Please wait a minute...

Current Issue

    20 November 2013, Volume 29 Issue 11
    Big data platform and Application
    Study of Audio Frequency Big Data Processing Architecture and Key Technology
    Zhen Yang,Minjie Xu,Zhangfeng Liu,Da Qin,Xiaohui Yao
    2013, 29(11):  1-5.  doi:10.3969/j.issn.1000-0801.2013.11.001
    Asbtract ( 239 )   HTML ( 9)   PDF (1280KB) ( 873 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the major part of big data research, the audio frequency's value has not been discovered. The features of big data, and the automatic speech recognition(ASR)technology were studied, and the value was mined through the method that combined with the two technologies. Finally, the application development technical architecture and application process of audio frequency which combined with big data were given.

    Research on URL Classification with DPI Data Mining and Related Technology
    Lingyan Bian,Renlong He,Xiaohui Yao
    2013, 29(11):  6-11.  doi:10.3969/j.issn.1000-0801.2013.11.002
    Asbtract ( 370 )   HTML ( 1)   PDF (2212KB) ( 1152 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to achieve the precise localization of internet customers' preference, the crucial point is to catch the classified mapping of URL system through digging deep into the data of DPI users' online behavior data. Based on summarizing the process of DPI data auto classification, the key technique was investigated which involved in Web information extraction, Chinese word segmentation, feature selection, text classification and so on. It may make solid technical foundations for the customer insight with DPI data.

    Application of Distribute File System & MPP Database Mashup Architecture in Telecom Big Data Platform
    Yu Zhang,Xin Cai,Aimin Li,Yi Liu,Xiaohui Yao
    2013, 29(11):  12-16.  doi:10.3969/j.issn.1000-0801.2013.11.003
    Asbtract ( 293 )   HTML ( 5)   PDF (859KB) ( 1700 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Distributed file system and MPP database are two important directions in the domain of big data. Based on the research of the two techniques, the sketch and implement method of big data platform architecture planning and design were put forward using the mashup architecture, and the actual verification in the specific project was carried out. This architecture can combines the advantages of both two techniques, and can adapt to the different scenes of big data storage & processing requirements.

    Research on the Entered Business Model of Telecom Customer Behavior Tagged Data
    Xiaohui Yao,Yuan Hu,Yuxiang Zhang
    2013, 29(11):  17-22.  doi:10.3969/j.issn.1000-0801.2013.11.004
    Asbtract ( 322 )   HTML ( 10)   PDF (3272KB) ( 498 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The tagged data which represents the behaviors of telecommunication customers was studied and the current status of data and information system were analyzed, combined with data management model at home and abroad. The problems of data decentralization, data security and lacking of business model that was specific to internal purpose were dissected. Telecommunication operators need to establish new data management system, thus realized the unified data gathering and provided the service specific to external purpose. Furthermore, CTNET users' authentication/accounting and the project of superman MR was studied, which proved the feasibility of establishing data management system and the significance of promoting data value.

    research and development
    Security Data Aggregation with Recoverable Data in Heterogeneous Wireless Sensor Network
    Lusheng Shi,Huibo Zhu,Lin Chen
    2013, 29(11):  23-28.  doi:10.3969/j.issn.1000-0801.2013.11.005
    Asbtract ( 242 )   HTML ( 0)   PDF (1519KB) ( 358 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Recently, many security aggregation algorithms in wireless sensor network have high communication overhead and the usage of aggregation functions is constrained. A secure data aggregation algorithm with recoverable data in heterogeneous wireless sensor network was proposed. The algorithm uses homomorphism encryption techniques based on elliptic curve to address data privacy protection, and uses an efficient aggregate signature scheme to ensure data integrity and authenticity. The unique data recovery function of this algorithm can recover individual data together with getting the aggregated results, and can facilitate the follow-up operation, and enrich the aggregate type. The algorithm takes full advantage of the difference of nodes in heterogeneous wireless sensor network, and diverts large number of calculation work to h-sensors, this approach improves the efficiency of the implementation. Simulation and comparative analysis show that algorithm has high safety and high efficiency, although the communication overhead of single aggregate process is high, data recovery process saves the overhead of the follow-up work, and the overall energy consumption is actually reduced.

    Research on Avoidance of Energy Hole Scheme in the Wireless Mesh Network
    Chunlong Lu,Yuchun Cao,Guangxue Yue
    2013, 29(11):  29-37.  doi:10.3969/j.issn.1000-0801.2013.11.006
    Asbtract ( 283 )   HTML ( 0)   PDF (3168KB) ( 201 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to avoid the energy hole problem in wireless mesh network, the non-uniform distribution strategy about the cluster nodes was put forward, the energy efficiency optimization equilibrium routing algorithm was designed. When the distribution of cluster nodes in the wireless mesh network met the certain relations, the network could optimize the energy consumption efficiency equilibrium. In order to provide the theory basis for reliable operation in wireless mesh network for a long time, the convergence of efficiency optimization model was theoretically proved, the constraint condition of optimizing the energy consumption efficiency equilibrium was derived, and the energy hole system avoidance model was built. The simulation results show that using this strategy can effectively relieve the energy hole problem in wireless mesh network, prolong the network life cycle and cut down the network residual energy rate.

    Research on Distributed Wireless Multi-Step Attack Pattern Mining Method for WLAN
    Guanlin Chen,Zebing Wang,Yong Zhang
    2013, 29(11):  38-44.  doi:10.3969/j.issn.1000-0801.2013.11.007
    Asbtract ( 225 )   HTML ( 3)   PDF (1468KB) ( 420 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the important means of network security, intrusion detection and prevention technology have seen some preliminary applications in the traditional wired network environment. Due to the distinctive characteristics of wireless network, the applications of multi-stage attack plan recognition for WLAN are rarely seen in spite of the promising potential. A distributed wireless multi-step attack pattern mining(DWMAPM)method based on correlation analysis with the IEEE 802.11 protocol frame attributes was proposed. The method consists of five steps:constructing a global attack database, building candidate attack chains, filtering candidate attack chains, correlating multi-step attack behaviors and recognizing multi-step attack patterns. Experimental results show that DWMAPM is effective for recognizing a variety of typical attack patterns in real WLAN attack scenarios, and can provide a basis for forecasting the final attack plans.

    An Improved Distributed Multi-User Cooperative Spectrum Sensing Method Based on DCS
    Jianwu Zhang,Xiaoyan Chen,Xiaorong Xu
    2013, 29(11):  45-51.  doi:10.3969/j.issn.1000-0801.2013.11.008
    Asbtract ( 219 )   HTML ( 3)   PDF (2268KB) ( 344 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Distributed compressed sensing theory extends the application of compressed sensing theory, which brings single signal compression sampling to signal group compression sampling. Cooperative spectrum sensing technology uses space set macros to compensate detection error problems during the process of single-user wideband spectrum sensing. However, it increases computational complexity in the process of signal reconstruction. Aiming to this problem, an improved distributed multi-user cooperative spectrum sensing method based on DCS was proposed. On the basis of original OMP algorithm, the improved method reduced reconstruction algorithm's computational complexity through the utilization of previous spectrum occupancy situation. Simulation results indicate that, the proposed method achieves the same effect with the original algorithm under the circumstances of slow spectrum occupancy changes. Meanwhile, in the case of more cognitive users, this method reduces the reconstruction complexity significantly.

    Operational Innovation Forum
    Research on Smartphone Operation System Development
    Yingqi Wei,Boqing Liang
    2013, 29(11):  46-151.  doi:10.3969/j.issn.1000-0801.2013.11.025
    Asbtract ( 182 )   HTML ( 3)   PDF (1766KB) ( 254 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The smartphone platform owners control mobile ecosystem through platforms they developed. To get influence on ecosystem, the users must be involved in the development of the operating system. The start point of smartphone platform development, development strategy and development direction were analyzed.

    research and development
    Grid Scheduling of Super-Peer Model Based on Price Timed Petri Net
    Shanliang Pan,Xi Huang,Qinjiao Mao
    2013, 29(11):  52-59.  doi:10.3969/j.issn.1000-0801.2013.11.009
    Asbtract ( 215 )   HTML ( 0)   PDF (2407KB) ( 203 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For grid of super-peer model where nodes were clustering together by means of semantic similarity, a compound task scheduling algorithm was proposed which taking users' time deadline, cost limit and the weight parameters between them as QoS requirements. Considering grid nodes were dynamic, the rescheduling mechanism was introduced. Price timed Petri net which was a powerful graphical and mathematical tool was used to formally and hierarchically model grid scheduling, in order to have better understanding about it. Reachable task graph of Petri net model was constructed to analyze scheduling performance, such as scheduling time, cost, throughout capacity and load balance, etc. Effectiveness of the scheduling algorithm was verified by an example, scheduling process of compound tasks which need several types of resources and the system's scheduling performances were analyzed. Related work had great significance on guiding the construction and implement of real grid systems of super-peer model.

    Research on Spectrum Access Mechanism Based on Polling Scheduling
    Jin Lu,Ming Huang,Zhijun Yang
    2013, 29(11):  60-65.  doi:10.3969/j.issn.1000-0801.2013.11.010
    Asbtract ( 229 )   HTML ( 1)   PDF (1750KB) ( 253 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Dynamic spectrum access is an effective way to improve the spectrum utilization. The spectrum access mechanism based on polling control tends to realize the effective utilization of spectrum resources and rational allocation. A novel polling queuing model, in which the authorized users employ exhaustive service while the cognitive users employ loss service, was proposed. Based on the analysis method of embedded Markov chain and probability generating function, the key parameters of average queue length, bandwidth utilization and forced termination probability were obtained through solving the stationary distribution of equilibrium state. Numerical analysis and simulation results show that the mechanism improves the queuing performance and the bandwidth utilization of spectrum holes, and reveal its potential application in cognitive wireless network for data services.

    Overview
    Challenges and Solutions of Mobility Prediction Technology in Ubiquitous Network
    Jie Tian,Jihong Zhao,Hua Qu
    2013, 29(11):  66-71.  doi:10.3969/j.issn.1000-0801.2013.11.011
    Asbtract ( 175 )   HTML ( 1)   PDF (1111KB) ( 607 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Ubiquitous network combines individual communication, entertainment and application services into asingle network. Thereby, users can enjoy more various business experiences. The mobile ubiquitous networkemphasizes that users are able to acquire various application services continuously when they are moving. Therefore,higher request of mobility prediction technology was put forward. Current mobility prediction technology wasresearched and the features of mobility prediction technology which belong to mobile ubiquitous network accordingto applications in future mobile ubiquitous network were analyzed. In order to be adapted by mobile ubiquitousnetwork sufficiently, the prediction of mobility presented need to solve the challenges brought by heterogeneity,terminal collaboration and intelligent application.

    Study on Underwater Acoustic Sensor Network
    Ming He,Qiuli Chen,Xuguang Ye,Jichuan Quan,Xiliang Chen
    2013, 29(11):  72-76.  doi:10.3969/j.issn.1000-0801.2013.11.012
    Asbtract ( 352 )   HTML ( 5)   PDF (899KB) ( 1500 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Nowadays, the study of the underwater acoustic sensor network(UASN)becomes the hotspot in the world, but there are some difficulties in controlling underwater conditions and the mobile sensor node. How to ensure the efficiency of underwater acoustic sensor networks is a major concern. Firstly, the research status and development trend of UASN were analyzed. Secondly, the hierarchical structure of the underwater acoustic sensor network was researched. Then technical challenges on the physical layer for underwater acoustic sensor network were studied. Lastly, the next research direction was pointed out.

    Research of Mobile Internet Core Security Requirement and Protection
    Fangheng Xu,Xuan Chen,Cailiang Shen,Huanqiang Du
    2013, 29(11):  77-81.  doi:10.3969/j.issn.1000-0801.2013.11.013
    Asbtract ( 221 )   HTML ( 1)   PDF (1439KB) ( 466 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Driven by the technology, service and user demand, the mobile internet has enjoyed rapid development in recent years. However, the mobile internet industry of China is still at the initial stage with its form and pattern remains unclear. Based on the development of mobile internet, an overview of the network security problems at current stage was presented, the threats facing mobile internet network were introduced and the relevant ideas and proposals on the security protection were raised.

    Electric power information column
    Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security
    Shaomin Zhu,Zhiqiang Zhang
    2013, 29(11):  82-86.  doi:10.3969/j.issn.1000-0801.2013.11.014
    Asbtract ( 178 )   HTML ( 1)   PDF (1237KB) ( 349 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of electric power information industry, a lot of multimedia products such as digital image, audio, video and three dimensional models were produced and applied during the electric power process of the production, operation and management. Therefore, how to realize digital media security effectively is becoming a challenging problem. A new image watermarking algorithm in hybrid transform domain was proposed. The secret watermark information bits were embedded into low frequency subband in hybrid transform. According to energy distribution and visual masking in low frequency subband, the singular values of the selected low frequency subband blocks were adaptively applied quantization index modulation for embedding watermark information. Experimental results show that the algorithm has good image vision fidelity. The proposed digital watermarking is playing a more important role in network security for electric power system.

    Research and Comparison of Distribution Automation Communication Mode Based on a Typical Case
    Feng Wang,Xiaoping Si,Fang Zhao,Zhaohui Li,Haiyong Luo
    2013, 29(11):  87-93.  doi:10.3969/j.issn.1000-0801.2013.11.015
    Asbtract ( 297 )   HTML ( 0)   PDF (2534KB) ( 704 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As an important part of the distribution automation system, the communication network is a necessary toolfor the control center transmitting and collecting data of remote terminals and controlling it. Hence, the networkplays an important role in the composition and function implementation of the system. Distribution automationcommunication modes contain optical fiber communication, power line communication, and wireless communicationand so on. Different communication modes have big influence on the real time, reliability and effectiveness of thesystem, and also there is a big difference between the construction and maintenance cost. Through designing thecommunication network in a switching station in Shanghai, the difference among optical fiber communication, powerline communication and wireless communication was analyzed and compared, which provided a reference for theconstruction of the distribution automation communication network.

    Fine-Grained Network Traffic Identification Based on Tilera Platform
    Shun Wu,Dan Su,Jia Wu,Kun Li,Dawei Xu,Yun Liu,Zheng Wei
    2013, 29(11):  94-98.  doi:10.3969/j.issn.1000-0801.2013.11.016
    Asbtract ( 200 )   HTML ( 3)   PDF (1271KB) ( 436 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    It is essential for network managers to decide how to use a reasonable allocation of bandwidth, providing differentiated services, as well as conducting security monitor and management so as to do fine-grained and precise IT operation. The fine-grained traffic identification method proposed was able to identify the user's behavior accurately according to the traffic that the application generates. In addition, compared with the traditional x86 platform, in order to achieve higher throughput and lower power consumption, the method was redesigned and implemented in the Tilera platform with parallelization. Finally, a variety of system performance test results were compared under the two platforms.

    Green Communication Schemes of Heterogeneous Network-Based Electricity Emergency Communication Scene
    Chunxin Wang,Xin Li,Xiaoxiang Wang,Zhaofeng Li,Lei Yan
    2013, 29(11):  99-103.  doi:10.3969/j.issn.1000-0801.2013.11.017
    Asbtract ( 235 )   HTML ( 0)   PDF (1224KB) ( 290 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Green communication is a new communication concept of promoting energy conservation and emission reduction as well as improving energy efficiency. With the growing energy shortage and environmental pollution, green communications has become the research hotspot of all the industry. The energy-saving potential of heterogeneous network-based electricity emergency communication system was analyzed and green communication schemes in network and device level were proposed. The objective is to save energy under the premise of ensuring the communication quality and consequently respond to the green communication needs.

    Research on Emergency Standard Framework of Power Emergencies
    Yongsheng Men,Longzhe Jin,Chaoyang Zhu,Zhen Yu
    2013, 29(11):  104-108.  doi:10.3969/j.issn.1000-0801.2013.11.018
    Asbtract ( 217 )   HTML ( 2)   PDF (1311KB) ( 418 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on electric power emergency standards system construction present situation overseas and domestic, problems existing in the system framework were analyzed. Referenced by the ideas of Hall three-dimensions structure theory, using standardization system engineering structure model, combined with the practice of electric power emergency work in China, established national electric power emergency standard system framework model to elaborate the specific content of the system framework and further enrich the content of the standard system framework of specific strategies on the basis of the theory of power emergency disposal process. In order to better guide construction of electric power emergency standard system in China, the framework model analysis of China's electric power emergency standard that was urgently to be revised. The research provides the relevant of electric power emergency standardization organizations, the analytical framework and theoretical foundation in order to make a more reasonable power emergency standard system construction in China.

    Power Law Distribution in Electric Power Data
    Guannan Wang,Chunyu Deng,Yue Zhao,Yaqin Zheng
    2013, 29(11):  109-114.  doi:10.3969/j.issn.1000-0801.2013.11.019
    Asbtract ( 283 )   HTML ( 4)   PDF (2464KB) ( 694 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The explorative analysis plays an important role in the process of data mining. The non-normally distributed data in the electric power data was analyzed. Firstly,the distribution law of generated energy, electricity sales and electricity consumption with statistical methods across the province within the business area of SGCC were analyzed, and it was found that these indices were not normally distributed but follow the power law distribution. Then the electricity consumption of subdivided trade follows the log-normal distribution was proved. At last, the reasons that these data are not normally distributed were given.

    Research and Application of Mobile OA Technology in Power Generation Enterprise
    Zheng Liu,Jing Wang
    2013, 29(11):  115-121.  doi:10.3969/j.issn.1000-0801.2013.11.020
    Asbtract ( 261 )   HTML ( 2)   PDF (2875KB) ( 384 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the rapid development of mobile Internet and cloud computing technology, enterprise mobile OA needs bred. Using the CPI group mobile OA system construction project as a case, the existing various technical routes were researched in-depth. Combining the mature page adaptation techniques with VPN, authentication system and mobile device management system, a method to build mobile OA platform architecture was proposed and strictly controlled class 2 of information system level protection to building the security system, and the mobile OA system can deliver the best user experience under the premise of information security.

    Construction and Practice of Intelligent Data Analysis Center Based on Distributed Power Plant
    Yuejin Su,Yingjie Han
    2013, 29(11):  122-126.  doi:10.3969/j.issn.1000-0801.2013.11.021
    Asbtract ( 211 )   HTML ( 1)   PDF (2314KB) ( 420 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Power generation groups fall dilemma in the high parameter units with less experts. It is necessary for a good optimization planning that the field experts analyze the equipments historical data and extract useful information. For the intelligent data analysis center architecture of distributed power station group, the underlying data flow control system's overall structure was described and the implementation process of intelligent data was analyzed in detail. The results show that it approaches the intelligent diagnostics, device status trend assessment and economic performance evaluation by the light of the information technology in big data era.

    Application of Power Data Mining Within and Between Grid Fields
    Liang Geng,Yan Wu,Xiannan Meng
    2013, 29(11):  127-130.  doi:10.3969/j.issn.1000-0801.2013.11.022
    Asbtract ( 292 )   HTML ( 5)   PDF (748KB) ( 1060 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With an unprecedented development of info-technology, the power data has an exponential increasing, and the data mining(DM)plays a very important role in this process. The CRISP-DM and its primary approaches were presented. Combined with the power industry data, the applications of grid facilities construction planning, dynamic security assessment, power load forecasting, power system fault diagnosis and optimal scheduling options with the power system were analyzed, and then the applications in some other industries were also analyzed, supporting the development of the city.

    Design and Implementation of J2EE Application Service Middleware Monitoring System of Nanning Power Supply Bureau
    Yiming Wu,Yongtao Tian
    2013, 29(11):  131-135.  doi:10.3969/j.issn.1000-0801.2013.11.023
    Asbtract ( 234 )   HTML ( 5)   PDF (1956KB) ( 373 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    J2EE architecture has been widely used in power information system, monitoring J2EE application service middleware is an important task in information operation and maintenance. The object of study is Tomcat, using JMX technology to achieve the core function of monitoring system. A discussion was made in detail about the design, function modules and system implementation of J2EE application services middleware monitoring system. Development results have been put into trial operation in good condition, which is an automatic and systematic successful case of power information operation and maintenance.

    Operational Innovation Forum
    Strategy Study to Enhance the Value of Telecom Operators Based on Traffic Management——Empirical Analysis of S Corporation
    Biao He,Mingguang Zhang,Lu Li
    2013, 29(11):  136-145.  doi:10.3969/j.issn.1000-0801.2013.11.024
    Asbtract ( 171 )   HTML ( 0)   PDF (3077KB) ( 524 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Rapid data traffic growth has led to operator data traffic grow while the income does not grow, network pressure increase, customer experience decline and so on. Operator has to mine customer needs and refine traffic management to avoid being only pipe in the mobile internet era, achieve a shift from the pipe to the bilateral market organizer, and enhance the value of telecom operator. S-provincial company of an operator was selected for the empirical case study. Through mining the information of current network user data, the traffic management status was analyzed. Further, combined with the benchmark study for traffic management both in technology and management, specific measures to enhance the value of telecom operators were proposed.

    Key Technology and Design Philosophy of the System of Global Audit and Duty Analysis
    Chunnan Zhou
    2013, 29(11):  152-158.  doi:10.3969/j.issn.1000-0801.2013.11.026
    Asbtract ( 239 )   HTML ( 0)   PDF (3841KB) ( 261 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The key technologies and design philosophy of the system of global audit and duty analysis system was stated in detail, and the related technologies such as network behavior audit, host audit, gateway audit, database audit, duty analysis, system characteristic, system advantage, system arrangement, were explained and the business and data safety of information system were improved.

    Research on Wireline Operators' Traffic-Based Operations Strategy
    Ke Ruan,Ming Feng,Yongqing Zhu,Jie Zou
    2013, 29(11):  159-162.  doi:10.3969/j.issn.1000-0801.2013.11.027
    Asbtract ( 203 )   HTML ( 4)   PDF (786KB) ( 303 )   Knowledge map   
    References | Related Articles | Metrics

    More and more telecom operators have been quick to embrace traffic-based operations. The industry and academia generally focus on the mobile internet, neglecting the wired markets. Aiming to explain the basic issues surrounding traffic-based operations on wired operators, the concept, characteristic and international operator's cases of the wired traffic-based operations were restudied. Finally, it was end with a series of conclusions and recommendations for wired traffic-based operations.

    Research on Evaluation System of Short Message Service
    Hong Li,Wenhong Zhou,Kai Qu,Siyuan Wu,Sizhong Chen,Qing Li
    2013, 29(11):  163-167.  doi:10.3969/j.issn.1000-0801.2013.11.028
    Asbtract ( 175 )   HTML ( 0)   PDF (1449KB) ( 271 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the comprehensive objective assessment of short message service quality, a set of evaluation system of short message service was put forward. A part of the evaluation index was analyzed, and the rationality of related indexes, the development and construction of short message corresponding evaluation system, and the network application were briefly introduced. Through construction and operation of system, the short message service quality evaluation was implemented.

    Analysis and Application of Security Risk Management Based on Business Process Granularity
    Bin Tan
    2013, 29(11):  168-172.  doi:10.3969/j.issn.1000-0801.2013.11.029
    Asbtract ( 210 )   HTML ( 2)   PDF (1996KB) ( 333 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Existing assets as the core of the security risk management models, cannot meet the actual needs of business risk management. Through the establishment of security granularity based on business process risk management models, and the realization and application in the WAP, SMS systems, the business risk management was realized. Security administrators and business system administrators can clearly understand the security risk situation of business systems, effectively focus and prioritize critical business systems, business processes and the security alarm; based on perceived security risk posture, security officer may plan, develop and implement safety programs, to improve operational safety risk management.

    Research on Limitation of Snake Flow Test in Routers' Performance Test
    Liang Guo,Subin Wang,Junqi Zhao,Hua Chen
    2013, 29(11):  173-176.  doi:10.3969/j.issn.1000-0801.2013.11.030
    Asbtract ( 277 )   HTML ( 7)   PDF (1178KB) ( 1208 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Fully-mesh topology test & snake topology test methods on high port density routers were presented. The differences of the test results in latency, jitter, drop, traffic model and so on, were analyzed. The limitation of snake flow test methods in performance test was revealed.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: