cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 101 Documents
Search results for , issue "Vol 12, No 6: June 2014" : 101 Documents clear
Constructing Cerebellum Model by Researching on its Contributions to DIVA Yuanyuan Wu; Shaobai Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

DIVA (Directions into Velocities of Articulators) is a mathematical model of the processes behind speech acquisition and production, supposed to achieve a functional representation of areas in the brain that are involved in speech production and speech perception. Introducing cerebellum control mechanism into the model plays a significant role in improving the mechanism of speech acquisition and production based on DIVA model. The paper studies its learning process, and explores cerebellar contributions to the model, that is feedforward learning, sensory predictions, feedback command production and the timing of delays, and then constructs a cerebellum model that is closer to neuroanatomy and is applied to DIVA model. Simulation results show that the improved DIVA model can produce more clear and explicit speech sounds, and is more close to human-like pronunciation system. The cerebellum model that established in this paper can be applied to speech acquisition and production based on DIVA model. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5388 
Design and Research of Urban Video Surveillance System Peng He; Tianzhong Guo; Jingran An
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper aimed to design and realized Qiqihar urban video surveillance system and use advanced design solutions to improve the traditional city video surveillance system based on EPON technology. Hierarchical design was proposed and a detailed analysis of each design was given. The system not only has expanded capabilities in the structure, but also has integrated application capabilities in the business, including image transmission, remote monitoring, remote centralized digital image data storage, remote real-time on-demand playback (stored data image). The result shows that the system can completely solve the digitization of the monitoring system and the process of networking bottlenecks. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.3631
The prediction of Granulating Effect Based on BP Neural Network Fang Li; Kaigui Wu; Guanyin Zhao
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

During the granulation process of Iron ore sinter mixture, there are many factors affect the granulating effect, such as chemical composition, size distribution, surface feature of particle, and so on. Some researchers use traditional fitting calculation methods like least square method and regression analysis method to predict granulation effects, which exists big error. In order to predict it better, we build improved BP (Back propagation) neural network model to carry out data analysis and processing, and then obtain better effect than traditional fitting calculation methods. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5481
Locating Liver Lesion with Local C-V Level Set and Image Registration Zhaohui Luo; Xi Zaifang; Wang Junnian
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this paper, we proposed comprehensive methods to locate the liver lesion in multi-phase CT images. It first construct a local liver lesion image from the image in which liver lesion differs from liver tissue most markedly, then pre-segment the lesion with OTSU method to get the initial contour, and evolve the active contour with local C-V level set method to get the final contour of lesion in the CT image. Finally locate the liver lesion in CT images of other phases by image registration. Experiments showed this method can extract liver tumor efficiently.A well-prepared abstract enables the reader to identify the basic content of a document quickly and accurately, to determine its relevance to their interests, and thus to decide whether to read the document in its entirety. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5393 
Research of the Defect Model Based on Similarity and Association Rule Wanjiang Han; Lixin Jiang; Xiaoyan Zhang; Tianbo Lu; Sun Yi; Li Yan; Weijian Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In order to detect defects efficiently and improve the quality of products, this paper puts forward the concept about defect classification model and defect association model by a lot of defect data. The technology of similarity is applied to defect classification model, and the idea of Knowledge Discovery in Database is applied to defect association model. Defect classification model can analyze the defect efficiently and provides the basis of solving problems quickly while defect association model can be used to detect early and prevent problem, which can make effective improvements to testing and development. This paper summed up GUI defect model based on a large number of interface defects. The model is useful to improve the accuracy of forecast and be used for test planning and implementation through the practice of several projects. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5452
A Dominance Degree for Rough Sets and Its Application in Ranking Popularity Jia Zhao; Jianfeng Guan; Changqiao Xu; Hongke Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i6.pp4814-4824

Abstract

Rough set theory is used in data mining through complex learning systems and uncertain information decision from artificial intelligence. For multiple attribute decision making, rough sets employ attribute reduction to generate decisive rules. However, dynamic information databases, which record attribute values changing with time, raise questions to rough set based multiple attribute reduction. This paper proposes a dynamic attribute based dominance degree for rough-set-based ranking decision. According to the dominance relations between two objects in dynamic information table, we propose three judgments and their judging values to get a dominance degree value, by which we can deny or approve of the dominance relations. Then we use the dominance-degree-based rough set to make dynamic attribute reduction. We applied this method in ranking popularity of network service resources. and extract ranking decision rules. Experiments show comparison between the searching engines with and without the ranking function and the efficiency of rough set ranking by our proposed dominance degree value.
An SLAM Algorithm Based on Square-root Cubature Particle Filter Xue feng Dai; Zu guo Chen; Chao Yang; Lai hao Jiang; Biao Cai
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The lack of the latest measurement information and the Particle serious degradation cause low estimation precision in the tradition particle filter SLAM (simultaneous localization and mapping). For solve this problem, a SRCPF-SLAM (square cubature particle filter simultaneous localization and mapping) is proposed in this paper. The algorithm fuses the latest measurement information in the stage of the prior distribution updated of the particle filter SLAM. It designs importance density function by SRCKF (Square-root Cubature kalman filter) that is more close to the posterior density, and it spreads the square root of state covariance. So, the algorithm ensures the symmetry and the positive semi-definiteness of the covariance matrix and improves numerical estimation precision and stability. The simulation results show that the proposed algorithm has higher accuracy of the state estimation when compared with the the PF-SLAM (particle filter simultaneous localization and mapping) algorithm, EPF-SLAM (extend particle filter simultaneous localization and mapping) algorithm and the UPF-SLAM (unscented particle filter simultaneous localization and mapping) algorithm. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5059
Software Vulnerability Analysis Method Based on Adaptive-K Sequence Clustering Di Wu; Jiadong Ren
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Software vulnerability analysis has become a hot topic recently. However, the traditional methods for analyzing software vulnerability have higher false positive rate. In this paper, adaptive K function is defined, and SVAAKSC (Software vulnerability analysis method based on adaptive-K sequence clustering) is presented. The collected objects in software vulnerability sequence database SVSD are pretreated to equal length vectors. Moreover, according to adaptive-K based sequence clustering algorithm, all software vulnerabilities in SVSD are clustered into K clustering. Afterwards, by matching the similarities between detected vulnerability from software and each clustering center, whether the detected vulnerability is a real software vulnerability can be judged. Finally, the corresponding analysis report is obtained. The experimental results and analysis show that SVAAKSC has lower false positive rate and better analysis time. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.4610
An Improved NSGA-II Algorithm for Multi-objective Traveling Salesman Problem Yabo Luo; Min Liu; Zhongxiao Hao; Dongbo Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Multi-objective traveling salesman problem (MOTSP) is an extended instance of traveling salesman problem (TSP), which is a well-known NP hard problem. In this paper, an improved NSGA-II algorithm (denoted by INSGA-II-MOTSP) is proposed to solve the MOTSP. Specifically, a layer strategy according to need is proposed to avoid generating unnecessary non-dominated fronts. The arena’s principle is also adopted to construct non-dominated set, so as to reduce the count of dominance comparison. In addition, an order crossover like operator and an inversion mutation operator are adopted for MOTSP. The experiment results show that the proposed INSGA-II-MOTSP algorithm is able to find better spread of solutions compared to other three algorithms. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5476
Application of Resource Migration on Housing Fund Archives System Changxing Qi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper analyzes the feature and necessity of resource migration, and summarizes the commonly methods among different systems. According to the requirements of the systems in the housing fund center,an architecture model based on resource migration is designed. The process of migration, the format and specification of the data packet are described according to the architecture levels and the process.After the migration application is developed,the operation data of the system are analyzed and further suggestions are given. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5392

Page 4 of 11 | Total Record : 101


Filter by Year

2014 2014


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue