Editors Recommend
20 December 2022, Volume 38 Issue 12
Research and Development
Virtual machine scheduling model based on Shapley value modified genetic algorithm in cloud computing
Kun MA, Lingyu XU, Xiaoping SHEN, Zhicheng GONG, Jianping LAN, Shuangxi CHEN, Jun QIAN
2022, 38(12):  1-10.  doi:10.11959/j.issn.1000-0801.2022281
Asbtract ( 15 )   HTML ( 2)   PDF (2002KB) ( 5 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Cloud computing system has the characteristics of large-scale servers and a wide range of users.However, it also consumes a huge number of energy, resulting in high operating costs of cloud providers and high carbon emissions issue.Cloud computing is highly virtualized.How to allocate and manage the virtual resources to ensure efficient physical resource utilization and energy consumption control is a multi-parameter game problem, and it is also a research hotspot in this field.A virtual machine scheduling model and the corresponding SV-GA were proposed, which could calculate the contribution value of the physical machine participating in the work through the Shapley value, and modify the probability parameter of the mutation step in the genetic algorithm through the contribution value, so as to complete the task of virtual machine scheduling.The experimental results show that during the comparison with Max-Min, LrMmt and DE, the SV-GA shows its excellent performance in the multi-parameter game including migration time, times, SLA violation rate and energy consumption in the virtual machine scheduling process.

Variable granularity service function chain mapping algorithm based on microservice architecture
Xiaochun WU, Chen HONG, Yue ZHANG, Junnan ZHANG, Jingjing ZHOU
2022, 38(12):  11-26.  doi:10.11959/j.issn.1000-0801.2022289
Asbtract ( 12 )   HTML ( 6)   PDF (2123KB) ( 8 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

For the problem that the end-to-end delay of the service function chain (SFC) cannot meet the demand of delay-sensitive applications in 5G environment, a variable granularity service function chain mapping (VG-SFCM) algorithm based on microservice architecture was proposed by splitting the traditional virtualized network function (VNF) into mapping units of varying granularity.Firstly, the traditional coarse-grained VNF was decoupled into fine-grained microservice units, and then the instantiation of microservice units was reduced through the consolidation of redundant microservice units within SFC and the reuse of microservice units between SFC, thus reducing the processing time of SFC.The simulation results show that the algorithm reduces the end-to-end delay of SFC by 14.81% compared to the traditional mapping algorithm while reducing the average deployment network cost.

Study on the direction of artificial intelligence technology based on network evolution
Zhen YANG, Jianjun ZHAO, Yongjun HUANG, Jie LI, Nan CHEN
2022, 38(12):  27-34.  doi:10.11959/j.issn.1000-0801.2022298
Asbtract ( 13 )   HTML ( 3)   PDF (679KB) ( 8 )   Knowledge map   
References | Related Articles | Metrics

The national strategy positions artificial intelligence (AI) and Internet of things (IoT)/5G as important components of information technology facilities at the same time.Among them, AI belongs to new technology infrastructure, and IoT/5G belongs to communication network infrastructure.It leads to the technical direction of “integrate and develop communication and AI technology”.For telecom operators, how to integrate AI technology with the network, reconstruct network technology architecture, and open “AI ability” as a “service” will be an important technology evolution direction.Based on this proposition, the development direction of AI and network technology in the future was discussed, and a reference idea for the integration development and application direction of AI technology with the network architecture of IoT/5G in the future was provided.

Statistical modeling based fast rate estimation algorithm for VVC
Wei QI, Haibing YIN, Hongkui WANG, Xiaofeng HUANG, Weihong NIU
2022, 38(12):  35-45.  doi:10.11959/j.issn.1000-0801.2022279
Asbtract ( 7 )   HTML ( 1)   PDF (3760KB) ( 4 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To reduce the coding complexity of the rate-distortion optimization process of the latest video coding standard versatile video coding (VVC), a fast rate estimation model based on statistical modeling was proposed.Firstly, the quantization behavior in dependent quantization (DQ) and the context dependency in entropy coding were fully considered.Features that could describe context state transition in the coding process were proposed to estimate rate of some synatax elements in a TU preliminarily.Secondly, coefficient chaos and sparsity features were proposed to distinguish the influence of coefficient distribution difference on the rate cost based on the coefficient distribution characteristics which built a TU level rate model.Finally, large-size transform unit (TU) and small-size TU was modeling respectively according to the rate composition character to achieve more accurate rate estimation.A large number of parameters were trained by regression model through statistical methods, and the final linear rate model was obtained which was applied to the mode decision.Experimental results show that the proposed algorithm can achieve 16.289% complexity reduction with 1.567% BD-BR increase for RA configuration.

A genetic algorithm based method of optimizing dispersion matrix for RDSM system
Peng ZHANG, Xiaoping JIN, Dongxiao CHEN
2022, 38(12):  46-55.  doi:10.11959/j.issn.1000-0801.2022291
Asbtract ( 8 )   HTML ( 1)   PDF (2782KB) ( 3 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Rectangular differential spatial modulation (RDSM) is a multi-antenna incoherent modulation technology with high spectral efficiency, low power consumption, and zero-overhead for channel estimation.RDSM is especially suitable for 6G communication systems, such as fast-moving Internet of vehicles, Internet of things, cellular networks, etc.However, the construction of the sparse rectangular unitary space-time dispersion matrix (DM) at transmitter is a problem.The proposed Genetic algorithm (GA) will result in less computational complexity than the currently used random research.The fitness of GA was calculated by the rank and determinant criterion (RDC) method to avoid discussions in differential system.Due to characteristics of constellation symbols of RDSM, the proposed method reduced the computational complexity during each single iteration in GA.The simulation results show that the optimized DMS can significantly improve the bit error rate (BER) performance of the RDSM system.Compared with random search, the low-complexity GA effectively improves the DMS optimization efficiency of RDSM.The computational complexity required for optimizing DMS is about 0.1% of random search optimization method.

Deep learning Chinese input method with incremental vocabulary selection
Huajian REN, Xiulan HAO, Wenjing XU
2022, 38(12):  56-64.  doi:10.11959/j.issn.1000-0801.2022294
Asbtract ( 7 )   HTML ( 0)   PDF (1157KB) ( 5 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

The core task of an input method is to convert the keystroke sequences typed by users into Chinese character sequences.Input methods applying deep learning methods have advantages in learning long-range dependencies and solving data sparsity problems.However, the existing methods still have two shortcomings: the separation structure of pinyin slicing in conversion leads to error propagation, and the model is complicated to meet the demand for real-time performance of the input method.A deep-learning input method model incorporating incremental word selection methods was proposed to address these shortcomings.Various softmax optimization methods were compared.Experiments on People’s Daily data and Chinese Wikipedia data show that the model improves the conversion accuracy by 15% compared with the current state-of-the-art model, and the incremental vocabulary selection method makes the model 130 times faster without losing conversion accuracy.

Research on anomaly detection algorithm based on sparse variational autoencoder using spike and slab prior
Huahua CHEN, Zhe CHEN
2022, 38(12):  65-77.  doi:10.11959/j.issn.1000-0801.2022238
Asbtract ( 8 )   HTML ( 0)   PDF (3679KB) ( 5 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Anomaly detection remains to be an essential and extensive research branch in data mining due to its widespread use in a wide range of applications.It helps researchers to obtain vital information and make better decisions about data by detecting abnormal data.Considering that sparse coding can get more powerful features and improve the performance of other tasks, an anomaly detection model based on sparse variational autoencoder was proposed.Firstly, the discrete mixed modelspike and slab distribution was used as the prior of variational autoencoder, simulated the sparsity of the space where the hidden variables were located, and obtained the sparse representation of data characteristics.Secondly, combined with the deep support vector network, the feature space was compressed, and the optimal hypersphere was found to discriminate normal data and abnormal data.And then, the abnormal fraction of the data was measured by the Euclidean distance from the data feature to the center of the hypersphere, and then the abnormal detection was carried out.Finally, the algorithm was evaluated on the benchmark datasets MNIST and Fashion-MNIST, and the experimental results show that the proposed algorithm achieves better effects than the state-of-the-art methods.

Task security scheduling method for 5G+MEC based grid edge computing platform
Shimulin XIE, Ijie BA, Xiang ZHANG, Zeyi TANG, Weifan NIAN, Xujie LIU
2022, 38(12):  78-85.  doi:10.11959/j.issn.1000-0801.2022262
Asbtract ( 15 )   HTML ( 4)   PDF (823KB) ( 6 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

In order to ensure the security of task scheduling of grid edge computing platform and the data quality required by task scheduling, a task security scheduling method of grid edge computing platform based on 5G + MEC was proposed.Combined with confidentiality service and integrity service, the security level model of task scheduling was constructed to restrict the risk in the process of scheduling and transmission of scheduling task queue, so as to realize the secure transmission of 5G core network.The priority queue type was confirmd, the minimum queue and the maximum queue was selected, the maximization of data resources and the task scheduling of MEC equipment was supported, and a distributed task scheduling model was built.Using Lyapunov candidate function to improve the stability of task scheduling, and the model was solved by alternating direction multiplier method to obtain the optimal solution of task security scheduling.The test results show that after the application of this method, the risk probability results fluctuate in the range of 0.15~0.35, and the fitting degree between the relevant data provided by MEC equipment and the scheduling task of core server is higher than 0.92, the quality score of task scheduling data is also higher than 0.94.

Automatic control technology of low frequency and low voltage splitting devices using wide area measurement information
Mingliang GAO, Bo ZHUANG, Xuefei NIU, Mouying LI
2022, 38(12):  86-93.  doi:10.11959/j.issn.1000-0801.2022297
Asbtract ( 5 )   HTML ( 0)   PDF (1098KB) ( 3 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Aiming at the problems of large noise content of wide area measurement information of power grid and difficulty in controlling oscillation damping in interconnected areas of power grid, an automatic control technology of low frequency and low voltage splitting devices using wide area measurement information was proposed.Based on the wide area measurement system (WAMS), the wide area measurement information of the power grid during the operation was obtained.After the noise contained in the wide area measurement information of the power grid was removed by the wavelet decomposition de-noising method, the power grid low-frequency oscillation identification method based on Prony was used to identify the power grid oscillation region and oscillation value.Then, based on the grid oscillation region and oscillation value, the oscillation center voltage and positioning coefficient were calculated and used as input to design the automatic control flow of the low frequency and low voltage splitting device, so as to realize the automatic control of the low frequency and low voltage splitting device.The experimental results show that this method can effectively remove the noise contained in the wide area measurement information of the power grid, the maximum error of the oscillation damping value in the interconnected area of the power grid is only 0.01, and this method can effectively control the low frequency and low voltage splitting device.

A new method to improve 5G coverage of urban grid roads
Yejiang ZHANG, Jie CHEN, Jian HU, Xiaokang YANG, Yun LU, Teng LIANG
2022, 38(12):  94-102.  doi:10.11959/j.issn.1000-0801.2022299
Asbtract ( 10 )   HTML ( 0)   PDF (1024KB) ( 5 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Urban grid road is an important use scenario for mobile communication users.Compared with other static scenes, UE mobility on the road leads to relatively poor customer perception.The traditional urban grid road test optimization has some pain points, such as incomplete regulation, low optimization efficiency, repeated work orders, no focus and so on.A new method to improve 5G coverage of urban grid roads was proposed.The proposed method introduces the concept of problem circle, realizes the effective aggregation of sporadic test problem points, and uses“aggregation degree” and “repetition degree” to quantitatively identify the priority of test problems.By introducing the concepts of “ideal azimuth” and “appropriate cell”, the method of the optimal coverage cell of the problem circle was proposed, which can effectively output the optimization scheme of the problem circle.This method has been deployed in the current network and effectively supports the test and optimization of urban grid roads.The 5G coverage rate has increased from 89.95% to 98.86%.

A big data framework for short-term power load forecasting using heterogenous data
Haibo ZHAO, Zhijun XIANG, Linsong XIAO
2022, 38(12):  103-111.  doi:10.11959/j.issn.1000-0801.2022292
Asbtract ( 8 )   HTML ( 0)   PDF (1503KB) ( 4 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

The power system is in a transition towards a more intelligent, flexible and interactive system with higher penetration of renewable energy generation, load forecasting, especially short-term load forecasting for individual electric customers plays an increasingly essential role in future grid planning and operation.A big data framework for short-term power load forcasting using heterogenous was proposed, which collected the data from smart meters and weather forecast, pre-processed and loaded it into a NoSQL database that was capable to store and further processing large volumes of heterogeneous data.Then, a long short-term memory (LSTM) recurrent neural network was designed and implemented to determine the load profiles and forecast the electricity consumption for the residential community for the next 24 hours.The proposed framework was tested with a publicly available smart meter dataset of a residential community, of which LSTM’s performance was compared with two benchmark algorithms in terms of root mean square error and mean absolute percentage error, and its validity has been verified.

Engineering and Application
Research on co-spectrum sharing technology in LTE 2.1 GHz
Bei LI, Yuhua HU, Guanghai LIU, Tian XIAO, Chuntao SONG, Yi ZHANG, Bo WANG, Qunqing WANG
2022, 38(12):  112-120.  doi:10.11959/j.issn.1000-0801.2022251
Asbtract ( 5 )   HTML ( 0)   PDF (3551KB) ( 3 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Spectrum sharing technology in 5G was introduced in the 3GPP standard.The types and principles of spectrum sharing were presented, the key factors for the realization of dynamic co-spectrum sharing were analyzed, the application configuration and suggestion for the implementation of dynamic co-spectrum sharing were presented, the effect of network application was verified, and the limitations of dynamic co-spectrum sharing in the existing network were summarized.

Research and application exploration of threat intelligence system of telecom operators
Haitao ZHANG, Yi JIANG, Shijie ZHU, Qi CHEN
2022, 38(12):  121-132.  doi:10.11959/j.issn.1000-0801.2022293
Asbtract ( 11 )   HTML ( 3)   PDF (1778KB) ( 4 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence systems suitable for telecom operators were proposed, including six steps: intelligence planning, intelligence production, intelligence analysis, intelligence management, intelligence sharing and intelligence application.Meanwhile a set of multi-source intelligence fusion assessment mechanisms was presented, and the technologies and methods were systematically expounded involved in the four stages of intelligence aggregation analysis, intelligence reputation analysis, intelligence correlation analysis and intelligence aging analysis, so as to help the telecom operators build the ability of intelligence fusion analysis.At the same time, the principles of intelligence production and synchronous application were given for intrusion and loss intelligence, which provided a useful reference for telecom operators to apply threat intelligence technology to build a security protection system.

Research on SRv6 header compression schemes
Xia GONG, Huanan CHEN, Yongqing ZHU, Youming WU, Ke RUAN
2022, 38(12):  133-140.  doi:10.11959/j.issn.1000-0801.2022282
Asbtract ( 10 )   HTML ( 3)   PDF (920KB) ( 6 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Digital and intelligent carrier network have become the priorities of network construction and operation.As a key technology to realize network interconnection and service carrying, carrier protocol critically decides the network scale and traffic efficiency.Facing the service consistent experience requirements, SRv6 as the most competitive technology of IPv6 evolution, has become the development direction in the future.Combined with the principle of SRv6 technology, the requirements of SRv6 compression were analyzed.Based on the main SRv6 compression schemes in the industry, the advantages and disadvantages of each scheme were analyzed, so as to provide guidance for the large scale deployment of SRv6 technology.

Research and verification of cement smart factory solution based on 5G MEC
Bo GAO, Ke MA, Jianmin ZHANG, Guirong DENG, Zhenhan ZANG
2022, 38(12):  141-151.  doi:10.11959/j.issn.1000-0801.2022296
Asbtract ( 20 )   HTML ( 2)   PDF (4495KB) ( 11 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

With the continuous advancement of the new industrialization process, how 5G can empower industrial digital transformation and help enterprises achieve industrial upgrading has received more and more attention.According to the cement production process, the demand of the industry was analyzed, a cement smart factory solution based on 5G multi-access edge computing (MEC) was proposed, and typical 5G application scenarios were given.Combined with actual commercial cases, the detailed deployment networking and security protection solutions were introduced, and the significant effect of the solution in helping enterprises to reduce costs and increase efficiency was verified.It provided a reference for the 5G MEC scenario application in the cement building materials industry and even the process industry.

Research on technology mechanism used in P2P network video surveillance system
Xinyan FANG, Yanxia ZHANG, Ruilin CUI, Siwei LUO
2022, 38(12):  152-162.  doi:10.11959/j.issn.1000-0801.2022295
Asbtract ( 11 )   HTML ( 0)   PDF (1839KB) ( 6 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

At present, the scale of video monitoring of small and medium-sized enterprises and families in the civil market is growing explosively.In view of the monitoring demand of tens of millions of cameras, peer to peer (P2P) network video monitoring technology was widely used in the industry.The principle of P2P network video monitoring technology was expounded comprehensively, and the streaming media control technology, transmission technology and private network crossing technology adopted by the mainstream P2P network video monitoring were analyzed.Finally, a large-scale deployment of P2P video surveillance solution was proposed.

Research development and forecast of automatic speech recognition technologies
Haikun WANG,Jia PAN,Cong LIU
Telecommunications Science. 2018 Vol. 34 (2): 1-11 doi: 10.11959/j.issn.1000-0801.2018095
Abstract2974)   HTML363)    PDF (1267KB)(6771)    Knowledge map   
Kubernetes based converged cloud native infrastructure solution and key technologies
Zhenwei HE,Danchi HUANG,Liyun YAN,Yuanzhi LIN,Xinzhang YANG
Telecommunications Science. 2020 Vol. 36 (12): 77-88 doi: 10.11959/j.issn.1000-0801.2020314
Abstract553)   HTML87)    PDF (876KB)(5829)    Knowledge map   
Current Research and Development Trend of 5G Network Technologies
Hucheng Wang,Hui Xu,Zhimi Cheng,Ke Wang
Telecommunications Science. 2015 Vol. 31 (9): 149-155 doi: 10.11959/j.issn.1000-0801.2015218
Abstract2560)   HTML361)    PDF (1401KB)(5584)    Knowledge map   
A survey of mobile edge computing
Zishu LI,Renchao XIE,Li SUN,Tao HUANG
Telecommunications Science. 2018 Vol. 34 (1): 87-101 doi: 10.11959/j.issn.1000-0801.2018011
Abstract4603)   HTML476)    PDF (1331KB)(4918)    Knowledge map   
Analysis in the Present and Developing Status of Cloud Computing
Bingyi Fang,Yunyong Zhang,Ying Cheng,Lei Xu
Telecommunications Science. 2010 Vol. 26 (8A): 1-10 doi: 10.3969/j.issn.1000-0801.2010.8A.001
Abstract1987)   HTML165)    PDF (1016KB)(4838)    Knowledge map   
Edge computing and network slicing technology in 5G
Hongyu XIANG,Yangwen XIAO,Xian ZHANG,Zhuying PIAO,Mugen PENG
Telecommunications Science. 2017 Vol. 33 (6): 54-63 doi: 10.11959/j.issn.1000-0801.2017200
Abstract1068)   HTML57)    PDF (1109KB)(4461)    Knowledge map   
Status and Development of Aeronautical Ad Hoc Networks
Bo Zheng,Hengyang Zhang,Guoce Huang,Qinghua Ren
Telecommunications Science. 2011 Vol. 27 (5): 38-47 doi: 10.3969/j.issn.1000-0801.2011.05.011
Abstract1130)   HTML30)    PDF (2752KB)(4032)    Knowledge map   
Progress of UAV Ad Hoc Network:A Survey
Kun Zhuo,Hengyang Zhang,Bo Zheng,Yunjun Qi
Telecommunications Science. 2015 Vol. 31 (4): 127-137 doi: 10.11959/j.issn.1000-0801.2015102
Abstract902)   HTML54)    PDF (1710KB)(3794)    Knowledge map   
Research and application of industrial data acquisition based on industrial internet of things
Jianxiong ZHANG,Xiaoli WU,Zhen YANG,Jie LI
Telecommunications Science. 2018 Vol. 34 (10): 124-129 doi: 10.11959/j.issn.1000-0801.2018271
Abstract513)   HTML43)    PDF (1148KB)(3640)    Knowledge map   
Identifier technology in industrial internet
Zhen YANG,Dong ZHANG,Jie LI,Jianxiong ZHANG
Telecommunications Science. 2017 Vol. 33 (11): 134-140 doi: 10.11959/j.issn.1000-0801.2017296
Abstract1163)   HTML73)    PDF (891KB)(3565)    Knowledge map   
Architecture design and standardization progress of 5G network
Hao ZHU,Fei XIANG
Telecommunications Science. 2016 Vol. 32 (4): 126-132 doi: 10.11959/j.issn.1000-0801.2016127
Abstract754)   HTML44)    PDF (2098KB)(3429)    Knowledge map   
PM2.5 concentration prediction model based on random forest regression analysis
Xu DU,Jingyu FENG,Shaoqing LV,Wei SHI
Telecommunications Science. 2017 Vol. 33 (7): 66-75 doi: 10.11959/j.issn.1000?0801.2017211
Abstract265)   HTML32)    PDF (1211KB)(3261)    Knowledge map   
Big Data Technology:Current Applications and Prospects
Jianxin Liao
Telecommunications Science. 2015 Vol. 31 (7): 1-12 doi: 10.11959/j.issn.1000-0801.2015189
Abstract1368)   HTML93)    PDF (2835KB)(3195)    Knowledge map   
Non-Orthogonal Multiple Access Technology for 5G Systems
Qi Bi,Lin Liang,Shan Yang,Peng Chen
Telecommunications Science. 2015 Vol. 31 (5): 14-21 doi: 10.11959/j.issn.1000-0801.2015137
Abstract1024)   HTML34)    PDF (2629KB)(3143)    Knowledge map   
Theory, application fields and challenge of the blockchain technology
Dong LI,Jinwu WEI
Telecommunications Science. 2016 Vol. 32 (12): 20-26 doi: 10.11959/j.issn.1000-0801.2016309
Abstract1405)   HTML166)    PDF (1731KB)(3112)    Knowledge map   
Key Technologies in Physical Layer of 5G Wireless Communications Network
Shanjin Ni,Junhui Zhao
Telecommunications Science. 2015 Vol. 31 (12): 40-45 doi: 10.11959/j.issn.1000-0801.2015322
Abstract891)   HTML65)    PDF (1714KB)(3093)    Knowledge map   
Analysis and Application Review of User Behavior Trajectory Based on the Location Information
Kang Chen,Xiaoyu Huang,Aibao Wang,Caixia Tao,Yinghui Guan,Lei Li
Telecommunications Science. 2013 Vol. 29 (4): 118-124 doi: 10.3969/j.issn.1000-0801.2013.04.023
Abstract1325)   HTML43)    PDF (1268KB)(2979)    Knowledge map   
Mobile user behavior analysis system and applications based on big data
Hongxun GU,Ke YANG
Telecommunications Science. 2016 Vol. 32 (3): 139-146 doi: 10.11959/j.issn.1000-0801.2016039
Abstract1312)   HTML174)    PDF (1739KB)(2962)    Knowledge map   
An overview of wireless transmission technology utilizing artificial intelligence
Jing ZHANG,Shi JIN,Chaokai WEN,Feifei GAO,Tao JIANG
Telecommunications Science. 2018 Vol. 34 (8): 46-55 doi: 10.11959/j.issn.1000?0801.2018234
Abstract446)   HTML55)    PDF (657KB)(2933)    Knowledge map   
Technologies,standards and applications of LTE-V2X for vehicular networks
Shanzhi CHEN,Jinling HU,Yan SHI,Li ZHAO
Telecommunications Science. 2018 Vol. 34 (4): 1-11 doi: 10.11959/j.issn.1000-0801.2018140
Abstract5653)   HTML329)    PDF (967KB)(2917)    Knowledge map   
Technologies,standards and applications of LTE-V2X for vehicular networks
Shanzhi CHEN,Jinling HU,Yan SHI,Li ZHAO
Telecommunications Science. 2018 Vol. 34 (4): 1-11
doi: 10.11959/j.issn.1000-0801.2018140
Abstract( 5653 )   HTML PDF (967KB) (2917 Knowledge map   
A survey of mobile edge computing
Zishu LI,Renchao XIE,Li SUN,Tao HUANG
Telecommunications Science. 2018 Vol. 34 (1): 87-101
doi: 10.11959/j.issn.1000-0801.2018011
Abstract( 4603 )   HTML PDF (1331KB) (4918 Knowledge map   
Research development and forecast of automatic speech recognition technologies
Haikun WANG,Jia PAN,Cong LIU
Telecommunications Science. 2018 Vol. 34 (2): 1-11
doi: 10.11959/j.issn.1000-0801.2018095
Abstract( 2974 )   HTML PDF (1267KB) (6771 Knowledge map   
Key technology and standardization progress for 5G
Qingyang WANG,Peirong XIE,Shangkun XIONG,Yao WEI,Yu LIU,Wenyi LI,Jinlian WU
Telecommunications Science. 2017 Vol. 33 (11): 112-122
doi: 10.11959/j.issn.1000-0801.2017312
Abstract( 2592 )   HTML PDF (902KB) (2032 Knowledge map   
Current Research and Development Trend of 5G Network Technologies
Hucheng Wang,Hui Xu,Zhimi Cheng,Ke Wang
Telecommunications Science. 2015 Vol. 31 (9): 149-155
doi: 10.11959/j.issn.1000-0801.2015218
Abstract( 2560 )   HTML PDF (1401KB) (5584 Knowledge map   
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Wu Nada
Address: F8, You Dian Publisher Building, No.11, Chengshousi Road, Fengtai District, Beijing, China
Postal Code: 100078
Tel: 010-81055306
        010-81055459
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: