Articles
80 Documents
Search results for
, issue
"Vol 11, No 6: June 2013"
:
80 Documents
clear
A Comparative Study of Control Methods for Induction Motor and High Performance Z-source Inverter
Pham Cong Thanh;
Shen An Wen
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Design studies of the most suitable controller for the speed of induction motor (SIM) and peak DC-link voltage (PDV) of high performance z-source inverter (HP-ZSI) greatly affects performance of hybrid electric vehicles. This paper is to give comprehensive analyses comparison and evaluations of the different control techniques as PI controller, self-tuning fuzzy PI controller (SFP) and genetic algorithms optimal tuning gains of the PI controller for controlling the SIM based on criteria of the integral of the absolute value of speed error. With control PDV, this paper also presents comparisons of the different techniques as PI controller, fuzzy logic controller, SFP based on observation of its response and total harmonic distortion of current. All methods are applied to the closed loop of the SIM which relies on direct torque control combined with modified space vector modulation and closed loop of PDV in HP-ZSI. These methods are verified by Matlab software. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2445
Deterministic key distribution scheme based on the non-locality of unentangled states
Xiaoyu Li;
Qiuyu Zhao
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In this paper we provide a deterministic key distribution scheme based on the non-locality of untangled states in which people can share a predeterministic string as the key. The fundamental Laws of quantum mechanics guarantee that the scheme is unconditionally secure. There are no entangled states or complex quantum operations needed in our scheme. We show that our scheme is easy to carry out in practice. Moreover our scheme is robust against possible noise and attacks. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2611
Distributed Control System in Electrical Heaters of the Public Buildings
Jianhua Ren;
Wei Wang;
Tingchao Yang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Being with many advantages such as environmental protection, controllable, facilitate measurement etc, electric heating has been promoted actively in some places .For public buildings with huge energy consumption, electric heating intelligent controlling may be the key to achieve energy conservation. In this paper, visual distributed control system (DCS) was presented in electric heating of the public buildings. In this control system, a PC was used as the host, and RS232/485 interface converter was used as serial interface of mutual conversion .Through industrial standard RS485 bus with high reliability and low cost which was the link between the host and many sets of thermostat, a one-to-many communication network was formed. The MCU of the thermostats was ATMega8 microcontroller. Meanwhile, DS18B20 integrated temperature probe was used in temperature sensor .Through the DCS test online,it met the need of each individual heating unit. Therefore, unnecessary heat waste was reduced, heating costs were saved. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2660
The Transplantation of BOA Based on Linux3.0.1 and S3C6410
Jianmin Wang;
Haibo Wei
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The web server is a tool of information queries and information dissemination based on hypertext. Special software didn’t need to be installed by the users, and can access the embedded devices by accessing the browser through a general-purpose PC. In this paper, the embedded Web Server BOA transplantation, in the latest ARM11 architecture S3C6410 processor and version of the Linux3.0.1 operating system and gave an example of how to access the browser to control the development Board as the instance for LED lights. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2677
Entropy-based Evaluation Method of Design Scheme for Helicopter Transmission
Wang Haiwei;
Liu Geng;
Yang Zhanduo;
Wei Zhongsheng
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
To choose the best design scheme of helicopter transmission, and bring out excellent comprehensive performance for helicopter, technical criteria architecture of helicopter transmission is analyzed. Scheme criteria evaluation matrix is standardized and criteria weight vector of every design scheme is optimized. According to the principle of minimum deviation of design scheme evaluation, single scheme evaluation problem is programmed. Uncertainty factors of criteria weight are analyzed, and entropy is introduced to describe these uncertainties. In addition to the maximum entropy theory, an evaluation model of design schemes is formed, which is solved by constructing a Lagrange function and a nonlinear system of equations. The example demonstrates validity of the proposed evaluation method. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2701
Architecture Design of the Vehicle Tracking System Based on RFID
Jianxin Deng
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Vehicle tracking plays more important roles in modern transportation and logistics operation. This paper deals with a new approach to track vehicles based on RFID (Radio Frequency Identification) technology. The vehicle tracking system is designed overallly supported by Axiomatic Design theory.The basic steps of vehicle tracking based on RFID are developed and a six-layered architecture for the vehicle tracking system integrating databases, RFID tags, RFID readers, data centers, networks and user interface is presented, where the positions of vehicles are attained directly by compared the RFID readers collecting vehicle RFID tags their position information in the database. It is shown that this vehicle tracking method uses RFID more fully, the architecture with clear levels, adapts to the future technical and practical requirements, and can help fuse more complicated applications like intelligent charging and cargo tracking. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2606
Digital Dental X-Ray Image Segmentation and Feature Extraction
Abdolvahab Ehsani Rad;
Mohd Shafry Mohd Rahim;
Alireza Norouzi
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The process of analysis of such images is important in order to improve quantify medical imaging systems. It is significant to analysis the dental x-ray images we need features of image. In this paper we present a method for segmentation and feature extraction of dental x-ray images. The proposed method has been implemented by using level-set method for segmentation after image enhancement and illustrate contour for teeth to complete the segmentation step. Furthermore, we extracted multiple features of dental x-ray images using texture statistics techniques by gray-level co-occurrence matrix. Extracted data can perform to obtain the teeth measurements for automatic dental systems such human identification or dental diagnosis systems. Preparatory experiments show the significance of the proposed method to extract teeth from an x-ray image. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2655
A Dynamic Hashing Algorithm Suitable for Embedded System
Li Jianwei;
Chen Huijie
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
With the increasing of the data numbers, the linear hashing will be a lot of overflow blocks result from Data skew and the index size of extendible hash will surge so as to waste too much memory. This lead to the above two Typical Dynamic hashing algorithm don’t suitable for embedded system that need certain real-time requirements and memory resources are very scarce. To solve this problem, this paper was proposed a dynamic hashing algorithm suitable for embedded system combining with the characteristic of extendible hashing and linear hashing.it is no overflow buckets and the index size is proportional to the adjustment number. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2672
Modeling Technology in Traveling-Wave Fault Location
Tang Jinrui;
Yin Xianggen;
Zhang Zhe
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Theoretical research and equipment development of traveling-wave fault location seriously depend on digital simulation. Meanwhile, the fault-generated transient traveling wave must be transferred through transmission line, mutual inductor and secondary circuit before it is used. So this paper would maily analyze and summarize the modeling technology of transmission line and mutual inductor on the basis of the research achievement. Firstly several models of transmission line (multiple Π or T line model, Bergeron line model and frequency-dependent line model) are compared in this paper with analysis of wave-front characteristics and characteristic frequency of traveling wave. Then modeling methods of current transformer, potential transformer, capacitive voltage transformer, special traveling-wave sensor and secondary cable are given. Finally, based on the difficult and latest research achievements, the future trend of modeling technology in traveling-wave fault location is prospected. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2691
Cotton Pests and Diseases Detection Based on Image Processing
Qinghai He;
Benxue Ma;
Duanyang Qu;
Qiang Zhang;
Xinmin Hou;
Jing Zhao
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Extract the damaged image form the cotton image in order to measure the damage ratio of the cotton leaf which caused by the diseases or pests. Several algorithms like image enhancement, image filtering which suit for cotton leaf processing were explored in this paper. Three different color models for extracting the damaged image from cotton leaf images were implemented, namely RGB color model, HSI color model, and YCbCr color model. The ratio of damage (γ) was chosen as feature to measure the degree of damage which caused by diseases or pests. This paper also shows the comparison of the results obtained by the implementing in different color models, the comparison of results shows good accuracy in both color models and YCbCr color space is considered as the best color model for extracting the damaged image. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2721