Earticle

현재 위치 Home

International Journal of u- and e- Service, Science and Technology

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJUNESST) [Science & Engineering Research Support Center, Republic of Korea(IJUNESST)]
  • pISSN
    2005-4246
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.8 No.7 (39건)
No
1

Research on Adaptive Prediction Algorithm

Xiaoxuan Ma, Ya Deng

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.1-12

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The paper aims to solve the problem that the nonlinear model of control system being hard to fetch parsing and impossible to be completely accurately described by mathematical model, and thus adopting adaptive predictive control algorithm for its capability of on-line identifying the variation characteristics of uncertain parameters. At the beginning, we analyze the advantages and disadvantages of many kinds of adaptive control method. Then the characteristics of cascade control system are put forward. According to the principle, we study adaptation prediction open-loop control by simulation. Later, taken interference’s effect on main variable into account, we design adaptive prediction closed loop scheme to improve the system’s adaptive capacity at the time the load changing, and then identify a cascade control program whose inner loop is PID controller and outer loop is self-adaptation predictive controller. At last, we analyze the simulation results and make a conclusion that closed loop self-adaptation predictive control improves stability and dynamic property when the system is under interference.

2

Application of Spectrum Data Management Based on Bayesian Network

Dai Li

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.13-24

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the spectral data management, under different regions and different time, spectral data is very big, resulting in the spectrum management would be difficult, this article based on Bayesian network of depth neural networks, aiming at the characteristics of spectrum management, studying the spectrum historical data, and according to the results to forecast spectrum occupancy, in order to achieve the spectrum management, the experimental results compared the spectrum of predictions and reality, and verified the effectiveness of the algorithm.

3

Components Replenishment Model of ATO Supply Chain with Supplier Alliance

Li Yuyu, Huang Bo

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.25-34

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Under the assumption that ATO (assemble-to-order) supply chain consists of an assembler and two suppliers, who respectively provide one component to the assembler and may form an alliance to negotiate with the assembler, we develop a components replenishment model to study how the ATO supply chain decides components replenishment policies and the suppliers’ alliance policies. The optimal solution of the model is obtained, and the effects of the bargaining power on the optimal solution are theoretically and numerically analyzed. We found that with the enhancement of the bargaining power of the assembler to one supplier, the component selling price and profits of this supplier reduce, and those of another supplier increase. Simultaneously, the expected profit of the assembler increases if its bargaining power is stronger than the other supplier, otherwise, it decreases. If both suppliers’ bargaining powers are stronger than assembler’s, they should bargain with the assembler jointly; if both of their bargaining powers are weaker than the assembler’s, they will bargain with the assembler individually.

4

Quantitative investment Based on Artificial Neural Network Algorithm

Xia Zhang

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.35-48

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Financial investment has become an important issue, there are many trading strategies and parameters based on quantitative models, this paper use neural network algorithm to optimization strategy parameters, various combinations of optimization strategies, as well as the evolution of new strategies to generate better returns. The empirical results show that this method has a stable and substantial return on investment, neural network can be used as an aid for decision making investments in securities.

5

Towards Model Integrations of Tools and Techniques for Project Management Success

Tomas U. Ganiron Jr

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.49-62

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Since the cost of construction materials and real estate value are increasing, the design and construction of buildings and infrastructures need to be more competitive by utilizing advanced tools and techniques for project management success. The methodologies of modern project management are highly analytical, usually requiring automated tools to support them on large projects. Managers prefer specific project methodology, while resist and face difficulties for an opportunity to manage another project with different methodology as they do not know how much commonality exists between the preferred and the new required methodology. This paper presents the different tools and techniques in engineering projects. The result was obtained from the views different client organizations, project managers, design consultants and contractors, as to what determines project success.

6

Based on Co-integration Test and Granger Causality Test for Economic Growth and Consumption of Conventional Energy Resources

liu Xin, Song Yongpeng, Zhang Qianqian, Pang Bo, Qin Mingzhou

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.63-70

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

7

A Simply Carbon Pricing Model between Government and Enterprises based on Game Theory

Aihua Luo, Zhengshun Ruan

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.71-78

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

8

Analysis of Multi-climate Controller Data in Tomato Greenhouses

Kyeong Ah Ahn, Won Hyuk Jung, Jin Young Byeon, Young Chan Choe

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.79-88

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Most farms in South Korea have not applied the best use of greenhouse controllers. The system is used at a basic level, which is only possible to turn on/off at the facility. Therefore, further data analysis is needed to improve greenhouse management and to develop the future value of the technology. This study tests a growth model of the greenhouse tomato by analyzing a set of data collected from a multi-climate control system. The growth model is used to examine the growth rate of tomatoes depending on the climate variables. The results show that the growth rate of the stem thickness and leaf area is affected by temperature, CO2 concentration and humidity. Since the variables fluctuate between control points, a nonlinear model would fit the data better than a linear one. The results could be posted up on a dash board or sent via a smartphone to the management decision maker.

9

Urbanization is not only an important way to transfer the rural labor but also an efficient way to improve life quality. The text takes Jiangxi province as an example. It is based on the statistical data of Jiangxi province from 1978 to 2012 and makes a empirical study on the relationship between urbanization and the effect of urban-rural income gap. And the result shows that there is, indeed, a long-run equilibrium relationship among the two above, and to be specific, the improvement of urbanization is conducive to narrowing the income gap. And it is one of those significant ways to narrow the urban-rural income gap by speeding up the urbanization.

10

Motion Tracking System for Multi-User with Multiple Kinects

HwanIk Jo, HuiBeom Yu, Karam Kim, Jung Hwan Sung

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.99-108

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

User motion recognition through image recognition has attracted considerable attention with the development of the Kinect senor by Microsoft. The Kinect exhibits excellent motion recognition performance at a small expense via a motion tracking method utilizing an RGB-D camera. Further, the Kinect offers the advantage that applications can be easily written for it using the Kinect SDK. However, the Kinect also suffers from the disadvantage that it is unable to recognize an image “shielded” by an object because of the application of the vision recognition method by the camera. Consequently, it is difficult to obtain accurate data concerning user movement. Studies on observing an object from various directions with multiple Kinects are being conducted to compensate for this problem, and it is possible to acquire the movement data for only one user in these studies. This study implements the human body trace system for multiple users. We suggest a method to compensate for the location of the user and motion data that cannot be recognized by one Kinect using data acquired by multiple Kinects.

11

Study on the Prediction of Real estate Price Index based on HHGA-RBF Neural Network Algorithm

Huan Ma, Ming Chen, Jianwei Zhang

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.109-118

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The traditional error of the back-propagation algorithm multilayer feed-forward network (BP neural network), there are the flaws of a slow convergence of forecast, getting local minimum solutions easily, and forecast accuracy rate is not high. This paper proposes a new approach which is the combination of hierarchical genetic algorithm and least squares method to optimize the RBF neural network such that we can predict the real estate price of the Real estate Price Index. And which overcomes the shortcomings of traditional Fourier analysis, has good localized characteristics in the time domain and frequency domain, and has important value. In signal processing, image processing, voice analysis and other fields. The hierarchical genetic algorithm is usually used to optimize the topology of the RBF neural network, the radial basis function center and width. Alternatively, the least squares method could play an important role in deciding the weights of the output layer. The experimental result shows that the feasibility of RBF neural network which could be optimized by the hybrid hierarchical genetic algorithm to predict real estate closing price, and the superiority of this approach in the aspect of prediction accuracy verified in comparing with the other two methods.

12

Study on the Allocation Problem of the Equipment Maintenance Support Resources

Wang Hongxia, Ye Xiaohui, Yin ming

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.119-126

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Aiming at the problems of lacking of system engineering method for the equipment maintenance support resource allocation problem, the problem to be solved for resource allocation is proposed from the three hierarchical perspective which is “what to allocate , how to allocate, and how much to allocate”; from the three aspects of the demand analysis, allocation method, optimizing allocation, the connotation of the problem is described, and for the each problem the essence of the problem solving method is studied systematically; the proposed method can provide science and technology support for the equipment maintenance support resources allocation scheme in the design phase.

13

Multi-server environments are that the user registers the single registration server and since the user uses the service to authenticate on multi-server. For this, many user authentication schemes have been proposed for multi-server environments. In 2013, Li, et al., proposed dynamic ID based remote user authentication scheme for multi-server environments. Unfortunately, their scheme is vulnerable to forgery attacks and replay attacks. In this paper, we analyze the security vulnerabilities of Li et al.’s scheme, and propose dynamic ID based remote user authentication scheme for multi-server environments. The proposed scheme ensures the safety to various attacks such as forgery attacks and replay attacks. Just like the existing schemes, our scheme is efficient at using the hash function and exclusive-OR operation.

14

Robustness-Improvement Strategy and Modeling under Uncertainty of Chinese Catering Service Supply Chain

Juanqiong Gou, Jing Xiang, Shujun Zhang, Wei Dai

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.137-150

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Catering Service Supply Chain (CSSC) is a new supply chain, of which Catering Service Integrator (CSI) is in the center accompany with Functional Catering Service Provider (FCSP). The core objective of CSSC is to provide different catering enterprises with supply chain services. Instability, non-standardization, specialty and diversity characteristics of the Chinese catering industry inevitably lead to demand uncertainty of CSSC, directly resulting in the uncertainty of operation and supply side. The uncertainty of supply chain system is the basis of robust optimization study, under the influence of uncertainty, robustness is extremely important to ensure stable income and continuous operation of supply chain. This research classifies various uncertainty scenarios, based on robust optimization method. Two strategies, service coordination with widely knowledge sharing, and synchronous decision with intelligent inducement, are designed to induce and integrate personalized demand to get the scale effect and the coordination of the entire supply chain. From a point of quantitative view, this research builds up robust optimization model to improve robustness of CSSC, deposing the target into two coordinated parts. The coordination is of great sense, including two objectives simultaneously, the first one aims to maximize the delivery rate of order demand, the second one aims to optimize profit of CSI and FCSP. According to data examination, the coordinative strategies and robust optimization model can effectively control the uncertainty of the whole supply chain, and then improve the robustness of CSSC.

15

Dynamic Culling Scheme for Graphic Rendering System of Flight Simulator

Chung Jae Lee, Kyoung Choon Park, Ki-Il Kim

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.151-160

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recently real-time overhead processing technology has received great attention from many researchers since it is expected to play a great role in improving frame per second. Also, this technology is suitable for flight simulator where large number of vertices as well as high resolution image is demanded. Even though typical culling or level of detail can be applied to flight simulator, more deep consideration is required because flight simulator operates in three dimensional space in the air. Among the possible technologies, view-frustum culling is one of key research area by improving rendering speed. But, despite of importance, since unnecessary data processing remains, it is reasonable to execute culling technology by adding the several elements such as aircraft altitude information, pitch angle dynamically. To develop a new dynamic culling, in this paper, we propose hybrid dynamic culling scheme by combining the view-frustum and the back-face culling together. The proposed culling scheme uses the fuzzy logic to determine culling ratio based on aircraft state information for visibility test. Finally, we demonstrate that the proposed scheme shows faster rendering speed than current culling scheme through experimental scenarios which are implemented by open source Open Scene Graph graphic library.

16

Web Information Credibility: From Web 1.0 to Web 2.0

Jie Zhao, Xiaoyang Lu,, Xueya Wang, Zheng Ma

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.161-172

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Web has been one of the major information sources in people’s daily life. However, a majority of Web information are regarded as incredible, as most Web information are not well evaluated before they are posted online. This eventually has a substantial impact on Web information utilization. For example, faked Web information will lead to wrong decision in business areas. In addition, the development of Web 2.0 makes people more convenient in producing and spreading information on the Web, which even worsens the information credibility problem on the Web. Thus, in this paper we review the current advances in the researches on Web information credibility, including related systems and methods for Web 1.0 information as well as existing studies on microblog information credibility. Finally, we propose a future research framework focusing on microblog information credibility.

17

A Model of High School Student Financial Assistance System in China

Hua Ding, Zhongliang Guan, Zhihong Tian

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.173-182

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

18

A Study of Success and Failure in ERP Implementation : The Case of the Agricultural Products Processing Center

Jin Hyeung Kim, Jung Rock Do, Young Chan Choe

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.183-194

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As the number of large-scaled Agricultural Products Processing Center (APC) increases, the introduction of the ERP system has been actively promoted in agriculture. Although there are effort to apply the ERP system in agriculture, successful cases of APC are rare because of the limitation of ERP system and lack of user’s awareness. The purpose of the study is to derive success factors of ERP implementation by comparing two cases of APC which adopted ERP system. This study used 11 Critical Success Factor (CSF) to analyze whether two APCs had implemented these factors and to find the importance of CSF before and after ERP adoption. The implications of this study are as follow. The results of this study can minimize trial and error of APC that uses ERP system by sharing success factors. In addition, the government can use these factors as APC target selection index for ERP government business.

19

The Research on Cooperative Ability of Technology and Finance in Western China based on ANP-FCE Model

Pang Min, Wu Jing, Li Yutong

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.195-204

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the steady economic development in the western region of China, technology and finance has gradually become the inevitable choice of adjusting economic structure and maintaining sustainable development. From the premise of developmental characteristics of technology and finance in western area, this article constructed the index evaluation system of cooperative ability of technology and finance and conducted in-depth research on collaborative ability of technology and finance in the west region of China using ANP-FCE model, and put forward relevant suggestions for improvement to accelerate the economic development as well as enhance collaboration ability of technology and finance in western area.

20

The While spending field configurations, changes in this direction can be seen as being consistent with a direct role in the strengthening of government welfare as society advances. Although the development of a welfare state is to better direct the government to expand the welfare budget for funding it. It should be created that, despite the budget, due to this expansion through the social welfare scheme for the expansion of welfare financing agreement with this decision, recognizing tables for the election may not be a big problem there. In other words, if it is determined through the election that the social welfare system, in which we really need to recognize and an effective welfare system is not billed because they are to be introduced. Most of the construction of welfare expenditure is through social insurance, public assistance, social services and welfare issues which are related to the elderly, is on the rise particularly sharply preferred, but a variety of these expenditues will be the biggest social problems for our country. The aim of this study is to find a political response which measures on government budgets tailored to the rapid increase in the elderly by analyzing the overall status and operational budgets of welfare for the elderly in the welfare budget of the government.

21

Research on the Construction of Evaluation Platform for Multimedia Transmission in the Internet

Liang Hu, Li Chen, Lianggui Liu

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.211-222

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

All kinds of multimedia data are now transferred via network, which need high level QoS standard because of different compression parameters, network parameters and the status of the network. In this paper, we first discribe relevant parameters and results of the correlation between these parameters by using a novel simulation tool. Usually the factors that affect the transmission of the multimedia in the network generally include: GoP (Group of Picture) pattern, compression quantitative parameters (Quantization Value), the Packet length (Packet Size) and Packet Error Rate (Packet Error Rate). Then, based on the basis of Evalvid and NS2 simulation platform, a new set of tools group are set by integrating these two tools. Video traffic trace file is used to evaluate the network structure in existing research and image quality. Moreover, further study of correlation between these factors and image quality is conducted.

22

Survey on a Novel Wireless Sensor Network Communication at 433MHz Frequency

Xiaoqing Yu, Wengting Han, Zenglin Zhang

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.223-234

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Wireless underground sensor networks (WUSN) are a promising new technology for monitoring soil information with a high spatial and temporal resolution for large areas. However, the significantly high attenuation caused by soil is the main challenge for the feasibility of WUSN. Recent theoretical results highlight the potential of smaller attenuation rates with the use of smaller radio frequencies. In this paper, experimental measurements have been conducted with commodity sensor nodes at the frequency of 433 MHz. Experiments are run to examine the received signal strength of correctly received packets and the packet error rate for a communication link. The tests show the potential feasibility of the WUSN with the use of powerful RF transceivers at 433MHz frequency. Moreover, we also illustrate a classification for wireless underground sensor network communication. Finally, we conclude that the effects of burial depth, inter-node distance and volumetric water content of the soil on the signal strength and packet error rate.

23

Snapshot of Technology Business Incubators in China

Nasir Mahmood, Cai Jianfeng, Farhan Jamil, Hina Munir, Jintao LU, Mustafa Khan, Yue Cai

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.235-242

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the contemporary world, the production of suitable goods and commodities and business developments, the business technology incubators are considered important for the inception of new ideas and combining them with the available resources. Similarly, business and technology incubators are considered a backbone to accelerate the innovation and new business development structure of national economies. The business incubators in China are flourishing by leaps and bounds since the mid of 1990s. This paper aims to explore the performance of technology business incubator in china. In this study the incubator data which was compiled by Ministry of Science and Technology (MOST) China was taken for performance evaluation in china. The performance of incubator in 2002 and in 2012 was assessed by comparison of total number of tenants, total income of tenants, number of graduated tenants and number of employees of tenants, further, in 2012 the association of number of invention patent with the accumulated number of tenants obtained investment and finance is assessed, and this paper also presents the graduated firms number every year in China. These results show that the performance of technology incubators is increased during the last decade.

24

Application of Smart Technology in the Integrated Environmental Management of Urban Wetland Park

Xiaodan Zhao, Shaoping Wang

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.243-250

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Wetland Park is one of the important ecological infrastructures. Besides providing the ecosystem service function and value, it is also an important place for leisure and entertainment. Efficient environmental management is an important measure to promote the sustainable development of the wetland park. By combining the smart technology with routine management method, the efficiency of the environmental management for the urban wetland park can be improved. The application of smart technology set the users' requirements as the basic goal, which is divided into four layers: perception layer, transport layer, support layer and application layer. The perception layer consists of sensor, camera, RFID, mobile terminal device and so on; the transport layer is composed of optical fiber, WIFI and 3G network; the support layer is composed of data management system, information open platform and service support system; and the application layer is composed of four modules including panoramic-view park, environmental maintenance, smart tourism and public participation. A wetland park located in Zhangzhou city, Fujian, China, was taken as a practice case.

25

Dynamic Virtual Teams in Project Management

Esra'a Alhasanat, Mohammed Alawadi, Mustafa Hammad

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.251-258

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Nowadays, with the increasingly important role of technology and internet in our world, it has become not only possible, but necessary for organizations that work globally to cooperate in teams that are spread out worldwide. These "Virtual Teams" (VTs) are imperative to the effective functioning of globalized organizations. Therefore, to improve the work of such organizations, it is necessary to study and understand the dynamics of information sharing and international cooperation among these geographically separated VTs. There are many researchers who talk about VTs, but they do not go into deep details about the importance of leadership, conflicting management, and communication tools. We start this research from the points of view of the people who play different roles in VTs. In order to get more realistic results, all the given suggestions and solutions must be more practical and meaningful. Our paper focuses on the factors that should be taken into consideration to get a dynamic VT. As a result, we come up with some advices and recommendations to lead VTs to become as successful as possible based on using communication tools, conflicting management, and leadership skills.

26

Cloud Service Trust Model and Its Application Research Based on the Third Party Certification

Haiyong Xu, Junhai Ma, Lei Li, Xueli Zhan

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.259-268

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the development of computer and Internet technology, the concept of cloud computing has been accepted by related industries worldwide, especially on the development in the field of telecommunications and electronic commerce field rapidly. This paper introduces the meaning, characteristics of cloud computing, advantages and service pattern, and with the introduction of technology development present situation and the crisis of confidence by the cloud computing, describes the safety bottleneck problems faced in the promotion process of the cloud calculation. This paper presents cloud service trust model based on third party certification, and then through the analysis and study of the model, describes the security situation in the presence of third party certification body under the condition of cloud services, the Nash equilibrium solution; and the general cloud computing and e-commerce trust system were compared, the third party authentication mechanism can effectively play its advantages in supervision, has the huge influence of credit risk rating on its own transactions and future credit decision.

27

Congestion Adaptability Management in Power Market

W. H. Chen

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.269-276

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents a novel method of congestion adaptability management in electricity power markets based on risk theory. Probability distribution of ambient conditions around transmission line is taken into account. Impact of overload of transmission line is also included. Instead of the traditional deterministic current or power constraint, the risk constraint is used for transmission line thermal security. An optimal power flow model is built based on the risk constraint. Primal-Dual Interior Point Method is adopted to solve the problem. The results provide a useful decision-making assistance for the independent system operator to relief transmission congestion. A test power system is used to illustrate the efficiency of the proposed method.

28

A Study of Today’s A.I. through Chatbots and Rediscovery of Machine Intelligence

Anirudh Khanna, Bishwajeet Pandey, Kushagra Vashishta, Kartik Kalia, Bhale Pradeepkumar, Teerath Das

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.277-284

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Artificial Intelligence in machines is a very challenging discussion. It involves the creation of machines which can simulate intelligence. This paper discusses some of the current trends and practices in AI and subsequently offers alternative theory for improvement in some of today’s prominent and widely accepted postulates. For this, focus on the structuring and functioning of a simple A.I. system - chatbots (or chatter bots) is made. The paper shows how current approach towards A.I. is not adequate and offers a new theory that discusses machine intelligence, throwing light to the future of intelligent systems.

29

Key Techniques of Super-critical CO2 Pipeline Transportation

Bing Chen, Shuangge Cao

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.285-292

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

30

Research on Crack Propagation Simulation of Mental Construction of Bridge Crane Based on Damage Mechanics

Xiaogang Qu, Gening Xu, Xiaoning Fan

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.7 2015.07 pp.293-302

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

 
1 2
페이지 저장