Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • An Integrated Routing Scheme with Load Balancing Consideration
    • shanguo huang ZHANG Jie wanyi gu
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 1-5. DOI:10.13190/jbupt.200904.1.guobl
    • Abstract ( 2518 )     HTML       
    • An integrated routing algorithm with load balancing consideration——loadbalancing algorithm is proposed to ease the existing problems of the routing scheme used in Internet protocol over wavelength division multiplex network. It sets weight of links (both for the virtual link and physical link) with consideration of the influence of the node load, and designs objective function taking into account of the resource utilization. Simulations show that the variance of load of node is small and the connection blocking probability is reduced too.

    • References | Supplementary Material | Related Articles
    • A novel network coding-aware metrics for multi-radio routing
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 6-9. DOI:10.13190/jbupt.200904.6.songp
    • Abstract ( 2059 )     HTML       
    • The problem of intra-channel diversity in multi-channel routing can be relived efficiently using new proposed technology called “Network coding”, and hence spectral efficiency can be increased. In this framework, a novel routing metrics WCECTT (Weighted Cumulative Coding-aware ETT) which fairly quantify the network coding gain while considering the wireless transmission conditions and intra-frequency interference is proposed. This metric can be used to determine the optimum path from the coding-available paths and the coding- unavailable ones. We implement the WCECTT routing in wireless mesh system in C++ and conduct extensive evaluation, and the simulation results illustrate that compared with the ones which oblivious of coding gains using ,transmission efficiency can be sharply increased in the whole network and achieves 10%-20% throughput gains.

    • Supplementary Material | Related Articles
    • Design of Reconfigurable Processor Based on the Loop Mapping
    • YU Su-Dong
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 10-14. DOI:10.13190/jbupt.200904.10.yusd
    • Abstract ( 1986 )     HTML       
    • A reconfigurable processor is presented to execute the loop automatically in reconfigurable cell array. Data distribution and asymmetric first in first out buffer (FIFO) can speedup the data transfer with 8 times. The hardware architecture is verified on the platform of fieldprogrammable gate array (FPGA) with some kernel algorithms of multimedia applications such as integer invert discrete cosine transform (IDCT) and motion estimation of advanced video coding of moving pictures experts group4 (H.264) and IDCT of moving pictures experts group2(MPEG2). With a same scale of reconfigurable array, the performance will be 35 times higher than the similar researches.

    • References | Supplementary Material | Related Articles
    • Rate Control for Transform Domain Wyner-Ziv Video Coding
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 15-19. DOI:10.13190/jbupt.200904.15.wangfq
    • Abstract ( 2188 )     HTML       
    • Wyner-Ziv video coding is a typical distributed video coding paradigm. Current solutions in the literature perform rate control at the decoder by making use of the feedback channel (FC), and this will definitely cause huge complexity for decoding and constrain its application. Based on analyzing the impact that different motion activity would have on video coding rate, an effective rate control algorithm is proposed by utilizing the correlation noise statistical model, characteristic of feedback channel and temporal correlation. First, the encoder estimates the minimal number of rate chunks, then adjust minimal rate chunks according to the average number of requests and temporal correlation among coefficient bands. Then it would be easily to obtain suitable initial rate chunks, and consequently control the requesting times and complexity of decoder. Experimental results showed that this algorithm greatly reduce decoding complexity than others which have nearly the same coding efficiency.

    • References | Supplementary Material | Related Articles
    • Rate Control Scheme for H.264/AVC Based on Sobel Edge Operator
    • Chang Kan
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 20-24. DOI:10.13190/jbupt.200904.20.changk
    • Abstract ( 2226 )     HTML       
    • An accurate macroblock (MB) layer rate control scheme based on Sobel edge operator for H.264/AVC is proposed. Utilizing the Sobel edge operator, the prediction accuracy of both mean absolute difference (MAD) and header bits can be improved. Meanwhile, a more suitable Rate Quantization (RQ) model history data point selection method is also developed to enhance the accuracy of RQ model. Extensive simulations show that the scheme can control bit rates accurately with the average peak signaltonoise ratio (PSNR) up to 0.8dB when compared with the conventional H.264/AVC rate control algorithms.

    • References | Supplementary Material | Related Articles
    • Performance of Multihop Communication Systems over Weibull Fading Channels
    • Lian-hai Wu Jia-ru Lin
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 25-29. DOI:10.13190/jbupt.200904.25.wulh
    • Abstract ( 2401 )     HTML       
    • Endtoend performance of multihop wireless communication systems with nonregenerative relays operating over independent not necessarily identically distributed Weibull fading channels is presented. Based on the inequality between harmonic and geometric means, the endtoend signaltonoise ratio (SNR) is bounded upper. Novel expressions are derived for the momentgenerating, probability density, and moment functions of the bound in closed form. Using these statistical results, convenient closedform bounds are obtained for the average endtoend SNR, the channel capacity, and the average biterror probability of multihop wireless communication systems. Numerical results show the tightness of the proposed bounds.

    • References | Supplementary Material | Related Articles
    • Cooperative Opportunistic Scheduling for Base Stations in Multiple Antenna Cellular Systems
    • LEI Jun SHI Ming-Jun ZHAO Ming LI Yunzhou YAO Yan
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 30-34. DOI:10.13190/jbupt.200904.30.leij
    • Abstract ( 2838 )     HTML       
    • Cooperative scheduling between base stations is proposed to reduce intercell interference in multiple antenna cellular communication systems. Based on interferencelimited twocell model, cooperative opportunistic scheduler is proposed and analyzed. The interference signal power is proven to be exponentially distributed. The concise expression of the approximated average rate and the multiuser diversity gain are derived by utilizing extreme value theory. Furthermore, the impact of several factors on the cooperative opportunistic scheduling in practical cellular systems is discussed. The multiuser diversity gain of noncooperative opportunistic scheduling is shown as withusers per cell, whereas that achieved by the proposed cooperative opportunistic scheduler is. Simulation shows that the proposed cooperative opportunistic scheduler can effectively reduce intercell interference and achieve significant gain.

    • References | Supplementary Material | Related Articles
    • Improved Iterative Tree Search Detector in MIMOBICMIDD System
    • You Minghou
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 35-39. DOI:10.13190/jbupt.200904.35.youmh
    • Abstract ( 2090 )     HTML       
    • Iterative tree search (ITS) is an efficient soft detection scheme in multipleinput multipleoutput (MIMO) systems. However, there often exists in ITS that loglikelihood ratio (LLR) values of some detected bits cannot be evaluated. Although it can be somewhat solved by setting the LLR magnitude for these bits to a constant value, the system performance would be degraded. To overcome this drawback, an improved soft detection scheme is proposed. The scheme ensures that the LLR value of each bit can be calculated and provides highly reliable LLR by appropriately choosing some discarded paths, retaining them and extending them to fulllength paths. The rule of choosing suitable discarded paths is presented and the lowcomplexity approach of extending them to full length is given. Simulations show that the proposed algorithm can obtain better performance than ITS and can achieve good performancecomplexity tradeoff.

    • References | Supplementary Material | Related Articles
    • Image Processing Using Intersecting Cortical Model
    • ZHAN Kun Hongjuan Zhang MA yide
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 40-45. DOI:10.13190/jbupt.200904.40.zhank
    • Abstract ( 1979 )     HTML       
    • The working principle, performance parameters, behaviors and main characteristics of intersecting cortical model (ICM) are analyzed. The expressions of internal activity without coupling, firing time and firing periodicity are derived from the mathematical description of ICM. The ICM features of variable threshold, nonlinear pulse modulation, synchronous pulse bursts, pulse capture, dynamic pulse bursts, autowave and synthesized spacetime are summarized. Then, the applications of ICM in automatic image segmentation, automatic edge extraction, feature extraction and image smoothing are introduced respectively. Experiments show that ICM can be used to segment images, retrieve images and denoise images effectively.

    • References | Supplementary Material | Related Articles
    • A Channel Feedback Based Cooperative MAC Protocol
    • Xiao-xiang Wang Liu Zhen
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 46-49. DOI:10.13190/jbupt.200904.46.songzhf
    • Abstract ( 2217 )     HTML       
    • An improved cooperative medium access control (MAC) protocol, called ICoopMAC, is proposed for wireless networks. The protocol adopts a new frame control format and is completely compatible with the legacy 802.11 distributed coordination function (DCF). To adapt to dynamical channel variation, joint feedback of instantaneous channel state information from both destination node and relay node is used. Moreover, a new network allocation vector mechanism is adopted to reduce access delay at the stations caused by collisions. It is shown that ICoopMAC can increase the throughput of the whole network and reduce the average packet delay, compared to CoopMAC protocol.

    • References | Supplementary Material | Related Articles
    • A Network Selection Scheme Based on Hilbert Space Vector Norms
    • SUN Lei SHEN Dong-ming shen
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 54-58. DOI:10.13190/jbupt.200904.54.sunl
    • Abstract ( 2333 )     HTML       
    • A network selection scheme based on Hilbertspace vector norms is presented. It defines the vector norms as satisfaction function to revise the weighting factors of metrics given by analytic hierarchy process (AHP). Meanwhile, the scheme exploits vector geometrical relationships in Hilbert subspace basing on revised weights to measure similarities between vectors of network ability and user target. It can be used to choose the most suitable network for users, thereafter, it constructs a flexible space based on the both thresholds of angle and distance between network ability and user target vectors to control the handover frequency. Simulations fully indicate that the proposed scheme can select the appropriate network for various services accurately and reduce the frequency of vertical handover to maintain service constancy.

    • References | Supplementary Material | Related Articles
    • Authentication Protocol for RFID without BackEnd Database
    • Miao-Lei Deng Xingzhong Qian Gang Qiu
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 59-62. DOI:10.13190/jbupt.200904.59.dengml
    • Abstract ( 2008 )     HTML       
    • In order to overcome the shortcoming in cryptographic protocols for radio frequency identification (RFID) using the backend database model, a lightweight authentication protocol for RFID was proposed without the need for a bakeend database based on the universally composable security model. The protocol provides anonymity, untraceability and mutual authentication. The implementation of the protocol requires only the use of pseudorandom function and has higher efficiency. Universally composable security guarantees that the protocol holds secure even when running in an arbitrary and unknown multiparty environment.

    • References | Supplementary Material | Related Articles
    • A System Model for P2P Stream
    • ZHANG Daiyuan,JIANG Limin
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 68-72. DOI:10.13190/jbupt.200904.68.zhangdy
    • Abstract ( 1972 )     HTML       
    • To improve performance of data transmission, a new system model for peertopeer stream (NSMP2PS) is built. The architecture and design principles for NSMP2PS are described. Introducing the network coding mechanism, the storeandforward capability of data is improved. Using the management strategy for better nodes and failure nodes algorithms, the NSMP2PS can be used to avoid the problem of unbalanced load for multicast tree. On the other hand, the optimal multicast tree structure and the continuity of players can be guaranteed by its selfoptimizing process nodes. The incentive mechanism is introduced to encourage more selfish nodes transmitting and sharing resources and data, therefore, the data quality and the overall performance of live system are also improved. 68-72

    • References | Supplementary Material | Related Articles
    • Blind CFR Estimation for SCFDE Systems
    • LI Meng-Xing longyang huang en cheng zemin liu
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 77-80. DOI:10.13190/jbupt.200904.77.limx
    • Abstract ( 1822 )     HTML       
    • A blind scheme to estimate channel frequency response(CFR) in oversampled singlecarrier frequencydomain equalization(SCFDE) systems based on linear prediction algorithm(LPA) is developed. Compared with conventional LPA based timedomain channel estimation approach, this method obtains the closedform solution for CFR directly from tap weights of the prediction filter, rather than crosscorrelation of innovation and measurements. The proposal is robust to channel order overestimation. Its performance is better than that of conventional LPA based timedomain channel estimation approach. Futhermore, it ensures that the channel estimation in timedomain appears finite supporting. Simulations confirm our analysis.

    • Supplementary Material | Related Articles
    • EPROPHET in Intermittently Connected Networks
    • LI Xin
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 81-85. DOI:10.13190/jbupt.200904.81.liy
    • Abstract ( 1986 )     HTML       
    • When introducing and analyzing routing protocols in intermittently connected wireless networks (ICWN), an enhanced probabilistic routing protocol is proposed using history of encounter and transitivity (EPROPHET) for ICWN. EPROPHET forwards messages to the nexthop according to the contact frequency and contact duration. Simulation indicates that EPROPHET saves the buffer space, improves the packet delivery ratio, and decreases the endtoend delay.

    • References | Supplementary Material | Related Articles
    • Suppression of NarrowBand Interference and Gaussion Noise
    • ZHANG Xiao-Lin
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 86-89. DOI:10.13190/jbupt.200904.86.zhangxl
    • Abstract ( 2177 )     HTML       
    • For suppressing Gaussian noise and narrowband interference, a Gaussian noise and narrowband interference suppression algorithm called cyclic side correlation replacement (CSCR) is presented. CSCR is on the basis of the further analysis of side correlation replacement. CSCR algorithm is used for reference SCR in cyclic spectrum. Using cyclic spectrum could suppress Gaussion noise effectively, CSCR algorithm reconstructs the expectation signal by replacing the value of symmetric band with the interference signals. In addition, Gaussian noise is suppressed on the axis of nonzero cyclic frequency because of the noncyclostationary character, so Gaussian noise and narrowband interference are both suppressed at the same time. The algorithm is suitable for the modulation mode that has the symmetry of spectral correlation density. At last, through the computer simulation for phase shift keying (2PSK) signal, it shows that the cyclic side correlation replacement algorithm can effectively suppress Gaussian noise and narrowband interference.

    • References | Supplementary Material | Related Articles
    • Research on the Optimal Spare Part Inventory Control Method for Telecom Network
    • ZHANG Jin-Yu
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 90-93. DOI:10.13190/jbupt.200904.90.zhangjy
    • Abstract ( 1832 )     HTML       
    • An optimal economic replacing algorithm is introduced, it can avoid disadvantages of emphasizing particularly on performance criticality but neglecting cost occurred in the replacing algorithms based on the age and the performance degradation degree. An optimal performance inventory control algorithm is put forward, it can overcome the demerits of ignoring the technical depreciation and capital overstocking processed by the inventory control algorithm based on the minimal total expense. Simulations show that they can largely reduce the total cost and the capital overstocking.

    • References | Supplementary Material | Related Articles

    Reports

    • The Impact of Feedback Delay to the Performance of Selective Transmit Diversity under TimeVarying Rayleigh Channel
    • Zhao Shuang hongwen yang
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 94-98. DOI:10.13190/jbupt.200904.94.zhaosh
    • Abstract ( 2276 )     HTML       
    • The performance of selective transmit diversity (STD) with feedback delay is investigated under timevarying Rayleigh channel. First, the closedform expressions of the receiver output signaltonoise ratio (SNR) distribution are derived and validated via simulation. Based on these results, the bit error rate (BER) of BPSK modulation is obtained. It is shown that the BER of STD system consists of two parts: the BER of an ideal STD system without feedback delay plus an error floor of diversity order one representing the contribution of delayed feedback. No matter how small the feedback is, the error floor always exists. In consequence, the theoretical diversity order is one for any STD system with none zero feedback delay.

    • References | Supplementary Material | Related Articles
    • Relay Selection and Performance Analysis in Systems with DecodeandForward Relays
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 99-103. DOI:10.13190/jbupt.200904.99.fanb
    • Abstract ( 2721 )     HTML       
    • In order to achieve a balance between the system transmit rate and fairness among relays, a loadbalance based relay selection scheme is proposed in the systems with multiple decode andforward (DF) relays. Moreover, the average transmission rate performance and the relay selection gain of the system are analyzed based on the extreme value theory. It can be seen that the requirements of both transmit rate and fairness can be satisfied with the proposed relay selection scheme. The system can achieve the relay selection gain and average transmission rate logarithmic to the relay node number.

    • References | Supplementary Material | Related Articles
    • Analysis of the Narrowband Interference Effect on Timing Sequence Detection Performance
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 104-108. DOI:10.13190/jbupt.200904.104.haoshq
    • Abstract ( 2243 )     HTML       
    • The statistical property of timing metric is analyzed in the presence of narrowband interference. The missing and false detection probabilities of training sequence are addressed according to the probability distributions of timing metric. It is shown that the performance of timing metric estimation can not be influenced by signal to interference ratio (SIR). In normal condition, the noise is the key factor which affects estimation performance when SIR is high(higher than 10?dB). The mean and the variance of timing metric is hardly affected by jamming bandwidth in a given SIR. The missing detection probability of training sequence, affected by narrowband interference (NBI), becomes high when SIR is lower than 15?dB. The false detection probability is not related to signaltonoise ratio (SNR) and SIR.

    • References | Supplementary Material | Related Articles
    • AntiPartition SelfDeployment Algorithm in Mobile Sensor Network
    • Yuan-da CAO Li Tan Jiong YU
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 109-112. DOI:10.13190/jbupt.200904.109.yangmh
    • Abstract ( 2113 )     HTML       
    • An antipartition selfdeployment algorithm (APSDA) is proposed to solve the problems of networkpartition, coverageholes and lacking of keysensing which disturb conventional virtual force algorithm (VFA) deployment approach in sparse network environment. By constructing the virtual repulsive force between nodes, the movement equation and the virtual attractingfield in the sensing area, the capability of selfrepair, keycoverage and antipartition are achieved. Simulation shows that the performance of network is enhanced by APSDA.

    • Supplementary Material | Related Articles
    • Reliable Detection of BPCS Steganography
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 113-116. DOI:10.13190/jbupt.200904.113.wuj
    • Abstract ( 2176 )     HTML       
    • Bitplane complexity segmentation (BPCS) steganography replaces bitplane pixel blocks of high complexity with secret data. The continuity of the complexity histogram of the pixel block is affected by the embedded data. Based on the analysis of the security flaw in the BPCS steganography, a detection algorithm against BPCS embedding is proposed. The algorithm can reliably detect the existence of hidden data. It is easy to implement and computationally efficient, and suitable for realtime detection.

    • Supplementary Material | Related Articles
    • A Robust Linear Precoding with Channel Prediction
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 117-121. DOI:10.13190/jbupt.200904.117.wangxzh
    • Abstract ( 2566 )     HTML       
    • To eliminate effects of the feedback delay and mobile velocity in broadcast channel, the channel statistics and outdated channel information is used to estimate the current channel state information at transmitter (CSIT) jointly. Based on the obtained imperfect CSIT, a robust linear zero forcing (ZF) precoding is proposed. Simulation shows the performance of robust method is preferable. Furthermore, the relationship between system performance and feedback delay or mobile speed is presented.

    • References | Supplementary Material | Related Articles
    • A Parallable Algorithm for Chinese CoTopic Words Clustering
    • Jun-Liang Chen Xiang-Wu Meng
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 122-127. DOI:10.13190/jbupt.200904.122.shenxy
    • Abstract ( 2670 )     HTML       
    • A simple but powerful algorithm for automatically clustering Chinese cotopic words is presented. The method first uses punctuation ‘、’ to split and extract paratactic Chinese words within sentences from a corpus and constructs a cocitation graph by treating Chinese words as nodes. Second, the method generates several locality sensitive Hashing (LSH) signature combinations for each node in the cocitation graph. Those nodes shared at least one LSH signature combination, are grouped together and most of them may belong to the same topic. The main advantages of the algorithm are the fast speed of calculation and high convenience of implementation in parallel. Experimental results indicate the high efficiency and good clustering effect.

    • References | Supplementary Material | Related Articles
    • Modeling and Analysis for Universal Multiple Access Network Selection
    • Junde Song
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(4): 128-132. DOI:10.13190/jbupt.200904.128.093
    • Abstract ( 1967 )     HTML       
    • A multiple access network selection method based on the universal model for multiobjective optimization is presented. Parameters from upper layer and lower layer related with network selection are classified systematically. A new multiattributes decision making algorithm combined sorting in genetic algorithm and HookeJeeves method is also proposed. Simulation shows that the parameters are identified effectively, and the network selection mechanism we proposed based on the multiobjective optimization modeling can select the appropriate network for users.

    • References | Supplementary Material | Related Articles