cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Dual band antenna in licensed and unlicensed frequency bands based on superformula for 5G applications Rasim Azeez Kadhim; Yaseen Naser Jurn; Mohammed Taih Gatte
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.4694

Abstract

In this paper, the design and analysis of dual bands antenna is carried out. The ranges of frequencies are below 6 GHz and above 24 GHz. The superformula was used to design the proposed antenna where the curve profile of the proposed antenna is obtained by adjusting the six different parameters of the super-formula. The antenna shape likes the sunflower was mounted on flame retardant level 4 (FR4) substrate of dimensions of 32×32×1.5 mm3 and fed by a microstrip. The antenna is simulated using a computer simulation technology (CST) simulator. Results of the simulation showed that the antenna works in the licensed band (5.5–5.8 GHz) and the unlicensed band (24-40) GHz with voltage standing wave ratio (VSWR) less than 2 and return loss below -10 dBm. Also, the proposed design showed better performance than the normal ellipse-based antenna design with the same antenna dimensions.
THD analysis and small AC signal analysis of trans-Z-source and quasi-Z-source inverter for linear and non-linear load Bharat, Manish; Murty, ASR; Dash, Ritesh
Bulletin of Electrical Engineering and Informatics Vol 12, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i6.6597

Abstract

The paper primarily focuses on the ongoing research related to Z source inverter technologies (ZSITs) used in the transportation industry, particularly for electric vehicles (EVs) and hybrid electrical vehicles (HEVs). It analyzes various topologies of ZSITs based on their mode of operation, capacitor voltage stress during active states and non-active state operations, DC link voltage before inverter module and line to line output voltage across the load. The paper compares the conventional trans-z source and two port quasi-Z source inverter model networks for multiple parameters and derives mathematical equations for both linear and non-linear loads. Practical and theoretical calculations match when using a modulation index of M=0.85 and a duty ratio of 1.414. The result obtained in this paper indicates that the proposed solution is better in terms of reduction in total total harmonics distortions (THD) percentage of 18.14% during the transition condition. All the analysis has been carried out with MATLAB based Simulink model.
IoT based tracking cattle healthmonitoring system using wireless sensors Jai Ganesh Rajendran; Manjunathan Alagarsamy; Vaishnavi Seva; Paramathi Mani Dinesh; Balamurugan Rajangam; Kannadhasan Suriyan
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.4610

Abstract

Controlling the health of dairy cows is crucial for increasing global dairy food output. Dairy farmers are losing faith in the sector as cows suffer from a range of health issues, disease outbreaks that are unpredictable, and expensive breeding expenses. As a consequence, farmers must use efficient technology techniques for cow health monitoring in order to enhance milk output. This study looked at a range of wireless sensor-based automated dairy cow health monitoring systems. The fundamental purpose of wireless sensor network (WSN) based smart surveillance systems in agricultural optimization is to follow the health of dairy cows on a continual basis. This monitoring gadget must be installed in both local and remote farm areas so that interested farmers may monitor their cattle's movements throughout the day from several places. The data collected by the automated system would be kept in a database. Farmers may then obtain data using farm automation to execute effective farm management techniques. Furthermore, WSN is a low-cost device created exclusively for identifying illnesses in dairy cows. This achievement in sophisticated technology agricultural automation would assist to boost productivity by reducing human involvement. This article summarises all livestock tracking techniques, as well as the issues and challenges that they confront.
Adaptive image watermarking using bidimensional empirical mode decomposition Mohammed Arrazaki; Abdelouahed Sabri; Mohamed Zohry; Tarek Zougari
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.4688

Abstract

Digital watermarking is considered one of the technological means used to guarantee the security and authenticity of data transmitted over communication systems. A new method of image watermarking using the bidimensional empirical mode decomposition (BEMD) will be presented in this article, where the new idea is to use the BEMD of both the cover image and the watermark image. The embedding process consists of adding to each intrinsic modal function (IMF) of the cover image the corresponding IMF of the watermark image. The watermarked image contains three different watermarks and appropriate frequencies, which makes it more robust. We use this method for two reasons: first, to conserve the constituent characteristics of each IMF and second, to ensure the invisibility of the watermark. The results obtained showed a good response against different kinds of attacks. This technique has been compared with other methods of image watermarking based on decomposition BEMD, which showed good results.
Local binary pattern and its derivatives to handwriting-based gender classification Abbas, Faycel; Gattal, Abdeljalil; Menassel, Rafik
Bulletin of Electrical Engineering and Informatics Vol 12, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i6.5488

Abstract

Several studies by psychologists and computer scientists have verified the link between handwriting and writer gender. The texture of the writing image is a major indicator of whether it is male or female writing. This paper conducts a comparison analysis to examine the effectiveness of various local binary patterns (LBPs) techniques in detecting gender from scanned images of handwriting. We study different LBP variants, including complete local binary pattern (CLBP), local ternary pattern (LTP), local configuration pattern (LCP), rotated local binary pattern (RLBP), local binary pattern variance (LBPV), and multi-scale local binary pattern (MLBP), as features for representing handwriting images. A support vector machine (SVM) is trained using features from male and female writing. The method achieves encouraging classification rates of 76.68 when tested on subsets of the Qatar University writer identification (QUWI) dataset containing English and Arabic writing samples when using the experimental protocols of the International Conference on Document Analysis and Recognition (ICDAR) 2013 gender classification competitions.
Error performance analysis of forward error correction using convolutional encoding in the presence of (1/f) noise Yasin Yousif Al-Aboosi; Ammar Ali Sahrab; Amal Ibrahim Nasser; Hussein A. Abdulnabi
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.4771

Abstract

Any communication scheme's principal goal is providing error-free data transmission. By increasing the rate at which data could be transmitted through a channel and maintaining a given error rate, this coding is advantageous. The message bits to be transmitted will gradually receive more bits thanks to the convolution (channel) encoder. At the receiver end of the channel, a Viterbi decoder is utilized in order to extract original message sequence from the received data. Widely utilized error correction approaches in communication systems for the enhancement of bit error rate (BER) performance are Viterbi decoding and convolutional encoding. The Viterbi decoder and convolution encoder rate for constraints with lengths of 2 and 6 and bit rates of 1⁄2 and 1⁄3 are shown in this study in the presence of (1/f) noise. The performance regarding the convolutional encoding/hard decision Viterbi decoding forward error correction (FEC) method affects the simulation outcomes. The findings demonstrate that the BER as function of signal to noise ratio (SNR) acquired for uncoded binary phase shift keying (BPSK) with the existence of additive white Gaussian noise (AWGN) is inferior to that acquired with the use of a hard decision Viterbi decoder.
Performance of single axis tracker technology and automatic battery monitoring in solar hybrid systems Satria, Habib; Nisworo, Sapto; Windarta, Jaka; B. Y. Syah, Rahmad
Bulletin of Electrical Engineering and Informatics Vol 12, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i6.5506

Abstract

Utilization of elevation angles and azimuth angles is a very important part in maximizing solar energy into electrical energy in photovoltaic (PV). One way to maximize PV power output is to design a single axis tracker system and take into account the azimuth and elevation angles of the sun using the sun position calculator application. The single axis tracker system is set based on the position of the angle of inclination of the surface of the PV 45°, then the angle of 90° and the angle of inclination of 135°. The test results show that the single axis tracker PV system design can work based on the angle settings that have been programmed. Then the use of a battery control system to support the PV reliability system automatically cuts off electricity when the battery voltage drops below 12 V during cloudy weather conditions and excessive battery usage. The integration of the PZEM-017 module with the battery will support monitoring of battery power usage in real time. PV energy data conversion performance uses single axis tracker technology for maximum power reaching 631.72 Watt DC at 12.00 pm and the lowest power reaching 56.02 Watt DC at 6.00 pm.
Reducing waiting and idle time for a group of jobs in the grid computing Mahdi S. Almhanna; Firas Sabah Al-Turaihi; Tariq A. Murshedi
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.4729

Abstract

Johnson's rule is a scheduling method for the sequence of jobs. Its primary goal is to find the perfect sequence of functions to reduce the amount of idle time, and it also reduces the total time required to complete all functions. It is a suitable method for scheduling the purposes of two functions in a specific time-dependent sequence for both functions and where the time factor is the only parameter used in this way. Therefore, it is not suitable for scheduling work for computers network, where there are many factors affecting the completion time such as CPU speed, memory, bandwidth, and size of data. In this research, Johnson's method will adopt by adding many factors that affect the completion time of the work so that it becomes suitable for the site’s job scheduling purposes to reduce the waiting and idle time for a group of jobs.
Arabic vowels characterization and classification using the normalized energy relating to formants and pitch Mohamed Farchi; Karim Tahiry; Ahmed Mouhsen
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.4457

Abstract

Vowels are the primary units of a sound system of a language. The classification of these vowels is therefore very important for the recognition and synthesis of speech. In this paper, we propose a normalized energy-based approach in formants and pitch to characterize Arabic vowels (short vowels: / a /, / i /, / u /; long vowels: / a: /, / i: /, / u: /). The classification was performed using a developed algorithm on records extracted from an Arabic corpus after the extraction of the pitch and the first three formants and the computation of the normalized energy in these bands. The results showed that the algorithm distinguishes Arabic vowels by analyzing the normalized energy in the nucleus of F1, F2, and F3 formants and pitch F0 with a rate of 88.7% for long vowels and a rate of 90% for short vowels.
On-off attack detection in trust model using intra-daily variability for the IoT Kannan, Sornalakshmi; Venkataraman, Revathi; Ramachandran, Gowri Sankar
Bulletin of Electrical Engineering and Informatics Vol 12, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i6.6110

Abstract

The growth of the internet of things (IoT) increases the need to develop the trust computational model for heterogeneous networks with various IoT devices. Trust models are considered as an effective tool to mitigate insider attacks induced by IoT devices. However, trust models are exposed to on-off attacks, in which devices randomly exhibit good and bad behaviors to avoid being categorized as low-trust devices. The objective of this work is to recognize the malicious devices executing on-off attacks in IoT applications. This paper introduces an on-off attack detection strategy for the trust computational model based on the non-parametric index named intra-daily variability (IV). IV indicates trust fragmentation which depends on the frequency and the transitions between periods of low and high trust values of a device. The higher value of IV indicates the occurrence of fragmented trust values and the lower value of IV indicates the occurrence of non-fragmented trust values. Experimental results show that the proposed model outperforms the baseline methods by increasing the on-off attack detection rate.

Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue