Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Original articles

    • A New Object Oriented Software Architecture
    • Zhou Yingxin, Ai Bo
    • Journal of Beijing University of Posts and Telecommunications. 1998, 21(1): 1-6.
    • Abstract ( 254 )     HTML       
    • Object orientation software architecture is not sliver bullet and has some disadvantages. The most significant is that if one objectwants to interact with another it must know the identity of that other object.Moreover, object orientation software architecture has some side affects. The well kown implicit invocation mechanism is introduced to object oriented softwarearchitecture in order to minimize the disadvantages. While in the heterogeneoussoftware architecture the principle of separation palys a major part in minimizing the disadvantages.
    • References | Supplementary Material | Related Articles
    • On a Kind of Circulant Matrices with#br# Their Order being a Prime Power
    • Ou Zhiming,Han Shuqin
    • Journal of Beijing University of Posts and Telecommunications. 1998, 21(1): 7-11.
    • Abstract ( 236 )     HTML       
    • In the research of Hadamard matrices, by using the method of factorization of prime ideals in algebraic number theory, we proved that circulant Hadamard matrices with order 4r(r>1) do not exist, and obtained the Hadamard matrices with order 4.For a circulant matrix H satisfying HHT=nI with order pr (p is a prime) andintegral elements, we completely determined the structure of H.Such matrices can be viewed as matrices over finite field Fpr, thus we obtained the construction of a sort of orthogonal codes over Fpr.
    • References | Supplementary Material | Related Articles
    • A New Method for Software Fault Tolerance and Its Application
    • Liu Yunlong, Chen Junliang
    • Journal of Beijing University of Posts and Telecommunications. 1998, 21(1): 23-28.
    • Abstract ( 181 )     HTML       
    • A new method for Software Fault Tolerance (SFT) is presented, which is based on the Data Flow Analysis (DFA).The normal SFT technology is introduced at first, and data errors are pointed out to be the ultimate reason and also the final result of the software faults in the control systems, soit is crucial to adopt a powerful measure for data fault tolerance.Then, the applications of the DFA technique in the SFT are discussed in details, and two important theorems are also given, one for the minimal sufficient rollback point andanother for the checkpoint data range.Besides, the sufficient condition for thevalidation of the definition of a Rollback Block is proposed.The usage of the presented method is illustrated with the telecommunication system as an example.The presented method can be used widely by extending it simply.
    • References | Supplementary Material | Related Articles
    • Synchronization for Interactive Multimedia Presentation
    • Wei Tiejun, Chen Junliang
    • Journal of Beijing University of Posts and Telecommunications. 1998, 21(1): 29-34.
    • Abstract ( 243 )     HTML       
    • The presentations of multimedia objects are considered and the synchronization requirements for a multimedia presentation with user participant are studied. A new multimedia synchronization model, called IMPSM, is proposed. IMPSMis a synchronization presentation model based on Petri-Nets. It can be used tohandle interactive presentation of multimedia objects, supports a wide range oftemporal synchronization specification, including determinate and indeterminatetemporal scenario.
    • References | Supplementary Material | Related Articles
    • Designing of Wire-Spring Connectors
    • Xiang Wanpeng, Luo Guoping,Du Lihuan
    • Journal of Beijing University of Posts and Telecommunications. 1998, 21(1): 53-57.
    • Abstract ( 268 )     HTML       
    • Based on mathematical analysis for wire-spring connector, gives out its constructive geometry parameters fixing, materials selecting, strength condition checking etc. Thus, the effect of some important parameters changing on connector performance can be seen clearly.Accordingly, design method and procedure are supplied for wire-spring connector, which may guide to exploit serialization products.
    • References | Supplementary Material | Related Articles
    • Queuing Schemes of Optical ATM Switching Elements
    • Shen Yunfeng, Lü Kejie, Zhao Xiaodong, Gu Wanyi
    • Journal of Beijing University of Posts and Telecommunications. 1998, 21(1): 58-62.
    • Abstract ( 205 )     HTML       
    • On the basis of the needs of optical ATM switching and the characteristics of optical buffer, three kinds of queuing schemes using optical fiber delay lines and their queuing algorithms are presented. The relations between the number of delay lines and cell loss rate and mean delay are givenby means of analysis and computer simulation, and these three kinds of queuingschemes are compared on the basis of the results.
    • References | Supplementary Material | Related Articles
    • A New IN-CS2 Functional Model Supporting FPLMTS
    • Li Tonghong, Liao Jianxin, Chen Junliang
    • Journal of Beijing University of Posts and Telecommunications. 1998, 21(1): 63-67.
    • Abstract ( 235 )     HTML       
    • CS2 functional model supporting FPLMTS in present ITU recommendation was first described. Considering the character of present and future network, we point outthe present model's disadvantage and propose an improved CS2 functional model, which separates terminal authentication and location register from SCF and introduces two new functional entities called LRF and TAF. In the end, the advantage and disadvantage of this new model was given.
    • References | Supplementary Material | Related Articles
    • Object-Oriented Data Model of IN User Service Data
    • Lei Youxun, Meng Luoming, Chen Junliang
    • Journal of Beijing University of Posts and Telecommunications. 1998, 21(1): 68-72.
    • Abstract ( 187 )     HTML       
    • A way to construct the object-oriented semantic data model of IN user service data according to the principles of TMN is presented. GDMO is taken as the specification tool to specify IN user service data . In the specification, the first-order predicate logic is used to specify the structure and the integrity constraints of user service data, and also new specifiers are introduced to specify theoperations on the attributes of user service data. The semantic data model of user service data is a preparation for the automatic implementation of user service managment in IN.
    • References | Supplementary Material | Related Articles
    • Combination of Multibeam Antenna Array and#br# Optimum Multiuser Detector in Cellular CDMA Base Station
    • Wang Daqing, Zhang Huimin, Wu Weiling
    • Journal of Beijing University of Posts and Telecommunications. 1998, 21(1): 73-77.
    • Abstract ( 229 )     HTML       
    • The multibeam antenna array and the optimum multiuser detector are combined to reduced the near-far effects in asynchronous direct sequence spread spectrum multiaccess receiver. Based on this construction, the whole users in the cell canbe divided into groups by the multibeam of the antenna array, and then the optimum multiuser detectors are applied to each group of users to obtain optimum reception. We compare this approach with the conventional detector and the optimum multiuser detector in bit error rate and computational complexity. Results show that when using the structure we proposed, the computational complexity can be substantially reduced, and the performance can be improved, therefore the new approach is more feasible to implement.
    • References | Supplementary Material | Related Articles
    • The Client/Server Database Application System
    • Yan Xiuqun,Ye Yi
    • Journal of Beijing University of Posts and Telecommunications. 1998, 21(1): 78-82.
    • Abstract ( 211 )     HTML       
    • A design and implementation of database applicationsystem in client/server structure is proposed. It supports LAN, WAN and mixed networks. According availability and queueing theory, we analysis the availability and property of system.It prove the feasibility of scheme, and give system config data in different application condition.The system is being used in many applications and received good result.
    • References | Supplementary Material | Related Articles

    Review