Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • An AQM Scheme for Fast Response
    • ZENG Zhimin,ZHANG Tiankui,FENG Chunyan,DING Wei
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 5-9. DOI:10.13190/jbupt.200504.5.077
    • Abstract ( 1354 )     HTML       
    • A proportionalintegralrate (PIR) controller for active queue management (AQM) scheme based on the linearized AQM model was proposed. PIR controller is well suited to dynamic network environments where traffics change frequently. In order to address the slow response of PI controller, a normalized input rate control PIR controller was used to speed up the responsive time under varying network conditions. Analysis and simulation results show that under varying network conditions PIR controller will have a fast response and improve the buffer utilization, and have a good perform in stability and link utilization.

    • References | Supplementary Material | Related Articles
    • An Improved Blind Equalization Algorithm Based on EVA
    • BAI Ziquan,LI Daoben
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 10-13. DOI:10.13190/jbupt.200504.10.baizq
    • Abstract ( 1108 )     HTML       
    • A new blind equalization algorithm based on eigenvector algorithm(EVA) was presented to solve the phase rotation problem by employing metric including phase information of the channel, and a comparison between new algorithm and EVA was also made. Simulation results show that the proposed algorithm will increase convergence rate by 10%, improve antinoise capability by 1?dB, and compress residual intersymbol interference(ISI) by 10% without increasing computational complexity with respect to EVA as well.

    • References | Supplementary Material | Related Articles
    • A Density Control Algorithm Based on Probability Coverage Model in Wireless Sensor Networks
    • LIU Lifeng,ZOU Shihong, ZHANG Lei,CHENG Shiduan
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 14-17. DOI:10.13190/jbupt.200504.14.liulf
    • Abstract ( 1057 )     HTML       
    • Density control is the common way to improve the network lifetime of large scale wireless sensor network. Many density control algorithms are based on 0~1 coverage model, whereas probability coverage model defines network coverage ability more accurately than 0~1 coverage model in real applications. A density control algorithm based on probability coverage model was presented, which can turn offredundant sensor nodes to reduce total network energy consumption and ensure adequate network coverage ability.

    • References | Supplementary Material | Related Articles
    • Performance of Two Sampling Modes for Degree of Polarization Used as Feedback Signal in
    • CHEN Lin1,2,ZHANG Xiaoguang2,YU Li2,ZHANG Ru2,
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 18-22. DOI:10.13190/jbupt.200504.18.chenl
    • Abstract ( 998 )     HTML       
    • A numerical model is founded to analyze the performance of two sampling modes for polarization degree as controlling signal with various polarization mode dispersion compensators in 40?Gbit/s optical fiber communication. numerical simulation results including the compensated bit error rate(BER)and polarization degree of 1000 sampling points show that when single state of polarization sampling mode is used in two stages and three stages polarization mode dispersion (PMD) compensator with more than four degrees of freedom, the numbers of degree of freedom for the compensators should not be more than four, otherwise, the compensation algorithm will be plunged in local maximum to cause severe PMD that increase bit error. So, another sampling method is proposed to be suit for three section PMD compensator, in which shortest axis lengths of degree of polarization (DOP)ellipsoid is used as the feedback signals. The performance of DOP ellipsoid is evaluated by means of numerical simulations with threesection compensator, which is better than that of single state of polarization sampling mode.

    • Supplementary Material | Related Articles
    • Study on the onBoard Computer System Based on ARM Processor
    • WANG Xinsheng1,SUN Hanxu1,XU Guodong2,TONG Zhihong3
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 23-26. DOI:10.13190/jbupt.200504.23.wangxsh
    • Abstract ( 1160 )     HTML       
    • The new fault tolerant onboard computer(OBC) with dual processing modules is presented to improve the microsatellite data handling. Each processing module is composed of 32bit ARM processor. Using the fault tolerance method, The OBC's hardware structure is implemented based on commercialoffthe shelf (COTS) devices. As well as, a detail analysis of the fault handling mechanism and the software architecture is given. Considering the demanding of the extremely tight constraints on mass, volume, power consumption and space environmental conditions, the new fault tolerant onboard computer's data handling is enough to meet the mIcro satellite missions.

    • Supplementary Material | Related Articles
    • A MeasurementBased Improvement of TCP Fast
    • SONG Lihua,CHEN Ming,ZHANG Rui
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 27-31. DOI:10.13190/jbupt.200504.27.songlh
    • Abstract ( 1064 )     HTML       
    • Congestion control is one of the cornerstones of Internet. The classical transmission control protocol (TCP) congestion control scheme, Reno, and the other two, Vegas and Fast, recently suggested upgrades for highspeed networks, are analyzed. In the comparative work, Fast's high performance is validated and its weakness, the difficulty in setting parameters, is revealed. Also, to facilitate Fast parameter setup, a measurementbased improvement is proposed. The essential idea is to introduce a macroscopic guidance layer upon end systems which will guide them to appropriate settings of number of extra packets according to periodical performance measurement on network backbone. Simulation results indicate that by realizing the target of having the bottleneck queue tend to be a fixed length, the improved Fast scheme can get a higher and steadier power, and its power will not decrease when new connections join in.

    • Supplementary Material | Related Articles
    • Research on Federation Integrated Test Platform Based on HLA
    • SONG Hengjie,YANG Ming,WANG Zicai
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 32-36. DOI:10.13190/jbupt.200504.32.songhj
    • Abstract ( 1027 )     HTML       
    • In order to effectively support the analysis and estimation on validity and credibility of the federation simulation system, which is based on high level architecture (HLA, high level architecture), and provide comprehensive assistance to aseries of decisionmarking processes based on simulations result, a federation integrated testing platform (FITP, federation integrated test platform) was designedand implemented when considering the testing requirements in the life cycle of HLAbased federation simulation system. The federation integrated testing process model was presented, and the architecture and prime components of FITP were described. Furthermore, the key techniques in the process of development were studied in detail. It proves that FITP not only provides comprehensive support for testing activities through the whole process of developing HLAbased federation simulation system, but also evidently improves test efficiency and test objectivity.

    • Supplementary Material | Related Articles
    • A Novel Fast Search Algorithm for Video Coding Based on MultiBlock Mode and MultiReference Frame
    • CUI Yansong,DUAN Dagao,DENG Zhongliang
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 37-40. DOI:10.13190/jbupt.200504.37.cuiys
    • Abstract ( 961 )     HTML       
    • Based on studying the motion estimation of multiblock mode and multireference frame, a novel fast search algorithm was presented in H.264. The algorithm judges the skip mode, which can reduce a lot of calculation and time. It selects the block mode according to the cost function of different motion search modes. At the same time, it decides the available reference frame used in the motion search. The experiment result shows that the proposed algorithm can decrease the search calculation and greatly improve the coding speed, while the peak signal noise ration (PSNR) of picture and bit rate change very little.

    • Supplementary Material | Related Articles
    • 3G UTRAN Quality Evaluation Based on Neural Network
    • XU Haidong1,2,LI Yewen1,JIANG Feng2,SONG Junde2
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 41-44. DOI:10.13190/jbupt.200504.41.xuhd
    • Abstract ( 1104 )     HTML       
    • A set of key performance indicator of UMTS terrestrial radio access network (UTRAN) running quality was presented to evaluate the running quality of 3G UTRAN. Meanwhile, an evaluating model based on BP neural network was proposed to evaluate the 3G UTRAN running quality. The fuzzy evaluating method was used to construct training data. It is resulted by the fuzzy evaluating method, that the model will be able to evaluate the UTRAN running quality very well.

    • References | Supplementary Material | Related Articles
    • Automatic Verification of Mobile IPv6 Using Uppaal
    • HANG Dongmei,MA Huadong,GAO Dayong
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 45-49. DOI:10.13190/jbupt.200504.45.zhangdm
    • Abstract ( 1032 )     HTML       
    • A timed automata model of mobile Internet protocol version 6 (IPv6) using formalmethod was presented, and the protocol's key properties of liveness, mobility and seamless handoff were verified by the realtime model checker Uppaal. The verification proves that the packet loss occurs during the period of handoff process. An ideal condition guaranteeing the seamless handoff is proposed by analyzing the reason of packet loss, and in this condition, the verification shows that the property of seamless handoff of mobile IPv6 is satisfied. Some suggestions that are likely to lead to mobility performance improvement for mobile IPv6 are given.

    • References | Supplementary Material | Related Articles

    Reports

    • Study on Cooperation Incentive Mechanism Based on Vickrey Auction in Ad Hoc Networks
    • WANG Yufeng1,2,WANG Wendong1,YUAN Gang1,CHENG Shiduan1
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 50-53. DOI:10.13190/jbupt.200504.50.wangyf
    • Abstract ( 1250 )     HTML       
    • In order to provide incentive to cooperate for nodes in Ad hoc networks, the incentive to cooperate with each other and to motivate those nodes to reveal their cost of participating in network responsibilities, the destinationdriven Vickrey auction was designed forthe motivation of the cooperation among nodes in Ad hoc networks, which would take advantage of the merit of Vickrey auctions. Meanwhile, the incurred cost of nodes for forwarding packets was taken into account explicitly. The costeffective path was determined through the series of auctions carried out by intermediate nodes in path from destination to source. Theoretic analysis proves that thismechanism can motivate nodes reveal forwarding cost truthfully, and can achieve the objective of cost efficiency in routing selection.

    • References | Supplementary Material | Related Articles
    • Overhead Reducing Method for Link State Based Routing Protocols in Ad Hoc Networks
    • GU Ju,GUAN Yong,WANG Chunjiang,LIU Yuanan
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 54-57. DOI:10.13190/jbupt.200504.54.guj
    • Abstract ( 1123 )     HTML       
    • In order to reduce the overhead of networks, a new routing method, in which the nodes update the link states via using the frames transmitted by way of broadcasting in media access control layer, was proposed. Theoretical analysis shows that the proposed method can reduce the amount of the control packets and the probability of the occurrence of congestion, and then it can increase the throughput of the network. Furthermore, simulation result proves that the new method will significantly reduce the overhead.

    • References | Supplementary Material | Related Articles
    • Optimal Power Allocation for TwoHop Relaying System with Different Channel State Information
    • ZHANG Jingmei,SHAO Chunju,WANG Ying,ZHANG Ping
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 58-61. DOI:10.13190/jbupt.200504.58.zhangjm
    • Abstract ( 1096 )     HTML       
    • Based on the instantaneous or the statistical channel state information, the channel capacity of a twohop relaying system was analyzed according to the different relaying methods. Taking the system capacity as the optimization criterion, an optimal power allocation scheme was proposed to distribute a certain power between the transmitter and the relay station. The numerical results show that, when compared with the uniform power allocation, the optimal power allocation can daptively adjust each hop power based on the different channel conditions, and can utilize the resources efficiently to further improve the system capacity.

    • References | Supplementary Material | Related Articles
    • The Performance Analysis of an Improved UltraWide Bandwidth Digital RadioonFiber System Model
    • QI Yongxing,LIU Yuanan,GAO Zehua
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 62-65. DOI:10.13190/jbupt.200504.62.079
    • Abstract ( 990 )     HTML       
    • To utilize the properties of ultrawide bandwidth, the structure of ultrawide bandwidth digital radio on fiber system was modified, and the system model was illustrated. Simulations and theoretical analysis show that different time hopping sequences (THS) will cause different system performance (signal to noise ratio), and different active number of users will bring about different average interference of time slot with the same THS. And also show that the modification will decrease the system complexity, and meanwhile, will increase the efficiency of fiber, and improve the system performance as well.

    • References | Supplementary Material | Related Articles
    • Research on NonUniform Bandpass Sampling
    • LIU Gaohui,GAO Yong,YU Ningmei
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 66-68. DOI:10.13190/jbupt.200504.66.liugh
    • Abstract ( 1236 )     HTML       
    • To extend the range of the sampling frequency, a method of periodically nonuniform bandpass sampling was put forward in which the value of the average sampling frequency was equal to that of the uniform sampling frequency without distortion. The spectrum aliasing was analyzed. And on the basis of the analysis, the conditions of the Fourier images of interpolants were given in the recovery of bandpass signal without distortion. The simulation example was presented to illustrate the calculation of interpolants and the reconstruction of bandpass signal from the nonuniform samples.

    • References | Supplementary Material | Related Articles
    • An ObjectOriented Method for Information System Security Evaluation
    • YAN Qiang1,SHU Huaying1,CHEN Zhong2,DUAN Yunsuo2
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 69-73. DOI:10.13190/jbupt.200504.69.076
    • Abstract ( 1053 )     HTML       
    • ecurity evaluation is an important approach for the security risk management of the information system. But there are lack of effective methods and tools for security evaluation. To resolve the problem, an object model of security evaluation is established based on the object oriented technology. The concepts of correlation test and dependency test are introduced and a set of tools is also developed according to the model. The practical application indicates that the object oriented technology can improve the efficiency of security evaluation, and the correlation test and dependency test also improve the penetration testing effects.

    • References | Supplementary Material | Related Articles
    • Quantum Secret Sharing Based on Entanglement Swapping and Local Operation
    • QIN Sujuan1,2,LIU Tailin3,1,WEN Qiaoyan
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 74-77. DOI:10.13190/jbupt.200504.74.qinsj
    • Abstract ( 1150 )     HTML       
    • To improve the efficiency of quantum secret sharing, a protocol share the message directly among the users was proposed. The scheme made full use of entanglement swapping of Bell states and local operations. For detection of eavesdropping, the EPR pairs were divided into two parts: the checking parts and the encoding parts. After insuring the security of the quantum channel by measuring the checking particles in conjugate bases, the sender encoded her bits via the local unitary operations on the encoding parts. Investigation shows that the protocol is secure and two Bell states can be used to share two bits message.

    • References | Supplementary Material | Related Articles
    • MPLS Traffic Balance Based on Genetic Algorithm with Congestion and Traffic Feature
    • FENG Chunyan,ZHANG Chen,DING Wei
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 78-82. DOI:10.13190/jbupt.200504.78.078
    • Abstract ( 1055 )     HTML       
    • The traffic balance based on Genetic Algorithm in the MPLS network was discussed. With guaranteeing the optimizing performance of the algorithm, the optimized o bjects was selected according to the network congestion analysis, which would reduce the solution space and decrease the algorithm complexity. As well as ensuring the diversity of species, the creation of the initial population was optimized based on a certain probability distribution according to the traffic distribution feature, which would enhance the algorithm convergence speed. The simulation and analysis show that the proposed algorithm can be implemented in an easy way with little effect on the routing protocol, and achieve an obviously optimized outcome with a high convergence velocity.

    • References | Supplementary Material | Related Articles
    • Construction of Cheating Immune Secret Sharing
    • ZHANG Jie1,LIU Zhenhua2,WEN Qiaoyan1
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 83-86. DOI:10.13190/jbupt.200504.83.zhangj
    • Abstract ( 954 )     HTML       
    • Cheating immune secret sharing in the unconditionally secure case was investigated. Secret sharing is a kcheating immune if any k cheaters are not better off than a participant which follows the protocol honestly. kcheating immune secret sharing scheme under the unconditionally secure would be given. The obtained function of the secret sharing scheme is kresilient and satisfies kstrengthened propagation criterion. Furthermore, its degree is high. So it has better cryptographic properties than that of the known results.

    • Supplementary Material | Related Articles
    • Improvement and Implementation of Objective Digital 
    • HUANG Wenhui1,CHEN Renlei2,ZHANG Jiamou2
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 87-90. DOI:10.13190/jbupt.200504.87.huangwh
    • Abstract ( 1174 )     HTML       
    • By contrasting the original video and the proceeded video, and on the base of peaksignaltonoise ratio the traditional video quality measurement, we improve the algorithm of the critical merits such as blurring and blocking, and state the preprocess. Practice proved it can map with mean opinion score of subjective video quality evaluation. So the algorithm can apply for assessing and optimizing the code device.

    • References | Supplementary Material | Related Articles
    • A New Generation Service Architecture Based on OGSAParlay Grid Services
    • RAO Shaoyang,YANG Fangchun
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 95-98. DOI:10.13190/jbupt.200504.95.raoshy
    • Abstract ( 1217 )     HTML       
    • To overcome the limitations of Parlay web services, such as inextensible, a new Parlay/OSA service architecture based on open grid services architecture(OGSA), named Parlay grid services, was proposed, with which, Parlay was integrated with OGSA to provide the interfaces through web service, which inherits those advantages from OGSA, web services and Parlay/OSA, and support asynchronous operations、lifetime management、stateful service and multilayer service integration, as well as excellent extensibility. In the final, the services convergence based on new Parlay grid services architecture in next generation network environment was discussed.

    • References | Supplementary Material | Related Articles
    • The Detection and Classifying Technology Research of the SAR Image
    • GONG Jie,YANG Shiyuan
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 99-102. DOI:10.13190/jbupt.200504.99.gongj
    • Abstract ( 976 )     HTML       
    • Several statistics of the image graylevel comatrix and graylevel comatrix were first theoretically analyzed. Then a novel Cmean clustering algorithm, which is based on the graylevel comatrix and can be used for synthetic aperture radar (SAR) image classification, was proposed. The characteristics of different statistics were obtained from experiments. The analysis shows that the entropy, variance, the contrast and mean error will perform better. It is shown that when the statistics, which will maximize the betweenclass scatter and minimize the withinclass scatter, is adopted for classification, a much higher performance is achieved.

    • Supplementary Material | Related Articles
    • Anomaly Detection Method Based on CSABased Unsupervised Fuzzy Clustering Algorithm
    • XIAN Jiqing1,LANG Fenghua2
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 103-106. DOI:10.13190/jbupt.200504.103.xianjq
    • Abstract ( 1190 )     HTML       
    • A novel intrusion detection method based on clonal selection algorithm (CSA)based unsupervised fuzzy clustering algorithm was presented for solving the problem of fuzzy kmeans algorithm which is much more sensitive to the initialization and is easy to fall intolocal optimization. With the method, the global optimal clustering with clonal operator which combines the evolutionary search, the global search, the stochastic search and the local search could be quickly obtained, in the mean time, the abnormal network behavior patterns with fuzzy detection algorithm could be detected. The benefit of this algorithm is that it does not need the labeled trainingdata sets and it could detect unknown intrusion. Simulation results show that the method mentioned above will be able to detect unknown intrusions with lower false positive rate and higher detection rate.

    • Supplementary Material | Related Articles
    • OFDM System Based on Adaptive Transitting Optimization Beamforming
    • XU Kai,LUO Tao,YIN Changchuan,YUE Guangxin
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(4): 107-110. DOI:10.13190/jbupt.200504.107.xuk
    • Abstract ( 1130 )     HTML       
    • An adaptive transmitting optimization beamforming space time block codingorthogonal frequency division multiplex (STB〖JP9〗C-〖JP〗OFDM) [JP2]system, called adaptive beamfo rming STB〖JP9〗C-〖JP〗OFDM (AB〖JP9〗F-〖JP〗STB〖JP9〗C-〖JP〗OFDM) system based on channel state information (CSI), was proposed. And the optimization beamforming weight vector was derived in case of maximal receiver signaltonoise ratio. The performance of AB〖JP9〗F-〖JP〗STB〖JP9〗C-〖JP〗OFDM system when there are channel estimation errors w as given. Performance and computer simulation results of the system over wireless Reyleigh fading channels show that all the diversity resource can explored by the system, and the performance of the system can be improved significantly when compared with STB〖JP9〗C-〖JP〗OFDM, spacetime trellis codin〖JP9〗g-〖JP〗OFDM(STT〖JP9〗C-〖JP〗OFDM) and trellis code modulatio〖JP9〗n-〖JP〗STB〖JP9〗C-〖JP〗OFDM (TC〖JP9〗M-〖JP〗STB〖JP9〗C-〖JP〗OFDM) system.

    • References | Supplementary Material | Related Articles