Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • Hypothesis of Full-Cosimc-Scope Universal Interaction Force
    • REN Xiao-min
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 1-5. DOI:10.13190/j.jbupt.2015.04.001
    • Abstract ( 988 )     HTML       
    • Based on the bivergentum theory, the law of universal gravitation is extended to the hypothesis of full-cosmic-scope (FCS) universal interaction force, which involves not only the attractive forces but also the repulsive forces and applies to the microscopic, the meso- scopic and the macroscopic regimes, and the formula of FCS universal interaction force is established. The basic principle is that the wave property of a real physical object with the FCS quantization variable hB as its measure decreases from its maximum (hB=h) to its minimum (hB=hΔ) and correspondingly the particle property of the object increases from its minimum to its maximum when the bivergentum argument Bm of the object varies from 0 to ∞. The main points include ①the law of universal gravitation is rigorously valid for a pair of real physical objects when the particle properties of both objects reach their common upper limit. ②However, in general cases, the property of the universal interaction force (attractive or repulsive) between a pair of real physical objects is related to their FCS quantization variables hB1,hB2 and the distance r between them. ③There exists a critical distance rc related to the spatial extension dimensions S1 and S2 of the two objects' wave functions (determined by hB1 and hB2). The reversal of the property of the universal interaction force happens at the point r=rc, i.e. the force manifests itself as an attractive force when r>rc and as a repulsive force when r<rc. The truthfulness of this hypothesis needs to be tested by experiments. However, once it would be proved, the significance of this advancement might not be ignored. Probably, it might be contributive to the interpretations of relevant physical mechanisms in solid state physics, and might even give a clue to the further evolution of the theory of general relativity.

    • References | Supplementary Material | Related Articles
    • Joint-Detection Algorithm for High Dynamic Doppler in Deep-Space Communications
    • ZHANG Zhao-wei, LIU Hui, ZHANG Hai-lin
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 6-9. DOI:10.13190/j.jbupt.2015.04.002
    • Abstract ( 593 )     HTML       
    • Under low signal-to-noise ratio in deep-space communications, a joint-detection algorithm was developed for the high dynamic Doppler-shift. This algorithm uses three combination periods to narrow the search range, increasing the acquisition probability for Doppler-shift. To obtain the increase of acquisition probability in a closed-form expression, the impact of search range on acquisition probability was studied. Analysis and its simulation show that this algorithm can efficiently increase the acquisition probability and decrease the acquisition bias under the very low signal-to-noise ratio and high dynamic Doppler-shift.

    • References | Supplementary Material | Related Articles
    • An Efficient Fuzzing Test Method for SIP Servers
    • WANG Yu-long, JIN Guo-dong, WANG Yu-jiao
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 10-14. DOI:10.13190/j.jbupt.2015.04.003
    • Abstract ( 622 )     HTML       
    • An efficient fuzzing test method for session initiation protocol (SIP) servers was proposed, compared to the conventional method, the generated number of malformed SIP messages was reduced, good attacking result was produced. It establishes mappings between dangerous library functions and interfaces of the SIP server through static source code analysis. It also obtains a set of malformed SIP messages targeting those dangerous functions. Finally, it optimizes the set of malformed SIP messages by analyzing its attack effects and generating better messages through inheritance and mutation operations, and obtains the set of messages having the most notable attack effects. Experiments are carried out to verify the effectiveness of the proposed method.

    • References | Supplementary Material | Related Articles
    • A Simplified Fix-Complexity Sphere Decoding
    • MAO Xin-yu, FAN Wei-liang, WANG Zhi-jun
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 15-18. DOI:10.13190/j.jbupt.2015.04.004
    • Abstract ( 658 )     HTML       
    • A further simply the calculation complexity of the fixed-complexity sphere decoding (FSD) was proposed for the multiple-input-multiple-output (MIMO) system. By exploiting the channel noise probability distribution, a threshold determined by the upper bound of the symbol error ratio and cumulative distribution function of Chi-squared distribution can be set to cut nodes with larger metrics. Simulation results show that the proposed algorithm drops the complexity efficiently.

    • References | Supplementary Material | Related Articles
    • TOA Estimation based on Normalized Threshold for IR-UWB Systems
    • ZHAI Shuang, QIAN Zhi-hong, WANG Xue, SUN Da-yang
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 19-23. DOI:10.13190/j.jbupt.2015.04.005
    • Abstract ( 679 )     HTML       
    • The impulse radio-ultra wideband (IR-UWB) ranging algorithm based on energy detection is widely applied, improving ranging accuracy turns out to be a key point that draws many researchers' attentions. A new two-step-integral time of arrival (TOA) estimation algorithm based on threshold comparison (TC) was proposed, and the corresponding threshold-setting algorithm was also put forward. The ranging accuracy of the TC algorithm for long integration period is lower than that, for short, the two-step-integral TOA estimation algorithm is built up by one more short integration period detection based on long integration period; according to the functional relation between the optimal normalized threshold and advanced maximum energy sample to mean ratio-TC) (AMMR-TC) is proposed and the optimal normalized threshold is set. Due to the performance of AMMR-TC is worse than maximum to minimum energy sample ratio-TC (MMR-TC) a little in short integration period, a novel AMMR-MEAN-TC algorithm is put forward in the paper by combining the two algorithms above. Simulations indicate that the ranging accuracy had been improved.

    • References | Supplementary Material | Related Articles
    • A Broadcast Authentication System Applied in Controller Area Network
    • WANG Jian, ZHANG Zi-jian, YUAN Jian
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 24-28. DOI:10.13190/j.jbupt.2015.04.006
    • Abstract ( 574 )     HTML       
    • The development of vehicular Ad hoc networks (VANETs) require a secure in-vehicle network. Controller area network (CAN) is a popular protocol applied in in-vehicle network. In order to enhance CAN bus security, abroadcast authentication algorithm, which establishesthe samemessage authentication code(MAC) list among all the electronic control unit (ECUs) with stream ciphers, was proposed. The senderjust needs to attach a MAC sequence to the data frame and the receiver compares the received MAC sequence with the corresponding one in the established list. This algorithm can be adapt to the characteristic ofthe CAN bus communication. The structure of the authentication system was described in detail. Finally,the security and delay performance was analyzed. The probability of miss and the bus overhead was provided.

    • References | Supplementary Material | Related Articles
    • Smartphone Malware Detection Model Based on Artificial Immune System in Cloud Computing
    • WU Bin, LIN Xing, LI Wei-dong, LU Tian-liang, ZHANG Dong-mei
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 34-38. DOI:10.13190/j.jbupt.2015.04.008
    • Abstract ( 989 )     HTML       
    • A smartphone malware detection model based artificial immune system(AIS) on the cloud was proposed. In this model, the extended negative selection algorithm is put forward and the antigens are generated by encoding the malwarecharacteristics. With addition of cloning with higher affinity detector and hyper-mutation, the detectors are generated efficiently. The computing rate is then improved significantly by parallel computing mechanism MapReduce during the feature coding and detector generation. Experimentshows that the detection modelhas a high detection rate and computing rate for unknown smartphone malware.

    • References | Supplementary Material | Related Articles
    • The Physical Security Scheme Based on Generalized Space Shift Keying Modulation
    • LEI Wei-jia, LAN Shun-fu, CHEN Sheng-nan, XIE Xian-zhong
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 39-44. DOI:10.13190/j.jbupt.2015.04.009
    • Abstract ( 650 )     HTML       
    • A physical layer security transmission scheme based on generalized space shift keying modulation for multiple-input single-output system was proposed. The transmitter uses the channel state information feedbacked by the legitimate user to preprocess the transmit signals. So the signals received by the legitimate user from each transmit antenna have the same phase. Furthermore, the transmitter takes a phase rotation to increase the distances among the constellation points, thereby improving the receive performance of the legitimate user and will reduce the error rate. However, the phase of each signal received by the eavesdropper is randomly distributed, so the performance of eavesdropper is significantly inferior to the legitimate user. Analysis and simulation are done for bit error rate of the legitimate user and the eavesdropper. The behavior of secrecy capacity of the system is good. It is shown that the proposed scheme can significantly reduce the legitimate user's bit error rate, even the channel performance of the legitimate user is worse than the eavesdropper, and the secure transmission can be realized.

    • References | Supplementary Material | Related Articles
    • A Multi-Services Group Handover Scheme Under Constraint of Blocking Probability
    • PAN Su, LIU Hao, LIU Sheng-mei
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 45-48. DOI:10.13190/j.jbupt.2015.04.010
    • Abstract ( 678 )     HTML       
    • A multi-services group handover algorithm under constraint of blocking probability was proposed to solve the network congestion problem in multi-services heterogeneous networks. Users are assigned with different handover priorities according to their service types, and the handover is controlled under blocking probability constraints for the users with same priority. The proposed algorithm disperses the users into different slots to avoid large amount of users selecting the same network at the same time. Simulation shows that the proposed algorithm can keep the handover blocking probability of the system manageable and meet the quality of service requirements of different services.

    • References | Supplementary Material | Related Articles
    • Enterprise Wireless Network Power Control with Controllable Fairness Constraint
    • WANG Yue, CHEN Rong-bing, YUAN Jian
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 49-54. DOI:10.13190/j.jbupt.2015.04.011
    • Abstract ( 650 )     HTML       
    • For the characteristics of enterprise wireless network, a method based on controllable fairness constraint was proposed to optimize the process of network power control. The method can set the parameters of the controllable fairness constraint flexibly to reflect the different fairness demand according to the different interference of the nodes, and compromise the network throughput and fairness appropriately. Simulation shows that, compared to maximize overall throughput and max-min fairness criteria, the enterprise wireless network power control algorithm with controllable fairness constraint is more flexible and can adjust power allocation relations more finely between nodes to guarantee the performance of network relatively balanced and fair while interference suppression.

    • References | Supplementary Material | Related Articles
    • Reputation Model for Distributed Collaborate Spectrum Sensing
    • XU Li, HUANG Yi-jie, LIN Hui
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 55-59. DOI:10.13190/j.jbupt.2015.04.012
    • Abstract ( 883 )     HTML       
    • Collaborative spectrum sensing can greatly improve the effect of the spectrum sensing in cognitive radio network. However, it also brings some security risks such as spectrum sensing data falsification (SSDF) attack. To against the successional and discontinuous SSDF attacks launched by the single malicious secondary user and some malicious secondary users, respectively, a reputation model for distributed collaborate spectrum sensing was proposed. Simulation shows that the proposed model can effectively identify the malicious secondary users and resist the SSDF attack. Moreover, it also has lower probability of false alarm detection, lower probability of loss detection, and better fault-tolerant ability.

    • References | Supplementary Material | Related Articles
    • Distributed Algorithm of Access Point Power Adjustment in Dense WLAN
    • SHI Yan, YANG Min
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 60-64. DOI:10.13190/j.jbupt.2015.04.013
    • Abstract ( 523 )     HTML       
    • A dense wireless local area network (WLAN) has the problems of severe interference, high energy consumption and difficulty on network performance optimization. An energy saving algorithm, which features the adaptive power adjustment of access points in a distributed fashion, is proposed. In this algorithm, each access point collects the distribution information about local terminals, and adjusts its transmission power or active handoff under the condition that the lower power can satisfy the service requirements of terminals, especially in non-busy hours. The simulation results show that this algorithm actually takes effect in reducing the energy consumption in dense WLAN.

    • References | Supplementary Material | Related Articles
    • Equivalent Transformation of Non-Elementary Arithmetics in Automatic Test Input Generation
    • LI Feng, HUANG Jun-fei, GONG Yun-zhan
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 65-69. DOI:10.13190/j.jbupt.2015.04.014
    • Abstract ( 592 )     HTML       
    • Non-elementary arithmetics accounts for 23% in all numerical calculations in C projects. To solve non-elementary arithmetics is inefficient in fact when search technology is used for test input generation. Because the non-elementary arithmetics does not have corresponding interval arithmetic rules to improve the search efficiency. amethod of equivalent transformation was proposed to decompose non-elementary arithmetics into elementary arithmetics. The interval arithmetic of elementary arithmetics can be used thereafter. Experimentsshowthat the test cases of non-elementary arithmetics can be effectivelygenerated by the proposed method.

    • References | Supplementary Material | Related Articles
    • Proportional Fairness-guaranteed Energy-efficient Resource Allocation for MIMO-OFDM Systems
    • XU Gui-xian, MA Wei-guo, REN Yu-wei
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 70-75. DOI:10.13190/j.jbupt.2015.04.015
    • Abstract ( 901 )     HTML       
    • An energy efficient resource allocation algorithm for downlink multiple-input-multiple-output orthogonal frequency division multiple (MIMO-OFDM) system was proposed to implement the energy efficiency (EE) maximization, satisfying total power constraint as well as the proportional rate constraints. In order to reduce the computational complexity, a two-step subcarrier assignment and power allocation scheme was proposed to derive the suboptimal solution of the optimization problem. The estimated energy-efficient transmit power is obtained under assumption of flat fading and subcarrier sharing. The equal-power allocation-based method was adopted to carry out subcarrier assignment. Furthermore, the optimal energy-efficient power allocation was derived according to the result of the first-step subcarrier assignment. Simulations show that the proposed algorithm brings remarkable gains on energy efficiency and guarantees proportional fairness of the users.

    • References | Supplementary Material | Related Articles
    • A MDP-based Group Delay Constrained Random Medium Access Control Algorithm in IEEE 802.15.4
    • HUANG Yu-lan, LIU Jian, LIU Zi-chuan, CHI Xue-fen
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 76-80. DOI:10.13190/j.jbupt.2015.04.016
    • Abstract ( 719 )     HTML       
    • To guarantee the transmission time constraints of group delay constrained services, a group delay constrained random medium access control algorithm for IEEE 802.15.4 was proposed based on Markov decision process (MDP). Different from the existing researches, the delay experienced by a group of packets instead of one single packet in a group was paid attentions. Also, the group delay constraints was used as quality of service indicators for the first time. In the algorithm, the medium access control layer parameters and decision threshold are estimated dynamically, and the optimal policy is used as a trade-off between the highest immediate rewards in the present and a possibly higher reward in the future. With the proposed algorithm, the terminal device will choose the best transmission strategy to overcome the channel congestion resulting from burst data. Simulation results show the efficiency of the proposed algorithm when the traffic load becomes heavy.

    • References | Supplementary Material | Related Articles
    • A Modified l0_LMS Algorithm and Its Performance Analysis
    • GUAN Si-hai, LI Zhi
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 81-85. DOI:10.13190/j.jbupt.2015.04.017
    • Abstract ( 697 )     HTML       
    • A new variable step-size l0_least mean square (LMS) algorithm is proposed. A step size control method and the zero attraction items reweight method based on correlation function value of the error to increase the convergence speed, and reduce the steady-state misalignment. The anti-noise performance, convergence, tracking steady state error and misadjustment of this algorithm are discussed in theoretical analysis. Finally, the algorithm is compared with l0_LMS and Il0_LMS in different signal-to-noise ratio. Theoretical analysis combined with experimental simulation conclusion: the algorithm can achieve better tracking speed, lower steady state error and anti-noise performance.

    • References | Supplementary Material | Related Articles

    Reports

    • Video-Frame Insertion and Deletion Detection Based on Consistency of Quotients of MSSIM
    • ZHANG Zhen-zhen, HOU Jian-jun, LI Zhao-hong, GUO Sheng
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 86-90. DOI:10.13190/j.jbupt.2015.04.018
    • Abstract ( 925 )     HTML       
    • Frame insertion and deletion are common types of inter-frame forgeries in digital videos. In this article, an efficient method based on consistency of quotients of mean of structural similarity (MSSIM) was proposed. For a continuous shooting video, due to the continuity of video content, the quotient of MSSIM between consecutive frames is continuous. While for a video which has been tampered by inserting a certain number of frames from another video or deleting a certain number of frames, at the tamper point, the quotient of MSSIM becomes rather low, the continuity will be broken. According to the phenomena, MSSIM between every two adjacent frames iscalculated firstly. Then distinguishing feature is obtained by calculating the quotients between every two sequential MSSIMs. At last, insertion and deletion detection and localization can be achieved by using Tchebycheff inequality twice followed by decision-thresholding. Experiments show that the proposed method has high detection accuracy against both frame insertion and deletion.

    • References | Supplementary Material | Related Articles
    • Client Context-Aware Prediction of QoS for Web Services
    • MA Hua, HU Zhi-gang
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 91-98. DOI:10.13190/j.jbupt.2015.04.019
    • Abstract ( 485 )     HTML       
    • Since the Web services with similar functions are published into Internet, quality of service (QoS) has played an important role in services selection. The identifying client context features between different users is helpful to predict QoS accurately. However, these context features affecting the experience quality of user have not been analyzed systematically in current studies. A client context-aware prediction approach of QoS for Web services was proposed, in which the client context features, including geographical location, network location, and device were analyzed quantitatively. The fuzzy analytic hierarchy process method was applied to calculate context similarity between current user and history users. From that, the similarity weights fusion method was employed to predict the QoS, integrating the collaborative filtering technology. Experiment analysis indicates that this approach can solve the new user problem and improve the accuracy of QoS prediction of Web services effectively.

    • References | Supplementary Material | Related Articles
    • Study on the Quantification Problems for Polar Code with Successive Cancellation Decoder
    • FAN Ting-ting, YANG Wei, XU Chang-long
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 99-104. DOI:10.13190/j.jbupt.2015.04.020
    • Abstract ( 593 )     HTML       
    • In order to apply decoding algorithms of polar code in digital chips with low hardware complexity, the quantification problems on the received signals after channel transmission and the initial log likelihood ratios (LLR) of successive cancellation (SC) decoder were studied. The quantized interval and quantization accuracy for the received signals on system bit error rate (BER) performance were analyzed. For the quantization of initial LLR, both uniform and non-uniform quantization which contain two methods named normalizing quantization and decimal quantization were applied. Simulations show that 6 bit uniform quantization on interval [-4 4] and [-20 20] for received signals and initial LLR respectively can both bring BER performance loss less than 0.1 dB, but with hardware implementation complexity decreased significantly.

    • References | Supplementary Material | Related Articles
    • Continuous Sensing Information Based Generalized Framework in Cognitive Radio
    • CHEN Zhong, ZHANG Xian-da, DING Guo-ru
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 105-109. DOI:10.13190/j.jbupt.2015.04.021
    • Abstract ( 630 )     HTML       
    • In cognitive radio, restricted by the conventional concept of spectrum sensing and power allocation, the spectrum utilization and channel rate are both small. Conventional cognitive radio framework was analyzed. A continuous sensing information based generalized framework was proposed, where after obtaining the sensing information, the secondary user won't make decision on the presence of the primary user but directly decide the power allocation parameters under the power constraints. Cases of continuous and multiple-level power allocation rules were modeled and treated separately. It is shown that the proposed framework provides the upper bound of the theoretical capacity and the conventional architectures are its special cases.

    • References | Supplementary Material | Related Articles
    • Computer Network Vulnerability Assessment Based on Bayesian Attribute Network
    • WANG Xiu-juan, SUN Bo, LIAO Yan-wen, XIANG Cong-bin
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 110-116. DOI:10.13190/j.jbupt.2015.04.022
    • Abstract ( 618 )     HTML       
    • For assessing the vulnerability of computer network accurately and comprehensively, the problem of attack loops, the state explosion and analyzing qualitatively were researched. The method of converting attribute attack graph to the Bayesian network and the new loop elimination algorithm was also proposed. By using these two algorithms, a new Bayesian attribute attack graph model was build. The formula of assessing indicators was derived by Bayesian formula. The data of common vulnerability scoring system was used to compute the probability of attribute nodes and indicators to conduct network vulnerability assessment. Experiments analysis proves the feasibility and effectiveness of the model. Compared with other methods of vulnerability assessment, this model has simple calculation which is suitable for dynamic quantitative assessment.

    • References | Supplementary Material | Related Articles
    • New Space-Time Coded Transmission Scheme for MIMO Interference Channel
    • TIAN Xin-ji, ZHAO Hong-tu, ZHAO Wen-tao
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 117-121. DOI:10.13190/j.jbupt.2015.04.023
    • Abstract ( 1238 )     HTML       
    • New space-time coded transmission scheme was proposed for multiple input multiple output (MIMO) interference channel with three users. Rate-2 space-time codeword was designed for every user. The unwanted codeword for the last two receivers is aligned through interference alignment pre-coding, and then is eliminated through non-linear operations on the received signals. The unwanted codeword for the first receiver is canceled through unidirectional operational link and non-linear operations. Compared with the existing scheme for the same scene, the proposed scheme improves the transmission efficiency, while keeping the same diversity gain. Simulation shows that, with the same transmission rate, the proposed scheme outperforms the existing scheme.

    • References | Supplementary Material | Related Articles
    • Optimal Energy Consumption of Wireless Ad Hoc Network Using GRASP with Path Relinks
    • PENG Hai-yun, HOU Yan
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 122-127. DOI:10.13190/j.jbupt.2015.04.024
    • Abstract ( 667 )     HTML       
    • For problem of power and fault tolerance in wireless ad hoc networks, a greedy randomized adaptive search procedure (GRASP) heuristic algorithm based on the path re-linking was proposed. The algorithm sets up communication path between two communicating nodes is two at least by constructing two dual-connected graphs, so as to improve the ability of fault tolerance. On the basis of dual-network connectivity, the optimal value of power distribution can be obtained by controlling power to conduct local search operation. Therefore, the purpose to optimize energy consumption of the entire network can be realized. Simulations on the asymmetrical test randomly generated problems show that the proposed algorithm has reduced the total energy consumption with 37.85%, 5.39% respectively on Euclidean instance and 74.63%, 3.15% respectively on random instance comparing with MST-aug algorithm and greedy algorithm. It reduces edges interference and nodes interference, which indicates that it is suitable to be applied into wireless ad hoc networks with high requirements of fault tolerance.

    • References | Supplementary Material | Related Articles
    • SaW-Utility: a Spray and Wait Routing Protocol Based on the Utility of Nodes in DTN
    • WANG Hui-qiang, ZHU Jin-mei, FENG Guang-sheng, LÜ Hong-wu
    • Journal of Beijing University of Posts and Telecommunications. 2015, 38(4): 128-132. DOI:10.13190/j.jbupt.2015.04.025
    • Abstract ( 1022 )     HTML       
    • Spray and wait (SaW) routing protocols select relay node arbitrarily in message forwarding process. Aiming at the arbitrariness, a new routing protocol, SaW-Utility, is proposed based on the utility of nodes. When messages are forwarded, SaW-Utility selects relay nodes according to the utility of nodes, such as the sizes of remaining buffer, success rate of message delivery, and etc., so that the arbitrariness can be overcome. The simulation results show that the proposed routing protocol significantly improves the success rate of message forwarding and reduces network overhead compared with SaW routing protocols.

    • References | Supplementary Material | Related Articles