Due to the high importance and complexity in artificial intelligence (AI) study, there have been various schools of AI theory that were formed in the 20th century among which the structuralism, functionalism and behaviorism approaches are the representatives. All the three approaches have made appreciable successes. However, there have been also controversies among the three. A new approach, named mechanism approach, is thus proposed here to attack the nucleus of intelligence through the investigation on the core mechanism of its formation. It is our discovery that the core mechanism of intelligence formation appeared to be a series of transformations -- from information to knowledge and further to intelligence. In addition, it is also found that the three mentioned schools of AI theory could well be harmoniously unified within the framework of the mechanism approach. The mechanism approach and the harmonious unification of AI theories may hopefully provide a new understanding and hence a new direction for the future development of AI theory.
A novel and effective receiver scheme is presented with Turbo-code in order to effectively overcome the space interference induced by multi-antenna MIMO system. By modifying the conventional Turbo iterative decoding algorithm, new scheme synchronizes the interference detector with Turbo decoder, which can fully utilize original received information from the point of view of information theory. Multi-receive antennas can also provide the diversity gain for LLR information and iterative extrinsic information. The scheme breaks the restriction of space and time domain of STBC and BLAST. Simulation results verify the validity of the scheme from system performance and iterative parameters.
The vector equations are set up for four loop of one kind of nine-link Barranov truss by complex number vector method, and the four equations are changed into complex exponential number form. Firstly, a 52 degree univariate polynomial equation is deduced by using resultant elimination method. 6 extraneous roots are found during the process to obtain the other 3 variables by using Euclidean algorithm. The production reason of extraneous roots is analyzed and the improved method is proposed, that is the degree of the variables during the elimination process is reduced by searching relations among the vectors, so that a 46 degree univariate polynomial equation can be obtained directly. Finally, it is verified that the analytical solutions number of this kind of Barranov truss is 46 by a numerical example.
Peer-to-peer (P2P) network is a novel technology that economically and efficiently delivers multimedia service to end user. This paper investigates the key effects on P2P network performance. A set of performance Metrics on P2P network is defined. Finally, a scalable model for performance measuring on P2P network is proposed, and the mechanism of its elements and their relations are discussed.
It's difficult to detect blindly the image rotation angle in blind watermarking under geometry attack. By analyzing image spectrum, the character of spectrum amplitude ridge contained in image borderline is discovered. The practical distinguishing character filter is designed while character sharp filter can avoid the interfere whose amplitude ridge isn’t axial. The angle of spectrum amplitude ridge in black-white character image can be calculated by Hough transform, that is the value of image rotation angle model л/2. The experiment result proves the proposed algorithm has light computational load and high precision without original image. It can endure the attacks of geometry attack, low-pass filter, noise additional, lossy compression at the same time.
A composite materials with negative permittivity were selected as the research object. It was presented how to use Finite Difference Time Domain (FDTD) method to numerically analyze the transmission and reflection characteristic of the composite materials. The simulation results were compared with the experimental data for testifying the feasibility of this method. Based on this, the shielding effectiveness of the composite materials to ultra wideband EMP (UWB) and high power microwave (HPM) were analyzed. The simulation result shows that the composite materials have stong shielding effectiveness to UWB and HMP . It is helpful to apply composite materials in the domain of electromagnetic shielding.
In networked multimedia systems, the probing traffic generated by active measurement of available bandwidth might interfere with the audio-visual communications. To solve the problem, a media stream measurement algorithm (MSM) was proposed. Furthermore, an adaptive probing mechanism (LOMA) was developed. When network is lightly loaded, LOMA employs PathLoad algorithm and suppresses the amount and the burst of probing traffic with initiation optimization and procedure optimization. Once the network is congested, LOMA switches to MSM, which uses video packets to serve the measurement purpose without generating any additional probing traffic. Since LOMA can restrain effectively the probing traffic under different network load conditions, it minimizes its interference to the audio-visual communications while maintaining the measurement accuracy.
Hyper-bent functions are special bent functions which have many useful applications in cryptography and communications. Using the properties of permutations, we find the sufficient and necessary condition for one Boolean function is hyper-bent function and the relation between hyper-bent functions and PS class bent functions. We also provide one generalized method to construct multi-output hyper-bent functions and use this method to construct balanced multi-output functions with high nonlinearity.
The characteristic of W state is introduced. The coefficients of W state used for quantum key distribution and secret sharing are proved to be uniform in symmetrical form. The corresponding quantum key distribution scheme via W state is proposed. To insure the security of the proposed quantum key distribution protocol, the receiver chooses randomly the message mode or control mode asymmetrically. And the security of the schemes is discussed. Quantum secret sharing scheme is accordingly proposed. And the security of the schemes is also discussed. Compared with the quantum key distribution and secret sharing schemes with Greenberger-Horne-Zeilinger(GHZ) states, the efficiency of the proposed schemes is low. The purpose of this paper is just to prove that the states except for GHZ states can be used for quantum key distribution and secret sharing.
A frequency domain model of DS-UWB array signals was derived .Then two DOA estimation methods using the frequency domain model were presented. One was based on the second–order statistic; the other was based on the fourth-order cumulant. Simulation results show that these methods are effective and the computation complexity of the former is much lower than that of the latter.
In a proxy blind signature scheme, the proxy can blindly sign the file for the delegated signer. In the paper, we propose a new proxy blind signature scheme, which resolves two issues in the Tan’s proxy blind signature scheme: ⑴Security, both original signer and signature receiver can forge a valid proxy blind signature for any file. ⑵Traceability, the proxy signer can relate the process of the proxy blind signature to the unblind signature for the file.
This paper investigates the multi-input multi-output orthogonal frequency division multiplexing (MIMO-OFDM) transmission over doubly selective channels and focuses on maximum likelihood channel estimator using pilot tones in frequency domain. We derived the system model for MIMO-OFDM over doubly selective channels. Using this model,we gave the lower bound of the mean squared error of maximum likelihood channel estimator and this bound was served as the design criterion to derive the optimum pilot tones. Simulations show that the channel estimator using the proposed pilot can approach the theoretical lower bound.
In this paper we defined a class of extended Maiorana-McFarland functions,and proposed the expression of its Walsh spectrum,the bound of its algebra degree,nonlinearity and the sufficient condition that it’s balanced functions,correlation immune functions and resilient functions.
YU Yi-fan, JI Hong, YUE Guang-xin
According to the characteristic of parallel data transmission of OFDM (Orthogonal Frequency Division Multiplexing) and the feature of multiuser communications in wireless networks, a novel wireless IP packets scheduling algorithm for multiservice in OFDM system (AS-OFDM) is presented based on the idea of cross-layer design. The proposed algorithm implements the radio resource management and adaptive packets scheduling via exchanging the information among the network layer, link layer and physical layer. The simulation results show that the proposed algorithm can make use of the radio resource and guarantee the fairness among the users with same QoS requirement more effectively than the traditional IP packets scheduling algorithm in the condition that the QoS of different service has to be guaranteed.
Alarm correlation is basic of alarm filtering, fault diagnosis in telecommunication networks. In this paper, there are four parts. At first, paper briefly introduces the definition of alarm correlation and some related researches recently. Then a framework of alarm correlation based on rules is proposed in details. Meanwhile, the paper also discusses the application of fault diagnosis system in telecommunication networks based on alarm correlation analyzing. At last, it is a conclusion about the preconditions and characteristics of alarm correlation.
In this paper, we study capacity estimation for mobile ad hoc networks (MANETs) using directional antennas. A matrix-based channel-sharing fast calculation algorithm (MCFCA) is proposed to estimate the network capacity in a network scenario in which there is channel sharing among multiple sessions and traffic is delay sensitive with an end-to-end delay constraint. The new algorithm estimates the network capacity in terms of the maximum number of one-hop paths based on the adjacency matrix of the network. Through numerical results, we show that our proposed algorithm can calculate network capacity much faster than the well-known Brute-Force Search Algorithm (BFSA) but with the same accuracy.
A union estimation algorithm is presented to estimate DOA of CM signal and mutual coupling coefficient of array antennas. The new algorithm does not need the assistant calibration sources that directions are known and may estimate direction of actual source online. Simulation results show the accurary of the new method depends on snapshots and the direction combination and SNR of signal sources.
This paper presented the performance model based on birth-death process theory. Closed form expressions for message middleware performance metrics such as effectiveness, mean waiting time, mean sojourn time, mean number of waiting message and mean number of messages in system were obtained. And this performance model was validated through simulating.
This paper proposed a kinematical model for the tri-branch space manipulator, which based on the coefficient partition method. A path planning technique in joint space has been presented. In order to improve the control accuracy, a pieced-low-order interpolation method is used in this paper. The precision and efficiency of this joint space path planning algorithm are testified by an experimental example.
The paper analyzed the origin of the problem of parsing conflicts when using LALR(1) parser generators, and summarized the moments as well as methods to eliminate conflicts in compiling phases. Four basic rules of grammar rewriting as well as seven basic grammar rewriting patterns for the purpose of resolving conflicts were proposed. Case studies show that the proposed techniques are highly effective in developing conflict-free parsers.
Based on the principle of JavaSIM card, the requirements of security communication and multi-Application management on the globalPlatform are studied; the solution for secure JavaSIM platform is proposed and implemented. Based on the management and application of key sets, this solution enable different off-card entities to implement security management for on-card content by means of dividing authentication levels of different key sets and providing security channel. The test result of this solution is in accord with definition of relevant specifications.
The Source and load impedances of filter vary in practical applications, so, it is very important to optimize the design of filter under impedances-mismatch conditions. The influence that the source and load impedances has on the insertion loss of filters is analyzed in detail. A method of calculating the minimum insertion loss of electromagnetic interference (EMI) filters under impedance-mismatch conditions is presented. The result indicates that the parasitic capacitance and parasitic inductance cause deviation of insertion loss between results of theoretical calculation and measurements in high frequency. So,the model of a typical kind of EMI filter is modified in high frequency by optimization method. Finally, the modified model and the method to calculate the minimum insertion loss is verified to be true.
The capacity of multi-antennas CDMA systems with LS codes and Walsh codes under interference covariance known and interference covariance unknown were studied in the paper. Theory analyses were also given. Both of theory and numeral results show that: capacity of CDMA systems based on LS codes is far greater than that of CDMA systems based on Walsh codes; for LS CDMA systems, interference covariance is no influence on capacity, and capacity is linear with SNR when using multi-code detection; but for conventional CDMA systems, it will loss any capacity as interference covariance unknown, and also have a floor when SNR great than 18dB.
Basic link space code (LS) code has interference free window (IFW) and is used by traditional large area synchronous-code division multiple access (LAS-CDMA) system, but this IFW is not uniformly distributed. Using kronecker product of matrix theory, basic link space code chips are recombined and a new kind of LS code is obtained. These new codes have a uniform IFW for both aperiodic auto-correlation and cross-correlation function within one group, and the aperiodic cross-correlation function between groups either has uniform IFW or perfect complement. These properties are proved by both mathematics and computer simulation.
Cascade No sequences are a family of sequences which comprise cascade GMW sequences and have optimal correlation properties and large linear span. By studying cascade No sequences and shift sequences, an accelerating iterative algorithm for constructing cascade No sequences is presented. The algorithm adopts iterative method, the cascade No sequences with any period can be constructed quickly by using cascade GMW sequences and shift sequences of the small set of Kasami sequences. It is easy for understanding and implementing.
A weak definition of generalized bent function over finite fields is presented. And then the relation between Perfect nonlinear functions and generalized bent functions is studied. We prove that a q-ary logic function over ( )is a perfect nonlinear function iff is a generalized bent function for each non-zero element in . The difference between several versions of generalized bent function’s definitions over finite fields is discussed. Relations between spectrum of and that of its component functions are also presented. Furthermore we prove that is nonlinear perfect function over iff its component function is - dimension vector generalized bent function.
A novel algorithm based on two-dimensional discrete wavelet transform for frontal face detection was presented. The algorithm calculated waveletfaces by using Haar wavelet, deduced corresponding formulation for face feature extraction, and used perceptron algorithm to train linear classifier for classification. The comparison between the proposed approach and Eigenfaces method was carried out on four different face data sets. The results show that the computational efficiency and detection accuracy of the proposed algorithm is superior to Eigenfaces method.
The relations among three parameters of LA code and the relations between the auto-correlation function and the parameter of the LA code are investigated. It is proven that >98 is a sufficiency condition when the auto-correlation function of the LA code in LAS2000+ system is on ideal state. This sufficiency condition is important for the design of LA code and the frame structure of the system in which LA code is used.
The control method for the parameters such as delay and jitter is the key factor that affects the quality of Circuit Emulation Service (CES). According to the standards of Metro Ethernet Forum (MEF), the CES was simulated. A strategy was proposed to control the quality parameters of CES. Referenced on traditional buffer control algorithms used in VoIP and multimedia, a new algorithm was proposed to reduce delay and smooth frame jitter. The simulation results of the algorithm proved that the performance of the algorithm is superior to the traditional buffer control algorithms in existing real-time service.
Video transmission is of great importance for 3G wireless communication. This paper presents a novel error resilience video transmission scheme based on the typical characteristics of wireless channel. It adopts both data partition and FMO(Flexible Macroblock Ordering). A standard wireless model provided by ITU is exploited here to exam the performance of the scheme, while simulation results demonstrate that it achieves a better tradeoff between bit rate and error resilience ability as well as satisfying reconstructed picture quality.
In order to realize service differentiation, a token mechanism based on data service management platform (DSMP) is presented. The token mechanism is modeled by one three-dimensional Markov chain. Stationary state balance equations are derived and a new recursive method is proposed. From both the theoretical and simulation results, it is proved that the token mechanism is valid and flexible.