Loading...
Welcome to Journal of University of Chinese Academy of Sciences,Today is

Current Issue

2011, Vol.28, No.5 Previous Issue    Next Issue
Review Article
Advances in light field photography technique
NIE Yun-Feng, XIANGLI Bin, ZHOU Zhi-Liang
2011, 28 (5): 563-572.  DOI: 10.7523/j.issn.2095-6134.2011.5.001
Abstract ( 3268 ) PDF (KB) ( 23 )

Light field is a representation of full four-dimensional radiance of all rays with spatial and angular information in free space, and capture of light field data enables many new development potentials for computational imaging. The historical development of light field photography is summarized, and typical light field photography devices are categorized in view of capture methods for 4D light field. Based on the principles of light field camera, computational imaging theorem, refocusing theory, synthetic aperture refocusing algorithm, and light field microscopic technology are emphatically described. Finally, the promising application perspectives and existing critical issues of light field imaging are discussed.

Research Articles
Harmonic two-spheres in the complex Grassmann manifold G(2,5)
LI Kang, JIAO Xiao-Xiang
2011, 28 (5): 573-582.  DOI: 10.7523/j.issn.2095-6134.2011.5.002
Abstract ( 1069 ) PDF (KB) ( 4 )

We use the methods of harmonic sequences and moving frames to study the harmonic two-spheres in the complex Grassmann manifold G(2,5). Through the construction of holomorphic differential forms on S2, we can simplify the moving frames along a harmonic two-sphere in G(2,5). Finally, we give some upper bounds of the Gauss curvature of minimal two-spheres in G(2,5).

Some remarks on a quasilinear elliptic equation with critical exponent
LIU Xing, SUN Yi-Jing
2011, 28 (5): 583-590.  DOI: 10.7523/j.issn.2095-6134.2011.5.003
Abstract ( 1072 ) PDF (KB) ( 4 )

We investigate the following quasilinear elliptic equation:

Δpu + uq + λup*-1 =0 , uW1,p0(Ω), (1λ)


where Ω is a bounded domain in RN with smooth boundary, Δpu=div(| u |p-2 u), N≥3, 2≤p < N, 0<q<1, and p*= (Np)/(N-p). By using variational methods, we obtain a lower bound of the extremal value λ*(Ω,p,q) for equation (1λ), which can be explicitly calculated.

 

 

Synthesis and properties of flame retardant vinyl acetate copolymer emulsion
ZHAO Chun-Xia, LIU Bai-Ling, PENG Gang, LUO Rong
2011, 28 (5): 591-596.  DOI: 10.7523/j.issn.2095-6134.2011.5.004
Abstract ( 1262 ) PDF (KB) ( 1 )

Ammonium polyphosphate and pentaerythritol were used to prepare halogen-free flame retardant BA-VAc copolymer emulsion. The flammability and thermal degradation properties of the copolymer were studied by using limited oxygen index (LOI), vertical burning test (UL-94), and thermo-gravimetric analysis(TG). Morphology of residues was detected by means of scanning electron microscopy. The copolymer has the best LOI value of 28.9 and passes UL-94 V- 0. TG data shows higher and more stable char residue in high temperature range.

Study on the real-time high precision control of large quantity displacement actuators for extremely large telescope based on FPGA
QI Yong-Jun, NI Ji-Jun
2011, 28 (5): 597-603.  DOI: 10.7523/j.issn.2095-6134.2011.5.005
Abstract ( 1048 ) PDF (KB) ( 1 )

We present a concurrent execution method for contral of large quantity displacement actuators for extremely large telescope based on FPGA technology, and the key is to build a control module which generates the control signals of displacement actuators. The construction and simulation using low-level verilog hardware language is described in detail, and the implementation of hardware and software systems is also described.

Competitiveness of high-tech industries in Beijing based on dynamic shift-share analysis
WANG Zhao-Hong, ZHANG Xiao-Ping
2011, 28 (5): 604-610.  DOI: 10.7523/j.issn.2095-6134.2011.5.006
Abstract ( 1183 ) PDF (KB) ( 2 )

In order to explore the competitiveness of high-tech industries in Beijing, dynamic shift-share analysis (DSSA) was applied in this study. We conclude that electron and communication equipment manufacturing industries possess a better development condition and a strong competitiveness; medical equipment manufacturing industry and computer and office equipment manufacturing industry lack competition and development potential; and although aerospace and aviation industry and medical manufacturing industry possess certain competitiveness, their economic growths are at disadvantage. In future development, more initiatives should be taken to improve competitiveness of potential high-tech industries in Beijing.

Analysis on the spectral reflectance response to snow contaminants in Northeast China
LEI Xiao-Chun, SONG Kai-Shan, DU Jia, WU Yan-Qing, WANG Yuan-Dong, TANG Xu-Guang, ZENG Li-Hong
2011, 28 (5): 611-616.  DOI: 10.7523/j.issn.2095-6134.2011.5.007
Abstract ( 1208 ) PDF (KB) ( 1 )

We have analyzed the relationship between the snow spectrum and snow contaminants. It is found that from 350nm to 850nm snow reflectance dramatically decreases with increase in concentrations of contaminants in snow. The results show that snow reflectance at 384nm logarithmically decreases with increase in the snow contaminants while the reflectance at 1495nm exponentially increases with the snow contaminants. Besides, we have selected six bands according to the center wavelength of TM to analyze the relation between snow reflectance and snow contaminants, and we come to the same conclusion as from the hyperspectral analysis. Therefore, this method can be used in combination with TM image to forecast the contaminants in snow.

Scenario prediction for CO2 emissions in 2020 in Jilin province
ZHANG Ya-Xin, ZHANG Ping-Yu
2011, 28 (5): 617-623.  DOI: 10.7523/j.issn.2095-6134.2011.5.008
Abstract ( 1161 ) PDF (KB) ( 3 )

Using the data of population, GDP, and energy intensity in Jilin province from 1978 to 2009 as input data, we use BP neural network to predict carbon dioxide emissions in 2020 in Jilin province under reference and emission mitigation scenarios. The results show that, if we use carbon dioxide emissions per unit of GDP in 2005 in Jilin province as a reference, CO2 emissions per GDP in 2020 will be reduced by 55.17% and 58.79% under the two scenarios, respectively. The results also show that, if we use the national average level in 2005 as a reference, CO2 emissions per unit of GDP in 2020 in Jilin province will be reduced by 35.40% and 40.62%, respectively.

A new interpolation scheme of interface parameters for radial heat conduction
WANG Hui, XU Ming-Hai
2011, 28 (5): 624-629.  DOI: 10.7523/j.issn.2095-6134.2011.5.009
Abstract ( 1080 ) PDF (KB) ( 2 )

The variable coefficient radial heat conduction problem is studied in the present work. A reasonable computing method for heat conductance is proposed in terms of Fourier law,and the interpolation formulae for interface radius and radial heat conductivity in different coordinate systems are thus derived on the basis of the compatible principle of flux.The new interpolation schemes are evaluated in solution of several typical nonlinear and variable coefficient conduction problems, and the solutions are compared with those obtained using the schemes in the literature.Numerical tests show that the solutions obtained using the new schemes are more accurate,because the comprehensive influences of variable cross-section and variable physical property are fully considered in the new schemes.

A self-adaptive hierarchical belief propagation algorithm
CHI Ling-Hong, GUO Li, YU Li, CHEN Yun-Bi
2011, 28 (5): 630-635.  DOI: 10.7523/j.issn.2095-6134.2011.5.010
Abstract ( 1431 ) PDF (KB) ( 3 )

We propose a self-adaptive algorithm with convergence detection to reduce the computational complexity of HBP. In the conventional HBP, the computational complexity linearly increases with specified iteration upper bound. We introduce convergence detection to stop the iteration of messages which have already converged to optimal values. Experimental results show that the self-adaptive algorithm reduces computational time by 38% or more, and the computational time is insensitive to iteration upper bound. The convergence detection methodology can be used in other HBP-related applications.

Design on configurations of multi-beam antenna of LEO communication satellite
ZHAO Xing-Wei, LV Yuan, LIU Hui-Jie, LIANG Xu-Wen
2011, 28 (5): 636-641.  DOI: 10.7523/j.issn.2095-6134.2011.5.011
Abstract ( 1226 ) PDF (KB) ( 2 )

We present systematic analysis and planning of multi-beam antenna based on the features of LEO communication satellite. First, the reasons for adopting multi-beam antenna system are analyzed. Calculations of system parameters within the satellite coverage range are performed based on 7-beam equal-coverage-area scheme. System parameters, like beam width and beam angle, are given. Then, the scheme of array antenna is elaborated and analyzed. Some beamforming and multiplexing schemes are designed and analyzed.

A modified method for storage and revoking of the AACS device keys
YANG Hui-Hui, ZHAO Xian-Feng
2011, 28 (5): 642-647.  DOI: 10.7523/j.issn.2095-6134.2011.5.012
Abstract ( 1162 ) PDF (KB) ( 5 )

The advanced access content system is a standard for content distribution and digital rights management. It revokes compromised devices by revoking their corresponding device keys and manages them by using the subset cover tree method, which needs many device keys for storing each device. On the reasonable assumption that devices are revoked randomly and uniformly, a modified method is proposed for storage and revoking of the keys. Then, the number of the keys decreases greatly, while the number of the subset covers for legal devices only increases slightly.

TPM security model for virtual domains
QIN Yu, LAN Hai-Bo
2011, 28 (5): 648-658.  DOI: 10.7523/j.issn.2095-6134.2011.5.013
Abstract ( 1265 ) PDF (KB) ( 2 )

Considering that TPM access control mechanism can not be directly applied in virtualization computing, we build the security model for virtual domains based on the dependent relationships of TPM objects and the security requirements of the virtual domains. We add the security constraints of virtual domain, integrity and confidentiality, for the TPM objects' access requests in the model and solve the problems about TPM objects creation, usage, and destroy in multiple virtual domains. The logic analysis for the security rules in the model are further given in this paper. Through the tests on the prototype system, we show that the model has very small performance impact on trust virtualization platform.

A censorship-resistant covert communication protocol based on Web communication behavior
TAN Qing-Feng, SHI Jin-Qiao, GUO Li, WANG Xiao
2011, 28 (5): 659-667.  DOI: 10.7523/j.issn.2095-6134.2011.5.014
Abstract ( 1623 ) PDF (KB) ( 1 )

The existing covert communication method based on TCP/IP or HTTP often utilizes characteristics of protocol and hides extra data in specific fields of protocol header. Such a method leaves some obvious signatures. However, timing-based covert communications have some kind of traffic pattern. We propose a censorship-resistant covert communication protocol based on Web communication behavior, which combines dynamic asymmetric communication and Markov model-based Web usage prediction. In this paper we focus on covert communication protocol, prototype system, and security of the protocol. The test results show that our method has high performance and safety.

A behavior-based client defense scheme against XSS
WANG Xia-Li, ZHANG Yu-Qing
2011, 28 (5): 668-675.  DOI: 10.7523/j.issn.2095-6134.2011.5.015
Abstract ( 1645 ) PDF (KB) ( 4 )

Recent popularity of Web 2.0 application has given rise to a large number of Web vulnerabilities, and XSS vulnerability is among the top security threats. In recent years, the occurrence of XSS worms worsened the situation of Web security. Existing XSS defense methods mainly depend on filtering users’ inputs on the server side, which cannot protect in time the main victims of XSS attacks, the Internet users. In this paper we focus on the analysis of XSS behavior, especially the propagation behavior of XSS worms, and propose a new client-side XSS defense method, StopXSS. The testing experiments show that our method can defend against XSS attacks effectively and can be used to detect even 0-Day XSS worms.

Automatic penetration test framework based on unified data format mechanism
WEN Guan-Xing, ZHANG Yuan-Chao, ZHANG Yu-Qing
2011, 28 (5): 676-683.  DOI: 10.7523/j.issn.2095-6134.2011.5.016
Abstract ( 1188 ) PDF (KB) ( 3 )

Backtrack4 is a highly evaluated penetration test platform. It contains large database of security tool collection up-to-date, but it can not work efficiently without data supporting. We propose a penetration test framework (PTF) with unified data format mechanism, which can accomplish penetration testing automatically and efficiently. Tools are used automatically for information detection, vulnerability assessment, and report createment. Real network experiments show that PTF can highly enhance the effectiveness of penetration test using Backtrack4.

A DCT domain watermarking algorithm based on scrambling transforming
LI Zhao-Hui, WANG Min
2011, 28 (5): 684-689.  DOI: 10.7523/j.issn.2095-6134.2011.5.017
Abstract ( 1207 ) PDF (KB) ( 3 )

We propose a DCT domain watermarking algorithm, which is consistent with Kerckhoff principle.This algorithm transforms the watermark image before the watermark embedding and embeds watermark images by key vector, which improves the robustness and security greatly. The experiments indicate that the program has a better robustness on Gaussian low-pass filtering, white noise, JPEG compression, image shearing, and other kinds of attack and a better security.

An improved image steganalysis method based on Markov chains for spread-spectrum data hiding
LIU Shao-Hui, SUN Jian-Chao, YAO Hong-Xun
2011, 28 (5): 690-695.  DOI: 10.7523/j.issn.2095-6134.2011.5.018
Abstract ( 1407 ) PDF (KB) ( 3 )

We propose an algorithm for steganalysis of images based on spread-spectrum data hiding. We employ Markov chains and a combination of threshold method and improved pattern recognition method, and we can discriminate whether an image contains hiding data through detecting the relativity of correlated pixels of the image. Results of the experiments on Corel’s image library show that this algorithm reduces the false alarm rate and increases the precision rate.

Modeling and detection of ontology-based Byzantine attacks
FENG Tao, SUN Guan-Nan, XIA Yan-Hui, MA Jian-Feng
2011, 28 (5): 696-705.  DOI: 10.7523/j.issn.2095-6134.2011.5.019
Abstract ( 1089 ) PDF (KB) ( 5 )

Byzantine attacks highly threaten the normal communication of the network. An ontology-based model of Byzantine attacks is proposed based on the detailed analysis of the characteristics of Byzantine attacks. The model is described in the three aspects, class, relation, and reasoning. The model realizes the universal expression of the concepts and achieves information sharing among the various nodes to make them work together. Finally we give an example of the Byzantine overlay network wormholes attack to show the availability of the model.