To improve the performance of composite pseudo-noise (PN) code clock recovery in a regenerative PN ranging system at a low symbol signal-to-noise ratio (SNR), a novel chip tracking loop (CTL) used for regenerati...To improve the performance of composite pseudo-noise (PN) code clock recovery in a regenerative PN ranging system at a low symbol signal-to-noise ratio (SNR), a novel chip tracking loop (CTL) used for regenerative PN ranging clock recovery is adopted. The CTL is a modified data transition tracking loop (DTTL). The difference between them is that the Q channel output of the CTL is directly multiplied by a clock component, while that of the DTTL is multiplied by the Ⅰ channel transition detector output. Under the condition of a quasi-squareware PN ranging code, the tracking ( mean square timing jitter) performance of the CTL is analyzed. The tracking performances of the CTL and the DTTL, are compared over a wide range of symbol SNRs. The result shows that the CTL and the DTTL have the same performance at a large symbol SNR, while at a low symbol SNR, the former offers a noticeable enhancement.展开更多
Over recent years,the reform-driven development of education has been one primary idea of the Chinese government under the leadership of Xi Jinping.Above all,the reform of the personnel system,closely related to the i...Over recent years,the reform-driven development of education has been one primary idea of the Chinese government under the leadership of Xi Jinping.Above all,the reform of the personnel system,closely related to the interests of teachers,becomes the most sensitive link in the educational reform.To root out the restriction of education system on teachers and enhance their enthusiasm for work,Jia County carried out a reform of teacher personnel system from 2013 to 2016,including breaking the hierarchical restriction on teachers’administrative promotion,decentralizing the power of confirming the teachers’professional titles,eliminating the teachers with the worst performances,practicing performance salary,and other measures.In this study,we tracked 627 teachers regarding their work enthusiasm and stress during the three-year reform,analyzed the data through the Hierarchical Linear Model(HLM),and found that:(1)The teachers’enthusiasm for work increased over time,but did not significantly change with the consideration of the influence of the principals’leadership in teaching.The personnel system reform aiming at motivating teachers failed to work as expected.(2)The teachers’work stress still increased year by year.Therefore,this study concludes that the reform in Jia County failed to fulfill its goals and that the vigorous top-down reform did not lead to ideal results.A reason might be that the reform damaged the vested interests of teachers who represent the deep-rooted nepotism typically in the Chinese education community.Reforms of educational personnel system should give schools a full play regarding educational governance in the future.展开更多
Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data acc...Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services.Transparency and accountability for data managed in the cloud is necessary.Specifically,when using a cloudhost service,a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data.This is a multi-party system.Three particular trust models can be used according to the credibility of these providers.This pa per describes techniques for preventing data leakage that can be used with these different models.展开更多
While adopting an elevation-over-azimuth architecture by an inter-satellite linkage antenna of a user satellite, a zenith pass problem always occurs when the antenna is tracing the tracking and data relay satellite (...While adopting an elevation-over-azimuth architecture by an inter-satellite linkage antenna of a user satellite, a zenith pass problem always occurs when the antenna is tracing the tracking and data relay satellite (TDRS). This paper deals with this problem by way of, firstly, introducing movement laws of the inter-satellite linkage to predict the movement of the user satellite antenna followed by analyzing the potential pass moment and the actual one of the zenith pass in detail. A number of specific orbit altitudes for the user satellite that can remove the blindness zone are obtained. Finally, on the base of the predicted results from the movement laws of the inter-satellite linkage, the zenith pass tracing strategies for the user satellite antenna are designed under the program guidance using a trajectory preprocessor. Simulations have confirmed the reasonability and feasibility of the strategies in dealing with the zenith pass problem.展开更多
It is of vital importance to reduce injuries and economic losses by accurate forecasts of typhoon tracks. A huge amount of typhoon observations have been accumulated by the meteorological department, however, they are...It is of vital importance to reduce injuries and economic losses by accurate forecasts of typhoon tracks. A huge amount of typhoon observations have been accumulated by the meteorological department, however, they are yet to be adequately utilized. It is an effective method to employ machine learning to perform forecasts. A long short term memory(LSTM) neural network is trained based on the typhoon observations during 1949–2011 in China's Mainland, combined with big data and data mining technologies, and a forecast model based on machine learning for the prediction of typhoon tracks is developed. The results show that the employed algorithm produces desirable 6–24 h nowcasting of typhoon tracks with an improved precision.展开更多
According to the trajectory characteristics of ballistic missile, a reduced parameter model is constructed based on difference between telemetry trajectory and trajectory tracking data. By virtue of Bayesian theory an...According to the trajectory characteristics of ballistic missile, a reduced parameter model is constructed based on difference between telemetry trajectory and trajectory tracking data. By virtue of Bayesian theory and data fusion technique, a new test evaluation method is put forth, which can make full use of the trajectory tracking data, shooting range test data and relevant information. Since the impact point can be derived from trajectory difference and its kinetic characteristics, evaluation of the impact point is a special case of this method. The accurate evaluation and the accuracy of evaluation results can be provided by the new method.展开更多
The satellite constellation classes, which are suitable for the medium earth orbit tracking and data relay satellite system (MEO-TDRSS) of China, are investigated. On the basis of the functionality and the traffic d...The satellite constellation classes, which are suitable for the medium earth orbit tracking and data relay satellite system (MEO-TDRSS) of China, are investigated. On the basis of the functionality and the traffic distribution characteristic of MEO-TDRSS, the coverage performance and inter-satellite link properties of four different constellation schemes are compared by simulations. Simulation results indicate that the rosette and common-track constellations, whose satellites are distributed on the celestial sphere more uniformly, are appropriate for the implementation of MEO-TDRSS of China.展开更多
In this paper, feedforward attitude control law for a Tracking and Data Relay Satellite (TDRS) with mobile antennas is proposed. To track or point the target spacecraft with median/law orbit, the large mobile antenn...In this paper, feedforward attitude control law for a Tracking and Data Relay Satellite (TDRS) with mobile antennas is proposed. To track or point the target spacecraft with median/law orbit, the large mobile antennas have to move in a wide range. The movement of such mobile antennas disturbs the satellite attitude conscquently. Conventionally, the main body of thc satellitc and the mobile antennas are controlled independently. The proposed controller first estimates the angular momentum which the mobile antennas will produce based on tiLe momentum conservation equation. Next, it computes the desired velocity of reaction wheels to compensate the disturbance due to the antenna motion. It then adds the errnr of the wheels' velocity between a desired one and a current value as a feedforward signal to the control system. The proposed controller is demonstrated using a mathematical simulation, of which these results coincide well with analytical results.展开更多
In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to ef...In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to effectively discover backdoor behaviors, such as stealing secret information and injecting evil data into system, with less false negatives. With concolic execution on predetermined path, the backdoor trigger condition can be extracted and analyzed to achieve high accuracy. BASEC has been implemented and experimented on several software backdoor samples widespread on the Internet, and over 90% of them can be detected. Compared with behavior-based and system-call-based detection methods, BASEC relies less on the historical sample collections, and is more effective in detecting software backdoors, especially those injected into software by modifying and recompiling source codes.展开更多
This paper focuses on the type synthesis of two degree-of-freedom(2-DoF) rotational parallel mechanisms(RPMs) that would be applied as mechanisms actuating the inter-satellite link antenna. Based upon Lie group theory...This paper focuses on the type synthesis of two degree-of-freedom(2-DoF) rotational parallel mechanisms(RPMs) that would be applied as mechanisms actuating the inter-satellite link antenna. Based upon Lie group theory, two steps are necessary to synthesize 2-DoF RPMs except describing the continuous desired motions of the moving platform. They are respectively generation of required open-loop limbs between the fixed base and the moving platform and definition of assembly principles for these limbs. Firstly, all available displacement subgroups or submanifolds are obtained readily according to that the continuous motion of the moving platform is the intersection of those of all open-loop limbs. These subgroups or submanifolds are used to generate all the topology structures of limbs. By describing the characteristics of the displacement subgroups and submanifolds intuitively through employing simple geometrical symbols, their intersection and union operations can be carried out easily. Based on this, the assembly principles of two types are defined to synthesize all 2-DoF RPMs using obtained limbs. Finally, two novel categories of 2-DoF RPMs are provided by introducing a circular track and an articulated rotating platform,respectively. This work can lay the foundations for analysis and optimal design of 2-DoF RPMs that actuate the inter-satellite link antenna.展开更多
文摘To improve the performance of composite pseudo-noise (PN) code clock recovery in a regenerative PN ranging system at a low symbol signal-to-noise ratio (SNR), a novel chip tracking loop (CTL) used for regenerative PN ranging clock recovery is adopted. The CTL is a modified data transition tracking loop (DTTL). The difference between them is that the Q channel output of the CTL is directly multiplied by a clock component, while that of the DTTL is multiplied by the Ⅰ channel transition detector output. Under the condition of a quasi-squareware PN ranging code, the tracking ( mean square timing jitter) performance of the CTL is analyzed. The tracking performances of the CTL and the DTTL, are compared over a wide range of symbol SNRs. The result shows that the CTL and the DTTL have the same performance at a large symbol SNR, while at a low symbol SNR, the former offers a noticeable enhancement.
文摘Over recent years,the reform-driven development of education has been one primary idea of the Chinese government under the leadership of Xi Jinping.Above all,the reform of the personnel system,closely related to the interests of teachers,becomes the most sensitive link in the educational reform.To root out the restriction of education system on teachers and enhance their enthusiasm for work,Jia County carried out a reform of teacher personnel system from 2013 to 2016,including breaking the hierarchical restriction on teachers’administrative promotion,decentralizing the power of confirming the teachers’professional titles,eliminating the teachers with the worst performances,practicing performance salary,and other measures.In this study,we tracked 627 teachers regarding their work enthusiasm and stress during the three-year reform,analyzed the data through the Hierarchical Linear Model(HLM),and found that:(1)The teachers’enthusiasm for work increased over time,but did not significantly change with the consideration of the influence of the principals’leadership in teaching.The personnel system reform aiming at motivating teachers failed to work as expected.(2)The teachers’work stress still increased year by year.Therefore,this study concludes that the reform in Jia County failed to fulfill its goals and that the vigorous top-down reform did not lead to ideal results.A reason might be that the reform damaged the vested interests of teachers who represent the deep-rooted nepotism typically in the Chinese education community.Reforms of educational personnel system should give schools a full play regarding educational governance in the future.
基金supported by National Basic Research (973) Program of China (2011CB302505)Natural Science Foundation of China (61373145, 61170210)+1 种基金National High-Tech R&D (863) Program of China (2012AA012600,2011AA01A203)Chinese Special Project of Science and Technology (2012ZX01039001)
文摘Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services.Transparency and accountability for data managed in the cloud is necessary.Specifically,when using a cloudhost service,a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data.This is a multi-party system.Three particular trust models can be used according to the credibility of these providers.This pa per describes techniques for preventing data leakage that can be used with these different models.
文摘While adopting an elevation-over-azimuth architecture by an inter-satellite linkage antenna of a user satellite, a zenith pass problem always occurs when the antenna is tracing the tracking and data relay satellite (TDRS). This paper deals with this problem by way of, firstly, introducing movement laws of the inter-satellite linkage to predict the movement of the user satellite antenna followed by analyzing the potential pass moment and the actual one of the zenith pass in detail. A number of specific orbit altitudes for the user satellite that can remove the blindness zone are obtained. Finally, on the base of the predicted results from the movement laws of the inter-satellite linkage, the zenith pass tracing strategies for the user satellite antenna are designed under the program guidance using a trajectory preprocessor. Simulations have confirmed the reasonability and feasibility of the strategies in dealing with the zenith pass problem.
基金The National Natural Science Foundation of China under contract Nos 61273245 and 41306028the Beijing Natural Science Foundation under contract No.4152031+2 种基金the National Special Research Fund for Non-Profit Marine Sector under contract Nos201405022-3 and 2013418026-4the Ocean Science and Technology Program of North China Sea Branch of State Oceanic Administration under contract No.2017A01the Operational Marine Forecasting Program of State Oceanic Administration
文摘It is of vital importance to reduce injuries and economic losses by accurate forecasts of typhoon tracks. A huge amount of typhoon observations have been accumulated by the meteorological department, however, they are yet to be adequately utilized. It is an effective method to employ machine learning to perform forecasts. A long short term memory(LSTM) neural network is trained based on the typhoon observations during 1949–2011 in China's Mainland, combined with big data and data mining technologies, and a forecast model based on machine learning for the prediction of typhoon tracks is developed. The results show that the employed algorithm produces desirable 6–24 h nowcasting of typhoon tracks with an improved precision.
基金the National Natural Science Foundation of China(Grant No. 69872039).
文摘According to the trajectory characteristics of ballistic missile, a reduced parameter model is constructed based on difference between telemetry trajectory and trajectory tracking data. By virtue of Bayesian theory and data fusion technique, a new test evaluation method is put forth, which can make full use of the trajectory tracking data, shooting range test data and relevant information. Since the impact point can be derived from trajectory difference and its kinetic characteristics, evaluation of the impact point is a special case of this method. The accurate evaluation and the accuracy of evaluation results can be provided by the new method.
基金the National Natural Science Foundation of China (60372013)
文摘The satellite constellation classes, which are suitable for the medium earth orbit tracking and data relay satellite system (MEO-TDRSS) of China, are investigated. On the basis of the functionality and the traffic distribution characteristic of MEO-TDRSS, the coverage performance and inter-satellite link properties of four different constellation schemes are compared by simulations. Simulation results indicate that the rosette and common-track constellations, whose satellites are distributed on the celestial sphere more uniformly, are appropriate for the implementation of MEO-TDRSS of China.
文摘In this paper, feedforward attitude control law for a Tracking and Data Relay Satellite (TDRS) with mobile antennas is proposed. To track or point the target spacecraft with median/law orbit, the large mobile antennas have to move in a wide range. The movement of such mobile antennas disturbs the satellite attitude conscquently. Conventionally, the main body of thc satellitc and the mobile antennas are controlled independently. The proposed controller first estimates the angular momentum which the mobile antennas will produce based on tiLe momentum conservation equation. Next, it computes the desired velocity of reaction wheels to compensate the disturbance due to the antenna motion. It then adds the errnr of the wheels' velocity between a desired one and a current value as a feedforward signal to the control system. The proposed controller is demonstrated using a mathematical simulation, of which these results coincide well with analytical results.
基金Supported in part by the National Natural Science Foundation of China(61272493)the Specialized Research Fund for the Doctoral Program of Higher Education of China(20113402120026)Oversea Academic Training Funds of University of Science and Technology of China
文摘In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to effectively discover backdoor behaviors, such as stealing secret information and injecting evil data into system, with less false negatives. With concolic execution on predetermined path, the backdoor trigger condition can be extracted and analyzed to achieve high accuracy. BASEC has been implemented and experimented on several software backdoor samples widespread on the Internet, and over 90% of them can be detected. Compared with behavior-based and system-call-based detection methods, BASEC relies less on the historical sample collections, and is more effective in detecting software backdoors, especially those injected into software by modifying and recompiling source codes.
基金supported by the National Natural Science Foundation of China (No. 51475321)Tianjin Research Program of Application Foundation and Advanced Technology (No. 15JCZDJC38900 and No. 16JCYBJC19300)
文摘This paper focuses on the type synthesis of two degree-of-freedom(2-DoF) rotational parallel mechanisms(RPMs) that would be applied as mechanisms actuating the inter-satellite link antenna. Based upon Lie group theory, two steps are necessary to synthesize 2-DoF RPMs except describing the continuous desired motions of the moving platform. They are respectively generation of required open-loop limbs between the fixed base and the moving platform and definition of assembly principles for these limbs. Firstly, all available displacement subgroups or submanifolds are obtained readily according to that the continuous motion of the moving platform is the intersection of those of all open-loop limbs. These subgroups or submanifolds are used to generate all the topology structures of limbs. By describing the characteristics of the displacement subgroups and submanifolds intuitively through employing simple geometrical symbols, their intersection and union operations can be carried out easily. Based on this, the assembly principles of two types are defined to synthesize all 2-DoF RPMs using obtained limbs. Finally, two novel categories of 2-DoF RPMs are provided by introducing a circular track and an articulated rotating platform,respectively. This work can lay the foundations for analysis and optimal design of 2-DoF RPMs that actuate the inter-satellite link antenna.