2004 Vol. 33, No. 4

Research of Frequency Synthesizers Technology Based on DDS Array
Liu Guanghui, Tang Xiaohong
2004, 33(4): 341-344.
Abstract:
Spectral purity and frequency capacity are performance barriers of Direct Digital Frequency Synthesizers (DDS) that designers are striving to break. Traditionally, spurious signals are reduced by ways of better algorithms and improvements on DDS structure. In this paper a novel spur reduction method, DDS array method, is proposed and its performance is analyzed. And an experiment on the technology is operated to verify its feasibility.
Realization of IMT-2000 Base-Band Channel Simulator
Li Xing, Qian Jinghua, Wei Bo, Wu Shiqi
2004, 33(4): 345-348.
Abstract:
This paper describes models and algorithms for realizing the reference model proposed in ITU-R M.1225 for each test-operating environment including indoor office, outdoor-to-indoor/pedestrian and vehicular. Besides the brief description of the scheme as a whole, we discuss two algorithms in detail that are adapted to be realized in real time:shaping of slow fading with correlation and generation of frequency-selected multipath fading. The numerical results and simulation statistics given in the end show that the simulator gives good simulations of the first-order and second-order statistic characteristics.
A Difference-Spectrum Hybrid Method for the Solution of Maxwell Equations in Time Domain
Qi Hongxing, Chen Shude, Qiao Dengjiang, Pang Xiaofeng
2004, 33(4): 349-352.
Abstract:
A novel difference-spectrum hybrid numerical technique is proposed in this paper. In this method, each time dependent variable in Maxwell's equations is periodically continued with proper approximation, which results in the conversion of the continuous-spectrum problem to a discrete one by virtue of the consistent of solution before and after periodical continuation in the first period. The discrete spectra of the field quantities after continuation are obtained from difference Maxwell curl equations in frequency-domain and the time-domain solution of the original problem is derived from their inverse Fourier transforms. The strong point of the proposed method is its high capability of calculating any dispersive media and utilizing PML boundary condition without additional codes. Due to its unconditional stability, this technique excels Yee's FDTD in dealing with electromagnetic problems where the characteristic sizes of the scatter are much larger than the wavelength of the stimulant source. Numerical experiments demonstrate its effectiveness, easy implementation and high precision.
Development of an EM Simulation Software Based on the FDTD Method
Yan Shuhui, Wang Bingzhong, Yi Chun, Zhang Qiuju
2004, 33(4): 353-356.
Abstract:
An electromagnetic simulation software is developed. The software is based on the finite-difference time-domain (FDTD) method and can handle objects with curved surfaces and edges.The program includes a Visual Basic(VB) graphical user interface for graphically inputting object geometries and setting source and boundary conditions, and uses Fortran language to compute with a data file from VB. Examples that show the applications of the software for antennas and resonators are presented, and the results show good agreement with those reported in the published papers.
Numerical Analysis of Attenuation of Electromagnetic Wave in Non-Uniform Magnetized Plasma Slab
Wang Huadong, Yan Yang, Guo Jun
2004, 33(4): 357-360.
Abstract:
The attenuation of the electromagnetic wave in the non-uniform plasma slab cling to a metal plane is studying in this paper. The plasma slab is divided into a number of sub-slabs each of which is dealt with as a uniform slab. Detailed numerical calculations are conducted on Epstein-distributions. The effects of electron number density, momentum transfer collision rate, magnetic field and angle of incidence on the attenuation are taken into account, and get the character of plasma's absorbing electromagnetic wave.
Investigation on the Dual Koch Fractal Antenna with Sleeves
Wang Qi, Ruan Chengli, Sun Yijun, He Qingqiang
2004, 33(4): 361-363,390.
Abstract:
A novel dual-koch fractal antenna with sleeves is presented, and dependences of its resonant parameters on the indentation angles, the half cone angles, the sleeve space and the sleeve height are investigated by using the method of moment. Based on these discussions, a double-band unipole antenna for application of GSM/DCS is designed by using the genetic algorithm. All the analyses show that dual-Koch fractal antenna has much lower resonant frequency than single-koch fractal antenna, and the resonant frequency decreases with increase of the indentation angle. The sleeves can effectively improve the performance of the fractal antenna at high resonant frequency. That is, its space and its height have excellent ability to tune at high resonant frequency.
Models for Cross-Coupling and Its Implementation in Cavity-Filters
Li Xin, Nie Zaiping
2004, 33(4): 364-367.
Abstract:
Two models for analyzing both the cross-couplings and their phase relationships and the implementation in cavity-filters by establishing auxiliary signal passages and adding control parts between non-adjacent resonators to both introduce finite transmission zeroes and optimize the performance of filters are proposed. The feasibility and practicability of the method are validated by design examples based on the presented models.
Influence of Array Elements Direction on DOA Estimation
Shu Mengmeng, Yang Feng, Nie Zaiping
2004, 33(4): 368-370.
Abstract:
Many DOA estimation algorithms, reported in the past literature, are presented and used with the problem that the elements of smart antenna arrays are usually of no direction. The paper analyzes the influence to DOA estimation by MUSIC algorithm when the antenna elements have direction. The effect of mutual coupling is calibrated and some factors that influence the DOA resolution are analyzed. The simulation results are compared and the conclusion is reached that element direction, the direction of array and SNR have great effect on DOA resolution.
Design of Open-Loop Resonator HTSC Linear-Phase Filter
Zhang Tianliang, Yang Kai, Bu Shirong, Liu Juanxiu, Luo Zhengxiang
2004, 33(4): 371-373.
Abstract:
The coupling gap between traditional open-loop microstrip resonators of high temperature superconductivity filter is too narrow to be fabricated with normal photolithography technology. This paper studies the mixed coupling of high temperature superconductivity open-loop microstrip resonators and presents a new improved resonator structure which can be fabricated with normal photolithography technology. A six-pole high temperature superconductivity linear phase filter is designed with this new structure and simulated results are also presented here.
Communication System of Two-Dimensional Optical Code-Division Multiple Access
Dong Haifeng, Ma Zhigang, Pu Tao, Wu Di, Yang Shuwen
2004, 33(4): 374-377.
Abstract:
The concepts of optical orthogonal code and two-dimensional optical orthogonal code are introduced, and their performance is analysed.The paper analyses three types of two-dimensional optical code-division multiple access communication systems:T/S OCDMA、WDM+OCDMA、MW OCDMA, and compares their performance. The design of two-dimensional optical orthogonal code fiber delay line encoder and decoder, and the scheme of the encoder based on fiber grating is presented.
Analysis of Quasi-Synchronous Broadband CDMA Mobile Satellite Communication
Hao Xuekun, Ma Wenfeng, Zhang Gengxin, Ma Yifei
2004, 33(4): 378-382.
Abstract:
The system of synchronous CDMA has large capacity, however it is difficult to implement in mobile satellite condition. So we consider establishing quasi-synchronous system. In this paper, the effect of quasi-synchronous error to broadband CDMA mobile satellite system is analyzed through computer simulation. The performance of CDMA system is improved distinctively in the condition of quasi-synchronous. This paper presented one strategy to realize quasi-synchronous in satellite environment, and discussed its feasibility. After analysis, we find that this strategy is feasible and implemented easier with the increase of orbit elevation.
Analysis and Improvement of Modular Inverse Algorithm
Tan Lijuan, Chen Yun
2004, 33(4): 383-386,394.
Abstract:
Usually modular inverse operation becomes bottlenecked in realizing the public key cryptosystem. The method commonly used leads to a lot of division operation. The modular inverse operation by extended Euclidean algorithm and the binary extended Euclidean algorithm are analyzed, and the improved modular inverse operation by binary extended Euclidean algorithm is presented in this paper. The result shows that the new algorithm runs faster than the old one under the given testing environment. Furthermore it has much more feasibility in hardware realization.
High Performance Static Image Compression on DSP
Tian Mao, Yan Bo, Li Guangjun, He Jun
2004, 33(4): 387-390.
Abstract:
Providing a low-cost solution on static image procession. In this system, digital signal processor(DSP) is the core of high performance compression and image data procession. The system uses CCD for getting digital image, uses a 16 bit fix-point DSP to perform fast discret cosine transform(DCT) arithmetic and image encoding and realizes a fast image compression in end. The compression result testifies the high performance of the system.
Improved Algorithm of the Filter Based on the Generalized Morphological Filter with Omnidirectional Structuring Element
Ma Yide, Zhang Xiangguang, Yang Miao
2004, 33(4): 391-394.
Abstract:
The close-opening or open-closing filter based on the morphological filter with the same size structuring element cannot remove all the positive or negative impulse noise effectively. To improve the performance of these two kinds of filter, the generalized close-opening and open-closing filter based on the morphological filter with the different size structuring element are put forward. Based on the generalized morphological filter, this paper suggests a kind of designing project of the filter that applies a new structuring element to the generalized morphological filter. The theory analysis and the simulation experiments of the image processing indicate that this kind of filter can not only remove noise effectively but also keep the details of the image sufficiently.
Designing and Implementation of Bluetooth Remote Controller System
Huang Guoping, Wang Jinlong
2004, 33(4): 395-398.
Abstract:
Bluetooth is a short range and low power wireless network technology.The remote controller of portable radio station needs a wireless link. In this paper, a hardware and software designing of Bluetooth remote controller system is presented, which is implemented through embedding bluetooth technology to radio station, using bluetooth module along with personal digital assistant (PDA) module. With this solution, remote interface of radio station is improved, bluetooth remote controller makes it more portable and its operation more convenient for portable radio station.
Research on Novel Low-Loss Wide Angle Y Branches of Graded-Index Waveguides
He Xiaowei
2004, 33(4): 399-402.
Abstract:
A new low-loss wide-angle Y branches is proposed based on the graded-index waveguides in this paper. The Results of theoretical analysis and the simulations by finite-difference beam propagation method (FDBPM) show that the radiation losses can be less than 0.18 dB even if a branching angle is as large as 10°. Compared with traditional Y branches, the new Y branches is characteristic with low losses and simple structure.
Application of LSM-Based Data Source on Anomaly Detection
Zhang Heng, Zhang Yusen
2004, 33(4): 403-406.
Abstract:
The research of anomaly detection now focuses on four aspects:selection of data source, specification of behavior, normal behavior learning, behavior matching. For the first aspect, a new data source, which is based on linux security modules, is presented in paper. In order to test its effect, we employ two kinds of method:information-theoretic measures and Markov chains model, and we also compare the result with data of system call. The conclusion of experiment indicates that this data source is useful and even better than data of system call under certain condition.
Fast Multi-Face Detection Algorithm Based on Hausdorff Distance
Yang Qingsu, You Zhisheng, Zhang Xianyu
2004, 33(4): 407-409.
Abstract:
This paper provides a fast and accurate algorithm of multi-face detection that is robust to the change of background and light. Because the multi-template matching algorithm based on Hausdorff Distance is very complex, many resolution techniques, such as decrease the dimension of model, find the area of interest, and get the fittest model based on the distance between transformation, have been used to advance the computation efficiency. The algorithm's performance was proved by experiment results.
fMRI Time Series Image Registration Using Projection Technique
Luo feng, Chen Huafu, Yao Dezhong
2004, 33(4): 410-413.
Abstract:
A new automatic image registration method was presented in this paper, which was based on projection technique and suitable for functional magnetic resonance imaging times series images. The binary times series images were projected onto the horizontal orientation or the vertical orientation, and the arguments of rotation and translation were calculated according to the elements of the projection vectors. The method wad proved to be validated by the results of the simulation experiment and the application of functional magnetic resonance imaging data.
A New Signal Model of Selective Attention Evoked Potential and Its Primary Application
Yao Dezhong
2004, 33(4): 414-418.
Abstract:
Presented is an analytic signal model Va=GVu + W with Va and Vu corresponding to the event-related potentials (ERPs) evoked by attended and unattended visual stimuli, respectively. A total least square algorithm is utilized to get the G and W, then the effect of attention is decomposed into two aspects:attention induced activities (W) and a gain control (G) of unattended. Applied to a spatial attention ERP data, an integrated concept of selective attention is suggested that the early gain amplification (G>1.0) and newly involved neuron activities (W) before 200 ms after the stimulus onset mainly aim at obtaining an improved signal/noise ratio, the late gain supression (GW) after 200 ms aim at specific cognitive processing of the selectively enhanced signal.
A Multi-Agents Based Effective Response System for Intrusion
Zhou Shijie, Qin Zhiguang, Zhang Feng, Zhang Xianfeng, Liu Jinde
2004, 33(4): 419-422.
Abstract:
Flexible intrusion detection and response system (ID&R) needs to maximize security while minimizing cost and making response automatically. A multi-agents based response system, CI2D&R, the cost-based intelligent intrusion detection and response system, is proposed in this paper, which is originally developed as a facility to deal with network-based attacks and to take effective response automatically and intelligently. The networking environment deployed with the CI2D&R consists of two major parts:Guard, which runs on the specific guarded host (GH), and Spy, which runs in guarded network (GN). The components of the CI2D&R are introduced, which include intrusion detection, attack classification, damage analysis, attack path rebuilding, resources automatically safeguarding, disaster recovery, and security management. The several kinds of data flow in CI2D&R are discussed, too. While CI2D&R is only a prototype, some special safety considerations of agents are also addressed.
QoS Guarantee for Self-Similar Traffic Flows
Wen Jun, Ren Liyong
2004, 33(4): 423-426.
Abstract:
Network quality of service in future needs to consider the impact of inherent self-similar. Traditional networks ignore this. The paper utilizes Fractional Brownian Motion model to build a network model, which improves statistical multiplexing efficiency by controlling effective bandwidth and provides services by admission control. Experiment verifies that FBM model can realistically describe packet traffic flows, predict their performance, make full use of network recourses, and make up the deficiency of conventional queue models.
A Multicast Routing Algorithm of Multi Constraint Conditions
Zhang Xuanfang
2004, 33(4): 427-429,433.
Abstract:
The article presents a multicast routing algorithm that meets three constraint conditions in the multicast application. The algorithm comprises two steps. First the algorithm is based on MPH and adjusts the nodes' rank in the current multicast tree, and gradually gets the low cost and hop constrained multicast tree by selecting the destination node with minimum cost to current multicast tree in turn. Then some relay nodes, which is not fit for the requirement of the resource consumption, is deleted. The rest of the relay nodes makes up of the final multicast tree, which consumes the least time slot.
Research on a Multistage P2P File Transmission System Architecture
Zhao Jidong, Wang Xiaobin, Zhang Wei, Zeng Jiazhi
2004, 33(4): 430-433.
Abstract:
This paper analyzes the existing P2P soft wares and their deficiency and inability to transmit data efficiently and hereby presents a new kind of P2P file transmission system architecture. This architecture is based on the existent IPv4 network,working on a unique three leveled multistage RootServer-GroupServer-User structure to improve efficiency. UDP-tunnel technology is employed to solve the problem in realizing the NAT-NAT data transmission. A new search-mode is adopted, files are well classified and indexed, and all of the processes of file transferring are properly monitored in this architecture. The results of the running of the system prove that the system makes an efficient use of the network bandwidth and the efficiency of file transmission is highly increased.
On the Security Mechanism in Mobile IPv6
Du Xiaodan, Zhang Fengli, Yang Yigao, Yan Tao
2004, 33(4): 434-437.
Abstract:
The paper is dealing with the IPSec Protocols and analysing the structure and key technology of security association, authentication header, encapsulating security payload and Internet key exchange. On the basis of the discussion, it presents the practical design of IPSec, which can effectively ensure the security of data transmission in IPv6. In practice, there are two models can be selected, transmission model and tunnel model, transmission model can only be used on condition that IPSec is applied to the systems of the sender and the receiver. Therefore, in most cases, tunnel model is used because it is not necessary to make any change to the user's system.
Fault-Tolerant Rate-Monotonic Scheduling with Resource Reclaim
Wang Liang, Lei Hang
2004, 33(4): 438-441.
Abstract:
Fault-tolerant real-time scheduling algorithm through time redundancy, whose schedulability bound is based on the worst execution time of tasks and the time reserved for tasks' fault-tolerant operation, has high rejection rate and low resource utilization. This paper presents fault-tolerant rate-monotonic scheduling with resource reclaim, based on FT-RM, to improve resource utilization and tasks throughoutput. This algorithm makes use of the attribute that the actual execution time of task is shorter than the worst execution time, to reclaim and reuse the resource released by the ended task. At last, the performance simulation and analysis of the scheduling algorithm are presented and factors that affect performance are investigated.
Lattice Model of Secure Labels for Dynamic Multi-Level Security System
Tan Liang, Luo Xun, Zhou Mingtian
2004, 33(4): 442-445.
Abstract:
Conception of secure labels is analyzed, and defined by formalization, subsequently the lattice model theory of labels for dynamic multi-level security is established, which shows that the set of secure labels for dynamic multi-level security comes into being "lattice order" in math, and solves the existence of g.l.b and l.u.b when one secure label compares to other, and establishes the theoretical basis for change from static multi-level security to dynamic multi-level security according to the history sensitivity.
Contour Feature Point Detection Algorithm of CCD Image
Hou Xuezhi, Yang Ping, Zhao Yunsong
2004, 33(4): 446-448.
Abstract:
The image is segmented to Bi-value image with max variance algorithm, and then the edge is detected by a series of image morphology algorithm including grads, thinning and cutting. The eleven point curvature-computing method is used to locate the area of corner and point of tangency. An improved algorithm based on least square fitting is given to search corner and point of tangency. This algorithm is applied to the cutting tools measurement system based on image processing and the actual result proves it has a good noise-resisted performance and can detect feature points accurately.
Research on Production Determining under Demand with Multi-Peak-Load
Qian Yunguang, Tang Xiaowo
2004, 33(4): 449-452.
Abstract:
Basing on the methods of production determining to the peak-load demand, the paper studies the models of production determining according to the demand that the manufacture facing with uncertain multi-peak-load. The paper establishes the model of production determining under demand with multi-peak-load and presents the methods of production determining under demand with multi-peak-load. The methods can apply to the production pricing especially to the electric power industry.
Design and Analysis for Laser Doppler Signal Tracking-Differentiator
Li Zhigang, Wang Baoguang, Du Zhenhui, Jiang Chengzhi, Zhang Litao
2004, 33(4): 453-456.
Abstract:
In order to track Doppler signal effectively, a linear discrete-time tracking-differentiator is designed. For the integral-bounded input signal on an arbitrarily finite field, the progressive stabilization and the rapidity of this kind of tracking-differentiator are proved from mathematical analysis and the result of simulation. The obvious error occurred in difference method can be basically removed by using this kind of linear discrete-time tracking-differentiator and the design process is simple.
Fast Algorithm for Coefficients of Digital Fractional Differentiator
Teng Xudong, Yuan Xiao, Zhao Yuanying, Wei Yonghao
2004, 33(4): 457-460.
Abstract:
A new fast algorithm for calculating the coefficients of ideal digital fractional differentiator is presented. It is difficult to compute directly the coefficients from the integral formula, since the integral function in the formula of the ideal digital fractional differentiator is a high-order oscillating function. Based on the properties of the integral formula, it's easy to convert the oscillating factor to the integral upper limit. Therefore a set of recursive expressions for calculating coefficients of ideal digital fractional differentiator are introduced in this paper. The experimental result shows that the new algorithm decreases the amount of operation greatly, at the same time promotes the algorithm's efficiency as well as avoid integral of high-order oscillating function.
Classical Qualitative Research on the Energy Level and Spectrum of Anti-Hydrogen Atom
Yu Changfeng, Yan Yimin, Yan Kun, Yang Xintie
2004, 33(4): 461-463,484.
Abstract:
By using a classical screened Coulomb potential with two phase factors and adopting classical analytical methods, the predictive descriptions on the energy level and spectrum of anti-hydrogen atom are given. As a result, the great differences of the energy level and spectrum between anti-hydrogen atom and hydrogen atom are found. The main quantum number n is a fraction less than 1 and the spectrum of the anti-hydrogen atom occurs only when the positron transits from ground state to excitation state, which is just contrary to the luminescent mechanism of an hydrogen atom.
An Increment Method of Data Mining for Trend Analysis
Zeng Yiping, Zhu Hong, Long Wenguang
2004, 33(4): 464-467.
Abstract:
In the paper, a new increment method of data mining is presented. Based on encoding the transaction data item set, the original data is transformed into a integral variable series is proved to be a Markov chain in theory. And instead of transfer probability, frequency is used in transfer probability matrix. Then a module is built for trend analysis.The analysis for the sale data of supermarket indicates that the method is fine, and a nice result that customs choice is same to different bland of one product is received.
A Feasible Trust Algorithm of Nonlinear Max-Min Problems
Chen Huafu, Niu Hai
2004, 33(4): 468-470.
Abstract:
A feasible trust algorithm which used maxim-entropy methods, a class of max-min problems with nonlinear constraints turn into nonlinear programming problems with inequality constraints is proposed. The algorithm which resolve general max-min problems is global convergent. Preliminary numerical experiments show that the proposed algorithm is effective.
Linear Transformation Approach for Stein Equation
Jia Lixin
2004, 33(4): 471-473.
Abstract:
Using the linear transformation method, this paper gives the necessary and sufficient conditions for Stein equation to have unique solution.The unique solution is also obtained. The method in this paper is elementary and the results are richer than the conclusion quoted from the references of this pojoer. The method in this paper can also be used to deal with mtrix equations on general field, which supplies a new method to cryptography.
Well Posed of New Model for Nonlinear Equation of Flow in Low Permeability Gas Reservoirs
Wu Xiaoqing, Du Ning, Zhong Shouming
2004, 33(4): 474-477.
Abstract:
In this paper, the effect of gas slippage in low permeation gas reservoirs is researched. Firstly, as the phenomenon of gas slippage has effected to the rate of permeation in gas measure, the mathematical model of nonlinear parabolic partial differential equation which reflects the rule of low permeation porous medium gas permeance is built according to the effect. Then the well posed of the solution to the nonlinear partial differential equation model in the condition of nonlinear boundary is analyzed in mathematical way. We also theoretically prove the existence, unique and stability of the solution to the model. Those results build the foundation for numerical calculation.
On the Strict Majority Domination Number of Unions of Some Graphs
Ren Qingjun, Fu Yingding
2004, 33(4): 478-480.
Abstract:
In this paper, the signal majority domination number of graphs is generalized to strict majority domination number of graphs. We investigated the strict majority domination number of some unions of graphs based on the signal majority domination number of graphs. According to study for strict majority domination number of some unions of graphs, we determined the strict majority domination number of some unions of graphs and discuss relation the strict majority domination number of some unions of graphs and order number of graphs.
Integral Invariants of Relativistic Birkhoff Systems
Gu Shulong, Zhang Hongbin
2004, 33(4): 481-484.
Abstract:
The relativistic integral invariants of Birkhoffian systems are studied. The simultaneous variant equations and non-simultaneous variant equations to the relativistic Birkhoffian systems are constructed respectively. we demonstrate a theorem, i.e. by virtue of a given first integral of the system, a integral invariant of system may be constructed, and further give it's inverse theorem.