cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 101 Documents
Search results for , issue "Vol 12, No 2: February 2014" : 101 Documents clear
Nontrivial Stable Control Economic Model of Sports Facilities Kebai Li; Wenjing Zhang; Lifei Chen
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Given that multiple regions have their own development speeds of supply and demand for public sports facilities, a dynamic supply and demand control model of multiple regional public sports facilities is built in this paper. With the range of residents' income increases and the public sports facilities supply investment as the control variables, we established a unified construction controlling means by using the Linear Matrix Inequality approach derived from Lyapunov stability theory. As such, this means guarantees that the systems of public sports facilities in multiple regions with various developments are asymptotically stable; meanwhile, it can lower the difficulty of the control. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3888
Characteristics of Electromagnetic Coupling with A Wire through Shielding Enclosure Yanpeng Sun; Liwei Sun; Xiaohe An
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The paper presents a numerical method based on Finite Difference Time Domain (FDTD) in both frequency and time domain for modeling the coupling of an incident electromagnetic pulse(EMP) with a conducting wire through a metallic shielding enclosure with a small aperture. Simulation and analysis are done by radius, length, and number of the wires, the incidence angle of EMP and the polaration angle of electric field in consideration. The simulation result shows that interference of the electromagnetic coupling into the shielding enclosure can be affected in different degrees by above factors. At low frequency, the larger the leakage length, the radius or the number of the wire penetrated into the cavity, the more interference is coupled into the shielding cavity from electromagnetic field. Also, the smaller the incident direction angle of propagation of the electromagnetic pulse or the polarization direction angle of the incident electric field, the more easily the electromagnetic interference is coupled into the cavity. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3984
Research on Single-Variable Current Perturbation Tracking Method for Maximal Power Tracking Control Method of the Solar Power Generation System WANG Yu-xin; ZHANG Feng-ge; LI Lin-lin
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this paper, the traditional grid-connected PV perturbation method of disturbance near the maximum power point about the problems of shock,introduced a method based on single variable current control thought,established grid-connected PV maximum power tracking control system mathematical model, a novel single-variable current perturbation tracking method was put out, as long as the detected output current of the solar panel power generation system can achieve a stable variable maximum power tracking, through simulation and experimental study to verify the correctness of the model and the effectiveness of control methods. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.4172
A Software Watermarking Based on PE File with Tamper-proof Function Shengbing Che; Yemao Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

After embedding the watermark based on the algorithm of PE file resources section, the data of resource section was still easy to be rearranged, so this paper put forward a new watermark algorithm with the function of anti-tamper. The new algorithm still used watermark information to control the order of software resource structure’s nodes, and hid the watermark information in the rearranged resource structure. At the same time it recorded the exchanged node information of each layer, and encoded these exchanged nodes’ information. Then it constructed corresponding MPPCT and DPPCT according to the encoding results to achieve the purpose of anti-tamper. Experiment shows that it realizes a blind detection, resists multiple common attacks effectively, and has strong robustness.  DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.4215
Word Semantic Similarity Calculation Based on Domain Knowledge and HowNet Xinyuan Feng; Jianguo Wei; Wenhuan Lu; Jianwu Dang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Word semantic similarity is the foundation of semantic processing, and is a key issue in many applications. This paper argues that word semantic similarity should associate with domain knowledge, which traditional methods did not take into account. In order to adopt domain knowledge into semantic similarity measurement, this paper proposed a sensitive words sets approach. For this purpose, we also propose a new approach for sememe similarity calculation. This method distinguishes three different positional relationships between two sememes, and the results have shown that our method overperformed than other methods based on a Chinese knowledge base ‘HowNet’. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.4416
Networked Control Over Noisy Channel With Time Delays Qing-Quan Liu; Fang Jin
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper investigates networked control problems for linear control systems, where the sensors and the controller are connected by a bandwidth-limited, noisy digital communication channel with time delays. For this case, we examine the role communication has onquantized feedback stabilization problems, present quantization, coding, and control schemes, and derive a sufficient condition on the data rate of stabilization of the unstable plant. It is shown in our results that, communication constraints have important effectson stabilization of networked control systems. An illustrative example is given to demonstrate the effectiveness of the proposed method. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3816
Lane Detection Based on Machine Learning Algorithm Chao Fan; Jingbo Xu; Shuai Di
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In order to improve accuracy and robustness of the lane detection in complex conditions, such as the shadows and illumination changing, a novel detection algorithm was proposed based on machine learning. After pretreatment, a set of haar-like filters were used to calculate the eigenvalue in the gray image f(x,y) and edge e(x,y). Then these features were trained by using improved boosting algorithm and the final class function g(x) was obtained, which was used to judge whether the point x belonging to the lane or not. To avoid the over fitting in traditional boosting, Fisher discriminant analysis was used to initialize the weights of samples. After testing by many road in all conditions, it showed that this algorithm had good robustness and real-time to recognize the lane in all challenging conditions. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3923 
Using Fuzzy Association Rules to Design E-commerce Personalized Recommendation System Guofang Kuang; Yuanchen Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In order to improve the efficiency of fuzzy association rule mining, the paper defines the redundant fuzzy association rules, and strong fuzzy association rules redundant nature. As much as possible for more information in the e-commerce environment, and in the right form is a prerequisite for personalized recommendation. Personalized recommendation technology is a core issue of e-commerce automated recommendation system. Higher complexity than ordinary association rules algorithm fuzzy association rules, the low efficiency become a bottleneck in the practical application of fuzzy association rules algorithm. The paper presents using fuzzy association rules to design E-commerce personalized recommendation system. The experimental results show that the new algorithm to improve the efficiency of the implementation. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3983
A New Watermarking Method of 3D Mesh Model Liu Jing; Wang Yinghui; He Wenjuan; Li Ye
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A new watermarking method for 3D model robust to geometric attacks is presented. The algorithm firstly uses average normal of the part with the obivious geometric feature in the 3D model to establish coordinate system,which is not affected by geometric attacks such as translation,rotation and scaling; Embed the watermarking information into the appropriate vertices selected according to area of 2-ring neighbours of each vertex;Embedding strength adaptively adjusted in terms of curvature of the model facet. The choice of embedding position and the embedding strategy above effectively guarantee good transparency and maximum robustness of the proposed algorithm. Simulation results indicate the ability of  the proposed method to deal with the some attacks more than satisfactory results. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3853
The Designing of TEMPEST Security Testing Model Liu Jinming; Mao Jian; Zhang Jiemin; Li Yongmei
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As s result all equipments handling confidential information do need TEMPEST security testing. This paper attempts to design a mathematical model for TEMPEST testing that will facilitate the analysis of the key factors in TEMPEST testing and standard revising. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.4006

Page 4 of 11 | Total Record : 101


Filter by Year

2014 2014


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue