Please wait a minute...

Current Issue

    20 October 2018, Volume 34 Issue 10
    research and development
    A reconstruction algorithm of service path for mobile Ad Hoc network based on SDN
    Fang DONG,Ou LI,Youquan MO
    2018, 34(10):  1-8.  doi:10.11959/j.issn.1000-0801.2018263
    Asbtract ( 476 )   HTML ( 3)   PDF (963KB) ( 445 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the service path reconstruction for link failure in the mobile Ad Hoc network based on SDN,a hierarchical service path reconstruction method was proposed.The timeliness of service path reconstruction was improved through the combination of reconstruction on backup and calculation.At the same time,considering the possible path conflict caused by the service path reconstruction,the criterion of comprehensive determinant reconstruction was given based on the graph theory,and it also ensured the effectiveness of reconstruction service path.

    Secure performance analysis of WCDMA systems over correlated Nakagami fading channels
    Guangqiu LI,Zhanwan WANG,Tingjie REN,Shuaishuai LIU
    2018, 34(10):  9-17.  doi:10.11959/j.issn.1000-0801.2018190
    Asbtract ( 314 )   HTML ( 2)   PDF (919KB) ( 385 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to evaluate the security performance of wideband code division multiple access (WCDMA) over multiple-input and multiple-output fading channels,a time-saving and efficient solution is theoretical analysis.The exact analytical expressions of the non-zero security capacity probability and the security outage probability of WCDMA systems using space-time block codes and 2D Rake receivers (2D-Rake) on the relevant Nakagami fading channels was deduced.Using the above expressions,the effects of parameters such as the number of transmit and receive antennas,antenna correlation coefficient,Nakagami fading coefficient,and average path attenuation coefficient on the security performance of the WCDMA system could be quickly evaluated.The numerical calculation was in good agreement with the simulation results,which proved the correctness of the above theoretical analysis.The analytical expression of the asymptotic safety outage probability of WCDMA system was deduced.The results show that the security diversity gain of WCDMA system is the sum of the diversity gains on the separable paths of the main channel,and has nothing to do with the eavesdropping channel; the same for the constant multipath intensity profile The Nakagami fading channel is distributed,and the security diversity gain of the WCDMA system is the product of the number of received and transmitted antennas of the primary channel,the number of multipaths,and the Nakagami fading coefficient.

    D2D data collaboration forwarding mechanism based on contract theory
    Jin ZHOU,Luyang ZHANG,Peng YANG
    2018, 34(10):  18-26.  doi:10.11959/j.issn.1000-0801.2018244
    Asbtract ( 312 )   HTML ( 4)   PDF (806KB) ( 542 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A contract theory-based D2D data forwarding mechanism was proposed for device-to-device (D2D) communications under cellular networks.Firstly,considering the selfishness of users,a model of principal-agent was constructed,which regarded the transmitter user as principal and the idle user as agent.Then,the utility function of the contract was used to construct the optimization problem with the constraint condition.Meanwhile,the utility function of the two sides was converted into the satisfaction degree of the two sides of the contract.Finally,the stable matching with the minimum weight was constructed to obtain the optimal contract solution.The simulation results show that the proposed mechanism can better encourage the idle user to participate in collaborative communication so as to enhance the user’s degree of satisfaction and throughput.

    Graph-based D2D communication resource allocation algorithm in full duplex network
    Chunzi SHI,Qi ZHU
    2018, 34(10):  27-35.  doi:10.11959/j.issn.1000-0801.2018249
    Asbtract ( 404 )   HTML ( 19)   PDF (887KB) ( 486 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For full duplex cellular communication scenario,a resource allocation algorithm based on graph coloring was proposed in order to maximize the throughput of the system.Firstly,the Hungarian algorithm was used to pair the upstream cellular users with the downstream cellular users.The pair of cellular users simultaneously used a resource block for uplink and downlink communication; then,under the premise of guaranteeing the quality of service of cellular users,channels were assigned for D2D (device-to-device) users based on graph theory coloring theory.Simulation results show that the algorithm can improve the system throughput and obtain higher spectral efficiency.

    Application of FMICW technology based on stagger algorithm in automotive radar
    Yuanhui ZHANG,Jian YANG,Junjiang ZHU,Xiaolu LI,Yuchen HE
    2018, 34(10):  36-46.  doi:10.11959/j.issn.1000-0801.2018269
    Asbtract ( 573 )   HTML ( 13)   PDF (1164KB) ( 502 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The problem of spurious spectral peaks produced by the traditional method of using a single switching frequency in automotive FMICW radar was focused by the proposed scheme.The system accuracy depended on the previously estimated range if a bandpass filter was utilized to eliminate the spurious spectral peaks,and the noise floor could be too high to achieve the required dynamic detection range if the random interrupted sequence method was utilized.A stagger algorithm based on multiple switching frequencies was used,in which the spurious peaks from the frequency domain could be removed by minimizing each frequency position on multiple spectrums.Simulation results show that the proposed method is close to the equivalent FMCW radar detection performance,and is good in multiple targets scenario.

    Routing selection algorithm with considering the queuing delay for system protection communication network
    Chuan LIU,Zaichao HUANG,Jing TAO,Huibin JIA
    2018, 34(10):  47-52.  doi:10.11959/j.issn.1000-0801.2018209
    Asbtract ( 242 )   HTML ( 4)   PDF (770KB) ( 1016 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Currently,a fast and reliable transmission path was calculated by routing algorithm that satisfies the system protection communication network under the requirements of delay and reliability,without considering that when the grid fails or the traffic in the network is excessive,the queuing delay of many nodes in the communication network will greatly increase.Aiming at this problem,a routing algorithm was proposed to solve the minimum queuing delay and improve the real-time performance of wide area protection.Experimental results show that the total information delay of the path calculated by the routing algorithm proposed is the smallest under the requirements of system protection reliability.

    Data transmission algorithm of vehicle Ad Hoc network based on channel switching
    Tiaojuan REN,Jinhao WAN,Yourong CHEN,Siyi LU,Banteng LIU
    2018, 34(10):  53-64.  doi:10.11959/j.issn.1000-0801.2018240
    Asbtract ( 443 )   HTML ( 5)   PDF (1012KB) ( 392 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A data transmission algorithm of vehicle Ad Hoc network based on channel switching (DTA) was proposed.In the DTA,three network layers were considered,such as vehicle nodes,relay nodes and sink nodes.The vehicle nodes were classified by the information of vehicle’s driving direction.The vehicle nodes channel distribution and switching mechanism was proposed to reduce the interference of communication.Then a rapid transmission of relay nodes was proposed.A priority transmission method for emergency information was proposed to classify data with different queues and send data as their queues’ priority.Simulation results show that DTA can effectively achieve the rapid transmission of useful information,reduce unnecessary losses of energy,improve the data received rate of sink nodes,reduce the average hop number of data packets and improve coverage rate of data transmission.Under certain conditions,DTA is better than AODV and AODV-L algorithm,and is more suitable for vehicle driving environment of rapid change.

    Abnormal event detection based on local topology and l1/2norm regularize
    Qing YU,Ken CHEN,Meng LI,Fei LI
    2018, 34(10):  65-71.  doi:10.11959/j.issn.1000-0801.2018254
    Asbtract ( 249 )   HTML ( 2)   PDF (1925KB) ( 479 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new dictionary learning method was proposed by introducing a local topology term to describe structural information of video events and using the l1/2norm as the sparsity constraint to the representation coefficients based on the traditional analysis dictionary learning method.In feature extraction,a histogram of interaction force(HOIF) containing rich motion information and a histogram of oriented gradient(HOG) containing texture information were merged.Then,the improved dictionary was used to train the feature data.Finally,the reconstruction error of the testing sample under the dictionary was used to determine whether the testing sample was an abnormal sample.Experiments on UMN show the high performance of the algorithm.Compared with the state-of-the-art algorithms,the analysis dictionary classification algorithm based on local topology and l1/2norm has made more effective detection on the abnormal events in the crowd.

    A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features
    Xun LI,Lin YOU,Jiahao LIANG,Chunhui YAN
    2018, 34(10):  72-84.  doi:10.11959/j.issn.1000-0801.2018205
    Asbtract ( 275 )   HTML ( 6)   PDF (4334KB) ( 506 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem that the biometric feature-based fuzzy vault is vulnerable to correlation attack and the loss of key and biometric template,and the authentication performance of fuzzy vault based on single biometric feature is unreliable,a novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features was proposed.This scheme carried out irreversible transformation of fingerprint features and face features,and based on the Diffie-Hellman algorithm,the transformed fingerprints and face features were fused into a template at the feature level.Finally,the fusion template was used to construct the fuzzy vault.By updating the random matrix,the vault could be revoked,which could effectively resist the correlation attacks and achieve reliable authentication.Experimental results show that the proposed scheme improves the reliability of the system and the security of multiple biometric templates.

    Research on text sentiment classification based on improved feature selection method
    Mingxin LIU,Jing CHEN,Qiyuan WANG
    2018, 34(10):  85-95.  doi:10.11959/j.issn.1000-0801.2018250
    Asbtract ( 379 )   HTML ( 12)   PDF (1017KB) ( 592 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An improved information gain feature selection method based on sentiment dictionary was proposed.Firstly,aiming at the existing problems of information gain feature selection,such as paying attention to the frequency of feature word and ignoring the balance of corpus,an improved method was proposed.Secondly,considering the influence of sentiment words in text classification,a feature selection method IGSC (information gain combining sentiment classification) based on sentiment dictionary was proposed for text classification.By matching the text emotion words and combining the weight of emotion words,the feature dimension reduction was realized and the problem of text data sparseness affecting classification performance was solved.Finally,according to the proposed feature selection method of travel review data set for experimental verification and analysis,the experimental results show that the improved text sentiment classification feature selection method has been improved in terms of classification accuracy,recall and F value,and classification has better stability.

    A bidirectional authentication protocol for mobile RFID system based on PRF
    Wenwen DENG,Chengming SUN,Peiliang QIN
    2018, 34(10):  96-103.  doi:10.11959/j.issn.1000-0801.2018229
    Asbtract ( 160 )   HTML ( 0)   PDF (1097KB) ( 543 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In mobile RFID system,the reader and the database no longer communicate through the wired way,but communicate wirelessly,so there are also some potential safety issues.In order to ensure the safety of communication data,a mobile RFID bidirectional authentication protocol based on pseudo-random function was proposed.The protocol ensured the tripartite entities:the tag,the reader and the database,was authenticated each other,and thereby ensured the security of communication.The use of word synthesis operation to a certain extent,could be used to reduce the total amount of computation.The mobile RFID systems have more extensive using value by tripartite authentication; security analysis and performance analysis show that the proposed protocol has higher security and lower costs.

    summarize
    Research and development of hash retrieval technology based on deep learning
    Mingwen YUAN,Jiangbo QIAN,Yihong DONG,Huahui CHEN
    2018, 34(10):  104-115.  doi:10.11959/j.issn.1000-0801.2018274
    Asbtract ( 335 )   HTML ( 6)   PDF (817KB) ( 574 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the era of big data,data shows the characteristics of high dimension,large amount and rapid growth.How to efficiently retrieve similar data from a large amount of complex data is a research hotspot.By mapping data to binary codes,the hashing technique can significantly accelerate the similarity calculation and reduce storage and communication overhead during the retrieval process.In recent years,deep learning has shown excellent performance in extracting data features.Deep learning-based hash retrieval technique has the advantages of high speed and accuracy.The methods and advanced development of deep learning hashing were mainly summarized,and the future of research direction was briefly discussed.

    Iot column
    Scheme of industrial wireless connections based on public network
    Jie CHANG
    2018, 34(10):  116-123.  doi:10.11959/j.issn.1000-0801.2018267
    Asbtract ( 274 )   HTML ( 1)   PDF (900KB) ( 583 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Industrial wireless connections are developing in the direction of networking,digitization and intelligence,which could not be considered as just a single communication network but as important sub-systems of the automatic control systems.Based on service scenarios of the existing public wireless network,related requirements were systematically studied and the related construction direction was proposed.Then,merits and drawbacks of the existing technology systems in industrial wireless connections,also maturity of the existing technology were analyzed in detail.Lastly,the future development strategies of communication operators were put forward.

    Research and application of industrial data acquisition based on industrial internet of things
    Jianxiong ZHANG,Xiaoli WU,Zhen YANG,Jie LI
    2018, 34(10):  124-129.  doi:10.11959/j.issn.1000-0801.2018271
    Asbtract ( 699 )   HTML ( 61)   PDF (1148KB) ( 4440 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    IoT application scenarios and technology in the field of industrial data acquisition were analyzed,including the current situation and problems analysis of industrial data acquisition,typical application scenario and technology characteristics of industrial data acquisition,and cloud network integration technology research with telecom operators.The technical architecture and corresponding solutions of industrial data acquisition for telecom operators were put forward.It can be widely used in remote monitoring and intelligent maintenance application for various industrial equipment or intelligent products,and can realize preventive maintenance and performance optimization analysis.

    Development of visual surveillance standardization
    Yuan ZHANG,Ning CAO,Doudou HU
    2018, 34(10):  130-136.  doi:10.11959/j.issn.1000-0801.2018270
    Asbtract ( 281 )   HTML ( 7)   PDF (1146KB) ( 995 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The standardization of visual surveillance in major standard organizations both domestic and international was focused on,and the progress of the visual surveillance standards in ITU-T,ONVIF,IEC,ISO,PSIA,HDcctv,IEEE,3GPP,ETSI,TC100,CCSA,AVS and National Information Technical Standardization Committee was introduced.The latest development in standardization area such as visual surveillance systems,architecture,terminals,codecs,intelligent applications,big data applications,cloud storage,cloud computing,edge storage and edge computing were introduced.On this basis,the future research areas of product development and standardization of visual surveillance were discussed.The visual surveillance standardization roadmap was laid out,and the future visual surveillance standardization and research fields were proposed.

    Research and application of remote update technology of IoT terminal
    Min WEI,Yi WANG
    2018, 34(10):  137-142.  doi:10.11959/j.issn.1000-0801.2018273
    Asbtract ( 243 )   HTML ( 9)   PDF (987KB) ( 855 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Remote updating of IoT terminal is the basis of supporting its iterative optimization,large-scale deployment and low-cost maintenance.The contradiction between the present status of remote updating of IoT terminals and the requirement of unified management and control was analyzed.Based on LWM2M protocol,a solution of remote updating of IoT terminals was proposed.In this solution,IoT platform provides the unified management and control of IoT terminals with heterogeneous operating systems and multi-model terminals,which helps reducing the impact of terminal scale updating on the network and improving the generality,reliability and stability of remote updating.

    Wide Angle of operation technology
    Mobile VR application in 5G network
    Jie LIU,Qingyang WANG,Yilin LIN
    2018, 34(10):  143-149.  doi:10.11959/j.issn.1000-0801.2018246
    Asbtract ( 703 )   HTML ( 63)   PDF (1528KB) ( 1213 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    VR/AR/MR application scenarios were introduced,as well as the basic principle of VR system,the requirements for the bearer network and those problems concerning exiting mobile bearing were analyzed.With the introducing of 5G new architecture and new techniques,a solution was put forward and the application effect was analyzed,the application-enhanced enhancements brought by the solution was further analyzed,aiming at providing reference for VR application deployment in 5G network and setting up a demonstrative example for other innovative applications in 5G ecosystem.

    Power communication website bandwidth estimation method based on position weighting
    Zhengjia ZHU,Xinyu YOU,Chenxi ZHENG,Li LI,Bing FAN
    2018, 34(10):  150-156.  doi:10.11959/j.issn.1000-0801.2018162
    Asbtract ( 211 )   HTML ( 6)   PDF (763KB) ( 616 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A power communication network site point communication bandwidth estimation method was proposed,which was related to the field of power communication networks.Firstly,according to a topology diagram of a power communication network,the local importance of the power communication site in the power communication network was determined.Then,the local importance and global importance of the power communication website was merged to obtain the actual importance value of the power communication website.Secondly,according to the actual importance value,each station’s communication bandwidth estimation model was determined.The data traffic redundancy factor was calculated based on the site communication bandwidth estimation model to calculate the planning bandwidth of the power communication site.The station’s position in the network topology was used to calculate the importance of the site and the importance of the node was introduced into the communication bandwidth of the site in the proposed method.In the estimation,the inaccuracy of traditional site communication bandwidth estimation result was overcome.

    Research on E-government off-site disaster recovery center based on server SAN hyper-converged architecture
    Chunjiang CAO,Kaifeng BAO
    2018, 34(10):  157-162.  doi:10.11959/j.issn.1000-0801.2018272
    Asbtract ( 218 )   HTML ( 2)   PDF (1235KB) ( 466 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Hyper-converged architecture is a relatively advanced technology solution for software-defined data centers,and has unique advantages in terms of scalability,reliability,and compatibility.Based on the combination of server distributed storage and hyper-converged architecture,the construction mode,storage resource system and network system business process of E-government remote disaster recovery center were studied,which could be used as an important reference for the construction of e-government disaster recovery center.

    Research on quantum key distribution technology in intelligent substation
    Xiaopeng YANG,Haitao CHEN,Lichen MEI,Pengzhan WANG
    2018, 34(10):  163-169.  doi:10.11959/j.issn.1000-0801.2018248
    Asbtract ( 258 )   HTML ( 7)   PDF (689KB) ( 415 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the security of the communication data of the power system,the feasibility of the application of quantum key distribution technology in the monitoring system of the intelligent substation was analyzed and demonstrated by combining the state of quantum key distribution technology and intelligent substation monitoring system.The technical scheme,intelligent substation monitoring system combined with quantum key distribution was put forward.On the premise of using the existing power communication system framework,the networking idea of intelligent substation monitoring system and quantum key distribution technology was presented,which was“quantum key + power vertical encryption authentication gateway”.And the network scheme was verified and analyzed,which proved the stability and feasibility of the networking scheme in practical application.Therefore,no need to adjust the existing communication network framework,the application scheme can be realized on a large scale.

    Mobile operation and maintenance system of electric power communication access network based on IoT technology
    Haiming JIANG,Danni XIA,Yuan LIU,Shiwen ZHAO,Lin FEI,Jingyu REN
    2018, 34(10):  170-180.  doi:10.11959/j.issn.1000-0801.2018169
    Asbtract ( 269 )   HTML ( 11)   PDF (1605KB) ( 476 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The mobile operation and maintenance system of electric power communication access network was designed.In this developed system,the technology with intelligent identification of internet of things and data real-time transmission was introduced to the on-site operation and maintenance standardization management of the power communication network.First of all,the mobile operation and maintenance system architecture was built to realize the informatization of on-site operation and maintenance.And then,the TOPSIS algorithm was utilized to allocate the worksheet automatically,which improved the efficiency of fault processing.Besides,by real-time monitoring the site through the system,the intelligent management of the power communication access network was realized.The test results show that the operational management system is able to realize resources unified management,fault intelligent analysis,informatization support of on-site operations management,and also greatly enhance the intelligent operation and management level of power communication access network.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: