Articles
101 Documents
Search results for
, issue
"Vol 12, No 2: February 2014"
:
101 Documents
clear
Nontrivial Stable Control Economic Model of Sports Facilities
Kebai Li;
Wenjing Zhang;
Lifei Chen
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Given that multiple regions have their own development speeds of supply and demand for public sports facilities, a dynamic supply and demand control model of multiple regional public sports facilities is built in this paper. With the range of residents' income increases and the public sports facilities supply investment as the control variables, we established a unified construction controlling means by using the Linear Matrix Inequality approach derived from Lyapunov stability theory. As such, this means guarantees that the systems of public sports facilities in multiple regions with various developments are asymptotically stable; meanwhile, it can lower the difficulty of the control. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3888
Characteristics of Electromagnetic Coupling with A Wire through Shielding Enclosure
Yanpeng Sun;
Liwei Sun;
Xiaohe An
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The paper presents a numerical method based on Finite Difference Time Domain (FDTD) in both frequency and time domain for modeling the coupling of an incident electromagnetic pulse(EMP) with a conducting wire through a metallic shielding enclosure with a small aperture. Simulation and analysis are done by radius, length, and number of the wires, the incidence angle of EMP and the polaration angle of electric field in consideration. The simulation result shows that interference of the electromagnetic coupling into the shielding enclosure can be affected in different degrees by above factors. At low frequency, the larger the leakage length, the radius or the number of the wire penetrated into the cavity, the more interference is coupled into the shielding cavity from electromagnetic field. Also, the smaller the incident direction angle of propagation of the electromagnetic pulse or the polarization direction angle of the incident electric field, the more easily the electromagnetic interference is coupled into the cavity. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3984
Research on Single-Variable Current Perturbation Tracking Method for Maximal Power Tracking Control Method of the Solar Power Generation System
WANG Yu-xin;
ZHANG Feng-ge;
LI Lin-lin
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In this paper, the traditional grid-connected PV perturbation method of disturbance near the maximum power point about the problems of shock,introduced a method based on single variable current control thought,established grid-connected PV maximum power tracking control system mathematical model, a novel single-variable current perturbation tracking method was put out, as long as the detected output current of the solar panel power generation system can achieve a stable variable maximum power tracking, through simulation and experimental study to verify the correctness of the model and the effectiveness of control methods. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.4172
A Software Watermarking Based on PE File with Tamper-proof Function
Shengbing Che;
Yemao Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
After embedding the watermark based on the algorithm of PE file resources section, the data of resource section was still easy to be rearranged, so this paper put forward a new watermark algorithm with the function of anti-tamper. The new algorithm still used watermark information to control the order of software resource structure’s nodes, and hid the watermark information in the rearranged resource structure. At the same time it recorded the exchanged node information of each layer, and encoded these exchanged nodes’ information. Then it constructed corresponding MPPCT and DPPCT according to the encoding results to achieve the purpose of anti-tamper. Experiment shows that it realizes a blind detection, resists multiple common attacks effectively, and has strong robustness. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.4215
Word Semantic Similarity Calculation Based on Domain Knowledge and HowNet
Xinyuan Feng;
Jianguo Wei;
Wenhuan Lu;
Jianwu Dang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Word semantic similarity is the foundation of semantic processing, and is a key issue in many applications. This paper argues that word semantic similarity should associate with domain knowledge, which traditional methods did not take into account. In order to adopt domain knowledge into semantic similarity measurement, this paper proposed a sensitive words sets approach. For this purpose, we also propose a new approach for sememe similarity calculation. This method distinguishes three different positional relationships between two sememes, and the results have shown that our method overperformed than other methods based on a Chinese knowledge base ‘HowNet’. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.4416
Networked Control Over Noisy Channel With Time Delays
Qing-Quan Liu;
Fang Jin
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This paper investigates networked control problems for linear control systems, where the sensors and the controller are connected by a bandwidth-limited, noisy digital communication channel with time delays. For this case, we examine the role communication has onquantized feedback stabilization problems, present quantization, coding, and control schemes, and derive a sufficient condition on the data rate of stabilization of the unstable plant. It is shown in our results that, communication constraints have important effectson stabilization of networked control systems. An illustrative example is given to demonstrate the effectiveness of the proposed method. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3816
Lane Detection Based on Machine Learning Algorithm
Chao Fan;
Jingbo Xu;
Shuai Di
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In order to improve accuracy and robustness of the lane detection in complex conditions, such as the shadows and illumination changing, a novel detection algorithm was proposed based on machine learning. After pretreatment, a set of haar-like filters were used to calculate the eigenvalue in the gray image f(x,y) and edge e(x,y). Then these features were trained by using improved boosting algorithm and the final class function g(x) was obtained, which was used to judge whether the point x belonging to the lane or not. To avoid the over fitting in traditional boosting, Fisher discriminant analysis was used to initialize the weights of samples. After testing by many road in all conditions, it showed that this algorithm had good robustness and real-time to recognize the lane in all challenging conditions. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3923
Using Fuzzy Association Rules to Design E-commerce Personalized Recommendation System
Guofang Kuang;
Yuanchen Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In order to improve the efficiency of fuzzy association rule mining, the paper defines the redundant fuzzy association rules, and strong fuzzy association rules redundant nature. As much as possible for more information in the e-commerce environment, and in the right form is a prerequisite for personalized recommendation. Personalized recommendation technology is a core issue of e-commerce automated recommendation system. Higher complexity than ordinary association rules algorithm fuzzy association rules, the low efficiency become a bottleneck in the practical application of fuzzy association rules algorithm. The paper presents using fuzzy association rules to design E-commerce personalized recommendation system. The experimental results show that the new algorithm to improve the efficiency of the implementation. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3983
A New Watermarking Method of 3D Mesh Model
Liu Jing;
Wang Yinghui;
He Wenjuan;
Li Ye
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
A new watermarking method for 3D model robust to geometric attacks is presented. The algorithm firstly uses average normal of the part with the obivious geometric feature in the 3D model to establish coordinate system,which is not affected by geometric attacks such as translation,rotation and scaling; Embed the watermarking information into the appropriate vertices selected according to area of 2-ring neighbours of each vertex;Embedding strength adaptively adjusted in terms of curvature of the model facet. The choice of embedding position and the embedding strategy above effectively guarantee good transparency and maximum robustness of the proposed algorithm. Simulation results indicate the ability of the proposed method to deal with the some attacks more than satisfactory results. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3853
The Designing of TEMPEST Security Testing Model
Liu Jinming;
Mao Jian;
Zhang Jiemin;
Li Yongmei
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As s result all equipments handling confidential information do need TEMPEST security testing. This paper attempts to design a mathematical model for TEMPEST testing that will facilitate the analysis of the key factors in TEMPEST testing and standard revising. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.4006