2016 (467)
2015 (448)
2014 (181)
2013 (81)
2012 (22)
2011 (22)
2010 (20)
2009 (22)
2008 (10)
Improving Test Efficiency through Prioritization Based On Testing Dependency
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.1-8
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
During the various iterations of software development, test case prioritization generally schedules test cases in order to increase test efficiency as soon as possible without reducing the scale of the test. It is noted that currently, many prioritization techniques are usually based on the assumption that the test cases are independent so as to reduce testing effort. However in the actual test, the dependencies and relations exist between the test cases. In this paper, we propose a new type of prioritization technique based on the relationship of dependencies between test cases. We gather the dependency information of a test suite and then put forward a weighted depth-first search algorithm to determine the most effective order. To assess our approach, an academic feasibility study and three industrial experiments are conducted. Evaluation results indicate that our proposed method can be used to improve the fault detection effectiveness when compared with random ordering and some existed prioritization techniques which are based on function coverage.
Intelligent Agent Based Architectures for E-Learning System : Survey
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.9-24
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
E-learning is the internet enabled learning. Internet has ongoing to restructuring education. Intelligent agent based e-learning provide a common infrastructure to assimilate varied software components. There are two sorts of e-learning synchronous and asynchronous. This paper described the detail of well-known agent based architecture for e-learning. E-learning is going to be gigantic. There are multiple benefits of e-learning; it is convenient, self-service mix, match, on demand any time anyplace, private learning, Self-paced and elastic. E-learning provide cost effective and virtual environment. E-learning gives the ability to user to collect the quantifiable and sensible material, examine, and distribute and custom e-learning knowledge from multiple e learning sources.
Research of Road Pricing System Based on P System
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.25-32
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
For urban traffic congestion problem, a communication P systems using parallel computing principles congested road-use pricing model, considering congestion charges in the case, the establishment of travelers travel decision algorithm, travelers dynamic evolution in traffic P system, External charging parameters can be adjusted to influence traveler decisions, thereby affecting the whole system evolution. The congestion pricing model based on P system (CPS_ DTAM) of the simulation experiment shows that the algorithm is feasible. This model and particle swarm optimization congestion pricing model (PSO_ DTAM) were compared based on the same parameters; the results show that this pricing model taking into accounts the dynamic decision travelers more in line with the real situation.
An Empirical Research on the Influencing Factors of Mobile Commerce Diffusion in China
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.33-44
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper analyzes the factors affecting China’s mobile commerce diffusion at the infant stage and taking-off stage using the data of 31 provinces of China in the years of 2009 and 2012 respectively based on the partial least square regression method. The results of the analysis indicate that fixed broadband penetration rate, GDP per capita and internet penetration rate, urbanization level are the top 4 factors at the infant stage of mobile commerce diffusion, while internet penetration rate,2G mobile penetration rate, income and fixed broadband penetration are the top 4 factors at the taking-off stage of mobile commerce. The findings provide researchers and policy-makers systematic insights into the role of different factors in mobile commerce diffusion at a country level and over time.
An Implementation of Intelligent Searching and Curating Technique on Blog Web 2.0 Tool
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.45-54
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
There are numbers of web tools available to spread and explore information on internet. With the increasing use of Blogging sites, people are able to share their opinions, interests, experiences, and their views with others. However, it is not so easy to fetch required information from various Blogs in available time, which normally is very short. From last few years our major concern is on web searching and web mining. In this paper, a searching and curating model is discussed which introduces an approach of fetching the relevant information automatically from various Blog sites and fetches the personalized required information. That exactly is the need of the hour.
Research on Job-shop Scheduling Algorithm of Single Piece and Small Batch MES
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.55-62
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
MES job shop scheduling problem is the core module, and its essence is a kind of resource constraints, time constraints and process constraints such as combinatorial optimization problems, research and application of job shop scheduling problem for China's manufacturing sector improve management, productivity, and the implementation of advanced manufacturing strategies are important, therefore, job shop scheduling research has theoretical and practical significance. In this paper, the slow evolution of GA algorithm will occur, or premature, and the SA algorithm is introduced to the crossover and mutation, genetic simulated annealing algorithm is proposed - GASA algorithm, mathematical model is given algorithm, the algorithm model, the algorithm process. GA parallel sampling of the time optimization algorithm performance can be improved, and the control of SA binding guidelines to control the convergence of the algorithm to avoid prematurity. The classical scheduling problem FT06, GASA correctness of the algorithm is verified and compared with the traditional GA algorithm is verified GASA efficiency of the algorithm.
Segmentation of Leaf Images Based on the Active Contours
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.63-70
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Leaves contain important genetic information which can be used as a basis for the identification of plants. As a first step of modeling virtual three-dimensional plant, how to extract visual characteristic information form leaf images has great significance. We propose an optimized C-V model in this paper, which can detect objects in homogeneous regions of given leaf images and speed up running time. The new method combines local information with global information and optimizes the defect that SDF needs to be reconstructed partially so that the energy function is improved. Experimental results show that our algorithm can stop active contours on the correct boundary, get accurate image segmentation, and the speed is more than 1.5 times faster to C-V model.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.71-78
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In view of the bias of panel data model set can lead to misjudgment to the relationship between enterprise value and the capital structure, this article uses nonparametric method to study the relationship between them, adjusts variables in the model. The article evaluates the optimal capital structure of listed companies of the equipment manufacturing industry in our country Based on financial data from 2006 to 2013, analyzes from the Angle of enterprise value and agency cost respectively,. The results show that, The relationship between enterprise value and capital structure is inverted u-shaped, there exists a maximum asset-liability ratio in enterprise value. And the relationship between agency cost and capital structure present u-shaped roughly, there is a minimum asset-liability ratio in agency costs, there is a reasonable capital structure interval when asset-liability ratio is in range (32.87%, 58.21%).
A Survey : Crucial Crime Information Sharing Mechanism Using DTN for Rural Areas
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.79-90
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Mobile ad hoc routing protocol allows nodes with wireless adaptors to communicate with one another without any pre-existing network infrastructure. In this work, we develop techniques to deliver messages in the case where there is never a connected path from source to destination or when a network partition exists at the time a message is originated. Opportunistic networks is a more general concept of delay tolerant networks which opens an exciting avenue for connecting nodes opportunistically and communicates wirelessly and at the same time expands the potential for real-life application problems. In opportunistic networks, end-to-end communication among users does not require a continuous end-to-end path between source and destination. This is achieved by temporarily storing messages at intermediate nodes, waiting for future opportunities to forward them towards the destination. This system will help us to provide police services to villages. When a crime is reported in a village & police is needed there as soon as possible. We can use high frequency sensors there to locate the crime location and to inform police. This type of system will be helpful in those places where traffic frequency is high.
The Influence of Regional Intellectual Capital on Regional Economic Development-Evidence from China
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.91-104
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The aim of this paper is to examine the relationship between regional intellectual capital and economic performance in China. Using the methods of factor analysis and ridge regression, this paper makes an empirical study on the function of regional intellectual capital (RIC) on regional economic development by evaluating the RIC of 17 cities in Shandong Province in 2012. It is found that RIC and the development of regional economy are positively correlated and regional intellectual capital explains 29.9 percent of the growth of GDP. But there exists some differences in the degree of their contribution to the economic development. In the four elements of intellectual capital, the regional innovation capital and structure capital have larger contribution on regional economic development than relational capital and human capital. And there also exists some differences in the level of RIC in different areas. Based on the results of such research, it will then be possible to recommend appropriate comments and suggestions of promoting balanced development of regional economy through the development of RIC.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.105-116
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The research, development and applications of software measurement have been carried out for more than forty years. Many researchers have done much in it, obtained lots of theoretical results, and developed a series of practical applications. At present, with the rapid development of object-oriented technology used in software theories and application, how to measure software in an effectively and scientifically way is becoming a hot and difficult issue. Class diagram as the most important UML model, its reasonable design has a remarkable effect on the ultimate system. This paper applies information entropy-based multi-attribute decision in UML class diagram metrics, providing a method to measure UML class diagram complexity weights. Its attributes out of information entropy and attributes’ weigh vectors can measure the complexity of object-oriented software effectively and scientifically. Besides, case analysis can prove this metric’s usability. The more precise experiment outcome has proved that the method is connected to human’s experience, and also can be applied to improve software quality.
The Influence of Sharing Evaluation Information on Consumer Buying Behavior in Social Commerce
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.117-134
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Social commerce is a new generation of e-commerce. Compared to traditional commerce, social commerce, treating social media and social network as a carrier, promotes online trading and information exchange related to commercial activities. Information sharing in social commerce affects buying behavior of consumers in all aspects. Therefore, research on information sharing in social commerce has important implications for further investigation in consumer behavior and business marketing strategy. In this paper, the authors propose a method of multi-agent simulation based on FIRE model, to discuss the influence of sharing evaluation information on consumer buying behavior in social commerce. This study established a simulation model of consumer behavior based on the information, took full account of the effect given by situational factors and information sources, set up rules on consumer decision of purchase on the basis of consumer sub-model and merchant sub-model, realized the simulation for two different information sharing situation by using Repast, and drew relevant conclusions according to simulation results about the total number of transactions and trading volatility of each type of merchants.
An Efficient Opportunistic Routing Protocol in Underwater Communication
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.135-146
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
For many years, opportunistic networks have gain fame in research and industry as a natural evolution of mobile ad hoc networks (MANETs). It is a more common concept of delay tolerant networks, which opens a thrilling path for connecting nodes opportunistically and communicates wirelessly and at the similar time expands the possibilities for real-life application problems. Presented ad hoc routing protocols, although robust to quickly changing network topology, suppose the being there of a connected path from source to destination. In this proposed system, we make a base station (BS1) on the upper layer of water. It is situated where signal strength is good. It will get the connection either by RSU (Road Side Unit) or by satellite. When it will get connected by RSU or satellite, sonar waves of base station amplifiers. Another base station (BS2) is situated under water at some distance from BS1 & gets radio waves by base station & its Sonar waves gets amplified.
Research on the Method for Extracting the Cellular Microscopic Digital Features of Coniferous Wood
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.147-160
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The cell slices of 5 species of common coniferous wood, including Cupressaceae, Abies nephrolepis, Picea jezoensis var. microsperma, Pinus koraiensis and Pinus massoniana and so on, are analyzed for the establishment of a hexagonal shape to simulate the wood cell structure. By using the image processing technology, the relevant parameters are extracted, including quasi-circular degree, the surface area, perimeter, width and thickness of cells, wall thickness, ratio of wall to cavity, ratio of cavity to diameter and cell density. In the experiment, mathematical analysis was made on 5,000 cells of the 5 species, and the cell sampling section was determined. After sampling, with the parameter values of cells obtained compared to the standard values, the error is within 10%. Afterwards, the value range of the cell parameters of each species is determined, which provides data basis for the recognition of wood species. Experiments show that the algorithm performs with better robustness in the recognition of wood species.
Research on Associated Logistics Transportation Scheduling With Hard Time Windows Based On Chaos PSO
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.161-168
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper studies the associated logistics transportation scheduling problem with hard time windows and constructs the mathematical model. Optimize the chaos PSO problem using the improved adaptive inertia weight factor method to improve the accuracy and efficiency of the algorithm. Comparing our method with the GA and standard PSO algorithm, our algorithm has better performance with solving such problem.
Application of Open Source Technology in Japanese Translation System Design Based on Web2.0
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.169-176
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Facing the great impact of the Internet, Japanese translation field needs technical change. This article uses open source technology based on Web2.0 to develop Japanese Translation Information System. The research used open source software Apache as server-side application, PHP as Embedded development language, and MySQL database technology as Backend Server, realized low-cost and pollable open information system for Japanese translation. The development of the system is a technological change in the field of Japanese translation. The study in this field possesses important significance and practicable value.
Risk Aversion Coordination Simulation Model for Supply Chain
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.177-186
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Facing the complex and changeful market environment, members of the enterprise in supply and demand network more consider seeking to build partnerships, with a specialization in a larger scope; effectively reduce all kinds of business cost of the enterprise, fully realized system scale effect. First discussed the basic characteristics of the network of supply and demand and enterprise, using the game theory analysis method and the least squares curve fitting of ideas, constructing a dynamic game model of the cooperation of supply and demand network enterprise dynamic evolution; And then analyzed the results of cooperative game, get the optimal expected revenue function and cooperation profit coefficient which is the important factor of enterprise dynamic cooperation choice to influence members of supply and demand network; Finally, considered a two layers of supply and demand system consisting of a risk averse retailer and risk aversion of the manufacturers, retailers to develop the optimal wholesale price, manufacturers to determine the optimal distribution, constructed based on revenue sharing costs shared network coordination model of supply and demand. Simulation results show that when the supply and demand system of risk aversion coefficient is higher than the risk aversion coefficient of manufacturers and retailers, the revenue sharing cost sharing contract system can be improved significantly, even perfect coordination.
Research of NCS Algorithm in Cloud Demand System
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.187-198
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In order to reduce the bandwidth overhead and the node request rejection rate of the cloud video-on-demand server, this paper builds the cloud auxiliary framework and proposes the neighbors and chunks selection algorithm, which contains the node selection sub-algorithm and the block download sub-algorithm. The buffer-based node selection algorithm treats the download point as the benchmark to effectively find the neighbor nodes that can provide the video data, and the buffer-based block download algorithm calculates the required minimum buffer values of the two different kinds of block download strategies under the framework, which provides the theoretical basis for the download method of the video block. The experimental results show that the algorithm in this paper achieves good effects in the aspects of the bandwidth overhead of the server, the request rejection rate and the download rate.
Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.199-210
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In view of collaborative development environment web services supplier in ability, cost, time supplier relations and component relevance information under uncertainty problems. The fuzzy multi-objective task assignment model of web services are built in a collaborative development environment. Using α cut sets and extension principle to simplify the fuzzy multi-objective assignment mode, we get the solution of simplified assignment model via the Genetic and simulated-annealing algorithm. In view of the model solution sets are fuzzy and uncertain membership function, a new centroid defuzzification method is used for the model solution. Thus the optimization allocation of component supplier’s fuzzy task is realized in collaborative development environment. Finally, the simulation results verify the feasibility of the proposed method, which can ensure the suppliers’ tasking in successive software project in collaborative development environment.
Comparison of Micro- and Macro-Characteristics of Vehicular Mobility Models
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.211-220
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Simulation methodology is preferred approach to test vehicular networking protocols and to perform overhead analysis compared to high affordability and inconvenience of the real testbed. The confidence of simulation results is greatly dependent on the adoptive mobility model, i.e. whether or not the vehicular mobility modeling could reproduce the real vehicle moving pattern and could capture the intrinsic spatial as well as temporal relationships among vehicles. From the perspective of macro- and micro-scale, this paper proposes a series of statistical characteristics to assess whether the existing mobility models reflect a regular pattern. Micro-characteristics cover individual statistics, including driving duration time, driving distance, parking duration time, and link holding time. Simulations show that diverse mobility models share similar micro-characteristics in the complementary cumulative distribution function, but still display innegligible differences in distribution curves. Macro-characteristics refer to overall correlations, such as average velocity, total driving distance, total driving time, average neighbors' degree, and average accelerating time. Results show that the investigated mobility models behave with similar phase transition, but with different critical transition points. Marco-statistics follow Poisson distribution, but with completely different average values. The work is expected to help researchers better understand simulations and design context-aware vehicular algorithms.
Control and Anticontrol of Chaos for Arrhythmia Based on Impulsive Differential Theory
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.221-228
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The chaotic dynamic characteristic of arrhythmia is analyzed and the control and anticontrol of chaos in arrhythmia are presented in this paper. First, the cardiac chaotic dynamics can be established based on the clinical data between heart RR signals using statistical modeling approach. Then, this paper utilizes the advantages of approximation accuracy of artificial neural network to simulate cardiac output between the RR signals. Finally, based on the impulsive differential theory, we put forward a novel chaotic control and anticontrol algorithm to deal with cardiac dynamics model between RR output signals to eliminate cardiac arrhythmias.
Application of Mobile Robots by Using Speech Recognition in Engineering
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.229-234
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents an expected technique of speech recognition system and it relates to voice control of electromechanical application, especially voice controlled mobile robots or intelligent wheelchair for handicapped people. Our aim is to interact with the robot using natural and direct communication techniques. The aim of this Chapter is that how the voice can be processed to obtain proper and safe wheelchair movement by high recognition rate. In order to make voice an effective communication tool between human and robots, high speech recognition rate must be achieved. But one hundred percent speech recognition rate under a general environment is almost difficult to achieve. In this Chapter, proposed technique called (Multiregdilet transform) is used for lonely words recognition. Finally use the outputs of neural network (NNT) to control the wheelchair through computer note books and special interface hardware. A successful recognition rate of 98% was achieved.
The Driver Fatigue Status Classification Based On Multi Region Evidence Support
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.235-248
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Multi-observation areas based ensemble learning models are proposed for general fatigue performance identification. It is believed that although the expression of fatigue is not obvious. If the observation areas are concerned, the performance of fatigue will be relatively concentrated and the law of expression changes will be much clearer. Another advantage of feature extraction from the observation areas is that it can greatly reduce the interference caused by redundant information in the face when learning classifiers. For each observation area, a C4.5 base classification model is built. Each base model is equivalent to an independent decision maker. But due to its limited capacity, it may not be able to give accurate decisions. However, if the information provided by each decision maker is combined together, it will form comprehensive evidence. Driver status classification results given by ensemble learning approach are more accurate and stable.
Locate and Detect Persons in Crowded Scenes Aided by Objectiveness Measure
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.249-256
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Locating persons in crowded scenes is very difficult due to multi-resolution and complex environment. The other difficulty in pedestrian detection domain is the real time requirement, because the camera installed on the crossing road is in high definition. In this paper, we presented a multi-task pedestrian detection framework boosted by Bing feature. We firstly trained upright full-body, multi-person, half-body and head models, then we compute the object-ness score and generate 1000 proposals by Bing feature, and at last we apply different model to different aspect ratio of the detection proposals. The experiment results on the PASCAL VOC 2007 show that our method outperforms all the other methods and achieved lower miss rate than the state-of-the-art. The computation time cost is just the half of state-of-the-art method.
Research of the Combination of Distributed Business Processes Based on Dynamic Planning
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.257-266
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In order to achieve the collaborative completion of entire business process by composition between different workflow management systems, a process composition method based on dynamic programming has been put forward. By analyzing differences and relations between process composition and Web services composition, many aspects have been analyzed with regard to service interface of the workflow system, the interaction control between the workflow systems, parameters and message’s delivery and the planning indexes according to the characteristics of process interaction among the distributed workflow systems. When the process is running, according to the indicators and expectations of users, the optimal workflow services and sub-processes would be selected through dynamic planning method, to provide support to the dynamic combination of workflow processes in a distributed environment.
Designing of Fuzzy Logic Controller for Liquid Level Controlling
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.267-276
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In control system there are a number of general systems and methods which are encountered in all areas of industry and technology. There are many ways to control any system, in which fuzzy is often the very best way. The only reason is faster and cheaper. One of successful application that is used for the controlling of liquid level is fuzzy logic controller. In order to find the best design to stabilize the liquid level in this method, some factors will be considered. For this paper, the liquid level was controlled by using three rules of membership function which then extended to five rules, seven rules and nine rules for verification purpose and further improvement of the system. This paper was focused to the software part only. By doing some modification in this paper, the design will be very useful for the system relates to liquid level control that widely use in industry nowadays. For a long time, the selection and definition of the parameters of PID controller are very difficult. There must be a bad effect if you do not choose nicely parameters. To strictly limit the overshoot, the use of Fuzzy controller can achieve a great control cause. In this paper, we take the liquid level water tank, and use MATLAB to design a Fuzzy Controller. Then we analyze the control effect and compare it with the effect of PID controller. As a result of comparing, Fuzzy Logic Controller is superior to PID controller. Comparison of the control results from these two systems indicated that the Fuzzy logic controller significantly reduced overshoot and steady state error.
A Reliable Automatic Service Composition Method Based on Type Theory
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.277-290
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Research on Capability Assessment of IS Outsourcing Service Providers
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.291-298
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
IS outsourcing services have developed into a major and continuously growing IS services business. Although there is a wealth of academic literature examining information systems (IS) outsourcing, there is little academic literature that addresses the current outsourcing problem that most firms facing, which is how to assess IS outsourcing service providers’ capability. Given multiattribute nature of IS outsourcing service providers’ capability assessment, this paper argues that thirteen capability criteria should be considered for assessments, and proposes the PROMETHEE as aids in assessing IS outsourcing service providers’ capability decisions, together with changing weights for a sensitivity analysis. It shows by means of an application that the presented method is very well suited as a tool for the IS outsourcing service providers’ capability assessment.
A Novel Feature Detection Algorithm Based on Improved 2DPCA- SIFT
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.299-304
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Stable local feature and representation is a fundamental component of many image registration, 3D reconstruction and object recognition algorithms. SIFT is a good descriptor that encodes the salient aspects of the image gradient in the feature point’s neighborhood. This paper improved SIFT- based local image descriptor and proposed a SIFT feature matching algorithm based on improved 2DPCA which can eliminate both rows and columns of relevance. Experimental results show that improved 2DPCA-SIFT algorithm is relatively stable, accurate and fast.
Pole Placement Using Genetic Algorithm with Integral Control
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.6 2015.06 pp.305-312
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents the application of genetic algorithms to find the optimum feedback gains in pole placement with integral control to get the desired performance in control system. Performances are measured in terms of key parameters like settling time, peak overshoot, undershoot, rise time etc in control system. The major drawbacks of pole placement technique are to get optimum location of poles and we cannot place zeros at desired locations. Dominating concept of poles is enough for placing poles for systems which transfer functions are without zeros. But if there are zeros in transfer function then it is not enough to place pole with dominating pole concept because presence of zero can destroy the dynamic response of control system. In this paper genetic algorithm is used to find the optimum locations of poles to get the desired response and compensate the effect of zeros on transient in case zeros are present in transfer function. GA is a population based algorithm to find the global solution of a problem. This paper compares the unit step response of a plant with presence of zero in transfer function. The same GA based technique is used for finding optimum location of poles to get the desired response for magnetic levitation system. This analysis is well supported by the simulation and experimental results done using MATLAB and Simulink.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.