Editors Recommend
20 March 2024, Volume 40 Issue 3
Review
Toward satellite-terrestrial integration: 6G cloud-fog collaborative self-organizing network
Mugen PENG, Shuo YUAN
2024, 40(3):  1-14.  doi:10.11959/j.issn.1000-0801.2024083
Asbtract ( 22 )   HTML ( 6)   PDF (4726KB) ( 37 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Low earth orbit (LEO) satellite constellations are evolving to support on-board processing, reconfigurable functions, satellite-terrestrial cooperation, and the coordinated execution of multiple tasks, including communication, sensing, navigation, and control.However, LEO satellite networks are constrained by bottlenecks such as inadequate signal processing and computing capabilities of individual LEO satellites and constrained inter-satellite link capacity, necessitating a deep integration with terrestrial mobile communication networks that include extensive cloud-based processing and computing capabilities.Therefore, an innovative architecture for an integrated satellite-terrestrialbased 6G cloud-fog collaborative self-organizing network was proposed and its protocols were discussed, achieving the deep integration of LEO fog-based satellite networks and terrestrial cloud-based communication networks.In addition, key technologies such as integrated communication, sensing, navigation, and control waveform, as well as resource management based on satellite onboard fog processing, along with mobility management and intelligent information processing based on cloud-fog collaboration, were elaborated in detail.In the end, insights into future directions for standardization and hardware experimentation were presented.

Research and Development
Research on 5G wide-area Internet of things information transmission method based on mobile piggyback
Zheng GUO, Le XU, Haiying ZHANG, Fengguang ZOU, Weixiao MENG
2024, 40(3):  15-28.  doi:10.11959/j.issn.1000-0801.2024080
Asbtract ( 8 )   HTML ( 3)   PDF (6172KB) ( 16 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To solve the network access problem of low data rate and delay-insensitive services in remote areas, a widearea Internet of things (IoT) information transmission method based on mobile piggyback was proposed.Mobile carriers were used to provide senseless access support for IoT devices and expand network coverage.In areas without base station signal coverage, the mobile carrier established a connection with the sensor, obtained sensor data and stored it.When 5G access conditions were met, the sensing information was offloaded to achieve information access to the network.A data caching strategy based on cost function was proposed to improve the efficiency of information piggybacking.The coverage performance of the mobile piggyback scheme was analyzed and a hardware implementation scheme based on LoRa was designed.Simulation results show that the wide-area IoT information transmission method based on mobile piggyback can improve the efficiency of IoT information piggyback, and expand the coverage area of 5G network by 4.98 times.Field tests verify the effectiveness of the proposed method, and mobile piggyback nodes can achieve communication coverage with a radius of 4 km.

Task urgency-based resource allocation algorithm in industrial Internet of things
Hong ZOU, Sai ZHUO, Hong ZHANG, Mingxing ZHANG, Dapeng WU
2024, 40(3):  29-38.  doi:10.11959/j.issn.1000-0801.2024018
Asbtract ( 8 )   HTML ( 2)   PDF (5968KB) ( 16 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

In the industrial Internet of things, the generation of tasks is observed to exhibit both continuity and periodicity, along with stringent latency requirements.These characteristics posed challenges to system’s cost-efficiency.To address these challenges, a cost minimization resource allocation algorithm based on the urgency of tasks was proposed.By employing a genetic algorithm, the task offloading strategy and the system’s resource allocation strategy were optimized.For offloaded tasks, they were scheduled according to their level of urgency.Additionally, the optimal transmission power for each task was calculated to meet latency constraints.Simulation results indicate that the proposed algorithm effectively reduces the overall energy cost of the system.

5G OFDM channel estimation method based on complexvalued generative adversarial network
Yuanzhi LU, Xianglin WEI, Long YU, Changhua YAO
2024, 40(3):  39-52.  doi:10.11959/j.issn.1000-0801.2024069
Asbtract ( 10 )   HTML ( 3)   PDF (7890KB) ( 16 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Accurate channel estimation is a critical component in the design of 5G OFDM communication system receivers, since it can significantly reduce the bit error rate (BER), thus improving wireless communication efficiency and quality.Channel estimation methods based on least square (LS) and minimum mean square error (MMSE) effectively utilize the system’s sparsity, but LS algorithms face low computational precision, while MMSE algorithms suffer from high computational complexity.To promote the estimation accuracy, practitioners have presented several deep learning-based channel estimation methods.However, existing methods often split complex matrices into real and imaginary parts, failing to adequately capture the complex characteristics of the channel, leading to distortion in the estimated channel matrix.A complex-valued generative adversarial network (GAN) model that could fully extract the complex features of the signals was proposed, enabling accurate estimation of the channel matrix for the physical downlink shared channel (PDSCH) in the 5G new radio (NR) standard.To validate the effectiveness of the proposed method, the proposed method was compared with LS algorithms, actual channel estimation, super-resolution neural networks, and residual neural network channel estimation methods.Results show that when the mean square error between the estimated channel matrix and the true channel matrix is 0.01, the proposed method-based communication system has a signal-to-noise ratio (SNR) that is 5 dB higher than existing ones.

Slice scheduling for industrial time-critical services in 5G TSN integration network
Wanqing GUAN, Nuoyan LIU, Wei LI, Meixia FU, Haijun ZHANG
2024, 40(3):  53-63.  doi:10.11959/j.issn.1000-0801.2024073
Asbtract ( 4 )   HTML ( 1)   PDF (11474KB) ( 15 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

The integrated deployment of 5G and time sensitive network (TSN) is an important foundation for realizing wireless industrial Internet and flexible manufacturing.How to guarantee the high-quality transmission simultaneously of diverse industrial services and mobile services is a key issue to be solved for 5G TSN integration.Therefore, the types of industrial services were divided according to the differences in requirement characteristics, a slice scheduling strategy for industrial Internet was designed to satisfy the requirements of periodic time-critical services and sporadic burst services, and a resource partitioning algorithm based on uniform distribution was proposed.By controlling resource reservation and resource preemption, the proposed method can optimize the utilization of wireless resources and guarantee the delay of industrial traffic and the transmission rate of mobile services.Finally, the effectiveness of the proposed method in improving the service requirements satisfaction and resource utilization was verified by simulation experiments.

Adversarial example generation method for SAR images based on mask extraction
Jianwu ZHANG, Hao NAI, Jie LI, Jianhua QIAN, Yinfeng FANG
2024, 40(3):  64-74.  doi:10.11959/j.issn.1000-0801.2024081
Asbtract ( 11 )   HTML ( 2)   PDF (6470KB) ( 24 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

There are many ways to generate adversarial samples for synthetic aperture radar (SAR) images at present, but some problems such as large amount of perturbation of adversarial samples, unstable training, and unguaranteed quality of adversarial samples still exist.To solve the above problems, a SAR image adversarial sample generation model was proposed.The model was based on the AdvGAN model architecture.Firstly, according to the characteristics of the SAR images, an adaptive threshold segmentation method based on the enhanced Lee filter OTSU was designed.The mask extraction module composed of equal modules, this method produced a smaller amount of disturbance, and the structural similarity (SSIM) with the original sample reached that more than 0.997.Secondly, the improved relativistic average GAN (RaGAN) loss was introduced into AdvGAN, and the relative mean discriminator was used to make the discriminator rely on both real data and generated data during training, which improved the stability of training and the attack effect.Experiments were compared with related methods on the MSTAR dataset.Experiments show that the attack success rate of SAR image adversarial samples generated by this method is increased by 10%~15% than that of traditional methods when attacking defense models.

Meta-path convolution based heterogeneous graph neural network algorithm
Zhilong QIN, Kun DENG, Xingyan LIU
2024, 40(3):  89-103.  doi:10.11959/j.issn.1000-0801.2024070
Asbtract ( 14 )   HTML ( 4)   PDF (3181KB) ( 21 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

In the multilayer graph convolution calculation, each node is usually represented as a single vector, which makes the high-order graph convolution layer unable to distinguish the information of different relationships and sequences, resulting in the loss of information in the transmission process.To solve this problem, a heterogeneous graph neural network algorithm based on meta-path convolution was proposed.Firstly, the feature transformation was used to adaptively adjust the node features.Secondly, the high-order indirect relationship between the nodes was mined by convolution within the meta-path to capture the interaction between the target node and other types of nodes under the element path.Finally, the reciprocity between semantics was explored through the self-attention mechanism, and the features from different meta-paths were fused.Extensive experiments were carried out on ACM, IMDB and DBLP datasets, and compared with the current mainstream algorithms.The experimental results show that the average increase of Macro-F1 in the node classification task is 0.5%~3.5%, and the ARI value in the node clustering task is increased by 1%~3%, which proves that the algorithm is effective and feasible.

Target localization method based on semi-definite relaxation with frequency difference of arrival
Xiaoting MAO, Xiaoping WU
2024, 40(3):  104-115.  doi:10.11959/j.issn.1000-0801.2024076
Asbtract ( 7 )   HTML ( 0)   PDF (2931KB) ( 12 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

The use of frequency measurements to achieve target positioning is characterized by low cost and high reliability.Using only frequency difference of arrival (FDOA) measurements, a precise localization method for static target position was proposed.To address the highly nonlinear of the established frequency measurement equation, it was transformed into a pseudo-linear equation in matrix form by introducing auxiliary variables.Then the non-convex weighted least squares (WLS) problem was relaxed into a semi-definite programming (SDP) problem by using the semi-definite relaxation (SDR) method, so as to further accurately estimate the position of unknown variables.Finally, the root mean square error (RMSE) of the proposed method was analyzed to verify its performance.The simulation results show that the performance of the adopted semi-definite relaxation method is able to reach the Cramer-Rao lower bound (CRLB) at lower Gaussian noise levels and the algorithm is highly robust to geometry.In addition, its RMSE performance is better than that of the two-stage weighted least square (TSWLS) method for a smaller number of sensors.

Physical layer security of relay selection NOMA wireless systems
Yancui LUO, Guangqiu LI, Mingzhu YE, Hui GAO, Yajuan ZHANG
2024, 40(3):  116-127.  doi:10.11959/j.issn.1000-0801.2024077
Asbtract ( 5 )   HTML ( 1)   PDF (3271KB) ( 14 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Aiming at poor performance of physical layer security (PLS) of decode-and-forward cooperative nonorthogonal multiple access (NOMA) systems and its performance deterioration in the presence of multi-eavesdropper, the PLS model of multi-relay selection NOMA wireless systems using modify-and-forward (MF) protocol was proposed.The approximate expressions of secrecy outage probability(SOP) and asymptotic SOP of multi-relay selection MF-NOMA wireless systems with non-colluding or colluding eavesdropping scenarios were derived by using GaussChebyshev Quadrature theorem.The simulation results verify the accuracy of PLS performance analysis of the above MF-NOMA wireless systems.The results also indicate that the PLS performance of multi-relay selection MF-NOMA wireless systems will be improved when the number of relays increases or the number of eavesdroppers decreases, and that colluding eavesdropping is more detrimental to secure transmission of multi-relay MF-NOMA wireless systems than non-colluding eavesdropping.

Accurate location method of branch line break fault in distribution network considering system operation mode
Fei XU, Yanzhen DENG, Honghui LIU, Hui WANG, Haiyang ZHAO
2024, 40(3):  128-135.  doi:10.11959/j.issn.1000-0801.2024032
Asbtract ( 6 )   HTML ( 0)   PDF (3146KB) ( 11 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

In the process of locating faults caused by branch line breaks in distribution networks, it is difficult to determine the range of wire breakage due to differences in fault interference branch node identification methods.The relative error of fault location results under different sampling rates is relatively large.Therefore, a accurate location method for branch line break faults in distribution networks considering system operation mode was proposed.The traveling wave transmission path within the power supply system was analyzed based on the topology of the distribution network.A connection matrix for branch nodes was constructed in the distribution network based on the operating mode of the power supply system.Identify the branch nodes affected by wire breakage faults and determine the scope of wire breakage occurrence.Determine the fault occurrence interval based on the characteristic parameters of wire breakage faults.By combining the time difference between zero mode traveling wave and line mode traveling wave, fault location can be obtained, achieving precise positioning of branch line breakage faults in distribution networks.The example analysis results show that after obtaining a high-precision traveling wave signal waveform, the relative error of fault localization results at different sampling rates is reduced by 48% and 12%.

Engineering and Application
Research on the application of knowledge graph in intelligent operation and maintenance for optical transport network
Ganggang YANG, Zhugui SHAO, Fengliang SHANG, Jianrong XU, Cui LIU
2024, 40(3):  136-146.  doi:10.11959/j.issn.1000-0801.2024074
Asbtract ( 6 )   HTML ( 2)   PDF (4828KB) ( 39 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

In order to solve the problems of high cost, low efficiency, and weak intelligence in the traditional operation and maintenance mode of optical transport networks, the research status and challenges of knowledge graph technology in the telecom industry were analyzed.Firstly, an intelligent operation and maintenance system architecture for optical transport networks based on knowledge graphs were proposed.Key technologies such as network state perception, knowledge graph construction, and open search capabilities were emphatically studied.Secondly, the application of intelligent cutover in a city branch of China Telecom was taken as an example, the application effect was analyzed, and the test showed that the cutover efficiency was improved by about 3 times.Finally, the development trend of intelligent operation and maintenance of optical transmission networks based on knowledge graphs was discussed.

L-PS-M hierarchical evolution target system framework for telecommunications service support system
Wen QIAO, Peng WANG, Shoufeng WANG, Aidong YANG, Ye OUYANG
2024, 40(3):  147-161.  doi:10.11959/j.issn.1000-0801.2024072
Asbtract ( 11 )   HTML ( 0)   PDF (4552KB) ( 16 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

With the continuous development of communication technology and the accelerated arrival of enterprise digitization, the telecom business support system is also evolving and changing.In order to realize the goal of highquality, high-efficiency and sustainable evolution, telecom operators need to establish an effective and adaptive to the market demand of business support system hierarchical evolution target system.Based on the analysis of the basic characteristics of the current telecom business support system and the demand of operation services, a framework of L-PS-M (level-process-system-measurement) hierarchical evolution target system for telecom operation service support was proposed.The framework firstly constructed a three-dimensional cube mapping structure formed by the three dimensional factors of end-to-end business process, system support capability, and hierarchical goal.Secondly, a subdivided implementation path of the operation service support system was given.Thirdly, telecom carriers could carry out the planning and optimization of the system support capability according to the actual demand in a targeted way through the implementation path, so as to improve the efficiency of the operation and system production, and further clarified the evolution of the business support system, which was applicable to telecom operations.It further clarified the evolution direction of the business support system.

Research on 5G communication architecture of distribution network and its latency with reliability
Haiyang WANG, Yudong WANG, Han LIU, Haipeng SUN, Jin YANG, Zhenghao LI
2024, 40(3):  162-173.  doi:10.11959/j.issn.1000-0801.2024082
Asbtract ( 6 )   HTML ( 1)   PDF (4246KB) ( 16 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

The core value of 5G in the field of digital distribution network is to give play to the technical advantages of 5G in ultra-high reliability and low latency, and provide high reliability and low latency communication for the control related business of distribution network.In order to provide a systematic theoretical analysis scheme for the latency and reliability of 5G communication deployment applications in the distribution network, a typical architecture of 5G communication in the distribution network in combination with digital distribution network services was given, the latency model for 5G communication in the distribution network was deeply analyzed.The end-to-end latency analysis for 5G frame structures of four operators in China was conducted with 5G reliability values of 3GPP Rel-15 and Rel-16 through 5G link level simulation.At last, a joint analysis method of time latency and reliability of 5G communication in distribution network was proposed.

An automatic verification method for software quality with real business data
Biao TIAN, Wei CUI, Hui HUANG, Xiaolong FENG
2024, 40(3):  174-186.  doi:10.11959/j.issn.1000-0801.2024071
Asbtract ( 5 )   HTML ( 1)   PDF (4435KB) ( 22 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Performance tests help to verify whether a business cluster can meet its access scale requirements, but current tools have problems such as evaluating proper parameters and requiring manual inputs, low performance, and difficulty in automation.A comprehensive quantitative request rate control mechanism and concurrent design approach based on coroutines were proposed, in contrast to JMeter’s reliance on threads and locks.Furthermore, an architecture design for its corresponding TaaS service and a process automation scheme were introduced.This scheme automatically perceives responses, adjusts access rates accordingly, and schedules additional server executions using real business data, significantly enhancing operational efficiency and result intuitiveness.

Research development and forecast of automatic speech recognition technologies
Haikun WANG,Jia PAN,Cong LIU
Telecommunications Science. 2018 Vol. 34 (2): 1-11 doi: 10.11959/j.issn.1000-0801.2018095
Abstract3508)   HTML489)    PDF (1267KB)(7785)    Knowledge map   
Current Research and Development Trend of 5G Network Technologies
Hucheng Wang,Hui Xu,Zhimi Cheng,Ke Wang
Telecommunications Science. 2015 Vol. 31 (9): 149-155 doi: 10.11959/j.issn.1000-0801.2015218
Abstract2718)   HTML394)    PDF (1401KB)(7062)    Knowledge map   
Review of image classification based on deep learning
Fu SU,Qin LV,Renze LUO
Telecommunications Science. 2019 Vol. 35 (11): 58-74 doi: 10.11959/j.issn.1000-0801.2019268
Abstract3268)   HTML681)    PDF (926KB)(6265)    Knowledge map   
Kubernetes based converged cloud native infrastructure solution and key technologies
Zhenwei HE,Danchi HUANG,Liyun YAN,Yuanzhi LIN,Xinzhang YANG
Telecommunications Science. 2020 Vol. 36 (12): 77-88 doi: 10.11959/j.issn.1000-0801.2020314
Abstract771)   HTML120)    PDF (876KB)(6208)    Knowledge map   
Edge computing and network slicing technology in 5G
Hongyu XIANG,Yangwen XIAO,Xian ZHANG,Zhuying PIAO,Mugen PENG
Telecommunications Science. 2017 Vol. 33 (6): 54-63 doi: 10.11959/j.issn.1000-0801.2017200
Abstract1183)   HTML74)    PDF (1109KB)(6124)    Knowledge map   
Analysis in the Present and Developing Status of Cloud Computing
Bingyi Fang,Yunyong Zhang,Ying Cheng,Lei Xu
Telecommunications Science. 2010 Vol. 26 (8A): 1-10 doi: 10.3969/j.issn.1000-0801.2010.8A.001
Abstract2067)   HTML179)    PDF (1016KB)(5862)    Knowledge map   
Progress of UAV Ad Hoc Network:A Survey
Kun Zhuo,Hengyang Zhang,Bo Zheng,Yunjun Qi
Telecommunications Science. 2015 Vol. 31 (4): 127-137 doi: 10.11959/j.issn.1000-0801.2015102
Abstract1100)   HTML75)    PDF (1710KB)(5456)    Knowledge map   
A survey of mobile edge computing
Zishu LI,Renchao XIE,Li SUN,Tao HUANG
Telecommunications Science. 2018 Vol. 34 (1): 87-101 doi: 10.11959/j.issn.1000-0801.2018011
Abstract5029)   HTML548)    PDF (1331KB)(5450)    Knowledge map   
Computing network:a new multi-access edge computing
Bo LEI, Zengyi LIU, Xuliang WANG, Mingchuan ·ANG, ·unqing CHEN
Telecommunications Science. 2019 Vol. 35 (9): 44-51 doi: 10.11959/j.issn.1000-0801.2019209
Abstract2255)   HTML259)    PDF (959KB)(5109)    Knowledge map   
Big Data Technology:Current Applications and Prospects
Jianxin Liao
Telecommunications Science. 2015 Vol. 31 (7): 1-12 doi: 10.11959/j.issn.1000-0801.2015189
Abstract1441)   HTML106)    PDF (2835KB)(5054)    Knowledge map   
Status and Development of Aeronautical Ad Hoc Networks
Bo Zheng,Hengyang Zhang,Guoce Huang,Qinghua Ren
Telecommunications Science. 2011 Vol. 27 (5): 38-47 doi: 10.3969/j.issn.1000-0801.2011.05.011
Abstract1224)   HTML31)    PDF (2752KB)(4667)    Knowledge map   
Research and application of industrial data acquisition based on industrial internet of things
Jianxiong ZHANG,Xiaoli WU,Zhen YANG,Jie LI
Telecommunications Science. 2018 Vol. 34 (10): 124-129 doi: 10.11959/j.issn.1000-0801.2018271
Abstract710)   HTML61)    PDF (1148KB)(4537)    Knowledge map   
Key Technologies in Physical Layer of 5G Wireless Communications Network
Shanjin Ni,Junhui Zhao
Telecommunications Science. 2015 Vol. 31 (12): 40-45 doi: 10.11959/j.issn.1000-0801.2015322
Abstract1389)   HTML3113)    PDF (1714KB)(4258)    Knowledge map   
Architecture design and standardization progress of 5G network
Hao ZHU,Fei XIANG
Telecommunications Science. 2016 Vol. 32 (4): 126-132 doi: 10.11959/j.issn.1000-0801.2016127
Abstract842)   HTML50)    PDF (2098KB)(4237)    Knowledge map   
Theory, application fields and challenge of the blockchain technology
Dong LI,Jinwu WEI
Telecommunications Science. 2016 Vol. 32 (12): 20-26 doi: 10.11959/j.issn.1000-0801.2016309
Abstract1497)   HTML180)    PDF (1731KB)(4223)    Knowledge map   
Identifier technology in industrial internet
Zhen YANG,Dong ZHANG,Jie LI,Jianxiong ZHANG
Telecommunications Science. 2017 Vol. 33 (11): 134-140 doi: 10.11959/j.issn.1000-0801.2017296
Abstract1325)   HTML98)    PDF (891KB)(4081)    Knowledge map   
Non-Orthogonal Multiple Access Technology for 5G Systems
Qi Bi,Lin Liang,Shan Yang,Peng Chen
Telecommunications Science. 2015 Vol. 31 (5): 14-21 doi: 10.11959/j.issn.1000-0801.2015137
Abstract1159)   HTML40)    PDF (2629KB)(3893)    Knowledge map   
Mobile user behavior analysis system and applications based on big data
Hongxun GU,Ke YANG
Telecommunications Science. 2016 Vol. 32 (3): 139-146 doi: 10.11959/j.issn.1000-0801.2016039
Abstract1409)   HTML187)    PDF (1739KB)(3866)    Knowledge map   
Research on Application of Big Data Technique in Electricity Power Industry
Yunshan Zhao,Huanhuan Liu
Telecommunications Science. 2014 Vol. 30 (1): 57-62 doi: 10.3969/j.issn.1000-0801.2014.01.009
Abstract956)   HTML67)    PDF (2093KB)(3678)    Knowledge map   
Mobile edge computing and application in traffic offloading
Jianmin ZHANG,Weiliang XIE,Fengyi YANG,Zhouyun WU,Liang XIE
Telecommunications Science. 2016 Vol. 32 (7): 132-143 doi: 10.11959/j.issn.1000-0801.2016165
Abstract1487)   HTML91)    PDF (1258KB)(3636)    Knowledge map   
Technologies,standards and applications of LTE-V2X for vehicular networks
Shanzhi CHEN,Jinling HU,Yan SHI,Li ZHAO
Telecommunications Science. 2018 Vol. 34 (4): 1-11
doi: 10.11959/j.issn.1000-0801.2018140
Abstract( 6116 )   HTML PDF (967KB) (3467 Knowledge map   
A survey of mobile edge computing
Zishu LI,Renchao XIE,Li SUN,Tao HUANG
Telecommunications Science. 2018 Vol. 34 (1): 87-101
doi: 10.11959/j.issn.1000-0801.2018011
Abstract( 5029 )   HTML PDF (1331KB) (5450 Knowledge map   
Research development and forecast of automatic speech recognition technologies
Haikun WANG,Jia PAN,Cong LIU
Telecommunications Science. 2018 Vol. 34 (2): 1-11
doi: 10.11959/j.issn.1000-0801.2018095
Abstract( 3508 )   HTML PDF (1267KB) (7785 Knowledge map   
Review of image classification based on deep learning
Fu SU,Qin LV,Renze LUO
Telecommunications Science. 2019 Vol. 35 (11): 58-74
doi: 10.11959/j.issn.1000-0801.2019268
Abstract( 3268 )   HTML PDF (926KB) (6265 Knowledge map   
A survey of key protocol and application scenario of time-sensitive network
Peizhuang CONG, Ye TIAN, Xiangyang GONG, Xirong QUE, Wendong WANG
Telecommunications Science. 2019 Vol. 35 (10): 31-42
doi: 10.11959/j.issn.1000-0801.2019227
Abstract( 3038 )   HTML PDF (944KB) (1179 Knowledge map   
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: