Editors Recommend
20 October 2023, Volume 39 Issue 10
Research and Development
A peak-to-average power ratio reduction method for mixed-numerology multi-carrier systems
Nan SHI, Xiaoran LIU, Jun XIONG, Xiaoying ZHANG, Jibo WEI
2023, 39(10):  1-14.  doi:10.11959/j.issn.1000-0801.2023194
Asbtract ( 22 )   HTML ( 5)   PDF (1566KB) ( 23 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

In order to support diverse service demands of communication scenarios, 5G adopts the mixed-numerology system based on orthogonal frequency division multiplexing (OFDM).The mixed-numerology systems still have the problem of high peak-to-average power ratio (PAPR).Furthermore, its design structure makes it difficult to apply traditional PAPR suppression methods straight forwardly, in which mixed signals are generated by superimposing multiple sub-signals with different parameters.An optimization model for minimizing PAPR in mixed-numerology systems was established based on tone reservation method.Utilizing the characteristic of single-peak of time-domain kernel, the multiple copies were generated in different numerologies based on the peak position of the mixed signal.The mixed time-domain kernel was then superimposed to reduce the peaks of the mixed signal.Since the proposed algorithm didn’t require inverse fast Fourier transform (IFFT)/ fast Fourier transform (FFT) operations during iteration, it had relatively low computational complexity.Simulation results show that the proposed algorithm effectively reduces the PAPR of mixed signals.

A semi-supervised transfer learning recognition method for radar compound jamming under small samples
Jinqiang WANG, Minhong SUN, Xianghong TANG, Zhaoyang QIU, Deguo ZENG
2023, 39(10):  15-28.  doi:10.11959/j.issn.1000-0801.2023182
Asbtract ( 26 )   HTML ( 9)   PDF (1835KB) ( 24 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Aiming at the problem that more and more kinds of radar compound jamming signals and too few training samples were difficult to make the deep learning model reach the optimal state, a semi-supervised transfer learning recognition method for radar compound jamming under small samples was proposed, which solved the problem of low network training accuracy caused by the difficulty in obtaining labeled samples through unlabeled samples.The feature extractor and classifier obtained after pre-training of single jamming data set were transferred to small-scale compound jamming data set, and the model was fine-tuning by using weight imprinting and semi-supervised learning.The model parameters were optimized by the proposed nearest neighbor correlation loss nearest neighbor correlation loss (NNCL).The experimental results show that the recognition accuracy of the model can reach 93.20% when the jamming-to-noise ratio is 10 dB and there are only 5 labeled samples of the new class of compound jamming signals.

A computation offloading scheme for energy consumption optimization in Internet of vehicles
Wenxuan GAO, Xinjie YANG
2023, 39(10):  29-40.  doi:10.11959/j.issn.1000-0801.2023189
Asbtract ( 25 )   HTML ( 7)   PDF (1352KB) ( 23 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

In Internet of vehicles (IoV), vehicle-oriented applications are generally computation-intensive and latency-sensitive.Introducing idle computing resources from mobile vehicles as a supplement to network computing power can effectively alleviate the load pressure on edge servers.The problem of task allocation for edge computation offloading in the context of IoV environment were researched.By fully leveraging the combined computing resources of roadside units (RSU), user vehicles, and mobile vehicles within the RSU service range, a computation offloading strategy based on the sparrow search algorithm was proposed and referred to as sparrow search based computation offloading scheme (S2COS), aiming to optimize the overall system energy consumption.In addition, this strategy fully taked into account practical network issues such as service time constraints caused by vehicle mobility and the potential occurrence of computation node failures.The simulation results demonstrate that S2COS can meet the latency requirements for computation-intensive and latency-sensitive tasks, while significantly reducing system energy consumption.

Terminal power control method of power line carrier communication network based on adaptive hash function
Hong XUE, Jiahan WANG, Yuling SUN, Bo HAN, Yubai XIAO
2023, 39(10):  41-48.  doi:10.11959/j.issn.1000-0801.2023192
Asbtract ( 15 )   HTML ( 1)   PDF (1188KB) ( 16 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

In the control of network terminal power, due to the overall low analysis of network state, the adaptive regulation ability of communication network terminal power is poor.Therefore, the power line carrier communication network terminal power control method based on adaptive hash function was proposed.Considering the dynamic fluctuation of the actual operating state of the power line carrier communication network, the adaptive mechanism was set for the hash function, and the adaptive hash function was constructed for the original running state data, and the final hash value was obtained in the variable chaotic mapping system.In the power control stage of the power line carrier communication network terminal, the communication network terminal was affected by the interference of other communication network terminals, and it was used as the input value of the adaptive hash function to realize the power control of each communication network terminal.In the test results, the proposed control method not only effectively reduces the increase range of network terminal power under constant communication conditions, but also effectively reduces the network terminal power output under dynamic communication conditions, which has a high adaptive adjustment ability.

A spatial diversity cooperative spectrum sensing system based on blockchain and deep learning
Zhongshan XIAO, Chunqi WANG, Daquan FENG
2023, 39(10):  49-63.  doi:10.11959/j.issn.1000-0801.2023193
Asbtract ( 22 )   HTML ( 4)   PDF (1593KB) ( 29 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Cooperative spectrum sensing is a key technology in cognitive radio.A data-driven intelligent cooperative spectrum sensing system was proposed with spatial diversity running on a smart contract to address issues of security, privacy, incentive and hidden terminals in cooperative spectrum sensing.Specifically, a motivated spectrum sensing system was designed by taking advantage of the decentralization of blockchain technology and the immutability of data.Secondly, a deep learning-based approach was proposed to identify malicious users in the system.In addition, to achieve higher accuracy in recruiting sensing nodes more efficiently in the system, a hard decision cooperative spectrum sensing fusion algorithm based on performance weights and spatial diversity was designed.The experimental results indicate that the proposed solution outperforms traditional cooperative spectrum sensing algorithms in terms of security, privacy, motivation, and sensing accuracy.

A range spread target detection algorithm based on polarimetric features and SVDD
Qiang LI, Yuanxin YAO, Xiangqi KONG
2023, 39(10):  64-73.  doi:10.11959/j.issn.1000-0801.2023197
Asbtract ( 13 )   HTML ( 2)   PDF (2279KB) ( 17 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Multi-polarization range high resolution radar is an important mean for ground target detection.In the echo formed by it, the target occupies multiple range cells and becomes an extended target.The traditional spread target detection method relies on energy, and the detection performance decreases when the signal-to-clutter ratio decreases.A spread target detection algorithm based on polarization decomposition features was proposed, which improved the detection performance under low signal-to-clutter ratio by using the difference of polarization scattering characteristics between target and clutter.Specifically, 16 kinds of polarization decomposition features were extracted to form feature vectors as detection statistics, and then support vector data description (SVDD) was used to obtain the detection threshold.When training the detection threshold, the polarization decomposition features of clutter were extracted as training data.In order to ensure the false alarm probability, two penalty parameters were introduced into the objective function of SVDD.The experimental results show that the proposed method requires a signal-to-clutter ratio of about 12.6 dB in the case of Gobi background, false alarm probability of 10-4 and detection probability of 90%, which is about 1.7 dB lower than the energy-based methods.

Ultrashort wave satellite channel classification and recognition algorithm based on mirror filled spectrum and LA-ResNet50
Shang WU, Lei SHEN, Lijun WANG, Ruxu ZHANG, Xin HU
2023, 39(10):  74-84.  doi:10.11959/j.issn.1000-0801.2023185
Asbtract ( 7 )   HTML ( 0)   PDF (2778KB) ( 10 )   Knowledge map   
References | Related Articles | Metrics

In response to the classification and identification problems of 5 kHz channels, 25 kHz channels, broadband interference channels, narrowband interference channels, and single tone interference channels in the ultrashort wave frequency band, a classification and identification method for ultrashort wave channels based on mirror filled spectrum and LA-ResNet50 (LBP attention ResNet50) was proposed.The problem of difficulty in distinguishing between satellite channels and background noise under low signal-to-noise ratio, as well as the identification of signal channels and interference channels with similar characteristics, has been effectively solved.Firstly, the proposed method performs mirror symmetry on the ultrashort wave spectrum and fills it in, while blackening the edges of the spectrum to construct a mirror-filled spectrum, which improves the discrimination of different types of channel spectra.Then, channel attention was introduced into ResNet50 to focus the attention of the network model on the channel.Finally, a loss function based on cross entropy and local binary pattern (LBP) was proposed to improve the extraction effect of subtle texture features on signal channels and interference channels images.The proposed method based on mirror-filled spectrum and LA-ResNet50 has shown an improvement of 19.8%, 8.2%, 1.8%, and 0.8% in classification accuracy for ultrashort wave channels compared to the traditional method utilizing fast Fourier transform (FFT) spectrum thresholding, the YOLOv5s target detection and classification method based on mirror-filled spectrum, the Attention-ResNet50 method with attention mechanism based on mirror-filled spectrum, and the Transformer network method under a signal-to-noise ratio (SNR) of 10 dB.

A network intrusion detection method designed for few-shot scenarios
Weichen HU, Congyuan XU, Yong ZHAN, Guanghui CHEN, Siqing LIU, Zhiqiang WANG, Xiaolin WANG
2023, 39(10):  85-100.  doi:10.11959/j.issn.1000-0801.2023166
Asbtract ( 82 )   HTML ( 10)   PDF (4563KB) ( 34 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Existing intrusion detection techniques often require numerous malicious samples for model training.However, in real-world scenarios, only a small number of intrusion traffic samples can be obtained, which belong to few-shot scenarios.To address this challenge, a network intrusion detection method designed for few-shot scenarios was proposed.The method comprised two main parts: a packet sampling module and a meta-learning module.The packet sampling module was used for filtering, segmenting, and recombining raw network data, while the meta-learning module was used for feature extraction and result classification.Experimental results based on three few-shot datasets constructed from real network traffic data sources show that the method exhibits good applicability and fast convergence and effectively reduces the occurrence of outliers.In the case of 10 training samples, the maximum achievable detection rate is 99.29%, while the accuracy rate can reach a maximum of 97.93%.These findings demonstrate a noticeable improvement of 0.12% and 0.37% respectively, in comparison to existing algorithms.

Research on vehicle feature recognition algorithm based on optimized convolutional neural network
Xuan CHEN, Jiyi WU
2023, 39(10):  101-111.  doi:10.11959/j.issn.1000-0801.2023188
Asbtract ( 24 )   HTML ( 4)   PDF (6331KB) ( 18 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To address the issue of weak identification and low accuracy in recognizing features of target vehicles at different distances in road scene images, a vehicle feature recognition algorithm based on optimized convolutional neural network (CNN) was proposed.Firstly, a multi-scale input based on the PAN model was employed to capture target vehicle features at varying distances.Subsequently, improvements were made to the network model by incorporating multi-pool, batch normalization (BN) layers, and Leaky ReLU activation functions within the CNN architecture.Furthermore, the generalization ability of the network model was enhanced by introducing a hybrid attention mechanism that focuses on important features and regions in the vehicle image.Lastly, a multi-level CNN structure was constructed to achieve feature recognition for vehicles.Simulation experiment results conducted on the BIT-Vehicle database within a single scene show the proposed algorithm’s significant enhancements in single-object and multi-object recognition rates compared to CNN, R-CNN, ABC-CNN, Faster R-CNN, AlexNet, VGG16, and YOLOV8.Specifically, improvements of 16.75%, 10.9%, 4%, 3.7%, 2.46%, 1.3%, and 1% in single-object recognition, as well as 17.8%, 10.5%, 2.5%, 3.8%, 2.7%, 1.1%, and 1.3% in multi-object recognition, have been demonstrated by the proposed algorithm, respectively.Over the more complex UA-DETRAC datasets, more precise results have been also achieved by the proposed algorithm in recognizing target vehicles at various distances compared to other algorithms.

Research on theoretical ultimate value of 5G flow residence ratio based on big data
Hongjia LIU, Bei LI, Wei ZHAO, Guoping XU, Xinyan WANG
2023, 39(10):  112-119.  doi:10.11959/j.issn.1000-0801.2023119
Asbtract ( 24 )   HTML ( 2)   PDF (952KB) ( 17 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

The 5G flow residence ratio is an important indicator used by communication operators to evaluate the coverage capacity of 5G networks, and it is also an important starting point for the networks’ planning, optimization, maintenance and operation.To ensure user perception, the actual wireless transmission influencing factors, existing network structure and network coordination strategy, etc., need to be considered.The resident capacity of a 5G network in the 3.5 GHz frequency band was evaluated, analyzed and calculated, and the theoretical ultimate value of the 5G traffic resident ratio based on the analysis of network and users’ big data was put forward, which explained the positive relationship between user perception and residence ratio, and provided a reference for the reasonable theoretical ultimate value of 5G traffic resident ratio.

Research on 5G network base station site selection based on fruit fly optimization algorithm
2023, 39(10):  120-127.  doi:10.11959/j.issn.1000-0801.2023184
Asbtract ( 21 )   HTML ( 1)   PDF (1996KB) ( 24 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Faced with the fact that the spatial distribution of buildings is not considered in the location of 5G network base stations, which makes the base station site selection effect unsatisfactory and leads to the problem of small coverage of base stations, a research method for 5G network base station site selection based on fruit fly optimization algorithm was proposed.The distance from the front line base station to the circular coverage center was calculated, and the satellite communication equipment was used to locate the return signal to obtain the optional position area of the rear base station.The energy consumption of data reception, transmission and aggregation were calculated, and the load balancing of base station data was ensured under the premise of balanced distribution of cellular units.A two-layer location model for base station site selection was built, constraints were set, and the optimal location of base station was determined.The fruit fly optimization algorithm was used to update the position, and after individual update iterative processing, it was not to fall into local optimization and obtain the fine base station site selection position.It can be seen from the experimental results that the minimum losses of the front line and rear base stations in this method are 50 dB and 70 dB, respectively, and the coverage radius of the base station is 6 km, which is consistent with the coverage of the ideal base station.

Engineering and Application
Discussion on a computation-oriented network modality——computing power network modality
Rui LIN, Wenjuan XING, Bo LEI
2023, 39(10):  128-135.  doi:10.11959/j.issn.1000-0801.2023195
Asbtract ( 25 )   HTML ( 8)   PDF (1444KB) ( 23 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

New computing applications present new challenges to communication networks, for example, traditional network cannot meet the demands of flexible deployment, customized services, security and trustworthiness of new services.As a development paradigm that separated network technology and supported environment, polymorphic network provided new solutions to support the differentiated demands of various new applications.A type of computation-oriented network modality namely computing power network modality was discussed, for the computation-oriented business requirements based on the development trend of computing power network.Firstly, the design of computing power network modality was investigated, then the key technologies of computing power network modality were analyzed.Finally, the application scenarios of computing power network were prospected.It is hoped that the discussion can provide a reference for the future research and development on application of computation-oriented polymorphic network.

Risks and countermeasures of artificial intelligence generated content technology in content security governance
2023, 39(10):  136-146.  doi:10.11959/j.issn.1000-0801.2023190
Asbtract ( 60 )   HTML ( 7)   PDF (1074KB) ( 48 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Recently, artificial intelligence generated content (AIGC) technology has achieved various disruptive results and has become a new trend in AI research and application, driving AI into a new era.Firstly, the development status of AIGC technology was analyzed, focusing on generative models such as generative adversarial networks and diffusion models, as well as multimodal technologies, and surveying and elaborating on the existing technological capabilities for text, speech, image and video generation.Then, the risks brought by AIGC technology in the field of content security governance were focused and analyzed, including fake information, content infringement, network and software supply chain security, data leakage and other aspects.Finally, in view of the above security risks, counter strategies were proposed from the technical, application and regulatory levels, respectively.

Research on intelligent control technology for OSU-based OTN
Yanxia TAN, Zhiyan DUAN, Xiangkun MAN, He ZHANG, Yacheng LIU, Yantao ZHOU, Shan DONG
2023, 39(10):  147-155.  doi:10.11959/j.issn.1000-0801.2023196
Asbtract ( 18 )   HTML ( 6)   PDF (3468KB) ( 17 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

With the development of information and cloud technology, the dynamic demand for OTN service is gradually increasing.As a next generation OTN switching technology, OSU needs to provide network and cloud services for high-quality enterprise leased lines and boutique home broadband services.The OSU-based OTN needs to be able to provide integrated services and automated service provisioning through end-to-end management and control capabilities to support one-hop service into the cloud.Firstly, the background, technical characteristics, and standardization progress of OSU technology were introduced.Then, a service-aware control framework for OSU-OTN was proposed to meet the demand for efficient bearer of government and enterprise leased lines.Finally, an experimental validation of the end-to-end management and control capability of the access OSU-OTN controller system was carried out.

Analysis and application of pan-video playback quality evaluation model
Hua DING, Xin WANG, Zheng WEI, Chuanfei LUO, Hao SONG, Weijia SHI
2023, 39(10):  156-165.  doi:10.11959/j.issn.1000-0801.2023171
Asbtract ( 22 )   HTML ( 4)   PDF (1139KB) ( 17 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Pan-video refers to the business that takes video as the form of information presentation and interaction.It is mainly divided into three categories: traditional video business, emerging video business and derivative video business.However, how to accurately evaluate the quality of video playback has always been a problem.A pan-video playback quality evaluation model and parameters were proposed, which mainly included: video switching delay, video start delay, video playback pause times and duration, etc.It has been applied in the IPTV quality monitoring system of the current network, and the practice shows that the application effect is good.The proposed research results can be further applied to all pan-video application scenarios in the field of video network products.

Research on the applicability of SDN technical architecture
Xianhui CHEN, Yiting CAI, Mengxian CHEN, You WANG
2023, 39(10):  166-176.  doi:10.11959/j.issn.1000-0801.2023191
Asbtract ( 22 )   HTML ( 6)   PDF (1630KB) ( 26 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Firstly, several software defined network (SDN) architectures and their key technologies were introduced.Secondly, technical research on the applicability of these SDN architectures in optical transport network (OTN) on several key aspects such as network layering and network abstraction, southbound interface protocol selection, and path computation element (PCE) function integration was conductd and analyzed.Finally, guiding opinions and suggestions on the migration of the existing OTN network to these SDN technical architectures were given.

Research development and forecast of automatic speech recognition technologies
Haikun WANG,Jia PAN,Cong LIU
Telecommunications Science. 2018 Vol. 34 (2): 1-11 doi: 10.11959/j.issn.1000-0801.2018095
Abstract3317)   HTML440)    PDF (1267KB)(7423)    Knowledge map   
Current Research and Development Trend of 5G Network Technologies
Hucheng Wang,Hui Xu,Zhimi Cheng,Ke Wang
Telecommunications Science. 2015 Vol. 31 (9): 149-155 doi: 10.11959/j.issn.1000-0801.2015218
Abstract2682)   HTML376)    PDF (1401KB)(6583)    Knowledge map   
Kubernetes based converged cloud native infrastructure solution and key technologies
Zhenwei HE,Danchi HUANG,Liyun YAN,Yuanzhi LIN,Xinzhang YANG
Telecommunications Science. 2020 Vol. 36 (12): 77-88 doi: 10.11959/j.issn.1000-0801.2020314
Abstract708)   HTML106)    PDF (876KB)(6089)    Knowledge map   
Analysis in the Present and Developing Status of Cloud Computing
Bingyi Fang,Yunyong Zhang,Ying Cheng,Lei Xu
Telecommunications Science. 2010 Vol. 26 (8A): 1-10 doi: 10.3969/j.issn.1000-0801.2010.8A.001
Abstract2028)   HTML173)    PDF (1016KB)(5438)    Knowledge map   
Edge computing and network slicing technology in 5G
Hongyu XIANG,Yangwen XIAO,Xian ZHANG,Zhuying PIAO,Mugen PENG
Telecommunications Science. 2017 Vol. 33 (6): 54-63 doi: 10.11959/j.issn.1000-0801.2017200
Abstract1146)   HTML69)    PDF (1109KB)(5361)    Knowledge map   
A survey of mobile edge computing
Zishu LI,Renchao XIE,Li SUN,Tao HUANG
Telecommunications Science. 2018 Vol. 34 (1): 87-101 doi: 10.11959/j.issn.1000-0801.2018011
Abstract4857)   HTML518)    PDF (1331KB)(5225)    Knowledge map   
Progress of UAV Ad Hoc Network:A Survey
Kun Zhuo,Hengyang Zhang,Bo Zheng,Yunjun Qi
Telecommunications Science. 2015 Vol. 31 (4): 127-137 doi: 10.11959/j.issn.1000-0801.2015102
Abstract1022)   HTML64)    PDF (1710KB)(4799)    Knowledge map   
Review of image classification based on deep learning
Fu SU,Qin LV,Renze LUO
Telecommunications Science. 2019 Vol. 35 (11): 58-74 doi: 10.11959/j.issn.1000-0801.2019268
Abstract2970)   HTML611)    PDF (926KB)(4614)    Knowledge map   
Status and Development of Aeronautical Ad Hoc Networks
Bo Zheng,Hengyang Zhang,Guoce Huang,Qinghua Ren
Telecommunications Science. 2011 Vol. 27 (5): 38-47 doi: 10.3969/j.issn.1000-0801.2011.05.011
Abstract1187)   HTML31)    PDF (2752KB)(4371)    Knowledge map   
Big Data Technology:Current Applications and Prospects
Jianxin Liao
Telecommunications Science. 2015 Vol. 31 (7): 1-12 doi: 10.11959/j.issn.1000-0801.2015189
Abstract1422)   HTML100)    PDF (2835KB)(4267)    Knowledge map   
Research and application of industrial data acquisition based on industrial internet of things
Jianxiong ZHANG,Xiaoli WU,Zhen YANG,Jie LI
Telecommunications Science. 2018 Vol. 34 (10): 124-129 doi: 10.11959/j.issn.1000-0801.2018271
Abstract658)   HTML59)    PDF (1148KB)(4252)    Knowledge map   
Key Technologies in Physical Layer of 5G Wireless Communications Network
Shanjin Ni,Junhui Zhao
Telecommunications Science. 2015 Vol. 31 (12): 40-45 doi: 10.11959/j.issn.1000-0801.2015322
Abstract1362)   HTML3111)    PDF (1714KB)(3925)    Knowledge map   
Computing network:a new multi-access edge computing
Bo LEI, Zengyi LIU, Xuliang WANG, Mingchuan ·ANG, ·unqing CHEN
Telecommunications Science. 2019 Vol. 35 (9): 44-51 doi: 10.11959/j.issn.1000-0801.2019209
Abstract2095)   HTML238)    PDF (959KB)(3841)    Knowledge map   
Architecture design and standardization progress of 5G network
Telecommunications Science. 2016 Vol. 32 (4): 126-132 doi: 10.11959/j.issn.1000-0801.2016127
Abstract821)   HTML49)    PDF (2098KB)(3825)    Knowledge map   
Identifier technology in industrial internet
Zhen YANG,Dong ZHANG,Jie LI,Jianxiong ZHANG
Telecommunications Science. 2017 Vol. 33 (11): 134-140 doi: 10.11959/j.issn.1000-0801.2017296
Abstract1268)   HTML93)    PDF (891KB)(3800)    Knowledge map   
Theory, application fields and challenge of the blockchain technology
Dong LI,Jinwu WEI
Telecommunications Science. 2016 Vol. 32 (12): 20-26 doi: 10.11959/j.issn.1000-0801.2016309
Abstract1464)   HTML178)    PDF (1731KB)(3717)    Knowledge map   
Non-Orthogonal Multiple Access Technology for 5G Systems
Qi Bi,Lin Liang,Shan Yang,Peng Chen
Telecommunications Science. 2015 Vol. 31 (5): 14-21 doi: 10.11959/j.issn.1000-0801.2015137
Abstract1120)   HTML39)    PDF (2629KB)(3533)    Knowledge map   
PM2.5 concentration prediction model based on random forest regression analysis
Xu DU,Jingyu FENG,Shaoqing LV,Wei SHI
Telecommunications Science. 2017 Vol. 33 (7): 66-75 doi: 10.11959/j.issn.1000?0801.2017211
Abstract283)   HTML34)    PDF (1211KB)(3440)    Knowledge map   
Mobile user behavior analysis system and applications based on big data
Hongxun GU,Ke YANG
Telecommunications Science. 2016 Vol. 32 (3): 139-146 doi: 10.11959/j.issn.1000-0801.2016039
Abstract1379)   HTML183)    PDF (1739KB)(3439)    Knowledge map   
Research on Application of Big Data Technique in Electricity Power Industry
Yunshan Zhao,Huanhuan Liu
Telecommunications Science. 2014 Vol. 30 (1): 57-62 doi: 10.3969/j.issn.1000-0801.2014.01.009
Abstract924)   HTML64)    PDF (2093KB)(3378)    Knowledge map   
Technologies,standards and applications of LTE-V2X for vehicular networks
Shanzhi CHEN,Jinling HU,Yan SHI,Li ZHAO
Telecommunications Science. 2018 Vol. 34 (4): 1-11
doi: 10.11959/j.issn.1000-0801.2018140
Abstract( 5955 )   HTML PDF (967KB) (3266 Knowledge map   
A survey of mobile edge computing
Zishu LI,Renchao XIE,Li SUN,Tao HUANG
Telecommunications Science. 2018 Vol. 34 (1): 87-101
doi: 10.11959/j.issn.1000-0801.2018011
Abstract( 4857 )   HTML PDF (1331KB) (5225 Knowledge map   
Research development and forecast of automatic speech recognition technologies
Haikun WANG,Jia PAN,Cong LIU
Telecommunications Science. 2018 Vol. 34 (2): 1-11
doi: 10.11959/j.issn.1000-0801.2018095
Abstract( 3317 )   HTML PDF (1267KB) (7423 Knowledge map   
Review of image classification based on deep learning
Fu SU,Qin LV,Renze LUO
Telecommunications Science. 2019 Vol. 35 (11): 58-74
doi: 10.11959/j.issn.1000-0801.2019268
Abstract( 2970 )   HTML PDF (926KB) (4614 Knowledge map   
A survey of key protocol and application scenario of time-sensitive network
Peizhuang CONG, Ye TIAN, Xiangyang GONG, Xirong QUE, Wendong WANG
Telecommunications Science. 2019 Vol. 35 (10): 31-42
doi: 10.11959/j.issn.1000-0801.2019227
Abstract( 2966 )   HTML PDF (944KB) (967 Knowledge map   
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Total visitors:
Visitors of today:
Now online: