cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
ETOU electricity tariff for manufacturing load shifting strategy using ACO algorithm M. F. Sulaima; N. Y. Dahlan; M. H. Isa; M. N. Othman; Z. M. Yasin; H. A. Kasdirin
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (490.139 KB) | DOI: 10.11591/eei.v8i1.1438

Abstract

This paper presents load shifting strategy for cost reduction on manufacturing electricity demand side, by which a real test load profile had been used to prove the concept. Superior bio-inspired algorithm, Ant Colony Optimization (ACO) had been implemented to optimize the upright load profile of load shifting strategy in the Malaysia Enhance Time of Use (ETOU) tariff condition. Subsequently, significant simulation results of operation profit gain through 24 hours electricity consumption had been analyzed properly. The proposed method had shown reduction of approximately 6% of the electricity cost at peak and mid peak zones, when 20%, 40%, 60%, 80% and 100% load shifting weightages were applied to the identified 10% controlled loads consequently. It is hoped that the finding of this study can help poise the manufacturers to switch to ETOU tariff as well as support the national Demand Side Management (DSM) program
Face recognition attendance system using Local Binary Pattern (LBP) Shamsul J. Elias; Shahirah Mohamed Hatim; Nur Anisah Hassan; Lily Marlia Abd Latif; R. Badlishah Ahmad; Mohamad Yusof Darus; Ahmad Zambri Shahuddin
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (340.709 KB) | DOI: 10.11591/eei.v8i1.1439

Abstract

Attendance is important for university students. However, generic way of taking attendance in universities may include various problems. Hence, a face recognition system for attendance taking is one way to combat the problem. This paper will present an automated system that will automatically saves student’s attendance into the database using face recognition method. The paper will elaborate on student attendance system, image processing, face detection and face recognition. The face detection part will be done by using viola-jones algorithm method while the face recognition part will be carried on by using local binary pattern (LBP) method. The system will ensure that the attendance taking process will be faster and more accurate.
The evaluation performance of letter-based technique on text steganography system Roshidi Din; Rosmadi Bakar; Sunariya Utama; Jamaluddin Jasmis; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (386.851 KB) | DOI: 10.11591/eei.v8i1.1440

Abstract

Steganography is a part of information hiding in covering the hidden message in any medium such as text, image, audio, video and others. This paper concerns about the implementation of steganography in text domain called text steganography. It intends to concentrate on letter-based technique as one of the representative techniques in text steganography. This paper displays some techniques of letter-based that is integrated in one system technique displayeed in a logical and physical design. The integrated system is evaluated using some parameter that is used in order to discover the performance in term of capacity after embedding process and the time consuming in the development process. This paper is anticipated to contribute in describing the implementation of the techniques in one system and to display the performance some parameter evaluation.
Performance analysis on secured data method in natural language steganography Roshidi Din; Rosmadi Bakar; Raihan Sabirah Sabri; Mohamad Yusof Darus; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (430.165 KB) | DOI: 10.11591/eei.v8i1.1441

Abstract

The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field. Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; covering the decoding, decrypting and extracting performance metric. The process of data decoding interprets the received hidden message into a code word. As such, data encryption is the best way to provide a secure communication. Decrypting take an encrypted text and converting it back into an original text. Data extracting is a process which is the reverse of the data embedding process. The effectiveness evaluation is mainly determined by the performance metric aspect. The intention of researchers is to improve performance metric characteristics. The evaluation success is mainly determined by the performance analysis aspect. The objective of this paper is to present a review on the study of steganography in natural language based on the criteria of the performance analysis. The findings review will clarify the preferred performance metric aspects used. This review is hoped to help future research in evaluating the performance analysis of natural language in general and the proposed secured data revealed on natural language steganography in specific.
FACTS device installation in transmission system using whale optimization algorithm Irham Syafiq Shahbudin; Ismail Musirin; Saiful Izwan Suliman; Afdallyna Fathiyah Harun; Sharifah Azma Syed Mustaffa; Hadi Suyono; Nor Azura Md Ghani
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (554.938 KB) | DOI: 10.11591/eei.v8i1.1442

Abstract

As the world is progressing forward, the load demand in the power system has been continuously increasing day by day. This situation has forced the power system to operate under stress condition due to its limitation. Therefore, due to the stressed condition, the transmission losses faced higher increment with a lower minimum voltage. Theoretically, the installation of the Flexible AC Transmission System (FACTS) device can solve the problem experienced by the power system. This paper presents the whale optimization algorithm for loss minimization using FACTS devices in the transmission system. Thyristor controlled series compensator (TCSC) is chosen for this study. In this study, WOA is developed to identify the optimal sizing of FACTS device for loss minimization in the power system. IEEE 30- bus RTS was used as the test system to validate the effectiveness of the proposed algorithm.
Performance comparison of distributed generation installation arrangement in transmission system for loss control S. A. Shaaya; I. Musirin; S. I. Sulaiman; M. H. Mansor; S. A. Syed Mustaffa
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (527.095 KB) | DOI: 10.11591/eei.v8i1.1443

Abstract

Placing Distributed Generation (DG) into a power network should be planned wisely. In this paper, the comparison of having different installation arrangement of real-power DGs in transmission system for loss control is presented. Immune-brainstorm-evolutionary programme (IBSEP) was chosen as the optimization technique. It is found that optimizing fixed-size DGs locations gives the highest loss reduction percentage. Apart from that, scattered small-sized DGs throughout a network minimizes transmission loss more than allocating one biger-sized DG at a location.
Knots timber detection and classification with C-Support Vector Machine Fakhira Iwani Muhammad Redzuan; Marina Yusoff
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (348.171 KB) | DOI: 10.11591/eei.v8i1.1444

Abstract

Timber knots recognition is of prime importance to further determine the timber grade. The recognition is normally based on the human expert’s eyes in which can lead to some flaws based on human limitations and weaknesses. The use of X-ray can cause emits radiation and can be dangerous to the workers. This paper addresses the employment of computational methods for knot detection. A pre-processing and feature extraction methods include contrast stretching, median blur and thresholding, gray scale and local binary pattern were used. More than 400 datasets of knot images of the tropical timbers, namely Acacia and Hevea Brasiliensis have been tested using C-support vector machine as a knot classifier. The findings demonstrate different performances for three types of kernel. Linear kernel function outperformed both radial basis function and polynomial kernel functions for Acacia and Hevea Brasiliensis species. Both species classifications using linear kernel have managed to achieve a promising accuracy. Knots classification with the used of support vector machine has shown a promising result to improve the classifier and test with different types of tropical timbers.
Solving financial allocation problem in distribution system expansion planning Siti Hajar Mohd Tahar; Shamshul Bahar Yaakob; Ahmad Shukri Fazil Rahman; Amran Ahmed
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (532.938 KB) | DOI: 10.11591/eei.v8i1.1445

Abstract

This paper introduces a new technique to solve financial allocation in Distribution System Expansion Planning (DSEP) problem. The proposed technique will be formulated by using mean-variance analysis (MVA) approach in the form of mixed-integer programming (MIP) problem. It consist the hybridization of Hopfield Neural Network (HNN) and Boltzmann Machine (BM) in first and second phase respectively. During the execution at the first phase, this model will select the feasible units meanwhile the second phase will restructured until it finds the best solution from all the feasible solution. Due to this feature, the proposed model has a fast convergence and the accuracy of the obtained solution. This model can help planners in decision-making process since the solutions provide a better allocation of limited financial resources and offer the planners with the flexibility to apply different options to increase the profit.
Tooth segmentation using dynamic programming-gradient inverse coefficient of variation Anuar Mikdad Muad; Nur Sakinah Mohamed Bahaman; Aini Hussain; Mohd Yusmiaidil Putera Mohd Yusof
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (430.457 KB) | DOI: 10.11591/eei.v8i1.1446

Abstract

Teeth provide meaningful clues of an individual. The growth of the teeth is correlated with the individual age. This correlation is widely used to estimate age of an individual in applications like conducting forensic odontology, immigration, and differentiating juveniles and adolescents. Current forensic dentistry largely depends on laborious investigation process that is performed manually and can be influenced by human factors like fatigue and inconsistency. Digital panoramic radiograph dental images allow noninvasive and automatic investigation to be performed. This paper presents analyses on third molar tooth segmentation for the population in Malaysia, ranging from persons age of 5 years old to 23 years old. Two segmentation techniques: gradient inverse coefficient of variation with dynamic programming (DP-GICOV) and Chan-Vese (CV) were employed and compared. Results demonstrated that the accuracy of DP-GICOV and CV were 95.3%, and 81.6%, respectively.
Haze alarm visual map (HazeViz): an intelligent haze forecaster Mohd Said Syukri Morsid; Syeril Azira Jamaluddin; Nur Azmina Hood; Norshahida Shaadan; Yap Bee Wah; Muthukkaruppan Annamalai
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (510.106 KB) | DOI: 10.11591/eei.v8i1.1447

Abstract

The haze problem has intensified in recent years. The particulate matter of less than 10 microns in size, PM10 is the dominant air pollutant during haze. In this paper, we present the development of HazeViz, a Haze Alarm Visual Map forecaster, which is based on PM10. The intelligent web application allows users to visualize the pattern of PM10 in a region, forecasts PM10 value and alarms bad haze condition. HazeViz was developed using HTML, Java Script, PHP, MySQL, R Programming and Fusionex Giant. The SARIMA statistical forecasting models that underlie the application were developed using R. The PM10 trend analysis, and the consequential map and chart visualizations were implemented on the Fusionex GIANT Big Data Analytics platform. HazeViz was developed in the context of the Klang Valley, our case study. The dataset was obtained from Department of Environment Malaysia, which contains a total of 157,680 hourly PM10 data for six stations in Klang Valley, for the years 2013 to 2015. The SARIMA models were developed using maximum daily PM10 data for 2013 and 2014, and the 2015 data was used to validate the model. The fitting models were determined based on the Mean Absolute Error (MAE), Root Mean Square Error (RMSE) and Mean Absolute Percentage Error (MAPE). While the selected models were implemented in HazeViz and successfully deployed on the web, the results show that the selected models have MAPE ranging between 35 percent and 45 percent, which implies that the models are still far from robust. Future work can consider augmented SARIMA models that can yield improved results.

Page 49 of 291 | Total Record : 2901


Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue