Articles
102 Documents
Search results for
, issue
"Vol 12, No 4: April 2014"
:
102 Documents
clear
Security Interaction of Web Services in Heterogeneous Platforms
Tao Xu;
Xin Hu;
Jiwen Xie;
Shujuan Sun
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Currently, there are a large number of heterogeneous platforms. The standards of Web Services in different platforms are different and complex. Therefore, security interaction of Web services based on heterogeneous platform has become increasingly prominent. In order to realize security interaction of heterogeneous platforms, a security interactive model of Web Service based on WebSphere and .NET is proposed in this paper. The model adopts an approach based on predicate logic to integrate the security policies of heterogeneous platforms and uses the integrated policy to sign the SOAP message. The experimental results show that the model can ensure the safety of SOAP message transmission and realize the security session between these two heterogeneous platforms. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4734
Design of Multi-core Processor Software with Pipelining Strategy
Jian Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
At present, in the field of application of numerous IT, multi-core processors are widely used, the hardware development is much faster than the speed of software development. Multi-core processor software is using the design concept of single-core processor software, so this software is not high-performance and the performance processor is not fully played. This paper firstly introduces the traditional software design method based on multiple cores, and then points out two problems existing in it.To improve its efficiency, I propose a method called pipeline which can improve processor utilization and the throughput of a processor, at the same time, reduce the cost of the system. This method has been verified in the network packet processing. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4811
PMSM Control Simulation Based on Pumping Unit
Zikuan Zhang;
Lin He
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
To study direct drive pumping unit of operating state, permanent magnet synchronous motor open-loop control system was used to model and simulate based on Matlab/Simulink software, and analyzed the waveforms change with different torque. The results indicate that permanent magnet synchronous motor can operate smoothly under low speed and high torque condition, and can meet work requirement of direct drive pumping unit with acceleration. The proposed Simulink simulation system can achieve stable control in actual operation, and its effectiveness was confirmed experimentally. Results of simulation analysis have some certain practical value for pumping unit driven by permanent magnet synchronous motor. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4836
3D Simulation of Fin Geometry influence on Corner effect in Multifin Dual and Tri-gate SOI-FinFETs
A.N. Moulai Khatir;
A. Guen-Bouazza;
B. Bouazza
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In this work the corner effect sensitivity to fin geometry variation in multifin dual and tri-gate SOI-FinFETs is studied through a commercial, three-dimensional numerical simulator ATLAS from Silvaco International. These devices are compatible with conventional silicon integrated circuit processing, but offer superior performance as the device is scaled into the nanometer range. This study aims wider to use multiple fins between the source and drain regions. The results indicate that for both multifin double and triple gate FinFETs, the corner effect does not lead to an additional leakage current and therefore does not deteriorate the SOI-FinFET performance. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4668
Low Leakage Circuits Design with Optimized Gate-length Biasing
Yangbo Wu;
Xiaohui Fan;
Haiyan Ni;
Jianping Hu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
With the technology process scaling, leakage power dissipation is becoming a growing number of percentage in total power dissipation. This study presents a new method in the gate-length biasing technique to achieve a cost-effective gate-length with a most benefit between leakage reduction and delay increasing. With the optimized gate-length, typical combinational and sequential circuits are realized and simulated using HSPICE with the BSIM4.6.4 predictive models at a 45nm COMS process. The results show that leakage currents of typical combinational circuits reduce more and delay increase less. Moreover, leakage currents of mirror adder and transmission gate adder decrease 13.9% and 8.90%, respectively; and leakage power of 4-bit binary counters using C2MOS D Flip-Flop and Transmission-Gate D Flip-Flop reduce 38.36% and 20.05%, with the frequency of 5M, respectively. Therefore, the optimized gate-length biasing technique is an attractive approach in low power circuits design. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4791
Error Elimination Algorithm in 3D Image Reconstruction
Jin Xian-Hua;
Zhao Yuan-Qing
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In process of three-dimensional (3D) reconstruction, effective matching of feature is the key point of accurate reconstruction in later stage. In order to eliminate the error of modeling distortion caused by inaccurate feature matching in the process of 3D image reconstruction, a feature matching error elimination method based on collision detection is presented. A 3D image reconstruction mathematical model is established to operate the solution of image 3D reconstruction and camera space matrix elements of exterior orientation. The error of the feature matching in 3D dynamic modeling is eliminated according to the result of the collision two gray digital images are used to carry out simulation experiment. Experimental results show that the proposed algorithm can effectively eliminate the error of feature matching and improve the accuracy of the modeling. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4250
Joint Optimization of Sensing Time and Fusion Rules for Cognitive Radios
Yang Liu;
Ying Cui;
Ou Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In Cognitive Radios, sensing-time and fusion rules affect the performance of spectrum sensing when cooperative sensing is applied. Besides, the more unlicensed users are involved in cooperative sensing, the higher spectrum utilization the channel can achieve, while from the unlicensed users’ perspective, the lower average throughput the unlicensed users can obtain. In this paper, we explore the issue on the sensing-time and the fusion rules to optimize the average throughput of the unlicensed users under the constraint that the licensed users are sufficiently protected. At first, we formulate this issue as an optimization problem, and showed the unimodal characteristics of the unlicensed users’ average throughput as a function of the sensing-time and the fusion parameter. Then a numerical optimization algorithm is proposed to obtain the optimal solution. At last, by theoretical analysis and performance comparisons we derived the optimal fusion rule selection scheme under different scenarios. Computer simulations show that significant improvement in the average throughput of unlicensed users is achieved when the sensing-time and the fusion rule are jointly optimized. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4793
Multi-Scale Harris Corner Detection Based on B-Spline
Wenqiu Zhu;
Keke Xu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The existing Harris corner detection algorithm using mostly Gaussian low-pass filter to smooth image, and there are some phenomena about loss of information and location of the corner offset in images, at the same time, the single-scale Harris corner detection algorithm does not have the scale invariance. B-spline function converges to a Gaussian function, therefore we combined B-spline wavelet multi-scale theory and Harris, and proposed multi-scale Harris corner detection method based on B-spline. Firstly, we used B-spline function to smooth filter image at different scales. Secondly image and B-spline convolution template were calculated by convolution operator. Finally,we extracted alternative corner from the different scale images, and searching for the extreme value of scale space as the location and characteristics scale of the feature points within the search window template that has belonged to a fixed size at the center of Harris corner. The experiments show that the proposed method not only maintains the good performance of Harris operator, but also has scale invariance. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4797
Research of the Real-time Database in Embedded Configuration Software
Wang Xiujuan;
Li Xiaobing;
Cheng Meng;
Chen Yutang;
Zhang Zhongxin;
Cai Xiuyun
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In recent years, the application of embedded technology and configuration technology in industrial control is more and more widely. The embedded configuration software which is combined of embedded and configuration has become the inevitable trend in industrial control field. Real-time database system as the core of embedded configuration software, the organizational structure whether reasonable and effective is directly related to the performance of the whole system, affecting field devices real-time communication and data transmission in graphic display interface. Based on a large number of configuration-related papers, this paper deeply researched the real-time database and using three layer storage structures which consist of shared memory, file system and general database. It improves the access efficiency of real-time database and data reliability in a timely manner. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4778
Perceptual Speech Hashing Authentication Algorithm Based on Linear Prediction Analysis
Yi-bo Huang;
Qiu-yu Zhang;
Zhan-ting Yuan
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
According to the situation that traditional speech authentication algorithms are not appropriated for the present speech communication, we proposed a speech authentication algorithm of perceptual hashing which is based on linear forecast analysis (LPC), it can satisfy the requirement of the efficiency and the robustness for the speech authentication. Firstly, the LPC coefficients are optimized, based on the principle of LPC for speech signal, a new prediction coefficients is constituted through combing the energy and the LPC coefficients of a frame; then dividing the prediction coefficient matrix into smaller blocks, and do singular value decomposition (SVD) to the coefficients of each block. Finally, quantifying the formed singular value and getting perceptual hashing sequences. Experiments show that the proposed algorithm has good robustness for content preserving operations, and it doesn’t reduce the efficiency while meeting robustness, it can satisfy the real-time requirement of speech communication. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4934