Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • SUMMARIZATION

    • An Overview on Software Non-Functional Properties Research
    • YAN G Fang-chun, LON G Xiang-ming
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 1-12.
    • Abstract ( 311 )     HTML       
    • A key role in guaranteeing the quality of a software system is played by the software non-functional properties. As so, the research development as well as its significance on the software non-functional properties was analyzed. The advantages we mentioned above were prominent in six aspects: software non-functional requirement description; design and analysis; implementation mechanism; software architecture; software development process; and software quality evaluation. On the other hand, some disadvantage of the existed research was discussed either, such as inconsistent definition of non-functional properties; insufficient refinement repository; and deficiency of a complete developing process. In the final of the report, it is pointed out that the research on software non-functional properties is of promise.
    • References | Supplementary Material | Related Articles

    PAPERS

    • A Reliable Multicast Transport Protocol for Mobile Environment
    • FAN Rui, CHENG Shi-duan
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 13-17.
    • Abstract ( 205 )     HTML       
    • An adaptive algorithm for reliable multicast in mobile cellular networks was proposed, with which, the information between the base stations and their neighborhoods was exchanged through a dedicated multicast group to control the amount of packets stored in their buffers. The number of base stations in multicast group for control was adjusted according to structure of the mobile network and the moving velocity of mobile hosts. The cooperation of neighborhoods base stations ensures that data packets could be reliably received by the mobile hosts in a multicast group. In the meantime, buffer capacities of base stations were saved. Simulation shows that the algorithm recovers the lost packets quickly with smaller buffers in the base stations. It concludes itself an effective mobile reliable multicast protocol.
    • References | Supplementary Material | Related Articles
    • Analysis on the Performance of Orthogonal Space-Time BlockCodes with Non-Iideal Channel State Information
    • LUO Tao, HAO Jian-jun, LI Jian-feng, YUE Guang-xin
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 18-22.
    • Abstract ( 239 )     HTML       
    • A theoretical study of the symbol error rate (SER) for orthogonal space-time block codes (OSTBC) was presented while there existed non-ideal channel state information (CSI). it was proved that the squaring method to simplify the decoding of OSTBC could be used. Both signal-to-noise ratio and SER expressions for OSTBC, using this squaring method, got derived under the above conditions. Numerical simulation shows that the performance with non-ideal CSI is poorer than that with ideal one, and also shows that the more estimation errors there exist, the more performance losses. It is concluded that the SER bound decreases slowly when the variance of estimation errors is less than some small values (say 0.2).
    • References | Supplementary Material | Related Articles
    • GMPLS Signaling Extension for Multi-Granularity Optical Switching Node
    • XU Yun-bin, SONG Hong-sheng, ZHANG Jie, GU Wan-yi
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 23-27.
    • Abstract ( 268 )     HTML       
    • The multi-granularity labels has been defined by Internet engineering task force (IETF), but the corresponding signaling process has not been standardized up to now. A new generized multi-protocol label switching based signaling mechanism, which could be used for multi-granularity optical networks to create, release and modify its optical paths under the service-driven model, was proposed. With the help of communication finite state machine (CFSM) to analyze the signaling mechanism,we conclude that the signaling mechanism proposed could be satisfied in the dynamic requirement of different granularity optical paths.
    • References | Supplementary Material | Related Articles
    • An Improved Option of CCK Modulation and Demodulation \=and Its Implementation with FPGA
    • YANG Zhen, CUI Bing-feng, WANG Ya-dan, DING Wei
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 33-37.
    • Abstract ( 335 )     HTML       
    • A new method of modulation and demodulation used in 802.11b wireless local-area-networks (WLAN) physical layer was proposed, with which the data transmission rate could reach to 17.6 Mbit/s. A 16 bit complementary code keying (CCK) code expression upon the theory of multiphase complementary code, is presented. And the behavior has been analyzed with the help of computer simulations in additive white Gaussian noise (AWGN) channel. The simulation result showed that the performance of 16 bit CCK code has more advantages than that of 8 bit CCK code with the 802.11b draft standard. The fast Walsh transform (FWT) decoding algorithm and the field programmable gate array (FPGA) hardware implementation of the CCK modulation/demodulation system was proposed in the final.
    • References | Supplementary Material | Related Articles
    • Study of Fairness of Resource Adaptation Based on Utility
    • WANG Yu-feng, WANG Wen-dong, CHENG Shi-duan
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 38-42.
    • Abstract ( 276 )     HTML       
    • Nash bargaining solution (NBS) is applied to the resource allocation in wireless networks so that a fair allocation scheme, based on utility, was proposed. Through a case study, the new scheme was proved to be superior to the existing scheme of equal utility value. A distributed model of the scheme was also introduced. The users could maximize independently their own net utility with the model in a proper pricing policy. As a result, the network achieves an optimized total utility.
    • References | Supplementary Material | Related Articles
    • Transfer Delay and Queueing Time of RPR Network
    • SHI Guo-wei, FANG Hong-bo, WANG Hong-yuan, ZENG Lie-guang
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 43-47.
    • Abstract ( 284 )     HTML       
    • Atraffic queueing model for resilient packet ring ( RPR) netw orks was built , and a method for quantitatively ana lyzing the acket transfer dela ys in RPR net work was presented as well. Based o n thi s metho d, the av erag e queueing time and t ransfer delay of the di fferent prio ri ty t raff ic w ere obtained. It is co ncluded from the quanti tativ e analysis that the low er prio ri ty traf fic in t ransmi t buffer has long er queueing time than tha t o f higher priority t raf fic. On the o ther hand, the highest priority t raf fic (class-A) in sing le-queue ring i s delayed more time than that in dual-queue ring , in co ntrary , the low er priority t raffic ( class-B and class-C) in sing le-queue ring is delayed less time than that in dual-queue ring.
    • References | Supplementary Material | Related Articles
    • Error Analysis on Wireless Network Planning
    • ZHANG Jian-ming, YANG Da-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 48-52.
    • Abstract ( 260 )     HTML       
    • A method for the quantitative analysis on wireless network planning errors was proposed in which the drive test data of network was sampled to estimate statistically the errors of the planning results. It was pointed that the accuracy of error analysis was governed by the measurement criteria in randomly varied radio environment. The relation between the measurement criteria and the confidence level of planning errors was analyzed theoretically in the final.
    • References | Supplementary Material | Related Articles
    • Study on System Performance of Reverse Link \=Orthogonality in CDMA2000
    • ZHANG Xin, DOU Zhong-zhao, CAI Qi-ming, YANG Da-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 53-57.
    • Abstract ( 279 )     HTML       
    • An orthogonal reverse link (RL) method is studied based on the current CDMA2000 channel structure. The effect on RL system capacity is analyzed by use of rise-over-thermal (ROT) criterion. The numerical calculations and dynamic system level simulations show that the system capacity, comparing with non-orthogonal RL, is enlarged significantly by reduction of the intra-cell interference for orthogonal RL. On the other hand, the gain is limited by the orthogonal code resources in the system.
    • References | Supplementary Material | Related Articles
    • A New Iterative Detection for Coded GMSK
    • GUO Wen-bin, YANG Hong-wen, YANG Da-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 58-62.
    • Abstract ( 260 )     HTML       
    • A simplified model equivalent to Gaussian minimum shift keying (GMSK) signal with BT equaling 0.3 was expressed. In other words, the signal could be approximately equivalent to a four-state recursively convolutional code concatenated with quadrature phase shift keying (QPSK) modulation at sampling time. So that an iterative detection with joint demodulation was proposed for coded GMSK. The decoded soft information was then fed back to the demodulation for iterations. A comparison between joint demodulation and non-joint demodulation under additive white Gaussian noise (AWGN) channel was given by computer simulations. The simulation shows that an obvious improvement is obtained by joint demodulation.
    • References | Supplementary Material | Related Articles
    • Frequency Offset Estimation in the OFDM System Using Wavelets Transform
    • YUAN Chao-wei, LIU Jing, LI Yi-nong
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 68-72.
    • Abstract ( 284 )     HTML       
    • A suggestion, based on wavelet transform, was proposed to estimate the frequency offset in the orthogonal frequency division multiplexing(OFDM) system. Compared with the existed methods, the new method of frequency offset estimation does not have to know the received averaging power of unsteady signals and to open the windows for varied time observation. Also, the new form of wavelet transform is adaptive and is able to track the swing of frequency offset. The simulation shows that it has higher precision. With the help of it, the estimation for frequency offset in the OFDM system could be done very well.
    • References | Supplementary Material | Related Articles
    • Watermark Constructing Method Based on Host Signal
    • ZHANG Li-he, DAI Yuan-jun, YANG Yi-xian, HU Zheng-ming
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 73-77.
    • Abstract ( 238 )     HTML       
    • According to the linear prediction theory, a host signal-based watermark construction method used with the noise shaping characteristic of linear prediction filter was presented. The theoretical analysis shows that the envelope of watermark signals was similar to that of the host signals, after which it was verified by experiments. So that we get a conclusion: the work we have done on watermark has strong imperceptibility and robustness.
    • References | Supplementary Material | Related Articles
    • The Implementation of Multicast in Mobile IP
    • YE Min-hua, LIU Yu, ZHANG Hui-min
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 78-82.
    • Abstract ( 259 )     HTML       
    • An implementa tion of modified mul ticast in Mobi le IP was presented, in which, the concept o f mobi le multicast gatew ay ( MMG) w as int roduced. MM G was used to ma nage mul tica st in Mobi le IP. There existed two stag es fo r receiving and fo rw arding respectively. The multicast packet s w ere receiv ed by adding MM Git self on to the mul ticast di st ribution tree, or by deliv ering v ia tunnel f rom the home netwo rk of mobi le ho st ( M H) , and the “ tunnel conv ergence” problem was eliminated tho ro ug hly in the meantime. Af ter w hich, acco rding to di fferent situatio ns, multicast packets w ere forw arded f rom MMG to MH wi th set ting up mul ticast dist ributio n t ree in it s region, o r f rom the tunnel to M H di rect ly to gua rantee th e ro uting ef ficiency and multicast reliability. A netwo rk model was int roduced, and the performance o f all schemes w as analy zed. The numerical resul ts show tha t the new pro po sal presents g ood perfo rmance.
    • References | Supplementary Material | Related Articles
    • A DHT-Based OFDM Receiver Model and Its Performance
    • WANG De-qiang, LIU Dan-pu, YUE Guang-xin
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 83-87.
    • Abstract ( 263 )     HTML       
    • A discrete Hartley transform (DHT) -based receiver model for orthogonal frequency division multiplexing (OFDM) systems was proposed. Its principle has been analyzed in detail, which showed that the performance of the proposed receiver model was the same as that of the conventional discrete Fourier transform (DFT) - based receiver in AWGN channel. And then simulation verified that. In the new receiver model a parallel processing mode was adopted. And so, low computational complexity, high processing speed and easy implementation with DSP were obtained in the meantime.
    • References | Supplementary Material | Related Articles
    • Analysis of Multi-Hop Cooperative Diversity Systems \=over Rayleigh Fading Channel
    • CHENG Wei-jun, LI Yu-hong, HU Jian-dong
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 93-97.
    • Abstract ( 229 )     HTML       
    • Two models of cooperative diversity system composed of many users were studied based on multi-hop relaying concept, one of which was multi-hop system and the other was multi-route diversity system. Expressions for outage probability and average bit error rate (BER) of decoded relaying and amplified relaying systems were derived over Rayleigh fading channel, respectively. Numerical analysis shows the multi-hop diversity system is degraded as the number of hops increases, and simulation verifies that. On the other hand, the multi-route diversity system gets improved with the increasing of numbers of route. As a conclusion, the performance of decoded relaying is better than that of amplified relaying at lower average signal noise ratio (SNR). But at higher average SNR, there exists little difference between the two.
    • References | Supplementary Material | Related Articles
    • A Protocol of Quantum Key Distribution and Identification
    • GAO Fei, WEN Qiao-yan
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 98-102.
    • Abstract ( 283 )     HTML       
    • A new protocol was proposed in which the quantum entangled states was used for quantum key distribution (QKD) and the quantum non-orthogonal states was used for user identification from eavesdropping as well. Both the two states were mixed as alternative form much or less in transmission via a quantum channel. Consequently, there was no need to transmit the classical information in identification process for dual contributions of non-orthogonal states. And the efficiency of QKD was got improved in the mean time. In addition, QKD and identification were completed simultaneously, so that the problem of impersonation was avoided.
    • References | Supplementary Material | Related Articles
    • Reverse Link Capacity Analysis on Distributed Wireless Communication System
    • WANG Yu, LI Zheng, WU Wei-ling
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 103-107.
    • Abstract ( 259 )     HTML       
    • Distributed wireless communication system (DWCS) is built with distributed antennas, distributed transport and distributed processing. An arbitrary set of antennas can constitute a virtual cell for a certain mobile user. Code division multiple access(CDMA) and maximum ratio combining (MRC) were employed by DWCS for the system construction. Considering inter-user interferend to a certain user, inference users are divided into 3 groups: the users with the same antenna set; the users with a completely different antenna set; and the users with sharing part of antenna set. Another two works we have done were: evaluations of reverse link capacity by calculating the other-cell interference factor fd; and comparisons of DWCS with traditional single-antenna and multi-antenna cellular systems under condition of the same antenna density. The analysis shows that the reverse link capacity greatly increases when used in DWCS.
    • References | Supplementary Material | Related Articles
    • A Problem with the Construction and Enumeration of (n,m,1)-Resilient Functions
    • HUANG Zheng, DING Jin-kou, WEN Qiao-yan, YANG Yi-xian
    • Journal of Beijing University of Posts and Telecommunications. 2004, 27(3): 113-116.
    • Abstract ( 223 )     HTML       
    • The resilient function is one of the multiple-output Boolean functions, An important work the resilient function has to do is to prevent the information eavesdropping. The more numbers of the resilient functions have the more safety the cryptographic system will be. On the other hand, construction, as well as enumeration in (n,m,1)-resilient functions, has to be paid more attention to. Construction and enumeration were studied when the order of resiliency was t=1,n-m>t, upon which, three classes of (n,m,1)-resilient functions, based on the construction of n-variables balanced correlation-immune functions of the first-order, and on the equivalence between resilient functions and large sets of orthogonal arrays(a group of orthogonal arrays), are implemented in the case of n-m>t=1. Also, an enumeration lower bound of a (n,m,1)-resilient function was presented.
    • References | Supplementary Material | Related Articles