Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • Four challenges of industrial big data application
    • WEI Kai
    • Information and Communications Technology and Policy. 2019, 45(5): 1-3.
    • Abstract ( 213 )   
    • Big data analytics plays the key factor to drive industrial transformation and upgrading. More and more enterprises benefit from industrial big data analytics applications. However, the development of industrial big data still faces four major challenges: insufficient data resources, poor data asset management, data silos, and insufficient depth of application.To overcome the challenges, we need to consolidate the foundation of industrial big data management and seize the opportunity of technological innovation at the property level.We also need to establish standards and rules to forester data interoperability and data share between companies.
    • Related Articles | Related Articles | Metrics
    • Evaluating distributed transactional database system
    • MAPengwei, WEIKai, JIANGChunyu, LI Junyi
    • Information and Communications Technology and Policy. 2019, 45(5): 14-18.
    • Abstract ( 234 )   
    • In this paper, we first summarize the definition and characteristics of distributed transactional database system. After evaluating the existing test benchmarks for distributed transactional database, we propose a new evaluation framework and test methods for distributed transactional database system. This paper provides a new guidance for testing and selecting distributed transactional database in the world.
    • Related Articles | Related Articles | Metrics
    • Anewmethodto prove the correctness of system migration
    • DENGQiong, CHENJianfeng
    • Information and Communications Technology and Policy. 2019, 45(5): 28-32.
    • Abstract ( 182 )   
    • With the development of open source database technology, more business systems are migrating from commercial databases to open source databases. System migration, which keeps the data model unchanged, has a more powerful means to prove the correctness of its migration. By comparing the differences between the two logs in real-time or quasi-real-time, we can conclude whether the system works in accordance with expectations, and provide more basis for the application of checking problems.
    • Related Articles | Metrics
    • An overview of RF exposure measurements for 5G terminal
    • ZOU Fangzhu, LI Lanfei
    • Information and Communications Technology and Policy. 2019, 45(5): 50-54.
    • Abstract ( 247 )   
    • The 5th generation(5G) wireless telecommunication systems aimed to support high- speed mobile internet access, which would benefit a variety of new applications including the Internet of Things, connected vehicles, and industrial automation. 5G would start a technology revolution. As one of the key technologies of 5G, millimeter wave has captured close attention to the public. Its biological effects to human beings, in particular, has raised concern. This paper presented the current regulatory requirements and introduced the general measurement methods. Also, there would be a brief description of the instrumentation for measuring human exposure to millimeter wave and some issues emerging from an actual measurement case have been discussed in the end.
    • Related Articles | Related Articles | Metrics
    • Analysisonsecurity protection of RFIDsystem in Internet of Things
    • LIQi, LIUDanni
    • Information and Communications Technology and Policy. 2019, 45(5): 55-58.
    • Abstract ( 238 )   
    • With the development of Internet of things technology, the security of Internet of things has been attracted extensive attention.As one of the key technologies of the Internet of things, theRFID (radio frequency Identification) is facing a serious security threat. In this paper, the structure of the Internet of things and the composition and working principle ofRFID system are discussed first.And then we analyze the security problems in the aspects of data security, integrity, availability and authenticity of RFID system. Finally, the concrete precautions are summarized from two aspects of the physical measures and the authentication protocol.
    • Related Articles | Related Articles | Metrics
    • ResearchonInternet of Things applicationbasedonfog calculation
    • YUFudong, YANGLimin, YANGLin
    • Information and Communications Technology and Policy. 2019, 45(5): 59-62.
    • Abstract ( 239 )   
    • Cloud computing is widely used in the Internet and carrier fields. However, the centralized setting of service processing capabilities is not sufficient for applications with high mobility and low latency. The emergence of fog computing, extending the processing power of cloud computing to the edge of the network, is a distributed cloud computing. Through the introduction of the concept of fog calculation and the introduction of cloud computing and edge computing, this paper introduces the technical architecture, system architecture and software architecture of fog computing in the application process, and describes the situation of fog computing in the application of IoT by examples. Future fog computing plays a supporting role in the application of the Internet of Things。
    • Related Articles | Related Articles | Metrics
    • 5Gvehicle-mounted terminal applicationand prospect
    • WANGZheng, ZHENGHaixia, TANGLei
    • Information and Communications Technology and Policy. 2019, 45(5): 63-66.
    • Abstract ( 265 )   
    • As a technology to change society, 5G communication technology has gradually entered our life. The Internet of Vehicles is one of the important application scenarios of 5G, and the 5G vehicle-mounted terminal is the link between vehicles and everything.The future application scenarios will be very extensive.This paper introduces the related characteristics of 5G vehicle-mounted terminals and the application scenarios of vehicle-mounted terminals in 5G networks. Finally, the development of 5G vehicle-mounted terminals is prospected.
    • Related Articles | Related Articles | Metrics
    • C-V2Xtechnologies introduction and performance evaluation
    • WANGXiaochen, PEI Bin, SUNJing, LIUHeng, TANGLei
    • Information and Communications Technology and Policy. 2019, 45(5): 67-70.
    • Abstract ( 288 )   
    • V2X, as key technologies of intelligent and connected vehicle, can implement to support vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to-pedestrian (V2P), vehicle-to-network(V2N) scenarios. Furthermore,V2Xcan be deployed to enhance the ability of vehicle information collection. In this paper, two main V2X techniques, also known by DSRC and LTE- V, are introduced from network architecture, standard progress and technique designs. Finally, some simulation results are given basedon several classical scenarios.
    • Related Articles | Related Articles | Metrics
    • The next generation WLAN technical standard 802.11ax
    • E Lei, MAFan, LIU Jia, LIU Huimin, LI Guang
    • Information and Communications Technology and Policy. 2019, 45(5): 71-74.
    • Abstract ( 287 )   
    • With the rapid development of artificial intelligence and the Internet of Things(IoT), the number of wireless LAN devices has exceeded 25 billion, and many new applications and requirements have been created, in the face of high speed transmission and complex space environment there are many challenges and bottlenecks in the current IEEE 802.11 standards. As a result, the IEEE has begun to develop the next generation of WLAN standards, 802.11ax, which will increase to data transfer rate to 9000 Mbit/s, to achieve a new generation of higher speed, higher efficiency and more energy saving standards that will better meet the rapidly growing market demand.
    • Related Articles | Related Articles | Metrics
    • Research of face recognition technology and test methods in security field
    • XUMuhong
    • Information and Communications Technology and Policy. 2019, 45(5): 75-82.
    • Abstract ( 188 )   
    • Face recognition technology has been widely used in the security field because of the promotion of the national policy and the development of the artificial intelligence. There are more and more measurement requirements for the face recognition products which have various kinds of types. In this paper, general development of the face recognition in the security field will be first introduced, and the main technology of the face recognition will then be studied. The test methods of the face recognition products will be studied in detail in the paper. Finally, the current status for the standards of the face recognition will be given.
    • Related Articles | Related Articles | Metrics