2005 Vol. 34, No. 3
2005, 34(3): 289-292.
Abstract:
In this paper, we propose a shared sub-path protection (SSPP) algorithm for protecting the multi-link failures of the dual-risk breakdowns in WDM mesh networks. SSPP firstly computes a minimum hop primary path for each connection request, and it follows to compute two SRLG disjoint and minimum cost backup paths for each sub-path on the primary path. The simulation results show that SSPP not only can completely protect the multi-link failures of the dual-risk breakdowns but also can make the tradeoffs between the resource utilization ratio (or blocking ratio) and the protection-switching time.
In this paper, we propose a shared sub-path protection (SSPP) algorithm for protecting the multi-link failures of the dual-risk breakdowns in WDM mesh networks. SSPP firstly computes a minimum hop primary path for each connection request, and it follows to compute two SRLG disjoint and minimum cost backup paths for each sub-path on the primary path. The simulation results show that SSPP not only can completely protect the multi-link failures of the dual-risk breakdowns but also can make the tradeoffs between the resource utilization ratio (or blocking ratio) and the protection-switching time.
2005, 34(3): 293-295,315.
Abstract:
The paper introduces the algorithm of based on double-side of Optical Line Terminate and Optical Network Unit in Ethernet Passive Network,and presents a new frame framework of grant,every field of grant frame uniquely identifies one Optical Network Unit. we encapsulate all grants in a downstream frame, on the other hand, Optical Network Unit participates in the scheduling process too,which improves the bandwidth utilization of upstream and downstream. As can be seen from the simulation result,this algorithm has the good performance of delay.
The paper introduces the algorithm of based on double-side of Optical Line Terminate and Optical Network Unit in Ethernet Passive Network,and presents a new frame framework of grant,every field of grant frame uniquely identifies one Optical Network Unit. we encapsulate all grants in a downstream frame, on the other hand, Optical Network Unit participates in the scheduling process too,which improves the bandwidth utilization of upstream and downstream. As can be seen from the simulation result,this algorithm has the good performance of delay.
2005, 34(3): 296-299.
Abstract:
The paper introduces a new technology of signal processing:independent component analysis, including its basic concept, principles, and some representative algorithms, such as FastICA, EASI, Nonlinear PCA, and natural gradient algorithm based maximum likelihood estimation. In a denoising simulation experiment with the mean square error criterion, these algorithms are compared to the classic algorithms of adaptive signal processing, such as LMS and RLS. Results show that in denoising application ICA algorithms are superior to the classic adaptive algorithms. Thus ICA algorithms have large value in denoising application, deservnig further study and promoting.
The paper introduces a new technology of signal processing:independent component analysis, including its basic concept, principles, and some representative algorithms, such as FastICA, EASI, Nonlinear PCA, and natural gradient algorithm based maximum likelihood estimation. In a denoising simulation experiment with the mean square error criterion, these algorithms are compared to the classic algorithms of adaptive signal processing, such as LMS and RLS. Results show that in denoising application ICA algorithms are superior to the classic adaptive algorithms. Thus ICA algorithms have large value in denoising application, deservnig further study and promoting.
2005, 34(3): 300-303.
Abstract:
Chaos phenomenon of sampling phase-detector digital synthesizer loop is studied. First, the systems of sampling phase-detector digital synthesizer loop is discretization handled and the discretization systems model is given. In this systems, loop filter is RC integral filter and phase-detector is triangle phase-detector characteristic. By verifing the corresponding lower dimension system of discretization systems has the Snapnack Repeller, it is proof that original system output chaos when certain conditions of system parameters are satisfied. The relation between chaos and the parameter of the system is given finally.
Chaos phenomenon of sampling phase-detector digital synthesizer loop is studied. First, the systems of sampling phase-detector digital synthesizer loop is discretization handled and the discretization systems model is given. In this systems, loop filter is RC integral filter and phase-detector is triangle phase-detector characteristic. By verifing the corresponding lower dimension system of discretization systems has the Snapnack Repeller, it is proof that original system output chaos when certain conditions of system parameters are satisfied. The relation between chaos and the parameter of the system is given finally.
2005, 34(3): 304-307.
Abstract:
In passive tracking system, the method using bearings-only can't determine the position of target quickly with high precision. What is more, the EKF is traditional algorithm for passive tracking, but it produces large errors and easily leads to divergence. This paper introduces a new method using phase difference rate and SR-UKF algorithm. It can amend aforementioned flaws, lead to filter stability in use, and significantly improve the performance of tracking. The method is validated by the results of the simulation experiment.
In passive tracking system, the method using bearings-only can't determine the position of target quickly with high precision. What is more, the EKF is traditional algorithm for passive tracking, but it produces large errors and easily leads to divergence. This paper introduces a new method using phase difference rate and SR-UKF algorithm. It can amend aforementioned flaws, lead to filter stability in use, and significantly improve the performance of tracking. The method is validated by the results of the simulation experiment.
2005, 34(3): 308-311.
Abstract:
It is very effective that applying frequency agility to reduce the coherence of the direct and the reflect signal in phased array radar, which are contained in the echo of radar. This method can restrain the influence caused by multipath effect when estimating the target's direction of arrival (DOA), and improve the precision and ability of angle's estimation. Then the application of the modified AR model can not only reduce the coherence of the two signals further, but separate the elevations of the target and its image. The simulation results verify the validity of the theory of frequency agility and modified AR model, as well as the advantage and practicability with the combination of two methods when comparing with other methods.
It is very effective that applying frequency agility to reduce the coherence of the direct and the reflect signal in phased array radar, which are contained in the echo of radar. This method can restrain the influence caused by multipath effect when estimating the target's direction of arrival (DOA), and improve the precision and ability of angle's estimation. Then the application of the modified AR model can not only reduce the coherence of the two signals further, but separate the elevations of the target and its image. The simulation results verify the validity of the theory of frequency agility and modified AR model, as well as the advantage and practicability with the combination of two methods when comparing with other methods.
2005, 34(3): 312-315.
Abstract:
Using the constant modulus (CM) property of the CDMA mobile communication signal, an online calibration algorithm, which calibrates the antenna array channel amplitude and phase errors using an auxiliary signal nearby the antenna array, is presented. Despreading the array receiving signal with the spread spectrum sequence being orthogonal to user's, and the coefficients of the channel FIR filter are then adjusted by CM algorithm adaptively to compensate the errors. Unlike the conventional self-calibration methods, it can be not affected by multi-path, and speeds up the convergence. Simulation demonstrates its validity.
Using the constant modulus (CM) property of the CDMA mobile communication signal, an online calibration algorithm, which calibrates the antenna array channel amplitude and phase errors using an auxiliary signal nearby the antenna array, is presented. Despreading the array receiving signal with the spread spectrum sequence being orthogonal to user's, and the coefficients of the channel FIR filter are then adjusted by CM algorithm adaptively to compensate the errors. Unlike the conventional self-calibration methods, it can be not affected by multi-path, and speeds up the convergence. Simulation demonstrates its validity.
2005, 34(3): 316-319.
Abstract:
According to the disadvantages of demodulation in digital automatic gain control loop, which needs multipliers and uses much of the system resource, this paper proposed a new method of digital demodulation by means of absolute values or maximal values of slip windows which can substitute the square operation of signals in analog demodulation method. The new method can reduce, to a large extent, the contradiction between the system velocity and resource. Based on the analysis of the loop, the computer simulations are given. The results indicate the feasibility of digital AGC, and they are highly effective. The method has been used in design of digital AGC of digital intermediate frequency receiver.
According to the disadvantages of demodulation in digital automatic gain control loop, which needs multipliers and uses much of the system resource, this paper proposed a new method of digital demodulation by means of absolute values or maximal values of slip windows which can substitute the square operation of signals in analog demodulation method. The new method can reduce, to a large extent, the contradiction between the system velocity and resource. Based on the analysis of the loop, the computer simulations are given. The results indicate the feasibility of digital AGC, and they are highly effective. The method has been used in design of digital AGC of digital intermediate frequency receiver.
2005, 34(3): 320-322,327.
Abstract:
The experimental setup of the pulse video thermography nondestructive testing system is introduced in this paper. On the basis of study of testing mechanism and the two conventional methods, namely reflecting method and transmission method, two methods to increase the heat emission for specimen with smaller heat emission coefficient are presented. The application ranges for the two conventional testing methods are also presented.
The experimental setup of the pulse video thermography nondestructive testing system is introduced in this paper. On the basis of study of testing mechanism and the two conventional methods, namely reflecting method and transmission method, two methods to increase the heat emission for specimen with smaller heat emission coefficient are presented. The application ranges for the two conventional testing methods are also presented.
2005, 34(3): 323-327.
Abstract:
A real-time signal sorting system and an improved sorting algorithm based on the probability statistics is introduced. It is for the special radar signal environment of high pulse-density and high pulse-losing probability in electronic warfsre. The feasibility of this sorting system and algorithm is verified through lots of experiments. By designing the hardware circuits, the signal sorting system is realized. It performs well for duplex requirement of high-accuracy and real-time processing in high pulse-density environment.
A real-time signal sorting system and an improved sorting algorithm based on the probability statistics is introduced. It is for the special radar signal environment of high pulse-density and high pulse-losing probability in electronic warfsre. The feasibility of this sorting system and algorithm is verified through lots of experiments. By designing the hardware circuits, the signal sorting system is realized. It performs well for duplex requirement of high-accuracy and real-time processing in high pulse-density environment.
2005, 34(3): 328-331.
Abstract:
The effective bandwidth calculation methods of short-range dependent traffic and self-similar traffic are given. The relationship among buffer size, packet lost rate and effective bandwidth utilization is analyzed. The advanced performance of effective bandwidth-based source distribution in the networks design is pointed out. The simulation results show that effective bandwidth of self-similar traffic' are more well QoS than short-range dependent traffic effective bandwidths.
The effective bandwidth calculation methods of short-range dependent traffic and self-similar traffic are given. The relationship among buffer size, packet lost rate and effective bandwidth utilization is analyzed. The advanced performance of effective bandwidth-based source distribution in the networks design is pointed out. The simulation results show that effective bandwidth of self-similar traffic' are more well QoS than short-range dependent traffic effective bandwidths.
2005, 34(3): 332-335.
Abstract:
An optical time domain reflectometer using correlation technique may has much better performance than conventional otdr. the autocorrelation of Golay sequence has low sidelobes, so we can use Golay sequence as the probe signal.This paper present the theoretical foundation of this method and tell the way to change bipolar codes to unipolar codes.
An optical time domain reflectometer using correlation technique may has much better performance than conventional otdr. the autocorrelation of Golay sequence has low sidelobes, so we can use Golay sequence as the probe signal.This paper present the theoretical foundation of this method and tell the way to change bipolar codes to unipolar codes.
2005, 34(3): 336-339.
Abstract:
The stability, electronic and magnetic properties of icosahedral Mco12 clusters are studied by using the discrete variational local-spin-density-function method, Where M=Ti,V,Cr,Mn,Fe,Co and Ni..our calculated results show that all the clusters have bond-length contraction and metallic character, all the clusters are magnetism and the valence-band width(VBW) becomes wider with the increase of atomic number.Some clusters(M=Ti,Mn and Co) have closed electronic shell while the others have open electronic shell and are expected to distort further.the results also indicated that the cluster moment is reduced by the substitution of central Co atom with an M atom and that the average moment per atom of all clusters is larger than that of the bulk Co.Our results compare well with the available experimental results.
The stability, electronic and magnetic properties of icosahedral Mco12 clusters are studied by using the discrete variational local-spin-density-function method, Where M=Ti,V,Cr,Mn,Fe,Co and Ni..our calculated results show that all the clusters have bond-length contraction and metallic character, all the clusters are magnetism and the valence-band width(VBW) becomes wider with the increase of atomic number.Some clusters(M=Ti,Mn and Co) have closed electronic shell while the others have open electronic shell and are expected to distort further.the results also indicated that the cluster moment is reduced by the substitution of central Co atom with an M atom and that the average moment per atom of all clusters is larger than that of the bulk Co.Our results compare well with the available experimental results.
2005, 34(3): 340-342,354.
Abstract:
The mechanism of lowering the density of interface states due to hydrogenating SiC surface was studied. The treatment of hydrogenation SiC surface by slowly oxidizing,etching by dilute HF and then immersing in boiling water was utilized to lower the density of surface states. The method was applied to treat the surface during fabricating SiC device. SiC Schottky diodes with ideality factor of 1.2~1.25 and ohmic contacts with specific resistance of (5~7)×10-3Ω· cm2 were obtained below 100℃. Its advantages lay in avoiding the high-temperature annealing at 800~1 200℃ for conventional Ohmic contacts, decreasing technical difficulty, and improving the electric performances of SiC Schottky junction.
The mechanism of lowering the density of interface states due to hydrogenating SiC surface was studied. The treatment of hydrogenation SiC surface by slowly oxidizing,etching by dilute HF and then immersing in boiling water was utilized to lower the density of surface states. The method was applied to treat the surface during fabricating SiC device. SiC Schottky diodes with ideality factor of 1.2~1.25 and ohmic contacts with specific resistance of (5~7)×10-3Ω· cm2 were obtained below 100℃. Its advantages lay in avoiding the high-temperature annealing at 800~1 200℃ for conventional Ohmic contacts, decreasing technical difficulty, and improving the electric performances of SiC Schottky junction.
2005, 34(3): 343-346.
Abstract:
A server warning system based on wavelet neural network is presented. Wavelet neural network is a kind of neural networks, which combines wavelet theory with neural network theory, that is wavelet function forming neuron, it avoid the problem of nonlinear optimizations, such as local optimization. WNN has fast convergence because of the low correlation of wavelet neuron. In this system,the WNN was trained by using numbered records of system log files in server and the classifier for intrusion detection can be obtained. The experimental result shows that the performance of this system is highly adaptive, the learning speed is fast, and the rate of warning accurate is high, so it is practicable in intrusion detection.
A server warning system based on wavelet neural network is presented. Wavelet neural network is a kind of neural networks, which combines wavelet theory with neural network theory, that is wavelet function forming neuron, it avoid the problem of nonlinear optimizations, such as local optimization. WNN has fast convergence because of the low correlation of wavelet neuron. In this system,the WNN was trained by using numbered records of system log files in server and the classifier for intrusion detection can be obtained. The experimental result shows that the performance of this system is highly adaptive, the learning speed is fast, and the rate of warning accurate is high, so it is practicable in intrusion detection.
2005, 34(3): 347-350.
Abstract:
Based on the discussion of the weakness of the network forensics in current Internet system, a distributed real network forensics system is proposed and designed. This system monitors and analyzes the state of the local network. When the Internet intruder is found, on the base of the security of the local network, the system confirms whether crime has happened, and then captures and analyzes the intruding evidence information, protects the integrity of them, finally, produces the intruding crime evidence.
Based on the discussion of the weakness of the network forensics in current Internet system, a distributed real network forensics system is proposed and designed. This system monitors and analyzes the state of the local network. When the Internet intruder is found, on the base of the security of the local network, the system confirms whether crime has happened, and then captures and analyzes the intruding evidence information, protects the integrity of them, finally, produces the intruding crime evidence.
2005, 34(3): 351-354.
Abstract:
Traditional single security technology is becoming obsolete with the complexity of network security problems increased. To address this problem, a new security system architecture is proposed. This new system is based on the distributed firewall environment, and distributed network intrusion detection technology is integrated. Furthermore, Expert System is utilized to make them work coordinated and intelligently respond the real-time dynamic network security situations. This scheme can make up for the shortcomings of single security system and fulfill the requirement of network security. Description of this system architecture and some important system details are presented in this paper.
Traditional single security technology is becoming obsolete with the complexity of network security problems increased. To address this problem, a new security system architecture is proposed. This new system is based on the distributed firewall environment, and distributed network intrusion detection technology is integrated. Furthermore, Expert System is utilized to make them work coordinated and intelligently respond the real-time dynamic network security situations. This scheme can make up for the shortcomings of single security system and fulfill the requirement of network security. Description of this system architecture and some important system details are presented in this paper.
2005, 34(3): 355-358.
Abstract:
This paper introduces the design standard of the embedded communication system device driver and the reason for proposing it. According to characteristics of the embedded communication system and compared with the design model of device driver in Windows and Linux, the architecture of embedded communication system device driver has been proposed. It can make the driver design much specifically and effectively. The driver design standard has been expatiated in VxWorks referring to specification of general device driver and development experience.
This paper introduces the design standard of the embedded communication system device driver and the reason for proposing it. According to characteristics of the embedded communication system and compared with the design model of device driver in Windows and Linux, the architecture of embedded communication system device driver has been proposed. It can make the driver design much specifically and effectively. The driver design standard has been expatiated in VxWorks referring to specification of general device driver and development experience.
2005, 34(3): 359-362.
Abstract:
The paper design a genetic algorithm based on the tabu search. By utilizing the main frame of parallel search supplied by the genetic algorithm and the individual serial search mode of the tabu algorithm, this method can enlarge the search space and swiftly implement the overall optimization. If it is combined with the heuristics algorithm to solve the knapsack problem, according to the results of computer simulation, it can effectively improve the index of optimization performance and search efficiency.
The paper design a genetic algorithm based on the tabu search. By utilizing the main frame of parallel search supplied by the genetic algorithm and the individual serial search mode of the tabu algorithm, this method can enlarge the search space and swiftly implement the overall optimization. If it is combined with the heuristics algorithm to solve the knapsack problem, according to the results of computer simulation, it can effectively improve the index of optimization performance and search efficiency.
2005, 34(3): 363-365,395.
Abstract:
The essential relationship and equal value transformation of Non-Finite Automat, Finite Automat and Gauge Finite Automat (abbreviated as NFA, FA & GFA) is studied. An equal value transforming algorithms of "NFA→FA" and "FA→GFA" are given, the existing nature from FA To GFA is proved by construction, with which the basis of an algorithm research on the minimum of an Automat is provided.
The essential relationship and equal value transformation of Non-Finite Automat, Finite Automat and Gauge Finite Automat (abbreviated as NFA, FA & GFA) is studied. An equal value transforming algorithms of "NFA→FA" and "FA→GFA" are given, the existing nature from FA To GFA is proved by construction, with which the basis of an algorithm research on the minimum of an Automat is provided.
2005, 34(3): 366-368.
Abstract:
Information integration is a valuable research area, which is widely used in distributed databases, cooperative information systems and data warehouses. Based on the interpretation of knowledge bases, interpretations of concepts and the relation of these concepts are analyzed in detail, and the minimal concept set of knowledge bases is defined. Then a method of building minimal concept set is given, and an algorithm of interpretation-based integration of knowledge bases is devised. Finally, complexity of the algorithm in finite domain is discussed.
Information integration is a valuable research area, which is widely used in distributed databases, cooperative information systems and data warehouses. Based on the interpretation of knowledge bases, interpretations of concepts and the relation of these concepts are analyzed in detail, and the minimal concept set of knowledge bases is defined. Then a method of building minimal concept set is given, and an algorithm of interpretation-based integration of knowledge bases is devised. Finally, complexity of the algorithm in finite domain is discussed.
2005, 34(3): 369-372.
Abstract:
This paper presents a new Mobile Agent Distributed IDS (MADIDS) system basing on the mobile agents. This system is specifically designed for WAN, In MADIDS, the agents that are set at each node process the data transfer by distributed computation architecture. It has the ability of intrusion detection within the entire network and has good portability. The consumption of the network and servers' resources is not high, which means the possibility of network bottleneck is decreased. In this paper, we construct the infrastructure and theoretical model of MADIDS, and the deficiencies of MADIDS and future research work are also indicated.
This paper presents a new Mobile Agent Distributed IDS (MADIDS) system basing on the mobile agents. This system is specifically designed for WAN, In MADIDS, the agents that are set at each node process the data transfer by distributed computation architecture. It has the ability of intrusion detection within the entire network and has good portability. The consumption of the network and servers' resources is not high, which means the possibility of network bottleneck is decreased. In this paper, we construct the infrastructure and theoretical model of MADIDS, and the deficiencies of MADIDS and future research work are also indicated.
2005, 34(3): 373-376.
Abstract:
This paper introduces the definition, standard and development on evaluation of information security; emphasis on Class of B2 in TCSEC, especially the security policy of B2, such as discretionary access control, object reuse, Labels (label integrity and exportation of labeled information) and mandatory access control. this paper also studies and analyses the other requirements for class B2, such as identification and authentication in the requirement of accountability; operational assurance (system architecture, system integrity, covert channel analysis and trusted facility management) and life-cycle assurance (security testing, design specification and verification and configuration management) in the requirement of assurance; security features user's guide, trusted facility manual, test documentation and design documentation in the requirement of documentation. in the end of this paper, we study and comparatively analyses the class of B2 with the class of EAL5 in CC.
This paper introduces the definition, standard and development on evaluation of information security; emphasis on Class of B2 in TCSEC, especially the security policy of B2, such as discretionary access control, object reuse, Labels (label integrity and exportation of labeled information) and mandatory access control. this paper also studies and analyses the other requirements for class B2, such as identification and authentication in the requirement of accountability; operational assurance (system architecture, system integrity, covert channel analysis and trusted facility management) and life-cycle assurance (security testing, design specification and verification and configuration management) in the requirement of assurance; security features user's guide, trusted facility manual, test documentation and design documentation in the requirement of documentation. in the end of this paper, we study and comparatively analyses the class of B2 with the class of EAL5 in CC.
2005, 34(3): 377-380.
Abstract:
For the course of even-based distributed debugging, a great deal of event messages must be collected and handled. This process is not only complicated but also can disturbs the real execution of distributed program. This paper introduces an Object-Oriented event model,which simplifies the collecting process of event message, makes it convenient to organize and manage the event message database, and adjuste indeterminacy,and reduces the disturbance of debugging to program execution.
For the course of even-based distributed debugging, a great deal of event messages must be collected and handled. This process is not only complicated but also can disturbs the real execution of distributed program. This paper introduces an Object-Oriented event model,which simplifies the collecting process of event message, makes it convenient to organize and manage the event message database, and adjuste indeterminacy,and reduces the disturbance of debugging to program execution.
2005, 34(3): 381-384.
Abstract:
This paper presents a new method of putting Agent-based IDS and mmunological principles together, and presents a concept of immune agent. A solution set scheme of antibody with the variety transmissibility and haleness is presented after the core algorithm of immune agent. to be desinged.A immune agent-based distributing IDS model is set up. This intrusion detection system is designed to be adaptable, robustness, autonomy.
This paper presents a new method of putting Agent-based IDS and mmunological principles together, and presents a concept of immune agent. A solution set scheme of antibody with the variety transmissibility and haleness is presented after the core algorithm of immune agent. to be desinged.A immune agent-based distributing IDS model is set up. This intrusion detection system is designed to be adaptable, robustness, autonomy.
2005, 34(3): 385-388.
Abstract:
Based on decomposition of organizational goal this paper proposes an approach to describing interoperability behavior between agents in organizations by using activity model, achieving support for coordination rules for agents, and abstract mechanisms of activity specialization and activity aggregation, enabling reuse of coordination rules in organizations through reuse of interoperability behavior between agents.
Based on decomposition of organizational goal this paper proposes an approach to describing interoperability behavior between agents in organizations by using activity model, achieving support for coordination rules for agents, and abstract mechanisms of activity specialization and activity aggregation, enabling reuse of coordination rules in organizations through reuse of interoperability behavior between agents.
2005, 34(3): 389-391,406.
Abstract:
In this paper we present an approach for defect segment in galvanization plate using the method of digital filter. We state the principle of this method, while the robust and the eigenvector dimension are discussed. In addition, the size of template and time consuming are proposed also. At last, the experiments show the feasibility of this method.
In this paper we present an approach for defect segment in galvanization plate using the method of digital filter. We state the principle of this method, while the robust and the eigenvector dimension are discussed. In addition, the size of template and time consuming are proposed also. At last, the experiments show the feasibility of this method.
2005, 34(3): 392-395.
Abstract:
This paper gave a method for real-time controlling of users' use-state according to users' charging state. Based on the process and request of users' use-state controlling, independent program controls users' use-state automatically at regular intervals with PROCEDURE and medium-table on DB Server. The method has been put into practice and it's good work showed the feasibility.
This paper gave a method for real-time controlling of users' use-state according to users' charging state. Based on the process and request of users' use-state controlling, independent program controls users' use-state automatically at regular intervals with PROCEDURE and medium-table on DB Server. The method has been put into practice and it's good work showed the feasibility.
2005, 34(3): 396-398.
Abstract:
This article investigate method of preparation in situ chemistry polymeriztion of conductive polymer poly 3,4-ethylene dioxy thiophene thin film in micropore interior surface of sinter Ta/Ta2O5 anode. The formed mechanism of macromolecule chain in restriction space as well as electrical conductivity of film in micropore interior on weak adherence occasion have been analysed with performance change of organic piece solid tantalum electrolytic capacitor. The analytic results show that, the chain length of macromolecule which polymerizing in restriction space will be changed as a result of affect of restriction energy.
This article investigate method of preparation in situ chemistry polymeriztion of conductive polymer poly 3,4-ethylene dioxy thiophene thin film in micropore interior surface of sinter Ta/Ta2O5 anode. The formed mechanism of macromolecule chain in restriction space as well as electrical conductivity of film in micropore interior on weak adherence occasion have been analysed with performance change of organic piece solid tantalum electrolytic capacitor. The analytic results show that, the chain length of macromolecule which polymerizing in restriction space will be changed as a result of affect of restriction energy.
2005, 34(3): 399-402.
Abstract:
LaAlO3/BaTiO3 superlattices were prepared on (100) oriented SrTiO3 or Nb-doped SrTiO3 substrates by laser molecular beam epitaxy. The change of diffraction streaks observed in reflection high-energy electron diffraction during the growth of LaAlO3 and BaTiO3 illustrated the different epitaxial growth for LaAlO3 and BaTiO3. The X-ray diffraction spectra of the superlattices with different thickness of LaAlO3 and BaTiO3 layers within a period showed that the c-axis lattice constants changed with layer thickness due to the strain induced by lattice mismatch between LaAlO3 and BaTiO3. The remanent polarization of the superlattices increased with decreasing the thickness of BaTiO3 layers and increasing the thickness of LaTiO3 layers. This suggests that the remanent polarization is closely related with the lattice strain in the superlattices.
LaAlO3/BaTiO3 superlattices were prepared on (100) oriented SrTiO3 or Nb-doped SrTiO3 substrates by laser molecular beam epitaxy. The change of diffraction streaks observed in reflection high-energy electron diffraction during the growth of LaAlO3 and BaTiO3 illustrated the different epitaxial growth for LaAlO3 and BaTiO3. The X-ray diffraction spectra of the superlattices with different thickness of LaAlO3 and BaTiO3 layers within a period showed that the c-axis lattice constants changed with layer thickness due to the strain induced by lattice mismatch between LaAlO3 and BaTiO3. The remanent polarization of the superlattices increased with decreasing the thickness of BaTiO3 layers and increasing the thickness of LaTiO3 layers. This suggests that the remanent polarization is closely related with the lattice strain in the superlattices.
2005, 34(3): 403-406.
Abstract:
Synchronous activity of brain function is a latent mechanism of brain system for the integration or binding in brain functioning areas. The difference of the synchronization is analyzed by calculating a nonlinear interdependent of ERP from left-right temporal electrode for the visual fields. Confirmation is shown that the difference is distinct between attention and non-attention in the up and down visual fields.
Synchronous activity of brain function is a latent mechanism of brain system for the integration or binding in brain functioning areas. The difference of the synchronization is analyzed by calculating a nonlinear interdependent of ERP from left-right temporal electrode for the visual fields. Confirmation is shown that the difference is distinct between attention and non-attention in the up and down visual fields.
2005, 34(3): 407-409,432.
Abstract:
In this paper, a novel high-accuracy strain measuring technology based on the method of dual invariable-current, six end connecting and proportional measurement is proposed. The measurement principles, measurement errors analysis and self-calibration technology are described in detail. Lab test data by self-designed multi-channel strain measuring instrument based on the principles and technology is illustrated. The lab test and practical centrifugal load experimentation indicate that the measurement principles and technology are right, and the accuracy, stability, anti-interference and reliability are excellent. The principles and technology for stain measurement are worthwhile in practical engineering applications.
In this paper, a novel high-accuracy strain measuring technology based on the method of dual invariable-current, six end connecting and proportional measurement is proposed. The measurement principles, measurement errors analysis and self-calibration technology are described in detail. Lab test data by self-designed multi-channel strain measuring instrument based on the principles and technology is illustrated. The lab test and practical centrifugal load experimentation indicate that the measurement principles and technology are right, and the accuracy, stability, anti-interference and reliability are excellent. The principles and technology for stain measurement are worthwhile in practical engineering applications.
2005, 34(3): 410-412.
Abstract:
In the paper, the moment complete convergence for sums of i.i.d. random elements in Banach Space has been discussed under certain moment condition, generalize the result of complete convergence for sums of i.i.d. random elements in Banach Space to the moment complete convergence for sums of i.i.d. random elements in Banach Space, and obtain the similar result as that of complete convergence under the certain moment condition.
In the paper, the moment complete convergence for sums of i.i.d. random elements in Banach Space has been discussed under certain moment condition, generalize the result of complete convergence for sums of i.i.d. random elements in Banach Space to the moment complete convergence for sums of i.i.d. random elements in Banach Space, and obtain the similar result as that of complete convergence under the certain moment condition.
2005, 34(3): 413-416.
Abstract:
This paper improves Gram-Schmidt's orthogonal reduction method(MGS)and then proceed to put forward a parallel numerical method to solve the general solution of arbitrary consistent system of linear equations or the general solution of the least squares solution of arbitrary inconsistent system of linear equations by the improved MGS method and the dividing-conquering strategy,also discusses its computational complexity and its numerical stability,so its corresponding message passing parallel programming rules based on the model with MIMD computer of the distributed memory or the distributed-shared memory.
This paper improves Gram-Schmidt's orthogonal reduction method(MGS)and then proceed to put forward a parallel numerical method to solve the general solution of arbitrary consistent system of linear equations or the general solution of the least squares solution of arbitrary inconsistent system of linear equations by the improved MGS method and the dividing-conquering strategy,also discusses its computational complexity and its numerical stability,so its corresponding message passing parallel programming rules based on the model with MIMD computer of the distributed memory or the distributed-shared memory.
2005, 34(3): 417-420.
Abstract:
In this paper, we study a class of discrete competition model, Us the homogeneous coordinates of projective geometry to establish the linear zed equations for the systems, present a sufficient and necessary conditions for this systems having periodic solutions with periodic. And us the result, we proof that there are not periodic solutions with two period for the systems; establish the generality equations having periodic solutions with period with three.
In this paper, we study a class of discrete competition model, Us the homogeneous coordinates of projective geometry to establish the linear zed equations for the systems, present a sufficient and necessary conditions for this systems having periodic solutions with periodic. And us the result, we proof that there are not periodic solutions with two period for the systems; establish the generality equations having periodic solutions with period with three.
2005, 34(3): 421-424.
Abstract:
Models in the existing behavioral portfolio theory can't be applied to portfolio management because of either their idealization or their complexity. Considering that the factor-model may relate return of a security with factors predetermined, this paper sets up the multi-factor decision-making model for behavioral portfolio choice by introducing a factor model into the existing model so that the process of behavioral portfolio choice can be simplified.
Models in the existing behavioral portfolio theory can't be applied to portfolio management because of either their idealization or their complexity. Considering that the factor-model may relate return of a security with factors predetermined, this paper sets up the multi-factor decision-making model for behavioral portfolio choice by introducing a factor model into the existing model so that the process of behavioral portfolio choice can be simplified.
2005, 34(3): 425-428.
Abstract:
Agility appraisement is vital step of agile enterprise. Combining the advantage of Certainty Factor and probability theory, an improved enterprise agility index appraisement model basing on the Cost-Time-Robustness-Scope-Environment (CTRSE) index system is given out in this paper. A general Certainty Factor(CF) model is established. This system can calculate the agility level of enterprise objectively and accurately, and offer effective method for domestic enterprise agility appraisement.
Agility appraisement is vital step of agile enterprise. Combining the advantage of Certainty Factor and probability theory, an improved enterprise agility index appraisement model basing on the Cost-Time-Robustness-Scope-Environment (CTRSE) index system is given out in this paper. A general Certainty Factor(CF) model is established. This system can calculate the agility level of enterprise objectively and accurately, and offer effective method for domestic enterprise agility appraisement.
2005, 34(3): 429-432.
Abstract:
The article introduced the significance, instauration means and auditing methods of scientific researching funding project, and concluded the writing process and main points of how to apply it, then emphasized the skills in the writing process of the application.
The article introduced the significance, instauration means and auditing methods of scientific researching funding project, and concluded the writing process and main points of how to apply it, then emphasized the skills in the writing process of the application.