Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • A Secret Making AI Theory from Separation to Unification
    • ZHONG Yi-xin
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 1-6. DOI:10.13190/jbupt.200603.1.zhongyx
    • Abstract ( 3034 )     HTML       
    • Due to the high importance and complexity in artificial intelligence (AI) study, there have been various schools of AI theory that were formed in the 20th century among which the structuralism, functionalism and behaviorism approaches are the representatives. All the three approaches have made appreciable successes. However, there have been also controversies among the three. A new approach, named mechanism approach, is thus proposed here to attack the nucleus of intelligence through the investigation on the core mechanism of its formation. It is our discovery that the core mechanism of intelligence formation appeared to be a series of transformations -- from information to knowledge and further to intelligence. In addition, it is also found that the three mentioned schools of AI theory could well be harmoniously unified within the framework of the mechanism approach. The mechanism approach and the harmonious unification of AI theories may hopefully provide a new understanding and hence a new direction for the future development of AI theory.

    • References | Supplementary Material | Related Articles
    • A Novel Turbo-MIMO Receiver Scheme
    • HU Yang, YIN Chang-chuan, YUE Guang-xin
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 7-12. DOI:10.13190/jbupt.200603.7.hu
    • Abstract ( 3105 )     HTML       
    • A novel and effective receiver scheme is presented with Turbo-code in order to effectively overcome the space interference induced by multi-antenna MIMO system. By modifying the conventional Turbo iterative decoding algorithm, new scheme synchronizes the interference detector with Turbo decoder, which can fully utilize original received information from the point of view of information theory. Multi-receive antennas can also provide the diversity gain for LLR information and iterative extrinsic information. The scheme breaks the restriction of space and time domain of STBC and BLAST. Simulation results verify the validity of the scheme from system performance and iterative parameters.

    • References | Supplementary Material | Related Articles
    • Research on Displacement Analysis of a Kind of Nine-Link Barranov Truss
    • WANG Pin LIAO Qi-zheng WEI Shi-min ZHUANG Yu-feng

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 12-17. DOI:10.13190/jbupt.200603.12.wang
    • Abstract ( 2509 )     HTML       
    • The vector equations are set up for four loop of one kind of nine-link Barranov truss by complex number vector method, and the four equations are changed into complex exponential number form. Firstly, a 52 degree univariate polynomial equation is deduced by using resultant elimination method. 6 extraneous roots are found during the process to obtain the other 3 variables by using Euclidean algorithm. The production reason of extraneous roots is analyzed and the improved method is proposed, that is the degree of the variables during the elimination process is reduced by searching relations among the vectors, so that a 46 degree univariate polynomial equation can be obtained directly. Finally, it is verified that the analytical solutions number of this kind of Barranov truss is 46 by a numerical example.

    • References | Supplementary Material | Related Articles
    • Image Rotation Angle Blind Detecting Algorithm Based Spectrum Character
    • WU Hong-tao ZHU Bo-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 22-26. DOI:10.13190/jbupt.200603.22.wuht
    • Abstract ( 2873 )     HTML       
    • It's difficult to detect blindly the image rotation angle in blind watermarking under geometry attack. By analyzing image spectrum, the character of spectrum amplitude ridge contained in image borderline is discovered. The practical distinguishing character filter is designed while character sharp filter can avoid the interfere whose amplitude ridge isn’t axial. The angle of spectrum amplitude ridge in black-white character image can be calculated by Hough transform, that is the value of image rotation angle model л/2. The experiment result proves the proposed algorithm has light computational load and high precision without original image. It can endure the attacks of geometry attack, low-pass filter, noise additional, lossy compression at the same time.

    • References | Supplementary Material | Related Articles
    • Effect of Shielding Effectiveness of Negative Permittivity
      Composite Materials to HPM and UWB
    • BAO Yong-fang LV Ying-hua HAN Chun-yuan
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 27-30. DOI:10.13190/jbupt.200603.27.baoyf
    • Abstract ( 2626 )     HTML       
    • A composite materials with negative permittivity were selected as the research object. It was presented how to use Finite Difference Time Domain (FDTD) method to numerically analyze the transmission and reflection characteristic of the composite materials. The simulation results were compared with the experimental data for testifying the feasibility of this method. Based on this, the shielding effectiveness of the composite materials to ultra wideband EMP (UWB) and high power microwave (HPM) were analyzed. The simulation result shows that the composite materials have stong shielding effectiveness to UWB and HMP . It is helpful to apply composite materials in the domain of electromagnetic shielding.

    • References | Supplementary Material | Related Articles
    • A NETWORK LOAD ORIENTED AVAILABLE BANDWIDTH MEASUREMENT ALGORITHM
    • WANG Lei JIN Chao-ying ZHAO Liang
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 31-35. DOI:10.13190/jbupt.200603.31.wang
    • Abstract ( 2873 )     HTML       
    • In networked multimedia systems, the probing traffic generated by active measurement of available bandwidth might interfere with the audio-visual communications. To solve the problem, a media stream measurement algorithm (MSM) was proposed. Furthermore, an adaptive probing mechanism (LOMA) was developed. When network is lightly loaded, LOMA employs PathLoad algorithm and suppresses the amount and the burst of probing traffic with initiation optimization and procedure optimization. Once the network is congested, LOMA switches to MSM, which uses video packets to serve the measurement purpose without generating any additional probing traffic. Since LOMA can restrain effectively the probing traffic under different network load conditions, it minimizes its interference to the audio-visual communications while maintaining the measurement accuracy.

    • References | Supplementary Material | Related Articles
    • On Properties and Constructions of Hyper-bent Functions
    • CHANG Zu-ling1,2,KE Pin-hui1,2,MO Jiao1, WEN Qiao-yan1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 36-39. DOI:10.13190/jbupt.200603.36.006
    • Abstract ( 2237 )     HTML       
    • Hyper-bent functions are special bent functions which have many useful applications in cryptography and communications. Using the properties of permutations, we find the sufficient and necessary condition for one Boolean function is hyper-bent function and the relation between hyper-bent functions and PS class bent functions. We also provide one generalized method to construct multi-output hyper-bent functions and use this method to construct balanced multi-output functions with high nonlinearity.

    • References | Supplementary Material | Related Articles
    • Quantum Key Distribution and Secret Sharing via W states
    • YANG Yu-guang1 WEN Qiao-yan1 ZHU Fu-chen2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 40-43. DOI:10.13190/jbupt.200603.40.007
    • Abstract ( 2812 )     HTML       
    • The characteristic of W state is introduced. The coefficients of W state used for quantum key distribution and secret sharing are proved to be uniform in symmetrical form. The corresponding quantum key distribution scheme via W state is proposed. To insure the security of the proposed quantum key distribution protocol, the receiver chooses randomly the message mode or control mode asymmetrically. And the security of the schemes is discussed. Quantum secret sharing scheme is accordingly proposed. And the security of the schemes is also discussed. Compared with the quantum key distribution and secret sharing schemes with Greenberger-Horne-Zeilinger(GHZ) states, the efficiency of the proposed schemes is low. The purpose of this paper is just to prove that the states except for GHZ states can be used for quantum key distribution and secret sharing.

    • References | Supplementary Material | Related Articles
    • A New Proxy Blind Signature Scheme
    • Xia Man-min1, GU Li-ze2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 48-52. DOI:10.13190/jbupt.200603.48.008
    • Abstract ( 2490 )     HTML       
    • In a proxy blind signature scheme, the proxy can blindly sign the file for the delegated signer. In the paper, we propose a new proxy blind signature scheme, which resolves two issues in the Tan’s proxy blind signature scheme: ⑴Security, both original signer and signature receiver can forge a valid proxy blind signature for any file. ⑵Traceability, the proxy signer can relate the process of the proxy blind signature to the unblind signature for the file.

    • References | Supplementary Material | Related Articles
    • Optimum Pilot Tone Design for MIMO-OFDM Systems over Doubly-Selective Channels
    • LI Xiao-jun ,YIN Chang-chuan ,YUE Guang-xin
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 53-56. DOI:10.13190/jbupt.200603.53.lixj
    • Abstract ( 2807 )     HTML       
    • This paper investigates the multi-input multi-output orthogonal frequency division multiplexing (MIMO-OFDM) transmission over doubly selective channels and focuses on maximum likelihood channel estimator using pilot tones in frequency domain. We derived the system model for MIMO-OFDM over doubly selective channels. Using this model,we gave the lower bound of the mean squared error of maximum likelihood channel estimator and this bound was served as the design criterion to derive the optimum pilot tones. Simulations show that the channel estimator using the proposed pilot can approach the theoretical lower bound.

    • References | Supplementary Material | Related Articles
    • A Novel Wireless IP Packets scheduling Algorithm with QoS guaranteeing Based on OFDM system
    • YU Yi-fan, JI Hong, YUE Guang-xin

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 61-65. DOI:10.13190/jbupt.200603.61.yuyf
    • Abstract ( 3005 )     HTML       
    • According to the characteristic of parallel data transmission of OFDM (Orthogonal Frequency Division Multiplexing) and the feature of multiuser communications in wireless networks, a novel wireless IP packets scheduling algorithm for multiservice in OFDM system (AS-OFDM) is presented based on the idea of cross-layer design. The proposed algorithm implements the radio resource management and adaptive packets scheduling via exchanging the information among the network layer, link layer and physical layer. The simulation results show that the proposed algorithm can make use of the radio resource and guarantee the fairness among the users with same QoS requirement more effectively than the traditional IP packets scheduling algorithm in the condition that the QoS of different service has to be guaranteed.

    • References | Supplementary Material | Related Articles
    • The Application of Alarm Correlation Model for Fault Diagnosis
      in Communication Networks
    • DENG Xin, MENG Luo-ming
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 66-69. DOI:10.13190/jbupt.200603.66.dengx
    • Abstract ( 3151 )     HTML       
    • Alarm correlation is basic of alarm filtering, fault diagnosis in telecommunication networks. In this paper, there are four parts. At first, paper briefly introduces the definition of alarm correlation and some related researches recently. Then a framework of alarm correlation based on rules is proposed in details. Meanwhile, the paper also discusses the application of fault diagnosis system in telecommunication networks based on alarm correlation analyzing. At last, it is a conclusion about the preconditions and characteristics of alarm correlation.

    • References | Supplementary Material | Related Articles

    Reports

    • A Matrix-based Channel-sharing Fast Calculation Algorithm for Estimating Network Capacity of MANETs
    • LI Ning1,2, GUO Yan2, TIAN Chang1, ZHENG Shao-ren1,3
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 70-72. DOI:10.13190/jbupt.200603.70.009
    • Abstract ( 2817 )     HTML       
    • In this paper, we study capacity estimation for mobile ad hoc networks (MANETs) using directional antennas. A matrix-based channel-sharing fast calculation algorithm (MCFCA) is proposed to estimate the network capacity in a network scenario in which there is channel sharing among multiple sessions and traffic is delay sensitive with an end-to-end delay constraint. The new algorithm estimates the network capacity in terms of the maximum number of one-hop paths based on the adjacency matrix of the network. Through numerical results, we show that our proposed algorithm can calculate network capacity much faster than the well-known Brute-Force Search Algorithm (BFSA) but with the same accuracy.

    • References | Supplementary Material | Related Articles
    • Trajectory Planning in Joint Space Based on Tri-Branch Robot
    • SUN Hanxu1, JIA Qingxuan1, ZHANG Qiuhao1, WU Fan1, TAN Yuesheng2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 81-85. DOI:10.13190/jbupt.200603.81.010
    • Abstract ( 2783 )     HTML       
    • This paper proposed a kinematical model for the tri-branch space manipulator, which based on the coefficient partition method. A path planning technique in joint space has been presented. In order to improve the control accuracy, a pieced-low-order interpolation method is used in this paper. The precision and efficiency of this joint space path planning algorithm are testified by an experimental example.

    • References | Supplementary Material | Related Articles
    • Security Technology Research of GlobalPlatform Based on JavaSIM Card
    • DONG Wei, YANG YI-xian, NIU XIN-xin
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 91-94. DOI:10.13190/jbupt.200603.91.dongw
    • Abstract ( 3136 )     HTML       
    • Based on the principle of JavaSIM card, the requirements of security communication and multi-Application management on the globalPlatform are studied; the solution for secure JavaSIM platform is proposed and implemented. Based on the management and application of key sets, this solution enable different off-card entities to implement security management for on-card content by means of dividing authentication levels of different key sets and providing security channel. The test result of this solution is in accord with definition of relevant specifications.

    • References | Supplementary Material | Related Articles
    • The optimization calculation of the Common mode Insertion Loss of EMI Filters under impedance-mismatch Conditions
    • GAN Ming-gang , CHEN Jie, OU Jian-chang, CAI Tao
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 95-98. DOI:10.13190/jbupt.200603.95.ganmg
    • Abstract ( 3140 )     HTML       
    • The Source and load impedances of filter vary in practical applications, so, it is very important to optimize the design of filter under impedances-mismatch conditions. The influence that the source and load impedances has on the insertion loss of filters is analyzed in detail. A method of calculating the minimum insertion loss of electromagnetic interference (EMI) filters under impedance-mismatch conditions is presented. The result indicates that the parasitic capacitance and parasitic inductance cause deviation of insertion loss between results of theoretical calculation and measurements in high frequency. So,the model of a typical kind of EMI filter is modified in high frequency by optimization method. Finally, the modified model and the method to calculate the minimum insertion loss is verified to be true.

    • References | Supplementary Material | Related Articles
    • Capacity of MIMO CDMA with Multi-code Detection under Multi-path Fading Channel
    • WANG Jun-xuan1 , RAO Wen-yuan2 , LIAO Han-cheng2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 99-102. DOI:10.13190/jbupt.200603.99.014
    • Abstract ( 2786 )     HTML       
    • The capacity of multi-antennas CDMA systems with LS codes and Walsh codes under interference covariance known and interference covariance unknown were studied in the paper. Theory analyses were also given. Both of theory and numeral results show that: capacity of CDMA systems based on LS codes is far greater than that of CDMA systems based on Walsh codes; for LS CDMA systems, interference covariance is no influence on capacity, and capacity is linear with SNR when using multi-code detection; but for conventional CDMA systems, it will loss any capacity as interference covariance unknown, and also have a floor when SNR great than 18dB.

    • References | Supplementary Material | Related Articles
    • A New Kind of LS Code and its Construct Method
    • YANG Xing, LI Dao-ben, ZOU Yong-zhong
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 103-106. DOI:10.13190/jbupt.200603.103.yangx
    • Abstract ( 3232 )     HTML       
    • Basic link space code (LS) code has interference free window (IFW) and is used by traditional large area synchronous-code division multiple access (LAS-CDMA) system, but this IFW is not uniformly distributed. Using kronecker product of matrix theory, basic link space code chips are recombined and a new kind of LS code is obtained. These new codes have a uniform IFW for both aperiodic auto-correlation and cross-correlation function within one group, and the aperiodic cross-correlation function between groups either has uniform IFW or perfect complement. These properties are proved by both mathematics and computer simulation.

    • References | Supplementary Material | Related Articles
    • A New Accelerating Iterative Algorithm for Constructing Cascade No Sequences
    • CHEN Jia-xing 1,3, XU Cheng-qian2, ZHOU Ting-xian3
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 107-109. DOI:10.13190/jbupt.200603.107.011
    • Abstract ( 2683 )     HTML       
    • Cascade No sequences are a family of sequences which comprise cascade GMW sequences and have optimal correlation properties and large linear span. By studying cascade No sequences and shift sequences, an accelerating iterative algorithm for constructing cascade No sequences is presented. The algorithm adopts iterative method, the cascade No sequences with any period can be constructed quickly by using cascade GMW sequences and shift sequences of the small set of Kasami sequences. It is easy for understanding and implementing.

    • References | Supplementary Material | Related Articles
    • On Perfect Nonlinear Function and Generalized
      Bent function Over
    • KE Pin-hui 1,2, CHANG Zu-ling 3,4 , WEN Qiao-yan 1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 110-113. DOI:10.13190/jbupt.200603.110.016
    • Abstract ( 2989 )     HTML       
    • A weak definition of generalized bent function over finite fields is presented. And then the relation between Perfect nonlinear functions and generalized bent functions is studied. We prove that a q-ary logic function over ( )is a perfect nonlinear function iff is a generalized bent function for each non-zero element in . The difference between several versions of generalized bent function’s definitions over finite fields is discussed. Relations between spectrum of and that of its component functions are also presented. Furthermore we prove that is nonlinear perfect function over iff its component function is - dimension vector generalized bent function.

    • References | Supplementary Material | Related Articles
    • Face Detection Based on Wavelet Transform
    • NIE Xiang-fei12, GUO Jun1, YANG Zhen1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 114-117. DOI:10.13190/jbupt.200603.114.012
    • Abstract ( 2977 )     HTML       
    • A novel algorithm based on two-dimensional discrete wavelet transform for frontal face detection was presented. The algorithm calculated waveletfaces by using Haar wavelet, deduced corresponding formulation for face feature extraction, and used perceptron algorithm to train linear classifier for classification. The comparison between the proposed approach and Eigenfaces method was carried out on four different face data sets. The results show that the computational efficiency and detection accuracy of the proposed algorithm is superior to Eigenfaces method.

    • References | Supplementary Material | Related Articles
    • Discussions on property of LA code
    • YANG Fan, ZOU Yong-zhong, LI Dao-ben
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 118-121. DOI:10.13190/jbupt.200603.118.yangf
    • Abstract ( 2957 )     HTML       
    • The relations among three parameters of LA code and the relations between the auto-correlation function and the parameter of the LA code are investigated. It is proven that >98 is a sufficiency condition when the auto-correlation function of the LA code in LAS2000+ system is on ideal state. This sufficiency condition is important for the design of LA code and the frame structure of the system in which LA code is used.

    • References | Supplementary Material | Related Articles
    • Buffer Control Mechanism for CES over MEN
    • ZHANG Min-gui1 , ZHANG Lei1 , LIN Yuan-yuan1 ,
      SONG Guo-dong2 , WU Jie2 , WANG Li-cun2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 122-125. DOI:10.13190/jbupt.200603.122.015
    • Abstract ( 2841 )     HTML       
    • The control method for the parameters such as delay and jitter is the key factor that affects the quality of Circuit Emulation Service (CES). According to the standards of Metro Ethernet Forum (MEF), the CES was simulated. A strategy was proposed to control the quality parameters of CES. Referenced on traditional buffer control algorithms used in VoIP and multimedia, a new algorithm was proposed to reduce delay and smooth frame jitter. The simulation results of the algorithm proved that the performance of the algorithm is superior to the traditional buffer control algorithms in existing real-time service.

    • References | Supplementary Material | Related Articles
    • An Error Resilience Encoding Scheme for H.264 Video Packet on 3G Wireless Network
    • WANG Hai-ying1, Lü Jing1, YUAN Lu1, SHI Ming-jun2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(3): 126-130. DOI:10.13190/jbupt.200603.126.013
    • Abstract ( 3130 )     HTML       
    • Video transmission is of great importance for 3G wireless communication. This paper presents a novel error resilience video transmission scheme based on the typical characteristics of wireless channel. It adopts both data partition and FMO(Flexible Macroblock Ordering). A standard wireless model provided by ITU is exploited here to exam the performance of the scheme, while simulation results demonstrate that it achieves a better tradeoff between bit rate and error resilience ability as well as satisfying reconstructed picture quality.

    • References | Supplementary Material | Related Articles