Bulletin of Electrical Engineering and Informatics
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Articles
2,901 Documents
Naïve Bayes Decision Tree Hybrid Approach for Intrusion Detection System
Bekti Maryuni Susanto
Bulletin of Electrical Engineering and Informatics Vol 2, No 3: September 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (134.437 KB)
|
DOI: 10.11591/eei.v2i3.208
Internet is also increasing exponentially increasing intrusion or attacks by crackers exploit vulnerabilities in Internet protocols, operating systems and software applications. Intrusion or attacks against computer networks, especially the Internet has increased from year to year. Intrusion detection systems into the main stream in the information security. The main purpose of intrusion detection system is a computer system to help deal with the attack. This study presents a hybrid approach to decision tree algorithm and naïve Bayes to detect computer network intrusions. Performance is measured based on the level of accuracy, sensitivity, precision and spesificity. Dataset used in this study is a dataset KDD 99 intrusion detection system. Dataset is composed of two training data and testing data. The selection of attributes is done using the chi-square, selected the top ten attributes based on the calculation of chi-square. From the experimental results obtained by the accuracy of naïve Bayes decision tree algorithm was 99.82%.
Non-radiative wireless energy transfer with single layer dual-band printed spiral resonator
Lai Ly Pon;
Sharul Kamal Abdul Rahim;
Chee Yen Leow;
Tien Han Chua
Bulletin of Electrical Engineering and Informatics Vol 8, No 3: September 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (795.613 KB)
|
DOI: 10.11591/eei.v8i3.1593
Accomplishing equilibrium in terms of transfer efficiency for dual-band wireless energy transfer (WET) system remains as one of key concerns particularly in the implementation of a single transmitter device which supports simultaneous energy and data transfer functionality. Three stages of design method are discussed in addressing the aforementioned concern. A single layer dual-band printed spiral resonator for non-radiative wireless energy transfer operating at 6.78 MHz and 13.56 MHz is presented. By employing multi-coil approach, measured power transfer efficiency for a symmetrical link separated at axial distance of 30 mm are 72.34% and 74.02% at the respective frequency bands. When operating distance is varied between 30 mm to 38 mm, consistency of simulated peak transfer efficiency above 50% is achievable.
Wideband and high gain dielectric resonator antenna for 5G applications
Irfan Ali;
Mohd Haizal Jamaluddin;
M. R. Kamarudin;
Abinash Gaya;
R. Selvaraju
Bulletin of Electrical Engineering and Informatics Vol 8, No 3: September 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (496.57 KB)
|
DOI: 10.11591/eei.v8i3.1592
In this paper, wideband high gain dielectric resonator antenna for 5G applications is presented. Higher order mode is exploited to enhance the antenna gain, while the array of symmetrical cylindrical shaped holes drilled in the DRA to improves the bandwidth by reducing the quality factor. The proposed DRA is designed using dielectric material with relative permittivity of 10 and loss tangent of 0. 002.The Rogers RT/Droid 5880 has been selected as substrate with relative permittivity of 2.2, loss tangent of 0.0009- and 0.254-mm thickness. The simulated results show that, the proposed geometry has achieved a wide impedance bandwidth of 17.3% (23.8-28.3GHz=4.5 GHz) for S11 less than -10 dB, and a maximum gain of about 9.3 dBi with radiation efficiency of 96% at design frequency of 26 GHz. The DRA is feed by microstrip transmission line with slot aperture. The reflection coefficient, the radiation pattern, and the antenna gain are studied by full-wave EM simulator CST Microwave Studio. The proposed antenna can be used for the 5G communication applications such as device to device communication (D2D).
The generation revenue and demand payment assessment for pool based market model in Malaysia electricity supply industry
Zuraidah Ngadiron;
N. H. Radzi;
M. Y. Hassan
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (631.908 KB)
|
DOI: 10.11591/eei.v8i4.1591
The objective of this paper is to address the economic benefits in term of generation revenue and demand payment for the pool based market model in Malaysia electricity supply industry (MESI). In pool market model, there are issues on the benefit of the generators such as too high system marginal price (SMP) during peak demand and no revenue during low demand. Therefore, conceptual study for two bus test system in MESI involving four generators around Peninsular Malaysia is conducted to perform the economic analysis in term of generation revenue and demand assessment considering existing single buyer model and pool based market model, i.e., pool model, spot market model and the proposed model, in order to identify which market model is superior. As a result, the proposed model managed to decrease the demand payment as it is proportional to generation revenue, even though the generation revenue is at intermediate value and succeed to increase the low and medium generator’s revenue.
Comparative study on the accelerated thermal aging behavior between palm and rapeseed natural ester oils
N. L. M. Ridzuan;
N. A. Bakar;
S. A. Ghani;
I. S. Chairul;
N. H. A. Aziz
Bulletin of Electrical Engineering and Informatics Vol 8, No 3: September 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (614.784 KB)
|
DOI: 10.11591/eei.v8i3.1590
The suitability of natural ester oils as an insulating medium in power transformers is discussed in this paper. Owing to environmental concerns, natural ester oils have great potential as mineral oil substitutes in power transformers. In this paper, the aging behaviors of palm and rapeseed natural ester oils were compared with that for mineral oil. The performance of these natural ester oils was assessed based on their properties (moisture content, acidity, and relative content of dissolved decay products) after accelerated thermal aging. The results showed that the palm oil has better performance compared to the rapeseed oil after accelerated thermal aging for 1500 h because of its lower acidity. This was further supported by the presence of sludge in the rapeseed oil after 1500 h of aging.
Geometric sensitivity of beacon placement using airborne mobile anchors
Izanoordina Ahmad
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (615.4 KB)
|
DOI: 10.11591/eei.v8i4.1589
Locating fixed sensing devices with a mobile anchor is attractive for covering larger deployment areas. However, the performance sensitivity to the geometric arrangement of anchor beacon positions remains unexplored. Therefore, localization using new RSSI-based localization algorithm, which uses a volumetric probability distribution function is proposed to find the most likely position of a node by information fusion from several mobile beacon radio packets to reduce error over deterministic approaches. This paper presents the guidelines of beacon selection that leads to design the most suitable trajectory, as a trade-off between the energy costs of travelling and transmitting the beacons versus the localization accuracy.
Comparative performance evaluation of routing algorithm and topology size for wireless network-on-chip
Asrani Lit;
M. S. Rusli;
M. N. Marsono
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1175.122 KB)
|
DOI: 10.11591/eei.v8i4.1588
Wireless Network-on-Chip or WiNoC is an alternative to traditional planar on-chip networks. On-chip wireless links are utilized to reduce latency between distant nodes due to its capability to communicate with far-away node within a single hop. This paper analyzes the impact of various routing schemes and the effect of WiNoC sizes on network traffic distributions compared to conventional mesh NoC. Radio hubs (4×4) are evenly placed on WiNoC to analyze global average delay, throughput, energy consumption and wireless utilization. For validation, three various network sizes (8×8, 16×16 and 32×32) of mesh NoC and WiNoC architectures are simulated on cycle-accurate Noxim simulator under numerous traffic load distributions. Simulation results show that WiNoC architecture with the 16×16 network size has better average speedup (∼1.2×) and improved network throughputs by 6.36% in non-uniform transpose traffic distribution. As the trade-off, WiNoC requires 63% higher energy consumption compared to the classical wired NoC mesh.
A systematic approach to evaluating the influence of demand side management resources on the interarea capacity benefit margin
Olatunji Obalowu Mohammed;
Mohd Wazir Mustafa;
Daw Saleh Sasi Mohammed;
Sani Salisu;
Nabila Ahmad Rufa’i
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (828.281 KB)
|
DOI: 10.11591/eei.v8i4.1587
Available transfer capability is an index to measure the security and economic viability of an interconnected system. However, to accurately determine this index, other associated parameters need to be accurately evaluated. One of these parameters is the capacity benefit margin (CBM). For efficient power generation reliability and sustainability, a certain amount of supply capacity is commonly reserved by utilities, which in most cases remain unused, to reduce the effect of generation outage. To minimize this unused reserve, utilities usually reserve a predetermined amount of tie-line capacity between interconnected areas to have access to external supply. This tie-line reserved for this purpose is termed as capacity benefit margin (CBM). In this paper a technique for computing CBM is used, the sensitivity of CBM support from other areas to the increase in load in one of the areas is investigated, and conclusively, demand side management is proposed to improve the quantification of CBM. The contribution of this work is the assessment of the CBMs support from other areas during a critical condition, using the flexibility of DSM technique. The modified 24-bus IEEE reliability test system is employed for the verification of the approach.
A comparative study of PSO, GSA and SCA in parameters optimization of surface grinding process
Teh Muy Shin;
Asrul Adam;
Amar Faiz Zainal Abidin
Bulletin of Electrical Engineering and Informatics Vol 8, No 3: September 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (746.308 KB)
|
DOI: 10.11591/eei.v8i3.1586
The selection of parameters in grinding process remains as a crucial role to guarantee that the machined product quality is at the minimum production cost and maximum production rate. Therefore, it is required to utilize more advance and effective optimization methods to obtain the optimum parameters and resulting an improvement on the grinding performance. In this paper, three optimization algorithms which are particle swarm optimization (PSO), gravitational search, and Sine Cosine algorithms are employed to optimize the grinding process parameters that may either reduce the cost, increase the productivity or obtain the finest surface finish and resulting a higher grinding process performance. The efficiency of the three algorithms are evaluated and comparedwith previous results obtained by other optimization methods on similar studies.The experimental results showed that PSO algorithm achieves better optimization performance in the aspect of convergence rate and accuracy of best solution.Whereas in the comparison of results of previous researchers, the obtained result of PSO proves that it is efficient in solving the complicated mathematical model of surface grinding process with different conditions.
Obfuscated computer virus detection using machine learning algorithm
Tan Hui Xin;
Ismahani Ismail;
Ban Mohammed Khammas
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1015.921 KB)
|
DOI: 10.11591/eei.v8i4.1584
Nowadays, computer virus attacks are getting very advanced. New obfuscated computer virus created by computer virus writers will generate a new shape of computer virus automatically for every single iteration and download. This constantly evolving computer virus has caused significant threat to information security of computer users, organizations and even government. However, signature based detection technique which is used by the conventional anti-computer virus software in the market fails to identify it as signatures are unavailable. This research proposed an alternative approach to the traditional signature based detection method and investigated the use of machine learning technique for obfuscated computer virus detection. In this work, text strings are used and have been extracted from virus program codes as the features to generate a suitable classifier model that can correctly classify obfuscated virus files. Text string feature is used as it is informative and potentially only use small amount of memory space. Results show that unknown files can be correctly classified with 99.5% accuracy using SMO classifier model. Thus, it is believed that current computer virus defense can be strengthening through machine learning approach.