Volume 11 Issue 3 June 2013


The Computer Design of Practical Filter

Zhang Li, Zhang Weixi

https://doi.org/

Abstract This paper discussed how to use computer to directly transfer the simulative low pass prototype design to all kinds of needed principles and design methods. This methods advantage is that it is very direct, and universal. So, this method is simple, convenient, practical and fast.... Read More


Fair Virtual Bandwidth Allocation Model in Virtual Data Centers

Ying Yuan, Cui-rong Wang, Cong Wang

https://doi.org/

Abstract Network virtualization opens a promising way to support diverse applications over a shared substrate by running multiple virtual networks. Current virtual data centers in cloud computing have flexible mechanisms to partition compute resources but provide little control over how tenants share the network. This paper proposes a utility-maximization model for bandwidth sharing between virtual networks in the same substrate network.... Read More


A Novel Fault Identifying Method with Supervised Classification and Unsupervised Clustering

Tao Xu

https://doi.org/

Abstract To satisfy the robust requirement when designing fault identifying method, this paper proposes a novel method to identify sensor fault. Conventional fault identifying method could only classify fault into explicit set. Yet, when a novel faulty pattern occurs, the conventional method can not identify this new pattern and will classify it into a set known ahead of time. For the... Read More


Design of a Teaching Robot based on Fischertechnik Model

Zelun Li, Zhicheng Huang

https://doi.org/

Abstract This paper designed and developed a teaching robot - three degrees of freedom manipulator based on Fischer creative combination model platform. Firstly, the overall structure of the robot was analyzed to determine the drive programs, and then the manipulator structure was assembled and established in accordance with the modular design approach. Finally, the robot control system was studied. This paper... Read More


Study of Methods for Constructing Families of Odd-periodic Perfect Complementary Sequence Pairs

Jin Hui-long Chen Jia-xing

https://doi.org/

Abstract Some characteristics of the families of oddperiodic perfect complementary sequence pairs (OPCSPF) are discussed. The methods for constructing an OPCSPF are given and proved. The families of periodic perfect complementary sequence pairs can be constructed correspondingly by using the equivalent relationships, which further expanded the existence space of the complementary sequence.... Read More


Parameters Selection in the Discrete Particle Swarm Optimization Algorithm Solving Gate and Runway Combinational Optimization Problem

Jianli Ding, Yong Zhang

https://doi.org/

Abstract Gate and runway combinational optimization (GRCO) problem is of great significance in airport operation. In this paper, experimental analysis is performed on the parameters characteristics of the discrete particle swarm optimization (DPSO) algorithm for combinatorial optimization problems. Inertia weight, acceleration constants and population size all have an important impact on the performance of the algorithm. Optimal values exist in the... Read More


Research on the Anti-perspective Correction Algorithm of QR Barcode

Jianhua Li, Yi-Wen Wang, YiJun Wang,Yi Chen, Guocheng Wang

https://doi.org/

Abstract 2-D (2-dimension) bar code has many advantages compared with 1-D bar code, so it has many prevalent applications in recent days. However, there're several factors that affecting the sampling process, they lead to a certain degree of deformation towards the 2-D bar code. Furthermore, this deformation may too severe for 2-D bar code to be recognized. Generally, the main stream... Read More


Fault Prediction of Nonlinear System Using Time Series Novelty Estimation

Shengchao Su, Wei Zhang

https://doi.org/

Abstract Many complex nonlinear systems have the characteristics such as difficult modeling, dangerous testing, and high cost to experiment with fault. Aim at these points, a new kind of novelty estimation method based on an on-line Least Square Support Vector Regression (LS-SVR) algorithm is presented for fault prediction of nonlinear system in this paper. Firstly, a set of characteristic token values,... Read More


Spanning Tree Method for Minimum Communication Costs In Grouped Virtual MapReduce Cluster

Yang Yang, Xiang Long, Biaobiao Shi

https://doi.org/

Abstract Today, MapReduce and virtual cluster are sharp swords for this big data and cloud computing era. To combine these two emerging technologies, it brings feasible-scalability, easy-management, fast-deployment and high-efficiency with the system. As every sword has two sides, the I/O bottleneck of virtualization technologies may seriously impacts on the performance of MapReduce cluster which deals with I/O-intensive applications. In this... Read More


A Diversity-based Multi-antenna Cooperative Detection Model in Cognitive Radio Network

Qin Zhenquan, Liu Wenjing, Jiang Huizhen, Sun Weifeng

https://doi.org/

Abstract Spectrum sensing is a key technology in the study of cognitive radios, but its attributes are easily influenced by the channel fading. Compared with singleuser spectrum sensing, multiple-user spectrum sensing can overcome the impacts caused by the fading environment of cognitive radio. Since diversity technology has been proved to provide the system high transmission rate and high link reliability, we... Read More


Augmented Broadcaster Identity-based Broadcast Encryption

Jianhong Zhang, Yuwei Xu, Zhipeng Chen

https://doi.org/

Abstract Identity-based Broadcast Encryption (IBBE) has the inherent key escrow problem that Private Key Generator (PKG) can fully determine the user's private key, which is an obstacle of the application of IBBE. The existing approaches to solving key escrow problem need the user to submit identity to multiple PKGs or interactions between PKG and the user in the private key extraction... Read More


The Statistical Analysis of Family Names of Donators For WenChuan

Liu Yufan, Chen Qinghua

https://doi.org/

Abstract It is analyzed that the family names of personal donators who donated through China Construction Bank Corporation to Chinese Red Cross Foundation for the WenChuan earthquake. The distribution of family names, the first 100 family names and their shares, the probability of the same family names as well as the Gini coefficient are all given in this paper. A heavy... Read More


Robust Zero-Watermarking Algorithm for CAD Models

Nan Liu, Sanyuan Zhang, Yin Zhang

https://doi.org/

Abstract Copyright protection and authentication of digital contents have become a significant issue in the current digital epoch with efficient communication mediums such as Internet. Digital watermarking technique is now one of the hot research fields of copyright protection for CAD graphic data under the network environment. But there are very limited techniques available for that because of its high shape-preserving... Read More


An Efficient Secret Sharing Scheme with Multi-dealer

Xin Huang, Guohua Xiong

https://doi.org/

Abstract In order to solve the problem that there is only one dealer in the existing secret sharing scheme, based on large integer factorization and discrete logarithm problems, a new sharing scheme with multi-dealer is proposed, which is combined with Deffie-Hellman key agreement protocol. And then, security and performance analysis is made in this scheme. As the secret can be recovered... Read More


Algorithm of Distributed Mining Community Structure Used in Sports Psychology Based on Local Information

Cui Sidong

https://doi.org/

Abstract The paper is studying and implementing a mining algorithm of community structure based on local information. When compared with the algorithm based on global information, our algorithm has a better performance on efficiency which only looses just a little accuracy. Firstly, we analyze the basic feature of community structure of complex network, then, lead to the character of community structure... Read More