[1] |
Lu HAN, Weiyu CHEN, Fei ZHANG, Jianfeng HE, Huaizhen SU.
Big data classification method of non relational distributed submission information under differentiated requirements
[J]. Telecommunications Science, 2023, 39(6): 114-121.
|
[2] |
Xue HAN.
Damage toughness assessment method of power backbone communication network based on power big data
[J]. Telecommunications Science, 2023, 39(5): 136-143.
|
[3] |
Yudi SUN.
A prediction model of massive 5G network users’ revisit behavior based on telecom big data
[J]. Telecommunications Science, 2023, 39(2): 157-162.
|
[4] |
Xia GONG, Huanan CHEN, Yongqing ZHU, Shizhang YUAN, Bing YANG.
Research on deployment of pooled vBRAS in cloud IP metropolitan area network
[J]. Telecommunications Science, 2023, 39(1): 146-152.
|
[5] |
Aihua LI, Xiaobo WU, Chao CHEN, Bin WEI, Yuanyuan SHI.
Big data intelligent analysis technology for 5G network
[J]. Telecommunications Science, 2022, 38(8): 129-139.
|
[6] |
Gengsheng HUANG, Yuhong HUANG, Manxue GUO, Jianping ZHENG, Xin GE.
Architecture of a new infrastructure for data service in DT era
[J]. Telecommunications Science, 2022, 38(7): 138-145.
|
[7] |
Panpan LI, Zhengxia XIE, Guangxue YUE, Xin LIU.
Research progress and trends of deep learning based wireless communication receiving method
[J]. Telecommunications Science, 2022, 38(2): 1-17.
|
[8] |
Haibo ZHAO, Zhijun XIANG, Linsong XIAO.
A big data framework for short-term power load forecasting using heterogenous data
[J]. Telecommunications Science, 2022, 38(12): 103-111.
|
[9] |
Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG.
Big data security features and operation practices
[J]. Telecommunications Science, 2021, 37(5): 160-169.
|
[10] |
Fan ZHANG, Guangwei XIE, Wei GUO, Hongchao HU, Ruyun ZHANG, Wenyan LIU.
Key technologies and implementation methods of endogenous safety and security cloud data center based on mimic architecture
[J]. Telecommunications Science, 2021, 37(3): 39-48.
|
[11] |
Yufeng LI, Chenhong CAO, Jiangtao LI, Peng WANG.
An endogenous safety and security technical framework inspired by biological immune system
[J]. Telecommunications Science, 2021, 37(3): 49-56.
|
[12] |
Ruyun ZHANG, Heyuan LI, Shunbin LI.
Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints
[J]. Telecommunications Science, 2021, 37(3): 57-65.
|
[13] |
Hongyi ZHU, Xiaoyuan LU, Yi LI.
Management technologies of cyberspace endogenous safety and security test site
[J]. Telecommunications Science, 2021, 37(3): 66-74.
|
[14] |
Suxiang ZHANG, Wenjing LIU, Ziyan ZHAO, Jinping CAO, Na ZHANG, Wei TENG, Xiangyu WU.
Technological innovation drives the high-quality development of the power industry
[J]. Telecommunications Science, 2021, 37(12): 144-152.
|
[15] |
Xiaojun LIU,Juan WU,Xiaoqing XU.
Big data architecture analysis and data security fusion technology
[J]. Telecommunications Science, 2020, 36(7): 146-155.
|