Please wait a minute...
Information

Journal of Jilin University (Information Science Edition)
ISSN 1671-5896
CN 22-1344/TN
主 任:田宏志
编 辑:张 洁 刘冬亮 刘俏亮
    赵浩宇
电 话:0431-5152552
E-mail:nhxb@jlu.edu.cn
地 址:长春市东南湖大路5377号
    (130012)
WeChat

WeChat: JLDXXBXXB
随时查询稿件状态
获取最新学术动态
Table of Content
24 February 2025, Volume 43 Issue 1
Research on MEC Multi-User Multi-Channel Task Offloading
REN Jingqiu, WANG Zixian
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  1-7. 
Abstract ( 215 )   PDF (1242KB) ( 119 )  

In order to reduce the total overhead of the MEC (Mobile Edge Computing) system, the weighted sum of latency and energy consumption of all devices are considered as the optimization objective, and the problem of task offloading is solved in a multi-user multi-channel mobile edge computing system. Specifically, multiple user devices are able to offload computationally-heavy tasks to the MEC server over a wireless channel. Considering the difference in residual energy among multiple smart devices, an energy factor is introduced to measure the bias of smart devices between energy consumption and latency. A reinforcement learning scheme based on the Q-learning algorithm is applied to co-optimize the offloading decision, the allocation of computational resources, and the selection of wireless channels. Simulation results show that the algorithm can effectively reduce the delay and energy consumption of task processing and accommodate more users.

Related Articles | Metrics
Research on Anti-Collision Algorithm for RFID Broadcast Channels in Internet of Things Based on Frame Time Slot ALOHA
ZENG Fengsheng, LI Ying
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  8-13. 
Abstract ( 175 )   PDF (1273KB) ( 106 )  

The channel resources of RFID ( Radio Frequency Identification) systems are limited, and when multiple tags compete for the same frequency or time slot, it can lead to collisions and conflicts. In order to optimize the communication efficiency of broadcast channels, a collision prevention algorithm for RFID broadcast channels in the Internet of Things based on frame time slot ALOHA is proposed. This method introduces the concept of frame time slots and divides the communication time into time slots; By analyzing the probability of occurrence of idle, successful identification, and collision states within the time slot, the cause of collision in the

broadcast channel is obtained. By combining Bayesian algorithm and Poisson distribution rules, the probability distribution of the number of tags is calculated to estimate the number of tags within the range of the reader and writer, and the next frame length is adjusted based on the calculation result of the number of tags. If there is still label collision problem within the adjusted frame time slot range, FastICA( Indcpendent Component Analysis) independent principal component analysis is used to transform the label recognition problem within the frame time slot into an EPC(Electronic Product Code) encoding generation problem, thereby achieving parallel recognition of multiple labels within a unified time slot and avoiding collision situations. The experiment shows that the estimation of the number of labels proposed is accurate, which can improve the label recognition rate within the time slot and effectively improve the propagation efficiency of the broadcast channel while ensuring the stability of the communication channel.

Related Articles | Metrics
Effect of Time Synchronization Error on Performance of Overhauser Magnetometer
SHI Chenshuai, ZHANG Shuang, CHEN Shudong
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  14-19. 
Abstract ( 148 )   PDF (2873KB) ( 74 )  

In order to suppress the influence of low-frequency magnetic field interference, such as geomagnetic diurnal variation, on the measurement results, multiple magnetometers are usually used for synchronous measurement. The time synchronization error has an obvious influence on the suppression effect. The influence of different time synchronization errors is studied on the JOM-5SF Overhauser magnetometer in geomagnetic detection and instrument sensitivity evaluation, based on the magnetometer developed in the laboratory. Two Overhauser magnetometers are used to conduct experiments on the campus of Jilin University. After comparing

the experimental results with the evaluation results of professional institutions, it is found that the smaller the time synchronization error, the smaller the difference between the magnetic field values of the two instruments, and the more accurate the sensitivity of the evaluation instruments by the synchronous method.

Related Articles | Metrics
Sensitivity Estimation of Overhauser Magnetometer for JOM-5J Station Monitoring
SUN Yuzhi, CHEN Shudong, ZHANG Shuang
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  20-25. 
Abstract ( 160 )   PDF (3645KB) ( 75 )  

In order to fulfill the observation requirements for the total magnetic field intensity of geomagnetic stations, a specialized magnetometer architecture is independently designed for the stations, and the Overhauser magnetometer is developed for station monitoring. Sensitivity evaluations are conducted using both single-station direct measurement and dual-station synchronized methods under field conditions with low noise and in environments with high electromagnetic interference. The experimental results from both direct measurement and synchronized methods indicate that the sensitivity of the JOM-5J magnetometer can reach 0. 02 nT at a 1s period. It is capable of replacing the GSM-90F for applications in earthquake precursor observations and long-term

volcano monitoring.

Related Articles | Metrics
Design and Implementation of Image Processing SoC Based on Coretx-M3
LIU Yijun, ZHANG Heling, MEI Haixia, WANG Lijie
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  26-33. 
Abstract ( 245 )   PDF (2953KB) ( 183 )  

A single embedded processor is difficult to efficiently complete the massive computing tasks such as image processing. Therefore, a set of SoC(System on Chip) with image processing function is designed based on FPGA(Field-Programmable Gate Array) and Coretx-M3 processor kernel. Based on Xilinx’s Kintex-7 FPGA and Arm’s Cortex-M3 kernel, the processor architecture is implemented on FPGA. The memory, bus system and basic peripherals are designed using IP(Internet Protocol) core and Verilog, and are connected to the processor through the bus. The image processing unit is designed, and the commonly used digital image processing

algorithm is mapped to the hardware description language. And the bus interface is designed to connect to the processor, providing the image processing capability for SoC. Based on Keil MDK tool and C language, the drivers for the peripheral and image processing unit of SoC are written, and the system function is simulated. And the digital image processing based on Matlab and the image processing unit in SoC are fully compared and tested by taking the binarization algorithm as an example. This image processing SoC has excellent performance and all the advantages of FPGA and SoC. The author has successfully developed a SoC with image processing function based on FPGA platform. The system is board-validated on Xilinx’s Kintex-7 family, model XC7K325TFFG676-2 FPGAs. This design reflects the high flexibility and efficiency of the system designed on FPGA platform, and provides a solution to solve the disadvantages of a single embedded processor that is difficult to efficiently complete the massive computing tasks such as image processing. The system is designed based on a reconfigurable platform, which can realize the customization of peripheral functions according to requirements, and has the advantage of higher flexibility.

Related Articles | Metrics
Bearing Fault Diagnosis Based on VMD-1DCNN-GRU
SONG Jinbo, LIU Jinling, YAN Rongxi, WANG Peng
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  34-42. 
Abstract ( 160 )   PDF (3530KB) ( 226 )  

Rolling bearing is one of the key components in rotating machinery, and long-term mechanical operation leads to wear easily. Traditional fault diagnosis relies on feature extraction, but due to loud noise during mechanical operation, effective signals are drowned. And the fault diagnosis network structure is complicated and there are too many parameters. Therefore, a bearing fault diagnosis model based on variational mode decomposition and deep learning is proposed for bearing wear detection. Firstly, the bearing signal is decomposed by VMD( Variational Mode Decomposition) and denoised by Hausdorff distance. Secondly, the

selected effective signals are inputted into the network structure of one-dimensional convolutional neural network and gate recurrent unit to complete the classification of data and realize the fault diagnosis of bearings. Compared to common bearing fault diagnosis methods, the proposed VMD-1DCNN-GRU(Variational Mode Decomposition- 1D Convolutional Neural Networks-Gate Recurrent Unit) model has the highest accuracy. The experimental results verify the feasibility of the proposed model for the effective classification of bearing faults, which has certain research significance.

Related Articles | Metrics
Research on Autonomous Flexible Docking System for Single-Post Steel Pipe Towers
PANG Hao , RUAN Zhoujie , CAI Weijie , LIU Ruijia , HU Zhengyi
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  43-48. 
Abstract ( 160 )   PDF (1521KB) ( 69 )  

Currently, the docking of single-column steel pipe towers in power systems mainly relies on manual implementation, which has a high risk factor and is time-consuming and laborious. Aiming to research the autonomous docking technology of single-column steel pipe tower for this specific technical condition and environment, a vision-based navigation-based hydraulically driven autonomous flexible docking system for single- column steel pipe tower is proposed. The single-post steel pipe tower autonomous flexible docking system uses a microcontroller that enables autonomous positioning and docking through image tracking control, and the

computational performance of the microcontroller makes it easier for technicians to operate. Numerical simulations and hardware tests are carried out for the docking of a single column steel pipe tower in the two- dimensional plane. The results show that the effectiveness of the proposed method is verified by controlling the motion of the steel pipe tower assembly at the docking interface using a small steel pipe tower model with air bearings in the two-dimensional plane with a minimum propellant thruster and a small control moment gyroscope.

Related Articles | Metrics

Study on Estimation Method of Longitudinal Velocity for Four-Wheel-Drive Vehicle

LI Zhenghua, XIN Yulin, REN Min, YU Wenzheng
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  49-57. 
Abstract ( 174 )   PDF (1992KB) ( 142 )  
To accurately obtain the longitudinal velocity of the vehicle, a longitudinal velocity estimation method applicable to four-wheel drive vehicles is proposed. Firstly, a finite state machine is utilized to identify the vehicle state at the current moment and the vehicle state in the time-domain window, which effectively switches between the adaptive Kalman filtering method and the integration method. For the four-wheel non-total skidding state, an adaptive Kalman filter method that updates the measurement noise in real time is designed. This method introduces the measurement value and estimation error in the time-domain window to improve the estimation accuracy. For the four-wheel total skidding state, the last longitudinal velocity estimate from adaptive Kalman filtering is used as the initial value, and the longitudinal velocity is calculated by integrating the longitudinal acceleration of the vehicle. The effectiveness of the algorithm is verified by Carsim and Simulink joint simulation experiments and real vehicle data experiments. The experimental results show that the estimation accuracy of the proposed estimation method is improved by at least 65% and 75% on low-adhesion road surfaces such as snow and ice, respectively, compared with the integral method and the method of estimating longitudinal velocity using wheel speeds.
Related Articles | Metrics
PD Parameters Setting of Qube-Servo2 Inverted Pendulum System Based on Genetic Algorithm
SUN Huihui , LUAN Hui , WANG Qinyi , SONG Yuanchun , YIN Jiaxin
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  58-64. 
Abstract ( 172 )   PDF (1945KB) ( 218 )  
Considering that the traditional trial-and-error method of parameter setting for rotary inverted pendulum PD( Proportion Differentiation) controller has strong subjectivity and poor response ability, genetic algorithm is used to set parameters of PD controller so as to conduct model simulation and to ensure its operation on QUBE-Servo2 rotary inverted pendulum experiment system. The experiment shows that compared to the trial and error method, the PD controller parameters obtained by genetic algorithm further optimize the response performance of the system, and are not limited by subjective experience. The steady-state errors of the swing rod and swing arm are both within 0. 01 rad.
Related Articles | Metrics
Small Target Detection Model in Aerial Images Based on Wasserstein Distance Loss
CAI Zeyu, LIU Yuanxing, LI Wenzhi, WU Xiangning, YANG Yi, HU Yuanjiang
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  65-76. 
Abstract ( 164 )   PDF (3944KB) ( 356 )  

UAV(Unmanned Aerial Vehicle) aerial photography, characterized by multi-angle, large field of view, and large-scale scenes, often results in images with numerous small objects, complex backgrounds, and difficult feature extraction. To address these issues, a new model, CA-NWD-YOLOV5 ( Coordinate Attention- Normalized Wasserstein Distance-You Only Look Once v5) is proposed. Based on the YOLOv5 model, a multi- scale detection layer is added to the head network to extract the features of small targets. It also incorporates a CA attention mechanism into the backbone network to prevent the model from overlooking target location

information. Lastly, the normalized Wasserstein distance loss function replaces the loss function based on intersection ratio, enhancing the model’s sensitivity to small targets. Experiments on the VisDrone2019 dataset demonstrate that, compared to the improved YOLOv5 model, the CA-NWD-YOLOv5 model can effectively enhance the detection accuracy of small and medium-sized targets in UAV aerial photography images. The mAP_ 0. 5 of the improved algorithm reaches 50% , proving its effective application to the detection of small targets in aerial photography.

Related Articles | Metrics
Application Research of Campus Network Traffic Monitoring System Based on CactiEz
ZHANG Yan, SHEN Zhan
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  77-82. 
Abstract ( 179 )   PDF (2151KB) ( 212 )  
In order to solve the problem of network traffic management in the development of campus network informatization, associated with the practical problems of campus network management of a university in Xinjiang, a network traffic monitoring platform based on CactiEz is proposed and implemented. Based on the actual environment of the campus network, the current situation of the campus network is analyzed, and the traffic is monitored with specific hardware and software equipment. The application results show that the monitoring system can monitor the changes of network traffic in real time, reflect the network status in time, and carry out statistics and analysis of network traffic, providing data support for network performance and security. Therefore, the network traffic monitoring platform based on CactiEz plays a significant role in improving the efficiency of campus network management and helps to optimize network management.
Related Articles | Metrics
Artificial Bee Colony Algorithmof Multi-Strategy Self-Optimizing Based on Reinforcement Learning
NI Hongmei, WANG Mei
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  83-89. 
Abstract ( 192 )   PDF (944KB) ( 160 )  
To address the deficiency in the local search ability of the artificial bee colony algorithm, a multi-strategy self-optimizing artificial bee colony algorithm based on reinforcement learning is proposed. This algorithm combines the Q-learning method in reinforcement learning with the artificial bee colony algorithm. The distance between the best value of the population and the individual fitness value, along with the diversity of the population are used as the basis for dividing the state. The algorithm creates an action set that contains multiple search strategies, adopts the ε-greedy strategy for selecting the best, produces high-quality offspring, and achieves intelligent selection of the ABC (Artificial Bee Colony) algorithm update strategy. Through 20 test functions and application in stock prediction, the results show that the proposed algorithm has better performance, a better balance between exploration and exploitation, faster convergence speed, and better self- optimizing ability.
Related Articles | Metrics
Research on Stock Price Prediction Based on TRSSA-ELM Algorithm
TAN Jiawei , GU Jiacheng , LI Chunmei , WANG Shanqiu , QIN Dandan
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  90-97. 
Abstract ( 158 )   PDF (2543KB) ( 98 )  

In order to solve the problems of uncertainty, discontinuity, randomness and nonlinearity in stock price forecasting, a TRSSA-ELM ( Tent Random Walk Sparrow Optimization Algorithm-Extreme Learning Machine) stock price forecasting model is proposed. Firstly, adaptive Tent chaotic mapping and random walk strategy are used to improve the algorithm, which enhances the diversity and randomness of the population and improves the local and global optimization ability of the algorithm. Secondly, the performance of TRSSA( Tent Random Walk Sparrow Optimization Algorithm) is verified by using single peak, multi-peak and fixed multi-peak

test functions. Compared to SSA( Sparrow Optimization Algorithm), AO( Aquila Optimizer), POA( Pelican Optimization Algorithm) and GWO(Grey Wolf Optimizer), TRSSA algorithm has better convergence speed, accuracy and statistical properties. Finally, because the ELM ( Extreme Learning Machine) model randomly generates weights and thresholds, which reduces the prediction accuracy and generalization ability, TRSSA algorithm is applied to optimize the weights and thresholds of the ELM model, and the TRSSA-ELM model is tested in Sanan Optoelectronic stock data set. The experimental results show that TRSSA-ELM model has better prediction accuracy and stability than SSA-ELM, ELM, SVR(Support Vector Regression) and GBDT(Gradient Boosting Decision Tree).

Related Articles | Metrics
Recognition Method of Improved OCR Table Structure for SLANet
CAO Maojun, LI Yue
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  98-106. 
Abstract ( 216 )   PDF (3692KB) ( 215 )  

Traditional methods for identifying table structures are difficult to fully learn complex table structures such as merge cells with multiple rows and columns, blank cells, nested cells, and are lack of information in the process of extracting features. An OCR(Optical Character Recognition) table structure identification method based on improved SLANet (Structure Location Alignment Network) is proposed. Firstly, the lightweight CPU (Central Processing Unit) convolutional neural network is used and attention mechanism is introduced to enhance the generalization ability and explanation ability of the network. The information vector obtained by training is

inputed into the lightweight high-low level feature fusion module to extract features, and then the outputted features are aligned with the structure and position information through the feature decoded module to obtain the prediction label. Experiments show that compared to EDD ( Encoder-Dual-Decoder), TableMaster and other models, the accuracy of the proposed method has been significantly improved, reaching 76. 95% , and the TEDS (Tree-Edit-Distance-based Similarity) has reached 95. 57% , which significantly enhances the model’s ability to identify complex table structures and provides an optimization strategy for identifying table structures.

Related Articles | Metrics
Research on Graph Convolutional Network Recommendation Model Fusing Contextual Informationand Attention Mechanism
YUAN Man, LI Jiaqi, YUAN Jingshu
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  107-115. 
Abstract ( 174 )   PDF (2170KB) ( 407 )  

Although traditional recommendation systems use graph structure information, most of them only consider the basic attributes of users and items, ignoring the important factor of contextual interaction information between users and items. Even if contextual interaction information is taken into account, there is a lack of attention in the layer combination stage. force mechanism to assign weight. To solve this problem, a CIAGCN (Context Information Attention Graph Convolutional Networks) recommendation model that integrates contextual interactive information and attention mechanism is proposed. This model utilizes the contextual interaction

information of users and items while applying the high-order connectivity theory of graphs to obtain deeper collaborative signals. An attention mechanism is introduced in the layer combination stage to improve the interpretability of this stage. The model was experimentally compared on the Yelp-OH, Yelp-NC and Amazon- Book data sets. The results showed that the model had a certain effect compared with other algorithms, indicating that the recommendation effect was better than some traditional recommendation models.

Related Articles | Metrics
Algorithm for Defect Detection of Steel Surface Based on YOLOv8-DSG
ZOU Yanyan, CAO Yanfen, ZHANG Xinyue, LI Zhi, CUI Shilong
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  116-125. 
Abstract ( 264 )   PDF (3813KB) ( 267 )  

At the traditional image processing algorithms for the detection of steel surface defects, there are problems such as low recognition efficiency and a high false detection rate of leakage. The YOLOv8-DSG (Deformable Convolution Network Squeeze and Excitation Network Generalized Intersection over Union) steel surface defect detection algorithm is proposed. Based on the traditional YOLOv8 algorithm, several improvements are made. Firstly, the DCN ( Deformable Convolutional Network) is embedded in the C2f ( Convolution to Feature) module of the Backbone network, which enhances the feature extraction ability of the model under

complex background conditions. Secondly, the SE ( Squeeze and Excitation network ) attention module is introduced into the Neck network, which highlights the important feature information of the steel surface and enhances the richness of the feature fusion. Lastly, the GIOU ( Generalized Intersection Over Union) loss function is used instead of the original CIOU(Complete Intersection Over Union). Compared with CIOU, GIOU introduces the minimum enclosing frame area ratio, which can more accurately measure the overlapping area of the frames. The experimental results show that the YOLOv8-DSG algorithm achieves an average accuracy mAP of

80% on the NEU-DET dataset, which is 3. 3% higher compared to the original YOLOv8 algorithm. And it has a low rate of misdetection and omission, demonstrating higher detection accuracy and arithmetic efficiency. This algorithm can play an important role in quality inspection.

Related Articles | Metrics

Improved Osprey Optimization Algorithm

TAI Zhiyan , XING Weikang , GU Jiacheng , LIU Ming , YU Xiaodong
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  126-133. 
Abstract ( 197 )   PDF (2495KB) ( 352 )  

The L_OOA(An Improved Osprey Optimization Algorithm) is proposed to address the issues of the original OOA (Osprey Optimization Algorithm), which is prone to local optima and slow optimization speed. Firstly, to maintain population diversity, the Tent chaotic mapping strategy is adopted to initialize the individual positions of the population. Secondly, by introducing the Levy strategy to update the position of the Osprey, the Osprey Optimization Algorithm can improve its ability to jump out of local optima. The spiral curve strategy is introduced into the Osprey optimization algorithm to improve its computational accuracy. Finally, comparative

experiments are conducted with other intelligent algorithms on the CEC2021 ( Computational Experimental Competition 2021)testfunction set. Experiments prove that L_OOA has better accuracy and faster speed.

Related Articles | Metrics
Research on Optimal Deployment Strategy of Virtual Machines in Warship Common Computing Environment
YANG Suyu , WANG Junjun , ZHU Wei , YAN Zhongqiu
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  134-142. 
Abstract ( 117 )   PDF (2009KB) ( 109 )  

The warship’s common computing environment integrates computing and storage resources through virtualization technology to build a public infrastructure platform for warships. However, it is limited by the space and energy consumption requirements of the maritime combat platform. Optimizing the virtual machine deployment strategy is an important development to reduce the energy consumption level of the warship’s commoncomputing environment and improve basic resource support capabilities. Several commonly used virtual machine optimization deployment methods are compared and a virtual machine deployment strategy for warship’s common computing environments is proposed based on an improved flower pollination algorithm. An improved maximum

and minimum distance method is designed and applied to the initial population generation process to enhance the initial solution. To improve the quality, a local search strategy with an information exchange mechanism is proposed by introducing the hybrid frog leaping algorithm. And an adaptive switching probability strategy is proposed to balance global pollination and local pollination, and generate an optimized deployment plan for mapping virtual machines to servers. It is verified through simulation experiments that the proposed virtual machine deployment optimization strategy can significantly reduce the energy consumption level of the warship’s common computing environment.

Related Articles | Metrics
Network Security Situation Assessment System Based on Multi Source Data Mining
WANG Zheng, CUI Ran
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  143-149. 
Abstract ( 160 )   PDF (2249KB) ( 121 )  
To maintain the security of network operation and ensure the secure storage of network information, a network security situation assessment system based on multi-source data mining is proposed. This study first establishes a three-layer network security situation system architecture with application layer, control layer, and data forwarding layer as the core. To ensure effective information transmission between the application layer and network devices, the OSGi (Open Service Gateway Initiative) design pattern is used to construct a five layer parallel architecture for the ONOS(Oper Network Operating System) controller of the control layer to ensure the decision-making response of the network security situation. Utilize the deployment of multiple detectors within the traffic detection module to achieve deep mining of network multi-source data; Introduce the LEACH(Low Energy Adaptive Clustering Hierarchy) algorithm to achieve multi-source data fusion at the network cluster head. After analyzing the threat level of network intrusion factors through the security situation assessment module, combined with the weight coefficient theory, the threat level of the network situation threat factors is assigned. Combined with the network hierarchical division method, the security situation of the operational network service layer, host layer, and network layer is evaluated in layers. The experiment shows that the proposed method has a high ability to analyze the operational status of network data, and can accurately identify attacks from multiple types of network threat factors, providing important guarantees for network security operation.
Related Articles | Metrics
Association Fusion Algorithm of Dual Channel Data Based on Fuzzy Mathematics Theory
SUN Jie
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  150-155. 
Abstract ( 182 )   PDF (2009KB) ( 69 )  

When using data from a single data source to complete tasks, there may be significant errors in the data, and there may even be data missing, which can affect the progress of the task. A dual channel data association and fusion algorithm based on fuzzy mathematics theory is proposed for this purpose. The correlation of dual channel data is measured and the missing data in the dual channel data is predicted according to the missing data prediction process. The missing data in the dual channel dataset is filled in to obtain complete dual channel data. The dual channel data is standardized, and the principal component analysis is used to calculate

the similarity between the dual channel data and the principal components, obtaining the comprehensive support level of the dataset, and obtain effective data. By using fuzzy mathematics theory, effective data is fuzzified, and the closeness between the fuzzification results and real data is calculated to determine the data fusion weight, in order to achieve dual channel data association and fusion. The experimental results show that using the proposed algorithm for dual channel data association fusion, when the total number of data reaches 1 500, the value of the comprehensive evaluation index exceeds 9, indicating that the proposed algorithm can improve the accuracy of dual channel data association fusion and has good dual channel data association fusion results.

Related Articles | Metrics
Implementation of Weil Pairing and Tate Pairing for New Method of Finding Group Structures
HU Jianjun
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  156-165. 
Abstract ( 257 )   PDF (808KB) ( 211 )  

Weil pairing and Tate pairing are widely used in encryption, signature, password exchange and cryptosystem security analysis. It has been suggested that the computational efficiency of Tate pairing is better than that of Weil pairing, but this problem is still doubtful and needs to be further verified. The parameter selection algorithm of binary group structure proposed by Miller belongs to probabilistic algorithm, and the algorithm efficiency is not high. To solve the above problems, the analysis models of Tate pairing and Weil pairing on execution efficiency are established, and a new method is proposed to find the parameters of the distortion value by using the quadratic relation of the order of the elliptic curve. The research shows that when the distortion value is small, the computational efficiency of Tate pairing is better than that of Weil pairing, which is consistent with previous studies. However, when the distortion value is large, the computational efficiency of Weil pairing is better than that of Tate pairing, and the time complexity of the new method to find the distortion value parameter is less than that of Miller method O(M). Compared with Miller’s probabilistic

method, the new method is deterministic. The correctness of the analysis model is verified by analysis and example, and the new method greatly improves the efficiency and accuracy of parameter selection.

Related Articles | Metrics
Digital Archive Information Privacy Protection Algorithm Based on Blockchain Technology
WANG Xinyao, PENG Fei
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  166-172. 
Abstract ( 189 )   PDF (2221KB) ( 168 )  

The era of big data has arrived, and the digitization of archive information is the future development trend. How to protect the privacy of digital archive information is a key research topic in the computer field. At present, the archive privacy protection algorithm based on blockchain technology has problems such as poor protection effect and long operation time. In order to solve the problems existing in traditional methods, a digital archive information privacy protection algorithm based on blockchain technology is proposed. Firstly, apply blockchain technology to the privacy protection process of digital archive information. The specific protection

process is as follows: the data owner uses symmetric encryption algorithms to encrypt the digital archive information and upload it to the private chain; At the same time, generate a secure index of digital archive information and upload it to the alliance chain; The data user generates a query threshold for the keywords to be queried, sends it to the private chain, obtains the query results on the private chain, and sends them to the alliance chain. The alliance chain cooperates with the private chain to verify the correctness of the query results. If it is correct, the alliance chain will send the converted encrypted data to the data user. The experimental results show that the privacy protection algorithm for digital archive information of the proposed method has good privacy protection effect and practical application effect.

Related Articles | Metrics
Error Correction Method for Drilling Trajectory Measurement Based on Particle Swarm Optimization Algorithm
TIAN Feng
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  173-179. 
Abstract ( 121 )   PDF (2402KB) ( 92 )  

In order to reduce the error between the target drilling trajectory and the actual drilling trajectory measurement results, a drilling trajectory measurement error correction method based on particle swarm optimization algorithm is proposed. A drilling trajectory calculation model is established, the values of drilling inclination angle, drilling orientation angle, and drilling azimuth angle are determined, and drilling trajectory data is collected. The sources of errors in drilling trajectory measurement is analyzed, an error transfer state space model is constructed, and the historical errors are merged to complete the calculation of drilling trajectory

measurement errors. The error correction objective function is constructed with the goal of minimizing the measurement error of the borehole trajectory. The velocity and position of particles are updated, and the fitness function is constructed. The objective function is solved by continuously updating and calculating the fitness function to complete the correction of the measurement error of the borehole trajectory. The experimental results show that the roll angle error in each direction of the proposed method is only between 0. 3° and 1. 8 °, and the drilling trajectory is highly fitted with the actual value curve, which can effectively correct the trajectory

measurement error and provide valuable reference for the actual exploration work of underground engineering.

Related Articles | Metrics
Research on Visual Communication Algorithm of Weak and Small Target Image in Virtual Reality Environment
ZHANG Peng
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  180-186. 
Abstract ( 175 )   PDF (1114KB) ( 137 )  
In order to show the virtual image more intuitively, a visual communication algorithm for small and weak target images in virtual reality environment is studied. An image model is constructed based on the imaging characteristics and influencing factors of the target image in the virtual environment, the image target is adjusted based on the actual situation and image model, time domain and spatial domain are combined, and the spatial background is constrained to suppress the background image. The filtered image and residual background are used to complete image denoising. Based on the above preprocessing results, and other control factors such as the motion speed of the target image sequence, characteristic window area, and so on, image sequences are sampled, and feature tracking is converted into optical flow calculations, accurately tracking target images, obtaining optical flow results, and achieving visual communication of small and weak target images. Experimental results show that this algorithm has a higher success rate in visual communication, a shorter communication time, and a higher visual communication integrity.
Related Articles | Metrics
Urban Traffic Flow Prediction Considering Spatiotemporal Information Based on GCN and LSTM
LI Zhengnan , ZHAO Zhihui
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  187-184. 
Abstract ( 248 )   PDF (1877KB) ( 220 )  

The current intelligent prediction methods for traffic flow have not analyzed and considered the spatiotemporal correlation of the road network. We conduct research and improvement to address this issue by adding spatiotemporal correlation information to the intelligent prediction methods to solve the problem of reduced prediction accuracy caused by the lack of spatiotemporal information. The spatiotemporal correlation of the urban road network is analyzed by combining the map connection of the traffic network and the vehicle traffic delay. Considering the spatiotemporal correlation of urban traffic, based on the GCN( Graph Convolutional Neural)

network and LSTM ( Long Short-Term Memory) network methods, the urban traffic flow prediction method considering spatiotemporal information based on GCN and LSTM is studied. Urban traffic flow prediction network is optimized and trained by using the open source urban traffic flow dataset. The performance of LSTM, BiLSTM (Bidirectional Long Short-Term Memory) network and different number of nodes in solving the traffic flow prediction problem is compared. The results of this research show that the proposed method can effectively predict urban traffic flow, and the accuracy of the proposed method is improved compared with the prediction method without considering spatiotemporal information. This research can provide a theoretical reference for traffic prediction in intelligent transportation systems.

Related Articles | Metrics
Latent Low-Rank Projection Based on Dual Neighborhood and Feature Selection
YIN Haishuang, LI Rui
Journal of Jilin University (Information Science Edition). 2025, 43 (1):  195-202. 
Abstract ( 141 )   PDF (2705KB) ( 115 )  

In view of the defects that the projection matrix learned from LatLRR ( Latent Low Rank Representation) can not explain the importance of the extracted features and preserve the local geometry of data, a novel method named LLRSP (Latent Low-Rank and Sparse Projection) with dual neighborhood preserving and feature selection is proposed. The algorithm first combines low-rank constraint and orthogonal reconstruction to hold the main energy of the original data, and then applies a row sparse constraint to the projection matrix for feature selection, which makes the features to be more compact and interpretable. Furthermore, a l2,1 norm is introduced to regularize the error component to make the model more robust to noise. Finally, neighborhood preserving regularization is applied on the low dimensional data and low-rank representation matrix to preserve the local manifold geometrical structure of data. Datasets results of extensive experimental on various benchmark show that this method can obtain better performance than other state-of-the-art methods.


Related Articles | Metrics