Vol 2, No 1
Full Issue
-
Open Access
Original Research Articles
Article ID: 796
Analysis of Computer Network Security and Preventive Measures in the Data Ageby Zhi Li
Journal of Networking and Telecommunications, Vol.2, No.1, 2020; 280 Views, 6 PDF Downloads
With the development of science and technology, the network in human society continues to be improved and enriched, as well as the ability of database technology, which is of super cloud computing ability and extensive data sharing and brings great convenience to the whole country. But at the same time, the data that is used improperly in the network environment not only poses a certain threat to the network system, but also gradually erodes people's lives. For the computer network security problems in the era of big data, this paper first analyzes the location of the problems, and then puts forward the means to solve and prevent the security problems.
-
Open Access
Original Research Articles
Article ID: 810
Research and Application of Code Similarity Based on Submissionby Yu Lang
Journal of Networking and Telecommunications, Vol.2, No.1, 2020; 288 Views, 12 PDF Downloads
With the continuous accumulation of resources, the similarity detection of code is becoming more difficult, and the difficulty of code reusing and rechecking is also increasing. In view of this problem, this paper proposes a code recommendation and check-research based on submission, which uses differential code cloning and word vector methods to find candidate code sets that are similar to incremental text, and uses feature extraction and clustering to select the most relevant codes from the candidate code sets to obtain repetitive codes. At the same time, it is recommended to programmers combined with relevance scores. Experimental results show that this method is feasible to some extent.
-
Open Access
Original Research Articles
Article ID: 838
Design of Smart Card Chip Reader Based on STM32by Zebin Tan, Yong Zuo, Hongwei Cao, Jiahao Huang
Journal of Networking and Telecommunications, Vol.2, No.1, 2020; 384 Views, 13 PDF Downloads
This paper designs a smart card chip reader based on STM32, and gives a block diagram of the overall design of the system. It introduces the design of the peripheral hardware circuit of the main control chip STM32F103CBT6 and the RF processing chip THM3070, and the format of data communication between each part and flow chart. The communication between the host computer and the reader adopts the USB CCID protocol, which supports the USB full-speed communication rate of 12Mbps, improves the interrupt response, and overcomes the shortcomings of the traditional serial port-based readers with low communication speed and poor interrupt response. At the same time, it realizes data interaction with the PC/SC standard PC application and has better versatility
-
Open Access
Original Research Articles
Article ID: 835
Research on Telecom Fraud Detection Model Based on Cellular Network Databy Kaiyuan Guo, Wenbo Wang
Journal of Networking and Telecommunications, Vol.2, No.1, 2020; 335 Views, 19 PDF Downloads
With the rapid development of wireless communication technology, the use of mobile phones and other means of communication for telecommunications fraud has become a major problem that endangers user security. Aiming at this problem, this paper constructs a telecom fraud user detection model by in-depth analysis and mining of cellular network data. The model includes data processing, CNNcombine algorithm and model evaluation. First, in the data processing part, the data set is subjected to feature screening, coding, sampling, and the like. Secondly, the CNNcombine algorithm is a combination of a one-dimensional convolutional neural network and multiple traditional classification algorithms. The convolutional neural network is applied to solve classification problems other than text image signals. Finally, in the model evaluation part, it is proved that the CNNcombine algorithm has higher accuracy than the common machine learning classification algorithm such as XGBoost to detect telecom fraud users.
-
Open Access
Original Research Articles
Article ID: 836
Research on Topoloty Reconstruction Mechanism Based on Traffic Identificationby Qishuang Zhu, Hongxiang Guo, Ceng Wang, Yong Zhu
Journal of Networking and Telecommunications, Vol.2, No.1, 2020; 202 Views, 11 PDF Downloads
Due to the growing variety of data center services, the bursty and variability of data traffic is increasing. In order to make the network better meet the needs of upper-layer services, it is necessary to design a more flexible optical internet topology reconstruction mechanisms to adapt the changing traffic demands. In the past research on optical internet, all topology reconstruction mechanisms are designed based on global data traffic. Although these mechanisms can fully utilize the flexibility of the data center optical interconnection network topology and adjust topology in real time according to the traffic demands, but when the traffic is presented at the regional level, this mechanism does not give optimal results. This paper proposes a topology reconstruction mechanism for data center  optical interconnection network based on traffic identification for the previously proposed data center optical switching architecture—OpenScale. The simulation results show that it utilizes the flexibility of  the network to save bandwidth resources and increase the wavelength connection bandwidth utilization with a little sacrifice of throughput.