cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Case Study: Satisfying Skills Needed of Engineering Graduates through a Course on Innovation Raj L Desai; M. David Papendick
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v1i1.221

Abstract

The purpose of this paper is to report a case study that develops the skills necessary to compete in a global economy by going through the cycle of product development. The best way to equip students with the skills to survive and thrive in a global economy is to teach innovation. Students can develop their skills by working in small teams to generate, evaluate, develop, and market their innovation.
Designing a Secure Object Oriented Software Using Software Security Life Cycle Mohammad Obaidullah Bokhari; Mahtab Alam
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v1i1.222

Abstract

The security of Object oriented software is well managed by software metrics because they promise accurate, reliable, faster and more efficient ways with proven techniques and standard notations. The Software Security Life Cycle (SSLC) was developed providing a basis to help software Security planning. In this paper, software metrics, which have been proposed for Software Security, are used and applied to programming language. In software industries, the cost of Security of large-scale software has put emphasis on the need to manage the in earlier phases and is statistically estimate the security of large software system and to identify error prone modules.
Design And Implementation Of Error Correcting Codes For Transmission in Binary Symmetric Channel Victor N. Papilaya
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v1i1.223

Abstract

Error Correcting codes are normally used for protecting transmitted information bits in a noisy channel. The information bits are encoded into error correcting codes which will be transmitted into the channel and on the receiver side, the received codes will be decoded back into the transmitted information bits. In this paper, a technique of generating binary error correcting codes that meet the Gilbert-bound and a simple encoding-decoding mechanism will be presented. To show the performance of the error correcting codes, a Binary Symmetric Channel is considered for transmission.
Discrete Design Optimization of Small Open Type Dry Transformers Raju Basak; Arabinda Das; Ajay Sensarma; Amar Nath Sanyal
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v1i1.224

Abstract

Transformers of small ratings have a wide field of application. They are generally designed and fabricated using standard stampings available in the market. The design is made according to guidelines given in text-books. But such guidelines do not yield a cost-optimal solution. It may even fail to give a feasible solution if design variables are not properly chosen. This paper presents a method to get the cost-optimal solution subject to usual design constraints. The line of approach is completely different from that given in the standard text-books. Computer programs have been developed for finding out the cost-optimal design using standard stampings and case studies have been made on its basis.
Super Resolution Imaging Needs Better Registration for Better Quality Results Varsha Hemant Patil; Kharate G K; Kamlapur Snehal Mohan
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v1i1.225

Abstract

In this paper, trade-off between effect of registration error and number of images used in the process of super resolution image reconstruction is studied. Super Resolution image reconstruction is three phase process, of which registration is of at most importance. Super resolution image reconstruction uses set of low resolution images to reconstruct high resolution image during registration. The study demonstrates the effects of registration error and benefit of more number of low resolution images on the quality of reconstructed image. Study reveals that the registration error degrades the reconstructed image and without better registration methodology, a better super resolution method is still not of any use. It is noticed that without further improvement in the registration technique, not much improvement can be achieved by increasing number of input low resolution images.
A Secure Image Encryption Algorithm Based on Hill Cipher System S.K. Muttoo; Deepika Aggarwal; Bhavya Ahuja
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v1i1.226

Abstract

We present a technique of image encryption based on Hill cipher system that provides better security than existing approach of Bibhudendra Acharya et al. by rendering the image content completely scrambled using multiple self-invertible keys, block shuffling and a new developed pel transformation. The Hill cipher algorithm is one of the symmetric key algorithms having several advantages in encryption. However, the inverse of the matrix used for encrypting the plain text in this algorithm may not always exist. Moreover this algorithm is susceptible to known plain text attack. Our proposed algorithm is aimed at better encryption of all types of images even ones with uniform background and makes the image encryption scheme more secure.
Solving Hashiwokakero Puzzle Game with Hashi Solving Techniques and Depth First Search Reza Firsandaya Malik; Rusdi Efendi; Eriska Amrina Pratiwi
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v1i1.227

Abstract

Hashiwokakero is a logic puzzle game that sharpen the brain and very popular in Japan. This paper discusses about how to find a solution in the Hashi puzzle game using Hashi Solving techniques, such as: Just Enough Neighbor, One Unsolved neighbor, Few Neighbor, Leftovers and Isolation. Hashi Solving techniques are used to find and build bridges that can definitely be built across the island, while Depth First Search (DFS) will search and build bridges that have not been found by Hashi Solving techniques. The results shown that Hashi Solving Techniques and DFS able to solve every Hashi puzzle scenario.
Characterization of Voltage Sags and its Mitigation Using Custom Power Devices in Emerging Power System Ravindra Kumar; Surya Prakash Singh; Bindeshwar Singh; Ravi Prakash Vishvakarma
Bulletin of Electrical Engineering and Informatics Vol 1, No 2: June 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v1i2.228

Abstract

Voltage sags are short duration reductions in RMS voltage caused by short circuits, overloads and starting of large motors. Voltage sag is much more of a global problem. For proper analysis and mitigation of voltage sag, their characterization is important. The magnitude and durations are main characteristics of voltage sag. In this paper voltage sag and their characteristics have been presented in a comprehensive way. How voltage sags occur, what are their characteristics and impact on equipments behavior for different conditions. Through voltage source converters, it is possible to compensate for the drop in system voltage or even to temporarily take over the supply completely. The shunt and series controllers are based on power-electronic voltage source converters. For a full compensation both reactive and active power are needed. Only not for deep voltage sags but it is possible to compensate the drop in voltage magnitude by injecting reactive power only.
Efficient Closed Form Cut-Off Planes and Propagation Planes Characteristics for Dielectric Slab Loaded Boundary Value Problems Junaid Zafar
Bulletin of Electrical Engineering and Informatics Vol 1, No 2: June 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v1i2.229

Abstract

The geometrical relationship between the cut-off and propagating planes of any waveguide system is a prerequisite for any design process. The characterization of cut-off planes and optimisation are challenging for numerical methods, closed-form solutions are always preferred. In this paper Maxwells coupled field equations are used to characterise twin E-plane and H-plane slab loaded boundary value problems. The single mode bandwidths and dispersion characteristics of these structures are presented and critically compared. The impact of slab mobility upon cut-off and propagations planes has been envisaged. The presented formulation has been extended further to derive a vectorized Green function expression linking electric and magnetic fields for the characterization of planar waveguide structures.
CDMA2000 Past, Present and Future Saad Zaman Asif
Bulletin of Electrical Engineering and Informatics Vol 1, No 2: June 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v1i2.230

Abstract

The article looked into the possible future of 3GPP2s CDMA2000 1X and CDMA2000 1xEV-DO networks. The 3G CDMA2000 family of standards including EV-DO (Evolution Data Optimized) is in the daily use of more than 600 million customers across the globe. During the last few years the development efforts around CDMA2000 had been declined and its importance had been overshadowed by more advanced 3GPP LTE and IEEE WiMAX mobile broadband technologies. Due to these reasons, CDMA2000 operators are looking for alternative migration paths. The article investigated multiple facets for the future of CDMA2000 industry and these aspects were covered both from research and operational perspectives. The article first focused on the short term interoperability challenges to LTE and WiMAX and provided some antidotes for addressing these hurdles. The key challenges that were investigated include spectrum planning, authentication and security, end-to-end QoS (Quality of Service), voice enablement and data service continuity. The investigation revealed that a new QoS mapping mechanism between EV-DO and WiMAX similar to the one shown in the article is required for smooth operation. The analysis further indicated that CSFB (Circuit Switched Fallback) and SVLTE (Simultaneous Voice and LTE) were two techniques which could be used to support CS voice on an LTE/CDMA network; however they had different inter-radio access technology interworking requirements. In the following section performance aspects of both WiMAX and EV-DO were highlighted indicating a deep dip in throughput values once the users switches from WiMAX to EV-DO. The article concluded by discussing the future roadmap of CDMA2000 from 1X Advanced and DO Advanced perspectives. A performance comparison between 1X and 1X Advanced and EV-DO and DO Advanced was also presented.

Page 11 of 291 | Total Record : 2901


Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue