cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 46 Documents
Search results for , issue "Vol 8, No 4: December 2019" : 46 Documents clear
Augmented reality: effect on conceptual change of scientific Danakorn Nincarean Eh Phon; Ahmad Firdaus Zainal Abidin; Mohd Faizal Ab Razak; Shahreen Kasim; Ahmad Hoirul Basori; Tole Sutikno
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (411.711 KB) | DOI: 10.11591/eei.v8i4.1625

Abstract

In recent years, Augmented Reality (AR) has received increasing emphasis and researchers gradually promote it Over the worlds. With the unique abilities to generate virtual objects over the real-world environment, it can enhance user perception. Although AR recognised for their enormous positive impacts, there are still a ton of matters waiting to be discovered. Research studies on AR toward conceptual change, specifically in scientific concept, are particularly limited. Therefore, this research aims to investigate the effect of integrating AR on conceptual change in scientific concepts. Thirty-four primary school students participated in the study. A pre-test and post-test were used to assess participants’ understanding of the scientific concepts before and after learning through AR. The findings demonstrated that 82% among them had misconceptions about the scientific concepts before learning through AR. However, most of them (around 88%) able to correct their misconceptions and shifted to have a scientific conceptual understanding after learning through AR. These findings indicate that AR was effective to be integrated into education to facilitate conceptual change.
Adaboost-multilayer perceptron to predict the student’s performance in software engineering Ahmad Firdaus Zainal Abidin; Mohd Faaizie Darmawan; Mohd Zamri Osman; Shahid Anwar; Shahreen Kasim; Arda Yunianta; Tole Sutikno
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (496.113 KB) | DOI: 10.11591/eei.v8i4.1432

Abstract

Software Engineering (SE) course is one of the backbones of today's computer technology sophistication. Effective theoretical and practical learning of this course is essential to computer students. However, there are many students fail in this course. There are many aspects that influence a student's performance. Currently, student performance analysis methods just focus on historical achievement and assessment methods given in the class. Need more research to predict student's performance to overcome the problem of student failing. The objective of this research is to perform a prediction for student's performance in the SE using enhanced Multilayer Perceptron (MLP) machine learning classification with Adaboost. This research also investigates the requirements of each student before registering in this course. This research achieved 87.76 percent accuracy in classifying the performance of SE students.
Review of the machine learning methods in the classification of phishing attack John Arthur Jupin; Tole Sutikno; Mohd Arfian Ismail; Mohd Saberi Mohamad; Shahreen Kasim; Deris Stiawan
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (723.905 KB) | DOI: 10.11591/eei.v8i4.1344

Abstract

The development of computer networks today has increased rapidly. This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. This shows that the use of Internet networks is very important, whether for work purposes or access to social media accounts. However, in widely using this computer network, the privacy of computer users is in danger, especially for computer users who do not install security systems in their computer. This problem will allow hackers to hack and commit network attacks. This is very dangerous, especially for Internet users because hackers can steal confidential information such as bank login account or social media login account. The attacks that can be made include phishing attacks. The goal of this study is to review the types of phishing attacks and current methods used in preventing them. Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. This study focused on an algorithm that was thoroughly made and the methods in implementing this algorithm are discussed in detail.
Developing a secured image file management system using modified AES Heidilyn V. Gamido; Marlon V. Gamido; Ariel M. Sison
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (774.007 KB) | DOI: 10.11591/eei.v8i4.1317

Abstract

Images are a means to share and convey relevant data in today’s digital world. This paper presents an image file management system to provide a platform for distributing and viewing images in a secured manner. The shared image files are stored in the server in an encrypted manner to provide additional security to the owner of the file. A modified AES algorithm using bit permutation was used to encrypt the image files. Based on the experimental result, image files were successfully encrypted in the server and can only be decrypted by the intended recipient of the file providing an efficient and reliable way of exchanging images.
A critical insight into multi-languages speech emotion databases Syed Asif Ahmad Qadri; Teddy Surya Gunawan; Muhammad Fahreza Alghifari; Hasmah Mansor; Mira Kartiwi; Zuriati Janin
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (303.859 KB) | DOI: 10.11591/eei.v8i4.1645

Abstract

With increased interest of human-computer/human-human interactions, systems deducing and identifying emotional aspects of a speech signal has emerged as a hot research topic. Recent researches are directed towards the development of automated and intelligent analysis of human utterances. Although numerous researches have been put into place for designing systems, algorithms, classifiers in the related field; however the things are far from standardization yet. There still exists considerable amount of uncertainty with regard to aspects such as determining influencing features, better performing algorithms, number of emotion classification etc. Among the influencing factors, the uniqueness between speech databases such as data collection method is accepted to be significant among the research community. Speech emotion database is essentially a repository of varied human speech samples collected and sampled using a specified method. This paper reviews 34 `speech emotion databases for their characteristics and specifications. Furthermore critical insight into the imitational aspects for the same have also been highlighted.
Community reporting system: road violation M. R. Roslan; Suriza Ahmad Zabidi
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (497.767 KB) | DOI: 10.11591/eei.v8i4.1509

Abstract

In the era of internet and wireless, an online community reporting system that is easy to use and hustle free is much needed to allow the user to place a misconduct report to the relevant authority. The available system is inefficient and time-consuming since mostly are using web-based which makes the user unwilling to make a report to the authority. The objective of this project is to design a system using android application that is cost-effective and easy to use. The scope of this project is on the road violation reporting system. The outcome of the system will provide a user with an easy reporting system and also the authority can manage the report easily. The development of the system is expected to enhance the reporting system and betterment for the community as well as the authority as a whole.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue