Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • A Dynamic Probe Station Selection Algorithm in the Network Virtualization Environment
    • LIU Shi-dong, WANG Yao
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 1-5. DOI:10.13190/j.jbupt.2016.s.001
    • Abstract ( 234 )     HTML       
    • In order to deal with the dynamic network virtualization environment and reduce the cost of probe selection, a dynamic probe station selection algorithm based on the greedy method was proposed. The algorithm chooses the nodes that can achieve all the virtual nodes and have the maximum height as the probe station. For the dynamic network environment, this algorithm will dynamically select the probe stations in the two scenarios: node adding and node deleting. Simulations show that, compared with the classical algorithm, this dynamic probe station selection algorithm selects less probe and reduces the cost of probe selection while keeping up with the detecting effects in the dynamic network virtualization environment.

    • References | Supplementary Material | Related Articles
    • WCET Estimation for Real-Time Communication System by the Module of GPD
    • WANG Hai-rui
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 6-9. DOI:10.13190/j.jbupt.2016.s.002
    • Abstract ( 268 )     HTML       
    • In design of real-time communication systems, the Worst-Case Execution Time (WCET) of software supplies pledge for the scheduling of the task, it is a creditable base that keeping the system running safely. With continuous growth of software scale and complexity of the hardware, the values of WCET estimated by determinate methods become more and more pessimistic, which greatly reduce the utilizing rate of the system resources . In order to improve the running efficiency of real time system, the article introduced a method of extreme value statistic in the estimation of WCET, and established the GPD model of WCET. The model was verified by experiments, the feasibility and the validity of this method was proven.

    • References | Supplementary Material | Related Articles
    • Fault Diagnosis Technology Based on Minimum Entropy
    • WANG Yao, LIU Shi-dong, GUO Jing-hong
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 10-13. DOI:10.13190/j.jbupt.2016.s.003
    • Abstract ( 234 )     HTML       
    • How to diagnose the fault of network is one of the problems in electric power data network. Currently, one of main factors that affect the accuracy of fault diagnosis in power integrated data network is the noise. However, there is almost no mention on the fault diagnosis method in the scheme, because it is difficult to improve the accuracy of fault diagnosis. A new fault diagnosis technique based on minimum entropy was proposed. Firstly, the information gain of each node is calculated according to the probability of node failure probability and the occurrence probability of each node. Then, the nodes are considered as suspicious nodes. Finally, the nodes are considered as nodes.

    • References | Supplementary Material | Related Articles
    • Application of BP Neural Network Model in Device State Detection of Industrial Control System
    • YAO Yun-zheng, YANG An, SHI Zhi-qiang, SUN Li-min
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 14-18. DOI:10.13190/j.jbupt.2016.s.004
    • Abstract ( 280 )     HTML       
    • The industrial control system (ICS) security is closely related to the security of national critical infrastructure, so, more and more countries began to increase the importance of ICS. Aiming at the physical devices in ICS field control net, an innovative intrusion detection algorithm was presented to analysis and estimate whether the devices are in normal operation condition. This algorithm is designed to detect internal or external intrusion actions in ICS and complex attack by maliciously using normative control commands.

    • References | Supplementary Material | Related Articles
    • Two-Stage Extended Discrete Shearlet Transform of Digital Watermarking Algorithm
    • ZHAO Jian, HAN Fan, JIA Jian, LIU Shan, XU Wen-sheng
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 19-22. DOI:10.13190/j.jbupt.2016.s.005
    • Abstract ( 226 )     HTML       
    • In order to improve the invisibility and robustness of digital watermarking algorithm, a new watermark was designed and embedded into large coefficients of low frequency of maximum entropy subband and small coefficients of low frequency of minimum entropy subband. And the strong directional sensitivity of extended discrete shearlet transform was introduced into digital watermarking as well. On this basis, a two-stage extended discrete shearlet transform of digital watermarking algorithm was proposed. Experiments show that the algorithm not only has strong invisibility, after adding a series of attacks, the watermark can still be extracted. The algorithm has strong invisibility and robustness.

    • References | Supplementary Material | Related Articles
    • A Clustering Algorithm with Two-Tier Structure Applied in VANET Network
    • REN Jian-jun, SHAO Su-jie, GUO Shao-yong, QI Feng
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 23-26. DOI:10.13190/j.jbupt.2016.s.006
    • Abstract ( 217 )     HTML       
    • In order to solve the problem of poor quality of information transmission in vehicular Ad hoc network, a local communication quality assurance clustering algorithm based was proposed on hierarchical structure. The vehicle nodes are divided into two tiers, the Ad hoc tier and peer to peer tier. The low tier nodes use the inter-vehicle communication mode, and high tier nodes use 3G, LTE and other more reliable and traditional communication modes. The algorithm is based on the classical weight clustering algorithm, and is improved with the local optimization. the maximum acceptable communication distance was introduced and a new cluster structure maintenance policy was proposed. Simulation shows that the proposed algorithm has higher clustering structure stability, higher packet delivery ratio and lower cost, compared to the classical clustering algorithm.

    • References | Supplementary Material | Related Articles
    • Load Balancing Algorithm for Data Distribution Network Based on XMPP Protocol
    • ZHANG Zhe-yu, ZHOU Run-lin, SUN Bin, HU Yan
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 27-31. DOI:10.13190/j.jbupt.2016.s.007
    • Abstract ( 222 )     HTML       
    • In order to set up an algorithm suitable for data distribution network of extensible messaging and presence protocol (XMPP) server cluster system with a relatively large number of sessions and the number of sessions, the weighted least connections algorithm was improved. This algorithm dynamically acquires the server's occupancy resources, and calculates the current load capacity and load level in real time. The servers' loading status is divided into three stages by the threshold values, and the servers are scheduled with two different algorithms. The algorithm can effectively improve the load performance of the server cluster.

    • References | Supplementary Material | Related Articles
    • Distributed CTI System Based on MapReduce Method
    • ZHANG Wen-tao, SHUANG Kai, CHEN Ping, SU Sen, ZHAN Shu-bo
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 32-36. DOI:10.13190/j.jbupt.2016.s.008
    • Abstract ( 275 )     HTML       
    • A MapReduce based distributed computer telephony integration (CTI) system namely distributed computer telephone integrity (DCTI) was proposed to resolve the resource mutual exclusion problem of routing algorithm in a multi-skilled call center. The proposed system implements the distributed computing of the management and routing in CTI. It adopts the divide and conquer method to improve the routing algorithm and deploys the agents to the CTI nodes equally so that the routing can be computed separately in each node. The real-world application and experimental results show that the DCTI system can linearly distribute the business load of CTI to N nodes.

    • References | Supplementary Material | Related Articles
    • Design and Implementation of Parallel UCSLIM Algorithm Based on Spark
    • YANG Juan, ZHANG Peng-ye
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 37-41. DOI:10.13190/j.jbupt.2016.s.009
    • Abstract ( 264 )     HTML       
    • A top-N recommendation method-user class sparse linear methods (UCSLIM) based on sparse linear method (SLIM) was proposed. In order to improve the quality of recommendation, we learn from the idea of SLIM algorithm and collaborative filtering algorithm. The users are divided into different sets. So the correlation was analyzed between the user and the set of users and the correlation between user and user. Based on these two factors, UCSLIM was proposed. Experiments show that, compared with SLIM , UCSLIM can improve the quality of results. Furthermore, in order to improve the computational efficiency, the UCSLIM in Hadoop and Spark was implemented. Experiments show that the implementation by Spark has higher efficiency than that of Hadoop.

    • References | Supplementary Material | Related Articles
    • A Dynamic Service Recovery Mechanism in Ubiquitous Stub Environment
    • NIU Dan-mei, RUI Lan-lan, HUANG Hao-qiu, QIU Xue-song
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 42-45. DOI:10.13190/j.jbupt.2016.s.010
    • Abstract ( 190 )     HTML       
    • When the mobile devices provide services for a user in ubiquitous stub environment, some service transmission paths will be out of work because of device movement or limited power. The main purpose of the article is to seek a way for quick service recovery and reliable service transmission. This author put forward a dynamic service recovery mechanism which can maintain the data in the service transmission path flexibly. When the service transmission fails, the upstream recovery point directly resends the service data to its downstream recovery point. Simulations show that this mechanism can effectively reduce the request failure probability and the execution time.

    • References | Supplementary Material | Related Articles
    • Mobile P2P Resource Sharing Mechanism
    • RUI Lan-lan, XIONG Ying-lin, HUANG Hao-qiu, QIU Xue-song
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 46-49. DOI:10.13190/j.jbupt.2016.s.011
    • Abstract ( 244 )     HTML       
    • An incentive mechanism based on credit and the balance of resources was presented. The incentive mechanism focuses on dynamic price of resources, as well as reasonable penalties for free riders. It maintains the balance between supply and demand. Simulations show that this incentive mechanism can not only effectively suppresses the free riding behavior, but also minimizes the resource price fluctuation, keeping the balance of resource supply.

    • References | Supplementary Material | Related Articles
    • Buffer Overflow Detection in C Code Using Dynamic Symbolic Execution
    • ZHANG Jun-xian, LI Zhou-jun
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 50-54. DOI:10.13190/j.jbupt.2016.s.012
    • Abstract ( 338 )     HTML       
    • Buffer overflow is a source of many security problems in C programs. A new tool named PathChecker to detect buffer overflows in C codes using dynamic symbolic execution method is proposed. PathChecker uses quantifier-free predicate formulas to describe the safety properties of buffer access operations and check these properties using a SMT solver. Experimental results show the effectiveness of this tool which is very easy to extend to check other safety properties.

    • References | Supplementary Material | Related Articles
    • Video QoE Assessment Considering Encoding and Transmission Damage
    • GENG Yang, JIN Jia-yi, MENG Luo-ming
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 55-58,71. DOI:10.13190/j.jbupt.2016.s.013
    • Abstract ( 201 )     HTML       
    • In video stream applications, the image damage caused by encoding and transmission affects the quality of experience (QoE). The proposal presented here will provide a no-reference method to assess the video QoE based on the quantitative analysis of the image damage of video stream. The proposed method is a NR method and introduces the objective indicators, which can be used to represent the video stream image quality before network transmission, and to calculate the QoE levels. So it provides a reference for the assessment process without feedback and improves the accuracy of the assessment.

    • References | Supplementary Material | Related Articles
    • Path Optimization Method in Power Communication Network Based on Particle Swarm Optimization
    • XING Ning-zhe, ZHANG Si-dong, LI Zhi-ling
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 59-62. DOI:10.13190/j.jbupt.2016.s.014
    • Abstract ( 247 )     HTML       
    • In smart grid, to meet high reliability requirements of power communication network, a path optimization method in power communication network based on particle swarm optimization was proposed. Based on the minimum construction cost, considering network reliability and service distribution factors, a path optimization problem model for power communication network was introduced. The path optimization model was solved by particle swarm optimization. Simulations show that the proposed method can improve the flexibility and comprehensiveness of path optimization to some extent, providing an effective path optimization scheme for power communication network.

    • References | Supplementary Material | Related Articles
    • Management Method of Energy Consumption Based on CoMP in LTE-A System
    • ZHENG Fei, HE Xiang-hua, LI Wen-jing, YU Peng, MENG Luo-ming
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 63-66. DOI:10.13190/j.jbupt.2016.s.015
    • Abstract ( 202 )     HTML       
    • Due to the growing demand of green network, to investigate new energy-saving methods that can enable a transition towards a greener long term evolution advanced (LTE-A) is important. A technology based on coordinated multiple points transmission(CoMP) was adopted to improve the coverage where the initial serving cells are dormant. At first, the network is divided into several independent clusters according to equivalent cell principle. Then the designed model selects cooperative cells and corresponding dormant cells. Finally, two indexes were adopted to evaluate the efficiency of energy-saving method. Simulations show that the optimal clustering radius is 1600 m since the dormant cell rate and the quality of service are taken into account together, which prove that the technology is effective to manage energy consumption.

    • References | Supplementary Material | Related Articles
    • Study on Peer Churn in Content-Addressable Network for Distributed Simulations
    • LI Zhong-tao, ZHAO Shuai, LANG Li-meng, SHI Jun, WAN Bo
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 67-71. DOI:10.13190/j.jbupt.2016.s.016
    • Abstract ( 259 )     HTML       
    • A new solution for re-organization of the area was introduced into (ideally) equally sized rectangular zones upon peers leaving content-addressable network for distributed simulations (CANS) as a distributed infrastructure to run massive simulations (for example MMVE games or city traffic simulation). The peers handle the simulation of zones which is assigned to them. The zones should be split in such a way that there is as little communication between the peers as possible. Because a car or player needs in average the maximum time to cross a zone, a peer to peer tree structure (CANS tree) was introduced that helps to re-organize the area when peers leave.

    • References | Supplementary Material | Related Articles
    • Sample Weighting Based Gene Feature Selection Model
    • RUI Lan-lan, ZHANG Jie, GUO Shao-yong, XIONG Ao
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 72-75. DOI:10.13190/j.jbupt.2016.s.017
    • Abstract ( 219 )     HTML       
    • According to the characteristics of gene expression data, a gene feature selection model based on improved information gain was put forward. The improved information gain was proposed to measure gene information quantity with sample weight and a no de-noising and de-noising gene feature selection model was established. The proposed model is compared with common gene selection model using four classifiers. Experiments validate that the proposed method can improve stability of feature selection algorithms without sacrificing predictive accuracy.

    • References | Supplementary Material | Related Articles
    • Capacity Estimation Research for Speech Information Hiding
    • BAI Jian, CAO Peng
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 76-80. DOI:10.13190/j.jbupt.2016.s.018
    • Abstract ( 204 )     HTML       
    • The article presented a data capacity estimation method for speech information hiding. It uses human auditory system (HAS) model to estimate the data hiding capacity of speech, or the maximum number of bits that can be embedded in speech. MPEG HAS model 1 was modified to estimate the just noticeable difference (JND) for FFT and power spectrum density coefficients. At the same time, a new embedded method that can reach the data capacity was introduced. The maximum number of bits was also calculated that can be embedded in speech to 2 787 bit/s when embedded speech is white noise.

    • References | Supplementary Material | Related Articles
    • Sparse Representation of Vehicle Image and Its' Application in Surveillance Video
    • CHEN Xiang-jun, RUAN Ya-duan, CHEN Qi-mei, YE Fei-yue
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 81-86. DOI:10.13190/j.jbupt.2016.s.019
    • Abstract ( 227 )     HTML       
    • Typical vehicle image feature will lost robustness and generalization ability under complex scene. To deal with this problem, sparse based vehicle images feature representation was introduced and a linear vehicles support vector machine classifier based on the sparse representation was proposed. Then, a framework of vehicle classification and recognition on surveillance video was constructed based on the background subtraction and sparse represented feature. Compared with traditional methods, vehicle images are represented as linear combination of the sparse coefficient of a learned dictionary (atom or base) in low dimension in our method, and sparse represented feature gains higher generalization capability with less computational complexity. Experiment shows that this work exhibits better classification accuracy and robustness under complex real environment with decrease image quality of low resolution, shadow and occlusion.

    • References | Supplementary Material | Related Articles
    • Research on Security Threats and Risk Assessment of Web Information System
    • LEI Min, LIU Xiao-ming, ZHANG Hong, WANG Mian, YANG Yu
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 87-93. DOI:10.13190/j.jbupt.2016.s.020
    • Abstract ( 263 )     HTML       
    • An increasing numbers of web information systems are deployed on the Internet to provide service, however, the web information system is facing various security threats, from physical security on bottom layer to communications and operations management, system security, application security and data security. The article gave out classifications of security threats faced by type of threats in web applications and set up grade for each threat according to its extent of danger, probability of occurrence and remediation. The article also uses fuzzy comprehensive evaluation to build a security analysis model aiming at constructing common analysis framework for web information system security assessment.

    • References | Supplementary Material | Related Articles
    • Integrated Agile Development Framework for Web Applications
    • XU Peng, LI Pei, HAO Qing
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 94-98. DOI:10.13190/j.jbupt.2016.s.021
    • Abstract ( 201 )     HTML       
    • To meet the requirements of web application development for higher efficiency and lower cost, the agile development is widely accepted. But in traditional agile development procedures, the project process management and its technical framework are isolated, which greatly limits practical effects of agile development. An integrated web application framework for agile development with high adaptability and flexibility was brought forward in the article. The integrated development framework consists of both process management framework and technical framework and they are in close collaboration. Based on the principle of agile development, the process management framework defines goals and tasks which need to be done at each stage of application development process. The technical framework provides support for the whole lifecycle of web application development by using reusable components, templates and software frameworks. Furthermore, the technical framework was deployed on PaaS, which greatly improves the reuse efficiency. A series of application development using the framework specified in this article demonstrate the framework effectiveness.

    • References | Supplementary Material | Related Articles
    • A Sensor Collaborative Coverage Algorithm for Microgrid Monitoring
    • LIN Yan-fei, SHAO Su-jie, WEI Lei, GUO Shao-yong, QIU Xue-song
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 99-103. DOI:10.13190/j.jbupt.2016.s.022
    • Abstract ( 224 )     HTML       
    • The distributed energy is organized in form of microgrid, which is one of the hot topics in study of current smart grid. Collaborative coverage of sensors can conduct comprehensive monitoring for microgrid equipment and network status. It can provide a number of effective data support for power flow calculation and fault analysis, which is closely related to the stability of power grid. But the transmission for a large amount of data will speed up the energy consumption of the sensor nodes and shorten the life cycle of sensor network. A sensor collaborative coverage algorithm for microgrid monitoring was proposed. In different time period, this algorithm executes the construction and schedules the connecting collaborative cover to realize the efficient utilization of energy in the sensor node and prolong the life cycle of sensor network. Simulation shows that the collaborative coverage algorithm could prolong the lifecycle of the sensor network significantly with high efficiency.

    • References | Supplementary Material | Related Articles
    • Access Points Location Planning Based on Immune Algorithm for Power Line Communication Network
    • LI Zhi-ling, LIU Zhu, GUO Shao-yong, SHAO Su-jie, QI Feng
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(s1): 104-108. DOI:10.13190/j.jbupt.2016.s.023
    • Abstract ( 220 )     HTML       
    • The access points are thought of data gateways of power line communication network for connecting client with control center. To safely and effectively operate power system, it is necessary to research the optimal location of access points. In the article, a planning method was proposed when considering economics, reliability, N-1-resilience and network delay. In order to solve the planning problem, an immune algorithm was proposed to solve optimal location problem of access points. Simulations show that proposed method can perform an access point deployment plan effectively under conditions of different networks, with high flexibility.

    • References | Supplementary Material | Related Articles