Editors Recommend
25 December 2024, Volume 45 Issue 12
Papers
Research on uplink sum-rate maximization for STAR-RIS assisted batteryless IoT: SDMA versus NOMA
Yanming CHEN, Bin LYU, Zhen YANG, Fei LI
2024, 45(12):  1-15.  doi:10.11959/j.issn.1000-436x.2024207
Asbtract ( 36 )   HTML ( 3)   PDF (1898KB) ( 15 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To address the limitations of half-space coverage, low information transmission efficiency of RIS assisted batteryless IoT, a STAR-RIS assisted transmission scheme was proposed. Specifically, a STAR-RIS was deployed between the batteryless device (BD) and the access point, facilitating the uplink information transmission from the BD to the access point, thereby achieving full-space network coverage of the BD. To further enhance energy transmission efficiency, energy beamforming was designed at the power station. To this end, the system sum-rate maximization problems for both space division multiple access (SDMA) and non-orthogonal multiple access (NOMA) scenarios were investigated, with jointly optimization of the relection coefficients of the BD, the energy beamforming vector at the base station and the coefficient matrices of the STAR-RIS. For the SDMA scenario, an iterative algorithm based on the block coordinate descent (BCD) framework was proposed to solve the optimization problem. Similarly, to address the non-convexity of the optimization problem in the NOMA scenario, the objective function was transformed to simplify its solution, and another iterative algorithm based on the BCD framework was proposed. Numerical results show the superiorities of the proposed schemes over the benchmark schemes. Moreover, the utilization of the NOMA achieves better performance than the SDMA.

Stealthy data poisoning attack method on offline reinforcement learning in unmanned systems
Xue ZHOU, Dapeng MAN, Chen XU, Jiguang LYU, Fanyi ZENG, Chaoyang GAO, Wu YANG
2024, 45(12):  16-27.  doi:10.11959/j.issn.1000-436x.2024264
Asbtract ( 27 )   HTML ( 3)   PDF (2510KB) ( 14 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Aiming at the limitations in effectiveness and stealth of existing offline reinforcement learning(RL) data poisoning attacks, a critical time-step dynamic poisoning attack was proposed, perturbing important samples to achieve efficient and covert attacks. Temporal difference errors, identified through theoretical analysis as crucial for model learning, were used to guide poisoning target selection. A bi-objective optimization approach was introduced to minimize perturbation magnitude while maximizing the negative impact on performance. Experimental results show that with only a 1% poisoning rate, the method reduces agent performance by 84%, revealing the sensitivity and vulnerability of offline RL models in unmanned systems.

Study on video action recognition based on augment negative example multi-granularity discrimination model
Liangzhen LIU, Yang YANG, Yingjie XIA, Li KUANG
2024, 45(12):  28-43.  doi:10.11959/j.issn.1000-436x.2024268
Asbtract ( 18 )   HTML ( 2)   PDF (2671KB) ( 14 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

An augment negative example discrimination paradigm based on contrastive learning was proposed to improve the model’s fine-grained discrimination ability of video actions. The most challenging video-text negative pairs was generated, forming an augmented negative example set for each video sample. Based on this paradigm, a multi-granularity discrimination model for video action recognition was proposed to further distinguish between positive and negative examples. In this model, video features were extracted by the video representation module guided by textual positive examples, while self-correlation relationships between positive and negative semantics were established by the semantic discriminator equipped with a self-attention mechanism. Meanwhile, a coarse-grained distinction between the video modality and the augmented negative example set was achieved, while a fine-grained distinction between positive examples and the augmented negative example set within the text modality was also accomplished. Experimental results demonstrate that the augment negative set improves the model’s recognition ability on fine-grained class labels, and the multi-granularity discrimination model outperforms current state-of-the-art methods on the Kinetics-400, HMDB51 and UCF101 datasets.

Pedestrian trajectory prediction method based on group perception
Ruyan WANG, Yudie ZHOU, Dapeng WU, Ang DUAN, Yaping CUI, Peng HE
2024, 45(12):  44-56.  doi:10.11959/j.issn.1000-436x.2024224
Asbtract ( 22 )   HTML ( 3)   PDF (4166KB) ( 13 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Most methods do not model the pedestrian groups in autonomous driving, which will have an impact on road traffic safety. Therefore, a group perception pedestrian trajectory prediction network called GPCNet was proposed. Specifically, in intra-group, the interaction between pedestrian was learned at the individual level and the preference issue of different pedestrian was considered. In inter-group, the interaction between pedestrian groups was learned at the group level and the collision issue of pedestrian trajectory was considered using the social force model. Simulation results demonstrate that GPCNet improves the performance on the ETH and UCY datasets by 75.4% compared to the commonly used trajectory prediction methods.

Cross-chain medical data sharing scheme based on elliptic curve signcryption
Huifang YU, Lei LI
2024, 45(12):  57-66.  doi:10.11959/j.issn.1000-436x.2024213
Asbtract ( 27 )   HTML ( 2)   PDF (1694KB) ( 10 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Decentralized blockchain can realize the storage of medical data. Due to high isolation of blockchain from external environments, medical data in inside blockchain of medical institutions can only be shared within institution itself. To address the requester identity authentication and shared data security in cross-chain medical data sharing, a cross- chain medical data sharing scheme based on elliptic curve signcryption was devised in this article. Relay chain was used to realize interactive sharing of medical data. Cross-chain medical data was hierarchically processed for better effect of cross-chain data exchange. Signcryption process was completed by smart contracts to obtain high execution efficiency. Deletion and modification functions of medical data were deployed in smart contracts to solve the frequent updation problem of medical data.

Phased array radar individual recognition based on phase-frequency fusion feature
Baozhu LI, Lu MA, Longhui LI, Tao HONG, Wen JIANG
2024, 45(12):  67-82.  doi:10.11959/j.issn.1000-436x.2024201
Asbtract ( 20 )   HTML ( 3)   PDF (6701KB) ( 19 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To solve the problem of phased-array radar individual identification in the complex electromagnetic environment with wide spectrum, heterogeneous waveforms and strong energy, an unintentional modulation feature extraction method based on phase and frequency fusion was proposed for the individual features carried by phased-array radar signals. Considering that the phased array radar signal was difficult to collect, the number of transceiver components was large, and the unintentional modulation features were complex, the phased array radar unintentional modulation signal model was constructed based on the method of wave-position orchestration and isophase surface. Based on the bispectral method, the signal bispectral map was obtained and perimeter integration was performed to extract the unintentionally modulated phase features of the signal. Based on the variational modal decomposition method, the original signal was decomposed to obtain the modal components, and the energy ratio difference of the set of modal components was further computed to extract the unintentionally modulated frequency features of the signal. Finally, the local holding projection method was used to integrate the phase and frequency features, and the K nearest-neighbor classification method was adopted based on the tree retrieval method to realize the individual identification. Representative numerical results are reported, indicating that the proposed method has higher recognition accuracy and efficiency.

Anonymous whistleblowers reply scheme based on secret sharing
Kun HE, Yajing HUANG, Ruiying DU, Min SHI, Siqin LI, Jing CHEN
2024, 45(12):  83-94.  doi:10.11959/j.issn.1000-436x.2024272
Asbtract ( 17 )   HTML ( 1)   PDF (2389KB) ( 7 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Existing anonymous communication systems that resisted traffic analysis could hide the identities of the communicating parties from the attacker. However, the identities of the communicating parties couldn’t be hidden from each other, and thus these systems did not apply to the scenario of anonymous whistleblowing and replying, where it was necessary to protect the identity of the whistleblower. To address this issue, an efficient anonymous whistleblower response scheme was proposed. With the technology of distributed point functions and secret sharing, the message was stored in two separate mailbox databases of non-colluding servers, so that the identity of the data receiver was hidden from the attacker. With the technology of secret sharing and encryption, the email address of the whistleblower was hidden, so that the receiving organization could reply without learning the whistleblower’s identity. The security analysis showed that the proposed scheme enabled the anonymity of both data receivers and whistleblowers at the same time. The experimental results show that compared to the Express scheme, the proposed scheme reduces the computational complexity during a reply to O(1) from O(logN), resulting in a 60% reduction in computational overhead for the receiving organization and a 50% reduction for the server.

Cluster-based route convergence method based on network state graph model
Chengsheng PAN, Huangjie LU, Huaifeng SHI, Yingzhi WANG
2024, 45(12):  95-110.  doi:10.11959/j.issn.1000-436x.2024267
Asbtract ( 19 )   HTML ( 5)   PDF (5549KB) ( 13 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To address the challenges of time-varying node connectivity and frequent link failures in tactical communication networks under conditions of strong adversarial and high-mobility operations, which result in frequent route convergence and short effective transmission times, a cluster-based route convergence method based on network state graph model (OSPF-CSG) was proposed. Firstly, link states were obtained based on the statistical characteristics of Hello messages, and node states were characterized using aggregated link state features to construct the network state graph model. Secondly, the neighbor state machine’s state transition triggers were improved, and two new OSPF message types were developed to design an active/passive association mechanism for complete adjacency relationships. Finally, on this basis, a cluster head bootstrap algorithm, node clustering algorithm, and inter-cluster connection algorithm were proposed to achieve cluster-based routing convergence. Simulation results show that, in eight different network topologies and under different link damage conditions, OSPF-CSG achieves an average reduction of 82% in the total number of route convergences, a reduction in routing overhead by 70% on average, and an improvement in packet delivery rate by 60% on average compared to the traditional OSPF protocol’s route convergence algorithm.

Uncertain edge coalition game based EIP revenue estimation strategy
Shuxu ZHAO, Xinyu XIA, Xiaolong WANG
2024, 45(12):  111-123.  doi:10.11959/j.issn.1000-436x.2024220
Asbtract ( 28 )   HTML ( 2)   PDF (3097KB) ( 9 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

In the edge computing environment, there are risks such as communication channel risks and edge server failures, which can lead to a mismatch between the computing resources required for task processing and the resources allocated by the edge coalition. In response, a revenue forecasting method for the edge coalition and its member edge infrastructure provider (EIP) based on the game theory of uncertain coalition structures was proposed. Firstly, a resource scheduling model was constructed using a mixed integer linear programming method to maximize the revenue of the edge coalition. Secondly, a belief structure was introduced to characterize the probabilities of high, medium, low, and unknown scenarios for the coalition's revenue. Finally, the uncertain Owen value was used to estimate the interval revenue of the EIP in the coalition one time slot in advance. The simulation results show that the accuracy of this forecasting method under the two risks of channel risk and server failure is 91.25% and 82.5% respectively, with an average accuracy of 86.88%, achieving a relatively accurate forecast of the EIP’ revenue.

Blockchain digital forensics: technology and architecture
Wei FAN, Haibo LI, Zhujun ZHANG
2024, 45(12):  124-141.  doi:10.11959/j.issn.1000-436x.2024204
Asbtract ( 18 )   HTML ( 1)   PDF (2585KB) ( 16 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Issues of limited scene adaptability, inadequate evidence preservation, and low efficiency in traditional digital forensics were addressed by analyzing the feasibility of incorporating decentralized, tamper-resistant blockchain technology into digital forensic practices. Initially, a phased forensic process was proposed based on a hierarchical architecture for blockchain forensic technology, examining the advancements of blockchain at each stage of evidence acquisition, preservation, and presentation. Subsequently, limitations in existing research were analyzed, and a digital forensic framework incorporating comprehensive blockchain involvement was designed by utilizing the distributed advantages of blockchain. This framework integrated evidence information into the on-chain data structure and introduced a complementary graph analysis algorithm to standardize evidence collection across various scenarios. An off-chain distributed database was employed to achieve scalable, efficient storage, while smart contract templates enhance the reusability of contracts for similar forensic transactions. Lastly, potential future directions for the application of blockchain technology in forensic science were explored.

Optimal receiver and blind demodulation performance bounds for single channel co-frequency mixed signals
Hongyi YU, Renpeng ZHA, Zhixiang SHEN, Caiyao SHEN, Yunpeng HU
2024, 45(12):  142-152.  doi:10.11959/j.issn.1000-436x.2024265
Asbtract ( 14 )   HTML ( 0)   PDF (1625KB) ( 11 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Aiming at the problem of optimal detection of mixed signal symbol sequences, on the basis of co-frequency mixed receiving baseband signal model, sufficient statistics for joint maximum likelihood blind detection were derived, and the optimal receiver design of “mixed waveform matched filtering and symbol rate dual sampling” was given. Based on the sufficient statistics model, a lower bound on the performance of single-channel blind demodulation for co-frequency mixed signals was derived using Forney’s method. Since the complexity of the optimal receiver grows exponentially with the equivalent symbol rate sampling channel length, the impact of the truncation error on the blind demodulation performance was further analyzed for the channel truncation problem in practical applications. The result shows that the simulation results of the optimal receiver coincide with the theoretical performance analysis results, verifying the reasonableness of the derived performance bounds.

New construction of enhanced cross Z-complementary set for generalized spatial modulation
Xiuping PENG, Yinna LIU, Yu WANG, Xiaoxia NIU
2024, 45(12):  153-161.  doi:10.11959/j.issn.1000-436x.2024271
Asbtract ( 17 )   HTML ( 0)   PDF (1600KB) ( 27 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

In order to expand the existence space of enhanced cross Z-complementary set (E-CZCS), based on the extended generalized Boolean function (EGBF), the direct construction method of enhanced cross Z-complementary sets was proposed. The constructed q-ary E-CZCS had flexible and variable size, and their length was no longer limited to the traditional power of two. At the same time, the obtained enhanced cross Z-complementary sets was used as the training sequence of the generalized spatial modulation (GSM) system for channel estimation. The simulation results show that the enhanced cross Z-complementary sets can achieve optimal channel estimation. This presumably provides greater flexibility in the selection of training sequences in generalized spatial modulation systems.

Handover algorithm for space-air-ground integrated network based on location prediction model
Jianli XIE, Long CHEN, Zepeng ZHANG, Cuiran LI
2024, 45(12):  162-178.  doi:10.11959/j.issn.1000-436x.2024266
Asbtract ( 23 )   HTML ( 8)   PDF (4805KB) ( 11 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To address the issues of frequent handovers and network load imbalance caused by dynamic changes in the network environment and enhanced mobility of user terminals in the 6G space-air-ground integrated network (SAGIN), a handover algorithm for SAGIN based on a terminal location prediction model was proposed. The algorithm constructed a long short-term memory (LSTM) network terminal location prediction model optimized based on the sparrow search strategy, improving the accuracy of terminal location prediction and resolving the issue of unreasonable handover timing. Based on this model, the SAGIN selection problem was modeled as a Markov decision process. A network handover algorithm utility function characterized by quality of service (QoS) requirements, handover cost, and network load balancing was designed. A distributional deep Q-network (D-DQN) was employed to select the network nodes that could maximize long-term goals for execution handover. Compared with network handover algorithms based on Q-Learning, double deep Q-network (DDQN), and dueling double deep Q-network (D3QN), the proposed algorithm performs better in terms of reducing handover delay and frequency, as well as enhancing network throughput, thereby validating the effectiveness of the proposed algorithm.

Program semantic analysis model for code reuse detection
Xi GUO, Pan WANG
2024, 45(12):  179-196.  doi:10.11959/j.issn.1000-436x.2024269
Asbtract ( 20 )   HTML ( 2)   PDF (2960KB) ( 14 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Program similarity analysis had a wide range of applications in areas such as code plagiarism and property protection, but it generally suffered from problems such as excessive computational overhead, a code similarity analysis method based on fuzzy matching and statistical inference was proposed. For binary programs, first disassembly analysis was performed and then function boundary recognition operations was performed to extract the execution boundary information of the function. On this basis, dynamic programming analysis methods were used to obtain similarity results between basic blocks at the granularity of the basic blocks, and neighborhood search was performed on the basis of the control flow graph to extend similarity analysis from the basic block level to the function level. Finally, the semantic similarity of binary files was obtained through statistical analysis of similarity functions. During this process, the pre trained model was optimized and analyzed, and the parameters were tuned to enable similarity analysis of cross platform code. The experimental results show that the proposed method has a significant improvement in analysis accuracy compared to traditional analysis tools, with an average increase of 7.1% in analysis accuracy compared to current mainstream analysis tools.

Comprehensive Reviews
Survey on Byzantine attacks and defenses in federated learning
Xiaojie ZHAO, Jinqiao SHI, Mei HUANG, Zhenhan KE, Liyan SHEN
2024, 45(12):  197-215.  doi:10.11959/j.issn.1000-436x.2024208
Asbtract ( 26 )   HTML ( 0)   PDF (1563KB) ( 17 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Federated learning as an emerging distributed machine learning, can solve the problem of data islands. However, due to the large-scale, distributed nature and strong autonomy of local clients, federated learning is extremely vulnerable to Byzantine attacks and the attacks are not easy to detect, which seriously damages the integrity and availability of the model. First, taking Byzantine attacks as the research object, a detailed classification and analysis of the attack principles were conducted. Secondly, guided by the classic network security defense model, federated learning defense methods were classified and analyzed from the perspective of defense mechanisms. Finally, the key issues and research challenges that need to be solved in federated learning to resist Byzantine attacks were proposed, providing new references for future relevant researchers.

Statistical analysis on application and funding of the National Natural Science Foundation of China in the area of information and communication systems, 2024
Jie HU, Xiaojian ZHU, Jun WEN, Ling SUN
2024, 45(12):  216-226.  doi:10.11959/j.issn.1000-436x.2024223
Asbtract ( 27 )   HTML ( 2)   PDF (3373KB) ( 23 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

The application and funding of the general programs, young scientists funds, funds for developing regions of National Natural Science Foundation of China (NSFC) in 2024 in information and communication system were statistically analyzed. Detailed statistics were provided among different institutions, professional titles, research topics and keyword frequencies. The key programs in terms of application and funding statistics as well as of different research topics were analyses. Moreover, the ages and professional titles of applicants for excellent and outstanding young scholar funds were also revealed, while the impact of the relevant NSFC reforms in 2024 on scholar funds was also analyzed. Finally, major programs and young student funds were briefly introduced, in order to provid landscape of NSFC in information and communication systems in order to let scientists prepare for applications in 2025.

Correspondences
Intelligent interference decision algorithm with prior knowledge embedded LSTM-PPO model
Jingke ZHANG, Kai YANG, Chao LI, Hongyan WANG
2024, 45(12):  227-239.  doi:10.11959/j.issn.1000-436x.2024270
Asbtract ( 24 )   HTML ( 1)   PDF (2474KB) ( 13 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Focusing on the issues of low efficiency and effectiveness in decision-making as well as the instability of traditional reinforcement learning model-based multi-function radar (MFR) jamming decision algorithms, a prior knowledge embedded long short-term memory (LSTM) network-proximal policy optimization (PPO) model based intelligent interference decision algorithm was developed. Firstly, the MFR interference decision problem was regarded as a Markov decision process (MDP). Furthermore, by incorporating prior knowledge associated with the interference domain into the reward function of the PPO model using revenue shaping theory, a reshaped reward function was obtained to guide agent converge quickly so as to improve decision-making efficiency. Besides, leveraging LSTM’s excellent temporal feature extraction ability enables capturing dynamic characteristics of echo data effectively to describe radar working states. Finally, these extracted dynamic features were inputted into the PPO model. With guidance from embedded prior knowledge, an effective interference decision can be achieved rapidly. Simulation results demonstrate that compared to traditional reinforcement learning model based interference decision algorithms, higher efficiency and effectiveness in decision-making can be attained via the proposed algorithms and the MFR interference decision can be efficiently and robustly achieved.

Vehicle platooning scheme based on two-way auction
Hai LIU, Jinyu WU, Tianxi WANG, Hongye PENG
2024, 45(12):  240-252.  doi:10.11959/j.issn.1000-436x.2024172
Asbtract ( 23 )   HTML ( 2)   PDF (2449KB) ( 9 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Vehicles positioned at varying locations in the platoon exhibit differing levels of energy consumption, which may result in the platoon breaking up during travel or even prevent successful formation of the platoon. To solve this problem, a vehicle platooning scheme based on two-way auction was proposed. Specifically, the positions in the vehicle platooning were considered as a special commodity to be auctioned. By requesting a price from the platoon leader and a bid from the platoon follower, the position of each vehicle participating in the platooning was determined. Furthermore, an incentive compatible platooning compensation mechanism was devised that could motivate the vehicles in the platoon to maintain their position while traveling. Theoretical analysis and extensive experiments show that, the proposed scheme can not only realize the vehicle platooning efficiently, but also ensure the stability of the formed platoon.

A Review of Threat Discovery and Forensic Analysis Based on System-level Provenance Graphs
LENG Tao , , CAI lijun lijun, YU Aimin , , ZHU ziyuan , M A Jian ganggang, LI Caofei , , NIU Ruicheng , , MENG Dan ,
Online First: 2022-07-25
Construction of De Bruijn Sequences from Whole LFSRs with 4 Cycles
ZHOU Cong wei, HU Bin, GUAN Jie
Online First: 2022-07-25
Improved Meet-in -the-Middle Attack on ReducedReduced-Round KiasuKiasu-BC Cipher
LI Manman , CHEN Shaozhen ,
Online First: 2022-07-25
Multi-level recommendation framework for local differential privacy algorithms
WANG Hanyi, LI Xiaoguang, BI Wenqing, CHEN Yahong, LI Fenghua, NIU Ben
10.11959/j.issn.1000?436x.2020029
Online First: 2022-06-25
Joint QoS prediction for Web services based on deep fusion of features
LIU Jianxun , , DING Linghang , , KANG Guosheng , , CAO Buqing , , XIAO Yong ,
Online First: 2022-06-25
A Review of Threat Discovery and Forensic Analysis Based on System-level Provenance Graphs
LENG T Tao , , CAI lijun lijun, YU Aimin , , ZHU ziyuan , M A Jian ganggang, LI Caofei , , NIU Ruicheng , , MENG Dan ,
Online First: 2022-06-25
New Dimension in Orbital Angular Momentum Transmission
Online First: 2022-06-25
6G-Oriented cross-modal signal reconstruction technology
LI Ang, CHEN Jianxin, WEI Xin, ZHOU Liang,
Online First: 2022-06-25
Multi-level recommendation framework for local differential privacy algorithms
WANG Hanyi, LI Xiaoguang, BI Wenqing, CHEN Yahong, LI Fenghua, NIU Ben
10.11959/j.issn.1000?436x.2020029
Online First: 2022-06-24
Joint QoS Prediction for Web Services based on Deep Fusion of Features
Online First: 2022-06-24
2024 Vol.45 No.12 No.11 No.Z1 No.10 No.9 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2023 Vol.44 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2022 Vol.43 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2021 Vol.42 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2020 Vol.41 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2019 Vol.40 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2018 Vol.39 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2017 Vol.38 No.12 No.Z2 No.11 No.Z1 No.10 No.9
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2016 Vol.37 No.12 No.11 No.Z1 No.10 No.9 No.8
No.7 No.6 No.5 No.4 No.3 No.2
No.1
2015 Vol.36 No.12 No.11 No.Z1 No.10 No.9 No.8
No.7 No.6 No.5 No.4 No.3 No.2
No.1
2014 Vol.35 No.12 No.11 No.Z2 No.10 No.Z1 No.9
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2013 Vol.34 No.12 No.Z2 No.11 No.10 No.9 No.Z1
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2012 Vol.33 No.10 No.12 No.Z2 No.11 No.Z1 No.9
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2011 Vol.32 No.9 No.12 No.11 No.11A No.10 No.9A
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2010 Vol.31 No.12 No.11 No.10 No.9A No.9 No.8A
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2009 Vol.30 No.12 No.11A No.11 No.10 No.10A No.9
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2008 Vol.29 No.12 No.11A No.11 No.10 No.9 No.8
No.7 No.6 No.5 No.4 No.3A No.3
No.2 No.1
2007 Vol.28 No.12 No.11A No.11 No.10 No.9 No.8
No.08A No.7 No.6 No.5 No.4 No.3
No.2 No.1
2006 Vol.27 No.12 No.11A No.11 No.10 No.9 No.8
No.7 No.6 No.5 No.4 No.3 No.2
No.1
2005 Vol.26 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1A
No.1
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: