期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
Running safety analysis of a train on the Tsing Ma Bridge under turbulent winds 被引量:9
1
作者 Guo Weiwei Xia He Xu Youlin 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2010年第3期307-318,共12页
The dynamic responses of the Tsing Ma suspension bridge and the running behaviors of trains on the bridge under turbulent wind actions are analyzed by a three-dimensional wind-train-bridge interaction model. This mode... The dynamic responses of the Tsing Ma suspension bridge and the running behaviors of trains on the bridge under turbulent wind actions are analyzed by a three-dimensional wind-train-bridge interaction model. This model consists of a spatial finite element bridge model, a train model composed of eight 4-axle identical coaches of 27 degrees-of-freedom, and a turbulent wind model. The fluctuating wind forces, including the buffeting forces and the self-excited forces, act on the bridge only, since the train runs inside the bridge deck. The dynamic responses of the bridge are calculated and some results are compared with data measured from Typhoon York. The runnability of the train passing through the Tsing Ma suspension bridge at different speeds is researched under turbulent winds with different wind velocities. Then, the threshold curve of wind velocity for ensuring the running safety of the train in the bridge deck is proposed, from which the allowable train speed at different wind velocities can be determined. The numerical results show that rail traffic on the Tsing Ma suspension bridge should be closed as the mean wind velocity reaches 30 m/s. 展开更多
关键词 Tsing Ma Bridge turbulent wind dynamic interaction running safety THRESHOLD wind velocity
下载PDF
A Novel UWB Signal Sampling Method for Localization based on Compressive Sensing 被引量:4
2
作者 Zhang Lingwen Tan Zhenhui 《China Communications》 SCIE CSCD 2010年第1期65-72,共8页
Ultra-wide-band (UWB) signals are suitable for localization, since their high time resolution can provide precise time of arrival (TOA) estimation. However, one major challenge in UWB signal processing is the requirem... Ultra-wide-band (UWB) signals are suitable for localization, since their high time resolution can provide precise time of arrival (TOA) estimation. However, one major challenge in UWB signal processing is the requirement of high sampling rate which leads to complicated signal processing and expensive hardware. In this paper, we present a novel UWB signal sampling method called UWB signal sampling via temporal sparsity (USSTS). Its sampling rate is much lower than Nyquist rate. Moreover, it is implemented in one step and no extra processing unit is needed. Simulation results show that USSTS can not recover the signal precisely, but for the use in localization, the accuracy of TOA estimation is the same as that in traditional methods. Therefore, USSTS gives a novel and effective solution for the use of UWB signals in localization. 展开更多
关键词 LOCALIZATION sampling Ultra-Wide-Band (UWB) SIGNAL COMPRESSIVE SENSING (CS)
下载PDF
Intrusion detection based on system calls and homogeneous Markov chains 被引量:8
3
作者 Tian Xinguang Duan Miyi +1 位作者 Sun Chunlai Li Wenfa 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第3期598-605,共8页
A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain ... A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems. 展开更多
关键词 intrusion detection Markov chain anomaly detection system call.
下载PDF
Behavior Measurement Model Based on Prediction and Control of Trusted Network 被引量:5
4
作者 Gong Bei Zhang Jianbiao +1 位作者 Shen Changxiang Zhang Xing 《China Communications》 SCIE CSCD 2012年第5期117-128,共12页
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation... In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones. 展开更多
关键词 广义预测控制 可信网络 计量模型 模型预测 行为 测量模型 最终用户 预测方程
下载PDF
2-D algebraic test for robust stability of time-delay systems with interval parameters 被引量:4
5
作者 Xiao Yang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期802-810,共9页
The robust stability test of time-delay systems with interval parameters can be concluded into the robust stability of the interval quasipolynomials. It has been revealed that the robust stability of the quasipolynomi... The robust stability test of time-delay systems with interval parameters can be concluded into the robust stability of the interval quasipolynomials. It has been revealed that the robust stability of the quasipolynomials depends on that of their edge polynomials. This paper transforms the interval quasipolynomials into two-dimensional (2-D) interval polynomials (2-D s-z hybrid polynomials), proves that the robust stability of interval 2-D polynomials are sufficient for the stability of given quasipolynomials. Thus, the stability test of interval quasipolynomials can be completed in 2-D s-z domain instead of classical 1-D s domain. The 2-D s-z hybrid polynomials should have different forms under the time delay properties of given quasipolynomials. The stability test proposed by the paper constructs an edge test set from Kharitonov vertex polynomials to reduce the number of testing edge polynomials. The 2-D algebraic tests are provided for the stability test of vertex 2-D polynomials and edge 2-D polynomials family. To verify the results of the paper to be correct and valid, the simulations based on proposed results and comparison with other presented results are given. 展开更多
关键词 automatic control theory time-delay systems robust stability 2-D algebraic test.
下载PDF
Security Model for Analyzing Data Privacy in Multipath Transport 被引量:2
6
作者 Song Fei Xue Miao Zhang Sidong 《China Communications》 SCIE CSCD 2012年第5期32-41,共10页
In order to investigate the enhancement of data privacy by distributing data packets via multiple paths,this paper formulates a security model and analyzes the privacy problem in multipath scenarios leveraging informa... In order to investigate the enhancement of data privacy by distributing data packets via multiple paths,this paper formulates a security model and analyzes the privacy problem in multipath scenarios leveraging information theoretic concept.Based on proposed model,a privacy function related to the path number is discussed.We heuristically recommend the optimal path number and analyze the tradeoff among the performance,resource consumption and privacy.For reducing the information leakage,the data schedule algorithms are also proposed.The analytical model can provide guidelines for the multipath protocol design. 展开更多
关键词 模型分析 安全模型 多径传输 隐私问题 路径分配 资源消耗 调度算法 协议设计
下载PDF
G-MER: Green Mobility Estimation- Based Routing Protocol in Wireless Sensor Network 被引量:3
7
作者 Quan Wei Guan Jianfeng +1 位作者 Xu Changqiao Zhang Hongke 《China Communications》 SCIE CSCD 2012年第5期10-21,共12页
As a core technology of Internet of Things(IoT),Wireless Sensor Network(WSN) has become a research hotspot recently.More and more WSNs are being deployed in highly mobile environments.The fast moving sensor nodes brin... As a core technology of Internet of Things(IoT),Wireless Sensor Network(WSN) has become a research hotspot recently.More and more WSNs are being deployed in highly mobile environments.The fast moving sensor nodes bring significant challenges for the routing decision.In this paper,we propose an efficient logical location method,and designe a mobility estimating metric and derive a novel Green Mobility Estimation-based Routing protocol(G-MER) for WSNs.We also set up a full framework to evaluate its performance.Simulation results illustrate that G-MER achieves a fairly better performance in terms of broadcast times and link failures than AODV.What's more,it decreases the mean hops by about 0.25 and reduces energy consumption by about 10% during the whole experiment.All the results show that G-MER can be effectively used in fast-moving and limited resource scenarios. 展开更多
关键词 无线传感器网络 路由协议 移动 估计 传感器节点 仿真结果 链路故障 播出时间
下载PDF
Empirical data decomposition and its applications in image compression 被引量:2
8
作者 Deng Jiaxian Wu Xiaoqin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期164-170,共7页
A nonlinear data analysis algorithm, namely empirical data decomposition (EDD) is proposed, which can perform adaptive analysis of observed data. Analysis filter, which is not a linear constant coefficient filter, i... A nonlinear data analysis algorithm, namely empirical data decomposition (EDD) is proposed, which can perform adaptive analysis of observed data. Analysis filter, which is not a linear constant coefficient filter, is automatically determined by observed data, and is able to implement multi-resolution analysis as wavelet transform. The algorithm is suitable for analyzing non-stationary data and can effectively wipe off the relevance of observed data. Then through discussing the applications of EDD in image compression, the paper presents a 2-dimension data decomposition framework and makes some modifications of contexts used by Embedded Block Coding with Optimized Truncation (EBCOT) . Simulation results show that EDD is more suitable for non-stationary image data compression. 展开更多
关键词 Image processing Image compression Empirical data decomposition NON-STATIONARY NONLINEAR Data decomposition framework
下载PDF
Detecting network intrusions by data mining and variable-length sequence pattern matching 被引量:2
9
作者 Tian Xinguang Duan Miyi +1 位作者 Sun Chunlai Liu Xin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期405-411,共7页
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux... Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance. 展开更多
关键词 intrusion detection anomaly detection system call data mining variable-length pattern
下载PDF
End-to-end rate-based congestion control with random loss:convergence and stability 被引量:2
10
作者 Sun Wei Tian Naishuo +1 位作者 Li Shiyong Guan Xinping 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第6期1208-1214,共7页
The convergence and stability analysis for two end-to-end rate-based congestion control algorithms with unavoidable random loss in packets are presented, which can be caused by, for example, errors on wireless links. ... The convergence and stability analysis for two end-to-end rate-based congestion control algorithms with unavoidable random loss in packets are presented, which can be caused by, for example, errors on wireless links. The convergence rates of these two algorithms are analyzed by linearizing them around their equilibrium points, since they are globally stable and can converge to their unique equilibrium points. Some sufficient conditions for local stability in the presence of round-trip delay are obtained based on the general Nyquist criterion of stability. The stability conditions can be considered to be more general. If random loss in the first congestion control algorithm is not considered, they reduce to the local stability conditions which have been obtained in some literatures. Furthermore, sufficient conditions for local stability of a new congestion control algorithm have also been obtained if random loss is not considered in the second congestion control algorithm. 展开更多
关键词 congestion control random loss DELAY CONVERGENCE STABILITY Nyquist criterion.
下载PDF
Convergence and stability of the Newton-Like algorithm with estimation error in optimization flow control 被引量:1
11
作者 Yang Jun Li Shiyong +1 位作者 Long Chengnian Guan Xinping 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第3期591-597,共7页
The Newton-Like algorithm with price estimation error in optimization flow control in network is analyzed. The estimation error is treated as inexactness of the gradient and the inexact descent direction is analyzed. ... The Newton-Like algorithm with price estimation error in optimization flow control in network is analyzed. The estimation error is treated as inexactness of the gradient and the inexact descent direction is analyzed. Based on the optimization theory, a sufficient condition for convergence of this algorithm with bounded price estimation error is obtained. Furthermore, even when this sufficient condition doesn't hold, this algorithm can also converge, provided a modified step size, and an attraction region is obtained. Based on Lasalle's invariance principle applied to a suitable Lyapunov function, the dynamic system described by this algorithm is proved to be global stability if the error is zero. And the Newton-Like algorithm with bounded price estimation error is also globally stable if the error satisfies the sufficient condition for convergence. All trajectories ultimately converge to the equilibrium point. 展开更多
关键词 flow control Newton-Like algorithm convergence global stability OPTIMIZATION Lyapunov function.
下载PDF
Numerical Analysis of the Rotational Magnetic Springs for EDS Maglev Train 被引量:1
12
作者 Gang Lv Yaqing Liu +1 位作者 Zhixuan Zhang Xiaodong Li 《CES Transactions on Electrical Machines and Systems》 CSCD 2022年第1期60-66,共7页
Different from the traditional railway trains,the combined levitation and guidance EDS maglev train is more likely to rotate after being disturbed.Therefore,the rotational electromagnetic stiffnesses are significant o... Different from the traditional railway trains,the combined levitation and guidance EDS maglev train is more likely to rotate after being disturbed.Therefore,the rotational electromagnetic stiffnesses are significant operating parameters for the train.In this paper,the different effects of each translational offset generated in the rotational motion on the corresponding rotational electromagnetic stiffnesses in the EDS maglev train are analyzed and calculated.Firstly,a three-dimensional model of the maglev train is established.Then,based on the space harmonic method and the equivalent circuit of the levitation and guidance circuits,the formulas of rolling,pitching and yawing stiffness are presented.Finally,by comparing with the three-dimensional finite element simulation results,the key translational displacements in the rotational motion which has a great impact on the stiffness are obtained.Hence,the three-dimensional analytical formula can be simplified and the computation can be reduced.In addition,the accuracy of the calculation results is verified by comparing with the experimental data of Yamanashi test line. 展开更多
关键词 Magnetic spring EDS maglev train electrodynamic rotational motion rolling stiffness pitching stiffness yawing stiffness
下载PDF
Receiver Detection Employing Semaphore in Cognitive Radio
13
作者 Wang Weidong Li Fan +2 位作者 Zhang Yinghai Wang Shoufeng Wang Yongtao 《China Communications》 SCIE CSCD 2010年第1期41-49,共9页
Interference from secondary users to primary users should be avoided in cognitive radio. However, it is difficult to solve the interference problem if the secondary users cannot get the information of the primary rece... Interference from secondary users to primary users should be avoided in cognitive radio. However, it is difficult to solve the interference problem if the secondary users cannot get the information of the primary receivers. Insufficient information of primary users would result in inaccurate spectrum detecting result. To deliver the information of primary users, Receiver Detection Employing Semaphore (ReDES) is proposed in this paper. Primary receiver informs secondary users of its licensed receive frequency according to semaphore architecture directly in ReDES. The semaphore is used to determine the spectrum holes by secondary users. Frequency mapping method is come up with as a realization of ReDES. The procedure and the detailed techniques are illustrated to make ReDES scheme reasonable and feasible. Simulation results show that the proposed scheme can effectively detect the frequencies of primary receivers, and improve the accuracy of spectrum detection. 展开更多
关键词 COGNITIVE RADIO RECEIVER detection hidden TERMINAL problem.
下载PDF
An Integrated Architecture for Vertical Handover Management
14
作者 Yan Zhiwei Zhou Huachun +1 位作者 Zhang Hongke Zhang Sidong 《China Communications》 SCIE CSCD 2010年第1期30-40,共11页
Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover man... Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover management architecture containing four modules is proposed and the multihoming technology is adopted to achieve Make-Before-Break vertical handover. Then the paper presents the performance analysis of the architecture and simulation in ns-2. The results substantiate the effi cacy of the architecture in improving the handover performance signifi cantly compared with the traditional Mobile IPv6 (MIPv6) based vertical handover. Besides, we design and implement this handover management architecture in our test-bed. The experimental results in a real network environment show that our proposed architecture can not only support the Make-before-break handover, but also guarantee the scalability because of the modulized design. 展开更多
关键词 MIH VERTICAL HANDOVER MULTIHOMING MCoA
下载PDF
DDFS spurious signals due to amplitude quantization in absence of phase-accumulator truncation
15
作者 Tian Xinguang Liu Xin +1 位作者 Chen Hong Duan Miyi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期485-492,共8页
Spurious signals in direct digital frequency synthesizers (DDFSs) are partly caused by amplitude quantization and phase truncation, which affect their application to many wireless telecommunication systems. These si... Spurious signals in direct digital frequency synthesizers (DDFSs) are partly caused by amplitude quantization and phase truncation, which affect their application to many wireless telecommunication systems. These signals are deterministic and periodic in the time domain, so they appear as line spectra in the frequency domain. Two types of spurious signals due to amplitude quantization are exactly formulated and compared in the time and frequency domains respectively. Then the frequency spectra and power levels of the spurious signals due to amplitude quantization in the absence of phase-accumulator truncation are emphatically analyzed, and the effects of the DDFS parameter variations on the spurious signals are thoroughly studied by computer simulation. And several important conclusions are derived which can provide theoretical support for parameter choice and spurious performance evaluation in the application of DDFSs. 展开更多
关键词 spurious signal direct digital frequency synthesizer amplitude quantization phase truncation power level.
下载PDF
Experimental Study on Friction Reducing and Anti Wear Property of a Water-Based Lubricant with Polyether Added 被引量:3
16
作者 Zhang Chaohui Liu Sisi Liu Junming 《稀有金属材料与工程》 SCIE EI CAS CSCD 北大核心 2012年第S1期276-279,共4页
The wear behaviors of steel-steel pair on condition of a water-based lubricant with copolymer of acylamino polyoxyethylene polyoxypropylene ether(KE-1)included as additives are investigated with the help of the univer... The wear behaviors of steel-steel pair on condition of a water-based lubricant with copolymer of acylamino polyoxyethylene polyoxypropylene ether(KE-1)included as additives are investigated with the help of the universal micro-tribotester.Tests on friction and wear are carried out.As a reference,some tests with pure water are also performed for comparison.The results show that the prepared water-based lubricant has a good effect on the characteristics associated with friction reducing and anti-wear processes,which lay some credence to its utilization in practical industrial tribo-systems. 展开更多
关键词 acylamino-polyoxyethylene-polyoxypropylene-ether WATER-BASED LUBRICANT ANTI-WEAR property
原文传递
Au doping effects on electrical and optical properties of vanadium dioxides 被引量:2
17
作者 YaBin Zhu Fan He Jie Na 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2012年第3期409-412,共4页
钒二氧化物在正常玻璃底层使用反应收音机频率(RF ) 磁控管劈啪作响上被制作。生长参数系统地被调查的氧流动卷和退火的温度。VO2 和 Au 的电、光的性质: 有不同生长条件的 VO2 薄电影被讨论。半导体金属阶段转变温度在 10
关键词 钒氧化物 金掺杂 光学性质 电学 二氧化钒薄膜 光学性能 VO2薄膜 玻璃基板
原文传递
Altered regional homogeneity in spontaneous cluster headache attacks: a resting-state functional magnetic resonance imaging study 被引量:5
18
作者 Qiu En-chao Yu Sheng-yuan +3 位作者 Liu Ruo-zhuo Wang Yan Ma Lin Tian Li-xia 《Chinese Medical Journal》 SCIE CAS CSCD 2012年第4期705-709,共5页
Background Functional neuroimaging study has opened an avenue for exploring the pathophysiology of cluster headache (CH).The aim of our study was to assess the changes in brain activity in CH patients by the regiona... Background Functional neuroimaging study has opened an avenue for exploring the pathophysiology of cluster headache (CH).The aim of our study was to assess the changes in brain activity in CH patients by the regional homogeneity method using resting-state functional magnetic resonance imaging technique.Methods The functional magnetic resonance imaging scans were obtained for 12 male CH patients with spontaneous right-sided headache attacks during “in attack” and “out of attack” periods and 12 age- and sex-matched normal controls.The data were analyzed to detect the altered brain activity by the regional homogeneity method using statistical parametric mapping software.Results Altered regional homogeneity was detected in the anterior cingulate cortex,the posterior cingulate cortex,the prefrontal cortex,insular cortex,and other brain regions involved in pain processing and modulation among different groups.Conclusion It is referred that these brain regions with altered regional homogeneity might be related to the pain processing and modulation of CH. 展开更多
关键词 cluster headache functional magnetic resonance imaging resting state regional homogeneity
原文传递
A sufficient condition on upper embeddability of graphs
19
作者 Cai JunLiang Dong GuangHua Liu YanPei 《Science China Mathematics》 SCIE 2010年第5期340-347,共8页
In this paper we mainly prove that let G be a(k+1)-edge-connected simple graph of order n with girth g.Then G is upper embeddable if for any independent set I(G) = {vi | 1 i k2 + 2},k = 0,1,2 and the lower bound is ti... In this paper we mainly prove that let G be a(k+1)-edge-connected simple graph of order n with girth g.Then G is upper embeddable if for any independent set I(G) = {vi | 1 i k2 + 2},k = 0,1,2 and the lower bound is tight. 展开更多
关键词 MAXIMUM GENUS CONNECTED graph GIRTH UPPER embeddable
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部