We present a scheme for teleporting an unknown arbitrary two-particle state from a sender to either one of two receivers. The quantum channel is composed of two partial entangled three-particle GHZ states. An unknown ...We present a scheme for teleporting an unknown arbitrary two-particle state from a sender to either one of two receivers. The quantum channel is composed of two partial entangled three-particle GHZ states. An unknown arbitrary two-particle state can be perfectly teleported probabilistically if the sender performs two generalized Bell-state measurements and each receiver introduces an appropriate unitary transformation with the help of the other receiver's Hadamard operations and simple measurements.展开更多
A theory model is established to describe the voltage-current responsefunction. The peak amplitude and the zero-crossing time of the transient signal is extracted as theimaging features, array pulsed eddy current (PEC...A theory model is established to describe the voltage-current responsefunction. The peak amplitude and the zero-crossing time of the transient signal is extracted as theimaging features, array pulsed eddy current (PEC) imaging is proposed to detect corrosion. The testresults show that this system has the advantage of fast scanning speed, different imaging mode andquantitative detection, it has a broad application in the aviation nondestructive testing.展开更多
To describe the dynamic propcrty of trust relationship, wt propose atime-related trust model and extend Joang's subjective logic to fit for time-related trust model.The extension includes prepositional conjunction...To describe the dynamic propcrty of trust relationship, wt propose atime-related trust model and extend Joang's subjective logic to fit for time-related trust model.The extension includes prepositional conjunction, disjunction and negation for traditional logic anddiscounting and consensus operators that are evidential operators specially designed for thepropagation and computation of trust relationships. With the extension of subjective logic fortime-related trust, our time-related trust modelis suitable to model the dynamic trust relationshipin practice. Finally an example of reputation assessment is offered to demonstrate the usage of ourtrust model.展开更多
When the returns come from two or more unresolved targets (the signals are not resolved in the frequency or time domains) in a monopulse radar system, the direction-of-arrival (DOA)estimate indicated by the monopulse ...When the returns come from two or more unresolved targets (the signals are not resolved in the frequency or time domains) in a monopulse radar system, the direction-of-arrival (DOA)estimate indicated by the monopulse ratio is not the true information of the tracked target.Then the tracking systems is influenced. An approach has been proposed to detect whether the returns come from a single target or two unresolved targets. The above approach is extended from two to three unresolved targets. The simulation indicates that the detection probability under the three unresolved targets is not sure to exceed the detection probability under the two unresolved targets.展开更多
By using the spectrum expanding theory of random processes and Hudson's crack model,we developed a random medium model for rocks with spatial random distributed number density of cracks. This model could connect t...By using the spectrum expanding theory of random processes and Hudson's crack model,we developed a random medium model for rocks with spatial random distributed number density of cracks. This model could connect the micro-parameters of the cracks with the macro- mechanical properties, and can be effectively applied to model the real inhomogeneous medium. Numerical example indicates that the random distribution characters could be different for different elastic constants under the same random distribution of number density of cracks. By changing the value of the autocorrelation length pair, it is possible to model the difference of the distribution in the two coordinate directions. Numerical modeling results for seismic wave propagating in rocks with random distributed fractures using a staggered high-order finite-difference (SHOFD) are also presented.展开更多
A Web page typically contains many information blocks. Apart from the main content blocks, it usually has such blocks as navigation panels, copyright and privacy notices, and advertisements. We call these blocks the n...A Web page typically contains many information blocks. Apart from the main content blocks, it usually has such blocks as navigation panels, copyright and privacy notices, and advertisements. We call these blocks the noisy blocks. The noises in Web pages can seriously harm Web data mining. To the question of climinating these noises, we intro duce a new tree structure, called Style Tree, and study an algorithm how to construct a site style tree. The Style Tree Model is employed to detect and climinate noises in any Web pages of the site. An information based measure to determine which element node is noisy is also constructed. In addition, the applications of this method are discussed in detail. Experimental results show that our noises climination technique is able to improve the mining results significantly. Key words noises climination - DOM tree - style tree - Web mining CLC number TP 339 Foundation item: Supported by the National Natural Science Foundation of China (60003013)Biography: ZHAN Cheng-li (1979-), male, Master candidate, research direction: Intelligent Information System.展开更多
The concept and advantage of reconfigurable technology is introduced. A kind of processor architecture of re configurable macro processor (RMP) model based on FPGA array and DSP is put forward and has been implemented...The concept and advantage of reconfigurable technology is introduced. A kind of processor architecture of re configurable macro processor (RMP) model based on FPGA array and DSP is put forward and has been implemented. Two image algorithms are developed: template-based automatic target recognition and zone labeling. One is estimating for motion direction in the infrared image background, another is line picking-up algorithm based on image zone labeling and phase grouping technique. It is a kind of 'hardware' function that can be called by the DSP in high-level algorithm. It is also a kind of hardware algorithm of the DSP. The results of experiments show the reconfigurable computing technology based on RMP is an ideal accelerating means to deal with the high-speed image processing tasks. High real time performance is obtained in our two applications on RMP.展开更多
Time synchronous averaging of vibration data is a fundament technique forgearbox diagnosis. Currently, this technique relies on hardware tachometer to give phase synchronousinformation. Empirical mode decomposition (E...Time synchronous averaging of vibration data is a fundament technique forgearbox diagnosis. Currently, this technique relies on hardware tachometer to give phase synchronousinformation. Empirical mode decomposition (EMD) is introduced to replace time synchronous averagingof gearbox vibration signal. With it, any complicated dataset can be decomposed into a finite andoften small number of intrinsic mode functions (IMF). The key problem is how to assure thatvibration signals deduced by gear defects could be sifted out by EMD. The characteristic vibrationsignals of gear defects are proved IMFs, which makes it possible to utilize EMD for the diagnosis ofgearbox faults. The method is validated by data from recordings of the vibration of a single-stagespiral bevel gearbox with fatigue pitting. The results show EMD is powerful to extractcharacteristic information from noisy vibration signals.展开更多
In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (...In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (k, n) threshold cryptography, Each node, whetherclusterhead or ordinary member, holds a share of the global certificate, and any k nodes cancommunicate securely. There is no need for any clusterhead to execute extra functions more thanrouting. Our scheme needs some prior configuration before deployment, and can be used in criticalenvironment with small scale. The security-enhancement for Lowest-ID algorithm can also be appliedinto other clustering approaches with minor modification. The feasibility of this method wasverified bythe simulation results.展开更多
A new configuration of a virtual cathode oscillator (VCO), i.e., a quasi-optical cavity VCO, is proposed for high-power microwave generation. The analysis and simulation are carried out to investigate the characterist...A new configuration of a virtual cathode oscillator (VCO), i.e., a quasi-optical cavity VCO, is proposed for high-power microwave generation. The analysis and simulation are carried out to investigate the characteristics of thisconfiguration. In the numerical simulation, the microwave output power of 2.93 GW is obtained with an electronbeam of 610 keV in electron energy and 26.7kA in the beam current. The beam-to-microwave power efficiency is18%. The frequency is 17.5 GHz, and the output microwave mode is TEM10.展开更多
Aiming to deficiency of the filter and wrapper feature selection methods, anew method based on composite method of filter and wrapper method is proposed. First the methodfilters original features to form a feature sub...Aiming to deficiency of the filter and wrapper feature selection methods, anew method based on composite method of filter and wrapper method is proposed. First the methodfilters original features to form a feature subset which can meet classification correctness rate,then applies wrapper feature selection method select optimal feature subset. A successful techniquefor solving optimization problems is given by genetic algorithm (GA). GA is applied to the problemof optimal feature selection. The composite method saves computing time several times of the wrappermethod with holding the classification accuracy in data simulation and experiment on bearing faultfeature selection. So this method possesses excellent optimization property, can save more selectiontime, and has the characteristics of high accuracy and high efficiency.展开更多
A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to ...A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to sorting minutiae in order to speed up searching a minutia when pairing minutiae. The experimental result reveals that this method achieves improved recognition accuracy. Key words fingerprint matching - ridge-based minutiae matching - local relative orientation field - sorting minutiae CLC number TP 391 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: ZHU En (1976-), male, Ph. D candidate, research direction: pattern recognition, image processing and information security.展开更多
We propose a scheme to probabilistically teleport an unknown arbitrary three-level two-particle state by using two partial entangled two-particle states of three-level as the quantum channel. The classical communicati...We propose a scheme to probabilistically teleport an unknown arbitrary three-level two-particle state by using two partial entangled two-particle states of three-level as the quantum channel. The classical communication cost required in the ideal probabilistic teleportation process is also calculated. This scheme can be directly generalized to teleport an unknown and arbitrary three-level K-particle state by using K partial entangled two-particle states of three-level as the quantum channel.展开更多
Due to the calculation problem of classical methods (such as Lyapunovexponent) for chaotic behavior, a new method of identifying nonlinear dynamics with higher-ordertime-frequency entropy (HOTFE) based on time-frequen...Due to the calculation problem of classical methods (such as Lyapunovexponent) for chaotic behavior, a new method of identifying nonlinear dynamics with higher-ordertime-frequency entropy (HOTFE) based on time-frequency analysis and information theorem is proposed.Firstly, the meaning of HOTFE is defined, and then its validity is testified by numericalsimulation. In the end vibration data from rotors are analyzed by HOTFE. The results demonstratethat it can indeed identify the early rub-impact chaotic behavior in rotors and also is simpler tocalculate than previous methods.展开更多
Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess ...Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess request is also given. In this model, we give themeasure of trustworthiness factor to access request- by using some idea of uncertainty reasoning ofexpert system, present and prove the parallel propagation formula of request trustworthiness factoramong multiple policies, and get thefinal trustworthiness factor to decide whether authorizing. Inthis model, authorization decision is given according to the calculation of request trustworthinessfactor, which is more understandable, more suitable for real requirement and more powerfulforsecurity enhancement than traditional methods. Meanwhile the finer access control granularity isanother advantage.展开更多
We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subje...We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subject to delay constraint on the aggregating path. We show that this problem is NP-hard and propose approximation algorithm proving the approximation ratio with lnm+1, where is the number of monitoring nodes. At last we extend our modal with more constraint of bounded delay variation. Key words network - distributed monitoring - delay constraint - NP-hard CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: LIU Xiang-hui(1973-), male, Ph. D. candidate, research direction: algorithm complexity analysis, QoS in Internet.展开更多
This letter investigates an efficient design procedure integrating the Genetic Algorithm (GA) with the Finite Difference Time Domain (FDTD) for the fast optimal design of Smart Antenna Arrays (SAA). The FDTD is used t...This letter investigates an efficient design procedure integrating the Genetic Algorithm (GA) with the Finite Difference Time Domain (FDTD) for the fast optimal design of Smart Antenna Arrays (SAA). The FDTD is used to analyze SAA with mutual coupling. Then,on the basis of the Maximal Signal to Noise Ratio (MSNR) criteria, the GA is applied to the optimization of weighting elements and structure of SAA. Finally, the effectiveness of the analysis is evaluated by experimental antenna arrays.展开更多
文摘We present a scheme for teleporting an unknown arbitrary two-particle state from a sender to either one of two receivers. The quantum channel is composed of two partial entangled three-particle GHZ states. An unknown arbitrary two-particle state can be perfectly teleported probabilistically if the sender performs two generalized Bell-state measurements and each receiver introduces an appropriate unitary transformation with the help of the other receiver's Hadamard operations and simple measurements.
文摘A theory model is established to describe the voltage-current responsefunction. The peak amplitude and the zero-crossing time of the transient signal is extracted as theimaging features, array pulsed eddy current (PEC) imaging is proposed to detect corrosion. The testresults show that this system has the advantage of fast scanning speed, different imaging mode andquantitative detection, it has a broad application in the aviation nondestructive testing.
文摘To describe the dynamic propcrty of trust relationship, wt propose atime-related trust model and extend Joang's subjective logic to fit for time-related trust model.The extension includes prepositional conjunction, disjunction and negation for traditional logic anddiscounting and consensus operators that are evidential operators specially designed for thepropagation and computation of trust relationships. With the extension of subjective logic fortime-related trust, our time-related trust modelis suitable to model the dynamic trust relationshipin practice. Finally an example of reputation assessment is offered to demonstrate the usage of ourtrust model.
文摘When the returns come from two or more unresolved targets (the signals are not resolved in the frequency or time domains) in a monopulse radar system, the direction-of-arrival (DOA)estimate indicated by the monopulse ratio is not the true information of the tracked target.Then the tracking systems is influenced. An approach has been proposed to detect whether the returns come from a single target or two unresolved targets. The above approach is extended from two to three unresolved targets. The simulation indicates that the detection probability under the three unresolved targets is not sure to exceed the detection probability under the two unresolved targets.
文摘By using the spectrum expanding theory of random processes and Hudson's crack model,we developed a random medium model for rocks with spatial random distributed number density of cracks. This model could connect the micro-parameters of the cracks with the macro- mechanical properties, and can be effectively applied to model the real inhomogeneous medium. Numerical example indicates that the random distribution characters could be different for different elastic constants under the same random distribution of number density of cracks. By changing the value of the autocorrelation length pair, it is possible to model the difference of the distribution in the two coordinate directions. Numerical modeling results for seismic wave propagating in rocks with random distributed fractures using a staggered high-order finite-difference (SHOFD) are also presented.
文摘A Web page typically contains many information blocks. Apart from the main content blocks, it usually has such blocks as navigation panels, copyright and privacy notices, and advertisements. We call these blocks the noisy blocks. The noises in Web pages can seriously harm Web data mining. To the question of climinating these noises, we intro duce a new tree structure, called Style Tree, and study an algorithm how to construct a site style tree. The Style Tree Model is employed to detect and climinate noises in any Web pages of the site. An information based measure to determine which element node is noisy is also constructed. In addition, the applications of this method are discussed in detail. Experimental results show that our noises climination technique is able to improve the mining results significantly. Key words noises climination - DOM tree - style tree - Web mining CLC number TP 339 Foundation item: Supported by the National Natural Science Foundation of China (60003013)Biography: ZHAN Cheng-li (1979-), male, Master candidate, research direction: Intelligent Information System.
文摘The concept and advantage of reconfigurable technology is introduced. A kind of processor architecture of re configurable macro processor (RMP) model based on FPGA array and DSP is put forward and has been implemented. Two image algorithms are developed: template-based automatic target recognition and zone labeling. One is estimating for motion direction in the infrared image background, another is line picking-up algorithm based on image zone labeling and phase grouping technique. It is a kind of 'hardware' function that can be called by the DSP in high-level algorithm. It is also a kind of hardware algorithm of the DSP. The results of experiments show the reconfigurable computing technology based on RMP is an ideal accelerating means to deal with the high-speed image processing tasks. High real time performance is obtained in our two applications on RMP.
文摘Time synchronous averaging of vibration data is a fundament technique forgearbox diagnosis. Currently, this technique relies on hardware tachometer to give phase synchronousinformation. Empirical mode decomposition (EMD) is introduced to replace time synchronous averagingof gearbox vibration signal. With it, any complicated dataset can be decomposed into a finite andoften small number of intrinsic mode functions (IMF). The key problem is how to assure thatvibration signals deduced by gear defects could be sifted out by EMD. The characteristic vibrationsignals of gear defects are proved IMFs, which makes it possible to utilize EMD for the diagnosis ofgearbox faults. The method is validated by data from recordings of the vibration of a single-stagespiral bevel gearbox with fatigue pitting. The results show EMD is powerful to extractcharacteristic information from noisy vibration signals.
基金Supported by the National High Technology Re search and Development Program of China (2003AA142080)
文摘In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (k, n) threshold cryptography, Each node, whetherclusterhead or ordinary member, holds a share of the global certificate, and any k nodes cancommunicate securely. There is no need for any clusterhead to execute extra functions more thanrouting. Our scheme needs some prior configuration before deployment, and can be used in criticalenvironment with small scale. The security-enhancement for Lowest-ID algorithm can also be appliedinto other clustering approaches with minor modification. The feasibility of this method wasverified bythe simulation results.
文摘A new configuration of a virtual cathode oscillator (VCO), i.e., a quasi-optical cavity VCO, is proposed for high-power microwave generation. The analysis and simulation are carried out to investigate the characteristics of thisconfiguration. In the numerical simulation, the microwave output power of 2.93 GW is obtained with an electronbeam of 610 keV in electron energy and 26.7kA in the beam current. The beam-to-microwave power efficiency is18%. The frequency is 17.5 GHz, and the output microwave mode is TEM10.
基金This project is supported by Scientific Research Foundation of National Defence of China (No.41319040202).
文摘Aiming to deficiency of the filter and wrapper feature selection methods, anew method based on composite method of filter and wrapper method is proposed. First the methodfilters original features to form a feature subset which can meet classification correctness rate,then applies wrapper feature selection method select optimal feature subset. A successful techniquefor solving optimization problems is given by genetic algorithm (GA). GA is applied to the problemof optimal feature selection. The composite method saves computing time several times of the wrappermethod with holding the classification accuracy in data simulation and experiment on bearing faultfeature selection. So this method possesses excellent optimization property, can save more selectiontime, and has the characteristics of high accuracy and high efficiency.
文摘A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to sorting minutiae in order to speed up searching a minutia when pairing minutiae. The experimental result reveals that this method achieves improved recognition accuracy. Key words fingerprint matching - ridge-based minutiae matching - local relative orientation field - sorting minutiae CLC number TP 391 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: ZHU En (1976-), male, Ph. D candidate, research direction: pattern recognition, image processing and information security.
文摘We propose a scheme to probabilistically teleport an unknown arbitrary three-level two-particle state by using two partial entangled two-particle states of three-level as the quantum channel. The classical communication cost required in the ideal probabilistic teleportation process is also calculated. This scheme can be directly generalized to teleport an unknown and arbitrary three-level K-particle state by using K partial entangled two-particle states of three-level as the quantum channel.
文摘Due to the calculation problem of classical methods (such as Lyapunovexponent) for chaotic behavior, a new method of identifying nonlinear dynamics with higher-ordertime-frequency entropy (HOTFE) based on time-frequency analysis and information theorem is proposed.Firstly, the meaning of HOTFE is defined, and then its validity is testified by numericalsimulation. In the end vibration data from rotors are analyzed by HOTFE. The results demonstratethat it can indeed identify the early rub-impact chaotic behavior in rotors and also is simpler tocalculate than previous methods.
文摘Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess request is also given. In this model, we give themeasure of trustworthiness factor to access request- by using some idea of uncertainty reasoning ofexpert system, present and prove the parallel propagation formula of request trustworthiness factoramong multiple policies, and get thefinal trustworthiness factor to decide whether authorizing. Inthis model, authorization decision is given according to the calculation of request trustworthinessfactor, which is more understandable, more suitable for real requirement and more powerfulforsecurity enhancement than traditional methods. Meanwhile the finer access control granularity isanother advantage.
文摘We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subject to delay constraint on the aggregating path. We show that this problem is NP-hard and propose approximation algorithm proving the approximation ratio with lnm+1, where is the number of monitoring nodes. At last we extend our modal with more constraint of bounded delay variation. Key words network - distributed monitoring - delay constraint - NP-hard CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: LIU Xiang-hui(1973-), male, Ph. D. candidate, research direction: algorithm complexity analysis, QoS in Internet.
文摘This letter investigates an efficient design procedure integrating the Genetic Algorithm (GA) with the Finite Difference Time Domain (FDTD) for the fast optimal design of Smart Antenna Arrays (SAA). The FDTD is used to analyze SAA with mutual coupling. Then,on the basis of the Maximal Signal to Noise Ratio (MSNR) criteria, the GA is applied to the optimization of weighting elements and structure of SAA. Finally, the effectiveness of the analysis is evaluated by experimental antenna arrays.