|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
January 2013 | Vol. 47 No.1 |
Title: |
PLACEMENT AND SIZING OF DISTRIBUTED GENERATORS IN DISTRIBUTED NETWORK BASED ON
LRIC AND LOAD GROWTH CONTROL |
Author: |
PARA KALPANA, Dr. A.LAKSHMI DEVI |
Abstract: |
Distributed generations (DGs) play an important role in distribution networks.
Among many of their merits, loss reduction and voltage profile improvement are
two of them. Studies show that non-optimal and non-optimal sizes of DG units may
lead to increase in losses and poor voltage regulation. This paper aims at
determining optimal DG location and sizing. The evaluation of best-site and size
for DG unit is based on Long-Run Incremental Cost indicating the forward-looking
network capacity cost at each node. By comparing DG connection cost with the
decrement of the network capacity cost resulting from the DG capacity, the
appropriateness of DG connecting to distribution network can be determined. On
this basis, a heuristic approach is applied to identify best site and size of DG
to guide the connection of DG. The proposed method is tested on an IEEE 33 bus
radial distribution system. |
Keywords: |
Distributed Generation(DG), Long-Run Incremental Cost(LRIC) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 001 - 009 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
STATIC ANALYSIS OF WAVELENGTH TUNING IN TWO SECTION INDEX COUPLED DFB LASERS
USING THE TRANSFER MATRIX METHOD |
Author: |
H.BOUSSETA, A.ZATNI, A.AMGHAR, A.MOUMEN, A.ELYAMANI |
Abstract: |
The wavelength tuning is an important issue for distributed feedback (DFB)
lasers designs and applications. In this paper we have presented an algorithm to
analyze the wavelength tuning characteristics of two-section index-coupled
(TS-IC) DFB lasers in above threshold regime, by the means of the transfer
matrix method (TMM), and the carrier rate equation. The versatility of the
theoretical model in the present work is demonstrated in an analysis of static
characteristics of TS-IC-DFB lasers, which illustrated the important influence
of coupling coefficient, cavity condition and injection current on the
wavelength tuning. Therefore, The TS-IC-DFB lasers will be useful in optical
communication systems using wavelength division multiplexed (WDM) networks. |
Keywords: |
Wavelength Tuning, Distributed Feedback (DFB) Lasers, Transfers Matrix Method (TMM),
Static Characteristics |
Source: |
Journal of Theoretical and Applied Information Technology
pp 010 - 017 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
FAULT DETECTION WITH OPTIMUM MARCH TEST ALGORITHM |
Author: |
NOR AZURA ZAKARIA, W.Z.W. HASSAN, I.A. HALIN, R.M. SIDEK, , XIAOQING WEN |
Abstract: |
This paper presents a research work aimed to detect previously-undetected
faults, either Write Disturb Faults (WDFs) or Deceptive Read Destructive Faults
(DRDFs) or both in March Algorithm such as MATS++(6N), March C-(10N), March
SR(14N), and March CL(12N). The main focus of this research is to improve fault
coverage on Single Cell Faults as well as Static Double Cell Faults detection,
using specified test algorithm. Transition Coupling Faults (CFtrs), Write
Destructive Coupling Faults (CFwds) and Deceptive Read Destructive Faults (CFdrds)
are types of faults mainly used in this research. The experiment result
published in [1] shows BIST (Built-In-Self-Test) implementation with the new
algorithm. It provides the same test length but with bigger area overhead, we
therefore proposed a new 14N March Test Algorithm with fault coverage of more
than 95% using solid 0s and 1s Data Background (DB). This paper reveals the
design methodology to generate DB covers all memories function by applying
non-transition data, transition data, and single read and double read data. The
automation hardware was designed to give the flexibility to the user to generate
other new March Algorithm prior to the selected algorithm and analyzed the
performance in terms of fault detection and power consumption. |
Keywords: |
Deceptive Read Destructive Faults; Write Disturb Faults; March Test Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
pp 018 - 027 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
RULES – TL: A SIMPLE AND IMPROVED RULES ALGORITHM FOR INCOMPLETE AND LARGE DATA |
Author: |
HEBAH ABDULAZIZ ELGIBREEN, MEHMET SABIH AKSOY |
Abstract: |
In every aspect of life, many information is flowing around in which human can
take advantage of. Thus, machine learning was born to gather such information
and learn how it can autonomously deal with a certain problem. Different domains
have grown to serve different purposes in the machine learning field. One of the
mostly active domains in this field is Inductive Learning. One algorithm family
developed in inductive learning is RULES. Specifically, it is a covering
algorithm family where rules are directly induced from a given set of examples.
However, two major deficiencies were found in the algorithms that belong to this
family. They need to tradeoff between time and accuracy while searching for the
best rule and incomplete data were inappropriately handled. Consequently, this
paper proposes a new algorithm that is built based on RULES-6. It uses an
advance machine learning method called “transfer learning” to gather the
knowledge of other agents in different domains and use it as the base knowledge
that would reduce the time of search. In addition, the transferred rules are
also used to fill missing classes in order to consider not only the labels
available in the target task but also the possibility of future cases. Finally,
the performance of the proposed algorithm will be tested and compared to other
rule induction algorithms to prove that it actually improved the accuracy,
reduced the error rate, and consumed a small amount of time. |
Keywords: |
Rules Induction, Transfer Learning, RULES Family, Covering Algorithms, Inductive
Learning |
Source: |
Journal of Theoretical and Applied Information Technology
pp 028 - 040 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
STRATEGIC BUSINESS AND IT ALIGNMENT: REPRESENTATION AND EVALUATION |
Author: |
KARIM DOUMI, SALAH BAÏNA AND KARIM BAÏNA |
Abstract: |
Nowadays, business IT alignment has become a priority in most large
organization. It is a question of aligning the information system on the
business strategies of the organization. This step is aimed at increasing the
practical value of the information system and makes it a strategic asset for the
organization. Many works showed the importance of documentation, the analysis
and the evaluation of business IT alignment, but few proposed solutions
applicable to the strategic and functional level. This paper aims has to fill
this gap by proposing a simple approach for modeling and evaluate enterprise
strategy in the context of strategic alignment. This approach is illustrated by
case study of a real project in a Moroccan public administration. |
Keywords: |
Business IT Alignment, Goals Modeling, Enterprise Architecture, Information
System, Evaluation, Metric |
Source: |
Journal of Theoretical and Applied Information Technology
pp 041 - 052 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
EMERGING AND PROSPERING TRENDS IN CRIME ANALYSIS AND INVESTIGATION SYSTEMS: A
LITERATURE REVIEW |
Author: |
RIZWAN IQBAL, MASRAH AZRIFAH AZMI MURAD, NURFADHLINA BINTI MOHD SHAREF |
Abstract: |
Crime analysis and investigation systems play a critical role in battling crime
and war against terrorism. This paper is a detailed literature review on current
crime analysis and investigation systems developed to date. The reviewed
literature is divided into two broad categories, "ontologies" and "clustering
and classification". The paper encompasses a detailed discussion on systems
belonging to both categories. During literature review, it was discovered that
over the years evolving crime systems took inspiration from their predecessors,
in terms of functionality and features. Therefore, some interesting trends were
identified. These trends gradually prospered with the passage of time,
strengthening the capabilities of the evolving systems. This paper discusses
these trends in detail, and also anticipates the key features and design for the
future generation of crime systems. |
Keywords: |
Crime Analysis And Investigation Systems, Ontologies,
Clustering, Classification, Topic Detection And Tracking |
Source: |
Journal of Theoretical and Applied Information Technology
pp 053 - 059 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
A TWO-STEP FILTRATE LOCALIZATION METHOD FOR WIRELESS SENSOR NETWORKS |
Author: |
JUN ZHANG |
Abstract: |
In this paper, we address a wireless sensor network localization problem that
has high reliability in an environment where physical node destruction is
possible. We propose a range-independent localization algorithm called Two-Step
Filtrate Localization (TSFL), that allows sensors to passively determine their
location with high reliability, without increasing the number of reference
points, or the complexity of the hardware of each reference point or node. Based
on analyzing the principles of the two-step filtrate method, it is pointed out
that the importance of the second step to determine the maximum distance
estimation error conditions. In different attack mode, by the simulation of the
algorithm’s security is discussed. The results of the simulation show the
algorithm can get lower average positioning error, meantime malicious attacks
have little side effects to location performance. |
Keywords: |
Sensor Network, Localization, Two-Step Filtrate |
Source: |
Journal of Theoretical and Applied Information Technology
pp 060 - 063 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
ARCHITECTURE OPTIMIZATION MODEL FOR THE MULTILAYER PERCEPTRON AND CLUSTERING |
Author: |
Mohamed ETTAOUIL, Mohamed LAZAAR, Youssef GHANOU |
Abstract: |
This paper presents an approach called Architecture Optimization Model for the
multilayer Perceptron. This approach permits to optimize the architectures for
the multilayer Perceptron. The results obtained by the neural networks are
dependent on their parameters. The architecture has a great impact on the
convergence of the neural networks. More precisely, the choice of neurons in
each hidden layer, the number of hidden layers and the initial weights has a
great impact on the convergence of learning methods. In this respect, we model
this choice problem of neural architecture in terms of a mixed-integer problem
with linear constraints. We propose the genetic algorithm to solve the obtained
model. The experimental work for classification problems illustrates the
advantages of our approach. |
Keywords: |
Multilayer Perceptron, Non-linear optimization, Genetic algorithms, Supervised
Training, Clustering |
Source: |
Journal of Theoretical and Applied Information Technology
pp 064 - 072 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
NEW COMPUTATION TECHNIQUE FOR ENCRYPTION AND DECRYPTION BASED ON RSA AND ELGAMAL
CRYPTOSYSTEMS |
Author: |
ZULKARNAIN MD ALI, JASSIM MOHAMMED AHMED |
Abstract: |
Cryptography addresses the necessary elements for secure communication that
involved privacy, confidentiality, key exchange, authentication, and
non-repudiation. This paper proposed a new computation of encryption and
decryption that was based on the computation of RSA and ElGamal Cryptosystems.
The RSA is a public key encryption system that gets its security from the
difficulty of factoring large numbers. Meanwhile, the security of ElGamal is
depends upon the difficulty of a certain problem that was related to compute
Discrete Logarithms. The proposed technique shows better computation time
compared to both cryptosystems. All computation time for each algorithm also
presented at the end of this paper. However, this paper did not present the
security of the technique over the RSA and ElGamal. |
Keywords: |
RSA, ElGamal, Encryption and Decryption |
Source: |
Journal of Theoretical and Applied Information Technology
pp 073 - 079 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
COMPUTATIONAL ANALYSIS OF THE SIMPLE SEQUENCE REPEATS IN MUCIN-6 OF FOVEOLAR
CELLS |
Author: |
SIM-HUI TEE |
Abstract: |
In this study, a computational analysis has been carried out to investigate the
patterns of the simple sequence repeats (SSRs) in mucin-6 mRNA gene of human
foveolar cells. The computational analysis of SSRs is important because it can
provide insight into the diseases generated by SSRs. Our results show that
mucin-6 mRNA has a high relative frequency of dinucleotide and trinucleotide SSR
motifs. The trinucleotide SSRs have special significance because they constitute
the amino acid in the coding region of the gene. The analysis of trinucleotide
SSRs shows that the motifs from the category T9 is highly repetitive. This
research may provide insights into the biomedical research in the stomach
pathogenesis that is implicated by SSRs in mucin-6 gene. |
Keywords: |
Bioinformatics, Simple Sequence Repeats, Mucin-6, Foveolar
Cells, Genetic Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
pp 080 - 085 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
FUZZY LOGIC FOR CHEMO INFORMATICS – A REVIEW |
Author: |
RAJESH REGHUNADHAN, V. ARULMOZHI |
Abstract: |
Fuzzy logic and fuzzy systems are gaining widespread acceptance in a large
variety of fields, including but not limited to engineering, commercial,
forecasting, artificial intelligence, etc. This paper is for beginners who try
to use fuzzy logic in Chemoinformatics. Since, there are lot of uncertainties,
vagueness and ambiguity during drug design and other simulations carried out in
Chemoinformatics, there is a high need of understanding the ability of fuzzy
logic in representing and modeling these parameters in much effective and
efficient way. This paper presents an introductory review of fuzzy logic and its
applications to Chemoinformatics. |
Keywords: |
Fuzzy Logic (FL), Membership Functions (MF), Semi-Circular
Membership Function (SCMF), Fuzzy Rules (FR), Fuzzy Control (FC), Fuzzy
Inference Systems (FIS), Chemoinformatics |
Source: |
Journal of Theoretical and Applied Information Technology
pp 086 - 092 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
HUMAN ERRORS IN COMPUTER RELATED ABUSES |
Author: |
AHMAD SALEHI SHAHRAKI, MEHRNAZ NIKMARAM |
Abstract: |
The term “Human error” can simply be defined as an error which made by a human.
In fact, Human error is an explanation of malfunctions, unintended consequents
from operating a system. There are many factors that cause a person to have an
error due to the unwanted error of human. The aim of this paper is to
investigate the relationship of human error as one of the factors to computer
related abuses. The paper beings by computer-relating to human errors and
followed by mechanism mitigate these errors through social and technical
perspectives. We present the 25 techniques of computer crime prevention, as a
heuristic device that assists. A last section discussing the ways of improving
the adoption of security, and conclusion. |
Keywords: |
Human Errors, computer crime, Social Perspective, Technical
Perspective |
Source: |
Journal of Theoretical and Applied Information Technology
pp 093 - 097 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
SURVEY: VIDEO FORENSIC TOOLS |
Author: |
AHMAD SALEHI SHAHRAKI, HAMED SAYYADI, MOHAMAD HUSSEIN AMRI, MEHRNAZ NIKMARAM |
Abstract: |
Due to extension of using CCTVs and the other video security systems in all
areas, these sorts of devices have been introduced as the most important digital
evidences to search and seizure crimes. Video forensics tools are developed as a
part of digital forensics tools to analyze digital evidences and clear vague
points of them for presenting in the courts Existing video forensics tools have
been facilitated the investigation process by providing different features based
on various video editing techniques. In this paper, some of the most popular
video forensics tools are discussed and the strengths and shortages of them are
compared and consequently, an alternative framework which includes the strengths
of existing popular tools is introduced. |
Keywords: |
Forensic Tools; Video Forensic; Analysis Tools, CCTV |
Source: |
Journal of Theoretical and Applied Information Technology
pp 098 - 107 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
NARROW BAND INTERFERENCE MITIGATION IN DS-UWB SYSTEMS USING THE WAVELET
TRANSFORM AND FFT |
Author: |
MOHAMED ALI ABDEL RAZEK, SAID BAYOMI, AHMED SAFWAT SADEK, IBRAHIM FATHY |
Abstract: |
Because of its importance, DS-UWB communication is an open research area,
particularly in the context of its coexistence with OFDM based systems. In this
paper, we present an analysis of the effect of the Narrow Band Interference of
OFDM WLAN 802.11a systems, on the performance of BPSK-DS -UWB in terms of BER,
along with a proposed interference mitigation technique based on both the
discrete wavelet transform and the Fast Fourier Transform to improve the BER
performance in the presence of the Narrow Band OFDM interfering signal.
Simulation results show that the proposed method show an excellent performance
especially at high signal to noise ratio. |
Keywords: |
DS-UWB, WLAN 802.11a, Wavelet |
Source: |
Journal of Theoretical and Applied Information Technology
pp 108 - 114 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE ROLE OF WEB-BASED GROUP DECISION SUPPORT SYSTEMS IN CLARIFYING THE
COLLECTIVE INTELLIGENCE: MEASURING THE OUTCOMES |
Author: |
KHALED SALEH Al OMOUSH, RAED MUSBAH ALQIREM, MOHAMMAD IQBAL AJLOUNI |
Abstract: |
The main objective of this research is to develop a conceptual framework for
exploring the role of GDSSs in shaping the dimensions of collective intelligence
and the expected outcomes. The ever-increasing complexities and controversial
challenges in today's business environment require organizations to be
recognized as adaptive systems and be examined as an evolving intelligent being.
An organization is intelligent only if it is able to nurture a high level of
collective intelligence. The tremendous advances in Internet and Web
applications bring impetus to Web-based Group Decision Support Systems (GDSSs)
development as the most recent collective intelligence systems. Based on
extensive literature review, six dimensions of collective intelligence were
identified in this paper. These dimensions are freedom of mind, shared memory,
knowledge sharing, collective perception, collective problem-solving, and
collective learning. Furthermore, the study's framework identified four major
expected outcomes, involving sense and response capability, relationship
quality, decision making quality, and continuous organization learning. |
Keywords: |
Collective Intelligence, Web-Based Gdsss, Freedom Of Mind,
Shared Memory, Collective Perception, Sense And Response Capability,
Relationship Quality |
Source: |
Journal of Theoretical and Applied Information Technology
pp 115 - 128 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
ACCELERATING EMPHYSEMA DIAGNOSIS ON LUNG CT IMAGES USING EMPHYSEMA PRE-DETECTION
METHOD |
Author: |
KHAIRUL MUZZAMMIL BIN SAIPULLAH, DEOK-HWAN KIM, NURUL ATIQAH ISMAIL |
Abstract: |
In this paper, we propose a simple but effective algorithm to increase the speed
of Emphysema region classification. Emphysema region classification method based
on CT image consumes a lot of time because of the large number of sub-regions
due to the large size of CT image. Some of the sub-regions contain no Emphysema
and the classification of these regions is worthless. To speed up the
classification process, we create an algorithm to select Emphysema region
candidates and only use these candidates in the Emphysema region classification
instead of all of the sub-regions. First, the lung region is detected. Then we
threshold the lung region and only select the dark pixels because Emphysema only
appeared in the dark area of the CT image. Then the thresholded pixels are
clustered into a region that called the Emphysema pre-detected region or
Emphysema region candidate. This region is then divided into sub-region for the
Emphysema region classification. The experimental result shows that Emphysema
region classification using pre-detected Emphysema region decreases the size of
lung region which will result in about 84.51% of time reduction in Emphysema
region classification |
Keywords: |
Computer Aided Diagnosis, Emphysema, CT Image |
Source: |
Journal of Theoretical and Applied Information Technology
pp 129 - 134 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
COMPARISON OF FEATURE EXTRACTORS FOR REAL-TIME OBJECT DETECTION ON ANDROID
SMARTPHONE |
Author: |
KHAIRULMUZZAMMIL SAIPULLAH, NURUL ATIQAH ISMAIL, AMMAR ANUAR, NURAISHAH SARIMIN |
Abstract: |
This paper presents the analysis of real-time object detection method for
embedded system particularly the Android smartphone. As we all know, object
detection algorithm is a complicated algorithm that consumes high performance
hardware to execute the algorithm in real time. However due to the development
of embedded hardware and object detection algorithm, current embedded device may
be able to execute the object detection algorithm in real-time. In this study,
we analyze the best object detection algorithm with respect to efficiency,
quality and robustness of the algorithm. Several object detection algorithms
have been compared such as Scale Invariant Feature Transform (SIFT), Speeded-Up
Feature Transform (SuRF), Center Surrounded External (CenSurE), Good Features To
Track (GFTT), Maximally-Stable External Region Extractor (MSER), Oriented Binary
Robust Independent Elementary Features (ORB), and Features from Accelerated
Segment Test (FAST) on the GalaxyS |
Keywords: |
Android, Computer Vision, Embedded Hardware, Mobile Application. OpenCV |
Source: |
Journal of Theoretical and Applied Information Technology
pp 135 - 142 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
FORAGING ALGORITHM FOR OPTIMAL REACTIVE POWER DISPATCH WITH VOLTAGE STABILITY
AND RELIABILITY ANALYSIS |
Author: |
JAGANATHAN S, Dr. PALANISAMY S. |
Abstract: |
A novel bio-heuristic algorithm called Refined Bacterial Foraging Algorithm (RBFA)
is proposed in the paper to solve the optimal power dispatch of deregulated
electric power systems. The Optimal reactive power dispatch (OPD) problem has
growing effect in modern electric power systems and the problem in need of to
address the secure operation and optimal operation, with optimal location of
FACTS devices, control of power flow based on stability indices and reliability
analysis. So, this problem is well known as a multi-disciplinary and multi
objective problem where in need of exact formulation and solution of the
problem. The basic BFA is based on a metaphor of social interaction of E-coli
bacteria the self adaptability of individuals in the group searching activities
has attracted a great deal of interests in real word problems but it gives poor
performance in global points when its applied to high dimensional and multi
objective problems. To avoid the local optima and in order to track the good
tracking ability of global solutions, the improved version of BFA algorithm is
proposed and the proposed algorithm is called Refined Bacterial Foraging
Algorithm (RBFA).The RBFA is improved version of the basic BFA with search
direction phenomenon, variation of step sizes in chemotaxis behavior and
variation of position updating process. The optimal dispatch problem consist of
reactive power dispatch, optimal location of FACTS devices with transformer
taps, real power loss and voltage stability margin are simultaneously optimized
with effective controls and limits. The evaluation analysis of proposed work
carried out with Standard IEEE systems. The simulation result shows the
performance of RBFA is superior or comparable to that of the other algorithms
and is greatly in terms of speed of convergence, optimization quality,
robustness and fast convergence ability. |
Keywords: |
Bacterial Foraging Algorithm, Refined Bacterial Foraging
Algorithm, Multi-Objective Optimization, FACTS Devices, Reactive Power
Dispatch, Q-V Analysis, Stability Indices. |
Source: |
Journal of Theoretical and Applied Information Technology
pp 143 - 157 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
K-SCHEMA: A NEW APPROACH, BASED ON THE DISTRI-BUTION OF USER QUERIES, TO CREATE
VIEWS TO MA-TERIALIZE IN A HYBRID INTEGRATION SYSTEM |
Author: |
SAMIR ANTER, AHMED ZELLOU, ALI IDRI |
Abstract: |
The explosion of information technologies and telecommunications has made easy
the access and production of information. That is how a very large mass of the
latter has generated. This situation has made the integration systems a major
need. Among these systems, there is the hybrid mediator. The latter interrogates
one part of data on demand as in the virtual approach, while charging, filtering
and storing the second part, as views, in a local database. The choice of this
second part is a critical task. This paper presents a selective approach, which
based, essentially, to create these views, on the queries previously posed on
the system. Based on the distribution of previous user queries, our approach
extract all data most queried by users. The obtained data are classified as
candidate views for materialization. Then selecting which one to materialize
among all those created in the first step. |
Keywords: |
Information Integration; Hybrid Integration System;
Materialization; Views Creation; K-Schema |
Source: |
Journal of Theoretical and Applied Information Technology
pp 158 - 170 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
A METHOD OF MICRO-SPHERE COMPLETE POSITION BASE ON PERPENDICULAR AXIS AND
POSITIONING ACCURACY ANALYSIS |
Author: |
ZHAO XUESEN, GAO DANGZHONG, MA XIAOJUN, YAN YONGDA, SUN TAO |
Abstract: |
The vacuum adsorption is one of the most effective ways to handle micro sphere.
To position a certainly place on micro sphere’s surface, the positioning
principle realized by double shafting was firstly analyzed. A system combined
with the atomic force microscope (AFM), the precision rotating air-bearing,
assistant transform shaft, translation stage and vacuum adsorption devices was
developed. Then the micro tube to adsorb the micro sphere was fabricated, and
the positioning error was also analyzed with a positioning accuracy of
approximately less than 5 degrees. Finally, the surface positioning experiment
was carried out which indicated its feasibility. This method and device can also
realize some surface traces on micro sphere during circumferential measurement
and micro-machining. |
Keywords: |
Micro Sphere; Vacuum Adsorption; AFM; Perpendicular Axis;
Positioning Accuracy |
Source: |
Journal of Theoretical and Applied Information Technology
pp 171 - 175 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE FORMAL TRIPLE I INFERENCE METHOD FOR LOGIC SYSTEM |
Author: |
MINXIA LUO, NI SANG, KAI ZHANG |
Abstract: |
In this paper, the formal triple I inference method based on logic system is
investigated. Firstly, a new complete formal system , which is the schematic
extension of uninorm logic system , is given. A complete many-sorted first-order
formal system for fuzzy predicate logic is structured. Secondly, triple I
solutions (including FMP-solutions, FMT-solutions) based on logic system are
given. Lastly, triple I algorithms are formalized in logic system , and the
strict logic proof of triple I algorithms are given. Moreover, the reductivities
of the triple I algorithms are proved. |
Keywords: |
Fuzzy Logic, Fuzzy Reasoning, Triple I Algorithm, Many-sorted
First-order Formal System, Logic System |
Source: |
Journal of Theoretical and Applied Information Technology
pp 176 - 183 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
USING D-S EVIDENCE THEORY TO EVALUATION OF CONFIDENCE IN SAFETY CASE |
Author: |
FUPING ZENG , MANYAN LU AND 3DEMING ZHONG |
Abstract: |
A safety case provides an explicit means for justifying the safety of a system
through a reasoned argument and supporting evidence. However, the acceptance of
a safety case requires the assessors to be confident, thus, there is some
uncertainty of confidence in the safety case, and it becomes a key factor how to
process the uncertainty in evaluating confidence in safety case. D-S evidence
theory is fit for processing the subjective judgment and synthesizing the
uncertain knowledge. So, this theory is applied to the uncertainty of assessment
results. First, the related knowledge is given, including safety case and D-S
evidence theory. Then the approach of evaluating confidence in safety case using
D-S evidence theory is presented, and engine software is chosen as experimental
example for proposed approach. At the same time, the experimental results based
on the proposed approach are also presented. The algorithm has a strong
versatility and an example is used to demonstrate its effectively in this text. |
Keywords: |
Safety Case, Uncertainty, Confidence, D-S Evidence Theory |
Source: |
Journal of Theoretical and Applied Information Technology
pp 184 - 189 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON GRAY APPRAISAL MODEL OF MCAI SOFTWARE |
Author: |
GU ZHENLI |
Abstract: |
This paper analyzes the quality factors that influence the MCAI software, and
builds a MCAI software index system. Determine the relative importance weights
with the help of the 0~4 rating method, which avoid the determinacy of the
appraisal index only on the qualitative analysis and value judgment of one
expert in the analytic hierarchy process. We employ lots of experts’s experience
to determine the MCAI software appraisal index, thus the determinacy of
appraisal index will be more objective and scientific. Meanwhile, the gray
appraisal theory is applied in the MCAI software appraisal, and the gray
appraisal model of MCAI software is build. The qualitative evaluation of MCAI
software is transformed into quantitative analysis, which is the innovation of
the MCAI software appraisal method. |
Keywords: |
MCAI Soft; Appraisal index system; Gray theory; Appraisal Model |
Source: |
Journal of Theoretical and Applied Information Technology
pp 190 - 193 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
A JPEG STEGANOGRAPHIC METHOD BASED ON SYNDROME-TRELLIS CODES |
Author: |
YE XUEYI, LU GUOPENG , WANG YUNLU, ZHANG YAN |
Abstract: |
Combining the Syndrome-Trellis Codes (STC) proposed recently, a new
steganography method for JPEG images is presented in this paper. The method
improves embedding efficiency by using the STC, and then preserves the DCT
coefficient histogram statistic feature by constraining the proportion that are
used for information embedding among the coefficients with the absolute value
equal to one. Experimental results show that, compared with Jsteg and F5, the
proposed method not only achieves a higher message capacity and embedding
efficiency, also resists to histogram statistical steganalysis. |
Keywords: |
Steganography, JPEG, Syndrome-Trellis Codes, Embedding Efficiency |
Source: |
Journal of Theoretical and Applied Information Technology
pp 194 - 200 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON PROPERTIES OF E-PARTIAL DERIVATIVE OF LOGIC FUNCTIONS |
Author: |
WANG FANG |
Abstract: |
E-derivative [1] has accessed a wide range of applications in these areas and
caused academia concerned [1-4], such as detecting faults in combinational
circuits, discussing on cryptographic properties of H-Boolean function and
revealing the internal structure of Boolean function together with Boolean
derivative, thus more effectively analyzing the property of Boolean functions.
Referring to the discussion on Boolean derivative and Boolean partial
derivative, the concept of -partial derivative is presented. The definitions and
properties of -partial derivative and high order -partial derivative are given.
We also give their proofs for some properties. The work made in this paper is
the complement and improvement of the research on the -derivative of logic
functions. |
Keywords: |
Logic Function; -Derivative; -Partial Derivative; Special Operation Of Logic
Function |
Source: |
Journal of Theoretical and Applied Information Technology
pp 201 - 205 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE CACHE REPLACEMENT POLICY AND ITS SIMULATION RESULTS |
Author: |
ZHU QIANG, SUN YUQIANG |
Abstract: |
To optimize the multimedia proxy server effectively, this paper proposes a
gain-based cache replacement policy by using the multimedia proxy server gain
model. The performance of the proposed gain-based policy is evaluated by
simulation experiments. |
Keywords: |
Multimedia Proxy Server, Media Data Object, Cache Replacement |
Source: |
Journal of Theoretical and Applied Information Technology
pp 206 - 211 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
INQUIRY LEARNING IN THE VIRTUAL-ACTUAL FUSION ENVIRONMENT AND ITS APPLICATION IN
ENVIRONMENTAL EDUCATION |
Author: |
ZHANG JIANPING, XU WEI |
Abstract: |
With the rapid development of information technology, higher attention is paid
on the cultivation of innovative talents. Inquiry learning activities carried
out in traditional learning environment which is based on pure “real”
environment inside and outside the school or the ones entirely depending on the
pure network “virtual” environment have gradually revealed their shortcomings.
The “virtual-actual fusion environment” is proposed for the current status of
inquiry learning environment. This study will firstly identify the conception
and typical characteristics of this kind environment, constructing a “learning
environment—learning model” coordinate system to discuss inquiry learning in the
fusion environment. And then the paper will introduce the application in
Environmental education by taking CEIS (Campus Environment Information System)
project for example. At last, it proposes several important points for follow-up
study. |
Keywords: |
Learning Environment; Inquiry Learning; Learning Model;
Environmental Education; CEIS (Campus Environment Information System) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 212 - 218 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
COMMENT ON POPULAR VIEWS OF INDUSTRIAL CONTROL AUTOMATION TECHNOLOGY |
Author: |
YAN GUANG-PING, CHEN DONG-SONG |
Abstract: |
Industrial Control Automation Technology is a kind of integrated technology that
uses Control theory, instruments and apparatuses, computer and other information
technology. At the same time, it makes the process of industrial production come
to the detection, control, optimization, operation, management and decision
making, get to the objective target about improving production, increasing
quality, decreasing consumption, securing safety. The article will mainly
analyze and state the popular technology from eight aspects, hope to bring
reference and inspiration to the experts of this field. |
Keywords: |
Industrial Control Automation; Technology; Comments |
Source: |
Journal of Theoretical and Applied Information Technology
pp 219 - 223 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH AND APPLICATION THE MEASURING AND CONTROLLING INSTRUMENT OF MOUNTAIN
GREENHOUSES |
Author: |
MA JIWEI, LUN CUIFEN, LIN ZHIPENG, ZHUANG CHENG, LU WEINA, LIN HONGJU |
Abstract: |
This system uses a new single-chip computer extends MAX485 serial communication
module and wireless transceiver chip nRF905. According to the scale of
greenhouse and wiring, the instrument communication mode can flexibly set -- a
wired or wireless communication. The PC communication interface design enables
PC to communicate with the network relay node and manage the system by wired
communications and also by wireless communications. This system has been
successfully applied to parameters measurement and control of our experimental
base and the surrounding greenhouses.The results showed that the system is
facilitate to expand, it has flexible network, low construction cost, which laid
foundation for the modernization management of large agricultural facilities. |
Keywords: |
Mountain Greenhouses, Environmental Parameter, Local Area Network, Means Of
Communication |
Source: |
Journal of Theoretical and Applied Information Technology
pp 224 - 228 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
PASSIVE LOCATION ALGORITHM USING KUSHNER EQUATION |
Author: |
ZHONG LIU, JING-BO HE |
Abstract: |
Kalman filtering algorithm is an effective linear filter, but in the nonlinear
state its covariance is uncontrolled. Kushner equation is effective for the
nonlinear filtering. According to the Kushner equation and the nonlinear of
passive location, a new passive location algorithm based on the Kushner equation
is presented. And it is used in passive location tracking. Experiments are made
in MATLAB and its validity is proved. |
Keywords: |
Kushner Equation, Passive Location, Electronic Support Measures |
Source: |
Journal of Theoretical and Applied Information Technology
pp 229 - 232 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
ON THE APPLICATION OF WAVELTE ANALYSIS AND APPROXIMATE ENTROPY IN PILE
FOUNDATION INSPECTION |
Author: |
XIE HONGYANG, LIAO YICHEN |
Abstract: |
The concrete quality rating of pile foundation often adopts the PSD
multi-parameter synthesis method, but due to the discontinuous characteristics
and random disturbance of concrete material itself, mistakes will be resulted
from in the pile foundation inspection process, during which the singular signal
will interfuse. This paper uses the wavelet transform to decompose the suspected
defect signals of the pile foundation, and introduces the disordered degree of
approximate entropy quantitative characterization. The results show that the
signal amplitude of defect signals in high frequency band attenuates, the
waveforms are mixed and disordered, and the approximate entropy value is big.
Thus, the suspected defects can be judged. The engineering example has proved
the effectiveness of this method in the pile foundation inspection. |
Keywords: |
Wavelet Analysis; Approximate Entropy; Pile Foundation Inspection |
Source: |
Journal of Theoretical and Applied Information Technology
pp 233 - 237 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
STUDY ON QUANTUM ZERO KNOWLEDGE PROOF SYSTEM |
Author: |
XIAOQIANG GUO, YAN YAN, LICHAO FENG SHIQIU ZHENG |
Abstract: |
Zero-knowledge proof is a very interesting problem in modern cryptography, which
attracts the attention of many cryptographers, and there are plenty of
researches. It is one of the hot research field in cryptography. First, we made
a simple introduction of zero-knowledge proof. Then we had given a perfect
quantum zero knowledge proof system on a specific NP – complete problem "graph
3-coloring"( G3C ). And we use reduction structure to promote any NP – complete
problem. At last, we introduced the applications of zero knowledge proof in
cryptography. |
Keywords: |
Quantum Zero-Knowledge Proof, Cryptography, Graph 3-Coloring, Information
Security |
Source: |
Journal of Theoretical and Applied Information Technology
pp 238 - 241 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN OFFICE AUTOMATIC MARKING SYSTEM RESEARCH AND IMPLEMENTATION |
Author: |
YOUCHAN ZHU, FENG SHEN |
Abstract: |
The Microsoft Office Automation Marking System has two ways for marking,
recording the operating steps and analyzing the result documents. The method of
recording the operating steps has a disadvantage of difficult programming and
low adaptability. And the other method has many implementations, but also has
the shortage of examination restriction because of the uncompleted analysis of
the office objects and low speed. Taking all of these into consideration, this
paper addresses an implementation of using c# language and COM technology to
analyze the interface methods of each application on the platform of Microsoft
Visual Studio 2008, and aiming at the technical difficulties exist in the
development process, such as the organization of knowledge, the transfer mode of
test points, the positioning and extraction of test points during marking. It
also gives the solution, and explains the logic and implementation steps in
detail taking word as an example. Relative to recording the operating steps, it
has the advantages of easy programming, easy system maintenance, non-limit of
operating scope and good adaptability. |
Keywords: |
Office Automation marking, COM technology, Data Base Access |
Source: |
Journal of Theoretical and Applied Information Technology
pp 242 - 245 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
STUDY ON TAXI SYNERGIC OPERATION DISPATCH SYSTEM BASED ON INFORMATION
INTEGRATION |
Author: |
GUOQIANG PAN |
Abstract: |
The current taxi operation mode features high ratio of vacant taxies roaming the
streets, while lots of potential customers complaining being unable to find a
taxi. The major reason for this inefficiency is that the current taxi dispatch
system is incapable of exchanging information between taxi drivers, customers
and the dispatch system in a real-time manner. This paper presents an approach
to a taxi synergic operation dispatch system based on GPS and GMS technologies.
With this new system, the potential customers send taxi service requests by
mobile phones to the taxi dispatch center, which after collecting the service
requests locates the effective taxies within the effective areas and sends them
dynamic service requests simultaneously. The system enables the synergic
operation by continuously matching the dynamic demands and supplies of taxi
services, hence greatly improves the overall taxi operation efficiency. |
Keywords: |
Taxi, Synergic Operation, Dispatch System, Information Integration |
Source: |
Journal of Theoretical and Applied Information Technology
pp 246 - 250 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
APPLICATION OF NESTED COST OPTIMIZATION MODELS TO TSPD |
Author: |
XIA WEN- HUI, LIU JUAN-HONG, ZENG HONG |
Abstract: |
Through the analysis of Travelling Salesman Problem with Pickup and Delivery (TSPD)
in the related research, two kinds of logistics systems including whole
logistics system and partial logistics system under one-to-many logistic network
are considered. And mathematical model is set up, then, nested cost optimization
model is set up in order to meet the constraint condition of nested order cycle
time. According to an application pickup and delivery instance of iron and steel
in one factory, by using the method of adaptive response surface in Hyperstudy
software, the initial solutions are figured out, and further the optimum
direction of iteration is found so as to obtain the optimum solution. |
Keywords: |
Nested, Logistics System, Pickup and Delivery, Cost models, Optimal Solution |
Source: |
Journal of Theoretical and Applied Information Technology
pp 251 - 255 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
STUDY ON MINE-MAPS DYNAMIC MANAGEMENT INFORMATION SYSTEM BASED ON WHOLE
LIFECYCLE |
Author: |
HUJUN HE, YANING ZHAO, XINGKE YANG, WENGAO ZHANG, CUIXIA QU |
Abstract: |
According to the shortcoming of traditional artificial management mine-maps, the
solutions of dynamic management digital mine-maps were proposed. Analyzing of
the main tasks and characteristics in lifecycle stages of mining engineering
maps, based on the idea and meaning of lifecycle, first we divided mine-maps
lifecycle into seven stages, such as design drawing task assignation, design
drawing, review approval, use and execution, revision, cancellation, qualitative
archiving. Then put forward concept and system model of mine-maps lifecycle
management, design B/S three layer network structure of mine-maps dynamic
management information system on the basis of whole lifecycle, function modules
of each subsystem by using CAD technology, ASP technology and database
technology. Finally, we discussed the key technologies implementation of system
as parametric drawing technology, database connection, online review and
cooperative design etc. Field application shows that realization of whole
lifecycle management automatization for mine engineering drawings improves
office efficiency. |
Keywords: |
Whole Lifecycle, Mine-map, Dynamic Management, Information System, CAD |
Source: |
Journal of Theoretical and Applied Information Technology
pp 256 - 260 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
FLAW IDENTIFICATION OF METAL MATERIAL IN EDDY CURRENT TESTING USING NEURAL
NETWORK OPTIMIZED BY PARTICLE SWARM OPTIMIZATION |
Author: |
ZHAO LIANG, Yuxin Mao |
Abstract: |
As an NDT technology, Eddy current testing is widely used to identify the
surface flaw of metal material. However, due to the complex relationship between
the test results and the flaw’s shape, the identification is qualitative in most
situations. In the paper, a neural network optimized by particle swarm
optimization (PSO) is used to quantify the detection result tentatively of the
fault on the subsurface of the metal material. Here, PSO is used to optimize the
weight value and the threshold value of the BP neural network. According to the
experiment, forecasting geometric dimension of the flaws in conductor by PSO-optimized
neural network is relatively ideal. |
Keywords: |
Neural Network, PSO, Eddy Current Testing, Surface Fault Identification |
Source: |
Journal of Theoretical and Applied Information Technology
pp 261 - 265 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH OF THE WORKFLOW MANAGEMENT SYSTEM BASED ON MICROKERNEL |
Author: |
ZHISONG HOU, ZHOU YU |
Abstract: |
Based on the analysis of limitation of existing workflow management system, a
workflow management system based on micro kernel is researched and designed. In
this system, a micro kernel based workflow engine is designed by separating the
service implementation and activity scheduling; the workflow engine interface is
defined to connect the related workflow components seamlessly; and then graphics
oriented business process modeling is achieved by adopting digraph based
business process model. Furthermore, workflow client and administration tools
based on Web technology are implemented. The results show that: all this
improves the flexibility of the workflow engine in system architecture and
reduces the cost of reconstruction and maintaining; at the same time, the user
experience is improved. |
Keywords: |
Micro Kernel, Workflow, Workflow Management System, Directed Graph, Workflow
Engine |
Source: |
Journal of Theoretical and Applied Information Technology
pp 266 - 271 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
A NEW QFD-BASED QUANTITATIVE MODEL FOR ADAPTABILITY EVALUATION OF
ENTERPRISE INFORMATION SYSTEMS |
Author: |
HAIWANG CAO, LIUYANG WU, CHAOGAI XUE |
Abstract: |
This paper deals with a new quantitative model for adaptability evaluation of
enterprise information systems (EIS). Firstly, a new evaluation model based on
QFD is proposed, and the corresponding evaluation algorithm is given. Secondly,
the procedures of EIS adaptability evaluation are discussed. Finally, the
application of the evaluation model and algorithm is verified through an
example, which provides quantitative references for optimizing EIS adaptability. |
Keywords: |
Adaptability Evaluation, Quality Functional Deployment (QFD)
Enterprise Information Systems |
Source: |
Journal of Theoretical and Applied Information Technology
pp 272 - 276 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
STUDY ON QUANTUM OBLIVIOUS TRANSFER AND QUANTUM BIT COMMITMENT |
Author: |
XIAOQIANG GUO, CUILING LUO YAN YAN |
Abstract: |
Oblivious Transfer and Bit Commitment are typical foundation agreements to
secure multi-party computations. Both of them are hotspots in the field of
information security. Using of the quantum channel and the principles of the
quantum mechanics, Quantum Oblivious Transfer can be achieved higher security
and higher efficiency than the Classic Oblivious Transfer, while it also has a
unique advantage in found eavesdropping. Quantum Bit Commitment scheme can be
used to build up zero knowledge proof, verified secret sharing, throwing coins
etc agreements. We had given out a very novel QOT scheme based on three-particle
entangled states. And we had investigated unconditional secure Quantum Bit
Commitment existence. At last, we constructed a new bit commitment model –
double prover bit commitment. The Quantum Bit Commitment Protocol can be
resistant to errors caused by noise. |
Keywords: |
Quantum Oblivious Transfer, Quantum Bit Commitment, Secure multi-party
computations, Information Security |
Source: |
Journal of Theoretical and Applied Information Technology
pp 277 - 281 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON MUTUAL COUPLING CORRECTION OF ARRAY OUTPUT SIGNAL BY BP NETWORK |
Author: |
BIN PEI, HUI HAN, YANJUN ZHANG, YING SHENG, SHIJI YUAN |
Abstract: |
The method of mutual coupling correction of array output signal is studied in
the paper. According to array signal processing’s feature, array error model is
analyzed and array mutual coupling is studied. The method that smart antennas’
channel calibration by BP network in wireless communication is proposed, which
improves the accuracy of algorithms , such as the DOA estimation algorithm, Beam
Forming algorithm etc. 8-unit uniform linear array and 8-unit uniform circular
array are simulated by computer, and the results are compared with spatial
spectrum lines of before-after correction. The proposed method is effective, for
computer simulation experimental results are in line with the theoretical ones. |
Keywords: |
BP Network, Array Antenna, Channel Calibration |
Source: |
Journal of Theoretical and Applied Information Technology
pp 282 - 286 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
PARALLEL MRI RECONSTRUCTION USING SVD-AND-LAPLACIAN TRANSFORM BASED SPARSITY
REGULARIZATION |
Author: |
JING BIAN, YAMING WANG, HUAXIONG ZHANG, LITAO ZHU, MINGFENG JIANG |
Abstract: |
The SENSE model with sparsity regularization acts as an unconstrained
minimization problem to reconstruct the MRI, which obtain better reconstruction
results than the traditional SENSE. To implement the sparsity constraints,
discrete wavelet transform (DWT) and total variation (TV) are common exploited
together to sparsify the MR image. In this paper, a novel sparsifying transform
based on the combination of singular value decomposition (SVD) and Laplacian
(LP) transform is proposed for parallel MR image reconstruction. The proposed
algorithm adopts the SVD of the MR image as sparsifying transform instead of
exploiting the wavelet domain sparsity of the image, and uses the LP-norm as an
alternative to TV-norm in the sparsity regularization term. The performances of
the proposed method are evaluated on two typical types of MR image (complex
brain MR image and sparse angiogram MR image). Compared with the DWT-TV
sparsifying transform, the proposed SVD-LP method can significantly achieve
better reconstruction quality and considerably improve the computation
efficiency. |
Keywords: |
SENSE Reconstruction, Singular Value Decomposition, Laplacian Transforms,
Sparsity Regularization |
Source: |
Journal of Theoretical and Applied Information Technology
pp 287 - 295 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
TWO-DIMENSIONAL MAXIMUM MARGIN PROJECTION FOR FACE RECOGNITION |
Author: |
YOUMAO BAI, ZIQIANG WANG, XU QIAN |
Abstract: |
To effectively cope with the high dimensionality problem in face recognition, a
novel two-dimensional maximum margin projection (2DMMP) algorithm for face
recognition is proposed in this paper. Specially, 2DMMP is based on the maximum
margin projection (MMP) and fully considers the intrinsic tensor structure of
face image. By utilizing both local manifold structure and discriminative
information, as well as characterizing the correlations among pixels with the
tensor structure, 2DMMP can effectively project the high-dimensional face image
space into lower-dimensional feature space for face recognition. Experimental
results on three face databases show that the proposed 2DMMP algorithm
outperforms other related algorithms in terms of recognition accuracy. |
Keywords: |
Face Recognition, Maximum Margin Projection (MMP), Tensor
Structure, Manifold Learning |
Source: |
Journal of Theoretical and Applied Information Technology
pp 296 - 302 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
CHANNEL CODING SIMULATION RESEARCH OF INTER-SATELLITE SPREAD SPECTRUM
COMMUNICATION SYSTEM |
Author: |
GUOQIANG WU, DONGSHENG ZHAO, YUGUANG BAI, ZHAOWEI SUN, LILI WANG |
Abstract: |
This paper considers proposing the mathematical model and simulation mode of
inter-satellite channel based on the reliability of inter-satellite
communication system. The Monte Carlo method is adopted to develop the spread
spectrum communication system of two consumers. In order to reduce the bit
errors of inter-satellite communication, both spread spectrum communication
technology and channel coding technology are brought forward under
inter-satellite channel. A simulation is given to illustrate that the combined
application of spread spectrum communication technology and channel coding
technology can achieve ideal performance. |
Keywords: |
Spread Spectrum Communication, Convolutional Code; Channel
Coding; Sine Interference |
Source: |
Journal of Theoretical and Applied Information Technology
pp 303 - 307 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
NETWORK INTRUSION BASED ON CLOUD NETWORK |
Author: |
BOHAN |
Abstract: |
This work aimed at the cloud cluster cyber source intrusion and malicious
behavior, analyzes the attack mode, studied its intrusion detection method, the
design of intrusion detection system model and structure. System can be
effective for cloud service network to provide safe, effective cloud pool
resources protection and cluster service guarantee, can effectively prevent,
detect intrusion behavior based on cloud services. |
Keywords: |
Cloud Services, Yun Chi, Network Intrusion |
Source: |
Journal of Theoretical and Applied Information Technology
pp 308 - 312 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
A COMBINED FORECASTING METHOD OF WIND POWER CAPACITY WITH DIFFERENTIAL EVOLUTION
ALGORITHM |
Author: |
JIANJUN WANG, HONGYANG ZHANG, ZHANGYI PAN, LI LI |
Abstract: |
As wind power is a mature and important renewable energy, wind power capacity
forecasting plays an important role in renewable energy generation’s plan,
investment and operation. Combined model is an effective load forecasting
method; however, how to determine the weights is a hot issue. This paper
proposed a combined model with differential evolution optimizing weights. The
proposed model can improve the performance of each single forecasting model of
regression, BPNN and SVM. In order to prove the effectiveness of the proposed
model, an application of the China’s wind power capacity was evaluated from 2000
to 2010. The experiment results show that the proposed model gets the maximum
mean absolute percentage error (MAPE) value 1.791%, which is better than the
results of regression, BPNN and SVM. |
Keywords: |
Capacity Forecasting, Differential Evolution Algorithm, Wind Power |
Source: |
Journal of Theoretical and Applied Information Technology
pp 313 - 317 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
A GENERALIZED MULTIFRAME REAL-TIME TASK MODEL UPON HETEROGENEOUS MULTIPROCESSORS
SYSTEM |
Author: |
YAN LIU, CHENG XU, LIDONG WANG |
Abstract: |
The task scheduling problem is one of the basic research areas in computer
science especially in real-time systems. Current task scheduling based on
heterogeneous multiprocessors system rarely consider the multiframe character of
real-time tasks, which assumes a worst-case execution time bound for every task
and maybe too pessimistic if the worst-case execution time of task is much
longer than the average. Given in this paper is a generalized multiframe
real-time task model upon heterogeneous multiprocessors systems based on period
task model. It is proved that this model’s schedulability is better than period
task model. We investigate the schedulability problem for this model for the
preemptive fixed priority scheduling policy using genetic algorithm. The
scheduling test is given as utilization based and exact worst case response
time. The experiments results show that the using response time analysis is
better than the utilization based method, and the analysis is applicable to
different system model. |
Keywords: |
Real-time System, Task Model, Response Time |
Source: |
Journal of Theoretical and Applied Information Technology
pp 318 - 325 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS ON INFLOWS OF INDEX INVESTORS AND DETERMINANTS OF FUTURES PRICE |
Author: |
YONGJI ZHANG, QINGBIN MENG, YIN SUN |
Abstract: |
In this paper, based on a description of the four major players of commodity
spot and futures markets, we establish a multi-phase equilibrium model of price
determination, and then analyze the influence of the entry of a large number of
index investors on the risk premium, inventory management, and different
traders’ positions of commodity futures. The result shows that, the correlation
between the stock market and commodity futures markets, the index investors’
entering and demanding for commodity spot both are important factors to decide
the price of the commodity futures market and the trader behavior. The empirical
results also support this view. |
Keywords: |
Commodity Future Market, Index Trader, Risk Premium, Position |
Source: |
Journal of Theoretical and Applied Information Technology
pp 326 - 333 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
APPLICATION OF HGML-BASED FIRE DATA MANAGEMENT IN FIRE COMMAND SYSTEM |
Author: |
LEI CAO, FANG MIAO, WENHUI YANG |
Abstract: |
In recent years, many experts and technicians have done extensive research in
many respects such as the computer software for fire, experimental simulation,
material thermal physical measurement, which put forward the Fire prediction
theory, and these theoretical results were data-centric, existing in the form of
multi-source heterogeneous. The existing fire service system can't make vast
amounts of multi-source heterogeneous fusion effectively, and it can't timely
organize and analyze the data, for it is lacking the comprehensive analysis
function. This paper, based on the hyper geographical markup language HGML and
Fire spreading algorithm model, designed a kind of fire data management, which
can be applied to rescue command simulation systems. The system can make the
geographic coordinates of the scene of fire and the multi-source heterogeneous
data fusion effectively. And it can comprehensively analyze the date and use 3D
simulation of the scene to put forward the aided decision and rescue plan. The
HGML-based rescue command simulation system can command the firefighting
effectively, which played an important role for the fire service. |
Keywords: |
HGML, Space-time Deduction, 3D Simulation, Fire Protection System |
Source: |
Journal of Theoretical and Applied Information Technology
pp 334 - 342 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
CHINESE-MINING PREPROCESSING TECHNOLOGY BASED ON TEXT TRAIT OPTIMIZING |
Author: |
XIAOYONG WANG , SIYOU XIAO,FANG YUEFENG |
Abstract: |
How to get the target text quickly becomes a technical limitation with the using
of massive data. While obtaining the Chinese target information, the
segmentation of the sentence is supposed to be the key according to research. To
mine the segmentation of English text is relatively simple for the space is used
as a interval, meanwhile the Chinese segmentation is much more difficult. So in
this paper the reciprocal crossing segmentation algorithm and the
trait-optimizing vector model are designed to improve the mining efficiency of
Chinese information. Based on dictionary, an improved segmentation algorithm is
adopted in text pretreatment processing, which is based on vector space module,
to do experiments on the segmentation algorithm and to analyze the segmentation
results. And that segmentation algorithm is already proved to be very effective
in the text mining of text trait vector module. |
Keywords: |
Reciprocal Crossing Matching, Mutual Information, Information Gain, Expected
Crossing Entropy, Ce2 Statistics |
Source: |
Journal of Theoretical and Applied Information Technology
pp 343 - 348 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
CHAOS OF HENON MAP BASED ON THE COUPLED NETWORKS |
Author: |
XUELIAN SUN, KUIFENG ZHENG, LIDONG WANG, WEI ZHAO, XUEFENG SUN |
Abstract: |
In this paper, the relationship between the parameters of Henon map is studied,
and the chaos of Henon map is also discussed based on different coupled
networks. From the simulate results, we found with the increasing of parameter a
the chaos of Henon map will be emerged. At the same time, the transition from
non-chaotic to chaotic in coupled networks is exhibited, although the parameters
in non-chaotic regions before they are coupled together. |
Keywords: |
Henon Map, Chaos, Lyapunov Exponent, Coupled Networks |
Source: |
Journal of Theoretical and Applied Information Technology
pp 349 - 354 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
LC FEATURES COMBINED CHIRPLET TRANSFORM AND FRACTAL THEORY ON HIGH VOLTAGE
INSULATORS |
Author: |
ALI HUI, HUI LIN |
Abstract: |
The voltage grade of electrical transmission line is getting higher and higher,
consequently, flashover of transmission insulators is getting more and more
severe in high-voltage (HV) and ultra-high-voltage (UHV) systems under serious
pollutions, which menaces the safety of power transmission system heavily. The
crux to enhance the security of power system is to discover ways of monitoring
states of insulator’s surface by some eigenvalues. A new method, combined
chirplet transform with fractal theory, was proposed in this paper, and is taken
as the ruler to define fractal dimension, which is used to describe
characteristics of signals. Chirplet-fractal dimension is defined as the sum of
residues of decomposed signals. The fractal characteristics of leakage current
during flashover are obtained from this dimension. The results show that the
chirplet-fractal dimension efficiently describes the information of arcs
discharge in LC, and it is also a good eigenvalue for flashover discrimination
and risk prediction. |
Keywords: |
Fractal Dimension, Chirplet Transform, Non-stationary Signal, Leakage Current,
Flashover |
Source: |
Journal of Theoretical and Applied Information Technology
pp 355 - 361 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS ON EFFECT OF EXCITATION FREQUENCY ON NONLINEAR CHARACTERISTICS OF A
GEAR PAIR SYSTEM BASED ON NUMERICAL SIMULATION |
Author: |
JUNGANG WANG, YONG WANG, ZHIPU HUO |
Abstract: |
A nonlinear dynamic model of the geared rotor system, with consideration of the
bearing clearances and gear backlashes, is established. A numerical algorithm
based on Runge–Kutta-Butcher method is used to study the nonlinear behaviors of
the system accounting for the effects of different excitation frequency. A
detailed parametric research is conducted to analyze the influences of the
excitation frequency on the nonlinear characteristics of the system. The final
goal of the work is to study bifurcation and chaotic behavior of a gear pair
model that includes nonlinearities due to bearing and teeth backlash. The
analyses are performed in a parametric manner using non-dimensional excitation
as bifurcation parameters. The results show that the different excitation
frequency can significantly influence the nonlinear dynamic responses. |
Keywords: |
Nonlinear Response, Excitation Frequency, Bifurcation Phenomena |
Source: |
Journal of Theoretical and Applied Information Technology
pp 362 - 368 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN EVOLUTION SCHEME FOR BUSINESS RULE BASED LEGACY SYSTEMS |
Author: |
HAN LI, HE GUO, HUI GUAN, XIN FENG, YANG XU, HONGJI YANG |
Abstract: |
Business rules are compact statements that depict important aspects of business
processes. For most enterprises, business rules are embedded in the information
systems. As change is inherent in software, information systems turn into legacy
ones and their documentations may not reflect the actual business logics. Thus,
business rules in legacy systems become significant investments, and it is
necessary to evolve legacy systems without simply getting rid of the embedded
business rules. This paper studies the scheme of business rule-based legacy
systems evolution. To locate valuable functionalities, reengineering techniques
are used to comprehend legacy system. Then business rules are extracted from
these functionalities by means of information flow analysis and decomposition
slicing. Since service-oriented architecture is flexible to reuse components and
connect components with changes in business, business rules are stored and
managed by a service-oriented business rule management system. A case study is
illustrated to show the scheme can preserve valuable business rules, facilitate
evolving business rule-based legacy systems, and involve non-technical users to
business related software evolution. |
Keywords: |
Business Rule, Legacy System, Evolution, Service-Oriented,
Reengineering |
Source: |
Journal of Theoretical and Applied Information Technology
pp 369 - 376 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
A PURSUIT-EVASION GAME ALGORITHM BASED ON RAPID-RESPONSE VIRTUAL FORCE MODEL |
Author: |
JING LI, QI LI, HAITAO JIA |
Abstract: |
One-on-one pursuit evasion game is the ideal research project for optimal search
of agent. Without primal information about circumstance and evasion, it is
helpful of enlighten search model for suiting to evade game. Virtual Force Model
is one of most common enlighten random model. But it will make a center
vibration in balance circumstance. This paper presents a rapid response virtual
force model, which will rapidly generate the enlighten information and also
solve the problem of center vibration. The simulation shows that the Rapid
Response Virtual Force Model can achieve the optimal search for agent. |
Keywords: |
Pursuit-Evasion Game, Optimal Search, Virtual Force Model,
Random Walk Mobility Model |
Source: |
Journal of Theoretical and Applied Information Technology
pp 377 - 382 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
A SOFTWARE QUALITY EVALUATION METHOD BASED ON THE PRINCIPLE OF MAXIMUM
COORDINATION AND SUBORDINATION |
Author: |
XINYU GENG, LI YANG, XIAOYAN HUANG |
Abstract: |
Software quality evaluation is an important issue in software development. In
this work, we investigate the characteristics of software quality and discuss
the evaluation attributes of software quality. We then present existing commonly
used software evaluation methods. For the limitations of the existing methods,
we propose to apply the principle of maximum coordination and subordination to
the software quality evaluation. Our method achieves relatively good results in
experiment validation. |
Keywords: |
Software Quality Evaluation, Evaluation Attributes, Principle
of Maximum Coordination and Subordination |
Source: |
Journal of Theoretical and Applied Information Technology
pp 383 - 387 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
SELF-CONFIGURATION CONTROL TECHNOLOGY FOR HVAC COOLING AND HEATING SYSTEM |
Author: |
JINMING YANG |
Abstract: |
Relative to the traditional control techniques, self-configuration technology
can bring many benefits for the HVAC engineers, building owners, construction
managers and anyone associated with facilities management system. The key of
this technology is the dedicated controller built-in general control software
and friendly HMI (human-machine interface). The general control software uses
the object-oriented programming techniques which based on packaged data models
for both HVAC facilities and control instruments, and the models perfectly
combine the process features and control features. This mechanism makes it very
easy to build a control system for HVAC cooling and heating source system and
has the enormous flexibility and adaptability. At the same time, the complex
process of construct the control system does not need control experts to
complete. |
Keywords: |
Self-configuration, Data Model, HVAC Cooling and Heating System, Controller |
Source: |
Journal of Theoretical and Applied Information Technology
pp 388 - 392 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
APPLICATION OF UNCERTAIN NONLINEAR SYSTEMS PARTIAL STATE VARIABLES TO
SYNCHRONIZATION CONTROL FOR RÖSSLER SYSTEMS |
Author: |
YANJUN LIANG, YUNTONG LIU |
Abstract: |
Partial state variables stabilization control of uncertain nonlinear systems is
developed for chaos systems synchronization control. Response systems are
constructed for uncertain Rössler systems. In order to make response systems
track the drive systems asymptotically stable, error systems with uncertain and
nonlinear factors are designed. Using partial state stability theory of
nonlinear systems and adaptive control method, a Lyapunov function is
constructed for the uncertain nonlinear error systems, and partial state
variables stabilization controller and adaptive regulators are designed.
Employing Lyapunov stability theory, we prove that our controller can guarantee
the uniformly ultimate boundedness of the solution of the closed-loop system,
and make the tracking error arbitrarily small for uncertain parameters.
Numerical simulation results illustrate the effectiveness of the proposed
controllers and adaptive regulators. |
Keywords: |
Nonlinear Systems, Partial State Variables Synchronization, Uncertain Systems,
Adaptive Control |
Source: |
Journal of Theoretical and Applied Information Technology
pp 393 - 397 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
WEB SERVICE DESCRIPTION FRAMEWORK AND SELECTION MECHANISM TOWARDS BALANCED
PERCEPTIONS OF FQOS AND QOS |
Author: |
ZHONG WU, GUIHUA NIE, DONGLIN CHEN, PEILU ZHANG |
Abstract: |
With the growing expansion of web services resources on the internet, more and
more users come to appreciate the difficulty of searching self-gratification
information from the mass information. This paper analyzes functional attributes
and un-functional attributes of Web service resources, builds the mapping
relationship between FQoS and QoS, and defines the index system structure of
FQoS (Functional Quality of Service) and QoS (Quality of Service, also can be
called non-functional attributes)based on the existing theories. It realizes QoS
quantification of Web service resource by parameters numeralization and
normalization, proposes a Web service description framework and selection
mechanism towards balanced perceptions of FQoS and QoS, and then makes a
theoretical foundation for Web service description, discovery and selection
oriented equilibrium perception of FQoS and QoS. |
Keywords: |
Web Service Resource, Service Description, Service Discovery,
FQOS, QOS |
Source: |
Journal of Theoretical and Applied Information Technology
pp 398 - 405 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN IMPROVED VIRUS EVOLUTIONARY GENETIC ALGORITHM FOR WORKFLOW MINING |
Author: |
CHENGFENG JIAN, FANG LI |
Abstract: |
Combined with virus evolutionary mechanism, the virus evolutionary genetic model
algorithm which oriented workflow mining is put forward. It is based on the
original main population that infection the population of individuals. First, in
the workflow virus evolutionary mechanism introduction, it needs Petri net and
causal relationship with matrix, the population of virus of individuals to
chromosomes, setting the virus vitality and appealing. Second, the algorithm
combines with the genetic algorithm in workflow mining on design. It designs a
virus operators, infection operation and degradation operation. At the same
time, the virus evolutionary genetic mode algorithm considers the virus itself
has certain vitality. Experiments show that it can increase the diversity of the
original population, and avoid premature convergence and precocious phenomena. |
Keywords: |
Workflow Mining, Causal Matrix, Hybrid Genetic Algorithm, Virus |
Source: |
Journal of Theoretical and Applied Information Technology
pp 406 - 411 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
FUZZY ADAPTIVE PID CONTROL OF LARGE ERECTING SYSTEM |
Author: |
LIANG LI, JIAN XIE, JIANZHAO HUANG |
Abstract: |
In considering nonlinearity and uncertainty in the large erecting system, a
fuzzy adaptive PID controller is introduced to improve the control performance.
The mathematic model is constructed at first based on the physical laws. Then,
the fuzzy logic algorithm which can regulate PID parameters on-line is designed
and fuzzy inference rules are established between the PID parameters and the
error and change in error. Step response and position tracking are implemented
on this large erecting system. Simulation and experiment results demonstrate
that the fuzzy adaptive PID controller has effectively improved the performance
as compared with the conventional PID controller and fixed fuzzy controller.
Further, the fuzzy adaptive PID controller is simple, easy to understand and
realize. |
Keywords: |
Fuzzy PID, Adaptive Control, Erecting System, Electro-Hydraulics |
Source: |
Journal of Theoretical and Applied Information Technology
pp 412 - 418 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
A THRESHOLD DENOISING METHOD BASED ON EMD |
Author: |
JIANZHAO HUANG, JIAN XIE, FENG LI, LIANG LI |
Abstract: |
The denoising method based on empirical mode decomposition (EMD) can be broadly
divided into: IMF extraction method and IMF threshold approach. Aiming to the
problems of how to select IMFs in extraction method and the processing of the
selected IMFs, a threshold denoising method based on EMD is put forward. In this
method, the standard of IMF selection in energy viewpoint is offered, and the
IMFs upping to the standard are selected firstly, then, through comparing the
average energy of all unselected IMFs with the energy of each selected IMF, the
singular selected IMFs are confirmed, and denoised by threshold. Finally, the
denoised signal is obtained by summing up all selected IMFs. The current method
combines the soft threshold denoising method with the IMF selection together,
compared with other denoising methods, the effectiveness and superiority of the
method is validated. The result provides support for improving the denoising
effect in engineering. |
Keywords: |
EMD, Threshold Denoising, IMF Selection, Singular IMF |
Source: |
Journal of Theoretical and Applied Information Technology
pp 419 - 424 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS ON THE CONVERGENCE OF A NOVEL BILINEAR ADAPTIVE FILTER |
Author: |
MAOLIN ZHAO |
Abstract: |
Although the volterra filter is known to be an efficient adaptive filter in a
large variety application for the non-linear system, but its computational
complexity is also very high, especially as the orders of the filter increase.
To overcome the computational complexity of the Volterra filter, a novel adaptive
filter using layered bilinear architecture is proposed in this paper. Compared
with the conventional second-order Volterra filter and Direct Bilinear adaptive filter,
the layered bilinear adaptive filter exhibits a slightly better convergence
performance in terms of convergence speed and steady-state error. |
Keywords: |
Adaptive, Nonlinear System, Bilinear, Volterra Filter |
Source: |
Journal of Theoretical and Applied Information Technology
pp 425 - 428 Vol. 47. No. 1 -- 2013 |
Full
Text |
|
|
|