Bulletin of Electrical Engineering and Informatics
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Articles
51 Documents
Search results for
, issue
"Vol 9, No 2: April 2020"
:
51 Documents
clear
Security issues and framework of electronic medical record: A review
Jibril Adamu;
Raseeda Hamzah;
Marshima Mohd Rosli
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (376.616 KB)
|
DOI: 10.11591/eei.v9i2.2064
The electronic medical record has been more widely accepted due to its unarguable benefits when compared to a paper-based system. As electronic medical record becomes more popular, this raises many security threats against the systems. Common security vulnerabilities, such as weak authentication, cross-site scripting, SQL injection, and cross-site request forgery had been identified in the electronic medical record systems. To achieve the goals of using EMR, attaining security and privacy is extremely important. This study aims to propose a web framework with inbuilt security features that will prevent the common security vulnerabilities in the electronic medical record. The security features of the three most popular and powerful PHP frameworks Laravel, CodeIgniter, and Symfony were reviewed and compared. Based on the results, Laravel is equipped with the security features that electronic medical record currently required. This paper provides descriptions of the proposed conceptual framework that can be adapted to implement secure EMR systems.
Dynamic navigation indoor map using Wi-Fi fingerprinting mobile technology
Srie Azrina Zulkiflie;
Norhaslinda Kamaruddin;
Abdul Wahab
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (595.957 KB)
|
DOI: 10.11591/eei.v9i2.2066
This paper presents the exploitation of Wi-Fi signals sensors using fingerprinting method to capture the location and provide the possible navigation paths. Such approach is practical because current smartphones nowadays are equipped with inertial sensors that can capture the Wi-Fi signals from the Wi-Fi’s access points inside the building. From the comparative study conducted, the AnyPlace development tool is used for the development of dynamic navigation indoor map. Its components, namely; Architect, Viewer, Navigator and Logger are used for different specific functions. As a case study, we implement the proposed approach to guide user for navigation in Sunway Pyramid Shopping Mall, Malaysia as floor plan as well as using Google Maps as the base map for prove of concept. From the developer point of view, it is observed that the proposed approach is viable to create a dynamic navigation indoor map provided that the floor plans must be generated first. Such plan should be integrated with the SDK tool to work with the navigation APIs. It is hoped that the proposed work can be extended for more complex indoor map for better implementation.
Analysis review on spatial and transform domain technique in digital steganography
Farah Qasim Ahmed Alyousuf;
Roshidi Din;
Alaa Jabbar Qasim
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (461.052 KB)
|
DOI: 10.11591/eei.v9i2.2068
This paper presents several techniques used in digital steganography in term of spatial and transform domain. Additionally, it analyses the performance and the metric evaluation of the techniques used in digital steganography based on spatial and transform domain. This paper aims to identify the main mediums of digital steganography, which are image-based, video-based and audio-based, in order to recognize the various techniques used with them. As a result, the primary technique used in the digital medium was LSB technique in the spatial domain, while in the transform domain, the main technique used was differentiated between DTC and DWT. Meanwhile, the common domain utilized in digital steganography was the spatial domain due to its simplicity and high embedding capacity. The future efforts for this paper will be considering the feature based in text steganography.
Analysis review on feature-based and word-rule based techniques in text steganography
Farah Qasim Ahmed Alyousuf;
Roshidi Din
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (305.125 KB)
|
DOI: 10.11591/eei.v9i2.2069
This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation of the techniques used in text steganography. This paper aims to identify the main techniques of text steganography, which are feature-based, and word-rule based, to recognize the various techniques used with them. As a result, the primary technique used in the text steganography was feature-based technique due to its simplicity and secured. Meanwhile, the common parameter metrics utilized in text steganography were security, capacity, robustness, and embedding time. Future efforts are suggested to focus on the methods used in text steganography.
Missing data exploration in air quality data set using R-package data visualisation tools
Shamihah Muhammad Ghazali;
Norshahida Shaadan;
Zainura Idrus
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (393.088 KB)
|
DOI: 10.11591/eei.v9i2.2088
Missing values often occur in many data sets of various research areas. This has been recognized as data quality problem because missing values could affect the performance of analysis results. To overcome the problem, the incomplete data set need to be treated or replaced using imputation method. Thus, exploring missing values pattern must be conducted beforehand to determine a suitable method. This paper discusses on the application of data visualisation as a smart technique for missing data exploration aiming to increase understanding on missing data behaviour which include missing data mechanism (MCAR, MAR and MNAR), distribution pattern of missingness in terms of percentage as well as the gap size. This paper presents the application of several data visualisation tools from five R-packges such as visdat, VIM, ggplot2, Amelia and UpSetR for data missingness exploration. For an illustration, based on an air quality data set in Malaysia, several graphics were produced and discussed to illustrate the contribution of the visualisation tools in providing input and the insight on the pattern of data missingness. Based on the results, it is shown that missing values in air quality data set of the chosen sites in Malaysia behave as missing at random (MAR) with small percentage of missingness and do contain long gap size of missingness.
Cheap vs healthy: Analyzing McDonald’s menu using linear programming
Nur Fadhilah Ibrahim;
Thurga Dewi Arunasalan;
Nurul Akmal Mohamed
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (399.783 KB)
|
DOI: 10.11591/eei.v9i2.2072
The factors that influence food choices nowadays are time, cost and deliciousness. An obvious example is fast food. Although consumers are aware that fast food is not a healthy choice, many still chooses fast food because it is convenient. Therefore in this paper, by using linear programming, we analyzed McDonald’s Malaysia menu in order to find the cheapest menu and the ‘healthiest’ menu. We developed a linear programming model for McDonald’s Malaysia menu which adheres to Malaysia Recommended Nutrient Intake 2017 (RNI 2017). Then we solved the model and proposed the cheapest menu and also the ‘healthiest’ menu that meets the nutrient requirement based on RNI 2017. The result showed that price for the cheapest palatable menu is RM21.69 a day. For set menu, we found that no menu meets this requirement, suggesting that McDonald’s set menu should not be taken three times a day. The price for the ‘healthiest’ McDonald’s menu with the least total of fat, sugar and salt that meets the nutrient requirement is RM42.99 a day.
Evaluation of positive emotion in children mobile learning application
Magrizef Gasah;
Aslina Baharum;
Nurul Hidayah Mat Zain;
Suhaida Halamy;
Rozita Hanapi;
Noorsidi Aizuddin Mat Noor
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (451.708 KB)
|
DOI: 10.11591/eei.v9i2.2073
This paper presents the evaluation of positive emotion in children's mobile learning applications. The mobile learning application is a teaching aid that can help students to self-study and increase the students’ interest in learning especially children. This paper will discuss how mobile learning application affects the children interest in school. The evaluation method implemented to evaluate the rate of positive emotion elicited by the children using mobile learning applications was a mixed method of qualitative and quantitative methods. Since emotion can be either negative or positive, the identification of a proper method or perspective was required to prove that positive emotion was really elicited. Next, the data was collected through the children’s assessment score, Electroencephalograms (EEG) device, Emotion identification using micro-expression (facial expression), Kort Scale and interview to confirm the positive emotion felt by the students. The result shows that all five perspectives or methods have shown that positive emotion is produced. It is found that the Mobile learning application can really trigger the children’s positive emotions.
Grey wolf optimizer for identification of liquid slosh behavior using continuous-time hammerstein model
Mohd Ashraf Ahmad;
Zulkifli Musa;
Mohd Helmi Suid;
Mohd Zaidi Mohd Tumari
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (604.454 KB)
|
DOI: 10.11591/eei.v9i2.2074
This paper presents the identification of liquid slosh plant using the Hammerstein model based on Grey Wolf Optimizer (GWO) method. A remote car that carrying a container of liquid is considered as the liquid slosh experimental rig. In contrast to other research works, this paper consider a piece-wise affine function in the nonlinear function of the Hammerstein model, which is more generalized function. Moreover, a continuous-time transfer function is utilized in the Hammerstein model, which is more suitable to represent a real system. The GWO method is used to tune both coefficients in the nonlinear function and transfer function of the Hammerstein model such that the error between the identified output and the real experimental output is minimized. The effectiveness of the proposed framework is assessed in terms of the convergence curve response, output response, and the stability of the identified model through the bode plot and pole zero map. The results show that the GWO based method is able to produce a Hammerstein model that yields identified output response close to the real experimental slosh output.
Social networking mobile apps framework for organizing and facilitating charitable and voluntary activities in Malaysia
Salama A. Mostafa;
Aida Mustapha;
Palaniappan Shamala;
Omar Ibrahim Obaid;
Bashar Ahmed Khalaf
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (272.887 KB)
|
DOI: 10.11591/eei.v9i2.2075
Numerous non-profit driven establishments depend on volunteers to help achieve their administrative targets. Despite the fact that volunteers work side-by-side or now and again substitute representatives in delivering services, inputting volunteer work into non-profit ventures of delivering services presents remarkable difficulties. Understanding these difficulties provides a significant fundamental building step in comprehending the influence these challenges have on service developmental plans and operations when utilizing volunteers. In this study, the paper brings forward a Charity Fundraising Information System (CFIS) framework and presents the modelling and evaluation of a plan and operational variables applicable to volunteer fulfilment in non-profit driven organizations. Discoveries indicate that fulfilled volunteers are bound to stay longer with the same establishment, give monetarily to the non-profit driven organization, and prescribe the volunteer involvement to other people. Every one of these results guarantees the continuous sustenance of the non-profit driven establishment.
Modelling and simulation of online partial discharge measurement for medium voltage power cable
A. Z. Abdullah;
M. Isa;
M. N. K. H. Rohani;
H. A. Hamid;
M. H. Amlus;
N. Azizan
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1223.385 KB)
|
DOI: 10.11591/eei.v9i2.2076
This paper presents the modelling of the online partial discharge (PD) measurement of the medium voltage (MV) power cable. Recently, PD monitoring trends are rapidly increasing due to high demand on reliable systems. Degradation are mainly due to the presence of PD in the high voltage power equipment used. PD measurement is therefore a highly recommended task to early detection of the degradation insulation for high voltage (HV) equipment in order to avoid breakdowns. Real network modelling is necessary to improvise system design in order to find the efficiency in a real power system network. In this paper, modelling focuses on a real distribution network by applying Rogowski coil (RC) as a detection sensor to trigger PD activity. The simulation is performed to determine the functionality and reliability of the system with the RC application in the network. The analysis is performed in the ATP-EMTP and MATLAB Simulink software environments. In addition, this paper contributed to justify the approach of a simplified PD sensor and measurement system. This PD measurement system provides a complete solution in the context of condition-oriented monitoring for the ability to apply the RC to trigger PD activity in the power distribution network.