[1] |
Jianfeng DAI, Xingyu CHEN, Ligang DONG, Xian JIANG.
A triple joint extraction method combining hybrid embedding and relational label embedding
[J]. Telecommunications Science, 2023, 39(2): 132-144.
|
[2] |
Hongtao ZHU, Qing GUO.
User group based multi-satellite handover strategy for LEO satellite networks
[J]. Telecommunications Science, 2022, 38(4): 39-48.
|
[3] |
Liang YIN, Rui LIN, Xiaolei WANG, Yuliang YAO, Lin ZHOU, Yuan HE.
Low complexity radar signal classification based on spectrum shape
[J]. Telecommunications Science, 2022, 38(1): 25-35.
|
[4] |
Xueyi YE, Dingwei QIAN, Na YING, Tao WANG.
Face recognition algorithm based on attractive local second gradient contours
[J]. Telecommunications Science, 2021, 37(7): 96-106.
|
[5] |
Wenjun HOU, Bing BAI, Benzhi YANG.
Research on the development and business trend of holographic technology under 6G network
[J]. Telecommunications Science, 2021, 37(11): 1-10.
|
[6] |
Wei DAI.
Research on the design and policy of national number portability service plan
[J]. Telecommunications Science, 2021, 37(11): 115-127.
|
[7] |
Chi ZHANG, Ye LU, Yuping LUO, Xiaokai SUN, Hanke ZHU.
A novel approach for face privacy protection based on surveillance video in complex scene
[J]. Telecommunications Science, 2021, 37(1): 94-101.
|
[8] |
Tingting ZHANG,Jianwu ZHANG,Chunsheng GUO,Huahua CHEN,Di ZHOU,Yansong WANG,Aihua XU.
A survey of image object detection algorithm based on deep learning
[J]. Telecommunications Science, 2020, 36(7): 92-106.
|
[9] |
Wei DING.
Network security threat prevention and control system of electric power monitoring systems for wind farm
[J]. Telecommunications Science, 2020, 36(5): 138-144.
|
[10] |
Yuchao LIU,Ziyue LI.
Key technology and application of intelligent connected patrol vehicles for security scenario
[J]. Telecommunications Science, 2020, 36(4): 53-60.
|
[11] |
Yang SUN,Li SU,Xing ZHANG,Fengsheng WANG,Haitao DU.
Method of short text strategy mining based on sub-semantic space
[J]. Telecommunications Science, 2020, 36(3): 83-94.
|
[12] |
Guofeng HE.
Application protection in 5G cloud network using zero trust architecture
[J]. Telecommunications Science, 2020, 36(12): 123-132.
|
[13] |
Xin CAI.
Internet bad information detection based on Bert model
[J]. Telecommunications Science, 2020, 36(11): 121-126.
|
[14] |
Lin ZHU,Juan ZHAO,Yiting WANG,Junlan FENG,Gchao DEN.
Smart prediction of the complaint hotspot problem in mobile network
[J]. Telecommunications Science, 2019, 35(5): 17-24.
|
[15] |
Xiaoan BAO,Yundi CAO,Na ZHANG,Junyan QIAN,Jianwen CAO.
Multi-objective cloud workflow scheduling algorithm based on grid variance
[J]. Telecommunications Science, 2019, 35(2): 1-13.
|