Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

The Implementation of Henon Map Algorithm for Digital Image Encryption

10.12928/telkomnika.v12i3.83
Edi; Universitas Gunadarma Sukirman , Suryadi; Universitas Indonesia MT , M. Agus; Universitas Gunadarma Mubarak
Security information is a very important aspect that must be noticed. Information not only in the form of text but also in form of data image. Using data encription to send private information have been widely use. But still need to improve the endurance from bruto force attack. One ways to improve it, is by using chaos theory with henom algorithm. Test result gave the alghoritm can encrypt image data from grayscale type to colorfull type. Encryption and descryption time proportional to the size image. Composition and variety coulor doesn’t effect the time. This algorithm has key space of  and key sensitivity up to . So, it can be concluded that, the algorithm is very difficult to be cracked by brute force attack.
Volume: 12
Issue: 3
Page: 651-656
Publish at: 2014-09-01

Research on Keyhole Diameter’s Vision Measurement Based on Parallel Technology

10.12928/telkomnika.v12i3.108
Zhang; North University of China Chuan-chuan , Zeng; North University of China Zhi-qiang , Wang; North University of China Jun-yuan , Du; North University of China Wen-hua
A keyhole diameter of the cartridge’s measurement based on machine vision is a part of the cartridge’s geometry measurement system, according to the system requirements, to complete the measurement within 5 seconds. A Image Collection System was constructed using computer, CCD camera, LED source, meanwhile a measurement system was compiled by C# on VS2010 platform based on machine vision. Use the Otsu algorithm to extracts the keyhole’s edge and near the pixels in order to reduce the computational Canny operator, and use parallel computing in the Canny operator to improve computing speed purposes. Use QueryPerformanceCounter timer for each module timing Canny operator, Canny operator improved computation time is reduced from the original 6s to nearly a hundred ms improved. Meet the time requirements of cartridge geometry measurement system, and other machine vision in which the project can be widely used.
Volume: 12
Issue: 3
Page: 683-688
Publish at: 2014-09-01

Research on the Regenerative Braking Control Strategy Considering Battery/Motor/CVT Joint High Efficiency for CVT Hybrid Electric Vehicle

10.11591/ijeecs.v12.i9.pp6673-6681
Tao Deng , Chunsong Lin , Bin Chen
The traditional regenerative braking control strategies for hybrid electric vehicle just only considers to ensure motor to work along with the battery/motor joint optimal efficiency curve, but not consider CVT efficiency, yet in fact that the CVT efficiency varies with the operating condition between 70% and 95% variation and can not be neglected. Based on the analysis of the relationship among the synthesis efficiency and the efficiency of the NiMH battery, ISG motor and CVT, the battery/motor/CVT joint high efficiency are calculated, then the joint high efficiency optimum working curve is drawn, finally the regenerative braking control strategy adopted with the joint high efficiency optimum working curve is proposed. Compared to the offline simulation and HIL test results adopted with the battery/motor joint high efficiency optimum working curve, the motor average generating efficiency increases by 2.23%, braking energy recovery rate increases by 4.09% through offline simulation, and the average generating efficiency increases by 1.13% through HILS test. Both results show that the proposed regenerative braking control strategy can realize the battery, motor and CVT to work with joint high efficiency which fatherly enhances braking energy recovery rate under guaranteeing entire vehicle braking security condition.
Volume: 12
Issue: 9
Page: 6673-6681
Publish at: 2014-09-01

A Different Single-Phase Hybrid Five-Level Voltage-Source Inverter Using DC-Voltage Modules

10.12928/telkomnika.v12i3.78
Suroso; Universitas Jenderal Soedirman Suroso , Agung; Universitas Jenderal Soedirman Mubyarto , Toshihiko; Shizuoka University Noguchi
This paper presents another circuit configuration of single-phase hybrid five-level voltage-source inverter obtained from the H-bridge inverter and DC-voltage modules. Some features are achieved by using the proposed inverter configuration such as its modular structure and minimum number of the power devices required to construct the inverter circuits. The proposed five-level inverter circuit is examined through computer simulation using PSIM software. Furthermore, laboratory experimental tests were also performed to verify the prototype of the proposed five-level inverter circuits. The computer simulation and experimental test results shows that the proposed hybrid five-level voltage source inverter works properly to generate a five-level voltage waveform and sinusoidal current with low harmonics contents.
Volume: 12
Issue: 3
Page: 557-562
Publish at: 2014-09-01

Enhanced Camera Calibration for Machine Vision using OpenCV

10.11591/ijai.v3.i3.pp136-144
Shubham Rohan Asthana
In several machine vision applications, a fundamental step is to precisely determine the relation between the image of the object and its physical dimension by performing a calibration process. The aim is to devise an enhanced mechanism for camera calibration in order to improve the already existing methods in OpenCV. A good calibration is important when we need to reconstruct a world model or interact with the world as in case of robot, hand-eye coordination. In order to meet the rising demands for higher accuracy various calibration techniques have been developed but they are unable in obtaining precise results. In this paper we propose an enhanced camera calibration procedure using a special grid pattern of concentric circles with special markers. The overall objective is to minimize the re-projection for good camera calibration.
Volume: 3
Issue: 3
Page: 136-144
Publish at: 2014-09-01

Automatic Visual Inspection Reconfigurable Model of Piston Assembly Based on Extentics

10.11591/ijeecs.v12.i9.pp6984-6992
Jili Lu , Mingxing Lin , Fenghua Ding , Qingdong Wang
As a visual inspection system can’t meet all the testing demands of various types of piston assembly, a visual inspection reconfigurable model for piston assembly was designed. A five-layer gray box model was established based on analyzing the process of visual inspection, and expressed by extension element; On this basis, a foundation scheme library was made using extension transform and generation strategy; The optical scheme was evaluated and chose by Analytic Hierarchy Process (AHP).This model can realize reconfigurable visual inspection automatically, improve the adaptability of visual inspection, solve the contradictions between custom requirements and existing condition, time and production cost .
Volume: 12
Issue: 9
Page: 6984-6992
Publish at: 2014-09-01

Applying Ontology and VSM for Similarity Measure of Test Questions

10.11591/ijeecs.v12.i9.pp6932-6939
Jing Yu , Dongmei Li , Shudong Hao , Jiajia Hou , Jianxin Wang
Vector space model (VSM) is a common method for measuring test questions similarity in large-scale item bank system. VSM is limited in accurately representing the knowledge relationship and the potential semantic relations of different characteristic words, hence this paper proposes a method of test questions similarity measure called OVSM-TQSM which combines domain ontology and VSM. OVSM-TQSM can reveal the intrinsic relationship among words by using the constructed domain ontology which integrates with the tree structure and the graphics structure. Incorporated with eigenvectors and the weight of words in VSM, OVSM-TQSM calculates the similarity of test questions. A large number of experimental results demonstrate that the novel approach is feasible and effective. Comparing with the traditional method based on VSM, OVSM-TQSM has the advantages of higher accuracy and little unnecessary laborious pre-processing.
Volume: 12
Issue: 9
Page: 6932-6939
Publish at: 2014-09-01

Hybrid Model of Automated Anaphora Resolution

10.11591/ijai.v3.i3.pp105-111
Kalyani Pradiprao Kamune , Avinash Agrawal
Anaphora resolution has proven to be a very difficult problem of natural language processing, and it is useful in discourse analysis, language understanding and processing, information exaction, machine translation and many more. This paper represents a system that instead of using a monolithic architecture for resolving anaphora, use the hybrid model which combines the constraint-based and preferences-based architectures, each uses a different source of knowledge, and proves effective on theoretical and computational basis. An algorithm identifies both inter-sentential and intra-sentential antecedents of “Third person pronoun anaphors”, “Pleonastic it”, and “Lexical noun phrase anaphora”. The algorithm use Charniak parser (parser05Aug16) as an associated tool, and it relays on the output generated by it. Salience measures derived from parse tree, in order to find out accurate antecedents from the list of potential antecedents. We have tested the system extensively on 'Reuters Newspaper corpus'.
Volume: 3
Issue: 3
Page: 105-111
Publish at: 2014-09-01

A Cooperative Time Synchronization Protocol for Wireless Sensor Networks

10.11591/ijeecs.v12.i9.pp6874-6883
Min Li , Guoqiang Zheng , Jishun Li , Lei Fu
The synchronous precision of synchronization protocol is low and the scalability is limited strictly in large scale wireless sensor networks (WSNs).Considering the issue, a novel cooperative time synchronization protocol based on pulse-coupled oscillators and distributed diffusion (CTSP) is proposed in this paper. The protocol works in two phases:clock tick synchronization phase and time synchronization phase.In the clock tick synchronization phase, the phases of the pulse-coupled oscillators is changed by the pulse coupled signal of the SINK node. The tick synchronization of all nodes is achieved by distributed diffusion. In time synchronization phase, the average time of reference nodes is spread to a limited number of hops based on two-way message exchange mechanism. Moreover, in order to achieve the synchronization of entire network, it adopts the method of mutual diffusion to finish the approximately synchronization between the node time and the average time of all nodes. By comparing CTSP with TPSN, we show that, CTSP can synchronize the network quickly with good precision convergence speed and scalability, which appropriates for large-scale WSNs.
Volume: 12
Issue: 9
Page: 6874-6883
Publish at: 2014-09-01

A Review of Current Control Strategy for Single-Phase Grid-Connected Inverters

10.12928/telkomnika.v12i3.94
Peng; Beijing Institute of Technology Mao , Mao; Beijing Institute of Technology Zhang , Saihua; North China University of Technology Cui , Weiping; Beijing Institute of Technology Zhang , Bong-Hwan; Pohang University of Science and Technology Kwon
This paper gives an overview of the main current control strategy for single-phase grid-connected inverters. The model of the power circuit is first discussed. Then, a classification of current control strategy in stationary reference frame follows. This is continued by a discussion of current control structures for single phase grid-connected inverters and the possibilities of implementation in stationary reference frames. The other non-mainstream regulators were also introduced. Further on, both the model of the power circuit and current control strategy in rotating reference frame were focused on as well. The overview of control strategy for single-phase grid-connected inverters and their advantages and disadvantages were concluded in this paper.
Volume: 12
Issue: 3
Page: 563-580
Publish at: 2014-09-01

A Novel Framework for Evaluating the Software Project Management Efficiency–An Artificial Intelligence Approach

10.11591/ijeecs.v12.i9.pp7054-7058
Anandhi Govindarajan
The main purpose of this work is to find a suitable solution for improving the efficiency of the Software Project Management (SPM). In this work we have used a novel artificial intelligence method, a fuzzy logic approach to evaluate the SPM efficiency. There are many IT organization suffers on managing the SPM, it may be due to several reasons such as project work can’t begin on time, it may have vague requirements, people involved in the project can’t stay within project parameters, unity among the people involved in the projects and improper communication unclear project objectives and goals. All these issues usually may lead to delay in the project and have greater impact on the project failure, which in turn causes the poor Software Project Management efficiency.Fuzzy logic is one of the Artificial Intelligence method helps to solve the problems when there is a SPM with uncertainty and vagueness in it. We used the fuzzy inference system (FIS) to quantify the SPM efficiency under uncertainty and vagueness of the parameters involved in quantifying SPM efficiency. The outcome of the work is really appreciable and encouraging to quantify the Software Project Management efficiency
Volume: 12
Issue: 9
Page: 7054-7058
Publish at: 2014-09-01

A New ID-based Threshold Ring Signcryption without Random Oracles

10.11591/ijeecs.v12.i9.pp7034-7040
Hua Sun , Yanqiang Ge
Signcryption is a cryptographic primitive which could provide authentication and confidentiality simultaneously with a computational cost lower than signing and encryption respectively, while the ring signcryption has anonymity in addition to authentication and confidentiality. In order to design an identity-based threshold ring signcryption, this paper presented an efficient identity-based threshold ring signcryption scheme without random oracles by means of secret sharing and bilinear pairing technique, and gave security analysis of the scheme. In the last, we proved this scheme satisfied indistinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen message and identity attacks in terms of the hardness of DBDH problem and CDH problem.
Volume: 12
Issue: 9
Page: 7034-7040
Publish at: 2014-09-01

Diversity Combining Using Maxima Ratio Combining for All Modulation Mode

10.12928/telkomnika.v12i3.103
Yusuf; Institut Teknologi Bandung Kurniawan , Andyes Fourman; Institut Teknologi Bandung D.A. Sudirja
The destruction caused by channel can be seen by the existence of Amplitude and Phase Shift. By using the 6 Ways Diversity Combining method (6 Antennas/Receivers), it is expected that the disruption caused by Amplitude and Phase Shift can be suppressed as small as possible. In addition, by using diversity combining module, we will get a large SNR output which has a value sum of SNR of each diversity path. The design of Diversity combining module begins with MATLAB functional design as a big picture of the whole system. Subsequently, it will be made the hardware based on the MATLAB functional. This architectural design that will be the cornerstone in the MATLAB bit precision manufacturing. Then MATLAB bit precision will be designed as the foundation of the VHDL design. Diversity combining the output module meets the standards specified by the DVB consortium. In the hardware (FPGA) test results of diversity combining, the maximum working frequency is 44.56 MHz which has shown that is qualified with the standard sampling clock (9.142 MHz). This design also needs 4% of total FPGA Cyclone II 484I8 combinational units which is 2499 units and it needs also 3% of total register of FPGA Cyclone II 484I8 which is 1720 register units.
Volume: 12
Issue: 3
Page: 733-740
Publish at: 2014-09-01

A Flux Weakening Control Algorithm Based on Notch Filter

10.11591/ijeecs.v12.i9.pp6594-6601
Yu Jiabin , Wang Xiaoyi , Xu Jiping , Qin Xiaofei , Zheng Jun
In order to solve the problem that the SVPWM over modulation caused the fluctuation of steady-state speed in the flux weakening region of surface-mounted permanent magnet synchronous motor (PMSM), by analyzing the mechanism of the leading angle flux weakening control algorithm, the conclusion is that the sixth harmonic of inverter output voltage caused by SVPWM over modulation which is transmitted to the d-q reference currents through the flux weakening voltage close-loop deteriorates the current and speed control performance. A notch filter is designed in the voltage close-loop to filter the sixth harmonic component of the input voltage signal, meanwhile the other signal components are not affected. The experiment results show that, after adding notch filter, the sixth harmonic component of the input voltage signal is significantly reduced and the current waveforms are remarkably improved, so that the flux weakening speed control performance is effectively enhanced.
Volume: 12
Issue: 9
Page: 6594-6601
Publish at: 2014-09-01

Designing Comprehensive Independent Learning Interactive Multimedia and its Resources Demands

10.12928/telkomnika.v12i3.82
Enjang Akhmad; Universitas Pendidikan Indonesia Juanda , Ali Ibnun; Universitas Pendidikan Indonesia Nurhadi
Generally, multimedia project refers to a combination of  two or three types of media, such as texts, images, animations, applications, and videos, and is easily decompiled. This research produces interactive multimedia with five types of media using ActionScript. Using an external XML file as the connector between interface and contents, this interactive multimedia becomes reusable and developable. This multimedia project is flash based with the extensions *.swf and *.exe. To protect from decompiling, the project uses layered encryption combined with As3Crypto encryption. Based on test results, Sothink SWF Decompiler software cannot decompile and display all the properties of the project. In this research ,the analysis highlights multiplatform, standalone, media types, content types, exercises system, responsive, reusability, developability, energy efficiency, layered encryption and independent learning. Based on test results, the project has been tested and participants declared that they can use all contents and navigations easily and it ran normally on the devices used. 
Volume: 12
Issue: 3
Page: 639-650
Publish at: 2014-09-01
Show 1679 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration