Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • A State Stability-Based Triggered Routing Update Mechanism for Distance Vector Algorithm
    • State Key Laboratory on Microwave and Digital Communications, Tsinghua University, Beijing, 100084, China
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 1-5. DOI:10.13190/jbupt.200605.1.liy
    • Abstract ( 3093 )     HTML       
    • Triggered update is a common mechanism of Distance Vector (DV) algorithm to accelerate network convergence and alleviate routing loops. To effectively avoid the frequent and meaningless triggers around the trigger boundary or threshold and correctly reflect dynamic characteristics of state fluctuations which tightly associate with network quality of service (QoS), differing from the triggered update based on variety of absolute value of state, a state stability-based triggered routing update mechanism for DV algorithm (SSB-TU,state stability-based triggered routing update mechanism) is presented. SSB-TU acquires the stability variety of delay state according to second-moment–based function of statistical parameters and decides the generation and transfer of triggered update. Computer simulation and analysis indicate that, SSB-TU can clearly reflect state fluctuation and guarantee important network performances like network throughput etc., meanwhile, timely update network state that varies distinctively and efficiently mitigate routing loops.

    • References | Supplementary Material | Related Articles
    • An Improved NMM Method for Electro-Magnetic Field Calculation in Geophysics
    • TAN Mao-jin1, ZHANG Geng-ji2, ZHAO Wen-jie1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 6-10. DOI:10.13190/jbupt.200605.6.163
    • Abstract ( 2573 )     HTML       
    • A new type of numerical mode-matching (NMM) theory is applied into numerical simulation of common resistivity logs. In analytical section, by the continuity of interface between the adjacent layers in electromagnetic field, the traditional reflection and transmission matrixes is improved, and relationship between up-going and down-going wave is derived. A new transition formula is firstly presented. The improved NMM method, avoiding complicated matrix inverse, is easy to understand and has concise physical meaning. Furthermore, according to reciprocal theory, the calculating speed for B-A-M is one time faster than that for A-M-N. By the experiments for two-layer and three-layer homogeneous media, this method is verified to be highly precise and effective comparing with FEM method and the previous NMM method. The core concept of new NMM is helpful to 3-dimension NMM and other geophysics method in stratum media.

    • References | Supplementary Material | Related Articles
    • Home-Network QoS Control Scheme Based on Scheduling of Multiple Token-Rings
    • DONG Wei, YANG Shi-yuan
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 11-14. DOI:10.13190/jbupt.200605.11.164
    • Abstract ( 2639 )     HTML       
    • Some of current available QoS(quality of service) enhancement mechanisms for home network are too simple to provide parameterized QoS features, and the others adopt central polling mechanism which may result in single-point fault and performance bottleneck. Aiming at this situation, a new MAC(media access control) mechanism based on multiple token-rings was proposed. The complex token-scheduling algorithm as well as the corresponding resource allocation and admission control algorithms was designed. The distributed parameterized QoS control was realized. The proposed complex token-scheduling algorithm radically overcomes the drawbacks of simple token-scheduling and has stronger resource-scheduling and service-differentiation capabilities. Simulation results showed that the proposed method can effectively improve utilization efficiency of network bandwidth.

    • References | Supplementary Material | Related Articles
    • The Construction and Enumeration of Symmetric Balanced Boolean Functions
    • MO Jiao , WEN Qiao-yan
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 15-18. DOI:10.13190/jbupt.200605.15.162
    • Abstract ( 2715 )     HTML       
    • It is known in conference [1] that the construction and enumeration of symmetric balanced Boolean functions is equivalent to the solution of the knapsack equation and enumeration of the solutions. In this paper, we first find out a set of solutions of this equation when is odd and the number of the elements in is given, then we obtain the necessary and sufficient condition under which there exists other solutions of the equation out of the set .We also show a method for finding out the solutions out of the set . At last some solutions of the equation is given when .

    • References | Supplementary Material | Related Articles
    • A Super-Resolution Beamforming Algorithm Used in Ad Hoc Network Terminals
    • GUO Li1 , GUO Yan 2, LI Ning2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 19-23. DOI:10.13190/jbupt.200605.19.165
    • Abstract ( 3071 )     HTML       
    • Based on Butler Matrix, a novel simple-structured hybrid smart antenna system applicable in Ad Hoc network terminals is designed. A super-resolution beamforming algorithm is also presented by combining with the direction of arrival (DOA) estimation algorithm of digital signal processing (DSP). By this algorithm, it is deduced the shift value formula of the variable phase shifter when the antenna array switches to the direction of the desired signal. Simulation results show that the system facilitates the implementation by use of the simple system structure and easy beamforming feature. And it can drive the antenna to follow the input signal, which can greatly improve the signal quality and suppress the electromagnetic interference..

    • References | Supplementary Material | Related Articles
    • The Division Based Restraint Approach of Worm Propagation
    • WANG Ping, FANG Bin-xing, YUN Xiao-chun
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 24-27. DOI:10.13190/jbupt.200605.24.wangp
    • Abstract ( 2600 )     HTML       
    • Through deep discussing the worms, the proportional relation between the propagation speed of worms and the scale of network is found. On this condition, an approach to decrease the scale of network by division and block the worm on the border of network to efficiently repress the worm in large-scale network is proposed in this paper. The graph-based model of network division is created, an algorithm fit for worm spread restraint is brought forward, and the theoretic analyze and simulations prove the efficiency of this approach.

    • References | Supplementary Material | Related Articles
    • A high efficiency certification path
      construction algorithm of cross domain
    • SHI wei-min, Gao HaiYing, Yang Yixian,
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 28-30. DOI:10.13190/jbupt.200605.28.shiwm
    • Abstract ( 2534 )     HTML       
    • Certification path construction of cross domain is a very complicated process, yet, to this day it is not a quite efficient certification path construction algorithm. To the above problem, this paper proposes a high efficiency certification path construction algorithm, comparing with other algorithms, this algorithm makes certification path construction the more simple and higher efficiency and better expansibility. Besides the algorithm is applicable to other trust models.

    • References | Supplementary Material | Related Articles
    • A Spatial Error Concealment Scheme Based on Prediction of Texture Direction
    • LV Jing, WANG Hai-ying, CHANG Kan
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 31-34. DOI:10.13190/jbupt.200605.31.lüj
    • Abstract ( 3205 )     HTML       
    • The compressed video data is easily disturbed or lost in error prone channel, and the error not only affects the current frame but also propagates to the subsequent frames especially when it occurs in Intra frames. To address this question, we improved a spatial error concealment algorithm, which can be called texture prediction interpolation, based on the research of the video coding standard H.264. It has been demonstrated that this method achieves good perceptual quality.

    • References | Supplementary Material | Related Articles
    • A RQoS-Based Charging Policy in the Next Generation Network
    • LIN Xiu-qin, ZHANG Dong-mei
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 35-39. DOI:10.13190/jbupt.200605.35.linxq
    • Abstract ( 2976 )     HTML       
    • A charging policy supposing the modification of negotiation policy according to the Real QoS (RQoS), which the services actually obtain, is proposed in order to realize the QoS-based charging in next generation network. During the charging process of RQoS policy, the user’s satisfaction and the utilization efficiency of network resource are taken into account. Simulation results show that the policy is superior to the traditional flat-rate and ToS-based charging policy on the utilization of the networks and the satisfaction of the users.

    • References | Supplementary Material | Related Articles
    • A Web Services Matchmaking Method with Enhanced Semantic Precision
    • Bai Dong-wei[1][2], Liu Chuan-chang[1],Chen Jun-liang[1]
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 40-44. DOI:10.13190/jbupt.200605.40.160
    • Abstract ( 2832 )     HTML       
    • After analyzing the problem of the Web services matchmaking methods which based on description logic reasoner, a simple and efficient semantic distance calculation method is proposed. Based on this method, a new Web services matchmaking method with enhanced semantic precision is proposed. On the basis of the result from the description logic reasoner, proposed method adds the semantic distance calculation of concepts in ontology to enhance the precision of matchmaker. The experimental research results show the feasibility and effectiveness of the proposed method.

    • References | Supplementary Material | Related Articles
    • A New Approach for OFDM/CDMA Systems with Peak-Limited Nonlinearities
    • WANG Jian, SHAN Xiu-ming, REN Yong
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 45-49. DOI:10.13190/jbupt.200605.45.wangj
    • Abstract ( 2690 )     HTML       
    • A new evaluation approach for the in-band nonlinear distortion, which is formed by the orthogonal frequency division multiplex (OFDM) signal passing through the high power amplifier, is presented. Comparing with widely used nonlinear additive Gaussian noise models, the new approach is based on the properties of the large deviations of a stationary Gaussian process and shot noise theories, which offer important insights into the true nature of clipping distortion as well as detail information on clipping induced impulse noise and its impacts on the system when the OFDM signal is transferred and processed. The methodology can also be extended to be used in many communications systems with high peak-average-ratio and peak-limited nonlinearities, and the downlink performance analysis of large capacity code division multiple access (CDMA) systems.

    • References | Supplementary Material | Related Articles
    • Iterative List Branch and Bound Algorithm
      for MIMO Detection
    • SunYanhua GongPing WuWeiling
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 50-53. DOI:10.13190/jbupt.200605.50.sunyh
    • Abstract ( 2492 )     HTML       
    • An iterative list branch and bound algorithm is proposed in MIMO detection, which adopts candidate list to compute soft information and reduces computation complexity. Furthermore, an improved algorithm is proposed .It uses a prior information form the preceding iteration and has advantage from recalculating the candidate list. Simulation results show that the proposed iterative algorithm can achieve near-capacity performance and the improved algorithm reduces the required candidate list size without performance degradation.

    • References | Supplementary Material | Related Articles
    • Research on A New IPv6 Addressing Method
    • LV Xin-rong1,2, ZHU Xiao-min1,2, LIAO Jian-xin1,2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 54-58. DOI:10.13190/jbupt.200605.54.166
    • Abstract ( 2588 )     HTML       
    • Based on the research of multiparty-communication and IP multicast, a new IPv6 addressing method is proposed to support multiparty-communication applications with small-scale group. This algorithm utilizes the extension header of IPv6, an extension header called destination address extension header is designed. The new method is between unicast and multicast, which is similar to multicast on the performance and similar to unicast on the route. This method avoids the deficiency of the unicast and the multicast on the multiparty-communication with small-scale group. The new addressing method can support many multiparty-communication applications very well, but change the current protocol little.

    • References | Supplementary Material | Related Articles
    • A New Service-oriented Random Access Scheme
    • GU Xuelin, TIAN Hui, YANG Ning, ZHANG Ping
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 59-62. DOI:10.13190/jbupt.200605.59.guxl
    • Abstract ( 2939 )     HTML       
    • By the analysis of the development of key technologies and QoS (Quality of Service) requirements of the real-time traffic in mobile communication systems, a simple and efficient random access scheme which is suitable for TD-OFDMA systems is proposed. In this scheme, the network terminals adopt different random access processing methods by utilizing the special FRRACH (First Refusal Random Access Channel) according to the delay sensitivity of the traffic. The new scheme efficiently avoids the packet collision and guarantees QoS requirements for the real-time traffic. Theoretical analysis and simulation results show the new scheme is superior to current random access schemes with respect to resource efficiency in random access process, successful access probability and average delay.

    • References | Supplementary Material | Related Articles
    • A New Fair-Exchange Protocol
    • ZHANG Qing, WEN Qiao-yan
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 63-65. DOI:10.13190/jbupt.200605.63.zhangq
    • Abstract ( 2330 )     HTML       
    • Electronic commerce is a main trend in Internet applications ,which should be based on fair exchange. A new fair exchange protocol with semi-trusted third party is proposed on the basis of a new convertible authenticated encryption scheme. Compared to the optimistic fair exchange protocols, the new protocol has a simpler structure and a lower communication overhead and the properties of privacy, faireness, non-repudiation and timeliness are satisfied.

    • References | Supplementary Material | Related Articles
    • Optimized Integrated Procedure of Authentication and Key Distribution for GPRS and IMS
    • XU Peng1,LIAO Jian-xin1, ZHU Xiao-min1,WEN Xiao-ping2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 66-70. DOI:10.13190/jbupt.200605.66.168
    • Abstract ( 3141 )     HTML       
    • When mobile station (MS) accesses into IP Multimedia Core Network Subsystem (IMS) through General Packet Radio Service (GPRS), the MS should perform authentication and key distribution operations in protocol Authentication and Key Agreement (AKA) at both GPRS and IMS level. The two operations are very similar, so it is very inefficient to perform twice independently. To solve the problem, an optimized integrated scheme based on some previous work is proposed, in which only GPRS AKA operation is performed and IMS can authenticate MS using the result of GPRS authentication. At the same time, the scheme can meet the requirements of MS authenticating IMS and key distribution. Feasibility and performance is analyzed.

    • References | Supplementary Material | Related Articles

    Reports

    • Improved Layered Space-Frequency Scheme
      for MIMO-CDMA Systems
    • WANG Qi-xing, LI Bao-jin, CHANG Yong-yu, YANG Da-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 71-74. DOI:10.13190/jbupt.200605.71.wangqx
    • Abstract ( 2913 )     HTML       
    • Multiple input multiple output architecture is one of the most promising techniques to improve the quality and capacity of future wireless communication systems. In this paper we proposed an improved layered space-frequency scheme for the broadband MIMO-CDMA systems. The proposed scheme opens the way of detecting multi-antenna signals in the frequency domain. Simulation results show that the proposed layered space-frequency scheme can obtain better tradeoff between performance and complexity than conventional ones.

    • References | Supplementary Material | Related Articles
    • Minimized Printed Dipole Antenna Design Based
      on RFID Application
    • LI Xiu-ping1, LIU Yu2, CAO Hai-ying1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 75-78. DOI:10.13190/jbupt.200605.75.169
    • Abstract ( 3003 )     HTML       
    • To meet the engineering requirement, a 2.45GHz RFID tag antenna and its minimization design are described. The antenna is presented with 450MHz bandwidth under the condition of VSWR less than 1.5, 1.4dB gain, and with the dimension of 37mm×45.8mm. After the minimization, the antenna shows a dimension of 31.8 mm×28.5mm, around 47% reduction of area compared to the original one. Its bandwidth is about 220MHz under the condition of VSWR less than 1.5, and 1.2dB gain. The measured results are compared with the simulated results, and good agreement is obtained.

    • References | Supplementary Material | Related Articles
    • Research of Relation Pattern in Specific Domain
    • ZHANG Su-xiang1,2, LI Lei1, TAN Yong-mei1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 79-83. DOI:10.13190/jbupt.200605.79.167
    • Abstract ( 2678 )     HTML       
    • A new method of automatic entity relation extraction is proposed. Based on the Bootstrapping algorithm, the hierarchy knowledge extraction model can be designed. The inner specific word extraction model and outer pattern extraction model can be nested each other to extract automatically knowledge, so that the specific dictionary and pattern rules used for the entity relation extraction is achieved. Combined with the Comprehensive Information Theory, the semantic and pragmatic information can be added into the relation extraction patterns to generate the Comprehensive Information Knowledge-Base (CIKB). Both the experiments of relation extraction and the evaluation have been done.

    • References | Supplementary Material | Related Articles
    • Design and implementation of security enhanced system for Oracle
    • ZHANG Chun,WANG Yong-Liang and LIU Feng
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 84-87. DOI:10.13190/jbupt.200605.84.zhangch
    • Abstract ( 2220 )     HTML       
    • Most of the commercial DBMS products are lower in the security class ratings. Considering facts, a scheme to strengthen the security of database by a security enhanced system is proposed. The design of security enhanced system is specified on the base of discussing the security aspects of database and this system is also taken to an anti-attack analysis. This system ensures the security of database server by certificating authority and tuple-level mandatory access control on the basis of network isolation. Using this system to strengthen the security of database is practical and feasible.

    • References | Supplementary Material | Related Articles
    • Research and Implementation of TWAC Service Between Different Network
    • Zhan Shu-Bo,Zhu Chun-Yan
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 88-92. DOI:10.13190/jbupt.200605.88.zhanshb
    • Abstract ( 2332 )     HTML       
    • Market demand for intercommunication between PSTN and IP networks impels the TWAC service, a voice service based on PSTN and IP networks to provide multiple service features for the users. Compared with traditional WAC service, TWAC works on the integrated IN platform, employs INAP CS2 and SIP protocols to realize the service integration of PSTN and IP networks and provides users to communicate between different networks. This paper mainly introduces the network framework of TWAC and its service integration solution.

    • References | Supplementary Material | Related Articles
    • Performance Analysis of USSD Service Platform
    • YANG Meng-hui LIAO Jian-xin CHEN Xue
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 93-97. DOI:10.13190/jbupt.200605.93.yangmh
    • Abstract ( 2575 )     HTML       
    • USSD(unstructured supplementary service data) is a new data service defined by ETSI for use within the GSM. Aiming at providing evaluation means for the service performance of USSD service platform, this paper presents the performance model based on Queueing Network. With the analysis of the Pre-Paid Replenish service deployed on the USSD service platform, we have obtained some performance metrics through using the approximate Mean Value Analysis algorithm. These metrics help to find the bottleneck of the system and improve the quality of service. Finally, OPNET is used to simulate the system, and verified the accuracy of this model.

    • References | Supplementary Material | Related Articles
    • Watermarks and Cryptography Based Model for Digital Rights Management
    • YUAN Zheng1,2, DIAO Jun-feng1, WEN Qiao-yan1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 98-102. DOI:10.13190/jbupt.200605.98.170
    • Abstract ( 2638 )     HTML       
    • After considering actual needs for digital rights manager and security rask, a new watermark and cryptography based model for digital rights management (DRM) is proposed, which includes seven objects, three of them are authenticity. The copyright registering, online transactions, watermarking detecting and dispute resolutions of this model are studied. This DRM model is designed to be flexible and support various business and using cases. In the DRM model, the author’s ID, distributor’s ID and the consumer’s ID are regard as some of watermarks information, which can be used for binding information for digital content, some of the cryptographic solutions, protocols and watermarks protocols are also adopted to prevent from algorithm and protocol attack. This DRM model has good security and practicability.

    • References | Supplementary Material | Related Articles
    • The Security Protocol Design About Broadcast In Wireless Sensor Network
    • Qiu Hui-min Yang Yi-xian
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 103-106. DOI:10.13190/jbupt.200605.103.161
    • Abstract ( 3079 )     HTML       
    • Security of broadcast communication is the key challenge in wireless sensor networks. The characteristic, key security issues and design goal for achieving the security of broadcast communication in wireless sensor network are analyzed firstly in this paper, and then global broadcast authentication based on public key algorithm and local broadcast authentication based on one-way key chain are proposed separately as well, as a consequence, reliability, integrity, freshness of broadcast were acquired effectively. The performance analysis showed our method was efficient in communication, energy consume and storage.

    • References | Supplementary Material | Related Articles
    • Fast Symbol Timing Recovery in All Digital Receiver
    • WANG Na1, SHAN Chao2, GUO Dao-sheng2, ZHANG Bang-ning2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 107-110. DOI:10.13190/jbupt.200605.107.172
    • Abstract ( 2848 )     HTML       
    • The performance of squaring algorithm is restricted by observation interval. Furthermore, the influence becomes more complex when the frequency offset is considered. Due to above problems, the Kalman filter was introduced. Then influences of frequency offset and observation interval on symbol timing recovery system under this circumstance were studied. The design of configuration and parameter for the second-order Kalman filter was analyzed and discussed. Simulation results show that the estimation accuracy is observably improved by joining the second-order Kalman filter when the observation interval is short. Consequently, the contradiction between the calculating precision and speed is effectively solved. Comprehensively considering precision, processing speed and computation complexity, the second-order Kalman filter is better than the first-order. It is more suitable for an all-digital symbol timing recovery system.

    • References | Supplementary Material | Related Articles
    • A Detection Algorithm for Rule Set Conflicts Based on Tuple Space Search
    • LI Lin, LU Xian-liang
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 111-114. DOI:10.13190/jbupt.200605.111.lil
    • Abstract ( 2621 )     HTML       
    • Adding a new firewall rule often conflicts with the existed ones, which leads to security vulnerabilities. In order to avoid such vulnerabilities, firewall administrators have to determine an appropriate position in the firewall rule set to be inserted, and identify all the rules conflicting with the new rule in advance. The time complexity of the current conflicts detection algorithm for firewall rule set is O(dN), which makes its performance very poor. A new algorithm for detecting firewall rule set conflicts based on tuple space search is presented not only to find all the rules conflicting with the new rule, but also reduce the time complexity as O(logN+N/w). So it can efficiently help administrators determine an appropriate insertion position of the new rule to avoid vulnerabilities.

    • References | Supplementary Material | Related Articles
    • The Access Code Design for Minimum Orthogonal Frequency Shift Multi-Carrier Direct Sequence CDMA System
    • SUN Yu-hao 1,2, LV Zhao-biao 3, LI Dao-ben 1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 115-119. DOI:10.13190/jbupt.200605.115.174
    • Abstract ( 2811 )     HTML       
    • A novel type of spreading access codes with set-wise zero correlation window (ZCW) is proposed for minimum orthogonal frequency shift multi-carrier direct spread code division multiple access (CDMA) system in which the carrier gap is half of the reciprocal of the chip cycle. The proposed codes are constructed through the direct product of some ZCW complementary codes and certain extend matrix. That is, each complementary code is extended to a set of codes. The access codes correlation property of the codes in one set lies on the extend matrix, nevertheless the ZCW still exists between any two codes in any different code sets. The receiver adopts joint detection only for a code-set rather than for all the codes. Simulation results show that data transmission rate can be improved by several times at the cost of 1-2 dB signal to noise ratio loss in multi-path fading channels.

    • References | Supplementary Material | Related Articles
    • A Novel Integrated Routing Algorithm in Multifiber IP/WDM Networks
    • BO Ming-xia PAN Xiao-fei MA Fang-hua GU Wan-yi
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 120-124. DOI:10.13190/jbupt.200605.120.173
    • Abstract ( 2630 )     HTML       
    • The integrated routing algorithm in IP over WDM networks under the self-similar traffic is studied, and a new integrated on-line routing algorithm, min_influence algorithm, is proposed. It can model the state of the whole network more accurately after assigning resource than other algorithms, and facilitate the distribution of
      network resource more reasonably, which consequently improves the Network performance. Extensive simulations in three respective network topologies show that min_influence algorithm performs better in terms of connection blocking probability (CBP) and bandwidth blocking ratio (BBR) than other existing approaches under the parameters of self-similar traffic(hurst, mean and variance).

    • References | Supplementary Material | Related Articles
    • Iterative Multi-User Detection Based on Interleave in MIMO Systems
    • JIN Yi-dan1, ZHANG Feng2, WU Wei-ling1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 125-129. DOI:10.13190/jbupt.200605.125.171
    • Abstract ( 2779 )     HTML       
    • An iterative multi-user detection receiver structure is proposed for multiple input multiple output interleave division multiple access (MIMO-IDMA) systems. Different chip-level interleaving signatures distinguish users. A novel mean-based soft decision multi-user detection (SoD) algorithm is applied in multi-user detector. Simulation results show that the proposed SoD detection scheme improves the performance in SNR around 2dB compared to MMSE, 1dB superior to SoIC, and has lower bit error rate and complexity.

    • References | Supplementary Material | Related Articles
    • A New Web Single Sign-On Scheme Supporting the Multiple Authentication Modes
    • HUANG Chen, LI Zhong-xian, YANG Yi-xian, XU Guo-sheng
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 130-134. DOI:10.13190/jbupt.200605.130.huangch
    • Abstract ( 2736 )     HTML       
    • Existing single sign-on (SSO) schemes are built on centralized user information storage mechanism and single authentication mode, and it’s hard to meet the requirement of business operations in the dynamic and loose-coupled environment. To solve above problems, the ticket technology, agent mechanism and digital signature are studied, a new better SSO scheme is presented that uses cookie transmission carrier and ticket technology to support multiple authentications SSO, in addition, it establishes a authentication trust chain to support cross-domain SSO based on certificate trust chain. The results show the new scheme provides higher security and wider usage range, while it overcomes the shortcomings of the existing.

    • References | Supplementary Material | Related Articles
    • Decorrelated Approximation for Correlated Shadowing Fading
    • WANG Qi1, YANG Hong-wen1,WANG Min2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(5): 135-138. DOI:10.13190/jbupt.200605.135.175
    • Abstract ( 2555 )     HTML       
    • To simplify the problem of multiple lognormal random interferences, an equivalent method is proposed to approximate the sum of correlated random variables to the sum of uncorrelated ones. With this approximation, the theories based on uncorrelated shadowing model can be used to analyze and simulate the system performance in the presence of multiple correlated lognormal interferers by simply modifying the standard deviation of lognormal shadowing. The formula to modify the standard deviation is derived. The modified standard deviation is generally larger than the original one and increases with the correlation coefficient between lognormal interferers and with the number of interferers. With the Sørensen correlation model, the validity of the approximation method has been verified by simulation of both the cumulative distribution function of the total interference and the outage probability.

    • References | Supplementary Material | Related Articles