cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 71 Documents
Search results for , issue "Vol 10, No 1: February 2021" : 71 Documents clear
Single event latch-up detection for nano-satellite external solar radiation mitigation system Norsuzila Yaa’cob; Muhammad Fauzan Ayob; Noraisyah Tajudin; Murizah Kassim; Azita Laily Yusof
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2488

Abstract

This paper presents the single event latch-up (SEL) detection for nano-satellite external solar radiation mitigation system. In this study, the SEL detection analysis was conducted using circuit test and simulation. An electrical power subsystem (EPS) is a part of all CubeSat bus subsystems and it comprises solar arrays, rechargeable batteries, and a power control and distribution unit (PCDU). In order to extract the maximum power generated by the solar arrays, a peak power tracking topology is required. This may lead to the SEL with the presence of high voltage produced by solar. To overcome the SEL problems, the circuit test and simulation must be done so that the flow of SEL will be easily detected and mitigate. The method that been used are by using microcontroller, the SEL will be created in the certain time. The programable integrated circuit (PIC) are used to mitigate SEL effect. It indicates that, the SEL occur very fast in certain time. When the simulation is conducted by using SPENVIS, the result shows, only single event upset (SEU) was affected on UiTMSAT-1.
Analyzing bit error rate of relay sensors selection in wireless cooperative communication systems Ahmed Allawy Alawady; Ahmed Alkhayyat; Mohammed Ahmed Jubair; Mustafa Hamid Hassan; Salama A. Mostafa
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2492

Abstract

Cooperative communication systems, which make use of the intermediate relays between the transmitter and the receiver, have been employed as an effective technique to combat the channel fading and to enhance system performance. Cooperative systems have some drawbacks such as high latency and may diversity order not guaranteed. To alleviate the negative effects of these factors, the relay selection protocol is employed in cooperative communication systems to increase overall cooperative system performance. Relay selection in the cooperative systems enables the source to cooperate with the single relay node rather than multiple relay nodes which guaranteed the diversity order.
A review of human skin detection applications based on image processing Hussein Ali Hussein Al Naffakh; Rozaida Ghazali; Nidhal Khdhair El Abbadi; Ali Nadhim Razzaq
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2497

Abstract

In computer science, virtual image processing is the use of a digital computer to manipulate digital images through an algorithm for many applications. To begin with a new research topic, the must trend application that gets many requests to develop should know. Therefore, many applications based on human skin and human life are reviewed in this article, such as detection, classification, blocking, cryptography, identification, localization, steganography, segmentation, tracking, and recognition. In this article, the published articles with the topic of human skin-based image processing are investigated. The international publishers, such as Springer, IEEE, arXiv, and Elsevier are selected. The searching is implemented with the duration criteria of 2015-2019. It noted that human skin detection and recognition are the most repetitive articles with 43% and 28.5%, respectively of the total number of the investigated articles. The usage of human skin models is being widely used in the image processing of various applications.
An optimal placement of phasor measurement unit using new sensitivity indices K. Khalid; A. A. Ibrahim; N. A. M. Kamari; M. H. M. Zaman
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2499

Abstract

This paper presents an alternative approach to solve an optimal phasor measurement unit (PMU) placement by introducing two new sensitivity indices. The indices are constructed from the information measured from PMUs such as voltage magnitude and angle. These two parameters are essential for power system stability assessment and control. Therefore, fault analysis is carried out to obtain the voltage magnitude and angle deviations at all buses in order to construct the indices. An exhaustive search method is used to solve the linear integer programming problem where all possible combinations of PMU placement are evaluated to obtain the optimal solution. Unfortunately, the traditional objective function to minimize the total number of PMU placement leads to multiple solutions. The indices can be used to assess multiple solutions of PMU placement from the exhaustive method. In this work, an optimal solution is selected based on the performance of PMU placement in according to the indices. The proposed method is tested on the IEEE 14 bus test system. Only four PMUs are required to monitor the whole test system. However, the number of PMUs can be reduced to three PMUs after applying zero injection bus elimination.
Research trends review on RSA scheme of asymmetric cryptography techniques Mohd Saiful Adli Mohamad; Roshidi Din; Jasmin Ilyani Ahmad
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2493

Abstract

One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper. 
“Scrumbear” framework for solving traditional scrum model problems Leanah Alsaber; Ebtesam Al Elsheikh; Sarah Aljumah; Nor Shahida Mohd Jamail
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2487

Abstract

Software engineering is a discipline that is little understood by people. It defines how software is developed and maintained to meet the clients’ requirements. Software engineers follow certain systems and standards in their work to meet the clients’ desires. It is on this background that engineers follow specific models in coming up with the final product. One of the models highly used is scrum, which is one of the agile methodologies. However, despite being highly used, it has inherent flaws that need to be corrected. Those flaws are product owner continues changing; do not accept changes in working scrum, sprint’s release time limitation, finally wasting team time within each sprint. This paper presents a new framework, which is an updated version of the current Scrum, to overcome the scum models mentioned issues. In this study, a new framework is presented in a way that is understandable and needed by software developer’s team upon the collected qualitative and quantitative data. The implementation was by making some changes to the current scrum model leading to the “Scrumbear”, certain flaws can be corrected. One of the presented changes involve adding the control master rule to ensure controlling the requirements changing.
Multischeme feedforward artificial neural network architecture for DDoS attack detection Arif Wirawan Muhammad; Cik Feresa Mohd Foozy; Kamaruddin Malik bin Mohammed
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2383

Abstract

Distributed denial of service attack classified as a structured attack to deplete server, sourced from various bot computers to form a massive data flow. Distributed denial of service (DDoS) data flows behave as regular data packet flows, so it is challenging to distinguish between the two. Data packet classification to detect DDoS attacks is one solution to prevent DDoS attacks and to maintain server resources maintained. The machine learning method especially artificial neural network (ANN), is one of the effective ways to detect the flow of data packets in a computer network. Based on the research that has carried out, it concluded that ANN with hidden layer architecture that contains neuron twice as neuron on the input layer (2n) produces a stable detection accuracy value on Quasi-Newton, scaled-conjugate and resilientpropagation training functions. Based on the studies conducted, it concluded that ANN architecture sufficiently affected the scaled-conjugate and resilient-propagation training functions, otherwise the Quasi-Newton training function. The best detection accuracy achieved from the experiment is 99.60%, 1.000 recall, 0.988 precision, and 0.993 f-measure using the quasinewton training function with 6-(12)-2 neural network architecture.
Towards an objective comparison of feature extraction techniques for automatic speaker recognition systems Ayoub Bouziane; Jamal Kharroubi; Arsalane Zarghili
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.1782

Abstract

A common limitation of the previous comparative studies on speaker-features extraction techniques lies in the fact that the comparison is done independently of the used speaker modeling technique and its parameters. The aim of the present paper is twofold. Firstly, it aims to review the most significant advancements in feature extraction techniques used for automatic speaker recognition. Secondly, it seeks to evaluate and compare the currently dominant ones using an objective comparison methodology that overcomes the various limitations and drawbacks of the previous comparative studies. The results of the carried out experiments underlines the importance of the proposed comparison methodology. 
Reconfiguration layers of convolutional neural network for fundus patches classification Wahyudi Setiawan; Moh. Imam Utoyo; Riries Rulaningtyas
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.1974

Abstract

Convolutional neural network (CNN) is a method of supervised deep learning. The architectures including AlexNet, VGG16, VGG19, ResNet 50, ResNet101, GoogleNet, Inception-V3, Inception ResNet-V2, and Squeezenet that have 25 to 825 layers. This study aims to simplify layers of CNN architectures and increased accuracy for fundus patches classification. Fundus patches classify two categories: normal and neovascularization. Data used for classification is MESSIDOR and Retina Image Bank that have 2,080 patches. Results show the best accuracy of 93.17% for original data and 99,33% for augmentation data using CNN 31 layers. It consists input layer, 7 convolutional layers, 7 batch normalization, 7 rectified linear unit, 6 max-pooling, fully connected layer, softmax, and output layer.
Selection of optimal hyper-parameter values of support vector machine for sentiment analysis tasks using nature-inspired optimization methods Lakshmana Kumar Ramasamy; Seifedine Kadry; Sangsoon Lim
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2098

Abstract

Sentiment analysis and classification task is used in recommender systems to analyze movie reviews, tweets, Facebook posts, online product reviews, blogs, discussion forums, and online comments in social networks. Usually, the classification is performed using supervised machine learning methods such as support vector machine (SVM) classifier, which have many distinct parameters. The selection of the values for these parameters can greatly influence the classification accuracy and can be addressed as an optimization problem. Here we analyze the use of three heuristics, nature-inspired optimization techniques, cuckoo search optimization (CSO), ant lion optimizer (ALO), and polar bear optimization (PBO), for parameter tuning of SVM models using various kernel functions. We validate our approach for the sentiment classification task of Twitter dataset. The results are compared using classification accuracy metric and the Nemenyi test.

Filter by Year

2021 2021


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue