|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
January 2013 | Vol. 47 No.3 |
Title: |
ENERGY EFFICIENT DISTRIBUTED IMAGE COMPRESSION USING JPEG2000 IN WIRELESS SENSOR
NETWORKS (WSNS) |
Author: |
A.KARTHIKEYAN, T.SHANKAR, V.SRIVIDHYA, SURYALOK.SARKAR, AKANKSHA GUPTE |
Abstract: |
Restricted computational power, memory limitations, narrow bandwidth and energy
supplied present strong limits in sensor nodes are the important points should
be considered during the real time transmission of data using wireless sensor
networks. Therefore, maximizing network lifetime and minimizing energy
consumption are always optimization goals. To reduce the energy consumption of
the sensor network during image transmission, an energy efficient image
compression scheme is proposed. The image compression scheme reduces the
required memory. To address the above mentioned concerns, in this paper, an
approach of image transmission in WSNs, taking advantage of JPEG2000 still image
compression standard and using MATLAB and C from Jasper. The features provided
by JPEG2000 were achieved using techniques such as Discrete Wavelet Transform (DWT)
and Embedded Block Coding with Optimized Truncation (EBCOT).Image quality and
energy consumption are the two performance parameters should be considered
during the image compression and transmission. Simulation results are presented
and show that the proposed scheme optimizes network lifetime and reduces
significantly the amount of required memory by analyzing the functional
influence of each parameter of this distributed image compression algorithm. |
Keywords: |
WSNs; Image compression; Energy conservation; System lifetime; JPEG2000; MATLAB;
DCT;JPEG;PSNR |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ANALYSIS OF THE MONO-, DI-, AND TRINUCLEOTIDE TANDEM REPEATS IN INF2 OF
GLOMERULAR PODOCYTE |
Author: |
SIM-HUI TEE |
Abstract: |
Inverted formin 2 (INF2) is an essential gene that is expressed in glomerular
podocyte in kidney. Malfunction in INF2 will result in kidney diseases, which
could be avoided if the mechanisms of its transcription and translation are
well-studied. This research aims to use a computational approach to understand
the tandem repeats, which is a phenomenon closely linked with diseases, in this
gene. A genome database, web server, and a computational motif model were
primarily used in this research. The results of this study provide insights that
will guide biologists and biomedical practitioners in molecular studies and drug
designs for the INF2-implicated diseases. |
Keywords: |
Bioinformatics, Java Programming, Database, Tandem Repeats, INF2, Glomerular
Podocyte, Gene Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ONE-TO-MANY REVERSIBLE MAPPING FOR IPv6 ADDRESS GENERATION: SIMULATION SOFTWARE
DEVELOPMENT |
Author: |
NASHRUL HAKIEM, MOHAMMAD UMAR SIDDIQI |
Abstract: |
This paper presents the development of a one-to-many reversible mapping
mechanism simulation for IPv6 address generation. The aim of this mechanism is
to improve IPv6 addresses generation in terms of privacy and security in an
enterprise local area network (LAN). Each time a user accesses a network, a
dynamic IPv6 address is assigned via the DHCPv6 server. The dynamic address
(one-to-many mapping) is to protect a user from unwanted behavior analysis
attempting to exploit IPv6 addresses, thus protecting user privacy. However, the
dynamic address can be uniquely linked to the user (many-to-one mapping) if the
need arises. The one-to-many reversible mapping is generated dynamically using
Cipher Feedback (CFB) mode of operation of the Advanced Encryption Standard (AES).
Software simulation is developed using the software engineering waterfall model
and a Unified Modeling Language (UML) class diagram as a notation. The results
show that the mechanism simulates well for IPv6 address generation and IPv6
address owner identification. The one-to-many mapping may be incorporated into
DHCPv6 software and many-to-one mapping may be implemented as a complement of
local area network monitoring software. |
Keywords: |
IPv6 address, Advanced Encryption Standard, Cipher Feedback, Software
Engineering, Simulation |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
AN EXPERIMENT OF THICK FILM FORCE SENSOR USING MEMS SIMULATION SOFTWARE |
Author: |
M.H. CHONG, H.JAAFAR, W.Z.W.HASAN, S.SHAFIE, M.N.HAMIDUN, M.M. ISA, A.F. HAWARY |
Abstract: |
Force sensor (or pressure sensor) has gained increasing interest among the
researchers. Using the Microelectromechanical Systems or MEMS technology, the
size of the force sensor can be miniaturized and this ignites more possible
application in the field of biomedical and robotic applications. Recent
researches show the application of force sensor on the prosthetic hand, an
artificial limb connected to an amputated person. This paper presents on
simulating the sensitivity of the thick film force sensor using IntelliSuite
software. The force sensor is realized by using the piezoresistive material on
the cantilever structure.There are three force sensor designs are simulated. Two
of the designs are simulated using glass as substrate, and while the remaining
one is of alumina substrate. The sensitivity simulated is much smaller compared
to the estimations made using equations. The simulations show that the glass
sensor fares better than the alumina sensor. If the substrate is the same, the
sensor with the bigger dimension has better sensitivity. |
Keywords: |
MEMS, Force Sensor, Intellisuite, Piezoresistors, Piezoresistive Coefficient |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
MINING ROAD TRAFFIC ACCIDENT DATA TO IMPROVE SAFETY IN DUBAI |
Author: |
ABDELAZIZ ARAAR, AMIRA A. EL TAYEB |
Abstract: |
Road traffic accidents are a major public health concern, resulting in an
estimated 1.2 million deaths and 50 million injuries worldwide each year. Dubai
in particular experiences a high rate of such accidents. Research on road safety
has been conducted for several years, yet many issues still remain undisclosed
and unsolved. Specifically, the relationships between drivers' characteristics
and road accidents are not fully understood. In this work, we started by
collecting a dataset between 2008 and 2010 from Dubai Police. After
preprocessing, we modeled the data to 19 attributes and 5 classes. We used WEKA
data mining software with the 4 classifier methods (Decision trees, Rules
induction, BayesNet, and MultilayerPerceptron). We applied data mining
technologies to link recorded accident, driver, and road factors to accident
severity in Dubai, and generated a set of rules that could be used by the Dubai
Police to improve safety. Empirical results showed that the developed models
could classify accidents within reasonable accuracy. The comparison of these
classifiers showed that the neural networks classifier (MultilayerPerceptron
algorithm) is the best classifier for all classes. We generated recommendations
and conclusions. |
Keywords: |
Decision Trees; Rules Induction; Bayesnet; Multilayerperceptron; WEKA; Dubai Car
Accidents |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ON THE ANALYSIS OF PARAMETERS’ EFFECT IN PDE-BASED IMAGE INPAINTING |
Author: |
BAHA. FERGANI, MOHAMED KHIREDDINE. KHOLLADI |
Abstract: |
Image Inpainting is an important task in the field of image processing, with
many applications in the fields of image and vision analysis. It aims at
restoring damaged or missed regions in images in the case of undetectable forms.
The basic idea in image inpainting, according to the Bertalmio’s approach, is to
smoothly propagate information from the boundaries of the missed region toward
the inside of the gap in the direction of isophotes. The purpose of this paper
is to analyze the effects of different parameters in Bertalmio’s approach on the
quality of the resulting inpainted image. The parameters dealt with in the paper
are the rate of improvement, the number of iterations, the number of isotropic
diffusion and the number of anisotropic diffusion. |
Keywords: |
Image, Damaged image, Inpainting, Partial Differential Equation (PDE) |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
USING LDP FASTREROUTE VERSUS LDPORSVP IN AN MPLS CORE BACKBONE FOR CONVERGENCE
ENHANCEMENT |
Author: |
ALA ABDELALI , DRISS EL OUADGHIRI, MOHAMED ESSAAIDI |
Abstract: |
MPLS/VPN backbones are widely used today by various operators and private
companies in the world, high to medium-sized, either use an operator or build
their own MPLS/VPN backbone. Real time applications like voice and video are
more and more integrated to end user applications, making them ever more time
sensitive. Operators are offering services like hosting companies voice
platforms, voip call centers, iptv ..etc. All these aspects make the convergence
time inside a backbone a challenge for service providers. However, the global
convergence time is an assembly of several factors including: link or node
failure detection, IGP failure detection, LSP Generation, SPT Computation, RIB
update, local FIB creation and distribution ...updates signaling...etc., a lot
of approaches can be used to minimize the convergence time, our approach consist
on enhancements and optimization in control and forwarding plane, the scope of
our work is the core backbone, however a lot of things can also be made at the
access. In this article we especially focuses on stressing and comparing two
methods: “LDP over RSVP in the core P routers” and “ LDP Fastreroute in the core
P routers”. Beyond the “state of the art” and implementation of both protocols,
we describe in detail our design considerations, impact of faults and test
results, the aim of the study is to give an accurate idea of gains and drawbacks
of each method and which one more fits an operator infrastructure. We consider
this work as a contribution to the global research on the “network convergence
item”, it more deals with the state of the art, and features interoperability. A
continuation of this work is using same approach while modeling new protocol
concepts holding intrinsically the convergence as a constraint. |
Keywords: |
Fast-convergence (FC), Resource Reservation Protocol (RSVP),
Label Distribution Protocol (LDP),Virtual Private Network (VPN), Loop Free
Alternate (LFA), Next Hop Label Forwarding Entry (NHLFE), Intermediate System to
Intermediate System ( IS-IS), Label Switched Path (LSP), Lost of Signal
Detection (LOSD), Multiprotocol Label Switching (MPLS), Protocol Independent
Convergence (PIC), Route Distinguisher (RD), Routing table manager (RTM),
Provider edge route (PE), bidirectional failure detection (BFD), Provider Router
(P), Label Switch Router (LSR) |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ON THE CAPACITY OF MULTICELL COVERAGE MIMO SYSTEMS IN HIGH ALTITUDE PLATFORM
CHANNELS |
Author: |
WALID M. RAAFAT, HOSNY A. EL-MOTAAFY |
Abstract: |
This paper is a comparative study between the performances of conventional
terrestrial multicell Multiple Input Multiple Output (MIMO) working in a
Rayleigh fading environment and its corresponding High Altitude Platform (HAP)
system working under a different Path Loss (PL) model with the capacity as the
performance metric of interest, calculated using the Singular Value
Decomposition (SVD). Both systems are assumed to be affected by cochannel
interference users in other cells .Simulation results show that the performance
of multicell MIMO HAP dependent system outperforms its corresponding that works
in terrestrial environment in terms of per user channel capacity. |
Keywords: |
Multiple-input multiple-output (MIMO), cochannels interference, Rayleigh fading,
High Altitude Platforms (HAP), Singular Value Decomposition (SVD) |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
DEVELOPMENT AND EVALUATION OF MODEL FOR TEACHING AND LEARNING TRADITIONAL CRAFT
COURSEWARE |
Author: |
SALYANI OSMAN, NORAIDAH SAHARI, NOR AZAN MAT ZIN, RATNA ZUARNI RAMLI, NORAZIMAH
AWANG, SITI ROSNI MOHAMAD YUSOFF |
Abstract: |
This paper discusses the development and evaluation phases involved in the
development of a model for traditional craft courseware. The model called CDTC
Model was developed based on the software development life cycle methodology
consisting of Analysis, Design, Development and Evaluation phases. Every phase
has its own contribution towards the objectives of the research. However, this
paper concentrates on the development phase which involves adapting the model
into a series of prototype development and evaluation phase that focus on four
parts: usability study of the prototype derived from the model, effectiveness
evaluation, satisfaction assessment on cognitive apprenticeship adaptation and
final validation. The final validation was conducted among selected craft
instructors to verify the model's component as well as to confirm the final
version of the model. The results of the final validation indicate that the CDTC
Model components are obviously found important to the development of courseware
for teaching and learning traditional craft. |
Keywords: |
Traditional Craft Model development, Traditional craft
courseware, Craft Education |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
DIAMOND SHAPED SYMMETRICAL SLOTTED MINIATURIZED MICRO STRIP PATCH ANTENNA FOR
WIRELESS APPLICATIONS |
Author: |
A. BENO, D. S. EMMANUEL |
Abstract: |
A reduced ground plane diamond shaped multiband microstrip slot antenna is
proposed. The antenna is designed with two symmetrical slots to form the diamond
shape and the patch is fed with a microstripline. The slots make the antenna to
have multiple resonances to operate in the frequency bands of 2.15 GHz to 7.8
GHz with a peak gain of 6.09 dB at 6.83 GHz and above 2 dB in all operating
bands achieving a maximum impedance bandwidth of 16.38 % in the satellite
operating band. The antenna has good radiation characteristics and operates in
the C-Band and military X-band making it suitable for Wi-Max, WLAN and Satellite
applications. |
Keywords: |
Patch, Reduced Ground Plane, Symmetrical Slot, Microstrip, Multiband |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ANALYSIS OF VRPPIC AND PPIC FOR SISO AND SIMO MC-CDMA UPLINK SYSTEM |
Author: |
NOOR MOHAMMED. V, P. S. MALLICK, L. NITHYANANDAN |
Abstract: |
This paper presents an extended version of Partial Parallel Interference
Cancellation (PPIC) called Variance reduced Partial Parallel Interference
Cancellation (VRPPIC) for multicarrier code division multiple access uplink
systems. The combination of PPIC receiver and new bit estimator is called VRPPIC
detector. This realization is derived for the main PPIC operation and soft
decision (SD) from PPIC, which are linear combination of the bit estimator using
appropriate Weighting Factors (WF). These weighting factors are derived from
Partial Parallel Interference Cancellation (PPIC) weighting factors. It is used
to reduce the conditional variance of the final stage signal estimation. An
Optimal Weighting Factor (OWF) selection algorithm has been derived for VRPPIC
detector scheme, to minimize a monotonically increasing condition variance
function. For all the interference cancellation stages the derived OWFs are
equal and can easily be obtained from a linear function of active users.
Simulation has been done in VRPPIC detector and PPIC detector using optimal
weighting factors and randomly selected weighting factors. The result shows that
the VRPPIC with OWFs outperforms both VRPPIC and PPIC with randomly selected
weighting factors. Also it is shown in this paper that if there are multiple
antennas at the receiving end, the performance of the detector is further
improved. This leads to generalization that if data comes from single stream
(single input) and there are multiple outputs (antennas) at the receiving end,
the detector for multiple reception MC-CDMA strikingly outperforms the
conventional systems with single antenna at the receiving end. |
Keywords: |
Optimal Weighting Factor (OWF), Multiuser Detection, Variance Reduced Partial
Parallel Interference Cancellation (VRPPIC), Multiple Access Interference (MAI) |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
SIGNAL GENERATOR BASED ON THE VIRTUAL INSTRUMENT TECHNOLOGY |
Author: |
YAN LIU, YINGYING SHENG, MANQIONG TAN |
Abstract: |
A high-precision and stable signal generator with extremely low frequency is the
ideal equipment in machinery, civil engineering, communication and vibration
test. To meet the demands of these special areas, the paper designs such a
signal generator based on virtual instrument using hybrid system with MCU and
FPGA. The system consists of a host and a slave computer. The slave computer
uses a MCU via the DDS technology to make FPGA generate periodic signal with
adjustable frequency. The virtual instrument technology is introduced into the
host computer (PC), which uses LabVIEW to set the signal parameters and realize
the GUI system. The results of our implementation show that the signal generator
can generate frequency varying from 0.01Hz to 20 kHz, including sine wave,
square wave and triangle wave. It has been successfully used in the vibration
measure of some engineering areas. |
Keywords: |
Signal Generator, DDS, FPGA, Virtual Instrument |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ANALYSIS ON EFFECT OF BEARING TYPES ON CONTINUOUS GIRDER BRIDGES UNDER SHIP
COLLISION |
Author: |
GUOQIANG XIE, WEI HU |
Abstract: |
After analyzing the existing simplified methods of ship-bridge collision and
comparing their pros and cons, a relatively safe simplified analysis process is
put forward. The time-history curve of the ship collision force obtained from
the ship-rigid wall collision simulation using the software LS-DYNA is put into
the whole bridge dynamic model in SAP2000 and then dynamic response analysis of
the whole ship has been carried on. Respect to the bridge with ordinary fixed
bearings and seismic isolation bearings, the influence of the bearing type on
the key structure of the bridge are analyzed. Then the features and rules of the
continuous bridges dynamic responses with different bearings under different
ship-bridge collision angle and velocity are obtained. |
Keywords: |
Continuous Bridges, Ship Collision, Bearings, Numerical Stimulation, Collision
Angle, Bearing Type |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ANALYSIS ON IMPACT OF INTERNET CULTURE TO THE SENSE OF WORTH FOR UNIVERSITY
STUDENTS AND ITS STRATEGY |
Author: |
LI ZHANG |
Abstract: |
The multilayer perceptron is becoming more popular because of its characters
such as fault tolerance, robustness and low request for the info. In this
article the impact of the network to sense of worth for the university students
is studied by using the multilayer perceptron model. The model can fit better
and the coefficient of determination is 0.915; the relative error is
0.012±0.003. The internet culture can influence the concepts of knowledge,
intercourse, politics, morality and freedom of the university students and the
result is just like other documents. The multilayer perceptron model can be used
to analyze the impact of the network to the sense of worth for the university
students. |
Keywords: |
Internet Culture, University students, Sense of Worth, Multilayer Perceptron |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
EMPIRICAL RESEARCH ON US INFLATION PERSISTENCE |
Author: |
QIZHI HE, FEI ZHOU, FENG DING |
Abstract: |
Constant coefficient method is the traditional way to measure the persistence of
inflation series. But this kind of method can not reflect effectively the change
of breakpoint and economic situation. To the lack of the existing methods, the
paper examines the breakpoint change in the coefficient of inflation persistence
in the United States, and at the same time studies the changes of persistence
characteristics of United States inflation rate by using time-varying
coefficient model. The analysis shows that there exists breakpoint change in the
inflation persistence coefficient in the United States; inflation persistence
coefficient in the United States ranges from 0.7132 to 0.8826; the persistence
coefficient continued to decline in the mid-2008, and etc. |
Keywords: |
Inflation Persistence, Breakpoint Change, Time-varying Coefficient Model |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
TROJAN HORSE HIDING TECHNOLOGY RESEARCH BASED ON K - SUMMARY CLUSTERING
ALGORITHM |
Author: |
DAN LIU, SHIXIA MA, ZU HUA GUO, XIU LAN WANG |
Abstract: |
The rapid development of computer networks has brought great convenience to
people's learning, work and life. However, because the network has the
characteristics of sharing and openness, and the computer systems often use the
open operating system, computer networks are more vulnerably subject to attack
from hackers. The network security issues have been particularly prominent.
Using of Trojan technology to attack and destroy the network system has become
the greatest threat to the security of information networks. On the basis of
analyzing the life characteristics, working principle and hiding technique of
Trojans, the paper gives the Trojan removal method. Meanwhile, the paper
proposes a K-summary clustering algorithm. The algorithm can accurately locate
the Trojan position and significantly saving the positioning running time, which
has certain practical significance to improve the security of the network. |
Keywords: |
Trojan Principle, Hiding Techniques, K-summary Clustering Algorithm, Hang Horse
Way, Trojan Positioning |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ANALYSIS OF THE COMPLEX MATERIAL FLOW NETWORKS IN TYPICAL STEEL ENTERPRISE |
Author: |
YEQING ZHAO, GUIHONG BI |
Abstract: |
The aim of this paper is to present a new modeling method for complex material
flow networks system of typical steel enterprise. Iron and steel industry is one
of the most important industry in the country, especially, have a direct impact
on the whole national economy. For the diversity and complexity of the
production technique of the material flow system in the steel enterprise, the
manufacturing process was defined as a complex networks based on complex
networks theory and techniques, in which the devices were seen as nodes and the
direct relationships between the devices were seen as edges. The statistical
analysis of the network model of the production process in typical steel
enterprise was provided to explore new methods and breakthrough for local path
optimization and global planning, and that supply the instructions of theories
and techniques for the further improving the topology structure of the material
flow networks in steel enterprise. |
Keywords: |
Material Flow System, Complex Networks, Degree Distribution, Shortest Path,
Clustering Coefficient |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
SIMULATION FOR VEHICLE ACTIVE SUSPENSION CONTROL BASED ON DIFFERENT FEEDBACK
PARAMETERS |
Author: |
JINGYUE WANG, HAOTIAN WANG, LIXIN GUO |
Abstract: |
A half-car model with four DOF was established to simulate the system. On the
basis of this model, Self-adapt Parameters Fuzzy-PID control method of the
active suspension system is described. In such a model, vehicle speed, vehicle
body vertical acceleration, suspension dynamic deflection, the body vertical
acceleration and suspension dynamic deflection integrated feedback were used
respectively as the integrated feedback. The simulation results show that active
suspension Self-adapt Parameters Fuzzy-PID control with the body vertical
acceleration and suspension dynamic deflection as comprehensive feedback
parameters compared with passive suspension can improve the ride comfort and
driving stability in random excitation. |
Keywords: |
Vehicle, Active Suspension, Fuzzy PID Control, Ride Comfort |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
AN EYE FEATURE EXTRACTION SCHEME BASED ON HARRIS ALGORITHM |
Author: |
WENGDONG ZHAO, HUI QI, ZHIGUO XIAO |
Abstract: |
In order to improve the recognition rate of the facial recognition system and
the efficiency of the algorithm, a method based on Harris algorithm and changes
of threshold to extract eye contour automatically is proposed. This method uses
the idea of minimum extremal region. It makes use of the dynamic change of
threshold form low to high. After location the eye area initially, the location
of the eye pupil is located accurately by means of the method of gray statistic.
Then Harris algorithm is used to confirm the eye point position. Finally, the
characteristics of the eye contour are fitted. The experimental result shows
that this method can extract the feature of eye contour effectively and has the
better robustness about illumination and facial expression. |
Keywords: |
Eye Feature, Minimum Extremal Region, Harris Algorithm, Expression Recognition |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
HARMONIC RESPONSE ANALYSIS AND OPTIMIZATION OF HZS150 CONCRETE MIXING STATION |
Author: |
HU GAO, HUI LI, RUILIAN HOU |
Abstract: |
Through the research, design datas are provided for the enhancing product
performance and competitiveness. In the paper, based on problems that exist in
the construction of concrete mixing station, actual conditions of Tengzhou city
and research results in China United cement plant, concrete mixing station’s
overall structure is designed. And the structure’s harmonic response and dynamic
properties are analyzed based on its characteristics with HZS150 mixing station
of steel structure as the carrier; the overall structure is also optimized. |
Keywords: |
HZS150, Mixing Station, Harmonic, Power performance |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
STOPPING MODEL OF ELECTRON IN METAL BASED ON QUANTUM MECHANICS |
Author: |
SHUHUI SHI |
Abstract: |
With the improvement of computing capacity of computers, it is possible to
broaden new horizon in classical physics and use new models in analogue
simulation. Recently, it is possible that the detailed process of discussing
energy exchange between metal ion and electron in simulation of quantum
mechanics: low-energy electron radiation damage cascade can be simulated by
directly using the tight coupling method of time dependence, and ion heat
transmission with rapid movement in hundreds of atomic system can be calculated
by using time domain density functional theory (TDDFT). These simulations do not
evenly influenced by simplified approximate linear and electron, so a new
electronic stopping model can be added in some certain level. This paper started
from quantum mechanics explaining the basis of particle movement in atom,
respectively discussed the frictional drag in the process of the electron
motion, and the distribution of electron temperature model; finally, came to
some meaningful conclusions by simulating the particle movement through
respectively using the Ehrenfest Model, new model, Tocarlo and Victoria Model
with a simple viscous drag and density dependence (marked as Model C-V). |
Keywords: |
Quantum mechanics, Electron Motion, TDDFT, Ehrenfest Model, Model C-V; Metal
Electron Stopping |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
AN APPROACH FOR SUPERPIXELS USING UNIFORM SEGMENTATION AND RECIPROCAL NEAREST
NEIGHBORS CLUSTERING |
Author: |
JUNRUI LV |
Abstract: |
An approach using uniform segmentation and reciprocal nearest neighbors (RNN)
clustering is presented to generate super pixels. The method is made of two
steps. First, image is segmented to a large number of regular homogeneous small
regions which are similar to cell. Second, instead of the original image pixels,
small regions segmented is regarded as input of RNN clustering. Regional
diversity of average value normalized and variance form the new similarity
criterion. The area constraint filter limited the large size of superpixels
guarantees uniformity and compactness of super pixels. Finally, some regions in
a small range of distance are merged by RNN clustering. Results of experiment on
BSDS 500 dataset of natural images show the proposed method has advantages of
high boundary recall and low under segmentation error over SLIC super pixel on
small numbers super pixels. |
Keywords: |
Superpixel, Reciprocal Nearest Neighbours, K-means Clustering |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ANALYSIS ON PROBLEMS AND MOTIVATION OF POST 90S UNDERGRADUATES' ETIQUETTE |
Author: |
WEIHONG KONG |
Abstract: |
At present, the post 90s has become the main part of the college students. The
cultivation of excellent college students is not only to develop students'
professional skills, but also to cultivate them with etiquette. However, at
present the etiquette education in China for the post 90s college students is
deficient. In this thesis, based on the multivariate stepwise regression and the
Logistic regression in multivariate analysis, the multivariate stepwise
regression model and multi-level Logistic regression model are established. At
the same time, with the usage of SPSS and SAS software, this thesis carries on a
detailed analysis of the post 90s college students' etiquette problems and
influencing factors, and obtains a more scientific and objective result. |
Keywords: |
The Post 90s, Multivariate Analysis, Stepwise Multiple Regression, Logistic
Regression |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF A MULTIMEDIA DATABASE APPLICATION SYSTEM |
Author: |
CHANGHONG GUO |
Abstract: |
With the development of Internet technology, the number of the network users
becomes more and more, and computer networks has to deal with an amazing amount
of information every day. With database management system (DBMS) being used
widely, many people put up with the multimedia extensions, for example, the
multimedia technology which is based on the original vehicle. However, as for
the meaningful queries for multimedia data semantics, these extensions are
shortage of the methods to manage advanced indexing, content modeling and
multimedia programming library. In this context, this paper introduces the
mpeg-7 multimedia database system , pointing out that the innovative part of the
system is dependent on xml meg-7 standardized meta-data model , a new
mpeg-7indexing and query system , designing application libraries which have
query optimization and support internality and externality .Then it analyzes the
expansion of the Oracle system , validates and demonstrates the two real
multimedia applications that are applied in the field of audio recognition and
image retrieval. |
Keywords: |
Networking Technology, Multimedia database, Mpeg -7, Metadata Model |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
AN ANALYTIC HIERARCHY PROCESS BASED METHOD TO PROCESS MATHEMATICAL EXPRESSIONS |
Author: |
LEI GAO, SHULIN PAN, SHEN JIAO |
Abstract: |
Mathematical expressions exist in all kinds of documents. The automatic location
, recognition, analysis and understanding of mathematical expressions are
important. Recognition of mathematical expressions has been an attractive
problem for the pattern recognition community. When we meet the mathematical
expressions we can’t recognize them like the way of ordinary text recognitions.
We are in urgent need of a new method to process the mathematical expressions.
We should firstly recognize all the symbols which constitute the expressions and
define the composite structures and constrains and relationships of all the
symbols. And we also should distinguish the levels of hierarchy of every symbol
and the corresponding matrices and select the feature items and set the weight
numbers. Analytic hierarchy process is caught to build the expression model.
First, the hierarchy model is set up. Second, pairwise comparison matrix is set
up. Then, a series of computer process will be going on including computing the
weight vector and consistency checking and computing combination weight vector
and doing combination consistency checking and constructing the judgment matrix
and computing weight vectors. Experience has proved that this is a proper method
to process mathematics expressions. |
Keywords: |
Mathematical Expressions, Composite Structures, Levels of Hierarchy, Weight
Numbers |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
DENIAL-OF-SERVICE ATTACK ON PROGRAMMABLE ROUTER |
Author: |
YING HU, LEI ZHUANG |
Abstract: |
Because of the limitation of routers which use ASICs, there are more and more
programmable routers be adopted at present, it is a trend that the ASIC routers
will be replaced. Programmable router brings out flexibility, at the same time,
it brings out security problems. This paper introduced a type of network attack.
The attack sends appropriate length of packet, while application code could not
detect that the length of the packet is out of range, and the operation of
inserting header leads to buffer overflow, thereby, this forms denial-of-service
attack. |
Keywords: |
Programmable Router, Attack; Denial-of-Service, ASIC Router |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ERROR MODELING FOR STRUCTURAL DEFORMATIONS OF MULTI-AXIS SYSTEM BASED ON SVR |
Author: |
ZHENZHONG LIU, LIANYU ZHAO, ZHI BIAN |
Abstract: |
Multi-axis system is constituted by the mechanical links, and the link position
- load deformations are non-linear. That is an important factor to affect the
positioning accuracy of multi-axis system. As the nonlinear characteristics of
link position and load deformations, a novel method for modeling deformations of
loaded components based on SVR was presented. The 2R manipulator load
deformations error models were building by ε-support vector regression, and
according to the model, the trajectory error compensation was simulated. The
simulation of structure deformations models and motion error compensation of 2R
manipulator shows the SVR method could be used to build the deformations error
model effectively. |
Keywords: |
Multi-axis System, Structural Deformation, SVR |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
RESEARCH OF COMBINATORIAL OPTIMIZATION PROBLEM BASED ON GENETIC ANT COLONY
ALGORITHM |
Author: |
ZEYU SUN, ZHENPING LI |
Abstract: |
Ant colony algorithm of the traditional combinative optimization consumes a
large amount of time in the process of solving the optimization, which has a
tendency to partial optimization and slow convergence along with many redundant
useless iterative codes and low operation efficiency. A generic optimized ant
colony algorithm is thus proposed. This algorithm has the ability to fast global
search of generic algorithm along with parallelism and positive feedback
mechanism of ant algorithm. It determines the distribution of pheromone on the
path by means of generic algorithm changing selection operators, crossover
operators and mutation operators. Then ant algorithm is applied into feature
selection. Supporting vector machine classifiers is used to evaluate the
performance of the feedback sub-variorum. The pheromones are recombined through
changing the pheromone iteration, parameter selection and increasing the local
update of pheromones feature nodes. The simulation experiment shows that this
algorithm can improve the accuracy effectively, speed up the convergence,
improve global optimization, and promote the robustness and stability. |
Keywords: |
Ant Colony Algorithm, Combinatorial Optimization, Traveling Salesman Problem,
Pheromones, Genetic Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
BUS DEPARTURE INTERVAL OPTIMIZATION CONSIDERING CROWING COST |
Author: |
YONGSHENG QIAN , JINBAO LUO , JUNWEI ZENG |
Abstract: |
The paper mainly studies the optimizing mathematical model of bus departure
interval and its solution, and then work out the best bus departure interval.
This paper establishes the optimizing mathematical model of bus departure
interval, which takes crowding cost of passengers into account, including
passengers’ on-the-bus time cost, passengers’ crowding cost and bus company
cost. The paper uses the genetic algorithm to solve the problem. Reasonable bus
departure interval will obtained quickly by this method. It can provide
theoretical basis and technical support for bus enterprise scientific operation
decision and ensure the development of urban public transportation efficiently. |
Keywords: |
Public Transportation, Dynamic Dispatching, Departure Interval, Crowding Cost |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ENTROPY WEIGHT FUZZY SYNTHESIS EVALUATION BASED ON THE MEASUREMENT OF
ENVIRONMENTAL ACCOUNTING |
Author: |
LI LIU |
Abstract: |
There are many fuzzy phenomenons in the environmental accounting elements; this
paper provides a fuzzy synthesis evaluation model of entropy weight with the
consideration of entropy theory. The related indicators are computed through
fuzzy synthesis evaluation method and entropy theory, so the provided model can
provide a help for the measurement of environmental accounting. Finally, the
results of example prove the feasibility of this model in practice. |
Keywords: |
The Measurement of Environmental Accounting, Entropy, Entropy Weights, Fuzzy
Synthesis Evaluation |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
APPLICATION PATTERN OF RTI IN MDA-BASED HLA SIMULATION |
Author: |
RONGLI ZHANG |
Abstract: |
The combination of MDA and HLA is the need for HLA development. In this paper,
MDA-based HLA simulation Framework is put forwards. The Domain partition of such
framework is analyzed in detail. In that framework, RTI is regard as a sub
domain in the service domain, not a platform as usual. But it is more benefit
for the model reusability. At last, the integration method of RTI domain models
and application models is provided. This method is a new thought for the
application of MDA in HLA. |
Keywords: |
Model Driven Architecture, High Level Architecture, Run-Time |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
FORECAST SURFACE QUALITY OF ABRASIVE WATER JET CUTTING BASED ON NEURAL NETWORK |
Author: |
GUILIN YANG |
Abstract: |
In this study, firstly, the YL12 aluminum alloy is used as experimental
materials, then in the following experiments it is cut in JJ-I-type water jet
machines, and 1,000 group data are gotten by measurement. In each group data,
pressure, material thickness, surface roughness, abrasive flow and traversing
speed are included. Next, BP artificial neural network is established. In this
network, there are four inputs and one output. The inputs are pressure, material
thickness, surface roughness and abrasive flow rate; the output is traverse
speed. And then the BP artificial neural network is programmed by one toolbox of
Matlab. Using the former 1,000 group data, the BP artificial neural network is
trained, and its forecast function is obtained. Finally, the BP neural network
is tested to verify through using different thickness of aluminum alloy verifies
its forecast function. According to given pressure, material thickness,
roughness and abrasive flow, traverse speed is predicted. The YL12 aluminum
alloy is cut by the predicted traversing speed. The maximum error between the
prediction values of surface roughness and the actual values of the surface
roughness is 6.5%. |
Keywords: |
Abrasive Water Jet Cutting, BP Neural Network, Surface Quality, Forecast |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ANALYSIS ON COGNITIVE WIRELESS NETWORK MAC PROTOCOL ACCESS MODE BASED ON NS2 |
Author: |
HAIBO GAO, WENJUAN ZENG |
Abstract: |
Aiming at the same frequency interference, in the channel increased frequency
recognition function before the consultation and put forward based on the
frequency of perception multiple channel CC-MMAC agreement, simulation
verification protocol can effectively reduce the co-channel interference.
Channel quality changes with time by the effects of the decline and dispersion,
thus cause a certain impact to the network performance, therefore the Gauss
channel and the fading channel MAC protocol model are established; In study of
rate based on adaptive control, performance analysis take to the rate adaptation
leave C protocol, put forward based on the chance rate adaptive OAR DCA channel
protocol can improve the network throughput effectively. In the study of
multipath routing protocol based on AODV introduce next hop routing layer
thought to the MAC layer and proposed the establishment of a plurality of next
hop MNH a MMAC protocol; On improving AODV routing protocol establish
non-connection limit NDL AODV routing protocol and then make simulation analysis
and comparison to the NDL AODV+MNH-MMAC agreement with the original AODV+MMAC
protocol, it can be in the frequency resource more nervous conditions improve
the performance of the network. |
Keywords: |
NS2, MAC, Cognitive Wireless Network, Access Mode |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
AN AUTOMATED FRAMEWORK FOR AGENT BASED FEATURE SELECTION AND CLASSIFICATION |
Author: |
B.KALPANA, Dr V. SARAVANAN, Dr K VIVEKANANDHAN |
Abstract: |
The proposed framework for agent based feature selection and classification
system works with the help of software agents. These agents are rule based and
are able to guide the user in feature selection and classification. With number
of feature selection and classification algorithms available the framework paves
way for an integrated approach in feature selection and classification. Initial
results with partially implemented system prove to be promising in the field of
machine learning. The algorithm was used on a live web site data for three years
and the results were mined using the framework. The results give hope to show
that agent based decision making can be very useful for persons who do not have
idea of mining but are decision makers. |
Keywords: |
Feature Selection, Classification, Agent Based, Mining |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ENERGY MANAGEMENT SCHEME WITH LOAD BALANCING FOR PREEMPTIVE DYNAMIC SOURCE
ROUTING PROTOCOL FOR MANET |
Author: |
V.RAMESH, Dr.P.SUBBAIAH |
Abstract: |
Energy management issues are very important in the context of ad hoc networks.
Energy needs to be optimally utilized so that the nodes can perform their
functionality satisfactorily. MANETs are energy constrained as most ad hoc nodes
to day operate with limited battery power. So, it is important to minimize
energy consumption of the entire network in order to maximize the life time of
the network. In this paper we proposed load balancing method for the new
on-demand routing protocol (Preemptive DSR). As per the method, the PDSR selects
a route at any time based on the minimum energy availability of the routes and
the energy consumption per packet of the route at that time. The Simulation
results shows that PDSR has increased packet delivery ratio and decreased delay
compared with existing DSR. |
Keywords: |
Load Balancing, MANET, DSR, PDSR, Energy Management, Overhead Reduction |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
NUMERICAL SIMULATION OF GRANULAR MOTION BY PARTICLE FLOW CODE UNDER VIBRATION |
Author: |
JIHUI LIANG, LILI XIN |
Abstract: |
Internal friction and void ratio will change among granular particles under
vibration, and the size of void ratio directly affects strength of granular
media. To further study the effect of vibration parameters on granular
mechanical properties, discrete element method is used to simulate particles
motion in a vibrating rectangular case by PFC2D software and study the influence
of vibration frequency and amplitude on void ratio of particles under cyclic
loading. The results show that void ratio and axial stress of particles, which
are with the same change trend, decrease with increasing vibration time, and the
change process above is consistent with vibration compaction theory of internal
friction decreasing doctrine. |
Keywords: |
Vibration, Void ratio, PFC2D |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
TOWARDS AN EDUCATION BEHAVIORAL INTENTION MODEL FOR E-LEARNING SYSTEMS: AN
EXTENSION OF UTAUT |
Author: |
PENG-CHUN LIN, HSIN-KE LU, SHANG-CHIA LIU |
Abstract: |
E-learning has continued to gain the interest of enterprises and universities.
As an organization’s deployed e-learning systems grow, it is important for
researchers to evaluate the performance of those systems. With the growing trend
toward web-based learning systems, behavioral intention models (such as TAM, TPB,
TAM2 and UTAUT) seem particularly helpful to examine whether and why people use
e-learning technologies.
Prior research has presented various perspectives on individual difference,
which mostly focused on demographic variables, such as age, gender, education
and individual experience. It is not easy to clarify the cross-effectiveness and
redundancy among these demographic variables. In this study, learning and
teaching styles are regarded as cognitive individual differences in adopting
e-learning systems. Matching teaching and learning styles improves learning,
attitudes, behavior and motivation.
The proposed model, EduBIM (Education Behavioral Intention Model), focuses on
the degree of correspondence between students’ perceived learning and teaching
styles, which together directly moderate the intention and usage of e-learning
systems. This study enriches the UTAUT model by integrating cognitive individual
differences to synthesize the effects of demographic moderators. This model will
enable researchers to evaluate behavioral intention toward e-learning systems
and to propose further studies on system acceptance. |
Keywords: |
Learning Styles, Teaching Styles, Individual Difference, UTAUT, Behavioral
Intention Model, e-Learning System |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
COPULA FOR ESTIMATION OF DISTRIBUTION ALGORITHM BASED ON GOODNESS-OF-FIT TEST |
Author: |
JIA BAOJUN, WANG LIFANG, CUI ZHIHUA |
Abstract: |
Inappropriate probabilistic model in the Estimation of Distribution Algorithm
will reduce the quality of the solution, so goodness of fit test is introduced
into Estimation of Distribution Algorithm to improve it. By means of test to
select more suitable copula function under the statistical significance, that is
to select more appropriate probability model under the statistical significance
to solve the optimization problem. This modified Estimation of Distribution
Algorithm improves the performance of the algorithm. The experimental results
show the effectiveness of the proposed algorithm. |
Keywords: |
Estimation of Distribution Algorithm, Goodness of Fit, Probability Model, Copula |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
A SURVEY OF RESEARCHING ON MICRO-BLOGGING |
Author: |
LEINA JI, WEIJIANG LI, HUI DENG, FENG WANG |
Abstract: |
Micro-blogging is an emerging internet communication platform based on the
social relationships. It can be used to share, disseminate and obtain all kinds
of real-time updated information with about 140 words. Currently, micro-blogging
becomes more and more popular since users exploit it to achieve a wide variety
of social purposes. According to relevant public data, the earliest and most
famous micro-blogging -- Twitter already has 500 million registered users in the
world. Thus we survey the considerable literature on Twitter and show masses of
research theoretical results in the area obtained over the past few years. By
reading the paper, we hope authors can gain an in-depth understanding of the
current research focus and tendency related to the results of the Twitter.
Specifically, in this paper, we first introduce micro-blogging and its
difference with traditional blogging. Then we list several different research
directions about Twitter as well as their research purposes, methods and
conclusions. Finally, we show the gaps of previous researches and prospect the
future work of micro-blogging. |
Keywords: |
Twitter, Micro-blogging, Influence |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
DESIGN OF A TYPE OF CLEANING ROBOT WITH ULTRASONIC |
Author: |
ZELUN LI, ZHICHENG HUANG |
Abstract: |
A cleaning robot based on the ultrasonic principle is designed. With the single
chip microcomputer AT89C52 and ultrasonic sensors, the robot can achieve the
function of intelligent obstacle avoidance, automatic control and automatic
sweeping. In the cleaning robot, a rotating cylindrical brush is used in front
of the robot and it sweeps garbages into the dustbin in the process of movement,
and a moist mop is used at the back of the robot, and it can sweep the ground
when the robot is working. |
Keywords: |
Cleaning Robot, Ultrasonic sensors, obstacle avoidance, AT89C52 |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
A MODIFIED HONEY BEE MATING OPTIMIZATION ALGORITHM FOR MULTI-OBJECTIVE VOLTAGE
CONTROL OF DISTRIBUTED HYBRID WIND AND PV SYSTEMS |
Author: |
LIZHEN WU, XIAOHONG HAO |
Abstract: |
Recently, Distribute Generation sources (DGs) connected to the distribution
network has received increasing attention. The daily voltage control is one of
the most important schemes in distribution networks, which can be affected by
DGs. This paper presents a multi-objective Voltage optimizes control modeling,
including objectives that are the total cost of power generated by Wind Farms (WFs)
and Photovoltaic (PV) pants and the grid; the total electrical energy losses;
the total emission and the voltage deviations of the bus. Moreover, a new
optimization algorithm based on Modified Honey Bee Mating Optimization (MHBMO)
algorithm is proposed to determine the best operating point for the active power
generated by WFs and PVs, reactive power values of capacitors. In order to
overcome the shortcomings of original HBMO algorithm, the mating process is
improved. During the optimization process, the proposed algorithm finds a set of
non-dominated (Pareto) optimal solutions which are stored in an external memory
called repository. Also a fuzzy clustering technique is used to control the size
of the repository within the limits. Finally, a typical IEEE 32-bus distribution
test system is used to investigate the feasibility and effectiveness of the
proposed method. Simulation results illustrate the correctness and adaptability
of the proposed model and the MHBMO algorithm. |
Keywords: |
Multi-objective optimization, Modified Honey Bee Mating Optimization (MHBMO),
Distribute Generation sources (DGs), Wind Farm (WF), Photovoltaic (PV), Voltage
Control |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
AUTOMOTIVE WIMAX RADAR NETWORKS: THE FUTURE OF INTELLIGENT TRANSPORTATION
SYSTEMS |
Author: |
NIRMALENDU BIKAS SINHA, SAMIRAN PRAMANIK, CHADAN KUMAR SARKAR, RABINDRANATH BERA |
Abstract: |
This paper addresses the developmental efforts towards the realization of
vehicle to vehicle cooperative collision warning system for ITS. In this
intelligent system either the vehicle or the infrastructure can communicate its
location or other information to surrounding vehicles or nearby infrastructure
for its implications in cooperative driving and vehicle safety. Commercial
vehicles with radar system operating in ‘SKIN’ or ‘TRANSPONDER’ mode is used for
this intelligent system. In the ‘SKIN’ mode of operation only one vehicle is
associated with the radar whereas in the ‘TRANSPONDER’ mode both the vehicles
will be fitted with the radar and communication system. Vehicles will be
‘friends’ to each other by integrating the local radar mounted on each vehicle
with vehicular communication. The goals of this paper are twofold: Providing an
engineering argument of possible functional architectures of such systems and
presenting a plausible example of the proposed future-trajectory-based design,
which estimates and communicates vehicle positions, predicts and processes the
future trajectories for collision and decision making using WiMAX waveforms.
However for real time implementation of the system, a careful selection of the
latest high speed wireless technology WiMAX is to be embedded with the SKIN or
TRANSPONDER mode of radar operation for safe communication purposes in order to
avoid collision on road. The authors have developed automotive WiMAX radar
networks for SKIN and TRANSPONDER mode utilizing the VLSI based advanced
development platforms. This paper will highlight the achievements of the model
to develop an intelligent transport system. |
Keywords: |
WiMAX, ITS, TCF, FCF, Skin Mode And Transponder Mode |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
RESEARCH ON THE COMBINING OF COMPRESSED SENSING AND NETWORK CODING IN WIRELESS
SENSOR NETWORK |
Author: |
JIPING XIONG, JIAN ZHAO, LIFENG XUAN |
Abstract: |
Wireless sensor networks (WSN) are faced with the problem that network size is
inversely proportional to network lifetime because the number of data packets
transmitted is equal to the number of communication nodes for recovering
original signal. Compressed sensing(CS) compresses and samples in sparse domain
of network source to reduce the amount of transmitted data to accurately
reconstruct original signal which is far less than the number of network nodes,
and thereby reducing total energy consumption of network. Network coding (NC) is
applied to intermediate node to encode data before forwarding it rather than
simply store and forward it, achieving balance of network load. This paper
introduces research status of two emerging technologies, proposing combined
method by researching their inner contact and applying them to WSN to expand
network size while reducing energy consumption to prolong life of network.
Furthermore, we conclude our work and point out future research directions. |
Keywords: |
Compressed Sensing (CS), Network Coding (NC), Wireless Sensor Network (WSN) |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ALGORITHM-IRRELEVANT PRIVACY PROTECTION METHOD BASED ON RANDOMIZATION |
Author: |
JING GUO |
Abstract: |
Privacy preserving classification mining is one of the fast-growing subareas of
data mining. The algorithm-related methods of privacy-preserving are designed
for particular classification algorithm and couldn’t be used in other
classification algorithms. To solve this problem, it proposes a new
algorithm-irrelevant privacy protection method based on randomization. This
method generates and opens a new data set that is different from the original
data set independently as the perturbed data. The perturbed data and the
original data have the same distribution. Users get the models of the original
data from the perturbed data. Experimental results demonstrate that the
classification algorithms can be used on the perturbed data directly. And this
method reduces the privacy data disclosure risk more effectively. |
Keywords: |
Privacy Protection, Data Mining, Classification, Randomization,
Algorithm-Irrelevant |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
SPOKEN DOCUMENT CLASSIFICATION BASED ON LSH |
Author: |
ZHANG LEI, XIE SHOUZHI, HE XUEWEN |
Abstract: |
We present a novel scheme of spoken document classification based on locality
sensitive hash because of its ability of solving the approximate near neighbor
search in high dimensional spaces. In speech-text conversion stage, although
lattice can provide multi-hypothesis during speech recognition, it is too
complex to extract proper word information. Confusion network is adopted to
improve word recognition rate while keeping the corresponding posterior
probability. In vector space model, modified tfidf on posterior probability is
proposed to handle the negative effects of the words with very low posterior
probability. Furthermore, after generating the indexing structure based on
locality sensitive hash, 1-nearest and N-nearest schemes are adopted in
classifier. To spare the execution time, fast locality sensitive hash is
conducted. Experiments on the data from four kinds of video programs show the
effectiveness of proposed scheme. |
Keywords: |
Spoken Document Classification, Local Sensitive Hash, Confusion Network, Lattice |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION |
Author: |
FENG YONG, DANG XIAO-WAN, XU HONG-YAN |
Abstract: |
A great amount of duplicated entities exist in the heterogeneous data sources of
Web. How to identify these entities is the most important prerequisite for
pattern matching and data integration. To solve the deficiency of current entity
recognition methods, such as low automatic level and poor adaptability, Deep Web
entity recognition method based on BP neural network is proposed in this paper.
To make full use of the characteristic of autonomic learning of BP neural
network, the similarities of semantic blocks are used as the input of BP neural
network. It obtains correct entity recognition model through training, and
accomplishes the target of automated entity recognition of heterogeneous data
sources. Finally, the feasibility of the proposed method is verified via
experiments. The proposed method can reduce manual intervention and promote the
efficiency and the accuracy of entity recognition simultaneously. |
Keywords: |
Deep Web; BP Neural Network; Entities Identify; Similarity |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
AN IMPROVED COLLABORATIVE RECOMMENDATION METHOD BASED ON SNA |
Author: |
XU HONG-YAN, LI JUN-PING, FENG YONG |
Abstract: |
Collaborative recommendation is widely used in e-commerce personalized service,
but due to data sparsity and cold start, the existing method cannot give precise
results. To improve the recommendation precision, this paper gives a new
collaborative recommendation method based on SNA. The proposed method uses
social network analysis( SNA) technical to analyze the trust between the users,
expresses it as trust value to fill the users—items matrix, and the user
similarity calculation has been improved. Finally, an experiment is used to
verify the validation of the proposed method. It is proved that it can better
solve the problem of data sparsity and cold start. |
Keywords: |
Social Network; Social Network Analysis (SNA); Similarity;
Trust Value; Collaborative Recommendation |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
DELAY ANALYSIS OF TRAIN ONBOARD DETECTION SENSOR NETWORK |
Author: |
DEQIANG HE, XIAOYANG YAO, GUOLIANG HE, HAO LEI |
Abstract: |
Recent research and development in the area of next generation train backbones
have created an incentive towards the replacement of legacy interconnecting data
communication architectures with newer and more innovative backbones. The
onboard Ethernet technology has been applied in the train onboard detection
sensor network gradually. Network delay is an important factor of detection
sensor network quality. This paper analyzes the affection to the network delay
of different network topology structure. In addition, the communication network
model of onboard detection sensor network based on Ethernet has been constructed
by the OPNET Network Modeler. According to the simulation data to analyze the
network delay, link load and end-to-end throughput of bus network topology and
ring network topology. This will provide technology reference for the onboard
detection sensor network and train communication network topology structure
optimization. |
Keywords: |
Detection sensor network, Delay analysis, Train Communication Network, Ethernet |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
RESEARCH ON CAN BUS AUTOMATED TEST ENVIRONMENT |
Author: |
FENG LUO, CHU LIU |
Abstract: |
Test and validation are so important that each type of automotive ECU
(Electronic Control Unit) should be qualified before entering the market. In
this article, a fully scaled and customized automotive CAN Bus test environment
is introduced, including a test hardware, a driver and its software platform, in
which a test kernel is implemented, which is able to parse CAN databases and
automatically executes test cases generated by the test case generator.
Programming for a specific test case is also supported. Log files are created
during the test execution to log test steps as well as CAN Bus messages, which
are used by the test report generator to generate the final test report.
Problems are detected during the whole test process and reproduced later in the
laboratory environment, which enhances the debugging process. With the help of
the testing environment, the quality assurance of the ECU can be better
achieved. |
Keywords: |
CAN Bus, Automated Testing, Database Engine, Test Cases |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
RESEARCH ON THE CHINESE SEGMENTATION TECHNOLOGY |
Author: |
FENG HONGYU, YAN SHITAO |
Abstract: |
Abstract: The Chinese segmentation technology is the basis and key of Chinese
information processing. By researching on this technology, this paper indicates
that the method based on dictionary and statistics are much mature, but the
unregistered word recognition is the main problem in this field. Thus, this
paper lays a foundation and sets the directional work for its later development. |
Keywords: |
Chinese Segmentation, Corpus, Evaluation |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
RISK ASSESSMENT MODEL BASED ON MOBILE AGENT |
Author: |
WANG YING, PENG XINGUANG |
Abstract: |
With the rapid development of Internet and communication technology, network
information security has become the focus of people’s attention. Generally
speaking, attackers and virus intrude into the target system by utilizing
security vulnerabilities. In this paper, combined Mobile Agent theory with risk
assessment technology, a kind of risk assessment model based on Mobile Agent has
been brought forward. In order to get the target system’s vulnerabilities,
Mobile Agent is used to scan the system according to user’s particular setting
of assessment rules. And then the risk grade of target system is given out for
providing user particular assessment result and security advice. On the base of
model design, an experiment of Mobile Agent risk assessment model is designed.
In the process of experiment, the target system is scanned according to facility
condition, and the function of Mobile Agent risk assessment model is primarily
implemented. |
Keywords: |
Vulnerability Scan, Risk Assessment, Mobile Agent |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
AN ENHANCED EARLY DETECTION METHOD FOR ALL ZERO BLOCK IN H.264 |
Author: |
CONG-DAO HAN |
Abstract: |
Transformation and quantization are important steps for changing spatial
residual data into frequency signal component. All-zero block (AZB) detection is
an efficient means to reduce calculation times of transformation and
quantization. In order to raise the efficiency of all-zero block detection and
avoid error judgment, an enhanced all-zero block detection approach is proposed
by using the base matrixes in this paper. Firstly, the base matrixes of integer
transformation coefficients are analyzed. It can be found that all elements in
the same sub-area are equal or inverse to each other. Considering this
distribution property, we can deal with the elements within the same sub-area
together and deduce a looser judgment criterion for all-zero block.
Consequently, a larger proportion of all-zero blocks can be detected in advance.
The experiments results demonstrate that the proposed algorithm outperforms
other methods in the detection rate. |
Keywords: |
All-Zero Block (AZB), Transformation and Quantization, Base Matrix, Integer
Transform |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
THE ALGORITHM OF REGION POLE PLACEMENT ON THE SAFETY INTERVAL |
Author: |
FU-ZHONG WANG, YI-KE GUO |
Abstract: |
This paper is concerned with the design problem for linear system. For a class
of linear systems relation to the sector region pole placement, we put forward
the concept of gain fault safety interval for each actuator channel. By using
mathematical model of gain fault with single actuator channel, we present the
algorithm of the actuator gain fault safety interval in the representative
sector pole placement, we also analyze the impact on the stability and the
dynamic performance of the system with each actuator channel, and provide an
important theory evidence for the designer to design and place on the number of
hardware. A practical example is given to illustrate the algorithm procedures
and the approach’s effectiveness. |
Keywords: |
Safety Interval, Pole Placement, Effectiveness, Actuator Fault |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
THE APPEARANCE AND CONNOTATION: RESEARCH ON APPLICATION OF 3DSMAX IN THE
ARCHITECTURAL DESIGN TEACHING |
Author: |
TANG HONG,SHI YAN-HONG |
Abstract: |
With the social development and the advancement of technology, the rendering of
real performance is becoming increasingly needed in the construction field.
However, the traditional techniques is difficult to perfect the performance of
the designer's intentions. This article introduced 3DSMAX software into
architectural design teaching, discussing the origin of 3DSMAX software,
creating process and application skills and so on. It also discussed how to
enable students to quickly and easily master the 3DSMAX software to perfectly
reflect the designer’s design idea and true intentions through the software and
thus to enhance the overall performance skills of students. |
Keywords: |
3DSMAX, Architectural Design, Architectural Renderings, Performance Skills |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
STUDY ON MCM TEST SCHEME USING ADAPTIVE GENETIC ALGORITHM AND PARTICLE SWARM
OPTIMIZATION ALGORITHM |
Author: |
CHEN LEI |
Abstract: |
The paper presents a new interconnect test generation scheme based on adaptive
genetic algorithm (AGA) and particle swarm optimization algorithm (PSO) for
Multi-chip Module (MCM) applications. By combing the characteristics of
interconnect test and constructing particle expression of test generation, the
velocity updating equation and position updating equation of discrete PSO are
presented in this paper. AGA generates the initial candidate test vectors in
this scheme. In order to improve the fault coverage of the test vector, PSO is
employed to evolve the candidates generated by AGA. The international standard
MCM benchmark circuit was used to verify the scheme. Comparing with not only the
evolutionary algorithms, but also the deterministic algorithms, simulation
results demonstrate that the hybrid scheme can achieve high fault coverage,
short CPU time and compact test set, which shows that it is a novel optimized
method deserving research. |
Keywords: |
Adaptive Genetic Algorithm (AGA), Particle swarm optimization (PSO), Multi-chip
Module (MCM) |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
CIRCUIT INTEGRATED DESIGN AND ANALYSIS TECHNOLOGY FOR PERFORMANCE AND
RELIABILITY |
Author: |
GANG ZHAO, GUANGYAN ZHAO, YUFENG SUN |
Abstract: |
Integrated design and analysis technology for performance and reliability is a
highlight issue in the field of reliability. A technical framework for the
integration of performance and reliability of electronic products was built up.
The framework integrates multiple performance analysis tools and reliability
analysis tools and realizes the integrated design and analysis of performance
and reliability, centering on performance simulation and on the basis of
data-share. In order to realize the integrated capability, the flow and data
relationship of integration of performance and reliability of electronic
products were investigated, and then the integration platform was established.
Finally, a case was analyzed to validate the function of the platform. It could
take the circuit fault simulation, FMEA, reliability prediction, derating
design, testability prediction etc. during the process of circuit performance
design. |
Keywords: |
Integration, Reliability, Performance, Platform, Circuit |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
SIMULATION OF AVIONICS ELECTROMAGNETIC SHIELDING EFFECTIVENESS BASED ON MODAL
MOM |
Author: |
YAJUN XU |
Abstract: |
In this paper, an efficient technique based on modal method of moments (MoM) is
presented, the influence of apertures’ shape and calculation point of SE on
electromagnetic shielding effectiveness has been studied. A very good agreement
among the simulation results of the proposed technique, results available in the
literature and experimental results is observed. The results of the present
analysis show that electric field SE is seriously affected by calculation points
and aperture shape. These useful results gained in this paper have important
practical significance to improving the electric field shielding effectiveness
of shielding cavity. |
Keywords: |
Rectangular Enclosure, Apertures, SE, Mom, Green’s Function |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ENHANCING USER INTERACTION IN A NUTRITIONAL EDUCATIONAL PACKAGE FOR THE ELDERLY
USING 3D ANIMATION |
Author: |
NAZLENA MOHAMAD ALI, AZIR REZHA NORIZAN, SUZANA SHAHAR |
Abstract: |
Most of the elderly have difficulties with computer technology. They lack
computer literacy, and at the same time, have physiological changes that are
associated with impaired perception, cognition, and other social aspects. These
limitations can be lessened using multimedia elements to assist in their
interaction with computers. One of these multimedia elements is 3D animation. We
have incorporated 3D animation into a digital educational nutritional package,
which was designed following the design guidelines for older adults, for better
interface user interaction. An experiment was carried out to measure user
acceptance; and a comparison was made between the digital package and a booklet.
Questionnaires were distributed to six elderly subjects, aged 60 to 75 years
old. Overall, the results showed that the 3D animation was helpful in
facilitating an understanding of the content. The comparison experiment involved
ten respondents that were divided into the experiment (digital package) and
control (booklet) groups. Each group was given a task and the completion time
for each was recorded. The findings indicate that the content exploration using
the digital package was faster than using the traditional booklet. Of the
respondents, 60% from the experiment group were able to access the content in
less than two minutes; compared to 40% from the control group. These initial
findings indicate the possibility of using a digital education package, and as
such, should be explored further with larger samples and modules, in order to
increase the nutritional and health knowledge and awareness among the elderly. |
Keywords: |
Interface Design, Elderly, Nutrition Education |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
QUERY MANAGEMENT IN DATA WAREHOUSE USING VIRTUAL MACHINE FAULT TOLERANT RESOURCE
SCHEDULING ALGORITHM |
Author: |
S. KRISHNAVENI, M. HEMALATHA |
Abstract: |
Multi-stage processing occurred in distributed data warehouse. Many joints and
splits are required at the time of submitting queries. Scheduling algorithms are
used to resolve these issues. Reducing the processing time and cost are common
concerns in scheduling. By this way the available resources are used to
accomplish the task with quick manner. In this paper, we propose Virtual Machine
Fault Tolerance Resource Scheduling (VMFTRS) Algorithm for scheduling the
resources. Processing time, memory size and Replication Metric are taken as
performance metrics and each one calculated depending upon the given query.
Performance results show that the proposed VMFTRS algorithm gives better result
than other existing algorithms. It is also adaptable for all distributed data
warehouse systems. |
Keywords: |
Data Warehouse, Resource Scheduling (RS), Research On Novel
Dynamic Resource Management (RNDRM), New Resource Mechanism With Negotiate
Solution (NRMNS), Virtual Computing Grid Using Resource Pooling (VCGRP), Virtual
Machine Fault Tolerant Resource Scheduling (VMFTRS) |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
HYBRIDIZING RELIEF, MRMR FILTERS AND GA WRAPPER APPROACHES FOR GENE SELECTION |
Author: |
SALAM SALAMEH SHREEM, SALWANI ABDULLAH, MOHD ZAKREE AHMAD NAZRI, MALEK ALZAQEBAH |
Abstract: |
Gene expression data comprises a huge number of genes but have only few samples
that can be used to address supervised classification problems. This paper is
aimed at identifying a small set of genes, to efficiently distinguish various
types of biological sample; hence we have proposed a three-stage of gene
selection algorithm for genomic data. The proposed approach combines ReliefF,
mRMR (Minimum Redundancy Maximum Relevance) and GA (Genetic Algorithm) coded as
(R-m-GA). In the first stage, the candidate gene set is identified by applying
the ReliefF. While, the second minimizes the redundancy with the help of mRMR
method, which facilitates the selection of effectual gene subset from the
candidate set. In the third stage, GA with classifier (used as a fitness
function by the GA) is applied to choose the most discriminating genes. The
proposed method is validated on the tumor datasets such as: CNS, DLBCL and
Prostate cancer, using IB1 classifier. The comparative analysis of the R-m-GA
against GA and ReliefF-GA has revealed that the proposed method is capable of
finding the smallest gene subset that offers the highest classification
accuracy. |
Keywords: |
Genetic Algorithm, Gene selection, Microarray datasets, mRMR, Relief |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ANALYSIS OF DIFFERENT ACTIVATION FUNCTIONS USING BACK PROPAGATION NEURAL
NETWORKS |
Author: |
P.SIBI, S.ALLWYN JONES, P.SIDDARTH |
Abstract: |
The Back propagation algorithm allows multilayer feed forward neural networks to
learn input/output mappings from training samples. Back propagation networks
adapt itself to learn the relationship between the set of example patterns, and
could be able to apply the same relationship to new input patterns. The network
should be able to focus on the features of an arbitrary input. The activation
function is used to transform the activation level of a unit (neuron) into an
output signal. There are a number of common activation functions in use with
artificial neural networks (ANN). Our paper aims to perform analysis of the
different activation functions and provide a benchmark of it. The purpose is to
figure out the optimal activation function for a problem. |
Keywords: |
Artificial Neural Network (ANN), Back Propagation Network (BPN), Activation
Function |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
ANTENNA EFFECTS ON PHASED ARRAY MIMO RADAR FOR TARGET TRACKING |
Author: |
SAMIRAN PRAMANIK, NIRMALENDU BIKAS SINHA, CHADAN KUMAR SARKAR |
Abstract: |
Multiple-input multiple-output (MIMO) radar can achieve improved localization
performance by employing a coherent processing approach with proper antenna
positioning. Coherent processing, however, entails the challenge of ensuring
phase coherence of the carrier signals from different distributed radar
elements. In recent years, studies have shown how the performances of
conventional phased-array radar can be improved by using the same approach. In
this work, we aim to address such a challenge by providing a systematic
treatment of the phase synchronization problem in coherent MIMO radar systems.
We propose and study in coherent MIMO radar and phase array radar with coherent
beam for the effectiveness of the above problems. The results show that at high
and low SNR values phase array radar with coherent beam provides great
improvements of target detection performance over coherent MIMO radar.
Simulation results are presented to validate our theoretical analysis. |
Keywords: |
MIMO, Phased array, Coherent, Radar, SNR |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
Title: |
PROBABILITY DETECTION FOR STATISTICAL MIMO RADAR: ALGORITHMS AND THEIR ANALYSIS |
Author: |
SAMIRAN PRAMANIK, NIRMALENDU BIKAS SINHA, CHADAN KUMAR SARKAR |
Abstract: |
Multiple-input–multiple-output (MIMO) radar is an emerging technology that has
significant potential for advancing the state-of-the-art of modern radar. This
is a multiple antenna radar system capable of transmitting arbitrary waveform
from each antenna element. Like MIMO communications, MIMO radar offers a new
paradigm for signal processing research. It’s significant potentials for fading
mitigation, resolution enhancement, and interference and jamming suppression,
which can result in significantly improved target detection, parameter
estimation, target tracking and recognition performance. To identify a target in
statistical MIMO radar system multiple antennas, not closely placed, for
transmission and reception is used. This paper introduces the signal processing
issued in statistical MIMO radar and coherent MIMO radar for improved target
detection and recognition performance. The fundamental difference between
statistical MIMO and other radar array systems is that the latter seek to
maximize the coherent processing gain, while the former capitalizes on the
diversity of target scattering to improve radar performance. Compared to
coherent MIMO radar, statistical MIMO radar can offer better parameter
identification , higher resolution which allows for much flexibility for
transmit beam-pattern design and waveform optimization. This paper focuses on
the application of the target spatial diversity to improve detection
performance. The optimal detector in the Neyman-Pearson sense is developed and
analyzed for the statistical MIMO radar in case of stationary target. The
performance improvement achieved by the use of angular diversity in statistical
MIMO radar is investigated. The results show that at high and low SNR values
statistical MIMO radar provides great improvements of target detection
performance over coherent MIMO radar. Finally, a number of numerical examples
demonstrated for the effectiveness of the proposed approaches. Therefore,
statistical MIMO radar can be applied to enhance radar resolution by allowing
the measurement of one scatter at a time. |
Keywords: |
MIMO, Statistical, Coherent, Radar, Probability Detection, SNR |
Source: |
Journal of Theoretical and Applied Information Technology
Vol. 47. No. 3 -- January 2013 |
Full
Text |
|
|
|