Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Review

    • Research and Progress on Internal Antenna of Mobile Terminals
    • LI Chu-Lan, LIU Yuan-An, SU Meng
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 1-7. DOI:10.13190/jbupt.201102.1.lishl
    • Abstract ( 2035 )     HTML       
    • Abstract: High performance structure technology, miniaturization and multi-band methods of internal antenna were investigated. The main research orientations and application characteristics of internal antenna in recent years were summarized. The key technology in the design of high performance internal antennas of mobile terminals such as antenna structured method, combinatorial method, bandwidth enhancement, and loaded method were investigated and analyzed. Meanwhile, based on the practices of actual internal antenna production, we discussed the difficulties in miniaturized, multiband and high performance internal antennas and provided some effective solutions. The research indicated that the advanced manufacturing technology has promoted the implementation of the 2-3 bands internal antenna, however, the implementation of three or more bands should mainly depend on the combinatorial method. Predictably, the new technology of internal antenna is coming to the fore which will promote wider application of mobile terminals and meet the future demand for development of seamless, ubiquitous mobile radio communication network.
    • References | Supplementary Material | Related Articles

    Papers

    • An Aggregate Signature Based MultiParty Contract Signing Protocol
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 8-11. DOI:10.13190/jbupt.201102.8.sunyb
    • Abstract ( 2168 )     HTML       
    • Based on the unrestricted aggregate signature scheme and the public-key cryptosystem based broadcast protocol, a new multi-party contract signing protocol (MCSP) was proposed. The MCSP employed the public-key cryptosystem based broadcast protocol (PCBP) to distribute the messages of the signers, and employed the unrestricted aggregate signature scheme to sign the contract between the signers. The implementation of MCSP is divided into two phases:The signers exchange the aggregate signature on the message and voucher in the first phase; then, they exchange their signatures on the contract. If a dispute occurs in the process of implementing, any signer can ask the adjudicator to settle the dispute to ensure fairness. The performance analysis results show that the proposed multi-party contract signing protocol satisfies the requirements of unforgeability, opacity, extractability and fairness. The proposed CSP has more efficient,and the interactions of message grow linearly with the increase of the parties.

    • References | Supplementary Material | Related Articles
    • A Parallel Combinatory Spread Spectrum Based  Study on the Improved UWB Receiver
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 12-16. DOI:10.13190/jbupt.201102.12.037
    • Abstract ( 2621 )     HTML       
    • Providing special correlated template, an improved ultra wide band (UWB) receiver based on parallel combinatory spread spectrum is presented. With help of these special templates, the UWB signals demodulation and despread of parallel combinatory spread spectrum signals can accomplished, and the infection coming from the error codes in demodulation of the UWB portion is reduced as well. Simulation shows that, under the background of the additive white Gaussian noise, the improved structure has a better biterror rate performance. And when the bit error rate is about 10-4, the signal to noise ratio of the improved structure needed is about 2dB lower than the former one. 

    • References | Supplementary Material | Related Articles
    • Cooperative Spectrum Sensing under Imperfect Decision Transmission
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 17-21. DOI:10.13190/jbupt.201102.17.liuq
    • Abstract ( 2257 )     HTML       
    • The existing solutions of cooperative spectrum sensing (CSS) based on decision fusion are mostly built on the assumption of ideal decision transmission without considering any fading or noise corruption in common control channels. For this, the sensing channels and control channels are extend as Suzuki characteristics. A cooperation scheme is proposed under imperfect decision transmission model, in which a detector based on minimum error probability rule is used for decision estimation. The final decision combination is accomplished with K out of N rule. As demonstrated both by simulation, there is some performance deterioration in the proposed scheme, when compared with the ideal case that assumes errorfree decision transmission. It is even inferior to the local sensing when the average signal to noise ratio of the control channels is very low. Further, the spatial correlation of shadowing effects is investigated. It is shown that the negative impacts of correlated shadowing on the CSS gets weaker with the increasing distance between each other of the secondary users.

    • References | Supplementary Material | Related Articles
    • Analysis on Stochastic Resonance Parameters Adaptive Adjusting
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 22-25. DOI:10.13190/jbupt.201102.22.wulp
    • Abstract ( 2291 )     HTML       
    • Considering the stochastic resonance phenomenon is constrained and influenced by signal amplitude and frequency, noise intensity and system parameters, a fast and effective adaptive adjusting method for stochastic resonance (SR) parameters is proposed. The adaptive adjustment of the sampling frequency and system parameters for the timevarying input signal and noise not only can effectively prevent data overflow in SR process, but also can maintain the best signal processing performance and keep the output signal to noise ratio at the maximum value. Simulation demonstrates the validity of proposed method.

    • References | Supplementary Material | Related Articles
    • An Improved Fuzzy Sarsa Learning
    • Xue-Song CHEN
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 31-34. DOI:10.13190/jbupt.201102.31.chenxs
    • Abstract ( 2081 )     HTML       
    • It is difficult for fuzzy Sarsa learning(FSL) to tune learning rate and balance exploration vs. exploitation, so an improved FSL(IFSL) method based on FSL is presented. In the method, an adaptive learning rate generator for tuning learning rate online and a fuzzy balancer for controlling the degree of exploration vs. exploitation are introduced. The diagram of IFSL is given, and the weight vector of IFSL with stationary action selection policy converges to a unique value is proved. Simulation results show that IFSL well manager balance, and outperforms FSL in terms of learning speed and action quality.

    • References | Supplementary Material | Related Articles
    • eTom / SOA for the Digital Convergence Operation Support System and Process Implementation
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 39-44. DOI:10.13190/jbupt.201102.39.huangzhy
    • Abstract ( 2474 )     HTML       
    • In order to realize the digital convergence business integration of operational management needs, we propose an architecture which uses the enhanced telecom operations map model structure of telemanagement forum and serviceoriented architecture for design core. The architecture fulfills the future digital convergence business oriented requirements to construct the completed operation support system(OSS), and analyze instructions architecture constitute modules and related subsystems. In addition, using web services interface the service network component interface and information transmission standardization are built. Therefore, this architecture can provide a framework of recommendation and reference for customer service order process flow description based on digital convergence networks service operation support system.

    • References | Supplementary Material | Related Articles
    • A Dynamic Compuation Approach to Determining the  Threshold in Network Anomaly Detection
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 45-49. DOI:10.13190/jbupt.201102.45.yuyh
    • Abstract ( 2303 )     HTML       
    • Fault correction by detecting anomalies designating performance degradation is an important approach to improving the reliability of communication network. Statistical hypotheses testing approach is employed to detect network anomaly. A new approach to acquiring the fluctuation threshold is proposed comprehensively when taking advantage of time series prediction confidence interval computation based on multiplicative autoregressive integrated moving average. Furthermore, under the assumption that the training residual which is a white noise process follows normal distribution, the associated confidence interval of prediction can be figured out under any given confidence degree by constructing random variable satisfying t distribution. Experiments verify the effectiveness of anomaly detection mechanism and the accuracy of the algorithm. 

    • References | Supplementary Material | Related Articles
    • A Calculation Method of Minimum Link Scheduling Time Lower Limit for Wireless Mesh Multi-Gateway Access
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 50-53. DOI:10.13190/jbupt.201102.50.liaoy
    • Abstract ( 2645 )     HTML       
    • Aiming at the unresolved problem of estimating the minimum link scheduling time lower limit in wireless Mesh networks when taking multigateway accessary, a new calculation approach of its time lower limit is put forward .The method essentially involves a Pareto optimizing problem based on resource allocation. The Lagrangian algorithm,via Lyapunov function, is taken to solve the problem. The minimum link scheduling time lower limit based on optimized rate of multigateway accessing can be figured out. The foregoing method can not only calculate the lower limit of the minimum link scheduling time more accurately, which is used to evaluate the network performance, but also can reach the goal to optimize the upstream link scheduling rate in wireless mesh networks and to improve the link throughput.

    • References | Supplementary Material | Related Articles
    • The Construction of Changeable Intruder Model in Model Checking
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 54-57. DOI:10.13190/jbupt.201102.54.yangyy
    • Abstract ( 2073 )     HTML       
    • A construction scheme of the changeable intruder model is proposed. By defining the concept of abstract terms and their operation rules. The changeable intruder model (CIM) can greatly reduce the complexity of algebraic operations for intruders. And the CIM defines the intruder action library and the attack rule selection algorithm, which enables the analysts construct a changeable intruder model according to different protocols. As the actions of the intruder are composable, the CIM is able to dynamically adjust the intruder models. Changeable intruder model ensures both efficiency and correctness of the protocol analysis for model checkers.

    • References | Supplementary Material | Related Articles
    • A PSOFuzzy Neuron Based Access Selection in Heterogeneous Wireless Networks
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 58-62. DOI:10.13190/jbupt.201102.58.038
    • Abstract ( 2589 )     HTML       
    • Aiming at solving the problem that access selection method based on fuzzy logic and neural network technology for heterogeneous wireless network did not consider network load conditions reasonably, a particle swarm optimization (PSO)fuzzy neuron based access selection algorithm with dynamic adaptability for network load is proposed. This method set equal access blocking rate as a goal for fuzzy neuron parameter learning, and combined with PSO algorithm with global optimization capability to set initial parameters value, so as to improve the precision of parameter learning. Simulations show that the proposed algorithm can balance the load among networks effectively, and reduce the access blocking rate compared with maximum load balance algorithm.

    • References | Supplementary Material | Related Articles
    • A Gradient Based Routing Algorithm for Delay Tolerant Networks
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 63-66. DOI:10.13190/jbupt.201102.63.duanpr
    • Abstract ( 2618 )     HTML       
    • In order to reduce the waste of network resources caused by multiple copies routing in delay tolerant networks (DTN), a routing algorithm based on probability gradient and fresh gradient (PFG) is proposed. In the algorithm, the historical track of the destination node and the coverage potential field of the destination node are established with probability gradient and fresh gradient. When the two nodes meet, the message will be sent to the node which is much fresher and with higher probability to the destination node, it means that more waste of network resources can be avoided. Simulations show that the PFG can efficiently reduce data copies in network under the same message delivery rate and message average delivery delay, and hence improve the system performance.

    • References | Supplementary Material | Related Articles
    • A SuperContinuum Based All Optical MultiChannel Source Generation in RadioonFiber System
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 67-70. DOI:10.13190/jbupt.201102.67.liwj
    • Abstract ( 1911 )     HTML       
    • A millimeterwaveband multichannel source generating method for wavelengthdivisionmultiplexed (WDM) radioonfiber (ROF) systems is proposed. Firstly, the combined use of a femtosecond semiconductor modelocked laser and two 5mlong high nonlinear photonic crystal fibers with opposite dispersion values is demonstrated experimentally to implement a supercontinuum with width of more than 170nm around 1550nm. Secondly, a sampled fiber Bragg grating is used to filter spectrum. It is shown that the spectrum is sliced into 20 channels with ±03dB peak fluctuation. Each two adjacent channels can be filtered out as one channel radiofrequency carrier. 10channel carriers are successfully obtained for WDMROF system. These tenchannel carriers have some advantages such as small gain fluctuation, large modulation depth and narrow width, etc.. Besides, the whole system can be easily integrated for its simple structure and small insertion loss.

    • References | Supplementary Material | Related Articles
    • The Sensing of the Secure Cooperative  Spectrum in Cognitive Radio Networks
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 71-75. DOI:10.13190/jbupt.201102.71.yanq
    • Abstract ( 2415 )     HTML       
    • Based on the established threat model in cognitive radio networks, the performance loss of conventional cooperative spectrum sensing scheme under malicious attacks is figured out. And a weighted cooperative spectrum sensing algorithm is proposed based on the cognitive radio’s (CRs’) reputation. The reputation values are updated according to the behavior history of CRs, the weighted factors are derived from reputation values, and the final result is made by weighted fusion as well. Simulations show that the new method outperforms the conventional cooperative spectrum sensing algorithms under threat environment.

    • References | Supplementary Material | Related Articles
    • An Algorithm of FixPoint Information Interception for Soft Decoding Based on Cost function
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 76-80. DOI:10.13190/jbupt.201102.76.liangd
    • Abstract ( 2112 )     HTML       
    • In digital wireless communication systems, to reduce the complexity of channel decoding, the soft information always needs to be intercepted as fixpoint information before channel decoding. Upoverflow and downoverflow will be happened during the interception process, and then two kinds of system performance degradation will be occured. Based on joint consideration about these two kinds of overflow, a new adaptive fixpoint information interception method is suggested, so that the system performance will show better than those existed methods and even near to the exhaust algorithm, with high time efficiency. This method is verified by simulations, and then successfully applied to on a broadcast communication platform based on superposition coding.

    • References | Supplementary Material | Related Articles
    • A Throughput Efficiency Oriented Opportunistic Routing in Wireless Mesh Networks
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 81-84. DOI:10.13190/jbupt.201102.81.041
    • Abstract ( 2370 )     HTML       
    • A throughput efficiency oriented opportunistic routing algorithm for wireless Mesh networks is proposed. The relationship between the qualities and quantities of forwarding nodes is researched. The forwarding characteristics of multiforwarders are analysed. Consequently,a new routing metric and a corresponding forwarder selection algorithm is presented successively. With this method, we will achieve a better balance between the number of forwarders and link stability for introducing the factor of transmission time. Simulations show that the proposed algorithm can achieve higher endtoend throughput with fewer number of forwarding nodes and transmissions.

    • References | Supplementary Material | Related Articles
    • An Approach on Association Patterns Mining in Telecommunication Alarm Database
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 85-89. DOI:10.13190/jbupt.201102.85.xuqf
    • Abstract ( 2509 )     HTML       
    • Currently limiting to the minimal support, the algorithms used in alarm association rules mining are almost applied in the frequently occurring alarm events. A new algorithm based on graph theory to mine telecommunication alarm pattern is proposed. It first mines networks 2items association pattern by scanning the database only once, and then gets the maximal association mode, so that it can avoid generating lots of middle items. Experiments based on the actual network alarm data demonstrate the efficiency and the effectiveness of the algorithm.

    • References | Supplementary Material | Related Articles

    Reports

    • A SpaceTime Equalizer under Wavelet Transformation with Structure Risk Minimum Criterion
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 90-93. DOI:10.13190/jbupt.201102.90.maozhy
    • Abstract ( 2453 )     HTML       
    • A new spacetime equalizer with wavelet transformation based on structure risk minimum criterion (WSRMSTE) is present to improve convergence speed by a wavelet transformation. In some dimensions wavelet signal space, it not only takes advantage of learning information in communication signals, but also appropriately exploits structure information of filters. It adaptively adjusts wavelet coefficients and capacity control coefficients. Simulation is carried out. It shows that, compared with a spacetime equalizer based on structure risk minimum criterion, and a typic spacetime equalizer with wavelet transformation based on support vector machine, the WSRMSTE is with better track performance and rapid convergence speed. So, it can be applied to wireless mobile communications.

    • References | Supplementary Material | Related Articles
    • A P2P Topology Construction Model Sensitive to Interest Domain Trust Similarity
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 94-98. DOI:10.13190/jbupt.201102.94.yangl
    • Abstract ( 2461 )     HTML       
    • To improve the resource location efficiency and guarantee resource download quality of peer to peer (P2P) system, a new concept of interest domain trust similarity as well as its computation method is given based on Interest domain partition mechanism using node Interest bias in P2P Networks. Thereupon, a P2P network topology construction model named interest domain trust similarity sensitive P2P topology (ITAPT) is implemented. In ITAPT, by computing interest domain trust similarity of each other, the nodes with similar interest and trust value are connected as neighbors. Thus the ITAPT will improve node resource query efficiency, and provide an incentive mechanism to encourage node to offer more contribution so as to get better service. Simulations show that the ITAPT improves the efficiency and security of P2P topology effectively.

    • References | Supplementary Material | Related Articles
    • An Argumentation Framework for Ontology Mappings Negotiation
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 99-103. DOI:10.13190/jbupt.201102.99.wangy
    • Abstract ( 2080 )     HTML       
    • To merge various mappings resulted from multiple ontology matchers, an argumentation framework is presented for ontology mapping negotiation. In this framework, arguments are built for mapping results while four argument relations such as support, disprove, unite and attack are used to reflect the impacts among mappings. By judging successful attack and computing preferred extension, the acceptable arguments, namely final mapping results, are obtained. Experiments show that the effect of mapping negotiation is improved, and a powerful tool for the cooperation of multiple ontology matchers is provided as well.

    • References | Supplementary Material | Related Articles
    • Autocorrelation Properties of Nonlinear Pseudorandom Sequences Output by TFunctions
    • WANG Yan yupu Hu Hu
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 104-107. DOI:10.13190/jbupt.201102.104.wangy
    • Abstract ( 2391 )     HTML       
    • Autocorrelation properties of coordinate sequence generated by single cycle Tfunction (the kth coordinate sequence) are investigated to check whether Tfunctions can be the substitution of linear feedback shift register in the design of stream ciphers. Based on single cycle Tfunctions properties and autocorrelation functions periodicity, the bounds of autocorrelation functions are calculated, where the shift is equal to the period of the kth coordinate sequence multiplied by 2 to the minus power. According to the bounds, it is concluded that the smaller the shift is, the larger the value of autocorrelation functions is. As a result, Tfunctions are not suitable for generating pseudorandom sequences.

    • References | Supplementary Material | Related Articles
    • Research on the Static Defect Detecting in BPEL
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 108-112. DOI:10.13190/jbupt.201102.108.039
    • Abstract ( 2612 )     HTML       
    • In order to detect the defects of widespread used business process execution language(BPEL) statically, the defects existed in BPEL programs are deeply studied. A defectoriented static testing method for BPEL is presented. The extended finite state machine is used to model the defect under detections. The states of defects can be identified by transition conditions of the properties state. And the redundancy of calculation by merging the conditions of identical property state at join points in the control flow graph is avoided. Experiments show the validity and feasibility of this method, it can be used to enhance the reliability and accuracy of process.

    • References | Supplementary Material | Related Articles
    • A Routing Algorithm Based on Separation Time and Copy Control in Delay Tolerant Network
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 113-117. DOI:10.13190/jbupt.201102.113.liuql
    • Abstract ( 2301 )     HTML       
    • Delay tolerant network (DTN) routing protocol based on historical information forwarding, according to the history of statistics forecast estimates on the next hop node, forwarding and storage of information to judge the best time, and avoids blindly forwarding information. In this paper, the typical spray and focus protocol choice blindness among nodes, the "separation time" applied to routing, buffer management and multicast mode, the good conservation of resources and improves communication efficiency. Simulation results show that the improved protocols effectively improve delivery ratio and shorten the message delivery delay.

    • References | Supplementary Material | Related Articles
    • A Cognitive Radio Access Model and Performance Analysis with Finite User Population
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 118-121. DOI:10.13190/jbupt.201102.118.040
    • Abstract ( 1906 )     HTML       
    • The continuous Markov model is used to model the access process of cognitive users with finite population. In connection with the variability of the number of primary users and cognitive users, the blocking probability, the forced termination probability and the average numbers in channels of cognitive users are analyzed while cognitive users try to occupy the licensed channels. Simulation results show that the blocking probability and the forced termination probability of cognitive users will climb up with the increase of the number of primary users or cognitive users while the average numbers of cognitive users in licensed channels will reduce with the increase of numbers of primary users and grow up with the increase of numbers of cognitive users separately.

    • References | Supplementary Material | Related Articles
    • Modified Covariance Differencing Method to DOA Estimation of Coherent Signals
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 122-125. DOI:10.13190/jbupt.201102.122.guoy
    • Abstract ( 2269 )     HTML       
    • A modified covariance differencing method is proposed to the direction of arrival (DOA) estimation of narrowband signals under a colored noise environment. The covariance matrix of received data is transformed in a linear way. The noise component is eliminated finally by assuming a symmetric Toeplitz matrix for the unknown array noise. The covariance differencing algorithm works well when impinging signals are uncorrelated or just two signals are coherent. The proposed approach combined with spatial smoothing technique is further investigated in the case that coherent signals are more than two. Analysis shows that new approach can avoid generating “phantom” angles while providing accurate DOA estimation. Therefore the proposed method operates at a lower computational complexity compared with conventional methods. Simulation results demonstrate the effectiveness of presented algorithm.

    • References | Supplementary Material | Related Articles
    • Study on Fair Bandwidth Allocation Scheme between Uplink and  Downlink Flows under IEEE 802.11
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 126-130. DOI:10.13190/jbupt.201102.126.zhangb
    • Abstract ( 1959 )     HTML       
    • To improve the overall performance of the network, a transmission mechanism of probability based on the Markov model has been proposedfair bandwidth allocation scheme between uplink and downlink flows. There is no need to make changes to the distributed coordination function protocol of station. Only by adjusting the minimum contention window and transmission probability of access point, the fairness between uplink and downlink can be achieved. Detailed simulation results show that the scheme can achieve fairness between uplink and downlink flows with the total throughput increased.

    • References | Supplementary Material | Related Articles
    • Joint Parameters Estimation of OFDM Signals in Cognitive Radio
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(2): 131-135. DOI:10.13190/jbupt.201102.131.jiangqp
    • Abstract ( 1865 )     HTML       
    • A joint parameters estimation algorithm for orthogonal frequency division multiplexing (OFDM) signals was presented based on cyclic autocorrelation function(CAF). Joint estimation of the chip time, the symbol time and symbol useful time parameters of OFDM signals can be realized with the algorithm only by searching the distance between the peaks in the corresponding plane. And a method based on frequency domain accumulation for calculating the CAF of OFDM signals was adopted in low signal noise ratio. The validity of the algorithm was proved by simulations.

    • References | Supplementary Material | Related Articles