cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
MPPT implementation and simulation using developed P&O algorithm for photovoltaic system concerning efficiency Asaad A. H. AlZubaidi; Laith Abdul Khaliq; Hassan Salman Hamad; Waleed Khalid Al-Azzawi; Mohanad Sameer Jabbar; Thaer Abdulwahhab Shihab
Bulletin of Electrical Engineering and Informatics Vol 11, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i5.3949

Abstract

The great development witnessed by investments in renewable energy has made it the focus of researchers’ attention in order to increase its efficiency. This is due to the increase in demand for electrical energy due to rapid technological growth, increase in population numbers, and high fuel prices that are used in the production of traditional electrical energy, but it suffers from a problem that is greatly affected by two factors, namely, the change in the intensity of solar irradiation and temperature, which makes its electrical characteristics non-linear, which causes a decrease in its efficiency. To address the efficiency problem, the researchers developed several techniques for tracking the MPP point and extracting the maximum energy from the solar panels under various measurement conditions. Maximum power point tracking technology (MPPT) technology is the most widely used technology in solar energy systems. In this article, MPPT technology is simulated using MATLAB/Simulink for the purposes of extracting maximum power and managing the duty cycle of a DC-DC buck converter. The performance of the photovoltaic system under various irradiance fluctuations and settings of constant temperature could well be determined using simulation results. Under standard and varied test settings, allowing the inverter to convert over 99% of the electricity provided by the solar panels.
Offline signature verification using long short-term memory and histogram orientation gradient Alsuhimat, Fadi Mohammad; Mohamad, Fatma Susilawati
Bulletin of Electrical Engineering and Informatics Vol 12, No 1: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i1.4024

Abstract

The signing process is a critical step that organizations take to ensure the confidentiality of their data and to safeguard it against unauthorized penetration or access. Within the last decade, offline handwritten signature research has grown in popularity as a common method for human authentication via biometric features. It is not an easy task, despite the importance of this method; the struggle in such a system stem from the inability of any individual to sign the same signature each and every time. Additionally, we are indeed interested in the dataset’s features that could affect the model's performance; thus, from extracted features from the signature images using the histogram orientation gradient (HOG) technique. In this paper, we suggested a long short-term memory (LSTM) neural network model for signature verification, with input data from the USTig and CEDAR datasets. Our model’s predictive ability is quite outstanding: The classification accuracy efficiency LSTM for USTig was 92.4% with a run-time of 1.67 seconds and 87.7% for CEDAR with a run-time of 2.98 seconds. Our proposed method outperforms other offline signature verification approaches such as K-nearest neighbour (KNN), support vector machine (SVM), convolution neural network (CNN), speeded-up robust features (SURF), and Harris in terms of accuracy.
Design and characterization of an radio frequency reused energy system for nano-devices Haider Al-Mumen; Ahmed Abdulkadhim Hamad
Bulletin of Electrical Engineering and Informatics Vol 11, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i5.4321

Abstract

In this work a simple, high conversion efficiency, and high output voltage energy harvesting device was designed and simulated. The harvesting device consists of microstrip antennas, matching and rectifier circuits. Both mono patch and array antennas are designed to be operated at 5.8 GHz. The simulation work was implemented using central standard time (CST) studio. Results showed an accepted return loss and high gain. To more elevate the device gain and then to obtain greater output energy, an array of microstrip antennas was designed. To convert the radio frequency (RF) energy to dc output voltage, a rectifier, which consists of a voltage doubter and schottky diodes was designed using advanced design system (ADS) simulator. Furthermore, to achieve 50 Ω impedance, a matching circuit was designed by adjusting the microstrip line patterns. The output voltage of the device was 6.2 V at input power 20 dBm and 560 Ω load resistance.
Stereo matching algorithm for autonomous vehicle navigation using integrated matching cost and non-local aggregation Zahari, Madiha; Hamzah, Rostam Affendi; Manap, Nurulfajar Abd; Herman, Adi Irwan
Bulletin of Electrical Engineering and Informatics Vol 12, No 1: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i1.4122

Abstract

Stereo matching algorithm plays an important role in an autonomous vehicle navigation system to ensure accurate three-dimensional (3D) information is provided. The disparity map produced by the stereo matching algorithm directly impacts the quality of the 3D information provided to the navigation system. However, the accuracy of the matching algorithm is a challenging part to be solved since it is directly affected by the surrounding environment such as different brightness, less texture surface, and different image pair exposure. In this paper, a new framework of stereo matching algorithm that used the integration of census transform (CT) and sum of absolute difference (SAD) at the matching cost computation step, non-local cost aggregation at the second step, winner take all strategy at the third step, and a median filter at the final step to minimize disparity map error. The results show that the accuracy of the disparity map is improved using the proposed methods after some parameter adjustment. Based on the standard Middlebury and KITTI benchmarking dataset, it shows that the proposed framework produced accurate results compared with other established methods.
Design module for speech recognition graphical user interface browser to supports the web speech applications Fadya A. Habeeb; Suaad M. Saber; Shaymaa Mohammed Abdulameer; Hassan Muwafaq Gheni; Ahmed Dheyaa Radhi
Bulletin of Electrical Engineering and Informatics Vol 11, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i6.4346

Abstract

The web speech API has made it possible to integrate audio data into web applications and make it a unique experience for all customers and users of modern applications. The website can only be accessed through devices equipped with a which stands for graphical user interface (GUI) and screen. For this to be done, there must be a physical attraction with such devices. This paper presents speech recognition using a web browser (SRWB) which permits browsing or surfing the internet with the use of a standard voice-only and vocal user interface (VUL) development. The SRWB system input from the users in form of vocal commands and covers these voice commands to HTTP requests. The SRWB system will send the voice commands to the web server for processing purposes and when the processing is done, the converted or translated HTTP response is outputted to the end-users in a voice format made audible with the attached loudspeakers. SAPI, developed by Microsoft, allows the use of SRWB in Windows applications. The algorithm is implemented by the system to achieve its goal for web content, classifying, analyzing, and sending important parts of web pages back to the end-user.
The qualities of dyed YAG:Ce3+@SiO2 for WLEDs via energy conversion Phung Ton That; Phan Xuan Le
Bulletin of Electrical Engineering and Informatics Vol 11, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i5.4064

Abstract

Y3Al5O12:Ce3+ (YAG:Ce3+), the most common yellow phosphor for WLEDs, has a red insufficiency in its light spectrum. The Ce3+ spectral profile is modified in this research using surface-located ATTO-Rho101 dye molecules, which have powerful, wide impregnation in the greenish-yellow spectroscopic zone of Ce3+ radiation and vivid red-emitting radiation. To create a spherical shell and evenly dispersed micro and nanometer YAG:Ce3+, a modified solvothermal technique is applied. Surface SiO2 covering and synchronized dye embedding are accomplished using solvothermally generated YAG:Ce3+, temperature-stimulated micro-YAG:Ce3+, plus commercialized phosphorus. Upon blue light excitation, the accumulated YAG:Ce3+@SiO2+dye powder exhibits efficient radiative conversion/reintake from Ce3+ within the internal structure of YAG to the pigment particles from the SiO2 external shell, despite the phosphors' diameter; which likely boosts its red radiation. Fluorescence microscopy would be a suitable way to determine the reabsorption of powdered substances.
Efficient model for detecting application layer distributed denial of service attacks Kareem, Morenikeji Kabirat; Aborisade, Olaniyi Dada; Onashoga, Saidat Adebukola; Sutikno, Tole; Olayiwola, Olaniyi Mathew
Bulletin of Electrical Engineering and Informatics Vol 12, No 1: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i1.3871

Abstract

The increasing advancement of technologies and communication infrastructures has been posing threats to the internet services. One of the most powerful attack weapons for disrupting web-based services is the distributed denial of service (DDoS) attack. The sophisticated nature of attack tools being created and used for launching attacks on target systems makes it difficult to distinguish between normal and attack traffic. Consequently, there is a need to detect application layer DDoS attacks from network traffic efficiently. This paper proposes a detection system coined eXtreme gradient boosting (XGB-DDoS) using a tree-based ensemble model known as XGBoost to detect application layer DDoS attacks. The Canadian institute for cybersecurity intrusion detection systems (CIC IDS) 2017 dataset consisting of both benign and malicious attacks was used in training and testing of the proposed model. The performance results of the proposed model indicate that the accuracy rate, recall, precision rate, and F1-score of XGB-DDoS are 0.999, 0.997, 0.995, and 0.996, respectively, as against those of k-nearest neighbor (KNN), support vector machine (SVM), principal component analysis (PCA) hybridized with XGBoost, and KNN with SVM. So, the XGB-DDoS detection model did better than the models that were chosen. This shows that it is good at finding application layer DDoS attacks.
Effect of switched-capacitor on super-lift Luo converter Hussein Abdulkhudhur Hussein; Hassan Jassim Motlak; Harith Nawfal Abdali Almusawi
Bulletin of Electrical Engineering and Informatics Vol 11, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i6.3604

Abstract

With the increasing need for solar energy and the need for DC-DC converters that are more efficient, smaller in size, less expensive, and faster in response, in this paper, we will modify the positive output super-lift Luo converter using a switched-capacitor cell. It consists of two capacitors that are charged in parallel and discharged in series to raise the output voltage, the use of capacitors in-stead of inductors increases the voltage, because capacitors are more efficient and have a smaller size than inductors and provide faster and smoother charging and discharging than inductors, so a capacitive cell has been used. The circuit was simulated using the physical security information management (PSIM) program. The current, voltage, and gain co-efficient waves were analyzed and the theoretical equations were proven. The circuit was also linked with the maximum power point tracker using the same program with a solar cell to get the most benefit from the solar energy using this type of converter.
Social crisis detection using Twitter based text mining-a machine learning approach Shoaib Rahman; Nusrat Jahan; Farzana Sadia; Imran Mahmud
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.3957

Abstract

Social-media and blogs are increasingly used for social-communication, an idea and thought publishing platform. Public intentions, wisdom, problems, solutions, mental states are shared in social media. Text is being the best and the most common way to communicate over social networks. All kinds of data shared in social sites like Facebook, Twitter, and Microblogs. People from different pursuance uses these media to publish thoughts and convey messages through text. Consequently, occurrences in social life are rapidly discussed in social blogs in daily manner. This work aims at discovering ongoing social crisis from the Twitter data. Text mining technique and sentiment analysis were applied to detect the current social crisis from the social sites. Twitter data were collected to identify the recent social crisis. Furthermore, the identified crisis was compared to reputed newspapers. A hybrid method used to detect recent social issues resulted nicely. However, our proposed analysis shows identifying rate 89%, 95%, 83%, 53%, and 98% for the top 5 identified crisis accordingly in the date between 27 February and 11 March 2020. The strategy used in this study for the detection of recent social crisis will contribute to the social life and findings of crisis will be eliminated easily.
Evaluation of Bernoulli Naive Bayes model for detection of distributed denial of service attacks Ayodeji Olalekan Salau; Tsehay Admassu Assegie; Adedeji Tomide Akindadelo; Joy Nnenna Eneh
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4020

Abstract

Distributed denial of service is a form of cyber-attack that involves sending several network traffic to a target system such as DHCP, domain name server (DNS), and HTTP server. The attack aims to exhaust computing resources such as memory and the processor of a target system by blocking the legitimate users from getting access to the service provided by the server. Network intrusion prevention ensures the security of a network and protects the server from such attacks. Thus, this paper presents a predicitive model that identifies distributed denial of service attacks (DDSA) using Bernoulli-Naive Bayes. The developed model is evaluated on the publicly available Kaggle dataset. The method is tested with a confusion matrix, receiver operating characteristics (ROC) curve, and accuracy to measure its performance. The experimental results show an 85.99% accuracy in detecting DDSA with the proposed method. Hence, Bernoulli-Naive Bayes-based method was found to be effective and significant for the protection of network servers from malicious attacks.

Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue