Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Review

    • Present Status and Development of Network Convergence
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 1-8. DOI:10.13190/jbupt.201006.1.yuanchw
    • Abstract ( 2811 )     HTML       
    • Network convergence has become an important process and component of broadband strategy. Network convergence is aimed at promoting the information processing capacity and making china to be a network power. The connotation of network convergence is discussed, the domestic and international current status is introduced, the respective advantages and disadvantages of Broadcast & Television are analyzed, the key technology of network convergence, architecture of next generation network and problems of network convergence are presented, and the direction, goal and strategy of network convergence development are proposed.

    • References | Supplementary Material | Related Articles

    Papers

    • 4×10Gbit/s OTDM 100km Transmission and Demultiplexing
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 9-12. DOI:10.13190/jbupt.201006.9.chenm
    • Abstract ( 2110 )     HTML       
    • A 4×10Gbit/s optical timedivision multiplexed (OTDM) 100km transmission system with homemade multiplexer is implemented utilizing the clock recovery module combined with the sampling window of electrical absorption modulator (EAM). Errorfree demultiplexing is achieved experimentally. Dispersion and dispersion slope compensation are implemented simultaneously under the conditions of compensationinmiddle or compensationinend. And the power penalty is approximately 08dB and 065dB respectively after transmission.

    • References | Supplementary Material | Related Articles
    • Optimal Power Allocation Based on Power Cost in Relay System
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 21-24. DOI:10.13190/jbupt.201006.21.157
    • Abstract ( 2298 )     HTML       
    • Different fashions of power supply have different power prices. In order to reduce power cost in mobile communication network, an algorithm is proposed to minimize the outage probability based on power cost. It subjects to the constraint of power cost. The Lagrange multiplier maximization method is used to solve the problem. Simulation shows that whether dualhop or multihop transmission, the power prices of different nodes are not the same, the optimal power allocation based on power cost has lower cost compare than the optimal power allocation in the case of uniform outage probability. Whereas, the former has lower outage probability in the case of uniform power cost. The contrast is more obvious with the gap of power prices enlarges.

    • References | Supplementary Material | Related Articles
    • Transmit Diversity Design in FrequencySelective Channel
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 25-28. DOI:10.13190/jbupt.201006.25.wangxs
    • Abstract ( 2120 )     HTML       
    • In order to obtain space diversity to fight channel fading, a transmit diversity scheme applicable to frequency selective channel is proposed. With zero correlation zone complementary codes, both full space diversity and full frequency diversity can be obtained. Simulation proves this scheme has same performance compared to original diversity design in frequencyselective channel presented by previous research. Its transmitter and receiver structure are much simpler than the previous one, and shows more flexibly.

    • References | Supplementary Material | Related Articles
    • Optimal Power Allocation and Cooperation Partner Selection for  MultiNode AmplifyandForward Cooperation Systems
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 29-32. DOI:10.13190/jbupt.201006.29.lij
    • Abstract ( 2036 )     HTML       
    • The symbol error rate (SER) performance is analyzed for the optimization of amplifyandforward multinode cooperative communication systems. Firstly, theory SER is analyzed for the systems. Then, the corresponding low bound (LB) is derived, that will be nearing the theory SER between both low and high signaltonoise ratio conditions. Finally, algorithms used in optimal power allocation (OPA) and partnership selection for the systems by exploring the LB as cost function are formulated. Theoretical analysis and simulation results show that the OPA outperforms traditional equal power allocation in SER performance. Moreover, the LB will be more nearing the theory SER than existing algorithms especially under low SNR conditions.

    • References | Supplementary Material | Related Articles
    • A Subcarriers Coding Technique for MBOFDM Cognitive Radio
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 33-37. DOI:10.13190/jbupt.201006.33.zhaochl
    • Abstract ( 1833 )     HTML       
    • For the problem of intercarrier interference in orthogonal frequency division multiplexing (OFDM) signals of cognitive radio systems, a coding method for enhancing spectrum notch of OFDM signals is proposed. The same dates are transmitted on the two adjacent subcarriers, and then weight the dates on the two adjacent subcarriers to make their sidelobes cancel each other out at the frequency of spectrum notch, so as to reduce the power spectrum at specific frequency. Theoretic analysis and simulation results show that, not only the method can enhance the spectrum notch but also has a good performance of antinoise.

    • References | Supplementary Material | Related Articles
    • Outage Probability Analysis of MIMO Relaying System with TAS/MRC
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 38-42. DOI:10.13190/jbupt.201006.38.chenqb
    • Abstract ( 1867 )     HTML       
    • Closed-form expressions of outage probability is derived for multiple-input multiple-output (MIMO) relaying channels with transmit antenna selection/ maximal-ratio combining in two-hop nonregenerative relay networks operating over nakagami fading channels. The effects of fading parameters and antenna con?guration on the overall system performance are analyzed and discussed through representative numerical examples. Simulation results show that channel quality of the first hop link in nonregenerative MIMO relaying system plays a major influence on outage performance.

    • References | Supplementary Material | Related Articles
    • Performance Analysis of WLAN Based on IEEE 802.11a
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 43-47. DOI:10.13190/jbupt.201006.43.gaof
    • Abstract ( 2076 )     HTML       
    • To improve the accuracy of evaluation on IEEE 802.11a data service supporting capacity and guide network planning work, a modified twodimensional Markov chain model of the backoff window scheme is proposed. By analyzing the IEEE 802.11a wireless local area network (WLAN) system performance in the aspect of framing efficiency and distributed coordination function (DCF) efficiency, the normalized system throughput and average packet delay under the condition of saturation are found. On the basis of that, the handoff thresholds for basic access mode and request to send/clear to send (RTS/CTS) mode for diverse number of nodes are given, thus the system performance is optimized.

    • References | Supplementary Material | Related Articles
    • A New DualMode Blind Equalization Algorithm in  Underwater Acoustic Channel
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 48-53. DOI:10.13190/jbupt.201006.48.zhaoxq
    • Abstract ( 1644 )     HTML       
    • A honeycomb (nonsquare) 16 amplitude phase keying (APK) modulation is proposed. A new dualmode based on honeycomb decision region algorithm (DHDRA) is provided. The proposed algorithm is simulated using a typical shallow underwater acoustic channel. Simulation shows that, more antiinterference and faster convergence are achieved with the constant modulus algorithm (CMA) based on the honeycomb 16APK than that with the square 16QAM, meanwhile. Also, higher convergence speeds and less steady residual errors are got with the proposed dualmode algorithm than the that with the squared decision region algorithm. They have the research value for improving the underwater communication qualities and decreasing the intersymbol interference.

    • References | Supplementary Material | Related Articles
    • Layered Relay Multicast Scheme within Cells of Cellular System and Analysis for Channel Capacity
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 54-57. DOI:10.13190/jbupt.201006.54.wangchj
    • Abstract ( 1875 )     HTML       
    • Within cells of cellular system, the mobility of relay terminals causes the cooperative relay channels instability, brings frequent interruptions to multicast stream. To solve this problem, a layered relay multicast scheme with highcapacity and continuity of multicast service is proposed. Based on a layered abstract model and a nonfading wireless model for satisfying the scheme, the capacity of layered multiple relay channel is studied. Analysis and simulation show that the scheme guarantees the continuity of multicast service when compared with general nonlayered relay networks, though it causes a slight loss on capacity.

    • References | Supplementary Material | Related Articles
    • UtilityBased Resource Allocation in Wireless Networks
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 58-63. DOI:10.13190/jbupt.201006.58.chenl
    • Abstract ( 2308 )     HTML       
    • The problem that the existed resource allocation strategies cannot give integrative consideration to quality of service (QoS), frequency efficiency for mixed traffic scenario is stated. And a utilitybased resource allocation strategy for wireless networks from practical utilization aspect is proposed. The unified utility function for users with different traffics is studied firstly. Secondly, the resource allocation strategy based on this unified utility function is analyzed in mixed traffic scenario after building and analyzing the optimization model. This strategy can automatically guarantee the QoS requirement for realtime traffics and the tradeoff between throughput and fairness for users with best effort traffics through utility function. Numeric simulation indicates that this strategy is very applicable for mixed traffic, and the resource requirements for QoS users can be satisfied preferentially in mixed traffic scenario.

    • References | Supplementary Material | Related Articles
    • A PasswordBased Authenticated Key Exchange  Protocol for MobileCommerce Environments
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 64-67. DOI:10.13190/jbupt.201006.64.fanyj
    • Abstract ( 1631 )     HTML       
    • For mobilecommerce environments, a novel passwordbased authenticated key exchange protocol is proposed to solve that the technology to effectively prevent legitimate users’ abuse, named as completely automatic public Turing test to tell computer and human apart (CAPTCHA), is vulnerable to analytical attacks. The protocol elaborately combines the CAPTCHA challenge/response progress with the authenticated key exchange interaction. It introduces symmetric encryption scheme to make CAPTCHA secure without additional communication rounds. And it is based on smartcards to obtain stronger security and adopts elliptic curve cryptosystem which is suitable for the environments. In random oracle model it is provably secure. Compared with the other related protocols, it requires only three communication rounds, protects CAPTCHA against analytical attacks, needs no validation tables storing on the server and provides perfect forward secrecy.

    • References | Supplementary Material | Related Articles
    • Phase Rotation Precoding for Orthogonalized Spatial Multiplexing System
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 68-71. DOI:10.13190/jbupt.201006.68.tianxj
    • Abstract ( 2250 )     HTML       
    • To decrease feedback overhead, a phase rotation precoding for orthogonalized spatial multiplexing (PROSM) system is proposed, in which a proper rotation is set at the imaginary part of modulated signals. Compared with the power allocation precoding of OSM (PLOSM), the feedback information of this scheme is decreased and the complexity of calculating precoding parameter is also reduced. Simulation results show that with the same reliability of PLOSM, the proposed scheme saves four bits feedback overhead.

    • References | Supplementary Material | Related Articles
    • A Verifiable MultiPolicy Secret Sharing Scheme
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 72-75. DOI:10.13190/jbupt.201006.72.wangf
    • Abstract ( 1874 )     HTML       
    • The secret sharing schemes are important techniques for key management. However, most verifiable multisecret sharing schemes can not distinguish the security classification because of having the common drawback of sharing secrets with the same value. A verifiable multipolicy secret sharing scheme is proposed. The significant character of the proposed scheme is that each participant has to be kept only one master secret share, the share can be used to reconstruct different group secrets according to the number of threshold values. So it will reduce the calculated amount of the secret distributor. Moreover, the efficient solutions against multiform cheating are proposed, the scheme is therefore with highly security and practicality.

    • References | Supplementary Material | Related Articles
    • Approximate Merging of a Pair of CEBézier Curves
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 76-80. DOI:10.13190/jbupt.201006.76.hug
    • Abstract ( 2037 )     HTML       
    • Cubic extension Bézier (CEBézier) curve with multiple shape parameters is one of the most important extensions of the cubic Bézier curve. It not only inherits the outstanding properties of the cubic Bézier curve, but with a good performance on adjusting their local shapes by changing the shape control parameters. In order to develop the basic theory of CEBézier curve, a new method to deal with approximating two adjacent CEBézier curves by one CEBézier curve is presented for the approximate merging of existing curve design. By combining the fitting method of curves and the theory of the general inverse matrix, the explicit formula of control points of the merged CEBézier curve can be given directly. Eventually, some merging examples are discussed and the errors of approximate merging are given as well. Experiments illustrate that the proposed method not only has a good merging effect, but is easy to implement and simple to error estimation.

    • References | Supplementary Material | Related Articles
    • Analysis on Strain Compensation in LongWavelength QDVCSELs
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 84-87. DOI:10.13190/jbupt.201006.84.158
    • Abstract ( 1735 )     HTML       
    • The GaNAs strain compensation layers for the growth quality of the InAs/GaAs quantum dots stack in quantum dots verticalcavity surfaceemitting lasers (QDVCSELs) are investigated. The influences of different concentrations and locations of the compensation is obtained. The approach in determining the optimal compensation parameters is also achieved. We give instructions in fabricating the QD active region in QDVCSELs of long wavelength (12-16μm).

    • References | Supplementary Material | Related Articles
    • Credit Scoring Used for Different Arrears Rates
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 88-92. DOI:10.13190/jbupt.201006.88.zhangyj
    • Abstract ( 2049 )     HTML       
    • The initial credit scoring of telecom customers for different arrears rates is studied to improve the fairness and reasonableness of credit scoring. Using genetic algorithm and ant colony algorithm respectively, the weights of the customer attributes with respect to the credit are obtained to mine important knowledge from the customer data sets with different arrears rates. A credit scoring model added evaluation factor is proposed in order to find the optimum solution of credit weights in the case of high rate of arrears. Experiments indicate that it is necessary to select different scoring algorithm or different scoring model for the group with different arrears rates.

    • References | Supplementary Material | Related Articles

    Reports

    • Handover Decision Method Based on Wavelet for Cognitive Network
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 98-102. DOI:10.13190/jbupt.201006.98.wangjy
    • Abstract ( 2045 )     HTML       
    • A handover decision method for cognitive networks is investigated in the context of wavelet and pattern recognition. It follows two steps: firstly, making multiresolution analysis to the signal received in base station to get the basic signal and the noise signal. Secondly, making the pattern recognition and handover decision by artificial neural fuzzy inference system. Simulation shows that it greatly improve the system’s performance when the channel is in low signaltonoise ratio. Besides, it makes the system cognitive and adaptive to the changes of the environment.

    • References | Supplementary Material | Related Articles
    • Applications of PostFunction Information in Software Static Testing
    • Jin Da-Hai
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 103-106. DOI:10.13190/jbupt.201006.103.159
    • Abstract ( 2093 )     HTML       
    • A method using postfunction information (PFI) is presented, in order to improve the precision in software static testing. The PFI includes local modified set and global modified set used to model the effect on data flow under testing. An algorithm to generate PFI by using control flow iteration for each function is proposed as well. The generated PFIs by the algorithm can be used in the phase of interval computation and defect pattern detection. Applications in defect detect system verifies the feasibility of this method.

    • References | Supplementary Material | Related Articles
    • CodeOrthogonalized TransmittedReference Chirp UltraWideband  System with Active Spectrum Compressed Structure
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 107-111. DOI:10.13190/jbupt.201006.107.zhangj
    • Abstract ( 2249 )     HTML       
    • Based on the transmittedreference impulse radio ultrawideband (IRUWB) system, a new codeorthogonalized transmittedreference chirp UWB system is proposed to meet the needs of UWB application with increasing transmission distance. Referring to the dechirp methods in radar system, it designs an active spectrum compressed structure for the receiver. Analysis and simulation show that this system has both the advantages of transmittedreference IRUWB systems and chirpUWB systems. Furthermore, the analog matched filter and highspeed analogtodigital converter are not required, but facilitate system miniaturization, low powerconsumption and integration design.

    • References | Supplementary Material | Related Articles
    • SRLBased Trust Predicting Model Used in MultiAgent Systems
    • LI Xiaoyong
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 112-115. DOI:10.13190/jbupt.201006.112.lixy
    • Abstract ( 2249 )     HTML       
    • Focusing on the requirement of trust management in multiAgent systems, the sarsa reinforcement learning (SRL) theory is applied to construct trust prediction model for multiAgent systems based on Agent’s behavior. First, basic formal description is conducted for trust decision, and behavior statespace structure is constructed based on timestamp according the interaction time sequence between network Agents. With SRL algorithm, overall trust relationship predicting model based on direct trust degree and feedback trust degree is proposed. The model makes full use of the advantages of the strong dynamic adaptive capacity of the SRL algorithm, brakes away from the inadequate dynamic adaptive capacity in the traditional software trust modeling process. Simulation in cumulative errors shows that, compared to the existing models the new model has remarkable enhancements in the trust decision accuracy.

    • References | Supplementary Material | Related Articles
    • An Effective LoadBalancing Algorithm SDYA for Structured P2P Systems
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 116-120. DOI:10.13190/jbupt.201006.116.miw
    • Abstract ( 2468 )     HTML       
    • In distributed Hash table(DHT)based peertopeer(P2P)systems, the use of DHT and the heterogeneity of nodes’ capacities may give rise to load imbalance problems, and affect the DHT system efficiency as well. A new load balance algorithm, static load distribution algorithm and dynamic load adjustment algorithm (SDYA) is presented, it adopts the concept of virtual server. And the algorithm assigns rational load and corresponding address space that can be dynamic regulated to every peer in P2P. Through research and simulation analysis, compared with the traditional virtual server loadbalancing algorithm,the SDYA algorithm is with better load balance, faster velocity of load balancing, less load movement cost, and more excellent stability of P2P system.

    • References | Supplementary Material | Related Articles
    • Network Security Assessment Based on Node Correlated HMM
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 121-124. DOI:10.13190/jbupt.201006.121.longm
    • Abstract ( 2426 )     HTML       
    • Aimed at the problem that the node correlation in network is not considered in hidden Markov model (HMM) network risk assessment, combining graph theory model, the network node correlation (NNC) state transition matrix is built. With the intrusion defective system(IDS) alert as input, using modified HMM model the attacking route is figured out. Furthermore, the successful probability of any attacking sequence with any length can be got as well. The method can help to find vulnerabilities of network nodes, and reflect network risk well. Experiment demonstrates the validity of it. 

    • References | Supplementary Material | Related Articles
    • Outage Probability and Error Performance Analysis in APRelayed  InterVehicular Communication System
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 125-128. DOI:10.13190/jbupt.201006.125.lizhx
    • Abstract ( 2386 )     HTML       
    • In order to improve the system performance for vehicletovehicle communications over doubleRayleigh fadings, the accesspoint relayed intervehicular communication (IVC) model is proposed. The statistical properties of the receiving signaltonoise ratio in IVC system are studied and a closedform expression on outage probability is obtained. And based on moment generating function method, the union upper bound on average bit error rate (ASER) is derived. Simulation results show that the theoretical analysis on outage probability coincides with Monte Carlo numerical calculations well. The ASER of the relaying IVC system is decreased and the diversity gains are achieved 3dB more at most through optimal power allocation method than equal power allocation scheme.

    • References | Supplementary Material | Related Articles
    • The Degree Distribution Optimization of Short Code  Length LT Codes Using Ant Colony Algorithm
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 129-133. DOI:10.13190/jbupt.201006.129.huangch
    • Abstract ( 2466 )     HTML       
    • The degree distribution is key index to evaluate the performance of Luby transform (LT) codes. In order to obtain a better degree distribution, a degree distribution optimization method is proposed. By using ant colony algorithm and Monte Carlo simulations, some statistical parameters are selected as optimization target values. By searches of ant colony algorithm, optimized degree distribution could be derived. Compared with the actual decoding performance of optimized degree distribution according to simulations, the effectiveness is confirmed that can achieve the optimization target values by statistical parameters from Monte Carlo simulations.

    • References | Supplementary Material | Related Articles
    • A Macro Diversity Strategy Based on HighDimensionFullRate STBC
    • Journal of Beijing University of Posts and Telecommunications. 2010, 33(6): 134-138. DOI:10.13190/jbupt.201006.134.liuy
    • Abstract ( 1980 )     HTML       
    • For supporting large number of transmit antennas in macro diversity transmissions, a highdimensionfullrate (HDFR) quasiorthogonal spacetime block code (QOSTBC) is proposed. The new code operates at full rate, and the maximum likelihood decoding complexity is controllable. The equivalent channel matrix of this code is analyzed. It is concluded that the eigenvectors are constant and independent from the real channel realization. Furthermore, a new preprocessing transmission strategy with singlesymbol linear decoding complexity is given by exploiting the revealed characteristic of HDFR QOSTBC. Simulation shows that the proposed strategy is of more advantage for macro diversity comparing with minimum decoding complexity code and cyclic delay diversity.

    • References | Supplementary Material | Related Articles