Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • Probe Station Placement for Multiple Faults Localization
    • MENG Luo-ming,HUANG Ting,CHENG Lu,ZENG Yong-guo,YU Likun
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 1-5. DOI:10.13190/jbupt.200905.1.menglm
    • Abstract ( 2387 )     HTML       
    • The faults localization method using active probing is investigated in this pape
      r in the context of vector span. A probe station deployment approach is proposed to support the localization of multiple faults. The faults in the network can be localized sooner and costeffectively using the active probes sent from the probe stations placed in the network. We provide experiments to show that the proposed approach can minimize the number of probe stations and localize the multiple faults in the network.

    • References | Supplementary Material | Related Articles
    • A Method of Multi-Radio Transmission Diversity with Packet Level Forward Error Correction
    • SUN Zhuo,QUAN Xiao,WANG Wen-bo
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 6-9. DOI:10.13190/jbupt.200905.6.sunzh
    • Abstract ( 2515 )     HTML       
    • For heterogeneous networks, a method of multiradio transmission diversity is proposed in order to exploit the multiradio access diversity gain. The packet level forward error correction (FEC) is integrated with multiradio transmission at sender. In order to exploit the considerable multiradio transmission diversity (MRTD) gain and provide the efficiency of system throughput, the coded packet is adaptively allocated to each available radio access according to minimizing the probability of irrecoverable loss at receiver. The analysis and simulation on its performance are proven that the proposed scheme has optimal transmission reliability and efficiency especially in the terrible channel condition.

    • Supplementary Material | Related Articles
    • Chinese Frequent String Extraction and Application on Language Model
    • WEN Juan,WANG Xiao-jie
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 10-14. DOI:10.13190/jbupt.200905.10.wenj
    • Abstract ( 2117 )     HTML       
    • In order to extract the Chinese frequent strings (CFS) accurately and make better use in language models, a new method for CFS extraction using string segmentation degree is proposed. Unigram and bigram language models based on this CFS extraction method are built. Experiment shows that the CFS based language model can deal with the lack of long distance dependency problem in character and word based language model. It also shows that the CFS based language model has lower model perplexity and higher pinyintocharacter conversion correctness compared with the model based on previous CFS extraction method.

    • References | Supplementary Material | Related Articles
    • Mode Adaptive Opportunistic Transmission in MU-MIMO Downlink with Limited Feedback
    • LI Zhao,YANG Jia-wei,YAO Jun-liang,CHEN Ting
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 15-19. DOI:10.13190/jbupt.200905.15.lizh
    • Abstract ( 2643 )     HTML       
    • A mode adaptive opportunistic transmission scheme in multiuser multi-input multioutput(MU-MIMO) downlink with limited feedback is introduced. In each time slot only eligible mobile station (MS) whose channel quality exce
      eds a preset threshold would select transmission mode, including eamforming (BF) and spatial multiplexing (SM) and adaptively feed channel information. With feedback information, base station (BS) schedules one user out of candidate MS. Analysis is employed in evaluating the proposed scheme. Monte-Carlo simulation shows that the scheme can achieve high capacity as well as low outage probability with limited feedback cost.

    • References | Supplementary Material | Related Articles
    • Cognitive Radio Based Channel Borrowing Scheme for Heterogeneous Wireless Networks
    • LI Xi-jin,JI Hong
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 20-23. DOI:10.13190/jbupt.200905.20.lixj
    • Abstract ( 2910 )     HTML       
    • A prediction algorithm based channel borrowing scheme on heterogeneous wireless network model composed of IEEE802.11 wireless local area network(WLAN) and time division-synchronous code division multiple access(TD-SCDMA)is proposed to solve the problem of spectrum shortage. The scheme refers to current horizontal channel borrowing strategy and proposes a channel reserved mechanism with channel borrowing prediction algorithm. Performance simulation shows that this scheme can efficiently decrease blocking probability and improve system performance.

    • References | Supplementary Material | Related Articles
    • Analysis on the Call Blocking Probability Considering Location Update Failure
    • LIU Yin-long,ZENG Zhi-min,XIA Hai-lun, ZHANG Tian-kui
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 24-27. DOI:10.13190/jbupt.200905.24.liuyl
    • Abstract ( 2646 )     HTML       
    • In case of failed location update, a significant consequence is the incapability when establishing the valid route for the potential call connection; it will seriously degrade the network performance. A quantitative analysis of the location update failure effect on the call blocking probability in the wireless network is performed. For the sake of general applicability, the call blocking probability is formulated with the call interarrival time is exponentially distribution and the location area residence time is generally distribution. It is shown that the next call blocking probability is related to location update failure probability, call to mobility ratio and the previous call status. Numerical examples are presented to show the interaction between the call blocking probability and location update failure probability. Discussions on the sensitivity of teleparameters are also given.

    • References | Supplementary Material | Related Articles
    • Relay-Aided Decentralized Estimation in Wireless Sensor Networks
    • HUANG Zhen,\ WEN Zhigang,\ YUE Guang-xin
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 28-31. DOI:10.13190/jbupt.200905.28.huangzh
    • Abstract ( 2377 )     HTML       
    • The decentralized estimation of a noise-corrupted deterministic parameter in wireless sensor networks with the aid of relay is considered. A new relayaided decentralized estimation (RADE) scheme is proposed, by which relay collects the overheard messages from sensors and sends the locally processed message to a destination. Amplify-and-forward (AF) and estimate-and-forward (EF) strategies are proposed and the corresponding closed-form solutions are derived. Numerical simulation shows the proposed strategies can provide better estimation performance without any bandwidth loss.

    • References | Supplementary Material | Related Articles
    • JPEG Image Retrieval Based on the Spatial Distribution \=of the DCT Coefficients
    • ZHAO Shan,TANG Yongli,\ LIU Jing
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 32-35. DOI:10.13190/jbupt.200905.32.zhaosh
    • Abstract ( 2698 )     HTML       
    • Introducing the spatial distribution information of alternating current (AC) coefficients into the feature extraction,a new Joint Photographic Experts Group (JPEG) image retrieval is proposed. Firstly,according to the characters of AC coefficients, invariant for the rotation, AC coefficient distribution entropy is presented. Meantime, because of the different effect of each AC coefficient on the retrieval precision, the weight function for the entropy is proposed; thus can avoid the mistaken retrieval and losing retrieval. Not only statistical distribution but also the spatial distribution of discrete cosine transform (DCT) coefficients are taken into account, it is robust for transform, rotation and scale. Experiments show that the new method has a better performance both in retrieval efficiency and effectiveness.

    • References | Supplementary Material | Related Articles
    • Prosodic Structure Prediction based on Conditional Random Field Model
    • DONG Yuan1,ZHOU Tao1,DONG Cheng-yu2,WANG Hai-la2
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 36-40. DOI:10.13190/jbupt.200905.36.dongy
    • Abstract ( 2639 )     HTML       
    • Prosodic structure prediction is an important component in mandarin text-to-speech (TTS) system. A prosodic structure prediction method is proposed, based on the conditional random field (CRF) algorithm. Prosodic word model and prosodic phrase model utilize CRF method for machine learning based on automatically segmented and tagged features and hierarchal prosodic structure information extracted from a large-scale manually labeled speech corpus. The approach achieves F-score of 90.67% in prosody word prediction and 80.05% in prosody phrase prediction, 3.62% and 5.65% higher than that of max entropy (ME) algorithm based method. Experiment results show that the approach of CRF based method makes considerable improvement in prosodic structure prediction, and works well in real mandarin TTS system.

    • References | Supplementary Material | Related Articles
    • Blind Equalization Based on Weighted Fusion of Multi-Mode Algorithm
    • ZHAO Xiao-qun,YAO Yu-hong,XU Xi-tao
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 41-46. DOI:10.13190/jbupt.200905.41.zhaoxq
    • Abstract ( 2539 )     HTML       
    • On the study of several commonly used algorithms, a new weighted fusion of multi-mode blind algorithm is proposed: when the output signal of the equalizer is reliable, MMA-assisted modulus algorithm (MAMA) is used, otherwise modified constant modulus algorithm (MCMA), multimodulus algorithm (MMA) and MAMA are weighted and merged together. On the other hand, by controlling the weight of each algorithm and making it in direct proportion to the iteration number, the performance is evidently improves. Simulation proves that the new algorithm is stable, and could reach inter symbol interference (ISI) of -35?dB after about 2?800 iterations in the underwater environment.

    • References | Supplementary Material | Related Articles
    • The Adaptive Resource Allocation for MU-MIMO Systems with the Presence of Channel Estimation Error
    • LIAO Xin1,KONG Luting1,JIANG Jun2,ZHANG Ping1

    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 47-50. DOI:10.13190/jbupt.200905.47.liaox
    • Abstract ( 2958 )     HTML       
    • The effect of channel estimation error on the performance of multiuser multiinput multi-output (MIMO) systems with zeroforcing beamforming (ZFBF) in uncorrelated Rayleigh flat fading channels is investigated. An adaptive resource allocation algorithm with the total transmit power constrained and to satisfy the target bit error rate (BER) is proposed to maximize the system effective throughput. The active users are determined by users' channel state information and fairness. To obtain closed form solution for power and rate allocation, the algorithm uses the asymptotic Gaussian convergence characteristics of the packet outage probability. Numerical analysis shows that the system effective throughput is improved, benefited from the consideration of channel estimation error and the guarantee of users' quality of service (QoS) and fairness, while the computational complexity appears low.

    • References | Supplementary Material | Related Articles
    • A Rapid Inverse Kinematics Solution for Super-Redundant Mobile Manipulator
    • YU Zhen-zhong,YAN Ji-hong,ZHAO Jie,GAO Yong-sheng,CHEN Zhi-feng,ZHU Yan-he
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 51-55. DOI:10.13190/jbupt.200905.51.yuzhzh
    • Abstract ( 2969 )     HTML       
    • To obtain optimized inverse kinematics solution for a class of redundant mobile manipulator (MM) quickly and accurately, an inverse kinematics method based on genetic trust region algorithm combined with analytical solution is proposed. Manipulator's inverse kinematics expressions expressed by mobile vehicle's movement parameters are derived. The flexibility principle to determine the objective function for trust region algorithm is introduced. Finally, the optimization problem of the objective function by genetic trust region algorithm to get the inverse kinematics solutions of mobile manipulator is solved. Simulations show that the method can quickly obtain precised and optimized inverse kinematics solutions.

    • Supplementary Material | Related Articles
    • A Novel Clustering Algorithm for Ad Hoc Network
    • YANG Wei-Dong
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 61-65. DOI:10.13190/jbupt.200905.61.yangwd
    • Abstract ( 2713 )     HTML       
    • Clustering is the most popular method to impose a hierarchical structure in the mobile Ad Hoc networks. However, the formation and maintenance of a hierarchical structure depends on certain clustering algorithm. By studying existing clustering algorithm, a new on-demand weighted clustering algorithm (NWBCA) is proposed. The optimized connectivity degree and energy status of mobile nodes are taken into consideration. The adoption of the on-demand strategy improves the stability of the network architecture and lowers the computing and communication cost. By investigating the performance of the proposed algorithm with that of others, the simulation indicates all the specifics of NWBCA are superior to those of the other and the validity of NWBCA has been proved.

    • References | Supplementary Material | Related Articles
    • Analysis on Modeling of PON Networks Reliability
    • WANG Li-qian,CHEN Xue,MA Dong-chao
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 66-70. DOI:10.13190/jbupt.200905.66.wanglq
    • Abstract ( 2623 )     HTML       
    • To quantitatively and comprehensively evaluate the network reliability of the whole PON, a new passive optical network (PON) reliability model is proposed. It can indicate the failure's effect on the network or the different contributions of different nodes and links. Based on this model, the network reliability and cost of PONs in typical optical network unit (ONU) location situations with typical topologies are analyzed, the optimized location of splitter in one-splitter tree PON and trunk-protected tree PON is given.

    • References | Supplementary Material | Related Articles
    • Data Fusion Oriented Routing Protocol Based on LEACH
    • CHEN Lei,ZHAO Bao-hua
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 71-74. DOI:10.13190/jbupt.200905.71.chenl
    • Abstract ( 2600 )     HTML       
    • The low-energy adaptive clustering hierarchy(LEACH)for wireless sensor networks prescribes that each cluster head sends fused data directly to base station, so cluster heads that are farther away from base station consume more energy, resulting in unbalanced energy consumption of the entire network. A data fusion oriented clustered routing protocol based on LEACH is presented to reduce the energy consumption of the cluster heads and to balance the energy consumption of the entire network. In this protocol, a cluster head estimates which neighboring clusters also sensed the same event by the locations of its member nodes during intra cluster data fusion process; data is fused among these cluster heads hop by hop before transferred to base station afterwards. Simulations show that this protocol can effectively prolong the life time of the sensor network.

    • References | Supplementary Material | Related Articles
    • An Improved ODMRP Used for Multi-Source Group Communication
    • YIN Min1,TANG Yao2
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 75-79. DOI:10.13190/jbupt.200905.75.370
    • Abstract ( 2755 )     HTML       
    • In order to reduce great overhead of ondemand multicast routing protocol (ODMRP) in multisource applications, an improved flooding limitation mechanism ispresented, which permits forwarding nodes and backup nodes to transmit maintenance packets only. It makes good use of broadcast characteristic of wireless channel and periodical routing maintenance of ODMRP. Simulation shows that this improved ODMRP is especially fit for multisource group communication and less receiver occasion compared to the network scale. Under the above conditions, the protocol reduces maintenance overhead effectively and enhances packet delivery ratio(PDR) distinctly.

    • References | Supplementary Material | Related Articles
    • System Capacity Promotion and CoChannel Interference Avoidance in TDD Wireless Communication System
    • 〗FENG Wenjiang,CHENG Zhongwu,WU Yucheng
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 80-83. DOI:10.13190/jbupt.200905.80.374
    • Abstract ( 2634 )     HTML       
    • Two limited factors in time division duplex (TDD): capacity loss caused by roundtrip delay in sole cell, large region wireless region access network (WRAN) system and performance degradation caused by co-channel interference in multi-cell environment are analyzed. In WRAN
      system, capacity loss was reduced by signal transmission in idle time on the basis of distance between customer premises equipment (CPE) and base station. Simulation results show that uplink capacity increase at least by 5%. In multicell system, an improved time slot allocation method is put forward. It shows that at 1% outage probability, 11~12?dB signaltointerference ratio (SIR) performance is improved compared with no optimization situation, and 2.5~3?dB performance is degraded compared with original time slot allocation method, but system complexity is reduced to (M2-M)/2.

    • References | Supplementary Material | Related Articles
    • A Resource Discovery Approach Based on the Trust and Social Networks
    • GONG Yan1,2,YANG Fang-chun1,ZOU Hua1,SHUANG Kai1
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 84-87. DOI:10.13190/jbupt.200905.84.368
    • Abstract ( 2867 )     HTML       
    • In unstructured peer-to-peer networks, there are numerous malicious nodes, whose false behaviors decrease the efficiency and reliability of the search.A resource discovery approach based on the trust and social networks (TSN) is proposed to solve this problem.Forwarding trust, routing trust and transaction trust are set up to reflect the credibility of the peers.When a peer node selects friends to forward the query message, the friends with high trust and correlation will be given priority. Simulation shows that the TSN effectively screens out the malicious nodes and improves the resource reliability and the searching efficiency.

    • References | Supplementary Material | Related Articles
    • A Distributed Dynamic Token Relay Protocol Based on Sub-Queue
    • CAO Peng,JING Yuan,HUANG Guo-ce
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 88-92. DOI:10.13190/jbupt.200905.88.caop
    • Abstract ( 2591 )     HTML       
    • In order to improve the relay delay and successful relay probability performances of high frequency token protocol (HFTP), derived from HFTP token relay protocol,a distributed collisionfree token relay protocol named sub queuedynamic token relay protocol (SQDTRP) is presented, Through the introduction of the communication object column in the relay subqueue, the realtime network status are reserved as much as possible for the dynamic searching of token relay paths. As a result, potential collisions in acknowledgement to SOLICIT-RELAY and the token passing impartiality problems are well corrected by this protocol. Simulations indicate that the token relay delay and token relay success probability of SQDTRP are better than HFTP, which makes it very suit for high frequency (HF) network and other kinds of wireless networks, too.

    • Supplementary Material | Related Articles

    Reports

    • Constant Modulus Semi-Blind Equalizer Based on Structure Risk Minimum Criterion
    • SONG Heng1,MAO Zhong-yang1,WANG Hong-xing1,MA Shi-ping2
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 93-98. DOI:10.13190/jbupt.200905.93.369
    • Abstract ( 2462 )     HTML       
    • According to the track performance of adaptive filters with poor performance in
      rapid fading channel, an adaptive filter principle based on capability control a
      nd semiblind technology is presented. And a semi-blind equalizer based on con
      stant modulus characteristic and structure risk minimum (SCM-SRM) criterion is
      designed. The information of communication signals learning should sufficiently be dug. On the other hand, the structure information of oneself of filters shoul
      d also sufficiently be dug (by use of a capability control method). In a word, t
      he track performance of filters is improved by maximizing amount of learning information. Simulation is carried out that compared with a typical recursive l
      east squares equalizer and a constant modulus semi-blind equalizer, SCM-SBE has better track performance in much less training data, and adapts for wireless motion communications.

    • References | Supplementary Material | Related Articles
    • Vibration Environmental Prediction of Flexible Joint Robot in Moving State
    • ZHUANG Wei,LIU Xiao-ping
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 99-103. DOI:10.13190/jbupt.200905.99.zhuangw
    • Abstract ( 2228 )     HTML       
    • A new approach of vibration environmental prediction on mechanism is presented to study the vibration characteristics of moving flexible joint robot. Taking a 3-D manipulator robot as the research object, this method combines wave theory of structures with rotated transform matrix of joint. Considered the general force balance and displacement boundary of each joint, the environmental prediction model of system in moving states is established. Vibration experiments on moving robot are done. It is shown that the approach is feasible.

    • References | Supplementary Material | Related Articles
    • A Kind of Non-Key Words Index B-Tree Mechanism in High-End Router CIDR List
    • DU Hui-jun,YANG Ning
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 104-108. DOI:10.13190/jbupt.200905.104.duhj
    • Abstract ( 2294 )     HTML       
    • To solve the problem of route matching delay in the core routers, an unclassified Internet protocol (IP) address mode, classless inter-domain routing (CIDR), is introduced. By analyzing the CIDR list and referring to the non-keyword index method and the partitioned indexing algorithm in databases, a novel B-Tree algorithm with nonkeyword index which satisfies the requirements of the CIDR list is brought forward. This algorithm firstly makes a partitioned index on the set of all the prefix addresses in the CIDR list. Being partitioned, the CIDR list is changed into a B-Tree index structure. Then the algorithm does fast lookup in the CIDR list according to the non-keywords of the IP addresses. Simulation shows that the new algorithm meets the demand for the IP address fast lookup.

    • References | Supplementary Material | Related Articles
    • Moving Shadow Detection by Ellipsoidal Method Using Illumination Invariants
    • GAO Jun-xiang,DU Hai-qing,LIU Yong
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 109-113. DOI:10.13190/jbupt.200905.109.gaojx
    • Abstract ( 2696 )     HTML       
    • To detect moving shadow in intelligent video surveillance system, a method using illumination invariants c1c2c3is presented. Firstly, the coordinate
      systems are defined on the basis of c1c2c3ratios of foreground and b
      ackground pixels at the same position. Secondly, the moving shadow detection can be treated as a classification problem of shadows and moving objects in abovementioned coordinate systems. An ellipsoid is further constructed according to the scattering feature of shadow pixels. All the pixels inside the ellipsoid are extracted as shadows. Finally, the postprocessing is performed by exploiting the geometrical property of shadows. Experiments show that the proposed algorithm is robust and effective in detecting shadows for a variety of scenes and moving objects; moreover, it is suited for varying illumination conditions.

    • References | Supplementary Material | Related Articles
    • An Utilizing-Interference and Increasing-Capacity Precoding with Low Complexity
    • XIE Fang,YUAN Chao-wei,CHENG Tie-zheng
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 114-118. DOI:10.13190/jbupt.200905.114.372
    • Abstract ( 2241 )     HTML       
    • A precoding method utilizing interference is proposed in multiple-input multipl
      e-output broadcasting system (MIMO BC) in which each receiver has one antenna. This method turns a multi-user system into a number of independent two-user or one-user systems. In two-user system a new model based on vector is established,and with the objective of maximizing system capacity the optimal precoding vectors and power allocation are derived. Simulations show that the proposed method has the similar capacity with minimum mean square error (MMSE) precoding but reduces complexity with about one-third of MMSE's complexity.

    • References | Supplementary Material | Related Articles
    • Adaptive Frequency Hopping Co-Site Interference Cancellation with Community Antenna and Pilot
    • YUAN Xiao-gang,HUANG Guo-ce,NIU Hong-bo,GUO Xing-yang
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 119-123. DOI:10.13190/jbupt.200905.119.yuanxg
    • Abstract ( 2614 )     HTML       
    • A method of frequency hopping (FH) co-site interference cancellation using community antenna and pilot (CAP-FH-AIC) is proposed according to the analysis of the characteristic of the FH co-site interference. The structure of the canceller is transformed from multi-reference adaptive FH co-site interference cancellation (M-AIC) to single-reference adaptive fixed-tuned co-site interference cancellation (S-AIC) only by adding an additional generator of the pilot signal and an additional band-bass filter. It can realize the cancellation of the FH co-site interference and get almost the same performance of the adaptive fixed-tuned co-site interference cancellation. The theoretical inference and simulation confirm that the algorithm can get the advantage of steady performance in FH co-site interference suppression.

    • References | Supplementary Material | Related Articles
    • Improvement on Multivariate Signature Scheme Model
    • WANG Xin,LIU Jing-mei,WANG Xin-mei
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 124-127. DOI:10.13190/jbupt.200905.124.wangx
    • Abstract ( 2805 )     HTML       
    • Since most of the known multivariate public key signature schemes are
      under attacks, an improved signature model is proposed by analyzing the structure of the classical model. The method to redesign the model is to add another secret transformation so that the public key polynomials are not corresponding to the composition of the private keys, that is not the case in classical model, and the message value is hidden, then the amount of information obtained by attacker are reduced, and the scheme performance against attacks is enhanced. Analysis shows that the improved model can strengthen the security of various multivariate signature schemes. Finally, medium-field extension (MFE) multivariate cryptosystem is taken as an example to illustrate the idea.

    • References | Supplementary Material | Related Articles
    • Algorithm of Information Security Risk Evaluation Based on OCTAVE and Grey System
    • WANG Xiao-zhen1,2,LU Zhi-gang1,2,LIU Bao-xu1
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 128-131. DOI:10.13190/jbupt.200905.128.371
    • Abstract ( 2683 )     HTML       
    • To make sure the assessment accuracy, an efficient algorithm with qualitative analysis and quantify calculate is described. To collect the data, the algorithm chooses the operationally critical threat, asset and vulnerability evaluation (O
      CTAVE) method, defining the assets which need to be assessed, evaluating the administrant and technical vulnerabilities. To calculate the risk, grey theory is chosen, and triangular whiten weight function is used to compute the membership degrees, the risk level is then determined. This valuable method can be used in practical operations of information security risk assessment.

    • References | Supplementary Material | Related Articles
    • Admission Control of OFDMA Relay Cellular System
    • GONG Ping,WANG Dong-hao,NIU Kai,WU Wei-ling
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(5): 132-136. DOI:10.13190/jbupt.200905.132.gongp
    • Abstract ( 2594 )     HTML       
    • Some new call admission control schemes in orthogonal frequency division multiplexing access (OFDMA) relaying cellular system are investigated. Subjected to hard constraint on the quality-of-service (QoS) requirements, the capability of relay, the user's selection of relay and the competence among users, these schemes enlarge the amount of subcarriers saved by two-hop transmission of each relay as much as possible, thus enhancing the resource utilization and system capacity. Simulations verify the effectiveness of the proposed scheme.

    • References | Supplementary Material | Related Articles