cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Real-time stress detection and monitoring system using IoT-based physiological signals Atika Hendryani; Dadang Gunawan; Mia Rizkinia; Rinda Nur Hidayati; Frisa Yugi Hermawan
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.5132

Abstract

Currently, medical experts use psychophysiological questionnaires to evaluate human stress levels during counseling or interviews. Typically, biochemical samples use urine, saliva, and blood samples to identify the effects of stress on the human body. This research explains that stress detection can be done by analyzing psychological signals and the importance of monitoring stress levels. The authors develop research on stress detection based on psychological signals. The system then processes the recorded data; the android application displays the calculation results. The database can also be accessed as a spreadsheet via a web application. The design of real-time stress detection and monitoring using internet of things (IoT) can work well.
Fake account detection in social media using machine learning methods: literature review Kerrysa, Nalia Graciella; Utami, Ika Qutsiati
Bulletin of Electrical Engineering and Informatics Vol 12, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i6.5334

Abstract

With the rapid development of emerging technologies in the industrial revolution 4.0 or 5.0, social media has become one of the social environments to carry out social activities, both socializing and advertising. However, since it is an open platform by nature, cybercrime occurrence in social media is inevitable. Currently, more than a million fake accounts are existing on Instagram, Twitter, and Facebook, intending to increase followers, spread hoaxes, and spam. On one hand, it is difficult to manually eliminate these accounts on social media platforms. On the other hand, research on automatic fake account detection has been carried out for more than a decade. This study provides literature reviews aiming to deliver information about several methods and machine learning algorithms with the performances measured in identifying fake accounts on three well-known social media platforms: Twitter, Instagram, and Facebook.
Behavioral drowsiness detection system execution based on digital camera and MTCNN deep learning Majeed, Ali Hassan; Hussein Ali, Adnan; A. Al-Hilali, Aqeel; Sameer Jabbar, Mohanad; Ghasemi, Safiye; G. S. Al-Safi, Mohammed
Bulletin of Electrical Engineering and Informatics Vol 12, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i6.5252

Abstract

Drowsy driving is a major cause of road accidents worldwide, necessitating the development of effective drowsiness detection systems. Each year, there are more accidents and fatalities than ever before for a variety of causes. For instance, there were 22,952 fatalities and 79,545 injuries as a result of nearly 66,500 vehicle accidents in the last 10 years. In this paper, we propose a novel approach for detecting drowsiness based on behavioral cues captured by a digital camera and utilizing the multi-task cascaded convolutional neural network (MTCNN) deep learning algorithm. A high-resolution camera records visual indications like closed or open eye movement to base the technique on the driver's behavior. In order to measure a car user's weariness in the present frame of reference, eyes landmarks are evaluated, which results in the identification of a fresh constraint known as "eyes aspect ratio." A picture with a frame rate of 60 frames per second (f/s) and a resolution of 4,320 eyeballs was used. The accuracy of sleepiness detection was more than 99.9% in excellent lighting and higher than 99.8% in poor lighting, according to testing data. The current study did better in terms of sleepiness detection accuracy than a lot of earlier investigations. 
A versatile methodology for preventing a parallel transmission system using impedance-based techniques Mohan P. Thakre; Rakesh Shriwastava; Rahul G. Mapari; Deepak Prakash Kadam; Sunil Somnath Kadlag
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.4888

Abstract

The various configurations that exist for a compatible circuit depend on an object, such as operating conditions, the occurrence of an inter-circuit error and the result of the coupling of the transmission line. This feature makes the protection of the same transmission lines very difficult. This paper introduces a new algorithm based on a state diagram that contains location data collected on a passing bus. Combine the different separation processes and the impedance-based process is used. The classification process cannot detect internal errors and only compares with existing phases where the same regional error occurs in the 2D space and the impedance-based method used to cover the resulting error. The proposed algorithm incorporates impedance-based methodology and separation technology to provide the appropriate response under all operating conditions of the same circuits.
An electronic nose for insecticides detection in food: the case of alpha-cypermethrin in Swiss chard Amkor, Ali; Aboulkacem, Asmae; El Barbri, Noureddine
Bulletin of Electrical Engineering and Informatics Vol 12, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i6.5956

Abstract

Due to the disturbingly high quantities of pesticides found in recent years, it has become essential to analyze the food composition intended for consumption. In this study and from a similar angle, we are interested in the detection of alpha-cypermethrin insecticide residues in edible Swiss chard. To this end, we suggest an electronic nose that was constructed using metal oxide gas sensors. Following data collection and pre-processing, two machine learning algorithms—principal component analysis (PCA) and support vector machine (SVM)—were used to analyze the sensor matrix data. The PCA method initially showed that the first three principal components (PCs) may account for more than 96.5% of the sample variation with a clear distinction between known groups corresponding to treated and untreated samples. The identification of untreated Swiss chard from treated one was then accomplished using the SVM method with five folds cross-validation, with a success rate of 92.3%. These results show that our suggestion, which is quick, easy, and affordable, can be utilized as an effective substitute for current methods for identifying Swiss chard that has been treated with the hazardous alpha-cypermethrin.
Comparative analysis of meta heuristics algorithm for differential amplifier design Prajapati, Pankaj P.; Kshatriya, Anilkumar J.; Patel, Dhavalkumar N.; Gonsai, Sima K.; Tank, Hardik B.; Sheth, Kinjal R.
Bulletin of Electrical Engineering and Informatics Vol 12, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i6.6153

Abstract

The design of analog circuits is very essential for the development of system design based on electronics as the world is analog in nature. Furthermore, performance of emerging products depends on analog circuits for reduction of power dissipation and improvement of speed. Though in the system on chip (SoC) analog circuit consumes less, it is more complex to design it due to the analog circuit nature complexity. The job of the evolutionary algorithm (EA) in the process of optimization of an analog circuit based on complementary metal oxide semiconductor (CMOS) is to get the appropriate values that can be used for the design parameters of the given circuit in such a way such that all the targeted specification of the given circuit can be obtained. The chaotic serial particle swarm optimization (CSPSO) and cuckoo search (CS) algorithms are lower than to those found through the particle swarm optimization (PSO) and differential evolution (DE) algorithms. The CS algorithm obtained all the desired specifications with less power dissipation and the least total transistor area compared to those attained by the DE and PSO algorithms.
Red deer algorithm-based selective harmonic elimination technique for multilevel inverters Yasin Bektaş; Hulusi Karaca; Taha A. Taha; Hussein I. Zaynal
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.5160

Abstract

This paper proposed a red deer algorithm (RDA)-based selective harmonic elimination (SHE) method for multilevel inverters (MLIs). To eliminate the desired harmonic orders, the optimum switching angles of the MLI have been calculated using the proposed RDA. The calculated switching angles have been applied to the 3-phase cascaded H-bridged 11-level inverter. In addition, the performance of the proposed RDA method was compared with the results of methods such as the Newton-Raphson (NR) method, LSHADE/EpSin technique (LSHADE), whale optimization algorithm (WOA), and particle swarm optimization (PSO) used for the SHE problem in the literature. The results obtained prove that the proposed RDA optimization solves the SHE problems more effectively than other methods. It has also been observed that RDA produces good solutions in different modulation indexes.
A case analysis for Kubernetes network security of financial service industry in Indonesia using zero trust model Nico Surantha; Felix Ivan; Ritchie Chandra
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.4240

Abstract

In this study, a case analysis of Kubernetes application in an enterprise providing financial services in Indonesia is presented. It is implemented to improve their digital services-based application, developed using micro-services architecture. Kubernetes, an application container technology, has been applied in the enterprise providing financial services in Indonesia to improve their digital services-based application, developed using micro-services architecture concepts. Without incorporating any additional hardware, the new technology and services have been adopted to existing virtualized resources of the enterprise. An infrastructure design for secure Kubernetes networking was built and has been studied using the data center provided by the enterprise. This study focuses on two important aspects: network and security. As a security guideline, the network recommendations from VMware, Cisco, and Forrester’s zero trust model were employed to design the infrastructure and were evaluated. The proposed secure network infrastructure design is successfully applied in the container networks using the zero trust requirement, the enterprise’s requirements, and constraints. And we hope this study about network design security can be used and adaptable with existing network and reduce risk and disruption to the business caused by the network.
Total power deficit estimation for isolated power system network using H∞ norm method Mohd Saifuzam Jamri; Muhammad Nizam Kamarudin; Mohd Luqman Mohd Jamil; Muhammad Iqbal Zakaria
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.4041

Abstract

An isolated electrical network with an independent local distributed generator is very sensitive towards the contingencies between load demand and supply. Although the network system has less complexity in term of structure, its stability condition is crucial due to its stand-alone operating condition. Hence, to monitor the stability of the network, total power deficit is the only variable that can be estimated. This study proposed to utilize the  filtering problem to design an estimator that can estimate the total power deficiency. For verification, the design estimator was tested under two cases which are nominal case and parameter uncertainty case. In nominal case, the system parameters are assumed to be known while in parameter uncertainty case the system has contaminated with uncertain parameter where its admissible value is laying in a given polytope. With complying the linear matrix inequality (LMI) constraint, the main objective function of the  norm was guaranteed with minimum upper bound. The results show that the dynamical behaviors of designed estimator successfully trace the actual power deficit signal at steady state with minimal estimation error.
Realization of fractional order lowpass filter using different approximation techniques Krishna, Battula Tirumala; Janarthanan, Midhunchakkaravarthy
Bulletin of Electrical Engineering and Informatics Vol 12, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i6.5750

Abstract

Many research groups are starting to pay serious attention to the problem of fractional-order circuits. In this paper, a new approach to designing fractional order low-pass filter (FOLPF) is presented. Finding a rational approximation of the fractional Laplace operator sα is a crucial step in the design of fractional order filters. A comparative study of the most widely used approximation techniques named continued fraction expansion (CFE) method and Biquadratic Approximation (RE) method is performed. Then the transfer function of the proposed FOLPF is calculated. Using operational amplifier, the proposed filter is synthesized. The proposed circuit is simulated using Texas instruments TINA software. The results obtained outperform the existing methods.

Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue