Loading...
[an error occurred while processing this directive]

Table of Content

    20 September 2010, Volume 46 Issue 5
    Research on Modeling and Validating of Atmospheric Correction for HJ-1A Hyperspectral Imager Data
    YANG Guijun,HUANG Wenjiang,LIU Sanchao,XING Zhurong,WANG Jihua
    2010, 46(5):  821-828. 
    Asbtract ( )  
    Related Articles | Metrics
    According to four-streams approximation of radiation transfer theory, the analytical model of atmospheric correction for hyper spectral imager(HSI) sensor of environment and disaster reduction small satellites (named as HJ-1A/ 1B) was given with six atmosphere parameters. The testing for constructed analytical model was carried out, through comparing outputs radiance at sensor between MODTRAN and the proposed model. It shows that the relatively errors of them are less than 0.5%. Using the atmospheric products of MODIS at same over-pass from HSI sensor, the six parameters of the proposed model were resolved and were applied in correcting HSI data to acquire land surface reflectance. The results from validation between corrected reflectance and measurements are good consistency for wavelength less than 700 nm, for other bands it is greater than field measurements causing by sensor-self noise effect.
    EconomicAssessment of Acute Health Impact Due to Inhalable Particulate Air Pollution in the Pearl River Delta
    LIU Xiaoyun,XIE Peng,LIU Zhaorong,LI Tiantian,ZHONG Liuju,XIANG Yunrong
    2010, 46(5):  829-834. 
    Asbtract ( )  
    Related Articles | Metrics
    The acute health effect due to inhalable particulate matter in the nine cities of the Pearl River Delta (PRD) was evaluated using simplified Poisson regression model. This work consulted the domestic epidemiologic studies and the meta-analysis result of exposure-response functions for health effects by the authors′team. Based on the unit economic value of each health effect endpoints, subsequent economic cost was estimated. Data citing was also more rigorous, this study mainly used results of domestic research and meta analysis results for exposure-response coefficients, in order to reflect current situation of PRD. The total economic cost caused by airborne particulate matter with aerodynamic diameters less than 10 μm ( PM10 ) was estimated as approximately 0. 199 billion RMB and 0. 272 billion RMB for reference concentration of 40 μg/ m3 and 20 μg/ m3 respectively, which accounted for 0. 09‰ ( 0. 07‰-0. 11‰) and 0. 13‰ ( 0.10‰-0.15‰) gross domestic product (GDP) of PRD in 2006 respectively. Concerning acute health effect, PM2.5 contributed over 90% among inhalable particles.
    A Note on Computing the Tate Pairing with Efficiently Computable Endomorphisms
    HU Zhi,ZHOU Zhenghua,XU Maozhi
    2010, 46(5):  685-690. 
    Asbtract ( )  
    Related Articles | Metrics
    The authors examine faster computation of Tate pairing on elliptic curves by using some efficiently computable endomorphism. Focused on two typical types of elliptic curves with even embedding degree k, Miller algorithm with some endomorphisms is modified. The authors analyze the efficiency for k = 2, and give the certain conditions and several examples, under which the proposed method is specifically faster than the traditional one.
    On the Design of Trivium
    TIAN Yun,CHEN Gongliang,LI Jianhua
    2010, 46(5):  691-698. 
    Asbtract ( )  
    Related Articles | Metrics
    In order to discuss the design principles of stream ciphers, Trivium, a candidate cipher in eSTREAM, is studied. Research about its security and efficiency is summarized. Based on the modeling structure of the algorithm and the definition of k-order primitive polynomials, new design principles of stream ciphers are illustrated. Improvements and new design of Trivium are given according to the principles.
    Isomorphism Classes of Elliptic Curves with 3-Torsion Point
    WU Hongfeng,FENG Rongquan,WANG Zilong
    2010, 46(5):  699-703. 
    Asbtract ( )  
    Related Articles | Metrics
    The numbers of Fq- isomorphism classes and Fq- isomorphism classes of elliptic curves defined over Fq with a 3- torsion Fq- rational point are enumerated.
    New Construction of Boolean Function with Maximum Algebraic Immunity
    CAO Hao,WEI Shimin,ZHUO Zepeng,WANG Huige
    2010, 46(5):  704-708. 
    Asbtract ( )  
    Related Articles | Metrics
    Focusing on algebraic normal form and the construction requirements of Boolean function, the conditions that Boolean functionf does not exist annihator with deg(f) ≤m are analysed and the sufficient conditions satisfied by Boolean functionf with maximum algebraic immunity are obtained. Therefore a class of Boolean functions with optimal algebraic immunity are constructed, and the balanceness and count of the constructed functions are discussed.
    Verifiable Multi-secret Sharing Scheme Based on Homogeneous Linear Recursion
    CHEN Yangkui,YU Jia,CHENG Xiangguo,HAO Rong,LIU Hongyan,LI Xin
    2010, 46(5):  709-714. 
    Asbtract ( )  
    Related Articles | Metrics
    A new multi-secret sharing scheme based on homogeneous linear recursion is proposed, and then it is converted into a verifiable scheme. In the distribution phase, very few of public values are needed to publish. In the recovery phase, each participant only needs to submit a pseudo shadow instead of his secret shadow, and his secret shadow cannot be disclosed. When secrets are changed, secret shadows don?t need to be redistributed, which makes secret shadow able to be used multiple times. The proposed scheme has many advantages, for example, the secret shares can be used multiple times and the scheme publishes very few parameters as well as the reconstructed polynomial has a low degree. This makes the proposed scheme more efficient. Therefore, it better satisfies demands of various applications.
    Two Attacks on 5-Round IDEA
    LU Linzhen,CHEN Shaozhen
    2010, 46(5):  731-735. 
    Asbtract ( )  
    Related Articles | Metrics
    Using the linear property of the key schedule algorithm, the authors give a related-key attack on 5-round IDEA (the international data encryption algorithm) that has a time complexity of 270.5 5-round IDEA encryptions, and then present an improved meet-in-the-middle attack, which on 5-round variant of IDEA only requires 27 chosen plaintexts and 2120 5-round IDEA encryptions.
    Element Distribution of Decimations and k-Error Linear Complxity of l-Sequences
    TAN Lin,QI Wenfeng
    2010, 46(5):  715-719. 
    Asbtract ( )  
    Related Articles | Metrics
    The authors prove that the element distribution of the decimations of the maximal length FCSR sequences is nearly balanced in one period. By the distribution property, the k-error linear complexity of l-sequences based on strong 2- prime numbers is studied. It shows that this kind of l-sequences have very stable linear complexity.
    A New Authenticated Key Exchange Protocol with DoS Resilience
    CHENG Qingfeng,WEI Fushan,MA Chuangui
    2010, 46(5):  720-724. 
    Asbtract ( )  
    Related Articles | Metrics
    This paper proposes the extension of meCK model for the design and analysis of authenticated key exchange (AKE) protocols. In the new model, the authors add the DoS resilience and present a new AKE protocol, which can reach DoS resilience and others fundamental security attributes. Compared with DoS-CMQV protocol, the new protocol with stronger security keeps the same efficiency.
    On the Number of Even-Variable Boolean Functions with Maximum Algebraic Immunity
    XIONG Xiaowen,FU Shaojing,QU Longjiang
    2010, 46(5):  725-730. 
    Asbtract ( )  
    Related Articles | Metrics
    Using combining theory, the enumeration of Boolean functions with MAI (maximum algebraic immunity) is investigated, and a new lower bound on the number of even-variable Boolean functions with MAI is provided, this lower bound is better than the previous ones.
    The Pairing Computation on Binary Edwards Curves
    XU Maozhi,YU Honghui,TANG Chunming,QI Yanfeng
    2010, 46(5):  736-742. 
    Asbtract ( )  
    Related Articles | Metrics
    The authors consider pairings on binary Edwards curves and give two approaches to construct pairings and implement them. One is based on the birational equivalence between a binary Edwards curve and an elliptic curve in Weierstrass form, the other is based on a 2-isogeny from a binary Edwards curve to an elliptic curve. For both approaches, the authors give the computation of their Miller functions and present two algorithms for their pairing computation. Especially in the second algorithm, more field squaring operations are included, which is more efficient.
    Implementing Optimal Pairings over Brezing-Weng Elliptic Curves with k=18
    TANG Chunming,QI Yanfeng,XU Maozhi
    2010, 46(5):  743-748. 
    Asbtract ( )  
    Related Articles | Metrics
    The authors consider the construction and implementation of optimal pairings over Brezing-Weng elliptic curves with embedding degree 18. The loop length in the optimal pairing is log2r/φ(18), which is the theoretical lower bound. A twisted map of degree 6 is used to realize the point compression and reduce the division operations in Miller algorithm, then most of operations can be implemented in Fq or Fq3. An efficient algorithm for the optimal pairing is given accordingly. Frobenius map in finite fields is used to reduce the computation in the final power operation of the optimal pairing computation.
    Optimal Multiplication Algorithm for the ηT Pairing over F36m
    QI Yanfeng,JIA Dajiang,TANG Chunming,XU Maozhi
    2010, 46(5):  749-755. 
    Asbtract ( )  
    Related Articles | Metrics
    In the application of pairing based cryptosystems, especially the ηT pairing, the fast and effective implementation of the pairings depends on the effective multiplications in the extension fields. The authors propose the dual interpolation multiplication (DIM) algorithm in F36m which takes asymptotically 11 multiplications in F3m ( m→∞) . This algorithm reaches the theoretical lower bound of the number multiplications in F36m.
    Security Analysis of Cryptographic Protocols Based on Fine-Grained Freshness
    CHENG Zhengjie,CHEN Kefei,LAI Xuejia
    2010, 46(5):  763-770. 
    Asbtract ( )  
    Related Articles | Metrics
    Fine-grained definitions of freshness are presented, and both freshness and secrecy are combined to improve the security analysis of cryptographic protocols. Trusted freshness of the nonces generated by different principals are explicitly distinguished. More exact explanations on the private secrecy and shared secrecy are given. The improved method can analyze and find out some existing subtle weaknesses in the Helsinki protocol.
    Fault Attack on Lightweight Block Cipher KeeLoq
    YOU Jianxiong,LI Ruilin,LI Chao
    2010, 46(5):  756-762. 
    Asbtract ( )  
    Related Articles | Metrics
    The authors analyse the differential property of the non-linear function (NLF) . By using byte-oriented random fault model, a practical fault analysis attacks on KeeLoq is presented. Theoretical analysis and experiments show that 1-bit key can be recovered through 0.707617 faulty ciphertexts on average.
    XTrim: An XML Compressor Based on XML Schema and Tiny Data Block Optimization
    QIU Ruiheng,TANG Zhi,HU Wei,GAO Liangcai
    2010, 46(5):  771-778. 
    Asbtract ( )  
    Related Articles | Metrics
    The authors propose an XML compressor based on XML Schema and tiny data block optimization (XTrim), which minimizes the size of the structure in XML documents and improves the data grouping strategy by utilizing information in XML Schema. Especially, tiny data blocks in XML document are optimized by XTrim to achieve a higher compression ratio. Experimental results show that the proposed approach outperforms other compressors when handling XML documents.
    Research on the Property of Aluminum-Metallic Glass-Aluminum Sandwich Panel against Shaped Charge Jet Penetration
    LIU Weidong,FENG Rongxin,LIU Kaixin,YAN Honghao,LI Xiaojie
    2010, 46(5):  779-783. 
    Asbtract ( )  
    Related Articles | Metrics
    An aluminum-metallic glass-aluminum sandwich panel was fabricated by explosive welding technique and its property against shaped charge jet penetration was studied experimentally and numerically. Considering the small dimension of the sandwich panel, an experimental scheme was presented for penetration experiment on small specimen (character dimension less than 50 mm); a numerical calculation scheme for simulating the experimental process was developed based on ANSYS/ LS-DYNA. The experimental results indicate that the shaped charge could produce jet with small diameter and good stabilization; wide region petalling is found on the upper surface of the aluminum-metallic glass-aluminum sandwich panel; metallic glass near the jet receives crushing damage, which obstructs the jet penetration; the numerical calculation scheme could simulate the process of penetration effectively; the depth of the penetration, the diameter of the penetration channel and the failure mode obtained by numerical simulation accord with the corresponding experimental results.
    Distribution and Spatiotemporal Variations of Deep Convection over Guangdong and Adjacent Areas during Heavy Rainfall Period of 2008
    ZHU Xingming,ZHENG Yongguang,GUO Lina,TAO Zuyu
    2010, 46(5):  784-792. 
    Asbtract ( )  
    Related Articles | Metrics
    Based on the dataset of the hourly FY-2C infrared TBB, the radar reflectivity from 6 radar sites, and the cloud-to-ground (CG) lightning from Hong Kong, the distribution and spatio-temporal variations of deep convection over Guangdong and adjacent areas from May to June of 2008 are analyzed. The relationship between mesoscale convective systems and heavy precipitation, the differences of TBB, radar reflectivity and CG lightning data, are emphatically compared. The results show that the characteristics of deep convection over Guangdong and adjacent areas during this period are as follows: 1) The activity of deep convection denoted by TBB, radar reflectivity and CG lightning, respectively, obviously correspond to the persisting heavy rain events, and the statistical characteristics of these three data types reveal that the third period of precipitation is the severest, but the distribution of CG lightning density is remarkably different from that of TBB and radar reflectivity. 2) The peaks of deep convection denoted by these three data types in one day are almost consistent with the precipitation peak. 3) The diurnal variations of deep convection show that the convection over land differed from that over sea, which developed earlier than the former. However, the convection over coastal areas is the most frequent. 4) The CG lightning distribution can largely reveal the convection with smaller scale and shorter lifetime, radar reflectivity and TBB distribution can, to a great extent, reflect the convection with larger scale and longer lifetime.
    Climatology of Deep Convection over the Subtropics of China during Summer
    ZHENG Yongguang,WANG Ying,SHOU Shaowen
    2010, 46(5):  793-804. 
    Asbtract ( )  
    Related Articles | Metrics
    Due to the finer temporal and spatial resolution and the better integrality of long-term satellite infrared (IR) temperature of black body (TBB) data, a climatology of deep convection over the subtropics of China( 94 °-124 °E, 24 °-36°N) during summer is presented based on the 1-hourly IR TBB data during June to August of 1996-2007 (2004 excluded). The results show that the climatological characteristics of deep convection denoted by TBB≤ - 52℃ over the subtropics of China are basically consistent with those previous statistical studies based on the surface thunderstorm observations and the low-orbit satellite lightning observations. The monthly variations, pentad variations and diurnal variations of the deep convection over the subtropics of China are focused on. The results show that there are 3 active deep convection areas in the subtropics of China during the period of June-August: Plateaus of Western Sichuan, northeast Yunnan-Guizhou Plateaus, and Zhejiang-Fujian-Jiangxi areas. The monthly variations of the deep convection over the subtropics of China are closely associated with the East Asia Monsoon and the large-scale atmospheric circulation. The deep convection is more active in June and July than in August. The development of the deep convection over the subtropics of China has a characteristic of intermittence, and the active pentad period of the deep convection over the Yangtze-Huaihe River Basin clearly reflects the rainfall events during the Meiyu period and the secondary Meiyu period. The diurnal evolution of the deep convection shows that the deep convection over the Plateaus of Western Sichuan propagates southeastwards after sunset, and then propagates northeastwards to the east Sichuan Basin after midnight, the deep convection over the northeast Yunnan-Guizhou Plateaus propagates southeastwards to north Guangxi after sunset, and the deep convection over Zhejiang-Fujian areas extends westwards and northwards at sunset and retreats eastwards and southwards after sunset. This characteristic of the diurnal variations of the deep convection is, to a great extent, determined by the local topographic distribution. The diurnal variations of the deep convection over the subtropics of China also show that there are two types of diurnal variations of deep convection: single-peak convection and double-peak convection. The diurnal variations of the deep convection over Plateaus of Western Sichuan, Yunnan-Guizhou Plateaus, and Zhej iang-Fujian areas have one peak, but the active period over Plateaus of Western Sichuan and Yunnan-Guizhou Plateaus is much longer than that over Zhejiang-Fujian areas, and the frequency of the deep convection over Yunnan-Guizhou Plateaus in the active period changes much slower than that over the other two areas. The diurnal variations of the deep convection over eastern Sichuan Basin, the Yangtze-Huaihe River Basin, Hunan and Guangxi have two peaks, but the main deep convection peak over eastern Sichuan Basin is before sunrise ( 22UTC) and different from that over the other 3 areas at sunset (09-10 UTC) , and the amplitude of the diurnal deep convection variation over the Yangtze-Huaihe River Basin is much smaller than that over the other 3 areas.
    Geochemistry and Tectonic Implications of the Permian I-Type Granitoids from Urad Zhongqi, Inner Monglia
    LUO Hongling,WU Tairan,ZHAO Lei
    2010, 46(5):  805-820. 
    Asbtract ( )  
    Related Articles | Metrics
    The Permian granitoids are widespread in Urad Zhongqi, Inner Mongolia, and are located on the middle segment of the northern margin of the North China Plate. The granitoids consist mainly of quartz diorite and granodiorite. They show a calc-alkaline I-type affinity and are characterized by dominant biotite in dark mineral, low A/ CNK (0. 77- 1. 04) . They have the geochemical characteristics similar to adakites by ≥56% SiO2 ( 55. 70% -68. 65% ) , ≥15% Al2O3 ( 15. 32% -22. 87% ) , low Y ( 2. 82-20. 89 μg/ g) and Yb ( 0. 25-2. 24 μg/g) , enrichment of LILE ( large-ion lithophile elements) and LREE (e.g. Ba = 627-2124 μg/ g, Sr = 327-968 μg/ g, Sr/Y = 32. 2-211, ( La/Yb)N = 5. 83-81. 1) , and mostly evidently positive Eu anomalies (δEu = 0. 63-2.25 ). They are interpreted as post-collisional calc-alkaline granitoids, formed mainly by partial melting of the overthickened continental lower crust due to underplating of EM1-type mantle-derived basaltic magma. Biotite 40Ar/39Ar ages of Beiqigetao Pluton, Talabuji Pluton, Ageru Pluton and Baoerhantumiao Pluton are respectively 260 ±3, 258 ±1, 260 ±3 and 258 ±2 Ma, which indicate they were emplaced during the Late Permian.
    Forest Changes Detection in the Northeastern Asia Using MODIS Imagery
    FU Anmin,SUN Guoqing,GUO Zhifeng,WANG Dianzhong
    2010, 46(5):  835-843. 
    Asbtract ( )  
    Related Articles | Metrics
    MOD13A1 products observed by MODIS sensor during the years from 2000 to 2006 were used to map forest dynamic changes in the Northeastern Asia, The mapping analysis was based on the trajectory of multi-year-series normalized difference vegetation index (NDVI) and its spatial morphologic characteristics. The intensity of the changes for a detected forest pixel was characterized by the degradation of the GNDVI and the statistical significance of the changes was determined by a T-test of paired-samples. The false identification of the changes in the transition areas between different vegetation types, which was mainly caused by the mis-registration of the multi-temporal MOD13A1 data, was detected by spatial morphologic analysis and eliminated from final change map. The results from MOD13A1 data were compared with forest change maps derived from TM/ ETM+ images in two local regions. The accuracies were 80.24% and 88. 73%, at 5 ha and 3×3 window level, respectively.
    The Demand Study of the Technological Equipments for Disposal to the Emergency Rescue of a Great Earthquake in China
    HU Weijian,SHANG Hong,SI Hongbo,NING Baokun,QU Guosheng,WANG Jianping,LI Lei,ZHANG Tiangang,SUN Gang,ZHAO Lanying,LI Li,XIE Peng,ZHANG Haitao,LIU Kang,DING Lu,GAO Yang,XU Yifan,LIU Jingjing,LIU Xuan
    2010, 46(5):  844-850. 
    Asbtract ( )  
    Related Articles | Metrics
    Through analyse of characters of China's earthquake and comparison of present technology conditions of the emergency rescue equipments in the domestic and international vital catastrophes. Based on “the project of the scientific research concerning Wenchuan 8.0 Earthquake Emergency Rescue”in China, the authors study sufficiently the various impediments factors to implement the earthquake catastrophe rescue on the aspects of technique and equipment in china. Furthermore, there are the following many considerations, for example, the communication command and management of the emergency rescue, the collection and transmission of the information from the rescue locale, the rescue and accessorial systems of the experts decision-making, especially, after the vital earthquake, the actions of searching lifes in the ruins, the rescue and safe protection suitable to the complex conditions of the landslides and the blocked traffic, the environment of the tumbled large building constructs and the small spaces in the ruins and so on. The basic technological equipment demands are presented to guarantee the effective rescue when a great earthquake occurs in China anywhere.
    Effects and Strategy of the International Scientific Research at Peking University
    ZHENG Ruqing,ZHANG Yan
    2010, 46(5):  851-854. 
    Asbtract ( )  
    Related Articles | Metrics
    The international exchange and cooperation is an important part for Peking University during its development towards a world-class institution. The co-authorship of scientific publications well reflects the level of international research collaboration and its impact on research quality and academic excellence. The authors analyze the co-authorship of publications at Peking University in general, and that of College of Chemistry and Molecular Engineering, indicating the contribution of international collaboration. In addition, SCI publications on medicine are also analyzed. The authors also give some suggestions on how to promote such collaboration.
    Impact on Non-holonomic Systems with Nonideal Holonomic Constraints
    YAO Wenli
    2010, 46(5):  855-858. 
    Asbtract ( )  
    Related Articles | Metrics
    The objective is to study impact on non-holonomic systems with nonideal holonomic constraints. Considering first-order linear non-holonomic systems with redundant generalized coordinates, the Lagrange equations with unknown Lagrange multipliers are obtained. Based on the above equations, the relation between the states for pre-impact and post-impact is established. An example shows the procedure to realize the method.
    Study on the Relationship between Nanostructure and Color of Peacock Feather and Its Biomimetic Application
    GONG Yan,LU Yongkai,WANG Hongfeng,LIN Sujun
    2010, 46(5):  859-862. 
    Asbtract ( )  
    Related Articles | Metrics
    The significant colors of peacock feather inspires people to explore the application of the structure color of feather and dynamic color of photonic crystals in printed matter or textiles. To investigate the mechanism of coloration and the impact of structure on the color, two-dimensional photonic crystal structure model with microscope and scanning electron microscopy of peacock feathers is taken into account. Combined with biomimetic nanotechnology, the idea of preparing artificial structure for coloration is put forward, which will explore the application of structural coloration in the fields of printing and dyeing, textile and others.