{"title":"Feature-Denoising Based on Average Fitness of Genetic Population","authors":"Yong-qing Wei, Ming-ying Xu, Zhen-fang Zhu","doi":"10.4156/JCIT.VOL5.ISSUE8.18","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE8.18","url":null,"abstract":"To solve the problem of the noise existed in feature items of category template in filtering system, weight adjusting strategy based on average fitness of population is proposed combining genetic algorithm with feedback. The feature items’ contribution to individual fitness is studied to adjust feature items’ weight by the genetic difference in the average fitness of the individual. Experimental results show that the weight adjusting strategy could significantly optimize filtering effect.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130212084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Optical Wireless Networks: End-to-End Link Delay Optimization","authors":"A. Mahdy, J. Deogun","doi":"10.4156/JCIT.VOL5.ISSUE8.1","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE8.1","url":null,"abstract":"Wireless communications offer an attractive option for many military, commercial as well as personal communication needs because of flexibility, cost effectiveness, and mobility. The quality features of wireless communications have led to tremendous growth in the demand for wireless networks and has led to development of novel technologies that raise the need for broadband wireless communications. Optical wireless systems offer high transmission rates that can accommodate these broadband needs. However, optical wireless links can be prone to atmospheric changes that can result in performance degradation. Therefore, optical wireless networks should have flexible links and must be adaptive. In this paper, we focus on the adaptability of optical wireless networks and propose new heuristics for the optimization of communication delay in a flexible link regime for networks with bounded and unbounded degree transceivers. Extensive simulations are conducted to evaluate the performance of the proposed heuristics to validate the improvement in network functionality as compared to the inadaptable environment. Simulation results show that networks adopting proposed heuristics achieve a 50% reduction in average packet delay as compared to inadaptable networks.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131221877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prevention and Control Model of Enterprise Business Risk Based on Multi-Agent","authors":"Hongjun Guan","doi":"10.4156/JCIT.VOL5.ISSUE7.19","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE7.19","url":null,"abstract":"Prevention and control of business risk plays an important role to strengthen enterprise management. Multi-agent is introduced to risk prevention and control according to the classification of the properties of risk events. Multi-agent system is composed of risk prevention and control agent, management agent and assistant agent. Through the communication and collaboration of multi-agent, the distributed architecture of business risk prevention and control model based on multi-agent is built to control the business risk. At last, JADE solution is described.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114511415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. MiriamSalcedo, D. V. Ayala, F. López, M. J. S. García
{"title":"Clearing Policy for an Specialist Agent in Marketing Strategies","authors":"H. MiriamSalcedo, D. V. Ayala, F. López, M. J. S. García","doi":"10.4156/JCIT.VOL5.ISSUE7.10","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE7.10","url":null,"abstract":"This work discusses clearing policy used by a specialist agent on marketing strategies under the rules of TAC CAT agents International Tournament. The goal of this agent is to create a market and then establish a set of policies for controlling agents’ behavior of other agents interested in trade with him. This agent must be able to establish accepting, prices, charging and clearing. Clearing policy determines how and when to clear the market, that is, how to match accepted shouts, and when to perform transactions over already matched shouts. A clearing policy implementation is proposed and the impact of it over number of matched shouts, number of transactions and traders attracted during a CAT game simulation is analyzed.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"2 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120838145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy-Preserving Mutual Authentication Protocol for Vehicle Ad Hoc Networks","authors":"Zuowen Tan","doi":"10.4156/JCIT.VOL5.ISSUE7.24","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE7.24","url":null,"abstract":"Recently, Jung et al. proposed a robust conditional privacy-preserving authentication protocol in vehicle ad-hoc networks. However, Jung et al.’s authentication protocol cannot provide unlinkage and mutual authentication during the communications between the vehicles and the road-side infrastructure units. In this paper, we propose an improved privacy-preserving mutual authentication protocol for vehicle ad hoc networks by using secure identity-based group blind signature, the private encryption system and the public encryption system. The proposed privacy-preserving mutual authentication protocol for vehicle ad-hoc networks satisfies mutual authentication, anonymity and unlinkability under Random Oracle Model and the Decisional Bilinear Diffie–Hellman (DBDH) assumption. In addition, the trusted center can trace malicious on-board units or road-Side infrastructure units in our protocol.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129784543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three-Dimensional Finite Element Analysis of Wall Pressure on Large Diameter Silos","authors":"Fu Jianbao, M. Luan, Yang Qing, Nian Tingkai","doi":"10.4156/JCIT.VOL5.ISSUE7.15","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE7.15","url":null,"abstract":"With the increasing volume demand of silos, silo diameters are bigger and bigger. However, present wall pressure computation methods are mostly based on small diameter silos. There is little system research on large diameter silos. To solve this problem, systematical research by three-dimensional finite element method on large diameter silos was carried out in this paper. Static wall pressure and wall pressure at the end of filling were analyzed. And the influence of mechanical parameters of bulk materials to wall pressure was studied. Two lamination ways to simulate filling process was studied. The result shows that scale of silo take important effect to wall pressure. Wall pressures at the end of filling of large diameter silos are much larger than static wall pressures near silos bottom. Wall pressure of filling should be considered in design of large diameter silos. Study in this paper has heavy theoretical significance and provide an important basis for the large diameter silo design.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"389 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129282043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model Counting with Boolean Algebra and Extension Rule","authors":"Youjun Xu, D. Ouyang, Yuxin Ye","doi":"10.4156/JCIT.VOL5.ISSUE7.7","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE7.7","url":null,"abstract":"Model counting is an important problem in artificial intelligence and is applied in several areas of information science. Extension rule is a method which could be used to count models. But it’s not appropriate when clause length is short or clause number is huge. After studying extension rule, we found that the satisfiability problem could be solved by hitting set algorithms. And the models could be counted with extension rule after calculating hitting sets of a clause set. Therefore, we proposed an algorithm MCBE in this paper. With Boolean algebra, MCBE could easily calculate hitting sets of a clause set. Then, it gives the number of models with extension rule. The test results show that when clause length is short and clause number is big enough, the algorithm is more efficiency than the algorithm CDP and CER.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling of Electrohydraulic System Using RBF Neural Networks and Genetic Algorithm","authors":"Guoqiang Cai, Zhongzhi Tong, Z. Xing","doi":"10.4156/JCIT.VOL5.ISSUE7.4","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE7.4","url":null,"abstract":"This paper presents an approach to model the nonlinear dynamic behaviors of the Automatic Depth Control Electrohydraulic System (ADCES) of a certain mine-sweeping weapon using Radial Basis Function (RBF) neural networks. In order to obtain accurate RBF neural networks efficiently, a hybrid learning algorithm is proposed to train the neural networks, in which centers of neural networks are optimized by genetic algorithm, and widths and centers of neural networks are calculated by linear algebra methods. The proposed algorithm is applied to the modelling of the ADCES, and the results clearly indicate that the obtained RBF neural network can emulate the complex dynamic characteristics of the ADCES satisfactorily. The comparison results also show that the proposed algorithm performs better than the traditional clustering-based method.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127848986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GPS/TDOA Hybrid Location Algorithm Based on Federal Kalman Filter","authors":"Cui-Xia Li, Wei-Ming Liu, Zi-Nan Fu","doi":"10.4156/JCIT.VOL5.ISSUE7.6","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE7.6","url":null,"abstract":"Generally, accuracy of GPS(Global Positioning System) is higher than that of cellular network. But in tall building urban area or indoor, relatively weak GPS signal makes the positioning unstable and inaccurate. TDOA(Time Difference of Arrival) is one of the most widely used positioning methods in cellular mobile communication systems, but its accuracy is not high enough to meet the growing demand. In urban where there are more base stations to support big communication capacity than in rural, the mobile terminal positioning accuracy and stability is relatively better. In order to make up for these inherent deficiency of GPS or TDOA separate positioning, this paper deduces a GPS/TDOA hybrid positioning algorithm based on federated kalman filter by giving error model, state equation and measurement equation of each local kalman filters. Simulation results show that the algorithm effectively improves the data fusion reliability and positioning accuracy.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128347163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Information Framework for Fourth Party Logistics","authors":"Tiejun Pan, Leina Zheng, Guoqing Yan","doi":"10.4156/JCIT.VOL5.ISSUE7.12","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE7.12","url":null,"abstract":"The Fourth Party Logistics (4PL) information system used today is comprised of disconnected legacy system, and lacks the support for interoperability for whole supply chain integration. This situation often prevents the 4PL provider from fully exploring market opportunities in a timely fashion. To address this problem, we propose an agent-based framework for intelligent 4PL integration. A set of agents with core capabilities can be quickly assembled to help with the gathering of relevant information and knowledge, to cooperate with each other and with other legacy systems and human managers and analysts to arrive at timely decisions in dealing with various logistics scenarios. The proposed multi-agent system (MAS), including its theoretical foundation, architecture, and implementation are presented. In the end, we point out the cloud computing and Internet of things will be the research direction of 4PL information framework in the future and the next-generation broadband wireless mobile communications network will bring out the new generation of 4PLIF solution with mobile MAS.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129853302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}