Please wait a minute...

Current Issue

    25 November 2022, Volume 43 Issue 11
    Papers
    Privacy-preserving trajectory similarity computation method
    Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE
    2022, 43(11):  1-13.  doi:10.11959/j.issn.1000-436x.2022223
    Asbtract ( 239 )   HTML ( 58)   PDF (3100KB) ( 205 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient.

    Blockchain-based computing and wireless communication resource joint management double auction model
    Yan SUN, Ao XIONG, Chengling JIANG, Wei WANG, Dongxiao YU, Shaoyong GUO
    2022, 43(11):  14-25.  doi:10.11959/j.issn.1000-436x.2022210
    Asbtract ( 203 )   HTML ( 43)   PDF (1730KB) ( 436 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In wireless communication networks, the stock of spectrum, computing, storage and other resources at the edge was limited.The traditional decentralized and exclusive resource allocation resulted in weak resource reuse capability and low utilization rate.At the same time, it was difficult to ensure the fairness of resource sharing in the traditional resource scheduling process due to the lack of trust between the owners.First, a double auction model of computing and wireless communication resource joint management based on blockchain was proposed.In the model, a resource market was established, in which resource buyers and sellers allocated resources through double auctions.Secondly, blockchain was used to store the resource information of buyers and sellers to solve the mutual trust problem of all parties in the network.Finally, the experimental simulation was carried out to verify that the proposed model effectively improved the system performance and resource utilization efficiency.

    Adaptive anti-jamming technologies based on direct sequence spread spectrum and single carrier frequency domain equalization
    Fanglin GU, Yuzhen HUANG, Ying ZHAO, Haitao ZHAO, Jibo WEI
    2022, 43(11):  26-34.  doi:10.11959/j.issn.1000-436x.2022213
    Asbtract ( 219 )   HTML ( 29)   PDF (2171KB) ( 444 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the performance limitation of direct sequence spread spectrum system in complex multipath environment, an adaptive anti-jamming spread spectrum framework that organically combines single carrier frequency domain equalization (SCFDE) and direct sequence spread spectrum (DSSS) technologies was proposed.The frequency multipath fading was overcame by frequency domain equalization, and the transmission rates and high reliability was reconfigured by deploying variable spread factors.Moreover, the inherent fast Fourier transform process was made full use at the receiver to realize the adjoint detection and analysis of interference intensity, interference type and other information, etc.Then, the frequency domain bearing point online was optimized and selected to improve the adaptability to the interference, especially blocking interference.The simulation results show that the proposed direct spread spectrum waveform based on SCFDE has good communication performance in both Gaussian and multipath environments, and the notch of some frequency bands has little impact on the communication performance, which verifies the effectiveness of anti-jamming by adaptive optimizing information frequency domain bearers.

    Underdetermined mixing matrix estimation algorithm based on tensor analysis
    Baoze MA, Guojun LI, Cuiling XIANG, Yang XU
    2022, 43(11):  35-43.  doi:10.11959/j.issn.1000-436x.2022206
    Asbtract ( 146 )   HTML ( 18)   PDF (1548KB) ( 192 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problems of difficult to extract effective feature information and the slow convergence speed of the underdetermined matrix estimation, an underdetermined matrix estimation algorithm of instantaneous mixtures based on tensor analysis was proposed to overcome the constraint of signal sparsity.In the proposed algorithm, the symmetric third-order tensor was constructed via the autocovariance matrix of segmentation sub-block, which was compressed into a kernel tensor to reduce the size of the data.An enhanced line search technology was applied to speed up the convergence of alternating least squares method, and the factor matrix was used as the measure of the mixing matrix estimation, but the selection of the number of segmentation sub-blocks was an open problem.Experimental results demonstrate that the proposed algorithm outperforms the sparse transformation method and the traditional high-order statistical method in handling the underdetermined mixing matrix estimation.

    QGA-based network service extension algorithm in NFV
    Hang QIU, Hongbo TANG, Wei YOU, Yu ZHAO, Yi BAI
    2022, 43(11):  44-52.  doi:10.11959/j.issn.1000-436x.2022218
    Asbtract ( 136 )   HTML ( 24)   PDF (954KB) ( 331 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To meet the client’s new business requirements or add additional security protection functions, the already hosted network service extension problem in the cloud network based on network function virtualization was researched.The network service extension in the cloud network was modeled as an integer linear programming, considering the impact on initial service, extended graph deployment, resource capacity and virtual network function affinity constraints, and so on.To deal with the computational complexity and dynamism of future large-scale cloud networks, a QGA-based network service extension algorithm was proposed to improve solution efficiency and solution quality through quantum parallel computing.Simulation results prove that the efficient performance of the proposed algorithm in terms of extension successful ratio and average resource costs, and the proposed algorithm has low time complexity.

    LDoS attack detection method based on simple statistical features
    Xueyuan DUAN, Yu FU, Kun WANG, Bin LI
    2022, 43(11):  53-64.  doi:10.11959/j.issn.1000-436x.2022216
    Asbtract ( 201 )   HTML ( 41)   PDF (2570KB) ( 414 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the demand for LDoS attack detection in a real network environment.By studying the principle of LDoS attack and analyzing the features of LDoS attack traffic, a detection method of LDoS attack based on simple statistical features of network traffic was proposed.By using the simple statistical features of network traffic packets, the detection data sequence was constructed, the time correlation features of input samples were extracted by deep learning technology, and the LDoS attack judgment was made according to the difference between the reconstructed sequence and the original input sequence.Experimental results show that the proposed method can effectively detect the LDoS attack traffic in traffic and has strong adaptability to heterogeneous network traffic.

    Chinese semantic and phonological information-based text proofreading model for speech recognition
    Meiyu ZHONG, Peiliang WU, Yan DOU, Yi LIU, Lingfu KONG
    2022, 43(11):  65-79.  doi:10.11959/j.issn.1000-436x.2022222
    Asbtract ( 203 )   HTML ( 37)   PDF (2706KB) ( 313 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To study the influence of Chinese Pinyin on detecting and correcting text errors in speech recognition, a text proofreading model based on Chinese semantic and phonological information was proposed.Five Pinyin coding methods were designed to construct the character-Pinyin embedding vector that was employed as the input of the Seq2Seq model based on gated recurrent unit.At the same time, the attention mechanism was adopted to extract the Chinese semantic and phonological information of sentences to correct speech recognition errors.Aiming at the problem of insufficient labeled corpus, a data augmentation method was introduced, which could automatically obtain annotated corpora by exchanging the initials or finals of Chinese Pinyin.The experimental results on AISHELL-3’s public data show that phonological information is conducive to the text proofreading model to detect and correct text errors after speech recognition, and the proposed data augmentation method can improve the error detection performance of the model.

    Enhanced Beidou user equipment access authentication protocol based on location key
    Jin CAO, Qiuyu BU, Yuanyuan YANG, Hui LI, Qiao LIU, Maode MA
    2022, 43(11):  80-89.  doi:10.11959/j.issn.1000-436x.2022214
    Asbtract ( 186 )   HTML ( 23)   PDF (1499KB) ( 399 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the shortcomings of the existing Beidou user equipment access solutions such as prolonged authentication, and in response to the need of user privacy protection, a user equipment access authentication protocol based on location key was proposed, which realized the mutual authentication and session key negotiation between entities.Combining Beidou’s location information and master key to form a two-factor, the proposed protocol solved the security problem of the master key leaking due to the equipment being captured during the authentication process to some extent.The proposed protocol can meet different security requirements through the verification of the Scyther formal tool.Compared with other similar schemes, it has better performance overhead, and is suitable for Beidou satellite navigation system with limited node resources.

    Privacy-preserving precise profile matching in mobile social network
    Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao
    2022, 43(11):  90-103.  doi:10.11959/j.issn.1000-436x.2022208
    Asbtract ( 247 )   HTML ( 36)   PDF (1424KB) ( 514 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Profile matching is a key feature in mobile social networking applications, where friends are recommended to requesters by comparing the similarity of attributes between them.However, users’ personal information is exposed to the risk of privacy disclosure in the process of profile matching.The existing solutions exist some issues such as inaccurate matching results or inability to meet users’ requirements for multi-dimensional privacy protection.Baesed on this, a privacy-preserving precise profile matching (P3M) scheme was proposed, which allowed users to flexibly set the matching range of attributes and distances according to their requirements.The Paillier encryption was utilized to ensure data security of users, and a secure dot product protocol was designed to achieve secure ciphertext comparison of user attributes and query ranges.The P3M realized multi-dimensional privacy-preserving of users including user feature attributes and location attributes.Finally, the correctness and security of P3M scheme were analyzed and proved in detail, and extensive experimental results verified the effectiveness and efficiency of P3M scheme.

    Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
    Lihua SONG, Yangyang JIANG, Changyou XING, Guomin ZHANG
    2022, 43(11):  104-116.  doi:10.11959/j.issn.1000-436x.2022226
    Asbtract ( 139 )   HTML ( 18)   PDF (2059KB) ( 189 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.

    Comprehensive recognition algorithm of RS code based on fast code root trial
    Xiaolin ZHANG, Xiuqiao LI, Rongchen SUN
    2022, 43(11):  117-126.  doi:10.11959/j.issn.1000-436x.2022219
    Asbtract ( 119 )   HTML ( 10)   PDF (2037KB) ( 382 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of high computation and high missed alarm probability of RS (Reed-Solomon) codes for recognition, comprehensive recognition algorithm of RS codes based on fast code root trial was proposed.Firstly, the check relationship was solved in binary equivalently and fast code root trial was used to check parameters in sequence.Secondly, according to distribution characteristics of the combined code roots, m-level primitive polynomial field and error correction ability was associatively determined.Finally, the short codes and long codes were given different confidence weights and the determined parameters were comprehensively analyzed.The optimal parameter was selected and the generate polynomial was calculated.The proposed algorithm did not need prior information such as signal-to-noise ratio (SNR), and had good adaptability.The simulation results show that the proposed algorithm can effectively reduce the missed alarm probability under the condition of low complexity.Compared with the conventional hard decision algorithm, the performance of the proposed algorithm is improved, and the parameter recognition of RS codes can be completed quickly.

    Short wave protocol signals recognition based on Swin-Transformer
    Zhengyu ZHU, Pengfei CHEN, Zixuan WANG, Kexian GONG, Di WU, Zhongyong WANG
    2022, 43(11):  127-135.  doi:10.11959/j.issn.1000-436x.2022209
    Asbtract ( 187 )   HTML ( 15)   PDF (3234KB) ( 722 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem that it is difficult to identify the protocol to which the signal belongs in the complex SW channel environment, a SW protocol signal recognition algorithm based on Swin-Transformer neural network model was proposed.Firstly, the gray-scale time-frequency map of the signal was obtained by using the time-frequency analysis method as the input of the neural network.Secondly, a neural network model based on swing transformer was designed to extract the features of the signal time-frequency map.Finally, the mapping relationship between the features and the protocol was established to realize the recognition of the signal protocol.The simulation results show that the recognition accuracy of the proposed algorithm is close to 100% in the Gaussian channel with SNR greater than -4 dB, which is higher than the existing algorithms.In addition, under the channel conditions of strong interference and multipath delay fading, the proposed algorithm still has a high SW protocol signals recognition rate.

    Reference frame list optimization algorithm in video coding by quality enhancement of the nearest picture
    Junyan HUO, Ruipeng QIU, Yanzhuo MA, Fuzheng YANG
    2022, 43(11):  136-147.  doi:10.11959/j.issn.1000-436x.2022185
    Asbtract ( 172 )   HTML ( 17)   PDF (2640KB) ( 491 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Interframe prediction is a key module in video coding, which uses the samples in the reference frames to predict those in the current picture, thus helps to represent the complex video by transmitting a small amount of the prediction residual.In lossy video coding, the qualities of reference frames are affected by the quantization distortion, which lead to poor prediction accuracy and performance degradation.Targeted at the low latency video services, a reference frame list optimization algorithm was proposed, which enhanced the quality of the nearest reference frame by a deep learning-based convolutional neural network, and integrated the enhanced reference frame into the reference frame list to improve the accuracy of interframe prediction.Compared with H.265/HEVC reference software HM16.22, the proposed algorithm provides BD-rate savings of 9.06%, 14.92% and 13.19% for Y, Cb and Cr components, respectively.

    Analysis of MSK jamming effectiveness based on effective jamming coefficient
    Zengmao CHEN, Qian YAN, Zhiguo SUN, Rongchen SUN
    2022, 43(11):  148-157.  doi:10.11959/j.issn.1000-436x.2022215
    Asbtract ( 148 )   HTML ( 17)   PDF (1602KB) ( 288 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the problem of communication jamming effectiveness, an effective jamming coefficient was proposed as an evaluation metric based on the correlation between jamming and communication signals, and the impact of orthogonal receivers was analyzed.Specially, minimum shift keying (MSK) and several typical binary modulation signals were chosen as the target communication and jamming signals, respectively.Jamming effectiveness evaluation was performed for the above mentioned scenario by deriving its theoretical bit error rate (BER) formulas.Moreover, for coherent jamming scenario with MSK being the jamming signal, the impact of its phase difference, frequency difference and delay on the jamming effectiveness were also systematically analyzed.The analysis suggests that to achieve better jamming effectiveness, different jamming modulation scheme should be chosen according to the signal-to-noise (SNR) of the jamming communication signal.Simulation has also shown that there is a good match between the derived theoretical analysis and numerical simulation of the proposed method effectiveness, which has proven its accuracy and validity.

    Multi-scale guided filtering integrated with superpixel and patch shift
    Jianwu LONG, Jiangzhou ZHU
    2022, 43(11):  158-170.  doi:10.11959/j.issn.1000-436x.2022220
    Asbtract ( 125 )   HTML ( 13)   PDF (10692KB) ( 96 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to avoid the phenomenon that edges were easily blurred during filtering, a multi-scale guided filtering integrated with superpixel and patch shift was proposed.Firstly, the bilateral filtering was applied to an input image to get more accurate superpixel regions.Then, the overlapping was used as the final filtering region, which was formed by the local window and the superpixel.The local window was selected by a metric function so that it did not contain edge information as much as possible.Finally, a small-scale window was used to preserve the edges, and then the window scale was increased for iterative guided filtering.The final filtering output was calculated by fusing the results of different window scales to smooth details while preserving the structural edges.Additionally, the evaluation index of filtering results quality was proposed and compared in different algorithms.The proposed algorithm has stronger edge preservation ability and can obtain better filtering effectiveness than other algorithms.

    Reconfigurable intelligent surface assisted resource optimization method for heterogeneous network
    Xianhao SHEN, Ziling ZENG, Shaohua NIU
    2022, 43(11):  171-182.  doi:10.11959/j.issn.1000-436x.2022217
    Asbtract ( 211 )   HTML ( 26)   PDF (1791KB) ( 273 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For reconfigurable intelligent surface (RIS)-assisted heterogeneous network slicing, a resource optimization method with joint resource allocation and phase shift optimization was proposed.A joint optimization problem with different objectives was constructed for different services in heterogeneous networks.For enhanced mobile broadband (eMBB) services, the resource block allocation, power allocation and RIS phase shift matrix were jointly optimized based on the alternating optimization algorithm to maximize the total traversal capacity of eMBB users.For ultra-reliable low-latency communication (URLLC) services, a pre-configured RIS-based heuristic URLLC allocation algorithm was proposed with the objectives of maximizing the URLLC packet reception rate and minimizing the amount of eMBB rate loss.Simulation results demonstrate that the proposed algorithm achieves about 99.99% URLLC packet reception rate using only 80 RISs compared to 95.95% URLLC packet reception rate when no RISs are deployed, while the total eMBB rate is increased by 86.24%.

    Comprehensive Reviews
    Survey on approaches of stream cipher cryptanalysis
    Zhaocun ZHOU, Dengguo FENG
    2022, 43(11):  183-198.  doi:10.11959/j.issn.1000-436x.2022186
    Asbtract ( 282 )   HTML ( 45)   PDF (811KB) ( 537 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cryptanalysis plays an essential role in the design of ciphers algorithm.Based on this, the common approaches were reviewed and investigated to clarify their relations.These approaches were categorized into four classes according to their main techniques, i.e., the correlation-based approaches, the differentials-based approaches, the algebraic-equations-based approaches and the time-memory data trade-off (TMDTO) approaches.And their principles, basic technical ideas and developments were presented, and their main features were summarized.Moreover, the future of stream cipher cryptanalysis approach was prospected at last.

    Survey on backscatter communication for zero-power IoT
    Xiaoxi ZHANG, Yongjun XU
    2022, 43(11):  199-212.  doi:10.11959/j.issn.1000-436x.2022199
    Asbtract ( 315 )   HTML ( 50)   PDF (8146KB) ( 233 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Although Internet of things (IoT) can enhance the quality of people’s life, but it also brings the problems of energy consumption and network transmission congestion.To solve the above problems, backscatter communication technology for zero-power IoT has been proposed.Thus, it is of great significance to survey the state-of-the-art technologies and study the relevant challenges.Firstly, the basic definition and technical characteristics of zero-power IoT and backscatter communications were presented.Secondly, several typical application scenarios for zero-power backscatter communications in 6G were introduced.Thirdly, the system structure of zero-power backscatter communications was given and the potential key technologies of zero-power backscatter communications for 6G applications were also discussed.Finally, the technical challenges and potential research directions for zero-power backscatter communications were analyzed.Additionally, the proposed overview was of important theoretical significance and practical values for promoting the development of IoT toward full scenes, full spectrum, and many types of services.

    Correspondences
    Dual time scale network slicing algorithm based on D3QN for B5G multi-service scenarios
    Geng CHEN, Shuhu QI, Fei SHEN, Qingtian ZENG
    2022, 43(11):  213-224.  doi:10.11959/j.issn.1000-436x.2022207
    Asbtract ( 276 )   HTML ( 42)   PDF (1770KB) ( 671 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To effectively meet the differentiated quality of service (QoS) requirements of different slices, a dual time scale network slicing resource allocation algorithm based on dueling double DQN (D3QN) was proposed for B5G multi-service scenarios.The joint resource slicing and scheduling problem was formulated, with the weighted sum of the normalized spectral efficiency (SE) and the QoS of users indices of different slices as the optimization objective.On large time scale, the SDN controller used the D3QN algorithm to pre-allocate resources to different slices based on the resource requirements of each service, and then performed BS-level resource updating based on the load status of BS.On small time scale, the BS scheduled resources to end-users by using the round-robin scheduling algorithm.The simulation results show that the proposed algorithm has excellent performance in ensuring the QoS requirements of slice users, SE and system utility.Compared with the other 4 baseline algorithms, the system utility is improved by 3.22%, 3.81%, 7.48% and 21.14%, respectively.

    Multi-view graph neural network for fraud detection algorithm
    Zhuo CHEN, Miao ZHU, Junwei DU
    2022, 43(11):  225-232.  doi:10.11959/j.issn.1000-436x.2022221
    Asbtract ( 311 )   HTML ( 51)   PDF (1579KB) ( 559 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem that in the field of fraud detection, imbalance labels and lack of necessary connections between fraud nodes, resulting in fraud detection tasks not conforming to the hypothesis of homogeneity of graph neural networks, multi-view graph neural network for fraud detection (MGFD) algorithm was proposed.First, A structure-independent encoder was used to encode the attributes of nodes in the network to learn the difference between the fraud node and the normal node.The hierarchical attention mechanism was designed to integrate the multi-view information in the network, and made full use of the interaction information between different perspectives in the network to model the nodes on the basis of learning differences.Then, based on the data imbalance ratio sampled subgraph, the sample was constructed according to the connection characteristics of fraud nodes for classification, which solved the problem of imbalance sample labels.Finally, the prediction label was used to identify whether a node is fraudulent.Experiments on real-world datasets have shown that the MGFD algorithm outperforms the comparison method in the field of graph-based fraud detection.

    Research on inter-core crosstalk characteristics of real multi-core fibers with multi-core excitation
    Lian XIANG, Hongfeng PAN, Shulin JIN, Weidong SHAO
    2022, 43(11):  233-241.  doi:10.11959/j.issn.1000-436x.2022211
    Asbtract ( 172 )   HTML ( 32)   PDF (1736KB) ( 360 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the coupled power theory, the characteristics of optical power and inter-core crosstalk (ICXT) were studied in real multi-core fibers (MCF) with multi-core excitation.According to the simplified coupled power equation of 7-core fiber, the analytical expressions of optical signal power and ICXT in each fiber core were deduced under three multi-core excitation conditions.Simulation results show that, after long-distance transmission, the optical power of each core would converge to a fixed value and reach a dynamic equilibrium state, and its convergence distance decreased exponentially with the increase of bending radius and gradually tended to a fixed value.In addition, in order to study the relationship between multi-core excitation and single-core excitation, the analytical expressions of the power and ICXT in coupled cores were deduced under simultaneous excitation and separate excitation of multi-core.Research shows that the contribution of multi-core excitations to the ICXT of coupled core is irrelevant, and the ICXT of multi-core excitation is equivalent to the sum of the ICXT obtained by the excitation of the cores separately.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: