cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 22 Documents
Search results for , issue "Vol 7, No 3: September 2018" : 22 Documents clear
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation and Feature Point Matching Anil Gupta
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (306.232 KB) | DOI: 10.11591/eei.v7i3.754

Abstract

With the development of Image processing editing tools and software, an image can be easily manipulated. The image manipulation detection is vital for the reason that an image can be used as legal evidence, in the field of forensics investigations, and also in numerous various other fields. The image forgery detection based on pixels aims to validate the digital image authenticity with no aforementioned information of the main image. There are several means intended for tampering a digital image, for example, copy-move or splicing, resampling a digital image (stretch, rotate, resize), removal as well as the addition of an object from your image. Copy move image forgery detection is utilized to figure out the replicated regions as well as the pasted parts, however forgery detection may possibly vary dependant on whether or not there is virtually any post-processing on the replicated part before inserting the item completely to another party. Typically, forgers utilize many operations like rotation, filtering, JPEG compression, resizing as well as the addition of noise to the main image before pasting, that make this thing challenging to recognize the copy move image forgery. Hence, forgery detector needs to be robust to any or all manipulations and also the latest editing software tools. This research paper illustrates recent issues in the techniques of forgery detection and proposes a advanced copy–move forgery detection scheme using adaptive over-segmentation and feature point matching. The proposed scheme integrates both block-based and key point-based forgery detection methods.
Assessing Information System Integration Using Combination of the Readiness and Success Models A'ang Subiyakto
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1737.127 KB) | DOI: 10.11591/eei.v7i3.1182

Abstract

Information system integration (ISI) is one of the development concerns for organizations to enhance business competitiveness. However, the implementations still present its failures. Despite the ISI may successful technically; but it still seems to be unsuccessful because of the human and management issues. The issues may relate to the readiness constructs of ISI. This study was aimed to know the status of the readiness and success of ISI and to assess the influential factors of the integration in the sampled institution. About 160 samples were purposely involved by considering their key informant characteristics. The data were analyzed using the partial least squares-structural equation modeling (PLS-SEM) method. The findings revealed only the user satisfaction variable that mediated the positive effects of the readiness variables towards variable of the system integration success. Besides, the findings may practically helpful for stakeholders in the sampled institution, but it may also theoretically useful for researchers in regard to the readiness and success issues of ISI.
Weather Forecasting Using Merged Long Short-term Memory Model Afan Galih Salman; Yaya Heryadi; Edi Abdurahman; Wayan Suparta
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (701.711 KB) | DOI: 10.11591/eei.v7i3.1181

Abstract

Over decades, weather forecasting has attracted researchers from worldwide communities due to itssignificant effect to global human life ranging from agriculture, air trafic control to public security. Although formal study on weather forecasting has been started since 19th century, research attention to weather forecasting tasks increased significantly after weather big data are widely available. This paper proposed merged-Long Short-term Memory for forecasting ground visibility at the airpot using timeseries of predictor variable combined with another variable as moderating variable. The proposed models were tested using weather timeseries data at Hang Nadim Airport, Batam. The experiment results showedthe best average accuracy for forecasting visibility using merged Long Short-term Memory model and temperature and dew point as a moderating variable was (88.6%); whilst, using basic Long Short-term Memory without moderating variablewasonly (83.8%) respectively (increased by 4.8%).
Efficient Implementation of Mean, Variance and Skewness Statistic Formula for Image Processing Using FPGA Device Aqwam Rosadi Kardian; Sunny Arief Sudiro; Sarifuddin Madenda
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v7i3.687

Abstract

Processing statistic formula in image processing and accessing data from memory is easy in software, the other hand for hardware implementation is more dificult considering a lot of constraint. This article proposes an implementation of optimum mean, variance and skewness formula in FGPA Device. The proposed circuit design for all formulas only need three additions component (in three accumulators) and two divisions using two shift-right-registers, two subtractors, one adder and six multipliers. For 8x8 image size need 64 clock cycles to finish the mean, variance and skewness calculations, comparing other approach that need more than 1024 additions component without skewness calculation. Implementation into FPGA needs 68 slices of flip-flops and 121 of 4 input LUTs.
An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method Prajna Deshanta Ibnugraha; Lukito Edi Nugroho; Paulus Insap Santosa
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (835.108 KB) | DOI: 10.11591/eei.v7i3.847

Abstract

Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
Speaker Recognition in Content-based Image Retrieval for a High Degree of Accuracy Suhartono Suhartono; Fresy Nugroho; Muhammad Faisal; Muhammad Ainul Yaqin; Suyanta Suyanta
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (728.047 KB) | DOI: 10.11591/eei.v7i3.957

Abstract

The purpose of this research is to measure the speaker recognition accuracy in Content-Based Image Retrieval. To support research in speaker recognition accuracy, we use two approaches for recognition system: identification and verification, an identification using fuzzy Mamdani, a verification using Manhattan distance. The test results in this research. The best of distance mean is size 32x32. The best of the verification for distance rate is 965, and the speaker recognition system has a standard error of 5% and the system accuracy is 95%. From these results, we find that there is an increase in accuracy of almost 2.5%. This is due to a combination of two approaches so the system can add to the accuracy of speaker recognition.
Wind Energy Fed UPQC System for Power Quality Improvement Sarita Samal; Prakash Kumar Hota
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (990.872 KB) | DOI: 10.11591/eei.v7i3.945

Abstract

The extensive use of non-linear loads in domestic, industrialand commercial services origin harmonic complications.Harmonics make malfunctions in profound equipment, voltage drop across the network, conductor heat increases and overvoltage through resonance. All these problems can be remunerated by using Unified Power Quality Controller (UPQC) and the operation of UPQC depends upon the available voltage across capacitor present in dc link. If the capacitor voltage is maintained constant then it gives satisfactory performance. The proposed research is basically on designing of Wind energy fed to the dc link capacitor of UPQCso as to maintain propervoltageacross it and operate the UPQC for power quality analysis. The proposed technique is the grouping of shunt and series Active Power Filter (APF) to form UPQC which is fed wind energy system and connected to grid for better response in the output. In this paper, the simulation model of series APF, shunt APF, UPQC and Wind energy with UPQC are design in Matlab. The proposed Wind energy-UPQC is design in Matlab simulation for reduction of voltage sag, swell, harmonics in load current and compensation of active and reactive power.
A Finite State Machine Fall Detection Using Quadrilateral Shape Features Mohd Fadzil Abu Hassan; Mohamad Hanif Md Saad; Mohd Faisal Ibrahim; Aini Hussain
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (560.373 KB) | DOI: 10.11591/eei.v7i3.1184

Abstract

A video-based fall detection system was presented; which consists of data acquisition, image processing, feature extraction, feature selection, classification and finite state machine. A two-dimensional human posture image was represented by 12 features extracted from the generalisation of a silhouette shape to a quadrilateral. The corresponding feature vectors for three groups of human pose were statistically analysed by using a non-parametric Kruskal Wallis test to assess the different significance level between them. From the statistical test, non-significant features were discarded. Four selected kernel-based Support Vector Machine: linear, quadratics, cubic and Radial Basis Function classifiers were trained to classify three human posture groups. Among four classifiers, the last one performed the best in terms of performance matric on testing set. The classifier outperformed others with high achievement ofaverage sensitivity, precision and F-score of 99.19%, 99.25% and 99.22%, respectively. Such pose classification model output was further used in a simple finite state machine to trigger the falling event alarms. The fall detection system was tested on different fall video sets and able to detect the presence offalling events in a frame sequence of videos with accuracy of 97.32% and low computional time.
SGSC Framework: Smart Government in Supply Chain Based on FODA Ahmad Nurul Fajar; Ditdit Nugeraha Utama
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (505.337 KB) | DOI: 10.11591/eei.v7i3.817

Abstract

Smart System has implemented in government sector. There are varies Implementation that was utilized by research activities for numerous domains is very broad. Besides that, the Industry, transportation and health, also where such a system is incredibly beneficial. This study discuss supply chain and governmental link issue, coordination of all stakeholder in supply chain has to reflect the government role. It support with the condition in Indonesian government environment is unique. It is a challenge to construct smart system based on Feature Oriented Domain Analysis (FODA) approach. It can produce software product line (SPL). We proposed framework for develop software product line for smart supply chain in government sector. It is used to enhance and improve the development of software systems by multiple software system developers. It will be a guidance for construct smart government, and more specificity in supply chain for government system area environment. It is called SGSC Framework. It consists of four layers, such as optimization layer, integration layer, supply chain layer and data layer.
E-Learning Effectiveness Analysis in Developing Countries: East Nusa Tenggara, Indonesia Perspective Sfenrianto Sfenrianto; Ellen Tantrisna; Habibullah Akbar; Mochamad Wahyudi
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (244.482 KB) | DOI: 10.11591/eei.v7i3.849

Abstract

The adoption of e-learning in developing countries like Indonesian Universities have been focused in urban areas like the big cities, especially in Java island. There is a lack of development of e-learning in a remote city like Kupang East Nusa Tenggara Indonesia which is located far away from the capital city. This research aims to assess the effectiveness of e-learning by analyzing three factors in one of the higher institution in Kupang city, i.e. Sekolah Tinggi Kesehatan Citra Mandiri Husada Kupang (STIKes CHMK). The factors include culture, technology and infrastructure, and content satisfaction. The data were collected using questionnaires. Research shows that with proper preparation for e-learning, the acceptance of e-learning in rural areas is significantly high. This finding suggests that e-learning can greatly benefit the students like Kupang city in developing countries.

Page 2 of 3 | Total Record : 22


Filter by Year

2018 2018


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue