Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • Video Super-Resolution Algorithm Based on Spatial-Temporal Feature and Neural Network
    • LI Ling-hui, DU Jun-ping, LIANG Mei-yu, REN Nan, JangMyung Lee
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 1-6. DOI:10.13190/j.jbupt.2016.04.001
    • Abstract ( 261 )     HTML       
    • A video super-resolution algorithm based on spatial-temporal feature and neural network(STCNN) was proposed to improve the video visual resolution quality and details clarity. This algorithm comprehensively utilizes the correlation mapping relationship among external correlative blocks and the non-local similarity existed in the spatial-temporal neighboring internal blocks, thereafter, reconstructs the video details efficiently with the fitting parameters learned by deep convolutional neural network. Spatial-temporal feature similarities are introduced to optimize the reconstruction results, and to resolve the miss-match problem and improve the super-resolution performance by making full use of the complementary and redundant relationship between low-resolution video frames. Experiments demonstrate that the proposed algorithm outperforms existing algorithms in terms of both subjective visual effects and objective evaluation index.
    • References | Supplementary Material | Related Articles
    • A Mechanism of Router Nodes Movement for WM2N
    • ZHANG Zi, HUANG Ting-lei
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 7-12. DOI:10.13190/j.jbupt.2016.04.002
    • Abstract ( 179 )     HTML       
    • In response to the problem of how to guide the router nodes to move, a novel router node decision-making mechanism was proposed. This mechanism includes the classification of mobile router nodes, the state transition of router nodes, the movement decision of router nodes, and the topology optimization. The simulation results show that the wireless mobile Mesh network using this mechanism can prevent the network partitioning and provide higher forwarding throughput for the mobile client nodes.
    • References | Supplementary Material | Related Articles
    • The Handoff Study of Imperfect Sensing in Cognitive Radio Network
    • MA Bin, BAO Xiao-min, XIE Xian-zhong
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 13-18. DOI:10.13190/j.jbupt.2016.04.003
    • Abstract ( 237 )     HTML       
    • To guarantee the quality of service of licensed users, the unlicensed users must vacate the occupied channel by spectrum handoff if the licensed users appear in the cognitive radio. However, the spectrum sensing with false alarm and missed detection may lead to more inaccuracy problems when the unlicensed users perform spectrum handoff. To solve the problems mentioned here, the authors utilize the preemption resume priority(PRP) M/G/1 queuing network model to propose a spectrum handoff algorithm with error data retransmission mechanism and analyze its performance by transmission latency and extended data delivery time. In addition, the authors discussed the relationship between false alarm probability, extended data delivery time and user traffic load, and verified the effectiveness of the proposed algorithm.
    • References | Supplementary Material | Related Articles
    • A Flat Data Center Architecture Based on Optical Switches with Fast Flow Control
    • YAN Fu-long, XIONG Qing-xu, ZHANG Yuan, XIAO Han
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 19-23. DOI:10.13190/j.jbupt.2016.04.004
    • Abstract ( 236 )     HTML       
    • The performance of a new flat data center network(DCN) architecture top of rack(ToR) connected flatten(TCF) was investigated based on distributed buffer-less optical switches and fast flow control. Scalability of DCN is assessed by numerical simulation with objective modular network testbed in C++(OMNeT++) discrete event simulator, while the average latency, packet loss and throughput of the system are obtained under different traffic patterns, different traffic distributions and various buffer sizes. It demonstrates that TCF based on distributed buffer-less optical switches not only has good latency characteristic and system throughput, but also has fine scalability and cost efficiency.
    • References | Supplementary Material | Related Articles
    • MFWT: a Hybrid Model for Academic Paper Recommender
    • LU Mei-lian, ZHANG Zheng-lin, LIU Zhi-chao
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 24-29. DOI:10.13190/j.jbupt.2016.04.005
    • Abstract ( 238 )     HTML       
    • The inherent data sparsity and cold start problems in probabilistic matrix factorization(PMF) limit the effect of academic paper recommender. To remedy the shortcomings and enhance the recommender effect, a new hybrid recommender model named as matrix factorization with topic(MFWT) was proposed. The model constructs topic characteristics of both users and papers using the author-conference-topic over time(ACTOT) model and the traditional latent dirichlet allocation topic model respectively, enhancing the corresponding user and paper latent factor characteristic vectors of PMF model. Experiments show that the model well overcomes the data sparsity problem and the cold start problem of PMF and increases the effect of academic paper recommender.
    • References | Supplementary Material | Related Articles
    • Controller Deployment Scheme Based on Multi-Factor Node Ranking in SDN
    • ZHANG Yan, HUANG Tao, LU Bo, LIU Yun-jie, ZHANG Zhong-ping
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 30-34. DOI:10.13190/j.jbupt.2016.04.006
    • Abstract ( 234 )     HTML       
    • Current research on controller deployment in software-defined network(SDN) mainly focuses on latency optimal of the controlling messages routing. The betweenness centrality was introduced as a factor to the controller deployment problem and the importance of betweenness centrality in controller deployment location was analyzed. Then a multi-factor node ranking scheme(MFRS) was proposed, the betweenness and the reliability are chosen for the node ranking factors. The nodes are layered and the controlling weight of each node was calculated according to the connecting relations of the nodes in different layers. The location of the controller was determined finally. Simulation shows that the hops of the controlling messages routing under MFRS is less than under the latency aware shortest path scheme, and the reliability of MFRS is higher than it of the latency aware shortest path scheme.
    • References | Supplementary Material | Related Articles
    • Adaptive Model of Information Hiding for the Same Type
    • ZHANG Shuai, WANG Peng, SUN Yan
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 35-39. DOI:10.13190/j.jbupt.2016.04.007
    • Abstract ( 214 )     HTML       
    • There are different types of data in big data platform, in order to ensure the secure transmission of data files, an adaptive model of information hiding based on the traditional information hiding model was proposed. By increasing the hiding algorithm library and carrier file library, the appropriate hiding algorithm and the carrier file can be chosen automatically according to the level and the tag of data files. In the model, the double scrambling of the data file with generating chaotic sequence was implemented, the large capacity hiding algorithms for different types of files was realized, and the image hiding algorithm based on the least significant bit was improved. Finally, the evaluation contrast for the different hiding algorithm was described. Experiment shows that the model can perform correctly and safely.
    • References | Supplementary Material | Related Articles
    • Distributed Mobility Management in Content-Centric Networking
    • REN Fei, QIN Ya-juan, ZHOU Hua-chun, XU Ya-kun
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 40-44,97. DOI:10.13190/j.jbupt.2016.04.008
    • Abstract ( 196 )     HTML       
    • To resolve the problem of content source mobility and decrease the mobility overhead in content-centric networking(CCN), this paper proposes a distributed mobility management in CCN(D-CCN), which includes two schemes such as partially D-CCN and fully D-CCN. This distributed mobility management can avoid the redundancy of messages exchanged, which incurred from the centralized mobility management. In terms of performance analysis, the D-CCN can decrease the handoff overhead and improve the network performance compared with the existing schemes.
    • References | Supplementary Material | Related Articles
    • PDM-PAM4 Short Reach Optical Communication in IM-DD System
    • HUO Jia-hao, ZHOU Xian, HUANG Fu-wei, TU Jia-jing, YAN Kai-li
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 45-49. DOI:10.13190/j.jbupt.2016.04.009
    • Abstract ( 523 )     HTML       
    • In order to satisfy the demand of short reach optical communication system with low cost for higher rate, an optical fiber transmission system was proposed based on intensity modulation and direct detection(IM/DD) polarization division multiplexing 4 order pulse amplitude modulation(PDM-PAM4). The system's structure is simple. By utilizing the effective digital signal processing(DSP) algorithm, including the station of polarization(SOP) estimation, mixed polarization beat interference(MPBI) elimination and adaptive multiple-input multiple-output(MIMO) filter based on least mean square(LMS) algorithm, its stablity and reliablity can be realized. Finally in the Matlab and VPI software joint simulation platform, a 224 Gbit/s PDM-PAM4 system was simulated and analyzed in detail.
    • References | Supplementary Material | Related Articles
    • A Method of Short-Period Storage Based on DDR2 SDRAM
    • TANG Ping, GAO Fei, ZHANG Li, JIANG Zhi-ke
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 50-55. DOI:10.13190/j.jbupt.2016.04.010
    • Abstract ( 184 )     HTML       
    • To meet the storage requirements of mass data in a high-speed and real-time system, a short-period storage method based on double data rate 2 synchronous dynamic random access memory(DDR2 SDRAM) was proposed. First, the basic principles of reading and writing operation of DDR2 SDRAM controller are summarized. Then, in order to solve the practical problem of reading and writing data in different orders continuously and alternately, a short-period storage method was designed, which can be divided into two modes of single burst and multiple burst according to the different data access modes. In the multiple burst mode of short-period storage method, the storage structure of fewer rows and more columns can further improve the speed of reading and writing data. At last, the performance analysis and function simulation of the short-period storage method based on DDR2 SDRAM is carried out. It is shown that the short-period storage method in the mode of multiple burst can achieve the storage requirement with a small amount of internal storage resource of field-programmable gate array(FPGA) and high speed of reading and writing data.
    • References | Supplementary Material | Related Articles
    • Improved Light Field Descriptor Using Depth Images for 3D Model Retrieval
    • LI Hai-sheng, DONG Shui-long, ZHAO Tian-yu, CAI Qiang, DU Jun-ping
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 56-59. DOI:10.13190/j.jbupt.2016.04.011
    • Abstract ( 198 )     HTML       
    • Due to the problem of light field descriptor lacking spatial information of 3D model, and the problem of little projection of PANORAMA descriptor, a 3D model retrieval algorithm combining depth image was proposed. The depth images are used to improve light field descriptor. Discrete wavelet transform features and Zernike moments are extracted from projection views. Then the depth images are clustered to remove redundancy. The random walk algorithm is employed to determine the weight of each cluster. Finally, the retrieval method of PANORAMA is optimized to calculate similarity distance between two 3D models. Results on princeton shape benchmark show that the proposed algorithm can make good use of spatial information of 3D model and improve the accuracy of retrieval.
    • References | Supplementary Material | Related Articles
    • Locally Repairable Codes Based on MSR Codes in Cloud Storage System
    • WANG Jing, LIANG Wei, LIU Xiang-yang, YANG Yang
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 60-66. DOI:10.13190/j.jbupt.2016.04.012
    • Abstract ( 409 )     HTML       
    • In order to improve the reliability of distributed cloud storage system and the efficiency for repairing the failed nodes, a scheme of locally repairable coding based on minimum storage regenerating(MSR) codes was proposed. Specifically, the systematic MSR codes suitable for cloud storage and the locally repairable codes with MSR codes as local codes were constructed respectively to ensure the maximum distance separable(MDS) property and simple repairing characteristics. Performance analysis and simulation show that the locally repairable coding scheme can realize fast repairing of multiple failed nodes in distributed cloud storage system, and has lower repair locality. Compared with three-copy mode and simple regenerating codes, the locally repairable coding scheme has good performances in storage overhead and repair bandwidth overhead.
    • References | Supplementary Material | Related Articles
    • Application of Wavelet Decomposition in Mobile User Behavior Recognition
    • HE Yan, WANG Bin, WANG Zhong-min
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 67-70. DOI:10.13190/j.jbupt.2016.04.013
    • Abstract ( 249 )     HTML       
    • For case of low recognition accuracy when using universal model to distiguish confusing human behaviors such as walking, going upstairs and downstairs, a mobile user behavior recognition method based on wavelet decomposition was proposed. It extracts the wavelet energy distribution, the number of wavelet peak and the everage wavelet peak amplitude from the sub-signals generated by wavelet decomposition, and also the decision tree classifier is used to build the user-independent behavior recognition model. The typical time-domain feature dataset and wavelet feature dataset were respectively used to train and test the universal model. Experiments show that the proposed method improves the average accuracy about 14.82% of the three confusing behaviors, and reduces the possibility of misjudgment.
    • References | Supplementary Material | Related Articles
    • Rheological and Tribological Properties of Lithium Grease Containing Nano Silica
    • LIU Jian-ping, XU Bing-bing, XU Zhi-fang
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 71-76. DOI:10.13190/j.jbupt.2016.04.014
    • Abstract ( 354 )     HTML       
    • In the article, Lithium greases with different particle sizes and mass concentrations of SiO2 nanoparticles was fabricated via SG65 three-roll grinder. The tribological properties and rheological properties of different particle sizes and mass concentrations SiO2 nanoparticales as additives in lithium base greases was investigated via MRS-1J four-ball friction tester and Anton Paar MCR301 rheometer. It is shown that the friction coefficient of grease is lowest and anti-wear performance is best when SiO2 nanoparticles size is 30 nm and the mass concentration is 4%. Under low and moderate shear rate, the rheological experimental data was fitted and a new grease rheological model was proposed, containing nanoparticals mass concentrations parameter. SiO2 nanoparticles as additives can improve the thixotropic properties of lithium grease, enhance the anti-shear ability and thermostability of greases.
    • References | Supplementary Material | Related Articles

    Reports

    • Perceptual Hashing Algorithm for Multi-Format Audio
    • ZHANG Qiu-yu, XING Peng-fei, HUANG Yi-bo, DONG Rui-hong, YANG Zhong-ping
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 77-82. DOI:10.13190/j.jbupt.2016.04.015
    • Abstract ( 230 )     HTML       
    • A novel multi-format audio perceptual hashing algorithm based on dual tree complex wavelet transform(DT-CWT) was proposed. It solves the problems of the existing audio authentication algorithms, including that audio files are kept in a single format, and algorithms are not generic and low efficiency. The proposed algorithm first applies the global DT-CWT to the audio signal after pre-processing conducts to obtain the real and complex wavelet coefficients. Next, the coefficients are partitioned in some frames respectively, and the frame numbers are same. For the real wavelet coefficients, the module values of teager energy operator in every frame are computed to serve as its inter-frame feature. And then short-time energy of the new signal, which is generated to frame the frame signal, is computed to serve as its intra-frame feature. For the complex wavelet coefficients, entropy values are obtained in every frame to serve as its inter-frame feature. Finally, the above features are to conduct a hashing structure process to produce the perceptual hashing sequence. Experiments show that the proposed algorithm has good robustness and discrimination for audio signals with five different formats, with high efficiency and ability to implement tamper detection as well.
    • References | Supplementary Material | Related Articles
    • Low-Complexity Detection Based on Classical Iterative Method for LS-MIMO Systems
    • QU Hua, LIANG Jing, ZHAO Ji-hong, WANG Wei-hua
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 83-86. DOI:10.13190/j.jbupt.2016.04.016
    • Abstract ( 300 )     HTML       
    • For the high computational complexity problem of minimum mean square error(MMSE)detection algorithm on large scale-multiple input multiple output(LS-MIMO)systems, low complexity signal detection algorithm based on the classic iteration method was proposed, including the Jacobi iteration method, Gauss-Seidel iterative method and successive over relaxation iteration method. The proposed algorithm starts from the approximation of an exact solution, obtaining efficient and accurate solution in fewer iterations, and the computational complexity decline an order of magnitudes compared to MMSE detection algorithm. Simulation results show that the iterative detection algorithm can achieve bit error rate performance of approximate MMSE detection algorithm by limit iterations.
    • References | Supplementary Material | Related Articles
    • Fast Data Collection of Wireless Sensor Networks by Aggregation Scheduling
    • PAN Cheng, ZHANG He-sheng
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 87-91. DOI:10.13190/j.jbupt.2016.04.017
    • Abstract ( 201 )     HTML       
    • Aggregation convergecast is an effective data collection pattern of wireless sensor networks. In order to collect sensor data fast, a shortest time aggregation convergecast scheduling problem was investigated. Following the structure of ideal optimal aggregation tree, a logarithmic aggregation tree construction algorithm was proposed for convergecast transmission link selection. For time slot allocation, a link effectiveness based algorithm was presented. In the algorithm, the effectiveness of a link was defined by the influence of the sender to its competitor nodes and time slot was preferentially allocated to those in-tree links with higher value of effectiveness, so as to increase the number of parallel transmission links. Experiments show that the proposed approach can reduce the data collection delay by more than 10% in most scenarios, which verifies the validity of the approach.
    • References | Supplementary Material | Related Articles
    • Grammatical Error Correction Based on Corpus
    • TAN Yong-mei, WANG Xiao-hui, YANG Yi-xiao
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 92-97. DOI:10.13190/j.jbupt.2016.04.018
    • Abstract ( 243 )     HTML       
    • Grammatical error correction(GEC) is the task of detecting and correcting grammatical errors in text written by non-native English writers. A limited back-off algorithm and corpus approach was proposed to handle the grammatical error problem in English text, useful and effective for GEC task. The GEC system yields F1 score of 31.96% on the publicly available CoNLL-2013 shared task data, outperforming the first one with 31.20%.
    • References | Supplementary Material | Related Articles
    • Multi-Level Detection of Vocal Effort Based on Vowel Template Matching
    • CHAO Hao, SONG Ceng, LIU Zhi-zhong
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 98-102. DOI:10.13190/j.jbupt.2016.04.019
    • Abstract ( 431 )     HTML       
    • A two-stage detection method was proposed for the identification of vocal effort modes in robust speech recognition. Firstly, whisper identification of speech signal is performed by using Gaussian mixture model(GMMs) which are trained by global spectrum features. Secondly, vowels are acquired based on landmark detection for the speech signal which does not belong to the whisper mode, and the vocal effort mode of the speech signal is determined by vowel template matching. Experiments conducted on 863-test show that, accompanied by a slight decline for whisper mode, the significant improvement of recognition accuracy for the remaining four vocal effort modes can be achieved.
    • References | Supplementary Material | Related Articles
    • A Debt-Based Barter Trade Incentive Mechanism in Opportunistic Networks
    • YAO Jian-sheng, MA Chun-guang, QUAN Qi
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 103-107. DOI:10.13190/j.jbupt.2016.04.020
    • Abstract ( 336 )     HTML       
    • In order to solve the problem that existing simple barter trade(SBT) incentive mechanisms in opportunistic networks degrade the network performance, a debt-based barter trade(DBT) incentive mechanism was proposed. The DBT changes the rigid equivalent barter trade principal in SBT by introducing debt relationship, which increases the number of forwarding data in a single trade and then improves the network performance. A trust-based punishment scheme and a debt-based caching strategy was designed to guarantee that debt relationship credibly run. Simulations show that DBT can obtain better network performance than SBT and effectively motivate nodes' cooperations.
    • References | Supplementary Material | Related Articles
    • Encoding and Decoding Scheme of Security-Enhanced LT Codes
    • LEI Wei-jia, SHENG Jie, XIE Xian-zhong
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 108-113. DOI:10.13190/j.jbupt.2016.04.021
    • Abstract ( 341 )     HTML       
    • There are a large number of LT encoded packets with degree one which are copies of source information packets. An illegal recipient can intercept the information with part of the encoded packets even if the way of encoding is unknown. For this,the way of encoding of LT was modified. The packets with degree one is replaced with a pair packet of degree two and three. As the conventional BP algorithm can not decode this kind of codes, a BP-based decoding algorithm(D2BP) in which an extra processing for degree two packets is included was presented, while a complexity reduced Gaussian elimination decoding algorithm(SGE) is given. Simulations show that D2BP and SGE algorithms can successfully decode LT codes so that the degree one packets is deleted, and SGE algorithm has significantly higher decoding efficiency than BP and D2BP algorithms. The channel erasure has no influence on the decoding performance of SGE. Compared with traditional Gauss elimination algorithm, the complexity of SGE algorithm is obviously decreased.
    • References | Supplementary Material | Related Articles
    • Improved Adaptive Convex Combination of Least Mean Square Algorithm
    • ZENG Le-ya, XU Hua, WANG Tian-rui
    • Journal of Beijing University of Posts and Telecommunications. 2016, 39(4): 114-117. DOI:10.13190/j.jbupt.2016.04.022
    • Abstract ( 412 )     HTML       
    • The convex combination of least mean square(CLMS) algorithm can overcome the contradiction between convergence rate, tracking performance and steady state error of traditional least mean square algorithm. However, in the normal adaptive CLMS algorithm, the rule for modifying mixing parameter is based on the steepest descent method. When the algorithm converges, it will generate zigzag phenomena, which can make the convergence speed become slowly. In order to solve this problem, a new rule based on the conjugate gradient method is proposed in this paper. At the same time, modified hyperbolic tangent function is used to reduce computational complexity. Meanwhile, instantaneous transfer scheme is used to further optimize the performance. Theoretical analysis and simulation results demonstrate that under different simulation environment, the proposed algorithm performs good property of mean square and tracking compared with the traditional CLMS and variable step-size CLMS algorithms.
    • References | Supplementary Material | Related Articles