2005 Vol. 34, No. 3

Shared Sub-Path Protection Algorithm for Dual-Risk Breakdowns in WDM Networks
GUO Lei, YU Hong-fang, LI Le-min
2005, 34(3): 289-292.
Abstract:
In this paper, we propose a shared sub-path protection (SSPP) algorithm for protecting the multi-link failures of the dual-risk breakdowns in WDM mesh networks. SSPP firstly computes a minimum hop primary path for each connection request, and it follows to compute two SRLG disjoint and minimum cost backup paths for each sub-path on the primary path. The simulation results show that SSPP not only can completely protect the multi-link failures of the dual-risk breakdowns but also can make the tradeoffs between the resource utilization ratio (or blocking ratio) and the protection-switching time.
Study of Algorithm of Multi-Upstream Access of EPON
WANG Li-cun, QIU Kun, WANG Xiu-ni
2005, 34(3): 293-295,315.
Abstract:
The paper introduces the algorithm of based on double-side of Optical Line Terminate and Optical Network Unit in Ethernet Passive Network,and presents a new frame framework of grant,every field of grant frame uniquely identifies one Optical Network Unit. we encapsulate all grants in a downstream frame, on the other hand, Optical Network Unit participates in the scheduling process too,which improves the bandwidth utilization of upstream and downstream. As can be seen from the simulation result,this algorithm has the good performance of delay.
Independent Component Analysis Based Denoising Technology
ZHANG Zhi-lin, PI Yi-ming, SUN Zhi-jian
2005, 34(3): 296-299.
Abstract:
The paper introduces a new technology of signal processing:independent component analysis, including its basic concept, principles, and some representative algorithms, such as FastICA, EASI, Nonlinear PCA, and natural gradient algorithm based maximum likelihood estimation. In a denoising simulation experiment with the mean square error criterion, these algorithms are compared to the classic algorithms of adaptive signal processing, such as LMS and RLS. Results show that in denoising application ICA algorithms are superior to the classic adaptive algorithms. Thus ICA algorithms have large value in denoising application, deservnig further study and promoting.
Chaos from PLL of Digital Synthesizer with Trigon Sampling Phase-Detector
TAN Yong-ming, DENG Li-hu
2005, 34(3): 300-303.
Abstract:
Chaos phenomenon of sampling phase-detector digital synthesizer loop is studied. First, the systems of sampling phase-detector digital synthesizer loop is discretization handled and the discretization systems model is given. In this systems, loop filter is RC integral filter and phase-detector is triangle phase-detector characteristic. By verifing the corresponding lower dimension system of discretization systems has the Snapnack Repeller, it is proof that original system output chaos when certain conditions of system parameters are satisfied. The relation between chaos and the parameter of the system is given finally.
A New Method for Single Observer Passive Tracking
YI Xu, LI Li-ping
2005, 34(3): 304-307.
Abstract:
In passive tracking system, the method using bearings-only can't determine the position of target quickly with high precision. What is more, the EKF is traditional algorithm for passive tracking, but it produces large errors and easily leads to divergence. This paper introduces a new method using phase difference rate and SR-UKF algorithm. It can amend aforementioned flaws, lead to filter stability in use, and significantly improve the performance of tracking. The method is validated by the results of the simulation experiment.
An Estimation of Low-Elevation Target DOA in Phased Array Radar
LI Min, HE Zi-shu, JING Yu-lan
2005, 34(3): 308-311.
Abstract:
It is very effective that applying frequency agility to reduce the coherence of the direct and the reflect signal in phased array radar, which are contained in the echo of radar. This method can restrain the influence caused by multipath effect when estimating the target's direction of arrival (DOA), and improve the precision and ability of angle's estimation. Then the application of the modified AR model can not only reduce the coherence of the two signals further, but separate the elevations of the target and its image. The simulation results verify the validity of the theory of frequency agility and modified AR model, as well as the advantage and practicability with the combination of two methods when comparing with other methods.
CM-Based Array Calibration Algorithm with an Auxiliary Signal Source for CDMA Mobile Communication
XIONG Ying, DENG Cheng-Wang, TANG Bin
2005, 34(3): 312-315.
Abstract:
Using the constant modulus (CM) property of the CDMA mobile communication signal, an online calibration algorithm, which calibrates the antenna array channel amplitude and phase errors using an auxiliary signal nearby the antenna array, is presented. Despreading the array receiving signal with the spread spectrum sequence being orthogonal to user's, and the coefficients of the channel FIR filter are then adjusted by CM algorithm adaptively to compensate the errors. Unlike the conventional self-calibration methods, it can be not affected by multi-path, and speeds up the convergence. Simulation demonstrates its validity.
Research on Automatic Gain Control Loop Based on Digital Demodulation
LI Zheng, YANG Jian-yu, ZHENG Li-gang
2005, 34(3): 316-319.
Abstract:
According to the disadvantages of demodulation in digital automatic gain control loop, which needs multipliers and uses much of the system resource, this paper proposed a new method of digital demodulation by means of absolute values or maximal values of slip windows which can substitute the square operation of signals in analog demodulation method. The new method can reduce, to a large extent, the contradiction between the system velocity and resource. Based on the analysis of the loop, the computer simulations are given. The results indicate the feasibility of digital AGC, and they are highly effective. The method has been used in design of digital AGC of digital intermediate frequency receiver.
Physical Basis and Detecting Principles of Thermal Pulse Video Thermography Nondestructive Testing
XUE Shu-wen, LEI Yu, CHEN Xi-quan, ZU Xiao-tao
2005, 34(3): 320-322,327.
Abstract:
The experimental setup of the pulse video thermography nondestructive testing system is introduced in this paper. On the basis of study of testing mechanism and the two conventional methods, namely reflecting method and transmission method, two methods to increase the heat emission for specimen with smaller heat emission coefficient are presented. The application ranges for the two conventional testing methods are also presented.
A Signal Sorting Algorithm for Radar Pulses in High Pulse-Density Environment
WEI Juan, YANG Wan-lin, ZHI Qiang, WANG Song-yu
2005, 34(3): 323-327.
Abstract:
A real-time signal sorting system and an improved sorting algorithm based on the probability statistics is introduced. It is for the special radar signal environment of high pulse-density and high pulse-losing probability in electronic warfsre. The feasibility of this sorting system and algorithm is verified through lots of experiments. By designing the hardware circuits, the signal sorting system is realized. It performs well for duplex requirement of high-accuracy and real-time processing in high pulse-density environment.
Effective Bandwidth of Self-Similar Traffics
WU Yuan-ming, HUANG Ji-yan
2005, 34(3): 328-331.
Abstract:
The effective bandwidth calculation methods of short-range dependent traffic and self-similar traffic are given. The relationship among buffer size, packet lost rate and effective bandwidth utilization is analyzed. The advanced performance of effective bandwidth-based source distribution in the networks design is pointed out. The simulation results show that effective bandwidth of self-similar traffic' are more well QoS than short-range dependent traffic effective bandwidths.
Research of Complementary Correlation Optical Time Domain Reflectometer
HUANG Da-xin, OU Zhong-hua, LIU Yong-zhi
2005, 34(3): 332-335.
Abstract:
An optical time domain reflectometer using correlation technique may has much better performance than conventional otdr. the autocorrelation of Golay sequence has low sidelobes, so we can use Golay sequence as the probe signal.This paper present the theoretical foundation of this method and tell the way to change bipolar codes to unipolar codes.
Study on the Electronic and Magnetic Properties of MCo12 Clusters
KUANG Xiang-jun
2005, 34(3): 336-339.
Abstract:
The stability, electronic and magnetic properties of icosahedral Mco12 clusters are studied by using the discrete variational local-spin-density-function method, Where M=Ti,V,Cr,Mn,Fe,Co and Ni..our calculated results show that all the clusters have bond-length contraction and metallic character, all the clusters are magnetism and the valence-band width(VBW) becomes wider with the increase of atomic number.Some clusters(M=Ti,Mn and Co) have closed electronic shell while the others have open electronic shell and are expected to distort further.the results also indicated that the cluster moment is reduced by the substitution of central Co atom with an M atom and that the average moment per atom of all clusters is larger than that of the bulk Co.Our results compare well with the available experimental results.
Mechanism of Reduction of Interface-State Density in the SiC/Metal Contact by Hydrogenation
LUO Xiao-rong, ZhANG Bo, LI Zhao-ji
2005, 34(3): 340-342,354.
Abstract:
The mechanism of lowering the density of interface states due to hydrogenating SiC surface was studied. The treatment of hydrogenation SiC surface by slowly oxidizing,etching by dilute HF and then immersing in boiling water was utilized to lower the density of surface states. The method was applied to treat the surface during fabricating SiC device. SiC Schottky diodes with ideality factor of 1.2~1.25 and ohmic contacts with specific resistance of (5~7)×10-3Ω· cm2 were obtained below 100℃. Its advantages lay in avoiding the high-temperature annealing at 800~1 200℃ for conventional Ohmic contacts, decreasing technical difficulty, and improving the electric performances of SiC Schottky junction.
A Wavelet Neural Network-Based Server Warning System
CHEN Bo, YU Ling
2005, 34(3): 343-346.
Abstract:
A server warning system based on wavelet neural network is presented. Wavelet neural network is a kind of neural networks, which combines wavelet theory with neural network theory, that is wavelet function forming neuron, it avoid the problem of nonlinear optimizations, such as local optimization. WNN has fast convergence because of the low correlation of wavelet neuron. In this system,the WNN was trained by using numbered records of system log files in server and the classifier for intrusion detection can be obtained. The experimental result shows that the performance of this system is highly adaptive, the learning speed is fast, and the rate of warning accurate is high, so it is practicable in intrusion detection.
Research and Design of a Distributed Network Real Forensics System
DAI Jiang-shan, XIAO Jun-mo, ZHANG Zeng-jun
2005, 34(3): 347-350.
Abstract:
Based on the discussion of the weakness of the network forensics in current Internet system, a distributed real network forensics system is proposed and designed. This system monitors and analyzes the state of the local network. When the Internet intruder is found, on the base of the security of the local network, the system confirms whether crime has happened, and then captures and analyzes the intruding evidence information, protects the integrity of them, finally, produces the intruding crime evidence.
Study of Distributed Firewall Based Security System
LIU Zhe, WANG Wei-ran
2005, 34(3): 351-354.
Abstract:
Traditional single security technology is becoming obsolete with the complexity of network security problems increased. To address this problem, a new security system architecture is proposed. This new system is based on the distributed firewall environment, and distributed network intrusion detection technology is integrated. Furthermore, Expert System is utilized to make them work coordinated and intelligently respond the real-time dynamic network security situations. This scheme can make up for the shortcomings of single security system and fulfill the requirement of network security. Description of this system architecture and some important system details are presented in this paper.
Specification of the Embedded Communication System Device Driver
LI Sheng, ZHANG Yang
2005, 34(3): 355-358.
Abstract:
This paper introduces the design standard of the embedded communication system device driver and the reason for proposing it. According to characteristics of the embedded communication system and compared with the design model of device driver in Windows and Linux, the architecture of embedded communication system device driver has been proposed. It can make the driver design much specifically and effectively. The driver design standard has been expatiated in VxWorks referring to specification of general device driver and development experience.
Heuristics Algorithm for Knapsack Problem Based on the Tabu Search
ZHANG Xiao-qin, HUANG Yu-qing
2005, 34(3): 359-362.
Abstract:
The paper design a genetic algorithm based on the tabu search. By utilizing the main frame of parallel search supplied by the genetic algorithm and the individual serial search mode of the tabu algorithm, this method can enlarge the search space and swiftly implement the overall optimization. If it is combined with the heuristics algorithm to solve the knapsack problem, according to the results of computer simulation, it can effectively improve the index of optimization performance and search efficiency.
Automata Transform Algorithm for “NFA→FA→GFA”
ZHOU Qi-hai
2005, 34(3): 363-365,395.
Abstract:
The essential relationship and equal value transformation of Non-Finite Automat, Finite Automat and Gauge Finite Automat (abbreviated as NFA, FA & GFA) is studied. An equal value transforming algorithms of "NFA→FA" and "FA→GFA" are given, the existing nature from FA To GFA is proved by construction, with which the basis of an algorithm research on the minimum of an Automat is provided.
Interpretation-Based Integration of Knowledge Bases
DUAN Yi-feng, HU Gu-yu, PAN Zhi-song
2005, 34(3): 366-368.
Abstract:
Information integration is a valuable research area, which is widely used in distributed databases, cooperative information systems and data warehouses. Based on the interpretation of knowledge bases, interpretations of concepts and the relation of these concepts are analyzed in detail, and the minimal concept set of knowledge bases is defined. Then a method of building minimal concept set is given, and an algorithm of interpretation-based integration of knowledge bases is devised. Finally, complexity of the algorithm in finite domain is discussed.
A Novel Distributed IDS Based by Mobile Agent
LUO Guang-chun, YANG Jun-hui, LU Xian-liang
2005, 34(3): 369-372.
Abstract:
This paper presents a new Mobile Agent Distributed IDS (MADIDS) system basing on the mobile agents. This system is specifically designed for WAN, In MADIDS, the agents that are set at each node process the data transfer by distributed computation architecture. It has the ability of intrusion detection within the entire network and has good portability. The consumption of the network and servers' resources is not high, which means the possibility of network bottleneck is decreased. In this paper, we construct the infrastructure and theoretical model of MADIDS, and the deficiencies of MADIDS and future research work are also indicated.
Research of Information System Security Evaluation
CHEN Lei-ting, WEN Li-yu, LI Zhi-gang
2005, 34(3): 373-376.
Abstract:
This paper introduces the definition, standard and development on evaluation of information security; emphasis on Class of B2 in TCSEC, especially the security policy of B2, such as discretionary access control, object reuse, Labels (label integrity and exportation of labeled information) and mandatory access control. this paper also studies and analyses the other requirements for class B2, such as identification and authentication in the requirement of accountability; operational assurance (system architecture, system integrity, covert channel analysis and trusted facility management) and life-cycle assurance (security testing, design specification and verification and configuration management) in the requirement of assurance; security features user's guide, trusted facility manual, test documentation and design documentation in the requirement of documentation. in the end of this paper, we study and comparatively analyses the class of B2 with the class of EAL5 in CC.
An Object-Oriented Distributed Debugging Event Model
CHEN Wen-Yu, SANG Nan, QU Hong
2005, 34(3): 377-380.
Abstract:
For the course of even-based distributed debugging, a great deal of event messages must be collected and handled. This process is not only complicated but also can disturbs the real execution of distributed program. This paper introduces an Object-Oriented event model,which simplifies the collecting process of event message, makes it convenient to organize and manage the event message database, and adjuste indeterminacy,and reduces the disturbance of debugging to program execution.
Immune Principles Applications of Multi-Agent-Based IDS
WU Zhi, XU Jia-yi
2005, 34(3): 381-384.
Abstract:
This paper presents a new method of putting Agent-based IDS and mmunological principles together, and presents a concept of immune agent. A solution set scheme of antibody with the variety transmissibility and haleness is presented after the core algorithm of immune agent. to be desinged.A immune agent-based distributing IDS model is set up. This intrusion detection system is designed to be adaptable, robustness, autonomy.
Activity-Model-Oriented Reuse of Coordination Rules for Agent Organizations
WANG Zhong-qun, XIE Xiao-dong
2005, 34(3): 385-388.
Abstract:
Based on decomposition of organizational goal this paper proposes an approach to describing interoperability behavior between agents in organizations by using activity model, achieving support for coordination rules for agents, and abstract mechanisms of activity specialization and activity aggregation, enabling reuse of coordination rules in organizations through reuse of interoperability behavior between agents.
Defect Segmentation in Galvanization Plate Using Digital Filter
LI Xiao-dong, KANG Ge-wen
2005, 34(3): 389-391,406.
Abstract:
In this paper we present an approach for defect segment in galvanization plate using the method of digital filter. We state the principle of this method, while the robust and the eigenvector dimension are discussed. In addition, the size of template and time consuming are proposed also. At last, the experiments show the feasibility of this method.
Design and Realizing of Real-Time Controlling of Users' Use-State Based on Addressable Control
CHEN Zheng-hang, LI Hui
2005, 34(3): 392-395.
Abstract:
This paper gave a method for real-time controlling of users' use-state according to users' charging state. Based on the process and request of users' use-state controlling, independent program controls users' use-state automatically at regular intervals with PROCEDURE and medium-table on DB Server. The method has been put into practice and it's good work showed the feasibility.
Investigation of Conducting Poly(3,4-Ethylene Dioxy Thiophene) Film on Surface of Tantalum/Tantalum Pentoxide-Based Anode
XU Jian-hua, YANG Bang-chao, JIANG Ya-dong, XIE Guang-zhong, WANG Tao
2005, 34(3): 396-398.
Abstract:
This article investigate method of preparation in situ chemistry polymeriztion of conductive polymer poly 3,4-ethylene dioxy thiophene thin film in micropore interior surface of sinter Ta/Ta2O5 anode. The formed mechanism of macromolecule chain in restriction space as well as electrical conductivity of film in micropore interior on weak adherence occasion have been analysed with performance change of organic piece solid tantalum electrolytic capacitor. The analytic results show that, the chain length of macromolecule which polymerizing in restriction space will be changed as a result of affect of restriction energy.
Effect of Stress on the Structure and Ferroelectric Properties of LaAlO3/BaTiO3 Superlattices
LI Yan, HAO Lan-zhong, DENG Hong, ZHANG Ying, JI Hong
2005, 34(3): 399-402.
Abstract:
LaAlO3/BaTiO3 superlattices were prepared on (100) oriented SrTiO3 or Nb-doped SrTiO3 substrates by laser molecular beam epitaxy. The change of diffraction streaks observed in reflection high-energy electron diffraction during the growth of LaAlO3 and BaTiO3 illustrated the different epitaxial growth for LaAlO3 and BaTiO3. The X-ray diffraction spectra of the superlattices with different thickness of LaAlO3 and BaTiO3 layers within a period showed that the c-axis lattice constants changed with layer thickness due to the strain induced by lattice mismatch between LaAlO3 and BaTiO3. The remanent polarization of the superlattices increased with decreasing the thickness of BaTiO3 layers and increasing the thickness of LaTiO3 layers. This suggests that the remanent polarization is closely related with the lattice strain in the superlattices.
ERP Synchronization Studies in Visual Spatial Attention
ZHOU Qun, YAO De-zhong, ZHAO Li-na
2005, 34(3): 403-406.
Abstract:
Synchronous activity of brain function is a latent mechanism of brain system for the integration or binding in brain functioning areas. The difference of the synchronization is analyzed by calculating a nonlinear interdependent of ERP from left-right temporal electrode for the visual fields. Confirmation is shown that the difference is distinct between attention and non-attention in the up and down visual fields.
High-Accuracy Strain Measuring Technology Based on the Method of Dual Invariable-Current
XI You-bao, GU Tian-xiang
2005, 34(3): 407-409,432.
Abstract:
In this paper, a novel high-accuracy strain measuring technology based on the method of dual invariable-current, six end connecting and proportional measurement is proposed. The measurement principles, measurement errors analysis and self-calibration technology are described in detail. Lab test data by self-designed multi-channel strain measuring instrument based on the principles and technology is illustrated. The lab test and practical centrifugal load experimentation indicate that the measurement principles and technology are right, and the accuracy, stability, anti-interference and reliability are excellent. The principles and technology for stain measurement are worthwhile in practical engineering applications.
Moment Complete Convergence for Sums of i.i.d. Random Elements in Banach Space
WANG Yi, ZHONG Shou-ming, WANG Ding-cheng
2005, 34(3): 410-412.
Abstract:
In the paper, the moment complete convergence for sums of i.i.d. random elements in Banach Space has been discussed under certain moment condition, generalize the result of complete convergence for sums of i.i.d. random elements in Banach Space to the moment complete convergence for sums of i.i.d. random elements in Banach Space, and obtain the similar result as that of complete convergence under the certain moment condition.
A New Approach to Parallel Method for System of Linear Equations
ZENG Xian-wen
2005, 34(3): 413-416.
Abstract:
This paper improves Gram-Schmidt's orthogonal reduction method(MGS)and then proceed to put forward a parallel numerical method to solve the general solution of arbitrary consistent system of linear equations or the general solution of the least squares solution of arbitrary inconsistent system of linear equations by the improved MGS method and the dividing-conquering strategy,also discusses its computational complexity and its numerical stability,so its corresponding message passing parallel programming rules based on the model with MIMD computer of the distributed memory or the distributed-shared memory.
Periodic Solution for Discrete Competition Model
XIAO Hui-cheng, YANG Xiao-song
2005, 34(3): 417-420.
Abstract:
In this paper, we study a class of discrete competition model, Us the homogeneous coordinates of projective geometry to establish the linear zed equations for the systems, present a sufficient and necessary conditions for this systems having periodic solutions with periodic. And us the result, we proof that there are not periodic solutions with two period for the systems; establish the generality equations having periodic solutions with period with three.
Multi-Factor Decision-Making Methods for Behavioral Portfolio Choice
MA Yong-kai, TANG Xiao-wo
2005, 34(3): 421-424.
Abstract:
Models in the existing behavioral portfolio theory can't be applied to portfolio management because of either their idealization or their complexity. Considering that the factor-model may relate return of a security with factors predetermined, this paper sets up the multi-factor decision-making model for behavioral portfolio choice by introducing a factor model into the existing model so that the process of behavioral portfolio choice can be simplified.
Improvement of Domestic Manufacturing Enterprise Agility Appraisement Model
ZHAO Jin, ZHUANG Wan-yu
2005, 34(3): 425-428.
Abstract:
Agility appraisement is vital step of agile enterprise. Combining the advantage of Certainty Factor and probability theory, an improved enterprise agility index appraisement model basing on the Cost-Time-Robustness-Scope-Environment (CTRSE) index system is given out in this paper. A general Certainty Factor(CF) model is established. This system can calculate the agility level of enterprise objectively and accurately, and offer effective method for domestic enterprise agility appraisement.
Writing Process and Skills of Applications for Scientific Researching Funding Projects
WANG Qing, SHI Bing
2005, 34(3): 429-432.
Abstract:
The article introduced the significance, instauration means and auditing methods of scientific researching funding project, and concluded the writing process and main points of how to apply it, then emphasized the skills in the writing process of the application.