Earticle

현재 위치 Home

International Journal of Hybrid Information Technology

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJHIT) [Science & Engineering Research Support Center, Republic of Korea(IJHIT)]
  • pISSN
    1738-9968
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.8 No.7 (39건)
No
1

In this paper, a new three-level thresholding method for image segmentation is proposed based on nonextensive entropy and fuzzy sets theory. Firstly, the image histogram is transformed from crisp set to fuzzy domain using fuzzy membership function, such as triangular membership function. After that, the nonextensive entropy of each part of fuzzy domain of histogram is computed. The threshold is selected by maximizing the nonextensive fuzzy entropy. However, the search of combination of membership function’s parameters is costly. For reduce the computation time, the artificial bee colony algorithm is used to search the optimal combination of the membership function’s parameters. The experimental results on tested images demonstrate the success of the proposed approach compared with the competing methods.

2

Design Second Order Vibration Reduction

Meysam Kazeminasab, Zahra Esmaeili, Alireza Salehi, Mahdi Mirshekaran, Farzin Piltan

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.11-26

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Design of a robust controller for multi input-multi output (MIMO) nonlinear uncertain dynamical system can be a challenging work. This paper focuses on the design and analysis of a high performance adaptive baseline sliding mode control for second order nonlinear uncertain system, in presence of uncertainties to reduce the vibration. In this research, sliding mode controller is a robust and stable nonlinear controller which selected to control of robot manipulator. The proposed approach effectively combines of design methods from switching sliding mode controller, adaptive model-free baseline controller and linear Proportional-Derivative (PD) control to improve the performance, stability and robustness of the sliding mode controller. Sliding mode controller has two important subparts, switching and equivalent. Switching part (discontinuous part) is very important in uncertain condition but it causes chattering phenomenon. To solve the chattering, the most common method used is linear boundary layer saturation method, but this method lost the stability. To reduce the chattering with respect to stability and robustness; linear controller is added to the switching part of the sliding mode controller. The linear controller is to reduce the role of sliding surface slope and switching (sign) function. The nonlinearity term of the sliding mode controller is used to eliminate the decoupling and nonlinear term of link’s dynamic parameters. However nonlinearity term of sliding mode controller is very essential to reliability but in uncertain condition or highly nonlinear dynamic systems it can cause some problems. To solve this challenge the baseline controller is used as online tune or adaptive controller. This controller improves the stability and robustness, reduces the chattering as well and reduces the level of energy due to the torque performance as well.

3

A Policy Conflict Detecting Algorithm of RBAC Based on Concept Lattice Model

Daojun Han, Lei Zhang, Xiajiong Shen, Peiyan Jia

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.27-36

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Access control policy conflict detecting is an important issue in the usage of information system. To solve the problem that the expression of existing common Role-Based Access Control(RBAC) policy conflict detecting is not intuitive and the corresponding algorithm is not efficient, meanwhile, we observed that the concept lattice model has natural advantages being a data representation method and is easy to be combined with RBAC. Thus, this paper introduce the concept lattice model into RBAC policy conflict detecting algorithm, aim at the problems of jurisdiction conflict, static role conflict, and user conflict, utilizing the sub lattice on the basis of use two formal contexts to denote user-role relation and role-permission relation respectively, we provide an intuitive and efficient detecting algorithm. Experimental result shows the efficient of our algorithm.

4

Node Designing of Complex Networks in Cloud Computing Environment

Ranjan Kumar Mondal, Debabrata Sarddar

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.37-54

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As a result of the spreading various types of nodes and topological complexity of the cloud computing, it is an backbreaking task to characterize the nodes which are far more influential than others. The objective of our paper is to examine complex networking based cloud computing. Complex networks are a type of networks whose structure is irregular, complex and evolving dynamically. Its main goal is the analysis of small networks to that particular of system with millions of nodes. It has been found that none of the technique is way better for cloud computing. Therefore, this paper ends with the future scope to solve these issues.

5

Reconstructing Fragmented YAFFS2 Files for Forensic Analysis

Na Huang, Jingsha He, Bin Zhao, Gongzheng Liu, Xuejiao Wan

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.37-44

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Data recovery from captured intelligent mobile devices such as smartphones plays a significant role in digital forensic analysis. In this paper, we study the main characteristics of NAND flash and YAFFS2 file systems and explore the method for recovering YAFFS2 files for forensic analysis based on Tnode tree that can save a lot of time compared to other data recovery methods. For any broken file that has missing or broken data pages, we propose to reuse pages from previous versions of the current file based on the chunk IDs of the missing pages to replace and thus recover such pages. We will describe the replacement method with detailed steps and also perform some analysis to show that the proposed replacement approach can be feasible and effective in reconstructing YAFFS2 files.

6

State of Health Estimation for Lithium-ion Battery Based on D-UKF

Wang Qiuting, Jiang Yinzhu, Lu Yunhao

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.55-70

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper considers an accurate estimation method of State of Health (SOH) for lithium battery. An improved battery model is proposed which is based on equivalent circuit model and battery internal electrochemical characteristics. In our study, Double Unscented Kalman Filtering (D-UKF) algorithm is designed to calculate State of Charge (SOC) and SOH of lithium battery at the same time. The feature of our new method is SOH estimation model is derived based on battery internal resistances. The Ohmic resistance (one of internal resistances) can be identified online based on D-UKF algorithm. Two filters defined as UKF1 and UKF2 are working together to calculate the real-value of SOC and Ohmic resistance to obtain final SOH value. The experimental results indicate that our new battery model considers different value of battery internal resistances on different working condition (as different voltages, different currents). Besides, our study verifies the performance and feasibility of new estimation method based on D-UKF. This new algorithm has the practical value to further study for other types of lithium battery.

7

Enhanced Cloud Web Services Using Community Structure Based Complex Networks

Mini Singh Ahuja, Sonia Jasrotia

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.71-84

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A Web service is a well defined concept of a set of computational or physical activities involving a number of resources, designed to fulfill the needs of customers or for business requirement. Community structure is the most common topological structure in complex networks. A significant characteristic of complex networks is that they are generally composed of highly inner connected sub networks called community. It is very helpful and important to understand the features of these communities. This paper has focused on the community structure of structural service networks formed by public web services available on the Internet. The overall objective is to enhance the cloud web services using complex networks.

8

Integrate Advantage of Geographic Routing and Reactive Mechanism for Aeronautical Ad Hoc Networks

Xiaoheng Tan, Xiaonan Hu, Pengfei Qu, Zhengnan Zhu, Yan Zhang

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.85-94

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Large scale range and high dynamic topology are the two major features of Aeronautical Ad Hoc Networks (AANETs), which present severe challenges to provide efficient and reliable data packet delivery in aviation communication networks. Geographic routing has been studied as an attractive option for routing in aeronautical networks due to its simplicity and scalability. However there are still some problems such as low packet delivery ratio and less reliability for long dynamic links. In this paper, we improve the greedy forwarding strategy and start with the idea of integrating reactive routing mechanism with geographic routing protocol, referred to as IRG (Improved Reactive and Geographic) routing protocol. Variety simulations have been performed to evaluate the performance of the proposed routing protocol, and the results show that it can increase the packet delivery ratio efficiently.

9

The end-to-end performance of dual-hop wireless communication system with fixed gain relays is investigated over independent non-identical composite Nakagami-lognormal fading channels using mixture gamma distribution. Novel closed-form expressions for the outage probability, the average symbol error rate and the nth moments of end-to-end signal to noise ratio (SNR) for the considered system are derived, respectively. Numerical and simulation results are shown and discussed to verify the accuracy of the analytical results under different scenarios, such as varying average SNR, fading parameters per hop, and the location of relaying nodes.

10

Realization and Evaluation of an Information Morals Education System by Experience of an Assailant and a Victim by Virtual Reality

Abdusalam Dawut, Hiroshi Nakayama, Rintarou Iwasaki, Toshiki Matsuda

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.105-116

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As a method of instruction of information morals education, Tamada and others proposes the method of instruction by three sorts of knowledge, and also supposes that the method called “feedback method” of making one's act examine from a victim's position is effective to the student of low information morals (Tamada et al.1987). In this research, the new teaching materials which combined a feedback method and virtual reality (VR) technology were developed, and the effect was verified. In order for the student of low information morals to make it specifically look back upon the act performed within VR from a victim's position, within VR, the subject's head shot was attached to the face of the avatar which serves as an assailant, and victim experience was carried out. As a result, before and after carrying out victim experience, improvement in the consciousness to information morals and reduction of the act contrary to information morals were seen.

11

Digital Design of Streamlined EMU Head Car and Its Smoothness Evaluation

Zhenfeng Wu, Zhoufeng Chen, Wangcai Ding

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.117-132

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

12

Stability Analysis of a Quarantined Epidemic Model with Latent and Breaking-Out over the Internet

Munna Kumar, Bimal Kumar Mishra, T. C. Panda

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.133-148

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, a new epidemic model, known as the SLBQRS model, is proposed in a computer network with Latent and Breaking-out periods of a virus in its life cycle. Furthermore, an infected computer will be referred to as latent or breaking-out depending on whether all viruses staying in it are in their respective latent periods or at least one virus staying in it is in its breaking-out period. In the real world there exists no infected computer at all that has no infectivity. A breaking-out computer can get treated with a higher probability, because it usually suffers from a marked performance degradation or even breaks down, which can be perceived evidently by the user. The quarantine is a method of isolating the most infected nodes from the network and reduce the spreading virus till they get recovered. The qualitative properties of this model are investigated. The result shows that the dynamic behavior of the model is determined by a threshold R0. Specially, virus-free equilibrium is globally asymptotically stable if R0 ≤ 1. Next, the sensitivity analysis of R0 to six system parameters is also analyzed. On this basis, a collection of strategies are advised for eradicating viruses spreading across the Internet effectively. Threshold R0, equilibrium and their stability are discussed in terms of the Jacobian of the system. Numerical methods and MATLAB are employed to solve and simulate the system of equations developed and analysis of the model gives remarkable exposure.

13

High-Precision Correlation Algorithm Based On Moments

Zhenbing Liu, Qijia He

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.149-160

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Correlation is an important and useful operation in the fields of digital signal processing. In this paper, based on the previous work of performing discrete Fourier transform (DFT) via linear sums of discrete moments, we have made development to eliminate multiplications in the DFTs by performing appropriate bit operations and shift operations in binary system, which can be implemented by integer additions of fixed points; then using the Correlation theorem with the DFT, we compute the Correlation with two DFTs, a point-by-point product, and an inverse DFT. Since our algorithm involves fewer multiplications, an efficient and regular systolic array is designed to implement it which is a demonstration of the locality of dataflow in the algorithms. The approach is also applicable to multi-dimensional DFT .

14

Triangular Fuzzy Multi-attribute Decision Making Based on Risk Attitude of Decision Maker

Haiping Ren, Hui Zhou

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.161-168

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With respect to multi-attribute decision making problems in which the attribute values and weights of attributes are expressed with triangular fuzzy numbers, a new decision analysis method considering the risk attitude of the decision maker is proposed. In the method, firstly, risk attitude parameters of the decision maker are used to transfer the decision problem with triangular fuzzy numbers into the traditional decision problem with point values. Then, based on TOPSIS, a new decision making method is given. Finally, sensitivity analysis is made by selecting the different values of risk attitude parameter.

15

Transmission Scheme for Asymmetric MIMO Two-way Relay with Channel Estimation Error

Jinhong Fan, Chaowei Yuan, Ke Xiao

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.169-178

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we consider the transmission scheme for asymmetric decode-and-forward (DF) multi-input multi-output (MIMO) two-way relay system with channel estimation error. In order to transmit with asymmetric data rates from the relay to the receivers according to their individual link qualities, we propose a novel transmission scheme for the broadcast phase by employing a priori bit information. The proposed scheme employs multi-antenna and network coding at the relay. The idea is the weaker link receiver exploits a priori bit information in each transmit symbol, so that it only needs to decode on a subset of the transmit symbol constellation. Subject to the same bit error rate constraint, the weaker link receiver can decode at lower signal-to-noise ratio compared to the stronger link. The different signal labeling used for mapping bits to symbols at the relay cause different minimum Euclidean distance, so it is shown to be crucial for the performance at the receivers. Subsequently, we investigate the effect of the channel estimation error on the system performance. Simulations show that the proposed transmission scheme can be applied to practical scenarios with asymmetric channel qualities.

16

Research on Automatic Mapping Method of Geologic Column

Shao YanLin, Shao YaXiong, Xu XiaoHong, He ZhenMing, Li GongQuan

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.179-188

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The realization of the digital reservoir can greatly improve the information level of the petroleum corporation in hydrocarbon exploration and development, reduce risk and improve efficiency. Wells are the core object of digital reservoir management. Geologic column of drilling is the main carrier of multi-source information. Automatic mapping method and multi-source information fusion of geologic column have become a research hotspot of digital reservoir construction. This paper describes current situation of the domestic reservoir management and practical problem of geological maps digitizing. The thought and process of geologic column automatic mapping, which are based on spatial information technology, are submitted. The partition of information bar is settled on. The three-tier system architecture of automatic mapping system is established. With the support of XML technology, XSD is used to make the parameter template of geologic column automatic mapping and realize corresponding configuration wizard. UML is used to design the automatic mapping system. The lithological plate and geological symbols is coded to realize automatic mapping of corresponding drawing elements. The drawing methods of logging and petrophysical data are improved and the visualization of curve and numerical stick figure is achieved. The integration method of casting photos, core images and geologic column is submitted. For the secondary development technology of ArcGIS Engine, object-oriented program is adopted to realize automatic mapping of geologic ArcGIS Engine column. This paper provides a new way for the geologic column mapping during the process of digital reservoir construction.

17

Incorporating Bidirectional Heuristic Search and Improved ACO in Route Planning

Guangming Xiong, Xiaoyun Li, Shuai Zhou, Hao Lu, Yan Jiang, Jianwei Gong

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.189-198

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A multi-objective multi-node dynamic route planning system for a vehicle is presented in this paper. In this system, a bidirectional heuristic search algorithm is designed to perform path planning between two nodes in a topological map created by OpenStreetMap for urban scenarios. And then an improved multi-objective Ant Colony Optimization (ACO) algorithm considering the timeliness of goal nodes is proposed to generate the node sequence. Experimental results validated the proposed approach.

18

Study on SOC Estimation of Power Battery Based on Kalman Filter Optimization Algorithm

Yuheng Yin, Weifeng Zhong

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.199-206

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Power battery's remaining capacity is affected by many interior and exterior uncertainties during use. To achieve estimate of current remaining measurable battery power by using battery measurable parameter data, which has always been the core issue of electric vehicle battery management system and the technical difficulties need to be resolved. In this paper, Kalman filtering theory is introduced in estimation algorithm, and then combined with open circuit voltage method and ampere measurement method, the SOC estimation according with the requirements of the electric car is achieved.

19

Performance Analysis for Recognition of Image With Alphanumeric Characters Under Different Environmental Conditions

Paramvir Singh, Rashpinder Kaur, Gurjinder Singh

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.207-214

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this recent era of technological development, innovation advances in every aspect of life can be easily seen. Automatic systems were developing at very fast pace. Automatic license late recognition is one of the systems that help in developing intelligent transport system in a city or country. This also finds application in the areas of vehicle surveillance, border security, toll tax management etc. This paper evaluates the performance analysis for recognition of image with alphanumeric characters under different environmental conditions. The overall performance recognition rate was 97.57%

20

A New Clustering Algorithm of Hybrid Strategy Optimization

Li Yi-ran, Zhang Chun-na

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.216-224

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Normally, improving the performance of clustering depends on improvement of the algorithm. On the basis, this paper presents a hybrid strategy optimization algorithm that K-means algorithm effectively combined with PSO algorithm, which not only has played their respective advantages, but also reflected a hybrid performance. First of all, combined with a semi-supervised clustering idea, to optimize the clustering center of particle by K - means in the iteration of algorithm, enhanced the searching capability of the particles. Secondly, improved the traditional K - means enhance the ability of the algorithm to deal with the concave and convex points. Finally, the algorithm is introduced into the particle state determination mechanism, on implementing mutation for unstable particles, so that the algorithm to obtain stable performance. Experimental results show that the hybrid algorithm optimization ability is outstanding, and the convergence and stability can be effectively improved.

21

Using Additive Expression Programming for Gene Regulatory Network Inference

Bin Yang

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.225-238

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Gene regulatory networks depict the interactions among genes in the cell and construction of networks is important in uncovering the underlying biological process of living organisms. In this paper, a non-linear differential equation model is used for gene regulatory network reconstruction and time-series prediction. A new model, called additive expression tree (AET) model is proposed to encode ordinary differential equations (ODEs). A new structure-based evolutionary algorithm and artificial bee colony (ABC) are used to optimize the architecture and parameters of the additive expression tree model, respectively. A synthetic data and two real time-series expression datasets are used to test the validity of our proposed model and hybrid approach. Experimental results demonstrate that our model could improve accuracy of microarray time-series data effectively.

22

Association Rule Mining : A Survey

Jagmeet Kaur, Neena Madan

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.239-242

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Last few years have seen a rapid growth in the area of data mining. Association rule mining is one of the most important techniques of data mining. It is a technique which is used to discover the frequently occurring patterns in the database. A lot of research has been done in the area of association rule mining. This paper gives a brief overview of association rule mining, some of its applications and algorithms. The limit of discussion is to the areas where association rule is used to a high extent.

23

Analysis and Proofs of Properties in Intransitive Noninterference

Congdong Lv, Xiaoyong Li, Fei Li, Wei Ma

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.243-252

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The goal of high assurance systems development by formal verification motivates the investigation of techniques whereby a systems design or implementation can be formally shown to satisfy a formal definition of security. The security of unwinding relations provides a proof method that has been applied to establish that a system satisfies noninterference properties, but it requires significant human ingenuity to define an unwinding relation that forms the basis for the proof, and typically also has involved manual driving (proof rule selection) of the theorem proving tool within which the proof is conducted. The property of purge-based definition proposed by Goguen and Meseguer, intransitive purge-based definition proposed by Haigh and Young, and some more definitions TA-secure, TO-secure, ITO-secure proposed by van der Meyden are considered in this paper. The property can be used in the proof of noninterference property without unwinding relations.

24

Multi-GPU Parallel Computing and Task Scheduling under Virtualization

Yujie Zhang, Jiabin Yuan, Xiangwen Lu, Xingfang Zhao

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.253-266

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

25

Multi-target Tracking Algorithm Based on TLD under Dynamic Background

Lixia Xue, Zuocheng Wang, Yanxiang Chen

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.267-276

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The tracking of multi-target under dynamic background is a challenging issue in computer vision. We improve TLD algorithm by introducing multi-threading mechanism to expand the number of the tracking targets. Thus the excellent framework of TLD for accurate long-time single target tracking is kept, and the tracking of multiple moving targets is realized at the same time. The time cost of tracking also reduces effectively by this algorithm to meet the real-time demand in many dynamic scenes.

26

A Novel Feature Gene Selection Method Based On Neighborhood Mutual Information

Tao Chen, Zenglin Hong, Hui Zhao, Xiao Yang, Jun Wei

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.277-292

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

DNA microarray technique can detect tens of thousands of genes activity in cells and has been widely used in clinical diagnosis. However, microarray data has characteristics of high dimension and small samples, moreover many irrelevant and redundant genes also decrease performance of classification algorithm .Mutual information is very effective method and has widely been used in feature gene selection, but it cannot directly deal with continuous features. Therefore, this paper proposes a novel feature gene selection method to resolve this problem. Firstly, a lot of irrelevant genes are eliminated from original data by using reliefF algorithm , and the candidate subset of genes is obtained; Secondly, a algorithm based on neighborhood mutual information and forward greedy search strategy which deals with directly continuous features is proposed to select feature genes in above genes subset. Here, because radius of neighborhood greatly affects reduction performance, differential evolution algorithm is applied to optimize radius before reduction. The simulation results on six benchmark microarray datasets show that our method can obtain higher classification accuracy using as few genes as possible, especially neighborhood mutual information can directly continuous features. Feature genes selected has an important meaning for understanding microarray data and finding pathogenic genes of cancer. It is an effective and efficient method for feature genes selection.

27

Design and Simulation of Novel 10-T Subtraction Logic for ALU Design Using GDI Technique

Haramardeep Singh, Harmeet Kaur

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.293-304

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Design based upon CMOS logic are becoming increasingly attractive for many applications under electronic gadgets, but with increasing demand of small and portable devices, new techniques for low power are emerging. This paper focus on the design of subtarction logic for ALU sub-module in microprocessor design. Set of four different 10-T subtraction logic using Gate Diffusion Index(a new technique for low power design) has been designed using 180nm technology using Cadence Virtuoso and simulation are performed . Complete verification for performance of proposed subtraction logic is carried and circuit with least power and delay has been selected for the ALU design of the microprocessor. Layout design for the best optimum ciruit is designed using Layout XL and area of 17.28 X 11.135 um2 is calculated.

28

Multi-objective Integration of Flexible Collaborative Planning and Fuzzy Flexible Lot-Splitting Scheduling Based on the Pareto Optimal

Zhenqiang Bao, Xiaoqing Ren, Yulu Yang, Junwu Zhu, Cheng Wang, Richao Yin

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.305-318

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Since that a job usually contains several working procedures in actual production, and it’s hard to optimize the flexible collaborative planning, the flexible lot splitting and scheduling of the job simultaneously in batch production mode, a model for multi-objective integration of flexible collaborative planning and fuzzy lot-splitting scheduling is established. We take four performance indicators below which are the most common as standards to optimize the model: average delivery satisfaction, fuzzy total cost, fuzzy completion time and average credibility of job tardiness, and then a multi-objective algorithm based on the Pareto optimal is established. In this algorithm, we design the integrated coding scheme, which include collaboration chromosome, lot-splitting chromosome and scheduling chromosome, meanwhile the Pareto optimal scheme is designed. Finally, the efficiency of the model and algorithm is proved by the simulation.

29

Analysis of HEVC Coding Standard

Jianjun Wang, Li Zhou, Tao Sun

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.319-334

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

HEVC video coding standard can achieve an average of 50% bit-rate saving, transmitting nearly the same visual quality, compared with the H.264/AVC High Profile. This paper focuses on the key features of the HEVC standard. Then it analyzes the complexity of the HEVC standard by profiling the HEVC reference software HM12.0 which is released by JCT-VC community with Intel Core i7 processor. The experiment covers different settings for a wide variety of video sequences, with the resolutions ranging from 240p to 1600p. The evaluation result shows that the HEVC standard can achieve a doubling in coding efficiency at the cost of increasing the complexity slightly. When the sequences are coded in all-intra or random-access configurations, intra prediction, loop filter, inverse transform and motion compensation are the most complex components for HEVC decoder. The motion compensation part should be given lots of consideration since it can take nearly half of the decoding time. The quantization parameter (QP) also has obvious influences on the complexity of the decoder. Besides, in practice, the HM decoder is not able to decode video content with 1080p or higher resolutions for real-time applications.

30

A Novel Approach Of Trust Based Routing To Select Trusted Location In AODV Based VANET : A Survey

Kumud Dixit, Krishna Kumar Joshi, Neelam Joshi

보안공학연구지원센터(IJHIT) International Journal of Hybrid Information Technology Vol.8 No.7 2015.07 pp.335-344

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

During the last few years, a vehicular ad hoc network (VANETs) was extensively focused by researchers. A vehicular ad hoc network (VANETs) is a subclass of Mobile ad hoc networks builds to make sure the safety of traffic. VANET is a type of mobile peer to peer network, although it exhibits some different characters (fast moving, short lived connection etc). VANET is different from MANET due to large scale networks, higher mobility of nodes, geographically constrained topology and frequent network partitioning. In this paper, we present a survey on trust based routing in AODV based VANET to find secure location. In this first discussed about VANETs, their applications, characteristics, attacks, routing protocols and present a review of various researchers on trust based VANET.

 
1 2
페이지 저장