{"title":"Wind Random Signal Processing Strategy Based on Weighted Entropy","authors":"D. Yue, Yong-min Jiang","doi":"10.1109/ITA.2013.26","DOIUrl":"https://doi.org/10.1109/ITA.2013.26","url":null,"abstract":"Over the last few years, wind power is the fastest growing, most widely used of the emerging renewable energy. Due to the randomness of wind power and it is not controllable, wind power is intermittent and volatility. With the increase of proportion of wind power in power grid, control the influence of wind power to power grid system frequency stability, becomes the key to ensure system stability and reliability problems. To effectively explore the wind itself implied the inherent law of random variables, this paper employed weighted entropy uncertainty measure theory, put forward multiple signal fusion method based on weighted entropy, to measure random events of the role of wind power system, power grid events to the connotation of the single attribute weight. Describes the calculating process of this method through examples and computational results, shows the frequency of random events and the limit of the inner link, for the correct decision and the selection of treatment methods to provide the basis.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"70 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131724622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Investment Strategies Based on Sector Rotation Effect","authors":"Xiaoguang Lu, Yingli Shen","doi":"10.1109/ITA.2013.119","DOIUrl":"https://doi.org/10.1109/ITA.2013.119","url":null,"abstract":"Based on the Business Cycle Theory and the Efficient Market Hypothesis, this paper proposed the concept of Sector Rotation Effect and Mystrey of Sector Rotation. Further, in order to test the robustness of the sector rotation investment strategy, it conducted some empirical studies in accordance with the data from China's securities market and the macroeconomic data. Moreover, it adopted Sharpe's single-index model of Quantile Model to find out significant differences among the periodic fluctuation range in various industries. In addition, it holds the belief that stock market is remarkably featured by Sector Rotation, meanwhile, the investors could take market-timing investment according to the periodic fluctuation range of the stock price.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125614416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm for Narrow-Band Interference Suppression in CDMA Communication System Based on Probability and Statistics Search","authors":"Wenjun Lv, Xiaoli Xi, Yongxing Du","doi":"10.1109/ITA.2013.6","DOIUrl":"https://doi.org/10.1109/ITA.2013.6","url":null,"abstract":"CDMA communication system has a certain anti-interference performance, but when the interference is stronger, the performance and stability of system will descend obviously. In this paper, narrow-band interference suppression based on FFT transform is adopted to improving anti-interference performance of CDMA communication systems significantly. Probability and statistics search for interference signal is used in frequency domain, which increases the stability of anti-interference. This paper describes Mat lab simulation and FPGA implementation of the algorithm. Hardware experiments show that the algorithm can improve the performance of narrow-band interference suppression for the ordinary CDMA mobile phone about 25dB.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131205170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rail Type Electromagnetic Launch System Condenser Discharge Pattern Study","authors":"D. Yue","doi":"10.1109/ITA.2013.115","DOIUrl":"https://doi.org/10.1109/ITA.2013.115","url":null,"abstract":"Rail type electromagnetic emission in high pressure physics research field has a broad application prospect. In this paper, we study the basic problem of electromagnetic rail launch, optimization scheme is put forward. Modeling and simulation work has been down using the MATLAB Simulink software, for an orbital launch module more energy storage system based on of theoretical analysis. We mainly studied and analyzed several different discharge modes of many module energy storage device including (Synchronous discharge, discharge in order, discharge in the 3-4-3 order, and the order 4-3-3 discharge mode). Emission rate of different patterns, energy utilization and so on were compared. The simulation results show that the synchronous discharge mode is most optimal in the track type electromagnetic launch system which track length is shorter. The conclusion is good reference for rail electromagnetic launcher further design and optimization.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129245298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yaqi Wu, Zhao Zhao, Kun Qian, Zhi-yong Xu, Huijie Xu
{"title":"Analysis of Long Duration Snore Related Signals Based on Formant Features","authors":"Yaqi Wu, Zhao Zhao, Kun Qian, Zhi-yong Xu, Huijie Xu","doi":"10.1109/ITA.2013.27","DOIUrl":"https://doi.org/10.1109/ITA.2013.27","url":null,"abstract":"Snoring is a typical symptom of Obstructive Sleep Apnea-Hypopnea Syndrome (OSAHS) patients, which has motivated numerous researchers focusing on how to diagnose this disorder by acoustic signal analysis methods. As a non-invasive approach, acoustic diagnosis brings a much more comfortable and convenient experience to subjects than the gold standard, polysomnography (PSG). However, there is a more demanding need from doctors to find the variations of the upper airway (UA) during a long duration for OSAHS patients. Formant features have a good performance on indicating the structure variations of UA, which can be regarded as a resonance in the snoring generation model. In this paper, we proposed a long duration analysis method of snore related signals (SRS) method based on formant features. The first three formant frequencies (F1, F2 and F3) are extracted to group the long duration SRS data into different states with the help of K-means method. Each state of SRS data represents a degree of collapse in UA. We found that formant features have distinguished values in different states and the transition possibility calculated by Hidden Markov Models (HMM) between each state is helpful for analysis of long duration SRS data. This method could be effective in analysis of variations in UA for OSAHS patients and establishment of long duration SRS database.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115572294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some Improvements on the Rules for Exchanging Between Error Model Annex and AADL to Fault Tree","authors":"Quan Zhang, Shihai Wang, B. Liu","doi":"10.1109/ITA.2013.84","DOIUrl":"https://doi.org/10.1109/ITA.2013.84","url":null,"abstract":"AADL (The architecture analysis and design language) can be used to describe the reliability of the safety critical system. In this paper, we, firstly, make an introduction on the AADL dependability model and summary the basic rules for translating from Error Model Annex (EMA) of AADL to Fault tree, and then we make a series of improvements on the transition rules from EMA to Fault tree in terms of various AADL architectures. There are a few of examples are provided for demonstrating how to use our modifications.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116397994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Realization of Privileges Management Solutions Based on Eclipse Plug-Ins","authors":"Lu Wang, Hun Huang","doi":"10.1109/ITA.2013.42","DOIUrl":"https://doi.org/10.1109/ITA.2013.42","url":null,"abstract":"User privileges management is a critical function of User-oriented software system. Eclipse Rich Client Platform is the latest expansion of plug-in system based on open service gateway protocol, which make a feature of integration scalability and flexibility. Privileges management solutions Based on Eclipse plug-ins, which works on the principle that Eclipse rich client platform can dynamically integrate JAR plug-in packages, implement the custom operation interface after users' logging in successfully, which completes the interface plug-level access control.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122658547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Trust Model Based on Peer-to-Peer Network Security","authors":"H. Kun, Wang Lu","doi":"10.1109/ITA.2013.35","DOIUrl":"https://doi.org/10.1109/ITA.2013.35","url":null,"abstract":"P2P network is dynamic, self-organized, and anonymous and has some other features. P2P network cannot guarantee that all the peers can provide reliable resources and good service. Some Peers even have malicious behavior, such as Provision of false information, spread of illegal advertising, dissemination of Trojans and worms. In order to solve these Problems, the trust mechanism is introduced to P2P network and trust model is built to establish trust relationship between Peers. The popular research directions were introduced. The major sorts and key technologies were analyzed, and the algorithms in recent research were summarized. Based on the analysis of the capabilities of the trust model, its shortages were presented. Finally, some directions for future research were discussed.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126306889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Information Processing and Interactivity Technology in Charging/Battery Swap Service for Electric Vehicles","authors":"Ya-wen Wang, Hongfeng Zhang, Chao Zhang, Chao Wang, Yannian Wu","doi":"10.1109/ITA.2013.43","DOIUrl":"https://doi.org/10.1109/ITA.2013.43","url":null,"abstract":"It is an urgent demand for the popularization and commercial application of electric vehicles that we study the application for interactive technology of charging/battery swap service for electric vehicles. Based on the operation and monitoring master station, in combination with the Internet of things techniques, the GIS techniques and the GPS techniques, we study the application for multiple interactive technologies such as multiple service channels, intelligent service, smart card and so on, to provide a range of solutions for the charging/battery swap requirements. At the end of the paper, it shows some interactive application results, and gets the summary.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116867750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Query Conversion Scheme for Encrypted Cloud Databases","authors":"Hequn Xian, Jing Li, Xiuqing Lu","doi":"10.1109/ITA.2013.40","DOIUrl":"https://doi.org/10.1109/ITA.2013.40","url":null,"abstract":"Encryption is an effective way of protecting sensitive data that have been outsourced in the cloud computing environment. But it is computationally expensive for the database management system to carry out SQL queries against the encrypted data. A query conversion scheme is presented which converts traditional database queries to encryption specific versions so that the queries can be directly executed on the cloud server. This scheme dramatically increases the efficiency of query processing in encrypted cloud databases, and it provides high transparency for end users by introducing a SQL gateway to the user applications and the cloud server.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}