cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Enhanced 5G contender based flat top weighted window communication systems Omar Abdulkareem Mahmood; Yousif I. Hammadi
Bulletin of Electrical Engineering and Informatics Vol 11, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i1.3599

Abstract

To create a new transmission phenomenon, the availability of good data rates, the development of the internet of things (IoT), and different machine type communications (MTC) developed the ability to converse without synchronization, or the need for routing overhead in the form of synchronization overhead, while using mixed legacy fourth generation (4G) systems, based on orthogonal frequency division multiplexing, cannot meet these requirements (OFDM). Many waveform alternatives for OFDM have been proposed, including FBMC, GFDM, UFMC, and filtering-OFDM, in order to meet the criteria of the next generation system F-OFDM. As a consequence, a revolutionary filter based on a flat top weighted window is described in this work, where simulation results indicate that the suggested method outperforms prior designs in regard to spectral adeptness increased substantially acrros the deminish in the required side-information as overhead of the synchronization process. The trasitional F-OFDM uses root-raised-cosine filter. However, in this paper, novel filter design was proposed, whis is simple and real-time construction capability. This new filter is built around legacy filters, where the new filter is a combination of different filters to make use of various advantages of the old filters and get rid of the disadvangages. The power spectral density (PSD), -157.2 dBW/Hz, which is outstanding CP-OFDM-PSD, -50 dBW/Hz.
Storage and encryption file authentication for cloud-based data retrieval Mustafa Qahtan Alsudani; Hassan Falah Fakhruldeen; Heba Abdul-Jaleel Al-Asady; Feryal Ibrahim Jabbar
Bulletin of Electrical Engineering and Informatics Vol 11, No 2: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i2.3344

Abstract

The amount of data that must be processed, stored, and modified rises as time passes. An enormous volume of data from a wide range of sources must be stored on a safe platform. Maintaining such a large volume of data on a single computer or hard drive is impracticable. As a result, the cloud is the ideal platform for storing any quantity of data. An advantage of storing data in the cloud is that it may be accessed at any time and from any device. However, the security of data stored in the cloud is a big concern. Because of this, despite the benefits, most users are reluctant to move their papers to the cloud. The data should be encrypted before sending it off to the cloud service provider to avoid this issue. It's a great way to increase the security of your papers. According to a new technique presented in the system, data may be searched across encrypted files without compromising the privacy and security of various data owners. Implementing the pallier homomorphic encryption method makes it possible to perform computations on encrypted data without decryption.
Extraction of human understandable insight from machine learning model for diabetes prediction Tsehay Admassu Assegie; Thulasi Karpagam; Radha Mothukuri; Ravulapalli Lakshmi Tulasi; Minychil Fentahun Engidaye
Bulletin of Electrical Engineering and Informatics Vol 11, No 2: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i2.3391

Abstract

Explaining the reason for model’s output as diabetes positive or negative is crucial for diabetes diagnosis. Because, reasoning the predictive outcome of model helps to understand why the model predicted an instance into diabetes positive or negative class. In recent years, highest predictive accuracy and promising result is achieved with simple linear model to complex deep neural network. However, the use of complex model such as ensemble and deep learning have trade-off between accuracy and interpretability. In response to the problem of interpretability, different approaches have been proposed to explain the predictive outcome of complex model. However, the relationship between the proposed approaches and the preferred approach for diabetes prediction is not clear. To address this problem, the authors aimed to implement and compare existing model interpretation approaches, local interpretable model agnostic explanation (LIME), shapely additive explanation (SHAP) and permutation feature importance by employing extreme boosting (XGBoost). Experiment is conducted on diabetes dataset with the aim of investigating the most influencing feature on model output. Overall, experimental result evidently appears to reveal that blood glucose has the highest impact on model prediction outcome.
Metaheuristics algorithms to identify nonlinear Hammerstein model: a decade survey Julakha Jahan Jui; Mohd Ashraf Ahmad; Muhammad Ikram Mohd Rashid
Bulletin of Electrical Engineering and Informatics Vol 11, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i1.3296

Abstract

Metaheuristics have been acknowledged as an effective solution for many difficult issues related to optimization. The metaheuristics, especially swarm’s intelligence and evolutionary computing algorithms, have gained popularity within a short time over the past two decades. Various metaheuristics algorithms are being introduced on an annual basis and applications that are more new are gradually being discovered. This paper presents a survey for the years 2011-2021 on multiple metaheuristics algorithms, particularly swarm and evolutionary algorithms, to identify a nonlinear block-oriented model called the Hammerstein model, mainly because such model has garnered much interest amidst researchers to identify nonlinear systems. Besides introducing a complete survey on the various population-based algorithms to identify the Hammerstein model, this paper also investigated some empirically verified actual process plants results. As such, this article serves as a guideline on the fundamentals of identifying nonlinear block-oriented models for new practitioners, apart from presenting a comprehensive summary of cutting-edge trends within the context of this topic area.
Header of death: security implications of IPv6 extension headers to the open-source firewall Anazel P. Gamilla; Marlon A. Naagas
Bulletin of Electrical Engineering and Informatics Vol 11, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i1.3446

Abstract

IPv6 extension headers (EHs) contain additional information utilized by network devices (such as routers and firewalls) to determine how to direct or process an IPv6 packet. However, the use of excessive and unknown EHs can lead to the security implications such as evasion and denial of service (DoS) of the target firewall. Study revealed that there is no permanent remediation that prevents the IPv6 EHs attack from invading the open-source firewalls by default. Using IPv6 packet manipulations technique, the attacker can evade the target network including the firewall and target host that can lead to a complete unavailability of network service. The common vulnerability scoring system (CVSS) also indicates that the base, temporal, and environment metric groups of IPv6 EHs vulnerabilities were in the critical level of severity. Quick and dirty solutions such as denying and allowing packets and IP addresses as preventive measures is still one of the effective ways of defending against the EHs packet manipulation attacks, as a temporary solution to date.
Distributed memory of neural networks and the problem of the intelligence`s essence Ibragim E. Suleimenov; Dinara K. Matrassulova; Inabat Moldakhan; Yelizaveta S. Vitulyova; Sherniyaz B. Kabdushev; Akhat S. Bakirov
Bulletin of Electrical Engineering and Informatics Vol 11, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i1.3463

Abstract

The question of the nature of the distributed memory of neural networks is considered. Since the memory capacity of a neural network depends on the presence of feedback in its structure this question requires further study. It is shown that the neural networks without feedbacks can be exhaustively described based on analogy with the algorithms of noiseproof coding. For such networks the use of the term "memory" is not justified at all. Moreover, functioning of such networks obeys the analog of Shannon formula, first obtained in this paper. This formula allows to specify in advance the number of images that a neural network can recognize for a given code distance between them. It is shown that in the case of artificial neural networks with negative feedback it is really justified to talk about a distributed memory network. It is also shown that in this case the boundary between distributed memory of a neural network and information storage mechanisms in such elements as RS-triggers is diffuse. For the given example a specific formula is obtained, which connects the number of possible states of outputs of the network (and, hence, the capacity of its memory) with the number of its elements.
Optimal load management strategy under off-peak tariff riders in UTeM: a case study Mohamad Fani Sulaima; Musthafah Mohd Tahir; Aida Fazliana Abdul Kadir; Mohamad Firdaus Shukri; Mohd Rahimi Yusoff; Ainuddin Abu Kasim; Luqman Ali
Bulletin of Electrical Engineering and Informatics Vol 11, No 2: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i2.3556

Abstract

Demand response (DR) program through tariff initiative has been established in Malaysia since 1990. The available time of use (TOU) tariff focuses on providing price signals to consumers, especially from industrial and commercial sectors. In achieving a certain standard for off-peak tariff rider (OPTR) initiative to receive discount rate, consumers must improve load factors compared to the baseline declared. However, not all consumers are able to commit. In Universiti Teknikal Malaysia Melaka (UTeM), the TOU (C1-OPTR) tariff is proposed and applied when the available cost discount of 20% can be enjoyed by sustaining the load factor improvement (LFI). A simulator projected a flexible optimal load profile referred by the energy management team to achieve the university's sustainable energy management goal. Thus, securing the LFI would allow the energy consumption (kWh) and peak demand (kW) to be managed concurrently. As for testing results for two buildings, the load factor improves to 0.40, and the maximum demand reduces by about 35 kW. When getting the 20% discount for the OPTR scheme, the total cost saving is forecasted approximately USD 29,441.40 yearly. The current pilot project presents a positive sign with the peak demand reduction and load factor improvement close to the simulator's optimal profile.
Low-voltage bulk-driven flipped voltage follower-based transconductance amplifier Durgam Rajesh; Subramanian Tamil; Nikhil Raj; Bharti Chourasia
Bulletin of Electrical Engineering and Informatics Vol 11, No 2: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i2.3306

Abstract

A low voltage high performance design of operational transconductance amplifier is proposed in this paper. The proposed architecture is based on bulk driven quasi-floating gate metal oxide semiconductor field effect transistor (MOSFET) which supports low voltage operation and improves the gain of the amplifier. Besides to this the tail current source requirement of operational transconductance amplifier (OTA) is removed by using the flipped voltage follower structure at the input pair along with bulk driven quasi-floating gate MOSFET. The proposed operational transconductance amplifier shows a five-fold increase in direct current (DC) gain and 3-fold increase in unity gain bandwidth when compared with its conventional bulk driven architecture. The metal oxide semiconductor (MOS) model used for amplifier design is of 0.18 um complementary metal oxide semiconductor (CMOS) technology at supply of  0.5 V.
Corner detection in aerospace image by using an expandable mask Haider Makki Hammed Alzaki; Maha Abbas Hutaihit; Оksana Shauchuk
Bulletin of Electrical Engineering and Informatics Vol 11, No 2: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i2.3401

Abstract

An algorithm for searching the breaks in contours based on an expandable mask in the image is proposed. The essence of the algorithm is to eliminate straight contour lines using a form factor. Sequential application of a  pixel binary mask for each pixel of the contour, except the endpoints, and joining the unit elements to the mask (growing) in the vicinity of the pixel, for which it is impossible to determine whether the fracture using a mask  pixel. The analysis of the proposed algorithm is compared with Harris method when changing registration conditions of images, specially, brightness, contrast, and rotation. Shown, that the proposed algorithm is more stable with increasing contrast and has a shorter running time compared with Harris method on account of loss the stability with decreasing contrast.
Efficient topology discovery protocol using IT-SDN for software-defined wireless sensor network Joseph Kipongo; Ebenezer Esenegho; Theo G. Swart
Bulletin of Electrical Engineering and Informatics Vol 11, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i1.3240

Abstract

The internet of things (IoT) and wireless sensor networks (WSNs) are two promising technologies for supporting new services and applications. However, because IoT and WSN entail interaction and transaction of device topology discovery protocols, WSN facing some challenges. Topology discovery (TD) is important for WSN in IoT since sensor nodes (SNs) are the main points of this network. Networking these SN (IoT-devices) has a few difficulties such as energy and bandwidth consumption, and data storage issues resulting from frequent interactions and transactions between devices. Because these challenges cannot be resolved by one solution, we focused on reducing the energy consumption associated with a WSN. We proposed software-defined networking (SDN) model to tackle energy-efficiency issue in a WSN setup by integrating SDN and WSN, which gave rise to a more robust system, software-defined wireless sensor network (SDWSN). In this direction, we proposed an improved fuzzy-logic-based strategy, fuzzy topology discovery protocol (FTDP). It used IT-SDN (an SDN-based WSN framework) to increase the network’s lifepan due to its low energy consumption. The link layer discovery protocol (LLDP) to build the SDN controller’s topology. The system’s performance was presented and compared, demonstrating that with an effective SDWSN discovery policy, energy efficiency is achievable.

Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue