• Volume 35,Issue 8,2012 Table of Contents
    Select All
    Display Type: |
    • Simulation model on the radiated electromagnetic interference of wiper motor inside automobile

      2012, 35(8):1-5. DOI: 10.11835/j.issn.1000-582X.2012.08.001

      Abstract (2622) HTML (0) PDF 2.70 M (1495) Comment (0) Favorites

      Abstract:The radiated electromagnetic interference (EMI)simulation model of the wiper motor inside automobile is presented by using simulation software HFSS. The radiated EMI theory of the wiper motor is analyzed and the radiated EMI simulation model of the wiper motor inside automobile is established. Automobile body is broken down into several simple modules whose key point coordinates are extracted from the imported CAD model,then these modules’ initial meshing are generated and combined into the finite element mesh model of automobile. The simulation results can be obtained with enough accuracy requirements through adaptive meshing. The simulation results coincide well with experimental results, which shows that the established simulation model is correct and it can be used for predicting the radiated EMI of the wiper motor inside automobile. This research method has high versatility and a good reference value for the radiated EMI simulation of other electrical components or subsystem inside automobile.

    • Operating analysis on finite volume of lake water source heat pump in winter heating

      2012, 35(8):6-10. DOI: 10.11835/j.issn.1000-582X.2012.08.002

      Abstract (1916) HTML (0) PDF 1.04 M (1051) Comment (0) Favorites

      Abstract:The feasibility of the main teaching building of Chongqing University additional lake water source heat pump during the winter heating is analyzed and the water temperature and quality of the artificial lake are determined,that the water is more serious eutrophication,and it must be purified before the water enters heat exchangers. Heat carrying capacity of lake is analyzed and hourly temperature of the lake is simulated during the winter heating operating conditions. When the average temperature is 5~8 ℃in January in Chongqing,the lake as an evaporator cycle water provide energy to heat pump constantly,assumed initial temperature of water is 13.7 ℃,hourly water temperature is simulated in January. The water temperature has dropped to 4.04 ℃ at 24 d,the evaporator surface may be frozen and cause the phenomenon of ice clogging,which will endanger the safety of heat transfer equipment,therefore,auxiliary heater must be set to ensure the main building heating.

    • Analysis of comprehensive evaluation method on safety of mountain tunnel initial support

      2012, 35(8):11-16. DOI: 10.11835/j.issn.1000-582X.2012.08.003

      Abstract (2120) HTML (0) PDF 1.58 M (1207) Comment (0) Favorites

      Abstract:Through collecting and collating information of 62 tunnels with initial support fracture,the risk grade is summed up,the factors causing initial support fracture are divided into two types:objective factors and subjective factors. The statistical results show that the proportion of controlled subjective factors’ reached as large as 25%. The comprehensive evaluation model on safety of mountain tunnel initial support by analytic hierarchy process (AHP)and fuzzy comprehensive evaluation is established. On this basis,the science rational risk response method is required. Then the evaluation model is proved credible by field measurements.

    • Influence of carbon content of carbonyl iron powder on MR effect of magnetorheological elastomer

      2012, 35(8):17-21. DOI: 10.11835/j.issn.1000-582X.2012.08.004

      Abstract (3210) HTML (0) PDF 2.39 M (1300) Comment (0) Favorites

      Abstract:Magnetorheological elastomer(MRE)is the solid analog of MR fluid,there are several problems limit the practical application of MRE,such as low MR effect. According to the fact that carbon content of carbonyl iron powder(CIP)affect the maximum permeability of CIP,this paper studies the influence of carbon content of CIP on MR effect of MRE. The MRE samples are fabricated by silicone rubber and CIP with different carbon content. A dynamic mechaical analyzer is modified to characterize dynamic mechanical properities of MRE samples. Experimental result shows MR effect has an increasing tendency with the decreasing of carbon content.

    • Microstructure and properties of Mg Gd Y Zr Zn magnesium alloy with lower Gd content

      2012, 35(8):22-25. DOI: 10.11835/j.issn.1000-582X.2012.08.005

      Abstract (2589) HTML (0) PDF 2.29 M (1121) Comment (0) Favorites

      Abstract:Aiming at Mg Gd magnesium alloy with higher Gd amount may lead to the increase of cost and specific gravity,Mg 6Gd 3Y 0.4Zr x Zn alloys are prepared by solvent protection,Zn content is 1%、1.5%、2% respectively. The microstructures and mechanical properties of alloys are studied by optical microscope (OM)and scanning electron microscope (SEM),after solid solution treatment,hot extrusion and 200 ℃ aging treatment. The results show that after 200 ℃ aging treatment,the second phases in alloys have better refinement and distribution uniformity than those in solid solution state alloys,the tensile strength and yield strength of Mg 6Gd 3Y 0.4Zr 2Zn magnesium alloy is 403MPa and 336MPa,the elongation is 7.0%,the mechanical properties reached or approached those of Mg Gd Y magnesium alloy with higher Gd amount.

    • Study on static mechanics of long span suspension bridge with CFRP cable

      2012, 35(8):26-33. DOI: 10.11835/j.issn.1000-582X.2012.08.006

      Abstract (1926) HTML (0) PDF 5.45 M (1029) Comment (0) Favorites

      Abstract:This paper proposes an analysis method for the static mechanics of suspension bridges based on segmental catenary and FEM software. A comparative research on mechanics of suspension bridge with a span of 2 000~5 000 m is conducted according to the proposed method,and CFRP suspension bridges are proved advantageous and practicable. A parametric study for the deflection performance of 2 000 m CFRP suspension bridge is executed in order to enhance its stiffness,where the span arrangement,rise to span ratio,side to main span ratio,inertia of girder and tower,and the central buckle are considered,respectively. A serials of design suggestions for improving the structural stiffness are proposed.

    • Chaotic clone optimization algorithm based on equivalent division strategy

      2012, 35(8):34-41. DOI: 10.11835/j.issn.1000-582X.2012.08.007

      Abstract (2165) HTML (0) PDF 3.37 M (1046) Comment (0) Favorites

      Abstract:The way of clonal selection algorithm randomly generated population that will easily lead to numbers of non uniform distribution of values in the solution space, thus increasing the data redundancy phenomenon.To overcome the shortcomings of clonal selection algorithm, a chaotic clonal optimization algorithm for function optimizing is proposed by combining clonal selection algorithm, chaos optimization. This algorithm uses chaotic characteristics randomness, ergodicity and regularity to avoid trapping around local optimal. Equivalent division strategy is introduced by reducing the possible data redundancy phenomenon. The simulation results show that the proposed algorithm can converge to the global optimum at quicker rate in a given range.

    • Design of Linux password high speed crack model on FPGA

      2012, 35(8):42-47. DOI: 10.11835/j.issn.1000-582X.2012.08.008

      Abstract (2546) HTML (0) PDF 1.69 M (1381) Comment (0) Favorites

      Abstract:In order to improve the crack speed of linux password, the crack core design idea based on dataflow is proposed. After analyzing core crack module MD5 of linux, three crack models are designed, and their ALMs consumption and run speed are analyzed. Under the structure of full pipeline, based on the idea of dataflow, the Linux crack core is designed to crack linux password fast. Experimental results show that while cracking linux password on FPGA of EP4CE40F29C8, the speed can reach up to 24.95 million/s. In the framework of fully pipeline, the idea based on dataflow makes all the pipeline data blocks in efficient working condition. Linux password crack speed increases greatly.

    • Research on pitch cone design for beveloid gears with crossed axes

      2012, 35(8):48-53. DOI: 10.11835/j.issn.1000-582X.2012.08.009

      Abstract (2364) HTML (0) PDF 2.94 M (1155) Comment (0) Favorites

      Abstract:Based on the spatial gearing theory, the mathematical model for working pitch cone design of crossed beveloid gears is created. The formulas to determine the transition from point contact to line contact are derived. The direct and in direct methods for pitch cone design of crossed beveloid gears are proposed. The effects of gearing parameters on the angle between the first principle directions are analyzed. The loaded tooth contact analysis is performed using FEM theory. The conclusion indicates that: the angle between the first principle directions is more sensitive to cone angles than to the helix angle. The increase of the angle between the first principle directions can obtain smaller contact area, higher transmission error and lower mesh stiffness. A practical tooth bearing test is conducted to demonstrate the proposed design procedure and the experimental result compared well with the simulation. For the matching design and optimization of beveloid gears, it has both the theoretical and project practical significance.

    • Dynamic signatures method for analysis of vehicle bridge resonance

      2012, 35(8):54-61. DOI: 10.11835/j.issn.1000-582X.2012.08.010

      Abstract (1990) HTML (0) PDF 3.24 M (1126) Comment (0) Favorites

      Abstract:The dynamic behavior of railway bridges (dynamic deflection and acceleration) is one of the running safety control indices for high speed trains. Therefore, the dynamic behavior of railway bridges is studied based on the concept of the dynamic signatures of the train and the bridge. By simplifying the train excitation as a series of moving concentrated forces, the mathematical expressions of the dynamic signatures of the train are obtained through theoretical derivations, and then a method is presented for calculating the resonance speed of trains and the maximum vertical acceleration of the bridge. With this method, the dynamic responses of the simple supported bridge can be calculated quickly. The feasibility of this method is validated through some examples, in which the resonance mechanism of train bridge system and the influencing factors are investigated. In addition, the effect of high frequency components to the bridge acceleration is also analyzed.

    • Audio blind watermarking scheme combined DWT DCT QR

      2012, 35(8):62-66. DOI: 10.11835/j.issn.1000-582X.2012.08.011

      Abstract (1988) HTML (0) PDF 1.49 M (1222) Comment (0) Favorites

      Abstract:In order to protect the copyright of digital audio and video in Internet, we propose a novel audio blind watermarking scheme combined discrete wavelets transform, discrete cosine transform, QR decomposition and audio characteristics. In this algorithm, the audio are split into blocks, and each block are decomposed on two dimensional discrete wavelet transform (DWT), then the approximate sub band coefficients are decomposed on discrete cosine transform (DCT), and the first quarter of the DCT coefficients are decomposed on QR decomposition and get a triangle matrix. At last, the watermarking information is embedded into the triangle matrix. The experiments show that the algorithm can get better balance between transparency and robustness of watermark, and it has strong robustness against the common audio signal processing such as additive white Gaussian noise, re sampling, re quantization, low pass filter, MP3 compression and cutting replacement.

    • Design of a high performance optic to electrical array for visual recovery

      2012, 35(8):67-71. DOI: 10.11835/j.issn.1000-582X.2012.08.012

      Abstract (2073) HTML (0) PDF 2.59 M (1038) Comment (0) Favorites

      Abstract:A high performance optic to electrical array for visual recovery is proposed by imitating the mechanisms of photoreceptor in a human retina. The array can transform the incident natural light into a pulse signal, which pulse width is a constant and frequency is proportional to the light intensity. Design and verification of the chip has been completed in standard 0.5 μm CMOS process. Unique structures and methods are employed to optimize several key parameters and obtained higher performance. The pulse width is 0.13 ms and the pixel acquires 70 dB dynamic range, thus it can work reliably in common natural light scope. The pixel size is about 53 μm×50 μm and the power consumption is 0.62~1.46 μA per pixel. The experimental results show that the presented optic to electrical array is suitable to be high density integrated and to be wireless radio frequency powered, and therefore more suited for retinal prosthesis.

    • Prognoses of inlet water quality via QSOM in wastewater treatment processes

      2012, 35(8):72-79. DOI: 10.11835/j.issn.1000-582X.2012.08.013

      Abstract (2118) HTML (0) PDF 3.97 M (1096) Comment (0) Favorites

      Abstract:A quantum self organizing feature map neural network (QSOM) method is introduced for water quality prediction in activated sludge wastewater treatment processes which includes uncertainty of microbial activity and complexity of biochemical reactions and strong lagging of parameters. This approach quantizes the inlet water quality data corresponding outlet water in abnormal state and makes the quantized data sample as the input of QSOM. The correlation coefficient of the quantum inputs and its weights are calculated as the best inputs matching of network by using quantum gates to update the weights in learning the rules. The experiments illustrate the efficiency of this prediction approach by using operational data of Chongqing Jiguanshi wastewater treatment plant.

    • Regional distribution and exploitation potential of wind energy in the north piedmont economic zone of the Tianshan Mountains

      2012, 35(8):80-86. DOI: 10.11835/j.issn.1000-582X.2012.08.014

      Abstract (1795) HTML (0) PDF 2.65 M (931) Comment (0) Favorites

      Abstract:The parameters of wind energy resources at 10 meters above the ground are calculated based on the data from 27 meteorological stations in the north piedmont economic zone of the Tianshan Mountains during 1970—2009. The quantity of the resources is estimated and the area suit for wind farm is chosen by using GIS software with the standard for division of resources and the method of Kriging interpolation. The feature and possibility to exploit the resources at 70 meters above the ground in the area suit for wind farm are analyzed. The area suit for wind farm at 10 meters above the ground is about 12 283 km2 and the exploitable capacity in theory and practice are 11.08×104 MW and 1.9×103 MW respectively. The resources mainly locate in the northeast, northwest, southeast central, and northwest central of the boundary. The resources are most abundant in the period as spring turns to summer, and mainly concentrate in the northwest direction.

    • Logistic map controlled secure arithmetic coding and its application in image encryption

      2012, 35(8):87-91. DOI: 10.11835/j.issn.1000-582X.2012.08.015

      Abstract (1768) HTML (0) PDF 1.94 M (1042) Comment (0) Favorites

      Abstract:A logistic map controlled secure arithmetic coding is proposed, the Logistic map is used to control the order of the symbols in the model and change the probabilities of the symbols, which is applied to the image encryption. The proposed scheme makes the image transmit more secure and comfortably on the Internet, and that is done at little expense in terms of coding efficiency. In the coding process, it ensures the uniformity of the model being changed by the chaotic sequence, thus to meet the security requirements of image compression. The algorithm can be applied to any arithmetic codec based on multimedia data including video, image and audio. Its most strength compared with other cipher mode is that, there is a significant reduction in the redundancy of information during the compression process, and it is robust when attempting to estimate the information of the image and discovering the key. The scheme can effectively resist differential analyses from both cryptography and coding.

    • Research on multi objective global optimization model and algorithm of integrated service chain

      2012, 35(8):92-100. DOI: 10.11835/j.issn.1000-582X.2012.08.016

      Abstract (2025) HTML (0) PDF 3.16 M (1141) Comment (0) Favorites

      Abstract:Based on the network model of integrated service chains and evaluation index of candidate service resources, optimizing integrated service chain can be formally defined as a multi objective global optimization model with multiple constraints. We propose a multi objective global optimization algorithm based on improved multi objective genetic algorithms. The proposed algorithm uses a distance based nonparametric population diversity measurement operator, and diversity control is involved in the process of adaptive value assignment, elitist maintaining and selection operation. The proposed algorithm can optimize multiple objectives at the same time on the premise of meeting the constraints, and finally get a constrained Pareto optimum solution set which satisfy decision makers’ prefers. The simulation experiments indicate that the proposed algorithms can achieve global convergence and has better solution quality and distribution, which efficiently solve the problem of integrated service chain multi objective global optimization.

    • An improved HEED clustering algorithm for Wireless Sensor Network

      2012, 35(8):101-106. DOI: 10.11835/j.issn.1000-582X.2012.08.017

      Abstract (3019) HTML (0) PDF 2.35 M (1122) Comment (0) Favorites

      Abstract:In wireless sensor network, routing protocols which based on clustering have the advantages of energy consumption, topology management and data fusion. The HEED protocol, which generates cluster heads based on distributed algorithm, drives up the rate of clustering and creates well distributed cluster heads. However, it does not consider the mobility of nodes in the network. When the distance between neighbor nodes has changed, the AMRP method which decides the node belongs to different cluster heads would cause problems such as high energy consumption, short lifetime of network and so on. Responding to these problems, the paper proposes the S HEED, a clustering algorithm based on stability, which chooses the stability as a parameter of nodes when choosing a cluster head. With S HEED algorithm, the high energy consumption problem among cluster nodes and cluster heads caused by the mobility is tackled. The simulation experiment demonstrates that the S HEED algorithm lower the energy consumption of cluster heads and prolongs the network lifetime.

    • Simulation optimization for input plan of multi type and batch production with flexible process

      2012, 35(8):107-115. DOI: 10.11835/j.issn.1000-582X.2012.08.018

      Abstract (1573) HTML (0) PDF 1.60 M (1476) Comment (0) Favorites

      Abstract:Aiming at multi type and batch production system with flexible process, an optimization method for input plan based on Witness simulation is proposed. The scientific problem researched is described. Aiming at the characteristics of multi type and batch production with flexible process, the simulation logic is designed. Taking Witness as simulation platform, the simulation model combining input plan with scheduling for multi type and batch production is constructed. The effectiveness of the method is tested by simulation examination.

    • Numerical simulation on ships maneuverability in shallow water

      2012, 35(8):116-121. DOI: 10.11835/j.issn.1000-582X.2012.08.019

      Abstract (2155) HTML (0) PDF 2.15 M (1255) Comment (0) Favorites

      Abstract:Hydrodynamic coefficients are corrected for shallow water, and shallow water maneuverability equations are established by using MMG ship maneuverability equations. The equations are computed by using fourth order Runge Kutta method. MATLAB language is adopted to make calculation program,Simulation processing is given for Three Gorges Project fleet of ships of shallow water navigation by using MATLAB software. The accuracy of shallow water maneuverability equations are verified by comparing the simulation result with the experimental results in literatures. Turning ability and shipping direction stability of fleet in shallow water are simulated,the effect of shallow water is studied. It is found that constant turning circle diameter of flee increases with the same rudder angle in shallow water,the drift angle decreases with the same turning circle diameter. Z shape motion performance of fleet for shallow water is forecasted,the simulated K,T are in agreement with experimental data. The shipping direction stability of shallow water increases compared to deep water.

    • A method of power measurement under nonsinusoidal periodic signals

      2012, 35(8):122-126. DOI: 10.11835/j.issn.1000-582X.2012.08.020

      Abstract (2142) HTML (0) PDF 633.47 K (1035) Comment (0) Favorites

      Abstract:In power system,traditional method of nonsinusoidal power measurement is not feasible for containing non integer harmonics condition. A method of power measurement based on Prony algorithm is presented. At first, identify all modes of integer and non interger harmonics from voltage and current signals, using Prony method. Futher more, calculate active and reactive power in each harmonics frequency, using the modes of harmonics. Based on the defination of IEEE active power, a expression of Budeanu power is given in non integer harmonics condition. At last, active and reactive power of energy gird are calculated. The results of simulation prove that this method is feasibility. The method of power measurement based on Prony algorithm has high precision, especially for non integer harmonics condition.

    • Design fuzzy membership functions based on the posterior probability weighting

      2012, 35(8):127-133. DOI: 10.11835/j.issn.1000-582X.2012.08.021

      Abstract (2160) HTML (0) PDF 1.08 M (1117) Comment (0) Favorites

      Abstract:The determination of fuzzy membership function in the fuzzy support vector machine (FSVM) is a difficult problem. To solve the problem of being sensitive to the noises and outliers in support vector machine, by the inspiration of Bayesian decision theory, combining with sample density characteristics, sample points relation between same class and other class is researched, and the tightness on each sample points is described. Based on that, method of posterior probability and sample density weight are given to each sample, and new fuzzy membership function is proposed. The detection of the noises and outliers is avoided by this method. Numerical simulation shows that the improved fuzzy membership function method is effective.

    • A face recognition method based on modular PCA and SVD

      2012, 35(8):134-138. DOI: 10.11835/j.issn.1000-582X.2012.08.022

      Abstract (1855) HTML (0) PDF 1.10 M (1226) Comment (0) Favorites

      Abstract:In order to solve the problem that modular PCA method is sensitive to translation, rotation and other geometric transform, a face recognition method based on modular PCA and singular value decomposition (SVD) is proposed. The PCA features of sub image and SVD features are extracted respectively. The distance measure that fuses information of modular PCA and SVD is obtained. Minimum distance classifier is used to face recognition. Experimental results on ORL human face database show that the proposed method can obtain higher recognition rate.

    • Analysis and improvement of LFMCW radar’s range resolution

      2012, 35(8):139-143. DOI: 10.11835/j.issn.1000-582X.2012.08.023

      Abstract (2354) HTML (0) PDF 1.89 M (1156) Comment (0) Favorites

      Abstract:In order to improve the range resolution of Linear Frequency Modulation Continuous Wave (LFMCW) radar, a cross eight section open loop method is proposed to correct the FM linearity. According to the relationship among LFMCW radar’s actual range resolution, bandwidth and frequency resolution, a 2 GHz large bandwidth and 4096 point FFT operation are selected. The irregular region of beat signal is avoided when computing the frequency and the sampling data is intercepted from the regular region. Simulation and experiments show that the above treatments have brought some improvement to the radar’s range resolution.

    • Building the method of calculating quality of experience bsed on SEM

      2012, 35(8):144-150. DOI: 10.11835/j.issn.1000-582X.2012.08.024

      Abstract (2175) HTML (0) PDF 3.49 M (1764) Comment (0) Favorites

      Abstract:Now increasing customer Quality of Experience(QoE) has become a key factor to maintain competitiveness and improve business income. The paper lays emphasize on addressing the influence from technology element, and builds up a model of mapping network key performance indicators to QoE value by the SEM analysis method. A table is provided for calculating QoE value, which can get the short board of network performance directly. The effectiveness and feasibility of optimizing QoS parameter are discussed to improve QoE level of data service.

    • A borrowed address based on efficient distributed address assignment algorithm in ZigBee networks

      2012, 35(8):151-158. DOI: 10.11835/j.issn.1000-582X.2012.08.025

      Abstract (2199) HTML (0) PDF 2.36 M (1218) Comment (0) Favorites

      Abstract:The borrowed address algorithm can solve the orphan problem made by the restriction of threshold of children when DAAM(distributed address assignment mechanism) assigns the addresses for the nodes in ZigBee networks. The exited borrowed algorithms only can increase the success ratio of address assignment, but their overhead and times spend on founding net cost much. To address the problem, we propose an efficient borrowed address assignment algorithm EDAA BA (efficient distributed address assignment algorithm based on borrowed address). To control the overhead and time spend on founding net, it borrows addresses firstly from the descent nodes in same branch for the orphan router nodes, adds the mechanism of immediate reply of borrowed message, and assigns the remainder addresses unused by DAAM in the 16 bits addresses for the orphan end devices. Theoretical and simulation analyses show that our algorithm outperforms DAAM and two of its present improvement algorithms in terms of the overhead and time spent on forming network, under the premise of better success rate of address assignment.


Volume 35, No. 8

Table of Contents

Archive

Volume

Issue

Most Read

Most Cited

Most Downloaded