cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Secrecy capacity analysis of bi-static backscatter communication systems Phung Ton That; Duy-Hung Ha; Hong-Nhu Nguyen
Bulletin of Electrical Engineering and Informatics Vol 11, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i6.3981

Abstract

The rapid adoption of battery-free internet-of-things (IoT) sensors in multiple environments ranging from agriculture to wildlife surveillance, has seen increased research interest in backscatter communication (BSC) technology. BSC is viewed as a potential technology to enable the further spread of sustainable battery-free IoT applications in environments and scenarios where bulkier-sized battery-powered IoT devices would be unsuitable. In this study, we investigate the secrecy capacity of a bi-static BSC network in the presence of a malicious eavesdropper. The proposed BSC system consists of a reader, multiple backscatter devices, and an eavesdropper. We derive closed-form strictly positive secrecy capacity (SPSC) expressions and ergodic secrecy capacity (ESC) expressions for the BSC reader. Monte Carlo simulations verify the exact capacity expressions.
Healthcare monitoring system for automatic database management using mobile application in IoT environment Shawki Saleh; Bouchaib Cherradi; Oussama El Gannour; Nissrine Gouiza; Omar Bouattane
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4282

Abstract

In the last decade, healthcare systems have played an effective role in improving medical services by monitoring and diagnosing patients' health remotely. These systems, either in hospitals or in other health centers, have experienced significant growth with emerging technologies. They are becoming of great interest to many countries worldwide nowadays. Portable healthcare monitoring systems (HMS) depend on internet of things (IoT) technology due to its effectiveness and reliability in several sectors, as well as in the sector of telemedicine. This paper proposes a portable healthcare system in an IoT environment controllable via a smartphone application that aims to facilitate utilization. This proposed system can track physiological indicators of a patient's body as well as the environmental conditions where the patient lives in real-time and auto-manage databases. Moreover, this paper touched on a comparison between three servers, concerning data transfer speeds from the proposed system into the servers.
Research on fault adaptive fault tolerant control of distributed wind solar hybrid generator Yitong Niu; Intisar A. M. Al Sayed; Alya'a R. Ali; Israa Al_Barazanchi; Poh Soon JosephNg; Zahraa A. Jaaz; Hassan Muwafaq Gheni
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4242

Abstract

Due to the poor accessibility, poor operating conditions, high failure rate, long maintenance time, and difficult maintenance of wind hybrid generators, the economic loss is huge once the failure stops. To this end, the fault adaptive fault-tolerant control of distributed wind and wind hybrid generators is studied, the historical operation data of offshore wind and wind hybrid generators and onshore wind and wind hybrid generators are counted and compared, and the fault characteristics of key components of offshore wind and wind hybrid generators are analyzed. The generator sets are summarized, and the common electrical faults of wind turbines and their impacts on the system are analyzed. This paper summarizes the current research status of fault-tolerant operation of existing offshore wind and wind complementary generators in terms of software fault tolerance and hardware fault tolerance, summarizes the current fault tolerance schemes for offshore wind and wind complementary generators, and analyzes the application feasibility of existing fault tolerance schemes. In addition, the main problems of fault-tolerant offshore wind and solar complementary generator sets are pointed out, and future research hotspots are foreseen.
Dynamic voltage restorer based on particle swarm optimization algorithm and adaptive neuro-fuzzy inference system Saddam Subhi Salman; Abdulrahim Thiab Humod; Fadhil A. Hasan
Bulletin of Electrical Engineering and Informatics Vol 11, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i6.4023

Abstract

This article uses a dynamic voltage restorer to tackle a wide range of power quality issues, such as voltage drooping and swelling, spikes, distortions, and so on. The proportional controller, integrated controller (PI), and adaptive neuro-fuzzy inference system (ANFIS) are proposed dynamic voltage restorer (DVR) controllers. The control strategy's goal is to employ an injection transformer to mitigate for the needed voltage and keep the load voltage fixed. The settings of the PI controller are fine-tuned using two methods: trial and error and intelligent optimum. Particle swarm optimization (PSO) is now the most effective method. In terms of settling time, overshoot, undershoot, and disturbances around the final value, the PSO-tuned PI controller outperforms the trial-and-error PI controller. The ANFIS controller is used to regulate the DVR's responsiveness through the PI-PSO controller. The PI-PSO data is used as training data by the ANFIS controller. The results show that a DVR with an ANFIS controller outperforms a PI-PSO controller in terms of overshoot, undershoot spike voltage, steady state time, and settling time. In the case of a failure voltage, the DVR with an ANFIS controller has a 27% undershoot spike voltage while the PI-PSO controller has a 30% undershoot spike voltage.
Smart pictorial dictionary via mobile augmented reality Nurul Asyiqin Khazali; Ismassabah Ismail; Norzehan Sakamat; Nurul Hidayah Mat Zain; Nor Azida Mohamed Noh; Norshahidatul Hasana Ishak
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4009

Abstract

Augmented reality (AR) technology offers many benefits for language teaching and learning. Using the AR technique in pedagogy attracts and engages children to learn and memorize easily, even in a short time. Visual representation learning method like a pictorial dictionary is one of the beginnings of learning for children. It helps children to visualize the object and memorize it in effective ways. Based on the survey conducted in one of the primary schools at Merlimau, Melaka, it was found that the children have difficulties in learning English. The development of pictorial dictionaries with the combination of AR technology in 3D that are presented in the form of mobile applications can be used to improve existing learning methods in English. The method used during the development of this application is the ADDIE model, which comes with five phases: analysis, design, development, implementation, and evaluation. The development of the ‘smart pictorial dictionary via mobile AR application has been done successfully and has received positive results. Based on the evaluation using the attention relevance confidence satisfaction (ARCS) model, the output has an overall mean of 4.58, which shows that using AR technology in early childhood learning makes children learn more.
Image scrambler based on novel 4-D hyperchaotic system and magic square with fast Walsh–Hadamard transform Hayder Kadhim Zghair; Hussein Ali Ismael; Ameer Al-Haq Al-Shamery
Bulletin of Electrical Engineering and Informatics Vol 11, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i6.4339

Abstract

A novel 4-D hyperchaotic system that have seven positive parameters in third order with thirteen terms is proposed,in this paper, the proposed chaotic behavior is proved by analysis of the Lyapunov's exponent, fractional dimension, zero-one test, sensitivity dependent on initial condition (SDIC), phase portraits, and waveform analysis, this study offers an innovative designed image encryption algorithm depending on a 4-D chaotic system using fast discrete Walsh-Hadamard transform and magic matrix that is both effective and simple for image encryption and gives it a higher level of security. This new 4-D hyperchaotic system is used to produce a random key in this algorithm. The implemented and simulated results using mathematica programs and MATLAB programs were supplied qualitatively and in figures. The proposed system is hyperchaotic, according to testing results, because it possesses two Lyapunov positive exponents.
State and output feedback control for Lipschitz nonlinear systems in reciprocal state space: synthesis and real-time validation Assem Thabet; Ghazi Bel Haj Frej; Noussaiba Gasmi; Karim Mansouri; Eric Chauveau
Bulletin of Electrical Engineering and Informatics Vol 11, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i5.3521

Abstract

In industrials process and many studies cases, state and output derivative variables can be easily modeled in reciprocal state space (RSS) form than the standard one. Formulation of stabilization problem with a guaranteed cost control using feedback principle for Lipschitz nonlinear systems (LNS) in RSS is presented in this brief. The asymptotic stability, using the proper Lyapunov functions of the closed-loop system, is guaranteed. The control design problem is guaranteed through a resolution of linear matrix inequalities (LMI) technique under certain lemmas and minimization of non-standard cost control. Experimental validation shows the good performances of the proposed method using real-time implementation (RTI) with a digital signal processing (DSP) device (Arduino MEGA 2560).
Web application: efficient immunization by vaccination for children and adults Jimmy Cruz Fernandez; Laberiano Andrade-Arenas
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4777

Abstract

The investigation analysed the correct use of the vaccination scheme in order to achieve efficient immunization for children and adults in the midst of the pandemic; through the use of a web application that will greatly facilitate people in their immunization, since the web application will allow them to create alerts to have reminders at times personalized by the user. Also, the web application will provide a schedule complete personalized immunization according to the personal information of the registered user, on the other hand they will also be able to view the information of the different vaccination centers to achieve a correct immunization. The methodology was Scrum, allows prepared for change and to be able to adapt, as well as allowing proper planning for efficient work. The result obtained from the investigation can be seen in the sur-vey carried out on parents; where satisfactory percentages were obtained since 98% of respondents indicated that the use of a web application for the correct immunization of people is of the utmost importance, in addition to the survey they were shown the prototype of the application and indicated that its use was efficient, educational and easy to use for everyone.
Design security architecture for unmanned aerial vehicles by 5G cloud network based implementation of SDN with NFV and AI Lehmoud, Ahssan Ahmed Mohammed; Obeis, Nawfal Turki; Mutar, Ahmed Fakhir
Bulletin of Electrical Engineering and Informatics Vol 12, No 1: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i1.4239

Abstract

A recent progression of unmanned aerial vehicles (UAV) augmentation its employments for different applications. It’s also vulnerable to being, stolen, lost, stray, or destroyed at status of a security infringements for the UAV network. The proposed strategy is defending against of different attacks through using artificial intelligence by implements five steps: RGSK, GCSCS, SEDC, HSSC, and FVNF. UAV authentication is happened in the first step through the Curve448. We performance deep reinforcement learning to run with GCS for packet assignment as it implemented for switch current state identification before updating. In our work we ability to alleviate for attack of flow table overloading by assigned of packets as an under loaded or idle switches. Then, selected the least loaded switch by applied 5 tuples. Hence, we divided SDN to SEDCs and HSSC forms. First in the SEDC we using Shannon entropy to achieve classified of input packet in to regular and suspicious packets. Last will forwarded regular packets to cloud layer. By growing multiple self-organizing maps for maintained in NFV that used to classify suspicious packets as classes normal or malicious packet. The proposed performance work evaluates using NS3.26 show up the better strategy to secure UAV for different attacks.
On picture fuzzy ideals on commutative rings Phakakorn Panpho; Pairote Yiarayong
Bulletin of Electrical Engineering and Informatics Vol 11, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i5.3482

Abstract

In this paper, we focus on combining the theories of picture fuzzy sets on rings and establishing a new framework for picture fuzzy sets on commutative rings. The aim of this manuscript is to apply picture fuzzy set for dealing with several kinds of theories in commutative rings. Moreover, we introduce the notions of picture fuzzy ideals on commutative rings and some properties of them are obtained. Finally, we give suitable definitions of the operations of picture fuzzy ideals over a commutative ring, as composition, product and intersection.

Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue