cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 71 Documents
Search results for , issue "Vol 10, No 1: February 2021" : 71 Documents clear
A fuzzy multi-criteria decision-making method for purchasing life insurance in India Chinmaya Ranjan Pattnaik; Sachi Nandan Mohanty; Sarita Mohanty; Jyotir Moy Chatterjee; Biswajit Jana; Vicente Garcia Diaz
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2275

Abstract

Life insurance is an agreement between an insured and an insurer, where the insurer pays out a sum of money either on a specific period or the death of the insured. Now a day, People can buy a policy through an online platform. There are a lot of insurance companies available in the market, and each company has various policies. Selecting the best insurance company for purchasing an online term plan is a very complex problem. People may confuse to choose the best insurance company for buying an online term. It is a multi-criteria decision making (MCDM) problem, and the problem consists of different criteria and various alternatives. Here in this paper, a model has been proposed to solve this decision-making problem. In this model, a fuzzy multi-criteria decision-making approach combined with technique for order preference by similarity to ideal solution (TOPSIS) and it has been applied to rank the different insurance companies based on online term plans. The experimental results show that the life insurance corporation of India (LIC) gets the top rank out of 12 companies for purchasing an online term plan. A sensitivity analysis has been performed to validate the proposed model.
A review of website evaluation using web diagnostic tools and data envelopment analysis Hassan Najadat; Amer Al-Badarneh; Sawsan Alodibat
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.1755

Abstract

This paper presents a review of the most recently published works of the use of data envelopment analysis (DEA) in the evaluation of websites of different fields such as healthcare, e-business, e-commerce, and e-government. The evaluation of websites is performed using web diagnostic tools (WDTs). Some studies have evaluated e-government websites using WDTs only, while others integrate them with data envelopment analysis. We summarize each study including the country that was conducted in, the size of data set, inputs to DEA, outputs from DEA, the approach used, the tools used, and the results obtained. It also covers whether there is a use of combination between DEA and data mining or machine learning approaches to classify the efficiency of these websites.
Improved El Gamal public key cryptosystem using 3D chaotic maps Muna KH. Al-naamee; Sura Mazin Ali
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2124

Abstract

Digital information is any type of data that is stored electronically. These data need to protect its assets and unauthorized access to it and therefore need measures to protect digital privacy. This process is done in different ways, one of which is encryption. Encryption provides secure transfer of unauthorized data over insecure channels. In this paper a method is proposed to create the keys to the El Gamal PKC algorithm based on chaos theory. The proposed algorithm uses 3D chaos maps to create keys used in the encryption and decryption process using an El Gamal algorithm. The time spent encoding and decoding in milliseconds was calculated and compared with methods that used 1D and 2D chaotic maps. Also, the results obtained exceeded most of the statistical and NIST tests. The generated results are tested their reactions against many types of attacks. Then, the results showed that the proposed method had an excellent randomness efficiency for creating public and private keys for El Gamal's algorithm.
Robot control and kinematic analysis with 6DoF manipulator using direct kinematic method Khalaf S Gaeid; Asaad F Nashee; Ibrahim A. Ahmed; Mohammed H. Dekheel
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2482

Abstract

The robots pay important role in all parts of our life. Hence, the modeling of the robot is essential to develop the performance specification. Robot model of six degree of freedom (6DoF) manipulator implemented numerically using model-based technique. The kinematic analysis and simulation were studied with Inverse kinematics of the robot manipulator through Denevit and Hartenberg method. Matrix transformation method is used in this work in order to separate joint variables from kinematic equations. The finding of the desired configuration is obtained precisely in all motion trajectory along the end-effector path. MATLAB/SIMULINK with R2018b is used for the implementation of the model-based robot system. Simulation results showed that the robot rinks follow their references smoothly and precisely and ensure the effectiveness of direct kinematic algorithm in the analysis and control of the robotic field.
Discretization methods for Bayesian networks in the case of the earthquake Devni Prima Sari; Dedi Rosadi; Adhitya Ronnie Effendie; Danardono Danardono
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2007

Abstract

The Bayesian networks are a graphical probability model that represents interactions between variables. This model has been widely applied in various fields, including in the case of disaster. In applying field data, we often find a mixture of variable types, which is a combination of continuous variables and discrete variables. For data processing using hybrid and continuous Bayesian networks, all continuous variables must be normally distributed. If normal conditions unsatisfied, we offer a solution, is to discretize continuous variables. Next, we can continue the process with the discrete Bayesian networks. The discretization of a variable can be done in various ways, including equal-width, equal-frequency, and K-means. The combination of BN and k-means is a new contribution in this study called the k-means Bayesian networks (KMBN) model. In this study, we compared the three methods of discretization used a confusion matrix. Based on the earthquake damage data, the K-means clustering method produced the highest level of accuracy. This result indicates that K-means is the best method for discretizing the data that we use in this study.
Enhancement of digital signature algorithm in bitcoin wallet Farah Maath Jasem; Ali Makki Sagheer; Abdullah M. Awad
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2339

Abstract

Bitcoin is a peer-to-peer electronic cash system largely used for online financial transactions. It gained popularity due to its anonymity, privacy, and comparatively low transaction cost. Its wallet heavily relies on elliptic curve digital signature algorithm (ECDSA). Weaknesses in such algorithms can significantly affect the safety and the security of bitcoin wallets. In this paper, a secure key management wallet was designed based on several changes in the wallet parts. In the cold wallet, we employed an image-based passphrase to achieve a strong entropy source of master seed. The hot wallet, the proposed Key_Gen algorithm is modifying to the key generation step of the ECDSA that it is to generate a fresh key pair at each transaction. The final part ensures recovering all keys on both hot and cold wallets without daily backups in case of losing the wallet. The findings prove that the proposed cold wallet is resisting against a dictionary attack and overcoming the memorizing problem. The proposed hot wallet model acquires good anonymity and privacy for bitcoin users by eliminating transaction likability without additional cost. The execution time for signing a transaction of the proposed model is~70 millisecond, which is then important in the bitcoin domain.
Behavioral studies of surge protection components Teik Hua Kuan; Kuew Wai Chew; Kein Huat Chua
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2665

Abstract

In our daily life, almost all the items we used, being a computer, television, lift or vehicle we drive consist of some kind of electrical or electronics component inside. The operation of these devices could be severely affected by lightning activity or electrical switching events, as there are more than 2000 thunderstorms in progress at any time resulting in 100 lightning flashes to ground per second. In practice, any device using electricity will subject to surge damages induced from the lightning or switching of heavy load. Surge protection device (SPD) is added at the power distribution panel and critical process loop to prevent damage subsequently cause plant shutdown. There are many questions raised on the SPD. How can this small device protect the equipment from large energy release by the lightning? What is inside the device? How does it work? This paper provides comprehensive detail in revealing the science and engineering behind the SPD, its individual component characteristic and how does it work. The technical information presented is limited to surge protection on equipment; surge protection for building structure will not be discussed here.
Signature PSO: A novel inertia weight adjustment using fuzzy signature for LQR tuning Achmad Komarudin; Novendra Setyawan; Leonardo Kamajaya; Mas Nurul Achmadiah; Zulfatman Zulfatman
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2667

Abstract

Particle swarm optimization (PSO) is an optimization algorithm that is simple and reliable to complete optimization. The balance between exploration and exploitation of PSO searching characteristics is maintained by inertia weight. Since this parameter has been introduced, there have been several different strategies to determine the inertia weight during a train of the run. This paper describes the method of adjusting the inertia weights using fuzzy signatures called signature PSO. Some parameters were used as a fuzzy signature variable to represent the particle situation in a run. The implementation to solve the tuning problem of linear quadratic regulator (LQR) control parameters is also presented in this paper. Another weight adjustment strategy is also used as a comparison in performance evaluation using an integral time absolute error (ITAE). Experimental results show that signature PSO was able to give a good approximation to the optimum control parameters of LQR in this case.
NON-INVASIVE GLUCOSE MONITORING DEVICES: A REVIEW Farhan Affendi Mohamad Yunos, Muhammad; Nordin, Anis Nurashikin
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2668

Abstract

Diabetes is a growing chronic disease that affect millions of people in the world. Regular monitoring of blood glucose levels in patients is necessary to keep the disease under control. Current methods of blood glucose monitoring devices are typically invasive, causing discomfort to the patients. Non-invasive glucose monitoring devices are a possible game changer for diabetic patients as it reduces discomfort and provides continuous monitoring. This manuscript presents a review of non-invasive glucose biosensors with particular focus on leading technologies available in the market, such as microwave sensing, near-infrared spectroscopy, iontophoresis, and optical methods. This paper intends to describe non-invasive blood glucose monitoring methods using various biological fluids (sweat, saliva, interstitial fluid, urine), highlighting the advantages and drawbacks in latest device development. This review also discusses future trends of glucose detection devices and how it will improve patients? quality of life.
Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote monitoring Amirun Murtaza Abd Jalil; Roslina Mohamad; Nuzli Mohamad Anas; Murizah Kassim; Saiful Izwan Suliman
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2669

Abstract

In this paper, an implementation of vehicle ventilation system using microcontroller NodeMCU is described, as an internet of things (IoT) platform. A low-cost wireless fidelity (Wi-Fi) microchip ESP8266 integrated with NodeMCU provides full-stack transmission control protocol/internet protocol (TCP/IP) to communicate between mobile applications. This chip is capable to monitor and control sensor devices connected to the IoT platform. In this reserach, data was collected from a temperature sensor integrated to the platform, which then monitored using Blynk application. The vehicle ventilation system was activated/deactivated through mobile application and controlled using ON/OFF commands sent to the connected devices. From the results, the vehicle ventilation system built using NodeMCU microcontroller is capable to provide near real-time data monitoring for temperature in the car before and after the ventilation system was applied.

Filter by Year

2021 2021


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue