Please wait a minute...

Current Issue

    20 November 2017, Volume 33 Issue 11
    View the focus
    Development and forecast of 10/40/100 Gbit/s PON technology
    Chengliang ZHANG,Qing WANG,Jingwen YU,Fen WAN
    2017, 33(11):  1-8.  doi:10.11959/j.issn.1000-0801.2017300
    Asbtract ( 314 )   HTML ( 6)   PDF (999KB) ( 1184 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Currently,the evolution of EPON/GPON to higher bitrate technology has become a hot topic in optical access field.Based on this,the current situation and problems of XG(S)-PON,TWDM PON,WDM PON and 100 Gbit/s EPON were analyzed,then some forecast of above technologies was given.

    Research and Development
    Dual-sample differential space-time coding scheme in asynchronous satellite cooperative communication system
    Jianwu ZHANG,Hejiaqi TU
    2017, 33(11):  9-16.  doi:10.11959/j.issn.1000-0801.2017309
    Asbtract ( 388 )   HTML ( 4)   PDF (917KB) ( 547 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Focusing on asynchronization in relay communication system over satellite fading channels,a dual-sampling differential space-time orthogonal frequency division multiplex(D-OFDM2)coding scheme was proposed.The proposed scheme constructed a dual-sampling method at the receiver based on the D-OFDM coding with delay tolerance when the satellite channel condition was unknown.The method added another sample to the current main lobe interval and equal gain merge the two sampling results.Comparing with the traditional scheme when the fractional delay is present,the D-OFDM2 scheme can obtain higher signal-to-noise ratio than single sampling method,and improves the system error performance.

    Energy-efficient optimization algorithm based on vertical beamforming for 3D MIMO-OFDMA system
    Ting LI,Linjie QIU,Wei JI
    2017, 33(11):  17-26.  doi:10.11959/j.issn.1000-0801.2017266
    Asbtract ( 347 )   HTML ( 5)   PDF (883KB) ( 736 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An energy-efficient optimization algorithm was proposed for the 3D MIMO-OFDMA communication system.The proposed algorithm based on vertical beamforming technology maximized energy efficiency by adjusting the resource allocation,power allocation and the downtitles of the beam.According to the theory of fractional optimization,the complex fractional optimization problem could be converted into a more tractable integral optimization problem.The lagrangian operator was introduced to obtain the optimal value of energy efficiency by iteration.Simulation results show that the proposed algorithm can achieve higher energy efficiency with fewer iterations.

    Policy conflict detection in software defined network by using deep learning
    Chuanhuang LI,Cheng CHENG,Xiaoyong YUAN,Lijie CEN,Weiming WANG
    2017, 33(11):  27-36.  doi:10.11959/j.issn.1000-0801.2017305
    Asbtract ( 489 )   HTML ( 6)   PDF (895KB) ( 1000 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In OpenFlow-based SDN(software defined network),applications can be deployed through dispatching the flow polices to the switches by the application orchestrator or controller.Policy conflict between multiple applications will affect the actual forwarding behavior and the security of the SDN.With the expansion of network scale of SDN and the increasement of application number,the number of flow entries will increase explosively.In this case,traditional algorithms of conflict detection will consume huge system resources in computing.An intelligent conflict detection approach based on deep learning was proposed which proved to be efficient in flow entries’ conflict detection.The experimental results show that the AUC (area under the curve) of the first level deep learning model can reach 97.04%,and the AUC of the second level model can reach 99.97%.Meanwhile,the time of conflict detection and the scale of the flow table have a linear growth relationship.

    Handover technology in high-speed railway broadband wireless communication system
    Yunyi LIU,Junhui ZHAO,Chuanyun WANG
    2017, 33(11):  37-46.  doi:10.11959/j.issn.1000-0801.2017278
    Asbtract ( 535 )   HTML ( 15)   PDF (1203KB) ( 1476 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The existing railway mobile communication system can’t meet the requirements of railway information construction.Therefore,the key technology research of next generation of high-speed railway (HSR) communication system needs to be carried out.Handover is a key technology of HSR broadband wireless communication system,which has great significance to ensure the train safety and communication reliability.The research results of the handover in HSR communication system were summarized and the existing problems were investigated.Furthermore,the development directions of handover in the future were explored.

    Joint user association and power control scheme based on energy consumption and QoE in heterogeneous network
    Shiyu JI,Liangrui TANG,Shuxian LI,Shimo DU
    2017, 33(11):  47-55.  doi:10.11959/j.issn.1000-0801.2017251
    Asbtract ( 297 )   HTML ( 3)   PDF (1059KB) ( 663 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on multi-objective optimization,a joint user association and power control scheme was proposed in heterogeneous network environment,aiming to reduce the system energy consumption and improve user quality of experience.The scheme took the system energy consumption minimum and the average user quality of experience maximum as objective functions and translated the joint user association and power control to multi-objective problem.Then,the differential evolution optimization algorithm and TOPSIS algorithm was used to solve the multi-objective problem.Simulation results show that the scheme can efficiently reduce the system energy consumption and improve the user quality of experience.

    Wireless sensor network nodes localization method based on cellular automata bat algorithm
    Kailu MENG,Keqiang YUE,Junna SHANG
    2017, 33(11):  56-65.  doi:10.11959/j.issn.1000-0801.2017311
    Asbtract ( 321 )   HTML ( 6)   PDF (851KB) ( 692 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To further enhance the location precision of unknown nodes and solve the node location error in wireless sensor network,a location method based on cellular automata bat algorithm was presented.Mixed the idea of cellular automata and the bat algorithm and drawed into the cellular RCS niche technique and disaster mechanism,the algorithm could jump out of local optimum and increase the convergence speed.In order to verify the feasibility and efficiency,the proposed algorithm was verified through simulation of several benchmark functions.Then the algorithm implemented the CA-BA to node location prediction to increase the precision of the unknown node location.In the measured experiment,the results show that the proposed algorithm has higher accuracy compared to the improved PSO algorithm,which average localization error is less than 0.5m.

    Impulsive noise mitigation based on iteration adaptive approach in underwater acoustic communication
    Guili ZHOU,Youming LI,Mingchen YU,Xiaoli WANG
    2017, 33(11):  66-72.  doi:10.11959/j.issn.1000-0801.2017240
    Asbtract ( 419 )   HTML ( 7)   PDF (857KB) ( 902 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Focusing on the impulsive noise mitigation in underwater acoustic communication,an impulsive noise mitigation method based on iteration adaptive approach was proposed.Firstly,by utilizing the orthogonality of the subcarriers in OFDM system,both the impulsive noise and background noise were separated from the signals.Then null tones matrix was used to construct a steering matrix and get the impulsive noise interference covariance matrix.Furthermore,a cost function based on weighted least squares approach was proposed and a close form expression for the impulsive noise was derived.Finally,the impulsive noise was mitigated by substracting the estimation of the impulse noise in the received signal.Simulation results show that the proposed algorithm can reduce the bit error rate (BER) efficiently and provide better performance,especially in high signal to impulsive noise ratio (SINR) case.

    Design and implementation of spam filtering system based on topic model
    Xiaohuai KOU,Hua CHENG
    2017, 33(11):  73-82.  doi:10.11959/j.issn.1000-0801.2017313
    Asbtract ( 353 )   HTML ( 3)   PDF (829KB) ( 1086 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Spam filtering technology plays a key role in many areas including information security,transmission efficiency,and automatic information classification.However,the emergence of spam affects the user's sense of experience,and can cause unnecessary economic and time loss.The deficiency of spam filtering technology was researched,and a method of spam classification based on naive Bayesian was put forward based on multiple keywords.In the subject of mail,the theme model was used by LDA to get the related subject and keyword of the message,and Word2Vec was further used to search keyword synonyms and related words,extending the keyword collection.In the classification of mails,the transcendental probability of the words in the training dataset was obtained by statistical learning.Based on the extended keyword collection and its probability,the joint probability of a subject and a message was deduced by the Bayesian formula as a basis for the spam judgment.At the same time,the spam filtering system based on topic model was simple and easy to apply.By comparing experiments with other typical spam filtering method,it is proved that the method of spam classification based on theme model and the improved method based on Word2Vec can effectively improve the accuracy of spam filtering.

    An association optimization algorithm for wireless access points based on graph transformation
    Wen TAO,Yan SHEN,Xinjie GUAN,Xili WAN
    2017, 33(11):  83-92.  doi:10.11959/j.issn.1000-0801.2017310
    Asbtract ( 302 )   HTML ( 5)   PDF (1013KB) ( 641 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Wireless access point association problem is one of the fundamental problems for Wi-Fi systems.Existing studies focus on the AP association problems under the bandwidth capacity constrain,without considering bandwidth demand for users.Considering the user bandwidth demands,the access point association problem for a Wi-Fi system under hybrid network architecture was studied,with the objective of maximum bandwidth allocation.Different from existing studies,by utilizing graph transformation techniques,this optimization problem was transformed to a network flow optimization problem on a flow graph.Then,an algorithm was proposed based on the maximum network flow problem.Theoretic proof for the optimality of the algorithm was presented and simulations results further validated the superiority of the proposed algorithm.

    AAC compression detection based on scaling factor transition probability
    Qijuan HUANG,Rangding WANG,Diqun YAN
    2017, 33(11):  93-101.  doi:10.11959/j.issn.1000-0801.2017277
    Asbtract ( 292 )   HTML ( 5)   PDF (885KB) ( 622 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Audio compression history detection is an important part of audio forensics,which is important to detect whether audio has been tampered or forged.An algorithm of AAC audio compression history detection was presented by using the transition probability differences of scale factors as the discriminative feature.Experimental results demonstrate that the proposed method can distinguish the single,double and triple compressed AAC audios effectively,and from the low-bite-rate to high-bit-rate,the average classification accuracy achieves 99.75%,the same-bit-rate detection accuracy achieves 97.28%.In addition,the results of comparison experiments show that the proposed algorithm outperforms the state-of-the-art algorithm.

    Multipurpose zero watermarking algorithm for medical image based on SVD and SAE
    Jieli SUN,Yanxia ZHAO,Zenghui ZHOU,Sheng XING
    2017, 33(11):  102-111.  doi:10.11959/j.issn.1000-0801.2017254
    Asbtract ( 349 )   HTML ( 2)   PDF (1243KB) ( 638 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A multipurpose zero watermarking algorithm was proposed according to the copyright protection and tamper location of medical image.The two information matrices were executed the XOR operation with the original robust watermarking image and the original semi-fragile watermarking image separately to generate zero robust watermarking image and zero semi-fragile watermarking image.The experimental results show that effects of extracted zero watermarking image are terrific,and the algorithm can resist the common attacks,particularly its resistance is effect ive for strong attacks.

    Summary
    Key technology and standardization progress for 5G
    Qingyang WANG,Peirong XIE,Shangkun XIONG,Yao WEI,Yu LIU,Wenyi LI,Jinlian WU
    2017, 33(11):  112-122.  doi:10.11959/j.issn.1000-0801.2017312
    Asbtract ( 2850 )   HTML ( 232)   PDF (902KB) ( 2816 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Under the impetus of the global industry,the 5G technology developes rapidly and has entered the critical stage of standard setting and technical verification.Based on this,the key technologies of 5G and its latest standardization progress was introduced mainly,including massive MIMO,new radio network architecture,ultra dense network,edge computing,network slicing,networking on-demand ,4G and 5G interworking,as well as industry organization and operator dynamics,and ended with some thoughts and suggestions.

    Internet of things technology column
    Summary of existing framework in industrial communication networks and future development strategies for communication operators
    Jie CHANG,Yi WANG,Jie LI,Zhengwen CHEN
    2017, 33(11):  123-133.  doi:10.11959/j.issn.1000-0801.2017301
    Asbtract ( 861 )   HTML ( 17)   PDF (3656KB) ( 1887 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Industrial communication networks are developing in the direction of networking,digitization and intelligence,which could not be considered as just a single communication network but as important sub-systems of the automatic control systems.Based on framework of the existing industrial communication network,the industrial model was systematically studied and divided into within and outside of the enterprise.The existing framework mainly concentrated in interior of factory within manufacturing enterprise and mainly referenced ISA-95 model,included field-level,control-level,workshop-level and factory-level.The network configuration and management strategies between each layer were independent.Then,the existing technology systems in industrial network and requirements of network upgrading facing future development of manufacturing were analyzed in detail.Lastly,the future development strategies of communication operators were put forward.

    Identifier technology in industrial internet
    Zhen YANG,Dong ZHANG,Jie LI,Jianxiong ZHANG
    2017, 33(11):  134-140.  doi:10.11959/j.issn.1000-0801.2017296
    Asbtract ( 1325 )   HTML ( 98)   PDF (891KB) ( 4078 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The value discovery of data is the core of industrial internet,but for historical reasons,there are many information islands exist in enterprises.The identifier is the key technology for solving information isolated island and industrial big data gathering.Also,the identifier is the basis technology of understanding industrial big data.Several key elements in the application of identifier in industrial internet were analyzed,and some research ideas for the future study of industrial big data’s understanding were given.

    Architecture and service model of IoT enabled platform
    Zhao PENG
    2017, 33(11):  141-145.  doi:10.11959/j.issn.1000-0801.2017302
    Asbtract ( 414 )   HTML ( 5)   PDF (722KB) ( 908 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Existing successful IoT (internet of things) application cases concentrate on the vertical field of local scale and usually focused on closed loop applications,which leading to numerous application islet.Internet companies,traditional equipment manufacturers,cloud service providers,as well as other industrial giants have built an IoT ecosystem with the core of its own capabilities.Starting with key point of building IoT ecosystem,technology architecture and service model of IoT enabled platform was studied,the core function and key technology of platform was discussed,and the platform development trend was presented.

    Situation description and critical technology analysis for industrial connection of intelligent manufacturing
    Jie LI,Dong ZHANG,Jie CHANG,Zhen YANG
    2017, 33(11):  146-153.  doi:10.11959/j.issn.1000-0801.2017295
    Asbtract ( 678 )   HTML ( 38)   PDF (853KB) ( 2365 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the formally issue of the industrial internet in USA,the industry 4.0 in German and made in China 2025,the integration of the IT,Internet and industrialization has became the trend of intelligent manufacturing.Industrial connection is the basic ability for intelligent manufacturing.Firstly,the technology situation of OT and IT industrial connection was described.And then combined with made in China 2025,the eight demands for industrial internet scenarios and industrial connectivity key technology were analyzed,including data acquisition,IP network,wireless network,identifier resolution and network security,Finally,according to the domestic situation,the future trend of industrial connection was prospected.

    Automatic management technology of object storage systems
    Doudou HU,Fei LUO,Yuan ZHANG
    2017, 33(11):  154-161.  doi:10.11959/j.issn.1000-0801.2017306
    Asbtract ( 286 )   HTML ( 3)   PDF (1511KB) ( 574 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The object storage system not only breaks the bottleneck of the traditional SAN storage system,but also achieves the expansion of performance and capacity linearly in video monitoring field.However,the remote management for the resources of the object storage system has become a problem for managers.Aiming at this problem,the method and related technology of automatic management of object storage cluster was studied,so as to improve the efficiency of storage cluster.The functions of the automatic management system included remote lauching,stopping and resetting of cluster components,monitoring of running status,cluster expansion and log viewing and storage.Based on Ceph object storage cluster,the automated management system for Web application service platform was achieved,monitoring and management was realized effectively ultimately,and the nodes of the cluster and the storage capacity were expanded automatically.

    Operation technology wide Angle
    Development of carrier’s IP bearer network in cloud-network coordinated era
    Yongqing ZHU,Xiaoying HUANG,Wenqiang ZHANG
    2017, 33(11):  162-168.  doi:10.11959/j.issn.1000-0801.2017256
    Asbtract ( 505 )   HTML ( 12)   PDF (923KB) ( 961 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    IP bearer network is one of the basic internet infrastructures.It plays a more and more important role in the cloud-network coordinated era.Entering the era of everything interconnected,the IP beaer network evolution has changed from network-centric to user-centric.Combined the current situation of the IP bearer network with the research of related technologies and service,some suggestions on IP bearer network development based on the concept of “experience circle” were given.The “experience circle” concept came from the research on traffic regional aggregation,which offered a way to optimize the IP bearer network based on user’s experience,as well as suggestions on IP-transport synergy and application coordination.

    Channel estimation and performance analysis for uplink SCMA system
    Xian’an HU,Xiangnian ZENG
    2017, 33(11):  169-178.  doi:10.11959/j.issn.1000-0801.2017267
    Asbtract ( 542 )   HTML ( 17)   PDF (932KB) ( 1138 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    There are two types of physical mapping for SCMA named RE-Sparse SCMA and RB-Sparse SCMA.A frequency division multiplexing (FDM) based pilot pattern was proposed for RE-Sparse SCMA,and existing code division multiplexing pilot patterns based on cyclic shift and orthogonal cover code (OCC) were considered.Under different frequency selective channels,simulation and evaluation work for the two mapping schemes of SCMA had done.Besides,a target user selection strategy was proposed for existing SIC-MPA.Analytical simulation results show that both OCC and FDM can improve system performance with slot fading channel.Compared with RE-Sparse SCMA,RB-Sparse SCMA with partially frequency orthogonal pilot pattern enjoys better performance gain,and it is more applicable for realistic multi-user SCMA scenario.

    Transient community awared data forwarding mechanism for intermittent connected wireless network
    Jian DU,Yuanyi XIA,Junfeng ZHAO,Zheng WANG,He WANG
    2017, 33(11):  179-185.  doi:10.11959/j.issn.1000-0801.2017262
    Asbtract ( 275 )   HTML ( 1)   PDF (783KB) ( 1219 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of data forwarding in intermittent connected wireless network effectively,a transient community awared data forwarding mechanism for intermittent connected wireless network (ICWN) was proposed.Utilizing the semi-Markov chain model,the transfer process of nodes’s between multiple geographic locations was described and the time probability distribution of nodes’ encountering in the future was predicted,then the encountering time and locations could be obtained,which provided theoretical basis for the selection of next relay node.Experiment results show that the proposed mechanism can effectively improve the forecasting accuracy of nodes’ encounter and has a great improvement in the data delivery ratio and transmission delay.

    Research on NFV fault association and fault self-healing
    Binhong MAO,Zhiming YANG
    2017, 33(11):  186-194.  doi:10.11959/j.issn.1000-0801.2017261
    Asbtract ( 713 )   HTML ( 13)   PDF (796KB) ( 807 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    NFV implements the hardware and software decoupling of telecommunications network equipment,gets rid of the dependence on dedicated hardware equipment.NFV brings benefits such as resource sharing,automatic deployment,flexibility and other features,but it also brings some problems such as more fault points,difficult fault analysis and so on.It results in NFV network operation and maintenance more difficult.The NFV fault process and fault association were analyzed,and guidance for fault location processing in NFV was provided.At the same time,the VNF fault self-healing implementation scheme was given to realize the network element and service fault self-healing,and improve capability of automatic operation and maintenance.

    Planning algorithm of small cell deployment scheme
    Yang LIU
    2017, 33(11):  195-200.  doi:10.11959/j.issn.1000-0801.2017253
    Asbtract ( 310 )   HTML ( 1)   PDF (762KB) ( 905 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of mobile network,small cell is more and more important in the construction of LTE network.A best small cell deployment scheme named association-AHP was proposed.Combining the analytic hierarchy process with the gray relational analysis method,the relationship between each deployment plan and index parameter was determined,and each plan was ranked.Finally,the best small cell deployment scheme was obtained.Simulation results indicate that association-AHP performs better than traditional algorithms in ROI,and it can improve user satisfaction.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: