2016 (464)
2015 (452)
2014 (204)
2013 (106)
2012 (70)
2011 (24)
2010 (15)
2009 (31)
2008 (42)
Research of DSP-based Embedded Systems Connected to the Internet
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Ant Colony System: A New Concept to Robot Path Planning
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.11-30
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A variation of Ant Colony System (ACS) is represented in this paper and applied for the Robot Path Planning (RPP) purpose. The algorithm shows a new way to find the shortest path from source to destination in offline mode with the application of in-build path map by following the Robot Path Algorithm (RPA), introduced in this paper. Robot always follow the path map provided to it to find the shortest path as well as it can achieve the knowledge that in which direction, i.e. from one node to the next node, it will have to move. The movement of the robots is based on the movent technique of the ants in the ant colony. Among all the algorithms for finding the shortest path, the proposed Shortest Path Algorithm (SPA), based on Kruskal algorithm, is much more effective and accurate for the RPP problem and will take less computational time and hence increase the efficiency of the work process of the robot system.
A New Quadtree Histogram-based Spatial Modeling based on Cloud Model
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.31-40
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Spatial modeling is one of the most important parts in the area of spatial relations, and it is necessary to develop a new model with high practicality. Firstly this paper analyzes the characteristics and defects of present models; secondly introduces in detail the construction method of quadtree histogram; thirdly cloud model are used to judge spatial directional relation. The experimental results show that the model is feasible.
Study on Electronic Commerce Credit Scoring Model Based on the Dynamic Adjustment of Multi-factors
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.41-50
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the development of electronic commerce, the credit problem has become a bottleneck for the development of E-commerce, through analysis of E-commerce credit evaluation factors, using the factor analysis and dynamic adjustment mode, construction of electronic commerce credit evaluation model. Through the experimental simulation, the model can effectively reduce the influence of electronic commerce credit due to negative or positive reviews, and further improve the E-commerce credit system, provides a theoretical basis for the development of E- commerce credit scoring system.
An Adaptive Redundant Reservation Strategy in Distributed High-performance Computing Environments
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.51-64
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In distributed high-performance computing environments, resource reservation mechanism is an effective approach to provide desirable quality of service for large-scale applications. However, conventional reservation service might result in lower resource utilization and higher rejection rate if it is excessively applied. Furthermore, redundant reservation policy has been widely applied in many practical systems with aiming to improve the reliability of application execution at runtime. In this paper, we proposed an adaptive redundant reservation strategy, which uses overlapping technique to implement reservation admission and enable resource providers dynamically determine the redundant degree at runtime. By overlapping a new reservation with an existing one, a request whose reservation requirements can not be satisfied in traditional way might be accepted. Also, by dynamically determining the redundant degree, our strategy can obtain optimal tradeoff between performance and reliability for distributed high-performance computing systems. Experimental results show that the strategy can bring about remarkably higher resource utilization and lower rejection rate when using redundant reservation service at the price of a slightly increasing of reservation violations.
Quality Requirements Framework For Resolution of IT Requirement Management Challenges
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.65-76
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Primary reason for IT project failures remains ineffective requirements specification. The “code-only” mindset is greatly to be blamed. Requirement Management has its own dimensions even though its primary existence remains intertwined within the Software lifecycle. As it is a novel management discipline it faces and suffers from issues and challenges. In this research a Quality Requirements Framework and prototype has been proposed to address contemporary challenges.
The Determination of Workpiece Fixturing Scheme Based on Gray Relation Analysis Method
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.77-90
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The design of machining fixtures is a highly complex process that heavily relies on designer experience and his/her implicit knowledge to achieve a good design. The determination of fixturing scheme is an optimizing problem with multi-objective and multi-constraint. In order to evaluate the fixturing scheme objectively, a fixturing design scheme selection objective system is developed according to the feature of multi-level and multi-index of fixturing design scheme. With location accuracy, contact force, workpiece deformation and successive fixturing as the objective functions, the optimization selection of mathematical model of fixturing design scheme is established, then it is solved by gray relation analysis and analytic hierarchy process. The method provides a qualitative and quantitative combining analysis for a fixturing design scheme: (a) verifying whether a particular fixturing scheme is valid with respect to locating stability, deterministic workpiece location, clamping stability and total restraint and (b) determining the optimal fitness value based on integrate performances. An example is presented to demonstrate the effectiveness and the capabilities of the methodology. The study shows the gray relation analysis and the analytic hierarchy process can improve selecting quality for determination of fixturing design scheme.
The Design and Control Simulation of Trans-femoral Prosthesis Based on Virtual Prototype
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.91-100
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Intelligent bionic leg (IBL) is an advanced trans-femoral prosthesis. It can compensate basic movement function of amputees. The prototype of IBL is introduced in the paper. The existing torque devices of knee joint are analyzed and dynamics model of IBL is deduced. An ideal test-bed of IBL is proposed and it can generate the various moments of human healthy leg. Using software Pro/E, ADAMS and MATLAB/Simulink, the virtual prototype of IBL and its simulation platform is built. The combined control simulation based on neural network indicates that IBL controlled by magneto-rheological (MR) damper can track human healthy leg’s gait well.
Fault diagnosis of Steam Turbine Generator Unit Based on Support Vector Machine
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.101-108
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In allusion to the lack of a large number of fault data samples in machinery fault diagnosis, the thesis put forward a new method of machinery fault diagnosis based on support vector machine. And the principle and algorithm of the method has been introduced. Then the multi-fault classifier has been built using simulative fault data. This diagnostic method only need a small amount of time-domain fault data samples to train the fault classification, and don’t need to extract the feature amount. In addition, we verify the correctness of this fault classifier through the application of fault classification in steam turbine generator set. The diagnostic method is simple and has strong ability of fault classification.
Detecting Arabic Cloaking Web Pages Using Hybrid Techniques
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.109-126
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Many challenges are emerging in the every day expanding Internet environment, whether for the Internet users or the Web sites owners. The Internet users need to retrieve the high quality relevant information which are relevant to their queries within a short period of time, in order to be a regular users who satisfied by search engine performance. While the Web site owners aim in most cases to increase the rank of their Web pages within SERP to attract more customers to their Web sites, and consequently gaining more visits, which in turn means more revenues. The top rank of the Web pages within SERPs, is very important to the e-commerce and commercial Web pages. The owners of Web sites can attract more visitors to their Web pages, and gain more revenue, through Pay Per Click when their pages appear in the top results of SERPs. This paper proposed new approach of Arabic Web spam detection, dedicated with the cloaking Web pages, using hybrid techniques of content and link analysis. The proposed detection system built the first Arabic cloaking dataset contains around 5,000 Arabic cloaked Web pages. The proposed system extracts all possible rules from HTML element to monitor the cloaking behaviors, and then used three classification algorithms (K-NN, Decision Tree, and Logistic Recognition) in the experimental tests. This novel system yielded a high accuracy results with an accuracy of 94.1606% in detecting cloaking behaviors in Arabic Web pages.
Discussion on Writing of Recursive Algorithm
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.127-134
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Writing a program with the recursive method is a simple and effective way of program design, making the logic of the program concise and clear. This paper will focus on the analytical program, writing method of the recursive algorithm, as well as the optimization of recursive program. Formula method or mathematical induction can be applied for writing of the recursive algorithm more simply. Meanwhile, either of them could provide the method of tail recursive to deal with the problem lies in recursive algorithm that massive time and space of the system are occupied.
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.135-148
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Virtual prototyping is always used to validate a design by simulating the behavior of mechanical products. As concerning problems of the current researches on product integrated information modeling technology, this paper presents a new systematic integrated information modeling technology based on virtual prototyping. After the 800t jacking system of an offshore platform is introduced, the design process of virtual prototyping-based jacking system is discussed in detail, and then the virtual prototyping modeling of the jacking system is also put forward. A computer aided virtual prototyping software system is developed, which has been put into practice in a plant of offshore engineering. The realization of the driving function module is given as an example, which demonstrates that the methodology is obviously helpful for product integrated information modeling.
A Quick Query Methods for ONS System based on EPC
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.149-160
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
EPCGlobal proposed for the domain name (DNS) service based on the object name service (ONS) design standards, prone to slow query response ONS system, data logging, storage space, cannot meet a single product inquiry and other issues. This paper presents a separate DNS service, the use of regular expressions and match data records stored ONS system design and implementation, test results show that independent of the DNS service ONS system has a data record storage space and query response speed, meet single product inquiries and so on.
A New Model on the Spread of Malicious Objects in Computer Network
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.161-176
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, an attempt has been made to develop a compartmental Epidemic model on the transmission of malicious objects in a computer network with natural death (that is, crashing of nodes due to the reason other than the attack of malicious objects) and vertical transmission. In this model there are two possibilities of computer network: one of high infectious server nodes having high intensity rate of malicious attack while another is low infectious client nodes having low intensity rate of malicious attack. The high infectious server nodes transfer the malicious objects to the low infectious client nodes in the computer network. The low infectious client nodes recover with temporary immunity and becomes again susceptible to the high infectious server nodes but at a lower rate. This needs to develop effective immunity after a period of time and a fully automatic defense mechanism to protect computer networks from modern and fast propagating worms. The stability of the result is stated in terms of the Jacobian of the system and the basic reproduction number is also well-defined. Numerical methods and MATLAB are employed to solve and simulate the system of equations developed and analysis of the model gives remarkable exposure.
Smart Subway Information Platform based on Internet of Things
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.177-186
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Focused Crawler Research for Business Intelligence Acquisition
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.187-194
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The internet has become indispensable part of people's life. For enterprises, there are mass of valuable information in the internet. It not only includes competitor information, but also includes customer’s evaluation of products. These information is an important source of business intelligence. This paper aims to build a focused crawler to filter business intelligence from vast amounts of information in the internet. The crawler takes a certain number of web pages as seed. Then extract URLs in these pages, and parse main text of every URL. After that, the crawler calculates relevancy between every main text and the crawler’s topic based on VSM (vector space model) and TF-IDF (Term Frequency-Inverse Document Frequency). If a web page is relevant, it will be saved; otherwise, it will be discarded. At last, an experiment is done to test the performance of crawler. It can be seen that the recall rate and accuracy of the crawler is very high though the result of this experiment.
Implementing a Consistency Checker for Uncertain or Incomplete Temporal System
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.195-202
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Briefly presenting a generalization of Allen's interval-based approach to temporal reasoning, this paper will see point & typed-based structure of time intervals as an intended model of point & interval-based time theory to illustrate a Consistency Checker for Uncertain or Incomplete Temporal System which can be used to check whether there are circuit(s) among the temporal intervals and whether the temporal intervals are consistent or not, and this paper also succinctly discourses the future work about how to find the best solution of this checker.
Verication of Embedded Real-Time Systems Using Symbolic Model Checking : A Case Study
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.203-216
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents a case study for symbolic model checking (SMC) with Propositional Projection Temporal Logic (PPTL). First, PPTL is briefly introduced. Then an outline of symbolic model checking algorithm for PPTL proposed in [21] is presented. As a case study, a single-track railroad crossing control system (STRCCS) is employed to illustrate how SMC for PPTL can be utilized in the specification and verification of embedded real-time systems.
An Efficiency Optimization Method for Mobile Application with Reconfigurable Software
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.217-224
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper discusses the efficiency optimization for mobile application. By adopting reconfigurable software architecture, a dynamic reschedule method is proposed. Modeling the overheads of single operation, the uncertainty caused by control structure is represented with experienced data and branch prediction. Several criteria are proposed considering different situation.
Comparative Study of Optical Unipolar Codes for Incoherent DS-OCDMA system
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.225-236
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In incoherent Direct Sequence Optical Code Division Multiple Access system (DS-OCDMA), the Multiple Access Interference (MAI) is one of the main limitations. To mitigate the MAI, many types of codes can be used to remove the contributions from users. In this paper, we study two types of unipolar codes used in DS-OCDMA system incoherent which are optical orthogonal codes (OOC) and the prime code (PC). We developed the characteristics of these codes i,e factors correlations, and the theoretical upper bound of the probability of error. The simulation results showed that PC codes have better performance than OOC codes.
Development of CMOS Image Sensor System based on Chaos Particle Swarm
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.237-248
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Particle swarm optimization algorithm in solving complex functions, such as slow convergence, accuracy is not high, easily falling into local optimum problem. Based on the chaos optimization is introduced into particle swarm optimization algorithm, given the chaotic particle swarm optimization algorithm. In order to improve the image quality of CMOS image sensor, the image of the main noise source and the distortion of image analysis, this paper present the development of CMOS image sensor system based on chaos particle swarm. Computer CMOS image sensor image quality simulation, the results show that chaotic particle swarm optimization algorithm convergence performance is better than that of particle swarm optimization algorithm.
An Improved Framework for Managing Requirements Changes
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.249-258
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The management of requirements changes is an important task in requirement engineering, and the request for changing requirements occurs after the establishment of the requirements specification should be handled more charily. The logic-based techniques have attracted great attention, Ke-Dian Mu and others adopted the negotiation-style revision proposed by Booth to manage the requirements changes effectively. Based on Mu’s work, this paper improves the method of equivalence classes division, and proposes the “4 equivalence classes” division method, which improved the negotiation efficiency to some extent, perfected the original framework.
Path Analysis on the Antecedents of IT Application Innovation Level : An Empirical Investigation
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.259-268
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The study empirically tested a research model for identifying the linkages among IT management mechanism, IT application level and IT application innovation level, based on a sample of 530 manufacturing enterprises in Jiangsu Province, China. Results indicated that IT management mechanism had significant and positive influences on IT application level and IT application innovation level. Meanwhile, IT application level had a fully mediating effect between IT management mechanism and IT application innovation level. This research might be some new implications for the managers of manufacturing industry to improve their organizations’ IT innovation level.
At-Speed Wordy-R-CRESTA Optimal Analyzer to Repair Word-Oriented Memories
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.269-280
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Defect probabilities in embedded memories have been increased by the scaling reduction in advanced VLSI technology. Built-In Self Repair (BIRA) circuit design is a solution to improve the yield drop and get to a high reliability. This paper will present an at-speed optimal algorithm to repair Word-Oriented memories. In spite of parallel structure in our analyzer to get high analysis speed, the area consumption of the circuit has decreased considerably due to the optimal algorithm. The repair rate of the proposed method is also 100% because of applying the binary search three as its foundation. Simulation results and comparison with other methods show the efficiency of the Wordy-R-CRESTA analyzer method.
Enterprise Business Processes System Analysis and Design
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.281-290
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Botnet Detection Based on Correlation of Malicious Behaviors
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.291-300
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Botnet has become the most serious security threats on the current Internet infrastructure. Botnet is a group of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Command and Control (C&C) infrastructure. Botnets can not only be implemented by using existing well known bot tools, but can also be constructed from scratch and developed in own way, which makes the botnet detection a challenging problem. Because the P2P (peer to peer) botnet is a distributed malicious software network, it is more difficult to detect this bot. In this paper, we proposed a new general Botnet detection correlation algorithm, which is based on the correlation of host behaviors and classification method for network behaviors. The experimental results show the proposed approach not only can successfully detect known botnet with a high detection rate but it can also detect some unknown malware.
Server Re-Tag Provable Data Possession in Public Cloud
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.301-310
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Multi Beam DOA Estimation Using Robust Convergence Adaptive Algorithm
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.311-320
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Smart Adaptive Array antenna can automatically track the unknown interference signal in real time applications, that it requires to provide nulls towards the interference and offer gain to the required signal to ensure the required signal reception, so it leads the output SINR (signal to Interference and Noise Ratio) is improved. There is a growing need for the development of efficient algorithms for real-time optimization. Several algorithms can be applied for Digital Signal Processors (DSP), which differ in their complexity, convergence and so on In this paper, an efficient method for the DOA estimation of the linear antenna arrays with the prescribed steering and nulling lobe is presented. The proposed method is based on Least Mean Square (LMS) algorithm; provide a comprehensive and detailed treatment of the signal model used for beam forming, as well as, describing adaptive algorithms to adjust the weights of an array. In order to improve the convergence rate of LMS algorithm in smart antenna system, this paper proposes the GNGD algorithm. By taking advantage of spatial filtering, the proposed scheme promises to reduce the bandwidth required for transmitting data by improving convergence rate. The performance of the GNGD algorithm in the presence of Multi-path effects and multiple users is analyzed using MATLAB simulations. The simulations when compared to that of the LMS algorithm greater improvement in the convergence rate are observed. The results suggest that GNGD algorithm can improve the convergence rate and lead to better system efficiency.
An Robust Watermarking Algorithm based on Coefficients Group Quantization
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.321-332
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With spreading of digital contents, stealing other’s properties by unpermitted people have become easier. In order to protect the legitimate rights of owners, the digital watermark technologies are becoming more popular. In this paper, we propose an audio watermarking algorithm based on DCT coefficients and audio feature quantization. The proposed algorithm protects watermark information using several factors, such as filtering, audio feature extraction formula, quantization value, etc. Furthermore, in order to evaluate the performance of our proposed algorithm, we experiment our algorithm under the attacks such as low pass filtering, noise addition, and compression. From the experiment result, we can see that the proposed algorithm has high robustness.
Constraint Programming based Virtual Cloud Resources Allocation Model
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.6 No.6 2013.11 pp.333-344
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.