2005 Vol. 34, No. 2

Imaging of Spotlight Synthetic Aperture Radar by Applying SPECAN Approach
FAN Xin-yue, PI Yi-ming, FU Yu-sheng, ZHOU Fei, LI Zhen
2005, 34(2): 145-147,209.
Abstract:
This article discusses the character of range-dechirped spotlight SAR signal, analyzes the time and frequency domain character of dechirp SAR signal, presents imaging method of spotlight range-dechirped raw data.The new algorithm combines the advantages of two processing approaches:the efficiency of SPECAN algorithm and the precision of stripmap focusing technique, the first step of the proposed algorithm implements deramp technique representing a simplified version of the SPECAN approach, the second processing carries out the residual focusing via the use of a conventional stripmap processing procedure,in comparison with the range doppler method,this algorithm decreases the processed data with a little amount of calculation increased.The Ku band airborne spotlight SAR imaging experiment confirms its availability.
Construction and Realization of MPC/OOC on W-OCDMA System
ZHOU Xiu-Li, HU Yu, TAN Qing-gui, YAO Zhou-shi
2005, 34(2): 148-151.
Abstract:
Based on the construction theory of optical orthogonal hopping codes, constructed the two dimensions MPC/OOC combination codes for the wireless-OCDMA system with the modified prime code as time spreading codes and the optical orthogonal codes as frequency hopping codes. This coding scheme has large code's capacity compared with the two dimensional codes in existence. By grouping, the MPC/OOC code has good performance in auto-correlation and cross-correlation with still quite large codes capacity. Designed the tunable FBG encoder and decoder to the construction example.
Realization of High-Speed FFT by FPGA
WANG Lin-quan, PI Yi-ming, CHEN Xiao-ning, XIAO Xin
2005, 34(2): 152-155.
Abstract:
In this paper, the basic principle of decimation-in-frequnency radix-2 FFT algorithm is briefly presented. Then, the design and realization methods of hardware system with FPGA are thoroughly discussed, with which it is easy to implement the FFT algorithm of large points-4 096 points. The FFT-speed of many groups of large points is accelerated greatly through ping-pong-ram. Finally, this hardware system is turned out to be feasible and accurate through the FFT algorithm experiment. Furthermore, the real-time imaging procession of airborne SAR can be accomplished successfully by this hardware system.
Fast MP of Images Based on Atom Energy Property
YIN Zhong-ke, XIE Mei, WANG Jian-ying
2005, 34(2): 156-159.
Abstract:
The computational load in Matching Pursuit (MP) of images is very huge, and this is the main drawback with MP of images. In this paper, a new fast algorithm is presented to speed up MP of images. Energy distribution of atoms used in MP is studied and most of computational loads can therefore be avoided by making use of the atom energy property. Experimental results show that the MP algorithm developed according to this property is many times faster than the conventional MP method and at the same time the quality of reconstructed images by the new algorithm is as good as by the conventional MP method.
One Fusion Method of Double-Star Positioning System and SINS
LIU Jian-ye, LIN Xue-yuan, LAI Ji-zhou, SUN Yong-rong
2005, 34(2): 160-163.
Abstract:
The main shortcoming of the strap-down inertial navigation system (SINS) is the increasing navigation positioning errors with time. Double-star positioning system is one regional satellite positioning system built up by our country, and can output horizon position information with high accuracy, but the double-star positioning system has the characteristic of output position lag and bad concealment. This paper studies the filtering method for this integration system aiming at the position lag, and puts forward the statistical model of the measurement noise of integration system for the first time, at the same time designs the time of integration in order to compensate for the bad concealment. The simulating results show this filtering method is feasible, which has better value of engineering application.
A New Algorithm of Color Images Edge Detection
ZHANG Guang-yu, XIE Mei, MA Zheng
2005, 34(2): 164-167.
Abstract:
Automatic threshold choice is difficult and important to color images edge detection, First of all, on the base of human visual properties, threshold versus intensity function of human visual system are researched and analyzed, by using method of mathematic modeling and the result of saturation research, function of least color difference that can be perceptible by visual systems in detecting edge is given. Finally, we use the principle of wavelet edge detection and suggest an algorithm of automatic threshold choice according to difference color background in wavelet edge detection. Emulate experiments demonstrate good adaptability and edge recognition effeteness of the algorithm.
Authentication and Security Analysis for WLAN Based on RADIUS/EAP
WANG Man-zhu, ZHOU Liang
2005, 34(2): 168-171.
Abstract:
This paper introduces the authentication and the architecture of IEEE802.1x Wireless Local Area Network based on the RADIUS/EAP, with respect to the characteristics of three parties coloration in accessing to WLAN, analyses the security mechanism, indicates that there would exist six security crushers either by the protocol defects or by the inadequate usage and deteriorating and it is necessary to fully utilize the data frame in the RADIUS/EAP structure for the encryption and authentication as well as to design the double-doors authenticated access mechanism. The four common authentication solutions are compared and the corresponding security functions in certain different extents are evaluated.
An Efficient Convertible Authenticated Encryption Scheme
GAN Yuan-ju, PENG Yin-qiao, SHI Rong-hua
2005, 34(2): 172-174.
Abstract:
Most previous authenticated encryption schemes have a problem that the recipient can not prove the dishonesty to any verifier if the signer denies his signatures. An efficient solving scheme has been presented in this paper. The new scheme requires less computational costs and lower communication than other previous convertible authenticated encryption schemes and the conventional signature-then-encryption approaches. In the proposed scheme, if the signer repudiates the signature, the recipient can convert this signature into an ordinary one without the cooperation of the signer. Furthermore, the message is not disclosed to any verifier during verification.
Generalized Hilbert Transform and Digital Realization
WEI Yong-hao, YUAN Xiao, TENG Xu-dong, ZHAO Yuan-ying
2005, 34(2): 175-178.
Abstract:
Fractional Hilbert transform, a generalization of Hilbert transform from integral order to fractional order, extends the application fields. Firstly, generalized Hilbert transform is defined in the frequency domain, and it can be used to construct a new kind of analytic signal——generalized analytic signal. Then basic properties and digital realization of ideal generalized digital Hilbert transformer are investigated from the viewpoint of digital signal processing. Finally digital FIR filter design using window method and frequency sampling method are studied, and error analysis is given.
Implement of a Fast Start-Up Burst Mode Equalizer for 802.16 Channel
SUN Chang-yin, WANG Yun-feng, WANG Yun-kuan
2005, 34(2): 179-182.
Abstract:
The paper describes a fast start-up equalizer which firstly uses the semi-extended Neuman-Hoffman sequence to estimate the time varying channel impulse response, and then a initial DFE tap value to preload the the equalizer. The performance of the equalizer is confirmed by simulation in the 802.16 channel model, and it is fund that the convergence speed is comparable with the recursive least squares (RLS) adaptive algorithm.
An Authentication Scheme Based Public Key Encryption for Mobile Communication Systems
CHEN Guang-hui, LI Fang-wei, LI Shuo
2005, 34(2): 183-185.
Abstract:
A mutual authentication scheme and key exchange based on public key encryption is presented for mobile communication system. This scheme can realize mutual authentication and generate a session key confirmed by both sides of communication. The generation of session key has no third party involved. Besides, non-repudiation of data sent by both sides is provided with digital signature. By performance analysis, this scheme has a simple structure and high efficiency.
Extension to Military Security Model
XIAO Jun-mo
2005, 34(2): 186-189.
Abstract:
The military security model (MSM) is a multilevel security model which used to control information flows within an information system with secret (such as government department, military etc.). In the old model, it depends on product lattice of linear lattice and subset lattice for information flow control. But relationships described in this model exists drawbacks in applications. In the new model, the product lattice which is a sensitivity lattice multiplying by organization level lattice is mapped to level relations with sensitivity within an organizations. Then, a more proper relationships which is multiplying the product lattice by lattice of information subset are formed for access control and flow control. So it make the new model more suitable to control the information flow security for information systems of military, government departments or various organizations.
Fast Power Grid Analysis Using Multigrid Method
YAN Ting, WANG Qin, LI Zhi-gang
2005, 34(2): 190-193.
Abstract:
Power grid analysis is an important issue for circuit design and verification. With the increasing number of transistors on a chip, the size of the power networks has grown so large as to make the verification task very challenging. Fast and memory-saving power analysis algorithms are needed. In this paper, we present a fast power grid analyzer using multigrid technique, which speed up the convergence of sparse iterative solver. we proposed a simple and intuitive restriction and interpolation scheme, which is based on the electric distance between the nodes in the power grid network. The convergence can be controlled by a user specified threshold parameter and pre/post smoothing iterations. Experimental results show the efficiency of the new method.
Data Path Design in High Performance Reconfigurable DSP Processor
HAN Liang, LI Ying, ZHANG Xin, CHEN Jie
2005, 34(2): 194-197.
Abstract:
In this paper, the data path of a high performance reconfigurable DSP processor is introduced. Based on its several 16-bit fixed-point computational units with powerful functions, the data path forms a 16-bit high-speed signal processing platform. By SIMD means, it can flexibly support computations of multi-dimension vector. By the way of reconfiguration, it can efficiently support 32-bit data processing.
A Fast and Efficient Approach for Extracting Condense Disparity Map
LIAO Su-ying, YANG Hua-jun
2005, 34(2): 198-201.
Abstract:
In this paper, we integrate feature-based image matching method with feature-based one. Zero-crossing edge points are first extracted from image pairs with the Gauss-Laplace operator caculating. They are matched according some constraint conditions. Then, being looked as symmetries, image pairs' other point to point correspondences are searched from two directions by pixel neighbor area correlation values. Applying this approach, we have designed Visual C++ programs for rectified image pairs and extracted their condense disparity map not only fast but also efficiently.
Quantum Effects in the Non-Resonant Damped Mesoscopic Coupled Electric Circuits
LIANG Mai-lin, ZHANG Wen-qing, YUAN Bing
2005, 34(2): 202-205.
Abstract:
The effects of the difference of circuit parameters or capacitances and inductances on the quantum fluctuations in the non-resonant damped mesoscopic coupled electric circuits were studied. In the calculations, the physical mechanism of the generation of the resistance or the interaction between electrons and phonons was considered. The difference of the circuit parameters in the two component circuits makes the quantum fluctuations in one component circuit smaller and that in the other larger. The results also show that both capacitance coupling and inductance coupling will cause the quantum fluctuations of the electric charge in the coupling part squeezed. But there is no squeezing for the electric current in the coupling part.
Enhancement in Detection Operators Extended from Traditional Image Edge to Morphology Edge
Fu Mao-ming
2005, 34(2): 206-209.
Abstract:
In the paper, we extend the definition of traditional image edge to morphology edge, derive a series of new morphological operators which are enlightened by semi-increasing and semi-continuation and first time bring forward double-structure element used in morphological processing at one time. These new morphological operators can resist noise and have good merit which not only have good location but keep image detail. Experiments have shown that better image edge detection results will be produced by these operators than otherwise by traditional methods, moreover, the edge thus detected is basically continuous with single-resolution-widths.
A Two-Level Cooperation Distributed Scheduling Algorithm Based on Services
ZHANG Xiao-song, LIU Dan, LI Yi-chao
2005, 34(2): 210-212,232.
Abstract:
A global and local two-level cooperation scheduling (TCS) algorithm is presented. In order to improve the scheduling precision, the global scheduling considers both the service states and system states to choose a suitable site to serve; Based on the global scheduling, the local scheduling adjusts the service quality and service states to guarantee no rejection of client request, and feeds back the service states to improve the correctness of global scheduling. The theoretical and simulated results show that, with the similar efficiency, the proposed algorithm owns higher reliability compared with the traditional distributed scheduling algorithms.
An Efficient Communication Protocol for Distributed Parallel Server
TANG Xu, LIU Xin-song, YANG Feng, LIU Xie
2005, 34(2): 213-216.
Abstract:
Aiming at the characteristics of the LAN of fast Ethernet and distributed parallel server system, a novel distributed operating system transport protocol (DOSTP) is proposed in this paper. The goal of this work is to study how to reduce the communication software overheads in the distributed parallel server system with off-shelf equipments, moreover to keep the common programming interfaces. Several measurements, such as decreasing redundant operations at underlying protocol stack, reducing OS interventions and the overheads of protocol self-maintenance, are used to improve the performance. Experiments have been done on the server of 8 PⅢ PC nodes and 100Mbps Ethernet with switches. Compared with UDP/IP, DOSTP decreases round-trip time of 20% for 64 bytes packets under the same application conditions.
Research on Multi-Priority Service Access Control over HFC Networks
GAO Fei, YIN Shi-tang, ZHAO Dong-feng, YU Ying
2005, 34(2): 217-220.
Abstract:
Based on the study of HFC MAC protocol over contention/reservation scheme, an efficient method, which worked on random contention and polling model has been proposed in this article to meet the needs of a multi-priority service access control system. The computer simulating shows the service with higher priority would have the better performance of throughput and delay.
Research of Trojan Detection System Based on Artificial Immune
CHEN Lei-ting, ZHANG Liang
2005, 34(2): 221-224.
Abstract:
This paper points out the deficiency in detecting the unknown Trojan horse of the present anti-virus software at first, introduces the advantage of artificial immune system in self-adaptability aspect, and points out the feasibility of artificial immunity mechanism in Trojan horses detection; Then through an analysis about the new technology of Trojan horses, proves the deficiency of current computer security system with a Trojan horses model, presents the transfer of Trojan horses detection from the anti-virus software to the subsystem of immune IDS, improves the self-adaptive capacity of Trojan horses detection with its immune mechanism; Finally, a behavior mode is put forward, which is mapped from the using situation of process systematic resource to the process systematic call, and by this means, a Trojan horse detection model based on artificial immunity mechanism is set up.
A Performance Analyzing Model for Cache Invalidation Strategies
WU Jing, LU Xian-liang, REN Li-yong, WEI Qing-song
2005, 34(2): 225-228.
Abstract:
Researching many cache invalidation strategies, we propose a performance analyzing model which can evaluate the cache schemes in the mobile computing environments. Based on some parameters-the update rate, the hitting "hot spot" rate, the bandwidth of the wireless, the overhead of the uplink and downlink, etc., the throughput of cache strategies can be computed. Using this model, we evaluate the performance of four schemas-no caching, ideal strategies, timestamp, mobile agent. Our study shows that this model is intensive practicability.
Simple LogP Model's Parameters Simulate
LIU Hui, DAI Bo, ZHANG Yan, ZHANG We-bin
2005, 34(2): 229-232.
Abstract:
The LogP model has more parameters and more complicated arithmetic. The simple LogP model divided the deferent data to two parts to make algorithmic analyses simple. For simulating simple LogP model's parameters, we supply one method to test idiographic environment's parameters of model, which can help us to design and analyze parallel arithmetic. And we respectively use the single machine and multiply machines to test the model's parameters of LogP. According to the test data, we analyzed the network delay and the software expense. Then we get an empirical formula for simple LogP model's parameters.
Research on an MAS-Based Intelligent Home Network
HAN Jiang-hong, JIANG Bo, DU Shi-yan, ZHANG Li
2005, 34(2): 233-235,276.
Abstract:
In this paper, an intelligence home network based on multi-agent system is brought up by analyzing the intelligence demand of home network. It realizes the control and manage of different function unit with Agent, and builds up the Intelligent Home Network model by the thinking, method and architecture of MAS. It also gives all the composed parts of MAIHN model, analyzes the function design and implement model in Agent, researches the collaboration and correspond strategy of multi-Agent in MAIHN model. At last this article construct the experimental archetype of MAIHN model.
An Algorithm for Calculating the Branch Routes of an Assembly Program in Software Coverage Testing
TANG Ke, WANG Wen-yong, XIANG Yu, LUO Guang-chun
2005, 34(2): 236-239.
Abstract:
Coverage testing is a basic method for dynamic software testing. An algorithm is proposed for calculating the branch routes of an embedded assembly program in software coverage testing. The correctness of the algorithm is verified on a sample assembly program and it's time complexity is analyzed also.
The Access Control of Local Area Network Based on ARP Protocol
LIU Gui-song, YAN Hua, ZHANG Yi
2005, 34(2): 240-243.
Abstract:
The access control of local area network is a common security problem which involved the resource protection of local area network. In this paper, a project of access control of local area network based on ARP protocol is presented. It can be used to detect and refuse the illegal computers that try to log on and access the local area network by capturing and analyzing the network packets. On the other hand, through the authentication of the local area network server and based on the ARP buffer principle, it can be also used to control the access between the legal computers of the local area network. So that it is an effective way to protect the resource of local area network. The project is convenient and useful.
A Study of Induction Motor Direct Torque Fuzzy Control System Based TMS320F240
JIANG Ming, ZHANG Chun
2005, 34(2): 244-247.
Abstract:
A system of fuzzy stator direct torque control for induction motor based is introduced. A novel of fuzzy stator resistance estimator on-line is proposed. It can improve the performance at low speeds and the response of the system. By estimating Flux-chain and speed, a fuzzy direct torque control system based on TMS320F240 is made. The experiment result shows that scheme is reliable.
Techniques in Product Design of High-Speed Digital Storage Oscilloscope
YE Peng, CHEN Shi-jie, ZHANG Qin-chuan
2005, 34(2): 248-250,284.
Abstract:
The key techniques in the development of digital storage oscilloscope (DSO), a product type project taken by the authors, are discussed, of which the concept and the theory of the system design, the high-speed data acquisition technique based on the devices with lower operation speed, the equivalent sampling technique based on Random sampling are expatiated. The 200 ps time resolution and 5 GSPS equivalent sampling rate are gotten by using large-scale time expander, so the DSO can observe 100 MHz (-3 dB) seasonal signal. The results of experiment and application are presented in the end.
Risk Analysis of E-Government Information System Based on ISM
TANG Zhi-wei, DU Ren-jie, GAO Tian-peng
2005, 34(2): 251-253.
Abstract:
This paper constructs risk factors base on SSE-CMM, and Presents a scientific exploration of the analysis and assessment of e-government information system's risk by applying the methods of system engineering and ISM. It focuses on the application of the methods and the result analysis in the actual case. Some proposals and solutions for the risk are also raised in the paper.
Study of Neuro-Fuzzy Network Control of a Flexible Robot
YU Xiang-zhen, LI Mei-fang, TIAN Lian-fang
2005, 34(2): 254-257.
Abstract:
This paper deals with the tracking control problem of a rigid-flexible manipulator system with unknown and changing dynamics. Lagrange-Euler formulation is used to establish the dynamics of the robotic system. Because of the characteristics of high non-linearity and complexity of the robotic system, intelligent control strategy is proposed to control the system in this study, in which a fuzzy logic controller in the feedback configuration and an efficient dynamic recurrent neural network in the feedforward configuration are developed. Simulations are carried out for both the fuzzy logic controller and the proposed intelligent controller under the condition of three groups of step inputs. Results demonstrate that the performance of the system is greatly improved by using the proposed controller.
Study of One Kind of Graphs
YANG Chun, ZHANG Xian-di, SUN Shi-xin
2005, 34(2): 258-260.
Abstract:
One of the open problems in the graph theory is to find the minimum number of edges required for a graph of order n. A class of graphs with connectivity of at least k and k-diameter of at most d is studied in this paper, and an upper and a lower bound of the minimum edges of the graphs under general conditions are offered. Based on this, the calculation formulas of the minimum edges in two specific situations are also given. In addition we suggest the approaches to costruct the minimum networks as mentioned above.
K-Stability of General Neural Network With-Delay
HAN Zhong-ming
2005, 34(2): 261-264.
Abstract:
In this paper, the problem of K-stability for general neural network with time-delay was studied. By the method of variation of the parameters and inequality analysis and some properties of differential equations, sufficient delay-dependent conditions of K-stability and K-exponentially stability for general neural network with time-delay are established.
Solution to Linear Matrix Inequalities Via Evolutionary Computation
CUI Meng-tian, ZHANG Shi-lu, ZHAO Hai-jun
2005, 34(2): 265-268.
Abstract:
This paper presented a new ideas for resolving linear matrix inequalities using evolutionary computation, which decides the stability of the fuzzy model-based control. Experiments proved it is a effective algorithm to achieve gain scheduling and stability checking of fuzzy controllor. In the end,two examples conducted in simulations demonstrated the effectiveness of the proposed algorithm for solving matrix inequalities.
Solutions to a Class of Nonlinear Schr?dinger Equation with Harmonic Potential
HOU Shen-yong
2005, 34(2): 269-272.
Abstract:
In the paper, a class of Schrödinger equation with harmonic Potential, which concerns Bose-Einstin condensates, is investigated. Now that the equation of Bose-einstin condensates describes lot of phenomena, that we research it has special significance. With the help of using energy conservative law and quality conservative law as well as knowledge of vector analysis, integral and differential inequality, we prove that the solution to the Cauchy's problem will blow up in finite time in case initial value satisfy with some conditions. As the equation in the paper is more general, we have got extensive conclusion, by means of which we may deeply understand the aggregative phenomena on energy and quality.
Another Generalized Nonlinear Diagonal Dominance
GAN Tai-bin, HUANG Ting-zhu, WANG Xiao-mei, ZHANG Li-qiong, GAO Zhong-xi
2005, 34(2): 273-276.
Abstract:
Another concept of generalized diagonal dominance for nonlinear functions (i.e. quasi-generalized nonlinear diagonal dominance) is introduced. This concept includes as special case generalized nonlinear diagonal dominance, possess much of important properties of generalized nonlinear diagonal dominance, easy to judge a nonlinear function is quasi-generalized nonlinear diagonally dominant if its derivative is a generalized diagonally dominant matrix on an convex set in Rn.
A Cooperation Game Analysis of Transfer Pricing
MU Yin-ping, TANG Xiao-wo, MA Yong-kai
2005, 34(2): 277-280.
Abstract:
The paper aims at the unfair which the marginal cost transfer pricing method on firm's profit assignment. By inducting the thoughts of cooperation game, we put forward to divide the firm's total profit use Shapley value of cooperation game based on marginal cost transfer pricing method. The operation steps are the upstream divisions supply the intermediate products on marginal cost price firstly. Secondly, the headquarters divides the total profit with Shapley value method. At last, the headquarters assesses the performance and reward on base of the redistribution profit to the divisions' managers. The conclusion is that any division's profit of redistributed is exceed the independent profit. So implementing the marginal cost pricing strategy and redistribution the revenue, can get the internal targets coincidence and improve the total profit of the firm.
An Improved Ant Colony Algorithm for Multi-Objective Optimization
TANG Yong, MA Yong-kai
2005, 34(2): 281-284.
Abstract:
Ant Colony Algorithm is a brand-new bionic simulated evolutionary algorithm, which has been applied to many fields. Multi-objective optimization problems are very important optimization problems. It's hard to optimized or solved. An improved Ant Colony Algorithm to solve Multi-objective optimization problems is introduced. After setting up a set of weight for the parameters, the algorithm uses some ants search in the solution space first in a stochastic way then stimulate the food searching behavior of real ants to guide the search by the pheromone. The new algorithm is explained in details and some simulations show the algorithm is very effective in finding global optimizations.
A Study on the Supply Chain Capacity Decision with Flexibility Based on the Real Option
PAN Jing-ming, TANG Xiao-wo, NI De-bing
2005, 34(2): 285-288.
Abstract:
This paper applies the real-option approach to study the capacity decision in supply chain management under perfect competitive markets. Through analyzing the value of capacity investment decision, we give some rules of the capacity decision with flexibility. We also analyze the influence of three main factors upon the investment decision, which include the property of market evolvement, investment cost, and out of stock cost. The results show that a more (less) risky market, a higher (lower) capacity investment cost, or a lower (higher) out of stock cost is likely to postpone (advance) the implementing of capacity expansion.