The dynamic responses of the Tsing Ma suspension bridge and the running behaviors of trains on the bridge under turbulent wind actions are analyzed by a three-dimensional wind-train-bridge interaction model. This mode...The dynamic responses of the Tsing Ma suspension bridge and the running behaviors of trains on the bridge under turbulent wind actions are analyzed by a three-dimensional wind-train-bridge interaction model. This model consists of a spatial finite element bridge model, a train model composed of eight 4-axle identical coaches of 27 degrees-of-freedom, and a turbulent wind model. The fluctuating wind forces, including the buffeting forces and the self-excited forces, act on the bridge only, since the train runs inside the bridge deck. The dynamic responses of the bridge are calculated and some results are compared with data measured from Typhoon York. The runnability of the train passing through the Tsing Ma suspension bridge at different speeds is researched under turbulent winds with different wind velocities. Then, the threshold curve of wind velocity for ensuring the running safety of the train in the bridge deck is proposed, from which the allowable train speed at different wind velocities can be determined. The numerical results show that rail traffic on the Tsing Ma suspension bridge should be closed as the mean wind velocity reaches 30 m/s.展开更多
Ultra-wide-band (UWB) signals are suitable for localization, since their high time resolution can provide precise time of arrival (TOA) estimation. However, one major challenge in UWB signal processing is the requirem...Ultra-wide-band (UWB) signals are suitable for localization, since their high time resolution can provide precise time of arrival (TOA) estimation. However, one major challenge in UWB signal processing is the requirement of high sampling rate which leads to complicated signal processing and expensive hardware. In this paper, we present a novel UWB signal sampling method called UWB signal sampling via temporal sparsity (USSTS). Its sampling rate is much lower than Nyquist rate. Moreover, it is implemented in one step and no extra processing unit is needed. Simulation results show that USSTS can not recover the signal precisely, but for the use in localization, the accuracy of TOA estimation is the same as that in traditional methods. Therefore, USSTS gives a novel and effective solution for the use of UWB signals in localization.展开更多
A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain ...A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems.展开更多
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation...In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones.展开更多
The robust stability test of time-delay systems with interval parameters can be concluded into the robust stability of the interval quasipolynomials. It has been revealed that the robust stability of the quasipolynomi...The robust stability test of time-delay systems with interval parameters can be concluded into the robust stability of the interval quasipolynomials. It has been revealed that the robust stability of the quasipolynomials depends on that of their edge polynomials. This paper transforms the interval quasipolynomials into two-dimensional (2-D) interval polynomials (2-D s-z hybrid polynomials), proves that the robust stability of interval 2-D polynomials are sufficient for the stability of given quasipolynomials. Thus, the stability test of interval quasipolynomials can be completed in 2-D s-z domain instead of classical 1-D s domain. The 2-D s-z hybrid polynomials should have different forms under the time delay properties of given quasipolynomials. The stability test proposed by the paper constructs an edge test set from Kharitonov vertex polynomials to reduce the number of testing edge polynomials. The 2-D algebraic tests are provided for the stability test of vertex 2-D polynomials and edge 2-D polynomials family. To verify the results of the paper to be correct and valid, the simulations based on proposed results and comparison with other presented results are given.展开更多
In order to investigate the enhancement of data privacy by distributing data packets via multiple paths,this paper formulates a security model and analyzes the privacy problem in multipath scenarios leveraging informa...In order to investigate the enhancement of data privacy by distributing data packets via multiple paths,this paper formulates a security model and analyzes the privacy problem in multipath scenarios leveraging information theoretic concept.Based on proposed model,a privacy function related to the path number is discussed.We heuristically recommend the optimal path number and analyze the tradeoff among the performance,resource consumption and privacy.For reducing the information leakage,the data schedule algorithms are also proposed.The analytical model can provide guidelines for the multipath protocol design.展开更多
As a core technology of Internet of Things(IoT),Wireless Sensor Network(WSN) has become a research hotspot recently.More and more WSNs are being deployed in highly mobile environments.The fast moving sensor nodes brin...As a core technology of Internet of Things(IoT),Wireless Sensor Network(WSN) has become a research hotspot recently.More and more WSNs are being deployed in highly mobile environments.The fast moving sensor nodes bring significant challenges for the routing decision.In this paper,we propose an efficient logical location method,and designe a mobility estimating metric and derive a novel Green Mobility Estimation-based Routing protocol(G-MER) for WSNs.We also set up a full framework to evaluate its performance.Simulation results illustrate that G-MER achieves a fairly better performance in terms of broadcast times and link failures than AODV.What's more,it decreases the mean hops by about 0.25 and reduces energy consumption by about 10% during the whole experiment.All the results show that G-MER can be effectively used in fast-moving and limited resource scenarios.展开更多
A nonlinear data analysis algorithm, namely empirical data decomposition (EDD) is proposed, which can perform adaptive analysis of observed data. Analysis filter, which is not a linear constant coefficient filter, i...A nonlinear data analysis algorithm, namely empirical data decomposition (EDD) is proposed, which can perform adaptive analysis of observed data. Analysis filter, which is not a linear constant coefficient filter, is automatically determined by observed data, and is able to implement multi-resolution analysis as wavelet transform. The algorithm is suitable for analyzing non-stationary data and can effectively wipe off the relevance of observed data. Then through discussing the applications of EDD in image compression, the paper presents a 2-dimension data decomposition framework and makes some modifications of contexts used by Embedded Block Coding with Optimized Truncation (EBCOT) . Simulation results show that EDD is more suitable for non-stationary image data compression.展开更多
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux...Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance.展开更多
The convergence and stability analysis for two end-to-end rate-based congestion control algorithms with unavoidable random loss in packets are presented, which can be caused by, for example, errors on wireless links. ...The convergence and stability analysis for two end-to-end rate-based congestion control algorithms with unavoidable random loss in packets are presented, which can be caused by, for example, errors on wireless links. The convergence rates of these two algorithms are analyzed by linearizing them around their equilibrium points, since they are globally stable and can converge to their unique equilibrium points. Some sufficient conditions for local stability in the presence of round-trip delay are obtained based on the general Nyquist criterion of stability. The stability conditions can be considered to be more general. If random loss in the first congestion control algorithm is not considered, they reduce to the local stability conditions which have been obtained in some literatures. Furthermore, sufficient conditions for local stability of a new congestion control algorithm have also been obtained if random loss is not considered in the second congestion control algorithm.展开更多
The Newton-Like algorithm with price estimation error in optimization flow control in network is analyzed. The estimation error is treated as inexactness of the gradient and the inexact descent direction is analyzed. ...The Newton-Like algorithm with price estimation error in optimization flow control in network is analyzed. The estimation error is treated as inexactness of the gradient and the inexact descent direction is analyzed. Based on the optimization theory, a sufficient condition for convergence of this algorithm with bounded price estimation error is obtained. Furthermore, even when this sufficient condition doesn't hold, this algorithm can also converge, provided a modified step size, and an attraction region is obtained. Based on Lasalle's invariance principle applied to a suitable Lyapunov function, the dynamic system described by this algorithm is proved to be global stability if the error is zero. And the Newton-Like algorithm with bounded price estimation error is also globally stable if the error satisfies the sufficient condition for convergence. All trajectories ultimately converge to the equilibrium point.展开更多
Different from the traditional railway trains,the combined levitation and guidance EDS maglev train is more likely to rotate after being disturbed.Therefore,the rotational electromagnetic stiffnesses are significant o...Different from the traditional railway trains,the combined levitation and guidance EDS maglev train is more likely to rotate after being disturbed.Therefore,the rotational electromagnetic stiffnesses are significant operating parameters for the train.In this paper,the different effects of each translational offset generated in the rotational motion on the corresponding rotational electromagnetic stiffnesses in the EDS maglev train are analyzed and calculated.Firstly,a three-dimensional model of the maglev train is established.Then,based on the space harmonic method and the equivalent circuit of the levitation and guidance circuits,the formulas of rolling,pitching and yawing stiffness are presented.Finally,by comparing with the three-dimensional finite element simulation results,the key translational displacements in the rotational motion which has a great impact on the stiffness are obtained.Hence,the three-dimensional analytical formula can be simplified and the computation can be reduced.In addition,the accuracy of the calculation results is verified by comparing with the experimental data of Yamanashi test line.展开更多
Interference from secondary users to primary users should be avoided in cognitive radio. However, it is difficult to solve the interference problem if the secondary users cannot get the information of the primary rece...Interference from secondary users to primary users should be avoided in cognitive radio. However, it is difficult to solve the interference problem if the secondary users cannot get the information of the primary receivers. Insufficient information of primary users would result in inaccurate spectrum detecting result. To deliver the information of primary users, Receiver Detection Employing Semaphore (ReDES) is proposed in this paper. Primary receiver informs secondary users of its licensed receive frequency according to semaphore architecture directly in ReDES. The semaphore is used to determine the spectrum holes by secondary users. Frequency mapping method is come up with as a realization of ReDES. The procedure and the detailed techniques are illustrated to make ReDES scheme reasonable and feasible. Simulation results show that the proposed scheme can effectively detect the frequencies of primary receivers, and improve the accuracy of spectrum detection.展开更多
Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover man...Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover management architecture containing four modules is proposed and the multihoming technology is adopted to achieve Make-Before-Break vertical handover. Then the paper presents the performance analysis of the architecture and simulation in ns-2. The results substantiate the effi cacy of the architecture in improving the handover performance signifi cantly compared with the traditional Mobile IPv6 (MIPv6) based vertical handover. Besides, we design and implement this handover management architecture in our test-bed. The experimental results in a real network environment show that our proposed architecture can not only support the Make-before-break handover, but also guarantee the scalability because of the modulized design.展开更多
Spurious signals in direct digital frequency synthesizers (DDFSs) are partly caused by amplitude quantization and phase truncation, which affect their application to many wireless telecommunication systems. These si...Spurious signals in direct digital frequency synthesizers (DDFSs) are partly caused by amplitude quantization and phase truncation, which affect their application to many wireless telecommunication systems. These signals are deterministic and periodic in the time domain, so they appear as line spectra in the frequency domain. Two types of spurious signals due to amplitude quantization are exactly formulated and compared in the time and frequency domains respectively. Then the frequency spectra and power levels of the spurious signals due to amplitude quantization in the absence of phase-accumulator truncation are emphatically analyzed, and the effects of the DDFS parameter variations on the spurious signals are thoroughly studied by computer simulation. And several important conclusions are derived which can provide theoretical support for parameter choice and spurious performance evaluation in the application of DDFSs.展开更多
The wear behaviors of steel-steel pair on condition of a water-based lubricant with copolymer of acylamino polyoxyethylene polyoxypropylene ether(KE-1)included as additives are investigated with the help of the univer...The wear behaviors of steel-steel pair on condition of a water-based lubricant with copolymer of acylamino polyoxyethylene polyoxypropylene ether(KE-1)included as additives are investigated with the help of the universal micro-tribotester.Tests on friction and wear are carried out.As a reference,some tests with pure water are also performed for comparison.The results show that the prepared water-based lubricant has a good effect on the characteristics associated with friction reducing and anti-wear processes,which lay some credence to its utilization in practical industrial tribo-systems.展开更多
Background Functional neuroimaging study has opened an avenue for exploring the pathophysiology of cluster headache (CH).The aim of our study was to assess the changes in brain activity in CH patients by the regiona...Background Functional neuroimaging study has opened an avenue for exploring the pathophysiology of cluster headache (CH).The aim of our study was to assess the changes in brain activity in CH patients by the regional homogeneity method using resting-state functional magnetic resonance imaging technique.Methods The functional magnetic resonance imaging scans were obtained for 12 male CH patients with spontaneous right-sided headache attacks during “in attack” and “out of attack” periods and 12 age- and sex-matched normal controls.The data were analyzed to detect the altered brain activity by the regional homogeneity method using statistical parametric mapping software.Results Altered regional homogeneity was detected in the anterior cingulate cortex,the posterior cingulate cortex,the prefrontal cortex,insular cortex,and other brain regions involved in pain processing and modulation among different groups.Conclusion It is referred that these brain regions with altered regional homogeneity might be related to the pain processing and modulation of CH.展开更多
In this paper we mainly prove that let G be a(k+1)-edge-connected simple graph of order n with girth g.Then G is upper embeddable if for any independent set I(G) = {vi | 1 i k2 + 2},k = 0,1,2 and the lower bound is ti...In this paper we mainly prove that let G be a(k+1)-edge-connected simple graph of order n with girth g.Then G is upper embeddable if for any independent set I(G) = {vi | 1 i k2 + 2},k = 0,1,2 and the lower bound is tight.展开更多
基金National Natural Science Foundation of China Under Grant No.90715008, 50838006The Fundamental Research Funds for the Central Universities Under Grant No 2009JBM078
文摘The dynamic responses of the Tsing Ma suspension bridge and the running behaviors of trains on the bridge under turbulent wind actions are analyzed by a three-dimensional wind-train-bridge interaction model. This model consists of a spatial finite element bridge model, a train model composed of eight 4-axle identical coaches of 27 degrees-of-freedom, and a turbulent wind model. The fluctuating wind forces, including the buffeting forces and the self-excited forces, act on the bridge only, since the train runs inside the bridge deck. The dynamic responses of the bridge are calculated and some results are compared with data measured from Typhoon York. The runnability of the train passing through the Tsing Ma suspension bridge at different speeds is researched under turbulent winds with different wind velocities. Then, the threshold curve of wind velocity for ensuring the running safety of the train in the bridge deck is proposed, from which the allowable train speed at different wind velocities can be determined. The numerical results show that rail traffic on the Tsing Ma suspension bridge should be closed as the mean wind velocity reaches 30 m/s.
基金supported by National science foundation(No. 60772035): Key technique study on heterogeneous network convergenceDoctoral grant(No.20070004010)s: Study on cross layer design for heterogeneous network convergence+1 种基金National 863 Hi-Tech Projects(No.2007AA01Z277): Pa-rameter design based electromagnetic compatibility study in cognitive radio communication systemNational science foundation(No. 60830001): Wireless communication fundamentals and key techniuqes for high speed rail way control and safety data transmission
文摘Ultra-wide-band (UWB) signals are suitable for localization, since their high time resolution can provide precise time of arrival (TOA) estimation. However, one major challenge in UWB signal processing is the requirement of high sampling rate which leads to complicated signal processing and expensive hardware. In this paper, we present a novel UWB signal sampling method called UWB signal sampling via temporal sparsity (USSTS). Its sampling rate is much lower than Nyquist rate. Moreover, it is implemented in one step and no extra processing unit is needed. Simulation results show that USSTS can not recover the signal precisely, but for the use in localization, the accuracy of TOA estimation is the same as that in traditional methods. Therefore, USSTS gives a novel and effective solution for the use of UWB signals in localization.
基金the National Grand Fundamental Research "973" Program of China (2004CB318109)the High-Technology Research and Development Plan of China (863-307-7-5)the National Information Security 242 Program ofChina (2005C39).
文摘A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems.
基金This work was supported by the National Basic Research Pro-gram of China under Crant No.2007CB311100 Funds of Key Lab of Fujlan Province University Network Security and Cryp- toll1009+3 种基金 the National Science Foundation for Young Scholars of China under Crant No.61001091 Beijing Nature Science Foundation under Crant No. 4122012 "Next-Generation Broad-band Wireless Mobile Communication Network" National Sci-ence and Technology Major Special Issue Funding under Grant No. 2012ZX03002003 Funding Program for Academic tturmn Resources Development in Institutions of Higher Learning Under the Jurisdiction of Beijing Municipality of Chi-na.
文摘In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones.
基金This project was supported by the National Science Foundation of China (60572093).
文摘The robust stability test of time-delay systems with interval parameters can be concluded into the robust stability of the interval quasipolynomials. It has been revealed that the robust stability of the quasipolynomials depends on that of their edge polynomials. This paper transforms the interval quasipolynomials into two-dimensional (2-D) interval polynomials (2-D s-z hybrid polynomials), proves that the robust stability of interval 2-D polynomials are sufficient for the stability of given quasipolynomials. Thus, the stability test of interval quasipolynomials can be completed in 2-D s-z domain instead of classical 1-D s domain. The 2-D s-z hybrid polynomials should have different forms under the time delay properties of given quasipolynomials. The stability test proposed by the paper constructs an edge test set from Kharitonov vertex polynomials to reduce the number of testing edge polynomials. The 2-D algebraic tests are provided for the stability test of vertex 2-D polynomials and edge 2-D polynomials family. To verify the results of the paper to be correct and valid, the simulations based on proposed results and comparison with other presented results are given.
基金This paper was partially supported by the National Basic Re-search Program of China under Grant No. 2007CB307100 the National Natural Science Foundation of China under Crant No 60972010 the Fundamental Research Funds for the Central U- niversities under Grant No. 2011JBM018.
文摘In order to investigate the enhancement of data privacy by distributing data packets via multiple paths,this paper formulates a security model and analyzes the privacy problem in multipath scenarios leveraging information theoretic concept.Based on proposed model,a privacy function related to the path number is discussed.We heuristically recommend the optimal path number and analyze the tradeoff among the performance,resource consumption and privacy.For reducing the information leakage,the data schedule algorithms are also proposed.The analytical model can provide guidelines for the multipath protocol design.
基金This paper was partially supported by the National Natural Science Foundation of China under Crants No. 61003283, No. 61001122 Beijing Natural Science Foundation of China under Crants No. 4102064+2 种基金 the Natural Science Foundation of Jiangsu Province under Crant No. BK2011171 the National High-Tech Research and Development Program of China under Crant No. 2011 AA010701 the Fundamental Research Funds for the Cen- tral Universities under Ccants No. 2011RC0507, No. 2012RO3603.
文摘As a core technology of Internet of Things(IoT),Wireless Sensor Network(WSN) has become a research hotspot recently.More and more WSNs are being deployed in highly mobile environments.The fast moving sensor nodes bring significant challenges for the routing decision.In this paper,we propose an efficient logical location method,and designe a mobility estimating metric and derive a novel Green Mobility Estimation-based Routing protocol(G-MER) for WSNs.We also set up a full framework to evaluate its performance.Simulation results illustrate that G-MER achieves a fairly better performance in terms of broadcast times and link failures than AODV.What's more,it decreases the mean hops by about 0.25 and reduces energy consumption by about 10% during the whole experiment.All the results show that G-MER can be effectively used in fast-moving and limited resource scenarios.
基金This project was supported by the National Natural Science Foundation of China (60532060)Hainan Education Bureau Research Project (Hjkj200602)Hainan Natural Science Foundation (80551).
文摘A nonlinear data analysis algorithm, namely empirical data decomposition (EDD) is proposed, which can perform adaptive analysis of observed data. Analysis filter, which is not a linear constant coefficient filter, is automatically determined by observed data, and is able to implement multi-resolution analysis as wavelet transform. The algorithm is suitable for analyzing non-stationary data and can effectively wipe off the relevance of observed data. Then through discussing the applications of EDD in image compression, the paper presents a 2-dimension data decomposition framework and makes some modifications of contexts used by Embedded Block Coding with Optimized Truncation (EBCOT) . Simulation results show that EDD is more suitable for non-stationary image data compression.
基金supported by the National Grand Fundamental Research "973" Program of China (2004CB318109)the National High-Technology Research and Development Plan of China (2006AA01Z452)the National Information Security "242"Program of China (2005C39).
文摘Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance.
基金supported in part by the National Natural Science Foundation of China (10671170,60404022)the National Outstanding Youth Foundation of China (60525303)and the Natural Science Foundation of Hebei Province (07M005,F2008000864)
文摘The convergence and stability analysis for two end-to-end rate-based congestion control algorithms with unavoidable random loss in packets are presented, which can be caused by, for example, errors on wireless links. The convergence rates of these two algorithms are analyzed by linearizing them around their equilibrium points, since they are globally stable and can converge to their unique equilibrium points. Some sufficient conditions for local stability in the presence of round-trip delay are obtained based on the general Nyquist criterion of stability. The stability conditions can be considered to be more general. If random loss in the first congestion control algorithm is not considered, they reduce to the local stability conditions which have been obtained in some literatures. Furthermore, sufficient conditions for local stability of a new congestion control algorithm have also been obtained if random loss is not considered in the second congestion control algorithm.
基金supported in part by the National Outstanding Youth Foundation of P.R.China (60525303)the National Natural Science Foundation of P.R.China(60404022,60604004)+2 种基金the Natural Science Foundation of Hebei Province (102160)the special projects in mathematics funded by the Natural Science Foundation of Hebei Province(07M005)the NS of Education Office in Hebei Province (2004123).
文摘The Newton-Like algorithm with price estimation error in optimization flow control in network is analyzed. The estimation error is treated as inexactness of the gradient and the inexact descent direction is analyzed. Based on the optimization theory, a sufficient condition for convergence of this algorithm with bounded price estimation error is obtained. Furthermore, even when this sufficient condition doesn't hold, this algorithm can also converge, provided a modified step size, and an attraction region is obtained. Based on Lasalle's invariance principle applied to a suitable Lyapunov function, the dynamic system described by this algorithm is proved to be global stability if the error is zero. And the Newton-Like algorithm with bounded price estimation error is also globally stable if the error satisfies the sufficient condition for convergence. All trajectories ultimately converge to the equilibrium point.
基金supported in part by the National Natural Science Foundation of China under Grant(52077003 and 51777009)。
文摘Different from the traditional railway trains,the combined levitation and guidance EDS maglev train is more likely to rotate after being disturbed.Therefore,the rotational electromagnetic stiffnesses are significant operating parameters for the train.In this paper,the different effects of each translational offset generated in the rotational motion on the corresponding rotational electromagnetic stiffnesses in the EDS maglev train are analyzed and calculated.Firstly,a three-dimensional model of the maglev train is established.Then,based on the space harmonic method and the equivalent circuit of the levitation and guidance circuits,the formulas of rolling,pitching and yawing stiffness are presented.Finally,by comparing with the three-dimensional finite element simulation results,the key translational displacements in the rotational motion which has a great impact on the stiffness are obtained.Hence,the three-dimensional analytical formula can be simplified and the computation can be reduced.In addition,the accuracy of the calculation results is verified by comparing with the experimental data of Yamanashi test line.
基金supported by the National High Technology Research and Development Program of China ("863" Program, No.2009AA01Z242)National Natural Science Foundation of China (60972080)
文摘Interference from secondary users to primary users should be avoided in cognitive radio. However, it is difficult to solve the interference problem if the secondary users cannot get the information of the primary receivers. Insufficient information of primary users would result in inaccurate spectrum detecting result. To deliver the information of primary users, Receiver Detection Employing Semaphore (ReDES) is proposed in this paper. Primary receiver informs secondary users of its licensed receive frequency according to semaphore architecture directly in ReDES. The semaphore is used to determine the spectrum holes by secondary users. Frequency mapping method is come up with as a realization of ReDES. The procedure and the detailed techniques are illustrated to make ReDES scheme reasonable and feasible. Simulation results show that the proposed scheme can effectively detect the frequencies of primary receivers, and improve the accuracy of spectrum detection.
基金supported in part by National Basic Research Program of China ("973 program") under contract No. 2007CB307101National Natural Science Foundation of China under Grant No. 60870015 and No. 60674008
文摘Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover management architecture containing four modules is proposed and the multihoming technology is adopted to achieve Make-Before-Break vertical handover. Then the paper presents the performance analysis of the architecture and simulation in ns-2. The results substantiate the effi cacy of the architecture in improving the handover performance signifi cantly compared with the traditional Mobile IPv6 (MIPv6) based vertical handover. Besides, we design and implement this handover management architecture in our test-bed. The experimental results in a real network environment show that our proposed architecture can not only support the Make-before-break handover, but also guarantee the scalability because of the modulized design.
基金supported by the National Grand Fundamental Research 973 Program of China(2004CB318109)the National High Technology Research and Development Program of China(863 Program)(2006AA01Z452).
文摘Spurious signals in direct digital frequency synthesizers (DDFSs) are partly caused by amplitude quantization and phase truncation, which affect their application to many wireless telecommunication systems. These signals are deterministic and periodic in the time domain, so they appear as line spectra in the frequency domain. Two types of spurious signals due to amplitude quantization are exactly formulated and compared in the time and frequency domains respectively. Then the frequency spectra and power levels of the spurious signals due to amplitude quantization in the absence of phase-accumulator truncation are emphatically analyzed, and the effects of the DDFS parameter variations on the spurious signals are thoroughly studied by computer simulation. And several important conclusions are derived which can provide theoretical support for parameter choice and spurious performance evaluation in the application of DDFSs.
基金New Century Excellent Talents in University(NCET-09-0211)Fundamental Research Funds for the Central Universities(2009JBZ015-2)
文摘The wear behaviors of steel-steel pair on condition of a water-based lubricant with copolymer of acylamino polyoxyethylene polyoxypropylene ether(KE-1)included as additives are investigated with the help of the universal micro-tribotester.Tests on friction and wear are carried out.As a reference,some tests with pure water are also performed for comparison.The results show that the prepared water-based lubricant has a good effect on the characteristics associated with friction reducing and anti-wear processes,which lay some credence to its utilization in practical industrial tribo-systems.
基金supported by the Fundamental Research Funds for Central Universities of China (Grant No. 2009JBM098)the Natural Science Foundation of Beijing (Grant No. 2113050)
文摘钒二氧化物在正常玻璃底层使用反应收音机频率(RF ) 磁控管劈啪作响上被制作。生长参数系统地被调查的氧流动卷和退火的温度。VO2 和 Au 的电、光的性质: 有不同生长条件的 VO2 薄电影被讨论。半导体金属阶段转变温度在 10
基金This work was supported by grants from the National Natural Science Foundation of China (No.30970417 and 81171058).
文摘Background Functional neuroimaging study has opened an avenue for exploring the pathophysiology of cluster headache (CH).The aim of our study was to assess the changes in brain activity in CH patients by the regional homogeneity method using resting-state functional magnetic resonance imaging technique.Methods The functional magnetic resonance imaging scans were obtained for 12 male CH patients with spontaneous right-sided headache attacks during “in attack” and “out of attack” periods and 12 age- and sex-matched normal controls.The data were analyzed to detect the altered brain activity by the regional homogeneity method using statistical parametric mapping software.Results Altered regional homogeneity was detected in the anterior cingulate cortex,the posterior cingulate cortex,the prefrontal cortex,insular cortex,and other brain regions involved in pain processing and modulation among different groups.Conclusion It is referred that these brain regions with altered regional homogeneity might be related to the pain processing and modulation of CH.
文摘In this paper we mainly prove that let G be a(k+1)-edge-connected simple graph of order n with girth g.Then G is upper embeddable if for any independent set I(G) = {vi | 1 i k2 + 2},k = 0,1,2 and the lower bound is tight.