Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080501
Interference is a big problem in RF area. The call setup will be fall, the handover will be fail, the throughput will be down. There are three ways to reject the interference: space division, time division, frequency division and code division. By now, the three methods are all used in the whole channel coding. This paper present one new method that only control channel uses the rejection methods and the whole channel can reject the interference. It will be easier to realize getting call setup success rate, handover success rate and more capacity, larger throughput.
{"title":"New interference rejection method in RF field","authors":"","doi":"10.23977/jeis.2023.080501","DOIUrl":"https://doi.org/10.23977/jeis.2023.080501","url":null,"abstract":"Interference is a big problem in RF area. The call setup will be fall, the handover will be fail, the throughput will be down. There are three ways to reject the interference: space division, time division, frequency division and code division. By now, the three methods are all used in the whole channel coding. This paper present one new method that only control channel uses the rejection methods and the whole channel can reject the interference. It will be easier to realize getting call setup success rate, handover success rate and more capacity, larger throughput.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135611049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080108
{"title":"Design of Reconfigurable Power Amplifier Based on Smith Chart Matching","authors":"","doi":"10.23977/jeis.2023.080108","DOIUrl":"https://doi.org/10.23977/jeis.2023.080108","url":null,"abstract":"","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080403
Information technology has triggered profound changes in modern warfare, and the Internet of Things is the inevitable direction of the development of air material security informationization. With the current problems such as low efficiency of air material support, untimeliness of accessing to support information and slow speed of response to support, this paper combines the development of information technology such as private cloud, Internet of Things and other information technology and the actual business needs of air material support. And the article achieves the overall design and demonstration of private cloud based on Internet of Things platform for air material support. On the basis of the existing network conditions, this paper plans the platform architecture and constructs private cloud service system, and consequently it achieves real-time perception, command and control, scientific decision-making of the whole process and elements of the activities of the air material support. The development of equipment guarantee informationization and the change of equipment guarantee mode are supported strongly.
{"title":"Research on the Application of Internet of Things Private Cloud Platform in Air Material Support","authors":"","doi":"10.23977/jeis.2023.080403","DOIUrl":"https://doi.org/10.23977/jeis.2023.080403","url":null,"abstract":"Information technology has triggered profound changes in modern warfare, and the Internet of Things is the inevitable direction of the development of air material security informationization. With the current problems such as low efficiency of air material support, untimeliness of accessing to support information and slow speed of response to support, this paper combines the development of information technology such as private cloud, Internet of Things and other information technology and the actual business needs of air material support. And the article achieves the overall design and demonstration of private cloud based on Internet of Things platform for air material support. On the basis of the existing network conditions, this paper plans the platform architecture and constructs private cloud service system, and consequently it achieves real-time perception, command and control, scientific decision-making of the whole process and elements of the activities of the air material support. The development of equipment guarantee informationization and the change of equipment guarantee mode are supported strongly.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135496866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080308
The adjustment measures include closing or opening new routes, but not adding new logistics sites. To achieve dynamic adjustment of the logistics network's route structure, including the closure or development of new routes, the aim is to minimize the number of routes affected by changes in cargo volume before and after the closure of DC9, while maintaining a balanced workload among the routes. Therefore, an Ant Colony Optimization (ACO) algorithm model is established, and MATLAB and SPSSPRO are utilized to solve the prepared table based on the ACO model. The obtained routes DC69→DC5, DC69→DC8, DC69→DC14, and DC69→DC62 have a cargo conformity rate of 97%, with an average route workload of around 7%. The remaining cargo across all routes is 11,280.7. This indicates that the overall results remain unaffected after deleting DC9 and adding the new route DC3→DC1, with no routes exceeding the required conformity, satisfying the practical requirements. Next, an evaluation is conducted to assess the importance of different logistics sites and routes within the network. Taking into account basic conditions, such as parcel quantities, transport frequencies, maximum transport capacities, transfer capacities, and other influencing factors, a TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) analysis model is constructed. The processed table is used to analyze the network's robustness, determining appropriate settings for processing and transport capacities. The objective is to reduce the overall operating costs of the network while ensuring a more balanced distribution of network workload.
调整措施包括关闭或开辟新的航线,但不增加新的物流站点。实现物流网络航线结构的动态调整,包括航线的关闭或新航线的开发,目的是尽量减少受DC9关闭前后货运量变化影响的航线数量,同时保持航线之间的工作量平衡。为此,建立了蚁群优化(Ant Colony Optimization, ACO)算法模型,并利用MATLAB和SPSSPRO对基于蚁群优化模型编制的表格进行求解。所得航线DC69→DC5、DC69→DC8、DC69→DC14、DC69→DC62的货物符合率为97%,平均航线负荷为7%左右。所有航线的剩余货物为11,280.7。说明删除DC9,添加新路由DC3→DC1后,整体结果没有影响,没有路由超过要求的符合性,满足实际需求。接下来,进行评估,以评估网络中不同物流地点和路线的重要性。考虑包裹数量、运输频率、最大运输能力、转运能力等基本条件影响因素,构建了TOPSIS (technical for Order of Preference by Similarity to Ideal Solution)分析模型。处理后的表用于分析网络的健壮性,确定处理和传输能力的适当设置。目标是降低网络的总体运营成本,同时确保更均衡地分配网络工作负载。
{"title":"Emergency Routing and Structural Optimization of E-commerce Logistics Network for Parcel Transportation Based on Multiple Models","authors":"","doi":"10.23977/jeis.2023.080308","DOIUrl":"https://doi.org/10.23977/jeis.2023.080308","url":null,"abstract":"The adjustment measures include closing or opening new routes, but not adding new logistics sites. To achieve dynamic adjustment of the logistics network's route structure, including the closure or development of new routes, the aim is to minimize the number of routes affected by changes in cargo volume before and after the closure of DC9, while maintaining a balanced workload among the routes. Therefore, an Ant Colony Optimization (ACO) algorithm model is established, and MATLAB and SPSSPRO are utilized to solve the prepared table based on the ACO model. The obtained routes DC69→DC5, DC69→DC8, DC69→DC14, and DC69→DC62 have a cargo conformity rate of 97%, with an average route workload of around 7%. The remaining cargo across all routes is 11,280.7. This indicates that the overall results remain unaffected after deleting DC9 and adding the new route DC3→DC1, with no routes exceeding the required conformity, satisfying the practical requirements. Next, an evaluation is conducted to assess the importance of different logistics sites and routes within the network. Taking into account basic conditions, such as parcel quantities, transport frequencies, maximum transport capacities, transfer capacities, and other influencing factors, a TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) analysis model is constructed. The processed table is used to analyze the network's robustness, determining appropriate settings for processing and transport capacities. The objective is to reduce the overall operating costs of the network while ensuring a more balanced distribution of network workload.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080101
{"title":"A Public Key Searchable Encryption Method Based on Multiple Keywords","authors":"","doi":"10.23977/jeis.2023.080101","DOIUrl":"https://doi.org/10.23977/jeis.2023.080101","url":null,"abstract":"","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080408
: As a product of the combination of computer network technology and database technology, distributed database system has the characteristics of independence and transparency, centralized node combination, replication transparency and easy expansion. However, due to its complex access structure, distributed database system naturally has a high demand for query optimization. This paper proposes a high-performance data processing method between distributed database and multi-core processors based on PSO (Particle Swarm Optimization) to solve the task scheduling problem between multi-core processors. Inertia weight is introduced, which is added to the speed of particle flight to adjust the global and local search ability of stationary particles. The research results show that this method reduces the error rate of database query, and the overall performance of database query method is better. The improved PSO algorithm improves the searching ability of particles by dynamically adjusting the inertia weight. Therefore, the improved PSO is a high-performance algorithm to solve the real-time task scheduling problem of multi-core processors.
{"title":"High performance data processing of distributed database and multi-core processor based on particle swarm optimization","authors":"","doi":"10.23977/jeis.2023.080408","DOIUrl":"https://doi.org/10.23977/jeis.2023.080408","url":null,"abstract":": As a product of the combination of computer network technology and database technology, distributed database system has the characteristics of independence and transparency, centralized node combination, replication transparency and easy expansion. However, due to its complex access structure, distributed database system naturally has a high demand for query optimization. This paper proposes a high-performance data processing method between distributed database and multi-core processors based on PSO (Particle Swarm Optimization) to solve the task scheduling problem between multi-core processors. Inertia weight is introduced, which is added to the speed of particle flight to adjust the global and local search ability of stationary particles. The research results show that this method reduces the error rate of database query, and the overall performance of database query method is better. The improved PSO algorithm improves the searching ability of particles by dynamically adjusting the inertia weight. Therefore, the improved PSO is a high-performance algorithm to solve the real-time task scheduling problem of multi-core processors.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134981113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080304
: With the development of the Internet, the era of BD (Big Data) is getting closer and closer. A country with mature BD has a future, and many enterprises cannot compete without BD. For example, BD can accurately position people's hobbies, the sales industry or service industry can use BD for precision marketing, and the development trend of BD includes data resource, data science, and the establishment of data alliances. Data science is a specialized discipline, a discipline born in the era of BD. It is at the intersection of statistics, machine learning and domain knowledge, and is an obvious interdisciplinary discipline. With the development of BD, data science must also develop with it. How data science develops and in which scenarios it can be applied remains to be studied. Through the research on BD and its development trend, and the theoretical research and analysis of data science, this paper aims to explore the specific application of data science, a new discipline, and practice it. Experiments have shown that applying data science to filtering spam and malware has a filtering rate of up to 95%. When applied to the sales industry, the predicted results are almost identical to the actual results. It has been confirmed that data science can collect, process, analyze data, and make predictive inferences. Data science can be applied to personalized content, navigation, and other scenarios that require prediction of results.
{"title":"Application Scenarios and Practice of Data Science in the Context of Big Data","authors":"","doi":"10.23977/jeis.2023.080304","DOIUrl":"https://doi.org/10.23977/jeis.2023.080304","url":null,"abstract":": With the development of the Internet, the era of BD (Big Data) is getting closer and closer. A country with mature BD has a future, and many enterprises cannot compete without BD. For example, BD can accurately position people's hobbies, the sales industry or service industry can use BD for precision marketing, and the development trend of BD includes data resource, data science, and the establishment of data alliances. Data science is a specialized discipline, a discipline born in the era of BD. It is at the intersection of statistics, machine learning and domain knowledge, and is an obvious interdisciplinary discipline. With the development of BD, data science must also develop with it. How data science develops and in which scenarios it can be applied remains to be studied. Through the research on BD and its development trend, and the theoretical research and analysis of data science, this paper aims to explore the specific application of data science, a new discipline, and practice it. Experiments have shown that applying data science to filtering spam and malware has a filtering rate of up to 95%. When applied to the sales industry, the predicted results are almost identical to the actual results. It has been confirmed that data science can collect, process, analyze data, and make predictive inferences. Data science can be applied to personalized content, navigation, and other scenarios that require prediction of results.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135496384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080103
{"title":"Application Research of Mind Mapping in Aerospace Military Project Management","authors":"","doi":"10.23977/jeis.2023.080103","DOIUrl":"https://doi.org/10.23977/jeis.2023.080103","url":null,"abstract":"","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080201
Li Ke
: This paper discusses the potential value of blockchain technology in the application of network security technology. Firstly, the challenges and problems faced by the current network security technology are analyzed. Then, combined with the advantages of blockchain technology, the specific application scenarios of blockchain technology in network security technology application are put forward, including identity authentication, data tamper prevention, secure communication and so on. Finally, the existing problems and development direction of blockchain technology in the application of network security technology are discussed. This paper aims to provide new ideas and methods for the research of network security technology application field.
{"title":"Application of Network Security Technology Based on Blockchain Technology","authors":"Li Ke","doi":"10.23977/jeis.2023.080201","DOIUrl":"https://doi.org/10.23977/jeis.2023.080201","url":null,"abstract":": This paper discusses the potential value of blockchain technology in the application of network security technology. Firstly, the challenges and problems faced by the current network security technology are analyzed. Then, combined with the advantages of blockchain technology, the specific application scenarios of blockchain technology in network security technology application are put forward, including identity authentication, data tamper prevention, secure communication and so on. Finally, the existing problems and development direction of blockchain technology in the application of network security technology are discussed. This paper aims to provide new ideas and methods for the research of network security technology application field.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080305
With the rapid growth of every aspect of our society, people's schedule is getting tighter and tighter. Thus, there is a will for the masses to spend less time on road and get the precise time consumption, in order to form a neat schedule with little time being wasted. What we want to construct is a program, which will return the minimized time consumption and the best route. This project centers on the mission of simulate the transport condition of any time and find a rout which costs minimize time to reach the destination. The time we are simulating is not only present, but also for the future. The project can be mainly divided into four parts, including data acquiring, data processing, map building, the usage and comparison of graph algorithms.
{"title":"A Path Simulator Focusing on Time Consumption-Based on the Transport Network and the Data of Public Traffic Vehicles in Shanghai","authors":"","doi":"10.23977/jeis.2023.080305","DOIUrl":"https://doi.org/10.23977/jeis.2023.080305","url":null,"abstract":"With the rapid growth of every aspect of our society, people's schedule is getting tighter and tighter. Thus, there is a will for the masses to spend less time on road and get the precise time consumption, in order to form a neat schedule with little time being wasted. What we want to construct is a program, which will return the minimized time consumption and the best route. This project centers on the mission of simulate the transport condition of any time and find a rout which costs minimize time to reach the destination. The time we are simulating is not only present, but also for the future. The project can be mainly divided into four parts, including data acquiring, data processing, map building, the usage and comparison of graph algorithms.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135496652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}