|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
December 2012 | Vol. 46 No.1 |
Title: |
OPTIMIZATION OF HIGH VOLTAGE POWER SUPPLY FOR INDUSTRIAL MICROWAVE GENERATORS
FOR ONE MAGNETRON |
Author: |
N. ELGHAZAL, M. OULD AHMEDOU, M. CHRAYGANE, M. FERFRA, A. BELHAIBA, |
Abstract: |
This work treats the optimization of high voltage power supply for microwave
generators with a single magnetron. The design of this power supply uses one
single-phase HV transformer with magnetic shunts powering a cell doubler of
voltage and current stabilizer composed of a capacitor and a diode. The model of
the transformer is presented by an equivalent circuit as a quadruple in π. This
article treats on the one hand, the modeling of the transformer with magnetic
shunts of HV power supply for a magnetron 800Watt-2450MHz, determining the
analytical expressions of the non linear saturable inductances, from the
magnetization curve B (H) of the material used. The resulting model has been
implemented in Matlab-Simulink which is a programming language used to develop
the solutions requiring a very high computing power. Using Matlab-Simulink, we
have introduced a strategy to optimize this power supply for magnetron, to
envisage the possibility to obtain a gains in the section, volume, cost of
implementation and maintenance and make this system more economical while
respecting the process of regulation of the current in the magnetron. |
Keywords: |
Magnetron, Matlab-Simulink, Microwave, Modeling, Optimization, Power Supply,
High Voltage (HV) |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 001 - 010 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ENHANCEMENT OF SOFTWARE COMPONENT COMPATIBILITY IN ENTERPRISE SOFTWARE
DEVELOPMENT USING HIGH PEER AND LOW PEER |
Author: |
K.R. SEKAR, K.S. RAVICHANDRAN, ABHISHEK SINGH |
Abstract: |
In any business enterprise application, services playing a vital role and are
provided by the software components. Every application requires a myriad of
components based on umpteen types of services. Among the components, finding an
enhanced compatible component is a herculean task. The work can be accomplished
in terms with quality of service (QoS) with respect to different types of
Applications and Operating systems. The QoS relatively paramount for a certain
combination can be identified through the outcome. Here High and Low Peers have
been segregated by identifying the threshold. A novel methodology is
incorporated using mapping with limits for High Peer and Low Peer qualities. The
above scenario will facilitate the application domain to make use of perfect
fitting component available in bountiful. |
Keywords: |
Software Component (SC), High Peer, Low Peer, QoS, Application, Operating System
(OS) |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 011 - 016 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
DECISION MAKING IN AGRICULTURE BASED ON LAND SUITABILITY – SPATIAL DATA ANALYSIS
APPROACH |
Author: |
M. PARIMALA, DAPHNE LOPEZ |
Abstract: |
India, being an agricultural country analysis of soil texture and water resource
plays a vital role in increasing the productivity of crops. The area of study is
Vellore district in Tamil Nadu where agriculture is the main occupation. Though
it is a fact, most of the land remains uncultivated due to the lack of knowledge
of soil and water wealth. This paper proposes a method to analyze the
suitability of land based on soil and water resource and predicts the yeild.
Initially we apply Analytical Hierarchical Process to evaluate the influence of
these factors on productivity. Weighted Overlay Analysis is then used for
deriving at the productivity map by imposing the soil and water resource map
over the base map. The resultant map is used to mine interesting patterns which
gives us potential results in the form of rules that has a high societal impact.
The Agricultural administrative authorities can take a decision and help people
in converting a barren land into a fertile land thereby increasing the
productivity. |
Keywords: |
Weighted Overlay Analysis, Analytical Hierarchy Process, Association Rule,
Decision Making, Land Suitability |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 017 - 023 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
STOCK MARKET FORECASTING TECHNIQUES: A SURVEY |
Author: |
G. PREETHI, B. SANTHI |
Abstract: |
This paper surveys recent literature in the area of Neural Network, Data Mining,
Hidden Markov Model and Neuro-Fuzzy system used to predict the stock market
fluctuation. Neural Networks and Neuro-Fuzzy systems are identified to be the
leading machine learning techniques in stock market index prediction area. The
Traditional techniques are not cover all the possible relation of the stock
price fluctuations. There are new approaches to known in-depth of an analysis of
stock price variations. NN and Markov Model can be used exclusively in the
finance markets and forecasting of stock price. In this paper, we propose a
forecasting method to provide better an accuracy rather traditional method. |
Keywords: |
Data Mining, Stock Market Prediction, Markov Model, Neuro-Fuzzy Systems,
Forecasting Techniques, and Time Series Analysis. |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 024 - 030 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
REDUCING THE GAUSSIAN BLUR ARTIFACT FROM CT MEDICAL IMAGES BY EMPLOYING A
COMBINATION OF SHARPENING FILTERS AND ITERATIVE DEBLURRING ALGORITHMS |
Author: |
ZOHAIR AL-AMEEN, GHAZALI SULONG, MD. GAPAR MD. JOHAR |
Abstract: |
Obtained images through imaging systems are considered as degraded versions of
the original view. Computed Tomography (CT) images have different types of
degradations such as noise, blur and contrast imperfections. This paper handles
the issue of deblurring CT medical images affected by Gaussian blur. Image
deblurring is the procedure of decreasing the blur amount and grant the filtered
image with an overall sharpened form. In this paper, the authors considered the
Laplacian sharpening filter and the iterative Richardson – Lucy algorithm, and
implemented a mixture of these two techniques to process the CT medical images.
The suggested technique is applied to medical images that are synthetically and
naturally degraded by blur. Moreover, an evaluation between the proposed
combination and each employed technique is provided, along with the accuracy
calculation using the universal image quality index (UIQI). |
Keywords: |
Image Deblurring, Gaussian Blur, Computed Tomography (CT), Medical Image
Processing, CT Degradations, Point Spread Function (PSF), Iterative Richardson –
Lucy, Laplacian Sharpening Filter, Universal Image Quality Index (UIQI) |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 031 - 036 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
EXTRACTION OF BINARY PATTERNS FOR IMAGE DE-NOISING USING DATA MINING |
Author: |
MANOHAR ANNAPPA KOLI, S BALAJI |
Abstract: |
Data mining techniques are very powerful and are widely used for solving
problems in image processing applications. This paper identifies the 3X3
decidable, frequently occurring binary patterns from a given set of binary
images. The identified patterns are used for image de-noising and are found to
be very useful in effective removal of particularly binary noise from binary
images. These patterns can also be used in other applications of image
processing including image compression and image transmission. To identify
decidable frequently occurring binary image patterns 95% of confidence level and
999 frequency support are used to get accurate results. Experimental results of
patterns used in binary image de-noising show that patterns are very effective
and reliable in removal of noise. |
Keywords: |
Data Mining, Noise Removal, Patterns, Binary Image, Image Compression, Image
Processing |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 037 - 045 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
JOINT TIME AND LOCATION MOBILITY PREDICTION ALGORITHM FOR HETEROGENEOUS WIRELESS
NETWORKS |
Author: |
ZHENYU NA, YANG CUI, DI WU, YUBIN XU |
Abstract: |
obility prediction algorithm is the significant aspect to improve QoS (Quality
of Service) for heterogeneous wireless networks because it can accurately
predict user’ s trajectory, decrease handoff latency and preserve resources in
arriving cell for user. Considering inaccurate description of existing mobility
prediction algorithms for mobile user’s location in heterogeneous wireless
networks, this paper proposes that overlay coverage zone (OCZ) can be used to
precisely describe user’s location, flexibly depict the mobile user’s
characteristics and vertical handoffs among different wireless networks. As
existing algorithms highly depend on cell boundary estimation and suffer from
low time prediction accuracy, the phase-type distribution is introduced to model
user’s residence time in OCZ to improve classical Markov predictor, and then a
novel joint time and location mobility prediction algorithm is proposed.
Simulation results show that, compared with Markov mobility prediction
algorithm, the prediction accuracy of the proposed algorithm is highly
increased. |
Keywords: |
Mobility Prediction Algorithm, Heterogeneous Wireless Networks, QoS, Overlay
Coverage Zone, Joint Time and Location |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 046 - 053 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
FINGER-KNUCKLE-PRINT RECOGNITION BASED ON LOCAL AND GLOBAL FEATURE SETS |
Author: |
MOUNIR AMRAOUI, MOHAMED El AROUSSI, RACHID SAADANE, MOHAMMED WAHBI |
Abstract: |
A new biometrics recognition, finger-knuckle-print (FKP), has attractive
interests of researchers. Based on the results of psychophysics and
neurophysiology studies, both local and global information is crucial for the
image perception, Therefore we present a novel approach for finger-knuckle-print
recognition combining classifiers based on both micro texture in spatial domain
provided by local binary pattern (LBP) and macro information in frequency domain
acquired from the discrete cosine transform (DCT) to represent FKP image. The
classification of these two feature sets is performed by using support vector
machines (SVMs), which had been shown to be superior to traditional pattern
classifiers. The experiments clearly show the superiority of the proposed
classifier combination approaches over individual classifiers on the recently
published PolyU knuckle database. |
Keywords: |
Finger-Knuckle-Print (FKP), Local Binary Pattern (LBP), Discrete Cosine
Transform (DCT), Support Vector Machines (SVM), Gabor |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 054 - 060 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN OPTIMIZED LOSSLESS IMAGE COMPRESSION TECHNIQUE IN IMAGE PROCESSING |
Author: |
MAHENDRA PRATAP PANIGRAHY, NEERAJ KUMAR |
Abstract: |
Data compression is a common requirement for most of the computerized
applications. There are number of data compression algorithms, which are
dedicated to compress different data formats. Even for a single data type there
are number of different compression algorithms, which use different approaches.
This paper examines lossless data compression algorithms and compares their
performance. The article is concluded by stating which algorithm performs well
for Image data. This paper addresses the area of image compression as it is
applicable to various fields of image processing. It also includes various
benefits of using image compression techniques. The decryption techniques are
used for the best possible way of reconstruction of Image. |
Keywords: |
Data Compression, Encryption, Decryption, Lossless Compression, Lossy
Compression |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 061 - 066 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
VECTOR MAP WATERMARKING EVALUATION BASED ON CERTAINTY FACTOR |
Author: |
JIANGUO SUN, SONGZHU XIA, GUOYIN ZHANG |
Abstract: |
Watermarking appraisement plays an important role in the checking the validity
in a watermark system. So far, it is regrettable that there is no any
comprehensive appraisement proposed for watermarking technology. In general,
test software and methods can only analyze a few factors influencing the
watermarking algorithm, which are lacking sufficient credibility. So, a
comprehensive watermarking appraisement model based on the theory of certainty
factor is proposed in this paper, which firstly discusses the relations of
factors and operations contained, which all be assigned weight value. Through
reasoning and analysis, every watermark algorithm can be quantified, thus,
merits and drawbacks of watermark algorithms are obvious, and it is also easy to
achieve the optimal watermark algorithm. |
Keywords: |
Evaluation, Watermarking, Certainty Factor |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 067 - 072 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A DATA COLLECTION MECHANISM OF GRID-BASED DISTRIBUTED SIMULATION PLATFORM |
Author: |
PING KUANG, HAI JIN, PINGPENG YUAN, WENZHI CAO |
Abstract: |
With the growth of technology, more and more applications and experiments need
to be run in distributed environment. Data collection as an application and
experiment fact begins to become more and more important. However, data
collection will confront a lot of difficulties in grid-based distributed
simulation platform because the running environment of grid is different with
that of the traditional simulation platform. In order to overcome these
disadvantages, we present a data collection mechanism of grid-based distributed
simulation platform. In order to justify the feasibility and the availability of
this data collection mechanism, a series of experiments have been done. The
results show that it is feasible to collect data resource in grid-based
distributed simulation platform. |
Keywords: |
Grid computing, Simulation, Data collection, HLA (High Level Architecture), RTI
(Run Time Infrastructure) |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 073 - 077 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ISOLATED DISTRIBUTED ARCHITECTURE FOR CLOUD-STORAGE SERVICES BASED ON STRUCTURED
STRATEGY |
Author: |
YING GAO, JIANLIN ZHENG |
Abstract: |
Cloud Security threats have greatly hindered the development of Cloud Computing
and the promotion of cloud application, so how to protect the data stored in the
cloud is not only the core issue of security, but also the biggest challenge of
development. As these problems above, a trust-control architecture based on the
concept of Cloud Storage Service was creatively proposed. Based on the
structured strategy and isolated distributed storage-framework, the architecture
of cloud services can eliminate the concerns about cloud security and achieve a
high degree of safe, reliable and available cloud storage. It’s rather a simple
and efficient way proved by experiments. |
Keywords: |
Cloud Storage Services, Cloud Security, Isolated Distributed Storage, Trust
Mechanism, Structured |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 078 - 083 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN OPTIMIZATION ALGORITHM OF RSA KEY GENERATION IN EMBEDDED SYSTEM |
Author: |
LI DONGJIANG, WANG YANDAN |
Abstract: |
To reduce the time complexity, this paper proposes an optimization algorithm to
generate the large prime number. Before the primality test, an improved
prescreening algorithm is used to get rid of most of odd composite numbers. Then
we introduce the Fermat’s little theorem to make a further judgement, which can
decrease the times of using prescreening algorithm. At last, Miller-Rabin
algorithm is used to make a final primality test. The results show that the
speed of key generation has been greatly improved. |
Keywords: |
RSA Key Generation; Embedded System; Fermat’s Little Theorem; Miller-Rabin
Algorithm |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 084 - 087 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
GXBIT: COMBINING POLYHEDRAL MODEL WITH DYNAMIC BINARY TRANSLATION |
Author: |
ZHANG KANG, ZHOU FANFU, LIANG ALEI |
Abstract: |
During the last decade, polyhedral model has been widely used as a mathematical
model for auto-parallelization, and in recent years, with the development of
multi-core architecture, polyhedral model has been employed to transform
sequential code to parallel code that can run simultaneously on different cores.
At the same time, the rapid development of GPU makes CPU/GPU architecture become
increasingly popular because of GPU’s powerful parallel processing capabilities.
However, we have no other methods of using GPU except for CUDA and Stream SDK,
which are all based on explicit programming. Apart from this, there are two
constraints for explicit programming: binary incompatibility among different
GPUs as well as the cost of rewriting source code. Considering these
constraints, we use polyhedral model and a dynamic binary translator to build a
virtual execution environment: GXBit. GXBit is composed of analysis and
execution stage, and the former one is the main focus of this paper. Analysis
stage uses binary instrumentation and binary analysis to probe potential
parallel parts (usually nested loop) of a binary executable and then polyhedral
model is employed to detect whether there is data dependence or not among all
iterations of a nested loop. Execution stage is discussed briefly in this paper.
Although there are performance loss in binary translation, GXBit has an 8x
speedup on average to X86 compute-intensive version through the result of
running two applications taken from the CUDA SDK Sample and one test case from
the UIUC Parboil Benchmark Suite. |
Keywords: |
Auto-Parallelization, Polyhedral Model, GXBit, Virtual Execution Environment |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 088 - 092 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
THROUGHPUT OPTIMIZATION FOR MIMO SYSTEMS BASED ON CROSS-LAYER DESIGN |
Author: |
FANGLEI QUAN, RUI WANG, XINYU JIN, YU ZHANG, DUANPO WU |
Abstract: |
Based on cross-layer design, an optimization method was proposed, which combined
the adaptive modulation and coding with symbol rate at the physical layer, and
the packet size and sub-packet number at the data link layer. The parameters
were jointly optimized to maximize the MIMO system throughput in the Rayleigh
fading channel. Numerical results reveal that the optimization method can be
adapted to the time-varying wireless channel and greatly improve the throughput
compared with separate layer design. Besides, under prescribed error performance
constraint, the larger the maximum number of transmissions, the higher the
throughput. A small number of transmissions can offer a desirable
delay-throughput tradeoff in practice. |
Keywords: |
Cross-Layer Design, MIMO System, Throughput Optimization, Adaptive Technique |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 093 - 097 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A 3D MODEL RETRIEVAL ALGORITHM BASED ON BP-BAGGING |
Author: |
ZUOJUN LIU, LIHONG LI |
Abstract: |
Aim at solving the existing problems of 3D model retrieval based on neural
network, this paper proposes a new algorithm based on BP-bagging. Through
bagging, the algorithm turns the weak classifier into the strong. As to feature
extraction, the algorithm projections 3D model into six 2D images by six
perspective points. Then transforms the images into frequency domain, gets the
high dimension feature by two 1D Fourier Transformation, and compress the high
dimension feature to the lower, inputs into the BP-bagging classifier to
retrieval the 3D model. Proved by the experiment, the new algorithm is more
effective in 3D model retrieval. |
Keywords: |
3D Model Retrieval; BP-bagging Classifier; Feature Extraction; Compression |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 098 - 102 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN EVALUATION OPTIMIZATION APPROACH OF IAAS RESOURCE DISTRIBUTION BASED ON
GENETIC ALGORITHM |
Author: |
FU HONGXIA, ZHOU XIANGBING |
Abstract: |
In cloud computing, IaaS (Infrastructure as a Service) is the foundation of
cloud service applications. It enables problems like resource allocation
scheduling and bearing capacity to be further optimally solved. Therefore, a
genetic optimized IaaS resource optimization evaluation approach is presented.
This approach abstractly defines its 7 factors (properties) including usability
of server, network performances, load balancing, anomaly notification mechanism,
response time support, trusted security and measure payment, and explains
quantitative calculation and expressions of each factor. And finally, tested by
CloudSim, this approach is indicated to be feasible and effective for resource
allocation. |
Keywords: |
IaaS Resources, IaaS Evaluation, Genetic Algorithm |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 103 - 107 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
COMPLEX ALGORITHM NETWORK AND ITS TOPLOGY ANALYSIS: A CASE STUDY |
Author: |
MUCHOU WANG, WEIFENG PAN , RONGYE WANG, ZHUXIN HU |
Abstract: |
Complex networks are everywhere. This paper explores a new type of complex
network, complex algorithm network constructed from evolutionary algorithms. The
main aim of this paper is to investigate the topological properties underling
the dynamics of the evolutionary algorithms. It uses complex network to describe
individuals and their relationships while execution of a specific evolutionary
algorithm. It introduces the main parameters in complex network theory to
uncover properties of the dynamics of evolutionary algorithms. Our simulations
are based on one selected evolutionary algorithm (Guo' algorithm in 10 versions)
and one test functions. Data obtained through the simulations are processed
graphically as well as statistically. Some novel properties of the complex
algorithm network are uncovered, which has great implications for the design and
improvement of existing evolutionary algorithms. |
Keywords: |
Evolutionary Algorithm, Complex Networks |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 108 - 113 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A SMOOTHING ALGORITHM FOR TRAINING MAX-MIN NEURAL NETWORKS |
Author: |
LONG LI, TIAN XU, YAN LIU, JIE YANG |
Abstract: |
In this paper, a smoothing algorithm for training max-min neural networks is
proposed. Specifically, we apply a smooth function to approximate functions and
use this smoothing technique twice, once to eliminate the inner operator and
once to eliminate the operator. In place of actual network output by its
approximation function, we use all partial derivatives of the approximation
function with respect to weight to substitute those of the actual network
output. Then, the smoothing algorithm is constructed by the gradient descent
method. This algorithm can also be used to solve fuzzy relational equations.
Finally, two numerical examples are provided to show the effectiveness of our
smoothing algorithm for training max-min neural networks. |
Keywords: |
Smoothing Algorithm, Neural Networks, Functions, Approximation |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 114 - 119 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN ID-BASED MULTI-RECEIVER SIGNCRYPTION SCHEME IN MANET |
Author: |
Lei Wu |
Abstract: |
In Mobile Ad hoc network (Manet), to solve the problems of the message receiver
privacy exposure and signcryption (decryption) unfairness in existing
signcryption schemes, a new ID- based multi-receiver signcryption scheme based
on bilinear pairings is proposed. We also analyzed its security and efficiency.
The result shows that the new scheme is provable secure in the random oracle
model. It is significantly efficient and with low computation cost and is very
suitable for secure communication in Manet. Then, the scheme can avoid the
destruction of the malicious nodes. This scheme can satisfy the requirement of
security and efficiency in real network environment, it is more propitious to
applications in practice. |
Keywords: |
Multi-receiver Signcryption, Manet, Bilinear Pairing |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 120 - 124 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
PROBABILITY DISTRIBUTION MODELING OF THE INTERFERENCE OF THE TRACTION CURRENT IN
TRACK CIRCUITS |
Author: |
LINHAI ZHAO, MAOJIAO LI |
Abstract: |
As a main interference to track circuit signal, the interference of the traction
current (ITC) will directly influence the transmission quality of track circuit
signal and even lead to signal distortion which would endanger the traffic
safety. The ITC has a complicated formation mechanism and it is affected by
factors of train compositions, load and running speed, so it is hardly possible
to establish accurate mathematical analytic model of ITC. This paper has
analyzed the probability distribution characteristics of the ITC extracted from
real train operating data collected by the cab signal system. A method using
Kolmogorov–Smirnov (K-S) test and least square approximation has been proposed
to establish the probability distribution model of the ITC. Feasibility and
applicability have been confirmed by examples. The probability distribution
model of the ITC has a significant importance for analyzing track circuit
signals especially for interference signal simulation. |
Keywords: |
Track Circuit, Interference of Traction Current, Probability Distribution, K-S
Test |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 125 - 131 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN ONLINE COLLABORATION PROCESS DESIGN FOR THE STUDENT ORGANIZATION |
Author: |
XUSEN CHENG, YUANYUAN LI |
Abstract: |
The student organization plays an important role in the university. With the
increasing competitions among students organizations, the organizers in the
associations have to devote significant amounts of time to the meetings, which
is often inefficient and hurting the working passion. In this study, we have
applied facilitated collaboration theories and methods for student organizations
to solve problems occurring in the online teamwork of university students’
organizations. Our aim is to provide a more efficient process of collaboration
which helps cutting down the time used for the meeting, as well as improving the
quality of the teamwork. First, we have designed an online collaboration process
for students’ organizations for their collaborative work. Then, a pilot testing
has been conducted successfully in a China university with the application of
our designed process. The results show that it is useful for time decreasing,
quality improving, effectiveness increasing and ideas generating. |
Keywords: |
Student Organization, Process Design, Facilitation, Online Collaboration |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 132 - 141 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A LINEAR SHAPED CHARGE NEUTRON RADIOGRAPHY PRECISE DETECTION SCHEME |
Author: |
YAOHUA WANG, WEI XIONG, ZHIFU CHEN, CHENGFEI FAN |
Abstract: |
Neutron radiography was researched to detect the linear density of explosive in
linear shaped charge (LSC), to determine its distribution uniformity and
defective. The clear images of some samples were obtained by neutron
radiography, and were processed to obtain the linear density of inner explosive.
The defectives such as sparseness, discontinuity and cavity were shown clearly
in the images. The method, with more intuitive and more reliable results, is
more direct and simpler than existing quality testing methods for LSC, and most
important, the method is a non-destructive one. This new method is of
significance to the precise test of LSC and its application in precise blasting;
in addition, it could be used in quality test of cord type explosive device. |
Keywords: |
Neutron Radiography, Linear Shaped Charge, Non-Destructive Testing |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 142 - 146 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ANALOG CIRCUIT INTELLIGENT FAULT DIAGNOSIS BASED ON GREEDY KPCA AND
ONE-AGAINST-REST SVM APPROACH |
Author: |
KE GUO, YI ZHU, YE SAN |
Abstract: |
Fault diagnosis of analog circuits is essential for guaranteeing the reliability
and maintainability of electronic systems. A novel analog circuit fault
diagnosis approach based on greedy kernel principal component analysis (KPCA)
and one-against-rest support vector machine (OARSVM) is proposed in this paper.
In order to obtain a successful fault classifier, eliminating noise and
extracting fault features are very important. Due to better performance of
nonlinear fault features extraction and noise elimination, KPCA is adopted as a
processor. However, a drawback of KPCA is that the storage required for the
kernel matrix grows quadratically, and the computational cost for eigenvector of
the kernel matrix grows linearly with the number of training samples. Therefore,
greedy KPCA which can approximate KPCA with small representation error is
introduced to enhance computational efficiency. Based on statistical learning
theory and the empirical risk minimization principle, SVM has advantages of
better classification accuracy and generalization performance. The extracted
fault features are then used as the inputs of OARSVM to solve fault diagnosis
problem. The effectiveness of the proposed approach is verified by the
experimental results. |
Keywords: |
Fault Diagnosis, Analog Circuit, Greedy Kernel Principal Component Analysis,
One-against-Rest, Support Vector Machine |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 147 - 157 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
3D GEO-MODELS SHARING ON THE WEBSITE BASED ON GEOSCIML STANDARD |
Author: |
WEIHUA HUA, JINGJING DAI |
Abstract: |
3D geological models become increasingly important and popular recently. But it
is too difficult to share the models because of different models come from
different modeling software. It is urgent to solve the problem for the
unification of data management. Based on it, the paper explains basic
construction and architecture if GeoSciML to discuss how to take advantage of
this standard and define a whole geological model, such as drill model or a
geological section model. The models provide the foundation to the 3D geological
models sharing on the website. Meanwhile, by using of the new technology of
Html5 and WebGL, 3D geological models can be shard in spite of different data
formats. So it becomes impossible for us to use the geological models in
different fields by the method. |
Keywords: |
WebGL, Web Sharing, GeoSciML, 3D Geological Model |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 158 - 163 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
THREE-DIMENSIONAL NUMERICAL CALCULATION ANALYSIS OF STRESS INDUCED BY PORE
PRESSURE VARIATION |
Author: |
DONG GUANG, DENG JINGEN, ZHU HAIYAN |
Abstract: |
Refracturing is an important technique for developing low-permeability reservoir
economically and effectively. It is the stress field around well bore and
fracture that plays a crucial role in determining new fracture creation and
propagation. The calculation analysis of the stress induced by pore pressure
variation is critical to evaluate the stress field distribution. By employing
finite element analysis software ABAQUS, three-dimensional numerical calculation
model for stress induced by pore pressure variation is established. It is proved
that on the path orthogonal to the initial fracture, the stress induced by pore
pressure variation will reduce the value of difference between two horizontal
principal stresses. For a point near the initial fracture, the induced stress is
mainly generated at the initial stage after the first fracturing treatment. |
Keywords: |
Numerical Calculation, Refracturing, Pore Pressure, Induced Stress, Stress
Reversal |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 164 - 169 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A DYNAMIC DATA FUSION METHOD AND ITS APPLICATION |
Author: |
RONGCHUN WU, FENGLI ZHANG |
Abstract: |
Data fusion involves multi-sources or multi-presentations of a single source to
perform inferences which are more comprehensive and accurate than those of any
single method. Thus, data fusion makes it possible to create a synergistic
process in which the consolidation of individual data creates a combined
resource with a productive value greater than the sum of its parts. While
considerable research has been done on data fusion in the past, most of them
performed in the field of multi-sensor fusion. There has been relatively less
work conducted in a data mining context. As the form factor of computing and
communicating devices shrinks and the capabilities of such devices continue to
grow, it has become reasonable to imagine applications that require rich
computing resources today becoming viable candidates for future sensor networks. |
Keywords: |
Data Fusion, Dynamic Data, Sensor Networks |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 170 - 175 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ATTITUDE INDEX GROUP DECISION-MAKING METHOD OF PERFORMANCE EVALUATION FOR COAL
ENTERPRISES ENERGY CONSERVATION AND REDUCTION OF POLLUTANT EMISSIONS |
Author: |
GAO YAN, LIU CHENCHEN |
Abstract: |
For the performance evaluation of coal enterprises energy conservation and
reduction of pollutant emission, a new attitude index group decision-making
method is proposed based on trapezoidal fuzzy numbers. Under the condition in
which the information of attributes weights and decision maker weights is
entirely, the attitude index is introduced firstly. By solving the fuzzy object
programming for the entirely information, the weights of the attitude and
decision making matrix are determined. Secondly, the value of group risk
attitude is got by integrating the attitude index of the decision makers, and
the group comprehensive attribute values of each alternative and the priorities
are achieved. At last, the practical example of performance evaluation for coal
enterprises energy conservation and reduction of pollutant emission shows the
feasibility and effectiveness of the proposed method. |
Keywords: |
Attitude Index; Trapezoidal Fuzzy Number; Energy Conservation and Reduction of
Pollutant Emission |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 176 - 180 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
SPILLOVER EFFECTS ON CARBON TRADING PRICE OF INTERNATIONAL OIL PRICE |
Author: |
SHUANGYING WANG, AIWEN ZHAO |
Abstract: |
Along with the arrival of the low carbon economy, the Clean Development
Mechanism project is more important to China. By analyzing spillover effects on
Chicago Climate Exchange (CCX) carbon market of oil prices by GARCH, it found
that the mean and volatility spillover effects between international oil price (WTI)
and CCX carbon trade price were significant. The volatility of CCX carbon
trading price was influenced itself, at the same time, it was influenced by the
volatility of WTI oil price, and spillover effects from WTI fluctuation were
more significant than the effects from CCX price fluctuation. International oil
price rises will lead to the future price of carbon of Chicago Climate Exchange
increases. The effects of international oil price fluctuations to the carbon
market were positive, conversely the effects were non-significant. |
Keywords: |
International Oil Price, Carbon Trade Price, GARCH Model, Spillover Effect |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 181 - 186 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION QUERY SUBSYSTEM BASED ON DECISION-MAKING |
Author: |
SHENYI QIAN, SHEN LI |
Abstract: |
In this paper, Information System is introduced firstly, and then combining
practical examples during our development of IS, on the basis of the
establishment of the decision-making oriented query subsystem in large
Information System, the query subsystem in the Information System based on
decision-making is designed, moreover, the query subsystem is implemented
following the query processing principle. |
Keywords: |
Information System, Query Subsystem, Decision-Making |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 187 - 194 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A MULTI-HOP ROUTING SCHEME BASED ON DIFFERENT SPATIAL DENSITY OF NODES IN WSNS |
Author: |
CHENGZHI LONG, YIXING LI, YIHONG LI |
Abstract: |
In this paper, the operating principle of SEP in wireless sensor networks (WSNs)
is analyzed, and a multi-hop routing scheme (MH-SEP) is proposed based on
different spatial density of nodes. The network is to be divided into different
sizes of areas according to the multi-hop routing scheme, the cluster heads use
multi-hop mode of communication to send their data to the base station
considering the heterogeneous of networks. This paper mainly analysis the
performance of scheme based on different spatial density of nodes. The
simulation shows that the advantage of the new scheme. On the one hand, with the
increase of the monitoring area, the space density decreases, the advantage of
the MH-SEP is more and more obvious, comparing with SEP, on the other hand,
greater size of surveillance area and smaller the density of the network is, the
more obvious improvement is made from the new scheme. |
Keywords: |
Multi-hop, Routing Scheme, Spatial Density, Wireless Sensor Networks |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 195 - 200 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A MULTI-CHANNEL SYSTEM FOR DETECTING METAL CONNECTORS IN WASTE WOOD-BASED
MATERIALS |
Author: |
JIANGMING KANU, MINGKUO CHEN, XINTONG CUI, WENBIN LI |
Abstract: |
Metal connectors in waste wood-based materials should be removed before reused.
A multi-channel metal connector detecting system is presented, detecting the
metal connectors in waste wood-based materials. It include three parts: a high
precision sensor for detecting metal connectors in waste wood-based materials, a
multi-channel data logging and processing system based on microcontroller unit,
and a model for positioning the metal connectors in waste wood-based materials.
The high precision sensor has a magnet and, Holzer element and a differential
amplifier and peak detector circuit. The multi-channel data logging and
processing system has a micro-controller unit, an 8-channel AD converter and
some auxiliary circuits. The model shows the relationship between the positions
of metal connectors with the signals from 8 sensors. The experimental results
show that the maximal detecting height is 2.0cm for the 0.8х11mm nail, as well
as 4.8cm for the 3.5×30mm nail and the position error between the real positions
of the nails and those get from the model is less than 1cm. The system can meet
the practical needs of the reusing waste wood-based materials. |
Keywords: |
Waste Wood-based Materials; Metal Connector Detection; Positioning Model |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 201 - 206 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN IMAGE SEGMENTATION APPROACH OF FOREST FIRE AREA BASED ON AERIAL IMAGE |
Author: |
SANQI LI, WENBIN LI, JIANGMING KAN, YUTAN WANG |
Abstract: |
In order to determine the forest fire danger rating quickly while finding it
during the aviation of forest protection, it is important to calculate the fire
area. Until recently the area has been mostly calculated by people’s experience.
With the mature of digital image processing technology, an assumption based on
the forest fire area calculation of aerial images has been made, and the key
point is how to identify and extract the fire area. In this paper, a extraction
method on forest fire area based on the combination of color and gray level
information has been proposed. First, the adaptive threshold should be found by
applying the Otsu threshold method to a gray image. Then, the image analysis
should be made by the RGB space component’s characteristics of the target
images’ color features. Compared with traditional image segmentation methods,
experiments show that the proposed method has low false points rate, good area
consistency, accurate and clear edge, and can be used to extract and segment the
fire area of aerial images. |
Keywords: |
Forest Fire, Aerial Image, Image Segmentation, Fire Area Extraction |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 207 - 211 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN IMPROVED METHOD TO ESTIMATE THE FUNDAMENTAL MATRIX BASED ON 7-POINT ALGORITHM |
Author: |
SHUO FENG, JIANGMING KAN, YEXIAO WU |
Abstract: |
The fundamental matrix plays an important role in the field of computer vision.
How to estimate it accurately has become a major subject. In this paper, an
improved approach based on the 7-point algorithm is presented. In this method,
initial estimations of the fundamental matrix are provided by the 7-point
algorithm. Then an optimal fundamental matrix will be selected which offers
relatively low mean, low maximum and low standard deviation of the discrepancy
between points and epipolar lines. Experimental results on synthetic data and
real images show that the proposed algorithm is superior over the 7-point
algorithm in terms of accuracy and anti-noise ability. |
Keywords: |
Fundamental Matrix, Epipolar Geometry, 7-Point Algorithm |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 212 - 217 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
AN IMPROVED INFORMATION HIDING ALGORITHM |
Author: |
QIAN ZOU, HUAJUN WANG, WEI HUANG, JIN PAN |
Abstract: |
Hiding technology is a newly developed discipline that concludes many subjects
and covers many fields, and it hides the transferring information in the
carrier, which greatly increases the safety of information transmission. In
order to hide and transfer information more effectively, the paper researched
the cloud algorithm in the model of information hiding. It also studied the
model of information and improvement of the algorithm. With experiments, the
algorithm proved to be applicable and could improve the safety and reliability
of information hiding. |
Keywords: |
Information Hiding, Cloud Computing, Formation Model |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 218 - 223 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A REAL-TIME INFORMATION ORIENTED SERVICE-AWARE ROUTING ALGORITHM |
Author: |
HUA LIANG, AN YING, 3HAOWANG |
Abstract: |
The mobile nodes perceive the real-time routing information of different
sections, and analyze the reliability of the movement direction of nodes, data
exchange, and transmission delay and path failure. By combining movement
direction, speed and locations, the routing path is adaptively updated according
to the network states of the sections so as to achieve effective message
delivery. In this paper, a real-time information oriented service-aware routing
algorithm (RTIA) is proposed. The transmission mode of the RTIA is no copy,
real-time information oriented, and service aware, which can effectively improve
the message delivery rate and reduce delay. The simulation results prove the
superiority of the RTIA algorithm. the merchant can trace the traitors from a
pirated copy by means of the embedded unique fingerprint, while the customer is
immune of being framed due to the asymmetric property. First, multicast that is
an efficient transport technology for one-to-many communication is exploited,
which can reduce the bandwidth usage significantly. Second, symmetric encryption
instead of public-key encryption is performed on the multimedia content, which
can reduce the complexity and communication cost. |
Keywords: |
Delay Tolerant Network, Data Delivery Rate, Data Delay |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 224 - 230 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ENERGY-SAVING MODEL ON DISTRIBUTED RANDOM NODES IN WIRELESS SENSOR NETWORKS |
Author: |
WEI HUANG, HUAJUN WANG, QIAN ZOU, SONG LI |
Abstract: |
The purpose of our study is to try to extend the life of the sensor network,
without affecting the uses functions in wireless sensor networks. As our method
reduces the amount of data communications and reduces the energy consumption of
wireless sensor networks significantly, the compression problem in the data
transferring process is solved. From the experiments, we conclude that this
algorithm improves the decoding accuracy and improves the survival time of the
network. Therefore, it has a great potential in the wireless sensor networks
applications. |
Keywords: |
Random Nodes, Energy-Saving Model, Distributed, Compressed Sensing |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 231 - 236 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
INTELLIGENT DESIGN SYSTEM OF MECHANICAL PRODUCTS BASED ON DATA MINING AND
KNOWLEDGE BASED ENGINEERING |
Author: |
JING TAO, YUAN YIN |
Abstract: |
Although the intelligent design system is widely used in modern mechanical
products design, the optimization of mechanical products design parameters and
the method of knowledge acquisition etc. remain the key factors that restrict
the development of intelligent design system. On the basis of analyzing data
mining methods and knowledge based engineering (KBE) principles, an information
model was built to find out the minimum attribute set of mechanical products
design parameters with the improved ID3 algorithm. Then a large numerous of
finite element simulation results, combined with the rough set theory and data
mining technology, was used to extract knowledge and rules and to fulfill the
knowledge expression and reuse. Finally a gantry crane intelligent design system
was established by adopting automation technology with the secondary development
of CATIA and integrating the KBE extended module with CATIA. The example shows
that the proposed gantry crane intelligent design system makes up for the
deficiencies of the traditional intelligent design system and improves the
design efficiency and the ability to respond to market. |
Keywords: |
Data Ming, Knowledge Based Engineering, Intelligent Design System, Rough Set |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 237 - 244 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
EVALUATING COMPETITIVE EDGE FOR LOGISTICS ENTERPRISES BASED ON BP NEURAL NETWORK |
Author: |
LUO FENGLAN |
Abstract: |
Evaluating competitive edges plays a key role for logistics enterprises and it
is one of the difficulties and hot research fields for the researchers related.
The paper presents a new model for evaluating competitive edges of logistics
enterprises based on the principle of value network and improved BP neural
network. First an evaluation indicator system of competitive edges of logistics
enterprises is designed through analyzing the characteristics of the evaluation
indicator with more details; Second, Legendre wavelet is used to speed up the
convergence of BP neural network algorithm and based on this the paper advances
a new competitive edge evaluation model for logistics enterprises. Finally, four
Chinese logistics enterprises are taken for examples to verify the validity and
feasibility of the model and the experimental results show that the model can
evaluate the competitive edges of logistics enterprises practically and can help
the logistics enterprises to take concrete measures to enhance its competitive
edge. |
Keywords: |
Competitive Edge Evaluation, Value Network, BP Neural Network, Legendre Wavelet |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 245 - 249 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
VALUE CREATION ROUTE OF TRUST GOVERNANCE BASED ON SUPPLY CHAIN INFORMATION
SYSTEM INVESTMENT |
Author: |
ZHAOLIN CHENG, KANG XIE |
Abstract: |
In supply chain relationship governance, trust is considered as an important
governance mechanism to decrease opportunism. Trust provides commitment,
improves transaction efficiency, and implements the supply chain information
system. The paper constructs a three-stage dynamic model based on the impact of
trust governance on supply chain information system investment. It analyzes
supply chain overall value creation route and features based on trust
governance. The results show that trust governance can make supply chain
performance Pareto optimal. |
Keywords: |
Supply Chain Information Systems Investment, Trust Mechanism, Value Creation |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 249 - 255 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
3D MODEL RECONSTRUCTION ALGORITHM AND IMPLEMENTATION BASED ON THE MOBILE DEVICE |
Author: |
CHONGWEN WANG, MINGLI BAO, TONG SHEN |
Abstract: |
With the mobile phone has been developed rapidly now, 3D reconstruction applied
in this mobile device becomes a possible. Based on the photometric stereo, a 3D
model reconstruction algorithm had been put forward, which can be run on
mobile-phone with android system. In the dark environment, through several light
sources provided by the mobile-phone screen, multiple perspective images of an
object can be captured, then each value of depth can be calculated. Finally
based on depth data, OpenGL ES have been used to map out the object model.
Through experiments, the proposed algorithm is effective. |
Keywords: |
Three-Dimensional Reconstruction, Photometric Stereo, 3D Model, Android
Application |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 255 -262 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
VIDEO TRANSCODE SERVICE PLATFORM WITH WORKLOAD PREDICTION |
Author: |
GAODE QIN, GAOJIN WEN |
Abstract: |
With the rapid expanding of the integration of telecommunications networks,
cable TV networks and the internet, the efficient and energy-saving video
transcode service platform is in great demand. Such a platform together with
workload prediction is proposed in this paper. A new accurate multi-scale
prediction method is used to predict the execution time of transcode tasks in
this platform. Special distribution and management scheme is applied to serve
the purpose of energy optimization. With several experiments, it is proved that
the proposed platform can be used to predict the workload of the transcode tasks
accurately and save the energy efficiently by task scheduling optimization. |
Keywords: |
Multi-scale Prediction, Video Transcode, Task Scheduling |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 263 - 267 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
APPLICATION OF RBF NEURAL NETWORK IMPROVED BY PSO ALGORITHM IN FAULT DIAGNOSIS |
Author: |
LIN CUI, CAIYIN WANG, BAOSHENG YANG |
Abstract: |
The current fault diagnosis methods based on conventional BP neural network and
RBF neural network exist long training time, slow convergence speed and low
judgment accuracy rate and so on. In order to improve the ability of fault
diagnosis, this paper puts forward a kind of fault diagnosis method based on RBF
Neural Network improved by PSO algorithm. By using particle swarm algorithm’s
heuristic global optimization ability, the connection weight values of RBF
neural network are optimized. And then combined with RBF neural network’s
nonlinear processing ability, transformer fault samples are trained and tested.
The experimental results show that, compared with conventional fault diagnosis
methods based on BP neural network and RBF neural network, the method based on
RBF Neural Network improved by PSO algorithm can effectively avoid the problems
of RBF neural network’s instability, RBF neural network easily falling into
local minima and low correct diagnosis rate, which can effectively improve the
convergence speed and the efficiency of fault diagnosis. |
Keywords: |
Particle Swarm Optimization Algorithm, RBF Neural Network, BP Neural Network,
Transformer Fault Diagnosis |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 268 - 273 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ONLINE DRIVING STATES MONITORING USING FUSION OF MULTI-SENSOR INFORMATION |
Author: |
JIE MA, XINPING YAN, DUANFENG CHU, YI HE |
Abstract: |
In this paper, an online methodology for the detection of unsafe driving states
while driving is presented. The detection is based on the multi-sensor
approaches, including gyrometer, accelerometer, radar, video and so on. Various
information comes from both the ego vehicle and its surroundings are fused to
gain a comprehensive understanding of driving situations. Using subspace
modeling techniques, we propose an unsupervised learning algorithm to perform
the unsafe states detection. The feature space are decomposed into the normal
and anomalous subspace, where the normal space are assumed as the major
components of the driving patterns, and significant deviations from the modeled
normal subspace are signaled as unsafe states. In addition, the algorithm works
in a real-time way incorporating a implementation of sliding window, which
enable the method to adapt over time to address changes in the new emerged
driving situations. We have implemented our algorithm with a prototype system
installed in a transit bus, validations are performed in real driving
situations. Our experimental results demonstrate the effectiveness of the
approach on forward risk predication. We gain a timely predication while with a
low false positive when there occurs conflicts between the ego vehicle and front
vehicles. |
Keywords: |
Multi-sensor Fusion, Driving States Monitoring, Subspace Modeling |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 274 - 283 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A CONTROL FLOW OBFUSCATION SCHEME BASED ON GARBAGE CODE |
Author: |
YONGYONG SUN, GUANGQIU HUANG |
Abstract: |
Control flow obfuscation is used to obfuscate program execution flow, thus
preventing reverse engineering of software. However, the code size and execution
time will be increased greatly after program is obfuscated. Since opaque
predicate is difficult to resist the dynamic attack, the paper proposes the
scheme about control flow obfuscation based on garbage code. The algorithm
combines branch garbage code with loop garbage code, and hash function is
introduced to limit the number of insert operation about code. Thereby
controlling the growth of the code size and reducing the accuracy of program
analysis and resisting tampering attack. Experimental results show that the
obfuscation algorithm can control performance overloading effectively that is
brought by obfuscation transformation, while preventing a variety of reverse
engineering attacks effectively. |
Keywords: |
Control Flow Obfuscation, Reverse Engineering, Opaque Predicate, Garbage Code,
Hash Function |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 284 - 288 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
FINITE ELEMENTT SIMULATION AND ANALYSIS ON WEAR OF MECHANICAL GRAVER FOR
DIFFRACTION GRATING |
Author: |
BAOQING ZHANG, GUOQUAN SHI, GUANGFENG SHI, GAO LI |
Abstract: |
Mechanical ruled diffraction grating is a kind of super-fine technology. During
the process, the material distortion happens along with the geometry
nonlinearity and material nonlinearity. In this paper, start from the dynamic
assembly , measure the mechanical property by nano-indenter and scratching test
, establish the finite element simulation model based on Deform software,
analyze the main factors which affect the wear of linear graver, simulation
analyze the wear of graver on flow velocity of material ,stress change and
temperature change , predict and validate the area where the wear is most
serious .It drew the conclusion that the wear was prior to appear on main and
side blade, optimizing the edge radius and increasing the surface roughness is
effective method to improve the anti-wear ability of tool. |
Keywords: |
Diffraction Grating, Finite Element, Wear |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 289 - 293 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A TEXTURE IMAGE DENOISING MODEL USING THE COMBINATION OF TENSOR VOTING AND TOTAL
VARIATION MINIMIZATION |
Author: |
CHANJUAN LIU, XU QIAN, CAIXIA LI |
Abstract: |
Combined with human vision principle, this paper firstly gives the definition of
image frequency based on image local gradient and uses it to replace the image
gradient in the traditional total variation (TV) model. And then tensor voting
principle is introduced into the TV model and a novel texture image denoising
method using the combination of tensor voting and total variation minimization
is proposed. In the new model an image structure saliency function is given to
replace the lagrangian multiplier in TV model, which can adjust the regularizing
term and fidelity term according to the different areas of image structure
features. Theoretical analysis and numerical experiment show that compared with
other existing approaches the new model has an obvious anti-jamming capability
and can accurately and subtly describe the sharp edges, feature structures and
smooth areas, and can overcome staircase effect and over-smoothing generated by
other TV models. Especially for the images with rich texture features and low
signal to noise ratio (SNR), it can remove the noise while preserving
significant image details and important characteristics and improve the image
denoising effect. |
Keywords: |
Partial Differential Equation (PDE), Total Variation, Tensor Voting, Image
Frequency, Texture Image Denoising |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 294 - 302 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
APPLICATION OF FACTOR NEURAL NETWORK IN MULTI-EXPERT SYSTEM FOR OIL-GAS
RESERVOIR PROTECTION |
Author: |
LI YANG, LIXUE CHEN, XINYU GEN, LIN WANG, JUN ZHANG |
Abstract: |
Knowledge representation and reasoning model play an important role in
multi-expert system. In this paper, a new knowledge representation method,
factor neural network theory(FNN), is used in multi-expert system for oil-gas
reservoir protection. Firstly, by introducing factor and factor space theory,
knowledge representation model based on factor state space is presented.
Secondly, analog factor neural network structure is analyzed to solve reasoning
problem of expert system. For illustration, fuzzy reasoning theory is utilized
in factor neural network to verify the effectiveness of our proposed method. The
application of the expert system shows that factor neural network theory is
valid in knowledge representation and reasoning model and blackboard mechanism
based on point-to point can solve the communication problem among sub-expert
systems better. As a result, our proposed method based on FNN can effectively
improve the accuracy of inference results. |
Keywords: |
Analog Factor Neuron, Agent, Oil-gas reservoir protection, FNN |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 303 - 308 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ANALYSIS ON THE MAJOR INFLUENCE FACTORS OF ENERGY INTENSITY CHANGING |
Author: |
XIA WANG, LU TANG |
Abstract: |
Based on the energy intensity data of period 1990-2008, this paper uses impulse
response function and variance decomposition model to empirical analysis the
main influencing factors and effects of energy intensity,. The empirical results
show that: the energy intensity of itself, and the proportion of secondary
industry have a larger impact on energy intensity; the change of energy price
and technological progress also play a certain impact on energy intensity; and
the link with the internal relations and interaction mechanisms, which can play
an active role in improving energy efficiency . |
Keywords: |
Energy Intensity, Cointegration Theory, Impulse Response, Variance Decomposition |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 309 - 313 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ATPL- A TRUST MANAGEMENT POLICY LANGUAGE BASED ON TEAMA |
Author: |
QI JING, LI CHENG, SHUBIN LIAO, SUKE LI |
Abstract: |
Ad Hoc network is a multi-hop wireless network, consist of the self-organizing
wireless mobile nodes and without fixed infrastructure, but its openness brings
“stranger access” problem. Trust management strategy based on trust evaluation
can solve such problems. By entrusting trust certificate with trust value,
access control policy can be passed to "strangers", and make them able to access
the nodes in Ad Hoc network. In order to achieve the trust management based on
trust evaluation, this paper proposes policy language for trust management in Ad
hoc network. ATPL is defined based on constraint Datalog, realizes the three
trust delegation chain of TEAMA by entrusting authorization rules, and completes
the calculation of certificate execution and delegation trust value at the same
time. This paper defines the syntax of ATPL, discusses the safety of ATPL rules,
and proposes the basic safety convention of ATPL and safety statute. By the
discussion of ATPL explanatory semantics, this paper solves the legacy security
issue, and proves that ATPL rule is safe under various security constraints
defined herein. |
Keywords: |
Trust Management, Trust Evaluation, Constraint Datalog |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 314 - 321 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
AUTOMATIC RECOGNITION OF FEATURES FROM CAD MODELS FOR MESH GENERATION |
Author: |
XIANGWEI ZHANG, LILI HUANG |
Abstract: |
Automatic recognition of features from CAD models is one of the key technologies
for mesh generation. This paper studies the algorithm for automatic recognition
of features from CAD models in STL data format. Firstly, a new STL data file
with topological connection is constructed for the calculation. Secondly, the
coplanar relationships among all the triangle facets are constructed initially.
The third step is to determine whether all the boundary edges on the same face
can make up an end to end closed circle. And the boundary edges are filled out
by combining the edge-based method and the face-based method. Fourthly, the
solid model face, feature lines and feature point are recognized. Finally, two
examples are given to prove the feasibility and validity of the algorithm. |
Keywords: |
Feature Recognition, CAD Models, Boundary Edge, Mesh Generation |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 322 - 327 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
CHAOTIC PARTICLE SWARM OPTIMIZED KRIGING MODEL FOR CURVE FITTING |
Author: |
LI ZHANG |
Abstract: |
Chaotic particle swarm optimization (CPSO) algorithm is proposed to optimize the
Kriging model, which can improve the precision of curve fitting. A typical
example is selected to demonstrate the advantage of the optimized Kriging model,
compared with other curve fitting tools. |
Keywords: |
Kriging, Chaotic Particle Swarm Optimization, Curve Fitting |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 328 - 323 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
REMOTE SENSING IMAGE MATCHING ALGORITHM BASED ON HARRIS AND SIFT TRANSFORM |
Author: |
JINGYU YANG, SONG WANG, XIAOGANG DU |
Abstract: |
Image matching is a key part of many remote sensing image processing and image
analysis. The traditional gray correlation matching algorithm based on corner
point because they do not have the rotational invariance requires manual
intervention to roughly match can not be automated. SIFT (Scale invariant
feature transform) algorithm to solve the image rotation, scaling and other
issues, but for the geometry characteristics clearer, richer texture information
in terms of the high-resolution remote sensing images, the algorithm consumes
more memory, speed of operation is slow the problem is very prominent. The
combinations of two proposed image matching algorithms are based on Harris
corner and SIFT descriptor. The experimental results show that, compared to the
SIFT algorithm, this algorithm significantly cut computation time, while
preserving the rotational invariance of the SIFT descriptor and adaptation to
light gray correlation algorithm can not overcome disadvantage of fully
automatic, in the high better resolution remote sensing image matching. |
Keywords: |
Harris Corner, SIFT Descriptor, Remote Sensing Image, Reach Texture Information,
Image Matching |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 333 - 338 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ANALYSIS ON LONG-TERM RELATIONSHIP BETWEEN ECONOMIC GROWTH AND MORTALITY FROM
TRAFFIC ACCIDENT |
Author: |
RONG HU, JUN ZHANG, CHUNPING ZHONG, JIAN TIAN |
Abstract: |
In this paper we investigate the long-term relationship between the economic
growth in China and the number of people who died in traffic accident by using
the time series data in the period from 1990 to 2008 in China. Our study found
an inverted U-shaped relationship between the economic growth and the number of
people who were killed in traffic accidents. The number of death in traffic
accidents increased with the development of economy in early stage. However, as
the economy has been developed into certain level, the mortality rate of the
traffic accidents start to decrease, which clearly indicates that the Smeed’s
law can also be applied in China. Besides the level of economic development, we
also analyses some other factors that may influence traffic accidents. These
factors can either accelerate or decelerate the inverted U-shape relationship. |
Keywords: |
Economic Growth, Traffic Accidents, Smeed’s Law |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 339 - 346 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
NECESSARY OPTIMALITY AND DUALITY FOR MULTI OBJECTIVE SEMI-INFINITE PROGRAMMING |
Author: |
XIAOYAN GAO |
Abstract: |
The aim of this paper is to deal with a class of multiobjective semi-infinite
programming problem. For such problem, several necessary optimality conditions
are established and proved using the powerful tool of subdifferential and the
generalized convexity namely generalized uniform convexity. We also formulate
the Wolf type dual models for the semi-infinite programming problem and
establish the corresponding duality theorems. |
Keywords: |
Subdifferential, Semi-Infinite Programming, Necessary Optimality Condition, Wolf
Duality |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 347 - 354 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ON PRICE AND SERVICE COMPETITION WITH SUBSTITUTABLE GOODS |
Author: |
BIN WANG, JING WANG |
Abstract: |
This research studies a case that two enterprises produce two different but
substitutable goods. The consumer demand depends on two kinds of factors: prices
and service levels of the product and substitutable product. This article is
based on three scenarios: Nash Equilibrium, Enterprise Alliance and Stackelberg.
Game-theoretic framework is applied to find the optimal solutions for every
participant. This research has conclusions as follow. Firstly, if market base of
one product increases or one product has some economic advantage in providing
service, it benefits for itself but is bad for substitutable product. Secondly,
enterprises will provide fewer services, gain fewer customers, but earn more
profit in Enterprise Alliance than in Nash Equilibrium. Thirdly, when one
enterprise is dominant, if substitutable goods influence its demand greatly, it
will take the advantage to earn more profit; otherwise, it will give up the
advantage to seek the Enterprise Alliance. |
Keywords: |
Substitutable Goods, Pricing Strategy, Service Level |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 355 - 364 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A HEALTHY DEVELOPMENT MODEL OF REAL ESTATE MARKET BASED ON BP NEURAL NETWORK |
Author: |
DAN LIU |
Abstract: |
Based on the analysis of known literatures, this article constructs the
sustainable development evaluation model of real estate market from four
aspects, including the harmonious development with local economy, reasonable
prices, structural balance and financial coordination. Second, This article
empirical also analyzes the healthy development of Nanchang real estate market
based on the BP neural network model. The results show that the Nanchang real
estate market is healthy from 2008 to 2010. Finally, we explained the reasons
based on the empirical results. |
Keywords: |
Impact factor, BP Neural Network, Real Estate Market |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 365 - 371 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ADAPTIVE CONTROL FOR A CLASS OF HIGH-ORDER NONLINEAR UNCERTAIN SYSTEMS |
Author: |
DAOZHENG LIAO |
Abstract: |
The adaptive stabilization problem of a class of high-order nonlinear systems
with uncertainties is presented in this work. The difficulty of our design is
that the Jacobian linearization of the system under consideration is
uncontrollable. The total design of the controller was divided into two steps.
First we study the nominal system without uncertainties. Then we adopt a Radial
basis function neural networks ( RBF NN ) to approximate the system
uncertainties, and design an robust adaptive control law to stabilize the system
using the so-called integral sliding mode design approach based on the RBF NN.
The reachability of the sliding surface and the convergence of the weight of the
neural networks are showed by the Lyapunov theory. Finally, a simulation example
is given to illustrate the effectiveness of the proposed method. |
Keywords: |
Nonlinear Systems, Integral Sliding Mode, Adaptive Control, Neural Networks |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 372 - 376 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
PSO-BASED DBSCAN WITH OBSTACLE CONSTRAINTS |
Author: |
XIAONING FENG ,ZHUO WANG , GUISHENG YIN,YING WANG |
Abstract: |
This paper presents a new PSO-based optimization DBSCAN space clustering
algorithm with obstacle constraints. The algorithm introduces obstacle model and
simplifies two-dimensional coordinates of the cluster object coding to
one-dimensional, then uses the PSO algorithm to obtain the shortest path and
minimum obstacle distance. At the last stage, this paper fulfills spatial
clustering based on obstacle distance. Theoretical analysis and experimental
results show that the algorithm can get high-quality clustering result of space
constraints with more reasonable and accurate quality. |
Keywords: |
Space Clustering, Obstacle Constraints , Particle Swarm Optimization Algorithm,
DBSCAN |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 377 - 383 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
SIMULATION COMPOSITION APPROACH FOR AUV |
Author: |
ZHUO WANG, XIAONING FENG, LAN MA |
Abstract: |
The computation of the simulation models is complex and the behavior sequence
must be updated dynamically in AUV simulation system. The simulation system
composability development framework is provided to solve these problems. The
calculus is extended to describe the time properties of models in the framework.
And simulation models are formal described by the extended calculus. Then the
behavior composability is validated by reduction and bisimulation of calculus.
The framework is validated by the simulation composition example and the
construction of AUV simulation test system. The framework can complete the
description and the dynamical composability of various models in the distributed
real time simulation system. |
Keywords: |
Composable Simulation, Simulation Model,; Calculus, AUV |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 384 - 390 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
NUMERICAL SIMULATION OF COUPLING COEFFICIENT OF APERTURES IN MISSILE ENCLOSURE |
Author: |
CHAO MAO, JIJIN TONG, ZHONG LIU, ZHIMING QIU |
Abstract: |
Aperture coupling is the main coupling mode through which electromagnetic pulse
(EMP), ultra wideband (UWB) and high power microwave (HPM) can disturb or damage
electronic equipments of the missile enclosure. To get knowledge of the coupling
effects of apertures with different shapes and positions, coupling processes of
HPM into the missile enclosure are investigated. The simulation results indicate
that: the axial direction coupling coefficient is larger than the radial
direction coupling coefficient. So to damage the electronic system of the
missile better, the incident wave should be axial direction. |
Keywords: |
Missile Enclosure, Aperture Coupling, Finite Element Method, Coupling
Coefficient |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 391 - 396 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
SECURITY ANALYSIS FOR INTERNET OF SHIPS |
Author: |
QI JING, LI CHENG |
Abstract: |
With the development of water shipping technology, research and construction of
the waterway information technology has received much more attention. However,
smart shipping system still faces many problems, such as the shipping management
is sufficiently sophisticated the services are not comprehensive, our travel is
not humanistic, and the security is not enough. As an emerging interdisciplinary
research focus, the internet of ships is proposed to solve these problems. Based
on the analysis of the construction of the shipping information management and
service, as well as the main problems existed, this paper focuses on the basic
architecture and features of the internet of ship, explore the security problem
existed in the internet of ship, and list issues need to be addressed in terms
of security of internet of ship clearly. |
Keywords: |
Internet of Ship, AIS, Intelligent Shipping System |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 397 - 403 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A QUEUE SCHEDULING AND MANAGEMENT SYSTEM BASED ON IXP2400 NETWORK PROCESSOR |
Author: |
CHENXIA ZHANG, JIA CHEN |
Abstract: |
Multidimensional queue management and scheduling system based on IXP2400 network
processor ,is used for network flow of many attribute to manage and schedule.
The system has N queues as well as the number of network package attribute .Each
queue set as equal Mi queue as i attribute value ,reached the packet is
allocated by attribute and attribute type to manage and schedule in order to
supply different servers. The system at most need MN queue complete classify and
control detailed granularity, and make it simpler than current technology. The
system can apply for many aspects, for example QoS guarantee, classified
servers, band share, classified rate control and filter, etc. |
Keywords: |
Network Processor, Multi-dimension, Schedule, Queue Service |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 404 - 409 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
APPLICATION OF EMBEDDED SYSTEM IN CERAMIC MACHINERY AUTOMATION |
Author: |
JIA CHEN, CHENXIA ZHANG |
Abstract: |
This paper introduces the basic conception of embedded system, ceramic machine
cloth system work flow as well as in this system the use of hardware Wincon8000
series automatic controller and i8092F motion control module and software
development using embedded Visual C++ platform. The design and implementation of
system in the preservation and processing of motion control parameters and the
users' information database module、user management module as well as the control
of servo motor motion control module. These modules are used GUI as the
operation interface, facilitate the enterprise general operators use. Due to the
adoption of pulse train output drive servo unit, improve the anti-interference
ability greatly, and also improves reliability at the same time. Using PAC as
the automatic controller can greatly reduce the cost, and it is easy to expand,
and also the ceramic production enterprises are of great significance. |
Keywords: |
Embedded System, Ceramic Machine Cloth System, Automatic Controller |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 410 - 415 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ANALYSIS ON ALGORITHM AND APPLICATION OF CLUSTER IN DATA MINING |
Author: |
YUHUA FENG |
Abstract: |
Cluster analysis in data mining is an important research field; it has its own
unique position in a large number of data analysis and processing. The research
about Clustering makes a spurt development after more than 20 years, and then
produced a variety of types and application of the clustering algorithm. Data
Mining is one of the pop researches in information industry last few years. This
paper analyses some typical methods of the cluster analysis and represent the
application of the cluster analysis in Data Mining. |
Keywords: |
Data Mining, Cluster Analysis, Cluster Algorithm, K-Means
|
Source: |
Journal of Theoretical and
Applied Information Technology
pp 416 - 419 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
OPTIMIZATION OF DESIGN PARAMETERS AND INTELLIGENT BACK-ANALYSIS OF HIGH BENCH
DUMP SLOPE IN OPEN PIT |
Author: |
CHUNLAI QU, LAN QIAO, FANG CHENG |
Abstract: |
Dump engineering is an important part in production processes of open-pit
mining. In order to complete the mine production tasks smoothly, it is necessary
to make the most of land possessed by the dump in an economical and reasonable
way. In the paper, we use the dump of Qidashan iron mine which belongs to Anshan
Iron and Steel Group as an engineering background to achieve the aim of
improving the dump capacity. Basic on the limit equilibrium method to analysis
on dump slope parameters which must be inversed in the displacement and back
analysis, we constructed the Knowledge Base for the inversion of slope
mechanical parameters by using orthogonal experiments and numerical simulation,
and substituted the in-situ monitoring data after establishing the neural
network prediction model. Then we inferred the equivalent mechanical parameters
of scattered particles of dump, it can provide a reliable calculation parameters
for slope design, thereby maximize the dump capacity and improve the open pit’s
economic benefits. |
Keywords: |
Dump, Slope Stability, Orthogonal Design, Intelligent Back-Analysis |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 420 - 425 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
GREENHOUSE INTELLIGENT CONTROL SYSTEM BASEDON STM32F107 AND SWITCHED ETHERNET |
Author: |
TIANHUA LI, GUOYING SHI, JIALIN HOU, MIN WEI, XUQING LANG, GUANSHAN |
Abstract: |
For complicated wiring and high-cost, non-uniform protocol and other issues in
the common greenhouse cluster control system, a new system is designed, based on
Ethernet and 32-bit ARM STM32F107.The STM32F107VCT6 is the core of lower
machine, using its built-in 12 bit A/D converter to acquire data of
soil moisture, light intensity, ambient temperature and other environmental
factors, and coming with fullspeed USB (OTG) interface and Ethernet 10 /100M MAC
modules to achieve the exchange of data with removable storage devices and the
Internet connection, using the touch screen to set up and display of the
relevant parameters. For the host computer using the B/S mode, the user can
access to remote data and control of greenhouse. Practice shows that the
application of highly integrated and broadband technologies reduce system costs,
improve communication quality and system stability. |
Keywords: |
Intelligent Greenhouse, STM32F107, Ethernet, Measurement and Control System |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 426 - 433 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
HYBRID CLUSTERING ALGORITHM BASED ON PSO WITH THE MULTIDIMENSIONAL A-SYNCHRONISM
AND STOCHASTIC DISTURBANCE METHOD |
Author: |
JUNYAN CHEN |
Abstract: |
It is well known that solutions of k-means algorithm depend on the
initialization of cluster centers and the final solution converges to local
minima. In this paper, we introduce a clustering approach that combines ideas
from modified particle swarm optimization (PSO) and k-means. The potential
benefits of this technique are investigated by incorporating the
multidimensional asynchronism and stochastic disturbance method to the velocity
in the particle swarm optimizer to create new modifications of the clustering
for k-means algorithmic model, which could keep populations diversity and
ability of search global optimum as well as solve the problem of the curse of
dimensionality. The simulation results of web log dataset show that the proposed
algorithm, compared with the five previous developed PSO techniques, provides
enhanced performance and maintains more diversity in the swarm. |
Keywords: |
Multidimensional Asynchronism, Stochastic Disturbance, Particle Swarm
Optimization, Clustering, K-means algorithm |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 434 - 440 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
SOCIAL NETWORK ANALYSIS OF RECYCLING PRODUCTION CHAIN: THE CASE OF GUIGANG EIP |
Author: |
LING TANG, Jian L, XIAOFENG SUN |
Abstract: |
Within the rapid industrialization, the noticeable environmental problems are
prominent in the world. The eco-industrial park (EIP) is a new form of
industrial organization. This article used the social network analysis (Social
Network Analysis, SNA) to analyze the structure of the recycling production
chain in Guigang (China), proving useful in the analysis of the structural
characteristics of the network and the different actors play. An index system
including density of a network, clustering coefficient, average path length,
centrality and core-periphery structure is established to measure the structural
features. This paper concludes that, SNA provides a comprehensive approach and
analytical framework to understand the structural elements of recycling
production chain, and the analysis can help to clarify some light structural
elements conditioning the operation of the network and a different actor to play
the role. |
Keywords: |
Social Network Analysis; Recycling Production Chain; Eco-Industrial Park |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 441 - 444 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
DYNAMIC MODELING OF LANDSLIDE THROUGH GEOLOGICAL MODELING AND FINITE ELEMENT
SUBDIVISION |
Author: |
WEIHUA HUA, YANYUN LIAO |
Abstract: |
Landslide disaster is a kind of main geological disasters. Countries in the
world are all harmed by landslide disaster seriously. Achieving landslide’s 3D
dynamic simulation is helpful for the relevant regulatory authorities to guide
the Prevention and Treatment of landslide disasters. For simulating landslide
more intuitive and more realistic, and predicting the loss situation, we
achieved landslide’s 3D dynamic simulation based on landslide information
extraction, modeling, finite element subdivision, and applying
motion-displacement equation. At the same time, we take landslide disaster
effect factors into consideration as the parameters variable of
motion-displacement equation. The effect factors include lithology, soil
moisture, vegetation coverage, acceleration of gravity and terrain and so on. At
last, the simulation result would be taken as a guide to provide reference in
landslide disaster relief. As a result, we can realize the dynamic simulation of
landslide process, calculate area influenced by landslide, by calculate
landslide’s motion trajectory. On basis of it we can reduce loss amount of our
economy caused by the landslide also. |
Keywords: |
Landslide, Finite Element Mesh, Motion-Displacement Equation, Geological
Modeling |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 445 - 452 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A COMPARATIVE STUDY OF VECTOR CONTROLLED PMSM DRIVE WITH PI SPEED CONTROLLER FOR
LONG CABLE IMPLEMENTATION |
Author: |
CHEOK YONG SENG, ZULKIFILIE IBRAHIM |
Abstract: |
A comparative study on vector controlled Permanent Magnet Synchronous Motor (PMSM)
drive with Proportional-Integral (PI) speed controller for long cable
implementation. As reported by previous research, long cable caused an over
voltage problem at motor terminal and could be double from the pulse output
voltage at inverter terminal. However, this paper addresses another important
application issue, namely increased losses in the motor drive system caused
degrade and instability of the speed performances when long cable lengths are
required. Two different length cables which are 1 meter and 10 meter connected
from dSPACE to PMSM and the results are compared and evaluated. A DS1103DSP
embedded with the Real-Time Interface (RTI) provided by dSPACE, hysteresis
current controller scheme and PI control has been developed for a high
performance control for PMSM drives The robustness of different length of cable
over load disturbance, step response and change at command setting with inertia
variations are studied. |
Keywords: |
DS1103, dSPACE, Long Cable, PMSM, Proportional-Integral, Real-Time Interface,
Vector Control |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 453 - 460 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
SIMILARITY TESTING BY PROOF AND ANALYSIS OF PARTITION FOR OBJECT ORIENTED
SPECIFICATIONS |
Author: |
KHALID BENLHACHMI, MOHAMMED BENATTOU |
Abstract: |
The work presented in this paper is devoted to establish the theoretical model
for the evaluation of the behavior of redefined methods in a subclass with the
behavior of the original methods in the super-class using the inheritance
mechanism. We analyze firstly, how a redefined method can use the specification
of its corresponding method in the super-class. Secondly, we present the
relationship between the test model of a redefined method in a subclass and the
original method in a super-class. Our approach proposes a new concept which
compares the behavior of methods, and gives the conditions where this comparison
can induce a similar behavior. |
Keywords: |
Inheritance, Formal Specification, Conformity Test, Constraints Resolution,
Valid Data, Invalid Data, Test Data Generation. |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 461 - 470 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A SMALL SPHERE AND PARAMETRIC VOLUME FOR SUPPORT VECTOR DOMAIN DESCRIPTION |
Author: |
MOHAMED EL BOUJNOUNI, MOHAMED JEDRA, NOUREDDINE ZAHID |
Abstract: |
Support Vector Domain Description (SVDD) is inspired by the Support Vector
Classifier. It obtains a sphere shaped decision boundary with minimal volume
around a dataset. This data description can be used for novelty or outlier
detection. Our approach is always to minimize the volume of the sphere
describing the dataset, but following the value of a parameter, which controls
its volume and plays a compromise between the outlier’s acceptance and the
target’s rejection. Simulation results on seven benchmark datasets have
successfully validated the effectiveness of the proposed method. |
Keywords: |
Parametric Volume, Small Hypersphere, Compromise |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 471 - 478 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
FEATURE SELECTION OF SUPPORT VECTOR DOMAIN DESCRIPTION USING GAUSSIAN KERNEL |
Author: |
MOHAMED EL BOUJNOUNI, MOHAMED JEDRA, NOUREDDINE ZAHID |
Abstract: |
The performance of the kernel-based learning algorithms, such as support vector
domain description, depends heavily on the proper choice of the kernel
parameter. It is desirable for the kernel machines to work on the optimal kernel
parameter that adapts well to the input data and the pattern classification
tasks. In this paper we present a novel algorithm to optimize the Gaussian
kernel parameter by maximizing a classical class separability criterion, and the
problem is solved through a steepest descent algorithm, Simulation results on
six benchmark datasets have successfully validated the effectiveness of the
proposed method. |
Keywords: |
Support Vector Domain Description, RBF Width, Class Separability |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 479 - 485 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
TEST EXECUTION CONTROL WITH TIMING CONSTRAINTS FOR TESTING DISTRIBUTED SYSTEMS |
Author: |
SALMA AZZOUZI, MOHAMMED BENATTOU, HASSAN CHARAF |
Abstract: |
The development of distributed testing frameworks is more complex, where the
implementation process must consider the mechanisms and functions required to
support interaction as long as the communication and the coordination between
distributed testing components. The typical reactions of such systems are the
generation of errors ‘set: time outs, locks, observability, controllability and
synchronization problems. The first contribution in this study present a way to
control the test execution of distributed testing components by introducing the
synchronization messages and we show how the problems of control and
synchronization can be solved by the same process. In other side, we show that
in practice the distributed testing process must not only check if the exchanged
events have been observed, but also the dates when these events have been
occurred and then the distributed testing frameworks must consider some timing
constraints. |
Keywords: |
Distributed testing; Controllability, Observability; Synchronization; Timing
Constraints |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 486 - 498 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
GOAL PROGRAMMING BASED MASTER PLAN FOR CYCLICAL NURSE SCHEDULING |
Author: |
WAN ROSMANIRA ISMAIL, RUZZAKIAH JENAL, NUR ASYIKIN HAMDAN |
Abstract: |
Constructing timetable for nurses in hospital is a challenging job for the head
nurse or nurse manager as the task is done repeatedly for every specified
period. It requires a lot of time and effort for generating a good and fair
timetable. In order to overcome the problem, a cyclical nurse schedule using a
0-1 goal programming is proposed. The timetable will be the master plan that
would help the head nurse or nurse manager to schedule the nurses in a yearly
basis. The proposed model has also managed to satisfy the hospital’s policies
and the nurses’ preferences. The model has provided an unbiased schedule and
thus leads to an overall satisfaction and fairness to the nurses. The developed
model has been solved using LINGO software and the result is found to be better
compared to the present method used. |
Keywords: |
Mathematical Model; Goal Programming; Cyclical Schedule; Nurse Scheduling |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 499 - 504 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
MAGNETIC CURRENT DISTRIBUTION ANALYSIS OF CPW FED ARROW SHAPED UWB ANTENNA |
Author: |
D.THIRIPURASUNDARI, D.S.EMMANUEL |
Abstract: |
An investigation of magnetic current distribution of CPW fed arrow shaped UWB
antenna is reported. This enables the precise prediction of working principle of
UWB antenna, since the traditional UWB antenna simulations ignore important
details. The computation was performed numerically for an arrow shaped antenna
at different resonant frequencies at various input current phase changes and was
found that the traveling wave characteristic of the antenna exhibits the UWB
property. The computed result is compared with different geometries, such as
circular disc monopole and eared antenna. |
Keywords: |
CPW feed, UWB Antenna, Magnetic Current Distribution |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 505 - 509 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
ATTRIBUTE SELECTION USING ARTIFICIAL NEURAL NETWORKS – A CASE STUDY OF ISCHEMIC
HEART DISEASE |
Author: |
K.RAJESWARI, Dr.V.VAITHIYANATHAN |
Abstract: |
Attribute selection also called as feature selection is a preprocessing
technique to select a set of features or subset of features from the available
large collection of features. An artificial neural network is the simulation of
a human brain which learns with experience. Efficiency of a model or a system in
terms of cost, time and accuracy will greatly improve if proper features of a
system are selected. This proposed method uses Artificial Neural Network for
selecting the interesting or important features from the input layer of the
network. A Multi Layer Perceptron Neural Network is used for selection of
interesting features from a Ischemic heart data base with 712 patients.
Initially the number of attributes was 17 and after feature selection the number
of attributes was reduced to 12. All combination of features is attempted as
Inputs of a Neural Network. When the input features become 12 the predicted
accuracy during training is high as 87.36% using 10 – fold cross validation.
Further removal of features lowers the accuracy and hence the interesting
attributes selected for prediction is concluded to be as 12 for this Ischemic
Heart Disease data set. |
Keywords: |
Data Mining, Feature Selection, Multi Layer Perceptron,
Neural Network, Ischemic Heart Disease(IHD) |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 510 - 515 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
Title: |
A SURVEY ON APPLICATION OF ARTIFICIAL INTELLIGENCE FOR BUS ARRIVAL TIME
PREDICTION |
Author: |
SEYED MOJTABA TAFAGHOD SADAT ZADEH, TONI ANWAR, MINA BASIRAT |
Abstract: |
With the intention of satisfying mobility requirements for trustworthy, healthy
and secure transport, there are more considerations on the establishment of
intelligent transport systems (ITS) currently. Advanced traveller information
systems (ATIS), as a part of ITS, is to provide travel time information as
precisely as possible. Basically, there are reasons leading to delay in bus
arrival time, e.g. traffic jam, ridership distribution, and climate situation.
Consequently, these issues impress on growing travellers waiting time,
postponement in timetable, rise in transit’s expense and private vehicles’ uses,
dissatisfaction of passengers and reduction of passengers, providing of precise
transit travel time information are significant since it will result in further
transit passages and upsurge the acquiescence of passengers. In this paper, we
first explore the importance of arrival time for passengers and present a new
taxonomy of bus arrival prediction models, and then review some recent works.
Finally, summary of the main technologies illustrate big picture of the studies. |
Keywords: |
Bus Travel Time Prediction, Intelligent Transportation Systems (ITS), Advanced
Traveller Transportation Systems (AITS), Kalman filtering, machine learning,
statistical methods, ANN |
Source: |
Journal of Theoretical and
Applied Information Technology
pp 516 - 525 Vol. 46. No. 1 -- 2012 |
Full
Text |
|
|
|