{"title":"Some Remarks on Charactertics Function and Density Function of Uncertain Variable","authors":"Qin Jiang","doi":"10.1109/IPTC.2011.36","DOIUrl":"https://doi.org/10.1109/IPTC.2011.36","url":null,"abstract":"In the paper, some properties related to characteristic function, density function and credibility distribution function of uncertain variable are discussed based on uncertainty theory.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124117247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Electronic Equipment Fault Diagnosis Algorithm Based on RBF Neural Network","authors":"Lei Yuan, Heming Zhao","doi":"10.1109/IPTC.2011.26","DOIUrl":"https://doi.org/10.1109/IPTC.2011.26","url":null,"abstract":"This paper proposes an algorithm of failure diagnosis for electronic device. This algorithm can train existed failure diagnosis parameter sample sets, analysis internal relationship of diagnosis parameters and obtain the final result for device diagnosis, which achieves diagnosis adaptation about further sample parameter of device failure diagnosis. The advantage of algorithm is to optimize training process and control result of empirical function due to considering the prediction accuracy and training time of RBF in the constructing process.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129671257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analytic Network Process Model of Trust in B2C E-Commerce","authors":"Juan He","doi":"10.1109/IPTC.2011.51","DOIUrl":"https://doi.org/10.1109/IPTC.2011.51","url":null,"abstract":"Online consumer trust in Business to Consumer (B2C) e-commerce trust has been viewed as a key differentiator that determines the success or failure of many companies conducting their business over the Internet. In order to explore the influence factor of consumer trust and their priority, and to look for the way to promote consumer trust, an Analytic Network Process (ANP) model is constructed in this paper. Based on three dimension of consumer trust, an index system is suggested. By analyzing the interaction of indicators, the ANP model can rationally calculate the weight of each indicator with Super Decisions software. From data analysis, the research comes to a conclusion that brand of the company, law and technique, scale of the company and reputation of the website have a great impact on consumer trust. And at the present stage, consumers take more attention to competence and integrity dimension than benevolence dimension. Besides, the model also shows that 360buy wins the most consumer trust compared with the other two selected B2C companies. The consistence with the reality proves that the ANP model can effectively find the priority of influence factors.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128200363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Circular-Like Satellite Formation Flying at Critical Inclination","authors":"Guangyan Xu, Huanqiang Wang","doi":"10.1109/IPTC.2011.61","DOIUrl":"https://doi.org/10.1109/IPTC.2011.61","url":null,"abstract":"In this paper, the passive and periodic circular-like formations design at critical inclination under J2 perturbation is proved to be correct. The software STK is used to make highly precision simulation under J2 perturbation, full perturbation and so on. The effect of other perturbations on the passive and periodic circular-like satellite formations can be obtained according to simulation. The initial value of circular-like formations including J2 is more stable than not including it. However, the initial value not including J2 perturbation is the same as including it when the true anomaly is the special value.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121703684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method for Impossible Differential Cryptanalysis of 7-Round AES-192","authors":"Z. He, Zhihua Hu","doi":"10.1109/IPTC.2011.62","DOIUrl":"https://doi.org/10.1109/IPTC.2011.62","url":null,"abstract":"Impossible differential cryptanalysis is an analysis method by constructing impossible differential path, eliminating the keys satisfying this path, and finally recovering the secret keys. This paper has utilized a new property of MixColumns Transformation, constructed a new 4-round impossible differential path, added 1-round and 3-round possible differential path before and behind this path respectively, and constructed a new 7-round impossible differential path. This path has been utilized to analyze 64-bit initial keys of 7-round AES-192, and this analysis method requires 271 pairs of selected plaintexts, about 272 memory cells and about 2135 encryption and decryption computation.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"32 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A High Speed Parallel Timing Recovery Algorithm and Its FPGA Implementation","authors":"Changxing Lin, Jian Zhang, B. Shao","doi":"10.1109/IPTC.2011.23","DOIUrl":"https://doi.org/10.1109/IPTC.2011.23","url":null,"abstract":"The paper presents an efficient and parallel symbol timing recovery algorithm suitable for very high speed demodulator and easy to implement on FPGA platform. The proposed timing recovery algorithm has a dual feedback structure which makes up of frequency domain timing phase correction, first reported in Alternate Parallel Receiver (APRX), and parallel FIFOs based delete-keep algorithm. In the timing error detector, we adopt the O&M algorithm. We also investigate their high speed parallel implementation structures suitable for FPGA platform. The fixed point simulation shows that our proposed algorithm can work efficiently with performance loss less than 0.5dB. Besides, the algorithm is implemented with a Xilinx XC6VLX240T FPGA chip, and reaches the maximum running frequency of 188 MHz. Thus, it sustains a symbol rate of 1.5 Gsps when 4 samples per symbol are employed.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116448417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}