Please wait a minute...

Current Issue

    20 June 2020, Volume 36 Issue 6
    Viewpoint Focus
    Analysis of LEO satellite communication and suggestions for its development strategy in China
    Shanzhi CHEN
    2020, 36(6):  1-13.  doi:10.11959/j.issn.1000-0801.2020181
    Asbtract ( 2242 )   HTML ( 318)   PDF (1114KB) ( 3104 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The review on the development in 5G and LEO satellite communications was given on multi aspects.The role of LEO satellite communication in 5G was positioned as a complement,not yet as the main role.The proposals were thus given based on the analysis of the application requirements,technologies and the industrial level regarding to the LEO satellite communication R&D in China.Suggestions for the development of LEO satellite communication in China as:“compatible with 5G,integrated within 6G” were put forward.The development process could be divided into two steps.In the first step,the current LEO satellite communication system could be developed mostly based on the 5G technologies and compatibility,the maximumly reuse of 5G key technologies,the cost reduction from the scale economy effect of 5G,and finally the LEO advantages achieved from the differentiation between 5G and LEO.In the second step,the terrestrial mobile communication and the high,medium and low orbit satellite communications would be harmony integrated in 6G.The final suggestions were of two efforts and two cooperations:encouraging application and getting more frequency resources and satellite orbit resources,the international cooperation and the domestic cooperation,to accelerate the industrial maturity and to achieve commercial success.

    Topic: Intelligent Edge Computing
    Future vehicular fog computing networks
    Ning HUI,Jie WU,Yiqing ZHOU,Ling LIU,Zhengang PAN
    2020, 36(6):  14-27.  doi:10.11959/j.issn.1000-0801.2020175
    Asbtract ( 495 )   HTML ( 51)   PDF (1024KB) ( 919 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Facing the requirements of secure and reliable vehicle driving,internet of vehicles requires high real-time information transmission and processing,high data storage and security using capacity,and high flexibility and inclusiveness of network architecture.The future vehicular fog computing network can reduce the data transmission and processing delay based on the characteristics of fog computing deployed at the edge of the network,can ensure data security based on the characteristics of fog computing black box operation,and can make heterogeneous facilities connect with other devices and make sure resource sharing between vehicle nodes based on the fog computing distributed architecture.The future vehicular fog computing networks were reviewed,the architecture,challenges,and key technologies of vehicle fog computing were introduced,the communication and computing resource sharing and task collaboration in the mobile state,vehicle fog computing security,and vehicle fog computing heterogeneity of facilities were focused on .Finally,a three-level management and control architecture for vehicular fog computing networks were proposed to promote the development of internet of vehicles to on-networking collaborative decision-making and control.

    Key technologies in collaborative network based on MEC
    Xiaoting MA,Junhui ZHAO,Xiaoke SUN,Yi GONG
    2020, 36(6):  28-37.  doi:10.11959/j.issn.1000-0801.2020173
    Asbtract ( 489 )   HTML ( 72)   PDF (1233KB) ( 1308 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the performance degration problem of low latency and high reliability caused by the high-speed mobility of vehicles,the key technologies of collaborative network based on MEC (mobile edge computing) were studied.Starting from the uniqueness of MEC in vehicular networks,the collaborative networking scheme with low latency and high reliability was introduced.According to the two most promising cooperative scenarios of vehicle platooning and UAV (unmanned aerial vehicle) assisted communication in 5G vehicular networks,the key technologies of cooperative resource management based on MEC were investigated.In addition,the research direction analysis of resource management based on MEC in vehicular networks provides a reference for further study.

    Research and prospect of 5G edge computing sharing
    Lingbin MENG,Juan LI,Nan XUE,Yong ZOU
    2020, 36(6):  38-44.  doi:10.11959/j.issn.1000-0801.2020171
    Asbtract ( 449 )   HTML ( 54)   PDF (896KB) ( 975 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The three application scenarios of 5G make forward higher requirements for network delay,bandwidth,connection and security,which drive 5G to sink the core capabilities of network,computing,storage and application to the edge of the network.The 5G base station which is closer to the terminal/user and has complete resources such as base station power,operation and maintenance will be the best choice for 5G edge computing deployment.Based on the multi-point 5G base station site resource and the architecture of edge computing deployment,the feasibility of multi-operator 5G edge computing shared deployment was studied,three feasible co-building and sharing schemes,such as base station infrastructure sharing,IaaS facility sharing and PaaS platform sharing were proposed.By coordinating the development needs of 5G edge computing and realizing the co-construction and sharing of edge computing,the construction cost and operation cost of edge computing can be greatly reduced,and the rapid scale development of edge computing can be realized,to build an intensive and efficient,economic and applicable,intelligent green,safe and reliable edge computing system.

    Research and application of V2X based on MEC
    Jiahui QIU,Zhichao ZHOU,Xiaobo LIN,Yu XIAO,Chao CAI,Liu LIU
    2020, 36(6):  45-55.  doi:10.11959/j.issn.1000-0801.2020179
    Asbtract ( 763 )   HTML ( 94)   PDF (1374KB) ( 1913 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The large-scale construction of 5G wireless communication network enhances the development of C-V2X (cellular-vehicle to everything) towards diversified directions.Large bandwidth services,such as high-definition video and AR/VR,bring great transmission and processing pressure to the classical network architecture.Meanwhile,traffic safety services characterized by ultra-high reliability and low delay put stringent requirements on network performance.The network architecture of providing services and computing localization through setting user panel down to close to the terminals and MEC (multiple access edge computing) can meet the requirements of data short loop transmission and ultra-low delay in the internet of vehicles scenario.The combination of MEC and V2X was explored in depth,the MEC networking scenario,MEC network architecture and the key technologies and challenges of MEC were analyzed.The combination scheme of MEC and C-V2X integration of network planning was provided.The application of MEC in C-V2X was presented in several specific scenarios.

    Trusted edge computing for smart healthcare
    Shaoliang PENG,Liang BAI,Li WANG,Minxia CHENG,Shulin WANG
    2020, 36(6):  56-63.  doi:10.11959/j.issn.1000-0801.2020174
    Asbtract ( 430 )   HTML ( 49)   PDF (814KB) ( 692 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of internet of things technology,in order to better develop modern medicine,avoid the “isolated” crisis of information,and meet the requirements of timeliness and computing performance of massive data generated by edge devices,it is a new trend of the times to combine edge computing with smart healthcare treatment.However,edge computing has a certain degree of openness,and it is prone to potential safety hazards.Therefore,people pay more and more attention to the security and privacy protection of edge computing system for smart healthcare treatment.The edge computing system and its architecture for smart healthcare were introduced,and the security risks encountered by smart healthcare in edge computing was explained,and some scholars’ solutions to the security risks were introduced.Finally,a security framework,and specific solutions for security and privacy protection under the framework were put forward,which providing some help for the trusted research of smart healthcare edge computing.

    System and application of video surrveillance based on edge computing
    Sanming PAN,Mingqiang YUAN
    2020, 36(6):  64-69.  doi:10.11959/j.issn.1000-0801.2020177
    Asbtract ( 403 )   HTML ( 66)   PDF (1136KB) ( 1165 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the popularization of video surveillance systems and the diversification of their applications,traditional data processing methods using cloud computing to handle all the computations are more and more unsustainable.Edge computing pre-processes video data nearby,and performs well in terms of bandwidth,storage,and latency,but edge-cloud collaboration is still required to improve overall performance.The architecture of edge-cloud collaborative video surveillance system was proposed,then an open edge node design scheme and algorithm training and inferencing ideas were proposed.Finally,taking forest fire prevention and smart poles & towers as examples,the application realization and value of edge computing in video surveillance services were illustrated.

    Research on safety supervision data sharing of railway construction projects based on edge computing
    Liang YANG,Chunhui PIAO,Yuhong LIU,Meimei JI
    2020, 36(6):  70-78.  doi:10.11959/j.issn.1000-0801.2020172
    Asbtract ( 190 )   HTML ( 16)   PDF (767KB) ( 316 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Information security monitoring system is widely used in railway construction projects,but the existing safety supervision model has problems such as high server load,heavy network bandwidth pressure,monitoring data can’t be effectively shared,key monitoring data may be tampered,and security accident responsibility is difficult to determine.A credible sharing model of safety supervision data for railway construction projects based on edge computing was proposed.On one hand,the construction of a safety monitoring edge computing framework for construction projects was constructed,and the data processing flow of edge nodes was described; on the other hand,a trusted data sharing framework based on blockchain was established,and a safety supervision data sharing process was designed and trusted sharing data was implemented through smart contracts.The proposed solution combined with edge computing and blockchain technology,which not only could strengthen the safety supervision of railway construction projects by industry authorities,but also provide new opportunities for stakeholders to share safety monitoring data in real time.

    Research and Development
    A game theory-assisted machine learning methodology for subscriber churn behaviors detection
    Ye OUYANG,Aidong YANG,Fanyu MENG
    2020, 36(6):  79-89.  doi:10.11959/j.issn.1000-0801.2020164
    Asbtract ( 390 )   HTML ( 37)   PDF (1083KB) ( 528 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    At the end of November 2019,China officially implemented the number portability policy (MNP) that has been in trial for 9 years.The policy will strengthen the liquidity and competitiveness of the telecommunication market,making the problem of subscriber churn more prominent.A game theory-assisted machine learning methodology was proposed,verified and commercialized timely,which could help mobile network operator (MNO) actively respond to competition in the MNP market.The proposed methodology provides MNO with a machine learning model to detect subscriber portability and give differentiated treatment.Experimental results show that the proposed methodology can guide MNOs to make a targeted MNP strategy,and precisely identify “abnormal” subscribers who tend to churn-out and potential new subscribers who may churn-in.In addition,the proposed methodology has been successfully commercialized,greatly improving the marketing efficiency of operators,increasing user satisfaction,and reducing the loss of users by about 50% for a tier-1 MNO in China.

    Energy efficiency joint optimization algorithm for low-precision ADC massive MIMO systems
    Haiyan CAO,Wenjuan HU,Yingjuan ZHI,Fangmin XU,Xin FANG
    2020, 36(6):  90-96.  doi:10.11959/j.issn.1000-0801.2020167
    Asbtract ( 157 )   HTML ( 6)   PDF (850KB) ( 328 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An uplink energy efficiency optimization algorithm based on alternating optimization algorithm was proposed for large-scale multiple-input multiple-output (MIMO) systems with low-precision analog to digital converters (ADC).That is,based on the maximum ratio combining (MRC) reception,an optimization model aiming at maximizing energy efficiency was established,and then the original fractional form optimization problem was converted into an equivalent subtractive form according to the nature of the fractional programming.In the case where the number of quantization bits was constant,the iterative optimization of the transmission power and the pilot length were performed.Simulation results show that the proposed algorithm has better spectral efficiency and energy efficiency.

    5G millimeter wave cell search algorithm with beam sweeping
    Min SHEN,Jing LIANG,Jiazhi HOU
    2020, 36(6):  97-106.  doi:10.11959/j.issn.1000-0801.2020157
    Asbtract ( 277 )   HTML ( 13)   PDF (1038KB) ( 494 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the high carrier frequency of the 5G millimeter wave,a large initial access frequency may cause inaccurate time-frequency synchronization at the transmitting and receiving ends and incorrect detection of the physical layer cell identifier.A cell search scheme for 5G millimeter waves to send synchronization signals in a beam sweeping mode at high frequencies was analyzed and simulated.Specifically,a multi-directional synchronization signal block sent by a DFT codebook at the base station side was proposed.The terminal used an omnidirectional antenna to receive multi-beam signals and used a series of synchronization algorithms to complete time,frequency synchronization,and physical layer cell identification.Simulation results show that the proposed main synchronization signal detection algorithm with cross-correlation of pre-stored integer frequency offset and received signal has good cell search performance on 5G millimeter-wave channels.

    Dynamic social network active influence maximization algorithm based on Coulomb force model
    Min LU,Guanglu CHEN,Xiaohui YANG,Chunlan HUANG,Guangxue YUE
    2020, 36(6):  107-118.  doi:10.11959/j.issn.1000-0801.2020162
    Asbtract ( 209 )   HTML ( 4)   PDF (1016KB) ( 181 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The problem of maximizing influence has become an important research content in social networks,and its influence propagation model and solving algorithm are the key core issues.In order to improve the accuracy of predicting the propagation results,the dynamic change of the number of activated nodes and the trust relationship between the nodes during the propagation process were introduced to improve the IC model.Combining the similarity between social influence and Coulomb force,a dynamic based on trust relationship was proposed,a dynamic social coulomb forces based on trust relationships (DSC-TR) model was proposed,and an optimized random greedy (RG-DPIM) algorithm was constructed to solve the problem of maximum impact.Simulation results show that the prediction accuracy of the DSC-TR model is obviously better than that of SC-B and IC models.The performance of RG-DPIM algorithm is obviously better than that of G-DPIM,IPA and TDIA algorithms.

    Polar codes decoding algorithm based on convolutional neural network
    Rui GUO,Fanchun RAN
    2020, 36(6):  119-124.  doi:10.11959/j.issn.1000-0801.2020130
    Asbtract ( 328 )   HTML ( 17)   PDF (1062KB) ( 402 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem that the existing Polar code decoding algorithm based on neural network can only decode short codewords (codewords length N≤64),a new decoding algorithm using convolution neural network for long codewords (N≥512) was put forward.Instead of using a fixed drawn from the data sample proportion as training set and test set,the neural network parameters epoch and batch were used to control the neural network input,and the data explosion problem caused by the long codewords was solved.In addition,the influence of batch and epoch parameters on the decoding performance of convolution neural network was explored and the performance difference of neural network using different activation functions were investigated.Simulation results show that with the traditional SCL (successive cancellation list,L=2) decoding algorithm,convolution neural network in low signal-to-noise ratio on the performance is better than that of SCL (L=2),in high signal-to-noise ratio and SCL (L=2) algorithm of similar performance,and the larger the training data set,the better the decoding performance of neural network.

    Method of Webshell detection based on multi-view feature fusion
    Feng LIN,Liujing XU,Xiaohua CHEN,Weiqiang QI,Ke CHEN,Tiantian ZHU
    2020, 36(6):  125-132.  doi:10.11959/j.issn.1000-0801.2020158
    Asbtract ( 358 )   HTML ( 34)   PDF (743KB) ( 364 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Webshell is a malicious script file on the Web.It is usually uploaded by the attacker to the target server to achieve the purpose of illegal access control.In order to overcome the shortcoming of the existing Webshell detection methods,such as single network traffic behavior,simple by passed signature comparison,and easily bypassed signature comparison,a method of Webshell detection based on multi-view feature fusion for PHP Webshell detecting was proposed.Firstly,multiple features including lexical features,syntactic features,and abstract features were extracted.Secondly,fisher score was used to sort and filter all features according to the degree of importance.Finally,a model that can effectively distinguish Webshell from normal scripts was established through SVM.The large-scale experiment in real-world scenario shows that the final accuracy of our model can reach 92.1%.

    Operation Technology
    EU’s strategy and practice of 5G network security
    Feng GUO,Yenan JI,Xiaoy HUANG
    2020, 36(6):  133-137.  doi:10.11959/j.issn.1000-0801.2020176
    Asbtract ( 166 )   HTML ( 12)   PDF (633KB) ( 735 )   Knowledge map   
    References | Related Articles | Metrics

    5G network is expected to become a key infrastructure for future economic and social development.Nowadays,global competition for 5G has been heating up,with leading operators racing to speed up their 5G deployments.The road-map of engineering and technology for the deployment of 5G networks in EU countries were summarized,the route design,influencing factors as well as time steps for the next phase of 5G networks deployment of them were analyzed.Besides,relevant suggestions for the development of China-EU cooperation in the field of 5G were put forward.

    Optimization and application of 5G bearer network backhaul bandwidth estimation model
    Yang YE,Huiting FANG,Dantong NIE
    2020, 36(6):  138-143.  doi:10.11959/j.issn.1000-0801.2020135
    Asbtract ( 170 )   HTML ( 10)   PDF (721KB) ( 233 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the early stage of 5G construction,business requirements are unclear,technology maturity needs to be improved,and traffic growth methods are unpredictable.How to evaluate the capacity of the existing network bearer system according to different construction scenarios and choose a reasonable 5G bearer network construction plan problem.Through theoretical research on the typical configuration of the 5G single base station bearer bandwidth demand assessment method,combined with the engineering experience of 4G network construction,the national sampling survey data was used to demonstrate the huge gap between the theoretical bandwidth estimation model and the actual traffic level.The initial planning and construction of the 5G bearer network was scientifically guided,and an optimized model for the estimation of the 5G bearer network backhaul bandwidth was proposed,and its application in the evolution path of the new 5G bearer network through new scenarios,expansion,and upgrade value was illustrated.

    Service mesh technology evaluation and integration scheme based on telecom operator perspective
    Liyun YAN,Xinzhang YANG,Zhenwei HE,Yuanzhi LIN,Shaoxin HOU
    2020, 36(6):  144-153.  doi:10.11959/j.issn.1000-0801.2020154
    Asbtract ( 245 )   HTML ( 23)   PDF (710KB) ( 650 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Microservice architecture has evolved along with the changes in enterprise software architecture,from the embedded and integrated micro-service architecture to the non-intrusive and decoupled service mesh.The various of micro-service architectures have sprung up.Choose which microservice architecture to integrate has become an important part of the layout of microservices for the telecom operators.The evaluation and integration of service mesh (non-intrusive architecture) technologies based on the operator’s business characteristics was focused on.In the evaluation,choose the open source,mainstream service mesh technologies and cloud service provider’s microservice solutions were compared and analyzed from multiple dimensions,and the development trend of microservice technology and architecture was obtained.The integration category focused on the integration of Istio technology and Kubernetes which were mainstream technologies in their respective fields,and a heterogeneous microservice framework and development ideas that supported complex scenarios was innovatively proposed.Finally,combined with the differentiated needs of operators’ 5G SBA services,the key research and optimization directions of the operator’s service mesh technology were probed.

    Performance emulation and test for 5G massive MIMO base station
    Xiaolong LIU,Guiming WEI,Xiang ZHANG,Yuxin REN,Jiamo JIANG
    2020, 36(6):  154-165.  doi:10.11959/j.issn.1000-0801.2020169
    Asbtract ( 266 )   HTML ( 19)   PDF (952KB) ( 791 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The new radio (NR) of 5G has gathered three main application scenarios and has broken the restrict of the air interface transmission,laying a solid foundation of the information science.Massive MIMO based base station (MMBS) has become the important fulcrum in the implementation deployment of 5G networks.In order to determine performance of the MMBS in sub 6 GHz band,the physical (PHY) layer techniques were firstly introduced,then,for providing a benchmark of the MMBS products,the evaluation method for upbound of the PHY performance and the PHY performance under the fast fading channel environment was given.Based on that,the current mainstream MMBS performance testing methods were analyzed,and a performance testing scheme was proposed which had been suitable for current commercial version of the MMBS.The proposed scheme can be used to test the function and performance of the products with 5G technique.By the end of 2019,there are many manufacturers of MMBS products have been tested by this solution.

    Analysis of economic prosperity index based on big data of electricity
    Yujiao LIU,Kunhuang SONG,Xiang WANG
    2020, 36(6):  166-171.  doi:10.11959/j.issn.1000-0801.2020059
    Asbtract ( 280 )   HTML ( 30)   PDF (747KB) ( 567 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Prosperity analysis is a statistical analysis method of economic cycle.By using monthly or quarterly data economic statistics sequence,the stage of economic development in periodic fluctuations can be analyzed and judged,which can provide reference for government economic policy decision-making and implementation.Electricity data is the “barometer” of national economy.Based on spatio-temporal electric power data and classical economic prosperity model,X13-ARIMA seasonal adjustment algorithm was firstly introduced in the calculation of electric prosperity index to construct an economic prosperity index based on big data of electric power,which objectively reflected the economic operation status and assists in predicting the economic development trend.The calculation achieves the economic goal from the perspective of electricity and provide reference for government policy making.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: