Please wait a minute...

Current Issue

    20 May 2017, Volume 33 Issue 5
    Viewpoint focusing
    Research on artificial intelligence technology and the future intelligent information service architecture
    Zhihong WANG,Zhen YANG
    2017, 33(5):  1-11.  doi:10.11959/j.issn.1000?0801.2017134
    Asbtract ( 468 )   HTML ( 77)   PDF (634KB) ( 1593 )   Knowledge map   
    References | Related Articles | Metrics

    The concept and research of artificial intelligence,cognitive computing,decision support have been taken out of the laboratory and into the real practical stage.Its practical value has exceeded the initial understanding of technical researchers,and its essence is the technology of how to process information and data.It will give people better life and have great effect on the architecture of future society and organization.Firstly,the basic concept of artificial intelligence technology was introduced.And then the artificial intelligence technology for the future economic life of the important significance,artificial intelligence technology development,accumulation,reuse,platform characteristics and the problems they faced were studied.Finally,the operators' research and application strategy of artificial intelligence technology were analyzed.

    research and development
    A method of CCN centralized control cache decision based on SDN
    Hua QU,Yansong LI,Jun LIU,Jihong ZHAO,Ya GUO
    2017, 33(5):  12-20.  doi:10.11959/j.issn.1000?0801.2017132
    Asbtract ( 68 )   HTML ( 0)   PDF (658KB) ( 690 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the software defined networking and content centric networking integration framework,a cache optimi-zation scheme of centralized control was proposed to make full use of global awareness of the control layer for net-work topology and cache resources,and achieve the optimal use of caching resources in the entire network.In this scheme,the particle swarm optimization (PSO) was applied for centralized cache decision-making depending on node edge degree,node importance degree and content popularity.Therefore,the contents were cached in different nodes reasonably.Simulation result shows that the proposed PSO caching scheme achieves larger cache hit rate and lower path stretch than that of LCE scheme,PROB scheme by evaluating the impact of cache size and content popularity on the caching performance.It also shows that PSO scheme significantly reduces the number of cache nodes to replace the cache,making the cache to achieve the overall cache optimization.

    Programming extention technology of open vSwitch
    Fan YANG,Siyu YAN,Tao HUANG
    2017, 33(5):  21-28.  doi:10.11959/j.issn.1000?0801.2017094
    Asbtract ( 69 )   HTML ( 0)   PDF (649KB) ( 725 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As an open source SDN software switch,open vSwitch (OVS) has been widespread concerned.But in complex and changeable network environment,data layer loses control of controller and flow table entry learning aging appears easily and the performance of SDN is seriously hampered.To solve the problems,the programming extension technology architecture of OVS was designed,including link state processing,fault perception,two three-tier self-learning forwarding and other expansion of core functions,so that OVS could recover automatic and rapidly,flow table entries could update in time,throughput of SDN was guaranteed,thereby the influence of control-ler loss control for communication was reduced,SDN stability and reliability was enhanced.

    Performance analysis of orthogonal signals with TASP/MRC diversity
    Guangqiu LI,Siting WANG
    2017, 33(5):  29-38.  doi:10.11959/j.issn.1000?0801.2017109
    Asbtract ( 58 )   HTML ( 0)   PDF (1320KB) ( 745 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the design problem of predictive transmit antenna selection (TASP) / receive antenna maximum ratio combining (MRC) wireless communication system with the minimum mean square error (MMSE) channel prediction,exact and approximate closed-forms for the average symbol error rate (ASER) of M-ary ortho-gonal and biorthogonal signals with coherent detection and TASP/MRC over Rayleigh block fading channel were de-rived by using parabolic cylinder function,the approximate expression of Gaussian Q-function and moment generat-ing function (MGF) based analysis approach respectively.Numerical and simulation results show that the theoretical analysis of the ASERs of orthogonal and biorthogonal signals is exact and the approximate closed-form for the ASER of orthogonal signals is accurate.The above exact or/and approximate closed-forms of ASER of orthogonal and biortho-gonal signals with coherent detection and TASP/MRC can be used to determine the number of antennas of transmitter and receiver and the parameters of predictor quickly,instead of the time-consuming and inefficient computer simulation.

    Variable distance based D2D connection selection scheme in internet of vehicles
    Yongfang QIU,Gong'an QIU,Yongzheng ZHOU
    2017, 33(5):  39-45.  doi:10.11959/j.issn.1000?0801.2017119
    Asbtract ( 66 )   HTML ( 0)   PDF (708KB) ( 983 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Internet of vehicles is an extension of the mobile network.Traffic messages can be disseminated in a short range by D2D communication technology under the base station controller.For decreasing the dynamics of the com-munication link due to rapid movement,a new D2D connection selection scheme based on variable distance between vehicles was proposed.By selecting the traffic lane and workshop distance parameters,the channel quality between D2D pairs was estimated,the priority index of D2D connection selection was deduced,and the D2D communication link was established based on the priority index for traffic message propagation.The simulation results show that the proposed method has an improvement in the survivability and transmission efficiency of D2D connection.At the same time,the reliability of traffic message dissemination in short range was improved by decreasing the outage probability of D2D communication.

    Solution of HARQ timing collision in dynamic TDD technology
    Gang ZHANG,Shixiao LIU,Wei JIANG,Heng HU
    2017, 33(5):  46-54.  doi:10.11959/j.issn.1000?0801.2017078
    Asbtract ( 66 )   HTML ( 0)   PDF (567KB) ( 730 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Dynamic TDD system was introduced to satisfy the increasing business requirement and improve the sys-tem performance.In the dynamic TDD system,the frame configuration can be changed based on the traffic load.Since some subframes may change their transmission direction after reconfiguration,some HARQ process will be-come useless.In order to solve the collision problem of HARQ timing in dynamic TDD system,hybrid automatic re-transmission scheme based on transitional radio frame was proposed.A radio frame will be added after the reconfi-guration point.HARQ timing can transit to the reconfigured frame in a simple way with few collisions.Performance evaluation was provided to show the effectiveness of the scheme.Using the proposed scheme can bring benefits to the system average throughput and improve the system resource utilization rate.

    GM (2,1) recursive forecasting model based on equal dimension and new information
    Yun YUE,Guangyue LU,Di LIU,Jingyi DONG
    2017, 33(5):  55-61.  doi:10.11959/j.issn.1000?0801.2017112
    Asbtract ( 45 )   HTML ( 0)   PDF (1145KB) ( 609 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem that the solution of GM (2,1) whitening equation affects its prediction accuracy,a new prediction model dubbed GM (2,1) recursive prediction model of equal dimension new information was pro-posed.The model was deduced from the grey differential equation of GM (2,1) mode,which could avoid solving the second-order whitening equation,solve the problem that the errors between equations and differential equations for conversion,and update the model parameters combining the idea of equal dimension and new information.Both the simulation and analysis of the example demonstrate that the proposed method is more effective and practical.

    Dependable-cooperative channel resource allocation scheme in wireless mesh network
    Mingming LI,Guangxue YUE,Shaoqing DAI,Bolin MA
    2017, 33(5):  62-74.  doi:10.11959/j.issn.1000?0801.2017128
    Asbtract ( 48 )   HTML ( 0)   PDF (1134KB) ( 558 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For improving utilization of channel resources and service quality effectively in wireless mesh network,a dependable-cooperative channel resource allocation scheme was proposed.According to the adaptive features of mesh node,engaging game theory and establishing reputation mechanism to achieve dependable-cooperative of nodes,and channel resource allocation result was utilized.The comparison of this experiment proves the situation of service level and network utility of cooperative service.The result of it shows that networks benefit will be optimal when the cooperative service level is 3 and node hops synergies with the service level.Comparing with classic syn-ergetic algorithm,with the same context of network topology,dependable-cooperative channel allocation strategy is clearly dominated with 1.04 on UACRR and 1.069.

    A low-complexity detection algorithm for quadrature spatial modulation systems
    Kai LUO,Junwei HUANG,Pengguang ZHOU,Hao XU,Can WU
    2017, 33(5):  75-81.  doi:10.11959/j.issn.1000?0801.2017121
    Asbtract ( 56 )   HTML ( 3)   PDF (1012KB) ( 429 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To tackle the issues of the uncertainty number of the activated antennas and high computational complexity of maximum likelihood (ML) detection algorithm in quadrature spatial modulation (QSM),a low-complexity detec-tion algorithm was proposed.Firstly,the system model was reconstructed into a new model suitable for low-complexity detection algorithms in fixed active antennas systems based on compressed sensing (CS) signal re-construction theory.Then,based on the idea of orthogonal matching pursuit (OMP) algorithm and reconstructed model,a candidate set of activated antennas was obtained.Lastly,using ML algorithm to search the candidate,the index of activated antennas and the modulation symbol were selected.Simulation results show that the proposed de-tector is capable of achieving about 90% reduction in complexity with low performance loss compared with ML al-gorithm.

    Algorithm of grey correlation analysis for radar target recognition based on similarity
    Rupeng ZHAO,Runlan TIAN,Xuzhou ZHANG,Yibin XIE
    2017, 33(5):  82-89.  doi:10.11959/j.issn.1000?0801.2017102
    Asbtract ( 52 )   HTML ( 0)   PDF (703KB) ( 742 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the algorithm can't better identify complex radar targets and improve the accuracy while facing parameters overlapping,an algorithm of similarity-grey relational analysis based on similarity was proposed.Firstly,the similarity matrix between the parameters was extracted by the algorithm.And then the grey correlation analysis was used to get the corresponding grey correlation coefficient.At the same time,the weight value was determined according to the matching degree of each parameter,the grey correlation degree of the signal was identified and the library signal was obtained by combining with the grey correlation coefficient,and the target recognition was completed according to the grey correlation degree.Finally,having the grey correlation between the signal and the grey correlation coefficient,which can realize the identification of the complex radar target.The simulation results show that the impact of parame-ters overlapping with high recognition accuracy was reduced,the recognition accuracy was improved,and the identifica-tion of complex system radar targets were quickly realized by the proposed algorithm.

    Crowd abnormal behavior detection based on motion similar entropy
    Fei LI,Ken CHEN,Meng LI,Chunmei GUO
    2017, 33(5):  90-98.  doi:10.11959/j.issn.1000?0801.2017117
    Asbtract ( 42 )   HTML ( 0)   PDF (2235KB) ( 810 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    It is an important research content of graphic processing in the field of intelligent video surveillance to detect abnormal events.An algorithm based on entropy of motion similarity (EMS) to detect abnormal behavior was proposed.Based on the optical flow algorithm,taking the bottom flow block as the basic unit to get the scene motion information,according to the concept of social network model,the construction scene of the motion network model (MNM) was proposed,the division of the scene particles motion similarity was completed,and the distribution EMS of MNM was calculated in the time domain.Finally,the obtained image entropy was compared with the reasonable threshold,to determine whether abnormal behavior occured.Experimental results indicate that the proposed algo-rithm can detect abnormal behavior effectively and show promising performance while comparing with the state of the art methods.

    Operation technology wide-angle
    Design and analysis of telecom service platform reconstruction based on open source software
    Gang LU,Zhe WANG,Honghui OU,Zhenwei HE
    2017, 33(5):  99-105.  doi:10.11959/j.issn.1000?0801.2017124
    Asbtract ( 57 )   HTML ( 5)   PDF (548KB) ( 638 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Service platform reconstruction is an important part of the China Telecom network intelligent reconstruc-tion.Based on the analysis of network traffic problems,principle,architecture,and realization of open source of ser-vice network reconstruction were proposed.Reconstruction method was given by taking management platform as an example.Reconstruction requirements were researched from the point of view of open thinking,technology research and personnel construction.

    Verification of the cell azimuth based on clustering of sampling point and division of switching quadrant
    Feng GAO,Lei LEI,Rilan DU,Feng LI,Tan XU,Yin LI,Xiuyu ZUO
    2017, 33(5):  106-112.  doi:10.11959/j.issn.1000?0801.2017135
    Asbtract ( 42 )   HTML ( 1)   PDF (1268KB) ( 1007 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Engineering data mainly depends on manual maintenance,and the poor accuracy restricts the development of network planning optimization.Aiming at the cell azimuth in engineering data,the simulated azimuth of the cor-responding cell was calculated by using the sampling point clustering algorithm and the switching quadrant partition-ing algorithm by collecting the measurement report data and the switching statistical data of the network management system.By comparing the simulated azimuth angle and the actual azimuth angle,the existing problems were found,which could be used to guide the data updating and engineering rectification.Through the actual verification of the current network,the research method has achieved good application effect.Similarly,the study can be applied to the latitude and longitude of engineering data,which has a strong reference value.

