|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
January 2013 | Vol. 47 No.2 |
Title: |
AN ENHANCED RULE APPROACH FOR NETWORK INTRUSION DETECTION USING EFFICIENT DATA
ADAPTED DECISION TREE ALGORITHM |
Author: |
G.V.NADIAMMAI and M.HEMALATHA |
Abstract: |
Data mining has been used extensively and broadly by several network
organizations. Intrusion Detection is one of the high priorities & the
challenging tasks for network administrators & security experts. Intrusion
detection system is employed to protect the data integrity, confidentiality and
system availability from attacks. IDS use the data mining techniques to analyze
the resources from the database over a network. It is also necessary to develop
a robust algorithm to generate effective rules for detecting the attacks. In
this paper, Classification based optimization algorithms have been used to
detect attacks over KDD CUP 99 dataset. Based on this dependency, an improved
Efficient Data Adapted Decision Tree algorithm is proposed to overcome the
drawbacks of the existing algorithm. The experimental results clearly show that
the proposed EDADT algorithm achieved higher accuracy, less alarm rate & capable
of detecting new type of attack efficiently. |
Keywords: |
Machine Learning, Data Mining, Intrusion Detection, Classification Algorithms,
Efficient Data Adapted Decision Tree (EDADT) Algorithm, Optimization Technique,
KDD CUP 99 Dataset |
Source: |
Journal of Theoretical and Applied Information Technology
pp 426 - 433 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
ARTIFICIAL BEE COLONY ALGORITHM, ITS VARIANTS AND APPLICATIONS: A SURVEY |
Author: |
ASAJU LA'ARO BOLAJI, AHAMAD TAJUDIN KHADER, MOHAMMED AZMI AL-BETAR, MOHAMMED A.
AWADALLAH |
Abstract: |
Artificial Bee Colony Algorithm (ABC) is nature-inspired metaheuristic, which
imitates the foraging behavior of bees. ABC as a stochastic technique is easy to
implement, has fewer control parameters, and could easily be modify and
hybridized with other metaheuristic algorithms. Due to its successful
implementation, several researchers in the optimization and artificial
intelligence domains have adopted it to be the main focus of their research
work. Since 2005, several related works have appeared to enhance the performance
of the standard ABC in the literature, to meet up with challenges of recent
research problems being encountered. Interestingly, ABC has been tailored
successfully, to solve a wide variety of discrete and continuous optimization
problems. Some other works have modified and hybridized ABC to other algorithms,
to further enhance the structure of its framework. In this review paper, we
provide a thorough and extensive overview of most research work focusing on the
application of ABC, with the expectation that it would serve as a reference
material to both old and new, incoming researchers to the field, to support
their understanding of current trends and assist their future research prospects
and directions. The advantages, applications and drawbacks of the newly
developed ABC hybrids are highlighted, critically analyzed and discussed
accordingly. |
Keywords: |
Artificial Bee Colony Algorithms; Nature-Inspired Met Heuristics; Swarm
Intelligence Algorithms; Optimizations |
Source: |
Journal of Theoretical and Applied Information Technology
pp 434 - 459 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
OPTIMAL PLACEMENT OF TCSC USING LINEAR DECREASING INERTIA WEIGHT GRAVITATIONAL
SEARCH ALGORITHM |
Author: |
PURWOHARJONO, MUHAMMAD ABDILLAH, ONTOSENO PENANGSANG, ADI SOEPRIJANTO |
Abstract: |
This paper represents the improvement of the Gravitational Search Algorithm
method (GSA) using Linear Decreasing Inertia Weight (LDIW) which is implemented
to determine the optimal placement of TCSC locations and the best rating of the
TCSC in the standard limit on the electric power transmission lines. TCSC is one
of FACTS devices which can perform the compensation of the power system. GSA
method is a new metaheuristic method inspired by Newton's laws of gravity and
mass motion. LDIW-GSA is used to control the speed of the particles on the GSA,
so as to improve the performance of the GSA method. The implementation of LDIW-GSA
used the Java-Bali 500 kV power system. Before optimization, TCSC load flow
results indicated that there was 297.607MW of active power losses and 2926.825
MVAR of reactive power losses. While the results of TCSC load flow was 279. 405
MW of active power losses and reactive power losses was 2082.203 MVAR after
optimization using GSA standard. It was obtained 278.655 MW of active power
losses and active power losses of 1768.374 MVAR with the use of LDIW-GSA. It was
better to be used to minimize power losses in transmission line and also it can
improve the value of the voltage in the range of 1 ± 0.95 compared to GSA
standards prior to placement optimization of TCSC. |
Keywords: |
Gravitational Search Algorithm (GSA), Linear Decreasing Inertia Weight (LDIW),
FACTS device, Thyristor Controlled Series Capacitor (TCSC), (AHPS) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 460 - 470 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
REMOVAL OF HIGH DENSITY IMPULSE NOISE THROUGH MODIFIED NON-LINEAR FILTER |
Author: |
T.SUNILKUMAR, A. SRINIVAS, M. ESWAR REDDY and Dr. G. RAMACHANDRA REDDY |
Abstract: |
A New algorithm for the restoration of gray scale and color images are highly
corrupted by impulse noise (salt and pepper noise) is proposed in this paper.
This proposed algorithm shows better results than the Standard Median Filter (SMF),
Decision Based Median Filter (DBMF), Modified Decision Based Median Filter (MDBMF),
Progressive Switched Median Filter (PSMF) and Modified Decision Based
Unsymmetrical Trimmed Median Filter (MDBUTMF). The proposed algorithm replaces
the noisy pixel by trimmed median value when other pixel values, 0’s and 255’s
are present in the selected window and when all the pixel values are 0’s and
255’s then the noise pixel is replaced by increasing window size and finding
trimmed mean based on algorithm. Different grayscale and color images are tested
by using the proposed algorithm and found to produce better Peak Signal to Noise
Ratio (PSNR) and Image Enhancement Factor (IEF) |
Keywords: |
Image Enhancement Factor, Trimmed Median, Trimmed Mean, Restoration, Peak Signal
To Noise Ratio |
Source: |
Journal of Theoretical and Applied Information Technology
pp 471 - 478 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
SECURING INTERNET APPLICATIONS USING HOMOMORPHIC ENCRYPTION SCHEMES |
Author: |
YOUSSEF GAHI, MOUHCINE GUENNOUN, ZOUHAIR GUENNOUN, KHALIL EL-KHATIB |
Abstract: |
The trend towards delegating data processing and management to a remote party
raises major concerns related to privacy violations for both end-users and
service providers. These concerns have attracted the attention of the research
community, and several techniques have been proposed to protect against
malicious parties by providing secure communication protocols. Most of the
proposed techniques, however, require the involvement of a third party, and this
by itself can be viewed as another security concern. In this paper, we present a
survey of different techniques that aim at secure applications, services, and
routing protocols. We exhibit practical and popular systems/models and highlight
the lack of privacy and confidentiality support in them. Furthermore, to avoid
security breaches, we propose adopting an innovative approach that depends on
data sorted, managed, and processed in encrypted form at the remote servers. To
realize such an approach, the encryption cryptosystem must support both addition
and multiplication over encrypted data. Finally, we highlight some novel tracks
helping in the construction of a fully secure protocol based on the fully
homomorphic encryption schemes. |
Keywords: |
Internet Applications, Security, Homomorphic Encryption Schemes, Cryptography,
Security |
Source: |
Journal of Theoretical and Applied Information Technology
pp 479 - 495 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE FACTORS OF INFLUENCING ACCEPTANCE OF SOFTWARE AS A SERVICE MODEL, TOWARD
SALES FORCE AUTOMATION SYSTEM, ON PHARMACEUTICAL COMPANY IN INDONESIA |
Author: |
A. SUHENDRA, A.B. MUTIARA, H.N. LAILY |
Abstract: |
One of the business models of Cloud Computing that provides internet-based
applications, the so-called Software as a Service (SaaS), allows users to get an
easy way because the infrastructure has already been provided by the application
vendor. The many uses of SaaS model among others is on Sales Force Automation (SFA)
application, which is widely used by companies to monitor the performance of the
mobile team serving in the field in order to increase sales/service, and another
one which is the focus of this thesis is the one used in pharmaceutical
companies. However, the acceptance of SFA system with SaaS model on
pharmaceutical companies in Indonesia is not too encouraging. Therefore, this
study investigated factors that influence the SFA system with SaaS model on
pharmaceutical companies in Indonesia, using the Technology Acceptance Model
(TAM). The variables studied were Perception of Usefulness, Perception of Ease
to Use, Perception of Risk, Perception of Price, Visibility, and Social
Influence against the Attitude towards Using SFA System with SaaS Model. The
study took samples from the decision makers of pharmaceutical companies in the
Greater Jakarta and Bandung, with the number of valid questionnaires of 50
respondents. The results obtained with multiple regression is that the
significant factors influencing the acceptance of SFA system with SaaS model is
the Perception of Price factor and the Social Influence factor, with each test
value for p-value Significant coefficients of 0001 and 0 (p-value <0.05). The
test results also suggested that other factors studied do not significantly
influence the attitude towards the use of the SFA system with SaaS model. |
Keywords: |
Cloud Computing, SFA, SAAS, Acceptance Model |
Source: |
Journal of Theoretical and Applied Information Technology
pp 496 - 503 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
A SYSTEM DEVELOPMENT METHODOLOGY FOR ERP SYSTEM IN SMEs OF MALAYSIAN
MANUFACTURING SECTORS |
Author: |
YOUSEF KHALEEL, RIZA SULAIMAN |
Abstract: |
Improvement in the effectiveness and competitiveness of Malaysian SMEs (Small
Medium Enterprises) in the global market is very important, because these SMEs
an essential role in the Malaysian economic growth. The ERP (Enterprise Resource
Planning) is a significant tool to increase the effectiveness and
competitiveness the SMEs. The ERP enhances the efficiency of the whole business
operations in an organization and increase the optimal income. Nevertheless the
due to various reasons the implementation of the ERP has not been successful in
many organizations and hence its success rate of implementation is quite low. A
lot of researchers have identified the factors that constitute towards the
successful implementation of the ERP. It has been identified that majority of
the SMEs tend to refrain from adopting the ERPs due to the cost and complex
implementation factor. In this paper, the authors have developed and proposed an
efficient methodology that enables successful implementation of ERP system in
SMEs. The aim of this paper provides a platform to accomplish the objectives of
ERP system. However for the purpose developing ERP systems to suit the needs of
Malaysian manufacturing SMEs a new methodology is required. Hence this paper
proposes a methodology that comprises two main methods: (1) preliminary study
which includes two quantitative questionnaires, current status questionnaire and
readiness assessment questionnaire; and (2) system development method which
includes four phases that make up the ERP system development method are:
analysis and definition, design, construction, and evaluation stages |
Keywords: |
ERP System Development Methodology |
Source: |
Journal of Theoretical and Applied Information Technology
pp 504 - 513 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NOVEL APPROACH FOR DETECTING SMART CAMOUFLAGING WORM |
Author: |
JEEVAAKATIRAVAN, D.HEMAPRIYADHARSHINI, C.CHELLAPAN R. DHANALAKSHMI |
Abstract: |
Active Worms wreak havoc by exploiting security loopholes and flaws in software
design to propagate from one machine to another. Active Worms are different than
a traditional virus in that they don’t spread by modifying programs on a single
system, but rather by searching for and implanting destructive code onto other
systems automatically. In this paper, we propose a novel approach for detecting
an intricate type of smart worms called C-Worms. Camouflaging worms (C-Worms)
falls under the new category of active worms which conceals its presence by
blending with the environment in such a way that it looks analogous to the
normal data packet of the network. Thus the propagation of C-Worms and its
traffic pattern cannot be determined by the existing worm detection schemes. To
countermeasure the C- Worm, we design a new worm detection scheme called
Controlled Packet Transmission (CPT) technique where the background traffic is
monitored as a function of time. Furthermore, we employ Centralized Worm
Detector (CWD) algorithm based on digital signature technique to authenticate
each node and monitor the network. Using the CWD algorithm, malicious C-Worm
nodes are discarded and the recovered network is monitored. The performance
graph obtained experimentally clearly proves that our detection scheme can
effectively detect the C-Worm propagation. |
Keywords: |
Active worm, Camouflaging worm, Controlled Packet Transmission, Centralized Worm
Detector |
Source: |
Journal of Theoretical and Applied Information Technology
pp 514 - 520 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
A COMPREHENSIVE STUDY OF ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS |
Author: |
ZAMREE CHE-ARON, AISHA HASSAN ABDALLA, KHAIZURAN ABDULLAH, OMER MAHMOUD |
Abstract: |
The rapid development of wireless communication technologies results in the
problem of radio spectrum shortage. Additionally, the traditional fixed spectrum
allocation scheme can lead to the significant spectrum underutilization.
Cognitive radio (CR) is an emerging technology to solve those problems by
enabling unlicensed users to opportunistically access the available licensed
bands in an intelligent and cautious manner. In cognitive radio networks (CRNs),
the data routing is one of the most important issues to be taken into account
and requires more study. This paper surveys recent routing protocols for CRNs
and introduces the classification of routing techniques as well as presenting
significant challenges which need to be considered for routing design. The main
purpose of this survey is to provide a comprehensive and critical study on the
current routing schemes in order to expose new open issues as well as being
utilized to either improve the existing routing techniques or to develop new
routing solutions. The possible future research in routing for CRNs is also
given. |
Keywords: |
Routing Protocols, Cognitive Radio Networks, Routing Challenges, Routing
Categories |
Source: |
Journal of Theoretical and Applied Information Technology
pp 521 - 536 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
HYBRID BIG BANG–BIG CRUNCH OPTIMIZATION BASED OPTIMAL REACTIVE POWER DISPATCH
FOR VOLTAGE STABILITY ENHANCEMENT |
Author: |
Z. ZANDI, E. AFJEI, AND M.SEDIGHIZADEH |
Abstract: |
One of the most crucial functions in the operation and control of power system
is reactive power dispatch (RPD).A hybrid Big Bang–Big Crunch (HBB–BC)
optimization algorithm which consists of A Big Bang–Big Crunch algorithm
combined with particle swarm optimization (PSO) is proposed in this paper in
order to solve optimal reactive power dispatch (ORPD) problem. The L-index of
load buses is base for the monitoring methodology for voltage stability.
Minimizing the real power loss is the objective. This algorithm is used to find
the settings of control variables such as generator voltages, tap positions of
tap changing transformers and switchable VAR sources. Furthermore, the
optimization models are implemented and solved using the GAMS programming
language .The proposed method has been carried out on IEEE 30 -bus test system.
For comparative study the results obtained by the proposed algorithm are
compared with those obtained by modeling the optimization problem in the GAMS
environment. The outcomes indicate that the real power loss is decreased with
voltage stability margins increased simultaneously. |
Keywords: |
Particle Swarm Optimization, Reactive Power Dispatch, Voltage Stability ,Big
Bang–Big Crunch Algorithm, L-Index |
Source: |
Journal of Theoretical and Applied Information Technology
pp 537 - 546 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
SOME NOVEL MEASUREMENT ON EXPLORING LARGE DATA SETS BASED ON MULTI-VARIABLES
MUTUAL INFORMATION THEORY |
Author: |
YU-SHAN JIANG, QING-LING ZHANG, CHAO LIU |
Abstract: |
Applying for information theory, we present a measure of dependence for
three-variable relationships: the three variables maximal information
coefficient (3D-MIC). It is a kind of maximal information-based nonparametric
exploration (MINE) statistics for identifying and classifying relationships in
large data sets. 3D-MIC generalized the MIC measurement. At the same time some
optimal single axis partition algorithm (OSPA) is built to ensure the
feasibility of the MIC measurement. |
Keywords: |
Mutual Information, Maximal Information-Based Nonparametric Exploration (NE),
Dynamic Programming, Maximum Information Coefficient (MIC), Optimal Single Axis
Partition Algorithm (OSPA) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 547 - 550 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON JOB-SHOP SCHEDULING PROBLEM BASED ON IMPROVED PARTICLE SWARM
OPTIMIZATION |
Author: |
ZUFENG ZHONG |
Abstract: |
Considering the standard particle swarm optimization (PSO) has the shortcomings
of low convergence precision in job shop scheduling problems, the job shop
scheduling solution is presented based on improved particle swarm optimization
(A-PSO). In this paper, the basic theory of A-PSO is described. Also, the coding
and the selection of parameters as well as the decoding of A-PSO are studied. It
uses the maximum flow time which is minimized to evaluate the performance of the
algorithm, and applies it to solve a typical scheduling problem. A large number
of simulation results show that this algorithm has good feasibility and
effectiveness in job-shop scheduling problem. |
Keywords: |
Particle Swarm Optimization; Coding; Job-Shop Scheduling Problem; Intelligence
Optimization Algorithms |
Source: |
Journal of Theoretical and Applied Information Technology
pp 551 - 555 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON SPATIAL INDEX OF ELECTRIC GIS |
Author: |
WANG XIAOHUI, WU KEHE, CHEN FEI |
Abstract: |
In the electric GIS, facilities in different voltage levels show a different
proportion, and topological relations exist in line and point. According to the
limitations in multi-scale representation and topological connection of
traditional spatial index, an extended R-Tree model based on multi-scale
clustering (MCER Tree) is proposed, which removed the restrictions of the same
height of all leaf nodes, but increased pointer to line list of spatial object.
This paper focused on the structure, generation algorithms and insertion
algorithms of MCER Tree, and finally proposed the future research. |
Keywords: |
Electric GIS, Spatial Index, MCER Tree, Cluster Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
pp 556 - 561 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
OBJECTIVE EVALUATION SYSTEM OF ENGLISH PHONEMES |
Author: |
JING ZHANG, SIMIN YU |
Abstract: |
Nowadays it is quite difficult for the traditional teaching methods and
resources to meet the widespread and urgent needs of spoken English learning.
Computer-assisted Language Learning (CALL) technology can greatly improve the
efficiency of language self-learning, providing timely, accurate and objective
assessment and feedback which can help learners to find the difference between
their own pronunciations and the standard pronunciations, and then correct their
own pronunciations. This paper presents an objective evaluation system about
English phoneme pronunciation. This system can give an objective evaluation and
feedback about student's pronunciation by analyzing the waveform and calculating
the Mel Mel-Frequency Cepstrum Coefficients (MFCC) Euclidean distance between
student's pronunciation and standard pronunciation using the Dynamic Time
Warping (DTW) algorithm, to help students learn English phonemes with no teacher
involved. |
Keywords: |
Computer-assisted Language Learning (CALL), Pronunciation Evaluation, MFCC, DTW |
Source: |
Journal of Theoretical and Applied Information Technology
pp 562 - 568 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
EXPONENTIAL STABILITY OF STRONG SOLUTION FOR A STOCHASTIC DISTURBANCE
PREDATOR-PREY SYSTEM OF THREE SPECIES WITH AGE-STRUCTURE |
Author: |
CHENLIYU, LIUSI |
Abstract: |
This thesis first introduces stochastic disturbance factor into a model and has
a discussion of it on the basis of a predator-prey system of three species with
age-structure proposed by Zhixue Luo. Sufficient conditions of a stochastic
disturbance predator-prey system of three species with age-structure have been
given and exponential stability of strong solution has been proved according to
Gronwall’s lemma and formula. The conclusion is a further development of
pertinent literature. |
Keywords: |
Exponential Stability, Stochastic Disturbance, Formula, Gronwall’s Lemma, Three
Species Subject Classification :(AMS) 35B10, 45D05, 60H15, 34K40 |
Source: |
Journal of Theoretical and Applied Information Technology
pp 569 - 574 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
CRANK ROUND SLIDER ENGINE MULTI-FLEXIBLE-BODY DYNAMICS SIMULATION |
Author: |
HONG-YUAN ZHANG, XING-GUO MA |
Abstract: |
Based on multi-flexible-body dynamics theory, through the combination of finite
element method software and multi-body system dynamics software, a multi-body
system dynamics model of a crank round slider engine is established. In
consideration of the influence of rigid-flexible coupling on the system, a
dynamics analysis on a piston is performed to obtain displacement, velocity and
accelerating curve of the piston as well as dynamic response in a period. The
combination of a rigid body and a flexible body can achieve more intuitive and
correct simulation of the actual working conditions of the engine, which
provides an important evidence for the design and improvement of the engine |
Keywords: |
Multi-Flexible-Body Dynamics, Rigid-Flexible Coupling, Finite Element Method,
Engine |
Source: |
Journal of Theoretical and Applied Information Technology
pp 575 - 579 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE SITE SELECTION AND OPTIMIZATION OF TANGSHAN PASSENGER WEST STATION |
Author: |
MI XUE YUE, JIANG JUN NA |
Abstract: |
In recent years, the proportion of Tangshan high-speed direct passenger in
passenger transport is increasing. The existing bus terminal is still mainly
dominated by ordinary road passenger. Bus terminal bit unreasonable station
level is low, can not meet the requirements of the development of future
high-speed passenger. The papers using principal component analysis to analyze
the factors that affect passenger traffic, to determine the district's
high-speed passenger traffic. Quantitative calculation and qualitative analysis
method can produce a number of alternative sites. Finally, the establishment of
maximum economic efficiency model, Compare the combined costs of various
options, select the minimum cost solutions as the optimal site. |
Keywords: |
Express Bus Terminal, Site, Passenger Traffic, Optimization Model |
Source: |
Journal of Theoretical and Applied Information Technology
pp 580 - 585 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
CAR B-PILLAR SKID PLATE MOLDING PARAMETER OPTIMIZATION |
Author: |
WANG YOUMIN, YU CHUN, 3CHEN MINGXIN, ZHOU GE,DOU ZONGYING, YANG XAOLI, DU
XIAOYANG |
Abstract: |
To obtain the best injection molding process parameters and mold design for the
car B-pillar skid plate, the process parameters of injection molding CAE needs
to be optimized. After determining the parts quality standards, we complete the
range and analyze the results. But this method can only identify the influence
trend of parameters on the test results; it can’t get the best process
parameters. This paper uses the modified simplex method as optimization method.
We transform the function optimization into the injection molding CAE process
optimization. The injection molding process parameters are optimized. We get the
best parts injection molding process parameters: the Mold temperature is 33.24,
the melt temperature is 213.98℃, injection pressure is 80.12MPa, parts of the
program sink mark index is 0.5221%, volume shrinkage is 1.0143% , maximum
warping deformation is 1.426mm, the cavity residual stress is 4.8333MPa. Car
B-pillar skid plate is injected according to the best process parameters, the
obtained parts have met our quality requirements. |
Keywords: |
Injection Molding(IM), Process Parameters(PP), Optimization(O) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 586 - 589 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
A METHOD FOR INTUITIONISTIC FUZZY MULTI-ATTRIBUTE DECISION MAKING WITH
INCOMPLETE ATTRIBUTE WEIGHT INFORMATION |
Author: |
YUANYUAN HE, ZAIWU GONG |
Abstract: |
A new method for solving intuitionistic fuzzy multi-attribute decision making
problem is proposed, in which the information of attribute weights is
incompletely known. Considering much information about hesitancy and vagueness
inherited to intuitionistic fuzzy sets, a new class of distance for describing
the deviation degrees between intuitionistic fuzzy sets is introduced.
Furthermore, the measure of similarity degree for each alternative to ideal
point is calculated by using the new proposed fuzzy distance. A model of TOPSIS
is designed with the introduction of the particular closeness coefficient
composed of similarity degrees for alternative ranking. Finally, a numerical
example is given to show feasibility and effectiveness of the developed method. |
Keywords: |
Intuitionistic Fuzzy Set(IFS), Similarity Degree(SD), Closeness Coefficient(CC) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 590 - 593 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
REMOTE MONITORING AND INTELLIGENT ANALYSIS PLATFORM FOR WATER QUALITY IN LAKE
RESERVOIR |
Author: |
LIN LI, ZAI-WEN LIU, XIAO-YI WANG, JI-PING XU |
Abstract: |
As for a relatively backward situation in monitoring of water quality and
prediction and early-warning of algal bloom in lake reservoir, an intelligent
information platform integrating monitoring and analysis of water quality, and
prediction and early-warning of algal bloom is developed. Lower data acquisition
instrument is based on main ARM controller, adopting WinCE OS, and integrates
serial-port communication technology, GPS technology and GPRS remote data
communication technology, so as to collect and transmit information on water
quality; upper analytical system is established using C++, and combines key
technologies like network communication, geographic information system and
SQL2005 database, so as to analyze data on water quality collected by instrument
and realize functions like real-time monitoring and history inquiry of
information on water quality. In addition, high-precision prediction and
early-warning to algal bloom in lake reservoir are realized through grey-BP
neural network model, providing an effective information decision-making
platform for environment protection bureau to prevent and treat algal bloom in
lake reservoir. |
Keywords: |
Remote Monitoring Of Water Quality; Intelligent Analytical Platform; Neural
Network; Prediction And Early-Warning |
Source: |
Journal of Theoretical and Applied Information Technology
pp 594 - 597 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
DATA ACQUISITION SYSTEM OF A SELF-BALANCING ROBOT BASED ON FPGA |
Author: |
DAODE ZHANG, QIANG WANG, CHENG XU |
Abstract: |
For inverted pendulum principle of two-wheeled self-balancing robot, this paper
describes the use of FPGA controller for attitude sensor data acquisition system
design. Using Verilog HDL hardware description language data acquisition module
and A / D converter module, it can have the attitude sensor data of the FPGA
control system collected early and accurately , and the way is given to solve
the multi-sensor data collection, using the area reuse and reconfiguring idea of
FPGA .The results show that the system is stable, reliable, accurate data
collection. |
Keywords: |
Self-Balance Robot ;FPGA ; Data Acquisition ;Verilog HDL |
Source: |
Journal of Theoretical and Applied Information Technology
pp 598 - 610 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
ANT-COLONY-ALGORITHM-SIMULATED-ANNEALING-ALGORITHM-BASED OPTIMIZATION APPROACH
FOR MCM INTERCONNECT TEST |
Author: |
CHEN LEI |
Abstract: |
In this paper, a novel optimization approach based on ant colony algorithm (ACA)
and simulated annealing algorithm (SA) is presented for the Multi-chip Module (MCM)
interconnect test generation problem. In order to apply ACA into the
interconnect test, the pheromone updating rule and state transition rule is
designed by combing the characteristics of MCM interconnect test generation. By
using the method, the ideal searching direction of global optimal solution could
be found as soon as possible, while the shortcomings of high initial temperature
required and slow convergence speed of SA were also overcame. ACA generates the
initial candidate test vectors in this approach. In order to get the best test
vector with the high fault coverage, SA is employed to evolve the candidates
generated by ACA. The international standard MCM benchmark circuit was used to
verify the approach. After comparing with not only the evolutionary algorithms,
but also the deterministic algorithms, the simulation results indicate that this
optimization approach can achieve high fault coverage, compact test set and
short execution time. |
Keywords: |
Ant Colony Algorithm (ACA), Simulated Annealing Algorithm (SA), Multi-chip
Module (MCM) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 611 - 615 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON THE INVERSE KINEMATICS FOR 5R MANIPULATOR AND ITS IMPLEMENTATION
BASED ON FPGA |
Author: |
HU XINYU, ZHANG DAODE, YANG GUANGYOU, WANG QIANG |
Abstract: |
Analyzing the inverse kinematics theory and its solution method for 5R series
manipulator, introducing the establishment of link coordinate system and D_H
parameters for 5R series manipulator, studying the algorithm of inverse
kinematics solutions based on FPGA controller for 5R manipulator, the system
constructs the SOPC system architecture that is based on the Nios II CPU, uses
the C program to compile the inverse kinematics solving module and adopts the
Robotics Toolbox to simulate the inverse kinematics theory. The results show
that the algorithm is effective to realize the inverse solutions of kinematics
for 5R serial manipulator with FPGA |
Keywords: |
Series Manipulator; FPGA; Inverse Kinematics; Link Coordinate System |
Source: |
Journal of Theoretical and Applied Information Technology
pp 616 - 621 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
EXPRESS AVIATION NETWORK CONSTRUCTION BASED ON HUB-SPOKE THEORY |
Author: |
MINGKE HE, HONGJING CHENG, HAOXIONG YANG |
Abstract: |
Air freight network is one of the important means to improve the competitiveness
of express enterprises. This paper establishes the model from two aspects, hub
location decisions and hub number decisions, with the goal to achieve the lowest
air freight network cost, based on the “hub-spoke” theory. Then, computes the
cost of different number of hubs, and uses super-efficiency DEA model to decide
the number of hubs. Finally, an example is illustrated and the results show that
the model is reasonable and feasible. The “hub-spoke” network can help to
improve efficiency of resource utilization and competitiveness of express
enterprises. |
Keywords: |
Express Company, Hub-Spoke Network, Genetic Algorithm, Super-efficiency DEA
Model |
Source: |
Journal of Theoretical and Applied Information Technology
pp 622 - 627 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
FEATURE ANALYSIS ON QUEUE LENGTH OF ASYMMETRIC TWO-QUEUE POLLING SYSTEM WITH
GATED SERVICES* |
Author: |
WANG XINCHUN, LIU YUMING, CHENG MAN , YE QING |
Abstract: |
On the basis of establishing mathematical model and defining the parameters and
treating embedded Markov chains and probability generating function as math
tools, the paper analyzed discrete-time, non-symmetric dual-threshold service
queue system precisely, and it derived first order and second order
characteristics of the system. The paper calculates the average queue length and
average waiting delay of information group. Simulation experiment based on
system running mechanism and theoretical calculations have good consistency. The
analysis laid the solid foundation for research of gated polling system based on
asymmetric multi queue; it further deepens the perception of asymmetric gated
polling system; it is meaningful to dominate polling system flexibly. |
Keywords: |
Asymmetric; Two-Queue; Gated Polling System; Feature Of Average Queue Length;
Simulation And Theoretical Calculation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 628 - 632 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
SYSTEM OF PREVIEW AND DETECTION BASED ON NETWORK VIRTUAL EXPERIMENT |
Author: |
BANGLI SHI, YI YANG, PENG XU |
Abstract: |
As an important supporting means for teaching in university, virtual experiment
makes up the lack of resources in experiment teaching. Network virtual
experiment is a new development direction following the virtual experiment, it
has inherited and carried forward the concept of virtual experiments, extending
and expanding the resources of virtual experiments. It realizes the preview and
detection of experiment by the networked virtual experiment, which ensures the
reality of experiment process and data, and reduces teacher's workload, so that
it provides a firm base for automated management of experiment teaching. |
Keywords: |
Virtual Experiment (VIREXP), Internet Technique, System of Experiment Preview,
Network |
Source: |
Journal of Theoretical and Applied Information Technology
pp 633 - 637 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NEW SELECTION ALGORITHM BASED ON REPUTATION AND CONTRACT-MANAGEMENT |
Author: |
LINGYU XU, YINGHUA SUN |
Abstract: |
In Grid, the reputation of users is the important indicator for service
selection, particularly in the situation with the combination of Grid
technologies and economic models. A contract-management model based on
reputation evaluation and a service selection algorithm are proposed in this
paper. The applied strategy facilitates the users of similar reputation to carry
out transactions. The experimental results illustrate that the model is
effective. It not only can improve the success rate of the users with good
reputation, but also can speed up the elimination of the users with poor
reputation. |
Keywords: |
Grid Market, Grid Architecture for Computational Economy, Reputation value,
Contract-Management,Structure of GMACT |
Source: |
Journal of Theoretical and Applied Information Technology
pp 638 - 643 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE RESEARCH ON NONLINEAR CHARACTERISTIC OF FIXED DISPLACEMENT PUMP–VARIABLE
MOTOR SYSTEM |
Author: |
AI CHAO, KONG XIANGDONG, WANG JING |
Abstract: |
In different system working points, response characteristics of the fixed
displacement pump – variable motor volume speed control system are different.
For example, after the input speed of the fixed displacement pump and the pivot
angle of the variable motor are changed, the same variation in pivot angle of
the motor causes different variation in speed of the motor. Therefore,
multiplication nonlinear law works here. As for this problem, small signal
linearization method is adopted to analyze a fixed displacement-variable motor
system transfer function and obtain the relationship among natural frequency,
damping ratio and the pivot angle of the motor. Further identify the
experimental data, experimental value for natural frequency and damping ratio of
the system is obtained. Also, fitting method is adopted to obtain the
relationship among natural frequency, damping ratio and pivot angle of the
motor, which lays the foundation for the application of fixed displacement
pump-variable motor speed control system. |
Keywords: |
Fixed Displacement Pump – Variable Motor Volume Speed Control System,
Multiplication Nonlinear Law, Small Signal Linearization Method, System
Identification |
Source: |
Journal of Theoretical and Applied Information Technology
pp 644 - 648 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
REAL-TIME MEDICAL MONITORING SYSTEM DESIGN BASED ON INTRA-BODY COMMUNICATION |
Author: |
SHUANG ZHANG, YU PING QIN, PENG UN MAK , SIO HANG PUN, MANG I VAI |
Abstract: |
With soaring of the sub-health population around the world, the traditional
medical treatment has not met the increasing demand; it is urgent to create a
modern nursing technology to provide service for human being. With development
of the sensor technology and continuous improvement of the wireless
communication technology, the new medical monitoring system has been gradually
released from the traditional human-labor nursing. On the basis of development
of the intra-body communication technology, a wireless, wound-free, portable
medical system with real-time monitoring is proposed in this paper. In
combination with the remote diagnosis system in the modern medical treatment,
the sensor technology and the intra-body communication technology can be
utilized to provide all-sided and real-time monitoring for individuals. Because
data fusion can be effectively implemented between the systems and WAN & LAN,
the model of the medical monitoring system for families is also presented in
this paper, which offers guidance for further promotion of real-time medical
monitoring. |
Keywords: |
Intra-Body Communication, Portable, Wearable Equipment, Medical Monitoring
System |
Source: |
Journal of Theoretical and Applied Information Technology
pp 649 - 652 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
3-D SPACE FLIGHT FORMATION CONTROL FOR UAVS BASED ON MAS |
Author: |
YANSONG DENG, KAIYU QIN, GUANGMING XIE |
Abstract: |
A Multi-Agent System(MAS) consensus based algorithm is proposed for Multi-UAVs
to maintain a specified time-varying geometric configuration for formation
flight in 3-D space. Use decoupling characteristics in altitude control of
Multi-UAVs, formation problem in 3-D space, was decomposed altitude control and
plane control. In this approach, the proposed control strategy requires only the
local neighbor-to-neighbor information between vehicles. Speed, heading angle.
Then height synchronization is realized and the 3-D space formation flight can
be achieved, and formation transform was investigated. The simulation results
show that, this method has good robustness and scalability, simple calculation
and a small amount of communication, and make the formation in 3-D space become
easy to implement. |
Keywords: |
MAS, UAV, Consensus, Formation Flight, 3-D Space |
Source: |
Journal of Theoretical and Applied Information Technology
pp 653 - 659 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
FREE VIBRATION CHARACTERISTICS ON A SPLIT TORQUE TRANSMISSION |
Author: |
ZHAOXIA HE, LEHAO CHANG, LAN LIU |
Abstract: |
The free vibration characteristics of a dual split torque transmission are
studied in this work. A transverse-torsional coupling dynamic model is developed
using lumped parameter method. The natural frequencies and mode shapes are
calculated by solving the eigenvalue problem of the differential equations of
motion. The vibration modes of the system are classified into translational mode
and rotational mode, and the characteristics of the two modes are described in
details. The modal strain energy and kinetic energy are introduced to study the
impact of mesh stiffness, component masses and moments of inertia. The influence
of the concerned parameter on a certain mode can be effectively determined by
inspection of the modal energy distribution. The effect of the torsional
stiffness of the shaft connecting two stages is also studied. The results
presented in this work can provide references for the design of dynamic
performance of the split torque transmission. |
Keywords: |
Split Torque Transmission, Modal Analysis, Mesh Stiffness, Modal Strain Energy,
Kinetic Energy |
Source: |
Journal of Theoretical and Applied Information Technology
pp 660 - 665 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN IMPROVED CDAR ALGORITHM BASED ON REDUCING THE SCANNING TRANSACTION DATA |
Author: |
LI-FENG WU, JIAN XIAO |
Abstract: |
The research modifies the CDAR algorithm to the itemsets scanning transaction
data method, and joins in the concept of deleting the non-frequent itemsets in
the transaction data. It judges whether the itemsets can satisfy the minimum
support degree. In order to mine the association rules, the paper puts forward
an effective algorithm, that is, improved CDAR algorithm. From the experimental
estimation, it shows that the improve_CDAR algorithm can effectively improve the
execute performance. |
Keywords: |
Data Mining, Association Rule, Improved CDAR |
Source: |
Journal of Theoretical and Applied Information Technology
pp 666 - 670 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
A PRIVACY PRESERVING DATA MINING SCHEME BASED ON NETWORK USER’S BEHAVIOR |
Author: |
LI-FENG WU, JIAN XIAO |
Abstract: |
The privacy preserving data mining has become a research hot issue in the data
mining field. The server log of the Web site has preserved the page information
visited by users. If the page information is not protected, the user’s privacy
data would be leaked. Aiming at the problem, it discusses the privacy preserving
problem based on the user’s behavior in the Web data mining, and then introduces
a method which converts the Web server log information into the relational data
table, produces the information which disturbs the data sheets with a randomized
responding method. It offers the data users a discovery algorithm of the
frequent itemsets and the strong association rules, then it receives the real
private association rule among the online shopping basket goods. The experiments
prove that the introduced privacy of the privacy preserving association rule
mining algorithm in the Web data mining is good, and it has definite
applicability. |
Keywords: |
Data Mining, Conversation Identification, Privacy Preserving; Association Rule,
Web Log |
Source: |
Journal of Theoretical and Applied Information Technology
pp 671 - 678 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
CONSTRUCTION OF MULTI-LEVEL ELECTRICAL AND ELECTRONIC PRACTICE SYSTEM |
Author: |
SHOUCHENG DING |
Abstract: |
The science multi-level practice teaching system not only can improve the
students’ basic practical skills, but also improve students' practical ability
and ability to operate, and can identify problems through practice, analyze
problems, to solve the problem. Also it can promote the students integrated use
of the theory knowledge, and further propose new ideas, new theories, and then
design a new practice, explore new ideas, acquire new knowledge, stimulate
innovative thinking. The article studied the experimental system based on LAN
and virtual experimental simulation system. After years of reform and teaching
practice, this paper explores a set of electrical and electronic course practice
teaching system; the teaching effect is very significant, and it is a popular
promotional value. |
Keywords: |
Multi-level Practice Teaching, Capacity, Quality, Innovative Thinking |
Source: |
Journal of Theoretical and Applied Information Technology
pp 679 - 686 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS ON THE DIFFERENT PLASTIC REGION BETWEEN 2D AND 3D MODEL IN UNDERGROUND
CAVERNS EXCAVATION |
Author: |
CHUNHUA YOU, FANG HAN |
Abstract: |
Analysis and calculation in underground caverns excavation is absolutely a
complex three-dimensional (3D) problem, but a two-dimensional (2D) model is
usually applied to substitute for the 3D model because of the limit of computer
speed and the complexity of the FEM 3D grids. This paper discusses the
difference of this two models on the basis of Drucker-Prager yield criteria and
the reason why the plastic region from 3D finite element model is smaller than
that from 2D model is analyzed in theory. At last, comparative analysis based on
the classical FEM software ABAQUS is constructed. The conclusion intuitively
shows that the plastic region of 2D model is bigger than that of 3D model, so it
is suggested that the 3D finite element model should be built as far as possible
in order to describe the plastic region accurately. |
Keywords: |
Underground Caverns, Plane Strain, Three-dimensional Model, Plastic Region,
Model Updating |
Source: |
Journal of Theoretical and Applied Information Technology
pp 687 - 691 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
BLADE LOAD CONTROL OF WIND TURBINE BASED ON VARIABLE-PITCH CONTROL STRATEGIES |
Author: |
HAIJUN REN |
Abstract: |
The control strategies of blade loads are proposed for the characteristics of
blade stresses of variable-speed variable- pitch wind turbine. Blade loads are
divided into two static and dynamic components. The pitch angle and generator
torque are controlled by Single neuron PID controller in the static part.
Variables are converted from rotational coordinate to fixed coordinate through
multi-blade coordinate transformation theory. Then, the control parameters
obtained are converted to the one in rotational coordinate frame via multi-blade
inverse transformation in the dynamic part. The parameters of static part are
added to the parameters of dynamic part, yielding control value for wind turbine
pitch control. The external controller of Bladed is designed and the control
strategies are simulated by the professional design software Bladed for wind
turbines. The control performance of external controller is compared with and
that of internal controller. Simulation results show that external controller
can reduce the tilt torque of blade root and blade flapwise torque. Thus the
proposed external controller possesses a better performance, the correctness of
the proposed blade load control strategies is verified. |
Keywords: |
Wind Turbine, Variable-pitch System, Coordinate Conversion, Load Control |
Source: |
Journal of Theoretical and Applied Information Technology
pp 692 - 696 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
DAMAGE FOLDING MUTATION MODEL OF FRACTURING ROCK MASS ON THE OIL-GAS RESERVOIR |
Author: |
WANCHUN ZHAO, TINGTING WANG, WEIWEI YUAN, BING GUAN |
Abstract: |
According to the core problem of the oil-gas reservoir fracturing crack
formation, this paper proposes that the essence of the oil-gas reservoir
fracturing crack formation is the deformation energy accumulation increase and
suddenly release of the rock mass which is resulted by fracturing pump work.
Based on the principle of conservation of energy, the reservoir fracturing rock
mass damage folding mutation model is established. The standard form of balance
equation and energy release about the reservoir fracturing rock mass mutating is
given. Combined with the actual fracturing of a block of Daqing Oilfield, the
energy release quantity is calculated and the calculated result is reasonable
which provides a new method for the study of the hydraulic fracturing crack
parameters. |
Keywords: |
Hydraulic Fracturing, Folding Mutation, Damage Theory |
Source: |
Journal of Theoretical and Applied Information Technology
pp 697 - 701 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
A FLEXIBLE VITERBI DECODER FOR SOFTWARE DEFINED RADIO |
Author: |
LI ZHOU, MIN TANG, DONGPEI LIU, HENGZHU LIU |
Abstract: |
Modern wireless communication standard varies a lot from each other and is
evolving rapidly. Flexibility becomes the dominate consideration of software
defined radio (SDR) system design. Reconfigurable platform is preferred in the
SDR due to the reuse of hardware. Convolutional code is widely adopted in many
wireless protocols but the code parameter differs. In order to support
multi-standard service, a decoder compatible for different protocols is needed.
In this paper, we designed a flexible Viterbi decoder which is compatible with
WiMAX, UMB and LTE’s channel coding scheme. High efficient cascaded
Add-compare-select unit architecture and sliding window method for trace back
are presented. Meanwhile, conflict free memory access model is also given. FPGA
prototype shows our design is highly flexible while maintaining a high
throughput with low area cost compared to others. |
Keywords: |
Viterbi Decoder, Flexible Architecture, Software Defined Radio |
Source: |
Journal of Theoretical and Applied Information Technology
pp 702 - 706 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
COUPLING EFFECT OF UWB-EMP ON IRREGULAR CAVITY |
Author: |
QIAN YANG, XIAOPENG YAN, YONGLIANG LI, JIANTAO WANG, JING HAN |
Abstract: |
The electromagnetic coupling effect on the irregular cavity which is acted by
ultra wide band electromagnetic pulse (UWB-EMP) is studied. First, an irregular
cavity structure model is established by using electromagnetic numerical
calculation software (CST). Second, based on the model, the influences of
UWB-EMP on the irregular cavity coupling efficiency are analyzed, when its rise
time and pulse width change. Simulation show that: the shorter the rise time is,
the better the coupling efficiency is gotten; pulse width almost has no
influence on coupling efficiency. Furthermore, the signal frequency distribution
of the typical positions in the cavity model are analyzed, which helps to
improve the electronic equipment anti intense electromagnetic pulse interference
abilities. The research results have an important guiding significance to
improve the protection ability of the typical electronic equipment to UWB-EMP in
practice. |
Keywords: |
UWB-EMP, Coupling Effect, Irregular Cavity, Rise Time, Pulse Width |
Source: |
Journal of Theoretical and Applied Information Technology
pp 707 - 711 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS OF THE TEMPERATURE INFLUENCE ON GALVANIC CORROSION AND MATHEMATICAL
MODEL |
Author: |
CHUNLI WANG, JIANHUA WU, QINGFEN LI |
Abstract: |
The general and galvanic corrosion of high strength steel (980), high strength
steel (907) and high strength steel (921A) in seawater at elevated temperatures
has been analyzed using electrochemical measurements and a zero-resistance
ammeter (ZRA). After the tests, the surface morphologies of the samples have
been detected by SEM. Results show galvanic corrosion behavior of 980/907/921A
fulfill the mixed potential theory, 921A acts as the anode and both 980 and 907
act as the cathodes. These results using ZRA have been compared with results
estimated from the polarization curves according to the mixed potential theory
(imposed potential measurements). The effect of temperature on the galvanic
corrosion estimated using both types of measurements are basically in agreement,
since temperature increases the galvanic current density of the pair in both
cases. The galvanic current density with increasing temperature is estimated by
the exponential function. |
Keywords: |
Galvanic Corrosion, Temperature, Seawater, High Strength Steel |
Source: |
Journal of Theoretical and Applied Information Technology
pp 712 - 717 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
GLOBAL PATH PLANNING BASED ON SKELETON EXTRACTION ALGORITHM |
Author: |
JUN WANG, MING LI, DONG LI |
Abstract: |
Skeleton extraction algorithm can transform two-dimensional map into a skeleton
diagram, which provide more convenience to global path planning of the complex
map. This article first extracts skeleton extraction of the global map using the
skeleton extraction algorithm and finds all paths of flat map. Based on this we
can use search algorithms to search, and find a feasible path connecting
starting point and target point. At last we use the optimized algorithm to find
optimize the path to achieve the global path planning and optimization in the
map. In the simulation, we use the complex maze of the map to validate the
algorithm and the effect of it in simulation condition show the effectiveness of
the algorithm. |
Keywords: |
Skeleton Extraction, Global Path Planning, A* Algorithm, PSO, Particle Filter,
Map Creating |
Source: |
Journal of Theoretical and Applied Information Technology
pp 718 - 726 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
CREDIT INFORMATION SHARING AND FINANCIAL DEVELOPMENT BASED ON THE RESEARCH OF
INFORMATION CHOICE MODEL |
Author: |
YUNHONG CHAI, YONGNING WANG |
Abstract: |
By examining the existing credit management system and financial institutions
credit behavior, using "Information choice " model to analyze the bank's credit
information collection and sharing of logic reveals the inter-bank credit
information sharing barriers, sharing the effect it brings, produce inter-bank
credit information sharing model which constrained the full effect of incentive. |
Keywords: |
Credit, Sharing of Information, Finance |
Source: |
Journal of Theoretical and Applied Information Technology
pp 727 - 732 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
FINGERPRINTING ALGORITHM BASED ON THE FIGURE’S COLLUSION DATA BASE |
Author: |
HUIFEN HUANG, DEFA HU |
Abstract: |
Under the application occasion of using data base as the soft products
publication, there should be corresponding safety system, which could abstain
the privacy actions from the betray users. A privacy tracing and solution
resolution is raised in this thesis based on the digital fingerprinting
relationship data base. Data fingerprinting database, which combined by patent
watermarking and user’s fingerprint in chaotic binary sequence, is imbedded into
the data base under the control of encryption key. Based on the chaotic binary
sequence’s randomness, to abstract the fingerprinting and trace the betrayer.
The plan has strong conclusion safety, at the same time lower the fingerprinting
inspection and betray tracing algorithm complexity. The thesis describes the
data base fingerprinting encode, embedment, fingerprinting inspection and
abstraction algorithm, analyzes the algorithm’s robustness and betray tracing
ability, and has experiment testimony. |
Keywords: |
Relationship Data Base, Digital Fingerprinting, Collusion Safety, Betray Tracing |
Source: |
Journal of Theoretical and Applied Information Technology
pp 733 - 739 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
ULTRASONIC ARRAY IMAGING METHOD FOR CONCRETE MATERIALS |
Author: |
QIUFENG LI, XUEJUAN YANG, PAN HUANG, YIN LIAO |
Abstract: |
Because of the need of rapid detection of internal defects and embedded object
in concrete structures, a ultrasonic detecting method with linear array
transducers is presented here, which is the high-resolution and efficient
imaging technique for concrete materials by combining with synthetic aperture
focusing technique (SAFT). At first, simulation data of array detection are
processed to be amalgamated B-scan data of concrete materials according to the
structural characteristics of linear array transducers. And then the B-scan data
collected from numerical simulation are reconstructed in the light of
geometrical relation of ultrasonic path and SAFT. And the structural imaging
figures are calculated at last. It can be shown from simulation results that the
method with array detection is effective, and the embedded object in model can
be identified effectively. |
Keywords: |
Concrete Materials, Ultrasonic Array Transducers, SAFT |
Source: |
Journal of Theoretical and Applied Information Technology
pp 740 - 745 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
A DYNAMIC ON-DEMAND MULTI PATH ROUTING ALGORITHM FOR LOW EARTH ORBIT SATELLITE
NETWORKS |
Author: |
HOUTIAN WANG, QI ZHANG, XIANGJUN XIN, YONGJUN WANG, LIJIA ZHANG |
Abstract: |
Compared with Geostationary Orbit (GEO) satellite systems and Medium Earth Orbit
(MEO) satellite systems, Low Earth Orbit (LEO) satellite systems provide lower
propagation delay as well as higher throughput. Because of these reasons, LEO
satellite systems can play a pivotal role in providing services to areas where
there is no substantial terrestrial infrastructure. In this paper, a novel kind
of Dynamic On-demand Multipath Routing algorithm (DOMR) is proposed for LEO
satellite networks. The performance of LEO satellite networks based on DOMR
algorithm is simulated and analyzed. Moreover, the packet delivery ratio of LEO
satellite networks when running DOMR and Dynamic Source Routing Algorithm for
LEO Satellite Networks (DSR-LSN) is compared. The packet delivery ratio is about
6.39% higher when running DOMR. Simulation results show that on-demand multipath
routing algorithm has a good performance in drop rate and the end-to-end delay
of packet delivery. |
Keywords: |
Low Earth Orbit, Satellite Networks, Dynamic On-demand Multipath Routing, Drop
Rate, Packet Delivery Radio |
Source: |
Journal of Theoretical and Applied Information Technology
pp 746 - 754 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
DYNAMIC SIMULATION OF SPIRAL BEVEL GEAR BASED ON SOLID WORKS AND ADAMS |
Author: |
JIHUI LIANG, LILI XIN |
Abstract: |
Spiral bevel gears are one of basic mechanical units to transmit motion between
concurrent axes. The transmission has quite a few merits, such as the big
overlap ratio, the high loading capacity, the high transmitting efficiency, the
stability and the small noises, and they are widely used in automotive vehicle,
planes, machine tools and all kinds of machines. Mechanical properties of spiral
bevel gear have significant influence on the whole mechanical structure and play
an important role in the system optimization, strength check, fault diagnosis
and fault prediction, and gear tooth meshing dynamic load is an important issue
in the gear research field. Three-dimensional models of spiral bevel gears are
created by SOLIDWORKS and then converted to ADAMS by means of data exchange
interface between SOLIDWORKS and ADAMS. By the contact algorithm theory of
multi-body dynamics and ADAMS, the dynamic simulation of the spiral bevel gears
mesh is specified. The curves of angular speed, torque and meshing force on the
spiral bevel gears are obtained by simulation calculation, which provide
references to research on dynamic characteristics of gear driving device. |
Keywords: |
Spiral Bevel Gear, ADAMS, Gear Meshing, Dynamics Simulation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 755 - 759 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
SECURE MULTI-PARTY COMPUTATION AND ITS APPLICATION STUDY IN THE FIELD OF
MECHANICAL ENGINEERING |
Author: |
JIAN LI |
Abstract: |
Along with the development and globalization of information technology and
manufacturing industry, the transmission and exchange of engineering information
more and more depends on the network in the process of the enterprise
cooperation and negotiation. It becomes more and more frequent to ensure the
security of the information engineering, which will be the reality problems that
more and more countries and enterprises pay attention to. The paper first gives
an elaborative description of the concept of secure multi-party computation
(SMC). Then the paper analyses the typical protocol of secure multi-party
computation, further researches on the application in the field of engineering
machinery manufacturing, eventually gets the conclusion that the secure
multi-party computation has been the both public and confidential information
exchange model, which also has brilliant application development prospect and
huge potential in other engineering field. |
Keywords: |
Secure Multi-party Computation, Mechanical Engineering, Information Exchange,
Computation Agreement, Correlation Coefficient |
Source: |
Journal of Theoretical and Applied Information Technology
pp 760 - 766 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
STATICS ANALYSIS OF CYLINDRICAL GEAR DRIVE AT ANY MESHING POSITION BASED ON
ANSYS |
Author: |
XUEYI LI, SHOUBO JIANG, CHAOCHAO LI, BINBING HUANG |
Abstract: |
The transform relation between the meshing position and rotation angle of a
cylindrical gear pair is firstly derived according to the theory of gear
meshing. Then the technique of building the assembly model of a cylindrical gear
pair at specified meshing position in ANSYS is researched. On this basis, a new
method to perform static contact analysis of cylindrical gear at any meshing
location is proposed. In comparison with the conventional method, the maximum
working stress of the gear in a meshing cycle can be accurately calculated by
this method. Simulation results show that the proposed method is reasonable, and
it provides the foundation for further study of the fatigue life analysis and
structural optimization of the cylindrical gear transmission. |
Keywords: |
Statics Analysis, Finite Element Method, Gear Strength, Meshing Position |
Source: |
Journal of Theoretical and Applied Information Technology
pp 767 - 773 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
EFFECT ANALYSIS OF INFORMATIZATION LEVEL TO GREEN PROCESS INNOVATION IN
MANUFACTURING ENTERPRISES |
Author: |
KEXIN BI, QUANZHEN BAO, DI FENG |
Abstract: |
The relationship between information technology and innovation has been well
studied. Based on extant literature, and the data from 264 manufacturing
enterprises in China, we proposed the corresponding hypothesis of
informatization level to green process innovation, and tested the hypotheses by
Structural Equation Model (SEM) together with software AMOS7.0. The results of
the study revealed that: the informatization level had positive correlation with
green resource selection process innovation, green machining process innovation,
green packaging process innovation, but did not effect the green recycling
process innovation. This paper presents theoretical and empirical evidence of
the impact of informatization level to green process innovation, and has
interesting implications for operation management research and practices. These
results may contribute to better decision-making towards the implementing
information technology practices. |
Keywords: |
Manufacturing Enterprises, Informatization Level, Green Process Innovation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 774 - 779 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS ON THE IMPACT ON LEARNING AND TEACHING MODEL BASED ON MULTIMEDIA
NETWORK |
Author: |
XIUJUN WU, YANSHUANG ZHOU, JING DUAN |
Abstract: |
With the development of education informationalization, many teaching
application based on multimedia and network are gradually penetrated into all
kinds of education processes and the teaching activities which formed a huge
challenge to traditional education mode . But the immaturity of the multimedia
and network teaching which developed in recent decades lead to some practical
problems. This article analyzes the teaching model based on the characteristics
of multimedia and network teaching. It also analyzes the multimedia and network
teaching mode using the regression method. It puts forwards corresponding
suggestions for problems ,provides wider ideas for modern education and creates
a more scientific and effective learning and teaching mode. |
Keywords: |
Multimedia Network, Learning Teaching Mode, Education Informationalization,
Network Technology |
Source: |
Journal of Theoretical and Applied Information Technology
pp 780 - 786 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NETWORK MANAGEMENT SYSTEM FOR EPON BASED ON SNMP |
Author: |
HONGYU FENG, GUOYI MIAO |
Abstract: |
Now, the PON technologies become the preferred broadband access technology all
over the world. In this paper, a network management system is designed for EPON.
In Manager and Agent, the “simple and shortcut” protocol SNMP is adopted to
develop the application program. As the Agent runs on the embedded system,
protocol choice and database design are critical to the system. The paper
focuses on the structural characteristics of the agent side, and achieves
network communications management of agent side. Finally, the system is tested
on the development board, and achieves better results. The system is real-time,
timely capture of the trap, protect EPON network running well. |
Keywords: |
EPON, Network Management, SNMP, Agent, Trap |
Source: |
Journal of Theoretical and Applied Information Technology
pp 787 - 791 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
HONEYPOT BASED INTRUSION MANAGEMENT SYSTEM: FROM A PASSIVE ARCHITECTURE TO AN
IPS SYSTEM |
Author: |
ELMEHDI BENDRISS, BOUBKER REGRAGUI |
Abstract: |
In this paper, we are presenting an Intrusion Prevention System (IPS) based on
multiple sensors in the network. These sensors are in fact honeypots built using
honeyd. Honeyd is a high level honeypot which is very light and which is
offering a lot of possibilities to get the most of information gathered about
attackers in general. In fact, we are presenting a solution to go from passive
and isolated sensors to a collaborative platform to help prevent intrusions by
analyzing all collected data. To be able to do this, honeyd2db module was
developed to enable honeyd to log its data into a database instead of a local
file to the sensor. This aggregation of data from all sensors give us the
possibility to analyze all collected logs as a hole and come out with a decision
(deny network traffic on a firewall for example) using any of the known methods
of data analysis. |
Keywords: |
Intrusion Prevention System (IPS), Honeypots, Honeyd, Network Sensors,
Distributed System |
Source: |
Journal of Theoretical and Applied Information Technology
pp 792 - 797 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
POSITION CONTROL OF ARM MECHANISM USING PID CONTROLLER |
Author: |
ASNOR JURAIZA ISHAK, AZURA CHE SOH, MOHAMAD ASMI ASHAARI |
Abstract: |
This paper presents the application of rotary encoder for a motion of a gripper
mechanism using PID controller. The approach consists of a robotic arm’s whose
movement are controlled by a brush DC motor. The brush DC motor shaft was
mounted to the rotating wheels where a rope and pulley system was used to lift
the robotic arm. The strategy of feedback compensation is used when controlling
a system using a PID controller. With the presence of rotary encoder enables the
microcontroller to control the speed of the robotic arm with the PID controller.
As results, the robotic arm can be operated smoothly and achieved the desired
position compared to the ON and OFF controller. The program using PID controller
has been created with the microcontroller as the controller for the system. The
robotic arm has been interface with rotary encoder and implemented with PID
controller and it is possible for any robotic application if the feedback signal
is provided. |
Keywords: |
Gripper Mechanism, PID Controller, Rotary Encoder, Robotic Motion |
Source: |
Journal of Theoretical and Applied Information Technology
pp 798 - 806 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
PROGRAMMABLE LOGIC IMPLEMENTATION OF ECHO HIDING FOR AUDIO WATERMARKING |
Author: |
JUAN A. R. CHÁVEZ, CARLOS A. RUIZ, DOLORES Z. SAAVEDRA |
Abstract: |
Currently, distribution, and marketing copy music files are very common
activities due to free internet connection that facilitates this. To solve this
problem, digital watermarking is proposed. In this paper we propose an accurate
and content based algorithm for embedding and detecting watermarks within audio
signals. The algorithm is based on a new implementation of echo hiding technique
for audio watermarking; this algorithm proposes embedding bits (watermark)
within blocks of the original audio samples. This implementation was done into a
FPGA (Field Programmable Gate Array) hardware; the watermarked audio clips were
evaluated by calculating the ODG (Objective Difference Grade) established by the
ITU (International Telecommunications Union). The ODG average obtained was
-0.98, a result that indicates that the embedded watermark embedding using the
proposed algorithm is imperceptible to the Human Auditory System (HAS). This
will make the system highly accurate and robust against signal processing
attacks in comparison with other methods, this tests was implemented with de
Audiostirmark data base. |
Keywords: |
Audio Watermarking, Echo Modulation, Embeeding |
Source: |
Journal of Theoretical and Applied Information Technology
pp 807 - 815 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
A BASED RULES APPROACH FOR DISTRIBUTED TEST |
Author: |
MY El HASSAN CHARAF, MOHAMMED BENATTOU, SALMA AZZOUZI |
Abstract: |
Since testing is a continuous activity throughout the entire development
process, it is important to take into account the inherent complexity of the
distributed systems architecture that require special testing techniques. In
fact, in the distributed test context where a set of parallel testers exchange
I/O messages to perform the test, some potential problems of coordination can
arise amongst remote testers. These problems are usually known as
controllability and Observability issues. The emphasis of recent works is
focused on the use of rules based systems that describe the system behavior by
simple rules which increase the flexibility and easiness of programming. In this
paper, we introduce some technical issues for testing distributed frameworks
using rules based systems to overcome such problems. |
Keywords: |
Rules-based system; Distributed test; Rules; Controllability and Observability
Problems; Synchronization. |
Source: |
Journal of Theoretical and Applied Information Technology
pp 816 - 823 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NEW COMBINATION METHOD OF FIREFLY ALGORITHM AND T2FSMC FOR MOBILE INVERTED
PENDULUM ROBOT |
Author: |
MARDLIJAH , ACHMAD JAZIDIE, BASUKI WIDODO, ARI SANTOSO |
Abstract: |
T2FSMC has succesfully overcome the chattering and robustness problems
implementing on mobile inverted pendulum robot. The remaining drawback is the
gain scale factor of controller determination of Fuzzy Type 2 that is still
doing trial and error. Firefly Algorithm will be used in this paper to determine
the best gain scale factor of controller of Fuzzy Type 2 automatically. Utilized
as objective function is the ITAE Value of resulted response signal representing
firefly light. It is proved from the simulation that the proposed method can
effectively resulting optimal gain scale factor and the controller can solve
chattering problem more effectively and more robust against disturbances and
parameter uncertainties compared with trial error based. |
Keywords: |
FireFly Algorithm, Fuzzy Sliding Mode Control, Mobile Inverted Pendulum Robot |
Source: |
Journal of Theoretical and Applied Information Technology
pp 824 - 831 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
AGENT BASED ADAPTIVE EDUCATIONAL CHAT TOOL MODEL |
Author: |
Nidal A.M Jabari |
Abstract: |
There are many adaptive educational systems . These systems depend mainly on the
student model that stores information related to the student, including the
level of knowledge the student has in concepts , Domain model which organizes
the sequence and the structure of the educational materials, and also the
adaptation model which performs the adaptation paln. Some of these systems use
in its functions additional tools such as chat rooms. The problem of the chat
rooms in these systems that they present the participants either students or
teachers in the same format. Since the majority of students in open education do
not know each other personally because they don't attend traditional class ,it
is impossible to identify the most appropriate peer to discuss the concept with
.Therefore, all students will discuss directly with the teacher about the
concept , causing high pressure on the teacher prevented him from answering all
inquiries of the students and thus lose a lot of the students their chance of
discussion.
Through this paper we present a model to solve this problem. Model depends
mainly on the student model and domain model to arrange the students with
different colors within the chat room . These colors indicate the level of
knowledge of the student participate in the chat room, and thus show in better
way the most appropriate peer for discussion with him about the concept. This
will distribute the discussion within the chat room among students and reduce
the strain on the teacher. The model depends on a variety of smart agents to
perform the function required. 1) Adaptation agent 2) Interface and 3)
monitoring agent . |
Keywords: |
Collaborative Adaptive, Open University , AHA! , Agent ,Adaptation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 832 - 839 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
SMALL SIGNAL ANALYSIS OF FLEXIBLE AC TRANSMISSION SYSTEM USING INTERLINE POWER
FLOW CONTROLLER (IPFC) |
Author: |
CH. VENKATA KRISHNA REDDY, K.KRISHNA VENI, G.TULASIRAM DAS, SIRAJ |
Abstract: |
The Interline Power Flow Controller (IPFC) is a voltage-source-converter (VSC)-based
flexible ac transmission system (FACTS) controller which can inject a voltage
with controllable magnitude and phase angle at the line-frequency thereby
providing compensation among multiple transmission lines. In this paper, the use
of the IPFC based controller in damping of low frequency oscillations is
investigated. An extended Heffron-Phillips model of a single machine infinite
bus (SMIB) system installed with IPFC is established and used to analyze the
damping torque contribution of the IPFC damping control to the power system. The
potential of various IPFC control signals upon the power system oscillation
stability is investigated a using controllability index. The effect of this
damping controller on the system, subjected to wide variations in loading
conditions and system parameters, is investigated. Results of simulation
investigations in Matlab are presented to validate the proposed approach. |
Keywords: |
FACTS, IPFC, Damping, Small signal Stability |
Source: |
Journal of Theoretical and Applied Information Technology
pp 840 - 851 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
EFFICIENT TECHNIQUES FOR SECURING DIGITAL VIDEO DATA |
Author: |
ROOPALAKSHMI S, ROSHNI PORWAL, K. JOHN SINGH, R. MANIMEGALAI |
Abstract: |
With fast developments in digital media and communication, transmission of video
data over Internet is unsecured due to various security threats. Digital video
should be encrypted using any of the cryptographic methods in order to prevent
security threats. Cryptography is used for encrypting and decrypting the digital
data. Traditional cryptographic systems are often not enough for fast
transmission of huge volume of data. In this paper, we study various video
encryption mechanisms and analyze their performance. This paper also proposes a
new technique called Enhanced Frequency Domain Scrambling Approach (EFDSA) for
encrypting video data. Our analysis and experimental results obtained show that
the proposed method has less computational overhead and execution time. |
Keywords: |
Enhanced Frequency Domain Scrambling Approach (EFDSA), Cut and Rotate Technique,
Transform Domain Scrambling, Codestream Domain Scrambling, Intra Block
Shuffling. |
Source: |
Journal of Theoretical and Applied Information Technology
pp 852 - 859 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
ENERGY EFFICIENT DISTRIBUTED IMAGE COMPRESSION USING JPEG2000 IN WIRELESS SENSOR
NETWORKS (WSNS) |
Author: |
A.KARTHIKEYAN, T.SHANKAR, V.SRIVIDHYA, SURYALOK.SARKAR,AKANKSHA GUPTE |
Abstract: |
Restricted computational power, memory limitations, narrow bandwidth and energy
supplied present strong limits in sensor nodes are the important points should
be considered during the real time transmission of data using wireless sensor
networks. Therefore, maximizing network lifetime and minimizing energy
consumption are always optimization goals. To reduce the energy consumption of
the sensor network during image transmission, an energy efficient image
compression scheme is proposed. The image compression scheme reduces the
required memory. To address the above mentioned concerns, in this paper, an
approach of image transmission in WSNs, taking advantage of JPEG2000 still image
compression standard and using MATLAB and C from Jasper. The features provided
by JPEG2000 were achieved using techniques such as Discrete Wavelet Transform (DWT)
and Embedded Block Coding with Optimized Truncation (EBCOT).Image quality and
energy consumption are the two performance parameters should be considered
during the image compression and transmission. Simulation results are presented
and show that the proposed scheme optimizes network lifetime and reduces
significantly the amount of required memory by analyzing the functional
influence of each parameter of this distributed image compression algorithm. |
Keywords: |
WSNs; Image compression; Energy conservation; System lifetime; JPEG2000; MATLAB;
DCT;JPEG;PSNR |
Source: |
Journal of Theoretical and Applied Information Technology
pp 860 - 869 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
Title: |
A MULTI-STEP PREDICTION MODEL BASED ON INTERPOLATION AND ADAPTIVE TIME DELAY
NEURAL NETWORK FOR TIME SERIES |
Author: |
LIANG GAO, YIHUA ZHANG, MENG ZHANG, LIMIN SHAO, JINGXIN XIE |
Abstract: |
The drawback of indirect multi-step-ahead prediction is error accumulation. In
order to tackle this problem and improve the capacity of adaptive time delay
neural network (ATNN) for prediction, a three-stage prediction model SATNN based
on spline interpolation and ATNN is presented. With spline interpolation and
ATNN, the impact of last prediction errors that would be iterated into the model
for the next step prediction is decreased, and then the better prediction can be
obtained. The annual sunspot, considered as the benchmark chaotic nonlinear
systems, is selected to test the multi-step prediction model. Validation studies
indicate that the proposed model is quite effective in multi-step prediction. |
Keywords: |
Multi-step Prediction, Time Delay, Adaptive Time Delay Neural Network, Spline
Interpolation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 870 - 874 Vol. 47. No. 2 -- 2013 |
Full
Text |
|
|
|