Please wait a minute...

Current Issue

    20 January 2020, Volume 36 Issue 1
    Topic:5G Networking and 6G Outlook
    Smart fog radio access networks for 6G:architecture and key technologies
    Xian ZHANG,Xueyan CAO,Binghong LIU,Yuan AI,Chenxi LIU
    2020, 36(1):  3-10.  doi:10.11959/j.issn.1000-0801.2020012
    Asbtract ( 536 )   HTML ( 55)   PDF (808KB) ( 585 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Taking full advantage of fog radio access network (F-RAN),non-orthogonal multiple access techniques,and artificial intelligence techniques,smart fog radio access networks (S-FRAN) have been envisioned as a promising framework to fulfill the stringent requirements of 6G wireless network,such as ultra-high data rate,ultra-low latency,and ultra-large number of devices.The principles of S-RAN were firstly presented.Based on which,the key technol-ogies,research progress and standardization of S-FRAN were introduced.Finally,the challenges of S-FRAN were identified.

    6G endogenous security:architecture and key technologies
    Yang LIU,Mugen PENG
    2020, 36(1):  11-20.  doi:10.11959/j.issn.1000-0801.2020011
    Asbtract ( 1371 )   HTML ( 202)   PDF (903KB) ( 1585 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.

    6G endogenous security:blockchain technology
    Kaijun NIE,Bin CAO,Mugen PENG
    2020, 36(1):  21-27.  doi:10.11959/j.issn.1000-0801.2020004
    Asbtract ( 792 )   HTML ( 79)   PDF (992KB) ( 634 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of mobile communication technology towards marginalization and distributed structure,the traditional network security method of external border protection will be faced with more and more challenges.The emerging network security accidents also show that it is necessary to grow self-adaptive,independent and self-growing security capabilities from the information system,that is,endogenous security.Blockchain,as a de-centralized shared ledger and database,has the characteristics of decentralization,immutability,leaving traces throughout,traceability,collective maintenance,openness and transparency,etc.,which can greatly meet the needs of endogenous security design.Therefore,the necessity and demand of endogenous security was described,then the blockchain technology as an important means to realize endogenous security was introduced,the main research progress,difficulties and challenges faced by blockchain were analyzed,and the future research direction and oppor-tunities were put forward.

    5G low altitude network service and operation solutions
    Qing ZHANG,Yi FENG,Dan MA,Qi LV
    2020, 36(1):  28-33.  doi:10.11959/j.issn.1000-0801.2020005
    Asbtract ( 293 )   HTML ( 37)   PDF (949KB) ( 957 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development and maturity of civil UAV technology,the industry application puts forward higher and higher requirements for UAV data link.Using 5G network to provide data link for UAV and building the ground-air integration network can improve the service ability of UAV and enrich the service scenario.After analyz-ing the challenges faced by the traditional UAV data link,the 5G low altitude network solutions and service projects were proposed,while the 5G low altitude network operation solutions and 5G UAV application scenarios were ana-lyzed in the end.

    Research on mobile stroke unit based on 5G network technology
    Yu SHENG,Zhiheng LIU,Liya SHAN,Yi FENG
    2020, 36(1):  34-40.  doi:10.11959/j.issn.1000-0801.2020014
    Asbtract ( 288 )   HTML ( 28)   PDF (922KB) ( 454 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The 5G mobile stroke unit uses advanced next-generation information and communication technologies such as the Internet of things,mobile Internet,cloud computing,5G,etc.,to connect and achieve healthy interaction with people,equipment,and resources related to health care,which can guarantee people's timely access to preven-tive and therapeutic medical services.The composition design,functional modules,implementation architecture,and innovative service models of 5G mobile stroke units were discussed.The combination of 5G network technology and mobile stroke units were analyzed,and the network requirements of 5G mobile stroke units was analyzed with spe-cific cases.

    Performance evaluation on key techniques for 5G enhanced mobile broadband
    Longchang ZHU,Xiaodong JI,Xinran ZHANG,Quxin LI
    2020, 36(1):  41-48.  doi:10.11959/j.issn.1000-0801.2020003
    Asbtract ( 305 )   HTML ( 25)   PDF (822KB) ( 375 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The 5G eMBB scenario puts high requirements on performance such as spectrum efficiency and system capacity.It was proposed to introduce technologies such as massive MIMO and millimeter-wave communication,and combine heterogeneous networks to improve system performance,because traditional technologies cannot bring about corresponding performance improvement.At the same time,there are few simulation evaluation results for the key technologies of the eMBB scenario,and the performance advantages of each technology cannot be explained from the perspective of simulation.The performance of massive MIMO with different antenna numbers by building a system-level simulation platform were evaluated,and the impact of the density and bias of micro BS in the mmWave frequency to the performance based on the results in the heterogeneous networks was summarized.It has great refer-ence value for parameter configuration and network construction of 5G network.

    Performance evaluation of 5G cellular vehicle networks
    Jun WANG,Xiaodong JI,Xinran ZHANG,Xiaoran WEN,Jiajun TONG
    2020, 36(1):  49-57.  doi:10.11959/j.issn.1000-0801.2020009
    Asbtract ( 486 )   HTML ( 52)   PDF (902KB) ( 722 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cellular vehicle networks (C-V2X) is one of the key technologies of intelligent transportation systems.Ve-hicles exchange information with surrounding information entities in real time to ensure traffic safety and improve traffic efficiency,which meets the basic demands of V2X communication.Besides,it will be applied to automatic driving,assisting driving and other advanced scenarios in the NR-V2X scene.5G-V2X system-level simulation plat-form was developed through opnet.For different application scenarios,coverage performance of 5G C-V2X was analyzed based on simulation results,and suggestions for improvement were given,which has important directive to production practices for the research and system deployment of 5G-V2X.

    Challenge and strategy of 5G radio optimization
    Jun ZHOU,Xiao QUAN,Jianhui MA
    2020, 36(1):  58-65.  doi:10.11959/j.issn.1000-0801.2020013
    Asbtract ( 392 )   HTML ( 39)   PDF (1475KB) ( 1251 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The era of network convergence,terminal and business diversification in 5G stage is coming.The radio network will have the situation of coexistence of GSM/TDD/FDD/NB/pre5G/5G/WLAN multi-mode and 900 MHz/1 800 MHz/ F/D/E/A6-band 15 frequency points.Due to the layered service carrying,the existing 4G and 5G interact with each other,which needs to be taken into account.The network structure will be unprecedented complex,and the wireless optimization work situation will be severe.The difficulties and challenges of 5G radio optimization were analyzed,and the strategies to deal with 5G radio optimization was put forward.

    Research and Development
    Empirical research on the diffusion effect of ICT innovation diffusion and prediction in China
    Wenyu HU,Wenju WANG
    2020, 36(1):  66-76.  doi:10.11959/j.issn.1000-0801.2020015
    Asbtract ( 190 )   HTML ( 9)   PDF (569KB) ( 545 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the characteristics of information and communication technology (ICT) in China,an empirical study was made on the diffusion effect of ICT innovation using Bass extension model.The results show that the curve fitting estimation effect of genetic algorithm was remarkable.In addition,non-cumulative adopter model was used to empirically analyze the diffusion effect of ICT innovation from the aspects of technology evolution,business,region and provinces.It was concluded that innovation diffusion was significantly driven by innovation effect along with the evolution of ICT,especially 3G/4G,broadband Internet,digital TV and their convergent business.Finally,the non-cumulative Bass model using genetic algorithm were used to predict the user size of fixed-line,mobile,broad-band,radio and television in the next five years.

    Improved Polar selective decoding and forwarding cooperation
    Qichao SUN,Jianrong BAO,Chao LIU,Bin JIANG,Fang ZHU,Jianhai HE
    2020, 36(1):  77-87.  doi:10.11959/j.issn.1000-0801.2020007
    Asbtract ( 171 )   HTML ( 7)   PDF (775KB) ( 347 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An improved Polar selective decoding and forwarding (IPSDF) scheme based on cooperative threshold de-cision was proposed.Firstly,a new construction of Polar codes according to the fading channel state information (CSI) was proposed.Then,a relay with best CSI was selected from the candidate relay set as the best relay.In addition,the proposed Polar codes were introduced into the cooperative communication system,to get coding gain and reduce the complex of encoding and decoding.Simulation results show that the proposed Polar codes achieve about 0.3 dB gain at bit-error-rate (BER) of 10<sup>?3</sup>.And using a classic multi-relay cooperative model,the proposed scheme achieves about 0.8 dB and 1.3 dB gain at BER of 10<sup>?3</sup>,when compared with those the existing DF Polar+ and network Polar coded coopera-tion scheme.Therefore,the IPSDF scheme can be used to improve BER performance in a multi-relay cooperative system and it is quite suitable for heterogeneous network applications in cooperative communication.

    Wireless positioning methods for mitigating the influence of environmental and terminal diversity
    Jietai WANG,Youlian GUAN,Xiaoniu YANG,Zhenxing LUO,Jianbiao YU
    2020, 36(1):  88-100.  doi:10.11959/j.issn.1000-0801.2020006
    Asbtract ( 133 )   HTML ( 8)   PDF (1231KB) ( 374 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Two optimization algorithms respectively were proposed according to the traditional two methods based on ranging and fingerprint-based to mitigate or circumvents the influence of environmental parameters on the position-ing results and compared traditional benchmark algorithms and recent similar work through simulation and actual scene experiments.The experimental results show the effectiveness of the algorithms:compared with the traditional benchmark algorithms,the positioning accuracy is improved by about 70%,compared with the recent similar work,the positioning accuracy is also improved by about 20%,at the same time,the change of the environmental parame-ters has little impact on the stability of the proposed algorithm.

    LTE network expansion under unlimited traffic packages in colleges and universities
    Shuai WANG,Yi LI,Maolin CHEN,Guifang XU
    2020, 36(1):  101-108.  doi:10.11959/j.issn.1000-0801.2020020
    Asbtract ( 155 )   HTML ( 9)   PDF (965KB) ( 235 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    After the launch of the unlimited traffic package,the demand for LTE network capacity has increased dra-matically,and the business model of college student users has also changed.Aiming to change the business traffic of college users before and after the launch of the unlimited traffic package,through the statistical analysis of big data,a business prediction model was proposed which was more suitable for traffic change by using least squares modeling,and the network guarantee rate based on this model was calculated.Capacity needs to guide university network ex-pansion and planning.

    Asymptotic quadratic price game mechanism for video stream extensible feedback unloading
    Qianqian GE
    2020, 36(1):  109-118.  doi:10.11959/j.issn.1000-0801.2020022
    Asbtract ( 146 )   HTML ( 3)   PDF (844KB) ( 170 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A progressive quadratic price game mechanism with scalable feedback offloading of video streams was proposed.Firstly,the congestion of cellular network could be alleviated by effectively uninstalling some video traffic from all video streaming services to Wi-Fi network,thus providing seamless video streaming services.Several physi-cal paths were integrated in an economical and efficient way.The fountain coded symbols of compressed video data were transmitted simultaneously through LTE and Wi-Fi network to flexibly control the viewing through Wi-Fi net-work and reduce the video quality degradation caused by wireless channel errors.Secondly,a progressive secondary price auction mechanism was used to allocate limited LTE resources to multiple user devices to maximize social wel-fare and achieve Nash equilibrium.The scalability and convergence of the system were verified theoretically.Finally,the performance advantages of the proposed algorithm in video streaming transmission quality and energy consump-tion were verified by experimental simulation.

    A multi-source threat intelligence confidence value evaluation method based on machine learning
    Hansheng LIU,Hongyu TANG,Mingxia BO,Jianfeng NIU,Tianbo LI,Lingxiao LI
    2020, 36(1):  119-126.  doi:10.11959/j.issn.1000-0801.2020010
    Asbtract ( 663 )   HTML ( 89)   PDF (647KB) ( 957 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    During the collection process of multi-source threat intelligence,it is very hard for the intelligence center to make a scientific decision to massive intelligence because the data value density is low,the intelligence repeatabil-ity is high,and the ineffective time is very short,etc.Based on those problems,a new multi-source threat intelligence confidence value evaluation method was put forward based on machine learning.First of all,according to the STIX intelligence standard format,a multi-source intelligence data standardization process was designed.Secondly,ac-cording to the characteristic of data,14 characteristics were extracted from four dimensions of publishing time,source,intelligence content and blacklist matching degree to be the basis of determining the intelligence reliability.After getting the feature encoding,an intelligence confidence value evaluation model was designed based on deep neural network algorithm and Softmax classifier.Backward propagation algorithm was also used to minimize recon-struction error.Last but not least,according to the 2 000 open source marked sample data,k-ford cross-validation method was used to evaluate the model and get an average of 91.37% macro-P rate and 84.89% macro-R rate.It was a good reference for multi-source threat intelligence confidence evaluation.

    Power Informationization Column
    Control research and application of conventional operations without real-time networks
    Zhengfeng ZHANG
    2020, 36(1):  127-133.  doi:10.11959/j.issn.1000-0801.2020019
    Asbtract ( 136 )   HTML ( 8)   PDF (1020KB) ( 313 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    On the basis of researching the timing agreement mechanism and mirror synchronization operation to ob-tain keys under the condition of no network,a logic control method was proposed based on cryptography control,non-real-time virtual communication and computing keys according to agreement,which could be well applied to dynamic authentication and switch operation of intelligent locks or switches without real-time communication net-work coverage.By using the intelligent terminal with the ability of agreed operation,a kind of “control network of cryptography” without real-time communication network was established,which could be used as a useful supple-ment to the IoT technology without communication coverage,as well as a remote object in a fixed location to transfer the right of management or use according to the order of calculation.By using the computing power of the terminal instead of the communication power of the remote end,without the need to build a backstage communication network and the communication expenses during the waiting period.

    Multi-source data security protection of smart grid based on combination key
    Jian GAO,Wenbin CHEN,Jianmin PANG,Huadong YU,Guorui SONG
    2020, 36(1):  134-138.  doi:10.11959/j.issn.1000-0801.2020002
    Asbtract ( 167 )   HTML ( 7)   PDF (640KB) ( 593 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As an important infrastructure of power system,power communication network has deployed a large number of widely distributed business terminals and communication terminals,whose data security is related to the safe and stable operation of the entire power network.In order to avoid the situation that the information cannot be safely exchanged due to the shortage of keys.The sharding and combination technology based on keys was proposed to realize the expansion of limited keys,so as to solve the problem of a large number of keys needed for multi-node and mul-ti-service.Firstly,a sharding scheme was obtained according to different conditions.A key was divided into several dif-ferent sub-key pieces,and then a new key was generated by combining these key pieces and distributed to different ter-minals in the system.A large number of combined keys generated were conducive to update key ,which could ensure the data service “one at a time” and effectively enhance the communication system's ability to resist damage and invasion.Through analysis and calculation,the effectiveness of this method in realizing real-time update of a large number of ter-minal business keys with limited keys was further verified,and data secure communication was realized.

    Financial digital transformation practice of power enterprises based on RPA
    Wenju QUAN
    2020, 36(1):  139-143.  doi:10.11959/j.issn.1000-0801.2020017
    Asbtract ( 259 )   HTML ( 15)   PDF (651KB) ( 720 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the era of big data,characterized as an important part of the field of artificial intelligence application,RPA technology can free financial personnel from large number of repetitive tasks and help them to invest more energy into high value-added work such as analysis and decision-making.By introducing RPA,power enterprises could improve the efficiency of financial process as well as the accuracy of financial data.RPA would also provide management and economic benefits to power enterprises through standardizing business processes.Therefore,it is important to explore the role of RPA technology in financial digital transformation through the practical case.Mean-while,it is necessary for managers to realize and control the risk caused by RPA.

    Prediction of power grid fault repair time based on multi-model fusion
    Jianyue PAN,Yizhen WU,Hanlin XU
    2020, 36(1):  144-150.  doi:10.11959/j.issn.1000-0801.2020016
    Asbtract ( 170 )   HTML ( 11)   PDF (911KB) ( 348 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    There are many types of power grid faults,and the reasons are complicated.The prediction of fault repair time is difficult.Due to the rise of new technologies such as deep learning,it is feasible to accurately mine the faulty worksheet and accurately predict the fault repair time.Taking the historical grid fault repair worksheet as the research object,the multi-model fusion prediction method was proposed,and the prediction results of LightGBM,XGBoost and LSTM were weighted and fused.The experimental results show that the multi-model fusion prediction method can accurately estimate the fault repair time and provide better support for the automation and intelligence of grid fault repair.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: