Articles
80 Documents
Search results for
, issue
"Vol 11, No 6: June 2013"
:
80 Documents
clear
Novel Key Storage and Management Solution for the Security of Wireless Sensor Networks
Ali Hassan Sodhro;
Ye Li;
Madad Ali Shah
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
As wireless sensor networks continue to grow in usage for distinct applications. Storage (memory) requirement and security are major problems for these resource limited networks. This paper present a novel and an efficient key establishment and management scheme for WSNs, named Random Initial and Master Key (RIMK).We showed that our proposed technique, manages keys randomly with less storage (i.e. only two keys), less communication and computation overhead compared to existing Localized Encryption and Authentication Protocol (LEAP), in which every node uses four different keys in a static pattern and occupy greater storage space, which increases overhead and complexity in the network. Simulation results show that RIMK is more efficient and robust than LEAP. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2703
Comprehensive use of Hip Joint in Gender Identification Using 3-Dimension Data
Sajid Ali;
Zhou Mingquan;
Wu Zhongke;
Abdul Razzaq;
Mohamed Hamada;
Hafeez Ahmed
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Way of walking is a spatio-temporal phenomenon that typifies the motion characteristics of human. In this paper, we propose a human gender identification method based on the outdoor surveillance of human gait using statistical techniques and geometrical function applied to three-dimensional (3D) joint movement data. The statistical techniques are used to define the features of the joint of the human gait, and the geometrical function applied for gender recognition. Our proposed scheme is based on extraction of the concern joint (hip joint) data that provides plentiful information for gender recognition. Here the rotation angle data of a hip joint were computed from the Biovision Hierarchical data (BVH file). The use of BVH file for human gender recognition is a novel feature of our work. The results indicated that the proposed approach is highly reliable for gender recognition. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2274
Moving Vehicle Detection and Tracking Algorithm in Traffic Video
Shisong Zhu;
Min Gu;
Jing Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Aiming at the defects and shortages of traditional moving vehicles detection algorithms, by the analysis and comparison of the existing detection algorithms, we propose an algorithm that combined with frames with symmetric difference and background difference to detect moving vehicle in this paper. First, two different difference images by using frames with symmetric difference and background difference are gained respectively and two binary images can be gained by the appropriate threshold, then the contour of moving vehicles can be extracted by applying OR operation in the two binary images. Finally, the precise moving vehicles will be gained by mathematic morphological methods. In this paper we use Harris operator, Feature Points such as edges and corners are extracted, followed by block-matching to track the Feature Points in successive viedo frames. Many vehicles can be tracked at the same time automatically since the information is obtained from video sequences. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2613
Diagnosis of Hepatocellular Carcinoma Spectroscopy Based on the Feature Selection Approach of the Genetic Algorithm
Shao-qing Wang;
Qiang Liu;
Dong-yue Yu;
Guang-ju Liang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This paper aims to study the application of medical imaging technology with artificial intelligence technology on how to improve the diagnostic accuracy rate for hepatocellular carcinoma. The recognition method based on genetic algorithm (GA) and Neural Network are presented. GA was used to select 20 optimal features from the 401 initial features. BP (Back-propagation Neural Network, BP) and PNN (Probabilistic Neural Network, PNN) were used to classify tested samples based on these optimized features, and make comparison between results based on 20 optimal features and the all 401 features. The results of the experiment show that the method can improve the recognition rate. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2663
A Digital Watermarking Algorithm for Color Image Based on DWT
Huming Gao;
Liyuan Jia;
Meiling Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
An efficient digital watermark embedding algorithm for color image was presented in this paper, which is based on the discrete wavelet transform (DWT) and the spectral characteristics of human vision system. Firstly, three color separations was performed for color image, and color components of color image were transformed by DWT. Secondly, the embedding position of the watermark was confirmed by comparing the energy value of the low frequency sub-band in the transformed blue component and green component. Thirdly, the watermark was made Arnold Transform for encryption and was embedded in the color component with a larger power. Finally, this paper made the simulation experiments to evaluate the performance of the watermark. The simulation results showed that the embedded watermark had good invisibility and robustness for the common image processing, such as filtering, noise, especially compression and cropping. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2681
A Security Mechanism Based on Authenticated Diffie-Hellman for WSN
Xin Yu;
JianJun Fang;
ZhaoLi Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Wireless sensor network (WSN) has been widely used in industrial technology, national defense, robotic system[1], medical and health field. But it is hedged about in various fields due to its security problem. Through the analysis of the characteristics of Bluetooth WSN and its security architecture, this paper gives out a security scheme for Bluetooth WSN including piconet and scatternet. This scheme based on improved Diffie-Hellman achieves authentication in the Bluetooth WSN and defeats threats derived from Bluetooth link-level. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2693
Mathematical Analysis and Application on Mechanical Image of Hybrid Wavelet Transform Algorithm
Fuzeng Yang;
Qiong Liu;
Mengyun Zhang;
Yuanjie Wang;
Yingjun Pu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
To overcome the shortcomings such as significantly de-noising effect and easily losing the details of the image characteristics of the existing image de-noising methods, an image de-noising algorithm based on the hybrid wavelet transform was proposed. The algorithm integrated the advantages of wavelet de-noising retaining image details features and Wiener filter obtaining the optimal solution, and took the images processed by wavelet transform and Wiener filter as male and female of the initial population. The steps of the algorithm are as follows: mapping from image space to coding space, iterating to parents through selection, crossover and mutation operation until the offspring meeting the constraints was obtained, reducing the superior offspring to image space, gaining the approximate optimal solution. Theoretical analyses were made on the core of the algorithm, coding, crossover and mutation. The algorithm was applied to agricultural machinery parts image de-noising such as plough and disk harrow. The results showed that it had the advantages of high peak signal to noise ratio (PSNR), obvious edge characteristics, good vision effect, and so on. The result of the present work implied that the proposed algorithm is an effective and feasible exploration. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2723
A Mixed Two-dimensional Linear Discriminate Method
Shuang Xu;
Min Li;
Yanqiu Cui
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Feature extraction is one of key technologies of the palmprint identification. In the light of the characteristics subspace palmprint identification technology, the two-dimensional principal component analysis, two-dimensional fisher linear discriminant and two-way two-dimensional principal component analysis algorithm is deeply analyzed. Based on two-dimensional subspace palmprint identification algorithm is a direct projection of the palmprint image matrix and is achieved very good results for dimension reduction. This paper proposed a mixed two-dimensional linear discriminant dimension reduction algorithm which can eliminate the relevance of rows and columns to get the best projection vector and extract optimal discriminant information. Experimental results show that the proposed method has faster extraction speed, higher recognition rate and better robustness. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2608
Design and Development of Curious Jojo©: A Go-Green 3D Game on Android
Juliana A. Abubakar;
Ariffin Abd. Mutalib;
Dendi Permadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Various campaigns such as ‘Save the Earth’, ‘Earth Hour’, and ‘Reduce, Reuse, Recycle’ are held to create environmental awareness among the general public. The effort is seen endlessly using any means of presentation and communication medium in order to ensure the intended message reach its audience. Meanwhile, the availability of mobile devices and the advent of natural user interfaces have simplified the interaction in games so that it is intuitive for vast audience at different abilities. Hence, this would possibly provide wider audience an engaging experience while playing games and at the same time absorbing the intended message. This article describes the process of designing and developing a go-green tridimensional (3D) game on a mobile platform. It also discusses educational benefits of games and how the concept of environmental awareness is integrated into the game play in order to educate the general public especially the young ones about their social roles. Initial results on performance assessment reveal that the functionality of interactive elements in the game is excellent and young ones did not have difficulties in playing the game. Future work will focus on how 3D mobile games facilitate informal learning process such as inculcating environmental awareness to the general public. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2657
Impact of Distributed Generation on Relay Protections of Distribution Grid
Zhou Bin;
Ying Liming;
Zhu Yonggang;
Huang Chao
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Distributed Generation (DG) generates electricity from many small distributed energy sources or even customer’s small power plants. It always comes up with the terminal customer power quality management and the technology of energy cascade utilization. DG has lots of characteristics such as one single point of access, being power and being load, two operating mode in a grid or as an island, a great deal of application of power electronic devices, easily influenced by natural environmental factors etc. DG has impacts to the original grid in terms of the grid structure, the direction of power flow, the fault current level when a fault happens, etc and subsequently the relay protection mechanism must be looked into. This paper analyses the impact of accessing the DG on the distributed grid in three cases which are the DG accessing to the end of the distributed feeders, to the middle, and the DG accessing to lines, on relay protections. At the end of the paper it also comes up with improvements in detail. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2674