cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 45 Documents
Search results for , issue "Vol 8, No 1: March 2019" : 45 Documents clear
Identification of persuasive elements in Islamic knowledge website using Kansei engineering Nor Aziah Daud; Nurul Izzati Aminudin; Fauziah Redzuan; Noraidah Sahari Ashaari; Zurina Muda
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (433.62 KB) | DOI: 10.11591/eei.v8i1.1435

Abstract

The global explosions of the internet and direct use by individuals, organizations and Islamic scholars to spread the knowledge and events have witnessed massive growth over the years. The users refuse to use online Islamic websites as references which causes the acceptance rate of the online learning method still low. This paper presents the identifications of persuasive elements in Islamic knowledge website. The objective of this study is to identify the persuasive element using Kansei Engineering (KE) method for online Islamic knowledge website design. Therefore, Kansei words related to online Islamic knowledge were identified. After that, the Kansei words (KWs) were evaluated in order to be used as persuasive elements. Ten specimens of Islamic websites were chosen and evaluated with 30 emotions of KWs. 38 students from one of the public universities accomplished the evaluation experiment. The gathered KWs were then analyzed using multivariate analysis such as Factor Analysis to identify the persuasive elements. Based on Factor Analysis, the finding of this research revealed four main pillars which are credibility-motivated, reliability, Islamic identity and functional. The two additional pillars are updated and belief. The pillars were then compared with the persuasive elements in the previous research. Although there are some limitations and constraint during the conduct of the research, this study also contributes to the design persuasive elements for Islamic website knowledge in the future.
Scalable workflow scheduling algorithm for minimizing makespan and failure probability Maslina Abdul Aziz; Izuan Hafez Ninggal
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (604.63 KB) | DOI: 10.11591/eei.v8i1.1436

Abstract

This paper presents an algorithm called Failure-Aware Workflow Scheduling (FAWS). The proposed algorithm discussed in this paper schedules parallel applications on homogeneous systems without sacrificing the two conflicting objectives: reliability and makespan. The proposed algorithm handles unexpected failure causes rescheduling of the failed task to available resources. In order to analyse the performance of the FAWS algorithm, it will be compared with the popular scheduling algorithm namely Heterogeneous Earliest Finish Time (or HEFT) and Critical Path (CP). A simulation-driven analysis based on realistic workflow application was demonstrated using DAG graph as a continuation of the Layered Workflow Scheduling Algorithm (LWFS). The FAWS algorithm aims to minimize the makespan, increases reliability and therefore boosts the performance of the whole system. A workflow generator was developed to generate large task graphs randomly and scheduled the parallel applications. Based on the simulation results, the proposed algorithm has improved the overall workflow scheduling effectiveness in comparison with existing algorithms.
A genetic algorithm based task scheduling system for logistics service robots Sariffuddin Harun; Mohd Faisal Ibrahim
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (488.931 KB) | DOI: 10.11591/eei.v8i1.1437

Abstract

The demand for autonomous logistics service robots requires an efficient task scheduling system in order to optimise cost and time for the robot to complete its tasks. This paper presents a Genetic algorithm (GA) based task scheduling system for a ground mobile robot that is able to find a global near-optimal travelling path to complete a logistics task of pick-and-deliver items at various locations. In this study, the chromosome representation and the fitness function of GA is carefully designed to cater for a single load logistics robotic task. Two variants of GA crossover are adopted to enhance the performance of the proposed algorithm. The performance of the scheduling is compared and analysed between the proposed GA algorithms and a conventional greedy algorithm in a virtual map and a real map environments that turns out the proposed GA algorithms outperform the greedy algorithm by 40% to 80% improvement.
ETOU electricity tariff for manufacturing load shifting strategy using ACO algorithm M. F. Sulaima; N. Y. Dahlan; M. H. Isa; M. N. Othman; Z. M. Yasin; H. A. Kasdirin
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (490.139 KB) | DOI: 10.11591/eei.v8i1.1438

Abstract

This paper presents load shifting strategy for cost reduction on manufacturing electricity demand side, by which a real test load profile had been used to prove the concept. Superior bio-inspired algorithm, Ant Colony Optimization (ACO) had been implemented to optimize the upright load profile of load shifting strategy in the Malaysia Enhance Time of Use (ETOU) tariff condition. Subsequently, significant simulation results of operation profit gain through 24 hours electricity consumption had been analyzed properly. The proposed method had shown reduction of approximately 6% of the electricity cost at peak and mid peak zones, when 20%, 40%, 60%, 80% and 100% load shifting weightages were applied to the identified 10% controlled loads consequently. It is hoped that the finding of this study can help poise the manufacturers to switch to ETOU tariff as well as support the national Demand Side Management (DSM) program
Face recognition attendance system using Local Binary Pattern (LBP) Shamsul J. Elias; Shahirah Mohamed Hatim; Nur Anisah Hassan; Lily Marlia Abd Latif; R. Badlishah Ahmad; Mohamad Yusof Darus; Ahmad Zambri Shahuddin
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (340.709 KB) | DOI: 10.11591/eei.v8i1.1439

Abstract

Attendance is important for university students. However, generic way of taking attendance in universities may include various problems. Hence, a face recognition system for attendance taking is one way to combat the problem. This paper will present an automated system that will automatically saves student’s attendance into the database using face recognition method. The paper will elaborate on student attendance system, image processing, face detection and face recognition. The face detection part will be done by using viola-jones algorithm method while the face recognition part will be carried on by using local binary pattern (LBP) method. The system will ensure that the attendance taking process will be faster and more accurate.
The evaluation performance of letter-based technique on text steganography system Roshidi Din; Rosmadi Bakar; Sunariya Utama; Jamaluddin Jasmis; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (386.851 KB) | DOI: 10.11591/eei.v8i1.1440

Abstract

Steganography is a part of information hiding in covering the hidden message in any medium such as text, image, audio, video and others. This paper concerns about the implementation of steganography in text domain called text steganography. It intends to concentrate on letter-based technique as one of the representative techniques in text steganography. This paper displays some techniques of letter-based that is integrated in one system technique displayeed in a logical and physical design. The integrated system is evaluated using some parameter that is used in order to discover the performance in term of capacity after embedding process and the time consuming in the development process. This paper is anticipated to contribute in describing the implementation of the techniques in one system and to display the performance some parameter evaluation.
Performance analysis on secured data method in natural language steganography Roshidi Din; Rosmadi Bakar; Raihan Sabirah Sabri; Mohamad Yusof Darus; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (430.165 KB) | DOI: 10.11591/eei.v8i1.1441

Abstract

The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field. Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; covering the decoding, decrypting and extracting performance metric. The process of data decoding interprets the received hidden message into a code word. As such, data encryption is the best way to provide a secure communication. Decrypting take an encrypted text and converting it back into an original text. Data extracting is a process which is the reverse of the data embedding process. The effectiveness evaluation is mainly determined by the performance metric aspect. The intention of researchers is to improve performance metric characteristics. The evaluation success is mainly determined by the performance analysis aspect. The objective of this paper is to present a review on the study of steganography in natural language based on the criteria of the performance analysis. The findings review will clarify the preferred performance metric aspects used. This review is hoped to help future research in evaluating the performance analysis of natural language in general and the proposed secured data revealed on natural language steganography in specific.
FACTS device installation in transmission system using whale optimization algorithm Irham Syafiq Shahbudin; Ismail Musirin; Saiful Izwan Suliman; Afdallyna Fathiyah Harun; Sharifah Azma Syed Mustaffa; Hadi Suyono; Nor Azura Md Ghani
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (554.938 KB) | DOI: 10.11591/eei.v8i1.1442

Abstract

As the world is progressing forward, the load demand in the power system has been continuously increasing day by day. This situation has forced the power system to operate under stress condition due to its limitation. Therefore, due to the stressed condition, the transmission losses faced higher increment with a lower minimum voltage. Theoretically, the installation of the Flexible AC Transmission System (FACTS) device can solve the problem experienced by the power system. This paper presents the whale optimization algorithm for loss minimization using FACTS devices in the transmission system. Thyristor controlled series compensator (TCSC) is chosen for this study. In this study, WOA is developed to identify the optimal sizing of FACTS device for loss minimization in the power system. IEEE 30- bus RTS was used as the test system to validate the effectiveness of the proposed algorithm.
Performance comparison of distributed generation installation arrangement in transmission system for loss control S. A. Shaaya; I. Musirin; S. I. Sulaiman; M. H. Mansor; S. A. Syed Mustaffa
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (527.095 KB) | DOI: 10.11591/eei.v8i1.1443

Abstract

Placing Distributed Generation (DG) into a power network should be planned wisely. In this paper, the comparison of having different installation arrangement of real-power DGs in transmission system for loss control is presented. Immune-brainstorm-evolutionary programme (IBSEP) was chosen as the optimization technique. It is found that optimizing fixed-size DGs locations gives the highest loss reduction percentage. Apart from that, scattered small-sized DGs throughout a network minimizes transmission loss more than allocating one biger-sized DG at a location.
Knots timber detection and classification with C-Support Vector Machine Fakhira Iwani Muhammad Redzuan; Marina Yusoff
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (348.171 KB) | DOI: 10.11591/eei.v8i1.1444

Abstract

Timber knots recognition is of prime importance to further determine the timber grade. The recognition is normally based on the human expert’s eyes in which can lead to some flaws based on human limitations and weaknesses. The use of X-ray can cause emits radiation and can be dangerous to the workers. This paper addresses the employment of computational methods for knot detection. A pre-processing and feature extraction methods include contrast stretching, median blur and thresholding, gray scale and local binary pattern were used. More than 400 datasets of knot images of the tropical timbers, namely Acacia and Hevea Brasiliensis have been tested using C-support vector machine as a knot classifier. The findings demonstrate different performances for three types of kernel. Linear kernel function outperformed both radial basis function and polynomial kernel functions for Acacia and Hevea Brasiliensis species. Both species classifications using linear kernel have managed to achieve a promising accuracy. Knots classification with the used of support vector machine has shown a promising result to improve the classifier and test with different types of tropical timbers.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue