Vol 2, No 1

Full Issue

  • Open Access

    Original Research Articles

    Article ID: 796

    Analysis of Computer Network Security and Preventive Measures in the Data Age

    by Zhi Li

    Journal of Networking and Telecommunications, Vol.2, No.1, 2020; 300 Views, 38 PDF Downloads

    With the development of science and technology, the network in human society continues to be improved and enriched, as well as the ability of database technology, which is of super cloud computing ability and extensive data sharing and brings great convenience to the whole country. But at the same time, the data that is used improperly in the network environment not only poses a certain threat to the network system, but also gradually erodes people's lives. For the computer network security problems in the era of big data, this paper first analyzes the location of the problems, and then puts forward the means to solve and prevent the security problems.

  • Open Access

    Original Research Articles

    Article ID: 810

    Research and Application of Code Similarity Based on Submission

    by Yu Lang

    Journal of Networking and Telecommunications, Vol.2, No.1, 2020; 312 Views, 37 PDF Downloads

    With the continuous accumulation of resources, the similarity detection of code is becoming more difficult, and the difficulty of code reusing and rechecking is also increasing. In view of this problem, this paper proposes a code recommendation and check-research based on submission, which uses differential code cloning and word vector methods to find candidate code sets that are similar to incremental text, and uses feature extraction and clustering to select the most relevant codes from the candidate code sets to obtain repetitive codes. At the same time, it is recommended to programmers combined with relevance scores. Experimental results show that this method is feasible to some extent.

  • Open Access

    Original Research Articles

    Article ID: 838

    Design of Smart Card Chip Reader Based on STM32

    by Zebin Tan, Yong Zuo, Hongwei Cao, Jiahao Huang

    Journal of Networking and Telecommunications, Vol.2, No.1, 2020; 428 Views, 98 PDF Downloads

    This paper designs a smart card chip reader based on STM32, and gives a block diagram of the overall design of the system. It introduces the design of the peripheral hardware circuit of the main control chip STM32F103CBT6 and the RF processing chip THM3070, and the format of data communication between each part and flow chart. The communication between the host computer and the reader adopts the USB CCID protocol, which supports the USB full-speed communication rate of 12Mbps, improves the interrupt response, and overcomes the shortcomings of the traditional serial port-based readers with low communication speed and poor interrupt response. At the same time, it realizes data interaction with the PC/SC standard PC application and has better versatility

  • Open Access

    Original Research Articles

    Article ID: 835

    Research on Telecom Fraud Detection Model Based on Cellular Network Data

    by Kaiyuan Guo, Wenbo Wang

    Journal of Networking and Telecommunications, Vol.2, No.1, 2020; 360 Views, 48 PDF Downloads

    With the rapid development of wireless communication technology, the use of mobile phones and other means of communication for telecommunications fraud has become a major problem that endangers user security. Aiming at this problem, this paper constructs a telecom fraud user detection model by in-depth analysis and mining of cellular network data. The model includes data processing, CNNcombine algorithm and model evaluation. First, in the data processing part, the data set is subjected to feature screening, coding, sampling, and the like. Secondly, the CNNcombine algorithm is a combination of a one-dimensional convolutional neural network and multiple traditional classification algorithms. The convolutional neural network is applied to solve classification problems other than text image signals. Finally, in the model evaluation part, it is proved that the CNNcombine algorithm has higher accuracy than the common machine learning classification algorithm such as XGBoost to detect telecom fraud users.

  • Open Access

    Original Research Articles

    Article ID: 836

    Research on Topoloty Reconstruction Mechanism Based on Traffic Identification

    by Qishuang Zhu, Hongxiang Guo, Ceng Wang, Yong Zhu

    Journal of Networking and Telecommunications, Vol.2, No.1, 2020; 224 Views, 36 PDF Downloads

    Due to the growing variety of data center services, the bursty and variability of data traffic is increasing. In order to make the network better meet the needs of upper-layer services, it is necessary to design a more flexible optical internet topology reconstruction mechanisms to adapt the changing traffic demands. In the past research on optical internet, all topology reconstruction mechanisms are designed based on global data traffic. Although these mechanisms can fully utilize the flexibility of the data center optical interconnection network topology and adjust topology in real time according to the traffic demands, but when the traffic is presented at the regional level, this mechanism does not give optimal results. This paper proposes a topology reconstruction mechanism for data center  optical interconnection network based on traffic identification for the previously proposed data center optical switching architecture—OpenScale. The simulation results show that it utilizes the flexibility of  the network to save bandwidth resources and increase the wavelength connection bandwidth utilization with a little sacrifice of throughput.