Loading...
首页
期刊介绍
期刊订阅
联系我们
快速检索
引用检索
图表检索
高级检索
最新录用
|
预出版
|
当期目录
|
过刊浏览
|
阅读排行
|
下载排行
|
引用排行
|
百年期刊
ISSN 1000-0585
CN 11-1848/P
Started in 1982
About the Journal
»
About Journal
»
Editorial Board
»
Indexed in
»
Rewarded
Authors
»
Online Submission
»
Guidelines for Authors
»
Templates
»
Copyright Agreement
Reviewers
»
Guidelines for Reviewers
»
Online Peer Review
Office
»
Editor-in-chief
»
Office Work
»
Production Centre
Table of Content
, Volume 56 Issue 3
Previous Issue
Next Issue
For Selected:
View Abstracts
Download Citations
EndNote
Reference Manager
ProCite
BibTeX
RefWorks
Toggle Thumbnails
COMPUTER SCIENCE AND TECHNOLOGY
Select
Time-series data aggregation index
HUANG Xiangdong, ZHENG Liangfan, QIU Mingming, ZHANG Jinrui, WANG Jianmin
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 229-236,245. DOI: 10.16511/j.cnki.qhdxxb.2016.21.032
Abstract
PDF
(1649KB) (
1051
)
Time-series data is the key to industrial development, with the aggregation of the data an important step in practice. However, traditional relational databases fail to support vast amounts of time-series data. The NoSQL databases are inefficient and require time-consuming calculation to aggregate of time-series data. This paper presents an efficient index mechanism that supports time-series data aggregation by combining a synopsis table and a segment tree. A query algorithm based on this mechanism introduces the synopsis table into the NoSQL database and builds a segment tree from the synopsis table for archiving that is lbn the size of the original query set. This query algorithm can directly locate a series of index data to be queried without the recursive operations in traditional trees and effectively reduces I/O overhead. This study shows the efficiency of this index mechanism by comparisons with general index mechanisms.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Security log with integrity verification support
WANG Yongjian, JIN Bo, DONG Jian
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 237-245. DOI: 10.16511/j.cnki.qhdxxb.2016.21.025
Abstract
PDF
(1769KB) (
679
)
With the increasing complexity of the large data processing systems, Byzantine fault behavior caused by software bugs, misconfiguration or malicious intrusions can seriously affect system availability. Byzantine fault nodes can then cheat other correct nodes by equivocation behavior, so the equivocation behaviors can be detected to maintain system safety. This paper presents a security log with integrity verification support, Log-Keeper, which generates integrity proofs for existence and consistency verification. Frequent verification in a distributed environment uses an IndexTree-based Log-Keeper which supports
O
(lb
n
) proof. Tests show that the size of the integrity proofs generated by Log-Keeper is 25%~50% of that of the authenticated append-only skip list (AASL).
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Hybrid two-stage HW/SW partitioning algorithm for dynamic partial reconfigurable FPGAs
MA Yuchun, ZHANG Chao, LUK Wayne
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 246-252,261. DOI: 10.16511/j.cnki.qhdxxb.2016.21.004
Abstract
PDF
(1130KB) (
753
)
More and more hardware platforms are providing dynamic partial reconfiguration; thus, traditional hardware/software partitioning algorithms are no longer applicable. Some studies have analyzed the dynamic partial reconfiguration as mixed-integer linear programming (MILP) models to get solutions. However, the MILP models are slow and can only handle small problems. This paper uses heuristic algorithms to determine the status of some critical tasks to reduce the scale of the MILP problem for large problems. Tests show that this method is about 200 times faster with the same solution quality as the traditional mathematical programming method.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Mining of constant conditional functional dependencies based on pruning free itemsets
ZHOU Jinling, DIAO Xingchun, CAO Jianjun
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 253-261. DOI: 10.16511/j.cnki.qhdxxb.2016.21.026
Abstract
PDF
(1201KB) (
946
)
The search space for discovering constant conditional functional dependencies (CCFDs) is reduced and the efficiency is improved by a series of pruning strategies that optimize the algorithm CFDMiner, which is a popular algorithm for mining CCFDs. Theoretical studies show many invalid and redundant free and closed itemsets for outputting valid CCFDs. Thus, pruning of free itemsets and selecting of corresponding closed itemsets can generate as consistent results as the original algorithm. Tests show that the optimized algorithm has a smaller search space and its efficiency is improved 4~5 fold on true data.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Multipath routing algorithm for data center networks
YANG Yang, YANG Jiahai, QIN Donghong
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 262-268. DOI: 10.16511/j.cnki.qhdxxb.2016.21.031
Abstract
PDF
(1610KB) (
1214
)
Unbalanced distributions of traffic in the data center networks increase the network congestion. The special traffic characteristics in data center networks reduce the effectiveness of traditional IP network traffic engineering methods. This paper presents a dynamic routing algorithm based on multipath propagation (Dramp) using software defined for network/OpenFlow (SDN/OF) frameworks. This algorithm makes efficient use of multiple paths by redefining the degree of the critical link and solving an optimization problem using link weights. The objective is to reduce the overhead in the control plane for a fine-grained traffic balance for routing optimization in data center networks. This paper compares the Dramp algorithm with the equal-cost multipath (ECMP) and global first fit (GFF) routing algorithms on the Mininet simulation platform. The results show that Dramp gives the best performance; thus, Dramp is simpler and more practical for traffic engineering in data center networks.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Video copy detection based on local and global features
WANG Jing, WANG Hao
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 269-272. DOI: 10.16511/j.cnki.qhdxxb.2016.21.021
Abstract
PDF
(1121KB) (
1051
)
The need for copyright protection and the desire to protect intellectual property has made content based video copy detection a widely studied issue. A video copy detection method based on local and global features is given here that overcomes the limitations of using the global and local features. The system combines blocked Harris corner and ordinal measures and is robust to illumination changes, video coding changes, partial occlusions and other effects. The system also uses inverted indexes, so this method is very efficient. Tests show that this algorithm effectively improves the accuracy of the video copy detection.
Figures and Tables
|
References
|
Related Articles
|
Metrics
AUTO MATION
Select
On-road trajectory planning based on optimal computing budget allocation
FU Xiaoxin, JIANG Yongheng, HUANG Dexian, WANG Jingchun, HUANG Kaisheng
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 273-280. DOI: 10.16511/j.cnki.qhdxxb.2016.21.024
Abstract
PDF
(1167KB) (
789
)
This paper presents an algorithm named OCBA_OODE for on-road trajectory planning by using optimal computing budget allocation (OCBA) in a candidate-curve-based planning algorithm named OODE. OODE picks the best trajectory by comparing rough (biased but computationally inexpensive) evaluations of a set of candidate curves. The curve evaluation converges to the real value as the computing budget increases. OODE allocates the equal parts of the computing budget to each curve, while OCBA_OODE repeatedly allocates the budget according to the latest curve evaluations to improve the planning efficiency. OCBA_OODE is 20% faster than OODE while maintaining the same solution quality.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Accurate vehicle location method at an intersection based on distributed video networks
YANG Deliang, XIE Xudong, Li Chunwen, NIU Xiaotie
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 281-286,293. DOI: 10.16511/j.cnki.qhdxxb.2016.21.033
Abstract
PDF
(4049KB) (
702
)
A robust framework is given for precise vehicle localization in intersections using distributed video networks. Each intersection is equipped with short-range and long-range cameras in a distributed video network. If the vehicle is in the shooting range of the short-range camera, within the region of interest for vehicle identification, and the license plate is perpendicular to the road plane, a vehicle license plate model is used to accurately locate the vehicle position. If the vehicle is in the shooting range of the long-range camera, a pyramid sparse optical flow algorithm with LBP texture features is used in real-time to track the local feature points on the vehicle to estimate the vehicle position based on stable feature points obtained from the similar motions. Finally, information is exchanged between the cameras, a weighted consensus information fusion algorithm is used to obtain a globally optimal estimate of the vehicle position. Tests show that this method can accurately locate the vehicle position at intersections.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Assessment of the level of congestion based on natural language processing
CHEN Hongxin, CUI Jian, ZHANG Zuo, YAO Danya
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 287-293. DOI: 10.16511/j.cnki.qhdxxb.2016.21.034
Abstract
PDF
(1108KB) (
881
)
In recent years, an increasing amount of traffic information has been posted on social media such as micro-blogs. This information provides a new opportunity for traffic analysis using micro-blog traffic data to supplement traditional traffic data. The micro-blog data has been analyzed to identify frequently-used natural language description of traffic conditions with fuzzy assessments used to quantify the subjective feelings of different people describing traffic congestion with natural language. The fuzzy reasoning data fusion method aggregated evaluations by different people describing the congestion of the same section of a road. Videos were collected from three road segments with observers invited to evaluate the road traffic conditions in the videos. The integration results are similar to the real-time traffic scenarios released by Baidu Map, which verify the feasibility of this fuzzy method.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Closed-loop temperature control system for a PEM during burn-in
BAI Bing, WANG Weiming, LI Qingfeng, LI Luming
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 294-298. DOI: 10.16511/j.cnki.qhdxxb.2016.21.020
Abstract
PDF
(2376KB) (
969
)
The plastic encapsulated microcircuits (PEM) burn-in method helps guarantee the reliability of PEM. Thermal runaway and uneven temperatures between different devices during burn-in are controlled by a closed-loop temperature control system. The control system adjusts the temperature of each burn-in socket relative to the oven temperature using a fuzzy adaptive algorithm to configure the control parameters of the PI controller that drives the heating or cooling actuators. The device temperature more quickly achieves steady state (20 min) with steady state errors of less than 1℃ and the temperature differences between the tested devices are reduced by 2℃ so that the temperature are almost the same with the closed-loop temperature control system. The fuzzy adaptive algorithm makes the system dynamic response much faster with stronger anti-interference ability. Thus, this system prevents thermal runaway and makes the temperatures equal between the different tested devices.
Figures and Tables
|
References
|
Related Articles
|
Metrics
ELECTRICAL ENGINEERING
Select
Application layer for high-speed narrowband power line communications for automatic demand response
LIU Wenjing, GUO Jingbo
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 299-305. DOI: 10.16511/j.cnki.qhdxxb.2016.21.019
Abstract
PDF
(1395KB) (
656
)
High-speed, narrowband power line communications (HNPLC) need effective application layers to control the power system demand response to support various services. This study defines an application architecture for an interactive HNPLC system to support automated demand response. The multi-class service demand is provided by a dynamic priority that considers the data packet priority weights, packet transmission efficiency and service waiting times. The service response mechanism, the core of the application layer, is based on the dynamic priority. The application layer is within the cross-layer HNPLC nodes in a simulated practical HNPLC network. Simulations show that the architecture is efficient and the service response mechanism improves the HNPLC performance for the automated demand response.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Nonlinear control for the front end power supplies of magnetic imaging resonance gradient amplifiers
SHI Hongliang, XU Jing, CUI Bin, JIANG Xiaohua
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 306-311,317. DOI: 10.16511/j.cnki.qhdxxb.2016.21.029
Abstract
PDF
(1271KB) (
1119
)
A nonlinear digital PID single loop control method was developed to improve the dynamic load response of the front end power supply of magnetic imaging resonance (MRI) gradient amplifiers with the controller parameters are based on the exponential functions of the error. The dynamic load response is improved by an inner-loop current controller added to the nonlinear digital PID controller. The two control methods are verified in a 120 V/30 A prototype of the power supply for a step load current change and compared with the dynamic physical limits of the system. The results indicate that the controller has better dynamic performance which is closer to the dynamic physical limits of the system that the original nonlinear PID controller.
Figures and Tables
|
References
|
Related Articles
|
Metrics
NUCLEAR AND NEW ENERGY ENGINEERING
Select
Adsorption of uranium (Ⅵ) by activated carbon from radioactive wastewater
YU Jing, WANG Jianlong, JIANG Yizhou
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 312-317. DOI: 10.16511/j.cnki.qhdxxb.2016.21.022
Abstract
PDF
(1829KB) (
888
)
The adsorption of uranium from wastewater onto activated carbon was investigated in batch experiments. Four independent variables, the contact time, solution pH
a
, initial uranium concentration and temperature, were varied to determine the influence of these parameters on the adsorption of the uranium from water. The activated carbon size were characterized by scanning electron microscopy (SEM) and transmission electron microscopy (TEM), with the element content characterized by energy dispersive X-ray spectrometer (EDS) and surface functional groups characterized by infrared spectrocopy (FTIR). The FTIR spectra indicated that hydroxyl groups are present on the surface of the activated carbon and affected the adsorption. The U(Ⅵ) adsorption onto activated carbon reached sorption equilibrium within 30 min. The adsorption of U(Ⅵ) on activated carbon was strongly dependent on the pH
a
in the range of 3.0~9.0. The adsorption capacity and removal percent increase for pH
a
from 3 to 5, decrease for pH
a
=5~7, and then increase quickly for pH
a
=7~9. The U(Ⅵ) adsorption on activated carbon is well described by a pseudo-second-order kinetic model and the Tempkin, Slip, and D-R isotherm models. The sorption reaction is spontaneous, exothermic and increases the entropy. The maxmium adsorption capacity is 62.50 mg·g
-1
. The maxmium removal rate is 99.23%.
Figures and Tables
|
References
|
Related Articles
|
Metrics
ELECTRONIC ENGINEERING
Select
Max-plus algebra failure propagation analysis of safety systems
SHE Xiaoli, ZHAO Jiyuan, YANG Jian
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 318-323. DOI: 10.16511/j.cnki.qhdxxb.2016.21.023
Abstract
PDF
(1194KB) (
927
)
A failure propagation analysis method was developed for safety systems having multiple interactive sub-systems. Two models are given based on min-plus and max-plus algebra to describe the failure propagation and control processes. Iterative solutions for both models give the final hazardous output disclosure time for specific failures. Unlike other failure propagation models, this method describes the asymmetry in the failure propagation mechanism and presents a calculational method for the hazardous incident time for interactive safety systems. This method is applied to a conceptual CTCS system to demonstrate its effectiveness.
Figures and Tables
|
References
|
Related Articles
|
Metrics
PRECISION INSTRUMENTS AND MECHANOLOGY
Select
Sampson-distance based ellipse fitting for calibration of magnetic compass deviations
LUO Shouhong, ZHANG Rong, GUO Meifeng, PENG Zhuo
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 324-327,333. DOI: 10.16511/j.cnki.qhdxxb.2016.21.035
Abstract
PDF
(1100KB) (
1239
)
Magnetic compasses are widely used in civil and military navigation applications but they are susceptible to magnetic disturbances in the environment. Thus, the compasses must be calibrated for the magnetic effects in the environment after installation. The calibration also improves the compass accuracy. An analysis of the effects of magnetic disturbances showed that the ellipse output assumption in the Sampson-distance based ellipse fitting method could be used to fit raw magnetic compass measurements. Then, the fitting coefficients are used to calibrate the compass readings to compensate for the environmental disturbances to improve the heading accuracy. A multi-position turntable experiment was used to calibrate a C100 two-dimensional magnetic compass fabricated by KVH. After calibration, the mean heading error was reduced from 1.5° to 0.25°, which illustrates the validity and practicality of this method.
Figures and Tables
|
References
|
Related Articles
|
Metrics
MECHANICAL ENGINEERING
Select
Quantitative study of the milling parameters in vibratory milling
CHEN Ken, Nguyen Hoa Binh, WU Dan, LIU Fei
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 328-333. DOI: 10.16511/j.cnki.qhdxxb.2016.21.030
Abstract
PDF
(1213KB) (
736
)
The extraction rate of protein extracted from biological tissue depends on the particle size of the biological tissue powder; therefore, the biological tissue particle sizes need to be smaller to improve protein extraction. Vibratory milling method is widely used for size reduction of biological tissue products with the milling product size and milling efficiency significantly affected by the milling process parameters, such as the collision frequency and impact energy. The effects of the milling parameters on the milling process were studied using the event driven method (EDM) to construct a dynamic model of one milling ball in a milling vial in a vibratory milling mechanism. The effects of the vibration frequency, the vibration amplitude and the milling vial diameter on the collision frequency and the impact energy were then investigated. Increases in the vibration frequency and amplitude increased the collision frequency and impact energy. For a fixed milling vial volume, an increase in the milling vial diameter reduced the collision frequency and the impact energy. The results provide a theoretical basis for milling mechanism design and parameter selection.
Figures and Tables
|
References
|
Related Articles
|
Metrics
PHYSICS AND ENGINEERING PHYSICS
Select
Changes in social relation networks and leader-follower behavior in emergency evacuations
LI Lihua, MA Yaping, DING Ning, ZHANG Hui, MA Yefeng
Journal of Tsinghua University(Science and Technology). 2016,
56
(3): 334-340. DOI: 10.16511/j.cnki.qhdxxb.2016.21.027
Abstract
PDF
(1634KB) (
834
)
Group dynamics theory shows that social relationships are an important factor influencing group behavior. The characteristics and changes in social relationships during emergencies were studied in experiments modeling 6 high-rise building emergency evacuations. The evacuees are all from a graduate class with 30 students where are some pre-existing social relations such as friends, girl and boy friends, and roommates. Social network analyses, questionnaires and video data showed that the leader-follower behavior during emergencies may be influenced by the normal social relationships, but that the center of the evacuee group, the group cohesion, and subgroups showed obvious changes. A mutual believed degree (MBD) was defined to identify the opinion leaders in normal situations and in emergencies which shows that the potential leaders in emergencies are most likely from the normal opinion leaders and from the men who run faster in evacuations.
Figures and Tables
|
References
|
Related Articles
|
Metrics
News
More
»
aaa
2024-12-26
»
2023年度优秀论文、优秀审稿人、优秀组稿人评选结果
2023-12-12
»
2022年度优秀论文、优秀审稿人、优秀组稿人评选结果
2022-12-20
»
2020年度优秀论文、优秀审稿人评选结果
2021-12-01
»
aa
2020-11-03
»
2020年度优秀论文、优秀审稿人评选结果
2020-10-28
»
第十六届“清华大学—横山亮次优秀论文奖”暨2019年度“清华之友—日立化成学术交流奖”颁奖仪式
2020-01-17
»
a
2019-01-09
»
a
2018-12-28
»
a
2018-01-19
Links
More
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd