Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

23,675 Article Results

A Moving Object Detection Algorithm Based On Multiple Judgments

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2675
Mengxin Li , Jingjing Fan , Ying Zhang , Rui Zhang , Weijing Xu , Dingding Hou
In the field of moving object detection, the traditional background subtraction method is used broadly, which seems more sensitive to light and shows poor anti-interference performance. Background modeling is the key step of background subtraction method. The Local Binary Pattern (LBP) algorithm is considered to put texture information into the background model, combining color and texture information and an improved background subtraction method proposed. In addition, a new method is proposed combining the inter-frame difference method with improved background subtraction method in this paper. It can overcome traditional methods only using the pixel gray value changes for moving targets detection. The method makes use of dual-threshold to detect moving targets and makes multiple judgments. It not only uses the change of pixel gray value to detect moving targets, but also takes advantage of the number of changed pixels to detect moving targets which we are interested in. The experiments show that the algorithm proposed is adopted to detect the moving target accurately and can resist interferences brought about by the slow slight movements in the scene with better robustness. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3338
Volume: 11
Issue: 10
Page: 5539-5544
Publish at: 2013-10-01

Evaluation Studies on Client Satisfaction Degree of Railway Statistic Information System

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2707
Huawen Wu , Xingjun Shi , Chenyang Duan , Fuzhang Wang
To increase the accuracy and the efficacy of client satisfaction degree of railway statistic information system, we give an AHP-based comprehensive assessment about satisfaction degree of information system, hoping to solve problems about evaluation difficulties of multi-index, multi-criteria and multi-level. Since the conventional AHP-based method is affected by subjective factors, we develop an enhanced AHP method to decrease limitations of conventional methods. Our method, still based on expert scoring, perform cluster analysis of scoring data, apply the clustering method of Euclid Distance with Weight to eliminate scores with the largest divergence, and utilize the AHP method and Function of Weight Average to obtain weight of evaluation index, which is useful to improve the accuracy and efficacy and can enhance effects of the more pivotal evaluation index on results. Finally, we prove its rationality and reliability in an evaluation of client satisfaction degree of railway statistic information system. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3409
Volume: 11
Issue: 10
Page: 5797-5805
Publish at: 2013-10-01

Weighted K-Nearest Neighbor Classification Algorithm Based on Genetic Algorithm

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2754
Xuesong Yan
K-Nearest Neighbor (KNN) is one of the most popular algorithms for data classification. Many researchers have found that the KNN algorithm accomplishes very good performance in their experiments on different datasets. The traditional KNN text classification algorithm has limitations: calculation complexity, the performance is solely dependent on the training set, and so on. To overcome these limitations, an improved version of KNN is proposed in this paper, we use genetic algorithm combined with weighted KNN to improve its classification performance. and the experiment results shown that our proposed algorithm outperforms the KNN with greater accuracy. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.2534
Volume: 11
Issue: 10
Page: 6173-6178
Publish at: 2013-10-01

Car Information Bus Image Restoration Using Multi-wavelet Transform Algorithm

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2752
Zhuang Wen Wu , Liangrong Zhu
Car reverse image is transmitted by information bus. Because of the bad electromagnetic environment of the engine compartment, car’s information bus sometime will be blocked or not real-time, which can lead to the uncertainty of information transmission, and will cause the risks of security and reliability of the transmitted network. A GHM multi-wavelet is adopted by this paper to restore the interference car reverse image. After balanced processing the GHM multi-wavelet, constant module blind equalization algorithm based on balanced orthogonal multi-wavelet transform (MWTCMA) is used in this paper. Compared with the constant module blind equalization algorithm (CMA) and wavelet transform constant module blind equalization algorithm (WTCMA), results show that MWTCMA can eliminate the multi-wavelet pre-filtering process through multi-wavelet transform on input signal, and improve the convergence speed. The calculation error of MWTCMA is also smaller than the other two methods.DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.2697
Volume: 11
Issue: 10
Page: 6158-6165
Publish at: 2013-10-01

A Modified Particle Swarm Optimization Algorithm

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2759
Jie He , Hui Guo
In optimizing the particle swarm optimization (PSO) that inevitable existence problem of prematurity and the local convergence, this paper base on this aspects is put forward a kind of modified particle swarm optimization algorithm, take the gradient descent method (BP algorithm) as a particle swarm operator embedded in particle swarm algorithm, and at the same time use to attenuation wall (Damping) approach to make fly off the search area of the particles of size remain unchanged and avoid the local optimal solution, with three input XOR problem to testing the improvement of the particle swarm optimization algorithm and the results showed that the improved algorithm not only increase global optimization ability, but also avoid the prematurity, convergence problem. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.2947 
Volume: 11
Issue: 10
Page: 6209-6215
Publish at: 2013-10-01

Multi-walled Carbon Nanotube Film Sensor for Ethanol Gas Detection

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2747
Dongzhi Zhang
Multi-wall carbon nanotubes (MWNTs) film-based sensor on the substrate of printed circuit board (PCB) with interdigital electrodes (IDE) were fabricated using layer-by-layer self-assembly, and the electrical properties of MWNTs film sensor were investigated through establishing models involved with number of self-assembled layers and IDE finger gap, and also its ethanol gas-sensing properties with varying gas concentration are characterized at room temperature.Through comparing with the thermal evaporation method, the experiment results shown that the layer-by-layer self-assembled MWNTs film sensor have a faster response and more sensitive resistance change when exposed to ethanol gas, indicated a prospective application for ethanol gas detection with high performance and low-cost. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.2726
Volume: 11
Issue: 10
Page: 6120-6126
Publish at: 2013-10-01

A Load Balance Routing Algorithm Based on Uneven Clustering

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2702
Liang Yuan , Chuan Cai
Aiming at the problem of uneven load in clustering Wireless Sensor Network (WSN), a kind of load balance routing algorithm based on uneven clustering is proposed to do uneven clustering and calculate optimal number of clustering. This algorithm prevents the number of common node under some certain cluster head from being too large which leads load to be overweight to death through even node clustering. It constructs evaluation function which can better reflect residual energy distribution of nodes and at the same time constructs routing evaluation function between cluster heads which uses MATLAB to do simulation on the performance of this algorithm. Simulation result shows that the routing established by this algorithm effectively improves network’s energy balance and lengthens the life cycle of network. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3403 
Volume: 11
Issue: 10
Page: 5758-5762
Publish at: 2013-10-01

Product Form Identification Technology Based on Cognitive Thinking

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2720
Shutao Zhang , Jianning Su , Chibing Hu , Peng Wang
In this paper, based on the analyzing of the selecting and distinguishing characteristics of cognitive thinking, the product design elements are analyzed with the theories of Kansei Engineering, and the corresponding mathematic model for the analysis is developed based on the quantification-I theory to quantitatively discuss the relationship between product form design elements and the psychological kansei image of the users. With foregoing investigation result, practicable program software has been developed as a solver tool to subsequent design. Finally, a practical application of testing machine is presented, and the results show that the method is reasonable and feasible as well. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3422 
Volume: 11
Issue: 10
Page: 5904-5910
Publish at: 2013-10-01

Efficient Implementation of Decimal Floating Point Adder in FPGA

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2704
Yang Huijing , Yu Fan , Han Dandan
Decimal floating Point adder is one of the most frequent operations used by many financial, business and user-oriented applications but current implementations in FPGAs are very inefficient in terms of both area and latency when compared to binary floating point adder. This paper has shown an efficient implementation of a new parallel decimal floating point module on a reconfigurable platform, which is both area as well as performance optimal. The decimal floating-point Adder was further pipelined into five stages to increase the maximum frequency of operation. The synthesis results for a Stratix IV device indicate that our implementations have 25.1% reduction of the latency and 1.1% reduction of area compared to an existing alter-core adder design, presenting area and delay figures close to those of optimal binary adder trees. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3406 
Volume: 11
Issue: 10
Page: 5774-5781
Publish at: 2013-10-01

An Application of Six Sigma for Improving the Efficiency of Power Supply

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2743
Chang-Hsien Hsu , Pei-Shih Chen , Chun-Ming Yang
Implementing the Six Sigma control method is to use define, measure, analyze, improve and control (DMAIC) framework to improve the process from the beginning, emphasize the process management, reduce the process time, eliminate the defects, and increase the passing rate. The aims of this study is to apply Six Sigma control method with DMAIC framework to shorten the power supply over time in order to enhance the power supply efficiency in T. power company (TPC). The result showed that the power supply over time was reduced from 66% to 30% in the Construction Work Second Section.DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.2910
Volume: 11
Issue: 10
Page: 6087-6094
Publish at: 2013-10-01

Audio Sensing Aid based Wireless Microphone Emulation Attacks Detection

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2722
Wang Shan-shan , Luo Xing-guo , Li Bai-nan
The wireless microphone network is an important PU network for CRN, but there is no effective technology to solve the problem of microphone evaluation attacks. Therefore, this paper propose ASA algorithm, which utilizes three devices to detect MUs, and they are loudspeaker audio sensor (LAS), environment audio sensor (EAS), and radio frequency fingerprint detector (RFFD). LASs are installed near loudspeakers, which have two main effects: One is to sense loudspeakers’ output, and the other is to broadcast warning information to all SUs through the common control channel when detecting valid output. EASs are pocket voice captures provided to SU, and utilized to sense loudspeaker sound at SU’s location. Utilizing EASs and energy detections in SU can detect primary user emulation attack (PUEA) fast. But to acquire the information of attacked channels, we need explore RFFDs to analyze the features of PU transmitters. The results show that the proposed algorithm can detect PUEA well. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3424 
Volume: 11
Issue: 10
Page: 5917-5928
Publish at: 2013-10-01

Energy Transfer by Resonance Coupling

https://ijece.iaescore.com/index.php/IJECE/article/view/5415
Heinz Zenkner , Werachet Khan-Ngern
This paper presents the research work focusing on the possibility to transmit power with a high power densitiy and a high efficiency. The applications of power supply require a smaller size, lower weight with a good energy on-board management. This work shows not only the possibility of wireless power transfer, but also the biological effect is taken into account for the safety precaution of human use. The system is described and set up using the resonance coupling effect and impedance adaption for multi-stage conversion. The transmitting power up to 180W is applied at a frequency of 6.78 MHz across a gap in the range between 30 mm to 80 mm. The experimental results show that the maximum efficiency up to 88 % has been achieved. The maximum transmitted power density reaches up to 0.14 W/mm2. High power can be transmitted using resonant coupling with high efficiency. Coupling coil characteristics significantly affect wireless power system losses. High power density of the active areas can be in the high range of 0.14 W/mm2. Resonance coupling can be applied in short range applications keeping EMC and EMF restrictions.DOI:http://dx.doi.org/10.11591/ijece.v3i5.3938
Volume: 3
Issue: 5
Page: 668-682
Publish at: 2013-10-01

A Method for Detecting and Blocking Instant Messaging Software

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2693
Hao Zhang , Guangli Xu , Jiongzhao Yang , Jianmin Li
Instant messaging software, as a convenient network communication tool, is becoming more and more popular. At the same time, it also brings risks in security of local area network (LAN). Through studying in typical instant messaging software and detected by the combination of misuse detection and protocol analysis, an architecture of detecting and blocking mechanism of instant messaging software is proposed in this paper and its prototype system is achieved on Windows platform. This new system effectively solves the problems that the efficiency of traditional firewall application layer data filtering is low and the firewall cannot dynamically adjust the filtering rules, providing a good application value for the protection of the security of local area network. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3394 
Volume: 11
Issue: 10
Page: 5684-5693
Publish at: 2013-10-01

The Evolution of Dual-Wavelength Dissipative Soliton in Yb-Doped Fiber Lasers

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2745
Yanyan Zhang , Qiang Li
Dual-wavelength dissipation soliton (DS) in the all-normal-dispersion ytterbium-doped fiber laser (YDFL) is reported. Using a phase-shift long period fiber grating (PS-LPFG) as an all-fiber format spectral filter in the laser cavity, self-starting dual-wavelength pulses are obtained by nonlinear polarization evolution (NPE). The mode-locking mechanism of the ANDi cavity with different central wavelengths has analyzed. Experimental results show that the NPE together with the PS-LPFG play key roles in the generation of the dual-wavelength, meanwhile, a switchable dual-wavelength mode-locked fiber laser can achieve through change the polarization of the cavity. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.2961
Volume: 11
Issue: 10
Page: 6105-6110
Publish at: 2013-10-01

Application of ERPs to Evaluation of Clothing Comfort through physiological signals

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2682
LIU Yunjuan , CHEN Dongsheng
Based on analyzing domestic and foreign literatures concerning event-related potential research, this paper analyses the theory of comfort of wearing by using ERPs. This paper makes a summary of what comfort evaluation for wearing using ERPs, Finally propose the research direction in this domain of identifying from EEG the nerve reflection related to special feeling and neurocognitive events, for the purpose of using impersonal metrics to evaluate subjective feelings of clothing comfort and then provide a new method for designing clothing to be more comfortable. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3345 
Volume: 11
Issue: 10
Page: 5594-5599
Publish at: 2013-10-01
Show 1468 of 1579

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration