|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2013 | Vol. 49 No.1 |
Title: |
A FORMAL DEFINITION OF METRICS FOR OBJECT ORIENTED DESIGN: MOOD METRICS |
Author: |
MERYEM LAMRANI, YOUNES EL AMRANI, AZIZ ETTOUHAMI |
Abstract: |
Software design metrics, since their apparition, suffer from a lack of formalism
in their definition opening room to ambiguities and thus to misleading results.
Although, several studies attempted to bring rigor to most well-known suite of
metrics, the degree of formalism used to define them, constitutes a significant
obstacle towards the built of solid tools support, considered as the key point
to an easy integration of measurement in the industry. This paper is a logical
continuation of a previous published work where a Z-based formalization of the
CK metrics is presented, offering an innovative and easy to follow methodology
which successfully manages to provide a solid definition of metrics that deals
with complexity, coupling and cohesion. While this work brings formalism at the
classifier level, we proceed, in the present, to propose formalism for an
overall quality measurement of the object-oriented systems, introducing the
invisibility concept formalization and extending the quality indicator
properties to encapsulation and polymorphism. |
Keywords: |
Formal Methods, Z Language, UML Metamodel, MOOD Metrics |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
MANAGEMENT OF CONCURRENCY MODEL IN COOPERATIVE GROUP WORK |
Author: |
MESSAOUDI FAYCAL, MOUSSAOUI MIMOUN |
Abstract: |
This paper aims at presenting the problems relating to the management of
cooperation sessions. We can by no means tackle such problems in an isolated way
because they depend on types of application achieved during a session of
cooperation, on the type and number of instances allowed in a given moment, and
on the coordination; i.e. the types of dependence between the actions of
participants in a session. The aim of this paper, after defining the scope of
the computer supported cooperative work, is the identification of the
specificities of the field and the different problems to solve when activating a
CSCW environment: Computer Supported Cooperative Work. We shall focus on the
inherent aspects and the repartition of an environment as regards the coherence
of data, and the coherence of copies tolerance to deficiencies. |
Keywords: |
Group Work, Coordination, Cooperation, CSCW |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
RELIABLE REAL-TIME DATA TRANSMISSION IN MANET USING CONNECTION POSSIBILITY |
Author: |
P.SIVAKUMAR, K.DURAI SWAMY |
Abstract: |
In Mobile Ad hoc Networks (MANET), reliability in real time data transmission
can be assured by confirming the connectivity of the network. Since, MANETs are
characterized by dynamic topology changes; the established connection must be
monitored for its consistency. In order to provide and maintain connectivity, in
this paper, we propose a reliable real time data transmission technique in MANET
using connection possibility. In this technique, a path with high connection
possibility is elected as the main path using transmission path discovery
mechanism. In addition to this, connectivity maintenance phase is initiated
during link failures and delayed replies. In this phase, the path with long link
expiration time is chosen for data transmission. By simulation, we show the
performance of our technique. It provides reliable connectivity for real time
data transmission. |
Keywords: |
Mobile Adhoc Networks (MANET), Data Transmission, Connection Possibility |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
CONVEX QUADRATIC REFORMULATIONS FOR SOLVING DAYS-OFF SCHEDULING PROBLEM |
Author: |
CHAKIR LOQMAN, MOHAMED ETTAOUIL, YOUSSEF HAMI, KHALID HADDOUCH |
Abstract: |
Workforce scheduling is one of the most important and practical problems in the
service of industry and continuous manufacturing settings. Solving this problem
requires determining how many workers must be assigned to each of the planning
periods of work time for an organization. In this paper, our main objective is
to solve the days-off scheduling problem with day task constraints. This problem
is naturally formulated as 0-1 quadratic programming subject to linear
constraints. To solve the latter problem, we formulate it as an equivalent 0-1
quadratic programming with a convex objective function using two convexification
techniques, the first one is based on the smallest eigenvalue and the second
uses the semidefinite relaxation. Some numerical examples and computational
experiments assess the effectiveness of the theoretical results shown in this
paper. |
Keywords: |
Workforce Scheduling, Days-Off Scheduling, Convex Quadratic Reformulation,
Semidefinite Programming, Quadratic Programming |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
NEURAL NETWORK MODEL OF POLYMER ELECTROLYTE MEMBRAN FUEL CELL FOR ELECTRICAL
VEHICLE |
Author: |
SUDARYONO, SOEBAGIO, MOCHAMAD ASHARI |
Abstract: |
This paper presents Neural Network (NN) model of Polymer Electrolyte Membran (PEM)
Fuel Cell for electric vehicle. The NN model simplifies the conventional model
that considered thermodynamics, electrochemistry, hydrodynamics and mass
transfer theory. The NN has a multilayer feed forward network structure and is
trained using a back propagation learning rule. The NN model is used to predict
the stack voltage of a PEM fuel cell to the vehicle speed. The data for the
training of the NN model uses the parametric data that developed from the
vehicle model and the PEM fuel cell model. The simulation results have shown
that NN model can successfully predict the stack voltage to the vehicle speed.
The performance of the network meets the requirement at epoch 50 and the error
is 0.000000338. |
Keywords: |
Neural network, Proton exchange membrane fuel cell (PEMFC), Back-propagation
(BP), Vehicle model |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
MAINTAINING POWER SYSTEM STABILITY WITH FACTS CONTROLLER USING BEES ALGORITHM
AND NN |
Author: |
A. SATHEESH, T. MANIGANDAN |
Abstract: |
Maintaining system stability is one of the most critical problems in power
system. Mainly, the stability problems arise when any fault occurs in the system
or due to sudden increase in the load power. Thus, to maintain the stability of
the system, different types of controllers are used in the literature; among
them FACTS controller plays a major role. Among the different types of FACTS
controllers, STATCOM, SSSC, UPFC, TCSC etc, are the most commonly used
controllers. To maintain the system stability, the major problem is identifying
the optimal location for fixing FACTS controller and also computing the amount
of voltage and angle to be injected in the system. By considering the
abovementioned drawback, here a hybrid technique is proposed for identifying the
optimal location for fixing FACTS controller and also for computing the amount
of voltage and angle to be injected in the system in order to uphold the system
stability. The hybrid technique includes neural network and Bees algorithm.
Here, the neural network is used to identify the optimal location for fixing
FACTS controller, and the Bees algorithm is used to compute the amount of
voltage and angle to be injected in the system. The proposed method is tested
for IEEE 30 bus system and the result exhibits the performance of the proposed
method in maintaining the stability of the system. |
Keywords: |
UPFC, Bees Algorithm, Neural Network, Stability, Load flow |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE THEORY OF USER ACCEPTANCE AND USE OF TECHNOLOGY (UTAUT): A META-ANALYTIC
REVIEW OF EMPIRICAL FINDINGS |
Author: |
AYANKUNLE ADEGBITE TAIWO, ALAN G. DOWNE |
Abstract: |
The unified theory of acceptance and use of technology (UTAUT) proposes that
performance expectancy, effort expectancy, and social influence predict
behavioral intention towards the acceptance of information technology. The
theory further proposes that facilitating conditions and behavioural intention
predicts use behavior in the acceptance of information technology. Ever since
its inception, the theory has been assessed using different applications, and it
has become a dè factor model of measuring user acceptance. Nonetheless, in terms
of statistical significant magnitude and direction, reports on the model are
diverse. Therefore, in this study, based on 37 selected empirical studies, a
meta-analysis was conducted in order to harmonize the empirical evidence.
The outcome of the study suggests that only the relationship between performance
expectancy and behavioural intention is strong, while the relationships between
effort expectation, social influence and behavioural intention are weak.
Similarly, the relationship between facilitating condition, behavioural
intention and use behaviour is also weak. Furthermore, the significance of the
relationship between facilitating condition and use behaviour does not pass the
fail safe test while the significance of the relationship between behavioural
intention and use behaviour does not pass the fail safe test satisfactorily.
Implications for further studies are also discussed. |
Keywords: |
Information Systems (IS), Adoption, UTAUT, Meta-Analytic Review |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
ARCHITECTURE OF MALWARE DETECTOR FOR OBFUSCATED CODE INSPECTION |
Author: |
LEE LING CHUAN, MAHAMOD ISMAIL, KASMIRAN JUMARI, CHAN LEE YEE |
Abstract: |
Signature-based malware detection is a very fundamental technique that detects
malware by generating signatures. The detection however, is unable to detect
obfuscated malware unless pre-generated signature is stored in the database. In
this paper, we propose a combination of known packer detection, unpacking
module, and heuristic scanning techniques to find and block a malicious program
before it manages to be executed locally. Unpacking is the process of stripping
packer layers and restoring the original contents. This module contains
self-decryption script bodies that are devised to detect and extract the
hidden-code bodies of obfuscated malware. Hence, the scanning process only deals
with real malware body but not junk block or junk subroutine code. This paper
also draws up the implementation and the evaluation of our virus scanning
mechanisms. Finally, we present experimental results of our proposed techniques
and the results show that our test set is highly accurate. |
Keywords: |
Malware Detector, Obfuscated, Unpacking, Emulator, Disassembler |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
A REVIEW OF RESPONSIBILITIES OF INTERNET SERVICE PROVIDERS TOWARD THEIR
CUSTOMERS’ NETWORK SECURITY |
Author: |
SHUAIBU HASSAN USMAN |
Abstract: |
The use of the internet in the 21st century is indisputable to the people
worldwide. People have become dependent on the internet’s connectivity to
conduct business, share information, and collaborate. Yet, some people use the
internet as an avenue for illegal activities such as breaking into other people
computers or networks, damaging and stealing information, and blocking or
denying legitimate users from services they subscribed. Actually, these illegal
activities are made possible because the internet is based on all end users
being trusted to act appropriately [20]. Nevertheless, security experts have
suggested in some researches that Internet Service Providers (ISPs) should be
called to the chain of security responsibilities because they believe that ISPs
are in suitable position to protect (police) the internet. They argue that ISPs
control the gateway through which internet security breaches pass to their
customers. Moreover, they consider that ISPs can use advanced technologies to
detect illegal activities. In addition, ISPs have broader knowledge of cyber
threats that affect internet users and businesses. The purpose of this paper is
to review literatures on the responsibilities of ISPs in securing their
customers’ network, and find out whether there are legal provisions, or
liabilities that are bindings on the ISPs to provide security for their
customers. The questions here, are ISPs responsible for end users’ network
security? Are there legal provisions binding ISPs to provide the network
security to their subscribers? In addition, what are the recommended security
considerations they should be responsible to provide? |
Keywords: |
ISPs, Users, Internet Security, Legal provisions, Responsibilities |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
SPECTRAL EFFICIENCY ANALYSIS FOR MIMO BEAMFORMING USING ADAPTIVE MODULATION |
Author: |
R.O. ABOLADE, Z. K. ADEYEMO |
Abstract: |
This paper describes the analysis of multiple input multiple output (MIMO)
Beamforming with adaptive modulation using spectral efficiency as a figure of
merit in multipath fading environment. Multipath fading environment causes the
transmitted signals to be unreliable due to effects of tall buildings, trees,
mountains, moving objects and so on. As a result of increase in demand for
information communication technology which is an aspect of wireless
communication, this motivated this research work.
The system model for MIMO beamforming mode is developed for a 2x2, 3x3 and 4x4
antenna systems configuration in the presence of frequency selective Rayleigh
fading channel. A closed- form expression for spectral efficiency is also
developed. Received signal strength indication (RSSI) is used for channel
estimation in order to change the constellation sizes of the M-ary Phase Shift
Keying (M-PSK) modulation scheme in accordance with the fading severity. The
analysis is carried out using randomly generated data in MATLAB application
package.
The results obtained show that the Spectral Efficiency increases as the SNR
increases, also as the antenna configurations increase, the average spectral
efficiency also increases. This indicates that bandwidth is fully optimized at
higher antenna configuration. Mobile wireless designers can find the results
obtained useful in the design of improved wireless systems. |
Keywords: |
MIMO, Beamforming Mode, Spectral Efficiency, Multipath Fading, SNR |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
GEOMETRICAL-MATRIX FEATURE EXTRACTION FOR ON-LINE HANDWRITTEN CHARACTERS
RECOGNITION |
Author: |
SAAD M. ISMAIL, SITI NORUL HUDA SHEIKH ABDULLAH |
Abstract: |
Most of Arabic handwriting recognition in the literature has focused only on
recognizing offline script, and few of research take online case. So it's still
remains as an active area of research. however there is a lack of studies in
terms of recognizing Arab characters, especially on the online cases. The
process of handwriting recognition faces a lot of challenges; feature extraction
is the most important problem in character recognition. The main theme of this
paper is new feature extraction method employed in online Arabic character
recognition. An Arabic character recognition handwritten system cannot be
successful, without using suitable feature extraction methods. In this work we
have proposed the hybrid Edge Direction Matrixes and geometrical feature
extraction method for on-line handwritten Arabic character recognition system.
In addition, horizontal and vertical projection profile, and Laplacian filter
have been used in the preprocessing phase. The training and testing of the
online handwriting recognition system was conducted using our dataset; we have
used 840characters from different writers, 504 characters for training, and 336
characters for testing. The evaluation was conducted on state of the art methods
in the classification phase. The results have revealed that the proposed method
gives best recognition rate for character category. |
Keywords: |
Online Recognition, Arabic Character, Geometrical Feature, Edge Direction
Matrixes, Classificatio |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
A HYBRID ARTIFICIAL BEE COLONY ALGORITHM FOR PORTFOLIO OPTIMIZATION PROBLEM |
Author: |
ZHEN WANG, RUI OUYANG, XIANGYU KONG |
Abstract: |
In this paper, a constrained mean-variance model is constructed for the
portfolio optimization problems. The model is a mixed quadratic integer
programming problem, and it is too hard to solve by using the traditional
optimal algorithms. The purpose of this paper is to use a heuristic algorithm to
solve this problem. Combined with the differential evolution strategy, a new
hybrid artificial bee colony algorithm is proposed for solving the constrained
mean-variance model. In the new hybrid artificial bee colony algorithm, a new
search scheme and obsolete rules are presented to improve convergent speed of
the algorithm. Computational results show that the algorithm has great
capability to solve the portfolio optimization problem. It supplies a new method
for solving the portfolio optimization problem. |
Keywords: |
Artificial Bee Colony; Differential Evolution; Portfolio Optimization; Efficient
Frontier |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
DESIGNING OF A PULSE WIDTH MODULATION SYSTEM USING EMBEDDED SYSTEM DESIGN
TECHNIQUES |
Author: |
MAZIN R. KHALIL , SAJA B. MAHMOOD |
Abstract: |
Pulse Width Modulation (PWM) signals have wide applications in different field
as communication and control systems. This paper introduces a design of a Micro
Blaze soft core processor system that can be accommodated to act as PWM system.
The designed processor system is programmed in C language to act as PWM system.
The obtained results are traced on chip scope integrated logic analyzer and on
oscilloscope for the purpose of comparison .The percentage error is less than
1%. |
Keywords: |
Soft-Core Processor ,Embedded System, FPGA, Pulse Width Modulation(PWM) ,
Spartan 3E |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
MR IMAGE RECONSTRUCTION BY PATCH-BASED SPARSE REPRESENTATION |
Author: |
QIN LIN, WEI GUO,1XUEYANG FU,XINGHAO DING,YUE HUANG |
Abstract: |
Compressed sensing has been widely used to reconstruct magnetic resonance(MR)
images from highly under-sampled k-space data. Generally, there are two main
types of dictionary: analytic dictionary and trained dictionary. In this paper,
we propose a novel framework to adaptively learn the dictionary and reconstruct
MR images from highly under-sampled k-space data. We use the beta-Bernoulli
process as a Bayesian nonparametric prior, which can learn dictionary
adaptively. This patch-based dictionary learning process can also infers the
sparsity of each patch and the noise variance. Our numerical experiments
demonstrate that our reconstruction is more accurate compared to existing
algorithms. |
Keywords: |
Magnetic Resonance Imaging(MRI), Compressed Sensing(CS), Dictionary Learning,
Bayesian Nonparametric |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON THE KINEMICS OF 3/3-RRRS PARALLEL MANIPULATOR |
Author: |
JINGHU YU, GUILAN CHEN, QIANG WANG, YI CAO, WIEXI JI |
Abstract: |
It is known that a serious disadvantage of parallel manipulators is the
complexity of calculating forward kinematics. Briefly introducing the
mathematical model and the corresponding coordinate system, this paper mainly
addressed the forward and inverse solution analyses and examples of the 3/3-RRRS
parallel manipulator in detail. Especially, a novel geometrical method, i.e.
equivalent mechanism is proposed for the forward solution analysis of the
manipulator. |
Keywords: |
Kinematics Analysis; Workspace Analysis; Equivalent Mechanism. |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
OFDM SYSTEM CHANNEL ESTIMATION ALGORITHM RESEARCH BASED ON KALMAN FILTER
COMPRESSED SENSING |
Author: |
JINHE ZHOU, GUOMIN XIA, JURONG WANG |
Abstract: |
Orthogonal frequency division multiplexing (OFDM) has been considered as a kind
of effective means to realize wideband data transmission by applying multiple
low rates and parallel data transmission sub-carriers. A very important
characteristic of wireless channel is multipath propagation, which makes the
received signal overlap, and leads to inter symbol interference (ISI).
Therefore, OFDM channel estimation is an important part of OFDM system. This
paper proposed a channel estimation algorithm based on Kalman filter compression
sensing (KF-CS). By the combination of KF and CS algorithm, the KF-CS gets
higher estimation precision with fewer pilots compared with classical
algorithms. We adopted LS, LMMSE, CS, KF and KF-CS algorithms in pilot insertion
method, obtained complete channel spectral response and got effective comparison
of mean square error (MSE) of the channel response. Simulation results show that
the proposed algorithm of KF-CS has better accuracy than KF algorithm, and can
reduce pilots. So the proposed algorithm can get good channel estimation
performance with fewer pilots and improved spectrum efficiency. |
Keywords: |
Channel Estimation (CE), Compressed Sensing (CS), Kalman Filter (KF), Orthogonal
Frequency Division Multiplexing (OFDM) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON WATER QUALITY MONITORING BY MEANS OF SENSOR NETWORK |
Author: |
HU YUNBING |
Abstract: |
As society develops quickly and people attach more importance to environmental
protection, it is of great research significance to intelligently monitor the
environment. Based on the sensor network, doing research on live monitor of
water quality, first of all, this paper designs data collecting nodes under
water ,which realize communication and organization by means of sound waves; and
then it adds dada collecting nodes which automatically form networks by means of
Zigbee system form network in every water region; and then it is designed to
gather data by wireless network coordinator which are transmitted to servers by
GPRS; at last, developed information-alarmed system deal with the data.
According to tests, they show that this system is of theoretical meanings and
practical value on water monitoring. |
Keywords: |
Online; Sensor network; Water Quality Monitoring |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
WIENER MODEL IDENTIFICATION BASED ON ADE ALGORITHM |
Author: |
WEILI-XIONG, MINFANG-CHEN |
Abstract: |
DE algorithm is a population-based heuristic global search technology. The
algorithm has simple principle, fewer control parameters, but has strong
robustness, and good optimization performance. This paper uses differential
evolution algorithm for parameters identification of Wiener model. Firstly, we
analyze the influence of mutation rate F on global parallel search ability and
convergence in the process of identification. Secondly, an adaptive mutated
differential evolution algorithm (ADE) is proposed. The algorithm keeps
individual diversity to avoid premature convergence during the early stage and
reduces the mutation rate gradually so as not to damage the optimal solution
obtained during the later stage of the search process. Finally numerical
simulation is performed on Wiener model. The results show that ADE algorithm has
more effectiveness in parameter identification problem than PSO. On the other
hand, compared with the general DE algorithm, ADE algorithm identifies the
parameters of Wiener model with higher precision as well as shows lower
sensitivity to the algorithmic parameters. |
Keywords: |
Differential evolution; Adaptive mutation; Parameter identification; Wiener
model; Particle swarm algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
INTEGRATION DESIGN AND ANALYSIS OF EXCAVATOR BOOM BASED ON CAD/CAE |
Author: |
AIMIN JI , KUN ZHU, XINLEI HUANG, XU YIN |
Abstract: |
According to the existing problems in the development of actual product and
working process of excavator working device’s boom, the method of integrated
design and analysis for excavator boom is put forward. The defects in the
process of CAD/CAE integration are summarized, the integrated design and
analysis system including parametric design of boom, database design, detail
feature simplification of boom, mid-surface extraction and structure analysis is
studied. The parametric model of boom is established based on parametric method,
the management of model parameter is realized with the help of database
technology and the rapid design of model is reached. Based on the feature of
boom’s structure, the simplification rule of model is determined and detail
features of boom are simplified automatically by program. The mid-surface
extraction process and method of model is studied, the dimensions of model are
reduced and precision of mesh is enhanced. With customization technology, the
customization analysis platform of boom is developed by secondary development of
ANSYS Workbench code. |
Keywords: |
Boom; Parameterization; Model Simplification; Mid-Surface; Customization
Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE DESIGN OF OTA-C FILTER BASED ON THE PROTOTYPE OF LADDER LC FILTER |
Author: |
CHUNYUAN FENG |
Abstract: |
The article discusses the design method of operational trans-conductance
amplifier-C(OTA-C) filter based on the prototype of LC filter. It gives the OTA
circuit used in the filter. And it makes a detailed analysis on characteristics
of OTA. A third order OTA-C filter is presented. Its cut-off frequencies can be
tuned by the bias DC current of OTA. The filter is easy to integrate. The
proposed OTA has been simulated in CMOS technology. Simulation results show that
the repose of the OTA-C filter and passive LC filter is almost the same. And it
can be used in middle to high frequency circuit. |
Keywords: |
OTA-C filter, OTA, Ladder, LC Filter |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN E-PROCUREMENT SYSTEM INTEGRATING NEGOTIATION AND MULTI-ATTRIBUTE AUCTION |
Author: |
HONGGUANG PENG |
Abstract: |
Uncertainty cost of the sellers is a big challenge the buyer(the government)
encounters in public procurement setting. An implementation framework of an
e-procurement system integrating multi-round negotiation and multi-attribute
auction is proposed to help the buyer deal with the problem. A negotiation
procedure is firstly introduced to make the sellers reveal their cost
information little by little. Then the sellers with lower cost are screened out
to participate in the subsequent multi-attribute auction. The research shows
that the procurement mechanism is optimal from the perspective of not only the
social surplus but also the buyer’s payoff. |
Keywords: |
E-Procurement; Negotiation; Multi-Attribute Auction |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
AUTOMATIC CONTROL THEORY VIRTUAL EXPERIMENT SYSTEM BASED ON MATLAB GUI |
Author: |
XING XUENING |
Abstract: |
Virtual laboratory based on MATLAB GUI to complement the teaching of the course,
to help teachers explain the curriculum theory better, and enhance students'
understanding of the course. In this paper, listed common experiment in
"Automatic Control Theory", and given the GUI panel design and program design.
Given the corresponding parameter can get curves and data in applications, to
further analyze the influence of different parameters on the system. The method
has a friendly interface, easy operation, precise and intuitive image data,make
up for deficiencies in the traditional teaching, help to improve the quality of
teaching and student understanding of "Automatic Control Theory" course. |
Keywords: |
MATLAB, GUI, Automatic Control Theory, Virtual Experiment |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
SERVICE CAPABILITY EVALUATION OF THIRD PARTY LOGISTICS ENTERPRISE IN E-COMMERCE
ENVIRONMENT |
Author: |
CHAOGAI XUE |
Abstract: |
In the new E-commerce environment, it is necessary to evaluate the service
capability of logistics enterprises. To this end, this paper deals with a new
quantitative approach to the service capability evaluation of third party
logistics enterprises. Firstly, based on the GQM (Goal Question Metric), a set
of service capability evaluation index system of logistics enterprises is
proposed. Secondly, based on the index system, the service capability evaluation
model is built and the corresponding algorithm, i.e., Refining High Index (RHI)
algorithm, is given. Finally, an example is used to show the application of the
service capacity evaluation indexes, evaluation model and RHI algorithm, which
provides quantitative references for service capability evaluation of logistics
enterprises. |
Keywords: |
Service Capability, Quantitative Evaluation Model, Third Party Logistics
Enterprise, Refining High Index Algorithm, E-Commerce |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
MODELING OF COMPLEX SPATIO-TEMPORAL NETWORKS FOR IOT-CLOUD |
Author: |
LIU LIZHAO, LIU JIAN, ZHU SHUNZHI, SUN ZHONGHAI, LI QI |
Abstract: |
The article discusses the spatial temporal characteristics of the Internet of
Things, makes a description and classification of IOT intelligent terminals and
non-intelligent terminals. Supposes that as the cloud computing widely used, the
IOT terminal entities will eventually connect with the computing entities, the
final formobjects associated a IOT-cloud. Objects associated with IOT-cloud
entities will have dual attributes of the Internet of Things and cloud
computing. IOT itself have a complex social network characteristics and the
complex computer network characteristics. The space-temporal network modeling
process ues the complex sclae-free complex network modeling steps and describing
method, the IOT-cloud secure access pattern use the cloud computing security
mode. Distributed access control and quantify security decision-making process
are made as an example to illustrate the correctness and practicality of the
model. |
Keywords: |
IOT,Cloud Computing,Cloud Securety,Access Control,Scale-Free Networks, Complex
Spatio-Temporal Network |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
STUDY ON THE RELATIONSHIPS AMONG CUSTOMER SATISFACTION, BRAND LOYALTY AND
REPURCHASE INTENTION |
Author: |
JI FENG HE YANRU |
Abstract: |
To explore the influences of multiple reference on brand assessment and build
relationships among them, this research used “expectancy disconfirmation, brand
preference and alternative attractiveness” as the comparison result and
“customer satisfaction, brand loyalty and repurchase intention” as the result of
brand assessment, and chose “brand consumers of mobile communication service
providers” as the research subject. Having empirical analysis, expectancy
disconfirmation and brand preference presented positive relations to customer
satisfaction, and brand preference had a positive effect on repurchase
intention, while alternative attractiveness revealed negative relations to
repurchase intention. In addition, expectancy disconfirmation and brand
preference affected repurchase intention through single intervening
variable(customer satisfaction) or dual intervening variables(customer
satisfaction and brand loyalty), and brand preference did not regulate the
influence of alternative attractiveness on customer satisfaction, whereas, brand
preference adjusted the effect of alternative attractiveness on repurchase
intention. |
Keywords: |
Alternative Attractiveness, Customer Satisfaction, Brand Loyalty, Repurchase
Intention |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
EVALUATING METHODS OF TELECOM DATA NETWORK BASED ON THE SCORE OF INDEX SYSTEM |
Author: |
HUANG WENHUA |
Abstract: |
Evaluation is a basic requirement to protect telecom data networks. How to carry
out a usable evaluation is a main problem to solve in this paper. The index
system is the basis of the analysis. The general framework is combined with the
structure of China telecom data network to get the index system. The evaluation
method is established based on the score of index system. The score is obtained
through grading every index parameter and weighted sum. The feasibility of the
method is verified by an example. The theoretical basis is given for security
evaluation of telecom data networks in this research. |
Keywords: |
Telecom Data Networks; Security Evaluation; Index System; Score |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
EVOLUTIONARY SIMULATION MODEL OF DYNAMIC HFCV INDUSTRY MARKET STRUCTURE |
Author: |
TAO MA, MING-QI CHEN, XUE ZHANG , PING MA |
Abstract: |
Facing the hydrogen energy economy, Hydrogen Fuel Cell Vehicles (HFCVs) will
play an important role. China is becoming more and more interested in
transitioning their vehicle fleet to HFCVs as they look forward into this
century. The aim of this paper is to highlight some of the research and
development work which has occurred in the past five years on HFCVs
commercialization, with a focus on simulation model of its dynamic market
structure. We take Lotka-Volterra model account into the evolutionary simulation
model of the dynamic HFCVs market structure. And with which to analysis the
market evolutionary character aimed on increasing the HFCVs supply. First, based
on the rules of increasing the HFCVs industry market supplement and the
substitution, assert the evolutionary simulation model of the HFCVs industry
market and its market structure. Then improve the Lotka-Volterra equation with
time variable. Based on above we set the evolutionary simulation model of the
HFCVs industry market. Secondly, with the mean value method to solve the model,
we analyze two kinds of relationships about the evolutionary system: the one is
between the supply increase of HFCVs industry market and the annealation of the
non-hydrogen energy, and the other is among the increment speed of the renewable
energy supply, the annealation of the HFCVs industry market and its fluctuate.
During the analysis, our reasoning comes down to four deductions about the limit
of the the HFCVs industry market supply, the relative dependence and the growth
in the HFCVs industry market. Lastly, combining of the above analysis, we
discuss the enlightenment of the four types of the the HFCVs industry market on
the HFCVs industrialization policy. |
Keywords: |
HFCVs Industry Market, Lotka-Volterra Simulation Model, Dynamic Evolution. |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESEARCH AND APPLICATION OF THE DRY-HUNG AND WET-LYING CONSTRUCTION TECHNOLOGY
OF TILED-ROOF WITH STEEP SLOPE IN SEVERE COLD REGION |
Author: |
BAI XUE, YAO CHUANQIN, BAI RONG, WANG CHAO, MA HAIBIN |
Abstract: |
Based on the project of Hengda Oasis in Shenyang, this paper fully studies the
construction technology of the tiled roof with steep slope in severe cold
region, and proposes that the new technology of dry-hung and wet-lying is a good
way to solve the common faults existing in the construction of roof with steep
slope in severe cold region, which offers a good example to similar projects. It
has a promising prospect and popularizing significance in severe cold region. |
Keywords: |
Severe Cold Region, Tiled Roof, Steep Slope, Construction Technology |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
STUDY ON SEISMIC WAVE PROPAGATION CHARACTERISTIC OF DEEP-HOLE LOOSE BLASTING IN
COAL MINE |
Author: |
XU YING, WANG HAI-BO, ZONG QI |
Abstract: |
According to the distribution of faults in coal face, deep-hole loose blasting
scheme is formulated and vibration monitoring is conducted. Obtained seismic
wave attenuation rule of deep-hole loose blasting, HHT method is adopted for
vibration signal decomposition to research the characteristic of spectrum and
the energy distribution of the signal. Research results show that seismic wave
propagation characteristic of deep-hole loose blasting accords with hard rock
spread rule in Safety Regulation for Blasting, the linear component of the
ligature between survey point and explosion source is the largest in the three
direction components of vibration velocity, which is resulted from the
difference of energy loss between different kinds of seismic wave in propagation
process; the duration of blasting vibration is about 150 ms, main energy is
concentrated in the low-frequency area of less than 100 Hz, and energy can be
divided into several “sub-bands” with frequency distribution. According to
attenuation law, the biggest single shot charge of deep-hole loose blasting in
the site can be calculated inversely, and measures for reducing blasting seismic
hazard in construction are proposed, which would provide a reference for the
construction. |
Keywords: |
Coal Mine; Deep-Hole Loose Blasting; Vibration; HHT Method; Spectrum; Energy |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN APPROACH BASED ON ITERATIVE LEARNING ALGORITHM FOR CHINESE TEXT HIERARCHY
FEATURE EXTRACTION WITHOUT LEXICON |
Author: |
SHAOHUA JIANG |
Abstract: |
A great deal of information included in Chinese text is invaluable asset for
further text mining, but the difference between Chinese and the western
languages imposes restrictions on further utilization of Chinese text. No
distinction indication between words by using spaces is one of the major
differences between Chinese, also some other Asian languages, such as Japanese,
Thai, etc., and Western languages. Chinese segmentation and features extraction
is essential in Chinese natural language processing because it is a precondition
for further Chinese text information retrieval and knowledge discovery. Maximum
matching and frequency statistics (MMFS) segmentation method based on length
descending and string frequency statistics is an effective segmentation and
extraction method for Chinese words and phrases, but there are still some
shorter words and phrases included in the longer ones extracted by MMFS can’t be
obtained. In order to solve this problem, this paper presents a novel Chinese
hierarchy feature extraction method combined MMFS with iterative learning
algorithm. This method can extract hierarchy feature according to morphology
with no need for lexicon support, no need for acquiring the probability between
words in advance and no need for Chinese character index. Experimental results
confirm the efficiency of this statistical method in extracting Chinese
hierarchy feature. This method is also beneficial to feature extraction for
other Asian languages similar to Chinese. |
Keywords: |
Hierarchy Feature Extraction, Chinese text, Iterative Learning Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
A COST-BASED VERTICAL HANDOFF WITH COMBINATION PREDICTION OF SINR IN
HETEROGENEOUS WIRELESS NETWORKS |
Author: |
YU ZHANG, ZHENGQI ZHENG, LINA CHEN |
Abstract: |
It is well known that to provide seamless mobility and transmission in
heterogeneous wireless networks, a vertical handoff technique is required to
guarantee an Always Best Connected. This paper thus presents a cost-based
vertical handoff algorithm with combination prediction of SINR (CPSVH) in
heterogeneous wireless networks to make handoff decision. Our approach involves
two steps, first SINR is predicted by combining GM (1,1) and BP neural network
for accurate timing to trigger handoff, and then a handoff decision on the
optimal network is made by way of a cost function. The cost function, on basis
of multi-attribute QoS consideration, is composed of SINR, user preference, user
traffic cost and available bandwidth from accessible networks, with the weight
of each attribute in the cost function calculated by a fuzzy judgment matrix
constructed for this purpose. Meanwhile, the stability period (defined as the
waiting time before handoff) is also taken into regard to reduce unnecessary
handoffs. The simulation results in this study reveal that the proposed handoff
scheme outperforms other approaches in terms of system throughput, dropping
probability, and vertical handoff numbers. |
Keywords: |
Vertical Handoff, SINR, Combination Prediction, Cost Function |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
A HYBRID ALGORITHM BASED ON LS-SVM AND BACTERIAL FORAGING APPROACH FOR
BURNING-THROUGH-POINTS(BTP)PREDICTION IN SINTERING PROCESS |
Author: |
SONG QIANG, WANG AI-MIN |
Abstract: |
In order to solve the analysis problem more efficiently and quickly, we
presented a hybrid method based on LS-SVM and Bacterial Foraging Optimization (BFO)
in this study.The social foraging behavior of Escherichia coli bacteria has been
used to solve optimization problems. This paper proposes a hybrid approach
involving Bacteria Foraging Optimization Algorithm (BFO) and LS-SVM algorithms
for prediction problems. It is found that Bacteria Foraging Algorithm (BFO) is
capable of improving the speed of convergence as well as the precision in the
desired result. Simulation results clearly illustrate that the proposed approach
is very efficient and could easily be extended for other global optimization
problems.It can conclude that BFO is effective and rapid for the cluster
analysis problem. |
Keywords: |
Bacteria Foraging Algorithm (BFO),LS-SVM,Optimization,BTP |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
PRICE TIME SERIES LONG MEMORY ANALYSIS AND PREDICTION STUDY |
Author: |
XIAOBING CHENG, MINGPING XIA, RUIKAI PAN, DAOPING WANG |
Abstract: |
The R/S test has been extensively used in testing the long memory of financial
time series, but little attentions have been paid on its validity. The paper
sets the chemical raw materials styrene price time series as an example, to test
the stable of the price series. It indicates that we should give prudent
explanation for the R/S test, and then establish the ARFIMA model to determine
the data generation process with fractal characteristics. Thus the fractal
theory can be used to describe the price time series and provide theoretical
support for the price time series forecasting. |
Keywords: |
Validity, Long memory, Forecasting |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
EVALUATION AND RESEARCH ABOUT THE EVOLUTION AND EFFICIENCY OF CHINESE
TELECOMMUNICATION INDUSTRY VALUE CHAIN |
Author: |
ZHANG QUAN, ZHANG YANTAO, HAN JANGWEI |
Abstract: |
In order to explore the mechanisms of the telecommunication industry value chain
value growth and promote the Chinese telecommunications industry’s better and
faster development, this article ,on the basis of segmentally dividing the
evolution of China's telecommunication industry value chain, finds that the
efficiency of China's telecom industry value chain evolution had been
significantly improved by using DEA model to estimate and comparatively analyze
the efficiency of China's telecommunication industry value chain integration,
competition , coordination and value growth, which is due to the main
competitors of telecom industry value chain, the increase of links as well as
the weakened surveillance ability of telecommunication operators resulting from
market reforms, loosen surveillance and technology progress and other factors,
contributing to the integration, competition and collaboration of the upstream
and downstream enterprises of the industry value chain. |
Keywords: |
Telecommunications Industry, Evaluation Of Industry Value
Chain, Efficiency Of Integration, Efficiency Of Competition And Collaboration,
Efficiency Of Value Growth |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
STABILITY CONTROL FOR SIX-WHEEL DRIVE ARTICULATED VEHICLE BASED ON DIRECT YAW
MOMENT CONTROL METHOD |
Author: |
YITING KANG, WENMING ZHANG |
Abstract: |
Six-wheel drive (6WD) articulated dump truck has excellent passing ability and
high productivity, but its stability should be improved. A dynamic model of 6WD
articulated vehicle with 3 degree-of-freedom (DOF) is established. With the
control variables of yaw velocity and side-slip angle at mass center of front
body, a feedfoward-feedback control system is designed by linear quadratic
regulator (LQR) theory based on direct yaw-moment control (DYC) method. A
simulation with a step input of articulated angle is conducted, and the result
shows that the value of side-slip angle at mass center, yaw velocity and lateral
acceleration all drop after control, and the control system is effective to
improve the vehicle stability. The weight coefficients are regulated to analyze
their influence on control effect, and the result indicates that it is necessary
to regulate them to reach the optimum of both energy and error of control. |
Keywords: |
Articulated Vehicle, Vehicle Stability Control, Direct Yaw Moment Control (DYC),
Linear Quadratic Regulator (LQR) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
A NEW ALGORITHM OF THE DATA MINING MODEL IN CLOUD COMPUTING BASED ON WEB FUZZY
CLUSTERING ANALYSIS |
Author: |
XIANFENG YANG, PENGFEI LIU |
Abstract: |
Cloud computing are Internet-based services to increase the use and delivery
models, usually involving the Internet to provide easy to dynamically scalable
and often virtualized resources. To solve these problems, the proposed web data
mining method based on cloud computing: the massive data mining tasks decomposed
into parallel processing on multiple servers. Web fuzzy clustering of objects is
given Web object collection, object properties of the source data, and its
direct role object is a Web fuzzy similarity matrix or the Web, fuzzy equivalent
matrix. The paperr presents the new algorithm of the data mining model in cloud
computing base on web fuzzy clustering analysis. The experimental results show
that this method can effectively improve the performance of data mining. |
Keywords: |
Fuzzy Clustering, Data Mining, Cloud Computing |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
HUMAN-CENTERED ENVIRONMENT DESIGN IN INTENSIVE CARE UNIT |
Author: |
Y. LI,A. ALBAYRAK,R.H.M. GOOSSENS,D. J. XIAO, J. JAKIMOWICZ |
Abstract: |
Because of high risk and instability of the patients in Intensive care unit(ICU),
the design of ICU is very difficult. ICU design, auxiliary building design,
lighting design, noise control and other aspects can also enhance its
management. In this paper, we compare ICU design in China and Holland based on
related standards. We also premeditate the indoor environment from planning
perspective, analyze patients, their families, medical staff and space
requirement to conduct research in ICU design. With the social progress and
science development, we more and more emphasize human-center design. All of our
goal is to provide comfortable and effective ICU environment for patients, their
families and medical staff, satisfying the demands of different needs and
balancing the economy, quality and efficiency. |
Keywords: |
Human-Centered, Industrial Design, Medical Environment, Intensive Care Unit |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
DEVELOPMENT OF VIRTUAL WALKTHROUGH SYSTEM OF CHINESE HERBAL SLICES WORKSHOP |
Author: |
XIANG CHAOYANG, CHEN XIAONI, ZHUANG YIXIU |
Abstract: |
Practical teaching plays an important part in higher education, and also brings
some difficulties. One of the difficulties is that the condition of experimental
and practical trainings can not satisfy the current requirement of teaching. On
account of this problem, this paper introduces a case of developing the virtual
walkthrough system of Chinese herbal slices workshop. In this case, it explains
the methods and techniques to construct virtual simulation walkthrough system
with Quest 3D. For the system can be easily and quickly developed, this case can
be an object lesson for similar or relevant instructional activities.
|
Keywords: |
Quest3D, Workshop Roaming, Scenes Changes, Virtual Simulation |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
CONSTRUCTION OF WIRELESS SENSOR NETWORK MANAGEMENT SYSTEM BASED ON FUZZY CLUSTER
ANALYSIS |
Author: |
HONGHUI HE, WENKUI ZHENG |
Abstract: |
Wireless sensor network is used to sense the objective physical world, access to
the information of the physical world. Fuzzy cluster analysis, it is involving
the fuzzy boundaries between things of things according to certain requirements
for the classification of mathematical methods. Wireless sensor network is used
to sense the objective physical world, access to the information of the physical
world. The paper presents construction of Wireless sensor network management
system based on Fuzzy cluster analysis. Wireless sensor network system based on
Fuzzy cluster analysis is a large number of stationary or moving sensors
consisting of self-organization and multi-hop wireless network with the aim of
the collaboration awareness, acquisition. |
Keywords: |
Wireless Sensor Network, Fuzzy Cluster Analysis, System Clustering |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE RESEARCH OF NOVEL SPATIAL SPECTRUM ESTIMATION ALGORITHM BASED ON THE
MULTI-SCALE SYSTEMS |
Author: |
JING ZHANG, KECHENG LIU, CAIXIA YANG |
Abstract: |
Spatial spectrum estimation of is an important branch of array signal
processing. A multi-scale system theory is the key to the multi-scale system to
define a new concept, which is similar to the discrete time system Z transform.
This paper mainly introduces the spatial spectrum estimation of beam forming
method, linear prediction method, subspace method, parameter method, and for
each algorithm were discussed analysis comparison. The paper presents the
research of novel spatial spectrum estimation algorithm based on the multi-scale
systems. Experiment results show that this system is feasible and efficient.
Finally, by using the Gram method and the rank criterion method for multi-scale
modeling of controllability are shown. |
Keywords: |
Spatial Spectrum Estimation, Multi-scale, Wavelet Transform |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
ASSESSMENT OF STRUCTURE STRENGTH AND PRIMARY PARAMETER ANALYSIS FOR JACK-UP/SHIP
COLLISION |
Author: |
HU AN-KANG, JIANG WEI, LIN YI |
Abstract: |
It’s commonly known that there are high collision risks between vessels and
jack-ups in work condition. When such an unfortunate incident happens, not only
would the jack-up be damaged but also drilling activities might get suspended
and economic losses would occur. Comparing with other offshore installations,
jack-ups are much more flexible and have a much lower degree of redundancy, but
its collision danger has not been paid sufficient attention. As a matter of
fact, there is little research on this subject in our country. Based on
non-liner finite element analysis methods, taking a 300ft jack-up designed by
Shanghai CIMC Offshore R&D Center as an illustrative example, one approach of
assessing structural strength for collision between jack-up and vessel
considering the initial state of the jack-up and residual strength is put
forwarded. Furthermore, the influence of impact parameters on structure damage
and dynamic response is considered. The conclusion of this analysis may be
helpful to structural design against collision loads for jack-ups. |
Keywords: |
Jack-Up, Collision Strength, Impact Parameters |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
ADAPTIVE DOO-SABIN SUBDIVISION ALGORITHM |
Author: |
LIU XUMIN, WANG XIAOJUN, YANG XIANPENG, LI CAILING |
Abstract: |
At present most of the subdivision algorithm are 1-4 subdivisions. as the number
of subdivision increases, the grid too-rapid growth in the number of patch and
die after the breakdown of huge volume of data make it difficult to deal with,
we proposed a radical Doo-Sabin Mode adaptive subdivision algorithm addressing
the problem. As a measurement criteria, the average vector of the vertex and the
angle between the intersecting surfaces of the vertex are used to divide the
surface, and then make local subdivision. In this way, when the times of
subdivision are fewer (the demand of smoothness is not too high) , the effect of
subdivision has little difference , but efficiency of the algorithm can be
greatly improved. |
Keywords: |
Surface Subdivision; Doo-Sabin Subdivision; Quadrilateral Grid; Threshold |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
ROBUST CONTROL ALGORITHM BY ADJUSTING INPUT VOLTAGE FOR DC-DC CONVERTERS |
Author: |
YANHUA XIAN, JIUCHAO FENG |
Abstract: |
In view of the switching property and the existence of disturbance in DC-DC
converters, a robust control algorithm by adjusting input voltage is studied
based on the switched linear model of DC-DC converters. Considering the output
disturbance and weighted functions chosen for perturbation input and controlled
output, the augmented switched linear model of DC-DC converters is established,
in which the input voltage is as control variable. According to linear matrix
inequality (LMI) and H∞ control theories, the sufficient condition of controller
existence and the design method of H∞ controller for the proposed switched
system are derived in the form of LMI. The obtained controller is such that the
closed loop system is asymptotically stable under arbitrary switch conditions
and has an H∞ disturbance attenuation bound. The simulation results for buck and
boost converters are presented to show that the good robust stability can be
obtained with respect to the output disturbance. By adjusting the input voltage,
the output voltage can be stabilized on the expected value with the parameters
perturbation under arbitrary constant duty cycle, which demonstrates the
effectiveness of the proposed algorithm. |
Keywords: |
H∞ Control, Switched System, Linear Matrix Inequality(LMI), DC-DC Converter |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
SURROUNDING ROCK LOOSING ZONE MEASUREMENT IN UNLINED TUNNELS OF UNDERGROUND
CRUDE OIL STORAGE |
Author: |
YANG SHANG-YANG, LI SHU-CAI, XUE YI-GUO |
Abstract: |
The surrounding rock loosing zone is one of the most critical factors of the
tunnels stability. This paper applies the ultrasonic wave method to measure the
surrounding zone. In this project, five holes with the diameter of 90 mm and the
depth of 7 m are bored in each section. The measured datas indicate that the
range of the loosing zone of the tunnel is 1.2 ~ 1.8 m. In order to verify the
accuracy of the ultrasonic testing data, the system of borehole television
measurement is adopted in the main tunnel. The measurement results are in good
agreement with the results of the ultrasonic testing. The results can provide
the verification for the rationality of bolt support and the practical
experiences and guideline for the design of support system for loosing zone of
surrounding rock in the similar tunnel conditions. |
Keywords: |
Loosing Zone(LZ), Ultrasonic Wave(UW), Borehole Television(BT), Bolt Support(BS),
Crude Oil Storage(COS) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
FUZZY OPTIMIZATION METHOD AND ITS APPLICATION OF SIMILAR MATERIAL RATIO IN 3D
GEO-MECHANICAL MODEL |
Author: |
ZHANG LONG-YUN, ZHANG QIANG-YONG, YANG SHANG-YANG, CHEN XU-GUANG |
Abstract: |
The similar material plays an important role in Geo-mechanical model test, and
the proportion influences the test results directly. According to the physical
and mechanical properties of the prototype, the cementitious material with good
elastic-plastic for iron crystal sand (ISBM) was chosen as the similar material
for the research on failure mechanism of surrounding rock under the environment
of excavation and high geo-stress in deep tunnel. Three mixing proportions that
matched with similar conditions were got from more than 300 groups of matching
test. Relying on the specific indoor test data, and the main physical and
mechanical parameters of the original rock were taken as the evaluation index
system, the improved fuzzy optimization mathematical model of similar material
was established. It might help you make your decision in cases where several
solutions seem to be able to fit the bill. The optimal proportion of the similar
material was got by using the model, and the optimization result was applied to
the true 3 d geological mechanical model test for similar material, and
simulated successfully the process of excavation in high geo-stress environment
deep tunnel. The reappearance of the zonal disintegration phenomena of
surrounding rock under excavation in high geo-stress environment deep tunnel of
Dingji coal mine. |
Keywords: |
Geo- Mechanical Model(GMM); Similar Material Ratio(SMR); Gray Fuzzy
Optimization(GFO); Deep Tunnel(DT) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
ESTABLISHING STRUCTURE FOR ARTIFICIAL NEURAL NETWORKS BASED-ON FRACTAL |
Author: |
Yang Zong-chang |
Abstract: |
The artificial neural network (ANN) is a widely used mathematical model composed
of interconnected simple artificial neurons, which has been applied in a variety
of applications. However, how to determine number of neurons in the hidden
layers is an important part of deciding overall neural network architecture.
Many rule-of-thumb methods for determining the appropriate number of neurons in
the hidden layers are suggested. In this study, to the puzzling problem of
establishing structure for the Artificial Neural Networks (ANN), from a
microscopical view, two concepts called the fractal dimension of connection
complexity (FDCC) and the fractal dimension of the expectation complexity (FDEC)
are introduced. Then a criterion reference for establishing ANN structure based
on the two proposed concepts is presented that, the FDCC might not be lower than
its (FDEC), and when FDCC is equal or approximate to FDEC, the ANN structure
might be an optimal one. The proposed criterion is examined with good results. |
Keywords: |
Artificial Neural Networks, Structure Establishing, Connection Complexity,
Fractal Dimension. |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
WELL FIELD THREE-DIMENSIONAL DRILL STRING VIBRATION SIGNALS’ PERIODIC VIBRATION
NOISE SEPARATION METHOD RESEARCH |
Author: |
WU Haocheng, DAI Yongshou, SUN Weifeng, LI Ligang, ZHANG Yanan |
Abstract: |
The effect of periodic vibration noise in wellsite is an important factor which
impact analysis on three-dimensional drill string vibration signal. In order to
obtain more accurate characters of three-dimensional drill string vibration
signal that reflects the drilling tools condition, we conduct researches on the
periodic vibration noise in the wellsite, independent component analysis
algorithm which based on negative entropy for periodic vibration noise signal
separation was adopted. At the same time, in order to improve the effect of
algorithm demixing, an improved Particle Swarm Optimization algorithm was
introduced, combining with periodic noise components which exist in three
directions of drill string vibration signals to seek the optimal mixed matrix by
which can structure multi-channel mixed-signal of independent component analysis
algorithm. This method has high similarity after separation each signal
components, in operation has high efficiency. Through the experimental
simulation, the method was proven feasible in the drill string vibration
periodic noise signal separation. |
Keywords: |
Drillstring Vibration Signal; Periodic Noise; Independent Component Analysis (ICA);
Parameter Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
REAL TIME SKELETAL ANIMATION WITH DUAL QUATERNION |
Author: |
XIANG FENG, WANGGEN WAN |
Abstract: |
Though Combination of Quaternions and matrix has been a popular tool in skeletal
animation for more than 20 years, classical quaternions are restricted to the
representation of rotations. In skeletal animation and many other applications
of 3D computer graphics, we actually deal with rigid transformation including
both rotation and translation. Dual quaternions represent rigid transformations
nearly in the same way as quaternions represent rotations. In fact, Algorithms
based on dual quaternions show better properties than those based on quaternions,
including increased computational efficiency, reduced overhead and coordinate
invariance. In this paper we show how to generalize established techniques for
quaternions to dual quaternions to include all rigid transformations, and
implement real-time character animation with dual quaternions under the platform
of OpenGL in order to demonstrate the superiority and effectiveness of dual
quaternions. |
Keywords: |
Skeletal animation, Dual quaternion, Rigid transformation, Real time |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
RECOGNITION AND LOCALIZATION OF HARMFUL ACOUSTIC SIGNALS IN WIRELESS SENSOR
NETWORK BASED ON ARTIFICIAL FISH SWARM ALGORITHM |
Author: |
ZONGZHANG LI, HAIXIA ZHANG, JIALI XU AND QINGYU ZHAI |
Abstract: |
The recognition and localization of harmful acoustic signals in a certain
scenario are of great importance. In this paper, we propose a scheme for harmful
acoustic signals recognition and localization based on fish swarm algorithm for
wireless sensor network. We firstly optimize the coverage where the harmful
sound source can be detected efficiently. And then, we get the eigenvalue of the
harmful acoustic signals by using the LPC (Linear Prediction Coefficients).
After analyzing the similarity between the eigenvalue and the data pre-stored in
the data base, we can find out the harmful sound. After detection, the harmful
resource is located with the help of its closest nodes which are chosen based on
time delay. Simulation results show that the proposed scheme can improve the
efficiency of harmful source detection and accuracy of the localization. |
Keywords: |
Artificial fish swarm algorithm; Harmful acoustic signals; Linear Prediction
Coefficients; Recognition; Localization |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN APPROACH BASED ON MULTI-FEATURE WAVELET AND ELM ALGORITHM FOR FORECASTING
OUTLIER OCCURRENCE IN CHINESE STOCK MARKET |
Author: |
FANG ZHIJUN, ZHAO JING, FEI FENGCHANG, WANG QIANGYING, HE XIN |
Abstract: |
The prediction of outliers plays an important role in stock arbitrage and risk
avoiding. While most of researches focused on detecting outliers and removing
them to forecast time series data, few focused on forecasting the occurrence of
outliers. The main goal of this work is to forecast outlier occurrence in
Chinese stock market. Firstly, we detect abnormal points of two market indexes
and six individual stocks based on multi-feature wavelet method. Compared with
single feature wavelet method, multi-feature wavelet method was more reliable,
since it captures more information of the market and avoids “masking effect”.
Moreover, according to the detected results, we construct an outlier forecasting
model for the two market indexes and six individual stocks based on
multi-feature extreme learning machine (ELM) algorithm. Finally, we find out the
optimal number of hidden nodes to forecast when the mean of forecasting accuracy
was the highest which approximately equals 98.255% and the variance of
forecasting accuracy was only 0.000193. |
Keywords: |
Outlier Forecasting, Outlier Detection, Multi-feature Wavelet, Extreme Learning
Machine (ELM) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
REALISTIC RENDERING IN WEBGL |
Author: |
LI YU, XIAOMENG MAO |
Abstract: |
HTML5 introduces many new features, in which the Canvas can use WebGL technology
to achieve 3D graphics rendering. This paper presents a method to render virtual
models in WebGL on browser platform. We use Vertex Shader and Fragment Shader
programming to achieve realistic graphics, including Phong illumination model,
Phong shading and texture mapping. The advantages of this method are 1) The
browser support WebGL natively, so there is no need to install any plug-ins, and
it is cross-platform; 2) 3D scene roaming supported (pan, zoom and rotate). |
Keywords: |
WebGL, Vertex Shader, Fragment Shader |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
SUITABLE FOR NETWORK LOAD MUTATION OF THE MAC PROTOCOL |
Author: |
XINGWEI ZHAI, DEGAN ZHANG, XUECHAO MING, KE ZHENG, YUXIA HU |
Abstract: |
With the development of IOT (things of internet), people propose more and more
requirement about the wireless sensor networks performance for its key
technology. It not only needs to meet the reliability of the networks, but also
put forward higher requirement of the network life. A key factor influencing the
network life is the network energy-limited. Therefore, energy-saving has become
a key problem for the wireless sensor networks communication protocol design. an
energy-saving MAC protocol based on network load mutations is designed. The
protocol considers the redundancy problem between the sensor nodes data, takes
different scheduling methods for different levels of nodes. A cording to the
network load mutation, dynamically adjust to the detective and dormancy time.
This method solves the unfairness of the network energy and delay, and can
better satisfy changes in the complex network environment . |
Keywords: |
Network Load Mutation, MAC, Protocol, Energy-Saving, Wireless Sensor Network (WSN), |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
SUBSIDY MODEL DESIGN OF GREEN BUILDINGS BASED ON GOVERNMENT BENEFITS |
Author: |
YANG GAO-SHENG, LI XIU-YUN, XU XIN |
Abstract: |
This paper carries a deep analysis on the cost and economical attributes of
green buildings, and points out that in order to promote the development of the
green building market, the government should motivate the property developers by
maintaining a balance in the profits among the project participants, apart from
the necessary supervision and constraint. This paper defines all the parameters
that have effect on the development of the green buildings and establishes a
subsidy model, regulates the supervision of the government and incentive system,
and maintains a balance between them. Finally, a specific combination scheme of
government expenditure is put forward in this paper and is explained further by
example. |
Keywords: |
Project Management, Green Building, Supervised Cost, Incentive Cost, Subsidy
Model |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
SIMULATION AND ANALYSIS OF ULTRASONIC GUIDED WAVE NONDESTRUCTIVE TESTING OF
COFFERDAM ROD BASED ON DISPERSION CURVES |
Author: |
HU YANG,CHENG WANG |
Abstract: |
Nondestructive testing of cofferdam rod bond integrity is a new important
subject. Based on dispersion properties, this paper filters out an appropriate
guided-wave frequency for cofferdam rod testing and gives the reflected wave
which can identify the bottom of cofferdam rod with simulation analysis. The
adhesive quality of cofferdam rod can be quantified by calculating the
attenuation coefficients, which realizes nondestructive testing. |
Keywords: |
Ultrasonic Guided Wave, Frequency Dispersion, Adhesive Quality, Simulation And
Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
MODELING AND SIMULATION FOR THE TIME CONSTRAINT DAMAGE EFFICIENCY OF MLRS |
Author: |
SONG WEI-DONG, ZHAO CHENG-WANG, HUO JUN-XIU |
Abstract: |
Aiming at the shortcomings of the present damage efficiency model of multiple
launch rocket system(MLRS) that ignores factors such as targets movement and
viability while considers factors like shooting accuracy, target
characteristics, and amount of ammunition only, a time-constraint damage
efficiency model of MLRS was presented based on artillery firepower theory and
firepower counterwork theory. The damage efficiency of MLRS in scenarios that
containing time-constraint factors was computed based on the new model.
Simulation results show the effectiveness of the model, and demonstrate that
factors like targets maneuver and survival demand play an important role in
damage efficiency of MLRS battalion and make the damage efficiency time
sensitive. |
Keywords: |
Time-Constraint, Damage Efficiency, Shooting Accuracy, Ammunition Consumption,
Target Maneuver |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
SPATIOTEMPORAL DYNAMICS OF NDVI AND LAND USE IN CHINA BASED ON REMOTE SENSING
IMAGES |
Author: |
YAPING ZHANG, ZHENPING QIANG, XU CHEN |
Abstract: |
Using the fuzzy rule-based classification method, seventeen phases of NDVI
(Normalized Difference Vegetation Index) images acquired from 1982 to 1998 were
classified respectively based on NDVI and climate images. And then,
spatiotemporal dynamics of NDVI and land use are described. Finally, this paper
analyzes NDVI trends and their relationships with climate and human activity
under the land cover scenario. The results indicate that at the national scale,
the increases of monthly and seasonal NDVI correspond mainly to climate changes.
But NDVI trends show a large spatial and temporal heterogeneity at the regional
scale corresponding mainly to human activities, besides some sensitive areas
with climate changes. Therefore it is necessary to establish a set of policies
to ensure the ecological conservation and restoration, especially in ecological
sensitivity areas. |
Keywords: |
NDVI, Spatiotemporal Dynamics, Time-Series |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
GRAY CORRELATION ANALYSIS ON INFLUENCING FACTORS OF POSTGRADUATES’ INNOVATIVE
CAPACITY |
Author: |
GAO YUFENG, WANG JING,HE ZIDIAN |
Abstract: |
Cultivation of innovative spirit and capacity is the core of postgraduate
education, serving also as the requirement of its development and nature. With
the help of grey correlation analysis, this paper analyzes the correlative
degrees of influencing factors in postgraduate education. Data collected
indicate evidently that innovative capacity of postgraduates are closely related
to factors like creativity of the supervisor, discipline construction, social
demand for professional personnel, thesis writing and social practice skills,
with correlative degrees being 0.881, 0.869, 0.829, 0.805 and 0.799
respectively. In contrast, factors like enrolling system and examinees’
intelligence show much less relevance with correlative degree being below 0.4. |
Keywords: |
Postgraduates(P), Innovation Capacity(IC), Influencing Factor(IF), Grey
Correlation Analysis(GCA) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
EXTENSION DATA MINING BASED ON EXTENSION SET AND ROUGH SET |
Author: |
ZHI-HANG TANG, BEI-PING TANG |
Abstract: |
Data mining has gained popularity in the database field recently, the gained
knowledge is static because of the static nature of the database, and does not
reflect the dynamic nature of knowledge. Extension data mining is a product
combining Extenics with data mining, By using the theory and method of Extenics,
it can mine the knowledge from database which is relative to solve contradictory
problems. And the knowledge includes the Extension classification knowledge,
conductive knowledge and other knowledge associated with transformation, which
collectively called Extension knowledge. Its Application to enterprise brands
segmentation will help the enterprises to gain their ends on the best way.
Research result indicates that extension data mining can provide effective
decide support for the Decision-making of enterprise. |
Keywords: |
Extension Data Mining (EDM), Attributes Reduction, Rough Set |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE METHOD OF SELECTING CRITICAL SUCCESSFUL FACTORS TO KNOWLEDGE MANAGEMENT AND
ITS AUTOMATION |
Author: |
SHANG SHANSHAN |
Abstract: |
How to implement knowledge management is crucial to the enterprises, and
different enterprise has different critical factors which also have different
weight for different enterprise. The paper deeply analyzes all the important
factors for the knowledge management implementation first. Then the paper
proposes the invariance method to choose the critical factors and establishes
the knowledge database of enterprise type to critical factors’ weights. Finally,
according to knowledge database, an automated factor choosing mechanism is
established based on the fuzzy theory and neural network. |
Keywords: |
Knowledge Management, Key Factors, Factor Choosing, Automation |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
A NEW INTEGRATION METHOD OF INFORMATION FOR TABLE TENNIS TRAINING FROM A DATA
WAREHOUSE |
Author: |
JI PING, DING ZHIYI |
Abstract: |
A continuing challenge for Integration Information of Table Tennis Training (TTT)
is to develop efficient data unit component part. Many see data unit integration
as a potential solution; however, the quality of data integration of Table
Tennis Training tends to outweigh the potential benefits. The quality of TTT
data unit integration include establishing and maintaining a data warehouse of
Table Tennis Training data unit, searching for applicable data unit to be
integrated in a design, as well as adapting data unit toward a proper structure.
In this paper, a new Data Feature Model (DFM) method is suggested here for data
classification and integration of TTT which consists of K-Shortest Path (KSP)
algorithm and Data Feature Model Method. We found that this new method gives a
higher accuracy and precision in data selection and integration process of TTT
compared to the existing formal methods. |
Keywords: |
Table Tennis Training, Data Unit, Integration Of Information, Data Feature Model |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
STUDY ON THE D/H RATIO OF CITY ROAD’S ENVIRONMENTAL EFFECT BASED ON BIM |
Author: |
ZHOU TAO, SHEN QING |
Abstract: |
Based on urban planning theory, the paper conducts a study on the D/H ratio of
city road and applies a new technology BIM to make a quantitative objective
analysis on the space size of road, differing from traditional subjective
evaluation from the perspectives like psychology, physiology, social behavior
and urban esthetics. Through the simulation and analysis on sunshine,
ventilation under different D/H ratio, this paper discusses relationship among
D/H, sunshine and ventilation and the change rule of sunshine and ventilation
based on different D/H value, thus to get the best value range of D/H at
planning level, and to demonstrate the traditional suggested value to sum up
optimum value of D/H with more sufficient grounds. A new urban planning method
is also involved in this paper |
Keywords: |
D/H, City Road, Simulation in Ecology |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
A LIGHT-WEIGHTED TRANSACTION PROCESSING SYSTEM BASED ON INTERNET MESSAGE ACCESS
PROTOCOL |
Author: |
JIAN SU, CHONG ZHOU, WENYONG WENG |
Abstract: |
A few methods are proposed to build a light-weighted transaction processing
system, which is based on the Internet Message Access Protocol (IMAP). The main
idea underlying these methods is to use an email service as ubiquitous
lightweight data storage and provide means to assure transaction processing in a
new application environment. Two kinds of operation schemes based on advisory
shared-exclusive locks and optimistic concurrency control are implemented
respectively. Performance tests are also offered to help understanding the
pros-and-cons of these two schemes in different application conditions. The
light-weighted transaction processing system will be used as an on-line storage
system for many on-line light-weighted applications which do not require a
full-feature database system. |
Keywords: |
Transaction Processing, Internet Message Access Protocol (IMAP), Concurrency
Control, Storage System |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
Title: |
QUANTUM INFORMATION DELAY SCHEME USING ORTHOGONAL PRODUCT STATES |
Author: |
XIAOYU LI, LIJU CHEN |
Abstract: |
In this paper we provide a quantum information delay scheme using orthogonal
product states. By sharing orthogonal product states one person can give the
other person some information which cannot be read until he or she lets the
latter do. The fundamental Laws of quantum mechanics guarantee that the scheme
is unconditionally secure. Our scheme is easy to carry out in practice because
there are no entangled states or complex quantum operations needed. Moreover our
scheme is robust against noise and possible attacks. |
Keywords: |
Information Delay, Quantum Cryptography, Orthogonal Product State, Non-locality,
Security |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 1 -- 2013 |
Full
Text |
|
|
|