• Volume 29,Issue 6,2007 Table of Contents
    Select All
    Display Type: |
    • >航天工程
    • The Residual Stress Intensity Factor of Surface Cracks ina Thick Plate with Butt Joints

      2007, 29(6):1-5. CSTR:

      Abstract (6498) HTML (92) PDF 350.08 K (5785) Comment (0) Favorites

      Abstract:The paper presents an approach to deal with residual stress intensity factors for surface cracks in a thick plate with butt joints by using line-spring model. Based on the Reissner's plate theory along with continuously distributed dislocation thought, the problem of the thick plate with butt joints is treated with a set of Cauchy-type singular equations, which are resolved by Gauss-Chebyshev method. The numerical results of the present method for the surface crack are compared with those of finite element method, and the compared results show good agreement. It is indicated that the line-spring model is not only reasonable and viable for surface cracks analysis in residual stress fields, but simple and convenience for engineering application.

    • Shock Impinge on Supersonic Cross Flow Injection

      2007, 29(6):6-9. CSTR:

      Abstract (7155) HTML (96) PDF 516.19 K (5885) Comment (0) Favorites

      Abstract:To investigate the shock impingement on vertical injection in supersonic flow, shock was produced by a 9mm long, 23° angle wedge. The images of shocks impinged at different position and pressure of gas and liquid injection were achieved by using both a high speed camera and a schlieren system. Results revealed that gas and liquid injection almost have similar phenomena, that is, impinged by the shock, fuel turbulent intensity will increase, fuel distribution area will be larger in supersonic flow, spreading more quickly into the main supersonic flow, and the shock impinged at the foreside affect more than rearward of injection.

    • Shape Design and Analysis of Hypersonic Forebody Side Edges

      2007, 29(6):10-13. CSTR:

      Abstract (6916) HTML (94) PDF 412.55 K (6153) Comment (0) Favorites

      Abstract:Aerodynamic characteristics of fore-bodies deduced simply from 2D configurations were studied. To restrain the compressed flow from spilling at side edges of forebodies, shaped waverider was added to the fore-body sides and features of the new fore-body as waverider were proven by CFD analysis. More discussion about volume efficiency of the new shape was made and a concept as usable volume efficiency was presented. Different shapes side edges were designed, usable volume efficiency of each shape was discussed together with aerodynamic characteristics.

    • Bayesian Linear Calibrated Prediction Approach in WarheadVirtual Experiment

      2007, 29(6):14-18. CSTR:

      Abstract (6709) HTML (94) PDF 433.83 K (5580) Comment (0) Favorites

      Abstract:The shaped charge penetration performance is sensitive to material model parameters of armor plate in virtual experiment. A Bayesian linear calibrated approach was proposed to obtain precise prediction of penetration limit. Statistical relationship between the physical process, the computer model output and experiment observations was formulated, combined with calibration experiment observations, to estimate the unknown model parameter. Analysis of an example demonstrates that the proposed approach is efficient in large calibration problem involving various uncertainties.

    • Numerical Simulation of Dynamic Flow Field in BoosterDetaching Process

      2007, 29(6):19-21. CSTR:

      Abstract (6458) HTML (95) PDF 313.87 K (5728) Comment (0) Favorites

      Abstract:The 3D N-S equations are numerically solved, while NND2M scheme is used for the discretization of the equations, aimed to simulate the dynamic flow about the process in which booster takes apart from upper stage. The effect that the jet of the counter-thrust rocket motor exerts on the axial force on the base of upper stage body is analyzed. The results of the simulation show a law that counter-thrust rocket jet has a great effect on the upper stage body while the distance between them is short, which produces a big axial force doing harm to the flight stability of upper stage.

    • >Materials Science & Engineering
    • Investigation and Optimization in the Curing Process ofHybrid Polyborosilazane

      2007, 29(6):22-25. CSTR:

      Abstract (7294) HTML (100) PDF 416.01 K (5996) Comment (0) Favorites

      Abstract:Hybrid polyborosilazane (H-PBSZ) was synthesized and characterized. Meanwhile, the curing process of H-PBSZ was analyzed, and H-PBSZ was cured through different processes. Furthermore, the effects of curing pressure on the structure, appearance and apparent density of cured product were investigated. The results show that chemical bonds of B-N, Si-N, B-H, N-H, and Si-H exist in the structure of H-PBSZ. With the increase of temperature, bonds of B-H, N-H, and Si-H will be broken. Large amounts of gases emit from the precursor in the curing process. The density of the cured product is determined by the volume and velocity of the bubbles. The high pressure curing process can reduce the volume of bubbles, decrease their climbing velocity, and restrain the breaking of the bonds containing H atoms, decrease the amount of gases emission in the process. Therefore, much denser cured product is obtained.

    • >Optical Engineering
    • Two Dimensional Phase Unwrapping Algorithm Based onPhase Retrieval

      2007, 29(6):26-29. CSTR:

      Abstract (7623) HTML (92) PDF 411.04 K (5709) Comment (0) Favorites

      Abstract:A novel two-dimensional phase unwrapping method is proposed. In this idea, the phase wrapped is propagated through an optical diffraction calculation as an input optical field and transformed into the intensity distribution. Then the phase retrieval algorithm is engaged in order to find the best fitting Zernike polynomials for the unwrapped phase based on the diffraction intensity. Because of the maturity of phase retrieval theory, the uniqueness and accuracy of phase unwrapping can be guaranteed. As a result, the phase noise can be remarkably reduced by intensity filtering. The validity of this algorithm is verified by experiment.

    • Theoretical Comparison of Constant-area Mixing Model and Constant-pressure Mixing Model

      2007, 29(6):30-33,53. CSTR:

      Abstract (6636) HTML (95) PDF 422.37 K (5984) Comment (0) Favorites

      Abstract:The one-dimension mixing model is established from steady state theory, thus the recovery pressures of constant-area mixing model and constant-pressure mixing model are attained. The result implies that the performance of constant-pressure mixing is not always better than that of constant-area mixing, so a criterion is established to estimate the better one of the two mixing models. The consistent conclusion is attained by altering some of the initial parameters in reference.

    • >Materials Science & Engineering
    • An Experimental of Ceramic/Mild Steel Composite Targetsunder Noncentral Impact of Armor Piercing Projectile

      2007, 29(6):34-38. CSTR:

      Abstract (8161) HTML (100) PDF 534.33 K (5674) Comment (0) Favorites

      Abstract:Ballistic experiments of ceramic/mild steel composite target against 7.62mm armor-piercing projectile (APP) were designed and carried out. Limit velocities and the base radiuses of ceramic cone were obtained. The influence of projectiles initial velocity, the thickness of front and rear plate on the base radius of ceramic cone and the impact point to the resistant mechanism of target were analyzed. The results show that the ceramic cone can be separated into fragmentation and smash region, the base radius of which approximates the thickness of front plate plus projectile radius. The ballistic performance of composite target area is in a similar case except for an edge area (5mm to the edge of the target), in which the ballistic performance declines obviously. The edge area has to be discarded from the effective protective area.

    • >Electronic Science & Technology
    • View Synthesis Based on Learning in Disparity Field

      2007, 29(6):39-43. CSTR:

      Abstract (6821) HTML (96) PDF 1.10 M (5652) Comment (0) Favorites

      Abstract:The process of calibration and 3D reconstruction of the scene are always required in view synthesis from image sequences. To avoid those complicated processes, the reference images are first classified into primary reference image and subordinate reference image according to the distance between the reference viewpoints and the novel viewpoint. Then the global optimization problem of view synthesis is transformed from the depth field to disparity field, using a process of nonlinear rectification and multi-epipolar technology. Finally, the novel view is synthesized from the image sequence without matching and calibration. Experimental results show that the method is effective and has potential in the future.

    • Blind Estimation of the Symbol Rate of a Long Code DSSS Signal

      2007, 29(6):44-48. CSTR:

      Abstract (6799) HTML (92) PDF 424.18 K (6129) Comment (0) Favorites

      Abstract:To investigate the blind estimation of the symbol rate of a long code direct sequence spread spectrum (DSSS) signal, an algorithm based on autocorrelation processing is proposed. First, the second order moment of the autocorrelation estimator is used to analyze the long code DSSS signal. Next, the estimator output is further processed to get rid of the peaks at multiples of the pseudo-noise (PN) sequence period. Finally, another autocorrelation estimator and the Fourier transform are used to extract the symbol rate. Theoretical analysis and simulation results show the efficiency of the proposed algorithm.

    • Hardware Accelerated Representation for Three-dimensionalRadar Coverage

      2007, 29(6):49-53. CSTR:

      Abstract (7027) HTML (97) PDF 485.28 K (6307) Comment (0) Favorites

      Abstract:Future digital battlefield is crying for a 3D representation of the radar coverage affected by complex environment such as terrain, ocean and weather. However, recent researches still focuses mainly on 2D representation while the existing 3D methods are always embarrassed by their low computation speed, a new hardware accelerated 3D representation method was put forward in this paper. Based on the constructed 3D data field of EM loss affected by environment, a hardware accelerated algorithm was designed to extract the isosurface for building the 3D radar coverage model. Then the model was represented into digital battlefield. In the experiment on popular PC and for typical Radar, the 3D radar coverage affected by terrain and atmosphere was vividly visualized in time. The result has overcomed the implicity of 2D method and the slowness of 3D method, thus providing excellent decision and sense supporting for users.

    • >计算机科学与技术
    • A File Access Control Policy Based on User's Intention

      2007, 29(6):54-58,80. CSTR:

      Abstract (6500) HTML (0) PDF 524.41 K (5660) Comment (0) Favorites

      Abstract:Access control is an important technique to protect computer files. Aiming at malwares that attack files, the paper proposes a quantified estimation method, and points out that the fragibility of prevalent access control policies lies in authorizing programs to access files what the user can access. The paper novelly proposes an access control policy based-on user's intention, which is able to defend unknown file attacks, and has extraordinarily less risk than prevalent access control policies. Furthermore, the paper proves security properties of the policy presented, and its application is discussed.

    • Cocast: A Coordinate-fusion Based Distributed NetworkDistance Prediction Anycast Algorithm

      2007, 29(6):59-64. CSTR:

      Abstract (6784) HTML (0) PDF 489.20 K (5646) Comment (0) Favorites

      Abstract:According to the network-coordinate based network distance estimation problem in an Internet-wide environment, an anycast algorithm named Cocast for cooperative network coordinate estimation is presented. All peers join a structured Peer-to-Peer overlay, and any peer in the overlay, i.e., a requestor, may send a network coordinated anycast message, then the anycast message is forwarded to a set of peers in charge of network coordinate estimation, and each of these peers makes responses from a network coordinate to the requestor, finally the requestor gets a synthetical network coordinate. Based on three novel mechanisms, i.e., an anycast service to select peers for network coordinate estimation, a hierarchical network embedding mechanism to compute the network coordinates, and a coordinate-fusion sensor approach to filter malicious peers' fake-coordinate effects, Cocast owns a fast convergence speed in network coordinate estimation and is more stable. Simulation results confirm that Cocast is scalable, fast-convergent, incrementally accurate and resilient.

    • Semi-supervised Text Classification Based on Self-trainingEM Algorithm

      2007, 29(6):65-69. CSTR:

      Abstract (7124) HTML (0) PDF 412.47 K (5981) Comment (0) Favorites

      Abstract:To improve computation efficiency, an enhanced EM algorithm based on self-training named STEM is proposed. In the E-step of each iteration, the unlabeled sample, whose class can be predicted by the current intermediate classifier with the most confidence, is moved to the labeled set and used in the M-step to train the next intermediate classifier. Therefore the mechanism of self-training by inter-result employing is introduced. Experimentation on text classification indicates that STEM outperforms EM in classification accuracy most of the time and improves the learning efficiency by reducing iterations.

    • Level Based Δ-Critical Links Routing Algorithm forInterference Minimizing

      2007, 29(6):70-74. CSTR:

      Abstract (6684) HTML (0) PDF 411.17 K (5724) Comment (0) Favorites

      Abstract:The critical link routing algorithm for interference minimizing has made a great success in optimizing the efficiency of network resources usage. Its method of critical links identification, however, is not very accurate in some circumstances, and it does not consider much about load balancing. This paper presents a new level based Δ-critical links routing algorithm for interference minimizing, of which the algorithm can identify critical links more precisely in some circumstances, and can perform load balancing better. Simulation results show that the algorithm proposed performs better in the resource utilization efficiency and load balancing.

    • A Price-based QoS Model and Algorithm for NetworkResource Allocation

      2007, 29(6):75-80. CSTR:

      Abstract (6313) HTML (0) PDF 487.41 K (5856) Comment (0) Favorites

      Abstract:This paper proposes a pre-estimation based enhanced multidimensional resource allocation model (PE-EMRA) and its algorithm for network resource allocation. The PE-EMRA approach allocates both bandwidth and buffer resource for different traffic classes, balancing and limiting the arrival rate of traffic class and also maximizing the system utilization. The advantage of this approach is that it can maximize the system utilization and provide QoS guarantee while being flexible and easy to realize.

    • >Electronic Science & Technology
    • Phase-preserving Imaging for Spaceborne Bistatic SAR by Range-Doppler Algorithm

      2007, 29(6):81-85. CSTR:

      Abstract (6962) HTML (114) PDF 431.42 K (5744) Comment (0) Favorites

      Abstract:Range-Doppler algorithm can be applied to imaging of spaceborne bistatic SAR. Range models used by the algorithm include quadratic model and beeline model. Considering the bistatic character of the system, method of getting precise range model parameters was studied. RD algorithm was deduced using quadratic model. In squint side-looking situation, quadratic model may have inignorable error. The error mainly can influence azimuth compression. In order to suppress azimuth sidelobe, imaging using azimuth compressing function according to beeline model was studied. For preserving image phase, right azimuth compressing function should be used to avoid destruction of the phase.

    • >Management Science & Engineering
    • A New Approach of C4ISR RequirementsDevelopment:Modeling Based on Ontology

      2007, 29(6):86-92. CSTR:

      Abstract (6773) HTML (90) PDF 610.01 K (5759) Comment (0) Favorites

      Abstract:Being complex and special, C4ISR requirements are, often comprehended and expressed in various ways. Nowadays the results of C4ISR requirements development are unsatisfactory. Therefore, the authors put forward a new approach: modeling C4ISR requirements based on ontology. In this paper, the ontology of the basic categories and relationships needed to represent C4ISR requirements is present. Ontology model and semantic ontology model are included. In particular, the research focuses on clarifying the domain knowledge about C4ISR requirements. After that, a procedure for modeling C4ISR requirements based on ontology is supplied. Finally, an illustration is provided to show the feasibility,and effectiveness of the approach, indicating its promising prospect.

    • An Evolving Network Model for Effectiveness ofCombat between SoSs

      2007, 29(6):93-97. CSTR:

      Abstract (7212) HTML (90) PDF 490.02 K (5988) Comment (0) Favorites

      Abstract:A novel model is put forward which represents combat behavior and network behavior in an unitary form, the evolving network for the combat on the battlefield FR,Bis constructed jointly by generating a random network on fR,Band removing nodes from fighting forces' networks, under the condition that the assumptions of Lanchester Model is generalized, and represented as a triple of networks FR,B=forces R's network IR∪ forces B's network IB∪ engagement space fR,B.In the model the effectiveness of a networked forces relates not only its size and the weapon performance, but also the structure of network and the battlefield in which it operates. An experiment shows that with the same operational assets a scale-free network is more dominant than a random network for both information effectiveness and killing rate but not always wins, the origin is analyzed that the scale-free network is efficiency,robust yet fragile in the conflict system.

    • >Mechanical Engineering
    • Mechanism Design and Dynamic Analysis on Micro-pipe Robot

      2007, 29(6):98-101. CSTR:

      Abstract (6764) HTML (90) PDF 393.36 K (5918) Comment (0) Favorites

      Abstract:A creeping micro-pipe robot is designed, which comprises three DC motors and screw-driven units. The three motors are coordinated to realize the creeping motion. Firstly, the load is analyzed for the case that the robot creeps in a vertical pipe. Meanwhile, the mechanical adjustment characteristic for the claws to adapt to the varying pipe size is also discussed. Then with the help of ADAMS software, kinematical and dynamical simulations are presented, which shows the relationship between the driving force, the moving velocity and structural parameters of the robot. Simulations also demonstrate that the robot is applicable to pipes with diameter ranging from 15 to 20mm. The driving force reaches up to 28N and the moving velocity 6mm/s.

    • Application of Wavelet Correlation Feature Scale Entropyto Fault Diagnosis of Roller Bearings

      2007, 29(6):102-105, 111. CSTR:

      Abstract (7133) HTML (97) PDF 474.71 K (6116) Comment (0) Favorites

      Abstract:A method of the fault detection and diagnosis by combining wavelet correlation filter and Shannon information entropy was proposed. The method was called “wavelet correlation feature scale entropy-fault”. At first, the weak fault information features were picked up from roller bearings fault vibration signals by the way of wavelet transform correlation filter, in order to get high signal to noise scales wavelet coefficients. Then, the defining and computing way of wavelet correlation feature scale entropy was presented, based on the integration of shannon information entropy theory. Wavelet correlation feature scale entropy can quantitatively describe energy distributing of different scales which reflects difference of roller bearings running state, the work states and fault types were estimated by magnitude of the selected wavelet correlation feature scale entropy which can mostly embody fault features. Results and analysis of the diagnosing example reveal that the proposed method can effectively estimate roller bearings fault feature and offer one new way for diagnosing roller bearings.

    • Study of the Characteristics of Partial Porous Air Thrust Bearing

      2007, 29(6):106-111. CSTR:

      Abstract (6327) HTML (106) PDF 540.83 K (5636) Comment (0) Favorites

      Abstract:A nonlinear model based on the finite element method is provided to compute the static characteristics of partial porous gas thrust bearing, considering the tangential velocity slip at the bearing-film interface. Good agreement is achieved between theoretical and experimental results on static load capacity, mass flow and static stiffness. The new modified Reynolds equation is proved to be a proper model to investigate the characteristics of externally pressurized partial porous gas thrust bearing. With a change to the feeding parameters of permeability coefficient, height or diameter of partial porous restrictors, the effect of the steady state characteristics, such as mass rate of flow, load capacity and static stiffness are studied, Also the performance comparison among the thrust bearings with orifice restrictors, partial porous restrictors and whole porous restrictors shows that this kind of bearing has promising potential in application.

    • >航天工程
    • Study on Bayesian Belief Network Method for Engine Tests Sensor Data Validation

      2007, 29(6):112-115. CSTR:

      Abstract (6695) HTML (94) PDF 374.96 K (5724) Comment (0) Favorites

      Abstract:A method for fusing evidence information using Bayesian belief network is introduced for sensor data validation. Uncertainty expression and inference mechanism of sensor states and relations in engine and its components test are defined. The algorithms for automatic generation of the Bayesian belief network files, belief probability calculation and network update are developed. The methodology is demonstrated and validated in a model rocket engine.

    • >Management Science & Engineering
    • Real-time Reliability Evaluation for Degradation FailureProduct Based on Bayes Method

      2007, 29(6):116-120. CSTR:

      Abstract (6748) HTML (93) PDF 439.07 K (5602) Comment (0) Favorites

      Abstract:The failure distribution from traditional reliability methods reflects the “average” characteristics of the same kind of product. In order to get the real time reliability of degradation failure product with history test data, this paper adopts the local updating ideas, uses the on-site measuring data through Bayes method and gets the real time reliability model of the product that timely reflects the on-site data. The result shows that real-time reliability model expresses the specific characters gradually with the increase of fusing on-site data.

    • Research on the Model of Satellite Data Transmission Scheduling

      2007, 29(6):121-125. CSTR:

      Abstract (6943) HTML (96) PDF 437.07 K (5758) Comment (0) Favorites

      Abstract:The problem of satellite data transmission is an optimization problem with multi-time windows and multi-resources constrains. In view of the problem, the paper constructs satellite data transmission request model, task model and scheduling model. In the process of constructing models, the style of frame model is adopted, while all the constrains are put into every data transmission task. This not only reduces the complexity of scheduling model, but also reduces the difficulty of designing scheduling algorithm. In addition, this paper also presents the idea of designing scheduling algorithm, and designs a flexibility based scheduling algorithm. Results from simulation show that the model and algorithm are feasible for solving the satellite data transmission scheduling problem.

    • >Mathematics & Systems Science
    • A New Algorithm of Mesh Generation for 2-D Adaptive MeshBased on Directional Derivatives

      2007, 29(6):126-130. CSTR:

      Abstract (6597) HTML (88) PDF 448.56 K (5905) Comment (0) Favorites

      Abstract:A new algorithm of mesh generation for 2-D adaptive mesh method is proposed while combining the deformation principle and the idea of mesh iteration by means of directional derivatives to compute the monitor function.The numerical experiments show that this algorithm can well adapt to high spatial activities of the solutions. The main advantage of this algorithm is its simple logicality and it can avoid solving moving mesh partial differential equations and save time for computing mesh to compare the other adaptive algorithms.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

Most Read

Most Cited

Most Downloaded