|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
February 2013 | Vol. 48 No.1 |
Title: |
ASSOCIATION RULE MINING BASED VIDEO CLASSIFIER WITH LATE ACCEPTANCE HILL
CLIMBING APPROACH |
Author: |
V.VIJAYAKUMAR, R.NEDUNCHEZHIAN |
Abstract: |
Video classification is an essential step towards video perceptive. In recent
years, the concept of utilizing association rules for classification emerged.
This approach is more efficient and accurate than traditional techniques.
Associative classifier integrates two data mining tasks such as association rule
discovery and classification, to build a classifier for the purpose of
prediction. The accuracy of classification will be influenced by the choice of
appropriate values for whatever thresholds are used. In this paper, we present
an effective video classification technique which employs the association rule
mining and examine the effect of varying the support and confidence thresholds
on the accuracy of the proposed algorithm. Instead of two stage associative
classification method, Total from Partial Classification technique integrates
the association rule discovery and classification in a single processing step to
reduce the cost of pruning. TFPC uses two enumeration trees such as Partial
support tree (P-Tree) and Total support tree (T-Tree). TFPC algorithm first
loads the input data into the P-tree structure to reduce the storage
requirements. In the second stage, T-tree is used to hold the information
regarding to frequent items. We proposed Late Acceptance Hill-Climbing (LAHC)
method is to find the effective support and confidence coupled with TFPC. The
LAHC method accepts the candidates with cost function better than the cost
solution which were the current several iterations before. Experimental results
show that the performance of classification accuracy can be significantly
improved. |
Keywords: |
Video Clustering, Video Classifier, Late Acceptance Hill-Climbing, Rule Based
Classification |
Source: |
Journal of Theoretical and Applied Information Technology
pp 001 - 008 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN EFFICIENT PEOPLE TRACKING SYSTEM USING THE FFT-CORRELATION AND OPTIMIZED SAD |
Author: |
ABDERRAHMANE EZZAHOUT, MOULAY YOUSSEF HADI, RACHID OULAD HAJ THAMI |
Abstract: |
The research questions which this study addresses are resumed in obtaining the
picks of Optimized SAD and FFT-Correlation function. These values allow us to
detect and track the blocs corresponding to the moving person. This
Bloc-Matching system of our tracked bloc 8x8, simplify the process of detecting
and tracking all the representative matrix of foreground. Practically, in this
correspondence, we propose an implementation technique for detection and
tracking system which detect and track people’s in motion using a fixed single
camera. These bi-techniques simplify the process of people tracking and give a
new way for people tracking. Moreover, in this system we choose to detect moving
people with the more robust algorithm (Gaussian Mixture Model) in term of
misclassified pixels. Thereafter, we track a bloc 8x8 from the bounding box
containing the moving person by returning the position of the similar bloc in
the next frame. This bloc position is detected by maximization of the Fast
Fourier Transform-Correlation (FFT-Corr) and minimizing the error: optimized Sum
of Absolute Difference (OSAD) between the bloc reference and the similar bloc. |
Keywords: |
Moving People Detection, Mog, FFT-Correlation, Optimized-SAD, Bounding Box |
Source: |
Journal of Theoretical and Applied Information Technology
pp 009 - 014 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
AUTOMATIC GENERATION OF BPEL PROCESSES FROM NATURAL LANGUAGE REQUIREMENT |
Author: |
DENG NA, LI DESHENG |
Abstract: |
Software’s final success depends seriously on its requirement description.
Nowadays, natural language is still the main description language of software
requirement documents. In order to minimize the comprehension differences
between users and developers about requirement, if natural language described
requirement could be automatically transformed to BPEL processes, users and
developers would reach a consensus rapidly and BPEL’s development would be
accelerated. In this paper, we propose an automatic generation method from
natural language requirement description to BPEL processes. Firstly, requirement
description is restricted and formalized; then, for those sentences with the
prefix [RECEIVE] and [INVOKE], the relevant web services highly semantically
matched are found out from the set of WSDLs; finally, the whole corresponding
BPEL process is assembled from bottom to up. We provide a prototype to indicate
our method’s validity. |
Keywords: |
Requirement Description, BPEL, Natural Language, Semantic, Web Services, WordNet |
Source: |
Journal of Theoretical and Applied Information Technology
pp 015 - 022 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
APPLICATION FAST BI-DIRECTIONAL MATCH FOR IN EAR RECOGNITION BASED ON SIFT
FEATURES |
Author: |
MA CHI, ZHU YONG YONG, TIAN YING |
Abstract: |
The human ear is unique and stability and it has broad application prospects in
the field of identity verification. Ear image matching is an important part of
the ear recognition, has gained widely research. SIFT(Scale invariant feature
transform) descriptor is one of the most effective local features that is used
for scale, rotation and illumination invariant. In this paper a fast
bi-directional matching algorithm based on SIFT is proposed. Firstly the
single-feature points and multi-feature points in two images are extracted, then
match the single-feature points and multi-feature points respectively by using
the BBF(Best Bin First)-based bi-directional matching algorithm. The integrated
matching pairs are the final matches. The experimental results show that the
proposed algorithm can reduce mismatch probability and decrease the matching
time. |
Keywords: |
Ear Image Matching; Invariant Features; SIFT |
Source: |
Journal of Theoretical and Applied Information Technology
pp 023 - 028 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
ZOT-BINARY: A NEW NUMBERING SYSTEM WITH AN APPLICATION ON BIG-INTEGER
MULTIPLICATION |
Author: |
SHAHRAM JAHANI, AZMAN SAMSUDIN |
Abstract: |
In this paper we present a new numbering system with an efficient application on
Big-Integer multiplication. The paper starts with an introduction to a new
redundant positional numbering system known as “Big-Digit Numbering System” (BDNS).
With BDNS, a new non-redundant positional numbering system known as ZOT-Binary
is proposed. ZOT-Binary has a low Hamming weight with an average of 23.8%
nonzero symbols, and therefore is highly suitable for Big-Integer calculation,
especially for Big-Integer multiplication. To harvest such benefit from the ZOT-Binary
representation, a new Big-Integer multiplication algorithm, ZOT-CM, which is
based on the Classical multiplication algorithm, is proposed. Our result shows
that when compared with the Classical multiplication algorithm, ZOT-CM is about
12 times faster for multiplying 128 bits numbers and at least 16 times faster
for multiplying numbers that are bigger than 32,000 bits long. Our result also
shows that ZOT-CM is about 20 to 3 times faster than Karatsuba multiplication
algorithm, for multiplying numbers that are ranging from 128 bits to 32,000 bits
long. From the findings, it is clear that ZOT-CM is a valuable addition to
Big-Integer multiplication algorithm, and it is also believed that ZOT-Binary
representation can benefit many other Big-Integer calculations. |
Keywords: |
Numbering system, Big-Integer multiplication, Cryptography, Hamming weight |
Source: |
Journal of Theoretical and Applied Information Technology
pp 029 - 040 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
A NOVEL ALGORITHM FOR THE DETERMINATION OF DELAY TIME BASED ON MUTUAL
INFORMATION |
Author: |
PENG HE, DE-YUN ZHOU, YING ZHOU, JIYU |
Abstract: |
We analyze different methods for the determination of delay time in state space
reconstruction. Although the method of mutual information is more accurate, its
computational process is quite cumbersome and time-consuming. Therefore, based
on the pseudo-periodicity of chaotic attractor, we put forward a new algorithm
to refine delay time step by step using mutual information. The reliability of
this algorithm is proved based on the numerical experiment of Rössler and Lorenz
systems. |
Keywords: |
State space reconstruction, Time series, Delay time, Mutual information,
Pseudo-periodicity |
Source: |
Journal of Theoretical and Applied Information Technology
pp 041 - 044 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
APPLICATION OF MULTI OBJECTIVE TECHNIQUE TO MULTI-DISCIPLINARY OPTIMAL POWER
FLOW PROBLEM USING REFINED FORAGING ALGORITHMS |
Author: |
S. JAGANATHAN, S. PALANISWAMI |
Abstract: |
The Optimal Power Flow (OPF) is important problem in electric power systems and
OPF is a static, non –linear optimization problem of determining the optimal
settings of control variables for minimization the cost of generation including
sine components, piecewise quadratic cost curve, transmission losses, voltage
profile optimization and power flow deviations are proposed in this paper. The
OPF problem is not only comprised of cost of generation and includes
multidisciplinary comprehensive model. It is an important problem in power
systems operation due to operational security considerations and even a small
savings per hour translates into large annual saving. A Refined Bacterial
Foraging Algorithm [RBFA] is introduced in this paper to solve multi objective
optimization problems. The multiobjective is proven and is well in power system
problems. The objective of this paper is to introduce RBFA to solve multi
disciplinary Optimal Power Flow [MDOPF] based on multi-objective optimization.
The new multiobjective BFA is presented for the solution of the comprehensive
model for MDOPF. The algorithm is then demonstrated on IEEE 30 bus system and
test results provided on the standard system reported in the literature clearly
indicates that this method is efficient. The RBFA is motivated by the foraging
behavior of the E. coli bacteria and the biological aspects of the bacterial
foraging strategies and is well in multi disciplinary high dimensional problems
and multiple objective optimization problems. The solution of the MDOPF problem,
with a simultaneous and adequate consideration of all its facets with reasonable
computing time, is still to be achieved. |
Keywords: |
Refined Bacterial Foraging Algorithm, Multi-Disciplinary Optimal Power Flow,
Quadratic curve with sine components, Piecewise quadratic curve, Voltage profile
optimization and Active power loss |
Source: |
Journal of Theoretical and Applied Information Technology
pp 045 - 059 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
A PSO-BASED NEURAL NETWORK ENSEMBLE WITH THE APPLICATION OF FLAME COMBUSTION
DIAGNOSIS |
Author: |
LI DESHENG, HE QIAN |
Abstract: |
In thermal power station, pulverized coal furnace is widely used. It requires
the chamber of furnace holding steady uniform flame, and ensureing that strong
full combustion. This study has developed a neural network ensemble model to
perform the judgement of combustion diagnosis based on the spectral distribution
of the light intensity pulse signal of the flame. Compared with the single
neural network, the two-stage integrated model of neural network ensemble, based
on Bootstrap and electoral cooperative particle swarm optimization, can found
the internal relations among inputs and outputs according to the learning of
internal rules, and weaken the human factors in the weights determination. Based
on the experiments on real scenario, the results show that the proposed model
outperforms all the compared ones in perspective of the convergence speed of
total error, and also obtains stable classification effect. |
Keywords: |
Particle Swarm Optimization (PSO), Swarm Intelligence (SI), Artifical Neural
Network Ensembles (ANNE), Flame Combustion Diagnosis |
Source: |
Journal of Theoretical and Applied Information Technology
pp 060 - 066 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
BINARY FUSION PROCESS TO THE CIPHERING SYSTEM “SEC EXTENSION TO BINARY BLOCKS” |
Author: |
ZAKARIA KADDOURI, FOUZIA OMARY, ABDOLLAH ABOUCHOUAR |
Abstract: |
In this paper, we present a new symmetrical encryption system based on the
binary extension of the symmetric encryption system SEC, which transforms the
encryption issue into a combinatorial optimization problem using basic tools
such as evolutionary algorithms. Our main objective is to change the appearance
frequencies of plaintext binary blocks, to make statistical cryptanalysis
impossible. We designed a new encryption method called “Binary fusion Process (BFP)”,
it is a preparatory step for the application of evolutionary algorithm, and can
in fact generate a more interesting initial population. Through the key
generated by our algorithm, we illustrate the process of encryption and
decryption, and then we present our various applications while interpreting
them. Finally, to evaluate our system we compare it to other well known systems.
Moreover, the experimented results show that the robustness of our system is
undeniable to any attack by frequency analysis. |
Keywords: |
Symmetric Encryption, Evolutionary Algorithms, Combinatorial Optimization, SEC
Extension To Binary Blocks, Frequency Analysis. |
Source: |
Journal of Theoretical and Applied Information Technology
pp 067 - 075 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE MINING METHOD BASED ON PAGE VISITING SEQUENCE OF THE PATH CLUSTERING |
Author: |
CHI MA, JIAN KONG, CHUN NA ZHANG |
Abstract: |
The clustering algorithm based on users visiting path, which intends to
discovery the user's visiting behavior to achieve the architectural optimization
of websites. The visiting sequence and visiting times reflect users’ interest
measures, those users who have similar interests are clustered in the same
master and the implementation of the clustering process is achieved by the
identification log. This essay refers to the KSearch algorithm in order to
obtain the behavior model of the clustered users, and resets the relationship
between interestingness and similarity. The essay also introduces the longest
fitting path to define cluster center, the experiment results show that the
algorithm is effective. |
Keywords: |
Path Cluster, User Visiting Transaction, KSearch Algorithm, Cluster Center
|
Source: |
Journal of Theoretical and Applied Information Technology
pp 076 - 080 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
NOVEL HIGH RELIABILITY BANDGAP-BASED UNDER-VOLTAGE-LOCKOUT METHODS |
Author: |
HUI WANG, ,YONG-RUI ZHAO, SONG-LIN WANG |
Abstract: |
In this paper, a novel method to build under-voltage-lockout (UVLO) circuit has
been developed. The method based on band gap reference voltage comparator, which
take advantage of a reference voltage produced by itself realizes voltage
compare, stability of parameters such as threshold point voltage, hysteretic
range, without utilizing an extra band gap reference voltage. An abstractive
feature of the proposed circuit is that it achieves UVLO function by a simple
structure, without complicated logic components. Therefore, its power
consumption is low. With the presented method, the novel under voltage lock out
circuit achieves hysteretic range of 2.39V; its turn-on voltage is 12.0V, and
turn-off voltage is 9.61V at 25.39V. Simulation results are based on 0.5 μm BCD
process technologies. |
Keywords: |
Power Management, Under Voltage Lock Out, Bandgap Voltage Reference, Hysteretic
Range.
|
Source: |
Journal of Theoretical and Applied Information Technology
pp 081 - 086 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN INVENTORY MODEL FOR NON-INSTANTANEOUS DETERIORATING ITEMS UNDER TWO LEVELS OF
TRADE CREDIT AND TIME VALUE OF MONEY |
Author: |
HAO JIAQIN, CHEN GUOLONG, CHEN PANFENG, YAO YUNFEI, ZHANG YADONG |
Abstract: |
In this study, in order to investigate the influence of the time value of money
strategy, an inventory system for non-instantaneous deteriorating items under
two-level trade credit is considered by using the discounted cash-flows (DCF)
approach. The purpose of this paper is to find the optimal replenishment
policies for minimizing the total present value of all future cash-flow cost for
the retailer. Useful theorems to characterize the optimal solutions have been
derived. Numerical examples are provided to demonstrate the results. |
Keywords: |
Two Levels Of Trade Credit; Non-Instantaneous Deteriorating Items; Time Value Of
Money; Inventory Model |
Source: |
Journal of Theoretical and Applied Information Technology
pp 087 - 93 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
A SATELLITE STAR IDENTIFICATION ALGORITHM BASED ON POLAR GRID |
Author: |
HUA ZHANG, 2XIAOPING JIANG, 3SHAOBO CHEN |
Abstract: |
In the star identification algorithms based on the inter-star angular distances,
more dimensions of the star patterns are adopted to get high rate of success.
However, it spends more time for star identification process. To speed up the
star identification process while keeping high rate of success, a new stellate
pattern composed of all of the stars in the star image is proposed. So the
pattern is characterized of maximal dimension. Then a polar grid algorithm is
adopted to avoid spending much time in the identification process. The
simulations demonstrate that the algorithm is superior to the original grid
algorithms and the triangle algorithms in rate of success, robustness to noises,
computing cost and memory required. |
Keywords: |
Star Identification, Stellate Pattern, Grid Algorithm, Polar Coordinate System,
Star Sensor |
Source: |
Journal of Theoretical and Applied Information Technology
pp 094 - 100 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
COMPRESSED SENSING USING ADAPTIVE WAVELET TRANSFORM AND OVERCOMPLETE DICTIONARY |
Author: |
GUANGCHUN GAO, LINA SHANG, KAI XIONG |
Abstract: |
In this paper, we present a new compressed sensing implementation process for
one dimension signal reconstruction. Firstly, one level wavelet decomposition of
the one dimensional signal was finished. For using the adaptive wavelet
transform based on lifting wavelet transforms, we can achieve the detail signals
being zero (or almost zero) at big probability, so the signal has the better
linear approximation. Secondly, the signal can be reconstructed using compressed
sensing method. Because the length of the low frequency coefficients is half of
the original signal length, the measurement matrix can be reduced. The
redundancy of overcomplete dictionary can make it effectively capture the
characteristics of the signals. The overcomplete dictionary which combined the
DCT base with the unit matrix can be used for the compressed sensing. Thirdly,
using the inverse adaptive wavelet transform, the signal can be reconstructed
with the low frequency coefficients. Finally experimental results demonstrate
the application effectiveness for this scheme in compressed sensing fields. |
Keywords: |
Compressed Sensing, Over Complete Dictionary, Wavelet Transform, Measurement
Matrix |
Source: |
Journal of Theoretical and Applied Information Technology
pp 101 - 107 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW |
Author: |
XINQIN GAO, MINGSHUN YANG, YONG LIU, XIAOLI HOU |
Abstract: |
With the development of information and network technology, more and more
enterprises adopt the networked manufacturing mode to improve their production,
service, and operations. However, the current networked manufacturing mode can
not put the centralized resources into distributed services, which leads to a
lower inter-enterprise business collaboration capability. This paper firstly
elaborates the cloud computing and cloud manufacturing. Then, as a new networked
business process management technology, the cloud workflow is introduced into
cloud manufacturing to improve the multi-agent business collaboration
capability. Based on the cloud workflow, a multi-agent business collaboration
process is established to realize a mapping from manufacturing requirements,
manufacturing services to manufacturing resources dynamically and
hierarchically. Finally, a conceptual model of multi-agent business
collaboration is proposed, which includes the modeling and verification of cloud
workflow, the modeling and clustering of manufacturing services, and the optimal
matching of manufacturing service supplies and requirements. This conceptual
model will improve the multi-agent business collaboration capability of
manufacturing service demander, provider and operator, and will provide a new
solution, theoretical foundation and technical support for the practical
application of cloud manufacturing. |
Keywords: |
Cloud Workflow, Business Collaboration, Conceptual Model, Cloud Computing,
Multi-agent |
Source: |
Journal of Theoretical and Applied Information Technology
pp 108 -112 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
MODELING TO COMPILING: DESIGN AND IMPLEMENTATION FOR WIRELESS SENSOR NETWORK
SYSTEM |
Author: |
BO HUANG, MENGTING YUAN, GUOQING WU, XIANG LING, CHAO WAN |
Abstract: |
Based on the characteristics of the Wireless Sensor Network (WSN), researchers
tend to ignore the system modeling of the complex system which is built by WSN
and the central processor. Actually, the complex modeling method and code
generation tool will cause a lot of manpower and time costs. Different from the
existing methods and techniques, this paper presents a system behavior modeling
method and code generation technique based on WSN. The method of model
validation and system simulation is also proposed on this basis. |
Keywords: |
Wireless Sensor Network (WSN), Behavioral Models, Code Generation, Behavior
Description Language (BDL),Simulation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 113 - 119 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
PRODUCT STRUCTURE RELATION BASED CONFORMITY INSPECTION FOR CIVIL AIRCRAFT |
Author: |
YU ZHENG, YANRONG NI, JUNTONG XI, LINGYUN PAN, MIN LU, |
Abstract: |
Civil aircraft is a kind of complicated product with the tremendous product data
and intricate data evolution process. Data consistency management in the product
lifecycle is an extremely significant problem especially for the civil aircraft
product. Product data consistency management for civil aircraft is not only
required by the airworthiness certification on product conformity inspection,
also related to the success of the new product development. On the product data
consistency management, there are many researches which focus and discuss on the
structure of BOM data, BOM data maintenance method, but few study on the
technique of multi-BOM data consistency inspection method. In this paper, the
aircraft product BOM layer and structure are analyzed in the "airframer-suppliers"
development model, operations and changes during the BOM transition and
reconstruction from engineering BOM to manufacturing BOM are illustrated. The
differences between engineering BOM and manufacturing BOM which are generated
during the BOM transition are classified into “normal inconsistencies” and
“erroneous inconsistencies”. For the erroneous inconsistencies inspection, a
product structure relation based conformity inspection method is proposed. The
corresponding algorithm is clarified, and its workflow is described in detail.
The civil aircraft conformity inspection system is developed. The method and
system are applied in practical product data management of ARJ21-700 and
verified efficiently. |
Keywords: |
Product Data Management, Data Conformity Inspection, BOM, Conformity Inspection
Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
pp 120 - 130 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
RELIABILITY EVALUATION OF MULTIPLE PERFORMANCE PARAMETERS SYSTEM ADT BASED ON
MULTIDIMENSIONAL TIME SERIES MODEL |
Author: |
LI WANG, ZAIWEN LIU, CHONGCHONG YU |
Abstract: |
This paper proposes a new Accelerated Degradation Testing (ADT) reliability
evaluation method utilizing a multidimensional composite time series modeling
procedure to take into account the integrated effect of system’s multiple
performance parameters along with the random effect of environmental variables
for equivalent damage in ADT. In this paper, system performance parameter ADT
data are treated as a multidimensional composite time series model to predict
system failure time. First, this paper decomposes these multiple performance
parameters useful for ADT into three classes as trend, cyclical or random
components, and describes them with a combined multi-dependent variable
regressive model, hidden periodic model and multivariate auto-regression model.
Second, according to standard practice, this paper assumes that the failure of
such a system obeys a competing failure rule, that is, for an individual unit
there is one primary controlling variable that will indicate failure even though
others degrade they do not meet any failure criterion. Failure time at each
test-stress level is predicted by using the best linear unbiased prediction of
the multidimensional composite time series model. Finally, the reliability at
use-stress level is estimated from a failure time distribution evaluation based
on the failure time predictions at each test-stress level providing a
relationship between failure time and test-stress levels. |
Keywords: |
ADT, Multidimensional Time Series, Reliability Evaluation, Multiple Performance
Parameters |
Source: |
Journal of Theoretical and Applied Information Technology
pp 131 - 137 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
GENERAL AND SPECIAL-PURPOSE METHODOLOGIES FOR AGENT ORIENTED SOFTWARE
ENGINEERING |
Author: |
MOHAMMAD SHKOUKANI, RAWAN ABU LAIL |
Abstract: |
This paper provides a summary of software engineering process and its importance
in open system industry. It describes the agent oriented software engineering
development lifecycle. It also focuses on orientation of multi agent systems and
on some representative agent oriented software engineering methodologies such as
Gaia, ROADMAP, Tropos, and MaSE which are general purpose methodologies. Then it
describes some special purpose methodologies such as ADELFE and SADDE. It also
presents the phases for each methodology with its strengths and weaknesses.
Finally it proposes the development of a new model that combines the features of
two of the existing methodologies which are Gaia and Tropos by concentrating on
their strengths and avoiding their weaknesses. |
Keywords: |
Agent Oriented Software Engineering Methodologies, Multi Agent Systems, Software
Engineering Process |
Source: |
Journal of Theoretical and Applied Information Technology
pp 138 - 144 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
SYNCHRONIZATION AND ANTI-SYNCHRONIZATION BETWEEN A CLASS OF FRACTIONAL-ORDER AND
INTEGER-ORDER CHAOTIC SYSTEMS WITH ONLY ONE CONTROLLER TERM |
Author: |
YANPING WU, GUODONG WANG |
Abstract: |
In order to bridge between fractional-order and integer order nonlinear
dynamical system, in this letter, we brings attention to synchronization and
anti-synchronization between fractional-order chaotic system and integer-order
chaotic system by using back-stepping method. And the sufficient conditions for
achieving the synchronization and anti-synchronization of a class of
fractional-order nonlinear system and integer-order nonlinear system are derived
based on Lyapunov stability theory. Moreover, a new back-stepping control law
with only one term is introduced such that a typical example can be realized
successfully, which is easier to be applied to industry for its only one
controller term. Finally, numerical simulations are provided to verify the
effectiveness and feasibility of the proposed control scheme, which are in
agreement with theoretical analysis. |
Keywords: |
Synchronization, Fractional Order, Back-stepping Control |
Source: |
Journal of Theoretical and Applied Information Technology
pp 145 - 151 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
INFORMATIONIZED PERFORMANCE EVALUATION FOR MARINE ENGINEERING EQUIPMENT
ENTERPRISES BASED ON KNOWLEDGE MANAGEMENT |
Author: |
JINLOU ZHAO, XINLIANG XU |
Abstract: |
Informatization of marine engineering equipment enterprises, as a fundamental
and important part of the national and social informatization construction, has
become a strategic measure to improve the management level and to enhance the
competence of the marine engineering equipment enterprises. The income and
impact of information technology applications has been the focus of these
enterprises. This article employs the method combining performance evaluation
and informatization, and analyses from perspectives of knowledge management to
help the marine engineering equipment enterprises maximize their enterprise
value applying knowledge management. Through a combination of model analysis and
practical research, it studies the principles, constructs the system and
developed the method and model of informationized performance evaluation for
marine engineering equipment enterprises based on knowledge management, and also
conducts the empirical research. The research results can evaluate the
informatization performance of marine engineering equipment enterprises and
further offer the enterprises with necessary theoretical methods and tactical
support to implement knowledge management effectively and to enhance their core
competence. |
Keywords: |
Knowledge Management, Informatization, Performance Evaluation, Marine
Engineering Equipment Enterprises, Fuzzy Comprehensive Evaluation Method |
Source: |
Journal of Theoretical and Applied Information Technology
pp 152 - 157 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS ON FINANCING EFFICIENCY OF LISTED SMALL AND MEDIUM BUSINESS |
Author: |
QIAN LIU |
Abstract: |
All the listed companies are always concentrating on the financing efficiency.
Especially after the financial crisis, a great many small and medium companies
have suffered from this terrific financial disaster in China because of the
close trade relation with America and other developed countries. In order to
know about the factor that influences the financing efficiency, principal
component analysis is adopted here to do research on this topic. This paper is
based on the regional analysis, which aims to provide suggestion for the small
and medium business in the northeast of China. |
Keywords: |
Small and Medium Business, Financing Efficiency, Principal Component Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
pp 158 - 162 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
DYNAMIC ANALYSIS AND OPTIMIZATION DESIGN OF THE SFD- SLIDING BEARING FLEXIBLE
ROTOR SYSTEM |
Author: |
JIYAN WANG |
Abstract: |
The paper proposes a mechanical model of SFD-sliding bearing flexible rotor
system, employing Runge-Kutta method to tackle nonlinear differential equation,
thus acquiring the dynamic response and the unbalanced response curve. Results
obtained show the route of flexible rotor system from stable periodic motion to
chaos state is: periodic motion—quasi-periodic motion—chaos —period doubling
bifurcation—chaos. The paper analyzes the sensitivity of flexible rotor system,
offering design variables to optimization analysis, improving the efficiency of
optimization and shortening the design cycle. Based on sensitivity analysis, we
conduct optimization analysis on critical speed by the application of genetic
algorithm, which aims to further the enlargement of D-value between the first
critical speed and the second critical speed. Additionally, the critical speed
ameliorates after the optimization which supplies theoretical basis as well as
theoretical analysis towards the dynamic stability of high-speed rotor system
and provides reference for the design of such rotor system. |
Keywords: |
SFD, Dynamic Analysis, Critical Speed, Sensitivity Theory, Optimization Design |
Source: |
Journal of Theoretical and Applied Information Technology
pp 163 - 167 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
CONTROLLER OF PH PROCESS BASED ON FUZZY NEURAL NETWORK |
Author: |
GANG LIU, WANG HUAN, DUAN BINGLONG |
Abstract: |
A fuzzy neural network controller which is the combination of the fuzzy control
and neural network technology, is presented based on the severe nonlinearity and
large hysteresis of the pH value control process. It shows that,by digital
simulation, the control effect of the proposed FNNC's control algorithm is much
better than it of the conventional PID control and ecumenic fuzzy control
algorithm.The proposed control algorithm of the FNNC is applied to DSP, and the
feasibility of the controller is proved by the simulation at the same time. |
Keywords: |
Ph Process, Nonlinearity, Fuzzy Neural Networks Control (Fnnc), Dsp |
Source: |
Journal of Theoretical and Applied Information Technology
pp 168 - 172 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
HARMONIC ANALYSIS METHOD APPLICATION IN WHEEL SWING ERROR DETECTION LINE SYSTEM |
Author: |
JINGANG GAO, SHUANG ZHANG, YUZHUO MEN, HUA WANG |
Abstract: |
Harmonic analysis method is applied for axial and radial run-out error nature
analysis and judgment which affords scientific evidence for improving wheel
machining accuracy. At first, this paper introduces the constitute, hardware
structure and working principle of wheel swing error detection line system.
Through moving mean filter method, axial and radial run-out error of detected
wheel is filtered digitally and impact of external noise for detected data is
reduced; Secondly Fourier series expansion method is applied to the actual wheel
contour harmonic characteristic analysis and the contour characteristics are
digitized; finally the actual wheel contour of some component is acquired
digitally on detection equipment, and the reason of axial and radial run-out
error is analyzed and judged with harmonic Analysis method. This system is
applied to the actual wheel production line, which is operated steadily and
reliably for 100% axial and radial run-out error of parts online detection. The
system detection error is less than 0.1mm. |
Keywords: |
Harmonic analysis, Radial run-out, Axial Run-out, Wheel |
Source: |
Journal of Theoretical and Applied Information Technology
pp 173 - 178 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
MINIATURIZATION OF INERTIAL MAGNETOELECTRIC VIBRATION VELOCITY SENSOR WITH HIGH
FREQUENCY RESPONSE AT LOW FREQUENCY BAND |
Author: |
XI CHEN, SHUIBAO YU |
Abstract: |
The frequency response of the inertial magnetoelectric vibration velocity sensor
is limited in the low frequency range due to the character of second order high
pass filter of the structure. For better performance in the low frequency range,
the traditional method is to increase the initial mass of the sensor which will
increase the size and weight tremendously. This paper presents a
frequency-selected compensation network to improve the performance of the
frequency response at low frequency band, keeping the sensor in small size and
light weight. The frequency-selected network, which is composed of amplifiers,
resisters and capacitances, is connected to the output port of the sensor in
cascade without any modification of the sensor’s structure. After compensation,
the frequency band of the sensor is flattened and the frequency response still
has the character of second order high pass filter while the resonant frequency
decreases from 10Hz to about 0.9Hz. The experimental results have shown that the
sensor after been compensated has good performance in the low frequency range. |
Keywords: |
Magnetoelectric Vibration Velocity Sensor, Compensation Network, Transfer
Function, Resonant Frequency, Low Frequency Band |
Source: |
Journal of Theoretical and Applied Information Technology
pp 179 - 187 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
ROBUST STABILIZATION OF A CLASS OF SWITCHED SYSTEMS |
Author: |
YONGZHI ZHAO, SHENXIAN ZHUANG, YUN LI |
Abstract: |
In this paper, it considers the stability problem and stabilization problem of
switched systems; it has been referred to guarantee feedback system stable. We
transform a switched continuous disturbed norm bounded linear system into a
stable switched automatic system through arbitrary pole assign approach and we
transform switched systems into diagonal matrix with perturbation of . At the
last, a numerical result is given to illustrate our derived results. |
Keywords: |
Keywords: Switched Systems, Feedback System, Stabilization |
Source: |
Journal of Theoretical and Applied Information Technology
pp 188 - 192 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
MINING FREQUENT AND INFREQUENT FEATURES FROM CHINESE CUSTOMER REVIEWS |
Author: |
LI SHI, YU MING |
Abstract: |
Customer reviews serve as a feedback mechanism that can help suppliers enhance
their products and services, then gain competitive advantages. Mining Product
features from reviews are expected to further investigate the views and
attitudes of customers. This study is focus on one subtask of sentiment
analysis. We want to extract the product frequent and infrequent features from
Chinese customer reviews. Our approach is based on associated rule technique,
and we further propose a algorithm which integrated the self- construct features
datasets from websites to identify infrequent features. Experiments are
conducted by using the reviews which download from Internet as corpus. Results
proved that the algorithm will improve the performance of product features
extraction, which will be helpful for identifying the real concern of customers. |
Keywords: |
Customer Reviews; Product Features; Data Mining |
Source: |
Journal of Theoretical and Applied Information Technology
pp 193 - 199 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
SYNCHRONIZATION OF COMPLEX NONLINEAR SYSTEMS AT A PRESET TIME |
Author: |
YANSONG DENG, KAIYU QIN, QINZHEN HUANG |
Abstract: |
In this paper, a novel finite-time synchronization framework for complex
nonlinear systems is established. In such a framework, the problem of
synchronization at any preset time of complex nonlinear systems is solved by
using linear continuous state feedback control laws with time-varying gains. The
proposed preset time dependent time-varying control laws can solve
synchronization of chaotic systems problems at the preset time. Numerical
simulations are presented to illustrate the effectiveness of the obtained
theoretical results, not only for integer order chaos, but also for fractional
order chaos. |
Keywords: |
Complex Nonlinear Systems, Chaotic Systems, Finite-time Synchronization,
Fractional Order |
Source: |
Journal of Theoretical and Applied Information Technology
pp 200 - 205 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
IMAGE SEGMENTATION ON IMPLICIT SURFACE BASED ON CHAN-VESE MODEL |
Author: |
LIJIANG ZHOU, JIANGUO LI |
Abstract: |
A new model to segment the images on implicit surface based on the Chan-Vese
model and variational level set method was proposed. The classic Chan-Vese model
for two phase’s segmentation of planar images is extended to image segmentation
on implicit surfaces. The spatial contour for image segmentation is defined by
means of intersection of the above implicit surface and the zero set of another
dynamic level set function. The novel energy functional includes two parts, the
first one is the sum of square of the difference between pixel intensity and
mean values in two regions on the surface, and the second part is the length of
spatial contour. The evolution equation of level set function is obtained using
variation technique and is discretized by simple explicit finite difference
method. Some numerical examples are given finally to validate the model
presented in this paper. Experimental results show that the model has promising
effect on image segmentation on implicit surface and preserves salient features
of the surface. |
Keywords: |
Implicit Surface, Image Segmentation, Chan-Vese Model, Variational Level Set |
Source: |
Journal of Theoretical and Applied Information Technology
pp 206 - 209 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
IMPROVED FUZZY C-MEANS CLUSTERING ALGORITHM BASED ON SAMPLE DENSITY |
Author: |
HUIJING YANG, DANDAN HAN, FAN YU |
Abstract: |
Fuzzy clustering techniques, especially fuzzy c-means (FCM) clustering
algorithm, have been widely used in automated image segmentation. The
performance of the FCM algorithm depends on the selection of initial cluster
center and/or the initial memberships value. if a good initial cluster center
that is close to the actual final cluster center can be found. the FCM algorithm
will converge very quickly and the processing time can be drastically reduced.
In the paper for the problem that fuzzy c-means clustering algorithm is
sensitive to the initial cluster centers, propose a method of selecting initial
cluster centers based on sample density. At the end do experimental analysis and
verification of the proposed key technologies. The results show that the
proposed algorithm is superior to the FCM algorithms. |
Keywords: |
Hard C-Means Clustering; Fuzzy C-Means Clustering; Sample Density |
Source: |
Journal of Theoretical and Applied Information Technology
pp 210 - 214 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
A SAFE RFID AUTHENTICATION PROTOCOL FOR INTERNET OF THINGS |
Author: |
DONGFENG XU, YAN CHEN |
Abstract: |
Internet of Things (IoT) is the evolution of related technologies and
applications such as Internet and mobile networks. Future research into IoT will
focus on generic technology, information security, and critical applications.
Based on IoT, the existing RFID system security mechanisms are analyzed, with a
focus on cryptographic protocols. Investigate the weaknesses or flaws in these
protocols, and then a theoretical model and method to design and analyze RFID
protocols within the provable security framework is discussed. A mutual
authentication protocol of RFID system using synchronized secret information is
put forward. |
Keywords: |
Internet of Things; Security Architecture; Radio Frequency Identification;
Privacy Protection; Authentication protocol |
Source: |
Journal of Theoretical and Applied Information Technology
pp 215 - 220 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE MACROSCOPIC MECHANISM FOR RURAL SAFE DRINKING WATER |
Author: |
ZHENHUA LIU |
Abstract: |
China has about 300 million unsafe drinking water in rural areas by the end of
2010.China as an example, this paper presents macroscopic mechanism system for
rural safe drinking water. It consists of six subsystem such as the legal
construction including water source protection, planning and construction and
operation and management of drinking water projects; funds security including
the central and local government financial investment, social donations, rural
residents pay; preferential policies including taxation expenses preference,
electrovalence preferential policies; social security including personnel
policy, employee wages, social security and welfare; self-consciousness of rural
residents including the water-cultural awareness on the core of drinking water
security concept, demand expression, active participation of rural residents;
societal forces including non-profit social organizations, experts and scholars,
corporate organizations and individuals. The perfect rural safe drinking water
mechanisms play a key important role in solving safe drinking water in rural
areas. |
Keywords: |
Rural Drinking Water, Legal Construction, Funds Security, Preferential Policies,
Social Security |
Source: |
Journal of Theoretical and Applied Information Technology
pp 221 - 229 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN ANCHOR-SELECTION/EXPANSION APPROACH FOR LARGE GRAPHS APPROXIMATE MATCHING |
Author: |
ANLIANG NING, XIAOJING LI, CHUNXIAN WANG |
Abstract: |
How to match two large graphs by maximizing the number of matched edges, which
is known as maximum common subgraph matching and is NP-hard. A new
anchor-selection / expansion approach to compute an initial matching is
presented in the paper. We give heuristics to select a small number of important
anchors using a new similarity score, which measures how two nodes in two
different graphs are similar to be matched by taking both global and local
information of nodes into consideration. And then by expanding from the anchors
selected we work out a good initial matching. The expansion is based on
structural similarity among the neighbors of nodes in two graphs. The approach
that can efficiently match two large graphs over thousands of nodes with high
matching quality is proved in theorized. |
Keywords: |
Large Graph Match, Maximum Common Subgraph (MCS), Global Node Similarity, Anchor
Selection And Expansion |
Source: |
Journal of Theoretical and Applied Information Technology
pp 222 - 230 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
A SENTENCE SEMANTIC SIMILARITY CALCULATING METHOD BASED ON SEGMENTED SEMANTIC
COMPARISON |
Author: |
YUNTONG LIU, YANJUN LIANG |
Abstract: |
In order to calculate sentence semantic similarity more accurately, a sentence
semantic similarity calculating method based on segmented semantic comparison
was proposed. Sentences would be divided into the trunk and the other segments
by some grammar rules, and each segment might be divided into several shorter
segments. When calculating the sentence semantic similarity between two
sentences, the trunk and the other segments were set different weights, and the
grammatical and semantic structure of the sentences would be analyzed, and the
reasonable grammatical orders for segments in the two sentences would be chosen.
With the method, the more reasonable and accurate sentence semantic similarity
between two sentences could be calculated. Finally an experiment was provided to
verify the effectiveness of the method. |
Keywords: |
Sentence Semantic Similarity; Semantic Similarity Calculating; Trunk of
Sentence; Segments of Sentence |
Source: |
Journal of Theoretical and Applied Information Technology
pp 231 - 235 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
RISK MODEL OF U.S. OVERSEAS OPERATIONS LOGISTICS BASED ON FUZZY COMPREHENSIVE
EVALUATING METHOD |
Author: |
XIN MU, JIKUN GUO, YONGJIE NIU, MINGLIANG JIA |
Abstract: |
The study purpose of this paper is looking for a method, which can accurately
evaluate and quantize the security risk problem in the U.S. overseas operations;
it can provide the positive effect for formulating the risk precautionary
measures. This paper adopts the fuzzy comprehensive evaluation method to
construct the risk evaluation model of US overseas operations logistics, and
finds out the key factors of being related to risk of the US overseas
operations, which are the foundation of the further quantitative analysis study
of US overseas operations logistics problem. At last, the evaluation model is
proved to be reasonable, effective and feasible via case analysis and
calculation. |
Keywords: |
Risk Evaluation Model; Overseas Operations Logistics Support |
Source: |
Journal of Theoretical and Applied Information Technology
pp 236 - 240 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
LBD4WS: LOG-BASED DIAGNOSIS FOR WEB SERVICE |
Author: |
ZHICHUN JIA, RONG CHEN |
Abstract: |
With the development of web service application, it is highly desirable to
quickly and exactly localize the service faults and explain the faulty reason.
In this paper, we propose a log-based diagnosis method (LBD4WS) which combines
MBD method with the statistical techniques based on historical data to construct
the diagnosis model. LBD4WS localizes the service faults and explains the faulty
reason by comparing the actual execution trace with the correct execution trace.
We provide a case study to illustrate the diagnosis process of our method and
use three BPEL (Business Process Execution Language) processes to conduct the
experiments for evaluating our method. The experimental results show that our
method is more effective than two existing MBD methods in the diagnostic
accuracy for web services. |
Keywords: |
BPEL Process, Fault Diagnosis, Web Service, Execution Log |
Source: |
Journal of Theoretical and Applied Information Technology
pp 247 - 253 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
ECG QUALITY EVALUATION BASED ON WAVELET MULTI-SCALE ENTROPY |
Author: |
YU CHEN, YI XIN, WEITUO HAO, LINGZHI KANG, DONGQIN CAI |
Abstract: |
Electrocardiographic (ECG) analysis, which can be used to investigate the
Cardiovascular physiological and pathological phenomena, has always been
promoting new drug development and improving clinical diagnosis. With the
modernization of medical treatment, evaluating the quality of ECG recordings and
identifying whether they are diagnostically useful by information processing
technologies become the focus of new researches. This paper presents a novel
approach to appraise initial ECG recordings utilizing discrete wavelet transform
(DWT) and multi-scale shannon entropy. A band-pass filter with 0.67Hz~40Hz
bandwidth is proposed to preprocess the original ECG recordings and then the
filtered ECG recordings are decomposed into different scales by DWT, and then
after an iterative procedure based on comparing the entropy of each scale
coefficient with trial threshold, the quality of ECG signals is assessed and
divided into 'good quality and acceptable' (TypeI), and 'poor quality and
unacceptable' (TypeII). The experimental results verify that the proposed method
can effectively identify the TypeII of ECG recordings. |
Keywords: |
ECG, DWT, Wavelet, Entropy |
Source: |
Journal of Theoretical and Applied Information Technology
pp 254 - 259 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE APPLICATION OF INTELLIGENT DIGITAL STRAIN SENSOR TECHNOLOGY IN STRUCTURAL
CONSTRUCTION MONITORING |
Author: |
PENG CHANG, QIANGJUN LI |
Abstract: |
Intelligent Strain Sensor JMZX-212 (ISSJ)is a kind of surface mounted strain
gauge, which is used for measuring the strain of steel structure and concrete
structure. It is suitable for long-term and automatic measurement. The
application of ISSJ in climbing truss system for core tube structural
construction is introduced. Then the data obtained were transferred into the
stress and the internal force. By making a comparative analysis between the
numerical simulation results and actual stress and strain, it is shown that the
internal bearing force of primary truss is 70% of the design internal force in
the process of construction, and 80% for the secondary truss. Steel truss
platform performs well in bearing capacity and stiffness. Intelligent Strain
Sensor is easy to install, and with the reliable results. It will be more and
more widely used in structural construction monitoring. |
Keywords: |
Intelligent, Strain Sensor, Surface Mounted, Core Tube |
Source: |
Journal of Theoretical and Applied Information Technology
pp 260 - 266 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
OPTIMAL APPROXIMATE ALGORITHM TO SOLVE LOCATION-SELECTION OF RECYCLE WATER
STATION PROBLEM |
Author: |
XIAOXU LU, JING LI |
Abstract: |
The minimum Steiner tree problem has wide application background, such as
transportation system, communication network, pipeline design and VISL, etc. It
is unfortunately that the computational complexity of the problem is NP-hard.
People are common to find some special problems to consider or find the
approximate algorithm to solve different problems. Since the complexity of the
Steiner tree problem, the almost of papers are relate to the object of small
data problem, i.e., the number of involved objects is small. Those conclusions
are useful to the theoretical research from which some algorithms are
originated. For the practical problems, there are large number of objects are
need to be considered. In paper [10], [11] and [12], the authors consider the
similar approximate algorithms to solve the Steiner problem, such as minimal
Steiner tree and networks. But how to find the more optimal approximate
algorithm, and even more the algorithm can be adjusted by different cases, is
the reason of paper. We want to find the more optimal approximate approach by
the analysis of the different cases such that we can choose the more optimal
approximate approach. |
Keywords: |
Steiner Tree, Computational Complexity, Location-Selection, Wireless Network |
Source: |
Journal of Theoretical and Applied Information Technology
pp 267 - 271 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
INFORMATION SYSTEM IN THE COLLUSION OF THE REAL ESTATE FINANCIAL INNOVATION |
Author: |
DAN LU, CHUXIAN FANG |
Abstract: |
As the core content of the financial market, information plays an important role
in the process of the real estate financial innovation. This article builds a
game model with four participants (real estate company, financial institution,
investor and regulator). Based on interest structures of real estate company,
financial institution and investor, we give the dynamic game analysis of
different participants’ micro-income structure. By using the Principal-agent
theory we try to design the incentive mechanism to stimulate real estate
companies and financial institutions to work hard and transfer true information
effectively. Finally, in order to improve the efficiency of the financial market
indirectly, we try to find out the institutional arrangements for the regulation
of financial transactions and avoiding the risk of investor’s funds. |
Keywords: |
Information System, Incomplete Information, Collusion, Game Theory, Incentive
Mechanism, Financial Regulation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 279 - 287 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
SENSITIVITY SIMULATION ANALYSIS OF URBAN EXPRESSWAY UNDER SPEED GUIDANCE CONTROL |
Author: |
DASHAN CHEN, YU ZHANG, LIGUO XIA |
Abstract: |
Urban expressway could improve operational efficiency and reduce accident rates
under speed guidance control. Driver obedience for the speed guidance value
affected the effect directly. The effect might also lose even play a negative
role when the traffic demand reached a certain level. Simulation was carried out
depending on different traffic demand and driver compliance rate through
abstract urban expressway model. Six kinds of traffic demand under different
obedience level were analyzed comparatively. Speed guidance control has the
positive effect about safety and efficiency when the traffic demand is low or
medium. When the traffic demand is high, the effect on safety and efficiency
both are negative. Different driver compliance rate affected the effect level to
some extent. |
Keywords: |
Urban Expressway; Speed Guidance; Conflict; Compliance Rate |
Source: |
Journal of Theoretical and Applied Information Technology
pp 288 - 292 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN ARTIFICIAL BEE COLONY ALGORITHM WITH MODIFIED SEARCH STRATEGIES FOR GLOBAL
NUMERICAL OPTIMIZATION |
Author: |
JIANFENG QIU, JIWEN WANG, DAN YANG, JUAN XIE |
Abstract: |
The Artificial Bee Colony (ABC) algorithm based on swarm intelligence is a more
competitive algorithm than other Evolution Algorithm (EA). The results of recent
studies indicate that the ABC algorithm has many advantages but it has two major
weaknesses: one is slower convergence speed; the other is getting trapped in
local optimal value early. Inspired by differential evolution (DE), different
with other improved ABC algorithm based Differential Evolution (DE), we propose
a modified ABC algorithm, named it ABC/current-to-best/1, by introducing the
best food source (the best solution) and randomly choosing food source (the
random solution). Experiments are conducted on a group of 24 benchmark
functions. The results testify the performance of ABC/current-to-best/1
algorithm better than original ABC and some pre-existing improved ABC algorithm. |
Keywords: |
Artificial Bee Colony, Global Numerical Optimization, Search Strategy,
Differential Evolution |
Source: |
Journal of Theoretical and Applied Information Technology
pp 293 - 302 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS OF NON-NEGATIVE TIKHONOV AND TRUNCATED SINGULAR VALUE DECOMPOSITION
REGULARIZATION INVERSION IN PCS |
Author: |
YAJING WANG, JIN SHEN, GANG ZHENG, ZHENHAI DOU, ZHENMEI LI |
Abstract: |
Considering non-negative characteristic of the particle size distribution (PSD),
based on trust-region-reflective Newton method, two non-negative regularization
methods of truncated singular value decomposition (TSVD) and Tikhonov (TIK) for
photon correlation spectroscopy (PCS) are proposed in this paper. Combining two
regularization parameter criterions of GCV and L-curve, two non-negative
regularization methods are studied. The study results show that, compared with
TIK, TSVD has bigger truncation effect, poorer smoothness and narrower
distribution width of inversion PSD, in the case of noise, TSVD has smaller
relative error and peak value error of PSD, better capacity to discriminate
bimodality and stronger anti-noise, but at noise-free case, TSVD hasn’t obvious
advantages, TIK and TSVD are respectively more suitable for using GCV and
L-curve criterion to determine the regularization parameter. |
Keywords: |
Photon Correlation Spectroscopy, Particle Size, Non-negative Regularization,
Inversion |
Source: |
Journal of Theoretical and Applied Information Technology
pp 303 - 310 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
EMPIRICAL ANALYSIS OF REGIONAL ENERGY CONSUMPTIONS AND ECONOMIC GROWTH |
Author: |
FULEI WEI, CAIMEI HU |
Abstract: |
The relationship between economic growth and energy consumption is one of the
hot topics in economic research. There are many literatures concern about this
topic from theoretical and empirical viewpoint. This paper applies panel unit
root, heterogeneous panel cointegration and production function to investigate
the relationship between energy consumption and economic growth within a
multivariate framework that includes capital stock and labor input for three
regions of China during the period of 1995-2007. The empirical results show that
energy consumption has had a significant impact on change in GDP in the three
regions. The elastic coefficient of EC is 0.25%, 0.20% and 0.18% in the north
region, the south region and the west region respectively. The elastic
coefficient of capital stock is 0.58, 0.36 and 0.02, and the elastic coefficient
of labor input is 0.11, 0.21 and 0.06 respectively. Furthermore, it gives some
suggestions on how to realize win-win situation of economic growth and energy
saving and reduction. |
Keywords: |
Economic Growth, Energy Consumption, Energy Conservation, Regional Economies |
Source: |
Journal of Theoretical and Applied Information Technology
pp 311 - 318 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
APPLICATION OF FUZZY CLUSTERING NEURAL NETWORK IN CONJUNCTION SPEECH RECOGNITION |
Author: |
PEILING ZHANG, LINGFEI CHENG |
Abstract: |
In order to improve the approximation property of the past fuzzy clustering
algorithms when identifying systems, a fuzzy clustering neural network (FCNN) is
proposed and is applied to conjunction speech recognition system. Based on the
fuzzy system model, FCNN presents every state as a fuzzy system and uses
continuous frames as the system input. With improving fuzzy clustering
identification algorithm, FCNN is acted as estimator of probability density
function which could forecast output probability of the each state. This model
not only can describe the inter-frames correlation information for speech signal
efficiently, but overcome the deficiency of traditional hidden markov model
which supposes each state’s output is mixed Gauss distributing probability
density function. Through the experiments of speaker-independent conjunction
speech recognition, the effectiveness of FCNN could be verified. |
Keywords: |
Conjunction Speech Recognition, Fuzzy Clustering Neural network, Probability
Density Function |
Source: |
Journal of Theoretical and Applied Information Technology
pp 319 - 324 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
IMPROVEMENT OF THE RATE EQUATION BASED ON INTERFACE REACTION AND DIFFUSION FROM
ISOTHERMAL TO NON-ISOTHERMAL |
Author: |
ZHONG GUO YANG |
Abstract: |
Rate equations of non-isothermal kinetics of solid decomposition, which involve
the factors of temperature, pressure of gaseous product and structure parameters
of solid, are derived from the models of the interface reaction and the
diffusion of gaseous product respectively. The definition of the correction term
in the rate equations represents the influence of the factors on the reaction
rate. The effect of the correction term on rate equations are extrapolated,
based on the data of non-isothermal thermal decomposition of calcium carbonate.
It is shown that considering the effect of the correction term on rate equations
is meaningfully under non-isothermal conditions. |
Keywords: |
Non-isothermal Kinetics, Correction Term, Temperature, Structure Parameters of
Solid, Calcium Carbonate |
Source: |
Journal of Theoretical and Applied Information Technology
pp 325 - 329 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
TEST AND EVALUATION ANALYSIS ON RURAL TRAINING SCHEME OF IN-SERVICE TEACHER |
Author: |
GUITING YANG, JICHEN DONG, HUAN WANG |
Abstract: |
This paper puts forward the implementation feasibility as the fourth dimension
parameter to balance 3 d parameters of training quality, cost and time aiming at
the selection of rural in-service teacher training scheme. It designs the
implementation feasibility and the hierarchical structure model of
implementation feasibility index. It puts forward implementation feasibility
probability of every implementation feasibility index and calculation method of
rural teaching level influence degree after the success of implementation. It
establishes the basic steps of project evaluation based on rural in-service
teacher training practical scheme of Hebei province and provides certain
references for the final choice. |
Keywords: |
Countryside, In-Service Teachers, 3d Parameters, Feasibility, Hierarchical
Structure Model, Calculation Method; Training |
Source: |
Journal of Theoretical and Applied Information Technology
pp 330 - 335 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
NONLINEAR SYSTEM IDENTIFICATION BASE ON FW-LSSVM |
Author: |
XIANFANG WANG, YUANYUAN ZHANG, JIALE DONG, ZHIYONG DU |
Abstract: |
This paper proposed a method to identify nonlinear systems via the fuzzy
weighted least squares support machine (FW-LSSVM). At first, we describe the
proposed modeling approach in detail and suggest a fast learning scheme for its
training. Because the training sample data of independent variable and dependent
variable has a certain error, and we obtain the sample which has a certain
fuzziness from measuring, influencing the accuracy of model building, this paper
would put the concept of fuzzy membership into the least squares support vector
machine. Using the fuzzy weighted least squares algorithm for samples, each
sample in the vector is introduced into the fuzzy membership degree, this
improve the anti noise ability of least squares support vector machine. The
efficiency of the proposed algorithm was demonstrated by some simulation
examples. |
Keywords: |
Mixed Kernel Function, FW-LSSVM, Identification,Nonlinear Systems |
Source: |
Journal of Theoretical and Applied Information Technology
pp 336 - 341 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
APPLICATION OF THE POWER SPECTRUM ESTIMATION IN THE ANKLE-BRACHIAL INDEX
DETECTION |
Author: |
GUOYONG WANG |
Abstract: |
The key of ankle-brachial index (ABI) measurement is accurately measurement of
upper and lower extremities systolic pressure. When the blood flow is blocked,
blood flow will resume a normal beat and the corresponding cuff pressure of the
first trough starting point is the systolic pressure. First it detects the pulse
signal main frequency by spectral analysis of the pulse signal which based on
the power spectrum estimation. Regarding pulse signal frequency as the basic
standard, it achieves power spectrum estimation of blood flow signal with a
sliding window. Last it achieves locating the position of systolic pressure by
detecting whether the blood flow signal frequency and the pulse signal frequency
are the same. Through simulation and experiments, it can achieve accurate
detection of systolic pressure and automatic measurement of ankle-brachial index
by application of this method. |
Keywords: |
Power Spectrum Estimation, Ankle-Brachial Index (ABI), Systolic Pressure,
Spectrum Analysis, Main Frequency |
Source: |
Journal of Theoretical and Applied Information Technology
pp 342 - 349 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF CO-SIMULATION PLATFORM BASED ON .NET |
Author: |
BIN PEI, HUI HAN, XIAOJIANG HOU, ING SHENG, BINGYI QIU |
Abstract: |
This paper analyzes the key technology of research and development on
distributed co-simulation platform based on .NET, and puts forward architecture
of distributed co-simulation platform based on .NET. The design aim of the frame
is: fit for different platforms, conform to HLA standards and support
distributed collaborative simulation, design a generality simulation and
modeling platform of stronger extend ability so that the existing application
can be easily integrated and deployed. The paper also introduces the method
which uses XML and Web servers to realize the high distributed application in
the internet, and explains some key technologies realization methods including
using current simulation model with DLL and COM, simulation running control
based on HLA, realization the collaborative communication with XML, and run
manage of collaborative simulation. |
Keywords: |
.NET, Web Service, Simulation Model, Collaborative Communication |
Source: |
Journal of Theoretical and Applied Information Technology
pp 350 - 354 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
A MULTI-INPUT FEEDBACK CONTROL ALGORITHM FOR FORMATION CONTROL |
Author: |
LI-LI He, XIAO-CHUN LOU |
Abstract: |
Aiming at the multiple robots formation control problem, this paper presents a
solution for the paralyzed deadlock and decision conflict in the formation
system. It introduces the randomized-generating function and variable repulsive
force feedback control algorithm, combines the leader-follower and the
artificial potential field approach and defines the distance, velocity vector
and the virtual force as the inputs and outputs of the feedback control system.
The two-wheel differential robot physical platform is designed on PC with the
2000series DSP chip. And the simulation results and mobile robots entity test
demonstrate the validity of the proposed method. |
Keywords: |
Multi-Input Feedback Control, Random Generating Function, Variable Repulsive
Force, System Conflict |
Source: |
Journal of Theoretical and Applied Information Technology
pp 355 - 358 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
A SAFE RFID AUTHENTICATION PROTOCOL FOR INTERNET OF THINGS |
Author: |
DONGFENG XU, YAN CHEN |
Abstract: |
Internet of Things (IoT) is the evolution of related technologies and
applications such as Internet and mobile networks. Future research into IoT will
focus on generic technology, information security, and critical applications.
Based on IoT, the existing RFID system security mechanisms are analyzed, with a
focus on cryptographic protocols. Investigate the weaknesses or flaws in these
protocols, and then a theoretical model and method to design and analyze RFID
protocols within the provable security framework is discussed. A mutual
authentication protocol of RFID system using synchronized secret information is
put forward. |
Keywords: |
Internet of Things; Security Architecture; Radio Frequency Identification;
Privacy Protection; Authentication protocol |
Source: |
Journal of Theoretical and Applied Information Technology
pp 359 - 364 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
ROBUST PREDICTIVE CONTROL FOR POLYTOPIC TIME SINGULAR SYSTEM WITH INPUT
CONSTRAINTS |
Author: |
DONGWEN ZHANG |
Abstract: |
For polytopic time singular system with inputs constraints, the paper addresses
a robust predictive control law using linear matrix inequality (LMI). A
piecewise constant control sequence is calculated by minimizing the worst-case
linear quadratic objective function. At each sample time, the sufficient
conditions on the existence of the model predictive controllers are derived and
expressed as linear matrix inequalities. The resulting predictive control law
leads to regular, impulse-free and robust stable system, and the performance of
this closed-loop system is guaranteed. Finally the numerical imitation shows the
effectiveness of the proposed method |
Keywords: |
Singular System, Predictive Control, Polytopic Uncertainty, Input Constraints,
Linear Matrix Inequality, Time Delay |
Source: |
Journal of Theoretical and Applied Information Technology
pp 365 - 369 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
POSITION ANALYSIS OF A 3-SPR PARALLEL MECHANISM |
Author: |
BIN LI, XINHUA ZHAO |
Abstract: |
This paper deals with closed form solutions for the inverse and forward position
analyses of a 3-SPR parallel mechanism, which can be used to form the main body
of a 5-DOF hybrid robot manipulator. In the inverse position analysis, a fourth
order polynomial equation has been formulated, leading to four set of solutions
of limb lengths for a given position of the reference point on the platform. In
the forward position analysis, a sixteenth order polynomial equation has been
derived, leading to four sets of mirror poses given a set of limb lengths.
Consequently, the complete sets of solutions for the inverse and forward
position analyses of the mechanism have been achieved. An example is given to
illustrate the effectiveness of this approach. |
Keywords: |
3-SPR Parallel Mechanism, Forward and Inverse Position Analyses |
Source: |
Journal of Theoretical and Applied Information Technology
pp 370 - 377 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
DERIVATIVES OF KRONECKER PRODUCTS THEMSELVES BASED ON KRONECKER PRODUCT AND
MATRIX CALCULUS |
Author: |
XIAOFENG WANG, WENYAN YANG, BAOGUANG SUN |
Abstract: |
In some fields, Kronecker product has been used extensively. In this paper, we
first review properties and definitions of Kronecker. Then, we derive two
properties of the derivatives of matrices with respect to matrices in terms of
the proposed concept. Finally, this paper presents a novel method and new
insight for proving derivatives of Kronecker product themselves by using the
concepts and properties of Kronecker Products and Matrix Calculus. |
Keywords: |
Kronecker product; Matrix Calculus; Vec operator; Derivatives of Kronecker
products |
Source: |
Journal of Theoretical and Applied Information Technology
pp 378 - 382 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
K-MEANS METHOD FOR GROUPING IN HYBRID MAPREDUCE CLUSTERS |
Author: |
YANG YANG, XIANG LONG, BO JIANG†, YU LIU, |
Abstract: |
In hybrid cloud computing era, hybrid clusters which are consisted of virtual
machines and physical machines become more and more Popular? . MapReduce is a
good weapon in this big data era where social computing and multimedia computing
are emerging. One of the biggest challenges in hybrid mapreduce cluster is I/O
bottleneck which would be aggravated under big data computing. In this paper, we
take data locality into consideration and group slave nodes with low
intra-communication and high intra-communication. After introducing the
architecture and implementation of our grouped hybrid mapreduce cluster (GHMC),
we give our k-means algorithm in GHMC and evaluate it with reality environments.
The results show that there is a nearly 34.9% performance improvement in our
system achieved by the K-means algorithm. Moreover, GHMC system also shows good
scalability. |
Keywords: |
MapReduce, Hybrid Cloud Computing, K-means Cluster |
Source: |
Journal of Theoretical and Applied Information Technology
pp 383 - 388 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
A FUZZY COMPREHENSIVE SYSTEM FOR EVALUATING VOLLEYBALL TEACHING ABILITY |
Author: |
SHUQING MA, DONGLIANG WANG |
Abstract: |
Since the teaching ability has been influenced by many factors in volleyball
sports teaching, it is more difficult to make objective and fair evaluation to
mark it. At present, the evaluation volleyball teaching ability is mainly based
on the following aspects, such as students’ academic achievements students’
evaluation for teacher and the finished status of teaching projects. All the
evaluation methods have been greatly influenced by some subjective factors. By
using mathematical statistics method, based on the reference literature and
surveyed data, this paper confirms such an evaluation system index that it
establishes a fuzzy evaluation model, designs and develops the fuzzy
comprehensive evaluation system of volleyball teaching ability based on the
fuzzy mathematics theory. Through the example of evaluation calculation, it
demonstrates the reliability of evaluation system, which provides the safeguard
to make objective and fair evaluation for volleyball teaching ability. |
Keywords: |
Volleyball Teaching, Teaching Ability, Fuzzy Comprehensive Evaluation,
Quantitative Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
pp 389 - 395 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
GENERAL AND SPECIAL-PURPOSE METHODOLOGIES FOR AGENT ORIENTED SOFTWARE
ENGINEERING |
Author: |
MOHAMMAD SHKOUKANI, RAWAN ABU LAIL |
Abstract: |
This paper provides a summary of software engineering process and its importance
in open system industry. It describes the agent oriented software engineering
development lifecycle. It also focuses on orientation of multi agent systems and
on some representative agent oriented software engineering methodologies such as
Gaia, ROADMAP, Tropos, and MaSE which are general purpose methodologies. Then it
describes some special purpose methodologies such as ADELFE and SADDE. It also
presents the phases for each methodology with its strengths and weaknesses.
Finally it proposes the development of a new model that combines the features of
two of the existing methodologies which are Gaia and Tropos by concentrating on
their strengths and avoiding their weaknesses. |
Keywords: |
Agent Oriented Software Engineering Methodologies, Multi Agent Systems, Software
Engineering Process |
Source: |
Journal of Theoretical and Applied Information Technology
pp 396 - 402 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE FORMAL TRIPLE I INFERENCE METHOD FOR LOGIC SYSTEM W*UL |
Author: |
MINXIA LUO, NI SANG, KAI ZHANG |
Abstract: |
In this paper, the formal triple I inference method based on logic system is
investigated. Firstly, a new complete formal system , which is the schematic
extension of uninorm logic system , is given. A complete many-sorted first-order
formal system for fuzzy predicate logic is structured. Secondly, triple I
solutions (including FMP-solutions, FMT-solutions) based on logic system are
given. Lastly, triple I algorithms are formalized in logic system , and the
strict logic proof of triple I algorithms are given. Moreover, the reductivities
of the triple I algorithms are proved |
Keywords: |
Fuzzy Logic, Fuzzy Reasoning, Triple I Algorithm, Many-sorted First-order Formal
System, Logic System |
Source: |
Journal of Theoretical and Applied Information Technology
pp 403 - 410 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
AUTOMATIC TEST CASE GENERATION BASED ON GENETIC ALGORITHM |
Author: |
DAN LIU, XUEJUN WANG, JIANMIN WANG |
Abstract: |
For the problem that Genetic Algorithm (GA) suffers from large iteration times
and low efficiency in test case generation, this paper proposes a Modified
Genetic Algorithm (MGA). The algorithm adopts real number coding and the
principles of logic coverage, while the fitness function is to be improved. In
addition, it adds genetic-oriented control. The algorithm is conducive to
population diversity and avoids premature convergence phenomenon. Experimental
result shows that MGA has faster convergence speed and higher test data
generation efficiency compared with traditional genetic algorithm. |
Keywords: |
Genetic Algorithm, Test Case Generation, Logical Coverage |
Source: |
Journal of Theoretical and Applied Information Technology
pp 411 - 416 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
A NEW DESIGN OF MULTIVARIABLE DECOUPLING INTERNAL MODEL CONTROLLER |
Author: |
HUANGLIN ZENG, KAIQIANG XIAO |
Abstract: |
This paper is concerned with the design of multivariable decoupling internal
model controller in industrial processes with large time delay characteristics,
as well as linkages between controlling loops coupled. Some new results are
obtained as follows: Design of multivariable decoupling internal model
controller is realized by two step way that is decoupling device and controller,
and they are separately designed. Decoupling control is based on system transfer
function matrix and a diagonal matrix decoupled is equivalent to a system
reference model. A foreword feedback control module is designed to remove
minimum phase, then a high order low-pass filter is designed for filtering an
error of actual output and model output. Equivalent model part integrated with
the internal model controller is equivalent to IMC-PID controller by analytical
method to simplify adjusting parameters of IMC. The dynamic characteristics,
robustness of system and anti-interference performance under conditions of model
mismatch and existing interference have been tested by experimental simulation.
It is shown that the feasibility and the effectiveness of design of
multivariable decoupling internal model controller proposed here. |
Keywords: |
Multivariable decoupling, Internal model controller, PID controller, Robustness |
Source: |
Journal of Theoretical and Applied Information Technology
pp 417 - 422 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
DISCUSSION ON VOCATIONAL EDUCATION OF URBAN MIGRANT WORKERS AND INFORMATION
COMMUNICATION TECHNOLOGY IN CHINA |
Author: |
WENBIAO LI |
Abstract: |
Urban Migrant Workers in China have been an important power to promote the
urbanization in China and economic growth. Because the overall qualities of
migrant workers are not high, and they are lacking of professional labor skills,
most of those migrant workers are not sufficiently qualified for various
industries development, and the high and new technology in widespread use and
the optimization and upgrade of traditional enterprises even make the problem
more serious. This paper concerns current migrant workers vocational education,
survia issue, using of Information Communication Technology in it and proposes a
related suggestion and puts forward some corresponding solutions. |
Keywords: |
Urban migrant workers, Vocational education, Information Communication
Technology (ICT) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 423 - 428 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
EXPERIMENTAL CHAOS IN A TWO-DEGREE-OF FREEDOM VIBRATION SYSTEM WITH TIME-DELAY
FEEDBACK |
Author: |
QING-CHAO YANG, SHI-JIAN ZHU, JING-JUN LOU, HAI-PING WU |
Abstract: |
In this paper, numerical simulations are carried out to verify the feasibility
of the time-delay feedback in controlling the motion from order to chaotic, and
then an experiment is implemented based on two-degree-of-freedom vibration
system. Results show that time-delay feedback control is effective and simple in
chaotifying practical mechanical system. This study is of great importance in
applying the chaos-based theory of reducing line spectra to engineering
practice. |
Keywords: |
Experiment, Chaos; Time-Delay Feedback, Mechanical System |
Source: |
Journal of Theoretical and Applied Information Technology
pp 429 - 435 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
CONTROL SYSTEM DESIGN FOR 100KN DOUBLE COLUMN UNIVERSAL HYDRAULIC MACHINE |
Author: |
XIAOLI WANG, YU WU |
Abstract: |
Working process and load need of double column universal hydraulic machine
determined hydraulic priciple scheme and selected the entire hydraulic
components model. Using a combination style of hydraulic and electrical system
control to design PLC (programmable logic controller)-based electric control
system. This system had three operating modes- adjustment, manual, automatic,
and could realize two forming processes-constant pressure and costant stroke.
Thuswe improved the deficiency of traditional relay control. Analyzing the
system’s hardware and software design, and provide hardware schematics and
software programs. All programs were debugged with GX Developer software in this
study, and work performance and stability of the hydraulic machine were
improved. |
Keywords: |
Hyaraulic Machine, Programmable Logic Controller, Automatic Control |
Source: |
Journal of Theoretical and Applied Information Technology
pp 436 - 441 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
DESIGNATION AND SIMULATION OF EQUIPMENT INTEGRATED PM2.5 AND MERCURY REMOVAL |
Author: |
XIAOWEN HAO, WEILONG ZHAO YI’E ZHAO |
Abstract: |
PM2.5 and Mercury in the atmosphere is mainly from the coal-fired power plants.
But the PM2.5 and Mercury removal efficiency for most of the power plants is not
high enough to satisfy the newest national standard. A new technology named
Equipment Integrated PM2.5 and Mercury Removal with low investment and high
removal efficiency is developed and simulated. The equipment comprises bag
filter to control PM2.5 in upstream of the flue gas and AC absorber to absorb
mercury in downstream. We optimized the flow in the equipment. For the outer
filtering bags and inner filtering bags in bag filter, the uniformity of flow is
got with guide plates. The resistance is lower with guide plates than without
them. Flow in the AC absorber is uniform along the height from simulation. So it
can equally absorb mercury. One AC absorber can operate for many days and can be
replaced easily for regeneration. So the equipment suits the request of the
PM2.5 and mercury removal and has better foreground. |
Keywords: |
Integrated PM2.5 And Mercury Removal, Bag Filter, Activated Carbon (AC)
Absorber, Uniformity, Outer Or Inner Filtering Bag |
Source: |
Journal of Theoretical and Applied Information Technology
pp 442 - 447 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON THE SUPERIOR RATE OF RETURN BASED ON EVENT STUDY |
Author: |
JILIN ZHANG |
Abstract: |
Event Study (or Residual Analysis) is an analysis tool which is often used in
the field of financial research. In this paper, a detailed statement about the
procedures of Event Study has been made. Via the Event Study, the authors have
researched whether there is a superior rate of return in the pilots on the
resume trading day after the sub-owned shares reform was declared by China’s
Securities Regulatory Commission. In this paper, the authors have listed all the
factors possibly influence the superior rate of return as explanatory variables,
accordingly, the superior rate of return on the resume trading day as the
explained variables. Using partial least square regression analysis, a final
conclusion has been made. It shows that the superior rate of return is
positively correlated with the proportion of dividend share in the consideration
plan, and the net capital of previous year, and is negatively correlated with
the scale of board of directors and the share holding proportions of the
controlling shareholders. |
Keywords: |
Event Study, Superior Rate of Return, Sub-owned Shares Reform |
Source: |
Journal of Theoretical and Applied Information Technology
pp 448 - 453 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
MODELING AND MICRO SCALE ANALYZING OF MICRO-SWITCH APPLIED IN ALL-OPTICAL
COMMUNICATION |
Author: |
TIAN WENCHAO, CHEN ZHIQIANG |
Abstract: |
Inductive micro-switch is an integrative device of a sensor and actuator and
widely applied in all-optical-network communication. Its malfunctions related to
“fail-to-closure” and “transient-closure” result in low reliability and weak
anti-jamming capability. A new bistable inductive micro-switch is presented
based on micro electro-mechanical system (MEMS) technology. A sine rough surface
model is used to describe the random distribution of the rough adhesive surface.
Micro size Casimir and van der Waals (vdW) forces are analyzed in detail. The
vdW force includes the repulsive force. Dynamic simulation results are shown to
be in agreement with experimental results. The threshold acceleration was 6.8g,
and the response time was 17.5μs. A “double-snap-back” phenomenon in the
Off-state is discovered. |
Keywords: |
Inductive Micro-Switch; Casimir Force; Van Der Waals Force; Double-Snap-Back |
Source: |
Journal of Theoretical and Applied Information Technology
pp 454 - 459 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
FPGA-BASED DESIGN ON REAL-TIME TOW STAIN DETECTION |
Author: |
JIAN-XIN HUANG, YU-TING TANG, KUN-CHI WANG, CONG-TAO ZHAO, YONG-JIE YANG |
Abstract: |
This paper introduces a tow stain detection method based on FPGA. To capture
moving images through the line scanning CCD in real time and to design
algorithms according to the different characteristics on the tow and stains.Then
download it to FPGA development board running and debugging. Finally,
displayimages on PC through the video conversion module.The experiments show
that this design can effectively detect the stains on the running tow with high
speed. It also has good stability and high error detection rate. |
Keywords: |
FPGA; CCD; Stain Detection |
Source: |
Journal of Theoretical and Applied Information Technology
pp 460 - 464 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
OPTIMIZATION OF DEPARTURE TRAJECTORY FOR NOISE ABATEMENT OF SENSITIVE LOCATIONS |
Author: |
ZHANG YUXIANG, SHEN HUASHUAI |
Abstract: |
Adopting the noise abatement procedures(NAPs) is the common approach for abating
the noise around airport for the international civil aviation. But there is only
one or two procedures used in China. This paper first gives a preliminary model
of optimizing the departure trajectory, which is one of the most important in
the NAPs. Then it proposes two approaches with two algorithms respectively, the
ant colony algorithm and the relaxed lexicographic algorithm, to solve the
problem. The two approaches will be compared in the nature of themselves, and
the simulation results will verify the feasibility of the both algorithms. It
provides the foundation for the next further study. |
Keywords: |
Departure Trajectory, Ant Colony Optimization, Lexicographic Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
pp 465 - 470 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON THREE-POINT CENTERING DEVICE OF CYLINDRICAL DRILL PIPE |
Author: |
YUANCHAO ZHANG, XINGLONG ZHU, LONGQIN GAO |
Abstract: |
In the process of tightening up and screwing off the iron roughneck, it is
required that the center of clamping pliers and the center of drill pipe are
coincident, so as to avoid the damage of the circular guide in clamping system,
and to ensure the iron roughneck work normally. While the traditional method of
centering is artificial in iron roughneck, its precision is low, so it is easy
to damage the drill pipe because of the great eccentricity between clamping
pliers and drill pipe, besides, its work efficiency is low. Aiming at the
cylindrical drill pipes, a method of three-point centering based on the
ultrasonic sensors is proposed in this paper, that is to say, through comparing
the feedback of three ultrasonic sensors which are arranged on the same the
circle of clamping pliers’ nips, the center of clamping pliers is adjusted to be
coincident with the center of drill pipe. In this paper, the related hardware
and software system of the automatic centering are designed, and the simulation
experiment is demonstrated by the SimMechanics. The result of simulation
indicates that the method of automatic centering is feasible, and valuable to
engineering application. |
Keywords: |
Automatic centering, Ultrasonic sensor, Simulation, Iron roughneck |
Source: |
Journal of Theoretical and Applied Information Technology
pp 471 - 476 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE IMPROVEMENT OF RESEARCH AND APPLICATION OF BP NEURAL NETWORK IN MEASUREMENT
ROBOT ATMOSPHERIC REFRACTION COEFFICIENT CORRECTION |
Author: |
ZHOU, JING1 ZHANG, XIQIAN TANG, QINGRONG |
Abstract: |
Measurement Robot is a kind of full-automatic and high-precision measuring
instrument, but its height measurement has a biggish error because of the effect
of atmospheric refraction. Using the artificial neural network to correct the
atmospheric refraction is the relatively advanced solving method at present.
However, the traditional BP neural network has some disadvantages. This paper
proposes out an improved BP neural network, by improving its weight, the neural
network has the self-adapting ability and quicker learning speed. According to
the experiments, the predictive effect is good and the height measurement
problem of the Measurement Robot has been solved well. |
Keywords: |
Measurement Robot, Atmospheric Refraction, BP Neural Network |
Source: |
Journal of Theoretical and Applied Information Technology
pp 477 - 480 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
FREQUENCY RESPONSE OPTIMIZATION OF A RECTANGULAR PLATE BASED ON HYPERWORKS |
Author: |
HONGWEI YAN, WANWAN PENG, HUISHAN LU |
Abstract: |
This paper demonstrates the capability of frequency response optimization using
the Optimal Structure. Initially, an existing finite element model of a flat
plate is retrieved and modal frequency response analysis is performed to derive
the peak magnitude. A dynamic response optimization is then performed on the
same plate to obtain a new design. The new design gives an optimized material
layout with a minimized peak response. Post-processing tools will be used in
Hyper View to visualize ISO-Plots, magnitude, and phase of the complex
displacement results. |
Keywords: |
Hyper works, Modal Analysis, Material Optimization, Minimized Peak Displacement |
Source: |
Journal of Theoretical and Applied Information Technology
pp 481 - 484 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
VIRTUAL LABORATORY TEACHING QUALITY EVALUATION MODEL BASED ON ROUGH SET AND
SUPPORT VECTOR MACHINE |
Author: |
ZUFENG ZHONG |
Abstract: |
Virtual laboratory teaching quality evaluation helps to realize scientific
teaching management. Virtual laboratory teaching quality evaluation is
multi-level and multi-objective system engineering. In this paper, a teaching
quality evaluation model based on rough set (RS) and on improved Binary-Tree and
multi-category support vector machine (SVM) was provided. Firstly, the attribute
reduction of RS was applied as a preprocessor to delete redundant attributes and
conflicting objects without losing efficient information. Then an improved
multi-category SVM based on Binary-Tree classification model was built to make a
forecast. Finally, the model was applied to validation. Results show that this
model performs well both in data classification accuracy and predictive accuracy
with wide applicability. |
Keywords: |
Virtual Laboratory; Quality Appraisal System; Rough Set; Support Vector Machine |
Source: |
Journal of Theoretical and Applied Information Technology
pp 485 - 489 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
DIGITAL MANUFACTURING SYSTEM DESIGN FOR LARGE AREA MICROSTRUCTURE BASED ON DLP
PROJECTOR |
Author: |
ZHAO XUEJIN, ZHANG CHENGRUI |
Abstract: |
There are numerous industrial applications that require the capability of
fabrication micro-scale features in large areas, e.g. the fabrication of human
kidney with small features such as blood vessels, or adding micro-scale surface
textures on a large area. By using a digital micro-mirror device (DMD), the
digital light procession (DLP) based projector can generate the mask images used
for stereolithography apparatus (SLA), which can help to achieve much higher
efficiency and lower cost. Due to the limitation of the resolution of the DMD
mirrors, for large area part, we cannot get a high resolution from each
projected pixel. We modify the optical systems of the projector and make the
projected image focused on a smaller area. Then in order to achieve a large area
fabrication, we use another two axes to extend the building area. Also some
image processing work has been done to make the projected images more uniform. A
testbed has been developed to verify this additive manufacturing process. |
Keywords: |
Additive Manufacturing (AM), Mask Images Projection Stereolithography,
Micro-scale fabrication, DLP Projector |
Source: |
Journal of Theoretical and Applied Information Technology
pp 490 - 495 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
EFFICIENT TRAINING OF RBF NETWORKS VIA THE KURTOSIS AND SKEWNESS MINIMIZATION
LEARNING ALGORITHM |
Author: |
LIN WANG, JINWEN MA |
Abstract: |
Radical Basis Function (RBF) networks have been widely used in time series
prediction because of their simplicity, robustness, good approximation and
generalization ability. However, it is still rather difficult to select the
number and locations of the hidden units of the RBF network appropriately for a
specific time series prediction problem. In this paper, the Generalized RBF
networks have been established with Gaussian density functions instead of
Gaussian functions for the hidden units. Then, we utilize the kurtosis and
skewness minimization criterion as well as the corresponding learning algorithm
to select the appropriate number and initial parameters of the hidden units from
an input data set automatically for the generalized RBF network on a time series
prediction task. It has been demonstrated by the experiments that the
generalized RBF network trained with the kurtosis and skewness minimization
learning algorithm is feasible and efficient on typical chaos time series. |
Keywords: |
Radical Basis Function (RBF) Network, Time Series Prediction, Kurtosis and
Skewness Minimization Criterion |
Source: |
Journal of Theoretical and Applied Information Technology
pp 496 - 504 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
INTEGRAL OBJECTS SEGMENTATION WITH PROXIMITY CONSTRAINTS |
Author: |
YANQIAO ZHU, JINWEN MA |
Abstract: |
Image segmentation is one of the fundamental techniques in image processing and
computer vision. General clustering-based methods of image segmentation only
consider morphological features such as intensity and/or texture at single pixel
level, which usually leads to incomplete segmentation of objects. The case is
even worse when some noise emerges. In this paper, features with proximity
constraints are proposed for integral segmentation of image objects, which can
provide complete and meaningful segmentation results. |
Keywords: |
Image Segmentation, Proximity Constraints, Clustering Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
pp 505 - 510 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
FREQUENCY TRANSFORMERS COMMUNICATION APPLICATION IN ANTI-COLLISION SYSTEM OF
CRANES |
Author: |
SUN JIANPING, TANG ZHAOPING, YIPING LUO |
Abstract: |
In the paper, the ultrasonic sensor checking device union PLC communication
function was introduced, which was applied to anti-collision protect system of
multiple bridge cranes stride over the same rack in the railroad service
workshop. The hardware and software system were designed which could communicate
directly between FX2N series PLC and FREQROL series frequency transformers. PLC
uses FX2N-ROM-E1 functions expanded memory. When the two vehicles reach a safe
distance, it can promptly control carts frequency transformers’ operating
frequency, realize information communication and the intelligent remote control
between multiple bridges cranes stride over the same rack. |
Keywords: |
Bridge Crane, Frequency Transformers Communication, PLC, Ultrasonic,
Anti-collision Device |
Source: |
Journal of Theoretical and Applied Information Technology
pp 511 - 516 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE EXTENSION ASSESSMENT METHOD OF THE AUTOMATIC VISUAL INSPECTION SYSTEM |
Author: |
FENGHUA DING, MINGXIN LIN, JILI LU, YUE YU, DE WU |
Abstract: |
The multilevel extension priority degree evaluation method is applied to the
automatic visual inspection (AVI) system evaluation area, which is affected by
many factors. In this paper, the AVI system for integrative hierarchical model
is built, and each factor relative weigh is determined using the analytic
hierarchy process (AHP). Finally, the designed AVI system is evaluated by the
multilevel extension priority degree evaluation method. A combination of
qualitative and quantitative evaluation method proposed in this paper
effectively solves the quantitative evaluation problem of the AVI system. |
Keywords: |
Automatic Visual Inspection (AVI), Measuring Index, Priority Degree Evaluation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 517 - 521 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
VEHICLE RECOGNITION BASED ON MULTI-SCALE OF GAUSS BACKGROUND MODELING |
Author: |
ZHONGHAI LI, PENGBO YU, CHUNYU LIU, QINGCHENG ZHANG, JIANGUO CUI |
Abstract: |
In the intelligent traffic system, vehicle recognition is always a hot topic.
However, because the environment is easily influenced by the light, the weather,
the shadow and the noise. It’s difficult to get ideal vehicle segmentation
effect. This paper studies the existing background modeling algorithm and
proposes a vehicle recognition method based on multi-scale of Gauss background
modeling. This algorithm divides traffic image into several parts and
multi-scale analysis, and extracts multi-scale features of the image. Describe
the multi-scale features by using the mixed Gauss model, thus realize background
modeling of the complex traffic image. This algorithm can be well suited to
sudden change in the image, and restrain discrete noise points. As the research
shows, the effectiveness of this algorithm solves the problem of the false alarm
pixels interference. |
Keywords: |
Multi-Scale Features,; Mixture Gauss Model, Vehicle Recognition, Background
Subtraction |
Source: |
Journal of Theoretical and Applied Information Technology
pp 522 - 526 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
IMAGE SEGMENTATION METHOD FOR COTTON MITE DISEASE BASED ON COLOR FEATURES AND
AREA THRESHOLDING |
Author: |
DIAO ZHIHUA, WANG HUAN, SONG YINMAO, WANG YUNPENG |
Abstract: |
Cotton mite disease is a common disease. Taking the cotton mite disease as the
research subject, a segmentation method based on color features and area
thresholding is proposed under the complex background. The proposed algorithm is
comprised of three main steps. First, to extract the analogous disease spots
(disease spots and stems) from green plants. Second, some special
characteristics are detected in gray histrogram, afterwards convert the
segmented images into 8 bit gray-scale images based on single thresholding.
Finally, compare the disease spots’ area with stems’ and then segmented binary
images by using area thresholding. The experimental results show that this
algorithm is of effective in segmenting cotton disease spots; the average
correct extraction rate of the algorithm can reach 94.79%. |
Keywords: |
Image Segmentation; Cotton Mite Disease; Color Features; Area Thresholding |
Source: |
Journal of Theoretical and Applied Information Technology
pp 527 - 533 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
JOINT ENERGY AND MUTUAL INFORMATION ACCUMULATION FOR COOPERATIVE MULTI-RELAY
HIGH-SPEED RAILWAY MOBILE COMMUNICATION SYSTEM WITH FOUNTAIN CODES |
Author: |
XIAOFEI DI, KE XIONG, YU ZHANG, DANDAN LI, ZHENGDING QIU |
Abstract: |
In this paper, we investigate how to design effective strategy to improve the
transmission data rate for high-speed railway mobile communication system with
fountain codes. We consider a cooperative multi-relay architecture, where each
relay is equipped with one antenna and the destination is with multiple antennas
deployed. To this end, a new information receiving method at the destination is
proposed, which combines the energy accumulation and mutual information
accumulation together. To evaluate the performance of the proposed method, we
derive the probability density function of the transmission rate in Rayleigh
fading channels, and based on this, we give the average transmission rate of our
method. Since the considered multi-relay architecture with multi-antenna
destination can be regarded as a virtual MIMO system, we compare our proposed
information receiving method with traditional MIMO detection in terms of
transmission rate. Numerical results show that our method achieves higher
transmission rate than using traditional MIMO information detection in
multi-path fading channels. This work also gives some insights that the proposed
information receiving method on the basis of multi-relay multi-antenna
architecture with fountain codes has great potential in improving the system
performance of high-speed railway mobile communications. |
Keywords: |
Fountain Codes, Cooperative Multi-Relaying, Energy Accumulation, Mutual
Information Accumulation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 534 - 541 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
SER-MINIMIZATION RELAY SELECTION FOR TWO-WAY RELAY CHANNELS WITH PHYSICAL LAYER
NETWORK CODING |
Author: |
DANDAN LI, KE XIONG, YU ZHANG, XIAOFEI DI, ZHENGDING QIU |
Abstract: |
This paper explores the relay selection scheme for two-way relay channels with
physical layer network coding (PNC), where two end nodes exchange information
via a selected relay node with the minimal symbol error rate (SER) performance
among multiple candidate relay nodes. To reduce the computational complexity, we
also propose a suboptimal minimal SER-based relay selection. The end-to-end SER
performance of the proposed suboptimal scheme is analyzed. It is proved that
full diversity order can be achieved by the suboptimal scheme if the set of
candidate relays includes all relay nodes in the system. Extensive simulation
results show that the proposed relay selection scheme can considerably improve
the SER performance of two-way relay networks with PNC. |
Keywords: |
Physical Layer Network Coding (PNC), Relay Selection, Symbol Error Rate (SER) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 542 - 549 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
HARDWARE IMPLEMENTATION OF TASK MANAGEMENT IN EMBEDDED REAL-TIME OPERATING
SYSTEMS |
Author: |
SHI-HAI ZHU |
Abstract: |
Embedded Real-Time Operating System is widely used in more and more application
fields, such as aerospace, missile guidance, automobile electronics and
construction of nuclear power plants. In order to meet the needs of market, it
is necessary to improve fundamentally the performance of embedded real-time
operating system. Logically speaking, hardware is equivalent to software. Any
instruction can be executed by either hardware or software. Along with the
development of semiconductor technology and the trend of hardening software, the
boundaries between software and hardware have become more and more blurred; all
these have provided more convenience to implement embedded real-time operating
system by hardware. As is known to all, task management is one of the most basic
functions of operating systems, therefore we take real-time operating system μC/OS-II
as an example to perform hardware design of task management in this paper, and
implement the hardware circuits to create, delete tasks and the logic circuit of
ready list. The simulation results show that the hardware realization of task
management holds the correctness of system calls besides reduces their execution
time and the overhead of processors. |
Keywords: |
ERTOS, Task Management, FPGA, Hardening Software, TCB |
Source: |
Journal of Theoretical and Applied Information Technology
pp 550 - 555 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
RAPTOR CODES FOR REAL-TIME MUD PULSE TELEMETRY IN M/LWD SYSTEM |
Author: |
YU ZHANG , KE XIONG , XIAOFEI DI , DANDAN LI, ZHENGDING QIU |
Abstract: |
The Measurement/Logging While Drilling (M/LWD) system is a kind of sensors
system which is used to help oil/gas drilling field technicians to steer well
drilling. In M/LWD, several kinds of sensors are installed into drill string to
measure the underground logging data during well drilling operations, and a sink
within the drill string collects the logging data from the sensors and then
transmits the collected data to the surface site by mud pulse telemetry. Since
the drilling mud channel is an erasure channel with very limited feedback, the
surface site has to protect against erasure by means of a suitable form of error
control in real time. To improve the transmission efficiency of M/LWD system,
this paper proposes a Raptor Codes based Transmission (RCT) scheme for reliable
real-time logging data transmission in M/LWD systems, where the original logging
data can be recovered at the surface site without traditional mechanisms,
including erasure correction code (ECC) and Automatic Repeat Request (ARQ),
which thus greatly improves the bandwidth efficiency. To further enhance the
transmission performance, we introduce the Differential Pulse Code Modulation (DPCM)
and short-length Raptor codes to the proposed RCT scheme. Extensive experiments
performed with real logging data show that RCT scheme achieves good erasure
decoding performance to provide precise enough results for drilling field
technicians and also achieves good real-time performance. |
Keywords: |
Measurement/Logging While Drilling; Short-Length Raptor Codes; Reliable Logging
Data Transmission. |
Source: |
Journal of Theoretical and Applied Information Technology
pp 556 - 561 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
ALGORITHM DESIGN OF SECURE DATA MESSAGE TRANSMISSION BASED ON OPENSSL AND VPN |
Author: |
SHI-HAI ZHU |
Abstract: |
In order to solve the safety problem that remote or mobile users can perform
secure data transmission among different computers via enterprise internal
network, conventional approach is to establish VPN connection. The transmitted
data via VPN network must be encrypted so as to ensure that illegal users are
unable to read them, therefore data security of VPN network depends entirely on
the strength of the adopted encryption algorithm. In this paper we propose a
secure data transmission algorithm based on OpenSSL and VPN. It combines both
the characteristics of asymmetric password system and symmetric crypto-system,
and provides a good and fast way for the safety of information transmission. On
the whole, the algorithm has such advantages as simple principle, higher
security, and so on. Meanwhile it is more convenient to be implemented by
hardware and software, better meeting design criteria of encryption algorithm.
Besides, our practice in water conservancy practice shows that the adoption of
this algorithm can well realize fast and secure information transmission. |
Keywords: |
OpenSSL, VPN, Digital Signature, Encryption Algorithm, Decryption Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
pp 562 - 569 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
A SECURE SCHEME FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS |
Author: |
YUQUAN ZHANG |
Abstract: |
A secure scheme for heterogeneous wireless sensor networks is presented. The
wireless sensor networks have some sensor nodes and heterogeneous sensor nodes
that have greater power and transmission capability than other nodes have. All
kinds of sensor nodes are evenly distributed respectively in entire sensing area
that is divided into a number of same cells and logical groups evenly. The
pairwise keys between nodes including all kinds of nodes are set up through
employing the concept of the overlap key sharing, the grid-based key
predistribution scheme, and the random key predistribution scheme. The
two-dimensional sensing square is divided into a number of small squares called
cells, four of which are comprised of a cluster called logical group for class 1
nodes. Analysis shows that both the security and the connectivity of wireless
sensor networks have been enhanced evidently with some heterogeneous nodes. |
Keywords: |
Heterogeneous Wireless Sensor Networks, Security, Connectivity, OKS |
Source: |
Journal of Theoretical and Applied Information Technology
pp 570 - 576 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
A NEW KIND OF IPV6 TUNNEL DESIGN TO SUPPORT NAT |
Author: |
JUNYUN WU, CAIYUN XIE |
Abstract: |
In the process of building IPv6 transition network, there are three commonly
used methods of transition: double-stack technology, tunnel technology and
address translation. But none of them can traverse NAT. Considered this
condition, this paper advances a new solution based on Client / Server
technology for traversing NAT. It summarizes the technological challenges and
analyzes possible scenarios during the transition from IPv4 to IPv6, and
proposes a new protocol based on tunnel technology. This new technology needs
less equipment and can greatly facilitate users. The result of the experiment
shows it obtains better effect. |
Keywords: |
IPv4, IPv6, Tunnel, NAT Traversal |
Source: |
Journal of Theoretical and Applied Information Technology
pp 577 - 581 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
HIDDEN HOPS AWARE LOAD BALANCING BASED ON GREEDY APPROACH |
Author: |
BIN-BIN HUANG, RONG-HENG LIN, HONG-XIA ZHANG, HUA ZOU, FANG-CHUN YANG |
Abstract: |
Virtual network mapping is one of the main problems in network virtualization.
At present, virtual networking mapping aims at minimal resource consumption at
substrate network, but ignores the resource demanded by the hidden hops, making
bottlenecks due to the resource shortage at the hidden hops. This paper aims at
the simultaneous loading balance of the substrate node and the substrate link,
mathematically formulates the virtual networking mapping problem constrained by
hops, and solves it by using greedy algorithm. Our experiments show that this
algorithm eliminates resource bottleneck efficiently, provides a more balanced
substrate network for the request of the consequential virtual network request,
thus improving the constructing success rate of virtual network, the
availability of network resources and the profits of the infrastructure
providers. |
Keywords: |
Virtual Network Mapping, Hidden Hops, Load Balancing, Greedy Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
pp 582 - 588 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS AND EXPERIMENT OF DYNAMIC CHARACTERISTICS OF ELECTRONIC DEVICE CHASSIS |
Author: |
HE QING, DU DONGMEI, JIANG XUCHAO |
Abstract: |
During design process of electronic device chassis, dynamic analysis plays a
very important role in improving its environment adaptability. After analyzing
characteristic of chassis, a finite element model is established and employed.
The analysis model and its harmonic responses based on the ANSYS are presented.
The reasonable of the finite element model is verified by the experiment results
of sweep frequency excitation vibration to typical electronic device chassis
used in nuclear power station. Vibration modal analysis shows the weakest
location of the chassis. |
Keywords: |
Electronic Device Chassis, Finite Element Model, Vibration Characteristics,
Sweep Frequency Experiment |
Source: |
Journal of Theoretical and Applied Information Technology
pp 589 - 594 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
A FINANCIAL SERVICES CASE STUDY OF SOA BASED ON CEP |
Author: |
XIANGSHENG KONG |
Abstract: |
With the growing amount of information in various domains, real-time retrieval
and analysis is the most frequently used operation. The integration of
service-oriented architecture (SOA) and Event-Driven Architecture (EDA) known as
event-driven SOA (ED-SOA) has been widely adopted for developing various kinds
of real-time applications. We describe a generic approach with an ability to
perform complex event publishing, querying, analysis, processing and integration
with SOA. Finally, a financial services case of SOA based on complex event
processing (CEP) is provided in this paper. Our study shows that it is
beneficial not only in reducing the development complexity, but also in coping
with dynamic changes at all abstraction levels. |
Keywords: |
SOA; EDA; CEP; Sliding Windows; EPL |
Source: |
Journal of Theoretical and Applied Information Technology
pp 595 - 599 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
MODELING USER INTERESTS USING TOPIC MODEL |
Author: |
QINJIAO MAO, BOQIN FENG, SHANLIANG PAN |
Abstract: |
In recommender systems, modeling user interest is a basic step to understand
user's personal features. Traditional methods mostly just use the items that the
target users navigated as their interests, which makes the inherent information
unclear to the system and thus the recommendations are not intelligent enough.
In this paper, we investigate the utility of topic model called LDA for the task
of modeling user interests which are assumed as the latent variables behind user
activities in the systems. By using such a probabilistic model on the generation
of user profiles, the relationships amongst user、item and interest are
constructed. Each user can be considered as a generation of the model. Based on
this user interest model, we propose three item ranking methods for personalized
recommendation. In order to get a better model for each algorithm, we use a
simple automatic parameter turning way to select the model parameters. After
carefully selecting the parameters, our methods can all receive encouraging
results for recommender systems. |
Keywords: |
Topic Model, User Interest, Recommender System, Collaborative Filtering |
Source: |
Journal of Theoretical and Applied Information Technology
pp 600 - 606 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON DESIGN FIR DIGITAL FILTER USING MATLAB AND WINDOW FUNCTION METHOD |
Author: |
TAO ZHANG |
Abstract: |
Traditional design method of digital filter is complicated but getting no
direct-vision output. The paper utilized Matlab to solve the problem because of
its ability of scientific compute and advantage of figure demonstration. On the
base of analyzing window function method, this paper performed simulation
calculations applying Matlab and window function method to design digital
filter. Observing the output of filter, the paper achieved the desired results
with its high precision and velocity. |
Keywords: |
Window Function Method (WFM), FIR Digital Filter (FDF), Matlab |
Source: |
Journal of Theoretical and Applied Information Technology
pp 607 - 611 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
ON THE METHOD AND MODEL OF ENERGY ENTERPRISE PROJECT PORTFOLIO SELECTION AND
OPTIMAL ALLOCATION OF RESOURCES |
Author: |
WU YUNNA, CHEN JIAN, LIU CHAO,WANG HEPING |
Abstract: |
With a series of new energy construction projects of China in full swing, such
as 10 million kilowatt wind power base, solar photovoltaic power generation
clean energy base, the new rural biomass energy projects and nuclear power
development and construction projects, the major power generation groups, as
well as the investors represented by private capital, take this opportunity to
have entered the field of new energy construction. The number of new energy
projects increases, each investor is bound to be faced with the problems of
portfolio and investment decisions of Item sets, as well as the problems of
allocation of resources and optimized combination of multiple projects in the
process of building at the same time. Traditional single-project management
includes the management content such as project scope, time, cost, quality,
risks and so on, while project portfolio management exceeds the boundaries of
the traditional project management and combines the project implementation and
business strategy as a bridge between corporate projects and strategies. From
the view of project portfolio selection, optimal assessment, resource
optimization and so on, the article introduced the methods and models of the
major aspects of the portfolio management of the new energy projects. |
Keywords: |
Corporate Strategy, Project Portfolio Selection, Optimal Assessment, Optimal
Allocation Of Resources |
Source: |
Journal of Theoretical and Applied Information Technology
pp 612 - 619 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
WORKFLOW SYSTEM DESIGN FOR NEW ENERGY PROJECT ORIENTATED COMPANY BASED ON
PROJECT CLUSTER |
Author: |
WU YUNNA, CHEN JIAN, LIU CHAO,WANG HEPING |
Abstract: |
To respond to the national call of the development of new energy, each
state-owned electric corporation and even the private investors, take this
opportunity to invest new energy projects and set up new energy project
companies to manage the projects cluster. The main problem of management is how
to reduce cost and promote efficiency and enhance the core competitiveness of
enterprises. Some electric corporation have many new energy projects scattered
in different distributes, and the project management process is more complicated
than single project management, increasing the management difficulty. To solve
this problem, it is significant and necessary to establish the project
management system in line with Chinese new energy enterprises invested projects
management features based on project cluster management theory. In practical
applications, the project cluster management system is not a single information
system, but the integration made up of several information systems. This article
focuses on workflow system design based on the new energy project cluster
management theory, and makes it come true with a collaborative office system. |
Keywords: |
Project Cluster Management; Collaborative Office; Workflow |
Source: |
Journal of Theoretical and Applied Information Technology
pp 620 - 625 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN IDENTIFICATION METHOD FOR THE HUB NODE OF URBAN TRANSPORT NETWORK BASED ON
THE LOCAL MODULARITY |
Author: |
LIU SHAO-HAI, WU JIN- ZHAO, AN NA |
Abstract: |
It is a major scientific theoretical significance and practical value that the
identification of the hub node in the transport network. This paper presents a
new method which can detect the hub node of the urban transportation based on
the idea of local modularity measure. Evaluation indicators include node degree,
clustering coefficient, peak hour traffic flow. First, apply a complex network
of local modularity Societies division method. Second, looking for societies
where the node with the largest peak-hour traffic flow .Last, identify the hub
nodes in the transport network. Since the algorithm is reflected from the static
and dynamic characteristics of the transport network node, it is the Hub node
identification in the transport network that is a high degree of accuracy.
Through the surrounding junctions along the Chang'an Avenue in Beijing as an
example, verify the feasibility of the method. |
Keywords: |
Complex Networks, Urban Transport Network, HUB node , Local Modularity |
Source: |
Journal of Theoretical and Applied Information Technology
pp 626 - 631 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON RESOURCE SCHEDULING ALGORITHM BASED ON FUZZY CLUSTERING AND SMART
AGENTS IN CLOUD COMPUTING |
Author: |
FUFANG LI, DONGQING XIE, DEYU QI, LINGXI PENG, YUANYONG FENG, GUOWEN XIE |
Abstract: |
Cloud computing has been a hot spot in recent years. In complex and dynamically
changing cloud computing environment, resource management and scheduling is a
hard and challenging problem, and should be solved at first. This paper presents
an effective resource management model and the corresponding resource scheduling
algorithm is based on fuzzy clustering and smart agent. With the help of fuzzy
clustering method, the proposed model and algorithm can accurately and
effectively schedule resources to the resource requestor which exactly meet it’s
needs of resource, while skillfully avoiding unreasonable scheduling of
resources. Moreover, by using smart agent technology, the presented model and
algorithm can also adaptively and intelligently manage and schedule the cloud
resources smartly and robustly. Simulation experiments show that the proposed
approach is advanced and reasonable. |
Keywords: |
Resource Scheduling Algorithm, Cloud Computing, Fuzzy Clustering, Smart Agents,
Self-Adaptive |
Source: |
Journal of Theoretical and Applied Information Technology
pp 632 - 637 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
AGENT BASED ENGINEERING DESIGN SIMULATION AND OPTIMIZATION UNDER UNCERTAINTY |
Author: |
YEFEI LI, HUANHUI CHEN, FANGYU LI, MINGQUAN SHI |
Abstract: |
In this paper a multi-agent based simulation and optimization framework was put
forward to solve the aleatory and epistemic uncertainty in engineering design.
Agent structures were designed to extract engineering knowledge from experiments
and simulation and to communicate an internal message and domain engineering
knowledge base. The framework can deal with complicated time-varying structure
analysis. A prototype simulation for working equipments of an excavator was
developed. The research results provide a feasible methodology to fuse
multidisciplinary uncertainty information in agent environment. |
Keywords: |
Multidisciplinary Optimization, Multi-Agent System, Uncertainty Reduction
Theory, Time-Varying Structure |
Source: |
Journal of Theoretical and Applied Information Technology
pp 638 - 641 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH OF SERVICE ORIENTED FITNESS BASED ON MULTI AGENT |
Author: |
FANGYU LI, YEFEI LI, HUANHUI CHEN, MINGQUAN SHI |
Abstract: |
With the development of modern fitness, people pay more attention to customized
sport fitness. This paper puts forward a service oriented fitness framework
based on multi agent technology. Firstly, a service strategy for fitness was
constructed through portals. Fitness resource nodes were distributed and
organized in an internet or intranet. Secondly, with the help of agents of
fitness demands and service, a customized fitness service process based on
fitness database was built for specific person according to his physical
condition and fitness domain. Thirdly, the whole service process of this
intelligent fitness system for lower limb was illustrated as a case to show the
effects. The agents collected exercisers' physiological information and provided
an appropriate advice on customized fitness. |
Keywords: |
Multi Agent, Service Oriented Fitness, Intelligent Portal, Low Limb Exercise |
Source: |
Journal of Theoretical and Applied Information Technology
pp 642 - 645 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN EVOLUTIONARY GAME MODEL IN MOBILE BUSINESS COMMERCE CUSTOMER TRUST |
Author: |
LING-BING GUO, XIN-XING LUO, MING-XUN ZHU |
Abstract: |
Customer’s trust is the key element for mobile commerce's success. The formation
and development of customer trust is an evolutionary process, which is effected
by merchants’ characteristics and their behaviors, customers themselves and the
interaction between them. This research analyzes how to achieve the status of
ESS with the effect of various factors on consumer trust based on evolutionary
game theory, then simulates the process with the Netlogo software platform. It
suggests that m-merchants should focus on the factors which generate more
satisfaction and trust among customers, and for supervision and control,
policies should be more scientific to effectively find and punish the business
of the fraud, on the other hand, provides appropriate slack environment in order
to facilitate rapid development of mobile commerce. |
Keywords: |
Mobile Commerce (M-Commerce); E-Commerce; Trust; Evolutionary Game; Netlogo
Simulation; Data Mining |
Source: |
Journal of Theoretical and Applied Information Technology
pp 646 - 654 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
IMPROVING OOS USABILITY OF SOFTWARE TECHNOLOGY IN HIGHER EDUCATION IN CHINA |
Author: |
XIANGSHENG KONG |
Abstract: |
The increasing popularity and use of Open Source Software (OSS) have led to
significant interests from research communities and enterprise practitioners,
notably in higher education in China where this type of software offers
particular benefits given the financial and human capital constraints faced.
Software Technology assumes the mission of improving Intellectual Property (IP)
and software innovation in China. The research looks at implications of the
emerging IP regime for China and it attempts to improve software technological
capabilities. The paper outlines how OSS can support the educational process of
Software Technology in general and the WEB Application Development in
particular. The primary objective is to identify suitable tools from the
open-source landscape and then validate and prove their integration within a
real-life Application Development scenario. |
Keywords: |
OOS, proprietary software, Intellectual Property, SDLC, CASE |
Source: |
Journal of Theoretical and Applied Information Technology
pp 655 - 660 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
Title: |
CMER: CLASSIFICATION BASED ON MULTIPLE EXCELLENT RULES |
Author: |
XUEJUN WANG, ZHONGMEI ZHOU, JUN ZHENG |
Abstract: |
One of the traditional rule-based classification tasks is to build a set of high
quality classification rules for prediction. Traditional rule-based
classification approaches can achieve high efficiency. However, some traditional
rule-based classification methods usually generate few rules. They may miss some
high quality rules, especially when the training data set is small. Therefore
their accuracy may not be high in some data sets. In this paper, we propose a
new classification approach called CMER (classification based on multiple
excellent rules). CMER is distinguished from other traditional rule-based
classification methods in three aspects. First, CMER constructs a candidate set
and a seed set. Second, CMER connects the seed set with the candidate set to
produce more classification rules at a time. Third, CMER uses the minimum
support and foil gain to update the seed set. As a result, CMER generates more
excellent classification rules, especially when the training data set is small.
Our experimental results show that CMER gets higher accuracy than some
traditional rule-based classification methods. |
Keywords: |
Date Mining(DM), Rule-based Classification(RC), Association Classification(AC) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 661 - 665 Vol. 48. No. 1 -- 2013 |
Full
Text |
|
|
|