Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Review

    • Survey on Caching Techniques of Information Centric Networking
    • ZHANG Tian-kui, SHAN Si-yang, XU Xiao-geng, LIU Yin-long
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 1-15. DOI:10.13190/j.jbupt.2016.03.001
    • Abstract ( 540 )     HTML       
    • A survey on caching techniques of the content centric networking (CCN) represented information centric networking (ICN) was given, which categorize the main research idea and methodology. Firstly, the operating principle of ICN caching as well as its key research topics was outlined and the advantage of the ICN using in the wireless networks was analyzed. The research on CCN represented ICN caching deployment scheme design and theory modeling analysis was summarized respectively. Finally, the developments and challenges of ICN caching techniques in the future research was given. The possible research aspects along with the key problems was found, which can provide a useful reference for further study of ICN caching.

    • References | Supplementary Material | Related Articles

    Papers

    • Sensitive Information Leakage Detection for Android Applications Based on Fine-Grained Taint Tracking Strategies
    • YANG Tian-chang, CUI Hao-liang, NIU Shao-zhang, SONG Wen
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 16-21. DOI:10.13190/j.jbupt.2016.03.002
    • Abstract ( 369 )     HTML       
    • In response to the sensitive information leakage problem of Android applications, a detection scheme based on fine-grained information flow tracking strategies and static taint tracking technology was proposed. According to the syntax and semantic of Smali code, the internal call graph of application, the Android communication mechanism, and the fine-grained taint track rules were constructed, the taint analysis was executed as well on the application according to the different leak manner and the propagation strategies. The sensitive information leakage was determined by the taint analysis result. Experiments show that the scheme can detect a variety of ways of sensitive data leakage effectively, improve the detection accuracy and flexibility, and reduce the uncomprehensive of information flow path and false positive rate in the process of detection.

    • References | Supplementary Material | Related Articles
    • On Particle Swarm Optimization for Multi-Frequency Channel Interference Alignment
    • ZOU Wei-xia, WANG Duo-wan, DU Guang-long
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 22-26. DOI:10.13190/j.jbupt.2016.03.003
    • Abstract ( 382 )     HTML       
    • For multi-frequency channel interference alignment(IA) system with single data stream transmitting for each user,the user solutions of capacities are important. However, there exist methods which can obtain optimal IA solution. Considering the complex multimodal characteristics of solution space of multi-frequency channel in LA system, a new gradient-exploited particle swarm optimization algorithm was proposed to search for the global optimal solution which directly takes the network sum rate as its objective function. The capability for searching the optimal solution is enhanced by projecting the velocity vector on the normal plane of the position vector; the convergence rate is speeded through learning along the gradient of the network sum rate function. Numerical simulation shows that, the proposed method will obtain a better network sum rate performance than that of the existing algorithms.

    • References | Supplementary Material | Related Articles
    • Improved Structure of Even-Arrangement Channelized Based on FRM
    • ZHANG Wen-xu, CHEN Ya-jing, CHEN Tao, DOU Zheng
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 27-33. DOI:10.13190/j.jbupt.2016.03.004
    • Abstract ( 372 )     HTML       
    • The frequency response masking (FRM) technology is widely used in digital channelized and related fields because of advantages of the filter design with narrow transition band. An improved structure of even arrangement channelized based on FRM was proposed according to the problem of high complexity brought by design of narrow transition band channelized. The prototype filter of the improved structure was designed by half-band filter, and also two masking filters are designed by the same low pass filter through modulation. The sub-band signals of each channel are synthesized as the output signal with upper and lower arms. The improved structure is derived from the condition of non-maximally decimated based on FRM, and the computational complexity of the structure is less than the conventional structure. The improved channelized structure has the extensive applicability without the limit of higher sampling rate due to the decimation module placed at the forefront of channelized. Simulations show that the improved structure is correct and can save 67.9% multipliers compared with polyphase structure under the conditions of 16-channels example.

    • References | Supplementary Material | Related Articles
    • Probabilistic Spreading Models for Improving Recommendation Diversity
    • CAI Guo-yong, ZHANG Dong, LIN Yu-ming, WEN Yi-min
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 34-38. DOI:10.13190/j.jbupt.2016.03.005
    • Abstract ( 386 )     HTML       
    • Bipartite-graph based probabilistic spreading (ProbS) algorithms often focus on optimizing the accuracy of recommendation lists while ignoring diversity, another key property to evaluate the quality of recommendation results. In order to deal with this problem, an improved probabilistic spreading (iProbS) algorithm is proposed in the present paper. The iProbS algorithm divides the recommendation process into three steps of resource spreading, and each resource spreading step constrained by spreading probability and spreading cost simultaneously. Users' scores rating on items are applied to compute spreading probability, at the same time, the degree of items, entropy of users, and the neighbors of items are considered for computing spreading costs. Extensive experiments on two widely used data sets (from MovieLens and Netflix) show that iProbS can effectively improve recommending accuracy, aggregate diversity, individual diversity, and sales balance of recommendation lists. Finally, computational complexities of iProbS are studied from its different computing steps.

    • References | Supplementary Material | Related Articles
    • A Method of Energy Optimization Based on Time Series for Cellular Network
    • GAO Ling, CHEN Yan, WANG Hai, REN Jie
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 39-43. DOI:10.13190/j.jbupt.2016.03.006
    • Abstract ( 379 )     HTML       
    • Aiming at the high energy consumption of mobile terminal under cellular networks, a new energy optimization algorithm balance optimization algorithm (BOA) based on time series is proposed to improve the energy efficiency of smartphones. The proposed algorithm builds the auto-regressive and moving average model for the data blocks in the cellular network, and dynamically adjusts the tail time to achieve the purpose of reducing the energy consumption by predicting the arrival time of the next block. Experiments show that BOA can achieve the average model matching rate up to 93.86%. Compared to traditional fixed-tail algorithm, the BOA enables reduce energy consumption by 42.25%,and analysis shows that the longer smartphones are used, the higher energy efficiency can be achieved.

    • References | Supplementary Material | Related Articles
    • A Cache Replacement Policy Adapting to the Request Access Pattern
    • HUANG Zhi-bin, ZHOU Feng, MA Hua-dong
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 44-48,53. DOI:10.13190/j.jbupt.2016.03.007
    • Abstract ( 431 )     HTML       
    • Many proposals about the optimization of cache management policies depend on set dueling, and they choose policies according to the results of miss rates. However, they are facing challenges in multicore since they have lower accuracy and higher storage overhead. The main reason is that they only consider the results of cache replacement policies rather than the characteristic of cache access sequences (or access pattern). Therefore, an online access pattern identification method, complex stack distance weighting method was proposed, and an adaptive cache replacement policy, least recently used-C (LRU-C), was put forward. Its basic idea is to adjust the insertion position according to the result of the online access pattern identification. Experiment in the full-system Simics running 18 benchmarks from SPEC CPU2000/2006 shows that the performance of LRU-C is better than those of dynamic insertion policy,re-reference interval prediction,thread aware dynamic insertion policy and promotion/insertion pseudo-partitioning.

    • References | Supplementary Material | Related Articles
    • News Image Caption Line Segmentation Algorithm Based on Template Matching
    • WANG Zhi-heng, GUO Chao, LIU Hong-min
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 49-53. DOI:10.13190/j.jbupt.2016.03.008
    • Abstract ( 298 )     HTML       
    • The research on the character segmentation of the horizontal caption line in news images was made in this article. In order to overcome the character splitting problem caused by existing single character based segmentation methods, a response function was proposed based on character distribution. The character segmentation problem is converted into an optimal problem, and the character segmentation can be attained by turning to the optimal result. The algorithm mainly contains two parts:First, the rough width of a single character is determined based on the vertical projection histogram, which is utilized to construct a variable length template; Then, the template response function is constructed and the left/right boundary position of a single character is determined by the optimal value of the response function of different length templates; Last, output the segmentation results. Experimental results show that the proposed method can obtain satisfactory results for adhesion/non-adhesion character images.

    • References | Supplementary Material | Related Articles
    • Multi-Directional Searching Based Consistent Flow Updating Scheme in Software Defined Networking
    • LIU Jiang, HU Xiao-lu, HUANG Tao, LIU Yun-jie
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 54-59. DOI:10.13190/j.jbupt.2016.03.009
    • Abstract ( 345 )     HTML       
    • The flow table updating with loop-free consistence is one of the most important issues in software defined networking (SDN), in which, the optimal scheme has high computing complexity, while the single/double directional updating schemes have low computing complexity, however, the length of dependency chain is difficult to be optimized. The article presents a consistent flow update scheme based on multi-directional searching. The scheme was proved loop-free consistent. Simulation shows that the scheme shortens the length of dependency chain, closes to the optimal scheme and effectively reduces the working load on controller.

    • References | Supplementary Material | Related Articles
    • Constant-Time Lightweight RFID Mutual Authentication Protocol
    • ZHOU Jing-xian, ZHOU Ya-jian, GU Zhao-jun
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 60-63,90. DOI:10.13190/j.jbupt.2016.03.010
    • Abstract ( 313 )     HTML       
    • A mutual authentication protocol was proposed for large-scale radio frequency identification (RFID) system. Taking advantage of pseudo random number generator with little calculation resource requirement, the proposed protocol is suitable for low-cost tag environment with small storage space and low compute power. The slope calculation method of a line was adopted to realize both sides of authentication share a pair of keys and time complexity required to identify a tag can be reduced to O(1). The timestamp was introduced to resist replay attacks, and updates the identity to prevent location tracking. Formal proof shows that it realizes mutual authentication between the reader and the tag. Simulation shows that the proposed protocol can save 9% authentication time compared with some similar existing mainstream protocols.

    • References | Supplementary Material | Related Articles
    • Joint Power Control and Channel Assignment in Wireless Mesh Network
    • SHI Wen-xiao, WANG En-dong, WANG Ji-hong, OUYANG Min
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 64-69. DOI:10.13190/j.jbupt.2016.03.011
    • Abstract ( 311 )     HTML       
    • To solve the problem that the load which is carried by gateway node and that the network links in wireless Mesh network is imbalanced, a resource allocation model was constructed to optimize network weighted throughput by selecting the best gateway node and designing the weight on each link. A joint power control and channel assignment algorithm (QDJPCA) was proposed based on Q learning and differential evolution under the resource allocation model. In this algorithm, the channel assignment is achieved by obtaining the feedback results of power control, using the multiple mutations and adaptive crossover rate based differential evolution algorithm. In each iteration, to achieve power control, the Q learning algorithm based on state clustering and state correction is utilized on the channel assignment result. NS-3 simulation shows that the QDJPCA can not only effectively solve the proposed resource allocation model, but also improve the overall network performance through preferentially ensuring the gateway load balancing and throughput performance of heavy load link.

    • References | Supplementary Material | Related Articles
    • Fuzzy Tri-Clustering Based on Information Bottleneck
    • LIU Yong-li, WAN Xing
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 70-74. DOI:10.13190/j.jbupt.2016.03.012
    • Abstract ( 455 )     HTML       
    • In order to group three-dimensional data, the thought of fuzzy co-clustering was adopted, and an information bottleneck based fuzzy tri-clustering algorithm, named IBFTC, was presented. The IBFTC specifies membership function for each dimension, simultaneously generates fuzzy clusters on three dimensions and adds information bottleneck theory into objective function for measuring distances between objects and clusters. Experiments on the MovieLens dataset evaluate the performances of IBFTC from several aspects. Experiment shows that IBFTC could achieve higher accuracy than conventional fuzzy co-clustering algorithms.

    • References | Supplementary Material | Related Articles
    • An Algorithm of Randomly Intensive Dissemination of Video Fragments in Opportunistic Network
    • WANG Xiao-ming, ZHU Teng-jiao, LI Peng, ZHANG Li-chen, ZHANG Dan
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 75-79. DOI:10.13190/j.jbupt.2016.03.013
    • Abstract ( 422 )     HTML       
    • An algorithm of randomly intensive dissemination of video fragments in opportunistic network was proposed to satisfy the requirement of more number of video segments distributed randomly in time axis and sequenced in content so that users can acquire effective information of the original video. The proposed algorithm can guide transportation of video blocks while delivery delay is reduced sharply. Simulations show that random-sequential content spreading (RSCS) significantly outperforms these approaches in terms of random-sequential index. Moreover, RSCS also achieves better performance levels in ratio of delivery and latency than sequential solution.

    • References | Supplementary Material | Related Articles
    • A Distributed Training Method for Sparse Kernel Machine over WSN
    • JI Xin-rong, HOU Cui-qin, HOU Yi-bin
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 80-84. DOI:10.13190/j.jbupt.2016.03.014
    • Abstract ( 384 )     HTML       
    • In wireless sensor network (WSN), the centralized learning method by transmitting all training samples scattered across different sensor nodes to a centralized data center to train classifier will significantly increase the communication cost. To decrease the communication cost in transmitting training samples, a distributed learning method for kernel minimum squared error (KMSE) by incorporating L1 regularized term was studied, which just relies on in-network processing between single-hop neighboring nodes. Each node obtains its local optimum sparse model by constructing the optimization problem of L1 regularized KMSE based on its local training samples and solving it using parallel projections and alternating the direction method of multipliers, then a consistent model is achieved on all nodes by using the global average consensus algorithm. For carrying out this method,a new distributed training algorithm for L1-regularized kernel minimum squared error based on parallel projections (L1-DKMSE-PP) was proposed. Simulations show that L1-DKMSE-PP can obtain almost the same prediction accuracy as that of the centralized counterpart and a sparser model, and more importantly, it can significantly reduce the communication cost.

    • References | Supplementary Material | Related Articles
    • The Hardware Implementation of Adaptive Non-Linear Sampling Algorithm
    • LI Yang, WU Hao, LIU Bin
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 85-90. DOI:10.13190/j.jbupt.2016.03.015
    • Abstract ( 319 )     HTML       
    • In flow-based passive measurement of the Internet, the measurement of flow size and flow volume is a basic requirement. To resolve the contradiction of increasing network link speed and small-sized fast memory chipset, a non-linear sampling algorithm which is named discrete counting (DISCO), was proposed in related research work. In order to meet the need of wire-speed network traffic measurement, DISCO is suggested to be implemented by hardware approaches, such as field-programmable gate array (FPGA). However, DISCO involves complex calculations with high precision, which give rise to a series of challenges in hardware acceleration. To solve the problems, a hardware-friendly refined algorithm was designed, which employs multiple lookup tables and a normalization method. Simulation was conducted to verify the validity of the refined algorithm. An FPGA-based prototype was made. Experiments show that the refined algorithm can achieve wire-speed flow measurement of a 40 Gbit/s link, with small hardware logic resources consumption of FPGA. The average relative error and maximum relative error of the refined DISCO algorithm are close to the original one.

    • References | Supplementary Material | Related Articles

    Reports

    • Relay Node Placement Algorithm under the Condition of Multi Greedy Criterion
    • WANG Zhu, HU Pin, DONG Meng-meng, TONG Xiao-jun
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 91-94,104. DOI:10.13190/j.jbupt.2016.03.016
    • Abstract ( 235 )     HTML       
    • In order to solve the problem of high cost of network construction and low lifetime of network, it is a problem to solve the problem of high cost of network construction and low network lifetime of relay nodes in wireless sensor network,this article proposed a new relay node placement algorithm based on the greedy criterion. By adopting the performance evaluation criteria of the balanced energy consumption rate and the total energy consumption of the network, the algorithm contrasts the recent greedy criterion, the directional greedy criterion and the minimum angle of greedy criterion respectively, and then constrains and optimizes the data transmission path of node by introducing data flow restriction, communication capacity and maximum data transfer times. Experiments show that, the recent greedy criterion has less energy consumption, and can balance the energy consumption of each node in the network. Moreover, this recent greedy criterion can not only give proper location of each node, but also reduce the energy consumption of the whole network effectively.

    • References | Supplementary Material | Related Articles
    • A C-Language Oriented Fault Injection Platform
    • QIAN Gen-nan, GONG Yun-zhan, WANG Ya-wen, XING Ying
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 95-99. DOI:10.13190/j.jbupt.2016.03.017
    • Abstract ( 350 )     HTML       
    • To improve the accuracy and efficiency of existing fault injection tools, a C-language oriented fault injection and execution platform was presented. The platform is constructed by fault injection, fault model, batch execution and results analysis modules. Experiments show that comparing with other fault injection tool when used the open source projects, the platform can support more practical engineering functions.

    • References | Supplementary Material | Related Articles
    • Packet Reordering-Controlled Load Distribution Model for Real-Time Multipath Transport
    • ZHANG Wei, LEI Wei-min, LI Guang-ye, GUAN Yun-chong, LI Hao
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 100-104. DOI:10.13190/j.jbupt.2016.03.018
    • Abstract ( 242 )     HTML       
    • A packet reordering-controlled load distribution model for real-time multipath transport was proposed. According to the feedback information of path transmission quality of all paths and packet out-of-ordering between paths from the destination, the source updated dynamically the load share of paths. Packet out-of-ordering risk was minimized while the load balancing proportional to the path transmission quality was satisfied. Simulations show that the proposed model can effectively reduce the total packet loss rate of the destination caused by packet out-of-ordering.

    • References | Supplementary Material | Related Articles
    • Information System Risk Control Method Based on Work-Flow
    • YANG Hong-yu, CHENG Xiang
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 105-109. DOI:10.13190/j.jbupt.2016.03.019
    • Abstract ( 203 )     HTML       
    • In order to effectively control the security risks of the business process in the information system, a risk control method based on work-flow (WRCM) was proposed. It includes two operations, the risk quantification and the risk control. In the risk quantification operation, the risk quantification parameters are defined and initialized. In the risk control operation, the minimum residual risk damage was used as object function to get a minimum risk damage deployment scheme based on linear programming method through the control effect maximization operation. Then, the minimum control cost was used as object function to get the minimum control cost deployment scheme through the control cost minimization operation. Experiments show that the WRCM has preferable risk control effect and lower control cost.

    • References | Supplementary Material | Related Articles
    • Routes Planning Algorithm for Mobile Data Collecting in Wireless Sensor Networks
    • ZHU Jing-hua, YIN Xu-ming, WANG Nan, LI Jin-bao, WU Zhi-qiang
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 110-113. DOI:10.13190/j.jbupt.2016.03.020
    • Abstract ( 375 )     HTML       
    • The energy efficient and real-time data collecting problem in wireless sensor network was studied. The mobile data collecting protocol consists four phases:nodes clustering, routes planning, routes combine and data collecting is proposed. Two heuristic algorithms save and nearest neighbor were presented to build data collecting routes which incur the least mobile cost while satisfy the deadline constraint. Simulations show that the proposed heuristic routes planning algorithms have good performance in terms of energy saving, deadline guarantee and travel cost reduction.

    • References | Supplementary Material | Related Articles
    • A Data Clustering Algorithm over Real Time High-Volume Data Streams
    • ZHAO Jin-dong, YU Yan-wei, LIU Jing-lei
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 114-119. DOI:10.13190/j.jbupt.2016.03.021
    • Abstract ( 280 )     HTML       
    • The energy efficient and real-time data collecting problem in wireless sensor network was studied. The mobile data collecting protocol consists four phases:nodes clustering, routes planning, routes combine and data collecting is proposed. Two heuristic algorithms save and nearest neighbor were presented to build data collecting routes which incur the least mobile cost while satisfy the deadline constraint. Simulations show that the proposed heuristic routes planning algorithms have good performance in terms of energy saving, deadline guarantee and travel cost reduction.

    • References | Supplementary Material | Related Articles
    • Multi-Objective Joint Optimization Based Mobile Relay Selection Scheme
    • ZHAO Ji-hong, ZHANG Yan-ping, QU Hua, XU Xi-guang
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 120-125. DOI:10.13190/j.jbupt.2016.03.022
    • Abstract ( 309 )     HTML       
    • The mobile relay selection problems in multi-hop cellular network are studied. The selection of mobile relay affects such performances as the throughput of the system, spectral efficiency and relay switching probability. In order to improve the throughput and reduce the relay switching probability, the mobile state of the users and the relay nodes in the dynamic scenario was analyzed, then a multi-objective joint optimization based mobile relay selection scheme was proposed. The scheme analyzes two factors which affect the system throughput and the relay switching probability in dynamic scenario. The mobile characteristic of multi-hop cellular network and the state of users' call arrival are taken into full consideration. Simulation shows that the algorithm can improve the users' throughput effectively and reduce the relay switching probability.

    • References | Supplementary Material | Related Articles
    • Vehicle Sensor Self-Powered Technology Research of Electromagnetic and Piezoelectric Hybrid Mode
    • SANG Ying-jun, FAN Yuan-yuan, WU Shang-guang, LI Man, WANG Ye-qin
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 132-135,142. DOI:10.13190/j.jbupt.2016.03.024
    • Abstract ( 362 )     HTML       
    • The piezoelectric and electromagnetic energy harvesting technology for vehicle sensors self-powered was studied. The mathematical models for the composite energy collection system was put forword, and the relationship about the resonance frequency of the system was analyzed with regard to the system configuration parameters. A piezoelectric and electromagnetic energy harvesting device was designed. Experiment shows it has good agreement with the analytical results in trend. The maximum of load power of the composite harvester achieves 3.75 mW at the resonant frequency of 18 Hz with acceleration of 0.5 g, and is increased by 17% compared with 3.2 mW of the single electromagnetic technique.

    • References | Supplementary Material | Related Articles
    • The General Theory of Security (10)——Winning Number's Limitations for the Attacking and Defensing
    • YANG Yi-xian, NIU Xin-xin
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(3): 136-142. DOI:10.13190/j.jbupt.2016.03.025
    • Abstract ( 277 )     HTML       
    • In actual network confrontations, attack and defense is, in fact, combined in one body, i.e., each person is not only the attacking side (hackers), but also the defending side(the Honker). In addition to the most common "1 to 1" and "one to many" attack-and-defense, there are also the 2-group cases, i.e., the persons are divided into two groups (for example, the historical NATO and the Warsaw Pact) such that one group attacks and defenses the other group. Of course, the more general cases are the "all parties attack-and-defense", i.e., all persons attack and defense each other. In this paper, the reachable limitations of all "dictatorship evaluate" events are listed for all of these possible confrontations, under the assumption of "any person not deceive ourselves".

    • References | Supplementary Material | Related Articles