Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • SuperHigh Precision Frequency Measurement Method Combining  Length Vernier and GroupPeriod Phase Comparison
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 1-7. DOI:10.13190/jbupt.201103.1.zhouw
    • Abstract ( 1782 )     HTML       
    • According to timespace conversion relationship of signals and phase coincidence detection technology, a superhigh precision frequency measurement method is proposed based on length vernier in order to improve measurement resolution of signal. High accuracy and stability of the speed of light and electromagnetic signals during the transmission in space or specific medium enable the measurement of short time interval, which uses the coincidence detection of signal’s transmission delay in length. Based on this, measurement precision from ns to 10ps can be easily obtained. The method develops the length vernier utilizing the stability of signal’s transmission delay, minimizes the fuzzy region of phase coincidence between the standard frequency signal and the measured signal, approaches the best phase coincidences, and therefore improves the measurement precision that is higher than the precision provided by the traditional methods based on frequency processing. Besides, the method costs less than the traditional methods and can also solve the problem of the measurement of superhigh frequency.

    • References | Supplementary Material | Related Articles
    • Source Detection in Wireless Sensor Network by LEACH  and Compressive Sensing
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 8-11. DOI:10.13190/jbupt.201103.8.tangl
    • Abstract ( 2090 )     HTML       
    • For study of the source detection areas monitored by wireless sensor network, an algorithm combining low energy adaptive clustering hierarchy(LEACH) algorithm and Bayesian compressive sensing (CS)is proposed. LEACH algorithm divides the sensors into some clusters and chooses the clusterheads. The information in the sensors is collected by the clusterheads. Only the clusterheads are allowed to transmit information to the fusion center. It reduces the number of sensors which send the information to the fusion center. The fusion center utilizes Bayesian CS to recover the source from a little measurement transmitted by clusterheads. At the same time, a threshold is set to optimize the performance of reconstruction when the data volume becomes little. Simulations show that the algorithm proposed can detect the source accurately, and obtain the good performance.

    • References | Supplementary Material | Related Articles
    • Compact LowPass Filters Using Novel Modified ΦShape  Defected Ground Structure
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 12-16. DOI:10.13190/jbupt.201103.12.ladsh
    • Abstract ( 2188 )     HTML       
    • In order to design a high performance miniaturized microstrip filter, a new Φshape defected ground structure (DGS) is proposed. A Lowpass filter is designed using the Φshape DGS with H shape open stubs line. A one single, twocascaded and threecascaded Φshape DGS lowpass filters is designed, simulated, fabricated and measured repectively. The transmission characteristics of the twocascaded Φshape DGS lowpass filter shows its advantages of compact size, high selectivity, low insertion loss and excellent passband performance. The frequency response of the threecascaded Φshape DGS lowpass filter presents the advantages of compact size; high selectivity; low insertion loss; better passband performance and high outband suppression of more than 40dB. Measurement shows a good agreement with the simulated results. It also validates the requirements of miniaturization and high performance for filters.

    • References | Supplementary Material | Related Articles
    • Construction Methods of ZCZ Punctured Sequence Pairs Set
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 17-20. DOI:10.13190/jbupt.201103.17.lizhb
    • Abstract ( 2206 )     HTML       
    • In order to extend the scope of zero correlation zone (ZCZ) sequence in quasisynchronous code division multiple access system, an almost perfect punctured binary sequence pairs is used in zero correlation zone (ZCZ) sequence pairs, a new construction method for ZCZ signals is presented. ZCZ punctured sequence pairs set can be generated from the periodic product of unitary matrix and the original ZCZ punctured sequence pairs set. The almost perfect punctured binary sequence pairs and the unitary matrix can be easily obtained, so the capacity of ZCZ punctured sequence pairs set constructed by the proposed method is so large that they can satisfy requirements of engineering applications.

    • References | Supplementary Material | Related Articles
    • Exposing Digital Image Forgeries by Detecting Inconsistence in  Light Source Direction
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 26-30. DOI:10.13190/jbupt.201103.26.363
    • Abstract ( 2422 )     HTML       
    • By extracting the edge information of the target object in single digital image, the light direction can be estimated. In order to improve the efficiency of the estimated light direction, the image edge detection operators are brought in which achieves the accurate orientation of the target object in the fake image. With the combination of border fitting and data analysis, thus a procedure of detecting image tampering which is based on the inconsistencies in light source direction is formed. Experimental results show that edge detection operators optimize the detecting process, also improve the feasibility and expandability of this forensic technology.

    • References | Supplementary Material | Related Articles
    • A NeighborData Analysis Method for Fault Detection  in Wireless Sensor Networks
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 31-34. DOI:10.13190/jbupt.201103.31.huangrm
    • Abstract ( 2133 )     HTML       
    • In general, the fault detection in wireless sensor networks (WSNs) could be happened in additional communication and computation load. Considering the feature of WSNs that those nodes in the same coverage range have the close reading data, a neighbordata analysis based fault detection schema is proposed. The confidence level of sensor nodes is taken by analyzing the history reading data in the first place. Comparing the node’s reading data with that of neighbor nodes results in good confidence level to determine that whether this node is failure or not. Simulations show that the proposed schema can catch a good performance in fault detection accuracy and transient fault tolerance, but do not bring any communication and computation overhead to sensor nodes.

    • References | Supplementary Material | Related Articles
    • Encoding Algorithm Based on LU Factorization for LDPC Codes over GF(q)
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 35-39. DOI:10.13190/jbupt.201103.35.wenl
    • Abstract ( 2471 )     HTML       
    • For general encoding algorithm of low density parity check (LDPC) codes over GF(q), a Tanner graph and research encoding algorithm is presented based on lower upper (LU) decomposition. In order to keep sparsity of matrix, three pivot selection criterias named row pivot, rowcolumn pivot and product of rowcolumn pivot are deduced and analyzed. Simulations show that the new algorithm could be lower than one half density compared with existing algorithm. The conclusion is useful to application of universal encoding algorithm for LDPC codes over GF(q).

    • References | Supplementary Material | Related Articles
    • Degree Distribution Design of LT Codes Using PSO Algorithm with Gradient
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 40-43. DOI:10.13190/jbupt.201103.40.dengzh
    • Abstract ( 2097 )     HTML       
    • Based on the particle swarm optimization (PSO) algorithm with gradient, a new design is proposed to optimize the degree distribution in the procedure of Luby transform(LT) encoding. The importance sampling approach is employed to construct an objective function. The estimation for the gradient is obtained by the objective function. And then, the degree distribution can be optimized by PSO with gradient. At last, forms with sparse degree distributions and soliton distributions are optimized with the proposed method respectively. Simulations show that the degree distributions obtained by the proposed method are more efficient compared with that of Robust soliton distribution and importance sampling approach, it can reduce the overhead packets in LT codes with short codelength.

    • Supplementary Material | Related Articles
    • Performance of Cognitive System Based on Relay Selection
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 44-47. DOI:10.13190/jbupt.201103.44.tangjm
    • Abstract ( 2338 )     HTML       
    • A hybrid protocol with relay selection(HPRS) is derived to improve the cognitive performance. What a cooperative protocol is chosed is rest with the the source signal relay decoding. The relay with the highest relaydestination signaltonoise ratio is selected to forward the data. The approximated outage probability formulation and diversity for HPRS is given. Simulation shows that amplifyandforward with relay selection(SAF), decodeandforward with relay selection(SDF) protocol and HPRS can achieve full space diversities, but the HPRS is better than that of both SAF and SDF in outage performance.

    • References | Supplementary Material | Related Articles
    • A NBS Resource Allocation for Network Coding Based  Subscriber Cooperation
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 48-52. DOI:10.13190/jbupt.201103.48.tengyl
    • Abstract ( 2362 )     HTML       
    • A network coding (NC) based twosubscribercooperation scheme in a fullduplex transmission mode of orthogonal frequencydivision multiple access system is proposed to further improve the network throughput. And a double level Nash bargaining solution (DL_NBS) game is adopted to resolve the interuser resource bargaining problem. In the interuser pair, the pairwise capacity based NBS is utilized to allocate subcarrier and distribute power between the cooperative subscribers. Simulations show that the proposed CoNC achieves a system capacity of 491% higher than the normal cooperative transmission, and 464% higher than the direct transmission. Meanwhile, compared with the traditional resource allocation algorithms, the twolevel NBS solution achieves a well tradeoff between fairness and efficiency, and perfectly suits the distributed subscriber cooperation scenario as well. 

    • References | Supplementary Material | Related Articles
    • Comparison and Evaluation of Internet Topology Generators
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 53-57. DOI:10.13190/jbupt.201103.53.panl
    • Abstract ( 2243 )     HTML       
    • Based on analysis of internet topology model and metrics, five topology generators are compared on both autonomous system (AS) level and router level. The accuracy of these generators is checked by counting several topology metrics of the generated graphs and with indicators. Evaluation of their performance is given on the basis of comparison. It is shown that new Internet topology has the best performance on AS level, and TopGen generates most accurate topology on router level.

    • References | Supplementary Material | Related Articles
    • A File System for Malware Analysis and Protection
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 58-61. DOI:10.13190/jbupt.201103.58.lianghl
    • Abstract ( 1779 )     HTML       
    • Malwares and their resulting threats are growing urgently. A method at the file system level is provided for analysis and defense against malwares with reducing the loss as possible, and implements a file system for malware analysis and protection (MAPFS). With checkpoint and file versioning technology, MAPFS can record the modifications in file systems during the process. These records are important for analysis of malware behavior, and may be used to recover the files damaged by the malwares. Experiments show that this method is effective in analysis and defense of malwares, and MAPFS only brings a little loss lower than 10 percent.

    • References | Supplementary Material | Related Articles
    • Improved Direct Anonymous Attestation Scheme
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 62-65. DOI:10.13190/jbupt.201103.62.songch
    • Abstract ( 2046 )     HTML       
    • For solving the questions of complexities, high computationconsumings and applications limited for the direct anonymous attestation(DAA), a new DAA scheme is proposed based on bilinear maps under the assumption of q strong DiffieHellman and decisional DiffieHellman so as to match the limited computational resource of trusted platform module(TPM). It is shown that the secured scheme can efficiently relieve the computation bottleneck of trusted platform and enable TPM to be used in embedded and other resourceconstrained environments.

    • References | Supplementary Material | Related Articles
    • Taware: an AS Topology Based Available  Bandwidth Prediction Algorithm
    • Zhan FengWang
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 66-70. DOI:10.13190/jbupt.201103.66.wangzhf
    • Abstract ( 2039 )     HTML       
    • To predict endtoend available bandwidth accurately, a autonomous system (AS) topologybased available bandwidth prediction algorithm Taware is proposed. Taware employs the AS topology information to choose landmarks for ultrametricconstraint nodes and unultrametricconstraint nodes respectively, and then predicts the endtoend available bandwidth accordingly. Experiments with HP scalable sensing service dataset show that the Taware can predict endtoend available bandwidth over ten percent precisely than the PathGuru algorithm.

    • References | Supplementary Material | Related Articles
    • New Strongly Unforgeable IdentityBased Signature  Scheme in the Standard Model
    • Qing Wu
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 71-74. DOI:10.13190/jbupt.201103.71.wuq
    • Abstract ( 1896 )     HTML       
    • To overcome the shortcomings of the existing schemes such as strong hardness assumption,long signatures and high compution cost, a new transformation is proposed. It can convert any simulativepartitioned identitybased signature with existentially unforgeable security to a strongly unforgeable signature. And a concrete strongly unforgeable identitybased signature based on Paterson’s scheme is constructed in the standard model. Under computational DiffieHellman assumption, the proposed signature scheme is provably secure against strongly existential forgery under adaptive chosen message attacks. In addition, the new scheme has some advantages over the available schemes, such as short signatures, low computation cost and high security.

    • References | Supplementary Material | Related Articles
    • Hybrid Forwarding Scheme for Cooperative Communication in  Symmetric Wireless Networks
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 75-78. DOI:10.13190/jbupt.201103.75.360
    • Abstract ( 2001 )     HTML       
    • In order to reduce the outage probability of cooperative communication, a hybrid forwarding scheme for cooperative communication system in symmetric wireless networks is proposed. In this scheme, each relay is decided to use either “amplify and forward (AF)” or “decode and forward (DF)” according to the instantaneous signal to noise ratio conditions between the source and the relay. Thus, the different relay nodes may use different communication protocols to carry out cooperative communication. An expression of the average outage probability on the hybrid forwarding scheme is derived. Furthermore, the simulation shows that the proposed hybrid forwarding scheme outperforms conventional cooperative relaying with AF and DF in reducing the outage probability.

    • References | Supplementary Material | Related Articles

    Reports

    • Bandwidth and Buffer Allocation Coupled with Adaptive Pricing
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 84-88. DOI:10.13190/jbupt.201103.84.361
    • Abstract ( 2096 )     HTML       
    • The effective bandwidth, acting as an economic production function of network service, is commonly used to impose admission control on realtime traffic. Yet the allocation of bandwidth and buffer remains as a technical problem and an economic one as well. A pricedriven resource composition algorithm is proposed based on Courcoubetis effective bandwidth formula, aiming to keep the allocation of bandwidth and buffer in step while following the objective of charge minimization. Then an adaptive pricing mechanism for bandwidth and buffer allocation is presented to improve the resource utilization ratio, in which prices are adjusted relatively and absolutely at different time scales respectively. Simulation results show that the proposed scheme could effectively improve the resource utilization ratio and keep the call blocked ratio at reasonable level.

    • References | Supplementary Material | Related Articles
    • A Trust Model Based on Deviation Factor for P2P Networks
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 89-93. DOI:10.13190/jbupt.201103.89.panchh
    • Abstract ( 1889 )     HTML       
    • In the existing trust models of peer to peer network, the internal situations and external environments of nodes are not considered in the process of calculating the trust value that will affect the rationality and objectivity of models. To solve this problem effectively, a new trust model based on the deviation factor (TMDF) is proposed. Introducing the structure concepts of selfcapacity and externalcapacity, the model gives a multidimensional evaluation vector, it comes from construction approach of trust relations in the social network, in which, a peer’s trust value is calculated according to two aspects. TMDF calculates the recommended trust value of the recommended nodes using the deviation factor and calculate the trust value of nodes by the direct trust value and the recommended trust value. Analysis and simulation show that the new model can provide the more real trust services, identify and resist the malicious acts, such as slander and conspirator.

    • References | Supplementary Material | Related Articles
    • An Algorithm for Mining Passenger Flow  Information from Smart Card Data
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 94-97. DOI:10.13190/jbupt.201103.94.gaolx
    • Abstract ( 1938 )     HTML       
    • To collect passenger flow information of public transit from the widely applied smart card fare payment systems, a new method is proposed to infer the stops at which passengers holding smart cards board the bus from smart card fare data and bus schedules. The method first classifies two sequential swipes to decide whether they occur at the same stop with naive Bayes classifier. Travel times are then estimated from the naive Bayes classifier results using maximum likelihood estimation, dynamic programming and quadratic programming methods. To solve the problem with imprecise initial parameters, a coordinate descent method is applied. It updates parameters and estimates values alternatively until convergence. An experiment is designed to test this algorithm with realworld data, and it proves that the error of this method is small and the convergence is fast.

    • References | Supplementary Material | Related Articles
    • Sensing Period Optimization for OFDMBased Cognitive Radio
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 98-102. DOI:10.13190/jbupt.201103.98.xurh
    • Abstract ( 2211 )     HTML       
    • The spectrum sensor and transceiver can be jointly designed for the orthogonal frequencydivision multiplexing(OFDM)based cognitive radio. Which does spectrum sensing and transmission alternatively. Furthermore, it can sense multiple licensed bands simultaneously. The time length of sensing can be decided according to the sensing performance requirement. The choice of the sensing period is modeled as a nonlinear optimization problem with the constraint of the probability of interference with the licensed users. Through the sensing period optimization, the OFDMbased cognitive radio can take full advantage of the spectrum opportunity and guarantee the lower interference with the licensed users.

    • References | Supplementary Material | Related Articles
    • Coordinated Beamforming Interference Suppression in  Coordinated MultiPoint Systems
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 103-107. DOI:10.13190/jbupt.201103.103.wuwj
    • Abstract ( 2259 )     HTML       
    • An eigenvalue based coordinated beamforming algorithm is proposed to mitigate the intercell interference aroused by beam collision in beamforming systems. Assuming the scheduling of users has been done in each cell, the users suffering serious interference require their serving cell cooperatively working with their strongest aggressor. The two cells calculate the beamforming vectors for the subcarriers adopted by this user together. With this coordinated multipoint technique, the intercell interference is mitigated and the sum of achievable rate of users adopt the same frequency is maximized. Compared with the classical independent beamforming techniques, the proposed algorithm can greatly improve system performance.

    • References | Supplementary Material | Related Articles
    • FrontEnd Design of Task Compiler for Reconfigurable Multimedia Processor
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 108-112. DOI:10.13190/jbupt.201103.108.364
    • Abstract ( 1803 )     HTML       
    • In order to automatically map algorithms onto reconfigurable multimedia processor and improve the parallel efficiency of algorithms, a task compiler frontend is designed. The kernel loop unrolling is introduced to improve the degree of parallelism; and the scalar replacement technique based on data dependence analysis is used to optimize the cost of data transmission. Experiments show that the task compiler frontend improves the degree of parallelism effectively, its performance can be, compared with the frontend of Garp C compiler, sharply increased up to 2~4 times in the whole system.

    • Supplementary Material | Related Articles
    • PMD Monitoring and Compensation in High Speed  Optical Communication Systems
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 113-117. DOI:10.13190/jbupt.201103.113.yuanxg
    • Abstract ( 2215 )     HTML       
    • In order to compensate polarization mode dispersion (PMD) in high speed optical communication systems, an analysis of the principle of PMD monitoring with degree of polarization (DOP) as monitoring signal is proposed. Utilizing DOP method, a high precision and high response rate realtime inline PMD monitoring unit is designed and implemented. The range of input optical power is -20~0dBm, the response time reaches 1μs and the detection accuracy is 1%. An experimental system is set up to adaptively compensate the PMD of 43Gbit/s return to zero differential quadrature phase shift keying system with PMD monitoring unit. Experiments show that the adaptive PMD compensation can be completed in 1 ms and the compensation effect is significant well.

    • References | Supplementary Material | Related Articles
    • DualBand CylinderShape Antenna Realization and  Analysis by Using Different Software Tools
    • Xiu-Ping LI Qing-Qing 王
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 118-121. DOI:10.13190/jbupt.201103.118.lixp
    • Abstract ( 2021 )     HTML       
    • Three electromagnetic simulators:high frequency structure simulator (HFSS), FEKO and computer simulation technology microwave studio(CST MS) are applied in dualband cylindershape antenna analysis. Simulations show that HFSS provides good agreement with the measured return loss, while FEKO presents good agreement with the measured far field gain. The simulated results by using CST MS agree well with the measured results for both return loss and farfield gain. The measured results show that it has 150MHz (820~970MHz) bandwidth at the lower band and 600MHz (17~23GHz) at the upper band under the condition of voltage standing wave ratio less than 15, and far field gain is 18dBi at 900MHz and 49dBi at 2GHz.

    • References | Supplementary Material | Related Articles
    • A Novel Approach for Network SelfProtection Mechanism
    • Hong-Yu YANG Dai QiKui
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 122-126. DOI:10.13190/jbupt.201103.122.yanghy
    • Abstract ( 1723 )     HTML       
    • A network selfprotection mechanism based on abnormality analysis is presented aiming at deficiencies of current network security protection technologies. To improve the ability of detection and protection against network attacks, a network attack detection algorithm based on the multivariate abnormality analysis is proposed. The algorithm uses a metric of abnormal distance to classify the network flow into different types and prioritize the routing of the different network flow packets. In this way, the normal traffic flows can suffer the least impact from network attacks. Experiments show that our mechanism can significantly improve the network system’s protection ability against distributed denial of service attacks.

    • References | Supplementary Material | Related Articles
    • Optimal Throughput Analysis of Wireless MultiHop Ad hoc Network
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(3): 127-131. DOI:10.13190/jbupt.201103.127.362
    • Abstract ( 1964 )     HTML       
    • A carrier sensing multiple access collision avoidance (CSMA/CA) and hidden node effect integrated system modeling method is proposed to study the optimum sustained application traffic of multihop Ad hoc network. The coexistence of CSMA scheme and hidden node effect in multihop environment makes the nodes competition for channel occupation more complicated. Firstly, we set up the optimum throughput model of the system by analyzing the modes competing action for accessing the channel. Then we deduce the mathematical expression of system optimum throughput under both CSMA effect and hidden node effect. Finally, numerical results are given based 802.11 b/g media access control mechanism in both analysis and simulation. Simulation of different chain hops and different packet size verifies that the modeling method and the model expression could accurately evaluate the traffic supporting situation in multihop Ad hoc networks.

    • References | Supplementary Material | Related Articles