Please wait a minute...

Current Issue

    20 January 2019, Volume 35 Issue 1
    5G will fully enable the industrial internet
    Yunyong ZHANG
    2019, 35(1):  1-8.  doi:10.11959/j.issn.1000?0801.2019018
    Asbtract ( 201 )   HTML ( 43)   PDF (1258KB) ( 599 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the Ministry of Industry and Information Technology announcing that it has issued a test frequency license to China Telecom, China Mobile and China Unicom for the low and medium frequency band of the 5G mobile communication system, China's 5G commercial pace has officially begun. The global deployment, commercial situation and the oriented industrial network characteristics of 5G were introduced. It was pointed out that 5G would continue to consolidate the foundation for interconnectivity of all things, fully enable the industrial internet, and accelerate the integration of multi-industry internet.

    Android malware detection method based on byte-code image and deep learning
    Tieming CHEN, Binbin XIANG, Mingqi LV, Bo CHEN, Xie JIANG
    2019, 35(1):  9-17.  doi:10.11959/j.issn.1000?0801.2019022
    Asbtract ( 160 )   HTML ( 15)   PDF (1424KB) ( 450 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new Android malware detection method based on byte-code image and deep learning was proposed. Firstly, Android malware byte-code files were mapped to RGB colorful images which had three channels. Also, the Shannon entropy as Alpha channel of images were calculated, and then merged with RGB images into RGBA images. Finally, the convolutional neural network as classifier was employed to classify aforementioned images. According to the experiment on malware of eight malicious families and compared this method with the method which mapping the byte-code to gray image, the result shows that the method using RGBA images has good performance not only in speed, but also in accuracy.

    Research and development
    A Stackelberg game based content caching algorithm in energy-harvesting small cell networks
    Xueting WANG,Qi ZHU,Han HU
    2019, 35(1):  18-29.  doi:10.11959/j.issn.1000?0801.2019024
    Asbtract ( 27 )   HTML ( 3)   PDF (930KB) ( 150 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To improve the users' satisfaction of download files, a caching based resource allocation algorithm in energy-harvesting small cell networks was proposed, which was established as a Stackelberg game that jointly optimized user accessing and small cells' content updating. Firstly, a coalitonal game for users to transfer between coalitions (small cells) with user satisfaction being utility function was proposed, and the transition was accepted once the utility of user after transferring satisfies the transition rules. Several users were allowed to be served by a same cell, and users accessing the same small cell would share the same channel using NOMA. Then, to maximize the benefit, a cache updating scheme was put forward to update the files cached by small cells. The equilibrium solution could be achieved after finite iterations of the two algorithms. The simulation results show that the proposed novel algorithm performs better in user satisfaction and energy-saving comparing with algorithm using principle of proximity.

    Broadband power line communication channel modeling based on Q3D
    Wangbin CAO,Xiaolin LIANG
    2019, 35(1):  30-36.  doi:10.11959/j.issn.1000?0801.2019021
    Asbtract ( 140 )   HTML ( 0)   PDF (976KB) ( 218 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A method of broadband power line communication (PLC) channel modeling based on Q3D extractor was proposed. The per unit length RLGC parameters of PLC channel was extracted by the Q3D extractor. Then, the ABCD transfer matrix of power line channel was calculated based on the extracted RLGC parameters. Finally, the amplitude and phase frequency responses of the channel transfer function and input impedance were obtained by using ABCD matrix. Based on the proposed method, a broadband PLC channel model for 3 mm×4 mm symmetrical cable was set up. The calculated results show that the simulated results fit the measured results well. The proposed method can quickly and accurately establish the broadband PLC channel model, which is of great significance for studying the characteristics of PLC channel.

    Distributed robust RLS estimation algorithm over sensor networks
    Kaikai KANG,Zhaoting LIU,Yingbiao YAO
    2019, 35(1):  37-43.  doi:10.11959/j.issn.1000?0801.2019002
    Asbtract ( 127 )   HTML ( 0)   PDF (840KB) ( 103 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the parameter estimation of the sensor network, there may be impact noise or pulse interference in the measurement environment, which leads to the outliers that greatly deviate from the actual range, so that the effective parameter estimation problem can't be obtained. A distributed RLS estimation algorithm based on node cooperation and robustness was proposed. The characteristic of interference or attack on a node is usually sporadic (ie, sparse) for a period of time was utilized, ?1norm was introduced to cost function. The outliers which may exist in the measurement data were identified and eliminated, and the interaction between the nodes of the network was utilized to further improve the performance of the parameter estimation. The computer simulation experiments show that the algorithm has good estimation performance.

    A robust power allocation algorithm for underwater acoustic cooperative communication network
    Xinbin LI,Lingmei ZHANG,Song HAN,Zhipeng HUANG,Zhixin LIU
    2019, 35(1):  44-53.  doi:10.11959/j.issn.1000?0801.2019008
    Asbtract ( 47 )   HTML ( 3)   PDF (1469KB) ( 68 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In consideration of the issues of the survival time of node, the uncertainness of channel state information and the poor quality of the service in underwater acoustic cooperative communication network, a robust power allocation algorithm was proposed. Firstly, the residual energy of node was considered in the optimization function, and the change of transmitted power was proportional to the remaining energy, thereby balancing the energy consumption and increasing the survival time of the nodes. Secondly, the uncertainty was further introduced into the optimization function to improve the ability of against uncertainty in underwater. At the same time, in order to make sure that the quality of the service, the minimum communication capacity requirements were considered in the optimization function. The simulation results show that the proposed algorithm not only extends the survival time of node, but also improves the performance of system.

    A method of vulnerability assessment for power communication network based on mechanical model
    Yaosheng WANG,Yingmin ZHANG,Chang WANG
    2019, 35(1):  54-61.  doi:10.11959/j.issn.1000?0801.2019023
    Asbtract ( 37 )   HTML ( 0)   PDF (718KB) ( 70 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to reasonably evaluate the vulnerability of the power communication network link, a vulnerability assessment method based on the mechanical model was proposed. The bandwidth capacity occupied by the traffic on the link and the number of inter-node services were collectively referred to as nodes. The correlation between the links and the degree of correlation between the link services was regarded as an associated generalized business force. In the process of business statistics, the maximum likelihood estimation of the time-slotted time slot was adopted, and the parameters of the service were estimated by using the Poisson process as a statistical background. The number of services between links and the occupied bandwidth were regarded as work of generalized service. The logical distance of the links between nodes was obtained by the gravitational formula, and the vulnerability of the communication network was measured by the interval of logical distance. Finally, MATLAB was used to establish a model for simulation calculation, it is verified that the method can analyze and evaluate the vulnerability of the service link of the power communication network in real time and accurately.

    Cooperative localization algorithm based on time-ofarrival in wireless senor network
    Qianqian LU,Youming LI,Shengming CHANG,Nana LI
    2019, 35(1):  62-66.  doi:10.11959/j.issn.1000?0801.2019004
    Asbtract ( 124 )   HTML ( 5)   PDF (752KB) ( 142 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel cooperative location method based on time-of-arrival in wireless senor networks was proposed. Firstly, the optimization problem for the target location was established. Secondly, the mixed semi-positive definite and second-order cone relaxation techniques were used to convert the original non-convex problem into a convex optimization problem. In this way, a fast suboptimal solution to the original problem was obtained. Finally, computer simulations show that the proposed method has lower root mean square error (RMSE) which is closer to the Cramer-Rao lower bound (CRB).

    Covariance matrix opportunistic cooperative spectrum sensing of high detection probability
    Shunlan LIU,Jing WANG,Jianrong BAO
    2019, 35(1):  67-73.  doi:10.11959/j.issn.1000?0801.2019001
    Asbtract ( 31 )   HTML ( 1)   PDF (854KB) ( 107 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the problem of poor sensing performance caused by the existing spectrum sensing algorithm, the covariance matrix opportunistic cooperative (CMOC) spectrum sensing algorithm was proposed. Based on the traditional covariance matrix spectrum sensing algorithm, odd and even slots were divided by the new proposed algorithm, then opportunistic cooperation was added. The relationship between the false alarm probability and the threshold of the new algorithm was also analyzed, and the analytic detection probability was deduced for the actualization of the more accurate spectrum sensing detection. The simulation results verify that the proposed algorithm obviously improves the detection probability. In Rayleigh fading channel, the detection probability is increased by 0.19 and 0.13, which compared with the existing energy detection spectrum sensing algorithm without relay cooperative and the covariance matrix spectrum sensing algorithm without relay cooperation, when the SNR is ?10 dB. Moreover, the proposed algorithm has high energy efficiency as well as the moderate computational complexity, so it is especially suited for the spectrum cognition applications in the new generation wireless communication.

    Energy-efficient data gathering scheme based on Kalman prediction and compressed sensing
    Ying ZHOU,Lihua YANG,Longxiang YANG,Meng NI
    2019, 35(1):  74-80.  doi:10.11959/j.issn.1000?0801.2019017
    Asbtract ( 20 )   HTML ( 1)   PDF (812KB) ( 122 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel Kalman prediction and compressed sensing based energy-efficient data gathering scheme was proposed. Specially, in the intra-cluster transmission, the cluster members utilized the Kalman prediction to selectively send the data to their cluster heads. In the inter-cluster transmission, the cluster heads leveraged the hybrid compressed sensing to transfer the data to the sink via multi-hop links. Moreover, the communication cost was derived to verify the efficiency of the proposed method. Simulation results show that the proposed method has higher energy efficiency compared with the available schemes, and the sink can obtain measurements with reasonable quality by using the proposed method.

    A novel perturbation attack on SVM by greedy algorithm
    Yaguan QIAN,Xiaohui GUAN,Shuhui WU,NBensheng YU,Dongxiao REN
    2019, 35(1):  81-89.  doi:10.11959/j.issn.1000?0801.2019014
    Asbtract ( 58 )   HTML ( 7)   PDF (1407KB) ( 178 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the increasing concern of machine learning security issues, an adversarial sample generation method for SVM was proposed. This attack occurred in the testing stage by manipulating with the sample tofool the SVM classification model. Greedy strategy was used to search for salient feature subsets in kernel space and then the perturbation in the kernel space was projected back into the input space to obtain attack samples. This method made the test samples misclassified by less than 7% perturbation. Experiments are carried out on two data sets, and both of them are successful. In the artificial data set, the classification error rate is above 50% under 2% perturbation. In MNIST data set, the classification error rate is close to 100% under 5% perturbation.

    Quantitative analysis of the influence of asymmetric channel delay on relay protection's reliability
    Huisheng GAO,Qing SHEN
    2019, 35(1):  90-96.  doi:10.11959/j.issn.1000?0801.2019016
    Asbtract ( 13 )   HTML ( 2)   PDF (743KB) ( 79 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The asymmetric delay of digital channels has negative effects on line current differential protection in a complex mechanism. Hence, it's necessary to use effective methods to improve the reliability of relay protection. Firstly, the operation principle and criterion of line current differential protection were analyzed.Then, the influence of asymmetric delay on the reliability of relay protection was analyzed, and the quantitative analysis method of the influence under different fault conditions was determined. Finally, the feasibility and correctness of the method were verified. The results show that effects of asymmetric delay on reliability of relay protection have a significant correlation with fault conditions. This conclusion has practical value in reliability evaluation and channel optimization of relay protection.

    Survey on network function virtualization in RAN
    Haiyu JIA,Jia CHEN,Mingxin WANG
    2019, 35(1):  97-112.  doi:10.11959/j.issn.1000?0801.2019019
    Asbtract ( 60 )   HTML ( 13)   PDF (783KB) ( 261 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Network function virtualization (NFV) is a kind of new network technology rising in recent years. It realizes the decoupling of software and hardware by running the software which has specific function on a general-purpose hardware server. Applying the NFV to the radio access network could virtualize some of the radio access functions. It can reduce the operating costs and capital costs efficiently, and improve the flexibility of the network deployment. It also can satisfy the quality of experience of mobile users. In order to review the work that contribute to the current situation of NFV in radio access network, three perspectives were reviewed, including research on the related standards of network functional virtualization in RAN, network architecture of network function virtualization, and the resource allocation of network function deployment. Finally, the challenges of network function virtualization applying in wireless network were proposed.

    Operational Technology Wide Angle
    Anti-fading technology of near space communication based on quasi-constant envelope OFDM
    Yang LU,Donglei ZHANG,Tingting WANG
    2019, 35(1):  113-120.  doi:10.11959/j.issn.1000?0801.2019003
    Asbtract ( 18 )   HTML ( 1)   PDF (955KB) ( 132 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the near space high altitude platform station (HAPS), its limited power, tight spectrum resources, and the multipath fading effects due to non line of sight (NLoS) and low elevation communication environment are the main problems. An anti-fading technology of near space communication based on quasi-constant envelope OFDM (QCE-OFDM) was proposed. At the transmitting end, two OFDM signals were respectively modulated on the phases of two constant envelope signals, and then they were merged into one signal via phase shift. At the receiving end, Taylor series expansion technology was employed to divide and demodulate the signal. Analysis and simulation results show that the QCE-OFDM has the same spectral efficiency as OFDM. By selecting the modulation index reasonably, the proposed scheme can combat multipath fading effectively with less than 3 dB signal peak-to-average power ratio (PAPR), where the goal of high spectral efficiency and high energy efficiency can be achieved.

    Analysis and application evaluation of precoding method based on low-band communication system
    Di WU,Yijun SUN,Zherui MA,Tao MA
    2019, 35(1):  121-128.  doi:10.11959/j.issn.1000?0801.2019012
    Asbtract ( 10 )   HTML ( 2)   PDF (939KB) ( 81 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the communication system, limited by the influence of channel correlation, in general, the lower the operating frequency band of the antenna system, the larger the spacing of the antenna elements, and the larger spacing of the array elements was not conducive to the reduction of the physical size of the communication device. An antenna system with an array spacing was analyzed, which could achieve a smaller physical size than an antenna system with a conventional array spacing. Three kinds of transmit antenna systems were selected for performance comparison: 8-antenna λ /2 system, 4-antenna λ /2 system (of comparable size), and 8-antenna λ /2 system (with the same number of elements). Also their beamforming effect, interference suppression capability and channel capacity were analyzed. Simulation results show that the antenna system can achieve relatively good performance.

    Top-level design of intelligent city constructed on provincial CATV networks
    Yi CHEN,Baocheng LIN,Xianhu WEI,Longxiang YANG,Fengqiang PENG
    2019, 35(1):  129-137.  doi:10.11959/j.issn.1000?0801.2019020
    Asbtract ( 49 )   HTML ( 4)   PDF (711KB) ( 122 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The top-level design of the intelligent city constructed on provincial CATV networks was mainly investigated. The general thoughts of the development of intelligent city constructed on CATV networks were proposed, and the overall framework for the intelligent city constructed on CATV networks was analyzed.

    Resource allocation scheme for D2D communication in mmWave 5G networks
    Bing YI,Yongli CHEN,Ruixue ZHAO
    2019, 35(1):  138-146.  doi:10.11959/j.issn.1000?0801.2019013
    Asbtract ( 132 )   HTML ( 11)   PDF (1214KB) ( 175 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Since the combination of device-to-device (D2D) and mmWave technology can meet the needs of large-capacity, resource allocation was considered for D2D users in an outdoor millimeter wave scenario. The optimal objective was maximize to the total system throughput. Firstly, the admission set of each D2D user was selected by a linear correlation method. Then, power control was performed on the D2D user to select the optimal transmit power. Finally, a multi-phase matching algorithm based on bipartite graph was proposed to allocate resources for D2D users, and the allocation result was obtained by using multiple KM algorithms. The simulation results show that the proposed algorithm is superior to the comparison algorithm, which effectively improves the throughput of the system and spectrum utilization.

    Research on improving the registration success rate of VoWi-Fi under multiple equivalent path scenarios
    Deyi CHENG,Jian QIAO
    2019, 35(1):  147-153.  doi:10.11959/j.issn.1000?0801.2019011
    Asbtract ( 22 )   HTML ( 0)   PDF (866KB) ( 151 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The 3GPP's VoWi-Fi S2b specification requires the client to use the IPSec tunnel to register with the ePDG through the metropolitan area network. When IPSec faces a path forwarding fault in a multi-equivalent path environment of a metropolitan area network, it can't actively evade, and the service can't be registered. The cause of the malfunction was analyzed and an optimized solution was proposed. By changing the client source port in the IKE_AUTH phase to achieve path replacement, the VoWi-Fi registration success rate can be significantly improved and verified by experiments. Secondly, through the full traversal detection of the bidirectional network path between the edge of the metropolitan area network and the ePDG end, the fault can be quickly located and eliminated.

    Electric power communication network service importance evaluation method for quantum key application
    Guochun LI,Suxiang ZHANG,Wei DENG,Zhuozhi YU,Yefeng ZHANG,Yukun ZHU
    2019, 35(1):  154-160.  doi:10.11959/j.issn.1000?0801.2019015
    Asbtract ( 24 )   HTML ( 3)   PDF (1060KB) ( 130 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the expansion of the power grid and the increase of the complexity of the power system, the power grid has more stringent requirements for the security of the services transmission. In the secondary protection system of power systems, traditional encryption devices use symmetric encryption algorithms to add and decrypt communication data. Quantum keys have extremely high security. Applying the quantum keys to the power communication network encryption devices can greatly improve the security of service transmission. The quantum key resources generated by the existing quantum key distribution devices is limited, and it is difficult to ensure that all power services data are encrypted and transmitted. Therefore, it is necessary to prioritize the confidential transmission of important services by establishing appropriate evaluation methods for services importance. A relative importance matrix based on the transmission performance indicators of each service was built under the background of quantum communication, so as to obtain the importance of the power communication network business, and to carry out subsequent quantum key application strategy research.

Copyright Information
Sponsor:China Institute of Communications
Posts and Telecom Press Co., Ltd.
Eidtor:Telecommunications Science magazine Office(F8,You Dian Publisher Building,No.11 Chengshousi Road,Fengtai District,Beijing 100078,CHina)
General Distribution Office:Beijing Newspapers and Periodicals Distribution Office
Overseas Distributor:China International Book Trading Gorporation(P.O.Box 399,Beijin,China)
Tel:010-81055443 010-81055459
Postal code:2-397
ISSN 1000-0801
CN 11-2103/TN
Total visitors:
Visitors of today:
Now online: