Please wait a minute...

Current Issue

    20 December 2013, Volume 29 Issue 12
    research and development
    A Parallel ETL Tool Based on an Improved Chain-MapReduce Framework
    Bin Wu,Xinguang Liu
    2013, 29(12):  1-8.  doi:10.3969/j.issn.1000-0801.2013.12.001
    Asbtract ( 175 )   HTML ( 2)   PDF (1527KB) ( 237 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The related work in parallel ETL and common methods to deal with multiple MapReduce jobs were introduced. Then an improved chain-MapReduce framework was presented, based on this framework,a parallel ETL tool was designed. Several optimization rules on ETL which will make the ETL process generate less MapReduce jobs to avoid unnecessary I/O and network cost were presented. The ETL tool on real queries and real big datasets were evaluated. Compared with Hive, the tool reduces time on average by 10% to 20%.

    Study on the Structured Processing of Unstructured Personalized Customer Requirement for Mass Customization
    Qinglie Wu,Yu Guo
    2013, 29(12):  9-15.  doi:10.3969/j.issn.1000-0801.2013.12.002
    Asbtract ( 290 )   HTML ( 1)   PDF (1492KB) ( 507 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Mass customization is a new model of manufacturing and services. Customers' personalized service requirement in mass customization often have the unstructured characteristics, and obtaining and analyzing customers' real requirements accurately is the key to successful implementation of mass customization. The definition and determination methods of unstructured personalized customer requirements were proposed, and an analysis framework of unstructured personalized customer requirement in mass customization was built according to their characters. Then mapping rules and extended QFD were designed for the transformation from unstructured personalized customer requirement to structured product requirements. Finally the validity of the method was verified by an example and the method can be helpful to provide personalized cloud service.

    An Energy-Efficient Scheduling Strategy Based on Load Conditions in LTE System
    Kai Wen,Yali Miao
    2013, 29(12):  16-20.  doi:10.3969/j.issn.1000-0801.2013.12.003
    Asbtract ( 175 )   HTML ( 1)   PDF (1507KB) ( 241 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The key question of green communication is how to reduce energy consumption while maintaining the quality of service. According to the conception of trading bandwidth for energy, with the addition of taking system throughput and fairness among users into consideration, a resource scheduling strategy based on system load conditions for LTE downlink was proposed to reduce energy consumption by improving energy efficiency at the cost of spectral efficiency. The simulation results show that the two algorithms can greatly reduce transmit power on the premise that the requirements of the user rate are met, and ensure the realization of the fairness among users.

    Situation Awareness Scheme Based on PUE Detecting for Cognitive Radio
    Fangwei Li,Dejun Feng,Jiang Zhu
    2013, 29(12):  21-27.  doi:10.3969/j.issn.1000-0801.2013.12.004
    Asbtract ( 270 )   HTML ( 3)   PDF (2562KB) ( 443 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To timely and accurately grasp the attack situation over a wide range when a malicious user emulates the primary user and attacks the channel, and to display correctly spectrum situation, a situation awareness scheme for the interference situation of malicious users was proposed. Decision-makers can know well the attack situation over a wide range, by detecting the primary user emulation attacker's energy and location to build the interference situation, and drew the interference into a situation map. The proposed approach can separate the energy and position of the primary users and malicious users, so as to fully exploit the potential of spectrum holes to improve the accuracy of the spectrum map, and improve safety and system capacity of the channels.

    Research on a Web Services Discovery Method Based on Virtual Social Network
    Shanliang Pan,Qinjiao Mao,Lu Han
    2013, 29(12):  28-37.  doi:10.3969/j.issn.1000-0801.2013.12.005
    Asbtract ( 260 )   HTML ( 3)   PDF (2168KB) ( 681 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A Web services discovery method based on virtual social network was proposed, looking for services to meet user requirements from the mutual competition and collaboration service relationship. In the competition, the method selected a group of competitive service list by calculating the text similarity and structural similarity between services, and then according to the cooperation relations, calculated the intercourse skills of the list of all services, recommended the strong communication ability of service to the user, realized the combination of user service process. Comparing the recall rate and accuracy with other methods, the validity of this method is verified.

    A Virtual Network Mapping Algorithm Based on Approaching Principle
    Sheng Huang,Chuanchuan Wu,Xiaofei Yang,Hui Wang,Wei Zhang
    2013, 29(12):  38-44.  doi:10.3969/j.issn.1000-0801.2013.12.006
    Asbtract ( 185 )   HTML ( 1)   PDF (2168KB) ( 504 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    On the basis of two stages virtual network mapping algorithm, pointing at the defects of the blind node mapping of existing greedy strategy, a virtual network mapping algorithm based on approaching principle was proposed. The algorithm optimized and improved the node mapping stage, and it took a full consideration of the impact on link mapping in the node mapping stage, which made the nodes map to the area of relatively concentrated and reduced the difficulty of solving the link mapping stage. Simulation results show that compared with the existing algorithms, the proposed algorithm improves the virtual network request acceptance ratio, average time revenue and revenue/cost(r/c)ratio.

    Minimum Delay Node Scheduling Algorithm for Wireless Sensor Network
    Taoshen Li,Jun Tang,Junbin Liang,Hongxing Lan
    2013, 29(12):  45-49.  doi:10.3969/j.issn.1000-0801.2013.12.007
    Asbtract ( 222 )   HTML ( 0)   PDF (1011KB) ( 347 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In wireless sensor networks,saving energy and reducing delay are always the focus of research and difficult problems. In order to solve that problem, a new minimum delay scheduling(MDS)algorithm was proposed. Through the analysis and calculation of energy and delay of nodes, this algorithm may calculate the node energy threshold. To realize minimum network delay and it always selects the node whose remaining energy was in the limited range and had the minimum delay to be next top node.Theoretical analysis and simulation results show that MDS algorithm can control the lifetime of network within an acceptable range while effectively minimizing network delay comparing with previous algorithms.

    Research on Security Algorithm for Crossing Heterogeneous Network Based on Unified Communication Technology
    Yingying Chen,Geng Zhang,Mingyue Di,Jie Li,Meilin Dang,Guilan Xing
    2013, 29(12):  50-54.  doi:10.3969/j.issn.1000-0801.2013.12.008
    Asbtract ( 239 )   HTML ( 1)   PDF (980KB) ( 566 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the unified protocol specification, encryption, and firewalls and other security measures at present, communication within the network environment are in good usability and security in heterogeneous network environment. However, in order to guarantee the availability, safety of the communication between heterogeneous networks has been reduced. Based on the study of heterogeneous networks through the issues and the status quo on the symmetric key cryptography, asymmetric key cryptosystem in-depth research, an encryption algorithm based on the RSA algorithm and improved DES algorithm was proposed. Finally, the use of case study shows that the algorithm has good security.

    Research and Implementation of Massive Design Documents on Distributed Storage & Load Balancing
    Liliang Su,Yunfu Wang,Bin Hou
    2013, 29(12):  55-59.  doi:10.3969/j.issn.1000-0801.2013.12.009-00055
    Asbtract ( 231 )   HTML ( 1)   PDF (1659KB) ( 762 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The most suitable system architecture was presented, based on the distributed storage and load balancing, after the analysis and comparison of the technology of massive design documents in distributed storage. The solution avoids user taking a long wait to access storage resources, breaks the bandwidth bottleneck of enterprise Web application in the LAN, reduces the burden on central storage, and achieves the global load balancing between Web application and distributed storage, so as to ensure the high availability of system.

    Adaptive Sparse Transform for Wireless Sensor Network Data
    Xuan Chen
    2013, 29(12):  60-64.  doi:10.3969/j.issn.1000-0801.2013.12.010
    Asbtract ( 198 )   HTML ( 0)   PDF (1306KB) ( 335 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the change of sparse structure introduced by mobility of the wireless sensor network(WSN) nodes and noise in data transmission, an adaptive sparse transform method based on dictionary learning (DL)for WSN data was proposed. The optimum sparse basis can be adaptively constructed according to the change of sparse structure, and the compressibility of WSN data basis was introduced to DL to satisfy the real time requirement for large-scale data processing. Analysis and experimental results demonstrate that the proposed algorithm can significantly improve the robustness and the real time performance of WSN data sparse transform.

    Research on Microgrid Control System with Different DG Types
    Litao Wang,Weihua Tian,Baixiang Zheng
    2013, 29(12):  65-71.  doi:10.3969/j.issn.1000-0801.2013.12.011
    Asbtract ( 285 )   HTML ( 2)   PDF (1851KB) ( 1050 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the grid-connected and islanded operating modes of microgrid and the changeover between them,a control strategy of microgrid with different kinds of DG(distributed generation)was proposed,which monitors the operating states of both microgrid and power network and provides the unified coordinating control by the central controller of microgrid. DC micro-grid and AC micro-grid hybrid was adopted. An independent public DC/AC converter used in AC side. Not only the load demand was satisfied, but also the converter resources were saved. P/Q control model was established based on grid-connected model. And in isolated mode, the converter was working in V/f control. The direct-drive permanent magnet wind power generation system, dual-stage PV generation system and Li-ion battery energy storage system were used as networking unit, and the results of transferring microgrid operation, modes and cutting or increasing load in islanded mode show the effectiveness and feasibility of the proposed control strategies.

    Cloud computing column
    Research on SaaS Support Architecture and Key Technologies
    Xiaodong Zhang,Lanshun Nie,Fanchao Meng,
    2013, 29(12):  72-81.  doi:10.3969/j.issn.1000-0801.2013.12.012
    Asbtract ( 339 )   HTML ( 2)   PDF (4308KB) ( 644 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    There are some problems about SaaS supported by the popular PaaS and IaaS: customizing SaaS is commonly not done deeply without semantic association; sources are wasted when SaaS applications are scaled by VM and whole application unit; SaaS applications developed by the 3rd party software vendors are not enough supported in multi-tenancy. So BIRISF was presented. Management was improved finely in way of managing SaaS components. SaaS applications were extended and waste of sources was reduced by spreading hot components on different nodes. An oriented-domain model and knowledge database were built to support to customize SaaS deeply. The problems of performance and scalability by consistent hashing feedback algorithm and three stages of dynamical extending and deploying strategy were solved. It was proved that BIRISF was superior to the classical multi-tier architecture in development, operations, maintenance and performance because of BIRISF applied successful in international shipping logistics.

    Cloud Prediction of Network Security Situation
    Shu Zhu,Lixia Liu,Lixia Liu
    2013, 29(12):  82-86.  doi:10.3969/j.issn.1000-0801.2013.12.013
    Asbtract ( 151 )   HTML ( 1)   PDF (1008KB) ( 533 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The existing algorithms of network security situation prediction were affected with subjective factors. The results of algorithms were highly relevant to selection data. An improved algorithm was proposed based on the algorithm of network security situation prediction based on cloud. It not only have the advantage of original algorithm that don't need to process the initial data in advance, but also solve the problem that errors caused by the results of the original algorithm isolate from the actual situation. Experiment results show that the algorithm is feasibility and effectiveness. The improved algorithm of network security situation prediction based on cloud can improve the accuracy of the results of network security situation prediction.

    A Deadline-Constrained Scheduling Algorithm for Intensive-Instance Serviceflows in Cloud Environment
    Wei Liu,Taoshen Li,Ruwei Huang
    2013, 29(12):  87-91.  doi:10.3969/j.issn.1000-0801.2013.12.014
    Asbtract ( 178 )   HTML ( 0)   PDF (1337KB) ( 188 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The problem that there are many intensive-instance serviceflows in business cloud computing environment was aimed to solved, so a new two-phase serviceflows scheduling algorithm was proposed. In the first phase, the global deadline to each instance was assigned, and then the deadline to the each task of instances was assigned. In the serviceflows execution phase, in order to solve the possible problem of time exception which task was not meet its sub-deadline, the algorithm adjusted deadlines of subsequent task dynamically. The experimental results in CloudSim show that the algorithm compared with others algorithm saves the execution cost with meeting the user-defined deadline, avoids the fierce competition of cheaper services and improves the success ratio of the scheduling.

    Assessment Architecture of SaaS System Based on Characteristics of System of Systems
    Xiuwei Zhang,Keqing He,Jian Wang,Jian Wang
    2013, 29(12):  92-100.  doi:10.3969/j.issn.1000-0801.2013.12.015
    Asbtract ( 210 )   HTML ( 2)   PDF (2172KB) ( 450 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of internet of things, cloud computing and software as a service as well as other new technologies, the distributed software system is becoming more and more complex because of interconnection and interoperability. The software system performance index was assessed and predicted from the perspective of system of systems, which is now a new research field. Firstly, the unique characteristics of the SoS were extracted from different definitions of SoS and an overall assessment framework was established in terms of their internal relationship. Finally, a practical SaaS system was took as a case study to validate the method.

    Provable Data Recoverability and Hide-Able Access Pattern Based ORAM
    Hongwei Li,Feiyue Ye,Dan Chen
    2013, 29(12):  101-106.  doi:10.3969/j.issn.1000-0801.2013.12.016
    Asbtract ( 198 )   HTML ( 2)   PDF (829KB) ( 397 )   Knowledge map   
    References | Related Articles | Metrics

    With the development and application of cloud computing, more and more customers choose cloud storage as the storage medium, therefore, data integrity and privacy become a major problem that the customers concern. A new structure based on oblivious RAM model was proposed. The customer file was composed by data blocks of equal-sized, and each data block had two backups in the cloud storage, and they were randomly stored in different cloud files in order to ensure data integrity. Oblivious RAM allowed a client to hide its data access patterns from an untrusted server. The data possession was verified to utilize homomorphic hash algorithm. The adversary can not obtain useful information from the client access data pattern, and the data privacy is guaranteed.

    Application Research for Data Acquisition and Summary Statistics System Based on Cloud Platform
    Guifang Shi,Chenrong Liu
    2013, 29(12):  107-112.  doi:10.3969/j.issn.1000-0801.2013.12.017
    Asbtract ( 227 )   HTML ( 7)   PDF (2515KB) ( 587 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    On the background of a practical needs of science and technology of environmental protection group, the system of data collection and statistical summaries based on cloud application research were proposed to solve the problem that the main settlement of data center, “data”, such as special topics in data collection, data processing, data analysis, data show, and so on. The major lines of data business covered comprehensive benefit, marketing management, production management, asset management, technology management, project management, social benefits and so on. Finally, project implement process for data processing, business process, and operating function of index system of supervision were realized.

    Operational Innovation Forum
    Research on User Integrated Positioning Management Platform
    Baojun Liang
    2013, 29(12):  113-116.  doi:10.3969/j.issn.1000-0801.2013.12.018
    Asbtract ( 163 )   HTML ( 2)   PDF (921KB) ( 305 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the analysis of positioning technology and hybrid positioning capabilities platform, the implementation of user integrated positioning management platform was researched. It provided the positioning management information for customers and providers by positioning customer management, positioning authentication, business statistics of user positioning, analysis of positioning mode and success rate, positioning billing information. It is easy to promotion the applications of location-based business,enhance the upgrading of information technology application to the industry's development and customer value.

    Fusion Model in Network Management
    Kai Qu,Hong Li,Zhiting Peng,Wenjun Shen
    2013, 29(12):  117-124.  doi:10.3969/j.issn.1000-0801.2013.12.019
    Asbtract ( 234 )   HTML ( 0)   PDF (3316KB) ( 256 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Integrated network management system is becoming more and more necessary for telecom carriers. Base on the features of network management systems, and according to the practice in area of integrated resource management, a way to build fusion model in integrated network management system for intensive network management was explained, which would solve the problem of stability and extensibility of the core data model.

    Design and Implementation of an Integrated Network Management System Based on Principal Component Analysis
    Xiangyun Kong,Tienan Chu
    2013, 29(12):  125-128.  doi:10.3969/j.issn.1000-0801.2013.12.020
    Asbtract ( 152 )   HTML ( 2)   PDF (1719KB) ( 254 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the big data era, efficient using of data has become an important factor in determining the competitiveness of operators. Currently the main method for network operators in data analysis is OLAP based on data warehouse. As the performance of OLAP analysis relies heavily on pre-defined data model, it's difficult for the system track the real-time changes of wireless network, which cause the current network management system always doesn't meet the actual needs of operators. A method to solve the above mentioned problem based on principal component analysis was presented, and the implementation example and the comparison of the method were given.

    Research on PaaS Platform Opening Capability of Smart Pipe
    , ,
    2013, 29(12):  129-133.  doi:10.3969/j.issn.1000-0801.2013.12.021
    Asbtract ( 231 )   HTML ( 0)   PDF (1418KB) ( 236 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the time of mobile internet, the platform has become the focus of competition in the field of operators and internet companies, the open core capabilities has become the key to success of the platform. Smart pipe is a natural advantage capability of operators, and need to access to the PaaS platform to make more value. The present situation of PaaS platform and smart pipe capability were briefly introduced, the possible business models of combination with smart pipe and PaaS platform were analyzed, technical proposal the solution on operator PaaS platform opening smart pipe capability was put forward, and finally the prospect of development of the platform was given.

    Research on Realization of MSE Equipment Based on OpenFlow Protocol
    Yongqing Zhu,Huanan Chen,Hong Tang
    2013, 29(12):  134-138.  doi:10.3969/j.issn.1000-0801.2013.12.022
    Asbtract ( 248 )   HTML ( 0)   PDF (1382KB) ( 504 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The theory of OpenFlow and MSE equipment were deeply and widely discussed. On the basis of the research, the MSE implementation with the extension of the OpenFlow protocol was proposed. It is a feasible solution for the IP network evolving to the SDN architecture.

    Research and Implementation on Quality Control of Network Management Support System
    Juan Li
    2013, 29(12):  139-144.  doi:10.3969/j.issn.1000-0801.2013.12.023
    Asbtract ( 172 )   HTML ( 1)   PDF (3182KB) ( 745 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The communications network management support system was put forward, a method of quality control realized by quantifuing was researched, and the realization technique of the method was described, network management and optimization of virtuous cycle were set up in order to improve the communication entities maintenance, service, management level.

    Application Research and Implementation of Load Balance Technology in General Collection Platform
    Yuan Zhang,Taofeng Guo,Panxiang Zhang,Jianjun Gao,Jiayan Zang
    2013, 29(12):  145-154.  doi:10.3969/j.issn.1000-0801.2013.12.024
    Asbtract ( 229 )   HTML ( 3)   PDF (3965KB) ( 656 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of high-performance network technology, dynamic load balancing as an important technology in cluster system has become a cost-effective parallel/distributed computing technology focus. Through the interpretation of dynamic load balancing principles, the research for task scheduling algorithm, the expound to build the cloud resource pool hardware solution, the implementation for different scenarios designed mechanism and the configuration instructions and load monitoring for flexible weighting factors, that has the dynamic load balance techniques applied successfully in general collection platform for x86-based private cloud resource pool. In the end, the effeteness that dynamic load balancing technology done in general collection platform was analyzed and presented.

    A Large Scale Network Traffic Analysis System Design Based on the MapReduce Platform
    Hong Tang
    2013, 29(12):  155-157.  doi:10.3969/j.issn.1000-0801.2013.12.025
    Asbtract ( 190 )   HTML ( 1)   PDF (1240KB) ( 273 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of network scale and the stricter requirement for operation efficiency, network traffic analysis system is facing big challenges in terms of the scale and analyzing depth. Traditional technologies cannot meet the current requirement for the scalability, cost and analyzing depth of the system. A MapReduce based traffic analysis system was presented, which could eliminate the performance bottleneck by parallelizing the storage and computation.

    Research on the Defense of Advanced Persistent Threats in Enterprise Network
    Dongxin Liu,Guorong Liu,Shuai Wang,Jun Shen,Huamin Jin
    2013, 29(12):  158-163.  doi:10.3969/j.issn.1000-0801.2013.12.026
    Asbtract ( 274 )   HTML ( 8)   PDF (2855KB) ( 1495 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Recently,advanced persistent threats have become a hot spot of information security industry as so many reports were taken about that some famous companies had been suffered from it. The features of APT and the reason why traditional security defense architecture was failed were discussed. After that, a solution was proposed to build a PDRR defense model. In the end, the impacts that APT brings in was discussed.

    Practice of Lange-Scale Commercial Engineering Deployment of IPv6 of Operator
    Chenpeng Bai,We Guan
    2013, 29(12):  164-167.  doi:10.3969/j.issn.1000-0801.2013.12.027
    Asbtract ( 274 )   HTML ( 1)   PDF (1803KB) ( 381 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The IPv6 transition technologies were discussed and the guidelines were offered on how to select different transition technologies for network service provider base on the in-depth analysis of practical deployment of IPv6 on the IP network of Shaanxi Telecom.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: