Information technology is an integral part of daily life in many domains, including communication, computing, entertainment, and education. However, despite its pervasiveness, digitalization in various purposes and application in many human-based activities, it still plays the role of assisting and supporting people in manipulating and acquiring information. This study developed a ubiquitous learning environment based on the connection between digital and physical information. By using mobile learning technologies, including interactive video-based multimedia technology, GPS, GIS, and the electronic map service, learners can perform location-aware learning activities and experience corresponding appearances regarding a particular location. Accordingly learners can acquire new knowledge by participating in location-aware learning activities. We also demonstrate a ubiquitous learning activity of introducing the history of Tamkang University, Taiwan, and assess the effectiveness of the proposed ubiquitous learning environment.
{"title":"Immersive Learning Environment with Integrated Interactive Video and Ubiquitous Technologies","authors":"Jui-Hung Chen, Han-Bin Chang, Chunyi Shen, Te-Wua Wang, Wen-Chih Chang, T. Shih","doi":"10.4156/JCIT.VOL5.ISSUE9.6","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.6","url":null,"abstract":"Information technology is an integral part of daily life in many domains, including communication, computing, entertainment, and education. However, despite its pervasiveness, digitalization in various purposes and application in many human-based activities, it still plays the role of assisting and supporting people in manipulating and acquiring information. This study developed a ubiquitous learning environment based on the connection between digital and physical information. By using mobile learning technologies, including interactive video-based multimedia technology, GPS, GIS, and the electronic map service, learners can perform location-aware learning activities and experience corresponding appearances regarding a particular location. Accordingly learners can acquire new knowledge by participating in location-aware learning activities. We also demonstrate a ubiquitous learning activity of introducing the history of Tamkang University, Taiwan, and assess the effectiveness of the proposed ubiquitous learning environment.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115267929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Detection of neural action potentials in background noise is the fist step to many neural researches. Matched filter is a simple and effective action potential detector, but it is found to be too sensitive to the amplitudes differences among the action potentials to be useful in general applications. By introducing adjust function, an improved matched filter detector is proposed. The detector eliminates the variance of differences among action potential amplitudes produced by matched filter. The method is tested and the results show that the improved matched filter outperforms classic matched filter method and energy operator method by getting higher correct ratio and lower false ratio.
{"title":"A Novel Matched Filter for Neural Action Potential Detection","authors":"Jianhua Dai, H. Zhang, Xiaochun Liu, Shaomin Zhang, Weidong Chen, Xiaoxiang Zheng","doi":"10.4156/JCIT.VOL5.ISSUE9.5","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.5","url":null,"abstract":"Detection of neural action potentials in background noise is the fist step to many neural researches. Matched filter is a simple and effective action potential detector, but it is found to be too sensitive to the amplitudes differences among the action potentials to be useful in general applications. By introducing adjust function, an improved matched filter detector is proposed. The detector eliminates the variance of differences among action potential amplitudes produced by matched filter. The method is tested and the results show that the improved matched filter outperforms classic matched filter method and energy operator method by getting higher correct ratio and lower false ratio.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127926794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-30DOI: 10.4156/JCIT.VOL5.ISSUE9.22
Hong-qi Li, Xu He, Xiaolong Xie, Li Li, Jinyu Zhou, Xiongyan Li
Boundary conditions are often used in particle swarm optimization (PSO) in order to enhance the entire solution space of particles as far as possible. However, most of them are not categorized in detail, the boundary conditions used for comparisons are not in the same category and their performances vary in different engineering fields. In order to address these issues, this paper presents a comprehensive learning velocity boundary condition (CLBC), which is verified by Rastrigrin and Rosenbrock function with 30 dimensionalities in three types of search range. The CLBC shows comparatively faster convergence ability and obtains more precise results, compared with other boundary conditions of the same kind.
{"title":"A New Boundary Condition for Particle Swarm Optimization","authors":"Hong-qi Li, Xu He, Xiaolong Xie, Li Li, Jinyu Zhou, Xiongyan Li","doi":"10.4156/JCIT.VOL5.ISSUE9.22","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.22","url":null,"abstract":"Boundary conditions are often used in particle swarm optimization (PSO) in order to enhance the entire solution space of particles as far as possible. However, most of them are not categorized in detail, the boundary conditions used for comparisons are not in the same category and their performances vary in different engineering fields. In order to address these issues, this paper presents a comprehensive learning velocity boundary condition (CLBC), which is verified by Rastrigrin and Rosenbrock function with 30 dimensionalities in three types of search range. The CLBC shows comparatively faster convergence ability and obtains more precise results, compared with other boundary conditions of the same kind.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-30DOI: 10.4156/JCIT.VOL5.ISSUE9.24
Zhao-xiong He, Xing Liu, P. Luo, Jing-lun Zhou
Techniques for modeling and simulating the underlying channel-PHY play an essential role in understanding network protocol and application behavior of tactical data link (TDL). Inappropriate modeling and simulation of channel-PHY make the results incredibility. In this paper a model architecture of channel and physical layer is described in NS-2 (Network Simulator version 2). The five key technique of lower layer modeling are studied and analyzed, including FSM (Finite State Machine) model, delay computing, wireless propagation forecasting, power computing for interference signal and error checking for receiving signals. By using simulations and measurements from two different TDL test beds, we show that the channel-PHY modeling and simulation is on the importance of TDL simulation.
底层信道phy的建模和仿真技术对于理解战术数据链路的网络协议和应用行为起着至关重要的作用。对信道物理量的建模和仿真不合理,导致仿真结果难以置信。本文描述了NS-2 (Network Simulator version 2)中信道和物理层的模型体系结构,研究和分析了底层建模的五个关键技术,包括有限状态机(FSM)模型、延迟计算、无线传播预测、干扰信号的功率计算和接收信号的错误检测。通过对两个不同的TDL试验台的仿真和测量,我们证明了信道物理层的建模和仿真对TDL仿真的重要性。
{"title":"Tactical Data Link Channel-PHY Modeling and Simulation in Network Simulator 2","authors":"Zhao-xiong He, Xing Liu, P. Luo, Jing-lun Zhou","doi":"10.4156/JCIT.VOL5.ISSUE9.24","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.24","url":null,"abstract":"Techniques for modeling and simulating the underlying channel-PHY play an essential role in understanding network protocol and application behavior of tactical data link (TDL). Inappropriate modeling and simulation of channel-PHY make the results incredibility. In this paper a model architecture of channel and physical layer is described in NS-2 (Network Simulator version 2). The five key technique of lower layer modeling are studied and analyzed, including FSM (Finite State Machine) model, delay computing, wireless propagation forecasting, power computing for interference signal and error checking for receiving signals. By using simulations and measurements from two different TDL test beds, we show that the channel-PHY modeling and simulation is on the importance of TDL simulation.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115725210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-30DOI: 10.4156/JCIT.VOL5.ISSUE9.11
Qian Zhu, X. Cheng
To solve the problem of Chinese question cannot provide deep semantic information for syntactic analysis, the paper proposes a semantic tagging model of Chinese question chunk based on description logics. With the knowledge of HNC’s concept symbols to get semantic information about the words, and by starting with the connotation of the concept categories, it preliminarily analyzes the logic structure of specific question sentences. Finally, with description logics reasoning mechanism, we get question semantic view and practical verify the validity of it.
{"title":"The Semantic Tagging Model of Chinese Question Chunk Based on Description Logic","authors":"Qian Zhu, X. Cheng","doi":"10.4156/JCIT.VOL5.ISSUE9.11","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.11","url":null,"abstract":"To solve the problem of Chinese question cannot provide deep semantic information for syntactic analysis, the paper proposes a semantic tagging model of Chinese question chunk based on description logics. With the knowledge of HNC’s concept symbols to get semantic information about the words, and by starting with the connotation of the concept categories, it preliminarily analyzes the logic structure of specific question sentences. Finally, with description logics reasoning mechanism, we get question semantic view and practical verify the validity of it.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116305012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-30DOI: 10.4156/JCIT.VOL5.ISSUE9.26
Chenming Li, Lizhong Xu, Chunxia Yu, Xiaodong Wei
Different kinds of agents in a multi-agent system have different knowledge structure, which results in difficulties of interaction and coordination among agents. At present, ontology based knowledge representation is an effective way of resolving such difficulties, the key of which is heterogeneous ontology concept similarity measuring. In this paper, we designed an integrated heterogeneous ontology concept similarity measuring method. Experiments are conducted to demonstrate its feasibility and effectiveness.
{"title":"Measuring Concept Similarity of Heterogeneous Ontologies in Multi-angent System","authors":"Chenming Li, Lizhong Xu, Chunxia Yu, Xiaodong Wei","doi":"10.4156/JCIT.VOL5.ISSUE9.26","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.26","url":null,"abstract":"Different kinds of agents in a multi-agent system have different knowledge structure, which results in difficulties of interaction and coordination among agents. At present, ontology based knowledge representation is an effective way of resolving such difficulties, the key of which is heterogeneous ontology concept similarity measuring. In this paper, we designed an integrated heterogeneous ontology concept similarity measuring method. Experiments are conducted to demonstrate its feasibility and effectiveness.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114808761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-30DOI: 10.4156/JCIT.VOL5.ISSUE9.20
Chengbo Xu, Junping Wang, Jun Huang
Petersen-Gaussian (PG) networks are a broad family of interconnection networks for multi processor systems proposed recently. In this paper, a special case of PG networks, called PetersenTwisted-Torus (PTT) network, is considered. We analyze the diameter of PTT network, and find that PTT has smaller diameter and lower costing requirement than the well-known honeycomb mesh, diagonal mesh, torus, hexagonal torus, honeycomb torus and Petersen torus networks.
{"title":"Petersen-Twisted-Torus Networks for Multiprocessor Systems","authors":"Chengbo Xu, Junping Wang, Jun Huang","doi":"10.4156/JCIT.VOL5.ISSUE9.20","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.20","url":null,"abstract":"Petersen-Gaussian (PG) networks are a broad family of interconnection networks for multi processor systems proposed recently. In this paper, a special case of PG networks, called PetersenTwisted-Torus (PTT) network, is considered. We analyze the diameter of PTT network, and find that PTT has smaller diameter and lower costing requirement than the well-known honeycomb mesh, diagonal mesh, torus, hexagonal torus, honeycomb torus and Petersen torus networks.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115750074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-30DOI: 10.4156/JCIT.VOL5.ISSUE9.2
Yang Zhao, Mingjing Guo, Kaisa Varis
Nowadays, scientific and technical innovation is the key force to enhance general competitive advantage and international status of the country. All countries have regarded strengthening the independent innovation capability as the strategic basis for national sustainable development, and are committed to their own national innovation system (NIS) planning and construction. NIS is a complex open system composed of different innovation subjects, which undertake the important task of national innovation and development. In the information environment, the NIS can’t work without a strong guarantee of information resources, and the scientific, rational, optimal allocation of these information resources. As the first country to put forward the NIS, Finland has achieved distinctly in knowledge innovation, information resources allocation and so on, thus it is a typical example for information resources allocation of other countries. This article starts from the research on the basic structure of Finland’s NIS, then analyze the information flow mechanism of the system. According to the present innovation situation of Finland, this article focuses on three types of information resources allocation mechanism used by Finland government currently. They are multi-input mechanism, dynamic distribution mechanism and integrated configuration mechanism. The present situation of information resources allocation of Chinese NIS has been compared with that of Finland, and then some concrete problems in China information resources allocation are pointed out. With reference to Finland’s success, this article suggests that China government should improve the information resources allocation of NIS from the following four aspects: management model, implement process, structure of resource input and the construction of service platform.
{"title":"The Information Resources Allocation Mechanisms in The National Innovation System of Finland","authors":"Yang Zhao, Mingjing Guo, Kaisa Varis","doi":"10.4156/JCIT.VOL5.ISSUE9.2","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.2","url":null,"abstract":"Nowadays, scientific and technical innovation is the key force to enhance general competitive advantage and international status of the country. All countries have regarded strengthening the independent innovation capability as the strategic basis for national sustainable development, and are committed to their own national innovation system (NIS) planning and construction. NIS is a complex open system composed of different innovation subjects, which undertake the important task of national innovation and development. In the information environment, the NIS can’t work without a strong guarantee of information resources, and the scientific, rational, optimal allocation of these information resources. As the first country to put forward the NIS, Finland has achieved distinctly in knowledge innovation, information resources allocation and so on, thus it is a typical example for information resources allocation of other countries. This article starts from the research on the basic structure of Finland’s NIS, then analyze the information flow mechanism of the system. According to the present innovation situation of Finland, this article focuses on three types of information resources allocation mechanism used by Finland government currently. They are multi-input mechanism, dynamic distribution mechanism and integrated configuration mechanism. The present situation of information resources allocation of Chinese NIS has been compared with that of Finland, and then some concrete problems in China information resources allocation are pointed out. With reference to Finland’s success, this article suggests that China government should improve the information resources allocation of NIS from the following four aspects: management model, implement process, structure of resource input and the construction of service platform.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125339900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-30DOI: 10.4156/JCIT.VOL5.ISSUE9.27
Yi Wang, Huosong Xia, Jian Liu
The different capital configurations of bank accounts for different credit tendency which will affect the currency condition as well as whole finance system. The mercurial and nonlinear factors of economy usually brought the difficulty when predicts. This study adopts the feed-forward backprop network (BP), conceiving predicting modeling with the sample of various banks’. The simulation results indicated that the model performs well in anti-interference and accurate in prediction error (less than 2%). Moreover, we got the result that non state-own banks tend to be more cautious than state-own by 10% on average.
{"title":"Commercial Credit Difference Evaluation and Prediction Model: Based on Neural Network","authors":"Yi Wang, Huosong Xia, Jian Liu","doi":"10.4156/JCIT.VOL5.ISSUE9.27","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.27","url":null,"abstract":"The different capital configurations of bank accounts for different credit tendency which will affect the currency condition as well as whole finance system. The mercurial and nonlinear factors of economy usually brought the difficulty when predicts. This study adopts the feed-forward backprop network (BP), conceiving predicting modeling with the sample of various banks’. The simulation results indicated that the model performs well in anti-interference and accurate in prediction error (less than 2%). Moreover, we got the result that non state-own banks tend to be more cautious than state-own by 10% on average.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125400741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-30DOI: 10.4156/JCIT.VOL5.ISSUE9.17
Xudong Song, Dejun Zhu, Zhanzhi Qiu
Abstract Under the management pattern of enterprises group sales, how to assign all market orders reasonably and optimally within member enterprises is one of the important aspects that enterprises group has to study. On the basis of summary of the order allocation principles of enterprises group, a multi-objective optimization model is established to rationally allocate the order, maximize the total demands of assigned orders and optimize the overall profits of enterprises group. At the same time, based on the characteristics of the problem, an algorithm flow is proposed to attain the model solution. Finally, an application example verifies this model. The feasibility and effectiveness of algorithm flow are also confirmed.
{"title":"Study on Enterprises Group Order Allocation Multi-objective Model","authors":"Xudong Song, Dejun Zhu, Zhanzhi Qiu","doi":"10.4156/JCIT.VOL5.ISSUE9.17","DOIUrl":"https://doi.org/10.4156/JCIT.VOL5.ISSUE9.17","url":null,"abstract":"Abstract Under the management pattern of enterprises group sales, how to assign all market orders reasonably and optimally within member enterprises is one of the important aspects that enterprises group has to study. On the basis of summary of the order allocation principles of enterprises group, a multi-objective optimization model is established to rationally allocate the order, maximize the total demands of assigned orders and optimize the overall profits of enterprises group. At the same time, based on the characteristics of the problem, an algorithm flow is proposed to attain the model solution. Finally, an application example verifies this model. The feasibility and effectiveness of algorithm flow are also confirmed.","PeriodicalId":360193,"journal":{"name":"J. Convergence Inf. Technol.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}