期刊
  出版年
  关键词
结果中检索 Open Search
Please wait a minute...
选择: 显示/隐藏图片
1. Towards Near-Field Communications for 6G: Challenges and Opportunities
LIU Mengyu, ZHANG Yang, JIN Yasheng, ZHI Kangda, PAN Cunhua
ZTE Communications    2024, 22 (1): 3-15.   DOI: 10.12142/ZTECOM.202401002
摘要133)   HTML13)    PDF (2702KB)(358)    收藏

Extremely large-scale multiple-input multiple-output (XL-MIMO) and terahertz (THz) communications are pivotal candidate technologies for supporting the development of 6G mobile networks. However, these techniques invalidate the common assumptions of far-field plane waves and introduce many new properties. To accurately understand the performance of these new techniques, spherical wave modeling of near-field communications needs to be applied for future research. Hence, the investigation of near-field communication holds significant importance for the advancement of 6G, which brings many new and open research challenges in contrast to conventional far-field communication. In this paper, we first formulate a general model of the near-field channel and discuss the influence of spatial nonstationary properties on the near-field channel modeling. Subsequently, we discuss the challenges encountered in the near field in terms of beam training, localization, and transmission scheme design, respectively. Finally, we point out some promising research directions for near-field communications.

图表 | 参考文献 | 相关文章 | 多维度评价
2. Point Cloud Processing Methods for 3D Point Cloud Detection Tasks
WANG Chongchong, LI Yao, WANG Beibei, CAO Hong, ZHANG Yanyong
ZTE Communications    2023, 21 (4): 38-46.   DOI: 10.12142/ZTECOM.202304005
摘要28)   HTML5)    PDF (787KB)(64)    收藏

Light detection and ranging (LiDAR) sensors play a vital role in acquiring 3D point cloud data and extracting valuable information about objects for tasks such as autonomous driving, robotics, and virtual reality (VR). However, the sparse and disordered nature of the 3D point cloud poses significant challenges to feature extraction. Overcoming limitations is critical for 3D point cloud processing. 3D point cloud object detection is a very challenging and crucial task, in which point cloud processing and feature extraction methods play a crucial role and have a significant impact on subsequent object detection performance. In this overview of outstanding work in object detection from the 3D point cloud, we specifically focus on summarizing methods employed in 3D point cloud processing. We introduce the way point clouds are processed in classical 3D object detection algorithms, and their improvements to solve the problems existing in point cloud processing. Different voxelization methods and point cloud sampling strategies will influence the extracted features, thereby impacting the final detection performance.

图表 | 参考文献 | 相关文章 | 多维度评价
3. End-to-End Chinese Entity Recognition Based on BERT-BiLSTM-ATT-CRF
LI Daiyi, TU Yaofeng, ZHOU Xiangsheng, ZHANG Yangming, MA Zongmin
ZTE Communications    2022, 20 (S1): 27-35.   DOI: 10.12142/ZTECOM.2022S1005
摘要239)   HTML14)    PDF (436KB)(297)    收藏

Traditional named entity recognition methods need professional domain knowledge and a large amount of human participation to extract features, as well as the Chinese named entity recognition method based on a neural network model, which brings the problem that vector representation is too singular in the process of character vector representation. To solve the above problem, we propose a Chinese named entity recognition method based on the BERT-BiLSTM-ATT-CRF model. Firstly, we use the bidirectional encoder representations from transformers (BERT) pre-training language model to obtain the semantic vector of the word according to the context information of the word; Secondly, the word vectors trained by BERT are input into the bidirectional long-term and short-term memory network embedded with attention mechanism (BiLSTM-ATT) to capture the most important semantic information in the sentence; Finally, the conditional random field (CRF) is used to learn the dependence between adjacent tags to obtain the global optimal sentence level tag sequence. The experimental results show that the proposed model achieves state-of-the-art performance on both Microsoft Research Asia (MSRA) corpus and people’s daily corpus, with F1 values of 94.77% and 95.97% respectively.

图表 | 参考文献 | 相关文章 | 多维度评价
4. Secure Beamforming Design for SWIPT in MISO Full-Duplex Systems
Alexander A. Okandeji, Muhammad R. A. Khandaker, WONG Kai-Kit, ZHANG Yangyang, ZHENG Zhongbin
ZTE Communications    2018, 16 (1): 38-46.   DOI: 10.3969/j.issn.1673-5188.2018.01.006
摘要87)   HTML2)    PDF (514KB)(81)    收藏

This paper investigates the problem of bi-directional secure information exchange for a multiple-input single-output (MISO) broadcast channel in presence of potential and external eavesdroppers capable of decoding the confidential messages. Specifically, a multi-antenna base station (BS) simultaneously sends wireless information and power to a set of dual-antenna mobile stations (MSs) using power splitters (PSs) in the downlink and receives information in the uplink in full-duplex (FD) mode. We address the joint design of the receiver PS ratio and the transmit power at the MSs, the artificial noise covariance, and the beamforming matrix at the BS in order to guarantee the individual secrecy rate and energy harvesting constraints at each receiver, and the signal-to-interference plus noise ratio (SINR) at the BS and MSs. Using semidefinite relaxation (SDR) technique, we obtain solution to the problem with imperfect channel state information (CSI) of the self-interfering channels. Simulation results are presented to demonstrate the performance of our proposed scheme.

图表 | 参考文献 | 相关文章 | 多维度评价
5. MAC Protocols for Distributed Cooperative Communication Networks
Sheng Min, Zhang Yan, Li Jiandong
ZTE Communications    2010, 8 (2): 33-36.  
摘要90)      PDF (418KB)(125)    收藏
Distributed cooperative networks use the cooperation among nodes to fulfill network resource sharing. However, designing an efficient Media Access Control (MAC) protocol is a key issue for the distributed cooperative network. Based on the principle of MAC-layer cooperation, this paper discusses problems and challenges for MAC protocol design in the distributed cooperative network. Through the analysis of typical cooperative MAC protocols and their performance, this paper concludes that only a reasonable MAC protocol design with the features and demands of distributed networks taken into account can make cooperative communication technology a better application in the distributed network.
相关文章 | 多维度评价
6. Study of Relay Node Selection Techniques for Cooperative Communication Networks
Zhang Yan, Sheng Min, Li Jiandong
ZTE Communications    2010, 8 (1): 26-30.  
摘要91)      PDF (550KB)(144)    收藏
Emerging as a new communication paradigm, cooperative communication is attracting attention. Relay selection is the key technology for cooperative communication, and determines whether the performance gain of cooperation can be achieved. In this paper, we first give the performance evaluation metrics for relay selection algorithms, and then discuss the corresponding categories. Finally, some classical relay selection algorithms are analyzed. Results show that the relay node should be seriously selected and configured according to system requirements in order to optimize the performance of cooperative communication.
相关文章 | 多维度评价
7. Mobile Internet Application Infrastructure: An Open Garden
Yang Zhiqiang , Zhang Yan
ZTE Communications    2009, 7 (4): 1-5.  
摘要100)      PDF (551KB)(127)    收藏
Based on good mobile Internet application infrastructure, the user access layer can provide users with quick and easy access to mobile Internet applications; the service provisioning layer can improve both access rate and Quality of Service (QoS ), enforce the control of content resources, and reduce the cost for content storage as well as management overhead; and the service layer can reduce service development requirements and operation and maintenance cost, making it easier to launch services. This paper suggests that the Chinese Government should, based on the existing networks, make strategic efforts to push research work and industrialization process of the mobile Internet application infrastructure.
相关文章 | 多维度评价