News

Most Read

Published in last 1 year |  In last 2 years |  In last 3 years |  All
Please wait a minute...
For Selected: Toggle Thumbnails
Black-box membership inference attacks based on shadow model
Han Zhen, Zhou Wen'an, Han Xiaoxuan, Wu Jie
The Journal of China Universities of Posts and Telecommunications    2024, 31 (4): 1-16.   DOI: 10.19682/j.cnki.1005-8885.2024.1016
Abstract495)      PDF(pc) (3603KB)(177)       Save
Membership inference attacks on machine learning models have drawn significant attention. While current  research primarily utilizes shadow modeling techniques, which require knowledge of the target model and training  data, practical scenarios involve black-box access to the target model with no available information. Limited  training data further complicate the implementation of these attacks. In this paper, we experimentally compare  common data enhancement schemes and propose a data synthesis framework based on the variational autoencoder  generative adversarial network (VAE-GAN) to extend the training data for shadow models. Meanwhile, this paper  proposes a shadow model training algorithm based on adversarial training to improve the shadow model's ability to  mimic the predicted behavior of the target model when the target model's information is unknown. By conducting  attack experiments on different models under the black-box access setting, this paper verifies the effectiveness of the  VAE-GAN-based data synthesis framework for improving the accuracy of membership inference attack.  Furthermore, we verify that the shadow model, trained by using the adversarial training approach, effectively  improves the degree of mimicking the predicted behavior of the target model. Compared with existing research  methods, the method proposed in this paper achieves a 2% improvement in attack accuracy and delivers better  attack performance.
Reference | Related Articles | Metrics
Artificial rabbit optimization algorithm based on chaotic mapping and Levy flight improvement
The Journal of China Universities of Posts and Telecommunications    2024, 31 (4): 54-69.   DOI: 10.19682/j.cnki.1005-8885.2024.1010
Abstract351)      PDF(pc) (2941KB)(41)       Save
An artificial rabbit optimization algorithm based on chaotic mapping and Levy flight improvement is proposed, which has the advantages of good initial population quality and fast convergence compared with the traditional artificial rabbit optimization algorithm, called CLARO. CLARO’s improvement method starts from three aspects: to optimize the quality of the initial population of the algorithm a chaotic mapping is brought in to initialize the population; to avoid the algorithm from falling into local optimum Levy flight is added in the exploration phase and the threshold of energy factor A is optimized to better balance exploration and exploitation. The efficiency of CLARO is tested on a set of 23 benchmark function sets by comparing it with ARO and different meta-heuristics algorithms. At last, the comparison experiments conclude that all three improvement strategies enhance the performance of ARO to some extent, with Levy flight providing the most significant improvement in ARO performance. The experimental results showed that CLARO has better results and faster convergence compared to other algorithms, while successfully addressing the drawbacks of ARO and being able to face more challenging problems.
Reference | Related Articles | Metrics
Personalized trajectory data perturbation algorithm based on quadtree indexing
The Journal of China Universities of Posts and Telecommunications    2024, 31 (4): 17-27.   DOI: 10.19682/j.cnki.1005-8885.2024.1014
Abstract337)      PDF(pc) (1357KB)(52)       Save
To solve the privacy leakage problem of truck trajectories in intelligent logistics, this paper proposes a Quadtree-based Personalized Joint location Perturbation (QPJLP) algorithm using location generalization and local differential privacy techniques. Firstly, a flexible position encoding mechanism based on the spatial quadtree indexing is designed, and the length of the encoding can be adjusted freely according to data availability. Secondly, to meet the privacy needs of different locations of users, location categories are introduced to classify locations as sensitive and ordinary locations. Finally, the truck invokes the corresponding mechanism in the QPJLP algorithm to locally perturb the code according to the location category, allowing the protection of non-sensitive locations to be reduced without weakening the protection of sensitive locations, thereby improving data availability. Simulation experiments demonstrate that the proposed algorithm effectively meets the personalized trajectory privacy requirements while also exhibiting good performance in trajectory proportion estimation and Top-K classification.
Reference | Related Articles | Metrics
Improving Link Prediction Models through a Performance Enhancement Scheme: A Study on Semi-Supervised Learning and Model Soup
The Journal of China Universities of Posts and Telecommunications    2024, 31 (4): 43-53.   DOI: 10.19682/j.cnki.1005-8885.2024.1015
Abstract314)      PDF(pc) (2574KB)(72)       Save
As a fact, most constructed knowledge graphs are far from complete no matter its size. This incompleteness will cause negative influence on the applications based on knowledge graphs. As an important method for knowledge graph complementation, link prediction has become a hot research topic in recent years. In this paper, a performance enhancement scheme for link prediction models based on the idea of semi-supervised learning and model soup is proposed, which effectively improves the model performance on several mainstream link prediction models with small changes to their architecture. This novel scheme consists of two main parts: (1) predicting potential fact triples in the graph with semi-supervised learning strategies, (2) creativily combining semi-supervised learning and model soup to further improve the final model performance without adding significant computational overhead. We experimentally validate the effectiveness of the scheme for a variety of link prediction models, especially on the dataset with dense relationships. In terms of CompGCN, the model with the best overall performance among the tested models improves its Hits@1 metric by 14.7% on the FB15K-237 dataset and 7.8% on the WN18RR dataset after using the enhancement scheme. Meanwhile, we observe that the semi-supervised learning strategy in the augmentation scheme has significant improvement for multi-class link prediction models, and the performance improvement brought by the introduction of the model soup is related to the specific tested models, because performance of some models are improved while others remained largely unaffected.
Reference | Related Articles | Metrics
Dynamic coverage of mobile multi-target in sensor networks based on virtual force
The Journal of China Universities of Posts and Telecommunications    2024, 31 (4): 83-94.   DOI: 10.19682/j.cnki.1005-8885.2024.1006
Abstract308)      PDF(pc) (3233KB)(53)       Save
A new procedure of distributed self-control coverage for monitoring the dynamic targets with mobile sensor network is proposed. A special model is given for maintaining the nodes bi-connectivity and optimizing the coverage of the moving targets. The model consists of two parts, the virtual force model is proposed for motion control and the whale optimization algorithm is improved to further optimize the node positions and to reach the steady state quickly. The virtual resultant force stretches the network toward the uncovered targets by its multi-target attractive force, and maintains the network connectivity by its attractive force while network stretching, and avoids node collisions by its repulsive force while nodes moving. The operating mechanism of multi-target attractive force and other forces is also profoundly anatomized. The adjustment criteria for the model in different application scenarios are also given. Finally, the comparisons are shown to be significant advantages over other similar kinds.
Reference | Related Articles | Metrics
Power and Rate Adaption in Wireless Communication Systems with Energy Harvesting–Based on Soft Decision Decoding
The Journal of China Universities of Posts and Telecommunications    2024, 31 (4): 70-82.   DOI: 10.19682/j.cnki.1005-8885.2024.1017
Abstract302)      PDF(pc) (2041KB)(62)       Save
In this paper, the online power control and rate adaptation for a wireless communication system with energy harvesting are investigated, in which soft decision decoding is adopted by the receiver. To efficiently utilize the harvested energy and maximize the average actual information transmission rate, transmit power, modulation order and code rate are jointly optimized. The Lyapunov framework is utilized to transform the long-term optimization problem into an optimization problem per time slot. Since there is no theoretical formula for the error rate of soft decision decoding, the optimization problem cannot be analytically solved. A table to find the optimal modulation order and code rate under the different values of signal-to-noise ratio is built first, and then a numeric algorithm to find the solution to the optimization problem is given. The feasibility and performance of the proposed algorithm are demonstrated by simulation. The simulation results show that compared with the algorithms to maximize the theoretic channel capacity, the proposed algorithm can achieve a higher actual transmission rate.
Reference | Related Articles | Metrics
Recognition of LPI radar signal based on dual efficient network
The Journal of China Universities of Posts and Telecommunications    2024, 31 (5): 12-22.   DOI: 10.19682/j.cnki.1005-8885.2024.0022
Abstract250)      PDF(pc) (4131KB)(61)    PDF(mobile) (4131KB)(11)    Save
Addressing the issue of low pulse identification rates for low probability of intercept ( LPI) radar signals under low signal-to-noise ratio ( SNR) conditions, this paper aims to investigate a new method in the field of deep learning to recognize modulation types of LPI radar signals efficiently. A novel algorithm combining dual efficient network ( DEN) and non-local means ( NLM) denoising was proposed for the identification and selection of LPI radar signals. Time-domain signals for 12 radar modulation types were simulated, adding Gaussian white noise at various SNRs to replicate complex electronic countermeasure scenarios. On this basis, the noisy radar signals undergo Choi-Williams distribution ( CWD ) time-frequency transformation, converting the signals into two- dimensional (2D) time-frequency images ( TFIs). The TFIs are then denoised using the NLM algorithm. Finally, the denoised data is fed into the designed DEN for training and testing, with the selection results output through a softmax classifier. Simulation results demonstrate that at an SNR of - 8 dB, the algorithm can achieve a recognition accuracy of 97.22% for LPI radar signals, exhibiting excellent performance under low SNR conditions. Comparative demonstrations prove that the DEN has good robustness and generalization performance under conditions of small sample sizes. This research provides a novel and effective solution for further improving the accuracy of identification and selection of LPI radar signals.
Reference | Related Articles | Metrics
LRChain: Data protection and sharing method of learning archives based on consortium blockchain
The Journal of China Universities of Posts and Telecommunications    2024, 31 (4): 28-42.   DOI: 10.19682/j.cnki.1005-8885.2024.1018
Abstract221)      PDF(pc) (4069KB)(49)       Save
Learning archives management in traditional systems faces challenges such as inadequate security, weak tamper resistance, and limited sharing capabilities. To address these issues, this paper proposes LRChain, a method based on consortium blockchain, for lifelong learning archives data protection and sharing. LRChain employs a combination of on-chain and off-chain cooperative storage using a consortium chain and InterPlanetary File System (IPFS) to enhance data security and availability. It also enables fine-grained verification of learning archives through selective disclosure principles, ensuring privacy protection of sensitive data. Furthermore, an attribute-based encryption algorithm is utilized to establish authorized access control for learning archives, facilitating safe and trusted sharing. Experimental evaluations and security analyses demonstrate that this method exhibits decentralization, strong security, tamper resistance, and performs well, effectively meeting the requirements for secure sharing of learning archive data.
Reference | Related Articles | Metrics
Bidirectional position attention lightweight network for massive MIMO CSI feedback
The Journal of China Universities of Posts and Telecommunications    2024, 31 (5): 1-11.   DOI: 10.19682/j.cnki.1005-8885.2024.0018
Abstract216)      PDF(pc) (1411KB)(101)    PDF(mobile) (1411KB)(19)    Save
In frequency division duplex ( FDD) massive multiple-input multiple-output ( MIMO) systems, a bidirectional positional attention network ( BPANet) was proposed to address the high computational complexity and low accuracy of existing deep learning-based channel state information ( CSI) feedback methods. Specifically, a bidirectional position attention module ( BPAM) was designed in the BPANet to improve the network performance. The BPAM captures the distribution characteristics of the CSI matrix by integrating channel and spatial dimension information, thereby enhancing the feature representation of the CSI matrix. Furthermore, channel attention is decomposed into two one-dimensional (1D) feature encoding processes effectively reducing computational costs. Simulation results demonstrate that, compared with the existing representative method complex input lightweight neural network ( CLNet), BPANet reduces computational complexity by an average of 19. 4% and improves accuracy by an average of 7. 1% . Additionally, it performs better in terms of running time delay and cosine similarity.
Reference | Related Articles | Metrics
Fast Fourier transform convolutional neural network accelerator based on overlap addition
The Journal of China Universities of Posts and Telecommunications    2024, 31 (5): 71-84.   DOI: 10.19682/j.cnki.1005-8885.2024.0015
Abstract208)      PDF(pc) (2872KB)(69)    PDF(mobile) (2872KB)(7)    Save
In convolutional neural networks ( CNNs), the floating-point computation in the traditional convolutional layer is enormous, and the execution speed of the network is limited by intensive computing, which makes it challenging to meet the real-time response requirements of complex applications. This work is based on the principle that the time domain convolution result equals the frequency domain point multiplication result to reduce the amount of floating- point calculations for convolution. The input feature map and the convolution kernel are converted to the frequency domain by the fast Fourier transform( FFT), and the corresponding point multiplication is performed. Then the frequency domain result is converted back to the time domain, and the output result of the convolution is obtained. In the shared CNN, the input feature map is much larger than the convolution kernel, resulting in many invalid operations. The overlap addition method is proposed to reduce invalid calculations and speed up network execution better. This work designs a hardware accelerator for frequency domain convolution and verifies its efficiency on the Xilinx Zynq UltraScale + MPSoC ZCU102 board. Comparing the calculation time of visual geometry group 16 ( VGG16 ) under the ImageNet dataset faster than the traditional time domain convolution, the hardware acceleration of frequency domain convolution is 8. 5 times.
Reference | Related Articles | Metrics
Design of graph computing accelerator based on reconfigurable PE array
The Journal of China Universities of Posts and Telecommunications    2024, 31 (5): 49-63.   DOI: 10.19682/j.cnki.1005-8885.2024.0013
Abstract180)      PDF(pc) (6157KB)(45)    PDF(mobile) (6157KB)(6)    Save
Due to the diversity of graph computing applications, the power-law distribution of graph data, and the high compute-to-memory ratio, traditional architectures face significant challenges regarding poor flexibility, imbalanced workload distribution, and inefficient memory access when executing graph computing tasks. Graph computing accelerator, GraphApp, based on a reconfigurable processing element ( PE) array was proposed to address the challenges above. GraphApp utilizes 16 reconfigurable PEs for parallel computation and employs tiled data. By reasonably dividing the data into tiles, load balancing is achieved and the overall efficiency of parallel computation is enhanced. Additionally, it preprocesses graph data using the compressed sparse columns independently ( CSCI) data compression format to alleviate the issue of low memory access efficiency caused by the high memory access-to-computation ratio. Lastly, GraphApp is evaluated using triangle counting ( TC) and depth-first search ( DFS) algorithms. Performance analysis is conducted by measuring the execution time of these algorithms in GraphApp against existing typical graph frameworks, Ligra, and GraphBIG, using six datasets from the Stanford Network Analysis Project ( SNAP) database. The results show that GraphApp achieves a maximum performance improvement of 30.86 % compared to Ligra and 20.43 % compared to GraphBIG when processing the same datasets.
Reference | Related Articles | Metrics
Naive-LSTM enabled service identification of edge computing in  power Internet of things
The Journal of China Universities of Posts and Telecommunications    2024, 31 (5): 34-41.   DOI: 10.19682/j.cnki.1005-8885.2024.0016
Abstract178)      PDF(pc) (1101KB)(31)    PDF(mobile) (1101KB)(14)    Save

Great challenges and demands are presented by increasing edge computing services for current power Internet of things ( Power IoT) to deal with the serious diversity and complexity of these services. To improve the matching degree between edge computing and complex services, the service identification function is necessary for Power IoT. In this paper, a naive long short-term memory ( Naive-LSTM ) based service identification scheme of edge computing devices in the Power IoT was proposed, where the Naive-LSTM model makes full use of the most simplified structure and conducts discretization of the long short-term memory ( LSTM) model. Moreover, the Naive-LSTM based service identification scheme can generate the probability output result to determine the task schedule policy of Power IoT. After well learning operation, these Naive-LSTM classification engine modules in edge computing devices of Power IoT can perform service identification, by obtaining key characteristics from various service traffics. Testing results show that the Naive-LSTM based services identification scheme is feasible and efficient in improving the edge computing ability of the Power IoT.

Reference | Related Articles | Metrics
Low-complexity channel estimation for wideband mmWave massive MIMO systems with uniform planar arrays
王昊天 刘立洲 邱玲 张磊
The Journal of China Universities of Posts and Telecommunications    2025, 32 (1): 1-10.   DOI: 10.19682/j.cnki.1005-8885.2025.0005
Abstract149)      PDF(pc) (1465KB)(84)       Save

Millimeter-wave ( mmWave) and massive multiple-input multiple-output ( MIMO) are broadly recognized as key enabling technologies for the fifth generation (5G) communication systems. In this paper, a low-complexity angle- delay parameters estimation ( ADPE) algorithm was put forward for wideband mmWave systems with uniform planar arrays ( UPAs). In particular, the ADPE algorithm effectively decouples the angle-delay parameters and converts the angle-delay estimation problem into three independent subproblems. Accordingly, the ability to devise an off- grid method based on discrete Fourier transform ( DFT) with a closed-form solution for angle-delay estimation and potential path number acquisition can be realized. In actuality, only a limited number of potential paths are close to the true paths influenced by noise. Consequently, the removal of noise paths to acquire the corresponding true path gains through a sparsity adaptive path gains estimation ( APGE) algorithm is postulated. Finally, the simulation results substantiate the effectiveness of ADPE and APGE algorithms.

Reference | Related Articles | Metrics
Broadband low noise amplifier design based on self-bias
Xiao-Feng YANG Ping-Yan DONG
The Journal of China Universities of Posts and Telecommunications    2024, 31 (5): 64-70.   DOI: 10.19682/j.cnki.1005-8885.2024.0017
Abstract147)      PDF(pc) (1161KB)(28)    PDF(mobile) (1161KB)(1)    Save
A 20 GHz - 24 GHz three-stage low noise amplifier ( LNA) was implemented using the GaAs pseudomorphic high electron mobility transistor ( PHEMT) process. The schematic design and optimization of the LNA were carried out using advanced design system ( ADS). The three-stage series structure is used to increase the gain of the amplifier. Additionally, a self-biasing network and negative feedback circuit can expand the bandwidth while increasing the stability of the circuit and obtaining better input matching and noise. The test results show that the gain in the 20 GHz - 24 GHz band is greater than 20 dB, the noise figure ( NF) is 2. 1 dB, and the input and output reflection coefficients are less than - 10 dB, which meets the design requirements. The amplifier serves a wide range of applications, including wireless communications, radar systems, satellite communications, and other areas that require high-frequency amplification to enhance system performance and sensitivity.
Reference | Related Articles | Metrics
Sum rate optimizing for multi-IRS-assisted UAV downlink transmission system using deep reinforcement learning
The Journal of China Universities of Posts and Telecommunications    2024, 31 (5): 23-33.   DOI: 10.19682/j.cnki.1005-8885.2024.0021
Abstract145)      PDF(pc) (2088KB)(45)    PDF(mobile) (2088KB)(6)    Save

By leveraging the high maneuverability of the unmanned aerial vehicle ( UAV) and the expansive coverage of the intelligent reflecting surface ( IRS), a multi-IRS-assisted UAV communication system aimed at maximizing the sum data rate of all users was investigated in this paper. This is achieved through the joint optimization of the trajectory and transmit beamforming of the UAV, as well as the passive phase shift of the IRS. Nevertheless, the initial problem exhibits a high degree of non-convexity, posing challenges for conventional mathematical optimization techniques in delivering solutions that are both quick and efficient while maintaining low complexity. To address this issue, a novel scheme called the deep reinforcement learning ( DRL) -based enhanced cooperative reflection network ( DCRN) was proposed. This scheme effectively identifies optimal strategies, with the long short-term memory ( LSTM) network improving algorithm convergence by extracting hidden state information. Simulation results demonstrate that the proposed scheme outperforms the baseline scheme, manifesting substantial enhancements in sum rate and superior performance.


Reference | Related Articles | Metrics
Parameter estimation of Nakagami-Gamma shadow fading model based on minimum KL divergence
The Journal of China Universities of Posts and Telecommunications    2024, 31 (5): 42-48.   DOI: 10.19682/j.cnki.1005-8885.2024.0014
Abstract129)      PDF(pc) (1332KB)(20)    PDF(mobile) (1332KB)(10)    Save
The Nakagami-Gamma ( NG) shadow fading model based on the moment-based method ( MoM) generates lower tail approximation, which is inaccuracy when the gamma random variables are replaced by the lognormal random variables. The channel parameters of composite NG shadow fading based on the method of minimizing the Kullback- Leibler ( KL) divergence were estimated and a closed-form expression for the system bit error rate ( BER) was derived in this paper. The simulation results show that the KL estimated parameters solve the lower tail approximation problem, and the replacement effect of the lognormal function by the gamma function is better than the MoM when the shading parameters are around the typical value of 4 dB - 9 dB. Moreover, the KL method has a lower mean square error ( MSE) value for the channel analysis.
Reference | Related Articles | Metrics
Wideband high gain millimeter wave antenna based on wavy power divider for millimeter wave radar sensor
The Journal of China Universities of Posts and Telecommunications    2025, 32 (1): 24-30.   DOI: 10.19682/j.cnki.1005-8885.2025.0007
Abstract127)      PDF(pc) (3883KB)(21)       Save

In this paper, a wideband high gain millimeter wave radar array antenna based on a wavy power divider was proposed. The radar antenna comprises a wavy power divider and a 10-element array antenna. By adjusting the wavy radius of the power divider, the surface current of the power divider is altered, resulting in better impedance matching with the antenna. This ultimately leads to a significant improvement in bandwidth performance. The 4 伊 10 millimeter wave radar antenna loaded with a wavy power divider exhibits an approximate enhancement of 3 GHz compared to traditional microstrip power divider antennas, and an average gain increase of 2.42 dB within the vehicle millimeter wave radar frequency band relative to the improved gradient power divider structure. The 4 伊 10 millimeter wave radar antenna loaded with wavy power divider possesses the characteristics of high gain and broad bandwidth.


Reference | Related Articles | Metrics
Multi-strategy improved optical microscope algorithm based on periodic mutation and encircling mechanism
The Journal of China Universities of Posts and Telecommunications    2025, 32 (1): 31-47.   DOI: 10.19682/j.cnki.1005-8885.2025.0003
Abstract126)      PDF(pc) (9333KB)(22)       Save
Aiming at the problems of poor initial population quality, slow convergence, and long-running time of optical microscope algorithm ( OMA), a multiple-strategy improved OMA based on periodical variation and encircling mechanism, called MOMA, was proposed in this paper. Firstly, the good point set population initialization is introduced to obtain a uniform initial population. Secondly, the periodic mutation and encircling mechanism are successively used to improve the convergence speed. Finally, the MOMA’s running time is optimized by introducing the conversion factor and the corresponding threshold, while balancing the exploration and exploitation. Experimental and analytical comparisons are made with OMA and 7 other excellent optimizers on 21 benchmark functions. The results show that MOMA largely outperforms the original algorithm. Furthermore, by applying MOMA to the optimization experiments of the no-wait flow-shop scheduling problem ( NWFSP), MOMA can obtain the optimal completion time and the fastest convergence speed compared to modified particle swarm optimization ( PSO) using adaptive strategy, grey wolf optimizer ( GWO), golden jackal optimization ( GJO), and OMA.
Reference | Related Articles | Metrics
Trusted detection for Parkinson’s disease based on uncertainty estimation
The Journal of China Universities of Posts and Telecommunications    2024, 31 (5): 85-94.   DOI: 10.19682/j.cnki.1005-8885.2024.0019
Abstract124)      PDF(pc) (662KB)(45)    PDF(mobile) (662KB)(9)    Save
Currently, most deep learning methods used for Parkinson’s disease ( PD) detection lack reliability assessment. This characteristic makes it is difficult to identify erroneous results in practice, leading to potentially serious consequences. To address this issue, a prior network with the distance measure ( PNDM) layer was proposed in this paper. PNDM layer consists of two modules: prior network ( PN) and the distance measure ( DM) layer. The prior network is employed to estimate data uncertainty, and the DM layer is utilized to estimate model uncertainty. The goal of this work is to provide accurate and reliable PD detection through uncertainty estimation. Experiments show that PNDM layer can effectively estimate both model uncertainty and data uncertainty, rendering it more suitable for uncertainty estimation in PD detection compared to existing methods.
Reference | Related Articles | Metrics
Future development research of 5G positioning in 3GPP standards
The Journal of China Universities of Posts and Telecommunications    2025, 32 (1): 11-23.   DOI: 10.19682/j.cnki.1005-8885.2025.0006
Abstract118)      PDF(pc) (2912KB)(34)       Save
Since the release of the first version of the 5 th generation ( 5 G) mobile networks standard: Release-15 ( Rel- 15 ) , the 3 rd Generation Partnership Project ( 3 GPP) made significant efforts in the field of indoor and outdoor wireless positioning. Notably, Release-16 ( Rel-16 ) augmented support for enhanced mobile broadband ( eMBB) and ultra-reliable low-latency communication ( uRLLC) , particularly within complex indoor settings. To further meet the diverse application needs of positioning scenarios, the 3 GPP standards for Release-17 ( Rel-17 ) and Release-18 ( Rel-18 ) propose new enhancement measures to continuously provide more accurate positioning services. In this paper, the scholarly discourse on 5 G positioning was critically examined, providing a systematic review of the 5 G positioning standards as delineated in 3 GPP’s Rel-16 and Rel-17 , and extended the discussion to the anticipated enhancements in 5 G Rel-18 , along with their underlying motivations. Through these discussions, not only a comprehensive perspective on the current development of 5 G positioning technology was provided but also forward-looking analysis and predictions for the evolution of positioning technology in the upcoming 3 GPP Release-19 ( Rel-19 ) was offered. Additionally, it serves as a reference for researchers interested in understanding the development of positioning within the standard framework in the field of 5 G indoor positioning, which holds significant meaning for promoting research and application of 5 G positioning technology.
Reference | Related Articles | Metrics