Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • An EntropyBased Estimation of Noise Variance in Wavelet Domain
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 1-5. DOI:10.13190/jbupt.201105.1.lity
    • Abstract ( 2332 )     HTML       
    • A new approach with entropy inspection in wavelet domain is proposed for estimation of the variance of Gaussian noise in images. With advantage of wavelet transform, the entropy of image signal degrades notably with the Gaussian noise entropy unchanging. It denotes that the noise entropy value varies with the noise levels in manner of logarithm. The relation between the entropy values of the noisy image wavelet coefficients and the noise levels is traversed in quantitative form. A formula is given to depict this functional relation. Experiment indicates that such a relation is robust to images. A noise estimation is thus made with the entropy inspection of the noisy image in wavelet domain and the established formula as apriori knowledge. Meanwhile, a simulation shows that the proposed approach can achieve more exact value while little influenced by image details.

    • References | Supplementary Material | Related Articles
    • A Weighted Feature Based Automatic Image Annotation
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 6-9. DOI:10.13190/jbupt.201105.6.wangkp
    • Abstract ( 1936 )     HTML       
    • An automatic image annotation method based on weighted feature is proposed. Firstly, a weighted feature clustering algorithm is employed on the semantic concept clusters of the image regions. For a given cluster, we determine relevant features based on their statistical distribution and assign greater weights to relevant features as compared to less relevant features.In this way the computing of clustering algorithm can avoid dominated by trivial relevant or irrelevant features. Then, the relationship between clustering regions and semantic concepts is established according to the labeled images in the training set. Under the condition of the new unlabeled image regions, we calculate the conditional probability of each semantic keyword and annotate the new images with maximal conditional probability. Experiments on the Corel image set show the effectiveness of the new algorithm.

    • References | Supplementary Material | Related Articles
    • A New Precoding Mechanism Based on  Lattice Reduction for MIMO Systems
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 10-14. DOI:10.13190/jbupt.201105.10.zhaoh
    • Abstract ( 1781 )     HTML       
    • A lattice reduction (LR) aided precoding mechanism is proposed for the closedloop multiple input multiple output (MIMO) systems. At the receiver, the channel matrix is quantified by the LR operation and sent back to the transmitter for precoding. This mechanism achieves full receive diversity gain, and furthermore, it results that different subchannels of the equivalent channel matrix are of similar performance, it enables the same modulation and coding scheme for different data streams. Simulation shows that the proposed mechanism has better throughput performance than the existing precoding scheme with the same size of codebook, and the gain is up to 28% when signal to noise ratio (SNR) is 16dB. 

    • References | Supplementary Material | Related Articles
    • A Minimum Sensor Deployment Algorithm for NonConnected  Wireless Sensor Network
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 15-18. DOI:10.13190/jbupt.201105.15.yanzhj
    • Abstract ( 1702 )     HTML       
    • Two cases are included in the minimum sensor deployment problems, according to whether the deployed network is desired connected or not. The nonconnected case is studied, to minimize the deployment cost. The proposed problem is formulated as an integer linear program problem, which is proved to be an NPcomplete problem. To approximately derive the optimal solution, the candidate deployment regions are theoretically derived and computed. A greedy algorithm is proposed, where one sensor is iteratively deployed into the maximal coverage number candidate region until all targets are covered. Compared with existing genetic algorithm and the optimal solution, simulation results confirm the effectiveness of the proposed algorithm.

    • References | Supplementary Material | Related Articles
    • A RoleExtended RBAC for Encrypted Data
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 19-24. DOI:10.13190/jbupt.201105.19.pengwp
    • Abstract ( 1656 )     HTML       
    • A roleextended by key based on rolebased access control (KRBAC) for encrypted data which integrates the hierarchical keys into the role management is proposed. The traditional role is extended here to a triple through dividing the independent control domain of the key, which consists of the role as well as the control domain of role and key, with partially ordered set relations and security constraints. In addition, an elementlevel finegrained data protection is proposed based on the above model. Analysis shows that the working mode of extendedrole can reduce the number of roles and the complexity of access control and improve the rationality of distribution of privileges, besides, it can provide security infrastructure for the finegrained data protection. 

    • References | Supplementary Material | Related Articles
    • A Construction of Digital Watermarking Model for the Vector Geospatial  Data Based on Magnitude and Phase of DFT
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 25-28. DOI:10.13190/jbupt.201105.25.257
    • Abstract ( 2244 )     HTML       
    • For the characteristics of the vector geospatial data, the construction of the digital watermarking model for the vector geospatial data is proposed based on the magnitude and phase of discrete Fourier transform (DFT). The vector geospatial data is transformed into the DFT domain. The watermark is embedded in the magnitude and phase of the DFT coefficient range, then the watermarked coefficients is performed an inverse DFT (IDFT) and get the embedded vector geospatial data. Experiment shows that the model can assure the data accuracy. It will be robust for the translation, deleting a certain ration vertices at random, rotation, format transformation and scale etc.

    • References | Supplementary Material | Related Articles
    • An Automated Coverage Optimization Scheme  Used in Radio Access Network
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 29-32. DOI:10.13190/jbupt.201105.29.zhangh
    • Abstract ( 1908 )     HTML       
    • A new automated coverage optimization scheme (ACOS) is proposed, which can be used to optimize wireless down link coverage in various kinds of radio access networks. ACOS can work well without manual intervention. Records in measurement report of mobile stations are used to estimate condition of wireless down link coverage and generate accommodation scheme. When transmitting, cells power will be adjusted according to accommodation scheme, optimization is done. Simulations show that, in both weak coverage and excessive coverage situation, the quality of wireless down link coverage is improved by ACOS; the indicators of coverage can achieve objective reference value.

    • References | Supplementary Material | Related Articles
    • Network Coded Relay Selection Based on  Maximum Weight Matching
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 33-37. DOI:10.13190/jbupt.201105.33.jixd
    • Abstract ( 1956 )     HTML       
    • In wireless multiple access relay networks, network coded relay can help two users transmit messages in the same time frequency resource without interference. Base station recovers the origin messages utilizing joint detection, and the achievable rate increases. In multiplerelay scenario, proper relay selection methods can further improve the overall throughput. Since relay selection is a complex optimization problem, to reduce the complexity, the network is modeled as a weighted bipartite graph and relay selection problem turns into the maximum weight matching problem. The Kuhn and Munkres (KM) algorithm and the greedy algorithm are utilized to solve the relay selection for multiaccess network, and Monte Carlo. Simulations show that the KM algorithm achieves a bit higher ergodic capacity than that of greedy algorithm. 

    • References | Supplementary Material | Related Articles
    • Network Coding Scheme with Sociality for WSN
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 38-41. DOI:10.13190/jbupt.201105.38.machg
    • Abstract ( 1946 )     HTML       
    • In wireless sensor network, a novel network coding scheme based on sociality was proposed. Firstly, the design process was described in details and the advantages and shortcoming of the scheme was discussed as well. Then, the process of coding and decoding with random linear codes was expounded. Finally, the simulation using NS2 showed that this scheme is better than the traditional network coding scheme in improving the overall network performance.

    • References | Supplementary Material | Related Articles
    • Fast Calculation Method of Target’s Monostatic RCS
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 42-45. DOI:10.13190/jbupt.201105.42.256
    • Abstract ( 1888 )     HTML       
    • The calculation method of monostatic radar cross section (RCS) is analyzed based on method of moment. When calculation of RCS is started by looping over angles, only the right voltage matrix is effected with the changes of the incidence wave. The left impedance matrix is not changed. Based on the characteristic, a new fast calculation method of monostatic RCS using Gauss elimination method is proposed. The elimination procedure is recorded when the monostatic RCS of the first angle is calculated, and the impedance matrix is transferred into product factors matrix. When the monostatic RCS of the other angles are calculated, only the right voltage matrix is calculated follow the elimination procedure of the first angle, thus the monostatic RCS calculating speed of the whole scale angels will be quickened greatly.

    • References | Supplementary Material | Related Articles
    • Resource Allocation in OFDMABased Beamforming Relay Systems
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 46-50. DOI:10.13190/jbupt.201105.46.hanb
    • Abstract ( 2263 )     HTML       
    • A resource allocation algorithm that maximizes proportional fairness factor is proposed in the orthogonal frequency division multiple access based amplifyandforward beamforming relay systems. Based on the convex optimization, the algorithm jointly optimizes power allocation, subcarrier pairing, relay selection and user selection. Both analysis and simulation indicate that the proposed algorithm can achieve fairness of resource allocation and employ beamforming effectively to enhance the system capacity with low computational complexity.

    • References | Supplementary Material | Related Articles
    • Analysis on the Performance of Opportunistic  Relaying with MultiInterference Nodes
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 51-56. DOI:10.13190/jbupt.201105.51.258
    • Abstract ( 2059 )     HTML       
    • A proactive decodeandforward opportunistic relay protocol with multiinterference at the relays and the destination is proposed. The maximum ratio combining scheme is deployed at the destination where direct link is considered. And the outage probabilities over the independent nonidentical Rayleigh fading channels is derived with multiinterference affected relay and destination nodes. MonteCarlo simulations are requested to verify the analysis. Furthermore, it is concluded that relay selection protocols considering the multiple interference nodes are much better than the schemes without considering the interference. The proposed protocols can reduce the effect of interference on the system.

    • References | Supplementary Material | Related Articles

    Reports

    • Hybrid QoSClustering Web Service Composition
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 57-62. DOI:10.13190/jbupt.201105.57.zhanglch
    • Abstract ( 2467 )     HTML       
    • To solve the web service selection problem with hybrid quality of service(QoS) and lots of service composition plans, a hybrid qosclustering web services composition algorithm (CHQoS_WSCA) based on multiattribute decision making theory is presented. Not only CHQoS_WSCA takes all possible QoS expression types (real numbers, interval numbers, triangular fuzzy numbers and intuitionistic fuzzy numbers) into consideration, it also can effectively solve the service selection algorithm performance problem with largescale composition plans.

    • References | Supplementary Material | Related Articles
    • An Estimation of WER Based on the Radius of Decision Region
    • Li-Yun DAI hongwen yang
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 63-66. DOI:10.13190/jbupt.201105.63.daily
    • Abstract ( 1748 )     HTML       
    • In current communications, error probability estimation mainly relies on Monte Carlo simulation. A method based on the radius of decision region to estimate the word error rate (WER) is presented. The Bernoulli experiment samples is replaced with the samples of radius, that can reduce the required number of samples due to the more information provided by radii. Meanwhile, the geometry of decision region is of little to do with the signal to noise ratio (SNR), so the same group of radii can be used to estimate the different error probability at any SNR without repeated measure in different groups of radii under every SNR.

    • References | Supplementary Material | Related Articles
    • An Image DeNoising Algorithm Based on  PCNN and Local Wiener Filter
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 67-70. DOI:10.13190/jbupt.201105.67.gongxl
    • Abstract ( 2101 )     HTML       
    • A new denoising algorithm based on pulse coupled neural network (PCNN) system and local Wiener filter is presented. The mechanism of synchronous pulse of PCNN is employed to revise the image wavelet coefficients, according to the feather of different image pixels. Also, an adaptive linking coefficient β is proposed. Based on the improved wavelet coefficients, the local Wiener filter is used to estimate signal variance better. Experiments show the proposed scheme can get higher peak signaltonoise ratio than NeighShrink and Wiener algorithm, and better vision effect. 

    • References | Supplementary Material | Related Articles
    • A Study Dealed with IEEE 802.11 Networks  Using Packet Size Optimization
    • Chao DONG
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 71-75. DOI:10.13190/jbupt.201105.71.dongch
    • Abstract ( 2212 )     HTML       
    • In wireless networks including IEEE 802.11 networks, it is known that the node mobility leads to extensive shortduration communication. To achieve the timebound fairness between the meeting flows and keep relatively high network throughput, the optimal packet size to obtain the optimal link throughput in the errorprone channel is analyzed. The channel bit error rate and flow contending time is given. The timebound fairness problem of two meeting flows is addressed using the packet size adjustment. Finally, the optimal packet size is concluded. Simulations show that during the short meeting term, the channel contention fairness of the meeting flows can be ensured and the network throughput is kept relatively high when using the proposed optimal packet size.

    • References | Supplementary Material | Related Articles
    • Compressed Collaborative Spectrum Sensing in  Cognitive Radio Networks
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 76-79. DOI:10.13190/jbupt.201105.76.255
    • Abstract ( 2637 )     HTML       
    • The channel state vector is sparse under the conditions of low spectral efficiency. Based on compressed sensing technology, a low complexity collaborative spectrum sensing method is proposed to reduce the redundancy of each user in the cognitive radio networks. The processing speed and the efficiency of the single cognitive node are improved through the sparse measurement matrix. The fusion center reconstructs the observed data by the iterative algorithm of factor graph, dramatically reducing the computation. According to the frequency usage, the cognitive nodes adjust the sampling rate adaptively to ensure the maximum efficiency in the whole networks.

    • References | Supplementary Material | Related Articles
    • A Fast Control Channel Selection Algorithm for Cognitive Radio
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 80-85. DOI:10.13190/jbupt.201105.80.wangshf
    • Abstract ( 2103 )     HTML       
    • Fast control channel selection algorithm for cognitive radio is proposed. Firstly, the delay caused by signal transmitting and processing is utilized to achieve fast control information exchange. Secondly, the process of spectrumhole selection is optimized, that will decrease the number of the spectrum holes used for control channel. Finally, the control channel interruption, caused by the reappearance of primary users on spectrum hole, is significantly avoided. Derivations and simulations prove the increase of the performance on the above mentioned aspects.

    • References | Supplementary Material | Related Articles
    • A New Mechanism for Adaptive Channel Hopping in  Wireless Mesh Sensor Network
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 86-91. DOI:10.13190/jbupt.201105.86.zhaojd
    • Abstract ( 2136 )     HTML       
    • An adaptive channel hopping algorithm that can be used in wireless mesh sensor networks is designed. The nodes themselves select proper channels independently and use them to communicate with its neighbors automatically. Once a pair of nodes find their current channel had been deteriorated, they abandoned the current channel and choose reserved channels at once, so the reliability of the network is improved. The algorithm makes use of multichannels efficiently. It is concluded that the algorithm is practicable in the network with moderate density and the topology is relatively static. 

    • References | Supplementary Material | Related Articles
    • Variable Structure Multiple Model Estimation Based on Double Layer Model Grid
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 92-96. DOI:10.13190/jbupt.201105.92.liuy
    • Abstract ( 1661 )     HTML       
    • A variable structural multimodel method is propose based on a duallayered grid (DLGVSMM) for state estimation of hybrid system. The total model set of DLGVSMM is composed of a basic grid. The structure of the new method can be adaptively tuned and an amendatory model grid C which can move freely in the space of system mode. Firstly, the likely model set technique is used to adjust the topology structure of the M. Then, the central position of C produced by the adaptive grid approach is further used to produce the adaptive amendatory model grid C. Finally, the total estimation can be obtained by optimal information fusion. Simulations demonstrate that the proposed DLGVSMM wiil improve the tracking performance at a limited extra computational cost. 

    • References | Supplementary Material | Related Articles
    • Algorithm of Autonomous Satellite Recognition  Base on Fourier Phase Difference
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 97-100. DOI:10.13190/jbupt.201105.97.zhangshd
    • Abstract ( 1905 )     HTML       
    • An algorithm is designed to recognize satellites in the sky based on phase difference of a series of images in frequency domain. It is complicated and difficult to recognize the satellites merely through stars’ characteristics because the satellites traced are always surrounded by a large number of stars. One frame image in a series of images is compensated and compared with its adjacent frame. From the comparison, the odd object can be recognized by the character of Fourier phase difference. Then frame subtraction method is used to eliminate fake objects. Finally the movement of tracing object is described. Meanwhile an improved algorithm of image binarization based on twodimension histogram is designed to strength its antinoise ability. At the end the experiment shows that the error between this algorithm recognition and human capture is less than one pixel.

    • References | Supplementary Material | Related Articles
    • A Modified Hybrid Online & Offline SPD First  (HSPD) Scheduling for EPONs
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 101-104. DOI:10.13190/jbupt.201105.101.shuaiqj
    • Abstract ( 2366 )     HTML       
    • In order to shorten the idle time in offline scheduling, a modified hybrid online & offline with Shortest propogation delay first based (HSPD) scheduling is proposed. Due to the round trip time (RTT) influence on the upstream idle time, a scheduling condition parameter is defined to further classify online and offline status based on the diversity of the propogation delay. The network performance is evaluated through analysis and simulation. Results indicate that HSPD scheduling achieves better performance compared with the MDBA1 algorithm and SPD first based offline scheduling especially under light or medium loaded traffic.

    • References | Supplementary Material | Related Articles
    • Spatial InterSector Interference Coordination for MultiUser OFDM Systems
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 119-123. DOI:10.13190/jbupt.201105.119.zhout
    • Abstract ( 1854 )     HTML       
    • A new downlink spatial coordination scheme is proposed for orthogonal frequency division multiple access (OFDMA) systems to mitigate intersector interference, in which the minimum mean square error (MMSE) precoding is utilized to improve the performance of edge users at neighbor sector. The design of precoding matrix is simplified by separating the objective functions that maximizes expected signal power and minimizes interference leakage in different resource groups. System level simulation demonstrates that the proposed scheme can significantly alleviate intersector interference, while maintain sector average throughput. The superiority is distinct even when imperfect CSIT is caused by limited codebook and increased feedback granularity. 

    • References | Supplementary Material | Related Articles
    • A SecondOrder Cone Programming Methodology for  Hybrid Filter Banks Optimization Design
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 124-127. DOI:10.13190/jbupt.201105.124.caizhh
    • Abstract ( 1750 )     HTML       
    • A linear equation system for designing hybrid filter banks (HFB) is presented on the basis of solving the coefficients of the synthesis filter banks derived from the perfect reconstruction (PR) conditions. The relationtions between the PR conditions and each different solution situations are discussed regarding the consistent and inconsistent equation case. The general solution and the lower bound of the reconstruction error are given. A second order cone programming based methodology for designing PRHFB is proposed to get the unique solution with the constrains of minimizing the stopband energy of the synthesis filter banks, which can also be used to calculate the minimum norm solution of the equation. Simulations show that this approach can get the unique solution and satisfy the system PR conditions effectively.

    • References | Supplementary Material | Related Articles
    • Detecting DDoS Attack with Hurst Parameter of Marginal Spectrum
    • ZHENG Kang-feng
    • Journal of Beijing University of Posts and Telecommunications. 2011, 34(5): 128-132. DOI:10.13190/jbupt.201105.128.zhengkf
    • Abstract ( 2183 )     HTML       
    • In order to detect distributed denial of service (DDoS) attack effectively, a new method is described. Firstly, HilbertHuang transform (HHT) is introduced into the process of network traffic signal to obtain corresponding marginal spectrum. Then its Hurst parameter is calculated. Next, the detection threshold is determined by means of training Hurst parameters of marginal spectrums of experimental data with the goal of seeking the maximum composite index. Finally it can be judged whether DDoS attack happened or not through comparison with above threshold. Experimental results verified the feasibility of this method.

    • References | Supplementary Material | Related Articles