[1] |
Wenzhe WANG, Gang AN, Jian WU, Wendong ZHAO, Yangang WANG, Yunfeng ZHAO, Zixiang DI, Zhaojie GU, Guixiang ZOU.
An industrial internet business management platform that supports the cloud-native
[J]. Telecommunications Science, 2022, 38(Z1): 203-213.
|
[2] |
Puyang ZHANG.
Application of 5G innovative technology in the internal logistics of the iron and steel enterprise
[J]. Telecommunications Science, 2022, 38(Z1): 214-220.
|
[3] |
Shuchong NAN, Cheng CHEN, Xunbiao LIAN, Han WANG.
A method of planning and designing transmission networks for government and enterprises based on a rectangle-like distribution model combined with heat maps
[J]. Telecommunications Science, 2022, 38(9): 144-150.
|
[4] |
Shanshan ZHANG, Fuyun WANG.
An empirical analysis of the relationship between innovation efficiency and scale of Internet companies
[J]. Telecommunications Science, 2022, 38(6): 111-119.
|
[5] |
Zhichao ZHOU, Yi FENG, Xiaohan XIA, Yuyao FENG, Chao CAI, Jiahui QIU, Lihui YANG, Yunxiao WU.
Outdoor location scheme with fingerprinting based on machine learning of mobile cellular network
[J]. Telecommunications Science, 2021, 37(8): 85-95.
|
[6] |
Wei WU,Wenqiang ZHANG,Guangming YANG,Peiyong MA,Feng YANG.
SRv6 +EVPN technology research and scale deployment of 5G bearer network
[J]. Telecommunications Science, 2020, 36(8): 43-52.
|
[7] |
Daoyuan LIU,Keda SUN,Junliang ZHOU,Haidong FAN.
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
[J]. Telecommunications Science, 2020, 36(3): 34-41.
|
[8] |
Haolun WANG.
Design of backhaul routes in VRRP networks of MPLS VPN
[J]. Telecommunications Science, 2020, 36(11): 165-173.
|
[9] |
Jietai WANG,Youlian GUAN,Xiaoniu YANG,Zhenxing LUO,Jianbiao YU.
Wireless positioning methods for mitigating the influence of environmental and terminal diversity
[J]. Telecommunications Science, 2020, 36(1): 88-100.
|
[10] |
Wenju QUAN.
Financial digital transformation practice of power enterprises based on RPA
[J]. Telecommunications Science, 2020, 36(1): 139-143.
|
[11] |
Kaiqiang GE, Tieming CHEN.
A survey of attack and defense on human-computer interaction security
[J]. Telecommunications Science, 2019, 35(10): 100-116.
|
[12] |
Can LIU,Junna SHANG,Ruijiang LI,Keqiang YUE.
Indoor dynamic environment lo calization algorithm based on transfer learning
[J]. Telecommunications Science, 2018, 34(8): 98-108.
|
[13] |
Xun CHEN,Shuai HAN,Shanshan LIU,Xiaolong YANG.
Video content identification scheme in content oriented network environment
[J]. Telecommunications Science, 2018, 34(6): 53-63.
|
[14] |
Jingwen LIU,Wei XU,Boxuan LV,Dan WANG,Wenying NIE,Ning FAN.
Design of mobile payment system based on NFC
[J]. Telecommunications Science, 2018, 34(2): 131-138.
|
[15] |
Xun LI,Lin YOU,Jiahao LIANG,Chunhui YAN.
A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features
[J]. Telecommunications Science, 2018, 34(10): 72-84.
|