cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 71 Documents
Search results for , issue "Vol 10, No 1: February 2021" : 71 Documents clear
DEH-DoSv6: A defendable security model against IPv6 extension headers denial of service attack Marlon A. Naagas; Alvin R. Malicdem; Thelma D. Palaoag
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2670

Abstract

With the rapid depletion of IPv4 protocol in these recent years, the IETF introduced IPv6 as a solution to address the exhaustion, however, as a new protocol exists, new characteristics have been introduced and new threats have been discovered. Extension Headers are the new characteristics of IPv6 that have an emerging and re-emerging security threats that is needed to be taken into consideration during the full migration to the IPv6 network. This study revealed that up to this moment, the popular vendors are still vulnerable and doesn’t have any default protection to deal with extension headers’ Denial of Service Attack (DoS). Also, this study leads to the development of new security model which creates a new solution to address the emerging threats of IPv6 extension headers’ Denial of Service Attack. Moreover, the results of this study show that our proposed security model is more effective in terms of neutralizing the unwanted traffic causing evasion attack by filtering, rate-limiting and discarding the malformed packets of prohibited extension headers’ payload versus the traditional router protection.
MULTISCHEME FEEDFORWARD ARTIFICIAL NEURAL NETWORK ARCHITECTURE FOR DDOS ATTACK DETECTION Muhammad, Arif Wirawan; Feresa Mohd Foozy, Cik; Malik, Kamaruddin
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2671

Abstract

Distributed denial of service attack classified as a structured attack to deplete server, sourced from various bot computers to form a massive data flow. Distributed denial of service (DDoS) data flows behave as regular data packet flows, so it is challenging to distinguish between the two. Data packet classification to detect DDoS attacks is one solution to prevent DDoS attacks and to maintain server resources maintained. The machine learning method especially artificial neural network (ANN), is one of the effective ways to detect the flow of data packets in a computer network. Based on the research that has carried out, it concluded that ANN with hidden layer architecture that contains neuron twice as neuron on the input layer (2n) produces a stable detection accuracy value on Quasi-Newton, Scaled-Conjugate and Resilient-Propagation training functions. Based on the studies conducted, it concluded that ANN Architecture sufficiently affected the Scaled-Conjugate and Resilient-Propagation training functions, otherwise the Quasi-Newton training function. The best detection accuracy achieved from the experiment is 99.60%, 1.000 recall, 0.988 precision, and 0.993 f-measure using the Quasi-Newton training function with 6-(12)-2 neural network architecture
Development of patch stack antenna for CP-SAR sensor Muhammad Fauzan Edy Purnomo; Vita Kusumasari; Rusmi Ambarwati; Sigit Kusmaryanto; Sholeh Hadi Pramono; Dwi Fadila Kurniawan; Akio Kitagawa
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2672

Abstract

In this paper, we obtain the basic configuration of the left-hand circular polarization (LHCP) array two patches stack triangular truncated microstrip antenna. This construction use the basic corporate feed microstrip-line with modified lossless T-junction power divider on radiating patch for circularly polarized-synthetic aperture radar (CP-SAR) sensor embedded on airspace with compact, small, and simple configuration. The design of Circular Polarization (CP) is realized by truncating the whole three tips and adjusting the parameters of antenna at the resonant frequency, f=5.2 GHz. The results of characteristic performance and S-parameter for the LHCP array two patches stack antenna at the resonant frequency show successively about 7.24 dBic of gain, 1.99 dB of axial ratio (Ar), and -11.43 dB of S-parameter. Moreover, the impedance bandwidth and the 3 dB-Ar bandwidth of this antenna are around 560 MHz (10.77%) and 50 MHz (0.96%), respectively.
Temperature monitoring using polymer optical fiber with integration to the internet of things Hazura Haroon; Siti Khadijah Idris; Anis Suhaila Mohd Zain; Hanim Abdul Razak; Fauziyah Salehuddin
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2673

Abstract

In this paper, a polymer optical fiber (POF) is applied for temperature measuring of water solution using a light source of 650nm. The aim is to analyse the impact of temperature variations on the output of POF sensor device in terms of output power and sensitivity. From the study, the POF sensor shows a linear trend when the temperature is increased from 30°C to 80°C with the sensitivity of the polymer optical fiber for output power to the temperature are 0.00973 dBm/°C or 0.14797 nW/°C, for optical characterization and 0.0011 V/°C for electrical characterization. The integration of the Internet of Things to the system helps the user to monitor the temperature of various spaces anywhere at any time. The sensed values are controlled by Arduino Uno R3 and then sent to Blynk to provide wireless monitoring by the user. 
THE SEARCH FOR SCIENCE AND TECHNOLOGY VERSES IN QUR’AN AND HADITH Taufik, Ichsan; Jaenudin, Mohamad; Badriyah, Fatimah Ulwiyatul; Subaeki, Beki; Kurahman, Opik Taupik
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2674

Abstract

Currently, the Vector Space Model algorithm has been widely implemented for the document search feature because of its reliability in retrieving information. One of them in the search for verses of the Qur'an based on the translation. However, if the phrase or word used is different (even though it has one meaning) with the word in the document in the database, the system will not display the verse. As we know that the Qur'an has a very deep meaning, so an interpretation of the verse is needed. Therefore, this research focuses on implementing the Vector Space Model (VSM) algorithm for searching verses and hadiths in science and technology by using the discussion parameters of these verses or hadiths. The test results obtained with 20 keyword samples using metric recall were 81% with an average time of 2.24 seconds.
Correlation of learning disabilities to porn addiction based on EEG Norhaslinda Kamaruddin; Nurul Izzati Mat Razi; Abdul Wahab
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2462

Abstract

Researchers were able to correlate porn addiction based on electroencephalogram (EEG) signal analysis to the psychological instruments’ findings. In this paper we attempt to correlate the porn addiction to various cases of learning disorders through analyzing EEG signals. Since porn addiction involved the brainwave power at the frontal of the brain, which reflects the executive functions, this may have correlation to learning disorder. Only three types of learning disorder will be of interest in our study involving dyslexic, attention deficit and hyperactivity disorder (ADHD) and autistic children because they involved reduced intellectual ability observed from the lack of listening, speaking, reading, writing, reasoning, or mathematical proficiencies. Children with such disorder when expose to the internet unfiltered porn contents may have minimal understanding of the negative effects of the contents. Such unmonitored exposure to pornographic contents may result to porn addiction because it may trigger excitement and induced pleasure. Experimental results show strong correlation of learning disorders to porn addiction, which can be worthwhile for further analysis. In addition, this paper also indicates that analyzing brainwave patterns could provide a better insight into predicting and detecting children with learning disorders and addiction with direct analysis of the brain wave patterns.
Visualizing stemming techniques on online news articles text analytics Nurul Atiqah Razmi; Muhammad Zharif Zamri; Sharifah Syafiera Syed Ghazalli; Noraini Seman
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2504

Abstract

Stemming is the process to convert words into their root words by the stemming algorithm. It is one of the main processes in text analytics where the text data needs to go through stemming process before proceeding to further analysis. Text analytics is a very common practice nowadays that is practiced toanalyze contents of text data from various sources such as the mass media and media social. In this study, two different stemming techniques; Porter and Lancaster are evaluated. The differences in the outputs that are resulted from the different stemming techniques are discussed based on the stemming error and the resulted visualization. The finding from this study shows that Porter stemming performs better than Lancaster stemming, by 43%, based on the stemming error produced. Visualization can still be accommodated by the stemmed text data but some understanding of the background on the text data is needed by the tool users to ensure that correct interpretation can be made on the visualization outputs.
Mobile ad-hoc network routing protocols of time-critical events for search and rescue missions Marwan Hamid Hassan; Salama A. Mostafa; Hairulnizam Mahdin; Aida Mustapha; Azizul Azhar Ramli; Mustafa Hamid Hassan; Mohammed Ahmed Jubair
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2506

Abstract

The most important experiences we discovered from several disasters are that cellular networks were vulnerable, and the loss of the communication system may have a catastrophic consequence. Mobile ad-hoc networks (MANETs) play a significant role in the construction of campus, resident, battlefield and search/rescue region. MANET is an appropriate network for supporting a communication where is no permanent infrastructure. MANET is an effective network that uses to establishing urgent communication between rescue members in critical situations like, disaster or natural calamities. The sending and receiving data in MANET is depending on the routing protocols to adapt the dynamic topology and maintain the routing information. Consequently, This paper evaluates the performance of three routing protocols in MANET: ad-hoc on-demand distance vector (AODV), destination sequenced distance vector (DSDV), and ad-hoc on-demand multipath distance vector (AOMDV). These protocols are inherent from different types of routing protocols: single-path, multi-path, reactive and proactive mechanisms. The NS2 simulator is utilized to evaluate the quality of these protocols. Several metrics are used to assess the performance of these protocols such: packet delivery ratio (PDR), packet loss ratios (PLR), throughput (TP), and end-to-end delay (E2E delay). The outcomes reveal the AOMDV is the most suitable protocol for time-critical events of search and rescue missions.
Cyclic voltammetry readout circuitry for DNA biosensor application I. H. Hamzah; A. A. Malik; A. F. A. Rahim; Z. H. C. Soh
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2507

Abstract

Cyclic voltammetry electrochemical biosensors reported a wide usage and applications for its fast response, able to be miniaturized and its sensitivity. However, the bulky, expensive and laboratory-based readout circuitry made it impossible to be used in the field-based environment. A miniaturized and portable readout circuitry for the DNA detection using hybridization technique had been design and developed in this work. It embedded with fabricated FR4 based sensor and produced respective current when the applied voltage was within the range of 0 to 0.5 V. The readout circuitry had been verified with five analysis environments. Bare Au with distilled water (dH2O), bare Au with ferricyanide reagent solution, DNA immobilization, DNA non-hybridization and DNA hybridization. All the results performed produced peak cathodic current when the applied input voltage is within 0.5 V to 3 V and hence proved that the miniaturized and portable readout circuitry is suitable to be implemented for cyclic voltammetry electrochemical biosensor.
Review on feature-based method performance in text steganography Mohd Hilal Muhammad; Hanizan Shaker Hussain; Roshidi Din; Hafiza Samad; Sunariya Utama
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2508

Abstract

The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the solution to protect the information that is able to hide the hidden message that is unrecognized by human or machine vision. This paper concerns about one of the categories in steganography on medium of text called text steganography that specifically focus on feature-based method. This paper reviews some of previous research effort in last decade to discover the performance of technique in the development the feature-based on text steganography method. Then, ths paper also concern to discover some related performance that influences the technique and several issues in the development the feature-based on text steganography method.

Filter by Year

2021 2021


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue