Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • A Practical Member Enrollment Protocol for Threshold Schemes
    • YU Jia1, LI Guo-wen2, HAO Rong1,2, CHENG Zhen3
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 1-3. DOI:10.13190/jbupt.2006s2.1.293
    • Abstract ( 2446 )     HTML       
    • A practical member enrollment protocol for threshold schemes is presented. The protocol can generate a new share for a new member when this member joins a threshold system. At the same time, the old members do not need to change their old shares. Different with previous protocols, the new protocol is very simple and efficient. Also, it is proved that the new protocol is correct and secure.

    • Supplementary Material | Related Articles
    • Research on Clustering Validity
    • REN Hong 1,ZHENG Yan 2,QU Zhao-wei 3,DENG Fang 2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 4-7. DOI:10.13190/jbupt.2006s2.4.294
    • Abstract ( 2355 )     HTML       
    • In order to obtain the optimal clustering result, an improved method is proposed by incorporating the simulated annealing mechanism based on analyzing the existing clustering validity functions. Comparing with the typical clustering validity functions, the advantages of this improved method will avoid the mono-tonicity and associating with the characteristics of the dataset. Experimental results show its effectiveness.

    • Supplementary Material | Related Articles
    • Research on the Hand-Eye Servo System Based on the Estimate-Compensate in Space Robot
    • SHI Guo-zhen1,3 SUN Han-Xu2 CHENG Shi-Duan1 JIA Qing-Xuan2
      ZHANG Yan-Heng4 WU Fan2

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 8-12. DOI:10.13190/jbupt.2006s2.8.313
    • Abstract ( 2465 )     HTML       
    • To avoid the effect of time-lag caused by the vision-feedback and control algorithmic in eye-hand space robot servo system running in self-determined model, the Smith-estimate-compensate control algorithmic is presented. Using the information fed back from the eye-hand controller and joints, the relative position and pose between the target and the tip of manipulator are estimated, and the controlling is made. Furthermore, according to the features of space robot control, the fixed time-lag mechanism is introduced to simplify the control algorithmic. This algorithmic can avoid the effect of the time-lag and optimize the capability of the system, such as real-time ability,stability and precision. Simulating experiment results show the validity of the algorithmic.

    • Supplementary Material | Related Articles
    • Research on Virtual Smelling Perception System of Artificial Fish
    • MENG Xian-yu1,2 , BAN Xiao-juan1 , NING Shu-rong1 ,TU Xu-yan1

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 13-18. DOI:10.13190/jbupt.2006s2.13.314
    • Abstract ( 2284 )     HTML       
    • Artificial fish for computer animation is created with artificial life. In order to enrich perceptive abilities of artificial fish and exhibit vivid animation, a kind of virtual smelling perception system of artificial fish is proposed based on analysis of the olfaction mechanism of natural fish and perception system of “robot fish”. Firstly, the smelling perception model in Intelligent Virtual Environment (IVE) is built. Secondly, three-layer recognition model of smelling perception is designed according to the biologic mechanism of olfaction. The recognition of smelling information is achieved using fuzzy recognition method based on principal components analysis. The result is satisfied in computer animation simulation. And the design of smelling perception system will set a good foundation for research on multi-perception fusion and supplies a software simulation platform for the researching on recognition of smelling of robot fish.

    • Supplementary Material | Related Articles
    • The Fingerprint Identity-Based Encryption Scheme Based on IBE and Fingerprint Authentication
    • JIANG Wei-qiang1, YANG Yi-xian1, LI Liang2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 19-23. DOI:10.13190/jbupt.2006s2.19.315
    • Abstract ( 2706 )     HTML       
    • To Solve the problems in identity-based encryption (IBE) Scheme, such as the difficulties of the trusted authority TA(trusted authority) authenticating the users and transmitting the private key to them, the fingerprint identity-based encryption FIBE(fingerprint identity-based encryption) scheme based on IBE and fingerprint authentication is proposed. It applies the fingerprint hash matching algorithm to network authentication system and solves four problems in IBE. Moreover, the fingerprint feature is protected. The TA does not need to be online in the authentication process between the users, and is suitable for the condition of vertical authentication.

    • Supplementary Material | Related Articles
    • A Forward-Secure Proactive Threshold Signature Scheme
    • YU Jia1; HAO Rong1,2; ZHAO Zhi-gang1; LI DA-xing2

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 24-29. DOI:10.13190/jbupt.2006s2.24.295
    • Abstract ( 2236 )     HTML       
    • The formal definition of forward-secure proactive threshold signature scheme is presented, and a concrete scheme is described. The scheme has all the forward-secure properties. The whole lifetime of the signatures is divided into several time periods, the secret key is updated in each time period, and the update function is just one-way. Therefore, the adversary knows no secret keys for previous time periods even if she has got the current secret key. The public key is fixed during the whole lifetime. At the same time, the scheme has all the properties of proactive security. It can renew shares periodically, detect malicious actions, and recover bad shares. The scheme has the great significance: If an attacker can’t break into no fewer than threshold severs in one period, she can’t forge any signature for the current time period; even if she can break into threshold severs, she can’t forge any signature for previous time periods.

    • Supplementary Material | Related Articles
    • Intelligent Ant Colony Algorithm for Transit Scheduling Problem
    • WANG Hai-xing, SHEN Jin-sheng

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 30-34. DOI:10.13190/jbupt.2006s2.30.wanghx
    • Abstract ( 2577 )     HTML       
    • In order to dealing with transit scheduling problem with several lines, an improved transit driver scheduling model was presented. Its objective was to schedule drivers in such a way that the deadheading was minimized while the operational constraints such as work time and spread time were satisfied. An ant colony algorithm (ACA) was presented to solve transit scheduling problem based on principle of ACA used to solve vehicle routing problem (VRP). Improvement on route construction rule and Pheromone updating rule was achieved on the basis of former algorithm. An example was analyzed to demonstrate the correctness of the application of this algorithm. It is proved that ACA is efficient and robust in solving transit scheduling problem.

    • Supplementary Material | Related Articles
    • Study on Linguistic Computing for Music Emotion
    • SUN Shou-qian1,2,Wang Xin1,LIU Tao1, TANG Yong-chuan1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 35-40. DOI:10.13190/jbupt.2006s2.35.316
    • Abstract ( 2295 )     HTML       
    • A model for music affective computing based on Hevner affective ring—a famous psychology model for emotion representation was proposed. A 8-dimensional vector of linguistic labels is used to represent the emotion embodied in underlying music. And a new method is introduced to measure the emotion similarity between any two pieces of music. And then, the emotional space based on a set of basic linguistic labels is established via an experiment. Considering the requirements of emotional music retrieval and multi-expert decision, a linguistic information fusion method for music emotions based was presented on the arithmetic and logic operations on the emotional space, and the examples show that our model agrees with psychological pattern of the music recognition well and truly.

    • Supplementary Material | Related Articles
    • Intelligent Logic Inference in Destination Decision System
    • WU Chun-hua, WANG Cong, ZUO Shen-zheng

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 41-44. DOI:10.13190/jbupt.2006s2.41.wuchh
    • Abstract ( 2075 )     HTML       
    • Compared with the current destination decision system usually processes user input on the grammatical level, a means for understanding the user input on the pragmatic level by using logic inference engine are proposed. Within a searching context, composed of the common sense of tourism, situation variables and user information, the engine could infer user truly requirement on the pragmatic level. And this inference engine is implemented by doing some alternation to a disjunctive datalog system(DLV)to handle user preferences and desires. The ASP ( answer set programming) can be implemented with the engine.

    • Supplementary Material | Related Articles
    • A Recursive Packet Classification Algorithm Based on Decision Tree
    • ZHANG Yan-jun1,2, CHEN You1,2, GUO Li1, CHENG Xue-qi1

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 45-48. DOI:10.13190/jbupt.2006s2.45.306
    • Abstract ( 2743 )     HTML       
    • This paper introduces a classification algorithm called SRC(sensitive recursive classification). It is based on a decision tree structure. Doing many experiments, especially in FW(firewall) and ACL(access control list), we verified that SRC uses 3 to 10 times less memory than HiCuts(hierarchical intelligent cuttings), while the worst case search time is up to 5 times smaller. Compared with EGT-PC(extended grid-of-tries and path compression), SRC uses 2 to 8 times less memory while the worst case search time is up to 4 times smaller.

    • Supplementary Material | Related Articles
    • Intelligent Method for Name Entity Recognition from Biomedical Text
    • Wang Hao-chang1, Zhao Tie-jun1, Liu Yan-li2, Yu Hao1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 54-58. DOI:10.13190/jbupt.2006s2.54.309
    • Abstract ( 2394 )     HTML       
    • These methods make extensive use of a diverse set of features, including local features, full text features and the features of external resources according to characteristic of algorithms. All the features are integrated effectively and efficiently into the recognition systems. Also the impact of different feature sets on the performance of the systems is evaluated. In order to improve the performance of systems, a post-processing module is added to deal with the abbreviation phenomena and the cascaded name entities as well as the identification of boundary errors. Evaluations of experimental results prove that the strategies of the feature selection and the post-processing modules have important contributions to better output of the systems.

    • Supplementary Material | Related Articles
    • Interface compatibility for Asynchronously Communicating E-Service
    • ZHANG Wen-tao,ZHANG Shu-bo, CHEN Jun-liang
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 59-64. DOI:10.13190/jbupt.2006s2.59.zhangwt
    • Abstract ( 2112 )     HTML       
    • Although Asyn message interaction is undecidable, the asynchronous interaction behaviors equal to synchronous if the interface peers hold synchronizable condition. Based on this theory a new method is proposed to analyze interface compatibility of E-service under asynchronously communicating environment. Through checking synchronizable condition as well as customization on compo sited interface automata, this method also supports the asynchronous interaction check between two service interfaces. Meantime, when applied service composition it can assist composer to guarantee the correctness of composition in term of synchronizable condition.

    • Supplementary Material | Related Articles
    • Automatic Construction On of Domain Ontology
    • LIU Yao, SUI Zhifang, HU yongwei, Ji tieliang
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 65-69. DOI:10.13190/jbupt.2006s2.65.310
    • Abstract ( 4811 )     HTML       
    • By employing natural language processing (NLP) theory and technology, the recognized ontology knowledge as professional thesauruses, professional dictionaries and textbooks are reconstructed. Knowledge collection and manipulation are realized. Based on constraint texts, a learning system is build to fulfill automatic construction of domain ontology’s concept description with the help of domain experts. Also a more ideal and pragmatic method is provided for resolving problems of automatic construction of ontology effectively.

    • Supplementary Material | Related Articles
    • Path Planning for Mobile Robot Based on a Modified Particle Swarm Optimization
    • WANG Kun-kun, YIN Yi-xin
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 70-74. DOI:10.13190/jbupt.2006s2.70.wangkk
    • Abstract ( 2107 )     HTML       
    • A path planning approach based on a modified particle swarm optimization (PSO) is presented for mobile robot in known static environments. To avoid premature convergence and to update candidate solutions more efficiently in the multidimensional search space, the best position of particle’s neighborhood is substituted for the individual optimized in the velocity relation of the algorithm. In addition, the requirements for boundary constraint, obstacle avoidance and shortest path are expressed as a simple fitness function to make the optimum solution fulfill the qualifications for path planning. Simulation results show that the proposed approach is feasible and effective.

    • Supplementary Material | Related Articles
    • Statistical Acquisition of Domain-Specific Semantic Grammar
    • LIU Jian-yi1,2, WANG Jing-hua1, WANG Cong1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 75-78. DOI:10.13190/jbupt.2006s2.75.308
    • Abstract ( 2244 )     HTML       
    • An approach for semiautomatic grammar acquisition from un-annotated corpus about a specific domain is presented. Its grammar is produced by an iterative procedure, it spatially and temporally clusters the words from a domain-specific corpus. Temporal clustering can discover the fragment’s syntactic structure. Spatial clustering can discover the fragment’s semantic category. Finally, the resultant grammar is post-processed by hand-editing. The preliminary experimental result shows that the method is effective and practical.

    • Supplementary Material | Related Articles
    • Study on Fault Line Detection Based on Rough Set Theory in Indirectly Grounding Power System
    • PANG Qing-le1,2,CAO Yin-jie3, MU Jian3,LANG Feng-fa3

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 79-82. DOI:10.13190/jbupt.2006s2.79.301
    • Abstract ( 1993 )     HTML       
    • Because the fault line detection of single-phase-to-earth fault in indirectly grounding power system was very difficult, a new method of fault line detection based on rough set theory was presented. The information fusion technology based on rough set theory was introduced in the fault line detection system by analyzing fault characteristics of the zero sequence current of lines in compensated distribution networks. Fault characteristics extracted by using wavelet transform method, zero sequence current active component method and the fifth harmonic current method were looked as condition attributes. The fault states of lines were used as decision attributes. After the constructed information system was reduced, the minimum solution of decision rules can be obtained to realize fault line detection. The simulation results proved its efficiency and feasibility.

    • Supplementary Material | Related Articles
    • Research and Implement of Human-Computer Interaction System of Gymnastic Bicycle Simulator
    • JIA Qing-xuan , SUN Han-xu , LI Feng , RUAN Rui-qing
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 83-87. DOI:10.13190/jbupt.2006s2.83.296
    • Abstract ( 2387 )     HTML       
    • The human-computer interaction system is the key technology of a virtual bicycle simulator. Based on analysising the category and transmission mode of interactive information, the structure of the interactive system is researched. The technology of force feedback、transducer、DSP control、bump detection and multicenter are integrated. The roaming function in the virtual environment is implemented and the third dimension of the interaction is enhanced. A new project which combines virtual reality with human-computer interaction is presented.

    • Supplementary Material | Related Articles
    • Language Cognition and Topic Identification
    • GUO Yan-hui1,2, WANG Cong1, ZHONG Yi-xin1

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 88-92. DOI:10.13190/jbupt.2006s2.88.302
    • Abstract ( 2433 )     HTML       
    • Based on the analysis of the principle and method of two outstanding language models in recent years, that are Latent Semantic Analysis and Topic Model, the prospects of the two models on topic identification and text mining was presented. And the new strategy for the natural language understanding were proposed on the basis of the Comprehensive Information Natural Language Understanding methodology, that is, should make full use of the research findings of cognitive science nowadays in a new pragmatic perspective, explore the essence of the natural language to realize the computer understanding human’s language indeed.

    • Supplementary Material | Related Articles
    • Grey Clustering Evaluation Model and Its Application in Security Evaluation
    • ZHANG Ping,GU Li-ze,YANG Yi-xian

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 93-95. DOI:10.13190/jbupt.2006s2.93.zhangp
    • Abstract ( 2209 )     HTML       
    • Aiming at the poor generality for most models of security evaluation, a novel security evaluation model of information system was established based on the grey clustering theory. The evaluation of system security state using grey clustering decision-making method was put forward. The grey classes of system security state were given, and the whitenization weight function of grey classes was formulated. This model’s application was illustrated by an evaluation example, and the stability and reliability of evaluation results were analyzed according to the conception of sensitivity.

    • Supplementary Material | Related Articles
    • Word Sense Disambiguation with Semantic Graph Structure
    • WANG Jing-hua1, LIU Jian-yi1,2, WANG Cong1
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 96-100. DOI:10.13190/jbupt.2006s2.96.311
    • Abstract ( 2228 )     HTML       
    • A word sense disambiguation method based on semantic graph structure was presented. In the method, a text is represented as an undirected weighted semantic graph with WordNet, which defines synsets as vertices and relations of vertices as edges, and assigns the weight of edges with the relatedness of connected synsets. Combining with coherence synset and the synset frequency, PageRank* which is a modified PageRank formula for undirected weighted graph, was used to disambiguate the nouns in the text. The experimental result shows that this method is effective and practical.

    • Supplementary Material | Related Articles
    • A Narrowband Audio Hiding Algorithm Based on Human Auditory System
    • YUAN Kai-guo 1,YANG Ya-tao 1,2,ZHANG Ru 1,NIU Xin-xin 1,YANG Yi-xian1

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 101-104. DOI:10.13190/jbupt.2006s2.101.304
    • Abstract ( 2164 )     HTML       
    • After studying about human auditory system and narrowband communications system model, a narrowband audio hiding algorithm based on human auditory system was presented. A lot of experiments proved that the algorithm had strong robustness to prevent many attacks from such as D/A, A/D, channel noise and so on. In time domain, frequency domain, especially for hearing, it had high transparence. What’s more, the algorithm, whose hiding capacity reached up to 20 bit/s, had intelligent blind detection property and can be used in many domains.

    • Supplementary Material | Related Articles
    • A Novel Queue Management Algorithm for
      Achieving Traffic Differentiation and Bandwidth Fairness
    • YANG Jie, WANG Yu-mei, LEI Zhen-ming

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 105-109. DOI:10.13190/jbupt.2006s2.105.yangj
    • Abstract ( 1999 )     HTML       
    • The differentiated service (DiffServ) architecture does not specify any scheme of priority between assured forwarding (AF) out-profile packets and best effort (BE) packets. In order to avoid misbehaving AF flows occupying excessive bandwidth, a simple core-stateless queue management scheme, named TD&BF, was proposed, which not only guarantees the committed rates of AF flows but also fairly allocates remained bandwidth between the BE and AF flows. Analysis and simulation results showed that the proposed scheme was highly effective and efficient.

    • Supplementary Material | Related Articles
    • A Traffic Monitoring Method of Network Games
      Based on a Probe
    • LIU Fang, HUO Long-hao, LEI Zhen-ming

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 110-112. DOI:10.13190/jbupt.2006s2.110.liuf
    • Abstract ( 2396 )     HTML       
    • By analyzing QQ games traffic, it was found that its traffic could be divided into three kinds: transimission control protocol(TCP), g2dhttp and non g2dhttp. The relationship of g2dhttp traffic and QQ game traffic was obtained. The g2dhttp traffic could provide all information of users, such as user accounts, QQ accounts and game names etc.. The recognition method, which matched key words for the g2dhttp traffic, was fitted for traffic monitor and analyzer (TMA) probe. Therefore, a traffic monitoring method of QQ Games based on probe of TMA was presented. In this method, incoming and output packet numbers and total traffic could be calculated by recognizing g2dhttp traffic. Comparing with real network data, the error was small. The method can be used to estimate the traffic of QQ Games in high speed network.

    • Supplementary Material | Related Articles
    • Model research and Performance Analysis of BitTorrent-Like P2P System
    • OUYANG Rong, LEI Zhen-ming

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 113-117. DOI:10.13190/jbupt.2006s2.113.ouyr
    • Abstract ( 2194 )     HTML       
    • A model and performance analysis of BitTorrent(BT)-like P2P system was presented. The peer behavior in this system was analyzed in detail. A peer model, seed model, file fragment model, interesting and choking model and peer selection model were built while considering the effects of file fragment on this system. The probability of a peer interested in neighbor peer at BT sub-system, the probability of a peer being choked by neighbor peer, and the probability of uploading peer being selected were analyzed. By this model, the relation between the generant probability of a peer uploading behavior and the whole peer number at BT sub-system was studied. The data result showed that the generant probability of a peer uploading behavior decreased as the whole peer number at BT sub-system increased.

    • Supplementary Material | Related Articles
    • Learning Pattern Generation for
      Handwritten Chinese Character Using
      Pattern Transform Method with Cosine Function
    • CHEN Guang, ZHANG Hong-gang, GUO Jun
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 118-121. DOI:10.13190/jbupt.2006s2.118.cheng
    • Abstract ( 2536 )     HTML       
    • Based on pattern transform method with cosine function, a new pattern generation method for handwritten Chinese characters was proposed, which improved the performance of recognition system for handwritten Chinese characters. By using transform method with cosine function, the number of learning patterns was increased. Patterns generated artificially in this way were selected using pattern selection method and the patterns unsuitable for learning were discarded. The recognition experiment on HCL2000, a handwritten Chinese character database, showed that our method improved the recognition precision of whole system.

    • Supplementary Material | Related Articles
    • Research on a message driven communication scheme for distributed intrusion detection
    • 杜 晔1, GUO You-yan2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 122-126. DOI:10.13190/jbupt.2006s2.122.298
    • Abstract ( 2396 )     HTML       
    • A message driven communication mechanism was proposed, which takes the role of transforming information, and cooperating to detect vicious behaviors. The communication models and algorithms of detector, manager and communicator were designed. The protocol presented here was divided into three layers. Then, the definitions of common used messages were given, and communication processes were designed in detail. In the end, doorknob attack was used for simulation. Experimental results showed the validity of this mechanism to detect intricate event.

    • Supplementary Material | Related Articles
    • Comprehensive Information Knowledge-Guided
      Initial Review Assistant System for Scientific Journals
    • LI Wei, WANG Cong, LI Lei, GUO Yanhui, ZHONG Yixin

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 127-132. DOI:10.13190/jbupt.2006s2.127.liw
    • Abstract ( 2438 )     HTML       
    • Referring to the complex method of automatic abstraction system, a comprehensive information knowledge-guided initial review assistant system for scientific journals was presented and implemented in the specific field of vehicle license plates recognition. According to the characteristics of scientific papers and the experience of editors, the initial review was refined into four judgments. Supervised by the comprehensive information knowledge base, this system simulated the reviewing process of editors, from skimming, scanning to perusing, to assist editors with initial review by understanding the content of scientific manuscripts. The preliminary experimental results showed that the method was effective and practical.

    • Supplementary Material | Related Articles
    • A Group Signature Scheme Based on the Weil Pairing
    • WANG Biao1-3 , YANG Xiao-dong1 , HUANG Hai-ning3

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 133-135. DOI:10.13190/jbupt.2006s2.133.303
    • Abstract ( 2450 )     HTML       
    • By using the bilinear property of the Weil pairing defined on elliptic curves and Euler’s criterion, a group signature scheme is presented. In the scheme, each signer is only responsible for signing of a particular section of the message, and then the signature is sent to the system administrator. A group signature of the message is created by the system administrator finally, which can be verified by the corresponding public key without revealing the whole message. The cost of managing and storing the public key certificate could be efficiently decreased with this scheme, and the signature size is only about a quarter of the Guillou-Quisquater signature.

    • Supplementary Material | Related Articles
    • Research on Auto Text Classification Model Based on PCA
    • ZHANG Jin1,3, LI Guang2, CAO Wu4 , HU Rui-fen1

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 136-138. DOI:10.13190/jbupt.2006s2.136.300
    • Abstract ( 2614 )     HTML       
    • Base on BP neural networks and PCA, an auto text classification model was presented. By the use of PCA, this model reduced the dimensions of feature matrix, and the parameters were optimized gradually by amounts of simulation results. The experimental results based on 20-newgroups shows that the model has better performance and can get high accuracy of text classification.

    • Supplementary Material | Related Articles
    • A Visual Simulation System for SMR Based on Cylinder Display
    • RUAN Rui-qing, JIA Qing-xuan, SUN Han-xu, SONG Yi-gang, SONG Jing-zhou

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 139-143. DOI:10.13190/jbupt.2006s2.139.ruanrq
    • Abstract ( 2277 )     HTML       
    • A mathematic model of attacking spacecraft in low circular orbit for Space Micro-Robot (SMR) by use of C-W formula was built. And based on the cylinder display system, a visual simulation system suitable for spaceflight mission was constructed. The system is expected to provide an immersive visual simulation environment for the analysis and design of spaceflight mission of SMR. The design and realization of visual simulation was described. Some key technologies such as the design of the structure, geometric modeling and kinematics modeling, data driving for model and observer controlling were discussed. The implementation of functional modules in the cylinder display system. was analysed.

    • Supplementary Material | Related Articles
    • Mining Model for User Profile in Personalized Mobile Service
    • ZHOU Yan-quan, ZHANG Chuan-fu, ZHANG Rui-hua, LI Lei, HE Hua-can

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 144-147. DOI:10.13190/jbupt.2006s2.144.zhouyq
    • Abstract ( 2253 )     HTML       
    • Based on the off-line mobile news service system already realized, the model for precise description and measurement of user profile was studied through adopting the technology of knowledge discovery from database. The news browsing manner of mobile users was analyzed, while news similarity was computed based on users’ reading style, then the model for user profile was generated by the mining algorithm. The experiments showed that this model worked very well in describing user profile and promoted efficiency of personalized mobile service system.

    • Supplementary Material | Related Articles
    • Gait Extraction Based on Optical Flow
    • YAO Jian, LIU Ji-wei, HAN Xu, WANG Zhi-liang

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 148-150. DOI:10.13190/jbupt.2006s2.148.mej
    • Abstract ( 2327 )     HTML       
    • An improved technique for Lucas-Kanade optical flow was proposed, which was used in the field of gait recognition. Firstly, a constrained equation of high-order gradient was introduced, and then Hessian matrix can be computed. Secondly, the reciprocal of conditional operators of Hessian matrix was taken as the weighted matrix of Lucas-Kanade flow field. This method can eliminate the unreliable constrained points of local neighborhood, and increase the stability of the basic solution of the constrained equation. The experiment results showed that the proposed method can establish the optical flow field for human gait precisely

    • Supplementary Material | Related Articles
    • Study on the Media Control Model for NGN
    • WU Jiang-xia, YANG Fang-chun

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 151-154. DOI:10.13190/jbupt.2006s2.151.wujx
    • Abstract ( 2323 )     HTML       
    • The convergence of the control layer of the Next Generation Network (NGN) requires the call control model supporting the media control in heterogeneous network environment. Based on the definition of media control models, the limitation of the media control models in existence was analyzed aiming at the characteristics of NGN. A novel media control model based on the abstraction of media control states with specific control protocols adaptation was proposed. The application proved that the model in supporting media control in heterogeneous network environment of NGN had the capability to converge the control layer of NGN, as well as the flexibility and extensibility of the model.

    • Supplementary Material | Related Articles
    • An Improved Secure Electronic Payment Protocol Based on Account
    • ZHU Zhen-rong, LI Hui, YANG Yi-xian

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 155-159. DOI:10.13190/jbupt.2006s2.155.zhuzhr
    • Abstract ( 2393 )     HTML       
    • By analyzing the iKP protocol and pointing out its drawbacks, an improved secure electronic payment protocol was presented, which preserved the security properties of the iKP protocol. The new protocol had the following benefits: cutting down the communication payload in the transaction, avoiding the redundant verification of signatures, supporting identification and evidence collection during delivery phase of the goods,providing the perfect protection of the purchase privacy, and guaranteeing that the consumers have had the possession of the goods before bank clearing starts.

    • Supplementary Material | Related Articles
    • A Method of Video Error Concealment in H.264 Based on Surface Fitting
    • LIANG Bo, LIU Ji-wei
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 160-163. DOI:10.13190/jbupt.2006s2.160.liangb
    • Abstract ( 2059 )     HTML       
    • Transmission error of video frequency always results in decoding mistake both in time and space and directly affects the quality of reconstructed image. This paper describes a new error concealment method for H.264. With the strong correlation of time and space between neighborhood macroblocks, the type and size selection of the lost block through the neighborhood blocks was estimated rightly. On the basis of the division result, a Shepard method constructed a surface was proposed to predict the motion vectors of the lost macroblock more exactly, and also improved the quality of the reconstructed image. The simulation result showed: this algorithm is better than usual boundary matching arithmetic. Under equal macroblock lost rate, the Y weight peak signal-to-noise ratio (PSNR) of video recovered by this proposed method could increase 0.75~1.5dB.

    • Supplementary Material | Related Articles
    • An Adaptive Real-Time Tracking Algorithm for Moving Object
    • LI Guo1,2, ZHANG Xin-ke2, YANG Guo-qing1, GAO Qing-ji2
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 164-167. DOI:10.13190/jbupt.2006s2.164.297
    • Abstract ( 2397 )     HTML       
    • An adaptive real-time tracking algorithm for moving object was presented based on mean shift and particle filter. In the method, video image from the PTZ camera was dealt, histogram character was updated adaptively, particle propagating was controlled by the mean shift algorithm ,based on the model-adaptive mode. Object position was calculated by particle weight. Finally the experiment results verified the practicability and efficiency of this algorithm.

    • Supplementary Material | Related Articles
    • Research on Humanized Features of a Control System from Mechanism Approach
    • BAI Fengshuang 1, YANG Shangbao1, TU Xuyan1, BAI Longfei2

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 168-173. DOI:10.13190/jbupt.2006s2.168.299
    • Abstract ( 1912 )     HTML       
    • To prove that the theory of transforms from information to knowledge and further to intelligence of mechanism approach was correct from functional approach, the humanized features of a control system and these relations each other were researched which included self-organizing property, self-coordinating property, self-adapting property, self-diagnosing property, and the system with humanized features can automatically changes according to changed inner and outsides surroundings and can automatically maintains itself. Using way of functional approach such as expert system method to realize humanized features was presented,and a frame of a self-organizing expert system, one of a self-coordinating expert system, one of a self-adapting expert system, and one of a self-diagnosing expert system were designed. The process to design these expert systems adequately embodied transforms from information to knowledge and transforms further from knowledge to intelligence.

    • Supplementary Material | Related Articles
    • A Gray Relation Analysis-Based Dynamic Access Selection Strategy in Heterogeneous Networks
    • LI Jun, FANG Ya-ding,SONG Mei, SONG Jun-de

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 174-177. DOI:10.13190/jbupt.2006s2.174.lij
    • Abstract ( 2560 )     HTML       
    • Based on gray relation analysis and multi-criteria decision, a dynamic access selection strategy was proposed to improve the accuracy of access selection for multi-model terminals in heterogeneous networks. By transforming access selection into multi-criteria decision, the effects of access selection parameters were considered comprehensively and an appropriate access network was supplied for the terminals. The simulation results showed that this strategy can provide optimal access networks for multi-model terminals after balancing multiple decision criteria.

    • Supplementary Material | Related Articles
    • Robust Locality Preserving Projection for Facial Expression Recognition
    • LI Rui-fan1, ZHU Qiang-sheng1, GUO Yan-hui1, LIU Hai-tao2

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 178-182. DOI:10.13190/jbupt.2006s2.178.305
    • Abstract ( 2191 )     HTML       
    • Aiming at the sensitivity of manifold learning, such as Locality preserving projection (LPP), to noises or outliers, a robust version of LPP, called Robust LPP (RLPP), was proposed. By this algorithm, all the data was firstly evaluated to obtain the possibility of data points as outliers. And then this information was used for neighborhood selection and low-dimensional embedding. The RLPP was used for the representation of facial images. The experiments on JAFFE database showed the effectiveness of this algorithm.

    • Supplementary Material | Related Articles
    • Personalized Information Recommendation Model Based on Attention–Emotion Cooperation
    • WANG Cong1, TU Xu-yan1 , LIU Jia2

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 183-187. DOI:10.13190/jbupt.2006s2.183.307
    • Abstract ( 1979 )     HTML       
    • Based on the analysis of the attention, emotion and their relationship, a model of attention-emotion cooperation was presented, which stimulated the selective attention by emotion. By considering the attention, emotion of the user and the semantic of information comprehensively in the service of Beijing traveling information recommendation, the personalized information recommendation model based on attention–emotion cooperation was proposed. By adding the emotion effects to the recommendation model, the personalized information recommendation based on attention–emotion cooperation integrated all of the information, made the information presentation suitable to the user’s selective attention, and provided a new direction of the personalized information recommendation and human-machine interaction.

    • Supplementary Material | Related Articles
    • Refining Context-Dependent Tonal Acoustic Modeling in Mandarin LVCSR
    • PENG Di1, LIU Gang1, GUO Jun1

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 188-191. DOI:10.13190/jbupt.2006s2.188.312
    • Abstract ( 2124 )     HTML       
    • In order to minimize the recognition errors caused by inaccurate model estimations from those toned triphones with limited training samples, we proposed to initialize toned triphones using their own toneless triphone model parameters. Besides, works concerning stopping criteria of decision tree state tying as well as mixture component adaptation are also explored to obtain better performance as well as reduce model scale. Experiments results have shown that, on the 863 corpus, along with all this improvements our system achieves certain increase of phone recognition rate, with much more trainable model scale as well.

    • Supplementary Material | Related Articles
    • CI-NLU Based Text Processing After Speech Recognition
    • LI Lei, Xu Jing, Gong Yuan, ZHOU Yan-quan, Wang Cong, ZHONG Yi-xin
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 192-196. DOI:10.13190/jbupt.2006s2.192.lil
    • Abstract ( 2722 )     HTML       
    • Applying the theory of CI-NLU (comprehensive information based natural language understanding, which protests that natural language could be understood through analyzing comprehensive information, the entirety of syntactic, semantic and pragmatic information.) into the research of reliable Speech Recognition, a new method of adding a text post-processing function of CI-NLU is put forward. The syntactic information of words (location and Speech Recognition stability), semantic information (meaning of sentence) and pragmatic information (harmony of word and its environment) are analyzed to check the sentence reliability of Speech Recognition result. Testing results have shown that the accuracy could be improved to a good extent.

    • Supplementary Material | Related Articles
    • Intelligent Agriculture Information Retrieval System Based HNC
    • WANG Jing-cheng

    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 197-201. DOI:10.13190/jbupt.2006s2.197.wangjch
    • Abstract ( 2105 )     HTML       
    • An intelligent agriculture information retrieval system based on hierarchical network of concepts (HNC) is designed and developed. In the system, a model of semantic-based text formalization, the context framework model (CFM) is presented, which is three-coordinate and describes the text as domain, situation and background. Based on the context framework, an information retrieval algorithm is developed. The algorithm has a kernel of domain knowledge, a base of situation framework and a limitation of background. The good effect during the run of the system for one year proved the feasibility of the technology.

    • Supplementary Material | Related Articles
    • An Example-based Machine-aided Writing and Translation System
    • TAN Yong-mei, WANG Cong, WANG Xiao-jie and ZHONG Yi-xin
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(s2): 202-206. DOI:10.13190/jbupt.2006s2.202.tanym
    • Abstract ( 1920 )     HTML       
    • An example-based machine-aided writing and translation methodology is presented. The system is designed and implemented. It is a form of translation wherein a human translator works on texts when using computer software designed to support and facilitate the writing and translation process. In machine-aided writing and translation, the computer program supports the translator, who translates the text himself, making all the essential decisions involved, whereas in machine translation, the translator supports the machine, that is to say that the computer or program translates the text, which is then edited by the translator, on the otherwise, is not edited at all. The system includes text search tools, concordances and translation memory managers. Text search tools, allow the user to query already translated texts or reference documents. Concordances are programs that retrieve instances of a word or an expression in a monolingual, bilingual corpus. Translation memory managers consist of a database of text segments in a source language and their translations in one target language.

    • Supplementary Material | Related Articles