Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • A Bilateral Multi-Issue Negotiation Based on Hybrid Genetic Algorithm
    • LI Jian
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 1-4. DOI:10.13190/jbupt.200902.1.lij
    • Abstract ( 3028 )     HTML       
    • To make the agents negotiate more efficient in bilateral multi-issue negotiation in multi-agent based e-commerce, an agent negotiation model is presented,。A hybrid genetic algorithm (HGA) is applied in the model to enhance the negotiation efficiency. Experiments are done for 1000 times for four kinds of agents to gain the satisfying result, Standard Genetic Algorithm(SGA) averagely needs 218 runs negotiation , Genetic Algorithm based on Metropolis rule(MGA) averagely needs 184 runs, adaptive genetic algorithm(AGA)averagely needs 152 runs while the hybrid genetic algorithm(HGA) averagely 121 runs. Experimentals show that the HGA can gain the optimal negotiation result more efficiently than other three kinds of genetic algorithms in bilateral multi-issue negotiation.

    • References | Supplementary Material | Related Articles
    • An Adaptive Loopback Mechanism for LSP Failure Detection
    • Xiao Yu-Feng Shanzhi Chen Xin Li Yu-Hong LI
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 5-9. DOI:10.13190/jbupt.200902.5.xiaoyf
    • Abstract ( 2673 )     HTML       
    •  

      An adaptive detection mechanism is presented to detect the label switched path (LSP) failure. Based on the adaptive LSP detection model, the network delay and thedetection timeout are measured with loopback detection. According to the delay and timeout, this mechanism adaptively adjusts the detection period and schedules thetransmission of detection packets. The failure is quickly detected with a few detection packets. Experiments show the mechanism can find failure in required time, and the detection costs are lower than the fixed period detectioncosts.

    • References | Supplementary Material | Related Articles
    • A Proximity Effect Analysis of Rectangular Loss Transmission Line with Non-MQS Hypothesis
    • Xu Jun Xu Lv Yinghua Lv
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 10-13. DOI:10.13190/jbupt.200902.10.xuj
    • Abstract ( 2335 )     HTML       
    • The classic MQS methods can not be applied in proximity effect analysis in high frequency. To solve the problem, a method used to analyze the proximity effect in rectangular loss transmission line is proposed and applined in full transverse electromagnetic frecuency Additionally, AC resistances are calculated to correct the parameters in telegraphist’s equation, so it is feasible to do transmission characteristics analysis in wide band. Simulations show that this method has a good precision in currents distribution and AC resistance calculation.

    • References | Supplementary Material | Related Articles
    • Analysis on Detection Probability Based Primary User Localization Algorithm in Cognitive Radio Networks
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 14-19. DOI:10.13190/jbupt.200902.14.mazhy
    • Abstract ( 3308 )     HTML       
    • A detection probability based iterative localization algorithm using weighted least square is proposed to solve the secondary users' problem of locating the primary users in cognitive radio networks. the primary users' transmission modal is described as a 2-state Markov modal and ennergy detection is used by secondary users for sensing.The proposed algorithm leverages the cooperative spectrum sensing to locate the primary users and is working transparently to the primary system. Furthermore, the proposed localization algorithm is able to acquire the three-dimensional position information of the primary user. Next, a simplified version of the algorithm is introduced to reduce the complexity. We have also conducted theoretical evaluation and obtained the Cramer-Rao lower bound (CRLB) in terms of the mean square error of the algorithm. Simulationshow that the performance of the improved algorithm approaches the CRLB and is able to estimate the three-dimensional positions of the primary user effectively and promote the lcalization precision.

    • References | Supplementary Material | Related Articles
    • Performance Evaluation of Service-oriented Hybrid Switched Optical Networks
    • Chen Xiu-Zhong
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 20-23. DOI:10.13190/jbupt.200902.20.chenxzh
    • Abstract ( 2503 )     HTML       
    • A hybrid switched optical network based on service plane is proposed for improving the adaptability of optical network. Service plane can choose different switch mode according with service type. Optical burst swiching(OBS )is chosen for burst and packet-oriented services;while optical circuit swiching(OCS)is chosen for the services requiring hinh bandwidth and guaranteed quality of service(Qos)Analyses and simulations show that the model is valid,and the performance of net-work can be improved

    • References | Supplementary Material | Related Articles
    • Cracking automatic extraction of pavement based on connected domain correlating and Hough transform
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 24-28. DOI:10.13190/jbupt.200902.24.liuff
    • Abstract ( 2000 )     HTML       
    • An automation extraction method for the pavement cracking with joints is propose d. It includes image preprocessing, cracking extraction algorithm based on segment connecting and joint filtering algorithm based on Hough transform. In image preprocessing, partially overlapped subblock histogramequalization (POSHE) is used to enhance the contrast of the image, it is more locally adaptive than that of the conventional histogram equalization. The binary image is obtained by a method called “localglobal matching” and high frequency emphasis. In cracking automation extraction, an automatic recognition algorithm based on connected domain correlating is proposed, it joints correlated cracking segments as one and extracts the cracking in pavement image with lots of texture noise. The result of cracking detection is finally obtained by removing joint on pavement, that is based on Hough transform. Experimental results demonstrate that the proposed cracking recognition method can accurately detect cracks on cement pavement with jint, and meets the requirements of the realtime processing..

    • References | Supplementary Material | Related Articles
    • New Algorithm for Inverse Kinematics Analysis of General 6R Serial Robot
    • Ni zhensong
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 29-33. DOI:10.13190/jbupt.200902.29.nizhs
    • Abstract ( 2733 )     HTML       
    • Conformal geometric algebra (CGA) and Dixon resultant are introduced to the inverse kinematics analysis of the serial mechanisms and to the inverse solution of the general 6R robot. First, it shows that homogeneous transforms matrix in terms of CGA will lead to CGA form kinematics equations of 6R robot; Second, the resultant is obtained by using linear elimination and Dixon elimination to eliminate 5 variables; Finally, a 16th degree equation containing a variable is properly derived from the resultant. This algorithm also can be applicable to the inverse kinematics analysis of the robots with 16 roots such as 7R, 1P5R and 4R1C, so it has universal usage.

    • References | Supplementary Material | Related Articles
    • A hybrid cooperative relay selection algorithm for relay based cellular networks
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 34-38. DOI:10.13190/jbupt.200902.34.jiangf
    • Abstract ( 2813 )     HTML       
    • A hybrid cooperative relay selection algorithm (HCRSA) is presented for relay based cellular networks. According to current user density in a certain cell, when twohop transmission mechanism is adopted, HCRSA will be adapted selectively between two different cooperation schemes. These are realized either between the parallel transmission between the base station and a relay node or by adopting parallel transmission between another mobile terminal and relay node. Simulations demonstrate that, compared with fixed relay selection schemes, HCRSA can dynamically choose different cooperative strategies according to current user condition in the cell by fully utilizing cooperative communication so as to increase effectively the user capacity and as to improve system performance as well.

    • References | Supplementary Material | Related Articles
    • Two Satellites Positioning Method of AGPS with Marquardt Algorithm
    • Li Ji-Zhong Mu-Qing Li Xiao Ye Li
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 39-42. DOI:10.13190/jbupt.200902.39.lijzh
    • Abstract ( 2777 )     HTML       
    • A positioning algorithm based on two satellites was studied in assisted Global positioning system (AGPS) in order to realize positioning efficiently in weak signal to capture satellite and to provide auxiliary data more quickly. The positioning solution was used with Marquardt algorithm in which the step factor is used and adaptively adjusts according to the change of objective function. The errors caused in solving the singular equation groups with GaussNewton algorithm can be removed using this algorithm. The mean positioning bias can be decreased from 703. 24m to 116.63m when there exist two overlapped satellites in two measures or from 108.93m to 32.17m when only one overlapped satellite, but the computation increases only a little.

    • References | Supplementary Material | Related Articles
    • SelfInteraction Effects Analysis of UltraWide Spectrum

      High Power Microwave of Lower Frequency Side in Lower Ionosphere

    • Yu Dong-fang ZhOU chang-feng zhang
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 43-46. DOI:10.13190/jbupt.200902.43.yudj
    • Abstract ( 2848 )     HTML       
    • Based on the radiowave propagation theory and high power microwave (HPM) atmosphere propagation mechanism in ionosphere, the selfinteraction effects of ultrawide spectrum HPM of lowerfrequency side are analyzed. The formulae for selfinteraction factor are obtained in the case of intense field. And the influences on selfinteraction effects caused by the electricfield intensity, the radiowave frequency, the electron collision frequency, the electron density and the propagating distance, are also discussed. Simulations show that the selfinteraction effects will appear more obviously with the increase of the amplitude of the initial field intensity, the frequency of ultrawide spectrum HPM, the density of electron density, and the propagation distance. .

    • References | Supplementary Material | Related Articles
    • Iterative detector based on grouped signals for MIMO <SPAN lang=EN-US style=
    • Jun-feng Hu
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 47-51. DOI:10.13190/jbupt.200902.47.yangy
    • Abstract ( 2715 )     HTML       
    • Based on the grouped signals and iterative detections, both parallel and serial iterative detectors are proposed for multipleinput multipleoutput (MIMO) wireless systems. The iterative detectors use the soft information obtained from last detection to get the mean of the interference signals and the coefficients of the whitening filter. Thus the iterative detector can greatly reduce the biterror rate. Between the iterations, the random grouping algorithm can further reduce the biterror rate. Simulation shows that the maximum parallel iterative groups a posterior detector (PIGMAP) and has a good balance between the system performance and the detection delay and the complexity. So PIGMAP will be a promising choice in practice use.

    • References | Supplementary Material | Related Articles
    • Performance Analysis of Fractional Incremental Relaying Protocol in Wireless Communications

    • Lan Shao
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 52-56. DOI:10.13190/jbupt.200902.52.longh
    • Abstract ( 2299 )     HTML       
    • A cooperative protocol termed as fractional incremental relaying (FIR) is firstly presented to achieve higher spectral efficiency for wireless communications. In FIR protocol, when direct transmission of a packet fails, the relay node divides the received packet into several subblocks and transmits one by one as needed instead of the entire packet. Both analysis and simulation demonstrate that the proposed FIR protocol can achieve less average transmission duration and higher spectral efficiency than the traditional incremental relaying protocol does.

    • References | Supplementary Material | Related Articles
    • Security Situation Evaluation of Intrusion Tolerant System
    • QIN Hua-Wang Yue-Wei DAI Zhi-Quan WANG
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 57-61. DOI:10.13190/jbupt.200902.57.qinhw
    • Abstract ( 2743 )     HTML       
    • According to the features of intrusion tolerant system compared to ordinary network system, an evaluating the security situation special for intrusion tolerantsystem is proposed. Three evaluation indexes are included: firstly, the confidentiality of data, the integrality of data and the usability of service are proposed based on the influence of intrusion and the function of intrusion tolerance. Secondly, the ways of quantifying the indexes are given according to the features of each index, and thirdly, the security situation of intrusion tolerant system is evaluated dynamically through computing the three evaluation indexes. Experiment shows that the method is easy to be operated, and reflects the actual security status of intrusion tolerant system.

    • References | Supplementary Material | Related Articles
    • Adaptive Topology Inference Technique Based on IPDV
    • Zhao Hong hua
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 62-65. DOI:10.13190/jbupt.200902.62.zhaohh
    • Abstract ( 2774 )     HTML       
    • In order to reduce the limits of time synchronization and cooperation between nodes and reduce the measurement traffic in topology inference techniques based on tomography, a selfadaptive measurement method that measured delay variation and a selfadaptive topology inference algorithm based on delay variation are put forward. The feasibility and correctness of selfadaptive topology inferencealgorithm based on delay variation are analyzed. The algorithm is validated through simulations by NS2. The simulation indicates that the selfadaptive topology inference algorithm based on delay variation can infer network topology better than the topology inference based on one way delay and had little limit.

    • References | Supplementary Material | Related Articles
    • On Assisted GPS Doppler Characterization
       
    • YAN Xiao-Tian
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 66-70. DOI:10.13190/jbupt.200902.66.yanxt
    • Abstract ( 3538 )     HTML       
    • A global positioning system(GPS) Doppler frequency shift estimation method in earth centered earth fixed(ECEF) frame was proposed. A GPS Doppler model was constructed by using geometric scalar analytic approach, considering the fact that observer is not necessarily on the ground trace of the satellite. In addition to the modeling and computation of orbital angular velocity, visible window of satellite, and the maximum elevation earthcentered angle, Doppler's characterization with regard to the observing time was deduced and analyzed. Applications in real time Doppler frequency shift related parameters estimation on assisted GPS(AGPS) receiver verify the feasibility and performance of the presented method.

    • References | Supplementary Material | Related Articles
    • A New Trust Management Model for P2P Networks
       
    • Li Jia-lun
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 71-74. DOI:10.13190/jbupt.200902.71.lijl
    • Abstract ( 2889 )     HTML       
    • In peertopeer(P2P) networks, there are not trusted authorities, Trust relations between peers cannot be establish with traditional methods. A new trust model for P2P networks is described, in which trust relations between peers are set up upon reputations. Utilizing fuzzy theory, it can be customizable. Also utilizing time grouping, it presents a concrete but concise method to solve the time relativity problems. After storing the reputation information of each peer in its neighbors, it will reduce the network traffic and delay problems.

    • References | Supplementary Material | Related Articles

    Reports

    • Adaptive Design for Quasi-Orthogonal Space-Time Block Codes
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 85-88. DOI:10.13190/jbupt.200902.85.dongy
    • Abstract ( 2852 )     HTML       
    • To achieve full diversity and decrease decoding complexity, an adaptive design for quasiorthogonal spacetime block codes is proposed. Known of channel state information, the adaptive parameter can be calculated, and the input symbols can be coded in the designed structure. With the particular spacetime codes structure, symbols on different antenna are orthogonal to each other, and the received symbols can be singlesymbol decoded. Simulation shows that the adaptive scheme has obvious advantage compared with constellation rotation scheme. The limited feedback scheme is feasible and has almost the same optimal performance as the ideal full feedback scheme.

    • References | Supplementary Material | Related Articles
    • An Improved Cyclic Spectrum Detection Algorithm in CR Systems
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 89-92. DOI:10.13190/jbupt.200902.89.yugc
    • Abstract ( 2476 )     HTML       
    • A new orthogonal frequency division multiplexing (OFDM) cyclic spectrum detection scheme is presented based on intended signature. Compared with original schemes, the proposed scheme will improve the detection performance under condition of a lower signalnoiseratio and unincreased detection duration. This scheme enhances the robust of against noise uncertainty effectivelyand gets a robustly result of detecting weak signals and improves the detection performance.

    • References | Supplementary Material | Related Articles
    • A MultiPriority Algorithm with RTS MultiReservation and Contention Window SelfAdaptive Adjusting in WLAN

    • ZHU Ying Mu-Qing Li
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 93-96. DOI:10.13190/jbupt.200902.93.zhuy
    • Abstract ( 2934 )     HTML       
    • To protect quality of service(QoS) of high priority data stream in wireless local area networks(WLAN), a multipriority algorithm named multiple reservation dynamic content window(MRDCW) is proposed. First, it adopts request to send(RTS) multiple reservation priority differentiating to decrease the influence to high priority data stream by low priority data load increasing, and then a model is built to verify effectiveness. Second, different priority access category adjusts self contention window adaptively based on channel access status to decrease the influence to high priority data stream by high priority data load increasing. Simulation proves that MRDCW can be adapted to various network statuses and to throughput of high priority stream protection.

    • References | Supplementary Material | Related Articles
    • User-aware Web QoS Parameters and Measurement
    • LIU Feng
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 97-100. DOI:10.13190/jbupt.200902.97.liuf
    • Abstract ( 2112 )     HTML       
    • World wide web traffic protocols and details are analyzed with measurements. A group of quality of service (QoS) parameters of web traffic are proposed. These parameters focus on highlayer and endtoend QoS. They can reflect users' feelings when visiting websites and can also give technical details on reasons of such feelings. Concept and algorithm of each parameter are described. The relationships among each parameter, existing parameters and userfeelings are analyzed. Active measurements on practical web traffic are performed during recording these parameters. The useraware web QoS is analyzed correspondingly. Measurement shows that given parameters can reflect useraware web QoS better than existing ones.

    • References | Supplementary Material | Related Articles
    • Network Traffic Analysis Based on LogInfinitely Mobile Networks
    • Zou De-Bin
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 101-105. DOI:10.13190/jbupt.200902.101.zoudb
    • Abstract ( 2355 )     HTML       
    • According to the loginfinitely divisible cascades framework introduced from the analysis of turbulence scale, this thesis analyses the multiscale character of wirelesspacket network traffic gathered in mobile operations' network, sampled with general packet radio service (GPRS) found that the actual GPRS traffic conforms to the loginfinitely divisible cascades framework; Further more aspects of analysis on wirelesspacket flow data are accomplished based on this method, found that log infinitely divisible cascades (LIDC) is very effective on analysis of wirelesspacket traffic multiscale character. The LIDC can depict the scalecharacter in the fullrange scale of traffic, as well as it can differentiate the valid range within a specific scale. And more, based on this framework, this thesis's analysis shows that the scale of wirelesspacket traffic complies with powerlaw, monoscale and scaleinvariance.

    • References | Supplementary Material | Related Articles
    • A Hierarchical Routing Algorithm in ION

    • shanguo huang LI Bin wanyi gu Weihua Lian
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 106-110. DOI:10.13190/jbupt.200902.106.luop
    • Abstract ( 2635 )     HTML       
    • The hierarchical routing infrastructure in intelligent optical network (ION) is researched. Two algorithms called dynamic hierarchical balancing routing algorithm (DHBR) and dynamic hierarchical routing algorithm based on optimized gateways (DHROG) are proposed in which the resource coordination, the balance for interdomain links and the gateway nodes are considered based on fixed alternate hierarchical routing. Simulation shows that the average block probability of the network can be reduced effectively with acceptable time performance by these algorithms.

    • References | Supplementary Material | Related Articles
    • Up-link Multi-user detection in CDMA system based on blind source separation
    • FU Wei-Hong Xiao-Niu Yang Nai-An Liu Xing-Wen Zeng
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 111-114. DOI:10.13190/jbupt.200902.111.002
    • Abstract ( 2726 )     HTML       
    • Based on the analysis of the signal model in code division multiple access (CDMA )system, a multiuser detection algorithm based on blind source speration (BSS) is proposed. The algorithm made full use of the independency of the user's information. Simulations show that, with the same signaltonoise ratio, the symbol error ratio (SER) of the proposed is about half of that of the minimummeansquare error (MMSE) algorithm. When the power ratio of the interference user to the expected user (orinterferencetosignal ration, ISR) is 40?dB, the SER of the algorithm is two order lower than that of the MMSE algorithm. Furthermore, the higher ISR is, the greater the degree of improvement of the ability of antinear far effect in the new algorithm.

    • References | Supplementary Material | Related Articles
    • Analysis and improvement of a Perfect Concurrent Signature Protocol
    • Jiang Han Qiuliang Xu 忠 张
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 115-118. DOI:10.13190/jbupt.200902.115.jiangh
    • Abstract ( 2422 )     HTML       
    • A perfect concurrent signature protocol proposed by Huang et al in 2007 is analyzed. Two attacks are given out to show that there are two weaknesses in Huang's protocol: firstly, both participators A and B can change the signed messages after the concurrent signature protocol is completed; secondly, both A and B can forge a concurrent signature themselves. To prevent such forgery attacks, an improved protocol is proposed by adding authentication to the keystone information, and then the security of the improvement is analyzed.

    • References | Supplementary Material | Related Articles
    • Scheduling Algorithm of Multi-Level Services Based on T-MPLS Network
    • Chang Cao Yong-jun Zhang LI Bin shanguo huang wanyi gu
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 119-122. DOI:10.13190/jbupt.200902.119.caoch
    • Abstract ( 2836 )     HTML       
    • An algorithm is proposed for scheduling different types of services and for improving bandwidth utilization of links in transport multiprotocol label switching network. This algorithm is implemented in a simulation testbed based on OPNET modeler for performance evaluation. Simulation is shown that, compared with traditional scheduling algorithms, the complexity of this algorithm is notincreased. And a better timedelay performance of the high class services is also verified.

    • References | Supplementary Material | Related Articles
    • Resource Allocation Scheme for Multiuser Power Communication OFDMA-SDMA Downlink
    • XU Zhi-qiang Ming-yue ZHAI
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(2): 123-127. DOI:10.13190/jbupt.200902.123.003
    • Abstract ( 2367 )     HTML       
    • The resource allocation model for downlink multiuser power communication orthogonal frequency division multiple access spatial division multiple access (OFDMASDMA) system is studied with the restrictions of requirement bit number for each user and power upper limit as well as specifically bit number for every subchannel in every orthogonal frequency division multiple (OFDM) symbol. An algorithm for power adaptation resource dynamic allocation with bitloading seeking table and exchanging adjustment is proposed based on user spatial orthogonality and priority. Simulation shows the proposed algorithms in power special wireless communication environment, and indicates that the proposal improves spectral efficiency significantly while maintaining quality of service guarantees and certain fairness.

    • References | Supplementary Material | Related Articles