2005 Vol. 34, No. 1

Engineering Design of the Transient Back-Cavity Bowtie Antenna
ZHOU You, PAN Jin, NIE Zai-ping
2005, 34(1): 1-3,7.
Abstract:
An effective method is proposed for the design of the transient back-cavity bowtie antenna for ground-penetrating radar(GPR)applications, which is based on the demand that the maximum energy of the transient signal ought to be emitted downward to the earth in GPR. In the process of the design the frequency band of the antenna is first determined by analyzing the frequency spectrum of the transient pulse to be radiated, and then the structure sizes of both the antenna and back cavity can hereby be found easily with the presented method. The proposed method for the antenna design, having great facility in the engineering applications, has been validated by experiments and numerical simulation results. Otherwise, a GPR system, based on such-designed antenna with good performance in the buriedobject detections, was developed with success.
Current Statistical Probabilistic Data Association Algorithm
ZHANG Jing-wei, XIONG Wei, HE You
2005, 34(1): 4-7.
Abstract:
How to track a maneuvering target is a key problem of target tracking in clutter. The difficulties of the maneuvering target tracking lies in the uncertainty of state model, and the clutter make it more complex. The paper presents a current statistical probabilistic data association algorithm for tracking a maneuvering target in clutter. The algorithm combines current statistical algorithm with probabilistic data association algorithm. When this algorithm estimate the state of a maneuvering target with current statistical algorithm, the probabilistic data association algorithm is used to resolve association problem. At last, a Monte Carlo simulation is used to analyze the performance of the method. And the results suggests this algorithm can estimate a maneuvering target in clutter efficiently.
Edge Clone of Medical Image
ZHANG Guang-yu, ZHU Wei-le
2005, 34(1): 8-11.
Abstract:
Edge detection of medical image is important in medical image processing. We suggested an algorithm of medical image edge clone based on clone technique. First of all, we analyzed the principal of clone technique and built mathematical model of clone technique, then we analyzed principal of edge clone, supposed activation gene and constructed weight gene function. We obtained clone function by using duplicating theory. With human visual properties, method of threshold choice in edge clone was suggested. As a result, simulation experiments compare with the result of edge detection of Canny Operator, and demonstrate better edge recognition capability of the algorithm.
A FPGA-Base High-Speed Image Pre-Processing System Design
WANG Yu-zhou, JIN Sheng-zhen
2005, 34(1): 12-15.
Abstract:
A single-chip Field Programmable Gate Array(FPGA) Image pre-processing system is introduced. This system is used to complete a series of real-time, multi-task and high-speed image processing tasks, including improving image signal-to-noise ratios, compressing data volume, stokes parameters observation, instrument control and observation mode control, etc. As an on-board system, the reliability of the system is very important, so the core logic modules are redundant. Moreover, Built-in Testing(BIT) module and EDAC(Error Detection And Correction) module are also placed in FPGA. System clock was 40 MHz, and its images processing ratio attained to 100 MHz.
A Digital Multi-Beams Algorithm of DOA Estimation Based on FFT
LONG Ning, ZHANG Feng-li
2005, 34(1): 16-18.
Abstract:
High accuracy estimation of DOA(Direction of Arrival) in low SNR (Signal-Noise-Ratio) is a intractable problem in signal processing. Traditional methods of DOA estimation and modern space spectrum estimation algorithms can be only effectively used in high SNR. In this paper, classical amplitude-method of DOA estimation, digital multi-beams forming and FFT are integrated, and a amplitude-algorithm of DOA estimation by processing in frequency domain is put forward. Simulation results show that the algorithm can estimate DOA effectively when SNR is 0~-25 dB.
Near-Zone Field Strength of Aperture Antenna
ZHANG Jia-kun, HU Hao-quan, YANG Xian-qing, ZHAO Jia-sheng
2005, 34(1): 19-21,52.
Abstract:
A approximation algorithm of aperture integration and geometrical theory of diffraction be used to calculate the near-field power densities of aperture antenna described in this paper. And an example will be provided to illustrate how to use the method in the actual engineering. The new method can permit more rapid and efficient calculations than previous aperture integration techniques. The method can be applied to analyze the radiation near-fields of aperture antennas and electromagnetic compatibility.
A Study on Measurement of “Cold Test Parameters” of TWT
GUO Gao-feng, LI En, ZHANG Qi-shao, LI Hong-fu
2005, 34(1): 22-25.
Abstract:
A new application of multi-point method is presented in this paper, which is for the measurement of "cold test parameters", the reflection coefficients at the output termination and attenuator of helix Traveling Wave Tube (TWT). The measurement method of the reflection coefficient of the probe used in the measurement of "cold test parameters" is also discussed. The method is nondestructive and easy, and can also be used in other measurements of the reflection coefficients of device which has similar special structure.
A Simple Trimming Method Used in Power IC
LI Yong-hong, LAN Jia-long, HANG Shun-kang, ZHANG Yun-chao
2005, 34(1): 26-28.
Abstract:
A very simple trimming method used in power integrated circuit is introduced.Mathematic model is given to describe this kind of trimming problem.The trimming function is achieved by using resistor and fuse network only, which makes circuit simple,saves space in chip and test time in manufacture..
A Practical Method of Chaos Secret Coding
ZHANG Yong, CHEN Tian-qi, CHEN Bin
2005, 34(1): 29-32.
Abstract:
Based on the foundation theory of applied symbolic dynamics, we get a practical method of chaos secret coding, i.e. use the strange attractor of logistic map to produce the symbol secret key to modulate the source code. Then, we realize the real-time secret coding on the digital chip TMS320VC5402 and analyze the similarity of symbol secret keys. The results show that this method has extended value for the practical usage.
Design of Suspended Interdigital Bandpass Filter
HUANG Wei, FENG Quan-yuan
2005, 34(1): 33-35.
Abstract:
This paper gives the particular description of a theoretical analysis and practical design for suspended interdigital bandpass filter. Based on computer aided design, the parameters of filter are given and simulated. A filter with passband centered at 3GHz has been designed, built, and tested. The measured performance shows good agreement with theoretically predicted performance. The experimental results agree well with the simulated results.
An Application of Simulated Annealing Algorithm in Model-Based Reasoning Intrusion Detection
CHEN Bo, YU Ling, XIAO Jun-mo
2005, 34(1): 36-39.
Abstract:
It is needed to search among all the possible attack subsets and to match the events recorded in the audit trail. To make a decision about the realism of the hypothesis corresponding to a particular subset is difficult in model-based reasoning Intrusion Detection System. We present using Simulated Annealing(SA) algorithm to solve this NP-complete problem. Modeling a optimizing issue of attack detection first, and give the solve space, the target function, the creation of new solution and accept the standard, we got a reasonable cooling schedule. The parallelization of SA algorithm is also presented. The experiments indicate that the SA algorithm can improve the evolution speed and the abilities of seeking the global excellent result, and resolve to the efficiency problem of searching well.
Reduced Complexity Decoding Algorithms for Irregular Repeat Accumulate Codes
GAO Hong-feng, XU Zong-ze, WU Yuan-ming
2005, 34(1): 40-43.
Abstract:
Irregular repeat-accumulate (IRA) codes have a good performance near Shannon limits under BP decoding algorithm. However, BP algorithm has high complicated operations. To reduced complexity of decoding algorithms, two algorithms namely the sum-min algorithms and piecewise linear approximation algorithms, are proposed. Minimum sum algorithm is very simple and is easy for hardware implementation. But the decoding performance is degraded. Piecewise linear approximation algorithm is a good tradeoff between decoding performance and complexities. Simulation results show that with complexity greatly reduced, piecewise linear approximation algorithm achieve a performance very close to that of the BP algorithm.
Extraction of Comprehensive Information of Multi-Station Monitoring Data of Landslide
GUO Ke, PENG Ji-bing, XU Qiang
2005, 34(1): 44-47.
Abstract:
The technique of multisensor target tracking is posed to use to deal with the multi-station monitoring data of landslide for the first time in the article. It solves the defect that only one key monitoring data of the monitoring station instead of the others can be used to the traditional prediction model in the landslide. An example simulation illustrates the effectiveness and feasibility of the method given in application.
Research on Synchronization Technique for a High-Speed FH Communication System
JIANG Ding-shun, JIN Li-jun
2005, 34(1): 48-52.
Abstract:
Synchronization is one of the key techniques to frequency-hopping (FH) communication system. Based on the main requests of synchronization for a high-speed FH communication system, this paper puts forward a synchronization scheme of a high-speed FH system, which is achieved by using a method combined synchronization-head with time of day (TOD). This paper mainly studies time of system, synchronization of FH pattern, bit synchronization, and so on. The performance of synchronization shows that the synchronization of FH communication system makes synchronization time short, capture probability high, false probability low.
A Software Reliability Model with Exponential Repair Time
SUN Jing, LIU Xiao-ming
2005, 34(1): 53-56.
Abstract:
Conventional software reliability models assume that the time to remove a fault is negligible. This rigid assumption limits the models' prediction precision and their application. Based on JM model, we propose a software reliability prediction model involving fault-remove time which followed exponential distribution. We provide the maximum likelihood parameter estimation equations of this model. We also provide several reliability prediction equations by using markov process. Illustrations of the proposed model by using real data are provided.
A New Call Admission Control Scheme in Mobile Networks and Its Performance Analysis
ZHANG Xin, LU Jun
2005, 34(1): 57-60,72.
Abstract:
In this article, we suggest a new call admission control (CAC) scheme based on guard channel scheme. Guard channels are set dynamically. Each cellular calculates the current call arrival rate. The call counter feeds the ratio back to the CAC system. Then the CAC system sets the guard channel number by the ratio. This scheme helps to balance the new call blocking probability and handover call blocking probability as different call arrival rate sets different guard channels. A performance comparison using simulation results between the new dynamically set guard channel scheme and the traditional guard channel scheme suggests considerable improvement from the new scheme.
An Efficient Anonymity Mutual Authentication Protocol
WAN Ren-fu, LI Fang-wei, ZHU Jiang
2005, 34(1): 61-64.
Abstract:
This article analyzes an efficient protocol for anonymous mutual authentication and key agreement. In the protocol, a mobile user can be provided with anonymous service and neither Visited networks nor eavesdroppers know the information of the user's real identity, preserving the privacy of real identity, current location and movement patterns information of users. This scheme can realize mutual authentication and the session key established by the protocol is fair for both side of communication.
Practical Scheme for Multi-Step JD Technology in SCDMA System
YANG Feng-rui
2005, 34(1): 65-68.
Abstract:
Joint detection is introduced, which can not reach the need of system performance when system loads is close to the spread factor. MSJD is put forth to overcome the problem, and a improved parallel MSJD is presented to reduce system time delay, and then a practical scheme for MSJD in SCDMA is proposed.
Characteristics of Open-Type LHM Microwave Filter and Its Design
GAO Zheng-ping, LIU Xue-qing, FAN Yu
2005, 34(1): 69-72.
Abstract:
In this paper we first present an open-type microwave filter by using left handed medium (LHM). LHM is an artifial material with premittivity and permcability both negative within certain microwave frequency band. By utilizing the special characteristics of LHM, we summarize a method of design a microwave band -pass filter and give a design example of 9.90-10.1 GHz band-pass filter, this filter has excellent characteristics much better than the ordinary material can achieved.
Design of High Efficient Low-Voltage Negative Voltage Tripler
XU Jun-yu, GAO Zheng-ping
2005, 34(1): 73-76.
Abstract:
In this paper,the basic cells of negative charge pump are derived from the theory of positive charge pump,then the low power supply negative voltage doubler is designed and some optimizations are listed for high efficiency purpose.Finally a practival high efficient negative voltage tripler based on the negative voltage doubler for 1.5V power supply is designed and successfully applied in production.
Design and Implementation of a New High-Frame Rate PA Camera
GUO Ming-an, LI Bin-kang, HAO Wen-xi, RUAN Lin-bo, FENG Bing
2005, 34(1): 77-80.
Abstract:
A high speed PA camera is implemented with a photodiode array image sensor of 100×100 photodiodes. It can work both continuous-frame mode and single-frame mode, and allow video rates up to 1000 frames per second. The camera's minimum sensitivity precedes 1.5 Lux and optical dynamic range is 100 times. the PA image sensor characteristic, the design of driver timing and the video signal process are described in detail.
Dynamic Tracking Algorithm of the Parameters of the Moving Camera
LUO De-yuan, QIN Dong-xing, HUANG Da-gui
2005, 34(1): 81-84.
Abstract:
In this paper, the typical structure of virtual studio is introduced, the method of obtaining the parameters of the moving camera based on the radial alignment constraint and the pinhole camera model which concerned radial lens distortion is analyzed. A new advanced algorithm which based on the union encoding method of the comparing and scaling value between two characteristic point is put forward, A core technology of virtual scene of high level virtual studio is realized. Through actual application, it demonstrates that this algorithm has better performance in speed and stability comparing to all the others.
Design Method for Servo-System Based on Disturbance Observer
ZHANG Shao-de, CHEN Zhu-cheng
2005, 34(1): 85-88.
Abstract:
The stribeck curve of friction is used for the friction model of the servo-system in this paper. The design method by using disturbance observer to compensate for influence of friction, which taken place when servo-system is run as low speed, is presented.The disturbance observer and the feedback controller can be designed independently as long as the nominal model is correct. For low frequencies the resulting system behaves like the nominal plant, robustness for paramenter uncertainty is therefore guaranteed in theory. As the same time, the influence of friction to servo-system output is equal to zero.The simulation results show the effectiveness of the proposed scheme.
A Fast Search Algorithm For Carrier Phase Integer Ambiguity
FAN Sheng-lin, ZHAO Wei, YUAN Xin
2005, 34(1): 89-93.
Abstract:
In this paper, a fast search algorithm for carrier phase ambiguity is presented. The algorithm makes use of the least-square searching and integer Gaussian transform, and the number of ambiguity candidates is reduced. Five methods is applied to eliminate the incorrect ambiguity candidates. The reliability of the algorithm is improved and the searching time is reduced. Experiment results show that the algorithm can achieve fast search ability either under static condition or under kinematic condition.
An Analysis of Netfilter and Its Implementation in Active Response
GAN Ying-hui, LIU Yong, QIN Zhi-guang
2005, 34(1): 94-96.
Abstract:
Netfilter is the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packet mangling. This paper begins with introduction to the framework of netfilter, and some key technology, such as the connection tracking, packet filtering, network address translation, and packet mangling are analyzes in detail. In addition, the strategy of response to intrusion is researched in this paper, and an active response model based on netfilter is given. Through the test proofed, the model could efficiently strengthen the system security.
Type of Architecture of QoS-Capable IPSec Security Device
HE Jun, TAN Xing-lie, LI Xin, XIE Jing-tao, ZHOU Ming-tian
2005, 34(1): 97-100.
Abstract:
The development of network quality of service (QoS)technologies is discussed. The QoS requirement for IPSec based security device is analyzed. Then the design of a type of architecture to implement QoS in IPSec based security device is given. Also this paper presents the two levels of classification and scheduling for data streams, which could prevent key tasks from being blocked at IPSec based security devices. This architecture combines the QoS and IPSec into a system, and provides detection, control and management together.
GMPLS Recovery Algorithm Based on Constrained
ZHAO Ji-hong, Qu HUA
2005, 34(1): 101-104.
Abstract:
GMPLS is the nucleus of next generation network technology. The research on the restoration method for the GMPLS are mostly using the concept of traditional method, but the features of GMPLS about recovery technology make the restoration method has some special requirements. In this paper, we first discuss some problems, which occur in GMPLS's fault recovery. Based on this, the article proposes a new GMPLS recovery algorithm based on constrained (CGR), and describes how to set the constrain conditions. We apply this algorithm in mesh network and give the implement and feature. These methods draw on the experience of the traditional recovery techniques and also fully consider the properties in GMPLS, so make it successable and compatible.
New Route Algorithms of Unstructured P2P Systems
HOU Meng-shu, LU Xian-liang, ZHOU Xu, ZHAN Chuan
2005, 34(1): 105-108.
Abstract:
The problem of the unstructured peer-to-peer system is the scalability of the system due to network traffic cost. This paper presents a new route algorithm of unstructured peer-to-peer system with routing indices. In the algorithm, a peer records the subject which it query about in the past and who can answer the subject. When peers receive a new query, it can forward the query to a selected peer which can answer the subject in the past. In this way the peer reduces the blind search. In the end, we test our design through simulations and the result shows that our design routes the query effectively, and reduces the network traffic greatly, improve the searching success ratio.
Threshold Digital Signature Scheme Based on ECC and Its Security
QIN Zhi-guang, ZHANG Xian-feng, ZHOU Shi-jie, LIU Jin-de
2005, 34(1): 109-112.
Abstract:
Based on ECC and ElGamal digital signature scheme, an ElGamal-type threshold digital signature scheme based on ECC is designed. The security of the scheme is analyzed via introducing the concept of views. In this scheme, the trusted center to deal with the sharing secret is eliminated. No secret communication is required in the signature-issuing phase. The scheme is characterized by excellentsecurity as well as high efficiency.
Role Based and Service Unit Based Network Architecture
YE Ya-lan, ZENG Jia-zhi, YANG Guo-wei
2005, 34(1): 113-116.
Abstract:
Service unit based and role based network architecture are both layerless network architectures. This paper analyzes and compares some distinct differences between these two network architectures. And it is concluded in our paper that role based network architecture is a generic network architecture which could represent some network archi-tectures, however, it is not very purposive and practical. Service unit based network archi-tecture is specific one that aims at next generation Broad Band multimedia network.
Development of PLX 9050 PCI Device Driver on Windows 2000
BIE Qi-zhang
2005, 34(1): 117-120.
Abstract:
PCI interface connection between Motorola PowerPC 860 MPU system and PC host is complemented using PLX 9050 chip based on Windows 2000.A solution of interconnection between MPU and computer system by means of PCI interface is given. Our discussion centre on the basic method and procedure of developing PCI interface device driver on Windows 2000 system in this paper. This approach can further be applied to develop CompactPCI interface device driver and provides us a convenient and fast way to program for PC in industrial control applications.
Arbitrary Perturbation Bounds on Diagonalizable Matrix
CHEN Jian-xin
2005, 34(1): 121-123.
Abstract:
In this paper, to symmetrical matrix (diagonalizable matrix), we have studied arbitrary perturbation and real arbitrary perturbation of it (with real eigenvalue arbitrary perturbation). It is started with to resolve from everybody known very well Schur decomposition, utilizing matrix that can be diagonalizable and identically equal through matrix equality out of shape, receiving perturbation bounds of diagonalizable matrix about F-norm and Q-norm.
Fuzziness in Rough Sets
SHU Lan, ZHAO Lei
2005, 34(1): 124-126.
Abstract:
Based on the study of rough sets,combined with the Nearest ordinary set of a fuzzy set and the Farthest ordinary set of a fuzzy set and by the help of lp(A,B)、D(A,B) and membership of rough set, a new measure of fuzziness in rough sets is introduced, some characterizations of this measure are given and proved. This new measure presented in this paper is very important in theory and in practice.
Detection of Outliers from the Two-Parameter Exponential Distribution
LI Yun-fei, HUANG Ji-wei, ZHU Hong
2005, 34(1): 127-130.
Abstract:
In this paper, a method of examination for the upper outliers from the two-parameter exponential distribution is discussed. A new test statistic is given. We derive the accurate density function and the approximate distribution of this test statistic.
Fixed Point of Mixed Type Monotone Operator and Its Application
WANG Yan-yuan, GAO Li-feng
2005, 34(1): 131-133.
Abstract:
In this paper, we give the definition of the mixed type monotone operator, then we prove the existence and the unique of the fixed point of the operator with induction. Furthermore we prove the fixed point is unique if it exists. Finally we give the application in differential equation group.
Stability Analysis of Periodic Solution of Variable Coefficient and Time-Delay Hopfield Neural Networks
ZHU Wen-li, ZHANG Jie
2005, 34(1): 134-136.
Abstract:
This paper studies periodic variable Coefficient and time-delay neural networks.According to the method of function of Lyapunov and the method of inequality analysis,the bounded solution,the existence criterion of periodic solution and the sufficient conditions of exponential stability of this system are determined.
A Study on the Economic Mechanism of the Bullwhip Effect in Supply Chain
LIU Yu-hai, TANG Xiao-wo, NI De-bing
2005, 34(1): 137-140.
Abstract:
Based on a new definition of the bullwhip effect, i.e. a phenomenon where the position and the characteristics of demand curve change from a downstream firm to a upstream firm along a supply chain, this paper studies the economic mechanism of the bullwhip effect. The results show that the existence of the bullwhip effect and the features of the bullwhip effect depend on the downstream firm's forecasting technique, cost function and decision behavior. Finally, the practical implications are given by numerical examples.
Study of Customer Service Level Based on Customer Demand Not Lost Completely
LIU Lei, TANG Xiao-wo
2005, 34(1): 141-144.
Abstract:
By introducing the Customer Patience Value into inventory decision study, the customer service level model based on customer demand not lost completely is estabilished. The impact of Customer Patience Value on inventory cost was also analyzed in the model. Different from traditional models, the new model considers customers' choice of stockout, reflect the actual purchasing behavior more realistically. The introduction of Customer Patience Value in the model reflects the time value of customer demand, put forward the new way for enterprises laying down right inventory decisions in time-based competition.