[1] |
Kaihui GAO, Dan LI.
Data center networks with performance guarantee: a survey
[J]. Telecommunications Science, 2023, 39(6): 1-21.
|
[2] |
Shanshan LI, Jianhong XU, Tao LI, Yongjian ZHAO, Zhifei LIU.
Research on digital twin network capability maturity model of telecom operators
[J]. Telecommunications Science, 2023, 39(6): 149-158.
|
[3] |
Lijuan YE, Yiting WANG, Licheng ZHU.
Cellular automata model based power network attack prediction technology
[J]. Telecommunications Science, 2023, 39(4): 173-179.
|
[4] |
Kehong A, Xiaodong HU.
GAN data reconstruction based prediction method of telecom subscriber loss
[J]. Telecommunications Science, 2023, 39(3): 135-142.
|
[5] |
Yanxia TAN, Guangquan WANG, Zelin WANG, Yanlei ZHENG, He ZHANG, Chenfang ZHANG, Sai HAN, Shikui SHEN.
Research on technical scheme of SDN intelligent management and control orchestration system
[J]. Telecommunications Science, 2023, 39(3): 143-152.
|
[6] |
Guanghai LIU, Tian XIAO, Bei LI, Xinzhou CHENG, Yongbei XUE, Yi LI, Xiaomeng ZHU, Yuting ZHENG.
Research on 5G service coverage capability before 4G carrier re-farming to 5G
[J]. Telecommunications Science, 2023, 39(3): 115-123.
|
[7] |
Yudi SUN.
A prediction model of massive 5G network users’ revisit behavior based on telecom big data
[J]. Telecommunications Science, 2023, 39(2): 157-162.
|
[8] |
Chuanbing GONG, Mingshuai YANG, Song WU, Haiping GE, Shouguo ZHANG, Lei LIU, Yunshan QI, Hui XU.
Research on the application of site value evaluation model
[J]. Telecommunications Science, 2023, 39(1): 100-107.
|
[9] |
Qingmin YU, Ying HUANG, Weiguo WANG, Qian ZHANG.
Summary of the applications of 5G and industrial internet
[J]. Telecommunications Science, 2022, 38(Z1): 36-42.
|
[10] |
Zhao SUN, Furong XU, Yantao HAN, Long ZHANG, Jinxia CHENG, Shanshan LIU, Wei DENG, Zhenping HU.
Research on hierarchical service guarantee scheme for 5G network
[J]. Telecommunications Science, 2022, 38(Z1): 134-142.
|
[11] |
Shuai WANG, Dan CHEN, Yu XIAO.
Research on external service capability of 5G industry private network
[J]. Telecommunications Science, 2022, 38(Z1): 143-148.
|
[12] |
Yifan DING, Guangqiu LI, Hui LI.
Physical layer security of NOMA-D2D cooperative wireless system
[J]. Telecommunications Science, 2022, 38(9): 83-94.
|
[13] |
Lunlong ZHONG, Jiongpo LIU, Yongyu LIU.
Induced spoofing detection method based on error valuation accumulation open-loop correction
[J]. Telecommunications Science, 2022, 38(9): 116-128.
|
[14] |
Xinchao ZANG, Ronglin LI.
Research on VoNR voice wireless optimization strategy
[J]. Telecommunications Science, 2022, 38(9): 177-186.
|
[15] |
Shanzhi CHEN.
Critical thinking and suggestions on C-V2X with the developments of intelligent connected vehicles
[J]. Telecommunications Science, 2022, 38(7): 1-17.
|