Please wait a minute...

Current Issue

, Volume 6 Issue 5   
A completely open cavity realized with photonic crystal wedges
HE Sai-ling, RUAN Zhi-chao
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 1-.   https://doi.org/10.1631/jzus.2005.A0355
Abstract   PDF (0KB)
A completely open cavity, which is formed by three 60-degree wedges of a photonic crystal with negative effective index, is introduced. Such a realizable design for a completely open cavity (i.e., without any reflective wall in the radial direction) is the first of its kind ever been reported. Due to the negative effective refraction index of the photonic crystal and the high transmission at the photonic crystal/air interfaces, a closed path with zero optical path is formed for the resonance. The present open cavity is very suitable for use as a biosens as it has large air wedges into which a liquid measurand can flow easily.
On the construction of cryptographically strong Boolean functions with desirable trade-off
REN Kui, PARK Jaemin, KIM Kwangjo
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 2-.   https://doi.org/10.1631/jzus.2005.A0358
Abstract   PDF (0KB)
This paper proposes a practical algorithm for systematically generating strong Boolean functions (f:GF(2)n?úGF(2)) with cryptographic meaning. This algorithm takes bent function as input and directly outputs the resulted Boolean function in terms of truth table sequence. This algorithm was used to develop two classes of balanced Boolean functions, one of which has very good cryptographic properties: nl(f)=22k-1-2k+2k-2 (n=2k), with the sum-of-squares avalanche characteristic of f satisfying |òf=24k+23k+2+23k+23k-2 and the absolute avalanche characteristic of |¤f satisfying |¤f=2k+1. This is the best result up to now compared to existing ones. Instead of bent sequences, starting from random Boolean functions was also tested in the algorithm. Experimental results showed that starting from bent sequences is highly superior to starting from random Boolean functions.
Nonlinear modeling of PEMFC based on neural networks identification
SUN Tao, CAO Guang-yi, ZHU Xin-jian
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 3-.   https://doi.org/10.1631/jzus.2005.A0365
Abstract   PDF (0KB)
The proton exchange membrane generation technology is highly efficient and clean, and is considered as the most hopeful ?°green?± power technology. The operating principles of proton exchange membrane fuel cell (PEMFC) system involve thermodynamics, electro
An immunity-based technique to detect network intrusions
PAN Feng, DING Yun-fei, WANG Wei-nong
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 4-.   https://doi.org/10.1631/jzus.2005.A0371
Abstract   PDF (0KB)
This paper briefly reviews other people?ˉs works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune algorithm, multi-level negative selection algorithm, is developed. In essence, compared with Forrest?ˉs negative selection algorithm, it enhances detector generation efficiency. This algorithm integrates clonal selection process into negative selection process for the first time. After careful analyses, this algorithm was applied to network intrusion detection and achieved good results.
Control DHT maintenance costs with session heterogeneity
ZOU Fu-tai, WU Zeng-de, ZHANG Liang, MA Fan-yuan
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 5-.   https://doi.org/10.1631/jzus.2005.A0378
Abstract   PDF (0KB)
The maintaining overheads of Distributed Hash Table (DHT) topology have recently received considerable attention. This paper presents a novel SHT (Session Heterogeneity Topology) model, in which DHT is reconstructed with session heterogeneity. SHT clusters nodes by means of session heterogeneity among nodes and selects the stable nodes as the participants of DHT. With an evolving process, this model gradually makes DHT stable and reliable. Therefore the high maintaining overheads for DHT are effectively controlled. Simulation with real traces of session distribution showed that the maintaining overheads are reduced dramatically and that the data availability is greatly improved.
NETLAB-An Internet based laboratory for electrical engineering education
ZHANG Shu, ZHU Shan-an, LIN Qun, XU Zhi-wei, YING Shao-dong
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 7-.   https://doi.org/10.1631/jzus.2005.A0393
Abstract   PDF (0KB)
This article describes an Internet based laboratory (NETLAB) developed at Zhejiang University for electrical engineering education. A key feature of the project is the use of real experimental systems rather than simulation or virtual reality. NELTAB provides remote access to a wide variety of experiments, including not only basic electrical and electronic experiments but also many innovative control experiments. Students can effectively use the laboratory at any time and from anywhere. NETLAB has been in operation since July 2003.
A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications
JIANG Jun, HE Chen
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 8-.   https://doi.org/10.1631/jzus.2005.A0399
Abstract   PDF (0KB)
In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and ?°challenge-response?± techniques were adopted to build t
Instance-oriented delegation: A solution for providing security to Grid-based mobile agent middleware
MA Tian-chi, LI Shan-ping
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 9-.   https://doi.org/10.1631/jzus.2005.A0405
Abstract   PDF (0KB)
New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid environment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security threats in such mobile agent systems. T
Using location types to control interferences in mobile resources
FU Cheng, YOU Jin-yuan
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 10-.   https://doi.org/10.1631/jzus.2005.A0414
Abstract   PDF (0KB)
This paper presents a type system, called Location System (L-S), to control the interferences in the ambient-like calculi. The L-S allows well-behaved (non-interfering) processes to run in parallel if they do not access shared location during their execution life cycle. This approach is designed for a variant of Mobile Ambient (MA), called Safe Mobile Resources (SR), but it can be also used in other ambient-like calculi which are also discussed in this paper.
An iris recognition method based on multi-orientation features and Non-symmetrical SVM
GU Hong-ying, ZHUANG Yue-ting, PAN Yun-he
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 12-.   https://doi.org/10.1631/jzus.2005.A0428
Abstract   PDF (0KB)
A new iris feature extraction approach using both spatial and frequency domain is presented. Steerable pyramid is adopted to get the orientation information on iris images. The feature sequence is extracted on each sub-image and used to train Support Vect
Support Vector Machine for mechanical faults classification
JIANG Zhi-qiang, FU Han-guang, LI Ling-jun
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 13-.   https://doi.org/10.1631/jzus.2005.A0433
Abstract   PDF (0KB)
Support Vector Machine (SVM) is a machine learning algorithm based on the Statistical Learning Theory (SLT), which can get good classification effects with a few learning samples. SVM represents a new approach to pattern classification and has been shown
New predictive control algorithms based on least squares Support Vector Machines
LIU Bin, SU Hong-ye, CHU Jian
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 14-.   https://doi.org/10.1631/jzus.2005.A0440
Abstract   PDF (0KB)
Used for industrial process with different degree of nonlinearity, the two predictive control algorithms presented in this paper are based on least squares Support Vector Machines (LS-SVM) model. For the weakly nonlinear system, the system model is built
A novel face recognition method with feature combination
LI Wen-shu, ZHOU Chang-le, XU Jia-tuo
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 16-.   https://doi.org/10.1631/jzus.2005.A0454
Abstract   PDF (0KB)
A novel combined personalized feature framework is proposed for face recognition (FR). In the framework, the proposed linear discriminant analysis (LDA) makes use of the null space of the within-class scatter matrix effectively, and Global feature vectors (PCA-transformed) and local feature vectors (Gabor wavelet-transformed) are integrated by complex vectors as input feature of improved LDA. The proposed method is compared to other commonly used FR methods on two face databases (ORL and UMIST). Results demonstrated that the performance of the proposed method is superior to that of traditional FR approaches
Smooth feature line detection for meshes
GUO Yan-wen, PENG Qun-sheng, HU Guo-fei, WANG Jin
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 17-.   https://doi.org/10.1631/jzus.2005.A0460
Abstract   PDF (0KB)
In this paper the authors present a novel semi-automatic feature line detection technique for meshes. Taking into account the distance and orientation between two vertices on meshes and the curvature information of vertices, they first find an initial feature line which connects some user-specified vertices on meshes; then parameterize the ?°feature strip?± surrounding the feature line onto a planar domain using a vertex flattening technique; and refine the flattened feature strip using the 2D snakes approach to make the feature line smoother and more accurate; lastly they get the feature line by mapping the refined line back to the original meshes. Experimental results showed that their method can extract the feature line rapidly and precisely. As an application, they propose a mesh decomposition method based on the detected feature line.
14 articles

NoticeMore

Links