Articles
101 Documents
Search results for
, issue
"Vol 12, No 6: June 2014"
:
101 Documents
clear
Constructing Cerebellum Model by Researching on its Contributions to DIVA
Yuanyuan Wu;
Shaobai Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
DIVA (Directions into Velocities of Articulators) is a mathematical model of the processes behind speech acquisition and production, supposed to achieve a functional representation of areas in the brain that are involved in speech production and speech perception. Introducing cerebellum control mechanism into the model plays a significant role in improving the mechanism of speech acquisition and production based on DIVA model. The paper studies its learning process, and explores cerebellar contributions to the model, that is feedforward learning, sensory predictions, feedback command production and the timing of delays, and then constructs a cerebellum model that is closer to neuroanatomy and is applied to DIVA model. Simulation results show that the improved DIVA model can produce more clear and explicit speech sounds, and is more close to human-like pronunciation system. The cerebellum model that established in this paper can be applied to speech acquisition and production based on DIVA model. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5388
Design and Research of Urban Video Surveillance System
Peng He;
Tianzhong Guo;
Jingran An
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This paper aimed to design and realized Qiqihar urban video surveillance system and use advanced design solutions to improve the traditional city video surveillance system based on EPON technology. Hierarchical design was proposed and a detailed analysis of each design was given. The system not only has expanded capabilities in the structure, but also has integrated application capabilities in the business, including image transmission, remote monitoring, remote centralized digital image data storage, remote real-time on-demand playback (stored data image). The result shows that the system can completely solve the digitization of the monitoring system and the process of networking bottlenecks. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.3631
The prediction of Granulating Effect Based on BP Neural Network
Fang Li;
Kaigui Wu;
Guanyin Zhao
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
During the granulation process of Iron ore sinter mixture, there are many factors affect the granulating effect, such as chemical composition, size distribution, surface feature of particle, and so on. Some researchers use traditional fitting calculation methods like least square method and regression analysis method to predict granulation effects, which exists big error. In order to predict it better, we build improved BP (Back propagation) neural network model to carry out data analysis and processing, and then obtain better effect than traditional fitting calculation methods. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5481
Locating Liver Lesion with Local C-V Level Set and Image Registration
Zhaohui Luo;
Xi Zaifang;
Wang Junnian
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In this paper, we proposed comprehensive methods to locate the liver lesion in multi-phase CT images. It first construct a local liver lesion image from the image in which liver lesion differs from liver tissue most markedly, then pre-segment the lesion with OTSU method to get the initial contour, and evolve the active contour with local C-V level set method to get the final contour of lesion in the CT image. Finally locate the liver lesion in CT images of other phases by image registration. Experiments showed this method can extract liver tumor efficiently.A well-prepared abstract enables the reader to identify the basic content of a document quickly and accurately, to determine its relevance to their interests, and thus to decide whether to read the document in its entirety. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5393
Research of the Defect Model Based on Similarity and Association Rule
Wanjiang Han;
Lixin Jiang;
Xiaoyan Zhang;
Tianbo Lu;
Sun Yi;
Li Yan;
Weijian Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In order to detect defects efficiently and improve the quality of products, this paper puts forward the concept about defect classification model and defect association model by a lot of defect data. The technology of similarity is applied to defect classification model, and the idea of Knowledge Discovery in Database is applied to defect association model. Defect classification model can analyze the defect efficiently and provides the basis of solving problems quickly while defect association model can be used to detect early and prevent problem, which can make effective improvements to testing and development. This paper summed up GUI defect model based on a large number of interface defects. The model is useful to improve the accuracy of forecast and be used for test planning and implementation through the practice of several projects. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5452
A Dominance Degree for Rough Sets and Its Application in Ranking Popularity
Jia Zhao;
Jianfeng Guan;
Changqiao Xu;
Hongke Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i6.pp4814-4824
Rough set theory is used in data mining through complex learning systems and uncertain information decision from artificial intelligence. For multiple attribute decision making, rough sets employ attribute reduction to generate decisive rules. However, dynamic information databases, which record attribute values changing with time, raise questions to rough set based multiple attribute reduction. This paper proposes a dynamic attribute based dominance degree for rough-set-based ranking decision. According to the dominance relations between two objects in dynamic information table, we propose three judgments and their judging values to get a dominance degree value, by which we can deny or approve of the dominance relations. Then we use the dominance-degree-based rough set to make dynamic attribute reduction. We applied this method in ranking popularity of network service resources. and extract ranking decision rules. Experiments show comparison between the searching engines with and without the ranking function and the efficiency of rough set ranking by our proposed dominance degree value.
An SLAM Algorithm Based on Square-root Cubature Particle Filter
Xue feng Dai;
Zu guo Chen;
Chao Yang;
Lai hao Jiang;
Biao Cai
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The lack of the latest measurement information and the Particle serious degradation cause low estimation precision in the tradition particle filter SLAM (simultaneous localization and mapping). For solve this problem, a SRCPF-SLAM (square cubature particle filter simultaneous localization and mapping) is proposed in this paper. The algorithm fuses the latest measurement information in the stage of the prior distribution updated of the particle filter SLAM. It designs importance density function by SRCKF (Square-root Cubature kalman filter) that is more close to the posterior density, and it spreads the square root of state covariance. So, the algorithm ensures the symmetry and the positive semi-definiteness of the covariance matrix and improves numerical estimation precision and stability. The simulation results show that the proposed algorithm has higher accuracy of the state estimation when compared with the the PF-SLAM (particle filter simultaneous localization and mapping) algorithm, EPF-SLAM (extend particle filter simultaneous localization and mapping) algorithm and the UPF-SLAM (unscented particle filter simultaneous localization and mapping) algorithm. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5059
Software Vulnerability Analysis Method Based on Adaptive-K Sequence Clustering
Di Wu;
Jiadong Ren
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Software vulnerability analysis has become a hot topic recently. However, the traditional methods for analyzing software vulnerability have higher false positive rate. In this paper, adaptive K function is defined, and SVAAKSC (Software vulnerability analysis method based on adaptive-K sequence clustering) is presented. The collected objects in software vulnerability sequence database SVSD are pretreated to equal length vectors. Moreover, according to adaptive-K based sequence clustering algorithm, all software vulnerabilities in SVSD are clustered into K clustering. Afterwards, by matching the similarities between detected vulnerability from software and each clustering center, whether the detected vulnerability is a real software vulnerability can be judged. Finally, the corresponding analysis report is obtained. The experimental results and analysis show that SVAAKSC has lower false positive rate and better analysis time. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.4610
An Improved NSGA-II Algorithm for Multi-objective Traveling Salesman Problem
Yabo Luo;
Min Liu;
Zhongxiao Hao;
Dongbo Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Multi-objective traveling salesman problem (MOTSP) is an extended instance of traveling salesman problem (TSP), which is a well-known NP hard problem. In this paper, an improved NSGA-II algorithm (denoted by INSGA-II-MOTSP) is proposed to solve the MOTSP. Specifically, a layer strategy according to need is proposed to avoid generating unnecessary non-dominated fronts. The arena’s principle is also adopted to construct non-dominated set, so as to reduce the count of dominance comparison. In addition, an order crossover like operator and an inversion mutation operator are adopted for MOTSP. The experiment results show that the proposed INSGA-II-MOTSP algorithm is able to find better spread of solutions compared to other three algorithms. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5476
Application of Resource Migration on Housing Fund Archives System
Changxing Qi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This paper analyzes the feature and necessity of resource migration, and summarizes the commonly methods among different systems. According to the requirements of the systems in the housing fund center,an architecture model based on resource migration is designed. The process of migration, the format and specification of the data packet are described according to the architecture levels and the process.After the migration application is developed,the operation data of the system are analyzed and further suggestions are given. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5392