2016 (464)
2015 (452)
2014 (204)
2013 (106)
2012 (70)
2011 (24)
2010 (15)
2009 (31)
2008 (42)
Applying Multi-Criteria Method to the Decision of Assessment Tools for High-care Student Groups
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.3 2013.05 pp.1-14
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
An effective assessment tool can prevent student dropout problems that are a continuous concern in the educational world in advance. If students can be screened before dropping out and offered preventive counseling, their risk behaviors will be more effectively controlled than if they are found and returned to school. Researchers are diligently developing efficient and effective assessment tools in the name of “prevention over treatment.” A multi-criteria decision making method that is the analysis hierarchy process (AHP) is applied for professional counselors and uses questionnaires to select a series of key criteria for high-care group assessment tools that can be adopted in school counseling units in this paper, and it is a multi-criteria decision method and is also used to establish a model for selecting assessment tools for high-care students groups in vocational high schools. The proposed model can offer counseling units in vocational high schools in Taiwan an objective and effective method for selecting optimal assessment tools.
Test Case Generation from Formal Models of Cyber Physical System
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.3 2013.05 pp.15-24
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Formal methods and testing are two important approaches that assist in the development of cyber physical systems. Formal specification can be used to assist testing and Formal methods and testing are seen as complementary. In this paper, we address the problem of generating test cases for cyber physical systems from formal specifications using differential dynamic logic(DL), a logic for specifying and verifying hybrid systems.
QoS Guarantee for VOIP over Wireless LANs
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.3 2013.05 pp.25-32
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Voice over Internet Protocol (VOIP) is one of the most notable applications of internet. Some other well known terms used for VOIP in literature include IP telephony or Internet telephony. It can be a better replacement for the traditional telephone systems because of its high resource utilization as well as low cost. Beside this, wireless LAN Network (WLAN) has emerged as a robust networking technology. Hence, the combination of these two popular technologies is growing so fast all over the world. Voice over WLAN (VoWLAN) will be an infrastructure to provide low-cost wireless voice services. However, similar to other wireless applications, VoWLAN has also faced numerous challenges that need to be considered. Quality of Service (QoS) is one of the essential challenges in all kind of wireless applications. In this study, we have critically reviewed the most important QoS requirement; the challenges imposed by these applications as well as some of the QoS enhancement methods.
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.3 2013.05 pp.33-44
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A new technique of dual-compatibilities free-interface component mode synthesis (CMS) was derived by transforming link substructure into super element with Guyan static condensation. The new CMS technique has high calculation accuracy, can efficiently reduce degree of freedom (DOF) of the system, thus, it has a widespread application prospect in dynamic analysis of the structures containing nonlinear link components such as Lead Rubber Bearing (LRB), nonlinear spring, etc. Based on the new CMS technique and the general free-interface CMS method, the inherent characteristics of a truss bridge, rigid or LRB linked, in the Automatic Container Terminal (ACT), was compared. The results show that LRB has obvious effect on truss bridge structural frequency modulation. Structural dynamic model similarity principle with respect to inherent characteristics is achieved with dimensional analysis method. Accordingly, a miniature model for the truss bridge is designed to test frequency response by the hammer method. The results of model test and prototype simulation prove with each other, that the simulation results and the test design are reliable, also validates the proposed CMS technique and the LRB’s effect on frequency modulation.
Specification of Cyber Physical Systems Based on Clock Theory
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.3 2013.05 pp.45-54
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Cyber Physical Systems are integrations of computing, communication and control sys- tems, and CPS make it possible to link the physical world and discrete world much more tightly and accurately. Though the appearance of CPS has triggered a great revolution to the electronic, information and internet technology, many problems still need to be solved when using the existing theories and technologies especially the description and analysis of time in Cyber Physical Systems. Clock theory puts forward the description of time and corresponding mechanism. This paper aims to apply the clock theory to the specication of Cyber Physical Systems.
Protocol Identification System Based on Apriori Algorithm
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.3 2013.05 pp.55-64
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents a set of programme to extract the application-layer protocol features. Based on frequent itemsets mining, the program automatically extracts four most common features of a protocol: characteristic string, session tag, packet length, and packet order. It is experimentally demonstrated that this progran can significantly improve the efficiency of feature extraction, and can be extended to other areas such as intrusion detection and extracting worm signature.
A Study on the Impact of Multiple Failures on OSPF Convergence
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.3 2013.05 pp.65-74
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Open Shortest Path First (OSPF) is a popular link state routing protocol widely used in Internet infrastructure. OSPF implements several timers to limit the protocol overhead. With these timers, it usually takes several tens of seconds for OSPF network to recover from a failure. The convergence time is delayed mainly by the timers of failure detection and routing calculation scheduling. In this paper we analyze OSPF convergence behavior in presence of multiple failures, where the interactions between failure detection and routing calculation scheduling could generate complicated dynamics during convergence process. We also present experimental study to understand the impact of multiple failures on convergence. The results demonstrate that multiple failures have a greater chance to delay the convergence. This suggests that operators should take it into account while configuring OSPF network.
LabVIEW Based Ventilator Algorithm Design
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.3 2013.05 pp.75-82
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper focused on the design of ventilator algorithm and Hardware-in-Loop Simulation on the LabVIEW based ventilator control system. The ventilation algorithm had a double-layer structure. The upper layer was ventilation mode algorithm, while the lower layer was PID control algorithm. They worked at different periods. The lower layer served the upper layer and to achieve the constant voltage or constant current control the upper layer required. The upper layer determined the functionality of the ventilator, while the lower layer determined the performance of the ventilator.
Fuzzy Sequential Patterns Summarization with Lattice Structure
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.3 2013.05 pp.83-94
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Data mining is new but an interdisciplinary field utilizing statistics, machine learning, and other methods. In recent years, fuzzy logic has also been applied to augment data mining. The application of fuzzy logics makes the mining results more understandable and interpretable, apart from being useful and informative. Fuzzy rules are useful to summarize large databases. Several studies are done on fuzzy association rules. In our study, we argue that it is important and interesting to mine rules with timing information, as given by fuzzy sequential patterns. We propose the use of lattice structure for the summarization of fuzzy sequential patterns. We show that mining such rules requires managing a lot of information and we propose the use of lattice structure.
Anti-collision Algorithm based on Multi-threaded RFID Lock Position
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.3 2013.05 pp.95-104
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Combined with lock algorithm, retreat algorithm and multithreaded processing thoughts; it puts forward an anti-collision algorithm based on multi-threaded RFID lock position. RFID reader sends a quad command, RFID tag response the information of collision position, reduce the amount of data transmission; Fused with lock and multi-status thoughts, the algorithm checks the lock position of card numbers, and continuously separates the status of card numbers in the searching process. Using multithreaded processing idea, tags are classified by the algorithm, and collision handling time is shortened. The algorithm solves the problem of idle thread by tag group. From the test results, compared with the original algorithm, this algorithm reduces the times of collision identification and digit number of data transmission, and improves the system performance.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.