By Topic

Communications, China

Issue 3 • Date March 2013

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Publication Year: 2013 , Page(s): c1 - c4
    Save to Project icon | PDF file iconPDF (188 KB)  
    Freely Available from IEEE
  • China Unicom [advertisement]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | PDF file iconPDF (838 KB)  
    Freely Available from IEEE
  • Dynamic cloud platform [advertisement]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | PDF file iconPDF (548 KB)  
    Freely Available from IEEE
  • Cloud radio: Deliver 4G promise [advertisement]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | PDF file iconPDF (794 KB)  
    Freely Available from IEEE
  • Making new connections at −20°C [advertisement]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | PDF file iconPDF (1752 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): 1 - 4
    Save to Project icon | PDF file iconPDF (1234 KB)  
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | PDF file iconPDF (114 KB)  
    Freely Available from IEEE
  • Management and visualization of user and network data

    Publication Year: 2013 , Page(s): i - ii
    Save to Project icon | PDF file iconPDF (788 KB)  
    Freely Available from IEEE
  • The discovery of burst topic and its intermittent evolution in our real world

    Publication Year: 2013 , Page(s): 1 - 12
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1265 KB)  

    Nowadays, a considerably large number of documents are available over many online news sites (e.g., CNN and NYT). Therefore, the utilization of these online documents, for example, the discovery of a burst topic and its evolution, is a significant challenge. In this paper, a novel topic model, called intermittent Evolution LDA (iELDA) is proposed. In iELDA, the time-evolving documents are divided into many small epochs. iELDA utilizes the detected global topics as priors to guide the detection of an emerging topic and keep track of its evolution over different epochs. As a natural extension of the traditional Latent Dirichlet Allocation (LDA) and Dynamic Topic Model (DTM), iELDA has an advantage: it can discover the intermittent recurring pattern of a burst topic. We apply iELDA to real-world data from NYT; the results demonstrate that the proposed iELDA can appropriately capture a burst topic and track its intermittent evolution as well as produce a better predictive ability than other related topic models. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ReTweeting analysis and prediction in microblogs: An epidemic inspired approach

    Publication Year: 2013 , Page(s): 13 - 24
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1211 KB)  

    Microblogs currently play an important role in social communication. Hot topics currently being tweeted can quickly become popular within a very short time as a result of retweeting. Gaining an understanding of the retweeting behavior is desirable for a number of tasks such as topic detection, personalized message recommendation, and fake information monitoring and prevention. Interestingly, the propagation of tweets bears some similarity to the spread of infectious diseases. We present a method to model the tweets' spread behavior in microblogs based on the classic Susceptible-Infectious-Susceptible (SIS) epidemic model that was developed in the medical field for the spread of infectious diseases. On the basis of this model, future retweeting trends can be predicted. Our experiments on data obtained from the Chinese micro-blogging website Sina Weibo show that the proposed model has lower predictive error compared to the four commonly used prediction methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aspect-level opinion mining of online customer reviews

    Publication Year: 2013 , Page(s): 25 - 41
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (586 KB)  

    This paper focuses on how to improve aspect-level opinion mining for online customer reviews. We first propose a novel generative topic model, the Joint Aspect/Sentiment (JAS) model, to jointly extract aspects and aspect-dependent sentiment lexicons from online customer reviews. An aspect-dependent sentiment lexicon refers to the aspect-specific opinion words along with their aspect-aware sentiment polarities with respect to a specific aspect. We then apply the extracted aspect-dependent sentiment lexicons to a series of aspect-level opinion mining tasks, including implicit aspect identification, aspect-based extractive opinion summarization, and aspect-level sentiment classification. Experimental results demonstrate the effectiveness of the JAS model in learning aspect- dependent sentiment lexicons and the practical values of the extracted lexicons when applied to these practical tasks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Situation and development tendency of indoor positioning

    Publication Year: 2013 , Page(s): 42 - 55
    Cited by:  Papers (4)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (9211 KB)  

    This paper introduces the significance of indoor positioning and analyzes the related problems. The latest research on indoor positioning is introduced. Further, the positioning accuracy and the cost of typical local and wide area indoor positioning systems are compared. The results of the comparison show that Time & Code Division-Orthogonal Frequency Division Multiplexing (TC-OFDM) is a system that can achieve real-time meter-accuracy of indoor positioning in a wide area. Finally, in this paper, we indicate that the seamless high-accuracy indoor positioning in a wide area is the development trend of indoor positioning. The seamless Location Based Services (LBS) architecture based on a heterogeneous network, key technologies in indoor positioning for decimeter-accuracy and seamless outdoor and indoor Geographic Information System (GIS) are elaborated as the most important research fields of future indoor positioning. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing high volume data for network attack detection using real-time flow filtering

    Publication Year: 2013 , Page(s): 56 - 66
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1018 KB)  

    In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to high volume data feeds that are common in large Tier-1 ISP networks and providing rich, timely information on observed attacks. It is a software solution that is designed to run on off-the-shelf hardware platforms and incorporates a scalable data processing architecture along with lightweight analysis algorithms that make it suitable for deployment in large networks. RTFF also makes use of state of the art machine learning algorithms to construct attack models that can be used to detect as well as predict attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualization framework for inter-domain access control policy integration

    Publication Year: 2013 , Page(s): 67 - 75
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1652 KB)  

    The rapid increase in resource sharing across domains in the cloud computing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Although a number of policy integration and security analysis mechanisms have been developed, few focus on enabling the average administrator by providing an intuitive cognitive sense about the integrated policies, which considerably undermines the usability factor. In this paper we propose a visualization framework for inter-domain access control policy integration, which integrates Role Based Access Control (RBAC) policies on the basis of role-mapping and then visualizes the integrated result. The role mapping algorithm in the framework considers the hybrid role hierarchy. It can not only satisfy the security constraints of non-cyclic inheritance and separation of duty but also make visualization easier. The framework uses role-permission trees and semantic substrates to visualize the integrated policies. Through the interactive policy query visualization, the average administrator can gain an intuitive understanding of the policy integration result. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User behaviors analysis in website identification registration

    Publication Year: 2013 , Page(s): 76 - 81
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (446 KB)  

    Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fundamentals of visualizing communication networks

    Publication Year: 2013 , Page(s): 82 - 90
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (3012 KB)  

    The human brain is built to process complex visual impressions within milliseconds. In comparison with sequentially coded spoken language and written texts, we are capable of consuming graphical information at a high bandwidth in a parallel fashion, producing a picture worth more than a thousand words. Effective information visualization can be a powerful tool to capture people's attention and quickly communicate large amounts of data and complex information. This is particularly important in the context of communication data, which often describes entities (people, organizations) and their connections through communication. Visual analytics approaches can optimize the user-computer interaction to gain insights into communication networks and learn about their structures. Network visualization is a perfect instrument to better communicate the results of analysis. The precondition for effective information visualization and successful visual reasoning is the capability to draw “good” pictures. Even though communication networks are often large, including thousands or even millions of people, underlying visualization principles are identical to those used for visualizing smaller networks. In this article, you will learn about these principles, giving you the ability to assess the quality of network visualizations and to draw better network pictures by yourself. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A concise joint transmit/receive antenna selection algorithm

    Publication Year: 2013 , Page(s): 91 - 99
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (628 KB)  

    For reducing the computational complexity of the problem of joint transmit and receive antenna selection in Multiple-Input-Multiple-Output (MIMO) systems, we present a concise joint transmit/receive antenna selection algorithm. Using a novel partition of the channel matrix, we drive a concise formula. This formula enables us to augment the channel matrix in such a way that the computational complexity of the greedy Joint Transmit/Receive Antenna Selection (JTRAS) algorithm is reduced by a factor of 4nL, where nL is the number of selected antennas. A decoupled version of the proposed algorithm is also proposed to further improve the efficiency of the JTRAS algorithm, with some capacity degradation as a tradeoff. The computational complexity and the performance of the proposed approaches are evaluated mathematically and verified by computer simulations. The results have shown that the proposed joint antenna selection algorithm maintains the capacity performance of the JTRAS algorithm while its computational complexity is only 1/4nL of that of the JTRAS algorithm. The decoupled version of the proposed algorithm further reduces the computational complexity of the joint antenna selection and has better performance than other decoupling-based algorithms when the selected antenna subset is small as compared to the total number of antennas. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power ramping schemes for M2M and H2H Co-existing scenario

    Publication Year: 2013 , Page(s): 100 - 113
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (974 KB)  

    To analyze and reduce the impact of Machine-to-Machine (M2M) Devices (MDs) on the traditional Human-to-Human (H2H) users for the blending scenario, where both M2M and H2H services coexist in the current Universal Mobile Telecommunication System (UMTS) and perform the Random Access (RA) procedure simultaneously, a comprehensive RA analysis model of RA is proposed in this paper. Further, a power ramping strategy based on the logarithm for M2M is proposed. The efficiency of both the existing and proposed scheme is assessed through a simulation across several metrics, including average target power, throughput, blocking probability, and delay statistics. Numerical results show that the proposed algorithm can ensure a minimal impact on H2H communication while maintaining the throughput of the M2M communication. Meanwhile, because of its low energy consumption, this algorithm has a significant guide value for real-world applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-efficient transmission scheme for mobile data gathering in Wireless Sensor Networks

    Publication Year: 2013 , Page(s): 114 - 123
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (680 KB)  

    Energy conservation in Wireless Sensor Networks (WSNs) has always been a crucial issue and has received increased attention in the recent years. A transmission scheme for energy-constrained WSNs is proposed in this paper. The scheme, called MIHOP (MIMO and Multi-hop), combines cluster-based virtual MIMO and multi-hop technologies. The multi-hop mode is employed in transmitting data when the related sensors are located within a specific number of hops from the sink, and the virtual MIMO mode is used in transmitting data from the remaining sensor nodes. We compare the energy consumption of different transmission schemes and propose an algorithm for determining the optimal hop count in MIHOP. A controllable mobile sink that reduces the energy consumed in sensor transmission is also adopted for data collection. The theoretical analysis and the Monte Carlo simulation demonstrate that the proposed scheme significantly outperforms individual virtual MIMO, multi-hop technologies, and double-string networks in terms of energy conservation. The energy consumption levels under the MIHOP scheme are approximately 12.98%, 47.55% and 48.30% less than that under virtual MIMO schemes, multi-hop networks and double-string networks, respectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • China Communications order form

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | PDF file iconPDF (484 KB)  
    Freely Available from IEEE
  • Ant Colony Optimization for task allocation in Multi-Agent Systems

    Publication Year: 2013 , Page(s): 125 - 132
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (392 KB)  

    Task allocation is a key issue of agent cooperation mechanism in Multi-Agent Systems. The important features of an agent system such as the latency of the network infrastructure, dynamic topology, and node heterogeneity impose new challenges on the task allocation in Multi-Agent environments. Based on the traditional parallel computing task allocation method and Ant Colony Optimization (ACO), a novel task allocation method named Collection Path Ant Colony Optimization (CPACO) is proposed to achieve global optimization and reduce processing time. The existing problems of ACO are analyzed; CPACO overcomes such problems by modifying the heuristic function and the update strategy in the Ant-Cycle Model and establishing a three-dimensional path pheromone storage space. The experimental results show that CPACO consumed only 10.3% of the time taken by the Global Search Algorithm and exhibited better performance than the Forward Optimal Heuristic Algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS guarantees of multiuser video streaming over wireless links: Delay constraint and packet priority drop

    Publication Year: 2013 , Page(s): 133 - 144
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (2258 KB)  

    To provide a certain level of Quality of Service (QoS) guarantees for multiuser wireless downlink video streaming transmissions, we propose a multiuser scheduling scheme for QoS guarantees. It is based on the classic Queue-Length-Based (QLB)-rate maximum scheduling algorithm and integrated with the delay constraint and the packet priority drop. We use the large deviation principle and the effective capacity theory to construct a new analysis model to find each user's queue length threshold (delay constraint) violation probability. This probability corresponds to the upper bound of the packet drop probability, which indicates a certain level of statistical QoS guarantees. Then, we utilize the priority information of video packets and introduce the packet priority drop to further improve the quality perceived by each user. The simulation results show that the average Peak Signal to Noise Ratio (PSNR) value of the priority drop is 0.8 higher than that of the non-priority drop and the PSNR value of the most badly damaged video frame in the priority drop is on an average 4 higher than that of the non-priority drop. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing protocol based on Grover's searching algorithm for Mobile Ad-hoc Networks

    Publication Year: 2013 , Page(s): 145 - 156
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (543 KB)  

    In Mobile Ad-hoc Networks (MANETs), routing protocols directly affect various indices of network Quality of Service (QoS), so they play an important role in network performance. To address the drawbacks associated with traditional routing protocols in MANETs, such as poor anti-fading performance and slow convergence rate, for basic Dynamic Source Routing (DSR), we propose a new routing model based on Grover's searching algorithm. With this new routing model, each node maintains a node vector function, and all the nodes can obtain a node probability vector using Grover's algorithm, and then select an optimal routing according to node probability. Simulation results show that compared with DSR, this new routing protocol can effectively extend the network lifetime, as well as reduce the network delay and the number of routing hops. It can also significantly improve the anti-jamming capability of the network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sustainable growth in China's communications field: Trend analysis of impact of China's academic publications

    Publication Year: 2013 , Page(s): 157 - 163
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (506 KB)  

    China's communications industry is an important part of the electronic information industry, and plays a significant role in the national informatization process. In 2006, China issued its National Plans for Medium and Long-term Development of Science and Technology (2006-2020) (NPMLDST). Since 2006, there has been a rapid increase in the number of citations of China's international papers in the field of communications. In accordance with the goals listed in the NPMLDST, China needs to overtake several competitors by 2020 to be among the top five countries in the field of natural science field. By comparing two Essential Science Indicators (ESI) (i.e., the total number of citations and the number of citations per paper) for China and other countries, China's annual growth rate is found to exceed that of other influential countries in the field of science and technology, and exhibits evident growth-type characteristics. Besides, our study also shows that the shortage of high-quality academic papers in China is the main obstacle to improving the impact of China's academic publications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • China Telecom [advertisement]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | PDF file iconPDF (1322 KB)  
    Freely Available from IEEE

Aims & Scope

China Communications is a technical journal published by China Institute of Communications with the objective of providing a global academic exchange platform involved in information and communications technologies (ICTs) sector.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Chen Junliang