Please wait a minute...

Current Issue

    25 February 2020, Volume 41 Issue 2
    Topics: Intellgent Mine
    Research on key technologies of human-machine-environment states perception in mine Internet of things
    Liang YUAN, Xiao YU, Enjie DING, Xiaohu ZHAO, Shimin FENG, Da ZHANG, Tongyu LIU, Weidong WANG, Yanqiu HUANG
    2020, 41(2):  1-12.  doi:10.11959/j.issn.1000-436x.2020036
    Asbtract ( 596 )   HTML ( 74)   PDF(1186KB) ( 885 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The multi-disciplinary cross-integration of Internet of things (IoT) technology provides a new way to thoroughly solve the problem of mine safety production.The real-time accurate perception and intelligent analysis of mine “human-machine-environment” status information is the basis of mine IoT application.The technological architecture of the IoT was analyzed for mine safety production,the virtual-real fusion perception theory model based on CPS and DT was established to solve key issues in mine IoT,such as perception theory,intelligent sensing technology,standardization method and large data analysis service.A unified description method for mine “human-machine-environment” information was put forward,the multi-parameter sensors and intelligent autonomous sensing devices were developed,and the mine IoT coding and interaction protocol standards were standardized.In addition,it was designed for the mine IoT converged communication network service architecture,the application service system of high-efficiency access and deep analysis of large data in mine IoT was constructed,which realized the comprehensive and accurate perception,real-time and efficient interaction and intelligent analysis application of mine safety production status information.It also provides strong scientific and technological support for the mine safety prevention preparation,monitoring and early warning,situational prejudgment,comprehensive protection and other technical levels.

    Multi-source information transmission and classification algorithm for equipment based on compressed sensing
    Xiaohu ZHAO,Gang WANG,Boming SONG,Jiacheng YU
    2020, 41(2):  13-24.  doi:10.11959/j.issn.1000-436x.2020040
    Asbtract ( 386 )   HTML ( 59)   PDF (1650KB) ( 570 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the characteristics of various types of equipment in coal preparation plant and the dispersion of monitoring points,a multi-source information wireless transmission and classification algorithm for equipment based on compressed sensing was proposed.By constructing a multi-hop information transmission model,the information transmission problem was transformed into the compressed sensing problem of multi-path measurement signals,thereby the measurement matrix acquisition was transformed into the routing problem of the multi-hop information transmission model.Aiming at the large coherence of the obtained measurement matrix and affecting the signal reconstruction effect,the idea of random routing was introduced into the routing construction,and a random dynamic self-organizing routing algorithm was proposed.In order to solve the problem that the time domain features of the reconstructed signal were difficult to accurately classify the fault type,a new time domain feature,the total variation (TV) of the vibration signal,was introduced for the reconstructed signal,and the compensation distance estimation algorithm was adopted to verify the superiority of the introduction of indicators.The analysis of the measured data of the coal preparation plant shows that the proposed multi-source information transmission and classification algorithm can effectively improve the fault recognition accuracy under the condition of improving the real-time transmission efficiency of the monitoring data.

    Dynamic cache allocation routing strategy of Internet of things satellite node based on traffic prediction
    Weidong WANG,Cheng WANG,Huiwen WANG,Pin XU
    2020, 41(2):  25-35.  doi:10.11959/j.issn.1000-436x.2020038
    Asbtract ( 464 )   HTML ( 53)   PDF (813KB) ( 834 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the routing problem of low earth orbit (LEO) Internet of things (IoT) satellite systems,a dynamic cache allocation routing strategy based on traffic prediction for IoT satellite nodes was proposed.Firstly,the space-time characteristics of traffic distribution in the LEO coverage area were analyzed,and an end-to-end traffic prediction model was proposed.Then,according to the traffic prediction result,a dynamic cache allocation routing strategy was proposed.The satellite node periodically monitored the traffic load of the inter-satellite link,dynamically allocated the cache resources of each inter-satellite link between the neighboring nodes.The cache allocation process was divided into two phases,initialization and system operation.At the same time,the traffic offload and packet forwarding strategy when the node was congested was proposed.By comparing the queuing delay and the forwarding delay,it was determined whether the data packet needs to be rerouted.The simulation results show that the proposed routing strategy effectively reduces the packet loss rate and average end-to-end delay,and improves the traffic distribution in the whole network.

    Video description method based on multidimensional and multimodal information
    Enjie DING,Zhongyu LIU,Yafeng LIU,Wanli YU
    2020, 41(2):  36-43.  doi:10.11959/j.issn.1000-436x.2020037
    Asbtract ( 418 )   HTML ( 37)   PDF (886KB) ( 630 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of complex information representation in automatic video description tasks,a multi-dimensional and multi-modal visual feature extraction and fusion method was proposed.Firstly,multi-dimensional features such as static and dynamic attributes of the video sequence were extracted by transfer learning,and the image description algorithm was also used to extract the semantic information of the key frames in the video.By doing this,the video features extraction was carried out.Then,multi-layer long and short memory networks were used to fuse multi-dimensional and multi-modal information,and finally generated a language description of the video content.Compared with the existing methods,experimental simulations results show that the proposed method achieves better results in the video automatic description task.

    Research and application of micropower safety monitoring IoT system for mine
    Da ZHANG,Jinong WANG,Hu JI,Hao JI,Yunfeng ZHAO
    2020, 41(2):  44-57.  doi:10.11959/j.issn.1000-436x.2020034
    Asbtract ( 269 )   HTML ( 23)   PDF (1767KB) ( 727 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the problems existing in the safety monitoring system of China’s mining enterprises,such as poor reliability,small coverage,high cost,weak maintenance and inaccurate early-warning,etc.,a new safety monitoring IoT system with micro power consumption was proposed for Chinese mines to provide effective technical support for the safety of mine production and operation.The key technologies such as micro-power consumption information collection,fault diagnosis and auto-recovery,energy-saving wireless communication,online intelligent data analysis and early warning had been broken through by the proposed system,which had been successfully applied in typical cases such as online monitoring of tailings ponds,open-pit slop and ground pressure of domestic mining enterprises.Field practice shows that the proposed system is more suitable for mine operation conditions than the existing conventional safety monitoring system,the SNR of new sensor is increased by 1.4 times,the comprehensive energy consumption is reduced by 10%,which is suitable for online intelligent analysis and rapid warning.

    Precisely positioning method for roadheaders and robotic roadheader system
    Xinming LU,Changqing YAN,Zhaoping YUAN
    2020, 41(2):  58-65.  doi:10.11959/j.issn.1000-436x.2020042
    Asbtract ( 414 )   HTML ( 56)   PDF (804KB) ( 511 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To overcome the problems faced in underground positioning,the robotic roadheader mine Internet of things (IoT) was designed which connected multi sensors,surveying devices and industrial computers,and a novel positioning method was developed,based on which a robotic roadheader system was built.The robotic roadheader system was employed for real-world tunnel cutting.The experimental results verifies the high accuracy of the positioning method,which achieves an RMSE error less than 5 cm,and the robust running of the robotic roadheader indicates that the robotic roadheader system can precisely perceive the surrounding environment and make precise interaction with the working environment,which yield a safety,high efficiency,and precisely underground tunnel building and coal mining and an unmanned working surface.

    Study on optical fiber multi-parameter sensor
    Tongyu LIU,Zhen LI,Xiangjun MENG,Lin ZHAO,Fuqi WANG,Guofeng DONG,Jiqiang WANG
    2020, 41(2):  66-73.  doi:10.11959/j.issn.1000-436x.2020039
    Asbtract ( 355 )   HTML ( 37)   PDF (850KB) ( 572 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the principle of fiber Bragg grating detection,an optical fiber sensor for detecting wind speed and temperature and humidity in underground space was designed.The designed optical fiber wind speed sensor was based on the thermal flow detection method,which has high sensitivity to low wind speed.For the speed rising from 0 to 0.5 m/s,the wavelength variation is about 800 pm.For the demodulator with sensitivity of 1 pm,the speed resolution is 0.7 mm/s.Fiber optic humidity sensor was fabricated by uniform surface coating of FBG element in polyimide solution,and detection sensitivity of 4.2 pm/% RH was achieved with accuracy less than ± 3% RH.

    Papers
    Model and application of cyberspace information system
    Jilong WANG,Shuying ZHUANG,Congcong MIAO,Changqing AN
    2020, 41(2):  74-83.  doi:10.11959/j.issn.1000-436x.2020018
    Asbtract ( 488 )   HTML ( 65)   PDF (2728KB) ( 999 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the visualization of cyberspace is still using the traditional geographic information system,which makes it difficult to truly express the characteristics and laws of cyberspace,a multi-scale,multi-dimensional and multi-view cyberspace information system model was proposed to take the cyberspace information system as a concept parallel to the geographic information system,that was,the geographic information system supported visualization based on the geographic coordinate system,and the cyberspace information system supported visualization based on the coordinate system of cyberspace itself.Then,the basic concepts of cyberspace information system were defined to provide a theoretical foundation for later research,and the key technologies,part of exploratory research work including the coordinate system,scale,multi-dimensional expression model and application cases were expounded.According to the prototype developed,the cyberspace information system is more convenient for the display and processing of cyberspace affairs.

    Active deception defense method based on dynamic camouflage network
    Shuo WANG,Jianhua WANG,Qingqi PEI,Guangming TANG,Yang WANG,Xiaohu LIU
    2020, 41(2):  97-111.  doi:10.11959/j.issn.1000-436x.2020026
    Asbtract ( 559 )   HTML ( 50)   PDF (1087KB) ( 705 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the problem that the existing honeypots often fail to resist the penetration attack due to the lack of confidentiality,an active deception defense method based on dynamic camouflage network (DCN) was presented.The definition of DCN was given firstly,and then the attacker-defender scenario of active deception based on DCN was described.Next,the interaction process of the attacker-defender scenario was modeled by using a signaling game,whose equilibrium can guide the selection of optimal deception strategy.Furthermore,to quantify the payoffs accurately,the two-layer threat penetration graph (TLTPG) was introduced.Finally,the solution for game equilibrium was designed,through which pure strategy and mixed strategy could be calculated simultaneously.The experimental results show that,based on the dynamic camouflage network,the perfect Bayesian equilibrium can provide effective guidance for the defender to implement the optimal defense strategy and maximize the benefits of the defender.In addition,the characteristics and rules of active deception defense DCN-based are summarized.

    Attribute-based lightweight reconfigurable access control policy
    Rongna XIE,Hui LI,Guozhen SHI,Yunchuan GUO
    2020, 41(2):  112-122.  doi:10.11959/j.issn.1000-436x.2020035
    Asbtract ( 307 )   HTML ( 32)   PDF (637KB) ( 533 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the severe challenges of access control policy redundancy and conflict detection,the efficiency of access control policy evaluation in complex network environment,an attribute-based lightweight reconfigurable access control policy was proposed.Taking the attribute-based access control policy as an example,the attribute-based access control policy was divided into multiple disjoint atomic access control rules according to the operation type,subject attribute,object attribute,and environment attribute in the access control policy.Complex access control policies were constructed through atomic access control rules and an algebraic expression formed by AND,OR logical relationships.A method for redundancy and collision detection of atomic access control rules was proposed.A method was proposed for decompose a complex access control policy into equivalent atomic access control rules and an algebraic expression.The method for redundancy and collision detection of complex access control policies were proposed through redundancy and collision detection of equivalent atomic access control rules and algebraic expressions.From time complexity and space complexity,the efficiency of the equivalent transformation access control policy was evaluated.It showes that the reconstruction method for access control policy greatly reduces the number,size and complexity of access control policy,improves the efficiency of access control policy redundancy and collision detection,and the efficiency of access control evaluation.

    Research on the spatial characterization of a 3D UAV air-to-ground channel model
    Zhi ZHANG,Tianbo XIONG,Jianqiao CHEN,Nan MA
    2020, 41(2):  123-130.  doi:10.11959/j.issn.1000-436x.2020043
    Asbtract ( 524 )   HTML ( 50)   PDF (872KB) ( 478 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To cope with the problem that the distribution assumptions of arrival angle and departure angle in existing geometry-based stochastic modeling (GBSM) for the unmanned aerial vehicle (UAV) air-to-ground (A2G) channel are too ideal to describe the spatial statistical property of the UAV A2G propagation environment precisely,considering the three-dimensional (3D) cylindrical A2G channel model,the spatial geometric characteristics of scattering regions were investigated analytically as corresponding to the angles of arrival and departure in both elevation and azimuth planes,which derived the probability density function (PDF) for the distribution of each angle.The effects of various parameters of channel model on the PDF were studied and simulation results prove that the derived PDF can describe the spatial statistical properties of UAV A2G channels more accurately,and can support the modeling of A2G communication channels well.

    Research on switch migration method based on minimum cost path
    Yingxu LAI,Yewei PU,Jing LIU
    2020, 41(2):  131-142.  doi:10.11959/j.issn.1000-436x.2020030
    Asbtract ( 304 )   HTML ( 22)   PDF (953KB) ( 465 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to protect the controller,especially the controller in backbone network,from security threats and attacks,improve the security of the software-defined network (SDN) control plane,a switch migration algorithm based on minimum cost path was proposed.A load prediction module was added to the migration model,which executed a controller load prediction algorithm to obtain a load prediction matrix,and then a migration-target controller set was determined according to the load prediction matrix.The improved Dijkstra algorithm was used to determine the minimum cost path.According to the load state of the controller and the traffic priority of the switch to be migrated,the optimal migration switch set was determined.The problem of isolated nodes was solved that may occur during the migration process.The experimental results show that the migration timing of the algorithm is more reasonable,the selection of the migration controller and the target controller is more reasonable,the load balancing of the control plane is realized,the number of migrations and cost are reduced,and the performance of the controller is improved.

    Network threat situation assessment based on unsupervised multi-source data feature analysis
    Hongyu YANG,Fengyan WANG
    2020, 41(2):  143-154.  doi:10.11959/j.issn.1000-436x.2020015
    Asbtract ( 341 )   HTML ( 30)   PDF (1030KB) ( 832 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the limitations of supervised neural network in the network threat testing task relying on data category tagging,a network threat situation evaluation method based on unsupervised multi-source data feature analysis was proposed.Firstly,a variant auto encoder-generative adversarial network (V-G) for security threat assessment was designed.The training data set containing only normal network traffic was input to the network collection layer of V-G to perform the model training,and the reconstruction error of the network output of each layer was calculated.Then,the reconstruction error learning was performed by the three-layer variation automatic encoder of the output layer,and the training abnormal threshold was obtained.The packet threat was tested by using the test data set containing the abnormal network traffic,and the probability of occurrence of the threat of each group of tests was counted.Finally,the severity of the network security threat was determined according to the probability of threat occurrence,and the threat situation value was calculated according to the threat impact to obtain the network threat situation.The simulation results show that the proposed method has strong characterization ability for network threats,and can effectively and intuitively evaluate the overall situation of network threat.

    Traffic characteristic based privacy leakage assessment scheme for Android device
    Zhu WANG,Kun HE,Xinyu WANG,Ben NIU,Fenghua LI
    2020, 41(2):  155-164.  doi:10.11959/j.issn.1000-436x.2020020
    Asbtract ( 422 )   HTML ( 39)   PDF (647KB) ( 764 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the privacy leakage,which was caused by collecting user information by third-party host in Android operating system App,a privacy leakage evaluation scheme HostRisk was proposed.HostRisk was based on TF-IDF model and hierarchical clustering method,which was applied in mobile device.The TF-IDF model calculated the business relevance between Apps and hosts via the behavior characteristics of the hosts in these Apps.For the business related hosts that fail to express the business relevance characteristics,those hosts were adjusted and optimized via the average connected hierarchical agglomerative clustering method.Finally,the harmful degree of privacy leakage was evaluated based on the ranking of all hosts in the App.The experimental results verify the effectiveness and efficiency of the scheme.

    Research on coreference resolution technology of entity in information security
    Han ZHANG,Yongjin HU,Yuanbo GUO,Jicheng CHEN
    2020, 41(2):  165-175.  doi:10.11959/j.issn.1000-436x.2020033
    Asbtract ( 325 )   HTML ( 28)   PDF (747KB) ( 422 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problem of coreference resolution in information security,a hybrid method was proposed.Based on the BiLSTM-attention-CRF model,the domain-dictionary matching mechanism was introduced and combined with the attention mechanism at the document level.As a new dictionary-based attention mechanism,the word features were calculated to solve the problem of weak recognition ability of rare entities and entities with long length when extracting candidates from text.And by summarizing the features of the domain texts,the candidates were coreferenced by rules and machine learning according to the part of speech to improve the accuracy.Through the experiments on security data set,the superiority of the method is proved from the aspects of coreference resolution and extraction of candidates from text .

    Correspondences
    Dynamic interference coordination scheme based on the iterative joint transmission in ultra dense network
    Xiaona LI,Zhongfang WANG,Qian CHENG,Jingwen FU,Shunliang ZHANG
    2020, 41(2):  176-186.  doi:10.11959/j.issn.1000-436x.2020032
    Asbtract ( 269 )   HTML ( 23)   PDF (1113KB) ( 772 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In consideration of the rapidly increasing number of cells and users in the ultra-dense network,how to realize dynamic interference coordination by selecting the appropriate joint transmission users was studied,so as to improve the spectral efficiency of the edge users.All users were classified by dynamic coordination cluster division and dynamic joint-muting transmission.The iterative optimization algorithm was used to further improve the system performance and solve the problem of selecting the number of joint transmission users.The simulation results prove that compared with the conventional CoMP JT scheme,the proposed scheme has significant performance gains in the cell edge spectral efficiency without reducing the cell average spectral efficiency.

    Verifiable attribute-based searchable encryption scheme based on blockchain
    Xixi YAN,Xiaohan YUAN,Yongli TANG,Yanli CHEN
    2020, 41(2):  187-198.  doi:10.11959/j.issn.1000-436x.2020011
    Asbtract ( 649 )   HTML ( 106)   PDF (761KB) ( 1727 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the problem that the shared decryption key lacks of fine-grained access control and the search results lacks of correctness verification under one-to-many search model,a verifiable attribute-based searchable encryption scheme based on blockchain was proposed.The ciphertext policy attribute-based encryption mechanism was used on the shared key to achieve fine-grained access control.Ethereum blockchain technology was combined to solve the problem of incorrect search results returned by the semi-honest and curious cloud server model,so it could prompt both the cloud server and the user to follow the rules of the contract honestly and achieved service-payment fairness between the user and the cloud server in the pay-per-use cloud environment.In addition,based on the irreversible modification of the blockchain,the cloud server was guaranteed to receive the service fee,and the user was assured to obtain the correct retrieval results without additional verification which reduced the computational overhead of the user.The security analysis shows that the scheme satisfies the semantic security against adaptive chosen keyword attack and can protect the privacy of users and the security of data.The performance comparison and experimental results show that the scheme has certain optimizations in security index generation,search token generation,retrieval efficiency and transaction quantity,so it is more suitable for one-to-many search scenarios such as smart medical.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: