cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Effect on signal magnitude thresholding on detecting student engagement through EEG in various screen size environment I Putu Agus Eka Darma Udayana; Made Sudarma; I Ketut Gede Darma Putra; I Made Sukarsa
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4850

Abstract

In this study, a new method was developed to detect student involvement in the online learning process. This method is based on convolutional neural network (CNN) as a classifier with an emphasis on the preprocessing process combined with a new feature in the form of signal magnitude area (SMA) thresholding. In this study, the data used as training data is a public dataset that emphasizes the decomposition of electroencephalography (EEG) signals into individual signal processing. Twenty subjects were taken to be used as test data, with each subject watching online learning lectures in the field of computer science on three different devices, either with a flat screen, a curved screen or a smartphone screen that is smaller than two standard computer monitors. Based on the study's results, it is known that the change in screen size is inversely proportional to the level of student attention, the smaller the screen, the lower the student's attention. For classification results, the model equipped with SMA thresholding outperformed the standard classifier by 8.33% with a test set of 20 people.
Modeling and simulation of a pipeline leak detection using smart inspection ball Marwa H. Abed; Wasan A. Wali; Musaab Alaziz
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4790

Abstract

Recently, pipelines have replaced more carbon-intensive transportation methods making them more environmentally friendly for transporting energy and water supplies. However, pipelines can pollute the air, water, soil, and climate when they leak, causing economic, and environmental damage. Pipeline online monitoring provides data analysis and suitable controlling strategies to contain the risk. This paper proposes a three-dimensional numerical model simulation taking advantage of the fluids moving through pipelines at specific speeds. The transport speeds depend on many conditions, such as pipe diameter, the pressure through which the fluid is being transported, and other factors, such as terrain's topography and viscosity of the fluid. Under these conditions, the inspection approach uses a self-charging movable ball. The sensors inside the ball capture data as it travels through the pipe. The simulation focuses on spherical flow and pipe noise with and without leakage based on the COMSOL software platform. The paper shows the effect of several parameters, including leak location, sensor placement, ball diameter, sound pressure level propagation along a pipe and around the sphere, velocity, and temperature distribution that give the background for future smart ball design in a promising practical pipeline test project.
SiulMalaya: an annotated bird audio dataset of Malaysia lowland forest birds for passive acoustic monitoring Nursuriati Jamil; Ahmad Nazem Norali; Muhammad Izzad Ramli; Ahmad Khusaini Mohd Kharip Shah; Ismail Mamat
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.5243

Abstract

The laborious point count method of conducting bird surveys is still a common practice in Malaysia. An alternative method known as passive acoustic monitoring (PAM) is deployed in many countries by placing sound recorders at surveying sites to collect bird sounds. Studies revealed that the number of bird densities counted by human observers was agreeable with those obtained using PAM. However, one of the most essential gaps in conducting PAM is the lack of expert-verified bird-call databases. Therefore, the aim of this study is to construct the first annotated Malaysia lowland forest bird sounds called SiulMalaya to be used as ground-truth datasets for PAM-related activities. The raw bird sounds dataset was downloaded from Macaulay Library using the eBird platform. Data pre-processing was done to produce annotated audio tracks that can be used as training datasets for bird classification. SiulMalaya dataset was further validated by two bird experts from the Department of Wildlife and National Parks, Malaysia. A bird identification experiment was carried out to assess and validate SiulMalaya dataset using a convolutional neural network (CNN) learning model. Even though the accuracy of bird identification is slightly above 50%, the annotated dataset is shown to be viable for PAM-related operations.
An improvement of direct torque controlled PMSM drive using PWM technique and kalman filter Dung Quang Nguyen; Hau Huu Vo; Pavel Brandstetter
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4697

Abstract

The paper describes pulse-width-modulation (PWM) technique and Kalman filter (KF) process to improve performance of direct torque controlled permanent magnet synchronous motor (DTC-PMSM) drive. Performance of DTC methods are strongly affected by high stator current ripple. For lowering the ripple, high switching frequency space vector PWM and KF are utilized in the paper. Mathematical model of PMSM and calculations of important quantities of DTC applied to PMSM drive are presented in the first part. The second part shows computation process of space vector PWM and KF. Performance indices are utilized to evaluate the drive structures. Theorectical assumptions are validated via simulations with Gaussian noised stator current measurement.
An algorithm for enhancement of audio content classification Arti V Bang; Radhika G. Purandare; Archana K. Ratnaparkhi
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.3663

Abstract

Presently, fast proliferation of information enforces novel challenges on content management. Further, computerized audio classification along-with content description is considered as valuable method to manage audio contents. In general, classification involves two steps. First, is the processing of accessible data in economical ways to deliver explanatory features. Second is how accurate features of undetermined tests is evaluated to choose classifier. In this paper, k-neighbor algorithm with machine learning is proposed for feature extraction as well as content classification/description. This algorithm enhances Quality of Service parameters of classifiers. Here, development of training as well as testing data set is developed to increase the classifier accuracy. A test engine set-up bed using simulation tool MATLAB is designed to estimate the implementation performance of the algorithm. A range of features are studied to evaluate effectiveness in terms of accuracy, zero crossing rate (ZCR) and spectral roll frequency. From the experimentation results, it is observed that the proposed algorithm can achieve accuracy of 95.8% for 2 sec window length as compare with k-neighbor algorithm. A total enhancement of 11% is achieved with cross validation error of 29.6. A superior assortment of training fabric to extract few additional useful features can enhance accuracy further.
Medication correlation analysis for outbreak prediction Md Mohibullah; Meskat Jahan; Chowdhury Shahriar Muzammel; Fahim Shahriar; Raihan Khan
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4935

Abstract

Outbreak prediction is a way to predict the epidemic potentials of diseases using the pattern of medication sales values. Successful prediction might result in being cautious of the outbreak of diseases and taking necessary measures to prevent the predicted outcome. As medication sales values are too random, the analysis of medication correlation is one of the most interesting and challenging parts for the researchers. The major objective of this proposed research method is to analyze medication drug sales values for a certain period of a pharmaceutical company using statistical methods. It is also the intent of this research to make a comparative analysis of the output generated by the deep learning model with the real sales values of a month. Our method successfully predicts the outbreak potential of diseases with competent accuracy, so that we will have enough time to take precautions and prevent future pandemics through precautionary measures.
Bengali Slang detection using state-of-the-art supervised models from a given text Md. Abdul Hamid; Eteka Sultana Tumpa; Johora Akter Polin; Jabir Al Nahian; Atiqur Rahman; Nurjahan Akther Mim
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4743

Abstract

Almost all Bengalis who own smartphones also have social media accounts. People from different regions occasionally employ regional Slang that is unfamiliar to outsiders and confuses the meaning of the sentence. Nearly all languages can now be translated thanks to modern technology, but only in very basic ways, which is a concern. Bengali Slang terms are difficult to translate due to a dearth of rich corpora and frequently occurring new Slang terms developed by people, making it impossible for speakers of other languages to understand the context of a sentence in which Slang is used. We developed a solution to this issue. To create models that can detect Bengali Slang terms from social media, we gather various Slang phrases from various regions and develop a modest corpus. Our suggested method nearly always succeeds in extracting Bengali Slang terms from fresh material. We create a total of 7 supervised models and assess which is the most effective for our study. One of them has a 70% accuracy and 86% recall rate for successful identification. Our models may be linked to the social media platform's backend to restrict the use of Bengali Slang in posts, blogs, comments, and other areas.
Feature-based real-time distributed denial of service detection in SDN using machine learning and Spark Sama Salam Samaan; Hassan Awheed Jeiad
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4711

Abstract

Recently, software defined networking (SDN) has been deployed extensively in diverse practical domains, providing a new direction in network management by separating the control plane from the data plane. Nevertheless, SDN is vulnerable to distributed denial of service (DDoS) attacks resulting from its centralized controller. Several studies have been suggested to address the DDoS attacks in SDN utilizing machine learning approaches. However, these approaches are resource-intensive and cause performance degradation since they cannot perform effectively in large-scale SDN networks that generate vast traffic statistics. To handle all these challenges, we build a DDoS attack detection model in SDN using Spark as a big data tool to overcome the limitations of conventional data processing methods. Four machine learning algorithms are employed. The decision tree (DT) is elected to be used for real-time deployment based on the performance results, which indicates that it has the best accuracy of 0.936. The model performance is compared with state-of-the-art and shows an overall better performance.
Handwritten signature identification based on MobileNets model and support vector machine classifier Israa Bashir Mohammed; Bashar Saadoon Mahdi; Mustafa Salam Kadhm
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.4965

Abstract

Biometrics is a field that uses behavioral and biological traits to identify/verify a person. Characteristics include handwrittien signature, iris, gait, and fingerprint. Signature-based biometric systems are common due to their simple collection and non-intrusive. Identify the humans using their handwritten signatures has received an important attention in several modern crucial applications such as in automatic bank check, law-enforcements, and historical documents processing. Therefore, in this paper an accurate handwritten signatures system is proposed. The system uses a proposed preprocessing stage for the input handwritten signatures images. Besides, a new deep learning model called MobileNets, which used for classification process. Support vector machine (SVM) used as a classifier with the MobileNets inorder to get a better identifaction results. Experimental results conducted on standard CEDAR, ICDER, sigcomp handwritten signature datasets report 99.8%, 98.2%, 99.5%, identification accuracy, respectively.
Ultra-wide band antipodal Vivaldi antenna design using target detection algorithm for detection application Sajjad Ahmed; Ariffuddin Joret; Norshidah Katiran; Muhammad Faiz Liew Abdullah; Zahriladha Zakaria; Muhammad Suhaimi Sulong
Bulletin of Electrical Engineering and Informatics Vol 12, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i4.5081

Abstract

This work presents a technique for detecting targets between two walls using ultra-wide band (UWB) modified antipodal Vivaldi antenna (MAVA). The detection system works on principle of time domain reflectrometry (TDR) using through wall imaging (TWI). This technique utilized a vector network analyzer (VNA) to produced short and small pluses to irradiate through an antenna array system onto the wall under study. The purposed detection system operated in UWB frequency spectrum (3.1 GHz to 10.6 GHz). Furthermore, an algorithm for hidden target detection has been developed. The results of the simulation of the designed antenna revealed a significant level of penetration, demonstrating a smart advancement in detecting and imaging system, to locate hidden metallic targets with good accuracy. A signal processing technique have been employed to improve the resolution of the target image. Using computer simulation technology (CST) software, the development and optimization process of an antenna is carried out, and the parametric performance of return loss, directivity and radiation pattern is evaluated.

Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue