2006 Vol. 35, No. 1
2006, 35(1): 1-4.
Abstract:
After developing the polynomial approximation method to the rational-fraction approximation's in theory, a non-linear predictable global model for the system of a radio set is built based on the continued-fraction approximation and the phase-space reconfiguration while the dynamic model can't be known for the system of a radio set. We can analyze the characteristic and gain the prediction of frequency hopping by substituting the model for the equation of frequency hopping code. The results of theoretic analysis and computer simulation have proved this method is practically feasible. We can predict it accurately comparatively and get an explicit expression.
After developing the polynomial approximation method to the rational-fraction approximation's in theory, a non-linear predictable global model for the system of a radio set is built based on the continued-fraction approximation and the phase-space reconfiguration while the dynamic model can't be known for the system of a radio set. We can analyze the characteristic and gain the prediction of frequency hopping by substituting the model for the equation of frequency hopping code. The results of theoretic analysis and computer simulation have proved this method is practically feasible. We can predict it accurately comparatively and get an explicit expression.
2006, 35(1): 5-8.
Abstract:
An improved step-transform algrithm is proposed for high squint mode synthetic aperture radar(SAR). It uses different chirp rates to deramp the signal in different subapertures to alleviate the varying of chirp rate with the azimuth time, and to accurately select data from the coarse-resolution FFT output by approximate interpolation in frequency-domain and to remove the tight constrains for the parameter in time-varying step-transform. The performance of the algorithm is efficient in high squint mode.
An improved step-transform algrithm is proposed for high squint mode synthetic aperture radar(SAR). It uses different chirp rates to deramp the signal in different subapertures to alleviate the varying of chirp rate with the azimuth time, and to accurately select data from the coarse-resolution FFT output by approximate interpolation in frequency-domain and to remove the tight constrains for the parameter in time-varying step-transform. The performance of the algorithm is efficient in high squint mode.
2006, 35(1): 9-12.
Abstract:
Through motion compensation of Inverse Synthetic Aperture Radar(ISAR), the jamming mechanism of ISAR is analyzed and simulated. The results show the imaging of ISAR will be distorted effectively if the maximum value of the complex envelope correlation function of neighbor range images is false alarm. Furthermore, the comparison of anti-jamming ability among ISAR, SAR and linear frequency-modulated radar shows that the anti-jamming ability of ISAR is worse because it needs motion compensation before imaging.
Through motion compensation of Inverse Synthetic Aperture Radar(ISAR), the jamming mechanism of ISAR is analyzed and simulated. The results show the imaging of ISAR will be distorted effectively if the maximum value of the complex envelope correlation function of neighbor range images is false alarm. Furthermore, the comparison of anti-jamming ability among ISAR, SAR and linear frequency-modulated radar shows that the anti-jamming ability of ISAR is worse because it needs motion compensation before imaging.
2006, 35(1): 13-16.
Abstract:
The relationship between scale and wavelength in wavelet transform analysis of data series is proposed. Firstly,the feature of wavelet analysis, the different definition of wavelet transform and their Fourier transform are given, then the general formula of the relationship between scale and wavelength is deduced from the property of wavelet transform. An illustrative example of Morlet wavelet is presented and the simulation results show the effectiveness of the proposed formula. Finally, the formulas of some commonly used wavelets are given.
The relationship between scale and wavelength in wavelet transform analysis of data series is proposed. Firstly,the feature of wavelet analysis, the different definition of wavelet transform and their Fourier transform are given, then the general formula of the relationship between scale and wavelength is deduced from the property of wavelet transform. An illustrative example of Morlet wavelet is presented and the simulation results show the effectiveness of the proposed formula. Finally, the formulas of some commonly used wavelets are given.
2006, 35(1): 17-20.
Abstract:
A stationary electronic emitter can be located by two aircraft from Time Difference Of Arrival (TDOA) and Differential Doppler(DD) measurements. The algorithm and error analytic expression of localization are given. Several curves of constant TDOA and DD are shown. The comparison of localization based on TDOA and DD is presented. The result indicates the previous approach performance is better.
A stationary electronic emitter can be located by two aircraft from Time Difference Of Arrival (TDOA) and Differential Doppler(DD) measurements. The algorithm and error analytic expression of localization are given. Several curves of constant TDOA and DD are shown. The comparison of localization based on TDOA and DD is presented. The result indicates the previous approach performance is better.
2006, 35(1): 21-24.
Abstract:
An improved algrothm based on H.26L video coding standard is proposed. Superior serching method and bi-directional interpolation method are adopted to enhence image reconstruction quality. By make using of MB spatial relativity, the quantified block can be judged whether it can be combined before coding. Experimental results shows that the proposed algorithm is very efficient in terms of the image compressibility.
An improved algrothm based on H.26L video coding standard is proposed. Superior serching method and bi-directional interpolation method are adopted to enhence image reconstruction quality. By make using of MB spatial relativity, the quantified block can be judged whether it can be combined before coding. Experimental results shows that the proposed algorithm is very efficient in terms of the image compressibility.
2006, 35(1): 25-28.
Abstract:
The bit stream from the set partitioning in hierarchical trees coder is divided into packets, which are protected by RCPT codes of different error-correcting capability before transmission according to their effect to the reconstruction of image. The genetic algorithms are developed for selecting optimal RCPT codes rates from the finite rates set in order to minimize the end-to-end distortion. The time for searching the optimal rate set is reduced when using the channel code rates for equal error protection as the initial condition of the genetic algorithms. Simulation results in binary symmetric channel show that this transmission scheme for progressive image is easy to perform and able to achieve high peak signal-to-noise ratio even in high bit error rate channel.
The bit stream from the set partitioning in hierarchical trees coder is divided into packets, which are protected by RCPT codes of different error-correcting capability before transmission according to their effect to the reconstruction of image. The genetic algorithms are developed for selecting optimal RCPT codes rates from the finite rates set in order to minimize the end-to-end distortion. The time for searching the optimal rate set is reduced when using the channel code rates for equal error protection as the initial condition of the genetic algorithms. Simulation results in binary symmetric channel show that this transmission scheme for progressive image is easy to perform and able to achieve high peak signal-to-noise ratio even in high bit error rate channel.
2006, 35(1): 29-31,39.
Abstract:
The propagation characteristics of microwave magnetostatic waves (MSWs) in the magnetic film under arbitrary DC bias field are analyzed. The bandwidth, radiation resistance and insertion loss of magnetostatic forward waves propagated in the YIG film are calculated. It is indicated that under arbitrarily inclined magnetic field the radiation resistance of MSWs propagating in the different direction are not equal, which is obviously different from the case of normal magnetization; and that the insertion loss can be decreased under appropriately inclined bias magnetic field, so that the diffraction effect of guided optical waves in MSW-based Bragg cells is also enhanced.
The propagation characteristics of microwave magnetostatic waves (MSWs) in the magnetic film under arbitrary DC bias field are analyzed. The bandwidth, radiation resistance and insertion loss of magnetostatic forward waves propagated in the YIG film are calculated. It is indicated that under arbitrarily inclined magnetic field the radiation resistance of MSWs propagating in the different direction are not equal, which is obviously different from the case of normal magnetization; and that the insertion loss can be decreased under appropriately inclined bias magnetic field, so that the diffraction effect of guided optical waves in MSW-based Bragg cells is also enhanced.
2006, 35(1): 32-35.
Abstract:
On the basis of 2-phase chaotic coding, a novel useful chaotic encryption method is proposed and is realized on the digital signal processor-TMS320VC5402. The hardware result shows that the effect of limited word length is improved.
On the basis of 2-phase chaotic coding, a novel useful chaotic encryption method is proposed and is realized on the digital signal processor-TMS320VC5402. The hardware result shows that the effect of limited word length is improved.
2006, 35(1): 36-39.
Abstract:
By using double-ridge waveguide, a test method has been proposed for broadband measurement of electromagnetic properties of high-loss dielectric materials. The test system for the measurement of electromagnetic properties is built and calibrated by TRL calibration method. By using three wavebands of double-ridge waveguides, the frequency band can cover 2.0~18.0 GHz. The method features broad frequency band, small volume and high accuracy.
By using double-ridge waveguide, a test method has been proposed for broadband measurement of electromagnetic properties of high-loss dielectric materials. The test system for the measurement of electromagnetic properties is built and calibrated by TRL calibration method. By using three wavebands of double-ridge waveguides, the frequency band can cover 2.0~18.0 GHz. The method features broad frequency band, small volume and high accuracy.
2006, 35(1): 40-42,46.
Abstract:
A method is proposed to realize fast frequency estimation by using signal transform. This method can improve the speed of frequency estimation in digital receivers. Theoretical analyses on the principle, simulation results and the experiment on FPGA are given. The additions are applied instead of the multipliers in this method, so the time of calculating operation is shorter. The Standard Deviation of the method is analyzed and compared with the methods of Prony and FFT, The results show that the method and its performance is better tham other methods is feasible.
A method is proposed to realize fast frequency estimation by using signal transform. This method can improve the speed of frequency estimation in digital receivers. Theoretical analyses on the principle, simulation results and the experiment on FPGA are given. The additions are applied instead of the multipliers in this method, so the time of calculating operation is shorter. The Standard Deviation of the method is analyzed and compared with the methods of Prony and FFT, The results show that the method and its performance is better tham other methods is feasible.
2006, 35(1): 43-46.
Abstract:
The circuit design of the testing experiment of impulse width with electronic control injection engine is considerably complicated. Based on the function and characteristics of simulation soft ware Multisim, a effective approach solving this problem is discussed. In the light of the basal inspecting principles, a reasonable, efficient testing circuit is designed, which produces an accurate and persuasive result. This testing method is proved to act easily and effectively.
The circuit design of the testing experiment of impulse width with electronic control injection engine is considerably complicated. Based on the function and characteristics of simulation soft ware Multisim, a effective approach solving this problem is discussed. In the light of the basal inspecting principles, a reasonable, efficient testing circuit is designed, which produces an accurate and persuasive result. This testing method is proved to act easily and effectively.
2006, 35(1): 47-50.
Abstract:
When sine voltage source u is applied to the proper port of networks, the fundamental harmonic component iS1 of injecting current of networks can be found by fundamental-wave balance principle, The active component of input current is represented by the input conductance Gi. It can be proved that the stability of networks depends on the sgnGi. The Fundamental-wave balance principle can be spread and applied to the third-order nonlinear network. The universality of the conclusion can be spread to mathematics and mechanics science also and give a popular method to solving this third-order nonlinear differential equation qualitatively.
When sine voltage source u is applied to the proper port of networks, the fundamental harmonic component iS1 of injecting current of networks can be found by fundamental-wave balance principle, The active component of input current is represented by the input conductance Gi. It can be proved that the stability of networks depends on the sgnGi. The Fundamental-wave balance principle can be spread and applied to the third-order nonlinear network. The universality of the conclusion can be spread to mathematics and mechanics science also and give a popular method to solving this third-order nonlinear differential equation qualitatively.
2006, 35(1): 51-53,57.
Abstract:
Carnot's Theorem discusses the extreme value of the efficiency of heat engines' cycles. Starting from the graphs of P-V and T-S and the second law of thermodynamics, the extreme value of the efficiency of heat engines in the process of arbitrary cycles is studied. The result shows that the efficiency of the heat engine in Carnot cycle is the greatest of all arbitrary cycles.
Carnot's Theorem discusses the extreme value of the efficiency of heat engines' cycles. Starting from the graphs of P-V and T-S and the second law of thermodynamics, the extreme value of the efficiency of heat engines in the process of arbitrary cycles is studied. The result shows that the efficiency of the heat engine in Carnot cycle is the greatest of all arbitrary cycles.
2006, 35(1): 54-57.
Abstract:
First, this paper provides a formal description of business behavior. Based on the description, the paper provides the business process description method based on ECA rules in detail. As the result, the paper discusses the relationships among the activities of one business behavior and the relationships among the different business behaviors. The result shows that the method can make the description of the business process more clearly and correctly, at the same time, it can enhance the capability of adapting the changes.
First, this paper provides a formal description of business behavior. Based on the description, the paper provides the business process description method based on ECA rules in detail. As the result, the paper discusses the relationships among the activities of one business behavior and the relationships among the different business behaviors. The result shows that the method can make the description of the business process more clearly and correctly, at the same time, it can enhance the capability of adapting the changes.
2006, 35(1): 58-61.
Abstract:
The global stabilization of nonlinear control systems is studied, the state feedback transformations was applied. Ensure the nonlinear control systems are feedback strictly passive Finding out feedback control law, sufficient condition of global asymptotic stabilization for the nonlinear systems are given, an example is given to illustrate of the results show the application of results.
The global stabilization of nonlinear control systems is studied, the state feedback transformations was applied. Ensure the nonlinear control systems are feedback strictly passive Finding out feedback control law, sufficient condition of global asymptotic stabilization for the nonlinear systems are given, an example is given to illustrate of the results show the application of results.
2006, 35(1): 62-65.
Abstract:
A new dynamic task scheduling algorithm for distributed measurement and control system is proposed based on multi-agent. This algorithm adopts the receive-initiated scheduling strategy and dynamically migrates tasks according to the current status of load on each node. So the algorithm can promote system efficiency and attain load balancing. The tasks is migrated with mobile agent in order to decrease network transmission and save time effectively.
A new dynamic task scheduling algorithm for distributed measurement and control system is proposed based on multi-agent. This algorithm adopts the receive-initiated scheduling strategy and dynamically migrates tasks according to the current status of load on each node. So the algorithm can promote system efficiency and attain load balancing. The tasks is migrated with mobile agent in order to decrease network transmission and save time effectively.
2006, 35(1): 66-69.
Abstract:
A neural network architecture, K-subspaces and time-delay auto-associators, is proposed for phoneme recognition. It extends the phoneme filter neural networks approach by adding linear auto-associators to create p-dimension subspace, and an iteration is employed to improve the decision. It is good to capture the time-sequence information in speech signal. The architecture proposed could provide a high recognition performance without traditional neural network's shortcoming. Some recognition simulations for both English and Chinese phonemes are conducted, and the recognition rate is 84.38% which is better than phoneme filter neural networks approach.
A neural network architecture, K-subspaces and time-delay auto-associators, is proposed for phoneme recognition. It extends the phoneme filter neural networks approach by adding linear auto-associators to create p-dimension subspace, and an iteration is employed to improve the decision. It is good to capture the time-sequence information in speech signal. The architecture proposed could provide a high recognition performance without traditional neural network's shortcoming. Some recognition simulations for both English and Chinese phonemes are conducted, and the recognition rate is 84.38% which is better than phoneme filter neural networks approach.
2006, 35(1): 70-72.
Abstract:
Clustering results often depend on density and similarity critically, and its complexity often changes along with the augment of sample dimensionality. This paper refers to classical shared nearest neighbor clustering algorithm (SNN) and refined shared nearest neighbor clustering algorithm (RSNN). By applying this RSNN algorithm on freeway traffic data set, we settled several problems existed in SNN algorithm, such as outliers, statistic, core points, computation complexity and so on. Experiment results prove that this refined algorithm has better clustering results on multi-dimensional data set than SNN algorithm.
Clustering results often depend on density and similarity critically, and its complexity often changes along with the augment of sample dimensionality. This paper refers to classical shared nearest neighbor clustering algorithm (SNN) and refined shared nearest neighbor clustering algorithm (RSNN). By applying this RSNN algorithm on freeway traffic data set, we settled several problems existed in SNN algorithm, such as outliers, statistic, core points, computation complexity and so on. Experiment results prove that this refined algorithm has better clustering results on multi-dimensional data set than SNN algorithm.
2006, 35(1): 73-76.
Abstract:
SAS(Single Access System) is studied based on the PKI (Public Key Infrastructure) model and PMI (Privilege Management Infrastructure) model. The PKI and PMI can provide functions of authentication and authority in the SAS. The way to implement the authority and authentication using middleware as well as related secure protocol is discussed. The security of the system's architecture is also analyzed. These models enable a secure, transparent SAS with least modification to current applications.
SAS(Single Access System) is studied based on the PKI (Public Key Infrastructure) model and PMI (Privilege Management Infrastructure) model. The PKI and PMI can provide functions of authentication and authority in the SAS. The way to implement the authority and authentication using middleware as well as related secure protocol is discussed. The security of the system's architecture is also analyzed. These models enable a secure, transparent SAS with least modification to current applications.
2006, 35(1): 77-80,92.
Abstract:
Multi-Protocol Label Switching(MPLS) has been applied to realize virtual private networks(VPN). This paper introduces a command configure of multi-protocal labe switching VPN. This kind of technology can construct the bandwidth of Internet & Intranet and satisfy every profession and trade.
Multi-Protocol Label Switching(MPLS) has been applied to realize virtual private networks(VPN). This paper introduces a command configure of multi-protocal labe switching VPN. This kind of technology can construct the bandwidth of Internet & Intranet and satisfy every profession and trade.
2006, 35(1): 81-84.
Abstract:
According to the standard and technology of internet host identifying and access controlling and to the strategy of the next generation internet real-name identifying, a host real-name architecture based on the HIP protocol is proposed for implementing peer-to-peer identity trusting, global access controlling and authorizing in the next generation internet, and preventing anonymous and arbitrary network access.
According to the standard and technology of internet host identifying and access controlling and to the strategy of the next generation internet real-name identifying, a host real-name architecture based on the HIP protocol is proposed for implementing peer-to-peer identity trusting, global access controlling and authorizing in the next generation internet, and preventing anonymous and arbitrary network access.
2006, 35(1): 85-88.
Abstract:
Realtime Traffic Flow Measurement (RTFM) system architecture RFC2722 is described based on the concept of flow. The relations among elements RTFM system are also discussed. Based on RTFM, resource policy service component maintaining the consistency of system resource is introduced. The cooperating relations between each element are defined on the measurement object. Consequently, a distributed traffic flow measurement system architecture that adapt to Internet traffic management is given and the implementation of prototype system is discussed.
Realtime Traffic Flow Measurement (RTFM) system architecture RFC2722 is described based on the concept of flow. The relations among elements RTFM system are also discussed. Based on RTFM, resource policy service component maintaining the consistency of system resource is introduced. The cooperating relations between each element are defined on the measurement object. Consequently, a distributed traffic flow measurement system architecture that adapt to Internet traffic management is given and the implementation of prototype system is discussed.
2006, 35(1): 89-92.
Abstract:
The network capacity is defined as the value of the maximum s-t flow, and a unified model is introduced for the network capacity expansion with the time and cost constraints. By the transformation of the underlying network, the network capacity is converted to a minimum cost flow problem instead. Also developed are the algorithm to find all pareto optimal solutions about time and cost with given expanded network max-flow. The model and algorithm are proven to be valid with an example, and they not only allow capturing various types of capacity expansion, but also are useful in network programming.
The network capacity is defined as the value of the maximum s-t flow, and a unified model is introduced for the network capacity expansion with the time and cost constraints. By the transformation of the underlying network, the network capacity is converted to a minimum cost flow problem instead. Also developed are the algorithm to find all pareto optimal solutions about time and cost with given expanded network max-flow. The model and algorithm are proven to be valid with an example, and they not only allow capturing various types of capacity expansion, but also are useful in network programming.
2006, 35(1): 93-95,99.
Abstract:
The feasibility of applying artificial immune theory in intrusion detection system is Analyzed, establishes a model combining artificial immune theory and data mining technique is estoblished. Based on the statistical theory, the amount of information that is lost by splitting a data stream into unordered strings can be estimated, and this estimate can be used to guide the choice of string length. Based on information-theory, a lower bound on the size of the detector set is derived. Detector Generating algorithm is described. The performance of Artificial Immune Intrusion Detection System (AⅡDS) is better than the normal intrusion detection system based on knowledge engineering.
The feasibility of applying artificial immune theory in intrusion detection system is Analyzed, establishes a model combining artificial immune theory and data mining technique is estoblished. Based on the statistical theory, the amount of information that is lost by splitting a data stream into unordered strings can be estimated, and this estimate can be used to guide the choice of string length. Based on information-theory, a lower bound on the size of the detector set is derived. Detector Generating algorithm is described. The performance of Artificial Immune Intrusion Detection System (AⅡDS) is better than the normal intrusion detection system based on knowledge engineering.
2006, 35(1): 96-99.
Abstract:
Through the analysis of FDRs data relative to the risk of controlled flight to terrain (CFIT), the framework of a quantified model to assessment CFIT risk based on FDR data is introduced. It is a computer model that uses the both exceeding data from the FDRs and knowledge based rules from safety experts to quantify the risk of an incident and/or accident by risk indicators. The mathematics definition of the risk indicator and its computing method are given.
Through the analysis of FDRs data relative to the risk of controlled flight to terrain (CFIT), the framework of a quantified model to assessment CFIT risk based on FDR data is introduced. It is a computer model that uses the both exceeding data from the FDRs and knowledge based rules from safety experts to quantify the risk of an incident and/or accident by risk indicators. The mathematics definition of the risk indicator and its computing method are given.
2006, 35(1): 100-103.
Abstract:
An extensible data cleaning software platform is proposed, which has open rules library and algorithms library. Rules library is used to store rules and algorithms library is used to store algorithms. Algorithms library has many algorithms and can be extended. Through defining rules in rules library and choosing proper cleaning algorithms from algorithms library, the software platform can be used to various data sources, which makes it universal and adaptive. The synthetic result is improved through data cleaning with many algorithms. Finally, the effect and feasibility of this extensible data cleaning software platform is proved through an example.
An extensible data cleaning software platform is proposed, which has open rules library and algorithms library. Rules library is used to store rules and algorithms library is used to store algorithms. Algorithms library has many algorithms and can be extended. Through defining rules in rules library and choosing proper cleaning algorithms from algorithms library, the software platform can be used to various data sources, which makes it universal and adaptive. The synthetic result is improved through data cleaning with many algorithms. Finally, the effect and feasibility of this extensible data cleaning software platform is proved through an example.
2006, 35(1): 104-107.
Abstract:
A formal description of business behavior is provided. Based on the description, the paper provides the business process description method based on ECA rules in detail. As the result, the paper discusses the relationships among the activities of one business behavior and the relationships among the different business behaviors. The result shows that the method can make the description of the business process more clearly and correctly, at the same time, it can enhance the capability of adapting the changes.
A formal description of business behavior is provided. Based on the description, the paper provides the business process description method based on ECA rules in detail. As the result, the paper discusses the relationships among the activities of one business behavior and the relationships among the different business behaviors. The result shows that the method can make the description of the business process more clearly and correctly, at the same time, it can enhance the capability of adapting the changes.
2006, 35(1): 108-110,136.
Abstract:
An intrusion detection method based on rough set is proposed in order to overcome poor generalizing ability of current intrusion detection system in the case of less prior knowledge. According to rough set a detection model is built based on short call sequence and used to detec call sequences of sendmail program.The experimental proves that better detecting result can be obtained while less normal and abnormal information is needed.
An intrusion detection method based on rough set is proposed in order to overcome poor generalizing ability of current intrusion detection system in the case of less prior knowledge. According to rough set a detection model is built based on short call sequence and used to detec call sequences of sendmail program.The experimental proves that better detecting result can be obtained while less normal and abnormal information is needed.
2006, 35(1): 111-114.
Abstract:
To buildup the safety of real time operating system, after status quo of existing scheduling mechanism analyzed, brought forward a kind of novel safety scheduling mechanism based on Maximum Criticality First (MCF). MCF is a hybrid priorities real time scheduling algorithm which consisting of three parts, the first two parts are the assignment of the importance and user priority, which is done statically, the second part is the assignment of the dynamic priority based on minimum laxity first scheduling algorithm. MCF synthesizes the strongpoint of the fixed priority scheduling algorithm and the dynamic priority scheduling algorithm. By this way, MCF not only takes full advantage of resources such as CPU, also make critical task not suffer from other non critical tasks at transient overload. The safety of real time operating system is improved with MCF.
To buildup the safety of real time operating system, after status quo of existing scheduling mechanism analyzed, brought forward a kind of novel safety scheduling mechanism based on Maximum Criticality First (MCF). MCF is a hybrid priorities real time scheduling algorithm which consisting of three parts, the first two parts are the assignment of the importance and user priority, which is done statically, the second part is the assignment of the dynamic priority based on minimum laxity first scheduling algorithm. MCF synthesizes the strongpoint of the fixed priority scheduling algorithm and the dynamic priority scheduling algorithm. By this way, MCF not only takes full advantage of resources such as CPU, also make critical task not suffer from other non critical tasks at transient overload. The safety of real time operating system is improved with MCF.
2006, 35(1): 115-117.
Abstract:
For the output mode of speech synthesis which has been come true by using traditional D/A method, there is a lot of disadvantages, such as high discrete integrate resistance, nonlinear switching, high power dissipation. We propose a new method based on the theory of pulse width modulation (PWM), which convert directly the digital speech signal to the pulse width modulation wave and become analog speech signal by passing low-pass filter. Comparing with the traditional D/A method, the new method has the advantages of low power dissipation, high technique adaptability and high designing reliability. It has been applied in the chips of speech synthesis successfully.
For the output mode of speech synthesis which has been come true by using traditional D/A method, there is a lot of disadvantages, such as high discrete integrate resistance, nonlinear switching, high power dissipation. We propose a new method based on the theory of pulse width modulation (PWM), which convert directly the digital speech signal to the pulse width modulation wave and become analog speech signal by passing low-pass filter. Comparing with the traditional D/A method, the new method has the advantages of low power dissipation, high technique adaptability and high designing reliability. It has been applied in the chips of speech synthesis successfully.
2006, 35(1): 118-121.
Abstract:
The phase resetting from pre-stimulus to post-stimulus alpha wave (8~13 Hz) in eight healthy subjects is studied. The six parameters of single trail alpha wave are computed and analyzed:pre-stimulus amplitude and phase angle, post-stimulus amplitude and latency of first positive and negative peak. The amplitude relationship between pre-and two post-stimuli can be described by a cubic polynomial model. By using the method of outlying cases test in linear regression, we can quantitatively analyze the degree of phase resetting. The results demonstrate that there is partial phase resetting from pre-to post-stimuli in the band of alpha wave.
The phase resetting from pre-stimulus to post-stimulus alpha wave (8~13 Hz) in eight healthy subjects is studied. The six parameters of single trail alpha wave are computed and analyzed:pre-stimulus amplitude and phase angle, post-stimulus amplitude and latency of first positive and negative peak. The amplitude relationship between pre-and two post-stimuli can be described by a cubic polynomial model. By using the method of outlying cases test in linear regression, we can quantitatively analyze the degree of phase resetting. The results demonstrate that there is partial phase resetting from pre-to post-stimuli in the band of alpha wave.
2006, 35(1): 122-125.
Abstract:
The behavior of creature of nature is complicated and random, especially bee, a kind of colonial creature. However, the complicated structure of bee colony is generated by the interaction of single behavior of bee. By the research of the artificial life theory and some outstanding feature, the graphic VB program simulates the behavior of bee's collecting pollen. The program only simulates the behavior of individual bee's collecting pollen, but achieves the integral behavior of bee colony. Our research shows the important feature-Emergence-of the artificial life, that is, emergence.
The behavior of creature of nature is complicated and random, especially bee, a kind of colonial creature. However, the complicated structure of bee colony is generated by the interaction of single behavior of bee. By the research of the artificial life theory and some outstanding feature, the graphic VB program simulates the behavior of bee's collecting pollen. The program only simulates the behavior of individual bee's collecting pollen, but achieves the integral behavior of bee colony. Our research shows the important feature-Emergence-of the artificial life, that is, emergence.
2006, 35(1): 126-129.
Abstract:
The output signal of the PWM BUCK converter under different circuit parameters has been analyzed. The Fourier descriptor method to extract output signals characteristics is put forward to identify and classify the behavior of the DC-DC converter. This method shows a way to watch and control DC-DC converter intelligently by using neural network.
The output signal of the PWM BUCK converter under different circuit parameters has been analyzed. The Fourier descriptor method to extract output signals characteristics is put forward to identify and classify the behavior of the DC-DC converter. This method shows a way to watch and control DC-DC converter intelligently by using neural network.
2006, 35(1): 130-132.
Abstract:
A generating operator of 4n-2 order evolution equation is obtained and this operator generates a semigroup when 4n-2 order evolution equation is changed into one order evolution equation set. The unitary semigroups which are generated by generating operator of 4n-2 order evolution equation is discussed. The unitary semigroups (n>1) are proven true when they append an equal yoke operator norm. In particular, the semigroup (n=1) is called Golstein's unitary and a more simply probative method to Ref.[3] by semiring is offered.
A generating operator of 4n-2 order evolution equation is obtained and this operator generates a semigroup when 4n-2 order evolution equation is changed into one order evolution equation set. The unitary semigroups which are generated by generating operator of 4n-2 order evolution equation is discussed. The unitary semigroups (n>1) are proven true when they append an equal yoke operator norm. In particular, the semigroup (n=1) is called Golstein's unitary and a more simply probative method to Ref.[3] by semiring is offered.
2006, 35(1): 133-136.
Abstract:
For solving the linear system with the iterative method, it is very important to estimate the spectral radius of the iterative matrices. In this paper we present an estimate for bounds of module of eigenvalues of the iteration matrix M-1 N for a kind of Baily-Crabtree diagonally dominant matrix M. Then, under a certain condition, the estimate for bounds of the module of eigenvalues of M-1 N is presented when M is a α -strictly diagonally dominant matrix. Numerical examples for illustrating validity of results are presented.
For solving the linear system with the iterative method, it is very important to estimate the spectral radius of the iterative matrices. In this paper we present an estimate for bounds of module of eigenvalues of the iteration matrix M-1 N for a kind of Baily-Crabtree diagonally dominant matrix M. Then, under a certain condition, the estimate for bounds of the module of eigenvalues of M-1 N is presented when M is a α -strictly diagonally dominant matrix. Numerical examples for illustrating validity of results are presented.
2006, 35(1): 137-139.
Abstract:
A parametric programming based on interval number is proposed for the uncertainty risk and return. By selecting the risk parameters,commercial banks can get the optimum solution under the equilibrium of risk and return and can obtain the maximum return when risk is fixed. An example shows that the method is quite fit for credit risk management of commercial banks.
A parametric programming based on interval number is proposed for the uncertainty risk and return. By selecting the risk parameters,commercial banks can get the optimum solution under the equilibrium of risk and return and can obtain the maximum return when risk is fixed. An example shows that the method is quite fit for credit risk management of commercial banks.
2006, 35(1): 140-143.
Abstract:
The concept free cash flow has put forward and brought to bear in practice for decade, but it has not received enough attention from financial theory and practice finance. The paper gives on the main line of modern financial operating system on free cash flow, and makes the next step pick up the particular thought about financial management serving for the maximal corporation value. Basing on adjusting financial statement analysis and basic financial ratio, the author proposes the method the corporation value evaluation based on handhold computing Free Cash Flow.
The concept free cash flow has put forward and brought to bear in practice for decade, but it has not received enough attention from financial theory and practice finance. The paper gives on the main line of modern financial operating system on free cash flow, and makes the next step pick up the particular thought about financial management serving for the maximal corporation value. Basing on adjusting financial statement analysis and basic financial ratio, the author proposes the method the corporation value evaluation based on handhold computing Free Cash Flow.