Resource Type

Journal Article 71

Year

2023 4

2022 4

2021 2

2020 2

2019 4

2018 3

2017 8

2016 4

2013 4

2012 6

2011 4

2010 5

2009 1

2008 4

2007 2

2006 3

2004 2

2003 3

2002 2

2001 1

open ︾

Keywords

Physical layer security 5

coherent structures 2

fracture 2

3D scaffold platform 1

Advanced manufacturing 1

Antarctic airport 1

Approximate Bayesian computation 1

Artificial intelligence 1

Artificial noise 1

Atomic layer deposition 1

Automatic generation control (AGC) 1

Average secrecy capacity 1

Bayesian evidential learning 1

Beyond-CMOS devices 1

Bionics 1

Biot's consolidation 1

CO2 foam 1

Canopy interception 1

Cell migration 1

open ︾

Search scope:

排序: Display mode:

Jointly optimized congestion control, forwarding strategy, and link scheduling in a named-data multihop wireless network

Cheng-cheng Li, Ren-chao Xie, Tao Huang, Yun-jie Liu,lengcangche@bupt.edu.cn,renchao_xie@bupt.edu.cn,htao@bupt.edu.cn

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10,   Pages 1573-1590 doi: 10.1631/FITEE.1601585

Abstract: As a promising future network architecture, named data networking (NDN) has been widely considered as a very appropriate network protocol for the (MWN). In named-data MWNs, is a critical issue. Independent optimization for may cause severe performance degradation if it can not cooperate well with protocols in other layers. Cross-layer is a potential method to enhance performance. There have been many cross-layer mechanisms for MWN with Internet Protocol (IP). However, these cross-layer mechanisms for MWNs with IP are not applicable to named-data MWNs because the communication characteristics of NDN are different from those of IP. In this paper, we study the joint , forwarding strategy, and link scheduling problem for named-data MWNs. The problem is modeled as a network utility maximization (NUM) problem. Based on the approximate subgradient algorithm, we propose an algorithm called ‘jointly optimized , forwarding strategy, and link scheduling (JOCFS)’ to solve the NUM problem distributively and iteratively. To the best of our knowledge, our proposal is the first cross-layer mechanism for named-data MWNs. By comparison with the existing mechanism, JOCFS can achieve a better performance in terms of network throughput, fairness, and the pending interest table (PIT) size.

Keywords: Information-centric networking     Congestion control     Cross-layer design     Multihop wireless network    

认知中继三网络联合优化 Article

澄 赵,万良 王,信威 姚,双华 杨

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 2,   Pages 253-261 doi: 10.1631/FITEE.1601414

Abstract: 现有的研究多数都集中在两网络的优化,但其也存在着传输距离不长,只能进行单项传输等缺点。本文提出了一种新的使用认知中继的三网络传输方案,通过三阶段的传输过程,实现了次级用户之间的双向传输。仿真结果表明,本文提出的优化方法可以在不增加中继数的情况下,延长主用户传输距离,并同时提高次级用户的传输吞吐量。

Keywords: 解码转发;三跳;认知中继网络;时间功率分配;叠加编码    

Multi-focus image fusion based on fully convolutional networks Research Articles

Rui Guo, Xuan-jing Shen, Xiao-yu Dong, Xiao-li Zhang,zhangxiaoli@jlu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 7,   Pages 963-1118 doi: 10.1631/FITEE.1900336

Abstract: We propose a method, in which a fully convolutional network for focus detection (FD-FCN) is constructed. To obtain more precise focus detection maps, we propose to add s in the network to make both detailed and abstract visual information available when using FD-FCN to generate maps. A new training dataset for the proposed network is constructed based on dataset CIFAR-10. The image fusion algorithm using FD-FCN contains three steps: focus maps are obtained using FD-FCN, decision map generation occurs by applying a morphological process on the focus maps, and image fusion occurs using a decision map. We carry out several sets of experiments, and both subjective and objective assessments demonstrate the superiority of the proposed fusion method to state-of-the-art algorithms.

Keywords: 多焦距图像融合;全卷积网络;跳层;性能评估    

A new anti-jamming communication technical system:pre-encoded code hopping spread spectrum

Yao Fuqiang,Zhang Yi

Strategic Study of CAE 2011, Volume 13, Issue 10,   Pages 69-75

Abstract:

A kind of pre-encoded code hopping spread spectrum (PCHSS) communication technical system for anti-jamming communication is brought forward and researched after analyzing its necessity based on the deficiency of conventional direct-sequence spread spectrum(DSSS). The main discussions include the basic principle of PCHSS, the differences between PCHSS and self-coded spread spectrum(SCHSS), and some key techniques. The PCHSS basic performance is analyzed finally. The technical system and its basic performance have been proved in practice.

Keywords: anti-jamming communication     direct-sequence spread spectrum     pre-encoded code hopping spread spectrum     self-coded spread spectrum    

Frequency-hopping transmitter fingerprint feature recognition with kernel projection and joint representation Research Articles

Ping SUI, Ying GUO, Kun-feng ZHANG, Hong-guang LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1133-1146 doi: 10.1631/FITEE.1800025

Abstract: Frequency-hopping (FH) is one of the commonly used spread spectrum techniques that finds wide applications in communications and radar systems because of its inherent capability of low interception, good confidentiality, and strong antiinterference. However, non-cooperation FH transmitter classification is a significant and challenging issue for FH transmitter fingerprint feature recognition, since it not only is sensitive to noise but also has non-linear, non-Gaussian, and non-stability characteristics, which make it difficult to guarantee the classification in the original signal space. Some existing classifiers, such as the sparse representation classifier (SRC), generally use an individual representation rather than all the samples to classify the test data, which over-emphasizes sparsity but ignores the collaborative relationship among the given set of samples. To address these problems, we propose a novel classifier, called the kernel joint representation classifier (KJRC), for FH transmitter fingerprint feature recognition, by integrating kernel projection, collaborative feature representation, and classifier learning into a joint framework. Extensive experiments on real-world FH signals demonstrate the effectiveness of the proposed method in comparison with several state-of-the-art recognition methods.

Keywords: Frequency-hopping     Fingerprint feature     Kernel function     Joint representation     Transmitter recognition    

IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication

Wang Xingjian,Hu Aiqun,Huang Yuhua

Strategic Study of CAE 2006, Volume 8, Issue 9,   Pages 69-73

Abstract:

Mesh network supported by IEEE802.16-2004 wireless-MAN standard is a fresh network combining tree network and ad hoc network. Aimed at the weakness both in security and efficiency of one-hop one-way authentication SA (security association) mechanism employed by Mesh network, an multi-hops mutual authentication SA mechanism associated with hypo- optimal self-modified routing is proposed. Compared with the one-hop one-way mechanism, this one is of forward security and immune to middle attacks, which also lessens system cost and time delay in transmission. The employment of self-modified routing before touting establishment in management information transaction can also reduce the delay of service-flow creation. Subsequently, the security of multi-hops mutual mechanism is proved by security analysis, followed by the efficiency comparison which introduces the efficiency advantage of this mechanism.

Keywords: IEEE 802.16     mesh     node     multi-hops mutual authentication     self-modified routing    

Heliosphere detection

Du Heng

Strategic Study of CAE 2008, Volume 10, Issue 6,   Pages 46-50

Abstract:

In this thesis, general situation of detection and significance of research to heliosphere are introduced. Important function of solar-terrestrial space process in space environment prediction is discussed. Ability insufficiency in heliosphere detection is also analyzed.

Keywords: heliosphere     interplanetary space     detection    

Akeyed-hashing based self-synchronizationmechanism for port address hopping communication Article

Yue-bin LUO, Bao-sheng WANG, Xiao-feng WANG, Bo-feng ZHANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 5,   Pages 719-728 doi: 10.1631/FITEE.1601548

Abstract: Port address hopping (PAH) communication is a powerful network moving target defense (MTD) mechanism. It was inspired by frequency hopping in wireless communications. One of the critical and difficult issues with PAH is synchronization. Existing schemes usually provide hops for each session lasting only a few seconds/minutes, making them easily influenced by network events such as transmission delays, traffic jams, packet dropouts, reordering, and retransmission. To address these problems, in this paper we propose a novel selfsynchronization scheme, called ‘keyed-hashing based self-synchronization (KHSS)’. The proposed method generates the message authentication code (MAC) based on the hash based MAC (HMAC), which is then further used as the synchronization information for port address encoding and decoding. Providing the PAH communication system with one-packet-one-hopping and invisible message authentication abilities enables both clients and servers to constantly change their identities as well as perform message authentication over unreliable communication mediums without synchronization and authentication information transmissions. Theoretical analysis and simulation and experiment results show that the proposed method is effective in defending against man-in-the-middle (MITM) attacks and network scanning. It significantly outperforms existing schemes in terms of both security and hopping efficiency.

Keywords: Synchronization     Port address hopping     Moving target defense     Network security    

Fatigue Life Prediction of Fiber Reinforced Metal Laminates Under Variable Amplitude Loading

Wu Xueren,Guo Yajun

Strategic Study of CAE 1999, Volume 1, Issue 3,   Pages 35-40

Abstract:

Fiber reinforced metal laminates (FRMLs), a new type of hybrid composites, are finding wide applications in the aerospace industry. The material is featured by its excellent fatigue performance and damage tolerance. Reliable life prediction methods are required for the successful application of this material. For this purpose, a mechanism-based fatigue model was developed for the prediction of the fatigue lives of FRMLs under constant amplitude loading. The model was based on an analytical approach for the determination of the bridging stress over the crack faces by intact fibers.

The fatigue behaviors of glass fiber reinforced laminates (GLARE), including crack growth and delamination, under constant amplitude loading following a single overload were investigated experimentally, and the mechanism of the effect of an overload on the crack growth rates was identified. An equivalent crack closure model for predicting crack growth in FRMLs under variable amplitude loading was presented. All the models in this paper were verified by applying to GLARE under constant amplitude loading and Mini-TWIST load sequence. Good agreement was achieved.

Keywords: fiber reinforced metal laminates     fatigue     bridging stress     delamination     life prediction    

Research of the Damage Evolution Equation and Spallation Criterion

Cao Jiedong,Li Yongchi

Strategic Study of CAE 2006, Volume 8, Issue 1,   Pages 40-45

Abstract:

In this paper, a new kind of damage evolution equation is presented by the method of phenomenological analysis and microscopic statistics. And on the basis of this several spallation criterions are established, which are used easily in engineering. By the numerical simulations of the free surface velocity histories and based on the best consistence between the computational results and the experimental ones, the material parameters in the damage evolution equation and the spallation criterion are obtained. The satisfactory agreement between the computational results and the experimental ones show that the new form of damage evolution equation and the spallation criterion are reasonable, and the method of determining the material parameters is effective.

Keywords: damage evolution equation     spallation criterion     numerical simulation    

Shale reservoir network fracturing technology research and experiment

Jia Changgui,Li Shuangming,Wang Haitao, Jiang Tingxue

Strategic Study of CAE 2012, Volume 14, Issue 6,   Pages 106-112

Abstract:

Shale reservoir fracturing is the critical and center technology for shale oil and gas efficient exploration and development. Different from conventional low permeability oil and gas reservoir whose goal is to improve fracturing effectively by single fracture, the main goal of low porosity and low permeability shale is to form effective conductivity network fracture, ensuring fracturing volume large enough and economical and efficient. Proposed the concept of network effective fracturing stimulation volume of shale ( ESRV ), in reference to North American shale gas fracturing experience and the domestic shale gas fracturing based on practice, in view of Chinese specific characteristics of shale reservoir, it has been doing exploratory research in some aspects, including prefrac evaluation method, the optimization of perforating parameters, such as compound test fracturing, network fracturing methods, flowback technology and other aspects. The initial shale network fracturing technique is obtained, and it has good effect in field experiment, solving the problem of brittle shale sand of easily being screened out and low success rate.

Keywords: shale     reservoir     network fracturing    

The Study of Fractures and Their Development Countermeasures on Taizhao Low-permeability Reservoir in Daqing Oilfield

Zeng Lianbo,Liu Hongtao,Fang Baocai,Deng Haicheng

Strategic Study of CAE 2004, Volume 6, Issue 11,   Pages 73-79

Abstract:

The Putaohua reservoir in Taizhao area is the typical low-permeability reservoir which developed EW, SN, NW and NE tectonic fractures with high angles in the periphery of Daqing Oilfield. The development degree of above four group fractures in succession die down. By effect of modern stress field of approximately EW direction, the connectedness, opening and permeability of EW fractures are the best, then are NW and NE fractures, and that of SN fractures are the worst. The development degree of fractures are controlled by lithology, thickness, fault and tectonic stress. The effects of fractures on development include pattern arrangement, injecting water and fracturing. According to geological condition and numerical simulation of oil pool, the development effects of similar low-permeability reservoirs by rectangle and lozenge well pattern are better than by inverted 9-spot well pattern and 5-spot well pattern. Due to development of fractures in low-permeability, the stratum cracking pressure reduces, which is liable to be exceeded by the injecting pressure. This will make injecting water to flow fleetly along fractures, and cause water flooding, influenceing development effect. Therefore, it is very important to control injecting pressure in the development of low-permesability reservoirs. The artificial fractures are controlled by the modern stress field and natural fractures in fractured low-permeability reservoir. According to fractures and their seepage characteristics, three sets of adjustment schemes can be adopted on the basis of existing inverted 9-spot well pattern. At the same time, good effects can be obtained by early mild injecting water, controlling injecting pressure, linearity injecting mode, dynamic preparing water, pulse cycle injecting, perfecting pour and pick system, well pattern adjustment, choosing fracturing well and controlling fracturing scale, etc.

Keywords: fracture     low-permeability reservoir     development countermeasure    

Advances in the technology of explosion in fracturesused in low permeability reservoirs

Li Decong,Chen Li,Lin Yingsong, Ding Yansheng

Strategic Study of CAE 2010, Volume 12, Issue 9,   Pages 52-57

Abstract:

In this paper,the technical idea and the possible applications of this method were briefly introduced. Meanwhile, some related key technical problems were also particularly discussed. A series of research and corresponding advances achieved in recent years were reported in detail. In the end, some suggestion was made for further research.

Keywords: low permeability reservoirs     mechanics of explosion     explosion in fractures     security     simulation experiment     mechanical model    

Finite Layer Analysis of Three-Dimensional Biot Consolidation of Homogeneous Soils

Mei Guoxiong,Zai Jinmin,Zhao Weibing,Yin Jianhua

Strategic Study of CAE 2004, Volume 6, Issue 7,   Pages 43-47

Abstract:

This paper presents a finite layer procedure for the consolidation analysis of layered soils using a cross isotropic elastic constitutive model. The program is first verified using two published results. Then using this program, the influences of cross isotropy on the consolidation behavior are analyzed. The results obtained using the cross isotropic elastic model are compared with results using isotropic elastic model. It is found that the cross isotropy has very large influences on the consolidation behavior. Curves of the average degree of consolidation are obtained and presented in the paper, which is useful for engineering practice.

Keywords: finite layer analysis     Biot's consolidation     three-dimension     cross-an isotropic    

Despite Effective Ban, Ozone-Destroying Chemicals Still Up in the Air

Chris Palmer

Engineering   Pages 7-9 doi: 10.1016/j.eng.2023.07.004

Title Author Date Type Operation

Jointly optimized congestion control, forwarding strategy, and link scheduling in a named-data multihop wireless network

Cheng-cheng Li, Ren-chao Xie, Tao Huang, Yun-jie Liu,lengcangche@bupt.edu.cn,renchao_xie@bupt.edu.cn,htao@bupt.edu.cn

Journal Article

认知中继三网络联合优化

澄 赵,万良 王,信威 姚,双华 杨

Journal Article

Multi-focus image fusion based on fully convolutional networks

Rui Guo, Xuan-jing Shen, Xiao-yu Dong, Xiao-li Zhang,zhangxiaoli@jlu.edu.cn

Journal Article

A new anti-jamming communication technical system:pre-encoded code hopping spread spectrum

Yao Fuqiang,Zhang Yi

Journal Article

Frequency-hopping transmitter fingerprint feature recognition with kernel projection and joint representation

Ping SUI, Ying GUO, Kun-feng ZHANG, Hong-guang LI

Journal Article

IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication

Wang Xingjian,Hu Aiqun,Huang Yuhua

Journal Article

Heliosphere detection

Du Heng

Journal Article

Akeyed-hashing based self-synchronizationmechanism for port address hopping communication

Yue-bin LUO, Bao-sheng WANG, Xiao-feng WANG, Bo-feng ZHANG

Journal Article

Fatigue Life Prediction of Fiber Reinforced Metal Laminates Under Variable Amplitude Loading

Wu Xueren,Guo Yajun

Journal Article

Research of the Damage Evolution Equation and Spallation Criterion

Cao Jiedong,Li Yongchi

Journal Article

Shale reservoir network fracturing technology research and experiment

Jia Changgui,Li Shuangming,Wang Haitao, Jiang Tingxue

Journal Article

The Study of Fractures and Their Development Countermeasures on Taizhao Low-permeability Reservoir in Daqing Oilfield

Zeng Lianbo,Liu Hongtao,Fang Baocai,Deng Haicheng

Journal Article

Advances in the technology of explosion in fracturesused in low permeability reservoirs

Li Decong,Chen Li,Lin Yingsong, Ding Yansheng

Journal Article

Finite Layer Analysis of Three-Dimensional Biot Consolidation of Homogeneous Soils

Mei Guoxiong,Zai Jinmin,Zhao Weibing,Yin Jianhua

Journal Article

Despite Effective Ban, Ozone-Destroying Chemicals Still Up in the Air

Chris Palmer

Journal Article