Most Download

    Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month| Most Downloaded in Recent Year|

    Most Downloaded in Recent Month
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Modulation Techniques for Li-Fi
    Mohamed Sufyan Islim, Harald Haas
    ZTE Communications    2016, 14 (2): 29-40.   DOI: 10.3969/j.issn.1673-5188.2016.02.004
    Abstract1696)      PDF (476KB)(1011)       Save
    Modulation techniques for light fidelity (Li-Fi) are reviewed in this paper. Li-Fi is the fully networked solution for multiple users that combines communication and illumination simultaneously. Light emitting diodes (LEDs) are used in Li-Fi as visible light transmitters, therefore, only intensity modulated direct detected modulation techniques can be achieved. Single carrier modulation techniques are straightforward to be used in Li-Fi, however, computationally complex equalization processes are required in frequency selective Li-Fi channels. On the other hand, multicarrier modulation techniques offer a viable solution for Li-Fi in terms of power, spectral and computational efficiency. In particular, orthogonal frequency division multiplexing (OFDM) based modula-tion techniques offer a practical solution for Li-Fi, especially when direct current (DC) wander, and adaptive bit and power loading techniques are considered. Li-Fi modulation techniques need to also satisfy illumination requirements. Flickering avoidance and dimming control are considered in the variant modulation techniques presented. This paper surveys the suitable modulation techniques for Li-Fi including those which explore time, frequency and colour domains.
    Related Articles | Metrics
    Towards Near-Field Communications for 6G: Challenges and Opportunities
    LIU Mengyu, ZHANG Yang, JIN Yasheng, ZHI Kangda, PAN Cunhua
    ZTE Communications    2024, 22 (1): 3-15.   DOI: 10.12142/ZTECOM.202401002
    Abstract71)   HTML4)    PDF (2702KB)(90)       Save

    Extremely large-scale multiple-input multiple-output (XL-MIMO) and terahertz (THz) communications are pivotal candidate technologies for supporting the development of 6G mobile networks. However, these techniques invalidate the common assumptions of far-field plane waves and introduce many new properties. To accurately understand the performance of these new techniques, spherical wave modeling of near-field communications needs to be applied for future research. Hence, the investigation of near-field communication holds significant importance for the advancement of 6G, which brings many new and open research challenges in contrast to conventional far-field communication. In this paper, we first formulate a general model of the near-field channel and discuss the influence of spatial nonstationary properties on the near-field channel modeling. Subsequently, we discuss the challenges encountered in the near field in terms of beam training, localization, and transmission scheme design, respectively. Finally, we point out some promising research directions for near-field communications.

    Table and Figures | Reference | Related Articles | Metrics
    Cloud Computing: Concept, Model, and Key Technologies
    Kevin Yin
    ZTE Communications    2010, 8 (4): 21-26.  
    Abstract494)      PDF (468KB)(875)       Save
    Cloud computing is a new network computing paradigm based on IP architecture, and its potential lies in new ICT business applications. For the majority of operators and enterprises, the main task associated with cloud computing is next generation data center transformation. This will ensure cloud computing becomes more widespread among enterprises, institutions, organizations, and operators. Cloud computing not only provides traditional IT resource usage and application services, but also supports full resource usage and application services such as IT, communications, video, mobile, and Internet of Things using a converged network infrastructure. Key cloud computing technologies include unified fabric, unified virtualization, and unified computing system. The formation of an open industry alliance and promotion of open technology standards will be critical for the future development of cloud computing.
    Related Articles | Metrics
    Barcelona Smart City: The Heaven on Earth (Internet of Things: Technological God)
    Somayya Madakam, Ramaswamy Ramachandran
    ZTE Communications    2015, 13 (4): 3-9.   DOI: 10.3969/j.issn.1673-5188.2015.04.001
    Abstract278)      PDF (564KB)(345)       Save
    Cities are the most preferable dwelling places, having with better employment opportunities, educational hubs, medical services, recreational facilities, theme parks, and shopping malls etc. Cities are the driving forces for any national economy too. Unfortunately now a days, these cities are producing circa 70% of pollutants, even though they only occupy 2% of surface of the Earth. Public utility services cannot meet the demands of unexpected growth. The filthiness in cities causing decreasing of Quality of Life. In this light our research paper is giving more concentration on necessity of “Smart Cities”, which are the basis for civic centric services. This article is throwing light on Smart Cities and its important roles. The beauty of this manuscript is scribbling “Smart Cities” concepts in pictorially. Moreover this explains on“Barcelona Smart City”using Internet of Things Technologies”. It is a good example in urban paradigm shift. Bracelona is like the heaven on the earth with by providing Quality of Life to all urban citizens. The GOD is Interenet of Things.
    Related Articles | Metrics
    A Survey of Federated Learning on Non-IID Data
    HAN Xuming, GAO Minghan, WANG Limin, HE Zaobo, WANG Yanze
    ZTE Communications    2022, 20 (3): 17-26.   DOI: 10.12142/ZTECOM.202203003
    Abstract144)   HTML13)    PDF (3213KB)(187)       Save

    Federated learning (FL) is a machine learning paradigm for data silos and privacy protection,which aims to organize multiple clients for training global machine learning models without exposing data to all parties. However, when dealing with non-independently identically distributed (non-IID) client data, FL cannot obtain more satisfactory results than centrally trained machine learning and even fails to match the accuracy of the local model obtained by client training alone. To analyze and address the above issues, we survey the state-of-the-art methods in the literature related to FL on non-IID data. On this basis, a motivation-based taxonomy, which classifies these methods into two categories, including heterogeneity reducing strategies and adaptability enhancing strategies, is proposed. Moreover, the core ideas and main challenges of these methods are analyzed. Finally, we envision several promising research directions that have not been thoroughly studied, in hope of promoting research in related fields to a certain extent.

    Table and Figures | Reference | Related Articles | Metrics
    5G New Radio (NR): Standard and Technology
    Fa-Long Lu
    ZTE Communications    2017, 15 (S1): 1-2.  
    Abstract216)   HTML11)    PDF (200KB)(284)       Save
    Reference | Related Articles | Metrics
    Big-Data Processing Techniques and Their Challenges in Transport Domain
    Aftab Ahmed Chandio, Nikos Tziritas, Cheng-Zhong Xu
    ZTE Communications    2015, 13 (1): 50-59.   DOI: 10.3969/j.issn.1673-5188.2015.01.007
    Abstract351)      PDF (453KB)(272)       Save
    This paper describes the fundamentals of cloud computing and current big-data key technologies. We categorize big-data processing as batch-based, stream-based, graph-based, DAG-based, interactive-based, or visual-based according to the processing technique. We highlight the strengths and weaknesses of various big-data cloud processing techniques in order to help the big-data community select the appropriate processing technique. We also provide big data research challenges and future directions in aspect to transportation management systems.
    Related Articles | Metrics
    Recent Developments of Transmissive Reconfigurable Intelligent Surfaces: A Review
    TANG Junwen, XU Shenheng, YANG Fan, LI Maokun
    ZTE Communications    2022, 20 (1): 21-27.   DOI: 10.12142/ZTECOM.202201004
    Abstract177)   HTML15)    PDF (1869KB)(360)       Save

    Reconfigurable intelligent surface (RIS) is considered as one of the key technologies for the next-generation mobile communication systems. The transmissive RIS is able to achieve dynamic beamforming capability while transmitting an in-band RF signal through its aperture, and has promising prospects in various practical application scenarios. This paper reviews some of the latest developments of the transmissive RIS. The approaches for transmissive RIS designs are classified and described briefly. Numerous designs with different phase resolutions, such as 1-bit, 2-bit or continuous 360° phase shifts, are presented, with detailed discussions on their operating mechanisms and transmission performances. The design solutions for various transmissive RIS elements are summarized and compared.

    Table and Figures | Reference | Related Articles | Metrics
    Near-Field Beam Training for Holographic MIMO Communications: Typical Methods, Challenges and Future Directions
    SHEN Jiayu, YANG Jun, ZHU Chen, DENG Zhiji, HUANG Chongwen
    ZTE Communications    2024, 22 (1): 41-52.   DOI: 10.12142/ZTECOM.202401006
    Abstract26)   HTML2)    PDF (3394KB)(45)       Save

    Holographic multiple-input multiple-output (HMIMO) has become an emerging technology for achieving ultra-high frequency spectral efficiency and spatial resolution in future wireless systems. The increasing antenna aperture leads to a more significant characterization of the spherical wavefront in near-field communications in HMIMO scenarios. Beam training as a key technique for wireless communication is worth exploring in this near-field scenario. Compared with the widely researched far-field beam training, the increased dimensionality of the search space for near-field beam training poses a challenge to the complexity and accuracy of the proposed algorithm. In this paper, we introduce several typical near-field beam training methods: exhaustive beam training, hierarchical beam training, and multi-beam training that includes equal interval multi-beam training and hash multi-beam training. The performances of these methods are compared through simulation analysis, and their effectiveness is verified on the hardware testbed as well. Additionally, we provide application scenarios, research challenges, and potential future research directions for near-field beam training.

    Table and Figures | Reference | Related Articles | Metrics
    Programmable Metasurface for Simultaneously Wireless Information and Power Transfer System
    CHANG Mingyang, HAN Jiaqi, MA Xiangjin, XUE Hao, WU Xiaonan, LI Long, CUI Tiejun
    ZTE Communications    2022, 20 (2): 48-62.   DOI: 10.12142/ZTECOM.202202008
    Abstract176)   HTML11)    PDF (5135KB)(160)       Save

    Implementing self-sustainable wireless communication systems is urgent and challenging for 5G and 6G technologies. In this paper, we elaborate on a system solution using the programmable metasurface (PMS) for simultaneous wireless information and power transfers (SWIPT), offering an optimized wireless energy management network. Both transmitting and receiving sides of the proposed solution are presented in detail. On the transmitting side, employing the wireless power transfer (WPT) technique, we present versatile power conveying strategies for near-field or far-field targets, single or multiple targets, and equal or unequal power targets. On the receiving side, utilizing the wireless energy harvesting (WEH) technique, we report our work on multi-functional rectifying metasurfaces that collect the wirelessly transmitted energy and the ambient energy. More importantly, a numerical model based on the plane-wave angular spectrum method is investigated to accurately calculate the radiation fields of PMS in the Fresnel and Fraunhofer regions. With this model, the efficiencies of WPT between the transmitter and the receiver are analyzed. Finally, future research directions are discussed, and integrated PMS for wireless information and wireless power is outlined.

