|                                                                                 
                                                             
                                                  
                                                                               
                                                                                             
         
           |                
                                                                                             
                                                                                                                              
                                                     
| 
  
 Submit Paper / Call for Papers 
 
		Journal receives papers in continuous flow and we will consider articles 
from a wide range of Information Technology disciplines encompassing the most 
basic research to the most innovative technologies. Please submit your papers 
electronically to our submission system at http://jatit.org/submit_paper.php in 
an MSWord, Pdf or compatible format so that they may be evaluated for 
publication in the upcoming issue. This journal uses a blinded review process; 
please remember to include all your personal identifiable information in the 
manuscript before submitting it for review, we will edit the necessary 
information at our side. Submissions to JATIT should be full research / review 
papers (properly indicated below main title).
  |                     
                                                                                             
                                 |  
  | 
	        
	
| 
  	
 	
Journal of Theoretical and Applied Information Technology                
        
 
 
January 2013 | Vol. 47  No.3  |  
 			
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ENERGY EFFICIENT DISTRIBUTED IMAGE COMPRESSION USING JPEG2000 IN WIRELESS SENSOR 
NETWORKS (WSNS) |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
A.KARTHIKEYAN, T.SHANKAR, V.SRIVIDHYA, SURYALOK.SARKAR, AKANKSHA GUPTE |  
|  			
									
Abstract: | 
 			
									
Restricted computational power, memory limitations, narrow bandwidth and energy 
supplied present strong limits in sensor nodes are the important points should 
be considered during the real time transmission of data using wireless sensor 
networks. Therefore, maximizing network lifetime and minimizing energy 
consumption are always optimization goals. To reduce the energy consumption of 
the sensor network during image transmission, an energy efficient image 
compression scheme is proposed. The image compression scheme reduces the 
required memory. To address the above mentioned concerns, in this paper, an 
approach of image transmission in WSNs, taking advantage of JPEG2000 still image 
compression standard and using MATLAB and C from Jasper. The features provided 
by JPEG2000 were achieved using techniques such as Discrete Wavelet Transform (DWT) 
and Embedded Block Coding with Optimized Truncation (EBCOT).Image quality and 
energy consumption are the two performance parameters should be considered 
during the image compression and transmission. Simulation results are presented 
and show that the proposed scheme optimizes network lifetime and reduces 
significantly the amount of required memory by analyzing the functional 
influence of each parameter of this distributed image compression algorithm. |  
|  			
									
  										
			
Keywords:  | 
 			
									
WSNs; Image compression; Energy conservation; System lifetime; JPEG2000; MATLAB; 
DCT;JPEG;PSNR |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ANALYSIS OF THE MONO-, DI-, AND TRINUCLEOTIDE TANDEM REPEATS IN INF2 OF 
GLOMERULAR PODOCYTE  |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SIM-HUI TEE |  
|  			
									
Abstract: | 
 			
									
Inverted formin 2 (INF2) is an essential gene that is expressed in glomerular 
podocyte in kidney. Malfunction in INF2 will result in kidney diseases, which 
could be avoided if the mechanisms of its transcription and translation are 
well-studied. This research aims to use a computational approach to understand 
the tandem repeats, which is a phenomenon closely linked with diseases, in this 
gene. A genome database, web server, and a computational motif model were 
primarily used in this research. The results of this study provide insights that 
will guide biologists and biomedical practitioners in molecular studies and drug 
designs for the INF2-implicated diseases. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Bioinformatics, Java Programming, Database, Tandem Repeats, INF2, Glomerular 
Podocyte, Gene Analysis |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ONE-TO-MANY REVERSIBLE MAPPING FOR IPv6 ADDRESS GENERATION: SIMULATION SOFTWARE 
DEVELOPMENT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
NASHRUL HAKIEM, MOHAMMAD UMAR SIDDIQI |  
|  			
									
Abstract: | 
 			
									
This paper presents the development of a one-to-many reversible mapping 
mechanism simulation for IPv6 address generation. The aim of this mechanism is 
to improve IPv6 addresses generation in terms of privacy and security in an 
enterprise local area network (LAN). Each time a user accesses a network, a 
dynamic IPv6 address is assigned via the DHCPv6 server. The dynamic address 
(one-to-many mapping) is to protect a user from unwanted behavior analysis 
attempting to exploit IPv6 addresses, thus protecting user privacy. However, the 
dynamic address can be uniquely linked to the user (many-to-one mapping) if the 
need arises. The one-to-many reversible mapping is generated dynamically using 
Cipher Feedback (CFB) mode of operation of the Advanced Encryption Standard (AES). 
Software simulation is developed using the software engineering waterfall model 
and a Unified Modeling Language (UML) class diagram as a notation. The results 
show that the mechanism simulates well for IPv6 address generation and IPv6 
address owner identification. The one-to-many mapping may be incorporated into 
DHCPv6 software and many-to-one mapping may be implemented as a complement of 
local area network monitoring software. |  
|  			
									
  										
			
Keywords:  | 
 			
									
IPv6 address, Advanced Encryption Standard, Cipher Feedback, Software 
Engineering, Simulation |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN EXPERIMENT OF THICK FILM FORCE SENSOR USING MEMS SIMULATION SOFTWARE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
M.H. CHONG, H.JAAFAR, W.Z.W.HASAN, S.SHAFIE, M.N.HAMIDUN, M.M. ISA, A.F. HAWARY |  
|  			
									
Abstract: | 
 			
									
Force sensor (or pressure sensor) has gained increasing interest among the 
researchers. Using the Microelectromechanical Systems or MEMS technology, the 
size of the force sensor can be miniaturized and this ignites more possible 
application in the field of biomedical and robotic applications. Recent 
researches show the application of force sensor on the prosthetic hand, an 
artificial limb connected to an amputated person. This paper presents on 
simulating the sensitivity of the thick film force sensor using IntelliSuite 
software. The force sensor is realized by using the piezoresistive material on 
the cantilever structure.There are three force sensor designs are simulated. Two 
of the designs are simulated using glass as substrate, and while the remaining 
one is of alumina substrate. The sensitivity simulated is much smaller compared 
to the estimations made using equations. The simulations show that the glass 
sensor fares better than the alumina sensor. If the substrate is the same, the 
sensor with the bigger dimension has better sensitivity.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
MEMS, Force Sensor, Intellisuite, Piezoresistors, Piezoresistive Coefficient |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MINING ROAD TRAFFIC ACCIDENT DATA TO IMPROVE SAFETY IN DUBAI |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ABDELAZIZ ARAAR, AMIRA A. EL TAYEB |  
|  			
									
Abstract: | 
 			
									
Road traffic accidents are a major public health concern, resulting in an 
estimated 1.2 million deaths and 50 million injuries worldwide each year. Dubai 
in particular experiences a high rate of such accidents. Research on road safety 
has been conducted for several years, yet many issues still remain undisclosed 
and unsolved. Specifically, the relationships between drivers' characteristics 
and road accidents are not fully understood. In this work, we started by 
collecting a dataset between 2008 and 2010 from Dubai Police. After 
preprocessing, we modeled the data to 19 attributes and 5 classes. We used WEKA 
data mining software with the 4 classifier methods (Decision trees, Rules 
induction, BayesNet, and MultilayerPerceptron). We applied data mining 
technologies to link recorded accident, driver, and road factors to accident 
severity in Dubai, and generated a set of rules that could be used by the Dubai 
Police to improve safety. Empirical results showed that the developed models 
could classify accidents within reasonable accuracy. The comparison of these 
classifiers showed that the neural networks classifier (MultilayerPerceptron 
algorithm) is the best classifier for all classes. We generated recommendations 
and conclusions.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Decision Trees; Rules Induction; Bayesnet; Multilayerperceptron; WEKA; Dubai Car 
Accidents |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ON THE ANALYSIS OF PARAMETERS’ EFFECT IN PDE-BASED IMAGE INPAINTING |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
BAHA. FERGANI,  MOHAMED KHIREDDINE. KHOLLADI |  
|  			
									
Abstract: | 
 			
									
Image Inpainting is an important task in the field of image processing, with 
many applications in the fields of image and vision analysis. It aims at 
restoring damaged or missed regions in images in the case of undetectable forms. 
The basic idea in image inpainting, according to the Bertalmio’s approach, is to 
smoothly propagate information from the boundaries of the missed region toward 
the inside of the gap in the direction of isophotes. The purpose of this paper 
is to analyze the effects of different parameters in Bertalmio’s approach on the 
quality of the resulting inpainted image. The parameters dealt with in the paper 
are the rate of improvement, the number of iterations, the number of isotropic 
diffusion and the number of anisotropic diffusion. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Image, Damaged image, Inpainting, Partial Differential Equation (PDE) |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
USING LDP FASTREROUTE VERSUS LDPORSVP IN AN MPLS CORE BACKBONE FOR CONVERGENCE 
ENHANCEMENT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ALA ABDELALI , DRISS EL OUADGHIRI,  MOHAMED ESSAAIDI |  
|  			
									
Abstract: | 
 			
									
MPLS/VPN backbones are widely used today by various operators and private 
companies in the world, high to medium-sized, either use an operator or build 
their own MPLS/VPN backbone. Real time applications like voice and video are 
more and more integrated to end user applications, making them ever more time 
sensitive. Operators are offering services like hosting companies voice 
platforms, voip call centers, iptv ..etc. All these aspects make the convergence 
time inside a backbone a challenge for service providers. However, the global 
convergence time is an assembly of several factors including: link or node 
failure detection, IGP failure detection, LSP Generation, SPT Computation, RIB 
update, local FIB creation and distribution ...updates signaling...etc., a lot 
of approaches can be used to minimize the convergence time, our approach consist 
on enhancements and optimization in control and forwarding plane, the scope of 
our work is the core backbone, however a lot of things can also be made at the 
access. In this article we especially focuses on stressing and comparing two 
methods: “LDP over RSVP in the core P routers” and “ LDP Fastreroute in the core 
P routers”. Beyond the “state of the art” and implementation of both protocols, 
we describe in detail our design considerations, impact of faults and test 
results, the aim of the study is to give an accurate idea of gains and drawbacks 
of each method and which one more fits an operator infrastructure. We consider 
this work as a contribution to the global research on the “network convergence 
item”, it more deals with the state of the art, and features interoperability. A 
continuation of this work is using same approach while modeling new protocol 
concepts holding intrinsically the convergence as a constraint. |  
|  			
									
  										
			
Keywords:  | 
 			
									
 Fast-convergence (FC), Resource Reservation Protocol (RSVP), 
Label Distribution Protocol (LDP),Virtual Private Network (VPN), Loop Free 
Alternate (LFA), Next Hop Label Forwarding Entry (NHLFE), Intermediate System to 
Intermediate System ( IS-IS), Label Switched Path (LSP), Lost of Signal 
Detection (LOSD), Multiprotocol Label Switching (MPLS), Protocol Independent 
Convergence (PIC), Route Distinguisher (RD), Routing table manager (RTM), 
Provider edge route (PE), bidirectional failure detection (BFD), Provider Router 
(P), Label Switch Router (LSR)  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ON THE CAPACITY OF MULTICELL COVERAGE MIMO SYSTEMS IN HIGH ALTITUDE PLATFORM 
CHANNELS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
WALID M. RAAFAT, HOSNY A. EL-MOTAAFY |  
|  			
									
Abstract: | 
 			
									
This paper is a comparative study between the performances of conventional 
terrestrial multicell Multiple Input Multiple Output (MIMO) working in a 
Rayleigh fading environment and its corresponding High Altitude Platform (HAP) 
system working under a different Path Loss (PL) model with the capacity as the 
performance metric of interest, calculated using the Singular Value 
Decomposition (SVD). Both systems are assumed to be affected by cochannel 
interference users in other cells .Simulation results show that the performance 
of multicell MIMO HAP dependent system outperforms its corresponding that works 
in terrestrial environment in terms of per user channel capacity. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Multiple-input multiple-output (MIMO), cochannels interference, Rayleigh fading, 
High Altitude Platforms (HAP), Singular Value Decomposition (SVD) |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DEVELOPMENT AND EVALUATION OF MODEL FOR TEACHING AND LEARNING TRADITIONAL CRAFT 
COURSEWARE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SALYANI OSMAN, NORAIDAH SAHARI, NOR AZAN MAT ZIN, RATNA ZUARNI RAMLI, NORAZIMAH 
AWANG, SITI ROSNI MOHAMAD YUSOFF |  
|  			
									
Abstract: | 
 			
									
This paper discusses the development and evaluation phases involved in the 
development of a model for traditional craft courseware. The model called CDTC 
Model was developed based on the software development life cycle methodology 
consisting of Analysis, Design, Development and Evaluation phases. Every phase 
has its own contribution towards the objectives of the research. However, this 
paper concentrates on the development phase which involves adapting the model 
into a series of prototype development and evaluation phase that focus on four 
parts: usability study of the prototype derived from the model, effectiveness 
evaluation, satisfaction assessment on cognitive apprenticeship adaptation and 
final validation. The final validation was conducted among selected craft 
instructors to verify the model's component as well as to confirm the final 
version of the model. The results of the final validation indicate that the CDTC 
Model components are obviously found important to the development of courseware 
for teaching and learning traditional craft. |  
|  			
									
  										
			
Keywords:  | 
 			
									
 Traditional Craft Model development, Traditional craft 
courseware, Craft Education  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DIAMOND SHAPED SYMMETRICAL SLOTTED MINIATURIZED MICRO STRIP PATCH ANTENNA FOR 
WIRELESS APPLICATIONS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
A. BENO, D. S. EMMANUEL |  
|  			
									
Abstract: | 
 			
									
A reduced ground plane diamond shaped multiband microstrip slot antenna is 
proposed. The antenna is designed with two symmetrical slots to form the diamond 
shape and the patch is fed with a microstripline. The slots make the antenna to 
have multiple resonances to operate in the frequency bands of 2.15 GHz to 7.8 
GHz with a peak gain of 6.09 dB at 6.83 GHz and above 2 dB in all operating 
bands achieving a maximum impedance bandwidth of 16.38 % in the satellite 
operating band. The antenna has good radiation characteristics and operates in 
the C-Band and military X-band making it suitable for Wi-Max, WLAN and Satellite 
applications.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Patch, Reduced Ground Plane, Symmetrical Slot, Microstrip, Multiband |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ANALYSIS OF VRPPIC AND PPIC FOR SISO AND SIMO MC-CDMA UPLINK SYSTEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
NOOR MOHAMMED. V,  P. S. MALLICK, L. NITHYANANDAN |  
|  			
									
Abstract: | 
 			
									
This paper presents an extended version of Partial Parallel Interference 
Cancellation (PPIC) called Variance reduced Partial Parallel Interference 
Cancellation (VRPPIC) for multicarrier code division multiple access uplink 
systems. The combination of PPIC receiver and new bit estimator is called VRPPIC 
detector. This realization is derived for the main PPIC operation and soft 
decision (SD) from PPIC, which are linear combination of the bit estimator using 
appropriate Weighting Factors (WF). These weighting factors are derived from 
Partial Parallel Interference Cancellation (PPIC) weighting factors. It is used 
to reduce the conditional variance of the final stage signal estimation. An 
Optimal Weighting Factor (OWF) selection algorithm has been derived for VRPPIC 
detector scheme, to minimize a monotonically increasing condition variance 
function. For all the interference cancellation stages the derived OWFs are 
equal and can easily be obtained from a linear function of active users. 
Simulation has been done in VRPPIC detector and PPIC detector using optimal 
weighting factors and randomly selected weighting factors. The result shows that 
the VRPPIC with OWFs outperforms both VRPPIC and PPIC with randomly selected 
weighting factors. Also it is shown in this paper that if there are multiple 
antennas at the receiving end, the performance of the detector is further 
improved. This leads to generalization that if data comes from single stream 
(single input) and there are multiple outputs (antennas) at the receiving end, 
the detector for multiple reception MC-CDMA strikingly outperforms the 
conventional systems with single antenna at the receiving end.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Optimal Weighting Factor (OWF), Multiuser Detection, Variance Reduced Partial 
Parallel Interference Cancellation (VRPPIC), Multiple Access Interference (MAI) |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SIGNAL GENERATOR BASED ON THE VIRTUAL INSTRUMENT TECHNOLOGY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
YAN LIU, YINGYING SHENG, MANQIONG TAN |  
|  			
									
Abstract: | 
 			
									
A high-precision and stable signal generator with extremely low frequency is the 
ideal equipment in machinery, civil engineering, communication and vibration 
test. To meet the demands of these special areas, the paper designs such a 
signal generator based on virtual instrument using hybrid system with MCU and 
FPGA. The system consists of a host and a slave computer. The slave computer 
uses a MCU via the DDS technology to make FPGA generate periodic signal with 
adjustable frequency. The virtual instrument technology is introduced into the 
host computer (PC), which uses LabVIEW to set the signal parameters and realize 
the GUI system. The results of our implementation show that the signal generator 
can generate frequency varying from 0.01Hz to 20 kHz, including sine wave, 
square wave and triangle wave. It has been successfully used in the vibration 
measure of some engineering areas. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Signal Generator, DDS, FPGA, Virtual Instrument |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ANALYSIS ON EFFECT OF BEARING TYPES ON CONTINUOUS GIRDER BRIDGES UNDER SHIP 
COLLISION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
GUOQIANG XIE, WEI HU |  
|  			
									
Abstract: | 
 			
									
After analyzing the existing simplified methods of ship-bridge collision and 
comparing their pros and cons, a relatively safe simplified analysis process is 
put forward. The time-history curve of the ship collision force obtained from 
the ship-rigid wall collision simulation using the software LS-DYNA is put into 
the whole bridge dynamic model in SAP2000 and then dynamic response analysis of 
the whole ship has been carried on. Respect to the bridge with ordinary fixed 
bearings and seismic isolation bearings, the influence of the bearing type on 
the key structure of the bridge are analyzed. Then the features and rules of the 
continuous bridges dynamic responses with different bearings under different 
ship-bridge collision angle and velocity are obtained. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Continuous Bridges, Ship Collision, Bearings, Numerical Stimulation, Collision 
Angle, Bearing Type |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ANALYSIS ON IMPACT OF INTERNET CULTURE TO THE SENSE OF WORTH FOR UNIVERSITY 
STUDENTS AND ITS STRATEGY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
LI ZHANG |  
|  			
									
Abstract: | 
 			
									
The multilayer perceptron is becoming more popular because of its characters 
such as fault tolerance, robustness and low request for the info. In this 
article the impact of the network to sense of worth for the university students 
is studied by using the multilayer perceptron model. The model can fit better 
and the coefficient of determination is 0.915; the relative error is 
0.012±0.003. The internet culture can influence the concepts of knowledge, 
intercourse, politics, morality and freedom of the university students and the 
result is just like other documents. The multilayer perceptron model can be used 
to analyze the impact of the network to the sense of worth for the university 
students. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Internet Culture, University students, Sense of Worth, Multilayer Perceptron |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
EMPIRICAL RESEARCH ON US INFLATION PERSISTENCE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
QIZHI HE, FEI ZHOU, FENG DING |  
|  			
									
Abstract: | 
 			
									
Constant coefficient method is the traditional way to measure the persistence of 
inflation series. But this kind of method can not reflect effectively the change 
of breakpoint and economic situation. To the lack of the existing methods, the 
paper examines the breakpoint change in the coefficient of inflation persistence 
in the United States, and at the same time studies the changes of persistence 
characteristics of United States inflation rate by using time-varying 
coefficient model. The analysis shows that there exists breakpoint change in the 
inflation persistence coefficient in the United States; inflation persistence 
coefficient in the United States ranges from 0.7132 to 0.8826; the persistence 
coefficient continued to decline in the mid-2008, and etc. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Inflation Persistence, Breakpoint Change, Time-varying Coefficient Model |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
TROJAN HORSE HIDING TECHNOLOGY RESEARCH BASED ON K - SUMMARY CLUSTERING 
ALGORITHM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
DAN LIU, SHIXIA MA, ZU HUA GUO, XIU LAN WANG |  
|  			
									
Abstract: | 
 			
									
The rapid development of computer networks has brought great convenience to 
people's learning, work and life. However, because the network has the 
characteristics of sharing and openness, and the computer systems often use the 
open operating system, computer networks are more vulnerably subject to attack 
from hackers. The network security issues have been particularly prominent. 
Using of Trojan technology to attack and destroy the network system has become 
the greatest threat to the security of information networks. On the basis of 
analyzing the life characteristics, working principle and hiding technique of 
Trojans, the paper gives the Trojan removal method. Meanwhile, the paper 
proposes a K-summary clustering algorithm. The algorithm can accurately locate 
the Trojan position and significantly saving the positioning running time, which 
has certain practical significance to improve the security of the network. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Trojan Principle, Hiding Techniques, K-summary Clustering Algorithm, Hang Horse 
Way, Trojan Positioning |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ANALYSIS OF THE COMPLEX MATERIAL FLOW NETWORKS IN TYPICAL STEEL ENTERPRISE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
YEQING ZHAO, GUIHONG BI |  
|  			
									
Abstract: | 
 			
									
The aim of this paper is to present a new modeling method for complex material 
flow networks system of typical steel enterprise. Iron and steel industry is one 
of the most important industry in the country, especially, have a direct impact 
on the whole national economy. For the diversity and complexity of the 
production technique of the material flow system in the steel enterprise, the 
manufacturing process was defined as a complex networks based on complex 
networks theory and techniques, in which the devices were seen as nodes and the 
direct relationships between the devices were seen as edges. The statistical 
analysis of the network model of the production process in typical steel 
enterprise was provided to explore new methods and breakthrough for local path 
optimization and global planning, and that supply the instructions of theories 
and techniques for the further improving the topology structure of the material 
flow networks in steel enterprise. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Material Flow System, Complex Networks, Degree Distribution, Shortest Path, 
Clustering Coefficient |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SIMULATION FOR VEHICLE ACTIVE SUSPENSION CONTROL BASED ON DIFFERENT FEEDBACK 
PARAMETERS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
JINGYUE WANG, HAOTIAN WANG, LIXIN GUO |  
|  			
									
Abstract: | 
 			
									
A half-car model with four DOF was established to simulate the system. On the 
basis of this model, Self-adapt Parameters Fuzzy-PID control method of the 
active suspension system is described. In such a model, vehicle speed, vehicle 
body vertical acceleration, suspension dynamic deflection, the body vertical 
acceleration and suspension dynamic deflection integrated feedback were used 
respectively as the integrated feedback. The simulation results show that active 
suspension Self-adapt Parameters Fuzzy-PID control with the body vertical 
acceleration and suspension dynamic deflection as comprehensive feedback 
parameters compared with passive suspension can improve the ride comfort and 
driving stability in random excitation. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Vehicle, Active Suspension, Fuzzy PID Control, Ride Comfort |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN EYE FEATURE EXTRACTION SCHEME BASED ON HARRIS ALGORITHM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
WENGDONG ZHAO, HUI QI, ZHIGUO XIAO |  
|  			
									
Abstract: | 
 			
									
In order to improve the recognition rate of the facial recognition system and 
the efficiency of the algorithm, a method based on Harris algorithm and changes 
of threshold to extract eye contour automatically is proposed. This method uses 
the idea of minimum extremal region. It makes use of the dynamic change of 
threshold form low to high. After location the eye area initially, the location 
of the eye pupil is located accurately by means of the method of gray statistic. 
Then Harris algorithm is used to confirm the eye point position. Finally, the 
characteristics of the eye contour are fitted. The experimental result shows 
that this method can extract the feature of eye contour effectively and has the 
better robustness about illumination and facial expression. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Eye Feature, Minimum Extremal Region, Harris Algorithm, Expression Recognition |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
HARMONIC RESPONSE ANALYSIS AND OPTIMIZATION OF HZS150 CONCRETE MIXING STATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
HU GAO, HUI LI, RUILIAN HOU |  
|  			
									
Abstract: | 
 			
									
Through the research, design datas are provided for the enhancing product 
performance and competitiveness. In the paper, based on problems that exist in 
the construction of concrete mixing station, actual conditions of Tengzhou city 
and research results in China United cement plant, concrete mixing station’s 
overall structure is designed. And the structure’s harmonic response and dynamic 
properties are analyzed based on its characteristics with HZS150 mixing station 
of steel structure as the carrier; the overall structure is also optimized. |  
|  			
									
  										
			
Keywords:  | 
 			
									
HZS150, Mixing Station, Harmonic, Power performance |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
STOPPING MODEL OF ELECTRON IN METAL BASED ON QUANTUM MECHANICS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SHUHUI SHI |  
|  			
									
Abstract: | 
 			
									
With the improvement of computing capacity of computers, it is possible to 
broaden new horizon in classical physics and use new models in analogue 
simulation. Recently, it is possible that the detailed process of discussing 
energy exchange between metal ion and electron in simulation of quantum 
mechanics: low-energy electron radiation damage cascade can be simulated by 
directly using the tight coupling method of time dependence, and ion heat 
transmission with rapid movement in hundreds of atomic system can be calculated 
by using time domain density functional theory (TDDFT). These simulations do not 
evenly influenced by simplified approximate linear and electron, so a new 
electronic stopping model can be added in some certain level. This paper started 
from quantum mechanics explaining the basis of particle movement in atom, 
respectively discussed the frictional drag in the process of the electron 
motion, and the distribution of electron temperature model; finally, came to 
some meaningful conclusions by simulating the particle movement through 
respectively using the Ehrenfest Model, new model, Tocarlo and Victoria Model 
with a simple viscous drag and density dependence (marked as Model C-V). |  
|  			
									
  										
			
Keywords:  | 
 			
									
Quantum mechanics, Electron Motion, TDDFT, Ehrenfest Model, Model C-V; Metal 
Electron Stopping |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN APPROACH FOR SUPERPIXELS USING UNIFORM SEGMENTATION AND RECIPROCAL NEAREST 
NEIGHBORS CLUSTERING |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
JUNRUI LV |  
|  			
									
Abstract: | 
 			
									
An approach using uniform segmentation and reciprocal nearest neighbors (RNN) 
clustering is presented to generate super pixels. The method is made of two 
steps. First, image is segmented to a large number of regular homogeneous small 
regions which are similar to cell. Second, instead of the original image pixels, 
small regions segmented is regarded as input of RNN clustering. Regional 
diversity of average value normalized and variance form the new similarity 
criterion. The area constraint filter limited the large size of superpixels 
guarantees uniformity and compactness of super pixels. Finally, some regions in 
a small range of distance are merged by RNN clustering. Results of experiment on 
BSDS 500 dataset of natural images show the proposed method has advantages of 
high boundary recall and low under segmentation error over SLIC super pixel on 
small numbers super pixels. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Superpixel, Reciprocal Nearest Neighbours, K-means Clustering |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ANALYSIS ON PROBLEMS AND MOTIVATION OF POST 90S UNDERGRADUATES' ETIQUETTE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
WEIHONG KONG |  
|  			
									
Abstract: | 
 			
									
At present, the post 90s has become the main part of the college students. The 
cultivation of excellent college students is not only to develop students' 
professional skills, but also to cultivate them with etiquette. However, at 
present the etiquette education in China for the post 90s college students is 
deficient. In this thesis, based on the multivariate stepwise regression and the 
Logistic regression in multivariate analysis, the multivariate stepwise 
regression model and multi-level Logistic regression model are established. At 
the same time, with the usage of SPSS and SAS software, this thesis carries on a 
detailed analysis of the post 90s college students' etiquette problems and 
influencing factors, and obtains a more scientific and objective result.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
The Post 90s, Multivariate Analysis, Stepwise Multiple Regression, Logistic 
Regression |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DESIGN AND IMPLEMENTATION OF A MULTIMEDIA DATABASE APPLICATION SYSTEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
CHANGHONG GUO |  
|  			
									
Abstract: | 
 			
									
With the development of Internet technology, the number of the network users 
becomes more and more, and computer networks has to deal with an amazing amount 
of information every day. With database management system (DBMS) being used 
widely, many people put up with the multimedia extensions, for example, the 
multimedia technology which is based on the original vehicle. However, as for 
the meaningful queries for multimedia data semantics, these extensions are 
shortage of the methods to manage advanced indexing, content modeling and 
multimedia programming library. In this context, this paper introduces the 
mpeg-7 multimedia database system , pointing out that the innovative part of the 
system is dependent on xml meg-7 standardized meta-data model , a new 
mpeg-7indexing and query system , designing application libraries which have 
query optimization and support internality and externality .Then it analyzes the 
expansion of the Oracle system , validates and demonstrates the two real 
multimedia applications that are applied in the field of audio recognition and 
image retrieval. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Networking Technology, Multimedia database, Mpeg -7, Metadata Model |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN ANALYTIC HIERARCHY PROCESS BASED METHOD TO PROCESS MATHEMATICAL EXPRESSIONS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
LEI GAO, SHULIN PAN, SHEN JIAO |  
|  			
									
Abstract: | 
 			
									
Mathematical expressions exist in all kinds of documents. The automatic location 
, recognition, analysis and understanding of mathematical expressions are 
important. Recognition of mathematical expressions has been an attractive 
problem for the pattern recognition community. When we meet the mathematical 
expressions we can’t recognize them like the way of ordinary text recognitions. 
We are in urgent need of a new method to process the mathematical expressions. 
We should firstly recognize all the symbols which constitute the expressions and 
define the composite structures and constrains and relationships of all the 
symbols. And we also should distinguish the levels of hierarchy of every symbol 
and the corresponding matrices and select the feature items and set the weight 
numbers. Analytic hierarchy process is caught to build the expression model. 
First, the hierarchy model is set up. Second, pairwise comparison matrix is set 
up. Then, a series of computer process will be going on including computing the 
weight vector and consistency checking and computing combination weight vector 
and doing combination consistency checking and constructing the judgment matrix 
and computing weight vectors. Experience has proved that this is a proper method 
to process mathematics expressions. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Mathematical Expressions, Composite Structures, Levels of Hierarchy, Weight 
Numbers |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DENIAL-OF-SERVICE ATTACK ON PROGRAMMABLE ROUTER |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
YING HU, LEI ZHUANG |  
|  			
									
Abstract: | 
 			
									
Because of the limitation of routers which use ASICs, there are more and more 
programmable routers be adopted at present, it is a trend that the ASIC routers 
will be replaced. Programmable router brings out flexibility, at the same time, 
it brings out security problems. This paper introduced a type of network attack. 
The attack sends appropriate length of packet, while application code could not 
detect that the length of the packet is out of range, and the operation of 
inserting header leads to buffer overflow, thereby, this forms denial-of-service 
attack. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Programmable Router, Attack; Denial-of-Service, ASIC Router |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ERROR MODELING FOR STRUCTURAL DEFORMATIONS OF MULTI-AXIS SYSTEM BASED ON SVR |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ZHENZHONG LIU, LIANYU ZHAO, ZHI BIAN |  
|  			
									
Abstract: | 
 			
									
Multi-axis system is constituted by the mechanical links, and the link position 
- load deformations are non-linear. That is an important factor to affect the 
positioning accuracy of multi-axis system. As the nonlinear characteristics of 
link position and load deformations, a novel method for modeling deformations of 
loaded components based on SVR was presented. The 2R manipulator load 
deformations error models were building by ε-support vector regression, and 
according to the model, the trajectory error compensation was simulated. The 
simulation of structure deformations models and motion error compensation of 2R 
manipulator shows the SVR method could be used to build the deformations error 
model effectively. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Multi-axis System, Structural Deformation, SVR |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
RESEARCH OF COMBINATORIAL OPTIMIZATION PROBLEM BASED ON GENETIC ANT COLONY 
ALGORITHM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ZEYU SUN,  ZHENPING LI  |  
|  			
									
Abstract: | 
 			
									
Ant colony algorithm of the traditional combinative optimization consumes a 
large amount of time in the process of solving the optimization, which has a 
tendency to partial optimization and slow convergence along with many redundant 
useless iterative codes and low operation efficiency. A generic optimized ant 
colony algorithm is thus proposed. This algorithm has the ability to fast global 
search of generic algorithm along with parallelism and positive feedback 
mechanism of ant algorithm. It determines the distribution of pheromone on the 
path by means of generic algorithm changing selection operators, crossover 
operators and mutation operators. Then ant algorithm is applied into feature 
selection. Supporting vector machine classifiers is used to evaluate the 
performance of the feedback sub-variorum. The pheromones are recombined through 
changing the pheromone iteration, parameter selection and increasing the local 
update of pheromones feature nodes. The simulation experiment shows that this 
algorithm can improve the accuracy effectively, speed up the convergence, 
improve global optimization, and promote the robustness and stability. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Ant Colony Algorithm, Combinatorial Optimization, Traveling Salesman Problem, 
Pheromones, Genetic Algorithm |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
BUS DEPARTURE INTERVAL OPTIMIZATION CONSIDERING CROWING COST |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
YONGSHENG QIAN , JINBAO LUO , JUNWEI ZENG |  
|  			
									
Abstract: | 
 			
									
The paper mainly studies the optimizing mathematical model of bus departure 
interval and its solution, and then work out the best bus departure interval. 
This paper establishes the optimizing mathematical model of bus departure 
interval, which takes crowding cost of passengers into account, including 
passengers’ on-the-bus time cost, passengers’ crowding cost and bus company 
cost. The paper uses the genetic algorithm to solve the problem. Reasonable bus 
departure interval will obtained quickly by this method. It can provide 
theoretical basis and technical support for bus enterprise scientific operation 
decision and ensure the development of urban public transportation efficiently. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Public Transportation, Dynamic Dispatching, Departure Interval, Crowding Cost |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ENTROPY WEIGHT FUZZY SYNTHESIS EVALUATION BASED ON THE MEASUREMENT OF 
ENVIRONMENTAL ACCOUNTING |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
LI LIU |  
|  			
									
Abstract: | 
 			
									
There are many fuzzy phenomenons in the environmental accounting elements; this 
paper provides a fuzzy synthesis evaluation model of entropy weight with the 
consideration of entropy theory. The related indicators are computed through 
fuzzy synthesis evaluation method and entropy theory, so the provided model can 
provide a help for the measurement of environmental accounting. Finally, the 
results of example prove the feasibility of this model in practice.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
The Measurement of Environmental Accounting, Entropy, Entropy Weights, Fuzzy 
Synthesis Evaluation |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
APPLICATION PATTERN OF RTI IN MDA-BASED HLA SIMULATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
RONGLI ZHANG |  
|  			
									
Abstract: | 
 			
									
The combination of MDA and HLA is the need for HLA development. In this paper, 
MDA-based HLA simulation Framework is put forwards. The Domain partition of such 
framework is analyzed in detail. In that framework, RTI is regard as a sub 
domain in the service domain, not a platform as usual. But it is more benefit 
for the model reusability. At last, the integration method of RTI domain models 
and application models is provided. This method is a new thought for the 
application of MDA in HLA. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Model Driven Architecture, High Level Architecture, Run-Time |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
FORECAST SURFACE QUALITY OF ABRASIVE WATER JET CUTTING BASED ON NEURAL NETWORK |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
GUILIN YANG |  
|  			
									
Abstract: | 
 			
									
In this study, firstly, the YL12 aluminum alloy is used as experimental 
materials, then in the following experiments it is cut in JJ-I-type water jet 
machines, and 1,000 group data are gotten by measurement. In each group data, 
pressure, material thickness, surface roughness, abrasive flow and traversing 
speed are included. Next, BP artificial neural network is established. In this 
network, there are four inputs and one output. The inputs are pressure, material 
thickness, surface roughness and abrasive flow rate; the output is traverse 
speed. And then the BP artificial neural network is programmed by one toolbox of 
Matlab. Using the former 1,000 group data, the BP artificial neural network is 
trained, and its forecast function is obtained. Finally, the BP neural network 
is tested to verify through using different thickness of aluminum alloy verifies 
its forecast function. According to given pressure, material thickness, 
roughness and abrasive flow, traverse speed is predicted. The YL12 aluminum 
alloy is cut by the predicted traversing speed. The maximum error between the 
prediction values of surface roughness and the actual values of the surface 
roughness is 6.5%. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Abrasive Water Jet Cutting, BP Neural Network, Surface Quality, Forecast |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ANALYSIS ON COGNITIVE WIRELESS NETWORK MAC PROTOCOL ACCESS MODE BASED ON NS2 |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
HAIBO GAO, WENJUAN ZENG |  
|  			
									
Abstract: | 
 			
									
Aiming at the same frequency interference, in the channel increased frequency 
recognition function before the consultation and put forward based on the 
frequency of perception multiple channel CC-MMAC agreement, simulation 
verification protocol can effectively reduce the co-channel interference. 
Channel quality changes with time by the effects of the decline and dispersion, 
thus cause a certain impact to the network performance, therefore the Gauss 
channel and the fading channel MAC protocol model are established; In study of 
rate based on adaptive control, performance analysis take to the rate adaptation 
leave C protocol, put forward based on the chance rate adaptive OAR DCA channel 
protocol can improve the network throughput effectively. In the study of 
multipath routing protocol based on AODV introduce next hop routing layer 
thought to the MAC layer and proposed the establishment of a plurality of next 
hop MNH a MMAC protocol; On improving AODV routing protocol establish 
non-connection limit NDL AODV routing protocol and then make simulation analysis 
and comparison to the NDL AODV+MNH-MMAC agreement with the original AODV+MMAC 
protocol, it can be in the frequency resource more nervous conditions improve 
the performance of the network. |  
|  			
									
  										
			
Keywords:  | 
 			
									
NS2, MAC, Cognitive Wireless Network, Access Mode |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN AUTOMATED FRAMEWORK FOR AGENT BASED FEATURE SELECTION AND CLASSIFICATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
B.KALPANA,  Dr V. SARAVANAN,  Dr K VIVEKANANDHAN |  
|  			
									
Abstract: | 
 			
									
The proposed framework for agent based feature selection and classification 
system works with the help of software agents. These agents are rule based and 
are able to guide the user in feature selection and classification. With number 
of feature selection and classification algorithms available the framework paves 
way for an integrated approach in feature selection and classification. Initial 
results with partially implemented system prove to be promising in the field of 
machine learning. The algorithm was used on a live web site data for three years 
and the results were mined using the framework. The results give hope to show 
that agent based decision making can be very useful for persons who do not have 
idea of mining but are decision makers. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Feature Selection, Classification, Agent Based, Mining |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ENERGY MANAGEMENT SCHEME WITH LOAD BALANCING FOR PREEMPTIVE DYNAMIC SOURCE 
ROUTING PROTOCOL FOR MANET |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
V.RAMESH, Dr.P.SUBBAIAH |  
|  			
									
Abstract: | 
 			
									
Energy management issues are very important in the context of ad hoc networks. 
Energy needs to be optimally utilized so that the nodes can perform their 
functionality satisfactorily. MANETs are energy constrained as most ad hoc nodes 
to day operate with limited battery power. So, it is important to minimize 
energy consumption of the entire network in order to maximize the life time of 
the network. In this paper we proposed load balancing method for the new 
on-demand routing protocol (Preemptive DSR). As per the method, the PDSR selects 
a route at any time based on the minimum energy availability of the routes and 
the energy consumption per packet of the route at that time. The Simulation 
results shows that PDSR has increased packet delivery ratio and decreased delay 
compared with existing DSR. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Load Balancing, MANET, DSR, PDSR, Energy Management, Overhead Reduction |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
NUMERICAL SIMULATION OF GRANULAR MOTION BY PARTICLE FLOW CODE UNDER VIBRATION  |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
JIHUI LIANG, LILI XIN |  
|  			
									
Abstract: | 
 			
									
Internal friction and void ratio will change among granular particles under 
vibration, and the size of void ratio directly affects strength of granular 
media. To further study the effect of vibration parameters on granular 
mechanical properties, discrete element method is used to simulate particles 
motion in a vibrating rectangular case by PFC2D software and study the influence 
of vibration frequency and amplitude on void ratio of particles under cyclic 
loading. The results show that void ratio and axial stress of particles, which 
are with the same change trend, decrease with increasing vibration time, and the 
change process above is consistent with vibration compaction theory of internal 
friction decreasing doctrine. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Vibration, Void ratio, PFC2D |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
TOWARDS AN EDUCATION BEHAVIORAL INTENTION MODEL FOR E-LEARNING SYSTEMS: AN 
EXTENSION OF UTAUT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
PENG-CHUN LIN,  HSIN-KE LU, SHANG-CHIA LIU |  
|  			
									
Abstract: | 
 			
									
E-learning has continued to gain the interest of enterprises and universities. 
As an organization’s deployed e-learning systems grow, it is important for 
researchers to evaluate the performance of those systems. With the growing trend 
toward web-based learning systems, behavioral intention models (such as TAM, TPB, 
TAM2 and UTAUT) seem particularly helpful to examine whether and why people use 
e-learning technologies.  
Prior research has presented various perspectives on individual difference, 
which mostly focused on demographic variables, such as age, gender, education 
and individual experience. It is not easy to clarify the cross-effectiveness and 
redundancy among these demographic variables. In this study, learning and 
teaching styles are regarded as cognitive individual differences in adopting 
e-learning systems. Matching teaching and learning styles improves learning, 
attitudes, behavior and motivation.  
The proposed model, EduBIM (Education Behavioral Intention Model), focuses on 
the degree of correspondence between students’ perceived learning and teaching 
styles, which together directly moderate the intention and usage of e-learning 
systems. This study enriches the UTAUT model by integrating cognitive individual 
differences to synthesize the effects of demographic moderators. This model will 
enable researchers to evaluate behavioral intention toward e-learning systems 
and to propose further studies on system acceptance. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Learning Styles, Teaching Styles, Individual Difference, UTAUT, Behavioral 
Intention Model, e-Learning System |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
COPULA FOR ESTIMATION OF DISTRIBUTION ALGORITHM BASED ON GOODNESS-OF-FIT TEST  |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
JIA BAOJUN, WANG LIFANG, CUI ZHIHUA |  
|  			
									
Abstract: | 
 			
									
Inappropriate probabilistic model in the Estimation of Distribution Algorithm 
will reduce the quality of the solution, so goodness of fit test is introduced 
into Estimation of Distribution Algorithm to improve it. By means of test to 
select more suitable copula function under the statistical significance, that is 
to select more appropriate probability model under the statistical significance 
to solve the optimization problem. This modified Estimation of Distribution 
Algorithm improves the performance of the algorithm. The experimental results 
show the effectiveness of the proposed algorithm. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Estimation of Distribution Algorithm, Goodness of Fit, Probability Model, Copula |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A SURVEY OF RESEARCHING ON MICRO-BLOGGING |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
LEINA JI, WEIJIANG LI, HUI DENG, FENG WANG |  
|  			
									
Abstract: | 
 			
									
Micro-blogging is an emerging internet communication platform based on the 
social relationships. It can be used to share, disseminate and obtain all kinds 
of real-time updated information with about 140 words. Currently, micro-blogging 
becomes more and more popular since users exploit it to achieve a wide variety 
of social purposes. According to relevant public data, the earliest and most 
famous micro-blogging -- Twitter already has 500 million registered users in the 
world. Thus we survey the considerable literature on Twitter and show masses of 
research theoretical results in the area obtained over the past few years. By 
reading the paper, we hope authors can gain an in-depth understanding of the 
current research focus and tendency related to the results of the Twitter. 
Specifically, in this paper, we first introduce micro-blogging and its 
difference with traditional blogging. Then we list several different research 
directions about Twitter as well as their research purposes, methods and 
conclusions. Finally, we show the gaps of previous researches and prospect the 
future work of micro-blogging.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Twitter, Micro-blogging, Influence |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DESIGN OF A TYPE OF CLEANING ROBOT WITH ULTRASONIC |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ZELUN LI,  ZHICHENG HUANG |  
|  			
									
Abstract: | 
 			
									
A cleaning robot based on the ultrasonic principle is designed. With the single 
chip microcomputer AT89C52 and ultrasonic sensors, the robot can achieve the 
function of intelligent obstacle avoidance, automatic control and automatic 
sweeping. In the cleaning robot, a rotating cylindrical brush is used in front 
of the robot and it sweeps garbages into the dustbin in the process of movement, 
and a moist mop is used at the back of the robot, and it can sweep the ground 
when the robot is working. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Cleaning Robot, Ultrasonic sensors, obstacle avoidance, AT89C52 |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A MODIFIED HONEY BEE MATING OPTIMIZATION ALGORITHM FOR MULTI-OBJECTIVE VOLTAGE 
CONTROL OF DISTRIBUTED HYBRID WIND AND PV SYSTEMS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
LIZHEN WU, XIAOHONG HAO |  
|  			
									
Abstract: | 
 			
									
Recently, Distribute Generation sources (DGs) connected to the distribution 
network has received increasing attention. The daily voltage control is one of 
the most important schemes in distribution networks, which can be affected by 
DGs. This paper presents a multi-objective Voltage optimizes control modeling, 
including objectives that are the total cost of power generated by Wind Farms (WFs) 
and Photovoltaic (PV) pants and the grid; the total electrical energy losses; 
the total emission and the voltage deviations of the bus. Moreover, a new 
optimization algorithm based on Modified Honey Bee Mating Optimization (MHBMO) 
algorithm is proposed to determine the best operating point for the active power 
generated by WFs and PVs, reactive power values of capacitors. In order to 
overcome the shortcomings of original HBMO algorithm, the mating process is 
improved. During the optimization process, the proposed algorithm finds a set of 
non-dominated (Pareto) optimal solutions which are stored in an external memory 
called repository. Also a fuzzy clustering technique is used to control the size 
of the repository within the limits. Finally, a typical IEEE 32-bus distribution 
test system is used to investigate the feasibility and effectiveness of the 
proposed method. Simulation results illustrate the correctness and adaptability 
of the proposed model and the MHBMO algorithm. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Multi-objective optimization, Modified Honey Bee Mating Optimization (MHBMO), 
Distribute Generation sources (DGs), Wind Farm (WF), Photovoltaic (PV), Voltage 
Control |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AUTOMOTIVE WIMAX RADAR NETWORKS: THE FUTURE OF INTELLIGENT TRANSPORTATION 
SYSTEMS  |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
NIRMALENDU BIKAS SINHA, SAMIRAN PRAMANIK, CHADAN KUMAR SARKAR, RABINDRANATH BERA |  
|  			
									
Abstract: | 
 			
									
This paper addresses the developmental efforts towards the realization of 
vehicle to vehicle cooperative collision warning system for ITS. In this 
intelligent system either the vehicle or the infrastructure can communicate its 
location or other information to surrounding vehicles or nearby infrastructure 
for its implications in cooperative driving and vehicle safety. Commercial 
vehicles with radar system operating in ‘SKIN’ or ‘TRANSPONDER’ mode is used for 
this intelligent system. In the ‘SKIN’ mode of operation only one vehicle is 
associated with the radar whereas in the ‘TRANSPONDER’ mode both the vehicles 
will be fitted with the radar and communication system. Vehicles will be 
‘friends’ to each other by integrating the local radar mounted on each vehicle 
with vehicular communication. The goals of this paper are twofold: Providing an 
engineering argument of possible functional architectures of such systems and 
presenting a plausible example of the proposed future-trajectory-based design, 
which estimates and communicates vehicle positions, predicts and processes the 
future trajectories for collision and decision making using WiMAX waveforms. 
However for real time implementation of the system, a careful selection of the 
latest high speed wireless technology WiMAX is to be embedded with the SKIN or 
TRANSPONDER mode of radar operation for safe communication purposes in order to 
avoid collision on road. The authors have developed automotive WiMAX radar 
networks for SKIN and TRANSPONDER mode utilizing the VLSI based advanced 
development platforms. This paper will highlight the achievements of the model 
to develop an intelligent transport system. |  
|  			
									
  										
			
Keywords:  | 
 			
									
WiMAX, ITS, TCF, FCF, Skin Mode And Transponder Mode |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
RESEARCH ON THE COMBINING OF COMPRESSED SENSING AND NETWORK CODING IN WIRELESS 
SENSOR NETWORK |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
JIPING XIONG, JIAN ZHAO, LIFENG XUAN |  
|  			
									
Abstract: | 
 			
									
Wireless sensor networks (WSN) are faced with the problem that network size is 
inversely proportional to network lifetime because the number of data packets 
transmitted is equal to the number of communication nodes for recovering 
original signal. Compressed sensing(CS) compresses and samples in sparse domain 
of network source to reduce the amount of transmitted data to accurately 
reconstruct original signal which is far less than the number of network nodes, 
and thereby reducing total energy consumption of network. Network coding (NC) is 
applied to intermediate node to encode data before forwarding it rather than 
simply store and forward it, achieving balance of network load. This paper 
introduces research status of two emerging technologies, proposing combined 
method by researching their inner contact and applying them to WSN to expand 
network size while reducing energy consumption to prolong life of network. 
Furthermore, we conclude our work and point out future research directions. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Compressed Sensing (CS), Network Coding (NC), Wireless Sensor Network (WSN) |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ALGORITHM-IRRELEVANT PRIVACY PROTECTION METHOD BASED ON RANDOMIZATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
JING GUO |  
|  			
									
Abstract: | 
 			
									
Privacy preserving classification mining is one of the fast-growing subareas of 
data mining. The algorithm-related methods of privacy-preserving are designed 
for particular classification algorithm and couldn’t be used in other 
classification algorithms. To solve this problem, it proposes a new 
algorithm-irrelevant privacy protection method based on randomization. This 
method generates and opens a new data set that is different from the original 
data set independently as the perturbed data. The perturbed data and the 
original data have the same distribution. Users get the models of the original 
data from the perturbed data. Experimental results demonstrate that the 
classification algorithms can be used on the perturbed data directly. And this 
method reduces the privacy data disclosure risk more effectively. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Privacy Protection, Data Mining, Classification, Randomization, 
Algorithm-Irrelevant |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SPOKEN DOCUMENT CLASSIFICATION BASED ON LSH |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ZHANG LEI, XIE SHOUZHI, HE XUEWEN |  
|  			
									
Abstract: | 
 			
									
We present a novel scheme of spoken document classification based on locality 
sensitive hash because of its ability of solving the approximate near neighbor 
search in high dimensional spaces. In speech-text conversion stage, although 
lattice can provide multi-hypothesis during speech recognition, it is too 
complex to extract proper word information. Confusion network is adopted to 
improve word recognition rate while keeping the corresponding posterior 
probability. In vector space model, modified tfidf on posterior probability is 
proposed to handle the negative effects of the words with very low posterior 
probability. Furthermore, after generating the indexing structure based on 
locality sensitive hash, 1-nearest and N-nearest schemes are adopted in 
classifier. To spare the execution time, fast locality sensitive hash is 
conducted. Experiments on the data from four kinds of video programs show the 
effectiveness of proposed scheme. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Spoken Document Classification, Local Sensitive Hash, Confusion Network, Lattice |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
FENG YONG, DANG XIAO-WAN, XU HONG-YAN |  
|  			
									
Abstract: | 
 			
									
A great amount of duplicated entities exist in the heterogeneous data sources of 
Web. How to identify these entities is the most important prerequisite for 
pattern matching and data integration. To solve the deficiency of current entity 
recognition methods, such as low automatic level and poor adaptability, Deep Web 
entity recognition method based on BP neural network is proposed in this paper. 
To make full use of the characteristic of autonomic learning of BP neural 
network, the similarities of semantic blocks are used as the input of BP neural 
network. It obtains correct entity recognition model through training, and 
accomplishes the target of automated entity recognition of heterogeneous data 
sources. Finally, the feasibility of the proposed method is verified via 
experiments. The proposed method can reduce manual intervention and promote the 
efficiency and the accuracy of entity recognition simultaneously. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Deep Web; BP Neural Network; Entities Identify; Similarity |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN IMPROVED COLLABORATIVE RECOMMENDATION METHOD BASED ON SNA |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
XU HONG-YAN, LI JUN-PING, FENG YONG |  
|  			
									
Abstract: | 
 			
									
Collaborative recommendation is widely used in e-commerce personalized service, 
but due to data sparsity and cold start, the existing method cannot give precise 
results. To improve the recommendation precision, this paper gives a new 
collaborative recommendation method based on SNA. The proposed method uses 
social network analysis( SNA) technical to analyze the trust between the users, 
expresses it as trust value to fill the users—items matrix, and the user 
similarity calculation has been improved. Finally, an experiment is used to 
verify the validation of the proposed method. It is proved that it can better 
solve the problem of data sparsity and cold start. |  
|  			
									
  										
			
Keywords:  | 
 			
									
 Social Network; Social Network Analysis (SNA); Similarity; 
Trust Value; Collaborative Recommendation  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DELAY ANALYSIS OF TRAIN ONBOARD DETECTION SENSOR NETWORK |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
DEQIANG HE, XIAOYANG YAO, GUOLIANG HE, HAO LEI |  
|  			
									
Abstract: | 
 			
									
Recent research and development in the area of next generation train backbones 
have created an incentive towards the replacement of legacy interconnecting data 
communication architectures with newer and more innovative backbones. The 
onboard Ethernet technology has been applied in the train onboard detection 
sensor network gradually. Network delay is an important factor of detection 
sensor network quality. This paper analyzes the affection to the network delay 
of different network topology structure. In addition, the communication network 
model of onboard detection sensor network based on Ethernet has been constructed 
by the OPNET Network Modeler. According to the simulation data to analyze the 
network delay, link load and end-to-end throughput of bus network topology and 
ring network topology. This will provide technology reference for the onboard 
detection sensor network and train communication network topology structure 
optimization. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Detection sensor network, Delay analysis, Train Communication Network, Ethernet |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
RESEARCH ON CAN BUS AUTOMATED TEST ENVIRONMENT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
FENG LUO, CHU LIU |  
|  			
									
Abstract: | 
 			
									
Test and validation are so important that each type of automotive ECU 
(Electronic Control Unit) should be qualified before entering the market. In 
this article, a fully scaled and customized automotive CAN Bus test environment 
is introduced, including a test hardware, a driver and its software platform, in 
which a test kernel is implemented, which is able to parse CAN databases and 
automatically executes test cases generated by the test case generator. 
Programming for a specific test case is also supported. Log files are created 
during the test execution to log test steps as well as CAN Bus messages, which 
are used by the test report generator to generate the final test report. 
Problems are detected during the whole test process and reproduced later in the 
laboratory environment, which enhances the debugging process. With the help of 
the testing environment, the quality assurance of the ECU can be better 
achieved. |  
|  			
									
  										
			
Keywords:  | 
 			
									
CAN Bus, Automated Testing, Database Engine, Test Cases |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
RESEARCH ON THE CHINESE SEGMENTATION TECHNOLOGY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
FENG HONGYU, YAN SHITAO |  
|  			
									
Abstract: | 
 			
									
Abstract: The Chinese segmentation technology is the basis and key of Chinese 
information processing. By researching on this technology, this paper indicates 
that the method based on dictionary and statistics are much mature, but the 
unregistered word recognition is the main problem in this field. Thus, this 
paper lays a foundation and sets the directional work for its later development. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Chinese Segmentation, Corpus, Evaluation |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
RISK ASSESSMENT MODEL BASED ON MOBILE AGENT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
WANG YING, PENG XINGUANG |  
|  			
									
Abstract: | 
 			
									
With the rapid development of Internet and communication technology, network 
information security has become the focus of people’s attention. Generally 
speaking, attackers and virus intrude into the target system by utilizing 
security vulnerabilities. In this paper, combined Mobile Agent theory with risk 
assessment technology, a kind of risk assessment model based on Mobile Agent has 
been brought forward. In order to get the target system’s vulnerabilities, 
Mobile Agent is used to scan the system according to user’s particular setting 
of assessment rules. And then the risk grade of target system is given out for 
providing user particular assessment result and security advice. On the base of 
model design, an experiment of Mobile Agent risk assessment model is designed. 
In the process of experiment, the target system is scanned according to facility 
condition, and the function of Mobile Agent risk assessment model is primarily 
implemented. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Vulnerability Scan, Risk Assessment, Mobile Agent |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN ENHANCED EARLY DETECTION METHOD FOR ALL ZERO BLOCK IN H.264 |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
CONG-DAO HAN |  
|  			
									
Abstract: | 
 			
									
Transformation and quantization are important steps for changing spatial 
residual data into frequency signal component. All-zero block (AZB) detection is 
an efficient means to reduce calculation times of transformation and 
quantization. In order to raise the efficiency of all-zero block detection and 
avoid error judgment, an enhanced all-zero block detection approach is proposed 
by using the base matrixes in this paper. Firstly, the base matrixes of integer 
transformation coefficients are analyzed. It can be found that all elements in 
the same sub-area are equal or inverse to each other. Considering this 
distribution property, we can deal with the elements within the same sub-area 
together and deduce a looser judgment criterion for all-zero block. 
Consequently, a larger proportion of all-zero blocks can be detected in advance. 
The experiments results demonstrate that the proposed algorithm outperforms 
other methods in the detection rate. |  
|  			
									
  										
			
Keywords:  | 
 			
									
All-Zero Block (AZB), Transformation and Quantization, Base Matrix, Integer 
Transform |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
THE ALGORITHM OF REGION POLE PLACEMENT ON THE SAFETY INTERVAL |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
FU-ZHONG WANG,  YI-KE GUO |  
|  			
									
Abstract: | 
 			
									
This paper is concerned with the design problem for linear system. For a class 
of linear systems relation to the sector region pole placement, we put forward 
the concept of gain fault safety interval for each actuator channel. By using 
mathematical model of gain fault with single actuator channel, we present the 
algorithm of the actuator gain fault safety interval in the representative 
sector pole placement, we also analyze the impact on the stability and the 
dynamic performance of the system with each actuator channel, and provide an 
important theory evidence for the designer to design and place on the number of 
hardware. A practical example is given to illustrate the algorithm procedures 
and the approach’s effectiveness. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Safety Interval, Pole Placement, Effectiveness, Actuator Fault |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
THE APPEARANCE AND CONNOTATION: RESEARCH ON APPLICATION OF 3DSMAX IN THE 
ARCHITECTURAL DESIGN TEACHING  |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
TANG HONG,SHI YAN-HONG |  
|  			
									
Abstract: | 
 			
									
With the social development and the advancement of technology, the rendering of 
real performance is becoming increasingly needed in the construction field. 
However, the traditional techniques is difficult to perfect the performance of 
the designer's intentions. This article introduced 3DSMAX software into 
architectural design teaching, discussing the origin of 3DSMAX software, 
creating process and application skills and so on. It also discussed how to 
enable students to quickly and easily master the 3DSMAX software to perfectly 
reflect the designer’s design idea and true intentions through the software and 
thus to enhance the overall performance skills of students. |  
|  			
									
  										
			
Keywords:  | 
 			
									
3DSMAX, Architectural Design, Architectural Renderings, Performance Skills |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
STUDY ON MCM TEST SCHEME USING ADAPTIVE GENETIC ALGORITHM AND PARTICLE SWARM 
OPTIMIZATION ALGORITHM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
CHEN LEI |  
|  			
									
Abstract: | 
 			
									
The paper presents a new interconnect test generation scheme based on adaptive 
genetic algorithm (AGA) and particle swarm optimization algorithm (PSO) for 
Multi-chip Module (MCM) applications. By combing the characteristics of 
interconnect test and constructing particle expression of test generation, the 
velocity updating equation and position updating equation of discrete PSO are 
presented in this paper. AGA generates the initial candidate test vectors in 
this scheme. In order to improve the fault coverage of the test vector, PSO is 
employed to evolve the candidates generated by AGA. The international standard 
MCM benchmark circuit was used to verify the scheme. Comparing with not only the 
evolutionary algorithms, but also the deterministic algorithms, simulation 
results demonstrate that the hybrid scheme can achieve high fault coverage, 
short CPU time and compact test set, which shows that it is a novel optimized 
method deserving research. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Adaptive Genetic Algorithm (AGA), Particle swarm optimization (PSO), Multi-chip 
Module (MCM) |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
CIRCUIT INTEGRATED DESIGN AND ANALYSIS TECHNOLOGY FOR PERFORMANCE AND 
RELIABILITY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
GANG ZHAO,  GUANGYAN ZHAO, YUFENG SUN |  
|  			
									
Abstract: | 
 			
									
Integrated design and analysis technology for performance and reliability is a 
highlight issue in the field of reliability. A technical framework for the 
integration of performance and reliability of electronic products was built up. 
The framework integrates multiple performance analysis tools and reliability 
analysis tools and realizes the integrated design and analysis of performance 
and reliability, centering on performance simulation and on the basis of 
data-share. In order to realize the integrated capability, the flow and data 
relationship of integration of performance and reliability of electronic 
products were investigated, and then the integration platform was established. 
Finally, a case was analyzed to validate the function of the platform. It could 
take the circuit fault simulation, FMEA, reliability prediction, derating 
design, testability prediction etc. during the process of circuit performance 
design. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Integration, Reliability, Performance, Platform, Circuit |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SIMULATION OF AVIONICS ELECTROMAGNETIC SHIELDING EFFECTIVENESS BASED ON MODAL 
MOM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
YAJUN XU |  
|  			
									
Abstract: | 
 			
									
In this paper, an efficient technique based on modal method of moments (MoM) is 
presented, the influence of apertures’ shape and calculation point of SE on 
electromagnetic shielding effectiveness has been studied. A very good agreement 
among the simulation results of the proposed technique, results available in the 
literature and experimental results is observed. The results of the present 
analysis show that electric field SE is seriously affected by calculation points 
and aperture shape. These useful results gained in this paper have important 
practical significance to improving the electric field shielding effectiveness 
of shielding cavity.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Rectangular Enclosure, Apertures, SE, Mom, Green’s Function |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ENHANCING USER INTERACTION IN A NUTRITIONAL EDUCATIONAL PACKAGE FOR THE ELDERLY 
USING 3D ANIMATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
NAZLENA MOHAMAD ALI, AZIR REZHA NORIZAN, SUZANA SHAHAR |  
|  			
									
Abstract: | 
 			
									
Most of the elderly have difficulties with computer technology. They lack 
computer literacy, and at the same time, have physiological changes that are 
associated with impaired perception, cognition, and other social aspects. These 
limitations can be lessened using multimedia elements to assist in their 
interaction with computers. One of these multimedia elements is 3D animation. We 
have incorporated 3D animation into a digital educational nutritional package, 
which was designed following the design guidelines for older adults, for better 
interface user interaction. An experiment was carried out to measure user 
acceptance; and a comparison was made between the digital package and a booklet. 
Questionnaires were distributed to six elderly subjects, aged 60 to 75 years 
old. Overall, the results showed that the 3D animation was helpful in 
facilitating an understanding of the content. The comparison experiment involved 
ten respondents that were divided into the experiment (digital package) and 
control (booklet) groups. Each group was given a task and the completion time 
for each was recorded. The findings indicate that the content exploration using 
the digital package was faster than using the traditional booklet. Of the 
respondents, 60% from the experiment group were able to access the content in 
less than two minutes; compared to 40% from the control group. These initial 
findings indicate the possibility of using a digital education package, and as 
such, should be explored further with larger samples and modules, in order to 
increase the nutritional and health knowledge and awareness among the elderly. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Interface Design, Elderly, Nutrition Education |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
QUERY MANAGEMENT IN DATA WAREHOUSE USING VIRTUAL MACHINE FAULT TOLERANT RESOURCE 
SCHEDULING ALGORITHM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
S. KRISHNAVENI, M. HEMALATHA |  
|  			
									
Abstract: | 
 			
									
Multi-stage processing occurred in distributed data warehouse. Many joints and 
splits are required at the time of submitting queries. Scheduling algorithms are 
used to resolve these issues. Reducing the processing time and cost are common 
concerns in scheduling. By this way the available resources are used to 
accomplish the task with quick manner. In this paper, we propose Virtual Machine 
Fault Tolerance Resource Scheduling (VMFTRS) Algorithm for scheduling the 
resources. Processing time, memory size and Replication Metric are taken as 
performance metrics and each one calculated depending upon the given query. 
Performance results show that the proposed VMFTRS algorithm gives better result 
than other existing algorithms. It is also adaptable for all distributed data 
warehouse systems. |  
|  			
									
  										
			
Keywords:  | 
 			
									
 Data Warehouse, Resource Scheduling (RS), Research On Novel 
Dynamic Resource Management (RNDRM), New Resource Mechanism With Negotiate 
Solution (NRMNS), Virtual Computing Grid Using Resource Pooling (VCGRP), Virtual 
Machine Fault Tolerant Resource Scheduling (VMFTRS)  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
HYBRIDIZING RELIEF, MRMR FILTERS AND GA WRAPPER APPROACHES FOR GENE SELECTION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SALAM SALAMEH SHREEM, SALWANI ABDULLAH, MOHD ZAKREE AHMAD NAZRI, MALEK ALZAQEBAH |  
|  			
									
Abstract: | 
 			
									
Gene expression data comprises a huge number of genes but have only few samples 
that can be used to address supervised classification problems. This paper is 
aimed at identifying a small set of genes, to efficiently distinguish various 
types of biological sample; hence we have proposed a three-stage of gene 
selection algorithm for genomic data. The proposed approach combines ReliefF, 
mRMR (Minimum Redundancy Maximum Relevance) and GA (Genetic Algorithm) coded as 
(R-m-GA). In the first stage, the candidate gene set is identified by applying 
the ReliefF. While, the second minimizes the redundancy with the help of mRMR 
method, which facilitates the selection of effectual gene subset from the 
candidate set. In the third stage, GA with classifier (used as a fitness 
function by the GA) is applied to choose the most discriminating genes. The 
proposed method is validated on the tumor datasets such as: CNS, DLBCL and 
Prostate cancer, using IB1 classifier. The comparative analysis of the R-m-GA 
against GA and ReliefF-GA has revealed that the proposed method is capable of 
finding the smallest gene subset that offers the highest classification 
accuracy.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Genetic Algorithm, Gene selection, Microarray datasets, mRMR, Relief |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ANALYSIS OF DIFFERENT ACTIVATION FUNCTIONS USING BACK PROPAGATION NEURAL 
NETWORKS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
P.SIBI,  S.ALLWYN JONES,  P.SIDDARTH |  
|  			
									
Abstract: | 
 			
									
The Back propagation algorithm allows multilayer feed forward neural networks to 
learn input/output mappings from training samples. Back propagation networks 
adapt itself to learn the relationship between the set of example patterns, and 
could be able to apply the same relationship to new input patterns. The network 
should be able to focus on the features of an arbitrary input. The activation 
function is used to transform the activation level of a unit (neuron) into an 
output signal. There are a number of common activation functions in use with 
artificial neural networks (ANN). Our paper aims to perform analysis of the 
different activation functions and provide a benchmark of it. The purpose is to 
figure out the optimal activation function for a problem. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Artificial Neural Network (ANN), Back Propagation Network (BPN), Activation 
Function |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ANTENNA EFFECTS ON PHASED ARRAY MIMO RADAR FOR TARGET TRACKING |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SAMIRAN PRAMANIK, NIRMALENDU BIKAS SINHA, CHADAN KUMAR SARKAR |  
|  			
									
Abstract: | 
 			
									
Multiple-input multiple-output (MIMO) radar can achieve improved localization 
performance by employing a coherent processing approach with proper antenna 
positioning. Coherent processing, however, entails the challenge of ensuring 
phase coherence of the carrier signals from different distributed radar 
elements. In recent years, studies have shown how the performances of 
conventional phased-array radar can be improved by using the same approach. In 
this work, we aim to address such a challenge by providing a systematic 
treatment of the phase synchronization problem in coherent MIMO radar systems. 
We propose and study in coherent MIMO radar and phase array radar with coherent 
beam for the effectiveness of the above problems. The results show that at high 
and low SNR values phase array radar with coherent beam provides great 
improvements of target detection performance over coherent MIMO radar. 
Simulation results are presented to validate our theoretical analysis. |  
|  			
									
  										
			
Keywords:  | 
 			
									
MIMO, Phased array, Coherent, Radar, SNR |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
PROBABILITY DETECTION FOR STATISTICAL MIMO RADAR: ALGORITHMS AND THEIR ANALYSIS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SAMIRAN PRAMANIK, NIRMALENDU BIKAS SINHA, CHADAN KUMAR SARKAR |  
|  			
									
Abstract: | 
 			
									
Multiple-input–multiple-output (MIMO) radar is an emerging technology that has 
significant potential for advancing the state-of-the-art of modern radar. This 
is a multiple antenna radar system capable of transmitting arbitrary waveform 
from each antenna element. Like MIMO communications, MIMO radar offers a new 
paradigm for signal processing research. It’s significant potentials for fading 
mitigation, resolution enhancement, and interference and jamming suppression, 
which can result in significantly improved target detection, parameter 
estimation, target tracking and recognition performance. To identify a target in 
statistical MIMO radar system multiple antennas, not closely placed, for 
transmission and reception is used. This paper introduces the signal processing 
issued in statistical MIMO radar and coherent MIMO radar for improved target 
detection and recognition performance. The fundamental difference between 
statistical MIMO and other radar array systems is that the latter seek to 
maximize the coherent processing gain, while the former capitalizes on the 
diversity of target scattering to improve radar performance. Compared to 
coherent MIMO radar, statistical MIMO radar can offer better parameter 
identification , higher resolution which allows for much flexibility for 
transmit beam-pattern design and waveform optimization. This paper focuses on 
the application of the target spatial diversity to improve detection 
performance. The optimal detector in the Neyman-Pearson sense is developed and 
analyzed for the statistical MIMO radar in case of stationary target. The 
performance improvement achieved by the use of angular diversity in statistical 
MIMO radar is investigated. The results show that at high and low SNR values 
statistical MIMO radar provides great improvements of target detection 
performance over coherent MIMO radar. Finally, a number of numerical examples 
demonstrated for the effectiveness of the proposed approaches. Therefore, 
statistical MIMO radar can be applied to enhance radar resolution by allowing 
the measurement of one scatter at a time. |  
|  			
									
  										
			
Keywords:  | 
 			
									
MIMO, Statistical, Coherent, Radar, Probability Detection, SNR |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
Vol. 47. No. 3 -- January 2013  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
 |     	
 |