Please wait a minute...

Current Issue

    25 December 2022, Volume 43 Issue 12
    Topics: Applications of Information Metamaterials in Mobile Communications
    Design of amplifying information metasurface for enhancing signal coverage
    Lijie WU, Hanqing YANG, Qiang CHENG, Tiejun CUI
    2022, 43(12):  3-12.  doi:10.11959/j.issn.1000-436x.2022143
    Asbtract ( 263 )   HTML ( 39)   PDF (2070KB) ( 328 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Traditional information metasurfaces can be used in wireless relay systems to control the propagation direction of electromagnetic waves due to their capability to control the amplitude and phase.However, owing to the lack of signal amplification function, these metasurfaces have a limited operating distance.Thus, a large size of metasurfaces is usually demanded to realize the signal coverage of dead zones.To solve this problem, an amplifying information metasurface was designed to realize the 2 bit phase manipulation and signal amplification function within the broad band from 2.7 to 3.1 GHz.Furthermore, a power dividing and combining network was introduced to combine the 1×8 metasurface elements into an array with only one amplifier, which greatly reduced the number of amplifiers, the hardware cost, and the power consumption.The simulation results indicate that the array can realize beamforming and signal amplification over a broad band.Therefore, the proposed amplifying information metasurface array may find important applications in wireless relay systems and provide a new solution to enhancing the signal coverage and reducing the size of the metasurface array.

    Review of array antenna and its application based on electromagnetic surface
    Songlin ZHOU, Junwen TANG, Luohao LIU, You WU, Changhao LIU, Yifei JIN, Fan YANG, Shenheng XU, Maokun LI
    2022, 43(12):  13-23.  doi:10.11959/j.issn.1000-436x.2022225
    Asbtract ( 302 )   HTML ( 55)   PDF (6460KB) ( 217 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Array antennas based on electromagnetic surface is a frontier in the field of electromagnetic, based on this, the development, research status and applications of electromagnetic surface array antennas were summarized.First, the early development of electromagnetic surface was introduced.Then, the current research status of electromagnetic surface array was summarized, including reconfigurable design, broadband, terahertz, multi-polarization, etc.Subsequently, some applications in communication, radar and electromagnetic environment regulation were presented.Finally, the possible research directions of electromagnetic surface array antenna were expected.

    RIS-based indoor wireless communication signal enhancement system
    Kui TANG, Qi HU, Junming ZHAO, Ke CHEN, Yijun FENG
    2022, 43(12):  24-31.  doi:10.11959/j.issn.1000-436x.2022228
    Asbtract ( 462 )   HTML ( 96)   PDF (3774KB) ( 563 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By utilizing the tunable performances of the reconfigurable intelligent surface (RIS) to manipulate the reflected electromagnetic waves, an indoor wireless communication signal enhancement system was constructed, which could improve the signal quality of the receiving terminal in where the initial wireless signals were weak.First, a RIS unit cell with dynamically tunable phase characteristics was designed, and the dynamic change of the 2 bit reflection phases was realized by switching the working states of the two active diodes.Then, experiments were conducted to verify that the proposed RIS could dynamically reshape the beam direction.Finally, a host computer and field programmable gate array (FPGA) were used to realize the intelligent control of the coding sequences applied onto the proposed RIS.By changing the spatial phase distribution on the RIS aperture, the output beam could be controlled in real-time.By traversing the pre-loaded coding sequences, the enhancement of received signal in indoor wireless environments had been experimentally demonstrated.Both simulation and experiment results verify that the proposed RIS system can effectively and dynamically improve the quality of the indoor wireless signals.The received signal is increased by an average of 8.9 dB, with a maximum of 22 dB.The proposed work may provide basic hardware technical support for the optimization of 5G and the next-generation communication networks.

    Indoor wireless signal coverage and enhancement based on passive reconfigurable intelligent metasurface
    Haixia LIU, Hao YI, Xiangjin MA, Shuyao YUE, Xudong KONG, Pei MA, Yuxin ZENG, Long LI
    2022, 43(12):  32-44.  doi:10.11959/j.issn.1000-436x.2022229
    Asbtract ( 326 )   HTML ( 59)   PDF (5943KB) ( 225 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Reconfigurable intelligent metasurface (RIS) is a new type of artificial electromagnetic metamaterial, which can control the frequency, amplitude, phase, polarization, propagation direction and wave type of electromagnetic wave flexibly.In the field of wireless communication, RIS can be used to reconstruct the wireless communication channel to achieve blind coverage of wireless signals and improve the communication quality.First, the development and research status of RIS, the key technologies and application scenarios of RIS were summarized and analyzed.Then, a new passive RIS was proposed to realize the characteristics of the aperture reconfiguration and beam reconfiguration through passive coding and splicing principle, which had the advantages of low cost, low power consumption and low complexity.Finally, the blind area coverage enhancement experiment of indoor wireless signal based on passive reflection metasurface was carried out.The effectiveness of passive splicing metasurface in wireless communication blind coverage scenarios was proved by comparison between simulation and field measurement.In addition, for 5G/6G millimeter wave communication, the passive RIS with double-layer cross dipole elements was designed and applied to typical indoor L-shaped corridor scene to verify the enhancement effect of indoor wireless signal coverage.

    DMA-based key generation method for IoT scenario
    Yinuo HAO, Zhou ZHONG, Xiaoli SUN, Liang JIN
    2022, 43(12):  45-53.  doi:10.11959/j.issn.1000-436x.2022227
    Asbtract ( 160 )   HTML ( 29)   PDF (1216KB) ( 174 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problems of slow update frequency of channel key, low generation rate and limited node resources in the IoT scenario, a DMA-based physical layer key generation method was proposed, by using the agility and reconfigurability of DMA to improve the time variability and randomness of received signal.Firstly, DMA was used by the transmitter to randomly weight the signal and send it to the receiver, which could enhance the randomness of signals on the premise of ensuring the transparent reception of the signal.Then, the key from the received signal was extracted by the sender and receiver.By combining the rapid changeability and randomness of DMA, the randomness of signal source and the randomness of natural channel, a composite channel was constructed to improve the randomness of the key source.In addition, the channel estimation was transfered overhead from the terminal to the base station, which effectively reduced the overhead and delay of the communication system, and was suitable for IoT scenarios with asymmetric resources and lightweight equipment.Simulation results show that the proposed method can effectively improve the key generation rate in quasi-static scenarios, and the generated physical layer key has passed the NIST test.

    Papers
    Time-sensitive network traffic scheduling method with joint routing planning
    Jinchuan PEI, Yuxiang HU, Le TIAN, Tao HU, Ziyong LI
    2022, 43(12):  54-65.  doi:10.11959/j.issn.1000-436x.2022235
    Asbtract ( 334 )   HTML ( 64)   PDF (2983KB) ( 609 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problem of uncertain end-to-end transmission delay caused by the separation of time-sensitive traffic scheduling and routing in time-sensitive network, a multi-constrained traffic scheduling method with joint routing planning was proposed.The inter-flow conflict degree of time-sensitive traffic was introduced to flexibly allocated traffic routing.On that basis, a scheduling constraint model of time-aware shaping and joint conflict-free routing was established to strictly guarantee the time-sensitive traffic scheduling with bounded low latency in both spatial and temporal dimensions.Experimental results show that the proposed method has good delay performance in different topological scenarios, and effectively reduces the delay caused by congestion conflicts under different time-sensitive traffic scales while ensuring link load balancing.

    Multi-stage detection method for APT attack based on sample feature reinforcement
    Lixia XIE, Xueou LI, Hongyu YANG, Liang ZHANG, Xiang CHENG
    2022, 43(12):  66-76.  doi:10.11959/j.issn.1000-436x.2022238
    Asbtract ( 322 )   HTML ( 50)   PDF (1817KB) ( 738 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Given the problems that the current APT attack detection methods were difficult to perceive the diversity of stage flow features and generally hard to detect the long duration APT attack sequences and potential APT attacks with different attack stages, a multi-stage detection method for APT attack based on sample feature reinforcement was proposed.Firstly, the malicious flow was divided into different attack stages and the APT attack identification sequences were constructed by analyzing the characteristics of the APT attack.In addition, sequence generative adversarial network was used to simulate the generation of identification sequences in the multi-stage of APT attacks.Sample feature reinforcement was achieved by increasing the number of sequence samples in different stages, which improved the diversity of multi-stage sample features.Finally, a multi-stage detection network was proposed.Based on the multi-stage perceptual attention mechanism, the extracted multi-stage flow features and identification sequences were calculated by attention to obtain the stage feature vectors.The feature vectors were used as auxiliary information to splice with the identification sequences.The detection model’s perception ability in different stages was enhanced and the detection accuracy was improved.The experimental results show that the proposed method has remarkable detection effects on two benchmark datasets and has better effects on multi-class potential APT attacks than other models.

    CSI feedback algorithm based on deep unfolding for massive MIMO systems
    Yong LIAO, Gang CHENG, Yujie LI
    2022, 43(12):  77-88.  doi:10.11959/j.issn.1000-436x.2022237
    Asbtract ( 212 )   HTML ( 37)   PDF (2151KB) ( 290 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem that the channel state information (CSI) feedback algorithm based on deep learning in massive MIMO systems at present had too many parameters to be trained and could not be explained well, two CSI feedback algorithms based on depth expansion were proposed.The first one was approximate message delivery (AMP) algorithm based on learnable parameters.The learnable parameters in deep learning were used to replace the threshold value of the threshold function in the AMP algorithm and the parameters of the Onsage correction term.The nonlinear ability of threshold function in dealing with non-strict sparse data was enhanced.The other was the AMP algorithm based on convolutional network, which replaced the threshold function module with the convolutional residual learning module, and used the module to remove the Gaussian random noise generated by each iteration of the AMP algorithm.Simulation results show that the proposed two algorithms have better CSI feedback performance than AMP algorithm, and the AMP algorithm based on convolutional network has better CSI reconstruction performance than the representative method based on deep learning.

    Topology optimization and forwarding strategy design for blockchain network
    Ru HUO, Xiangfeng CHENG, Chuang SUN, Shuo WANG, Tao HUANG, Yu F.Richard
    2022, 43(12):  89-100.  doi:10.11959/j.issn.1000-436x.2022240
    Asbtract ( 184 )   HTML ( 49)   PDF (2463KB) ( 190 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of the low data transmission efficiency of the blockchain network, an optimization method of blockchain transmission efficiency was proposed to optimize the network topology and forwarding strategy.First, the trusted value function was designed to calculate the trusted value of blockchain nodes, and a tree topology was constructed by comprehensively considering the trusted value and transmission time.Furthermore, the forwarding path selection strategy was designed based on the tree topology, with the minimum overall concurrent transmission time as the goal, and the forwarding table of the node about the forwarding order of its neighbor nodes was established.To reduce the impact of the node changed on the tree topology, a topology dynamic optimization strategy was proposed to adjust tree topology locally.The forwarding path selection strategy enabled the entire data transmission process to have the minimum transmission time, and the dynamic optimization strategy avoided reconfiguration of the entire network topology and effectively shortened the data transmission time.The simulation results show that, compared with the weight-first algorithm, the transmission time of the proposed method is reduced by about 20%, and the data transmission efficiency is significantly improved.

    Equity decentralized consensus algorithm based on incentive compatibility
    Youliang TIAN, Yansen YUAN, Hongfeng GAO, Yang YANG, Jinbo XIONG
    2022, 43(12):  101-112.  doi:10.11959/j.issn.1000-436x.2022232
    Asbtract ( 187 )   HTML ( 18)   PDF (1719KB) ( 367 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The PoW consensus algorithm has been proved to be incentive incompatible, existing computing centralization under high reward differences and slow convergence of forks in extreme cases.Based on this, an incentive-compatiblebased consensus algorithm SSPoW was proposed.By introducing local solutions to calculate the computing power aggregated on the block chain, the explicit quantification of computing power was used to speed up the convergence of the fork, thus satisfying the consistency of the blockchain.Incentive compatibility was achieved by improving the reward scheme, which reduced the problem of computing centralization caused by high reward differences.Simulation results prove that the proposed algorithm could effectively reduce the reward differences and is more efficient than the traditional PoW consensus algorithm, which has positive implications for improving system security and consensus efficiency.

    Joint design scheme of resource allocation for intelligent reflecting surface assisted millimeter wave NOMA system
    Sai ZHAO, Zhangchen ZOU, Gaofei HUANG, Dong TANG
    2022, 43(12):  113-122.  doi:10.11959/j.issn.1000-436x.2022236
    Asbtract ( 212 )   HTML ( 44)   PDF (1238KB) ( 534 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to further improve the spectral efficiency of intelligent reflecting surface (IRS)-assisted millimeter wave non-orthogonal multiple access (NOMA) system, a joint design scheme of user clustering, successive interference cancellation (SIC) decoding order, transmit power allocation, analog beam selection and IRS phase shifting was investigated, under the transmit power constraint, SIC decoding rate constraint, beam selection constraint, SIC decoding order constraint, user rate constraint, and IRS phase shift constraint, aiming at maximizing system sum rate.Because of the coupling of discrete variables, combinatorial variables and continuous variables in objective function and constraints, the formulated optimization problem was difficult to solve by traditional optimization methods.To solve it, first the SIC decoding sequence variables were transformed into binary discrete variables through a query table, then the discrete variables and continuous variables were decoupled based on the hybrid whale optimization algorithm, and delt with the optimization constraints based on the penalty function method, and the non-convex optimization problem was transformed into a heuristic problem for iterative solution.Simulation results verify the effectiveness of the proposed scheme.

    Detecting and preventing collusion attack in DPoS based on power index
    Xiaodong FU, Xinxin QI, Li LIU, Wei PENG, Jiaman DING, Fei DAI
    2022, 43(12):  123-133.  doi:10.11959/j.issn.1000-436x.2022233
    Asbtract ( 182 )   HTML ( 32)   PDF (1844KB) ( 305 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Since malicious nodes may manipulate voting elections through collusion attacks in consensus mechanism of DPoS, the security of block chain can not be guaranteed in the consensus process of DPoS.To deal with the problem, a method for detecting and preventing collusion attack in DPoS based on power index was proposed.Firstly, a weighted voting game model of DPoS was constructed based on the idea of power index in game theory, and the behavioral motivation of the malicious node could be analyzed.Then, the attacks were detected based on changing range of abnormal power index.During the process of preventing collusion attacks in DPoS, the Softsign activation function was adapted to suppress the power index of malicious nodes.Lastly, the effectiveness of the proposed method to detect and prevent collusion attacks in DPoS was verified through theoretical analysis and experiments.

    Nonlinear distortion compensation algorithm aided by channel estimation of memoryless power amplifier for OTFS receiver
    Zhanjun JIANG, Huan LIU, Huawei ZHANG, Cuiran LI
    2022, 43(12):  134-145.  doi:10.11959/j.issn.1000-436x.2022239
    Asbtract ( 157 )   HTML ( 14)   PDF (1592KB) ( 542 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A compensation algorithm for OTFS receiver was proposed to solve the problem of transmission signal distortion caused by the nonlinear characteristics of power amplifier (PA) in the orthogonal time frequency space (OTFS) system.The channel state information was estimated by Bussgang theorem combined with the complex coefficient polynomial of PA and the average energy of the distortion term.Based on it, the transmitted signal was reconstructed with distortion term and the estimated value was updated for the polynomial normalization.Furthermore, the iterative zero-forcing equalization algorithm was employed to complete adaptive compensation analysis of the nonlinear distortion at the receiver.The results show that the nonlinear influence on transmission signals is reduced, which caused by Saleh and Rapp models, and BER performance of OTFS system is improved effectively.

    Stackelberg game based energy optimization for unmanned aerial vehicle assisted wireless-powered Internet of things
    Xumin HUANG, Yang ZHANG, Rong YU, Li JIANG, Hui TIAN, Yuan WU
    2022, 43(12):  146-156.  doi:10.11959/j.issn.1000-436x.2022231
    Asbtract ( 230 )   HTML ( 30)   PDF (1678KB) ( 417 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The technology integrating unmanned aerial vehicles (UAV) with wireless power transfer is applied to provide energy supply for Internet of things devices.A Stackelberg game scheme was further proposed to tackle the problem on free and fair energy trading between a charging user and multiple UAV.The user played as a game leader and determined the rewards while each UAV played as a game follower, which competed for the rewards through the energy supply, and refered to the average channel gain during the wireless power transfer to determine the charging time for the user.The Stackelberg equilibrium solution was analyzed and derived by the backward induction method.Simulation results show that the proposed scheme can effectively reduce the economic cost for the user in the energy trading, thereby improving user satisfaction and achieving the user-side energy optimization.

    Unsupervised domain adaptation multi-level adversarial network for semantic segmentation based on multi-modal features
    Zeyu WANG, Shuhui BU, Wei HUANG, Yuanpan ZHENG, Qinggang WU, Huawen CHANG, Xu ZHANG
    2022, 43(12):  157-171.  doi:10.11959/j.issn.1000-436x.2022212
    Asbtract ( 288 )   HTML ( 65)   PDF (7378KB) ( 185 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of the distribution differences of visual, spatial, and semantic features between domains in domain adaptation, an unsupervised domain adaptation multi-level adversarial network for semantic segmentation based on multi-modal features was proposed.Firstly, an attentive fusion semantic segmentation network with three-layer structure was designed to learn the above three types of features from the source domain and target domain, respectively.Secondly, a self-supervised learning method jointing distribution confidence and semantic confidence was introduced into the single-level adversarial learning, so as to achieve the distribution alignment of more target domain pixels in the process of minimizing the distribution distance of the learnt features between domains.Finally, three adversarial branches and three adaptive sub-networks were jointly optimized by the multi-level adversarial learning method based on multi-modal features, which could effectively learn the invariant representation between domains for the features extracted from each sub-network.The experimental results show that compared with existing state-of-the-art methods, on the datasets of GTA5 to Cityscapes, SYNTHIA to Cityscapes, and SUN-RGBD to NYUD-v2 the proposed network achieves the best mean intersection over union of 62.2%, 66.9%, and 59.7%, respectively.

    Comprehensive Reviews
    Research on password-authenticated key exchange protocol over lattices
    Yuanbo GUO, Anqi YIN
    2022, 43(12):  172-187.  doi:10.11959/j.issn.1000-436x.2022190
    Asbtract ( 260 )   HTML ( 37)   PDF (1579KB) ( 428 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of quantum computing technology, password-authenticated key exchange (PAKE) protocol based on conventional difficult problems will face serious security threats in the post-quantum era.Lattice-based cryptosystem has been certified by NIST as the most promising cryptosystem in the post-quantum era due to its high efficiency, high security and support for stronger cryptographic service functions (such as fully homomorphic encryption and multi-linear mapping).Firstly, the research progress of lattice-based PAKE protocol was systematically sort out, mainly including the centralized two-party, three-party PAKE protocol and the distributed PAKE protocol over lattices.Then, the relevant typical schemes were compared and analyzed, respectively.Finally, the future research directions PAKE protocol over lattices were prospected.

    Survey of channel estimation method in delay-Doppler domain for OTFS
    Wang XING, Xiaogang TANG, Yiqing ZHOU, Chong ZHANG, Zhengang PAN
    2022, 43(12):  188-201.  doi:10.11959/j.issn.1000-436x.2022224
    Asbtract ( 574 )   HTML ( 79)   PDF (7725KB) ( 313 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to provide reliable communication service for high-mobility scenarios, 6G can consider DD (delay-Doppler) domain based OTFS (orthogonal time frequency space) as its modulation scheme.By mapping the transmitted symbols onto DD domain and transforming them into TF (time-frequency) domain, OTFS endows all the transmitted symbols with the potential of capturing time-frequency full diversity, effectively improving the performance of communication in time-varying fading channels.Due to the superior properties of DD effective channel, the existing OTFS channel estimation methods were mostly carried out in DD domain.Considering the difference of implementation and application scenarios, existing DD channel estimation methods for OTFS were divided into three categories and overviewed, after which the challenges and potential solutions for current DD channel estimation methods were summarized and analyzed.

    Overview of the statistics of application and funding of the National Natural Science Foundation of China in 2022 in the area of“information and communication systems”
    Ling SUN, Caijun ZHONG, Chenglin LI
    2022, 43(12):  202-210.  doi:10.11959/j.issn.1000-436x.2022241
    Asbtract ( 363 )   HTML ( 59)   PDF (1301KB) ( 502 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order for the broad scientific researchers to know the basic research teams, main research directions and development trends in the area of “information and communication systems” of the National Natural Science Foundation of China, some key statistics regarding the application and funding in the area including the general program, young scientists fund, and fund for less developed regions in 2022 were presented.The information of supporting institutions of the application and funding, as well as the distribution of application codes for the general program and young scientists fund were presented, the two types receiving largest number of applications among various types of projects funded by the National Natural Science Foundation.Then the reform progress in terms of classified proposal review process based on different attributes of scientific problems and the RCC evaluation mechanism was introduced.Finally, the key development directions of the area during the 14th five-year plan period were pointed out.

    Correspondences
    Research on language recognition algorithm based on improved CFCC feature extraction
    Hua LONG, Zhangheng HUANG, Yubin SHAO, Qingzhi DU, Shumeng SU
    2022, 43(12):  211-221.  doi:10.11959/j.issn.1000-436x.2022234
    Asbtract ( 120 )   HTML ( 23)   PDF (1107KB) ( 167 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of low language recognition rate under low signal-to-noise ratio, a language recognition method based on fractional wavelet transform was proposed.Firstly, the adaptive filtering algorithm was used to filter the noise of the noisy signal, so as to reduce the influence of noise on the feature extraction and improve the processing ability of the system for non-stationary signals.Secondly, the motion of the signal on the basilar membrane of the cochlea was simulated, and then the signal was compressed by a nonlinear power function.Finally, the improved CFCC were extracted by simulating the human hearing process.Experiments show that compared with the traditional CFCC, the language recognition rate is significantly improved, and the language recognition rate is increased by 11.1% on average under the 0 dB signal-to-noise ratio, which verifies the effectiveness and robustness of the proposed algorithm.

    Temporal dependent rate-distortion optimization based on distortion backward propagation
    Hongwei GUO, Ce ZHU, Xu YANG, Lei LUO
    2022, 43(12):  222-232.  doi:10.11959/j.issn.1000-436x.2022230
    Asbtract ( 147 )   HTML ( 19)   PDF (1708KB) ( 233 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Rate-distortion optimization (RDO) is a crucial technique in block based hybrid video encoders.However, the widely used independent RDO is far from obtaining optimal coding performance.To improve the rate-distortion (R-D) performance of high efficiency video coding (HEVC), a temporal dependent RDO algorithm was proposed.Firstly, the formula to calculate temporal distortion propagation factor was derived by using an exponential R-D function.Then, the coding distortion and motion compensation predicted error were obtained by pre-encoding, and the temporal distortion propagation factor was estimated by using distortion backward propagation.Finally, the Lagrange multiplier and quantization parameter of coding tree unit were adaptively adjusted to optimize bit resources allocation.Experimental results show that compared with the original RDO method in HEVC under the low-delay configuration, the proposed algorithm achieves an average 4.4% bit rate reduction for all test sequences, and up to 13.0% bit rate reduction for test sequence BasketballDrill, at the same reconstructed video quality.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: