|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
October 2012 | Vol. 44 No.1 |
Title: |
ARABIC NAMED ENTITY RECOGNITION IN CRIME DOCUMENTS
|
Author: |
M. ASHAREF, N. OMAR, M. ALBARED |
Abstract: |
Named entity recognition (NER) systems aim to
automatically identify and classify the proper nouns in text. NER systems play a
significant role in many areas of Natural Language Processing (NLP) such as
question answering systems, text summarization and information retrieval. Unlike
previous Arabic NER systems which have been built to extract named entities from
general Arabic text, our task involves extracting named entities from crime
documents. Extracting named entities from crime text provides basic information
for crime analysis. This paper presents a rule-based approach to Arabic NER
system relevant to the crime domain. Based on morphological information,
predefined crime and general indicator lists and an Arabic named entity
annotation corpus from crime domain, several syntactical rules and patterns of
Arabic NER are induced and then formalized. Then, these rules and patterns are
applied to identify and classify named entities in Arabic crime text. The result
shows that the accuracy of our system is 90%, and this result indicates that the
method is effective and the performance of the achieved system is satisfactory. |
Keywords: |
Natural Language Processing, Named Entity Recognition, Arabic Crime Documents |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 001 - 006 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
ROUTING OPTIMIZATION FOR FORCES BASED ON TRAFFIC MATRIX |
Author: |
ZHOU MINHUI, WANG WEIMING, ZHOU JINGJING |
Abstract: |
The research of the ForCES technology has made a great
progress. However current research of ForCES mainly focuses on architecture and
techniques. In order to ensure ForCES architecture network works well, it is
significant to take account of routing optimization for ForCES architecture. In
this paper, we will introduce the minimizing sum of path-cost model based on
multiple traffic matrices to optimize the routing at FE sides in ForCES
architecture. At last, through simulation experiment we prove that it achieves
good results in routing optimization. |
Keywords: |
Forces, Traffic Matrix, Routing Optimization |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 007 - 011 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
PARALLEL COMPUTATION ALGORITHM FOR LUC CRYPTOSYSTEM BASED ON BINARY NUMBER |
Author: |
ZULKARNAIN MD ALI |
Abstract: |
LUC Cryptosystem is a public key cryptosystem based on Lucas
Function. It is first discussed by Smith and Lennon in 1993. They proposed a new
public key system using Lucas Function instead of using exponentiation based as
found in RSA. Lucas Function is the second order linear recurrence relation. The
computation of LUC Cryptosystem is based on the computation of Lucas Function.
Many of the existing computation algorithms for Lucas Function are suitable for
one processor and there is no problem to design a computation algorithm for one
processor as the Lucas Function can be implemented directly into programming
codes. In this paper, the Binary Numbers will be used as a technique for
parallel computation algorithm. The encryption process using Ve(P,1)(mod N) to
get ciphertext, C from plaintext, P. While the decryption used Vd(C,1)(mod N) to
get P from C. Meanwhile N is the product of two relatively primes p and q. In
this case, the public key e (usually in decimal numbers) will be converted to
the Binary Numbers. Then, this number will be use in manipulating the Lucas
Functions properties such as V2n, V2n+1 and V2n-1 to find the fast computation
techniques for Lucas Functions. Both processes run on special distributed memory
multiprocessors machine known as Sun Fire V1280. The proposed techniques can
reduce a computation time for LUC Cryptosystem computation compare to the
computation algorithm for one processor. As a comparison, the computation time
for one processor and several numbers of processors are also included.
|
Keywords: |
LUC Cryptosystems, Parallel Algorithm, Binary Numbers, Lucas Functions,
Distributed Memory Multiprocessors Machine. |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 012 - 021 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
THE RESEARCH AND IMPLEMENTATION OF PERSONALIZED USER ATTRIBUTE MODEL FOR THE
ACCURATE RETRIEVAL |
Author: |
WU FEI, ZHANG DONGSONG, FU YU |
Abstract: |
This paper presents a domain-oriented user attribute model
for getting user personalized and real requirements on the field of the accurate
retrieval. Resource Distribution Matrix (RDM) and User’s Personalized Preference
Vector (UPPV) are created by analyzing the user feature and resource
characteristic on domain – specific condition. We then present a method to
improve the efficiency of the personalized accurate retrieval with the user
attribute model. Finally, the preliminary experiments with the prototype
indicated that there was an increase in the precision of individualized
resources retrieved as the model combines with Shanghai Education Resource
Library. |
Keywords: |
Accurate Retrieval, User Attribute Model, Personalized Character |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 022 - 028 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
DEPTH ESTIMATION FOR MOBILE ROBOT USING SINGLE OMNIDIRECTIONAL CAMERA SYSTEM |
Author: |
ZAKARIA EL KADMIRI, OMAR EL KADMIRI, LHOUSSAINE MASMOUDI |
Abstract: |
Described here is a new method for depth estimation using a
single omnidirectional visual sensor embedded on an autonomous mobile robot.
This work is part of an on-going research project to study the visual guidance
of autonomous robots. The method is based on a vertically aligned omnistereo
configuration and laws of reflection applied on a geometric optics field. The
proposed system yields a compact and cost-effective solution. Experimental
results are satisfactory. |
Keywords: |
Depth Estimation, Omnidirectional Vision, Catadioptric
Camera, Omnistereo, Mobile Robot |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 029 - 034 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
ON THE DESIGN OF THE CHARGE PUMP PLL IN VIDEO DECODER |
Author: |
DENG WEN-JUAN, LIU SHUBO, WANG SONG, CHEN JIAN, ZOU JIJUN |
Abstract: |
By adopting the 0.35μ2P4M 3.3V standard CMOS technology
created by SMIC company, this paper designs a kind of charge pump phase-locked
loop (CPPLL) circuit with mixed-signal structure. By improving the phase and
frequency detector (PFD), charge pump circuit (CPC), and oscillator circuit
design of the PLL circuit, the clock signal used in the video decoder chips can
have a more stable performance. The effective tracking range of PLL is 5 MHz ~
7.5 MHz, the locking output is 6.75 MHz during which the clock jitter is less
than 500 ps, the output waveform's duty circle is 50.1408%. |
Keywords: |
Charge Pump Phase-Locked Loop (CPPLL),Com Metal Oxide
Silicon(CMOS),Video Decoder,Phase And Frequency Detector(PFD) |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 035 - 039 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
SIMULATIONS AND MEASUREMENTS IN INDUSTRIAL BUILDING RESEARCH |
Author: |
DUŠAN KATUNSKÝ, MARTIN LOPUŠNIAK, MILOSLAV BAGOŇA, ERIKA
DOLNÍKOVÁ, JANKA KATUNSKÁ, MARIAN VERTAĽ |
Abstract: |
Buildings for industry and production are an integral part of
architecture. Buildings for light industry (IT, electricity, textile, etc.)
dominate currently in the area. People working in these buildings spend a
substantial part of the day stay in their internal environment. It is therefore
necessary to pay attention to the creation and evaluation of industrial
buildings. Faced with an evaluation of residential buildings or commercial
buildings, an evaluation of industrial buildings is significantly in the
background. This contribution presents some results from evaluation of internal
quality for industrial buildings. The article deals with physical parameter
analysis of indoor climate in large industrial space production halls
considering the effects and influence on internal environment in winter and
summer periods. The paper presents research results of a questionnaire
evaluation of building’s users themselves, results of daylighting evaluation, an
exterior walls moisture analysis, an analysis of energy requirements for
operation of industrial buildings, evaluation of overheating in the summer
periods and a research of window design aspect. To address these various issues
have been used in situ measurements, laboratory measurements and analysis using
computational simulations. The results showed that in the case of industrial
buildings may not be the procedures for the evaluation of residential or
commercial buildings properly. The results also showed that users' requirements
for indoor industrial buildings may differ from the requirements for residential
or commercial buildings. Based on the results it should be noted that designing
of industrial buildings as well as evaluating industrial buildings should be
paid attention and to create different evaluation criteria. |
Keywords: |
Industrial Building, Indoor Environment, Evaluation, Energy,
Simulation |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 040 - 050 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN INTEGRATED MODEL FOR STOCK PRICE PREDICTION BASED ON SVM AND ARMA |
Author: |
ZUOQUAN ZHANG, MENGGANG LI, RONGQUAN BAI |
Abstract: |
Changes in stock price will be influenced by many aspects of
factors. When we are predicting stock price, it is difficult to build a
determined mathematical model between stock prices and these complex factors.
This paper first utilizes SVM ( support vector machine) to build a stock price
prediction model. By fitting the prediction error sequence, we find the law
factors, which the prediction model could not include or failed to give
sufficient explanation, have a lasting influence on the stock price according to
the ARMA theory of the time series analysis. Through an analysis we can predict
the changes in the next step of this unexplained impact. Thus we revise the SVM
model in the previous step. And the final results are obtained. The empirical
analysis proves: SVM model has a high prediction accuracy to predict the stock
price. Moreover, after the ARMA error correction model is used, the prediction
accuracy is further improved. |
Keywords: |
Stock Price, SVM, ARMA |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 051 - 054 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
DESIGN AND REALIZATION OF AUTOMATIC EXCHANGE STATION FOR MOBILE ROBOT |
Author: |
HU DANDAN, WANG LEI, WANG MAN |
Abstract: |
An automatic exchange station of mobile robot is designed,
and the design method of the mechanical structure and control system are put
forward. The method of automatic exchanging battery is adopted, and the
switching device of turn-plate structure and push-pull device of orthogonal
mobile cantilevered structure are designed. The process of power exchanging is
realized by the Mealy automation. The experiment results show that the station
can exchange battery fast and efficiently, thus the power renewal time of the
robot is greatly reduced. |
Keywords: |
Automatic Power Exchange, Switching Device, Push-pull Device, Mealy Automation |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 055 - 059 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
A COMBINED MEAN-SHIFT ALGORITHM FOR VERTEBRA IMAGE SEGMENTATION |
Author: |
HAO WANG, XIAO-DONG KANG, LING-LING LIU |
Abstract: |
This paper is in order to improve the efficiency of image
segmentation and reduce the amount of user interaction, the mean shift algorithm
is proposed with a combination of segmentation methods applied to the vertebra
images. The image was pre-processed with the mean shift method and the region
graph was obtained instead of pixel graph, which could reduce dozen times edge
numbers in the graph. Furthermore, the edge-preserving property of mean shift
algorithm was used. The experimental results show that the proposed method
possesses nice properties of the mean shift and graph algorithm, so it is
efficient and accurate, and it also reduces user interaction. |
Keywords: |
Vertebra Image; Image Segmentation; Mean-shift Algorithm |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 060 - 063 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
SOFT SENSOR MODELING OF MILL LOAD BASED ON FEATURE SELECTION USING SYNERGY
INTERVAL PLS |
Author: |
LIJIE ZHAO, XUE FENG, DECHENG YUAN |
Abstract: |
Mill load is an important equipment index which is closely
related to operating efficiency, product quality and energy consumption of
grinding process. Due to high dimension and collinearity of spectral data, mill
load model has high complexity, poor interpretability and generalization. A soft
sensor modeling method of mill load parameters is proposed based on frequency
spectrum feature using Synergy Interval Partial Least-Squares Regression (SiPLS).
Based on the spectrum feature of the shell vibration or acoustic signal, three
soft sensor models of mill load, such as mineral to ball volume ratio, charge
volume ratio and pulp density are developed, respectively. The proposed method
is tested by the wet ball mill in the laboratory grinding process. The
experimental results have demonstrated the proposed method has higher accuracy
and better generalization performance than the full-spectrum model and iPLS
feature spectrum model, and the feature spectrum model based on the shell
vibration is superior to the acoustic feature spectrum model. |
Keywords: |
Ball Mill, Mill Load, Feature Selection, Synergy Interval
Partial Least Square |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 064 - 072 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
RESEARCH ON FUNCTION SURFACE RECONSTITUTION TECHNOLOGY IN THE GROWTH DESIGN
PROCESS |
Author: |
JINYONG YANG |
Abstract: |
The growth design is a new top-down design method for
mechanical product conceptual design based on the decomposition and
reconstruction of function surface. The reconstitution of function surface,
determining the number, the style and the relationship of function surface are
the key of conceptual structure in the process of growth design. It is the
constraint of the manufacturability of the part structure. Due to the lack of
the related knowledge, it is the barrier to improve the efficiency of the growth
design. The position relationship, the joint mode and manufacturability of
function surface are analyzed comprehensively in this paper. According to the
actual technical knowledge, the methodology of determining the position
relationship and joint mode concurrently is proposed. So manufacture technical
knowledge is introduced into the product conceptual design stage. It can improve
the efficiency of growth design process, and feasibility is proved by specific
case. |
Keywords: |
Function Surface, Growth Design, Concept Design, Design
Theory |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 073 - 077 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
DUALITY FOR NONDIFFERENTIABLE MULTIOBJECTIVE SEMI-INFINITE PROGRAMMING WITH
GENERALIZED CONVEXITY |
Author: |
XIAOYAN GAO |
Abstract: |
The purpose of this paper is to consider the Mond-Weir type
dual model for a class of non-smooth multiobjective semi-infinite programming
problem. In this work, we use generalization of convexity namely convexity and
Kuhn-Tucker constraint qualification, to prove new duality results for such
semi-infinite programming problem. Weak, strong and converse duality theorems
are derived. Some previous duality results for differentiable multiobjective
programming problems turn out to be special cases for the results described in
the paper. |
Keywords: |
Convex Functions, Semi-Infinite Programming, Efficient Solution |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 078 - 085 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
A WEB-BASED TOOLKIT FOR LARGE-SCALE ONTOLOGIES |
Author: |
Yuxin Mao |
Abstract: |
There is no doubt that those large-scale domain ontologies
are playing a critical role in building a large variety of semantic-based
systems. It’s important and urgent to share and reuse large-scale ontologies to
support semantic-based applications in a more efficient way. In this paper, we
propose a web-based toolkit for building and reusing large-scale ontologies. The
toolkit consists of a web-based ontology editor as well as a modulation-based
API for ontology reuse. The web-based ontology editor supports cooperative
online development of large-scale ontologies. It distinguishes itself from other
editors by an easy-to-use interface. A modulation-based API is implemented for
manipulating modulation from large-scale ontologies. It makes it possible to
extract frequently-used portions from large-scale ontologies and cache those
portions of knowledge in database for potential reuse. Moreover, we have
evaluated the performance of the toolkit by simulation and application. In
summary, the proposed toolkit is able to support building and reusing
large-scale ontologies. |
Keywords: |
Ontology, Web-based, Sub-Ontology, Reuse, Reasoning |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 086 - 091 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
SMOOTH SUPPORT VECTOR REGRESSION BASED ON MODIFICATION SPLINE INTERPOLATION |
Author: |
BIN REN, HUIJIE LIU, LEI YANG, LIANGLUN CHENG |
Abstract: |
Regression analysis is often formulated as an optimization
problem with squared loss functions. Facing the challenge of the selection of
the proper function class with polynomial smooth techniques applied to Support
Vector Regression models, this study takes three interplation points spline
interpolation technology and modification interpolation value to generate a new
polynomial smooth function in -insensitive support vector regression. The
experimental analysis shows that -function is better than -function and
-function in properties, and the approximation accuracy of the proposed smooth
function is three order of higher than that of classical -function. |
Keywords: |
Support Vector Regression, ε-insensitive Loss Function,
Smooth Polynomial Function, Modification Interpolation |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 092 - 100 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
ARTIFICIAL INTELLIGENCE TECHNOLOGY AND ITS APPLICATION PROSPECT IN MATERIALS
SCIENCE |
Author: |
LI-HUI ZOU, DEZHENG ZHANG |
Abstract: |
Artificial intelligence (AI) is an interdisciplinary research
and it has been widely spread into many specific domains. In this paper, data
engineering, knowledge engineering, innovation methodology and intelligent
application technology of AI are mainly presented and their prospects in
materials science are summarized after analyzing the intelligent service demands
in nowadays materials engineering. The work of this paper will be helpful for
new materials development and design and has reference value to the future
research directions in materials informatics. |
Keywords: |
Data Engineering; Knowledge Engineering; Technical Innovation
Method; New Materials Development and Design |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 101 - 105 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
MODEL AND SIMULATION OF INFORMATION DIFFUSION BASED ON NETWORK DIMENSION-FORCE |
Author: |
YIRUI DENG, XIAOFENG XU |
Abstract: |
The superiority dimension-forces which network has make
information diffusion in realistic space change in the nature through
information coupling. It means that information diffusion in realistic space is
no longer affected by geography, volume and time constraints. Under the
promoting of network dimension-force, the source information can reach any sink
fast and synchronously in broad spatial scope and accumulate information
instantaneously to surmount the threshold value of sink, and then realize the
diffusion distance willfully far, the quantity of information destination
willfully more, the diffusion effect obviously enhanced. In order to measure the
diffusion effect under the promoting of network dimension-force, on the basis of
the core idea of the network dimension-force theory, using for reference from
the Markov drift chain theory, this paper carries on the model construction and
simulation of information diffusion. This model attempts to describe
systematically and semantically the motion state of information diffusion from
the macro level, and the simulation results reveal the positive promoting role
of network dimension-force on information diffusion. |
Keywords: |
Network Dimension-force, Information Diffusion, Space-time Model |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 106 - 116 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
A PROPOSED UNDER-VOLTAGE LOCKOUT OF COMPENSATED TEMPERATURE COEFFICIENT
THRESHOLD VOLTAGE WITHOUT COMPARATOR |
Author: |
HUANG XIAOZONG, SHI JIANGANG, LIU LINTAO, LUO JUN, HUANG WENGANG, HE ZHENGRONG |
Abstract: |
A proposed under-voltage lockout of compensated temperature
coefficient threshold voltage without comparator is presented in this paper. The
circuit achieves stability of threshold voltage without utilizing extra band gap
reference voltage source and voltage comparator. In the temperature range of
from -40℃ to +125℃, variation of only 30mV of the threshold voltage occurs. The
under-voltage lockout circuit is designed and simulated with standard CMOS
process with featured size of 0.6μm. |
Keywords: |
Under-voltage Lockout, Temperature Compensation, Band gap Reference |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 117 - 120 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
A WS-REWIRING EVOLVING MODEL OF SCALE-FREE NETWORK |
Author: |
QIN ZHANG, HUIWEN DONG, QIN WANG |
Abstract: |
Although the BA model mimics the growth and preferential
connectivity of the real-world networks, there are still some limitations. By
studying the small-world network model and the BA model, we propose a
WS-rewiring evolving model of scale-free networks in this paper. Comparing to BA
model, we found that the power-low tail of the degree distribution of the new
model has increased. |
Keywords: |
Scale-free Network, BA Model, the Small-word Network, Rewire |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 021 - 124 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
SHORT-TERM TRAFFIC FLOW PREDICTION BY A SUGENO FUZZY SYSTEM BASED ON GAUSSIAN
MIXTURE MODELS |
Author: |
YANG WANG, YANYAN CHEN |
Abstract: |
The short-term traffic flow prediction is of great importance
for traffic control and guidance. This paper presents an approach using a Sugeno
fuzzy inference system whose input space is participated by a Gaussian mixture
model and parameters are estimated by the least square estimation method. The
proposed approach was evaluated on a benchmark problem of the Mackey-Glass time
series and the collected traffic flow data via a comparison made with one of
well-known methods. The experimental results indicate the proposed method is
effective and competent. |
Keywords: |
Short-term Prediction; Traffic Flow; Fuzzy Inference System (FIS); Gaussian
Mixture Model (GMM); Expectation Maximization (EM) |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 125 - 130 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
A NEW METHOD FOR CHINESE TEXT CONTENT IDENTIFICATION |
Author: |
LI WEIWEI, ZHANG TAO, LIN WEIMIN, DENG SONG, SHI JIAN, WANG CHEN |
Abstract: |
This article designed and implemented a method to identify
the sensitive data in Chinese text. It can be used in data leakage prevention.
There are two main innovation of this paper. One innovation is a method of
preprocessing sensitive data based on statistical and the other is a method of
determining the threshold based on self-learning. Experiments prove that the
method is simple and practical. |
Keywords: |
Sensitive Data, Content Identification, Data Leakage Prevention |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 131 - 136 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
A NOVEL MODEL FOR THE TECHNICAL INNOVATION FACTORS EVOLUTION |
Author: |
CHAO ZHENG, YOUWEN YANG, DEYU YUAN |
Abstract: |
In recent years, evaluating the technical innovation activity
has gained a renewed interest in both growth economists and trade economists. An
evolution model of the technical innovation activity is proposed by applying
Kernel principal component analysis (KPCA) and the grey model in this paper. The
KPCA is used to features selection and grey model is used to evolution. The
proposed method is feasible and effective by the results, and it provides a
better forecast and estimate tool for the technical innovation activity. It also
provides a novel way for the evolution design of the other engineering |
Keywords: |
Kernel Principal Component Analysis, Features Selection, The Grey Model,
Evolution |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 137 - 140 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
STUDYING OF CLASSIFYING CHINESE SMS MESSAGES BASED ON BAYESIAN CLASSIFICATION |
Author: |
LI FENG, LI JIGANG |
Abstract: |
Although there are a lot of researches about e-mail spam
filters, only a few focus on the issue for SMS (Short Message Service) system,
especially in Chinese. In this paper, we proposed a two-layer filter model based
on Naïve Bayes classifier utilizing both some traditional filter rules and
content filter technical. The experimental results illustrate that the two-layer
filter model can enhance the precision and efficiency of Bayesian classifier. |
Keywords: |
Naïve Bayesian; Bayesian classifier; Text classifier; SMS |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 141 - 146 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN APPROACH OF CORRECTING THE ERRORS IN THE VISION NAVIGATION SYSTEM FOR FIELD
ROBOT |
Author: |
ZHIBIN ZHANG, YONGSHENG SONG, HAIXU WANG, XIAOYAN REN |
Abstract: |
In the vision navigation system, the transformation from
image coordinates to world coordinates is the essential part for the autonomous
robot field based on crop rows detection using single camera. An approach of
correcting the errors of the vision system is proposed in this paper, which can
correct the errors of the target coordinates on the ground according to the
theory of the lens distortion and coordinate transformations, and furthermore,
the third-order B spline interpolation was used to improve the performance of
the vision navigation system for the field autonomous robot. The experiment was
implemented using the data obtained from the target board image, and the
experimental results show that the approach proposed in this paper is effective. |
Keywords: |
Lens Distortion, Coordinates Transformation, Vision
Navigation, Field Robot |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 147 - 152 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
Title: |
INTEGRATED OPTIMIZATION AND DEPLOYMENT MECHANISM OF INFORMATION RESOURCES IN
COMPLEX MANUFACTURING COLLABORATIVE LOGISTICS NETWORK |
Author: |
XIAOFENG XU, JINLOU ZHAO, YIRUI DENG |
Abstract: |
To achieve effective information resources integration of
complex manufacturing collaborative logistics network, it firstly must
understand the integration content and the specific steps of integration. Based
on this, the paper describes the related problems of optimization deployment
about information resources integration, and uses the Mutil-Agent technology
means to achieve information resource optimization deployment, finally, realizes
the ultimate goal of providing high-quality service levels. |
Keywords: |
Information Resource Integration, Deployment Mechanism, Collaborative Logistics
Network |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 153 - 160 Vol. 44. No. 1 -- 2012 |
Full
Text |
|
|
|