cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 59 Documents
Search results for , issue "Vol 12, No 10: October 2014" : 59 Documents clear
Lock-in Amplifier as a Sensitive Instrument for Biomedical Measurement : Analysis and Implementation Yasser Abd Djawad; Janice Kiely; Patrick Wraith; Richard Luxton
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7214-7222

Abstract

A measuring instrument plays important role in the biomedical measurement since the biological process in living organism generates very weak signal. Therefore, a reliable and sensitive measuring instrument is needed. In this study, a lock-in amplifier was analysed and tested. This paper presents an experiment to investigate the lock-in amplifier for biomedical measurement. An experiment using RC (resistor capacitor) tissue model to measure the voltage change related to impedance change was performed using a lock-in amplifier to evaluate the accuracy of the lock-in amplifier. Three different values of the capacitor in the RC tissue model were applied regarding to simulate small impedance changes. The measurement results were compared with the theoretical calculation and an impedance measurement system. An error analysis was conducted to investigate the accuracy of the measurement. The comparison result showed that impedance measurement using lock-in amplifier is an effective technique, which could able to measure very small voltage regarding impedance change in the RC tissue model.
Provably Secure and Efficient ID-based Strong Designated Verifier Signature Scheme with Message Recovery Min Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7343-7352

Abstract

Many ID-based strong designated verifier signature schemes have been proposed in recent years. However, most of them did not give the rigorous security proofs and did not satisfy the strongness property that anyone except the designated verifier can not check the validity of a designated verifier signature, In addition, considering some special applications, these schemes have larger data size of communication. To overcome those problems, exploiting message recovery techniques which are regarded as a useful method to shorten ID-based signatures' size, we put forward an efficient ID-based strong designated verifier signature schemes with message recovery and give its rigorous security proof in the random oracle model based on the hardness assumptions of the computational Bilinear Diffie-Hellman problem in this paper. To the best of our knowledge, it is the first ID-based strong designated verifier signature schemes with message recovery and rigorous security proofs. Due to its merits, it can be used in some special environments where the bandwidth is one of the main concerns, such as PDAs, cell phones, RFID etc.
Perfect Forward Secure ID-based Key Agreement Protocol in Group Communication Pengshuai Qiao
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7471-7477

Abstract

Several identity-based key agreement protocols using bilinear pairing have been proposed in recent years and none of them has achieved all required security properties. In this paper, we firstly propose an ID-based one round authenticated group key agreement protocol with bilinear pairings, where all participants can generate the group session key in one round. Based on the intractability of elliptic curve discrete logarithm problem, every user’s private key can be proved to be secure. Also an extended version of one round authenticated group key agreement protocol is given, it provide perfect forward secrecy and avoid key escrow by the Key Generation Center.  Finally, a comprehensive security analysis and a comprehensive security analysis are provided. By comparing with other protocols, the proposed protocol requires lower computation cost.
Assessment of Intelligent Substation Based on an Improved Fuzzy Sets Method Yuanchao Hu; Lina Yao; Jiangjun Ruan; Yunzhu An; Fan Chen
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7082-7091

Abstract

In the construction process of smart grid, an assessment on primary equipments intelligent transformation is an urgent content in the first batch of intelligent substation pilot project. Wide investigation of intelligent substation pilot projects was conducted seriously in several regional power grids in China. An mathematical model was established to assess the substation primary equipments intelligent transformation firstly; then, the Vague sets multi-objective decision theory was applied to the assessment model and the consistency inspection and weight solving method of Vague set theory was improved in this paper. Finally, a practical example was given to show the rationality and accuracy of the above improved method. The method can provide practical guidance to assess primary equipments intelligent transformation.
Effects of Non-Uniform Channel Geometry on Double-Gate MOSFET Performance Xu Huifang; Dai Yuehua; Zheng Changyong; Xu Jianbin; Yang Jin; Dai Guangzhen
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7186-7190

Abstract

A Double-gate (DG) MOSFET with non-uniform channel (NUC) geometry, that is, the silicon thickness of embedded in double-gate is varied linearly from drain to source, is proposed. To quantitatively assess the effects of the NUC geometry on electrical characteristics of DG MOSFETs, the short-channel effects (SCEs) and the on-state current are numerically calculated for the device with different non-uniform channel thickness, channel length and gate oxide thickness respectively. To the proposed structure, the SCEs are suppressed, the subthreshold swing becomes smaller and the on-state current is significantly improved when the thickness of silicon lied at source becomes thinner, showing better performances than the conventional DG MOSFETs.
Research on the Modulation Performance in GPON System Li Li; Chen Yan-Tao; Zhang Ji-Jun; Li Zhi-Rui; Cheng Wan-Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7304-7310

Abstract

This paper mainly does research and analysis on anti-dispersive performance and anti-nonlinear performance for intensity modulation formats such as NRZ, RZ, CS-RZ, DRZ, MD-RZ in 40Gbps high-speed single-channel optical transmission system. It compares the five pattern modulation formats in dispersion tolerance, nonlinear tolerance, and advantages and disadvantages in transmission distance. Anti-nonlinear effect ability of CSRZ, RZ are stronger than that of NRZ code; in the single-channel transmission system, DRZ and improved modulation format MDRZ have better resistance foranti-nonlinear performance, so they are suitable for long-distance transmission. RZ has the minimum dispersion tolerance. NRZ than RZ has higher spectrum efficiency than RZ, and thus have a better dispersion tolerance. CSRZ code has higher spectral efficiency, higher dispersion tolerance and nonlinear tolerance than RZ code, making it more suitable for long distance transmission.
Research and Realization of Wireless Sensor Networks Database Ping Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As the core application of wireless sensor network technology, Data management and processing have become the research hotspot in the new database. This article studied mainly data management in wireless sensor networks, in connection with the characteristics of the data in wireless sensor networks, discussed wireless sensor network data query, integrating technology in-depth, proposed a mobile database structure based on wireless sensor network and carried out overall design and implementation for the data management system. http://dx.doi.org/10.11591/telkomnika.v12i10.5469 
A New Fusion Tracking Method with Unknown Noise Sun Tao; Qin Lu-Fang; Li Wei; Li Jun; Cao Jie
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7262-7273

Abstract

In order to sovle the problem of video target tracking problem, this paper proposed a new kind of particle filter with unknown statistical characteristics of noises. This paper derivates the distribution function of statistical properties in detailed with correlative noise by the establishment model of related noise, and gives the real-time estimation equation of the noise statistical characteristics and the system state. The new algorithm reduced the estimation error effectively and improved the anti-noise ability of the system. Under the improving particle filter framework, we used color and motion edge character as observation model and fused multi features weights through the D-S evidence theory. The experimental results showed that the method proposed in this paper has high precision and strong robustness to target tracking under the complicated conditions.
Networked automatic test system based on message-oriented middleware Xiong Fengguang; Han Xie
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7395-7403

Abstract

Abstract: Aim at thecurrent status of automatic test system that focuses only on a single or thesame type of weapons' performance testing, a networked automatic test system basedon message-oriented middleware is proposed in this paper, and innerarchitecture and process of pus/sub in message-oriented middleware aredescribed. Basing on the message-oriented middleware, the networked automatictest system can shield the complexity and diversity of the bottom test systemand test equipment, and can realize cross-platform communication of varioustest data about weapons. Experiments show that the networked automatic test systembased on message-oriented middleware is an integrated test platform which can providecomprehensive performance test for coordinated engagement on a variety ofweapons.
Study on Commitment Schemes of Secure Multi-party Computation Xiaoqiang Guo; Yan Yan; Lihong Li; Hong Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7523-7532

Abstract

The problem of secure multi-party computation(SMPC) is one of the most fundamental problems in information security. First, we introduce the basic concept of SMPC and four SMPC basic agreement: key distribution,oblivious transfer, bit commitment and zero knowledge proof. Secondly, we separately illustrate commitment schemes  commitment transfer protocol, commitment sharing protocol and commitment multiplication protocol. Finally, we present unconditionally secure multi-party computation with a passive adversary, an active adversary, general adversary structures.

Filter by Year

2014 2014


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue