cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 65 Documents
Search results for , issue "Vol 12, No 3: June 2023" : 65 Documents clear
Design and analysis of trans Z-source inverter for electric vehicle applications using neural network-clustering Manish Bharat; ASR Murty; Ritesh Dash
Bulletin of Electrical Engineering and Informatics Vol 12, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i3.4818

Abstract

The presented paper analyzes the detailed design of a trans Z-source inverter (ZSI) with an input from solar photovoltaic (SPV) system. Increase in SPV uses requires highly efficient SPV enabled inverters under varying weather parameters are in high demand in modern smart grid applications. The SPV-trans ZSI has high conversion efficiency because of the single-stage voltage boost conversion capability. In contradiction, the conventional voltage source inverter (VSI) requires an additional step-up transformer to boost the output voltage of inverter. This reduces the efficiency by increasing the volume of set up and also increase the cost of the system. In the proposed SPV system it provides a better output against VSI. The increase in inverter output voltage is because of shoot through time period present in ZSI. It also reduces the voltage stress and harmonics content as compared to VSI. The proposed model has been validated through MATLAB simulation.
Surveillance detection of anomalous activities with optimized deep learning technique in crowded scenes Omobayo Ayokunle Esan; Dorcas Oladayo Esan; Munienge Mbodila; Femi Abiodun Elegbeleye; Kesewaa Koranteng
Bulletin of Electrical Engineering and Informatics Vol 12, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i3.4471

Abstract

The performance of conventional surveillance systems is challenged by high error detection rates in busy scenes, which has significantly affected the accurate detection of the current surveillance system. Feature representation and object pattern extraction from different scenes have made deep learning (DL) promising methods in surveillance systems, compared to the approaches where features are created manually. To improve the detection accuracy, this paper presents an intelligent DL technique that combines convolutional neural network (CNN) and long short-term memory (LSTM). CNN extracts and learns the object features from a set of raw images, while the LSTM is then used by gated mechanisms to store important information from the extracted features. The proposed method was validated using datasets from the University of California San Diego (UCSD). The result shows that the model achieves 95% accuracy, which is superior compared to other conventional detection models.
Mobile game model for monitoring Malaysian food calories intake using image recognition Nurmaisarah Ismail; Sazilah Salam; Siti Nurul Mahfuzah Mohamad; Bambang Pudjoatmodjo; Norazlina Shafie; Rashidah Lip; Mohd Adili Norasikin; Faaizah Shahbodin
Bulletin of Electrical Engineering and Informatics Vol 12, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i3.4916

Abstract

Two important problems related to food consumption were reported in Malaysia: Malaysia was the sixth rank in Asia for the highest adult obesity rate; and the United Nation reported that Malaysian consumed an average of 2,910 calories per day. An imbalanced diet and high intake of calorie-dense food problems that need attention to reduce obesity. These problems affect national economies by lowering productivity, increasing disability, raising health care expenses, and shortening life spans. Although, there are food calorie tracking applications available, however, existing apps are less engaging and to recognize Malaysian food due to its not versatile databases. This can be solved using game technologies. Hence, this study will propose mobile game model as a solution to the underlying problems. There are 4 phases in the method: expert validation, initial model, expert verification, and final model. The proposed parameters were validated by dietitians, and nutritionists. The model was verified by game experts. A low fidelity prototype was developed based on the proposed model to assist the expert verification process. The model was finalized based on the expert’s feedback. The proposed game model resolves the limited recognition of Malaysian food and monitoring the food calories intake in an engaging way.
Prospects for developing digital telecommunication complexes for storing and analyzing media data Vladimir Kuklin; Islam Alexandrov; Dmitry Polezhaev; Aslan Tatarkanov
Bulletin of Electrical Engineering and Informatics Vol 12, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i3.4840

Abstract

In today's digital world, saturated with data flows, universal multifunctional systems are developing, capable of solving various problems related to optimizing the use of available computing resources. A distinctive feature of such systems is the heterogeneity of incoming flows of user requests due to the multifunctionality of modern information systems, expressed in supporting various multimedia services on a single platform. Data heterogeneity and large volumes of data create many problems related to the speed of digital systems and data storage security. The solutions can be found in artificial intelligence (AI) technologies, particularly machine learning. Therefore, development and implementation of digital telecommunication complexes for storing, processing, and forming a dynamic flow of multiformat data using AI technologies are becoming more relevant. This paper aims to identify trends and prospects for developing these complexes, and develop proposals on their perspective characteristics. The authors focused on review the experience of Russian organizations developing multi-object analytics systems and analyze the technical and functional characteristics of existing systems. The result of the review and analysis is a table with a comparison of the technical characteristics of existing complexes and proposals for characteristics that are promising for further implementation.
Development of playfair cryptosystem based on generation a multi-dimensional key matrix Mustafa Dhiaa Al-Hassani; Methaq Talib Gaata
Bulletin of Electrical Engineering and Informatics Vol 12, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i3.5052

Abstract

Playfair is considered as one of the classical encryption symmetric methods, it has a limitation of using just 5×5 matrix, which means only 25 English letters could be represented. In this work, a 2D and 3D method is adopted as an expanded matrix that encompass the overall American standard code for information interchange (ASCII) codes in a permuted manner for all symbols of any language. Any sort of the multi-dimensional matrix will enhance the security by increasing the complexity on the attacker to try 256! patterns of keys probabilities instead of 25!. The key-matrix is generated from the chaotic maps for some control parameters as patterns of non-repeating random numbers from 0 to 255 equivalent to their ASCII code values. The security of the proposed method not rely only on the number of key probabilities, but exceed that to: matrix dimensionality, encryption/decryption algorithms, initial chaotic parameters, and key-matrix values permutation. The efficiency of the proposed cryptosystem has been investigated when tested on 784 samples according to security measurements in which the obtained number of pixels change rate (NPCR) (99.609) is very close to the ideal value, while the correlation plotting close to zero (0.00058) and entropy near from 8 (7.9998).

Filter by Year

2023 2023


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue