Please wait a minute...

Current Issue

    15 October 2017, Volume 33 Issue 10
    research and development
    A novel fast tag number estimation algorithm
    Yinghua CUI
    2017, 33(10):  1-147.  doi:10.11959/j.issn.1000-0801.2017273
    Asbtract ( 289 )   HTML ( 1)   PDF (980KB) ( 752 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Tag number estimation is one of the key technologies in radio frequency identification (RFID) system.The conventional estimation algorithms usually interrogate all time slots before estimating the tag quantity,which lead to large payload and time consumption.A rapid estimation algorithm was proposed.By judging the collision of the first 4 slots in each frame,the Q parameter values could be adjusted quickly,and then the number of tag estimates could be obtained by querying a small number of slots.Simulation results show that compared with the traditional tag estimation algorithm,the proposed algorithm has the advantages of fast estimation speed and small estimation error,and is very suitable for fast estimation.

    Topic:Internet of things technology and application
    A trusted IoT architecture model
    Ansheng YIN,Shijun ZHANG
    2017, 33(10):  10-18.  doi:10.11959/j.issn.1000-0801.2017270
    Asbtract ( 383 )   HTML ( 8)   PDF (927KB) ( 497 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.

    A framework of trusted services management based on blockchain in social internet of things
    Minghui ZHAO,Lu ZHANG,Jin QI
    2017, 33(10):  19-25.  doi:10.11959/j.issn.1000-0801.2017274
    Asbtract ( 972 )   HTML ( 50)   PDF (785KB) ( 1227 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To cope with current problems of trusted services management in social internet of things (SIoT),such as high degree of centralization,non-transparent transactions,vulnerability and so on,a framework of trusted services management based on blockchain in SIoT was proposed.This framework established the trusted relationship between service requesters and service providers directly by using decentralization of blockchain,then it produced and managed new transactions through smart contracts to realize transparency and reduce the cost of management.At the same time,the consensus mechanism of blockchain could be used for verifying transactions and preventing malicious attacks in order to reduce network attacks and malicious node spoofing.Finally,the main challenges which the framework would face in actual constructions were analyzed.

    An optimal energy-efficient resource allocation algorithm in ultra-dense network
    Yueyue ZHANG,Weiwei XIA,Yaping ZHU,Feng YAN,Xuzhou ZUO,Lianfeng SHEN
    2017, 33(10):  26-33.  doi:10.11959/j.issn.1000-0801.2017282
    Asbtract ( 482 )   HTML ( 2)   PDF (928KB) ( 564 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The energy-efficient resource allocation problem was taken in an ultra-dense network(UDN) consisted of multiple femtocells.Aiming at maximizing the energy efficiency (EE) of the whole network,quality of service (QoS) constraint and interference limitation was considered.Then,the established nonconvex and nonlinear problem was relaxed relying on Cauchy inequality,and was developed into a non-cooperative game.Additionally,a distributed EE maximization algorithm was proposed satisfying the max-min fairness (MMF) criterion.Simulation results show that the proposed algorithm outperformances the existing algorithms in terms of the EE and the throughput.

    Green energy management in internet of things based on quality of service composition
    Chong GUO,Wenqing YAN,Bin XU
    2017, 33(10):  34-42.  doi:10.11959/j.issn.1000-0801.2017268
    Asbtract ( 302 )   HTML ( 0)   PDF (1272KB) ( 607 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of internet of things technology,the energy consumption of service composition in the internet of things is a key issue to be studied.The service composition problem in the internet of things mostly focuses on the evaluation based on quality of service(QoS) at present and ignores the overall enerqy cornsumption during the dynamic deployment of service qrnposition.Therefore,a QoS evaluation model and an energy evaluation model was proposed for service composition in the internet of things.Finally,considering the service composition in the internet of things is NP hard,the moth-flame optimization (MFO) was successfully applied to the QoS evaluation model and the energy evaluation model.The experimental results show that MFO has a better optimization effect in the above model,so as to realize the green energy management of the quality of service composition in the environment of the internet of things.

    Biometric monitoring system based on K-means &MTLS-SVM algorithm
    Jingming XIA,Lingling TANG,Ling TAN,Han ZHENG
    2017, 33(10):  43-49.  doi:10.11959/j.issn.1000-0801.2017286
    Asbtract ( 384 )   HTML ( 2)   PDF (1007KB) ( 669 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In a nonmedical biometric monitoring system,the monitoring parameters are preceded with machine learning for precision promotion of diagnosis and prediction.Considering the problems of insufficient information mining and low prediction accuracy in multi task time series,both supervised and unsupervised machine learning techniques were applied to predict the physical condition of the remote health care.These techniques were K-means for clustering the similar group of data and MTLS-SVM model for training and testing historical data to perform a trend prediction.In order to evaluate the effectiveness of the method,the proposed method was compared with MTLS-SVM method.The experimental results show that the proposed method has higher prediction accuracy.

    research and development
    Multi-power cognitive access strategy based on multiple primary user traffic
    Xiaoyu LI,Shouyi YANG,Xiaojuan ZHAO,Ruizhe ZHANG
    2017, 33(10):  50-57.  doi:10.11959/j.issn.1000-0801.2017281
    Asbtract ( 254 )   HTML ( 1)   PDF (862KB) ( 404 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In most of the cognitive radio (CR) network scenarios,there are multiple primary users (PU) with intense traffic.A novel multi-PU multi-state CR access mechanism and the corresponding multi-power access strategy based on the primary user traffic were proposed to address this problem.The method enabled the secondary user (SU) to access the optimal channel and adopt an appropriate power to transmit data,which could maximize the throughput of the CR system.Numerical simulation results show that the proposed method can enable the SU to take advantage of the information and resource of the multi-PU.The method not only minimizes the interference to the primary user,but also improves the achievable throughput of the CR system.

    Anti-interference algorithm of wireless channel for IoT communication
    Ling TAN,Yong ZHUANG
    2017, 33(10):  58-64.  doi:10.11959/j.issn.1000-0801.2017283
    Asbtract ( 317 )   HTML ( 6)   PDF (807KB) ( 592 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In IoT communication,the anti-interference of wireless channel is influenced by various factors.Multi-antenna system has significant effect for promoting anti-interference of channel,whose complexity and performance in signal detection need further improvement.The QR decomposition detection algorithm in signal detection of multi-antenna system has low computational complexity,but the algorithm performance is poor.In order to improve the performance of QR decomposition detection algorithm,a QR decomposition algorithm based on ML criterion and decision candidate mechanism was proposed,and the performance of the algorithm was analyzed.The ML criterion was used to estimate the initial level of the detection,and a reliable decision was adopted in the other detection layer.Candidate points were introduced in unreliable case and the optimal candidate were selected from the feedback.The algorithm could significantly improve the system interference,and propagation error were greatly reduced in the decision feedback.The experimental results show that the proposed algorithm can improve the performance of the IoT system effectively with certain complexity.

    Performance evaluation of capacity and coverage in UAV communication networks
    Zijian HE,Yuan AI,Shi YAN,Mugen PENG
    2017, 33(10):  65-70.  doi:10.11959/j.issn.1000-0801.2017285
    Asbtract ( 944 )   HTML ( 64)   PDF (884KB) ( 1603 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Unmanned aerial vehicle(UAV) equipped with communication equipment,as air base stations,can enhance the coverage and capacity of the communication network effectively,due to the characteristics of flexible and rapid deployment.Compared with the traditional mobile communication network,not only the deployment density,but also the flight height of UAV has an influence on the performance of UAV communication networks.The influence of the parameters of UAV communication networks on capacity and coverage was studied.Through the system level simulation,with the increase of UAV deployment density,the capacity and coverage of the UAV communication network have been significantly improved.With the increase of UAV flying height,the capacity of the network shows a trend of increasing firstly and then decreasing.

    Data security for internet plus in public cloud
    Yongjian WANG,Aibo SONG,Yawei YE,Haibo JIANG
    2017, 33(10):  71-80.  doi:10.11959/j.issn.1000-0801.2017241
    Asbtract ( 354 )   HTML ( 5)   PDF (939KB) ( 981 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    “Internet plus” has given birth to many new economic forms and business models,the public cloud faces a serious security challenges.The security of public cloud data was studied and the research ideas were put forward.Firstly,the concept of homomorphic encryption,the characteristics of additive homomorphic encryption and multiplicative homomorphic encryption,and the current research results and difficult problems to be solved were analyzed.Then,based on the multiplicative homomorphic encryption algorithm,hash table and similarity theory,a data security protection scheme was proposed,and the concrete realization process was described.The similarity and completeness of the encrypted data in the public cloud were tested by Euclidean distance.Finally,the correctness and security of the scheme were analyzed by theory.The simulation results verify the feasibility and validity of the scheme.

    Performance of FTH-PPM multiple access technology in 60 GHz wireless communication system
    Chen SHEN,Xuehua LI
    2017, 33(10):  81-89.  doi:10.11959/j.issn.1000-0801.2017233
    Asbtract ( 391 )   HTML ( 1)   PDF (1035KB) ( 438 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of multiple access interference in 60 GHz pulse wireless communication system,the performance of system based on FTH-PPM multiple access scheme was studied.Under the IEEE 802.15.3.c channel model,the relationship between the bit error rate performance of the system and the number of frequency hopping codes,the signal to noise ratio and the number of users were analyzed.The characteristics of FTH-PPM multiple access modulation system were studied and compared with TH-PPM and TH-PAM schemes.The simulation results show that the system can meet the required bit error rate by changing the signal to noise ratio,the number of hops and the number of users.At the same time,the BER performance of FTH-PPM is better than that of TH-PAM and TH-PPM.The system can select the appropriate multiple access modulation mode according to the value of the pulse duty cycle.The research will provide technical reference for the application of 60 GHz pulse wireless communication.

    Virtual machine placement algorithm based on cuckoo search
    Donghan JIANG,Haitao LIN
    2017, 33(10):  90-98.  doi:10.11959/j.issn.1000-0801.2017215
    Asbtract ( 328 )   HTML ( 3)   PDF (1044KB) ( 674 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A cuckoo search algorithm was introduced for virtual machine placement.Firstly,the virtual machine placement program was mapped to the nest,and according to the level,the fitness would be divided into top and bottom nest.Secondly,the bottom nest and the top nest were disturbed by the disturbance function.Finally,by selecting,iterations got the best placement scheme.The algorithm was used for physical integration of cloud data centers,minimizing the number of physical machines placed.The algorithm is simulated by Cloudsim and the results show that the proposed method not only avoids the local optimum,but also has higher performance advantages than the reordered grouping genetic algorithm,the group genetic algorithm,the improved least load algorithm and the improved first fit decrease algorithm.

    A hybrid indoor localization algorithm based on RSSI and inertial navigation
    Yaping ZHU,Weiwei XIA,Yueyue ZHANG,Feng YAN,Xuzhou ZUO,Lianfeng SHEN
    2017, 33(10):  99-106.  doi:10.11959/j.issn.1000-0801.2017284
    Asbtract ( 625 )   HTML ( 13)   PDF (1008KB) ( 1153 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To cater for the requirements of high-precision indoor localization algorithms,a hybrid indoor localization algorithm based on received signal strength identification (RSSI) and inertial navigation was proposed.This algorithm used fingerprint identification algorithm to localize the agents,based on the RSSI values of ZigBee nodes in wireless sensor network.The algorithm combined the inertial information provided by inertial measurement units (IMU),to correct the RSSI localization results.This algorithm used Kalman filter and adopted state equations to describe the dynamic change rules of agents’ positions,thus it achieved a hybrid localization algorithm which relied WSN localization first and IMU last.Simulations evaluate that the proposed algorithm can improve the localization performances of algorithms which adopt RSSI localization and inertial navigation individually,and can greatly improve localization accuracy.

    A cooperative multicast efficient resource allocation scheme based on limited feedback
    Lei CHEN
    2017, 33(10):  107-114.  doi:10.11959/j.issn.1000-0801.2017252
    Asbtract ( 269 )   HTML ( 0)   PDF (900KB) ( 611 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A joint subcarrier and power allocation scheme based on limited feedback for cooperative multicast network was proposed to minimize the consumed power under constrain of QoS requirement.The new scheme worked in two steps.Firstly,subcarriers were distributed to different multicast groups with equal rate assumption according to limited feedback information,where fair subcarrier allocation scheme was used to achieve a tradeoff between power and fairness.Then,a cooperative power iterative scheme was adopted to allocate power effectively,where target rate on each subcarrier was computed by water-filling algorithm in the first place and then a power iterate process was implemented to optimize power allocation.Simulation and comparison results show that the new scheme significantly reduces uplink feedback overhear and the required power and the multicast service outage of cooperative scheme is much less than those of the direct scheme.Besides,cooperative power iterative scheme has lower computational complexity and therefore is suitable for practical system.

    Individual encounter prediction based on mobile internet record data
    Qian LI,Hao JIANG,Jintao YANG
    2017, 33(10):  115-123.  doi:10.11959/j.issn.1000-0801.2017249
    Asbtract ( 305 )   HTML ( 1)   PDF (861KB) ( 642 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Studies on human movement behavior have drawn much attention with the availability of unprecedented amount of records with high accuracy involving individuals’ trajectories.The encounter prediction problem based on the session data generated by users’ mobile terminal was studied when users accessed the internet for data usage.Firstly,the network based on the encounter relations between users was constructed.Secondly,the network topology features were analyzed and user mobility characteristics and user internet behavior characteristics were introduced.Finally,the prediction model based on random forest was applied.The experimental results show that compared with the traditional network topology features,the prediction performance can be significantly improved by introducing the user mobility characteristics and user internet behavior characteristics.

    Rate distortion optimization based on saliency characteristic for HEVC intra coding
    Jinlong LI,Fen CHEN,Zongju PENG,Gangyi JIANG,Mei YU
    2017, 33(10):  124-133.  doi:10.11959/j.issn.1000-0801.2017250
    Asbtract ( 435 )   HTML ( 8)   PDF (2276KB) ( 794 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Although the perception based rate distortion optimization (RDO) and coding algorithms can improve subjective quality,they significantly decrease rate distortion performance.For the above questions,a saliency-based RDO method was proposed.Firstly,according to the relation between rate distribution and saliency features of coding tree unit in HEVC,a priori saliency-rate model was designed.Furthermore,the initial parameters of the model were determined.Secondly,the rate difference minimization rate distortion model was proposed,and then a calculation method of the adaptive Lagrangian multiplier was derived from the model.Finally,update mechanism of model parameters was designed.Experimental results show that the proposed algorithm can improve the subjective quality while it maintains rate distortion performance.

    A method of micro-blog topic discovery based on feature words selection and text similarity
    Hongyang CHEN,Linlin WANG,Yingsheng CHEN,Jiangkun LU,Xue ZUO
    2017, 33(10):  134-140.  doi:10.11959/j.issn.1000-0801.2017258
    Asbtract ( 326 )   HTML ( 6)   PDF (997KB) ( 625 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Some words existing in micro-blog short text have a bad effect on the accuracy of text similarity calculation,further affecting the quality of topic discovery.And these words are the same in shape or semantic meaning,but remote from the topic.A novel method of feature words selection based on micro-blog short text content and structured information was proposed,which could effectively choose some important feature words from the text.Moreover,in computing the similarity between texts,an improvement on computing the similarity between the text and the topic was made.Finally,the methods were combined together and applied to discover micro-blog topics.Experimental results show that the new method of topic discovery can effectively reduce the average missing rate and false detection rate,and improve the quality of topic discovery.

    Analysis of operation environment influence of 1.8 GHz TDD-LTE industry private network
    Tao DU,Xiaohui DENG,Gang LI
    2017, 33(10):  148-154.  doi:10.11959/j.issn.1000-0801.2017288
    Asbtract ( 778 )   HTML ( 24)   PDF (774KB) ( 673 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to current spectrum regulation,band 1 785~1 805 MHz is the only authorized wireless broadband spectrum.For most industry private network bearer business is directly related to safety production,it is necessary to analyze the running environment of the wireless spectrum operation.According to the planning of the 3GPP band and Band3 FDD-LTE band adjacent,it is necessary to analyze whether the Band3 frequency band interferes with the 1.8 GHz TDD-LTE private network.Based on the relevant frequency policies and model approval issued by the current state,the interference between the base stations was analyzed and suggestions for the relevant model approval documents were made.

    The meeting were
    A review of the European Conference on Optical Communication in 2017
    Bingbing WU,Bingyan YU,Jian WU,Jintong LIN
    2017, 33(10):  155-162.  doi:10.11959/j.issn.1000-0801.2017294
    Asbtract ( 602 )   HTML ( 1)   PDF (1124KB) ( 718 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The summary of the 43rd European Conference on Optical Communication (ECOC) was introduced,and plenary presentations,workshops,tutorials,invited papers,post-deadline papers,as well as exhibition were discussed.The conference includes eight technical scopes:fibers,fiber devices and fiber amplifiers,integrated optoelectronic devices and optical processors,digital techniques for optical communication systems,transmission subsystems and optical network elements,datacom and computercom hardware,point-to-point transmission links,core,metro,and data center networks,access,local area and indoor networks.

    Column:smart home
    Constrction of data driven-centric smart home intelligent operating system
    Zheng WEI,Weijia SHI,Zhengkai ZHANG
    2017, 33(10):  163-169.  doi:10.11959/j.issn.1000-0801.2017290
    Asbtract ( 341 )   HTML ( 14)   PDF (964KB) ( 865 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    From the background of the second half of the internet era,when constructing the smart home intelligent operating system,data-driven should be the foundation,and data evaluation should be the means.By using accurate and efficient data collection methods,the smart home intelligent operating system which adapted the development of future 5G,internet of things and artificial intelligence and other technology was built.Firstly,the characteristics and trends of the smart home business was introduced,and then the opinion of data was the foundation of smart home operation was explained.Finally,the future of data and smart home operation was introduced.

    Key technologies of smart home network based on G.hn
    Dongdi XIAO,Wenda YING,Tao GUO
    2017, 33(10):  170-176.  doi:10.11959/j.issn.1000-0801.2017289
    Asbtract ( 732 )   HTML ( 15)   PDF (900KB) ( 790 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the future smart home,intelligent network high-speed home networking become the trend.Based on this,firstly the modulation and bandwidth of G.hn protocol and the current frequency coaxial cable usage were analyzed.Then the key technology of the G.hn spread spectrum technology was studied.Finally the key points and direction of spread spectrum technology were put forward.

    Key technique of dynamic interface rendering based on device control of smart home App
    Tao GUO,Jianting HAN,Xiaoling YANG
    2017, 33(10):  177-184.  doi:10.11959/j.issn.1000-0801.2017293
    Asbtract ( 327 )   HTML ( 7)   PDF (881KB) ( 607 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The dynamic interface rendering technology of smart home App was analyzed,and a dynamic interface rendering method based on SWE (smart widget engine) was proposed.Based on an actual case,a smart home App was developed to verify SWE.It shows the method of SWE is a useful exploration for optimization of dynamic interface rendering technology.

    A business realization of VR panoramic video in smart home
    Chuanfei LUO,Dehui KONG,Xiangkai LIU,Ke XU,Hao YANG
    2017, 33(10):  185-193.  doi:10.11959/j.issn.1000-0801.2017291
    Asbtract ( 438 )   HTML ( 8)   PDF (1800KB) ( 875 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a new video format,panoramic video has greatly changed the way people watch videos,and can enhance the user experience of the smart home in the video field.Good decoding ability and excellent network support advantages held by IPTV play an active role in the application and promotion of panoramic video.Combined with virtual reality technology,the main characteristics of panoramic video was analyzed.Further more,an IPTV-based service realization scheme was presented in virtue of four key technologies including FOV view adaptive framework,MCTS encoding and multi-resolution,multiple tile video distribution formula and partially decoded tile technique with viewport change in terminal.

    Software and hardware implementation of smart hands-free set-top box
    Weijia SHI,Lin WANG,Liding JIA
    2017, 33(10):  194-200.  doi:10.11959/j.issn.1000-0801.2017292
    Asbtract ( 429 )   HTML ( 6)   PDF (1095KB) ( 747 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the background of the development of voice interactive technology,smart speaker becomes a smart home control center,which products in the provision of content entertainment,life services at the same time,and more access to family life scenes.From the smart home under the latest business needs,the increased functional requirements to meet the new business requirements and the requirements of the smart hands-free set-top box were detailed analyzed,the hardware and software implementation scheme of the smart hands-free set-top box to satisfy the new business function was put forward.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: