Articles
102 Documents
Search results for
, issue
"Vol 12, No 1: January 2014"
:
102 Documents
clear
Plaintext Related Image Encryption Scheme Using Chaotic Map
Yong Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
A plaintext related image blocking encryption algorithm is proposed in this paper, which includes two kinds of operations on inner-block confusion and inter-block diffusion. Firstly, a float-point lookup table need to be generated by iterating chaotic system; Secondly, choose one of the entries in the look-up table as initial value of chaotic system, and iterate it to produce one secret code sequence for inner-block confusion; Thirdly, by using one pixel value of the former block to locate another entry in the look-up table, iterate it to yield another secret code sequence for inter-block diffusion; Finally, through two rounds of the block-by-block processes, the plain-image will be transformed into the cipher-image. The simulation results show that the proposed method has many good characters.DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3482
Clustering and Hybrid Genetic Algorithm based Intrusion Detection Strategy
Li Liu;
Pengyuan Wan;
Yingmei Wang;
Songtao Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Ad hoc networks face serious security threat due to its inherent weaknesses. Intrusion detection is crucial technology in protecting the security of Ad hoc networks. Recently, Intrusion Detection Systems (IDS) face open issues, such as how to make use of intrusion detection technologies to excavate normal/abnormal behaviors from a lot of initialized data and dig out invasion models later for intrusion detection automatically and effectively. In this paper, we propose an enhanced algorithm combined improved clustering algorithm with Hybrid Genetic Algorithm (HGA), called Enhanced Intrusion Detection Algorithm (EIDA) for intrusion detection in Ad hoc networks. Clustering Algorithm is used to divide the normal/anomalous data from network and system behaviors. Then HGA is used to dig out the invasion rules. Our EIDA is an unsupervised anomaly detection algorithm. The experiment result shows that it is extensible and not sensitive to the sequence of the input data sets. It has the capacity to deal with different types of data and detection rate and false positive rate of intrusion detection has been improved effectively. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3353
Modeling and Simulation of Pump Storage Based on Indirect Field Oriented Control
Othman Hassan Abdalla;
Minxiao Han
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This paper derived the mathematicalmodel of indirect field oriented control (IFOC) applied in pump storage toobtain the variable speed. The two identical seven level H-bridge multilevel converters connected in cascade have been used togenerate 6KV on the rotor side. The inputof power cell of H-bridge cascaded multilevel converter fed from a phase-shifttransformer to reduce the total harmonic distortion of rotor currents. The slip angle of doubly fed asynchronousinduction machine is calculated by using the stator flux of indirect fieldoriented control (IFOC). Theslip angle calculated is used to control of variable speed of the pump storagebased on machine parameters. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3357
Research on Data Integration of the Semantic Web Based on Ontology Learning Technology
Hongsheng Xu;
Ruiling Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Goal of ontology learning is to use machine learning and statistical techniques, by means of automatic or semi-automatic, and obtain the expected from the existing data resources. Web data integration based on ontology is web data mapping information in the source to the process of ontology concepts. The goal of semantic Web is to provide a computer for semantic Internet information can be understood, thus the computer to identify the information, and the automatic interpretation, exchange and processing. The paper presents the research on data integration of the semantic web based on ontology learning technology. Theory and experiments show that compared with the method of concept lattice construction algorithm has certain superiority. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3889
Design and Realization of Dynamic Obstacle on URWPSSim2D
Shuqin Li;
Xiaohua Yuan;
Xiao Chen
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Simulation system is charged with the strategy validation and dual team meets, and as the 2-dimensional simulation platform for underwater robotic fish game, URWPGSim2D is the assigned platform for Chinese underwater robot contest and Robot cup underwater program. By now on URWPGSim2D, there is only static obstacles,thus short of changeableness. In order to improve the changeableness and innovation of robotic fish contest, to extend the space for the programming of contest strategy, and to increase the interest, this paper study the design of dynamic obstacles on URWPGSim2D, and design and implement two kinds of dynamic obstacles, which are the evadible dynamic obstacle and the forcing dribbling obstacle. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3996
Tele-Robotic Assisted Dental Implant Surgery with Virtual Force Feedback
Amjad Ali Syed;
Amir Mahmood Soomro;
Arbab Nighat Khizar;
Xing-guang Duan;
Huang Qiang;
Farhan Manzoor
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The dental implant surgical applications full of risk because of the complex anatomical architecture of craio-maxillofacial area. Therefore, the surgeons move towards computer-aided planning for surgeries and then implementation using robotic assisted tele-operated techniques. This study divided into four main parts. The first part is developed by computer-aided surgical planning by image modalities .The second part is based on Virtual Surgical Environment through virtual force feedback haptic device. The third part is implemented the experimental surgery by integrating the prototype surgical manipulator with the haptic device poses using inverse kinematics method. The fourth part based on monitoring the robotic manipulator pose by using image guided navigation system to calculate the position error of the surgical manipulator. Thus, this tele-robotic system is able to comprehend the sense of complete practice, improve skills and gain experience of the surgeon during the surgery. Finally, the experimental outcomes show in satisfactory boundaries. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3124
A Fast Thresholding Technique in Image Binarization for Embedded System
Jinkun Dou;
Weijun Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In the embedded systems of visual navigation, due to the limitations of images capture working environment conditions, there are sometimes defects of nonuniform illumination and noisy in the captured images. Therefore, global threshold methods are unfeasible. On the contrary, image binarization using local threshold methods are more appropriate. However, local threshold methods which take more time to calculatet can’t satisfy the requirement of real-time performance in embedded systems. In this paper, taking these two limitations into consideration, we proposed an efficient and fast method to determine the threshold value by using integral image and statistical methods which is similar to the local threshold method and meet the requirement of real-time performance in embedded systems. After experiments, for the proposed method, the result has demonstrated that the processing speed is nearly twice the global threshold method. And the processing quality closes to that of local threshold method. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3359
Multiple-feature Tracking Based on the Improved Dempster-Shafer Theory
Jie Cao;
Leilei Guo;
Xing Meng;
Di Wu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Dempster-Shafer evidence theory is widely used in the fields of decision level information fusion. In order to overcome the problem of the counter-intuitive results encountered when using Dempster’s combination rule to combine the evidences which exist high conflict, a modified sequential weighted evidence combination is proposed. Firstly, the credibility of each evidence can obtained based on K-L distance, besides, the uncertainty of each evidence can obtained based on information entropy. Simultaneously, using the uncertainty of each evidence to improve the credibility of each evidence, then the weights of the bodies of evidence are obtained based on the improved credibility of each evidence, the weights generated are used to modify the bodies of evidence including the previous combination result, the previous evidence and the new arriving body of evidence at current step. Finally, according to the Dempster’s combination rule, the weighted average combination results can be obtained. In the experimental part, the improved method is used to fuse video multiple features in target tracking system and compared the results with the standard D-S theory. The simulation results show that the proposed method has better performance. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3364
Design of Information Retrieval System Using Rough Fuzzy Set
Yuemin Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3541
A Chaos Cloud Particle Swarm Algorithm Based Available Transfer Capability
Su Hongsheng;
qi ying
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
A mathematical model for ATC based on optimal power flow was built under the static security constraints, where the maximum of all load nodes in receiving area was considered as aim function. In view of the defects of slow convergence and low accuracy in ATC optimization algorithms, a chaos cloud particle swarm optimization algorithm based on golden section criteria (CCGPSO) was proposed. This method classified the particle swarm into three populations based on golden section judge principles according to fitness level. They are called chaos cloud particles, cloud particles and standard particles respectively. Each population was operated by different processing operations and updating modes. Comparing with other methods, the numerical simulation results of CCGPSO in IEEE-30 bus system demonstrate the higher efficiency and validity in ATC calculation. It is more suitable for solving the large-scale non-linear multi-constraint engineering practical problems.DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3368