Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

23,675 Article Results

An Hybrid Coding Technique for Efficient Bandwidth Usage in conformity with IEEE 802.11 WLAN Standard

https://ijece.iaescore.com/index.php/IJECE/article/view/5400
Isiaka Ajewale Alimi , Kayode Francis Akingbad , Jide Julius Popoolae , Michael O. Kolawole
The contemporary Wireless Local Area Networks (WLANs) systems like IEEE 802.11a/g standards use Coded Orthogonal Frequency Division Multiplexing (COFDM) and offer data rates of up to 54 Mbps at 2.4 GHz or 5 GHz. IEEE 802.11n is a recent WLAN standard capable of not only providing increased data rate and improved range but also reduced signal fading. These benefits are achieved through the use of space-time coded Multiple-Input, Multiple-Output with Orthogonal Frequency Division Multiplexing (MIMO-OFDM) technique which provides the possibility of increased signal strength at the receiver with optimal bandwidth and power efficiency. In this paper, a novel hybrid space-time block coding (HSTBC) scheme is proposed for mitigating signal fading as well as enhancing the performance of MIMO–OFDM based WLANs. The signal to be transmitted is first pre-coded and the resulting output is then coded using space-time block code to form a HSTBC. Simulation results show that the HSTBC scheme considerably reduced the effect of multipath fading in wireless communication systems with improved bit error rate. Our proposed HSTBC improves the performance of the system in terms of data transmission as the capacity of the system almost doubled the capacity of a conventional STBC system.DOI:http://dx.doi.org/10.11591/ijece.v3i5.3668
Volume: 3
Issue: 5
Page: 593-602
Publish at: 2013-10-01

The Design and Verification of Disaster Recovery Strategies in Cloud Disaster Recovery Center

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2755
Gang Li , Qingpu Zhang , Wang Li , Zhengqian Feng
Disaster recovery is an important means to ensure business continuity. However, the disaster recovery investment is so huge that the cloud disaster recovery becomes a best choice for enterprises, especially for SMEs. This paper discusses the necessity and importance of the cloud disaster recovery center and the vital indicators of disaster recovery by analyzing the classification and selecting principle of cloud disaster recovery strategy, developing disaster recovery strategy based on major disaster recovery strategy finally. In the end, this paper verifies the feasibility of the disaster recovery strategy by two specific cases of disaster recovery implementation. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.2945
Volume: 11
Issue: 10
Page: 6179-6186
Publish at: 2013-10-01

Fuzzy Neural Networks Learning by Variable-Dimensional Quantum-behaved Particle Swarm Optimization Algorithm

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2760
Jing Zhao , Ming Li , Zhihong Wang
The evolutionary learning of fuzzy neural networks (FNN) consists of structure learning to determine the proper number of fuzzy rules and parameters learning to adjust the network parameters. Many optimization algorithms can be applied to evolve FNN. However the search space of most algorithms has fixed dimension, which can not suit to dynamic structure learning of FNN. We propose a novel technique, which is named the variable-dimensional quantum-behaved particle swarm optimization algorithm (VDQPSO), to address the problem. In the proposed algorithm, the optimum dimension, which is unknown at the beginning, is updated together with the position of swarm. The optimum dimension converged at the end of the optimization process corresponds to a unique FNN structure where the optimum parameters can be achieved. The results of the prediction of chaotic time series experiment show that the proposed technique is effective. It can evolve to optimum or near-optimum FNN structure and optimum parameters. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.2960
Volume: 11
Issue: 10
Page: 6216-6223
Publish at: 2013-10-01

A Curve-fitting Calibration Method applied for Ultrasonic Flow-meter

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2691
Yong Luo , Rangding Wang , Ling Yao
 As the influence of fluid distribution in the internal pipe, the measurement characteristics of theory and practice exist significant differences in Ultrasonic Flow-meter(USF). Through analysis of fluid state, the method of curve-fitting is applied for the calibration of USF. Experimental results show that the USF can achieve level-1 accuracy with just a correction of 5 flow points, and this method performs a low computational complexity and strong practicality. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3392 
Volume: 11
Issue: 10
Page: 5669-5674
Publish at: 2013-10-01

Establishing Performance Evaluation Model with Queuing Theory in NoC

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2694
Tao He , Fucai Chen , Tao Qin
The transmission delay is an important index of the system performance of NoC (Network on Chip). Although the method of simulation-based can get accurate transmission delay, the simulation requires time consuming and a large number of test vectors. Especially in the study of some algorithms, such as mapping algorithms, buffer allocation algorithm, the simulation method is not applicable. To solve the above problems, the paper uses queuing theory to study the establishment of a NoC delay model. The model considers the limited buffer of routing unit and virtual channel technology for network transmission delay and proposes solving algorithm of the delay model based on reverse deduction method. The simulation shows that this model used to analyze the application-specific data transmission delay has smaller average error (reduced by 8%) and higher evaluation efficiency (increased by more than 30 times), which provide designers an efficient method of performance evaluation. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3395
Volume: 11
Issue: 10
Page: 5694-5702
Publish at: 2013-10-01

A Distributed Network Intrusion Detection System with Active Surveillance Agent

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2765
Bin Zeng , Lu Yao , Rui Wang
A distributed network intrusion detection system (IDS) called SA-NIDS is proposed based on the network-based intrusion detection architecture. It includes three basic components, Local Intrusion Detection Monitor (LIDM), Global Intrusion Detection Controller (GIDC), and Surveillance Agent (SA). Basically, the LIDM is used to do packets capturing, packets de-multiplexing, local intrusion detection and intrusion inferring. The GIDC is installed in administration center for communicating and managing LIDMs, it can also do the intrusion detection and intrusion inferring. The SA contains several optional functions for information gathering. After an attack behavior is discovered, the SA may be used to launch some kinds of information gathering to the attacker, so that the proposed SA-NIDS has the active surveillance ability. For the intrusion inferring, the pattern matching and the statistical approach are applied in SA-NIDS. The experimental results can satisfy the needs of network information safety.  DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3707
Volume: 11
Issue: 10
Page: 6258-6266
Publish at: 2013-10-01

Moiré Fringe Phase Difference Measurement Based on Spectrum Zoom Technology

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2735
Li Chang , Gai Cui
Grating displacement measurement technique is an important means to achieve precise displacement measurement of nanometer scale. Moiré fringe phase difference measurement is the basis of grating displacement measurement technique. Traditional Moiré fringe subdivision method based on DFT algorithm has low frequency resolution relatively when extracting Moiré fringe fundamental frequency spectral line, which causes frequency and phase measurement errors of Moiré fringe fundamental frequency. CZT spectrum zoom technique can improve the frequency resolution of frequency band near Moiré fringe fundamental frequency and get fundamental frequency spectrum lines more exactly, which can solve the problem of low frequency resolution of DFT. The paper studies the relation of Moiré fringe phase difference and grating displacement, and analyzes the working principles of DFT and CZT spectrum zoom method. DFT and CZT spectrum zoom are used for Moiré fringe spectrum analysis and phase difference calculation respectively. Simulation results show measurement error of Moiré fringe phase difference with DFT algorithm is in 10-3degree scale, while measurement error with CZT spectrum zoom algorithm is approximate 0 degree. The comparison results show CZT spectrum zoom method has better performance and applicability, which improves the phase difference measurement accuracy of Moiré fringe effectively. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3461 
Volume: 11
Issue: 10
Page: 6025-6033
Publish at: 2013-10-01

Video Fire Detection Algorithm using Multi-Feature Fusion

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2678
Mengxin LI , Weijing XU , Ke XU , Jingjing FAN , Dingding HOU
At present, the moving target detection and flame characteristics extraction almost become the most important parts in majority of video fire detection systems. Through the above two-part study, a new fire features detection method is presented in precise moving target area. That is, using the improved background difference method and flame features (such as the color and uniformity, Wavelet energy, stroboscopic and contour features) to detect fire. Experiments show that this method can improve theaccuracy and anti-interference ability of fire detection. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3340
Volume: 11
Issue: 10
Page: 5563-5570
Publish at: 2013-10-01

An Improvement on An Efficient Mobile Authentication Scheme for Wireless Networks

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2764
Jian-Zhu Lu , Xiuwei Fan , Jipeng Zhou , Hao Yang
Mobile communication network has brought us great convenience. However, network security issues are outstanding increasingly. Authentication is the most essential procedure for preventing illegitimate, unauthorized or insecure devices from making access to the network. Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the scheme can effectively defend all known attacks to mobile networks including the denial-of-service attack. This paper strengthens the security of the scheme by authenticating the identity of visited location register such that any adversary cannot obtain the communication key between a mobile user and a service provider, or prevent them from establishing this key. An improvement is proposed to remedy these flaws. Our design is a less strong requirement for a mobile user MS in the communication cost than that of Tang and Wu's. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3706 
Volume: 11
Issue: 10
Page: 6250-6257
Publish at: 2013-10-01

The Future Network Research Based on Reconfiguration and Expansible

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2723
You Dai , Bin Zhuge , Huanhuan Song , Weiming Wang , Julong Lan
With the development of network, the internet has more and more problems. Ubiquitous information services, diversified and comprehensive network business, different business may have different QoS requirements, and the safety credible information interaction, etc., these problems raise huge challenges to the supporting capacity of current network architecture system. Therefore, we should study out new future network architecture to meet the requirements of users. In this paper, we present a new network architecture based on reconfigurable and expansible, the core idea is to provide logic bearing networks with different QoS guarantees for different service. The architecture uses virtualization technology to abstract and divide the network resources, divide the network function module into business layer, ATS layer and ATC layer three functional surfaces from the point of view of whole network reconfiguration. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3425
Volume: 11
Issue: 10
Page: 5929-5937
Publish at: 2013-10-01

A Clustering Algorithm Based on Rough Set and Genetic Algorithm

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2705
Yushu Xiong
With the development of computer and information technology, the capacity of data and information is increasing. The processing of data and information becomes the hot issue in the current scientific community. Rough set and genetic algorithm are two data mining and processing technologies which had been commonly used. Rough set can process data quickly and the algorithm is simple. The convergence of genetic algorithm is fast and the robustness is good. This paper puts forward the effective clustering algorithm based on  the combined control of rough set and genetic algorithm, then does simulation experiment of segmentation images by  numerical simulation based on matlab programming, finally gets  the curve of calculation process and the effect diagram of image segmentation , verifies the effectiveness of the algorithm. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3407
Volume: 11
Issue: 10
Page: 5782-5788
Publish at: 2013-10-01

Routing Algorithm for DTN Based on Congestion Control

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2685
Song Ningning , Liu Qian , Zhou Xianwei , Xue Peipei
Different from Internet networks, DTN has its own unique characteristics, like intermittent connectivity, low data transfer rate, high latency and limited storage and node resources. Routing technology is always the key to DTN research. In this paper, a routing protocol that is PNCMOP was proposed. It makes some improvement of Epidemic routing protocol, and also to decrease the end-to-end average delay and improve delivery ratio, especially with congestion control. Simulation results show that PNCMOP achieved a good performance. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3348
Volume: 11
Issue: 10
Page: 5617-5626
Publish at: 2013-10-01

Multiple Disciplines Product Design Knowledge Representation Strategy Based on Ontology and Semantic Network

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2741
Guohai Zhang , Yusheng Li
The complicated products design is a process of conflict resolution and integration decision for collaborative optimization involved in multiple disciplines including mechanical engineering, electronical engineering and control engineering, etc. It’s also a multi-disciplinary field of complex knowledge fusion process. The architecture of the product design knowledge is given by the description of the forms of knowledge in complex product design. The representation mechanism for multidisciplinary knowledge based on ontology and formal definition of the design knowledge ontology are put forward by using the theories and methods of ontology and semantic network. Finally, the multiple disciplines design knowledge expression strategy is proposed based on the above analysis and conclusions. This paper provides a new method and means for complicated product design knowledge representation involving the integration of multidisciplinary knowledge. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3467 
Volume: 11
Issue: 10
Page: 6074-6079
Publish at: 2013-10-01

Prediction of Vehicle Trajectory Based on Fuzzy Colored Petri Net

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2710
Chang Wang , Jiahe Qin , Minghua Guo , Yuanxin Xu
Aiming at the difficulty in establishing model to describe vehicle running state, real road test was carried out to capture data which represent the movement of vehicles. Coordinate transformation method and transform relationship among different variable parameters were used to establishing represent model of vehicle movement. By using Petri net which had well layering and time sequence, vehicle trajectory, speed, side slip angle, and yawrate were treated as parameters to describe the movements of vehicle. Domain of discourse and subordinating degree function were confirmed, and fuzzy rules related to controllability and driving comfort were established. Verification tests results show that the Petri net model can describe the vehicle movement accurately, and the predict results of represent parameters were similarly with the real measured data. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3412 
Volume: 11
Issue: 10
Page: 5824-5832
Publish at: 2013-10-01

Ultrasound Image Segmentation based on the Mean-shift and Graph Cuts Theory

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2683
Yun Ting , Gao Mingxing , Wang Yanming
This paper addressed the issue of vascular ultrasound image segmentation and proposed a novel ultrasonic vascular location and detection method. We contributed in several aspects: Firstly using mean-shift segementation algorithm to obtain the initial segementation results of vascular images; Secondly new data item and smooth item of the graph cut energy function was constructed based on the MRF mode, then we put forward swap and  ideas to optimize segmentation results, consequently accurately located the vessel wall and lumen in vascular images. Finally comparison with experts manually tagging results, and appling edge correlation coefficients and variance to verify the validity of our algorithm, experimental results show that our algorithm can efficiently combines the advantages of mean-shift and graph-cut algorithm and achieve better segmentation results. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3346
Volume: 11
Issue: 10
Page: 5600-5608
Publish at: 2013-10-01
Show 1465 of 1579

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration