|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
November 2012 | Vol. 45 No.1 |
Title: |
EXPERIMENTAL DESIGN OF CAPACITANCE REQUIRED FOR SELF-EXCITED INDUCTION GENERATOR |
Author: |
V. SANKARDOSS, S. P. SABBERWAL, K. RAJAMBAL |
Abstract: |
This paper presents the no-load practical synchronous speed characteristics of a
laboratory model induction machine of 120 W capacity. Critical, minimum and
maximum capacitance required for excitation are calculated from the no load
curve for voltage buildup, rated voltage and current respectively; at various
super synchronous speeds. A realistic model of the machine is presented on
Matlab/Simulink. Theoretical and practical results are compared for model
validation. |
Keywords: |
Excitation Capacitance, Magnetization Curve, Synchronous Speed Test,
Self-Excited Induction Generator, Wind Energy |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 001 - 008 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
THE IMPACT OF CONTROL OBJECTIVES OF INFORMATION AND RELATED TECHNOLOGY (COBIT)
DOMAIN ON INFORMATION CRITERIA AND INFORMATION TECHNOLOGY RESOURCES |
Author: |
MO'TAZ AMIN AL-SA'EED, SOUD M. AL-MAHAMID, RIZIK M. H. AL-SAYYED |
Abstract: |
This research paper proposes and empirically examines the impact of Control
Objectives of Information and related Technology (COBIT) domains on achieving
the information criteria and on information technology resources of information
systems to be considered reliable. This study aims mainly at answering the
question: “Does Control Objectives of Information and related Technology (COBIT)
domain have an impact on Information criteria and IT resources?” Questionnaires
were distributed to 38 Jordanian banks. Our results indicated that there is a
strong relationship between the three domains: planning and organization (PO),
acquisition and implementation (AI), delivery and supporting (DS) on information
technology resources (ITR) and people, information and application; where it is
weak with infrastructure. The relationship, however, between monitoring and
evaluation (ME) domain and people, application and infrastructure that is weak
and where it is supported with adequate information. Also, the four COBIT
domains: PO, AI, DS and ME have high impact on Information Technology Resources
(ITR) with respect to people, information, application and infrastructure. The
results indicated also that there is a strong relationship of PO on Information
Criteria (IC) and the variables: effectiveness, efficiency, confidentiality,
integrity, availability, compliance and reliability. For the AI domain, it was
found that there is a strong relationship between (AI) and compliance,
reliability and efficiency where there was found an average relationship along
with the remaining variables. We noticed a very strong relationship between the
(DS) domain and the seven variables. Moreover, the analysis indicated that the
(ME) domain has a very good relationship with effectiveness, integrity and
reliability; whereas an average relationship is noticed between the (ME) domain
and confidentiality, availability and compliance and a weak relationship between
the (ME) domain and efficiency. The four COBIT domains: PO, AI, DS and ME have
high impact on IC with respect to effectiveness, efficiency, confidentiality,
integrity, availability, compliance and reliability. |
Keywords: |
COBIT, Information Criteria, IT Resources, Control, Accounting Information
Systems, and IT Governance |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 009 - 018 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
OPTIMAL INITIAL CENTROID IN K-MEANS FOR CRIME TOPIC |
Author: |
MASNIZAH MOHD, QUSAY WALID BSOUL, NAZLENA MOHAMAD ALI, SHAHRUL AZMAN MOHD NOAH,
SAIDAH SAAD, NAZLIA OMAR, MOHD JUZAIDDIN AB. AZIZ |
Abstract: |
A wide number of different clustering method applications and their
effectiveness in crime topics have been examined in this paper. Several works
have investigated the optimal initial centroid of clustering crime topics. In
this paper, wehave compared the effectiveness of single pass clustering and
k-means in detecting crime topics and aiding in the identification of events or
crimes. We have also experimentedon enhanced k-means clustering, in order to
select the optimal initial centroid to be automatically compared with regular
k-means, to choose the initial centroid randomly. Based on the main findings of
this study, it was revealed that the experimental method, which was based on
k-means, was proved to be better and more effective than single pass clustering
in detecting and identifying events or crimes. For the initial number of
centroids, it was found that the proposed method was more effective when used in
selecting terms that were more than the number of topics, than when they were
less. However, the best result was obtained when choosing a number of topics
equal to the number of original topics. This implies that the optimal accuracy
of clustering is achieved when selecting a large number of documents that have
terms better than randomly chosen documents as a centroid. |
Keywords: |
Crime Clustering, Single Pass, K-Means, Crime Topic |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 019 - 026 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
A NOVEL TEXTURE-BASED ALGORITHM FOR LOCALIZING VEHICLE LICENSE PLATES |
Author: |
HINDE ANOUAL, SANAA EL FKIHI, ABDEILAH JILBAB, DRISS ABOUTAJDINE |
Abstract: |
License plates localization is an important task for the recognition of Vehicle
License Plates (VLP). To deal with this issue, a number of approaches have been
proposed. These include texture-based, morphology-based and boundary line-based
approaches. In this paper, we present a new texture-based algorithm to detect
and localize license plates in images. Yet, focus will be laid on Moroccan VLP.
Analysis has actually revealed that the proposed algorithm achieves high
accuracy in plate localization. For evaluation purposes, various images taken
from different distances and in different angles were used. The experimental
results show that our system can efficiently detect and localize the VLP in
images. Indeed, the recall/precision curve of the proposed method proves that
84.21% precision rate is obtained for recall rate value equals 80%, while the
value of the standard measure of quality is equal to 82.05%. |
Keywords: |
Text detection, Texture analysis, Descriptors, Vehicle License Plate
Localization (VLPL) |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 027 - 032 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
NONLINEAR 8/6 SWITCHED RELUCTANCE GENERATOR EXCITED BY PARTICULAR CONVERTER |
Author: |
F. MESSAI, M. MAKHLOUF, H. BENALLA |
Abstract: |
This paper describes a consideration of the excitation circuit of a switched
reluctance generator (SRG). The SRG is a doubly salient machine. It does not
contain any magnets or brushes, and the phases are completely independent. The
rotor is made of laminated iron and it does not have any winding. However, the
conventional excitation circuit of this machine is an asymmetry half bridge
converter (AHBC) whose configuration is complicated. In this paper, we present a
nonlinear modeling and simulation of a four phase double salient switched
reluctance generator (SRGDS 8/6) excited by a suppression resistor converter (SRC)
based on finite-element analysis (FEA) and Matlab/Simulink. |
Keywords: |
Switched Reluctance Generator. Finite-Element Method (FEM)
Analysis, Suppression Resistor Converter |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 033 - 037 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
THE RE-WINDER DRIVE SYSTEM DESIGN BASED ON COMMON DC BUS |
Author: |
WANG HONGYAN |
Abstract: |
According to the analysis of the common DC BUS control system about the
re-winder, and based on the common DC BUS system structure analysis foundation ,
which has realized a set of complete re-winder drive system through the hardware
disposition and the functional design, the paper describes that the system
changes the model of the former drive system from the construction, and uses the
selenium rectifier and inverter to realize module control, which restrains the
harmonic interference, simplifies the construction, economizes energy and
lessens money. The control system can meet the winder’s requirements of
stability and precision. |
Keywords: |
Common DC BUS, Re-winder, System Design, Performance Analysis |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 038 - 043 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
RESEARCH AND APPLICATION OF WIRELESS NETWORK EQUIPMENT IN COAL MINE GAS
MONITORING SYSTEM |
Author: |
HONGYU SUN, ZHIYI FANG, 1YAMIN LI, YANG YU, SIQI KONG AND YAO SUN |
Abstract: |
This paper presents a research which based on the protocol.802.11,which is a
universal standard put forward for each manufacturer. The advance of this
proposal not only guaranteed the data exchange of Wireless network of different
manufacturer but also provided guarantee on the application in various area.
Especially in recent years, home use wireless network provided chance of
application in various areas of devices which are based on 802.11 protocols.
This paper discussed the real time transfer technology of dangerous gas content
which based on 802.11 protocols and the composition and method of well wireless
network monitoring under the background of safety process for coal mine
production. In the end, this paper proposed a solution of multi-functional
monitoring system which composed of voice, image and data by using 802.11
protocols. |
Keywords: |
802.11 Protocol, Monitoring System, WIFI |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 044 - 048 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
RESEARCH OF DIFFERENT COLOUR MODEL OF COLOR CHARACTERISTIC IN DIGITAL IMAGE |
Author: |
WENGE CHEN,XUELIN HUANG |
Abstract: |
In this paper, using MATLAB and Photoshop to digital photos and all sorts of
color model of color characteristics are researched, and writes a small program
through the digital image processing software MATLAB。According to the number of
color information which reflects the same photo with different color model of
the three-dimensional spectrum. Using Photoshop histogram to verify the
practicality of three-dimensional spectra, which has certain value for handling
the digital original manuscript. |
Keywords: |
Color Model; Color Characteristics; Three-Dimensional Spectra; Digital Image;
Histogram |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 049 - 053 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
APPLICATION OF ABNORMAL ECG EARLY WARNING DATABASE OF CARDIAC REMOTE MONITORING
SYSTEM |
Author: |
CHEN SHOUQIANG, GAO HAIQING, BIAN XIAOYUAN,4YI YONGLI, CHEN YANQIANG |
Abstract: |
Objective: To study application value of abnormal ECG early warning database of
cardiac remote monitoring system. Methods:In the respect of clinical
application,6575 users wear iHolter, using CM1, CM5 dual channel recording and
the mode of automatically and quietly warning.We analyzed automatic alarm of ECG
data. At the same time,the application of abnormal ECG early warning database in
scientific research, teaching and other aspects was discussed. Results: In 6006
users for diagnosis of diseases, we found ECG abnormalities in 5882 cases,
including episodic atrial premature beats, frequent atrial premature beats,
occasional ventricular premature contractions, frequent ventricular premature
contractions, paroxysmal atrial tachycardia, paroxysmal atrial flutter,
paroxysmal atrial fibrillation, paroxysmal ventricular tachycardia, intermittent
preexcitation syndrome, asymptomatic myocardial ischemia, in which 23 cases were
found nothing in multiple routine ECG. By the automatic alarm recording, we
found paroxysmal ventricular tachycardia in 162 cases, frequent ventricular
premature contraction in 51 cases, obvious ST-T changes in 883 cases, fast
ventricular rate of atrial fibrillation in 25 cases, paroxysmal supraventricular
tachycardia in 129 cases, sinus arrest (maximum 6.03s) in 38 cases, and we all
timely called the patients themselves or their family members. In 438 cases of
operation care patients, we immediately proposed to suspend operation in 7 cases
of apparent ST-T changes, 6 cases of frequent ventricular premature contraction
and 6 cases of rapid ventricular rate with atrial fibrillation after receiving
the automatic alarm ECG. In 131 cases of pacemaker patients, automatic alarm
electrocardiogram showed paroxysmal atrial tachycardia in 7 cases, atrial
premature beats in 27 cases, ventricular premature contractions in 12 cases,
ST-T changes in 11 cases. Conclusion: Abnormal ECG early warning database of
cardiac remote monitoring system had a high application value in clinical,
scientific research , teaching, and other areas. |
Keywords: |
Cardiac Remote Monitoring System, Abnormal Electrocardiogram, Intensive Holter,
Database, Application |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 054 - 057 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
FAULT TEST DEVICE OF ELECTRICAL SYSTEM BASED ON EMBEDDED EQUIPMENT |
Author: |
XIONG YUN, YANG XIAOQIANG, DUAN ZHUANGZHI, LI NING |
Abstract: |
The electrical system of the construction machinery usually works on
circumstance of high temperature, serious vibration and shock, dust pollution as
well as electromagnetic interference, so the electrical system is very likely to
go wrong while compared with other systems, for example working attachment,
under chassis and so on. In view of this, an advanced fault test device, with
application of embedded equipment and virtual technology, is developed in this
work. The function and implementation of software are illustrated. The device is
composed of PDA, cradle and CF-bus data acquisition card. It can test and
diagnose the circuit and electronic component fault. Furthermore it stores the
data and upload data to server simultaneously for further diagnosis and
processing of repair and maintenance expert. The fault test device may be
utilized in fault diagnosis of electrical system and components of engineering
vehicles, subsequently improve the maintenance and diagnosis capability for the
electrical system. |
Keywords: |
Embedded Equipment, Virtual Instrumentation, Fault Diagnosis, Electrical System. |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 058 - 062 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
DIVIDING AND CLUSTERING ALGORITHMS OF MOVING OBJECTS IN RFID TRACING SYSTEM |
Author: |
KONGFA HU, XIANGQIAN XUE, JIANFEI GE, YAN SUN, LING CHEN |
Abstract: |
Trajectory clustering can predict moving trend of objects effectively. The
traditional trajectory clustering algorithms take moving trajectory of a whole
object as a research object, which will lose similar sub-trajectories. However,
in practical applications, such as in RFID system, the users may only focus on
some specific regions of trajectories. We propose PT-CLUS algorithms in this
paper, according to coarse-fine algorithm, which first dividing a trajectory
into a group of line segments and prunes by coarse-fine strategy, and then
searching cluster in the sub-trajectories by checking neighborhood region of
segments, using hierarchical clustering to accomplish the clustering of
sub-trajectories. Experiment result shows that PT-CLUS algorithm can find the
similar sub-trajectories from RFID trajectory database effectively. |
Keywords: |
Moving Objects; RFID; Line Segment; Sub-Trajectories; Clustering |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 063 - 066 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
P-SETS AND ITS APPLICATION IN THE UNKNOWN INFORMATION IDENTIFICATION |
Author: |
XIYAN SUN, XIDONG LIU, CHENGXIAN FAN |
Abstract: |
P-sets (Packet sets) is novel mathematics structure and model by introducing the
dynamic characteristics into the finite Cantor set X and improving it. P-sets is
a set pair composed of internal P-set (internal packet set ) and outer P-set
(outer packet set ), or is P-sets. Based on P-sets, some theorems are presented,
which are internal-dynamic reasoning and information deleted theorem,
outer-dynamic reasoning and information supplemented theorem, internal-outer
dynamic reasoning and information deleted-supplemented theorem and so on. By
using the results, the application of internal-dynamic reasoning in the unknown
information identification is given. P-sets is a novel model and method with
good application prospect in the intelligent information system. |
Keywords: |
P-Sets, Dynamic Reasoning, Information Deleted, Information Supplemented |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 067 - 071 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN IMPROVED APPROACH FOR GEARBOX CONDITION MONITORING BASED ON WAVELET-FRACTAL
ANALYSIS |
Author: |
WEIGUO HUANG, RONGFANG ZENG, ZHIYONG HE, PENG LI |
Abstract: |
This paper has classified the acceleration signals of different working states
of gearbox based on the wavelet-fractal analysis. Considering the similarity of
the power spectrums between bearing vibration signals and 1/f processes signals,
the principles based on wavelet-fractal analysis for gearbox fault diagnosis are
explored. The improved approach mainly includes three following steps: the
discrete wavelet transform (DWT) is first performed on vibration signals
gathered by accelerometer from gearbox to achieve a series of detailed signals
at different scales; the variances of multiscale detailed signals are then
calculated; finally, the improved approach slope features are estimated from the
slope of logarithmic variances. The presented features reveal an inherent
structure within the power spectra of vibration signals. The effectiveness of
the proposed feature was verified by experiment on gear wear diagnosis.
Experimental results show that the improved approach features have the merits of
high accuracy and stability in classifying different fault conditions of
gearbox, and thus are valuable for machine fault diagnosis. |
Keywords: |
Gearbox, Condition Monitoring, Wavelet-Fractal Analysis |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 072 - 076 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
HYBRID VARIABLES STRUCTURAL RELIABILITY MODEL BASED ON POSSIBILISTIC RELIABILITY
THEORY |
Author: |
QIANGFENG WANG, JIANJUN LI |
Abstract: |
In this paper, based on possibilistic reliability theory, the hybrid variables
structural reliability model, which includes fuzzy variables and interval
variables, is researched. The hybrid variables structural reliability model is
established based on possibilistic reliability theory. The analytical algorithms
of minimum fuzzy reliability index and maximum failure possibility degree in
hybrid variables structural reliability analysis are derived in detail. The
constraint conditions of hybrid variables structural reliability model are
analyzed. The reliability optimum design method of hybrid variables structure is
researched. By evaluation of hybrid variables structural reliability through
practical examples, it proved that, in the case of two uncertain variables
coexisting, the theory presented in this paper is feasible and effective. And
thus, it will have great significance in actual engineering, especially for
reliability design of complex structures. |
Keywords: |
Possibilistic Reliability, Hybrid Variables Structure, Interval Variable, Fuzzy
Variable |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 077 - 082 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
ERROR DISTINGUISH OF AIS BASED ON EVIDENCE COMBINATION |
Author: |
FENG MA, XIUMIN CHU, XINPING YAN, CHENGUANG LIU |
Abstract: |
The Automatic Identification System (AIS) is essential digital communication
equipment for maritime safety in inland rivers. The occasional error of GNSS
(Global Navigation Satellite System) devices in the AIS equipment will make the
terminal send fake dynamic information discontinuously, which needs to be
distinguished manually. With the help of the DSmT method, gathering and
qualifying the ships motion and lane characteristics, making mathematical models
of Dθ discernment frame, it is possible to develop the artificial intelligence.
And it is able to discriminate the abnormal messages to improve the reliability
of AIS data link. The method has been proved feasible and effective in both
simulation environment and field data processing. |
Keywords: |
DSmT Method, Automatic Identification System, Evidence Combination |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 083 - 090 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
ORTHOGONAL APPROXIMATELY HARMONIC PROJECTION FOR FACE RECOGNITION |
Author: |
XIA SUN, ZIQIANG WANG, LIJUN SUN |
Abstract: |
Face recognition has attracted growing attention for applications such as
identity authentication and human-computer interface. However, a major challenge
of face recognition is that the captured face image often lies in a
high-dimensional feature space. To overcome the curse of dimensionality problem
and improve the performance of face recognition, a novel manifold learning
algorithm called orthogonal approximately harmonic projection (OMMP) is proposed
in this paper. The OAHP algorithm is based on the harmonic projection (AHP) and
explicitly considers the local geometrical structure and cluster structure of
the face space. Meanwhile, the OAHP method can produce orthogonal basis vectors
to preserve the metric structure of face space, which greatly enhances the
discriminating power of the reduced lower-dimensional feature space.
Experimental results on three face databases show that the proposed OAHP
performs much better than related algorithms in terms of recognition rate. |
Keywords: |
Face Recognition, Orthogonal Approximately Harmonic Projection, Manifold
Learning |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 091 - 098 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
PUBLISH/SUBSCRIBE NETWORK INFRASTRUCTURE BASED ON WEB SERVICE NOTIFICATION |
Author: |
RUISHENG SHI, YANG ZHANG, BO CHENG, JUNLIANG CHEN |
Abstract: |
To accommodate real-time dynamic large scale service composition requirements,
Event-Driven Service Oriented Architecture (EDSOA) is introduced to solve the
shortcomings of Service Oriented Architecture (SOA). Our EDSOA service execution
platform is built on Web Service Notification based distributed topic-based
publish/subscribe infrastructure services. This paper presents our innovations
at system level on the design of publish/subscribe infrastructure service.
Several service systems are developed based on this platform. The platform
provides great flexibility and many advanced features for service development
and deployment. Through project practices, the platform was proved to simplify
the development work of service system significantly. |
Keywords: |
Topic-Based Publish/Subscribe, Distributed Event-Based System, Service
Computing, Web Service Notification, Routing |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 099 - 108 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
EFFECTS OF DESIGN PARAMETERS ON WIND SPEED FOR LARGE THREE-BLADED UPWIND
HORIZONTAL AXIS WIND TURBINE |
Author: |
ZHIGANG KONG, JIAN WANG, YIGANG KONG |
Abstract: |
For large three-bladed upwind horizontal axis wind turbine, the blade spatial
positions are different with the rotor running at the same time, and so, the
wind speed on the blade is variable due to wind shear and tower shadow. Some
specific design parameters such as rotor hub height, hub-height wind speed, wind
shear coefficient, radius of the rotor disk, tower radius and overhang distance
are taken into account in the wind speed model. Based on the model, the
influence of wind shear and tower shadow on wind speed for a two-megawatt wind
turbine is investigated. The experimental results show that due to the presence
of wind shear and tower shadow, not only the above parameters can make the value
of wind speed change remarkably, but also this influence is more and more
serious as wind turbine capacity increases. |
Keywords: |
Design Parameters, Tower Shadow, Wind Shear, Wind Speed, Wind Turbine |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 109 - 116 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN OPTIMUM ALGORITHM FOR CUT-OFF GRADE CALCULATION USING MULTISTAGE STOCHASTIC
PROGRAMMING |
Author: |
SHOUGUO LI, CHANG YANG |
Abstract: |
Cut-off grade is one of the very important technical and economic parameters,
which affects the economic and social efficiency in a mine enterprise. It is
also the basis of the deposits technical economy evaluation, feasibility study,
mining planning and design and the foundation of the decision-making in mining
investment. Thereby, cut-off grade optimization is one of the core contents and
therefore the key parameter in mine mining, management and decision. The
optimized determination of cut-off grade in mine mining involves complex
analysis and scientific calculation, which is tightly related to economic
management, ore dressing, mining, geology, applied mathematics and computer
knowledge subjects. In this paper, we modeled the cut-off grade optimization
problem as a multistage stochastic programming issue. In the proposed stochastic
programming model, each ore grade in a given ore body is a random variable
following a distribution. And a mathematical model for selecting an optimum
cut-off grade function was constructed, which aimed at the maximization of total
present value of an open pit. Experimental results show that the proposed
algorithm for cut-off grade optimization is efficiency. |
Keywords: |
Cut-off Grade, Optimization, Net Present Value, Stochastic Programming |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 117 - 122 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF A HIGH-SPEED DATA ACQUISITION TOMOGRAPHY SYSTEM |
Author: |
BIN CAI, BIN WANG |
Abstract: |
In order to implement online real-time non-destructive detection of turbine
fluid distribution and the internal operation of the rotating machinery, we
designed a high-speed data acquisition system based on PCI7300A and a high speed
microcontroller—UBICOM. It is also for a further goal of carrying on graphical
fault diagnosis and fault-tolerant control. This paper describes the system
structure and introduces the methods used to implement the system, as well as
the design concept and the principle of this program. The practical application
showed that the system can realize online real-time collection of tomography
projection data, and the acquisition speed can be up to 80M bit/s. Thus
non-destructive testing of a rotary mechanism with a high rotation speed of 5000
r / min could be achieved. |
Keywords: |
Non-Destructive Testing, Fault Diagnosis, Fault-Tolerant Control, Data
acquisition, Real Time |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 123 - 128 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF P2P TRUST MODEL BASED ON THE CLASSIC BAYESIAN
NETWORKS THEORY |
Author: |
XIAOHONG SHI, YANYI ZHANG |
Abstract: |
Based on Bayesian network theorem, the paper proposed the novel trust model of
P2P network named Trust-BT. The novel new Trust-BT model is based on the P2P
network nodes’ history of all types of transactions, prior experience, the use
of Bayesian statistical analysis methods calculate the global trust value of
every network node, select the node with high trust value node transactions. The
mathematical analysis and the simulation results are shown that the model can
effectively resist all kinds of malicious nodes attack, compared with the
classic trust model (i.e. Eigentrust) improve the successful transaction rate of
P2P network. |
Keywords: |
Transaction History, Bayesian Theorem, Posterior Probability Density, Hypothesis
Testing |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 129 - 135 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
ON-LINE PORTFOLIO SELECTION VIA MEAN REVERSION STRATEGY |
Author: |
LI GAO, WEIGUO ZHANG |
Abstract: |
This paper presents a novel adaptive algorithm using mean reversion strategy
without transaction cost. The antiocr algorithm only exploits the property of
“reversal to the mean” and its performance not only significantly depends on the
size of window but also fluctuates wildly according to the different size of
window. To overcome these limitations, this proposed algorithm is designed to
deal with the portfolio selection problem by fully exploiting both the price
momentum and the price reversal in Chinese stock markets. Equipped with several
parameters, the proposed mean reversion strategy can better track the changing
stock market. Extensive experiments on real stock data from Chinese markets
demonstrate the effectiveness of our strategies in comparison with the anticor
algorithm without knowledge of the investment duration. |
Keywords: |
Online Portfolio, Universal, Mean Reversion, Momentum, Reversal |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 136 - 143 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
SERIALLY CONCATENATED CODED M-ARY CONTINUOUS PHASE MODULATION WITH BIT-INTERLEAVER |
Author: |
ZHIJUN ZHANG, YUJIE YANG, XIANFANG WANG, XINTAO DUAN |
Abstract: |
This letter investigates a serially concatenated convolutional coded M-ary
continuous phase modulation (CPM). Using the decomposition model of a CPM
system, the soft-input-soft-output detectors for M-ary CPM is investigated in
detail. Based on these, the performance of bit-interleaved coded-modulation (BICM)
schemes is studied. Simulation results show that due to the presence of the
conversion between symbol and bit likelihoods, so to improve the BER performance
by the iterative scheme is no longer the best choice. In the case of the short
information frame and low signal-to-noise ratio region, the coded modulation
system based M-ary CPM can achieve better performance than coded M-ary QAM
system with the same spectral efficiency. The proposed system is bandwidth- and
power-efficient, and moreover it is able to against burst errors effectively. |
Keywords: |
Iterative Decoding, M-ary Continuous Phase Modulation (CPM),
Serial Concatenated Codes |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 144 - 148 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
SINE MOVABLE TEETH PROFILE EQUATION ESTABLISHMENT AND SIMULATION |
Author: |
XIANGYANG JIN, HETENG WANG, LILI ZHAO, YOUZHI ZHANG, YU SUN |
Abstract: |
The driving shaft as well as the tooth profile equation of the shell spatial
sine raceway has been established according to the spatial meshing theory. And
the tooth profile simulation has been also conducted. It is required to carry on
the force analysis on the single tooth and establish the spatial mechanical
model of the cylindrical sine movable teeth drive based on the deformation
compatibility conditions. At the same time, the principal curvatures of the
contact point between the sine raceway and the movable tooth have been
calculated and the distribution rules have been also analyzed. What’s more, the
spatial motion of movable teeth has been discussed and the formula of sliding
rate between the conjugate profiles has been given. And the influence of the
changes of structure parameters of movable teeth drive on the sliding rate has
been also qualitatively analyzed in this paper. |
Keywords: |
Tooth Profile Equation, Movable Teeth Drive, Conjugate
Profile, Spatial Meshing |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 149 - 153 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
NOVEL ACO BASED ON ENTROPY AND ITS APPLICATION IN ANALYSIS OF STRUCTURAL
RELIABILITY |
Author: |
YANCANG LI, CAHENGUANG BAN, SHUJING ZHOU, XIAOQIANG LI, ROUYA LI |
Abstract: |
In order to solve the premature convergence problem of the basic Ant Colony
Optimization algorithm and find an effective method for the calculation of
system reliability index of the structure, a promising modification with
changing index was proposed. The main idea of the modification is to measure the
uncertainty of the path selection and evolutional by using the average
information entropy self-adaptively. Simulation study and performance comparison
with other algorithms on Traveling Salesman Problem show that the improved
algorithm can converge at the global optimum with a high probability. Finally,
the algorithm was employed to the analysis of reliability of a structure,
results shows that the work provides a new approach for solving the
combinatorial optimization problems, especially the analysis of structural
reliability. |
Keywords: |
ACO, Modification, Entropy, TSP, Structural Reliability |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 154 - 159 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
A LIGHTWEIGHT COOPERATIVE DETECTION FRAMEWORK OF DDOS/DOS ATTACKS BASED ON
COUNTING BLOOM FILTER |
Author: |
CHUNYAN SHUAI, JIANHUI JIANG, XIN OUYANG |
Abstract: |
Detection and traceback of distributed denial of service (DDoS/DoS) attacks have
become a challenge for network security. In this paper, we propose a lightweight
cooperative detection framework (CCBFF) based on counting bloom filter to detect
and trace DDoS/DoS attack online. The CCBFF contains 2 counting bloom filters
CBF1 and CBF2. The CBF1 distinguishes different network connection topology of a
router by the "options" field of IP-V4, encodes the existing DDoS/DoS attacks
and all connected device's addresses and stored them. By querying the CBF1, the
CBF2 recognizes suspicious packets, accumulates them and sends out super alerts
to the victim. According to super alerts, the CCBFF at the victim-end recognize
DDoS/DoS attacks. The experiment results show that the CCBFF is effective in
detection and traceback different DDoS attacks. |
Keywords: |
Counting Bloom Filter, Attack Feature Code, Cooperative
Detection and Traceback Framework, DDOS/DOS Attack, Router Information Flag |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 160 - 167 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN IMPROVED BLIND WATERMARKING ALGORITHM FOR IMAGE BASED ON DWT DOMAIN |
Author: |
YINGLAN FANG, LIN TIAN |
Abstract: |
This paper has brought forward an improved blind watermarking algorithm based on
two-dimensional discrete wavelet transform. Watermarking applied binary image
which had direct testing result and special meaning as watermark. Before
embedded watermark, the watermarking image is pretreated by using Arnold
scrambling to improve its security. According to the human eyes visual
characteristic, it selected the watermark embedded position and improved its
concealment. The specific means handled the original image two-level DWT and
blocks DA sub-graph. Then it used scrambling watermarking values 0 and 1 as
control signal to deal with coefficients in each block. It has achieved the
watermarking information embedding. As the algorithm extracted watermark, it
only needed use the relevant key without the original image and it had more
practical value. Experimental results have showed that this algorithm had better
concealment and improved the robustness and efficiency. |
Keywords: |
DWT, Blind Watermarking, Concealment, Robustness |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 168 - 173 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
IMPROVED ARTIFICIAL FISH SWARM ALGORITHM AND ITS APPLICATION IN OPTIMAL DESIGN
OF TRUSS STRUCTURE |
Author: |
YANCANG LI, CHENGUANG BAN, SHUJING ZHOU, SHUANGHONG PENG, XIAOHAN ZHANG |
Abstract: |
To overcome the defects of Artificial Fish-Swarm Algorithm, an adaptive particle
swarm optimization was proposed. The new algorithm employs the inertia weight
adjustment strategy to dynamically adjust the idea of artificial fish's visual
and step on the basic artificial fish. The chaotic early initialization was
employed to improve the quality of group solutions of artificial fish. Then, it
was applied to the optimal design of truss structures in size. Engineering
practice and comparison with the other optimization algorithms show that the
algorithm has good convergence and stability. |
Keywords: |
Artificial Fish-Swarm Algorithm, Adaptive, Truss, Structure
Optimization, Chaos |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 174 - 178 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
ENSEMBLE MODELING OF MILL LOAD BASED ON EMPIRICAL MODE DECOMPOSITION AND PARTIAL
LEAST SQUARES |
Author: |
LIJIE ZHAO, JIAN TANG, WENGRONG ZHENG |
Abstract: |
Reliable measurements of ball mill load parameters and reorganization of the
operating statuses are the key factors for saving energy and optimization
control. Empirical mode decomposition (EMD) and partial least squares (PLS) are
used to analyze shell vibration signal and monitor mill load parameters of ball
mill. The shell vibration signal is decomposed into several intrinsic mode
functions (IMFs) adaptively. The power spectral density (PSD) of each IMF is
analyzed under different grinding conditions. A new index is defined to measure
the relative change of each IMF to original signal, which is also used to select
more informational IMFs. The ensemble PLS method is used to build soft-sensor
models based on frequency spectrum of the selected IMFs. Experimental results
show that ensemble soft-sensor model based on EMD and PLS can extract effective
features of shell vibration signal and monitor mill load effectively. |
Keywords: |
Parameters Estimation, Vibration Signal Analysis, Empirical
Mode Decomposition; Partial Least Squares, Ensemble Modeling |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 179 - 191 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
A NEW ONTOLOGY BASED ASSOCIATION RULES MINING ALGORITHM |
Author: |
PENG ZHU, FEI JIA |
Abstract: |
For traditional data mining techniques cannot be directly applied to the
semi-structured XML data mining problem, this paper proposes a novel ontology
and association rules based XML mining algorithm. The algorithm firstly
introduces the domain ontology and hash technology to improve the operation of
emerging frequent item sets and generating association rules, then uses a hash
table to store the domain ontology, and at last the algorithm transforms the
operation of the database into memory tree based on XML. Simulation results show
that the algorithm can effectively reduce the size of XML documents and the
association rules is easier to understand, so the advantages of the algorithm
are shown. |
Keywords: |
Ontology, Data Mining, XML, Association Rules |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 192 - 197 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
A COMPREHENSIVE ANALYSIS OF ATTACKS ON ONLINE PAYMENT SCHEMES |
Author: |
LINA ZHANG, WENBIN YAN |
Abstract: |
When payments are to be made over the Internet, security becomes critical. The
online banking system has become the preferred target of some attackers. To
maintain the clients’ trust and confidence in the security of the services, the
financial institutions and related research workers must identify how the
attackers damage the user’s account and develop methods to enhance the security
of the system. Based on analyzing the basic processes of online payment and the
mode of attacks, the security and general prevention techniques are discussed. A
complete analysis of the attack process in the transactions is given. In
addition, some secure schemes and corresponding system design strategies against
aggressive behaviors are proposed. This analysis and schemes are intended to be
useful for commercial banks to adopt or to improve their online banking systems. |
Keywords: |
Online Banking, Public Key Infrastructure, Cryptographic Service Provider, Smart
Card, Signature |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 198 - 204 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
NUMERICAL SIMULATION STUDY OF AIR DISTRIBUTION LAW OF AIR PRESSURE SYSTEM IN THE
MINE REFUGE CHAMBER |
Author: |
FANGWEI LI, LONGZHE JIN, ZINA ZHAN |
Abstract: |
During the mine disaster, the refuge chamber becomes a living space for persons
in distress, and it is an important topic to ensure the supply of oxygen in the
refuge space in the study of the environment control of refuge chamber and
survival support. Through the combination of RNG k-ε turbulence model,
finite-volume discretion method and SIMPLE algorithm, the three-dimensional
turbulence mathematics, physics models of refuge chamber air flow under air
pressure and oxygen supply conditions are established, and corresponding laws
are analyzed and the main parameters in environment control are determined,
providing a theoretical basis for the design and layout of the refuge chamber. |
Keywords: |
Refuge Chamber, Air Pressure, Oxygen Supply System; Air Distribution Law,
Numerical Simulation |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 205 - 211 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
APPLICATION OF BOILER-PREHEATER FUZZY COORDINATED CONTROL FOR CLINKER PLANT |
Author: |
XIANG ZHANG, JIDONG LU |
Abstract: |
A boiler-preheater fuzzy coordinated control system used in new type dry rotary
kiln and pure low temperature waste heat recovery power generation has been
presented in this paper. Heat of waste gas from cement kiln is recovered by the
power generation. Significantly, SP boiler of the power generation recovers heat
of the gas from kiln preheater. The temperature of the recovered gas from cement
kiln is continuous fluctuant because of severe condition of cement kiln. The
fluctuant temperature is unfavorable for power generation. For high efficiency
of systems in of cement kiln and waste heat power generation, development and
tests of the boiler-preheater fuzzy coordinated control system have been carried
out in a cement kiln plant adding low-temperature waste heat power generation in
Guangdong, China. The actual application result shown that the boiler-preheater
fuzzy coordinated controller is available and efficient. |
Keywords: |
Coordinated Control, Fuzzy Controller, Kiln Preheater, SP Boiler, Clinker |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 212 - 221 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN DIGITAL FILTER DESIGN SCHEME BASED ON MATRIX TRANSFORMATION |
Author: |
ZHANG L, ZHANG DAN, ZHANG WEIXI |
Abstract: |
This work discussed the design steps of digital filter and methods of
transformation from analog domain to digital domain. In order to use computer to
solve the problem of recursive function whose order is N, this work derivates a
transformed algorithm. The proposed scheme shifts system transformation to a
coefficient matrix and a variable matrix. This work explains how to fix
coefficient matrix and a variable matrix in detail. And at last, it takes
advantage of feasibility and validity of simulation algorithm to verify it. The
merits are as follows. First, it is very direct and it applies the calculation
between matrix and matrix. And second, it is very general, so no matter it is
from simulative low pass to digital low pass, or from simulative high pass to
digital high pass, or from simulative band pass to digital band pass, this
method can be used. Third, it is the fastest since there are fewest numbers of
calculations. |
Keywords: |
Bilinear Transform, Digital Filter, Matrix Algorithms, Z Transform |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 222 - 226 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
A USER INTERESTS MODEL BASED ON ONTOLOGY |
Author: |
CUNCUN WEI |
Abstract: |
In this paper, the personalized service on the basis of lack of semantic and the
strengths and weaknesses of the existing user model update mechanism, combined
with keyword-based user interest ontology semantic information-rich features,
design a classification knowledge base, combined with keywords and user interest
ontology concept representation. The model of the user's interest is divided
into short-term interests and long-term interest, and the two interested in
using different establishment and update mechanism. By constantly updating and
optimization model, the model can accurately reflect the characteristics of the
user's interest. Finally, the effectiveness of the method is verified by
experiments, experiments show that the model can improve the performance of user
interest modeling. |
Keywords: |
User Interests Model, Ontology, Semantic Concepts, Personalization, Long-Term
Interest, Short-Term Interest |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 227 - 231 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
A NEW DNA CRYPTOGRAM SCHEME BASED ON PCR TECHNOLOGY |
Author: |
YUNPENG ZHANG, DONGWEI ZHOU, LIU HE, YASIN HASAN KARANFIL, BOCHEN FU |
Abstract: |
In the condition of the traditional cryptogram which has been breached
successively, this paper mainly studies the current cryptography-DNA cryptogram.
Using biology question which has none solution in “if we don’t know the correct
primer situations from an unknown mixture of trying to isolate specific DNA of
DNA is quite difficult” as the safety of constructing DNA encryption algorithm.
Using the chaotic system which is constructed by using Logistic chaos mapping
and Henon chaos mapping to produce the pseudo-random to process the plaintext
and eliminate the statistical rule. Building the encryption algorithm, and
analyzing the DNA encryption algorithm based on PCR technology. And improve the
algorithm in the key space, security, and experiment. Doing exclusive or
operation between the binary code of plaintext, we can get the new code, and
then append the primers. By this way, we can increase the number of primers, and
the attackers can never get the plaintext unless he get all DNA chain with
information. In addition, it will lead the failure if the target DNA chain is
too long when doing the PCR amplification. In this encryption algorithm, the PCR
amplification can be successfully by dividing the binary code of plaintext into
many short sequences. This paper uses encryption examples to describe the whole
encryption algorithm, and then analyses the security and maneuverability of the
whole system. And then we get the whole system. |
Keywords: |
Information Security, DNA Cryptogram, Chaos, PC |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 232 - 238 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
DECISION MAKING IN INVESTING APPLICATION OF INTERVAL-PROMETHEE BASED ON THE
COMPOSITE WEIGHT |
Author: |
SHUANGHONG QU, HUA LI, YUNXIA PEI |
Abstract: |
This paper introduces the interval-PROMETHEE method based on the composite
weight to the decision making process of value investing. We use five
performance criteria to measure the growth potential of the firms. They are
represented by interval numbers from the real financial data. And the weights of
the five criteria are compounded through the information entropy and the
subjective method. The interval-PROMETHEE method is applied to rank all the
stocks in Shanghai Stocks Exchange. The portfolio with the top 10 stocks was
proven to have higher return than the top 20 stocks, and they all have higher
return than the Shanghai index which represents the average performance of the
Chinese stock market within the 22 month investment period. The empirical
research shows the effectiveness of this method in the investment decision
making. |
Keywords: |
Value Investing, Multi-Criteria Decision-Making, Interval-PROMETHEE;
Composite Weight |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 239 - 245 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
A RESTRICTED-SCOPE LOOKUP SERVICE IN PEER-TO-PEER NETWORK |
Author: |
JIANCHUN LI, JIANYONG LI, DAOYING HUANG, LIHUA SHI |
Abstract: |
Consistent hashing-based P2P networks, which scalability is indicated by
efficiency of query and maintenance cost, take the hashing algorithm as mapping
relation between the data and the identifier of every node in the network. By
analyzing some main characters in structured P2P network, we introduce the
Restricted Scope Lookup Service(RSLS)to divide the network into some less size
structured sub-systems, so as to limit the bound of routing message while keep
the scalability of network. The logical relationship among nodes in sub-system
is organized by the binary tree structure, in which some definitions and
qualities are proved, and the self-organizing algorithm and the routing
algorithm in sub-system are described too. Simulations have verified the cost of
routing algorithm and stability scaling logarithmically with the number of nodes
in sub-system. |
Keywords: |
P2P, Lookup Service, Structured Sub-Systems, Binary Tree |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 246 - 251 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
WHEELSET BEARING VIBRATION ANALYSIS BASED ON NONLINEAR DYNAMICAL METHOD |
Author: |
ZHAO ZHIHONG, LIU YONGQIANG |
Abstract: |
The wheelset bearing play an important role in train running safety. In this
paper, we introduce the nonlinear dynamical method to study the wheelset bearing
vibration signal. Based on the comparative studies of the phase graph and the
correlation dimension of the vibration signals under normal condition, outer
peeling fault condition and rolling element electric erosion fault condition,
the following conclusions are shown: (1) The dynamical behavior of the wheelset
bearing with fault is complicated than of the normal condition. (2) The
correlation dimension of wheelset bearing is different under normal, outer
peeling fault and rolling element electric erosion fault conditions. The
correlation dimension can be used in wheelset bearing health monitoring.
Therefore, it is quite reasonable to fault diagnosis of wheelset bearing to use
nonlinear dynamical method. |
Keywords: |
Nonlinear Dynamic, Phase Space, Correlation Dimension |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 252 - 256 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
CONVERTING CONCEPTUAL MODEL XUML TO XML SCHEMA |
Author: |
XUEMIN ZHANG |
Abstract: |
As XML has become the standard for representing structured and semi-structured
data on the Web, the methods for designing XML schemas is becoming more and more
important. At present, a new XML conceptual model - XUML has already been put
forward, but lacks the method of converting XML conceptual model to XML logical
model . In this paper, an approach is proposed which a conceptual model XUML is
converted to the XML Schema. Finally, a specific application example is
illustrated, which proves the method the effectiveness and practicality. |
Keywords: |
XML, XUML, XML Schema |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 257 - 264 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
APPLICATIONS OF LOCAL-RANGE NETWORK THEORY IN DESIGNED P2P ROUTING ALGORITHM |
Author: |
YUNXIA PEI, GUANGCHUN FU |
Abstract: |
Peer-to-peer file sharing has a great prospect, Peer-to-peer search problems
have become the academic focus of one of the research questions. Already
distributed P2P systems for the lack of caching mechanism unorganized navigation
capacity of the lack of global routing algorithm, is a disorderly search this
end, this paper proposes the modified key clustering algorithm, the routing
space the NT and ST layers of orderly search, from global perspective. Scalable
Key clustering algorithm, we learn from the Local-range field research, inserted
into the connector quick Link remote node in the routing table with a certain
probability, to shorten the average path length. Preliminary simulation results
have shown that the introduction of modified key clustering algorithm has better
search capacity and scalability than original algorithm. |
Keywords: |
Routing, Modified Key Clustering, Local-Range, Peer-to-Peer Network |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 265 - 272 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN ELECTRICAL MOTOR FAULT DETECTION SCHEME BASED ON IMPROVED GENETIC ALGORITHM
AND OPTIMAL NEURAL NETWORK |
Author: |
BIN REN, HUIJIE LIU, LEI YANG, LIANGLUN CHENG |
Abstract: |
With the development of Computer technology, data fusion and artificial
intelligence theories, there are many new solutions for motor fault diagnosis.
In terms of the motor fault characteristics, integrated diagnosis is implemented
to solve this problem in this article, which adopts an improved genetic
algorithm and optimizing neural network methods. That diagnosis method can not
only reduce the difficulty of fusion system optimization, but also simulate the
effect between different faults in coupling fault mode and achieve a precise
diagnosis result. The research of the motor fault monitoring and diagnosis
technology with this new method has the important theoretical value and
engineering practical significance. |
Keywords: |
Fault Diagnosis, Improved Genetic Algorithm, Neural Network |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 173 - 277 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
A MOTION CONTROL METHOD OF FOUR-WHEEL DRIVE OMNI-DIRECTIONAL MOBILE ROBOTS BASED
ON MULTI POINTS PREVIEW CONTROL |
Author: |
JIANPING CHEN, JIANBIN WANG, YIMIN YANG, QIJUN XIAO |
Abstract: |
Aiming at the problem that the traditional control methods can’t satisfactorily
complete the trajectory tracking task, so a multi point preview control method
based on automobile driving is designed for the motion control of four-wheel
drive omni-directional mobile robot. Lateral position error and curvature of
each preview point are calculated based on the robot’s lateral position error
model. Meanwhile, by considering the current position error and preview point’s
position error, a fuzzy controller is designed. The fuzzy controller adjusts the
lateral velocity and longitudinal velocity according to the preview information
of the different path conditions, so as to realize the expected trajectory
tracking. Experiment results show that the tracking errors of different paths
are obviously reduced, and the tracking precision is greatly improved , which
means the preview control method presented in this paper is effective. It can
realize fast track even when the tracking path varies a lot. |
Keywords: |
Omni-Directional Mobile Robot, Trajectory Tracking; Automobile Driving, Preview
Control, Fuzzy Control |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 278 - 284 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
INTEGRATED MODEL FOR PRODUCT QUALITY FORECASTING SYSTEM USING GREY THEORY AND
NEURAL NETWORK |
Author: |
JIHONG PANG, WEI XUE, HONGMING ZHOU, FENGPING LI |
Abstract: |
High-quality products are considered as one of the most important practices for
achieving success. However, it is really hard to predict and forecast the
product quality due to some undetermined parameters. In order to forecast
product quality from various aspects, we propose an integrated model of
utilizing grey theory and neural network. In this paper, the grey forecasting
model for product quality is established by applying grey theory. Grey model is
applied to compute an aggregated efficiency score based on the input and output
data. Since quantitative factors are difficult to mathematically manipulate when
forecasting the efficiency in neural network, a forecasting model is developed
for product quality based on grey neural network model. In addition, analytical
capability of the proposed method can reduce the number of training samples. In
our case, this approach is demonstrated on a real and complete dataset of 36
samples for product quality. Finally, an example is given to explain the use and
effectiveness of the proposed computational approach. As a result of this
research, grey neural network can now be adequately applied to forecast the
product quality. |
Keywords: |
Product Quality, Forecasting System, Grey Theory, Neural Network |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 285 - 291 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
FUZZY DYNAMIC CLUSTERING OF MOLD GRID RESOURCES BASED ON F-TEST |
Author: |
FANXIN KONG, HONGYAN HAO, JIANMIN ZUO |
Abstract: |
Fuzzy dynamic clustering algorithm of mold grid resources associated with the
total lifecycle of mold based on F-test was constructed in this paper. To
classify and establish mold manufacturing grid resources conveniently, this
paper divides mold grid resources into seven types. Generally time (T), quality
(Q), cost (C), service (S), reputation (R), liability (L) and environment (E)
are chosen to be evaluation criterion for mold grid resources, according to the
requirement of different manufacturing system. The weight of each index was
calculated with AHP, and then mold grid resources are clustered and identified
by fuzzy cluster method on the base of these. A reasonable classification number
by using F- test is found, and best resources classification is obtained and
similarity-based resources are clustered. Finally, simulation experiments are
carried out with specific application for mold grid resources classification.
The results show that the method is effective, and the paper applies fuzzy
cluster analysis to sort the gird resources reasonably. It can improve search
speed and utilization of mold grid resources, and the response time can be
decreased in resources selection. |
Keywords: |
Fuzzy Dynamic Clustering, F-test, Manufacturing Grid, Mold Grid Resources |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 292 - 296 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
MOTION TRAJECTORY PLANNING METHOD OF LANE CHANGE FOR INTELLIGENT VEHICLE |
Author: |
AIJUAN LI, SHUNMING LI, HUAN SHEN, XIAODONG MIAO, XIAO LI |
Abstract: |
The motion planning method of lane change for intelligent vehicle is an
important component in the autonomous vehicle field. In order to make the
intelligent vehicle drive on the urban environmental road smoothly when there is
a barrier in the front, a new curvature-continuous obstacle avoidance trajectory
planning method was introduced. The trajectory planning method based B-spline
curves and the convex hull property of the B-spline curves is used. The
effection of several nonholonomic constrained conditions is considered in this
method. The nonholonomic constraints include obstacle avoidance constraint,
curvature constraint, rotational speed constraint, speed constraint, state
constraint and so on. The intelligent vehicle’s lane change reference trajectory
is generated, the trajectory is collision-free and the curvature is continuous.
The intelligent vehicle’s lane change simulation experiment was done to test the
trajectory planning method. The result showed that the feasible trajectory can
be generated by use of this article’s method. The curvature of the trajectory is
continuous and every nonholonomic constraint condition was met. |
Keywords: |
Intelligent Vehicle, Motion Trajectory Planning, Continuous Curvature, Lane
Change, Β-spline Curve |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 297 - 302 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
EFFICIENT BELIEF PROPAGATION WITH CENSUS AND INTENSITY MEASURE |
Author: |
XIAOFENG WANG, HONGKE WANG |
Abstract: |
Stereo matching is one of the most active research areas in computer vision. In
this paper, a novel stereo matching is proposed that utilizes Census measure and
pixels-based intensity measure into data term of Belief Propagation algorithm.
Traditional data term of Belief Propagation lies on pixels-based intensity
measure, and its effect is not very well. We combine intensity and Census
algorithm into data term, run through Belief Propagation algorithm and acquire
more accurate results. This proposed method may be more exacter than traditional
BP algorithm. The experimental results demonstrate the superior performance of
our proposed method. |
Keywords: |
Stereo Matching, Belief Propagation, Markov Network, Census
Measure, Intensity |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 303 - 307 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
A TRAFFIC NETWORK DESIGN SCHEME BASED ON TRAVEL TIME RELIABILITY |
Author: |
LIANGZHI ZHANG, LEI JIA, CHANGHONG MEI |
Abstract: |
On the basis of travel time reliability, this paper puts forward the concepts of
absolute reliability and relative reliability to better assess road network;
simultaneously, regional traffic road network reliability formula is deducted
according to series and parallel connection of link, OD pair and road network.
Finally, a bi-level programming model is established to optimize road network.
The upper model, integrating travel resistance and travel time reliability in
the objective function, optimizes and chooses investable links and the lower
model guarantees stochastic user equilibrium. Both Monte Carlo Stochastic
Simulation based genetic algorithm and Frank-Wolfe algorithm are employed as
solutions. And Nguyen-Dupuis net work calculation sample shows different
investment has different effect on road network optimization. Even with the same
investment the effect is more remarkable in transition intervals than that of
peak and flat intervals. |
Keywords: |
Travel Time Reliability, Bi-Level Program, Road Network
Design, Relative Reliability |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 308 - 314 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
A RAPID CORN SORTING ALGORITHM BASED ON MACHINE VISION |
Author: |
JINGANG GAO, SHUANG ZHANG, YUZHUO MEN, HUA WANG |
Abstract: |
According to the defects of traditional contact corn measurement methods. Size
measurement systems based on CCD image are introduced. It can provide a
real-time, rapid, efficient and economic measurement approach. Firstly with CCD
camera image automatic acquisition, then photographed image of threshold
segmentation, namely binary processing. By Laplace operator again Gauss image
edge detection and the calculation of regional labeling, mark area, using area
feature parameters eliminate unwanted noise. Finally, according to the edge
profile features, we can use the gravity method such as the establishment of
corn length and diameter size calculation method, and compared with the size of
the classification standard. Using actual collection to corn image experiment,
the results show that the processing method is feasible, using a 1280 x 1024
pixel CCD camera, the cornfield sorting speed can reach 30ear/min. |
Keywords: |
CCD, Digital Image Processing, Edge Detection, Size Calculation |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 315 - 319 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
A SOLUTION TO DECISION MAKING UNDER UNCERTAINTY |
Author: |
XIAOGANG WU, RONGWEI DU |
Abstract: |
Decision-making under uncertainty is the problem with the least known
conditions, and also the most difficult problem to find the optimal solution. A.
Wald and his contemporary V. Nouma first associate the decision theory with the
game theory in the way of regarding the statistical decision as the two-person
zero-sum game processed by the statistician and nature. A. Wald proves that we
should choose the so called Max-min strategy in decision making. Based on the
analyses of A. Wald matrix game and five classical rules of uncertain
decision-making, this paper agrees that the max-min criterion is the relative
scientific solution, and puts forward the general method of solving uncertain
decision-making. |
Keywords: |
Uncertain Decision-making, Decision Method, Matrix Game |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 320 - 324 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
A PREVENTION MODEL AGAINST SIP FLOODING ATTACKS |
Author: |
XUEHUA YANG, HONGBIN LI |
Abstract: |
Through deeply analyzing on the principle, mode, character of SIP DoS and the
flooding attacks faced by SIP network, the prevention model to combine a dynamic
threshold adjustment with real-time dynamic prevention for SIP flooding attacks
was proposed. This model included logically chi-square traffic judgment model,
cumulative statistics model and IP prevention model, among which chi-square
traffic judgment module and cumulative statistics module were combined to
dynamically adjust the threshold and detect SIP flooding attacks, and IP defense
model dynamic prevented IP-based SIP flooding attacks. The experimental result
shows that the model can effectively detect and prevent the SIP flooding
attacks, and reduce the probability of SIP proxy server or IMS server been
attacked when the SIP network is on the abnormity. |
Keywords: |
Session Initiation Protocol, Flooding Attacks, Chi-Square Traffic, Cumulative
Statistics, Threshold Dynamic Adjustment |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 325 -334 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
SYNCHRONIZATION OF DISCRETE CHAOTIC SYSTEMS BASED ON UNCERTAINTY COMPENSATED BY
LS-SVR |
Author: |
JINYING ZHANG, DONGFENG WANG |
Abstract: |
A chaotic system owns complex dynamics though it is with deterministic
expression in mathematics, and it has attractive numerous study and application
in many fields of the world. But for a concrete application, it is usually with
parameters uncertainty while it is implemented. In this paper synchronization of
discrete-time chaotic systems with parameters and/or structure uncertainty is
researched, in which the uncertainty is modeled by using least square support
vector regression (LS-SVR) to eliminate synchronization error. A novel
synchronization control law that guarantees closed-loop robust stability is
proposed. Synchronizing of the well-known Hénon chaotic system and Lozi chaotic
system, Burgers’ map and Holmes cubic map, are taken as illustrative examples.
The chaotic systems in both examples are uncertain in parameters and structure.
Experimental results demonstrate the effectiveness and feasibility of the
proposed synchronization method. |
Keywords: |
Chaotic Systems, Synchronization, Uncertainty, LS-SVR |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 335 - 341 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
AUTOMATIC DOCUMENT GENERATION STRATEGY FOR GRAPHIC-ORIENTED MODELING AND
AUTOMATIC CODE GENERATION PLATFORM |
Author: |
CHUNMAO JIANG, XIANGHU WU, MINGCHENG QU, JUN YAO |
Abstract: |
With the growing of maturity for the graphical model-driven development
environment, software development has been made out of the shackles of a lot of
manual coding and not easily code reusing, meanwhile a higher document
management standard is required in software development process. To meet this
requirement this paper presents a structured Word document automatic generation
technology which makes full use of XML Dom and VBA technologies, and takes XML
data storage files as input. The paper elaborates tag defining rules of
structured Word document template, and the algorithms of XML data nodes query,
information extraction and replacement of Word document tags. The model has been
applied in a practical engineering project, and effectively solves the problems
of strenuousness, repetition, inefficiency and easily mistakes occurring as
compiling structured Word documents only by hand. |
Keywords: |
Word, Automatic Generation, XML, VBA, Tag |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 342 - 349 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
TUBULAR SURFACES EXTRACTION WITH MINIMAL ACTION SURFACES |
Author: |
XIANGJUN GAO |
Abstract: |
This paper presents a new fast approach for surfaces extraction of tubular
structures, such as blood vessels, tracheas, and colons. Since they are usually
long and thin, when being extracted with the traditional Minimal Action Surface
method, edges leakage problem could not be avoided. So a front freezing
criterion based on the front's average energy is developed. To freeze the tail
of the front whose energy is less than the average energy, and to continue
propagating the head of the front whose energy is larger than the average
energy. While the head front gets the end of the structure, the whole tubular
structure surfaces are extracted. Experimental results show the freezing
criterion based on the front's average energy avoids the edges leakage problem
effectively. The criterion is based on the global information of the front, so
can enhance the robustness to image noise and the local minimum. |
Keywords: |
Minimal Action Surface, Fast Marching Method, Tubular
Structure Surfaces, Average Energy |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 350 - 355 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
NEURAL LEARNING ALGORITHM BASED MRAS ROTOR RESISTANCE ESTIMATOR USING REACTIVE
POWER TECHNIQUE FOR VECTOR CONTROLLED INDUCTION MOTOR DRIVE |
Author: |
Ms.M.NANDHINI GAYATHRI, Dr.S.HIMAVATHI, Dr.R.SANKARAN |
Abstract: |
This paper presents a new method for estimating the rotor resistance of an
induction motor. The rotor resistance changes significantly with temperature and
frequency. This variation has a major influence on the field oriented control
performance of an induction motor due to the deviation of slip frequency from
the set value. In conventional MRAS, the adaptation is done using a
PI-controller. The MRAS approach using reactive power as a functional candidate
for rotor resistance estimation makes MRAS computationally simpler and easy to
design. This paper proposes the role of neural learning algorithm for adaptation
in a MRAS based rotor resistance estimator. The proposed scheme combines the
advantages of reactive power technique and the capability of neural network to
form a scheme named “Neural Learning-Reactive Power Model Reference (NL-RPMR)
based rotor resistance estimator” for Induction Motor Drives. In the NL-RPMR
scheme, the error between neural network model and reference model is back
propagated to adjust the weights of the neural network of the estimator. The
performance of NL-RPMR based rotor resistance estimator is extensively simulated
and compared with the conventional MRAS method. The promising results obtained
are presented. |
Keywords: |
Induction Motor, MRAS, Rotor Resistance Estimator, Neural Network, Back
Propagation Algorithm, Reactive Power. |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 356 - 364 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
Title: |
DATA INVESTIGATION: ISSUES OF DATA QUALITY AND IMPLEMENTING BASE ANALYSIS
TECHNIQUE TO EVALUATE QUALITY OF DATA IN HETEROGENEOUS DATABASES |
Author: |
AZWA ABDUL AZIZ , MD YAZID MOHD SAMAN, JULAILY AIDA JUSOH |
Abstract: |
Data investigation is a process to understand the nature of data in
heterogeneous databases. Many organizations are using online transactions
systems to support their company operations. The diversity of applications
system that used to support organization may lead to data anomalies without the
system owners realized the negative impact of decision making from insufficient
information of data. The quality of the results from any analysis is only as
good as the quality of the inputs (the data) that feed that analysis. Therefore,
data quality process is still a major factor in the successful operation of IT.
An introducing of new tech systems such as grid systems, ETL applications,
semantic web are meaningless if data are lack of quality. In avoiding “Garbage
In Garbage Out” principle, we proposed a technique that help to understand a
natured of data which we refer as Base Analysis Technique (BAT). BAT is used to
profile heterogeneous data in a structured approach, with the intention to
determine abnormal data. The technique contains three levels of analysis
consists of Top Level Analysis, Middle Level Analysis and Low Level Analysis. On
the other hand, Data Quality Analysis System (DQAS) is a tool that developed
using open source technologies which is connected to commercial databases in
supporting BAT to be implemented in three-tier architecture. This paper
describes issues surrounding data quality area and how BAT evaluates the quality
of data in heterogeneous databases. |
Keywords: |
Data Quality, Base Analysis Technique, Data Freshness |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 365 - 377 Vol. 45. No. 1 -- 2012 |
Full
Text |
|
|
|