Articles
100 Documents
Search results for
, issue
"Vol 11, No 11: November 2013"
:
100 Documents
clear
Heterogeneous Sequence Node of Associated Coverage Algorithm in Wireless Sensor Network
Zeyu Sun;
Zhaohui Chen
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In the premise of meeting the quality of network service, how to effectively cover the monitoring area and how to prolong the network lifetime has become one of the wireless sensor network researches. Therefore, this paper proposes heterogeneous nodes based on association covering algorithm. On one hand, this algorithm is handled through the Poisson model of structure joint probability density formula and it is also based on the node density formula to establish sensor node in the monitoring area in order to efficiently cover the focused target. On the other hand, it updates through the node's own state scheduling mechanism and converts neighbor nodes dynamically about matching scheduling, which can balance the monitoring area sensor node residual energy and node energy consumption. Therefore it can achieve the purpose of prolonging network lifetime .Finally, the simulation results show that the algorithm not only can use fewer nodes to effectively cover the monitoring area completely and improve the coverage of the network but also can optimize resource allocation and prolong the network lifetime. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3492
Real-time Moving Object Tracking System Using Cam-shift Algorithm
Wei Song
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
A real-time tracking system with the ability of tracking the moving target using cam-shift algorithm is designed. The basic technique of the stereo vision system is discussed. The architecture, the hardware component and the interface of the tracking system is analyzed. Two digital cameras are fit on the cradle head, and the electric pan/tilt/zoom controller has two independent degrees of freedom: horizontal rotation and pitch. The video signals are captured by two digital cameras, and then the position of the target is calculated. The electric pan/tilt/zoom controller is moved in order to make the target always in the surveillance window. This active system extends vision coverage over wide areas to get more detail information. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3505
Multi-focus Image Fusion Based on Region Segmentation
Yuan Jia-zheng;
Li Qing;
Sun Bo-xuan
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
We proposed a new image fusion algorithm based on region segmentation. The algorithm divided the adjacent region from the image through the edge detection, then using wavelet transform with different high-frequency fusion method in each sub-region, to retain the edge information of the source image. The experimental results showed that the image fusion algorithm based on region segmentation can overcome the drawbacks of single segmentation rule and processing in specific part, and the effect is better than the traditional wavelet-based image fusion algorithm. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3521
Characteristics of Electromagnetic Pulse Coupling into Annular Apertures
Yan-Peng Sun;
Shi Zhang;
Xiao-He An;
Hong-Peng Sun
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Electromagnetic pulse (EMP) coupling into the annular apertures can disturb or damage much electronic equipment. To enhance electronic system’s capability of anti-electromagnetic interference, the finite difference time domain method (FDTD) was employed to study the characteristics of electromagnetic pulse coupling into the cavity enclosures with annular apertures. The coupling characteristics of annular apertures with different shapes (rectangle, square and circle) were discussed. It shows that, in the case of the same aperture area, the coupling energy of electromagnetic pulse into the circular annular aperture is smaller than that into the rectangular and the square ones. To the rectangular annular aperture, while the polarization direction of the incident electromagnetic pulse is perpendicular to the long side of the rectangular annular aperture, the coupling energy is larger when the aspect ratio of the rectangular annular aperture is larger. The coupling effect of incident pulse with short pulse width is obviously better than the one with longer pulse width. The resonance phenomenon of the coupled waveform occurs in the cavity. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3544
A New Evidence Combination Method Based on Consistent Strength
Changming Qiao;
Shuli Sun
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
A lot of practical applications show that DS (Dempster-Shafer) theory of evidence cannot deal with highly conflicted evidence. For this problem, Murphy proposed a method to solve it by modifying source model of evidence. But this method just calculated the mean of the conflicted evidence and didn’t pay much attention on their correlation. Based on the combination method of Murphy, a new method to calculate the weighted average of the conflicted evidence using consistent strength is proposed by taking the correlation into account. The proposed combination method can combine highly conflicted evidences to be more satisfactory. A numerical example shows the effectiveness of the proposed method. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3585
A Modified Conjugate Gradient Method for Unconstrained Optimization
Can Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Conjugate gradient methods are an important class of methods for solving unconstrained optimization problems, especially for large-scale problems. Recently, they have been much studied. In this paper, we further study the conjugate gradient method for unconstrained optimization. We focus our attention to the descent conjugate gradient method. This paper presents a modified conjugate gradient method. An interesting feature of the presented method is that the direction is always a descent direction for the objective function. Moreover, the property is independent of the line search used. Under mild conditions, we prove that the modified conjugate gradient method with Armijo-type line search is globally convergent. We also present some numerical results to show the efficiency of the proposed method. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.2894
Simulation of Photon Correlation Spectroscopy Signal Using Orthogonal Inverse Wavelet Transform
WANG Yajing;
DOU Zhenhai
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Computer simulation is a more convenient and faster method obtaining photon correlation spectroscopy (PCS) signal. Based on orthogonal inverse wavelet transform (OIWT), a new simulation method is developed. This method considers that PCS signal of a single scale is composed of several sub-band signals with different characteristic. According to the relationship of power spectrum of PCS signal and orthogonal wavelet coefficients of every scale, using OIWT, PCS signal can be obtained by simulation of several different sub-band signals. Using this method, PCS signals of 90nm, 600nm and1000nm are respectively simulated. Mean square errors of the power spectrums of the simulation signals and their theoretical power spectrums are e-5 order of magnitude. The relative errors of particle size inverted from simulation signals are less than 2.47%. Comparison of simulation and experiment proves that that OIWT is feasible for simulation of PCS signal. In addition, by analyzing the influence of simulation parameters on simulation accuracy, we get relationship of particle size, decomposition scale and sampling frequency. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3487
An Indeterminacy Temporal Data Model Based on Probability
Ren Shuxia;
Zhao Zheng;
Zou Xiaojian
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
There are many kinds of indeterminacy temporal data in temporal database. Therefore, many researchers have focused on building indeterminacy temporal data models. Unfortunately, established models can’t adequately address the challenges posed by indeterminacy temporal information, and can’t adapt to all sorts of involved applications. In this paper, we propose a temporal data model, named BPTM (Temporal model based on probability), to manage the indeterminacy temporal semantics of indeterminacy data. Firstly, we present our tuple-timestamp method to represent and store these temporal data including determinacy and indeterminacy data. Then we introduce the temporal primitives to process temporal relations needed in BPTM. A new probability method is brought forward to get potential information among these indeterminacy data. At last a query example based on CPR (Computer-based Patient Record) is given to show that our method is effective and feasible. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3516
Analysis of Dither in PWM Control on Electro-hydraulic Proportional Valve
Guoping LIU;
Wuxing XIA;
Dawei QI;
Ronghua HU
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Plus with modulation (PWM) is widely used in proporational control systems for it is efficient, flexible and anti-interference. Due to the friction and hysteresis of electromagnet, hysteresis exists when hydraulic valve in steady-state, and hysteresis influences the dynamic characteristics of the valve seriously,the hysteresis can be improved by superimposing dithers with certain frequency and amplitude to the valve coil. Aiming at the character of anti-unloading power driver circuit ,this paper analyzed the parasitic dither which exists in ±24V PWM control,besides,the experiment shows that in a high frequency PWM, dither with independent frequency and amplitude can be generated by changing the frequency of the PWM, in this way, the dithers and average current of coil can be adjusted separately by changing PWM frequency and PWM duty cycle. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3698
A Virtual Machine Cloning Approach Based on Trusted Computing
Wei Ma;
Xiaoyong Li;
Yong Shi;
Yu Guo
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Cloud computing has become more and more popular and the technology of rapid virtual machine (VM) cloning is widely used in cloud computing environment to implement the fast deployment of VMs to meet the need of bursting computational request. However, the security issue of VM cloning technology is not considered thoroughly in current approaches. This paper proposes a virtual machine cloning approach based on trusted computing which deals with memory and disk of a VM separately. This approach resolves three problems: the identities verification of involved servers; the attestation of source VM and destination VM; the protection of integrity of transmitted data. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3558