Articles
72 Documents
Search results for
, issue
"Vol 11, No 2: February 2013"
:
72 Documents
clear
Research on clustering protocols based on event-driven
Xiaohu Zhao;
Chenjun Hu;
Qianqian Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: February 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In order to ensure the safety production in coal face, we need to monitor face working conditions and environment information; this paper presents a kind of clustering routing algorithm which is based on event-driven. Under normal circumstances, we improve LEACH protocol to monitor the information on the face; in an emergency, cluster head nodes in the event area will be selected based on events the degree of irritation the node residual energy and the power transmission level. The simulation results show that the agreement can quickly build a temporary path for effective data fusion, and can prolong the network lifetime. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2046
Transmission Performance Research of Digital Modulation Signals in AWGN Channel
Jianbin Xue;
Songbai Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: February 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
As mainstream of wireless communication system,digital communication system cannot directly transmit digital baseband signals that must be modulated at the sender before being sent into wireless channel.Digital modulation that is using baseband signals to control the parameters of carrier, includes amplitude modulation, frequency modulation and phase modulation.Noise existing in wireless channel can seriously affect signal’s transmission performance.AWGN (additive white Gaussian noise) channel is the most simple radio channel, this paper aims at transmission performance analysis of three kinds of digital modulation signals in AWGN channel and comparing the simulation value with theoretical value that’s not affected by AWGN,the idea proposed in this paper includes four ways that cover the comparison between simulated BER(bit error rate) and theoretical BER,simulated SER(symbol error rate) and theoretical SER,the simulation results show the difference about transmission performance of modulated signals with or without AWGN. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2065
An Improved Cognitive Radio Spectrum Sensing Algorithm
Dengyin Zhang;
Kuankuan Li;
Li Xiao
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: February 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
To improve the cognitive radio user’s detection performance and reduce the complexity, this paper composites the Fractal box dimension algorithm and the 3th-order cyclic-cumulate (TCC) algorithm and improves the TCC algorithm, so a novel detection algorithm is proposed that the Fractal box dimension is used when the signal to noise (SNR) is high, while the improved TCC algorithm is used when the SNR is low. This new algorithm not only avoids using TCC algorithm with high complexity when the channel environment is good, but also reduces the decision complexity of TCC algorithm. Simulation result shows that this algorithm obtains good detection performance with lower complexity than the traditional TCC algorithm. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.1980
Measurement on Modulation Transfer Function Under Different Contrasts
Li Wen-juan;
Liang Chuan;
Jiang Wei;
Wang Chi-zhong
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: February 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Aiming at the effect of environment to MTF measurement, the MTF measurent at different contrasts is presented. In order to get different contrasts, two integrating spheres are used to illuminate the face and back of the test target uniformly. The target luminance and background luminance of the test target are regulated by luminance control parts conveniently. The MTF measurement system is designed and developed. Many experimental results of show that the luminance differences between the values by the system and those by L88 standard level luminance meter are within ±0.3 cd/m2so that the MTF measurement precision can be ensured. MTFs of Sony camera and Cannon camera at different contrasts are measured. The measurement values imply that MTFs at different contrasts can evaluate the imaging quality fully and objectively. This study provides an effective method to assess the imaging quality of visible imaging systems. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.1996
Network Coding-Based Communications via the Controlled Quantum Teleportation
Dazu Huang;
Shaoping Zhu;
Dan Song;
Ying Guo
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: February 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Inspired by the structure of the network coding over the butterfly network, a framework of quantum network coding scheme is investigated, which transmits two unknown quantum states crossly over the butterfly quantum system with the multi-photon non-maximally entangled GHZ states. In this scheme, it contains certain number of entanglement-qubit source nodes that teleport unknown quantum states to other nodes on the small-scale network where each intermediate node can pass on its received quantum states to others via superdense coding. In order to transmit the unknown states in a deterministic way, the controlled quantum teleportation is adopted on the intermediate node. It makes legal nodes more convenient than any other previous teleportation schemes to transmit unknown quantum states to unknown participants in applications. It shows that the intrinsic efficiency of transmissions approaches 100% in principle. This scheme is secure based on the securely-shared quantum channels between all nodes and the quantum mechanical impossibility of local unitary transformations between non-maximally entangled GHZ states. Moreover, the generalized scheme is proposed for transmitting two multipartite entangled states. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2031
One Method of Cloud Computing Bandwidth Allocation Based on Fairness
Yiquan Kong
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: February 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In order to solve the bandwidth allocation unfairness problem in the cloud computing network, one method uses fairness congestion control algorithm, access control list (ACL) and traffic policing and traffic shaping in the paper. The method can rationally solve the problem after analyzing the reason of cloud computing bandwidth allocation unfairness. For illustration, one network video conference example was utilized to show the method in solving bandwidth allocation unfairness problem.The experimental results show network bandwidths are fairly allocated, packet loss ratio and latency is obvious improvement. The method deals with non-adaptive UDP and TCP adaptive flow congestion and provides the end-to-end quality of service over the differentiated services networks, and the bandwidth allocation problem based on fairness in the cloud computing network is solved well. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2059
Optimization of an Intelligent Controller for Parallel Autonomous Parking
Guoqiang Zheng;
Zhao Liang;
Jishun Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: February 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Autonomous parking has become the research focus. Fuzzy controller was ofen used to solve the nonlinear and time-varying problem of the autonomous parking. According to the shortcomings of traditional fuzzy controller, a new ant colony algorithm based on idle ant effect was proposed. Firstly, the fuzzy controller was designed based on the kinematic equations. Then, multi-colony parallel optimization was adopted to improve the data initialization, path construction and pheromone update. The method guaranteed the completeness of the membership function and made the fuzzy parameters with higher precision. Finally, both traditional controller and the designed controller were used for the autonomous parking, the experimental results showed that, comparing with the traditional fuzzy controller, the designed controller can improve the stability problem with less error and faster response speed. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.1404
Application of MCTS in Tsumego of Computer Go
Fang Wang;
Ying Peng
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: February 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The Tsumego problem in Go was a basic and essential problem to be overcome in implementing a computer Go program. This paper proposed a reality of Monte-Carlo tree search in Tsumego of computer Go which using Monte-Carlo evaluation as an alternative for a positional evaluation function. The advantage of this technique was that it requires few domain knowledge or expert input. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.1991
Electromagnetic Field Evaluation of a 500kV High Voltage Overhead Line
Shadreck Mpanga;
Wang Feng;
Chen Chun
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: February 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Many scientific articles have been written about electromagnetic field distributions under high voltage overhead transmission lines. However, some readers are still left wondering just how exactly the distribution curves formed by the fields are related to the mathematical models used. This paper presents case study results of a 500 kV alternating current overhead transmission line, and explicitly shows how the fields vary under high voltage lines by employing easily understood mathematical models. The numerical simulations, done using MATLAB, can help anyone willing to evaluate the amount of electromagnetic fields available under any other high voltage overhead transmission line. The magnitudes of the fields obtained are compared with the standard values set by the International Radiation Protection Agency so as to assess the integrity of external insulation of the line. Thus, the technical staff can easily attend to complaints that may arise about the electromagnetic field effects from the line. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2007
Deviation Control Theory and Strategy in Aluminum Hot Rolling
Fu Zhuo;
Liu Yilun;
Ma Liyong
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: February 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Real-time detection and tracking of moving pedestrians in image sequences is a fundamental task in many computation vision applications such as automated visual surveillance system. In this paper we propose a human detection method based on foreground segmentation, and the detection speed is satisfying for the application of video surveillance. During detection, unlike the exhaustive scan typically used in general human detection systems, in order to avoid scanning regions like the sky, the foreground segmentation stage is firstly implemented in the video surveillance sequences by utilizing Gaussian mixture model algorithm, and then, human detection stage is executed on the regions of interest (ROI) extracted from the video surveillance sequence frame. In contrast with the exhaustive scan without explicit segmentation, our proposed approach can meet the real-time requirement. Carefully designed experiments demonstrate the superiority of our proposed approach. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2053