Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • A New Method for Blind Image Steganalysis
    • JIANG Nan,WANG Jian,YANG Yixian
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 1-4. DOI:10.13190/jbupt.200602.1.jiangn
    • Abstract ( 1070 )     HTML       
    • Image quality metrics have two inputs: the original image and the stego image. Whereas blind image steganalysis only has one input: the stego image. In order to fit blind image steganalysis, the image quality metrics must be altered: the original images are replaced by white images. Using four image quality metrics, the distance between stego images and white images can be obtained. Regarding the distance as eigenvectors and using SVM (support vector machine) to classify them into two classes: one includes hidden information, the other one doesn't. Bandpass filter property of human visual system is used to improve correct detection rate. Experiments show that this method is effective to nature images.
    • References | Supplementary Material | Related Articles
    • An Approach to Link Utilization Measurement Based on Per Hop Time Stamp
    • CUI Yidong,LIN Yu,XU Yajing, XU Huimin
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 5-9. DOI:10.13190/jbupt.200602.5.cuiyd
    • Abstract ( 1070 )     HTML       
    • An approach to link utilization measurement was proposed: The source sends probe packets which have the time stamp options being set. The current router time is recorded in the packets. Since the packet processing delay, propagation delay and the impaction of the router clock skew greatly affect the probing results, the probing results are processed with the link utilization statistic (LUS) algorithm and the queuing delay of each probing packet is therefore obtained. When quantized and smoothed with the slide window, the queuing delay is finally transformed into link utilization. This approach is verified through simulation.
    • References | Supplementary Material | Related Articles
    • The Analysis of Multicast Blocking Probability in WDM Network
    • JIA Peng, GUI Xuan, WANG Xueyan, GU Wanyi
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 10-13. DOI:10.13190/jbupt.200602.10.133
    • Abstract ( 1051 )     HTML       
    • A theory model, based on the inclusion-exclusion principle from combinatorics, was built to analyze the multicast blocking probability in WDM (wavelength division multiplexing) network. In order to correct the departure of calculation result by the theory, a correctional function was introduced to modify the model. Analysis result of the corrected model shows more exact with the simulation. The algorithm complexity of our model will become deduced but the flexibility relatively increased.

    • References | Supplementary Material | Related Articles
    • Word-Oriented Memorable Logics in Stream Cipher Design
    • ZHANG Yu an,FENG Deng guo
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 14-17. DOI:10.13190/jbupt.200602.14.zhangya
    • Abstract ( 988 )     HTML       
    • By classification of the models of combiners with memory, a new type of such memorable logic, the combination of addition and blender, was proposed and its advantage was presented. Such a type of memorable logic could be popularised to word oriented operations and widely be used. The essential demand and rules for the design of word oriented combiners with memory were briefly discussed. A detail ed example which is byte-oriented was presented and the usual ways of applicati on was exemplified.
    • References | Supplementary Material | Related Articles
    • Realizing English Text Classification with Semantic Set Index Method
    • Lv Lin,LIU Yushu,LIU Yan
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 18-21. DOI:10.13190/jbupt.200602.18.lül
    • Abstract ( 1476 )     HTML       
    • To overcome the limitations of actual text classification methods based on bag-of-words representation, An English text classification method based on semantic set index is presented from the WordNet thesaurus and LSI (latent semantic indexing) model. At the initial stages of text classification, the method first constructs semantic thesaurus database by WordNet and replaces bag-of-words with bag-of-semantic sets as an element of the text feature vector. Then LSI model will be used to further mine the deep-seated relations among concepts represented by semantic sets. It effectively incorporates linguistic knowledge and conceptual index into text vector space representation. The experimental results aiming at Na-ve Bayes and simple vector distance text classification methods show that the accuracy rates of the two classification methods are gradually improved along with more and more in-depth semantic analysis, fully indicating that semantic mining is very important and necessary to text classification.
    • References | Supplementary Material | Related Articles
    • Multi-Certification Signature Scheme and Its Application to Cross-Certification
    • SHI Wei-min, NIU Xin-xin, YANG Yi-xian
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 22-25. DOI:10.13190/jbupt.200602.22.shiwm
    • Abstract ( 1161 )     HTML       
    • A verifier verifies only both signer's signature using self-certified signatures, but it verifies over two certifications to certification chain in cross-certification, it can't be satisfied with demand in actual application. To the above problem, a new digital signature scheme called multi-certification signature was proposed. The method extents self-certified signatures and verifies three certifications once and extents more multi-certification signature which can verifies multi-signatures once.
    • References | Supplementary Material | Related Articles
    • Dynamic Traffic Grooming Policies in WDM Mesh Optical Networks
    • HUANG Shan-guo, LUO Pei, BO Ming-xia, GU Wan-yi
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 26-29. DOI:10.13190/jbupt.200602.26.huangshg
    • Abstract ( 1111 )     HTML       
    • The traffic grooming problem in wavelength division multiplexing(WDM) mesh optical networks was investigated. Two dynamic traffic grooming algorithms using the fixed alternate routing (FAR) were proposed. The average block probability could be reduced by pre-balancing the traffic in the network, and lower time complexity could be acquired simultaneously with the algorithms. The simulation results show that the network performance can be improved significantly by these algorithms.
    • References | Supplementary Material | Related Articles
    • A Low Complexity Iterative Multiuser Detection Algorithm for High Dimension Modulation System
    • SUN Yu-hao,ZHANG Qing-rong,WANG Gang,LI Dao-ben
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 30-33. DOI:10.13190/jbupt.200602.30.sunyh
    • Abstract ( 1273 )     HTML       
    • A low complexity iterative receiver algorithm was proposed for high dimension modulation system. This algorithm consists of two steps: the first step is zero forcing multiuser detection (MUD) algorithm. The second is performed by a soft-input soft-output (SISO) multiuser detector and a bank of SISO channel decoders through an iterative process. The SISO multiuser detector adopts a novel soft interface cancellation method based on a linear minimum mean-squared error (LMMSE) filter. It makes the detector overcome the limitation of binary phase shift keying (BPSK) while the complexity is polynomial in terms of codes to be detected in the system. Simulation results show that, the performance of the proposed iterative receiver can approach that of a single code system with maximal likelihood detection (MLD) only after two iterations.
    • References | Supplementary Material | Related Articles
    • Planning Method of Software Quality Assurance
    • ZHANG Jun-guang,Lv Ting-jie
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 42-45. DOI:10.13190/jbupt.200602.42.zhangjg
    • Abstract ( 989 )     HTML       
    • To improve the implementation effect of software quality assurance (SQA)and to ensure the successful of software projects, a quantitative and systemic method of quality assurance planning was studied when combined with some actual project cases. By collection and statistics of historical data, and also by the analysis of software complexity, the ratio of quality assurance effort to total effort of the project could be obtained. On base of the result, we provided software organizations with a good method on how to decide the effort of SQA. In addition, by such activities as participating in project planning, choosing SQA tasks and reviewing the SQA plan, we provided the process improvement of software organizations with a set of feasible methods on making software quality assurance plan. The actual data indicates that this method could ensure the effective planning of SQA.
    • References | Supplementary Material | Related Articles
    • Bank Check Binarization with Signal Matching
    • ZHANG Hong-gang, CHEN Guang, LIU Gang, GUO Jun
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 46-49. DOI:10.13190/jbupt.200602.46.zhanghg
    • Abstract ( 954 )     HTML       
    • A method based on signal matching to binarize low signal-noise rate image was proposed. The information from image interference of both complex background and seal noise could be extracted. Making full use of the prior knowledge, the image projection function under ideal condition would be obtained. By using this signal to match the projection functions binarized by different thresholds, the optimum threshold was in fact the threshold which projection function match best. This method is more self-adaptive and robust than other traditional methods. Through experiments, when compared with other algorithms, satisfactory results were got.
    • References | Supplementary Material | Related Articles
    • Telecommunication Service MetaModeling Based on MDA
    • LI Yan ,LI Xiao-feng, QIAO Xiu-quan
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 50-54. DOI:10.13190/jbupt.200602.50.liy
    • Abstract ( 1128 )     HTML       
    • To introduce MDA (model driven architecture) to the telecommunication domain, an effective strategy to create telecommunication services based on MDA was presented, then, it focused on telecommunication service meta-modeling, one of the key points of the strategy, two approaches, MOF (meta object facility) and UML profile were mentioned; Lately, it described the detailed steps to establish the meta-model with UML profile mechanism; Also, an implementation of message service meta-model was taken as the example.
    • References | Supplementary Material | Related Articles
    • An Optimization Method for Spanning Tree Aggregation in Hierarchical Networks
    • LEI Lei,ZHANG Chun-huan,JI Yue-feng
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 55-58. DOI:10.13190/jbupt.200602.55.leil
    • Abstract ( 909 )     HTML       
    • An optimization method for spanning tree aggregation in hierarchical networks was proposed. And an approximation algorithm was presented. With them, the distortion of additive QoS (quality of service) parameters caused by spanning tree aggregation could be minimized without increasing the space complexity of aggregated topology. Simulation results show that the proposed algorithm can greatly reduce the routing decision errors of the source nodes due to inaccurate topology information,and improve network performance.
    • References | Supplementary Material | Related Articles
    • Measure Model of Security Risk Based on Utility
    • PENG Jun-hao,XU Guo-ai,YANG Yi-xian,TANG Yong-li
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 59-61. DOI:10.13190/jbupt.200602.59.pengjh
    • Abstract ( 1338 )     HTML       
    • Utility function was introduced into security risk area, and its inverse function is used to define absolute loss effect and relative loss effect as measure of risk. They are used to build criteria of risk rank. Absolute loss effect can measure the difference of risk between security incidents with high loss,low probability and security incidents with low loss,high probability. Relative loss effect can measure the difference of risk tolerance among organizations with different scale, but the average loss used very often can't measure these differences.
    • References | Supplementary Material | Related Articles
    • Non-Cooperative Game Analysis of Internet Backbone Interconnection
    • NING Lian-ju, YANG Qing-feng, SHI Wen-hua, Lv Ting-jie
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 62-64. DOI:10.13190/jbupt.200602.62.132
    • Abstract ( 1136 )     HTML       
    • To analyze behavior of two Internet backbone provider(IBP) in the course of interconnection, a non-cooperative game model to analyze the interconnection decision between two IBP was developed. The conclusions show that the rational behaviors of the providers accord with the government when the market structure is relative symmetric, but when the market structure is extremely asymmetric the providers' behaviors are contrary to expectations of the government. The government forced interconnection between the providers; on the other hand, more importantly, the government should encourage interconnection between weak IBP or ISP in order to reduce asymmetry of market. It makes the behaviors of the providers accord with the expectations of the government and the consumers, only in this situation, the interconnection problem can be solved fundamentally.

    • References | Supplementary Material | Related Articles
    • A Random Walk Model to Analyze the Costs of Hierarchical Mobile IP
    • LIU Yu, WANG Yu-mei, DENG Hui
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 65-69. DOI:10.13190/jbupt.200602.65.liuy
    • Abstract ( 1274 )     HTML       
    • Three hierarchical mobile IP (Internet protocol) schemes to improve the handoff performance of mobile IP, i.e. hierarchical mobile IP, distributed and dynamic hierarchical mobile IP and chained foreign agent hierarchical mobile IP were introduced. An analysis model based on onedimensional random walk model was also proposed to derive the signaling transmission cost, the packet delivery cost and the total handoff cost of the three schemes. The performances of the three schemes were compared in detail based on the model, and the effects of different home handoff thresholds on the costs were discussed. Numerical results show that the chained foreign agent hierarchical mobile IP scheme outperforms the other two under small home handoff threshold.

    • References | Supplementary Material | Related Articles
    • A Fair Queueing Scheduling Algorithm for Multi-Channel Based on Signal
    • WANG Bin, CHEN Bin, ZHANG Xiao-dong, DING We
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 70-73. DOI:10.13190/jbupt.200602.70.wangb
    • Abstract ( 1175 )     HTML       
    • A SD-PRPS (distributed packet by packet rate proportional server for K channels based on signal) scheduling algorithm was proposed. It could load the input flow over the multiple channels averagely. It was proved that the scheme can provide end to end delay to conformant traffic as packet-based generalized processor sharing(PGPS) and PRPS. The performance of SD-PRPS was studied using simulations and compared to worst-case fair weighted fair queueing (WF2Q). The simulations show that the delay performance of SD-PRPS is better than WF2Q with decreasing flow rate.
    • References | Supplementary Material | Related Articles
    • The Analysis of Strain Distributions in Quantum Dot Structures Using an Analytical Approach
    • FENG Qiang, YU Zhong-yuan, LIU Yu-min, YANG Hong-bo, HUANG Yong-zhen
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 74-77. DOI:10.13190/jbupt.200602.74.131
    • Abstract ( 1019 )     HTML       
    • An analytical method based on Green's function for calculating strain filed in quantum dot structures of arbitrary shape was presented. The method involves the evaluation of a surface integral over the boundary of the quantum dot. The strain distributions for some shapes as pyramid and cone were discussed. Compare to the element method, our method is more straightforward and faster to implement, and it is also particularly well suited as an input step in calculation of the electronic properties of quantum dots.
    • References | Supplementary Material | Related Articles

    Reports

    • Investigation on Adjacent Cell Interference Cancellation in Forward Link of TDD-CDMA System
    • YAN Fa-jun, SUN Guang-yong, WANG Wen-bo
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 78-8. DOI:10.13190/jbupt.200602.78.130
    • Abstract ( 1124 )     HTML       
    • Investigated on adjacent cell interference, an interference cancellation scheme was proposed. The method combines serial interference cancellation (SIC) and joint detection (JD). In the forward link of time division duplex-code division multiple access (TDD-CDMA) system, the basic sequence of severe interfering users of adjacent cell were judged firstly, then the channel impulse responses were estimated and the spread code of such users were judged. Afterwards, the strong adjacent cell interference (ACI) was cancelled using SIC, multiple access interference (MAI), inter symbol interference (ISI) and the residual ACI are eliminated by JD. Simulation results show that this scheme cancel ACI of forward link efficiently.
    • References | Supplementary Material | Related Articles
    • A Congestion and Rate Control Scheme Based on Directed Diffusion in Wireless Sensor Networks
    • LIU Li-feng,ZOU Shi-hong, ZHANG Lei,CHENG Shi-duan
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 90-93. DOI:10.13190/jbupt.200602.90.liulf
    • Abstract ( 1098 )     HTML       
    • A congestion and rate control scheme based on directed diffusion (CRDD) was presented, which comprises two mechanisms: congestion control when congestion occurs and rate adjustment when congestion disappears. The congestion control was achieved by congested node to feedback congestion notification massage hop-by-hop, while the rate adjustment was achieved by sink to refresh rate adjustment message periodically. CRDD can not only mitigate congestion rapidly, but also adjust sensor's rate to reduce network energy consumption.
    • References | Supplementary Material | Related Articles
    • Optimal Path Selection and Algorithm for S-Rake in Dense Multipath Channels
    • WANG De-qiang, LIU Dan-pu, YUE Guang-xin
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 98-101. DOI:10.13190/jbupt.200602.98.129
    • Abstract ( 1173 )     HTML       
    • The path selection issue for S-Rake (selective Rake) in quasi-static dense multipath channels with inter-path interference is investigated. The bit error probability is taken as the objective cost function. After some theoretic derivation, the path selection issue is converted into a constrained optimization problem conditioned on the number of path employed in S-Rake. The optimal path selection criterion is presented and a suboptimal algorithm is proposed. The numerical simulations indicate that, in quasi-static dense multi-path channels with inter-path interference, the proposed path selection algorithm outperforms the conventional algorithm based on instantaneous signal to noise ratio ordering.
    • References | Supplementary Material | Related Articles
    • A Channel Estimation Method Employing Chebyshev Polynomials
    • ZHANG Qing-rong, LIAO Han-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 102-105. DOI:10.13190/jbupt.200602.102.zhangjg
    • Abstract ( 1173 )     HTML       
    • The time-division multiplexing pilot-assisted channel estimation method was studied in the Rayleigh fading channel. A channel estimation method was proposed by employing the Chebyshev polynomial as the interpolation polynomial. The relationship between the mobile velocity and the order of interpolation polynomials was given. The simulation results show that the method can estimate the fast fading channel, and the channel parameters of the data can be estimated effectively. By using this estimation method, the system's BER performance, compared with linear interpolation method, can be improved distinctly.
    • Supplementary Material | Related Articles
    • Adaptive MPSK Sub-Carriers Modulation for OFDM System over Fading Channel
    • HE Bo, LI Jun, LIN Jia-ru
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 106-109. DOI:10.13190/jbupt.200602.106.heb
    • Abstract ( 1189 )     HTML       
    • An adaptive modulation algorithm, minimizing the average BER(bit error rate)while maintaining constant power and throughput in OFDM(orthogonal frequency division multiplexing)system, exploiting the instant prediction estimation channel states information was proposed. According to the simulated results the proposed algorithm could work successfully as well as the optimal bits loading algorithm, while complexity is much lower than the latter, and it is about 5dB superior to the fixed bits loading algorithm at 10-1 BER under fading channel.
    • References | Supplementary Material | Related Articles
    • Investigation on Simulation-Number in AWGN Channel
    • LIANG Dong,LIN Jia-ru
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 110-113. DOI:10.13190/jbupt.200602.110.liangd
    • Abstract ( 1174 )     HTML       
    • Investigations on principle of Monte Carlo simulation was made when considering characteristics of AWGN (additive white Gaussian noise) channel and the affects of three suitable parameters: error number, confidence probability and max relative error of simulation result. And common conclusion was reached: error number would present direct ratio to square of confidence upper limit, on the other hand, inverse ratio to square of max relative error. The result of computer simulation demonstrates that the conclusion is effective under conditions of AWGN channel. Under conditions of fading multipath channel, if some techniques such as OFDM (orthogonal frequency division multiplexing), diversity, equalization, and interleaving were used to turn channel into AWGN channel, the conclusion will be also effective.
    • References | Supplementary Material | Related Articles
    • Investigation on MCS Selection Mechanisms in TDD-HSDPA/SA System
    • LI Yong, DU Jiu-hui,WANG Wen-bo
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 114-117. DOI:10.13190/jbupt.200602.114.liy
    • Abstract ( 1035 )     HTML       
    • Relations of signal-to-noise ratio between pilot channel and traffic channel in TDD-HSDPA/SA (time division duplex-high speed downlink packet access/smart antenna) system was analyzed when smart antenna character was taken into account. Several improved MCS (modulation coding scheme) selection schemes for TDD-HSDPA/SA system based on slot scheduling were presented. In the improved schemes, MCS selection is performed based on pilot channel condition, with additional prediction according to different antenna types, or, in combination with traffic channel condition. A dynamic system level simulator was designed to analyze performance such as system throughput and residual block error ratio for each scheme. The simulation indicates that the improved mechanisms increase system throughput considerably while maintaining desired residual block error ratio.
    • References | Supplementary Material | Related Articles
    • An IDS-Supported Architecture of Information Capture for High-Speed Networks
    • ZHANG Zhao-xin, FANG Bin-xing, HU Ming-zeng
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 118-122. DOI:10.13190/jbupt.200602.118.zhangzhx
    • Abstract ( 996 )     HTML       
    • The architecture of information capture for the high-speed network environment was proposed. The different network bandwidth adaptive problem was well solved by the extensible network detection model. It has been found that real-time data stream capture from high-bandwidth networks, high-performance multi-thread TCP/IP (transmission control protocol/Internet protocol) protocol stack, and protocol analysis platform based on PLUGINs have captured and assembled the information wonderfully. The architecture integrated these technologies effectively will solve the problems such as the large-scale detection, high-speed data stream, ensuring the in-time, security and veracity of the information on multi-road and high-speed networks.
    • References | Supplementary Material | Related Articles
    • Semantic Extraction of Video Keyframe Using Support Vector Machines
    • CAO Jian-rong, CAI An-ni
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 123-126. DOI:10.13190/jbupt.200602.123.caojr
    • Abstract ( 884 )     HTML       
    • A multi-class support vector machine (SVM) is used to classify the video key frames of scenery documentary. The color histogram features and MPEG (Moring Picture Expert Group)-7 edge histogram features from the video key frames of scenery documentary are combined to classify the key frame in SVM in order to obtain the semantics of the key frames. The performances of SVMs with difference kernel functions have been tested and compared. The precision of classification of SVM with polynormal and radial basis function will be about 3% higher than that of other kernel function.
    • References | Supplementary Material | Related Articles
    • Research on Mobile Telephone Tariff Mechanisms
    • LUO Yi, XIN Zhan-hong
    • Journal of Beijing University of Posts and Telecommunications. 2006, 29(2): 127-130. DOI:10.13190/jbupt.200602.127.luoy
    • Abstract ( 1029 )     HTML       
    • Setting up the mathematic models of the effective traffics and the operators' income under different tariff mechanisms based on the theory of economics and consumer behaviors, how the price level and the income settlement cost influent the choice of tariff mechanisms was analyzed. The study finds out that there is a break-even point of the price by which the dominant relationship between BPP (both parties pays) and CPP (calling party pays) being exchanged, and the range of the price within which CPP dominating BPP is shrunken because of existing the income settlement cost under CPP. A demonstration shows that the average price level of the cellular mobile telephone in China is still above the break-even point at the end of 2005, so it should be very cautious to transfer BPP to CPP in China.
    • References | Supplementary Material | Related Articles