scispace - formally typeset
Search or ask a question

Showing papers by "Harbin Engineering University published in 2004"


Proceedings ArticleDOI
26 Aug 2004
TL;DR: The fundamental and standard algorithm is introduced, the work on the algorithm improvement during the past years is surveyed, as well as the applications on the multi-objective optimization, neural networks and electronics, etc.
Abstract: Particle swarm optimization (PSO) explores global optimal solution through exploiting the particle's memory and the swarm's memory. Its properties of low constraint on the continuity of objective function and joint of search space, and ability of adapting to dynamic environment make PSO become one of the most important swarm intelligence methods and evolutionary computation algorithms. The fundamental and standard algorithm is introduced firstly. Then the work on the algorithm improvement during the past years is surveyed, as well as the applications on the multi-objective optimization, neural networks and electronics, etc. Finally, the problems remaining unresolved and some directions of PSO research are discussed.

137 citations


Journal ArticleDOI
TL;DR: In this article, a large eddy simulation (LES) is applied to simulate the smoke movement in a ventilated tunnel fire through large-scale simulation. And the possibility of applying LES as an engineering tool to smoke management system design in tunnels is discussed.

66 citations


Journal ArticleDOI
TL;DR: In this paper, a novel method for measuring the dynamic fracture toughness, KId, using a Hopkinson pressure bar loaded instrumented Charpy impact test is presented, where the stress intensity factor dynamic response curve (KI(t)−t) for a fatigue-precracked Charpy specimen is evaluated by means of an approximate formula.

60 citations


Journal ArticleDOI
TL;DR: In this article, the durability of the adhesive/carbon-carbon composites joints in salt water with infrared spectroscopy (IR), energy dispersive X-ray spectrosopy (EDX) and shear strength test methods was investigated.

40 citations


Journal ArticleDOI
TL;DR: In this article, the alpha-Fe nanoparticles with an average size of 17 nm were prepared by a low temperature chemical vapor-liquid reaction, using Fe(CO)(5) liquid and NH3 gas as the starting materials.

35 citations


Proceedings ArticleDOI
26 Aug 2004
TL;DR: The research aims at the design, implementation and evaluation of an intelligent intrusion detection system based on artificial neural network that can promptly detect attacks, no matter they are known or not.
Abstract: An intrusion detection system is an important component of the computer and information security framework. Its main goal is to differentiate between normal activities of the system and behaviors that can be classified as suspicious or intrusive. The research aims at the design, implementation and evaluation of an intelligent intrusion detection system based on artificial neural network that can promptly detect attacks, no matter they are known or not. In this system, neural network is used to learn about the normal users' behavior to form the network traffic that only contains information about normal users. When the learning is over, the system is tested with the network traffic that contains both attacks and normal data. A simulated computer network is used to test the system performance. In experiments, system performance has been compared with other research works and the results in experiments are very promising.

33 citations


Proceedings ArticleDOI
15 Jun 2004
TL;DR: An effective anomaly detection method based on HMMs (hidden Markov models) is proposed to learn patterns of Unix processes and can construct accurate and concise discriminator to detect intrusive actions.
Abstract: Intrusion detection has emerged as an important approach to security problems. The existing techniques are analyzed, and then an effective anomaly detection method based on HMMs (hidden Markov models) is proposed to learn patterns of Unix processes. Fixed-length sequences of system calls were extracted from traces of programs to train and test models. The RP (relative probability) value, which uses short sequences as inputs, is computed to classify normal and abnormal behaviors. The algorithm is simple and can be directly applied. Experiments on sendmail and lpr traces demonstrate that the method can construct accurate and concise discriminator to detect intrusive actions.

30 citations


Journal ArticleDOI
TL;DR: In this article, the effect of axial relative position of the tube and coil on the pulse force distribution was analyzed and the difference of deformed tube patterns was analyzed by the amplitude, pulse width, distribution of pulse force and end restraining condition.

28 citations


Journal ArticleDOI
TL;DR: In this article, an analytical method is developed for scattering of SH-waves and dynamic stress concentration by an interacting interface crack and a circular cavity near the bimaterial interface, where a suitable Green's function is contructed, which is the fundamental solution of the displacement field for an elastic half space with a circular cavities impacted by an out-plane harmonic line source loading at the horizontal surface.
Abstract: An analytical method is developed for scattering of SH-waves and dynamic stress concentration by an interacting interface crack and a circular cavity near bimaterial interface. A suitable Green's function is contructed, which is the fundamental solution of the displacement field for an elastic half space with a circular cavity impacted by an out-plane harmonic line source loading at the horizontal surface. First, the bimaterial media is divided into two parts along the horizontal interface, one is an elastic half space with a circular cavity and the other is a complete half space. Then the problem is solved according to the procedure of combination and by the Green's function method. The horizontal surfaces of the two half spaces are loaded with undetermined anti-plane forces in order to satisfy continuity conditions at the linking section, or with some forces to recover cracks by means of crack-division technique. A series of Fredholm integral equations of first kind for determining the unknown forces can be set up through continuity conditions as expressed in terms of the Green's function. Moreover, some expressions are given in this paper, such as dynamic stress intensity factor (DSIF) at the tip of the interface crack and dynamic stress concentration factor (DSCF) around the circular cavity edge. Numerical examples are provided to show the influences of the wave numbers, the geometrical location of the interface crack and the circular cavity, and parameter combinations of different medial upon DSIF and DSCF.

27 citations


Journal ArticleDOI
TL;DR: In this paper, the authors measured the stress-CTOD curves for concrete with a semi-elliptical surface crack by fiber optic sensing system and used the elasto-plastic model accounting for the lag strain in the protective coating of optical fiber and the strain localization of concrete near the final crack.

27 citations


Journal ArticleDOI
TL;DR: In this article, the authors reported the first silver(I) network polymer formed by the self-assembly of bis(pyrrol-2-ylmethylene)hydrazine with silver nitrate, in which the silver centers are bonded to the C−N bonds of the pyrrole rings in an η2-fashion.
Abstract: This paper reports the first silver(I) network polymer formed by the self-assembly of bis(pyrrol-2-ylmethylene)hydrazine with silver nitrate, in which the silver centers are bonded to the C−N bonds of the pyrrole rings in an η2-fashion. An X-ray crystal structure analysis revealed that the self-assembly of the bis(pyrrol-2-ylmethylene)hydrazine ligand with AgI gives a 2D sheet, which is further assembled to form a 3D network through weak intermolecular hydrogen bonding between the protons of the pyrrole rings and the oxygen atoms of the nitrate ions. (© Wiley-VCH Verlag GmbH & Co. KGaA, 69451 Weinheim, Germany, 2004)

Proceedings ArticleDOI
26 Apr 2004
TL;DR: The paper presents the basic composition and integration method of the AUV's navigation system using Extended Kalman Filtering (EKF) technique and shows that the system is able to achieve high precision, which is one meter approximately, with GSP and DVL working properly.
Abstract: To Navigate the Autonomous Underwater Vehicle (AUV) accurately is one of the most important aspects in AUV's study. The paper presents the basic composition and integration method of the AUV's navigation system using Extended Kalman Filtering (EKF) technique. In the specified application, GPS receiver, Strapdown INS and Doppler Velocity Log (DVL) are mounted aboard on the test vessel. The 3-day experiment was carried out in Songhua Lake, nearby Harbin City. The test results show that the system is able to achieve high precision, which is one meter approximately, with GSP and DVL working properly. Without GPS augmentation, which is the usual configuration for AUV application, accurate positioning and navigating results are still available, provided that the DVL satisfies its working requirements. Under this situation, a 3-meter precision could be reached. Besides the theoretical and experimental analysis of the integrated navigation system, the alignment technique in swing base is also discussed in detail.

Proceedings ArticleDOI
28 Mar 2004
TL;DR: This paper proposed a new scheme for indexing XML data using encoding elements, termed ES-index, and its algorithms, which quickly determines the siblings-siblings and ancestor-descendant relationship in hierarchy of XML data.
Abstract: E-services are becoming a promising technology for the effective automation of application integration across the Web. They build upon XML, as data format for exchanging messages between applications. Accompanied with WSDL, UDDI, and SOAP, XML has clearly influenced positively the development of applications running on the Web. As the basic technology, indexing scheme for XML data have been studied in recent years to optimize path query processing by summarizing path information. However, most of these schemes based on tree traversals may not meet the processing requirements under heavy access requests. In this paper, we proposed a new scheme for indexing XML data using encoding elements, termed ES-index, and its algorithms. This encoding scheme quickly determines the siblings-siblings and ancestor-descendant relationship in hierarchy of XML data. Our experiment results over a wide range of XML documents demonstrate that ES-index structure is efficient for data access.

Journal ArticleDOI
TL;DR: In this article, an underwater ship-hull cleaning robot was used to realize the automation of cleaning underwater ship hulls so that service life of ship will be prolonged and ship speed will be raised.
Abstract: The research on underwater ship-hull cleaning robot was conducted on the purpose of realizing the automation of cleaning underwater ship hull so that service life of ship will be prolonged and ship speed will raised. Moreover, fuel consumption and the work intensity of divers will be reduced. In this paper, the current situation and the latest technology in China and abroad were analyzed; meanwhile, the typical characteristics of the underwater cleaning robot were introduced. According to the work principle of the underwater cleaning robot, the emphasis was put on the analysis and study of permanent-magnetic absorption, magnetic wheel, airproof and anticorrosion, underwater cleaning equipment and control system. The robot is easy in rotation and simple in control.

Journal ArticleDOI
TL;DR: In this article, the authors studied the initial boundary value problem of nonlinear parabolic equation ∂ u ∂ t = ∑ i=1 N ∂ ∂ x i ∈ L 2 (0,∞;L 2 (Ω)) and u(t)∈ W for 0⩽ t.
Abstract: In this paper we study the initial boundary value problem of nonlinear parabolic equation ∂ u ∂ t = ∑ i=1 N ∂ ∂ x i ∂ u ∂ x i p−2 ∂ u ∂ x i +u 1+α , x∈Ω, t>0, u(x,0)=u 0 (x), x∈Ω, u(x,t)=0, x∈ ∂ Ω, t⩾0, where Ω⊂ R N is a bounded domain, p α p ⩾ N ; p Np N−p if p N . By using potential well method we prove that if 0⩽u 0 (x)∈W 0 1,p (Ω) , J ( u 0 )= d , I ( u 0 )>0 or I ( u 0 )=0, 0 J ( u 0 )⩽ d , then the problem admits a global solution u(t)∈L ∞ (0,∞;W 0 1,p (Ω)) with u t (t)∈L 2 (0,∞;L 2 (Ω)) and u(t)∈ W for 0⩽ t

Journal ArticleDOI
TL;DR: In this paper, the authors studied the initial boundary value problem of multidimensional viscoelasticity equations and obtained new existence theorems of global solutions and behaviour of vacuum isolation of solutions.
Abstract: In this paper we study the initial boundary value problem of multidimensional viscoelasticity equations u tt − Δ u t − ∑ i=1 N ∂ ∂x i σ i (u x i )+f(u t )=g(u), x∈Ω, t>0, u(x,0)=u 0 (x), u t (x,0)=u 1 (x), x∈Ω, u(x,t)=0, x∈∂Ω, t⩾0, where Ω⊂ R N is a bounded domain, (σi(s1)−σi(s2))(s1−s2)>0, f(s)s⩾0, g(s)s⩾0 and satisfy some growth conditions. First we introduce a family of potential wells by using a new method. Then using it we obtain some new existence theorems of global solutions and behaviour of vacuum isolation of solutions.

Journal ArticleDOI
TL;DR: A method with the strong fluctuation theory to calculate the effective electromagnetic parameters of fiber fabric radar absorbing materials (RAM) is showed in this paper, where a program is designed to search the solution and use the results to design multilayer radar absorbing material.

Proceedings ArticleDOI
01 Jan 2004
TL;DR: In this paper, a basic wet compression system stability bifurcation model is established and numerical simulations are carried out with MATLAB SIMULINK to verify the wet compression effects on the stabilities of compression system.
Abstract: In this part, wet compression system stability performances are theoretical analyzed with bifurcation theory, and a basic wet compression system stability bifurcation model is established. Numerical simulations are carried out with MATLAB SIMULINK to verify the wet compression effects on the stabilities of compression system. The results indicate that wet compression can not only restrain the rotating stall, but also can diminish the surge, except for some extreme mismatching cases. Therefore, wet compression can be another useful method to help improving the stability performance and increase the stable working range of gas turbine.© 2004 ASME

Proceedings ArticleDOI
10 Jun 2004
TL;DR: In this paper, the measurement and evaluation of transformer losses under linear and nonlinear load conditions were discussed, and typical financial benefits that result from the application of high efficiency harmonic mitigating distribution transformers, under nonlinear loading, were calculated.
Abstract: Harmonic currents, generated by nonlinear electronic loads, produce 'penalty losses' in every element of an electrical distribution system. These harmonic-related losses reduce system efficiency, cause apparatus overheating, and increase power and air conditioning costs. Harmonic currents effectively de-rate existing systems and, when accommodated, add substantially to the capital cost of new distribution systems. The measurement and evaluation of transformer losses under linear and nonlinear load conditions will be discussed. In addition, typical financial benefits that result from the application of high efficiency harmonic mitigating distribution transformers, under nonlinear loading, will be calculated.

Proceedings ArticleDOI
15 Jun 2004
TL;DR: A new method for anomaly intrusion detection is proposed based on linear prediction and Markov chain model that is effective and efficient, and can be used in practice to monitor the computer system in real time.
Abstract: Intrusion detection has emerged as an important approach to network security. A new method for anomaly intrusion detection is proposed based on linear prediction and Markov chain model. Linear prediction is employed to extract features from system calls sequences of the privileged processes which are used to make up of the character database of those processes, and then the Markov chain model is founded based on those features. The observed behavior of the system is analyzed to infer the probability that the Markov chain model of the norm profile supports the observed behavior. A low probability of support indicates an anomalous behavior that may result from intrusive activities. The experiments show this method is effective and efficient, and can be used in practice to monitor the computer system in real time.

Proceedings ArticleDOI
24 Aug 2004
TL;DR: The common problems of current intrusion detection systems are analyzed, and a distributed IDS framework model based on independent agents is proposed, which is an open system, which has good scalability.
Abstract: The common problems of current intrusion detection systems are analyzed in this paper. Based on these, a distributed IDS framework model based on independent agents is proposed. This paper describes the function of entities, and defines the communication mechanism. The proposed model is an open system, which has good scalability. Agents are independent individually, while they can communicate and cooperate one another to take actions. In the end, directions for future work are discussed.

Book ChapterDOI
25 Aug 2004
TL;DR: In this article, a fuzzy set based model is proposed for building trust and reputation in P2P collaborations based on observations and recommendations, and using fuzzy set a peer can present differentiated trust and combine different aspects of trust in collaborations.
Abstract: Trust plays an important role in making collaborative decisions, so the trust problem in P2P networks has become a focus of research. In this paper, a fuzz set based model is proposed for building trust and reputation in P2P collaborations based on observations and recommendations, and using fuzzy set a peer can present differentiated trust and combine different aspects of trust in collaborations. Depending on fuzzy similarity measure, a good recommenders set can be maintained. The evaluation of the model using simulation experiments shows its effectiveness.

Journal ArticleDOI
TL;DR: In this paper, a fiber optic ultrasonic sensor based on Fizeau interferometer has been developed and demonstrated, which enables eliminating much undesirable noise by combining both the reference arm and the sensing arm within the same length of fiber.
Abstract: A fiber optic ultrasonic sensor based on Fizeau interferometer has been developed and demonstrated. A helium–neon laser light source with wavelength 0.6328 μm is used in our experiment. A special feature is its Fizeau configuration, which enables one to eliminate much undesirable noise by combining both the reference arm and the sensing arm within the same length of fiber. The dynamic response model of photo-elastic effect of ultrasonic wave and optical fiber is established. The fiber optic ultrasonic sensor experimental results are obtained and compared with the convenient PZT transducer.

Proceedings ArticleDOI
15 Jun 2004
TL;DR: In these experiments the characters of an attack, such as smurf, are summarized inductively through the datasets of the 1998 DARPA Intrusion Detection Evaluation Program.
Abstract: Building and updating an effective intrusion detection system is complex engineering knowledge. A method of learning the intrusion detection rules based on Genetic Algorithms is presented in order to realize the automation of the detection models. The same attributes of an intrusion can be found through the heuristic search in the network data space. In our experiments the characters of an attack, such as smurf, are summarized inductively through the datasets of the 1998 DARPA Intrusion Detection Evaluation Program. The effectiveness and robustness of the approach are proved.

Journal ArticleDOI
TL;DR: In this article, a theoretical model for strain measurement of concrete under biaxial compression by embedded fiber optic sensor is presented, in which both the fiber core and the matrix concrete were supposed to be elastic, whereas the coating of the optical fiber was supposed to have ideal elasto-plasticity.

Proceedings ArticleDOI
01 Jan 2004
TL;DR: In this article, a Moore-Greitzer stability model is established for wet compression gas turbine, which can be used for active control of compression system instabilities, such as surge and rotating stall.
Abstract: Wet compression Moore-Greitzer stability model is established in this paper. Transient performances of wet compression system are investigated and discussed. The model can be used for instabilities analyses of wet compression gas turbine, and be used for active control of compression system instabilities. The simulation results indicate that water injection is not only a technique to improve the thermodynamic performance of gas turbine, but also be an effective method to stabilize the instabilities of the compression system, surge and rotating stall.Copyright © 2004 by ASME

Proceedings ArticleDOI
09 Nov 2004
TL;DR: In this article, the authors discuss the choice principles and methods of optimal 2-order horizontal damping network (HDN) in inertial navigation system, gives out optimal 2order HWD networks in various damping coefficients, and reduces the integrated inertial mathematic model of navigation system.
Abstract: This work discusses the choice principles and methods of optimal 2-order horizontal damping network (HDN) in inertial navigation system, gives out optimal 2-order horizontal damping networks in various damping coefficients, and reduces the integrated inertial mathematic model of navigation system. By simulation, it shows that the inertial navigation system with variable coefficients horizontal damping networks has higher precision in motion voyage.

Book ChapterDOI
14 May 2004
TL;DR: Modifications of these methods that mine fuzzy association rules and fuzzy frequent episodes are introduced and off-line methods that utilize these fuzzy methods for anomaly detection from audit data are described.
Abstract: Two data mining methods (association rule mining and frequent episode mining) have been proved to fit to the intrusion detection problem. But the normal and the intrusions in computer networks are hard to predict as the boundaries between them cannot be well defined. This prediction process may generate false alarms in many anomaly based intrusion detection systems. This paper presented a method to realize that the false alarm rate in determining intrusive activities can be reduced with fuzzy logic. A set of fuzzy rules can be used to define the normal and abnormal behavior in a computer network, and fuzzy data mining algorithms can be applied over such rules to determine when an intrusion is in progress. In this paper, we have introduced modifications of these methods that mine fuzzy association rules and fuzzy frequent episodes and have described off-line methods that utilize these fuzzy methods for anomaly detection from audit data. We describe experiments that explore their applicability for intrusion detection. Experimental results indicate that fuzzy data mining can provide effective approximate anomaly detection.

Journal Article
TL;DR: In this article, the authors proposed an adaptive beamforming algorithm that broadens the null width and is independent of the direction of the interferer by the rotation of the steering vector, which increases the robustness of the algorithm.
Abstract: The adaptive beamforming algorithm can place the null in the direction of the jammer. When the interferer moves quickly or the antenna platform vibrates, it is possible that the weight mismatches the data of measurement due to the perturbation of the interferer location.Proposed is an algorithm that broadens the null width and is independent of the direction of the interferer by the rotation of the steering vector. When the data mismatch is smaller, the broadening null technology can effectively suppress interference, which increases the robustness of the algorithm. The results of computer simulation verify the efficiency of the proposed method and shows that it can work robustly when the interferer moves quickly or the antenna platform vibrates slightly.

Book ChapterDOI
19 Aug 2004
TL;DR: The problem of detecting buried landmine is tackled in the feature extraction and classification by determining the likelihood set of an unknown pattern (feature vector), extracted from ground penetrating radar data by using SVM method.
Abstract: In this paper, the problem of detecting buried landmine is tackled in the feature extraction and classification Determining the likelihood set of an unknown pattern (feature vector), extracted from ground penetrating radar data by using SVM method The advantage of SVM method in feature extraction and classification of image processing is: A classifier works well both on the training samples and on previously unseen samples; In addition, the SVM provides, enable a classification performance improvement based on from high feature dimensions to two or three feature dimensions Finally, SVM method has a standard theory and a good implementation algorithm