Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

An Efficient Imaging Strategy for Single Pixel Camera in Earth Observation

10.11591/ijeecs.v12.i6.pp4794-4801
Chuanrong Li , Qi Wang , Changyong Cao , Lingling Ma
Single pixel camera is a new imaging device that develops from the “ghost” imaging and compressive sensing theory. For high resolution imaging with large amount of data, the process of measurement and reconstruction is time-consuming, which limits its application to remote sensing area. Based on the analysis of the configuration of the single pixel camera, an efficient imaging strategy through combining different numbers of DMD mirrors and local imaging was proposed which is able to image the interested target in high resolution with low time cost. Simulation experiment was carried out for two different types of targets, i.e., three-line target image and the scene consisting of a ship in the ocean. Three types of images, in low, middle and high resolution, are reconstructed respectively by the control of DMD working area and the strategy to combining DMD mirrors. The reconstructed images reached the application requirements at very low measurement and reconstruction time cost. The effectiveness and practicality of this strategy could be applied to other compressive sensing imaging devices.
Volume: 12
Issue: 6
Page: 4794-4801
Publish at: 2014-06-01

Marine Sink-Float Safety Device’s Control System Based on Fuzzy Control

10.11591/ijeecs.v12.i6.pp4787-4793
Zi Yue Wu , Jie Qi , Chen Nan Xue
In order to ensure safety work of marine equipment, this paper introduces a kind of sink-float safety device which can match with marine equipment to realize protection work, and a fuzzy controller set up by fuzzy control algorithm. The data of the control system is collected by multi-sensor and filtered through the filter circuit. Under a 5 grade sea condition, the marine sink-float safety device can carry marine equipment, escaping from the harsh marine environment by diving to a certain depth. The simulation in MATLAB/Simulink shows that the control system could response fast and operate stably. Furthermore, it is able to control sink-float safety device efficiently and reach to the preset depth accurately. So we can guarantee the operation of marine equipment reasonably.
Volume: 12
Issue: 6
Page: 4787-4793
Publish at: 2014-06-01

Speaker Recognition Based on i-vector and Improved Local Preserving Projection

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3505
Di Wu , Jie Cao , HuaJin Wang
In order to enhance the recognition performance of the i-vector speaker recognition system under unpredicted noise environment, a improved local preserve projection which used for reduce dimension to i-vector is proposed on this paper. First , the non zero eigenvalue is rejected when we solve the optimized objective function, only using the eigenvalue which value greater than zero. A mapping matrix is obtained by solving a generalized eigenvalue problem, so can settle the singular value problem occurred in traditional local preserve projection algorithm.The experiment result shows,The recognition performance of the method proposed in this paper is improved under several kinds of noise environments. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.3994
Volume: 12
Issue: 6
Page: 4299-4305
Publish at: 2014-06-01

Application of Resource Migration on Housing Fund Archives System

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3536
Changxing Qi
This paper analyzes the feature and necessity of resource migration, and summarizes the commonly methods among different systems. According to the requirements of the systems in the housing fund center,an architecture model based on resource migration is designed. The process of migration, the format and specification of the data packet are described according to the architecture levels and the process.After the migration application is developed,the operation data of the system are analyzed and further suggestions are given. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5392
Volume: 12
Issue: 6
Page: 4528-4535
Publish at: 2014-06-01

Additional Resource Allocation for improving Fairness in WiMAX

10.12928/telkomnika.v12i2.55
Khalid Mahmood; Universiti Teknologi Malaysia Awan , Abdul Hanan; Universiti Teknologi Malaysia Abdullah , Khalid; Universiti Teknologi Malaysia Hussain
IEEE 802.16 standard provides resources to both service classes Constant Bit Rate (CBR) and Variable Bit Rate (VBR). Both of these services required enough resources to transmit data efficiently.Considering available literature there is a gap to provide additional resources for fulfillment of the required service class.In this paper we propose a Service Based Fair Resource Allocation (SBFRA) Mechansim, for evaluating the required service from Subscriber (SS) along with the channel condition. Our proposed model evaluates, for providing the required service to SS how much additional resource will be required. In this model we introduced Priority Queue Scheduling Methodology for providing additional resources as per channel condition. In this paper we made comparison with and without proposed model on both traffic, CBR and VBR. We experiment that our proposed model manages the user request by providing them additional resources as required for satisfaction. Their request handled in Priority Queue Scheduling based mechanism. Results shows, that we achieve improvement by providing the additional resource on fair scheduling basis. To achieve the required performance for fairness we have to compromise on with delay.
Volume: 12
Issue: 2
Page: 455-464
Publish at: 2014-06-01

Optimal Asymmetric S-shape Acceleration/Deceleration for Multi-axial Motion Systems

10.11591/ijeecs.v12.i6.pp4778-4786
Chang-yan Chou , Shyh-Leh Chen
In this study, an optimization algorithm is proposed for asymmetric s-shape acceleration/deceleration to achieve better contour accuracy for biaxial systems. The optimization is based on the method of genetic algorithm incorporated with the constraints made by the motion system. Numerical simulations of an XY table driven by linear motors following a simple cornering path verify the effectiveness of the proposed algorithm.
Volume: 12
Issue: 6
Page: 4778-4786
Publish at: 2014-06-01

Searching and Visualization of References in Research Documents

10.12928/telkomnika.v12i2.74
Firnas; Institut Pertanian Bogor Nadirman , Ahmad; Institut Pertanian Bogor Ridha , Annisa; Institut Pertanian Bogor Annisa
This research aims to develop a module for information retrieval that can trace references from bibliography entries of research documents, specifically those based on Bogor Agricultural University (IPB)’s writing guidelines. A total of 242 research documents in PDF from the Department of Computer Science IPB were used to generate parsing patterns to extract the bibliography entries. With modified ParaTools, automatic extraction of bibliography entries was performed on text files generated from the PDF files. The entries are stored in a database that is used to visualize author relationship as graphs. This module is supplemented by an information retrieval system based on Sphinx search system and also provides information of authors’ publications and citations. Evaluation showed that (1) bibliography entry extraction missed only 5.37% bibliography entries caused by incorrect bibliography formatting, (2) 91.54% bibliography entry attributes could be identified correctly, and (3) 90.31% entries were successfully connected to other documents.
Volume: 12
Issue: 2
Page: 447-454
Publish at: 2014-06-01

The Non-equidistant Multivariable New Information MGM(1,n) Based on New Information Background Value Constructing

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3504
Zheming He , Xiaoyi Che , Qiyun Liu
Applying the principle in which new information should be used fully and modeling method of grey system for the problem of lower precision as well as lower adaptability in non-equidistant multivariable MGM(1,n)model, a non-equidistant multivariable new information MGM(1,n) model was put forward which was taken the mth component as the initialization. As the background value is an important factor affecting the precision of grey system model, based on index characteristic of grey model, the characteristic of integral and new information principle, the new information background value in non-equidistant multivariable new information MGM(1,n) was researched and the discrete function with non-homogeneous exponential law was used to fit the accumulated sequence and the formula of new information background value was given. This new non-equidistant multivariable MGM(1,n) model can be used in equidistance & non-equidistance modeling and has the characteristic of high precision as well as high adaptability. Examples validate the practicability and reliability of the proposed model. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.4822
Volume: 12
Issue: 6
Page: 4290-4298
Publish at: 2014-06-01

Improved Multi-secret Sharing Scheme Based on One-Way Function

10.11591/ijeecs.v12.i6.pp4463-4467
Geng Yong-Jun , Guo Li-Zheng , Zheng Ming-Hui
The weakness He-Dawson’s threshold multi-secret sharing scheme is presented and analyzed. By using the one-way function thought in the He-Dawson scheme, a new multi-use and multi-secret sharing scheme is proposed. The improved scheme is multi-time-use of once secret shares distribution and can resist conspiring attack. Furthermore, the new scheme is multi-secret sharing, group secrets can be reconstructed in free order and different group secret is corresponding to different threshold value which can meet with different practical application. At last, the security and efficiency of the new proposed multi-secret sharing scheme are analyzed. DOI:  http://dx.doi.org/10.11591/telkomnika.v12i6.5483 
Volume: 12
Issue: 6
Page: 4463-4467
Publish at: 2014-06-01

Robust Weighted Measurement Fusion Kalman Predictors with Uncertain Noise Variances

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3558
Wen-juan Qi , Peng Zhang , Gui-huan Nie , Zi-li Deng
For the multisensor system with uncertain noise variances, using the minimax robust estimation principle, the local and weighted measurement fusion robust time-varying Kalman predictors are presented based on the worst-case conservative system with the conservative upper bound of noise variances. The actual prediction error variances are guaranteed to have a minimal upper bound for all admissible uncertainties of noise variances. A Lyapunov approach is proposed for the robustness analysis and their robust accuracy relations are proved. It is proved that the robust accuracy of weighted measurement robust fuser is higher than that of each local robust Kalman predictor. Specially, the corresponding steady-state robust local and weighted measurement fusion Kalman predictors are also proposed and the convergence in a realization between time-varying and steady-state Kalman predictors is proved by the dynamic error system analysis (DESA) method. A Monte-Carlo simulation example shows the effectiveness of the robustness and accuracy relations. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5453
Volume: 12
Issue: 6
Page: 4692-4704
Publish at: 2014-06-01

Measuring Information Security Awareness of Indonesian Smartphone Users

10.12928/telkomnika.v12i2.64
Puspita Kencana; Telkom University Sari , Candiwan; Telkom University Candiwan
One of information security management elements is information security awareness program. Usually, this programs only involve the employees within the organization. Some organizations also consider security awareness for some parties outside the organization like providers, vendors, and contractors. This paper add consumers as variable to be considered in information security awareness program as there are also some threats for organization through them. Information security awareness will be measured from user’s knowledge, behavior, and attitude of five information security focus areas in telecommunication, especially related with smartphone users as one segment of telecommunication provider. For smartphone users, information security threats not only from Internet, but also by phone call or texting. Therefore, focus area in this research consist of adhere to security policy, protect personal data, fraud/spam SMS, mobile application, and report for security incident. This research use analytic hierarcy process (AHP) method to measure the information security awareness level from smartphone users. In total, the result indicated that awareness level is good (80%). Although knowledge and attitude dimension are in good criteria of awareness level, but behaviour dimension is average. It can be a reason why there are still many information security breach against smartphone user despite good awareness level.
Volume: 12
Issue: 2
Page: 493-500
Publish at: 2014-06-01

Low Mutual Coupling Dualband MIMO Microstrip Antenna with Air Gap Parasitic

10.12928/telkomnika.v12i2.50
Yuli Kurnia; Trisakti University Ningsih , Rastanto; Trisakti University Hadinegoro
Long Term Evolution (LTE) is a standard for wireless communication of high-speed data for mobile phones and data terminals. Due to the LTE standard covers a range of many different bands in each country, therefore an antenna with more than one frequency bands become one of the most important needs in LTE antenna. In this paper, a novel triangular dual band MIMO (2x2) antenna with coplanar waveguide (CPW) fed is proposed to be used for LTE application. The proposed MIMO antenna is able to work in dual frequency that will be implemented in Indonesia at 1.8GHz and 2.35GHz. To obtain the optimum design, the characteristic of proposed antenna are numerically investigated through the physical parameters of antenna. The results show that proposed antenna has a compact size and a bandwidth of 100 MHz which is suitable for LTE application
Volume: 12
Issue: 2
Page: 405-410
Publish at: 2014-06-01

Online Imbalanced Support Vector Machine for Phishing Emails Filtering

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3506
Xiaoqing Gu , Tongguang Ni , Wei Wang
Phishing emails are a real threat to internet communication and web economy. In real-world emails datasets, data are predominately composed of ham samples with only a small percentage of phishing ones. Standard Support Vector Machine (SVM) could produce suboptimal results in filtering phishing emails, and it often requires much time to perform the classification for large data sets. In this paper, an online version of imbalanced SVM (OISVM) is proposed. First an email is converted into 20 features which are well selected based on its content and link characters. Second, OISVM is developed to optimize the classification accuracy and reduce computation time, which is used a novel method to adjust the separation hyperplane of imbalanced date sets and an online algorithm to make the retaining process much fast. Compared to the existing methods, the experimental results show that OISVM can achieve significantly using a proposed expressive evaluation method. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.4562
Volume: 12
Issue: 6
Page: 4306-4313
Publish at: 2014-06-01

Robust Centralized Fusion Kalman Filters with Uncertain Noise Variances

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3559
Wen-juan Qi , Peng Zhang , Zi-li Deng
This paper studies the problem of the designing the robust local and centralized fusion Kalman filters for multisensor system with uncertain noise variances. Using the minimax robust estimation principle, the centralized fusion robust time-varying Kalman filters are presented based on the worst-case conservative system with the conservative upper bound of noise variances. A Lyapunov approach is proposed for the robustness analysis and their robust accuracy relations are proved. It is proved that the robust accuracy of robust centralized fuser is higher than those of robust local Kalman filters. Specially, the corresponding steady-state robust local and centralized fusion Kalman filters are also proposed and the convergence in a realization between time-varying and steady-state Kalman filters is proved by the dynamic error system analysis (DESA) method and dynamic variance error system analysis (DVESA) method. A Monte-Carlo simulation example shows the robustness and accuracy relations. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5490
Volume: 12
Issue: 6
Page: 4705-4716
Publish at: 2014-06-01

Applying Extenics Theory to Motion Performs Evaluation of Numerical Machines

10.11591/ijeecs.v12.i6.pp4849-4853
Chen Liu
The motion performs evaluation indexes of numerical control machine tools (NC) are made of multiple elements. In order to evaluate motion performs of numerical control machine tools objectively, we have applied the extenics theory to establish the matter-element model for the motion performs evaluation of the NC. The relational degree was calculated by introducing the relational function in the extension set theory, and the evaluation indexes weight coefficient of NC were defined by using the 1-9 scale law in AHP (the analytic hierarchy process). A numerical control machine tool as a study object, the motion performs was studied by using the extenics theory. The result indicates that the extenics theory is appropriate for the motion performs evaluation .The motion performs of the evaluated NC was good, the evaluation method possesses a certain practicability.
Volume: 12
Issue: 6
Page: 4849-4853
Publish at: 2014-06-01
Show 1804 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration