Please wait a minute...

Current Issue

    30 December 2019, Volume 3 Issue 4
    Theory and Technology
    Research on computing resource allocation strategy for cloud radio access network based on demand forecasting
    Zhipeng WANG,Bin CAO,Qinyu ZHANG
    2019, 3(4):  1-8.  doi:10.11959/j.issn.2096-3750.2019.00126
    Asbtract ( 299 )   HTML ( 43)   PDF (2237KB) ( 508 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cloud radio access network(CRAN) is a new network architecture commonly used in 5G network.It uses network function virtualization and software defined network technology to support end-to-end network slicing so that access network can share the same infrastructure.A computing resource allocation scheme based on virtualized network function(VNF) computing resource demand forecasting was proposed for cloud wireless network supporting end-to-end network slicing.Data-driven operation and maintenance framework established by the control plane collects network information and performs data processing to predict the demand for computing traffic in a period of time,which used the discrete particle swarm optimization based on best-fit-decreasing to dynamically and dynamically allocate CRAN computing resources,reducing the migration energy consumption and migration times of VNF.

    Research on methods of workers’ context description in mines
    Shimin FENG,Enjie DING,Zhongyu LIU,Xiao YU,Lei MENG,Zhikai ZHAO
    2019, 3(4):  9-16.  doi:10.11959/j.issn.2096-3750.2019.00127
    Asbtract ( 231 )   HTML ( 24)   PDF (1203KB) ( 502 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The worker’s unsafe behavior is the key cause of mine accidents.The human activity is closely related with the context.Ontology is widely used in computer science in the field of information exchange and knowledge sharing,which contains complex structures and various semantics.Firstly,the research on the description of the miners’ situational information in the mining field was summarized.It introduced the general situation in the field of the Internet of things.The importance and necessity of the description of the state information of mine personnel was presented.It introduced the research background,including semantic web,context description and knowledge representation.After that,the method of information description of mine personnel was described.The ontology model was proposed based on oneM2M international technical specifications.In order to construct this ontology,it was drawed on some of the core concepts of oneM2M Base Ontology.The concept classes,attributes and relationships that are specific to the information description of mine personnel were put forward.The context description of mine personnel proposed was aimed at achieving the purposes of specification information description,data semantic labeling,knowledge sharing and reuse.Finally,the conclusions were drawn and the prospect of using the ontology method for context perception and the miners’ unsafe behavior recognition was presented.

    Digital radio over fiber transmission technique for millimeter-wave radio access network
    Jia YE,Jianwei LUO,Yi GUO,Wei PAN
    2019, 3(4):  17-24.  doi:10.11959/j.issn.2096-3750.2019.00128
    Asbtract ( 230 )   HTML ( 21)   PDF (5822KB) ( 310 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the air interface standard of 5G confirms the millimeter wave as one important frequency band for the signal carrier,millimeter-wave communication is considered as the key technique to improve the transmission performance of the mobile communication system.Firstly,the digital radio over fiber (DRoF) link in 5G application was introduced.Then,the different quantization coding algorithms applied in DRoF system were compared and summarized.In order to provide reference for the construction of millimeter-wave radio access network,the important performance indexes such as the error vector amplitude (EVM),system complexity and spectrum utilization were analyzed.

    Application of time-aware retransmission against reflection signal interferences in Internet of things
    Han LUO,Yuhong LIU,Hongguang ZHANG,Chong ZHANG,Yuan’an LIU
    2019, 3(4):  25-33.  doi:10.11959/j.issn.2096-3750.2019.00129
    Asbtract ( 169 )   HTML ( 15)   PDF (2558KB) ( 481 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the enclosed spaces,wireless transmissions lead to the strong interferences of reflection signals,because of multipath effects.However,how to reduce the reflection signal effect on wireless transmissions is a kernel problem to expand the application scope of Internet of things.The time-aware retransmission MAC (TR-MAC) was proposed,which can adjust the time delay of each frame and reduce the interference caused by the reflected signal by using the reflection loss of the space conductor surface.In order to prove the adaptability of TR-MAC,an experimental environment that can generate strong reflection interference signals was used.The experimental results proved the feasibility and effectiveness of the TR-MAC in different environments.In a sense,TR-MAC extends the application of wireless communication in strongly reflective space.Besides,in the application of the Internet of things in the aircraft,ship and satellite,TR-MAC can realize wireless transmission instead of part of the wired transmission,so as to improve the system reliability,effective weight reduction and other important goals.

    Research on characteristics of industrial IoT wireless channel
    Yiqian LI,Liu LIU,Huiting LI,Kun ZHANG,Ze YUAN
    2019, 3(4):  34-47.  doi:10.11959/j.issn.2096-3750.2019.00130
    Asbtract ( 382 )   HTML ( 62)   PDF (7220KB) ( 505 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Nowadays,the industrial IoT has become the key competitiveness of the country,and the intelligent manufacturing industry is accelerating.As the information transmission channel in the industrial IoT system,wireless technology plays a strong supporting role in the industrial field.Firstly,the wireless channel characteristics of industrial scene were introduced.Then the propagation characteristics in different frequency bands were analyzed and the main adjustment frequency bands for the initial deployment of industrial private networks were suggested.The causes,influencing factors and value ranges of the large-scale fading and small-scale fading were summarized,and corresponding parameters of the wireless channel characteristics of industrial IoT were summarized.

    Unmanned aerial vehicle enabled communication technologies and applications for Internet of things
    Yalin LIU,Hongning DAI,Qubeijian WANG
    2019, 3(4):  48-55.  doi:10.11959/j.issn.2096-3750.2019.00131
    Asbtract ( 661 )   HTML ( 99)   PDF (4666KB) ( 850 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The Internet of things (IoT) is designed to provide the wide coverage and the massive connectivity service for“things” node,and the collected “things” data can provide support for the intelligent decision-making at the application layer.However,due to the fixed deployment of the access point of the “things” node,the topology of the IoT network is not flexible,consequently making it difficult to dynamically cover the IoT node or regions with high mobility.In addition,the current IoT communication technology suffers from the remote blind area,which makes it impossible for a large number of “things” node to connect to establish the “network” in some geologically-complexed regions.UAV has high mobility,low cost and flexible deployment,which is suitable to solve the above issues.Studying the communication technology of UAV assisted IoT,help the IoT to extend the existing network coverage,enhance the flexibility of the IoT topology and provide more diverse IoT service.

    RTRS algorithm in low-power Internet of things
    Yuchen CHEN,Yuan CAO,Laipeng ZHANG,Lianghui DING,Feng YANG
    2019, 3(4):  56-62.  doi:10.11959/j.issn.2096-3750.2019.00132
    Asbtract ( 273 )   HTML ( 13)   PDF (1360KB) ( 302 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering the feature of periodical uplink data transmission in IEEE 802.11ah low-power wide area network (LWPAN),a real-time RAW setting (RTRS) algorithm was proposed.Multiple node send data to an access point (AP),and the uplink channel resources were divided into Beacon periods in time.During a Beacon period,AP firstly predicted the next data uploading time and the total amount of devices that will upload data in the next Beacon period.The AP calculated the optimal RAW parameters for minimum energy cost and broadcasted the information to all node.Then all devices upload data according to the RAW scheduling.The simulation results show that the current network state can be predicted accurately according to the upload time of the terminal in the last period.According to the predicted state,raw configuration parameters can be dynamically adjusted and the energy efficiency can be significantly improved.

    Research on neuromorphic vision sensor and its applications
    Yongsheng SANG,Renhao LI,Yaoqian LI,Qiangwei WANG,Yao MAO
    2019, 3(4):  63-71.  doi:10.11959/j.issn.2096-3750.2019.00133
    Asbtract ( 620 )   HTML ( 78)   PDF (3857KB) ( 1147 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Neuromorphic vision sensor is a biologically inspired artificial neural system that mimics algorithmic behavior of biological vision systems,which has numerous advantages over standard vision sensors,such as high temporal resolution,low latency,low power,high dynamic range,etc.At first,a brief introduction to neuromorphic engineering,neuromorphic chips,and vision sensors was given.Then the main computing methods for neuromorphic vision were reviewed,including probability and statistics,spiking neural network and deep neural network.Finally,several kinds of applications based on neuromorphic vision sensors were given,such as simultaneous localization and mapping (SLAM),image reconstruction (IR),etc.A review of hardware,computing methods and applications for neuromorphic vision sensors was given,which provided a comprehensive reference for researchers.

    Research on security threat of intelligent connected vehicle
    Yijie XUN,Jiajia LIU,Jing ZHAO
    2019, 3(4):  72-81.  doi:10.11959/j.issn.2096-3750.2019.00134
    Asbtract ( 633 )   HTML ( 90)   PDF (2626KB) ( 1342 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Intelligent connected vehicle (ICV) is becoming the mainstream of automotive industry in the future,and automobile safety has gradually become a problem that cannot be ignored in the automotive industry.The threat attack surfaces in ICV were analyzed in detail,and some representative attack methods were summarized.On this basis,a practical case of using the vulnerabilities of controller area network bus and telematics service provider to attack the Luxgen U5 car was discussed.The experimental results show that there are many attack surfaces that can be used in ICV.Finally,some feasible defensive measures against the threats in ICV were put forward.

    D2D computation task offloading for efficient federated learning
    Xiaoran CAI,Xiaopeng MO,Jie XU
    2019, 3(4):  82-90.  doi:10.11959/j.issn.2096-3750.2019.00135
    Asbtract ( 403 )   HTML ( 33)   PDF (1493KB) ( 328 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Federated learning is a kind of distributed machine learning technique.The factor of communication and computation resource constraints at the edge node is becoming the performance bottleneck.In particular,when different edge node has distinct computation and communication capabilities,the model training performance may degrade severely,thus necessitating the joint communication and computation optimization.To tackle this challenge,a computational task offloading scheme enabled by device-to-device (D2D) communications was proposed,in which different edge node exchanged data samples via D2D communication links to balance the processing capability and task load,in order to minimize the total time delay for machine learning model training.Simulation results show that compared to the benchmark scheme without such D2D task offloading the training speed and efficiency of federated learning has be improved significantly.

    Service and Application
    Exploration of intelligent education method:mobile game assisted research teaching
    Hao SHENG,Li RUAN,Ke XU,Jun HAN,Zhang XIONG,Xiaopeng GAO,Weifeng LYU
    2019, 3(4):  91-100.  doi:10.11959/j.issn.2096-3750.2019.00136
    Asbtract ( 204 )   HTML ( 25)   PDF (2380KB) ( 521 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The technology of intelligent IoT and ubiquitous access lead to the change of the learning mode.The traditional mobile phone assisted teaching mode just simply transplants some contents of classroom teaching to the Internet terminal,which does not give full play to the flexibility and interest of the mobile intelligent terminal.Based on the fragmentation of learning content and the innovation of mobile communication technology,a ubiquitous learning theory oriented to auxiliary teaching was proposed,which made full use of the advantages of fragmentation time and mobile learning and made fragmented learning possible.Then,the feasibility of game assisted teaching was demonstrated,including the collaborative learning network,situational cognitive theory and ubiquitous learning.In addition,a learner-centered game assisted teaching model was proposed,which consists of three parts including game assisted teaching strategy,learner and teaching design model.It pays more attention to the realization of expected teaching objectives and the maintenance of learning stickiness.Finally,the feasibility and effectiveness of ubiquitous learning theory were verified by the experimental results of two courses of mobile phone assisted teaching,which makes mobile game assisted teaching a useful supplement to traditional classroom teaching.

    Research on the application of LEO satellite communication and Internet of things
    Yang LIU,Feng WEI,Shucheng CUI,Wenjian WANG
    2019, 3(4):  101-108.  doi:10.11959/j.issn.2096-3750.2019.00137
    Asbtract ( 416 )   HTML ( 49)   PDF (3973KB) ( 686 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Relying on the demands of Internet of things application,a detailed review on the status quo of LEO (low earth orbit) satellite communication system was given,and the components of communication system were compared and explained separately.Afterwards,the characteristics of the NB-IoT land-based communication network widely applied at present and existing LEO satellite communication system were compared,and a feasible design scheme for IoT-oriented LEO satellite system was provided,and its main parameters and characteristics were briefly described.

    Research on appliance event detection method based on intelligent perception technology
    Ziyuan YANG,Xiaobin XU,Xin LI,Yimeng ZHAO
    2019, 3(4):  109-115.  doi:10.11959/j.issn.2096-3750.2019.00138
    Asbtract ( 246 )   HTML ( 28)   PDF (2872KB) ( 552 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The rapid development of Internet of things and intelligent technologies provides the system support for intelligent load perception technology of power usage,as well as provides analytical data for power user behavior.In order to realize the accurate identification of equipment start or stop events,a technical proposal which combined the high frequency and high precision power data with the dynamic time consolidation (DTW) algorithm was proposed,and an experimental testing platform based on the independent hardware was built.The experimental results show that the power incident identification algorithm has a high identification accuracy and recall rate,which can be applied in more scenarios to realize the full perception of power load.

    Research on engineering parameter perception and innovation application based on Internet of things
    Yanfen LI,Xuetian ZHU
    2019, 3(4):  116-120.  doi:10.11959/j.issn.2096-3750.2019.00139
    Asbtract ( 316 )   HTML ( 28)   PDF (3526KB) ( 479 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Antenna engineering parameters are the benchmark of the wireless network planning and optimization.It is of great significance for reducing the difficulty of the network operation and optimization by acquiring engineering parameters through the Internet of things.Starting from the importance of antenna parameters,the key technology of antenna parameters perception based on the Internet of things was introduced,and an innovative application of 5G massive MIMO intelligence was proposed.The basic process and method were clarified,which lays the foundation for advancing the antenna technology for Internet of things.


Copyright Information
Quarterly,started in 2017
Cpmpetent Unit:Ministry of Industry and Information Technology of the People's Republic of China
Sponsor:Posts & Telecom Press Co.,Ltd.
Publisher: China InfoCom Media Group
Editor:Editor Board of Chinese Journal on Internet of Things
Editor-in-Chief:YIN Hao
Executive Editor-in-Chief:ZHU Hongbo
Deputy Editor-in-Chief:LIU Hualu
Director:LI Caishan
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53878076、53879096、53879098
E-mail:wlwxb@bjxintong.com.cn
ISSN 2096-3750
CN 10-1491/TP
Visit
Total visitors:
Visitors of today:
Now online: