Articles
40 Documents
Search results for
, issue
"Vol 10, No 5: September 2012"
:
40 Documents
clear
Mechanical Smoke Exhaust in Underground Transport Passage of Hydropower Station
Angui Li;
Yeqiu Wu;
Jiangyan Ma;
Ran Gao;
Jiang Hu
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In this paper, the fire scenario occuring in the main transformer hall of an underground hydropower station is taken as an example of the mechanical smoke exhaust effect in the transport passage when the smoke spilled from the fired main transformer hall is analyzed by means of theoretical analysis, experiment and FDS simulation. Firstly, the mathematic correlations regarding the mechanical exhaust rate are derived through theoretical analysis. Secondly, a series of experiments are conducted to investigate the smoke spreading in the transport passage under different mechanical exhaust rates, and the same smoke spreading processes are simulated using FDS. By comparing the results of theoretical analysis, experiments and FDS simulations, it is showed that the mechanical exhaust rate prescribed in the regulation of China is adequate for the transport passage of main transformer under a main transformer hall fire. DOI:http://dx.doi.org/10.11591/telkomnika.v10i5.1269
Productive Information System Oriented Trust Chain Scheme
Li-ye Tian;
Shen Chang-xiang
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Productive information system has high-level security requirements, but Trusted Computing Group’s solution of trust chain isn’t competent. After analysis and comparison of two different trust transfer ways, a new trust chain scheme was designed and its architecture was shown. With independent TPCM as a trust root, this scheme combined the advantages of linear and radial transfer. So that stronger cryptographic algorithm could be adopted by TPCM and applications’ trust attenuation decreased a lot. This scheme was described formally by 6 linear temporal logic rules. It was proved that based on these rules, this scheme could transfer trust from trust root to applications. Meanwhile, it could actively report and handle exceptions in trust chain building and system running. Conclusion and future work were given at the end of this manuscript. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1355
Flight Control System Simulation Platform for UAV Based on Integrating Simulink With Stateflow
Gao Yanhui;
Xiao Qiangui;
Hu Shousong;
Ju Xiao
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Aiming at rapidly analyzing and validating control strategy, control law and flight mode of the Unmanned Aerial Vehicle (UAV), a digital simulation test platform for flight control system (FCS) of UAV is presented in this paper. The platform is built on principles of hierarchy and modularity, its core is composed of flight mode management and control module, and the two components are implemented by using Matlab/Stateflow and embedded Simulink Function respectively. Simulation test for a certain type of UAV with a variety of flight mode, including remote control and autonomic flight, is achieved. Compared with actual flight test, the results of the simulation validate the rationality and validity of the modeling theories and method. Practices show that developing new type or modified FCS of UAV through this platform, similarity between simulation model and real aircraft can be improved, and this is useful to minimize the risk and increase flexibility for design changes. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1345
AQM Algorithm with Adaptive Reference Queue Threshold for Communication Networks
Zhenyu Na;
Bao Peng;
Liming Chen
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Nowadays, congestion in communication networks has been more intractable than ever before due to the explosive growth of network scale and multimedia traffic. Active queue management (AQM) algorithms had been proposed to alleviate congestion to improve quality of service (QoS), but existing algorithms often suffer from some flaws in one aspect or another. In this paper, a novel AQM algorithm with adaptive reference queue threshold (ARTAQM) is proposed of which the main innovative contributions are recounted as follows. First, traffic is predicted to calculate the packet loss ratio (PLR) and the traffic rate based on traffic prediction algorithm. Second, by means of periodical measurements, a weighted PLR is obtained to dynamically adjust packet dropping probability in ARTAQM algorithm. Third, ARTAQM algorithm runs in both coarse and fine granularities. In coarse granularity, the mismatch of the predicted traffic rate and link capacity can adjusts the reference queue length in every period, while in fine granularity, reference queue remains fixed and the instantaneous queue is adjusted packet by packet in one period. Simulation results indicate that ARTAQM algorithm not only maintains stable queue and fast response speed, but has lower PLR and higher link utilization as well. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1274
Study on Track to Earth Insulation Defect Fault Location Method in Urban Mass Transit
LI Guo-xin;
ZHANG Dong-liang;
WU Yu-ling;
LIAO Hong-mei
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
With the urban mass transit operating, due to the impact of natural and human factors, track to earth insulation defect will occur. Keeping track to earth resistance is an effective method of preventing stray current. When track to earth insulation defect occurs, the track to earth potential of the point will be nearly changed to zero. We present the track to earth insulation defect fault location method based on the feature. And the method was simulated and analyzed, the results show the fault location method is effective. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1275
Acoustic Emission Signal Classification Based On Support Vector Machine
Yang Yu;
Liang Zhou
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
A classification of acoustic emission signals has great significance. The best parameters of the RBF kernel had obtained by using grid optimization method, and the classifier had built to achieve the identification and classification of acoustic emission signals. The simulation results show that support vector machine can effectively distinguish different acoustic emission signal and noise signal.DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1387
Biometric Cryptosystem Based Energy Attack Analysis
Jianbo Yao;
Tao Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Biometric cryptosystem provides a seamless connection between the biometrics and traditional password, and it represents a new development in the next generation cryptography. Even if the biometric cryptosystem is secure in algorithmic design, it may still be vulnerable to side-channel attack due to the physical leakage. To assess the possible side-channel attack on biometric cryptosystem, a secure biometric cryptosystem is designed and by measuring the energy consumption leaked. The simulation shows that the biometric cryptosystem can be extracted with bits of energy leakages. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1285
Hysteretic Behavior of Steel Column Strengthened With CFRP in Thermal Environment
Zhen-Guo Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This paper is concerned with analysis for the strengthening effect of carbon fiber-reinforced polymer (CFRP) on steel columns under cyclic lateral loading in thermal environment. Based on the finite element theory of thermo-elastic problem and steel structure stability theory, the hysteretic behavior of axial compression steel columns was studied by using Ansys software. The main variables investigated are: cyclic lateral loading, temperature, axial compression ratio and ductility. The results show that the CFRP wraps can improve the ultimate cyclic lateral loading and ductility of steel columns prominently in thermal environment which benefit to the anti-seismic capacity of steel structure. The effect of axial compression ratio on ultimate cyclic lateral loading is very obvious, more enhancements achieved with the axial compression ratio increased. While effect of temperature on ultimate cyclic lateral loading is not very obvious below 300℃. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1278
Train Control System Formalization Modeling oriented Movement Authority
Shuxu Zhao;
Xiaoming Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Chinese Train Control System-3(CTCS-3) was integrated via various control system devices, assurance of CTCS-3 system transmission probability relied on empirical judgment, it is necessary to form its formalization to support integration for system stability of the whole CTCS-3. Movement Authority(MA) acts on the whole information process of CTCS-3 to control train, its process properties can be as the reflection of CTCS probability. Aiming at that, paper selected MA as the objective, proposed MA-oriented CTCS-3 formalization modeling. Paper designed generation and transmission algorithms of MA, formed MA computation models for application functions. Based on computation models, paper constructed MA hierarchical Colored Petri Nets(CPN) models, and completed MA timed CPN model, the report and experimental result demonstrate that the model proposed is effective and can reflect CTCS-3 system properties accurately. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1352
Design of Real-time Communication Adapter for Different Protocol Sensors in Sensor Web
Xuefeng Liu;
Jing Zhu;
Jianhua Mao;
Xiaoming Shao;
Longlong Lu
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
A real-time communication adapter named SensorAdapter is designed to communicate between different protocols sensors and data service layer in Sensor Web. The adapter is extended and restructured based on SensorBus, an open source project raised by a German company called 52north. By structuring the receiving module and extending the proxies of sensors according to the communication protocols the sensors use, the adapter can receive sensing information detected by different protocols sensors simultaneously. The receiving module identifies a sensor and finds its corresponding proxy in SensorAdapter by sensor ID (SensorID), and then packages the sensing information to XMPP messages and sends them to XMPPServer by invoking the methods in its proxy. At last, an example of SOS is achieved to verify the effect of the adapter. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1357