Please wait a minute...

Current Issue

    20 June 2019, Volume 35 Issue 6
    Topic:energy Internet technology and application
    Development of national energy internet:index system and future trend
    KANG Chongqing,WANG Yi,ZHANG Jing,WANG Yongzhen,GAO Feng,LIU Yi
    2019, 35(6):  2-14.  doi:10.11959/j.issn.1000-0801.2019161
    Asbtract ( 357 )   HTML ( 23)   PDF (1030KB) ( 481 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The energy internet is the fulcrum of the new energy revolution,which will vigorously promote the high-quality and sustainable development of China’s energy industry.In order to comprehensively analyze the development of energy internet of China from the national level,the development background of energy internet was firstly reviewed,and then the connotation and extension was analyzed.On this basis,the index system of energy internet development was constructed from six aspects:policy,industry,technology,innovation,construction and public ecology.By means of literature search and analysis,official website crawler and authoritative document search,the basic status of energy internet development in China was analyzed.It was pointed out that under the multi-sectoral and multi-level policy guarantee,energy internet of China has shown a good development trend as a whole,with the healthy and prosperous development of industry,construction,technology and innovation.

    Support vector machine based fast Monte Carlo reliability evaluation method for composite power system
    LEI Yuxiao,LI Gengfeng,HUANG Yuxiong,BIE Zhaohong
    2019, 35(6):  15-24.  doi:10.11959/j.issn.1000-0801.2019155
    Asbtract ( 269 )   HTML ( 16)   PDF (1210KB) ( 344 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A fast Monte Carlo reliability evaluation method for composite power system based on support vector machine (SVM) was proposesd.Firstly,sample data for training the SVM model was obtained by enumerating component failures and calculating the corresponding minimum load shedding.Then,the SVM algorithm was used to mine the nonlinear mapping relationship between component failures and minimum load shedding,and the minimum load shedding estimation model was trained.Finally,the model was combined with the Monte Carlo simulation.By randomly sampling component states,for each state,the estimation model obtained by the training directly gave the minimum load shedding,thereby achieving a rapid assessment of the reliability of the composite power system.The proposed method is applied to the IEEE RTS 79 system,which verifies its effectiveness.

    Economical operation strategy of integrated energy system under fault state
    LIU Yuquan,CHEN Xudong,XIONG Wen,WANG Li,CHEN Dongwen,LI Yong
    2019, 35(6):  25-32.  doi:10.11959/j.issn.1000-0801.2019162
    Asbtract ( 341 )   HTML ( 14)   PDF (982KB) ( 231 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A fault-state operation strategy for integrated energy systems based on multi-energy transfer was proposed.Firstly,an integrated energy system model was built to model each energy-supply device in the system using actual measurable parameters.Then,the calculation method of maximum energy supply capacity when energy-supply device fails was introduced,and the power constraint conditions of each equipment were obtained,and the power balance equations of cold/heat/electricity power were established.Then,set the lowest operating cost as the optimization goal,the objective function was solved by the linear programming method.Finally,taking a factory-level integrated energy system as an example,the rationality of the output changes of each equipment after using this strategy under several fault conditions was analyzed.It is pointed out that the strategy has three characteristics:the cost control effect is significant at low load situation,remarkably impacted by time-sharing energy prices,the outsourcing resource curve can predict the change of operating costs when fault occurs.

    Energy optimization strategy for integrated energy system considering energy storage thermal inertia
    WANG Li,CHEN Dongwen,LI Junge,ZENG Shunqi,LI Yong
    2019, 35(6):  33-40.  doi:10.11959/j.issn.1000-0801.2019160
    Asbtract ( 314 )   HTML ( 5)   PDF (819KB) ( 167 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The advantages of multi energy conversion and coordination energy supply in the integrated energy system and the thermal inertia characteristics of the cold storage/thermal system were considered to realize the rapid recovery of energy supply system when the energy supply system fails.The power relationship of multi energy flow in all kinds of energy conversion equipment was studied.The import power of all kinds of energy conversion equipment was controlled to achieve cooperative operation.The dynamic response time of all kinds of energy conversion equipment and the method of energy storage capacity adjustment with thermal inertia of heat storage and heat storage equipment was analyzed.The dynamic response time were used as the target to optimize the running strategy,and the priority of energy supply and the optimal matching of power supply were realized when the multi energy conversion equipment fails,and the final optimal operation strategy was obtained.The example shows that the resilience of multi energy coordination and energy storage capacity can quickly deal with the energy supply failures in various scenes,realize energy supply extension at the hour level,and realize fast energy supply recovery in the energy supply system for integrated energy systems.

    A PKI-based multi-channel unified identity authentication method for energy information system
    TANG Yang,ZHANG Yiying,HE Yeshen,WANG Cong,LEI Ming
    2019, 35(6):  41-49.  doi:10.11959/j.issn.1000-0801.2019156
    Asbtract ( 357 )   HTML ( 11)   PDF (838KB) ( 343 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    There are problems of poor user experience,inconsistent management,and potential security risks in energy information system.It is urgent to study the issue of unified identity authentication between various electronic channels from the source to achieve unified management of multiple electronic service channels and service supervision of various electronic channels.A multi-dimensional electronic channel unified authentication method based on PKI certification was proposed for energy information system.Users could directly access each application system through the proposed method and perform fast and secure switching between application systems without multiple authentication processes.The approach provided users with the convenience and security of engaging in complex business management activities.

    Analysis of value-added services of power communication network in energy internet
    ZHU Hong,SHAO Qi
    2019, 35(6):  50-59.  doi:10.11959/j.issn.1000-0801.2019154
    Asbtract ( 432 )   HTML ( 21)   PDF (1328KB) ( 380 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The value-added services of power communication networks in the energy internet were introduced.5G,4K/8K ultra high definition video,business that cloud drive all-optical network construction were analyzed.How the power company uses its resource advantages to expand energy internet value-added services and their business models were analyzed,including infrastructure resource leasing,backbone line business leased line,FTTH wholesale and telecommunication business,data center leasing,etc.Based on ubiquitous electric internet of things,power company that could combine big data and artificial intelligence to expand more value-added services was forcasted.

    research and development
    WSN malware infection model based on cellular automaton and static Bayesian game
    ZHANG Hong,SHEN Shigen,WU Xiaojun,CAO Qiying
    2019, 35(6):  60-69.  doi:10.11959/j.issn.1000-0801.2019147
    Asbtract ( 227 )   HTML ( 5)   PDF (1011KB) ( 143 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The theoretical model for the malware infection in wireless sensor networks (WSN) based on cellular automaton and static Bayesian game was studied.Firstly,the malware infection model of WSN based on cellular automaton was built.Secondly,the malware infection dynamics in WSN was predicted based on the static Bayesian game,through which malware and WSN systems would determine their optimal actions by Bayesian Nash equilibrium (BEN).Then the BEN was applied to the malware infection model to study the spatiotemporal dynamics characteristics of malware infection.Research results show that the proposed model can effectively predict the infection dynamics propagation process of malware in WSN,and the evolution trend of sensor nodes in various states with time,which are of significance for people to formulate measures to reduce the propagation speed of malware.

    Real-time detection method of smoke based on Wi-Fi
    WU Zhefu,TANG Wanli,CHEN Cheng,FANG Luping
    2019, 35(6):  70-77.  doi:10.11959/j.issn.1000-0801.2019150
    Asbtract ( 245 )   HTML ( 12)   PDF (1204KB) ( 413 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Fire-related smoke real-time detection method is one of the important means to ensure public safety.A fire smoke detection method based on channel state information of Wi-Fi network was proposed to avoid the high cost of existing fire sensor system or the blind spot of video detection.The method need not require a dedicated fire smoke monitoring device.By studying the influence of fire smoke on wireless transmission signals,the smoke characteristic parameters in the channel state information were extracted and classified by machine learning,thereby realizing the real-time monitoring of environmental fire.The experimental results show that the accuracy of environmental smoke detection based on Wi-Fi channel status information can reach 98.06%.

    A QoS-based network planning method for power fiber to the home
    SHAO Shuai,SHANG Zhijun,WANG Zhongfeng,XIN Guoliang,LI Yueyue,KONG Xiangyu,PENG Xujing
    2019, 35(6):  78-88.  doi:10.11959/j.issn.1000-0801.2019092
    Asbtract ( 224 )   HTML ( 7)   PDF (3103KB) ( 184 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A QoS-based network planning method for power fiber to the home was proposed.Firstly,the distribution structure of different buildings was combined to carry out targeted ODN line path design.Secondly,in the ONU packet cluster planning stage,in order to meet the QoS requirements of multi-service differentiation,the communication cost as the optimization goal was uesd,and the optimization problem model was established with the constraints of access capacity,reliability and delay.At the same time,intelligent algorithms were used to solve the optimization problem model.Finally,the optical path attenuation of the planned network was calculated to meet the actual application needs.The simulation results show that the proposed QoS-based network planning method for power fiber to the home can save network construction cost while ensuring service reliability and delay requirements.

    Hybrid precoding method for mmWave massive MIMO systems based on LFM
    CHEN Haoyi,DING Yifan,CHENG Ying
    2019, 35(6):  89-95.  doi:10.11959/j.issn.1000-0801.2019069
    Asbtract ( 245 )   HTML ( 4)   PDF (823KB) ( 128 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Analog-digital hybrid precoding is a key technology for millimeter wave massive MIMO systems that reduce hardware costs while balancing system performance.However,the traditional hybrid precoding scheme often needed to find a suitable codebook for precoding,and some codebooks were not easy to obtain or had deviations in actual situations.An analog-digital hybrid precoding method based on latent factor model (LFM) in machine learning without codebook was proposed for this problem.The LFM decomposition and stochastic gradient descent method were used to approximate the designed precoding matrix to the optimal full digital precoding matrix for good performance.The simulation results show that compared with the hybrid precoding design method based on orthogonal matching pursuit (OMP) algorithm,this method not only does not need a codebook,but also has better performance than the hybrid precoding algorithm based on OMP algorithm,which is closer to optimal full digital precoding method.

    Research on C&C traffic detection of DDoS BotNet in internet of things
    HE Yusheng
    2019, 35(6):  96-101.  doi:10.11959/j.issn.1000-0801.2019152
    Asbtract ( 632 )   HTML ( 36)   PDF (808KB) ( 434 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    C&C communication detection used in IoT DDoS BotNet is an important part to identify DDoS BotNet.By analyzing C&C communication traffic in the BotNet,the characteristics of the smaller C&C communication data packet and the periodicity of DNS communication were summarized.Based on these characteristics of the network communication traffic,a method to identify C&C communication in the BotNet was proposed,which helped to improve the accuracy rate of identifying C&C communication in the BotNet.

    summarize
    An overview of V2X communications
    FANG Jian,FENG Daquan,DUAN Haijun,ZHENG Canjian,QIAN Gongbin
    2019, 35(6):  102-112.  doi:10.11959/j.issn.1000-0801.2019167
    Asbtract ( 1111 )   HTML ( 109)   PDF (844KB) ( 1058 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Internet of vehicles,which integrates cutting-edge technologies and devices in the fields of vehicles,roadside infrastructure,communications,positioning,etc.,has been considered as a promising technology to solve the road safety problems.With the advanced information and communication technologies,V2X can greatly improve driving safety,enhance traffic efficiency and comprehensively provide various information services.Thus,it brings unprecedented historical opportunities and challenges to the automobile industry.The state-of-art research on V2X communications was overviewed.Firstly,the background and the characteristics and application scenarios of V2X communication were briefly introduced.Secondly,the development course of V2X communication were outlined.Then,the technical standard of V2X was presented,with emphasis on LTE-V2X and the 5G V2X.Finally,some open problems such as high reliability and low latency,vehicle safety and privacy protection and driving safety of 5G V2X were discussed and concluded.

    Column:5G helps transform
    5G edge computing technology and application prospects
    MA Hongyuan,XIAO Ziyu,BU Zhonggui,ZHAO Yuan
    2019, 35(6):  114-123.  doi:10.11959/j.issn.1000-0801.2019168
    Asbtract ( 1202 )   HTML ( 176)   PDF (1071KB) ( 2660 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Edge computing is a method of processing data physically close to where data is generated,and it is one of the key technologies of 5G.The development of network technology and the demand of business applications have jointly promoted the maturity of 5G edge computing.The 5G edge computing technology system was elaborated through the perspective of edge infrastructure,edge computing network and edge platform,and the 5G edge computing application was prospected.

    Evolution scheme of 5G fusion user data architecture
    ZHAO Yuan,XIAO Ziyu,HAN Yan,MA Hongyuan
    2019, 35(6):  124-131.  doi:10.11959/j.issn.1000-0801.2019165
    Asbtract ( 609 )   HTML ( 16)   PDF (947KB) ( 942 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    User data management has experienced the evolution of 2G/3G and 4G era.At present,as a triple integration HLR/HSS service for mobile 2G/3G/4G/VoLTE users,contract data storage and authentication management,with the advent of 5G,5GC introduces cloud-based micro-service architecture UDM/UDR user data management network element,how to realize the evolution deployment of existing HSS and UDM,and how to realize the timely signing of 5G users to guarantee the 5GC business process urgently need to be studied.How to realize the evolution deployment of 5G user data to the four-fused HSS/UDM architecture based on the strategy of no-change card and no-change trademark commercial 5G market,and how to realize the smooth migration of 2G/4G user data to 5G user data at the same time was mainly researched.Finally,four HSS/UDM evolution schemes were presented and the rhythm of cloud migration was proposed.

    Business service model of 5G network for vertical industry
    XIAO Ziyu,HAN Yan,MA Hongyuan,YANG Xu,ZHAO Yuan,SU Jian,SHAO Yongping
    2019, 35(6):  132-140.  doi:10.11959/j.issn.1000-0801.2019163
    Asbtract ( 820 )   HTML ( 73)   PDF (1498KB) ( 809 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the progress of 5G standard,industry and network capability,the application requirements of vertical industry scenarios were analyzed and the scenario prediction of 5G first-phase deployment was proposed.By analyzing the network capacity demand research,industry white paper and simulation data of each standard organization,the methodology of 5G service model determination was proposed to guide the subsequent network deployment.

    5G scale networking strategy and network construction solution
    WANG Chufeng,DING Yuan
    2019, 35(6):  141-149.  doi:10.11959/j.issn.1000-0801.2019149
    Asbtract ( 657 )   HTML ( 44)   PDF (1388KB) ( 321 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Three telecom operators in China have issued the frequency bands of 5G trial network,the 5G operation license will be released soon,and the trial scale networking will be launched.The overall deployment strategy of 5G trial networking was expounded,and the network construction ideas and solutions of different professions were elaborated from the aspects of wireless network,bearer network and core network respectively.

    Application of high-performance 4K live broadcast service in 5G network
    DING Yizhi,XIAO Ziyu,LI Shaoping,LV Hongwei,NIU Yingxia
    2019, 35(6):  150-156.  doi:10.11959/j.issn.1000-0801.2019166
    Asbtract ( 716 )   HTML ( 46)   PDF (1456KB) ( 656 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to accelerate the industrialization and commercialization of 5G and promote the integration and innovation development of 5G with various industries,the operators launched the demonstration project of 5G business application.The typical business scenarios under 5G network was firstly analyzed,the architecture of system was described,then hardware scheme was given including 4K collector,cloud platform and broadcast terminal.Then software solutions were proposed including management platform,cloud fast encoding system,4K transcoding platform,CDN and network slicing.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: