Information

Journal of Jilin University (Information Science Edition)
ISSN 1671-5896
CN 22-1344/TN
主 任:田宏志
编 辑:张 洁 刘冬亮 刘俏亮
    赵浩宇
电 话:0431-5152552
E-mail:nhxb@jlu.edu.cn
地 址:长春市东南湖大路5377号
    (130012)
WeChat

WeChat: JLDXXBXXB
随时查询稿件状态
获取最新学术动态
Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

In last 2 years
Please wait a minute...
For Selected: Toggle Thumbnails
Design of Indoor Monitoring Alarm for Carbon Dioxide Concentration
HE Yuan, LI Xin, MA Jian, JI Yongcheng
Journal of Jilin University (Information Science Edition)    2023, 41 (5): 827-831.  
Abstract471)      PDF(pc) (1569KB)(860)       Save
 To monitor changes of indoor carbon dioxide concentrations in real time, a carbon dioxide alarm based on a gas sensor with a STC89C52 microcontroller as the core is designed. When the CO2 concentration in the air exceeds the preset value, the sound and light alarm function can be activated, and the indoor CO2 concentration value can be displayed in real-time. The hardware system includes a carbon dioxide sensor, signal conditioning circuit, analog-to-digital conversion circuit, STC89C52 microcontroller, and acousto-optic alarm unit. The software system includes data acquisition, data processing, alarm logic, and other functional units. The alarm can be activated in time when indoor CO2 concentration exceeds 1. 5% . 
Related Articles | Metrics
Taget Detection of Photovoltatic Remote Sensing Based on Improved Yolov5 Model
TONG Xifeng, DU Xin, WANG Zhibao
Journal of Jilin University (Information Science Edition)    2023, 41 (5): 801-809.  
Abstract231)      PDF(pc) (3024KB)(768)       Save
Taget Detection of Photovoltatic Remote Sensing Based on Improved Yolov5 Model TONG Xifeng, DU Xin, WANG Zhibao (School of Computer and Information Technology, Northeast Petroleum University, Daqing 163318, China) Abstract: Aiming at high-sensing photovoltaic image resolution, high environmental noise, and complex background, an improved Yolov5 model is proposed to achieve positioning of photovoltaic power plants. First of all, the CA(Coordinate Attention) mechanism is added to the compassionate layer of the main feature extraction network to improve the learning ability of the network characteristics; second, the Ghostconv network structure is added to Backbone, useing the Ghostconv network module to replace the Conv network module, designing a new GhostC3 network network instead of the original C3 network module to improve the learning efficiency of the model; finally, the GIoU_Loss function is changed to the SIoU_Loss function. Compared with the original Yolov5 method, the average accuracy of the improved algorithm mAP, accuracy, and recall rate reached 97. 5% , 98. 9% , and 94. 9% , respectively, which have increased by 1. 8% , 1. 7% , and 5. 8% , respectively. The algorithm has a good effect on photovoltaic detection.
Related Articles | Metrics
Sensorless Speed Control Based on Improved SMO
FU Guangjie, MAN Fuda
Journal of Jilin University (Information Science Edition)    2024, 42 (2): 277-283.  
Abstract86)      PDF(pc) (2960KB)(706)       Save
 In response to the chattering phenomenon that traditional SMO(Sliding Mode Observer) faces during switching functions, novel sliding mode observer using saturation function instead of switching function is proposed to weaken chattering. In the process of extracting position information, a phase-locked loop is selected to replace the traditional arctangent method, there by improving the observation accuracy of PMSM(Permanent Magnet Synchronous Motor) rotor position. In the Matlab environment, by comparing traditional SMO and new SMO, it can be observed that the speed error of the rotor has increased by about 14 r/ min, and the position error of the rotor has increased by about 0. 03 rad.
Related Articles | Metrics
Review of Microseismic Inversion Methods for Hydraulic Fracturing
CUI Zhe , LI Hanyang , ZHENG Lujia , DONG Chunfeng , DONG Hongli
Journal of Jilin University (Information Science Edition)    2023, 41 (4): 653-666.  
Abstract159)      PDF(pc) (1739KB)(689)       Save
 Microseismic inversion is an important way to complete main task of microseismic monitoring by inverting and inferring information such as the location of the epicenter, the time of occurrence of the earthquake, the true magnitude, the initial amplitude of the hypocenter, the focal mechanism and the medium parameters based on the microseismic monitoring data. Through the study of microseismic inversion technology, more accurate microseismic information can be obtained, thereby improving the reliability of reservoir fracture evaluation, reducing development costs and improving oil and gas recovery. We review microseismic inversion from three aspects: microseismic focal location inversion, microseismic focal mechanism inversion, and microseismic multi-parameter joint inversion. The research progress of microseismic inversion technology in recent years is reviewed, and the principle, advantages and disadvantages of various microseismic inversion methods are summarized, the improvement and application of various microseismic inversion techniques are summarized, and the future research ideas and development directions are prospected. It provide reference for further development of microseismic inversion in the future.
Related Articles | Metrics
Research on Simulation Experiment of Electromagnetic Pulse Effect Analysis Based on CST
HUO Jiayu, GAO Bo, SHI Jingwen
Journal of Jilin University (Information Science Edition)    2023, 41 (5): 773-779.  
Abstract189)      PDF(pc) (3367KB)(666)       Save
To reduce the influence of complex and changeable electromagnetic environment on vehicles, the cable model is built in the engine compartment by using the three-dimensional electromagnetic field simulation software CST(Computer Simulation Technology) to study the influence of different factors on the electromagnetic coupling effect of vehicles. Through simulation, the peak relationship curves between induced voltage and induced current in the cable are drawn when the parameters such as cable length, cable height from the bottom of the car, cable relative distance, cable terminal resistance, conductor radius, and insulation layer thickness change. These conclusions can provide theoretical guidance for the design of vehicle wire harnesses, and provide a basis for the conductor radius selection, cable relative distance, height from the ground, and cable length in electromagnetic protection design. 
Related Articles | Metrics
Ancient Chinese Named Entity Recognition Based on SikuBERT Model and MHA
CHEN Xuesong , ZHAN Ziyi , WANG Haochang
Journal of Jilin University (Information Science Edition)    2023, 41 (5): 866-875.  
Abstract294)      PDF(pc) (1792KB)(664)       Save

Aiming at the problem that the traditional named entity recognition method can not fully learn the complex sentence structure information of ancient Chinese and it is easy to cause information loss in the process of long sequence feature extraction, an ancient Chinese fusion of SikuBERT ( Siku Bidirectional Encoder Representation from Transformers) model and MHA (Multi-Head Attention) is proposed. First, the SikuBERT model is used to pre-train the ancient Chinese corpus, the information vector obtained from the training into the BiLSTM (Bidirectional Long Short-Term Memory) network is input to extract features, and then the output features of the BiLSTM layer are assigned different weights through MHA to reduce the information loss problem of long sequences. And finally the predicted sequence labels are obtained through CRF (Conditional Random Field) decoding. Experiments show that compared with commonly used BiLSTM-CRF, BERT-BiLSTM-CRF and other models, the F1 value of this method has been significantly improved, which verifies that this method can effectively improve the effect of ancient Chinese named entity recognition.

Related Articles | Metrics
Garbage Image Classification of Campus Based on Deep Residual Shrinkage Network
WANG Yu , ZHANG Yanhong , ZHOU Yuzhou , LIN Hongbin
Journal of Jilin University (Information Science Edition)    2023, 41 (1): 186-192.  
Abstract370)      PDF(pc) (1851KB)(633)       Save
There is a deficiency of information available on waste classification, and many municipalities and educational institutions struggle with this issue. We address this challenge by utilizing the efficiency and accuracy of the neural networks to classify items and implement waste image classification with a deep residual shrinkage network built on the ResNet network and SENet network. By filtering the Garbage dataset to obtain the data set necessary for the experiment, and by enhancing ResNet, SENet and soft threshold processes are incorporated into the ResNet structure. And by training the network and optimizing its hyperparameters, a greater recognition rate and recognition effect are achieved for the classification of campus waste. The experimental findings indicate that the proposed approach is feasible to a certain extent.
Related Articles | Metrics
Optimization of Constellation Invulnerability Based on Wolf Colony Algorithm of Simulated Annealing Optimization
WANG Mingxia, CHEN Xiaoming, YONG Kenan
Journal of Jilin University (Information Science Edition)    2024, 42 (1): 1-13.  
Abstract166)      PDF(pc) (3492KB)(633)       Save

 In order to improve the invulnerability and working ability of the satellite constellation network after being attacked, a simulated annealing wolf pack algorithm is proposed. We use the subjective and objective weight method combined with the TOPSIS( Technique for Order Preference by Similarity) to Ideal Solution to evaluate the importance of nodes in the network, and attack the network according to the order of node importance. The network connection efficiency is the optimization goal, and the satellite constellation network communication limitation is the constraint condition. The idea of motion operator is adopted to realize the walking, summoning and sieging of wolves with adaptive step size. The network structure is optimized using the edge-adding scheme obtained through optimization. Experiments show that compared with other optimization algorithms, this algorithm has superiority. It solves the problem that the satellite constellation networks working ability declines after being attacked, and improves its invulnerability after being attacked. Key words: satellite network; invulnerability optimization; simulated annealing algorithm; improved wolf colony algorithm

Related Articles | Metrics
Design of Multi-Dimensional and Hierarchical Integrated Experimental Platform Based on Python
LIANG Nan , WANG Chengxi , ZHANG Chunfei , XU Tao , JI Fenglei
Journal of Jilin University (Information Science Edition)    2023, 41 (5): 858-865.  
Abstract215)      PDF(pc) (4575KB)(588)       Save

To meet the need of integrating scientific research into teaching of Emerging Engineering Education, a multi-dimensional and hierarchical integrated experimental platform based on Python is designed. Guided by the talent-training plan, hierarchical modules involving image recognition, machine learning and data analysis is designed from scientific research hotspots. Image recognition module starts from character recognition, then face and license plate recognition are realized by several algorithms. In the machine learning module, commonly used machine learning algorithms are studied and corn disease is identified by various methods based on Python. In the data processing and analysis module, Excel data processing experiment based on Python is designed to analyze the data of workload and bioinformatics data. The platform enables students to learn the application of Python in the experiments, and choose different experimental projects according to professional needs and research directions to realize the goal of teaching students in accordance with their aptitude. By applying the experimental platform to teaching practice, it is demonstrated that students have a deeper understanding of Python’s programming implementation in image recognition, machine learning, and data analysis and enhanced research interest. And the goal of integrating scientific research into teaching and improving the quality of undergraduate teaching could be achieved.

Related Articles | Metrics
Application of Radiomics in the Diagnosis of Benign and Malignant Breast Lesions
ZHENG Chong, LI Mingyang, LAN Wenjing, LIU Xiangyu, BAO Lei, JI Tiefeng
Journal of Jilin University (Information Science Edition)    2023, 41 (2): 315-320.  
Abstract242)      PDF(pc) (1807KB)(584)       Save
 In order to explore the ability of imaging to diagnose benign and malignant breast lesions, and compare the value of MR(Magnetic Resonance) radiomics and traditional MRI(Magnetic Resonance Imaging) in diagnosing breast diseases, a total of 190 cases with benign or malignant breast lesions confirmed by pathological findings are collected from patients who underwent MR Plain and enhanced examination in the Department of Radiology in First Hospital of Jilin University from January 2019 to January 2022. MR radiomics is performed by building logistic regression model. The traditional MR Diagnosis is performed by a radiologist with an associate senior title. The results show that the sensitivity, specificity and AUC (Area Under Curve) of the MR radiomics test set are 0. 92, 0. 83 and 0. 92 respectively. The above values are higher than the corresponding values of traditional MR diagnosis, and the differences are statistically significant ( P = 0. 00 ). The method of MR radiomics can assist in the diagnosis of benign and malignant breast lesions, and the diagnostic ability is better than the traditional MR diagnostic mode.
Related Articles | Metrics
Hierarchical Communication in Decentralized and Cross-Silo Federated Learning
WU Mingqi, KANG Jian, LI Qiang
Journal of Jilin University (Information Science Edition)    2023, 41 (5): 894-902.  
Abstract213)      PDF(pc) (3444KB)(546)       Save

Federated learning has become increasingly important for modern machine learning, especially for data privacy sensitive scenarios. It is difficult to carry out secure machine learning between heterogeneous data islands. A federated learning communication mode between heterogeneous data islands is proposed, which realizes the hybrid federated learning communication between horizontal and vertical, and breaks the communication barrier of the disunity of model structure between horizontal and vertical participants in traditional federated learning. Based on the special privacy requirements of the government, banks and other institutions, the third party aggregator is further removed on the basis of the hybrid federated learning model, and the calculation is carried out only among the participants, which greatly improves the privacy security of local data. In view of the computational speed bottleneck caused by vertical homomorphic encryption in the communication process in the above model, by increasing the local iteration round q, the encryption time of vertical federation learning is shortened by more than 10 times, and the computational bottleneck between horizontal and vertical participants is reduced, and the accuracy loss is less than 5% .

Related Articles | Metrics
Construction of the Standard Datasets of Blue Calico Patterns
YU Xiang, ZHANG Li, SHEN Mei
Journal of Jilin University (Information Science Edition)    2023, 41 (3): 521-529.  
Abstract303)      PDF(pc) (5333KB)(498)       Save
To inherit and protect the traditional blue calico patterns, it is necessary and challenging to protect blue calico in a digital manner. Due to the lack of blue calico pattern datasets with original manual characteristics, which limits the application of powerful deep learning technology on pattern recognition field like the recognition of Blue Calico patters, therefore a large-scale dataset called Blue-Calico pattern dataset is provided, which is the first publicly available benchmark for blue calico pattern recognition. This dataset contains about 50 216 blue calico patterns, covering 85 pattern classes, such as animals, plants, myths and legends. The construction of this dataset will concern the digital construction of blue calico, such as calico image retrieval and caption, and enable researchers to design and validate data-driven algorithms. On the basis of the new dataset, the experimental results of four state-of-the-art networks are provided as a baseline for future work.
Related Articles | Metrics
Comparative Study of DWA Algorithm and VO Hybrid Path Algorithm
CHEN Jinyu , WANG Kun , WANG Shuo , FAN Shijie , MA Qichang , LI Dongmei , WANG Hongbo
Journal of Jilin University (Information Science Edition)    2022, 40 (6): 1067-1075.  
Abstract444)      PDF(pc) (2820KB)(491)       Save
The traditional mobile robot based on DWA ( Dynamic window Approach ) algorithm exists the following deficiencies: longer obstacle avoidance time and the inability to optimize the local path planning in obstacle-intensive dynamic zone. Aimed at the problems mentioned above, a hybrid path algorithm combined A * algorithm with VO(Velocity Obstacle) is proposed to optimize the velocity of obstacle avoidance for mobile robots. Via the comparative experiment combined the DWA algorithm with the VO hybrid path algorithm in the case of three obstacles, the ROS (Robot Operating System) adopted the modular software design is put into practice to test the obstacle avoidance effect of the hybrid path planning algorithm. The results of simulation experiment in multiple environments clearly indicate that the obstacle avoidance effect will be significantly improved via the VO hybrid path algorithm in the scenarios scattered with multiple dynamic obstacles, and it has high speed of the obstacle movement and low frequency of radar scanning.
Related Articles | Metrics
Digital Display System of Innovation Ecology Based on Research of Scientific and Technological Innovation Ability
ZHANG Shitong, CHEN Xiaoling, WU Xueyan, QUAN Zhiwei
Journal of Jilin University (Information Science Edition)    2023, 41 (3): 465-473.  
Abstract196)      PDF(pc) (5128KB)(470)       Save
In order to solve the problems of management, coordination and association of cross regional scientific and technological resource sharing and collaborative innovation, practical application and theoretical research of scientific and technological resource platform are carried out to build an ecological digital display system of scientific and technological innovation. First, the definition, composition and index system of scientific and technological innovation elements are constructed, and innovation map, innovation ability, innovation subject, innovation carrier are proposed. The digital display system with innovation resources and innovation environment is the core. Taking Jilin Province as an example, the index method is used to monitor the level of regional scientific and technological innovation, the text mining method is used to analyze the hot spots of scientific and technological policies, and the system architecture and function design are carried out based on the Vue + Django + MySQL technology architecture. Finally, the ecological digital display of scientific and technological data innovation in the region is realized, so that the system has data sharing, data association and intelligent service functions such as decision support. The application practice shows that the system enriches the visualization of scientific and technological data resources, improves the visualization of scientific and technological innovation ecology, and improves the expansibility, efficiency and performance of the system.
Related Articles | Metrics
Research on Path Planning Based on Improved Artificial Potential Field Method
XIE Chunli, TAO Tianyi, LI Jiahao
Journal of Jilin University (Information Science Edition)    2023, 41 (6): 998-1006.  
Abstract168)      PDF(pc) (1895KB)(470)       Save
An improved artificial potential field method is proposed to solve the problems of local minimum and unable to reach the target in the path planning of mobile robots. Firstly, in order for the robot to reach the target point when there are obstacles near the target point due to the large repulsive force, a safe distance factor is introduced into the potential field, and this parameter is optimized, so that the robot can maintain a proper distance from the obstacles and reach the target point smoothly. Secondly, in order to solve the local minimum problem, the local minimum discriminant condition is introduced, and the local minimum region is circum- navigated when the condition is triggered, so that the robot can reach the target point smoothly. The simulation results show that the improved algorithm has strong robustness when operating in the map environment with different number of obstacles. The proposed algorithm can make the robot bypass the local minimum area in the U-shaped obstacle environment, and successfully solve the local minimum problem in the mobile robot path planning.
Related Articles | Metrics
Block Chain Consensus Mechanism Based on Random Numbers 
ZHAO Jian, QIANG Wenqian , AN Tianbo , KUANG Zhejun , XU Dawei , SHI Lijuan
Journal of Jilin University (Information Science Edition)    2023, 41 (2): 292-298.  
Abstract262)      PDF(pc) (1578KB)(452)       Save
The improvement of consensus mechanism is a key research content in the development process of blockchain technology. In the traditional consensus mechanism, all endorsement nodes participate in endorsement, which consumes a lot of time, and has the possibility of forging and manipulating the consensus process with low security. Based on the verifiable random function, the endorsement nodes in the candidate set of endorsement nodes for trading and any endorsement node for endorsement operation are randomly selected which can effectively improve the processing efficiency and reduce the processing time of the consensus mechanism. Based on theoretical analysis and experimental verification of Hyperledger fabric model, the results show that the optimized consensus mechanism has faster transaction processing speed, lower delay time and higher security.
Related Articles | Metrics
Network of Residual Semantic Enhancement for Garbage Image Classification
SU Wen, XU Xinlin, HU Yuchao, HUANG Bohan, ZHOU Peiting
Journal of Jilin University (Information Science Edition)    2023, 41 (6): 1030-1040.  
Abstract168)      PDF(pc) (3281KB)(448)       Save
In order to better protect the ecological environment and increase the economic value of recyclable waste, to solve the problems faced by the existing garbage identification methods, such as the complex classification background and the variety of garbage target forms, a residual semantic enhancement network for garbage image classification is proposed, which can strip foreground semantic objects from complex backgrounds. Based on the backbone residual network, the network uses visual concept sampling, inference and modulation modules to achieve visual semantic extraction, and eliminates the gap between semantic level and spatial resolution and visual concept features through the attention module, so as to be more robust to the morphological changes of garbage targets. Through experiments on the Kaggle open source 12 classified garbage dataset and TrashNet dataset, the results show that compared with the backbone network ResNeXt-50 and some other deep networks, the proposed algorithms have improved performance and have good performance in garbage image classification. 
Related Articles | Metrics
esearch on Visual Android Malware Detection Based on Swin-Transformer
WANG Haikuan, YUAN Jinming
Journal of Jilin University (Information Science Edition)    2024, 42 (2): 339-347.  
Abstract169)      PDF(pc) (2035KB)(443)       Save
The connection between mobile internet devices based on the Android platform and people’s lives is becoming increasingly close, and the security issues of mobile devices have become a major research hotspot. Currently, many visual Android malware detection methods based on convolutional neural networks have been proposed and have shown good performance. In order to better utilize deep learning frameworks to prevent malicious software attacks on the Android platform, a new application visualization method is proposed, which to some extent compensates for the information loss problem caused by traditional sampling methods. In order to obtain more accurate software representation vectors, this study uses the Swin Transformer architecture instead of the traditional CNN(Convolutional Neural Network) architecture as the backbone network for feature extraction. The samples used in the research experiment are from the Drebin and CICCalDroid 2020 datasets. The research experimental results show that the proposed visualization method is superior to traditional visualization methods, and the detection system can achieve an accuracy of 97. 39% , with a high ability to identify malicious software.
Related Articles | Metrics
Closed Frequent Itemset Mining Algorithm Based on ESCS Pruning Strategy
LIU Wenjie, YANG Haijun
Journal of Jilin University (Information Science Edition)    2023, 41 (2): 329-337.  
Abstract331)      PDF(pc) (1575KB)(439)       Save
 In the existing researches on closed frequent item set mining algorithms, pruning strategies are relatively single, most of which are for 1item set pruning, and there are relatively few pruning strategies for 2item set and nitem set (n逸3). However, effective pruning strategies can find and cut off a large number of hopeless item sets in advance. Therefore, improving the pruning strategy of closed frequent item set is of great help to improve the efficiency of this kind of algorithm. On the basis of ESCS(Estimated Support Cooccurrence Structure) structure, an ESCS pruning strategy for 2itemsets is proposed, and the classical closed frequent itemset mining algorithm DCI_Closed(Direct Count Intersect Closed) is improved to DCI_ESCS(Direct Count Intersect Estimated Support Cooccurrence Structure) algorithm, and the effect of ESCS pruning strategy is verified. On multiple public datasets and under different minimum support thresholds, experiments are conducted to compare the time performance of the algorithm before and after the improvement. The experimental results show that the improved DCI_ESCS algorithm performs well on long and dense data sets with long transaction and itemsets, and the time efficiency is improved to a certain extent.
Related Articles | Metrics
Rock Image Recognition Based on Improved ShuffleNetV2 Network
YUAN Shuo, LIU Yumin, AN Zhiwei, WANG Shuochang, WEI Haijun
Journal of Jilin University (Information Science Edition)    2023, 41 (3): 450-458.  
Abstract261)      PDF(pc) (3085KB)(439)       Save
The rock image recognition algorithm model based on traditional deep learning is cumbersome and requires certain computing power when it is applied to mobile terminals, so it is difficult to realize real-time and accurate identification of rock types. Based on the ShuffleNetV2 network, we insert the ECA (Efficient Channel Attention) module of the channel connection attention mechanism, use the Mish activation function to replace the ReLU activation function, and introduce the depthwise separable convolution in the lightweight network components. Experiments are performed on rock images with this method. Experiments show that the recognition accuracy of the algorithm reaches 94. 74% . The improved algorithm structure is not complex and maintains the characteristics of lightweight, which lays a foundation for its application in limited resource environments such as mobile terminals.
Related Articles | Metrics
Network Intrusion Detection Algorithm for Imbalanced Datasets
XU Zhongyuan , YANG Xiuhua , WANG Ye , LI Ling
Journal of Jilin University (Information Science Edition)    2023, 41 (6): 1112-1119.  
Abstract174)      PDF(pc) (1640KB)(428)       Save
A network intrusion detection algorithm that combines systematic data pre-processing and hybrid sampling is proposed for the problem of class imbalance in intrusion detection datasets. Based on the feature distribution of the intrusion detection dataset, the feature values are systematically processed as follows: for the three categorical features, “Proto’’,“Service’’ and “State’’, minor categories within each feature are combined to reduce the total dimension of one-hot encoding; the 18 extremely distributed numerical features are processed with logarithm and then standardized according to the numerical distribution. The class imbalance processing technology, which combines Nearmiss-1 under-sampling and SMOTE ( Synthetic Minority Over-sampling Technique) is designed. Each class of samples in the training dataset is divided into sub-classes based on the “Proto’’,“ Service’’ and “ State’’ categorical features, and each sub-class is under-sampled or oversampled in equal proportion. The intrusion detection model PSSNS-RF ( Nearmiss and SMOTE based on Proto, Service, State-Random Forest) is built, which achieves a 97. 02% multiclass detection rate in the UNSW-NB15 dataset, resolving the data imbalance problem and significantly improving the detection rate of minority classes.
Related Articles | Metrics
Proximal Policy Optimization Algorithm Based on Correntropy Induced Metric
ZHANG Huizhen, WANG Qiang
Journal of Jilin University (Information Science Edition)    2023, 41 (3): 437-443.  
Abstract216)      PDF(pc) (1748KB)(422)       Save
In the deep Reinforcement Learning, the PPO ( Proximal Policy Optimization) performs very well in many experimental tasks. However, KL(Kullback-Leibler) -PPO with adaptive KL divergence affects the update efficiency of KL-PPO strategy because of its asymmetry. In order to solve the negative impact of this asymmetry, Proximal Policy Optimization algorithm based on CIM( Correntropy Induced Metric) is proposed characterize the difference between the old and new strategies, update the policies more accurately, and then the experimental test of OpenAI gym shows that compared with the mainstream near end strategy optimization algorithms clip PPO and KL PPO, the proposed algorithm can obtain more than 50% reward, and the convergence speed is accelerated by about 500 ~ 1 100 episodes in different environments. And it also has good robustness.
Related Articles | Metrics
Fall Detection Based on YOLOv5 
HE Lehua, XIE Guangzhen, LIU Kexiang, WU Ning, ZHANG Haolan, ZHANG Zhongrui
Journal of Jilin University (Information Science Edition)    2024, 42 (2): 378-386.  
Abstract171)      PDF(pc) (4046KB)(414)       Save
In order to improve the recognition performance and accuracy of traditional object detection and to accelerate the computation speed, a CNN( Convolutional Neural Network) model with more powerful feature learning and representation capabilities and with related deep learning training algorithms is adopted and applied to large-scale recognition tasks in the field of computer vision. The characteristics of traditional object detection algorithms, such as the V-J(Viola-Jones) detector, HOG(Histogram of Oriented Gradients) features combined with SVM( Support Vector Machine) classifier, and DPM ( Deformable Parts Model) detector are analyzed. Subsequently, the deep learning algorithms that emerged after 2013, such as the RCNN ( Region-based Convolutional Neural Networks) algorithm and YOLO(You Only Look Once) algorithm are introduced, and their application status in object detection tasks is analyzed. To detect fallen individuals, the YOLOv5(You Only Look Once version 5) model is used to train the behavior of individuals with different heights and body types. By using evaluation metrics such as IoU(Intersection over Union), Precision, Recall, and PR curves, the YOLOv5 model is analyzed and evaluated for its performance in detecting both standing and fallen activities. In addition, by pre- training and data augmentation, the number of training samples is increased, and the recognition accuracy of the network is improved. The experimental results show that the recognition rate of fallen individuals reaches 86% . The achievements of this study will be applied to the design of disaster detection and rescue robots, assisting in the identification and classification of injured individuals who have fallen, and improving the efficiency of disaster area rescue.
Related Articles | Metrics
High Performance PtS2 / MoTe2 Heterojunction Infrared Photodetector
PAN Shengsheng , YUAN Tao , ZHOU Xiaohao , WANG Zhen
Journal of Jilin University (Information Science Edition)    2024, 42 (1): 74-80.  
Abstract140)      PDF(pc) (1460KB)(411)       Save
As one of the important components of the detection system, the performance of photoelectric detector is directly related to the quality of system data acquisition. In order not to affect the final detection result, it is essential to ensure the detector performance. The performance of high performance PtS2 / MoTe2 heterojunction infrared photodetector is studied. First, the materials, reagents and equipment are prepared to make PtS2 / MoTe2 heterojunction infrared photodetectors. The detector performance test environment, the four indicators of light response, detection rate, response time and photoconductivity gain are set up, and the detector performance is analyzed. The results show that the optical responsivity of PtS2 / MoTe2 heterojunction infrared photodetector is always above the 5 A/ W limit with the passage of test time. The detection rate of the detector is greater than 10 cm·Hz1 / 2 W -1 regardless of the infrared light reflected from any material. Whether the photocurrent is in the rising time or the falling time, its response time is always below the limit of 150 μs; The photoconductivity gain value has been kept above 80% . 
Related Articles | Metrics
Research on Precise Positioning of Ultra Wide Band with Signal Interference
ZHANG Ailin , LIU Hui , WANG Xiaohai , ZHANG Xiuyi , QIU Zhengzhong , WU Chunguo
Journal of Jilin University (Information Science Edition)    2024, 42 (2): 193-199.  
Abstract208)      PDF(pc) (1684KB)(409)       Save
In the field of indoor applications of UWB(Ultra Wide Band) positioning technology, it is important to establish an efficient and accurate 3D coordinate positioning system to overcome signal interference. Machine learning methods are used to investigate the problem of accurate positioning of indoor UWB signals under interference. Firstly, various statistical analysis models are used to clean up invalid or error measurements, then the a priori knowledge of TOF ( Time Of Flight) algorithm is combined with neural network and XGBoost algorithm to build a neural XGB(Exterme Gradient Boosting) 3D oriented system. The system can accurately predict the coordinate value of the target point by “ normal data冶 and “ abnormal data冶 ( disturbed), the coordinates of four anchor points, and the final error is as low as 5. 08 cm in two鄄dimensional plane and 8. 03 cm in three鄄dimensional space. A neural network classification system is established to determine whether the data is disturbed or not, with an accuracy of 0. 88. Finally, by combining the above systems, continuous and regular motion trajectories are obtained, which proves the effectiveness and robustness of the systems.
Related Articles | Metrics
Predictive Control of PMSM Based on Improved Duty Cycle Modulation
WANG Jinyu, LU Xinyu, ZHANG Zhongwei
Journal of Jilin University (Information Science Edition)    2023, 41 (5): 787-792.  
Abstract128)      PDF(pc) (1978KB)(408)       Save
In order to improve the torque ripple and flux ripple in the model predictive control system of PMSM (Permanent Magnet Synchronous Motor), a control system scheme is designed by learning the basic structure and control methods of PMSM. The scheme adjusts the duty cycle and voltage vector synchronously. The optimal expected voltage vector and action time at a certain sampling time are selected, and the optimal expected voltage vector and action time at the current sampling time are added to adjust the duty cycle coefficient of the sampling time. The feasibility and effectiveness of this method in improving the control performance of PMSM are verified by comparative analysis of the simulation model.
Related Articles | Metrics
Residual Connected Deep GRU for Sequential Recommendation
WANG Haoyu, LI Yunhua
Journal of Jilin University (Information Science Edition)    2023, 41 (6): 1128-1134.  
Abstract134)      PDF(pc) (1629KB)(403)       Save
To avoid the gradient vanishing or exploding issue in the RNN(Recurrent Neural Network)-based sequential recommenders, a gated recurrent unit based sequential recommender DeepGRU is proposed which introduces the residual connection, layer normalization and feed forward neural network. The proposed algorithm is verified on three public datasets, and the experimental results show that DeepGRU has superior recommendation performance over several state-of-the-art sequential recommenders ( averagely improved by 8. 68% ) over all compared metrics. The ablation study verifies the effectiveness of the introduced residual connection, layer normalization and feedforward layer. It is empirically demonstrated that DeepGRU effectively alleviates the unstable training issue when dealing with long sequences. 
Related Articles | Metrics
Teaching Experimental Device of Fiber Bragg Grating Temperature Stress Sensing
ZHANG Jin, LIU Peng, XIAO Tong, LAN Jingqi, LING Zhenbao
Journal of Jilin University (Information Science Edition)    2024, 42 (1): 131-136.  
Abstract151)      PDF(pc) (2279KB)(403)       Save
 FBG(Fiber Bragg Grating) sensing technology has achieved rapid development in scientific research and engineering applications, but it is rarely used in undergraduate experimental teaching. Currently, there are few devices available in the market that can be directly used for FBG sensing experimental teaching, and cutting- edge scientific research technology is disconnected from undergraduate experimental teaching. To address this situation, a teaching experiment device for temperature stress sensing based on FBG has been designed. The device consists of three parts: a fiber laser, a spectrometer, and upper computer control software. The fiber laser enables laser output of about 1 550 nm. The spectrometer measures the change of FBG center wavelength and collects data into the computer. The upper computer control software is used for graphic display and data storage. The experimental device has the advantages of simple operation, flexible assembly, good repeatability, and stability, and can be used for undergraduate experimental teaching. We introduce cutting-edge science and technology into undergraduate experimental teaching, promote the integration of scientific research and experimental teaching, and realize the synchronous improvement of scientific research and teaching levels. 
Related Articles | Metrics
Pedestrian Recognition Algorithm of Cross-Modal Image under Generalized Transfer Deep Learning
CAI Xianlong, LI Yang, CHEN Xi
Journal of Jilin University (Information Science Edition)    2024, 42 (1): 137-142.  
Abstract112)      PDF(pc) (2413KB)(398)       Save
 Due to the influence of changes in lighting conditions and pedestrian height differences, there are large cross modal differences in surveillance video images at different times. In order to accurately identify pedestrians in cross modal images, a pedestrian recognition algorithm based on generalized transfer depth learning is proposed. The cross modal image is formed through Cyele GAN(Cycle Generative Adversarial Network), and the reference map is segmented using single object image processing to obtain candidate human body regions. The matching regions are searched in the matching map to obtain the disparity of human body regions, and the depth and perspective features of human body regions are extracted through the disparity. The attention mechanism and cross modal pedestrian recognition are combined to analyze the differences between the two types of images. The two subspaces are mapped to the same feature space. And the generalized migration depth learning algorithm is introduced to learn the loss function measurement, automatically screen the pedestrian features of the cross modal images, and finally complete pedestrian recognition through the modal fusion module to fuse the filtered features. The experimental results show that the proposed algorithm can quickly and accurately extract pedestrians from different modal images, and the recognition effect is good. 
Related Articles | Metrics
Research on Early Warning of Degree Based on Support Vector Machine
WANG Na , LI Jinsong , PAN Ziyao , YAO Minghai
Journal of Jilin University (Information Science Edition)    2023, 41 (5): 903-907.  
Abstract111)      PDF(pc) (1590KB)(393)       Save

Most of the existing research on degree prediction in colleges and universities focuses on the construction of performance prediction models, ignoring the importance of degree early warning. Therefore, a degree early warning model based on support vector machine is proposed. A large number of experiments are carried out on the real data of 5 majors, including Broadcast and Television Directing Major, Chinese Language and Literature Major, Chemistry Major, Accounting Major and Mathematics and Applied Mathematics Major, in a university of 2018. The experimental results show that the constructed early warning model has good accuracy and practicality,which can become an important part of improving the teaching quality, and provide practical reference support for teachers to improve the teaching plan and for students to change their learning habits.

Related Articles | Metrics
Analysis of Research Focus in Field of Electronic Payment
LIU Lingling , CHEN Xiaoling , LI Henan , LI Xue
Journal of Jilin University (Information Science Edition)    2022, 40 (6): 1045-1049.  
Abstract327)      PDF(pc) (1808KB)(385)       Save
In order to explore the status quo and development trend of electronic payment research, an analysis of electronic payment research hotspots is performed. We use bibliometric method to further grasp the development status of electronic payment field from aspects of research overview, research strength and discipline distribution in the field of electronic payment, and uses the method of scientific knowledge mapping to visualize the research hotspots. The results show that China and the United States produce the most papers in the electronic field. The main output institutions are Beijing University of Posts and Telecommunications and Central South University. The research focuses on the theory and practical application of the security of electronic payment system.
Related Articles | Metrics
Defect Detection for Substation Based on Improved YOLOX
LUO Xiaoyu, ZHANG Zhi
Journal of Jilin University (Information Science Edition)    2023, 41 (5): 848-857.  
Abstract186)      PDF(pc) (4833KB)(374)       Save
In order to reduce the inspection burden of electric power workers and realize intelligent inspection in substation, the algorithm of substation equipment defect detection is studied. Firstly, the data augmentation method is used to expand the initial dataset and various image processing method is used to generate the dataset with complex illumination environment. Then, the adaptive spatial feature fusion method is used to mitigate the inconsistency of different scale features in the feature pyramid, and the loss function of confidence is changed to Focal loss function to mitigate the imbalance between positive and negative samples. Based on the improved YOLOX-s(You Only Look Once X-s) network model, the algorithm of substation defect detection is designed. Finally, the detection effect of the improved YOLOX-s model is compared with that of other deep learning algorithms. Under the designed data set, the experiment shows that the comprehensive detection effect of the improved YOLOX-s network model is good, and the accuracy and real-time performance is satisfied. 
Related Articles | Metrics
Evaluation of Decision Efficiency for Incomplete Air Combat Based on Interval Cloud Model
DING Shulin, WANG Yuhui, HE Jianliang, WANG Linmeng
Journal of Jilin University (Information Science Edition)    2023, 41 (3): 427-436.  
Abstract192)      PDF(pc) (1645KB)(372)       Save
In order to solve the problem of the unreasonable weight distribution of the evaluation index system and the uncertainty of air combat data in the evaluation process, game theory and interval cloud models are proposed for effectiveness evaluation of incomplete air combat decision-making. Aiming at the attack and defense decision of air combat, an evaluation index system is constructed, and the subjective and objective weights are reasonably adjusted based on game theory to obtain the comprehensive weight value of the index. Then, for the randomness and ambiguity in the evaluation, the interval cloud model method is studied, and the effectiveness of incomplete air combat decision-making is determined by the interval cloud generator. Finally, the feasibility and effectiveness of the proposed method are verified by simulation. It provides technical support for solving the problem of evaluating the effectiveness of air combat decision-making under incomplete information.
Related Articles | Metrics
Research on Graph Neural Network Recommendation Model of Integrating Context Information
YUAN Man , CHU Runfu , YUAN Jingshu , CHEN Ping
Journal of Jilin University (Information Science Edition)    2023, 41 (4): 693-700.  
Abstract235)      PDF(pc) (2122KB)(370)       Save
 With the advent of big data era, the development of recommendation systems has become more and more vigorous. It has become a research hotspot to push information that may be of interest to users in a timely manner among massive amounts of information. Traditional recommendation algorithm lack implicit information and contextual information about graph structures. In response to this, a recommendation model is proposed based on graph neural network. The main innovations are: 1) Based on the higher-order connectivity theory of graphs, the graph neural network is used to mine the hidden information in the user-item bipartite graph, and a the order is extended to multiple orders, so as to obtain more accurate embedded representation and recommendation effect; 2 ) Consider context information in the update process, which is conducive to understanding the interaction between contexts. The model is tested on the Yelp-OS, Yelp-NC and Amazon-book datasets, and the results show that it is better than the related comparison algorithms in both HR(Hit Ratio)and NDCG(Normalized Discounted Cumulative Gain) indicators, which proves that the algorithm can optimize the recommendation effect and improve the recommendation quality. 
Related Articles | Metrics
Visual SLAM System Based on Dynamic Semantic Features 
REN Weijian , ZHANG Zhiqiang , KANG Chaohai , HUO Fengcai , SUN Qinjiang , CHEN Jianling
Journal of Jilin University (Information Science Edition)    2023, 41 (6): 1041-1047.  
Abstract96)      PDF(pc) (3719KB)(360)       Save
Aiming at the problems that dynamic objects (such as pedestrins, vehicles, animals) appear in visual SLAM(Simultaneous Localization and Mapping) in real scenes, affect the accuracy of algorithm positioning and mapping, the YOLOv3-ORB-SLAM3(Oriented FAST and Rotated BRIEF-Simultaneous Localization and Mapping 3) algorithm is proposed based on ORB-SLAM3. The algorithm adds a semantic thread on the basis of ORB- SLAM3, and the thread uses YOLOv3 to perform semantic recognition target detection on dynamic objects in the scene. The outliers are removed from the extracted feature points on the tracking thread, and the static environment area extracted by the ORB feature, thereby the positioning accuracy of the visual SLAM algorithm is improved. The TUM(Technical University of Munich) data set is used to verify the positioning accuracy of the algorithm in monocular and RGB-D(Red, Green and Blue-Depth) modes. The verification results show that the dynamic sequence of the YOLOv3-ORB-SLAM3 algorithm in monocular mode is about 30% lower than that of the ORB-SLAM3 algorithm in RGB-D mode, the dynamic sequence decreases by 10% , and the static sequence does not decrease significantly.
Related Articles | Metrics
Design of Four-Tank System and Its Distributed Internal Model Control
YU Shuyou , TAN Li , CAO Ruili , HOU Chengyu
Journal of Jilin University (Information Science Edition)    2023, 41 (5): 793-800.  
Abstract221)      PDF(pc) (2476KB)(359)       Save
In order to improve the experimental teaching of relevant courses in automatic control, the design of a four-tank system is presented. The hardware is composed of general industrial components, while a Matlab programming environment is used for the software to directly control the system. A graphical user interface is also adopted to provide an easy way to run the system. The four-tank system model is built, and its parameters are identified based on a step response experiment. Furthermore, a distributed internal mode controller is designed for the liquid tracking control of the four-tank system. The results show that the four-tank system, using the internal mode controller, has little effect on the water level of the other tank when the water level of one tank changes, and the system has a satisfactory control effect. This experiment could play an important role in the teaching of relevant courses in automatic control.
Related Articles | Metrics
Medical Image Denoising Algorithm Based on 2D-VMD and BD
MA Yuanyuan , CUI Changcai , MA Liyuan , DONG Hui
Journal of Jilin University (Information Science Edition)    2024, 42 (1): 186-192.  
Abstract116)      PDF(pc) (3515KB)(359)       Save
 In order to improve the quality of denoised images, an algorithm based on 2D-VMD ( Two Dimensional Variational Mode Decomposition ) and BD ( Bhattacharyya Distance ) is proposed for image denoising. Firstly, the algorithm uses 2D-VMD algorithm to decompose the image into several IMFs ( Intrinsic Mode Functions), and then BD is used to measure the geometric distance between the PDF (Probability Density Function) of each IMF and the original image to distinguish the signal-dominated IMF and the noise-dominated IMF. Finally, the denoising noise-dominated IMF through wavelet threshold denoising and the signal-dominated IMF are reconstructed to obtain the denoised image. The proposed algorithm is applied to medical images. The theoretical analysis and simulation result show that, compared with ROF ( Rudin Osher Fatemi) algorithm, median filter and wavelet threshold algorithm, the algorithm of combining 2D-VMD and BD has better denoising effect in both subjective and objective evaluation, and it effectively improves the quality of denoised images. 
Related Articles | Metrics
Dynamic Bandwidth Allocation Strategy Based on Extensible TTI in Warning Information Dissemination
XIE Yong , WU Shiyu , LI Tian , YAO Zhiping , XU Xin
Journal of Jilin University (Information Science Edition)    2024, 42 (2): 217-225.  
Abstract98)      PDF(pc) (2391KB)(352)       Save
To effectively reuse URLLC(Ultra-Reliable Low-Delay Communications) and eMBB(enhanced Mobile Broad Band) on the same carrier band and improve the performance of the hybrid traffic system, a dynamic bandwidth allocation strategy based on scalable transmission time interval is proposed. The system bandwidth is dynamically divided according to the traffic type. URLLC scheduling priority is promoted in time domain. And in the frequency domain, different lengths of TTI ( Transmission Time Interval) are adopted to carry out user- centered wireless resource allocation. The dynamic system-level simulation shows that, compared to the traditional wireless resource allocation algorithm, the proposed scheme can effectively meet the delay requirements of URLLC users and optimize the throughput consumption of eMBB users under different load levels. The maximum delay gain of URLLC users is 83. 8% . The quality of service for different types of traffic in the 5G hybrid traffic system is satisfied.
Related Articles | Metrics
Noise-Shaping SAR ADC Design of High Accuracy and Low Power Consumption
ZHAO Zhuang , FU Yunhao , GU Yanxue , CHANG Yuchun , YIN Jingzhi
Journal of Jilin University (Information Science Edition)    2024, 42 (2): 226-231.  
Abstract166)      PDF(pc) (3823KB)(350)       Save
 The design of the loop filter in noise-shaping SAR ADC(Successive Approximation Register Analogto Digital Converter) is the key to the effect of noise shaping and is also an important module to achieve high accuracy performance. Compared with the active lossless integral loop filter, the traditional passive lossy integral loop filter has the characteristics of low power consumption and simple circuit design, but its NTF(Noise Transfer Function) is smooth and the noise shaping effect is weak. To solve this problem, a passive lossless second-order integral loop filter is proposed, which retains the advantages of the passive lossy integral loop filter and has a good noise shaping effect. A hybrid architecture noise-shaping SAR ADC with a resolution of 16 bits and a sampling rate of 2 Ms/ s is also designed. The simulation results show that high SNDR( Signal to Noise and Distortion Ratio) (91. 1 dB), high accuracy ( 14. 84 bits), and low power consumption ( 285 uW) are achieved when the bandwidth is 125 kHz and the oversampling ratio is 8.
Related Articles | Metrics
Dynamic and Secure Storage Algorithm for Unstructured Big Data Based on Edge Computing
WEI Rui
Journal of Jilin University (Information Science Edition)    2023, 41 (3): 559-565.  
Abstract215)      PDF(pc) (1610KB)(346)       Save
Aiming at the problems of poor edge security and limited storage effect of unstructured big data, a dynamic secure storage algorithm of unstructured big data based on edge computing is proposed. The unstructured big data is effectively analyzed and identified. The constructed data sensitivity level recognition model is used to establish and encrypt the sensitivity of unstructured big data. Based on edge computing and cloud computing, a cloud edge collaboration architecture is established, and the DCS-SOMP ( Distributed Compressed Sensing Simultaneous Orthogonal Matching Pursuit) algorithm written by the architecture is used to compress and collect encrypted data, so as to reduce data storage. Finally, the unstructured encrypted data is uploaded to each edge of the cloud side collaboration framework to realize the dynamic and secure storage of unstructured big data. Through experimental comparison, it is found that the robustness of storage test, metadata proportion test, encryption time-consuming test and bandwidth consumption is high, which ensures the practical application.
Related Articles | Metrics