cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 64 Documents
Search results for , issue "Vol 12, No 2: April 2023" : 64 Documents clear
Systematic literature review: application of deep learning processing technique for fig fruit detection and counting Ahmad Shukri Firdhaus Kamaruzaman; Adi Izhar Che Ani; Mohammad Afiq Hamdani Mohammad Farid; Siti Juliana Abu Bakar; Mohd Ikmal Fitri Maruzuki; Samsul Setumin; Mokh. Sholihul Hadi
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4455

Abstract

Deep learning has shown much promise in target identification in recent years, and it's becoming more popular in agriculture, where fig fruit detection and counting have become important. In this study, a systematic literature review (SLR) is utilised to evaluate a deep learning algorithm for detecting and counting fig fruits. The SLR is based on the widely used 'Reporting Standards for Systematic Evidence Synthetics' (ROSES) review process. The study starts by formulating the research questions, and the proposed SLR approach is critically discussed until the data abstraction and analysis process is completed. Following that, 33 relevant research involving the agriculture sector, fruit, were selected from many studies. IEEE, Scopus, and Web of Sciences are three databases to investigate. Due to the lack of fig fruit research, fruit and vegetable studies have been included because they use similar methods and processes. The SLR found that various deep learning algorithms can count fig fruit in the field. Furthermore, as most approaches obtained acceptable results, deep learning's performance is acceptable in F1-score and average precision (AP), higher than 80%. Moreover, improvements can be produced by enhancing the existing deep learning model with the personal dataset.
Field programmable gate array based moving object tracking system for robot navigation Hoang T. Tran; Dong LT. Tran; Quang N. Pham; Thanh C. Vo; Quan NA. Nguyen; Thang K. Nguyen; Duyen M. Ha; Minh T. Nguyen
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4538

Abstract

This paper proposes a method in which an object tracking robot system is implemented on field programmable gate arrays (FPGAs). The OV7670 camera provides real-time object pictures to the system. To improve picture quality, images are put via the median filter phase. The item is distinguished from the backdrop based on color (red), after which it is subjected to a mathematical morphological approach of filtering to eliminate noise. To send the robot control signals, the object's (new) coordinates are found. In this method, the median filter, color separation, hardware IP cores, and morphological filter are all part of the embedded system on FPGA. Through the direct memory access (DMA) controller, these cores may communicate and perform high-speed pipeline computing at higher data rates. The entire system is executed in real-time on Xilinx's spartan-6 FPGA KIT. The results show practical and promise.
A comparative study on image forgery-facial retouching Kinjal Ravi Sheth; Vishal Suryakantbhai Vora
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4481

Abstract

Forgery with the digital images is being very easy now days due to the very advanced and open source image editing tools, software and devises which supports a high quality of resolutions. Tempering with digital documents for changing identity or sometimes for fun is increasing day by day as the era is of digital world. Detecting clues of tampering and verifying the authenticity of images is an important issues now-a-days and growing research field. The existing research in the area of digital image forgery identification is discussed here. Different types of image forgery attacks along with its detection and classification are discussed too. A general review of facial image authentication is studied and discussed here along with the current methods and techniques for the detection and classification. A comparative analysis is presented here for the researchers as a mind mapping to work in the same field.
A systematic review of non-functional requirements mapping into architectural styles Muhammad Nouman; Muhammad Azam; Ashraf Mousa Saleh; Abdullah Alsaeedi; Hayfa Yousef Abuaddous
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4081

Abstract

Fortunately, the software attracted enough businesses to the market, allowing them to earn money in less time with less work and more accurate results. Software development life cycle (SDLC) is used for software development as it is responsible for system functionality, efficiency, maintainability, and any other non-functional system requirements. Each stage of the SDLC process is critical. However, software requirements and software architecture are both fundamental activities that play a vital role in all other SDLC stages. Non-functional requirements are critical to the success of any software because they explain all system quality attributes such as complexity, reliability, security, and maintainability, among others. The architectural styles assist you in determining which architecture may be best for your project requirements. This paper discusses several of the most important architectural styles that are best suited for mapping desired non-functional requirements for software development, as well as their comparison based on various quality attributes (non-functional requirements).
Traditional and hybrid solar photovoltaic array configurations for partial shading conditions: perspectives and challenges Dharani Kumar Narne; T. A. Ramesh Kumar; RamaKoteswara Rao Alla
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4520

Abstract

he role of photovoltaic (PV) array in converting solar energy to electrical energy is very much important to get maximum power. Current challenge in solar PV systems is to make them energy efficient. Partial shading conditions (PSCs) is one of the main causes for performance degradation of PV array. It not only effects the shaded region but also effect the overall output of the PV array. Proper selection of configuration is essential to overcome such type of challenges. There exist various types of traditional configurations such as series (S), parallel (P), series parallel (SP), total-cross-tied (TCT), bridge-link (BL), and honeycomb (HC). Hybrid configurations also available such as series-parallel-total-cross-tied (SPTCT), bridge-link-total-cross-tied (BL-TCT), honey-comb- total cross-tied (HC-TCT), and bridge-link-honey-comb (BL-HC). This paper presents an overview on various types of configurations available with their merits and demerits under various partial shading situations. This paper also insights recent advancements in PV array configurations with their future trends to benefit the researchers working in this domain.
Assessing the quality of social media data: a systematic literature review Oumaima Reda; Ahmed Zellou
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4588

Abstract

In recent years, social media have been at the heart of new communication technologies. They are no longer used only to facilitate interaction between family, friends, and professional relationships, but tend to become an increasingly used communication channel to address public opinion. Research involving data sources from social media are relatively a recent and expanding area of research, nevertheless, the literature remains limited regarding the complex issue of how to assess and ensure the quality of social media data significantly and adequately. Our goal in this study is to provide a clearer and deeper understanding and a comprehensive overview of the existing state of research pertaining to the assessment of data quality in social media context. We performed a systematic literature review (SLR) on the quality of social media data to collect, analyze, and discuss data on the accuracy and value of prior literature that has focused on this area, has addressed a variety of topics, and has been published between 2016 and 2021. We followed a predefined review process to cover all relevant research papers published during this period. Our results demonstrate and strengthen the significance and the importance of data quality especially in the context of social media.
Management power of renewable energy in multiple sources system to feeding the rotor of a doubly-fed induction generator Kendzi Mohammed; Aissaoui Abdelghani; Younes Dris; Bouiri Abdesselam; Haddar Mabrouk
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.3885

Abstract

The purpose of this paper is the elimination of interruptions of electrical energy produced by a multi-source production system, so we have assured the feed of DFIG rotor in a wind system by different energy sources (photovoltaic generator, battery group) and switchover between them by auxiliary contacts controlled by a supervisor via a power control algorithm. For the photovoltaic generator, a controller for tracking the maximum power point is designed using direct search approach perturb observe method. For the battery group, the installation of a number of the capacitor battery elements in series and in parallel will be kept the power necessary to supply the DFIG rotor. For the wind system, it contains the power generated by DFIG is controlled by sliding mode system. With regard to switching between electrical energy sources, our proposed system relies on an algorithm to compare the energies produced by each generator with the energy required to feed the DFIG rotor and the energies consumed in the system, where the energy source with high production energy and available is exploited to feed the system and charge the batteries. Simulations were performed to confirm the reliability and efficacy of the system proposed. 
Symmetric longitudinal Mach-Zehnder modulator using lithium niobate Sadeq Adnan Hbeeb; Ahmad S. Abdullah; Haider Ali Jasim Alshamary
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4359

Abstract

There are many problems that restrict the work of the Mach-Zehnder modulator (MZM), including the lack of using various windows of wavelengths, the large half-wave voltage, and the small optical confinement factor. In this paper, a mathematical model for MZM based on lithium niobate (LN) is designed to solve these problems. In this model, a wide window of optical wavelength from visible-to-infrared (632.8-to-1560 nm) was utilized. Moreover, it achieved a better modulation with lower attenuation and a lower dispersion by the window (1550-1560) nm. The other window of optical wavelength is about (632.8-to-634 nm), and (646-to-647 nm) which can be used for short-haul applications to reduce attenuation and dispersion. Furthermore, a small length of the arm, about 2-3 mm, was utilized to accomplish a large change of the refractive index and lower applied voltage of up to 250 V. The small operation half-wave voltage achieved about 1.2 V leading to better switching of the MZM. In addition, a large optical confinement factor of ≤1 unitless was obtained. Even better performance of MZM was attained by using a suitable length arm of MZM of about 2 mm, along with an electric field of about 175 V/mm and 233 V/mm using poling at 100 V.
Solving the trapezoidal fuzzy assignment problem using the novel Dhouib-Matrix-AP1 heuristic Souhail Dhouib; Tole Sutikno
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4855

Abstract

The assignment problem is a famous problem in combinatorial optimization where several objects (tasks) are assigned to different entities (workers) with the goal of minimizing the total assignment cost. In real life, this problem often arises in many practical applications with uncertain data. Hence, this data (the assignment cost) is usually presented as fuzzy numbers. In this paper, the assignment problem is considered with trapezoidal fuzzy parameters and solved using the novel Dhouib-Matrix-AP1 (DM-AP1) heuristic. In fact, this research work presents the first application of the DM-AP1 heuristic to the fuzzy assignment problem, and a step-by-step application of DM-AP1 is detailed for more clarity. DM-AP1 is composed of three simple steps and repeated only once in n iterations. Moreover, DM-AP1 is enhanced with two techniques: a ranking function to order the trapezoidal fuzzy numbers and the min descriptive statistical metric to navigate through the research space. DM-AP1 is developed under the Python programming language and generates a convivial assignment network diagram plan.
A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm Prakash Kuppuswamy; Saeed Qasim Yahya Al Khalidi Al-Maliki; Rajan John; Mohammad Haseebuddin; Ahmed Ali Shaik Meeran
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4967

Abstract

Today's digital data transmission over unsecured wired and wireless communication channels is making encryption algorithms an increasingly important tool for securing data and information. Hybrid encryption techniques combine encryption schemes of either two symmetric keys or both symmetric and asymmetric encryption methods, and that provides more security than public or private key single encryption models. Currently, there are many techniques on the market that use a combination of cryptographic algorithms and claim to provide higher data security. Many hybrid algorithms have failed to satisfy customers in securing data and cannot prevent all types of security threats. To improve the security of digital data, it is essential to develop novel and resilient security systems as it is inevitable in the digital era. The recommended algorithm scheme is a combination of the well-known Rivest Shamir Adleman (RSA) algorithm and a simple symmetric key (SSK) algorithm. The aim of this study is to develop a better encryption method using RSA and a newly proposed symmetric SSK algorithm. We believe that the proposed hybrid cryptographic algorithm provides more security and privacy.

Filter by Year

2023 2023


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue