|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
April 2013 | Vol. 50 No.1 |
Title: |
LOAD CURRENT CONTROL BASED ON LUENBERGER OBSERVER FOR THREE PHASE POWER
CONVERTER SVPWM |
Author: |
HARI SUTIKSNO, MOCHAMAD ASHARI, MAURIDHI HERY PURNOMO |
Abstract: |
This paper presents Load Current Control based on Luenberger Observer for
Three-Phase Power Converter SVPWM with current regulation. The use of observer
is intended to replace the use of dc current sensor, so it eliminates the
nonlinearity problem and drop voltage caused the sensor. This research develops
a controller to improve the time response of the dc output voltage of the
three-phase power converter based on load current estimation. The simulation
results show that overshoot the output voltage on load change from full load to
50% full load is about 3% with settling time 0.03 sec. |
Keywords: |
Observer, Power converter, Current Regulator, Space Vector, Pulse Width
modulation |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
SLIDING MODE ROBUSTNESS CONTROL STRATEGY OF SHEARER HEIGHT ADJUSTING SYSTEM
UNDERGROUND COAL MINES |
Author: |
XIUPING SU, WEI LI, QIGAO FAN |
Abstract: |
This paper firstly established mathematical model of height adjusting hydro
cylinder of the shearer, as well as the state space equation of the shearer
height adjusting system. Secondly we designed a shearer automatic height
adjusting controller adopting the sliding mode robustness control strategy. The
height adjusting controller includes the sliding mode surface switching function
based on Ackermann formula, as well as sliding mode control function with the
improved butterworth filter. Then simulation of the height adjustment controller
shows that the sliding mode robustness control solves buffeting of typical
controller, and achieves automatic control for the rolling drum of the shearer. |
Keywords: |
Shearer, Height Adjusting, Sliding Mode, Robustness |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
REQUIREMENT ELICITATION BASED ON VALUE CHAIN ANALYSIS |
Author: |
HANCHENG LIAO |
Abstract: |
Requirement elicitation is an analysis, abstraction, synthesis, extracted
process which obtains real and correct software requirements from users'
demands, thoughts and expectations. The accuracy and integrity of software
requirements is crucial to the success of the software. Although many software
engineering techniques have been applied, incomplete, inaccurate or inconsistent
requirements still remain for the enterprise information system which includes
rich domain knowledge and multiple users playing various roles in complex
organizational structure. From the angle of economic management, the paper
presents an enterprise informatization requirement analysis model (EISRAM) and
the acquisition processes by value chain analysis after the classification of
the demand and reasons for the requirement change are discussed. The new idea
and expanding method of software requirement elicitation could reduce software
failure rate. |
Keywords: |
Requirement Elicitation, Value chain, Enterprise informatization, Elicitation
processes, EISRAM |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
FIBER GRATING ATMOSPHERIC PRESSURE SENSOR BASED ON MICRO-BENDING CHARACTERISTIC |
Author: |
LUO YINGXIANG |
Abstract: |
This paper proposed a new pressure sensor based on long period fiber grating
resonant peak modulation through the LPFG microbending sensitivity
characteristics and membrane structure with box. Research results show that: the
sensor measurement is in the range of 0~0.25 MPa, the detection resolution is
0.24469 hPa/dB, LPFG resonance spectroscopy changing law and the theoretical
derivation, numerical analysis results are in good agreement with ANSYS. By
appropriate selection of the diaphragm material, packaging structure parameters,
which can obtain good corresponding relation and the measurement range, further
improving the detection precision, can satisfy the weather and aircraft height
measurement of pressure sensor requirements. |
Keywords: |
Long-Period Fiber Grating; Atmospheric Pressure Sensor; Bending; Resonance
Peaking Amplitude |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN IMPROVED ALGORITHM ON ASYMMETRIC TEXT WATERMARKING BASED ON SVM |
Author: |
YUE FUQIANG, CONG JICHENG |
Abstract: |
The development of digital technology and the Internet has facilitated the
spread of various forms of digital works. At the same time, the characteristics
that digital works is extremely vulnerable to reproduce ideally will likely be
used by pirates. Digital watermark technique is one of effective means of
copyright protection recently. On the basis of a detailed analysis of natural
language watermarking, an asymmetric text digital watermarking algorithm based
on Naturallanguage is proposed. First, digital watermarking is produced using
asymmetric algorithm. Second, the index sequence of paragraphs and sentences are
permuted using DES and Queue Scrambling. Third, watermarking is embedded by
sentence transformation, and during the embedding, Multi-degree relativity is
introduced. Last, analysis and provident show that the schemes have higher
security, they can prevent from forging the watermarks and trace piracy;
copyright certification processes have higher efficiency. The watermarked
documents have good robustness. |
Keywords: |
Natural language; Asymmetric; Queue Scrambling; Multi-degree relativity; Text;
Digital Watermarking |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE E-LEARNING TEACHING MODEL BASED ON SERVICE SOFTWARE BUS IN INFORMATION
SOCIETY |
Author: |
DONG XUESHU, WANG ZILI, SHI YAYONG |
Abstract: |
E-Learning emerges as the times require under the network environment. It is a
new teaching and learning mode, this paper analyzes the meaning of E-Learning,
teaching mode, as well as the traditional Chinese education influence. Service
Software Bus (SSB) is a service-oriented software bus. Based on theory basis of
existing general software and combing with loosely coupled service-oriented
architecture technology based on business standards, a kind of SSB is proposed
and designed. Such kind of service-oriented software bus architecture is then
applied into E-Learning teaching platform to conduct overall design of
E-Learning teaching platform. Detail design of each functional layer of the
teaching platform is also given. |
Keywords: |
E-Learning; Teaching Mode; Information |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
LOSSLESS NETWORK COMPRESSION BASED ON TOPOLOGY POTENTIAL COMMUNITY DISCOVERY |
Author: |
WANG XUHUI |
Abstract: |
A research of lossless network compression is carried out. To meet the different
needs, two approaches of lossless network compression are proposed in this
research. One approach, judging importance of the nodes according to their roles
playing in the community composition, quantifies the importance of every node in
communities, and achieves lossless network compression through layers; another
approach, judging importance of the nodes according to the distances from the
community representative nodes to them, differentiates the nodes with different
distances, and achieves lossless network compression through compression ratio.
Comparative experiments show that the two approaches not only can achieve
perfect compression ratio, and retain the relationship between the communities,
but also can reserve the important nodes or basic community structures during
the compression process according to the needs. |
Keywords: |
Topology Potential; Topology Potential Entropy; Uncertainty Measure; Overlapping
Community Discovery; Variable Scale Community; Structural Holes Between
Communities; Lossless Network Compression |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
ALGORITHM ON EMBEDDED FINGERPRINT IDENTIFICATION SYSTEM |
Author: |
QIAOLIAN SHI, LIQING CHENG, TAIBIN SHI |
Abstract: |
Fingerprint identification is divided into fingerprint pretreatment, fingerprint
feature extract ion and a fingerprint match. Based on embedded technology and
fingerprints processing algorithms, embedded automatic fingerprint
identification system fingerprint identification of various processes study the
algorithm, this paper expounds the characteristics of various algorithm with
using details. |
Keywords: |
Embedded Fingerprint, Identification System, Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH OF NSV BASED ON OBSERVER |
Author: |
HE NAI-BAO, GAO QIAN |
Abstract: |
An anti-disturbance method with fast adaptive disturbance observer was proposed
for nearspace vehicle (NSV) with severely changed aero-dynamic parameters and
external disturbances. First, a mathematical model was built for the NSV. Then,
the anti-disturbance controller was designed with adaptive law based on adaptive
parameters and compensation term for error. With the nonlinear exponential term
in adaptive law, the approaching speed of disturbances observer was increased.
And the proposed controller can make the system errors converge to zero in the
finite time. The strict theoretical analysis was given for the closed-loop
system. The simulation results showed the proposed control strategy for NSV with
good performance in rapidity and convergence. |
Keywords: |
Nearspace Vehicle (NSV), Adaptive Observer (AO), Nonlinear System (NS) |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON SECURITY ISSUES AND SOLUTIONS OF IEC 61850 COMMUNICATION PROTOCOL
ARCHITECTURE |
Author: |
SHENG ZHAO-YONG, QU HAI-PENG, WANG CHAO, ZHOU XIAO-MEI |
Abstract: |
IEC 61850 Communication Protocol Architecture is widely used in China's
electricity system for communication between the substation automatic systems.
Due to the lacking of corresponding security specification, the standards cannot
guarantee the confidentiality, integrity as well as authentication in
communication. This paper proposes a solution for this problem. The improved
Handshake Protocol and Record Protocol are introduced between the application
layer and the transport layer with less transmission of data and quick connect
feature. Using this solution, the standards can meet both the electricity system
for real-time and reliability requirements and the security requirements at the
same time. |
Keywords: |
IEC 61850, Security, Solution |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE DESIGN AND IMPLEMENTATION OF SOFTWARE REGISTRATION MODULE BASED ON RSA
ENCRYPTION ALGORITHM |
Author: |
JIQIU DENG, BO BI, QIANHONG WU, NA LI |
Abstract: |
Based upon RSA encryption algorithm and MD5 hash function, this paper designs a
software license scheme which adopts the idea of “one machine one code”. Using
c# language in the .NET Framework 4.0 platform, the author completed the license
scheme and it ran on mining management information system successfully. It not
only ensures the safety of the software and convenience in registration
authorization, but also makes registration code more aesthetic and effective. |
Keywords: |
RSA Encryption Algorithm, Software License, MD5 |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
COMPUTER SIMULATION OF BUFFETING RESPONSES FOR LONG-SPAN CONTINUOUS RIGID-FRAME
BRIDGE WITH OVER-HEIGHT PIER |
Author: |
HU JUN |
Abstract: |
The continuous rigid frame bridges are more sensitive to wind action with the
increase of bridge span and pier height. In order to calculate the wind induced
buffeting responses, the fluctuating wind field at bridge site are simulated by
harmonic synthesis method and the wind loads are also derived based on the
simplified quasi-steady theory, the time-history dynamic responses of the bridge
are calculated based on the computer software. The Hezhang bridge with 195m
height pier is discussed in detail and the results indicate that the bridge with
over-height pier is sensitive to wind action, the maximum displacement responses
of construction state and the completion stage are 8.09cm and 3.39cm
respectively and the fluctuating amplifying coefficient of construction phase is
larger than the finished stage, the bridge is more sensitive to wind load during
the construction stage. |
Keywords: |
continuous rigid-frame bridge; numerical simulation; time-domain analysis;
buffeting |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
STUDY ON DUAL-MODE MODELING APPROACH OF CAXA |
Author: |
BIN HUA, XUEJUN WANG , YILIN CHI , YANFANG DING |
Abstract: |
This paper presents a dual-mode modeling approach based on innovation design and
engineering design, which is applied to the design of belt conveyor. Dual mode
modeling method fusions innovation design pattern and engineering design mode,
and realizes a combination of liberalization design and precision design, while
the traditional parametric modeling is restricted by single thought, which
exists a strictly relationship of father and son between part elements, but dual
mode modeling approach breaks the restriction. This paper firstly described the
characteristics of dual-mode modeling method and the function of 3D sphere
uniquely owned by software Computer Aided X Alliance(CAXA); then the theoretical
design process of belt conveyor was introduced, which included driving power
calculation for drum, selection of driving motor, selection of gear reducer and
confirmation for idler diameters; the modeling process of belt conveyor was
described through the application of the dual-mode modeling method, the whole
product modeling design has included module design and assembly design, and has
accomplished the driving device module, and roller device module, and
transmission device module design. The results show that the modeling speed with
dual mode modeling approach can increase one time compared with the traditional
methods, and all the technology application above can improve the design
efficiency, reduce design error, thus greatly improve the design efficiency, and
highlight the liberalization and accuracy characteristics of the modeling
process. |
Keywords: |
Dual-mode Modeling Approach, CAXA, Belt Conveyor, Innovation design Method,
Engineer Design Method, Three Dimensional Sphere, Modular Design |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS OF ICSGD AND OSSDL LOCALIZATION ALGORITHMS IN WSN |
Author: |
LIU YANG, XING JIANPING, WU HUA, XIAO HAIRONG, WU XIAOMING |
Abstract: |
In our papers before, two three-dimensional localization schemes which are
called iterative calculation of secondary grid division localization scheme (ICSGD)
and a range free three dimensional optimum space step distance localization
scheme (3D-OSSDL) are proposed respectively. In ICSGDLS scheme, forty beacon
nodes and five hundred unknown sensor nodes were randomly deployed in a cube,
which is divided into smaller cubes twice. The position information of unknown
nodes could be got by iteratively calculating the centroid of smaller cubes.
However, in 3D-OSSDL algorithm all nodes are randomly deployed in space and
forms arbitrary network parameters. By optimizing distances from the network
model, the optimum space step distance from nodes to anchors is obtained and the
coordinates of all unknown nodes are derived finally. In this paper,
comprehensive analysis and comparisons are made by MATLAB software. And by this
paper we can find the optimum work status of the two. |
Keywords: |
WSN, Localization Algorithm, ICSGD, OSSDL |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
COMPREHENSIVE COMPARISONS OF THREE LOCALIZATION ALGORITHMS USED IN WSN |
Author: |
MA XIANGXUE, XING JIANPING, LIU YANG, WU HUA |
Abstract: |
In this paper, we made comprehensive comparisons of three localization
algorithms in wireless sensor network (WSN): A localization algorithm based on
virtual central node (VCN), an improved 3D node localization algorithm based on
virtual central node (IVCN) and an iterative calculation of secondary grid
division (ICSGD) localization scheme. VCN and IVCN algorithms are both adapted
to the wireless sensor network (WSN) that anchor nodes present an uniform
distribution in three dimensional sensor spaces. During the localization
process, by deducing a 3D special node, which is called the virtual central
node, unknown nodes can compute their own positions automatically. Iterative
calculation of secondary grid division (ICSGD) localization scheme could solve
the inconsistency between calculation amount and location accuracy. The
performance of the localization scheme was evaluated in a series of simulations
performed using MATLAB. The simulation results demonstrated that the three
schemes outperform in terms of higher location accuracy, and lower location
amount. |
Keywords: |
WSN, Localization Algorithms, ICSGD, VCN, IVCN |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
DRUG TARGET PREDICTION BASED ON HUMAN HIV-1 PROTEIN-PROTEIN NETWORK |
Author: |
ZHAO LIPING, XIAO XUAN, JIA JIANHUA |
Abstract: |
Up to now, there have no fundamental methods to treat HIV-1(Human
Immunodeficiency Virus type1). We constructed a network by the primary gene and
protein of hiv-1 and then the corresponding dominating set. Considering the
Network properties: degree, betweenness centrality, Characteristic path length
and Clustering coefficient etc. This paper analyzes those two networks’
properties, so as to find out the cdkn2a is a potential drug targets. |
Keywords: |
Proten-Proten Network,Betweenness Centrality,Dominate Set |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
MECHANICLA INFORMATION OF FOOTBALL COLLISION DURING DIFFERENT SPEED LAUNCH |
Author: |
JIANG JIAN-BAO |
Abstract: |
Football collision is a common phenomenon during football matches, but
mechanical approach to study football collision process was quite limited. This
study was using force platform and high speed video system to monitor the
football collision under low and high speed conditions. The high speed collision
was nearly double compared the speed of low collision. But the contact time
under these two collision conditions was not discrepancy a lot. We found when
the speed increasing, the collision power will increase a lot. Therefore, in the
football match, especially the player shots or rescues dangerous ball, if the
ball hit directly on one part of human body, it may produce harm to the body
even damage. We should do some buffering action to minimize the impact and
protect our body. Some meaningful values in this study, were very helpful to
football training and relating product development, providing certain
theoretical guidance and improve the development of the football sport. |
Keywords: |
Football, Force Platform, Collision, High Speed |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH AND DESIGN OF CPU FOR TEACHING BASED ON SPARC V8 |
Author: |
YA LI, 2XIAOYAN ZHU, WEIGONG ZHANG, CHUNLIANG WANG, ZHE DENG |
Abstract: |
Research and design of CPU for teaching has been a hotspot of computer
professional teaching. The verification experiment is given priority tothe
computer system structure and principle experiment course offered by the
University at present and this is not conducive to students making the theory
and the modern computer industry combination. Based on leon2 kernel, CPU for
teaching based on SPARC V8 is designed. Leon2 kernel is broken down to
independent functional modules from top to down, then a teaching experimental
platform is built using EDA software provided by the company Mentor and SPE¬_C
integrated development environment. Finally, students who use the teaching
experiment platform can do self-determined design based on Leon2 kernel modules.
Teaching experiment indicates that the research is beneficial for students to do
more in-depth study and search on the structure of the computer, thereby
improving the quality of practice teaching for computer system structure and
principle. |
Keywords: |
CPU for teaching, System Structure, SPARC V8, Leon2, Self-determined design |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE APPLICATION OF THE INTEGRATED INDICATORS BASED ON BP NEURAL NETWORK IN
COLLIERY EQUIPMENT SAFETY MONITORING |
Author: |
SHU-FANG ZHAO, LI-CHAO CHEN |
Abstract: |
For the current problems in the security situation of colliery equipment, and
based on non-linear relationship among the parameters of colliery equipment,
this paper presents a method for forecasting the safety of colliery equipment
based on BP neural network. By using BP neural network in the colliery safety
equipment monitoring and warning issues, we established a multi-index
comprehensive monitoring (evaluation) of the device security early warning
network model, and have trained and tested the model which used the measured
data as an example. The results show that the network performance good and the
prediction accuracy is high and user-friendly. So we believe it is an effective
method for safe comprehensive evaluation. |
Keywords: |
Colliery equipment Safety Monitoring BP neural network Warning |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
SCA METHOD BASED ON QUALITATIVE SIMULATION |
Author: |
GUANGYAN ZHAO, YUFENG SUN |
Abstract: |
It is an effective method to use qualitative reasoning theory to realize sneak
circuit analysis (SCA). The method using qualitative modeling combined with
functional simulation to realize sneak circuit analysis. The qualitative models
of resistive element, switch, transistor, MOS pipe, digital devices, analog
devices, mechanical devices and other types of components were established and
the qualitative simulation process was studied. Self-developed QSCA software
(qualitative simulation-based sneak circuit analysis) is applied to analyze
typical cases and verify the technical correctness. The result shows that this
method could provide technical support for the system to find sneak circuit
problems at the early design stage and it can also be used in the field of fault
modes and effects analysis. |
Keywords: |
Sneak Circuit Analysis (SCA), qualitative simulation, qualitative modeling |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF A DATA CACHE FOR UM_BUS |
Author: |
YANG XIAOLIN, ZHANG WEIGONG |
Abstract: |
In modern embedded systems, most of them mount with a certain amount of
peripherals devices, often a large number of I / O time is consumed in the
process of processor access these devices, thereby reducing the overall
performance of embedded systems. However, to open up a space in the memory for
caching of these device’s data can resolve this problem. UM_BUS (Dynamically
Reconfigurable High-speed Serial Bus) with 32 bits wide is the research object
of this paper, whose bandwidth can reach 269.5M/s in the ideal condition, but
the large number of I/O operations has a serious impact on bus bandwidth
utilization. In order to resolve this problem, a data cache mechanism based on
the structure and basic theory of cache is designed and implemented for UM_BUS
in this paper. After the experimental test, the mechanism is proved to run in
the UM_BUS controller driver effectively and improves the bandwidth utilization
of UM_BUS significantly, therefore, enhances the performance of the bus to some
extent. |
Keywords: |
UM_BUS, LRU, Cache, Buffer, Read-ahead |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
PORTABLE SYNTHETIC TESTING SYSTEM FOR SERVOSYSTEM BASED ON INFORMATION FUSION |
Author: |
ZHAO LI-MING, ZHANG BING |
Abstract: |
In view of the disadvantage for sinusoidal machine in naval vessels maintain to
quick guarantee goal nowadays, it has designed a protable synthetic testing
system for servosystem based on information fusion. The testing system used a
portable industrial computer as a core, which uses Windows as operating platform
and C++Builder as programmable aid, and Native-XML database technique and
dynamic access mechanism, and Win Driver technique and dynamic graphics display
for accurate and coarse channels signal. Through developed and designed for
hardware and software, it had extended function of conventional sinusoidal
machine. It adopts NFE estimator to fusion multi-source information to diagnosis
the instrument on-line and database technique for off-line. Application shows it
possesses the advantage of simple operate and easy test, high efficiency. It
reduces the difficulty of equipment maintenance, conveniences to track and
mastery the equipment for long time, and increases the quick guarantee
capability. The static position precision of test overland gets 0.1 mil. It has
great application value and promotion value. |
Keywords: |
Portable, Servosystme, Synthetic Testing System, Information Fusion, Design |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE AUTOMATIC IDENTIFICATION OF A DIGITAL SIGNAL BASED ON CYCLIC SPECTRUM |
Author: |
TIANKUN ZHENG, YUANCHENG YAO , HUAN WANG |
Abstract: |
With the continuous development of the software radio technology, the mode of
communication signal modulation recognition is becoming an important research
direction. The article describes the spectrum of the digital signal modulation
recognition method and takes advantage of some of the modulation signal when
some modulation signal have the same power spectral density correlation function
of the spectrum, but there is a significant difference in spectral correlation
function. Low signal-to-noise ratio of the modulated signal can be identified by
spectral correlation function. The article has computer simulation of Gaussian
noise automatic identification of digital communication signals by the
extraction of some of the parameters of the cyclic spectrum.The experimental
simulation results show that signal average recognition rates can reach 95% or
more, and good practial prospects when the signal-to-noise ratio is not less
than 15dB. |
Keywords: |
Digital communications, Spectral Correlation, Automatic identification |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN ALGORITHM OF DIGITAL MODULATION IDENTIFICATION BASED ON INSTANTANEOUS
FEATURES |
Author: |
MINGWEI QIN, XIANGLU LI, YUANCHENG YAO |
Abstract: |
Automatic modulation identification plays an important role in non-cooperative
communication systems. An improved approach, based on instantaneous features and
binary tree classifier has been proposed for the classification of Medium
Frequency (IF) digital signals at low signal-to-noise ratio (SNR) situation.
Mean filter was applied to suppress the noise and five new characteristic
parameters such as maa, maf, map, raf and maa1, were extracted for the
classifying. It is shown that the proposed algorithm has better performance than
the traditional approaches. Theoretical arguments are verified via extensive
simulations. Simulation results indicate that the correct classification
probability (Pcc) with proposed algorithm has been improved compared with the
traditional method. |
Keywords: |
Modulation Identification, Instantaneous Features, Parameter Optimization,
Decision Classification |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
A HYBRID GLOBAL NUMERICAL OPTIMIZATION WITH COMBINATION OF EXTREMAL OPTIMIZATION
AND SEQUENTIAL QUADRATIC PROGRAMMING |
Author: |
PENGCHEN, ZAI-SHENG PAN, YONG-ZAI LU |
Abstract: |
In recent years, many efforts have focused on cooperative (or hybrid)
optimization approaches for their robustness and efficiency to solve decision
and optimization problems. This paper proposes a novel hybrid solution with the
integration of bio-inspired computational intelligence extremal optimization (EO)
and deterministic sequential quadratic programming (SQP) for numerical
optimization, which combines the unique features of self-organized criticality
(SOC), non-equilibrium dynamics and global search capability in EO with local
search efficiency of SQP. The performance of proposed EO-SQP algorithm is tested
on twelve benchmark numerical optimization problems and compared with some other
state-of-the-art approaches. The experimental results show the EO-SQP method is
capable of finding the optimal or near optimal solutions for nonlinear
programming problems effectively and efficiently. |
Keywords: |
Extremal optimization (EO), Sequential quadratic programming (SQP), Memetic
algorithms (MA), Nonlinear programming (NLP), Numerical optimization |
Source: |
Journal of Theoretical and Applied Information echnology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON DESIGN DECISIONS MODEL FOR REQUIRING GROUPS DRIVEN PRODUCT MAIN
COLOR DESIGN |
Author: |
WEI-WEI WANG, XIAO-YAN YANG, JIN-QIAO HUANG |
Abstract: |
The efficiency and quality of product conceptual design is essentially about
product development as well as in a rapidly changing and keenly competitive
environment. In this paper, an intelligent product main color decisions method
and model in connection with requiring groups driven is developed to make the
design phase more objective and scientific. First, the paper has analyzed the
features of color design and color design decisions. Second, the framework of
the requiring groups driven product main color decisions intelligent
optimization model has been established. And this paper has studied its
algorithm mechanism and the supporting technologies on this basis. Finally, the
color design process of a kind of special vehicle is employed to demonstrate and
test the method. |
Keywords: |
Color Design, Requiring Groups, Color Clustering Analysis, Design Decisions |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
DYNAMIC GROUP SIGNATURE SCHEME BASED ON NON-INTERACTIVE PROOF |
Author: |
XIE YONG, ZHANG YILAI, LIU MING |
Abstract: |
Combined with identity-based signature technology and non-interactive proof, a
dynamic group signature scheme was built based on the standard group scheme
model. This scheme overcame the shortcoming of static property of standard
scheme and was of strong Non-frameability. New members could dynamically join in
group without updating the group public key and group manager could not forge
any member's signature. By the performance and safety analysis of the scheme, it
could prove that, this scheme was higher performance than other similar group
signature schemes, and the correctness, anti-CPA attack complete anonymity and
full traceability of this scheme had satisfied the secure request of standard
scheme. Therefore the scheme is of preferable applicability. |
Keywords: |
Group Signature, Full Anonymity, Traceability, Non-interactive Proof |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
NUMERIC SIMULATION OF MOMENT OF STABILIZING PILE UNDER THE LOCAL LIQUEFACTION
BASED ON FINITE ELEMENT METHOD |
Author: |
LI RONGJIAN, LIU JUNDING, YAN RUI |
Abstract: |
The evaluation of liquefaction effect on the dynamic moment of stabilizing piles
is potentially significant. Based on the dynamic centrifuge modeling of a slope
reinforced with a row of copper model pile, this paper not only analyzed the
response of dynamic pore pressure, earthquake deformation and macroscopic
phenomenon measured in the response of the reinforced slope, but also simulated
the response characteristics of dynamic bending moment of stabilizing pile under
the condition of local foundation liquefaction by using the dynamic
consolidation finite element. Through the comparison of model test and
computation, the results show that the local liquefaction in the saturated
foundation resulted in the large seismic deformation at slope toe and slope top,
and this seismic deformation not only leads to increasing sharply of the dynamic
excess bending moment of stabilizing pile, but also makes the post-earthquake
residual moment much bigger than the static bending moment before earthquake. So
the excess moment of stabilizing pile in liquefiable soil caused by the
saturated foundation liquefaction can’t be ignored. |
Keywords: |
Numeric simulation, Finite element method, Dynamic centrifuge modelling,
Liquefaction, Moment |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE APPLICATION OF APRIORI ALGORITHM FOR NETWORK FORENSICS ANALYSIS |
Author: |
XIUYU ZHONG |
Abstract: |
With frequently network attack crimes, it causes serious economic loss and bad
social influence. Network security products are practically impossible to guard
against intrusion methods, network forensics is needed. The massive network data
must be captured and analyzed in network forensics, and the data is often
related, the application of Apriori algorithm is proposed for network forensics
analysis. After capturing and filtering network data package, and the Apriori
algorithm is used to mine the association rules according to the evidence
relevance to build and update signature database of offense, current user
behavior is judged legal or not through pattern match results of user behavior
and association rules which are stored in databases. The crime behaviors are
saved in evidence database, which can be used as primitive evidence for network
forensics. Simulation results show that the application of Apriori algorithm can
raise the speed, exactitude and intelligence of data analysis for network
forensics, the application can help to resolve the real-time, efficient and
adaptable problems in network forensics. |
Keywords: |
Apriori algorithm, Application, Network forensics, Data analysis |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
SELF-ORGANIZING MAP-BASED K-MEANS CLUSTERING FOR STABILITY ANALYSIS OF PRODUCT
QUALITY IN PACKAGING IN SEMICONDUCTOR MANUFACTURING |
Author: |
JIN DING, YONG-ZAI LU, JIAN CHU |
Abstract: |
The “packaging” plays an important role in semiconductor manufacturing. Among
the multiple test-passed steps in packaging production, the step of
“wire-bonding” is the most complicated and critical one since there are many
tuning parameters, such as force, current and time, etc. needing to be set-up by
operators in order to perform good bonding. Several key perform indexes, for
example, wire pull, ball shear and ball height, are used to measure the product
quality. This paper presents the development of applying SOM (self-organizing
map) based k-means to the data-based classification for product quality. Namely,
the product quality can be divided into a number of categories in terms of huge
historical quality related data. In addition, SOM based K-mean clustering model,
algorithms and the case studies with real-production data are addressed. The
concluding remarks and future work are given in the final section. |
Keywords: |
Stability Analysis; Clustering; Self-Organizing Map; K-Means; Grid-Based
Heuristic Initialization; Wire Bonding; Packaging |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN EFFICIENT PROTOCOL FOR RESTRICTED ADAPTIVE OBLIVIOUS TRANSFER |
Author: |
RUAN OU, ZHOU JING,FU CAI1, WANG CHUNZHI |
Abstract: |
Restricted adaptive oblivious transfer was introduced by Herranz in 2011, which
is the main approach to protect user privacy in e-transactions involving
operations on digital confidential data or sensitive infor-mation. There are
many practical applications for restricted adaptive oblivious transfer, such as
medical or financial data access, pay-per-view TV, and so on. However, so far as
we know, there are only two proto-cols for restricted adaptive oblivious
transfers which were both proposed by Herranz [8]. Furthermore, the-se two
protocols are very expensive. In this paper, we propose a new protocol for
restricted adaptive oblivi-ous transfer by using fully homomorphic encryption.
Compared with Herranz’s constructions, our protocol is more efficient in the
cost of communication and computation. |
Keywords: |
Oblivious Transfer, Restricted Adaptive Oblivious Transfer, Fully Homomorphic
Encryption |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
PEDESTRIAN DETECTION BASED ON FOREGROUND SEGMENTATION IN VIDEO SURVEILLANCE |
Author: |
MING XIN, CAILI FANG |
Abstract: |
Real-time detection and tracking of moving pedestrians in image sequences is a
fundamental task in many computation vision applications such as automated
visual surveillance system. In this paper we propose a human detection method
based on foreground segmentation, and the detection speed is satisfying for the
application of video surveillance. During detection, unlike the exhaustive scan
typically used in general human detection systems, in order to avoid scanning
regions like the sky, the foreground segmentation stage is firstly implemented
in the video surveillance sequences by utilizing Gaussian mixture model
algorithm, and then, human detection stage is executed on the regions of
interest (ROI) extracted from the video surveillance sequence frame. In contrast
with the exhaustive scan without explicit segmentation, our proposed approach
can meet the real-time requirement. Carefully designed experiments demonstrate
the superiority of our proposed approach. |
Keywords: |
Pedestrian Detection, Object Tracking, Foreground Segmentation |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN APPROACH TO GENERATE TESTS FOR MULTIPLE VICTIM LINES OF CROSSTALK FAULTS IN
INTEGRATED CIRCUITS |
Author: |
PAN ZHONGLIANG, CHEN LING |
Abstract: |
The continuous progress in circuit technology offers the opportunity to design
circuit chip with high integration density. The parasitic capacitances among the
signal lines in circuits are increased; this results in the arising of circuit
noises such as crosstalk. The coupling effects of a crosstalk occur between the
aggressor lines and victim lines. If the strength of the aggressor line is
large, then it may produce interferes for a lot of adjacent lines. Therefore,
the type of the crosstalk fault consists of an aggressor line and multiple
victim lines are investigated in this paper. A new test vector generation
approach is presented for the crosstalk faults with multiple victim lines. The
approach uses a lot of structure characteristics of the circuit under test,
performs the partition of circuit cones, path selections, value implications of
signal lines, etc., and the test vectors are produced by forward tracing and
backtrack tracing. The experimental results for a lot of digital circuits show
that the test vectors of the crosstalk faults with multiple victim lines can be
generated by using the approach proposed in this paper, and the feasible fault
coverage can be obtained. |
Keywords: |
Integrated circuits, crosstalk noise, multiple victim lines, test approach, test
vector generation. |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
EQUIVALENCE CHECKING OF COMBINATIONAL CIRCUIT USING CHAOTIC PATTERN SIMULATION
AND BINARY DECISION DIAGRAMS |
Author: |
ZHONGLIANG PAN, LING CHEN |
Abstract: |
With the increase of complexity of circuits, guaranteeing the correctness of
design becomes extremely important. A new equivalence checking method is
presented in this paper for the verifications of combinational circuits; the
method uses the chaotic pattern simulation to find a lot of equivalent nodes,
which results in that the scale of the composite circuit is reduced. The
equivalence checking of two combinational circuits is carried out by
constructing a BDD which is corresponding to a circuit being made up of the
composite circuit and interface circuit. If the BDD is a constant 0, then the
two combinational circuits are functional equivalence, the two rest circuits are
not equivalent. The experimental results for a lot of circuits show that the
more accurate equivalent nodes can be obtained by using chaotic pattern
simulation in this paper than the random pattern simulation, and the equivalence
checking method presented in this paper is able to verify the combinational
circuits in shorter time. |
Keywords: |
Combinational circuits, equivalence checking, formal verification, pattern
simulation, binary decision diagrams |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
MULTI-SOURCE INFORMATION FUSION FOR OPEN INNOVATION DECISION SUPPORT SYSTEM |
Author: |
LI LI , SUN LU, WANG JIAYANG |
Abstract: |
Open innovation emphasizes that enterprises should fully integrate internal and
external knowledge to improve their innovative performance. However, it is
difficult for successful open innovation model to effectively manage and fuse
information. This paper firstly adopts information fusion technology to increase
knowledge integration ability of open innovation for enterprises, which provides
effective solution to the difficulty. In addition, this paper takes external
partners, such as customers, suppliers, competitors, consultants, private R&D
institutes, universities and other higher education, government and public
research, as the sources of information. It fully considers completeness of
external information and assures efficiency of multi-source information fusion.
Then, this paper develops the enterprise open innovation decision fusion model
based on information fusion technology and designs open innovation decision
fusion support system model. This model applies technology of Agent, takes into
account both advantage and feature of Internet, and is capable of benefiting
enterprises in handling a series of unstructured decision problems in process of
open innovation. |
Keywords: |
Multi-Source Information, Decision Fusion, Open Innovation, DSmT |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
AQUIFER THERMAL TRANSPORT COMPUTER SIMULATION OF WINTER COMBINED SUMMER
GROUNDWATER SOURCE HEAT PUMP SYSTEM |
Author: |
HAN YAN-CHENG, XING LI-TING , MA ZHEN-MIN, JIAO YU-FEI |
Abstract: |
Groundwater source heat pump technology is an energy-saving method to use the
groundwater heat energy resources for heating in winter and cooling in summer.
It is important to comprehensive study the process of groundwater thermal
transport of winter combined summer GWSHP under the continuous running
condition. In this paper the simulation models have been proposed using
winter-only and winter combined summer GWSHP respectively, and computer
simulations were carried out. The results show that the temperature will
decrease year by year if using winter-only GWSHP. The groundwater temperature
change is smaller using combined GWSHP than using winter-only GWSHP. In summer,
the winter combined summer GWSHP can use the cooling storage recharged last
winter and in the winter it can use the heat storage recharged last summer. The
winter combined summer GWSHP can improve thermal efficiency in the winter and
enhance the cooling effect in summer. |
Keywords: |
Groundwater Source Heat Pump , Winter Combined summer GWSHP, Temperature Field,
Thermal Transport |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
MOBILE OPEN CHANNEL SCHEDULING DECISION SUPPORT SYSTEM AND APPLICATIONS TO LONG
DISTANCE WATER DIVERSION PROJECT |
Author: |
HAN YAN-CHENG, LUO HUI, SU XIAO-CHENG, LU JING-WEI |
Abstract: |
The South-to-North Water Diversion Project is the largest water project in the
world presently. It is very important to solve the serious shortage problem of
water resources, optimize the allocation of water resources in northern China.
But it is too long and scattered with too many water outlet, gates, pumps,
inverted siphon, bridges, and other constructs. When found the emergency matters
such as piping, landslide, ice-jam and water-overflow, it is difficult to judge,
getting help and dealing with. To ensure safely operation of this water project,
it is necessary to use wireless communication and mobile phone or moving device
to inspect the status of embankment, hydrological, electric transmission lines
and structures real time. In this paper, a mobile smart phone dispatch
decision-making system is presented based on 3G transmission network. It
includes dispatch operation command center with dispatch engineer, the
monitoring and decision-making system platform with database server and
application software, mobile application terminal services, etc. The remote
mobile client applications services include mobile line-inspections, movable
water quality automatic monitoring, mobile dispatch & operation services online,
mobile emergency dispatch services online, mobile security services, and mobile
inquire services. |
Keywords: |
Mobile phone; Decision Support System; South-to-North Water Diversion Project;
Transmission of Water; Control |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
NEURAL-BAYESIAN FILTERING BASED ON MONTE CARLO RESAMPLING FOR VISUAL ROBUST
TRACKING |
Author: |
XUNGAO ZHONG, XIAFU PENG, XUNYU ZHONG |
Abstract: |
The visual robust tracking is an acid test for existing methods since the target
with large-dynamic-change scenarios. Specifically, this paper presents neural
aided Bayesian filtering scheme which is based on Monte Carlo resampling
techniques associated with lower particles hypothesis to addresses the
computational intensity that is intrinsic to all particle filter (PF)
approaches, including those that have been modified to overcome the degeneracy
of particles and improve the diversity of particle samples. Performance and
tracking quality results for severe-dynamic target tracking experiments
demonstrate that the Bayesian filtering deteriorated error caused by constrain
the number of particles required which was compensated by a RBF neural network,
with high accuracy and intensive tracking performance for unconstrained abrupt
motion only require lower particles compare with SIR Bayesian filtering,
meanwhile, the proposed method is also with strong robustness for different
number of particles. |
Keywords: |
RBF Aided Bayesian Filtering, Monte Carlo Resampling, Lower Particles
Hypothesis, Visual Robust Tracking |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NEW MODELING OF THE LANDMARK MOVEMENT BASED ON THE PREVIOUS MOVEMENT RESULTS
TO DETECT THE FACIAL SKETCH FEATURES |
Author: |
ARIF MUNTASA, MOCHAMMD KAUTSAR SOPHAN, MOCHAMAD HARIADI, MAURIDHI HERY PURNOMO,
KUNIO KONDO |
Abstract: |
Deformable model is one of interest topic in biometrics. The deformable model
applications have been used to detect objects included facial sketch feature
images. Many methods have been discovered and developed to detect objects of
deformable. However, any method can solve a problem, but raises other issues.
Popular method to solve the deformable object is Active Shape Model. It is the
most used to detect facial feature, but it has weakness. This method is very
depended on the shape initialization. If the movement direction is not covered
by training sets, then the landmark movement will be move to the undesirable
direction. In this research, we proposed method to create a new modeling of the
landmark movement based on the previous movement results. Four algorithms are
used to improve the landmark movement when the detection process. The
experimental results show that our proposed method produces the average of
detection accuracies more than 90% for all scenarios. |
Keywords: |
A New Model, Detection, The Previous Movement, Shape Model. |
Source: |
Journal of Theoretical and Applied Information Technology
April 2013 -- Vol. 50. No. 2 -- 2013 |
Full
Text |
|
|
|