Articles
80 Documents
Search results for
, issue
"Vol 11, No 5: May 2013"
:
80 Documents
clear
Venture Capital Industry Index Portfolio Analysis
Dagang Yang;
Xuefeng Wang;
Yishi Zhu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This paper using index analysis method, knowledge of venture capital as well as index funds investment ideas, successively set up the Markowitz model and the single index model of index investing. Markowitz model for the calculation of the risk of workload is too big and single-index model although accuracy is slightly lower, but can certainly be very well used in practice. Therefore, We use index invest to invest in Shanghai 10 index securities with the single-index model , and apply lingo software to figure out the venture capital portfolio which have different yields. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2454
An Efficient Dynamic Authentication Scheme for Secure Network Coding
Ming He;
Hong Wang;
Lin Chen;
Zhenghu Gong;
Fan Dai
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Network coding based applications are notoriously susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. However, existing packets authentication schemes for network coding either incur high computation overhead, or are vulnerable to arbitrary collusion among attackers. In this paper, we proposed a novel dynamic authentication scheme for secure network coding by dynamically using the linear vector subspaces of network coding. The scheme can efficiently detect packets generated by pollution attackers, and effectively resist arbitrary collusion among attackers. Our work is an innovative dynamic solution to frustrate pollution attacks with arbitrary collusion among attackers, and authentication cost can be further reduced by employing batch authentication in participating nodes. In addition, our scheme provides an efficient packet authentication without requiring the existence of any extra secure channel. Security analysis and simulations results demonstrate the practicality and efficiency of our scheme. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2470
Enhance the Performance of Virtual Machines by Using Cluster Computing Architecture
Chia-Ying Tseng;
Kang-Yuan Liu;
Liang-Teh Lee
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Virtualization is a very important technology in the IaaS of the cloud computing. User uses computing resource as a virtual machine (VM) provided from the system provider. The VM's performance is depended on physical machine. A VM should be deployed all required resources when it is created. If there is no more resource could be deployed, the VM should be move to another physical machine for getting higher performance by using VM's live migration. The overhead of a VM's live migration is 30 to 90 seconds. If there are many virtual machines which need live migration, the cost of overhead will be very much. This paper presents how to use cluster computing architecture to improve the VM's performance. It will enhance 15% of per-formance compared with VM's live migration. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2486
Hyper-chaotic LÜ System Simulation Design of Digital Circuit Based on DSP Builder
Zhang Xiaohong;
Zhang Zhiguang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In order to overcome sensitive defects of components deviations and environment defects in analog circuit design, a novel four-dimensional hyperchaotic systems is constructed based on LÜ system. Basic nonlinear dynamics characteristics are analyzed to the new system. By optimizing the design of sampling frequency selection, gain adjustments, parameter configuration etc., the hyperchaotic circuit runs stably while the signal amplitude is reasonably controlled. Curves of the digital chaotic sequence show smooth without jagged shape. The circuit can be applied to other digital realization of chaotic systems with commonality and expandability. Its experimental results fully consistent with phase space structures of the continuous chaotic system, which shows the development of chaotic systems based on FPGA is feasible and practical. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2503
Center Line Coordinates Survey for Existing Railway by 3-D Constraints Method
Hui Wei;
Hongtao Zhu;
Zhiyong Wang;
Weijun Wu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Since the maintenance of HSR depends both on inner geometries and outer geometries information of track, it’s necessary that the survey technologies could measure the smoothness and coordinates of track in a high-density manner. But the existing technologies for track survey are either inaccurate or inefficient for HSR maintenance, the problem about track survey arises with the rapid development of high-speed rail (HSR) in China. To meet the demands on track smoothness survey of existing line, a method denoted as 3-D Constraints Method is introduced in this paper. The general principle of the method is obtaining center line locus with location information by means of survey trolley and CP-Ⅲ stakes. By measuring the distances between trolley and CP-Ⅲ stakes, the boundary condition could be determined. So, the problem of center line calculation is transformed into the problem of definite integral for FOG signals. Accordingly, an algorithm of coordinate calculation is given. With the constraints form CP-Ⅲ stakes, the coordinates of center line could be obtained in a defined accuracy. Finally, the simulation result shows that the method is effective. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2556
Electric and Thermal Properties of a Single Phase Cable Buried in Soil: An Analysis with the Finite Element Method (FEM)
Kanikella Sushman Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Current carrying capacity of power cable should be determined by the maximum operating temperature which the insulation can withstand. The temperature rise in cable is mainly due to Joule’s loss in conductor and induced eddy loss in sheath. In this paper, based on the coupled electromagnetic-thermal theory, the power losses calculated in electric field analysis are used as the input data of thermal analysis to predict the temperature rise in different layers of cable. The Distribution radial temperature characteristic analyzed with the method of finite element. Result obtained indicates that the radial temperature distribution of the Single Phase cable do not flattened distribution. It is showed that the highest distribution radial temperature in the conductor shares, while the cable insulation near grounded showed lower distribution temperature as according to given boundary condition. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2086
A New Multi-tree and Dual Index based Firewall Optimization Algorithm
Cuixia Ni;
Guang Jin;
Xianliang Jiang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Using statistical analysis strategy, a large-scale firewall log files is analyzed and two main characteristics, the protocol field and the IP address field, is extracted in this paper. Based on the extracted features and the characteristics of multi-tree and dual-index strategy, we design a better firewall optimization algorithm. Compared with the Stochastic Distribution Multibit-trie (SDMTrie) algorithm, our proposed algorithm can greatly decrease the preprocessing time and improve the searching and filtering process. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2465
Automated Guide Vehicles Dynamic Scheduling Based on Annealing Genetic Algorithm
Zou Gan;
Li Tao;
Qin Ying
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Dispatching automated guided vehicles (AGVs) is the common approach for AGVs scheduling in practice, the information about load arrivals in advance was not used to optimize the performance of the automated guided vehicles system (AGVsS). According to the characteristics of the AGVsS, the mathematical model of AGVs scheduling was established. A heuristic algorithm called Annealing Genetic Algorithm (AGA) was presented to deal with the AGVs scheduling problem,and applied the algorithm dynamically by using it repeatedly under a combined rolling optimization strategy. the performance of the proposed approach for AGVs scheduling was compared with the dispatching rules by simulation. Results showed that the approach performs significantly better than the dispatching rules and proved that it is really effective for AGVsS. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2481
Voice Collection under Different Spectrum
Min Li;
Yu-duo Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
According to the short-time Fourier transform theory and principle of digital filtering, this paper established a mathematical model called collection of voice signal collection at different spectrum. The voice signal was a non-stationary process, while the standard Fourier transform only applied to the periodic signal, transient signals or stationary random signal. Therefore, the standard Fourier transform could not be directly used for the speech signal. By controlling the input different types and parameters, this paper analyzed the collected original voice signal spectrum with the use of MATLAB software platform. At the same time, it realized the extraction, recording and playback of the speech signal at different frequencies. Therefore, the waveforms could be displayed obviously on the graphic user interface and voice effect could be more clearly. Meanwhile, the result was verified by the hardware platforms, which consisted of TMS320VC5509A [1] chip and TLV320AIC23 voice chip. The results showed that the extraction of voice signal under different spectrum model was scientific, rational and effective. http://dx.doi.org/10.11591/telkomnika.v11i5.2498
Research on The Mechanical State Parameter Extraction Method of High Voltage Circuit Breakers
Yang Tianxu;
Wang jianwei;
Hu Xiaoguang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
High voltage circuit breakers play an important role in the power system. So it is necessary to implement the state detection of breakers in order to ensure stable and reliable running of the grid. The purpose of state detection is to provide reliable basis of maintenance by extracting mechanical state parameters accurately. This paper mainly focuses on the coil current signal feature extraction algorithm. To settle the problem of too much noise mixed with the current signal and signal distortion, the discrete wavelet transform algorithm is used to extract the coil current signal parameters. This paper also designs the FIR filter to extract stroke and speed parameters from travel-time waveform. The experiments show that the difference between the theoretical results and test results processed by the method in this paper is very small and the test results are able to accurately reflect operation states and mechanical features of high voltage circuit breakers. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2550