|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
February 2013 | Vol. 48 No.2 |
Title: |
SECURE ROUTING IN MANET USING ASYMMETRIC GRAPHS |
Author: |
GUNDALA SWATHI, Y.HARSHAVARDHAN , R.SARAVANAN |
Abstract: |
Identification of neighbours plays a major role of many protocols for wireless
Adhoc networks and also the process of network paths in a network plays an
important role. Wormhole attack is a major issue in networks. This type of
attack causes the opponent to collects packets from one location and channels
them to other location and retransmits them into the network. To avoid the
problem of wormhole attack, so far we have several mechanisms like packet
leashes for detecting against wormhole attack, a counter measure using
directional antennas. Mobile Secure Neighbour Discovery Protocol performs a
measure of security against wormhole attack by participating mobile nodes. In
this paper we uses graph rigidity, Laman theorem for wormhole avoidance and
forbidden graph for wormhole detection. By using these graphs we will provide a
better solution to overcome the problem of wormhole attack in wireless Adhoc
networks. |
Keywords: |
Security, Mobile Adhoc Networks Identification Of Neighbours, Forbidden Graph,
Rigid Graph, Multidimensional Scaling. |
Source: |
Journal of Theoretical and Applied Information Technology
pp 666 - 677 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
HARDWARE AND SOFTWARE IMPLEMENTATION FOR HIGHLY SECURED MODIFIED WIRED
EQUIVALENT PRIVACY (MdWEP) |
Author: |
M.VANITHA, R.SELVAKUMAR, S.SUBHA |
Abstract: |
Wireless communication networks are in huge need and demand due to various
features of internet and its availability and easy accessibility all over the
world. Therefore, advanced security techniques and mechanism are required for
private business application and for effective and secured data transfer from
one network to other. Many common standards such as 6LoWPAN, Zigbee (IEEE
802.15.4-2006), WiFi (IEEE 802.11) and many more are being used for wireless
standard. Many techniques used today having weak security and loop holes that
can easily be attacked to gain access over the networks such as Wired Equivalent
Privacy(WEP) can easily be stabbed with the ample availability of tools and the
data present can be modified or read by the mediator. This paper aims for
developing a Modified Wired Equivalent Privacy protocol (MdWEP) which will give
more reliable communication and security benefits. To implement MdWEP we are
using three cryptography algorithms AES, RSA and MD5. To increase the security
three fold the plain text is passed through three cryptography architecture
namely AES, RSA and MD5. Hardware implementation of this structure will consume
more hardware and power but the speed can be increased by pipelining the output
of each stage. Software implementation does not require huge resources but we
get 3 times secured data. Hardware implementation is being done using xilinx and
software implementation is being done by Java Swing |
Keywords: |
Zigbee, MdWEP, Wireless, IEEE 802.11, Hashing, Security |
Source: |
Journal of Theoretical and Applied Information Technology
pp 668 - 673 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
SECURE KEY SHARING FOR GROUP COMMUNICATION UNDER COMMUNITY CLOUD |
Author: |
K. GOVINDA, E.SATHIYAMOORTHY |
Abstract: |
The cloud is one of the most discussed topics among IT professionals today, and
organizations are increasingly exploring the potential benefits of using cloud
computing or solutions for their businesses. In our modern world people join
hands together to form groups and that forms communities through which the
ability of one can enhance by communicating with others. In order to satisfy
these people over cloud, transformed itself as community cloud. As a cloud
infrastructure that is shared by several organization’s and supports a specific
community, such as healthcare, telecommunication, education and businesses that
has shared concerns around mission, policy and compliance considerations. The
goal of a community cloud is to have participating organizations realize the
benefits of a public cloud -- such as multi-tenancy and a pay-as-you-go billing
structure but with the added level of privacy, security and policy compliance
usually associated with a private cloud. The community cloud can be either
on-premises or off-premises, and can be governed by the participating
organizations or by a third-party managed service provider (MSP). In this
community cloud large number of groups which were formed by huge number users.
At this situation in order to have secure communication and data storage in
cloud, consumers use keys. Though these keys were kept private in many cases
they are in need to be shared at least once for the sake of security. So, in
this paper we are going to discuss a secured protocol through which a community
cloud users can share keys among themselves in a secured manner. |
Keywords: |
Key Graph, Diffie- Hellman, Community Cloud, Super Group, Sub Group |
Source: |
Journal of Theoretical and Applied Information Technology
pp 674 - 679 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
HYBRID DIFFERENTIAL EVOLUTION-ANT COLONY OPTIMIZATION FOR ECONOMIC LOAD DISPATCH
PROBLEM |
Author: |
N.A. RAHMAT, I. MUSIRIN |
Abstract: |
A distinctive optimization technique known as Ant Colony Optimization (ACO) has
gained huge popularity in these recent years due to its flexibility and the
ability to avoid reaching local optima. This optimization approach has become a
candidate approach for many optimization problems. Unfortunately, this
attractive algorithm suffers several downsides including stagnation and slow
convergence toward optimal solution. Thus, a new algorithm, termed as
Differential Evolution Ant Colony Optimization (DEACO) has been modelled to
compensate the drawbacks. The algorithm was utilized to solve economic load
dispatch problem in order to verify its performance. Economic Load Dispatch (ELD)
problem concerns the planning of generators outputs that can meet load demand at
minimum operating cost. Moreover, in this research, several ant parameters,
including number of ants and nodes were manipulated to investigate the behaviour
of DEACO algorithm. Comparative studies between DEACO and conventional ACO
suggested that the new algorithm has successfully overcome the weaknesses of
classical ACO. |
Keywords: |
Ant Colony Optimization (ACO), Differential Evolution (DE), Economic Load
Dispatch (ELD) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 680 - 690 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
IMPLEMENTATION OF A BRUSHLESS DC MOTOR AS A VIRTUAL MOTOR |
Author: |
K. GIRIDHARAN, C. CHELLAMUTHU, S. VISHNU KARTHICK, K. HARIHARAN |
Abstract: |
Due to their simple structure, high efficiency, fast dynamic response, Permanent
Magnet Brushless DC (PMBLDC) machines are extensively used in automation,
consumer electronics, electric vehicles and medical and industrial applications.
Availability of these high energy density permanent magnet materials enhances
the performance of PMBLDC motor drive and also reduces the size and losses in
these machines. Depending on the application the controllers need to be tested,
for which motors of various ratings are required. Utilizing real motors of
different sizes and capacities for development and testing is difficult and
mundane. If the functionality of the motor can be rendered by a system on a
chip, it will reduce the development time. Hence, the development of a virtual
BLDC motor is considered in this paper. A model of the BLDC motor is simulated,
and its characteristics are implemented on a FPGA. It allows the realization of
motors of various ratings to be tested by changing the parameters. This system
functions as time and energy efficient solution for the testing and validation
with out any risk of damage to motor or controller under test. |
Keywords: |
System on Chip (SoC), BLDC, FPGA, Virtual Motor, Controller Validation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 691 - 698 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
KEY BASED APPROACH FOR INTEGRATION OF HETEROGENEOUS DATA SOURCES |
Author: |
KAMSURIAH AHMAD, TENGKU SITI FATIMAH TENGKU WOOK, REDUAN SAMAD |
Abstract: |
Patients’ medical records are very important for practitioners to make medical
related report or provide knowledge for the management to make a decision. With
the advancement of Information Technology, most clinics and hospitals have their
own system to process and to store their own medical data. Different clinics or
hospitals might use different types of data standards, models, or procedures to
process their patients’ medical data. The implication of these is the medical
data cannot be shared by the systems. A proper mechanism is needed so that the
medical data can be integrated and shared among the systems in the hospital.
Existing mechanisms on the data integration are not based on keys. In this
paper, an integrator tool is proposed to integrate the heterogeneous data
sources and mapped into the predefined global schema. The methodology used in
this study consists of four phases: Analysis Phase, Design Phase, Implementation
Phase, and Testing Phase. The proposed tool is efficient in terms of further
improves the results of the integration. Being able to integrate data from
different sources and map into a global view will improve the accuracy of
information in the database. |
Keywords: |
Integration, Heterogeneous Data Sources, Global Schema,Medical Records |
Source: |
Journal of Theoretical and Applied Information Technology
pp 699 - 703 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF ADAPTIVE ALGORITHMS FOR NOISE CANCELLATION IN SPEECH
PROCESSING |
Author: |
M.A.RAJA, Dr.A.SHANMUGAM |
Abstract: |
This paper is proposed to remove the noise from the speech signal in real time
environment. The quality of audio signal can be improved by filtering the
degraded speech signal through adaptive filters. For Noise cancellation widrow &
hoff’s Least Mean Square (LMS) algorithms are being used for simplicity in
implementation. But LMS algorithm has limitation in selection of a certain
values such as step size which implies dilemma in fast convergence rate and
Excess mean square error (EMSE) and results in computational complexity. This
paper analyse the performance of Variable Step Size Normalised LMS , Normalised
Differential LMS with proposed VSSNDLMS with different input signals. Finally,
through simulation results the proposed VSSNDLMS algorithm converges fastly with
minimum mean square error and it is useful in predicting the adaptive filter
performance of various algorithms and the implementation indicate the
improvement in quality of the speech signal. |
Keywords: |
Adaptive Noise canceller (ANC), Excess mean square error (EMSE), VSSNDLMS. |
Source: |
Journal of Theoretical and Applied Information Technology
pp 704 - 707 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
ADDRESSING SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING |
Author: |
S.SUDHA, V.MADHU VISWANATHAM |
Abstract: |
Cloud computing offers a new way to deliver services while significantly
changing the cost structure underlying those services. This new technical and
pricing opportunities change in the way the business operate. It combines the
features of traditional computing technology like grid, parallel and distributed
computing and so on. The aim of cloud computing is to provide a high performance
computing system to the customer with the low cost without relying on their own
infrastructure. The cloud offers the various levels of services like
Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) &
Infrastructure-as-a-Service (IaaS) to the customers over the internet. Since all
the services are offered over the internet, there is a great deal of uncertainty
about security and privacy at various levels are arises. This extensive survey
article aims to address security and privacy issues threatening the cloud
computing adoption at the end user at the various levels (network, host, and
application and data levels). |
Keywords: |
Network Level, Host level, Application level, Data level, Software-as-a-Service
(SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 708 - 719 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
NUMERICAL ANALYSIS STABILITY OF RETAINING WALL WITH RELIEVING PLATE |
Author: |
JIEQUN LIU, LUWANG CHEN |
Abstract: |
Based on shear strength reduction finite element method, stability of retaining
wall with relieving plate has been analyzed. Due to the structure character of
retaining wall with relieving plate, it can be found that fracture surface could
hardly cross the triangle area of between lower wall and soleplate, between
upper wall and relieving plate, so the second fractured surface occurred at
there, which is essentially different with the second fractured surface of
planar retaining wall. There is a reasonable value interval of width of
relieving plate, in which the stability of retaining wall increased with width
of relieving plate increased. There is no influence on shape of the first
fractured surface by different location of relieving plate, except the second
fractured surface. The soil to be failure is between the first fractured surface
and the second fractured surface, in which more soil contained, the earth
pressure on retaining wall increased, the stability of retaining wall decreased.
The stability of retaining wall could be decreased by inclination of filling,
for the principal stress deflected and retaining wall extruded by much soil when
filling inclined. It is suggested to fill the retaining wall by the soil with
low weight, big cohesive strength and big internal friction angle. |
Keywords: |
Retaining Wall, Relieving Plate, Fractured Surface, Stability, Finite Element
Methods |
Source: |
Journal of Theoretical and Applied Information Technology
pp 720 - 727 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
EVALUATION STUDIES ABOUT COLLEGE MULTIFUNCTIONAL GYMNASIUM COMPUTER EVACUATION
UNDER FIRE CONDITIONS |
Author: |
JIARONG WU |
Abstract: |
It’s an important evaluation architecture safety standards about personnel
emergency evacuation under the fire condition, from the development trend of
university gymnasium, it’s relatively rare that based on comprehensive
evaluation the multi-functional gymnasium fire conditions personnel emergency
evacuation study and there is no mature evaluation model can be applied to
practical operation level. Taking the multi functional gymnasium fire evacuation
and the related theory, by using the methods of expert interview and Delphi
survey method, determine the relevant evaluation index set, it includes four
level index, eleven secondary index and thirty three indicators, using this set
of indicators can be completed the emergency evacuation evaluation under the
University multi-purpose stadiums fire condition, established the University
Gymnasium fire evacuation under the condition of fuzzy comprehensive evaluation
model, the model is applied to a university gymnasium of emergency evacuation
assessment, verification of the accuracy of the model, operation and
objectivity, the multifunctional Gymnasium under the condition of fire
evacuation assessment provides the reference. |
Keywords: |
University, Stadium, Fire, Evacuation, Evaluate |
Source: |
Journal of Theoretical and Applied Information Technology
pp 728 - 735 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
TRACK AND FIELD PERFORMANCE OF BP NEURAL NETWORK PREDICTION MODEL APPLIED
RESEARCH - LONG JUMP AS AN EXAMPLE |
Author: |
YONGKUI ZHANG |
Abstract: |
According to the influence of many factors sports scores, the traditional sports
prediction method is difficult to get satisfied with the present situation of
the predicted results. Use the long jump athlete’s special performance and
quality of the relationship between training level, with the aid of the BP
neural network strong nonlinear mapping ability, the paper put forward a long
jump athlete’s special performance of neural network prediction model. The model
is made up of traditional forecasting methods, make full use of the information
contained in the data, compare it with the traditional forecast methods,
prediction accuracy has been greatly improved. In order to solve the field
complicated it is difficult to use traditional mathematics method provides a new
idea and method. Scientific training provides a theoretical basis for the
athletes. |
Keywords: |
The BP Neural Network, Long Jump Athlete, Special Achievements, Prediction
Accuracy |
Source: |
Journal of Theoretical and Applied Information Technology
pp 736 - 740 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN IMPROVED SEMI-SUPERVISED CLUSTERING ALGORITHM BASED ON ACTIVE LEARNING |
Author: |
ZHANG CHUN NA, ZHU YONG YONG, LI YI RAN |
Abstract: |
In order to solve the difficult questions such as in the presence of the cluster
deviation and high dimensional data processing in traditional semi-supervised
clustering algorithm, a semi-supervised clustering algorithm based on active
learning was proposed, this algorithm can effectively solve the above two
problems. Using active learning strategies in algorithm can obtain a large
amount of information of pairwise constraints therefore enhance the proportion
of prior knowledge. And the use of this constraint set projection space, finally
in the mapping of the subspace, the improved K-means algorithm implemented for
data clustering, as the algorithm clustering object is a low dimensional data,
and prior knowledge increased, clustering in time efficiency can be guaranteed,
and also can solve the deviation problem of clustering. The experiment results
show that, with active learning algorithm clustering performance improvement,
was superior to the other two semi-supervised clustering algorithms. |
Keywords: |
Pairwise Constraints; Semi-Supervised Clustering; K-Means Algorithm; Active
Learning |
Source: |
Journal of Theoretical and Applied Information Technology
pp 741 - 748 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN ANALYSIS AND FORECAST OF TOURISM DEMAND BASED ON WEB DATA MINING IN CHINA |
Author: |
GUOJING FAN, ZHIJUN LIU |
Abstract: |
This article explored into the advantages of Web data application in forecasting
tourism demand in China. The authors constructed a mapping relation between Web
information organization and tourism demand, and elaborated the methods of using
Web data mining Carries to analyze and forecast tourism demands and the
principles of constructing the knowledge library based on Web data analysis with
clarified procedures of analysis and forecast. The authors also did an empirical
analysis by taking Shanghai city as a case in point. |
Keywords: |
Web, Data, Tourism, Forecasting, Knowledge Library |
Source: |
Journal of Theoretical and Applied Information Technology
pp 749 - 754 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NEW EAR RECOGNITION METHOD BASED ON FUSION HARRIS AND SIFT |
Author: |
XU CHAO, TIAN YING |
Abstract: |
Ear recognition is an emerging biometric technology. This paper proposes a new
ear recognition method based on SIFT(Scale-invariant feature transform) and
Harris corner detection. Firstly, Harris corner points and SIFT keypoints are
detected respectively. Then taking Harris corner into the SIFT algorithm to
calculate their descriptor as the image feature vectors. Finally the feature
vectors are classified by the Euclidean distance, in order to improve
recognition rate, two-way match is utilized. Experiments on USTB database show
that the recognition rate reaches more 95%. The results prove the effectiveness
of the proposed method in term of recognition accuracy in comparison with
previous methods. |
Keywords: |
Ear Recognition, SIFT, Harris |
Source: |
Journal of Theoretical and Applied Information Technology
pp 755 - 761 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE K-MEANS CLUSTERING ALGORITHM BASED ON CHAOS PARTICLE SWARM |
Author: |
LI YI RAN, ZHU YONG YONG, ZHANG CHUN NA |
Abstract: |
Proposed the Algorithm of K-means (CPSOKM) based on Chaos Particle Swarm in
order to solve the problem that K-means algorithm sensitive to initial
conditions and is easy to influence the clustering effect. On the selection of
the initial value problem, algorithm using particle swarm algorithm to balance
the random value uncertainty, and then by introducing a chaotic sequence, the
particles move speed and position in a redefined, thus solving the initial value
sensitivity, while the algorithm with overall search capability, but also to
avoid the local optimum. The algorithm add acceleration factor and escape factor
in order to improve the time efficiency. Experiment result proved that the
CPSOKM algorithm has a fast convergence speed, high stability, and good
clustering effect. |
Keywords: |
K-means algorithm; Particle swarm; Chaotic sequence; Cluster analysis; CPSOKM
algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
pp 762 - 767 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE DESIGN AND IMPLEMENTATION OF AN EXTENSIBLE FORMAT FOR MEMORY DUMPS |
Author: |
XIAOLU ZHANG, LIANG HU, ZHENZHEN XIE, SHINAN SONG, XIANGYU MENG, KUO ZHAO |
Abstract: |
The preservation, collection, analysis and interpretation of the evidence of
computer crime following the legal procedures has become a major problem on
Computer Forensics, while current available memory dumps formats and technology
have drawbacks. In this paper, we present a format of physical memory dumps
applied to forensics. This new format of memory dumps has provided three major
advantages. First, it is more flexible, based on the characteristics of real
time changes in physical memory, our design supports an update of physical
memory compression at any time and reduce its process time significantly.
Secondly, it has a good extensibility, supporting the storage of metadata and
image at the same time, which facilitates the management and control of memory
image. Thirdly, using hash and digital signature mechanism protect the integrity
and reliability storage of the evidence data. This paper has solved many
practical problems in the storage and protection with existing physical memory
image format. |
Keywords: |
Computer forensic, Memory dump, Metadata, hash, Digital signature |
Source: |
Journal of Theoretical and Applied Information Technology
pp 768 - 774 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
A HUMAN SENSORY ARCHITECTURE FOR CYBER PHYSICAL SYSTEMS |
Author: |
ZHEJUN KUANG, LIANG HU, XIAODI YU, YUCHI TIAN, FEIYAN CHEN, KUO ZHAO |
Abstract: |
Cyber physical system (CPS) is a complex distributed system which contains
computing, communications, and control. CPS is the combination of the cyber
world and the physical world. The cyber world need huge amount of physical
device sensing and commutating in order to collect and transform the information
in the real environment. Then, system forecast the possible situation that can
happen in the real environment by computing. Finally, provide the best proposal
for system decision making. In the CPS, the decision is making by human.
However, human always change their mind, there are many uncertainties that
influence the decision making. This paper constructs a CPS architecture based on
the human sensory system by analysis human body sensing that help CPS
understanding the human requirement. |
Keywords: |
Cyber Physical Systems, Human Sensory, Architecture |
Source: |
Journal of Theoretical and Applied Information Technology
pp 775 - 780 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
APPLICATION OF MULTI-OBJECTIVE WEIGHING WORK SCHEDULING ALGORITHM INTO STORAGE
NETWORK |
Author: |
HUADONG WANG,XIAOGUANG WANG |
Abstract: |
The resource request task of transmission of large number of servers, wide-band
resources in the enterprise storage gridding, the business distribution and
download service are limited by scheduling length, time span, load balance,
service quality, economic principles, security performance and many other
factors, so it is difficult to use definite feature to define it. Given the
above, the paper analyzed the enterprise storage gridding storage model and
designed the compromised work scheduling algorithm based on multi-objective
weighing. Through the massive measurements of randomly generated images, it
proved the generosity of the algorithm. According to the result, the algorithm
shows good performance on comprehensive indexes such as scheduling length,
scheduling cost, average energy consumption, etc. |
Keywords: |
Enterprise Storage Gridding, Multi-Objective Weighing, Work Scheduling,
Comprehensive Evaluation Model |
Source: |
Journal of Theoretical and Applied Information Technology
pp 781 - 785 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH OF MULTI-ATTRIBUTE TRADE OFF OPTIMIZATION ON CRITICAL CHAIN
MULTI-PROJECT SCHEDULING |
Author: |
WANG WEIXIN , WANG XU , GE XIANLONG , LIN YA , CHEN YANG , GAO JIA |
Abstract: |
For the multi-attribute tradeoff optimization of critical chain multi-project
scheduling (CCMPS), multi-attribute utility function was adopted to conduct
comprehensive optimization of time, cost, quality, robustness and the
optimization model was established. Using randomness and stability of Normal
Cloud Model, cloud genetic algorithm was designed to generate priority of
multi-project scheduling activities and obtain dispatching plan finally.
Effectiveness of the model and algorithm were verified by a case study. |
Keywords: |
Critical Chain ; Multi-Project Scheduling ; Time-Cost-Quality- Robustness ;
Cloud Genetic Algorithms |
Source: |
Journal of Theoretical and Applied Information Technology
pp 786 - 794 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
BROADBAND SATELLITE NETWORKS: STANDARDS, CROSS-LAYER DESIGN, AND QOS IMPROVEMENT |
Author: |
MENG NAN, ZHANG QI, XIN XIANGJUN |
Abstract: |
A review of broadband satellite communication networks scenario, standards on
broadband satellite networks and the main specifications of standards are
provided. Due to the performance of current broadband satellite system is
constrained by the layered protocol architecture, typical of both the ISO/OSI
reference model and the Internet protocol suite. The cross-layer protocol stack
is considered to be a feasible solution. A cross-layer protocol framework is
proposed, which contains three pairs of standardization cross-layer interfaces
beyond the ISO/OSI layered protocol model, allow for efficiency interactions
between different layers. To meet the broadband applications quality of service
(QoS) requirements, constraints of resource allocations for broadband satellite
networks and the necessity of mappings between QoS requirements and DBA scheme
are studied. Meanwhile, an example of DVB-RCS mappings is provided. |
Keywords: |
Broadband Satellite Communication, Standards, Cross-Layer Design, Qos, Dynamic
Bandwidth Allocations |
Source: |
Journal of Theoretical and Applied Information Technology
pp 795 - 801 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
STUDY ON NETWORK STRUCTURE IN VIRTUAL TRANSACTIONS BASED ON SNA |
Author: |
YANG BAI |
Abstract: |
In virtual transactions, 2-mode network about “user-product” is constructed by
e-commerce behavior between users and products. Based on binary matrix of
evaluating products by users in virtual transactions, this paper discusses that
2-mode and 1-mode network structure between products and users from the whole
network of social network analysis prospect. First, a model about “user-product”
is constructed through two representation methods including matrix and graph.
Then, this paper introduces main methods such as matrix transformation,
bipartite 2-mode graphs, etc. Third, through a case about a B2C transaction
website, some quantitative characteristics including network density, clique
relationship, and core-periphery structure can be revealed and visually
displayed. Furthermore, members’ relationships and structure characteristics are
acquired based on the analysis of visualization results. Moreover, this paper
computes density and the degree centrality, betweenness centrality and closeness
centrality demonstrating customer authority. Lastly, a conclusion is reached
that the cited network has core-marginalization constitution. Through
comparative analysis, we found that there are central nodes and several groups.
Furthermore, the proposed methods in this paper can be utilized in the research
of members’ relation and structure characteristics in the transaction networks,
which can be convenient for improving and enhancing user experience. |
Keywords: |
Virtual Transaction, Social Network Analysis, 2-Mode Network, User Evaluation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 802 - 808 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE AIR DEFENSE MISSILE OPTIMUM TARGET ASSIGNMENT BASED ON THE IMPROVED GENETIC
ALGORITHM |
Author: |
YUMING LU, WEIQIANG MIAO, MING LI |
Abstract: |
The problem of target assignment is crucial in the air defense operations, and
the optimum target allocation scheme can greatly enhance the performance of the
air defense missile weapon system. Based on the general mathematical model of
the target assignment problem and the principle of assignment, this paper
analyses cultural genetic algorithm (CGA) combined with the reversal operation,
and presents a specific hybrid optimization methodology which can address the
problem of target assignment. The simulation results show that the probability
of finding the global optimal solution and the convergence rate of the improved
genetic algorithm based on cultural algorithm (CA) is obviously superior to that
of the basic genetic algorithm (BGA) and cultural algorithm. Finally we get a
better target assignment results; thus it provides a beneficial reference for
addressing the problem of air defense deployment effectively. |
Keywords: |
Target Assignment, Air Defense Missile, Genetic Algorithm, Cultural Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
pp 809 - 816 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS OF TEMPERATURE EFFECT ON THE LUBRICATING STATE OF HYDROSTATIC BEARING |
Author: |
SHIGANG WANG, XIANFENG DU, MINGZHU LI, ZHONGLIANG CAO, JIANJIA WANG |
Abstract: |
Setting the effect of oil states (sufficient state and deficient state) on
temperature field distribution and temperature rise of heavy hydrostatic bearing
as the starting point, simulation research is conducted with the FLUENT 6.5,
which is popular in current field of scientific research all over the world. The
results show that the temperature of heavy hydrostatic bearing has a linearly
increase in both oil state with the spinal velocity speeding up. However the
temperature rise is lower in sufficient oil state than that in the opposite
state. In addition, the oil state has an effect on the distribution of
temperature filed at the same rotational speed. The obtained data supply the
theory basis for the safe operation of the hydrostatic bearing. |
Keywords: |
Hydrostatic bearing, Finite volume method, Sufficient and deficient states of
lubricant, Temperature field, FLUENT |
Source: |
Journal of Theoretical and Applied Information Technology
pp 817 - 821 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
COMPUTER SIMULATION OF CARBON SEQUESTRATION POTENTIAL IN FOREST ECOSYSTEM |
Author: |
XIANGMIN FANG, WEI ZHAO, YAWEI WEI, YUJING YE, QINGLI WANG, LIMIN DAI |
Abstract: |
Computer simulation has been widely used in various fields of ecology with the
cross-integration between the various disciplines. As the largest organic carbon
(C) pool in terrestrial ecosystems, forest plays an important role in regulating
the global C balance and mitigating the increase of atmospheric CO2
concentration. Combined with forest inventory data and literature, this study
analyzed the potential of C sequestration in existing forests in Jilin Province,
China using CO2FIX model. The results showed that in the end of 120 years
simulated, the highest and the least amount of C stock was accumulated in the
bioenergy and soil, respectively. In contrast, C storage of the biomass was more
than that of forest products. The application of computer model not only can
effectively estimate the C sequestration potential of the forest ecosystem, but
can show the dynamic of C sequestration in simulated period. Therefore, the
computer simulation is a relatively convenient, economical and effective method
to estimate C stock of forest ecosystem of large-scale area. |
Keywords: |
Computer simulation, CO2FIX model, Carbon sequestration potential, Forest
ecosystem |
Source: |
Journal of Theoretical and Applied Information Technology
pp 822 - 826 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN ANALOG CIRCUIT FAULT WAVEFORM DATA EXTRACTION METHOD |
Author: |
BAORU HAN, JINGBING LI, YIlIANG XING |
Abstract: |
The fault waveform data extraction is the key of the analog circuit fault
diagnosis. The paper presents a tolerance analog circuit fault waveform data
extraction method. First, tolerance analog circuit simulation uses OrCAD /
Pspice circuit simulation software in order to generate fault waveform data.
Then, program in MATLAB automatically and accurately extract fault waveform
data. Finally, the fault waveform data in binary form is stored in the matlab
working space. And the bridge rectifier capacitor filter circuit fault data
extraction set as an example is explained in detail, through which the
effectiveness of the method is verified. This method solves the problem of data
interface between the two, laying the foundation for the realization of analog
circuit fault diagnosis fault. |
Keywords: |
Analog Circuit, Fault Waveform, Data Extraction, Sensitivity Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
pp 827 - 831 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
PROFIT MODEL OF GROUP-BUY WEBSITES BASED ON PRINCIPAL-AGENT THEORY |
Author: |
HUALING LU, JIFEI WU, YAN ZHOU |
Abstract: |
The future profit model of group-buy websites and incentive problem of websites
to suppliers is studied using principal-agent theory which mainly analyzes the
group-buy websites in supply chain. And a conclusion can be drawn that the
stronger capacity of the group-buy websites, the more struggling level they will
pay. At the same time, the stronger capacity of the sellers, the smaller
struggling cost coefficient, and the stronger sellers can get more excitation of
royalty rate. |
Keywords: |
Group-buy Website, Profit Model, Principal-agent, Incentive Mechanism |
Source: |
Journal of Theoretical and Applied Information Technology
pp 832 - 836 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
MODELING AND TRANSIENT DYNAMICS ANALYSIS TO A NEW TYPE OF ENGINE PISTON |
Author: |
HONGYUAN ZHANG, XINGGUO MA, SHUANGLIANG GE |
Abstract: |
This paper introduces of a new structure which applies the round slider of the
crank instead of the connecting rod. Based on the motion equation of the
transient dynamics as the basis, this paper carries out transient kinetic
analysis to the piston with the complete method, thus obtaining the displacement
nephogram and the stress nephogram of the piston and analyzing the response of
the displacement to the time and the stress to the time for the piston, thus
obtaining the position of the maximum displacement and stress of the piston and
the dangerous moment. Results show that, with the greater safety factor of the
piston, it is possible to further improve the performance of the engine with the
structure improvement. |
Keywords: |
Transient Dynamics, Finite Element Method, Engine, Piston |
Source: |
Journal of Theoretical and Applied Information Technology
pp 837 - 842 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
TRAJECTORY OF THE PUNCHING QUICK AIRDROP AIRBAGS IMPACTED BY THE GUST |
Author: |
MINGSI QI, WEI YANG, SUOPING DENG, WEI WEI, WENDONG ZHANG, JUN LIU |
Abstract: |
How to make the effect of the airdrop equipments affected by the turbulent
airflow minimum, and realize the fixed-point and precise airdrop, is a problem
that has been plagued by the domestic and foreign experts.The article makes the
mesh generation of the airdrop airbag model, builds the finite element
simulation models, and uses finite element analysis software ANSYS/LS-DYNA to
study the falling process of the punching quick airdrop airbags. Through the
simulation of the falling process, the paper gets the status parameters of the
airbags, and analyzes whether the airbags meet the falling demands or not. Then
this article researches the airdrop trajectory of the airbags with gust and no
gust, and researches the airdrop trajectory of the airbags under horizontal and
vertical gust. In order to reduce the effect of the gust on the airdrop
trajectory, the paper puts forward the controlling strategy. |
Keywords: |
Airbag, Punching, Quick Airdrop, Airdrop trajectory, ANSYS/LS-DYNA |
Source: |
Journal of Theoretical and Applied Information Technology
pp 843 - 849 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
TRAINING OF BASKETBALL REFEREES IN BASKETBALL GAME BASED ON COMPUTER SIMULATION |
Author: |
JIANLIANG WANG, YONG WANG, JIANLONG MA |
Abstract: |
With the rapid development of our country’s sports enterprise, the development
of the referee training at all levels has been enrolled into the plan that will
speed up the development of China's sports teaching system. In the study of
basketball referee training, college education institutions have put forward a
lot of teaching methods. However, there are still lacking in a set of objective,
complete and unified standard to judge the referee's quality. In this article,
based on the evaluation system which is constructed by the fragment of computer
simulation of the basketball match, the completion degree of students, and the
ability index of basketball referee on the basis of multivariate linear
regression method, a targeted plan has been formulated in the usual training for
the decision-making of sports colleges and evaluation mechanism to provide the
scientific and reasonable theory basis. |
Keywords: |
Teaching and Training Methods, Computer Simulation, Evaluation System, The
Degree of Completion, Multiple Regression Linear Methods |
Source: |
Journal of Theoretical and Applied Information Technology
pp 850 - 856 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN REFINEMENT PROACH FOR LARGE GRAPHS APPROXIMATE MATCHING |
Author: |
ANLIANG NING, XIAOJING LI, CHUNXIAN WANG |
Abstract: |
How to match two large graphs by maximizing the number of matched edges, which
is known as maximum common subgraph matching and is NP-hard. We give heuristics
to select a small number of important anchors using a new similarity score,
which measures how two nodes in two different graphs are similar to be matched
by taking both global and local information of nodes into consideration. And
then to refine a matching we focus on a subset of nodes to refine while giving
every node in the graphs a chance to be refined. We show the optimality of our
refinement. We also show how to randomly refine matching with different
combinations. Our refinement can improve the matching quality with small
overhead for both unlabeled and labeled graphs. The approach that can
efficiently match two large graphs over thousands of nodes with high matching
quality is proved in theorized. |
Keywords: |
Approximate Matching, Refinement Matching, Randomly Refinement |
Source: |
Journal of Theoretical and Applied Information Technology
pp 857 - 866 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
BPNDIAG: BPN-BASED FAULT DIAGNOSIS FOR BPEL PROCESS |
Author: |
ZHICHUN JIA, RONG CHEN |
Abstract: |
Web Service is becoming an important and popular distributed computing model for
providing on-demand service sharing on Internet. One of the difficult challenges
in web service is how to deliver the reliable service application over
unreliable web services around the world. To improve the automated diagnosis
capability for web service, we completely model the BPEL process as a BPN model
and propose a BPN model-based diagnosis method. Considering the activity
dependency relations in BPN model, our diagnosis method is able to exactly and
quickly localize the faulty activity. Finally, we conduct the simulation
experiments to evaluate our method. The experimental results show that our
method is effective in fault diagnosis for BPEL process. |
Keywords: |
Web Service, Fault Diagnosis, BPEL Process, Petri Nets, Diagnosis Probability |
Source: |
Journal of Theoretical and Applied Information Technology
pp 867 - 875 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
HEURISTIC DYNAMIC PROGRAMMING BASED OPTIMAL CONTROL FOR MULTIPLE TIME DELAY
SYSTEMS |
Author: |
BAOSHENG YANG, XUESONG, LIN CUI, ZONGTAO HU |
Abstract: |
The existence of time delay not only gives the stability of system analysis and
controller design brings great difficulties but also usually makes the systems
unstable and even cause the system performance deteriorated. The theory of
heuristic dynamic programming was introduced into iterative algorithm to solve
the systems optimal control including multiple delays in state and input
control. Using the adaptive dynamic iterative algorithm to solve this equation,
and the convergence proof is given. By using the neural network to achieve
iterative algorithm, the optimal control law of the systems with time delay can
be get. The simulation results show that the heuristic dynamic programming
method is effective to solve the optimal control of the nonlinear system. |
Keywords: |
Heuristic Dynamic Programming, Time delay, Optimal Control, Neural Network |
Source: |
Journal of Theoretical and Applied Information Technology
pp 876 - 881 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
FUZZY IMPROVEMENTS OF CROSSING-TIMINGS INHERITANCE MECHANISM OF ROLES |
Author: |
JIANJUN WANG, JIANPING LI, YONGFAN LI, CHONGMING MA |
Abstract: |
As TRBAC is short in solving the role mutual exclusion mechanism coming from
crossing-timings or overlapping-timings when roles inherited for the role
authorities in distributed environments suffered temporal constraints, this
paper proposes the use of susceptibility and value-at-risk for judging the
degree of mutual exclusion of roles, while the relation between susceptibility
and value-at-risk could be described by a Signoid function, the susceptibility
of a role could be calculated by a fuzzy judgment and the comprehensive
susceptibility of the inherited role across timings could be amended by Hamming
Distance, and gives the inheritance algorithm which is conducive to improve the
inheritance efficiency of roles restrained by tenses and example demonstrations
of adjacent roles across time domains, and in the end indicates the advantages
and disadvantages of the algorithms. |
Keywords: |
Tense, Role, Inheritance, Fuzziness, Safe |
Source: |
Journal of Theoretical and Applied Information Technology
pp 882 - 887 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
MODEL OF CEMENTING ANNULUS GAS CHANNELING BASED ON THE LATTICE BOLTZMANN THEORY |
Author: |
WANCHUN ZHAO, WEIWEI YUAN, CHEN WANG, TINGTING WANG |
Abstract: |
The phenomenon of the cementing annulus micro clearance gas channeling directly
influences cement job quality and oilfield production, so accurately describing
the flow rule of cementing annulus micro clearance gas channeling is the core
and "bottleneck" problem of controlling gas channeling effectively. From the
perspective of the micro particle motion and based on the lattice Boltzmann
method, the flow model of cementing annulus micro clearance gas particle is
established. Select a block of Daqing Oilfield to calculate and simulate the
distribution rule of flow velocity of micro clearance gas particle under
different annulus pressure difference. The calculation results reveal the
essence of the cementing gas channeling gas particle flowing in micro ring
clearance, and new ideas are found out for the study of the problem about
subsequent cementing gas channeling. |
Keywords: |
Annulus Micro Clearance, Lattice Boltzmann, Cementing Gas Channeling, Particle
Flow |
Source: |
Journal of Theoretical and Applied Information Technology
pp 888 - 892 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
SIMULATION SERVICE MANAGEMENT BUS IN SERVICE ORIENTED RUN-TIME INFRASTRUCTURE |
Author: |
ZHITENG WANG, HONGJUN ZHANG, RUI ZHANG, LUYUAN ZHANG, BAOYU XU |
Abstract: |
In this paper, Simulation Service Management Bus (SSMB) is proposed to
intergrade and reuse the simulation service resource in Service Oriented
Run-time Infrastructure (SORTI). Its functions include integration service, load
balancing, communication security, and so on. Its main functions and the whole
frame are elaborated. key technologies which include service registry and
record, integration service, load balancing, majorization of service
composition, thread evictor, communication encryption are elaborated
respectively. |
Keywords: |
Simulation Service Management Bus, Simulation Service, Integration Service, Load
Balancing, Communication Security |
Source: |
Journal of Theoretical and Applied Information Technology
pp 893 - 898 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
A MULTIFACTOR SEMANTIC MATCHING METHOD FOR ONTOLOGY |
Author: |
CHUANGLU ZHU |
Abstract: |
The Semantic Web is based on description logic, which is suitable for the
calculation of conceptions and find out the relations between conceptions
easily. So semantic retrieval for ontology is different from traditional web
information retrieval and can find out the relations between knowledge more
accurate. As the core of the information retrieval for ontology, the semantic
matching algorithm is usually based on the semantic distance, the information
capacity or the common attribute. But the three algorithms have their own focus.
On this basis, this paper puts forward the multifactor semantic matching
algorithm based on weighting factor and the prototype system is established to
validate the algorithm. The verification results of the prototype system have
shown that the algorithm can improve the accuracy of the semantic retrieval and
improve the efficiency of the ontology matching. |
Keywords: |
Semantic Web, Ontology, Semantic Distance, Semantic Attribute |
Source: |
Journal of Theoretical and Applied Information Technology
pp 899 - 903 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
TEMPERATURE FIELD ANALYSIS TO GASOLINE ENGINE PISTON AND STRUCTURE OPTIMIZATION |
Author: |
HONGYUAN ZHANG, ZHAOXUN LIN, JIAN XING |
Abstract: |
This paper introduces the principle of thermal analysis for the combustion
engine piston, gets the heat exchange coefficient of the piston top and the heat
exchange coefficient distribution of the piston and the cooling water through
calculation, calculates the temperature field of the piston with the finite
element method and modifies the calculation model by repeatedly comparing the
result with the measured temperature. It is found out that the temperatures of
the piston top and the first circular groove are relatively high after
calculating the temperature field and based on the results the optimization
scheme of adding the cooling oil chamber is applied to the piston structure.
Results show that, after optimization, the maximum temperature of the piston top
is decreased to 264, and the temperature at the first ring is decreased to 204℃,
thus improving the working condition of the piston ring. |
Keywords: |
Engine, piston, Thermal Load, Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
pp 904 - 910 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN ANALYSIS TO THERMAL LOAD AND MECHANICAL LOAD COUPLING OF A GASOLINE ENGINE
PISTON |
Author: |
HONGYUAN ZHANG, ZHAOXUN LIN, DAWEI XU |
Abstract: |
With the definite-element analysis software, a three-dimensional
definite-element analysis has been carried out to the gasoline engine piston.
Considering the thermal boundary condition, the stress and the deformation
distribution conditions of the piston under the coupling effect of the thermal
load and explosion pressure have been calculated, thus providing reference for
design improvement. Results show that, the main cause of the piston safety, the
piston deformation and the great stress is the temperature, so it is feasible to
further decrease the piston temperature with structure optimization. |
Keywords: |
Finite Element Method, Engine, Piston, Coupling |
Source: |
Journal of Theoretical and Applied Information Technology
pp 911 - 917 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
FACIAL DIMENSIONS DRIVEN DESIGN AND OPTIMIZATION TECHNIQUES FOR SPECTACLES |
Author: |
XIAOJIAN LIU, JIANFENG WU, XIAODONG HE, HAIYING LI |
Abstract: |
The styling design of spectacles is affected by several facial dimensions, and
also has many requirements related with user’s personal preference. So the
design process is rather complicated. Based on the dimension data of human face
collected from Chinese people, the authors built a 3D parametric head modeling
system driven by facial dimensions, and a head model-driven spectacle design
mechanism, which realized rapid designing and adjustment of spectacles. For the
convenience of designer’s regulation work, the glass outline shapes are defined
and coded as three basic styles, which are 2-points, 3-points and 4-points
style, based on which the parametric design method is established. The paper
also discussed the further optimizing techniques with interactive genetic
algorithms (IGA) on the basis of the spectacle code. A prototype system is
programmed on a 3D parametric platform and examples are demonstrated to verify
the effects of the design method proposed. |
Keywords: |
Ergonomics, Facial Dimensions, Parameter Driven, Spectacles, Industrial Design |
Source: |
Journal of Theoretical and Applied Information Technology
pp 915 - 924 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
ONE TYPE TWO-WHEEL SOLAR ELECTRIC BICYCLE BODY MODELING AND SIMULATION |
Author: |
ZHIKUN WANG |
Abstract: |
In this paper a new rounds of solar electric vehicle design and study were
carried out on. Application of CAD technology to establish three-dimension
geometric model, using the kinetic analysis on the frame and other parts for
numerical simulation and static strength analysis for the vehicle model design,
virtual assembly, complete frame dynamics analysis and vibration analysis, with
considering other factors, first on the frame structure improvement, second on
security of design calculation analysis and comparison, finally get the ideal
body design. |
Keywords: |
Solar Energy Electric Bicycle, Intelligent Equipment, Computer Aided Design |
Source: |
Journal of Theoretical and Applied Information Technology
pp 925 - 932 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
FLOW PATTERN IDENTIFICAITON OF OIL-GAS-WATER THREE-PHASE FLOW BASED ON
NPSO-LSSVM ALGORITHM |
Author: |
YINGWEI LI, RONGHUA XIE, LINA YU |
Abstract: |
In this paper, a hybrid particle swarm optimization based on the natural
selection (NPSO) was presented and used to optimize the parameters of Least
Square Support Vector Machine (LSSVM). The NPSO algorithm overcomes the
shortcomings of premature convergence and poor local search capability of
traditional Particle Swarm Optimization (PSO). Then a classification model of
oil-gas-water three-phase flow patterns was established based on NPSO-LSSVM to
identify three typical water-based flow patterns of oil-gas-water three-phase
flow including bubbly flow, slug flow and bubbly-slug flow. By combining the
statistics analysis, Hilbert-Huang transformation, complexity measure analysis,
chaotic recurrence quantification analysis and chaotic fractal analysis, the
conductance fluctuation signal of oil-gas-water three-phase flow in the vertical
pipe was analyzed. The nine feature parameters reflecting the changes of
oil-gas-water three-phase flow were extracted and used as the input vectors of
the NPSO-LSSVM classification model. Simulation results showed that the correct
identification rate of the oil-gas-water three-phase flow patterns was 94%, and
it indicated that the classification model proposed in this paper was reasonable
and had a practical value. |
Keywords: |
LSSVM, NPSO, Feature Extraction, Flow Pattern Identification |
Source: |
Journal of Theoretical and Applied Information Technology
pp 933 - 938 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS ON DYNAMIC ELASTIC MODULUS AND DISSIPATION FACTOR OF POROUS MEDIUM |
Author: |
WENHAI HE |
Abstract: |
Open-celled porous medium which has conspicuous damping characteristic is useful
to control noise and vibration. This medium is composed of two phases, namely
solid matrix and entrapped fluid. The inertia of these two phases and the
interaction between them are taken into account for developing its dynamic
elastic modulus and dissipation factor. Simulation shows that the dynamic
elastic modulus is complex number, and its real part and image part depend on
frequency. For single-layer open-celled porous medium, the image part is not
monotonous and reaches peak at a certain frequency. But the real part increases
monotonously with frequency. So, its dissipation factor also has one peak at the
certain frequency. In low and high frequency ranges, its dissipation factor is
very small. For two-layer open-celled porous medium, its dissipation factor has
two peaks in low and high frequency ranges, respectively. And, two peak
frequencies decrease with the increasing of total thickness of porous medium. In
comparison with signal-layer open-celled porous medium, the two-layer one is
more available to control noise and vibration in high frequency range. |
Keywords: |
Dynamic Elastic Modulus, Dissipation Factor, Porous Medium, Boundary Condition,
Continuity Condition |
Source: |
Journal of Theoretical and Applied Information Technology
pp 939 - 945 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
GA-BASED H∞ CONTROL OF LINEAR SYSTEM WITH TIME-DELAY |
Author: |
XIAOHONG YU, JIANWEI WU |
Abstract: |
In this paper, in view of robust stability conditions relevant to linear
time-delay systems, poses up an output feedback control method for linear system
with time-delay based on genetic algorithm. Because of the system state in
actuality is normally unpredictable, which studies time-delay related stability
and H∞ control of linear system with time delay by combination of genetic
algorithm and linear matrix inequality approach, and take the state feedback of
time-delay system and static output feedback controller design into the design.
Simulations are also given to illustrate its effectiveness and lesser
conservatism, and the designed controller has less feedback gain. In addition,
the method can be directly extended to robustness H∞ control of linear
time-delay system with parameter uncertainty. |
Keywords: |
Terms-genetic Algorithm, Time-varying, Linear Matrix Inequalities, H∞ Control |
Source: |
Journal of Theoretical and Applied Information Technology
pp 946 - 952 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
APPLICATION OF WILDPACKETS ON PROTOCOL CHARACTERISTICS ANALYSIS OF P2P |
Author: |
MIN LI, XIANHUA JIN, PENG ZHANG |
Abstract: |
WildPackets is the leading provider of network, application performance, and
protocol analysis, VoIP monitoring, and troubleshooting solutions. The key of
P2P traffic management is constantly updated P2P protocol characteristics
library of network traffic management device. In this paper, we analyze the
determinants of P2P protocol characteristics, the characteristics change of P2P
software and coping strategies, then we focus on discussing the specific ideas
and methods of P2P protocols characteristics by WildPackets, and illustrate the
reasons for lower efficiency of P2P traffic identification. |
Keywords: |
P2P; WildPackets, Payload, Protocol Characteristics |
Source: |
Journal of Theoretical and Applied Information Technology
pp 953 - 956 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
LEAF AREA INDEX RETRIEVAL USING RED EDGE PARAMETERS BASED ON HYPERION
HYPER-SPECTRAL IMAGERY |
Author: |
ZHAOMING ZHANG, GUOJIN HE, HONG JIANG |
Abstract: |
Leaf area index (LAI) is an important surface biophysical parameter as an input
to many process-oriented ecosystem models. Remote sensing technology provides a
practical way to estimate LAI at a large spatial scale, and hence, considerable
effort has been expended in developing LAI estimation models from remotely
sensed imagery. LAI estimation models were usually formulated using
multi-spectral satellite imagery, and hyper-spectral satellite data was scarcely
used because it is very difficult to acquire the needed hyper-spectral satellite
imagery. Compared to multi-spectral imagery, hyper-spectral imagery has its
advantage in LAI retrieving because hyper-spectral data can be used to extract
red edge optical parameters, which provides a new way to estimate LAI. In this
paper, EO-1 hyperion hyper-spectral imagery was used to estimate LAI in the
forested area of Yongan county, Fujian province, located in southeast of China.
Two primary red edge optical parameters, red edge position (REP) and red well
position (RWP), were extracted from hyperion data; and LAI estimation models for
broad-leaf forest in Fujian province were formulated. |
Keywords: |
Leaf Area Index, Hyper-spectral Remote Sensing, Red Edge |
Source: |
Journal of Theoretical and Applied Information Technology
pp 957 - 960 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
FAST RANDOMIZED ALGORITHM FOR CIRCLE DETECTION BY EFFICIENT SAMPLING |
Author: |
LIANYUAN JIANG, PEIHE TANG, HAOHAO YUAN, CHUNGUI LI, YALAN ZHANG |
Abstract: |
According to the randomized circle detection (RCD) algorithm, the probability
that four randomly sampled points belong to the same circle is relatively low. A
fast algorithm for circle detection in this paper is proposed. Three points will
be randomly sampled in the edge image and the fourth point is then sampled
within the margin of vertical circumscribed and inscribed squares of the circle
determined by three previously sampled points, and it effectively increases the
probability of four randomly sampled points belonging to the same circle. In
judging whether these four points can determine a candidate circle, a threshold
is defined to reduce the calculation times of circle parameters. It affirms the
candidate circle for true circle by a fast evidence-collecting process.
Experimental results demonstrate that the proposed algorithm is about an order
of magnitude faster than RCD in the detection speed, and has a strong
robustness. The detection precision for circles is better than half a pixel. |
Keywords: |
Circle Detection, Randomized Sampling, Circle Parameters, Evidence Collecting |
Source: |
Journal of Theoretical and Applied Information Technology
pp 961 - 966 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
IDENTIFICATION OF NONLINEAR SYSTEM VIA SVR OPTIMIZED BY PARTICLE SWARM ALGORITHM |
Author: |
XIANFANG WANG, JIALE DONG, YUANYUAN ZHANG, ZHIYONG DU |
Abstract: |
Given the influence of the selection of regression parameters on the accuracy of
SVR model and its ability of learning and generalization, this article adopts
the particle swarm optimization algorithm to build the SVR model and applies it
to the modeling of nonlinear system identification. Through the simulation
experiments, it is found that this model is more accurate in identification and
has a stronger ability of learning and generalization compared with GA. In
addition, it demonstrates that the application in nonlinear system
identification based on PSO-SVR algorithm could be considerably effective. |
Keywords: |
Particle Swarm Optimization (PSO), Support Vector Regression (SVR), Nonlinear
System |
Source: |
Journal of Theoretical and Applied Information Technology
pp 967 - 972 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
IDENTIFYING KEY FACTORS OF PATIENT SATISFACTION BASED ON SERVQUAL AND DEMATEL |
Author: |
SONGHE JIN, SHENYI QIAN, HUIDONG ZHU |
Abstract: |
Today, the competition between hospitals is very cruel. So the hospital must
retain as many patients as possible by increasing satisfaction of the patients.
In order to find the key factors of influencing patient satisfaction, this study
first designed 27 criteria of the hospital service and constructed the
questionnaire based on SERVQUAL model for the patients or their families. Then
six major criteria were selected based on the analysis of the returned
questionnaire. The second survey developed based on decision-making trial and
evaluation laboratory (DEMATEL) method to evaluate the importance of the six
major criteria. The results show that highly skilled medical staff is the most
essential criterion, and effectiveness in handling patient complaint, detailed
description of the patient’s condition, and staff with good communication
skills, are also important criterions. Therefore, the hospital should invest
more in training the professional competence, communication skills and
problem-solving abilities of the medical staff rather than buying more machines. |
Keywords: |
Patient Satisfaction, SERVQUAL Model, DEMATEL Method |
Source: |
Journal of Theoretical and Applied Information Technology
pp 973 - 978 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
TIME-AWARE SOCIAL RECOMMENDATION BASED ON USER FEEDBACK |
Author: |
XING XING, WEISHI ZHANG, XIUGUO ZHANG |
Abstract: |
Context information such as time, social relationship and user feedback
information can be exploited to improve the quality of recommendation. However,
most collaborative filtering based methods ignore this kind of information in
social recommendation. In this paper, we propose a time-aware social
recommendation method based on user feedback for top-k item recommendation in
social networks. Our method incorporates the temporal factors by introducing a
time weight function, which models the decay of user interest. Moreover, our
method considers the user positive feedback and negative feedback information,
as well as the social relationship information for recommendation. Empirical
analysis and experiments are conducted in Sina Weibo, one of the most popular
social network sites in China. The experimental results demonstrate that our
method outperforms the collaborative filtering method in terms of MAP for top-k
item recommendation. |
Keywords: |
Collaborative Filtering, User Feedback, Time-aware Recommendation, Social
Network |
Source: |
Journal of Theoretical and Applied Information Technology
pp 979 - 984 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
NUMERICAL COMPUTATION STUDIES ON THE CUTTING-CARRYING AND LIFTING CAPACITY OF
SPIRAL CENTRALIZER IN GAS DRILLING |
Author: |
ZHENGMAO CHEN, HONGLIN XU, JIYOU XIONG |
Abstract: |
For gas drilling, hole cleaning is a particularly critical problem. When the
spiral centralizer is used in the down hole assembly of gas drilling, it will
produce a powerful rotational flow which will be bond to have the influence of
different level on the hole cleaning. For this matter, this paper has
established a three-dimensional fluid dynamics model in the basis of gas-solid
two-phase turbulent theory and got its numerical solution by using the finite
volume method, therefore making a quantitative evaluation about the ability of
cutting-carrying and lifting of the spiral centralizer. The results have shown
that the spiral centralizer has the function of cutting-carrying and lifting;
part of the rock debris pellet concentrates in the bottom of the blade, above
less instead. The numerical calculation method has some guiding significance for
spiral centralizer design in gas drilling. |
Keywords: |
Gas Drilling, Spiral Centralizer, Cutting-Carrying, Lifting, Deviation Control,
Numerical Computation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 985 - 989 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
DANGEROUS GOODS OF RAILWAY TRANSPORT ROUTE OPTIMIZATION BASED ON MULTI-OBJECTIVE
PROGRAMMING AND IMMUNE ALGORITHM |
Author: |
YIHAI TIAN, LIANG WU, XIN LU, SULONG CAO, DEYANG KONG |
Abstract: |
The dangerous goods transportation plays a great role in the area of railway
transportation research, the whole process of dangerous goods transport
involving multiple assignments links, which interplays with each other. The
existing path optimization is one of important means to ensure transportation
safety. This paper through the analysis of the characteristic of dangerous goods
and the special operation process in the railway transportation, putting forward
to three objective functions to reducing safety coefficient and transportation
time and improving transport income, creating 0-1 integer nonlinear multiple
objective programming model, using immune algorithm to find the solution to the
model. At last , through an example using the method effectively selecting a
specific route and optimizing the process of railway dangerous goods
transportation. |
Keywords: |
0-1 Nonlinear Integer Multi-objective Programming Model, Immune Algorithm,
Specific Route |
Source: |
Journal of Theoretical and Applied Information Technology
pp 990 - 996 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF BASKETBALL TEACHING PLATFORM |
Author: |
BO SU, SUFEI YANG, AIMIN QIN |
Abstract: |
With the development of internet technology and multimedia technology, the
school begins to explore new teaching model in the reform of new teaching,
having strong basketball teaching interactive, higher teaching action imitation
memory requirement and other characteristics, therefore becoming the focus of
teaching reform. Basketball is one of the most popular sports curriculums, and
basketball teaching resources are limit, teachers can not meet the needs of the
students. Based on basketball teaching platform of internet technology, the
first part of this paper gives the platform design flow chart, the use of the
distance multivariate control theory, to establish the mathematical model of
teaching platform time and the proportion of content; the second part gives the
CAI courseware algorithm and programming based on the internet and VRML
technology, to carry out programming and calculation by using VC++ programming
software, and to carry out numerical optimization design for the proportion of
teaching platform time and content that can obtain the residual analysis chart,
the final design of basketball network teaching platform after the optimized, to
realize the sharing of basketball teaching resources and teaching staff. |
Keywords: |
Internet Technology, Basketball Teaching Platform, Distance
Multivariate, VC++ Programming, VRML Technology, Numerical Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
pp 997 - 1002 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
FUZZY RANDOM EUROPEAN CALL OPTION PRICING MODEL |
Author: |
SHUXIA LIU, ENFENG LIU LIMING HUANG |
Abstract: |
The valuation of an option is importance topic in finance. The classical option
pricing models depend on the stochastic calculus to obtain some results. In
practice, there are some fuzzy and imprecise factors in stock market. Fuzzy
random theory may be an efficient tool to tackle with uncertainty. The paper
presents the fuzzy random option pricing models, in which the prices of stocks
are taken as fuzzy random variables. Moreover, in order to make decision better
for the investor, the expected value of option price is derived. Finally,
empirical analysis are given to demonstrate the idea how to calculate option
value with fuzzy random stock price |
Keywords: |
European Option, Option, Option Pricing,Fuzzy Variable, Fuzzy Random Variables |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1003 - 1007 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
STABILITY ANALYSIS OF NON-LINEAR STOCHASTIC DYNAMIC SYSTEM BASED ON NUMERICAL
SIMULATION |
Author: |
XIAOHONG LI |
Abstract: |
The stability of nonlinear stochastic dynamical system is a theoretically
prominent problem, as it is of great theoretical and practical significance to
many projects in reality. Firstly, the author established the basic formula.
Secondly, he researches the stability theory of non-linear stochastic dynamical
system, and discusses the stability criterion of null solution stability and
nonlinear stochastic dynamic system. Finally, he conducts numerical simulation
analysis for kinetics response and stability status of engineer structures under
seismic conditions. The simulation results provides theoretical basis for the
promotion of earthquake resistance of engineer structures. |
Keywords: |
Numerical Simulation, Nonlinear Stochastic Dynamics Simulation,Stability |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1008 - 1012 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
A FAN FAULT DIAGNOSIS SYSTEM BASED ON ROUGH SET |
Author: |
HAO ZHANG, GUANGLI XU, QIUHONG FAN, YING ZHANG, GUOHUAN LOU |
Abstract: |
Fan is the key equipment in coal mine production, because of its high cost, and
at the high speed without stopping, it is the guarantee of mine safety, the
producer must carry on monitoring strictly to avoid the occurrence of major
accidents. In this paper, according to the actual situation of a coal mine,
combined with the related knowledge of rough set, applying PLC and MCGS for the
development of a fan working process, fault diagnosis based on intelligent
monitoring and the fault prediction system, it will realize the state monitoring
of mine fan, to achieve safe production, prolong the service life of the fan. |
Keywords: |
Fan, Fault Diagnosis, Monitoring System |
Source: |
Journal of Theoretical and Applied Information Technology
pp1013 - 1018 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
COMPREHENSIVE EVALUATION ON INDEPENDENT INNOVATION SYSTEM BASED ON
CROSS-EFFICIENCY DEA MODELS |
Author: |
YUYING TIAN, NING LI, SHUYU GUO |
Abstract: |
The construction of regional independent innovation system is the base for
development of regional economy and improvement of competition capability. The
main aim of this article is measure the efficiency of regional independent
innovation system. Based on the framework of independent innovation system
theory, the involved factors and indexes were indentified in this paper.
Moreover, taking 17 regions in Shandong province in China as empirical analysis
case, the comprehensive evaluation of those regions were calculated by applying
cross-efficiency DEA model. Integrating to the real conditions in those regions
and referencing on the calculation results, we proposed the corresponding
suggestions and measures on the construction of regional independent innovation
system in the view of whole Shandong province and 17 regions separately. |
Keywords: |
Independent Innovation, Cross-Efficiency DEA Model, Comprehensive Evaluation |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1019 - 1024 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS ON THE STACKELBERG GAME MODEL AND RISK SHARING BASED ON BUYBACK
CONTRACT |
Author: |
JINGMIN WEI, JIAFU TANG |
Abstract: |
This paper deals with the Stackelberg game model based on the buyback contract
predominated by the supplier, and the equilibrium solutions to the model are
available when wholesale price and maximum buyback rate are determined by the
supplier and the order quantity is determined by the retailer with respect to
the stochastic market demand. Coordination of different supply chains and risks
shared by supply & demand parties are analyzed. The supply and demand parties
share different risks because of their different leading statuses and maximum
buyback proportion offered by the supplier to the retailer. When the supplier is
in the leading role, he can determine the proportion or relation of risks shared
by supply and demand parties. As a constraint condition, the proportion or
relation the risk is of guiding significance for determination of maximum
buyback proportion. |
Keywords: |
Supply Chain, Buyback Contract, Risk, Stackelberg Game |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1025 - 1031 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
OPTIMIZATION STUDY OF RSI EXPERT SYSTEM BASED ON SHANGHAI SECURITIES MARKET |
Author: |
HUANG HAI-PING, WANG PIN |
Abstract: |
Through the simulation experiment method, by means of general securities
information and trading platform in Mainland China, based on the historical data
of all A shares in Shanghai Securities Market within 16 years, with the winning
rate, the annual rate of return, and the net profit as the goal, and through
detecting the current general RSI expert trading system, the article corrected
the trading points of RSI trading system and achieved the result of maximized
goal. |
Keywords: |
Simulation Experiment, Historical Data, Winning Rate, Annual Rate of Return, RSI
Trading System |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1032 - 1039 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
CONTROL PARAMETER ANALYSIS OF REGENERATIVE BRAKING FOR HYBRID ELECTRIC VEHICLE |
Author: |
ZHONGWEI ZHANG, JING ZHOU, YINGLI LI |
Abstract: |
Energy and environmental protection have already become two principal themes of
the development for the world in our times. The hybrid-electric vehicle (HEV) is
considered as a new-type car with strong enforceability, which can deal with
energy crisis, pressure of environmental protection and realize the sustainable
development of the auto industry at present. This paper proposed that the
control parameters of regenerative braking has influence on hybrid electric
vehicle(HEV). Many experiment and simulation results show that reasonable
selection of the control parameters of regenerative braking for the HEV can
increase energy recovery, which is good for reducing fuel consumption and
keeping SOC. It turns out that the control parameters of regenerative braking
have great influence on fuel consumption and SOC. The HEV represents an
important direction for auto-industrial development at the beginning of 21st
century. Regenerative braking for the HEV is one of the reason for energy
saving. The control parameters of regenerative braking for the HEV have an
important influence on vehicle performance |
Keywords: |
Hybrid Electric Vehicle, Regenerative Braking, Control Parameter, Parameter
Optimizing |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1040 - 1046 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
A VERTICAL HANDOVER TRIGGER MECHANISM BASED ON GRAY PREDICTION |
Author: |
JIANBO YANG, XINSHENG JI |
Abstract: |
Cross layer handover schemes are expected to provide seamless services for
mobile terminal in the heterogeneous wireless networks. To reduce the handover
delay time, link layer must timely trigger handover protocols of layer 3 so that
they can finish handover procedures before current wireless link terminates.
Because of limited computing power with the mobile terminal and larger packet
loss rate for vertical handover, in this paper, we propose a novel trigger
mechanism based on gray prediction. Firstly, the time required to perform
handover is estimated. Secondly, the time to trigger a Link_Going_Down is
determined according to convex optimization theory, both considering the
received signal strength from currently connected network and target access
network. Simulation results show that this mechanism can obtain higher
prediction accuracy with the same prediction step, and the packet loss rate can
be controlled within 5% when the terminal moving speed less than 5m/s. |
Keywords: |
Heterogeneous Wireless Networks, Vertical Handover; Gray Prediction Theory; Link
Layer Trigger; Required Handover Time |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1047 - 1053 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
PUBLIC ACCEPTANCE SITUATION AND PROMOTING STRATEGIES EMPIRICAL ANALYSIS ON THE
LOCAL E-GOVERNMENT PUBLIC SERVICES |
Author: |
JIANYING SHEN |
Abstract: |
With the development of computer science and information technology, and the
development of Internet technology, the network is gradually increased in
people's popularity rate, local government is in order to expand the efforts of
public acceptance, and also open a local e-government public services. This
paper firstly analyzes the e-government public service model, to analyze of
local e-government public services from the web, mobile phone and multimedia and
other aspects. Through the form of web site click rate and population survey
questionnaire, using the linear variable analysis theory, to carry out
mathematical statistical analysis for data, and then through the residual
optimization method, to optimize the processing for data, and removing the site
click rate of repetitive clicks or abnormal click and subjective factors of the
questionnaire cause data error, the establishment of local e-government public
service' public acceptance of mathematical model, finally to put forward the
strategy that can provides theory reference for the local e-government public
service. |
Keywords: |
E-government, Public Service, Public Acceptance, Linear Optimization; Residual
Error, Mathematical Model |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1054 - 1059 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
MULTIMEDIA ENCRYPTION USING ADVANCED SECURE WAVELET TRANSFORM AND CHAOTIC
ARITHMETIC CODING |
Author: |
CHIRANJIT SAHA, YACHNA GUPTA, SAKSHI SACHDEVA, K. JOHN SINGH |
Abstract: |
Due to highly increase of enhanced computer and communications between them and
also dramatic increase in electronic media, security plays an important role for
those organizations where the data is very much critical and important for them.
As multimedia is the most popular data shared in the web so it is very much
required for the protection over it through an advanced encryption technique so
that no one can spoof into it. As now days many internet attackers are there who
are very much interested in spoiling the data or stealing the data. It is
because the older techniques such as conventional cryptology where a long bit of
string are mainly difficult to memorize such a random string. It can easily
attacked by using brute force attacked technique. Instead of using traditional
cryptology techniques like voice, fingerprint test, retina test etc. it helps to
uniquely identify the person and a secure method for stream cipher. Since
multimedia data are transferred over open network so more security need to be
given to the data .In this paper, we have used the idea of advanced secure
wavelet transform and chaotic arithmetic coding . Here we have used the idea of
chaotic coding that is the encryption of multimedia files and transmitting over
a secured frequency that is the wavelet transform. It enhances the multimedia
contents and it should not be compromised. Wavelet transform is a transform in
which it is capable of providing the time and frequency information
simultaneously, hence providing us a time-frequency representation of the
signal. The idea here it gives a new kind of chaotic stream cipher where due to
wavelet transmission the data is secured and don’t get lost or we can say
outsiders cannot view the data unless they know the wavelet transmission
frequency and also the encryption arithmetic coding though which it is encrypted
. A systematic study on how to strategically integrate different atomic
operations to build a multimedia encryption technique. The paper also describes
of how to generate an initial key or initial condition from the concept of
chaotic arithmetic coding and thus encrypt or decrypt the multimedia data by
using this function. The robustness and effectiveness of this new version of
scheme is verified by its security strength and also with the comparison with
its overall computational cost against the other techniques. The proposed system
can guarantee its security and fastness without noticeable increase in encoded
image size. |
Keywords: |
Wavelet Transformation, CKBA, Watermarks, Joint Compression and Encryption,
Chaotic Arithmetic Coding, Biometric, Brute Force Attack. |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1060 - 1065 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
INDOOR AND OUTDOOR COOPERATIVE REAL-TIME POSITIONING SYSTEM |
Author: |
JIANQI LIU, QINRUO WANG, JIANBIN XIONG, WANGHUA HUANG, HUI PENG |
Abstract: |
This paper proposes a cooperative real-time positioning system to solve both
indoor and outdoor location tracking problem for disaster aid, we conduct a
detailed overview of pre-existing indoor positioning systems, give architecture
of cooperative positioning system, and introduce the least square method to
improve accuracy of time difference of arrival (TDOA) positioning algorithm.
Meanwhile, we address a method of coordinate transformation, which can transform
rectangular coordinate to latitude and longitude. With these, the indoor
location information and GPS information can be displayed on the maps. Finally,
experiment shows the precision of cooperative positioning system, which can
satisfy the disaster aid requirements. |
Keywords: |
Positioning System, Disaster Aid, 2D Positioning, GPS, TDOA |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1066 - 1073 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
CONSUMER’S PURCHASING BEHAVIOR OF VIRTUAL PRODUCTS IN SNS |
Author: |
JIE GAO, QUN KUANG |
Abstract: |
Based on the combination of social networking sites (for short SNS), the study
involves the trading of virtual product development status, collates and
summarizes the research results in China and abroad consumers buying behavior on
virtual products. The researchers attempt to explore factors influencing
consumers to buy SNS virtual products by using questionnaires to collect
personal information of SNS customers. In addition, the theory of Planned
Behavior (for short TPB) has been selected as theoretical model and the
empirical analysis uses structural equation modeling method to analyze the
factors affecting several different groups of users of SNS who will be the
consumers or potential consumers of virtual products. The findings are as
follows: (1) the passionate export-oriented consumer attitudes towards virtual
product of SNS will clearly and directly affect the type of the behavioral
intention (for short BI) of buyers of virtual products; the perceived behavioral
control can even affect directly on the final actual purchase behavior. (2) The
subjective norm (for short SN) of traditional inward-oriented consumers has a
significant impact on virtual product purchase behaviors and will also directly
affect the final purchase behavior. (3) The SNS under self-supporting consumers
on virtual product attitudes and purchasing attitudes of virtual products mainly
affected their BI. |
Keywords: |
Social Network Sites (SNS), Consumer Behavior, Virtual Products |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1074 - 1081 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
RULES-BASED CLASSIFICATION WITH LIMITED COST |
Author: |
GUIYING PAN, ZHONGMEI ZHOU |
Abstract: |
In test cost-sensitive decision systems, it is difficulty for us to find an
optimal attribute set and construct a quality classifier with limited cost. The
minimal test cost-sensitive attribute reduction is proposed to address the
former problem. However, it is inevitable to remove some good even better
attributes in the minimal test cost-sensitive attribute reduction. As a result,
the classification accuracy is not high in the minimal test cost attribute
reduct. Suppose we have limited cost more than the minimal test cost, we can
select addition important attributes to improve the classification accuracy.
Therefore, our work includes two aspects. 1) Find an optimal attribute set with
limited cost. We put forward a good method to find an attribute set based on the
limited cost. 2) We improve the decision trees to build a quality classifier. We
construct the root node of the decision tree by several best attribute values.
These values just cover the entire dataset. So we can generate more quality
rules than ID3. Experimental results indicate that the improved decision tree
gets higher accuracy than ID3, and in comparison to the minimal test cost reduct,
attribute selection based on the limited cost is feasible to improve the quality
of classifiers. |
Keywords: |
Date Mining, Cost-Sensitive Learning, Test Cost-Sensitive Attribute Reduction,
Limited Cost Classification |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1082 - 1088 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
PROCESS TASKS ORIENTED MULTI-GRANULARITY RESOURCES MODELLING AND APPLICATION IN
SERVICE-ORIENTED MANUFACTURING |
Author: |
TAN WEI, YAO XIFAN |
Abstract: |
In the service-oriented manufacturing environment, in order to meet user’s
process tasks demand, a multi granularity resource model (MGR) is proposed,
which is described from three views, i.e. function, processes and the quality.
Then a Web service encapsulation model of MGR is constructed and an extended
OWL-S for its encapsulation realization is presented. Based on the above model,
a application framework for MGR is constructed, and a service oriented demand
model (SOD) of MGR is build. In order to simplify the customization of process,
a method of process customization based on flow symbol string is put forward,
which can provide user with customizing process tasks through business process
template, and with multi-granularity manufacturing resource customization and
edit of the resources constraint QoS-based. And then a demand acquisition
algorithm is designed. Finally, the prototype is provided to verify the validity
of the model and its algorithm. |
Keywords: |
Process Tasks, OWL-S, Web Service Encapsulation, Multi-Granaunilty Manufacturing
Resource, Flow Symbol String ,Qos |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1089 - 1096 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN IMPROVED IMAGE COMPRESSION ALGORITHM BASED ON EMBEDDED ZEROTREE WAVELETS
TRANSFORM |
Author: |
YANJUN LIU, ZUPENG LIU |
Abstract: |
After analyzing the basic theory of embedded zerotree wavelet (EZW) coding
algorithm, this paper brings forward an improved method which rounds down the
wavelet coefficients and sets the coefficients appearing more frequent as zero,
so as to reduce scan frequency in algorithm and save the storage space.
Experimental results show that this algorithm improves the coding efficiency on
the one hand; and on the other hand the quality of reconstructed image is also
not significantly decreased. |
Keywords: |
Frequency, Image compression, Wavelet coefficients, Embedded zerotree wavelets (EZW) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1097 - 1102 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS AND DESIGN OF LOW-POWER TRANSCEIVER WITH ZIGBEE SENSOR UNIT |
Author: |
JIANQI LIU, QINRUO WANG, JIANBIN XIONG, WANGHUA HUANG, HUI PENG |
Abstract: |
Power consumption of nodes in a wireless sensor network (WSN) determines the
life cycle of the WSN, so it is particularly important to design low-power and
high-performance wireless sensor nodes in the network. Based on a simple
analysis of the IEEE802.15.4 protocol specifications and comparison among the
efficiencies of different physical layers, this paper illustrates the design and
implementation of low-power and high-performance nodes in WSN from the
perspectives of 2.4G physical layer baseband spread spectrum and O-QPSK
modulation demodulation, proposes a cascade de-spreading method, and finally
puts forward a modulation and demodulation scheme according to the IEEE 802.15.4
specifications and de-spreading method. |
Keywords: |
Wireless Sensor Network, Low-Power, Energy-Efficiency, De-Spreading |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1103 - 1108 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
A FAST QUANTUM-BEHAVED PARTICLE SWARM OPTIMIZATION BASED ON ACCELERATING FACTOR |
Author: |
ZHEHUANG HUANG |
Abstract: |
Quantum-behaved particle swarm optimization (QPSO) is a good optimization
technique which has been successfully applied in many research and application
areas. But traditional QPSO algorithm is easy to fall into local optimum and the
rate of convergence is slow. To solve these problems, an improved algorithm
based on dynamic adjustment of the acceleration factor is proposed. The
experiments on high dimensional function optimization showed that the improved
algorithm has more powerful global exploration ability and faster convergence
speed. |
Keywords: |
QPSO; Accelerating Factor; Function Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1109 - 1114 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
ARTIFICIAL INTELLIGENCE BASED TUNING OF SVC CONTROLLER FOR CO-GENERATED POWER
SYSTEM |
Author: |
HUANG SHOU-JIA, LI GANG |
Abstract: |
In view of multi-attribute decision-making problems with interval numbers in
social economy and engineering system, this paper defines and analyzes the basic
operational rule, normalized method, sequence comparison strategy, and the
calculating formula for the distance of interval numbers and interval number
sequence. It presents weighted TOPSIS decision-making model based on interval
numbers operational rule, solves the key problems to calculate the standard
matrix solution with the interval numbers decision-making system to select the
positive ideal solution and negative ideal solution, and the distance
calculation between DMUs with interval numbers and ideal solution. This model,
which is simple and feasible, can solve optimal fire station location and
improve the effectiveness, practicality and meeting surface. The problem of
weighted TOPSIS suitable for real original property matrix is solved. In
summary, the weighted TOPSIS decision-making model based on interval number
operation rule offers scientific and practical ways and means for
multi-attribute decision making problems with interval numbers. |
Keywords: |
Mathematical Model, Multi-Attribute Decision-Making, TOPSIS, Interval Numbers,
Optimal Location. |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1115 - 1120 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
COVERAGE HOLES DISCOVERY ALGORITHM FOR WIRELESS SENSOR NETWORK |
Author: |
WANG QING-SHENG, GAO HAO |
Abstract: |
Nonuniform random distribution and exhausted energy of sensor nodes may lead to
coverage holes emerged in wireless sensor networks. Aiming at the problems of
coverage holes in wireless sensor networks, a geometry-based distributed
coverage holes discovery algorithm is proposed in this paper, and it is proved
theoretically. The main idea of this algorithm is forming a triangle by sensor
node and its two neighbor nodes, calculating circumradius and circumcenter of
the triangle and judging existence of coverage holes under the guidance of
relevant knowledge of geometric graphics. Simulation results on Matlab platform
demonstrate that the algorithm not only can detect coverage holes and boundary
nodes effectively, but also has a good performance in terms of discovery
accuracy. |
Keywords: |
Wireless Sensor Networks, Coverage Holes Discovery, Distributed Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1121 - 1125 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
PATH FOLLOWING CONTROL OF AUTOMATIC GUIDED VEHICLE BASED ON HIERARCHICAL FUZZY
ALGORITHM |
Author: |
ZHANG YUYE |
Abstract: |
A three-wheel AGV with front wheel steer and rear wheel drive is taken as the
research objective.On the basis of establishing the hardware framework of the
motion control system,the software design of PMAC under the environment of VC++
is discussed relevantly.At the same time,a hierarchical fuzzy algorithm is
introduced in the path following of the AGV. Having applied hierarchical fuzzy
systems in the control architecture, the number of rules in a fuzzy controller
was reduced greatly. A robust control term was used to compensate the
approximation error of fuzzy systems, which could reduce the effect on tracking
accuracy caused by the error. It was proved that the tracking error converged to
the small neighborhood of zero, and the tracking error could be decreased by
enlarging parameters in the robust control term. The test results verified the
efficiency of the hierarchical adaptive fuzzy controller. |
Keywords: |
Automatic Guided Vehicle (AGV), Hierarchical fuzzy control, path following, PMAC |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1126 - 1130 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE DESIGN OF ENERGY-EFFICIENT MONITORING TERMINALFOR POWER SUPPLY AND
DISTRIBUTION SYSTEM OF ENTERPRISE BASED ON STM32 |
Author: |
XIAO HAIHONG, CHEN TAO |
Abstract: |
The significance of energy-efficient monitoring for power supply and
distribution system lies in guiding enterprise to implement energy-efficient
reconstruction, reducing energy consumption, and alleviating energy supply and
construction pressure. According to the standard GB/T16664-1996 of People’s
Republic of China, daily load factor, load coefficient of transformer and line
cost rate need to be monitored. For this reason, an energy-efficient monitoring
terminal system based on Coretex-M3 STM32F103 was presented in this paper, the
system architecture, software flow chart was also provided, and the core circuit
was described. The terminal system, presented in this paper, has some
superiority of fully function, simple structure, easy to use and high accuracy,
and has a broad market prospect. |
Keywords: |
Energy-Efficient Monitoring, On-Line Monitoring, STM32 |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1131 - 1135 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON THE SECURITY SYSTEM QUANTITATIVE RISK ASSESSMENT METHOD BASED ON
EXPLOITATION GRAPH MODEL AND BAYESIAN NETWORK |
Author: |
ZHIGANG YANG |
Abstract: |
This article topics based on multi-feature fusion the Mean shift target tracking
technology belongs to the field of intelligent video analysis, moving target
tracking is interested in moving target location each image in a video sequence
to find and acquire the target movement. Moving target tracking problem can be
stated as interested in moving target movement prediction in the video sequence,
feature extraction, feature matching and template update problem. In this paper,
we consider using compressed domain features as a complement of the color
features to extract the compressed domain features first need to understand the
compressed domain detection technology. Detection based on the compressed
domain, that is, in the case of not decoding or a small amount of decoding,
directly on the compression characteristics of the image analysis, in order to
achieve the detection of the image moving object. |
Keywords: |
Mean shift, Target tracking, Multi-feature fusion, Target recognition,
Communication system |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1136 - 1143 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF A LOW-COST AND VERSATILE ELECTRIC FILE CABINET
SYSTEM |
Author: |
CHENG HUIHUA, LIU JUNXIAN, WANG RUIDONG, ZHOU PENG, XIAO HANG |
Abstract: |
In this paper, the driving system of a kind of multi-functional electric file
cabinet gets constructed. Its hardware system, running platform for the file
cabinet system and software system all get developed, and keyboard input,
infrared remote controlling and computer accessing for the multi-functional
electric file cabinet system are achieved. The system can control up to 12 suits
of file cabinets with very low demand of cost. The work is derived from the
problem that the high cost of the current products on market made it against
being produced in quantity. |
Keywords: |
Control, File Cabinet, Security |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1144 - 1147 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
A METHOD FOR CQI FEEDBACK BASED ON DISTRIBUTED COMPRESSED SENSING IN ADAPTIVE
TWO-WAY RELAY SYSTEM |
Author: |
JURONG WANG, JINHE ZHOU |
Abstract: |
In two-way relay wireless communication systems, adaptive modulation and
scheduling are promising for increasing the system throughput. To achieve this
goal, it is necessary to feedback the information of the channel quality
indication (CQI). In this paper, we introduced a novel method for CQI feedback
based on distributed compressed sensing (DCS) under orthogonal frequency
division multiplexing (OFDM) system, and the feedback data are compressed and
reconstructed using compressed sensing (CS) and DCS algorithm respectively.
Simulation results shown that, compared with CS, DCS can significantly decrease
the number of measurement under the same probability of recovery without
increasing the complexity of terminals, and the throughput is increased, thus
decreased the feedback expenses. |
Keywords: |
CQI, Two-way Relay, OFDM, Feedback Compression, Compressed Sensing (CS),
Distributed Compress Sensing (DCS) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1148 - 1152 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
A COMPARATIVE STUDY OF THE PHYSICAL MODEL AND VIRTUAL MODEL IN INDUSTRIAL DESIGN |
Author: |
QI BIN, YU SUIHUAI, SUN XIAOMING, FAN WEN, YANG YANPU |
Abstract: |
This paper describes a multi-sensory virtual reality application in industrial
design. We demonstrate how model making aid students in solving an industrial
design task, using the method of verbal protocol analysis. Survey research come
from 12 students in arts, engineering and industrial design disciplines, we find
that both physical and virtual model during an open-ended design task helped
students generate and evaluate ideas, better visualize their ideas, and helped
them discover differences between physical model and the virtual model which is
used to guide design behavior. The result shows that virtual model making is
more efficient than the physical model, and using virtual model system could
enhance creative thinking and help students become more aware of their own
design ideas. Experiment results demonstrate that the adopted method can
increase students’ effective haptics and can be widely used in computer-aided
industrial design field. |
Keywords: |
Physical model, Virtual model, Verbal protocol analysis (VPA), Industrial design |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1153 - 1159 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN EFFICIENT CERTIFICATELESS AUTHENTICATED KEY AGREEMENT |
Author: |
YUXIU-YING , HEDA-KE , ZHANG – WENFANG |
Abstract: |
Key agreement is very important in information and data security. To overcome
the key escrow property of identity-based cryptography AND combines the
advantages of the traditional PKI and the identity-based cryptography,
certificateless public key cryptography is proposed. This paper proposed a new
certificateless two-party key agreement protocol and gives the comparisons with
other comparable schemes in security and efficiency. The new proposed scheme
achieves almost all of the desired security attributes and is more practicable. |
Keywords: |
Authenticated Key Agreement, Identity-Based , Certificateless-Based Encryption |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1160 - 1166 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
A WEB-BASED ALLY SELECTION METHOD FOR AGILE VIRTUAL ENTERPRISE |
Author: |
JIAN CAO, ZHUOJING SHEN |
Abstract: |
In the agile virtual enterprise forming process, with the increase of optional
scheme, to use the traditional analytic hierarchy process (AHP) to choose ally
will produce judgment matrix inconsistency problem. Therefore, combining the AHP
and the fuzzy theory, a new ally selection method which is based on web is
proposed. The proposed method uses the AHP to calculate the weight of the
evaluating indexes, uses the fuzzy matrix to calculate the value of each scheme,
and then by merging to get the evaluation result. This paper uses B/S pattern to
develop an AVE ally selection system that is based on the method, and combines
with the distributor selection of an enterprise to introduce the practical
application of the system. The results show that the method can not only
eliminate the judgment matrix inconsistency problem, but also integrate group
opinion effectively, and access to a fair and reasonable evaluation result. At
the same time, to each evaluating indexes, the proposed method can obtain
opinions that are relatively consistent. |
Keywords: |
Agile Virtual Enterprise; Ally Selection; Analytic Hierarchy Process; Fuzzy
Matrix |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1167 - 1171 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
OPTIMAL DESIGN STUDY OF PLATFORM STRUCTURE BASED ON BP NEURAL NETWORK AND
GENETIC ALGORITHM |
Author: |
LI WENXING, TAN JUN |
Abstract: |
The paper uses finite element method, orthogonal experiment method, BP neural
network and genetic algorithm to optimize platform structure system of large,
heavy duty NC rotary table. First of all, the harmonic response kinetics
analysis can be processed on the platform structure system and can find out the
mode frequency which has the strongest effect on the system dynamic behavior.
Meanwhile, the design variables are confirmed as the BP neural network input
variables. Then an orthogonal experiment was used in choosing the training
sample data and the sample data were calculated through the finite element
model. The BP neural network model which reflected the Platform structure
features was established. At last, the BP neural network model will be optimized
through the genetic algorithm. Simulation results show that the first inherent
frequency increases by 15.5 percent with 9.8 percent weight lost. |
Keywords: |
BP Neural Network, Genetic Algorithm, Finite Element, Orthogonal Experiment,
Structural Optimization, |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1172 - 1176 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NEW ALGORITHM OF ONINE CUSTOMER CLASSIFICATION BASED ON ANT COLONY ALGORITHM |
Author: |
LI XINWU |
Abstract: |
Effective and correct customer classification plays a key role in analyzing and
estimating customer consumption patterns, establishing personalized marketing
service system and differentiation management. A new customer classification
algorithm is advanced based on ant colony algorithm. Firstly, based on consumer
characteristics and behaviors analysis, an indicator system is designed which
includes 21 indicators belongs to customer characteristics type variables and
customer behaviors type variables respectively. Secondly, ant colony algorithm
is improved through adjusting its transition probability dynamically to speed up
model’s convergence and to build the selection strategy more conducive to the
overall search, and then a new algorithm for customer classification is deduced
and analyzed. Finally the experimental results verify not only the problem of
convergence speed has been solved, but also the simplicity of the model
structure and the accuracy of the classification are ensured when the new
algorithm are used in electronic customer relationship management practically. |
Keywords: |
Customer Analysis (CA), Customer Classification (CC), Ant Colony Algorithm (ACA),
Consumer ,Behaviors Analysis (CBA) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1177 - 1183 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
BASED ON AGENT OF LOGISTICS INFORMATION SYSTEM RESEARCH AND DESIGN |
Author: |
ZOU SAI |
Abstract: |
Along with the development of informatization and advancement of computer
technology, it is of great significance to do research on the informatization of
the delivery of logistics company. Based on Agent, the information platform of
logistics company has been constructed, to informatize links of
transport、strorage、package、Military Material Handling System, distribution
processing and delivery, and intelligentize transportation between sales network
and expense budget. After practical appliance, it is proved to be of practical
value. |
Keywords: |
Logistics, Dispatching, Agent, Informatization |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1184 - 1189 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF INTELLIGENT CLOUD GUIDE SYSTEM BASED ON ANDROID
SYSTEM |
Author: |
JIAO JIN-TAO |
Abstract: |
In order to deliver accurate services to tourists’ phone, intelligent guide
system based on the Android platform solution is proposed. This paper, firstly
describes the system architecture, including cloud service center, sensor
networks and cell phone; then describes the function of each tier; at last it
proposes the three-tier implementation. The testing results show that the system
can provide better guide service. |
Keywords: |
Android; Intelligent Guide System; Cloud Service; Sensor; GPS |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1190 - 1194 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
DYNAMIC ANALYSIS AND EXPERIMENTAL RESEARCH OF VIBRATORY SUBSOILER SYSTEM |
Author: |
LILI XIN , JIHUI LIANG, LICHUN QIU |
Abstract: |
Soil has elastic-plastic deformation under vibrating working condition. And the
acting force between the soil and the vibrating subsoiler parts is of
complication. In order to study the effect of the material acting force to the
vibrating subsoiler system kinetics features, this paper establishes the
vibrating subsoiler system mechanics model considering material acting force. It
adopts numerical integral to answer and analyze this model and verify the
correctness of the model through comparison of the simulation data and
experimental data. In order to research the relationship among the vibration
frequency, forward velocity and tractive resistance of tractor in the farming
process, the paper regards 1SZ-160 tillage implement as the research object,
uses the in-house designed Π-shaped frame force measuring system to test the
tractive resistance in different vibration frequencies and forward velocities,
and obtains the vibration data of the base of the tractor by the vibration test
system. The test result shows that in the identical vibration working condition
and with the increase of the forward velocity, the tractive resistance is
increased slowly, in the working condition of having the stated forward velocity
and with the increase of the vibration frequency, the tractive resistance is
increased fast. The tractive resistance will be affected by both forward
velocity and vibration frequency, but the effect for the tractive resistance by
the former is small relatively. The research result provides the reference basis
for the structure design of the agricultural mechanical system. |
Keywords: |
Material Acting Force, Vibrating Subsoiler, Kinetics, Forward Speed, Tractive
Resistance. |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1195 - 1201 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
A LIMITED MEMORY BFGS ALGORITHM WITH SUPER RELAXATION TECHNIQUE FOR NONLINEAR
EQUATIONS |
Author: |
GONGLIN YUAN, ZENGXIN WEI, YONG LI, XUPEI ZHAO |
Abstract: |
In this paper, a trust-region algorithm combining with the limited memory BFGS
(L-BFGS) update is proposed for solving nonlinear equations, where the super
relaxation technique(SRT) is used. We choose the next iteration point by SRT.
The global convergence without the nondegeneracy assumption is obtained under
suitable conditions. Numerical results show that this method is very effective
for large-scale nonlinear equations problems. |
Keywords: |
Algorithm; L-BFGS Update; Super Relax; Nonlinear Equations |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1202 - 1209 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
STUDY ON THE OPTIMAL ULTRASONIC EMULSIFICATION SYSTEM OF BIO-DIESEL FUEL BASED
ON DDS |
Author: |
XIAO-LI WEI, SHU-YANG WANG |
Abstract: |
This paper applies the direct digital frequency synthesis technology (DDS) to
build a controllable variable frequency and waveforms of the bio-diesel fuel
phacoemulsification system. The optimal operating parameters of
phacoemulsification system are studied by orthogonal experiment. In the
experiment, the ultrasonic frequency, waveform, power and process time are
changed to study the stability of emulsified bio-diesel fuel. According to the
results: when the experimental conditions are amount of
emulsifier(Span80,Tween80,Methanol) 3%, bio-oil 20% and 0# diesel 80%, the
treating time has the most significant in fluency on the stability of the
phacoemulsification bio-diesel fuel, power and frequency are less important and
waveform is the least. The optimal operating parameter is power of 30W,
frequency of 25 KHz, process time of 8min and waveform of square wave pulse. The
emulsification stability of the bio-diesel fuel insurance under these conditions
is the best; the stable time of bio-diesel fuel reaches to 2256 hours under room
temperature. |
Keywords: |
DDS; Optimal Ultrasonic Operating Parameters; Emulsifying Systems |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1210 - 1215 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE HYBRID COORDINATE CUTTING-IN CONTROL TECHNOLOGY OF THE DOUBLY-FED VARIABLE
SPEEDAND PITCH WIND-POWER GENERATOR |
Author: |
XIN-YU LIU,1BO GU |
Abstract: |
In view of the cutting-in problems of the doubly-fed wind power generator, this
paper deals with it’s control strategies in detail and proposes a coordinate
cutting-in control method based on the hybrid system theory, and establishes the
hierarchical control model of the doubly-fed wind power generator around the
cutting-in. On the basis of the model, the model information and structure
information of the system are decentralized. On the one hand, the control
algorithm is designed for the continuous variable of the system with the d-axis
current and q-axis current as its controlled outputs according to the estimated
mechanisms and control strategies. On the other hand, the hybrid automaton is
used for the state transition of the system discrete variable. Simulation
results show that compared with the traditional control methods this new control
method can make the d-axis current and the q-axis current of DIFG to the
reference values in finite time and achieve the effective control of the rotor
current. What's more important this method can not only improve the no off-grid
ability during the grid-voltage fluctuation, but also prevent the rotor and
rotor-side converter over current effectively. It has important actual
significance and practical application value. |
Keywords: |
Doubly-fed; Hybrid system; Hybrid automata; Estimate control; PI control |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1216 - 1221 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS AND COUNTERMEASURES FOR THE SECURITY OF ROUTING PROTOCOL IN PERCEPTION
LAYER OF IOTS |
Author: |
WEIDONG FANG, YUN YAN, ZHIDONG SHI |
Abstract: |
The security has always been the eternal topic in the field of Information
technology. As a major part of Internet of Things (IoT), the perception layer
acts critical roles from cognizing and sensing the ambient world to implement
control instructions. So, the security of perception layer is very important. In
this paper, a simplified attack detection method is proposed through study of
typical routing protocol in the perception layer of IoT. This method, based on
attack model, could analyze the security leak of routing protocol in perception
layer to a certain extent. We firstly give the background of research of routing
protocol, and then propose simplified attack detection method, analyze the
security of LEACH protocol, verify Sybil and Hello Flooding attack are major
security threats of LEACH protocol. On this basis, we put forward to security
countermeasures of routing protocol. |
Keywords: |
Internet of Things (IoT), Perception Layer, Routing Protocol, Security, LEACH |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1222 - 1230 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
SIMPLIFIED MODEL AND EXPERIMENTAL ANALYSIS OF THE BLAST WAVE OVERPRESSURE |
Author: |
LI JIANMIN, XIONG SHIBO, XIAO FENG |
Abstract: |
The mechanisms of generation, propagation and attenuation processes of blast
wave are complex and multiple factors are involved, which makes the existing
blast wave model is not suitable for engineering application for its difficulty
in parameters determining and problem solving. A simplified model of the blast
wave is proposed in this paper. To verify the correctness of the model, 10
explosion experiments were made with three pressure sensors placed in different
locations of the explosion tower. The experimental results show that the model
curves correctly reflect the characteristics of the experimental curves. The
proposed model is workable. |
Keywords: |
Blast Wave, The Numerical Model, Peak Pressure, The Correlation Coefficient |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1231 - 1236 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
SPEECH SIGNAL COMPRESSED SENSING BASED ON K-SVD ADAPTIVE DICTIONARY |
Author: |
YAN ZHOU, HEMING ZHAO |
Abstract: |
This paper proposes a novel and successful method for speech signal compressed
sensing based on K-Singular Value Decomposition (K-SVD) algorithm. K-SVD is an
iterative method that alternates between sparse representation of the train
samples based on the current dictionary and a process of updating the dictionary
atoms to better fit the speech data. The presented K-SVD algorithm is applied
here for training an adaptive over complete dictionary which can best suit a set
of given speech signals. The sparse coefficients can be obtained by conducting
the Orthogonal Matching Pursuit(OMP) sparse decomposition algorithm. At last,
the original signal can be reconstructed by exploiting reconstruction algorithm.
The experimental results show that, compared with the traditional basis function
dictionary, the proposed method has a stronger adaptability which can be
availably used for speech signal sparse representation. Moreover, the compressed
sensing based on K-SVD algorithm achieves higher reconstruction accuracy and
better denoising efficiency. |
Keywords: |
Speech Signal, Compressed Sensing, K-SVD Algorithm, Overcomplete Dictionary,
Sparse Decomposition, Signal Reconstruction |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1237 - 1243 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
ON THE SHORTEST RECYCLE PATH ALGORITHM OF WIRELESS SENSOR NODE |
Author: |
XUDONG ZHU, YUFENG MA, PEIPEI YANG |
Abstract: |
Along with the spreading application of wireless sensor network, once the node
energy is exhausted, it will cause environmental pollution. Therefore, the
problem of node recovery becomes increasingly important. The automatic recycling
of robot will become one of the feasible methods. The key is how to use less
time and energy consumption to recycle all nodes as well as prolong the lifespan
of wireless sensor network. This paper proposes a recovery algorithm based on
the greed algorithm. Through quantitative tests, the results show that the
proposed new algorithm can save the energy consumption and maintain the lifespan
of wireless network, thus reaching a balance. |
Keywords: |
Wireless Sensor Network; Node Recovery; Shortest Path Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1244 - 1247 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON AERO CRAFT ATTITUDE TESTING TECHNOLOGY BASED ON THE BP ANN |
Author: |
LIANG ZHI-JIAN, MA TIE-HUA |
Abstract: |
For measure parameters of aerocraft attitude, this paper puts forward the BP ANN
model based on the information integration theory, the problem of lower angular
speed accuracy and bigger navigation error are solved. Through researching the
aerocraft attitude affection based on the output of the gyro/geomagnetic sensor,
the network model are set up. The gyro/terrestrial magnetic sensor output signal
is used as input, and real-time three axis angular speed as output. After
trained for the test samples, we got the higher precision of angular speed
first, then calculated attitude angle applied the approximation formula method,
reduced systematic errors. After lots of experiments on the no magnetic
turntable, the result shows that the method has the characteristics of fast
convergence and better angular speed accuracy. |
Keywords: |
Neural Network, Gyroscope, Terrestrial Magnetism |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1248 - 1252 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
SURVEY ON SCIENTIFIC DATA MANAGEMENT USING HADOOP MAPREDUCE IN THE KEPLER
SCIENTIFIC WORKFLOW SYSTEM |
Author: |
KONG XIANGSHENG |
Abstract: |
Scientific workflows produce huge amounts of scientific data. Hadoop MapReduce
has been widely adopted for data-intensive processing of large datasets. The
Kepler system can support scientific workflows, high–performance and
high-throughput applications, which can be data-intensive and compute-intensive.
The paper presented a "Kepler + Hadoop" framework for executing MapReduce-based
scientific workflows on Hadoop |
Keywords: |
Mapreduce; Hadoop; Scientific Workflow; Parallel Processing; Actor-Oriented
Modeling |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1253 - 1257 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
HIDDEN MARKOV MODEL AND ITS APPLICATION IN NATURAL LANGUAGE PROCESSING |
Author: |
XUEXIA GAO, NAN ZHU |
Abstract: |
This paper describes Hidden Markov Model and its application in natural language
process, first introduces the basic concept of Hidden Markov Model, then
introduces the three basic issues and the basic algorithm to solve the problems,
finally gives the demonstration of the application of Chinese part-of-speech
tagging and speech recognition via Hidden Markov Model. |
Keywords: |
HMM, Natural Language Processing, Chinese Part-Of-Speech Tagging |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1258 - 1264 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
IMPACT OF HYPOXIA ON HEART RATE VARIABILITY BASED ON SAMPLE ENTROPY |
Author: |
LIU YUANYUAN, WANG BINHUA, LIU CHENGYU, YANG JUN, CAO ZHENGTAO |
Abstract: |
In this study, changes in heart rate variability (HRV) induced by exposure to
hypoxia were evaluate in healthy male. The sample entropy as a non-linear method
of HRV analysis was used; it’s a powerful way to analyze biological system. Our
aim was to investigate the influence of stepwise hypoxia on HRV using sample
entropy, we tested nine healthy yellow males (age=35 5) at 3600m, 4000m, 4400m,
4800m during rest, these were a part of the acclimation test. An increase in
sample entropy at high altitude compared to 1000m was established in this
research. The parameters showed similar tendencies during different altitude,
but not so obvious. The changing of sample entropy in every day was analyzed.
Our results indicate that hypoxia exerts an influence on HRV; it also suggested
that acute exposure to normobaric hypoxia induces increases in sympathetic
vasomotor activity and cardiac sympathetic dominance resulting in an increased
heart rate. |
Keywords: |
Heart Rate Variability (HRV), Sample Entropy, Hypoxia |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1265 - 1269 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH OF ADAPTIVE PROGRAM DESIGN ALGORITHM BASED ON AGENT |
Author: |
DONG LI |
Abstract: |
The current computer program is artificially designed to execute the process,
which has the weakness of passivity, rigidity and lack of flexibility. This
paper proposes a method of program design based on reinforcement learning
mechanism, and realizes the corresponding algorithm. According to the
environment and requirements, the agent can choose executive process
independently and arrive at the optimal result by learning, realize the layered
calls. Using this method, the executing program is decision-making, has a way to
realize the adaption, and reduces the dependence on designer. The result shows
that the method can achieve satisfactory execution efficiency. |
Keywords: |
Adaptive Programming, Reinforcement Learning, Q-learning, Agent, Optimization
Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1270 - 1274 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
STUDY ON ENGLISH COURSE EDUCATION EVALUATION BASED ON FUZZY THEORY |
Author: |
LIN LEI |
Abstract: |
Along with the smooth advancement of a new round basic education reform, the
profound changes have occurred in English education ideology and teaching modes,
which demands the reformation of English course education evaluation system to
guarantee the acceleration of the reform. The paper presents a new model for
evaluating English course education performance based on the principle of
analytic hierarchy process and fuzzy comprehensive evaluation. Firstly an
evaluation indicator system of English education performance is designed through
analyzing the characteristics of English teachers and students’ behavior.
Secondly in constructing the comprehensive evaluation model for English
education performance, analytic hierarchy process and fuzzy comprehensive
evaluation are combined and two level fuzzy evaluations is adopted to satisfy
the dynamics, subjective and transitional characteristics of indicators and
improve evaluation accuracy. Thirdly data from of three universities are taken
for examples to verify the validity and feasibility of the model and the
experimental results show that the model can evaluate English course education
performance practically and can help English course education service providers
take corresponding concrete measures to enhance its education performance. |
Keywords: |
Education Performance Evaluation (EPE), English Course Teaching Evaluation (ECTE),
Two Level Fuzzy Evaluation (TLFE), Analytic Hierarchy Process (AHP) |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1275 - 1281 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NEW ALGORITHM OF IMPROVING FACE RECOGNITION BASED ON JPEG |
Author: |
HANGLIN ZENG, LI CAO, XUEFEI TANG |
Abstract: |
This paper proposes a new algorithm to improve face recognition on Joint
Photographic Experts Group (JPEG). An imagine compression on face recognition is
realized by discrete cosine transform (DCT), and improved compression coding and
two dimensions principal component analysis (2DPCA). A new approach to improve
the face recognition based on JPEG reduces the effect of class scatter matrix
maximized of diagonal average face image can be divided into basic sub-image,
and this paper sets up a relationship of rows and columns of face image. An
integrated BP neural network is proposed to be used for face recognition.
Experiment simulation showed that the method proposed can effectively improve
face recognition rate and reduce the time of feature extraction. |
Keywords: |
Face Image Recognition, JPEG, DCT, 2DPCA, BP Neural Network |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1282 - 1286 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
DESIGN AND HARDWARE PLATFORM REALIZATION OF UM-BUS TEST SYSTEM |
Author: |
CHUNLIANG WANG, WEIGONG ZHANG, YA LI, ZHE DENG |
Abstract: |
This article is based on the UM-BUS which is a high-speed dynamic reconfigurable
serial Bus, design the test system and completion hardware platform. The test
system uses un-filter monitor function to complete the data collection in the
case does not affect the transmission characteristics of the bus, according to
bus protocol specially designed fault injection mechanism improved the testing
of the failure mode; at last through the PCI-E and USB3.0 realize the high-speed
transmission with computer.UM-BUS bus terminal transceiver function can be done
on the basis of the test tasks according to the needs of the design of the test
board. In addition, the design also comes with a storage function, the overall
data acquisition and storage process in the case of without relying on computer. |
Keywords: |
UM-BUS, Test system, FPGA, PCI-E, USB3.0, DDR2 |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1287 - 1291 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE RESEARCH ON EMAIL CLASSIFICATION BASED ON Q-GAUSSIAN KERNEL SVM |
Author: |
LIFAN, MA TAO, XU HONG |
Abstract: |
The use of different kernel functions in SVM (Support Vector machines) has been
reported in the literature. In this paper, the use of the q-Gaussian function as
kernel function in SVM is investigated and q-Gaussian function is explored.
While the q-Gaussian kernel SVM classifiers being built, cross validation
methods are used to select the non-extensive entropic index under varying
feature sizes, the punishment parameter and kernel width are set empirically,
the email classification on two leading Chinese email corpuses, TREC06c and
CCERT, are implemented with SVM classifiers employing Gaussian kernel and
q-Gaussian kernel. Experiment results show that q-Gaussian kernel SVMs can
enhance the classification performance effectively. |
Keywords: |
E-mail Classification, Q-Gussian Kernel, SVM, Classification Performance |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1292 - 1299 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON LOSSLESS NETWORK COMPRESSION OF RAILWAY DATA BASED ON TOPOLOGY
POTENTIAL COMMUNITY |
Author: |
WANG XUEMING, LI XIAOCUN, JIN JING |
Abstract: |
Research of lossless network compression based on topology potential community
is carried out. To meet the different needs, two approaches of lossless network
compression are proposed in this research. One approach, judging importance of
the nodes according to their roles playing in the community composition,
quantifies the importance of every node in communities, and achieves lossless
network compression through layers; another approach, judging importance of the
nodes according to the distances from the community representative nodes to
them, differentiates the nodes with different distances, and achieves lossless
network compression through compression ratio. Comparative experiments show that
the two approaches not only can achieve perfect compression ratio, and retain
the relationship between the communities, but also can reserve the important
nodes or basic community structures during the compression process according to
the needs. |
Keywords: |
Network; Compression, Topology, Potential Community, Railway |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1300 - 1308 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
STUDY OF CEP BASED ON DYNAMIC DATA MANAGEMENT SYSTEM AND ALGORITHMIC TRADING |
Author: |
KONG XIANGSHENG |
Abstract: |
In recent years, dynamic data management systems and algorithmic trading systems
have come to account for a majority of volume traded at the major US, European
and Asia-Pacific financial markets. Complex event processing is a typical data
processing technique which becomes the new spotlight of researches. Complex
Event Processing over dynamic data management systems and algorithmic trading
systems poses huge challenges with regard to efficient, scalable execution as
well as expressive models and languages that account for the dynamics in
long-running queries. In this paper we discuss the characteristics that a data
event processing service should have in order to support in the best way the
complex event pattern detection functionality, and present an assessment of a
number of technologies that can be used to dynamic data. Especially we propose a
corresponding event model and develop an algorithm that can efficiently detect
complex event over event stream. |
Keywords: |
Dynamic Data Management System, Algorithmic Trading, Complex Event Processing,
Volume Weighted Average Price, Complex Event Detection |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1309 - 1313 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
|
Title: |
STUDY OF A NEW PHASE DETECTOR BASED ON CMOS |
Author: |
CHEN SHUYUE, WANG NU |
Abstract: |
An analog phase discriminator, based on the two complementary CMOS switches, was
proposed to measure the initial phase of the sinusoidal wave. The circuit
structure of the phase discriminator and its principle were presented, and the
phase computational formula was derived through a series of circuit theories. So
the initial phase was acquired directly from the circuit, which covered a wide
frequency range with high accuracy, controllable, stability and reliability. The
effectiveness and feasibility were verified through simulation experiments at
the frequency of 1.25MHz. The results show that the maximum phase error is less
than 0.05 °, and the corresponding root-mean-square(RMS) value is lower than 0.2
under 256 times measurement. |
Keywords: |
Phase Detector, Complimentary, CMOS Switches, Initial Phase Detection |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1314 - 1318 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
Title: |
DISCUSSING SKETCHUP SOFTWARE IN THE APPLICATION OF ARCHITECTURAL DESIGN TEACHING |
Author: |
TANG HONG,WANG CHUN-XIA |
Abstract: |
In order to help the students of architecture out of the errors of studying
architectural design, this paper briefly introduces the application features of
the Sketchup software. They should truly understand the origin of architectural
design and master application skills of Sketchup software. Based on the
description of the current lack of architecture education and the feature of
Sketchup software, such as keenness in generating program, convenience in
modifing the program, flexibility in dealing with environment and so on, we
expound how to organically integrate the software into teaching of architecture
to guide the students to focus on the form and space design in the design
process. Through thorough understanding of the content of the architectural
design, students will enhance their professionalism. |
Keywords: |
Sketchup; Architectural Space; Architectural Design; Architectural Form |
Source: |
Journal of Theoretical and Applied Information Technology
pp 1319 - 1323 Vol. 48. No. 2 -- 2013 |
Full
Text |
|
|