2016 (464)
2015 (452)
2014 (204)
2013 (106)
2012 (70)
2011 (24)
2010 (15)
2009 (31)
2008 (42)
Investigations on Modeling and Simulation of Printed Folded Dipole Antenna
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.6 2014.11 pp.375-388
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
We have modeled and simulate asymmetric microstrip folded dipole antenna on substrate materials and study the antenna performances. The conventional wire dipole antenna configurations are converted into corresponding microstrip version. The complementary nature of parallel coplanar strip line and waveguide models have been used to model the dipole antenna. The transmission line parameters namely, even-odd mode effective dielectric constant and characteristic impedance have been analyzed. We study the effect of dielectric material on radiation characteristics of the printed folded dipole antenna, such as effective dielectric constant, characteristics impedance, input impedance and bandwidth. The antenna shows bandwidth improvement below 3 GHz frequency with asymmetric form of strip folded dipole.
Research of Evaluation Mechanism of Petrochemical Informatization Projects Based on AHPP
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.6 2014.11 pp.389-394
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To address unreasonable planning process and imbalanced budget for informatization projects of petrochemical enterprises, this paper designs an informatization projects evaluation model. Analytic Hierarchy Process (AHP) is introduced to provide theoretical support. First, this paper conducts a hierarchical analysis to the decisive project factors in the informatization construction by constructing judgment set for the ladder-type hierarchical mode. Then, it calculates the weight for each factor and makes reasonable decision, which provides guidance to the implement of the informatization projects of petrochemical enterprises.
An Approach to Verify, Identify and Prioritize IDS Alerts
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.6 2014.11 pp.395-410
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Lack of effective alert management technique to verify, identify and prioritize alerts is a well-known problem that severely degrades the worthiness of Intrusion Detection Systems (IDSs). IDSs often appear problematic because of triggering huge number of non-interesting alerts which diminish the value and urgency of interesting alerts. An average commercial IDS reports tens of thousands alerts per day. Analysts rarely look at the voluminous alerts until a sign is reported by other security means because it is laborious and challenging task to identify interesting alerts. Alerts evaluated in this manner are often unverified, mis-prioritized, misinterpreted, ignored, misclassified, delayed and are given undue attention. So far none of the current alert management techniques appear to be effective. In this paper, we present our approach to verify, identify and prioritize alerts based on post processing of alerts. Central to our approach is the computation of new alert metrics in order to further describe and understand interestingness of alerts. We synergized Alert Verification and Alert Prioritization techniques to build an effective alert management technique. Our approach gives superior results when compared to other alert management techniques.
Fatigue Life Validation and Analysis of Connecting Rod
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.6 2014.11 pp.423-432
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The connecting rod in four stroke reciprocating diesel engine is subjected to variable loading when Engine is in operating condition. The design of connecting rod is critical for the engine Performance, fatigue life, linear vibration & durability of engine. The fatigue failure is occurred due to alternating compressive & tensile stresses during its two revolutions. The fuel combustion inside cylinder generates a huge compressive force at power stroke. The 3D model is prepared and CAE analysis is done to predict the maximum Stresses and check whether it is safe for fatigue failure. The modification in design is done to make it safe for fatigue life. The experimental Fatigue testing is carried out to validate the predicted & Actual fatigue life of connecting rod.
The Research of Software Reuse Technology Based on Component
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.6 2014.11 pp.433-444
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the expansion of the computer application, the complexity of software and the program code increase rapidly. The increasing requirement of software brings the grown of the size about software. In order to solve these problems, the idea of software reuse emerges. In these years, the software reuse technology develops rapidly. Nowadays, software reuse technology which is based on component is regarded as the most successful implement technology in the software reuse field and the available solution to solve the Software Crisis. In this paper, we research the software architecture based on component. And we propose a model of library management information system. Firstly this paper introduces the research background and research status. The second part is the design of reuse system based on the component. The third part is the component-based information management system used for the library management system. The last part is the conclusion.
Exact Solution of Klein Gordon Equation via Homotopy Perturbation Sumudu Transform Method
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.6 2014.11 pp.445-452
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
We apply the proposed method (NHPSTM) which is the combination of new homotopy perturbation methodand Sumudu transform to solve analytical linear and nonlinear Klein-Gordon equations. The proposed method finds the solution without any discretization or restrictive assumptions and avoids the round-off errors. The fact that the proposed technique solves nonlinear problems without using Adomian’s polynomials can be considered as a clear advantage of this new method over the decomposition method. Obtained results reveal that the proposed method is very efficient, simple and can be applied to other nonlinear problems arising in mathematical physics and engineering.
An Improved Square Root Cubature Particle Filter for Navigation
보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.7 No.6 2014.11 pp.453-462
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In order to balance filtering accuracy and time cost, this paper introduces an improved square root cubature particle filter algorithm (ISRCPF) navigation method. For the lack of measurement information of the PF, it combines square root cubature Kalman filter (SRCKF) with strong tracking filter (STF), and proposes an improved square root cubature Kalman filter (ISRCKF). The ISRCPF adopting the ISRCKF to develop the proposal distribution and incorporates the latest measurement into updating phase is proposed by introducing the ISRCKF into the particle filter framework. The results show that considering both time cost and filtering accuracy, the ISRCPF is a good choice to improve the particle filter algorithm.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.