Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • PAPERS

    • A Generalized Multi-Bin and M-ary Histogram-Based Image Watermarking Algorithm
    • YUE Zhen, LI Zi-chen, YANG Yi-xian
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 1-6. DOI:10.13190/j.jbupt.2020-107
    • Abstract ( 371 )     HTML( 278 )       
    • The existing histogram-based digital watermarking algorithms,on account of its strong capability to resist geometric attack and image processing attack,have been the focus and hotspot of data hiding domain. In order to further expand capacity and resolve the relationship issue of equal proportions,the author initially proposes a concept of multi-Bin and M-ary histogram digital watermarking algorithm by introducing a new multi-Bin adjustment strategy of image histogram,and designs a generalized multi-Bin and M-ary image digital watermarking algorithm. Experiments show that the proposed algorithm achieves at least 2 times embedding capacity than the existing related works,and can resist geometric attacks and image processing attacks to some extent on the basis of satisfying the image quality.
    • References | Supplementary Material | Related Articles
    • A SFC Deployment and Computation Resource Allocation Joint Algorithm in Mobile Networks
    • ZHANG Tian-kui, WANG Xiao-fei, YANG Li-wei, YANG Ding-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 7-13. DOI:10.13190/j.jbupt.2020-035
    • Abstract ( 655 )     HTML( 701 )       
    • In the mobile core networks, a service function chain (SFC) deployment and computation resource allocation joint algorithm for network function virtualization is proposed. Considering the impact of computation resource allocation of virtual network function(VNF) on processing delay in the SFC,a joint optimization problem of SFC deployment and computation resource allocation is established to minimize the weighted sum of deployment cost and end to end service delay of SFCs. To deal with the proposed problem,the multi-agent deep deterministic policy gradient algorithm is used to learn the strategy from the historical data of each VNF in the SFC to guide the immediate selection of general server nodes and computation resource allocation,based on which,a SFC deployment and computation resource allocation joint algorithm is proposed. Simulations show that the proposed algorithm can achieve an effective trade-off between deployment cost and end to end service delay while ensuring quality of service requirements of SFCs.
    • References | Supplementary Material | Related Articles
    • Achievable Rate of the SWIPT-Based Half-Duplex Relay QF Cooperative System
    • ZHANG Shun-wai, SHI Xiao-xiao
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 14-19. DOI:10.13190/j.jbupt.2020-043
    • Abstract ( 420 )     HTML( 270 )       
    • Aiming to solve the problem of energy limitation of relay node and improve the energy efficiency of the system for achieving reliable green communication,the half-duplex relay quantize-and-forward(QF) cooperative system is studied based on simultaneous wireless information and power transfer(SWIPT). Firstly,a SWIPT-based half-duplex relay QF cooperative system model is established. The source node and destination node are powered by external power. The relay node simultaneously implements information transmission and energy harvesting by SWIPT. Then,for the power-splitting protocol,the achievable rate expression of the SWIPT-based QF cooperation is derived. It is proved that the achievable rate is a convex function with respect to the power-splitting factor,and the optimal power-splitting factor is obtained to maximize achievable rate. Furthermore,for slow fading channels,the expected rate of SWIPT-based QF cooperation is further analyzed. Finally,the analysis and simulation shows that the achievable rate or expected rate of SWIPT-based QF cooperation is obviously superior to that of traditional amplify-and-forward and decode-and-forward cooperation,and SWIPT-based QF cooperation achieves similar performance to that of traditional QF cooperation in the absence of external power supply for the relay.
    • References | Supplementary Material | Related Articles
    • Energy Efficiency Optimization for Ultra Dense Heterogeneous Cellular Networks
    • PAN Zi-yu, YANG Jie
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 20-25,58. DOI:10.13190/j.jbupt.2020-052
    • Abstract ( 462 )     HTML( 454 )       
    • Based on Poisson point process(PPP) theory in stochastic geometry,the base station(BS) deployment problem in ultra-dense heterogeneous cellular networks,especially the influence of the distribution density of small cells on network energy efficiency is studied,and a method to maximize network energy efficiency(EE) through optimizing the density of small cells is proposed. Firstly,the coverage probability of each tier BS and the BS load oriented minimum achievable rate are derived through the PPP theory. Secondly,according to the definition of network EE and base station energy consumption model,the closed expression of network EE related to BS density is derived. Finally,the influence of the distribution density of the small cells on the network EE is analyzed,and an optimization algorithm of the small cell density based on Newton search method is proposed to maximize the network EE. Simulations verify the correctness of the theoretical analysis;and show that the network EE can be maximized through optimizing the deployment density of small cells.
    • References | Supplementary Material | Related Articles
    • RSS Missing Value Estimation with Generative Adversarial Networks Model
    • REN Xiao-qi, OWN Chung-ming
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 26-31. DOI:10.13190/j.jbupt.2019-210
    • Abstract ( 454 )     HTML( 406 )       
    • Wireless-fidelity(Wi-Fi)positioning is currently the mainstream method in indoor positioning,and the construction of fingerprint database is the key to Wi-Fi positioning system. However,the received signal strength(RSS)value in the fingerprint database will be changed with the variability of the indoor environment,and it is usually need to constantly re-measure the value in the fingerprint database,which leads to high cost and long time,especially in the dynamic environment with large positioning area. To address this problem,the adaptive context generative adversarial networks model is proposed. The model only needs to measure part of RSS fingerprints,and then learn the RSS fingerprints distribution to finally predict the missing fingerprint at a specific location. Simulation shows that the accuracy of indoor positioning is significantly improved,and the labor cost is greatly reduced.
    • References | Supplementary Material | Related Articles
    • Application of Constellation Shaping in Faster than Nyquist Transmission
    • KANG Wei-min, YANG Hong-wen
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 32-37. DOI:10.13190/j.jbupt.2020-054
    • Abstract ( 447 )     HTML( 340 )       
    • In order to approach higher requirements of coding and modulation for the sixth generation of mobile communications system,a faster than Nyquist(FTN)transmission scheme based on constellation shaping is proposed. Probabilistic shaping and geometric shaping in FTN transmission is investigated,and the average mutual information is analyzed theoretically. The simulations show that the proposed quadrature amplitude modulation(QAM) FTN transmission scheme based on probabilistic shaping has better average mutual information and error rate performance.
    • References | Supplementary Material | Related Articles
    • Power Allocation Scheme for Maximizing Energy Efficiency in Downlink NOMA Systems
    • TIAN Xin-ji, JIANG Qing-li
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 38-44. DOI:10.13190/j.jbupt.2020-031
    • Abstract ( 614 )     HTML( 493 )       
    • A power allocation scheme to maximize energy efficiency is proposed for downlink non-orthogonal multiple access(NOMA)system with multiple clusters and each cluster containing arbitrarily user. Firstly,the minimum powers required for a single user and a single cluster are derived to meet successive interference cancellation. The optimization problem of power allocation among users is established to maximize the energy efficiency of the system. Then,the power allocation optimization problem of maximizing the energy efficiency of a single cluster is solved by using bisection method. Based on this conclusion,the optimization problem of power allocation among users to maximize the energy efficiency of the system is transformed into the optimization problem of power allocation among clusters. Finally,the power for each user is obtained according to the inter-cluster power allocation,which is get by an iterative scheme. Simulations show that the energy efficiency of the proposed scheme is better than that of the existing scheme in the same scenario.
    • References | Supplementary Material | Related Articles
    • Time-Varying Channel Modeling and Simulation Based on 3GPP TR38.901 Channel Model
    • XING Bing-qian, WEI Zai-xue
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 45-51. DOI:10.13190/j.jbupt.2020-102
    • Abstract ( 2916 )     HTML( 1926 )       
    • In the actual communication environment,the user terminal and surrounding obstacles are often in a mobile state,so the communication environment is often modeled as a time-varying channel. In order to fully study the impact of user mobility on channel characteristics in the current the fifth generation of mobile communications system,a simulation is performed on the non-stationary time-varying channel model and the stationary time-varying channel model based on the 3GPP TR38.901 channel model. The simulations include the power delay spectrum,channel impulse response,channel time-frequency correlation transfer function,delay spread,angle spread and time autocorrelation curves of the two models. Two time-varying models proposed by TR 38.901 are fully studied and simulated,and a detailed comparative analysis is made.
    • References | Supplementary Material | Related Articles
    • Driving Fatigue State Detecting Method Based on Densely Connected Convolutional Network
    • WANG Xiao-yu, HAN Tong-tong, SHANG Xue-da
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 52-58. DOI:10.13190/j.jbupt.2019-263
    • Abstract ( 379 )     HTML( 332 )       
    • In order to solve the problem of traffic accidents caused by fatigue driving,a driving fatigue state detection method based on densely connected convolutional networks is proposed. Firstly,a camera is used to collect driving state video,the video frame image is obtained. The image processing technology is used to process images. Then the adaptive Boosting algorithm is used to detect the face,and then the gray integral projection and radial symmetry transformation algorithm are used to locate the driver's eye area. Moreover,the eye state is accurately distinguished through the densely connected network. Three densely connected blocks are set in the network to reduce feature parameters and speed up training. The sparse structure is used to reduce storage and enhance feature propagation. Finally,with the help of two fatigue parameters comprehensively judge the fatigue state of the driver,making the detection result more accurate. It is proved by a large number of qualitative and quantitative experiments that this method is better than the existing technology in terms of accuracy.
    • References | Supplementary Material | Related Articles
    • Unequal Error Protection Scheme Based on Joint Coding for Relay Systems
    • CHEN Chen, ZHOU Lin, CHEN Qi-wang, CHEN Yan, HE Yu-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 59-65. DOI:10.13190/j.jbupt.2020-099
    • Abstract ( 494 )     HTML( 449 )       
    • In the mobile communication system with diversified information transmission,if the sources with different statistical characteristics and different importance are transmitted without difference,the energy resources would be wasted. Therefore,based on the characteristics of the source,an unequal error protection scheme combining joint source channel coding in relay system is proposed. The proposed scheme adopts different transmission strategies according to the source statistical characteristics and the importance:the high frequency information with low entropy and less importance is compressed to improve the transmission efficiency,and the low frequency information with more importance is coded once more in relay to provide more protection. At the receiver,a joint decoding method including multiple module iterations is designed to improve system performance by making full use of the different representation of the source information under different transmission strategies. Analysis and simulation show that compared with the traditional schemes,the proposed scheme has more than 1 dB performance gain under the same peak signal-to-ratio.
    • References | Supplementary Material | Related Articles
    • Edge Detection of Infrared Image Based on Morphology
    • WANG Rui-nan, WU Mu-qing, CHEN Tie-ying, LI Zhi-gang, SUN Jian
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 66-71. DOI:10.13190/j.jbupt.2020-109
    • Abstract ( 592 )     HTML( 458 )       
    • To improve the performance of infrared image edge detection,an edge detection algorithm based on morphology is proposed. This method improves the edge detection algorithm that only uses a single direction and fixed direction weights. It uses multi-directional structural elements to extract the edges of the image,and uses the direction adaptive weighted fusion method to obtain final results. Simulations show that the method can effectively suppress the noise in the image and make the extracted image edge more complete which improve the effect of infrared image edge detection.
    • References | Supplementary Material | Related Articles
    • Collaborative Computation Offloading Exploring Task Dependencies in Small Cell Networks
    • KANG Man-cong, LI Xi, JI Hong, ZHANG He-li
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 72-78. DOI:10.13190/j.jbupt.2020-115
    • Abstract ( 601 )     HTML( 395 )       
    • In dense small cell networks, a task-dependency-based collaborative offloading scheme is proposed to cope with the limited computational resources in small cell base station (SBS), which can further reduce the total execution delay. Firstly, the parallel tasks are offloaded to different SBSs to reduce computing delay,while sequential tasks are offloaded to the same SBSs to reduce the number of required SBS. Then,based on whether different SBSs have the same load pressure or not,the optimal offloading strategies are proposed in two different scenarios by introducing the longest path theory and the graph coloring theory,respectively. The strategies jointly considerate the user energy constraint,dependencies among tasks,the amount of available computational resources and channel conditions of different SBSs. Simulation shows that the proposed strategies can reduce total execution delay compared with existing strategies in both scenarios.
    • References | Supplementary Material | Related Articles
    • An Evaluation Method for Cloud Service Usability Based on Analytic Hierarchy Process
    • ZHOU Ping, WANG Ze-sheng, YIN Bo, GUO Shao-yong
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 79-85. DOI:10.13190/j.jbupt.2019-101
    • Abstract ( 487 )     HTML( 283 )       
    • To solve the problem of multi-criteria decision making for usability evaluation of cloud service,an evaluation method for cloud service usability based on analytic hierarchy process(AHP) is proposed. Firstly,research achievements related to cloud service usability of international organizations for standardization and scholars at home and abroad are sorted and analyzed. Then,measurements of characteristics and subcharacteristics are proposed considering the definitions of them and the industry best practices. Finally,AHP is introduced into the evaluation process to ensure the scientificity of the evaluation result. Experiments show that the method can be used to improve the standard level and accuracy of usability evaluation of cloud service by hierarchical division of characteristics/subcharacterisitics and relative weight setting.
    • References | Supplementary Material | Related Articles

    REPORTS

    • Noise Robust Urban Audio Classification Based on 2-Order Dense Convolutional Network Using Dual Features
    • CAO Yi, HUANG Zi-long, SHENG Yong-jian, LIU Chen, FEI Hong-bo
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 86-91. DOI:10.13190/j.jbupt.2020-122
    • Abstract ( 523 )     HTML( 343 )       
    • A noise robust urban sound event classification model based on 2-order dense convolutional network using dual features(D-2-DenseNet) is proposed,which aims at the problems of insufficient robustness of current models. Firstly,the brief introduction of the method of noise adding and robust processing is presented. Moreover,a dual feature mutual compensation algorithm and 2-order dense convolutional network is presented. Meanwhile,a noise robust urban sound event classification model based on 2-DenseNet using dual features,i.e.D-2-DenseNet is proposed. Theoretically,D-2-DenseNet combines the advantages of feature compensation and 2-order dense convolutional neural network. The dual feature mutual compensation adaptive algorithm can effectively extract audio information and reduce noise interference to improve noise robustness. Finally,in order to validate advantages of the D-2-DenseNet,this new model is exploited in the urban sound event classification based on Dcase2016 datasets. Under conditions of channel noise and environmental noise,the experiment shows that the accuracy of the network is respectively 77.12% and 75.52%,which has added 8.51% and 10.38% compared with baseline. The noise robustness of D-2-DenseNet are also effectively verified.
    • References | Supplementary Material | Related Articles
    • Design of a Microstrip Hairpin Bandpass Filter with Wide Stopband
    • ZHENG Hai-yu, ZHU Wei-guang, ZHANG Zhi-tao, ZHANG Xin-lei, HU Shan-wen
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 92-96. DOI:10.13190/j.jbupt.2020-077
    • Abstract ( 888 )     HTML( 1084 )       
    • To obtain a highly selective, wide stopband filter and meet the requirement of sub-6GHz band compact portable communication devices,a new type of microstrip hairpin bandpass filter is proposed. Compared with the conventional structure,the proposed adds a quarter-wavelength open microstrip line to the resonance unit which is connected to the input and output ends,and adds metal holes on both sides of the input feeder of the filter. The wide stopband is achieved by transmission zeros at the parasitic passband. The proposed filter is processed and tested. It is shown that it can realize a wide stopband and has good frequency selection characteristics.
    • References | Supplementary Material | Related Articles
    • Intelligent Traffic Signal Control Algorithm Based on Sumtree DDPG
    • HUANG Hao, HU Zhi-qun, WANG Lu-han, LU Zhao-ming, WEN Xiang-ming
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 97-103. DOI:10.13190/j.jbupt.2020-006
    • Abstract ( 752 )     HTML( 877 )       
    • A multi-intersection intelligent traffic signal control algorithm based on sumtree deep deterministic policy gradient(Sumtree DDPG)is proposed. Through real-time observation of intersection data,the cycle length,phase sequence and phase duration of the traffic signal can be intelligently adjusted to improve the efficiency of intersections. Meanwhile,the empirical data storage mode based on sumtree structure can improve the sampling efficiency and accelerate the algorithm convergence. Compared with fixed signal timing and signal timing algorithm based on traffic flow weight,a simulation is carried out that the proposed algorithm obtains good performance in vehicle queue length,vehicle waiting time and vehicle average speed in dynamic environment.
    • References | Supplementary Material | Related Articles
    • Deep Learning Based Semi-Automatic Labeling System for Human Images
    • GAO Hui, ZHANG Ji-wei, LAI Yang, WANG Wen-dong
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 104-109. DOI:10.13190/j.jbupt.2020-181
    • Abstract ( 1552 )     HTML( 606 )       
    • In view of the problem that data labeling is too dependent on hardware and manual data labeling is inefficient,a semi-automatic labeling system for human images based on deep learning is proposed. By improving the algorithm,the system increases the number of key points of the human body for feature extraction and adds motion information constraints,which improves the accuracy of video staged annotation. Experiments that employs real data sets prove the feasibility of data labeling by deep learning algorithm,and using deep learning algorithms for semi-automatic labeling is faster and more accurate.
    • References | Supplementary Material | Related Articles
    • Security and Efficient Authentication Scheme for Mobile Edge Computing
    • XUE Jian-bin, BAI Zi-mei
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 110-116. DOI:10.13190/j.jbupt.2020-005
    • Abstract ( 592 )     HTML( 270 )       
    • Aiming at the problems of low computing power and limited storage capacity of mobile terminals,a lightweight identity authentication protocol suitable for mobile edge computing environments is proposed. The protocol combines cryptography with physical layer security protection technology,uses a symmetric cryptosystem to reduce the computational complexity of the mobile terminal in the authentication process,and completes the mutual authentication and key negotiation between the mobile terminal and the edge server with a small amount of calculation and low information storage. Mobile terminals can roam randomly in the mobile edge computing environment with only one registration. Security analysis shows that the protocol satisfies the security features of forward security,anti-replay attacks,and anti-man-in-the-middle attacks. Simulation shows that,compared with other authentication schemes,this scheme has better performance advantages in terms of communication and calculation costs.
    • References | Supplementary Material | Related Articles
    • Adaptive Style Transfer Method of Brocade Crafts Based on Semantic Segmentation
    • DENG Xiao, XU Meng-qiu, WU Ming, ZHANG Chuang
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 117-123. DOI:10.13190/j.jbupt.2020-083
    • Abstract ( 573 )     HTML( 361 )       
    • Neural style transfer has drawn considerable attention to both academic and art field. However,the existing approaches did not perform so good on brocade style transfer because of its grainy texture and blocky colors which is different from painting. A brocade style transfer approach is proposed that combined semantic segmentation task with adaptive style transfer algorithms by using new content loss and style loss. In addition,in order to solve uneven texture of background in the generated image,Gaussian noise is added to the content image to smoothen background texture during training. It is shown that the proposed approach generates brocade stylization outputs that have high quality as compared with other approaches.
    • References | Supplementary Material | Related Articles
    • A Wavelet Packet Neural Network Feature Recognition Method for Damage Acoustic Emission Signals
    • QI Tian-tian, CHEN Yao, HE Cai-hou, LONG Sheng-rong, LI Qiu-feng
    • Journal of Beijing University of Posts and Telecommunications. 2021, 44(1): 124-130. DOI:10.13190/j.jbupt.2020-118
    • Abstract ( 513 )     HTML( 417 )       
    • In the testing and evaluation of material damage, in order to identify effective acoustic emission (AE) signals among a large number of received signals, a neural network recognition method based on wavelet packet feature extraction is proposed. Firstly,the advantage of wavelet packet global decomposition is used to accurately extract the feature information from non-stationary signals,so, the corresponding feature vectors are established to characterize effective AE signals and interfering noise signals. Then,according to feature vectors and recognition output requirements,a three-layer back propagation neural network is established to analyze and identify signals,which could filter out noise signals and retain effective AE signals. Finally,400 sets of AE signals are collected in the experiment of glass fiber reinforced plastics to verify the method. The collected AE signals are identified with an accuracy of 97.5%,which can meet requirements of engineering.
    • References | Supplementary Material | Related Articles