Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • Five Precision Points Path Synthesis of Planar Four-Bar Linkage Using Algebraic Method
    • HUANG Xi-guang,LIAO Qi-zheng,WEI Shi-min,XU Qiang
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 1-4. DOI:10.13190/jbupt.200802.1.huangxg
    • Abstract ( 2366 )     HTML       
    • The problem of synthesizing a planar 4-bar linkage with given two fixed pivots such that the coupler curve passes through five given points is considered with the Groebner-Sylevester hybrid approach. Firstly, the closed-form equations of the single point are constructed. Next, the reduced Groebner basis under degree lexicographic ordering for the closed-form equations is obtained using computer algebra. Selecting 23 Groebner bases from 89 ones, a 23×23 Sylvester’s matrix can be constructed. A 36th degree univariate equation is obtained directly from the determinate of the matrix. The same result can be obtained with continuation method. A numerical example is given and it verifies that the problem has at most 36 solutions in the complex field.

    • References | Supplementary Material | Related Articles
    • Study on Temperature Compensative Technique in Microwave Radiometer Detection System
    • SUN Hong-yan1,2 , ZHAO Kai1
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 5-9. DOI:10.13190/jbupt.200802.5.sunhy
    • Abstract ( 2382 )     HTML       
    • Aiming at nonlinearity measurement error of detection system caused by the change of the environment temperature, a new Chebyshev fitting algorithm is proposed for detection system temperature compensation. The temperature compensative technique can be validated by the post-correction output voltage curve and the correction output voltage curve showed in the same figure. The curves are gained when Square-law detector system works on the dynamic range. Utilizing soft data processing to implement the Chebyshev algorithm, not only the measurement error is decreased, but the system noise caused by the additional electron device is also eliminated. Using compensative technique in the microwave radiometer, the accuracy and linearity of such system is optimized, and the instrument is more reliable for the real-time observation on airborne or ground platform.

    • References | Supplementary Material | Related Articles
    • Electromagnetic Modeling of Micro Sensor Node
      for Wireless Sensor Network
    • WU Yin-feng1, WAN Jiang-wen2, FENG Ren-jian2
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 10-14. DOI:10.13190/jbupt.200802.10.wuyf
    • Abstract ( 2849 )     HTML       
    • Modeling radio frequency micro-electro-mechanical system (RF MEMS) device for electromagnetic analysis is difficulty, especially with small feature size and movable structures. A new electromagnetic modeling method, deformed alternating-direction implicit method finite difference time domain (DADI-FDTD), is proposed. The dynamic equation of motion is dispersed in time domain using finite difference methods (FDM). Numerical dispersion is discussed in the three-dimensional ADI-FDTD method. A new algorithm, dielectric interpolations, is presented, it is capable of solving the conflict of the time and special steps between the mechanical portion and electromagnetic (EM) portion. And it’s able to implement the EM modeling in time domain of complex three-dimensional structures. Simulation results demonstrate the feasibility of the method.

    • References | Supplementary Material | Related Articles
    • A Network Traffic Classification Algorithm Based on Flow Statistical Characteristics
    • LIN Ping, YU Xun-yi, LIU Fang, LEI Zhen-ming
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 15-19. DOI:10.13190/jbupt.200802.15.linp
    • Abstract ( 2812 )     HTML       
    • Based on analysis of application protocols, a group of multi-flow characteristics with low complexity, high quality is proposed to mitigate the problem of low recognition rate and high implementation complexity associated with the traditional flow classification algorithms using single flow statistics. These characteristics can effectively identify peer-to-peer (P2P) traffic in network flow classification, and improve the recognition rate of the traditional algorithms. They also enable the use of multinomial logistic regression algorithm to classify the network flow, and reduce the complexity of the traditional algorithms. Experiment results show that the proposed characteristics can achieve good generalization, and only need a small number of training samples to get a model that can maintain good performance for a long time.

    • References | Supplementary Material | Related Articles
    • Research on the Optimal Algorithm for Trajectory Planning of a 9-DOF Hyper-Redundant Robot
    • JIA Qing-xuan, CHU Ming, SUN Han-xu, HONG Lei
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 20-25. DOI:10.13190/jbupt.200802.20.095
    • Abstract ( 2583 )     HTML       
    • Aimed at 9-degree of freedom(DOF) hyper-redundant module robot in intra-vehicular robot system, attention is given to the avoiding joint limits as an optimal mark. Two different iterative algorithms considering fault-tolerance for trajectory planning of redundant robot in Cartesian space are then proposed by using the method of differential locomotion. The first algorithm is for linear-path in which the pose of manipulator can be changed, the second is for circular-path in the plane decided by three noncollinear arbitrary points in the space. Experiments on the specimen robot platform are performed to validate the above algorithms. And the hyper-redundant robot’s actions, such as pulling drawers, grapping club-shaped stuff along linear-path and opening doors along circular-path are realized.

    • References | Supplementary Material | Related Articles
    • A (n-1, n) Threshold Quantum Secret Sharing Scheme Based on Entanglement Swapping
    • LIN Song1,2, QIN Su-juan1, CHEN Xiu-bo1, WEN Qiao-yan1, ZHU Fu-chen3
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 26-29. DOI:10.13190/jbupt.200802.26.lins
    • Abstract ( 2476 )     HTML       
    • Drawing idea from the quantum entanglement swapping, a quantum (n-1,n)threshold scheme is proposed. By local unitary operation and entanglement swapping, the sender can transmit the piece of secret to the participant. To ensure the qubits be transmitted between two parties in a secure manner,the sender switches randomly the message mode to control mode asymmetrically. A security analyses on this scheme is then made. It shows that this scheme is secure. Compared with the quantum secret sharing scheme with Greenberger-Horne-Zeilinger (GHZ) state, the scheme achieves a high efficiency. Furthermore, since the Einstein-Podolsky-Rosen (EPR) pair was used, the experimental realization of the protocol becomes feasible

    • References | Supplementary Material | Related Articles
    • Research of Publish/Subscribe Paradigm on Mobile Ad Hoc Networks

    • ZHAI Li-dong, LIU Yuan-an, MA Xiao-lei, GAO Jin-chun
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 30-33. DOI:10.13190/jbupt.200802.30.096
    • Abstract ( 2692 )     HTML       
    • The integration of the middleware based on Pub/Sub scheme and the multicast routing protocol of mobile Ad-hoc network was researched, and a multi-hop routing subscription protocol named publish/subscribe multi-hop routing (PSMR) was proposed. PSMR helps to distribute the publisher’s data to subscribers and cooperate with the layer of Pub/Sub scheme as well as the layer of routing work to distribute the data to make the transmission more reliable. Simulation conclusion shows that PSMR can greatly reduce the number of packet transmission.

    • References | Supplementary Material | Related Articles
    • MZDI Delay Time Optimization of a 40 Gbit/s DWDM DPSK System with 50 GHz Channel-Spacing
    • XIE Xing-chu, CHEN Xue, ZHOU Wei-qin, SHI She-ping
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 34-37. DOI:10.13190/jbupt.200802.34.xiexch
    • Abstract ( 2473 )     HTML       
    • The effect of channel-spacing on differential phase shift keying (DPSK) systematical performance was analyzed and optimized through VPItransmission maker simulation, aiming at the severe distortion of DPSK signal to narrow channel-spacing for its broad spectrum. It is found that the delay time of the DPSK Mach-Zehnder delay interferometer (MZDI)-demodulator will be less than 1-bit duration for the 40 Gbit/s dense wavelength-division multiplexing(DWDM) system with 50 GHz channel-spacing, and become shorter according to the narrower optical filter bandwidth. Furthermore, the system achieves the optimal transmission performance by matching the variation of the optical add-drop multiplexer (OADM) series, with a method of feedback controlling of the delay time according to the monitored transmission performance indications.

    • References | Supplementary Material | Related Articles
    • Link Scheduling with Fairness and Delay Guarantee in Multi-hop Wireless Networks
    • WANG Kun, PENG Mu-gen, WANG Wen-bo
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 38-41. DOI:10.13190/jbupt.200802.38.wangk
    • Abstract ( 2789 )     HTML       
    • The relationship between link scheduling scheme and the performance of user fairness and delay guarantee is detailed analyzed. In order to guarantee user fairness and reduce end-to-end delay, the concept of “link scheduling periods” and “link hop degree” are introduced. One suboptimal user fairness and delay guarantee link scheduling algorithm is proposed based on the user fairness optimization problem model. To guarantee the performance of system throughput, both the spatial reuse and link quality are considered. Theoretical analysis and simulation show that the proposed algorithm can enhance the performance of user fairness and delay effectively with a certain system throughput guarantee.

    • References | Supplementary Material | Related Articles
    • Incentive-Based Search Algorithm in Hybrid Peer-to-Peer Networks
    • GUAN Zhi-tao1, 2, CAO Yuan-da2, LI Jian3
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 42-45. DOI:10.13190/jbupt.200802.42.guanzht
    • Abstract ( 2718 )     HTML       
    • In peer-to-peer network, there exist lots of free riders, whose passive behaviors decrease the efficiency and reliability of search. A new search algorithm named credit model based restricted random walk (CMRRW), which is based on the credit model, is proposed to solve this problem. The credit model is applied to evaluate the reliability of the peers. The query reliability rate is gained to reflect the peer’s history query success rate and the routing efficiency of its neighbors. In our solutions, when the peer selects neighbors to forward the query message, the neighbors with higher credit and history hit rate will be selected in prior order. Simulation results indicate that CMRRW shows good performance.

    • References | Supplementary Material | Related Articles
    • A Fractional Frequency Reuse Scheme Supporting Generalized MIMO Technique
    • XU Fang-min1,2, TAO Xiao-feng1,2,WANG Ying1,2, ZHANG Ping1,2

    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 46-49. DOI:10.13190/jbupt.200802.46.xufm
    • Abstract ( 2800 )     HTML       
    • To improve cell-edge user (CEU) performance, a new soft fractional frequency reuse(SFFR) scheme is introduced. Unlike other frequency reuse schemes, it supports space diversity and space multiplexing because multi-cell and multi-CEU form a generalized multi-input multi-output (MIMO) system. On the other hand, CEU performance is improved by interference coordination through frequency programming based on soft fractional frequency reuse. It provides a good chance to use space multiplexing than space diversity. For getting a further performance, space multiplexing is adopted. In the meantime, cell-center users are still served by one cell. Simulation results show that the novel fractional frequency reuse scheme can support generalized MIMO technique and improve CEU performance significantly.

    • References | Supplementary Material | Related Articles
    • Research on Information Security Risk Analysis Model Using Information Entropy
    • TANG Yong-li1,2, XU Guo-ai1, NIU Xin-xin1, YANG Yi-xian1
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 50-53. DOI:10.13190/jbupt.200802.50.094
    • Abstract ( 2516 )     HTML       
    • According to the characteristic of uncertainty information in the information system risk analysis process, and information system risk measure using entropy theory, a risk analysis algorithm using entropy-weight coefficient is presented. When combining qualitative analysis and quantitative calculation, a model of information system risk analysis is constructed. Finally, an instance of the risk analysis approach based on the model is analyzed and validated, which demonstrates the rationality and feasibility of the model. So it provides a new method for information system risk analysis.

    • References | Supplementary Material | Related Articles
    • An Efficient Method for Analysis of Multilayer Plate Shielding Effectiveness
    • SHI Dan, SHEN Yuan-mao, GAO You-gang
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 54-58. DOI:10.13190/jbupt.200802.54.098
    • Abstract ( 2443 )     HTML       
    • A nonuniform transmission line is modeled for multilayer plates and an effective shielding is obtained by matrix theory. Owing to discontinuity of nonuniform transmission line, it is suited for modeling multilayer plates regardless of re-reflection between plates. Matrix presentation can benefit calculation using programming. A general formula applicable to analyze arbitrary multiplayer plates shielding is proposed. Special cases of double and fourfold shield are investigated. The accuracy of this method has been validated by comparison to other analytical methods.

    • References | Supplementary Material | Related Articles
    • Subcarrier Power Allocation in OFDM Multi-Hop Relaying System
    • LI Jia-ning, GUAN Lei, ZHANG Jian-hua, LI Xiao-fan, ZHANG Ping
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 59-63. DOI:10.13190/jbupt.200802.59.099
    • Abstract ( 2332 )     HTML       
    • Subcarrier power allocation in broadband orthogonal frequency division multiplexing(OFDM) relaying system is addressed for the nonregenerative and regenerative relaying mode. Firstly, based on the two-hop nonregenerative relaying system, an equivalent channel gain model for the two-hop regenerative relaying system is induced. Afterwards, the overall transmit power is allocated to the subcarrier pairs using water-filling approach. Finally, the above conclusions are generalized to the multi-hop relaying system. Simulation shows that the proposed power allocation algorithm can achieve a higher system capacity than both the direct transmission system and uniform power allocation scheme, and the multi-hop relaying system can efficiently enlarge the coverage.

    • References | Supplementary Material | Related Articles
    • An Attack on a Certificateless Signature Scheme and Its Improvement
    • CAO Xue-fei1, Kenneth.G.Paterson2, KOU Wei-dong1
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 64-67. DOI:10.13190/jbupt.200802.64.097
    • Abstract ( 2492 )     HTML       
    • That a presented proposal of efficient certificateless signature scheme is insecure against public key replacement attack is demonstrated. It is shown that an adversary who replaces the public key of a signer can forge valid signatures for the signer without knowledge of the signer’s private key. Then the scheme is improved by replacing the original public key with a public key pair. It enables a verifier to check the validity of a signer’s public key pair by simplifying the signature construction. The improved scheme is proven secure against existential forgery under the random oracle model.

    • References | Supplementary Material | Related Articles
    • Joint Relay Selection and Power Allocation Optimization in Cooperative Communications
    • GAO Wei-dong,WANG Wen-bo,YUAN Guang-xiang,PENG Mu-gen
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 68-71. DOI:10.13190/jbupt.200802.68.gaowd
    • Abstract ( 3001 )     HTML       
    • A joint optimization strategy for relay selection and power allocation is proposed to optimize the performance of cooperative communication system. Convex optimization method is used to implement the algorithm, which optimally distributes power among the source and relay nodes. Both theoretical analysis and simulation results indicate that the proposed strategy notably improve system performance and energy efficiency with low implementing complexity, thus can be effectively used in cooperative communications based on relaying transmission.

    • References | Supplementary Material | Related Articles
    • Privacy-Preserving Point-Line Relation Determination Protocol and Its Applications
    • LIU Wen1,3, LUO Shou-shan2,3, CHEN Ping4
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 72-75. DOI:10.13190/jbupt.200802.72.liuw
    • Abstract ( 2324 )     HTML       
    • A privacy-preserving point-line relation determination protocol based on additive homomorphism encryption is developed in semi-honest model. The privacy-preserving point-line relation determination protocol can be used to solve many privacy-preserving computational geometry problems, such as segments intersection problem and point inclusion problem. The privacy-preserving point-line relation determination protocol can be also used to determine either the point is at the positive side, negative side, or on the line privately. Further more, the privacy-preserving segments intersection protocol can be used to determine two lines supplied by different users intersect securely; and the privacy-preserving point inclusion protocol can be used to determine the relation of a point and a polygon supplied by different users. Finally, the correctness, security and efficiency of these protocols are analyzed.

    • References | Supplementary Material | Related Articles
    • Power-Saving Aware Time-Frequency 2-D Resource Allocation Strategy for E-MBMS Networks

    • SHENG Yu, PENG Mu-gen, WANG Wen-bo
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 80-84. DOI:10.13190/jbupt.200802.80.102
    • Abstract ( 2678 )     HTML       
    • With characteristic of enhanced multimedia broadcast/multicast service (E-MBMS) networks, a time-frequency two dimensions (2-D) resource allocation strategy based on power-saving is proposed. In time domain, the proposed algorithm minimizing power consumption merges different E-MBMS sessions and minimizes the total number of receiving time-slots. Allocation in frequency domain is aimed at maximizing system throughput under the condition in which the target rates can be attained. The proposed scheduling algorithm is done in each orthogonal frequency division multiplexing (OFDM)frame, it allocates time-frequency units to different sessions. Simulation shows that the efficiency of proposed allocation algorithm can obviously reduce power consumption of MBMS handsets and will be with significant higher fairness with throughput being close to the upper bound of optimum method.

    • References | Supplementary Material | Related Articles
    • Cyclostationarity-Based Spectrum Sensing Technique in Multi-Antenna Cognitive Radio
    • CHEN Xing, HE Zhi-qiang, WU Wei-ling
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 85-89. DOI:10.13190/jbupt.200802.85.chenx
    • Abstract ( 2536 )     HTML       
    • A multi-antenna spectrum sensing technique based on cyclostationary characters was proposed to improve the sensing performance in cognitive radio. After estimating the channel frequency response from the spectral correlation function (SCF) of each antenna, the new method combines the multiple antenna signals in frequency domain to detect the spectrum of combined signal. The closed-form expression for the signal noise ratio (SNR) of combined signal’s SCF and simulation results show that the technique is capable of achieving full spatial diversity in spectrum sensing.

    • References | Supplementary Material | Related Articles
    • Research on Binary Array Pairs with Two-Level Autocorrelation
    • LI Gang, XU Cheng-qian, LIU Kai, LI Zhao-hui
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 90-94. DOI:10.13190/jbupt.200802.90.lig
    • Abstract ( 1985 )     HTML       
    • A new kind of discrete signal with good periodic correlation function is proposed. It is binary array pairs with two-level autocorrelation. The definition of binary array pairs with two-level autocorrelation is presented. Its transformation properties and Fourier spectrum characters are discussed. To reduce the searching range and improve the searching efficiency of binary array pairs with two-level autocorrelation, its existence conditions are studied. And folding construction between binary array pairs with two-level autocorrelation and binary sequence pairs with two-level autocorrelation is given out.

    • References | Supplementary Material | Related Articles

    Reports

    • A Heuristic Traffic Identification Method Based on Trusted List
    • WANG Jiao, ZHOU Ya-jian, YANG Yi-xian
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 95-98. DOI:10.13190/jbupt.200802.95.wangj
    • Abstract ( 2667 )     HTML       
    • The insufficient of current traffic identification technique was analyzed, and then a heuristic traffic identification method based on trusted list was proposed. This method uses a “memory” technique, adds the discerned connection into a trusted list. Moreover, a real-time optimized method was developed to make sure that the more active connections can be measured to primarily in the trusted list all the time, thus will accelerate the traffic identification speed and improve the accuracy. The experiment results show that this method can identify the encrypted traffic perfectly, and more effectively than existed methods.

    • References | Supplementary Material | Related Articles
    • Traffic-Aware and Energy Efficient WMN Routing Based on
      Cross-Layer Design
    • SONG Wen1, HUANG Qiang1, FANG Xu-ming 2, ZHAO Yue2
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 99-103. DOI:10.13190/jbupt.200802.99.songw
    • Abstract ( 3066 )     HTML       
    • A novel Traffic-aware and energy efficient routing (TEER) protocol based on dynamic source routing(DSR) is proposed in wireless mesh network (WMN). TEER exploits information originated from media access control (MAC) and physical layer as well as that from application layer. To balancing energy efficiency and bandwidth quality of service (QoS) requirement, an integrated metric MTEER is proposed to denote the energy and transmission state of the node. TEER combines the available link bandwidth, duty cycle of load queue and the residual energy of node acquired by statistic methods. Simulation results demonstrate that TEER outperforms the performance than that of energy-aware multi-path routing protocol (EMRP)and dynamic source routing (DSR) in terms of network lifetime and throughput.

    • References | Supplementary Material | Related Articles
    • Decorrelating Decision-Feedback Multiuser Detector
      on the Decision Arrangement
    • ZHANG Dong-hong1,2 , LIAO Gui-sheng1
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 104-107. DOI:10.13190/jbupt.200802.104.100
    • Abstract ( 2274 )     HTML       
    • An iterative formula of the amplitude estimate is presented based on Cholesky decomposition for the signal power order. The decision arrangement in the order of decreasing amplitude is implemented by permutation matrix in decorrelating decision-feedback multiuser detector, it will make the strongest user get a very first decision. Performance analysis shows that the decision arrangement can improve the bit error rate (BER) performance of the detector. The simulation results accord with theoretical prediction which summarizes that the decision arrangement will enhance the BER performance of the weaker user and equalize that of the whole system.

    • References | Supplementary Material | Related Articles
    • A New Image De-noising Algorithm Combined PCNN with Gray-Scale Morphology
    • MA Yi-de, ZHANG Hong-juan
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 108-112. DOI:10.13190/jbupt.200802.108.mayd
    • Abstract ( 2614 )     HTML       
    • Under summarizing the characteristics of pulse noise, the pulse coupled neural network (PCNN) is combined with gray-scale morphology, and a new pulse noise removing algorithm based on PCNN and gray-scale morphology is proposed. Firstly, the noisy points are located using the synchronous pulse burst property of PCNN, then, are processed using the gray-scale open-close filtering. Finally the algorithm is compared with median filtering, gray-scale open-close filtering and with the algorithm combined PCNN with median filtering. Experimental results show that the proposed algorithm performs well。However,it is at a cost of more calculating time than median filtering and gray-scale open-close filtering. But, with similar results, it spends less time than that of the algorithm combined PCNN with median filtering.

    • References | Supplementary Material | Related Articles
    • The Optimal Power Saving Mode of IEEE 802.11 Based on Contention Constraint
    • SI Peng-bo, JI Hong, YUE Guang-xin
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 113-117. DOI:10.13190/jbupt.200802.113.sipb
    • Abstract ( 2659 )     HTML       
    • In the IEEE 802.11 distributed coordination function based wireless local area network (WLAN), a new downlink access scheme optimal power saving mode (OPSM) is proposed to solve the problem of over contention after beacon transmissions. To maximize the number of stations which contend the channel successfully, OPSM configures the traffic indication map (TIM) fields in beacon frames to constrain collisions. The downlink priority differentiation degree α is defined to describe the quality of service (QoS) gap between different services. Furthermore, the power consumption models of downlink constant bit rate service with standard 802.11 PSM and OPSM are built. Analysis and simulation results validate the performance improvement and the priority differentiation by configuring α.

    • References | Supplementary Material | Related Articles
    • A Novel Fast Intra Prediction Algorithm for H.264
    • CUI Yu-bin,CAI An-ni
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 118-122. DOI:10.13190/jbupt.200802.118.cuiyb
    • Abstract ( 2316 )     HTML       
    • A novel fast intra prediction algorithm for H.264 is proposed. The nine Intra_4×4 modes are divided into three classes, the suitable mode class for current 4×4-block is predicted using the mode classes of neighboring left and up blocks. A novel Intra_4×4 mode selection method is designed based on the derived sum of absolute values of index-weighted integer transform coefficients. The quasi-stationary of locations of Intra_16×16 macroblocks (MB) in successive I-frames is exploited to reduce the computational complexity of Intra prediction. Mode selection for two chroma 8×8 blocks is accelerated based on the mode correlations between luma blocks and chroma blocks in one MB. Experiments show that the proposed algorithm can save 25% encoding time on average compared with Joint Video Team(JVT)-G013, while with better rate-distortion efficiency.

    • References | Supplementary Material | Related Articles
    • Two HARQ Protocols for Relay Cooperative Systems
    • CHEN Ji-xue,WANG Wen-bo
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 123-127. DOI:10.13190/jbupt.200802.123.chenjx
    • Abstract ( 2659 )     HTML       
    • Two Hybrid Automatic Repeat Request(HARQ) protocols for relay cooperative Rayleigh fading systems are proposed, they are relay-controlled and destination-controlled protocols, the control on each side is based on the outage probability. Numerical analysis and simulation under the slow fading channel show that the lower average received signal noise ratio(SNR) of the relay, and good performance gain will be got in relay-controlled HARQ protocol. In the destination-controlled HARQ protocol, when the uplink qualities of the source and relay are worse, the average received SNR of the destination will become lower, the systems performance can be improved efficiently.

    • References | Supplementary Material | Related Articles
    • A Flexible Sensing Period Mechanism of Spectrum Sensing in Cognitive Radio Networks
    • ZHANG Yu, FENG Chun-yan, GUO Cai-li
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 128-131. DOI:10.13190/jbupt.200802.128.zhangy
    • Abstract ( 3027 )     HTML       
    • A new spectrum sensing mechanism based on flexible sensing period( FSP) is proposed to control the cost of the sensing in the medium access control(MAC) layer of cognitive radio networks. The cognitive radio (CR) users can make a balance between the unexpected time and the sensing count by utilizing the statistic information of licence users and a “period control factor”, that will reduce the cost of sensing. Simulation results show that FSP can give a better performance than the typical fixed sensing period mechanism.

    • References | Supplementary Material | Related Articles
    • Application of Segment Clustering in Radar Signal Sorting
    • GUO Qiang1,2, WANG Chang-hong1,GUO Li-min2,
      LI Zheng3, ZHU Zheng-wei3, HUA Yun3
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 132-136. DOI:10.13190/jbupt.200802.132.103
    • Abstract ( 2319 )     HTML       
    • The problem of tolerance of radar signal sorting is analyzed in modern electronic warfare that faces more complex and dense pulses environments. It is becoming a vital factor to improve the efficiency of sorting of the conventional multi-parameters signal sorting system. According to the idea of statistics learning theory, a segment clustering radar signal sorting method is presented based on cascade coupling and support vector clustering (SVC). It prevents tolerance from affecting radar signal sorting. Experiments show that the sorting method presented is good for raising the efficiency to overcome the tolerance of radar signal sorting.

    • References | Supplementary Material | Related Articles
    • Detection Ordering in Tree Search Detection for MIMO Wireless Systems
    • YANG Yuan, HU Jun-feng, ZHANG Hai-lin
    • Journal of Beijing University of Posts and Telecommunications. 2008, 31(2): 137-141. DOI:10.13190/jbupt.200802.137.yangy
    • Abstract ( 2848 )     HTML       
    • An optimal log-likelihood ratio (LLR) ordering algorithm used in the tree search algorithm is presented. A simplified LLR ordering scheme employed in uncoded systems and an exact LLR ordering scheme employed in coded systems are proposed. The proposed ordering algorithm not only utilizes the channel state information, but also receives signal as well as a priori information from the decoder, thus the transmitted signals are detected in the order of their reliability information. Simulation shows that LLR ordering algorithms achieve significant performance gain in uncoded systems and a faster convergence in coded systems.

    • References | Supplementary Material | Related Articles