Please wait a minute...
Information

Journal of Jilin University (Information Science Edition)
ISSN 1671-5896
CN 22-1344/TN
主 任:田宏志
编 辑:张 洁 刘冬亮 刘俏亮
    赵浩宇
电 话:0431-5152552
E-mail:nhxb@jlu.edu.cn
地 址:长春市东南湖大路5377号
    (130012)
WeChat

WeChat: JLDXXBXXB
随时查询稿件状态
获取最新学术动态
Table of Content
20 March 2009, Volume 27 Issue 02
Radio-Frequency Oscillator for
ZHAO Jing,WANG Jun,LING Zhen-baoa, b,LIU Guang-da
J4. 2009, 27 (02):  113. 
Abstract ( 357 )  

 In order to improve magnetic field sensitivity and stability of the high-temperature RF SQUID(Rradio-Frequency Superconducting Quantum Interference Devices) magnetometer, a radio-frequency oscillator used to provide bias signal to resonant circuit of the superconducting quantum interference devices was designed. The voltage-controlled oscillator with adjustable continuously frequency was used as signal source, and radio-frequency signal attenuation circuit used to attenuate oscillation signal to meet the power requirements of the oscillation signal of the SQUID was also designed. The experiments showed that the oscillator can continuously produce adjustable 549.75~947 MHz radio-frequency signal, and the minimum signal power is  -98.97 dBm, which meets the work requirements of the SQUID devices.

Related Articles | Metrics
Fine Granularity Scalable Image Coding Based on  Scanning Classification of |Histogram
LI Yong,CHEN He-xin,CHEN Mian-shu,SANG Ai-jun,YANG Yu-xia
J4. 2009, 27 (02):  117. 
Abstract ( 359 )  

Targeted to a series of problems, e.g., numerous data brought by the transmission of multimedia information; different requirements on picture quality from different consumers, we study the still image scalable coding, improve the base layer coding strategy and propose a classified FGS(Fine Granularity Scalable) image  coding based on the histogram scanning. This method classifies the gray levels base on the probability that the pixels appear and then code the value of the pixels with different precision based on the classes they belonged. The different requests of the consumers will be satisfied through the interactive operation.

Related Articles | Metrics
Large-Capacity High-Speed Image Synchronization Recording Technology in Dynamic Detection System
LIU Shu-chang, ZHONG Gang, LIU Peng, WANG Shun, HAN Dong-song
J4. 2009, 27 (02):  123. 
Abstract ( 331 )  

In accordance with modern range of the actual demand,  large-capacity data synchronization storage and recording technology of multiple images in the dynamic detection system in detail is studied.The method of using real-time non-destruction storage and processing after the event in real-time dynamic testing by using digital camera to achieve high-resolution is provided, making research on the real-time storage and recording device which satisfy the practical need.The key technology of multiple images synchronization acquisition and real-time recording are also deeply discussed and  the specific resolution is put forward, which aims at the primary characteristics of the vehicle-mounted dynamic testing, introducing a new technology solution for those problems to be resolved in the field of research on modern dynamic testing which bases on the image.

Related Articles | Metrics
Amelioration Algorithm to Suppress the Cross-Term Interference of WVD
GAO Xian-jun,CHEN Chao,ZHANG Jie,ZNANG Zhuo
J4. 2009, 27 (02):  127. 
Abstract ( 431 )  

The WVD(Wigner-Ville Distribution) is an important  method of time-frequency analysis, but the cross-term interference in WVD has a  bad influence.Aiming at the characters of cross-term interference.An amelioration algorithm—united algorithm basted on STFT(Short-Time Fpiroer Tramsfpr) and WVD (STFT-WVD)  was proposed to solving the problem. Between the Spectrogram and WVD of signals, united algorithm makes a cross correlation to achieve an ideal effect. By analyzing and simulating, it is proved that STFT-WVD suppresses the cross-term interference in WVD effectively, and keeps the excellent time-frequency resolution as WVD. So STFT-WVD is an effective amelioration algorithm of WVD.

Related Articles | Metrics
Speech Signal Localization Estimate Based on Microphone Array Using TDOA Algorithm
WANG Da-zhong|LI Xiao-ni
J4. 2009, 27 (02):  133. 
Abstract ( 352 )  

In order to use a microphone array to locate speech signals preferably and obtain higher positioning accuracy, the constructive method and performance characteristics of TDOA (Time-Delay of Arrival )algorithm are studied, reasons and environment of causing errors in locating processing are analyzed, and some methods that can reduce or eliminate the errors are proposed. Using the time-delays of signals from the same speech signal source between any two microphones in the array and the relationships within the time-delays, the locating results can be simulated on computers. The solutions proposed can improve the locating accuracy greatly and increase the utilization rate of the TDOA algorithm in practical application.

Related Articles | Metrics
Design and Implementation of Uplink BandWidth Schedule Module for IEEE 802.16e System
LI Xiao-tang,ZHAN Feng
J4. 2009, 27 (02):  139. 
Abstract ( 352 )  

As next generation  communication technology,wireless MAN(Metropolitan Area Network)(IEEE 802.16e) has put forward QoS(Quality of Service) for many services.IEEE 802.16 standard is only specific the QoS service type,such as bandwidth request and allocation and so on,but some schedule arithmetic,admittance dose not be researched.A new QoS architecture and uplink schedule algorithms that is deadline and surplus schedule arithmetic were proposed,and the design the uplink bandwidth schedule module was implemented, the result shows it can supply the real-time operations very well.

Related Articles | Metrics
Security Protection of |Module Station and Electromagnetic Compatibility Study
ZHAO Cong,ZHAO Wan-zhang
J4. 2009, 27 (02):  144. 
Abstract ( 249 )  

Based on EMC (Electromagnetic Compatibility) basic theory, in view of the communications network in remote modules are mostly located in the township and  poor security features, the module was constructed in the communication operators in the process of safety management model. Based on IEC61643-1 (GB18802.1) of performance requirements and test methods, the use of SPD(Surge Protective Devices) +MCB(Miniature Circuit Breaker) package, to achieve a multi-level protection programme design. And for transient interference suppression in the grounding system in the engine room environment, soil sampling and grounding to choose a practical management measures. Greatly improve the communication system in the modules reliability and security.

Related Articles | Metrics
Computer Vision Method Based on Quadric Curves 
of Measuring Pipe Orifice
JIANG Yu-qiu
J4. 2009, 27 (02):  150. 
Abstract ( 307 )  

For measuring the pipe orifice, a computer vision method is used. The previous curve based stereo method is slow, in which curves in images are used for computing the features of the points and for establishing the point-point correspondence between the left and the right image. A new method is presented. A closed form solution for the global matching criterion of two quadric curves in two images and furthermore and a closed form solution for the global reconstruction of the conics in the scene are presented. It is shown that the matching of two quadric curves can be established globally and the reconstruction can be performed by solving three one variable quadric equations. The experiment results show that the algorithm is robust and can be implemented in real time.

Related Articles | Metrics
Power System Faults Detection Based on Singularity  Detection of Wavelet
L Yong-zhen
J4. 2009, 27 (02):  156. 
Abstract ( 307 )  

More  generators and EHV(Extra High Voltage) transmission systems are put into operation in power systems which leads to many new situations, such as the lengthening transmission distance,the heavier load,the increasing transient elements during the transient process.Based on the analysis of power system faults, the singularity detection theory based on wavelet analysis is applied to the power system faults detection, and a new fault detection is given. The simulation proves that it is a quick,correct and effective fault detection method, and its detection time less 0.4 ms.

Related Articles | Metrics
Synchronous Data Acquisition Technique of Hybrid-Source Magnetotelluric Receiving System
WAN Yun-xia,CHENG De-fu,WANG Yan-zhang,LU Hao
J4. 2009, 27 (02):  162. 
Abstract ( 270 )  

In the hybrid-source magnetotelluric detection, in order to make up the natural field whose frequency and power are lower, achieve the reception of the effective signal, a synchronous data acquisition approach based on GPS(Global Position System) was put forward by analyzing the operating principle of the transmitter and the receiver. The transmitter sends high-frequency electromagnetic waves as the manual source. With the orientation and timing of GPS, time calibration of the transmitter and the receiver was achieved. And the discrepancy of the two system clock was under 1 s to ensure the synchronous transmission of the signal. The experiment proved that the signal frequency range of the hybrid-source magnetotelluric detection expanded from 0.1 Hz~1 kHz to 0.1 Hz~50 kHz because of the complementation of the manual signal and the natural signal, and the detection depth of the instrument was deeper.

Related Articles | Metrics
Cooperative Location Scheme for 2D Wireless Sensor Networks
DU Qiao-ling,QIAN Zhi-hong,WANG Shu-xun
J4. 2009, 27 (02):  167. 
Abstract ( 429 )  

Accuracy of traditional methods for positioning the node under the low positioning accuracy problem, discussion and study of the WSN (Wireless Sensor Network) network node positioning accuracy problem, based on RSSI (Received Signal Strength Indicator) wireless sensor network positioning technology,by analyzing the two-dimensional location parameter estimation CRB (Cramr- Rao Bound) value, compared to traditional positioning methods and collaborative approach of the location estimate, put forward a set threshold of collaborative positioning methods. This method is some node positioning in the traditional manner, while some nodes in the collaborative approach of positioning. Matlab simulation results show that the positioning method can improve the positioning accuracy of network nodes.

Related Articles | Metrics
k-Anonymity via Twice Clustering for Privacy Preservation
LI Tai-yong, TANG Chang-jie, WU Jiang,ZHOU Min
J4. 2009, 27 (02):  173. 
Abstract ( 355 )  

k-anonymity is a current hot spot for privacy preservation. The existing k-anonymous methods ignored the quasi-identifiers different influences on the sensitive attributes and clustered the tuples only, which caused much information loss while publishing the data. To cope with this problem, a novel k-anonymity via twice clustering and the concept of influence matrix to express the quasi-identifiers influences on different sensitive attributes are proposed. The clustering techniques over influence matrix are investigated and the tuples with near influences on the sensitive attributes are clustered to achieve k-anonymity. The experimental results show that the proposed methods are effective and feasible to privacy preservation.Compared with basic k-anonymity, the methods have less average equivalence class size and less run time.

Related Articles | Metrics
Design and Performance Analysis of Topological Structure of Parallel Preprocessing Based on 2D-Mesh
LIU Zai-yue,GUO Yu-kun
J4. 2009, 27 (02):  179. 
Abstract ( 340 )  

Computing load of preprocessing of remote-sensing image is so large that completing calculation in real time becomes very difficult. For completing fast and effective preprocessing, by analyzing key parts of processing progresses, topological structure of parallel process is designed based on 2D-Mesh structure, and   processing performance is discussed.The design can improve the performance of preprocessing system to a large extent and improve the system sture ture of parallel of remote-sensing image.

Related Articles | Metrics
Application of Reinforcement Learning Based on Radial Basis Function Neural Networks in Robot Navigation
WU Hong-yan,LIU Shu-hua, ZHANG Yu
J4. 2009, 27 (02):  185. 
Abstract ( 410 )  

In a complex and continuous environment, Reinforcement Learning system will cause the dimensional disaster and generalization is often adopted to reduce the complexity of input space. Radial Basis Function Neural Networks (RBFNN:Radial Basis Function Neural Networks) has the function of strong approximation and generalization. Reinforcement Learning based on RBFNN is proposed,and it is used in the single-robot navigation. In the learning system, the state space and Q function are approximated by RBFNN.  Simulation results show that the proposed method improves the ability of robots collision avoidance so that the robot has better environment adaptability.

Related Articles | Metrics
Influencing Element of RBFNs Classification Performance
WANG Xiao-ru
J4. 2009, 27 (02):  191. 
Abstract ( 371 )  

Because the extensive application of RBFN(Radical Basis Function Network) in massage processing and pattern recognition, and to increase the classification precision and efficiency, we studied the influencing of radical basis function network spread and datas normalization. The rule curve of the influencing of radical basis function network spread, data normalization and the classification accuracy is presented, providing a instructional conclusion for the RBFNs apply in pattern recongnition.

Related Articles | Metrics
Personalized Study\|Based CAI Courseware System
WANG Li-feng,LIU Peng-yuan,ZHANG Yun-chun,YOU Tian-shu, YAN You-lai
J4. 2009, 27 (02):  195. 
Abstract ( 346 )  

To improve the quality and effect of CAI (Computer Assisted Instruct) courseware system, compared with the traditional CAI courseware system,the network-based CAI courseware system has its advantages and disadvantages.A hierarchical level-generate algorithm is proposed, based on the data mining theory, to cope with its disadvantages by building a CAI courseware tree and organizing the whole courseware objects into a reasonable structure. By doing this, the system can provide the student with personalized service. But this algorithm overlooked the students. Thus, mining on students were considered. Using Hamming distance theory, students were clustered into different groups based on the courseware they accessed. The performance is greatly improved.

Related Articles | Metrics
Component Library Description and Retrieval Strategy
Xiao-peng,FENG Zi-jun,LAN Li-hui|ZHANG Dian-bo
J4. 2009, 27 (02):  201. 
Abstract ( 284 )  

For the effective management of software components that have been developed,it gives a description and retrieval strategy of the component library. Based on good structure and complete description of components, a method is proposed, which can improve the efficiency of the use of component library by proper retrieval technology integrated with structured query language. It can speed up and optining the construction work of component library by taking the appropriate description of the components and retrieval strategy in different soft reuse environment.

Related Articles | Metrics
Application of New Ethernet Controller on DSP
LIU Bao-xiang
J4. 2009, 27 (02):  205. 
Abstract ( 298 )  

The Ethernet controller is designed with DSP(Digital Signal Processor) chip and NIC (Network Interface Controller)chip ENC28J60.We introduce the features of stand alone ethernet controller ENC28J60 with SPI(Serial Peripheral Interface) interface and the hardware design of external interface circuit. The embedded TCP/IP systems choice is analyzed. The process by which DSP chip controls NIC and the embedded TCP/IP protocol processing the data are discussed. The data can be processed according to network protocol, so the transmission of the data through Ethernet is realized.

Related Articles | Metrics
Trust Model for P2P Networks Based on Relationship Set
LIU Yan-ling , BAI Bao-xing,WANG Da-dong,YAO Jian-sheng
J4. 2009, 27 (02):  210. 
Abstract ( 282 )  

For the sake of the problems that existed in P2P(Peer to Peer) networks,a trust model for P2P networks based on relationship set is proposed. RSTM(Relationship Set Trust Model)  uses the relationship set,chooses nodes randomly, makes recommendation of the nodes which gives respond information. RSTM carries evaluation through the nodes which offers services, there are some punitive measures to the malicious nodes. It has been proved through experiments. RSTM can eliminate most of the malicious nodes and prevent the collective deceive of them effectively. In addition, the proposed model evaluates the nodes roundly under the circumstance of minishing the search area.The security and reliability in P2P networks are improved effectively.

Related Articles | Metrics
Jilin Province Development Information Current Situation and Countermeasures
LIU Dong-liang,WANG Shou-ning,PANG Hai-yan
J4. 2009, 27 (02):  215. 
Abstract ( 320 )  

To address the uneven development information of Jilin province, information relative unreasonable industrial structure, high-quality personnel information relative lack of serious issues such as the brain drain. From the macro-control, introduction of technology, personnel training and set up a reasonable mechanism aspects. Solution to the development of scientific information for development planning is proposed, giving full play to the government, enterprises, multi-faceted role of individuals, using information technology to enhance and transform traditional industries, achieving economic takeoff in Jilin province.

Related Articles | Metrics