cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA Indonesian Journal of Electrical Engineering
ISSN : 23024046     EISSN : 2087278X     DOI : -
TELKOMNIKA Indonesian Journal of Electrical Engineering (ISSN: 2302-4046, e-ISSN: 2087-278X, a Ei Compendex Indexed journal) is a monthly peer reviewed International Journal in English. The aim of this journal is to publish high-quality articles dedicated to all aspects of the latest outstanding developments in the field of electrical engineering. Its scope encompasses the applications of Telecommunication and Information Technology, Applied Computing and Computer, Instrumentation and Control, Electrical (Power), and Electronics Engineering.
Arjuna Subject : -
Articles 59 Documents
Search results for , issue " Vol 12, No 10: October 2014" : 59 Documents clear
Theory of the Solution of Inventive Problems for Flexure Design in Micro-Electro-Mechanical Systems Yu, Huiling; Cui, Shanshan
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/telkomnika.v12i10.6389

Abstract

In this paper detail of the optimization of a flexure design which is used in many MEMS devices will be presented. Due to a difference in thermal expansion coefficients between the flip-chip bonded MEMS device and the substrate, cooling after bonding can cause the MEMS to buckle; It is necessary to decrease the influence of distortion by using the correct material selection, welding method, weld design, fixture design, temperature control and TRIZ. We can seek out principles that can solve the problem. It can be concluded that an optimal flexure design will include the longest fold length and smallest fold spacing possible. By solving the deformation problem of MEMS devices can promote the development of flip chip technology, and make for the further application of the TRIZ theory in the study of forestry equipment.
ANSYS Simulation Analysis of Stray Currents on Subway Shield Tunnel Wang, Guo; Pei, Xiaoxiang
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/telkomnika.v12i10.5530

Abstract

In order to analyze the distribution rule and influence range of subway shield tunnel in different traction currents, a three-dimensional geometrical model and mathematical model of subway shield tunnel stray current field were built, and a finite element model was developed by Ansys. Simulating for homogeneous and stratified soil media were happened in the metro stray current field simulation, through different carry-currents of railway. Simulation show that the potential attenuation is nonlinear from the subway tunnel to the surrounding underground and along far away rail loading current of direction; The carry-current is different, the potential of surrounding media is different, and the greater the current, the greater the maximum potential. Each points stray current in situation of surrounding soil media subway tunnel shield can be analyzed by the three-dimensional finite element model, and provide the basis for the protection range of stray current and the protection at a specific location.
Model Construction and Simulation of Weighted Industrial Cluster Complex Network Wang, Lijun; Wen, Lei
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/telkomnika.v12i10.5185

Abstract

In this paper, we construct a weighted industrial cluster complex network model according to preferential attachment and local world mechanism, in which the logistics amount of business contact between one enterprise and others is defined as edge weight. We simulate and analyze statistic characteristics of the industrial cluster model such as degree distribution, point strength, point strength-point strength correlation, and relationship with degree and point strength. The simulation results show that the degree and point strength distribution are accord with power law distribution, the point strength-point strength correlation is negative, and the relationship with degree and point strength is strongly linear.
A Fault Detection Mechanism Based on Artificial Neural Network Distributed in Tunnel Liu, Liu; Chengqian, Ma
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/telkomnika.v12i10.5197

Abstract

This paper has made a qualitative and quantitative analysis by establishing the tunnel fault tree and giving the minimal cut sets of the faults in tunnel, and tested the data in tunnel combined with artificial neural network. The fault detection mechanism in this article has been simulated by MatLab and processed a lot of the actual data through the tunnel operating history. Experimental results show that: This fault detection mechanism is effective.
Provably Secure and Efficient ID-based Strong Designated Verifier Signature Scheme with Message Recovery Li, Min
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/telkomnika.v12i10.5202

Abstract

Many ID-based strong designated verifier signature schemes have been proposed in recent years. However, most of them did not give the rigorous security proofs and did not satisfy the strongness property that anyone except the designated verifier can not check the validity of a designated verifier signature, In addition, considering some special applications, these schemes have larger data size of communication. To overcome those problems, exploiting message recovery techniques which are regarded as a useful method to shorten ID-based signatures size, we put forward an efficient ID-based strong designated verifier signature schemes with message recovery and give its rigorous security proof in the random oracle model based on the hardness assumptions of the computational Bilinear Diffie-Hellman problem in this paper. To the best of our knowledge, it is the first ID-based strong designated verifier signature schemes with message recovery and rigorous security proofs. Due to its merits, it can be used in some special environments where the bandwidth is one of the main concerns, such as PDAs, cell phones, RFID etc.
Main Pump Seal’s Characteristics Affected by Cone Angle and Clearance Heshun, Wang; Weibing, Zhu; Zepei, Huang; Chening, Zhang
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/telkomnika.v12i10.5339

Abstract

Aimed at the face film characteristics of Main Pump Seal (MPS), related theoretical calculation formulas were deduced based on the Reynolds equation. A case with a certain NPPS is carried out, it is take the leakage as the basic constraint conditions, the calculation focusing on leakage, stiffness and opening force, the end cone angle and clearance change been the main changed parameters. The results show that: (1) Leakage is direct ratio with clearance of three powers;(2) Overall amount of leakage increases with the end cone angle synchronously, and in the smaller cone angle changes significantly while larger slightly; (3) film stiffness increased with clearance (cone angle) first and then decreased, and the maximum value is obtained in a certain clearance (cone angle). Finally, the preferred clearance is preferably in the range of 6~7µm, and the cone angle preferably value is 0.4~2.5. It is provide a reliable theoretical support for MPS design and key parameter optimization, and conducive to any research related to experiment and application.
Path Planning for Coalmine Rescue Robot Based on Hybrid Adaptive Artificial Fish Swarm Algorithm Zheng-Hua, Yao; Zi-Hui, Ren; Xian-Hua, Zhu; Shi-Chun, Li
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/telkomnika.v12i10.5247

Abstract

For the problem with imprecise optimal solution and reduced convergence efficiency of basic artificial fish swarm algorithm (BAFSA) in the late, the adaptive enhanced prey behavior of artificial fish and the segmented adaptive strategy of artificial fish’s view and step were designed. The hybrid adaptive artificial fish swarm algorithm (HAAFSA) was structured by the adaptive enhanced prey behavior and the segmented adaptive strategy of artificial fish’s view and step, which has been verified on research. According to the characteristics of the coalmine rescue environment, the path planning environment model was established in two-dimensional plane and the optimization constraints conditions were disposed by detecting the distance between path sections and barriers. The HAAFSA was applied to coalmine rescue robot path planning. Simulation results showed that the HAAFSA could improve the performance of the optimal path.
A Security Enhanced Password Authentication and Update Scheme Based on Elliptic Curve Cryptography Tu, Hang
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/telkomnika.v12i10.5259

Abstract

As two fundamental requirements to ensure secure communications over an insecure public network channel, password authentication and update of password have received considerable attention. To satisfy the above two requirements, Islam et al. proposed a password authentication and update scheme based on elliptic curve cryptography. They claimed that their scheme could withstand various attacks. Unfortunately, He et al. found Islam et al.’s scheme is still vulnerable to off-line password guessing attack and stolen-verifier attack. In this paper, a security enhanced scheme is developed to eliminate the identified weaknesses. The analysis shows that our scheme can not only overcome the security vulnerability in Islam et al.’s scheme, but also has better performance than their scheme. Then our scheme is more suitable for practical applications.
Combine Multi-predictor ofGas Concentration Prediction Based on Wavelet Transforms Xiang, Wu; Jian-Sheng, Qian
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/telkomnika.v12i10.5289

Abstract

A method of combine multi-predictoris proposed based on wavelet transform to improve the prediction precision of coal mine gas concentration time series. Firstly, the proposed model employ Mallat algorithm to decompose and reconstruct the gas concentration time series to isolate the low-frequency and high-frequency information. Then, ARMA model is built forthe prediction of high-frequency information and rectifies deviations of the predicted values by Markov bias correction method while the SVM model is used to fitthe prediction of the low-frequency information. At last, these predicted values are superimposedto obtain the predicted values of the original sequence. This method makes an effective separation of the feature information of gas concentration time series and takes full advantage of the features of different prediction models to achieve complementary advantages. The comparison experiment with the single-predictor models(BP, SVM) and single-predictor models based on wavelet decomposition(W-BP, W-SVM)show that the proposed method improves the overall predictionprecision.The results show that method has high precision and strong practicability.
Research on the Web-based On-line Monitoring Technology of the Smart Substation Primary Equipments Huang, Xinbo; Tao, Chen; Ji, Shuliang; Zhu, Haitao; Zhang, Zhouxiong; Wang, Xiaokuan
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/telkomnika.v12i10.5320

Abstract

Smart substation primary equipment on-line monitoring technology is an important part of the realization of substation intelligentizes monitoring. In order to meet the requirements of smart substation on high-speed, efficient, steady on-line monitoring system, the sharing of online monitoring data of the power station and to improve interoperability of on-line monitoring device, the primary equipment on-line monitoring technology of smart substation based on the network is proposed by this paper. Based on the analysis of the substation primary equipment monitoring parameters, according to the three levels and two network structure, the author designed primary equipment monitoring terminal (process level), primary equipment on-line monitoring IED (bay level), the monitoring center (station level)respectively, and between each level there are communication network structures. The scene practical operation analysis shows that, on-line monitoring system for substation which based on the network is stable and reliable, and the change of the equipment running status can be monitored accurately and timely.