    Table and Figures | Reference | Related Articles | Metrics
    Near-Field Wireless Power Transfer, Sensing and Communication with Bessel Beams
    CAO Xinghan, YIN Huarui, YOU Changsheng
    ZTE Communications    2024, 22 (1): 53-61.   DOI: 10.12142/ZTECOM.202401007
    Abstract26)   HTML0)    PDF (1747KB)(39)       Save

    The Bessel beam, characterized by its unique non-diffracting properties, holds promising applications. In this paper, we provide a detailed introduction and investigation into the theory and research of the Bessel beam, with a special focus on its generation and applications in the near-field region. We provide an introduction to the concepts, properties, and foundational theories of the Bessel beam. Additionally, the current study on generating Bessel beams and their applications is categorized and discussed, and potential research challenges are proposed in this paper. This review serves as a solid foundation for researchers to understand the concept of the Bessel beam and explore its potential applications.

    Table and Figures | Reference | Related Articles | Metrics
    Kinetic Energy Harvesting Toward Battery-Free IoT: Fundamentals, Co-Design Necessity and Prospects
    LIANG Junrui, LI Xin, YANG Hailiang
    ZTE Communications    2021, 19 (1): 48-60.   DOI: 10.12142/ZTECOM.202101007
    Abstract130)   HTML9)    PDF (1567KB)(494)       Save

    Energy harvesting (EH) technology is developed with the purpose of harnessing ambient energy in different physical forms. Although the available ambient energy is usually tiny, not comparable to the centralized power generation, it brings out the convenience of on-site power generation by drawing energy from local sources, which meets the emerging power demand of long-lasting, extensively-deployed, and maintenance-free Internet of Things (IoT). Kinetic energy harvesting (KEH) is one of the most promising EH solutions toward the realization of battery-free IoT. The KEH-based battery-free IoT can be extensively deployed in the smart home, smart building, and smart city scenarios, enabling perceptivity, intelligence, and connectivity in many infrastructures. This paper gives a brief introduction to the configurations and basic principles of practical KEH-IoT systems, including their mechanical, electrical, and computing parts. Although there are already a few commercial products in some specific application markets, the understanding and practice in the co-design and optimization of a single KEH-IoT device are far from mature, let alone the conceived multiagent energy-autonomous intelligent systems. Future research and development of the KEH-IoT system beckons for more exchange and collaboration among mechanical, electrical, and computer engineers toward general design guidelines to cope with these interdisciplinary engineering problems.

    Table and Figures | Reference | Related Articles | Metrics
    Degree of Freedom Analysis for Holographic MIMO Based on a Mutual-Coupling-Compliant Channel Model
    SUN Yunqi, JIAN Mengnan, YANG Jun, ZHAO Yajun, CHEN Yijian
    ZTE Communications    2024, 22 (1): 34-40.   DOI: 10.12142/ZTECOM.202401005
    Abstract38)   HTML3)    PDF (1783KB)(37)       Save

    Degree of freedom (DOF) is a key indicator for spatial multiplexing layers of a wireless channel. Traditionally, the channel of a multiple-input multiple-output (MIMO) half-wavelength dipole array has a DOF that equals the antenna number. However, recent studies suggest that the DOF could be less than the antenna number when strong mutual coupling is considered. We utilize a mutual-coupling-compliant channel model to investigate the DOF of the holographic MIMO (HMIMO) channel and give a upper bound of the DOF with strong mutual coupling. Our numerical simulations demonstrate that a dense array can support more DOF per unit aperture as compared with a half-wavelength MIMO system.

    Table and Figures | Reference | Related Articles | Metrics
    An Overview of Non-Orthogonal Multiple Access
    Anass Benjebbour
    ZTE Communications    2017, 15 (S1): 21-30.   DOI: 10.3969/j.issn.1673-5188.2017.S1.003
    Abstract480)   HTML120)    PDF (519KB)(359)       Save

    In recent years, non-orthogonal multiple access (NOMA) has attracted a lot of attention as a novel and promising power-domain user multiplexing scheme for Long-Term Evolution (LTE) enhancement and 5G. NOMA is able to contribute to the improvement of the tradeoff between system capacity and user fairness (i.e., cell-edge user experience). This improvement becomes in particular emphasized in a cellular system where the channel conditions vary significantly among users due to the near-far effect. In this article, we provide an overview of the concept, design and performance of NOMA. In addition, we review the potential benefits and issues of NOMA over orthogonal multiple access (OMA) such as orthogonal frequency division multiple access (OFDMA) adopted by LTE, and the status of 3GPP standardization related to NOMA.

    Table and Figures | Reference | Related Articles | Metrics
    Detecting Abnormal Start-Ups, Unusual Resource Consumptions of the Smart Phone: A Deep Learning Approach
    ZHENG Xiaoqing, LU Yaping, PENG Haoyuan, FENG Jiangtao, ZHOU Yi, JIANG Min, MA Li, ZHANG Ji, JI Jie
    ZTE Communications    2019, 17 (2): 38-43.   DOI: 10.12142/ZTECOM.201902006
    Abstract90)   HTML1)    PDF (449KB)(83)       Save

    The temporal distance between events conveys information essential for many time series tasks such as speech recognition and rhythm detection. While traditional models such as hidden Markov models (HMMs) and discrete symbolic grammars tend to discard such information, recurrent neural networks (RNNs) can in principle learn to make use of it. As an advanced variant of RNNs, long short-term memory (LSTM) has an alternative (arguably better) mechanism for bridging long time lags. We propose a couple of deep neural network-based models to detect abnormal start-ups, unusual CPU and memory consumptions of the application processes running on smart phones. Experiment results showed that the proposed neural networks achieve remarkable performance at some reasonable computational cost. The speed advantage of neural networks makes them even more competitive for the applications requiring real-time response, offering the proposed models the potential for practical systems.

    Table and Figures | Reference | Related Articles | Metrics
    Boundary Data Augmentation for Offline Reinforcement Learning
    SHEN Jiahao, JIANG Ke, TAN Xiaoyang
    ZTE Communications    2023, 21 (3): 29-36.   DOI: 10.12142/ZTECOM.202303005
    Abstract185)   HTML20)    PDF (1865KB)(311)       Save

    Offline reinforcement learning (ORL) aims to learn a rational agent purely from behavior data without any online interaction. One of the major challenges encountered in ORL is the problem of distribution shift, i.e., the mismatch between the knowledge of the learned policy and the reality of the underlying environment. Recent works usually handle this in a too pessimistic manner to avoid out-of-distribution (OOD) queries as much as possible, but this can influence the robustness of the agents at unseen states. In this paper, we propose a simple but effective method to address this issue. The key idea of our method is to enhance the robustness of the new policy learned offline by weakening its confidence in highly uncertain regions, and we propose to find those regions by simulating them with modified Generative Adversarial Nets (GAN) such that the generated data not only follow the same distribution with the old experience but are very difficult to deal with by themselves, with regard to the behavior policy or some other reference policy. We then use this information to regularize the ORL algorithm to penalize the overconfidence behavior in these regions. Extensive experiments on several publicly available offline RL benchmarks demonstrate the feasibility and effectiveness of the proposed method.

    Table and Figures | Reference | Related Articles | Metrics
    Link Budget and Enhanced Communication Distance for Ambient Internet of Things
    YANG Yibing, LIU Ming, XU Rongtao, WANG Gongpu, GONG Wei
    ZTE Communications    2024, 22 (1): 16-23.   DOI: 10.12142/ZTECOM.202401003
    Abstract53)   HTML1)    PDF (1976KB)(31)       Save

    Backscatter communications will play an important role in connecting everything for beyond 5G (B5G) and 6G systems. One open challenge for backscatter communications is that the signals suffer a round-trip path loss so that the communication distance is short. In this paper, we first calculate the communication distance upper bounds for both uplink and downlink by measuring the tag sensitivity and reflection coefficient. It is found that the activation voltage of the envelope detection diode of the downlink tag is the main factor limiting the backscatter communication distance. Based on this analysis, we then propose to implement a low-noise amplifier (LNA) module before the envelope detection at the tag to enhance the incident signal strength. Our experimental results on the hardware platform show that our method can increase the downlink communication range by nearly 20 m.

    Table and Figures | Reference | Related Articles | Metrics
    Services and Key Technologies of the Internet of Things
    Xing Xiaojiang, Wang Jianli, Li Mingdong
    ZTE Communications    2010, 8 (2): 26-29.  
    Abstract884)      PDF (451KB)(1209)       Save
    This article introduces the services and development of the Internet of Things, and analyzes the driving forces and obstacles behind such development. Looking at application types and the different development stages of the Internet of Things, this article categorizes its services into four types: identity related services, information aggregation services, collaborative-aware services, and ubiquitous services. For the first two types of services, applications and system framework are discussed; for the last two types, development trends are discussed. Services provided by the Internet of Things will gradually be integrated into human life and society; with the development of the Internet of Things, applications will evolve from relatively simple identity-related and information aggregation-related applications, to collaboratively-aware, and finally ubiquitous applications. It will then be possible for the Internet of Things to be fully integrated with Internet and telecommunications networks.
    Related Articles | Metrics
    Learning-Based Admission Control for Low-Earth-Orbit Satellite Communication Networks
    CHENG Lei, QIN Shuang, FENG Gang
    ZTE Communications    2023, 21 (3): 54-62.   DOI: 10.12142/ZTECOM.202303008
    Abstract75)   HTML14)    PDF (1188KB)(227)       Save

    Satellite communications has been regarded as an indispensable technology for future mobile networks to provide extremely high data rates, ultra-reliability, and ubiquitous coverage. However, the high dynamics caused by the fast movement of low-earth-orbit (LEO) satellites bring huge challenges in designing and optimizing satellite communication systems. Especially, admission control, deciding which users with diversified service requirements are allowed to access the network with limited resources, is of paramount importance to improve network resource utilization and meet the service quality requirements of users. In this paper, we propose a dynamic channel reservation strategy based on the Actor-Critic algorithm (AC-DCRS) to perform intelligent admission control in satellite networks. By carefully designing the long-term reward function and dynamically adjusting the reserved channel threshold, AC-DCRS reaches a long-run optimal access policy for both new calls and handover calls with different service priorities. Numerical results show that our proposed AC-DCRS outperforms traditional channel reservation strategies in terms of overall access failure probability, the average call success rate, and channel utilization under various dynamic traffic conditions.

    Table and Figures | Reference | Related Articles | Metrics
    Study on Security of 5G and Satellite Converged Communication Network
    YAN Xincheng, TENG Huiyun, PING Li, JIANG Zhihong, ZHOU Na
    ZTE Communications    2021, 19 (4): 79-89.   DOI: 10.12142/ZTECOM.202104009
    Abstract154)   HTML11)    PDF (1924KB)(222)       Save

    The 5G and satellite converged communication network (5G SCCN) is an important component of the integration of satellite-terrestrial networks, the national science, and technology major projects towards 2030. Security is the key to ensuring its operation, but at present, the research in this area has just started in our country. Based on the network characteristics and security risks, we propose the security architecture of the 5G SCCN and systematically sort out the key protection technologies and improvement directions. In particular, unique thinking on the security of lightweight data communication and design reference for the 5G SCCN network architecture is presented. It is expected to provide a piece of reference for the follow-up 5G SCCN security technology research, standard evolution, and industrialization.

    Table and Figures | Reference | Related Articles | Metrics
    Design of Raptor-Like Rate Compatible SC-LDPC Codes
    SHI Xiangyi, HAN Tongzhou, TIAN Hai, ZHAO Danfeng
    ZTE Communications    2022, 20 (S1): 16-21.   DOI: 10.12142/ZTECOM.2022S1003
    Abstract118)   HTML171)    PDF (1213KB)(105)       Save

    This paper proposes a family of raptor-like rate-compatible spatially coupled low-density parity-check (RL-RC-SC-LDPC) codes from RL-RC-LDPC block codes. There are two important keys. One is the performance of the base matrix. RL-LDPC codes have been adopted in the technical specification of 5G new radio (5G-NR). We use the 5G NR LDPC code as the base matrix. The other is the edge coupling design. In this regard, we have designed a rate-compatible coupling algorithm, which can improve performance under multiple code rates. The constructed RL-RC-SC-LDPC code property requires a large coupling length L and thus we improved the reciprocal channel approximation (RCA) algorithm and proposed a sliding window RCA algorithm. It can provide lower complexity and latency than RCA algorithm. The code family shows improved thresholds close to the Shannon limit and finite-length performance compared with 5G NR LDPC codes for the additive white Gaussian noise (AWGN) channel.

    Table and Figures | Reference | Related Articles | Metrics
    Smart City Development in China: One City One Policy
    Biyu Wan, Rong Ma, Weiru Zhou, Guoqiang Zhang
    ZTE Communications    2015, 13 (4): 40-44.   DOI: 10.3969/j.issn.1673-5188.2015.04.006
    Abstract133)      PDF (485KB)(123)       Save
    China is in a process of urbanization and is aiming at a type of people-centered urbanization. The main purpose of developing a “smart city”is to help this type urbanization and to serve the people of the city. From 2012 to 2015, China has chosen more than 300 cities or towns to be national pilot“smart cities.”These pilot smart cities are located in more than 30 provinces around China, which differ greatly in thousands ways. So we advocated“One City One Policy”. In 2012, MOHURD announced 90 cities as first batch of pilot smart cities. After three years, some pilot cities achieved great progress. This paper introduces five example cities (including town, district) as five different models of China’s smart city development. They are: Guilin city; Yunlong demonstration zone; Panyu District; Yangling Agricultural Hi-tech Industries Demonstration Zone; Lecong town. This paper also introduces our standardization work on smart city field at present.
    Related Articles | Metrics
    RIS-Assisted Federated Learning in Multi-Cell Wireless Networks
    WANG Yiji, WEN Dingzhu, MAO Yijie, SHI Yuanming
    ZTE Communications    2023, 21 (1): 25-37.   DOI: 10.12142/ZTECOM.202301004
    Abstract58)   HTML10)    PDF (1325KB)(106)       Save

    Over-the-air computation (AirComp) based federated learning (FL) has been a promising technique for distilling artificial intelligence (AI) at the network edge. However, the performance of AirComp-based FL is decided by the device with the lowest channel gain due to the signal alignment property. More importantly, most existing work focuses on a single-cell scenario, where inter-cell interference is ignored. To overcome these shortages, a reconfigurable intelligent surface (RIS)-assisted AirComp-based FL system is proposed for multi-cell networks, where a RIS is used for enhancing the poor user signal caused by channel fading, especially for the device at the cell edge, and reducing inter-cell interference. The convergence of FL in the proposed system is first analyzed and the optimality gap for FL is derived. To minimize the optimality gap, we formulate a joint uplink and downlink optimization problem. The formulated problem is then divided into two separable nonconvex subproblems. Following the successive convex approximation (SCA) method, we first approximate the nonconvex term to a linear form, and then alternately optimize the beamforming vector and phase-shift matrix for each cell. Simulation results demonstrate the advantages of deploying a RIS in multi-cell networks and our proposed system significantly improves the performance of FL.

    Table and Figures | Reference | Related Articles | Metrics
    Cooperative Intelligence for Autonomous Driving
    CHENG Xiang, DUAN Dongliang, YANG Liuqing, ZHENG Nanning
    ZTE Communications    2019, 17 (2): 44-50.   DOI: 10.12142/ZTECOM.201902007
    Abstract184)   HTML24)    PDF (983KB)(353)       Save

    Autonomous driving is an emerging technology attracting interests from various sectors in recent years. Most of existing work treats autonomous vehicles as isolated individuals and has focused on developing separate intelligent modules. In this paper, we attempt to exploit the connectivity among vehicles and propose a systematic framework to develop autonomous driving techniques. We first introduce a general hierarchical information fusion framework for cooperative sensing to obtain global situational awareness for vehicles. Following this, a cooperative intelligence framework is proposed for autonomous driving systems. This general framework can guide the development of data collection, sharing and processing strategies to realize different intelligent functions in autonomous driving.

    Table and Figures | Reference | Related Articles | Metrics
    A Hadoop Performance Prediction Model Based on Random Forest
    Zhendong Bei, Zhibin Yu, Huiling Zhang, Chengzhong Xu, Shenzhong Feng, Zhenjiang Dong, and Hengsheng Zhang
    ZTE Communications    2013, 11 (2): 38-44.   DOI: DOI:10.3969/j.issn.1673-5188.2013.02.006
    Abstract66)      PDF (455KB)(98)       Save
    MapReduce is a programming model for processing large data sets, and Hadoop is the most popular open-source implementation of MapReduce. To achieve high performance, up to 190 Hadoop configuration parameters must be manually tunned. This is not only time-consuming but also error-pron. In this paper, we propose a new performance model based on random forest, a recently developed machine-learning algorithm. The model, called RFMS, is used to predict the performance of a Hadoop system according to the system’s configuration parameters. RFMS is created from 2000 distinct fine-grained performance observations with different Hadoop configurations. We test RFMS against the measured performance of representative workloads from the Hadoop Micro-benchmark suite. The results show that the prediction accuracy of RFMS achieves 95% on average and up to 99%. This new, highly accurate prediction model can be used to automatically optimize the performance of Hadoop systems.
    Related Articles | Metrics
    Log Anomaly Detection Through GPT-2 for Large Scale Systems
    JI Yuhe, HAN Jing, ZHAO Yongxin, ZHANG Shenglin, GONG Zican
    ZTE Communications    2023, 21 (3): 70-76.   DOI: 10.12142/ZTECOM.202303010
    Abstract74)   HTML7)    PDF (537KB)(139)       Save

    As the scale of software systems expands, maintaining their stable operation has become an extraordinary challenge. System logs are semi-structured text generated by the recording function in the source code and have important research significance in software service anomaly detection. Existing log anomaly detection methods mainly focus on the statistical characteristics of logs, making it difficult to distinguish the semantic differences between normal and abnormal logs, and performing poorly on real-world industrial log data. In this paper, we propose an unsupervised framework for log anomaly detection based on generative pre-training-2 (GPT-2). We apply our approach to two industrial systems. The experimental results on two datasets show that our approach outperforms state-of-the-art approaches for log anomaly detection.

    Table and Figures | Reference | Related Articles | Metrics
    Special Topic on Near-Field Communication and Sensing Towards 6G
    WEI Guo, ZHAO Yajun, CHEN Li
    ZTE Communications    2024, 22 (1): 1-2.   DOI: 10.12142/ZTECOM.202401001
    Abstract36)   HTML8)    PDF (366KB)(23)       Save
    Reference | Related Articles | Metrics
    Impacts of Model Mismatch and Array Scale on Channel Estimation for XL-HRIS-Aided Systems
    LU Zhizheng, HAN Yu, JIN Shi
    ZTE Communications    2024, 22 (1): 24-33.   DOI: 10.12142/ZTECOM.202401004
    Abstract32)   HTML0)    PDF (1234KB)(23)       Save

    Extremely large-scale hybrid reconfigurable intelligence surface (XL-HRIS), an improved version of the RIS, can receive the incident signal and enhance communication performance. However, as the RIS size increases, the phase variations of the received signal across the whole array are nonnegligible in the near-field region, and the channel model mismatch, which will decrease the estimation accuracy, must be considered. In this paper, the lower bound (LB) of the estimated parameter is studied and the impacts of the distance and signal-to-noise ratio (SNR) on LB are then evaluated. Moreover, the impacts of the array scale on LB and spectral efficiency (SE) are also studied. Simulation results verify that even in extremely large-scale array systems with infinite SNR, channel model mismatch can still limit estimation accuracy. However, this impact decreases with increasing distance.

    Table and Figures | Reference | Related Articles | Metrics
    A Network Traffic Prediction Method Based on LSTM
    WANG Shihao, ZHUO Qinzheng, YAN Han, LI Qianmu, QI Yong
    ZTE Communications    2019, 17 (2): 19-25.   DOI: 10.12142/ZTECOM.201902004
    Abstract291)   HTML94)    PDF (1526KB)(224)       Save

    As the network sizes continue to increase, network traffic grows exponentially. In this situation, how to accurately predict network traffic to serve customers better has become one of the issues that Internet service providers care most about. Current traditional network models cannot predict network traffic that behaves as a nonlinear system. In this paper, a long short-term memory (LSTM) neural network model is proposed to predict network traffic that behaves as a nonlinear system. According to characteristics of autocorrelation, an autocorrelation coefficient is added to the model to improve the accuracy of the prediction model. Several experiments were conducted using real-world data, showing the effectiveness of LSTM model and the improved accuracy with autocorrelation considered. The experimental results show that the proposed model is efficient and suitable for real-world network traffic prediction.

    Table and Figures | Reference | Related Articles | Metrics
    Reliability of NFV Using COTS Hardware
    Li Mo
    ZTE Communications    2014, 12 (3): 53-61.   DOI: DOI:10.3939/j.issn.1673-5188.2014.03.007
    Abstract64)      PDF (471KB)(90)       Save
    This paper describes a study on the feasibility of using commercial off -the -shelf (COTS) hardware for telecom equipment. The study outlines the conditions under which COTS hardware can be utilized in a network function virtualization environment. The concept of silent -error probability is introduced to account for software errors and/or undetectable hardware failures, and is included in both the theoretical work and simulations. Silent failures are critical to overall system availability. Site -related issues are created by combined site maintenance and site failure. Site maintenance does not noticeably limit system availability unless there are also site failures. Because the theory becomes extremely involved when site failure is introduced, simulation is used to determine the impact of those facts that constitutes the undesirable features of using COTS hardware.
    Related Articles | Metrics
    RIS-Assisted Cell-Free MIMO: A Survey
    ZHAO Yaqiong, KE Hongqin, XU Wei, YE Xinquan, CHEN Yijian
    ZTE Communications    2024, 22 (1): 77-86.   DOI: 10.12142/ZTECOM.202401009
    Abstract39)   HTML2)    PDF (1473KB)(22)       Save

    Cell-free (CF) multiple-input multiple-output (MIMO) is a promising technique to enable the vision of ubiquitous wireless connectivity for next-generation network communications. Compared to traditional co-located massive MIMO, CF MIMO allows geographically distributed access points (APs) to serve all users on the same time-frequency resource with spatial multiplexing techniques, resulting in better performance in terms of both spectral efficiency and coverage enhancement. However, the performance gain is achieved at the expense of deploying more APs with high cost and power consumption. To address this issue, the recently proposed reconfigurable intelligent surface (RIS) technique stands out with its unique advantages of low cost, low energy consumption and programmability. In this paper, we provide an overview of RIS-assisted CF MIMO and its interaction with advanced optimization designs and novel applications. Particularly, recent studies on typical performance metrics such as energy efficiency (EE) and spectral efficiency (SE) are surveyed. Besides, the application of RIS-assisted CF MIMO techniques in various future communication systems is also envisioned. Additionally, we briefly discuss the technical challenges and open problems for this area to inspire research direction and fully exploit its potential in meeting the demands of future wireless communication systems.

    Table and Figures | Reference | Related Articles | Metrics
    Password Pattern and Vulnerability Analysis for Web and Mobile Applications
    LI Shancang, Imed Romdhani, William Buchanan
    ZTE Communications    2016, 14 (S0): 32-36.   DOI: 10.3969/j.issn.1673-5188.2016.S0.006
    Abstract134)      PDF (320KB)(144)       Save
    Text-based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Shannon entropy, Guessing entropy and Minimum entropy. We show how to substantially improve upon the strength of passwords based on the analysis of text-password entropies. By analyzing the passwords datasets of Rockyou and 163.com, we believe strong password can be designed based on good usability, deployability, rememberbility, and security entropies.
    Related Articles | Metrics
    Quality-of-Experience in Human-in-the-Loop Haptic Communications
    LIU Qian, ZHAO Tiesong
    ZTE Communications    2019, 17 (1): 48-55.   DOI: 10.12142/ZTECOM.201901008
    Abstract131)   HTML41)    PDF (1167KB)(231)       Save

    With the worldwide rapid development of 5G networks, haptic communications, a key use case of the 5G, has attracted increasing attentions nowadays. Its human-in-the-loop nature makes quality of experience (QoE) the leading performance indicator of the system design. A vast number of high quality works were published on user-level, application-level and network-level QoE-oriented designs in haptic communications. In this paper, we present an overview of the recent research activities in this progressive research area. We start from the QoE modeling of human haptic perceptions, followed by the application-level QoE management mechanisms based on these QoE models. High fidelity haptic communications require an orchestra of QoE designs in the application level and the quality of service (QoS) support in the network level. Hence, we also review the state-of-the-art QoS-related QoE management strategies in haptic communications, especially the QoS-related QoE modeling which guides the resource allocation design of the communication network. In addition to a thorough survey of the literature, we also present the open challenges in this research area. We believe that our review and findings in this paper not only provide a timely summary of prevailing research in this area, but also help to inspire new QoE-related research opportunities in haptic communications.

    Table and Figures | Reference | Related Articles | Metrics
    A Survey of Intelligent Sensing Technologies in Autonomous Driving
    SHAO Hong, XIE Daxiong, HUANG Yihua
    ZTE Communications    2021, 19 (3): 56-63.   DOI: 10.12142/ZTECOM.202103007
    Abstract56)   HTML5)    PDF (1820KB)(100)       Save

    Intelligent perception technology of sensors in autonomous vehicles has been deeply integrated with the algorithm of autonomous driving. This paper provides a survey of the impact of sensing technologies on autonomous driving, including the intelligent perception reshaping the car architecture from distributed to centralized processing and the common perception algorithms being explored in autonomous driving vehicles, such as visual perception, 3D perception and sensor fusion. The pure visual sensing solutions have shown the powerful capabilities in 3D perception leveraging the latest self-supervised learning progress, compared with light detection and ranging (LiDAR)-based solutions. Moreover, we discuss the trends on end-to-end policy decision models of high-level autonomous driving technologies.

    Table and Figures | Reference | Related Articles | Metrics
    Open Source Initiatives for Big Data Governance and Security: A Survey
    HU Baiqing, WANG Wenjie, Chi Harold Liu
    ZTE Communications    2018, 16 (2): 55-66.   DOI: 10.3969/j.issn.1673-5188.2018.02.009
    Abstract171)   HTML33)    PDF (399KB)(190)       Save

    With the rapid development of Internet technology, the volume of data has increased exponentially. As the large amounts of data are no longer easy to be managed and secured by the owners, big data security and privacy has become a hot issue. One of the most popular research fields for solving the data security and data privacy is within the scope of big data governance and security. In this paper, we introduce the basic concepts of data governance and security. Then, all the state-of-the-art open source frameworks for data governance and security, including Apache Falcon, Apache Atlas, Apache Ranger, Apache Sentry and Kerberos, are detailed and discussed with descriptions of their implementation principles and possible applications.

    Table and Figures | Reference | Related Articles | Metrics
    DDoS Attack Detection Method for Space-Based Network Based on SDN Architecture
    JIA Min, SHU Yuejie, GUO Qing, GAO Zihe, XIE Suofei
    ZTE Communications    2020, 18 (4): 18-25.   DOI: 10.12142/ZTECOM.202004004
    Abstract132)   HTML129)    PDF (1428KB)(174)       Save

    With the development of satellite communications, the number of satellite nodes is constantly increasing, which undoubtedly increases the difficulty of maintaining network security. Combining software defined network (SDN) with traditional space-based networks provides a new class of ideas for solving this problem. However, because of the highly centralized network management of the SDN controller, once the SDN controller is destroyed by network attacks, the network it manages will be paralyzed due to loss of control. One of the main security threats to SDN controllers is Distributed Denial of Service (DDoS) attacks, so how to detect DDoS attacks scientifically has become a hot topic among SDN security management. This paper proposes a DDoS attack detection method for space-based networks based on SDN architecture. This attack detection method combines the optimized Long Short-Term Memory (LSTM) deep learning model and Support Vector Machine (SVM), which can not only make classification judgments on the time series, but also achieve the purpose of detecting and judging through the flow characteristics of a period of time. In addition, it can reduce the detection time as well as the system burden.

    Table and Figures | Reference | Related Articles | Metrics
    Adaptive Retransmission Design for Wireless Federated Edge Learning
    XU Xinyi, LIU Shengli, YU Guanding
    ZTE Communications    2023, 21 (1): 3-14.   DOI: 10.12142/ZTECOM.202301002
    Abstract51)   HTML6)    PDF (1432KB)(125)       Save

    As a popular distributed machine learning framework, wireless federated edge learning (FEEL) can keep original data local, while uploading model training updates to protect privacy and prevent data silos. However, since wireless channels are usually unreliable, there is no guarantee that the model updates uploaded by local devices are correct, thus greatly degrading the performance of the wireless FEEL. Conventional retransmission schemes designed for wireless systems generally aim to maximize the system throughput or minimize the packet error rate, which is not suitable for the FEEL system. A novel retransmission scheme is proposed for the FEEL system to make a tradeoff between model training accuracy and retransmission latency. In the proposed scheme, a retransmission device selection criterion is first designed based on the channel condition, the number of local data, and the importance of model updates. In addition, we design the air interface signaling under this retransmission scheme to facilitate the implementation of the proposed scheme in practical scenarios. Finally, the effectiveness of the proposed retransmission scheme is validated through simulation experiments.

    Table and Figures | Reference | Related Articles | Metrics
    Recent Advances and Challenges in Video Quality Assessment
    LI Dingquan, JIANG Tingting, JIANG Ming
    ZTE Communications    2019, 17 (1): 3-11.   DOI: 10.12142/ZTECOM.201901002
    Abstract178)   HTML175)    PDF (1305KB)(212)       Save

    Video quality assessment (VQA) plays a vital role in the field of video processing, including areas of video acquisition, video filtering in retrieval, video compression, video restoration, and video enhancement. Since VQA has gained much attention in recent years, this paper gives an up-to-date review of VQA research and highlights current challenges in this filed. The subjective study and common VQA databases are first reviewed. Then, a survey on the objective VQA methods, including full-reference, reduced-reference, and no-reference VQA, is reported. Last but most importantly, the key limitations of current research and several challenges in the field of VQA are discussed, which include the impact of video content, memory effects, computational efficiency, personalized video quality prediction, and quality assessment of newly emerged videos.

    Table and Figures | Reference | Related Articles | Metrics
    Time Sensitive Networking Technology Overview and Performance Analysis
    FU Shousai, ZHANG Hesheng, CHEN Jinghe
    ZTE Communications    2018, 16 (4): 57-64.   DOI: 10.19729/j.cnki.1673-5188.2018.04.009
    Abstract124)   HTML7)    PDF (519KB)(217)       Save

    Time sensitive networking (TSN) is a set of standards developed on the basis of audio video bridging (AVB). It has a promising future in the Industrial Internet of Things and vehicle-mounted multimedia, with such advantages as high bandwidth, interoperability and low cost. In this paper, the TSN protocol stack is described and key technologies of network operation are summarized, including time synchronization, scheduling and flow shaping, flow management and fault tolerant mechanism. The TSN network model is then established. Its performance is illustrated to show how the frame priority works and also show the influence of IEEE802.1Qbv time-aware shaper and IEEE802.1Qbu frame preemption on network and time-sensitive data. Finally, we briefly discuss the challenges faced by TSN and the focus of future research.

    Table and Figures | Reference | Related Articles | Metrics
    Message Passing Based Detection for Orthogonal Time Frequency Space Modulation
    YUAN Zhengdao, LIU Fei, GUO Qinghua, WANG Zhongyong
    ZTE Communications    2021, 19 (4): 34-44.   DOI: 10.12142/ZTECOM.202104004
    Abstract227)   HTML7)    PDF (2103KB)(241)       Save

    The orthogonal time frequency space (OTFS) modulation has emerged as a promising modulation scheme for wireless communications in high-mobility scenarios. An efficient detector is of paramount importance to harvesting the time and frequency diversities promised by OTFS. Recently, some message passing based detectors have been developed by exploiting the features of the OTFS channel matrices. In this paper, we provide an overview of some recent message passing based OTFS detectors, compare their performance, and shed some light on potential research on the design of message passing based OTFS receivers.

    Table and Figures | Reference | Related Articles | Metrics