Loading...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊

ISSN 1000-0585
CN 11-1848/P
Started in 1982
  About the Journal
    » About Journal
    » Editorial Board
    » Indexed in
    » Rewarded
  Authors
    » Online Submission
    » Guidelines for Authors
    » Templates
    » Copyright Agreement
  Reviewers
    » Guidelines for Reviewers
    » Online Peer Review
  Office
    » Editor-in-chief
    » Office Work
    » Production Centre
  • Table of Content
      , Volume 58 Issue 3 Previous Issue   
    For Selected: View Abstracts Toggle Thumbnails
    COMPUTER SCIENCE AND TECHNOLOGY
    Bufferbloat mitigating scheme based on radio channel state information
    LIU Xiaolan, SHU Ran, ZHANG Tong, REN Fengyuan
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 225-230.   DOI: 10.16511/j.cnki.qhdxxb.2018.25.014
    Abstract   PDF (1336KB) ( 586 )
    Bufferbloat occurs when excessive packets that exceed the network capacity are blocked in the buffer, which increases the network transmission latency. Cellular networks generally use a large buffer for network reliability, which further aggravates this problem. This paper gives a receive window adjustment scheme based on radio channel state information to mitigate bufferbloat in cellular networks. The scheme retrieves the available bandwidth at the receiver side from the radio channel state information. The effects of channel noise and the ACK self-clocking mechanism in the transmission control protocol are modeled by a Kalman filter to predict the available bandwidth. Then the send window size is adjusted according to the calculated receive window. The scheme performance was evaluated on a network simulation platform with the results indicating that this scheme significantly reduces the queue backlog and the latency while still maintaining the original high throughput than previous mechanisms
    References | Related Articles | Metrics
    Approximation algorithms for aggregate queries on uncertain data
    CHEN Donghui, CHEN Ling, WANG Junkai, WU Yong, WANG Jingchang
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 231-236.   DOI: 10.16511/j.cnki.qhdxxb.2018.26.015
    Abstract   PDF (1167KB) ( 557 )
    Analyses of big data sets often require aggregate queries on uncertain data with various types of data that are computationally complex. In this paper, the results of aggregate queries on uncertain data are defined to include all possible values and their corresponding probabilities. Dynamic programming is then used to solve the Distribution Sum (DSUM) algorithm using a Greedy-based Distribution Sum and a Binary Merge based Distribution Sum approximation algorithms, which both can be applied to tuple-level and attribute-level uncertainty models. The time and space complexities of the algorithms are determined theoretically as well as the error range of the results. Tests demonstrates that these two approximation algorithms with a 1% allowable error shorten the execution times by 15%-21% and 22%-32%, respectively.
    Figures and Tables | References | Related Articles | Metrics
    Hardware-assisted ROP attack detection on cloud platforms
    WANG Lina, ZHOU Weikang, LIU Weijie, YU Rongwei
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 237-242.   DOI: 10.16511/j.cnki.qhdxxb.2018.26.008
    Abstract   PDF (1215KB) ( 453 )
    Existing detection approaches of return oriented programming (ROP) attacks cannnot simultaneously provide flexible deployment, allow portability, and allow transparent detection in the cloud environment. A hardware-assisted method was developed to detect ROP attacks in real time using the hardware features of the Intel last branch record (LBR) to record indirect branch information of a guest virtual machine (VM) to achieve rapid detection of gadget attack chains in the hypervisor. In the privileged domain, the method takes advantage of the virtual machine introspection (VMI) technology to validate the legitimacy of indirect branches to guarantee the control flow integrity of the shared link library in the process address space of the guest VM. Tests show that this demonstrate method can detect ROP attacks with an average run-time overhead of less than 7%.
    Figures and Tables | References | Related Articles | Metrics
    Extension method for constructing rate-compatible nonbinary LDPC codes
    MU Xijin, LI Huaan, BAI Baoming
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 243-248.   DOI: 10.16511/j.cnki.qhdxxb.2018.21.008
    Abstract   PDF (1249KB) ( 447 )
    This paper describes a class of rate-compatible nonbinary low-density parity-check (LDPC) codes based on an improved extension method. The check symbols for lower code rates involve not only the codewords of the highest-rate code but also the check symbols of moderate-rate codes. The construction process optimizes the masking matrix and the base matrix with random replacement of nonbinary elements. This paper also describes an algebraic method to design the parity matrices to further reduce the design complexity. The codes are not only rate compatible, but also have a quasi-cyclic structure which will benefit hardware implementations of the encoder and decoder. Numerical tests show that the codes can achieve good performance within a wide range of code rates in both the waterfall region and in the error-floor region.
    Figures and Tables | References | Related Articles | Metrics
    Long short-term memory with attention and multitask learning for distant speech recognition
    ZHANG Yu, ZHANG Pengyuan, YAN Yonghong
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 249-253.   DOI: 10.16511/j.cnki.qhdxxb.2018.25.016
    Abstract   PDF (1042KB) ( 967 )
    Distant speech recognition remains a challenging task owning to background noise, reverberation, and competing acoustic sources. This work describes a long short-term memory (LSTM) based acoustic model with an attention mechanism and a multitask learning architecture for distant speech recognition. The attention mechanism is embedded in the acoustic model to automatically tune its attention to the spliced context input which significantly improves the ability to model distant speech. A multitask learning architecture, which is trained to predict the acoustic model states and the clean features, is used to further improve the robustness. Evaluations of the model on the AMI meeting corpus show that the model reduces word error rate (WER) by 1.5% over the baseline model.
    Figures and Tables | References | Related Articles | Metrics
    Expanding the length of short utterances for short-duration language recognition
    MIAO Xiaoxiao, ZHANG Jian, SUO Hongbin, ZHOU Ruohua, YAN Yonghong
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 254-259.   DOI: 10.16511/j.cnki.qhdxxb.2018.25.015
    Abstract   PDF (3208KB) ( 580 )
    The language recognition (LR) accuracy is often significantly reduced when the test utterance duration is as short as 10 s or less. This paper describes a method to extend the utterance length using time-scale modification (TSM) which changes the speech rate without changing the spectral information. The algorithm first converts an utterance to several time-stretched or time-compressed versions using TSM. These modified versions with different speech rates are concatenated together with the original one to form a long-duration signal, which is subsequently fed into the LR system. Tests demonstrate that this duration modification method dramatically improves the performance for short utterances.
    Figures and Tables | References | Related Articles | Metrics
    λ-active learning based microblog-oriented Chinese word segmentation
    ZHANG Jing, HUANG Degen, HUANG Kaiyu, LIU Zhuang, MENG Xiangzhu
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 260-265.   DOI: 10.16511/j.cnki.qhdxxb.2018.26.011
    Abstract   PDF (1051KB) ( 736 )
    Current manual segmented microblog-oriented corpora are inadequate, so both conventional Chinese word segmentation (CWS) systems and deep learning based CWS systems are still not very effective. This paper presents an active learning method that selects samples with high annotation values from unlabelled tweets for microblog-oriented CWS. A parameter is introduced to control the number of repeatedly selected samples that offen occur in microblog data. Three strategies (Max, Avg and AvgMax) are used to evaluate the overall values of each sample. The initial segment character is a stop character which is calculated by taking character embeddings into consideration. Tests demonstrate that this method outperforms the baseline system with F Gains of 0.84%~1.49% and state-of-the-art active learning method word boundary annotation (WBA).
    Figures and Tables | References | Related Articles | Metrics
    Test method for the font parser in PDF viewers
    ZHAO Gang, YU Yue, HUANG Minhuan, WANG Yuying, WANG Jiajie, SUN Xiaoxia
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 266-271.   DOI: 10.16511/j.cnki.qhdxxb.2018.26.013
    Abstract   PDF (1074KB) ( 701 )
    PDF files are portable and widely used, so they often host malware. Traditional PDF viewers fuzzing algorithms cannot work well due to their strict format validation. Also, existing file-format based grey-box fuzzing cannot be easily used to build a uniform data model because of the limits of its descrition language. This paper presents a method for generating test cases to test the font parser of PDF viewers. The system reconstructs the font files and adds supportive information to build a uniform data model for TrueType files. A fuzzer is built into the method and evaluated on more than twenty PDF viewers to identify several vulnerabilies. Tests show that this method can effectively generate test cases and detect bugs in PDF viewers.
    Figures and Tables | References | Related Articles | Metrics
    Causal options in Chinese reading comprehension
    WANG Yuanlong, LI Ru, ZHANG Hu, WANG Zhiqiang
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 272-278.   DOI: 10.16511/j.cnki.qhdxxb.2018.25.010
    Abstract   PDF (1700KB) ( 789 )
    A causal relation support analysis method based on a causal network is presented here to identify the causal relation types in Chinese reading comprehension. Firstly, the causal events are extracted from the literature by clue phrases, the causal relation between the events is given a value, and a causal network is constructed from the causal events and the causal relation. Then, the TF-IDF (term frequency-inverse document frequency) method is used to retrieve related sentences from the document and the importance of each word in the document to characterize the whole document. Finally, the causality network and related sentences are combined to analyze the causal support of the option. The method was evaluated using 769 articles and 13 Beijing colleges entrance examination (including the source text and the selected title) as a test set. This method then gave about 11% better result than the Baseline method.
    Figures and Tables | References | Related Articles | Metrics
    AUTOMOTIVE ENGINEERING
    Large-scale electric vehicle charging path planning based on information interaction
    ZHANG Shuwei, FENG Guixuan, FAN Yuezhen, WAN Shuang, LUO Yugong
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 279-285.   DOI: 10.16511/j.cnki.qhdxxb.2018.25.008
    Abstract   PDF (1174KB) ( 750 )
    With the increasing numbers of electric vehicles, electric vehicle charging can result in traffic congestion near the charging stations during peak charging times with long wait times, power grid load fluctuations and other issues. Real-time information communication systems can be used in a charging path planning method for electric vehicles based on traffic network, charging stations and distribution network information. The system constraints include the traffic conditions, vehicle charging requirements, charging station loads, and grid loads. The multi-objective optimization function includes the travel time, number of vehicles in the charging stations, and charging loads with an improved Dijkstra method used to solve the optimization problem. Simulations show that this method improves the distribution operations, relieves traffic congestion around the charging stations, reduces the wait times and improves the usability of the charging infrastructure.
    Figures and Tables | References | Related Articles | Metrics
    Radar sharing energy-saving control strategy for intelligent hybrid electric vehicle
    XIE Laiqing, ZHANG Donghao, LUO Yugong, CHEN Rui, LI Keqiang
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 286-291,297.   DOI: 10.16511/j.cnki.qhdxxb.2018.21.004
    Abstract   PDF (2906KB) ( 583 )
    A radar sharing based energy-saving control method was developed for intelligent hybrid electric vehicles to reduce energy loss caused by designs for fixed working conditions that disregard the actual running environment. Four scenarios were developed base on the relative motion of the vehicle in front of this vehicle. The motor drive torque was optimized with regenerative braking by the motor added for some scenarios. These control strategies reduce the hybrid electric vehicle energy use without adding extra hardware cost. Tests on different road conditions show that this intelligent energy-saving control strategy provides large energy savings especially on congested urban roads.
    Figures and Tables | References | Related Articles | Metrics
    MECHANICAL ENGINEERING
    Numerical solution of the inverse kinematics and trajectory planning for an all-position welding robot
    GUO Jichang, ZHU Zhiming, WANG Xin, MA Guorui
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 292-297.   DOI: 10.16511/j.cnki.qhdxxb.2018.21.006
    Abstract   PDF (1931KB) ( 939 )
    Versatile welding robots designed for the field welding of box-type steel structures have the problems of low DOF (degree of freedom) and DOF coupling. A numerical solution method was developed for the inverse kinematics of the robot based on the layouts of actual welding processes to solve difficulties encountered in analytic methods. The numerical solution leads to a trajectory planning method based on the recursive algorithm to adjust the position and posture of the welding torch to realize smooth adjustments and transitions of the welding torch during welding of the right-angle turning point of the box-type steel structures. This approach provides trajectory planning for the all-position welding of box-type steel in an automatic algorithm that is applicable to different sizes of box-type steel structures.
    Figures and Tables | References | Related Articles | Metrics
    Accuracy of the parallel reset mechanism in a wind tunnel balance calibration system
    GUAN Liwen, CHEN Huang, FU Meng
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 298-304.   DOI: 10.16511/j.cnki.qhdxxb.2018.25.011
    Abstract   PDF (2803KB) ( 463 )
    A 6-DOF (degree of freedom) parallel machine was used as the reset mechanism in a wind tunnel balance calibration system because of its simple structure and stiffness. A model was developed using the D-H (Denavit-Hartenberg) convention to analyze inaccuracies in the reset mechanism caused by joint manufacturing tolerances. In this model, each closed-loop kinematic chain was treated as a RRRPRR chain. The effects of the joint tolerances and structural parameters on the kinematic accuracy were calculated based on Qusai-Newton method. Simulations indicate that the inaccuracy is on the same order of magnitude as the joint offsets. A principle is given to determine the structural parameters needed to improve the accuracy of this type of reset system.
    Figures and Tables | References | Related Articles | Metrics
    AUTOMATION
    Vehicle dispatch problem considering substitutions and collocations
    SHI Qun, YANG Zhenming, ZHAO Qianchuan
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 305-310.   DOI: 10.16511/j.cnki.qhdxxb.2018.21.007
    Abstract   PDF (1003KB) ( 511 )
    Relief materials need to be rapidly transported to disaster areas after natural disasters. This paper describes how to minimize the transport by maximizing the number of victims supplied by the relief materials. This integer programming method involves the substitution and collocation of relief materials and vehicles to maximize the number of victims served and minimize the transport costs. Simulations show that the time complexity of the vehicle dispatch is significantly reduced after the problem is decomposed into sub-problems. The substitution and collocation reduces the transport costs while maximizing the number of victims supplied by relief materials.
    Figures and Tables | References | Related Articles | Metrics
    Coupled control of relative position and attitude for spacecraft proximity operations with input constraints and parameter uncertainties
    TAO Jiawei, ZHANG Tao
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 311-316.   DOI: 10.16511/j.cnki.qhdxxb.2018.25.013
    Abstract   PDF (1050KB) ( 554 )
    An coupled control strategy was developed for proximity operations of spacecraft formation flying which tabes into account the unknown but bounded disturbance, parametric uncertainties and actuator saturation. An auxiliary system is used to compensate for the effects of input constraints. The auxiliary system states are applied to the control design and stability analysis. The system was an adaptive updating technique that does not need to know the system parameters and the unknown bound of the external disturbance in advance Lyapunov theory shows that this controller guarantees uniform ultimate boundedness of all the signals in the closed-loop system and that the tracking errors will converge to a small neighborhood of the origin. Finally, a six degree of freedom simulation demonstrates the effectiveness of this control law compared to an approach that does not consider actuator saturation.
    Figures and Tables | References | Related Articles | Metrics
    ECONOMIC AND PUBLIC MANAGEMENT
    Incentive mechanism for construction projects based on the IPD philosophy
    SU Guiliang, DENG Xiaomei, FENG Ke, XUE Yanguang
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 317-323.   DOI: 10.16511/j.cnki.qhdxxb.2018.25.012
    Abstract   PDF (1414KB) ( 501 )
    A multi-party incentive model shows how the project characteristics, participant characteristics and incentive structure promote a project. The real effect of the participant cost, project optimization and incentive structure are illustrated through game simulations. The results show that the importance of the incentive model. High level of optimization potential, low team costs and the team members' cost variance contribute to the project success. The target cost setting, goal achievement compensation, and income distribution are critical project incentives.
    Figures and Tables | References | Related Articles | Metrics
    CHEMISTRY AND CHEMICAL ENGINEERING
    Energy and carbon balances in microalgae biodiesel
    LUO Yiqing, WANG Xue, YUAN Xigang
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 324-329.   DOI: 10.16511/j.cnki.qhdxxb.2018.25.009
    Abstract   PDF (1148KB) ( 435 )
    Microalgae biodiesel is a complex industrial energy production method that is influenced by many factors including the complex composition. The energy consumption and generation ability and the amount of greenhouse gas emissions (net carbon emissions) are important criteria for assessing the system sustainability. A life cycle analysis of the energy and carbon balance of microalgae biodiesel were used to calculated the net energy surplus and net carbon emissions of biodiesel biofuel and the key factors influencing the energy production and carbon emissions. The results show that the energy output of the whole system is larger than the energy consumption during the production and processing of the microalgae biodiesel and that more CO2 is fixed than released over the life time. Thus, microalgae biodiesel is a new fuel that is sustainable and environmentally friendly.
    Figures and Tables | References | Related Articles | Metrics
    NUCLEAR AND NEW ENERGY ENGINEERING
    Design of a digital eddy current displacement sensor based on FPGA
    YU Jinpeng, ZHOU Yan, MO Ni, LIU Xingnan, ZHAO Lei
    Journal of Tsinghua University(Science and Technology). 2018, 58 (3): 330-336.   DOI: 10.16511/j.cnki.qhdxxb.2018.21.005
    Abstract   PDF (2133KB) ( 603 )
    The carrier and demodulated signals of eddy current displacement sensors are both analog signals. Thus, the measurement and demodulation circuitries are complex, unstable and increase the volume and power consumption of the magnetic bearing system. This paper describes an improved digital eddy current displacement sensor based on amplitude modulation with the digital carrier signal given by a field programmable gate array (FPGA) to demodulate the digital output signal of the sensor. The measurement reliability and accuracy are improved while the complexity and power consumption are reduced in this integrated digital eddy current displacement sensor.
    Figures and Tables | References | Related Articles | Metrics
  News More  
» 2023年度优秀论文、优秀审稿人、优秀组稿人评选结果
  2023-12-12
» 2022年度优秀论文、优秀审稿人、优秀组稿人评选结果
  2022-12-20
» 2020年度优秀论文、优秀审稿人评选结果
  2021-12-01
» aa
  2020-11-03
» 2020年度优秀论文、优秀审稿人评选结果
  2020-10-28
» 第十六届“清华大学—横山亮次优秀论文奖”暨2019年度“清华之友—日立化成学术交流奖”颁奖仪式
  2020-01-17
» a
  2019-01-09
» a
  2018-12-28
» a
  2018-01-19
» news2016
  2017-01-13


  Links More  



Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd