cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 74 Documents
Search results for , issue "Vol 13, No 3: June 2024" : 74 Documents clear
System interactive reader using eye-tracker technology in ebook reader Sujaini, Herry; Safriadi, Novi; Khairiyah, Dian
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.5877

Abstract

Interest in using ebooks by the academic community is very high. Still, there is a problem when readers are reading through screens, tend to read fast, only scan the necessary parts, and don't focus on paying attention to the content they read, so this reduces the quality of reading because readers don't study the overall meaning of the sentence. Hence, this research aims to build an interactive reader system by integrating eye tracker technology with a webcam which is expected to solve the problem of decreasing the quality of reading through the screen by helping readers stay focused on their reading and providing an interactive system that makes it easier for readers to control the computer while reading. This research adopts the waterfall method and is divided into six stages. The system is designed using class diagrams, use case diagrams, and activity diagrams. Also, the system is built using the Python language with the Django framework. Then, the interactive reader system was tested using black box testing and usability testing methods. Based on the test results, it is shown that the interactive reader system that was built can help improve the quality and concentration when reading activities take place.
Smart irrigation with crop recommendation using machine learning approach Palakshappa, Anitha; Kyathanahalli Nanjappa, Sowmya; Mahadevappa, Punitha; Sinchana, Sinchana
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.6103

Abstract

Increasing crop yield with sustainable growth is the primary requirement for farmers with a growing population. Effective management and conservation of depleting natural resources is a priority task. Decrease in manpower due to migrating population has forced automation in agriculture. In this work, an automatic water irrigation and an effective crop recommendation system is proposed. Gypsum blocks based soil sensor is used to measure dielectric permittivity associated with the tested soil. The water-potential present in soil, along with potassium (K), nitrogen (N), phosphorus (P), potential of hydrogen (pH) helps to quantify the soil nutrients available and the suitable crop that can be considered for harvesting in a specified demography and environment. Sensory data indicating soil quality obtained is used to recommend crops by utilizing machine learning approaches. Telegram application is linked to the recommendation model to assist decision making and to ensure farmer-friendliness by sending notifications periodically.
Integration of MQTT-SN and CoAP protocol for enhanced data communications and resource management in WSNs Nwankwo, Emmanuel; David, Michael; Onwuka, Elizabeth Nonye
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.5158

Abstract

Lightweight communication protocols for wireless sensor networks (WSNs) are unfolding for machine to machine (M2M) communications and thus there is always going to be a possible conflict of interest on which protocol is best suited for any particular application. The two protocols of interest in this study are the message queue telemetry transport protocol for sensor network (MQTT-SN), a variant of message queue telemetry transport (MQTT) protocol and the constrained application protocol (CoAP). There have been studies that reveal that these protocols perform differently based on the underlying network conditions. CoAP experience lower delays than MQTT for higher packet loss and higher delays for lower packet loss. MQTT default communication via a broker is easier to scale compared to CoAP direct request-response paradigm. Although this is a huge advantage over CoAP, it presents the single point-of-failure problem. In this paper we propose an integration of MQTT-CoAP protocol using an abstraction layer that enables both MQTT-SN and CoAP protocol to be used in the same sensor node. Resources are managed by directly modifying sensor node configuration using CoAP protocol. Performance evaluation of these protocols under the integrated scenario shows acceptable levels of latency and energy consumption for internet of thing (IoT) operations.
Dissecting of the two-stages object detection models architecture and performance Bouraya, Sara; Belangour, Abdessamad
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.6424

Abstract

Artificial intelligence (AI) is the discipline focused on enabling computers to operate autonomously without explicit programming. Within AI, computer vision is an emerging field tasked with endowing machines with the ability to interpret visual data from images and videos. Over recent decades, computer vision has found applications in diverse fields such as autonomous vehicles, information retrieval, surveillance, and understanding human behavior. Object detection, a key aspect of computer vision, employs deep neural networks to continually advance detection accuracy and speed. Its goal is to precisely identify objects within images or videos and assign them to specific classes. Object detection models typically consist of three components: a backbone network for feature extraction, a neck model for feature aggregation, and a head for prediction. The focus of this study lies on two stage detectors. This study aims to provide a comprehensive review of two stage detectors in object detection, followed by benchmarking to offer insights for researchers and scientists. By analyzing and understanding the efficacy of these models, this research seeks to guide future developments in the field of object detection within computer vision.
A deep learning-based system for accurate diagnosis of pelvic bone tumors Shouman, Mona; Rahouma, Kamel Hussein; Hamed, Hesham Fathy Aly
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.6861

Abstract

Bone image analysis and categorizing bone cancers have both seen advancements thanks to deep learning (DL), more notably convolution neural networks (CNN). This study suggests a brand-new CNN-based methodology for categorizing pelvic bone tumors specifically. This work aims to create a pelvic bone computed tomography (CT) image categorization system based on deep learning. The proposed technique uses a convolutional neural network (CNN) architecture to automatically extract information from the CT images and classify them into distinct categories of tumors. A total of 178 3D CT pictures was discovered and added retroactively. DenseNet created the image-based model with Adam optimizer and cross entropy loss. The suggested system's accuracy is assessed using a variety of performance indicators, including sensitivity, specificity, and F1-score. As demonstrated by the experiment findings, the suggested deep learning based classification system has a high degree of accuracy (94%), making it useful for the diagnosis and treatment of pelvic bone tumors. Our promising results might hasten the use of DL-assisted CT diagnosis for pelvic bone tumors in the future.
Best Agile method selection approach at workplace Merzouk, Soukaina; Jabir, Brahim; Marzak, Abdelaziz; Sael, Nawal
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.5782

Abstract

Selecting the most suitable agile software development method is a challenging task due to the variety of available methods, each with its strengths and weaknesses. To achieve project goals effectively, factors such as project needs, team size, complexity, and customer involvement should be carefully evaluated. Choosing the appropriate agile method is crucial for achieving high client satisfaction and effective team management, but it can be a challenging task for project managers and higher-level management officials.This paper presents a solution aiming to help them in selecting the most suitable software development method for their project. In this regard, this solution includes a pre-project management approach model and a decision tree that considers the unique requirements of the project. In the proposed solution results, Scrum was found to be suitable for both small and large projects, on the condition that roles and responsibilities are clearly defined and that the approach is people-centric. Furthermore, high-risk mitigation measures should be added for small projects. To facilitate the use of our model, a software application has been developed which implements the decision-making tree.
Enhancing speech emotion recognition with deep learning using multi-feature stacking and data augmentation Al Mukarram, Khasyi; Mukhlas, M. Anang; Zahra, Amalia
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.6049

Abstract

This study evaluates the effectiveness of data augmentation on 1D convolutional neural network (CNN) and transformer models for speech emotion recognition (SER) on the Ryerson audio-visual database of emotional speech and song (RAVDESS) dataset. The results show that data augmentation has a positive impact on improving emotion classification accuracy. Techniques such as noising, pitching, stretching, shifting, and speeding are applied to increase data variation and overcome class imbalance. The 1D CNN model with data augmentation achieved 94.5% accuracy, while the transformer model with data augmentation performed even better at 97.5%. This research is expected to contribute better insights for the development of accurate emotion recognition methods by using data augmentation with these models to improve classification accuracy on the RAVDESS dataset. Further research can explore larger and more diverse datasets and alternative model approaches.
Speed synchronization of two DC motors with independent loads based on the higher load torque Saqer Akayleh, Ali; Emad Said, Addasi
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.6188

Abstract

Dual-motor and multi-motor electric drive systems have been used in many industrial applications, and speed synchronization of the motors can always get worse by system parameter uncertainties and load torque perturbations. This work focuses on the application of adjustable speed double-direct current (DC) motor drive control systems. In this paper, a system of two DC motors with armature control at different load conditions has been built. The synchronization of these motors was set basing on the higher torque of the two motor shafts. When two DC motors operate at different shafts a challenge appears in synchronization of their speeds, particularly with the existence of load difference allocated on their shafts. This work paid special attention to this problem. It presents a dynamic simulation of speed control and synchronization of dual DC motor drive. The results show the advantages of the used technique in terms of steady-state and transient performance.
Comparative analysis of ARIMA and LSTM for predicting fluctuating time series data Taslim, Deddy Gunawan; Murwantara, I Made
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.6034

Abstract

The investigation of time series data forecasting is a critical topic within the realms of economics and business. The autoregressive integrated moving average (ARIMA) model has been prevalently utilized, notwithstanding its limitations, which include the necessity for a substantial quantity of data points and the presumption of data linearity. However, with recent developments, the long short-term memory (LSTM) network has emerged as a promising alternative, potentially overcoming these limitations. The objective of this study is to determine an effective approach for managing time series data characterized by volatility and missing values. Evaluation was conducted using RMSE for accuracy assessment, and the execution time measured using the Python Timeit library. The findings indicates that in a dataset comprising 60 data points, the LSTM model (RMSE 0.037618) surpasses the ARIMA model (RMSE 0.062667) in terms of accuracy. However, this trend reverses in a larger dataset of 228 data points, where the ARIMA model demonstrates superior accuracy (RMSE 0.006949) compared to the LSTM model (RMSE 0.036025). In scenarios with missing data, the LSTM model consistently outperforms the ARIMA model, although the accuracy of both models diminishes with an increase in the number of missing values. The ARIMA model significantly outpaces the LSTM model.
Kernel rootkit detection multi class on deep learning techniques Srinivasan, Suresh Kumar; Thalavaipillai, SudalaiMuthu
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.6802

Abstract

The harmful code application known as a rootkit is designed to be loaded and run directly from the operating system's (OSs') Kernel. Rootkits deployed in the Kernel, called Kernel-mode rootkits, can alter the OS. The intention behind these Kernel changes is to conceal the hack. Detecting a Kernel rootkit in a target machine is found to be quite challenging. Numerous techniques can be employed to modify the Kernel of a system. Kernel rootkits also create hidden access for attacks, enabling unauthorized entry to be gained by attackers on the machine. The ultimate consequence is that essential computer data can be modified, personal information can be gathered, and hackers can observe behavior. Synthetic neural networks support artificial intelligence, a branch of deep learning that models the human brain and operates on large datasets. This study proposed the Kernel rootkit detection multi-class deep learning techniques (KRDMCDLT). Deep learning algorithms are utilized to recognize the Kernel rootkit from a batch of data by selecting essential properties for learning tracking models. Thus, by identifying the OS malware, trojan assaults can be stopped before they can access infected data. This Kernel rootkit detection was tested in a Google Cloud Platform (GCP) computing system.

Filter by Year

2024 2024


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue