cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 51 Documents
Search results for , issue "Vol 9, No 2: April 2020" : 51 Documents clear
Review on automated follicle identification for polycystic ovarian syndrome A A Nazarudin; Noraishikin Zulkarnain; A. Hussain; S. S. Mokri; I. N. A. M. Nordin
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (412.417 KB) | DOI: 10.11591/eei.v9i2.2089

Abstract

Polycystic Ovarian Syndrome (PCOS), is a condition of the ovary consisting numerous follicles. Accurate size and number of follicles detected are crucial for treatment. Hence the diagnosis of this condition is by measuring and calculating the size and number of follicles existed in the ovary. For diagnosis, ultrasound imaging has become an effective tool as it is non-invasive, inexpensive and portable. However, the presence of speckle noise in ultrasound imaging has caused an obstruction for manual diagnosis which are high time consumption and often produce errors. Thus, image segmentation for ultrasound imaging is critical to identify follicles for PCOS diagnosis and proper health treatment. This paper presents different methods proposed and applied in automated follicle identification for PCOS diagnosis by previous researchers. In this paper, the methods and performance evaluation are identified and compared. Finally, this paper also provided suggestions in developing methods for future research.
A comparative study of different imputation methods for daily rainfall data in east-coast Peninsular Malaysia Siti Mariana Che Mat Nor; Shazlyn Milleana Shaharudin; Shuhaida Ismail; Nurul Hila Zainuddin; Mou Leong Tan
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (882.587 KB) | DOI: 10.11591/eei.v9i2.2090

Abstract

Rainfall data are the most significant values in hydrology and climatology modelling. However, the datasets are prone to missing values due to various issues. This study aspires to impute the rainfall missing values by using various imputation method such as Replace by Mean, Nearest Neighbor, Random Forest, Non-linear Interactive Partial Least-Square (NIPALS) and Markov Chain Monte Carlo (MCMC). Daily rainfall datasets from 48 rainfall stations across east-coast Peninsular Malaysia were used in this study. The dataset were then fed into Multiple Linear Regression (MLR) model. The performance of abovementioned methods were evaluated using Root Mean Square Method (RMSE), Mean Absolute Error (MAE) and Nash-Sutcliffe Efficiency Coefficient (CE). The experimental results showed that RF coupled with MLR (RF-MLR) approach was attained as more fitting for satisfying the missing data in east-coast Peninsular Malaysia.
Mel-log energies analysis of authentic audible intrusion activities in a Malaysian forest Amirul Sadikin Md Afendi; Marina Yusoff; Megawati Omar
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (400.94 KB) | DOI: 10.11591/eei.v9i2.2091

Abstract

Wildlife has been endangered due to illegal activities.  This requires more effective surveillance measures.  Felling timber and poaching are regular illegal activities but challenging to detect.  Hence authorities should resort to modern technologies such as employing autonoumous surveillance to stop them.  The Malaysian forest audio data were recorded to lay a foundation in initiating a cheaper and practical approach.  Hence this paper reports the collection, processing and analysis of audio data in preparation to develop an autonomous sound event detection system.  The recording was an emulation of possible illegal activities in a reserved forest.  Sounds of chainsaw and hand hatchet cutting tree trunks were taken.  It was found that there was a distinct pattern in the Mel-log energies audio feature of the sound, which could be used to identify illegal activities.  Thus, it is believed that a detection through audio is a possible approach to be employed as one of the methods to stop illegal activities in the tropical reserve forests like those in Malaysia.
Reliability study on the adaptation of Dijkstra’s algorithm for gateway KLIA2 indoor navigation K. A. F. A. Samah; A. A. Sharip; I. Musirin; N. Sabri; M. H. Salleh
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1021.058 KB) | DOI: 10.11591/eei.v9i2.2081

Abstract

This paper describes a reliability study on the adaptation of Dijkstra’s algorithm (DA) in the indoor environment for navigation purposes. Gateway KLIA2 located at Sepang, Selangor, Malaysia has been chosen as the area for case study. Gateway KLIA2 is divided into 4 levels but this research focused on Level 2 only that consists of 129 shop lots. A survey conducted towards 68 public respondents before the adaptation and most of them responded that they are not aware of the surrounding of KLIA2 and are facing difficulties in finding the information or location of certain places inside the building. DA was chosen because it helps the users to navigate using the shortest path to destination. It is proven that through the adaptation of DA, we are able to provide the shortest distance for indoor navigation from current location to the destination location. G-INS is reliable based on the functionality and reliability testing conducted towards 15 users with the distance reduction of 47% t-test result of 0.01303 (p less than 0.05), indicates the system is accepted.
Mapping a hospital using OpenStreetMap and Graphhopper: A navigation system K. A. F. A. Samah; S. Ibrahim; N. Ghazali; M. Suffian; M. Mansor; W. A. Latif
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (530.752 KB) | DOI: 10.11591/eei.v9i2.2082

Abstract

We present a mobile-based navigation system with the emphasis on the pedestrian navigation for Hospital Kuala Lumpur (henceforth, HKL) named as HKLNS. This practical research aimed to provide support and help for the people who come to the HKL. Despite having signages, layouts and other types of guidance to help them navigate, they might not be sure their current location and the destination’s paths. By using the OpenStreetMap (OSM) and Graphhopper API as a solution, it managed to help people to navigate the surrounding of the HKL. The findings showed that users were able to know their current location and the system generated the shortest pedestrian paths to the desired location using both mappings. The functionality testing and experimental results surrounding HKL demonstrated the effectiveness of this approach. The HKLNS was reliable based on the functionality and validation testing conducted towards 5 respondents with 5 different case study, in which it manage to reduce more than 50% time taken with the t-test result of 0.00041 (p less than 0.05), indicated that the system was accepted.
The need of gamified assessment for engaging learning experience Norhusyairi Hawari; Nurul Hidayah Mat Zain; Aslina Baharum
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (287.373 KB) | DOI: 10.11591/eei.v9i2.2083

Abstract

Gamification described as the use of game elements for purposes beyond games. As an extension of that, gamified assessment is defined as the use of gamification for assessment purposes. However, the traditional method of assessment remains the standard for student performance assessment, and this raises two assumptions. First, the current gamification implementation is still in its infancy. Thus, it is still unappealing enough for practical use. Second, there is a lack of study that brings forward the desire to have gamification implemented in the assessment. Hence, this study intends to explore the student’s perception of gamified assessment followed by their verdict, acquire the strength and weakness points of the existing implementation. In total, 86 students across several universities in Malaysia involved in this study. The present study implemented standard descriptive statistical methods for analyzing the data. The findings showed that there are needs for gamified assessment for an engaging learning experience. Besides, the results showed one of the earlier presumptions, which is the lack of study that points toward the student’s desire to have a gamified assessment. Keenly, the results of the study will emphasize the need for developing a rigorous gamified assessment model as a guideline to develop an application that engaging learning experience.
Review on techniques and file formats of image compression Alaa Jabbar Qasim; Roshidi Din; Farah Qasim Ahmed Alyousuf
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (860.484 KB) | DOI: 10.11591/eei.v9i2.2085

Abstract

This paper presents a review of the compression technique in digital image processing. As well as a brief description of the main technologies and traditional format that commonly used in image compression. It can be defined as image compression a set of techniques that are applied to the images to store or transfer them in an effective way. In addition, this paper presents formats that use to reduce redundant information in an image, unnecessary pixels and non-visual redundancy. The conclusion of this paper The results for this paper concludes that image compression is a critical issue in digital image processing because it allows us to store or transmit image data efficiently.
A lightweight security scheme for advanced metering infrastructures in smart grid S. M. Salim Reza; Afida Ayob; Md Murshedul Arifeen; Nowshad Amin; Mohd Hanif Md Saad; Aini Hussain
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (735.834 KB) | DOI: 10.11591/eei.v9i2.2086

Abstract

Smart Grid (SG) enlarges the traditional power grid into a new dimension where millions of electronic devices relate to each other through Advanced Metering Infrastructures (AMI) network using information and communication technology (ICT). The integration of ICT to the traditional power grid opens the path for the adversaries to invade through various cyber-attacks. Resource constrained electronic devices connected in AMI with the SG claims for faster, low power, less processing time and overall lightweight security schemes to prevent the cyber-attacks and to make the grid secure from adversaries. In this paper, a lightweight security scheme has been proposed consolidating ChaCha20 data encryption method, chaos based key generation and public key-based authentication scheme. Mathematical analysis shows that the proposed scheme is suitable to be used in SGs in terms of low power, less processing time and high throughput which makes it lightweight and faster. This scheme also prevents any kind of timing attacks such as replay attack.
Development of integrated loose fruit collector machine for oil palm plantations Mohd Zulfahmi Mohd Yusoff; A. Zamri; M. Z. A. Abd Kadir; W. Z. Wan Hassan; N. Azis
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (446.701 KB) | DOI: 10.11591/eei.v9i2.2087

Abstract

Oil palm loose fruit have always been part of oil palm harvesting operation. The current manual loose fruit collection by hand picking or raking is contributing to the minimum productivity and large amounts of debris. Effort in future shall be explored for the potential machine or system to collect the loose fruit in the field with the result of clean loose fruit. A new machine for loose fruit collection is being developed and examined which knows as integrated oil palm loose fruit collection machine for collecting loose fruit from the palm base. Consist of three main integrated stages; the suction stage is used to collect the loose fruit, followed by segregating stage, which used to segregate the loose fruit from debris through double layer rotating drum and unloading stage of loose fruit to the 3-4 metric tons bin by using hydraulic tipping cylinder. Result indicates that at least more than 50% productivity of loose fruit collection were increased. In addition, the clean loose fruit collection resulted with the debris less than 10%. Hence, with this development, better quality loose fruits are collected with minimum debris for further processing in the palm oil mill, which will contribute to better oil extraction rate.
Need analysis for the development of a microcontroller instructional module programming literacy Yusriza Mohamd Yusof; Afida Ayob; Mohamad Hanif Md Saad; Haryanti Mohd Affandi; Aini Hussain
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (364.805 KB) | DOI: 10.11591/eei.v9i2.2077

Abstract

In the era of the IR 4.0, the use of information technology among school students is widespread but students are not proficient in computer programming. To compete in the digital world, students need to be exposed to computer programming in order to produce computer programming experts. Integrating computer programming into the school curriculum can improve students literacy of computer programming but adequate computer programming skill among teachers are quite limited. Therefore, the development of microcontroller instructional teaching module which could address this problem is needed. This development aims to develop the module using design and developmental research (DDR) approach. Need Analysis phase in DDR is discussed in this article. The phase consists of identifying the level of knowledge, attitudes and practices of teachers about microcontroller and to obtain the views and opinions of the teachers on the developmental needs of microcontroller teaching modules. The type of microcontroller and the programming language to be used in the microcontroller module also identified.The results of this study are important to ensure that the design and development of an instructional module for microcontroller education are implemented and have a positive impact on increasing the programming literacy level among secondary school children.

Filter by Year

2020 2020


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue