Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080407
The radio wave propagation characteristics of the wireless channel directly affect the transmission rate and transmission quality of the wireless communication system, so it is considered to be the basis of wireless communication system design. The mode of direct communication between vehicles belongs to the low delay sensitive communication type. Channel measurement is carried out under the condition that the link is blocked by other vehicles in the process of vehicle-to-vehicle communication, and the fading characteristics and delay characteristics of vehicle-to-vehicle occlusion are analyzed under different occlusion conditions. Then, a characterization method of channel time non-stationary characteristics in vehicle-to-vehicle communication is proposed, and the relationship between non-stationary characteristics and fading characteristics under vehicle occlusion is analyzed.
{"title":"Research on non-stationary characteristics under large-scale multi-antenna vehicle occlusion conditions","authors":"","doi":"10.23977/jeis.2023.080407","DOIUrl":"https://doi.org/10.23977/jeis.2023.080407","url":null,"abstract":"The radio wave propagation characteristics of the wireless channel directly affect the transmission rate and transmission quality of the wireless communication system, so it is considered to be the basis of wireless communication system design. The mode of direct communication between vehicles belongs to the low delay sensitive communication type. Channel measurement is carried out under the condition that the link is blocked by other vehicles in the process of vehicle-to-vehicle communication, and the fading characteristics and delay characteristics of vehicle-to-vehicle occlusion are analyzed under different occlusion conditions. Then, a characterization method of channel time non-stationary characteristics in vehicle-to-vehicle communication is proposed, and the relationship between non-stationary characteristics and fading characteristics under vehicle occlusion is analyzed.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135052877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080210
Li Ke
: With the rapid development of cloud computing technology, the problem of network information security has become increasingly prominent. This paper aims to study the network information security technology based on cloud computing environment, in order to improve the security and reliability of the network system. Firstly, the challenges and problems faced by network information security in cloud computing environment are analyzed, including data privacy protection, identity authentication, access control and so on. Then, the common network information security technologies, such as encryption algorithm, firewall and intrusion detection system, are introduced, and their applications in the cloud computing environment are discussed. Then, a network information security technology framework based on cloud computing is proposed, which comprehensively considers the characteristics of cloud computing and the requirements of network information security, and can effectively protect the network system in the cloud computing environment. The research results of this paper are of great significance for improving the level of network information security technology in cloud computing environment, and also have certain reference value for promoting the development and application of cloud computing technology.
{"title":"Network information security technology based on cloud computing environment","authors":"Li Ke","doi":"10.23977/jeis.2023.080210","DOIUrl":"https://doi.org/10.23977/jeis.2023.080210","url":null,"abstract":": With the rapid development of cloud computing technology, the problem of network information security has become increasingly prominent. This paper aims to study the network information security technology based on cloud computing environment, in order to improve the security and reliability of the network system. Firstly, the challenges and problems faced by network information security in cloud computing environment are analyzed, including data privacy protection, identity authentication, access control and so on. Then, the common network information security technologies, such as encryption algorithm, firewall and intrusion detection system, are introduced, and their applications in the cloud computing environment are discussed. Then, a network information security technology framework based on cloud computing is proposed, which comprehensively considers the characteristics of cloud computing and the requirements of network information security, and can effectively protect the network system in the cloud computing environment. The research results of this paper are of great significance for improving the level of network information security technology in cloud computing environment, and also have certain reference value for promoting the development and application of cloud computing technology.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080306
The technology of handwritten digit recognition has been widely applied in various situations and has significant practical significance. However, the morphological features of handwritten numbers are very complex, and achieving accurate recognition of handwritten numbers relies on efficient and accurate recognition techniques. This article proposes a residual convolutional network model to address the issues of inaccurate feature extraction and weak model generalization ability in convolutional neural networks. By introducing residual blocks into the network, the problem of vanishing and exploding network gradients is effectively eliminated. At the same time, the Batch Normalization and Dropout layers are introduced to accelerate the network training process and reduce the risk of overfitting. Finally, the k-fold cross validation method was used to select the optimal parameter configuration of the model. The experimental results show that residual convolutional neural networks have the characteristics of high recognition accuracy and strong model generalization ability.
{"title":"Research on Residual Convolutional Neural Network for Handwritten Digit Recognition","authors":"","doi":"10.23977/jeis.2023.080306","DOIUrl":"https://doi.org/10.23977/jeis.2023.080306","url":null,"abstract":"The technology of handwritten digit recognition has been widely applied in various situations and has significant practical significance. However, the morphological features of handwritten numbers are very complex, and achieving accurate recognition of handwritten numbers relies on efficient and accurate recognition techniques. This article proposes a residual convolutional network model to address the issues of inaccurate feature extraction and weak model generalization ability in convolutional neural networks. By introducing residual blocks into the network, the problem of vanishing and exploding network gradients is effectively eliminated. At the same time, the Batch Normalization and Dropout layers are introduced to accelerate the network training process and reduce the risk of overfitting. Finally, the k-fold cross validation method was used to select the optimal parameter configuration of the model. The experimental results show that residual convolutional neural networks have the characteristics of high recognition accuracy and strong model generalization ability.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.23977/jeis.2023.080307
High-speed passenger railway, referred to as "high-speed rail", is a very important mode of transportation in today's society, which have attracted social attention and have been widely studied by domestic and foreign railway industry researchers. However, the transportation capacity and transportation conditions of high-speed railways are closely related to locomotive types, traction power supply systems, and traffic information control. Among them, the traction power supply system is an important source of its energy, which ensures the normal operation of the locomotive, so it has very important research significance. This article first introduces the AT power supply mode used in today's high-speed railways. Then the power flow calculation method and principle are derived as the design of the software below will pave the way. At the end, a complete power flow calculation method is summarized and implemented on the Visual Studio platform using C# language. A power flow calculation software for the AT power supply system was established, inputting parameters such as voltage and current, using Newton-Raphson method to iteratively calculate, and the final result can be directly displayed in the software, or exported and saved with Excel. And after the test, the software can run well, and the calculation speed is relatively fast, the result is normal, within the error range, and basically meets the expected requirements.
{"title":"Design of Software for Calculating Tidal Currents in AT Power Supply Systems","authors":"","doi":"10.23977/jeis.2023.080307","DOIUrl":"https://doi.org/10.23977/jeis.2023.080307","url":null,"abstract":"High-speed passenger railway, referred to as \"high-speed rail\", is a very important mode of transportation in today's society, which have attracted social attention and have been widely studied by domestic and foreign railway industry researchers. However, the transportation capacity and transportation conditions of high-speed railways are closely related to locomotive types, traction power supply systems, and traffic information control. Among them, the traction power supply system is an important source of its energy, which ensures the normal operation of the locomotive, so it has very important research significance. This article first introduces the AT power supply mode used in today's high-speed railways. Then the power flow calculation method and principle are derived as the design of the software below will pave the way. At the end, a complete power flow calculation method is summarized and implemented on the Visual Studio platform using C# language. A power flow calculation software for the AT power supply system was established, inputting parameters such as voltage and current, using Newton-Raphson method to iteratively calculate, and the final result can be directly displayed in the software, or exported and saved with Excel. And after the test, the software can run well, and the calculation speed is relatively fast, the result is normal, within the error range, and basically meets the expected requirements.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.23977/jeis.2022.070402
Wenqian Song, Yichuan Hao
: With the complexity of aircraft systems, fault diagnosis was getting more and more difficult. The combination of different methods achieved improvement and becomes a tendency of research. Since rough set theory can effectively simplify information, combine rough set theory with neural networks, use the method of the improved attribute reduction algorithm which based on discernibility matrix to simplify the input information. Then improve the convergence of the network and efficiency of the whole data fusion system. The effectiveness of this method was verified by aircraft fault diagnosis test.
{"title":"Application of rough set-neural networks in civil aviation aircraft fault data processing","authors":"Wenqian Song, Yichuan Hao","doi":"10.23977/jeis.2022.070402","DOIUrl":"https://doi.org/10.23977/jeis.2022.070402","url":null,"abstract":": With the complexity of aircraft systems, fault diagnosis was getting more and more difficult. The combination of different methods achieved improvement and becomes a tendency of research. Since rough set theory can effectively simplify information, combine rough set theory with neural networks, use the method of the improved attribute reduction algorithm which based on discernibility matrix to simplify the input information. Then improve the convergence of the network and efficiency of the whole data fusion system. The effectiveness of this method was verified by aircraft fault diagnosis test.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.23977/jeis.2022.070302
Xuan Jia
: This article is concerned with the security control problem for discrete-time cyber-physical systems with both distributed state delay and time-varying input delay under false data injection attacks. Firstly, by introducing mixed delay and network attack, a polyhedron model is proposed to describe the nonlinear input caused by cyber attacks. Secondly, combined with a piecewise Lyapunov functional and some summation inequalities, sufficient conditions for the exponential stability of the closed-loop system are derived by using linear matrix inequality approach, and the design process of the security controller is given. Finally, an illustrative example is given to demonstrate the effectiveness of the proposed method.
{"title":"Security Control of Cyber-Physical Systems with Cyber Attacks and Mixed Time-Delays","authors":"Xuan Jia","doi":"10.23977/jeis.2022.070302","DOIUrl":"https://doi.org/10.23977/jeis.2022.070302","url":null,"abstract":": This article is concerned with the security control problem for discrete-time cyber-physical systems with both distributed state delay and time-varying input delay under false data injection attacks. Firstly, by introducing mixed delay and network attack, a polyhedron model is proposed to describe the nonlinear input caused by cyber attacks. Secondly, combined with a piecewise Lyapunov functional and some summation inequalities, sufficient conditions for the exponential stability of the closed-loop system are derived by using linear matrix inequality approach, and the design process of the security controller is given. Finally, an illustrative example is given to demonstrate the effectiveness of the proposed method.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.23977/jeis.2022.070306
Yazhou Zhang
: Vibration signals of rolling bearings are affected by changing operating conditions and environmental noise, so they are characterized by a high degree of complexity. Although deep learning fault diagnosis methods have achieved considerable success in practical applications, the high complexity characteristics are ignored. To address this issue, we propose a dual attention module and convolutional neural network (DAM-CNN) for rolling bearing fault diagnosis. In this method, we designed a dual-attention module (DAM) by using a channel-attention module and a spatial-attention module. DAM can recode feature information in channel and spatial dimensions, so as to achieve adaptive enhancement of effective network information and suppression of interference information. In addition, to enhance the extraction of long-range features of the convolutional network, we introduce the non-local feature extraction module. This module can significantly expand the perceptual field of convolutional operations and enhance the generalization ability of the network. By verifying the effectiveness of the method in CWRU datasets, the results show that the method in this paper not only has good noise immunity in strong noise environment, but also has high diagnostic accuracy and good generalization performance in different load condition domains.
{"title":"A dual attention module and convolutional neural network based bearing fault diagnosis","authors":"Yazhou Zhang","doi":"10.23977/jeis.2022.070306","DOIUrl":"https://doi.org/10.23977/jeis.2022.070306","url":null,"abstract":": Vibration signals of rolling bearings are affected by changing operating conditions and environmental noise, so they are characterized by a high degree of complexity. Although deep learning fault diagnosis methods have achieved considerable success in practical applications, the high complexity characteristics are ignored. To address this issue, we propose a dual attention module and convolutional neural network (DAM-CNN) for rolling bearing fault diagnosis. In this method, we designed a dual-attention module (DAM) by using a channel-attention module and a spatial-attention module. DAM can recode feature information in channel and spatial dimensions, so as to achieve adaptive enhancement of effective network information and suppression of interference information. In addition, to enhance the extraction of long-range features of the convolutional network, we introduce the non-local feature extraction module. This module can significantly expand the perceptual field of convolutional operations and enhance the generalization ability of the network. By verifying the effectiveness of the method in CWRU datasets, the results show that the method in this paper not only has good noise immunity in strong noise environment, but also has high diagnostic accuracy and good generalization performance in different load condition domains.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.23977/jeis.2022.070304
Jindai Qu, Yan Ji, Hongwei Guo, Shuang Hao
: With the continuous development of automotive intelligent technology, the production and manufacturing process is facing three main problems: 1) the vehicle function is gradually complicated, the number of file development is increasing, and the traditional vehicle electrical fault analysis is difficult; 2) the electrical test data is proliferating, and the requirements for message analysis and logic judgment technology are increasing; 3) the vehicle bus data is geometrically growing, and the complexity of data analysis is increasing and the cycle time is growing. The purpose of this paper is to study electrical data analysis in the context of intelligent diagnosis technology, build a set of electrical data analysis tools, use digital technology to assist manual data analysis, realize intelligent analysis of electrical system faults, and improve the fault analysis and diagnosis capability of electrical and electronic raw and manufacturing process.
{"title":"Research on Electrical Data Analysis Tool Based on Intelligent Diagnosis Technology","authors":"Jindai Qu, Yan Ji, Hongwei Guo, Shuang Hao","doi":"10.23977/jeis.2022.070304","DOIUrl":"https://doi.org/10.23977/jeis.2022.070304","url":null,"abstract":": With the continuous development of automotive intelligent technology, the production and manufacturing process is facing three main problems: 1) the vehicle function is gradually complicated, the number of file development is increasing, and the traditional vehicle electrical fault analysis is difficult; 2) the electrical test data is proliferating, and the requirements for message analysis and logic judgment technology are increasing; 3) the vehicle bus data is geometrically growing, and the complexity of data analysis is increasing and the cycle time is growing. The purpose of this paper is to study electrical data analysis in the context of intelligent diagnosis technology, build a set of electrical data analysis tools, use digital technology to assist manual data analysis, realize intelligent analysis of electrical system faults, and improve the fault analysis and diagnosis capability of electrical and electronic raw and manufacturing process.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.23977/jeis.2022.070101
P. Zhang
Based on the rolling horizon optimization strategy, the networked robust predictive control with medium access constraints and packet loss is studied. Firstly, considering the influence of network factors such as medium access constraints and packet loss, Markov jump rule and Bernoulli independent and identically distributed process are used to transform the network problem into the robust problem of networked control system. According to the established Markov jump system model and stability analysis, a robust predictive controller for networked control systems is designed by using linear matrix inequality (LMI) method, which makes the system asymptotically stable. Finally, a numerical example is given to verify the effectiveness of the proposed control method.Networked control system; medium access constraints; packet loss; robust predictive controller.
{"title":"Robust predictive Control for Networked Control Systems with Access Constraints","authors":"P. Zhang","doi":"10.23977/jeis.2022.070101","DOIUrl":"https://doi.org/10.23977/jeis.2022.070101","url":null,"abstract":"Based on the rolling horizon optimization strategy, the networked robust predictive control with medium access constraints and packet loss is studied. Firstly, considering the influence of network factors such as medium access constraints and packet loss, Markov jump rule and Bernoulli independent and identically distributed process are used to transform the network problem into the robust problem of networked control system. According to the established Markov jump system model and stability analysis, a robust predictive controller for networked control systems is designed by using linear matrix inequality (LMI) method, which makes the system asymptotically stable. Finally, a numerical example is given to verify the effectiveness of the proposed control method.Networked control system; medium access constraints; packet loss; robust predictive controller.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
: Highly required by distributed network operation, the clock synchronization technology is very important. The transmit time of synchronization packets should be stamped precisely in a clock synchronization system. Time stamping in the physical layer is necessary to obtain the time precisely. This paper introduces a general precision time stamping circuit based on 10Mb/s and 100Mb/s transmission. The circuit is designed and manufactured in 0.18μm CMOS technology supporting Precise Timing Protocol based on IEEE 1588. The circuit is verified by an experimental system. The test results show that the general precision time stamping circuit can mark the stamps for UDP/IPv4 Ethernet format in the physical layer. The circuit has an ability to mark a time stamp in less than 60μs.
{"title":"Implementation of a Circuit for Precise Time Stamping of Synchronous Message","authors":"Zhongyang Li, Jingxiang Xu, Hongwei He, Shizhen Wang, Xiaofei Kang, Jun-zheng Cao, Jing Zhang, Zhongyan Zhao, Long Zhang","doi":"10.23977/jeis.2022.070310","DOIUrl":"https://doi.org/10.23977/jeis.2022.070310","url":null,"abstract":": Highly required by distributed network operation, the clock synchronization technology is very important. The transmit time of synchronization packets should be stamped precisely in a clock synchronization system. Time stamping in the physical layer is necessary to obtain the time precisely. This paper introduces a general precision time stamping circuit based on 10Mb/s and 100Mb/s transmission. The circuit is designed and manufactured in 0.18μm CMOS technology supporting Precise Timing Protocol based on IEEE 1588. The circuit is verified by an experimental system. The test results show that the general precision time stamping circuit can mark the stamps for UDP/IPv4 Ethernet format in the physical layer. The circuit has an ability to mark a time stamp in less than 60μs.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}