Articles
59 Documents
Search results for
, issue
"Vol 12, No 10: October 2014"
:
59 Documents
clear
Lock-in Amplifier as a Sensitive Instrument for Biomedical Measurement : Analysis and Implementation
Yasser Abd Djawad;
Janice Kiely;
Patrick Wraith;
Richard Luxton
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7214-7222
A measuring instrument plays important role in the biomedical measurement since the biological process in living organism generates very weak signal. Therefore, a reliable and sensitive measuring instrument is needed. In this study, a lock-in amplifier was analysed and tested. This paper presents an experiment to investigate the lock-in amplifier for biomedical measurement. An experiment using RC (resistor capacitor) tissue model to measure the voltage change related to impedance change was performed using a lock-in amplifier to evaluate the accuracy of the lock-in amplifier. Three different values of the capacitor in the RC tissue model were applied regarding to simulate small impedance changes. The measurement results were compared with the theoretical calculation and an impedance measurement system. An error analysis was conducted to investigate the accuracy of the measurement. The comparison result showed that impedance measurement using lock-in amplifier is an effective technique, which could able to measure very small voltage regarding impedance change in the RC tissue model.
Provably Secure and Efficient ID-based Strong Designated Verifier Signature Scheme with Message Recovery
Min Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7343-7352
Many ID-based strong designated verifier signature schemes have been proposed in recent years. However, most of them did not give the rigorous security proofs and did not satisfy the strongness property that anyone except the designated verifier can not check the validity of a designated verifier signature, In addition, considering some special applications, these schemes have larger data size of communication. To overcome those problems, exploiting message recovery techniques which are regarded as a useful method to shorten ID-based signatures' size, we put forward an efficient ID-based strong designated verifier signature schemes with message recovery and give its rigorous security proof in the random oracle model based on the hardness assumptions of the computational Bilinear Diffie-Hellman problem in this paper. To the best of our knowledge, it is the first ID-based strong designated verifier signature schemes with message recovery and rigorous security proofs. Due to its merits, it can be used in some special environments where the bandwidth is one of the main concerns, such as PDAs, cell phones, RFID etc.
Perfect Forward Secure ID-based Key Agreement Protocol in Group Communication
Pengshuai Qiao
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7471-7477
Several identity-based key agreement protocols using bilinear pairing have been proposed in recent years and none of them has achieved all required security properties. In this paper, we firstly propose an ID-based one round authenticated group key agreement protocol with bilinear pairings, where all participants can generate the group session key in one round. Based on the intractability of elliptic curve discrete logarithm problem, every user’s private key can be proved to be secure. Also an extended version of one round authenticated group key agreement protocol is given, it provide perfect forward secrecy and avoid key escrow by the Key Generation Center. Finally, a comprehensive security analysis and a comprehensive security analysis are provided. By comparing with other protocols, the proposed protocol requires lower computation cost.
Assessment of Intelligent Substation Based on an Improved Fuzzy Sets Method
Yuanchao Hu;
Lina Yao;
Jiangjun Ruan;
Yunzhu An;
Fan Chen
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7082-7091
In the construction process of smart grid, an assessment on primary equipments intelligent transformation is an urgent content in the first batch of intelligent substation pilot project. Wide investigation of intelligent substation pilot projects was conducted seriously in several regional power grids in China. An mathematical model was established to assess the substation primary equipments intelligent transformation firstly; then, the Vague sets multi-objective decision theory was applied to the assessment model and the consistency inspection and weight solving method of Vague set theory was improved in this paper. Finally, a practical example was given to show the rationality and accuracy of the above improved method. The method can provide practical guidance to assess primary equipments intelligent transformation.
Effects of Non-Uniform Channel Geometry on Double-Gate MOSFET Performance
Xu Huifang;
Dai Yuehua;
Zheng Changyong;
Xu Jianbin;
Yang Jin;
Dai Guangzhen
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7186-7190
A Double-gate (DG) MOSFET with non-uniform channel (NUC) geometry, that is, the silicon thickness of embedded in double-gate is varied linearly from drain to source, is proposed. To quantitatively assess the effects of the NUC geometry on electrical characteristics of DG MOSFETs, the short-channel effects (SCEs) and the on-state current are numerically calculated for the device with different non-uniform channel thickness, channel length and gate oxide thickness respectively. To the proposed structure, the SCEs are suppressed, the subthreshold swing becomes smaller and the on-state current is significantly improved when the thickness of silicon lied at source becomes thinner, showing better performances than the conventional DG MOSFETs.
Research on the Modulation Performance in GPON System
Li Li;
Chen Yan-Tao;
Zhang Ji-Jun;
Li Zhi-Rui;
Cheng Wan-Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7304-7310
This paper mainly does research and analysis on anti-dispersive performance and anti-nonlinear performance for intensity modulation formats such as NRZ, RZ, CS-RZ, DRZ, MD-RZ in 40Gbps high-speed single-channel optical transmission system. It compares the five pattern modulation formats in dispersion tolerance, nonlinear tolerance, and advantages and disadvantages in transmission distance. Anti-nonlinear effect ability of CSRZ, RZ are stronger than that of NRZ code; in the single-channel transmission system, DRZ and improved modulation format MDRZ have better resistance foranti-nonlinear performance, so they are suitable for long-distance transmission. RZ has the minimum dispersion tolerance. NRZ than RZ has higher spectrum efficiency than RZ, and thus have a better dispersion tolerance. CSRZ code has higher spectral efficiency, higher dispersion tolerance and nonlinear tolerance than RZ code, making it more suitable for long distance transmission.
Research and Realization of Wireless Sensor Networks Database
Ping Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
As the core application of wireless sensor network technology, Data management and processing have become the research hotspot in the new database. This article studied mainly data management in wireless sensor networks, in connection with the characteristics of the data in wireless sensor networks, discussed wireless sensor network data query, integrating technology in-depth, proposed a mobile database structure based on wireless sensor network and carried out overall design and implementation for the data management system. http://dx.doi.org/10.11591/telkomnika.v12i10.5469
A New Fusion Tracking Method with Unknown Noise
Sun Tao;
Qin Lu-Fang;
Li Wei;
Li Jun;
Cao Jie
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7262-7273
In order to sovle the problem of video target tracking problem, this paper proposed a new kind of particle filter with unknown statistical characteristics of noises. This paper derivates the distribution function of statistical properties in detailed with correlative noise by the establishment model of related noise, and gives the real-time estimation equation of the noise statistical characteristics and the system state. The new algorithm reduced the estimation error effectively and improved the anti-noise ability of the system. Under the improving particle filter framework, we used color and motion edge character as observation model and fused multi features weights through the D-S evidence theory. The experimental results showed that the method proposed in this paper has high precision and strong robustness to target tracking under the complicated conditions.
Networked automatic test system based on message-oriented middleware
Xiong Fengguang;
Han Xie
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7395-7403
Abstract: Aim at thecurrent status of automatic test system that focuses only on a single or thesame type of weapons' performance testing, a networked automatic test system basedon message-oriented middleware is proposed in this paper, and innerarchitecture and process of pus/sub in message-oriented middleware aredescribed. Basing on the message-oriented middleware, the networked automatictest system can shield the complexity and diversity of the bottom test systemand test equipment, and can realize cross-platform communication of varioustest data about weapons. Experiments show that the networked automatic test systembased on message-oriented middleware is an integrated test platform which can providecomprehensive performance test for coordinated engagement on a variety ofweapons.
Study on Commitment Schemes of Secure Multi-party Computation
Xiaoqiang Guo;
Yan Yan;
Lihong Li;
Hong Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7523-7532
The problem of secure multi-party computation(SMPC) is one of the most fundamental problems in information security. First, we introduce the basic concept of SMPC and four SMPC basic agreement: key distribution,oblivious transfer, bit commitment and zero knowledge proof. Secondly, we separately illustrate commitment schemes commitment transfer protocol, commitment sharing protocol and commitment multiplication protocol. Finally, we present unconditionally secure multi-party computation with a passive adversary, an active adversary, general adversary structures.