Please wait a minute...

Current Issue

    25 April 2019, Volume 40 Issue 4
    Topics:Marine Information Perception,Transmission and Fusion
    Summary and future development of marine target surveillance based on spatial information network
    You HE,Libo YAO,Zhengjie JIANG
    2019, 40(4):  1-9.  doi:10.11959/j.issn.1000-436x.2019056
    Asbtract ( 600 )   HTML ( 45)   PDF (1647KB) ( 1398 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The space information network is indispensable for marine target surveillance.Multi-satellite information fusion methods which are based on spatial computing mode can improve the ability of wide-area scanning,accurate recognition,persistent tracking and rapid responding.The mode of on-board information fusion for sea target surveillance needs to be further studied.Firstly,the developments of spatial information network and satellite for sea surveillance were discussed and the existing problems were summarized.Then the architecture of marine target surveillance based on spatial computing was put forward.The key technology and future development of on-board computing for ocean target surveillance were studied and discussed in the fields of spatial networking and information fusion.

    New marine information network for realizing all-coverage over sea
    Ruiyang DUAN,Jingjing WANG,Jun DU,Yunlong WANG,Yuan SHEN,Yong REN
    2019, 40(4):  10-20.  doi:10.11959/j.issn.1000-436x.2019051
    Asbtract ( 601 )   HTML ( 72)   PDF (2281KB) ( 1016 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The marine information network and the involved information acquisition,transmission and integration were studied.Firstly,the developments,the research works and shortages of the marine information network were summarized.Then a new network architecture was proposed,which could achieve all-time,all-weather and all-sea area information coverage.The composition,system structure and technical architecture were stated in detail.Moreover,the key scientific issues,key technologies and application prospects of the information network were pointed out.The aim was to provide new research strategies for the development of marine information networks in China.

    Research on sea surface NB-IoT coverage based on improved SPM
    Zheng HU,Baodan CHEN,Jia REN,Yupei FAN,Lian WANG
    2019, 40(4):  21-32.  doi:10.11959/j.issn.1000-436x.2019079
    Asbtract ( 452 )   HTML ( 26)   PDF (1261KB) ( 710 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the standard SPM,an improved sea surface propagation model was proposed.At the same time,a propagation model correction algorithm based on WLS algorithm was proposed.Using the CW test data of Qiongzhou Strait,the parameters of the improved SPM were corrected.Based on the corrected propagation model,the current base station of Qiongzhou Strait coast was used to carry out link level simulation and coverage simulation for NB-IoT.The experimental results show that the proposed method can effectively achieve the coverage of NB-IoT in Qiongzhou Strait and contribute to the scientific research of Internet of things.

    Confidential communication scheme based on uncertainty of underwater noisy channels
    Ming XU,Fang CHEN
    2019, 40(4):  33-42.  doi:10.11959/j.issn.1000-436x.2019055
    Asbtract ( 329 )   HTML ( 19)   PDF (866KB) ( 626 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the influence of the uncertainty of underwater noise on information transmission and the security problem of the communication over noisy channels,a confidential communication scheme based on the uncertainty of underwater noisy channels was proposed.The proposed scheme was composed of an interactive key extraction protocol based on Godel’s code and a privacy amplification protocol based on r-circulant Toeplitz matrix.During the process of key extraction,the key sequence comparing number was reduced through the Godel’s code.When calculating the key length after privacy amplification,the uncertainty of underwater noise was considered to make the proposed scheme more practical.Experimental results show that under the condition of satisfying protocol security,it takes 11.99 s to transmit 119 940 bit string where the lower bound of the generated secret key length is 117 331 bit after privacy amplification and the upper bound of the adversary’s information about the secret key is 2 609 bit.Moreover,the proposed scheme (nt+s)×(nt+s)-order r-circulant Toeplitz matrix decreases(nt+s)-1 bit memory space compared to the traditional Toeplitz matrix with the same order.

    Design and characteristic analysis of fiber optic Fabry-Perot sensor for static ice strain monitoring
    Mengxing HUANG,Yuhang LI,Guanjun WANG,Jianxun LIU,Lu YAN,Longjuan WANG
    2019, 40(4):  43-48.  doi:10.11959/j.issn.1000-436x.2019087
    Asbtract ( 373 )   HTML ( 15)   PDF (1070KB) ( 779 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Sea ice is one of the important natural disasters.A new method based on optical fiber Fabry-Perot sensor for ice strain measurement was proposed to meet the needs of ice strain monitoring.A high sensitivity optical fiber Fabry-Perot pressure sensor with thin-film structure was realized by means of pressure assisted arc discharge method,and the sensor was encapsulated by metal tube /PDMS /AB epoxy glue combination method.On this basis,the static internal strain characteristics of ice in the process of melting and freezing during -15℃~0℃ was studied.Experimental results show that this proposed thin-film fiber Fabry-Perot pressure sensor has good sensitivity characteristic in ice strain monitoring,it is believed of great value for the monitoring of remote distributed sea samples.

    Papers
    Collection policy refining method for threat monitoring in complex network environment
    Fenghua LI,Zifu LI,Ling LI,Ming ZHANG,Kui GENG,Yunchuan GUO
    2019, 40(4):  49-61.  doi:10.11959/j.issn.1000-436x.2019096
    Asbtract ( 388 )   HTML ( 34)   PDF (1522KB) ( 594 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Personalized collect policy is one of the necessary conditions for effectively monitoring threats in the complex network environment.However,differences in security requirements and threat types make it difficult to effectively generate personalized collect policy.To address the above problem,a collection policy automatic refinement method was designed.Firstly,a hierarchical model of collection policy was proposed.Then,by transforming the policy refinement into a nonlinear optimization problem,a genetic algorithm was designed to balance between collection revenue and collection cost.Finally,simulation experiments verify that according to the requirements of high-level monitoring,the acquisition scheme can be automatically generated.

    Research on WSN lifetime optimization game algorithm combined power and channel
    Xiaochen HAO,Ning YAO,Lixia XIE,Jiaojiao WANG,Liyuan WANG
    2019, 40(4):  62-70.  doi:10.11959/j.issn.1000-436x.2019097
    Asbtract ( 276 )   HTML ( 15)   PDF (931KB) ( 526 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the problem of shortening the network lifetime which was caused by the big energy consumption for wireless sensor network (WSN) whose energy and computing power was limit,a lifetime optimization game algorithm combined power control and channel allocation (LOAPC) was proposed.The influence of node power and residual energy on the node interference was explored to construct an interference affection measurement model.Then,expected transmission times was introduced to establish a novel node lifetime model.Finally,LOAPC aimed at reducing interference and prolonging lifetime,and the node power was limited by an optional power set which ensured the network connectivity and economized energy consumption,so as to prolong the network lifetime effectively.At the same time,the simulation results show that the algorithm has the characteristics of low interference,low energy consumption and effectively prolonging the lifetime of the network.

    Deletable blockchain based on threshold ring signature
    Yanli REN,Danting XU,Xinpeng ZHANG,Dawu GU
    2019, 40(4):  71-82.  doi:10.11959/j.issn.1000-436x.2019084
    Asbtract ( 854 )   HTML ( 79)   PDF (852KB) ( 1461 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of blockchain,huge storage space is needed to store all of blockchain data.In addition,data can’t be changed once it is packaged into the chain,and it may be possible for overdue data to take up large storage space.Firstly,a threshold ring signature scheme was improved,and then a deletable blockchain scheme based on the mechanism of proof of space (PoSpace) consensus was constructed.Most of nodes could sign and delete a block together when block data was overdue,and the overall structure of the blockchain was unchanged.Several experiments in a simulated environment were executed,and the results show that the proposed blockchain scheme has high efficiency in generating and delegating a block.Meanwhile,the deletion of a block doesn’t influence the storage and use of other blocks.

    Attribute generalization mix-zone based on multiple secure computation
    Bin WANG,Lei ZHANG,Guoyin ZHANG
    2019, 40(4):  83-94.  doi:10.11959/j.issn.1000-436x.2019077
    Asbtract ( 377 )   HTML ( 18)   PDF (937KB) ( 696 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to cope with the problems of resist the attack of user tracking with attributes and resist the disguised attack in road networks,based on the conception of attribute generalization and the methods of homomorphic encryption,a privacy protection method to complete the calculation of attribute generalization in private state and achieve attribute generalization was proposed.The proposed method utilized the homomorphic encryption to achieve secret bidding selection with an agent,and then utilize secure multi-party computation to calculate the similar attributes and achieve the attribute generalization in the end.With the help of fully attribute generalization,this method can solve the problem of users can be tracked by the potential attributes,and at the same time the privacy calculation also does not reveal any information to participants,so this method can prevent the disguised attacker that obtains user’s information in mix-zone.At last,in order to demonstrate the superiority of the proposed method in both of academically and practicality,the security analysis and experimental verification are given,and the procedure of formulation verification and the result of experiment further substantiate the superiorities of the proposed method.

    Key-exposure resilient integrity auditing scheme with encrypted data deduplication
    Xiangsong ZHANG,Chen LI,Zhenhua LIU
    2019, 40(4):  95-106.  doi:10.11959/j.issn.1000-436x.2019076
    Asbtract ( 344 )   HTML ( 12)   PDF (812KB) ( 860 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.

    Power consumption modeling and optimization for NB-IoT eDRX
    Xin JIAN,Yixiao WEI,Yuqin LIU,Jian SONG,Xiaoping ZENG,Xiaoheng TAN
    2019, 40(4):  107-116.  doi:10.11959/j.issn.1000-436x.2019094
    Asbtract ( 392 )   HTML ( 20)   PDF (1048KB) ( 751 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To extend the battery life of massive machine type devices (MTD),narrow-band Internet of things (NB-IoT) system extended discontinuous reception (eDRX) mechanism of LTE to the maximum as well as introduced a lower power state named as power saving mode (PSM).Three Markov models were established for three typical NB-IoT traffic scenarios,which called mobile autonomous reporting periodic report (MAR-P),mobile autonomous reporting exception report (MAR-E),software update/reconfiguration (SUR).The states of each Markov model were the working status of MTDs,including connected,idle and PSM state,in which the connected state was divided into random access state and data translating/receiving state to further evaluate the additional power consumption caused by collisions from massive MTDs concurrent access.Thereby,the power consumption and delay models with respect to each traffic scenarios were derived.Since the frequency of MAR-P traffic was far greater than the other two,the battery life of this traffic case with its optimal design choice was comprehensively analyzed.Numerical results show that,the battery life is mostly influenced by transmission period,maximum number of random access attempts,maximum number of data transmissions and traffic load,which can be maximized by appropriate parameters setting up.These works provide good references for NB-IoT device behavior modeling and optimization design.

    Fuzzy evaluation for response effectiveness in cases of incomplete information
    Fenghua LI,Yongjun LI,Zhengkun YANG,Han ZHANG,Lingcui ZHANG
    2019, 40(4):  117-127.  doi:10.11959/j.issn.1000-436x.2019078
    Asbtract ( 303 )   HTML ( 14)   PDF (890KB) ( 668 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to appropriately select and adjust response countermeasures,it is necessary to evaluate response effectiveness.Although a large amount of effort has been spent on the evaluation of risk and threat situations,the existing schemes are not suitable to evaluate response effectiveness,because the sechems require that all the information used for evaluation is complete,which is difficult to implement in the real environment.To address the problem,a fuzzy scheme was proposed to deal with incomplete information (i.e.,missing elements of judgment matrix and missing data of indicators) and the response effectiveness was evaluate.Firstly,a hierarchical indicator tree was design to characterize the effectiveness from the perspectives of both attack and defense.Then,the fuzzy analytic hierarchy process (FAHP) was used to calculate the comprehensive weight of each indicator.Finally,the response effectiveness was calculated using fuzzy comprehensive evaluation.In particular,to deal with the problem of incompleteness of fuzzy judgment matrix in the process of FAHP,the missing elements were completed based on the transitivity of elements.And to deal with the problem of loss data in the comprehensive evaluation,the missing data was completed based on matrix completion.The experimental results show that the proposed scheme can accurately recover the missing data and can effectively evaluate the effectiveness of response.

    Identity-based cloud storage integrity checking from lattices
    Miaomiao TIAN,Chuang GAO,Jie CHEN
    2019, 40(4):  128-139.  doi:10.11959/j.issn.1000-436x.2019073
    Asbtract ( 311 )   HTML ( 21)   PDF (1359KB) ( 765 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of cloud storage,more and more users are storing their data in the cloud.To verify whether the users’ data stored in the cloud is corrupted,one effective method is to adopt cloud storage integrity checking schemes.An identity-based cloud storage integrity checking scheme was proposed on the small integer solution problem over ideal lattices,and it was proven to be secure against the adaptive identity attacks of clouds in the random oracle model.To validate the efficiency of the scheme,extensive experiments were conducted to make performance-comparisons between the scheme and the existing two identity-based cloud storage integrity checking schemes.The experimental results show that the online tag-generation time and the proof-verification time of the scheme are respectively reduced by 88.32%~93.74% and 98.81%~99.73%.

    Spectrum allocation method for cognitive satellite network based on service priorities
    Min JIA,Xiaoye JING,Xiaofeng LIU,Feng LIU,Qing GUO,Xuemai GU
    2019, 40(4):  140-148.  doi:10.11959/j.issn.1000-436x.2019080
    Asbtract ( 421 )   HTML ( 28)   PDF (982KB) ( 1268 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By using spectrum allocation technology of cognitive radio into integrated satellite and terrestrial networks,the satellite communication network can share spectrum with the terrestrial network and improve utilization efficiency of frequency spectrum in the satellite communication system.Firstly,a spectrum resource sharing model in integrated satellite and terrestrial networks was introduced,and the scenery that cognitive satellite downlinks use the vacant spectrum of terrestrial network was analyzed.Then,the interference and signal model was analyzed.Finally,considering different priority types of satellite terrestrial terminals,a spectrum allocation scheme based on priority was proposed,which could ensure the total throughput in satellite downlink communication and increase the throughput of high-priority terrestrial terminals.

    Airport delay prediction model based on regional residual and LSTM network
    Jingyi QU,Meng YE,Xing QU
    2019, 40(4):  149-159.  doi:10.11959/j.issn.1000-436x.2019091
    Asbtract ( 646 )   HTML ( 27)   PDF (1749KB) ( 1092 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Nowadays,the civil aviation industry has a high precision requirement of airport delay prediction,so an airport delay prediction model based on the RR-LSTM network was proposed.Firstly,the airport information,meteorological information and related flight information were integrated.Then,the RR-LSTM network was used to extract the features of the fused airport data set.Finally,the Softmax classifier was adopted to classify and predict the airport delay.The proposed RR-LSTM network model can not only extract the time correlation of airport delay data effectively,but also avoid the gradient disappearance problem of deep LSTM network.The experimental results indicate that the RR-LSTM network model has a prediction accuracy of 95.52%,which achieves better prediction results than the traditional network model.The prediction accuracy can be improved about 11% by fusing the weather information and the flight information of the airport.

    Passive indoor human daily behavior detection method based on channel state information
    Xiaochao DANG,Yaning HUANG,Zhanjun HAO,Xiong SI
    2019, 40(4):  160-170.  doi:10.11959/j.issn.1000-436x.2019082
    Asbtract ( 682 )   HTML ( 45)   PDF (1732KB) ( 1126 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The daily behavior detection of indoor human based on CSI is developing rapidly in the field of WSN.At present,most of the research is still in the environment of 2.4 GHz,so the detection rate,robustness and overall performance still need to be improved.In order to solve this problem,a passive indoor human behavior detection method HDFi (Human Detection with Wi-Fi) based on CSI signal was proposed.The method was used to detect the indoor human daily behavior in a 5 GHz band environment,which was divided into three steps:data acquisition,data processing,feature extraction,online detection.Firstly,the experiment collected typical daily behavioral data in complex laboratory and relatively empty meeting room.Secondly,the amplitude and phase data with more obvious features were extracted and processed by low-pass filtering to obtain a set of stable and noise-free data,and then the fingerprint database was established effectively.Finally,in the real-time detection stage,the collected data features were classified by SVM algorithm to extract more stable eigenvalues,and a classification model of indoor human daily behavior detection was established,and then matched the data in the fingerprint database.The experimental results show that the proposed method has the characteristics of high efficiency,high precision and good robustness,and the method does not need any testing personnel to carry any electronic equipment,so it has high practicability.

    Image forgery detection algorithm based on U-shaped detection network
    Zhuzhu WANG
    2019, 40(4):  171-178.  doi:10.11959/j.issn.1000-436x.2019086
    Asbtract ( 503 )   HTML ( 28)   PDF (2668KB) ( 1595 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.

    Comprehensive Review
    Survey of software defined D2D and V2X communication
    Wenjuan SHAO,Qingguo SHEN
    2019, 40(4):  179-194.  doi:10.11959/j.issn.1000-436x.2019075
    Asbtract ( 937 )   HTML ( 56)   PDF (1845KB) ( 1857 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The related D2D (device-to-device) and V2X (vehicle-to-everything) are regarded as vital components of 5G communication system,which providing alternative network services and multiple application services for cellular network.In the meanwhile,SDN (software defined networking) can improve the compatibilities and flexibilities of D2D and V2X.SD-D2D (software defined D2D communication) and SD-V2X (software defined V2X communication) technologies were reviewed.Based on their similarities and respective characteristics,their state-of-arts and architectures were reviewed accordingly,and the key technologies such as D2D location/discovery management,D2D routing control,D2D flow table management,V2V path scheduling,and V2V path recovery were analyzed.Finally,it was pointed out that the SD-D2D architecture was approaching mature and the SD-V2X framework had been preliminarily determined,the existing problems of interference management,mobile management and routing management in D2D/V2X communication could be effectively solved.Furthermore,it was also pointed out that the disconnection between the existing SD-D2D/V2X studies and the actual application needed to be overcome.

    Correspondences
    Wireless Mesh network secure routing mechanism based on dynamic reputation
    Hongyu YANG,Yue HAN
    2019, 40(4):  195-201.  doi:10.11959/j.issn.1000-436x.2019083
    Asbtract ( 344 )   HTML ( 14)   PDF (765KB) ( 597 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem that the wireless Mesh network (WMN) security routing mechanism was scarce and internal malicious nodes drop data packets during data transmission,a secure routing mechanism based on dynamic reputation (SRMDR) for wireless Mesh network was proposed.Firstly,the dynamic reputation mechanism was used to evaluate the node’s behavior,the node’s comprehensive reputation value was calculated according to the node’s direct reputation value and the recommended reputation value,and the node’s dynamic reputation value was calculated according to the node’s historical comprehensive reputation value and the current comprehensive reputation value.Then,the dynamic reputation was combined with the routing mechanism to establish secure routing paths,the nodes with a dynamic reputation value less than the threshold were determined to be malicious nodes,which were isolated during the routing process.Experimental results show that compared with HWMP and SHaRP,SRMDR has higher malicious node recognition rates,and SRMDR can effectively reduce packet loss rate and improve network throughput.

    Link quality prediction based on random forest
    Linlan LIU,Shengrong GAO,Jian SHU
    2019, 40(4):  202-211.  doi:10.11959/j.issn.1000-436x.2019025
    Asbtract ( 602 )   HTML ( 43)   PDF (1244KB) ( 917 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Link quality prediction is vital to the upper layer protocol design of wireless sensor networks.Selecting high quality links with the help of link quality prediction mechanisms can improve data transmission reliability and network communication efficiency.The Gaussian mixture model algorithm based on unsupervised clustering was employed to divide the link quality level.Zero-phase component analysis (ZCA) whitening was applied to remove the correlation between samples.The mean and variance of signal to noise ratio,link quality indicator,and received signal strength indicator were taken as the estimation parameters of link quality,and a link quality estimation model was constructed by using a random forest classification algorithm.The random forest regression algorithm was used to build a link quality prediction model,which predicted the link quality level at the next moment.In different scenarios,comparing with exponentially weighted moving average,triangle metric,support vector regression and linear regression prediction models,the proposed prediction model has higher prediction accuracy.

    Low latency handover scheme for 5G dual-connectivity scenario
    Xuming PEI,Jianxin JIA,Hua QIAN,Zhenghang ZHU,Zhenyu TANG,Kai KANG
    2019, 40(4):  212-222.  doi:10.11959/j.issn.1000-436x.2019090
    Asbtract ( 733 )   HTML ( 65)   PDF (1229KB) ( 820 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel handover scheme was proposed for the secondary node (SN) unchanged 5G dual-connectivity scenarios.In the proposed novel scheme,the SN connection was maintained for data packet transmission during the handover,however,both the main node (MN) and the SN were completely disconnected in the legacy scheme.The transmission delay during handover was decreased greatly by the proposed scheme.Firstly,the legacy handover scheme was analyzed and its deficiency was figured out.Then,the novel mechanism’s signaling interaction was elaborated and the time sequence models for the novel scheme and the legacy scheme were further established.Finally,based on the time sequence model,the performance evaluation processes were carried out in terms of mathematical modeling and experimental simulations.The analysis results demonstrate that the proposed novel scheme reduces the single packet transmission delay,the average transmission delay and the total transmission delay,and has good performance advantages.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: