Content of Information and communication in our journal

        Published in last 1 year |  In last 2 years |  In last 3 years |  All
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Fast Cooperative Spectrum Sensing Method Based on Improved Particle Swarm Optimization
    LIU Yaofeng,DENG Yu,SHU Ting,LEI Kejun
    Journal of Jishou University(Natural Sciences Edition)    DOI: 10.13438/j.cnki.jdzk.2018.04.006
    Extended Horspool Algorithm and Its Application in Square Hmong String Pattern Matching
    ZENG Lei,MO Liping,LIU Biyu,TANG Aobin,MO Chunwang,YIN Juan
    Journal of Jishou University(Natural Sciences Edition)    DOI: 10.13438/j.cnki.jdzk.2018.04.007
    Finite Element Analysis Based on Modeling in AutoCAD
    YANG Mingya,SUN Yuanyuan,YANG Yingjie
    Journal of Jishou University(Natural Sciences Edition)    DOI: 10.13438/j.cnki.jdzk.2018.04.008
    Near-End Crosstalk Failure Diagnosis and Elimination in Intelligent Wiring System
    ZHANG Zhenzhong
    Journal of Jishou University(Natural Sciences Edition)    DOI: 10.13438/j.cnki.jdzk.2018.04.009
    An Improved Blind Spectrum Sensing Algorithm Based on the Ratio of Eigenvalues of the Sample Covariance Matrix
    WANG Hanrui,HUANG Xiaoyu,JIANG Wei,ZHAI Fengyun,LEI Kejun
    Journal of Jishou University(Natural Sciences Edition)    DOI: 10.3969/j.cnki.jdxb.2017.06.009
    A Resource Allocation Algorithm of Variable-Service Interval-Based in HR-WPAN
    WEN Jiebin,LIAO Haizhou
    Journal of Jishou University(Natural Sciences Edition)    DOI: 10.3969/j.cnki.jdxb.2017.06.010
    Image Denoising Through a Modified LLT Model
    GUO Erdong,YANG Fenlin
    Journal of Jishou University(Natural Sciences Edition)    DOI: 10.3969/j.cnki.jdxb.2017.05.009
    An Improved Double Color Digital Image Watermarking Algorithm Based on DWT-SVD
    ZENG Linling
    Journal of Jishou University(Natural Sciences Edition)    DOI: 10.3969/j.cnki.jdxb.2017.05.010
    Design of Visual Door Security System Based on Mobile Phone APP
    WANG Chengcai, ZHAN Jie, HE Cong
    Journal of Jishou University(Natural Sciences Edition)    DOI: 10.3969/j.cnki.jdxb.2017.05.011
    Optimization of Stand-Alone Dedicated Control Channel
    TAN Yi
    Journal of Jishou University(Natural Sciences Edition)    DOI: 10.3969/j.cnki.jdxb.2017.05.012
    Design of UWB Patch Antenna with the Double Band-Notched Characteristics
    XI Zaifang,TANG Zhijun,ZENG Zhihao,ZHAN Jie
    Journal of Jishou University(Natural Sciences Edition)    DOI: 10.3969/j.cnki.jdxb.2017.04.009
    Prediction Models of Neural Network and Partial Least Squares for Wheat Scab
    ZHAO Chaoyue,ZHANG Youhua
    Journal of Jishou University(Natural Sciences Edition)    DOI: 10.3969/j.cnki.jdxb.2017.04.010
    Biological Cell Image Segmentation Based on PCNN
    ZHANG Xiao-Qin, YU Lie, LI Yi
    journal6    2014, 35 (1): 46-49.   DOI: 10.3969/j.issn.1007-2985.2014.01.011
    Abstract2608)      PDF(pc) (721KB)(1770)       Save
    Based on pulse coupled neural network (PCNN) model,the method for determining the parameters about the model of threshold θ,link power ω,iterative number of times N have been discussed.And the biological cell image segmentation has been investigated by means of maximum entropy and PCNN model,with the influence of various parameters on the quality of image segmentation analyzed.Results demonstrate that the greater the image entropy value is,the better the overall effect will be.
    Reference | Related Articles | Metrics | Comments0
    Research on Three-Dimensional Passive Ranging Method of Two Parameters
    SHANG Hai
    journal6    2014, 35 (1): 50-52.   DOI: 10.3969/j.issn.1007-2985.2014.01.012
    Abstract2168)      PDF(pc) (1500KB)(1581)       Save
    To guarantee the effectiveness of aircraft-to-ground-target ranging algorithm,one three-dimensional ranging method with two parameters is presented.Analysis of the method is discussed,and then the localization geometric dilution of precision is computed.Corresponding computer simulations have been done to prove the correctness and effectiveness of the method.
    Reference | Related Articles | Metrics | Comments0
    Optimal Algorithm of Edge Detection Based on Median and Mean Filter
    XU Qian, HUANG Guang-Ya
    journal6    2014, 35 (1): 53-57.   DOI: 10.3969/j.issn.1007-2985.2014.01.013
    Abstract2053)      PDF(pc) (3080KB)(2404)       Save
    Influenced by the uncertain factors such as viewing angle,scale,brightness,stains,vague,images in the acquisition process are usually distorted;subsequently,the image process with be affected.To reduce the distortion and to ensure the precision of edge detection,this paper put forwards  an optimized algorithm of combining median filter with mean filter for edge detection.Simulation results show that this algorithm can effectively suppress noise and improve the precision of image edge extraction.
    Reference | Related Articles | Metrics | Comments0
    QR Decomposition Based Method for the Computation of Lyapunov Exponent in Duffing Systems
    LIU Yao-Feng, YANG Xi, SHU Ting
    journal6    2014, 35 (1): 58-62.   DOI: 10.3969/j.issn.1007-2985.2014.01.014
    Abstract3369)      PDF(pc) (939KB)(2789)       Save
    In order to compute the Lyapunov exponent of Duffing system,this paper adopts a kind of classical method based on QR decomposition to calculate the Lyapunov exponent of Duffing system.According to the basic characteristics of the Lyapunov exponent,we presents a kind of Lyapunov exponent algorithm based on QR decomposition for the known Duffing system.By using software simulation,we know that the Duffing system Lyapunov exponent algorithm based on QR decomposition is correctness.
    Reference | Related Articles | Metrics | Comments0
    On k-Error Linear Complexity of pn-Periodic Sequences over GF(q)
    ZHOU Jian-Qin, OuYang-Kong-Li
    journal6    2013, 34 (6): 41-46.   DOI: 10.3969/j.issn.1007-2985.2013.06.012
    Abstract2297)      PDF(pc) (355KB)(1448)       Save
    Error linear complexity of periodic sequences is an important indicator of the stability of the key stream.First,the algorithm for computing the k-error linear complexity of a sequence with a period pn over GF(q) is rewritten,and an efficient algorithm for m-tight error linear complexity of this sequence is given.Secondly,a method is given for computing an error vector which gives the k-error linear complexity.Here p is an odd prime and q is a primitive root modulus p2.
    Reference | Related Articles | Metrics | Comments0
    Nighttime Motion Vehicle Detection Based on Self-Adaptive Character Choice
    ZHU Shao-Ping
    journal6    2013, 34 (6): 47-52.   DOI: 10.3969/j.issn.1007-2985.2013.06.013
    Abstract2293)      PDF(pc) (559KB)(1965)       Save
    According to the characteristics of the traffic environment at night,a method for nighttime motion vehicle detection based on self-adaptive character selection is presented in this paper.Firstly SIFT algorithm is used to extract the shape characteristic of the motion vehicle at night and obtain the feature vector by the integration of color and texture feature.And then Boosting algorithm and Genetic algorithm are used to obtain a set of fuzzy rules and regulations corresponding weights in the form of iterations and achieve self-adaptive feature selection by weighted voting decision to the most favorable characteristics of the detector.Finally the experimental results show that this method can deal well with complex situations at night,such as occlusion,illumination and background interference,maintain real-time vehicle detection in the choice of different self-adaptive characteristics to background information,and achieve the real-time and accuracy requirements of traffic intelligent monitoring system with strong robustness,which are tested in three different nighttime traffic scenarios.
    Reference | Related Articles | Metrics | Comments0
    Scientific Information Cooperation and Sharing in Xiangxi Region
    YANG Fan
    journal6    2013, 34 (6): 53-55.   DOI: 10.3969/j.issn.1007-2985.2013.06.014
    Abstract2168)      PDF(pc) (345KB)(1350)       Save
    Based on the construction of scientific information resources database of the Great Western Hunan Regio,we find out the restrict factors in scientific information cooperation and sharing by spot investigation and analyze the practicability.Meanwhile,the novel model of scientific information cooperation and sharing and effective operating mechanism are established to realize the maximum effeciency by construction of central platform identification and vitual private network (VPN).
    Reference | Related Articles | Metrics | Comments0
    Analysis and Prediction on the Chaotic Property of Traffic Flow Time Series
    LUO Yi
    journal6    2013, 34 (5): 60-65.   DOI: 10.3969/j.issn.1007-2985.2013.05.015
    Abstract2398)      PDF(pc) (452KB)(2136)       Save
    The real-teime and procise short-ferm traffic flow forecesting is the key factor for the realizing of traffic control and traffic guidance in the intelligent traffic system.Saturated correlation dimension method and mutual information method are used to calculate embedding dimension and delay time,and the traffic flow time series is reconstructed accordingly in phase space.Wolf method is used to calculate the largest Lyapunov exponent,and the power spectrum of traffic flow time series is analyzed.Results show that the traffic flow series is a chaotic sequence with noise.The prediction models based on BP neural networks and RBF neural networks are applied to pedict traffic flow time series,which shows that the two models both  have good prediction effects,with the former having higher prediction accuracy and quicker prediction speed.
    Reference | Related Articles | Metrics | Comments0
    Tree-Based Anti-Collision Algorithm Radio Frequency Identification System
    TIAN Wang-Lan, LI Meng-Xing, TAN Yue
    journal6    2013, 34 (5): 66-69.   DOI: 10.3969/j.issn.1007-2985.2013.05.016
    Abstract3231)      PDF(pc) (446KB)(1604)       Save
    The anti-collision algorithm is the key technology of radio frequency identification system to achieve multi-target recognition.To solve the problem of too many identification times and transmitted bits in some binary tree based schemes,a new tree-based anti-collision algorithm is proposed.The algorithm divides tags into several groups.Four query prefixes which consist of two bits are directly used to split tag set,and the backtrack strategy is adopted to reduce identification times.The simulation results show that the algorithm significantly improves the query times and the data transmission.
    Reference | Related Articles | Metrics | Comments0
    Prediction of Safety Distance of Antenna Electromagnetic Radiation in Mobile Communication Base Station
    ZHANG Ming-Hai
    journal6    2013, 34 (5): 70-73.   DOI: 10.3969/j.issn.1007-2985.2013.05.017
    Abstract2503)      PDF(pc) (1175KB)(2903)       Save
    With the social progress and the development of communication technology,the number of mobile communication base stations have continually increased in cities.Furthermore,the influence of their electromagnetic radiation on the surrounding environment has attracted  people's greater attention.In order to standardize the construction of the base station,and eliminate public's panic,the author studies the prediction of the safety distance of GSM900 mobile communication base station by theoretical and field measurement,the horizontal safety distance being 26 meters,while the vertical being 6 meters.
    Reference | Related Articles | Metrics | Comments0
    Pedestrian Segmentation Algorithm in Infrared Images Based on Frame Difference and Otsu
    ZHANG Shu-Zhen
    journal6    2013, 34 (4): 59-61.   DOI: 10.3969/j.issn.1007-2985.2013.03.013
    Abstract2540)      PDF(pc) (833KB)(1987)       Save
    The contrast between pedestrians and environment is low in infrared images,which will result in the problem of faulty segmentation.This paper puts forward a pedestrian segmentation algorithm in infrared images based on frame difference and Otsu.Firstly,two frames with a short time interval of an infrared video sequence are used to obtain a frame difference image,and Otsu method is applied to get some moving target regions in the frame difference image.Then,the reference frame is also segmented by Otsu method,and the seed pixels of target regions can be gained by multiplying the result of the frame difference image segmentation with the result of the reference frame segmentation.Finally,according to region connectivity of the segmentation image of the reference frame,pedestrian areas are determined.Experimental results show that the proposed algorithm can overcome the interference of the environment,has strong robustness,and can effectively realize pedestrian segmentation in the infrared image.
    Reference | Related Articles | Metrics | Comments0
    Construction of a SVM Learning Model in the Categorization Framework for CVE
    PENG Hua, MO Li-Ping, TANG Zan-Yu
    journal6    2013, 34 (4): 62-66.   DOI: 10.3969/j.issn.1007-2985.2013.03.014
    Abstract3190)      PDF(pc) (330KB)(1949)       Save
    In the categorization framework for CVE,this paper designs and constructs a learning model based on SVM,so that it can categorize the CVE according to the different taxonomic features.In the process of constructing a learning model based on SVM,first of all,the training data is generated according to the different taxonomic features in the several vulnerability databases,then a data fusion and cleansing process are designed to eliminate the inconsistencies of data,and finally the n-fold cross-validation method is used to evaluate the effect of the model.The learning model has been verified to have better performance of CVE classification.
    Reference | Related Articles | Metrics | Comments0
    Digital Watermarking Algorithm Based on Block SVD in Wavelet Domain
    YU Shuai-Zhen, YIN Shi-Shu, GAO Ling
    journal6    2013, 34 (2): 56-60.   DOI: 10.3969/j.issn.1007-2985.2013.02.012
    Abstract2483)      PDF(pc) (694KB)(1867)       Save
    According to the principles,characteristics and the advantages of the application of DWT and SVD theory in watermarking field,this paper presents a singular value decomposition of block-based watermarking technology in wavelet domain.The decomposition advantages of wavelet and singular value are made full use of.In accordance with the idea of carved blocks in JPEG program,wavelet transformation is firstly made to the host image.Then singular value decomposition is done to the low frequency parameters.The largest singular value of each block is selected to a new matrix to be embedded into water-mark information.Moreover,multiple extraction methods is presented to cope with various attacks.Experimental results show that the algorithm is robust enough to some  image degradation process.
    Reference | Related Articles | Metrics | Comments0
    Optimal Control of  Variable Air Volume  Systems
    DENG Xiao-Fei, HUANG Guang-Ya, SONG Zhi-Guo, ZHANG Yin-Xing
    journal6    2013, 34 (2): 61-63.   DOI: 10.3969/j.issn.1007-2985.2013.02.013
    Abstract2660)      PDF(pc) (352KB)(2124)       Save
    It is difficult to apply Variable Air Volume (VAV) air condition system for its complex control process,so constant air volume system is still widely used in China.In view of this situation,the optimal theoretical strategies of controlling the temperature of air supplied by VAV  air handling unit are  presented.Then Matlab simulation software is used to analyze the results.The simulation results show that this algorithm can better operate  with the lower energy consumption.
    Reference | Related Articles | Metrics | Comments0
    Power Management of Wireless Sensor Network Based on Network Coding
    LIANG Ping-Yuan, HUANG Guang-Ya, LU Zhi, XU Qian
    journal6    2013, 34 (1): 56-60.   DOI: 10.3969/j.issn.1007-2985.2013.01.014
    Abstract2446)      PDF(pc) (438KB)(2129)       Save
    Wireless sensor networks are often driven by batteries when they are used in gathering data or ubiquitous computing.Therefore,energy consumption is the key issue in designing wireless sensor network system.When network coding is applied,intermediate nodes may send out data packets that are linear by minimizing the number of transmissions required to communicate a given amount of information across the wireless sensor networks.The less the number of transmissions is,the less the energy consumption will be.The transmission process and the principle of saving energy in wireless sensor networks based on network coding are analyzed,and the energy efficienly of the proposed solution using network coding is compared with non-network coding solution.The results show that the transmission power can be reduced efficiently by network coding,and it will benefit the lifetime of wireless sensor networks.
    Reference | Related Articles | Metrics | Comments0
    Research on Adoption Model of Mobile Digital Library Services in Triple Play Environment
    ZHAN Wei, TANG Zhi-Jun
    journal6    2013, 34 (1): 61-65.   DOI: 10.3969/j.issn.1007-2985.2013.01.015
    Abstract2221)      PDF(pc) (394KB)(1582)       Save
    Aimed at the importance of mobile digital library services in triple play environment and based on the theory of extended technology acceptance model,an adoption model of mobile digital library service is proposed by analyzing the related factors of services adoption.The model is classified into three categories:interface characteristics,personal characteristics and system characteristics.The proposed model can assist libraries designing suitable mobile digital library services to meet the increasing information demand.
    Reference | Related Articles | Metrics | Comments0
    Construction  of a Categorization Framework for CVE Based on SVM
    PENG Hua, LI Zong-Shou
    journal6    2013, 34 (1): 66-71.   DOI: 10.3969/j.issn.1007-2985.2013.01.016
    Abstract3021)      PDF(pc) (442KB)(1972)       Save
    The CVE dictionary can not design effective defense strategies for clustered system’s vulnerabilities because of it’s lack of categorization and generalization capabilities.To address such shortcomings,this paper propose a CVE categorization framework called CVE Classifier,which can categorize CVEs according to various taxonomic features.CVE classifier automatically extract the training data from the associated vulnerability databases (including:BID,X-Force and Secunia) and builds learning models for taxonomic features based on it by using SVM.
    Reference | Related Articles | Metrics | Comments0
    Gradient  Image Fusion Algorithm Based on  B-Spline
    LIU Jun-Hua, LEI Chao-Yang
    journal6    2012, 33 (6): 61-65.   DOI: 10.3969/j.issn.1007-2985.2012.06.015
    Abstract2422)      PDF(pc) (1879KB)(1789)       Save
    Image fusion is widely used in target recognition,computer vision,medicine,remote sensing,image processing and many other fields.This paper proposes an image fusion method based on B-spline gradient.It first divides the source image into small blocks of 3×3 size,calculates separately the B-spline gradient for each sub-block,adds up the gradient modulus values,calculates the weight value of each sub-block gradient modulus value,multiplies each sub-block and respective weight value and obtains the fusion image sub-block.Simulation experiments and analysis show that this method is effective and has a better performance than traditional methods such as principal component analysis,wavelet transformation and the Laplacian pyramid.
    Reference | Related Articles | Metrics | Comments0
    Real-Valued Forth-Order Cumulant Slice DOA Algorithm
    HUANG Guang-Ya, DENG Xiao-Fei, LIANG Ping-Yuan
    journal6    2012, 33 (6): 66-69.   DOI: 10.3969/j.issn.1007-2985.2012.06.016
    Abstract2643)      PDF(pc) (339KB)(1393)       Save
    The forth-order cumulant slice  has the property of blindness to Gaussian noise which improves the performances of DOA estimation,but increases the computation at the same time.This paper studies the principle of using unitary transformation to rearrange the cumulant slice matrix,so as to reduce computation cost by real-valued computation.The simulation results confirm that the developed algorithm can remain the precision of estimation and achieve lower computation cost.
    Reference | Related Articles | Metrics | Comments0
WeChat e-book chaoxing Mobile QQ