Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Review

    • Bacteria-Based Molecular Communication and Body-Area Nano-Networks
    • PENG Mu-gen, YIN Bo-nan, WANG Wen-bo
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 1-11. DOI:10.13190/j.jbupt.2016.01.001
    • Abstract ( 500 )     HTML       
    • The rapid development of nano and biology technologies pave the way to the research of molecular communication within the body area. The article surveys the recent advents of the bacteria-based molecular communication, in which the bacteria conjugation and bacteria paracrine transmission mechanisms are elaborated, and the related experiment and simulation are presented. Accordingly, the body-area nano-network based on bacteria molecular communication is discussed, and the corresponding relay networking technology is presented. Finally, the future open issues and challenges are discussed.

    • References | Supplementary Material | Related Articles

    Papers

    • Formation Security: Black Hole Problem
    • LI Xu, BAO Jing-jing, LIU Ying
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 12-17. DOI:10.13190/j.jbupt.2016.01.002
    • Abstract ( 242 )     HTML       
    • Based on ad-hoc on-demand distance vector routing protocol, combined with the features of formation communication system, the black hole problem was analyzed and an ad-hoc on-demand distance vector routing method with security mechanism was proposed to solve the problem. Combining the specific routing protocol, the proposal not only focuses on the characteristics of the algorithm, but takes account of the specific features of the application, making it simple and easy to implement. Simulations show that in addition to guaranteethe packets delivery ratio, the extra control overhead is able to withstand in the system range as well.

    • References | Supplementary Material | Related Articles
    • Approach to Modeling Direction Relations between Regions with Uncertain Boundaries
    • DONG Yi-qun, XU Wen-xing, LIU Jian-dong, WANG Shu-hong, JIANG Hui-na
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 18-23. DOI:10.13190/j.jbupt.2016.01.003
    • Abstract ( 286 )     HTML       
    • As a fundamental spatial relation, the direction relations can describe position information between objects, which has been an important issue for spatial knowledge processing. Conventional researches mainly concern over the relations of simple objects, which restrict spatial relation modeling in further practical and theoretical research. The article focuses on the representation and reasoning models of direction relations of uncertain regions with qualitative methods. Firstly, an uncertain boundary was described using broad boundary model, and the direction relations between uncertain regions were represented with the combinations of basic cardinal direction relations. Moreover, through the representations, the direction relation constraints and satisfaction problem constraints or uncertain regions were defined. And a consistency checking algorithm was proposed for reasoning about the direction relations between uncertain regions, and the computational complexity of this algorithm was also analyzed.

    • References | Supplementary Material | Related Articles
    • Updated Mechanism for in-Band Controlling Traffic of Software Defined Networking
    • LIU Tao, WANG Wen-dong, GONG Xiang-yang, QUE Xi-rong, CHENG Shi-duan
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 24-28. DOI:10.13190/j.jbupt.2016.01.004
    • Abstract ( 251 )     HTML       
    • In order to solve the problems which may be arised when the routing policy of control plane is updated in in-band mode, an update mechanism based on the destination oriented routing was proposed. The mechanism divides the update policy into subclasses based on the different destinations, and also separates the uplink routing from downlink routing based on the destination. A unified update algorithm was presented for the updating of both uplink and downlink of controlling traffic. Experiment shows that the proposed mechanism shows more efficient both in the computation time and in updating time, but some extra flow entries may be needed.

    • References | Supplementary Material | Related Articles
    • Influential Neighbor Selection in Collaborative Filtering
    • YANG Heng-yu, LI Hui-zong, LIN Yao-jin, ZHANG Jia
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 29-34. DOI:10.13190/j.jbupt.2016.01.005
    • Abstract ( 376 )     HTML       
    • The recommendation performance of collaborative filtering is restricted by data sparsity. To solve this problem, the factor of user influence was thereafter defined according to the number of ratings to measure the relationship while calculating the similarity between users. Then, the influential user group was introduced according to the rating quality. On this basis, the chosen influential neighbor can work on the process of recommendations via combining the number of user ratings with the rating quality. Experiments show that the proposed method can significantly improve the recommendation performance.

    • References | Supplementary Material | Related Articles
    • Energy Saving Algorithm Based on Multiple Pre-Configured Topologies in IP Networks
    • ZHANG Xiao-ning, WANG Sheng, LI Le-min
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 35-40. DOI:10.13190/j.jbupt.2016.01.006
    • Abstract ( 330 )     HTML       
    • To solve the problem that the traffic flow dynamically changes in Internet protocol (IP) network, a new energy saving algorithm based on pre-configured multiple topologies (ESPMT) was proposed. In the ESPMT algorithm, firstly, according to the daily traffic flow, each day is divided into multiple time slices, secondly, the energy-saving sub-topology is designed by utilizing neighboring region search for each single time slice. To achieve the purpose of energy saving, the traffic flows are concentrated on some links. The links without traffic are powered off in IP networks.

    • References | Supplementary Material | Related Articles
    • Delay Efficient Broadcast for Multi-Channel Duty-Cycled Wireless Serisor Networks
    • JIAO Xian-long, XIAO Wei-dong, GE Bin, WANG Xiao-dong, CHEN Yu-li
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 41-46. DOI:10.13190/j.jbupt.2016.01.007
    • Abstract ( 578 )     HTML       
    • For multi-channel duty-cycled wireless sensor networks, the minimum delay broadcast problem was proved to be NP-hard. Two new concepts of candidate active conflict graph and feasible active conflict graph were presented. A Low delay broadcast algorithm called efficient broadcast algorithm was proposed based on these two new concepts. Analysis shows that this algorithm has a small approximation ratio. Simulation shows at the same time that efficient broadcast algorithm improves the broadcast delay efficiently compared with the existing work.

    • References | Supplementary Material | Related Articles
    • Cognition Evaluation for Survivable System
    • ZHAO Guo-sheng, WANG Jian, HAN Xu, ZHANG Nan
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 47-51. DOI:10.13190/j.jbupt.2016.01.008
    • Abstract ( 631 )     HTML       
    • The autonomous recognition mechanism on survivability is still in the ascendant, and the cognition is the realization premise of the recognition. A cognitive evaluation mechanism for survivable system was proposed based on the shortest K-path algorithm. Firstly, a framework structure of the cognitive evaluation for survivable system is established, the cognitive state transfer matrix and cognitive evaluation index are given. Then, a quantitative model for the cognitive survivability of the system is made. Finally, a cognitive performance simulation experiment in some network security situation awareness system is carried out under DoS attacks. Experiment shows that the presented method faithfully reflects the dynamic evolution of cognitive performance under different attack parameters, analyses the survival threat of the system and validates the effectiveness of the proposed method.

    • References | Supplementary Material | Related Articles
    • A Combined Chirp Signal Time-Synchronization Scheme for Mobile Underwater Sensor Networks
    • JIN Yan-liang, FANG Chang-li, YAO Bin
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 52-57. DOI:10.13190/j.jbupt.2016.01.009
    • Abstract ( 634 )     HTML       
    • This article puts forward a combined chirp signal time synchronization(CCS-Sync) algorithm. In the physical layer, it uses a preamble structure combined with chirp signals to estimate the Doppler scaling factor. Furthermore, the author proposes a message exchange mechanism composed of two phases. In the phase of coarse synchronization, the reference node broadcasts messages to synchronize the ordinary nodes. Based on the first phase, it uses twice linear regression method to estimate the clock skew and offset. With this algorithm, it successfully uses the effect of Doppler between mobility nodes to reduce the synchronization error. The effectiveness of CCS-Sync is validated by the simulation.

    • References | Supplementary Material | Related Articles
    • A Robust Crater Detection and Recognition Method Based on Blocked Principal Components Analysis
    • LU An, ZHOU Dong-hua, CHEN Mao-yin
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 63-67. DOI:10.13190/j.jbupt.2016.01.011
    • Abstract ( 417 )     HTML       
    • Crater is important for analyzing the relative dating of planetary and lunar surfaces. For the complex terrains in remote sensing images, a robust blocked principal components analysis (RPCA) approach was proposed to automatically detect crater candidate regions. An alternating direction multipliers algorithm was presented for RPCA based on the blocked planetary images. The background is modeled as a low-rank matrix, and the salient regions map is represented by structure sparse parts that contain potential craters. The crater candidates are obtained by mathematical morphological operations for the saliency regions map, they are precisely distinguished from falsely detected ones through a sparse representation classifier in feature space. Experiments on the images from Mars and Moon demonstrate show that the accuracy rate of crater recognition can reach up to 91.7% by effectively eliminating the effects of background and illumination.

    • References | Supplementary Material | Related Articles
    • En-Route Filtering Strategy Against Selective Discarding in Wireless Sensor Networks
    • ZHANG Shu-guang, ZHOU Xue-hai, YANG Feng, XU Jun
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 68-73. DOI:10.13190/j.jbupt.2016.01.012
    • Abstract ( 460 )     HTML       
    • Aiming at the problem of current false data filtering strategies that cannot prevent legitimate packets from discarded by the malicious nodes selectively, an en-route filtering strategy was put forward against selectively discarding packets. In this strategy, each node keeps its one-hop and two-hop neighbor nodes' identifications as well as one-way chain keys. Moreover, what the forwarded packets attached is the latest one-way chain keys of L nodes, not the message authentication codes in traditional en-route filtering strategies. Additionally, this strategy uses the stepwise certification to submit data packets by monitoring the communications between common neighbor nodes. Experiment shows that the strategy not only can efficiently filter false data, but also can prevent malicious nodes from selectively discarding packets.

    • References | Supplementary Material | Related Articles

    Reports

    • Modeling and Simulation of MIR UWB Communication System Based on Parallel Combinatory Pulses
    • QI Lin, LI Chao, DOU Zheng
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 74-78. DOI:10.13190/j.jbupt.2016.01.013
    • Abstract ( 434 )     HTML       
    • A multiband impulse radio ultra wideband (MIR UWB) communication system based on parallel combinatory pulses was proposed, in which the flexible selection of transmission pulses and subbands can be realized by using r-combinatory data mapping algorithm. The system model was given and the bit error rate (BER) performance was simulated and analyzed. It is shown that BER performance of the proposed system is better than that of the traditional system under the condition of large signal-to-noise ratio, and different transmission data rate can be obtained as well.

    • References | Supplementary Material | Related Articles
    • Construction of High Rate Turbo-OVCDM by Superposition Coding
    • ZHOU Su-hua, ZHOU Jing, ZHANG Ru
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 79-82. DOI:10.13190/j.jbupt.2016.01.014
    • Abstract ( 270 )     HTML       
    • The decoding complexity of traditional type of Turbo-overlapped code division multiplexing (OVCDM) increases exponentially with the code rate. To solve this problem, a new Turbo-OVCDM coding and decoding approach was proposed. The maximum sum-rate achieving strategy in Gaussian multiple access channels was used to construct point-to-point coding scheme. Superposition of two or more Turbo-OVCDM codes and serial interference cancellation were applied for coding and decoding respectively. Numerical results demonstrate the feasibility of the proposed approach.

    • References | Supplementary Material | Related Articles
    • A Bandwidth-Variable Scheduling Algorithm of Saving Energy for the Holding Time of Traffic Requests
    • WEI Cheng-ying, ZHOU Bang-tao, LIU Huan-lin, LIU Yang, CHEN Yong
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 83-86. DOI:10.13190/j.jbupt.2016.01.015
    • Abstract ( 407 )     HTML       
    • In green optical networks, the transmission time-slot allocation strategy and routing algorithm have a greatly impact on the transmission energy consumption. Aiming at the transmission energy consumption problem, a bandwidth-variable energy efficient scheduling (BVEES) algorithm based on flexible-time scheduled traffic was proposed. By constructing a weight matrix, BVEES calculates the selected times of different path candidates in different slots. Based on the idea of greedy algorithm, BVEES selects the transmission paths and time slots with the minimum transmission energy consumption. In addition, a bandwidth adjustment strategy, which can adjust transmission bandwidth according to the available bandwidth in different slots, was designed for BVEES to minimize the number of lightpaths in optical networks. Simulations show that the BVEES can effectively reduce the transmission energy consumption and the blocking probability.

    • References | Supplementary Material | Related Articles
    • Leakage-Resilient Verifiable Multi-Secret Sharing Scheme
    • SHEN Hua, CHEN Mi-wen, ZHANG Ming-wu
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 87-91. DOI:10.13190/j.jbupt.2016.01.016
    • Abstract ( 275 )     HTML       
    • In the existing multi-secret sharing schemes mainly depending ondealer selections, the polynomial coefficients constructs the polynomial and takes the value ofpolynomial function as shadows of secrets, however, the semi-honest dealer may leak information of secrets by changing the polynomial coefficients. In order to solve the problem by semi-honest dealer, the article presented a new leakage-resilient verifiable multi-secret sharing scheme The problem of leakage secret information hiddens in that the polynomial coefficients are selected and constructed by all of participants. Comparison with existing schemes which also achieve verifiable multi-secret sharing, the scheme can still work well even when the dealer leaks some secret information.It has better efficiency in terms of computation overhead.

    • References | Supplementary Material | Related Articles
    • A Low-Input DC/DC Converter for Energy Harvesting
    • YANG Zheng, WANG Jing-min, LI Ya-ni, YANG Yin-tang
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 92-95. DOI:10.13190/j.jbupt.2016.01.017
    • Abstract ( 426 )     HTML       
    • A low input DC/DC converter and power manager in 0.18 μm CMOS process was presented. The proposed converter can work with the input voltage as low as 25 mV. Four logic controlled outputs provide the best voltage for various applications to accommodate low-power design requirements. Reserve energy on the storage capacitor CSTORE provides power when the input voltage source is unavailable. Simulation shows that the overall efficiency is about 64% with 300 μA load current. This work provides a complete power management solution for wireless sensing and data acquisition.

    • References | Supplementary Material | Related Articles
    • Improved Self-Calibration Method to Hand-Eye Relation of Robot Based on a Single Feature Point
    • HONG Lei, JI Bao-jian, WANG Yu-guo, LING Chao
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 96-101. DOI:10.13190/j.jbupt.2016.01.018
    • Abstract ( 625 )     HTML       
    • For the shortcoming that the excessive number of robot movement is required during the hand-eye calibration, an improved self-calibration method to hand-eye relation of robot based on a single feature point was proposed. The decoupling operation for hand-eye relation matrix was introduced, and also the hand-eye rotation matrix and translation vector were calibrated respectively. In the calibration process, the feature point position is not necessary to be calculated, but and the manipulator end effector is needed also to perform more than five times translational motions and two times rotation motions. Calibration experiment and error analysis verify that the method can meet the demand for industrial robot hand-eye vision measurement.

    • References | Supplementary Material | Related Articles
    • Non-liner Energy Consumption Model for Cloud Computing
    • XIAO Ding, JIA Ya-pu, SHI Chuan
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 107-111. DOI:10.13190/j.jbupt.2016.01.020
    • Abstract ( 460 )     HTML       
    • With development of cloud computing and big data, the energy consumption of data center becomes more and more serious. It is necessary to establish a precise model of energy consumption for the computing node of the data center. In the most previous studies, linear system utilization is taken to establish the models of energy consumption. In order to solve the accuracy insufficient of linear model, a model of energy consumption based on the segmented CPU utilization was proposed when considering the memory and the hard drive at the same time. In the experiment, the inner relationship between the energy consumption and the CPU was found, and a formula of the potential influence of the components was proposed, and the accuracy of the model is verified in both single environment and parallel environment.

    • References | Supplementary Material | Related Articles
    • Improved Provably Secure Certificateless Signature Scheme
    • TANG Yong-li, WANG Fei-fei, YE Qing, YAN Xi-xi
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 112-116. DOI:10.13190/j.jbupt.2016.01.021
    • Abstract ( 373 )     HTML       
    • A forgery attack on Fan Aiwan et al's certificateless signature scheme was presented. It is found that the strong type I adversary could forge any user's valid signature on any message. The reason of this problem is that the random number selected in the signature generation phase is not associated with the message M. To improve the original scheme's security, the improved schemes in which the random number selected in the signature generation phase is bound to the hash function value of message M was proposed. The scheme proposed can resist both super type Ⅰ and type Ⅱ adversary, and it only needs one scalar multiplication in signature generation phase and four scalar multiplications in signature verification phase; the other schemes proposed can resist strong type Ⅰ and super type Ⅱ adversary and are secure against the attacker in the real world. In addition, they only need one scalar multiplication in signature generation phase, and three scalar multiplications in signature verification phase. The improved schemes are provably secure under the intractability of elliptic curve discrete logarithm problem.

    • References | Supplementary Material | Related Articles
    • Generalized Semi-Iterative Hard Thresholding Pursuit Algorithm and Its Application in Ghost Imaging
    • ZHAO Sheng-mei, TANG Wen-juan, ZHENG Bao-yu
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 117-121. DOI:10.13190/j.jbupt.2016.01.022
    • Abstract ( 422 )     HTML       
    • A recovery algorithm, named generalized semi-iterative hard thresholding pursuit, was proposed. The algorithm modifies the searching direction of objective function with semi-iterative idea, has a polynomial acceleration convergence, and can be used for the signal without sparse information. It is shown that the proposed algorithm did improve the performance in term of reconstruction probability, peak signal-to-noise ratio, signal-to-noise ratio, and matching rate. The reconstruction quality in ghost imaging with the proposed algorithm is superior to that with the generalized hard thresholding method.

    • References | Supplementary Material | Related Articles
    • SAR Image Segmentation Based on SRADPRO and SCM Model
    • KOU Guang-jie, MA Yun-yan, YUE Jun
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(1): 122-126. DOI:10.13190/j.jbupt.2016.01.023
    • Abstract ( 285 )     HTML       
    • An improved speckle reducing anisotropic diffusion (SRADPRO) algorithm was adopted to reduce the speckle in synthetic aperture radar (SAR) image. An adaptive SAR image segmentation algorithm speckle reducing spiking cortical model (SRSCM) was proposed when SRADPRO and spiking cortical model (SCM) was combined. In SRSCM, the standard deviation was calculated through a uniform sample region in the SAR image, and then the effect degree of speckle can be estimated as a result whether to employ the operator of SRADPRO was determined. At the second stage, the SCM operator was executed. Because of the auto wave characteristic of SCM, the segmented image and edge detection result can be obtained together. The effectiveness of SRSCM was proved by the comparisons with several traditional algorithms.

    • References | Supplementary Material | Related Articles