Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

23,598 Article Results

Digital Image Watermarking in Wavelet Domain

https://ijece.iaescore.com/index.php/IJECE/article/view/5486
Hitendra Suryavanshi , Amit Mishra , Shiv Kumar
Internet allows individuals to share the information.  The shared information is like text, image, audio and video files.  This information sharing results in some problems such as copyright violation, unauthorized use of documents. Such problems can be solved by using a technique called as digital watermarking. This paper presents different aspects of watermarking and how it is useful for intellectual property protection on internet.DOI:http://dx.doi.org/10.11591/ijece.v3i1.1745
Volume: 3
Issue: 1
Page: 1-6
Publish at: 2013-02-01

An IOT Security Risk Autonomic Assessment Algorithm

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2033
Ruijuan Zheng , Mingchuan Zhang , Qingtao Wu , Chunlei Yang , Wangyang Wei , Dan Zhang , Zhengchao Ma
In terms of Internet of Things (IOT) system with the possibility criterion of fuzziness and randomness security risk, we qualitatively analyze the security risk level of IOT security scene by describing generalization metrics the potential impact and likelihood of occurrence of every major threat scenarios. On this basis, we proposed self-assessment algorithm of IOT security risk, adopting three-dimensional normal cloud model integrated consideration of risk indicators, researching the multi-rule mapping relationship between the qualitative input of safety indicators and the quantitative reasoning of self-assessment. Finally, we build security risk assessment simulation platform, and verify the validity and accuracy of the algorithm in the premise of substantiating the risk level and the safety criterion domain. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2030
Volume: 11
Issue: 2
Page: 819-826
Publish at: 2013-02-01

Study on the Error Transfer of Articulated Arm Coordinate Measuring Machines

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2009
Guanbin Gao , Wen Wang , Jianjun Zhou
The articulated arm coordinate measuring machine (AACMM) is a new type coordinate measuring machine (CMM) base on the linkage structure. The kinematic model of a 6-DOF AACMM with DH method was established, and from the kinematic model the coordinate systems and joint structural parameters of the AACMM are obtained. The Jacobian matrix was deduced by differential transformation from the kinematic model of the AACMM, and according to the Jacobian matrix, the error transfer coefficients of the joint structural parameters were calculated. Then with the calculation results the influence of the joint structural parameters on the measuring accuracy of the AACMM was analyzed, which provides a theoretical basis for calibration, tolerance distribution of the joint parts and components' selection of the AACMM. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.1987
Volume: 11
Issue: 2
Page: 637-641
Publish at: 2013-02-01

The Application Research of Randomized Network Coding in ForCES Router

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2027
Ming Gao , ShiJu Li , Bangzhi Xiao
ForCES router(ForTER) is an open experimental platform for network research of new routing algorithm,packet processing which is based on ForCES. By introducing and designing six new LFBs to ForTER, this paper propose a method of implementation of multicast IP router with network coding enabled. These LFBs undertake coding functions such as packets’ coding, labeling, buffering and decoding. We build an IP multicast network with ForTERs, which including the classic shortest path tree constructed by the reverse path from the source node to each sink ,then evaluate the completeness of throughput , performance overhead and CPU utilization. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2005
Volume: 11
Issue: 2
Page: 774-782
Publish at: 2013-02-01

A New Methodology for Allocation of Stabilizers in Uncontrollable poles of multi-machine power systems

https://ijece.iaescore.com/index.php/IJECE/article/view/5491
Nadali Gharahajilo , Hamid Lesani , Mahmood Fotuhi
One of the main problems in power systems is dynamic stability and damping of Electromechanical  oscillations which for this reason power system stabilizers are being used and the method for determining the location of stabilizer for the purpose of damping critical modes, is using participation factors, in which controllability and observability of modes have influence. The real value or the amplitude of participation factor is usually used as evaluation criterion, while in case that the real values of participation factors are close, the imaginary part of these coefficients are also influential, and if the imaginary part of coefficients are either negative or positive, different results will be obtained. The method introduced in this paper, in modes that the value of participation factors are close to each other, priority for the placement of generator, installation of stabilizer and the optimum value for the stabilizer's gain, is very accurate and appropriate.DOI:http://dx.doi.org/10.11591/ijece.v3i1.1835
Volume: 3
Issue: 1
Page: 42-51
Publish at: 2013-02-01

A Method for Public Parking Facilities Operation Condition Evaluation and Supply Scale Forecasting

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2059
Wang Yang , Wang Li-Juan , Wang Fan , Huang Lin
Based on the traditional  trip attraction model, a new method of operation condition evaluation and supply scale forecasting for public parking facilities is proposed. It begins with the operation condition investigation of existing parking facilities, and then analyzes qualitatively the existing parking facilities supply scale by four indexes. finally, it can calculate the supply scale in predict year. Combined with concrete work of urban parking facilities planning in china, the evaluation index and prediction model were applied, and the parking facilities operation condition, demand, supply scale and internal structure are analyzed deeply. The method proposed in the paper can provide the theory basis for the public parking facilities planning in other cities. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2069
Volume: 11
Issue: 2
Page: 1018-1023
Publish at: 2013-02-01

Analysis of Interlayer Connection Catastrophe Characteristics in Internet AS level Topology

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2000
Bo Yang , Hai Zhao , Jun Zhang , Jun Ai , Si-yuan Jia , Xin Ge , Wei Liu
Based on CAIDA’s (cooperative association for Internet data analysis) statistics at AS-level collected from April 2009 to April 2010, it is found that network size, degree correlations and clustering have changed significantly three times. According to the definition of k-core, the Internet topology is divided into different levels. In this paper, by analyzing the changing connection on each level at the three time spots, we found that the connection difference between the highest and the lowest level varies cyclically. Before Internet has significant change, the connection difference between the highest and the lowest shell changes acutely. At that time point it is the later stage of the fluctuation period which is the accumulation of small fluctuation. The concept of catastrophe coefficient is proposed for quantifying the probability of Internet catastrophe so that the catastrophe coefficient of Internet could be calculated on real time, and the catastrophe time spots could be predicted. Using real data for verification, it turns out that catastrophe coefficient can accurately predict the "giant fluctuations" occurrence in the macroscopic structure. With the proposal of the concept of catastrophe coefficient, the research can play an important guiding role in understanding the actual network internal development and changes, analyzing the cause of Internet catastrophe, preventing devastating catastrophe, planning and further re-designing Ipv6. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.1978
Volume: 11
Issue: 2
Page: 567-576
Publish at: 2013-02-01

An Efficient Dorsal Hand Vein Recognition Based on Firefly Algorithm

https://ijece.iaescore.com/index.php/IJECE/article/view/5490
Zahra Honarpisheh , Karim Faez
Biometric technology is an efficient personal authentication andidentification technique. As one of the main-stream branches, dorsal handvein recognition has been recently attracted the attention of researchers. It is more preferable than the other types of biometrics becuse it’s impossible to steal or counterfeit the patterns and the pattern of the vessels of back of the hand is fixed and unique with repeatable biometric features. Also, the recent researches have been obtained no certain recognition rate yet becuse of the noises in the imaging patterns, and impossibility of Dimension reducing because of the non-complexity of the models, and proof of correctness of identification is required. Therefore, in this paper, first, the images of blood vessels on back of the hands of people is analysed, and after pre-processing of images and feature extraction (in the intersection between the vessels) we began to identify people using firefly clustering algorithms. This identification is done based on the distance patterns between crossing vessels and their matching place. The identification will be done based on the classification of each part of NCUT data set and it consisting of 2040 dorsal hand vein images. High speed in patterns recognition and less computation are the advantages of this method. The recognition rate of this method ismore accurate and the error is less than one percent. At the end thecorrectness percentage of this method (CLU-D-F-A) for identification iscompared with other various algorithms, and the superiority of the proposed method is proved.DOI:http://dx.doi.org/10.11591/ijece.v3i1.1760
Volume: 3
Issue: 1
Page: 30-41
Publish at: 2013-02-01

An Improved Public Key Encryption Algorithm Based on Chebyshev Polynomials

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2038
Jinhui Sun , Geng Zhao , Xufei Li
This paper proposes an improved public key encryption algorithm based on Chebyshev polynomials. On the base of the semi-group property of Chebyshev polynomials, we import the alternative multiply coefficientto forge the ciphertext tactfully which can make the cipher text-only aattack out of work. The chosen of is decided by the the value of, and the number of can be chosen as required. Besides, The digital signature of the ciphertext not only can prevent the result from faking and tampering attack, but also  can make the algorithm have the function of identity authentication. Experimental results and performance analyses show that the improved algorithm has much higher security and practical value. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2035
Volume: 11
Issue: 2
Page: 864-870
Publish at: 2013-02-01

Mechanical Behavior of MTMoCr under High Temperature and High Strain-rate

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2054
Jingkui Ruan , Zhengwei Dong
MTMoCr is a kind of Mo-Cr alloy cast iron often used to make automobile panel dies. To study high-speed machining process of automobile panel dies, the material’s elastic modulus and rupture critical values of MTMoCr at 20℃-800℃ were studied based on the high temperature elongation test. The material’s stress-strain diagram at various temperatures set-points (20℃-500℃) and various strain-rates (500/s-5000/s) were studied and the dynamic tensile yield strength values were obtained by dynamic SHPB (Split Hopkinson Pressure Bar) high-speed compression test. The experimental results indicate that MTMoCr has heat resistance and its behavior is between toughness and brittleness materials. Its toughness is enhanced with temperature increasing. The strain-rate strengthening effect prevails over temperature softening effect. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2064
Volume: 11
Issue: 2
Page: 985-990
Publish at: 2013-02-01

Study of high indium InXGa1-XN alloys with synchrotron radiation

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2043
Wei Zheng , Zhe Chuan Feng , Rui Sheng Zheng , Hao-Hsiung Lin , Xin Qiang Wang , Ting-Shan Chan , Ling-Yun Jang , Chee Wee Liu
InGaN thin films with near entire indium composition range have been successfully grown on GaN/sapphire (0001) by molecular beam epitaxy (MBE). X-ray absorption fine structure  have been used to study the local structure of some typical InxGa1-xN alloys with high indium (In) composition of x=0.78 and 0.86. A detailed analysis of the extended x-ray absorption fine structure of In K-edge by using the IFEFFIT program, and the chemical bonds of In-N are obtained. The x-ray absorption near-edge structure of In K- and L-edge and N K-edge are investigated, and the electronic structure of InxGa1-xN are determined with these high In content InxGa1-xN ternary compounds. The calculated XANES spectra of N K-edge, based on first principle method, are consistent with the observed spectra. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2050
Volume: 11
Issue: 2
Page: 906-912
Publish at: 2013-02-01

Deviation Control Theory and Strategy in Aluminum Hot Rolling

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2045
Fu Zhuo , Liu Yilun , Ma Liyong
Real-time detection and tracking of moving pedestrians in image sequences is a fundamental task in many computation vision applications such as automated visual surveillance system. In this paper we propose a human detection method based on foreground segmentation, and the detection speed is satisfying for the application of video surveillance. During detection, unlike the exhaustive scan typically used in general human detection systems, in order to avoid scanning regions like the sky, the foreground segmentation stage is firstly implemented in the video surveillance sequences by utilizing Gaussian mixture model algorithm, and then, human detection stage is executed on the regions of interest (ROI) extracted from the video surveillance sequence frame. In contrast with the exhaustive scan without explicit segmentation, our proposed approach can meet the real-time requirement. Carefully designed experiments demonstrate the superiority of our proposed approach. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2053
Volume: 11
Issue: 2
Page: 918-925
Publish at: 2013-02-01

An approach for Briefest Rules Extraction Based On Compact Dependencies

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2048
Yang Kai , Jin Yong-long , He Zhi-jun , Ma Yuan
Concept lattice is an effective tool for knowledge representation and data analysis. It have been successfully applied to many fields. This paper illustrates the theory of compact dependencies in concept lattice, then study an approach for briefest rules extraction based on compact dependencies, including briefest decision rules and briefest association rules with confidence of 1. Finally, the method is applied to the example and the relationship between many process parameters and aim parameters,as well as process parameters and other process parameters, are discussed. It provides a useful decision support tool for advanced production management and increases the ability of the decision, which accomplished the validity of the enterprises. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2057
Volume: 11
Issue: 2
Page: 941-947
Publish at: 2013-02-01

Fast Distance Protection for Proximal Fault of EHV Transmission Line

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2006
Li Zhenkun , Ji Hui , Fu Yang
As the full length is considered in the traditional EHV line protection, proximal circuit fault can’t be moved in an ideal short time. A fast distance protection algorithm for proximal fault of EHV transmission line is proposed in the paper. Based on differential equation model and power frequency variation principle, the method has fast response speed and small workload. And the protection for proximal fault of long distance EHV transmission lines can be correctly implemented in a very short time. The method is realized with a low pass prefilter and without digital filter. Finally, through the RTDS simulation platform, a variety of fault modes of 500kV transmission lines is realized, and the accuracy and rapidity of the algorithm is verified by the simulation result. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.1984
Volume: 11
Issue: 2
Page: 615-622
Publish at: 2013-02-01

Desynchronization Attacks on RFID Security Protocols

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2015
Miaolei Deng , Weijun Zhu
The characteristics of radio frequency identification (RFID) systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al. and Habibi et al. respectively form the security viewpoint of data desynchronization attack. These lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand spaces model, data desynchronization attacks on these protocols were analyzed and described. Furthermore, improvements to overcome the security vulnerabilities of two protocols presented by Niu et al. and Fu et al. were given.  DOI:http://dx.doi.org/10.11591/telkomnika.v11i2.1993 
Volume: 11
Issue: 2
Page: 681-688
Publish at: 2013-02-01
Show 1522 of 1574

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration