cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Hybridized grasshopper optimization and cuckoo search algorithm for the classification of malware Shivaramu Banumathi, Chandini; Basavegowda Rajendra, Ajjipura
Bulletin of Electrical Engineering and Informatics Vol 13, No 5: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i5.7548

Abstract

The classification and analysis of malicious software (malware) has reached a huge development in the systems associated with the internet. The malware exploits the system information and takes off the important information of the user without any intimation. Moreover, the malware furtively directs that information to the servers which are organized by the attackers. In recent years, many researchers and scientists discovered anti-malware products to identify known malware. But these methods are not robust to detect obfuscated and packed malware. To overcome these problems, the hybridized grasshopper optimization and cuckoo search (GOA-CSA) algorithm is proposed. The effective features are selected by the GOA-CSA algorithm which eases the process of classifying the malware. This research also utilized long short-term memory (LSTM)-softsign classifier to classify the malware. The malware samples are collected from the VXHeavens dataset which consists of malware samples from various software. The proposed model performance is estimated by using the performance metrics like accuracy, sensitivity, recall, and F1-score. The model attained better accuracy of 98.95% when the model is compared with other existing models.
Holistic personas to increase the novice developer productivity Kusuma, Wahyu Andhyka; Jantan, Azrul Hazri; Admodisastro, Novia Indriaty; Norowi, Noris
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.6936

Abstract

A deeper understanding and integration with system users' thoughts and emotional experiences are required for user-engaged development. User experience (UX) journey integrates user requirements and problem-solving approaches. The integration of data-driven techniques and user-centric approaches in software development is investigated in this study. It focuses on using the Markov chain model to predict developer productivity based on data gathered while creating personas across three projects. Organizations can gain valuable insights into user needs and requirements by conducting purposeful activities such as strength, weaknesses, opportunities, and threats (SWOT) analysis, competitor analysis, hypothesis formulation, identification of behavioral variables, mapping interviews, and defining characteristics and objectives. The model has predictive capabilities that allow for more informed decision-making, more efficient resource allocation, and better project planning. The goal of the activity and the model ensure the development of software products that effectively meet the needs of users, resulting in a higher success rate for software development initiatives. This study emphasizes the importance of integrating quantitative and qualitative analysis to drive successful software development projects and increase productivity while meeting user needs. According to the findings of the research conducted from the three projects completed, the proposed methods have similarities, and predictions using the Markov chain can determine the success of novice developers.
Real-time monitoring tool for heart rate and oxygen saturation in young adults Fatimah Abdul Razak, Siti; Jia Wee, Yap; Yogarayan, Sumendra; Noor Masidayu Sayed Ismail, Sharifah; Fikri Azli Abdullah, Mohd
Bulletin of Electrical Engineering and Informatics Vol 13, No 2: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i2.6371

Abstract

Health monitoring is crucial to maintain optimal well-being, especially for young adults. Wearable sensors have become popular for collecting healthcare data, but there are concerns regarding their reliability and safety, particularly with wireless sensors that use radio-frequency (RF) based devices. Researchers have proposed real-time monitoring systems for measuring heart rate beats per minute (BPM) and blood oxygen saturation (SpO2) saturation levels, but more studies are needed to determine the accuracy and user acceptance of these tools among young adults. To address these concerns, this study proposes a real-time monitoring tool that incorporates MAX 30100 sensors to collect heart rate BPM and SpO2 data. The collected data is then connected to a visualization platform, i.e., InfluxDB and Grafana, to provide valuable insights of the body’s physiological state. By testing the feasibility and usability of the tool, we found motivating differences in resting heart rates and changes in heart rate after activity between male and female participants. By developing this real-time monitoring tool and investigating gender-specific differences in heart rate and activity-induced changes, our study contributes to the advancement of health monitoring technologies for young adults, ultimately promoting personalized healthcare and well-being.
Harnessing DBSCAN and auto-encoder for hyper intrusion detection in cloud computing Kaliyaperumal, Prabu; Periyasamy, Sudhakar; Periyasamy, Muthusamy; Alagarsamy, Abinaya
Bulletin of Electrical Engineering and Informatics Vol 13, No 5: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i5.8135

Abstract

The widespread availability of internet services has led to a surge in network attacks, raising serious concerns about cybersecurity. Intrusion detection systems (IDS) are pivotal in safeguarding networks by identifying malicious activities, including denial of service (DoS), distributed denial of service (DDoS), botnet, brute force, probe, remote-to-local, and user-to-root attacks. To counter these threats effectively, this research focuses on utilizing unsupervised learning to train detection models. The proposed method involves employing auto-encoders (AE) for attack detection and density-based spatial clustering of applications with noise (DBSCAN) for attack clustering. By using preprocessed and unlabeled normal network traffic data, the approach enables the identification of unknown attacks while minimizing the impact of imbalanced training data on model performance. The auto-encoder method utilizes the reconstruction error as an anomaly detection metric, while DBSCAN employs a density-based approach to identify clusters, manage noise, accommodate diverse shapes, automatically determine cluster count, ensure scalability, and minimize false positives. Tested on standard datasets such as KDDCup99, UNSW-NB15, CICIDS2017, and CSE-CIC-IDS2018, this proposed model achieves accuracies exceeding 98.36%, 98.22%, 98.45%, and 98.51%, respectively. These results demonstrate the effectiveness of unsupervised learning in detecting and clustering novel intrusions while managing imbalanced data.
Understanding explainable artificial intelligence techniques: a comparative analysis for practical application Bhatnagar, Shweta; Agrawal, Rashmi
Bulletin of Electrical Engineering and Informatics Vol 13, No 6: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i6.8378

Abstract

Explainable artificial intelligence (XAI) uses artificial intelligence (AI) tools and techniques to build interpretability in black-box algorithms. XAI methods are classified based on their purpose (pre-model, in-model, and post-model), scope (local or global), and usability (model-agnostic and model-specific). XAI methods and techniques were summarized in this paper with real-life examples of XAI applications. Local interpretable model-agnostic explanations (LIME) and shapley additive explanations (SHAP) methods were applied to the moral dataset to compare the performance outcomes of these two methods. Through this study, it was found that XAI algorithms can be custom-built for enhanced model-specific explanations. There are several limitations to using only one method of XAI and a combination of techniques gives complete insight for all stakeholders.
Fine-tuning a pre-trained ResNet50 model to detect distributed denial of service attack Sanmorino, Ahmad; Kesuma, Hendra Di
Bulletin of Electrical Engineering and Informatics Vol 13, No 2: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i2.7014

Abstract

Distributed denial-of-service (DDoS) attacks pose a significant risk to the dependability and consistency of network services. The utilization of deep learning (DL) models has displayed encouraging outcomes in the identification of DDoS attacks. Nevertheless, crafting a precise DL model necessitates an extensive volume of labeled data and substantial computational capabilities. Within this piece, we introduce a technique to enhance a pre-trained DL model for the identification of DDoS attacks. Our strategy’s efficacy is showcased on an openly accessible dataset, revealing that the fine-tuned model we propose surpasses both the initial pre-trained model and other cutting-edge approaches in performance. The suggested fine-tuned model attained 95.1% accuracy, surpassing the initial pre-trained model as well as other leading-edge techniques. Please note that the specific evaluation metrics and their values may vary depending on the implementation, hyperparameter settings, number of datasets, or dataset characteristics. The proposed approach has several advantages, including reducing the amount of labeled data required and accelerating the training process. Initiating with a pre-existing ResNet50 model can also enhance the eventual model’s accuracy, given that the pre-trained model has already acquired the ability to extract significant features from unprocessed data.
Distribution network reconfiguration utilizing the particle swarm optimization algorithm and exhaustive search methods Siregar, Yulianta; Jaya Tambun, Tomi Saputra; Panjaitan, Sihar Parlinggoman; Tanjung, Kasmir; Yana, Syiska
Bulletin of Electrical Engineering and Informatics Vol 13, No 2: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i2.6206

Abstract

The load level for each period in the distribution network can be considered non-identical due to the increasing demand for loads and the bigger distribution network. The main problem in the transmission and distribution network system is power losses and voltage profiles, affecting the quality of service and operating costs. This study compares the reconfiguration of the network using exhaustive search techniques and particle swarm optimization (PSO) algorithms on the IEEE 33 bus distribution network system. The study’s results compare the study of power flow before and after network reconfiguration, which is a decrease in the value of power losses from 202.7 kW to 139.6 kW. Then voltage profile improved from 91.309% to 93.782%. The simulation results also found that this reconfiguration can improve the system voltage profile, which initially contained 21 buses outside the standard limits of IEEE Std 1159-1995 to 7 buses.
Gamma and ultraviolet radiation radiation analysis: an internet of things-based dosimetric study Baena-Navarro, Rubén; Alcala-Varilla, Luis; Torres-Hoyos, Francisco; Carriazo-Regino, Yulieth; Parodi-Camaño, Tobías
Bulletin of Electrical Engineering and Informatics Vol 13, No 5: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i5.7344

Abstract

This study presents the implementation of an internet of things (IoT)-based device for the accurate and continuous measurement of gamma and ultraviolet (UV) radiation in a rural area of Sincelejo, Colombia. The device, calibrated with an error margin below 5%, allowed for the reliable collection of data during the year 2022. An average effective dose rate of gamma radiation of (0.998±0.037) mSv/year was recorded, a value that approaches the recommended limit. Additionally, the inverse square law of radiation was confirmed, observing a decrease in radiation with an increase in altitude. Concurrently, a constant risk of high to extremely high UV radiation exposure was detected throughout the year. These findings emphasize the need for constant monitoring and the implementation of UV protection measures in the region. The integration of IoT in environmental dosimetry has proven to be an invaluable tool for detailed tracking of radiation levels, significantly contributing to the understanding of radiation in rural areas. The exploration of more advanced sensors and data analysis tools in future research is recommended to further improve the accuracy and utility of these devices.
A systematic literature review for smart hydroponic system Muhasin, Haifaa Jassim; Gheni, Ali Yahya; Ismarau Tajuddin, Nur Ilyana; Izni, Nor Aziyatul; Yah Jusoh, Yusmadi; Azhar Aziz, Khairi
Bulletin of Electrical Engineering and Informatics Vol 13, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i1.4738

Abstract

Hydroponics is the cultivation of plants by utilizing water without using soil which emphasizes the fulfillment of the nutritional needs of plants. This research has introduced smart hydroponic system that enables regular monitoring of every aspect to maintain the pH values, water, temperature, and soil. Nevertheless, there is a lack of knowledge that can systematically represent the current research. The proposed study suggests a systematic literature review of smart hydroponics system to overcome this limitation. This systematic literature review will assist practitioners draw on existing literature and propose new solutions based on available knowledge in the smart hydroponic system. The outcomes of this paper can assist future researchers by providing a guideline for user in highlighting approaches for the successful implementation of smart hydroponic system.
Trust aware angle based secure routing approach for wireless sensor network Patil, Hemavati; Tegampure, Vishwanath
Bulletin of Electrical Engineering and Informatics Vol 13, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i1.5811

Abstract

Security in wireless sensor network (WSN) is an important approach in the present context as data breaching is becoming more. The data to be routed from source to destination needs more security as WSN has no specific security approach by default. This paper proposes trust based security in WSN using approach. The secure line is drawn from head node to its cluster end point called as angle to provide the security to the nodes which are transferring the data to the head node. Secure line becomes the trust worth line where mobile agent migrates to all the corresponding nodes which are along or near to the secure lines, collects the data and encrypt them. Finally, the data is sent to sink node from head node using a secure path. The agent paradigm is responsible for creating the angle from head node to cluster boundary. Multiple angles can be created if numbers of nodes are more and deployed at different locations. The result shows that the security provided is much better to combat the intruder involvement to breach data along with better network lifetime and minimum delay than compare to conventional techniques.

Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue