Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • A Delegable Model Based on Graph
    • HONG Fan,DUAN Sujuan,LI Chengbing
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 5-7. DOI:10.13190/jbupt.200506.5.hongf
    • Abstract ( 1030 )     HTML       
    • Trust management was discussed according to security requirements in distributed environment. A graph based delegable model and its formal description were given. Permissions propagating control, conflict and cyclic in delegable model were analyzed and resolved. Finally, the scheme of determining access request of subject in distributed environment and future work were proposed.

    • Supplementary Material | Related Articles
    • A Performance Improvement of Zero Padding OFDM System with Pseudorandom Sequence Processing Technique
    • FAN Da,CAO Zhigang,FAN Pingyi
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 8-10. DOI:10.13190/jbupt.200506.8.fand
    • Abstract ( 1011 )     HTML       
    • ZPOFDM(zero padding orthogonal frequency division multiplexing)has the disadvantage that the simple FFT (fast fourier transform) based receiver does not perform well. Therefore, a pseudorandom sequence processing technique that is each row of the IFFT (inverse fast fourier transform) matrix multiplies with a bit of a pseudorandom sequence is proposed. The technique changes the correlation properties of the IFFT matrix columns, and hence improves the performance over multipath channels. The modified IFFT matrix is still unitary and orthogonal, since the multiplication by ±1 of the IFFT unitary matrix rows doesn't destroy its unitarity and orthogonality. This technique is analized theoretically and applied to ZPOFDM, ZPOFDMOLA and ZPOFDMFAST. Simulation results verify the improved performance of the modified methods using this technique. The Hiperlan2 Channel models A and E are considered in our simulation. For the two channel models, the modified methods exhibit at least 22?dB advantage in SNR at 10-4 BER (bit error rate).

    • Supplementary Material | Related Articles
    • A Transmission in ISI Channel
    • BAI Ziquan,LI Daoben
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 13-16. DOI:10.13190/jbupt.200506.13.baizq
    • Abstract ( 960 )     HTML       
    • In order to improve the transmission performance in intersymbol interference (ISI) channel, high rate lower order modulation transmission with ISI was studied and the error rate performance of lower order modulation and higher order modulation with the same message rate and band width was compared. High rate lower order modulation transmission with ISI makes full use of the potential anti jam capability of the system and the threshold signal to noise ratio is greatly decreased by more than 10?dB. Simulation results show that with the same message rate and band width, lower order modulation transmission, interfered by ISI and employing sequence detection, obtains greater performance gain than higher order modulation, which is not influenced by ISI and detected symbol by symbol.

    • Supplementary Material | Related Articles
    • Joint Transmit and Receive Optimization with Rate Constraint in MIMO System
    • ZHAO Shaogang,YU Xin,WU Weiling
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 17-21. DOI:10.13190/jbupt.200506.17.zhaoshg
    • Abstract ( 1108 )     HTML       
    • A new algorithm of joint transmit and receive optimization based on the practical need of the communication system was put forward. The new optimization algorithm could optimize the MIMO spatial multiplexing system to minimize the symbol error rate with the constraint of a fixed transmit power and data rate. The whole MIMO spatial multiplexing system could be decomposed into several independent parallel subchannels by the optimized transmit and receive filter. And modified Fischer's loading algorithm could be applied into these subchannles according to the new algorithm of joint transmit and receive optimization. Eventually, the optimal transmit power allocated to these subchannels were achieved. The analysis results are consistent with the simulation results. The lower the rate is, the better performance will be achieved in the same MIMO spatial multiplexing system with the same SNR; the more antennas the system has, the better performance will be gained with the same rate.

    • Supplementary Material | Related Articles
    • An Overload Detection Mechanism of the Transaction System
    • WANG Yulong,LIAO Jianxin
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 22-25. DOI:10.13190/jbupt.200506.22.wangyl
    • Abstract ( 940 )     HTML       
    • Distribution characteristics of the response time in transaction processing systems were studied and analyzed. The conclusion shows that the mean response time goes by the exponential trend with the change of the call intension. A linear regression method was proposed for the first time to detect automatically the overload detection point of the transaction processing system. It implemented overload detection adaptively according to the load of systems, and was independent of system structures. The results of the experiment show that this method applied in an adaptive window control algorithm of the intelligent network service contr ol point has good adaptability and validity.

    • Supplementary Material | Related Articles
    • A Novel TCP Congestion Control Mechanism for Wireless Network
    • WANG Xiaoli1,JI Hong1,YUE Guangxin1,ZHOU Hongxia2
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 26-29. DOI:10.13190/jbupt.200506.26.wangxl
    • Abstract ( 1055 )     HTML       
    • The optimal value of the TCP(transport control protocal) data sending rate was studied when the wireless channel was in bad state. Two algorithms to adjust the size of TCP CWND(congestion window) were presented. The target of most research on TCP in wireless network is to improve the throughput. So the size of CWND doesn’t decrease when the packet loss is due to corruption. The result is the decrease of the reliability of TCP when the heavy packet loss rate occurs. The requirement of throughput and reliability were studied. The simulation results demonstrate that the QoS(quality of service) requirement is met and the throughput is not declining greatly.

    • Supplementary Material | Related Articles
    • Antenna and Propagation Effect on Capacity of Indoor MIMO Channel
    • LV Jiangang1,LV Yinghua1,ZHANG Hongxin1,LIANG Jing2
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 30-33. DOI:10.13190/jbupt.200506.30.lüjg
    • Abstract ( 1170 )     HTML       
    • The effects on capacity complementary cumulative distribution functions (CCDFS) of multiple input multiple output (MIMO) channel caused by the different antenna array structures and indoor propagation environments of both line of sight (LOS) and nonline of sight (NLOS) cases are analyzed by using a 2D SBR (shooting and bouncing) ray -tracing method. Antenna array structures and indoor propagation environments affect the CCDFS significantly. 10% outage capacities show that in both LOS and NLOS indoor environments, there exist a fixed relationship that independent and identically distribution (i.i.d.) rayleigh channel capacities are larger than the capacities equipped with linear antenna array which are larger than the capacities equipped with rectangular antenna array or capacity equipped with circular antenna array. And the capacities of NLOS MIMO channel are larger than the capacities with LOS path. The results show these conclusions are very useful for designing MIMO system.

    • Supplementary Material | Related Articles
    • The Performance Analyse of SSDB Mechanismin Parlay Multi -Service Environment
    • MA Xutao,LIAO Jianxin,ZHU Xiaomin
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 34-38. DOI:10.13190/jbupt.200506.34.maxt
    • Abstract ( 1212 )     HTML       
    • The mutual performance influence in different load cases about softswitch service and web service in the Parlay multi-service environment were studied. The dynamic resources allocation method between these services was proposed. Taking the stability of system as the prerequisite, SSDB (session setup delay bound) mechanism was proposed to satisfy each service's performance requirement on throughput and average response time. The simulation results prove that dynamic allocation of the system resource based on SSDB can satisfy each service's performance requirement in this environment.

    • Supplementary Material | Related Articles
    • Modeling TCP Performance in OBS Networks
    • JIAO Shuo,WU Haishan,XU Kun,LIN Jintong(
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 39-43. DOI:10.13190/jbupt.200506.39.jiaosh
    • Abstract ( 1090 )     HTML       
    • TCP (transfer control protocol) performance in OBS (optical burst switching) network was studied, and the performance degradation of TCP tahoe, reno, new reno and sack in the OBS network was discussed. Considering the ACKs' (acknowledgement) losses, a simple analytic model was investigated to give the steady state TCP throughput over the OBS network. The simulated result demonstrates that the model can accurately predict TCP throughput over a wide range of loss probabilities. The impact of ACKs' losses was analyzed based on the calculation results. Besides, ACKs were suggested to be treated as a kind of high QoS data in OBS network.

    • Supplementary Material | Related Articles
    • Settlement of Internet Interconnection Bargaining on the Focal Point
    • WANG Qi,LV Tingjie
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 44-47. DOI:10.13190/jbupt.200506.44.wangq
    • Abstract ( 1124 )     HTML       
    • Internet interconnection settlement was studied to promote Internet development and to make out reasonable interconnection policy. Different Internet backbone providers have different preferences of interconnection quality. The larger backbone prefers a lower quality of interconnection than the smaller backbone does. The best level of connectivity should be intermediated between what would be optimal for each backbone from the point of society. Under these circumstances, the smaller in general bribes the larger network to accept a higher level of connectivity, which is also Pareto betterment. Introducing the focal point equilibrium, two backbones determine interconnection quality through bargaining, which decreases exchange cost and regulatory cost.

    • Supplementary Material | Related Articles
    • Comprehensive Information Based Chinese Information Extraction System and Application
    • LI Lei,ZHOU Yanquan,WANG Jinghua
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 48-51. DOI:10.13190/jbupt.200506.48.lil
    • Abstract ( 1175 )     HTML       
    • A grope research is described on specific application domain oriented Chinese Information Extraction System from the point of Comprehensive Information Theory. A Comprehensive Information Knowledge Base is built through defining, analyzing and using syntactic, semantic and pragmatic information as an integrated entity. An experimental demo system is implemented for the application domain of financial news about management leaders' alteration in companies. Based on this, a kind of application model is discussed for information extraction system in Intelligent Mobile Information Service, which is Information Extraction plus Mobile Short Message Service. We assembled the characteristics of conciseness, definiteness in focus of Information Extraction result with that of mobility, facility and popularity of mobile phone into an experimental system. Testing results have shown its feasibility.

    • Supplementary Material | Related Articles
    • Performance Analysis of Lattice Reduction Algorithm in LASMAX Systems
    • ZHANG Qingrong1,WANG Gang2,SUN Yuhao2,LI Daoben2
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 52-56. DOI:10.13190/jbupt.200506.52.zhangqr
    • Abstract ( 1203 )     HTML       
    • The lattice reduction (LR) aided schemes were adopted in the zero forcing (ZF) algorithm (LR ZF) in rich multipath mobile communication environments of code division multi-access (CDMA) systems. The performance of LRZF was simulated and analyzed in LASMAX systems. The results verify that the systems' performance is improved highly, particularly in high SNR, at the expense of a little complexity increase. So LR algorithm can be adopted in mobile communication systems with multipath channel.

    • Supplementary Material | Related Articles
    • On Sojourn Time of M/G/1 Queueing System with Fixed Times of Feedback
    • ZHANG Qizhi1,2 ,LIAO Jianxin1,XU Tong1
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 61-64. DOI:10.13190/jbupt.200506.61.261
    • Abstract ( 1002 )     HTML       
    • The M/G/1 queueing system with fixed times of feedbacks was expanded to a genera lized situation, i.e., every customer accepted total m times of services, and the distribution function of every service time was different from each other. A customer on hisith service was regarded as a classCicustomer. The Laplace Stieltjes Transform of the total sojourn time of a customer defined as the duration from the customer arrival until the departure from the system was presented. Therefore, a useful tool is provided for modeling analysis of communication systems.

    • Supplementary Material | Related Articles

    Reports

    • A Multiple Access Method Based on Complete Complementary Codes in Ultra WideBand Wireless Communication
    • ZHAO Lixin,ZHAO Chenglin,ZHOU Zheng
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 65-68. DOI:10.13190/jbupt.200506.65.zhaolx
    • Abstract ( 1097 )     HTML       
    • A multiple access method based on complete complementary codes in UWB (ultra wideband) communication was presented. The zero crosscorrelation of complete complementary codes ensured it as the signature code about user. The decoding of the receiver employed the algorithm about shift and add to decode the intended user's information. The principle of the proposed receiver and the reason why the receiver could suppress multiple access interference (MAI) were illustrated. The performance analysis and simulation results show that the proposed multiple access method based on complete complementary codes can accommodate better performance on suppressing MAI than THPPM UWB system.

    • Supplementary Material | Related Articles
    • Research and Implementation of A Limited Resource Vector Load Balancing Algorithm
    • WU Naixing1,2 ,LIAO Jianxin,WANG Jing(
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 73-78. DOI:10.13190/jbupt.200506.73.wunx
    • Abstract ( 1155 )     HTML       
    • Based on the system feature of softswitch based heterogeneous clustered media server, this paper proposed a limited resource vector load balancing algorithm and also provided its software implementation method. Harmonious usage of system resources was considered and violent shaking of the system performance was avoided in the algorithm. A lot of simulations on the Petri net model of balance system had been conducted and the algorithm had been compared with some traditional algorithms on system throughput, request response time and performance stability. Results of simulation experiments show that the algorithm has higher performance. The implementation method of the algorithm is also useful for other heterogeneous clustered systems.

    • References | Supplementary Material | Related Articles
    • Detection Algorithm Based on an Enhanced Null Space Constraint for MultiUser MIMO Systems
    • WANG Yafeng1,ZHANG Junfeng2,ZHANG Jian1,YANG Dacheng1
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 79-83. DOI:10.13190/jbupt.200506.79.wangyf
    • Abstract ( 1048 )     HTML       
    • A Transmit Preprocessing Technique for Downlink Spatial Multiplexing in Multi-user MIMO Channels was proposed. Through adding additional constraint to the joint TxRx MMSE optimization scheme the equivalent channel could be changed from block diagonalization to complete diagonalization. MUI (multi-user interference) and per user multi stream interference could be canceled simultaneously. The modified algorithm is much more feasible and has the advantage of simplifying the receivers. A general complete diagonalization is the channel inversion algorithm. Performance analysis and comparison prove the complete diagonalization algorithm proposed has better performance than channel inversion algorithm.

    • Supplementary Material | Related Articles
    • Investigation on Interference Distribution in TDD CDMA Systems
    • DU Jiuhui,PENG Tao,LI Shaosheng,WANG Wenbo
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 84-88. DOI:10.13190/jbupt.200506.84.dujh
    • Abstract ( 1027 )     HTML       
    • In order to investigate the interference distribution in time division duplex code division multiple access (TDD CDMA) system, the difference of interference distribution between TDD CDMA and frequency division duplex (FDD) CDMA systems was investigated. By introducing smart antennas, the inter to intra cell interference ratio in CDMA systems was deduced. And taking TD SCDMA as an example, static and dynamic system level simulator was established to validate the conclusion of theoretical analysis. Simulation results show that sector antenna and smart antennas can reduce the inter to intra cell interference ratio effectively and slow dynamic channel allocation scheme is also able to weaken the inter cell interference in TDD CDMA systems.

    • Supplementary Material | Related Articles
    • A Masked Electronic Codebook Mode of Operation and Its Security Analysis
    • WEN Fengtong1,3 ,WU Wenling2,WEN Qiaoyan1
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 89-92. DOI:10.13190/jbupt.200506.89.wenft
    • Abstract ( 1122 )     HTML       
    • A novel scheme based on traditional electronic codebook (ECB) mode was proposed to improve the capability of block cipher mode of operation. Message blocks were masked with the Gray code so that the data mode was hidden efficiently. The security of the scheme was analyzed in the sense of reduction based cryptography. Investigation shows that the scheme is left or right indistinguishable against chosen plaintext attack (LOR CPA) secure if the underlying block cipher is a pseudorandom permutation.

    • Supplementary Material | Related Articles
    • Modeling of Service Quality Based on Users' Apperception
    • JIANG Feng,SONG Mei,WANG Kan,SONG Junde
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 93-96. DOI:10.13190/jbupt.200506.93.jiangf
    • Abstract ( 1049 )     HTML       
    • For management telecommunication services, the concept of impersonal degree of telecom services' satisfaction is defined based on Qos (quality of service) KPI by using attribute set mathematics theory in the paper. And a telecom service quality model is designed based on theory of man' brain apperception. At last the quality of MMS (multimedia message service) is analyzed with the model.

    • Supplementary Material | Related Articles
    • Research on Automatic Topology Discovery for Multi ASes IP Network
    • WANG Shuanghong,WANG Wendong,CHENG Shiduan,QUE Xirong
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 97-101. DOI:10.13190/jbupt.200506.97.259
    • Abstract ( 1139 )     HTML       
    • A novel multi ASes topology discovery algorithm was proposed, which could infer the AS information of all non-BGP (border gateway protocol) routers from that of the nearest BGP router. The algorithm could efficiently and accurately discover the AS layer and the network layer information of the network, including ASes, adjacent relationship between ASes, routers within each AS, subnets, and network devices within each subnet. The algorithm was validated in a large scale carrier class IP trial network. And it could not only be used for traditional network management, but also be used for quality of service management to provide a more accurate and complete network topology.

    • Supplementary Material | Related Articles
    • Synchronic Digital Audio Watermarking Algorithm Based on Quantizing Wavelet Domain Parameters
    • GAO Haiying,NIU Xinxin,YANG Yixian
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 102-105. DOI:10.13190/jbupt.200506.102.gaohy
    • Abstract ( 1109 )     HTML       
    • Audio watermarking algorithm based on discrete wavelet transform (DWT) is proposed in this paper. The algorithm embedded watermarking by quantizing the lowest frequency coefficients of DWT of the digital audio signals so that it is more robust than the algorithms introduced previously. The idea of embedding synchronic signal which used the synchronic signal to search the watermark location was introduced. The experimental results indicate the algorithm is robust to many operations on digital audio signal, such as Guassyawp, lossy compression, requantization.

    • Supplementary Material | Related Articles
    • Service Interaction Management System Framework Based on Immune Theory
    • XIONG Wenjian,YANG Fangchun
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 106-109. DOI:10.13190/jbupt.200506.106.xiongwj
    • Abstract ( 1011 )     HTML       
    • A service interaction management system framework was proposed based on analyzing the similarity of biological immune system and service interaction detection. In this framework, the trigger event was mapped to the antigen; the output of service logic response to trigger event was mapped to immune response; service interaction was mapped to abnormal immune response; and the resolution of service interaction was mapped to immune adjust. Through these mapping rules, different service interaction detections and resolutions are no longer isolated, but can be integrated.

    • Supplementary Material | Related Articles
    • Model Driven Service Creation Approach for 3G
    • QIAO Xiuquan,LI Xiaofeng(
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 110-114. DOI:10.13190/jbupt.200506.110.qiaoxq
    • Abstract ( 1042 )     HTML       
    • Based on the analysis of existing 3G (3rd generation mobile communication system) service creation drawbacks, a model driven, automatic service creation approach for 3G through using Model Driven Architecture's viewpoints separation idea was proposed. The constructing methodologies of service requirement analysis model and telecom service domain related meta model were elaborated in detail. This service creation approach provided an innovative telecommunication service development mode. This mode separated service function specification model from concrete open API technologies and implementation technologies, and supported domain model shared. As a result, this approach enhances the abstract level of 3G service development, decreases the technical threshold and shortens the service development cycle. The portability of service function model across different open API technologies and implementation technologies is strengthened. Service development and maintenance cost is reduced.

    • Supplementary Material | Related Articles
    • Software Reliability Analysis of Component Based System
    • KE Yao1,ZHAO Baohua1,2 ,QU Yugui1
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 115-119. DOI:10.13190/jbupt.200506.115.key
    • Abstract ( 1030 )     HTML       
    • Software reliability is an important parameter to evaluate software, and post development evaluating methods are commonly used. Based on the present hierarchical component system reliability model, the relativity between the components in the same level was studied. A fairly applicable and hierarchical component matching software reliability evaluating model was proposed and extended to a common component based software reliability evaluation model. With this model, software reliability can be forecasted during the development process, and can estimate part of the IPv6 protocol stack software's reliability.

    • Supplementary Material | Related Articles
    • An Efficient Quantum Secret Sharing Scheme Based on Bell States
    • GUO Fenzhuo1,2 ,GAO Fei1,WEN Qiaoyan1,ZHU Fuchen3
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 120-122. DOI:10.13190/jbupt.200506.120.guofzh
    • Abstract ( 1080 )     HTML       
    • Drawing idea from the quantum secure direct communication (QSDC), a novel quantum secret sharing (QSS) scheme with high efficiency based on Bell states was proposed. In this scheme, the sender Alice needed no longer share a joint key between her and the two receivers, Bob and Charlie, as well as used the joint key to transmit her message. Alice shared her secret message with Bob and Charlie directly. One Bell state could be used to share two bits message. Investigation showed that the scheme is secure.

    • Supplementary Material | Related Articles
    • Research on Digital Processing Central Module in RFID System
    • MA Yuqiu,SHEN Shuqun,WU Jingsong,LI Guohua
    • Journal of Beijing University of Posts and Telecommunications. 2005, 28(6): 123-127. DOI:10.13190/jbupt.200506.123.mayq
    • Abstract ( 936 )     HTML       
    • Random delay anti-collision algorithm was discussed for digital processing central module in RFID (radio frequency identification) system, and condition of system stability was given based on mathematic analysis. The related research on key technology,data security technology was studied in detail,and a communication system including data encryption and error correction was designed. The research and design of digital processing central module in read/write device were proposed,and the plan for new research and development was drawn up.

    • Supplementary Material | Related Articles