Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

24,092 Article Results

Research on the Public Transport Network Based on Complex Network

10.11591/ijeecs.v12.i6.pp4833-4839
Dan Wang , Beilei Li , Jiayang Li , Changtong Li , Liyong Wang
The public transport infrastructure of a city is one of the most important indicators of its economic growth and development. Here we investigate the statistical properties of the public transport network in Shenyang to explore its various properties based on complex network theory. The statistical properties of the public transport system consist of the degree of a node, the average shortest path length, the clustering coefficient of a node, the average clustering coefficient, and the degree distribution. In contrast with the small world evolution model, we find that the public transport system of Shenyang, a network of public transportation routes connected by bus links, is a small-world network characterized by a Poisson degree distribution. Simulation results show that the public transport network exhibits small world behavior with N=148.
Volume: 12
Issue: 6
Page: 4833-4839
Publish at: 2014-06-01

Underground Image Denoising

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3523
Zhang Ye , Jia Meng
A Mixed Window Shrink and BayesShrink Image Denoising Algorithm Based on Curve let Transform is proposed in this paper. Curve let transform is effective in presenting line and surface property of image. In the proposed algorithm, Curvelet transform is employed for the first stage, then according the theory of image demising method based on Wavelet transform, we combine Window Shrink and BayesShrink denoising algorithm to perform noise reduction. Experiment results show that the proposed algorithm is competitive to Wavelet transform in terms of Peak Signal to Noise Ratio (PSNR) and denoising image quality.  DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5479
Volume: 12
Issue: 6
Page: 4438-4443
Publish at: 2014-06-01

A Novel Clustering Routing Protocol in Wireless Sensor Network

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3503
Wu Rui
The phenomenon of network resource-constrained often appears in wireless sensor network (WSN) because of nodes with energy-limited, so it becomes a research topic to study on high-performance routing protocol in wireless sensor network. In accordance with the characteristic of quantum particle swarm optimization (QPSO), a novel clustering routing protocol with QPSO algorithm is proposed based on the low energy adaptive clustering hierarchy (LEACH), which includes several steps, such as determining the number of cluster-head, preliminary clustering, optimization on temporary cluster by QPSO algorithm, clustering after optimization, and so on. Comparative analysis on simulation experiments show that the proposed routing protocol is superior to that of LEACH, and saves energy consumption of network excellently and balances energy of nodes so as to prolong the life of the network.DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5533
Volume: 12
Issue: 6
Page: 4283-4289
Publish at: 2014-06-01

Availability Analysis of Predictive Hybrid M-Out-of-N Systems

10.12928/telkomnika.v12i2.60
Abbas; Islamic Azad University Karimi , Faraneh; Islamic Azad University Zarafshan , S.A.R; Universiti Putra Malaysia Al-Hadad
In m-out-of-n system, if m-out-of-n modules agree, system can report consensus; otherwise, the system fails. On the other hand, in predictive hybrid system if there is no agreement, a history record of previous successful result(s) is used to predict the output. In order to analyze the availability of predictive hybrid redundancy system, Markov modeling is utilized. By using Markov model of the system in steady state, the availability is derived and compared with m-out-of-n system. The results of simulation demonstrated that the availability of predictive hybrid system is higher than m-out-of-n system especially for large m.
Volume: 12
Issue: 2
Page: 437-446
Publish at: 2014-06-01

ARFMS: An AR-based WYSIWYG Filmmaking System

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3511
Chen Ling , Wenjun Zhang
This paper proposes a novel “What You See Is What You Get” filmmaking system, called as ARFMS. It provides users with a low cost and easy to use system to make movies. Users cannot only real-time visualize the performance with computer-generated objects, but also visual effects films will be finished without post-production. After finished the screenplay, the performance will be shot on-site using an ordinary camera. CG objects will be simply and effectively controlled by natural interaction. Then users can apply the DR-marker just like an actual scene element, because it takes the advantages of marker-based and markerless-based registration approaches. This paper implements ARFMS to achieve pre-visualization and real-time finish the film using augmented reality technology. The user can perform with the CG character and stage property just like real ones. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.4582
Volume: 12
Issue: 6
Page: 4345-4352
Publish at: 2014-06-01

Investigations of Wireless Sensor Networks for Indoor Particulate Matter Monitoring

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3563
Heng Luo , Ai Huang Guo , Jianping Chen , Yu Tang , Weizhong Yu , Yafei Ji
Precise measurement of indoor mass concentration of particulate matter is criticially important for the health risk evaluation since modern people spend more than 90% of their life indoors. For the sake of accuracy, long-term monitoring systems should be deployed among which wireless sensor network is a sound solution. However, most of the wireless sensor networks are battery powered and thus energy management scheme should be implemented to prolong the lifetime of the whole network. Meanwhile, sample sites must be selected carefully to avoid the results bias. In this paper, the importance of sample interval as well as sample locations is investigated theoretically and practically. Results show that by adopting efficicent power management scheme, more than 67% of energy can be saved. Finally, methods of sample interval configuration as well as sample sites selection are proposed. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5494
Volume: 12
Issue: 6
Page: 4740-4746
Publish at: 2014-06-01

Evaluation Research of Traction Motor Performance for Mine Dump Truck Based on Rough Set Theory

10.12928/telkomnika.v12i2.46
HuiLai; University of Science and Technology Beijing Sun , Chun; University of Science and Technology Beijing Jin , Shuyang; University of Science and Technology Beijing Zheng , Haiyong; China CNR Corporation limited, Beijing Tian
This paper presents the traction motor evaluation method depending on the electric transmission energy transfer characteristics and different source of supply, including motor manufactures, diesel turbine manufacturers, wheel side reducer manufacturers and electric drive system integrated manufacturers. 9 evaluations are proposed in 3 levels from the motor body and control performance, electric drive system coordinate index, driving conditions and specific cycle. Motor performance evaluation system is published by the means of electric transmission tests and computer simulation platform, using rough set theory. Experimental results show that the model can accurate evaluation of state of the traction motor, Evaluation of the accuracy is better than the subjective weighting analysis, verifying the integrity and usefulness of this valuation method. At the same time, the comprehensive evaluations index of permanent magnet synchronous motors is high, it has important research value. 
Volume: 12
Issue: 2
Page: 333-342
Publish at: 2014-06-01

Information Interchange Layer based on Classification of Information Use (IU)

10.12928/telkomnika.v12i2.70
Albarda; Institut Teknologi Bandung Albarda , Suhono Harso; Institut Teknologi Bandung Supangkat , Kuspriyanto; Institut Teknologi Bandung Kuspriyanto , Jaka; Institut Teknologi Bandung Sembiring
Information characteristics in classification of IU directly related to aspects of information usage by user in enterprise to accomplish their activities. Feature extraction from information usage in three layer of enterprise management used as parameter for this characteristic. Characteristics and dimension applied to develop middle-ware system (called Information Interchange Layer) that bridges a common issue ie information silo, to optimize a services of information resources in enterprise
Volume: 12
Issue: 2
Page: 485-492
Publish at: 2014-06-01

The Research and Desige of the CNC Constant Voltage Power

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3546
Shiwei Lin
CNC constant voltage power is composed by the analog power circuit, MCU control circuit , pulse width modulation circuit, a power driver amplifier , analog to digital conversion circuit , the input voltage setting circuit and the output voltage display circuit. The power possesses the functions of digital regulator, high precision output, short-circuit & over-current protection and alarm functions, especially for a higher accuracy requirements for various occasions. DOI: http://dx.doi.org/10.11591/telkomnika.v12i6.5443
Volume: 12
Issue: 6
Page: 4603-4608
Publish at: 2014-06-01

Object-Oriented Publish/Subscribe System

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3535
Biao Dong
Existing methodologies based on the request/response model for system software design, rooted in principles of object-oriented design, lead to tightly-coupled interactions, and lack coordination capacities. The publish/subscribe(P/S) paradigm is particularly suitable for loosely- coupled communication environment. A design of event and subscription models under an object- oriented environment was motivated by the idea of using P/S paradigm for an object-oriented environment. The P/S service is comprised of two subsystem-compiler and executor. In each subsystem, its form, working process, and typical algorithms are analysed from the point of object-oriented and technology of P/S paradigm separately. Experiment was simulated in the following two aspects: user’s model and middle code generation, and shows that using the P/S service improves the usability of P/S systems. DOI: http://dx.doi.org/10.11591/telkomnika.v12i6.5391 
Volume: 12
Issue: 6
Page: 4521-4527
Publish at: 2014-06-01

An Efficient Imaging Strategy for Single Pixel Camera in Earth Observation

10.11591/ijeecs.v12.i6.pp4794-4801
Chuanrong Li , Qi Wang , Changyong Cao , Lingling Ma
Single pixel camera is a new imaging device that develops from the “ghost” imaging and compressive sensing theory. For high resolution imaging with large amount of data, the process of measurement and reconstruction is time-consuming, which limits its application to remote sensing area. Based on the analysis of the configuration of the single pixel camera, an efficient imaging strategy through combining different numbers of DMD mirrors and local imaging was proposed which is able to image the interested target in high resolution with low time cost. Simulation experiment was carried out for two different types of targets, i.e., three-line target image and the scene consisting of a ship in the ocean. Three types of images, in low, middle and high resolution, are reconstructed respectively by the control of DMD working area and the strategy to combining DMD mirrors. The reconstructed images reached the application requirements at very low measurement and reconstruction time cost. The effectiveness and practicality of this strategy could be applied to other compressive sensing imaging devices.
Volume: 12
Issue: 6
Page: 4794-4801
Publish at: 2014-06-01

Additional Resource Allocation for improving Fairness in WiMAX

10.12928/telkomnika.v12i2.55
Khalid Mahmood; Universiti Teknologi Malaysia Awan , Abdul Hanan; Universiti Teknologi Malaysia Abdullah , Khalid; Universiti Teknologi Malaysia Hussain
IEEE 802.16 standard provides resources to both service classes Constant Bit Rate (CBR) and Variable Bit Rate (VBR). Both of these services required enough resources to transmit data efficiently.Considering available literature there is a gap to provide additional resources for fulfillment of the required service class.In this paper we propose a Service Based Fair Resource Allocation (SBFRA) Mechansim, for evaluating the required service from Subscriber (SS) along with the channel condition. Our proposed model evaluates, for providing the required service to SS how much additional resource will be required. In this model we introduced Priority Queue Scheduling Methodology for providing additional resources as per channel condition. In this paper we made comparison with and without proposed model on both traffic, CBR and VBR. We experiment that our proposed model manages the user request by providing them additional resources as required for satisfaction. Their request handled in Priority Queue Scheduling based mechanism. Results shows, that we achieve improvement by providing the additional resource on fair scheduling basis. To achieve the required performance for fairness we have to compromise on with delay.
Volume: 12
Issue: 2
Page: 455-464
Publish at: 2014-06-01

Searching and Visualization of References in Research Documents

10.12928/telkomnika.v12i2.74
Firnas; Institut Pertanian Bogor Nadirman , Ahmad; Institut Pertanian Bogor Ridha , Annisa; Institut Pertanian Bogor Annisa
This research aims to develop a module for information retrieval that can trace references from bibliography entries of research documents, specifically those based on Bogor Agricultural University (IPB)’s writing guidelines. A total of 242 research documents in PDF from the Department of Computer Science IPB were used to generate parsing patterns to extract the bibliography entries. With modified ParaTools, automatic extraction of bibliography entries was performed on text files generated from the PDF files. The entries are stored in a database that is used to visualize author relationship as graphs. This module is supplemented by an information retrieval system based on Sphinx search system and also provides information of authors’ publications and citations. Evaluation showed that (1) bibliography entry extraction missed only 5.37% bibliography entries caused by incorrect bibliography formatting, (2) 91.54% bibliography entry attributes could be identified correctly, and (3) 90.31% entries were successfully connected to other documents.
Volume: 12
Issue: 2
Page: 447-454
Publish at: 2014-06-01

Robust Weighted Measurement Fusion Kalman Predictors with Uncertain Noise Variances

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3558
Wen-juan Qi , Peng Zhang , Gui-huan Nie , Zi-li Deng
For the multisensor system with uncertain noise variances, using the minimax robust estimation principle, the local and weighted measurement fusion robust time-varying Kalman predictors are presented based on the worst-case conservative system with the conservative upper bound of noise variances. The actual prediction error variances are guaranteed to have a minimal upper bound for all admissible uncertainties of noise variances. A Lyapunov approach is proposed for the robustness analysis and their robust accuracy relations are proved. It is proved that the robust accuracy of weighted measurement robust fuser is higher than that of each local robust Kalman predictor. Specially, the corresponding steady-state robust local and weighted measurement fusion Kalman predictors are also proposed and the convergence in a realization between time-varying and steady-state Kalman predictors is proved by the dynamic error system analysis (DESA) method. A Monte-Carlo simulation example shows the effectiveness of the robustness and accuracy relations. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5453
Volume: 12
Issue: 6
Page: 4692-4704
Publish at: 2014-06-01

Measuring Information Security Awareness of Indonesian Smartphone Users

10.12928/telkomnika.v12i2.64
Puspita Kencana; Telkom University Sari , Candiwan; Telkom University Candiwan
One of information security management elements is information security awareness program. Usually, this programs only involve the employees within the organization. Some organizations also consider security awareness for some parties outside the organization like providers, vendors, and contractors. This paper add consumers as variable to be considered in information security awareness program as there are also some threats for organization through them. Information security awareness will be measured from user’s knowledge, behavior, and attitude of five information security focus areas in telecommunication, especially related with smartphone users as one segment of telecommunication provider. For smartphone users, information security threats not only from Internet, but also by phone call or texting. Therefore, focus area in this research consist of adhere to security policy, protect personal data, fraud/spam SMS, mobile application, and report for security incident. This research use analytic hierarcy process (AHP) method to measure the information security awareness level from smartphone users. In total, the result indicated that awareness level is good (80%). Although knowledge and attitude dimension are in good criteria of awareness level, but behaviour dimension is average. It can be a reason why there are still many information security breach against smartphone user despite good awareness level.
Volume: 12
Issue: 2
Page: 493-500
Publish at: 2014-06-01
Show 1422 of 1607

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration