Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

24,092 Article Results

Semi-Supervised Affine Alignment of Manifolds

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3292
Rui Jia , Ting Lu
High dimensional data is usually produced by the source that only enjoys a limited number of degrees of freedom. Manifold leaning technique plays an important part in finding the correlation among the high dimensional data datasets. By making use of manifold alignment, the paired mapping relationship can be explored easily. However, the common manifold alignment algorithm can only give the mapping result of the training set, and cannot deal with a new coming point. A new manifold alignment algorithm is proposed in this paper. The benefit of our algorithm is two fold: First, the method is a semi-supervised approach, which makes better use of the local geometry information of the unpaired points and improves the learning effect when the labeled proportion is very low. Second, an extended spectral aggression trick is used in the algorithm, which can produce a linear mapping between the raw data space and the aligned space. The experiments result shows that, the correlation mapping can be precisely obtained, the hidden space can be aligned effectively, and the cost of mapping a coming point is very low. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4808
Volume: 12
Issue: 4
Page: 2559-2564
Publish at: 2014-04-01

An Adaptive Detection Method of Multiple Faces

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3315
Wei Li
The appearance of multiple faces is influenced by abnormal exposure, interfering backgrounds or fake objects greatly in the color face image. A multiple-face detection method based on the adaptive dual skin model and improved fuzzy C-mean clustering was presented in this study. First an adaptive skin-color model and an adaptive skin-probability model were built to acquire the skin likelihood for clustering, the adaptive initial clustering centers, and the adaptive clustering weights. Then the skin-likelihood image was segmented dynamically by improved fuzzy C-mean clustering. Finally the multiple-face targets were distinguished and extracted by jointly using the effective areas, circumferences and circularities of connected targets. Experiment showed that the algorithm had good results and high speed, accuracy, and adaptability of face detection. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4368 
Volume: 12
Issue: 4
Page: 2743-2752
Publish at: 2014-04-01

A High Efficient Association Rule Mining Algorithm based on Intelligent Computation

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3345
Fengxiang Wu
Abstract—Data mining is to use automated data analysis techniquesto uncover previously undetected relationships among data items. In datamining, association rule mining is a prevalent and well researched method for discovering useful relations between variables inlarge databases. In this paper, we investigate the principle of Apriori, direct hash and pruning and alsostudy the drawback of them. The first is constructing hash table withoutconfliction is theoretically optimal, but it needs consume a lot of memoryspace and space utilization is low. The second is that it does not have hashtree data structure leading to too long insert and search  time. So we propose a new association rule mining algorithm based on differential evolutionarycomputation. Theexperiment results show that our proposed algorithm has better execution timeand accuracy, which can be used in electroniccommerce system. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4810
Volume: 12
Issue: 4
Page: 2941-2949
Publish at: 2014-04-01

Iterative Integral Equation Method for Efficient Computation of Multiple Scattering

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3372
Xiaoyan Zhang , Zhiwei Liu , Shan He , Yingting Liu , Yueyuan Zhang
An iterative integral equation method (IEM) is proposed for calculation of the electromagnetic (EM) scattering field from geometries with multiple reflections, such as rough surface, dihedral and trihedral. The first reflection is computed by physical optics and the coupling effects are computed by integral equations. The average size of the triangular meshes used in the proposed method is a constant value while that in method of moment is a linear function of wavelength. As a result, compared with method of moment, the proposed method will lead to less number of unknowns for electrically large geomety. Accordingly, this method is more efficient and suitable for fast computation of scattering from electrically large geometry. Further more, when compared with high frequency asymptotic method, the proposed method is more accurate. The numerical results demonstrate that this method is accurate for computation scattering with multiple reflections and efficient for electrically large object. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4932
Volume: 12
Issue: 4
Page: 3208-3213
Publish at: 2014-04-01

An Efficient Approach based on Hierarchal Ontology for Service Discovery in Cloud Computing

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3335
Naji Hasan.A.H , Gao Shu , AL-Gabri Malek , Jiang Zi-Long
As service providers publish their web services in clouds environment, selecting the most appropriate service among these clouds becomes a very difficult challenge. This paper proposes an efficient approach based on hierarchal ontology to facilitate service discovery in cloud computing. Concepts of services and their relations, which describe services semantically, are distributed in a hierarchal ontology. In addition a matching mechanism for matching these concepts in order to match services in clouds is proposed. The matching results will be evaluated by the QoS of services to select the appropriate service among matched services. A case study is presented to prove the efficiency of our approach. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4850
Volume: 12
Issue: 4
Page: 2905-2913
Publish at: 2014-04-01

On the Algebraic Immunity of Boolean Function

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3347
Cao Hao , Wang Huige
In view of the construction requirements of Boolean functions with many good cryptography properties, through the analysis of the relationship between the function values on the vectors with weight not more than d  and the algebraic immunity, a method to determine the higher order algebraic immunity function is given. Meanwhile, a method that appropriate change in the function value without reducing algebraic immunity is produced, and using it, an example to construct Boolean function with optimal properties in the algebraic immunity, nonlinearity, balance and correlation immunity etc is presented. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4773
Volume: 12
Issue: 4
Page: 3010-3014
Publish at: 2014-04-01

Research on Design Method Based on Hardware Encryption and Two-way ID Authentication for Security Mobile Hard Disk

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3344
Huanchun Yang
The design Method of the " Security Mobile Hard Disk Based on Hardware Encryption and Two-way ID Authentication" adopts the smart card-based technology of two way ID authentication, thus enables higher authentication strength than ordinary password authentication and USB-KEY one way certification; adoption of dedicated hardware encryption chip on encrypting the hard disk data enhances the encryption speed; since this encryption is a hardware level encryption, it is completely transparent to users, and do not rely on the operating system or other applications, with almost no impact on system performance; that the key of the encryption system will be loaded before the system initialization (system boot) prevents malicious code attacks from hard drive, and even when the mobile hard disk was stolen, the thief cannot read out any encrypted data from it  on any other computer as long as the thief has no access to the encryption key. Therefore, this "encrypted mobile hard disk" is more secure with better reading and writing performance, and thus can effectively protect Important and sensitive data on the mobile hard disk. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4995
Volume: 12
Issue: 4
Page: 3001-3009
Publish at: 2014-04-01

Robust Adaptive Fuzzy Sliding Mode Control Based on Fuzzy Compensation for Ammunition Auto-loading Robot

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3299
Yufeng Li , Kuiwu Li , Yutian Pan , Kelei Li
Aimed at the problems of low control accuracy and weak robustness influenced by external disturbance, friction, load changes, modeling errors and other issues in ammunition auto-loading robot control system, a new robust adaptive fuzzy sliding mode controller based on fuzzy compensation is proposed. The control architecture employs fuzzy systems to compensate adaptively for plant uncertainties to distinguish different disturbance compensation terms and approximate each of them respectively. The stability of the robust adaptive fuzzy sliding mode control (SMC) and the convergence of the tracking errors are ensured by using the Lyapunov theory. By analyzing and comparing the simulation results, it is obviously shown that the control system can lighten the effect on the control system caused by different disturbance factors and eliminate the system chattering instead of traditional SMC. As a result, the control system has great dynamic features and robust stability and meets the requirement that the actual motion of ammunition auto-loading robot quickly tracks the scheduled trajectory. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4342
Volume: 12
Issue: 4
Page: 2613-2621
Publish at: 2014-04-01

Analysis on Channel Capacity of Transform Domain Communication System

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3321
Wei Naiqi , Chen Zili , Lv Junwei , Zhu Anshi
Transform Domain Communication System (TDCS) has caught attention for its characteristics of flexible spectrum application, excellent anti-interference performance and low interception probability. Analysis on channel capacity is one aspect of important basic theory research for TDCS. The fundamental principle of TDCS is studied at first. Then the channel capacity model of TDCS is deduced and built on the background of Gaussian white noise channel with typical interference. The channel capacity of TDCS under different spectrum sensing methods is investigated on the basis of the model. The research indicates that the spectrum sensing methods based on AR model and wavelet-packet transform make more improvement for TDCS channel capacity. Therefore, from the perspective of maximizing TDCS channel capacity, the spectrum sensing methods based on AR model and wavelet-packet transform can be adopted. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4112
Volume: 12
Issue: 4
Page: 2790-2796
Publish at: 2014-04-01

An Intelligent Course Scheduling Model Based on Genetic Algorithm

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3342
Guofeng Qin , Haibin Ma
With the university expansion, how to maintain teaching order using limited resources make the intelligent course scheduling become a multiple-constraint and multi-objective optimization problem. Traditional intelligent course scheduling algorithm is inefficient, cannot solve curriculum conflict question and meet the requirements of the modern university education management. Given this situation, this paper analyzes the university timetabling problem, and establishes a general course scheduling model; then proposes an improved genetic algorithm to sovle the intelligent course scheduling problem. It can meet all of the education resources’ constraints and the teachers’ personal demands as much as possible. Test the performance of between the improved genetic algorithm and simple genetic algorithm under different scenarios, the experimental results show that the improved genetic algorithm has better performance, can schedule courses reasonable. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4798 
Volume: 12
Issue: 4
Page: 2985-2994
Publish at: 2014-04-01

A Multi-party Decision Hot-standby Model

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3377
Congdong Lv , Wei Ma , Xiaoyong Li
The dual server hot-standby mechanism is often used to improve the system availability. However, in traditional dual server hot-standby models, the states of servers are seldom determined from the client’s observation, and it’s easy for the master server and the slave server to make wrong decisions about the state of each other, which may cause split brain. This paper presents a multi-party decision hot-standby model. In this model, the master server and the slave server determine the state of each other not only from the observation of themselves, but also from the observation of the client, which helps them make correct decision to maintain or change the service platform, so as to ensure the continuity of application. Compared with traditional dual server hot-standby models, the model suggested in this paper is more reasonable because of the involvement of the client’s observation. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4887
Volume: 12
Issue: 4
Page: 3247-3252
Publish at: 2014-04-01

Process Model and Digitalization of the Coal Gas Outburst Prevention

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3331
Shao-jie Hou , Yu-wei Zhang , Yuan-ping Cheng
Regional coal gas outburst prevention has become the prerequisite of coal mining in the most China underground collieries. It touched on miners’ lives so closely, but especially lacked of digitalization due to the hostile working environment, sightless strata reserves, complicated and long-time workflow. By synthesizing the vital rules issued by China governments and various techniques of coal gas outburst prevention, we proposed a novel process model for them embodied as a logical workflow. The model consisted of two operation links and two judging nodes, and dealt with three types of data. Then an easy-use and practical process data management software system was developed. By testing in Qinan colliery, the system was proved to be fully considering user experience and helpful to promote digitalization of coal gas outburst prevention. Compared with the traditional management, the digitalization might help engineers identify anomalies more quickly and avoid gas accidents in time. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4240
Volume: 12
Issue: 4
Page: 2875-2881
Publish at: 2014-04-01

The Combined Forecasting Model of Discrete Verhulst-BP Neural Network Based on Linear Time-Varying

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3374
Shang Hongchao , Long Xia , He Tingjie
Firstly, this paper, aiming at the problem of errors produced by the transformation of differential equation directly into difference equation from traditional gray Verhulst model,through generating reciprocal for the original data sequence, constructs the discrete Vrhulst model based on linear time-varying(LTDVM model);And then we, taking the LTDVM predicted value as an input value and the original data as a mentor training value, put forward the combined forecasting model of discrete Verhulst-BP neural network based on linear time-varying. Meanwhile, in order to improve the training speed and agility and effectively avoid the saturation region of S-type function, this article normalized in advance the input data and mentor training values to better ensure the usefulness, self-learning ability and fault tolerance of the model. At last, we will study the cases to demonstrate that the model has high modeling and forecasting accuracy. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4938
Volume: 12
Issue: 4
Page: 3224-3229
Publish at: 2014-04-01

Attack the Anycast Signature Scheme

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3371
Jinbin Zheng
Today, the internet is increasingly being considered to provide services, and not just in order to connect. As this view became more universal, the important factors of providing such services are reliability and availability of the services to meet the needs of a large number of users. Anycast is a communication mode in which the same address is assigned to a group of servers and the router will send the request to the ”best” server. Al-Ibrahim and Cerny proposed an authentication scheme of anycast communication. Their scheme is based on El-Gamal type signature scheme. We prove that their preferred scheme, which does not require interaction among the various signers, is insecure. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4931
Volume: 12
Issue: 4
Page: 3200-3207
Publish at: 2014-04-01

Switching Surface Design for Nonlinear Systems: the Ship Dynamic Positioning

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3278
Diallo Thierno Mamadou Pathe , Hongsheng Li , Guangrong Bian
In this paper a design of the switching-surface for the nonlinear system is studied. The aim was to prove that with the linear matrix inequality the coefficients of the sliding surface can be determined optimally for the control law structure. The advantages of the use of the linear matrix inequality reside in the accurate determination of the coefficients of the sliding surface. The sliding mode control for dynamic positioning of the ship with our proposed switching-surface is done. The objective of this control was to make sure that the ship follows a predetermined track. The good trackings are observed from the simulation results which confirm the robustness of the control law obtained by our proposed switching-surface. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4739
Volume: 12
Issue: 4
Page: 2439-2447
Publish at: 2014-04-01
Show 1438 of 1607

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration