311
    Asbtract ( 576 )   HTML ( 33)   PDF (2332KB) ( 1479 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Firstly,the operator's challenges of developing smart home system in the new situation were analyzed,then the key demands of smart home management system were studied.Finally,the platform framework,function framework and implementation suggestion of smart home management system was proposed.

    Analysis and Practice of the Smart Home Application Development Technology
    Longjie Xu,Wenda Ying
    2015, 31(11):  116-122.  doi:10.11959/j.issn.1000-0801.2015308
    Asbtract ( 474 )   HTML ( 8)   PDF (2458KB) ( 1543 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The present situation of the smart home application development technology was analyzed and a smart home application developing technology solution based on intelligent Wi-Fi connection module was put forward.The key technologies of the solution were analyzed and the feasibility of smart home application development technology based on this solution was verified.

    Wireless Quick Connection Technology for Smart Home Devices in Home Network
    Wenda Ying,Longjie Xu,Tao Guo,Zhiyong Ma
    2015, 31(11):  123-128.  doi:10.11959/j.issn.1000-0801.2015307
    Asbtract ( 370 )   HTML ( 9)   PDF (1231KB) ( 1235 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Most smart home devices don't have screens,the network configuration has become a big problem for users.For this,a variety of technical solutions have been proposed to deal with it.The existing Wi-Fi quick connection solutions were analyzed.Their characteristics,advantages and disadvantages were compared.Then according to the telecom operator's basis,an improved wireless quick connection solution which was suitable for the operators was proposed and it was verified technically.

    Method of Secure Domain Creation for Multiple Points in Home Networking
    Zhiyong Ma
    2015, 31(11):  129-133.  doi:10.11959/j.issn.1000-0801.2015313
    Asbtract ( 316 )   HTML ( 4)   PDF (1719KB) ( 376 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To simplify the process of multiple-point connection in home networking,new designs for user operation process,end point structure,state machine,and system process were presented.Analysis shows that the method proposed needs less operations and less time,lowers the faulty probability,and cuts down the service costs as well.

    Scheme of Smart Home Application Control Based on Cloud Service
    Bin Wang,Xiaoling Yang,Dongdi Xiao
    2015, 31(11):  134-139.  doi:10.11959/j.issn.1000-0801.2015312
    Asbtract ( 432 )   HTML ( 12)   PDF (1993KB) ( 1136 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    How smart home devices access network,how intelligent control terminals control the smart home equipment,and how smart home devices and application management platform manage users and devices,all the solutions of these problems are changing with the rapid development of smart home application.The application control mode of smart home service was showed,which leads to the key logic hierarchy structure of the application control mode.On the basis of the key logical hierarchy structure,application control scheme based on cloud services was discussed.Finally a summary was given.

    Wide operating technology
    Remote Interoperability Testing Client for Wireless Personal Area Network Protocol
    Xinyu Zhang,Xiaohong Huang,Pei Zhang
    2015, 31(11):  140-146.  doi:10.11959/j.issn.1000-0801.2015285
    Asbtract ( 308 )   HTML ( 4)   PDF (2305KB) ( 642 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    When the entities in one interoperability testing case were not suitable to be placed in the same physical location,the remote testing method was needed to complete the testing.In order to guarantee the success of the remote testing,a platform based on the Internet environment was built.A system structure was designed for assure the platform was suitable for wireless personal area network protocol.The framework mainly contained the device connection module and the data forwarding module.To illustrate the application of proposed approach,a real case study was proposed:the 6LoWPANs protocol.The results of the experimentation performed on this protocol were also presented.

    NFV Service Chain Resource Allocation Technology
    Hong Tang,Yujia Luo
    2015, 31(11):  147-152.  doi:10.11959/j.issn.1000-0801.2015300
    Asbtract ( 458 )   HTML ( 4)   PDF (1729KB) ( 795 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    SDN/NFV provides supporting technologies on network re-architecture and evolution for network operator.Service chain and related networking technology is becoming a significant use case of NFV,of which resource allocation is one of the key research points.The service chain status in quo was studied.The resource allocation mechanisms and related problems were analyzed.After that,a service function chain resource allocation scheme,which optimizes the usage of the network resource and realizes virtual network function instance deployment and route selection,was proposed.Experiment results show that the proposed method is able to serve more traffic.

    Internet Video Pre-Movie Advertising Service Strategy
    Quan Miao,Shuo Wang
    2015, 31(11):  153-158.  doi:10.11959/j.issn.1000-0801.2015237
    Asbtract ( 386 )   HTML ( 3)   PDF (1269KB) ( 355 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Internet video has presented a huge development potential,which makes advertising the main way of profit.As no related laws and regulations exist in our country,the pre-movie advertisement affects user experience seriously,resulting in prominent disputes and contradictions.Therefore,internet video pre-movie advertising service strategy was developed.The business model for video site and its impact on advertising service,the advertising style,timing and relevance to program were analyzed,under the overall environment of internet development.Finally,executable solution was proposed.

    Centralized Big Data Management Model of Object-Oriented Process Driven
    Qing Zhang
    2015, 31(11):  159-165.  doi:10.11959/j.issn.1000-0801.2015254
    Asbtract ( 326 )   HTML ( 4)   PDF (3047KB) ( 387 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Along with big data era,the rapid data growth,large-scale parallel processing and access requirements of increasingly urgent,partition the domain data storage,processing and application architecture has been gradually formed.Enterprises are urgent to achieve full network data integration management,effective data application,guarantee the data quality,give full play to the value of data management.Therefore,a centralized big data management model of object-oriented process driven was proposed.The model uses a life cycle method to tease out several typical data objects,and through a standardized process to drive the collaborative management of data.

    Maintenance Analysis Method Based on Big Data Processing Technology in Power Telecommunication Network
    Zhimin Yang,Bin Wu,Ran Shu
    2015, 31(11):  166-173.  doi:10.11959/j.issn.1000-0801.2015309
    Asbtract ( 317 )   HTML ( 5)   PDF (2281KB) ( 629 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The characteristics of power communication network equipment's maintenance,alarm and asset data were analyzed,and then the data preprocessing work was done by adopting attributes reduction and clustering method.The related index and influencing factors required by the analysis of equipment repair work were proposed.Meanwhile,the data mining method which combines the techniques of MapReduce and Apriori algorithms was presented.Finally,the proposed data mining method was applied to mine the actual network data.According to the mined results,the network maintenance work was analyzed from the perspectives of maintenance distribution,maintenance effectiveness on operated service,maintenance time-cost and so forth.

    Big Data Driving Economic Transformation
    Wenjian Liu,Sude Qing
    2015, 31(11):  174-178.  doi:10.11959/j.issn.1000-0801.2015314
    Asbtract ( 258 )   HTML ( 8)   PDF (781KB) ( 826 )   Knowledge map   
    References | Related Articles | Metrics

    Big data are widely woven into every sector and play an important role in the global economy as an essential factor of production.Big data can be brought together and analyzed to discern patterns,make better decisions so as to reduce production cost and increase the quality of products and services.A concise and comprehensive description that big data would have a significant influence on the structure of traditional industry including agriculture,industry and services,was given.Obviously,the big data industry is currently becoming a new economic growth point,promoting economic transformation and upgrading.

    Analysis on Mobility Management of Multiple PLMNs EUTRAN Networking
    Shangkun Xiong,Wenyi Li,ZhaoYe ,,Jie Chen,Qingyang Wang
    2015, 31(11):  179-184.  doi:10.11959/j.issn.1000-0801.2015276
    Asbtract ( 374 )   HTML ( 6)   PDF (2487KB) ( 1028 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The use cases of two or multiple PLMNs for one operator were provided.And then,the procedures of mobility management of multiple-PLMN networking were analyzed for different use cases.As a conclusion,it was feasible for a operator to achieve normal mobility management and keep continuity of service when EUTRAN networking with multiple PLMNs.

    Network Management System's Data Management Layer Based on Big Data Technology
    Wei Li
    2015, 31(11):  185-188.  doi:10.11959/j.issn.1000-0801.2015265
    Asbtract ( 367 )   HTML ( 4)   PDF (694KB) ( 591 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Data management layer is the core of data processing and management in network management system.The current situation and problems of network management system was introduced.To break the isolation between the professional network management system and promote data sharing,data domain should further be subdivided and the data model should be reconstructed,and technical framework of Hadoop+MPP was a better choice.The direction for the planning and design of the network management system was pointed out.Finally,the relation of data management layer platform and enterprise wide data sharing service platform was discussed.

    Network Management Method Based on Optimal Control
    Zhi Chai
    2015, 31(11):  189-192.  doi:10.11959/j.issn.1000-0801.2015303
    Asbtract ( 275 )   HTML ( 6)   PDF (1320KB) ( 423 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of access network technology,the burden of network management has greatly increased,and became more frequent.In such case,the network management will not only make the network system in good condition,but also need to make sure that the adjustment process of network is optimized.From the viewpoint of cybernetics,the problem in network management was studied.Based on optimal control theory,a method to optimize network management was proposed.The research results have been verified in Tianjin Unicom's network management system,the research on automatic control theory in network management will take important influence in this field.

    OPERATION TECHNOLOGY WIDE ANGLE
    Big Data Driving Economic Transformation
    Liu Wenjian, Qing Sude
    2015, 31(11):  2015314.  doi:10.11959/j.issn.1000-0801.20153134
    Asbtract ( 246 )   PDF (768KB) ( 190 )   Knowledge map   
    Related Articles | Metrics
    Big data are widely woven into every sector and play an important role in the global economy as an essential factor of production. Big data can be brought together and analyzed to discern patterns, make better decisions so as to reduce production cost and increase the quality of products and services. A concise and comprehensive description that big data would have a significant influence on the structure of traditional industry including agriculture, industry and services, was given. Obviously, the big data industry is currently becoming a new economic growth point, promoting economic transformation and upgrading.
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: