Most Download

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All
  • Most Downloaded in Recent Month
  • Most Downloaded in Recent Year

Please wait a minute...
  • Select all
    |
  • FEATURE TOPIC: LOW-ALTITUDE AERIAL INFORMATION NETWORK: CHAL LENGES AND SOLUTIONS
    Zhou Sheng, Xie Bowen, Shen Daohong, Feng Wei, Jiang Zhiyuan, Niu Zhisheng
    China Communications. 2025, 22(9): 22-36. DOI: https://doi.org/10.23919/JCC.fa.2025-0115.202509

    This paper proposes a novel blended hyper-cellular architecture for low-altitude aerial intelligent networks (LAINs) to provide agile coverage tailored to active air routes and takeoff/landing spots. Traditional cellular networks struggle to meet the dynamic demands of low-altitude UAV communications due to their rigid structures. The hyper-cellular network (HCN) architecture separates control and traffic coverage, enabling flexible and energy-efficient operations. The key components include control base stations (CBSs) for wide-area signaling coverage and traffic base stations (TBSs) that can be dynamically activated based on traffic demands. The proposed solution also integrates space information networks (SINs) to enhance the coverage efficiency. Key technologies such as all-G CBS using RISC-V architecture, AI-powered radio maps for low-altitude environments, and agile TBS coverage adaptation are introduced with some preliminary studies. These designs aim to address challenges like mobility management, interference coordination, and the need for real-time spectrum sharing in blended satellite-terrestrial networks. The proposed solution offers a scalable and agile framework to support the rapidly growing demand for reliable, low-latency, and high-capacity UAV communications in urban environments.

  • SECURITY SCHEMES AND SOLUTIONS
    LI Wei, ZENG Xiaoyang, NAN Longmei, CHEN Tao, DAI Zibin
    China Communications. 2016, 13(1): 91-99.
    An Efficient and flexible implementation of block ciphers is critical to achieve information security processing. Existing implementation methods such as GPP, FPGA and cryptographic application-specific ASIC provide the broad range of support. However, these methods could not achieve a good tradeoff between high-speed processing and flexibility. In this paper, we present a reconfigurable VLIW processor architecture targeted at block cipher processing, analyze basic operations and storage characteristics, and propose the multi-cluster register-file structure for block ciphers. As for the same operation element of block ciphers, we adopt reconfigurable technology for multiple cryptographic processing units and interconnection scheme. The proposed processor not only flexibly accomplishes the combination of multiple basic cryptographic operations, but also realizes dynamic configuration for cryptographic processing units. It has been implemented with 0.18µmCMOS technology, the test results show that the frequency can reach 350MHz, and power consumption is 420mw. Ten kinds of block and hash ciphers were realized in the processor. The encryption throughput of AES, DES, IDEA, and SHA-1 algorithm is 1554Mbps, 448Mbps, 785Mbps, and 424Mbps respectively, the test result shows that our processor’s encryption performance is significantly higher than other designs.
  • SERVICES AND APPLICATIONS
    Danfeng Yan, Guang Zhou, Xuan Zhao, Yuan Tian, Fangchun Yang
    China Communications. 2016, 13(8): 244-257.
    Some research work has showed that public mood and stock market price have some relations in some degree. Although it is difficult to clear the relation, the research about the relation between stock market price and public mood is interested by some scientists. This paper tries to find the relationship between Chinese stock market and Chinese local Microblog. First, C-POMS (Chinese Profile of Mood States) was proposed to analyze sentiment of Microblog feeds. Then Granger causality test confirmed the relation between C-POMS analysis and price series. SVM and Probabilistic Neural Network were used to make prediction, and experiments show that SVM is better to predict stock market movements than Probabilistic Neural Network. Experiments also indicate that adding certain dimension of C-POMS as the input data will improve the prediction accuracy to 66.667%. Two dimensions to input data leads to the highest accuracy of 71.429%, which is about 20% higher than using only history stock data as the input data. This paper also compared the proposed method with the ROSTEA scores, and concluded that only the proposed method brings more accurate predicts.
  • SERVICES AND APPLICATIONS
    Xiaolin Gui, Jun Liu, Mucong Chi, Chenyu Li, Zhenming Lei
    China Communications. 2016, 13(8): 209-221.
    Security and privacy issues are magnified by velocity, volume, and variety of big data. User’s privacy is an even more sensitive topic attracting most people’s attention. While XcodeGhost, a malware of iOS emerging in late 2015, leads to the privacy-leakage of a large number of users, only a few studies have examined XcodeGhost based on its source code. In this paper we describe observations by monitoring the network activities for more than 2.59 million iPhone users in a provincial area across 232 days. Our analysis reveals a number of interesting points. For example, we propose a decay model for the prevalence rate of XcodeGhost and we find that the ratio of the infected devices is more than 60%; that a lot of popular applications, such as Wechat, railway 12306, didi taxi, Youku video are also infected; and that the duration as well as the traffic volume of most XcodeGhost-related HTTP-requests is similar with usual HTTP-request which makes it difficult to be found. Besides, we propose a heuristic model based on fingerprint and its web-knowledge to identify the infected applications. The identifying result shows the efficiency of this model.
  • SECURITY SCHEMES AND SOLUTIONS
    LIU Lizhao, LIU Jian, DAI Yaomei, XU Huarong, YIN Huayi, ZHU Shunzhi
    China Communications. 2016, 13(1): 100-112.
    Many websites use verification codes to prevent users from using the machine automatically to register, login, malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as entering the verification code manually. Improving the verification code security system needs the identification method as the corresponding testing system. We propose an anisotropic heat kernel equation group which can generate a heat source scale space during the kernel evolution based on infinite heat source axiom, design a multi-step anisotropic verification code identification algorithm which includes core procedure ofbuilding anisotropic heat kernel, settingwave energy information parameters, combing outverification codecharacters and corresponding peripheral procedure of gray scaling, binarizing, denoising, normalizing, segmenting and identifying, give out the detail criterion and parameter set. Actual test show the anisotropic heat kernel identification algorithm can be used on many kinds of verification code including text characters, mathematical, chinese, voice, 3D, programming, video, advertising, it has a higher rate of 25% and 50% than neural network and context matching algorithm separately for Yahoo site, 49% and 60% for Captcha site, 20% and 52% for Baidu site, 60% and 65% for 3DTakers site, 40% and 51% for MDP site.
  • FEATURE TOPIC: INTEGRATED TERRESTRIALSATELLITE NETWORKS
    Xiangming Meng, Sheng Wu, Michael Riis Andersen, Jiang Zhu, Zuyao Ni
    China Communications. 2018, 15(6): 1-17.
    Due to limited volume, weight and power consumption, micro-satellite has to reduce data transmission and storage capacity by image compression when performs earth observation missions. However, the quality of images may be unsatisfied. This paper considers the problem of recovering sparse signals by exploiting their unknown sparsity pattern. To model structured sparsity, the prior correlation of the support is encoded by imposing a transformed Gaussian process on the spike and slab probabilities. Then, an efficient approximate message-passing algorithm with structured spike and slab prior is derived for posterior inference, which, combined with a fast direct method, reduces the computational complexity significantly. Further, a unified scheme is developed to learn the hyperparameters using expectation maximization (EM) and Bethe free energy optimization. Simulation results on both synthetic and real data demonstrate the superiority of the proposed algorithm.
  • SECURITY SCHEMES AND SOLUTIONS
    ZHAO Guosheng, WANG Jian
    China Communications. 2016, 13(1): 150-160.
    There are a lot of security issues in block cipher algorithm. Security analysis and enhanced design of a dynamic block cipher was proposed. Firstly, the safety of ciphertext was enhanced based on confusion substitution of S-box, thus disordering the internal structure of data blocks by four steps of matrix transformation. Then, the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function. The dynamic key was finally generated by using LFSR, which improved the stochastic characters of secret key in each of round of iteration. The safety performance of proposed algorithm was analyzed by simulation test. The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security. Meanwhile, the proposed algorithm has highly scalability, the dimension of S-box and the number of register can be dynamically extended according to the security requirement.
  • FEATURE TOPIC: LOW-ALTITUDE AERIAL INFORMATION NETWORK: CHAL LENGES AND SOLUTIONS
    Huang Yuhong, Ding Haiyu, Chen Weiyan, Kong Luting, Deng Wei, Li Xin, Liu Yang, Wang Guizhen, Liu Liang
    China Communications. 2025, 22(9): 1-21. DOI: https://doi.org/10.23919/JCC.fa.2025-0117.202509

    The large-scale development of the low-altitude economy imposes increasingly stringent requirements on the supporting information infrastructure, necessitating the establishment of a low-altitude intelligent network (LAIN) with wide-area communication, high-precision navigation, and efficient supervision capabilities. Benefiting from its broad coverage, high reliability, and large bandwidth, the 5G cellular network serves as a critical foundation for LAIN construction. However, conventional cellular networks are primarily designed for two-dimensional terrestrial scenarios, and thus face significant limitations in coverage and interference resistance within complex three-dimensional low-altitude environments. To address the unique demands of LAIN applications, key challenges must be tackled, including achieving seamless three-dimensional coverage, mitigating interference in multi-dimensional network deployments, and ensuring stringent requirements for service quality and security supervision. This paper proposes an integrated LAIN architecture characterized by the convergence of communication, navigation, sensing, and management, enhanced with artificial intelligence and security mechanisms to improve overall system intelligence and resilience. Furthermore, this paper conducts an in-depth analysis of the critical challenges in LAIN deployment, explores enabling technologies to address these issues, and offers insights into the future development direction of low-altitude intelligent networks.

  • REVIEW PAPER
    Renzhi Yuan, Jianshe Ma
    China Communications. 2016, 13(6): 63-75.
    With rapid advances of solar blind ultraviolet LED and ultraviolet detecting technology in recent years, ultraviolet communication gradually becomes a research hotspot due to its inherent advantages: low solar background noise, non-line-of-sight(NLOS) and good secrecy. The strong scattering characteristics in atmospheric render ultraviolet waveband the ideal choice for achieving NLOS optical communication. This paper reviews the research history and status of ultraviolet communication both in China and abroad, and especially introduces three main issues of ultraviolet communication: channel model, system analysis and design, light sources and detectors. For each aspect, current open issues and prospective research directions are analyzed.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Li Ning, Fan Pingzhi
    China Communications. 2025, 22(8): 1-18. DOI: https://doi.org/10.23919/JCC.ja.2022-0698
    This paper investigates the uplink spectral efficiency of distributed cell-free (CF) massive multiple-input multiple-output (mMIMO) networks with correlated Rayleigh fading channels based on three different channel estimation schemes. Specifically, each access point (AP) first uses embedded pilots to estimate the channels of all users based on minimum mean-squared error (MMSE) estimation. Given the high computational cost of MMSE estimation, the low-complexity element-wise MMSE (EW-MMSE) channel estimator and the least-squares (LS) channel estimator without prior statistical information are also analyzed. To reduce non-coherent and coherent interference during uplink payload data transmission, simple centralized decoding (SCD) and large-scale fading decoding (LSFD) are examined. Then, the closed-form expressions for uplink spectral efficiency (SE) using MMSE, EW-MMSE, and LS estimators are developed for maximum ratio (MR) combining under LSFD, where each AP may have any number of antennas. The sum SE maximization problem with uplink power control is formulated. Since the maximization problem is non-convex and challenging, a block coordinate descent approach based on the weighted MMSE method is used to get the optimal local solution. Numerical studies demonstrate that LSFD and efficient uplink power control can considerably increase SE in distributed CF mMIMO networks.
  • REVIEW PAPER
    Haotong Cao, Longxiang Yang, Zeyuan Liu, Mengting Wu
    China Communications. 2016, 13(6): 48-62.
    Network virtualization is an enabling technology of running multiple virtual networks on a shared substrate network. It aims to deal with the ossification of current network architecture. As a crucial component of network virtualization, virtual network embedding (VNE) can efficiently and effectively allocates the substrate resource to proposed virtual network requests. According to the optimization strategy, VNE approaches can be classified into three categories: exact, heuristic and meta-heuristic solution. The VNE exact solution is the foundation of its corresponding heuristic and meta-heuristic solutions. This paper presents a survey of existing typical VNE exact solutions, and open problems for the future research of VNE exact solutions are proposed.
  • FEATURE TOPIC: INTEGRATED TERRESTRIALSATELLITE NETWORKS
    Peilong Liu, Hongyu Chen, Songjie Wei, Limin Li, Zhencai Zhu
    China Communications. 2018, 15(6): 28-41.
    To deal with the dynamic and imbalanced traffic requirements in Low Earth Orbit satellite networks, several distributed load balancing routing schemes have been proposed. However, because of the lack of global view, these schemes may lead to cascading congestion in regions with high volume of traffic. To solve this problem, a Hybrid-Traffic-Detour based Load Balancing Routing (HLBR) scheme is proposed, where a Long-Distance Traffic Detour (LTD) method is devised and coordinates with distributed traffic detour method to perform self-adaptive load balancing. The forwarding path of LTD is acquired by the Circuitous Multipath Calculation (CMC) based on prior geographical information, and activated by the LTD- Shift-Trigger (LST) through real-time congestion perception. Simulation results show that the HLBR can mitigate cascading congestion and achieve efficient traffic distribution.
  • STRATEGIES AND SCHEMES
    WANG Yajun, LIAO Tongqing, WANG Chuanan
    China Communications. 2016, 13(1): 176-184.
    In this paper, we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations, where an eavesdropper attempts to intercept their transmissions. We propose an optimal transmission scheduling scheme to defend against the eavesdropper, where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner. To be specific, the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect. The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks. For comparison purposes, we also consider the conventional round-robin scheduling as a benchmark, where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations. We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments. Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability. Additionally, upon increasing the number of source-destination pairs, the secrecy outage probability of the round-robin scheme keeps unchanged, whereas the secrecy outage performance of the proposed transmission scheduling significantly improves, showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping.
  • SECURITY SCHEMES AND SOLUTIONS
    ZHAO Bo, XIANG Shuang, AN Yang, TAO Wei
    China Communications. 2016, 13(1): 161-175.
    This paper analyzes the threat of TCG Software Stack (TSS)/TCM Service Module (TSM) deadlock in multi-user environment such as cloud and discusses its causes and mechanism. In addition, this paper puts forward a dynamic priority task scheduling strategy based on value evaluation to handle this threat. The strategy is based on the implementation features of trusted hardware and establishes a multi-level ready queue. In this strategy, an algorithm for real-time value computing is also designed, and it can adjust the production curves of the real time value by setting parameters in different environment, thus enhancing its adaptability, which is followed by scheduling and algorithm description. This paper also implements the algorithm and carries out its performance optimization. Due to the experiment result from Intel NUC, it is shown that TSS based on advanced DPTSV is able to solve the problem of deadlock with no negative influence on performance and security in multi-user environment.
  • BRAIN-COMPUTER-INTERFACE INSPIRED COMMUNICATIONS
    Lu Jiang, Weihua Pei, Yijun Wang
    China Communications. 2022, 19(2): 1-14.
    A brain-computer interface (BCI) system based on steady-state visual evoked potentials (SSVEP) was developed by four-class phase-coded stimuli. SSVEPs elicited by flickers at 60Hz, which is higher than the critical fusion frequency (CFF), were compared with those at 15Hz and 30Hz. SSVEP components in electroencephalogram (EEG) were detected using task related component analysis (TRCA) method. Offline analysis with 17 subjects indicated that the highest information transfer rate (ITR) was 29.80±4.65bpm with 0.5s data length for 60Hz and the classification accuracy was 70.07±4.15%. The online BCI system reached an averaged classification accuracy of 87.75±3.50% at 60Hz with 4s, resulting in an ITR of 16.73±1.63bpm. In particular, the maximum ITR for a subject was 80bpm with 0.5s at 60Hz. Although the BCI performance of 60Hz was lower than that of 15Hz and 30Hz, the results of the behavioral test indicated that, with no perception of flicker, the BCI system with 60Hz was more comfortable to use than 15Hz and 30Hz. Correlation analysis revealed that SSVEP with higher signal-to-noise ratio (SNR) corresponded to better classification performance and the improvement in comfortableness was accompanied by a decrease in performance. This study demonstrates the feasibility and potential of a user-friendly SSVEP-based BCI using imperceptible flickers.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Jingxuan Huang, Zesong Fei, Tianxiong Wang, Xinyi Wang, Fan Liu, Haijun Zhou, J. Andrew Zhang, Guohua Wei
    China Communications. 2019, 16(10): 100-111.
    With the development of automated driving vehicles, more and more vehicles will be fitted with more than one automotive radars, and the radar mutual interference will become very significant. Vehicle to everything (V2X) communication is a potential way for coordinating automotive radars and reduce the mutual interference. In this paper, we analyze the positional relation of the two radars that interfere with each other, and evaluate the mutual interference for different types of automotive radars based on Poisson point process (PPP). We also propose a centralized framework and the corresponding algorithm, which relies on V2X communication systems to allocate the spectrum resources for automotive radars to minimize the interference. The minimum spectrum resources required for zero-interference are analyzed for different cases. Simulation results validate the analysis and show that the proposed framework can achieve near-zero-interference with the minimum spectrum resources.
  • FEATURE TOPIC: TERAHERTZ WIRELESS COMMUNICATIONS
    Zhi Chen, Xinying Ma, Chong Han, Qiye Wen
    China Communications. 2021, 18(5): 93-119.
    Terahertz (THz) communications have been widely envisioned as a promising enabler to provide adequate bandwidth and achieve ultra-high data rates for sixth generation (6G) wireless networks. In order to mitigate blockage vulnerability caused by serious propagation attenuation and poor diffraction of THz waves, an intelligent reflecting surface (IRS), which manipulates the propagation of incident electromagnetic waves in a programmable manner by adjusting the phase shifts of passive reflecting elements, is proposed to create smart radio environments, improve spectrum efficiency and enhance coverage capability. Firstly, some prospective application scenarios driven by the IRS empowered THz communications are introduced, including wireless mobile communications, secure communications, unmanned aerial vehicle (UAV) scenario, mobile edge computing (MEC) scenario and THz localization scenario. Then, we discuss the enabling technologies employed by the IRS empowered THz system, involving hardware design, channel estimation, capacity optimization, beam control, resource allocation and robustness design. Moreover, the arising challenges and open problems encountered in the future IRS empowered THz communications are also highlighted. Concretely, these emerging problems possibly originate from channel modeling, new material exploration, experimental IRS testbeds and intensive deployment. Ultimately, the combination of THz communications and IRS is capable of accelerating the development of 6G wireless networks.
  • CHANNEL CHARACTERIZATION AND MODELING
    LIU Liu, TAO Cheng, SUN Rongchen, CHEN Houjin
    China Communications. 2016, 13(1): 17-21.
    The varying trajectory of Doppler frequency under changing speed motion conditionsare investigated in HighSpeed Railway (HSR) scenarios. Based on the geometrical physical parameters, instantaneous Doppler trajectories and expression forms of the change rate arededuced, including acceleration and deceleration cases.These modified models provide more accurate and realisticapproximations in modeling rapidly fading channels.
  • SECURITY SCHEMES AND SOLUTIONS
    Thiruppathy Kesavan. V, Radhakrishnan. S
    China Communications. 2016, 13(6): 178-194.
    In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node’s average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility.
  • COMMUNICATION NETWORKS
    Zeheng Yang, Yongan Guo
    China Communications. 2016, 13(8): 177-183.
    Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in network virtualization. VNE is NP-hard and former VNE algorithms are mostly heuristic in the literature. VNE exact algorithms have been developed in recent years. However, the constraints of exact VNE are only node capacity and link bandwidth. Based on these, this paper presents an exact VNE algorithm, ILP-LC, which is based on Integer Linear Programming(ILP), for embedding virtual network request with location constraints. This novel algorithm is aiming at mapping virtual network request(VNR) successfully as many as possible and consuming less substrate resources. The topology of each VNR is randomly generated by Waxman model. Simulation results show that the proposed ILP-LC algorithm outperforms the typical heuristic algorithms in terms of the VNR acceptance ratio, at least 15%.
  • FEATURE TOPIC: TERAHERTZ WIRELESS COMMUNICATIONS
    Shanyun Liu, Xianbin Yu, Rongbin Guo, Yajie Tang, Zhifeng Zhao
    China Communications. 2021, 18(5): 33-49.
    For the sake of meeting the demand of data rates at terabit (Tbit) per second scale in future networks, the terahertz (THz) band is widely accepted as one of the potential key enabling technologies for next generation wireless communication systemsWith the progressive development of THz devices, regrading THz communications at system level is increasing crucial and captured the interest of plenty of researchersWithin this scope, THz channel modeling serves as an indispensable and fundamental elementBy surveying the latest literature findings, this paper reviews the problem of channel modeling in the THz band, with an emphasis on molecular absorption loss, misalignment fading and multipath fading, which are major influence factors in the THz channel modelingThen, we focus on simulators and experiments in the THz band, after which we give a brief introduction on applications of THz channel models with respects to capacity, security, and sensing as examplesFinally, we discuss some key issues in the future THz channel modeling.
  • COMMUNICATIONS SYSTEM DESIGN
    ZHAO Juntao, FENG Wei, ZHAO Ming, WANG Jing
    China Communications. 2016, 13(1): 57-67.
    Spectrum sharing for efficient reuse of licensed spectrum is an important concept for cognitive radio technologies. In a spectrum-sharing system (SSS), deploying the antennas in a distributed manner can offer a new spatial dimension for the efficient reuse of licensed frequency bands. To improve the whole performance of multiple secondary users (SUs), this paper addresses the problem of coordinated multi-SU spectrum sharing in a distributed antenna-based SSS. By adopting the Hungarian method, the primal decomposition method and pricing policy, we propose a coordinated multi-user transmission scheme, so as to maximize the sum-rate of SUs. Simulation results show that the proposed method can significantly enhance the system performance, and the computational complexity is low.
  • COMMUNICATION NETWORKS
    Jianyuan Feng, Zhiyong Feng, Zhiqing Wei
    China Communications. 2016, 13(8): 148-158.
    Although small cell offloading technology can alleviate the congestion in macrocell, aggressively offloading data traffic from macrocell to small cell can also degrade the performance of small cell due to the heavy load. Because of collision and backoff, the degradation is significant especially in network with contention-based channel access, and finally decreases throughput of the whole network. To find an optimal fraction of traffic to be offloaded in heterogeneous network, we combine Markov chain with the Poisson point process model to analyze contention-based throughput in irregularly deployment networks. Then we derive the close-form solution of the throughput and find that it is a function of the transmit power and density of base stations. Based on this, we propose the load-aware offloading strategies via power control and base station density adjustment. The numerical results verify our analysis and show a great performance gain compared with non-load-aware offloading.
  • FEATURE TOPIC:COLLABORATIVE INTELLIGENCE FOR VEHICULAR INTERNET OF THINGS
    Xuting Duan, Hang Jiang, Daxin Tian, Tianyuan Zou, Jianshan Zhou, Yue Cao
    China Communications. 2021, 18(7): 1-12.
    In recent years, autonomous driving technology has made good progress, but the non-cooperative intelligence of vehicle for autonomous driving still has many technical bottlenecks when facing urban road autonomous driving challenges. V2I (Vehicle-to-Infrastructure) communication is a potential solution to enable cooperative intelligence of vehicles and roads. In this paper, the RGB-PVRCNN, an environment perception framework, is proposed to improve the environmental awareness of autonomous vehicles at intersections by leveraging V2I communication technology. This framework integrates vision feature based on PVRCNN. The normal distributions transform(NDT) point cloud registration algorithm is deployed both on onboard and roadside to obtain the position of the autonomous vehicles and to build the local map objects detected by roadside multi-sensor system are sent back to autonomous vehicles to enhance the perception ability of autonomous vehicles for benefiting path planning and traffic efficiency at the intersection. The field-testing results show that our method can effectively extend the environmental perception ability and range of autonomous vehicles at the intersection and outperform the PointPillar algorithm and the VoxelRCNN algorithm in detection accuracy.
  • Guest Editorial
    Yuanzhi He, Biao Sheng, Hao Yin, Di Yan, Yingchao Zhang
    China Communications. 2022, 19(1): 77-91.
    Resource allocation is an important problem influencing the service quality of multi-beam satellite communications. In multi-beam satellite communications, the available frequency bandwidth is limited, users requirements vary rapidly, high service quality and joint allocation of multi-dimensional resources such as time and frequency are required. It is a difficult problem needs to be researched urgently for multi-beam satellite communications, how to obtain a higher comprehensive utilization rate of multi-dimensional resources, maximize the number of users and system throughput, and meet the demand of rapid allocation adapting dynamic changed the number of users under the condition of limited resources, with using an efficient and fast resource allocation algorithm. In order to solve the multi-dimensional resource allocation problem of multi-beam satellite communications, this paper establishes a multi-objective optimization model based on the maximum the number of users and system throughput joint optimization goal, and proposes a multi-objective deep reinforcement learning based time-frequency two-dimensional resource allocation (MODRL-TF) algorithm to adapt dynamic changed the number of users and the timeliness requirements. Simulation results show that the proposed algorithm could provide higher comprehensive utilization rate of multi-dimensional resources, and could achieve multi-objective joint optimization, and could obtain better timeliness than traditional heuristic algorithms, such as genetic algorithm (GA) and ant colony optimization algorithm (ACO).
  • COMMUNICATIONS THEORIES & SYSTEMS
    Zhang Yidi, Jiang Ming, Zhao Chunming
    China Communications. 2025, 22(8): 76-86. DOI: https://doi.org/10.23919/JCC.ja.2023-0786
    This paper proposes a genetic optimization method for the construction of non-binary quasi-cyclic low-density parity-check (NB-QC-LDPC) codes with short block lengths. In our scheme, the initial template base matrices and the corresponding non-binary replacement matrices are constructed by the progressive edge growth algorithm and randomly generated, respectively. The genetic algorithm is then utilized to optimize the base matrices and the replacement ones. The simulation results show that the NB-QC-LDPC codes constructed by the proposed method achieve better decoding performance and lower implementation complexity compared to the existing NB-LDPC codes such as consultative committee for space data system and BeiDou satellite navigation system.
  • REVIEW PAPER
    LIU Dake, CAI Zhaoyun*, WANG Wei
    China Communications. 2016, 13(1): 1-16.
    Processors have been playing important roles in both communication infrastructure systems and terminals. In this paper, both application specific and general purpose processors for communications are discussed including the roles, the history, the current situations, and the trends. One trend is that ASIPs (Application Specific Instruction-set Processors) are taking over ASICs (Application Specific Integrated Circuits) because of the increasing needs both on performance and compatibility of multi-modes. The trend opened opportunities for researchers crossing the boundary between communications and computer architecture. Another trend is the serverlization, i.e., more infrastructure equipments are replaced by servers. The trend opened opportunities for researchers working towards high performance computing for communication, such as research on communication algorithm kernels and real time programming methods on servers.
  • COMMUNICATION NETWORKS
    Ningzhe Xing, Siya Xu, Sidong Zhang, Shaoyong Guo
    China Communications. 2016, 13(8): 169-176.
    In power communication networks, it is a challenge to decrease the risk of different services efficiently to improve operation reliability. One of the important factor in reflecting communication risk is service route distribution. However, existing routing algorithms do not take into account the degree of importance of services, thereby leading to load unbalancing and increasing the risks of services and networks. A routing optimization mechanism based on load balancing for power communication networks is proposed to address the abovementioned problems. First, the mechanism constructs an evaluation model to evaluate the service and network risk degree using combination of devices, service load, and service characteristics. Second, service weights are determined with modified relative entropy TOPSIS method, and a balanced service routing determination algorithm is proposed. Results of simulations on practical network topology show that the mechanism can optimize the network risk degree and load balancing degree efficiently.
  • Guest Editorial
    Keming Feng, Xiao Li, Yu Han, Yijian Chen
    China Communications. 2021, 18(3): 63-79.
    In this paper, we investigate the reconfigurable intelligent surface (RIS)-enabled multiple-input-single-output orthogonal frequency division multiplexing (MISO-OFDM) system under frequency-selective channels, and propose a low-complexity alternating optimization (AO) based joint beamforming and RIS phase shifts optimization algorithm to maximize the achievable rate. First, with fixed RIS phase shifts, we devise the optimal closed-form transmit beamforming vectors corresponding to different subcarriers. Then, with given active beamforming vectors, near-optimal RIS reflection coefficients can be determined efficiently leveraging fractional programming (FP) combined with manifold optimization (MO) or majorization-minimization (MM) framework. Additionally, we also propose a heuristic RIS phase shifts design approach based on the sum of subcarrier gain maximization (SSGM) criterion requiring lower complexity. Numerical results indicate that the proposed MO/MM algorithm can achieve almost the same rate as the upper bound achieved by the semidefinite relaxation (SDR) algorithm, and the proposed SSGM based scheme is only slightly inferior to the upper bound while has much lower complexity. These results demonstrate the effectiveness of the proposed algorithms.
  • COMMUNICATIONS THEORIES & SYSTEMS
    He Chunlin, Xiao Lixia, Li Shuo, Liu Weidan, Xiao Pei, Jiang Tao
    China Communications. 2025, 22(8): 19-28. DOI: https://doi.org/10.23919/JCC.ja.2023-0293
    In this paper, an index modulation (IM) aided uplink orthogonal time frequency space modulation (OTFS) structure for sparse code multiple access (SCMA) is proposed. To be more specific, the information bits are firstly partitioned for transmit antenna (TA) selection and sparse codeword mapping, respectively. Subsequently, the codewords deployed on the 2-dimensional (2D) delay-Doppler (DD) plane are transmitted by the selected TA, and the superimposed signals are jointly detected at the receiver. Furthermore, a low-complexity zero-embedded expectation propagation (ZE-EP) detector is conceived, where the codebooks are extended with zero vectors to reflect the silent indices. The simulation results demonstrate that the proposed IM-OTFS-SCMA system is capable of providing significant performance gain over the OTFS-SCMA counterpart.
  • SERVICES AND APPLICATIONS
    Meng Zhao, Huaxiang Zhang, Lili Meng
    China Communications. 2016, 13(8): 222-230.
    This paper presents an efficient image feature representation method, namely angle structure descriptor (ASD), which is built based on the angle structures of images. According to the diversity in directions, angle structures are defined in local blocks. Combining color information in HSV color space, we use angle structures to detect images. The internal correlations between neighboring pixels in angle structures are explored to form a feature vector. With angle structures as bridges, ASD extracts image features by integrating multiple information as a whole, such as color, texture, shape and spatial layout information. In addition, the proposed algorithm is efficient for image retrieval without any clustering implementation or model training. Experimental results demonstrate that ASD outperforms the other related algorithms.
  • FEATURE TOPIC: CLOUD MOBILE MEDIA
    Liwei Mu, Chulong Liang, Zhiyong Liu, Daru Pan
    China Communications. 2016, 13(8): 97-102.
    In this paper, we propose a new method to derive a family of regular rate-compatible low-density parity-check (RC-LDPC) convolutional codes from RC-LDPC block codes. In the RC-LDPC convolutional family, each extended sub-matrix of each extended code is obtained by choosing specified elements from two fixed matrices HE1k and HE2k, which are derived by modifying the extended matrices HE1 and HE2 of a systematic RC-LDPC block code. The proposed method which is based on graph extension simplifies the design, and prevent the defects caused by the puncturing method. It can be used to generate both regular and irregular RC-LDPC convolutional codes. All resulted codes in the family are systematic which simplify the encoder structure and have maximum encoding memories which ensure the property. Simulation results show the family collectively offer a steady improvement in performance with code compatibility over binary-input additive white Gaussian noise channel (BI-AWGNC).
  • Guest Editorial
    Gao Li, Wei Wang, Guoru Ding, Qihui Wu, Zitong Liu
    China Communications. 2021, 18(12): 51-64.
    The continuous change of communication frequency brings difficulties to the reconnaissance and prediction of non-cooperative communication networks. Since the frequency-hopping (FH) sequence is usually generated by a certain model with certain regularity, the FH frequency is thus predictable. In this paper, we investigate the FH frequency reconnaissance and prediction of a non-cooperative communication network by effective FH signal detection, time-frequency (TF) analysis, wavelet detection and frequency estimation. With the intercepted massive FH signal data, long short-term memory (LSTM) neural network model is constructed for FH frequency prediction. Simulation results show that our parameter estimation methods could estimate frequency accurately in the presence of certain noise. Moreover, the LSTM-based scheme can effectively predict FH frequency and frequency interval.
  • Guest Editorial
    Qihui Wu, Min Zhang, Chao Dong, Yong Feng, Yanli Yuan, Simeng Feng, Tony Q. S. Quek
    China Communications. 2022, 19(1): 186-201.
    In recent years, with the growth in Unmanned Aerial Vehicles (UAVs), UAV-based systems have become popular in both military and civil applications.In these scenarios, the lack of reliable communication infrastructure has motivated UAVs to establish a network as flying nodes, also known as Flying Ad Hoc Networks (FANETs).However, in FANETs, the high mobility degree of flying and terrestrial users may be responsible for constant changes in the network topology, making end-to-end connections in FANETs challenging.Mobility estimation and prediction of UAVs can address the challenge mentioned above since it can provide better routing planning and improve overall FANET performance in terms of continuous service availability.We thus develop a Software Defined Network (SDN)-based heterogeneous architecture for reliable communication in FANETs.In this architecture, we apply an Extended Kalman Filter (EKF) for accurate mobility estimation and prediction of UAVs.In particular, we formulate the routing problem in SDN-based Heterogeneous FANETs as a graph decision problem.As the problem is NP-hard, we further propose a Directional Particle Swarming Optimization (DPSO) approach to solve it.The extensive simulation results demonstrate that the proposed DPSO routing can exhibit superior performance in improving the goodput, packet delivery ratio, and delay.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Liu Zhao, Wang Meng, Lin Kai, Li Shuang, Yang Xinghai, Wang Jingjing
    China Communications. 2025, 22(8): 134-149. DOI: https://doi.org/10.23919/JCC.ja.2024-0532
    The complexity of underwater environments renders underwater acoustic signals vulnerable to various forms of noise during transmission, creating significant challenges for signal demodulation tasks. This paper presents a novel demodulation method for multi-class single-carrier underwater acoustic signals. Our approach employs two innovative structures for modeling in the time and frequency domains, integrating these features for comprehensive discrimination. Specifically, we introduce a High-Efficiency Convolution (HEC) Block to extract time-domain waveform features and a Local-Global Attention (LGA) structure for time-frequency features, utilizing cross-attention to fuse these features. This method enables the network to learn hidden frequency, phase, and amplitude characteristics within high-dimensional features, effectively capturing both fine-grained local and long-distance global features. A classifier is then constructed to categorize multi-class modulation signals, completing the demodulation process. Simulation results highlight the method's exceptional performance: in a Gaussian channel with a signal-to-noise ratio (SNR) of 0 dB, the demodulation error rates for 2PSK, 2FSK, 2ASK, 4PSK, 4FSK, and 8PSK signals are all below 0.01, while the error rate for 16QAM modulated signals is less than 0.1. Additionally, validation using BELLHOP simulation data and real-world data collected from the Yellow Sea further demonstrates the proposed method's remarkable noise resistance and demodulation capabilities.
  • FEATURE TOPIC: LOW-ALTITUDE AERIAL INFORMATION NETWORK: CHAL LENGES AND SOLUTIONS
    Sun Meng, Shi Dongqi, Pan Jingjing, Li Jianfeng, Zhang Xiaofei, Pan Shilong, Wu Qihui
    China Communications. 2025, 22(9): 103-112. DOI: https://doi.org/10.23919/JCC.fa.2025-0103.202509

    The deployment of the low earth orbit (LEO) satellites provides a large number of signals of opportunity (SOPs), unmanned aerial vehicle (UAV) positioning and navigation via LEO-SOPs have received much attention. Current research is focused on Doppler positioning techniques, which require the collaboration of multiple satellites ($\geq 3$). However, the dynamic changes of LEO satellites weaken the generalization ability of Doppler positioning. In this paper, a direct position determination (DPD) method with uniform circular array (UCA) is proposed for UAV positioning from the perspective of the spatial spectrum estimation of LEO-SOPs. The proposed method employs the orthogonality between the signal and noise subspaces of the covariance matrix of the different received SOPs to establish the cost function for UAV's coordinate. Instead of the multiple dimensional search, a root mean square propagation (RMSProp) gradient optimizer with an adaptive learning rate is developed to find the coordinate of UAV. The effectiveness and robustness of the proposed method are verified using numerical data generated from the systems tool kit (STK).

  • FEATURE TOPIC: TERAHERTZ WIRELESS COMMUNICATIONS
    Pan Tang, Jianhua Zhang, Haoyu Tian, Zhaowei Chang, Jun Men, Yuxiang Zhang, Lei Tian, Liang Xia, Qixing Wang, Jingsuo He
    China Communications. 2021, 18(5): 19-32.
    Terahertz (THz) communication has been envisioned as a key enabling technology for sixth-generation (6G). In this paper, we present an extensive THz channel measurement campaign for 6G wireless communications from 220 GHz to 330 GHz. Furthermore, the path loss is analyzed and modeled by using two single-frequency path loss models and a multiple-frequencies path loss model. It is found that at most frequency points, the measured path loss is larger than that in the free space. But at around 310 GHz, the propagation attenuation is relatively weaker compared to that in the free space. Also, the frequency dependence of path loss is observed and the frequency exponent of the multiple-frequencies path loss model is 2.1. Moreover, the cellular performance of THz communication systems is investigated by using the obtained path loss model. Simulation results indicate that the current inter-site distance (ISD) for the indoor scenario is too small for THz communications. Furthermore, the tremendous capacity gain can be obtained by using THz bands compared to using microwave bands and millimeter wave bands. Generally, this work can give an insight into the design and optimization of THz communication systems for 6G.
  • Guest Editorial
    Kang Li, Yutao Jiao, Yehui Song, Jinghua Li, Chao Yue
    China Communications. 2021, 18(12): 65-80.
    In spectrum sharing systems, locating multiple radiation sources can efficiently find out the intruders, which protects the shared spectrum from malicious jamming or other unauthorized usage. Compared to single-source localization, simultaneously locating multiple sources is more challenging in practice since the association between measurement parameters and source nodes are not known. Moreover, the number of possible measurements-source associations increases exponentially with the number of sensor nodes. It is crucial to discriminate which measurements correspond to the same source before localization. In this work, we propose a centralized localization scheme to estimate the positions of multiple sources. Firstly, we develop two computationally light methods to handle the unknown RSS-AOA measurements-source association problem. One method utilizes linear coordinate conversion to compute the minimum spatial Euclidean distance summation of measurements. Another method exploits the long-short-term memory (LSTM) network to classify the measurement sequences. Then, we propose a weighted least squares (WLS) approach to obtain the closed-form estimation of the positions by linearizing the non-convex localization problem. Numerical results demonstrate that the proposed scheme could gain sufficient localization accuracy under adversarial scenarios where the sources are in close proximity and the measurement noise is strong.
  • FEATURE TOPIC: TIME-CRITICAL COMMUNICATION AND COMPUTATION FOR INTELLIGENT VEHICULAR NETWORKS
    Wugedele Bao, Celimuge Wu, Siri Guleng, Jiefang Zhang, Kok-Lim Alvin Yau, Yusheng Ji
    China Communications. 2021, 18(6): 39-52.
    In order to support advanced vehicular Internet-of-Things (IoT) applications, information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in complex and dynamic vehicular environments. Federated learning (FL), which is a type of distributed learning technology, has been attracting great interest in recent years as it performs knowledge exchange among different network entities without a violation of user privacy. However, client selection and networking scheme for enabling FL in dynamic vehicular environments, which determines the communication delay between FL clients and the central server that aggregates the models received from the clients, is still under-explored. In this paper, we propose an edge computing-based joint client selection and networking scheme for vehicular IoT. The proposed scheme assigns some vehicles as edge vehicles by employing a distributed approach, and uses the edge vehicles as FL clients to conduct the training of local models, which learns optimal behaviors based on the interaction with environments. The clients also work as forwarder nodes in information sharing among network entities. The client selection takes into account the vehicle velocity, vehicle distribution, and the wireless link connectivity between vehicles using a fuzzy logic algorithm, resulting in an efficient learning and networking architecture. We use computer simulations to evaluate the proposed scheme in terms of the communication overhead and the information covered in learning.
  • FEATURE TOPIC: LOW-ALTITUDE AERIAL INFORMATION NETWORK: CHAL LENGES AND SOLUTIONS
    Lu Mingquan, Yao Zheng, Shen Yuan, Li Xingxing, Wang Zhipeng
    China Communications. 2025, 22(9): 48-80. DOI: https://doi.org/10.23919/JCC.fa.2025-0129.202509

    High-performance positioning, navigation and timing (PNT) service is critical to the safe flight of low-altitude aircraft and the effective management of low altitude traffic. In low-altitude economic scenarios, the specificity of massive unmanned aerial vehicle (UAV) flights and the complexity of low-altitude airspace traffic management impose stringent demand on the high-continuity, high-accuracy, real-time, and high-security PNT service. However, the current PNT service, which primarily relies on Global Navigation Satellite System (GNSS), Micro-Electro-Mechanical System Inertial Navigation System (MEMS INS), etc., is completely inadequate to support the future needs of low-altitude economic development. In order to bridge the huge gap between existing capability and future demand, a three-layer PNT architecture based on the collaboration of space-based, air-based and ground-based PNT systems is proposed for low-altitude economy. The space-based layer consists of high, medium even possible low orbit GNSS constellations, such as BeiDou Navigation Satellite System (BDS), for high-precision, high-security absolute positioning and timing. The air-based layer leverages inter-aircraft links for high-reliability dynamic relative positioning. The ground-based layer includes pseudolite network, as well as 5G-advanced (5G-A)/6G network, for more comprehensive coverage and real-time positioning. To this end, it is imperative to make breakthroughs in key technologies, from systems to airborne terminal, including but not limited to high-precision anti-jamming GNSS signal processing, high-reliability relative positioning, real-time pseudolite positioning, and high-efficient multi-source information fusion at airborne terminal, etc. Due to the moderate redundancy, heterogeneous mechanism, and multiple coverage from multiple PNT systems, the proposed layered PNT architecture possesses high robustness and resilient. Additionally, the integration of INS, LiDAR and vision etc. perception technologies can significantly enhance the PNT capability. As a result, the proposed three-layer PNT architecture enable greater autonomy for low-altitude aircraft and intelligent traffic management for massive UAV operations, and promoting the safe and efficient development of the low-altitude economy.