Bulletin of Electrical Engineering and Informatics
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Articles
71 Documents
Search results for
, issue
"Vol 10, No 1: February 2021"
:
71 Documents
clear
DEH-DoSv6: A defendable security model against IPv6 extension headers denial of service attack
Marlon A. Naagas;
Alvin R. Malicdem;
Thelma D. Palaoag
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2670
With the rapid depletion of IPv4 protocol in these recent years, the IETF introduced IPv6 as a solution to address the exhaustion, however, as a new protocol exists, new characteristics have been introduced and new threats have been discovered. Extension Headers are the new characteristics of IPv6 that have an emerging and re-emerging security threats that is needed to be taken into consideration during the full migration to the IPv6 network. This study revealed that up to this moment, the popular vendors are still vulnerable and doesn’t have any default protection to deal with extension headers’ Denial of Service Attack (DoS). Also, this study leads to the development of new security model which creates a new solution to address the emerging threats of IPv6 extension headers’ Denial of Service Attack. Moreover, the results of this study show that our proposed security model is more effective in terms of neutralizing the unwanted traffic causing evasion attack by filtering, rate-limiting and discarding the malformed packets of prohibited extension headers’ payload versus the traditional router protection.
MULTISCHEME FEEDFORWARD ARTIFICIAL NEURAL NETWORK ARCHITECTURE FOR DDOS ATTACK DETECTION
Muhammad, Arif Wirawan;
Feresa Mohd Foozy, Cik;
Malik, Kamaruddin
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2671
Distributed denial of service attack classified as a structured attack to deplete server, sourced from various bot computers to form a massive data flow. Distributed denial of service (DDoS) data flows behave as regular data packet flows, so it is challenging to distinguish between the two. Data packet classification to detect DDoS attacks is one solution to prevent DDoS attacks and to maintain server resources maintained. The machine learning method especially artificial neural network (ANN), is one of the effective ways to detect the flow of data packets in a computer network. Based on the research that has carried out, it concluded that ANN with hidden layer architecture that contains neuron twice as neuron on the input layer (2n) produces a stable detection accuracy value on Quasi-Newton, Scaled-Conjugate and Resilient-Propagation training functions. Based on the studies conducted, it concluded that ANN Architecture sufficiently affected the Scaled-Conjugate and Resilient-Propagation training functions, otherwise the Quasi-Newton training function. The best detection accuracy achieved from the experiment is 99.60%, 1.000 recall, 0.988 precision, and 0.993 f-measure using the Quasi-Newton training function with 6-(12)-2 neural network architecture
Development of patch stack antenna for CP-SAR sensor
Muhammad Fauzan Edy Purnomo;
Vita Kusumasari;
Rusmi Ambarwati;
Sigit Kusmaryanto;
Sholeh Hadi Pramono;
Dwi Fadila Kurniawan;
Akio Kitagawa
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2672
In this paper, we obtain the basic configuration of the left-hand circular polarization (LHCP) array two patches stack triangular truncated microstrip antenna. This construction use the basic corporate feed microstrip-line with modified lossless T-junction power divider on radiating patch for circularly polarized-synthetic aperture radar (CP-SAR) sensor embedded on airspace with compact, small, and simple configuration. The design of Circular Polarization (CP) is realized by truncating the whole three tips and adjusting the parameters of antenna at the resonant frequency, f=5.2 GHz. The results of characteristic performance and S-parameter for the LHCP array two patches stack antenna at the resonant frequency show successively about 7.24 dBic of gain, 1.99 dB of axial ratio (Ar), and -11.43 dB of S-parameter. Moreover, the impedance bandwidth and the 3 dB-Ar bandwidth of this antenna are around 560 MHz (10.77%) and 50 MHz (0.96%), respectively.
Temperature monitoring using polymer optical fiber with integration to the internet of things
Hazura Haroon;
Siti Khadijah Idris;
Anis Suhaila Mohd Zain;
Hanim Abdul Razak;
Fauziyah Salehuddin
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2673
In this paper, a polymer optical fiber (POF) is applied for temperature measuring of water solution using a light source of 650nm. The aim is to analyse the impact of temperature variations on the output of POF sensor device in terms of output power and sensitivity. From the study, the POF sensor shows a linear trend when the temperature is increased from 30°C to 80°C with the sensitivity of the polymer optical fiber for output power to the temperature are 0.00973 dBm/°C or 0.14797 nW/°C, for optical characterization and 0.0011 V/°C for electrical characterization. The integration of the Internet of Things to the system helps the user to monitor the temperature of various spaces anywhere at any time. The sensed values are controlled by Arduino Uno R3 and then sent to Blynk to provide wireless monitoring by the user.
THE SEARCH FOR SCIENCE AND TECHNOLOGY VERSES IN QUR’AN AND HADITH
Taufik, Ichsan;
Jaenudin, Mohamad;
Badriyah, Fatimah Ulwiyatul;
Subaeki, Beki;
Kurahman, Opik Taupik
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2674
Currently, the Vector Space Model algorithm has been widely implemented for the document search feature because of its reliability in retrieving information. One of them in the search for verses of the Qur'an based on the translation. However, if the phrase or word used is different (even though it has one meaning) with the word in the document in the database, the system will not display the verse. As we know that the Qur'an has a very deep meaning, so an interpretation of the verse is needed. Therefore, this research focuses on implementing the Vector Space Model (VSM) algorithm for searching verses and hadiths in science and technology by using the discussion parameters of these verses or hadiths. The test results obtained with 20 keyword samples using metric recall were 81% with an average time of 2.24 seconds.
Correlation of learning disabilities to porn addiction based on EEG
Norhaslinda Kamaruddin;
Nurul Izzati Mat Razi;
Abdul Wahab
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2462
Researchers were able to correlate porn addiction based on electroencephalogram (EEG) signal analysis to the psychological instruments’ findings. In this paper we attempt to correlate the porn addiction to various cases of learning disorders through analyzing EEG signals. Since porn addiction involved the brainwave power at the frontal of the brain, which reflects the executive functions, this may have correlation to learning disorder. Only three types of learning disorder will be of interest in our study involving dyslexic, attention deficit and hyperactivity disorder (ADHD) and autistic children because they involved reduced intellectual ability observed from the lack of listening, speaking, reading, writing, reasoning, or mathematical proficiencies. Children with such disorder when expose to the internet unfiltered porn contents may have minimal understanding of the negative effects of the contents. Such unmonitored exposure to pornographic contents may result to porn addiction because it may trigger excitement and induced pleasure. Experimental results show strong correlation of learning disorders to porn addiction, which can be worthwhile for further analysis. In addition, this paper also indicates that analyzing brainwave patterns could provide a better insight into predicting and detecting children with learning disorders and addiction with direct analysis of the brain wave patterns.
Visualizing stemming techniques on online news articles text analytics
Nurul Atiqah Razmi;
Muhammad Zharif Zamri;
Sharifah Syafiera Syed Ghazalli;
Noraini Seman
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2504
Stemming is the process to convert words into their root words by the stemming algorithm. It is one of the main processes in text analytics where the text data needs to go through stemming process before proceeding to further analysis. Text analytics is a very common practice nowadays that is practiced toanalyze contents of text data from various sources such as the mass media and media social. In this study, two different stemming techniques; Porter and Lancaster are evaluated. The differences in the outputs that are resulted from the different stemming techniques are discussed based on the stemming error and the resulted visualization. The finding from this study shows that Porter stemming performs better than Lancaster stemming, by 43%, based on the stemming error produced. Visualization can still be accommodated by the stemmed text data but some understanding of the background on the text data is needed by the tool users to ensure that correct interpretation can be made on the visualization outputs.
Mobile ad-hoc network routing protocols of time-critical events for search and rescue missions
Marwan Hamid Hassan;
Salama A. Mostafa;
Hairulnizam Mahdin;
Aida Mustapha;
Azizul Azhar Ramli;
Mustafa Hamid Hassan;
Mohammed Ahmed Jubair
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2506
The most important experiences we discovered from several disasters are that cellular networks were vulnerable, and the loss of the communication system may have a catastrophic consequence. Mobile ad-hoc networks (MANETs) play a significant role in the construction of campus, resident, battlefield and search/rescue region. MANET is an appropriate network for supporting a communication where is no permanent infrastructure. MANET is an effective network that uses to establishing urgent communication between rescue members in critical situations like, disaster or natural calamities. The sending and receiving data in MANET is depending on the routing protocols to adapt the dynamic topology and maintain the routing information. Consequently, This paper evaluates the performance of three routing protocols in MANET: ad-hoc on-demand distance vector (AODV), destination sequenced distance vector (DSDV), and ad-hoc on-demand multipath distance vector (AOMDV). These protocols are inherent from different types of routing protocols: single-path, multi-path, reactive and proactive mechanisms. The NS2 simulator is utilized to evaluate the quality of these protocols. Several metrics are used to assess the performance of these protocols such: packet delivery ratio (PDR), packet loss ratios (PLR), throughput (TP), and end-to-end delay (E2E delay). The outcomes reveal the AOMDV is the most suitable protocol for time-critical events of search and rescue missions.
Cyclic voltammetry readout circuitry for DNA biosensor application
I. H. Hamzah;
A. A. Malik;
A. F. A. Rahim;
Z. H. C. Soh
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2507
Cyclic voltammetry electrochemical biosensors reported a wide usage and applications for its fast response, able to be miniaturized and its sensitivity. However, the bulky, expensive and laboratory-based readout circuitry made it impossible to be used in the field-based environment. A miniaturized and portable readout circuitry for the DNA detection using hybridization technique had been design and developed in this work. It embedded with fabricated FR4 based sensor and produced respective current when the applied voltage was within the range of 0 to 0.5 V. The readout circuitry had been verified with five analysis environments. Bare Au with distilled water (dH2O), bare Au with ferricyanide reagent solution, DNA immobilization, DNA non-hybridization and DNA hybridization. All the results performed produced peak cathodic current when the applied input voltage is within 0.5 V to 3 V and hence proved that the miniaturized and portable readout circuitry is suitable to be implemented for cyclic voltammetry electrochemical biosensor.
Review on feature-based method performance in text steganography
Mohd Hilal Muhammad;
Hanizan Shaker Hussain;
Roshidi Din;
Hafiza Samad;
Sunariya Utama
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2508
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the solution to protect the information that is able to hide the hidden message that is unrecognized by human or machine vision. This paper concerns about one of the categories in steganography on medium of text called text steganography that specifically focus on feature-based method. This paper reviews some of previous research effort in last decade to discover the performance of technique in the development the feature-based on text steganography method. Then, ths paper also concern to discover some related performance that influences the technique and several issues in the development the feature-based on text steganography method.