Please wait a minute...

Current Issue

    15 October 2010, Volume 26 Issue 10
    Topic: the mobile Internet business and application
    Research of Key Technique and Typical Applications in Mobile Internet
    Jingxin Shen
    2010, 26(10):  5-12.  doi:10.3969/j.issn.1000-0801.2010.10.002
    Asbtract ( 781 )   HTML ( 26)   PDF (1088KB) ( 737 )   Knowledge map   
    References | Related Articles | Metrics

    The paper focuses on the influence of the new technique to the mobile Internet,such as Web2.0,SaaS,cloud computing and so on,includes substantive characteristic,high level requirement,developing trend,key technique and basic enabler of the mobile Internet. On this basis,discusses typical mobile Internet applications,and finally proposes a new business model proposal.

    Research on Value-Added Services Development of Mobile Internet
    Li Yiming and Su Dan
    2010, 26(10):  13-18. 
    Asbtract ( 748 )   Knowledge map   
    Related Articles | Metrics
    The article describes the characteristics and trends of value-added services, followed by the development trends of mobile Internet applications, and finally focuses on the development path of the mobile Internet and the typical value-added services in all stages of development ,including mobile phone read, mobile IM, mobile payment and mobile phone ad.
    Mobile Internet’s Application in the Logistics Industry
    Jianxiong Zhang,Yi Zhang
    2010, 26(10):  19-24.  doi:10.3969/j.issn.1000-0801.2010.10.005
    Asbtract ( 852 )   HTML ( 21)   PDF (1302KB) ( 642 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the analysis of the characteristic of mobile Internet and logistics informatization,this article describes the mobile Internet’s core applications in the logistics industry,discusses the infrastructure and system composition and functions and key technique of the mobile transport application and vehicle tracking application,which could improve efficiency and service level and safety of transport.

    Cloud computing column
    Study on Active Web Services Based on Concept of Cloud Computing and HXFA Algorithm
    Tong Wang,Chunhui Zhao,Jun Lu
    2010, 26(10):  25-29.  doi:10.3969/j.issn.1000-0801.2010.10.007
    Asbtract ( 745 )   HTML ( 9)   PDF (1034KB) ( 238 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The cloud computing is an advanced computing concept and it is developed based on grid computing and distributed computing. XML active web service has following characteristics:data heterogeneity,data magnitude and service on demand which can be regarded as the application of the cloud computing with the ability of network computing. Facing the massive heterogeneous semi/non-structure data from the internet,the execution of the filter method is always the neck of the whole system. In view of this,this paper proposed hedge automata and its HXFA algorithm in order to improve the execution efficiency. Then,combining with the concept of the cloud computing,the algorithm is applied into the HXPS system and the system architecture and key techniques are presented in this paper.

    A Policy of Task Allocation Base on Distributed Cluster Computing Towards Cloud
    Zhi Zeng,Renyi Liu,Feng Zhang,Nan Liu
    2010, 26(10):  30-34.  doi:10.3969/j.issn.1000-0801.2010.10.008
    Asbtract ( 881 )   HTML ( 9)   PDF (1426KB) ( 561 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Distributed cluster system is the foundation of cloud computing,aiming to the requirements of high performance computing for cloud computing environment,improving the efficiency of system implementation,this paper analyzed distributed task allocation methods on the basis of the existing grid computing environment,and adopting task allocation strategy of dynamic load balance from the field of software,and the ideas of parallel computing and estimation about the power of computing on network node,proposed a policy of task allocation within the condition of cluster to big data. It was proved that the conclusion of the strategy on task allocation can enhance the overall computing performance effectively.

    Derived Cluster Triplet-Space From Typically Cloud Computing
    Chunling Xu,Guangquan Zhang
    2010, 26(10):  35-40.  doi:10.3969/j.issn.1000-0801.2010.10.010
    Asbtract ( 821 )   HTML ( 9)   PDF (1891KB) ( 290 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Review the typical cloud computing technology,HDFS is singled out to research. By analysing its elements we abstract several object sets and relation sets,even more we propose the concept of cluster riplet-space. Regress to implement from abstract level,HDFS use a centralization structure to implement cluster triplet-space that form the bottleneck of system performance and stagnation point of cluster. By rejecting the specific implementation,triplet-space construct a setting to define question on abstract level.

    Study on Multi-Tenancy and Security Technology in SaaS Applications
    Jiehui Ju,Jiyi Wu,Jianlin Zhang,Jianqing Fu
    2010, 26(10):  41-46.  doi:10.3969/j.issn.1000-0801.2010.10.011
    Asbtract ( 969 )   HTML ( 21)   PDF (2208KB) ( 1196 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the maturity of Internet technology,the ideas of SaaS(software as a service)in the software industry has been confirmed and transformed software form traditional products into a service,SaaS model is becoming the trends of application software market development. After the presentation of the origin and development of SaaS,the implementation methods of multi-tenancy were studied as the core technology before a detailed analysis of SaaS security from technical and non technical aspects. The market recognition means SaaS has become an important force in the software industry.

    Analysis on Application of Cloud Computing in Telecom Support Systems
    Caixia Tao,Kang Chen,Ying Hao
    2010, 26(10):  47-51.  doi:10.3969/j.issn.1000-0801.2010.10.012
    Asbtract ( 846 )   HTML ( 20)   PDF (1494KB) ( 597 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In this paper,cloud service types are introduced,and the maturity of key technology used in cloud computing are discussed. Then detailed requirement of cloud computing in telecom support systems is analyzed. To China Telecom as an example,advice on the solution choice of cloud computing in telecom support systems is provided,and the solution is discussed focus on server virtualization.

    Security Analysis of Structured Multi-Signature Scheme and Its Improvement
    Jun Zhang
    2010, 26(10):  52-55.  doi:10.3969/j.issn.1000-0801.2010.10.014
    Asbtract ( 729 )   HTML ( 11)   PDF (434KB) ( 265 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The multi-signature provides that multiple signers can cooperate to sign the same message,which can be used in cloudy security. Burmester. proposed a structured multi-signature compare with other multi-signature,the scheme was more secure,and it provided co-signers with different role/position have different management liability and authorization capability. But this scheme was not safety enough because the scheme was very easy aggressed by the forgery attack,and the paper gives the corresponding attacks to the scheme. At last,this paper proposes an improved multi-signature scheme with verifying signature parameter,in this method,the new scheme can resist attacks as above mentioned. And the length of the signature in the new scheme is independent of the number of signature members.

    research and development
    Network Coding Technology in Wireless Network
    Hengyou Wang,Mugen Pen,Wenbo Wang,Hequan Wu
    2010, 26(10):  56-65.  doi:10.3969/j.issn.1000-0801.2010.10.015
    Asbtract ( 1007 )   HTML ( 12)   PDF (1437KB) ( 1018 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Network coding is a novel technique to improve network throughput and performance. It is expected to be a key technology for networks of future. This paper gives a survey on the network coding applicated in wireless networks which is considerd to be one of the most likely applications of network coding. Network coding allows to take advantage of the broadcasting nature of the shared wireless medium. Wireless networks and sensor networks provide opportunities for the application of network coding. In this paper,we introduce several network coding and corresponding encoding strategies under different scenarios. These include traditional network coding,physical layer network coding,analogue network coding and complex field network coding as well. We also give remarks on wireless network coding in the future.

    Effective Multicast Source Authentication Protocol Based on Hash-Chaining
    Geng Lin,Zhanxi Qiao,Xin Yu
    2010, 26(10):  66-70.  doi:10.3969/j.issn.1000-0801.2010.10.017
    Asbtract ( 801 )   HTML ( 15)   PDF (904KB) ( 249 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To the main limitation that current multicast source authentication protocol based on the idea of Hash-chaining have authentication delay at the receivers and are not robust against packet losses,this paper presents an effective multicast source authentication protocol based on Hash-chaining. In this protocol,the Hash value is put into preceding packet,and the first sending packet is signed in Hash-chaining,performing authentication in real-time at receivers. Through selecting object packet in a reasonable manner,the ability of tolerating packet loss is improved. At the same time,through adding threshold of variety at receiver,it changes the feedback way of losing packet ratio at receivers in subnet so as to save bandwidth and alleviate computation overheads at sender. The design of new protocol is concretely presented in this paper. Through comparing with related multicast source authentication protocol,it has the following traits:performing authentication in real-time at receivers, tolerating packet loss,saving bandwidth and alleviating computation overheads at sender.

    An Asymmetrically Bidirectional Base-k Chord
    Huayun Yan,Jihong Guan,Weihua Zhan,Yunliang Jiang
    2010, 26(10):  71-79.  doi:10.3969/j.issn.1000-0801.2010.10.019
    Asbtract ( 1056 )   HTML ( 9)   PDF (2655KB) ( 311 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To improve the routing efficiency of Base-k Chord,this paper proposes a new finger table for Base-k Chord by using an asymmetrically bidirectional structure. Concretely,keeping the odd items in the finger table unchanged,while re-directing the even items,which does not change the size of the finger table. A routing algorithm for this new Chord structure is developed, which can always chooses the next finger for routing that is nearest to the destination node. For performance comparison,the 2-Chord is extended to symmetrically bidirectional Chord. Experimental results show that the routing efficiency of symmetrically bidirectional Chord archives no much improvement in performance,while the proposed asymmetrically bidirectional Base-k Chord outperforms its counterparts.

    Research of Distributed Pre-Decision Engine in Wireless Intrusion Prevention Systems
    Guanlin Chen,Yan Feng,Zebing Wang
    2010, 26(10):  80-86.  doi:10.3969/j.issn.1000-0801.2010.10.020
    Asbtract ( 797 )   HTML ( 16)   PDF (2096KB) ( 676 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Nowadays wireless intrusion prevention systems have become the research hotspot with the fast development of WLAN. In this paper,we first introduce the common attack methods for WLAN,and then present the framework of the wireless IPS with a distributed pre-decision engine,which can predict the future actions and direct active responses to these actions. We implement an improved model with extended detection rules for conducting intrusion plan and making pre-decision,by gathering wireless device information and importing supporting degree of intrusion plan in plan recognition. Experimental results showed that the distributed pre-decision engine can not only improve wireless intrusion detection and prevention performance,also reduce false negatives and false positives evidently.

    New Secure and Efficient Distributed Data Storage Approaches for Unattended Wireless Sensor Network
    Rong Fan,Lingdi Ping,Jianqing Fu,Xuezeng Pan
    2010, 26(10):  87-92.  doi:10.3969/j.issn.1000-0801.2010.10.022
    Asbtract ( 795 )   HTML ( 9)   PDF (1033KB) ( 382 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the applications of unattended wireless sensor networks(UWSN),sensor nodes always are deployed in hostile area and are difficult to communicate with each other. Besides,the network user need abstract sensed data not real time data in some scene. Thus the sensor nodes need to store the sensed data until receiving the request of data. However,the distributed architecture makes it challenging to build a secure and efficient data storage system due to the resource-constrained nature of sensor node. Besides,due to the lack of physical protection,WBAN are vulnerable to attacks when deployed in hostile environments. In order to address the challenges,we propose a novel secure and efficient data storage scheme with dynamic integrity checking in this paper. Based on the policies of multiple secret sharing,we first propose secure and efficient patient-related data storage and access scheme for UWSN. Furthermore,to dynamically check the integrity of the distributed data shares,we then propose an efficient data integrity verification scheme based on orthonormal vectors. Finally,the security and performance analysis shows that the proposed scheme is secure and practical for UWSN.

    Research for Secure Physical Layer Network Coding
    Waixi Liu,Xiao Hu,Dong Tang,Hui Zheng
    2010, 26(10):  93-97.  doi:10.3969/j.issn.1000-0801.2010.10.024
    Asbtract ( 951 )   HTML ( 10)   PDF (758KB) ( 449 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Because of broadcast nature of wireless communication,collision is popular in wireless network. Utilizing the existing interference of different signals received concurrently,physical-layer network coding(PLNC)can significantly improve the throughput of system. However,there are some special security problems for PLNC at this same time. This paper contributes this following:based on analyzing how physical layer network coding to run,some security problems,such as destroying requirement, amplitude attacks,energy attacks,are digged out,and one basic solution is showed to deal with them. Up-to date related issues of PLNC schemes and future trends will be discussed. One thinking which integrate cloud computing with network coding is proposed. Its core idea is to construct one everywhere,terminal-switch,down-top,computing network.

    A Novel Wide-Beam Circularly Polarized Microstrip Antenna
    Zhao Hongmei,Niu Yanjuan and Wang Yunfei
    2010, 26(10):  98-102. 
    Asbtract ( 706 )   Knowledge map   
    Related Articles | Metrics
    The paper presents a microstrip antenna applied to global positioning system(GPS),have a greater beam width and good circular polarization characteristics. The slotted ground plane microstrip antenna and pyramidal horn structure are adopted,the ground plane embedded slots can excite circularly polarized(CP)radiation,then slotted ground plane microstrip antenna placed on the pyramidal horn structure can reached a wide-beam. The simulation results show that the antenna in the E plane and H plane to get wide beams,E plane beam width is greater than 123 °,and H plane beam width is greater than 136 °,while the circular polarization characteristics are remarkable within the beam width.
    Analysis and Study of the Application Status of EV-DO Rev B Terminal
    Guohua Dai,Zibin Zhao,Zhaoyuan Liu
    2010, 26(10):  103-108.  doi:10.3969/j.issn.1000-0801.2010.10.027
    Asbtract ( 823 )   HTML ( 11)   PDF (1798KB) ( 317 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This article introduced the application status of the EV-DO Rev B terminal,and analysed the key technologies and itˊs characteristics of Rev B terminal. It also studied aspects of commercial,such as RF performance,data application performance,field test compatibility and so on.

    Study on Social Network of Mobile Phone User
    Xinxin Qiao,Jihong Zhu,Yong Shen
    2010, 26(10):  109-114.  doi:10.3969/j.issn.1000-0801.2010.10.029
    Asbtract ( 842 )   HTML ( 17)   PDF (863KB) ( 645 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With a sample of college users,based on strength tie theory,the current study adopts name generator in ego-centered network to explore the social networkˊs feature of mobile phone user. The result suggests that the mean of mobile phone usersˊnet work size is 9.7,personal network size is 6 or 7,group network size is 3 or 4,and the type of relationship is 3 or 4. The top five relationships are lovers or good friends,parents,roommate or neighbor,classmate and kinsman.

    Virtual Network Mapping Algorithm With Node Repeatable Embedding and Link Splitting
    Wen Li,Chunming Wu,Jian Chen,Lingdi Ping
    2010, 26(10):  114-120.  doi:10.3969/j.issn.1000-0801.2010.10.030
    Asbtract ( 1209 )   HTML ( 10)   PDF (2184KB) ( 417 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the previous research,a virtual network mapping algorithm with repeatable mapping over substrate nodes is put forward,in which,multiple virtual nodes in the same virtual network can be mapped to the same substrate node if there is enough resource capacity. That not only cuts down some virtual link mapping processes and reduces the mapping time,but also saves the substrate link cost and makes more virtual networks mapped. In addition,link splitting is introduced so that some low bandwidth resource can be used effectively to improve the mapping. Experiments show that new algorithm performs better in runtime,mapping percentage and mapping revenue.

    A Framework of Network-Level OD Flow Anomaly Detection Based on High Aggregate Link Measurement
    Song Yang,Zonglin Li
    2010, 26(10):  121-126.  doi:10.3969/j.issn.1000-0801.2010.10.032
    Asbtract ( 753 )   HTML ( 9)   PDF (1036KB) ( 261 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper presents a framework of network-level OD flow anomaly detection,that uses RMLP neural network,and adds some OD flow estimation as a constraint input,which estimated the OD flow parameters by the link-level measurement .

    Research on Application of Wireless Sensor Network Based on 3G in Intelligent Distribution Network
    Weihong Xie,Jianjun Zhang
    2010, 26(10):  127-131.  doi:10.3969/j.issn.1000-0801.2010.10.033
    Asbtract ( 837 )   HTML ( 13)   PDF (1101KB) ( 365 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An application model of wireless sensor network based on 3G in intelligent distribution network was presented. The concept and application character of wireless sensor network based on 3G was introduced. Based on analysis of structures of intelligent distribution network,the topology of 3G wireless sensor networks and a mix redundant routing model was proposed. The design of 3G sensor node was produced.

    Research on Distributed Cooperation Solution Method of Complex Diagnosis System Based on MAS
    Weijin Jiang,Dongbo Cao,Yuhui Xu,Dejia Shi
    2010, 26(10):  131-140.  doi:10.3969/j.issn.1000-0801.2010.10.034
    Asbtract ( 762 )   HTML ( 11)   PDF (2025KB) ( 378 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To adapt the model in reconfiguring fault diagnosing to dynamic environment and the needs of solving the tasks of complex system fully,the paper introduced multi-agent and related technology to the complicated fault diagnosis,an integrated intelligent control system is studied in this paper. Based on the thought of the structure of diagnostic decision and hierarchy in modeling,based on multi-layer decomposition strategy of diagnosis task,a multi-agent synchronous diagnosis federation integrated different knowledge expression modes and inference mechanisms are presented,the functions of management agent, diagnosis agent and decision agent are analyzed,the organization and evolution of agents in the system are proposed,and the corresponding conflict resolution algorithm in given,layered structure of abstract agent with public attributes is build. System architecture is realized based on MAS distributed layered blackboard. The real world application shows that the proposed control structure successfully solves the fault diagnose problem of the complex plant,and the special advantage in the distributed domain.

    An Incentive Strategy of Voting in the C2C E-Commerce Environment
    Bowei Yang,Guanghua Song,Yao Zheng
    2010, 26(10):  141-146.  doi:10.3969/j.issn.1000-0801.2010.10.035
    Asbtract ( 738 )   HTML ( 8)   PDF (1442KB) ( 317 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Recently,lots of blank votings exist in the popular C2C networks. Moreover,sellers may threaten buyers to give out a“Good”rating even they provided inferior resources. Both the sellers and the buyers may be badly harmed by the reputation system which provides a pseudo referential reputation hint for the later buyers. This paper brings the incentive strategy for the buyers into the reputation system to regulate the voting behaviors,to improve the quality of the votings and the fidelity of the referential reputation hints. The simulation results show that this model is effective in the promotion of the initiative responsible votings,the improvement of the reputation hints,and the prevention of indiscriminate votings.

    Observation and communication
    Research of How TDM PBX Connect to IMS
    Xiaojun Hou,Liming Lu,Huahong Zhang
    2010, 26(10):  147-151.  doi:10.3969/j.issn.1000-0801.2010.10.037
    Asbtract ( 859 )   HTML ( 8)   PDF (959KB) ( 652 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    While carrierˊs core network changes to IMS,it is need to support the existing network elements,such as TDM PBX. This paper analysises the solution of how TDM PBX connect to IMS,describes the problems of the solution,and provides the way to notify flash-hook event.

    research and development
    A Novel Wide-Beam Circularly Polarized Microstrip Antenna
    Hongmei Zhao,Yanjuan Niu,Yunfei Wang
    2010, 26(10):  198-102.  doi:10.3969/j.issn.1000-0801.2010.10.025
    Asbtract ( 306 )   HTML ( 6)   PDF (1457KB) ( 503 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The paper presents a microstrip antenna applied to global positioning system(GPS),have a greater beam width and good circular polarization characteristics. The slotted ground plane microstrip antenna and pyramidal horn structure are adopted, the ground plane embedded slots can excite circularly polarized(CP)radiation,then slotted ground plane microstrip antenna placed on the pyramidal horn structure can reached a wide-beam. The simulation results show that the antenna in the E plane and H plane to get wide beams,E plane beam width is greater than 123 °,and H plane beam width is greater than 136 °,while the circular polarization characteristics are remarkable within the beam width.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: