Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

23,675 Article Results

An Experimental Study on the Driving System of Vibratory Feeding

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2713
Liang Han , WeiZhong Wu , YinHang Bian
This paper describes the development of vibratory transmission system, and concentrates on its driving technology. Vibratory feeder is used to transfer parts from one place to another by vibration which plays an important role in assembly automation. Decoupled vibratory feeder (DVF) is a novel feeder which can be excited in two mutual perpendicular directions. In decoupled vibratory feeder system (DVFS), vibration angle, frequency and waveform of driving signals can be easily adjusted in software way, as well as the phase angle between vertical vibration and horizontal vibration, so DVFS has a great superiority. Up to now, two DVFS prototypes have been successfully developed, but the driving technology cannot meet the demands of parts’ smooth moving. The electromagnet, the core of the drive system, should be optimized in its external dimensions and drive performance. And we fabricate a series of electromagnets. To test electromagnet performance, a test system has been designed. Presently, two researches on the electromagnet driving circuit have been made in our laboratory. One method is to receive analog signal from D/A output, then drive electromagnet through power amplifier. The other method actually is to use a switching circuit controlled by PWM technology. In this paper, we used the latter method in the test system and control system. The author makes experience about influencing factors of the electromagnetic force and gets some data. Also, the controller has greatly improved the performance of vibratory feeder. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3415
Volume: 11
Issue: 10
Page: 5851-5859
Publish at: 2013-10-01

Parameter Optimization of PID Controller Based on PSO for Multi-leaf Collimator

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2748
Zhang Xin
According to the control requirements of the leaves’ position precision in the multi-leaf collimator, the structure and working principle of the multi-leaf collimator in the conformal radiation therapy apparatus are described. The motor that drives the leaf of the MLC is taken as the control object. The module of the motor has been established. Then the PSO algorithm is used for the parameter optimization of PID controller that outputs the given expectation to the motor, in order to ensure the position accuracy of the MLC leaves. The experimental results indicate that this algorithm can meet the needs of the control precision of the leaves’ position of the multi-leaf collimator, and each control index is obviously superior to the traditional method for PID control. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.2759
Volume: 11
Issue: 10
Page: 6127-6134
Publish at: 2013-10-01

Petri Net-based Analysis of the Safety Communication Protocol

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2736
Liu Hongjie , Chen Lijie , Ning Bin
There is a few research in area of safety-critical system, therefore the study of performance analyzing method of the protocol has important practical significance for transportation engineering. This paper first briefly introduces the execution procedure of safety communication protocol, then explores the application of Petri net to establish the model of the protocol, including the process of state transition and corresponding timer which record the time, then obtains related performance data such as maintainability and failure probability, which users usually pay most attention to, with different probability of time delay and no fault in channel by simulation. Finally this paper finds that how the probability of time delay and no fault in channel could influent the maintainability and failure probability through data process with theory of probability and mathematical statistic, this could provide a certain reference for development of safety communication protocol. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3462 
Volume: 11
Issue: 10
Page: 6034-6041
Publish at: 2013-10-01

Analysis on the Key Parameters of Aerospace Microminiaturization Decelerator

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2698
Xiangyang Jin , Jianyuan Feng , Lili Zhao
A high efficiency special transmission decelerator is designed by scheme design, structural design, optimization design, and return difference analysis and computer simulation. Small teeth difference transmission with the first level bevel gear pair and the second level beveloid gear pair is adopted as the form of transmission in the decelerating system. Great torque and big bending moment are available by transmission ratio formula deduction, force analysis and strength analysis. The particle swarm optimization and the genetic algorithm have been combined and the mutation operator optimization model has been proposed to optimize the design of decelerator. Then the transmission with large transmission ratio, high torque, high power and high precision will be realized in small space. This model has solved the problems of particle swarm optimization in mechanical design. For example, there are more variables, it is constrained and it is easily precocious. This model has provided the theoretical basis for the optimum design of microminiaturization gear system. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3399
Volume: 11
Issue: 10
Page: 5725-5733
Publish at: 2013-10-01

A New P2P Identity Authentication Method Based on Zero-Knowledge Under Hybrid P2P Network

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2756
Xiyu Pang , Cheng Wang , Yuhong Zhang
On the basis of analyzing the shortcomings of traditional authentication mechanism synthetically, the paper presents a new kind of P2P identity authentication model. In the new P2P Identity authentication model, it authenticates the identity of nodes by using  a new Zero-Knowledge proof identification scheme which combines the advantage of RSA. Besides, during the process of validating nodes’ identity, CA (Center Authentication) doesn’t need to participate in. At last, Simulation results show that the new P2P identity authentication method can improve the safety of network effectively. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.2943
Volume: 11
Issue: 10
Page: 6187-6192
Publish at: 2013-10-01

Video Object Matching Based on SIFT and Rotation Invariant LBP

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2716
Deng Yi , Lu Jianguo , Qu Xilong
Object detection and tracking is an essential preliminary task in event analysis systems (e.g. Visual surveillance).Typically objects are extracted and tagged, forming representative tracks of their activity. Tagging is usually performed by probabilistic data association. However, as data may have been collected at different times or in different locations, it is often impossible to establish such associations in systems capturing disjoint areas. In this case, appearance matching is a valuable aid. This paper proposes a object matching method for multi-camera by combining HOG and block LBP, and computes accuracy rate by SVM. Using independent tracks of 30 different persons, we show that the proposed representation effectively discriminates visual object and that it presents high resilience to incorrect object segmentation and illumination. Experimental results show that the average accuracy DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3418
Volume: 11
Issue: 10
Page: 5876-5883
Publish at: 2013-10-01

A Safety Algorithm of P2P Routing based on Multiple-Encryption Detecting Technology

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2709
Chuiwei Lu , Xianhao Miao , Zhiyuan Liu
The nodes can freely join or leave the P2P network, which will lead to much false routing information that can cripple the performance of P2P network. Many hackers also utilize the weaken point to attack the P2P network. We propose a safety routing algorithm for P2P network to resist the routing attack. The algorithm adopts the multiple-encryption detecting technology. The node which launches the communicating connection will periodically detect every node in its routing path by sending some multiple-encryption detecting packets. By the responding message of the detected nodes, the malicious or disable nodes in its routing path will be accurately located and kicked out of the routing table. Simulation experiments demonstrate the algorithm can effectively improve the safety of the P2P routing and topology stability of the P2P network. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3411 
Volume: 11
Issue: 10
Page: 5815-5823
Publish at: 2013-10-01

Moving Vehicle Recognition and Feature Extraction From Tunnel Monitoring Videos

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2739
Aiyan Lu , Luo Zhong , Lin Li , Qingbo Wang
 In recent decades, many government agencies and famous universities are researching the intelligent traffic video monitoring system. According to the tunnel monitoring video, this paper uses the combination of background subtraction method and three frame differencing method for moving vehicle detection , and designs the geometric parameters and combined parameters for vehicle classification, finally makes up a vehicle classifier, based on these characteristics parameters. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3465 
Volume: 11
Issue: 10
Page: 6060-6067
Publish at: 2013-10-01

Research and Implementation of Congestion Control Scheme in ForCES Router

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2686
Bangzhi Xiao , Ming Gao , Weiming Wang , Julong Lan
With packet input rate rise ceaselessly, FoCES system will finally be congested. In order to solve this problem, aiming at the common local congestion and global congestion, this paper proposed a local congestion control strategy based on scheduling and a global congestion control mode based on the linkage between CE and FE. These two congestion control schemes can independently run inside the system, and also can operate simultaneously. Making that the forwarding rate, throughout and packet loss all have a great improvement in the FE end. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3387
Volume: 11
Issue: 10
Page: 5627-5635
Publish at: 2013-10-01

Design and Analysis of Power Head Axial Servo Loading System

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2689
Xianjin Shi , Hongqi Liu , Gang Sun , Baochao Wang
Power head is the main motive mechanism of rotary drilling rig. High axial pressure and high frequency is one of its typical working conditions. Axial loading test is a key point in power head performance tests. Overall design, system theoretical analysis and simulation of power head axial loading system were carried out. The bond graph model and state equations of power head axial servo loading system were built on the basis of bond graph theory. Hydraulic system simulation model was constructed and axial steady-state and dynamic loading simulation was made by use of hydraulic simulation software. The maximum axial steady-state load is up to 450kN and the dynamic frequency is 20Hz, both of which can meet the technical requirements. The simulation validates the feasibility of the scheme about power head axial loading system and it provides theory and practice guidance for perfecting the loading system. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3390
Volume: 11
Issue: 10
Page: 5652-5661
Publish at: 2013-10-01

Color Calibration Model in Imaging Device Control using Support Vector Regression

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2674
Yang Bo , Lei Liang , Wang Xue
In the color system of a computer, the nonlinearity of the image acquisition device and the display device may result in the difference between the colors displayed on the screen and the actual color of objects, which requires for color correction. This paper introduced the Support Vector Regression (SVR) to establish a color correction model for the nonlinear imaging system. In the modeling process, the Successive 3σ Filter was used to eliminate the large errors found in the color measurement. Because the SVR model of RBF kernel has two important parameters (C, γ) that need to be determined, this paper applied Least Mean Squared Test Errors Algorithm to optimize the parameters to get the best SVR model. Compared with quadratic polynomial regression, BP neural network and relevance vector machine, SVR has better performance in color correction and generalization. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3336
Volume: 11
Issue: 10
Page: 5530-5538
Publish at: 2013-10-01

Weighted Multi-Scale Image Matching Based on Harris-Sift Descriptor

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2727
Can Sun , Jin-ge Wang , Zaixin Liu , Junmin Li
According to the rotational invariance of Harris corner detectorand the robustness of Sift descriptor. An improved Harris-Sift corner descriptor was proposed. At first, the algorithm given multi-scale strategy to Harris corner, improved corner counting method and removed redundant points at the same time, then, the corner was directly applied to low-pass Gaussian filter image. Based on the histogram of Sift feature descriptor, generates a new 128-dimensional feature vector descriptor by multi-scale Gauss weighted.Through the above, Harris corner detectorand Sift descriptorwas normalizedin the scale layer and gradient features. The experiment results indicated that, the improved corner descriptorcomprised both advantage of Harris corner detection and Sift feature descriptor. The method reduced the computation time and the false match rate, which could be validly applied to the robotstereo vision matching andthree-dimensional reconstruction. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3429   
Volume: 11
Issue: 10
Page: 5965-5972
Publish at: 2013-10-01

Multi-Attribute Auctioning Resource in Grids: Model and Protocols

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2684
Lili Ding , Xiaoling Wang , Wanglin Kang
Auction models and protocols are found efficient in managing resources allocation, which are a key technology in grid computing system. In this paper, a new multi-attribute multi-round reverse auction is proposed, and related reverse auction based protocols are designed. The resource user’s satisfaction degree is introduced into the traditional grid resource allocation problem to help the grid resource broker make multi-attribute decisions with incomplete information. Numerical simulating experiments show that our model and protocols can satisfy the resource user’s quality demand on multiple attributes, and achieve high efficiency in user utility. The results also illustrate that the on-line multi-attribute algorithm in ONMRA protocol has better performance in an on-line setting for grid allocation. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3347
Volume: 11
Issue: 10
Page: 5609-5616
Publish at: 2013-10-01

Synchronization of Hyperchaotic Systems under Active Adaptive Sliding Mode Control

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2830
Minxiu Yan , Xiaofan Zheng , Jing Zhen
Under the existence of system uncertainties and external disturbances, complete synchronization and anti-synchronization between two identical or different hyperchaotic systems are investigated in the paper. Firstly, an active control is used to eliminate the nonlinear part of the error. Then the sliding mode controller is designed based on suitable sliding surface. After that the adaptive updating law is designed to estate the bound of the uncertainties and external disturbances under the combination of active sliding mode control and adaptive control. The structure of the master and slave hyperchaotic systems has no restrictive assumption about the bound of the uncertainties and external. The active adaptive sliding mode controller (AASMC) is proposed to drive the state of slaver system trajectories into or opposites to the state of master system. The active adaptive sliding mode controller is proposed to realize synchronization and anti-synchronization by changing the parameter in the control function respectively. Moreover, a strict proof of the stability of the error dynamics is derived based on the Lyapunov stability theory. Finally, the corresponding numerical simulations are demonstrated the robustness and efficiency of the proposed controller. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3522
Volume: 11
Issue: 11
Page: 6728-6736
Publish at: 2013-10-01

Optimization and Construction of Single-side Nuclear Magnetic Resonance Magnet

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2734
Ji Yongliang , He Wei , He Xiaolong
Single-sided NMR devices can operate under conditions inaccessible to conventional NMR while featuring portability and the ability to analyze arbitrary-sized objects. In this paper, a semi-elliptic Halbach magnet array was designed and built for single-side Nuclear Magnetic Resonance (NMR). We present an easy-to-implement target field algorithm for single-side NMR magnet design based on Gram-Schmidt Orthogonal method. The creating magnetic field of designed magnet structure could achieve best flatness in the region of interesting for NMR applications. The optimizing result shows that the best magnet structure can generate magnetic fields which flatly distributed in the horizontal direction and the gradient was distributed in the vertical direction with gradient of 2mT/mm. The field strength and gradient were measured by a three dimensions Hall probe and agreed well with the simulations. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3460  
Volume: 11
Issue: 10
Page: 6017-6024
Publish at: 2013-10-01
Show 1467 of 1579

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration