Please wait a minute...

Current Issue

    25 July 2019, Volume 40 Issue 7
    Papers
    Privacy-preserving photo sharing framework cross different social network
    Fenghua LI,Zhe SUN,Ben NIU,Jin CAO,Hui LI
    2019, 40(7):  1-13.  doi:10.11959/j.issn.1000-436x.2019107
    Asbtract ( 696 )   HTML ( 80)   PDF (1357KB) ( 1286 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With rapid developments of digital photography and social networks,users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns.To address this problem,a privacy-preserving photo sharing framework was proposed,which could apply to extended control and privacy invasion tracing.In extended control scheme,the following users on a dissemination chain was restrained by each user’s privacy policy.Then several privacy areas of photos were encrypted and the access control polices were bound to the uploaded photos,so that any privacy areas on the photos could be hidden away from unwanted viewers even across different social networks.On this basis,the behaviors of users were record by tracing scheme of privacy invasion,the integrality of records was protected by using nested signature algorithm.The correctness,security and performance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations.

    SSRC:source rate control algorithm for delay-sensitive flow in data center network
    Yang YANG,Min CAO,Jiahai YANG,Rong CHE,Wei LIU
    2019, 40(7):  14-26.  doi:10.11959/j.issn.1000-436x.2019070
    Asbtract ( 294 )   HTML ( 25)   PDF (2044KB) ( 804 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Previous work had studied how to ensure the transmission time of delay-sensitive flows,but falled short in its effectiveness for a given period.Motivated by that and based on SDN/OpenFlow framework,a SDN-based source rate control (SSRC) algorithm was proposed.With a global view of network,SSRC can quickly locate the potential congestion node,adjust the transmission rate of source and reduce the response time of SSRC.The experiment results show that compared with DCTCP and other algorithms,SSRC can shorten the completion time of flows by 75% in average,which can ensure the transmission time of delay-sensitive and solve the problem of Incast well.

    Task scheduling algorithm for system-wide information management based on multiple QoS constraints
    Gang LI,Zhijun WU
    2019, 40(7):  27-37.  doi:10.11959/j.issn.1000-436x.2019166
    Asbtract ( 368 )   HTML ( 34)   PDF (1053KB) ( 715 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An ant colony optimization task scheduling algorithm based on multiple quality of service constraint (QoS-ACO) for SWIM was proposed.Focusing on the multiple quality of service (QoS) requirements for task requests completed in system-wide information management (SWIM),considering the task execution time,security and reliability factors,a new evaluate user satisfaction utility function and system task scheduling model were constructed.Using the QoS total utility evaluation function of SWIM service scheduling to update the pheromone of the ant colony algorithm.The simulation results show that under the same conditions,the QoS-ACO algorithm is better than the traditional Min-Min algorithm and particle swarm optimization (PSO) algorithm in terms of task completion time,security,reliability and quality of service total utility evaluation value,and it can ensure that the user's task scheduling quality of service requirements are met,and can better complete the scheduling tasks of the SWIM.

    Efficient 3D imaging method of MIMO radar for moving target
    Wei WANG,Ziying HU,Jia’nan YUE
    2019, 40(7):  38-47.  doi:10.11959/j.issn.1000-436x.2019140
    Asbtract ( 314 )   HTML ( 26)   PDF (905KB) ( 439 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    When compressive sensing (CS) was used to achieve sparse imaging of moving targets,the Doppler frequency caused by motion will increase the processing dimension,change the center frequency of echo and worsen the mutual coherence property of measurement matrix.In order to improve the three-dimensional (3D) imaging performance of MIMO radar for moving targets,an efficient method was proposed.In each dimension,the distribution information of targets was searched respectively and a new low-dimensional measurement matrix was reconstructed accordingly,so the targets’ area was narrowed down.At the same time,in order to optimize the mutual coherence property of measurement matrix,Bayesian method was used to optimize the velocity-dimensional projection matrix to reduce the strong mutual coherence brought by sampling of Doppler frequency,then the efficient sparse imaging could be achieved.The simulation results show that proposed method can improve the efficiency,accurate imaging performance with efficient.

    Invertible secret image sharing scheme based on improved FEMD
    Limin MA,Jiahui WANG
    2019, 40(7):  48-56.  doi:10.11959/j.issn.1000-436x.2019130
    Asbtract ( 301 )   HTML ( 18)   PDF (1638KB) ( 699 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the improved FEMD algorithm an invertible secret image sharing scheme was proposed.Firstly,the embedding process of secret data was improved to make the original pixel pair and the stego pixel-pair to become a one-to-one mapping.Then a unique status flag was set to be calculated to record and process the original status of the over flow pixel-pair.Experimental data and analysis show that the proposed algorithm can guarantee the generation of high quality cryptographic images and solve the problem that the original carrier image can not be restored.

    Multi-step attack detection method based on network communication anomaly recognition
    Ankang JU,Yuanbo GUO,Tao LI,Ziwei YE
    2019, 40(7):  57-66.  doi:10.11959/j.issn.1000-436x.2019142
    Asbtract ( 496 )   HTML ( 40)   PDF (1036KB) ( 1270 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the characteristics of internal fixed business logic,inbound and outbound network access behavior,two classes and four kinds of abnormal behaviors were defined firstly,and then a multi-step attack detection method was proposed based on network communication anomaly recognition.For abnormal sub-graphs and abnormal communication edges detection,graph-based anomaly analysis and wavelet analysis method were respectively proposed to identify abnormal behaviors in network communication,and detect multi-step attacks through anomaly correlation analysis.Experiments are carried out on the DARPA 2000 data set and LANL data set to verify the results.The experimental results show that the proposed method can effectively detect and reconstruct multi-step attack scenarios.The proposed method can effectively monitor multi-step attacks including unknown feature types.It provides a feasible idea for detecting complex multi-step attack patterns such as APT.And the network communication graph greatly reduces the data size,it is suitable for large-scale enterprise network environments.

    Extended access control mechanism for cross-domain data exchange
    Rongna XIE,Yunchuan GUO,Fenghua LI,Guozhen SHI,Yaqiong WANG,Kui GENG
    2019, 40(7):  67-76.  doi:10.11959/j.issn.1000-436x.2019151
    Asbtract ( 457 )   HTML ( 39)   PDF (794KB) ( 773 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constraint control was used to ensure that access to data was authorized before access request,and the propagation control was used for further extension control after obtaining data access right.In addition,by considering data self and data provenance,the direct and indirect access control were realized.Theoretically,the security and effectiveness of the proposed mechanism were proved.Finally,taking the control of electronic invoice as an example,the implementation approach was proposed.The example shows that the proposed mechanism can perform the fine-grained extended control before and after data in the cross-domain and cross-system are exchanged.

    Geographical routing and participant collaboration model based communication mechanism of WSAN
    Haijun ZHAO,Chunlin HE,Bin PU,Mengtian CUI
    2019, 40(7):  77-86.  doi:10.11959/j.issn.1000-436x.2019162
    Asbtract ( 239 )   HTML ( 11)   PDF (1090KB) ( 480 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The communication mechanism of wireless sensor and actor network (WSAN) was studied.Firstly,a proactive location management mechanism based on the update messages sent by mobile actors to sensors and the actors’ scope limited by Voronoi diagram was proposed.Thus,sensors predicted the movement of actors using Kalman filtering of the previously received updates.Then,an optimal energy-aware forwarding rule based on geographical routing was presented for sensor-actor communication,and the delay of the data delivery process was controlled using the power control and the network congestion was dealed with by forcing multiple actors to share the traffic generated in the event area.Finally,based on the characteristics of multiple concurrent events,a model for actor-actor coordination was proposed to coordinate their movements in order to optimally accomplish the tasks.Performance simulation results show that the proposed cooperative communication mechanism for WSAN can effectively reduce end-to-end delays,energy consumption and percentage of packet drops.

    IMM4HT:an identification method of malicious mirror website for high-speed network traffic
    Lei ZHANG,Peng ZHANG,Wei SUN,Xingdong YANG,Lichao XING
    2019, 40(7):  87-94.  doi:10.11959/j.issn.1000-436x.2019089
    Asbtract ( 372 )   HTML ( 35)   PDF (858KB) ( 1016 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.

    Migration compensation algorithm for maneuvering target in passive radar based on FRT-MLVD
    Yongsheng ZHAO,Dexiu HU,Ke JIN,Zhixin LIU,Yongjun ZHAO
    2019, 40(7):  95-103.  doi:10.11959/j.issn.1000-436x.2019158
    Asbtract ( 274 )   HTML ( 4)   PDF (1172KB) ( 686 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    During the long coherent integration time in passive radar,the motion parameters (such as high speed,acceleration and jerk motion,etc.) will bring about range migration (RM) and Doppler frequency migration (DFM),further deteriorate the integration performance.To realize the coherent integration of maneuvering targets with jerk motion,a method based on frequency reversing transform (FRT) and modified Lv’s distribution (MLVD) called FRT-MLVD was proposed to achieve the coherent integration and motion parameters estimation.More specifically,the FRT was firstly proposed to remove RM.Then the MLVD was employed to estimate the acceleration and jerk parameters.After compensating the DFM induced by the acceleration and jerk motion,the residual RM was corrected and the velocity and range was achieved via the KT operation.Simulation results demonstrate that the proposed method can effectively compensate the RM and DFM induced by the target motion parameters in passive radar,and for maneuvering targets with jerk motion,the proposed method achieves a better integration and detection performance over existing methods.

    Early Merge mode decision algorithm for 3D-HEVC based on learning model
    Yue LI,Gaobo YANG,Xiangling DING,Yapei ZHU
    2019, 40(7):  104-113.  doi:10.11959/j.issn.1000-436x.2019165
    Asbtract ( 281 )   HTML ( 13)   PDF (1152KB) ( 353 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    3D-high efficiency video coding (3D-HEVC) standard is an extension of HEVC.Though 3D-HEVC effectively improves the compression efficiency of 3D video,it also brings huge computational complexity.To greatly reduce the 3D-HEVC coding complexity,an early Merge mode decision approach was proposed.The residual signal that encoded by the Merge mode was firstly extracted as feature information.A learning model was established in terms of the residual signals of the coding unit (CU) in current frame that used early Merge mode as the optimal mode.Finally,the residual signal was extracted for the Merge mode of current CU,and the learning model was used to predict whether the Merge mode was the optimal mode or not.Experimental results show that the proposed early Merge mode decision approach reduces the coding times of 3D-HEVC texture views and depth maps about 41.9% and 24.3%,respectively,and the coding performance degradation is almost negligible.Compared with existing early Merge mode decision approaches,the proposed approach further reduces the coding time,and can be easily integrated into the 3D-HEVC test model due to its design simplicity.

    Radio signal recognition based on image deep learning
    Xin ZHOU,Xiaoxin HE,Changwen ZHENG
    2019, 40(7):  114-125.  doi:10.11959/j.issn.1000-436x.2019167
    Asbtract ( 1427 )   HTML ( 180)   PDF (4111KB) ( 2792 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A technical idea was innovatively proposed that uses image deep learning to solve the problem of radio signal recognition.First,the radio signal was transformed into a two-dimensional picture,and the radio signal recognition problem was transformed into the object detection problem in the field of image recognition.Then,the advanced achievements about image recognition were used to improve the intelligence and ability of radio signal recognition in complex electromagnetic environment.Based on the proposed idea,a novel radio signal recognition algorithm named RadioImageDet was proposed.The experimental results show that the algorithm can effectively identify the waveform types and time/frequency coordinates of radio signals.After training and testing on the self-collected data set with 12 types and 4 740 samples,the accuracy reaches 86.04% and the mAP value reaches 77.72,while the detection time is only 33 ms on the medium configured desktop computer.

    Mobile platform continuous authentication scheme based on gait characteristics
    Li YANG,Zhuoru MA,Chenghui ZHANG,Qingqi PEI
    2019, 40(7):  126-134.  doi:10.11959/j.issn.1000-436x.2019146
    Asbtract ( 332 )   HTML ( 14)   PDF (1084KB) ( 854 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The popularity of smart phones renders people extremely high requirements for safety.But the traditional one-time authentication method can’t continuously guarantee the security of equipment.To solve the problem,a continuous authentication scheme based on gait characteristics was proposed to realize the identification of current visitors.Moving average filtering,threshold-based useful information interception method and other operations were adopted to reduce noise interference.Template interception was used to maximize the utilization of information,and an optimal combination of time domain features and frequency domain features were proposed to reduce the storage space requirement of users’ information.Finally,the support vector machine realized the identity authentication function.Experiments show that the proposed scheme can effectively authenticate the identities of visitors.

    Provably secure rational delegation computation protocol
    Youliang TIAN,Qiuxian LI,Duo ZHANG,Linjie WANG
    2019, 40(7):  135-143.  doi:10.11959/j.issn.1000-436x.2019133
    Asbtract ( 339 )   HTML ( 20)   PDF (707KB) ( 748 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A provably secure rational delegation computation scheme was proposed to solve the requirement of security issues in rational delegate computation.Firstly,game theory was introduced into delegation computation and according to rational participants behavior preferences analysis,a rational delegate computing game model was designed.Secondly,according to the equilibrium demand of game model and the security requirement of rational delegation computation,a rational security model was established.Thirdly,combining Yao's garbled circuit with its advantages of re-randomization,as well as full homomorphic encryption technology,the rational delegation computation protocol was constructed.And the combination of strategies in the protocol could reach the Nash equilibrium state.Finally,the security of the protocol and the privacy of the input and output were proved according to the rational security model,and the performance analysis shows the validity of the protocol.The proposed rational delegation computing protocol not only satisfies the traditional security,but also considers the behavioral preference of participants,which is more in line with the delegationcomputing mode under the big data environment.

    Robust angle estimation method for noncircular targets in MIMO radar with mutual coupling
    Xianpeng WANG,Yuehao GUO,Mengxing HUANG,Chong SHEN,Chunjie CAO,Wenlong FENG
    2019, 40(7):  144-150.  doi:10.11959/j.issn.1000-436x.2019163
    Asbtract ( 277 )   HTML ( 11)   PDF (787KB) ( 718 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A robust angle estimation method for noncircular targets based on unitary tensor decomposition with mutual coupling in multiple-input multiple-output (MIMO) radar was proposed.Firstly,utilizing the banded symmetric Toeplitz structure of the mutual coupling matrix to eliminate the influence of unknown mutual coupling in tensor field.Then a special augmented tensor was constructed to capture the no circularity and its inherent tensor multidimensional structure of noncircular signals.And taking advantage of the centro-Hermitian characteristic of the augmented tensor to transform the sub-tensor into real-values tensor by the unitary transformation.Finally,the signal subspace estimation based on tensor was obtained by taking advantage of the higher-order singular value decomposition (HOSVD) technology,and then the direction-of-departure (DoD) and direction-of-arrival (DoA) estimation was obtained by utilizing the real-values subspace technology.Due to the consideration of both the noncircularity and multidimensional structure,the proposed algorithm has better recognition performance than the existing angle estimation methods.At the same time,the proposed algorithm only requires real-valued operations and has lower computational complexity.Simulation experiments verify the effectiveness and superiority of the proposed algorithm.

    Bayesian network structure learning algorithm based on hybrid binary salp swarm-differential evolution algorithm
    Bin LIU,Ruixing FAN,Haoran LIU,Liyue ZHANG,Haiyu WANG,Chunlan ZHANG
    2019, 40(7):  151-161.  doi:10.11959/j.issn.1000-436x.2019124
    Asbtract ( 285 )   HTML ( 19)   PDF (1483KB) ( 611 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the disadvantages of Bayesian network structure learned by heuristic algorithms,which were trapping in local minimums and having low search efficiency,a method of learning Bayesian network structure based on hybrid binary slap swarm-differential evolution algorithm was proposed.An adaptive scale factor was used to balance local and global search in the swarm grouping stage.The improved mutation operator and crossover operator were taken into salp search strategy and differential search strategy respectively to renew different subswarms in the update stage.Two-point mutation operator was adopted to improve the swarm’s diversity in the stage of merging of subswarms.The convergence analysis of the proposed algorithm demonstrates that best structure can be found through the iterative search of population.Experimental results show that the convergence accuracy and efficiency of the proposed algorithm are improved compared with other algorithms.

    Multi-ray channel modeling for programmable wireless environments in the terahertz band
    Wenyu LUO,Hechao LIU
    2019, 40(7):  162-168.  doi:10.11959/j.issn.1000-436x.2019161
    Asbtract ( 375 )   HTML ( 21)   PDF (829KB) ( 864 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Terahertz communication system based on programmable wireless environment allowed programming customization of electromagnetic wave propagation in the most suitable ways for different wireless devices.It could not only improve serious fading,interference and non-line-of-sight problems,but also significantly enhance the security and privacy of the system.The channel modeling of terahertz wireless communication in programmable wireless environment was focused.Firstly,a multi-ray channel model for terahertz-band programmable wireless environment was established based on ray tracing technology as well as the propagation model of line-of-sight and non-line-of-sight.Then,based on the established propagation model,reflection coefficient,the broadband channel capacity under the water-filling power allocation algorithm and the RMS delayed extension were further studied.The simulation and analysis results show that the programmable wireless environment greatly reduces the influence of path loss and multipath fading in terahertz wireless transmission through active interference in electromagnetic wave transmission,improves the transmission capacity of terahertz communication system,which provides a reference for the later design of terahertz communication system,especially indoor terahertz communication system.

    Comprehensive Review
    Research on the IP alias resolution technology
    Zhanfeng WANG,Guang CHENG,Chao HU,Han LI,Nianfeng WENG,Huaping CAO
    2019, 40(7):  169-185.  doi:10.11959/j.issn.1000-436x.2019134
    Asbtract ( 526 )   HTML ( 56)   PDF (1429KB) ( 710 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    IP alias resolution,the procedure of identifying IP addresses belonging to the same router,is a critical step in Internet topology inference.It can convert the Internet logical topology into physical topology,and bridge the gap between the virtual world and real world.First the concept of IP alias resolution was introduced and the classical IP alias relationships were analyzed.Then the IPv4 alias resolution algorithms and the IPv6 alias resolution algorithms were discussed in detail separately.Finally,through the comprehensive analysis and comparison of all the algorithms,the research directions in the future especially in IPv6 alias resolution were pointed out in three folds such as alias target set selection,fingerprint selection and inference methods.

    Correspondences
    Robust resource allocation algorithm for heterogeneous wireless networkwith SWIPT
    Yongjun XU,Yuan HU,Guoquan LI,Jinzhao LIN,Qianbin CHEN
    2019, 40(7):  186-196.  doi:10.11959/j.issn.1000-436x.2019160
    Asbtract ( 369 )   HTML ( 24)   PDF (974KB) ( 884 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To improve energy efficiency and robustness of heterogeneous wireless networks with wireless information and power transfer,the robust joint transmit power and power splitting resource allocation problem was studied.Based on mini-max probability machine and Dinkelbach method,the original NP-hard problem was transformed into a solvable convex optimization form,meanwhile a distributed dual resource allocation algorithm was proposed.Additionally,both computational complexity and robust sensitivity were analyzed.Simulation results show that the proposed algorithm can guarantee the quality of service requirements of macro cellular users and femtocell users under channel uncertainties.

    Multi-target localization algorithm based on adaptive grid in wireless sensor network
    Tianjing WANG,Xiuqin LI,Guangwei BAI,Hang SHEN
    2019, 40(7):  197-207.  doi:10.11959/j.issn.1000-436x.2019129
    Asbtract ( 459 )   HTML ( 46)   PDF (1186KB) ( 691 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The RSS-based multi-target localization has the natural property of the sparsity in wireless sensor networks.A multi-target localization algorithm based on adaptive grid in wireless sensor networks was proposed,which divided the multi-target localization problem into two phases:large-scale grid-based localization and adaptive grid-based localization.In the large-scale grid-based localization phase,the optimal number of measurements was determined due to the sequential compressed sensing theory,and then the locations of the initial candidate grids were reconstructed by applying l<sub>p</sub> (0&lt; p&lt;1) optimization.In the adaptive grid-based localization phase,the initial candidate grids were adaptively partitioned according to the compressed sensing theory,and then the locations of the targets were precisely estimated by applying l<sub>p</sub>optimization once again.Compared with the traditional multi-target localization algorithm based on compressed sensing,the simulation results show that the proposed algorithm has higher localization accuracy and lower localization delay without foreknowing the number of targets.Therefore,it is more appropriate for the multi-target localization problem in the large-scale wireless sensor networks.

    Incentive mechanism based on auction model for mobile crowd sensing network
    Yuanni LIU,Yaoxi LI,Huicong LI,Wanlin LI,Jianhui ZHANG,Guofeng ZHAO
    2019, 40(7):  208-222.  doi:10.11959/j.issn.1000-436x.2019138
    Asbtract ( 519 )   HTML ( 41)   PDF (1331KB) ( 991 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The selfishness and uncertainty of user behaviors in the mobile crowd sensing network make them unwilling to participate in sensing activities,which may result to a lower sensing task completion rate.To deal with these problems,an incentive mechanism based on auction model was proposed.In order to maximize the utility of each user,the proposed incentive method based on reverse auction (IMRA) leveraged a task-centric method to choose winners,and payed them according to a critical-price strategy.Furthermore,the proposed user-bidirectional interaction incentive mechanism (UBIM) helped drop-out users (buyers) to transfer their unfinished tasks to new users.Simulation results show that,compared with TRAC and IMC-SS,IMRA can achieve a better performance in terms of average user utility and tasks coverage ratio,and the task completion ratio can also be improved by UBIM.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: