cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 40 Documents
Search results for , issue "Vol 10, No 5: September 2012" : 40 Documents clear
Mechanical Smoke Exhaust in Underground Transport Passage of Hydropower Station Angui Li; Yeqiu Wu; Jiangyan Ma; Ran Gao; Jiang Hu
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this paper, the fire scenario occuring in the main transformer hall of an underground hydropower station is taken as an example of the mechanical smoke exhaust effect in the transport passage when the smoke spilled from the fired main transformer hall is analyzed by means of theoretical analysis, experiment and FDS simulation. Firstly, the mathematic correlations regarding the mechanical exhaust rate are derived through theoretical analysis. Secondly, a series of experiments are conducted to investigate the smoke spreading in the transport passage under different mechanical exhaust rates, and the same smoke spreading processes are simulated using FDS. By comparing the results of theoretical analysis, experiments and FDS simulations, it is showed that the mechanical exhaust rate prescribed in the regulation of China is adequate for the transport passage of main transformer under a main transformer hall fire. DOI:http://dx.doi.org/10.11591/telkomnika.v10i5.1269 
Productive Information System Oriented Trust Chain Scheme Li-ye Tian; Shen Chang-xiang
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Productive information system has high-level security requirements, but Trusted Computing Group’s solution of trust chain isn’t competent. After analysis and comparison of two different trust transfer ways, a new trust chain scheme was designed and its architecture was shown. With independent TPCM as a trust root, this scheme combined the advantages of linear and radial transfer. So that stronger cryptographic algorithm could be adopted by TPCM and applications’ trust attenuation decreased a lot. This scheme was described formally by 6 linear temporal logic rules. It was proved that based on these rules, this scheme could transfer trust from trust root to applications. Meanwhile, it could actively report and handle exceptions in trust chain building and system running. Conclusion and future work were given at the end of this manuscript. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1355
Flight Control System Simulation Platform for UAV Based on Integrating Simulink With Stateflow Gao Yanhui; Xiao Qiangui; Hu Shousong; Ju Xiao
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Aiming at rapidly analyzing and validating control strategy, control law and flight mode of the Unmanned Aerial Vehicle (UAV), a digital simulation test platform for flight control system (FCS) of UAV is presented in this paper. The platform is built on principles of hierarchy and modularity, its core is composed of flight mode management and control module, and the two components are implemented by using Matlab/Stateflow and embedded Simulink Function respectively. Simulation test for a certain type of UAV with a variety of flight mode, including remote control and autonomic flight, is achieved. Compared with actual flight test, the results of the simulation validate the rationality and validity of the modeling theories and method. Practices show that developing new type or modified FCS of UAV through this platform, similarity between simulation model and real aircraft can be improved, and this is useful to minimize the risk and increase flexibility for design changes. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1345
AQM Algorithm with Adaptive Reference Queue Threshold for Communication Networks Zhenyu Na; Bao Peng; Liming Chen
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Nowadays, congestion in communication networks has been more intractable than ever before due to the explosive growth of network scale and multimedia traffic. Active queue management (AQM) algorithms had been proposed to alleviate congestion to improve quality of service (QoS), but existing algorithms often suffer from some flaws in one aspect or another. In this paper, a novel AQM algorithm with adaptive reference queue threshold (ARTAQM) is proposed of which the main innovative contributions are recounted as follows. First, traffic is predicted to calculate the packet loss ratio (PLR) and the traffic rate based on traffic prediction algorithm. Second, by means of periodical measurements, a weighted PLR is obtained to dynamically adjust packet dropping probability in ARTAQM algorithm. Third, ARTAQM algorithm runs in both coarse and fine granularities. In coarse granularity, the mismatch of the predicted traffic rate and link capacity can adjusts the reference queue length in every period, while in fine granularity, reference queue remains fixed and the  instantaneous queue is adjusted packet by packet in one period. Simulation results indicate that ARTAQM algorithm not only maintains stable queue and fast response speed, but has lower PLR and higher link utilization as well. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1274 
Study on Track to Earth Insulation Defect Fault Location Method in Urban Mass Transit LI Guo-xin; ZHANG Dong-liang; WU Yu-ling; LIAO Hong-mei
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the urban mass transit operating, due to the impact of natural and human factors, track to earth insulation defect will occur. Keeping track to earth resistance is an effective method of preventing stray current. When track to earth insulation defect occurs, the track to earth potential of the point will be nearly changed to zero.  We present the track to earth insulation defect fault location method based on the feature. And the method was simulated and analyzed, the results show the fault location method is effective. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1275
Acoustic Emission Signal Classification Based On Support Vector Machine Yang Yu; Liang Zhou
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A classification of acoustic emission signals has great significance. The best parameters of the RBF kernel had obtained by using grid optimization method, and the classifier had built to achieve the identification and classification of acoustic emission signals. The simulation results show that support vector machine can effectively distinguish different acoustic emission signal and noise signal.DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1387
Biometric Cryptosystem Based Energy Attack Analysis Jianbo Yao; Tao Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Biometric cryptosystem provides a seamless connection between the biometrics and traditional password, and it represents a new development in the next generation cryptography. Even if the biometric cryptosystem is secure in algorithmic design, it may still be vulnerable to side-channel attack due to the physical leakage. To assess the possible side-channel attack on biometric cryptosystem, a secure biometric cryptosystem is designed and by measuring the energy consumption leaked. The simulation shows that the biometric cryptosystem can be extracted with bits of energy leakages. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1285 
Hysteretic Behavior of Steel Column Strengthened With CFRP in Thermal Environment Zhen-Guo Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper is concerned with analysis for the strengthening effect of carbon fiber-reinforced polymer (CFRP) on steel columns under cyclic lateral loading in thermal environment. Based on the finite element theory of thermo-elastic problem and steel structure stability theory, the hysteretic behavior of axial compression steel columns was studied by using Ansys software. The main variables investigated are:  cyclic lateral loading, temperature, axial compression ratio and ductility. The results show that the CFRP wraps can improve the ultimate cyclic lateral loading and ductility of steel columns prominently in thermal environment which benefit to the anti-seismic capacity of steel structure. The effect of axial compression ratio on ultimate cyclic lateral loading is very obvious, more enhancements achieved with the axial compression ratio increased. While effect of temperature on ultimate cyclic lateral loading is not very obvious below 300℃. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1278 
Train Control System Formalization Modeling oriented Movement Authority Shuxu Zhao; Xiaoming Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Chinese Train Control System-3(CTCS-3) was integrated via various control system devices, assurance of CTCS-3 system transmission probability relied on empirical judgment, it is necessary to form its formalization to support integration for system stability of the whole CTCS-3. Movement Authority(MA) acts on the whole information process of CTCS-3 to control train, its process properties can be as the reflection of CTCS probability. Aiming at that,  paper selected MA as the objective, proposed MA-oriented CTCS-3 formalization modeling. Paper designed generation and transmission algorithms of MA, formed MA computation models for application functions. Based on computation models, paper constructed MA hierarchical Colored Petri Nets(CPN) models, and completed MA timed CPN model, the report and experimental result demonstrate that the model proposed is effective and can reflect CTCS-3 system properties accurately.  DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1352 
Design of Real-time Communication Adapter for Different Protocol Sensors in Sensor Web Xuefeng Liu; Jing Zhu; Jianhua Mao; Xiaoming Shao; Longlong Lu
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A real-time communication adapter named SensorAdapter is designed to communicate between different protocols sensors and data service layer in Sensor Web. The adapter is extended and restructured based on SensorBus, an open source project raised by a German company called 52north. By structuring the receiving module and extending the proxies of sensors according to the communication protocols the sensors use, the adapter can receive sensing information detected by different protocols sensors simultaneously. The receiving module identifies a sensor and finds its corresponding proxy in SensorAdapter by sensor ID (SensorID), and then packages the sensing information to XMPP messages and sends them to XMPPServer by invoking the methods in its proxy. At last, an example of SOS is achieved to verify the effect of the adapter. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1357

Page 3 of 4 | Total Record : 40


Filter by Year

2012 2012


Filter By Issues
All Issue Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue