Earticle

현재 위치 Home

International Journal of Hybrid Information Technology

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJHIT) [Science & Engineering Research Support Center, Republic of Korea(IJHIT)]
  • pISSN
    1738-9968
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.5 No.4 (16건)
No
1

An Empirical Research of Factors Affecting Collaborative Decision Making System

Lingxia Liu, Kisu Kim, Wei Sun

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.1-10

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper studies empirically business intelligence and social network service used to leverage the performance of collaborative decision making. A model is developed and tested empirically to find out meaningful relationships among those variables. This paper examines the current trend of social media within business intelligence, the importance of integrating these types of features within a BI solution, and why organizations should consider this type of functionality within their current decision making infrastructures. The result also shows that social media will increase in relation to use and expand within business related BI use, developing solutions that become easy to use is essential to successful collaborative decision making adoption.

2

Hybridizing Artificial Bee Colony with Simulated Annealing

Emad Mirsadeghi, Masoud Shariat Panahi

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.11-18

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A new hybridized Artificial Bee Colony (HABC) algorithm is presented. The exploration/exploitation balancing strategy of Simulated Annealing is incorporated into the original ABC algorithm to improve its search efficiency and reduce its computational cost. The algorithm begins with a high exploration rate and minimal exploitation effort and gradually switches to higher exploitation rates as the promising areas of the search space are identified. The proposed algorithm is applied to a number of benchmark problems. Comparison of the results indicates that in most cases the hybridized algorithm outperforms the other two algorithms.

3

BER Performance Analysis of a STBC Encoded Secured Multiuser MIMO-OFDM Wireless Communication System

Tanvir Ahmed, Md. Mortuza Ali, Shaikh Enayet Ullah

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.19-30

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper the BER performances are analyzed of a STBC encoded secured multiuser MIMO-OFDM wireless communication System. The 2X2 multi-antenna supported MIMO-OFDM system implements RSA cryptographic algorithm and ZF and MMSE based linear pre channel equalization schemes with deployment of various digital modulations (16-QAM, 16-PSK and 16-DPSK) over AWGN and Rayleigh fading channel. In this work the channel state information (CSI) is exploited at the transmitter side. It has been observed that the system under investigation outperforms with 16-QAM digital modulation and pre-MMSE channel equalization scheme and shows worst performance with 16-DPSK and pre-ZF. It is also observable that under situation of without implementing the pre channel equalization technique, the system provides satisfactory performance with 16-QAM and MMSE.

4

Application of Iterative Singular Value Decomposition De-noising to Centrifugal Compressor Signal Analysis

Hao Wang, Jinji Gao, Zhinong Jiang, Bo Ma

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.31-40

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Noise has great influence on the signal analysis for centrifugal compressor. In order to eliminate the noise, the iterative singular value decomposition (ISVD) de-noising is applied in this paper. Firstly, the algorithm of this method is introduced. It is based on singular value decomposition about the trajectory matrix of attractor which is reconstructed according to time delay embedding theory. Secondly, the accuracy of this method is tested by reconstructing the pseudo-phase portrait for the signal of Lorenz attractor. Comparing with the pseudo-phase portrait reconstructed from signal contained noise, the pseudo-phase portrait reconstructed after ISVD de-noising is more regular. Finally, this method is used in the centrifugal compressor signal analysis. By this method, the correlation dimension, which can reflect different fault condition for nonlinear system, is estimated accurately. It is proved that this method can reduce the noise effectively, which influences the correlation dimension computing a lot. This method can improve the nice rate of signal analysis.

5

Design New Control Methodology of Industrial Robot Manipulator: Sliding Mode Baseline Methodology

Farzin Piltan, Saleh Mehrara, Reza Bayat, Sajad Rahmdel

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.41-54

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Design a nonlinear controller for second order nonlinear uncertain dynamical systems is one of the most important challenging works. This paper focuses on the design of a chattering free mathematical baseline sliding mode controller (BSMC) for highly nonlinear dynamic robot manipulator, in presence of uncertainties and external disturbance. In order to provide high performance nonlinear methodology, sliding mode controller and baseline methodology are selected. Conversely, pure sliding mode controller is used in many applications; it has an important drawback namely; chattering phenomenon which it can causes some problems such as saturation and heat the mechanical parts of robot manipulators or drivers so baseline sliding mode controller is used to eliminate this important challenge. In order to reduce the chattering this research is used the switching function in presence of baseline method instead of switching function method in pure sliding mode controller. The results demonstrate that baseline sliding mode controller with switching function is a model-based controllers which works well in certain and partly uncertain system and have a better performance compare to pure sliding mode controller. Chattering free baseline sliding mode controller is stable controller which eliminates the chattering phenomenon without to use the boundary layer saturation function.

6

Formal Verification of a UML State Chart Diagram with Uppaal

Nianhua Yang, Xinshun Guo, Wenjie Wang

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.55-60

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Semantics of UML state chart diagrams and timed automata are represented by timed transition systems. Based on the semantic equivalence, a method for transforming a state chart diagram into timed automata is proposed for the purpose of formally verifying requirements specification described by simplified CTL (Computation Tree Logic, CTL). The timed automata and simplified CTL is used as inputs of Uppaal for model checking.

7

Efficient Design of Routing Node to Evaluate the Performance of Network Based Communication Infrastructure for SOC Design

Nilesh A. Mohota, Sanjay L Badjate

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.61-78

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The current trend in technology has lead to the emergence of complex Systems-on-Chip (SoC). Traditionally, shared busses were used for communication between the different components in an SoC in which a communication link is shared between components in a time-division fashion, resulting in a communication latency. To overcome the limitations of common bus based design we have proposed Network-On-Chip based SoC architecture. The aim of this work is to present a modified architecture of the routing node to achieve higher area and power efficiency using changes at the RTL architecture level. FPGA implementation of 4x4 Router has been performed on Xilinx Spartan-3 FPGA XC3S400. ASIC implementation has been done using Design Compiler and IC compiler of SYNOPSYS with 90 nm SAED technology library. It was found that the proposed router has latency of 4 clock cycles, occupies 0.2 sq. mm of silicon area and operates at 500 Mhz frequency.

8

Fuzzified FCM for Mining Sales Data and Establishing Flexible Customer Clusters

Toly Chen, Yu-Cheng Wang

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.79-84

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

RFM model is an important method in customer clustering. Some past studies have proposed fuzzy RFMs model to overcome the shortcomings of traditional RFM models. However, there are some problems unsolved in these approaches. To deal with these problems and to enhance the flexibility in customer clustering, the traditional fuzzy c-means (FCM) method is fuzzified to deal with R, F, and M scores that are expressed in fuzzy values. A fuzzified RFM model is then established by incorporating the fuzzified FCM approach, which is based on the inherent structure of the data itself. The number of customer clusters can be arbitrarily specified in advance, considering the scarcity of marketing resources and the diversification of marketing strategies. Besides, exploring the content of each customer cluster provides the business with many meaningful suggestions that could be usefully employed to establish target marketing programs. An example is adopted to demonstrate the application of the proposed methodology and to make some comparisons.

9

Mobile Robot Path Planning Based on Dynamic Fuzzy Artificial Potential Field Method

Qiang Song, Lingxia Liu

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.85-94

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Traditional artificial potential field method has the problem of local minimum and can not satisfy the requirements of real-time mobile robot path planning, security and accessibility in dynamic environment. To deal with the problems, through taking the advantage of velocity vector, modifying potential field force function, and integrating with the fuzzy control method, adjusting the factors of repulsion potential field in real time, a new method is proposed to overcome the shortcomings of artificial potential field method. To validate the proposed method, simulation experiments are conducted in MATLAB platform, and experimental results demonstrate that the performance of this proposed method is better than the traditional artificial potential field model.

10

Feature based Star Rating of Reviews: A Knowledge-Based Approach for Document Sentiment Classification

Shaishav Agrawal, Tanveer J. Siddiqui

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.95-110

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents a novel knowledge-based approach for star rating of reviews. It uses SentiWordNet and linguistic heuristics to determine sentiment orientation of sentences, which is used to assign a positive, negative and objective score to document to achieve 5-star rating of movie reviews. A method for generating ratings based on individual features is also presented. The experimental results on sentiment scale dataset demonstrate the effectiveness of our approach.

11

Proposed Technique for Improving the Efficiency of Communication by Using Hamming Code along FHSS

Rahat Ullah, Shahid Latif, Adeel Ahmad, Amjad Ali

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.111-118

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper a technique is offered for improving the efficiency of communication. The prime objective of any Communication Technique is not only to make the communication clear, efficient and noise free but also to make the communication well secured from its interception from unauthorized users in both commercial as well as in defense communication. For this purpose nowadays the most commonly used technique is frequency hopping. The hopping technique is characterized by its flexibility of changing hopping carrier i.e, change of carrier randomly that is if it is intercepted by unauthorized user the hopping pattern should be changes at any time. There will be no need of synchronization at transmitter and receiver side i.e at any time if the transmission is taking place and the receiver comes into power in the middle of transmission, than the receiver can receive the information at any instant. The error may occurs in the information during passing through the channel, and there will be the need for re-transmission , so for that reason we will apply Hamming code before transmission so that at the receiver side if the error occurred through the channel than that error will be detected and corrected at the receiver side without retransmission because of which the competence will be improved.

12

E-Business Lаndsсарe in Developing Countries: Focused on Kаzаkhstаn

Ha Jin Hwang

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.119-132

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

E-Business has gained much attention as a new opportunity to provide global competitiveness for companies in developing countries. This study is primarily focused on critical success factors of e-Business systems in developing countries, especially in Kazakhstan. This study aims to provide a framework to unfold the barriers and challenges so that companies in Kazakhstan take benefit of making а right decision for e-Business implementation. To achieve the goal of the research, the survey was conducted to assess and understand the lаndsсарe of e-Business in Kazakhstan аnd identify the key suссess fасtors which can be utilized in improving the design and implementation of e-Business systems. Kazakhstan, as a leader of Central Asia, has a great potential to impact expansion of e-Business systems in this region. In order to prepare a well designed e-Business systems which reflect success factors identified in this study, a framework to develop a landscape design for e-Business systems might be necessary. This study revealed critical factors affecting successful implementation of e-Business in Kazakhstan, which has shown the reality of success factors in developing countries. It is expected that success factors identified in this study can be utilized in designing and implementing e-Business systems in developing countries. In addition, it might be desirable to stay aware of opportunities and challenges, and see it as an initiative to improve businesses rather than the solution, especially in developing countries.

13

Location Technology-Based Mobile Shopping Service System

Jin Liu, Tianlun Chen, Jialiang Bao, Jeong-Uk Kim, Jin Wang

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.133-142

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we propose a novel location technology-based shopping service system (LSSS); describe its design methodology and implementation detail. LSSS incorporates handheld terminals, resource management system and wireless location technology together to make a whole system. The service provided by the system can make customers in a shopping mall conveniently get product information, notice their current location, figure out proper shopping route when multiple choices are in the shopping list, obtain the navigation information and receive other related innovative services. The successful case experiments proved the feasibility of LSSS in real shopping practice.

14

Research on Engineering Software Data Formats Conversion based on Complex Network and Voronoi Diagram

Wenbin Zhao, Zhengxu Zhao

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.143-156

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Disperse engineering information constitutes a domain of complex relationship, into which research using complex network could contribute significantly to its organization and preservation. A complex network which takes engineering software data formats as nodes is constructed and its statistical characteristics which include directed edge or undirected edge, the node number, the edge number, average path length, clustering coefficient and node degree distribution, etc, are analyzed in this paper. Voronoi diagram based complex network visualization method and its retrieval method are provided. According to statistical characteristics of constructed network, visualization method calculates network nodes’ position in a two-dimensional plane and divides this plane into Voronoi diagram by feature nodes of network nodes’ clustering and network nodes. Retrieval method restricts compared nodes to nodes in Voronoi domain of feature nodes which are more related to query node, so that the number of compared nodes is reduced in retrieval process. The experiment result indicates applying this method into data formats conversion path retrieval can ensure retrieval precision and improve retrieval efficiency, thus provide reliable basis for migrating numerous disperse engineering information.

15

Towards Privacy-Preserved Query Optimization on Microblog Data

Jie Zhao

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.157-170

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Microblog platform, such as Twitter and Sina, has been one of the major ways of information diffusion in modern society. However, although microblog has been proven to contain lots of information, it is really hard for people to find useful information on it. Besides, some information in microblog such as user IDs is not allowed to publish due to privacy policies. Thus the queries on microblog data can be regarded as privacy-preserved queries. One of the challenged issues is the poor performance of answering privacy-preserved queries over microblog data, which owes to the large and increasing volume and the complex social network structure of microblog data. In this paper, we propose a basic idea to optimize the privacy-preserved queries on microblog data. We use a query-specific approach to treat the queries, i.e., the microblog data is first preprocessed according to the specific requirements of different types of queries, which are then organized through some indexing structures. Our preliminary experiments on real microblog data show that this approach has reasonable performance.

16

A Novel Sub-optimum Data Transmission Algorithm for Wireless Sensor Networks

Jin Wang, Bo Tang, Tinghuai Ma, Yuhui Zheng, Jeong-Uk Kim

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.5 No.4 2012.10 pp.171-178

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Wireless sensor networks (WSNs) are composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it. Energy efficiency and network lifetime are two challenges that most of researchers deal with. In general, base station (BS) used to retrieve data from sensor nodes is far from the sensor field and how to adjust the communication between nodes and BS to achieve energy efficiency and long network lifetime is very important. In this paper, we propose a novel sub-optimum Average Lifetime-oriented Long-distance (ALL) data transmission algorithm. It makes tradeoff between energy cost and residual energy and balances lifetime among all sensor nodes to achieve dramatic lifetime prolongation for network. Simulation results validate that ALL algorithm outperforms traditional protocols or algorithms and prolongs network lifetime dramatically.

 
페이지 저장