International Journal of Engineering and Manufacturing (IJEM)

IJEM Vol. 2, No. 4, Aug. 2012

Cover page and Table of Contents: PDF (size: 446KB)

Table Of Contents

REGULAR PAPERS

SVM Based P2P Traffic Identification Method With Multiple Properties

By Yao Zhao Zhixin Wei Hua Zou

DOI: https://doi.org/10.5815/ijem.2012.04.01, Pub. Date: 29 Aug. 2012

With the rapid development of the Internet, P2P has become the main network application in the Internet, which consumes most of the network resources. Accurately identifying and making control of the P2P traffic is of great significance. As a mature classification theory, support vector machine (SVM) algorithm is suitable for P2P traffic identification. This paper proposes a SVM based P2P flow identification method, adopting multidimensional flow properties as the input vector, which can improve the P2P flow classification accuracy. Analysis shows this method has many advantages over the other methods.

[...] Read more.
A Heterogeneous Agent-based Asset Pricing Model and Simulation

By Haiying Ren Siwei Li

DOI: https://doi.org/10.5815/ijem.2012.04.02, Pub. Date: 29 Aug. 2012

Behavioral finance models can help to explain several stylized facts in financial markets. As one of the behavioral financial theory, prospect theory describes how ‘irrational investors’ making decisions under uncertainty. In this paper, we present a heterogeneous agent-based asset pricing model, where parts of investors determine their demand for risky asset using prospect theory utility function. Time series generated from simulation show many stylized facts that can be observed in actual financial markets, such as abnormal distribution of asset returns, volatility clustering and equity premium. We also find that positive correlation between investors’ performance and their market share, negative correlation between investors’ performance and the loss aversion coefficient under certain market condition.

[...] Read more.
Particle Swarm Optimization With Adaptive Parameters and Boundary Constraints

By Hui Niu Yongshou Dai Xing Peng

DOI: https://doi.org/10.5815/ijem.2012.04.03, Pub. Date: 29 Aug. 2012

The core idea of PSO is that each particle searches the best solution of optimization problems according to “information sharing” between surrounding particles and itself. PSO has fast convergence speed and high global search capability. For low accuracy and divergent results of elementary PSO, this paper proposes a kind of PSO with adaptive parameters and boundary constraints. Inertia weight and learning factors increase or decrease linearly with iterative process, in order that the particles search the global space in early period of the algorithm and converge towards the global optimum later. At the same time, the author sets particle boundary constraints to ensure the optimization accuracy. Theoretical analysis and numerical simulation results show the efficiency and high optimization accuracy of the designed method.

[...] Read more.
A Scheme of IBE Key Issuing Protocol Based on Identity-password Pair

By Weimin Shi

DOI: https://doi.org/10.5815/ijem.2012.04.04, Pub. Date: 29 Aug. 2012

To avoid the impersonation attack, an efficient and secure key issuing protocol based on identity-password pair is proposed, in which an additional identity-password pair issued by KGC and KPAs is used to authenticate a user’s identity. In this protocol we use a simple blinding technique to eliminate the of secure channel and multiple authorities approach to avoid the key escrow problem. Our protocol solves the key-escrow problem successfully and saves at least 4n pairing and 2n Hash operations in comparison to Lee B et al’s protocol.

[...] Read more.
A Checkpointing Algorithm Based Unreliable Non-FIFO Channels

By Chuanqing Shi Shengfa Gao

DOI: https://doi.org/10.5815/ijem.2012.04.05, Pub. Date: 29 Aug. 2012

We propose a coordinated checkpointing algorithm based unreliable non-FIFO channel. In unreliable non-FIFO channel, the system can lose, duplicate, or reorder messages. The processes may not compute some messages because of message losses; the processes may compute some messages twice or more because of message duplicate; the processes may not compute messages according to their sending order because of message reordering. The above-mentioned problems make processes produce incorrect computation result, consequently, prevent processes from taking consistent global checkpoints. Our algorithm assigns each message a sequence number in order to resolve above-mentioned problems. During the establishing of the checkpoint, the consistency of checkpoint can be determined by the sequence number of sending and receiving messages. We can identify the lost messages, reordering messages and duplicate messages by checking the sequence number of sending and receiving messages. We resolve above-mentioned problems by resending the lost messages, buffering the reordering messages and dropping the duplicate messages. Our algorithm makes processes take consistent global checkpoints.

[...] Read more.
Proactive Security of E-business

By Wu Huanwei

DOI: https://doi.org/10.5815/ijem.2012.04.06, Pub. Date: 29 Aug. 2012

After giving a brief statement to the theory of proactive security, based on the differences between passive defense and proactive security, the article describes the main idea about the proactive security theory of e-business network from aspects of network environment, security technology and service, network management. At the same time it analyses the barriers existing in the actual use of proactive security in e-business network.

[...] Read more.
An Analysis on Price Dispersion in Online Retail Market Based on the Different of the Product Levels

By CHEN Xiang-Bing XIAO Kai

DOI: https://doi.org/10.5815/ijem.2012.04.07, Pub. Date: 29 Aug. 2012

This paper cares about the online price dispersion and analyses the online retail commodity as a complex. This paper analyses the attributes of the product layer of the online retail commodity and the characters of the online customers, and divided the online payment into two parts: the payment of the core value and the willingness of the added-value payment. And then this paper explains the online price dispersion by the attributes of online retail commodity’s dimension which affect the online customers directly.

[...] Read more.
Structural Damage Identification Based on the Modal Data Change

By Jianhua Zhao Ling Zhang

DOI: https://doi.org/10.5815/ijem.2012.04.08, Pub. Date: 29 Aug. 2012

This paper presents a method for structural damage identification based on the modal data change before and after the occurrence of damage. In this method, it is assumed that the reduction of structural stiffness due to damage as the summation of each elemental stiffness matrix multiplied by a damage coefficient. And then, the damage coefficient (damage extent) can be solved adversely from the vibration equation. Furthermore, the modal assurance criterion (MAC) is introduced to check the correlation of mode shapes between the damaged and the undamaged structure. An advantage of employing the MAC is that it can analyze the sensitivity of mode shapes to damage. To demonstrate the capability of the proposed method, an example of a six-span planar truss beam is used to verify the present method numerically. Results indicate that the proposed method is effective in locating single or multiple damage locations and quantifying damage extent in the truss structure.

[...] Read more.
Comparative Analysis for the Equilibrium Bidding Strategies of the Standard Auction Based on the Revenue Equivalence Principle

By Lei Wang

DOI: https://doi.org/10.5815/ijem.2012.04.09, Pub. Date: 29 Aug. 2012

It has analyzed the transition processes for the content of the revenue equivalence principle. It used the revenue equivalence principle to derive the equilibrium bidding strategies in the first, second and third price auction and the all-pay auction from the expected payment of the bidders. Based on this, it compared the equilibrium bidding strategies in the four auction forms and got some useful conclusions.

[...] Read more.
Convergence of SAOR Method for the Linear Complementarity Problems

By Xian-li Han Dong-jin Yuan Shan Jiang

DOI: https://doi.org/10.5815/ijem.2012.04.10, Pub. Date: 29 Aug. 2012

In this paper we apply an iterative method, the SAOR method for solving the linear complementarity problem, and some sufficient conditions for the convergence of the new method are presented when the system matrix M is an M-matrix. Moreover when M is an L-matrix, we discuss the monotone convergence of it. Finally, we report the numerical results of our proposed method.

[...] Read more.
Estimation of One-parameter Exponential Family Under Entropy Loss Function Based on Record Values

By Jinping li Haiping Ren

DOI: https://doi.org/10.5815/ijem.2012.04.11, Pub. Date: 29 Aug. 2012

In this paper, we consider one-parameter exponential family and obtain the minimum variance unbiased estimator , Bayes and empirical Bayes estimators of the unknown parameter based on record values under entropy loss function. The admissibility and inadmissibility of a class of inverse linear estimators are also discussed based on upper records.

[...] Read more.
Government Expenditures, Transfer Payments and Economic Growth

By Lai Yue Cheng Tianzhu

DOI: https://doi.org/10.5815/ijem.2012.04.12, Pub. Date: 29 Aug. 2012

Incorporating a two-level government structure into an endogenous growth model, we distinguished between productive and non-productive government expenditures. With transfer payments considered, we showed that (1) there was an “Inverted U-shaped” relationship between the tax rate and the long-run economic growth, so was the relationship between the degree of fiscal decentralization and the long-run economic growth; (2) optimal ratios between productive and non-productive expenditures of two levels of governments, between transfer payments and other parts of expenditures of the state-level governments are needed to maximize the long-run economic growth.

[...] Read more.