Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • Performance Analysis of Access Strategy Based on Spectrum Pool in Cognitive Network
    • LIU Hong-Jie Shu-fang LI
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 1-4. DOI:10.13190/jbupt.200901.1.007
    • Abstract ( 3193 )     HTML       
    • To improve spectrum utility efficiency, a new strategy of dynamic spectrum access is developed in cognitive wireless network. This strategy, based on spectrum pool, has higher access efficiency than instant manners. The optimal capacity and update time of spectrum pool are all studied. It is found that there is quantitative mathematical relationship between optimal capacity and system efficiency. Different update strategies of spectrum pool in licensed and unlicensed frequency bands are also proposed. Simulation manifests that, under the assumed conditions, the update interval will vary within one hour in most cases.

    • References | Supplementary Material | Related Articles
    • A Pipeline Leakage Diagnosis For Fusing Neural Network and Evidence Theory
    • CHEN Bin WAN Jiang-wen WU Yin-feng QIN Nan
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 5-9. DOI:10.13190/jbupt.200901.5.chenb
    • Abstract ( 2483 )     HTML       
    • For reasons of low accuracy of traditional leakage, a pipeline leakage diagnosis method based on neural networks and evidence theory is presented by introducing wireless sensor networks and information fusion theory. Two sub-neural networks are established at normal node to simplify network structure. The leakage characteristic parameters of negative pressure wave and acoustic emission signals are used as input eigenvector respectively for primary diagnosis. Through making preliminary fusion results as the basic probability assignment of evidence, the impersonal valuations are realized. Finally, all evidences are aggregated at normal and sink node respectively by using the improved combination rules. The method makes full use of redundant and complementary leakage information. Numerical example shows that the proposed improves the leakage diagnosis accuracy and decreases the recognition uncertainty

    • References | Supplementary Material | Related Articles
    • High Spectral Efficient Bi-Directional Successive Relaying Technique
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 10-13. DOI:10.13190/jbupt.200901.10.yangb
    • Abstract ( 3106 )     HTML       
    • In wireless multi-hop networks, the nodes operate in half-duplex modes. This leads to a loss in spectral efficiency (throughput). A relaying method that increases the achievable throughput by applying physical network coding over bi-directional traffic flows is proposed to avoid this loss. Such a method is termed as Bi-directional Successive Relaying based on Physical Network Coding (PNC-BSR). While physical network coding significantly enhances the throughput performance of wireless multi-hop networks by embracing the wireless interference, this method will combine the cooperation among nodes and further improves network throughput. Experiments show that PNC-BSR offers a superior throughput performance under low noise levels.
    • References | Supplementary Material | Related Articles
    • A Network Coding-aware Routing Protocol in Wireless Mesh Network
    • Tuan-Fa QIN Su-yun LIAO Hui-ping Luo Zhi-yi LIANG
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 14-18. DOI:10.13190/jbupt.200901.14.006
    • Abstract ( 3128 )     HTML       
    • Due to the effect of routing strategy and wireless interference on the throughput of wireless Mesh networks, traditional routing protocol based on the shortest path cannot achieve good performance. Thus, a routing protocol of wireless Mesh network based on network coding in unicast communications is presentedBy introducing a conditional links costs, the Markovian model is adopted to design the routing metric which models the cost of a path as the cost of the first hop plus the cost of the second hop conditioned on the first hop, and so onA path with the lowest conditional cost is chosen to transmit the network-coded packetsThe simulation results show that the optimized routing metric can take better advantage of network coding while saving the network resource, as well as that the actual network throughput can be increased to about 20%

    • References | Supplementary Material | Related Articles
    • A Method of Path Selection for MPLS Traffic Engineering to Minimize Preemption
    • HE Xiao-Ming Tang-Hong Ye-Wu
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 19-23. DOI:10.13190/jbupt.200901.19.hexm
    • Abstract ( 2814 )     HTML       
    • A universal mathematical model for path selection to minimize preemption is established. The objective function for minimizing preemption cost is given. And a new method based on the selected path to minimize preemption is proposed. It lets, in priority, the label switched pathsLSPs share more segments of links with the selected path and, in selecting LSPs to be preempted, also cross through the whole network with fewer segments of links so that the overall preemption cost is less. Simulations show that the proposed can gain less preemption cost along the given path than in only considering single segment of link, it can approximate the optimization of the objective function for minimizing preemption cost simultaneously. It has much less computational complexity and is easier to be implemented by router as well.

    • References | Supplementary Material | Related Articles
    • A Successive Interference Cancellation in Uplink OFDMA Systems and Performance Analysis
    • WANG Wei-Bing
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 24-28. DOI:10.13190/jbupt.200901.24.wangwb
    • Abstract ( 2762 )     HTML       
    • A successive interference cancellation (SIC) algorithm based on signal to noise ratio (SNR) is proposed to mitigate the interference in the uplink orthogonal frequency division multiple access (OFDMA)systems. An optimal permutation of the detection order based on post SNR can be first found for the orthogonality of columns in interference matrix. Performance degradation in OFDMA uplink with CFOs is analyzed. Compared with other interference cancellation algorithms, there is no need for pseudo inverse operation. The algorithm is optimized on the means of SNR of all subcarriers in OFDMA systems and also applied in generalized carrier assignment scheme (CAS). The validity of the proposed algorithm is proved to be validated by numerical simulations.
    • References | Supplementary Material | Related Articles
    • A Data Aggregation Algorithm Based on Confidence Interval in Wireless Sensor Networks
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 29-33. DOI:10.13190/jbupt.200901.29.xuxf
    • Abstract ( 2441 )     HTML       
    • For reducing energy consumption is essential for the life of wireless sensor networks, a confidence interval banding taboo-level of data aggregation protocol for long-lived sensor network is proposed. Considering that the intra-cluster data taking on Gaussian distribution characteristics, confidence interval banding taboo-level of data aggregation (CBTA) makes data sampling confidence interval compared with the total model, that can be effective in reducing the amount of data being sent. In order to avoid hot collected in cluster, taboo algorithm is used for sampling data to calculate the taboo-level. Compared with the previous related research, CBTA adopts new data sending model using spatial correlation of data, that will handle the energy efficiently better. Experiments show that CBTA can satisfy the desired accuracy given by system and the life of network is proved significantly lengthened.
    • References | Supplementary Material | Related Articles
    • New Method of High-Level Test Synthesis
    • Sun Qiang guangsheng MA
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 34-38. DOI:10.13190/jbupt.200901.34.005
    • Abstract ( 2351 )     HTML       
    • A high-level test synthesis based on genetic algorithm is proposed. This can give consideration to the testability problem in process of scheduling, module allocating and register allocating. Meanwhile, a chromosome coding of genetic algorithm is proposed, it can be used for high-level scheduling and module allocating simultaneously. A one point crossover operator based on data dependence and a mutation operator based on control step constrain are designed avoiding generation of infeasible solutions. The efficiency of testability improvement has been demonstrated by experiment.
    • References | Supplementary Material | Related Articles
    • A Privacy-Preserving Triangle Inequality Determination Protocol and Its Applications
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 47-51. DOI:10.13190/jbupt.200901.47.luoshsh
    • Abstract ( 2207 )     HTML       
    • In triangle determination, if the side information is confidential to others, and provided by different users, it is the privacy-preserving triangle shape determination problem without solution by traditional method. By using scalar product protocol, a privacy-preserving triangle inequality determination protocol based on semi-honest is proposed, and the correctness, security and complexity are analyzed. The solution to privacy- preserving triangle shape determination problem and privacy- preserving vector comparison problem are proposed.
    • References | Supplementary Material | Related Articles
    • The Receding Horizon Optimal Control Based on Neural Network
    • REN Huaiqing Liang Y C Liang
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 56-59. DOI:10.13190/jbupt.200901.56.renhq
    • Abstract ( 2469 )     HTML       
    • By combining the method of inverse neural control with receding horizon optimal control technology,a scheme of receding horizon optimal controller based on neural network bearing predictive capability is proposed,the structure design of the controller and the realization algorithm are also given. The controller is used to control a noninear uncertain system.Simulation indicates that the controller is effective in controlling a general class of nonlinear systems.
    • References | Supplementary Material | Related Articles
    • Privacy Preserving Self-certified Signcryption Scheme in Trusted Modules
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 60-64. DOI:10.13190/jbupt.200901.60.zhangmw
    • Abstract ( 2692 )     HTML       
    • Message trustworthy and behavior trustworthy are crucial between trusted computing modules. To overcome the key escrow problem and the secure channel issue between trusted computing modules that seem to be inherent to ID-based signcryption, an efficient ID-based self-certified signcryption scheme(IDTSC) is proposed, which can resist on dishonest CA’s forging and colluding attacks in TPM channel. Security models, including confidentiality, unforgeability, ciphertext anonymity, and dishonest CA tractability, are discussed. The proposed scheme can be used in secure and anonymous transfer requirements such as privacy preserving and identity hiding.
    • References | Supplementary Material | Related Articles
    • Network Flow Identification Based on Machine Learning
    • Guochu Shou Yihong Hu
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 65-68. DOI:10.13190/jbupt.200901.65.mayl
    • Abstract ( 2549 )     HTML       
    • Machine learning with C4.5 algorithm is proposed for network traffic identification. The correlation feature selection algorithm and the genetic algorithm are adopted to select the attribute feature subset. A method of combining N-fold cross-validation with testing set is suggested to assess the classification results of the current national broadband network traffic. Experiments demonstrate that network traffic can be successfully identified and analyzed, meanwhile, the port number and the application layer protocol label of network flows are not necessary to be known in advance.
    • References | Supplementary Material | Related Articles
    • Dynatic Spectrum Sharing Strategy in Cognitive Radio Systems
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 69-72. DOI:10.13190/jbupt.200901.69.qiuj
    • Abstract ( 2861 )     HTML       
    • A repeated game theory based distributed dynamic channel selection and power control algorithm for dynamic spectrum sharing in cognitive radio network was proposed. Without interfering with primary users, each cognitive user could select channels along with transmission power when considering its specific QoS requirements and local information. The proposed algorithm can make an efficient trade-off between system spectrum efficiency and user QoS requirement, and exhibits rapid convergence. It can meet the user-specific QoS requirement to the full extent and especially suites for heterogeneous networks.
    • References | Supplementary Material | Related Articles
    • An FFT Accelerated Iterative Robin Boundary Condition for 3D Rough Surface Scattering
    • LIU Peng
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 77-80. DOI:10.13190/jbupt.200901.77.liup
    • Abstract ( 2532 )     HTML       
    • In the case of planar structure such as large-scale rough surface, most time consuming of the iterative Robin boundary condition (IRBC) evaluation is spent on the planar fictitious boundary. To reduce the computation complexity of the IRBC, a field integral equation is written as the 2-dimensional convolution form and gets solved efficiently by using the fast Fourier transform (FFT). The formulation of its mechanism is presented. And a simulation with finite element method of the electromagnetic scattering from 3-dimensional random rough surface is shown for the accuracy and efficiency.
    • References | Supplementary Material | Related Articles
    • The Scheduling Mechanism Based on Energy-varying and Detecting-probability in Sensor Networks
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 85-89. DOI:10.13190/jbupt.200901.85.lij
    • Abstract ( 1903 )     HTML       
    • A scheduling mechanism is presented based on energy-varying and detecting-probability in sensor networks. It ensures the relatively uniform energy consumption among nodes during the scheduling by adjusting the scheduling period according to the amount of the energy-varying in nodes, and simultaneously fulfils the uniform distribution of the scheduled nodes by adopting the distribution scheduling based on the local information of nodes in networks. Taking the distribution of the practical information in survey area into account, the mechanism enhances the accuracy of the collected information by introducing the detecting-probability model in networks nodes and guarantees the services degree for application. The superiority and reliability of the mechanism are testified in theoretic analysis and simulation experiment.

      .

    • References | Supplementary Material | Related Articles
    • A Distributed Target Tracking Algorithm for Wireless Mobile Sensor Networks
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 90-94. DOI:10.13190/jbupt.200901.90.009
    • Abstract ( 2515 )     HTML       
    • In order to satisfy the application request for target tracking in wireless mobile sensor networks(WMSN), a distributed target tracking algorithm is presented. This algorithm includes two parts, one is using node leading to ensure the dynamic connectivity of WMSN, and the other is combining average consensus filter with traditional distributed data fusion architecture to realize the optimizing distributed data fusion with low cost of communication. Simulations show that target tracking effect of the proposed algorithm is good in WMSN and the performance of data fusion is better than traditional distributed data fusion algorithm.

    • References | Supplementary Material | Related Articles
    • Multiuser Diversity in Decode-and-Forward Cooperative Relay Networks
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 95-98. DOI:10.13190/jbupt.200901.95.chenshp
    • Abstract ( 2455 )     HTML       
    • The performance of multiuser diversity in cooperative relay networks is analyzed. Closed-form expressions of outage probability and symbol error probability for decode-and-forward (DF) based cooperative relay networks are derived. The deduction is validated by simulations which show that a (M+1)K-fold diversity gain can be achieved when adopting multiuser diversity based scheduling (where M is the number of available relay users and K is the number of accessing users). These results demonstrate that, in cooperative relay networks, both relay users and accessing users are source of the multiuser diversity gain.
    • References | Supplementary Material | Related Articles

    Reports

    • Protocol for Privacy preserving Set Pattern Matching with Unconditionally Secure
    • ZHENG Qiang
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 99-102. DOI:10.13190/jbupt.200901.99.004
    • Abstract ( 2516 )     HTML       
    • To overcome the inadequate of the existed protocols for privacy preserving set operation that almost comes from homomorphic public-key encryption in the cryptographic model. A protocol for privacy preserving set pattern matching, based on the secret sharing scheme and the technique of representing sets as polynomials, is proposed. Assuming that all players are semi-honest, and less than players collude, the set pattern matching is correctly computed by this protocol. Since the presented protocol is based on information theoretic model, it is unconditionally secure.
    • References | Supplementary Material | Related Articles
    • Implementation of Fountain Codes based on Logistic map
    • HUANG Cheng YI Ben-Shun
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 103-107. DOI:10.13190/jbupt.200901.103.huangch
    • Abstract ( 2549 )     HTML       
    • An implementation based on Chaos Theory is proposed to solve the problem of recovering the degree and the neighbor relations in encoding packets of fountain codes. Considering the composite Logistic map and its phase space character and using the initial values of the chaotic formula as public keys, the proposed implementation can synchronize the degree and the neighbor relations without extra packet costs. Simulation is done to verify the conclusion.
    • References | Supplementary Material | Related Articles
    • Application of Graph Theory in Threat Situation Analysis of Network Security
    • CHEH Tian-Ping
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 113-117. DOI:10.13190/jbupt.200901.113.chentp
    • Abstract ( 2787 )     HTML       
    • A new threat situation analysis based on the network graph model is presented. The attack cost of adjacent nodes is defined, and the multi-attribute utility theory is adopted to quantify its value. The graph edges are endowed with the weight representing the attack cost, and the threat situation of network node is also analyzed by the shortest accessible path arithmetic. The case study demonstrated that the method is concise and effective, that will help to optimize the safety strategy.
    • References | Supplementary Material | Related Articles
    • Time Synchronization Algorithm for MIMO OFDM Systems
    • ZHANG Jian-hua, FENG Chong LIU Yi, ZHANG Yan-yan
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 118-121. DOI:10.13190/jbupt.200901.118.008
    • Abstract ( 2370 )     HTML       
    • A time synchronization method using shift-orthogonal Constant Amplitude Zero Auto Correlation (CAZAC) sequences constructing the time synchronization preamble is designed for multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) systems. Owning to the unique properties of the designed synchronization preamble, the use of a symmetrical-correlator at the receivers can generate unit pulses for different transmitters to detect the time offsets of each antenna element. The performance of the proposed is compared with traditional methods on the condition of different time offsets in simulations, it can be found that the proposed scheme will provide higher accuracy than that caused by the distributed transmitters when detecting the different time offsets.

    • References | Supplementary Material | Related Articles
    • Nonlinear Narrowband Interference Suppression Based on QR Decomposition without Root Computation
    • SUN Yong-jun; Bin Tian ;YI Ke-chu<SPAN lang=EN-US style=
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 122-125. DOI:10.13190/jbupt.200901.122.sunyj
    • Abstract ( 2444 )     HTML       
    • In order to improve the performance of antijamming for various interferences, an adaptive nonlinear algorithm using Givens rotation orthogonal decomposition is developed. The traditional Givens rotation algorithm involves root computation that needs more hardware resources, a Givens rotation algorithm without root and division computation is presented. And ,combined with special structure of input signal matrix, a interference suppression algorithm with low computation is proposed. The narrowband interferences are modeled as AR process and digital signal.
    • References | Supplementary Material | Related Articles
    • Trust-Management Famework in open network
    • Luo Xin
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(1): 126-130. DOI:10.13190/jbupt.200901.126.luox
    • Abstract ( 2687 )     HTML       
    • In open network, the usage and fuzzy set theory have been used to model the issues of trust management. The definition of trust class and the algorithm of trust-computing are discussed. By presenting the affinities coefficient, the derivation algorithm of trust has a good ability of shielding on malicious nodes. At the same time, the problem of how to define the malicious nodes and how to init the trustworthiness of the nodes are resolved. The cloud model is extended to define the trust model in formation and the parameters are discussed in detail. By proving the time decay coefficient and usage effecting coefficient, the fuzziness and dynamic variation characters are considered and resolved. The experiments are also designed to evaluate the correctness and performances of the proposed algorithm.

    • References | Supplementary Material | Related Articles