|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
February 2013 | Vol. 48 No.3 |
Title: |
FLEXIBLE SHARING IN DHT-BASED P2P NETWORKS USING METADATA OF RESOURCE |
Author: |
GUO-YING WANG, ZHENG HUA |
Abstract: |
DHT-based P2P systems have the ability to map a resource’s identifier to its
location, so a resource can be located by the unique identifier of the resource.
In such systems users must know the identifier of a resource exactly to find the
resource. However, a resource can not be described accurately and integrally
only by an identifier for the variety and complexity of resources, and needs
multiple properties, i.e. metadata, are needed. In this paper, we proposed a
flexible sharing method for DHT-based P2P networks using the metadata of
resources. In this method, inverted indexes are constructed with multiple
properties of resources, hashed and placed into proper nodes based on DHT when
publishing resources; multiple properties are given by users and hashed to
corresponding nodes using DHT, then matched inverted indexes are collected
together and joined when searching for resources. Some extra technologies such
as synonyms library, combined properties and virtual nodes are also used in our
method to improve the sharing flexibility and performance. We also implemented a
prototype system of our sharing method, MP3Share, using which we evaluated the
performance improvement of combined properties. To improve the efficiency of the
whole system, we should using synonyms library and combined properties
technologies during the publishing procedure other than the searching procedure. |
Keywords: |
Resource Sharing, Metadata, Distributed Hash Table (DHT), Peer-to-Peer (P2P) |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
DESIGN OF COMP ACT RECTANGULAR DIELECTRIC RESONATOR ANTENNA FOR WIRELESS
COMMUNICATIONS |
Author: |
A. JAOUJAL, M. YOUNSSI, A. EL MOUSSAOUI, N. AKNIN |
Abstract: |
In this work, a small and very thin rectangular dielectric resonator antenna is
presented. A strip connected to a probe is used as feed mechanism. Moreover, a
strip is placed in the other side of the excitation (back side) in order to
excite a new resonance. The proposed antenna exhibits good performances, compact
dimensions (0.9 x 8 x 7 mm3), very wide band (43%) and a maximum gain of about
11.17 dBi. The performance of the dielectric resonator antenna is simulated on
Ansoft HFSS and CST microwave studio. |
Keywords: |
Thin DRA, Parasite Strip, Wide Band |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
AN ACCELERATED K-MEANS CLUSTERING ALGORITHM FOR IMAGE SEGMENTATION |
Author: |
SEYED MOJTABA TAFAGHOD SADAT ZADEH, ALIREZA MEHRSINA, MINA BASIRAT |
Abstract: |
This paper proposes a new enhancement and efficient approach
for diminution of iterations in K-Means algorithm. Also a quantized color and
gray scale histograms are used for HSV color environments to reduce the process
of image segmentation. As an apposed to traditional K-Means technique, in the
suggested approach the initial centroids are automatically designated by an
effective set of relations. Thus, pixel clustering process is only necessary to
be done once after discovering all the centroids. Experimental results show that
the new enhanced proposed approach gives better outcome in terms of speed and
the results got from this research is closer to human visual perception from the
colors. |
Keywords: |
Color Image Segmentation, K-Means, Quantization, Image Processing, HSV Color
Space |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
COMPUTATIONAL ANALYSIS OF THE SYNONYMOUS CODON USAGE AND MUTATION DISTRIBUTION
IN CARD15 |
Author: |
Sim-Hui Tee |
Abstract: |
Synonymous codon usage is an extensive phenomenon found
across species, including human. Understanding of this phenomenon may aid in
better understanding of gene expression mechanism, which has a practical utility
in biomedicine research such as combating diseases. This research employed a
computational approach to study the synonymous codon usage and mutation
distribution in Card15 gene. The obtained results characterize the main factor
that drives the codon usage in Card15 gene and the extensiveness of mutation.
This computational insight into Card15 gene may shed light on the immunologic
mechanisms of human against pathogen such as viruses. |
Keywords: |
Bioinformatics, Database, Scientific Computing, Synonymous Codon, Gene, Card15 |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
MISBEHAVING ATTACK MITIGATION TECHNIQUE FOR MULTICAST SECURITY IN MOBILE AD HOC
NETWORKS (MANET) |
Author: |
C.RAJAN, N.SHANTHI |
Abstract: |
Node misbehavior problems have received increased attention
in multicasting in Mobile ad hoc networks (MANET). The misbehaving nodes can be
either selfish or malicious nodes. The main goal of the malicious nodes is to
intentionally interrupt the network using various attacks. Hence it is essential
to develop a mitigation technique against misbehaving attacks. In this paper, we
propose a misbehaving attack mitigation technique for multicast security in
MANET. Initially the nodes are categorized into strong and weak nodes according
to their stability index which is estimated based on the link availability and
mobility. Among the selected strong nodes, the nodes with high reputation index
are chosen as initiator nodes which assist in attack detection. The initiator
node detects the misbehaving nodes based on their packet delivery ratio. Upon
misbehaving node detection, initiators employ recrimination based attack
isolation technique to isolate the attacker node during data transmission. By
simulation results we show that the proposed technique enhances security in
MANET. |
Keywords: |
Mobile Ad Hoc Networks (MANET), Misbehaving Attack Mitigation Technique (MAMT),
Security |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
APPLICATION OF DIGITAL IMAGE PROCESSING TECHNOLOGY IN DYNAMIC TRIAXIAL TEST OF
SOIL MECHANICS |
Author: |
Shao Longtan, Yang Song, Sang Yong, Huang Chuan, Guo Xiaoxia |
Abstract: |
Soil stability problems caused by vibratory loading, such as
that of earthquakes and wind, have been increasingly observed. Designs and
developments, which include a soil dynamic triaxial testing apparatus and a
triaxial sample surface dynamic deformation measurement method based on the
digital image processing technology, have been proposed to study the
characteristics of soil under dynamic loads. The sub-pixel coordinates of corner
points of squares on rubber membrane wrapping soil sample can be extracted using
a high-speed camera that synchronously shoots images of soil surface dynamic
deformation combined with the Canny operator and the Harris method. In
accordance with the concept of the four-node isoparametric element in a finite
element analysis, the dynamic deformation of soil sample can be calculated. The
test results show that the dynamic deformation measurement method involving the
use of digital image processing technology is effective in measuring the
characteristics of the axial and radial deformation of the strain field, thereby
provides a strong experimental foundation to study the mechanical
characteristics of soil samples. |
Keywords: |
Digital image Processing, Geotechnical Test, Dynamic Triaxial, Transformation
Measurement |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
MEASUREMENT AND EVALUATION OF THE COORDINATION DEVELOPMENT OF PREE SYSTEM IN
HEILONGJIANG PROVINCE, CHINA |
Author: |
ZI TANG |
Abstract: |
The coordination development of
population-resource-environment-economy (PREE) system is viewed as an important
way to realize regional sustainable development. This paper aims to establish
the coordinate assessment methods for studying PREE system by principal
component analysis, regression analysis and models concerning coordination
development. On the basis of the case study on Heilongjiang Province, the paper
quantitatively assessed the index of integrated development and the degree of
coordination development of each subsystem. The result indicated that the index
of integrated development and the degree of coordination development of each
subsystem had an increasing tendency in different degrees in general, while
showed obvious stage and fluctuant characteristic from 1997 to 2010. Resource
has become the bottleneck for the coordination development of between
population, resource, environment and economy in Heilongjiang Province. |
Keywords: |
Sustainable Development, Coordination Degree,
Population-Resource-Environment-Economy (PREE), Heilongjiang Province |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
THREE-VALUED ABSTRACTION IN MODEL CKECKING PROBABIBLISTIC REAL-TIME TEMPORAL
LOGIC OF KNOWLEDGE |
Author: |
ZHIFENG LIU, BO SUN, CONGHUA ZHOU |
Abstract: |
Model checking in probabilistic real-time temporal logic of
knowledge PTACTLK confronts the same challenge as in traditional model checking,
that is the state space explosion problem. Abstraction is one of the most
effective methods to alleviate the state space explosion problem, under the
traditional framework of two-valued abstraction, the abstract model obtained
using abstraction techniques is only the upper approximation of the original
model. In this paper, we introduce three-valued abstraction into model checking
probabilistic real-time temporal logic of knowledge, define the abstract model
of a probabilistic real time interpreted system and present the three-valued
semantics of PTACTLK on the abstract model. We prove that the abstract model
obtained using the abstraction techniques is not only the upper approximation of
the original model but also its lower approximation. At last, a simple
communication protocol is adopted to illustrate the effectiveness of our
abstraction techniques. |
Keywords: |
Model Checking (MC), Probabilistic Real-time Temporal Logic of Knowledge (PRTLK),
PTACTLK, State Space Explosion(SSE), Three-valued Abstraction(TA) |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
EFFECT OF RETARDER ON REACTION PROCESS OF METAKAOLIN-SLAG-BASED GEOPOLYMER |
Author: |
ZHU HUAJUN, YAO XIAO |
Abstract: |
Metakaolin-slag-based geopolymer is a type of green
cementitious material. In order to solve the engineering problem that the
geopolymeric paste sets fast at high temperature, a kind of retarder-BCH has
been developed. The setting time of the pastes incorporated with different
contents of BCH are measured. The effects of BCH on geopolymerization process is
researched by analyzing the heat evolution of alkali-activation reaction, the
chemically combined water content and the microstructure of the pastes. Results
indicate that the optimum retarding dosage of BCH is 5.0%. The hydration rate
and the exothermicity rate of geopolymeric paste (20 ℃) are reduced. The initial
setting time of the paste at 80 ℃ extends for 17.3 times than the pastes without
BCH. Alkali-activation reaction at 20 ℃ has later and lower exothermic peak than
reaction without BCH. The reaction at 80 ℃ undergoes a period of 4~6 h and is
longer than that without BCH (0.25~1.0 h). The content of chemically combined
water of reaction product and reaction rate reduce apparently before geopolymer
solidifies totally. The main reason that BCH has an effective retarding
influence on geopolymerization, as revealed by SEM and EDS is that BCH
participated in the reaction and produced precipitation adsorption on the
surface of reacted particles. |
Keywords: |
Geopolymer, Reaction Process, Geopolymeration, Retarder, Metakaolin, Slag |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A HUMAN-ORIENTED VIRUS PROPAGATION MODEL IN EMAIL NETWORKS |
Author: |
XIANGHUA LI, CHAO GAO |
Abstract: |
Our world is currently threatened by digital viruses, such as
email viruses and mobile viruses. These viruses are mainly activated by users’
operations. Therefore, it’s important for us to understand the pattern of user’s
operational behaviors and estimate the effect of such behaviors on virus
propagation. This paper first reveals the statistical characteristics of human
behaviors, especially the email-checking intervals of the same user based on the
Enron email dataset. After that, we analyze the effect of human operational
behaviors and network topologies on virus propagation in a human-oriented virus
propagation model. The empirical results from real dataset show that the waiting
intervals of each user to check mailbox follow a long-tail distribution.
Combining this finding, our experiments accurately describe the process of
email-virus propagation. The results show that viruses can fast spread in a
network if the email-checking intervals follow a long-tail distribution with a
higher power-law exponent. Meanwhile, our results find that the infected nodes
with the highest-degree may speed up the virus propagation through analyzing the
effects of network structure on virus propagation. |
Keywords: |
Human Dynamics, Waiting Intervals, Virus Propagation |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
MULTI-METHOD INTEGRATED ON SOC ESTIMATION OF LI-ION BATTERY |
Author: |
FENG JIN, HE YONG-LING |
Abstract: |
The Li-ion battery is studied base on its equivalent circuit
model. The discrete state space equation is established using Ah counting method
and OCV method. The filtering algorithm is set up under the noisy environments
according to the principle of extended Kalman filter and simulated. The
simulation results showed that the integrated of three algorithms could very
well remove the environments noise, so the accurate estimate of Li-ion battery
SOC value can be gained. |
Keywords: |
Li-ion battery, SOC estimation, Ah counting method, OCV method; EKF |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
AN INVESTIGATION ON METALIB USAGE BY CHINESE STUDENTS IN LOUGHBOROUGH UNIVERSITY |
Author: |
YANG ZHONGHUA, ZHANG LING |
Abstract: |
The main purpose of this article is to investigate MetaLib
usage by Chinese students in Loughborough University. MetaLib is a library
portal which provides a consolidated search environment for remote information
resources, helping users find the information they need quickly and effectively.
In this study, the researcher intended to investigate how students use MetaLib;
including what problems they experienced, how they dealt with those problems and
possible solutions; and used a combination of literature research, observation
and interview with the Chinese students in the Loughborough University. |
Keywords: |
MetaLib, Investigation, Advantage, Disadvantages, Improvement |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
DISCRETE MARKOV CHAIN MODEL FOR REPUTATION ESTIMATION OF UNSTRUCTURE P2P
NETWORK |
Author: |
HE CHAOKAI, WU MENG |
Abstract: |
Building trust relationships between peers is an important
and difficult part in the security needs of P2P network without a central
server. P2P reputation system has been introduced which collects locally
generated peer feedbacks and aggregates them to yield global reputation scores.
Most P2P applications on the Internet are unstructured, without fast hashing and
searching mechanisms, how to perform efficient reputation estimation is a major
challenge on unstructured P2P computing. This work thus proposes a two-step
reputation estimation approach for the unstructured P2P network. First, a Markov
chain model is proposed to determine the reputation value for each one-hop
neighbors. A peer’s reputation value (RV) is analyzed from its previous trust
manner in this group. The proposed trust model is proven as an ergodic
Continuous-Time Markov Chain model. Second, a peer with the highest RV of a
group will be selected as the central authentication(CA) server. For increasing
reliability, the peer with the second highest RV will be selected as the backup
group leaser(BCA) that will take over CA when CA fails. The procedures of the
peer’s RV are detailed. Numerical results indicate that the analytical RV of
each peer is very close to that of simulation under various situations. |
Keywords: |
Discrete Markov Chain, Reputation Estemination, Unstructure P2P Network |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A UWB MIXED POSITIONING METHOD BASED ON THE PATTERN MATCHING IN UNDERGROUND
MINES |
Author: |
TIAN ZIJIAN, WANG BAOBAO, LI MING,LIU JUN, CHEN WEI |
Abstract: |
In the present paper, the application of a UWB mixed
positioning method based on pattern matching in underground mines is researched.
This paper proposes a two-step positioning method of strip area system based on
UWB communication that makes full use of stripe structure of roadway to arrange
reference nodes along wall. The areas of various reference nodes continuously
cover roadway in overlapping. First, use the positioning method of signal
intensity and the strength value range of each reference node to determine the
area of reference nodes where the target node is and then use UWB TOA ranging to
generate constraint equation through reference nodes of areas for further
obtaining the location information of target nodes. To carry out UWB TOA
ranging, it is necessary to determine DP at first. To this end, this paper
proposes a detection method based on incoherent energy collection, which can
compare energy sampling sequence with determined threshold. The energy block
that firstly exceeds threshold will be regarded as the sampling block where DP
is and the intermediate time of sampling block is regarded as arrival time of
DP. Based on this method, simulation analysis of ranging error is carried out
and the experiment results show that this mixed positioning method can achieve
high ranging and positioning accuracy. |
Keywords: |
Underground Mine, Ranging, Positioning, UWB, Pattern Matching, TOA |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
WORKSPACE AND SINGULARITY ANALYSIS OF 3/3-RRRS PARALLEL MANIPULATOR |
Author: |
YU QIAN, QIANG WANG, GUILAN CHEN, JINGHU YU, YI CAO |
Abstract: |
The workspace of manipulator can be defined as the
operational area of the end effector. Because the moving platform of the
parallel manipulator with six degree-of-freedom have six independence
movement(movement in any direction and rotation around any direction), it means
the workspace has six-dimensional, the six-dimensional workspace is difficult to
be directly calculate and unable to graphic description. For the project of this
article-3/3-RRRS parallel manipulator, this article will analyze the workspace
of the manipulator in two cases. A discretization method is proposed for the
computation of the reachable position/orientation workspace of the 3/3-RRRS
parallel manipulator, respectively. Four examples of a 3/3-RRRS parallel
manipulator are given to demonstrate these theoretical results; change rules are
discussed in detail. As a special position and inherent attributes of the
mechanism, singularity has a serious impact on the mechanism's motion control
performance and drive performance. The method of searching algorithm in
three-dimensional space is applied to the singularity analysis, coordinate of
all possible stable positions are substituting into the Jacobian,
position-singular points under given orientation condition are conformed. |
Keywords: |
3/3-RRRS Parallel Manipulator, Workspace Analysis, Singularity Analysis |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
REDUCED ATLAS DATABASE AND ITS APPLICATION IN MULTI-ATLAS SEGMENTATION |
Author: |
YAQIAN ZHAO, JIACHEN ZHANG, AIMIN HAO, YUE FU |
Abstract: |
To simplify the problem of atlas selection in multi-atlas
segmentation, we define Minimum Reduced Atlas Database (MinRAD), and give an
algorithm of selecting MinRAD. Furthermore, nine types of MinRAD model are
proposed based different similarity measures and input images, and their
performances on multi-atlas segmentation are compared in two databases. Finally,
we give some advice on how to select similarity measure and its threshold. |
Keywords: |
Reduced Atlas Database; Medical Image Processing; Multi-atlas Segmentation;
Brain MRI Segmentation; Structural Similarity |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
PARALLEL BILINEAR SPATIAL INTERPOLATION ALGORITHM BASED ON GPGPU |
Author: |
WU QINGSHUANG, WANG QIANG, CHENG XIANGFU |
Abstract: |
In view of the problem that massive spatial data
interpolation is a complex and time-consuming computing process, and the
traditional CPU implementation methods can't meet the real-time processing
demand, in this paper, we propose a parallel bilinear spatial interpolation
algorithm, which is accelerated by the graphic processing unit(GPU) and
implemented in compute unified device architecture(CUDA). Firstly, we introduce
the basic idea of general purpose computing on graphics processing units (GPGPU)
and then discuss the technology of the CUDA programming model. Secondly, we
introduce the principle of the bilinear interpolation algorithm and analyze the
feasibility of mapping the bilinear interpolation algorithm program onto the GPU,
and then we provide detail of implementing our parallel bilinear spatial
interpolation algorithm on GPU that uses the CUDA programming model. Finally, we
conduct several groups of experiments to demonstrate the strength of our GPU
implementation method by measuring the performance over standard CPU
implementation. The experimental results show that the GPGPU-based parallel
algorithm can take full advantage of the GPU's parallel computing capabilities,
and can achieve about 40 times speedup; it is able to meet the demand of
real-time processing of massive spatial data interpolation. |
Keywords: |
General Purpose Computing on Graphics Processing Units; Compute Unified Device
Architecture; Bilinear Spatial Interpolation; Spatial Index; Speedup |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
ANALYSIS ON MANAGEMENT OF DIGITAL LIBRARY |
Author: |
JING ZHAO, HAIBIN ZHANG, JUNXIA QI |
Abstract: |
Along with the application of information technology
gradually increased in the library, libraries’ digitization and information are
becoming more and more mature. Therefore, the management of digital library
needs to change ideas, realizes the modernization and science of management to
promote digital library to be scientifically efficient operation. Firstly, this
paper expounds on the concept of digital library, and summarizes the
characteristics of the digital library. What’s more, it further analyzes the
digital library’s management innovation under the informatization background. On
this basis, the theory combines with practice. It applies mathematics model to
construct the scientific management model of the digital library. And through
the model analysis, it puts forward some suggestions and practical measures for
scientific management of the digital library. To some extent, it provides a new
active exploration path for the research of this field. |
Keywords: |
Digital Library, Management Innovation, Model Construction, Comparative Analysis |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
APPLICATION OF SUPPORT VECTOR MACHINE IN LANE CHANGE RECOGNITION |
Author: |
CHANG WANG, JIAHE QIN, REN ZHANG, YAQI ZHANG |
Abstract: |
Aiming at the lane change behavior recognition requirements
for vehicle active safety system, natural driving test in real road were carried
out and different parameters related to lane change behavior were collected
synchronously. Firstly, parameters were processed with Kalman filter to
increasing the potential relevance among sample data. Then, SVM model was
established for lane change recognition. Lastly, data normalization, principal
component analysis method, and bayesian network were adopted to optimize the SVM
model. The recognize rate of lane change with 1.2 second time window increased
from 93.9% to 98.7% by using these optimization measures. It can be meet the
requirements of effectiveness and real-time for vehicle active safety system,
such as lane change warning system or lane departure warning system. |
Keywords: |
Lane Change, Support Vector, Kalman Filter, Principal Component Analysis,
Bayesian Network |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
EVALUATION MODEL OF FUZZY DATA AND NEURAL NETWORK IN MARTIAL ART COMPETITION |
Author: |
HAI YU |
Abstract: |
Due to the ambiguity of the results given by the referee in
Martial art competition, the design of a set of fair and impartial, scientific
and rational evaluation system is particularly important. This paper builds a
fuzzy comprehensive evaluation model based on the fuzzy number theory. As this
model has a high degree of subjectivity, this article combines RBF neural
network model and data envelopment analysis method with fuzzy comprehensive
evaluation model and establishes two kinds of evaluation model as fuzzy data
envelopment analysis and fuzzy neural network, solving the reliability and
scientific issue of the evaluation result appropriately. |
Keywords: |
Martial Art, Fuzzy Data, Neural Network |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A NEW NODE SELF-LOCALIZATION ALGORITHM FOR WIRELESS SENSOR NETWORK USED IN THE
BOREHOLE |
Author: |
WENXIAO ZENG, JING ZHOU, JUNLIN ZHOU, TONGHAI JIANG,
XIAO LI |
Abstract: |
Determining the physical location of sensor nodes is the most
basic requirement in most Wireless Sensor Networks (WSN) application. Wireless
sensor network nodes’ self-localization techniques are discussed and studied in
this paper. At first, the organization structure of wireless sensor network, the
classify of node location algorithmic and node location computing method are
introduced, the significance of studying wireless sensor network node location
is also stated. Considering the problem of large errors accused by beacon nodes
collimation and uneven distributed beacon nodes in the process of locating,
location algorithm based on radical center is put forward, by which, location
errors caused by collinear beacon nodes can be natural filtrated by computing
the radical centers between beacon nodes. The idea of weighted sharing is used
to revise location errors and getting the position coordinates of unknown nodes,
and algorithm’ correctness is tested and verified by simulation experiment. |
Keywords: |
Wireless Sensor Networks, Node Location, Radical Center
Algorithm, Cooperative Communication Technology, Computer Simulation |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A SPORTS TOURISM RESOURCES COMPREHENSIVE EVALUATION MODEL BASED ON AHP-FUZZY |
Author: |
YUKUO WANG, LIPING GUO, LIMING HUANG |
Abstract: |
The non-objective and non-scientific evaluation of sports
tourism resources has become a bottleneck which restricts the development of
sports tourism industry. In order to make the evaluation of sports tourism
resources have more comprehensiveness, accuracy and scientificalness and to
promote the healthy and sustainable development of sports tourism industry, this
paper, based on the AHP-FUZZY mathematics evaluation method, proposes a new
sports tourism resources evaluation model through the investigation and research
of experts and scholars. This model consists of three index systems and makes
weight setting of factors of each index system according to FUZZY mathematics
evaluation method, integrating AHP and FUZZY evaluation methods. This
comprehensive evaluation model has the advantage of the combination of
qualitative and quantitative analysis which avoids the subjectivity of AHP and
the dichotomy of FUZZY evaluation method. The results show that using this
sports tourism resources evaluation model to evaluate the sports tourism
resources of Qinhuangdao is effective, scientific and feasible. |
Keywords: |
Sports Tourism Resources, AHP, Fuzzy Mathematics, Comprehensive Evaluation
Model, Qinhuangdao |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
JUDGMENT ANALYSIS ON INFORMATION AND COMMUNICATION TECHNOLOGY BASED ON ENGLISH
TEACHING |
Author: |
SHUYING HAN, LI JING |
Abstract: |
As an important branch of modern science and technology,
information and communication technology plays an increasingly important role in
the modernization of education strategy and has also been widely used in modern
English teaching. This paper discusses the basic concepts of information and
communication technology and its application in the teaching of English. Then,
based on mathematical model, the paper analyzes the application of information
and communication technology in the scientific judgment of English teaching.
Finally, it gets a conclusion that the application of information and
communication technology is useful to modern society by the contrast of
traditional English teaching and modern English teaching. |
Keywords: |
English Teaching, Information And Communication Technology, Mathematical Model,
Judgment Analysis |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
TWO-STEP TECHNIQUE BASED LAPLACIAN FACTOR ESTIMATION FOR SPEECH ENHANCEMENT |
Author: |
SHIFENG OU, XIANYUN WANG, XIAOJUN ZHANG, YING GAO |
Abstract: |
The estimation of Laplacian factor is a crucial part of
speech enhancement algorithms using Laplacian model priori. Classical methods
for the estimation of this parameter suffer from the residual noise or time
delay bias. In this paper, a novel algorithm called two-step technique for the
estimation of Laplacian factor is proposed in discrete cosine transform domain.
Based on the estimation theory of minimum mean square error (MMSE), the proposed
algorithm computes directly the amplitude of the clean speech component to
refine the estimated Laplacian factor in the original method, and thus the
accurate result can be attained. Simulation results under different kinds of
noisy conditions and levels demonstrate that the proposed algorithm possesses
improved performance than that of the original method. |
Keywords: |
Speech Enhancement, Two-Step, Discrete Cosine Transforms, Noise Reduction,
Laplcian Model |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
SOCITEMREC: A FRAMEWORK FOR ITEM RECOMMENDATION IN SOCIAL NETWORKS |
Author: |
XING XING, WEISHI ZHANG, XIUGUO ZHANG, NAN XU |
Abstract: |
Collaborative filtering based recommendation methods focus on
user-item information for modeling the user interest. However, in social
networks the user interest is influenced by other user interests in the local
social circle of the active user. In this paper, considering the homophily of
relation to similar interests and similar friends, we propose a social item
recommendation framework (SocItemRec). Our framework combines both global
interest from the user-item information and local interest from social relation
information for recommendations. We evaluate our framework on real world data
from Sina Weibo, one of the most popular social network sites in China. The
experimental results demonstrate that our framework leads to improved
performance of top-k item recommendation. |
Keywords: |
Collaborative Filtering, User Interest Model, Social Recommendation, Recommender
System |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
PUBLIC EVACUATION PROCESS MODELING AND SIMULATION BASED ON CELLULAR AUTOMATA |
Author: |
ZHIKUN WANG |
Abstract: |
Considering attraction of the nearest exit, repulsive force
of the fire, barrier and its display style, effect of fire exit location on
escape time in fire hazard, a mathematical model of evacuation process model was
build based on cellular automatic theory. The program was developed by
JavaScript. The influencing factors of evacuation were obtained through the
simulation model by inputting crew size, creating initial positions of crew and
fire seat stochastically. The experimental results show that the evacuation
simulation model with authenticity and validity, which has guiding significance
for people evacuation and public escape system design. |
Keywords: |
Evacuation, Cellular automata, Simulation, JavaScript |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
ENDOMORPHISM SPECTRUMS AND ENDOMORPHISM TYPES OF GRAPHS |
Author: |
JIQING ZHAO, ZANXIAN ZHANG |
Abstract: |
In this paper, the endomorphisms, the half-strong
endomorphisms, the locally strong endomorphisms, the quasi-strong endomorphisms,
the strong endomorphisms and the automorphisms of a join of cycle and a vertex
are investigated. Some enumerative problems concerning these graphs are solved.
In particular, the endomorphism spectrums and the endomorphism types of these
graphs are given. It has a wide range of applications in Information Science. |
Keywords: |
Endomorphism, Endomorphism Spectrum, Endomorphism Type Join Of Graphs |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A SHORTEST ANTECEDENT SET ALGORITHM FOR MINING ASSOCIATION RULES* |
Author: |
QING WEI, LI MA, ZHAOGAN LU |
Abstract: |
Aiming at the redundancy problem of association rules in the
mining process of mining association rules, a kind of shortest antecedent set
algorithm (SASA) for mining association rules is proposed in this paper, and the
algorithm is supported by the set-enumeration tree structure. The proposed
algorithm is able to record a kind of subset for association rules without any
information loss, and this kind of subset contains the entire generated
association rule nondestructive. Experimental results show that the algorithm
can significantly reduce the number of association rules, and it also improves
the efficiency of analyzing the association rules for users. |
Keywords: |
Association Rule, Shortest Antecedent Set, Key Rule |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
K-PRUNING ALGORITHM FOR SEMANTIC RELEVANCY CALCULATING MODEL OF NATURAL LANGUAGE |
Author: |
YUNTONG LIU |
Abstract: |
In order to process natural language more effectively, a
semantic relevancy calculating model of natural language was proposed, and the
k-pruning algorithm for solving the model was researched. In the model, the best
parsing process for a sentence could be determined by the value of semantic
relevancy of the sentence; the two-level semantic structure of a sentence were
analyzed, and two grammar rules were used to describe the two-level semantic
structure; In the process of solving the model, a state tree would be generated;
the k-pruning algorithm could be used to delete the states with less semantic
relevancy when searching the state tree, and the computational complexity could
be effectively reduced and the approximate solution could be acquired. Finally
experiments were finished to verify the effectiveness of the algorithm. |
Keywords: |
Natural Language, Semantic Relevancy, The State Tree, K-Pruning Algorithm |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
BUS DEPATURE INTERVAL MODEL AND ALGOROTHM UNDER THE UNCERTAIN ENVIRONMENT |
Author: |
LIANG WU, XIAOPING GUANG |
Abstract: |
Determining the departure interval is the basic of
establishing the operation plan. Based on the existing researches, and consider
all kinds of uncertain factors in operation process overall, to establish a
bilevel programming model which is based on the game of passengers and operation
companies. And use the differential evolution bacterial foraging algorithm to
solve this model. Set the passengers satisfaction as upper target, and the
operational efficiency of enterprise as the lower target. At last examples show
that this model can effectively optimize the departure interval, and it has
certain feasibility and effectiveness. |
Keywords: |
Bus Departure Interval, Uncertain Programming, Bilevel Programming Model,
Bacterial Foraging Algorithm |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
EVALUATION AND RESEARCH OF INCUBATOR’S HATCH ABILITY OF SMALL AND MEDIUM-SIZED
ENTERPRISE BASED ON MULTICLASS ANALYSIS |
Author: |
XUE WU |
Abstract: |
With the continuous development of business incubator
nowadays, the existing evaluation method of enterprise incubator’s hatch ability
has been unable to meet the needs of small and medium-sized enterprises. This
paper proposes a small and medium-sized enterprise incubator’s hatch ability
evaluation model based on multiclass method, this model introduced the principal
component analysis and factor analysis, first, it selects small and medium-sized
enterprise incubator’s hatch ability evaluation index, then it makes data
conversion to these indicators, then it carries out the variable correlation
analysis, and finally do the hatch ability evaluation. The experimental results
show that the small and medium-sized enterprise incubator’s hatch ability
evaluation model based on multiclass can evaluate effectively small and
medium-sized enterprise incubator’s ability, that is to say this model is
practical and effective. |
Keywords: |
Principal Component Analysis, Factor Analysis Method, Small and Medium-sized
Enterprise Incubator, Hatchability Evaluation |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
BUILDING MATERIALS LOGISTICS ROUTE OPTIMIZATION UNDER LOW-CARBON ECONOMY-BASED
ON SIMULATED ANNEALING |
Author: |
HUI LI, JINGXIAO ZHANG, ZHEN SHI |
Abstract: |
Since the logistics is an industry with relatively higher
energy consumption, the building industry low-carbon logistics ought to attract
wide attentions from the building enterprises. Simulated annealing is an
effective intelligent algorithm for optimizing the building materials logistics
route. This paper analyzes the similarities between the process of the building
materials logistics route optimization and the process of simulated annealing,
applies the simulated annealing to the adaptability of the building materials
logistics route optimization, and gets the results that simulated annealing can
be used to solve this issue. Finally, this paper applies the simulated annealing
in optimizing the building material performance so as to control and optimize
the building materials performance. |
Keywords: |
Low-Carbon Economy, Building Materials, Logistics, Logistics Route, Simulated
Annealing |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
SCHEDULING OPTIMIZATION IN CONSTRUCTION PROJECT BASED ON ANT COLONY GENETIC
ALGORITHM |
Author: |
JINGXIAO ZHANG, HUI LI, LIEYAN REN, ZHEN SHI |
Abstract: |
This paper introduces the basic theory and procedure for
working out solutions of ant colony genetic algorithm, describes optimization,
constraints and objectives of construction project scheduling, then establishes
basic model for scheduling optimization of construction project, and put forward
improved ant colony genetic algorithm for solving the basic model. Performance
of ant colony genetic algorithm is analyzed and evaluated from aspect of
schedule - cost equilibrium in practical engineering optimization. Finally, case
studies are done. |
Keywords: |
Ant Colony Genetic Algorithm, Construction Project, Time-Cost Optimization,
Optimization Model; Case Analysis |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK |
Author: |
CHUAN CAI, LIANG YUAN |
Abstract: |
The gain of SVC depends upon the type of reactive power load
for optimum performance. As the load and input wind power conditions are
variable, the gain setting of SVC needs to be adjusted or tuned. In this paper,
an ANN based approach has been used to tune the gain parameters of the SVC
controller over a wide range of load characteristics. The multi-layer
feed-forward ANN tool with the error back-propagation training method is
employed. Loads have been taken as the function of voltage. Analytical
techniques have mostly been based on impedance load reduced network models,
which suffer from several disadvantages, including inadequate load
representation and lack of structural integrity. The ability of ANNs to
spontaneously learn from examples, reason over inexact and fuzzy data and
provide adequate and quick responses to new information not previously stored in
memory has generated high performance dynamical system with unprecedented
robustness. ANNs models have been developed for different hybrid power system
configurations for tuning the proportional-integral controller for SVC.
Transient responses of different autonomous configurations show that SVC
controller with its gained tuned by the ANNs provide optimum system performance
for a variety of loads. |
Keywords: |
Wireless Sensor Network, DV-Hop Algorithm, Average Localization Error,
Localization Coverage |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A GREY DATA ENVELOPMENT ANALYSIS MODEL |
Author: |
HUAFENG XU, SHUKE ZHOU |
Abstract: |
In this paper, grey system theory and DEA are combined to establish a grey DEA
model. In traditional DEA model, Input and output values of decision-making
groups are all real numbers and real variables. They are replaced by grey
numbers and grey variables in grey DEA model respectively. Using positioning
solution method of grey linear programming, we prove the necessary condition for
grey effective of decision making unit. As a practical application, we evaluate
the performance of eight listed companies in Qingdao City, Shandong Province,
China. Listed companies are seen as decision-making unit, we analyze DEA
effective of their performance. |
Keywords: |
Grey System, Data Envelopment Analysis, Grey Linear Programming, Grey Dea
Effective |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
MINING TRIBE BASED ON THE FREQUENT PATTERN |
Author: |
LINA LIU, JIHONG SHEN, QIANGHUA ZHU |
Abstract: |
Discovering the influencers in the new social network is very
important for the promotion of products and the supervision of public opinion.
Most of the previous research was based on the method of mining influential
individuals, while the tribe-leaders were neglected. In this paper, a new method
of mining tribe-leaders is proposed based on the frequent pattern of
propagation. First, a method of changing the diffusion trees is proposed to
overcome the problem of multi-pattern in propagation, where the information
propagation trees are changed into a connected undirected acyclic graph. Then, a
new frequent subgraph mining method called Tribe-FGM is proposed to improve the
efficiency of graph mining by reducing the scale of pattern growth. Experiments
are conducted on a real dataset, and the results show that Tribe-FGM is more
effective than the method of Unot. |
Keywords: |
Social Network, Frequent pattern, Microblog, Graph Mining |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
SERVICE DESCRIPTION OF DIGITAL HOME BASED ON FUNCTIONAL CONCEPT ONTOLOGY |
Author: |
LEI GUO, XIPING TIAN |
Abstract: |
Agent must clearly understand important concepts of digital
home to accomplish task, so we constructed the ontology of digital home domain
in this paper in order to realize service family retrieval based on functional
semantic. First, a series of fundamental work were considered by analyzing the
family environment, which provided a unified viewpoint to the refining
classification of concepts. For example, the relevant concepts of services have
been extracted, the relationships between them have been described, the upper
ontology in the family field has been put forward, and so on. Then, the
functional concept ontology has been constructed by classifying and
systematizing the serve functions. Finally, the service registration and the
selection mechanism based on the functional concept ontology have been described
taking the gas security alarm system an example. |
Keywords: |
Digital Home, Home Service Retrieval, Functional Concept Ontology, Domain
Ontologies |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A RAPID GENERATION SCHEME OF LARGE PRIMES |
Author: |
LINA ZHANG |
Abstract: |
RSA is by far the most widely adopted standard in public key
cryptography algorithm. Its security depends on the Integer Factorization
Problem, that it is very easy to calculate the product of two large prime
numbers, but the decomposition the product and get the prime factors are very
difficult. Therefore, the generations of large primes are important research
field. This paper presented a rapid generation scheme of it, and the techniques
for the related software implementation were presented. To speed up the modular
multiplication and squaring, Montgomery's algorithms were used with sliding
window method. Three pretreatments were also described in details. In view of
prime generation of RSA, a series of design methods for software implementation
was proposed and give the optimization programs. |
Keywords: |
Prime Generation, Rabin Miller Test, RSA |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
RESOURCE SCHEDULING ALGORITHM BASED ON MULTI-TARGET BALANCE IN ENTERPRISE GLOUD
STORAGE SYSTEM |
Author: |
YIYI XU,PEIHE TANG, JINWEI LIU |
Abstract: |
Resource request task is limited by scheduling length, time
span, load balancing, quality of service, economic principles, safety
performance and other factors in the Enterprise Gloud Storage system, it is
difficult to characterize it with specific features. This paper analyzed the
storage model, designed a compromised task scheduling algorithm based on
multi-target balance. Algorithm’s universality is verified by large-scale
measurements which based on the randomly generated maps. The experimental
results indicate show that in view of the computation intensity and the memory
intensity load, this algorithm can perform well on aggregative indicators such
as job scheduling length, scheduling cost and average energy consumption. |
Keywords: |
Enterprise Gloud Storage, Multi-Target Balance, Resource Scheduling |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
COST: A SERVICE-ORIENTED SIMULATION ARCHITECTURE |
Author: |
ZHANG RUI, WANG ZHITENG, MAO SHAOJIE, SUN XIGANG |
Abstract: |
Community of Simulation task (CoST) is a simulation
architecture based on a service-oriented architecture to achieve seamless
integration and interoperability of command information system. It servitize the
simulation resources through combination the simulation service and completes
CoST by management and coordinated simulation resources. Firstly, this article
introduced in the CoST involves simulation service, simulation resources, CoST,
CoST members as well as simulation service system concept and CoST's principle.
Secondly, the article describes CoST's architecture and key technologies of
simulation task to solve problem. Finally, combining tasks of joint training
simulation control system with hierarchical structure describes CoST’s
application in detail. |
Keywords: |
SOA, CoST, Network-centric Warfare, Joint Training Simulation of Control System |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
OPTIMIZATION METHOD BASED ON DOE AND GRADIENT ALGORITHM |
Author: |
XU YIN, AIMIN JI , XINLEI HUANG, PENGFEI SUN |
Abstract: |
To solve problems that exist in optimal design such as
falling into local optimal solution easily and low efficiency in multi-objective
optimization, a new approach based on design of experiments (DOE) and gradient
optimization (GO) was proposed. The new optimization method is called DPG (DOE
Plus GO) which used DOE for preliminary analysis of the function model, and took
the optimal values obtained in DOE stage as the initial values of design
variables in GO stage so as to reduce the effect on the result of optimization
made by the designers’ decision. This paper gave two typical examples of
optimization to confirm DPG global, efficient, and accurate with Isight code.
Firstly, the bimodal problem was used to test DPG’s global optimization ability,
then the multi-objective optimization of the machine tool spindle, which
required minimum quality, maximum stiffness, and strength was conducted. The
results show the DPG optimization method could not only avoid falling into local
solution, but also have an obvious superiority in treating the multi-objective
optimization problems. |
Keywords: |
Local Solution, Multi-objective Optimization, Design of Experiments (DOE),
Gradient Optimization (GO), DOE Plus GO (DPG) |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
AN OPTIMIZATION MODEL AND ALGORITHM OF STUDENTS' PHYSICAL FITNESS TEST SEQUENCE |
Author: |
JINSONG ZHANG, SHUWEI ZHANG |
Abstract: |
In this paper, on the basis of full understanding of the
model and the algorithm of solving combinatorial mathematics bin-packing problem
and production planning processes arrangements, in accordance with the
characteristics of the students' physical fitness test to determine the
two-stage method for solving the problem. The first stage, simplify the model
into a bin-packing problem, and thus get the minimum time period, assign the
class to each time according to the total number of physical fitness test to the
principle of the optimal balance. The second stage, in order to simplify the
calculation, take the student as little as possible total waiting time as the
objective function to simplify the problem into the process arrangements model,
the model for different rationality makes a better evaluation, adaptability is
strong and have a certain value of popularization and application. |
Keywords: |
Physical Fitness Test, Waiting Time, Approximation Algorithm, Bin-Packing
Problem |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
GENE REGULATORY NETWORK MODEL FOR PRODUCT INDUSTRIAL DESIGN |
Author: |
XIAOJIAN LIU, YAN SUN, JIANFENG WU |
Abstract: |
User’s sensitive image to products is the emphasis that
industrial design concerns, and is also the one of the key targets. Complicated
mapping relations exist between design elements and user image, which make
product’s user image unpredictable. The paper tries to build a model to describe
the mapping relations on the basis of graph theory, which introduces the concept
of genetic regulatory network (GRN) into industrial design. The model takes
design elements as nodes and the relationship between elements as edge to build
and draw product’s GRN graph. Through the GRN, product’s design elements are
classified and the types of nodes and nodes groups are recognized, as abstracted
knowledge for designers to arrange their design activities, or prepare the
searching strategy for automatic optimizing programs. An example of water bottle
design is carried out to test GRN’s aiding effect to product design. |
Keywords: |
Product Design, industrial Design, Genetic Regulatory Network, Product Gene |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
APPLICATION OF MULTIMEDIA TECHNOLOGY IN SITUATIONAL TEACHING OF FOREIGN LANGUAGE |
Author: |
ZHENHUAN ZHANG, FENGYUN ZHAO |
Abstract: |
By using digital information, such as graphic image and audio
as well as vedio, the integration of situational teaching of foreign language
and modern multimedia technology enriches the content of foreign language
teaching, which provides a rich and colorful environment for English learner. It
can stimulate emotional students’ experience and enhance their willings of
participating in interacting with classmates by reasonably creating a situation
around content of courses in teaching. Based on cognition of teaching method of
situational teaching theory, this paper constructs functions to analyze the
advantages of multimedia technology in situational teaching of foreign language,
thus deduces applied purpose and principle of multimedia technology in
situational teaching of foreign language by using the mathematical model to
construct thoughts. It provides theory basis and new way of teaching practice
for situational teaching of foreign language. |
Keywords: |
Foreign Language, Situational Teaching, Model Building, Analytic Function |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A MODEL OF THE URBAN ROAD INTERSECTION LEFT-TURNING RESTRICTION |
Author: |
XIAOPING GUANG, LIANG WU |
Abstract: |
Intersection left-turning restriction is one of the important
ways to solving the road congestion of the built-up area; however, how to set
scientifically and rationally is the key. A bi-level programming model was
making under the minimum the premise entire traffic network access time by using
the stochastic traffic assignment model which is more appropriate. The upper
planning described the intersection left-turning restriction by 0-1 variables,
and the combination of Frank-Wolfe algorithm and genetic algorithm was built for
solving the bi-level programming model. An example for solving the traffic
organization of a road network in a city's old town was given. The result shows
that the algorithm can solve this kind of problem high efficiently, and the
scheme was gotten with certain scientificity and rationality. |
Keywords: |
Urban Road Intersection Left-turning Restriction, Stochastic Traffic Assignment,
Bi-lever programming, GA |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
DEVELOPMENT AND PRINCIPLE OF CONTINUOUSLY VARIABLE TRANSMISSION HARDWARE IN THE
LOOP SIMULATION SYSTEM |
Author: |
LEI ZHANG, JIN DAI , XIUMIN YANG , TAO WEI |
Abstract: |
HILSS (Hardware in the loop Simulation System) is a safe
off-line virtual test system that will meet off-line test requirements, reduce
development costs and shorten the test cycle. Traditional development methods of
the control system will be changed by HILSS, which has been considered as an
advanced simulation technology and a convenient method. The construction and
development of HILSS of CVT (Continuously Variable Transmission) for vehicles
are presented in this paper. The structure and principle of CVT HILSS are
analyzed, then the engine model is built based on the engine data of bench test
and the best economic and the best dynamic curves of the engine are drawn. The
clutch model and the speed ratio control model are built based on the actual
structure of the CVT. These models are verified to be practical by the Matlab/Simulink.
At last, HILSS platform is built which can make debugging and development of the
control system a reality. |
Keywords: |
Vehicle CVT, HILSS, Modeling, System Development |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
STUDY ON SOFTWARE TESTING SUFFICIENCY BASED ON PROGRAM MUTATION TECHNOLOGY |
Author: |
NING JINGFENG , FAN XIAOLI |
Abstract: |
Software testing sufficiency means that the software’s
performance on limited testing data can represent its performance on all input
data. Ideally, in software testing, the testing should be carried on till all
errors in the program are detected and removed. As a testing strategy to measure
the completeness of the test cases set, mutation testing is a defects-oriented
unit testing technology, and a feasible software testing method to generate a
complete set of test cases. The article systematically simulates the different
defects in software by using mutation operators to create mutants, and then
construct testing data set to be able to kill these mutants. It analyzes the
procedures of mutation testing and the generation of mutation operators with
specific examples. Experiment indicates that the program mutation technology has
enhanced the test cases, which greatly improved the software testing
sufficiency. |
Keywords: |
Program Mutation, Software Testing, Mutation Operators, Testing Sufficiency |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
WORKSPACE AND SINGULARITY ANALYSIS OF 3/3-RRRS PARALLEL MANIPULATOR |
Author: |
YI CAO, QIANG WANG, GUILAN CHEN, JINGHU YU, WEIXI JI |
Abstract: |
The workspace of manipulator can be defined as the
operational area of the end effector. Because the moving platform of the
parallel manipulator with six degree-of-freedom have six independence
degree-of-freedoms, it means the workspace has six-dimensional, the
six-dimensional workspace is difficult to be directly calculated and unable to
do graphic description. For the project of this article-3/3-RRRS parallel
manipulator, this article will analyze the workspace of the manipulator in two
cases. A discretization method is proposed for the computation of the reachable
position/orientation workspace of the 3/3-RRRS parallel manipulator,
respectively. Four examples of a 3/3-RRRS parallel manipulator are given to
demonstrate these theoretical results. As a special position and inherent
attributes of the mechanism, singularity has a serious impact on the mechanism's
motion control performance and drive performance. The method of searching
algorithm in three-dimensional space is applied to the singularity analysis,
coordinate of all possible stable positions are substituting into the Jacobian,
position-singular points under given orientation condition are conformed. |
Keywords: |
Parallel Manipulator, Workspace Analysis, Singularity Analysis |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
FACE RECOGNITION BASED ON OPTIMAL KERNEL MINIMAX PROBABILITY MACHINE |
Author: |
ZHIQIANG ZHOU, ZIQIANG WANG, XIA SUN |
Abstract: |
Face recognition has received extensive attention due to its
potential applications in many fields. To effectively deal with this problem, a
novel face recognition algorithm is proposed by using the optimal kernel minimax
probability machine. The key idea of the algorithm is as follows: First, the
discriminative facial features are extracted with local fisher discriminant
analysis (LFDA). Then, the minimax probability machine (MPM) is extended to its
nonlinear counterpart by using optimal data-adaptive kernel function. Finally,
the face image is recognized by using the optimal kernel MPM classifier in the
discriminative feature space. Experimental results on three face databases show
that the proposed algorithm performs much better than traditional face
recognition algorithms. |
Keywords: |
Face Recognition, Minimax Probability Machine, Feature Extraction, Kernel
Function |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
STUDY ON VISUAL INSPECTION MECHANISM AND DYNAMIC MODELING OF COAL BUNKER |
Author: |
QIAO TIE-ZHU, CHEN XIN, MA FU-CHANG, WANG FENG |
Abstract: |
In order to analyze theory and method of coal level detection
by intelligent camera, firstly, mathematic model of coal level detection in
bunker was established by three-dimensional imaging and synthesis and
decomposition of vision signal, which is based on Faugerast’s calibration
method, and the variation law between image signal and coal level variation in
bunker were obtained by theory analysis. Secondly, the experimental simulation
system for coal level detection in variation induced by the variation of image
signal was constructed, and the image signal variation law was revealed. The
numerical simulation model of the coal level detection in vision display was
established, the simulation show that the greater the peak and contour points of
coal level are, the faster the variation of image signal is, and the greater the
initial value of coal level is, the higher the image signal is, and the coal
level may have lightly pit. Finally, the image reconstruction shows that the
theoretical analysis, experimental research and numerical results are
consistent. |
Keywords: |
3D Image- Forming Principle,The Coal Level Detection In Vision,Image Display,
Image Reconstruction |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A MODEL OF GRANULAR COMPUTING ON BINARY RELATIONS BASED ON GENERALIZED ROUGH SET
AND ITS GRANULATION IN INFORMATION SYSTEM |
Author: |
XIAO TANG, LAN SHU |
Abstract: |
Granular computing is a new information processing method. Many models and
methods of granular computing have been proposed and studied. Nowadays, the
granular computing has been appeared in many areas of information processing. In
this paper, a study of the model of granular computing on Binary Relations based
on Generalized Rough Set is presented. We hope to expand the range of
application of rough sets and provide ideas for dealing with the problems of
uncertain information. |
Keywords: |
Rough sets, Granular Computing, Generalized Rough Set, Information Granulation |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
MICROBLOG MINING BASED ON CLOUD COMPUTING TECHNOLOGIES: MESOS AND HADOOP |
Author: |
KONG XIANGSHENG |
Abstract: |
The content analysis of microblogs has increasingly become a
focus for academic research. By microblog mining, microblogs provide either
first-person observations or bring relevant knowledge from external sources in
emergency situations such as Wenchuan earthquake in China. We introduce the
architecture for microblog mining based on cloud computing and present Mesos
which shares microblogging resources in a fine-grained manner and an improved
Apriori algorithm about association rules mining. The proposed design and
implementation provide valuable reference for the implementation of
microblogging cloud storage system and microblog mining. |
Keywords: |
Microblog Mining; Association Rules; Apriori Algorithm; Text Mining Algorithm |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
STUDY OF WIND POWER SHORT-TERM PREDICTION OF WIND FARM BASED ON NWP AND FUZZY
NEURAL NETWORK |
Author: |
GU BO, AN CHAO, LIU XINYU |
Abstract: |
Wind power prediction of wind farm plays a decisive role in
stable electric power system operation. Firstly to introduce fuzzy neural
network’s basic principle; secondly to use 60 days numerical weather prediction
(NWP) data and power data, from Jun.08 to Aug.08, as the training data of fuzzy
neural network to train the fuzzy neural network; finally to use the next 2 days
NWP data, from Aug.09 to Aug.10 as input data of fuzzy neural network, to
predict the next 2 days output power of wind farm. The training process and
prediction result show that fuzzy neural network has fuzzy decision and
judgment, and has good self-learning and adaptive ability, which improves the
stability of prediction system and prediction accuracy. |
Keywords: |
Wind Power Prediction Of Wind Farm; Numerical Weather Prediction (NWP); Fuzzy
Neural Network; Prediction Error |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
RESEARCH ON FAULT-TOLERANT ROUTING WITH HIGH SUCCESS PROBABILITY IN MESH
INTERCONNECTION NETWORKS AND IMAGE |
Author: |
WANG QI, WANG ZILI |
Abstract: |
Mesh networks have been applied to build large scale
multicomputer systems and Network-on-Chips (NoCs) extensively. Mesh networks
perform poorly in tolerating faults in the view of worst-case analysis, so it is
practically important for multicomputer systems and NoCs manufactures to
determine that how much success probability to construct a fault-free path
between two non-faulty nodes for the mesh network when the node failure
probability and the network size are given. In this paper, we mainly focus on
fault-tolerant routing algorithm on mesh networks from probabilistic view, and
provide a probabilistic method for studying routing algorithm. We propose two
simple and novel routing algorithms based on the concept of k-submesh. We apply
probabilistic analysis on the fault tolerance of our routing algorithms. Suppose
that each node fails independently with given probability, we can derive the
probability that our routing algorithms successfully return a fault-free routing
path. For example, we formally prove that our routing algorithms succeed in
finding a fault-free routing path with success probability at least 99% for a
mesh network of up to twenty-thousand nodes as long as the node failure
probability is bounded by 1.87%. Our routing algorithms run in liner time.
Simulation results show that the length of the routing paths constructed by our
algorithms is very close to the optimal length. On the other hand, the results
also show that the multicomputer systems and NoCs based on mesh networks are
quite reliable and trustable in theory and practice. |
Keywords: |
Mesh Networks; K-Submesh; Fault-Tolerant Routing; Probabilistic Analysis; Image |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
THE DESIGN OF DIGITAL FREQUENCY SYNTHESIZER BASED ON VHDL |
Author: |
LI WENXING, ZHANG YE |
Abstract: |
Direct digital frequency synthesizer (DSS) was proposed by
Tiemey at 1971 and this frequency synthesis technique soon came to the attention
of people because of its good frequency resolution and fast frequency
performance. Now, it is extensively used in telecommunication and electronic
machine region and it is a key technology to realize full digitalization. This
text introduces the principle and characteristics of DSS and gives the method of
implementing DDS using VHDL. The design proposal touches on MAX+PLUS II
platform. By this way, we can make the Chip products instead of multiple chip
board products, so as to reduce power consumption, improve reliability, and also
can be easily to design on line modification. |
Keywords: |
Digital Frequency Synthesizer, (DSS), VHDL, MAX+PLUS II platform |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
STUDY AND IMPLEMENTATION OF LIBRARY WORKGROUP BASED ON SECURITY POLICY SYSTEM |
Author: |
HE PING |
Abstract: |
IPSec provides cryptographic-based security protection
mechanism for IP packets. The correct implementation of IPSec depends on the
security protection parameters included in security policies. IETF Library
workgroup‘s proposal of security policy system architecture can simplify the
task of managing security policies and ensure the proper deployment of security
policies. By referring to this standard security policy system architecture,
this article proposes a method of building a Library workgroup based on security
policy system to distribute policies. The overall architecture of the library
workgroup based on security policy system is given in combination with an
end-to-end security communication prototype system. Finally this article
discusses modules of the library workgroup based on security policy system and
key techniques used in the system. |
Keywords: |
Ipsec; Security Policy System; Library Workgroup; Group Security Policy |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
MODELICA-BASED MODELING AND SIMULATION OF HYDRAULIC POWER STEERING SYSTEM |
Author: |
YONG ZHOU, YIWEI MO1, WEI HUANG , YANGYANG SUN |
Abstract: |
To investigate the steering characteristics of the hydraulic
power steering system, a Modelica-based modeling approach is proposed. An
automobile steering system test bench is set up for parameters identification.
System characteristic features such as transmission ratio, stiffness, viscous
damping and dry friction are estimated by bench test. The full version of
hydraulic power steering system model is established in Dymola platform. For the
sake of validating the proposed model, the vehicle steering performances are
measured in field experiments which test maneuvers include the parking-lot
steering and the lemniscate-shape path following. By driving the model with
steering wheel angle signals measured in tests, the simulation results provide
estimated performance of the hydraulic power steering system. The comparison
between simulation and experiment results demonstrate the feasibility of
proposed approach. |
Keywords: |
Multi-Domain Modeling, Modelica, Hydraulic Power Steering System, Bench Test |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A HYBRID METHOD TO SIMULATE AN INDUCTIVELY COUPLED AR-HG PLASMA |
Author: |
YANG LIU, GEORGES ZISSIS, YUMING CHEN |
Abstract: |
A hybrid method is used in simulating an inductively coupled Ar-Hg discharge
plasma. In this hybrid model the combination of plasma fluid model and the
Boltzmann Equation is applied. With this model, not only the “macroscopic”
parameters of the discharge, such as electron density, electron temperature, can
be simulated, but also the electron behavior can be derived, which is not
accessible in mere fluid model. |
Keywords: |
Inductively Coupled Plasma, Ar-Hg Discharge, Electrodeless Fluorescent Lamp,
Fluid Model, Boltzmann Equation, Hybrid Method |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
LBGR: A LOAD BALANCING P2P FILE STORAGE SYSTEM BASED ON GROUPING AND REPUTATION |
Author: |
SONG GUANGHUA, WU ZHIXING, YANG BOWEI |
Abstract: |
The expansion of the Internet leads to the rapid growth of
information, which brings about urgent needs for rapid, efficient and reliable
mass storage systems. In this paper, we present LBGR, a load balancing P2P file
storage system based on grouping and reputation. LBGR evaluates a node by
calculating its reputation value, and adopts a mechanism based on grouping and
virtual node to solve the load balance problem which exists in distributed hash
table structured systems. In LBGR, groups can balance their loads according to
their capacities by migrating virtual nodes. The experimental results show that
the presented load balance algorithm works well, and is comparable with the
centralized algorithm, while it requires less load information of the system. |
Keywords: |
Glusterfs; Reputation; Virtual Node; Load Balance; Storage |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
RESEARCH AND APPLICATION ON VISUALIZATION SYSTEM OF SPATIAL ELECTROMAGNETIC
ENVIRONMENT |
Author: |
LI YUFANG |
Abstract: |
A visualization system of spatial electromagnetic environment
was designed and realized. The system realized 2D and 3D visualization of
electromagnetic field with electromagnetic distribution situation, isograms, and
propagation direction and path. The application result shows that the prototype
system can provide the user an efficient visualization tool of spatial
electromagnetic environment. This paper solve the model analysis based on the PE
method, the establishment of a data visualization mapping model of the
geomagnetic field; design space geomagnetic environment visualization system
architecture, the design of which the main part of: Geomagnetic set of
environmental parameters, unified modeling data analytic mapping drawn
rendering, human-computer interaction, and modules; research and the geomagnetic
environment visualization of key technologies, including unified model of the
space the geomagnetic environmental data, to parse mapping and space method of
generating a visual structure, as well as the geomagnetic environment rendering
method. |
Keywords: |
Geomagnetic Field Simulation; Computer Simulation; Visualization;
Electromagnetic Situation; Electromagnetic Propagation Path |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
DEVELOPMENT OF VIRTUAL MODEL CREATION SYSTEM BY REAL-TIME FORCE FEEDBACK
INTERACTIVE TECHNOLOGY |
Author: |
QI BIN, YU SUIHUAI, HE WEIPING, SUN XIAOMING, FAN WEN |
Abstract: |
The haptic-based sensing technology (HST) has the potential
to be a powerful tool in Human-Computer Interaction (HCI). When developing a new
product, the trend is to compress product development cycles and reduce costs.
Virtual modeling, sometimes referred as digital prototyping, is widely used in
industry for simulating the visual appearance and functionalities.
Unfortunately, conventional virtual modeling techniques are hard to simulate the
physical properties of a real product in user-to-product interactions. Force
feedback, also called sensible feeling, is best envisaged as an evolution of
virtual modeling. Thus, a novel haptic rendering technology that enables users
to perceive tactile feedback from virtual 3-dimensional models is studied. We
mainly carried out some innovative studies on the real-time force feedback in
HCI by using sensing device based on the virtual model creation system (VMCS).
With this in-depth research work, a virtual mechanics simulation model of the
feedback force is proposed to solve the real-time force feedback simulation
problem of haptic-based virtual model creation method. Finally, VMCS with
real-time force feedback interactive technology is completed by using sensing
technologies of haptic sensor devices. All these research works provide theories
for the further application of virtual model creation method and HST in related
industries. |
Keywords: |
Haptic-based Sensing Technology, Haptic Device, Virtual Model Creation |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
NONLINEAR DYNAMIC RESEARCH OF CHINESE COMMUNITY HEALTH CARE-----A DELIVERY OF
SIMULATION AND PREDICTION |
Author: |
J.J. QI, X.Y. WANG, H. YANG, L.J. CHEN, L.Q. JIANG, W. ZHOU, R.M. WAN |
Abstract: |
Grey GM(1,1) model is one of the most commonused prediction
method. A number of studies have shown that a series of significant achievement
have been gained in natural science and social science for simulation and
prediction of equidistant monitoring data sequent. However, relatively little is
done about the application of Grey GM(1,1) model in relevant medical resources
simulation and prediction for Chinese community health care. The aim of this
study is to investigate the tendency of the numbers of China health service
expenditure, health revenue, the number of visits and health personnel, which
may provide the base and reference for the development of China health plan.
Despite the great achievement associated with the use of grey GM(1,1) model, the
prediction of nonequidistant and high growth data sequent through complex
transformation , and usually has larger lagging error equidistant treatment of
non-equidistant data may have larger lagging error. In this study, we built the
GM(1,1) grey majorized model, which increases accuracy of background value and
is proved successfully in simulation and prediction of equidistant or
non-equidistant and low or high growth data. The results we obtained demonstrate
that the nonlinear dynamic research of Chinese community health care using
GM(1,1) grey majorized model, will contribute to the base and reference for the
development of China health plan. |
Keywords: |
GM(1,1) Grey Majorized Model, Nonlinear Dynamics, Community Health Care |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
ELECTRICAL CHARACTERISTICS OF HUMAN TISSUE IN THE INTRA-BODY COMMUNICATION
WITHIN A LIMITED FREQUENCY DOMAIN (1MHZ - 10MHZ) |
Author: |
JIN ZHU, SHUANG ZHANG, PENG UN MAK , SIO HANG PUN, MANG I VAI |
Abstract: |
With development of the current coupling intra-body
communication research, it is necessary to increase carrier frequency of
communication in the future research to obtain high-speed and stable
communication mode. The feature of tissue in human limbs is intensively analyzed
with the carrier frequency of 1MHz to 10MHz when the condition of quasi static
approximation is tenable. In combination with relevant theories and experimental
data, it is concluded that quasi-static coupling of human body is not tenable,
which may be used as the theoretical basis for further research of modeling
theory. |
Keywords: |
Intra-Body Communication(IBC); Current Coupling; Carrier Frequency; Quasi-Static
Approximation |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
EVALUATION METHODOLOGY OF BUS RAPID TRANSIT (BRT) OPERATION |
Author: |
WU HONGYANGA |
Abstract: |
In the paper, the indicator system and evaluation methodology
of BRT operation was established according to the characters of BRT development
in China. These indicators include six aspects: infrastructure, transport
capacity, service level, economic results, safety and emergency management, and
energy saving & emission reduction. The pilot study was implemented in Jinan
city. The results of pilot study show: the presented evaluation methodology of
BRT operation agrees with the system designing standards and therefore is
operational. |
Keywords: |
Bus Rapid Transit (BRT), Evaluation methodology, Operation, Indicator system |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
DECIDING WEIGHING BY ENTROPY EVALUATION METHOD IS AN ERROR |
Author: |
RUNCHUN HAN, JIXIAN XIAO, JIE YANG, HONGWEI DU |
Abstract: |
In physics,heat energy divided by temperature ,entropyis
obtained, which means the conversion degree from heat to work. While in science
and technology field, entropy generally refers to possible degree of certain
matter system status. In social science area, entropy indicates the degree of
certain society state, in the field of information theory, entropy expresses
uncertain degree. In a word, the application of “entropy” is widely used.
However, there’s no scientific theory support for deciding weighing by entropy
evaluation method. This paper give a detailed explanation of it in three aspects
to demonstrate that scientific is not decide weighing by entropy evaluation
method. |
Keywords: |
Entropy Evaluation Method; Weighing; Evaluation System |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A MISAPPLICATION FOR WEIGHT EVALUATION DETERMINED BY THE PRINCIPAL COMPONENT
ANALYSIS |
Author: |
RUNCHUN HAN, JIXIAN XIAO, JIE YANG, HONGWEI DU |
Abstract: |
Principal component analysis is the study of how a small
number of uncorrelated principal components indicate the internal structure of
multiple variables. The purpose is to simplify the data, reduce the dimension of
redundancies, and make the new variable uncorrelated. So it is widely utilized
in multivariate statistical analysis. These years, however, some people apply
the principal component analysis to determine the weight of evaluation index
system, even include the method in the textbook. This paper will clarify the
unscientific method of valuing the weight in four aspects. |
Keywords: |
Principal Component Analysis, Evaluation System, Weights |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
MODEL PREDICTIVE CONTROL FOR THE PROTON EXCHANGE MEMBRANE FUEL CELL |
Author: |
LIPING FAN, JUN ZHANG |
Abstract: |
Proton exchange membrane fuel cells are promising energy
sources that produce electrical currents with almost null pollutant emissions,
and they have been received growing attention in recent years. Maintaining a
fuel cell system in correct operating conditions requires good system control.
Based on the mathematical model of proton exchange membrane fuel cells, model
linearization is carried out and a model predictive controller is designed for
the proton exchange membrane fuel cell to keep constant voltage output.
Simulation results show that the use of this model predictive controller can
achieve a good control effect. |
Keywords: |
Fuel Cell, Model Predictive Control, Linearization Techniques |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
EMPIRICAL STUDIES OF GREEN SUPPLY CHAIN MANAGEMENT PERFORMANCE EVALUATION BASED
ON THE ANP |
Author: |
XIAOHUA CHEN, GUOYI XIU |
Abstract: |
With the growing concern with our environment, the practice
degree of green supply chain management I attractgetting more and more attention
from academic and industry. Therefore, studying green supply chain management
practice is a very meaningful work. Green supply chain management performance
appraisal will involve a lot of indicators, and there are usually have
dependence and feedback relationship between the various indicators. Therefore,
this paper introduces how to use the ANP method to solve the problem
effectively. This paper uses the Super Decisions 1.6.0 software to calculate the
final weight of the network layer indicators, and assesses the performance level
of three enterprises which have different implementation degree in green supply
chain. Green supply chain management performance evaluation index system and the
network model are established by the network level, which provide an effective
solution for green supply chain management performance appraisal. The empirical
research results prove the method are scientific and feasible to solve the
problem of green supply chain management performance appraisal. |
Keywords: |
Analytic network process, Green supply chain management, Performance appraisal,
Empirical |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
POLE RELIABLE ASSIGNMENT OF PARABOLIC REGION WITH ACTUATOR FAILURE |
Author: |
BO YAO, JIAN RONG, HAO HU |
Abstract: |
For a class of uncertain linear systems, this paper proposes
the mixed fault model which is more general and more practical. This paper
discusses the existing problems of the system reliable controller, considers the
reliable pole assignment of parabolic region with actuator fault, and gives a
new method to deal with the mixed fault matrix. For mixed fault model with
actuator fault, it gives the sufficient condition of designing this type of
controller which can make the pole of linear systems to be located in the
parabolic region. It achieves the design of state feedback reliable controller
by solving the LMI. The simulation proves the Design method in this paper is
feasible. |
Keywords: |
Mixed Fault Model; Pole Assignment; Actuator Fault; Parabolic Region |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
D-STABLE ROBUST RELIABLE CONTROL FOR UNCERTAIN DELTA OPERATOR SYSTEMS |
Author: |
BO YAO, DAN LI, HAO HU |
Abstract: |
The D-stable robust reliable control for uncertain delta
operator systems is mainly studied by this article. It proposes a sufficient
condition of placing poles of the closed-loop systems in a specified circular
disc, in terms of linear matrix inequalities by using state feedback. It also
gives a design procedure of such controllers. The proposed results can also
unify related results of continuous and discrete systems. Furthermore, a
numerical example is provided to demonstrate the feasibility and the
effectiveness of the design method. |
Keywords: |
Delta Operator, Reliable Control, Linear Matrix Inequality |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
MODELING AND SIMULATION OF QUALITY ANALYSIS AND QUALITY PREDICTION OF INTERNAL
CRACKS IN CONTINUOUS CASTING BILLET |
Author: |
WENHONG LIU, ZHI XIEA |
Abstract: |
In continuous casting, it is very important to predict and
detect the internal cracks of billet in time for ensuring continuous production,
improving product quality and reducing production costs. Clustering analysis
(CA) method is adopted to do feature extraction and classification for on-site
data, by which ladder parameter tables of processing parameters and defect
grades of internal cracks are got. Fault tree analysis (FTA) method is adopted
to analyze the effects of processing parameters on internal cracks. The
solidification speed of billet is calculated by solidification heat-transfer
model. Quality prediction model of internal cracks in continuous casting billet
is established by quality prediction function, based on clustering analysis
model of on-site data, FTA model and solidification heat-transfer model. Some
samples of Steel Grade 1008 are selected for testing the quality prediction
model. The percentage of accuracy for the quality prediction is 80 percent,
which provides the foundation for industry application. |
Keywords: |
Fault Tree Analysis (FTA), Minimum Cut Set, C-Means Clustering Method, System
Clustering Method |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
REAL-TIME RELIABILITY PREDICTION FOR THE MINE LOGISTICS TRANSPORTATION SYSTEM
BASED ON MULTI-PERFORMANCE PARAMETERS DEGENERATION |
Author: |
BAI XIAO-PING, QIAN TING |
Abstract: |
The real-time reliability prediction problem of the mine
logistics transportation system by applying multi-performance parameter
degeneration method was studied. According to monitoring data, by analyzing
performance degradation cases and correlation among some performance parameters
of the studied system, this paper establishes a new reliability model about
time-varying performance degeneration, analyzed in detail this model by the
practical example, and gets some practical conclusions. Presented detailed
methods and steps can offer the reference for real-time reliability prediction
researches of the mine logistics transportation system. |
Keywords: |
Reliability, Real Time Systems, Mine, Transportation, Logistics, Parameter
Degeneration |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A NEURAL NETWORK FILTER TO ESTIMATE THE DOA OF SMALL TARGETS |
Author: |
DONG ZHIMING, ZENG JIANKUI |
Abstract: |
Direction-of-arrival (DOA) estimation is an important problem
in many applications such as communication and navigation. Many methods have
been presented for this problem. The Maximum Likelihood (ML) is one of the good
solutions. But, in traditional algorithms for ML Nonetheless, the computational
load is very heavy and multivariate nonlinear maximization problem is serious.
To deal with these problems, this paper describes an application of neural
network (NN) for obtaining the global optimal solution of ML DOA estimation. It
overcomes the local optima problem existing in some ML DOA estimation algorithms
and improves the estimation accuracy. The computation complexity is modest. |
Keywords: |
Artificial Neural Network (ANN), DOA Estimation, Maximum Likelihood |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A WEB SERVICE APPROACH TO M-LEARNING WITH SHARABLE CONTENT OBJECT REFERENCE
MODEL |
Author: |
KONG XIANGSHENG |
Abstract: |
M-learning enhances collaborative learning and increases
learning flexibility by allowing it to be more personalized and
student-centered. But on the other hand, m-learning faces interoperability
problems with LMS. This paper introduces personal mobile Web services, a new
user-centric Web service architecture hosted on mobile devices, introducing the
Moodbile project that provides an extension of Moodle Web services for mobile
integration and mobile clients ready to use on real courses. |
Keywords: |
Learning Management Systems; Service Governance; Web Service; Learning Object
Metadata; Sharable Content Object Reference Model |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A WEB SERVICE APPROACH TO M-LEARNING WITH SHARABLE CONTENT OBJECT REFERENCE
MODEL |
Author: |
KONG XIANGSHENG |
Abstract: |
M-learning enhances collaborative learning and increases learning flexibility by
allowing it to be more personalized and student-centered. But on the other hand,
m-learning faces interoperability problems with LMS. This paper introduces
personal mobile Web services, a new user-centric Web service architecture hosted
on mobile devices, introducing the Moodbile project that provides an extension
of Moodle Web services for mobile integration and mobile clients ready to use on
real courses. |
Keywords: |
Learning Management Systems; Service Governance; Web Service; Learning Object
Metadata; Sharable Content Object Reference Model |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
THE REGISTRATION ALGORITHM FOR HETEROGENEOUS SPATIOTEMPORAL MEASUREMENTS IN
MULTI-SENSOR SYSTEMS |
Author: |
YE HONG, YANG ZHAN-PING, LI JUN, LI SHI-LING |
Abstract: |
Based on information fusion by multi-sensor tracking system,
registration algorithm for heterogeneous spatiotemporal measurements is
discussed. In the paper, principles of sensor registration for out-of-sequence
measurement are introduced, the IMM based registration algorithm for multi-lag
OOSM is proposed. The method that judging how old negative-time measurement
could be used to retrodict the state is presented. On the condition of DAP (data
association problem), the algorithm of how to obtain a strict chronological
sequence of measurement is discussed. Finally, the conclusions and further works
are addressed and some future problems are given. |
Keywords: |
Heterogeneous Spatiotemporal Data, Multi-sensor System, Information Fusion,
Registration Algorithm |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
HYBRID FUZZY PD CONTROL OF TEMPERATURE OF COLD STORAGE WITH PLC |
Author: |
DING WANG, YUAN FANG,MINGYUE MA, FENGHUA QI |
Abstract: |
The cold storages are the industrial equipments for storing
food, vegetables and other things in low temperature. Characteristics of the
cold storage for their volume have a big lag and are difficult to control. So,
traditional PID controls are not adaptive to control them. One of methods which
can overcome the problems is using a fuzzy control for them. But it is known
that the differential input which is needed in the fuzzy controller is difficult
to realize and easy to producing oscillating. A nonlinear tracking
differentiator (TD) is substitute for a usual differential input; therefore
hybrid fuzzy PD (proportional and derivative) controls which include two
nonlinear tracking differentiators have been presented. In this paper, the
hybrid fuzzy PD control for cold storages with PLC is proposed to improve the
system performances. The paper is focus on the realizations of the control
algorithms specially. The application of the system in the fields proved the
control system related with the paper is correct and effective. |
Keywords: |
Cold Storage, Fuzzy PD Control, Tracking Differentiator, PLC, Refrigerator |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
COMMON DUE WINDOW SCHEDULING WITH BOTH TIME AND POSITION EFFECTS ON A SINGLE
MACHINE |
Author: |
JINTAO MENG, SHISHENG LI |
Abstract: |
We consider the problem of common due window location
scheduling on a single machine, where the processing times of jobs depend both
on their starting times and positions in a sequence. The problem is to determine
the optimal earliest due date, the due window size, and the job schedule
simultaneously to minimize costs for earliness, tardiness, earliest due date
assignment and due window size penalties. An time optimal algorithm is presented
to solve the problem. |
Keywords: |
Scheduling, Single-Machine, Due Window, Time/Position Effect |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
HADOOP MAPREDUCE IN CLOUD ENVIRONMENTS FOR SCIENTIFIC DATA PROCESSING |
Author: |
KONG XIANGSHENG |
Abstract: |
For the problem of massive scientific data storage on the
network, and based on the Hadoop and virtual technologies, the massive
scientific data storage model based on cloud computing is proposed. The massive
scientific data is applied to the Hadoop platform and processed by MapReduce,
the key algorithm of cloud computing, and finally the data is stored in the
virtual pool. This paper introduces a large scale scientific data processing
method based on cloud computing, builds a dynamic, scalable, cost-effective,
easy to use and high performance computing platform on a large of centralized or
distributed inexpensive computer cluster, and creates a cloud computing based
framework for large scale data processing model. Based on Hadoop MapReduce of
cloud computing, we propose the detailed procedure of scientific data processing
algorithm which can improve the overall performance under the shared environment
while retaining compatibility with the native Hadoop MapReduce in this paper. |
Keywords: |
MapReduce, scientific data flow processing, Cloud Computing; Hadoop; Distributed
File System |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
AN TEXT CLASSIFICATION APPROACH BASED ON THE GRAPH SPACE MODEL |
Author: |
XIAOQIANG JIA |
Abstract: |
To do the text classification on the basis of VSM, and use
the maximum common subgraph to measure two graphs’ similarities are the
relatively common methods, but these methods have not made full use of lots of
semantic information spatial model contained, so the text classification
performance is generally poor. In order to improve the classification results of
the graph, on the basis of the structural equivalence, this paper further
analyzes the maximum common substructure graph nodes and edges if it is a true
semantic equivalence, and puts forward a kind of improvement text similarity
metrics based on the graph space model. Then apply it to the text
classification, the classification performance has been improved. Finally,
verify the effectiveness of this method by experiment. |
Keywords: |
Structural Equivalence,Text Classification, Graph Space Model, Maximum Common
Subgraph, Similarity |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
THE STUDY ON THE IMPACT OF DATA STORAGE FROM ACCOUNTING INFORMATION PROCESSING
PROCEDURE |
Author: |
HENGCHANG JING |
Abstract: |
After the accounting informatization, the original vouchers,
ledgers and statements have been translated into varieties of data to be stored
in computers; however, the storage strategies of these data will be affected by
the accounting information processing procedure, such as temporary storage,
translation storage and back-up of the documents data, the generation and output
of ledger data and the interfaces of other data transmission system. We should
not only take the influences of relationship standardization principle into
consideration, but also the influences of accounting information process design.
This paper studies the impact of data storage from accounting information
processing procedure and points out the problems during informatization. |
Keywords: |
Accounting, Data Processing, Data Storage |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
SINGLE IMAGE DE-HAZE UNDER NON-UNIFORM ILLUMINATION USING BRIGHT CHANNEL PRIOR |
Author: |
XUEYANG FU, QIN LIN, WEI GUO, XINGHAO DING, YUE HUANG |
Abstract: |
Recent single image de-haze approaches assume the atmospheric
light is the only illumination in one haze image and use a globally constant to
image de-haze. However, every local pixels in an outdoor image is actually under
the influence of non-uniform illumination in real world. The accuracy of the
environmental illumination estimation has a great influence on the result, so
the traditional haze image model is defective and not conforms to the facts. In
this paper, we refine the haze image model under the consideration of
non-uniform illumination, and then we propose a new prior called “bright channel
prior” to de-haze single image combining with the dark channel prior. The bright
channel prior, which inspired by the dark channel prior [1], is a statistic of
haze-free outdoor images. Using this prior, we derive a more accurate
environmental illumination estimating algorithm for single image de-haze. Our
experiments prove the feasibility of the method we propose and outperform other
image haze removal approaches. |
Keywords: |
Non-Uniform Illumination, Haze Image Model, Bright Channel Prior, Single Image
De-haze |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
RESEARCH ON ANTI-PLAGIARISM BASED ON NEURAL NETWORK AND DIGITAL WATERMARKING |
Author: |
FU BING, SONG WENGUANG, XIE BENGUI |
Abstract: |
Plagiarism is a disruptive force in university education
around the world. Many universities study mainly in academic papers and
graduation thesis, this article focuses on anti-plagiarism for electronic course
assignments. Our major contribution is that assignments may be divided into
three classes by using different techniques to detect plagiarism: in the
computer laboratory, digital watermarking algorithm with high hiding capacity
was designed; in the Internet environment, we combined the vector space method
and edit distance method to detect copying; for programming assignments, the BP
neural network algorithm was used. A comparative experiment based on manual
check shows that the accuracy rate reaches 96%. The system has been used in our
teaching practice for two years, it could effectively detect plagiarism. |
Keywords: |
Course Assignment, Anti-plagiarism, BP Neural Network, Digital Watermark,
Similarity index |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
SOHO NETWORK MODELING AND SIMULATION USING OPNET |
Author: |
GUO HAI, JIA BO |
Abstract: |
The rapidly growing Internet is driving the demand for higher
transmission capacity and high-speed networks. Designing an efficient network to
achieve desirable performance is a challenging task, requiring designers to
balance user performance expectations with costs and capacities. The study is
based on the OPNET simulation tool focusing on the question of whether faster
connections are worth higher prices for the Small Office/Home Office network.
The paper simulated 3 different scenarios comparing application performance with
different connection speeds between a SOHO LAN and the ISP, to evaluate
application performance and server capacity planning for web browsing, E-mail,
video conferencing, database and FTP. It also examined how response times,
throughput, utilization on the WAN link and other network performance measured.
Use numbers to justify our recommendation. The investigation results reveal that
upgrading a link data rate will not necessarily be economically feasible with
the performance improvement that it gives, and solve them cost-effectively by
understanding the impact of changes. |
Keywords: |
Simulation, Modeling, SOHO LAN, OPNET |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
A NEW GEAR FAULT RECOGNITION METHOD USING MUWD SAMPLE ENTROPY AND GREY INCIDENCE |
Author: |
WENBIN ZHANG, JIE MIN, YASONG PU |
Abstract: |
In this paper, we propose a new gear fault recognition method
by using morphological undecimated wavelet decomposition (MUWD), sample entropy
and grey incidence. MUWD possesses both the characteristic of morphological
filter in morphology and multi-resolution in wavelet transform. Then we develop
multi-scale MUWD based on the characteristic of impulse feature extraction in
difference morphological filter. At first, we use multi-scale MUWD to process
different gear fault signals in five levels, signal length is maintained
invariable and information loss could be avoided in MUWD, simulation example
tests the good effectiveness of its denoising capacity. Second, we calculate the
sample entropy of each level. Different fault type corresponds with different
sample entropy. In the end, we serve sample entropy as the feature vectors and
calculate the grey incidence of different gear vibration signals to identify the
fault pattern and condition. Practical example shows that the high efficiency of
the proposed method. It is suitable for condition monitoring and fault diagnosis
of gear. |
Keywords: |
Morphological Undecimated Wavelet Decomposition (MUWD), Grey Incidence, Sample
Entropy (SE), Recognition, Fault Diagnosis, Gear |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
AN ADAPTIVE RECOVERY ALGORITHM FOR LOW LIGHTING IMAGE |
Author: |
WEI GUO, XUEYANG FU, QIN LIN, XINGHAO DING, YUE HUANG |
Abstract: |
In this paper, an efficient and effective adaptive recovery
algorithm is presented for low lighting image. Firstly, a multiple point light
sources atmospheric scattering mode is proposed based on analyzing the form of
light sources, the propagation process of light beam and the influence of
multiple light sources. And then, a novel image prior - bright channel prior,
which is based on a kind of statistics of the normal illumination images, is
also considered in the model. The satisfied results have demonstrated that
compared with existing methods, the proposed method has the stronger ability of
restoring the low lighting image adaptively. |
Keywords: |
Low Lighting, Multipoint Light Sources, Bright Channel, Image Restoration |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
OPTIMIZATION OF BDD BY CHAOTIC EVOLUTION ALGORITHM AND ITS APPLICATION IN TEST
OF STUCK-OPEN FAULTS IN DIGITAL CIRCUITS |
Author: |
PAN ZHONGLIANG, CHEN LING |
Abstract: |
The binary decision diagram (BDD) is an efficient graph
representation of logic Boolean functions, it has wide applications in a lot of
areas, such as computer science, circuit design and test. The size of binary
decision diagram depends on the variable ordering which is used. A new approach
is presented in this paper for the variable ordering and the optimization of
binary decision diagrams, the approach is based on a chaotic evolution
algorithm. The chaotic evolution algorithm proposed in this paper can combine
the features of chaotic systems and evolutionary algorithm, and can take full
advantages of both the stochastic properties and the global search ability. The
application of the approach for the test of stuck-open faults in digital
circuits is investigated, a test algorithm of stuck-open faults is proposed. The
experimental results for a lot of digital circuits show that the binary decision
diagrams with smaller number of nodes can be obtained by using the approach
proposed in this paper, and the test vectors of open faults in digital circuits
can be produced. |
Keywords: |
Digital Circuits, Binary Decision Diagrams, Variable Ordering, Stuck-Open
Faults, Test Algorithm |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
TEST BUS ASSIGNMENT OF SYSTEM ON CHIP BY USING CULTURAL PARTICLE SWARM
OPTIMIZATION |
Author: |
ZHONGLIANG PAN, LING CHEN |
Abstract: |
The system on chip (SoC) must be tested in order to insure
the correctness of functions. The test of SoC involves the test of cores and the
test of interconnects among cores. The test set of cores must be transported to
the inputs of cores through the test access architecture in SoC. Therefore, in
order to make the total test time to be minimal, it is necessary to determine an
assignment of cores to test access architecture. In this paper, a new method is
presented for test bus assignment of system on chip, which is based on cultural
particle swarm optimization. In this method, the feasible solutions of test bus
assignments are represented by the individuals. The better schemes of test bus
assignments are obtained by the evolution of the individuals. The implementation
of the method consists of a population space, a belief space, and a
communication protocol that describes the exchange mode of knowledge between the
population space and belief space. The particle swarm optimization with
selection strategy is used for carrying out the evolution of individuals in
population space. A lot of experimental results for SoC benchmark circuits
demonstrate that the proposed method in this paper can effectively obtain the
test bus assignments in shorter time than conventional genetic algorithms. |
Keywords: |
System On Chip, Test Bus Assignment, Cultural Algorithm, Particle Swarm
Optimization |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
Title: |
APPLICATION OF MULTI OBJECTIVE TECHNIQUE TO MULTI-DISCIPLINARY OPTIMAL POWER
FLOW PROBLEM USING REFINED FORAGING ALGORITHMS |
Author: |
S.JAGANATHAN, S.PALANISWAMI |
Abstract: |
The Optimal Power Flow (OPF) is important problem in electric
power systems and OPF is a static, non –linear optimization problem of
determining the optimal settings of control variables for minimization the cost
of generation including sine components, piecewise quadratic cost curve,
transmission losses, voltage profile optimization and power flow deviations are
proposed in this paper. The OPF problem is not only comprised of cost of
generation and includes multidisciplinary comprehensive model. It is an
important problem in power systems operation due to operational security
considerations and even a small savings per hour translates into large annual
saving. A Refined Bacterial Foraging Algorithm [RBFA] is introduced in this
paper to solve multi objective optimization problems. The multiobjective is
proven and is well in power system problems. The objective of this paper is to
introduce RBFA to solve multi disciplinary Optimal Power Flow [MDOPF] based on
multi-objective optimization. The new multiobjective BFA is presented for the
solution of the comprehensive model for MDOPF. The algorithm is then
demonstrated on IEEE 30 bus system and test results provided on the standard
system reported in the literature clearly indicates that this method is
efficient. The RBFA is motivated by the foraging behavior of the E. coli
bacteria and the biological aspects of the bacterial foraging strategies and is
well in multi disciplinary high dimensional problems and multiple objective
optimization problems. The solution of the MDOPF problem, with a simultaneous
and adequate consideration of all its facets with reasonable computing time, is
still to be achieved. |
Keywords: |
Refined Bacterial Foraging Algorithm, Multi-Disciplinary Optimal Power Flow,
Quadratic Curve With Sine Components, Piecewise Quadratic Curve, Voltage Profile
Optimization And Active Power Losses. |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol. 48. No. 3 -- February 2013 |
Full
Text |
|
|
|