2001 Vol. 30, No. 6

Design of PLL Frequency Synthesizer by the Method of Extreme Value Phase Margin
Liu Guanghu
2001, 30(6): 551-554.
Abstract:
A passive loop filter scheme and the design method of the filter for current charge pump PLL frequency synthesizer chip are given in the paper. The method is known as the method of extreme value phase margin. Also, all design formula are proved. In fact, the PLL frequency synthesizer is 2 typeⅡ (3~4) order loop model. Using the method and formula above, a L-band synthesizer has been finished. It has satisfactory performance on phase noise, frequency jump speed and spur rejection.
Smart Ka-band Phase Locked and Frequency Multiplying Source
Xu Ruimin, Yan Bo, Li Jiwei
2001, 30(6): 555-558.
Abstract:
The development for smart millimeter wave jumping frequency synthesizer is suggested in this paper. To meet the need of miniaturization, the method of phase locked in microwave band and then multiplying into millimeter wave band is applied, and the super-small, ordinary 10 MHz crystal oscillator is chosen in the system. The volume of the synthesizer is in 150 cm3. The testing results show that phase noise is better than-65dBc/Hz@10kHz and output power is over 10 dBm in 29~31 GHz output frequency and 20 MHz step frequency. The millimeter synthesizer can be used in the Ka-band receiver as local oscillator or the transmitter as standard source.
Simulation of Survivability of Bi-directional Two-fiber Ring Network on PTDS Platform
Li Zhonggui, Qiu Kun, Zhang Hongbin, Xue Fei
2001, 30(6): 559-562.
Abstract:
The broad applications and extensive research interests have been placed on ring networks due to its excellent performance in network survivability and its simplicity. A three-node, bi-directional, two-fiber ring network is implemented on the basis of PTDS platform, and a simulation for single fiber failure can be realized through changing the fiber loss and then the receiving power of powermeter of the simulation system. The survivability of the ring network on a single fiber failure is simulated under the given policy for RWA(routing and wavelength assignment). The analysis of simulation result indicates that the ring network introduced in this paper has excellent survivability and the result is helpful in designing the ring network.
Reserch and Implementation of Fiber Optic Two-way Transmission System for Video & Data
Qiu Qi
2001, 30(6): 563-566.
Abstract:
A fiber optic two-way transmission system for video & data is designed by using wavelength division multiplexing(WDM) technology. The system, therefore, realizes to transmite one channel of video signals upstream and one channel of data signals downstream in a single mode fiber. In the design, the PFM (pulse frequency modulation) technology is used for video transmission, and the FSK (frequency shift key) technology is used for data transmission. The system can transmite signals of video & data longer than 100 kilometers without repeater.
The Analysis of Triangular V-plate Antennas (TVA)
Ruan Chengli, Wei Maogang
2001, 30(6): 567-570.
Abstract:
Utilizing the elliptic V-cone antenna (EVA) as a universal model, when k→ 0,the elliptic V-cone antenna retrogresses to a triangular V-plate antenna. The input impedance of the TVA can be derived through the EVA related formulas. The analysis shows that the TVA is a pure resistive antenna with a higher input impedance than that of corresponding EVA. The parameters and curves of the input impedances of three sorts of TVA are given. It is useful for engineering design.
The Comparison of Axial Energy's Decaying Property Between Sine and Isosceles Trapezium Electromagnetic Wave Pulse
Yang Hongchun, Ran Chengli, Pei Jun
2001, 30(6): 571-575.
Abstract:
Assuming the cycle T1 of sine wave of the sine electromagnetic wave pulse is equal to the central frequency of the isosceles wave of the isosceles trapezium electromagnetic wave pulse and both have same general pulse cycle T. Studying the axial energy's decaying property of the two waveforms on the same circular radiation antenna through the analytical and computer digital simulation, the results indicate:(1) In the slow decaying area of the isosceles trapezium electromagnetic wave pulse's propagation, when the rising time of isosceles trapezium waveform is less than one twentieth of the sine waveform's period, the axial energy's decaying property of isosceles trapezium electromagnetic wave pulse is better than that of sine electromagnetic wave pulse; (2) If k, the number of sine waveforms contained in one sine electromagnetic wave pulse, is far larger than 1, the sine electromagnetic wave pulse, no matter what different value of k, will have same decaying property.
Application and Research of a Date Encryption in Monitor System
Zhang Jing
2001, 30(6): 576-579.
Abstract:
The paging transmitter is an important equipment in wireless paging system. To ensure reliable work and the safety of the paging transmitter, this paper offers a intelligent monitor system of the special purpose. This paper describes the work principle and the structures of hardware for intelligent monitor system., also analyzes the realization principle used for remote control and measurement from how to design the address codes and the remote control commands. In this paper, the key techniques of intelligent monitor system to ensure the security of data and system reliability such as IDEA (International Data Encryption Algorithm) cryptographic and decipher method, MD5(Message Digest 5) message authentication are illustrated here. Practical test verifies the validity of this intelligent monitor system in improving the security and the reliability of the paging transmitter.
Optimizing the Construction Relations of Chiral Slab via Genetic Algorithm
Gao Yuanci, Lei Wenqiang, Zhao Deshuang, Liu Shuzhang
2001, 30(6): 580-584.
Abstract:
A novel method of optimizing the continuous variable constitutive relation of multilayered chiral slab based on genetic algorithm is discussed in this paper. The method derive automatically the continuous variable constitutive relations. The reflection coefficient is calculated by wave-splitting method. Further more, the genetic algorithm is used to search the maximum absorbability of the chiral slab with certain thickness. The one point crossover GA and two points crossover GA have both been tested in the research, the latter one is really more stable than the first one and it's very important to set the proper crossover ration and mutation ration. The advantage of GA would be presented more obviously in designing artificial chiral material model with more variables.
A Rate-Based Congestion Control Mechanism for Multicasts
Ren Liyong, Lu Xianliang
2001, 30(6): 585-589.
Abstract:
Congestion control is key problem in designing multicast protocols. The merits and shortcomings of sender-drivered and receiver-drivered in congestion control are analyzed respectively. Then a congestion control mechanism for multicast, RBMCC that is rate-based and drivered mixedly by sender and receiver, is presented. In RBMCC, each receiver estimate its packet loss rate respectively and send ACKs to its parent, intermediate nodes aggregated these ACKs that come from all of children. TCP-friendly rate computed by sender provide timely and accurate response to the network congestion. The results of experimental simulation show that RBMCC is quite flexible with satisfactory equality.
Research and Implementation of Object Transactions Service Based on POA in CORBA
Yang Tao, Zheng Xiaoxia, Liu Jinde
2001, 30(6): 590-595.
Abstract:
This paper introduces the concept of transaction and its properties, including atomicity, consistency, isolation and durability. The two-phase commit algorithm to guarantee the ACID properties is described. The architecture of object transaction service in CORBA is studied. It also addresses the object oriented mechanism of distributed transactions processing by analysis of the objects and interfaces in the specification, Based on portable object adapter the implementation of most interfaces including transaction factory, control, coordinator and resource is presented.
SecurityTolerance and Performance Analysis of Multi-Keys KDC
Zhang Xianggang, Liu Jinde
2001, 30(6): 596-599.
Abstract:
With the widespread use of the Internet, security becomes a critical problem in various applications. In a security system, keys play a fundamental roll. In the paper, the keys management between users and KDC (key distribution center) is changed to improve the security tolerance of system and to alleviate the danger of leaking key. Two methods are applied in the paper. One is that different key encrypting keys are applied between users and different KDC units; the other is that many key encrypting keys are applied for a data key before data communication to get the different part of the data key. Then their performances are analyzed. Results of the analysis prove the methods proposed in the paper in favor of achieve above motive.
The Data Sharing of Multitasking in the Real-time Dynamic Simulation Environment
Chen Wenyu, He Yuanqing
2001, 30(6): 600-603.
Abstract:
Owing to the demand of the data sharing between different application programs, based on the feature of Windows NT and VC++, a method for data sharing by using DLL is proposed. The method solves the problem of data sharing of multitasking on real-time dynamic simulation environment for Windows NT. The shared data are defined in one DLL file and which can be shared by every application program, even the application program with different languages. The application program can also access the shared data indirectly. The method is convenient and useful.
A Study of Management Information System in Internet/Intranet Environment
Liu Weiguo
2001, 30(6): 604-608.
Abstract:
This paper studies a new operation model of MIS-ⅡMIS, which is the combination of Internet/Intranet and traditional MIS. The architecture model of ⅡMIS is discussed, and also, a compound MIS architecture model is put forward. Then the function of ⅡMIS is explained. ⅡMIS is a distributed, integrated full-service information system. The realization techniques and security of ⅡMIS are discussed. Web-based database access technology and distributed computing technology are primarily analyzed. Various ⅡMIS security mechanisms are also discussed. The combination of security mechanisms forms ⅡMIS security architecture.
The Design and Implement of Image File Reliable Transmission Software
He Xinggao, Qin Zhiguang, Li Lingfei
2001, 30(6): 609-612.
Abstract:
This paper introduces the development and the importance of express highway toll system and monitor system, the development courses of image capture, transmission and management in toll system, as well as the equipment, technology, methods to be used in every course and their advantages and disadvantages. It describes the image file transmission and management of toll system using share directory, directly write on data base using TCP/IP protocol or ODBC, HTTP or FTP protocol, middleware products in network environment, as well as their advantages and disadvantages. It also gives a design method of software, and its implement procedure, for toll image file's reliable, effective, automatic transmission by using UDP communication transmission protocol in network environment. The software can make the toll system image file transmission become more convenient and effective with a low cost.
Object-Oriented Software Test
Chen Wenyu
2001, 30(6): 613-617.
Abstract:
This paper describes and discusses about how to test the object-oriented software at the tree phases of object-oriented analysis(OA), object-oriented design(OOD) and object-oriented programming (OOP) while taking the object-oriented software development model in software engineering as reference. Following and taking some useful methods of the traditional three testing steps, unit test, integrated test and system test, an effective method for object-oriented software test is proposed. In associate with the traditional testing technology, and as a solution for the problems caused by the new properties of object-oriented technology in testing, a new testing model is also presented. The new testing model is convenient and functional for software test.
A Dynamic Scheduling Service Model for Real-Time CORBA
Luo Zhigang, Tan Hao, Liu Jinde
2001, 30(6): 618-624.
Abstract:
The architecture of scheduling service specified in real-time CORBA is introduced and its limitation is analyzed in details. Through cooperation of client scheduler and server scheduler, the admission test that whether a new client is permitted to execute on a particular processing node is accomplished. Based on the admission test, a dynamic scheduling service model is proposed, which overcomes the limitation of current real-time scheduling service and can be applied to a dynamic open real-time CORBA system. At the end, a dynamic CORBA system based the scheduling service is presented.
The Study of Waveform Fuzzy Identification Based on VXIbus Measurment
Ma Yanheng, Liu Lin
2001, 30(6): 625-628.
Abstract:
It analyses the characteristics of the VXIbus test result,and a method for waveform fuzzy identification based on VXIbus measuring results is also presented. The topic includes waveform's parameter model, acquisition of the waveform characters, the construction of optimum fuzzy subset, fuzzy measurable level and control factor, and symptom value. In the meantime, the possibility of this method has been illustrated through its practice in the fault diagnosing system.
A CCD Measurement System for the Deflection of Truss
Wang Chunyu, Ding Jiexiong, Wen Ji
2001, 30(6): 629-632.
Abstract:
It describes a kind of Charge-Coupled Device(CCD) Measurement System for special use. Under the control of the single-chip microcomputer subsystem, the measurement system can collect, save and process the positioning signal of laser spots from CCD, then sends the result to computer for storage, display and processing through far-distance communication interface, and with the system it can detect the deflection of truss at multi points at the same time. Through a long time operation, it shows that the system has the characteristics of celerity, accuracy and convenience, and also it can be widely used for multi-point measurement and detection.
A Measurement Method of Microwave Surface Resistance of Large Area High Tc Super-conductive Thin Films
Zhang Yingmin, Luo Zhengxiang, Yang Kai, Zhang Qishao
2001, 30(6): 633-637.
Abstract:
The surface resistance Rs of a single piece of high Tc super-conductive thin film can be measured by a sapphire resonator with TE011+δ mode non-destructivity, at 77 K. By measuring the value of the resonator's quality factor, the microwave surface resistance Rs of testing sample can be also determined. A new measuring method is presented, and the surface resistance can be calculated. To measure Ô50.8mm high Tc super-conductive thin film, a special sapphire resonator working at 12GHz is made and used. The method has advantages of non-destructivity, single sample, high Q value, high sensitivity, convenient experiment setup, small volume, and flexibility in operation.
Fuzzy Data Correlation Based on the Predicted Validation Region
Zhang Yu, Zhang Jianzhou, You Zhisheng
2001, 30(6): 638-642.
Abstract:
Multitarget-multisensor tracking systems consist of data correlation and state estimation. The multitarget tracking is made interesting by the data association problem. The data correlation and state estimation are both certainly independent and closely relative, but the performance of tracking systems can be improved by suitable incorporating the two components. In this paper, a fuzzy correlation approach is presented based on fuzzy clustering means algorithm with Mahalanobis distance. The approach, in a sense, fuses two different procedures of data correlation and state estimation. The simulation result using Monte Carlo method is given to demonstrate the efficiency of the new approach.
The Stability Conditions of Time-varying and Neural Large-scale Systems
Cao Kecai, Zhong Shouming
2001, 30(6): 643-646.
Abstract:
In this paper, the problem of asymptotic stability for two kinds of systems, the time-varying and time-delay system as well as the connective time-delay system, are studied by utilizing the method of decomposition for large-scale system and a generalized inequality. The sufficient conditions of asymptotic stability for the systems are concluded from the research. It also discusses a kind of neural time-delay large-scale system. A method of discrimination for the exponential stability of the solution of a neural time-delay system is obtained by applying method of constant change and the direct estimation on the solution of differential equation. All the discussions for the two kinds of systems are under the complicated situation with connective time-varying and time-delay, the results obtained from this research are different from the results reported by any bibliography ever before.
Decomposition Theorems of Fuzzy Rough Sets
Zhao Lei, Shu Lan
2001, 30(6): 647-650.
Abstract:
Based on the structural property of Fuzzy Rough Sets which a pair of lower and upper approximations are Fuzzy sets, and the different concepts of cut sets and decomposition theorems of Fuzzy sets are used to define the concepts of cut sets of Fuzzy Rough Sets and relevant decomposition theorems of Fuzzy Rough sets. Through the different decomposition theorems of Fuzzy sets, the different decomposition theorems of Fuzzy Rough Sets are proved. The relationship between Fuzzy Rough sets and normal sets is well explained by the decomposition theorem of Fuzzy Rough Sets. The decomposition theorem presented in this paper is very import and well applied both in theory and practice.