Please wait a minute...

Current Issue

    20 April 2018, Volume 34 Issue 4
    Viewpoint focusing
    Technologies,standards and applications of LTE-V2X for vehicular networks
    Shanzhi CHEN,Jinling HU,Yan SHI,Li ZHAO
    2018, 34(4):  1-11.  doi:10.11959/j.issn.1000-0801.2018140
    Asbtract ( 6098 )   HTML ( 356)   PDF (967KB) ( 3441 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    V2X (vehicle to everything) communication is the critical technology to provide environment sensing,information exchange and cooperative control capabilities in vehicular networks.LTE-V2X,as one of the major V2X communication standards initiated and mainly driven by Datang Telecom,can enable low latency,high reliability,high data rate and security in communications,as well as scale economies by sharing the existing LTE network and terminal chipsets.LTE-V2X communication technology was introduced,and compared with IEEE 802.11p standards.Then,the progress of LTE-V2X standardization,industrial research and development and trials and field testing works were provided.Finally,the development strategy of LTE-V2X and technical evolution towards 5G was discussed.

    Philosophy and systematic thinking of artificial intelligence technology
    Zhihong WANG,Zhen YANG
    2018, 34(4):  12-21.  doi:10.11959/j.issn.1000-0801.2018153
    Asbtract ( 883 )   HTML ( 75)   PDF (579KB) ( 1380 )   Knowledge map   
    References | Related Articles | Metrics

    Artificial intelligence (AI) technology is considered as a new generation of technological revolution that has received universal attention.The previous scientific and technological revolutions in history have brought about changes in the process of human civilization and further affected the entire social division of labor and international structure.However,due to the nature of artificial intelligence technology itself,its historical significance is quite different from previous scientific and technological revolutions,and it may be the fundamental technology that humanity has crossed over to the free kingdom.In the process of the full penetration and integration of artificial intelligence into the real economy,there are still several key issues that have not been resolved.From the perspective of philosophy and system science,several core issues that in order to get artificial intelligence technology be fully applied in the economic system were analyzed.Finally,some relevant suggestions combined with the China Telecom’s work on AI were given.

    research and development
    Channel estimation of UFMC system in multipath channel
    Xiang YU,Yanni GAO,Sirui DUAN
    2018, 34(4):  22-30.  doi:10.11959/j.issn.1000-0801.2018113
    Asbtract ( 409 )   HTML ( 6)   PDF (797KB) ( 708 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a candidate waveform of 5G,universal filter multi-carrier (UFMC) technology could inhibit out-of-band radiation,achieve loose synchronization and well support the short bursts of things in the transmission.However,in the UFMC transmission without cyclic prefix (CP),inter-symbol interference (ISI) and subcarrier interference (ICI) are generated in the multipath fading channel,which will affect the estimation accuracy in channel estimation.The interference of the UFMC system in multipath channel was firstly analyzed.After using the feedback equalization suppression ISI,the self-elimination algorithm was used to suppress the ICI according to the similarity between adjacent carriers,and the pilot coefficients were designed according to the UFMC system.Finally,the simulation results show that the proposed method applied to the UFMC can suppress the interference,improve the accuracy and reduce the bit error rate.

    Face recognition using decision fusion of multiple sparse representation-based classifiers
    Biao TANG,Wei JIN,Randi FU,Fei GONG
    2018, 34(4):  31-40.  doi:10.11959/j.issn.1000-0801.2018010
    Asbtract ( 676 )   HTML ( 11)   PDF (1335KB) ( 728 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new approach to face recognition combining decision fusion and multiple sparse representation-based classifiers was proposed to improve the robustness of the traditional methods.Different types of facial features were extracted,followed by training multiple sparse representation sub-classifiers,and then decision fusion was used to obtain the recognition result of the system.The significant advantage of the proposed scheme lines in that the final recognition results were not driven by averaging outputs of multiple sub-classifiers,but driven by combining multiple outputs via weighted fusion method.In particular,the fusion weights were adaptively determined by an iterative pro-cedure according to the different classification performance of each sub-classifier.Extensive experiments on Yale B,JAFFE and AR face databases demonstrate that the proposed approach is much more effective than state-of-the-art methods in dealing with lighting changes,expression changes and face occlusion and multi factor mixed interference.

    An approach of Bagging ensemble based on feature set and application for traffic classification
    Yaguan QIAN,Xiaohui GUAN,Shuhui WU,Bensheng YUN,Dongxiao REN
    2018, 34(4):  41-48.  doi:10.11959/j.issn.1000-0801.2018094
    Asbtract ( 303 )   HTML ( 9)   PDF (623KB) ( 505 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Bagging is a classic ensemble approach,whose effectiveness depends on the diversity of component base classifiers.In order to gain the largest diversity,employing genetic algorithms to get independent feature subset for each base classifier was proposed.Meanwhile,for better generalization,the optimal weights for the base classifiers according to their predictive performance were selected.Finally,refined Bagging ensemble based on simple Softmax regression was applied successfully in traffic classification.The experiment result shows that the proposed approach can get more improvement than the original Bagging ensemble in classification performance,and is better than the random-forests to a certain extent.

    Two-layer distributed cache in D2D integrated fog-RAN
    Chengyu XIA,Yanxiang JIANG
    2018, 34(4):  49-56.  doi:10.11959/j.issn.1000-0801.2018143
    Asbtract ( 376 )   HTML ( 3)   PDF (805KB) ( 504 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of mobile communications,people’s demands for low-latency transmission networks are rapidly increasing.Fog-RAN,as a new architecture suitable for 5G/B5G communication networks,has broad application prospects.Considering the fog network of device-to-device communication,a two-layer distributed cache based on device-to-device communication and fog-RAN was proposed to reduce the delay for users to download files.Firstly,a closed-form solution of the download delay of the two-layer cache and a closed-form solution of the delay gain were obtained.On this basis,a distributed algorithm was designed to obtain the best cache strategy,so that each fog-based wireless access point (F-AP) or user equipment (UE) only needed to use the information of the neighboring devices to complete the caching.The simulation results show that the two-layer distributed cache can effectively reduce the download delay.

    A multi-chroma format cascaded coding method for full-chroma image in AVS2
    Liping ZHAO,Tao LIN,Kailun ZHOU,Keli HU,Chunmei LIN
    2018, 34(4):  57-67.  doi:10.11959/j.issn.1000-0801.2018122
    Asbtract ( 328 )   HTML ( 2)   PDF (946KB) ( 545 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the second generation of audio video coding standard (AVS2),a multi-chroma format cascaded coding method (MCFCC) for full-chroma (4:4:4 sampling format) images coding was proposed.The MCFCC algorithm firstly converts the 4:4:4 sampling format image into 4:2:0 sampling format image,then the 4:2:0 sampling format image was processed by 4:2:0 sampling format intra prediction,transform,quantization,inverse quantization,inverse transform,entropy coding and a weighted 4:4:4 sampling format distortion calculation method in the rate-distortion optimization process,finally 4:4:4 sampling format in-loop filtering and offset algorithms were applied to the 4:4:4 sampling format image after up sampling.The experimental results show that,for full-chroma natural images,the MCFCC algorithm achieves higher coding efficiency at very low additional encoding complexity and very low additional design and implementation cost.

    A new RS steganalysis algorithm of detecting UnderMP3Cover
    Jian ZHANG,Rangding WANG,Diqun YAN
    2018, 34(4):  68-80.  doi:10.11959/j.issn.1000-0801.2018044
    Asbtract ( 327 )   HTML ( 5)   PDF (830KB) ( 672 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new RS steganalysis algorithm to attack UnderMP3Cover was proposed.By analyzing the error caused by the RS algorithm,the choice of resolution function,the initial bias and the fitting method were modified,the flip operator was also selected in the experiment.Experimental results demonstrate that the proposed method can estimate the length of embedded message effectively and the average error reduces to 2%,which is better than the existing algorithms.

    Application of K-means algorithm based on A-D model in calling abnormal customer mining
    Jian ZHOU,Yongge SHI,Meibin HE
    2018, 34(4):  81-89.  doi:10.11959/j.issn.1000-0801.2018021
    Asbtract ( 335 )   HTML ( 2)   PDF (610KB) ( 448 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to make use of massive voice communication records and cluster high-quality clients (telecom fraud clients,advertisers) with various kinds of voice communication abnormalities,a behavioral feature model of abnormal voice communication customers was designed and constructed.Based on the model,a clustering analysis algorithm for customers with abnormal voice communication behavior was proposed.First of all,by analyzing the call records of customers,the characteristics of call behaviors was got,such as the number of calls,call rates,and so on.Then AHP-DEMATEL model was constructed by blending the AHP model and DEMATEL method.Secondly,based on the model,an improved K-means algorithm was proposed to cluster the abnormal clients according to the voice communication records.Finally,the real data was used to verify the analysis.The results show that compared with other similar algorithms,the proposed algorithm improves the performance of multi-type abnormal customer comprehensive clustering analysis and single-type abnormal customer clustering analysis greatly.

    An improved RFID authentication protocol based on quadratic residue
    Zhiliang LIU
    2018, 34(4):  90-97.  doi:10.11959/j.issn.1000-0801.2018042
    Asbtract ( 381 )   HTML ( 3)   PDF (602KB) ( 514 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the existing radio frequency identification(RFID) authentication protocol based on quadratic residue in the security and cost aspects of the loopholes and deficiencies,an improved RFID bidirectional authentication protocol based on the quadratic residue was designed.The improved protocol was mixed with random number encryption under the framework of the quadratic residue,which makes the message certification and identification more efficient and fast in database authentication and identification; the ultra-lightweight bit replacement operations and XOR encryption communication information was introduced,which reduces the cost of system computing; in database,the random number checking mechanism was added to avoid attacks such as agreement to be synchronized and denial of service attacks; finally,the GNY logical proof of the protocol was given,which shows the feasibility of the improved protocol.The protocol security and performance analysis indicate that the improved protocol has higher security and lower cost.

    Summary
    A review of network traffic analysis targeting mobile devices
    Ming XU,Xue YANG,Jianwu ZHANG
    2018, 34(4):  98-108.  doi:10.11959/j.issn.1000-0801.2018151
    Asbtract ( 615 )   HTML ( 21)   PDF (670KB) ( 892 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Mobile devices are now ubiquitous in people’s life,thus analyzing network traffic generated by these devices can provide valuable information for network management and privacy preservation.In order to review the works that contribute to the state of the art of network analysis targeting mobile devices,the framework of network analysis,traffic collection approaches were introduced and a classification of the works according to the goal of the analysis was presented.Finally,the future research of network analysis targeting mobile devices was proposed based on the current problems in this literature.

    Operating technology wide Angle
    5G mobile/multi-access edge computing integrated architecture and deployment strategy
    Jianmin ZHANG,Weiliang XIE,Fengyi YANG,Zhouyun WU
    2018, 34(4):  109-117.  doi:10.11959/j.issn.1000-0801.2018139
    Asbtract ( 2468 )   HTML ( 149)   PDF (726KB) ( 2200 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Mobile/multi-access edge computing (MEC) technology migrates computing storage capabilities and service service capabilities to the edge of the network,enabling applications,services and content to be localized,close-range and distributed.Therefore,to a certain extent,the business requirements of 5G enhanced mobile broadband,low latency and high reliability and large-scale machine communication terminal connection are solved.At the same time,the MEC fully exploits mobile network data and information to implement the awareness and analysis of context information of the mobile network and open it to third-party service applications.This effectively enhances the level of intelligence in mobile networks and promotes the deep integration of networks and services.Therefore,the value and significance of the MEC was firstly analyzed according to the typical 5G service scenario.Secondly,based on the research progress of ETSI and 3GPP,a MEC fusion architecture oriented to 5G was proposed,and the overall deployment strategy of MEC was discussed and analyzed.Furthermore,the possible problems and challenges in the future application of MEC technology in 5G networks were discussed to provide reference for subsequent research and development.

    Research and optimization on quality of service in distributed block storage system
    Yaofeng TU,Hongzhang YANG,Yinjun HAN,Zhenghua CHEN
    2018, 34(4):  118-128.  doi:10.11959/j.issn.1000-0801.2018157
    Asbtract ( 330 )   HTML ( 3)   PDF (820KB) ( 681 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In cloud storage technology,resource reuse and sharing is a double-edged sword.While it reducing the overhead for customers,it leads to a situation that the different applications will compete for hardware resources,especially when resource requirement exceeded storage system capability.As a consequence the cloud storage system is unable to provide satisfactory quality of service.An adaptive scheduling technology was proposed,solving the resource balance problem between front tasks and back tasks.A multilevel popularity cache replacement technology was also proposed,solving the resource balance problems between the front tasks themselves.These technology was implemented and tested on the ZTE distributed block storage system.The proposed technology satisfies the expectations of the quality of service from the users.

    Authentication scheme of smart home based on eUICC
    Yan LI,Yanqing LU,Rong ZHANG,Maowen GUO
    2018, 34(4):  129-135.  doi:10.11959/j.issn.1000-0801.2018040
    Asbtract ( 401 )   HTML ( 7)   PDF (688KB) ( 533 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The main existing security risks in smart home services was analyzed.For the reason of these risks,the key points of smart home security and also the authentication scheme based on eUICC were put forward,including the overall architecture,main module interactions,key processes,etc.Finally,the application of eUICC in the field of smart home was prospected.

    Design and implementation on remote disaster recovery system based on Goldengate
    Zhengyu MI
    2018, 34(4):  136-143.  doi:10.11959/j.issn.1000-0801.2018104
    Asbtract ( 282 )   HTML ( 1)   PDF (842KB) ( 845 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As telecom business-critical systems become more and more important,the demand for IT classes has also increased.The IT system should be more reliable,faster and easier to use and to adapt better to changing business needs.On the other hand,the security risks are also increasing.The concept of synchronous replication technology and the realization theory of Goldengate was focused on,the characteristics and advantages of the technology were discussed.Through the analysis of actual cases,the feasibility of using Goldengate data replication technology was verified,the data real-time backup was realized,the core database security was ensured while avoiding the introduction of too many categories software,and the complexity of operation and cost inputs was reduced,also it is conducive to the recovery of disaster recovery system and real-time switching.

    Security& safety protection solution of ICS
    Qi LIANG
    2018, 34(4):  144-150.  doi:10.11959/j.issn.1000-0801.2018154
    Asbtract ( 342 )   HTML ( 6)   PDF (1135KB) ( 1090 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the oil field ICS architecture,combined with the current network security technology,all kinds of risks faced by the industrial control system were analyzed,and a complete set of industrial security & safety protection scheme standard for the energy industry was put forward.

    Power informatization column
    Application of big data and cloud computing in power industry
    Ruchu LI,Minglong SHEN,Haitang PENG
    2018, 34(4):  151-155.  doi:10.11959/j.issn.1000-0801.2018128
    Asbtract ( 564 )   HTML ( 27)   PDF (578KB) ( 669 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of information technology,the amount of information among all walks of life has shown an explosive growth trend.China’s power industry also entered the era of big data immediately.Simultaneously,in view of the wide range of management involved in China’s power industry and the total amount of power data’s rapidly expanding,management and data server was put forward,big data technology and cloud computing technology have been widely used by virtue of its own advantages in the power industry.Therefore,based on elaborating on big data and cloud computing,the application of big data and cloud computing in power industry was analyzed systematically and the scope of application of big data and cloud computing in electric power industry in the future was further expanded.

    Implementation of a big data anonymization system based on Spark
    Chaoyi BIAN,Shaomin ZHU,Tao ZHOU
    2018, 34(4):  156-161.  doi:10.11959/j.issn.1000-0801.2018133
    Asbtract ( 491 )   HTML ( 16)   PDF (666KB) ( 842 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Group based anonymization is a classical data anonymization framework,which achieves the effect of privacy protection by constructing groups of anonymized data records ensuring that records in the same group cannot be distinguished with each other.The electric power industry big data analysis involves the core data of the power enterprises and the user privacy data,the data sensitivity is stronger,traditional data anonymization systems are unable to meet the needs of big data business applications and safety protection of electric power industry.A new big data anonymization system based on Spark was designed and implemented,which could provide the support for multiple data formats stored on Hadoop and substantially improve the processing efficiency for big data.

    A SA-BP neural network algorithm based channel quality evaluation method in optical access network
    Bingqing CAI,Siya XU,Feng QI,Weichun GE,Guiping ZHOU,Botao YU,Yueyue LI
    2018, 34(4):  162-172.  doi:10.11959/j.issn.1000-0801.2018124
    Asbtract ( 422 )   HTML ( 6)   PDF (1187KB) ( 509 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    So far,existing works related to quality evaluation of channel mainly focused on equipment layer and network layer in optical access network.Most of researches lack synthesis evaluation methods covering physical layer,network layer and business layer.As a result,it is hard for administrators to judge the actual quality of channel by network monitoring completely and accurately.To solve this problem,key influence factors of channel quality in optical access network was analyzed firstly,and a comprehensive multi-layer-multi-index evaluation model of channel quality was proposed.Then a SA-BP neural network algorithm was designed to train the parameters of the proposed evaluation model to make the result more accurate.The simulation results show that the proposed method has higher accuracy and stability,and can improve the quality and efficiency of network operation and maintenance.

    Study and implementation of electric cloud storage pool’s management system
    Feng SHANG,Aiqiang Dong,Jian ZHANG,Guoxia WANG,Hongge ZHANG
    2018, 34(4):  173-181.  doi:10.11959/j.issn.1000-0801.2018141
    Asbtract ( 359 )   HTML ( 6)   PDF (799KB) ( 693 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The storage pool is an important part of the resource pool and plays an important role in data storage and data backup.The storage pool has the characteristics of large scale,prominent isomerism,and complex functions.The storage pool management system of the storage pool guarantees the normal work of the storage pool.Based on the design of the storage pool architecture,the functional framework of the storage pool was clarified,and the deployment structure of the storage pool management system and the overall architecture of the storage pool management system was proposed and designed,and the implementation functions and display form of the management system were elaborated in detail.The research and implementation of the storage pool management system not only promoted the construction of the power cloud resource pool,but also provided a good reference for other companies’ cloud computing technology.

    Embedded software security testing technology for relay protection devices
    Wei DING,Jiaxiao MENG,Tao DAI,Huajun CHEN
    2018, 34(4):  182-187.  doi:10.11959/j.issn.1000-0801.2018150
    Asbtract ( 248 )   HTML ( 0)   PDF (651KB) ( 728 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the first defensive line of power grid security,the right actions of delay protection devices can minimize the influence to the electric power system security caused by system or equipment failures.Based on the research of relay protection device inspection procedures and enterprise standard of electric power industry,the embedded software testing content and technologies of relay protection device were studied,including functional testing,performance testing and fault injection testing.This research contributes to the completeness and correctness of the embedded software testing about relay protection device.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: