Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • A Transfer Learning Based Text-Image Feature Mapping Algorithm
    • Jie Liu
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 1-5. DOI:10.13190/jbupt.201206.1.liuj
    • Abstract ( 1777 )     HTML       
    • A transfer learning based text-image feature mapping algorithm under event constraint is proposed. Firstly, the documents of each event are modeled by the latent dirichlet allocation, in which the most discriminating feature is obtained by computing the information gain of each topic. Secondly, the images of the corresponding event are modeled through the bag-of-visual-word model and the nave bayes approach. Finally, the feature distributions of the target images are approximated by utilizing the feature distributions of the text data and the text-image co-occurrence data within the same event. Experiment is conducted on a dataset containing 15 categories of events. The effectiveness of the proposed feature mapping algorithm is shown.

    • References | Supplementary Material | Related Articles
    • Research and Application for Fast Restoration of Color Images Algorithm Based on Total Variation Framework
    • LIU Hai-ying, Wu-Sheng Lu, ZHANG Cheng-jin, MENG Qing-hu
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 6-10. DOI:10.13190/jbupt.201206.6.liuhy
    • Abstract ( 1734 )     HTML       
    • Digital images can readily be blurred in various degrees and contaminated by noise during the process of the acquisition and transmission. This inevitably leads to considerable difficulties for the subsequent processing and application of these degraded images. An algorithm that combines an alternating minimization method with a new bisection technique for denoising and within-channel/cross-channel deblurring of the color images is proposed in a total variation energy minimization framework. Experiment demonstrates that, due to the fast convergence of the bisection technique employed, the proposed algorithm is able to quickly determine optimal value of the regularization parameter, thus improving the algorithm’s denoising and deblurring performance as well as adaptation ability.

    • References | Supplementary Material | Related Articles
    • Block Level Adaptive Inter-Layer Intra Prediction
    • CHANG Kan, QIN Tuan-fa, ZHANG Wen-hao, MEN Ai-dong
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 11-15. DOI:10.13190/jbupt.201206.11.changk
    • Abstract ( 1854 )     HTML       
    • In order to improve the performance of inter-layer intra prediction (ILIP) in scalable video coding, a Wiener filter based block level adaptive ILIP method is proposed. Firstly, the frame to be coded is divided into a number of blocks. Afterwards, the Wiener filter coefficients are obtained by a frame-by-frame training procedure, in which both of the enhancement layer (EL) signal and the corresponding up-sampled base layer (BL) signal are utilized. Finally, the achieved Wiener filter coefficients are applied to optimize the up-sampled BL signal, and a block level filter control is introduced to reduce prediction error energy. Experiments show that, compared with the traditional ILIP method, the proposed method can get more accurate prediction of the EL signal, resulting in up to 14.45% encoding bit rate reduction.

    • References | Supplementary Material | Related Articles
    • Forgeries of Chinese Character Detecting Based on Camera Calibration
    • LI Ye-zhou, WU Xiao-mei, NIU Shao-zhang, MENG Xian-zhe
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 16-19. DOI:10.13190/jbupt.201206.16.105
    • Abstract ( 1625 )     HTML       
    • Chinese characters should match certain rules of projection when photoed by digital camera. Meanwhile that will bring projection deviations. In order to detect the information authenticity of the Chinese characters in the digital image, a new estimation algorithm for Chinese characters projection deviation is studied. Based on camera calibration, a new estimation of projection deviation is proposed. And based on Chinese characters’ flat square feature, using Chinese characters model, instead of shooting Chinese characters into the real world, can be coordinated, a set of corresponding point coordinates is extracted, and then the corresponding affine matrix of the image’s homography matrix is obtained. Thus, the deviation value of the reconstruction Chinese character is calculated. If the value obtained is greater than threshold established by experiments before, the Chinese characters in this digital image will be manipulated. Experiments show that this method can detect the rewritten or replaced Chinese characters in the digital image.

    • References | Supplementary Material | Related Articles
    • Orthogonal Differential Chaos Shift Keying Communication Scheme Based on Walsh Code
    • YANG Hua, JIANG Guo-ping
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 20-24. DOI:10.13190/jbupt.201206.20.yangh
    • Abstract ( 1863 )     HTML       
    • A new chaotic communication scheme named orthogonal differential chaos shift keying (ODCSK) is presented for ultra wide bandwidth (UWB) application. The proposed scheme can overcome the disadvantages existing in code-shifted differential chaos shift keying (CS-DCSK), demonstrating desirable features of higher attainable data transmission rate, shows better communication privacy and higher reliability. Analysis and simulation reveal that ODCSK shows better bit error rate performance in comparison to CS-DCSK with certain signal noise ratio levels and spreading factors.

    • References | Supplementary Material | Related Articles
    • Fuzzy Evaluation for Design Scheme Based on Information Axiom
    • ZHANG Rui-jun, JIA Qing-xuan, MENG Liu
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 25-29. DOI:10.13190/jbupt.201206.25.zhangrj
    • Abstract ( 1545 )     HTML       
    • Aiming at shortage of index identified and membership function selected in existing evaluation, a new method of fuzzy evaluation for design scheme base on information axiom is proposed. First, a zigzag mapping model is designed between target area and index area following the principle of axioms design and a comprehensive evaluation index system is established for product design scheme. Second, according to the different relations between index and design range, the evaluation indexes are divided into different types whose membership grade can be described by the normal fuzzy distribution curve. The calculation method is given for the corresponding information of index and can be applied in the scheme evaluation of the mechanical parking system. Last, the process of fuzzy evaluation is modeled based on information axiom.

    • References | Supplementary Material | Related Articles
    • New Construction of Mutually Orthogonal Binary Sequence Sets with Zero Correlation Zone
    • LIU Kai, YU Sai, LI Yu-bo, XU Cheng-qian
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 30-33. DOI:10.13190/jbupt.201206.30.liuk
    • Abstract ( 1601 )     HTML       
    • Based on a pair of Hadamard matrices of the same size, a new construction of mutually orthogonal binary sequence sets with zero correlation zone (ZCZ) is presented by interleaving recursion. The sequence sets proposed can achieve theoretical bound of binary ZCZ sequence sets. By interleaving recursion, ZCZ sequence sets can be constructed from Hadamard sequences weighted by the coefficient matrices, satisfying mutually orthogonality, in which the number of sequences doubles the size of Hadamard matrix. The construction results illustrate that the proposed method improves the number of mutually orthogonal binary sequence sets with ZCZ and obtains more new sequence sets, which are used in quasi-synchronous code division multiple access system and implemented conveniently in hardware, by means of different choices of the coefficient matrices.

    • References | Supplementary Material | Related Articles
    • Construction of Exact-Repair MDS Code Using Cyclic Vector
    • WANG Yan-bin, CHEN Yong, LIN Bao-jun
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 34-37. DOI:10.13190/jbupt.201206.34.wangyb
    • Abstract ( 1638 )     HTML       
    • A kind of minimum storage regenerating (MSR) codes is constructed for exact-repairing nodes in the distributed storage systems. The codes based on cyclic vectors based are belonged to the maximum distance separable (MDS) erasure codes. Both the system and the redundancy data are saved in each node. All the calculation of the encoding and the decoding are in the Galois field 2. The storage system could exactly repair any single node’s error with the minimum bandwidth in theory. The system could provide a maximum bandwidth in theory for the single user. Compared with other MSR codes, those codes, with minimum bandwidth regenerating repair codes, have more straightforward structure and less decoding operation, and can provide the most available bandwidth for the single user.

    • References | Supplementary Material | Related Articles
    • An Approach to Improving the Accuracy of the Indoor Positioning with NLOS Environment
    • ZHAO Jun-hui, ZHANG Xue-xue, ZENG Long-ji
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 38-43. DOI:10.13190/jbupt.201206.38.zhaojh
    • Abstract ( 1779 )     HTML       
    • Signal power can be enhanced or decreased due to the interference of both none line of sight and path loss in the indoor environment, which causes a bias property of both positive and negative in the received signal strength (RSS) measurement error. A method for improving RSS positioning is proposed. The intersections of positioning annuluses are used in the algorithm of weighted centroid to estimate the position of the mobile stations. Simulation shows that this algorithm can improve the location accuracy in the indoor environment.

    • References | Supplementary Material | Related Articles
    • A Novel DV-Hop Localization Algorithm Based on the Connectivity Differences of Sensor Nodes
    • ZHENG Ji-ping, ZHANG Yong-ping, ZHAO Guo-an, ZHANG Hui
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 44-49. DOI:10.13190/jbupt.201206.44.zhengjp
    • Abstract ( 1852 )     HTML       
    • A new localization algorithm named connectivity differences distance vector-hop algorithm (CDA DV-Hop) is proposed based on connectivity differences of sensor nodes. First, by estimating the reversing positions of the anchor nodes, the average hop of distance of anchor nodes is refined and the accumulated errors are reduced. Then, according to the characteristic of the similar connectivity in proximate position, limitations of the maximum and minimum of different locations are given under the same unknown node, thus limiting those positions that are beyond the sensing area and calculating the connectivity differences. Finally, the ultimate estimated position is chosen from the candidate positions in which the connectivity difference value is the smallest. Experiments show that, under the same conditions, the proposed CDA DV-Hop algorithm achieves a better precision compared with existing distance vector-hop (DV-Hop) algorithms.

    • References | Supplementary Material | Related Articles
    • Technology of Virtual Gesture and Its Space Location Tracking Based on Data Glove and Binocular Vision
    • LV Mei-yu, HOU Wen-jun, CHEN Jun
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 50-54. DOI:10.13190/jbupt.201206.50.lümy
    • Abstract ( 2282 )     HTML       
    • On the base of data glove, a virtual gesture interaction system is put up that realizes the map from mankind hand to virtual hand. The model of space points location in binocular vision is modified and a new model based on two vertically placed cameras is proposed, in which position and posture tracking of moving target by binocular vision are achieved. By modifying camshaft algorithm, the accuracy and automaticity of moving target tracking system are improved, thereafter, the problem of capturing space posture of flexible object is solved. By comparing the pose and position information of virtual hand with image, the algorithm is testified and approved to be applicable.

    • References | Supplementary Material | Related Articles
    • A Length Semantic Constraints Based Approach for Mining Packet Formats of Unknown Protocols
    • ZHANG Zhao, TANG Wen, WEN Qiao-yan
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 55-59. DOI:10.13190/jbupt.201206.55.zhangzh
    • Abstract ( 1585 )     HTML       
    • In order to get the format of unknown protocols, a length semantic constraints based packet format mining method is proposed based on length semantic constraints. First, multiple sequence alignment method is applied to partition a packet into segments. Then, a length identification algorithm is utilized to scan the segments separately to infer length fields and corresponding referred field(s). At last, the format (hierarchy structure) of the packets is obtained. Experiments demonstrate the effectiveness of this method: the false negative rates of length fields for GetNextRequest and GetResponse of simple network management protocol version 1 are both 9.1%, and the false positive rates are 16.7% and 23.1%. The packet hierarchy is also obtained, approximately consistent with protocol format specification.

    • References | Supplementary Material | Related Articles
    • Dynamic Spectrum Access Based on Weighted Multi-Feature Model in Cognitive Wireless Network
    • LI Ju-peng, TAN Zhen-hui, CHEN Hou-jin
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 60-64. DOI:10.13190/jbupt.201206.60.lijp
    • Abstract ( 2049 )     HTML       
    • A new dynamic spectrum access technology based on weighted multi-feature model clustering is presented to improve transmission quality for different users for cognitive wireless network.Once the weighted multi-feature model of channels is extracted, these channels suitable for the cognitive users are clustered into different spectrum pools with a multi-objective clustering algorithm.These channels in white pooling are priority to be accessed for cognitive users according to their services.Multiple feature combinations and dynamic spectrum simulations are completed to verify the efficiency of the proposed method.Analysis and simulation show that the channels can be classified according to performance more efficiently, and the access efficiency of channels can be improved.

    • References | Supplementary Material | Related Articles
    • A Pilot Detection Scheme Based on Compressed Sensing in Non-Sparse Wideband Spectrum Sensing
    • XU Wei-lin, FAN Chun-xiao, WEN Zhi-gang, LIU Jie
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 65-69. DOI:10.13190/jbupt.201206.65.xuwl
    • Abstract ( 1948 )     HTML       
    • In order to break the limitations of spectrum sparse to compressed sensing technology, a pilot detection scheme is proposed based on compressed sensing in non-sparse wideband spectrum sensing. Under the premise of that the interference to authorized users does not exceed the specified threshold, the scheme makes linear operation at the primary user signal as well as the pilot signal of the target band, retain the pilot component at the spectrum holes and convert the recovery of non-sparse primary user signal to the recovery of the sparse pilot signal. The scheme resolves the failure of compressed sensing technology in cognitive radio wideband spectrum sensing when the primary user signal is non-sparse. Simulations indicate that the proposed pilot testing scheme can accurately detect the position of the spectrum hole on non-sparse spectrum.

    • References | Supplementary Material | Related Articles
    • Multiple Description Coding Based Transmission Performance in Wireless Multimedia Sensor Networks
    • FAN Gao-juan, ZHANG Chong-sheng, YUAN Mu-nan
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 70-73. DOI:10.13190/jbupt.201206.70.fangj
    • Abstract ( 1678 )     HTML       
    • A multiple description coding transmission strategy proposed to solve the problem of low wireless network connectivity but high transmission quality requirements in wireless multimedia sensor networks (WMSN). This strategy makes multiple descriptions coding on the source node, selects initial broadcasting nodes, and then builds multiple transmission paths. The strategy is applied in image transmission application where the performance is evaluated in terms of data arrival ratio, and comparied between transmitted image, the original one, and peak signal to noise ratio. Experiment shows that the strategy improves wireless network connectivity and assures transmission reliability of WMSN.

    • References | Supplementary Material | Related Articles
    • A Downlink Interference Coordination Algorithm to Suppress Interferences from Macro Base Station
    • LI Yuan, PENG Mu-gen
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 74-77. DOI:10.13190/jbupt.201206.74.liy
    • Abstract ( 1769 )     HTML       
    • In heterogeneous networks where the Macro cell is overlaid by Pico cells,severe downlink interference is suffered by Pico users from the Macro base station of high transmission power. A beam nulling-user selection algorithm is proposed to suppress the interference from the Macro station and therefore enhance the system spectrum efficiency. The interference to Pico users is modeled and analyzed in a mathematical way. Simulation is performed to evaluate the enhancement of the proposed algorithm. It is shown that the performance is significantly improved in case of the high signal-to-noise ratio region or large number of Pico cells.

    • References | Supplementary Material | Related Articles
    • Dynamic Subcarrier Allocation Transferring Access Probability in Cognitive Radio System
    • ZHANG Guo-bin, LI Ming, KE Fen
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 78-82. DOI:10.13190/jbupt.201206.78.zhanggb
    • Abstract ( 1754 )     HTML       
    • Aimed at dynamic changing of the available subcarriers in cognitive radio system, a dynamic subcarrier allocation method based on access probability is proposed. The method controls access probability of cognitive users on the subcarriers to maximize the system throughput and guarantee the quality of service requirement of the users. To simplify the solution process, a heuristic algorithm is proposed based on the access probability transfer. The algorithm transfers the subcarrier access probability among the users until the rate requirements of all users being satisfied. Simulation shows that the heuristic algorithm can achieve the global optimal solution in Rayleigh channel environment. Also it is shown that the throughput performance of the proposed method is better than current dynamic allocation and carrier sense multiple access method.

    • References | Supplementary Material | Related Articles
    • Blind Signature Over Inner Automorphism Group
    • PAN Ping, WANG Li-cheng, YANG Yi-xian
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 83-86. DOI:10.13190/jbupt.201206.83.panp
    • Abstract ( 1705 )     HTML       
    • Two blind signature schemes based on the discrete logarithm problem over inner automorphism group are proposed. The schemes satisfy blinding and one-more unforgery. These constructions can be viewed as non-communtative variants of blind signatures. Parameters and performance related issues are also addressed in detail.By comparison, the blind signatures are efficient in the running time and storage space.

    • References | Supplementary Material | Related Articles
    • An Improved BGP Security Mechanism
    • ZHAO Chen, SUN Bin, YANG Yi-xian, YANG Yan
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 87-91. DOI:10.13190/jbupt.201206.87.zhaoch
    • Abstract ( 1856 )     HTML       
    • For lack of necessary security mechanism, the border gateway protocol (BGP) faces serious security threats. In proposed BGP security mechanisms, the management of complicated certificatation and excessive storage overhead severely block security solutions from being implemented and deployed in real world. Based on modification of autonomous system alliance’s structure, the proxy re-signature is introduced into security enhanced BGP (SE-BGP) to improve translator trust model. An improved BGP security mechanism named improved SE-BGP is also designed for solving the problem of cross-certification of key nodes between autonomous system alliances. Security analysis and performance evaluation demonstrate that this mechanism continues to reduce the route resource expenses to have better scalability and good security capability. The number of used certificates is about 31% of the SE-BGP.

    • References | Supplementary Material | Related Articles
    • A Novel Traffic Transferring Based Load Balancing Scheme in Cellular Networks
    • GUO Chong-tao, SHENG Min, SHI Yan
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 92-96. DOI:10.13190/jbupt.201206.92.104
    • Abstract ( 2010 )     HTML       
    • A new traffic transferring based multi-cell load balancing (MLB) scheme is proposed. By multi-cell cooperation, MLB carries out one or two hops traffic transfer among the busy cell and its neighbors and achieves load balancing effectively. A multi-dimensional Markov chain based model is also built for MLB to analyze the system call blocking probability. Simulation verifies that MLB decreases hot cell and system call blocking probabilities greatly comparing to available schemes.

    • References | Supplementary Material | Related Articles

    Reports

    • Load-Aware Cooperative Sleeping Energy Saving Algorithm for Heterogeneous Wireless Networks
    • MIAO Jie, HU Zheng, TIAN Hui, GUI Li, LU Lei
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 97-101. DOI:10.13190/jbupt.201206.97.miaoj
    • Abstract ( 1642 )     HTML       
    • An adaptive service request load-aware cooperative sleeping energy saving algorithm for heterogeneous wireless networks is proposed, and it minimizes system overall power consumption under the constraint on the quality of service requirement in the heterogeneous networks system. The proposed algorithm constructs the economic theory revenue based power-saving model under wireless networks self-optimization framework. Monte Carlo simulation demonstrates that the algorithm can adaptively schedule the working mode of heterogeneous wireless networks and decrease the system total power consumption,and satisfies the blocking rate constraint of user service request.

    • References | Supplementary Material | Related Articles
    • Joint Subcarrier and Power Optimization in OFDMA Systems Based on Transiently Chaotic Neural Network
    • ZHANG Hai-bo, WANG Xiao-xiang, LI Fang-wei
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 102-106. DOI:10.13190/jbupt.201206.102.zhanghb
    • Abstract ( 1925 )     HTML       
    • An adaptive resource optimization algorithm for multiuser orthogonal frequency division multiple access (OFDMA) system is proposed. The algorithm consists of two steps: first, subcarriers are assigned by transiently chaotic neural network (TCNN) when the power is assumpted to be divided equally to every subcarrier. Second, the averagely assigned power is reallocated in a linear water-filling fashion. Simulations show that TCNN has better convergence speed and optimization rate than Hopfield neural network and chaotic neural network. Compared with existing algorithms, the proposed algorithm further achieves higher throughput by exploiting the multiuser diversity gain.

    • References | Supplementary Material | Related Articles
    • Optimal Resource Allocation in OFDM Two-Way Relay Network Using Physical-Layer Network Coding
    • XIAO Lin, YANG Ding-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 107-111. DOI:10.13190/jbupt.201206.107.xiaol
    • Abstract ( 2297 )     HTML       
    • An optimal resource allocation scheme for an orthogonal frequency-division multiple (OFDM) two-way relay network with physical network coding is constructed. Considering the total transmit power and user rate constraints, a sub-optimal resource allocation scheme is proposed to maximize the achievable sum rate of the terminals with low complexity. Using convex optimization techniques, a closed-form solution for power allocation among relay node and two terminals is derived. Thereafter, the variable dimensionality of the objective function is reduced from 3 to 1 that can dramatically decrease the complexity of the solution. Simulation shows that the proposed approach achieves the optimal sum rate and is better than that of the traditional resource assignment method but with less computational load in various scenarios.

    • References | Supplementary Material | Related Articles
    • A New Identity-Based Broadcast Encryption Scheme over Lattice
    • ZHANG Wei-ren, HU Yu-pu, YANG Xiao-yuan
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 112-115. DOI:10.13190/jbupt.201206.112.zhangwr
    • Abstract ( 1720 )     HTML       
    • To design a post-quantum secure broadcast encryption scheme, by using the bonsai trees model, an identity-based broadcast encryption scheme over lattice is proposed. The proposed scheme can avoid the decryption failure problem in the existing scheme. The new scheme is provable securied against chosen-plaintext attack where the security is reduced to the hardness of learning with errors in the standard model. Moreover the proposed scheme supports the dynamic expansion of client and deals with the setting of stateless receivers.

    • References | Supplementary Material | Related Articles
    • A QoE-Oriented Resource Allocation Design in HetNets
    • ZHANG Yue-ying, WANG Wen-bo, LONG Hang, LIU Fei, ZHENG Kan
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 116-120. DOI:10.13190/jbupt.201206.116.zhangyy
    • Abstract ( 2161 )     HTML       
    • A quality of experience (QoE) oriented resource allocation scheme for heterogeneous networks (HetNets), termed as MaxQoE, is presented. It can be used in various scenarios with multiple kinds of services in order to provide suitable services quality and allocate appropriate wireless resources for users with different QoE demands. Simulations demonstrate that the proposed scheme can effectively enhance the user QoE in HetNet compared with the maximum throughput scheme and equal allocation scheme..

    • References | Supplementary Material | Related Articles
    • Image Based Crack Detection Algorithm with Application to Cement Concrete Pavement
    • RONG Jing, PAN Yu-li
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(6): 121-124. DOI:10.13190/jbupt.201206.121.rongj
    • Abstract ( 2845 )     HTML       
    • Based on analysis of joints that interferes with crack detection on cement pavement, a new algorithm is proposed to remove joints and obtain crack identification results by horizontal projection. Firstly, high frequency information of image is obtained by wavelet transform that carries out a binary image containing cracks, joints and noise. Secondly, the joints should be identified and located according to peak features of horizontal projection. Finally, the cracks can be detected accurately after removal of joints. Test illustrats that joints of cement pavement can be removed effectively with this algorithm. Simulation shows that the algorithm can remove the joints effectively, and therefore, the automatic inspecting of cement pavement cracks can be implemented.

    • References | Supplementary Material | Related Articles