Bulletin of Electrical Engineering and Informatics
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Articles
2,901 Documents
Improving K-NN Internet Traffic Classification Using Clustering and Principle Component Analysis
Adi Suryaputra Paramita
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (435.798 KB)
|
DOI: 10.11591/eei.v6i2.608
K-Nearest Neighbour (K-NN) is one of the popular classification algorithm, in this research K-NN use to classify internet traffic, the K-NN is appropriate for huge amounts of data and have more accurate classification, K-NN algorithm has a disadvantages in computation process because K-NN algorithm calculate the distance of all existing data in dataset. Clustering is one of the solution to conquer the K-NN weaknesses, clustering process should be done before the K-NN classification process, the clustering process does not need high computing time to conqest the data which have same characteristic, Fuzzy C-Mean is the clustering algorithm used in this research. The Fuzzy C-Mean algorithm no need to determine the first number of clusters to be formed, clusters that form on this algorithm will be formed naturally based datasets be entered. The Fuzzy C-Mean has weakness in clustering results obtained are frequently not same even though the input of dataset was same because the initial dataset that of the Fuzzy C-Mean is less optimal, to optimize the initial datasets needs feature selection algorithm. Feature selection is a method to produce an optimum initial dataset Fuzzy C-Means. Feature selection algorithm in this research is Principal Component Analysis (PCA). PCA can reduce non significant attribute or feature to create optimal dataset and can improve performance for clustering and classification algorithm. The resultsof this research is the combination method of classification, clustering and feature selection of internet traffic dataset was successfully modeled internet traffic classification method that higher accuracy and faster performance.
Entrepreneurship Through Start-ups in Hill Areas Using Photovoltaic Systems
Chandani Sharma;
Anamika Jain
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1600.472 KB)
|
DOI: 10.11591/eei.v6i2.613
There is large potential for generating solar power in Uttarakhand (India) endowed with natural resources. The extensive use of solar energy through solar PV panels in Distributed and Renewable Electricity Generation is significant to utilize multi climatic zones of hilly areas. In this regard, UREDA (Uttarakhand Renewable Energy Development Agency) targets to achieve a huge boost of solar PV battery backup with approved subsidy budget of INR 6 billion to 50 billion by 2019/20 under JNNSM (Jawaharlal Nehru National Solar Mission). This investment will increase productivity, enhance employment opportunities and improve quality of education. However, maximization of power output from panels used for same is achieved through use of MPPT (Maximum Power Point Trackers). The commercially installed solar power systems can be made to accomplish higher efficiency by implementing MPPT systems in start ups. In this paper, the effort is made to use MPPT system designed by intelligent controller for implementation in PV based utility systems. The regulated voltage output from MPPT system is obtained irrespective of fluctuations in environment. These variations are tested for changing temperature and irradiance due to shading or partial unavailability of sun. The results of same have been optimized through MATLAB/SIMULINK. The model designed is intended to be a beneficial source for PV engineers and researchers to provide high efficiency with the use of MPPT.
Optimized OFDM Model Using CMA Channel Equalization for BER Evaluation
Pratima Manhas;
M.K Soni
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (651.96 KB)
|
DOI: 10.11591/eei.v6i2.614
Orthogonal Frequency Division Multiplexing (OFDM) is a type of Multicarrier Modulation (MCM) technique in which entire bandwidth is divided into large number of small sub-carriers and each subcarrier is transmitted parallel to achieve higher data rates. It has various applications like Digital Audio Broadcasting (DAB), Digital Video Broadcasting (DVB) and wireless LAN.OFDM technique is widely used in wireless communication system because of its very high data rate. The performance of FFT based OFDM system using Linear and cyclic channel coding and Constant Modulus Algorithm (CMA) equalizer is simulated using simulink model. The BER saving using the optimized proposed model with both linear and cyclic channel coding along with CMA equalizer is evaluated. The proposed work using cyclic channel coding with QPSK/QAM modulation and CMA as channel equalization under AWGN channel results in 52.6% and 96.3% BER reduction as compared to conventional OFDM model without channel coding, channel equalization and channel fading. So, CMA equalizer is used to enhance the performance of OFDM system.
Effectiveness of MPEG-7 Color Features in Clothing Retrieval
Arsy Febrina Dewi;
Fitri Arnia;
Rusdha Muharar
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (797.276 KB)
|
DOI: 10.11591/eei.v6i2.619
Clothing is a human used to cover the body. Clothing consist of dress, pants, skirts, and others. Clothing usually consists of various colors or a combination of several colors. Colors become one of the important reference used by humans in determining or looking for clothing according to their wishes. Color is one of the features that fit the human vision. Content Based Image Retrieval (CBIR) is a technique in Image Retrieval that give index to an image based on the characteristics contained in image such as color, shape, and texture. CBIR can make it easier to find something because it helps the grouping process on image based on its characteristic. In this case CBIR is used for the searching process of Muslim fashion based on the color features. The color used in this research is the color descriptor MPEG-7 which is Scalable Color Descriptor (SCD) and Dominant Color Descriptor (DCD). The SCD color feature displays the overall color proportion of the image, while the DCD displays the most dominant color in the image. For each image of Muslim women's clothing, the extraction process utilize SCD and DCD. This study used 150 images of Muslim women's clothing as a dataset consistingclass of red, blue, yellow, green and brown. Each class consists of 30 images. The similarity between the image features is measured using the eucludian distance. This study used human perception in viewing the color of clothing.The effectiveness is calculated for the color features of SCD and DCD adjusted to the human subjective similarity. Based on the simulation of effectiveness DCD result system gives higher value than SCD.
Proactive Scheduling in Cloud Computing
Ripandeep Kaur;
Gurjot Kaur
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (492.247 KB)
|
DOI: 10.11591/eei.v6i2.649
Autonomic fault aware scheduling is a feature quite important for cloud computing and it is related to adoption of workload variation. In this context, this paper proposes an fault aware pattern matching autonomic scheduling for cloud computing based on autonomic computing concepts. In order to validate the proposed solution, we performed two experiments one with traditional approach and other other with pattern recognition fault aware approach. The results show the effectiveness of the scheme.
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
Kumar, V. Ashok;
Dharmaraj, C.;
Rao, Ch. Srinivasa
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v6i2.650
The present paper proposes a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. The present approach utilizes Alphabet Pattern (AP) approach generating shuffled image in the first stage and Pell’s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applies on each 5×5 sib images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image. Apply the Discrete Cosign Transform in the first stage later applies N levels Discrete Wavelet Transform (DWT) for reducing up to the size of the watermark image. Insert the water mark image in LHn Sub band of the wavelet image using LSB concept. Simulation results show that proposed technique produces better PSNR and similarity measure. The experimental results indicate that present approach is more reliable and secure efficient.The robustness of the proposed scheme is evaluated against various image-processing attacks.
Watermarking and Cryptography Based Image Authentication on Reconfigurable Platform
Altaf O. Mulani;
P. B. Mane
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (571.515 KB)
|
DOI: 10.11591/eei.v6i2.651
Now-a-days, multimedia based applications have been developed rapidly. Digital information is easy to process but it allows illegal users to access the data. For protecting the data from this illegal use, Digital Rights Management (DRM) can be used. DRM allows secure exchange of digital data over internet or other electronic media. In this paper, FPGA based implementation of DWT alongwith Advanced Encryption Standard (AES) based watermarking is discussed. With this approach, improved security can be achieved. The complete system is designed using HDL and simulated using Questasim and MATLAB Simulink model. The synthesis result shows that this implementation occupies only 2117 slices and maximum frequency reported for this design is 228.064 MHz.
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for an Evolving System
C J Satish;
Anand M
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (692.316 KB)
|
DOI: 10.11591/eei.v6i2.652
Traceability Management plays a key role in tracing the life of a requirement through all the specifications produced during the development phase of a software project. A lack of traceability information not only hinders the understanding of the system but also will prove to be a bottleneck in the future maintenance of the system. Projects that maintain traceability information during the development stages somehow fail to upgrade their artefacts or maintain traceability among the different versions of the artefacts that are produced during the maintenance phase. As a result the software artefacts lose the trustworthiness and engineers mostly work from the source code for impact analysis. The goal of our research is on understanding the impact of visualizing traceability links on change management tasks for an evolving system. As part of our research we have implemented a Traceability Visualization Tool-VTrace that manages software artefacts and also enables the visualization of traceability links. The results of our controlled experiment show that subjects who used the tool were more accurate and faster on change management tasks than subjects that didn’t use the tool.
Application of fuzzy logic in order to plan and create software for converting sound to text
Hiwa Hasanzadeh;
Jafar Majidpour
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (786.366 KB)
|
DOI: 10.11591/eei.v9i3.1723
The challenge of software in the field of converting sound to text is that some words have different meanings. In these situations, the functions of each one is distinguished by the use of fuzzy logic and division of the working part of the work. In this regard, the words must first be classified according to the specialized discipline. In the second place, the principles of writing should be maintained. In this regard, the points and commands and the alignment of the sentence are all items that should be considered in the software. The next item is the volume and speed of word processing and the lack of restrictions in the number of languages used. But the time problem is very important. In this regard, the use of existing codes and the optimization and remedy of the problems is a suitable method.In this research, some issues including security and maintenance of software proprietary rights, and the speed of converting sound to text and reducing noise and optimal performance of software to convert audio to text based on software method and the principles of fuzzy logic and neural network were investigated. Results showed improvement algorithm Analytical and results outcomes.
Using bacterial interaction and stereoscopic images for the location of obstacles on autonomous robots
Fredy Martinez;
Edwar Jacinto;
Fernando Martínez
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (716.391 KB)
|
DOI: 10.11591/eei.v9i3.2012
Service robots are characterized by autonomously performing indoor tasks in unstructured environments, this condition of the environment prevents the prior programming of the map, which requires reactive behavior. These robots require real-time and cost-effective identification of obstacles in the environment, which includes not only distance information, but also depth information. This paper shows a strategy to estimate the position of obstacles in unknown environments. This strategy is characterized by low computational cost and real-time operation. The environments are selected because they are those usual to human beings, and this also influences our design, since we look for functional and morphological equivalence with human beings. This equivalence corresponds to the installation of two cameras in our robotic platform to form a stereoscopic system equivalent to the human. The images captured simultaneously are analyzed by a bacterial interaction scheme to define points on the obstacles. Our strategy showed a high performance in controlled environments. The scheme was able to establish distances to different points of the obstacle with 95% accuracy for distances between 0.8 and 2 m.