2013 International Conference on Information Technology and Applications最新文献

筛选
英文 中文
Wind Random Signal Processing Strategy Based on Weighted Entropy 基于加权熵的风随机信号处理策略
2013 International Conference on Information Technology and Applications Pub Date : 2013-11-16 DOI: 10.1109/ITA.2013.26
D. Yue, Yong-min Jiang
{"title":"Wind Random Signal Processing Strategy Based on Weighted Entropy","authors":"D. Yue, Yong-min Jiang","doi":"10.1109/ITA.2013.26","DOIUrl":"https://doi.org/10.1109/ITA.2013.26","url":null,"abstract":"Over the last few years, wind power is the fastest growing, most widely used of the emerging renewable energy. Due to the randomness of wind power and it is not controllable, wind power is intermittent and volatility. With the increase of proportion of wind power in power grid, control the influence of wind power to power grid system frequency stability, becomes the key to ensure system stability and reliability problems. To effectively explore the wind itself implied the inherent law of random variables, this paper employed weighted entropy uncertainty measure theory, put forward multiple signal fusion method based on weighted entropy, to measure random events of the role of wind power system, power grid events to the connotation of the single attribute weight. Describes the calculating process of this method through examples and computational results, shows the frequency of random events and the limit of the inner link, for the correct decision and the selection of treatment methods to provide the basis.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"70 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131724622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Investment Strategies Based on Sector Rotation Effect 基于行业轮换效应的投资策略研究
2013 International Conference on Information Technology and Applications Pub Date : 2013-11-16 DOI: 10.1109/ITA.2013.119
Xiaoguang Lu, Yingli Shen
{"title":"The Investment Strategies Based on Sector Rotation Effect","authors":"Xiaoguang Lu, Yingli Shen","doi":"10.1109/ITA.2013.119","DOIUrl":"https://doi.org/10.1109/ITA.2013.119","url":null,"abstract":"Based on the Business Cycle Theory and the Efficient Market Hypothesis, this paper proposed the concept of Sector Rotation Effect and Mystrey of Sector Rotation. Further, in order to test the robustness of the sector rotation investment strategy, it conducted some empirical studies in accordance with the data from China's securities market and the macroeconomic data. Moreover, it adopted Sharpe's single-index model of Quantile Model to find out significant differences among the periodic fluctuation range in various industries. In addition, it holds the belief that stock market is remarkably featured by Sector Rotation, meanwhile, the investors could take market-timing investment according to the periodic fluctuation range of the stock price.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125614416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Algorithm for Narrow-Band Interference Suppression in CDMA Communication System Based on Probability and Statistics Search 基于概率统计搜索的CDMA通信系统窄带干扰抑制算法
2013 International Conference on Information Technology and Applications Pub Date : 2013-11-16 DOI: 10.1109/ITA.2013.6
Wenjun Lv, Xiaoli Xi, Yongxing Du
{"title":"An Algorithm for Narrow-Band Interference Suppression in CDMA Communication System Based on Probability and Statistics Search","authors":"Wenjun Lv, Xiaoli Xi, Yongxing Du","doi":"10.1109/ITA.2013.6","DOIUrl":"https://doi.org/10.1109/ITA.2013.6","url":null,"abstract":"CDMA communication system has a certain anti-interference performance, but when the interference is stronger, the performance and stability of system will descend obviously. In this paper, narrow-band interference suppression based on FFT transform is adopted to improving anti-interference performance of CDMA communication systems significantly. Probability and statistics search for interference signal is used in frequency domain, which increases the stability of anti-interference. This paper describes Mat lab simulation and FPGA implementation of the algorithm. Hardware experiments show that the algorithm can improve the performance of narrow-band interference suppression for the ordinary CDMA mobile phone about 25dB.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131205170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Rail Type Electromagnetic Launch System Condenser Discharge Pattern Study 轨道式电磁发射系统冷凝器放电模式研究
2013 International Conference on Information Technology and Applications Pub Date : 2013-11-16 DOI: 10.1109/ITA.2013.115
D. Yue
{"title":"Rail Type Electromagnetic Launch System Condenser Discharge Pattern Study","authors":"D. Yue","doi":"10.1109/ITA.2013.115","DOIUrl":"https://doi.org/10.1109/ITA.2013.115","url":null,"abstract":"Rail type electromagnetic emission in high pressure physics research field has a broad application prospect. In this paper, we study the basic problem of electromagnetic rail launch, optimization scheme is put forward. Modeling and simulation work has been down using the MATLAB Simulink software, for an orbital launch module more energy storage system based on of theoretical analysis. We mainly studied and analyzed several different discharge modes of many module energy storage device including (Synchronous discharge, discharge in order, discharge in the 3-4-3 order, and the order 4-3-3 discharge mode). Emission rate of different patterns, energy utilization and so on were compared. The simulation results show that the synchronous discharge mode is most optimal in the track type electromagnetic launch system which track length is shorter. The conclusion is good reference for rail electromagnetic launcher further design and optimization.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129245298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Long Duration Snore Related Signals Based on Formant Features 基于共振峰特征的长时程鼾声信号分析
2013 International Conference on Information Technology and Applications Pub Date : 2013-11-16 DOI: 10.1109/ITA.2013.27
Yaqi Wu, Zhao Zhao, Kun Qian, Zhi-yong Xu, Huijie Xu
{"title":"Analysis of Long Duration Snore Related Signals Based on Formant Features","authors":"Yaqi Wu, Zhao Zhao, Kun Qian, Zhi-yong Xu, Huijie Xu","doi":"10.1109/ITA.2013.27","DOIUrl":"https://doi.org/10.1109/ITA.2013.27","url":null,"abstract":"Snoring is a typical symptom of Obstructive Sleep Apnea-Hypopnea Syndrome (OSAHS) patients, which has motivated numerous researchers focusing on how to diagnose this disorder by acoustic signal analysis methods. As a non-invasive approach, acoustic diagnosis brings a much more comfortable and convenient experience to subjects than the gold standard, polysomnography (PSG). However, there is a more demanding need from doctors to find the variations of the upper airway (UA) during a long duration for OSAHS patients. Formant features have a good performance on indicating the structure variations of UA, which can be regarded as a resonance in the snoring generation model. In this paper, we proposed a long duration analysis method of snore related signals (SRS) method based on formant features. The first three formant frequencies (F1, F2 and F3) are extracted to group the long duration SRS data into different states with the help of K-means method. Each state of SRS data represents a degree of collapse in UA. We found that formant features have distinguished values in different states and the transition possibility calculated by Hidden Markov Models (HMM) between each state is helpful for analysis of long duration SRS data. This method could be effective in analysis of variations in UA for OSAHS patients and establishment of long duration SRS database.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115572294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Some Improvements on the Rules for Exchanging Between Error Model Annex and AADL to Fault Tree 错误模型附件与故障树AADL交换规则的改进
2013 International Conference on Information Technology and Applications Pub Date : 2013-11-16 DOI: 10.1109/ITA.2013.84
Quan Zhang, Shihai Wang, B. Liu
{"title":"Some Improvements on the Rules for Exchanging Between Error Model Annex and AADL to Fault Tree","authors":"Quan Zhang, Shihai Wang, B. Liu","doi":"10.1109/ITA.2013.84","DOIUrl":"https://doi.org/10.1109/ITA.2013.84","url":null,"abstract":"AADL (The architecture analysis and design language) can be used to describe the reliability of the safety critical system. In this paper, we, firstly, make an introduction on the AADL dependability model and summary the basic rules for translating from Error Model Annex (EMA) of AADL to Fault tree, and then we make a series of improvements on the transition rules from EMA to Fault tree in terms of various AADL architectures. There are a few of examples are provided for demonstrating how to use our modifications.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116397994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Realization of Privileges Management Solutions Based on Eclipse Plug-Ins 基于Eclipse插件的权限管理方案的设计与实现
2013 International Conference on Information Technology and Applications Pub Date : 2013-11-16 DOI: 10.1109/ITA.2013.42
Lu Wang, Hun Huang
{"title":"Design and Realization of Privileges Management Solutions Based on Eclipse Plug-Ins","authors":"Lu Wang, Hun Huang","doi":"10.1109/ITA.2013.42","DOIUrl":"https://doi.org/10.1109/ITA.2013.42","url":null,"abstract":"User privileges management is a critical function of User-oriented software system. Eclipse Rich Client Platform is the latest expansion of plug-in system based on open service gateway protocol, which make a feature of integration scalability and flexibility. Privileges management solutions Based on Eclipse plug-ins, which works on the principle that Eclipse rich client platform can dynamically integrate JAR plug-in packages, implement the custom operation interface after users' logging in successfully, which completes the interface plug-level access control.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122658547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of Trust Model Based on Peer-to-Peer Network Security 基于点对点网络安全的信任模型研究
2013 International Conference on Information Technology and Applications Pub Date : 2013-11-16 DOI: 10.1109/ITA.2013.35
H. Kun, Wang Lu
{"title":"Research of Trust Model Based on Peer-to-Peer Network Security","authors":"H. Kun, Wang Lu","doi":"10.1109/ITA.2013.35","DOIUrl":"https://doi.org/10.1109/ITA.2013.35","url":null,"abstract":"P2P network is dynamic, self-organized, and anonymous and has some other features. P2P network cannot guarantee that all the peers can provide reliable resources and good service. Some Peers even have malicious behavior, such as Provision of false information, spread of illegal advertising, dissemination of Trojans and worms. In order to solve these Problems, the trust mechanism is introduced to P2P network and trust model is built to establish trust relationship between Peers. The popular research directions were introduced. The major sorts and key technologies were analyzed, and the algorithms in recent research were summarized. Based on the analysis of the capabilities of the trust model, its shortages were presented. Finally, some directions for future research were discussed.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126306889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of Information Processing and Interactivity Technology in Charging/Battery Swap Service for Electric Vehicles 信息处理与交互技术在电动汽车充电/换电池服务中的应用
2013 International Conference on Information Technology and Applications Pub Date : 2013-11-16 DOI: 10.1109/ITA.2013.43
Ya-wen Wang, Hongfeng Zhang, Chao Zhang, Chao Wang, Yannian Wu
{"title":"Application of Information Processing and Interactivity Technology in Charging/Battery Swap Service for Electric Vehicles","authors":"Ya-wen Wang, Hongfeng Zhang, Chao Zhang, Chao Wang, Yannian Wu","doi":"10.1109/ITA.2013.43","DOIUrl":"https://doi.org/10.1109/ITA.2013.43","url":null,"abstract":"It is an urgent demand for the popularization and commercial application of electric vehicles that we study the application for interactive technology of charging/battery swap service for electric vehicles. Based on the operation and monitoring master station, in combination with the Internet of things techniques, the GIS techniques and the GPS techniques, we study the application for multiple interactive technologies such as multiple service channels, intelligent service, smart card and so on, to provide a range of solutions for the charging/battery swap requirements. At the end of the paper, it shows some interactive application results, and gets the summary.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116867750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Query Conversion Scheme for Encrypted Cloud Databases 一种加密云数据库查询转换方案
2013 International Conference on Information Technology and Applications Pub Date : 2013-11-16 DOI: 10.1109/ITA.2013.40
Hequn Xian, Jing Li, Xiuqing Lu
{"title":"A Query Conversion Scheme for Encrypted Cloud Databases","authors":"Hequn Xian, Jing Li, Xiuqing Lu","doi":"10.1109/ITA.2013.40","DOIUrl":"https://doi.org/10.1109/ITA.2013.40","url":null,"abstract":"Encryption is an effective way of protecting sensitive data that have been outsourced in the cloud computing environment. But it is computationally expensive for the database management system to carry out SQL queries against the encrypted data. A query conversion scheme is presented which converts traditional database queries to encryption specific versions so that the queries can be directly executed on the cloud server. This scheme dramatically increases the efficiency of query processing in encrypted cloud databases, and it provides high transparency for end users by introducing a SQL gateway to the user applications and the cloud server.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信