    SFP selection algorithm for SFC
    Yongqing ZHU,Xia GONG,Huanan CHEN
    2017, 33(5):  113-118.  doi:10.11959/j.issn.1000?0801.2017111
    Asbtract ( 69 )   HTML ( 1)   PDF (665KB) ( 656 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to achieve the new business deployment model by the convergence of cloud and network,SFC technology has been promoted greatly.As one of the key technologies in SFC,the SFP selection strategy affects the network performance and business experience directly.Aiming at the single target defect existing in business path se-lection strategy,the minimum weight algorithm based on the network delay and load was proposed and simulated.It could optimize the resources allocation and improve the network performance.A technical reference was provided for the operators to deploy the network and resources in the future.

    Data security protection schema of telecom operators under the environment of big data
    Shengli ZHOU,Bin CHEN,Lifa WU
    2017, 33(5):  119-125.  doi:10.11959/j.issn.1000?0801.2017136
    Asbtract ( 59 )   HTML ( 1)   PDF (643KB) ( 908 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.

    Analysis of resource bottleneck in 4G network
    Yuezhen WANG,Ke YIN,Jiansheng LIANG,Yu CHEN
    2017, 33(5):  126-132.  doi:10.11959/j.issn.1000?0801.2017131
    Asbtract ( 50 )   HTML ( 0)   PDF (1538KB) ( 870 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The technical capability of LTE network was analyzed,which included cell throughput,channel capacity of PDCCH ,PHICH and PUCCH,random access capacity,paging capacity and so on.Then,based on the technical ability,the consumption and occupancy of network resources such as PRB,PDCCH CCE,PUCCH,PRACH,paging,RRC connection were analyzed.Finally,the bottleneck resources which restrict the LTE network to provide more customer service were deduced,and the bottleneck index proposal which focuses on the construction and operation optimization was put forward.

    Design pattern of industrial cloudin small-medium cities
    Ling LI
    2017, 33(5):  133-142.  doi:10.11959/j.issn.1000?0801.2017115
    Asbtract ( 43 )   HTML ( 2)   PDF (2316KB) ( 497 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Combined with the current status and characteristics of the development of information technology in small-medium cities in China and arrounding the important topic of industrial cloud development in small-medium cities,the latest models of industrial cloud design was put forward,including the system architecture,function equipment,service ability and cloud security of industrial cloud in small-medium cities.The basic principles,the main contents,the technical route,the reference index and the business interface of the industrial cloud design in small-medium cities was expounded,providing some reference and guidance for people involved.

    Power informatization column
    Electricity internet of things based on LPWAN technology
    Yongbo CHEN,Yi TANG,Xinwei AI,Bo XU
    2017, 33(5):  143-152.  doi:10.11959/j.issn.1000?0801.2017051
    Asbtract ( 70 )   HTML ( 4)   PDF (3530KB) ( 1012 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the low power consumption wide area network (LPWAN) technology,operation-level cloud-side integration of energy and power of the internet of things program was achieved using the existing power communica-tion network to realize the data back-to-back.It realized the integration of electric power communication network and LPWAN internet of things technology,provided a wide range of mass “small data” connection for the energy of the in-ternet.It had advantages of low-cost,personalized and flexible.It could meet the connection needs of four-in-one,the source network load interaction,temperature monitoring of electrical equipment and power distribution fault indicator.It could also achieve massive small data connection needs of power plants,substations,electric transport infrastructure,distributed generation operation and maintenance,environmental monitoring energy internet business and so on.

    Information flow model and service flow calculation of electric power backbone communication network
    Ziyan ZHAO,Jianhui FAN,Xin JIN,Dawei ZHANG,Yang LIU,Li MA,Xiaoying ZOU
    2017, 33(5):  153-163.  doi:10.11959/j.issn.1000?0801.2017072
    Asbtract ( 49 )   HTML ( 2)   PDF (2352KB) ( 709 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Electric power backbone communication network service analysis and service flow calculation is the most important aspect for network plan and optimization.According to the smart grid service carried on backbone commu-nication network,the basic service model and service flow calculation method was carried out for dedicated circuit service and IP service.Based on the requirement of the “13thFive-Year” plan,the typical power system production and management information service model were carried out and the every service data flow could be calculated.The service models and service data flow calculation method were used in the “13thFive-Year” plan communication net-work plan of state grid.

    Analysis of customers' electricity consumption behavior for peak load shifting
    Bingxin WANG,Yan HOU,Hongwang FANG,Yuze CHEN,Jian LIU
    2017, 33(5):  164-170.  doi:10.11959/j.issn.1000?0801.2017067
    Asbtract ( 45 )   HTML ( 3)   PDF (671KB) ( 925 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to implement well-directed peak load shifting for massive customers,a method for analyzing massive customers' electricity consumption behavior for peak load shifting was proposed.Firstly,clustering algorithm was used to cluster daily load curves of the main power grid in the previous year and get load characteristics in different dates.Then the load curves of all customers under every date cluster were clustered,the peak load shifting method was derived by comparing the load characteristics of the main power grid and customers.Finally,the peak load shifting method in a future day was given by date matching between the future day with a historical day using dynamic time warping (DTW).Empirical study shows that the method is conductive to peak-valley electricity pricing and orderly electricity consump-tion and can further achieve peak load shifting and stable operation of the main power grid.

    Synchronous collaborative application of nuclear power engineering design platform
    Zhihua ZENG,Delong YI,Yan LI
    2017, 33(5):  171-175.  doi:10.11959/j.issn.1000?0801.2017054
    Asbtract ( 58 )   HTML ( 0)   PDF (864KB) ( 609 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    At present,the nuclear power business shows the development trend of multi-route,multi-base develop-ment trend.Coupled with the huge workload of nuclear power engineering design and the fine division of labor cha-racteristics,the relevant professional in different places appears more and more cross-design in the nuclear power en-gineering design,resulting in the frequency of funding becoming more and more dense between the various profes-sional.How to shorten the synchronization time of engineering design data between different places,and even achieve real-time synchronization of engineering design data is worth to study in the field of collaborative design of nuclear power projects.From the point of view of system verification,the existing popular virtualization technology was used to carry out an in-depth exploration and verification on the synergetic synergy of nuclear power engineering design,and a set of auxiliary access platform was added on the basis of the original design platform structure to real-ize remote user access and collaborative design of nuclear power projects.The research results have guiding signific-ance for the follow-up design and production platform upgrade and optimization.

    Functional requirements and design of simulation cloud platform for data center
    Junwen LIU,Jiaxing XUAN
    2017, 33(5):  176-182.  doi:10.11959/j.issn.1000?0801.2017071
    Asbtract ( 54 )   HTML ( 0)   PDF (998KB) ( 892 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Electric power information system is related with the safe operation of grid.To ensure the running stability of information system,comprehensive test was needed to conduct before the system is running.Considering actual needs of the power industry at present,it's necessary to establish independent environment to conduct function of in-formation system and non-functional test so as to achieve effective operation and maintenance of information system,finding loopholes and improving robustness of the system.Based on the analysis of development of cloud data center simulation platform,the research studies construction technology,which applies to the data center cloud platform and puts forward deployment implementation plan targeted to functional requirements of platform.In this way,the guid-ance role of construction was achieved on the later cloud platform.

    Detection and analysis of energy data by using quantum filter
    Haohan WU,Gang JIANG
    2017, 33(5):  183-188.  doi:10.11959/j.issn.1000?0801.2017070
    Asbtract ( 48 )   HTML ( 1)   PDF (770KB) ( 491 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of smart power grid as the core of smart meters,power big data has attracted the attention of users,power companies and the government.The introduction of adaptive filtering into the power grid information monitoring was explored.Due to the complexity of the power load curve,specific model cannot be described.A model-independent intelligent filter was constructed by using the recurrent quantum neural network.The quantum filter was tried to use in the power load forecasting and abnormal electrical testing.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: