Please wait a minute...

Current Issue

    20 December 2018, Volume 34 Issue 12
    research and development
    SRS prioritization and time-shift transmit mechanism based sidelink radio interface synchronization scheme
    Xiaoyong ZHOU,Bin SHEN,Lang XU,Xiaoge HUANG
    2018, 34(12):  1-9.  doi:10.11959/j.issn.1000-0801.2018289
    Asbtract ( 274 )   HTML ( 7)   PDF (969KB) ( 548 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For LTE-V2X system,acquiring the synchronization reference signal (SRS) is indispensable for vehicles to establish service connections in the network.However,there are some vehicles may not obtain the SRS and consequently fail to be synchronized with the network.In order to solve this problem,a sidelink (SL) radio interface synchronization scheme was proposed.Vehicles select an optimal SPS according to SRS priority division mechanism.The SRS are given different priorities,where the priorities of different synchronization sources can be distinguished in a time-shift based SRS transmit mechanism and meanwhile the interference among the SRS of different sources can be effectively suppressed.Simulation results illustrate that even when the synchronization source is assigned a priority of four,the synchronization error can still be satisfied the requirement.Compared with the conventional synchronization schemes,the proposed scheme supports an expanded synchronization range aided by synchronization over the SL and achieves mitigation of SRS interference with the time-shift based SRS transmit mechanism.The proposed scheme can serve as an efficacious and feasible solution for the LTE-V2X system.

    Optimizing strategy of computing off loading energy consumption based on Lagrangian method
    Guangxue YUE,Youkang ZHU,Jiansheng LIU,Yasheng DAI,Zhenxu YOU,Hao XU
    2018, 34(12):  10-23.  doi:10.11959/j.issn.1000-0801.2018295
    Asbtract ( 356 )   HTML ( 21)   PDF (986KB) ( 745 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of mobile network technology and the popularization and application of intelligent terminals,mobile edge computing has become an important application of cloud computing.Computing offloading strategy has become one of the key issues in mobile edge computing services.Targeting the total computing time of the mobile terminal and minimizing the energy consumption of the mobile terminal,the computation offloading resource allocation problem of the mobile terminal was modeled as a convex optimization problem,solved by the Lagrange multiplier method,and a threshold-based offloading was proposed.Simulation experiments show that the proposed offloading optimization strategy model can effectively balance the relationship between local computing and offloading,and provide guarantee for executing computation-intensive applications in mobile edge computing.

    Security-reliability tradeoff scheme for cognitive relay networks with eavesdropping attack over Nakagami-m fading channels
    Xingpeng WANG,Xiaorong XU,Andi HU,Wei FENG
    2018, 34(12):  24-32.  doi:10.11959/j.issn.1000-0801.2018247
    Asbtract ( 475 )   HTML ( 3)   PDF (902KB) ( 445 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Physical layer security (PLS) and reliability tradeoff scheme in a cognitive decode-and-forward (DF) relay network consisting of one source,one destination and multiple relays was investigated.A best relay selection scheme (BRS) against eavesdropping attack was proposed,in order to guarantee the maximum secure main link channel capacity.Traditional direct transmission scheme was taken into consideration as a benchmark.In addition,security-reliability tradeoff (SRT) performance was presented.Numerical results show that the proposed SRT scheme strictly outperforms traditional direct transmissions in terms of SRT performance.SRT performance can be enhanced obviously with the increasing of relays and Nakagami channel fading factor m for a given numbers of relays.

    Mechanism and implementation of Rootkit attack and defense
    Fujuan LI,Qun WANG
    2018, 34(12):  33-45.  doi:10.11959/j.issn.1000-0801.2018298
    Asbtract ( 396 )   HTML ( 18)   PDF (834KB) ( 740 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Rootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and analyzed.Thereafter,the implementation principles and working mechanisms of Hook,DKOM and virtualization technologies involved in Rootkit attacks were emphatically analyzed.Combined with the specific attack behaviors,the main detection methods and defense techniques for Rootkit attacks were discussed at the end.

    Massive MIMO channel estimation and feedback based on compressed sensing
    Pan MAO,Xiaoguang HUANG,Wei WANG,Jian SONG
    2018, 34(12):  46-52.  doi:10.11959/j.issn.1000-0801.2018288
    Asbtract ( 432 )   HTML ( 21)   PDF (828KB) ( 599 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Focused on the issue that the problem of low precision of channel estimation and complex feedback scheme in massive MIMO system,a compression sampling matching pursuit (BCC-CoSAMP) algorithm based on coefficient correlation was proposed in the differential channel estimation and feedback scheme.In this algorithm,the inner product of the relationship between two vectors in the CoSAMP algorithm was replaced by the vector relation based on the correlation coefficient,so the atoms with strong correlation of the original signal were quickly selected to improve the accuracy of channel estimation.The simulation results show that the proposed BCC-CoSAMP algorithm has an improved channel estimation accuracy compared with the CoSAMP algorithm and an average increase of the total system rate of 1.25 bit/(s.Hz) at low signal to noise ratio (SNR).

    Space-ground integrated satellite communication network architecture for global energy internet
    Yongliang LI,Xu’an LI,Jie TONG,Yuqing LEI,Huixia DING,Junfeng LAN
    2018, 34(12):  53-64.  doi:10.11959/j.issn.1000-0801.2018294
    Asbtract ( 363 )   HTML ( 10)   PDF (3197KB) ( 1203 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The system monitoring and scheduling,time service and synchronization,object location and other businesses of global energy internet all need reliable communication networks,which are able to provide wide area coverage and ubiquitous flexible access services.According to the requirement,various new businesses and their data features with the background of the global energy interconnection were firstly analyzed,and then the unique characteristics of satellite communication technology and how it highly accords with the demands of the global energy internet were discussed.Then a space-ground integrated network architecture by the integration of satellite communication networks was presented.Based on IP technology,each network layer interconnects through various communication links,including satellite to satellite,space to ground,ground cable,wireless link,etc.,and then constitute an integrated network system with excellent global coverage performance.

    A bidirectional authentication protocol for RFID based on Syn
    Shanhua ZHAN,Shaorong HUANG
    2018, 34(12):  65-70.  doi:10.11959/j.issn.1000-0801.2018300
    Asbtract ( 180 )   HTML ( 4)   PDF (732KB) ( 296 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.

    summarize
    Review of group recommendation analysis and research
    Yunchang WU,Baisong LIU,Yangyang WANG,Chenjie FEI
    2018, 34(12):  71-83.  doi:10.11959/j.issn.1000-0801.2018306
    Asbtract ( 512 )   HTML ( 23)   PDF (777KB) ( 728 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the advent of age of big data,the application fields of recommendation systems have become increasingly widespread.The recommendation service object of the group recommendation systems are expanded from a single user to a group of members,and becoming one of the research hotspots in the recommendation system fields.The group recommendation system needs to consider the preferences of all group members,and to fuse the preferences of the members,and to alleviate the conflicts of preferences among them,so that the recommendation results satisfy all group members as much as possible.The recent research progress of the group recommendation was mainly reviewed.The frontiers of group classification,group detection and group prediction recommendation were summarized.And main factors of the group recommendations were generalized.Finally,the research points of group recommendation and its prospects were separately elaborated.

    Column:artificial intelligence technology and application
    Key technologies of AI in customer service system
    Zheng WANG,Hua REN,Xuhai LU
    2018, 34(12):  84-91.  doi:10.11959/j.issn.1000-0801.2018302
    Asbtract ( 831 )   HTML ( 36)   PDF (947KB) ( 1731 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the customer service system structure,manual seats,work order processing and other links require a lot of manual operations and participation,the cost is high,the efficiency is relatively low,and there will still be a certain percentage of problems and failures that can’t be found and resolved.In the customer service system,the introduction of artificial intelligence technology can solve these problems to a certain extent,reduce costs and improve the overall efficiency and effectiveness of customer service.The key technologies which could be applied to the customer service system in AI were analyzed,including speech recognition,speech synthesis,and natural language processing.The application of new technology in the customer service system of the operator was discussed.The effect in practical application was illustrated by an example.

    Intelligent interactive system architecture based on artificial intelligence
    Di YANG,Shaomin WANG,Hua REN
    2018, 34(12):  92-101.  doi:10.11959/j.issn.1000-0801.2018304
    Asbtract ( 863 )   HTML ( 60)   PDF (1351KB) ( 679 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Networking and intelligentization are the future development directions of interactive service systems.Internet popularization and rich social channels have realistic needs for intelligent interactive services.High-quality and low-cost intelligent interactive solutions have become the main issues that need to be addressed in various industries.Relying on artificial intelligence technology,intelligent means such as intent recognition,semantic understanding,dialogue and judgment were introduced,the integration of scene design and knowledge fragmentation processing technology has brought new means and opportunities for the realization of interactive service intelligence.The problems faced by the existing interactive system were analyzed.On this basis,the key functional elements and system architecture of the intelligent interactive system were designed.

    Application practice of base station inspection based on AI
    Feng ZHOU,Bing WANG
    2018, 34(12):  102-109.  doi:10.11959/j.issn.1000-0801.2018297
    Asbtract ( 563 )   HTML ( 31)   PDF (1479KB) ( 1086 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Since the traditional base station inspection of telecom operators is enforced manually now,it not only consumes manpower,but also has many problems,such as safety,unverifiable result,and incomplete information and so on.The application practice and challenge of artificial intelligence technology in base station routine inspection of operators was introduced,which included the general situation of intelligent patrol technology and industry development,the demand of traditional patrol to intelligent transformation,intelligent patrol solutions,effect evaluation and data analysis,etc.On this basis,the application scenarios and service modes of future AI automatic patrol for telecom operators were discussed,and the deployment scheme of intelligent patrol platform was proposed.

    Application of improved multi-model fusion technology in customer service answering system
    Guangmin WANG,Yaofeng WANG
    2018, 34(12):  110-116.  doi:10.11959/j.issn.1000-0801.2018308
    Asbtract ( 260 )   HTML ( 10)   PDF (816KB) ( 527 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of artificial intelligence(AI),more and more companies use machine customer service instead of manual customer service.However,if the traditional keyword model is adopted,the accuracy of the machine customer service is difficult to improve.If the deep learning model is used,the predict result is poor when the user problem is short text.Aiming at these problems,an algorithm combining keyword model and deep learning model based on word vector was proposed.The training and prediction of the model was realized,and the advantages were shown in the comparison with the accuracy of the traditional algorithm.

    Key technology research and model validation of text classification system based on deep learning
    Shaomin WANG,Di YANG,Hua REN
    2018, 34(12):  117-124.  doi:10.11959/j.issn.1000-0801.2018301
    Asbtract ( 741 )   HTML ( 72)   PDF (903KB) ( 678 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Text classification is very important to text data mining and value exploration.The traditional text classification system has problems of weak feature extraction ability and low classification accuracy.Compared with the traditional text classification technology,deep learning technology has many advantages such as high accuracy and effective feature extraction.Therefore,it is necessary to apply deep learning technology to the text classification system to solve the problems of the traditional text classification system.The traditional text classification system was analyzed,and the architecture and key technologies of text classification system based on deep learning were proposed.Finally,several classification models were verified and compared,including the traditional classification model,TextCNN and CNN+LSTM.

    Application of intelligent sorting of customer service work orders with multiple factors vectorization
    Hua REN,Zheng WANG,Shaomin WANG
    2018, 34(12):  125-131.  doi:10.11959/j.issn.1000-0801.2018305
    Asbtract ( 255 )   HTML ( 6)   PDF (870KB) ( 516 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the most important contact point for customers in the internet industry,customer service orders have become the main issues that need to be addressed and urgently solved in various industries.The intelligent sequencing of work orders provides a feasible application for solving this problem.The rapid development of artificial intelligence technology and big data technology has given new directions and opportunities to solve such problems.The background of the intelligent sequencing of customer service orders was analyzed firstly.On the basis of this,the main methods and implementations of intelligent sequencing of customer service orderswere analyzed,and the application of intelligent sequencing of customer service orders based on multi-factor vectorization was expounded.

    Application of inspection robot in internet data center intelligent operation and maintenance
    Xiaosong LIU,Ting HUANG
    2018, 34(12):  132-137.  doi:10.11959/j.issn.1000-0801.2018303
    Asbtract ( 787 )   HTML ( 65)   PDF (935KB) ( 1668 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The operation and maintenance of the internet data center (IDC) is critical and arduous.Operators urgently need to consider how to introduce inspection robots to improve the level of intelligent operation and maintenance.The development status and technology maturity of the inspection robot industry were introduced and the overall structure of the inspection robot data acquisition system was proposed.Combining with the actual network demand of data center inspection robots,technical breakthroughs in intelligent operation and maintenance of data centers and mining and application of collected data were discussed in depth.

    Operation technology wide Angle
    Architecture design of NFV PaaS platform
    Binhong MAO,Zhiming YANG
    2018, 34(12):  138-145.  doi:10.11959/j.issn.1000-0801.2018275
    Asbtract ( 363 )   HTML ( 4)   PDF (779KB) ( 375 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    NFV is evolving from the initial stage of software and hardware decoupling to the goal of full cloudification and cloud native,which will make the telecommunication networks more scalable,flexible and efficient.The introduction of the NFV PaaS platform is an important measure to realize the evolution and development of NFV.The basic concepts and application scenarios of NFV PaaS were introduced,several deployment options of NFV PaaS were analyzed,and an architecture design of NFV PaaS platform was proposed.The reference for telecom operators to build NFV PaaS platform will be provided.

    Quantum key supply and dynamic adjustment strategies for power dispatch
    Wei DENG,Zhuozhi YU,Yefeng ZHANG,Yalin CHEN,Yonghong MA
    2018, 34(12):  146-154.  doi:10.11959/j.issn.1000-0801.2018310
    Asbtract ( 181 )   HTML ( 4)   PDF (1754KB) ( 325 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to ensure the transmission security of electric power dispatching service data,a quantum key supply and dynamic adjustment algorithm was provided.Firstly,the key application mode was determined according to the priority of different services,and the calculation method of the key pool capacity was also provided.Secondly,the quantum key dynamic adjustment algorithm was designed based on the key update frequency and application mode.Finally,the traffic model for the dispatching system was established,and the algorithm’s application performance for different scenarios was simulated within point-to-point/multipoint architectures.The test results show that the algorithm can realize the dynamic key adjustment in the selected adjustment period,and thus improves the security of the scheduling data transmissions.

    New reliability optimization solution in enterprise private voice line service based on multi-network collaboration
    Yu WU,Xiaoyan WANG,Yun YANG,Hua WANG,Yan DOU,Jingjing FANG
    2018, 34(12):  155-162.  doi:10.11959/j.issn.1000-0801.2018309
    Asbtract ( 223 )   HTML ( 4)   PDF (2030KB) ( 484 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The voice line based on VoIP and adopting PON access has become the mainstream solution for the enterprise private voice line service market.The traditional TDM voice line still retained the reliability advantage based on the SDH access.Therefore,a new VoIP line reliability optimization solution that didn’t rely on SDH and transmission protection technology was proposed.The lower cost and high efficiency of the solution was demonstrated and the specific method of the scheme was analyzed to achieve the networking goal through multi-network collaboration.Through both laboratory test and present network trial,the rationality,feasibility and stability of the solution was verified.

    Containerizing solution based on Kubernetes of database and its cluster
    Liyun YAN,Zhenwei HE,Xinzhang YANG,Ling ZHANG,Shaoxin HOU
    2018, 34(12):  163-171.  doi:10.11959/j.issn.1000-0801.2018311
    Asbtract ( 560 )   HTML ( 42)   PDF (801KB) ( 1392 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the maturity of container technology,more and more internet companies and IT companies have begun to migrate their core business platforms to the container environment.After more than three years of rapid development,Kubernetes has become the industry's preferred container cluster management platform.The containerization scheme of MySQL database and its cluster was given from the perspective of database containerization,based on the analysis of the key technology of database containerization on Kubernetes.Through the evaluation and comparison of performance and reliability of various database models,problems that database containerization technology may encounter and suggestion of database container hosting scheme under different scenarios were proposed.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: