Bulletin of Electrical Engineering and Informatics
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Articles
2,901 Documents
Case Study: Satisfying Skills Needed of Engineering Graduates through a Course on Innovation
Raj L Desai;
M. David Papendick
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.221
The purpose of this paper is to report a case study that develops the skills necessary to compete in a global economy by going through the cycle of product development. The best way to equip students with the skills to survive and thrive in a global economy is to teach innovation. Students can develop their skills by working in small teams to generate, evaluate, develop, and market their innovation.
Designing a Secure Object Oriented Software Using Software Security Life Cycle
Mohammad Obaidullah Bokhari;
Mahtab Alam
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.222
The security of Object oriented software is well managed by software metrics because they promise accurate, reliable, faster and more efficient ways with proven techniques and standard notations. The Software Security Life Cycle (SSLC) was developed providing a basis to help software Security planning. In this paper, software metrics, which have been proposed for Software Security, are used and applied to programming language. In software industries, the cost of Security of large-scale software has put emphasis on the need to manage the in earlier phases and is statistically estimate the security of large software system and to identify error prone modules.
Design And Implementation Of Error Correcting Codes For Transmission in Binary Symmetric Channel
Victor N. Papilaya
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.223
Error Correcting codes are normally used for protecting transmitted information bits in a noisy channel. The information bits are encoded into error correcting codes which will be transmitted into the channel and on the receiver side, the received codes will be decoded back into the transmitted information bits. In this paper, a technique of generating binary error correcting codes that meet the Gilbert-bound and a simple encoding-decoding mechanism will be presented. To show the performance of the error correcting codes, a Binary Symmetric Channel is considered for transmission.
Discrete Design Optimization of Small Open Type Dry Transformers
Raju Basak;
Arabinda Das;
Ajay Sensarma;
Amar Nath Sanyal
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.224
Transformers of small ratings have a wide field of application. They are generally designed and fabricated using standard stampings available in the market. The design is made according to guidelines given in text-books. But such guidelines do not yield a cost-optimal solution. It may even fail to give a feasible solution if design variables are not properly chosen. This paper presents a method to get the cost-optimal solution subject to usual design constraints. The line of approach is completely different from that given in the standard text-books. Computer programs have been developed for finding out the cost-optimal design using standard stampings and case studies have been made on its basis.
Super Resolution Imaging Needs Better Registration for Better Quality Results
Varsha Hemant Patil;
Kharate G K;
Kamlapur Snehal Mohan
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.225
In this paper, trade-off between effect of registration error and number of images used in the process of super resolution image reconstruction is studied. Super Resolution image reconstruction is three phase process, of which registration is of at most importance. Super resolution image reconstruction uses set of low resolution images to reconstruct high resolution image during registration. The study demonstrates the effects of registration error and benefit of more number of low resolution images on the quality of reconstructed image. Study reveals that the registration error degrades the reconstructed image and without better registration methodology, a better super resolution method is still not of any use. It is noticed that without further improvement in the registration technique, not much improvement can be achieved by increasing number of input low resolution images.
A Secure Image Encryption Algorithm Based on Hill Cipher System
S.K. Muttoo;
Deepika Aggarwal;
Bhavya Ahuja
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.226
We present a technique of image encryption based on Hill cipher system that provides better security than existing approach of Bibhudendra Acharya et al. by rendering the image content completely scrambled using multiple self-invertible keys, block shuffling and a new developed pel transformation. The Hill cipher algorithm is one of the symmetric key algorithms having several advantages in encryption. However, the inverse of the matrix used for encrypting the plain text in this algorithm may not always exist. Moreover this algorithm is susceptible to known plain text attack. Our proposed algorithm is aimed at better encryption of all types of images even ones with uniform background and makes the image encryption scheme more secure.
Solving Hashiwokakero Puzzle Game with Hashi Solving Techniques and Depth First Search
Reza Firsandaya Malik;
Rusdi Efendi;
Eriska Amrina Pratiwi
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.227
Hashiwokakero is a logic puzzle game that sharpen the brain and very popular in Japan. This paper discusses about how to find a solution in the Hashi puzzle game using Hashi Solving techniques, such as: Just Enough Neighbor, One Unsolved neighbor, Few Neighbor, Leftovers and Isolation. Hashi Solving techniques are used to find and build bridges that can definitely be built across the island, while Depth First Search (DFS) will search and build bridges that have not been found by Hashi Solving techniques. The results shown that Hashi Solving Techniques and DFS able to solve every Hashi puzzle scenario.
Characterization of Voltage Sags and its Mitigation Using Custom Power Devices in Emerging Power System
Ravindra Kumar;
Surya Prakash Singh;
Bindeshwar Singh;
Ravi Prakash Vishvakarma
Bulletin of Electrical Engineering and Informatics Vol 1, No 2: June 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i2.228
Voltage sags are short duration reductions in RMS voltage caused by short circuits, overloads and starting of large motors. Voltage sag is much more of a global problem. For proper analysis and mitigation of voltage sag, their characterization is important. The magnitude and durations are main characteristics of voltage sag. In this paper voltage sag and their characteristics have been presented in a comprehensive way. How voltage sags occur, what are their characteristics and impact on equipments behavior for different conditions. Through voltage source converters, it is possible to compensate for the drop in system voltage or even to temporarily take over the supply completely. The shunt and series controllers are based on power-electronic voltage source converters. For a full compensation both reactive and active power are needed. Only not for deep voltage sags but it is possible to compensate the drop in voltage magnitude by injecting reactive power only.
Efficient Closed Form Cut-Off Planes and Propagation Planes Characteristics for Dielectric Slab Loaded Boundary Value Problems
Junaid Zafar
Bulletin of Electrical Engineering and Informatics Vol 1, No 2: June 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i2.229
The geometrical relationship between the cut-off and propagating planes of any waveguide system is a prerequisite for any design process. The characterization of cut-off planes and optimisation are challenging for numerical methods, closed-form solutions are always preferred. In this paper Maxwells coupled field equations are used to characterise twin E-plane and H-plane slab loaded boundary value problems. The single mode bandwidths and dispersion characteristics of these structures are presented and critically compared. The impact of slab mobility upon cut-off and propagations planes has been envisaged. The presented formulation has been extended further to derive a vectorized Green function expression linking electric and magnetic fields for the characterization of planar waveguide structures.
CDMA2000 Past, Present and Future
Saad Zaman Asif
Bulletin of Electrical Engineering and Informatics Vol 1, No 2: June 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i2.230
The article looked into the possible future of 3GPP2s CDMA2000 1X and CDMA2000 1xEV-DO networks. The 3G CDMA2000 family of standards including EV-DO (Evolution Data Optimized) is in the daily use of more than 600 million customers across the globe. During the last few years the development efforts around CDMA2000 had been declined and its importance had been overshadowed by more advanced 3GPP LTE and IEEE WiMAX mobile broadband technologies. Due to these reasons, CDMA2000 operators are looking for alternative migration paths. The article investigated multiple facets for the future of CDMA2000 industry and these aspects were covered both from research and operational perspectives. The article first focused on the short term interoperability challenges to LTE and WiMAX and provided some antidotes for addressing these hurdles. The key challenges that were investigated include spectrum planning, authentication and security, end-to-end QoS (Quality of Service), voice enablement and data service continuity. The investigation revealed that a new QoS mapping mechanism between EV-DO and WiMAX similar to the one shown in the article is required for smooth operation. The analysis further indicated that CSFB (Circuit Switched Fallback) and SVLTE (Simultaneous Voice and LTE) were two techniques which could be used to support CS voice on an LTE/CDMA network; however they had different inter-radio access technology interworking requirements. In the following section performance aspects of both WiMAX and EV-DO were highlighted indicating a deep dip in throughput values once the users switches from WiMAX to EV-DO. The article concluded by discussing the future roadmap of CDMA2000 from 1X Advanced and DO Advanced perspectives. A performance comparison between 1X and 1X Advanced and EV-DO and DO Advanced was also presented.