2006 Vol. 35, No. 1

Global Prediction of the Frequency Hopping for a Radio Set Based on Continued Fractions
ZHANG Sen, XIAO Xian-ci
2006, 35(1): 1-4.
Abstract:
After developing the polynomial approximation method to the rational-fraction approximation's in theory, a non-linear predictable global model for the system of a radio set is built based on the continued-fraction approximation and the phase-space reconfiguration while the dynamic model can't be known for the system of a radio set. We can analyze the characteristic and gain the prediction of frequency hopping by substituting the model for the equation of frequency hopping code. The results of theoretic analysis and computer simulation have proved this method is practically feasible. We can predict it accurately comparatively and get an explicit expression.
An Improved Step-Transform Algorithm for High Squint SAR Processing
XU San-yuan, WANG Jian-guo
2006, 35(1): 5-8.
Abstract:
An improved step-transform algrithm is proposed for high squint mode synthetic aperture radar(SAR). It uses different chirp rates to deramp the signal in different subapertures to alleviate the varying of chirp rate with the azimuth time, and to accurately select data from the coarse-resolution FFT output by approximate interpolation in frequency-domain and to remove the tight constrains for the parameter in time-varying step-transform. The performance of the algorithm is efficient in high squint mode.
Jamming Simulation for Inverse Synthetic Aperture Radar
LI Yuan, Liu Jian-xin, CAI Ying-wu
2006, 35(1): 9-12.
Abstract:
Through motion compensation of Inverse Synthetic Aperture Radar(ISAR), the jamming mechanism of ISAR is analyzed and simulated. The results show the imaging of ISAR will be distorted effectively if the maximum value of the complex envelope correlation function of neighbor range images is false alarm. Furthermore, the comparison of anti-jamming ability among ISAR, SAR and linear frequency-modulated radar shows that the anti-jamming ability of ISAR is worse because it needs motion compensation before imaging.
Relationship between Scale and Wavelength in Wavelet Transform Analysis
TANG Han-jie, YUAN Xiao
2006, 35(1): 13-16.
Abstract:
The relationship between scale and wavelength in wavelet transform analysis of data series is proposed. Firstly,the feature of wavelet analysis, the different definition of wavelet transform and their Fourier transform are given, then the general formula of the relationship between scale and wavelength is deduced from the property of wavelet transform. An illustrative example of Morlet wavelet is presented and the simulation results show the effectiveness of the proposed formula. Finally, the formulas of some commonly used wavelets are given.
Two Aircraft TDOA/DD Passive Localization
LU An-nan
2006, 35(1): 17-20.
Abstract:
A stationary electronic emitter can be located by two aircraft from Time Difference Of Arrival (TDOA) and Differential Doppler(DD) measurements. The algorithm and error analytic expression of localization are given. Several curves of constant TDOA and DD are shown. The comparison of localization based on TDOA and DD is presented. The result indicates the previous approach performance is better.
Realization and Improvement of Low-Rate Video Coding Standard-H.26L
KONG Lei, TIAN Ron-gen, LIU Zhao
2006, 35(1): 21-24.
Abstract:
An improved algrothm based on H.26L video coding standard is proposed. Superior serching method and bi-directional interpolation method are adopted to enhence image reconstruction quality. By make using of MB spatial relativity, the quantified block can be judged whether it can be combined before coding. Experimental results shows that the proposed algorithm is very efficient in terms of the image compressibility.
Progressive Image Transmission Using RCPT Codes
WANG Hong-xing, ZHANG Yong, SUN Hai-zhen
2006, 35(1): 25-28.
Abstract:
The bit stream from the set partitioning in hierarchical trees coder is divided into packets, which are protected by RCPT codes of different error-correcting capability before transmission according to their effect to the reconstruction of image. The genetic algorithms are developed for selecting optimal RCPT codes rates from the finite rates set in order to minimize the end-to-end distortion. The time for searching the optimal rate set is reduced when using the channel code rates for equal error protection as the initial condition of the genetic algorithms. Simulation results in binary symmetric channel show that this transmission scheme for progressive image is easy to perform and able to achieve high peak signal-to-noise ratio even in high bit error rate channel.
Propagation Characteristics of Magnetostatic Waves Under Arbitrary Bias Magnetic Fields
WU Bao-jian
2006, 35(1): 29-31,39.
Abstract:
The propagation characteristics of microwave magnetostatic waves (MSWs) in the magnetic film under arbitrary DC bias field are analyzed. The bandwidth, radiation resistance and insertion loss of magnetostatic forward waves propagated in the YIG film are calculated. It is indicated that under arbitrarily inclined magnetic field the radiation resistance of MSWs propagating in the different direction are not equal, which is obviously different from the case of normal magnetization; and that the insertion loss can be decreased under appropriately inclined bias magnetic field, so that the diffraction effect of guided optical waves in MSW-based Bragg cells is also enhanced.
A Hardware-Realized Method of Chaotic Encryption
CHEN Bin, LIU Guang-hu, ZHANG Yong, ZHOU Zheng-ou
2006, 35(1): 32-35.
Abstract:
On the basis of 2-phase chaotic coding, a novel useful chaotic encryption method is proposed and is realized on the digital signal processor-TMS320VC5402. The hardware result shows that the effect of limited word length is improved.
Broadband Measurement of Electromagnetic Properties Using Double-Ridge Waveguide
LI En, XIANG Zhi-jun, GUO Gao-feng, ZHANG Qi-shao
2006, 35(1): 36-39.
Abstract:
By using double-ridge waveguide, a test method has been proposed for broadband measurement of electromagnetic properties of high-loss dielectric materials. The test system for the measurement of electromagnetic properties is built and calibrated by TRL calibration method. By using three wavebands of double-ridge waveguides, the frequency band can cover 2.0~18.0 GHz. The method features broad frequency band, small volume and high accuracy.
A Fast Frequency Estimation Method
ZHONG Hong-sheng, ZHOU Guo-yong, XIAO Xian-ci
2006, 35(1): 40-42,46.
Abstract:
A method is proposed to realize fast frequency estimation by using signal transform. This method can improve the speed of frequency estimation in digital receivers. Theoretical analyses on the principle, simulation results and the experiment on FPGA are given. The additions are applied instead of the multipliers in this method, so the time of calculating operation is shorter. The Standard Deviation of the method is analyzed and compared with the methods of Prony and FFT, The results show that the method and its performance is better tham other methods is feasible.
An Application of Multisim to the Testing Experiment of Impulse Width with Electronic Control Injection Engine
FU Xiao-lin, YANG Zhi-gang, WANG Xing-jia
2006, 35(1): 43-46.
Abstract:
The circuit design of the testing experiment of impulse width with electronic control injection engine is considerably complicated. Based on the function and characteristics of simulation soft ware Multisim, a effective approach solving this problem is discussed. In the light of the basal inspecting principles, a reasonable, efficient testing circuit is designed, which produces an accurate and persuasive result. This testing method is proved to act easily and effectively.
Fundamental Wave Analysis of Oscillation and Stability for Electronic Networks
HUANG Bing-hua, HUANG Xin-ming, ZHANG Chi
2006, 35(1): 47-50.
Abstract:
When sine voltage source u is applied to the proper port of networks, the fundamental harmonic component iS1 of injecting current of networks can be found by fundamental-wave balance principle, The active component of input current is represented by the input conductance Gi. It can be proved that the stability of networks depends on the sgnGi. The Fundamental-wave balance principle can be spread and applied to the third-order nonlinear network. The universality of the conclusion can be spread to mathematics and mechanics science also and give a popular method to solving this third-order nonlinear differential equation qualitatively.
Study of the Extreme Value of the Efficiency of Heat Engines in the Process of Arbitrary Cycles
SU Wan-chun
2006, 35(1): 51-53,57.
Abstract:
Carnot's Theorem discusses the extreme value of the efficiency of heat engines' cycles. Starting from the graphs of P-V and T-S and the second law of thermodynamics, the extreme value of the efficiency of heat engines in the process of arbitrary cycles is studied. The result shows that the efficiency of the heat engine in Carnot cycle is the greatest of all arbitrary cycles.
First-Order D-Type Iterative Learning Control for Systems with Unknown Relative Degree
SONG Zhao-qing, ZHAO Guo-rong, LU Jian-hua
2006, 35(1): 54-57.
Abstract:
First, this paper provides a formal description of business behavior. Based on the description, the paper provides the business process description method based on ECA rules in detail. As the result, the paper discusses the relationships among the activities of one business behavior and the relationships among the different business behaviors. The result shows that the method can make the description of the business process more clearly and correctly, at the same time, it can enhance the capability of adapting the changes.
Global Stabilization of Nonlinear Control Systems
WANG Lian-gui, TIAN Tai-xin
2006, 35(1): 58-61.
Abstract:
The global stabilization of nonlinear control systems is studied, the state feedback transformations was applied. Ensure the nonlinear control systems are feedback strictly passive Finding out feedback control law, sufficient condition of global asymptotic stabilization for the nonlinear systems are given, an example is given to illustrate of the results show the application of results.
A Multi-Agent-Based Task Scheduling Algorithm for Distributed Measurement and Control System
YAN Jun-hua, ZHANG Huan-chun, JING Ya-zhi
2006, 35(1): 62-65.
Abstract:
A new dynamic task scheduling algorithm for distributed measurement and control system is proposed based on multi-agent. This algorithm adopts the receive-initiated scheduling strategy and dynamically migrates tasks according to the current status of load on each node. So the algorithm can promote system efficiency and attain load balancing. The tasks is migrated with mobile agent in order to decrease network transmission and save time effectively.
English and Chinese Phonemes Recognition Using K-Subspaces and Time-Delay Auto-Associators
LUO Wan-bo, LUO Xiao-lan, CHEN Wei, PENG Jian, WU Duan-pei
2006, 35(1): 66-69.
Abstract:
A neural network architecture, K-subspaces and time-delay auto-associators, is proposed for phoneme recognition. It extends the phoneme filter neural networks approach by adding linear auto-associators to create p-dimension subspace, and an iteration is employed to improve the decision. It is good to capture the time-sequence information in speech signal. The architecture proposed could provide a high recognition performance without traditional neural network's shortcoming. Some recognition simulations for both English and Chinese phonemes are conducted, and the recognition rate is 84.38% which is better than phoneme filter neural networks approach.
Refined Shared Nearest Neighbor Clustering Algorithm
GENG Ji, YIN Jian
2006, 35(1): 70-72.
Abstract:
Clustering results often depend on density and similarity critically, and its complexity often changes along with the augment of sample dimensionality. This paper refers to classical shared nearest neighbor clustering algorithm (SNN) and refined shared nearest neighbor clustering algorithm (RSNN). By applying this RSNN algorithm on freeway traffic data set, we settled several problems existed in SNN algorithm, such as outliers, statistic, core points, computation complexity and so on. Experiment results prove that this refined algorithm has better clustering results on multi-dimensional data set than SNN algorithm.
Single Access System Based on Certificate
XIE Hong-bo, FENG Jun, ZHOU Ming-tian
2006, 35(1): 73-76.
Abstract:
SAS(Single Access System) is studied based on the PKI (Public Key Infrastructure) model and PMI (Privilege Management Infrastructure) model. The PKI and PMI can provide functions of authentication and authority in the SAS. The way to implement the authority and authentication using middleware as well as related secure protocol is discussed. The security of the system's architecture is also analyzed. These models enable a secure, transparent SAS with least modification to current applications.
Research for Application of Multi-Protocol Exchange on Virtual Dedicated Network
ZHAO Ming-sheng, LI Ai-mei
2006, 35(1): 77-80,92.
Abstract:
Multi-Protocol Label Switching(MPLS) has been applied to realize virtual private networks(VPN). This paper introduces a command configure of multi-protocal labe switching VPN. This kind of technology can construct the bandwidth of Internet & Intranet and satisfy every profession and trade.
Study on Real-Name Access Mechanism in the Next Generation Internet
WANG Wen-Yong, HUANG Li-Sheng
2006, 35(1): 81-84.
Abstract:
According to the standard and technology of internet host identifying and access controlling and to the strategy of the next generation internet real-name identifying, a host real-name architecture based on the HIP protocol is proposed for implementing peer-to-peer identity trusting, global access controlling and authorizing in the next generation internet, and preventing anonymous and arbitrary network access.
Research on the Real Time Traffic Flow Measurement System
ZHANG Rui, CHEN Ming, SONG Li-hua
2006, 35(1): 85-88.
Abstract:
Realtime Traffic Flow Measurement (RTFM) system architecture RFC2722 is described based on the concept of flow. The relations among elements RTFM system are also discussed. Based on RTFM, resource policy service component maintaining the consistency of system resource is introduced. The cooperating relations between each element are defined on the measurement object. Consequently, a distributed traffic flow measurement system architecture that adapt to Internet traffic management is given and the implementation of prototype system is discussed.
Research on Network Max-flow Pareto Expansion Problem
ZHANG Gang-ting, JIANG Xiao-bing, WANG Shu-zhen
2006, 35(1): 89-92.
Abstract:
The network capacity is defined as the value of the maximum s-t flow, and a unified model is introduced for the network capacity expansion with the time and cost constraints. By the transformation of the underlying network, the network capacity is converted to a minimum cost flow problem instead. Also developed are the algorithm to find all pareto optimal solutions about time and cost with given expanded network max-flow. The model and algorithm are proven to be valid with an example, and they not only allow capturing various types of capacity expansion, but also are useful in network programming.
Research on a Novel Intrusion Detection System Based on Artificial Immune Theory
HUANG Jun-cai, WANG Feng-bi, LUO Xun, SHE Kun, ZHOU Ming-tian
2006, 35(1): 93-95,99.
Abstract:
The feasibility of applying artificial immune theory in intrusion detection system is Analyzed, establishes a model combining artificial immune theory and data mining technique is estoblished. Based on the statistical theory, the amount of information that is lost by splitting a data stream into unordered strings can be estimated, and this estimate can be used to guide the choice of string length. Based on information-theory, a lower bound on the size of the detector set is derived. Detector Generating algorithm is described. The performance of Artificial Immune Intrusion Detection System (AⅡDS) is better than the normal intrusion detection system based on knowledge engineering.
A Quantified Flight Risk Assessment Model Based on FDR
LIU Xiao-dong, HE Yuan-qing, Dcboeach Fels
2006, 35(1): 96-99.
Abstract:
Through the analysis of FDRs data relative to the risk of controlled flight to terrain (CFIT), the framework of a quantified model to assessment CFIT risk based on FDR data is introduced. It is a computer model that uses the both exceeding data from the FDRs and knowledge based rules from safety experts to quantify the risk of an incident and/or accident by risk indicators. The mathematics definition of the risk indicator and its computing method are given.
Study on the Extensible Data Cleaning Software Platform
CHEN Wei, DING Qiu-lin
2006, 35(1): 100-103.
Abstract:
An extensible data cleaning software platform is proposed, which has open rules library and algorithms library. Rules library is used to store rules and algorithms library is used to store algorithms. Algorithms library has many algorithms and can be extended. Through defining rules in rules library and choosing proper cleaning algorithms from algorithms library, the software platform can be used to various data sources, which makes it universal and adaptive. The synthetic result is improved through data cleaning with many algorithms. Finally, the effect and feasibility of this extensible data cleaning software platform is proved through an example.
Business Process Description Method Based on ECA Rules
WANG Cong, WANG Zhi-xue, JIANG Guang-jie
2006, 35(1): 104-107.
Abstract:
A formal description of business behavior is provided. Based on the description, the paper provides the business process description method based on ECA rules in detail. As the result, the paper discusses the relationships among the activities of one business behavior and the relationships among the different business behaviors. The result shows that the method can make the description of the business process more clearly and correctly, at the same time, it can enhance the capability of adapting the changes.
Research of Intrusion Detection Method Based on Rough Set
PENG Hong
2006, 35(1): 108-110,136.
Abstract:
An intrusion detection method based on rough set is proposed in order to overcome poor generalizing ability of current intrusion detection system in the case of less prior knowledge. According to rough set a detection model is built based on short call sequence and used to detec call sequences of sendmail program.The experimental proves that better detecting result can be obtained while less normal and abnormal information is needed.
A Safety Scheduling Mechanism of High Assurance Real Time Operating System
YANG Shi-ping, SANG Nan, XIONG Guang-ze, LIU Xiao-shi
2006, 35(1): 111-114.
Abstract:
To buildup the safety of real time operating system, after status quo of existing scheduling mechanism analyzed, brought forward a kind of novel safety scheduling mechanism based on Maximum Criticality First (MCF). MCF is a hybrid priorities real time scheduling algorithm which consisting of three parts, the first two parts are the assignment of the importance and user priority, which is done statically, the second part is the assignment of the dynamic priority based on minimum laxity first scheduling algorithm. MCF synthesizes the strongpoint of the fixed priority scheduling algorithm and the dynamic priority scheduling algorithm. By this way, MCF not only takes full advantage of resources such as CPU, also make critical task not suffer from other non critical tasks at transient overload. The safety of real time operating system is improved with MCF.
Application of PWM in Synthetical Speech Output Circuit
GAO Zheng-ping, XU Jun-yu, HUANG Han-hui
2006, 35(1): 115-117.
Abstract:
For the output mode of speech synthesis which has been come true by using traditional D/A method, there is a lot of disadvantages, such as high discrete integrate resistance, nonlinear switching, high power dissipation. We propose a new method based on the theory of pulse width modulation (PWM), which convert directly the digital speech signal to the pulse width modulation wave and become analog speech signal by passing low-pass filter. Comparing with the traditional D/A method, the new method has the advantages of low power dissipation, high technique adaptability and high designing reliability. It has been applied in the chips of speech synthesis successfully.
A Study of the Phase Resetting from Ongoing EEG to Single Trial EPs of Alpha Wave
LI Ling, YAO De-zhong, LIU Tie-jun, ZHAO Li-na
2006, 35(1): 118-121.
Abstract:
The phase resetting from pre-stimulus to post-stimulus alpha wave (8~13 Hz) in eight healthy subjects is studied. The six parameters of single trail alpha wave are computed and analyzed:pre-stimulus amplitude and phase angle, post-stimulus amplitude and latency of first positive and negative peak. The amplitude relationship between pre-and two post-stimuli can be described by a cubic polynomial model. By using the method of outlying cases test in linear regression, we can quantitatively analyze the degree of phase resetting. The results demonstrate that there is partial phase resetting from pre-to post-stimuli in the band of alpha wave.
Simulation the Behavior of Bees' Collecting Pollen with the Method of the Artificial Life
NI Xia, WU Bin
2006, 35(1): 122-125.
Abstract:
The behavior of creature of nature is complicated and random, especially bee, a kind of colonial creature. However, the complicated structure of bee colony is generated by the interaction of single behavior of bee. By the research of the artificial life theory and some outstanding feature, the graphic VB program simulates the behavior of bee's collecting pollen. The program only simulates the behavior of individual bee's collecting pollen, but achieves the integral behavior of bee colony. Our research shows the important feature-Emergence-of the artificial life, that is, emergence.
Extraction of Signal Characteristics of DC-DC Converter Based on Fourier Descriptor
ZHONG Jie, YU Sheng-lin, LIU Shou-sheng
2006, 35(1): 126-129.
Abstract:
The output signal of the PWM BUCK converter under different circuit parameters has been analyzed. The Fourier descriptor method to extract output signals characteristics is put forward to identify and classify the behavior of the DC-DC converter. This method shows a way to watch and control DC-DC converter intelligently by using neural network.
Unitary-Semigroups of 4n-2 Order Evolution Equation
ZHANG Li-xun, LIU Yong-zhi, OU Zhong-hua, DAI Zhi-yong, PENG Zeng-shou
2006, 35(1): 130-132.
Abstract:
A generating operator of 4n-2 order evolution equation is obtained and this operator generates a semigroup when 4n-2 order evolution equation is changed into one order evolution equation set. The unitary semigroups which are generated by generating operator of 4n-2 order evolution equation is discussed. The unitary semigroups (n>1) are proven true when they append an equal yoke operator norm. In particular, the semigroup (n=1) is called Golstein's unitary and a more simply probative method to Ref.[3] by semiring is offered.
Bounds for Modules of Eigenvalues of Iterative Matrices
RAN Rui-sheng, HUANG Ting-zhu
2006, 35(1): 133-136.
Abstract:
For solving the linear system with the iterative method, it is very important to estimate the spectral radius of the iterative matrices. In this paper we present an estimate for bounds of module of eigenvalues of the iteration matrix M-1 N for a kind of Baily-Crabtree diagonally dominant matrix M. Then, under a certain condition, the estimate for bounds of the module of eigenvalues of M-1 N is presented when M is a α -strictly diagonally dominant matrix. Numerical examples for illustrating validity of results are presented.
An Application of Parametric Programming Based on Interval Number in Risk Management of Commercial Bank
GUO Zhan-qin, ZHOU Zong-fang
2006, 35(1): 137-139.
Abstract:
A parametric programming based on interval number is proposed for the uncertainty risk and return. By selecting the risk parameters,commercial banks can get the optimum solution under the equilibrium of risk and return and can obtain the maximum return when risk is fixed. An example shows that the method is quite fit for credit risk management of commercial banks.
Corporation Value Based on Free Cash flow
YU Feng, ZENG Yong
2006, 35(1): 140-143.
Abstract:
The concept free cash flow has put forward and brought to bear in practice for decade, but it has not received enough attention from financial theory and practice finance. The paper gives on the main line of modern financial operating system on free cash flow, and makes the next step pick up the particular thought about financial management serving for the maximal corporation value. Basing on adjusting financial statement analysis and basic financial ratio, the author proposes the method the corporation value evaluation based on handhold computing Free Cash Flow.