2016 (464)
2015 (452)
2014 (204)
2013 (106)
2012 (70)
2011 (24)
2010 (15)
2009 (31)
2008 (42)
Trustworthiness Measure Platform of Intelligent Subway Information System
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.1-12
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the development of urban rail transit, the wisdom subway information system based on the technology of wireless sensor network and RFID emerged at the right moment. This paper analyzes the framework of the wisdom subway information system and studied the system trustworthiness in detail. We develop a measurement model that provides a new method for measuring the software trustworthiness and a platform used to measure the software trustworthiness of the information system.
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.13-24
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In recent years, strategic fit issues attract both academia and practitioners due to the debate of productivity paradox of information system (IS). This study provides a comprehensive literature review on the strategic fit issues in IS research and suggest some future research directions. In detail, conceptualization of strategic fit in IS research, operationalization of related constructs, and antecedents and consequences of strategic fit are included. The main contribution of this study is to explicitly and critically investigate the current status of strategic fit research in IS area. Theoretical background of fit studies in strategic management is also reviewed to explore theoretical and methodological support in future research.
A Novel Mechanism on Network Selection for Fourth Generation Communication Networks
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.25-42
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In a heterogeneous networking environment of Fourth Generation communication technology, there will have a coexistence of different radio access technologies to serve the user. The users will always try to get the best service from the heterogeneous network. So selection of best access network at a particular time will be problematic and challenging. There will be a conflict between the network technologies of a heterogeneous networking system. We have taken into account the influence of some factors on which the selection of best access network will depend. Also, we have tried to solve the network selection problem by using Game theoretical concept. By using the concept of strategy space, quality points and weighting factors in the game theoretical model, a mathematical way for selecting the best network is demonstrated. The paper introduces the concept of optimum network selection mechanism from any number of competing networks. Lastly it is shown that the best connected networking system can always be possible in 4G communication network using this network selection mechanism efficiently.
A New Structural Analysis Model for E-commerce Ecosystem Network
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.43-56
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A Study of Short-term Effect Measurement for Information Publication in Government Microblog
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.57-66
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
From the microcosmic point of view, based on AISAS model, aiming at real cased and data of government microblog information publication, this article makes a quantitative empirical research using correlation analysis and regression analysis and construct a quantitative model to measure the short-term effect of government microblog information publication. The measurement model lay a theoretical basis for improving effect of government microblog information.
A Game-theoretic Approach for Efficient Clustering in Wireless Sensor Networks
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.67-80
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In wireless sensor networks, clustering divides network into clusters and makes cluster heads (CHs) responsible for data aggregation. CHs play a significant role in such topology and focus should be fixed on the CH selection. Due to the constraints on available resources, however, a sensor node is likely to be selfish and refuse to serve as a CH. Based on game theory, this paper models the problem and discusses the condition of Nash Equilibrium. Moreover, in case of disconnection between a CH and the sink, data replication is adopted. We set candidate CHs that replicate data in the original CHs respectively under the scenario of a second price sealed auction. Simulation results show that nodes have tendency to cooperate due to the reduction in delay and loss rate. Moreover the throughput of the sink can still be guaranteed if any CH fails to work.
Fault Pheromone Trail Evaporation of Power Distribution Networks using Ant Colony Optimization
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.81-90
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The paper presents an ACO Based Pheromone Trail Evaporation method for fault searching in Power Distribution Networks.ACO Based Pheromone Trail Evaporation method is ‘co-operative agent approach’, which is inspired by the convergence rate and behavior of real ant colonies for finding a shortest path to reach food. Hence, in the proposed method is a set of co-operative agents called ‘ants’ co-operates to find a better solution for evolutionary fault searching. The ACO Based algorithm applied for better way for finding fault behavior and point of fault is evaluated on IEEE, 30, 52,190 Test bus systems. The proposed approach is compared with a normal conventional fault in power distribution network.
A Connectivity-based Strategy for Roadside Units Placement in Vehicular Ad Hoc Networks
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.91-108
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In urban scenario, the imbalanced spatial distribution of traffic flow exerts an important influence on the performance of communication between vehicles and the Roadside Unit (RSU). This paper presents a strategy for RSUs placement based on the road traffic characteristics, aiming at improving connectivity in vehicular ad hoc networks. To divide the coverage area of each RSU, we propose an Expansion and Coloration Algorithm (ECA). The average connectivity model for all vehicles in the network is established based on the results obtained from ECA. The RSUs placement problem is formulated as a combinatorial optimization problem, of which the objective is to maximize the average connectivity probability by searching for an optimal position combination of the given RSUs. Taking part of an actual urban road network as an example, the RSUs placement problem is calculated and the optimal placement scheme is evaluated. Simulation results show that the optimal placement scheme obtained from our strategy leads to the best connectivity compared to uniform placement and hot-spot placement.
Image Forgery Detection Based on Semantics
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.109-124
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The development of powerful image editing software has made it easy to create visually convincing digital image forgeries. Recently some research works based on general low-level visual features in the field of digital image forensics have been conducted to address this problem. However, there has been little work by analyzing the high-level semantic content of the image. This paper discusses the forgery detection problem of digital image from the point of high-level semantic, and proposes the framework of image forgery detection based on semantics. The framework consists of three components including image recognition, semantic logic reasoning engine and generation of semantic rule. A new fuzzy logic semantic reasoning model for image forgery detection is proposed in this paper. Our reasoning model based on fuzzy logic can give the deterministic and uncertainty reasoning results. Based on the proposed framework of image forgery detection, the prototype system of image forgery detection based on semantics is completed using MATLAB, MySQL database software and ontology software protégé and has the ability to detect abnormal splicing from the foreground and background, avoiding detection using the traditional methods based on low-level image features. Experimental results show that the framework and logic semantic reasoning model for image forgery detection are effective.
A Dynamic Programming Model to Optimize the Capacity Control with the Priority of Air Cargo
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.125-136
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper concentrates on the problem of the air cargo space management strategy with a comprehensive, abstract and simplified way, on the basis of the actual characteristics of transport demand in China's air cargo market. We focus on the urgent transportation of goods and general cargo transport whose time requirements are different. The paper first proposes a single-leg cargo space management dynamic programming model according to the different time limit of different kinds of goods, and then the two dimensional single-leg air cargo problem is transformed into one dimensional two-leg airline network problem. After that, we use the expanded method of dynamic programming decomposition to solve the model. A numerical example is solved and simulated to verify the effectiveness of the program.
Comparative Study of Hyperelliptic Curve Cryptosystem over Prime Field and Its Survey
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.137-146
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Public key cryptography is the famous cryptography technique used in many corporate sectors for developing software to provide security services. Hyperelliptic Curve Cryptosystem (HECC) is one of the public key cryptographic technique, an expansion of Elliptic Curve Cryptography which offers the similar level of security compared with other cryptosystems such as RSA, ECC and DSA. HECC supervise the ECC due to shorter operand size. This paper will analysis the performance of HECC over genus curve 2, 3, 4, 5, 6 and compares the result with ECC. It also inspects the use of Hyperelliptic Curve Cryptography technique and affords complete survey on its performance for many applications.
New Polyphase Complementary Sequence Sets for Wireless Communication Systems
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.147-156
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In contemporary wireless communication systems, complementary sequences play fairly important roles. Based on polyphase perfect sequences (PPSs), this paper presents a construction method, whose basic idea is to sample a given PPS with equal space, for yielding a family of periodic polyphase complementary sequence sets (PPCSSs). The advantages of this method include the family size of resultant PPCSSs is the same as that of the PPSs employed, and the number and length of sub-sequences in the proposed PPCSSs can be altered on demand.
A Low Power 5.8GHz Fully Integrated CMOS LNA for Wireless Applications
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.157-166
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A low power 5.8 GHz fully integrated CMOS low noise amplifier (LNA) with on chip spiral inductors for wireless applications is designed based on TSMC 0.18 μm technology in this paper. The cascode structure and power-constrained simultaneous noise and input matching technique are adopted to achieve low noise, low power and high gain characteristics. The proposed LNA exhibit a state of the art performance consuming only 6.4mW from a 1.8V power supply. The simulation results show that it has a noise figure (NF) only 0.972 dB, which is perfectly close to NFmin while maintaining the other performances. The proposed LNA also has an input 1-dB compression point (IP1dB) of -21.22 dBm, a power gain of 17.04 dB, and good input and output reflection coefficients, which indicate that the proposed LNA topology is very suitable for the implementation of narrowband LNAs in 802.11a wireless applications.
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.167-182
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A maximum power point tracking (MPPT) technique based on linear quadratic regulator (LQR) approach for solar photo-voltaic system has been proposed in this paper. LQR based MPPT controller has been designed with online set-point adjustment approach using current, radiation and temperature sensors. Real time simulations have been carried out on MATLABTM/dSPACETM platform for solar photo-voltaic system with buck converter. Performance of the proposed technique hase been compared with perturb and observe, incremental conductance, fuzzy logic, neural network and ANFIS based methods of maximum power point tracking. Experimental results showed the superiority of the proposed method for tracking maximum power point under rapidly varying solar radiations.
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.183-200
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Path planning for uninhabited combat air vehicle (UCAV) is a class of complicated high dimensional optimization problem, which mainly centralizes on path planning considering the different kinds of constrains in the complex environment of war. In order to solve this problem, it is converted to a kind of constrained function optimization problem, and a wolf colony search algorithm based on the complex method is proposed, which combines the complex method with a wolf colony search algorithm, and it solves the problem of UCAV path planning successfully. The experiment results show that our proposed algorithm is feasible and effective to solve the problem of UCAV path planning.
Towards Events Detection from Microblog Messages
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.201-210
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Microblogs have dramatically changed the mechanism of information propagation. It has been an inevitable issue for governments and enterprises to face the challenges that microblogs bring to public safety management. Since 2010, a lot of emergent events were firstly reported in microblogs, and this trend is even becoming more and more prominent. As microblogs have shown much influence in public safety and sentiment management, governments and enterprises have to employ effective ways to monitor and predict emergent events in microblogs; otherwise when emergent events in microblogs happen, they will be in a passive situation and even the society’s stability will be affected. Based on the properties of microblog information and its diffusion, this paper presents a survey on the events detection from microblogs, and recent advances on some key related issues are especially focused and discussed. Finally, we give a framework for events detection on microblog platforms and its key issues are discussed, which are expected to bring valuable references for the researches in microblog information extraction.
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.211-224
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Most of the synchronization techniques belong to the master-slave (drive-response) system configurations in which the two chaotic systems are coupled in such a manner that the performance of the second (slave /response) system is influenced by the first (drive/master) system and the first system is not disturbed by the exertion of the second (slave / response) system. In this research paper, the synchronization problem of two widely used techniques, the Linear Active Control and Nonlinear Control Algorithms have been studied to achieve chaos synchronization of a new chaotic system. In this study, using the Linear Active Control and the Nonlinear Control algorithms and based on the Lyapunov Stability Theory, it has been shown that the two techniques have excellent transient performance and that analytically as well as graphically, the synchronization is asymptotically globally stable. Numerical simulations are furnished to show the efficiency and effectiveness of the two methods.
The Application of Wavelet Threshold on Compressive Sensing in Wireless Sensor Networks
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.225-232
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Compressive sensing (CS) is a novel framework which exploits both the sparsity and the intra-correlation of the signal in structural health monitoring (SHM) based on wireless sensor networks (WSNs). It contains sparse signal representation, the measurement matrix selection and the reconstruction algorithm. The SHM signal is recovered by M measurements following the restricted isometry constant (RIC). However, the signal should be denoised before reconstruction. This paper discusses two wavelet noise reduction methods, soft threshold and hard threshold method, and verifies the performance of different methods for SHM signal reconstruction. Experimental results show that wavelet hard threshold method has much better effect on SHM sparse signal reconstruction than soft threshold method. Meanwhile, we can get a more accurate corresponding relation of RIC that is M≥CK*log(N / K).
Development of a Remote Automatic Weather Station with a PC-based Data Logger
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.233-240
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents the development of a prototype weather station to measure the following weather data: air temperature, relative humidity, dew point, wind speed, and rainfall. The weather station, which has been designed for remote operation, performs automatic or unmanned measurements of weather data and transmits it wirelessly to a PC for logging and display by means of a graphical user interface. The remote station is powered using solar energy through a battery which also stores charge for a 24-hour operation of the system. Experimental results show that the measured data is quite consistent with those obtained by similar weather measurement devices.
A Study of the Factors Influencing Forest Farmers Information Technology Adoption
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.1 2014.01 pp.241-250
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Information technology is one of the most important factors that have been impacting the development of forestry construction, with forest farmers playing an increasingly crucialrole in promotion of information technology. Survey data in this paper, collected from Yongan County and Youxi County in Fujian Province, usescombinedRough Set Theory (RST) andSupport Vector Machine (SVM), applied for reduction of influential factors of information technology adoption behavior of forestry farmers. The result shows factors, i.e.age, education, highest degree of the family, average annual income, forestland area, average annual income of forestland, status of fixed phone, average spending on mobile phone per month, status of cable TV and connection to the Internet, are of key influential in forestry farmers’ decision of information technology adoption.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.