Information and Communications Technology and Policy

Information and Communications Technology and Policy
  • Current Issue
  • Archive
  • Research and prospects of 5G-A empowering industrial intelligent applications
  • TANG Tianxu, LI Zongxiang, ZHU Ying, YU Qingmin
  • Information and Communications Technology and Policy. 2025, 51(11): 10-16. DOI:10.12267/j.issn.2096-5931.2025.11.002
  • Abstract ( 79 ) HTML( 37 )   
  • This paper explores the role of the fifth-generation advanced mobile communication technology (5G-Advanced, 5G-A) in promoting artificial intelligence (AI) applications in the industrial sector. It first introduces the main progress of China’s “5G+Industrial Internet” initiative, analyzes the core technical features of 5G-A, and reviews the current research situation of 5G-A empowering industrial intelligent applications both domestically and internationally. On this basis, it provides an in-depth analysis of intelligent application scenarios of 5G-A technology in industry, identifies key challenges in the development of 5G-A-based industrial intelligence, and finally proposes suggestions for the integrated development of 5G-A and industrial intelligence.

  • Figures/Tables | References | Related Articles | Metrics
  • Solutions for low-altitude intelligent surveillance systems with 5G-A
  • HU Yajing, SONG Qian, SONG Lianbo, CHAN Lingbo, WANG Junran
  • Information and Communications Technology and Policy. 2025, 51(11): 17-23. DOI:10.12267/j.issn.2096-5931.2025.11.003
  • Abstract ( 66 ) HTML( 55 )   
  • This paper presents an intelligent low-altitude surveillance system integrating 5G-Advanced(5G-A) technology to address flight safety and unauthorized operations. The proposed framework tackles key challenges including false alarms, data fusion inefficiencies, and non-standard target detection through a multi-dimensional fusion approach incorporating spatiotemporal analysis and micro-Doppler signatures. Experimental results demonstrate the system’s capability for accurate target identification and rapid response in complex environments, providing a practical reference for intelligent low-altitude monitoring implementations.

  • Figures/Tables | References | Related Articles | Metrics
  • Research on RIS-assisted coverage schemes for low-altitude 5G-A networks
  • LI Bei, LIU Qiuyan, CHENG Chen, WANG Zhaoning, WANG Bo, JIANG Zhenwei, QIAO Jinjian, ZHU Jiajia
  • Information and Communications Technology and Policy. 2025, 51(11): 31-38. DOI:10.12267/j.issn.2096-5931.2025.11.005
  • Abstract ( 44 ) HTML( 22 )   
  • As a representative of new-quality productive forces, the low-altitude economy has achieved rapidly development relying on new-form applications such as civil unmanned aerial vehicles and low-altitude manned aircraft, and has gradually become a new engine driving China’s economic growth. With the continuous advancement of 5G-A technology, to meet the demand of low-altitude mobile users for continuous, high-quality, and deep coverage, building an air-ground integrated three-dimensional network based on International Mobile Telecommunications (IMT) networks boasts advantages such as reuse of site resources and frequency resources, as well as high efficiency in integrated network construction and operation. However, traditional IMT networks mainly focuses on terrestrial users, with limited research on high-quality continuous coverage networking in low-altitude scenarios and mobility management for air-ground users. To address issues such as complex airspace coverage gaps and declining network quality for ground users, this paper explores the integration of reconfigurable intelligent surface (RIS) technology into low-altitude mobile communication networks, and proposes a low-altitude networking architecture assisted by RIS at the transceiver side and channel side. Then this paper provides a cost-effective, low-power, and easily deployable solution for high-quality, continuous, and deep coverage in low-altitude areas.

  • Figures/Tables | References | Related Articles | Metrics
  • Key technology and application of “5G-A+AI” empowering virtual simulation teaching
  • CHEN Min, ZANG Lei, TANG Liang, GUO Wenshuang
  • Information and Communications Technology and Policy. 2025, 51(11): 39-45. DOI:10.12267/j.issn.2096-5931.2025.11.006
  • Abstract ( 62 ) HTML( 41 )   
  • Currently, 5G-Advanced(5G-A) and artificial intelligence (AI) technologies are developing rapidly, which effectively enhances the sense of immersion, presence, and intelligent experience of virtual simulation teaching. This paper first analyzes the business characteristics of virtual simulation teaching and its requirements for 5G-A and AI technologies, then conducts an in-depth study on a number of key technologies introduced by 5G-A in response to the characteristics of virtual simulation teaching, and sorts out the key AI technologies involved in virtual simulation teaching. Meanwhile, this paper summarizes the typical application scenarios of virtual simulation teaching empowered by 5G-A and AI, and provides an outlook on future development trends.

  • Figures/Tables | References | Related Articles | Metrics
  • Statistical measurement of digital trade scale: key difficulties and path analysis
  • ZHU Xueting, MA Lan
  • Information and Communications Technology and Policy. 2025, 51(11): 68-73. DOI:10.12267/j.issn.2096-5931.2025.11.010
  • Abstract ( 44 ) HTML( 53 )   
  • Digital trade plays an important role in the reorganization of global factor resources and shaping of international competitive advantages. The statistical measurement of the digital trade scale plays a fundamental and pioneering role in judging the development trend of digital trade and analyzing the macro-analysis of digital trade. However, no authoritative and unified statistical measurement scheme has been formed globally, which cannot meet the needs of national digital trade development. Therefore, firstly, this paper summarizes the domestic and international research dynamics and statistical practice. Then, it combines the practical work experience and data summarization to accurately identify the key and difficult points of statistical measurement, such as the statistics of the digital actual delivery service trade and the multiple data sources. Finally, it discusses the path and feasible suggestions for the realization of the statistical measurement of China’s digital trade scale from the short-, medium- and long-term perspectives on the basis of the statistical principles.

  • Figures/Tables | References | Related Articles | Metrics
  • Research on application strategies for government large models
  • WANG Wei, PANG Xiaobo
  • Information and Communications Technology and Policy. 2025, 51(11): 74-80. DOI:10.12267/j.issn.2096-5931.2025.11.011
  • Abstract ( 73 ) HTML( 28 )   
  • With the in-depth advancement of digital government construction and the rapid development of artificial intelligence(AI) technology, especially following the launch of domestic open-source large models, government departments at all levels are actively promoting the deployment and application of AI large models. Large models possess the capability to drive innovations in government operation modes and serve as key tools to improve governance system and enhance governance capacity. By clarifying the classification of government large models and constructing a reference model for their application, this paper illustrates the supporting role of large models in government business work through three cases such as intelligent document approval, intelligent official document generation, and online transaction supervision. In response to the shortcomings existing in the application of government large models, including aspects of planning and design, credibility of generated content, quality of model training data, and data security risks, this paper proposes implementation suggestions for advancing the application of government large models, focusing on key issues such as the construction and deployment of government large models, the development of trustworthy models, the supply of data elements, the opening of application scenarios, security and risk prevention, as well as construction and operation.

  • Figures/Tables | References | Related Articles | Metrics
  • Construction of large model computing power system and key technology analysis
  • GUO Liang, WANG Yue, LI Jie
  • Information and Communications Technology and Policy. 2025, 51(11): 81-88. DOI:10.12267/j.issn.2096-5931.2025.11.012
  • Abstract ( 56 ) HTML( 31 )   
  • Firstly, the working principle and key technologies of the large model; Secondly,the challenges faced by large model computing power in terms of computation, networking, and storage were analyzed, and further research was conducted on the key technological advancements of large model computing power in storage, high-performance ensemble communication, networking, and infrastructure. Once again, a large model computing power system include collaborative construction of computing, storage, and network was constructed, as well as software and hardware collaborative optimization. The three key elements of computing power, storage power, and network power in the large model computing power system have been clarified; Finally, the development trends such as the demand for large computing power clusters, the development of end-to-end large model, and the empowerment of new quality productivity by artificial intelligence were analyzed.

  • Figures/Tables | References | Related Articles | Metrics
  • Format-preserving encryption algorithm for coordinate information in V2X direct communication
  • FANG Ji, LIN Lin, YU Rundong, GE Yuming
  • Information and Communications Technology and Policy. 2025, 51(11): 89-96. DOI:10.12267/j.issn.2096-5931.2025.11.013
  • Abstract ( 35 ) HTML( 20 )   
  • In V2X direct communication, vehicles continuously send their own position coordinate during driving, and roadside communication equipment continuously broadcast the road map coordinate information, but there is a lack of coordinate information protection measures in V2X direct communication protocols, so the vehicle’s travelling trajectory and the regional map information can be easily accessed by external parties, which poses a potential security risk to the national geographic information security. Two format-preserving encryption algorithms based on the Feistel structure and the hash algorithm were proposed to realize the encryption of coordinate information. Experimental results show that the two encryption algorithms proposed can meet the coordinate encoding requirement of V2X protocol. The encryption and decryption performance meet the requirements of practical applications, and the delay is negligible.

  • Figures/Tables | References | Related Articles | Metrics
  • Most Read
  • Most Download
  • Most Cited
News More
ICT More
  • Supervised by MIIT
  • Founded in 1975

China Academy of Information and Communications Technology (CAICT)

Editor: The Editorial Department of Information and Communications Technology and Policy

Chief Editor: Yu Xiaohui

Deputy Chief Editor: XU Heyuan

Executive Chief Editor: ZHANG Jing

Editors: ZHANG Chun, WU Hui, LIU Shan, WANG Xiuping, ZHAO Zhihua, LIU Sihan

Address: 52 Huayuan North Road, Beijing, China

Phone: 010-62300192

E-mail: ictp@caict.ac.cn

Post Code: 100191

Special Issue

More
    [an error occurred while processing this directive]