cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 65 Documents
Search results for , issue "Vol 12, No 4: August 2023" : 65 Documents clear
A 2.45 GHz microstrip patch antenna design, simulation, and anlaysis for wireless applications Md. Sohel Rana; Bijoy Kumer Sen; Md. Tanjil-Al Mamun; Md. Shahriar Mahmud; Md. Mostafizur Rahman
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4770

Abstract

This paper designs, simulates, and analyzes the S-band microstrip patch antenna (MPA) for wireless applications. FR-4 (lossy) and Rogger RT/duroid, whose dielectric permittivity is 4.3 and 2.2, respectively, have been used as substrate materials. Simulation is done by computer simulation technology (CST) suite studio 2019 software. Simulations with FR-4 material showed that the return loss was -20.405 dB, the gain was 2.592 dB, the directivity was 7.47 dBi, the voltage standing wave ratio (VSWR) was 1.221, the bandwidth (BW) was 0.0746 GHz, and the efficiency was 34.69%. Also, Rogers RT/duroid material gives results of a return loss of -12.542 dB, a bandwidth (BW) of 0.0349 GHz, a gain of 8.092 dB, a directivity of 8.587 dBi, and an efficiency of 94.24%. The main goal of this antenna is to have a low return loss while getting as close as possible to a VSWR of 1. This will improve the antenna's gain, directivity, and efficiency compared to other antennas. Copper was used to make the patch and the ground, which were 0.35 mm and 0.0077 mm thick, respectively. The results obtained from the proposed antenna were better than those previously published in various in modern scientific journal and conference papers.
Classification of 27 heart abnormalities using 12-lead ECG signals with combined deep learning techniques Atiaf A. Rawi; Murtada Khalafallah Elbashir; Awadallah M. Ahmed
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4668

Abstract

An electrocardiogram (ECG) machine with a standard 12-lead configuration is the primary clinical technique for diagnosing abnormalities in heart function. Automated 12-lead ECG machines have the capacity to screen the general population and provide second opinions for physicians. However, expertise and time are required for manual ECG interpretation. Therefore, computer-aided diagnoses are of interest to the medical community. Hence, this study aims to build a deep learning (DL) model with an end-to-end structure that can categorize 12-lead ECG results into 27 different disorders. We use multivariate time-series data to construct a novel end-to-end DL model (based on combined convolutional neural networks (CNNs), long short-term memory, gated recurrent units, and a deep residual network structure) for feature representations and determining spatial relations among deep features. In addition, a dataset of 43,101 classified standard ECG recordings was collected from six different sources to guarantee the model’s ability to generalize and alleviate data divergence. As a result, the residual network-based model obtained promising outcomes and an accuracy of 0.97. According to the experimental data, it outperforms other methods.
Advanced optimal GA-PID controller for BLDC motor Hashmia S. Dakheel; Zainab B. Abdullah; Salam Waley Shneen
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4649

Abstract

The brushless direct current (BLDC) motor is characterized by high torque, which made it widely used in many industrial applications. To improve the working performance of the BLDC motor, the addition of controllers such as proportional integral derivative (PID) is adopted. To obtain high-performance controllers, the design process is adopted to develop a suitable algorithm. The genetic algorithm (GA) was chosen to tune the PID controller and get suitable parameters for each of kp, ki and kd with self-tuning. The design process is based on BLDC motor control using the GA to tune the traditional PID controller. Simulations were carried out for three cases including the absence of controllers secondly, by using the traditional control unit and finally with the GA. The integral time absolute error (ITAE) type error control standard for BLDC motor control system was selected. After conducting the simulation, the results demonstrated the superiority of the GA over the traditional ones in terms of response speed, (stability, rise, and settling) time and percentage overshootas details will be mentioned the model in the subsequent paragraphs of the research, finally the simulation results indicate the development and improvement of BLDC motor operation and performance during real time.
Wind power forecasting model based on linguistic fuzzy rules Mohammed Moujabbir; Khalid Bahani; Mohammed Ramdani; Hamza Ali-Ou-Salah
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4733

Abstract

The design and operationalization of a wind energy system is mainly based on wind speed and wind direction, theses parameters depend on several geographic, temporal, and climatic factors. Fluctuating factors such as climate cause irregularities in wind energy production. Therefore, wind power forecasting is necessary before using wind power systems. Furthermore, in order to make informed decisions, it is necessary to explain the system's predictions to stakeholders. The explainable artificial intelligence (XAI) provides an interactive interface for intelligent systems to interact with machines, validate their results, and trust their behavior. In this paper, we provide an interpretable system for predicting wind energy using weather data. This system is based on a two-step method for fuzzy rules learning clustering (FRLC). The first step uses subtractive clustering and a linguistic approximation to extract linguistic rules. The second step uses linguistic hedges to refine linguistic rules. FRLC is compared to with artificial neural network (ANN), random forest (RF), k-nearest neighbors (K-NN), and support vector regression (SVR) models. The experimental results show that the accuracy of FRLC is acceptable regarding the comparison models and outperform them in terms of the interpretability. In parallel with prediction, FRLC model provides a set of linguistic fuzzy rules that explain the obtained results to the stakeholders.
Breast cancer detection: an effective comparison of different machine learning algorithms on the Wisconsin dataset Md. Murad Hossin; F. M. Javed Mehedi Shamrat; Md Rifat Bhuiyan; Rabea Akter Hira; Tamim Khan; Shourav Molla
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4448

Abstract

According to the American cancer society, breast cancer is one of the leading causes of women's mortality worldwide. Early identification and treatment are the most effective approaches to halt the spread of this cancer. The objective of this article is to give a comparison of eight machine learning algorithms, including logistic regression (LR), random forest (RF), K-nearest neighbors (KNN), decision tree (DT), ada boost (AB), support vector machine (SVM), gradient boosting (GB), and Gaussian Naive Bayes (GNB) for breast cancer detection. The breast cancer Wisconsin (diagnostic) dataset is being utilized to validate the findings of this study. The comparison was made using the following performance metrics: accuracy, sensitivity, false omission rate, specificity, false discovery rate and area under curve. The LR method achieved a maximum accuracy of 99.12% among all eight algorithms and was compared to other comparable studies in the literature. The five features chosen are used to calculate the model's fidelity-to-interpretability ratio (FIR), which indicates how much interpretability was sacrificed for performance. The uniqueness of this work is the explainability approach taken in the model's performance, which aims to make the model's outputs more understandable and interpretable to healthcare experts.
Secure two-factor mutual authentication scheme using shared image in medical healthcare environment Husam A. Abdulmalik; Ali A. Yassin
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4459

Abstract

The cloud healthcare system has become the essential online service during the COVID-19 pandemic. In this type of system, the authorized user may login to a distant server to acquire the service and resources they demand, we need full security procedures that cover criteria such as authentication, privacy, integrity, and availability. The journey of security for any healthcare system starts with the authentication of users based on their privileges. Traditional user authentication mechanisms, such as password and personal identification number (PIN) typing, are vulnerable to malicious attacks like on/offline, insider, replay, guessing, and shoulder surfing. To address these issues, we proposed a secure authentication scheme that uses the authenticated delegating mechanism based on two factors: a one-time password and generating a secure variable vector from a legible user's digital image to enable the permission of a user through the back-end database of a cloud server. The proposed mutual authentication can protect the information against well-known attacks, ensure the user's privacy, and key management. Moreover, comparisons with existing schemes show that the proposed scheme supplies more privacy, security metrics, and resistance to attacks than the others while being more efficient in computation and communication costs.
Effect on signal magnitude thresholding on detecting student engagement through EEG in various screen size environment I Putu Agus Eka Darma Udayana; Made Sudarma; I Ketut Gede Darma Putra; I Made Sukarsa
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4850

Abstract

In this study, a new method was developed to detect student involvement in the online learning process. This method is based on convolutional neural network (CNN) as a classifier with an emphasis on the preprocessing process combined with a new feature in the form of signal magnitude area (SMA) thresholding. In this study, the data used as training data is a public dataset that emphasizes the decomposition of electroencephalography (EEG) signals into individual signal processing. Twenty subjects were taken to be used as test data, with each subject watching online learning lectures in the field of computer science on three different devices, either with a flat screen, a curved screen or a smartphone screen that is smaller than two standard computer monitors. Based on the study's results, it is known that the change in screen size is inversely proportional to the level of student attention, the smaller the screen, the lower the student's attention. For classification results, the model equipped with SMA thresholding outperformed the standard classifier by 8.33% with a test set of 20 people.
Modeling and simulation of a pipeline leak detection using smart inspection ball Marwa H. Abed; Wasan A. Wali; Musaab Alaziz
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4790

Abstract

Recently, pipelines have replaced more carbon-intensive transportation methods making them more environmentally friendly for transporting energy and water supplies. However, pipelines can pollute the air, water, soil, and climate when they leak, causing economic, and environmental damage. Pipeline online monitoring provides data analysis and suitable controlling strategies to contain the risk. This paper proposes a three-dimensional numerical model simulation taking advantage of the fluids moving through pipelines at specific speeds. The transport speeds depend on many conditions, such as pipe diameter, the pressure through which the fluid is being transported, and other factors, such as terrain's topography and viscosity of the fluid. Under these conditions, the inspection approach uses a self-charging movable ball. The sensors inside the ball capture data as it travels through the pipe. The simulation focuses on spherical flow and pipe noise with and without leakage based on the COMSOL software platform. The paper shows the effect of several parameters, including leak location, sensor placement, ball diameter, sound pressure level propagation along a pipe and around the sphere, velocity, and temperature distribution that give the background for future smart ball design in a promising practical pipeline test project.
SiulMalaya: an annotated bird audio dataset of Malaysia lowland forest birds for passive acoustic monitoring Nursuriati Jamil; Ahmad Nazem Norali; Muhammad Izzad Ramli; Ahmad Khusaini Mohd Kharip Shah; Ismail Mamat
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.5243

Abstract

The laborious point count method of conducting bird surveys is still a common practice in Malaysia. An alternative method known as passive acoustic monitoring (PAM) is deployed in many countries by placing sound recorders at surveying sites to collect bird sounds. Studies revealed that the number of bird densities counted by human observers was agreeable with those obtained using PAM. However, one of the most essential gaps in conducting PAM is the lack of expert-verified bird-call databases. Therefore, the aim of this study is to construct the first annotated Malaysia lowland forest bird sounds called SiulMalaya to be used as ground-truth datasets for PAM-related activities. The raw bird sounds dataset was downloaded from Macaulay Library using the eBird platform. Data pre-processing was done to produce annotated audio tracks that can be used as training datasets for bird classification. SiulMalaya dataset was further validated by two bird experts from the Department of Wildlife and National Parks, Malaysia. A bird identification experiment was carried out to assess and validate SiulMalaya dataset using a convolutional neural network (CNN) learning model. Even though the accuracy of bird identification is slightly above 50%, the annotated dataset is shown to be viable for PAM-related operations.
An improvement of direct torque controlled PMSM drive using PWM technique and kalman filter Dung Quang Nguyen; Hau Huu Vo; Pavel Brandstetter
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4697

Abstract

The paper describes pulse-width-modulation (PWM) technique and Kalman filter (KF) process to improve performance of direct torque controlled permanent magnet synchronous motor (DTC-PMSM) drive. Performance of DTC methods are strongly affected by high stator current ripple. For lowering the ripple, high switching frequency space vector PWM and KF are utilized in the paper. Mathematical model of PMSM and calculations of important quantities of DTC applied to PMSM drive are presented in the first part. The second part shows computation process of space vector PWM and KF. Performance indices are utilized to evaluate the drive structures. Theorectical assumptions are validated via simulations with Gaussian noised stator current measurement.

Filter by Year

2023 2023


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue