Loading...
Welcome to Journal of University of Chinese Academy of Sciences,Today is

Current Issue

2011, Vol.28, No.6 Previous Issue    Next Issue
Research Articles
Generalized property (ω') of finite rank perturbations of operators
LIU Jun-Ying, CAO Xiao-Hong
2011, 28 (6): 707-714.  DOI: 10.7523/j.issn.2095-6134.2011.6.001
Abstract ( 1088 ) PDF (KB) ( 3 )

We define the generalized property (ω'), a variant of Weyl's theorem. By means of the new spectrum defined in view of the property of consistency in Fredholm and index, we consider the preservation of generalized property (ω') under a finite rank perturbation commuting with T, whenever T is a-isoloid. The theory is illustrated in the case of some special classes of operators.

Some properties of complex equiangular tight frames
TIAN Xin-Xian, LI Deng-Feng
2011, 28 (6): 715-721.  DOI: 10.7523/j.issn.2095-6134.2011.6.002
Abstract ( 1065 ) PDF (KB) ( 2 )

Some properties of complex equiangular tight frames in Hilbert space are studied. First, some necessary conditions of complex equiangular tight frames are established. Secondly, some results of real equiangular tight frames are extended to complex equiangular tight frames.

Modular forms on moduli space of compact Calabi-Yau manifolds
MENG Ling-Xian, YANG Fu-Zhong
2011, 28 (6): 722-727.  DOI: 10.7523/j.issn.2095-6134.2011.6.003
Abstract ( 1441 ) PDF (KB) ( 3 )

We try to present modular form theory defined on the space formed by the entries of period matrices whose imaginary parts have definite signature on compact Calabi-Yau manifolds for the subgroup G0 of Sp(2n,Z). Then some expressions similar to Siegel modular forms are given on the space of period matrices with one negative inertia index.

Analysis of the nutrient dynamics and eutrophication characters in Xinlicheng reservoir
SUN Li-Qiang, TIAN Wei, MA Guang-Qing, SUN Chong-Yu, GU Bin
2011, 28 (6): 728-733.  DOI: 10.7523/j.issn.2095-6134.2011.6.004
Abstract ( 1393 ) PDF (KB) ( 6 )

We analyze the nutrient dynamics and eutrophication features in Xinlicheng reservoir. The variation ranges in CODMn,TN, and TP were 3.4-8.6mg/L, 0.48-1.66mg/L, and 0.021-0.096mg/L, respectively. TN and TP concentrations exceeded the threshold for eutmphie state. N/P ratios favored algal growth between July and September. The trophic state of Xinlicheng reservoir was meso-tropher to eutrophic. Significant positive correlations were found between Chlorophyll-a and water temperature, pH, and TP. However low correlations were found between Chlorophyll-a and TN and between Chlorophyll-a and dissolved oxygen.

Characteristics of present geothermal field and prediction of its thermal damage in Suntuan-Zhaoji exploration area
LUO Yi, JU Yi-Wen, TAN Jing-Qiang
2011, 28 (6): 734-739.  DOI: 10.7523/j.issn.2095-6134.2011.6.005
Abstract ( 1363 ) PDF (KB) ( 2 )

Huaibei coalfield is an important base of energy sources in East China. On the basis of analyses of temperature data in Suntuan-Zhaoji exploration area of Huaibei coalfield, thermal damage zones are mapped out in the main mining coal beds in that area. The results indicate that the geothermal gradient values range from 1.7℃/hm to 3.6℃/hm in Suntuan-Zhaoji geothermal exploration area. The average present geothermal gradient value is about 2.68℃/hm in the area. Thermal damage zones in the three main mining coal beds are high in the east part of the area and low in the west part.

A new numerical treatment of specified pressure boundary conditions
WANG Hui, XU Ming-Hai
2011, 28 (6): 740-745.  DOI: 10.7523/j.issn.2095-6134.2011.6.006
Abstract ( 1123 ) PDF (KB) ( 3 )

According to the extrapolation scheme of boundary pressure in SIMPLE algorithm, the pressure formula of internal node near the boundary is derived with specified pressure boundary. Based on the feature of Neumann boundary for velocity, a new computational formula of boundary velocity is derived. The coupling of velocity and pressure is treated by using the IDEAL algorithm, and the steps in solving the fluid flow and heat transfer problem with specified pressure boundary are illustrated. The new method is compared with the methods used in the literature in solving several typical problems. Results show that the proposed method obviously enhances the accuracy of numerical solution and accelerates the convergence of iteration process.

Artificial immune algorithm for three-dimensional flight path planning under complex environment
LIU Li-Feng, ZHANG Shu-Qing
2011, 28 (6): 746-751.  DOI: 10.7523/j.issn.2095-6134.2011.6.007
Abstract ( 1133 ) PDF (KB) ( 2 )

Artificial immune algorithm (AIA) was applied to plan three-dimensional flight tracks under complex terrain and firepower threat environment, which was done in the three cases of AIA. Meanwhile, the above-planned flight path was optimized based on mobility and seaworthiness of airplanes. Comparison of the results by AIA and by GA (genetic algorithm) indicates that under complex environment the three-dimensional flight path by AIA is not only feasible, but also has certain superiority in time.

Distributions of audio DCT coefficients
WANG Cui-Ping, GUO Li, WANG Yu-Jie, CHEN Yun-Bi
2011, 28 (6): 752-758.  DOI: 10.7523/j.issn.2095-6134.2011.6.008
Abstract ( 1720 ) PDF (KB) ( 3 )

Considering the non-gaussian property of discrete cosine transform(DCT) coefficients of audio and the limitation of modeling the DCT coefficient distribution with a single distribution such as generalized gaussian distribution(GGD) or alpha stable distribution, we propose a mixed model. This mixed model is a linearly weighted average of GGD and alpha stable distribution, while the weight values are obtained using a genetic algorithm. The model accuracy is measured with the Kullback-Leibler Divergence, a metric for evaluating the difference between two probability distributions. Experiment results show that the mixed model is close to the true distribution of DCT coefficients and is of practical use in the field of audio retrieval and steganalysis.

CDRS:an adaptive cost-driven replication strategy in cloud storage
XU Jing, YANG Shou-Bao, WANG Shu-Ling, LIU Xiao-Qian
2011, 28 (6): 759-767.  DOI: 10.7523/j.issn.2095-6134.2011.6.009
Abstract ( 1643 ) PDF (KB) ( 5 )

Considering the new problems in cloud storage environment, such as wide location, dynamic characteristic, pursuit of commercial interests, and trade-off between consistency and availability, we propose a dynamic cost-driven replication strategy (CDRS). By introducing cost in market mechanism and considering load balancing and the trade-off between consistency and availability comprehensively, this strategy operates adaptively on replication and achieves the goal of minimizing replication cost and maximizing replication profit. The experimental results show that CDRS has a better performance in both replication profit and load balancing.

Study on lifetime of wireless sensor network with adjustable sensing ranges
CHENG Yu-Juan, ZHANG Min-Hong
2011, 28 (6): 768-775.  DOI: 10.7523/j.issn.2095-6134.2011.6.010
Abstract ( 1195 ) PDF (KB) ( 3 )

Based on efficient scheduling and adapting sensing ranges which are the two important methods for maximizing wireless sensor network lifetime, we study the maximum set covers problem with adjustable sensing ranges (MSC-ASR), propose a mixed integer programming model, and demonstrate that MSC-ASR is a NPC problem. For solving MSC-ASR, we present two methods: centralized algorithm and distributed algorithm. Simulations show that the algorithms are effiective.

Implementation and optimization of high speed AES algorithm based on GPGPU and CUDA
GU Qing, GAO Neng, BAO Zhen-Zhen, XIANG Ji
2011, 28 (6): 776-785.  DOI: 10.7523/j.issn.2095-6134.2011.6.011
Abstract ( 1520 ) PDF (KB) ( 3 )

Compared with the CPU which is good at handling logic complexity service, GPGPU (general purpose graphic processing unit) is suitable for large-scale parallel processing computing. The emergence of CUDA (compute unified device architecture) accelerates the expansion of application of GPGPU. We accelerate the implementation of AES algorithm based on GPGPU and CUDA and achieve a total throughput of 6~7Gbit/s. Regardless of the time of data loading and storing, a throughput of 20Gbit/s towards an input size over 1MB can be achieved.

Verification of the L4 IPC implementation
GAO Yan-Yan, LI Xi, ZHOU Xue-Hai
2011, 28 (6): 786-792.  DOI: 10.7523/j.issn.2095-6134.2011.6.012
Abstract ( 1242 ) PDF (KB) ( 2 )

Inter-process communication (IPC) mechanism is one of the key technologies of microkernel operating system. In this paper we present a formal method to model and verify the IPC implementation. The source code of L4 IPC implementation is translated into abstract model which is described in Promela, and the abstract model can be verified with Spin directly. The experimental results show the feasibility and practicality of the method.

An auto-configuration tool for heterogeneous Hadoop cluster
DAI Dong, ZHOU Xue-Hai, YANG Feng, WANG Chao
2011, 28 (6): 793-800.  DOI: 10.7523/j.issn.2095-6134.2011.6.013
Abstract ( 1857 ) PDF (KB) ( 3 )

The rapid development of cloud computing makes the heterogeneous cluster a hot research topic. One of the urgent problems in this field is how to configure the cloud computing software platform running on a heterogeneous cluster. We propose a new tool, which can configure each local server automatically according to its hardware parameters in a Hadoop cluster and configures each server individually by analyzing the heterogeneous features and the running history of the Hadoop cluster instead of the traditional uniform way. The simulation and experiment results show that this tool can obviously reduce the maintenance cost without any degradation of system performance and improve performance compared to the manual optimization. It is believed that this method is general and extensible and should be valuable for other cloud computing platforms.

An improved AODV secure route protocol
LIU Shu-Ming, LIU Jian-Wei, MAO Jian
2011, 28 (6): 801-805.  DOI: 10.7523/j.issn.2095-6134.2011.6.014
Abstract ( 1066 ) PDF (KB) ( 2 )

A new scheme for preventing the "black hole attack" is proposed. It tests the destination node and verifies the node in the reverse direction using control messages and data messages. Nodes check and locate the black hole and remove it from the net. The intermediate nodes also verify the dubious node to minimize the damage caused by the black hole attack. Our scheme can effectively prevent the "black hole attack" and has low network overhead and transmission delay compared to the existing schemes.

A verifiable rational secret sharing scheme based on the elliptic curve
ZHANG En, CAI Yong-Quan
2011, 28 (6): 806-810.  DOI: 10.7523/j.issn.2095-6134.2011.6.015
Abstract ( 1296 ) PDF (KB) ( 3 )

A new scheme for rational secret sharing is proposed in game theoretic settings. The scheme has the following characteristics. The scheme is based on elliptic curve cryptography and it is verifiable. The dealer's and the participants' cheat can be detected. In addition, the participation of the trusted party is not needed in the secret reconstruction stage. The scheme inserts the secret into a series of fake secrets, and participants do not know whether the current round is a test round. The scheme gives rational players incentives to abide by the protocol. Finally, every player can obtain the secret fairly. Analyses indicate that the scheme is simple, fair, and effective.

Grid reputation resource selection model based on multi-service attribute
DU Rui-Zhong, ZHANG Huan-Guo, TIAN Jun-Feng
2011, 28 (6): 811-817.  DOI: 10.7523/j.issn.2095-6134.2011.6.016
Abstract ( 1229 ) PDF (KB) ( 3 )

Considering the ambiguity, complexity, and uncertainty of subjective trust and considering the demand on grid resources, we propose a grid reputation resources selection model based on multi-service attribute by analyzing the trust management in the process of grid resources access, learning from human society, and introducing the concept of service attribute. The service requester will comprehensively evaluate the service attribute based on their preferences to select transaction object. After the transaction, the service requester judges the credibility of service provider based on the actual quality of service and then measures the credibility. Simulation results show that the model can withstand attacks of malicious entities and raise the success rate of resource selection.

Dynamic trusted evaluation model of entity behavior based on extended subjective logic
YANG Xiao-Hui, ZHAO Peng-Yuan, SHI Qiang, TIAN Jun-Feng
2011, 28 (6): 818-825.  DOI: 10.7523/j.issn.2095-6134.2011.6.017
Abstract ( 1351 ) PDF (KB) ( 5 )

The traditional theory of subjective logic does not consider the fact that subjective evaluation results change with time. We present a new idea to extend traditional subjective logic theory. The traditional two-dimensional opinion space is extended to a multi-dimensional dynamic opinion space. A dynamic trusted evaluation model of entity behavior based on extended subjective logic is proposed and is implemented based on the reputation and risk evaluation mechanism. The experimental results show that the model can process malicious behavior with more sensitive reaction, more accurate detection, and more effective suppression.

A strong blind signature scheme over the braid groups
WEI Yun, XIONG Guo-Hua, ZHANG Xing-Kai, BAO Wan-Su
2011, 28 (6): 826-831.  DOI: 10.7523/j.issn.2095-6134.2011.6.018
Abstract ( 1439 ) PDF (KB) ( 3 )

A new computational problem over braid groups, one-more root extraction problem, is described, and a new strong blind signature scheme is constructed. The constructed scheme can resist one-more existential forgery against the adaptively chosen message attack under the random oracle model and has advantage over the conjugate blind signature schemes in computational efficiency and shortening signature.

Simple proof of bit security for NTRU
ZHAO Yong-Bin, FAN Tong-Rang
2011, 28 (6): 832-836.  DOI: 10.7523/j.issn.2095-6134.2011.6.019
Abstract ( 1221 ) PDF (KB) ( 3 )

Based on the malleability, the bit security for NTRU is proved in a simplified decision model. In the model, the oracle can obtain the goal plain text through a sequence of queries if the oracle can output the parity of summation of coefficients in the goal plain text. Compared to the work of Mats, the model is simple and consistent with the decryption process of NTRU. Finally, the relationship between bit security and indistinguishability of encryption scheme is analyzed and the result shows that the formal definition of strong security is of great practicability.