Articles
80 Documents
Search results for
, issue
"Vol 11, No 5: May 2013"
:
80 Documents
clear
Sequence Phase Analysis of Phased Rectifier
Chen Zhong-Xiao;
Li Yan-Fang;
Zhang Li-Guang;
Chen Xing-Yu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
At present, three-phase bridge type full controlled is the most widely applied in all kinds of rectifier circuit. To guarantee the normal work of the phase control circuit, it is the most important thing that should be according to the size of the triggering angle at the right moment to the thyristor trigger of the circuit on effective puls. Nature commutation point is the earliest time of the thyristor trigger conduction, it is the starting point of thyristor trigger calculation angle, if want to change the size of the thyristor can only be based on this increase. It is difficult that to find a natural commutation point of the rectifier circuit. Find nature commutation point can be analyzed corresponding thyristor turn-on. But generally find natural commutation point will be lag behind, lead to trigger angle lags behind, according to this problem can make anyone phase voltage delay after zero, so natural commutation point can make the output voltage to achieve maximum. In fact, the above process is to realize sequence analysis and sequence adaptive. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2460
Soure and Transmission Control for Wireless Visual Sensor Networks with Compressive Sensing and Energy Harvesting
Lei You;
Yutong Han;
Sumei Li;
Xin Su
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The lifetime of the emerging Wireless visual sensor network (WVSN) is seriously dependent on the energy shored in the battery of its sensor nodes as well as the compression and resource allocation scheme. In this paper, the energy harvesting technology was adopted to provide almost perpetual operation of the WVSN and compressed-sensing-based encoding was used to decrease the power consumption of acquiring visual information at the front-end sensors. A Dynamic Source and Transmission Control Algorithm (DSTCA) was proposed to jointly determine source rate, source energy consumption, and the allocation of transmission energy and available bandwidth under energy harvesting and queue stability constraints. A virtual energy queue was introduced to control the resource allocation and the measurement rate in each time slot. The algorithm can guarantee the stability of the visual data queues in all sensors and achieve near-optimal performance. The distributed implementation of the proposed algorithm was discussed and the achievable performance theorem was also given. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2476
A Robot Control System Based on Gesture Recognition Using Kinect
Biao MA;
Wensheng XU;
Songlin WANG
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The Kinect camera is widely used for capturing human body images and human motion recognition in video game playing, and there are already some research works on gesture recognition. However, to achieve the anti-interference performance, the current recognition algorithms are often complex and tardiness, and most of the applications are based on the incomplete gesture library and not all hand gestures can be recognized. This paper explores a new method and algorithm which can describe all five fingertips for each hand in any time for hand gesture recognition with the Kinect system. The hand images are processed to build the hand models which are then compared with the gesture library for gesture recognition. After hand gestures are recognized with high accuracy and less computing, control commands corresponding to hand gestures are sent from the hand gesture recognition system to a hexagon robot controller wirelessly, the hexagon robot can then be controlled wirelessly and change its shape according to the hand gesture command. Thus the robot can interact with humans promptly through the gesture recognition system. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2493
Wavelet Cesptral Coefficients for Isolated Speech Recognition
T. B. Adam;
M. S. Salam;
T. S. Gunawan
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The study proposes an improved feature extraction method that is called Wavelet Cepstral Coefficients (WCC). In traditional cepstral analysis, the cepstrums are calculated with the use of the Discrete Fourier Transform (DFT). Owing to the fact that the DFT calculation assumes signal stationary between frames which in practice is not quite true, the WCC replaces the DFT block in the traditional cepstrum calculation with the Discrete Wavelet Transform (DWT) hence producing the WCC. To evaluate the proposed WCC, speech recognition task of recognizing the 26 English alphabets were conducted. Comparisons with the traditional Mel-Frequency Cepstral Coefficients (MFCC) are done to further analyze the effectiveness of the WCCs. It is found that the WCCs showed some comparable results when compared to the MFCCs considering the WCCs small vector dimension when compared to the MFCCs. The best recognition was found from WCCs at level 5 of the DWT decomposition with a small difference of 1.19% and 3.21% when compared to the MFCCs for speaker independent and speaker dependent tasks respectively. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2510
Electromagnetic Vector Sensor array parameter estimation method
Lanxiang Zhu;
Yaowu Shi;
Yiran Shi;
Life Deng;
Hongwei Shi
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Joint estimation method for DOA and polarization parameters of single electromagnetic vector sensor is mostly concerned in radar signal processing now. This paper presents a new algorithm which uses the cyclostationary property of signal. It gets the estimation of DOA and polarization parameters from the noise subspace with minimum norm method. This method can reduce the estimate error of noise subspace vector. At the same time, it is immune to the additional stationary noise of any distribution and interference signals with different cyclic frequencies. Method has been tested by computer simulation and the test result is show in the paper. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2562
Real-time Pose Measurement of Parallel Robot Based on GRNN
Gao Guoqin;
Zhang Zhigang;
Niu Xuemei
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The real-time pose measurement of parallel robot helps to achieve the closed loop pose control and improve the control and operating performance of parallel robot. But it is difficult to implement the real-time pose measurement directly. In order to solve the pose measurement problem of a 6-DOF parallel robot, the kinematics analysis of the parallel robot is made, and a Generalized Regression Neural Network which has fast convergence and strong nonlinear mapping ability is established by setting the desired pose and its inverse kinematics results as the neural network training samples to implement the map of parallel robot from the joint variable space to the work variable space. Finally, the real-time pose measurement of parallel robot is achieved by using the trained neural network and the actual motion states of the active joints easily detected. The simulation experiment results show that the method of measuring the parallel robot pose based on the GRNN has the faster convergence rate and higher measurement accuracy than those of the BPNN and RBFNN methods. The research establishes the basis for the direct closed control of parallel robot pose. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2455
A Two-hop Collaborative Localization Algorithm for Wireless Sensor Networks
Shaoping Zhang;
Hong Pei
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Localization technology is one of the key supporting technologies in wireless sensor networks. In this paper, a two-hop collaborative multilateral localization algorithm is proposed to localization issues for wireless sensor networks. The algorithm applies anchor nodes within two hops to localize unknown nodes, and uses the minimum range error estimation method to compute coordinates of the unknown nodes. If an unknown node can not be localized through two-hop anchor nodes, it is localized by anchor nodes and localized nodes within two hops through auxiliary iterative localization method. Simulation results show that the localization accuracy of this algorithm is very good, even in larger range errors. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2471
Impulsive Control and Synchronization of Rössler Chaotic System
Yan Yan;
Wang Kaihua;
Gui Zhanji
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In this paper, synchronization between two Rössler Chaotic Systems with impulsively controlling is established by using the criteria on uniform equi-boundedness and equi-Lagrange stability for impulsive systems. After several theoretical derivations, some simulation results are given to demonstrate our results. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2487
Simulation of Wear Particles on Electric-field Intensity Distribution Around Conductors
Zhao Meiyun;
Liu Zhenglin;
Zhao Xinze;
Zhang Shaoqing
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Taking LGJ150/25 as the study object, a finite element simulation model of space around the wire with fretting wear particles was built, which was used to study the influence of the size, the shape and the distribution of the fretting wear particles on electric-field intensity distribution around transmission wires. It is of important the theoretical significance and application prospects for this work to reduce the energy loss and the electromagnetic interference. The simulation result are as follows: in the case of the same loading voltage, when particles is higher than wire maximum diameter, the maximum field intensity around the wire is sharply increased; Along with increase of the radius of curvature of the particles, the maximum field intensity will be reduced; The degree of irregularity of particles distribution is larger, the maximum field intensity value is bigger. According to the relationship between the field intensity distribution and the corona inception voltage, it can be concluded that with the increase of the maximum field intensity, the corona inception voltage can be reduced, so corona inception voltage will be directly affected by fretting wear particles. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2504
Edge Steganography for Binary Image
Hongxia Wang;
Gouxi Chen;
Meng Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In order to improve the steganographic robustness of the algorithm in binary images, suppose an new steganographic method which deals with the edge of the binary image using mathematical morphology and combines F5 encoding method to embedded information. Marginalization and reconstruction on binary image by dilation and erosion operations, and tag blocks that can embed information to. Finally embed secret information using F5 algorithm. Through experiments and analysis it comes out the steganographic robustness of the algorithm can be enhanced, and have a small changes on the carrier image quality after embedding information, and also has a good embedding capacity. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2557