cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 71 Documents
Search results for , issue "Vol 10, No 1: February 2021" : 71 Documents clear
Optimal tuning of a wind plant energy production based on improved grey wolf optimizer Mohd Zaidi Mohd Tumari; Mohd Muzaffar Zahar; Mohd Ashraf Ahmad
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2509

Abstract

The tuning of optimal controller parameters in wind plant is crucial in order to minimize the effect of wake interaction between turbines. The purpose of this paper is to develop an improved grey wolf optimizer (I-GWO) in order to tune the controller parameters of the turbines so that the total energy production of a wind plant is increased. The updating mechanism of original GWO is modified to improve the efficiency of exploration and exploitation phase while avoiding trapping in local minima solution. A row of ten turbines is considered to evaluate the effectiveness of the I-GWO by maximizing the total energy production. The proposed approach is compared with original GWO and previously published modified GWO. Finally, I-GWO produces the highest total energy production as compared to other methods, as shown in statistical performance analysis.
Wireless sensor network calibration technique for low-altitude unmanned aerial vehicle localization in paddy field Azhar Jaafar; Norashikin M. Thamrin; Noorolpadzilah Mohamed Zan
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2512

Abstract

This paper presents the use of the received signal strength indicator (RSSI) from the RF signal to estimate the distance from a point where the signal is transmitted to the point where the signal is received. This can be a challenge as in the paddy field, the watery and dry conditions, as well as the height of the paddy plant can affect signal transmission during this estimation process. Two low-cost ground beacons, Beacon1 and Beacon2 (The coordinator), are used and placed in a known location with a fixed distance across the paddy field, which becomes the reference point during the distance estimation for the unmanned aerial vehicle (UAV). These signals are analyzed by using the non-right-angle trigonometry computation, to estimate the distance between the transmitter and the receiver. The estimated distance is compared with the measured value to determine the efficiency of this approach. The calibration trendlines of these beacons in the open, watery and dry paddy fields are discussed and presented. It is found that the dry paddy field gives less RSSI mean error and proved that humidity can contribute to the distance estimation error.
Integration of LED-based lighting in academic buildings for energy efficiency considerations Mohamad Zhafran Hussin; Saiful Firdaus Abdul Shukor; Nor Diyana Md Sin; Yusrina Yusof; Muhammad Zairil Muhammad Nor; Noor Hasliza Abdul Rahman
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2513

Abstract

This paper presents an assessment by integration of LED T8 tube lamps in academic buildings for energy efficiency considerations. The proposed project was implemented in conjunction with a national mission, national energy efficiency action plan (NEEAP) for 10-year implementation period of 2016-2025 in reducing allocation on subsidies for efficient expenditure towards energy-saving measures. A case of study in a real environment at one of the UiTM’s buildings as a target task area has been tested by replacing a LED lighting technology in consideration of current operating costs and power factor performances. From the results, LED T8 tubes have shown a better power factor of 0.89 compared to fluorescent lamps with about 0.61 and primarily driven by economic benefits in terms of cost savings of up to 50% with return-on-investment (ROI) 6 months after installation. By integrating this technology, nearly 50% of the total energy consumption in indoor lighting system could be significantly saved, thus reducing the total cost of electricity bills in the future within the target area.
Analyzing the impact of the number of nodes on the performance of the routing protocols in manet environment Hussein M. Haglan; Salama A. Mostafa; Noor Zuraidin Mohd Safar; Aida Mustapha; Mohd. Zainuri Saringatb; Hosam Alhakami; Wajdi Alhakami
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2516

Abstract

Mobile Ad-hoc Networks (MANETs) are independent systems that can work without the requirement for unified controls, pre-setup to the paths/routes or advance communication structures. The nodes/hubs of a MANET are independently controlled, which permit them to behave unreservedly in a randomized way inside the MANET. The hubs can leave their MANET and join different MANETs whenever the need arises. These attributes, in any case, may contrarily influence the performance of the routing conventions (or protocols) and the general topology of the systems. Along these lines, MANETs include uniquely planned routing conventions that responsively as well as proactively carry out the routing. This paper assesses and looks at the effectiveness (or performance) of five directing conventions which are AOMDV, DSDV, AODV, DSR and OLSR in a MANET domain. The research incorporates executing a simulating environment to look at the operation of the routing conventions dependent on the variable number of hubs. Three evaluation indices are utilized: Throughput (TH), Packet Delivery Ratio (PDR), and End-to-End delay (E2E). The assessment outcomes indicate that the AODV beats other conventions in the majority of the simulated scenarios.
Traid-bit embedding process on Arabic text steganography method Roshidi Din; Reema Ahmed Thabit; Nur Izura Udzir; Sunariya Utama
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2518

Abstract

The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.
An enhanced fireworks algorithm to generate prime key for multiple users in fingerprinting domain Hussein Ali Ismael; Jamal Mustafa Abbas; Salama A. Mostafa; Ali Hussein Fadel
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2521

Abstract

This work presents a new method to enhance the performance of fireworks algorithm to generate a prime key for multiple users. A threshold technique in image segmentation is used as one of the major steps. It is used processing the digital image. Some useful algorithms and methods for dividing and sharing an image, including measuring, recognizing, and recognizing, are common. In this research, we proposed a hybrid technique of fireworks and camel herd algorithms (HFCA), where Fireworks are based on 3-dimension (3D) logistic chaotic maps. Both, the Otsu method and the convolution technique are used in the pre-processing image for further analysis. The Otsu is employed to segment the image and find the threshold for each image, and convolution is used to extract the features of the used images. The sample of the images consists of two images of fingerprints taken from the Biometric System Lab (University of Bologna). The performance of the anticipated method is evaluated by using FVC2004 dataset. The results of the work enhanced algorithm, so quick response code (QRcode) is used to generate a stream key by using random text or number, which is a class of symmetric-key algorithm that operates on individual bits or bytes.
Deblurring of noisy iris images in iris recognition Shahrizan Jamaludin; Nasharuddin Zainal; W Mimi Diyana W Zaki
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2467

Abstract

Iris recognition used the iris features to verify and identify the identity of human. The iris has many advantages such as stability over time, easy to use and high recognition accuracy. However, the poor quality of iris images can degrade the recognition accuracy of iris recognition system. The recognition accuracy of this system is depended on the iris pattern quality captured during the iris acquisition. The iris pattern quality can degrade due to the blurry image. Blurry image happened due to the movement during image acquisition and poor camera resolution. Due to that, a deblurring method based on the Wiener filter was proposed to improve the quality of iris pattern. This work is significant since the proposed method can enhance the quality of iris pattern in the blurry image. Based to the results, the proposed method improved the quality of iris pattern in the blurry image. Moreover, it recorded the fastest execution time to improve the quality of iris pattern compared to the other methods.
Data-based PID control of flexible joint robot using adaptive safe experimentation dynamics algorithm Mohd Ashraf Ahmad; Haszuraidah Ishak; Ahmad Nor Kasruddin Nasir; Normaniha Abd Ghani
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2472

Abstract

This paper proposes the data-based PID controller of flexible joint robot based on adaptive safe experimentation dynamics (ASED) algorithm. The ASED algorithm is an enhanced version of SED algorithm where the updated tuning variable is modified to adapt to the change of the objective function. By adopting the adaptive term to the updated equation of SED, it is expected that the convergence accuracy can be further improved. The effectiveness of the ASED algorithm is verified to tune the PID controller of flexible joint robot. In this flexible joint control problem, two PID controllers are utilized to control both rotary angle tracking and vibration of flexible joint robot. The performance of the proposed data-based PID controller is assessed in terms of trajectory tracking of angular motion, vibration reduction and statistical analysis of the pre-defined control objective function. The simulation results showed that the data-based PID controller based on ASED is able to produce better control accuracy than the conventional SED based method.
Physical activity prediction using fitness data: Challenges and issues Nur Zarna Elya Zakariya; Marshima Mohd Rosli
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2474

Abstract

In the new healthcare transformations, individuals are encourage to maintain healthy life based on their food diet and physical activity routine to avoid risk of serious disease. One of the recent healthcare technologies to support self health monitoring is wearable device that allow individual play active role on their own healthcare. However, there is still questions in terms of the accuracy of wearable data for recommending physical activity due to enormous fitness data generated by wearable devices. In this study, we conducted a literature review on machine learning techniques to predict suitable physical activities based on personal context and fitness data. We categorize and structure the research evidence that has been publish in the area of machine learning techniques for predicting physical activities using fitness data. We found 10 different models in behavior change technique (BCT) and we selected two suitable models which are fogg behavior model (FBM) and trans-theoretical behavior model (TTM) for predicting physical activity using fitness data. We proposed a conceptual framework which consists of personal fitness data, combination of TTM and FBM to predict the suitable physical activity based on personal context. This study will provide new insights in software development of healthcare technologies to support personalization of individuals in managing their own health.
Statistical survey and comprehensive review on human skin detection Hussein Ali Hussein Al Naffakh; Rozaida Ghazali; Nidhal Khdhair El Abbadi
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2486

Abstract

With the advancement of data society today, pictures have turned out to be increasingly imperative. Automatic detection of human skin has been an area of active research for the past few years. Human skin detection assumes a vital job in a wide scope of picture preparing applications going from face detection, steganography, face tracking, age detection, discover pornographic images, the discovery of skin diseases gesture analysis and substance based picture recovery frameworks and to different human PC association spaces. Detecting human skin in complex pictures have ended up being a difficult issue since skin shading can fluctuate drastically in its appearance because of numerous variables, for example, illumination, race, maturing, imaging conditions, and complex foundation. In this study, we will study and analyze skin researches, where we will treat the weakness of previous research of survey on human skin detection methods. The reason for this investigation is to give a state-of-the-art study on human skin molding and detection methods in 1998-2019 periods. Furthermore, this research presented the statistical study for each issue stated before. We finish up with a few ramifications for a future course. Study results will benefit all researchers who are interested in human skin detection topic.

Filter by Year

2021 2021


Filter By Issues
All Issue Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue