- Current Issue
- Archive
- 2025, Vol. 51, No. 11 Published:25 November 2025 Previous Issue
- AI-enabled industrial intelligent wireless networks based on converged 5G-A and Nearlink short-range communications: network architecture and key technologies
- LIU Ling, ZHOU Yiqing, SHI Ningzhe, YUAN Wenhao, SHI Jinglin
- Information and Communications Technology and Policy. 2025, 51(11): 2-9. DOI:10.12267/j.issn.2096-5931.2025.11.001
- Abstract ( 79 ) HTML( 91 )
-
To meet the development demands of digitalization, networking, and intelligentization for Industry 4.0, industrial networks are undergoing upgrades toward wireless and intelligence. Nearlink short-range wireless communication is a new technical standard led and promoted by China. It is expected to converge with 5G-Advanced (5G-A) to provide in-depth coverage and intelligent services for industrial networks. This paper proposes an AI-enabled end-edge-cloud collaborative industrial intelligent wireless network architecture based on the converged 5G-A and Nearlink short-range communication. Furthermore, considering the characteristics of industrial scenarios, the key technologies of the converged 5G-A and Nearlink network are analyzed, and some problem are pointed out for further research.
- Figures/Tables | References | Related Articles | Metrics
- Research and prospects of 5G-A empowering industrial intelligent applications
- TANG Tianxu, LI Zongxiang, ZHU Ying, YU Qingmin
- Information and Communications Technology and Policy. 2025, 51(11): 10-16. DOI:10.12267/j.issn.2096-5931.2025.11.002
- Abstract ( 79 ) HTML( 37 )
-
This paper explores the role of the fifth-generation advanced mobile communication technology (5G-Advanced, 5G-A) in promoting artificial intelligence (AI) applications in the industrial sector. It first introduces the main progress of China’s “5G+Industrial Internet” initiative, analyzes the core technical features of 5G-A, and reviews the current research situation of 5G-A empowering industrial intelligent applications both domestically and internationally. On this basis, it provides an in-depth analysis of intelligent application scenarios of 5G-A technology in industry, identifies key challenges in the development of 5G-A-based industrial intelligence, and finally proposes suggestions for the integrated development of 5G-A and industrial intelligence.
- Figures/Tables | References | Related Articles | Metrics
- Solutions for low-altitude intelligent surveillance systems with 5G-A
- HU Yajing, SONG Qian, SONG Lianbo, CHAN Lingbo, WANG Junran
- Information and Communications Technology and Policy. 2025, 51(11): 17-23. DOI:10.12267/j.issn.2096-5931.2025.11.003
- Abstract ( 66 ) HTML( 55 )
-
This paper presents an intelligent low-altitude surveillance system integrating 5G-Advanced(5G-A) technology to address flight safety and unauthorized operations. The proposed framework tackles key challenges including false alarms, data fusion inefficiencies, and non-standard target detection through a multi-dimensional fusion approach incorporating spatiotemporal analysis and micro-Doppler signatures. Experimental results demonstrate the system’s capability for accurate target identification and rapid response in complex environments, providing a practical reference for intelligent low-altitude monitoring implementations.
- Figures/Tables | References | Related Articles | Metrics
- 5G-A sensing-communication integration for precise interconnection of low-altitude unmanned aerial vehicles
- JIANG Qiang, FEI Wenchao, QIN Shihui, WU Baodong, XIE Huabiao, LI Ying
- Information and Communications Technology and Policy. 2025, 51(11): 24-30. DOI:10.12267/j.issn.2096-5931.2025.11.004
- Abstract ( 64 ) HTML( 24 )
-
Leveraging current 5G technology, upgrades can be made to 5G’s transmission-reception mode, spatial multiplexing method, sensing waveform, and resource allocation. By deploying parameters like the communication-sensing task switch in the 5G system, can be upgraded to a 5G-Advanced (5G-A) system. This upgrade addresses 5G coverage gaps in low-altitude areas, enhances the connectivity of low-altitude terminals, mitigates low-altitude waveform interference, and ultimately achieves precise interconnection management of low-altitude unmanned aerial vehicles and improve low-altitude sensing capabilities.
- Figures/Tables | References | Related Articles | Metrics
- Research on RIS-assisted coverage schemes for low-altitude 5G-A networks
- LI Bei, LIU Qiuyan, CHENG Chen, WANG Zhaoning, WANG Bo, JIANG Zhenwei, QIAO Jinjian, ZHU Jiajia
- Information and Communications Technology and Policy. 2025, 51(11): 31-38. DOI:10.12267/j.issn.2096-5931.2025.11.005
- Abstract ( 44 ) HTML( 22 )
-
As a representative of new-quality productive forces, the low-altitude economy has achieved rapidly development relying on new-form applications such as civil unmanned aerial vehicles and low-altitude manned aircraft, and has gradually become a new engine driving China’s economic growth. With the continuous advancement of 5G-A technology, to meet the demand of low-altitude mobile users for continuous, high-quality, and deep coverage, building an air-ground integrated three-dimensional network based on International Mobile Telecommunications (IMT) networks boasts advantages such as reuse of site resources and frequency resources, as well as high efficiency in integrated network construction and operation. However, traditional IMT networks mainly focuses on terrestrial users, with limited research on high-quality continuous coverage networking in low-altitude scenarios and mobility management for air-ground users. To address issues such as complex airspace coverage gaps and declining network quality for ground users, this paper explores the integration of reconfigurable intelligent surface (RIS) technology into low-altitude mobile communication networks, and proposes a low-altitude networking architecture assisted by RIS at the transceiver side and channel side. Then this paper provides a cost-effective, low-power, and easily deployable solution for high-quality, continuous, and deep coverage in low-altitude areas.
- Figures/Tables | References | Related Articles | Metrics
- Key technology and application of “5G-A+AI” empowering virtual simulation teaching
- CHEN Min, ZANG Lei, TANG Liang, GUO Wenshuang
- Information and Communications Technology and Policy. 2025, 51(11): 39-45. DOI:10.12267/j.issn.2096-5931.2025.11.006
- Abstract ( 62 ) HTML( 41 )
-
Currently, 5G-Advanced(5G-A) and artificial intelligence (AI) technologies are developing rapidly, which effectively enhances the sense of immersion, presence, and intelligent experience of virtual simulation teaching. This paper first analyzes the business characteristics of virtual simulation teaching and its requirements for 5G-A and AI technologies, then conducts an in-depth study on a number of key technologies introduced by 5G-A in response to the characteristics of virtual simulation teaching, and sorts out the key AI technologies involved in virtual simulation teaching. Meanwhile, this paper summarizes the typical application scenarios of virtual simulation teaching empowered by 5G-A and AI, and provides an outlook on future development trends.
- Figures/Tables | References | Related Articles | Metrics
- Research on intelligent guarantee technology for 5G-A large venues based on network orchestration
- HE Ming, XU Xiaoliang, HAN Weixi, ZENG Zhanghua
- Information and Communications Technology and Policy. 2025, 51(11): 46-54. DOI:10.12267/j.issn.2096-5931.2025.11.007
- Abstract ( 46 ) HTML( 20 )
-
Based on the problems existing during the guarantee period of venue events and activities in large-scale venues, this study analyzes the advantages and disadvantages of 5G-A coverage technologies in different venues, and proposes an intelligent guarantee technology based on network orchestration. Moreover, It allocates network resources according to the characteristics of different user services to meet the guarantee plans for various types of activities. Through actual measurement verification, it has effectively improved the network perception of both VIP users and ordinary users in large-scale venues.
- Figures/Tables | References | Related Articles | Metrics
- Research on the integrated and innovative development of digital intelligence in the cultural and tourism industry empowered by “5G-A+AI”
- ZHANG Hongchi, YANG Yi
- Information and Communications Technology and Policy. 2025, 51(11): 55-60. DOI:10.12267/j.issn.2096-5931.2025.11.008
- Abstract ( 50 ) HTML( 12 )
-
Currently, 5G-Advanced (5G-A) and artificial intelligence (AI) technologies are deeply integrating, driving the integrated and innovative development of vertical industries. As a key industry that meets the people’s needs for a better life and boosts economic growth, the cultural and tourism industry is gradually realizing digital and intelligent transformation driven by 5G-A and AI technologies. The improvement of communication efficiency and intelligence are gradually empowering various links in the cultural and tourism industry, such as information services, tourist experiences, venue governance, and content marketing, and are gradually becoming the core driving force for promoting industrial structure upgrading and service efficiency.
- References | Related Articles | Metrics
- Research on differentiated operation of 5G-A wireless network resources
- HU Yuhua, TANG Yingqi, SHEN Wenchao, QIAO Jinjian
- Information and Communications Technology and Policy. 2025, 51(11): 61-67. DOI:10.12267/j.issn.2096-5931.2025.11.009
- Abstract ( 42 ) HTML( 16 )
-
Users of the 5G-Advanced(5G-A) network are sensitive to the perception of network experience. To adapt to complex and changing business guarantee requirements, a differentiated business guarantee scheme based on intelligent computing boards is proposed, which achieves fine identification of business flows and intelligent scheduling of network resources, effectively provides differentiated guarantees for wireless network resources, and meets personalized business experience needs.
- Figures/Tables | References | Related Articles | Metrics
- Statistical measurement of digital trade scale: key difficulties and path analysis
- ZHU Xueting, MA Lan
- Information and Communications Technology and Policy. 2025, 51(11): 68-73. DOI:10.12267/j.issn.2096-5931.2025.11.010
- Abstract ( 44 ) HTML( 53 )
-
Digital trade plays an important role in the reorganization of global factor resources and shaping of international competitive advantages. The statistical measurement of the digital trade scale plays a fundamental and pioneering role in judging the development trend of digital trade and analyzing the macro-analysis of digital trade. However, no authoritative and unified statistical measurement scheme has been formed globally, which cannot meet the needs of national digital trade development. Therefore, firstly, this paper summarizes the domestic and international research dynamics and statistical practice. Then, it combines the practical work experience and data summarization to accurately identify the key and difficult points of statistical measurement, such as the statistics of the digital actual delivery service trade and the multiple data sources. Finally, it discusses the path and feasible suggestions for the realization of the statistical measurement of China’s digital trade scale from the short-, medium- and long-term perspectives on the basis of the statistical principles.
- Figures/Tables | References | Related Articles | Metrics
- Research on application strategies for government large models
- WANG Wei, PANG Xiaobo
- Information and Communications Technology and Policy. 2025, 51(11): 74-80. DOI:10.12267/j.issn.2096-5931.2025.11.011
- Abstract ( 73 ) HTML( 28 )
-
With the in-depth advancement of digital government construction and the rapid development of artificial intelligence(AI) technology, especially following the launch of domestic open-source large models, government departments at all levels are actively promoting the deployment and application of AI large models. Large models possess the capability to drive innovations in government operation modes and serve as key tools to improve governance system and enhance governance capacity. By clarifying the classification of government large models and constructing a reference model for their application, this paper illustrates the supporting role of large models in government business work through three cases such as intelligent document approval, intelligent official document generation, and online transaction supervision. In response to the shortcomings existing in the application of government large models, including aspects of planning and design, credibility of generated content, quality of model training data, and data security risks, this paper proposes implementation suggestions for advancing the application of government large models, focusing on key issues such as the construction and deployment of government large models, the development of trustworthy models, the supply of data elements, the opening of application scenarios, security and risk prevention, as well as construction and operation.
- Figures/Tables | References | Related Articles | Metrics
- Construction of large model computing power system and key technology analysis
- GUO Liang, WANG Yue, LI Jie
- Information and Communications Technology and Policy. 2025, 51(11): 81-88. DOI:10.12267/j.issn.2096-5931.2025.11.012
- Abstract ( 56 ) HTML( 31 )
-
Firstly, the working principle and key technologies of the large model; Secondly,the challenges faced by large model computing power in terms of computation, networking, and storage were analyzed, and further research was conducted on the key technological advancements of large model computing power in storage, high-performance ensemble communication, networking, and infrastructure. Once again, a large model computing power system include collaborative construction of computing, storage, and network was constructed, as well as software and hardware collaborative optimization. The three key elements of computing power, storage power, and network power in the large model computing power system have been clarified; Finally, the development trends such as the demand for large computing power clusters, the development of end-to-end large model, and the empowerment of new quality productivity by artificial intelligence were analyzed.
- Figures/Tables | References | Related Articles | Metrics
- Format-preserving encryption algorithm for coordinate information in V2X direct communication
- FANG Ji, LIN Lin, YU Rundong, GE Yuming
- Information and Communications Technology and Policy. 2025, 51(11): 89-96. DOI:10.12267/j.issn.2096-5931.2025.11.013
- Abstract ( 35 ) HTML( 20 )
-
In V2X direct communication, vehicles continuously send their own position coordinate during driving, and roadside communication equipment continuously broadcast the road map coordinate information, but there is a lack of coordinate information protection measures in V2X direct communication protocols, so the vehicle’s travelling trajectory and the regional map information can be easily accessed by external parties, which poses a potential security risk to the national geographic information security. Two format-preserving encryption algorithms based on the Feistel structure and the hash algorithm were proposed to realize the encryption of coordinate information. Experimental results show that the two encryption algorithms proposed can meet the coordinate encoding requirement of V2X protocol. The encryption and decryption performance meet the requirements of practical applications, and the delay is negligible.
- Figures/Tables | References | Related Articles | Metrics
| 2025, Vol.51 | No.10 | No.9 | No.8 | No.7 | No.6 | No.5 |
|---|---|---|---|---|---|---|
| No.4 | No.3 | No.2 | No.1 | |||
| 2024, Vol.50 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2023, Vol.49 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2022, Vol.48 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2021, Vol.47 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2020, Vol.46 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2019, Vol.45 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2018, Vol.44 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 |
- Most Read
- Most Download
- Most Cited
- 2024, 50(12): 1-1.
- Abstract ( 5332 ) HTML ( 1164 ) PDF (266KB) (2453)
- Research on the full process technology and application of AI empowering the manufacturing industry
- DONG Hao, LIU Xingchen, CAO Feng, ZHANG Faen, GAO Lingyan
- 2024, 50(12): 42-50. DOI: 10.12267/j.issn.2096-5931.2024.12.007
- Abstract ( 1928 ) HTML ( 356 ) PDF (668KB) (1226)
- Research on application cases and path of artificial intelligence in industry
- QU Jiang, ZHANG Yi
- 2024, 50(12): 51-57. DOI: 10.12267/j.issn.2096-5931.2024.12.008
- Abstract ( 1651 ) HTML ( 207 ) PDF (964KB) (2030)
- The integration of large AI models and new industrialization: paths and challenges
- LUAN Yan, MENG Xiangxi
- 2025, 51(1): 76-82. DOI: 10.12267/j.issn.2096-5931.2025.01.012
- Abstract ( 1559 ) HTML ( 44 ) PDF (942KB) (1128)
- Research on security challenges and governance path of generative artificial intelligence big model
- XU Ming
- 2025, 51(1): 10-19. DOI: 10.12267/j.issn.2096-5931.2025.01.002
- Abstract ( 1489 ) HTML ( 69 ) PDF (1014KB) (2347)
- Impact analysis and recommendations for the network security field by generative artificial intelligence technology
- YUAN Weiguo, ZHANG Xinyue, YUCHI Xuebiao
- 2025, 51(1): 2-9. DOI: 10.12267/j.issn.2096-5931.2025.01.001
- Abstract ( 1332 ) HTML ( 87 ) PDF (946KB) (1237)
- Global brain computer interface technology and industry development trends
- ZHOU Jie, CHENG Liwei
- 2025, 51(3): 53-58. DOI: 10.12267/j.issn.2096-5931.2025.03.007
- Abstract ( 1323 ) HTML ( 55 ) PDF (947KB) (863)
- Network security active defense technology based on generative artificial intelligence
- ZHOU Chengsheng, ZHAO Xun, TIAN Huirong
- 2025, 51(1): 25-32. DOI: 10.12267/j.issn.2096-5931.2025.01.004
- Abstract ( 1170 ) HTML ( 64 ) PDF (2193KB) (557)
- Security challenges and response mechanisms for trustworthy large language model agents
- ZHANG Xi, LI Chaozhuo, XU Nuo, ZHANG Litian
- 2025, 51(1): 33-37. DOI: 10.12267/j.issn.2096-5931.2025.01.005
- Abstract ( 1150 ) HTML ( 41 ) PDF (1014KB) (1395)
- Research and practice of intelligent cockpit based on large language model and agent
- REN Xian, XUE Feng, FANG Yunfei, JIANG Zhonglin, CHEN Yong, TANG Wei
- 2024, 50(12): 58-63. DOI: 10.12267/j.issn.2096-5931.2024.12.009
- Abstract ( 1135 ) HTML ( 18 ) PDF (898KB) (655)
- Analysis of large language model architecture evolution
- WANG Yuntao
- 2024, 50(12): 13-20. DOI: 10.12267/j.issn.2096-5931.2024.12.003
- Abstract ( 1134 ) HTML ( 48 ) PDF (965KB) (656)
- Study on definition and key measures of computing and electric power coordinated development
- LI Jie, WANG Yue, JIANG Lingfei
- 2025, 51(2): 2-8. DOI: 10.12267/j.issn.2096-5931.2025.02.001
- Abstract ( 1120 ) HTML ( 51 ) PDF (1032KB) (1256)
- Research on the ethical risks and ethical review of brain-computer interfaces
- FU Na, ZHOU Jie
- 2025, 51(3): 11-15. DOI: 10.12267/j.issn.2096-5931.2025.03.002
- Abstract ( 1065 ) HTML ( 185 ) PDF (903KB) (1594)
- Key technologies and typical applications of “AI+” empowered embodied intelligence robots
- LI Tengda, ZHU Ziyu, HAN Ziqi
- 2025, 51(8): 15-25. DOI: 10.12267/j.issn.2096-5931.2025.08.003
- Abstract ( 1035 ) HTML ( 37 ) PDF (1110KB) (355)
- Large model intelligent computing infrastructure reinforces the enabling foundation for new industrialization
- LI Lun, GUO Yingnan, WANG Zixuan
- 2024, 50(12): 2-6. DOI: 10.12267/j.issn.2096-5931.2024.12.001
- Abstract ( 983 ) HTML ( 60 ) PDF (1132KB) (760)
- 2025, 51(9): 1-1.
- Abstract ( 979 ) HTML ( 120 ) PDF (267KB) (461)
- Artificial intelligence enables high-level development and high-quality construction of digital twin city
- LIU Gaofeng, JIANG Yuehan, ZHANG Yuxiong
- 2025, 51(3): 74-82. DOI: 10.12267/j.issn.2096-5931.2025.03.010
- Abstract ( 960 ) HTML ( 42 ) PDF (1544KB) (518)
- Hybrid quantum-classical computing architecture and development
- WANG Zhen, WANG Qiankun, WANG Hanyi, WANG Shengbin, HU Jiasheng, SUN Hantao
- 2025, 51(1): 89-96. DOI: 10.12267/j.issn.2096-5931.2025.01.014
- Abstract ( 959 ) HTML ( 22 ) PDF (985KB) (979)
- Research on construction of large model application and service platform
- LIU Weichen, YANG Huafeng, JIANG Minmin, LIU Jingqian
- 2024, 50(12): 21-30. DOI: 10.12267/j.issn.2096-5931.2024.12.004
- Abstract ( 948 ) HTML ( 33 ) PDF (1069KB) (778)
- Research progress of large-capacity optical transmission technologies and investigation on 400G C+L band system
- FENG Zhenhua , SHANG Wendong , LU Yuan , WANG Zhaohui , SHI Hu , CHEN Yong
- 2021, 47(12): 48-. DOI: 10.12267/j.issn.2096-5931.2021.12.007
- Abstract ( 1354 ) PDF (1594KB) (6866)
- In-depth analysis of the satellite constellation Starlink
- XU Bingyu, LI Xiayu
- 2021, 47(9): 16-20. DOI: 10.12267/j.issn.2096-5931.2021.09.003
- Abstract ( 1817 ) PDF (912KB) (5832)
- Research on the development framework and trend of digital economy
- WANG Yong, ZHU Jianyu, ZHANG Haifeng
- 2023, 49(1): 2-6. DOI: 10.12267/j.issn.2096-5931.2023.01.001
- Abstract ( 5122 ) HTML ( 5541 ) PDF (967KB) (4491)
- Overview of China's digital economy development
- HE Wei
- 2021, 47(2): 1-7. DOI: 10.12267/j.issn.2096-5931.2021.02.001
- Abstract ( 6629 ) PDF (533KB) (4319)
- The status, trends and suggestions of computing infrastructure
- LI Jie, WANG Yue
- 2022, 48(3): 2-6. DOI: 10.12267/j.issn.2096-5931.2022.03.001
- Abstract ( 2848 ) HTML ( 9330 ) PDF (902KB) (3957)
- 2019, 45(6): 29-31.
- Abstract ( 1235 ) PDF (1006KB) (3316)
- Enlightenment of ChatGPT to smart cities: discussion about evolution path for cities of the future
- ZHU Gang, ZHANG Meixiang, SUN Haowen, LI Jiajing, ZHANG Liang, YANG Yunlong
- 2023, 49(6): 71-78. DOI: 10.12267/j.issn.2096-5931.2023.06.010
- Abstract ( 1527 ) HTML ( 986 ) PDF (1048KB) (3284)
- Mechanism + data fusion modeling method in digital twin system for industrial internet
- LI Shuo, LIU Tianyuan, HUANG Feng, XIE Xin, ZHANG Jinyi
- 2022, 48(10): 52-61. DOI: 10.12267/j.issn.2096-5931.2022.10.008
- Abstract ( 4153 ) HTML ( 924 ) PDF (1076KB) (3164)
- Analysis and suggestions of the digital talents shortage issues in China
- ZHANG Lin, WANG Lixiang, HU Yanni
- 2021, 47(12): 76-. DOI: 10.12267/j.issn.2096-5931.2021.12.010
- Abstract ( 2017 ) PDF (802KB) (3093)
- Overview of the development of privacy preserving computing
- YAN Shu, LYU Ailin
- 2021, 47(6): 1-11. DOI: 10.12267/j.issn.2096-5931.2021.06.001
- Abstract ( 2803 ) PDF (611KB) (2937)
- Overall architecture and enhancement pathways of low-altitude economy
- LU Fangzhou, YAN Kun, LI Wenyu, WANG Fang
- 2024, 50(11): 2-10. DOI: 10.12267/j.issn.2096-5931.2024.11.001
- Abstract ( 2405 ) HTML ( 405 ) PDF (1026KB) (2916)
- Analysis of the domestic and international development and status of AI governance
- ZHANG Pei, LIU Yuanyuan
- 2023, 49(1): 46-51. DOI: 10.12267/j.issn.2096-5931.2023.01.008
- Abstract ( 3320 ) HTML ( 882 ) PDF (935KB) (2882)
- Overview of data center development
- GUO Liang
- 2023, 49(5): 2-8. DOI: 10.12267/j.issn.2096-5931.2023.05.001
- Abstract ( 2935 ) HTML ( 1401 ) PDF (915KB) (2604)
- 2023, 49(1): 1-1.
- Abstract ( 3068 ) HTML ( 2696 ) PDF (221KB) (2500)
- 2024, 50(12): 1-1.
- Abstract ( 5332 ) HTML ( 1164 ) PDF (266KB) (2453)
- Research on market space forecast of low-altitude economy
- SUN Guohui, NIE Peng, ZHAO Litong
- 2024, 50(11): 33-40. DOI: 10.12267/j.issn.2096-5931.2024.11.006
- Abstract ( 2616 ) HTML ( 68 ) PDF (1060KB) (2400)
- Research on security challenges and governance path of generative artificial intelligence big model
- XU Ming
- 2025, 51(1): 10-19. DOI: 10.12267/j.issn.2096-5931.2025.01.002
- Abstract ( 1489 ) HTML ( 69 ) PDF (1014KB) (2347)
- Research on ethical challenges and rational regulation of brain-computer interface technology
- XU Ming
- 2024, 50(5): 54-59. DOI: 10.12267/j.issn.2096-5931.2024.05.008
- Abstract ( 1173 ) HTML ( 43 ) PDF (932KB) (2238)
- Research and protection suggestions of 5G network attack technology
- SHAO Xiaomeng, HAN Wenting
- 2022, 48(12): 79-81. DOI: 10.12267/j.issn.2096-5931.2022.12.013
- Abstract ( 922 ) HTML ( 145 ) PDF (872KB) (2195)
- Theapplicationof the face recognition in examination
- RENYan, LANGYingying
- 2019, 45(6): 32-35.
- Abstract ( 414 ) PDF (1912KB) (2080)
- Supervised by MIIT
- Founded in 1975
China Academy of Information and Communications Technology (CAICT)
Editor: The Editorial Department of Information and Communications Technology and Policy
Chief Editor: Yu Xiaohui
Deputy Chief Editor: XU Heyuan
Executive Chief Editor: ZHANG Jing
Editors: ZHANG Chun, WU Hui, LIU Shan, WANG Xiuping, ZHAO Zhihua, LIU Sihan
Address: 52 Huayuan North Road, Beijing, China
Phone: 010-62300192
E-mail: ictp@caict.ac.cn
Post Code: 100191
