Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • An Efficient Approach to Multi-Fault Diagnosis in Dynamic Networks
    • QIAO Yan,MENG Luo-ming, CHENG Lu,WU Li,YUAN Yi-guo
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 1-4. DOI:10.13190/jbupt.200906.1.qiaoy
    • Abstract ( 2473 )     HTML       
    • Fault management is one of the most important parts of network management. It is a challenge problem to quickly and accurately locate the faults of network. Bayesian networks model is a prominent way to solve that problem, but it is limited when the state of the nodes changes over time. Present algorithms based on Bayesian networks model may solve the problem with higher accuracy, but the algorithms are very compex and not proper for large scale of network. A new efficient inference algorithm that can diagnosis multifault in dynamic Bayesian networks is proposed. Then, by analysis of its complexity, it is proven that the approximation algorithm has a much lower time complexity than the lower bound of exact algotithm in the dynamic Bayesian networks. Finally, the experiments show that the accuracy of the new algorithm is slightly lower than the exact inference algorithm, but its efficiency is much higher than the exact inference algorithm. This new algorithm can be applied to the large communication networks.

    • References | Supplementary Material | Related Articles
    • An IPTV Fast Channel Change Scheme in Multicast Environment
    • GU Qiang;XIA Ye-han;ZOU Hua,YANG Fang-chun
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 5-8. DOI:10.13190/jbupt.200906.5.142
    • Abstract ( 2461 )     HTML       
    • In order to reduce channel change time of Internet protocol television (IPTV) in Internet protocol(IP) multicast environment, a novel scheme of IPTV rapid channel change in IP multicast environment is proposed. This scheme utilizes terminal's upload bandwidth to supply rapid media stream rate to other terminals, and fulfills playout buffer in channel change termianals for a short time period, so as to reduce the channel change time. According to theoretical analysis and simulation results, under a highly channel change rate, only no more than 20% additional bandwidth is needed to reduce the channel change time to 15%-45% of original multicast channel change time.

    • Supplementary Material | Related Articles
    • Grid Resource AllocationPricing Based on Weighted Average
    • YANG Ming;LIU Yuan-an;MA Xiao-lei;LI Li
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 9-13. DOI:10.13190/jbupt.200906.9.yangm
    • Abstract ( 2588 )     HTML       
    • According to the deficiency of the mean price based pricing method in combinatorial double auction for grid resource allocation, a unit price based pricing algorithm is presented. Based on combinatorial double auction and grid trust theories, a weighted average algorithm based grid resource allocation and pricing strategy is proposed. This algorithm identifies malicious nodes through the weighted average of the trust degree thresholds, and assesses the comprehensive competitiveness of the normal nodes through the weighted average of normalized bid prices and trust degrees. Simulations show the algorithm represents high trade rate and can prevent malicious nodes from entering into the market. The trade utility can give nodes incentives to improve their competitiveness.

    • References | Supplementary Material | Related Articles
    • Algorithm of Exposed Terminals Concurrent Transmission Based on Local Topology in MANET
    • ZHANG Dai-chen;YU Wei-bo;YANG Pan-long;WANG Hai
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 14-18. DOI:10.13190/jbupt.200906.14.zhangdch
    • Abstract ( 2699 )     HTML       
    • To solve the problem of channel resource wasted by exposed terminals in mobile Ad hoc network, exposed terminals is researched. It is pointed out that the key problem is local network topology. Then a concurrent transmission algorithm based on local topology is proposed. In this algorithm, exposed terminals determines whether conflict happens in concurrent transmission through local network topology and complete concurret transmission by synchronization algorithm. Combined with IEEE 802.11 DCF protocol and cross layer mechanisms, a new protocol local topology based distributed coordination function(LTB_DCF) is developed. Simulation results show that compared with DCF, LTB_-DCF protocol improves the network throughput greatly with moderately low overhead.

    • References | Supplementary Material | Related Articles
    • A GA-Based Buffer Allocation Algorithm for Networks-on-Chip Architecture
    • LI Xiao-hui;CAO Yang;WANG Li-wei;CHEN Chen
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 19-23. DOI:10.13190/jbupt.200906.19.lixh
    • Abstract ( 2385 )     HTML       
    • For the finite buffer resources in networks-on-chip, a buffer allocation algorithm is proposed. The proposed algorithm first estimates the load on each input channel in different routers across the chip by the performance analytical model. Then, it uses genetic algorithm to allocate the resources according to the distribution of the load on all the channels. Simulation results indicate that, under uniform traffic, this algorithm can get less average packet latency than those by uniform allocation and greedy allocation strategy. At the same time, about 33.3% buffer can be saved.

    • References | Supplementary Material | Related Articles
    • A Hybrid Feature Transformation Method Based on Modified Particle Swarm Optimization and Support Vector Machine
    • Xiong Wen;Wang Cong
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 24-27. DOI:10.13190/jbupt.200906.24.xiongw
    • Abstract ( 2696 )     HTML       
    • Linear feature transformation was investigated to improve the classification accuracy of support vector machine (SVM) by preprocessing, and a hybrid method combining the modified particle swarm optimization (PSO) with SVM was presented. In the method, features top-ranked were preselected by linear weighted combination of t-statistic extended, Fisher's discriminant ratio and random forests feature importance scores, and a modified PSO and novel heuristic info were used to attract swarm to find optimal linear feature transformation factors. Features on dataset transformed were further refined by binary PSO, and a grid method was utilized to obtain SVM with high accuracy. Experiments on madelon of neural information processing system (NIPS) 2003 and ten data sets of university of California Irvine (UCI) verify this method has higher accuracy on 4 data sets than original C-SVM.

    • References | Supplementary Material | Related Articles
    • Anomaly Traffic Integrated Detection Model for Enterprise IT Network
    • QIU Xue-song;CHEN Jian;GUO Hai-sheng;GAO Zhi-peng
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 28-31. DOI:10.13190/jbupt.200906.28.qiuxs
    • Abstract ( 2380 )     HTML       
    • A new algorithm of the network anomaly traffic detection by using time windows comparing method is proposed based on the feature of enterprise information technology (IT) network traffic. Then, combining the new algorithm, the present static detection algorithm and the dynamic detection algorithm, the integrated detection model of network anomaly traffic is proposed. The model can check the network anomaly traffic by comparison methods by different ways and from different views. Finally, the availability of model is validated by implementation and testing of model in real environment.

    • References | Supplementary Material | Related Articles
    • A New Method of Choosing Irregular Modulation Mapping in BICMID System
    • LI Lin;YUAN Chao-wei;YANG Rui-zhe

    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 32-36. DOI:10.13190/jbupt.200906.32.lil
    • Abstract ( 2773 )     HTML       
    • A new analysis method which chooses the performance of the irregular modulation mapping schemes in bit interleaved coded modulation with iterative decoding(BICM-ID) system is proposed based on the extrinsic information transfer (EXIT) chart, the difference from EXIT chart analysis method is the proposed method utilizes the corresponding relationship between the extrinsic mutual information and the whole signal to noise ratio region . The simulation results show that the proposed method can effectively choose the different irregular modulation mapping schemes in the different signal to noise ratio region and can roughly evaluate the scope of system bit error rate curve in BICM-ID system.

    • References | Supplementary Material | Related Articles
    • Adaptive Resource Allocation in OFDMA with Insufficient Guard Interval under Fractional Load
    • LIU Shu-hui;CHANG Yong-yu;CUI Jie;YANG Da-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 37-41. DOI:10.13190/jbupt.200906.37.liushh
    • Abstract ( 2570 )     HTML       
    • Under fraction load (FL) and insufficient guard interval (GI), a novel adaptive resource allocation (ARA) scheme is proposed in the orthogonal frequency division multiple access (OFDMA) system. It utilizes the flexibility of radio resource management to mitigate the inter-symbol interference and inter-carrier interference due to the insufficient GI under FL instead of the complicated interference reduction algorithms at the receiver. System-level simulations show that, the proposed ARA improves system performance than the conventional resource allocation (CRA) under FL, whereas the performance of proposed ARA approaches the CRA under the full load due to the limitation of resource allocation flexibility.

    • References | Supplementary Material | Related Articles
    • BP Neural Networks-Based Collaborative Filtering Recommendation Algorithm
    • ZHANG Lei;CHEN Jun-liang;MENG Xiang-wu;SHEN Xiao-yan;DUAN Kun
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 42-46. DOI:10.13190/jbupt.200906.42.zhangl
    • Abstract ( 2743 )     HTML       
    • A novel two-level multiple neural networks-based collaborative filtering recommendation algorithm (TMNN-CFA) for rating prediction is presented. By cooperating the multiple back propagation (BP) networks together, the higher layer neural network propagates conversely the output deviation until to the lower layer neural networks to amend the network weights and based on which, item recommendation is accomplished in the forward process of two layers networks relying on the factors such as ratings, etc. Experiment results on the standard Movielens show that TMNN-CFA method is effective and feasible for item recommendation.

    • References | Supplementary Material | Related Articles
    • Research on Numerical Simulation of the Multipath Effects on Microwave Landing System
    • DAI Chuan-jin;WU De-wei;ZHAO Xiu-bin;WANG Wei;CHEN Xiao-ping
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 47-52. DOI:10.13190/jbupt.200906.47.139
    • Abstract ( 2422 )     HTML       
    • In order to analyze and compute the multi-path efects on angle error of microwave landing system (MLS), a new numerical method based on the geometric optical and ray-tracing theory is proposed. In the new method, through the geometric optical and geometric diffraction theory, the signal level ratio of multi-path signal relative to direct signal can be effectively acquired. And through ray-tracing theory, the phase displacement can be computed to achieve the angle error pattern. Through the simulation, the angle error pattern is devided into in-beam region and out-of-beam regions. It is found that the in-beam error is key point of angle error. The new method is applied to simulate the multi-path scenario in an airport. And the results are compared with results of the experience methods to validate its feasibility.

    • References | Supplementary Material | Related Articles
    • A Dynamic Broadcasting Algorithm for on-Demand Routing Protocol in Ad Hoc Network
    • HU Peng;LIU Yuan-an;MA Xiao-lei;GAO Song
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 53-56. DOI:10.13190/jbupt.200906.53.hup
    • Abstract ( 2537 )     HTML       
    • Broadcasting is a common operation for establishing on-demand routing protocols and updating routing table. A straightforward broadcasting by flooding results in serious redundancy and contention. To increase broadcasting efficiency of Ad hoc network, a dynamic broadcasting algorithm for on-demand routing protocol is proposed, which computes the rebroadcast probability of message based on neighbor node density and relative distance. Consequently the rebroadcast probability of redundancy message is reduced and the contention problem is alleviated. By applying this algorithm in network simulation platform, the simulation results show that the proposed algorithm improves the protocol efficiency and reduces the redundant information.

    • Supplementary Material | Related Articles
    • Research on Load Test Model for 3G Online Charging System
    • WANG Hong-man;SHI Zhi-hui;SHANGGUAN Li-ying;
      YANG Fang-chun;LIU Yu-zhang
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 57-61. DOI:10.13190/jbupt.200906.57.141
    • Abstract ( 2600 )     HTML       
    • 3G oriented online charging system (OCS) concept is briefly introduced at first. Then the major diameter credit control (DCC) protocol performance benchmark data to be handled by OCS is described. The composed full-services traffic, user credit status, service duration/traffic distribution are analyzed and the calculation formula for DCC protocol load is presented. The two load control models including tested system unresponsive and responsive model are proposed for different load test cases. The integrated load test model was adapted in 3G OCS development in China Telecom, and the test results show the model can support high performance load test for DCC protocol.

    • References | Supplementary Material | Related Articles
    • A Turbo Equalization Algorithm for SFBC-OFDM Systems without CP
    • CHEN Zhe;CHANG Yong-yu;YANG Da-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 62-66. DOI:10.13190/jbupt.200906.62.chenzh
    • Abstract ( 2058 )     HTML       
    • To increase transmission efficiency, a soft-information-based Turbo equalization algorithm is proposed for the space-frequency block code orthogonal frequency-division multiplexing (SFBC-OFDM) system without cyclic prefix (CP). In our algorithm, processing modules as inter-symbol interference cancellation, soft cyclic reconstruction, diagonalized SFBC decoder and minimum mean square error frequency domain equalizer are proposed to work in an iterative way to suppress interferences. Simulation results show that this algorithm can improve the bit error rate performance of SFBC-OFDM system without CP.

    • References | Supplementary Material | Related Articles
    • Implementation of Chaotic Codes Using Chebyshev-Map in OCDMA System of Access Networks
    • ZHENG Zhi-hua;QIAN Zong-jue;SHOU Guo-chu;HU Yi-hong
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 67-71. DOI:10.13190/jbupt.200906.67.zhengzhh
    • Abstract ( 2853 )     HTML       
    • The structure of optical code division multiple access (OCDMA) system based on Chebyshev-map chaotic codes is investigated in passive optical networks. The system can support more subscribers by providing the different codes at same wavelength channel. The scheme on chaotic spread spectrum sequences using Chebyshev-map is presented, which is taken as subscriber address codes. The performance of this system is analyzed. The simulation results show that the chaotic sequences have good correlation properties, and restrain the influence of multiple access interference. The bit error rate performance of the proposed system is improved by about 1~3 orders of magnitude better than that of single OCDMA system, and obtains about 1 order of magnitude improvement relative to traditional optical orthogonal codes.

    • Supplementary Material | Related Articles
    • Researches on the No-Wait Permutation Flow Shop Earliness and Tardiness Scheduling Problem
    • NING Wei-wei;LEI Yi;ZHONG Hua-wei;YAN Guang-rong
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 72-76. DOI:10.13190/jbupt.200906.72.140
    • Abstract ( 2610 )     HTML       
    • Given the same due date and no idle time in processes, a heuristic algorithm for the earliness and tardiness penalties scheduling problem in permutation flow shop is proposed. Firstly, the algorithm gets the relatively good sequence of the jobs according to the sorted sequence regulation of 7 jobs. And then, the NEH algorithm is used to get the optimized solutions. At last, the optimal solutions are achieved by comparing the neighborhood searching results for every solutions. In the middle scale and small scale problems, the extent of similarity between the solutions got by the heuristic algorithm and the optimal solutions is 99%. Meanwhile through testing the standard deviation of the large scale samples, it is shown that the stability of the solutions is very good. In large scale problems, the heuristic algorithm appears good optimized performances and its calculated results are better than those got by ILOG-constraint programming(CP) optimized engine.

    • References | Supplementary Material | Related Articles
    • Design of Wide-gap Chaos Modulation Hopping Pattern based on TOD
    • TAI Neng-jian;WU De-wei;WU Jie;YU Li-na
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 77-82. DOI:10.13190/jbupt.200906.77.tainj
    • Abstract ( 2394 )     HTML       
    • In order to enhance the anti-interception performance of modulation-hopping technology, a method to design wide-gap chaos modulation hopping pattern based on time of day (TOD) is proposed. According to the deficiency of the cycle extraction algorithm in the balance, an improved algorithm combining the cycle extraction and reshaping operation is presented to design Chaos modulation hopping pattern. The analysis and simulation results verify this method has better properties in balance. Furthermore, in order to perfect the anti-interception property, symmetry algorithm and random shift replace algorithm are introduced to widen the modulation hopping pattern gap. Simulation results prove that symmetry algorithm is applicable for generating the long periodic hopping pattern used in valid data communications, while random shift replace algorithm is proper for the short periodic pattern with the good balance in the range of maximum effective length, and it can be used in the situations of short-cycle emergency communications.

    • References | Supplementary Material | Related Articles
    • Hierarchical Risk Assessment Based on Shapley Entropies and Choquet Integrals
    • LuZhenbang,ZHOU Bo
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 83-87. DOI:10.13190/jbupt.200906.83.lüzhb
    • Abstract ( 3356 )     HTML       
    • The existing information security risk assessment approaches commonly ignore the relations among the assessment factors. To overcome the ambiguity and complexity of relations among the factors, and the difficulty of acquiring the correlative fusion weights of attributes in practice, a hierarchical risk assessment model based on Shapley entropies and Choquet integrals is proposed. By introducing the Shapley value concept of nperson cooperative game theory into the assessment model, this approach solves the information security risk assessment problem under poor information conditions by using the analytic hierarchy process with Choquet integrals from bottom to top, which is based on the maximum Shapley entropy principle. The effectiveness of the proposed approach is illustrated via an actual information security risk assessment for four subnets of the intranet in a community.

    • References | Supplementary Material | Related Articles
    • Prediction Algorithm of Trim Beam Number Using Modified SVM-Based Feature Selection
    • SUN Yue-peng;LIU Min;HAO Jing-hua;WU Cheng
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 88-92. DOI:10.13190/jbupt.200906.88.sunyp
    • Abstract ( 2249 )     HTML       
    • The trim beam number is an important parameter in the scheduling model of the cotton spinning manufacturing process. Because of the complexity of the trim technique, the actual trim beam number is difficult to obtain before scheduling. A prediction algorithm using a modified support vector machine (SVM)-based feature selection method and feed forward neural network (FFNN) is presented for predicting the trim beam number. In the algorithm, the proposed feature selection method is adopted to pick up critical features that affect the trim beam number, and FFNN is adopted to predict the trim beam number based on the critical features. Numerical computational results show that the proposed algorithm is effective. The algorithm also successfully applies in the related problems in practical cotton textile manufacturing system.

    • References | Supplementary Material | Related Articles

    Reports

    • Nonbinary Quasi-Cyclic LDPC Codes with Efficient Richardson-Urbanke Encoding Algorithm
    • CHEN Chao;BAI Bao-ming;WANG Xin-mei
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 93-96. DOI:10.13190/jbupt.200906.93.chench
    • Abstract ( 2550 )     HTML       
    • In order to implement efficient encoding, a class of nonbinary quasi-cyclic low-density parity-check (QC-LDPC) codes is proposed, which can be encoded with Richardson-Urbanke algorithm. The right part of the parity-check matrix has weight-2 columns, which allows the construction of both regular and irregular codes. Constraints on the parity-check matrix ensure a linear encoding complexity. Simulation results show that the proposed codes, when combined with higher order modulation, perform favorably with the codes constructed by the progressive-edge-growth (PEG) constructed code and close to the Shannon limits.

    • References | Supplementary Material | Related Articles
    • Theoritical Research of UWB Synchronization Based on Orthogonal Wave Modulation
    • ZHAO Cheng-lin;CHEN Qiao-qiao;JIANG Ting
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 97-101. DOI:10.13190/jbupt.200906.97.zhaochl
    • Abstract ( 2853 )     HTML       
    • A new ultra wideband (UWB) synchronization method is presented. This method modulates the synchronization signals and information signals respectively on tow carrier waves which are orthogonal mutually, and then combines them to transmit. After the hybrid signal is received, it will be decomposed according to the characteristic of orthogonal waves to get the synchronization signals and information signals. The information transmission system is designed by using this synchronization method. We also simulate the system and analyze the performance. The result of the simulation indicates that the system uses this synchronization method can transmit the synchronization signals and information signals at the same time and improve the synchronization performance obviously.

    • References | Supplementary Material | Related Articles
    • Threshold Signature Scheme Based on the General Access Structure
    • QIN Hua-wang;DAI Yue-wei;WANG Zhi-quan
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 102-104. DOI:10.13190/jbupt.200906.102.qinhw
    • Abstract ( 2640 )     HTML       
    • To the applied limitation of the existing threshold signature schemes based on the (t, n) threshold structure, a new threshold signature scheme based on the general access structure is proposed through combining the secret sharing scheme based on the general access structure and the threshold signature scheme based on the (t, n) threshold structure. The generation and verification processes of the partial signature and the group signature are introduced in detail. Both the validity and security of the proposed scheme are proved.

    • Supplementary Material | Related Articles
    • Study on the Novel Super-FEC Concatenated Code for Optical Transmission Systems
    • YUAN Jian-guo;ZHANG Ben;LIANG Tian-yu;WANG Wang;GU Sheng
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 105-108. DOI:10.13190/jbupt.200906.105.yuanjg
    • Abstract ( 2429 )     HTML       
    • The main construction methods of the forward error correction (FEC) code type for optical transmission systems are proposed and a novel super forward error correction (Super-FEC) concatenated code of RS(255,239)+BCH(2?040,1?930) to be applied for optical transmission systems is constructed after the characteristics of the concatenated code for optical transmission systems and the two super forward error correction(Super-FEC) code types in ITU-T G.975.1 ere analyzed. The simulation results show that this novel concatenated code, comparing with the RS(255,239)+CSOC(k0/n0=6/7,J=8) code in ITU-T G.75.1, has a lower redundancy and the better error-correction performance. Furthermore, its net coding gain (NCG) is respectively 045?dB, 048?dB more than that of BCH(3?860,3?824)+BCH(2?040,1?930) code and RS(255,239)+CSOC(k0/n0=6/7, J=8) code in ITU-T G.75.1 and 281?dB more than that of RS(255,239) code at the third iteration for the bit error rate of 10-12. Therefore, the novel Super-FEC concatenated code can better be used in optical transmission systems.

    • Supplementary Material | Related Articles
    • Proportional Fairness Resource Allocation in Multicast OFDM Systems
    • XU Wen-jun;NIU Kai;HE Zhi-qiang;LIN Jia-ru;WU Wei-ling
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 109-113. DOI:10.13190/jbupt.200906.109.xuwj
    • Abstract ( 2979 )     HTML       
    • A proportional fairness resource allocation algorithm, including both subcarrier assignment and power allocation, is proposed in multicast orthogonal frequency division multiplexing (OFDM) systems. The former is achieved by modifying the existing unicast subcarrier assignment algorithm, whereas the latter is implemented as allocating power via dual-bisection iteration, which is capable of obtaining the optimal allocation results when subcarrier assignment is determined. Simulation results demonstrate that the proposed resource allocation algorithm can achieve perfect fairness among users while maintaining the efficient capacity performance. It is also shown that multicast results have remarkable capacity enhancement comparing to unicast despite proportional fairness constraint. However, the capacity gain has a close relation with rate proportion and the number of multicast group.

    • Supplementary Material | Related Articles
    • Decoding Structure of Turbo Code Based on Parallel Prediction Control
    • XU Zhao;WANG Ke;LI Zhuo
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 114-119. DOI:10.13190/jbupt.200906.114.xuzh
    • Abstract ( 2304 )     HTML       
    • An decoding structure of Turbo code based on parallel prediction control (PPC-Turbo) is presented. The value of № (n+1) exterior information is predicted by prediction control algorithm (PCA). Compared to the traditional decoding algorithm, the PPC-Turbo structure based on PCA could reduce the complexity and delay of the decoding algorithm. The trend of the exterior information prediction is compared by the single predi
      ction 6~9thand the compound prediction 6+8th,7+9th exterior information values in sequence. It is verified the delay reduction by the compa
      rison of decoding delay under different frame length. The bit error rate performance curve is also compared between PPC-Turbo and traditional Turbo structure. The simulation results show that the process of the component decoder could be used instead.

    • Supplementary Material | Related Articles
    • Test Sequence Generation of a Communication Protocol by an Heuristic State Configuration Exploration
    • SHU Ting;SUN Shou-qian;WANG Hai-ning;XU Wei-qiang;LI Wen-shu
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 120-124. DOI:10.13190/jbupt.200906.120.shut
    • Abstract ( 2316 )     HTML       
    • Reachability analysis, which is widely used to generate executable protocol conformance test sequences, often causes state explosion problem. To overcome the problem, a heuristic state configuration exploration method is proposed. Using a weight extend finite state machine as a protocol model, the new method employs the heuristic state configuration exploration to replace the traditional strategy of breadth-first-search. In this way, the generation of executable protocol conformance test sequences is reformulated to find the minimum weight path in the whole state configuration space of a protocol implementation under test . The experiment results show that the proposed method is superior to breadth-first-search algorithm in time and space complexity.

    • Supplementary Material | Related Articles
    • A Novel Dynamic Spectrum Allocation Algorithm Based on POMDP Reinforcement Learning
    • TANG Lun;CHEN Qian-bin;ZENG Xiao-ping
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(6): 125-129. DOI:10.13190/jbupt.200906.125.tangl
    • Abstract ( 2687 )     HTML       
    • A game model based on Vickrey-Clarke-Groves (VCG) mechanism for dynamic spectrum allocation is presented, to solve the complexity problem of the dynamic spectrum allocation and reduce information exchange during the dynamic spectrum allocation. Further, a partially observable Markov decision processes (POMDP) reinforcement learning algorithm is presented. Through the observation and statistics of historical information, the secondary users enhance the reward value of bidding strategy by continuous learning, so as to obtain the optimal bidding strategy
      . Finally, the POMDP reinforcement learning algorithm is transformed into optimal strategy learning algorithm of belief Markov decision processes(MDP), which is solved by using the value iteration algorithm. The simulation results reveales that the POMDP reinforcement learning algorithm can significantly improve the performance of dynamic spectrum allocation.

    • References | Supplementary Material | Related Articles