|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2013 | Vol. 49 No.1 |
Title: |
MULTI-LEVEL GROUP KEY MANAGEMENT TECHNIQUE FOR MULTICAST SECURITY IN MANET |
Author: |
R.VENNILA, V.DURAISAMY |
Abstract: |
In Mobile AdHoc Networks (MANETs), data transmission is speeded up by means of
multicasting. Though multicast transmission lessens overhead, collision and
congestion, it persuades new challenges towards security management. This
challenge must be conquered to bring better throughput of the network. In this
paper, we introduce a multi level group key management technique for multicast
security in MANET. Our technique works in a hierarchical model such that cluster
heads are prioritized over cluster members. The secure keys are generated using
one-way function chain. In addition to secure key management, the issue of
mobility is also handled. By simulation results, we prove the proficiency of our
proposed technique. Our secure key management technique incurs low overhead and
delay and significantly increases the throughput. |
Keywords: |
Mobile AdHoc Networks (MANETs), Key Management, Data Transmission |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
APPLICATION OF NON-TRADITIONAL METHOD FOR THE OPTIMIZATION OF FRICTION CLUTCH |
Author: |
FAISAL.S. HUSSAIN, M.K.SONPIMPLE |
Abstract: |
This paper describes the development of evolutionary algorithmfor the optimal
design of friction clutch.
Powerful evolutionary algorithm such as Genetic Algorithm (GA) is applied for
optimum design of friction clutch. The main objective function was to minimize
the axial force between clutch plate and pressure plate, using diameter ratio
and coefficient of friction as design variable and peripheral velocity as design
constraint.The analysis in the present paper is based on understanding the
relationship between diameter ratio and the design parameters like inner and
outer diameters and peripheral velocity in order to arrive at the optimum
design. It is shown that the dimensionless ratio of outer diameter to inner
diameter is the most fundamental parameter, controlling all the major designs as
well as performance parameters. The optimum design of clutch can be obtained,
satisfying the constraint on design, by controlling design variable. The results
of GA are compared with conventional optimization technique in order to satisfy
the main objective function to minimize the axial force between pressure plate
and clutch plate. |
Keywords: |
Friction Clutch , Optimal Design, Genetic Algorithm (GA) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
A REAL TIME HEALTH CONTROL AND LOCALIZATION OF PILGRIMS IN EL HAJJ :BSN
APPLICATION |
Author: |
A. BOUDHIR, Med.BOUHORMA, , Med.BENAHMED, S.Elbrak |
Abstract: |
As an emerging technology, WSN (Wireless Sensor Networks) composed from a large
number of small, low data rate and inexpensive node that communicate in order to
sense or control a physical phenomenon. WSN have a lot of applications like
disaster management, health, military and security, and enormously attracted the
community of researchers and has fueled the interest in sensor networks during
the past few years. Sensors are typically capable of wireless communication and
able to solve several problems in numerous domains. During the Hajj season, the
organizers faced a lot of problems related to the health of pilgrims and their
position in the area of El Hajj. At this time, the proposed works are focused on
the identification of pilgrims lost, using the implementation of RFID (Radio
Frequency IDentification). The latter solution, is as expensive equipment,
requires adding tags to pilgrims. Those tags are limited to read data from those
passives tags. Further work is limited only to the location of pilgrims.
However, the aim of this paper is to discuss and propose a system which allows
monitoring of pilgrims. Indeed, this allows, using a BSN (Body Sensor Network)
as a particular application of wireless sensor network, for the localization of
pilgrims lost and control, in real-time, the health status of those who fall
into critical situation with diseases that could threaten their health and life.
In this system, the agents in El Hajj, dispatched to several areas of Hajj and
have devices that install applications to monitor and locate pilgrims,
periodically, by reading sensors measurements in addition to their localization
with adequate and theoretical technique. This solution, present a model for an
area, and which can be duplicated for the full area of El hajj. It also
facilitates the intervention and localization, in real time, of pilgrims who are
away from their camps and to save their life. |
Keywords: |
Hajj, WSN, Localization, Body Sensors |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
PRIVACY PRESERVING SENSITIVE UTILITY PATTERN MINING |
Author: |
C.SARAVANABHAVAN, R.M.S.PARVATHI |
Abstract: |
Data mining services require accurate input data for their results to be
meaningful, but privacy concerns may influence users to provide spurious
information. The problem of privacy-preserving data mining has numerous
applications in homeland security, medical database mining, and customer
transaction analysis. The main feature of the most PPDM algorithms is that they
usually modify the database through insertion of false information or through
the blocking of data values in order to hide sensitive information. In this
paper, we have incorporated the privacy preserving concept into the previously
developed weighted utility mining approach. In this, we have presented an
efficient algorithm for mining of privacy preserving high utility item sets by
considering the sensitive item sets. The algorithm comprise of three major steps
to attain the aim of our research includes, 1) Data sanitization, 2)
Construction of sensitive utility FP-tree and, 3) Mining of sensitive utility
item sets. The experimentation has carried out using real as well as the
synthetic dataset and the performance of the proposed algorithm is evaluated
with the aid of the evaluation metrics such as Miss cost and Database difference
ratio. |
Keywords: |
Data Mining, Privacy Preserving Data, Utility Mining, Sanitized Data, Sensitive
Item, Data Sanitization, Miss Cost, Database Difference Ratio. |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
RECORD-TO-RECORD TRAVEL ALGORITHM FOR ATTRIBUTE REDUCTION IN ROUGH SET THEORY |
Author: |
MAJDI MAFARJA, SALWANI ABDULLAH |
Abstract: |
ttribute reduction is the process of selecting a minimal attribute subset from a
problem domain while retaining a suitably high accuracy in representing the
original attributes. In this work, we propose a new attribute reduction
algorithm called record-to-record travel (RRT) algorithm and employ a rough set
theory as a mathematical tool to evaluate the quality of the obtained solutions.
RRT is an optimization algorithm that is inspired from simulated annealing,
which depends on a single parameter called DEVIATION. Experimental results on 13
well known UCI datasets show that the proposed method, coded as RRTAR, is
comparable with other rough set-based attribute reduction methods available in
the literature. |
Keywords: |
Rough Set Theory, Attribute Reduction, Record–To–Record Travel Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
APPLICATION OF SHORT TERM LOAD FORECASTING ON SPECIAL DAYS USING INTERVAL TYPE-2
FUZZY INFERENCE SYSTEMS: STUDY CASE IN BALI INDONESIA |
Author: |
AGUS DHARMA, IMAM ROBANDI, MAURIDHI HERY PURNOMO |
Abstract: |
This paper presents the application of interval type-2 fuzzy inference systems
(IT2FIS) in short term load fore¬casting (STLF) on special days. This is a
continuation work of application interval type-2 fuzzy systems (IT2FSs) using
Karnik Mendel algorithm. Special days here mean local Balinese holidays such as
national and local culture-based public holidays, consecutive holidays, and days
preceding or following holidays. In general, the load values of special days
tend to decrease due to unlike load behavior of holidays com¬pare with ordinary
weekdays during the year. IT2FIS has recently been considerable attention for a
short term load forecasting problems due to their simple structure and high
identification performance. IT2FIS is the process of formulating and mapping
from a given input to an output using interval type-2 fuzzy logic. The Mamdani
interval type-2 fuzzy inference models and the design of interval type-2
membership functions and operators are implemented in the interval type-2 fuzzy
logic toolbox (IT2FLT). The method has been implemented on the historical peak
load data to solve the short term load forecasting during holiday for the Bali
electrical system, Indonesia. The results showed that the IT2FIS offer an
accu¬rate forecast of the peak load (in MW) on holidays, indicated by small mean
absolute percentage error (MAPE) less than 1.5% for the estimation task of the
year 2005 and 2006. More detail results and discussion are provided to show the
eminence of these methods handling the short term load forecasting task. |
Keywords: |
STLF, Interval Type-2 FLS, Interval Type-2 FIS, MAPE |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
APPLIANCE CONTROL USING HUMAN DETECTION AND DISPARITY ESTIMATION |
Author: |
K.NARASIMHAN, M.SANKAR, D. RANJITH KUMAR, D.SRIRAM, U,S.RAVI KUMAR, S. NELSON |
Abstract: |
We here propose a novel method for detecting and locating the human presence for
controlling the power appliances in the subjected area. At the heart of our
Endeavour, we use an over-head camera to capture the scene inside the concerned
arena. From the scene we sample frames and process them to detect silhouette of
objects. We then use a codebook instance as a reference to filter out human
outline(s) to detect human. Their location in the room is traced using disparity
calculation and subsequent depth extraction. Once the location has been
estimated, the corresponding appliances can be operated accordingly for service.
A controller interfacing can be provided to achieve the above. This is done
using the serial communication technique with RS 232 . Presence of max 232 IC
guides the above. The serial communication is performed by specifying the port
and baud rate of use and burning the needed code to perform the task. |
Keywords: |
Silhouette, Code book, Disparity calculation, Depth
Estimation, Microcontroller interface, Serial Communication, RS232 |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
OPTIMIZATION METHOD OF PILOT ALLOCATION FOR COOPERATIVE AMPLIFY-AND-FORWARD OFDM
SYSTEM |
Author: |
SUOPING LI, LITING YANG, JIN LI |
Abstract: |
Pilot-assisted channel estimation has been studied only in common cooperative AF
(Amplify-and-Forward) OFDM which has no feedback mechanism. In this paper, for
cooperative AF-OFDM system, we propose a feedback technique in which the pilot
allocation mechanism is adapted to the cooperative mobile channel. Then we show
how uniform pilots may no longer be optimal compared with our pilots. After
deducing the instantaneous system SNR is the function of the pilot allocation,
we optimize the pilot locations using optimization method at the destination
node. We examine the feedback overhead that is associated with our method and
make comparisons with the conventional uniform pilot allocation. To improve
system capacity, we suggest reduce the feedback information using K-means
clustering algorithm. Simulation results confirmed that the proposed
optimization method has an ideal performance gains and the algorithm of feedback
reduction can reduce the feedback information under the premise of ideal
performance. |
Keywords: |
AF-OFDM system, Feedback mechanism, Optimization of pilot allocation, Reduce
feedback |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
OUTLIER DETECTION AND INFLUENTIAL POINT OBSERVATION IN LINEAR REGRESSION USING
CLUSTERING TECHNIQUES IN FINANCIAL TIME SERIES DATA |
Author: |
V.ILANGO, R.SUBRAMANIAN, V.VASUDEVAN |
Abstract: |
The modern computing technology makes data gathering and storage easier. This
creates new range of problems and challenges for data analysis. Detection of
outliers in time series data has gained much attention in recent years. We
present a new approach based on clustering techniques for outlier. The
Expectation Maximization clusters (EM-Cluster) algorithm is used to find the
“optimal” parameters of the distributions that maximize the likelihood function.
Regression based outlier technique is used to detect influence point. The
analysis of outliers and influential points is an important step of the
regression diagnostics. Several indicators are used for identifying and
analyzing outliers. The proposed approach gave effective results within optimum
time and space when applied to synthetic data set. This paper investigates the
outliers, volatility clustering and risk-return trade-off in the Indian stock
markets NSE Nifty and BSE SENSEX. Engle's ARCH Test and AR (1)-EGARCH (p,
q)-in-Mean model were employed to examine the objective of the study. It
revealed that volatility is persistent and there is leverage effect in the
Indian stock markets. |
Keywords: |
EM-Cluster, EGARCH-M, ADF, Centriod, DFBETAS, Cut Value |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
PROPOGATION OF ACTION POTENTIAL FOR HANSEN’S DISEASE AFFECTED NERVE MODEL USING
FITZHUGH NAGUMO LIKE EXCITATION |
Author: |
S. VIVEKANANDAN, D. S. EMMANUEL, RICHA KUMARI |
Abstract: |
This paper deals with the modeling of a Hansen’s disease (HD) affected nerve
using FEM based simulation tool. There exists an exponential delay in the
propagation of action potential for a diseased nerve as compared to a healthy
one. To include this exponential delay, the FitzHugh Nagumo equation has been
modified and modeled using COMSOL Multiphysics 4.0a. Time domain and frequency
domain analyses help in a better diagnosis of the disease. The simulation
results are promising and the systematic exposition discussed in this paper will
be useful for the diagnosis of Hansen’s disease |
Keywords: |
Hansen’s disease, action potential, FitzHugh Nagumo excitation, COMSOL
Multiphysics 4.0a |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
STUDY ON SPATIAL VARIABILITY OF CULTIVATED SOIL AVAILABLE PHOSPHORUS WITH GARBF
NEURAL NETWORK |
Author: |
XU JIANBO, TAN QUANYUAN, SONG LISHENG, XIA ZHEN, ZHANG
QIAO, HU YUEMING |
Abstract: |
The spatial variability of cultivated soil available phosphorus(P) contents is
the work foundation of adjusting measures for cultivated management, rationally
applying P fertilizer, minimizing P loss, decreasing non-point source pollution
of water. A case of Gaozhou City, we collected 664 soil samples in cultivate
horizon, then the characteristics of spatial variability, spatial distribution
pattern and is cause of county cultivated soil available phosphorus, used Radial
Basis Function Network optimized by Genetic Algorithm(GARBF for short) and
Geo-statistical methods and so on. The results showed that, while in the whole
region of Gaozhou City, the semi-variance structure was existed for spatial
variability of surface soil of cultivated land, and models best fit exponential
or spherical, there was structural spatial correlation in surface cultivated
soil available phosphorus in 5 sampling scales, which indicated that a poor
spatial correlation in content developed in large-block scale. The spatial
interpolation ability of GARBF neural network method was better than RBF neural
network prediction model based on several closest neighbors and Ordinary Kriging
method. The P application to cultivated soils in cropping systems in Gaozhou
City exceeded P offtake by crops. This surplus could lead to P accumulation in
cultivated soils, making them long-term diffuse sources of P loss water, which
formed a serious threat to the regional water environment. |
Keywords: |
GARBF Neural Network; Spatial Prediction; Error Analysis; Spatial Variability |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
COORDINATING WITH DISCOUNT PRICING CONTRACT IN A TWO-LEVEL SUPPLY CHAIN |
Author: |
WENGUO ZHANG, WEI XU |
Abstract: |
The ordering model between single supplier and multi-retailers under the
circumstance of non-cooperation supply chain is discussed in this paper, an
improved linear price discount strategy is also provided. This strategy
considers two situations of incremental discount and decremental discount at the
same time. Moreover, Stackelberg game model of both parties’ order on supply and
demand is given in this paper. The numerical analysis result demonstrates that
discount model is very effective in improving coordination on operation of
supply chain. |
Keywords: |
Price Discount, EOQ, Stackelberg Equilibrium, Supply Contract |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
DEVELOPMENT OF THE CONSUMING INTENTION PRODUCT DESIGN MECHANISM |
Author: |
HUNG-TENG CHANG |
Abstract: |
In recent years, the rising of customers’ awareness and spending power has led
to the growth of the customized products. The traditional enterprise-led
products are unable to meet the customers’ needs. Nowadays, the enterprises have
to put the emphasis on the customers’ preferences and products must be made to
satisfy the customers’ various needs.
In this research, we develop a set of Fuzzy Intention Product Design System. The
system is capable of breaking the restrictions of time and space. Through the
Fuzzy Analytic Hierarchy Process (FAHP), the triangular fuzzy numbers are put
into the Pairwise Comparison Matrix to prevent the fuzzy problems during the
process of conducting criteria measurement and judgment. By means of FAHP, the
AHP Exact Value will be substituted by the Interval Value. And the experts will
make strategic decisions with humanity when evaluating problems and give a
weight value to the measure factors.
The LCD screen support structure is connected with the Internet survey platform
and FAHP to construct the Fuzzy Intention Product Design Mechanism in this
study. The results shown in this paper are expected to be references to the
related study and the product designing.
|
Keywords: |
Fuzzy Analytic Hierarchy Process (FAHP), Product model, TV support |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
ON THE NUMBER OF ISOMORPHISM CLASSES OF JACOBI QUARTIC CURVES OVER A FINITE
FIELD |
Author: |
HONGFENG WU, LI ZHU |
Abstract: |
Isomorphic elliptic curves are the same in the point of cryptographic view.
Recent research activity has focused on counting distinct elliptic curves over
finite field (up to isomorphism over the algebraic closure of the ground field
or ground field) in various curves families. Jacobi quartic curve is an
important curve family for elliptic curve cryptography. This paper presents
explicit formulas for the number of isomorphism classes (up to isomorphism over
ground field) of Jacobi quartic curves and generalized Jacobi quartic curves
defined over finite fields. These results also can be used in the elliptic curve
cryptography and classification problems. |
Keywords: |
Elliptic Curve, Jacobi Quartic Curve, Isomorphism Classes, Cryptography, Finite
Field |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
INFORMATION-FUSION METHOD FOR URBAN TRAFFIC FLOW BASED ON EVIDENCE THEORY
COMBINING WITH FUZZY ROUGH SET |
Author: |
NING CHEN, XING XU |
Abstract: |
The traffic detecting result is always short of accuracy by different kinds of
individual sensors in urban China. A new information fusion approach is raised
in this paper to solve the issue, based on fuzzy rough set theory combining with
evidence theory. The method of attribute reduction has been improved based on
rough set and it could consider the relation of attributes during reduction
process. The essential probability function is obtained by the maximum fuzzy
likelihood function that helps to diminish the effect of subjective factor.
Furthermore, a new combination formula has been raised based on the Yager’s
formulas. It can reduce the negative effect on fusion accuracy caused by the
conflict of different evidences. Then, a new combination rule is given to
dissolve the confliction among the traffic evidence data collected by different
individual sensors. Finally, the experiment to fuse the traffic information from
an intersection in Hangzhou City showed that the proposed approach could obtain
a high accuracy. |
Keywords: |
Information-Fusion, Urban Traffic Flow, Combination Rule; Information
Confliction, Fuzzy Likelihood, Combination Formula |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
TESTING SYSTEM OF THERMAL INSULATION PERFORMANCE ON VACUUM GLAZING |
Author: |
ZHIJUN ZHANG, SHIWEI ZHANG, ZHUO WANG, TIANYI SU |
Abstract: |
This paper shows a special test system, and it is applied to thermal performance
study of vacuum glazing. Firstly, the heat box device are defined and realized.
Secondly, the control and text strategy of temperature, voltage, current, power,
electrical energy are described in detail. Thirdly, the soft system sketch and
principle are shown. Experimental results demonstrate that the proposed scheme
satisfies the requirement for insulation thermal performance of vacuum glazing
testing with high accuracy parameter value gotten. The proposed scheme has been
used in evaluating the insulation performance of vacuum glazing. |
Keywords: |
Computer Test system, Insulation Thermal Performance, Vacuum Glazing |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
OBSERVE-BASED DIRECT YAW-MOMENT H∞ CONTROL FOR IN-WHEEL-MOTORED ELECTRIC VEHICLE |
Author: |
ZHIYONG ZHANG, ZHIQIANG LIU, XIN LIU, CAIXIA HUANG |
Abstract: |
This paper presented a new method for four wheel in-wheel-motored electric
vehicle to improve handling and stability with the help of sideslip angle
observer and braking force distribution. The first part of this study deals with
the full description of the basic theory of vehicle dynamic control system.
After that four wheels in-wheel-motored electric vehicle dynamics model, as well
as desired dynamic response model were built. Furthermore, direct yaw-moment
control (DYC) system, as well as sideslip angle observer and braking force
distribution, were also presented. Therein, an observe-based direct yaw-moment
H∞ feedback control loop was employed to track the desired dynamic response via
braking force distribution between four in-wheel motors. Finally, the open-loop
and closed-loop simulation for validation were performed. The results verified
that, the proposed vehicle dynamic control system can improve vehicle handling
and stability significantly. |
Keywords: |
Electric Vehicle, Four Wheel Drive, In-Wheel Motor, Direct Yaw-moment Control (DYC),
Braking Force Distribution |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
ALGORITHM FOR REDUNDANT NODES DEPLOYMENT OF GREENHOUSE WSN MONITORING AND
CONTROL SYSTEM |
Author: |
ZHANG LEI |
Abstract: |
Specific to the funneling effect of Greenhouse wireless sensor networks (WSN)
monitoring and control system, redundant nodes deployment algorithm (RNDA) is
proposed. RNDA deploys a certain number of redundant nodes based on load of
nodes so as to balance energy consumption of network. By means of introducing
the next-hop routing probability of node into graph theory as the weight, the
probability theorem that source node data arrive at the destination node after
making m hop(s), thus providing an effective for researching network data
transmission. Theoretical analysis and simulation result show that while
remarkably extending network life, RNDA can also effectively balance energy
consumption of network nodes. |
Keywords: |
Wireless Sensor Networks (WSN), Greenhouse Monitoring And Control System,
Redundant Nodes Deploy, Funneling Effect, Graph Theory |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
ADAPTIVE NEURAL NETWORK DECENTRALIZED CONTROL FOR LARGE SCALE SYSTEM WITH INPUT
SATURATION |
Author: |
YUQING MAO |
Abstract: |
A new method of adaptive neural network decentralized control is designed for a
relevant large scale system with input saturation, it is not necessary for this
method to assume that relevant items satisfy the function upper bound of high
order or low order, cancel the constraint condition for known upper bound of the
unknown continuous function and controlled gain of the system. It is not
necessary to handle controlled gain with unknown directions by virtue of Nussbum
function, only using a neural network can simultaneously approximate unknown
function, unknown gains, and unknown relevant items. It can be known by using
the Lyapunov theoretical analysis that the designed method can guarantee the
control system to obtain overall situation stability, simulation results display
that the control method is valid and feasible. |
Keywords: |
Neural Network; Input Saturation; Decentralized Control; Global Stability; Large
Scale System |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
MULTI-ATTRIBUTE REVERSE AUCTION-BASED PROTOCOL FOR RESOURCE ALLOCATION IN GRIDS |
Author: |
LI-LI DING, WANG-LIN KANG, ZHENG-WEI WANG |
Abstract: |
Auction models are found efficient in managing resources allocation, which is a
key technology in grid computing system. In this paper, a new reverse auction
approach is proposed, and its mechanism and related auction algorithm are
designed. In our approach, the grid trading service, i.e., an intelligent
entity, uses this auction algorithm to estimate the resource user’s satisfaction
degree and help the resource providers to update their multi-attribute bidding
strategies in the next round. Numerical simulating experiments show that our
model can satisfy a resource user’s quality demand on multiple attributes, and
have better performance in user utility. The results also illustrate that
revealing the resource user's preferences increases allocated efficiency. |
Keywords: |
Grid, Auction, Multi-attribute, Algorithm, Grid Resource Provider |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
QUANTITATIVE ANALYSIS ON INNOVATION INVESTMENT BASED ON GAME THEORY |
Author: |
WENGUO ZHANG, WEI XU, XINFENG ZOU |
Abstract: |
This paper focus on the issues on dynamic game of investment on new technology
research and development in double-oligarchy monopoly market, attempting to
reveal the internal mechanism of different enterprises in the research and
development of new technologies. Assume that the market is of rigid demand and
the demand quantity remains constant relatively. The result of research and
development of new technologies manifests as reduction of enterprises’
production cost. Two oligarchy enterprises play a price game without information
sharing according to the research and development result to determine the
optimal price and profit function, create the dynamic game model of investment
on research and development of new technologies in double-oligarchy monopoly
market, obtain the optimal price and income under the three conditions of
research and development and follow-up research and development of two
enterprises, research and development of single enterprise and no research and
development for the two enterprises, conclude the range of sensitivity of
enterprise research and development decision making to parameters such research
and development investment amount, success probability and cost reduction and
finally expand the model to the conditions of enterprises to prove that during
research and development, enterprises should take into account of the market
capacity to avoid excessive input in a market with saturated innovative
enterprises. |
Keywords: |
Technical Innovation, R&D Investment, Double- oligarchy Monopoly |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
STUDY IN THE ROUTING ALGORITHM IMPROVEMENT ON MULTI-CHANNEL MULTI-HOP WIRELESS
SENSOR NETWORK |
Author: |
WEI HUANG, HUAJUN WANG, GQIAN ZOU |
Abstract: |
This paper analyzes the characteristics of Wireless sensor networks through the
history of the development of wireless sensor networks. We propose a new
wireless sensor network nodes algorithm based on the study of Wireless sensor
network routing mechanism and the transmission model .This algorithm improves
the protocol performance, reduces the network communication cost and optimizes
the transmission link by choosing the best path of transmission. Experiment
results show that the algorithm is able to find the shortest path in the
real-time in the dynamic network environment, and the stability of the wireless
transmission is enhanced. |
Keywords: |
Sensor Networks, Routing Algorithm, Nodes, Transmission Model, Protocol Stack |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH OF MOVING TARGET DECTION TECHNOLOGY IN INTELLIGENT VIDEO SURVEILLANCE
SYSTEM |
Author: |
LI MENGXIN, FAN JINGJING, ZHANG YING, LU YEHUI, SU GAOLING |
Abstract: |
Moving object detection is one of the most challenging tasks in intelligent
video surveillance system. It aims to detect targets with a camera instead of
human eyes and assist people to complete monitoring and control tasks. Moving
target detection, classification, tracking, behavior understanding and
description are included in intelligent video surveillance, but moving target
detection is the key step. In this paper, according to the background is static
or dynamic, the existing major moving target detection algorithms are divided
into two categories. A detailed introduction is presented. Some methods such as
frame subtraction, background subtraction and optical flow method are included
in static background. Furthermore, other algorithms are also presented in
dynamic scene, and finally the prospects of moving target detection are
reviewed. |
Keywords: |
Moving Object Detection, Intelligent Video Surveillance, Static, Dynamic,
Prospects |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE FUNDAMENTAL OPERATION ON CONNECTION NUMBER AND ITS APPLICATIONS |
Author: |
CHUNFENG LIU, LING ZHANG,AIMIN YANG |
Abstract: |
In this paper, we introduced the basic knowledge of set pair analysis at the
first place. Then we defined the general form of basic operations and the
properties of connection number, in the end we give the corresponding
application examples. The concepts and methods of the operations are the basis
points of this paper. The ccomposition operation that put forward in this
article makes the results that we need more realistic and it more detailed and
more reasonable when describe a problem.The operations also broaden the
application scope of connection number and enrich the connection number theory
of set pair analysis. The mathematical meaning is clear and the method is simple
of this operation, it is easy to learn and use .This research also provides the
computational basis for the next studies, it has a certain theoretical and
practical significance. |
Keywords: |
Connection Number, Set Pair Analysis, Fundamental Operations, Compositional
Operations |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS AND APPLICATION OF RIGID BODY DYNAMICS THEORY IN BILLIARDS SPORT |
Author: |
JIANFENG WU, LIN GUO |
Abstract: |
This article conducts mechanical analysis of billiards and studies its motion
laws. For convenience, only situations as the ball arm bats the billiards in the
horizontal direction are considered. Besides, collision between one billiard
ball and another or between a ball and the “KEXING” is assumed to be elastic.
The following cases are quantitatively analyzed based on the rigid body dynamics
theory: the “Safety zone” to prevent the slider and rod drop when the ball arm
hits the cur ball; the principle and function of fixed rod ball, push rod ball,
tie rod ball and side spinning ball; the relative motion between the white
billiard and the mesa; the Kinematic relation when the white billiard collides
with the aim billiard; the Kinematic relation when the white billiard collides
with the “KEXING”. By analyzing the dynamic characteristics of billiards sport,
this article provides guidance for players with a scientific batting and helps
to correct the misunderstanding in billiards theory. Except for providing
theoretical material for this popular indoor recreation project, this study can
also offer a mathematical model of billiards for the future designers and
developers of billiards games to make it closer to the real motion. |
Keywords: |
Safety Zone, Conservation of Momentum, Elastic Collision, Sliding Friction |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE CLASSIFICATION OF IRREGULAR CLUSTERS: AN IMPROVED SEMI-SUPERVISED CLUSTERING
ALGORITHM |
Author: |
MA CHI, GAO XUEDONG, ZHANG CHUNNA, LI YIRAN |
Abstract: |
This paper proposed a improved semi-supervised clustering algorithm, aiming at
the limitations of the traditional k-means algorithm in the irregular clusters
division. This paper mainly discusses two problems: the closure replacement and
the traction between data points. First of all, made use of the closure center
to replace the original sample point, and to calculated the sample clustering
center combining the semi-supervised clustering ideology with a small amount of
the tagged data; next, in the process of clustering is introduced into the
definition about the traction distance of the clustering center and the traction
between the data points, given a complete description of the relationship
between data points; finally, fully consider the effect about the tagged data
points, especially isolated point, on untagged data point, implement clustering
data in the sample space. Experimental results indicate that the cluster is much
more efficient than the other existing algorithms when dealing with the
irregular cluster. |
Keywords: |
Semi-supervised clustering, K-means algorithm, Closure Center, Irregular cluster |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE STUDY OF INNOVATIVE ENTERPRISE EVALUATION INDEX SYSTEM AND SOFTWARE |
Author: |
SHUJUAN YUAN, JINGFEI CHEN |
Abstract: |
On the basis of the national innovative enterprise’s evaluation index system,
this paper established a new innovative enterprise evaluation indicator system;
furthermore, it puts forward the evaluation method. It includes four aspects:
the innovation input, the achievement transformation, digestion and absorption
of imported technology, and innovative carrier construction. By applying the
analytic hierarchy method, it obtained Enterprise Evaluation weight coefficients
of the index system. The research of the innovative enterprise evaluation
indicator system result has been carried out by applying the BP Neural Network
Model. By using of VB programming language and access database, it realized the
trend prediction of innovative enterprise evaluation and result evaluation. The
software of innovative enterprise evaluation has the functions of good
interface, easy operation, comprehensive information and resource sharing. |
Keywords: |
Innovative Enterprise,Index System, the BP Neural Network Model,Evaluation
Software |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE CONSTRUCTION OF PERFOMANCE APPRRAISAL PATTERN FOR COLLEGE PE TEACHERS BASED
ON AHP |
Author: |
ZHENYU TANG, WEI YANG |
Abstract: |
There’re certain deficiencies in the existing studies on performance appraisal
pattern for college PE teachers, which are embodied in the following: the
indicators of performance appraisal lack pertinence; the quantitative studies on
the indicators of performance appraisal are insufficient; the results of the
appraisal are short of necessary feedback and reasonable application. This paper
conducts research on performance appraisal pattern for college PE teachers. The
result reveals that three dimensions and ten specific indicators are included in
the performance appraisal pattern for college PE teachers, which are: teachers’
demonstrating performance, including four items: industriousness and dedication,
professional ethics, model standard as well as working attitude; teaching
ability performance, containing: teaching efficiency, professional competence
and management ability; teaching improvement performance, consisting of:
learning ability, teaching and research achievement and communication and
cooperation. Meanwhile, according to the practical application, AHP is used for
weight calculation of all the indicators in the pattern. The pattern overcomes
the problems that exist in other approaches like excessive subjectivity, obscure
boundary between qualitative index and quantitative index, and chaotic weight. |
Keywords: |
PE, Teachers, Performance, Pattern |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
STUDY OF CONVEX QUADRATIC BILEVEL PROGRAMMING PROBLEM ORTHOGONAL GENETIC
ALGORITHM |
Author: |
XIAOYUN YUE, GUANCHEN ZHOU, JINFENG LV |
Abstract: |
This paper introduces the research status of convex quadratic bilevel
programming at present firstly. Secondly, it analyzes the problem of convex
quadratic bilevel programming models, concepts and properties. On this basis,
using the optimality conditions of KKT, the problem will be transformed into a
single complementary slackness relaxation problem. To solve this problem, we
propose an orthogonal genetic algorithm by the KKT multipliers for the
introduction of 0-1 binary encoding. The paper in the wood orthogonal genetic
algorithm designs of hybrid operators to increase the factor analysis. We carry
out algorithm convergence analysis and numerical experiments. Finally, Numerical
results show that the proposed orthogonal genetic algorithm is effective and
reasonable by giving a example. |
Keywords: |
Convex Quadratic Bilevel Programming, Orthogonal Genetic Algorithm, KKT
Conditions, Global Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN ENVIRONMENT FOR MODELING AND TESTING STOCHASTIC SYSTEMS |
Author: |
MOKDAD AROUS, KENZA BOUAROUDJ, DJAMEL-EDDINE SAÏDOUNI |
Abstract: |
This paper addresses a formal testing based on Stochastic Refusals Graphs (SRG)
in order to test stochastic systems. As a semantic model for these systems, we
chose the MLSTS models. MLSTS (for Maximality-based Labeled Stochastic
Transition System) is a new semantic model for characterizing the stochastic
temporal properties of concurrent systems, under the assumption of arbitrarily
distributed (i.e. non-Markovian) durations of actions [14]. MLSTS can be easily
described by using a Stochastic Process Algebra (SPA) language, namely S-LOTOS
[15]. So, a method for testing stochastic system modeled by MLSTS is proposed
[23]. We present here a tool for Modeling and testing Stochastic Systems, called
MoVeS, which allows generating automatically MLSTS models from S-LOTOS
specifications, then constructing automatically Refusal Graphs and Canonical
Tester. |
Keywords: |
Basic-LOTOS, Maximality Semantics, Semantic Models, Labeled Stochastic
Transition System, Refusal Graph, Canonical Tester. |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
STUDY ON GRADUATE SECOND-ROUND EXAMINATION EVALUATION SYSTEM BASED ON AHP FUZZY
COMPREHENSIVE EVALUATION |
Author: |
HUILAN LI, LEI ZHOU, CHUNLING SUN, JIANHUI WU, YU SU |
Abstract: |
In order to evaluate the graduates attending second-round examination
objectively, this study established graduate second-round examination evaluate
system based on Analytic Hierarchy Process (AHP) and Fuzzy comprehensive
evaluation method. Evaluation indexes in the system included knowledge
structure, scientific research ability and comprehensive quality of graduates
attending second-round examination. At first, AHP was used to determine the
weight of each index in the evaluation system and calculated the combination
weight of measure indexes. And then according to the amount of index weight and
expert’s evaluation scores. Fuzzy comprehensive evaluation method was used to
evaluate graduates attending second-round examination. Owing to qualitative
indexes quantified in the evaluation, evaluation results reflected graduates’
real level more objectively and reasonably. Graduate second-round examination
evaluation system provided theoretical basis for graduate second-round
examination reform in local colleges and universities. |
Keywords: |
Analytic Hierarchy Process, Fuzzy Comprehensive Evaluation, Graduate,
Second-Round Examination, Evaluation System |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
A SELF-ADAPTIVE DIGITAL WATERMARKING ALGORITHM BASED ON WAVELET TRANSFORM |
Author: |
ZHANG CHUN NA, ZHU YONG YONG, MA CHI,1LI YI RAN |
Abstract: |
This paper proposed a digital watermarking algorithm based on discrete wavelet
transform (DWT), which can achieve the purpose of embedding hidden watermarks by
decompose three-level wavelet of image and decompose bit-plane of watermarking
gray scale image by Arnold scrambling transformation. Layer adaptive threshold
and quantizer were referenced in this algorithm, and which adaptive selected
coefficient of detail subbands of embedded watermarking to improve the
robustness of the watermarking. In testing of semi-blind watermarking, renewing
of watermarking based on the embedding sequence of point locations and the
quantizer sequence without participation of the original image. Experimental
results show that the algorithm is effective to improve the robustness of the
cut, adding noise, filtering, and compression image attack treatment. |
Keywords: |
Digital Watermarking, DWT, Arnold Scrambling Transformation, Bit Plan
Decomposition |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON POLYMER SENSITIZING PACKAGE METHOD OF INTELLIGENT CLOTHING FIBER
GRATING |
Author: |
LIQING WANG, CHANGYUN MIAO |
Abstract: |
This thesis studies the polymer Sensitizing package method of intelligent
clothing fiber grating, analyze the performance of fiber grating sensor,
respectively adopt capillary tubing package method on light grating , improved
A1 box package method of fiber grating, aluminum groove package method of fiber
grating, compare the advantages and disadvantages of each method, put forward
polymer package method, of fiber grating, through the experiments of polymer
package and the analysis of results, verify the fiber grating sensors used
polymer package have a higher temperature sensitivity than naked fiber grating,
and also more superior linearity and higher application value. |
Keywords: |
Intelligent Clothing(IC), Fiber Grating (FG), Sensitizing Package (SP) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
DESIGN AND EVALUATION OF TOURIST ROUTES |
Author: |
YANMEI YANG, JIANYONG DI, QIUMEI LIU |
Abstract: |
Design traveling route for tourist is a challenging problem. According to the
actual scenic spots, the mathematical model of the traveling routes was
established. In order to get the best attractions which we want to choose, the
complex decisions are analyzed by method of analytic hierarchy process. And four
relative important aspects of the objectives are compared including culture and
history, beautiful scenery, traffic and flowing rate of visitors. After the
decisions of scenic spots, then the graph model of tourist routes are
established. Optimized traveling route are proposed by studying traveling
salesman problem. And applying dynamic programming algorithm of TSP, the
optimized route are obtain. The route can be reach each scenic spot exactly once
and returns to the origin after finishing the travel, and this method can be
used in other traveling maps easily. |
Keywords: |
Optimal Route, Analytic Hierarchy Process, TSP, Dynamic Programming Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE RESEARCH ON CHAIN POST LOGISTICS’ SUPPLY CHAIN EXECUTION SYSTEM |
Author: |
XU WEI, CHONGYANG SHI, HANTAO SHI |
Abstract: |
Supply Chain Execution System (SCES), like the supply chain planning system, is
also a key part of supply chain system, Supply Chain Execution System, together
with the Supply Chain Planning System; make up the Supply Chain System. Supply
Chain Execution System is also an operation plan, control and optimization
system in the logistics level in the eye of the whole part of the execution
system. The paper explored the China Post Logistics’ Supply Chain Execution
System systematically on the base of discussing the relevant knowledge of Supply
Chain Execution System, and summed up the four characteristics of Chain Post
Logistics Supply Chain Execution System. The discussion of China Post Logistics’
Supply Chain Execution System has a certain reference not only to China Post
Logistics but also to other logistics enterprises’ constructions of theirs
Supply Chain Execution System. |
Keywords: |
China Post Logistics, Supply Chain Execution System, Supply Chain Planning
System, Enterprise Resource Planning, Customer Relationship Management |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE ANALYSIS OF EMOTIONAL RESPONSES EVOKED BY CLOTHING STYLING |
Author: |
JIA LÜ, DONGSHENG CHEN |
Abstract: |
The present paper demonstrated the different emotional responses between males
and females triggered by sportswear styling, using SAM model and ERPs instrument
to examine the interactions of human psychological emotions and their brainwave
changes which indicate physiological activity of the central nervous system. The
main purpose of this paper was to use brain imaging technology to recognize the
differences of “inner” emotions between males and females from brain wave
signals, and to examine the interactions of human’s psychological emotion
dimensions and psychophysiological responses. Results indicated that males and
females had similarity and inconsistency for the emotional response of different
styling of clothing. The advantage over traditional methods of measuring emotion
evoked by clothing, like self-reports is that they leave out the psychological
and physiological biases of Emotions. The study’s findings should provide
valuable information and reference to fashion designers, consumers and clothing
manufacturers for future product design and development. |
Keywords: |
Human-computer interaction; Emotional fashion design; Emotion dimension;
Event-related potentials (ERPs) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
REVIEW OF FIRE DETECTION TECHNOLOGIES BASED ON VIDEO IMAGE |
Author: |
MENGXIN LI, WEIJING XU, KE XU, JINGJING FAN, DINGDING HOU |
Abstract: |
Because of high fire frequency and huge damage, the early fire detection is
becoming more and more important. Due to the rapid development of image
processing technology, video image in the application of detection technology
has become more and more widely. Video based fire detection technology is
becoming the focal point of research with its advantages of high intuitive,
speed and anti-jamming capability. This paper reviewed the fire detection
methods based on video images in recent years. Through the review, it is clear
to see that video based fire detection technology can be divided into two main
areas: the characteristics detection of flame and smoke. This fire detection
method can improve the accuracy of the fire alarm, real-time and robustness. If
the optimal algorithms can be adopted for each part of detecting motion area and
extracting fire characteristics, the system performance will be further
improved. |
Keywords: |
Video Image; Video Based Fire Detection; Flame Detection Methods; Smoke
Detection Methods |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON MULTI-RELATIONAL CLUSTERING PROBLEMS BASED ON PROPER-LINK |
Author: |
YAN YAN, AIMIN YANG, YUANYUAN CAI |
Abstract: |
A relational database contains a wealth of information, and multi-relational
clustering can be obtained by adopting proper-link. The similarities between
prospers and linked calculation target topples can be worked out through
searching for relevant multi-relational prospers and links of user clustering
target, then the clustering can be completed by selecting CLARANS. In order to
promote the efficiency of multi-relational data clustering algorithm, two-stage
multi-relational data clustering algorithm is proposed. The method of fuzzy
clustering is used to divide the area by the similar feature of load increasing.
The new division is promising to improve the result of evident degree of
clustering index to power load, the weighted demarcating method is inducted. |
Keywords: |
Data Mining, Multi-relational Clustering, Proper-link Clustering |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE RESEARCH ON REFORM OF COLLEGE ADMISSION SYSTEM |
Author: |
ZHAOTONG WU, LIPING FU, YIFANG LIU |
Abstract: |
This article brings out the improved thought of college admission system reform
based on parallel will:College Admission Mode of Multiple Choices Based on
Internet,CAMMCBI。We use the absorbing Markov analysis method to establish the
student scores and college level sequence model of absorbing Markov chain,
analysis CAMMC BI admission mechanism problem from the angle of dynamic. Reform
of College Admission System is the key of Reform in college Entrance
Examination. The standards of adjusting the reasonableness of admission
system:The fairness of admission way、The examinee satisfaction and Information
transparency between the examinees and the colleges. College entrance system is
improved because of entrance examination reform at the same time. |
Keywords: |
College Admission System, Reform, College Admission Mode of Multiple Choices
Based on Internet |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
FUZZY RANDOM CHANCE-CONSTRAINED PROGRAMMING BASED APPROACH TO
ACTIVE-POWER-OUTPUT CALCULATION FOR WIND POWER FARMS |
Author: |
NING CHEN |
Abstract: |
Based on the fuzzy random chance-constrained programming(FRC) theory, the paper
presents a method to calculate active-power-output of large-scale wind power
farms connected to power grid. The calculation of active-power-output can be
turned into a FRC programming problem which constrained conditions. This paper
put forward a mathematical model of calculate active power in wind power
integrated system based on FRC programming form. These include ramp constrains
of the generating units, output restricted zone, line transmission capacity,
reserved capacity constraints, the balance of load, and so on. The question is
solved by particle swarm optimization based fuzzy simulations. The results on
IEEE30 system demonstrate the advantages of the proposed approach. |
Keywords: |
Particle Swarm Optimization; Fuzzy Random Chance-Constrained Programming;
Active-Power-Output; Large-Scale Wind Power Farms; Power Grid |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
BASED ON THE COLLEGE PHYSICAL EDUCATION OF COMPREHENSIVE EVALUATION OF
MATHEMATICAL MODELS |
Author: |
HUI LIU, WEILONG XU |
Abstract: |
There are deficiencies and problems in the traditional physical education
evaluation system. The evaluation system is used in a single evaluation. At
present, social vigorously require quality education. But The past evaluation
system does not reflect the quality of education objectives and requirements. In
this paper, combined with the law of the higher physical education, we construct
more scientific evaluation model. This paper put the quality of education and
the quality of teaching as the starting point, which consist of our paper’s two
research module. On the one hand, the paper uses the analytic hierarchy process
and fuzzy mathematical theory to build sports quality education evaluation
model; on the other hand, we construct multiple sports teaching evaluation
system. |
Keywords: |
AHP, Fuzzy Mathematics, Quality Education, Sport |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE STUDY OF IMPLICIT LEARNING FOOTBALL SKILLS BASED ON GENETIC ALGORITHM AND
ITS APPLICATION |
Author: |
GUANGXIN LI |
Abstract: |
It usually occurs that in important matches, athletes often play abnormal of
their sport technique as they are too concerned about the competition result,
and this is called Choking phenomenon. How to explain and control this from the
perspective of the present psychology has become a widely discussed hot issue in
the field of sports psychology. By research on the occurrence conditions of
athletes’ Choking, this article builds a regression model of the problem, with
athletes’ Choking index as dependent variable and competition trait anxiety,
personal self-awareness, positive and avoidant response and public
self-awareness as independent variable. By means of utilizing adaptive value
function of genetic algorithm, conduct mental regulation to athletes based on
implicit learning and examine the result of excitation. Finally, conduct data
analysis of football players’ competition status. Data analog and results
analysis demonstrate the influencing factor of these data variables on the
Choking phenomenon and contribute to the control of athletes’ errors effectively
as well. |
Keywords: |
Football, Choking Phenomenon, Implicit Learning, Genetic Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
IRREVERSIBLE EMERGENCY MATERIAL ALLOCATION MODEL WITH DISASTER INFORMATION
UPDATE |
Author: |
GE HONGLEI, LIU NAN |
Abstract: |
As the allocation of emergency materials in emergency response stage is an
irreversible decision and the disaster information is continuously observed and
updated, this paper brings the determination of decision-making time and the
formulation of decision scheme into a systematic framework, builds the Bayes
sequential decision model for the multiple rescue points selection problem, thus
making the total loss of the affected point be the minimum and the response time
be the shortest. Through simulation, this paper analyzes the relation among
relevant parameters including prior mean value of disaster information, prior
standard deviation of disaster information, observation standard deviation of
disaster information, maximum observation frequency and total expected decision
loss. |
Keywords: |
Allocation Of Emergency Material; Rescue Point Selection;
Disaster Information Uptade; Irreversible Decision; Bayes Sequential Decision |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
DESIGN OF A TEMPERATURE MONITORING AND ALARM SYSTEM BASED ON CAN BUS |
Author: |
MA JIWEI, ZHANG LIHONG, MA JIMEI, LIN ZHIPENG, LUN CUIFEN |
Abstract: |
A portable instrument of multi-channel temperature tour measurement and control
in which a high-speed single-chip of 51-series is taken as the core and
single-wire digital temperature sensors are used is designed, and CAN bus
controller is also extended in it. It is proved that it has low power
consumption, high cost performance, high stability and reliability; and flexible
monitoring and control terminals are provided for large-scale temperature
measurement and control local area network by the extension of communication
interface. |
Keywords: |
Multi-Channel Temperature, STC15F2K60S2, Measurement And Control, CAN Bus, Low
Power Consumption |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NOVEL WIRELESS NETWORK BASED MOBILE E-BUISINESS GENERAL ARCHITECTURE |
Author: |
FU ZHENGQIANG, WANG HAIRUI, WANG JIANYING, LI YA |
Abstract: |
The upcoming mobile and ubiquitous computing world will need new forms of
information sharing and services collaboration between mobile devices, thus to
support mobile commerce applications. In this paper, an general mobile business
architecture(GMBA: General Mobile Business Architecture) was presented, which
can be used in hybrid network environment with wireless network for GMBA.
General mobile business architecture relies on wireless peer-to-peer
communication model to provide mobile business services. More than 6 major main
blocks of the GMBA are defined and the responsibility of each of them is
described. In order to illustrate the validation of proposed GMBA, a mobile
commerce services application based on GMBA was created, which contains several
main blocks of GMBA to perform a particular task promotion mobile service for
store vendors among wireless device holders in an reasonable moving area with
mutual one-hop radio reachable distance. |
Keywords: |
E_business, Application architecture, Wireless network |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
DESIGN AND REALIZATION OF VEHICLE INTELLIGENT MANAGEMENT SYSTEM |
Author: |
XUEHUA JIANG |
Abstract: |
With the development of economy, car ownership was increasing, traffic and
vehicle management have more and more pressure. In order to realize intelligent
management for vehicle conveniently and effectively, the vehicle safety
management system based on RFID technology was studied. The RFID technology was
introduced, the design principles and the system function were analyzed, and the
overall structure was brought forward. According to system function, the system
was divided into three major components, the PLC communications control and RFID
reader communication were implemented and the procedures of vehicle access
management was analyzed, and realized. The vehicle management system was not
only easy to use, but also saved manpower resources significantly, and achieved
the intelligent management of vehicle. The system had good application value in
vehicle management of residential, parking and other vehicle management. |
Keywords: |
Vehicle Management, Intelligent Management, FRID, Electronic Tag |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON ENGINEERING MACHINERY FAULT DIAGNOSIS BASED ON NEURAL NETWORK |
Author: |
PEIJIANG CHEN |
Abstract: |
Because of the product variety and structure complexity of the engineering
machinery, it was difficult to meet the requirements of fault detection and
maintenance for the traditional diagnosis technologies. In order to improve the
diagnostic level, the intelligent control technology of neural network and its
application in engineering machinery fault diagnosis were studied. The basic
concepts of engineering machinery fault diagnosis were introduced and several
commonly used fault diagnosis methods were discussed. On the basis of analyzing
the model and algorithm of BP neural network, a fault diagnosis system of
roller’s electrical system was designed and implemented based on neural network.
The experimental result showed that the sample output corresponded to the
expected output, it was reliable and the requirement of fault diagnosis was
achieved. The system had certain practical value in realizing intelligent fault
diagnosis for engineering machinery. |
Keywords: |
Engineering Machinery, Fault Diagnosis, Neural Network, BP Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
A RESEARCH OF FACE SUPER-RESOLUTION TECHNOLOGY IN LOW-QUALITY ENVIRONMENT |
Author: |
YONGJUN PENG, JIAN HE, JUN SUN |
Abstract: |
In recent years, with the extensive application of video surveillance system in
police’s criminal investigation, video investigation technology is playing a
more and more important role in detection of cases. Key characters in case
spots, such as criminal suspects and witnesses are often targets that attract
most attentions. Therefore, face image become the key clue of a case. While in
actual surveillance, due to distance and limitation of equipment, definition of
most face images is of low-quality. Face super-resolution technology can make
use of information in face sample database to restore high definition face
image, which can effectively enhance definition of face images in surveillance
video and restore detail information of face features. This technology is
extremely important to improve the clarity of face image, increase accuracy of
face recognition, and thus increasing the police’s ratio of solving cases. In
this thesis, the author introduces shape semantics model and posterior image
information into the frontier global face and partial face super-resolution
approach, and put forward the corresponding algorithm, which can not only
increase the robustness of single mode face super-resolution algorithm, but also
can be used for reference for other image processing technology that research
robustness. Simultaneously, this thesis extend the approach based on shape
semantics model and posterior image information to multi mode face
super-resolution, which increases the robustness of multi mode face
super-resolution, and provides train of thought for applications of the approach
put forward. |
Keywords: |
Face Super-Resolution, Shape Model, Multi-Mode, Video Surveillance |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON MUSIC EDUCATION PERFORMANCE EVALUATION BASED ON BP NEURAL NETWORK |
Author: |
WANG YANG |
Abstract: |
Implementing music education performance management is an effective way to
enhance the comprehensive quality education for universities, and music
education performance evaluating for universities is one of the difficulties and
hot research fields for the researchers related. The paper presents a new model
for evaluating music education performance based on improved BP neural network.
First an evaluation indicator system of music education performance is designed
through analyzing the characteristics of learners’ behavior with more details;
Second, aiming at the shortages of the existing BP neural network algorithm of
data-mining for evaluating music education performance, immune genetic algorithm
is used to correct BP neural network to speed up the convergence and simplify
the structure and to improve evaluating accuracy of the original BP model.
Finally the experimental results verify that the new algorithm can guarantee the
effectiveness and validity of performance evaluation for music education of
different universities in its engineering application. |
Keywords: |
Comprehensive Quality Education (CQE), Music Education Performance Management (MEPM),
BP Neural Network (BPNN), Immune Genetic (IG) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF WIRELESS SENSOR NETWORK MANAGEMENT SYSTEM BASED ON
WEBGIS |
Author: |
LIU HAIBO, ZHANG FANG |
Abstract: |
With the rapid development of wireless sensor network (WSN), how to effectively
and conveniently manage the WSN has become an urgent problem. According to the
actual requirement of WSN management, the WSN management system based on WebGIS
is designed and implemented. Many functions are designed for the system, such as
monitoring scheme management and monitoring, monitoring data collection and
analysis, real-time display of scanning data with graph and table, visual
management of WSN based on WebGIS and so on. The system can monitor, collect and
analyze real-time monitoring data, and it can also modify and send monitoring
command in monitoring process. These successfully guarantee the system’s
real-time visual management and environmental adaptability. The system is
developed by B/S mode and JavaServer Faces framework. OpenLayers is used to
finish the WebGIS client. PostgreSQL acts as database service. These ensure the
platform independence, extensibility, security and reliability of the system.
The effective and convenient management of WSN is realized. |
Keywords: |
Wireless Sensor Network, Management System, WebGIS, OpenLayers, PostgreSQL |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON UNDERGROUND TUNNEL EMERGENCY ROUTE GENERATING ALGORITHM |
Author: |
MI HONGYAN, XIAOLING |
Abstract: |
This paper researches the emergency route generating algorithm based on the mine
data. This algorithm considers the factors such as the slope and the like and
realizes the rejection of adverse factors such as the shaft by setting
corresponding threshold value, so as to ensure that the finally generated route
has more obvious effectiveness. |
Keywords: |
Digital Mine(DM), The Real-Time Solution Of Emergency Route(TRTSOER) , Dijkstra
Algorithm(DA) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON THE MANAGEMENT OF LARGE –SCALE TERRAIN DATE |
Author: |
MI HONGYAN, GENG XIAOYUN |
Abstract: |
In order to realize the independence of platform to the maximum degree and for
the convenience of compatibility with Geodatabase, this paper uses independent
form in the object design, which means that it defines by universal data type
instead of depending on the data type related to the database. It can develop
its own data management software by such design, and it is also very easy to
realize the butt joint with an existing database. It provides an effective
modeling method for the management of large-scale terrain data. |
Keywords: |
Large-Scale Terrain Data(LTD),Digital Elevation Model(DEM),TIN Model(TM) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NEURAL NETWORK FILTER TO ESTIMATE THE DOA OF SMALL TARGETS |
Author: |
LUO YANLING |
Abstract: |
Support vector machines (SVMs) are a set of related supervised learning methods
used for classification and regression. In this paper, this method is applied
into the oil-spills detection task in net radar which is a hot topic recently.
It can achieve better detection performance than conventional phased radar. In
this paper, the net radar signal model is studied. And then, the SVM is employed
to detect oil spill in sea. At last, conclusion is drawn, in addition, some item
for future research in presented. |
Keywords: |
Support Vector Machine, Signal Processing, Target Detection, Oil Spill |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
A METHOD FOR FINGERPRINT MATCHING USING INVARIANT MOMENT |
Author: |
DONGFENG XU, YAN CHEN |
Abstract: |
A method for fingerprint matching using invariant moment featuresis proposed.
The fingerprint image is first preprocessed to enhance the original image by the
Short Time Fourier Transform (STFT) analysis. Then, a set of seven invariant
moment features is extracted to represent the fingerprint image from a cirque of
Interest (COI) based on the reference point of the enhanced fingerprint image.
The reference point is determined by the complex filters method. Finally, a Back
Propagation Neural Network (BPNN) (moment of inertia) is trained with the
features for matching. Experimental results show the proposed method has better
performance with higher accuracy and faster speed comparing to the traditional
Gabor feature-based fingerCode method. |
Keywords: |
Biometrics, Fingerprints, Back Propagation Neural Network (BPNN), Short Time
Fourier Transform (STFT),cirque of Interest (COI), |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
DESIGN THE LAYING SCHEME OF PHOTOVOLTAIC CELL ON SOLAR CABIN SURFACE BASED ON
MULTIOBJECTIVE PROGRAMMING MODEL AND HEURISTIC ALGORITHM |
Author: |
WANG QIJI |
Abstract: |
The main method to improve the invest benefit of photovoltaic electricity
generation system on solar cabin surface is to increase the electricity
generation capacity and decrease the building cost. To get the largest total
electricity generation of cabin and the least unit electricity generation cost
as the goal, the paper sets up a multi-objective programming model. Due to the
limited conditions, complex constraint function, large solution space dimension,
it is difficult to get the analytic solution. The time-consuming of traditional
recursive algorithm is growing in exponential series with recursion depth, which
is hard to find the optimal solution in the effective time. To solve this
problem, the paper is inspired by "selection index", uses heuristic algorithm,
fully considers the optimization target in the process of selection and
arrangement, and finally get the optimization solution including the factors of
total electricity generation, cost, and benefit and so on in a short time. A
laying scheme of photovoltaic cell on solar cabin surface that meets the
preconcerted target is obtained, and an experiment with true data shows that it
is correct. |
Keywords: |
Multi-Objective Programming Model, Heuristic Algorithm, Solar Cabin, The Laying
Of Photovoltaic Cell, Optimize |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
A USER EXPERIENCE-BASED PROCESS RESOURCES SHARING MANAGEMENT MECHANISM IN THE
CLOUD |
Author: |
BINGCAI LV, SHIDONG ZHANG, YULIANG SHI |
Abstract: |
Multi-tenant sharing model is the way to maximize the economic benefit of the
resources in the cloud. However, the higher the sharing scales of the nodes, the
heavier the load they bore, thus decreasing tenants’ user experience. In this
paper, we proposed a Pub/Sub-based multi-tenant process resource management
framework, which appropriately defusing the peak-load situation and minimizing
every tenant’s response time as well as guaranteeing the highest sharing rate.
Based on the framework, a load balance strategy that dual optimize users’
experience from both deployment and runtime is presented. During the deployment
phase, dynamic replica placement policy helps to decide the best placement
strategy for the business process unit; optimal process node selection policy is
responsible for choosing the optimal process node for every tenant at runtime.
Experimental results show the efficiency of this mechanism. |
Keywords: |
Cloud Computing, Multi-tenant, User Experience, Business Process |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN IMPROVED APPROACH FOR RETINAL VASCULAR SKELETON EXTRACTION IN FUNDUS IMAGES |
Author: |
JIANJUN SUN, LIANFEN HUANG, YUE HUANG |
Abstract: |
Retinal vascular imaging system offers a noninvasive research tool to probe the
pathophysiology of the microvasculature. Retinal vascular skeleton extraction
from fundus images is an essential step to analyze the retinal vascular
branching pattern. An improved tracing based approach is presented in this work
to extract the centerlines for retinal vasculatures in the fundus images
automatically. Compared with existing work, the major contribution of the
proposed algorithm is that it incorporates geometrical information and intensity
distribution of the retinal vessels to define a new tracking updated direction
scheme. In addition, the scale value in defining Hessian matrix is also dynamic
and self-adaptive, as well as the size of searching window in identifying the
boundary positions during the tracing process. Experiments results and
validations have demonstrated that proposed approach has satisfied accuracy in
vessel skeleton tracking. |
Keywords: |
Retinal Vessel Image; Image Processing; Skeleton Extraction; Direct Exploratory;
Hessian Matrix Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE TECHNOLOGY OF DETECTION OF LIFE CHARACTERISTIC SIGNALS BASED ON ELMAN NEURAL
NETWORK |
Author: |
JIANJUN LI, JIANFENG ZHAO |
Abstract: |
The article through the analysis of time domain and frequency domain to the
radar non-contact life- parameter signals and gain its characteristics of
extremely low frequency, low SNR, and the easy submerged in strong clutter
noise. This paper presents the algorithm of dynamic life signal detection based
on Elman neural network. The practice shows that the Elman neural network can
stored state inside through the united way. Gain the function of the dynamic
features by feedback network. And achieve the purpose of dynamic modeling. The
simulation results show that the system has the ability to adapt to the
time-varying characteristic. And the better generalization it is and the higher
practical value it will be. |
Keywords: |
Neural Network, Signal Noise Raito (SNR), Clutter Noise, Detection |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
DETECTING THE COMPOSITE OF PHOTOGRAPHIC IMAGE AND COMPUTER GENERATED IMAGE
COMBINING WITH COLOR, TEXTURE AND SHAPE FEATURE |
Author: |
YONGZHEN KE, WEIDONG MIN, XIUPING DU, ZHENWEI CHEN |
Abstract: |
With the development of computer graphic techniques and smaller visual
difference between photographic images (PG) and computer graphics (CG), splicing
of computer graphics and photographic is becoming more common, which causes the
need for automatically distinguishing computer generated images from real
photographs. Based on several visual features that derived from color, texture
and shape feature, using posterior probability support vector machine (PPSVM),
this paper presents a method for classification of photographic image and
computer generated images, and detection of local forgery composite of them.
These features are obtained from 800 computer generated images and 800
photographs, and used to train and test the image samples with the PPSVM. The
PPSVM can calculate the probability of image belonging to photographic images or
computer generated images. We can achieve the result of classification by
setting a threshold of probability. The classification accuracies for color,
texture and shape features are 76.75%, 85.25% and 69% respectively. The accuracy
is improved to 89.375% with combined color, texture and shape features. The
proposed classification method is used to detect the local forgeries composite
of the CG elements in photographic, and vice visa. Experimental results show
that the proposed method is efficient with good detection rate of local
forgeries composite of the PG and the CG. It also possess low dimensional
features and low time complexity. |
Keywords: |
Photographic Image, Computer Generated Image, Composite, Color, Texture, Sharp
Feature, Posterior Probability Support Vector Machine |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
INTEGER DCT-BASED SELF-RECOVERY WATERMARKING ALGORITHM |
Author: |
HONGXIA WANG, QIUCHEN MEN |
Abstract: |
To address the problems of the inferior recovery and lower security in existing
self-recovery fragile watermarking algorithms, this paper presents a secure
self-recovery fragile watermarking scheme based on integer DCT. In the proposed
algorithm, first, the original image is divided into 4×4 blocks, then the
recovery watermark of each 4×4 block is generated by the image block’s integer
DCT coefficients, after that, the secure Hash function with three keys is
performed on each 4×4 block to get the corresponding offset block, and finally
the recovery watermark of each block is embedded into its corresponding offset
block under the control of three keys. Thus, the adversary is difficult to
counterfeit the watermark information when he/her tampers with image content.
Moreover, the offset key space is large enough . Because the forward and inverse
integer DCT can contribute an accurate data match, the recovery of tampered area
will be more accurate. Compared with current self-recovery fragile watermarking
algorithms commonly using DCT technique or encoded pixel values of an image
block, the proposed scheme not only resolves the tamper detection problem, but
also improves the recovery image quality and system security. |
Keywords: |
Digital Watermarking, Integer Discrete Cosine Transform (IntDCT), Tamper
Localization, Tamper Recovery |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE ANALYZATION OF ADAPTIVE ALGORITHMS’ PERFORMANCES OF AIRSPACE ANTI-JAMMING
TECHNOLOGY |
Author: |
HE NAN |
Abstract: |
This paper briefly discussed the principle of the linear constraints minimum
variance (LCMV) algorithm and the least mean square (LMS) algorithm on the basis
of the construction of an uniform circular antenna array. Then it compared the
parameters of the two, such as signal-to-noise ratio, bit error rate, the
average error, convergence rate, and so on, and then it was simulated by MATLAB.
The simulation results showed that performances of LCMV algorithm were a little
bit worse than LMS algorithm when interference was relatively strong, but much
better than LMS when SNR was above 0dB. At last, we found out the appropriate
algorithm for each environment, and proposed the improvement measures. |
Keywords: |
Adaptive Agorithm, Antenna Array, LCMV Algorithm, LMS Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
A STUDY ON SIMULATION AND OPTIMIZATION FOR PERSONNEL AND VEHICLE COORDINATION
EVACUATION IN CASE OF EMERGENCY |
Author: |
YUNLONG MA, FENG ZHANG, JIAN WANG |
Abstract: |
A novel approach is proposed in this paper for personnel and vehicle iterative
evacuation optimization to tackle crowd evacuation problem in emergency. The
paper analyzes the mechanism to coordinate people flow evacuation with traffic
stream evacuation, and explores optimization model from a personnel and vehicle
coordination evacuation perspective. The evacuation is classified as two
categories, namely evacuation with intervention and evacuation without
intervention, which depends on whether intervention can be applied to path
selection for evacuees. Scheduling scheme of evacuation vehicles is derived from
improved ant colony algorithm, and then we integrate personnel evacuation
simulation with micro traffic simulation system based on distributed
collaborative simulation platform. Finally the optimal scheduling solution of
system is searched out through constantly modifying evacuation plan by improved
genetic algorithm. |
Keywords: |
Personnel and Vehicle Coordination Evacuation (PVCE), Simulation and
Optimization, Evacuation with Intervention, Evacuation without Intervention |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
A KEY AGREEMENT FOR LARGE GROUP USING BILINEAR MAPS |
Author: |
TZU-CHUN LIN, TE-YU CHEN, CHIUN-SHIANG GAU, MIN-SHIANG HWANG |
Abstract: |
A key agreement scheme for large dynamic multicast group systems has been
designed to cope with such applications including pay-tv, teleconferencing,
collaborative work, online games, and so forth. To avoid heavy loads and
unauthorized accesses to the system, it is necessary to construct an efficient
and secure scheme. Some recently released schemes have tree-based underlying
structures. The efficiency of these tree-based schemes is closely associated
with the height of the underlying tree. In this paper, we propose a secure and
efficient key agreement scheme for large groups that adopts a quad tree as the
underlying key tree. |
Keywords: |
Multicast, Tree-Based Group, Key Agreement, Elliptic Curve, Bilinear Mapping |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON IMPROVED POSITIONING ALGORITHM BASED ON UWB |
Author: |
MINGJUN WANG, SHUXIAN DENG |
Abstract: |
Ultra Wide Band Radio (UWB) is also known as the impulse radio (IR). It will
become one of the most competitive technologies, especially in the high speed
data transmission, high precision positioning, tracking and other fields; it has
broad application prospects in the future. The main function of the high-voltage
circuit breaker in the power grid is breaking, closing and carrying run normal
current; it can carry, close and break a predetermined abnormal current within a
predetermined time. The most primary and fundamental requirement for the high
voltage circuit breaker is to ensure that there is a high degree of reliability.
The conditions and defects of the insulation can be found by partial discharge
detection. It has important scientific significance and value of engineering
applications for us to study the precision positioning method to the circuit
breaker. |
Keywords: |
Impulse Radio (IR), Positioning Algorithm (PA) |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE ACQUISITION OF LAND COVER INFORMATION USING THREE INDEXES AND LANDSAT-TM
IMAGE |
Author: |
SHIWEI LI, ZHAOBA WANG, JASON YANG |
Abstract: |
To get land cover information of study city area, and according to the spectral
feather of the wanted classes including water, vegetation, impervious surface,
and soil at LANDSAT-TM remote sensing image, we used a method that using three
indexes including normalized difference vegetation index, modify normalized
difference water index, and ratio impervious surface index to extract the
thematic information separately. Firstly, we use the indexes to calculate the
image. Then, we choose threshold for the three thematic layers and did
binarization for them too. In this step, we defined RISI according to the
spectral feature and found the RISI cannot extract the impervious surface
correctly, water information was also extracted. So, we calculated the RISI
first, and then, used it to subtract MNDWI to get the impervious surface
information and, a better result was gotten. Finally, we stack the three layers
together and gave them the false color and, cause soil had very low value in all
three indexes layers, the map including water, vegetation, impervious surface
and soil was gotten together in one image, and it is effective to get them just
by color difference. With taking the high resolution image as reference, the
totally accuracy it can get was 91.3%, and the KAPPA was 0.892. |
Keywords: |
Normalized Difference Vegetation Index (NDVI), Modify Normalized Difference
Water Index (MNDWI), Ratio Impervious Surface Index (RISI), Taiyuan, Shanxi,
Landsat |
Source: |
Journal of Theoretical and Applied Information Technology
March 2013 -- Vol. 49. No. 2 -- 2013 |
Full
Text |
|
|
|