Please wait a minute...
Information

Journal of Jilin University (Information Science Edition)
ISSN 1671-5896
CN 22-1344/TN
主 任:田宏志
编 辑:张 洁 刘冬亮 刘俏亮
    赵浩宇
电 话:0431-5152552
E-mail:nhxb@jlu.edu.cn
地 址:长春市东南湖大路5377号
    (130012)
WeChat

WeChat: JLDXXBXXB
随时查询稿件状态
获取最新学术动态
Table of Content
25 March 2014, Volume 32 Issue 2
Improved Adaptive Resource Allocation Algorithm for OFDM System
ZHAO Bo, LI Li, HU Chengyang, HU Guijun
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  113-118. 
Abstract ( 351 )   PDF (487KB) ( 569 )  

An efficient power and bit allocation algorithm based on IWFP(Iterative WaterFilling Power) algorithm is proposed for the adaptive OFDM (Orthogonal Frequency Division Multiplexing) systems. The traditional iterative water-filling power allocation algorithm needs high scale of constellation quantitative and does not fit for the practical applications. The proposed algorithm has a bit and power allocation of secondary adjustment, which conforms to the size of modulation constellation and the actual emission requirements. The simulation results show that with the same BER(Bit Error Rate)of 10-4 the required SNR (Signal-to
-Noise Ratio) in proposed algorithm is higher than IWFP algorithm nearly 3 dB. The proposed algorithm is lower than that in the traditional distribution algorithm by nearly 8 dB. The proposed algorithm is close to the optimal performance of the system with the low complexity of computing.

Related Articles | Metrics
Coordinated User Division of Dynamic Multi-User Scheduling Based on Utility Function
SHI Dongcheng, XING Yidan
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  119-124. 
Abstract ( 311 )   PDF (608KB) ( 436 )  

The shortcoming of the fixed signal to interference plus noise ratio (SINR: Signal to Interference plus Noise Ratio) threshold for collaborative user partition strategy is analyzed. Based on the system average rate and the edge user minimum average rate, the coordinated distance is defined. The algorithm of collaborative user division dynamic clustering joint multiuser scheduling using utility function is presented. And by applying Monte Carlo method, simulation is carried out. The simulation results show that the improved algorithm based on the utility function for collaborative user division can achieve a good balance between the system performance and the edge user performance.

Related Articles | Metrics
High-Definition Video Image Fiber Transmission System Based on FPGA
SUN Fenglei, LIU Shuchang, LIU Peng, BAI Xuemin, ZHOU Dayong, WANG Xue
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  125-130. 
Abstract ( 584 )   PDF (721KB) ( 621 )  

The traditional cable can not meet the high-definition video image transmission rate and transmission distance requirements. Therefor, a high-definition video optical fiber transmission with FPGA (Field Programmable Gate Array) as its core, on the basis of video image transmission technology is proposed. Using HDMI(High Definition Multimedia Interface) as the high-definition digital video image data input interface, the high-definition digital video image acquisition, preproces
sing and data stream cache control is realized, using the high-speed parallel FPGA features. According to the experiment, when the transmission rate is 2.5 Gbit/s, the transmission distance can reach 300 m. The program implements high-definition digital video fiber optic distant transmission without distortion.

Related Articles | Metrics
Color Image Encryption Algorithm of Chaotic Based on the Hopfield Network
LU Huibin, WANG Lijia
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  131-137. 
Abstract ( 352 )   PDF (1055KB) ( 336 )  

Generally encryption process is the overall processing image pixel so that it is weak to resist plaintext attack. In view of the problem of poor ability to prevent plaintext attack of pixel integral encryption, this article designs a chaotic single-pixel encryption algorithm of color image based on the discrete Hopfield network. This encryption method changes the pixel position of each component of image R,G,B by using one dimension chaotic sequence. Set each pixel bit weights and thresholds with the other two dimensional sequence in order to achieve effective encryption result. Theoretical analysis and experimental results show that the single pixel encryption algorithm can effectively resist differential attack. The feedback ciphertext can improve the pixel scrambling effect as well as good encryption effect and confidentiality of the encryption algorithm.

Related Articles | Metrics
Application of Conserving Energy and Reducing Emission Technology in the Mobile Communication Room
SUN Ling
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  138-144. 
Abstract ( 406 )   PDF (784KB) ( 270 )  

In order to promote the application of conserving energy and reduce emission in the Mobile communication room, reduce the energy consumption of the overall mobile corporation, achieve conserving energy and reduce emission targets of the mobile corporation, on the basis of the analysis of mobile communications equipment energy consumption status  problems, the application of conserving energy and reducing emission technology are used in the main communications equipment, the corollary power equipment and the air conditioning environment of mobile hub room and wireless base station room are discussed. Then the conserving energy technology applications of the air flow organization in air\|conditioned environment in the room, centralized or decentralized power supply, distributed base station network, carrier intelligent shutdown, multi density frequency, switching power supply rectifier module of dormancy, battery thermostat and base station integrated conserving energy air\|conditioning  system are presented in this article, to provide some conserving energy and reducing emission technology guidance for the future network construction and network operations of the mobile corporation.

Related Articles | Metrics
Fuzzy Sliding Mode Control for a Class of Non-Affine Non-Linear Aystems with Unknown Control Direction
LIU Xinyan, WANG Yuhui, WU Qingxian
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  145-150. 
Abstract ( 312 )   PDF (960KB) ( 332 )  

We proposed a novel adaptive fuzzy sliding control to deal with the control problem of a class of non\|affine non\|linear systems with unknown control direction, requiring no prior knowledge of the control direction and bound of uncertainty. Fuzzy logic system is used to directly approximate the unknown part of the controller. Nussbaum function is applied in parameter updating laws to deal with the problem of unknown control direction. A new nonlinear saturation function is introduced to promote the performance of the traditional integral sliding mode surface, therefore the proposed controller can maintain the tracking accuracy with better dynamic performance. The stability of the closed\|loop system is performed by Lyapunov approach. Simulation results are provided to verify the effectiveness of the proposed design.

Related Articles | Metrics
A Novel Ultra-Wide Stopband Planar Electromagnetic Band-Gap Structure with Hybrid Bridges
RU Yan, CHEN Peng, JIN Feng
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  151-157. 
Abstract ( 324 )   PDF (788KB) ( 394 )  

To improve the SSN (Simultaneous Switching Noise) suppression performance of the planar EBG (Electromagnetic Band-Gap) structure, a novel pla
nar HB-BG (Hybrid Bridges EBG) is proposed by applying the concept of “united cells method” in the unit cell. In our proposed HB-BG, the -40 dB stopband is
 achieved from 225 MHz to 15 GHz. The lower cutoff frequency is decreased from 432 MHz to 225 MHz as compared to the EBG structure with LBS (L-shaped Bridges and Slits). A lower band-gap center frequency is also obtained. The signal transfer characteristics of the localized HB-EBG are studied. Wideband SSN suppression and good signal integrity are successfully verified by simulations and measurements.

Related Articles | Metrics
Sliding Mode Control of Airship Trajectory Tracking on Forest Patrol
SONG Wenlong, ZHANG Jinyang, JIA Heming
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  158-163. 
Abstract ( 356 )   PDF (1248KB) ( 274 )  

To achieve unmanned airship trajectory tracking control when patrol in the forest and the airship flight movement is nonlinear, coupling, etc., a sliding mode control method is proposed. First, the accurate mathematical model of airship is deduced based on Newton's second law and other theorem, and by selecting the state vector and control vector, its mathematical model can be described as the nonlinear control systems. Nolinear system is simplified to linear system by Taylor series expansion, and the sliding mode control law is designed, while using saturation function suppressed chattering problem of sliding mode control. Finally, the designed control system stability is proved by Lyapunov stability theory. As can be seen from the simulation curves, the effect of trajectory tracking is more ideal, it can achieve the unmanned airship desired trajectory for accurate tracking.

Related Articles | Metrics
Research on SVM Nonlinear Estimation Sliding Mode Control of Space Robot
DENG Yulong, WANG Congqing
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  166-171. 
Abstract ( 265 )   PDF (848KB) ( 591 )  

A method of sliding mode control based on SVM(Support Vector Machine)nonlinear estimation of the robotic dynamics has been proposed to acquire faster trajectory tracking rate of the space manipulator end. SVM regression is used to estimate the parameter uncertainty of the nonlinear term and to compensate dynamic model of space robot. This SVM nonlinearity compensated sliding mode controller designed on the stability of the closed-loop system, avoiding computing precise model, has improved the dynamics performance of the system, achieving faster target trajectory tracking rate and reducing the tracking error. The simulation results show that the presented method is effective and feasible.

Related Articles | Metrics
Application of CWT in Mechanical Fault Feature Extraction
ZHANG Pengtao, LIU Jinhao
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  172-176. 
Abstract ( 316 )   PDF (1083KB) ( 312 )  

In order to solve the problem that can not denoising the external noise when extracting fault feature of gear, this paper introduces a method that can identify the time of periodic impulsive fault signatures from the measured noisy signal mixture on the basis of CWT(Continuous Wavelet Transfon) and auto-correlation coefficient method. A comb filter can be applied to extract fault features in timescale domain, the spurious impulses can be removed effectively from the extracted fault feature. Experiments show that this method can accurately identifiy the fault feature of impulsive signals with missing tooth.

Related Articles | Metrics
Research on Wireless Energy Transfer Platform for Implantable Devices
JIANG Hong, ZHU Xiaoning
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  177-180. 
Abstract ( 323 )   PDF (640KB) ( 402 )  

To improve the efficiency of the energy transmission system, a method that can obtain the density gone through the receiving coil, will mainly used in study on the magnetic field that created by the transmitting coil, and stimulate the field with a sort of shape function is proposed. Because of using rectangle and circle as the transmitting coil differentiate the effect of transmission efficiency, we need to find out the optimal shape of the transmitting coil. The results say that rectangular transmitting coil can provide energy for four devices simultaneous, and more effective than circle coil.

Related Articles | Metrics
Analysis of Irregular Cavity Shielding Effectiveness in Vehicles
WANG Yufei, ZHAO Xiaohui, WEN Quan
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  181-187. 
Abstract ( 262 )   PDF (836KB) ( 398 )  

In order to effectively suppress electromagnetic injury, the electronic products shielding effectiveness of the cable holes was studied by TLM(Transmission Line Matrix)method in HEMP(High\|altitude Electromagnetic Pulse). In view of the echo strength and the reflecting surface shape, an irregular shielding cavity was designed for the first time to resist electromagnetic destruction which can reduce the electromagnetic wave entering cavity by enhancing echo and it was tested in non-shielded vehicles. The simulation results show that the electric shielding effectiveness of irregular cavity is higher than that of the cylindrical and rectang
ular cavity and the resonator is also small hence rationality and effectiveness of the design were verified which can provide a theoretical reference to the protection of the electronic control system for vehicles.

Related Articles | Metrics
Binocular Measuring System Based on OpenCV
WANG Hao, XU Zhiwen, XIE Kun, LI Jie, SONG Chenglu
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  188-194. 
Abstract ( 814 )   PDF (1279KB) ( 374 )  

The main research is to get the distance by use of 3Dcamera. This article will explain some key technologies, such as camera calibration, stereo rectification, SAD(Sum of Absolute Differences), three-dimensional reconstruction and so on. The chessboard pictures are taken by the 3D camera from different angles, then saved to computer, and used to corner detection and camera calibration in order to get the parameters of the camera. Bouguet algorithm is selected as the stereo rectification algorithm. Stereo matching use SAD method. When we get the disparity map and the points clouds we start three-dimensional reconstruction work, then the distance between the target and camera is calculated based on similar triangles principle. The experiment is finished by OpenCV2.4.3(C++) and VS2010. This system only need an ordinary 3D-camera,which is not expensive. This system is time-saving and accurate when it is used.

Related Articles | Metrics
Stock Market Influence Factor Analysis Based on Web Data Mining
MA Junwei, WANG Tiejun, LI Qing, LIN Zhangxi
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  195-200. 
Abstract ( 332 )   PDF (1597KB) ( 271 )  

We collect Web financial text information from financial BBS(Bulletin Board System) and classify all these text information according to their word count. Then we do empirical analysis by factor model and GARCH(Generalized Autoreg Ressive Conditional Heteroskedasticity) models. Our three findings are: number of new posts and stock yield are directly related; posts with more words are expected to have greater affects on stock yield; the correlation between count of new posts and stock volatility is statistically significant.

Related Articles | Metrics
Calculation Method of Comprehensive Ontology Similarity Based on Stage Progression
WANG Guochun, ZHENG Shanhong, ZHAO Hui, DONG Yaze
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  201-204. 
Abstract ( 251 )   PDF (705KB) ( 464 )  

According to the semantic similarity calculation of traditional method in the presence of a large, complex calculation process problems, put forward a calculation method of comprehensive ontology similarity based on stage progression. The method to process the similarity is divided into four stages, each stage according to the actual situation of setting a threshold value, if the phase calculation of similarity is greater than a threshold, then calculate the similarity of the next phase, if less than the threshold then the concept of similarity between dissimilar, do not have to then calculate the following phases, this can greatly reduce the calculation of similarity, the calculation process and control. The algorithm in the recall and precision are increased by 4.78% and 3.05% than Glue algorithm through experiment data, while the calculation efficiency increased to 50% above.

Related Articles | Metrics
Application of Loosely Coupled Multiprocessor in Data Processing
TANG Junqi
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  205-210. 
Abstract ( 361 )   PDF (867KB) ( 449 )  

In order to improve the data processing speed and reduce costs, many business users have turned from a highend server platform to lowend hardware (i.e. loosely coupled multiprocessor systems). We propose a loosely coupled multiprocessor system using a centralized work pool and distributed work pool technology in a timely manner to assign work tasks to idle processors. Through simulation experiments, large data processing speed has been efficiently improved compared with non-work pool multiprocessor system.

Related Articles | Metrics
Multiple Watermark Algorithm on Fighters 3D Model Based on DCT
HU Qi, ZHAI Lang, DUAN Jin
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  211-216. 
Abstract ( 354 )   PDF (904KB) ( 435 )  

In order to protect the 3D(Three Dimensions)models-originality and security of weaponaries effectively, we take fighter's 3D model as an example, and adopt digital watermark technique to embed the copyright information. A multiple watermark plan on 3D mesh model based on DCT(Discrete Cosine Transform) is proposed. Firstly, put 3D model to affined transform, and consider the center of gravity of 3D model as the base point of three-dimensional Cartesian coordinate, extract the vertex's coordinate data of 3D model after principal elements’ analysis projected on three 2D (Two Dimensions)planes of  XOY、XOZ、YOZ. Take these three sets of two-dimensional discrete signal into DCT transform and embed two-dimensional digital watermark into three sets- middle-frequency coefficients after transform. Multiple watermark embedding achieves 3D model's robustness to simplification, noise and cut and so on under fixed-affine space. Experiments prove that this approach has strong robustness and fine watermark invisibility. Thus, this way avoids unlawful second-hand exploitation or application availably.

Related Articles | Metrics
Image Encryption Scheme Based on Double-Delay Reforming System
PU Xin, WANG Lingmin, FAN Xiaodan, BAI Ye, JIANG Wei, GUO Danwei
Journal of Jilin University(Information Science Ed. 2014, 32 (2):  217-222. 
Abstract ( 300 )   PDF (1134KB) ( 269 )  

To resolve the problem of typical characteristics of hyperchaos sequence with weak pseudo random, an algorithm based on double-delay reforming system is proposed. The sequence which produced by double\|delay reforming system has larger Lyapunov exponent and better paseudo\|random characteristics than that of the previous   hyperchaos system. Without other combined pseudorandom sequences, only one total round of substitution and diffusion can meet good effect. Simulation result shows that the suggested algorithm satisfies the required performance tests such as high level security, large key space and acceptable encryption speed.

Related Articles | Metrics