Please wait a minute...

Current Issue

    20 August 2018, Volume 34 Issue 8
    Topic:5g
    Review of 5Gmobile communication technology standard
    Ying DU,Hao ZHU,Hongmei YANG,Zhiqin WANG,Yang XU
    2018, 34(8):  2-9.  doi:10.11959/j.issn.1000?0801.2018231
    Asbtract ( 304 )   HTML ( 15)   PDF (644KB) ( 1673 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The industry is working togetheRto create 5G technology standard,which shouldmeet the needs ofmobile broadband and internet of things.Recently,3GPP declares the first 5G standard which supports the standalone deployment frozen.5G supports wider bandwidth,low latency,flexible configuration.New service-based architecture is designed for 5G,which supports important service capabilities,e.g.network slice,edge computing.5G standards were introduced,including new radio,new core and security.In the end,the trends of 5G standard were summarized.

    Network architecture in the 5Gmobile systems
    Hongyu XIANG,Xinran ZHANG,Zhuying PIAO,Mugen PENG
    2018, 34(8):  10-18.  doi:10.11959/j.issn.1000?0801.2018230
    Asbtract ( 149 )   HTML ( 13)   PDF (695KB) ( 907 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In ordeRtomeet the performance requirements of 5G networking such as huge traffic,large links,and ultra-low latency,the traditional wireless access network architecture for wide coverage and high capacity design needs to evolve.Firstly,combining the 5G vision and needs,the characteristics and importance of the 5G access network architecture were clarified.Then the design principle and specific composition of the 5G access network architecture was introduced from the perspectives of academia and industry,and the advantages and disadvantages were analyzed.Finally,the challenges of access network architecture and possible future development directions were discussed.

    Mobile AR/VR in 5G based on convergence of communication and computing
    Yiqing ZHOU,Bule SUN,Yanli QI,Yan PENG,Ling LIU,Zhilong ZHANG,Yitong LIU,Danpu LIU,Zhaoxin LI,Lin TIAN
    2018, 34(8):  19-33.  doi:10.11959/j.issn.1000?0801.2018241
    Asbtract ( 171 )   HTML ( 9)   PDF (716KB) ( 853 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Oriented to 5Gmobile communication network combining with communication and computation,the characteristics ofmobile AR/VR information processing and transmission were analyzed,and the ability to integrate communication and computation was proposed,and the capability of integrating communication and computing was proposed.In the future 5Gmobile communication network,multi-level computing will be used to solve the problem of limited computing capacity ofmobile terminals by the capability ofmulti-level computing nodes in collaborative network.Intelligent transmissionmechanism could overcome the problem of unstable transmission capacity ofmobile channel by efficient spectrum sensing,layered coding and adaptive space port transmission,and themobile AR/VR service delay was ensured by using delay guaranteemechanism and cooperativemanagement of communication and computing resources.The research status and development trend ofmobile AR/VRmulti-level computingmodel,intelligent transmissionmechanism and service delay guarantee was reviewed,the existing problems were summarized and the next research direction was put forward.

    Research progress of 5G advanced technologies
    Hongchi LIN,Wenbin SUN,Jichong GUO,Jinming MA,Yongkang ZHOU,Qiyue YU,Weixiao MENG
    2018, 34(8):  34-45.  doi:10.11959/j.issn.1000?0801.2018238
    Asbtract ( 115 )   HTML ( 12)   PDF (1215KB) ( 1009 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The standards of the 5th generation communication technology were picking up.Compared with previous generations’communication technologies,5G will facemore complex business requirements,more extreme user experience andmore dense network architecture.Moreover,5G needs to lay a good communication foundation for IoT before the arrival of the era of big data and artificial intelligence.Some hot technologies of 5G were briefly introduced.Firstly,the techni cal vision and demand target of 5G was given,and then the research progress of three hot technologies ofmassive MIMO,ultra dense network and non-orthogonalmulti-access technology was expounded.

    An overview of wireless transmission technology utilizing artificial intelligence
    Jing ZHANG,Shi JIN,Chaokai WEN,Feifei GAO,Tao JIANG
    2018, 34(8):  46-55.  doi:10.11959/j.issn.1000?0801.2018234
    Asbtract ( 502 )   HTML ( 66)   PDF (657KB) ( 3368 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Intelligent communication is considered to be one of themainstream directions in the development of wireless communications after 5G.Its basic idea is to introduce artificial intelligence into all aspects of wireless communication systems,realizing the significant integration of wireless communication and artificial intelligence technology.At present,the research in this field is advancing to the physi cal layer.The combination of wireless transmission and deep learning is also in the preliminary exploration stage.Key technologies of wireless physi cal layer based on deep learning were introduced in detail from the aspects of channel estimation,signal detection,feedback and reconstruction of channel state information,channel decoding,end-to-end wireless communication systems,the latest research progress of international academic circles in recent years was presented.On this basis,the development trend in the future was preliminarily forecasted.

    Research and verification of key issues in 5G network
    Wei LIU,Jiangbo DONG,Yebing REN
    2018, 34(8):  56-61.  doi:10.11959/j.issn.1000?0801.2018232
    Asbtract ( 160 )   HTML ( 11)   PDF (735KB) ( 580 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The first edition of 5G techni cal specification has been frozen on June 2018,and the end to end products have also been steadily developing.The 5G network s cale test has been launched,to clear strategy for introducing technology and new technologies.The development of 5G industry in the world was introduced.And then the key issues of 5G were combed from 3 dimensions.Finally,the basic situation of the 5G s cale test was introduced,including the principles and objectives,the overall plan and the test content.

    Standardization of 5G new radio technology oriented Polar code
    Desheng XIE,Rong CHAI,Leilei HUANG,Qianbin CHEN
    2018, 34(8):  62-75.  doi:10.11959/j.issn.1000?0801.2018237
    Asbtract ( 178 )   HTML ( 12)   PDF (1079KB) ( 1504 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Amore efficient new channel coding scheme was required for NRby the service features and capability indices of 5G.Due to its excellent performance,Polar code was specified as the control channel coding scheme for 5G enhancedmobile broadband(eMBB)scenario.An overview of Polar code was presented and themain existing research issues of the standardization for new radio(NR)technology oriented Polar code,including code construction,sequence design,rate-matching and channel interleaving,etc,were elaborated.Then some specific analysis and comparisons of the Polar code schemes which were proposed by 3GPPmember institutes in RAN1 conferences recently were presented.Finally,a summary of the standardization works of Polar code was given on the basis of the above discussions.

    research and development
    A survey on joint optimization of MEC caching and transcoding for video streaming
    Jia LI,Renchao XIE,Qingmin JIA,Tao HUANG,Yunjie LIU,Li SUN
    2018, 34(8):  76-86.  doi:10.11959/j.issn.1000?0801.2018222
    Asbtract ( 101 )   HTML ( 7)   PDF (788KB) ( 757 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To deal with the huge challenges in futuremobile networks,the industry has proposed adaptive bit rate(ABR)technology andmobile edge computing(MEC),aiming to provide users with diverse services of high quality of experience,low latency and high bandwidth.Combining ABR and MEC to optimize the distribution of video content has been quite important for improving network performance and quality of experience.Especially,the joint optimization of network resources has arisen as an essential research topic.An overview of MEC was firstly given,and then the existing work in the industry on the joint optimization problem of MEC caching and transcoding oriented to adaptive streaming was analyzed and compared.Finally,the existing challenges in the future were summarized.

    Wireless channel and noise characteristics in industrial internet of things
    Ke ZHANG,Liu LIU,Ze YUAN,Kun ZHANG,Jianhua ZHANG,Zhijun LIU
    2018, 34(8):  87-97.  doi:10.11959/j.issn.1000?0801.2018217
    Asbtract ( 79 )   HTML ( 9)   PDF (1079KB) ( 620 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the proposal and implementation of “Made in China 2025” “IntelligentManufacturing” “Internet plus” and a series of national strategic planning,the industrial internet of things(IIoT)has developed rapidly in China.However,the channel and noise characteristics of the industrial poor environment have brought great challenges to the wireless communication of the industrial internet of things.The application of different wireless communication technologies in IIoT were introduced and compared and the features of wireless channel and noise in the environment of IIoT were summarized.As the key content of wireless communication research,channel and noise characteristics were analyzed overall.

    Indoor dynamic environment lo calization algorithm based on transfer learning
    Can LIU,Junna SHANG,Ruijiang LI,Keqiang YUE
    2018, 34(8):  98-108.  doi:10.11959/j.issn.1000?0801.2018170
    Asbtract ( 63 )   HTML ( 5)   PDF (943KB) ( 913 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The accuracy of the traditional indoor fingerprint lo calization system is limited bymany factors,such as the density of the reference location node in the fingerprint database and the characteristics of the indoor environment.When the indoor environment changes dynami cally,the RSS fluctuates,and usually does notmeet the assumption of the same distribution.Therefore,it was difficult to obtain high-precision requirements for conventional fingerprint positioningmethod.Aiming at the problem that the traditional algorithm couldn’t locate accurately,an algorithm based on the indoor fingerprint database was designed and implemented.The algorithm adopted the idea ofmigration learning to embed different data sets into the latent feature space,and the adverse effects of environmental changes on the system weremitigated.The simulation results show that the average positioning error of this algorithm is 1.23m.

    Service aware base station processing resource allocation for centralized radio access network
    Xinping ZHANG,Yuanyuan WANG,Lin TIAN,Shuliang HAO
    2018, 34(8):  109-118.  doi:10.11959/j.issn.1000?0801.2018202
    Asbtract ( 195 )   HTML ( 2)   PDF (1034KB) ( 246 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Current research on resource allocation algorithmsmainly focuses on data centers,and cloud computing environments.These resource allocation algorithms did not consideRthe diversity of processing resources(CPU,memory,network bandwidth,FPGA,DSP)and the diversity of service types in the centralized base station,resulting in the low processing resource utilization.In ordeRto solve this problem,a service oriented base station processing resource allocation algorithm was proposed.Firstly,the Fisher partitionmethod was used to classify the base station’s processing resource requirements according to the user’s service request.Then,the resource allocation balancing strategy was used to allocate the base station processing resources.Experimental results show that the algorithm is effective to reduce the number of physi cal servers and improves the resource utilization of the servers,realizing energy conservation and communications.

    Hybrid precoding method for mmWave MIMO systems based on limited feedback
    Ruonan YOU,Peng PAN,Dan ZHANG,Haiquan WANG
    2018, 34(8):  119-128.  doi:10.11959/j.issn.1000?0801.2018163
    Asbtract ( 131 )   HTML ( 6)   PDF (835KB) ( 597 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A hybrid precoding algorithm for millimeter wave (mmWave) MIMO systems without knowledge of channel state information at the transmitter was proposed based on the limited feedback.Specifically, the joint optimization problem of analog precoding and digital precoding was firstly separated into two independent optimization problems, which correspond to the analog precoding and digital precoding respectively.Based on this analog precoding codebook, the best precoding matrix was selected by analog precoding in the designed analog precoding codebook.Secondly, according to the obtained analog precoding matrix, the digital precoding matrix was obtained through the least square method, and then, the codeword closest to it in the random vector quantization codebook was selected as the feedback digital precoding matrix.Finally, the receiver feeds the index values of the analog and digital precoding matrices back to the transmitter.Simulation results show that the proposed algorithm can achieve better balance between complexity and performance.

    Variable threshold energy detection algorithm based on trust degree
    Jie XIAO,Yuebin CHEN,Chutian CHEN,Ting ZHENG,Jiwu QIAN
    2018, 34(8):  129-135.  doi:10.11959/j.issn.1000?0801.2018203
    Asbtract ( 52 )   HTML ( 1)   PDF (820KB) ( 309 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at stochastic probabilistic SSDF attacks,a variable threshold energy detection algorithm based on trust degree was proposed.Firstly,the variable threshold was updated by comparing the actual fusion value with the upper and lower boundary values of the fusion center.The upper and lower boundary values were determined through the given false alarm probability andmissed probability.Secondly,a soft fusionmethod was used based on the ratio of correct perception times and the total number of times to update the trust value.Simulation results show that,compared with the traditional fixed threshold,the proposed algorithm can not only reduce the false alarm andmissed detection probability,but also improve the detection probability of the system.

    summarize
    A survey of resource allocation in non-orthogonalmultiple access systems
    Zhengqiang WANG,Qu CHENG,Zifu FAN,Xiaoyu WAN
    2018, 34(8):  136-146.  doi:10.11959/j.issn.1000?0801.2018236
    Asbtract ( 83 )   HTML ( 10)   PDF (654KB) ( 1016 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Non-orthogonalmultiple access(NOMA)is an important candidate technology of the fifth generation(5G)wireless network,which canmeet the low latency,low power consumption,high reliability,high throughput,wide coverage requirements of the next generationmobile communication systems.NOMA utilizes superposition coding at the transmitter and successive interference cancellation at the receiveRto allow several users’datamultiplexing in the same resource block.It improves the spectrum efficiency compared with the traditional orthogonalmultiple access.The research status of resource allocation of NOMA systems was summarized including single-carrier NOMA resource allocation,multi-carrier NOMA resource allocation,cooperative NOMA relay resource allocation,and cooperative NOMA resource allocation under hardware impairment conditions.Finally,themain problems in the current study were summarized and the research challenges and some future research directions of NOMA resource allocation technology were discussed.

    Operation and wide Angle
    Construction of ecosystem for electronic component distribution based on platform strategy
    Jian SONG
    2018, 34(8):  147-152.  doi:10.11959/j.issn.1000?0801.2018226
    Asbtract ( 55 )   HTML ( 2)   PDF (599KB) ( 749 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Inspired by the platformized thinking,it is helpful for domestic electronic component distribution to build an industrial ecosystem by effectively integrating the upstream ICmanufacturer and numerous partner resources tomeet the long tail requirements of the downstream design andmanufacturing companies,which can help the distributors to grow stronger and influential.Starting from the current situation analysis of domestic electronic component distribution industry,the necessity and importance of constructing ecosystem utilizing the platform strategy were explained through the practice of one large electronic component distributor in China.

    Bearing thinking of edge computing based on NFV
    Yujia LUO,Liang OU,Hong TANG
    2018, 34(8):  153-159.  doi:10.11959/j.issn.1000?0801.2018214
    Asbtract ( 58 )   HTML ( 4)   PDF (566KB) ( 705 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at introducing edge computing into operator’s network,a bearing and deployment thinking based on NFV was presented.Firstly,the industry development trends of edge computing were introduced.Then the concept,service scenarios and special requirements of edge computing were described,as well as the relationship between edge computing and NFV.Then,a bearing thinking of edge computing based on NFV was provided.Furthermore,some preliminary discussions about deploying edge computing platform on operator’s network were offered.Techni cal reference foRthe future deployment of edge computing was provided.

    Interestmeasurement and system construction of personal information protectionLI Meiyan
    2018, 34(8):  160-166.  doi:10.11959/j.issn.1000?0801.2018235
    Asbtract ( 61 )   HTML ( 2)   PDF (534KB) ( 336 )   Knowledge map   
    References | Related Articles | Metrics

    Massive data always records the trajectory of people’s production and life.Through analysis andmining,it can provide personalized and accurate services for netizens.But the greateRthe intensity of data utilization,the greateRthe risk of personal information protection,and the imbalance ismore serious and common.Exploring the way of protecting personal information in China requiresmeeting the practi cal needs of digital China.Firstly,taking United States,European Union,and China as examples,the legislative path andmode of personal information protection were introduced.Then,the characteristics of personal information protection in China were analyzed.Finally,the balance of interests and system of personal information protection was considered.

    Cross-band fusion and wide-narrow integrated wireless private network oriented electric service access
    Weiping SHAO,Yang LU,Jianqi LI,Ping MA,Donglei ZHANG
    2018, 34(8):  167-176.  doi:10.11959/j.issn.1000?0801.2018145
    Asbtract ( 134 )   HTML ( 6)   PDF (1184KB) ( 709 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The communication requirements of electric wireless private network were analyzed,and the core idea of cross-band fusion and wide-narrow integrated wireless private network oriented electric service access was proposed,meeting the needs ofmultiple service access simultaneously,such as high speed broadband services,low delay and high reliability services,as well as wide coverage and large connection services.Research shows that cross band fusion based wireless private network has the advantages of both LTE230 and LTE1800,and it canmeet the needs of broadband and narrowband service access in the power grid.The implementation of the related schemes is necessary and feasible,which provides support foRthe further application of the electric wireless private network.

    Internet cross-domain end-to-end quality monitoring and trouble location scheme
    Yongming YAN,Bing CHEN,Wenjie XU
    2018, 34(8):  177-185.  doi:10.11959/j.issn.1000?0801.2018239
    Asbtract ( 127 )   HTML ( 5)   PDF (956KB) ( 647 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of internet,the internet content providers needmuch better quality of internet.They usually need to deploy their applications in the internet data centers all oveRthe country due to their business requirements.Users usually cross domain to access in their data centers.So internet content providers have high level of requirements for cross-domain internet quality.It is very important for internet service providers to establish amonitoring system which couldmonitor end-to-end cross-domain internet quality and locate the troubles of network out of autonomous systems rapidly.The commonly used networkmonitoring technology and the hash algorithm in equal-costmultipath routing were analyzed.A solution of using Hash algorithm to realize full traversal of network paths andmonitor end-to-end cross-domain internet quality,was presented.Some suggestions were also given foRtrouble location scheme.

    Knowledge inference techniques for financial health diagnosis of power grid enterprises
    Qiming WAN,Yingjun WANG,Youhua LI
    2018, 34(8):  186-192.  doi:10.11959/j.issn.1000?0801.2018148
    Asbtract ( 75 )   HTML ( 3)   PDF (569KB) ( 515 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The knowledge inference techniques for financial health diagnosis of power grid enterprises was studied.Combining experts system with neural network,expert system framework was used,finishing storage and representation of partial knowledge with neural network,thus overcoming the limitations of traditional diagnosismethods,organi cally integrating experts’knowledge in the field with self-learning abilities of neutral network.More accurate real-time status detection and intelligent diagnosis for financial health of power grid enterprise were realized.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: