首页 > 最新文献

TELKOMNIKA Indonesian Journal of Electrical Engineering最新文献

英文 中文
Design of the Monitoring System for Subway Platform Screen Doors Based on CAN Bus 基于CAN总线的地铁站台屏蔽门监控系统设计
Pub Date : 2015-09-01 DOI: 10.11591/IJEECS.V15.I3.PP509-514
Caiqi Hu
In this paper, the application layer communication protocol of CAN bus and the monitoring system for subway platform screen doors are proposed.The system framework is built, hardware of every function module for this system is selected, and the monitoring platform of epigynous machine is designed. On the basis of the above work the communication function of the monitoring system is realized, and specific flow chart s given. This system has been tested at a subway line in Shanghai. And the results prove that the system is in full compliance with industry standards and can  completely meet the application requirements. The architecture plan of the system is practically proven to be valid and feasible.
本文提出了CAN总线的应用层通信协议和地铁站台屏蔽门监控系统。搭建了系统框架,对系统各功能模块的硬件进行了选型,设计了上位机监控平台。在上述工作的基础上实现了监控系统的通信功能,并给出了具体的流程图。该系统已在上海的一条地铁线路上进行了测试。实验结果表明,该系统完全符合行业标准,能够完全满足应用需求。实践证明了系统架构方案的有效性和可行性。
{"title":"Design of the Monitoring System for Subway Platform Screen Doors Based on CAN Bus","authors":"Caiqi Hu","doi":"10.11591/IJEECS.V15.I3.PP509-514","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I3.PP509-514","url":null,"abstract":"In this paper, the application layer communication protocol of CAN bus and the monitoring system for subway platform screen doors are proposed.The system framework is built, hardware of every function module for this system is selected, and the monitoring platform of epigynous machine is designed. On the basis of the above work the communication function of the monitoring system is realized, and specific flow chart s given. This system has been tested at a subway line in Shanghai. And the results prove that the system is in full compliance with industry standards and can  completely meet the application requirements. The architecture plan of the system is practically proven to be valid and feasible.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130427254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secured Communication Among HMI and Controller using RC-4 Algorithmand Raspberry Pi 基于RC-4算法和树莓派的人机界面与控制器安全通信
Pub Date : 2015-09-01 DOI: 10.11591/IJEECS.V15.I3.PP526-532
Albert Sagala, Deni Lumbantoruan, E. Manurung, Iroma Situmorang, Adi Gunawan
In the beginning the implementation of a plant with SCADA technology, the network is formed isolated from the outside network (LAN or Internet). So it can be ascertained that the communication that occurs on the SCADA network is safe from the threat of crackers. In fact, SCADA network allows it to be connected to the Internet, so that the data of the plant can be monitored via the Internet, so the information about the state of the plant can be monitored in realtime and can be taken quickly if it is known there are anomalies on the control system. In the research we designed a method of encryption and decryption against the lines of communication between the HMI (Human Machine Interface) and the Controller on an industrial minipant contained in Lab CSRC IT Del. Raspberry Pi is used as a gateway between the HMI and the Controller. While Algorithm RC 4 are used as the algorithm for encrypting data between the HMI and the Controller. In the results, we can use the Rapsberry Pi to secure the communication between the HMI and Controller.
在工厂实施SCADA技术之初,该网络是与外部网络(局域网或Internet)隔离形成的。因此,可以确定在SCADA网络上进行的通信是安全的,不受破解者的威胁。事实上,SCADA网络允许它连接到互联网上,这样就可以通过互联网对工厂的数据进行监控,这样就可以实时监控工厂的状态信息,如果知道控制系统上有异常情况,就可以迅速采取措施。在研究中,我们设计了一种针对HMI(人机界面)和控制器之间通信线路的加密和解密方法。树莓派是HMI和Controller之间的网关。而算法rc4被用作HMI和控制器之间的数据加密算法。在结果中,我们可以使用Rapsberry Pi来保护HMI和控制器之间的通信。
{"title":"Secured Communication Among HMI and Controller using RC-4 Algorithmand Raspberry Pi","authors":"Albert Sagala, Deni Lumbantoruan, E. Manurung, Iroma Situmorang, Adi Gunawan","doi":"10.11591/IJEECS.V15.I3.PP526-532","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I3.PP526-532","url":null,"abstract":"In the beginning the implementation of a plant with SCADA technology, the network is formed isolated from the outside network (LAN or Internet). So it can be ascertained that the communication that occurs on the SCADA network is safe from the threat of crackers. In fact, SCADA network allows it to be connected to the Internet, so that the data of the plant can be monitored via the Internet, so the information about the state of the plant can be monitored in realtime and can be taken quickly if it is known there are anomalies on the control system. In the research we designed a method of encryption and decryption against the lines of communication between the HMI (Human Machine Interface) and the Controller on an industrial minipant contained in Lab CSRC IT Del. Raspberry Pi is used as a gateway between the HMI and the Controller. While Algorithm RC 4 are used as the algorithm for encrypting data between the HMI and the Controller. In the results, we can use the Rapsberry Pi to secure the communication between the HMI and Controller.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126000996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Range-Free Localization Schemes for Wireless Sensor Networks 无线传感器网络的无距离定位方案
Pub Date : 2015-08-02 DOI: 10.11591/IJEECS.V16.I2.PP323-332
R. Khadim, M. Erritali, A. Maaden
Localization of nodes is one of the key issues of wireless sensor network (WSN) that gained a wide attention in recent years. The existing localization techniques can be generally categorized into two types: range-based and range-free. Compared with rang-based schemes, the range-free schemes are more cost-effective, because no additional ranging devices are needed. As a result, we focus our research on the range-free schemes. In this paper we study three types of range-free location algorithms to compare the localization error and energy consumption of each one. Centroid algorithm requires a normal node has at least three neighbor anchors, while DV-hop algorithm doesn’t have this requirement. The third studied algorithm is the amorphous algorithm similar to DV-Hop algorithm, and the idea is to calculate the hop distance between two nodes instead of the linear distance between them .The simulation results show that the localization accuracy of the amorphous algorithm is higher than that of other algorithms and the energy consumption does not increase too much.
节点定位是近年来受到广泛关注的无线传感器网络的关键问题之一。现有的定位技术大致可分为基于距离的和无距离的两类。与基于距离的方案相比,无距离方案由于不需要额外的测距设备而具有更高的成本效益。因此,我们将研究重点放在无距离方案上。本文研究了三种无距离定位算法,比较了每种算法的定位误差和能耗。质心算法要求一个正常节点至少有三个邻居锚点,而DV-hop算法则没有这个要求。第三种算法是类似于DV-Hop算法的非晶态算法,其思想是计算两个节点之间的跳距离,而不是计算节点之间的线性距离。仿真结果表明,非晶态算法的定位精度高于其他算法,且能耗没有增加太多。
{"title":"Range-Free Localization Schemes for Wireless Sensor Networks","authors":"R. Khadim, M. Erritali, A. Maaden","doi":"10.11591/IJEECS.V16.I2.PP323-332","DOIUrl":"https://doi.org/10.11591/IJEECS.V16.I2.PP323-332","url":null,"abstract":"Localization of nodes is one of the key issues of wireless sensor network (WSN) that gained a wide attention in recent years. The existing localization techniques can be generally categorized into two types: range-based and range-free. Compared with rang-based schemes, the range-free schemes are more cost-effective, because no additional ranging devices are needed. As a result, we focus our research on the range-free schemes. In this paper we study three types of range-free location algorithms to compare the localization error and energy consumption of each one. Centroid algorithm requires a normal node has at least three neighbor anchors, while DV-hop algorithm doesn’t have this requirement. The third studied algorithm is the amorphous algorithm similar to DV-Hop algorithm, and the idea is to calculate the hop distance between two nodes instead of the linear distance between them .The simulation results show that the localization accuracy of the amorphous algorithm is higher than that of other algorithms and the energy consumption does not increase too much.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126057432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Gabor-HOG Features based Face Recognition Scheme 基于Gabor-HOG特征的人脸识别方案
Pub Date : 2015-08-01 DOI: 10.11591/IJEECS.V15.I2.PP331-335
H. Ouanan, M. Ouanan, B. Aksasse
Extraction of invariant features is the core of Face RecognitionSystems (FRS). This work proposes a novel feature extractor-fusion scheme using two powerful feature descriptor known as Gabor Filters (GFs) and Histogram of Oriented Gradient (HOG), which the face image is filtered with the multiscale multiresolution Gabor filter bank to generate multiple Gabor magnitude images (GMIs), then the down-sampled GMIs and apply Histogram of Oriented Gradient to form the features. The experimental results on the FERET face database show the effectiveness of our methods.
不变特征的提取是人脸识别系统的核心。本文提出了一种新的特征提取融合方案,该方案使用两个功能强大的特征描述符Gabor滤波器(GFs)和定向梯度直方图(HOG),该方案使用多尺度多分辨率Gabor滤波器组对人脸图像进行滤波,生成多个Gabor量级图像(gmi),然后对下采样的gmi进行滤波,并应用定向梯度直方图形成特征。在FERET人脸数据库上的实验结果表明了该方法的有效性。
{"title":"Gabor-HOG Features based Face Recognition Scheme","authors":"H. Ouanan, M. Ouanan, B. Aksasse","doi":"10.11591/IJEECS.V15.I2.PP331-335","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP331-335","url":null,"abstract":"Extraction of invariant features is the core of Face RecognitionSystems (FRS). This work proposes a novel feature extractor-fusion scheme using two powerful feature descriptor known as Gabor Filters (GFs) and Histogram of Oriented Gradient (HOG), which the face image is filtered with the multiscale multiresolution Gabor filter bank to generate multiple Gabor magnitude images (GMIs), then the down-sampled GMIs and apply Histogram of Oriented Gradient to form the features. The experimental results on the FERET face database show the effectiveness of our methods.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121557792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Assessment of Equal and Unequal Amplitude Carriers for a 1Φ Five Level Flying Capacitor Multilevel Inverter 1Φ五电平飞容多电平逆变器等、不等幅载波的评估
Pub Date : 2015-08-01 DOI: 10.11591/IJEECS.V15.I2.PP229-236
P. Sureshpandiarajan, S. P. Natarajan, C. Balamurugan, K. Ramasamy
This work presents the comparison of various Pulse Width Modulation (PWM) techniques for the chosen single phase half bridge FCMLI (Flying Capacitor Multi Level Inverter). In this paper, a single phase half bridge flying capacitor multilevel inverter is controlled with sinusoidal, THI (Third Harmonic Injection), Trapezoidal and TAR (Trapezoidal Amalgamated Reference)reference with Equal Amplitude Carriers (EAC) and UEAC (Un Equal Amplitude Carriers). The proposed EAC and UEAC is applied for various PWM strategies. The PWM methods used for the analysis are PD (Phase Disposition) PWM, POD (Phase Opposition and Disposition) PWM, APOD (Alternative Phase Opposition and Disposition) PWM and CO (Carrier Overlapping) PWM with EAC and UEAC. For all the PWM methods and references the UEAC produces less THD and higher fundamental RMS (Root Mean Square) values except for ma =1. For ma =1 the EAC provides less THD (Total Harmonic Distortion) and higher fundamental RMS (Root Mean Square) values for all the PWM methods and references. To validate the developed technique, simulations are carried out through Power System Block Set.
本文介绍了所选单相半桥FCMLI(飞电容多电平逆变器)的各种脉冲宽度调制(PWM)技术的比较。本文采用正弦、THI(三次谐波注入)、等幅载波(EAC)和不等幅载波(UEAC)梯形和TAR(梯形合并基准)控制单相半桥飞电容多电平逆变器。提出的EAC和UEAC分别应用于各种PWM策略。用于分析的PWM方法是PD(相位配置)PWM, POD(相位反对和配置)PWM, APOD(替代相位反对和配置)PWM和CO(载波重叠)PWM与EAC和UEAC。对于所有PWM方法和参考,UEAC产生更少的THD和更高的基本RMS(均方根)值,除了ma =1。当ma =1时,EAC为所有PWM方法和参考提供更少的THD(总谐波失真)和更高的基本RMS(均方根)值。为了验证所开发的技术,通过电力系统块集进行了仿真。
{"title":"Assessment of Equal and Unequal Amplitude Carriers for a 1Φ Five Level Flying Capacitor Multilevel Inverter","authors":"P. Sureshpandiarajan, S. P. Natarajan, C. Balamurugan, K. Ramasamy","doi":"10.11591/IJEECS.V15.I2.PP229-236","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP229-236","url":null,"abstract":"This work presents the comparison of various Pulse Width Modulation (PWM) techniques for the chosen single phase half bridge FCMLI (Flying Capacitor Multi Level Inverter). In this paper, a single phase half bridge flying capacitor multilevel inverter is controlled with sinusoidal, THI (Third Harmonic Injection), Trapezoidal and TAR (Trapezoidal Amalgamated Reference)reference with Equal Amplitude Carriers (EAC) and UEAC (Un Equal Amplitude Carriers). The proposed EAC and UEAC is applied for various PWM strategies. The PWM methods used for the analysis are PD (Phase Disposition) PWM, POD (Phase Opposition and Disposition) PWM, APOD (Alternative Phase Opposition and Disposition) PWM and CO (Carrier Overlapping) PWM with EAC and UEAC. For all the PWM methods and references the UEAC produces less THD and higher fundamental RMS (Root Mean Square) values except for ma =1. For ma =1 the EAC provides less THD (Total Harmonic Distortion) and higher fundamental RMS (Root Mean Square) values for all the PWM methods and references. To validate the developed technique, simulations are carried out through Power System Block Set.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed SMART Traffic Control Signal in Brunei Darussalam 文莱达鲁萨兰国拟议的智能交通控制信号
Pub Date : 2015-08-01 DOI: 10.11591/IJEECS.V15.I2.PP277-283
Bibi Rawiyah Mulung, A. Maseleno
This paper presents proposed SMART (Systematic Monitoring of Arterial Road Traffic Signals) traffic control signal in Brunei Darussalam. Traffic congestion due to stops and delays at traffic light signals has much been complained about in Brunei Darussalam as well as across the world during the recent years. There are primarily two types of traffic signal controls in Brunei Darussalam. The most common one is the fixed or pre-timed signal operation traffic light and the other one is the actuated signal operation traffic light. Although the actuated signal control is more efficient than the fixed or pre-fixed signal control in the sense that it provides fewer stops and delays to traffic on the major arteries, the best option for Brunei Darussalam would be to introduce smart traffic control signal. This type of traffic signal uses artificial intelligence to take the appropriate action by adjusting the times in real time to minimise the delay in the intersection while also coordinating with intersections in the neighbourhood. SMART Signal simultaneously collects event-based high-resolution traffic data from multiple intersections and generates real-time signal performance measures, including arterial travel time, number of stops, queue length, intersection delay, and level of service. In Brunei Darussalam, where we have numerous intersections where several arterial roads are linked to one another, The SMART signal traffic control method should be implemented.
本文提出了在文莱达鲁萨兰国拟议的SMART(系统监测主干道交通信号)交通控制信号。近年来,在文莱达鲁萨兰国以及世界各地,由于交通灯信号的停止和延误而导致的交通拥堵一直备受抱怨。在文莱达鲁萨兰国,主要有两种类型的交通信号控制。最常见的一种是固定或定时信号操作交通灯,另一种是驱动信号操作交通灯。虽然驱动信号控制比固定或预固定信号控制更有效,因为它在主要干线上提供更少的停车和延误,但文莱达鲁萨兰国的最佳选择是引入智能交通控制信号。这种类型的交通信号使用人工智能,通过实时调整时间来采取适当的行动,以尽量减少十字路口的延误,同时也与附近的十字路口协调。SMART Signal同时从多个十字路口收集基于事件的高分辨率交通数据,并生成实时信号性能指标,包括主干道行驶时间、停车次数、排队长度、十字路口延误和服务水平。在文莱达鲁萨兰国,我们有许多十字路口,几条主干道相互连接,应该实施SMART信号交通控制方法。
{"title":"Proposed SMART Traffic Control Signal in Brunei Darussalam","authors":"Bibi Rawiyah Mulung, A. Maseleno","doi":"10.11591/IJEECS.V15.I2.PP277-283","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP277-283","url":null,"abstract":"This paper presents proposed SMART (Systematic Monitoring of Arterial Road Traffic Signals) traffic control signal in Brunei Darussalam. Traffic congestion due to stops and delays at traffic light signals has much been complained about in Brunei Darussalam as well as across the world during the recent years. There are primarily two types of traffic signal controls in Brunei Darussalam. The most common one is the fixed or pre-timed signal operation traffic light and the other one is the actuated signal operation traffic light. Although the actuated signal control is more efficient than the fixed or pre-fixed signal control in the sense that it provides fewer stops and delays to traffic on the major arteries, the best option for Brunei Darussalam would be to introduce smart traffic control signal. This type of traffic signal uses artificial intelligence to take the appropriate action by adjusting the times in real time to minimise the delay in the intersection while also coordinating with intersections in the neighbourhood. SMART Signal simultaneously collects event-based high-resolution traffic data from multiple intersections and generates real-time signal performance measures, including arterial travel time, number of stops, queue length, intersection delay, and level of service. In Brunei Darussalam, where we have numerous intersections where several arterial roads are linked to one another, The SMART signal traffic control method should be implemented.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122608784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security for Mobile Agents: Trust Estimate for Platforms 移动代理的安全性:对平台的信任估计
Pub Date : 2015-08-01 DOI: 10.11591/IJEECS.V15.I2.PP381-389
Razouki Hassan, Hair Abdellatif
The mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent makes it to travel often in open network. In this scenario, it is obvious that the mobile agents are vulnerable to various security threats. Protecting free-roaming mobile agents from malicious host and from other mobile agents has drawn much attention in recent years. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechanisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms.
移动代理被认为是一种很有前途的分布式计算技术。移动agent的移动性使其经常在开放网络中运行。在这种情况下,很明显移动代理容易受到各种安全威胁。保护自由漫游的移动代理免受恶意主机和其他移动代理的攻击是近年来备受关注的问题。移动代理的保护被认为是最大的安全挑战之一,因为执行平台可以访问移动代理的所有组件。在本文中,我们提出了一种新的移动代理架构范式,它允许代理的实现任务与其安全机制的分离。我们的方法是基于使用两种适应策略来适应运行时移动代理的安全性,这取决于执行代理职责所需服务的敏感性和访问平台的置信度。
{"title":"Security for Mobile Agents: Trust Estimate for Platforms","authors":"Razouki Hassan, Hair Abdellatif","doi":"10.11591/IJEECS.V15.I2.PP381-389","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP381-389","url":null,"abstract":"The mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent makes it to travel often in open network. In this scenario, it is obvious that the mobile agents are vulnerable to various security threats. Protecting free-roaming mobile agents from malicious host and from other mobile agents has drawn much attention in recent years. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechanisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"448 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121834964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recognition of a Face in a Mixed Document 混合文件中人脸的识别
Pub Date : 2015-08-01 DOI: 10.11591/IJEECS.V15.I2.PP301-312
Lhoussaine Bouhou, R. Ayachi, M. Fakir, M. Oukessou
Face recognition is the field of great interest in the domaine of research for several applications such as biometry identification, surveillance, and human-machine interaction…This paper exposes a system of face recognition. This system exploits an image document text embedding a color human face image. Initially, the system, in its phase of extraction, exploitis the horizontal and vertical histogram of the document, detects the image which contains the human face. The second task of the system consists of detecting the included face in other to determine, with the help of invariants moments, the characteristics of the face. The third and last task of the system is to determine, via the same invariants moments, the characteristics of each face stored in a database in order to compare them by means of a classification tool (Neural Networks and K nearest neighbors) with the one determined in the second task for the purpose of taking the decision of identification in that database, of the most similar face to the one detected in the input image.
人脸识别在生物识别、监控、人机交互等领域有着广泛的应用。本系统利用图像文档文本嵌入彩色人脸图像。首先,在提取阶段,系统利用文档的水平直方图和垂直直方图来检测包含人脸的图像。系统的第二个任务是检测被包含的人脸,利用不变量矩来确定人脸的特征。系统的第三个也是最后一个任务是通过相同的不变量矩确定存储在数据库中的每个人脸的特征,以便通过分类工具(神经网络和K个最近邻)将它们与第二个任务中确定的特征进行比较,以便在该数据库中做出识别决策,即与输入图像中检测到的最相似的人脸进行比较。
{"title":"Recognition of a Face in a Mixed Document","authors":"Lhoussaine Bouhou, R. Ayachi, M. Fakir, M. Oukessou","doi":"10.11591/IJEECS.V15.I2.PP301-312","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP301-312","url":null,"abstract":"Face recognition is the field of great interest in the domaine of research for several applications such as biometry identification, surveillance, and human-machine interaction…This paper exposes a system of face recognition. This system exploits an image document text embedding a color human face image. Initially, the system, in its phase of extraction, exploitis the horizontal and vertical histogram of the document, detects the image which contains the human face. The second task of the system consists of detecting the included face in other to determine, with the help of invariants moments, the characteristics of the face. The third and last task of the system is to determine, via the same invariants moments, the characteristics of each face stored in a database in order to compare them by means of a classification tool (Neural Networks and K nearest neighbors) with the one determined in the second task for the purpose of taking the decision of identification in that database, of the most similar face to the one detected in the input image.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121942567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Phonemes Classification Using the Spectrum 利用谱进行音素分类
Pub Date : 2015-08-01 DOI: 10.11591/IJEECS.V15.I2.PP368-372
A. E. Ghazi, C. Daoui
In this work, we present an automatic speech classification system for the Tamazight phonemes. We based on the spectrum presentation of the speech signal to model these phonemes. We have used an oral database of Tamazight phonemes. To test the system’s performances, we calculate the classification rate. The obtained results are satisfactory in comparison with the reference database and the quality of speech files.
在这项工作中,我们提出了一个Tamazight音素自动语音分类系统。我们基于语音信号的频谱表示来建模这些音素。我们使用了塔马西特语音素的口语数据库。为了测试系统的性能,我们计算了分类率。将所得结果与参考数据库和语音文件的质量进行了比较,结果令人满意。
{"title":"Phonemes Classification Using the Spectrum","authors":"A. E. Ghazi, C. Daoui","doi":"10.11591/IJEECS.V15.I2.PP368-372","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP368-372","url":null,"abstract":"In this work, we present an automatic speech classification system for the Tamazight phonemes. We based on the spectrum presentation of the speech signal to model these phonemes. We have used an oral database of Tamazight phonemes. To test the system’s performances, we calculate the classification rate. The obtained results are satisfactory in comparison with the reference database and the quality of speech files.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed MPP Tracking of PV through Buck Converter Using Fuzzy 基于模糊的Buck变换器光伏分布式MPP跟踪
Pub Date : 2015-08-01 DOI: 10.11591/IJEECS.V15.I2.PP197-208
Chandani Sharma, Anamika Jain
Photovoltaics (PV) are the most abundant, perennial, environment friendly and distributed source of energy all over the globe. In this paper, the method to increase PV extraction efficiency for 60W panel with improved DMPP (Distributed Maximum Power Point) even on changing temperature and irradiance have been mapped and discussed. In order to achieve this, the components and subsystems have been analyzed and validated. The validated models are used to maximize the power output using two different models of DC-DC Converters in MATLAB/SIMULINK environment. Closed loop Buck converter using state space nonlinear differential equations and direct component model are compared to reveal best results at Standard Test Conditions (STC). MPPT model developed can be used for obtaining maximum power output from PV even in partial presence of sun using Fuzzy Logic Controller. The Controller designed tracks highest power output for the buck converter. The model developed, using tested membership functions in FLC, can serve a platform for various real time applications using PV.
光伏(PV)是全球最丰富、多年生、环境友好和分布式的能源。本文对60W太阳能板在温度和辐照度变化的情况下,提高分布式最大功率点(DMPP)提取效率的方法进行了探讨。为了实现这一目标,对组件和子系统进行了分析和验证。在MATLAB/SIMULINK环境下,利用验证的模型对两种不同型号的DC-DC变换器进行功率输出最大化。采用状态空间非线性微分方程和直接分量模型的闭环降压变换器在标准测试条件下的效果最好。所开发的MPPT模型可以利用模糊逻辑控制器在部分有太阳的情况下获得PV的最大功率输出。设计的控制器跟踪降压变换器的最高输出功率。利用FLC中经过测试的隶属函数开发的模型可以为使用PV的各种实时应用提供平台。
{"title":"Distributed MPP Tracking of PV through Buck Converter Using Fuzzy","authors":"Chandani Sharma, Anamika Jain","doi":"10.11591/IJEECS.V15.I2.PP197-208","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP197-208","url":null,"abstract":"Photovoltaics (PV) are the most abundant, perennial, environment friendly and distributed source of energy all over the globe. In this paper, the method to increase PV extraction efficiency for 60W panel with improved DMPP (Distributed Maximum Power Point) even on changing temperature and irradiance have been mapped and discussed. In order to achieve this, the components and subsystems have been analyzed and validated. The validated models are used to maximize the power output using two different models of DC-DC Converters in MATLAB/SIMULINK environment. Closed loop Buck converter using state space nonlinear differential equations and direct component model are compared to reveal best results at Standard Test Conditions (STC). MPPT model developed can be used for obtaining maximum power output from PV even in partial presence of sun using Fuzzy Logic Controller. The Controller designed tracks highest power output for the buck converter. The model developed, using tested membership functions in FLC, can serve a platform for various real time applications using PV.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"os-50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127789371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
TELKOMNIKA Indonesian Journal of Electrical Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1