Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

23,675 Article Results

Micro Device Modeling Method and Design for Manufacturability

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2522
Zheng Liu , Bo Sun
The micro device designing flow begins with the mask design currently, which is not intuitive for designer and sometime made them confused. As a result, the manufacturability is hard to prove in advance with the traditional designing way. Especially for surface micro-machined device with multiple structural layers, the 2D mask design cannot ensure the fabrication of complex 3D device with high yields reliably. The rise of structural designing strategies gave a direction to change the traditional habit. On the other hand, the top-down method provides the advanced designing flow, which begins with the system level design. However, there still some key technologies to study further because of the novel design procedure. To improve the manufacturability of micro device, the designing flow based on design for manufacturability methodology is presented, which draw on the advantages and experience of the mechanical design method. The key technologies on the structural design level, the processes planning level and the fabricating level are introduced correspondingly. In addition, we present the framework to implement the method. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3081 
Volume: 11
Issue: 8
Page: 4572-4579
Publish at: 2013-08-01

Design of the Temperature Control System with the MicroLogix

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2533
Sui Tao , Sun Fanchao , Li Lijun , Liu Ruijuan , Qi Ranran
The design and verification of accurate temperature control system of the oven with the small or middle scale programmable logic controller (PLC) base on the dahlin algorithm is introduced. The design can achieve accurate control to the pure lag system and regulate the other logic control form the same controller. The system is cost-effective on the specific modular or instrument for the complex computing in some automatic device. Meanwhile, the design is computed and simulated by the matlab softwear for verifying the implementation. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3101 
Volume: 11
Issue: 8
Page: 4651-4655
Publish at: 2013-08-01

Exploration of Experiment Teaching Reform Guided by the Engineering Education Philosophy

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2555
Huichun Huang , Guoliang Du , Renjie Hu
In order to make the electronic design contest and reform of experiment teaching to support and promote each other and improve students' practical and innovative ability, the paper analyzed the requirements on the students' ability of comprehensive knowledge application and practice by NUEDC, and the deficiencies of the depth and scope of electronic information professional practice curriculum. Use the issues-based, project-based and case-based engineering education philosophy and teaching methods as orientation. The way of practice teaching reform and the effect of the reform from six aspects are also discussed: the construction of hierarchy practice teaching system, the seminar and the optimizing of teaching content, the engineering teaching method, the experimental teaching environment and full control of network-assisted teaching platform. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3144  
Volume: 11
Issue: 8
Page: 4810-4816
Publish at: 2013-08-01

Satellite Communication and Navigation Integrated Signal

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2492
Junxia Cui , Huli Shi
Under the rapid development of satellite communication systems and satellite navigation systems, there is an urgent need to combine the two together in order to achieve location-based services, etc. Despite the long relationship history of navigation and communication, the two satellite systems are basically independent of each other. As a result, terminal size tends to be relatively large, and difficult to be miniaturized. This article puts forward a novel idea that satellite navigation and satellite communication functions are integrated together in the signal level, and gives four types of the integrated navigation and communication signal structures which are composed of message, spreading code and carrier. It lays a technical foundation for the in-depth development of the integration of navigation and communication systems in signal level. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3034   
Volume: 11
Issue: 8
Page: 4351-4356
Publish at: 2013-08-01

A Privacy Data-Oriented Hierarchical MapReduce Programming Model

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2524
Haiwen Han , Weiping Zheng
To realize privacy data protection efficiently in hybrid cloud service, a hierarchical control architecture based multi-cluster MapReduce programming model (the Hierarchical MapReduce Model,HMR) is presented. Under this hierarchical control architecture,  data isolation and placement among private cloud and public clouds according to the data privacy characteristic is implemented by the control center in private cloud.  And then, to perform the corresponding distributed parallel computation correctly under the multi-clusters mode that is different to the conventional single-cluster mode, the Map-Reduce-GlobalReduce three stage scheduling process is designed. Limiting the computation about privacy data in private cloud while outsourcing the computation about non-privacy data to public clouds as much as possible, HMR reaches the performance of both security and low cost. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3083 
Volume: 11
Issue: 8
Page: 4587-4593
Publish at: 2013-08-01

Research of Graph Compression in Information Storage

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2494
Haitang Wang
In the information storage, the image is often encountered, but the image storage and analysis are very complex, in order to more save memory space and more be used as a compressed representation of a graph, we give a new definition in the paper. We show some properties and give the lower integral sum number of some graph. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3036 
Volume: 11
Issue: 8
Page: 4367-4371
Publish at: 2013-08-01

Fast Unbalanced Three-phase Adjustment Base on Single-phase Load Switching

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2489
Yanwei Zheng , Lisheng Zou , Jian He , Yongyi Su , Zhiquan Feng
To balance three-phase loads in distribution network with abundant of single-phase loads, a new wiring method and three-phase loads adjustment policy was proposed in this paper. In the wiring method, a single-phase load was connected with phase A, B and C of trunk line by a controller. When the load of trunk line was unbalanced, the controller will switch the connected single-phase loads from one phase to another to balance it. The minimum count of loads adjustment algorithm and the most balance adjustment algorithm were proposed, which can adjust the three-phase load of trunk line to roughly balance automatically. This method can solve the serious three-phase unbalance problems of the trunk lines with aboundant of single-phase loads. It may instead of capacitive compensation in low voltage distribution network to improve power quality and reduce network losses. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3031 
Volume: 11
Issue: 8
Page: 4327-4334
Publish at: 2013-08-01

Segmentation, Clustering and Timing Relationship Analysis of MANET Traffic Flow

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2556
Huijun Chang , Hong Shan , Tao Ma
Users in mobile Ad Hoc networks (MANET) usually encrypt their data packets to resist the evasdroppers, which makes the network management and Intrution detection difficult. However, user behavior, ultimately displayed as traffic flow, shows regularity along time. This paper aims to study the regularity through studding the timing relationship between traffic flows, whose results provide the technical support for user behavior analysis. First, segment the end-to-end flows based on the information of time intervals and packet lengths. Second, cluster the segments by an improved maximum-distance method. Third, analyze the time relationship between the clusters, i.e., traffic flow types, based on the clustering results. Simulation results verify the effectiveness of the method. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3145 
Volume: 11
Issue: 8
Page: 4817-4823
Publish at: 2013-08-01

Detection Parameters Design for Compound Survey Seafloor Targets by Multibeam Sonar

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2487
Li Hong Wu , Wen Hai Xu , Yi Ping Li
Swath bathymetry system surveys with wide swath, high location resolution, and is used to detect sea bottom terrain. But the object resolution detected decreases as the depth increasing, its data processing with high mistake, used rarely in sea floor object survey.So GeoSwath, a multibeam sonar does. Although it covers an angular range of -120°to 120 °from the vertical direction, providing high density and high quality bathymetry data along with side scan like amplitude imagery, the data processing is more relied on human intervention to get accurate depth contour and sonar image which prevent its propular use in survey of seafloor targets. The purpose of this article presents survey parameter setting during survey and data processing technique to survey seafloor target by GeoSwath system, which set the proper detect parameters including ping length, ship velocity to increase the points over targets, setting navigation line parallel to the maximum dimension of target during survey, adopting appropriate filter to depth data processing and using TVG control over amplitude data to get accurate depth grid and sonar image of seafloor target. Finally, the way is used to measure the artificial object in harbor and two ship wrecks at sea, compound with the sonar image taken by the forward looking sonar, to search the ship wreck near harbor, to help to recognize the targets and locates its real position. This technology improves GeoSwath survey capability with compound detection and is helpful for make precise map for waterway. Also this work is helpful to achieve detecting seafloor objects fast, accurately, effectively in underwater large scale area during salvation and rescue task. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3029
Volume: 11
Issue: 8
Page: 4306-4316
Publish at: 2013-08-01

Optimization Design of Shovel Depth when Loader Shovelling Original Raw Soil

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2531
Xu Lichao , Ge Ruhai
The shovel depth generally references to the depth of material pile operation, or according to operators’ experiences to determine the depth while loader shovelling original raw soil. In view of this situation, the relationship between the shovel depth of loader bucket and shovel resistance is analyzed in this paper, and a mathematical model is constructed for calculating the time of the material filling up the bucket. Taking ZL50 loader as an example, and combined with the relationship curve of the bucket work resistance and the shovel depth, and the traction characteristic curve of I gear, the relationship of the driving speed and shovel depth is worked out, on the basis of this, the mathematical model of optimization algorithm of the shovel depth is established. The result shows that there is an optimal shovel depth when loader shovelling original raw soil, while the operation efficiency of loader is the highest, and there is a best operation depth range of loader shovel, in which work efficiency of loader changes a little, this will bring great convenience to the operation for the driver. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3090
Volume: 11
Issue: 8
Page: 4639-4645
Publish at: 2013-08-01

Color Distortion of Digital Image and its Detection

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2521
Xia Yanhui , Wang Zhengyou , Wang Wan , Wang Jin , Wan Zheng
To solve the problem of color distortion in the communication and reproduction process, the paper firstly analyzes the causes of the color distortion phenomenon. Then, the paper proposes the corresponding image color distortion detection algorithm based on the HSI color model. In the proposed method, the color image is transformed from RGB space to HSI space firstly; in HSI space, the reference image and the distortion image’s hue differences and saturation differences are calculated. Experimental results on LIVE images show that the measured results of the model with subjective scoring after the nonlinear fit the correlation coefficient up to 0.95.DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3080
Volume: 11
Issue: 8
Page: 4565-4571
Publish at: 2013-08-01

Simulation for Upgrade Scheme Optimization of Campus Network

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2482
Zhu Kaiyu , Gao Xuefei , An Yongli , Liu Jiayu
As a new network planning and design technique, the network simulation provides the objective and reliable reference for the network design, the network expansion, upgrade and optimization, thus the science of decision-making in network building is promoted. In this paper, we simulated campus users’ online behavior and actual network equipment operation by using OPNET, and carried on the simulation to the different scale and the different structure network, which obtained a group of simulation results. According to link utilization and end-to-end delay and other simulation results, we have analyzed the issue of influence campus network performance for designing the best network configuration, which has the important reference value for the planning and construction of the campus network. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3024 
Volume: 11
Issue: 8
Page: 4267-4272
Publish at: 2013-08-01

Uniform Error Bounds for Reconstruct Functions from Weighted Bernstein Class

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2519
Peixin Ye , Yongjie HAN
Errors appear when the Shannon sampling series is applied to reconstruct a signal in practice. This is because the sampled values may not be exact, or the sampling series may have to be truncated. In this paper, we study errors in truncated sampling series with localized sampling for band-limited functions from weighted Bernstein class. And we apply these results to some practical examples. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3078
Volume: 11
Issue: 8
Page: 4548-4555
Publish at: 2013-08-01

Frequent Itemsets Mining Based on Concept Lattice and Sliding Window

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2551
Zhang Chang-sheng , Ruan Jing , Huang Hai-long , Li Long-chang , Yang Bing-ru
In this paper, a frequent itemsets mining algorithm of data stream based on concept lattice and sliding window is presented. This algorithm mines frequent concepts for new inflowing basic window in batches in a sliding window and generates concept lattice Hasse diagram. With introduction into small support degreeand error factorto do the pruning operations for non-frequent concept node, each connection point in the Hasse diagram contains the information of frequent itemsets and support degree. As the generation of Hasse diagram in the new basic windows, we integrate concept lattice vertically with the generated Hasse diagram and sliding window, and ultimately output all frequent itemsets through scanning all the graph nodes of Hasse diagram graph. The experimental results show that the proposed algorithm has a good performance. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3140 
Volume: 11
Issue: 8
Page: 4780-4787
Publish at: 2013-08-01

A Watermarking Method Based on Optimization Statistics

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2553
Xiuhu Tan , Defa Hu
This paper presents a robust image watermarking scheme based on optimization Statistics. This method aims to select a feature space, which has the greatest robustness against various attacks after watermarked. We separately obtain the feature spaces through calculating the statistical property of the digital image. Passing spaces decomposing and reconstructing of the feature spaces, constructing the embedding matrix, we obtain that the robustness of the approach lies in hiding a watermark in the subspace that is the least susceptible to potential modification; and realize the optimization statistics of the embedding watermark. Through analysis and constraint the conditions of subspace, the algorithm we proposed can obtain a high detection probability and security, a low false alarm probability. Experimental results show that the proposed scheme is robust against a kind of attacks. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3142
Volume: 11
Issue: 8
Page: 4794-4802
Publish at: 2013-08-01
Show 1485 of 1579

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration