Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • Calibration Standard Design Based on the Microstrip Dual-Port Test
    • LI Xiu-ping, REN Zheng, LI Nan
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 1-5. DOI:10.13190/j.jbupt.2013.05.001
    • Abstract ( 2015 )     HTML       
    • Short、open、load、through (SOLT) and through、reflect、 line (TRL) calibration techniques were described. The 12-term system errors for two-port calibration were shown, and the actual S-parameters device was derived from the measured S-parameters by using matlab programs. Comparison between the matlab programs results and the vector network analyzer measurement data validated the correctness of the calibration approaches and procedures. The SOLT and TRL microstrip calibration standards were designed for microstrip filter measurement.

    • References | Supplementary Material | Related Articles
    • Barrier Coverage Algorithm for Moving Target in Directional Sensor Networks
    • TAO Dan, MAO Xu-fei, WU Hao
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 6-9. DOI:10.13190/j.jbupt.2013.05.002
    • Abstract ( 2086 )     HTML       
    • Strong barrier path construction for directional sensor networks was focused on by optimizing the sensing orientations of directional sensors. The intersection point set and associated intersection point set were defined to describe the relationships between directional sensors and region boundaries. The solution space from continuous domain was reduced. Graph theory was utilized to construct a global barrier graph to model the pending problem, whether the directional sensors' sensing orientations are existed that can form strong barrier. A low-cost solution with the minimal number of directional sensors was designed as well. Simulation testifies the effectiveness of the proposed algorithm.

    • References | Supplementary Material | Related Articles
    • Semantic DHT Overlay Based on Semantic Similarity Hashing Scheme
    • ZHANG Chun-hong, YIN Hang, JI Yang, CHENG Shi-duan
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 10-14. DOI:10.13190/j.jbupt.2013.05.003
    • Abstract ( 1984 )     HTML       
    • Traditional structured peer-to-peer networks especially distributed Hashing table (DHT) only support keyword-based exact search instead of semantic search. Although semantic DHT algorithms can implement semantic search by multi-routing-layers, they usually result in low precision ratio. A semantic similarity Hashing (SSH) scheme, based on standard alpha-stable distribution, was proposed to assign the similar identifiers to the resources with semantic similarity on Chord overlay. Consequently, the resources with semantic similarity could be stored in adjacent nodes of Chord overlay, so as to realize semantic search. Simulation shows that 70% recall ratio and 80% precision ratio are achieved among only 1.07% local nodes on an one-layer topology.

    • References | Supplementary Material | Related Articles
    • Gain and Phase Error Calibration of a Dipole Triad Antenna
    • WANG Gui-bao, TAO Hai-hong, WANG Lan-mei
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 15-18. DOI:10.13190/j.jbupt.2013.05.004
    • Abstract ( 1781 )     HTML       
    • The performance of subspace algorithm which is based on eigenvalue decomposition degrades obviously, when gain and phase errors exist among component antennas of a dipole triad. To calibrate the gain and phase errors, a reference signal with unknown direction of arrival (DOA) is utilized in this paper. Two sets of data collected by the dipole triad before and after rotation around its x-axis are used. The closed-form solution of DOA and gain and phase errors are got by making use of the electromagnetic field ratio and DOA before and after rotation. Finally, the simulation results verify the efficacy of the proposed algorithm.

    • References | Supplementary Material | Related Articles
    • Spatial Sharing Algorithm in mm-Wave WPAN Based on Physical Interference Model
    • CAI Ran, LIU Dan-pu
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 19-24. DOI:10.13190/j.jbupt.2013.05.005
    • Abstract ( 1905 )     HTML       
    • To improve the spatial sharing gain in millimeter-wave wireless personal network (WPAN), an interference-aware beamforming mechanism (IBF) was firstly proposed, and then a maximum coexistence possibility algorithm (MCP) based on physical interference model was presented. With help of interference information obtained using IBF and link coexistence conditions derived under physical interference model, MCP could increase the spatial sharing gain by efficiently and exactly identifying the coexistence link set. Simulations show that the MCP algorithm outperforms the maximum sector number difference (MSND) algorithm based on protocol interference model and the blind algorithm based on physical interference model in terms of spatial sharing gain, and the comparative advantage increases along with the sector number and node number.

    • References | Supplementary Material | Related Articles
    • Doppler Character of the Multi-Beam Receiving Antenna on the Low Earth Orbit Satellites
    • JIANG Quan-jiang, LIU Hui-jie
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 25-29. DOI:10.13190/j.jbupt.2013.05.006
    • Abstract ( 1782 )     HTML       
    • The Doppler character of low-earth orbit satellites, carrying multi-beam receiving antenna, is different from the character of single-beam antenna systems. In order to analyze the Doppler character of each beam, expression of iso-Doppler characteristic curve was derived with help of establishment of vector analysis model. The characteristic curve picture was obtained using computer simulation. Analysis of each receiving multi-beam Doppler character was achieved when combined with the multi-beam coverage calculation. Finally, the preliminary application on the on-board multi-beam captures module was explained and illustrated.

    • References | Supplementary Material | Related Articles
    • Scalable and Self-Synchronizable RFID Ownership Transfer Protocol Based on the Sliding Window Mechanism
    • WANG Xin, YUAN Chao-wei, HUANG Chen
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 30-35. DOI:10.13190/j.jbupt.2013.05.007
    • Abstract ( 1659 )     HTML       
    • Aiming at the conflict of the storage cost, the update frequency in P1 and the de-synchronizing defect in P2, an improved scalable radio frequency identification tag (RFID) ownership transfer protocol-lightweight scalable desynchronizing attack resistant protocol (LSDARP) was proposed. By the mechanism of sliding windows, the scheme only stores the tag's old and new adjacent eigenvalues to reduce the storage cost and avoid search efficiency degeneration when a group of eigenvalues was used out. It can be also re-synchronized when suffering de-synchronizing attacks continuously. Comparative analysis shows that LSDARP performs very well in aspects of the storage cost, computational complexity, backward security, de-synchronizing attack resistant and Tag Killing resistant.

    • References | Supplementary Material | Related Articles
    • Research on Multi-UAV Cooperative Trajectory Planning
    • LIN Lin, SUN Qi-bo, WANG Shang-guang, YANG Fang-chun
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 36-40. DOI:10.13190/j.jbupt.2013.05.008
    • Abstract ( 1997 )     HTML       
    • A path balancing based ant colony optimization approach was presented. At first, in view of coordinated trajectory planning in dynamic and uncertain environments, the congestion factor was adopted to avoid collision between unmanned aerial vehicle (UAVs). Then, for time cooperation, the variable cooperative voyage was used to synchronize the arrival time of each UAV. With these premise of space-time collaborative, the trajectory for UAV fleet with minimum costs was selected. Simulation demonstrates the feasibility and the effectiveness of the proposed approach under complicated environment.

    • References | Supplementary Material | Related Articles
    • MIMO Fixed-Complexity Sphere Decoding with Low-Complexity Channel Matrix Ordering
    • WANG Shi-liang, SUN Song-lin, JING Xiao-jun, HUANG Hai
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 41-45. DOI:10.13190/j.jbupt.2013.05.009
    • Abstract ( 2021 )     HTML       
    • A multiple-input multiple-output fixed-complexity sphere decoder (FSD) with low-complexity channel matrix ordering is proposed based on reliabilities of the minimum mean square error (MMSE) decoder's decision variables. The proposed ordering algorithm first performs MMSE decoding, computes the reliabilities of MMSE decoder's decision variables, and finally orders channel matrix based on the reliabilities. The algorithm not only effectively reduces the complexity of FSD in preprocessing stage, but also overcomes its sequential nature, more suitable for applications. Simulation result shows that the performance loss caused by the low-complexity ordering algorithm is negligible and quasi-maximum likelihood performance can be achieved.

    • References | Supplementary Material | Related Articles
    • Orthogonal Time-Frequency Code and Its Application
    • LIU Bing-chao, LI Dao-ben
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 46-50. DOI:10.13190/j.jbupt.2013.05.010
    • Abstract ( 1705 )     HTML       
    • In order to improve the system capacity and simplify the receiver structure of traditional multi-carrier scenarios, a new orthogonal code called orthogonal time-frequency code was produced. Thereafter, a multi-carrier code division multiple access scheme was proposed. This new scheme employs orthogonal time-frequency code as its address code. It can not only improve the utilization of the codeword, but also can enhance the capacity of system. The frequency diversity gain in frequency selective fading channel can be obtained without coding by employed the Rake receive, that can also complete channel estimation and carrier recovery simultaneously. Simulation is coincided with the analysis.

    • References | Supplementary Material | Related Articles
    • Energy Saving Algorithm for Data Collection of Wireless Sensor Networks in Mobile Sink Environments
    • DING Jie, LIU Dan-pu
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 51-55. DOI:10.13190/j.jbupt.2013.05.011
    • Abstract ( 1994 )     HTML       
    • For data collection in the presence of mobile sink and rendezvous points, a heuristic scheme is proposed jointly considering rendezvous selection, routing from sensors to rendezvous points and mobile sink path scheduling. The graph theory is used to model the network, and the minimum connected dominating set is selected as the initial rendezvous set. The final rendezvous set, the shortest path of mobile sink and the shortest route between sensors and rendezvous points are acquired through iteration procedure. The algorithm can reduce the data transmission from sensor nodes to rendezvous with guarantee of latency, thereby saving energy.

    • References | Supplementary Material | Related Articles
    • Cognitive Radio Autoadaptive Spectrum Sensing Time Allocation Scheme
    • XU Rui-chen, JIANG Ting
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 56-60. DOI:10.13190/j.jbupt.2013.05.012
    • Abstract ( 1768 )     HTML       
    • In order to maximize the spectrum utilization, the optimal transmission time of secondary user is derived according to primary user and secondary user's data transmission characteristics. An auto-adaptive spectrum sensing time allocation scheme based on partially observed Markov decision process (POMDP) was proposed. Execution of the best action based on the energy detection results and the belief state in the last decision slot was decided. Simulation claims that the proposed scheme can maximize spectrum utilization according to different collision probability constrain between primary users and secondary users.

    • References | Supplementary Material | Related Articles
    • A Privacy-Aware Trust Model for Web Service
    • WANG Rui, WEI Xiang-lin, WU Li-fa
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 61-65. DOI:10.13190/j.jbupt.2013.05.013
    • Abstract ( 1709 )     HTML       
    • To fulfill web service's requirements on trust evaluation and privacy protection, a privacy-aware trust model is put forward and a corresponding service selection mechanism is presented. They can help users to select the service providers which can provide better privacy protection besides service quality. In addition, to increase the generality of the proposed model, a kind of method based on correlation for attribute selection and weight measurement is designed which can adapt to different application environments. Finally, through experiments on data from real environment, the effectiveness of the proposed model is validated.

    • References | Supplementary Material | Related Articles
    • Energy-Efficient Joint Beamforming and Power Control for Uplink MU-SIMO Systems
    • WANG Sheng-sen, FENG Chun-yan, GUO Cai-li
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 66-70. DOI:10.13190/j.jbupt.2013.05.014
    • Abstract ( 1848 )     HTML       
    • The energy efficiency (EE) optimization in uplink multi-user single-input multiple-output systems was addressed. The EE optimization model with minimum data rate requirement was first proposed, and the feasibility of model was analyzed. Then a convex approximation and geometric programming based energy-efficient joint beamforming and power control algorithm was developed. The convergence of the algorithm was proved. Simulation shows that the proposed algorithm can significantly improve EE performance and meet data rate requirements.

    • References | Supplementary Material | Related Articles
    • Application of k-Regular and k-Connected Protection Structure in Optical Networks
    • LI Xin, ZHANG Jie, HUANG Shan-guo, ZHAO Yong-li, GU Wan-yi
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 76-80. DOI:10.13190/j.jbupt.2013.05.016
    • Abstract ( 1622 )     HTML       
    • In order to withstand and recover from concurrent multi-link failures in optical networks, a k-regular and k-connected structure based protection mechanism was proposed. Analysis shows that the k-regular and k-connected structure is an optimal protection structure in link-restorable mesh networks under multi-link failures. The linear programming model (ILP) for k-regular and k-connected structure and a construction method for k-regular and k-connected structure design were proposed. Simulations indicate that the spare capacity efficiency of k-regular and k-connected structure can reach the lower bound in static networks, and it can largely improve spare capacity efficiency compared with p-cycles based protection structure without reducing recovery rate under dynamic traffic.

    • References | Supplementary Material | Related Articles

    Reports

    • Hybrid Automatic Extraction Method of Relationships Between Specific Domain Concepts
    • YANG Yue-hua, DU Jun-ping, PING Yuan
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 81-85. DOI:10.13190/j.jbupt.2013.05.017
    • Abstract ( 1772 )     HTML       
    • Aiming at automatic extraction of relationships between domain concepts in ontology construction, a hybrid automatic extraction method is proposed. The relationships existing in domain concepts are classified into two kinds: one is the relationships with unknown types extracted by the extended association rule; the other is the relationships with the known types extracted by extraction rules. Meanwhile, the formation and expansion methods of extraction rules are presented. Experiments demonstrate that the proposed method is feasible and effective. It can not only obtain rich relationships in special domain, but also obtain better performance.

    • References | Supplementary Material | Related Articles
    • Dynamic Trust Model with Multiple Decision Factors in MANET
    • HAN Ting, LUO Shou-shan, XIN Yang, ZHU Hong-liang, LI Zhong-xian
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 86-89,104. DOI:10.13190/j.jbupt.2013.05.018
    • Abstract ( 1852 )     HTML       
    • A dynamic trust model in mobile Ad hoc network (MANET) based on multiple factors decision (MDF-Trust) was proposed. Through quantifying the decision factors of state and behavior of the node, the routing node trust by multiple factors decision theory was evaluated. The deceptive behavior of malicious node was restrained by the trust model when introducing recommendation credibility and recommendation node searching algorithm. Simulation shows that the proposed trust model can reflect the node's trust changes accurately with better dynamic response ability with higher number of packet delivery and lower delay in the circumstance of existing deception nodes.

    • References | Supplementary Material | Related Articles
    • Heterogeneous Propagation Delay of Dynamic Bandwidth Assignment for WDM/TDM EPON
    • SHUAI Qian-jun, ZHU Wei-jia, YAN Jin-yao, LI Jian-zeng
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 90-95. DOI:10.13190/j.jbupt.2013.05.019
    • Abstract ( 1973 )     HTML       
    • Dynamic wavelength and bandwidth assignment algorithm is a key issue for hybrid wavelength division multiplexing and time division multiplexing Ethernet passive optical network (WDM/TDM EPON). The influence of the heterogeneous round trip time of different optical network units (ONUs) was addressed and the problem was mapped as a multiprocessor scheduling problem with release dates. Preemptive shortest propagation delay (SPD)/ longest remaining processing time (LRPT) based scheduling algorithms named HSAⅠ和HSAⅡ in offline framework with the objective of minimizing the cycle length for the given tasks were proposed. Evaluation shows that HSAⅠ achieves shorter cycle length compared with the formal LRPT, SPD and lightweightoptimal wavelength scheduling (algorithm) (LOWSⅠ) algorithms, that is, achieves higher channel utilizations. For long-range PON, HSAⅡ and HSAⅠ achieve much better performances compared with the formal algorithms mentioned above.

    • References | Supplementary Material | Related Articles
    • Anonymous Identity-Based Encryption Scheme in Groups of Prime Order
    • REN Yan-li, ZHANG Xin-peng, QIAN Zhen-xing
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 96-98. DOI:10.13190/j.jbupt.2013.05.020
    • Abstract ( 1632 )     HTML       
    • In order to protect private information of users in the identity-based encryption (IBE) scheme, an anonymous IBE scheme in groups of prime order is proposed using asymmetric bilinear maps. Data security and receiver anonymity are realized. The attacker cannot obtain the receiver's identity from the ciphertext. Based on decisional bilinear Diffie-Hellman (DBDH) assumption, it is adaptive-ID secure without random oracles. The scheme in groups of prime order greatly reduces computational overhead compared with the ones in groups of composite order. The proposed scheme improves security and efficiency of anonymous IBE schemes simultaneously.

    • References | Supplementary Material | Related Articles
    • A Novel DOA Estimation Method in Impulsive Noise
    • DIAO Ming, AN Chun-lian
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 99-104. DOI:10.13190/j.jbupt.2013.05.021
    • Abstract ( 1661 )     HTML       
    • The present direction of arrival (DOA) estimation methods in impulsive noise are mostly based on the fractional lower order statistics, and the computational load is much heavier than the traditional methods based on the second-order moment. Utilizing the property of the impulsive noise, a new DOA estimation method is proposed. Firstly, the reference amplitude of the array receiving data is estimated, which is not influenced by the impulsive noise. Then, the data with amplitude higher than the reference amplitude is normalized. Finally, the common second-order moment method is exploited to estimate the DOAs. Theoretical analysis and simulation results show that the proposed method has small computational load, and is effective in the presence of strong impulsive noise.

    • References | Supplementary Material | Related Articles
    • Algorithm of Dynamic Resource Allocation in Multiple Virtual Business Planes
    • QU Hua, WANG He-nan, ZHAO Ji-hong
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 105-109. DOI:10.13190/j.jbupt.2013.05.022
    • Abstract ( 1819 )     HTML       
    • In order to improve the accuracy and controllability of resource allocation process in multiple virtual planes, a prediction-based adaptive allocation algorithm is proposed. The algorithm used a grey prediction model to predict the resource usage for each virtual node at the next time, and then adaptively distributed and modified the value of resource allocation through the establishment of the mathematical model between the allocation factors and resource utilization, until it could meet the actual demand. For different virtual business plane, the algorithm could set different allocation parameters to control the allocation results so as to meet the different levels of service. Finally, the experiments show that the algorithm can not only implement the process of dynamic resource allocation quickly and accurately, but also meet the distribution of multiple virtual business planes. And in this process, the virtual resource utilization is maintained at a reasonable value near the target.

    • References | Supplementary Material | Related Articles
    • Implementation of the Clock Edge Controllable Dual Edge-Triggered D Flip-Flop Using the Cellular Neural Network
    • LIU Yan-yi, LIU Wen-bo, YUAN Xiao-zheng
    • Journal of Beijing University of Posts and Telecommunications. 2013, 36(5): 110-114. DOI:10.13190/j.jbupt.2013.05.023
    • Abstract ( 1610 )     HTML       
    • A clock edge controllable dual edge-triggered D flip-flop is presented using the cellular neural network (CNN). Based on analysis of the relevance of uncoupled CNN and linear separable boolean function, a fundamental approach to implement logical circuit with uncoupled CNN is described. Implementation of the new D flip-flop circuit also is discussed. Different from traditional D flip-flop, this new method is a reconfigurable component, which can implement the up edge-triggered D flip-flop; the down edge-triggered and the dual edge-triggered respectively only by changing the gene parameters of CNN. Thus, a new method to design the reconfigurable logical circuit is created.

    • References | Supplementary Material | Related Articles