cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Comparison of PID Controller with Model Predictive Controller for Milk Pasteurization Process Tesfaye Alamirew; V. Balaji; Nigus Gabbeye
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (650.155 KB) | DOI: 10.11591/eei.v6i1.575

Abstract

Proportional–Integral–Derivative (PID) controllers are used in many of the Industries for various process control applications. PID controller yields a long settling time and overshoot which is not good for the process control applications. PID is not suitable for many of the complex process control applications. This research paper is about developing  a better type of controller, known as MPC (Model Predictive Control). The aim of the paper is to design MPC and PID for a pasteurization process. In this manuscript comparison of PID controller with MPC is made and the responses are presented. MPC is an advanced control strategy that uses the internal dynamic model of the process and a history of past control moves and a combination of many different technologies to predict the future plant output. The dynamics of the pasteurization process was estimated by using system identification from the experimental data. The quality of different model structures was checked using best fit with data validation, residual and stability analysis. Auto-regressive with exogenous input (ARX322) model was chosen as a model structure of the pasteurization process and fits about 80.37% with datavalidation. MPC and PID control strategies were designed using ARX322 model structure. The controller performance was compared based on settling time, percent of overshoot and stability analysis and the results are presented.
Circuits for Optical Based Line of Sight Voice Communication Devasis Haldar; Shagun Panwar; Vipul Kumar; Ayush Goswami; Sakshi Dhawan
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (321.791 KB) | DOI: 10.11591/eei.v6i1.592

Abstract

We present here line of sight communication between a person and his neighbour with the help of optical signal produced by a laser torch which act as a carrier. It is therefore a wireless communication and the transmission can go up to 500 meters. We used photodiode to receive the signal at the receiver. The transmitter circuit comprises condenser microphone transistor amplifier BC547 followed by an op-amp stage built around µA741. When we give a voice signal from the mike, it converts the voice signal into the electrical signal. This electrical signal is fed to IC741 (op-amp) for amplification. The gain of the op-amp can be controlled with the help of 1-mega-ohm potentiometer. The AF output from IC is coupled to the base of a class B amplifier which, in turn, modulates the signal. The transmitter uses 5V power supply. However, the 3-volt laser torch (after removal of its battery) can be directly connected to the circuit-with the body of the torch connected to the class B. The photodiode converts the optical signal into electrical signal and again this signal is amplified using IC741 and a combination of class B push pull amplifiers. The receiver circuit uses an NPN photodiode as the light sensor that is followed by a two-stage transistor preamplifier and IC741 based audio Power amplifier. The receiver does not need any complicated alignment. Just keep the photodiode oriented towards the remote transmitter’s laser point and adjust the volume control for a clear sound. The sensor must not directly face the sun.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing Algorithm Rakesh Kumar Saini; Ritika Ritika; Sandip Vijay
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (356.459 KB) | DOI: 10.11591/eei.v6i1.577

Abstract

Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
Chaos Image Encryption Methods: A Survey Study Sabah Fadhel; Mohd Shafry; Omar Farook
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (235.1 KB) | DOI: 10.11591/eei.v6i1.599

Abstract

With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
Adoption of technology on E-learning effectiveness Zarina Denan; Zarina Abdul Munir; Rahayu A. Razak; Kardina Kamaruddin; Veera Pandiyan Kaliani Sundram
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (447.635 KB) | DOI: 10.11591/eei.v9i3.1717

Abstract

The incorporation of E-learning in both private and public tertiary education can help expedite the learning process. The utilization of fast-paced technology with E-learning also allows for a more flexible and convenient learning process. E-learning platforms can be accessed anywhere as long as there is an internet connection, including at home, the workplace, restaurants or while travelling. This allows for the benefit of distance learning. As such, the current study aims to examine the factor effectiveness of E-learning based on three variables, namely technology, instructors’ characteristics and students’ characteristics and their impact on distance learning. The education system has greatly evolved from the use of apparatus such as chalk and blackboards to the modern use of projectors to conduct lessons. In the current age, E-learning will have an effect on both instructors and teaching technology, aside from the students themselves. As an example, students are expected to know how to utilize these systems in their lessons, instructors must receive training in E-learning systems management and in terms of technology, the E-learning systems must be updated and operated using the most recent upgrades. E-learning is also cost-efficient, less time consuming and reduces the burden on both students and educators.
Millennials and the use of social networking sites as a job searching tool Zarina Denan; Zarina Abdul Munir; Nurul Hazzira Fadzil; Kardina Kamaruddin; Mohd Redhuan Dzulkifli
Bulletin of Electrical Engineering and Informatics Vol 9, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (270.963 KB) | DOI: 10.11591/eei.v9i1.1718

Abstract

This research is conducted to examine the factors that influence the behavioural intention of millienials in using SNS when seeking for a job. The data was collected from respondents who are from the generation Y demographic and actively looking for jobs. The respondents must possess some experience in using SNS when job hunting. The data was then gathered and analyzed using partial least square (PLS) which encompasses the measurement and structural models of the study. The findings revealed that three of the constructs as applied in TAM are statistically significant to behavioural intention. The three factors that influenced the job seekers’ intention to use SNSs as a job search tool are; perceived usefulness, perceived ease of use and privacy concerns. All these factors are elements which contribute to and have a significant relationship with job seekers’ intention to use SNSs, as verified using PLS data analysis. The recruiters or employers who intend to adopt SNSs in the recruitment process are advised to design the recruitment plan regarding the utilization of SNSs to be more convenient and user-friendly. This study provides insight and knowledge regarding the impact of technology in online job application and hiring processes.
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics Abdul Fadlil; Imam Riadi; Sukma Aji
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (995.882 KB) | DOI: 10.11591/eei.v6i2.605

Abstract

Distributed Denial of Service (DDoS) is a type of attack using the volume, intensity, and more costs mitigation to increase in this era. Attackers used many zombie computers to exhaust the resources available to a network, application or service so that authorize users cannot gain access or the network service is down, and it is a great loss for Internet users in computer networks affected by DDoS attacks. In the Network Forensic, a crime that occurs in the system network services can be sued in the court and the attackers will be punished in accordance with law. This research has the goal to develop a new approach to detect DDoS attacks based on network traffic activity were statistically analyzed using Naive Bayes method. Data were taken from the training and testing of network traffic in a core router in Master of Information Technology Research Laboratory University of Ahmad Dahlan Yogyakarta. The new approach in detecting DDoS attacks is expected to be a relation with Intrusion Detection System (IDS) to predict the existence of DDoS attacks.
Comparison of Tropical Thunderstorm Estimation between Multiple Linear Regression, Dvorak, and ANFIS Wayan Suparta; Wahyu Sasongko Putro
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (882.822 KB) | DOI: 10.11591/eei.v6i2.648

Abstract

Thunderstorms are dangerous and it has increased due to highly precipitation and cloud cover density in the Mesoscale Convective System area. Climate change is one of the causes to increasing the thunderstorm activity. The present studies aimed to estimate the thunderstorm activity at the Tawau area of Sabah, Malaysia based on the Multiple Linear Regression (MLR), Dvorak technique, and Adaptive Neuro-Fuzzy Inference System (ANFIS). A combination of up to six inputs of meteorological data such as Pressure (P), Temperature (T), Relative Humidity (H), Cloud (C), Precipitable Water Vapor (PWV), and Precipitation (Pr) on a daily basis in 2012 were examined in the training process to find the best configuration system. By using Jacobi algorithm, H and PWV were identified to be correlated well with thunderstorms. Based on the two inputs that have been identified, the Sugeno method was applied to develop a Fuzzy Inference System. The model demonstrated that the thunderstorm activities during intermonsoon are detected higher than the other seasons. This model is comparable to the thunderstorm data that was collected manually with percent error below 50%.
The Role of Organizational and Individual Factors in Knowledge Management System Acceptance Setiawan Assegaff
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (445.554 KB) | DOI: 10.11591/eei.v6i2.606

Abstract

The aim of this study is to investigates the how individual and organizational factors influence people behavior in using knowledge management.  This research applied Technology Acceptance Model (TAM) as a basis theory; TAM was enriched with individual and organizational factors for this study. A survey approach was conducted for data collection. Three of institutions in Banking Sector at Indonesia were invited to join this study and 215 knowledge workers were participated for the survey. Data from survey were analyzed through Structural Equations Model (SEM) using PLS (Partial Least Square) V2. The conclusion specify that ‘‘individual elements’’ and ‘‘organizational elements’’ are the significantly affect people behavior in KMS acceptance factors that influence knowledge worker behavior in knowledge sharing. However this study not found relationship between individual and organization factors and “perceived ease of use” construct with people behavior in accept KMS.
Stack Contention-alleviated Precharge Keeper for Pseudo Domino Logic Deepika Bansal; Brahmadeo Prasad Singh; Ajay Kumar
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v6i2.597

Abstract

The dynamic circuits are supposed to offer superior speed and low power dissipation over static CMOS circuits. The domino logic circuits are used for high system performance but suffer from the precharge pulse degradation. This article provides different design topologies on the domino circuits to overcome the charge sharing and charge leakage with reference to the power dissipation and delay. The precharge keeper circuit has been proposed such that the keeper transistors also work as the precharge transistors to realize multiple output function. The performance improvement of the circuit’s analysis have been done for adders and logic gates using HSPICE tool. The proposed keeper techniques reveal lower power dissipation and lesser delay over the standard keeper circuit with less transistor count for different process variation.

Page 30 of 291 | Total Record : 2901


Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue