Articles
59 Documents
Search results for
, issue
"Vol 12, No 10: October 2014"
:
59 Documents
clear
Higher Efficiency Switching Mode Power Amplifier Design using the Third-Harmonic Peaking Turning Mode
NSHU. Victor;
Z. WenBiao;
M.R. Anjum
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7160-7166
This paper provides the design approach of one stage switching-mode based class F power amplifier (PA).The device’s nonlinear behavior was analyzed to reduce the dissipated power over the active device and therefore the PA efficiency was increase without having to compromise the power amplifier’s size. The load harmonics were controlled so that the drain voltage and the drain current do rarely coincide with each other, thus greatly increase the power performance of the device. Taking the device size and cost parameters into consideration, the design of load harmonic trap circuit was reduced only to the 2nd and 3rd harmonics. The GaN HEMT transistor, for its high-speed switching ability, is used in our design to maximize the output power and the optimized circuit operating at 5.8GHz with output power of 50.98W was simulated. A power added efficiency of 60% with the power gain of 14dB was obtained.
Local Standard Deviation Based Image Quality Metrics for JPEG Compressed Images
Akshay Gore;
H.K. Kansal;
Savita Gupta
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7280-7286
In this paper, we address the Full-Reference (FR) Image Quality Metric (IQM) to assess the quality of JPEG-coded images and we present a new effective and efficient IQA model, called Local Standard Deviation Based Image Quality (LSDBIQ). The approach is based on the comparison of the local standard deviation of two images. The proposed metrics is tested on four well-known databases available in the literature (TID2013, TID2008, LIVE and CSIQ). Experimental results show that the proposed metrics outperforms other models for the assessment of image quality and have very low computational complexity.
Cryptanalysis and Improvement of an Authentication Scheme for Telecare Medical Information Systems
Yun Zhao;
Wenbo Shi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7412-7421
The telecare medical information system (TMIS) could improve quality of medical care since it allows patients to enjoy health-care delivery services in their home. However, the privacy and security influence the development of the TMIS since it is employed in open networks. Recently, Wu and Xu proposed a privacy authentication scheme for the TMIS and claimed that their scheme could overcome weaknesses in previous schemes. However, we will demonstrate that their scheme is venerable to the server spoofing attack and cannot provide user anonymity. To overcome weaknesses in their scheme, we also propose a new authentication scheme for the TMIS. Analysis shows that our scheme not only overcome weaknesses in Wu et al.’s scheme, but also has better performance.
Study on Cooperation between Traffic Control and Route Guidance Based on Real-time Speed
Cao Jie;
Wang Chuan
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7242-7248
Aiming at minimizing the total travel time of the road network, a cooperation model of traffic control and route guidance is built based on real-time speed obtained from cooperative vehicle infrastructure system. Genetic algorithm is used to solve the cooperation model to get the optimal green ratio and guidance rate of flow through transforming genetic algorithm with constraints into unconstrained genetic algorithm by penalty function. The simulation results of an experimental simulation on a small network show that this method can effectively balance the network flow, reduce total travel time and improve the efficiency of road network.
A Geometric Invariants Approach for Molecular Docking
He Jinao;
Fu Hongguang;
Long Huan
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7369-7380
Molecular docking usually suffers from high computational costs. Here we present a novel and efficient approach based on geometric invariants to explore the possible conformations of an atom chain and thus gain new insights into the molecular docking problem. The proposed method is capable of handling atom chains consisting of six or more rotatable dihedral angles, and has several advantages over other existing approaches. The efficiency of our approach is illustrated using real examples, which have never been sufficiently addressed before. In summary, the geometric invariants method is an efficient and useful method for exploring molecular conformational spaces and has a great potential in address the molecular docking problem.
One Kind of Routing Algorithm Modified in Wireless Sensor Network
Nini Wei;
Yi Song
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7495-7500
The wireless sensor networks are the emerging next generation sensor networks, Routing technology is the wireless sensor network communication layer of the core technology. To build reliable paths in wireless sensor networks, we can consider two ways: providing multiple paths utilizing the redundancy to assure the communication reliability or constructing transmission reliability mechanism to assure the reliability of every hop. Braid multipath algorithm and ReInforM routing algorithm are the realizations of these two mechanisms. After the analysis of these two algorithms, this paper proposes a ReInforM routing algorithm based braid multipath routing algorithm.
Research on Static Tension Ratio Characteristic of Double-Vessel Friction Hoist System Components
Xie Lirong;
Ge Laifu;
Kong Jun;
Cheng Jing
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7108-7113
Double-vessel multi-rope friction hoist system, of which the lifting, starting, running, and braking must meet the safety conditions in operation. Non-skid safety boundary conditions were originally determined by Euler’s formula. In order to avoid the complex task of check and check-again calculation in the friction hoist system design. In this research, static tension ratio c, which was closely bonded with anti-skid design was directly brought into the analysis and research on the system. As a result, characteristic of static tension ratio c of component quality of friction hoist system was found, which offers a simple, sound and reliable theoretical foundation for the anti-skid and optimization of system configuration.
Theory of the Solution of Inventive Problems for Flexure Design in Micro-Electro-Mechanical Systems
Huiling Yu;
Shanshan Cui
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7202-7208
In this paper detail of the optimization of a flexure design which is used in many MEMS devices will be presented. Due to a difference in thermal expansion coefficients between the flip-chip bonded MEMS device and the substrate, cooling after bonding can cause the MEMS to buckle; It is necessary to decrease the influence of distortion by using the correct material selection, welding method, weld design, fixture design, temperature control and TRIZ. We can seek out principles that can solve the problem. It can be concluded that an optimal flexure design will include the longest fold length and smallest fold spacing possible. By solving the deformation problem of MEMS devices can promote the development of flip chip technology, and make for the further application of the TRIZ theory in the study of forestry equipment.
Model Construction and Simulation of Weighted Industrial Cluster Complex Network
Lijun Wang;
Lei Wen
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7330-7336
In this paper, we construct a weighted industrial cluster complex network model according to preferential attachment and local world mechanism, in which the logistics amount of business contact between one enterprise and others is defined as edge weight. We simulate and analyze statistic characteristics of the industrial cluster model such as degree distribution, point strength, point strength-point strength correlation, and relationship with degree and point strength. The simulation results show that the degree and point strength distribution are accord with power law distribution, the point strength-point strength correlation is negative, and the relationship with degree and point strength is strongly linear.
On the Security of a Dynamic and Secure Key Management Model for Hierarchical Heterogeneous Sensor Networks
Pengshuai Qiao
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7459-7462
With the development of the wireless communication technology and the sensor technology, the wireless sensor network (WSN) has been used in many applications. However, WSNs suffer from some inherent weaknesses because of restricted communication and hardware capabilities. To achieve essentially secure communication in WSNs, a few of key management models have been proposed since it is the crucial important building block for all security goals in WSNs. Recently, Alagheband and Aref proposed a signcryption scheme and used it to construct a dynamic key management model for hierarchical heterogeneous sensor networks. They also proved that their signcryption scheme is provably secure if the elliptic curve discrete logarithm problem is infeasible. Unfortunately, by giving concrete attacks, we indicate that Alagheband and Aref’s signcryption scheme is not secure in their secure model. The analysis also shows that their key management model is not secure. To solve those weaknesses, we also proposed an improved signcryption scheme.