cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Dissipative soliton generation with sidebands using Bismuth Telluride (Bi2Te3) in erbium doped fiber laser Haris, Hazlihan; Awalin, Lilik Jamilatul; Muhammad, Ahmad Razif; Mustaffa, Siti Nasuha; Markom, Arni Munira; Hasnan, Megat Muhammad Ikhsan Megat; Harun, Sulaiman Wadi; Tan, Sin Jin; Saad, Ismail
Bulletin of Electrical Engineering and Informatics Vol 13, No 6: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i6.8175

Abstract

In this work, the demonstration of dissipative soliton (DS) was observed in erbium doped fiber laser (EDFL) using of Bismuth Telluride (Bi2Te3) nanosheets saturable absorber (SA). The prepared SA was deposited on a fiber ferrule using optical deposition method. Interestingly, the DS generatered was accompanied with sidebands and the number of sidebands grew with laser diode pump power. Sidebands were observed as a result of modulation instability (MI) process, which arises from the interaction between DS and nonlinear gain in the fiber laser cavity. Signal to noise ratio (SNR) of 58 dB was attained, confirming the stability of the generated pulse. This work proved the capability of Bi2Te3 as SA for generating DS with sidebands in an EDFL.
Efficiency and performance ratio of photovoltaics on a 50 kWp Universitas Pamulang Viktor rooftop solar power plant Rozak, Ojak Abdul; Triyanto, Aripin; Kusnadi, Heri
Bulletin of Electrical Engineering and Informatics Vol 13, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i1.5557

Abstract

To overcome the fossil energy crisis due to the increasing need for electrical energy, new renewable energy sources are needed. Due to technological developments in the fields of transportation, industry, household, and commercial use. Indonesia’s geography has the potential to apply new renewable energy, more specifically photovoltaic (PV). However, it is greatly influenced by environmental factors such as solar radiation, voltage, which have an impact on the output power efficiency and performance. So, it is necessary to test both measurements and calculations to see the optimization of output power and PV efficiency. From previous research, it has not been carried out, especially in the experimental method Universitas Pamulang: measurement and empirical and for a sufficiently high capacity with the aim of optimal output power. Methods of measuring sunlight intensity, voltage and current, the calculation of converting sunlight intensity to solar constellation, power, efficiency, and performance ratio (PR). The average value being 721 W/m2 an efficiency value of 19.9% and a value PR is obtained of 0.967 or 96.7% is still realistic. So that the system is declared optimal.
A hybrid steganography and watermark algorithm for copyright protection by using multiple embedding approaches Zainal, Nasharuddin; Hoshi, Alaa Rishek; Ismail, Mahamod; T. Rahem, Abd Al-Razak; Muhsin Wadi, Salim
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.6337

Abstract

In this modern era, it has become much simpler to replicate, sell, and copy the copyright owners' works without their permission as a result of the expansion of digitalization, and it is difficult to identify such violations, posing a threat to the creators' and copyright owners' rights. For many years, the internet has been regarded as one of the most serious threats to copyright, and the content available has varying levels of copyright protection. On the internet, there are numerous copyrighted works, including e-books, movies, news, and so on. Therefore, by using watermarking and steganography techniques, these issues can be solved, which are based on the author's signature information or logo. This paper concluded that the techniques of discrete cosine transform (DCT), discrete wavelet transform (DWT), one-time pad (OTP), and playfair are highly effective when used together to watermark an image or embed a secret message, our lab results validate that our algorithm scheme is robust against several sets of attacks, where the algorithm was assessed by computation of many evaluation metrics such as mean square error (MSE), signal-to-noise ratio (SNR), and peak signal-to-noise ratio (PSNR).
Descriptive analysis of wide area network flow control internet traffic on Metro-E 100 Mbps campus network Abdullah, Nor Paezah; Kassim, Murizah; Mohd Deni, Sayang; Mohd Yussoff, Yusnani
Bulletin of Electrical Engineering and Informatics Vol 13, No 4: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i4.7044

Abstract

QoS in computer networking is the capability to provide better service to network traffic over various technologies such as ethernet and IP networks. This paper presents a descriptive analysis of WAN flow control and internet traffic on a Metro-E campus network. Issues on network congestion and delay in network QoS where internet traffic is gradually increasing, resulting in bursts of network capacity that affect network QoS. The method implies 12 months data collection and analysis on protocol, bytes and packets inbound and correlation between parameters on the Metro-E 100 Mbps campus network. The result presents heavy-tailed distributions on an inbound packet kurtosis value of 347 and an outbound packet kurtosis value of 780. Bytes outbound and inbound are skewed at 122 and right at 17 respectively. The average amount of data inbound and outbound is 458.5 MB and 34.8 MB. Protocol 6 TCP presents the highest amount of -traffic and a weak positive correlation at 0.104 exists between the inbound and outbound packets and bytes on the network. The correlation coefficient's 95% confidence interval ranges between 0.096 and 0.111. This research is significant in the future deployment of traffic scheduling, policing, and shaping algorithms for QoS bandwidth management on the WAN Metro-E campus network.
An optimation of advanced encryption standard key expansion using genetic algorithm and least significant bit integration Marjuni, Aris; Rijati, Nova; Susanto, Ajib; Sinaga, Daurat; Purwanto, Purwanto; Hasibuan, Zainal Arifin; Yaacob, Noorayisahbe Mohd.
Bulletin of Electrical Engineering and Informatics Vol 13, No 6: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i6.8367

Abstract

Ensuring data security in today’s digital landscape is of paramount importance, driving the exploration of advanced techniques for safeguarding confidential information. This study introduces a robust approach that combines advanced encryption standard (AES) encryption with key expansion, genetic algorithms (GA), and least significant bit (LSB) embedding to achieve secure data concealment within digital images. Motivated by the pressing need for enhanced data protection, our work addresses the critical challenge of securing sensitive information from unauthorized access. Specifically, we present a systematic methodology that integrates AES encryption for robust data security, GA for optimization, and LSB embedding for subtle information concealment. Through comprehensive experimentation, involving images such as ‘Lena.jpg,’ ‘Peppers.jpg,’ and ‘Baboon.jpg,’ we demonstrate the efficacy of our approach. The imperceptible modification rates mean squared error (MSE) of 0.199, 0.101, and 0.105, coupled with high peak signal-to-noise ratios (PSNR) of 10.04 dB, 9.95 dB, and 9.79 dB respectively, underscore the fidelity and subtlety of the embedded information. This study contributes to the ongoing discourse on data security by offering a comprehensive and innovative approach that addresses the evolving challenges in safeguarding digital information.
Exploratory analysis on the natural language processing models for task specific purposes Shidaganti, Ganeshayya; Shetty, Rithvik; Edara, Tharun; Srinivas, Prashanth; Tammineni, Sai Chandu
Bulletin of Electrical Engineering and Informatics Vol 13, No 2: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i2.6360

Abstract

Natural language processing (NLP) is a technology that has become widespread in the area of human language understanding and analysis. A range of text processing tasks such as summarisation, semantic analysis, classification, question-answering, and natural language inference are commonly performed using it. The dilemma of picking a model to help us in our task is still there. It’s becoming an impediment. This is where we are trying to determine which modern NLP models are better suited for the tasks set out above in order to compare them with datasets like SQuAD and GLUE. For comparison, BERT, RoBERTa, distilBERT, BART, ALBERT, and text-to-text transfer transformer (T5) models have been used in this study. The aim is to understand the underlying architecture, its effects on the use case and also to understand where it falls short. Thus, we were able to observe that RoBERTa was more effective against the models ALBERT, distilBERT, and BERT in terms of tasks related to semantic analysis, natural language inference, and question-answering. The reason is due to the dynamic masking present in RoBERTa. For summarisation, even though BART and T5 models have very similar architecture the BART model has performed slightly better than the T5 model.
Enhanced convolutional neural network enabled optimized diagnostic model for COVID-19 detection Arul Raj, Aaron Meiyyappan; Rajendran, Sugumar; Grace Vimal, Georgewilliam Sundaram Annie
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.6393

Abstract

Computed tomography (CT) films are used to construct cross-sectional pictures of a particular region of the body by using many x-ray readings that were obtained at various angles. There is a general agreement in the medical community at this time that chest CT is the most accurate approach for identifying COVID-19 disease. It was demonstrated that chest CT had a higher sensitivity than reverse transcription polymerase chain reaction (RT-PCR) for the detection of COVID-19 illness. This article presents gray-level co-occurrence matrix (GLCM) texture feature extraction and convolutional neural network (CNN)-enabled optimized diagnostic model for COVID-19 detection. In this diagnostic model, CT scan images of patients are given as input. Firstly, GLCM algorithm is used to extract texture features from the CT scan images. This feature extraction helps in achieving higher classification accuracy. Classification is performed using CNN. It achieves higher accuracy than the k-nearest neighbors (KNN) algorithm and multi-layer preceptor (MLP). The accuracy of GLCM based CNN is 99%, F1 score is 99% and the recall rate is also 98%. CNN has achieved better results than MLP and KNN algorithms for COVID-19 detection.
Evaluation of steady-state ground resistance by field measurement and CDEGS computation Muhammad, Usman; Zaid, Hadee; Ahmad, Nurul Nadia; Mohamad Nor, Normiza; Aman, Fazlul
Bulletin of Electrical Engineering and Informatics Vol 13, No 5: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i5.7603

Abstract

In addition to the soil resistivity and size of the grounding system, grounding system configuration can influence the steady-state resistance (RDC) of a grounding system. The RDC of four to six configurations in three distinct soil conditions (sites 1 to 3) is measured using the fall-of-potential method and computed using the current distribution, electromagnetic fields, grounding, and soil structure analysis (CDEGS) simulation. The RDC value generally decreases as size increases, i.e., when more rods or tapes are added, except for a little variation subject to the electrode arrangement and soil resistivity. The 3 and 4-parallel configurations perform better on low resistivity soil (site 1), while the grid configurations (2×2- and 3-rod grids) are better on high resistivity soil (site 2). The difference between the measured and computed values at high soil resistivity sites (sites 2 and 3) is large, ranging from 18% to 66% for site 2 and from 35% to 53% for site 3. The difference is lower and more consistent at site 1, where five out of six configurations achieve less than 10%. At all sites, the difference between computed and measured RDCs generally decreases as the area of the electrode increases, except for some cases at site 2.
System design of a microstrip antenna by dimension and substrates optimization Africa, Aaron Don M.; Pasia, Samuel Alexander; Sy, Jereme Adriane
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.5871

Abstract

The microstrip antennas matured and improved over the last 25 years. Throughout these years, the limitations, and specifications of the said antennas have been overcome and significantly improved. Known to be lowprofile, suitable for mobile, and lightweight, these microstrip antennas are the focus of this research. In this paper, the researchers designed a microstrip antenna with varying lengths and substrates. They tested the changes and the effects in microstrip antennas of different lengths, along with altering substrates. To verify the differences, the researchers compared the performance parameters maximum gain (dBi), minimum gain (dBi), and S11 graph on each tested length and changed substrate. The rough set theory was used to determine the optimal design via MATLAB. From there, the researchers analyzed the results gathered and drew their respective conclusions. Additionally, they saw and compared each data result to know what antenna has the best performance parameters. From the results, a change in the dimension will result in a decrease in the said performance parameters. Furthermore, the change in substrate thickness also diminishes these changes.
Streamlined multi-scenario revocation method leveraging blockchain and auxiliary trees Satish Babu, Battula Venkata; Babu, Kare Suresh; Kare, Durga Prasad
Bulletin of Electrical Engineering and Informatics Vol 13, No 4: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i4.7908

Abstract

Access revocation is a fundamental aspect of modern information systems, ensuring that data remains secure and authorized personnel have appropriate access rights. However, existing access revocation methods address only one type of scenario, offering either partial or complete revocation functionalities but not both, leading to limitations in flexibility and effectiveness. This paper introduces a novel approach called streamlined multi-scenario revocation method (SMSRM) that combines block chain technology and auxiliary trees to streamline the process of multi-scenario access revocation. The SMSRM method defines two separate revoke request formats for partial and complete revocation. Auxiliary trees are used to keep track of non-revoked users, which is very important during the revocation process. In addition, the proposed method utilizes a block chain to record each and every revocation-related operation to provide forward secrecy. Through a comparative analysis, we evaluate the performance of our approach against existing methods. The results highlight that our method performs better in terms of response time and various performance metrics.

Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue