Please wait a minute...

Current Issue

    20 February 2015, Volume 31 Issue 2
    Viewpoint focusing
    Big Data, Machine Intelligence and Their Impacts to the Future World
    Jun Wu
    2015, 31(2):  1-10.  doi:10.11959/j.issn.1000-0801.2015054
    Asbtract ( 1199 )   HTML ( 65)   PDF (2312KB) ( 1965 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Big data has become the next frontier for innovation, competition, and productivity since 2008. However, most people still limited their vision on the quantity and the variety of big data, while ignored the crucial role it played in machine intelligence that was taking off recently.Therefore,comprehensive analysis on global and disruptive impacts to the future world due to big data and machine intelligence development was made. It was started from the introduction on development history of machine intelligence. The important role of big data to solve the problem of machine intelligence was analyzed. Combined with the actual case, the meaming of big data and the similarity and differences of big data and large data were investigated.The key techniques of big data and machine intelligence were described.Finally the challenges for futrure world due to machine intelligence development were discussed.

    research and development
    Smart and Cooperative Networks: Background, Basic Ideas and Progress
    Hongbin Luo,Hongke Zhang
    2015, 31(2):  11-21.  doi:10.11959/j.issn.1000-0801.2015055
    Asbtract ( 310 )   HTML ( 6)   PDF (3383KB) ( 556 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To address the various serious issues of the current internet, such as poor scalability and security, poor support for mobility, low resource utilization ratio, and energy harvesting, the National Engineering Lab on Next Generation Internet Interconnection Devices at Beijing Jiaotong University proposed a novel future internet architecture called the smart and cooperative networks. The background, the main ideas, and the progress on the research of the proposed internet architecture were briefly introduced.

    Power Efficient Load Balancing Algorithm in LTE-A Heterogenous Network Based on Assignment Model
    Kai Liu,Jianye Zhao,Zhimin Liu
    2015, 31(2):  22-28.  doi:doi:10.11959/j.issn.1000-0801.2015046
    Asbtract ( 163 )   HTML ( 2)   PDF (2306KB) ( 312 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Energy consumption of wireless network is receiving more and more attention and has become one of key aspects of 5G while few researches on heterogeneous network (HetNet)load balancing focused in power consumption. User power model was built towards assignment model, based on which the augmented assign algorithm was proposed to minimize power of HetNet on condition of limited user data load. Simulation on system level platform show that power is effectively saved no matter base stations support sleep mode or not, meanwhile, ensure data rate of users.

    Simulation and Analysis on Performance of Space-Time Coding in MIMO
    Shequan Jiang,Jing Wang,Chao Peng
    2015, 31(2):  29-35.  doi:10.11959/j.issn.1000-0801.2015019
    Asbtract ( 346 )   HTML ( 5)   PDF (2291KB) ( 950 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The theory of layered space-time code,space-time block code,space-time trellis code were introduced, and the technology of combing STC and OFDM was researched.Then,several MIMO system models were built in different STC conditions and their BER performances were simulated. The simulation results were analyzed. Finally, the advantages and disadvantages of three kinds of STC and the advantages of STC-OFDM were summarized. Some other application combined with STC such as cooperative relay transmission system and the prospect of STC were discussed.

    Requirements Analysis of Data Center Network Routing Algorithm Based on SDN Architecture
    Zifu Fan,Chunling Wu,Jinhong Wang
    2015, 31(2):  36-45.  doi:10.11959/j.issn.1000-0801.2015038
    Asbtract ( 341 )   HTML ( 4)   PDF (2413KB) ( 1378 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of SDN technology, SDN-based data center network will be more extensive. The applications of SDN technology in data center network were focused on; the technical characteristics of modern data center network and SDN technology were analyzed firstly, and a modern data center network architecture based on SDN was designed. Then the requirements of the data center network routing performance based on the SDN were analyzed and summarized and the solutions were proposed in order to provide the reference for the future construction and routing design of the data center network in China.

    Low Cost Safety Data Storage and Processing Framework Under Cloud Environment
    Limin Zhang
    2015, 31(2):  46-51.  doi:10.11959/j.issn.1000-0801.2015049
    Asbtract ( 269 )   HTML ( 3)   PDF (1197KB) ( 362 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cloud-based data storage and processing framework, which enables users can economically and securely share and handle big datasets with low cost, was proposed. The framework studied data mining algorithms based on the matrix, whose focus was the secure Top-k feature vector algorithm. The algorithm used an iterative processing model and the authorized user interacted with the cloud to achieve the expected result. In this process, the interaction of source matrix and intermediate results were kept confidential. In addition, the security of this algorithm was guaranteed by using Paillier encryption and a random perturbation technique. Experimental results show that the proposed method is scalable to big matrices while requiring low client-side costs.

    Research on Simulation of Multi-Path Fading of Narrow-Band Channel Based on Stochastic Bridge
    Lei Liu,Wei Xia,Jianghong Han
    2015, 31(2):  52-62.  doi:10.11959/j.issn.1000-0801.2015010
    Asbtract ( 200 )   HTML ( 0)   PDF (4759KB) ( 395 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The propagating stochastic rays were employed to simulated multi-path components(MPC), which tracks were represented by samples of stochastic bridge processes. The laws of physics about stochastic ray diffusing in percolation lattices were studied to improve constraints of physical diffusion, which made it with enough samples to model power delay probability. According to experimental, different wavelengths of beam were simulated to diffuse in percolation lattices with different scatters density. Coherence bandwidths, bit error rate and statistics characteristics of power were acquired to verify that stochastic ray model can fit to the characteristics of the multi-path fading channel, which can predict channel parameters in specific locations.

    Fair Resource Allocation Algorithm for OFDMA System with Imperfect CSI
    Yaohui Wu,Youming Li,Liping Jin,Pengfei Shao
    2015, 31(2):  63-68.  doi:10.11959/j.issn.1000-0801.2015011
    Asbtract ( 341 )   HTML ( 1)   PDF (2294KB) ( 402 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Existing resource allocation algorithms can't balance system capacity and fairness well when the channel state information is imperfect. In order to solve this problem, a fair resource allocation algorithm was proposed to maximize the system ergodic capacity, while the fairness could be adjusted flexibly by introducing the fairness relaxation factor. In order to reduce the complexity in the use of dual optimization method for solving the lagrange operator process, an iteration searching method in the same layer was proposed to replace the traditional multi-layer iteration searching method. Simulation results show that the proposed algorithm can effectively maximize the system ergodic capacity and guarantee the fairness, while the computational complexity was reduced significantly.

    Secure Transmission Based on Antenna Selection for Network Coding System
    Dan Deng,Ming Zhao,Guizhou Jian
    2015, 31(2):  69-74.  doi:10.11959/j.issn.1000-0801.2015041
    Asbtract ( 205 )   HTML ( 0)   PDF (2021KB) ( 302 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the secrecy capacity of analog network coding system, antenna selection based transmission scheme was investigated. The selection criteria for the source nodes and relay nodes were proposed over a slowly varying channel. The optimal selection criterion for maximum secrecy capacity and the suboptimal selection criterion for maximum channel gain ware investigated. Simulation results show that the selection scheme of combined main channel capacity maximum(CMCCM)outperforms other schemes with the most computation burden. Compared with the fixed selection, the proposed scheme shows about 5 dB gain in ergodic secrecy capacity. Specifically, the independent channel gain maximum(ICGM)scheme holds the similar performance compared with CMCCM scheme, while ICGM scheme can release the computation burden.

    Flow Allocation Algorithm Based on Potential Game in Multi-Source Multi-Hop Wireless Sensor Network
    Wei Zhang,Linghua Zhang
    2015, 31(2):  75-79.  doi:10.11959/j.issn.1000-0801.2015032
    Asbtract ( 231 )   HTML ( 1)   PDF (1657KB) ( 349 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Data integration and network optimization play an important role in wireless sensor network which is data-centric. Network coding has been used as an efficient method to improve network throughput over wireless environments. The problem of broadcasting K different contents to D destinations from N sources in wireless network was considered. A dynamic control scheme that allows sources split traffic was proposed. The scheme adjusts the traffic based on the utility function to increase the number of coding opportunities. The theoretical analysis and simulation results show that the proposed scheme is stable and effective.

    Gateway Deployment Optimization in Wireless Mesh Backbone Network Based on Closeness Centrality
    Chengxin Guo,Taoshen Li,Zhihui Ge
    2015, 31(2):  80-85.  doi:10.3969/j.issn.1000-0801.2015045
    Asbtract ( 231 )   HTML ( 3)   PDF (1566KB) ( 357 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Directional antenna and Delaunay graph were used in the gateway deployment optimization of wireless mesh backbone network and a gateway deployment optimization algorithm of wireless mesh backbone network based on closeness centrality was proposed. Firstly, according to the largest traffic of mesh router and gateway, the algorithm divides the network into a few clusters forming Delaunay sub-graph. In the sub-graph, according to the Euclidean distance of each nodes to the center nodes, the algorithm find out the closest three nodes to the center nodes and form the gateway candidate set. The node in this gateway candidate set, which has the shortest route path to the other nodes, is the location of gateway of this cluster. Gateway location of each sub-graph will be achieved in the end. Simulation experimental results show that, after reasonable network partitioning according to the largest traffic of gateway, the algorithm can minimize the number of network gateway. The total path length from the mesh routers to the gateway of the algorithm is better than that of the random algorithm.

    An Incremental Classification Algorithm for Data Stream Based on Information Entropy Diversity Measure
    Chunhua Ju,Jiangbo Zou
    2015, 31(2):  86-96.  doi:10.11959/j.issn.1000-0801.2015014
    Asbtract ( 259 )   HTML ( 0)   PDF (7286KB) ( 490 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The diversity between classifiers was studied and an incremental classification algorithm for data stream based on information entropy diversity measure was proposed, the method of information entropy diversity measure was integrated into the selection process of base classifiers, the information entropy diversity of base classifier which trained from training data was calculated, by means of cyclic iterative as optimization method and entropy diversity as optimization constrained goal, the numbers of base classifiers was dynamic adjusted that improved the classification accuracy and stability to reduce system costs. The experiments prove that the algorithm has less cost and strong adaptability compare with other data stream algorithm when processing data stream.

    Evaluating Uncertainty Behaviors of Cognitive Users Against SSDF Attack for Cooperative Spectrum Sensing
    Jingyu Feng,Jinlong Li,Guangyue Lu
    2015, 31(2):  97-102.  doi:10.11959/j.issn.1000-0801.2015025
    Asbtract ( 220 )   HTML ( 0)   PDF (1566KB) ( 280 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the uncertainty behaviors of cognitive users, an evaluation mechanism based on D-S theory, called HardGuard, was proposed to guard the hard-decision fusion schemes. Before fusing data, HardGuard will filter out false sensing data to avoid the impact of malicious users. The simulation results show that HardGuard is effective in suppressing spectrum sensing data falsification attack, and it can ensure the better sensing performance for the hard-decision schemes.

    Optimal Routing Between Clusters Based on Circular Search Method in WSN
    Xiang Yu,Lei Liu,Kun Wu
    2015, 31(2):  103-107.  doi:10.11959/j.issn.1000-0801.2015026
    Asbtract ( 213 )   HTML ( 0)   PDF (1748KB) ( 342 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of the nodes' energy consumption balance caused by single hop routing algorithm in LEACH protocol. By calculation and analysis of the optimal number of hops of inter cluster multi-hops, the cluster head node got an ideal path to the base station. A ring search method was proposed to find the optimal path close to the ideal path. Then, a multi-hops routing algorithm from the cluster head to the base station was obtained. The experimental results show that the performance of the multi-hops routing algorithm from the cluster head to the base station compared with LEACH protocol is higher in the balance of nodes' energy consumption and prolong the network lifetime.

    RLS Beamforming Algorithm Based on Wavelet Transform
    Jihong Zhao,Pei Lei,Weihua Wang,Hua Qu,Dan He
    2015, 31(2):  108-112.  doi:10.11959/j.issn.1000-0801.2015029
    Asbtract ( 378 )   HTML ( 0)   PDF (1298KB) ( 405 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    On the basis of analyzing the recursive least square algorithm(RLS), in order to improve the performance of RLS algorithm, the idea of denoising by wavelet transform was introduced and the RLS beamforming algorithm which is based on wavelet transform was put forward. This algorithm uses soft thresholding wavelet transform for signal denoising, solves the problem that the traditional Adaptive beamforming algorithm is sensitive to noise and the steady-state error is big under the environment of the low signal to noise ratio(SNR)and small forgetting factor. Finally, the simulation results show that compared with the traditional RLS algorithm, this algorithm has smaller steady-state error and fast tracking speed and convergence speed, and good results of beamforming.

    Research on Trusted Measurement of Industrial Control Network with Markov Reward Model
    Senxin Zhou,Jianghong Han,Chao Li,Decheng Wu
    2015, 31(2):  113-117.  doi:10.11959/j.issn.1000-0801.2015013
    Asbtract ( 181 )   HTML ( 0)   PDF (1743KB) ( 282 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    After analyzing the current situation of industrial control systems security research, a award Markov trustworthy assessment model was set up by using the theory of state analysis and trusted network. The value for the security, survivability and controllability of trustworthy industrial control network system can be computed. Furthermore the trusted value can be get from them. The research result will lay a solid foundation for trusted industrial control network research work.

    Overview
    Research on Energy Harvesting Communication System
    Jian Feng,Pingyang Wang,Lin Wang,Xing Zhang
    2015, 31(2):  118-125.  doi:10.11959/j.issn.1000-0801.2015050
    Asbtract ( 300 )   HTML ( 1)   PDF (1783KB) ( 760 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Energy harvesting(EH)is becoming a promising technology for future wireless communication network for its potential of saving nonrenewable energy and making the communication environmentally friendly. However, due to the unpredictable and intermittent nature of energy source, the capacity of storage devices, as well as the unpredictable nature of the communication channel and users' arriving data, the road to the communication system powered solely by harvested energy is plagued with potholes. Despite this, remarkable progress has been made in applying energy harvesting to wireless communications. An extensive survey on the current development status and main research fields was made, and the most common used model, system framework and optimization methods were analyzed carefully. Finally the future development for applying EH to communication systems was concluded.

    Operating technology wide-angle
    Study on Uniform Resource Model Design Method Based on Major Class and Metadata
    Yanbin Shi,Gengshu Su,Ling Li,Yijie Jiang
    2015, 31(2):  126-134.  doi:10.3969/j.issn.1000-0801.2015022
    Asbtract ( 254 )   HTML ( 4)   PDF (3780KB) ( 866 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Firstly, the bondage of the unified resource model were researched, which were hard modeling and using physical and logical class as the top class. Secondly, the methods were put forward that are major class modeling and meta data driving and using geometric shape as the top class. Lastly, the over view of the unified resource model was designed and the sticking points were given, that were unified ware model and unified link model and restored physical object and logical object and compatible with the entire network.

    WLAN Access Point Indoor Positioning Technology
    Chang Liu,Xun Zhang
    2015, 31(2):  135-139.  doi:10.11959/j.issn.1000-0801.2015012
    Asbtract ( 221 )   HTML ( 0)   PDF (1575KB) ( 574 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the distinctive characteristics of indoor positioning technology which is different from outdoor positioning due to the complexity of the indoor environment, an indoor AP hybrid positioning method based on floor discrimination and signal strength was proposed. The method consists of two parts, the floor discrimination and the specific location of the AP. The method using association algorithm to determine the floor in order to filter out the target AP, and then it to determine the positioning method according to the position relationship between the test point and the target AP. If the target AP in the vicinity of the test point, the centroid localization algorithm was used, otherwise the weighted-style positioning algorithm was used. The positioning test results in the actual scene show that the positioning effect of the method is good and the method has a small deviation.

    Research on Virtual Machine Placement in Cloud Data Center
    Yongbing Fan,Tian Chen,Nan Chen,Zhilan Huang,Cui'e Lv
    2015, 31(2):  140-146.  doi:10.11959/j.issn.1000-0801.2015023
    Asbtract ( 428 )   HTML ( 11)   PDF (974KB) ( 581 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The key issues of virtual machine placement and the related algorithms, optimization goals, algorithms evaluation, benchmark models, verification tools were summarized. The typical algorithms of virtual machine placement were introduced. The characteristics of virtual machine placement of the backbone internet and the related reference values to the engineering practice of the cloud datacenter were analyzed. From the perspective of the adaptation of algorithm and engineering, several important principles for the key problems of the design and operation of cloud datacenter were proposed systematically, such as monitoring and measurement, service model, SLA and tariff design, cloud resource pool design, size and architecture of resource pool, service zone, migration control design, resource balance of resource pool, function design of logical network and physical network, and possible innovation.

    Model Analysis of FDD-LTE Forward Interference and Capacity
    Ge Zhou,Junwen Wang
    2015, 31(2):  147-151.  doi:10.11959/j.issn.1000-0801.2015039
    Asbtract ( 224 )   HTML ( 1)   PDF (1768KB) ( 520 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The forward interference is an important factor that affects the FDD-LTE network capacity and user experience. FDD-LTE forward interference and capacity were analyzed. A forward interference model was proposed under various network loads. Simulation result of ideal and practical network is approximate to the road test result. The model provides evaluation method with high precision for practical business network and it can provide important information for business development and network invest.

    Study and Applying of Search Engine Technique in Mobile Internet Music
    Yiping Yang,Yuzhong Zhang,Haojie Yang,Pingbo Song
    2015, 31(2):  152-157.  doi:10.11959/j.issn.1000-0801.2015036
    Asbtract ( 245 )   HTML ( 2)   PDF (1194KB) ( 663 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The music business of China Telecom have high performance, more reasonable precision ratio and recall ratio, timeliness of indexing and other needs in music search to meet the requirements for mobile internet users. The search engine technology for applications in the field of music search was explored and a solution of music search for the mobile internet users was put forward. The hierarchy searching strategies improve the flexibility of the search engine when combining it's searching rules. The indexing mechanism which implements by integrating the memory index and the file index ensures to present music in time.

    Resource Allocation Schemes Between Multi-Hop Backhaul Network and Access Network
    Hongtao Yang,Yehui Liu,Yu'e Song,Shewen Sun,Lin Liu
    2015, 31(2):  158-162.  doi:10.11959/j.issn.1000-0801.2015047
    Asbtract ( 179 )   HTML ( 1)   PDF (1467KB) ( 674 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A non-contention in-band multi-hop system based on OFDM was built. Two configurations of two-hop relay network were proposed and comparatively analyzed. The resource allocation issue between multi-hop backhaul network and access network was investigated. The relay backhaul network and access network share the same resource. By using calculation and a static system level simulation, the relationship among resource allocation results of the relay schemes, cell coverage and channel status was revealed.

    Discussion of the Target Network Structure and Network Models Based on SDN in IP RAN Network
    Libo Chen,Ning Qin
    2015, 31(2):  163-168.  doi:10.3969/j.issn.1000-0801.2015037
    Asbtract ( 243 )   HTML ( 3)   PDF (2589KB) ( 491 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The With the development of new applications and technologies, software defined networking is getting more attention from application providers, carriers, and IT system and network devices vendors. In SDN, the control and data planes are decoupled, which supports programmable network control and service provision. The definition and framework of SDN were discussed; the demands of IP RAN in SDN in current telecommunication network were analyzed. The target network structure and network models based SDN in IP RAN network were described and the application strategy of SDN in IP RAN network was also discussed.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: