Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

    • 2025, Vol. 48 No. 2 Published date:30 April 2025 Last issue
    • Fault-Tolerant Evolution Algorithms for Blockchain Oracle Software Architecture
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 1-7.
    • Abstract ( 58 )       
    • The oracle is the interface between the blockchain and the external data exchange. It is responsible for the ordering of the input data and the data consistency transaction session. However, the security of oracle, a centralized blockchain system component, is not protected by the security mechanism of the blockchain system. After the oracle fails, its input data and transaction process will be lost. In order to avoid the loss caused by the failure of the oracle, in this paper, we propose a novel fault-tolerant oracle software architecture of blockchain. Specifically, we design the reliability evolution requirement model and the intelligent fault-tolerant evolution model. By leveraging these two models, the security mechanism of the oracle is improved. Furthermore, we propose the corresponding evolution algorithms to enable the automatic fault-tolerant evolution of the software architecture after the oracle fails. In experiments, we employ the virus attack case to verify the novel oracle reliability and also we evaluate the fault-tolerant evolution cost, backup oracle replacement timing respectively. Extensive experimental results show the practical value and effectiveness of the proposed fault-tolerant oracle software architecture and its evolution algorithms.
    • Supplementary Material | Related Articles
    • Long Text Categorization for Decision Impact Evaluation of Scientific Dataset
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 8-17.
    • Abstract ( 52 )       
    • The openness of scientific datasets enables policymakers to make more targeted decisions, so automatic and objective evaluation of the decision-making impact of open scientific datasets has attracted attention at home and abroad. In order to effectively evaluate the decision-making impact of datasets, it is crucial to determine the relevance of datasets from the relevant documents of government announcements. However, government announcement documents are usually a kind of long text, and determining whether they are affected by the relevant influence translates into the task of classifying the long text. Accordingly, this paper proposes a long text classification method based on word feature fusion (LTC-WF) for evaluating the influence of decision-making on scientific datasets, in order to determine whether the policy is influenced by the corresponding dataset. Firstly, the words in the text are categorized according to different lexical properties, and the phrases with the same lexical properties are integrated. Then, the group of categorized phrases and the original text were embedded separately for representation. Finally, in order to verify the effect of integrating lexical information, the splicing fusion unit and the gated fusion unit are designed respectively, in which the gated fusion unit aggregates the phrase group embedding vectors and the original text embedding vectors by assigning different weights to them respectively to generate the final embedding representations of the text for classification. The experimental results on the constructed scientific data policy dataset show that our model achieves better performance than the existing mainstream methods, and the method provides an effective technical solution for realizing the evaluation of decision-making impact of scientific datasets.
    • Supplementary Material | Related Articles
    • Improved K-means Clustering Algorithm based on PageRank
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 18-27.
    • Abstract ( 52 )       
    • To address the randomness problem in initial cluster center selection of K-means clustering algorithm, a PageRank importance measurement algorithm based on Gauss-Seidel iteration is proposed to improve K-means. By simulating the clustering data as a random walk model on a directed graph using PageRank, in other words, a first-order Markov chain. The clustering data is traversed randomly, and a linear equation system is established. Gauss-Seidel is introduced, and its continuous updating characteristic of unknown variables in the process of solving linear equation systems is used to ensure the accuracy of node PageRank values, and then the top k nodes are selected as the initial cluster centers. Then, the objective function value is optimized iteratively based on minimizing the loss function to accurately divide each node to the best cluster. Finally, a series of comparative experiments are performed on University of California Irvine (UCI) dataset and classic images, and experimental results show that the rand index, adjusted rand index, normalized mutual information and other performance evaluation indicators of improved K-means are better than the original K-means for discrete data, improving K-means can solve the edge segmentation fuzzy problem of the original K-means for classic images, effectively segmenting the target image subject and background.
    • Supplementary Material | Related Articles
    • Joint Beamforming Optimization for STAR-RIS Assisted Multi-User MISO Secure Communication
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 28-34.
    • Abstract ( 49 )       
    • As an emergent reconfigurable intelligent surface (RIS) architecture, simultaneous transmitting and reflecting RIS (STAR-RIS) can overcome the non-transition issue of the traditional RIS, which is expected to augment omni coverage in future sixth-generation (6G) networks. Motivated by this, a new joint beamforming optimization problem for STAR-RIS assisted multi-user multi-input single-output (MISO) secure communication systems is proposed. Specifically, considering the energy splitting protocol, we aim to jointly design the beamforming strategy at the base station (BS) and the transmission-reflection coefficients at the STAR-RIS for minimizing the total transmit power of the BS, subject to user service and secure communication requirements constraints. However, the objective function is non-convex over the optimization variables, which are highly coupled. To address this, an algorithm based on alternating optimization and semidefinite relaxation successive is proposed. Simulation results show that the proposed scheme is superior to other benchmark schemes in optimizing the power consumption while ensuring communication security.
    • Supplementary Material | Related Articles
    • Data Publishing Method for Trajectory Privacy Classification based on Differential Privacy
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 35-45.
    • Abstract ( 49 )       
    • Aiming at the problem that traditional trajectory data publishing does not consider users' privacy preferences in different places, the paper proposes a data publishing method based on differential privacy for trajectory privacy classification. In order to satisfy users' privacy protection needs for data of different sensitivities, setting dwell and hotspot attributes, different privacy levels are assigned according to users' privacy preferences. The density-based clustering algorithm divides the high-density trajectory points into the same cluster and introduces the standard deviation to segment the trajectories uniformly, reducing the spatiotemporal complexity of processing the trajectory data. Construct a prefix tree of noisy trajectory segments, assign a privacy budget based on the weights of the trajectory privacy levels and the tree height, and introduce a Markov chain to limit the size of the noise added to the data. Experimental results show that the method proposed in this paper effectively balances data availability and privacy.
    • Supplementary Material | Related Articles
    • Dehazing Network based on Multi-Scale Feature Extraction and Domain Transfer Optimization
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 46-53.
    • Abstract ( 37 )       
    • To address the issues of ineffective treatment of non-uniform haze and susceptibility to overfitting due to small-scale training sets in current dehazing algorithms, a dual-branch dehazing network based on multi-scale feature extraction and domain transfer optimization is proposed. The multi-scale feature extraction branch is utilized to learn the color and structure mapping from hazy images to clear ones, the multi-scale estimation based on channel attention is achieved through a multi-scale residual dense module. The domain transfer branch introduces pre-trained ConvNeXt, which enables the model to obtain additional prior information and improve its generalization ability. The experimental results demonstrate the effectiveness of the proposed algorithm in dehazing on both synthetic and real datasets. The proposed algorithm not only has good performance in removing non-uniform haze, but also has superior generalization ability. Moreover, it has achieved satisfactory results in objective evaluation indicators peak signal-to-noise ratio (PSNR) and structure similarity index measure (SSIM).
    • Supplementary Material | Related Articles
    • Tunable Circularly Polarized Single Photon Sources based on Double Archimedes Lines Perovskite Metasurface
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 54-58.
    • Abstract ( 48 )       
    • Single photon sources are one of the key cornerstone technologies in quantum computing, quantum communication, and quantum-information science. Typically, circularly polarized single photon plays a crucial role in chiral quantum optics, since it carries spin angular momentum (SAM), providing a promising platform in nonreciprocal single-photon configurations and deterministic spin-photon interfaces. In this work, we demonstrate a circularly polarized single photon sources composed of double Archimedes lines perovskite metasurface, of which the efficiency of outcoupled circularly polarized single photons could reach 66% at room temperature; corresponding peak wavelength is 543 nm in the visible light band. By further tuning the relative rotation angle of the double layers Archimedes line perovskite metasurface, the output efficiency of circularly polarized single photon can be effectively modulated. In addition, our line perovskite metasurface exhibits strong circular dichroism, which realize controllable selective transmission of light wave with different spin polarization. The study improves the efficiency of circularly polarized single photon sources at room temperature, and provides a new way to develop efficient, light weight and low-cost tunable circularly polarized single photon sources and spin photon devices.
    • Supplementary Material | Related Articles
    • Waveform Design Method for RIS-Assisted Full-Duplex Integrated Sensing and Communication
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 59-65.
    • Abstract ( 329 )       
    • In order to solve the low communication spectrum efficiency problem of radar-centered integrated sensing and communication (ISAC) waveform, a waveform design method for reconfigurable intelligent surface (RIS)-assisted full-duplex (FD) ISAC is proposed. Firstly, by introducing RIS and FD technology, ISAC signal and communication signal are transmitted respectively in radar pulse repetition interval, and RIS-assisted FD-ISAC system model is constructed. Secondly, combined with radar requirement of low integrated sidelobe level (ISL) and communication requirement of low symbol error rate, an ISAC waveform design optimization model is established, where minimizing ISL as objective function and communication symbol phase similarity, energy and peak-to-average power ratio as constraint criteria, and it is solved by the majorization minimization algorithm. Then, radar and communication performance of RIS-assisted FD-ISAC system are analyzed, and the closed expressions of detection probability and spectrum efficiency are given. Simulation results show that designed ISAC waveform can effectively realize radar detection and information transmission. In addition, compared with traditional FD-ISAC system, the proposed RIS-assisted FD-ISAC system has higher spectrum efficiency and lower symbol error rate.
    • Supplementary Material | Related Articles
    • Method of Document Layout Analysis based on Parameter Reallocation Strategy
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 66-72.
    • Abstract ( 126 )       
    • To achieve automatic structured analysis of formatting information in digital and scanned documents, we propose a universal document layout analysis method based on a parameter reallocation strategy. By introducing the concept of parameter reallocation, we optimize the overall balance of the model. Firstly, we integrate the ideas of omni-dimensional dynamic convolution (ODConv) and FasterNet into the feature pyramid network structure, lightweighting the neck layer to reduce the risk of overfitting. Next, we introduce the spatial pyramid pooling fast (Inception-SPPF) structure to enhance the feature extraction capability for targets of different scales. Finally, we design the C3RepLKBlock universal module, utilizing large convolutional kernels for global feature extraction. Through the gradient flow concept of feature fusion-guided structural reparameterization, we address the issue of excessive smoothing. Experimental results demonstrate that the improved model achieves a mAP of 95.9% on the PubLayNet dataset, significantly outperforming YOLOv5s and other algorithms in the 0.50~0.95 intersection over union range. This method meets the stable, reliable, and high-precision requirements of document layout analysis tasks.
    • Supplementary Material | Related Articles
    • Lightweight Multi-Order Gated Aggregation Network for Image Super-Resolution
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 73-79.
    • Abstract ( 40 )       
    • Deep learning-based technologies have significantly improved the performance of image super-resolution networks, where lightweight convolutional neural networks (CNNs) are characterized by a small number of parameters and low model complexity. However, their performance is greatly limited, affecting the practical application of super-resolution methods. To address such issues, a lightweight multi-scale large kernel convolution super-resolution reconstruction network is proposed, which fully utilizes gating mechanisms and large kernel convolution. A multi-stage gated aggregation block is introduced, using a series of gated units to obtain both global and local information; a multi-stage large kernel attention block is proposed, which uses large kernel convolution to achieve a larger receptive field and extract features from images at different scales; a focused gated aggregation block is introduced, using skip connections to enhance the model's ability to reconstruct images. To validate the effectiveness of this model, experiments were conducted on evaluation metrics such as the number of model parameters and response speed, as well as subjective visual effects, and ablation analysis experiments were performed on each module of the model. The experiments show that compared to lightweight network models in recent years, the proposed method achieves a significant improvement in peak signal-to-noise ratio and structural similarity on four benchmark datasets while maintaining a similar or even reduced number of parameters and response speed. This better balances model complexity and performance, and achieves more effective subjective visual effects, leading to superior image reconstruction capabilities.
    • Supplementary Material | Related Articles
    • Concrete Bridge Surface Multi-Defect Semantic Segmentation Network based on Three-Branch Architecture
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 80-89.
    • Abstract ( 284 )       
    • Due to limitations such as mutual interference among various visible defects in concrete bridges, there is an issue of insufficient exploration of deep contextual information within the segmentation network. This paper proposes a three-branch network (TBNet) for semantic segmentation of multiple apparent lesions in concrete bridges. TBNet comprises three-branch encoder, skip connection and decoder. The three-branch encoder decouples feature information, consisting of progressively hierarchical context branch, “wide and large" detail branche, and “narrow and small" semantic branche. Each branch is responsible for extracting contextual information, detailed information, and semantic information, respectively. The guidance aggregation module (GAM) guides the fusion of contextual information through semantic and detailed information, enhancing the deep contextual information mining capability of the network. Simultaneously, the biformer attention mechanism module reduces redundancy in the encoder's output feature information, further improving segmentation performance. Experimental results demonstrate that TBNet outperforms the baseline U-net (UNet) on the concrete bridge surface multi-defect semantic segmentation dataset, with an improvement in mean pixel accuracy (MPA) of 5.92% and an improvement in mean intersection over union (MIOU) of 6.65%.
    • Supplementary Material | Related Articles
    • A Sub-Image Retrieval Algorithm based on Folded Multi-Hollow Pyramid Pooling and Attention Mechanism
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 90-97.
    • Abstract ( 42 )       
    • Embroidery on clothing patterns not only perfectly combines traditional culture with ancient techniques, but also inherits pattern patterns and traditional craftsmanship. Synthesizing embroidery images with complex textures from color images is a challenging task. Currently, stylization conversion methods based on deep learning can lead to confusion in embroidery stitch texture and color shift in the original image when rendering clothing pattern images. In order to solve this problem, an algorithm for embroidery stitch generation and modeling based on generation learning is proposed. This article starts from the material and stitches of the embroidery substrate, and uses computer graphics knowledge to establish a mathematical model of the geometric structure of the stitch primitive. According to the regularity of stitch primitives, this paper divides embroidery stitch into two categories: regular stitch and irregular stitch. Generation learning method is used to generate and simulate representative embroidery stitch in the two categories, thereby constructing a set of embroidery stitch database.
    • Supplementary Material | Related Articles
    • A Deep Learning-Based Path Selection Method in Terminal Cooperative Communication
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 98-105.
    • Abstract ( 117 )       
    • In multi-hop and multi-relay scenarios for distributed terminal cooperative information transmission, the iterative search method for optimal path selection has high computational complexity. In actual network, the path selection method needs to be completed in a very short time in order to timely perceive and dynamically adapt to the changes of the network environment. Therefore, in order to realize fast path selection under different node positions and different channel state information (CSI), a deep learning-based path selection method (DL_PSM) is proposed, which adopts deep neural network (DNN) model and takes the maximum received signal-to-noise ratio (RSNR) of the selected path as the optimization goal. Specifically, this DNN model uses the position of each node and CSI between nodes as input features and uses the optimal path with the largest RSNR calculated by the exhaustive algorithm as output label. Then the DNN model is trained using training samples composed of input features and labels. Simulation results show that, compared with the existing iterative search method, the DL_PSM can significantly reduce computation latency while achieving 99.3% of optimal RSNR performance.
    • Supplementary Material | Related Articles
    • Research on the Performance of RIS Assisted NOMA Mine Communication System
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 106-111.
    • Abstract ( 192 )       
    • To meet the communication requirements of future intelligent mines for high efficiency, low power consumption, low latency, and high bandwidth, the study proposes to apply the reconfigurable intelligent surface (RIS) assisted non-orthogonal multiple access (NOMA) technology to mine tunnel communication. The RIS is installed at the corner of the tunnel, and a large number of low-cost passive reflection units (RUs) are used to achieve reliable non-line-of-sight transmission of signals, simultaneously improving system spectral efficiency and transmission reliability based on NOMA multi user transmission. The study considers practical scenarios and establishes a RIS-NOMA mine communication system model based on wireless fidelity (WiFi) noise interference. From the perspective of outage probability, the transmission reliability of the system is analyzed. Based on probability theory, closed form expressions for outage probability of users located in different vertical distribution walls of the mine are derived, and the overall transmission efficiency of the system is analyzed using normalized measurement. The analysis and simulation results both indicate that: 1) The main factors affecting system performance include the number of RUs in RIS, the signal-to-noise ratio sent, the target data rate, the position of terminal devices in the tunnel, and the signal-to-noise ratio transmitted by noise; 2)Compared with traditional NOMA systems and collaborative NOMA systems, using RIS assisted NOMA systems in tunnel environments can better improve the communication performance of devices.
    • Supplementary Material | Related Articles
    • A Feature Fusion-based Controller Area Network Intrusion Detection Method
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 112-118.
    • Abstract ( 179 )       
    • A controller area network (CAN) lacks security features such as message encryption and sender authentication, making it vulnerable to malicious network attacks that can compromise both human and road safety. In light of this situation, a feature fusion-based intrusion detection method for CAN is proposed. This method focused on the relationships between internal features of messages rather than their temporal order. Firstly, global features and group features extracted from CAN messages were fused, and a multi-encoder network was employed to detect various types of injection attacks. Additionally, a self-attention mechanism was incorporated to generate interpretable weights for different features, which measured their importance. Experimental validation was conducted using a dataset constructed from real vehicles. The detection accuracy of single injection attacks surpassed 97%, while the overall detection accuracy for multiple injection attacks was 98.23%, outperforming existing methods. This demonstrates the high accuracy and robustness of the proposed intrusion detection system.
    • Supplementary Material | Related Articles
    • Improved YOLOv7 for Metal Surface Defect Detection Method
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 119-125.
    • Abstract ( 39 )       
    • The quality of metal materials directly affects the safety of industrial products. However, traditional defect detection algorithms on metal material quality cannot achieve high-precision real-time detection. To address it, a metal surface defect detection framework called you only look once v7-bi concatenation adaptive (YOLOv7-BCA) has been proposed. The YOLOv7-BCA framework first uses dynamic sparse sampling for feature extraction, enhancing the network's ability to extract fine-grained features. Next, a feature enhancement module is designed to achieve feature fusion and enhancement for three adjacent layers, improving the accuracy of localization information. Finally, combining the idea of adaptive spatial feature fusion, the semantic information from deep network feature maps and the positional information from shallow network feature maps are effectively integrated. Comprehensive and detailed experimental results demonstrate that the proposed YOLOv7-BCA achieves an average detection accuracy of 75.9%, a 4.7% improvement over the original model. YOLOv7-BCA exhibits significant advantages in metal surface defect detection, it can achieve highly accurate localization of metal surface defects and demonstrating strong real-time performance.
    • Supplementary Material | Related Articles
    • Massive MIMO DOA Estimation Algorithm based on Randomized Matrix Approximation
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 126-132.
    • Abstract ( 44 )       
    • A novel signal processing algorithm is proposed for azimuth estimation of unknown targets in massive multiple-input multiple-output (MIMO) systems. The algorithm exploits the low-rank property of the received signal matrix and a hierarchical search strategy, combined with random matrix approximation, to significantly reduce computational complexity while maintaining high estimation accuracy. By applying low-rank matrix approximation, the algorithm reduces the dimensionality of the data matrix, and the hierarchical search optimizes within a limited space, avoiding the high cost of exhaustive searches. Random matrix approximation further compresses data, effectively lowering computational load. Simulation results show that the proposed algorithm reduces computational complexity by two orders of magnitude while achieving the same accuracy as classical subspace methods. This makes it well-suited for real-time azimuth estimation in large-scale MIMO systems, demonstrating its efficiency and feasibility in practical applications.
    • Supplementary Material | Related Articles
    • Research on Heterogeneous Computing Energy Efficiency Optimization Strategy for NOMA-MEC System
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 133-143.
    • Abstract ( 65 )       
    • With the rapid development of generative artificial intelligence technology, edge machine learning has gradually become a key trend, aiming to use data on edge devices for model training to reduce latency and improve user experience. However, due to the energy and resource limitations of edge devices, especially in executing high-energy learning tasks, improving the energy efficiency of edge devices has become the main challenge at present. This paper proposes an edge energy efficiency optimization model based on heterogeneous computing. On the local computing side, central processing unit and neural network processing unit (CPU-NPU) heterogeneous computing units are configured to reasonably allocate tasks between CPU and NPU to improve carrying capacity and energy utilization. On the transmission side, non orthogonal multiple access transmission is used to offload tasks from edge devices to servers to improve spectrum and energy efficiency. At the same time, in order to maximize the energy efficiency of edge devices, a joint computing and communication resource management optimization strategy is proposed. Based on the joint optimization algorithm, the single objective energy efficiency optimal solution for local heterogeneous computing task allocation, transmission power allocation factor, task offloading delay involving computing and communication sides is jointly optimized to maximize the overall energy efficiency of edge devices. The simulation results show that compared with traditional CPU single computing nodes, the proposed scheme improves spectrum resource utilization while also improving the energy efficiency of Internet of things (IOT) edge user devices by 30%.
    • Supplementary Material | Related Articles
    • A Beamforming Method to Enhance Main Lobe Directivity
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 144-150.
    • Abstract ( 164 )       
    • During the beamforming process, the main lobe directivity of the array antenna pattern is affected by the number of array elements. The fewer the number of array elements, the wider the beam width, and the smaller the effective scanning range of the array. However, increasing the array elements will increase the cost and complexity of the system. To address this problem, a beamforming method that enhances main lobe directivity is proposed and integrated into the null steering beamformer (NSB) algorithm. Without adding array elements, NSB will generate an accurate zero point by setting up virtual interference points around the main lobe. Due to the distance repulsion between the main lobe and the zero point, the main lobe will shift slightly toward the target direction, thereby weakening the degree of the main lobe shift. Numerical experiments show that compared with the conventional NSB algorithm, this method effectively reduces the main lobe offset. Finally, the method proposed in this article is combined with the linear constrained minimum variance algorithm, demonstrating good main lobe directionality.
    • Supplementary Material | Related Articles
    • A Multi-Strategy Improved Coati Optimization Algorithm
    • Journal of Beijing University of Posts and Telecommunications. 2025, 48(2): 151-158.
    • Abstract ( 52 )       
    • Aiming at the problems of slow convergence speed, poor optimization accuracy and easy to fall into local optimal solution of the coati optimization algorithm, a multi-strategy improved coati optimization algorithm is proposed. Refraction reverse learning is introduced to initialize the coati population, which ensures the diversity and uniform ergodicity of the population distribution, and improves the convergence speed and optimization accuracy of the algorithm. The Levy flight strategy is introduced to improve the exploration phase of the coati optimization algorithm, which enhances the ability of the algorithm to jump out of local optimal solution. Inspired by the whale optimization algorithm, the spiral search mechanism is introduced into the development stage of the optimization algorithm, which enhances the global search capability and local exploration capability of the algorithm. The adaptive t-distribution mutation iteration method is introduced, which balances the global search capability and local development capability of the algorithm. Comparing with various intelligent algorithms, the good performance of the improved algorithm is verified through 12 multi-type test functions. In order to further evaluate the effectiveness of the improved algorithm, it is used for the optimization of extreme gradient boosting model parameters. The experimental results show that compared with the other five algorithms, the improved algorithm has higher classification accuracy and convergence speed.
    • Supplementary Material | Related Articles