Advanced Search
Volume 28 Issue 9
Sep.  2010
Turn off MathJax
Article Contents
Zhang Hao-bin, Du Jian-chun, Nie Zai-ping. Analyzing Antenna-Plateform System with Hybrid MoM-PO Method[J]. Journal of Electronics & Information Technology, 2006, 28(9): 1731-1734.
Citation: Zhang Hao-bin, Du Jian-chun, Nie Zai-ping. Analyzing Antenna-Plateform System with Hybrid MoM-PO Method[J]. Journal of Electronics & Information Technology, 2006, 28(9): 1731-1734.

Analyzing Antenna-Plateform System with Hybrid MoM-PO Method

  • Received Date: 2005-07-14
  • Rev Recd Date: 2005-12-21
  • Publish Date: 2006-09-19
  • Influence of electrical large platform on antennas can not be ignored when designing effective electric system. In this article, a hybrid technique, which combines two current-based method: Method of Moment(MoM) and Physical Optics(PO), is preferred to take the platform effects into account through PO current when solving the antenna by MoM , and the NURBUS-PO is applied further to reduce the complexity of modeling and computation, thereby making it impossible to solve the antenna-platform system through MoM. The analyzing results of MoM and hybrid technique show that the effects of platform is obvious, while the hybrid technique is accurate enough and spare great computational time and storage, providing a good access to solve the EM characters of antennas on electrical large carrier.
  • loading
  • Anup K Ghosh, Aaron Schwartzbard. A study in using neuralnetworks for anomaly and misuse detection. The 8th USENIX Security Symposium, Washington D C, 1999: 46-57.[2]Balajinath B, Raghavan S V. Intrusion detection through learning behavior model[J].Computer Communications.2001, 24(12):1202-1212[3]Jha S, Tan K, Maxion R A. Markov Chains, classifiers and intrusion detection. The 14th IEEE Computer Security Foundations Workshop, Canada, 2001: 206-215.[4]张箭, 龚俭. 一种基于模糊综合评判的入侵异常检测方法. 计算机研究与发展, 2003, 40(6): 776-782.[5]Fisher R A. The statistical utilization of multiple measurements. Annals of Eugenics, 1938, 6(8): 376-386.[6]Wilson D, Martinez R. Improved heterogeneous distance functions. Journal of Artificial Intelligence Research, 1997, 6(1): 1-34.[7]Lee W, Stolfo SJ. A data mining framework for building intrusion detection medel, In: Gorgl, Keiter M K, eds. Proceedings of He 1999 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press, 1999: 120-132.[8]Forrest S, Hofmeyr S A, et al.. A sense of self for unix process. In: Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, Canada, 1996: 120-128.[9]Lee W, Stolfo S, Chan P. Learning patterns from unix process execution traces for intrusion detection. In: Proceeding of AAAI Workshop: AI Approaches to Fraud Detection and Risk Management, Washington D C, 1997: 191-197.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2409) PDF downloads(857) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return