cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Whale Optimization Algorithm Based Technique for Distributed Generation Installation in Distribution System Mohd Nurulhady Morshidi; Ismail Musirin; Siti Rafidah Abdul Rahim; Mohd Rafi Adzman; Mohamad Hatta Hussain
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (856.127 KB) | DOI: 10.11591/eei.v7i3.1276

Abstract

This paper presents Whale Optimization Algorithm (WOA) Based Technique for Distributed Generation Installation in Transmission System. In this study, WOA optimization engine is developed for the installation of Distributed Generation (DG). Prior to the optimization process, a pre-developed voltage stability index termed Fast Voltage Stability Index (FVSI) was used as an indicator to identify the location for the DG to be installed in the system. Meanwhile, for sizing the DG WOA is employed to identify the optimal sizing. By installing DG in the transmission system, voltage stability and voltage profile can be improved, while power losses can be minimized. The proposed algorithm was tested on 30-bus radial distribution network. Results obtained from the EP were compared with firefly algorithm (FA); indicating better results. This highlights the strength of WOA over FA in terms of minimizing total losses.
A Comparative Study for Different Sizing of Solar PV System under Net Energy Metering Scheme at University Buildings T. M. N. T. Mansur; N. H. Baharudin; R. Ali
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (441.678 KB) | DOI: 10.11591/eei.v7i3.1277

Abstract

Malaysia has moved forward by promoting the use of renewable energy such as solar PV to the public to reduce dependency on fossil fuel-based energy resources. Due to the concern on high electricity bill, Universiti Malaysia Perlis (UniMAP) is keen to install solar PV system as an initiative for energy saving program to its buildings. The objective of this paper is to technically and economically evaluate the different sizing of solar PV system for university buildings under the Net Energy Metering (NEM) scheme. The study involves gathering of solar energy resource information, daily load profile of the buildings, sizing PV array together with grid-connected inverters and the simulation of the designed system using PVsyst software. Based on the results obtained, the amount of solar energy generated and used by the load per year is between 5.10% and 20.20% from the total annual load demand. Almost all solar energy generated from the system will be self-consumed by the loads. In terms of profit gained, the university could reduce its electricity bill approximately between a quarter to one million ringgit per annum depending on the sizing capacity. Beneficially, the university could contribute to the environmental conservation by avoiding up to 2,000 tons of CO2 emission per year.
Dynamic Economic Dispatch Assessment Using Particle Swarm Optimization Technique Muhammad Murtadha Othman; Mohd Affendi Ismail Salim; Ismail Musirin; Nur Ashida Salim; Mohammad Lutfi Othman
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (478.557 KB) | DOI: 10.11591/eei.v7i3.1278

Abstract

This paper presents the application of particle swarm optimization (PSO) technique for solving the dynamic economic dispatch (DED) problem. The DED is one of the main functions in power system planning in order to obtain optimum power system operation and control. It determines the optimal operation of generating units at every predicted load demands over a certain period of time. The optimum operation of generating units is obtained by referring to the minimum total generation cost while the system is operating within its limits. The DED based PSO technique is tested on a 9-bus system containing of three generator bus, six load bus and twelve transmission lines.
Evaluation of Support Vector Machine and Decision Tree for Emotion Recognition of Malay Folklores Mastura Md Saad; Nursuriati Jamil; Raseeda Hamzah
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (599.337 KB) | DOI: 10.11591/eei.v7i3.1279

Abstract

In this paper, the performance of Support Vector Machine (SVM) and Decision Tree (DT) in classifying emotions from Malay folklores is presented. This work is the continuation of our storytelling speech synthesis work to add emotions for a more natural storytelling. A total of 100 documents from children short stories are collected and used as the datasets of the text-based emotion recognition experiment. Term Frequency-Inverse Document Frequency (TF-IDF) is extracted from the text documents and classified using SVM and DT. Four types of common emotions, which are happy, angry, fearful and sad are classified using the two classifiers. Results showed that DT outperformed SVM by more than 22.2% accuracy rate. However, the overall emotion recognition is only at moderate rate suggesting an improvement is needed in future work. The accuracy of the emotion recognition should be improved in future studies by using semantic feature extractors or by incorporating deep learning for classification.
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation and Feature Point Matching Anil Gupta
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (306.232 KB) | DOI: 10.11591/eei.v7i3.754

Abstract

With the development of Image processing editing tools and software, an image can be easily manipulated. The image manipulation detection is vital for the reason that an image can be used as legal evidence, in the field of forensics investigations, and also in numerous various other fields. The image forgery detection based on pixels aims to validate the digital image authenticity with no aforementioned information of the main image. There are several means intended for tampering a digital image, for example, copy-move or splicing, resampling a digital image (stretch, rotate, resize), removal as well as the addition of an object from your image. Copy move image forgery detection is utilized to figure out the replicated regions as well as the pasted parts, however forgery detection may possibly vary dependant on whether or not there is virtually any post-processing on the replicated part before inserting the item completely to another party. Typically, forgers utilize many operations like rotation, filtering, JPEG compression, resizing as well as the addition of noise to the main image before pasting, that make this thing challenging to recognize the copy move image forgery. Hence, forgery detector needs to be robust to any or all manipulations and also the latest editing software tools. This research paper illustrates recent issues in the techniques of forgery detection and proposes a advanced copy–move forgery detection scheme using adaptive over-segmentation and feature point matching. The proposed scheme integrates both block-based and key point-based forgery detection methods.
Assessing Information System Integration Using Combination of the Readiness and Success Models A'ang Subiyakto
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1737.127 KB) | DOI: 10.11591/eei.v7i3.1182

Abstract

Information system integration (ISI) is one of the development concerns for organizations to enhance business competitiveness. However, the implementations still present its failures. Despite the ISI may successful technically; but it still seems to be unsuccessful because of the human and management issues. The issues may relate to the readiness constructs of ISI. This study was aimed to know the status of the readiness and success of ISI and to assess the influential factors of the integration in the sampled institution. About 160 samples were purposely involved by considering their key informant characteristics. The data were analyzed using the partial least squares-structural equation modeling (PLS-SEM) method. The findings revealed only the user satisfaction variable that mediated the positive effects of the readiness variables towards variable of the system integration success. Besides, the findings may practically helpful for stakeholders in the sampled institution, but it may also theoretically useful for researchers in regard to the readiness and success issues of ISI.
Weather Forecasting Using Merged Long Short-term Memory Model Afan Galih Salman; Yaya Heryadi; Edi Abdurahman; Wayan Suparta
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (701.711 KB) | DOI: 10.11591/eei.v7i3.1181

Abstract

Over decades, weather forecasting has attracted researchers from worldwide communities due to itssignificant effect to global human life ranging from agriculture, air trafic control to public security. Although formal study on weather forecasting has been started since 19th century, research attention to weather forecasting tasks increased significantly after weather big data are widely available. This paper proposed merged-Long Short-term Memory for forecasting ground visibility at the airpot using timeseries of predictor variable combined with another variable as moderating variable. The proposed models were tested using weather timeseries data at Hang Nadim Airport, Batam. The experiment results showedthe best average accuracy for forecasting visibility using merged Long Short-term Memory model and temperature and dew point as a moderating variable was (88.6%); whilst, using basic Long Short-term Memory without moderating variablewasonly (83.8%) respectively (increased by 4.8%).
Efficient Implementation of Mean, Variance and Skewness Statistic Formula for Image Processing Using FPGA Device Aqwam Rosadi Kardian; Sunny Arief Sudiro; Sarifuddin Madenda
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v7i3.687

Abstract

Processing statistic formula in image processing and accessing data from memory is easy in software, the other hand for hardware implementation is more dificult considering a lot of constraint. This article proposes an implementation of optimum mean, variance and skewness formula in FGPA Device. The proposed circuit design for all formulas only need three additions component (in three accumulators) and two divisions using two shift-right-registers, two subtractors, one adder and six multipliers. For 8x8 image size need 64 clock cycles to finish the mean, variance and skewness calculations, comparing other approach that need more than 1024 additions component without skewness calculation. Implementation into FPGA needs 68 slices of flip-flops and 121 of 4 input LUTs.
An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method Prajna Deshanta Ibnugraha; Lukito Edi Nugroho; Paulus Insap Santosa
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (835.108 KB) | DOI: 10.11591/eei.v7i3.847

Abstract

Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
Speaker Recognition in Content-based Image Retrieval for a High Degree of Accuracy Suhartono Suhartono; Fresy Nugroho; Muhammad Faisal; Muhammad Ainul Yaqin; Suyanta Suyanta
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (728.047 KB) | DOI: 10.11591/eei.v7i3.957

Abstract

The purpose of this research is to measure the speaker recognition accuracy in Content-Based Image Retrieval. To support research in speaker recognition accuracy, we use two approaches for recognition system: identification and verification, an identification using fuzzy Mamdani, a verification using Manhattan distance. The test results in this research. The best of distance mean is size 32x32. The best of the verification for distance rate is 965, and the speaker recognition system has a standard error of 5% and the system accuracy is 95%. From these results, we find that there is an increase in accuracy of almost 2.5%. This is due to a combination of two approaches so the system can add to the accuracy of speaker recognition.

Page 40 of 291 | Total Record : 2901


Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue