cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Design aspects of high voltage transmission line Jabbar Qasim Fahad; Riyadh Kamil Chillab
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.485 KB) | DOI: 10.11591/eei.v9i3.2062

Abstract

The transmission lines are very important in the transmitted of electrical power, and the process of selecting the voltage of the line is an important task in the design and implementation process. The process of transferring electrical power from one side then onto the next place for long away. While maintaining the percentage regulation within the permissible limits is an important problem in the transfer of energy. In electrical transmission line there are important elements are resistance, inductance and capacitance. The purpose of this paper is to study and calculate economic high-tension voltage and selection of overhead line conductor ACSR.
MRI brain tumor segmentation: A forthright image processing approach Noor Elaiza Abd Khalid; Muhammad Firdaus Ismail; Muhammad Azri AB Manaf; Ahmad Firdaus Ahmad Fadzil; Shafaf Ibrahim
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (467.376 KB) | DOI: 10.11591/eei.v9i3.2063

Abstract

Brain tumor is a collection of cells that grow in an abnormal and uncontrollable way. It may affect the regular function of the brain since it grows inside the skull region. As a brain tumor can be possibly led to cancer, early detection in Computed Tomography (CT) or Magnetic Resonance Imaging (MRI) scanned images are crucial. Thus, this paper proposed a forthright image processing approach towards detection and localization of brain tumor region The approach consists of a few stages such as pre-processing, edge detection and segmentation. The pre-processing stage converts the original image into a greyscale image, and noise removal if necessary. Next, the image is enhanced using image enhancement techniques. It is then followed by edge detection using Sobel and Canny algorithms. Finally, the segmentation is applied to highlight the tumor with morphological operations towards the affected region in the MRI images. The in-depth analysis is measured using a confusion matrix. From the results, it signifies that the proposed approach is capable to provide decent segmentation of brain tumor from various MRI brain images.
Security issues and framework of electronic medical record: A review Jibril Adamu; Raseeda Hamzah; Marshima Mohd Rosli
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (376.616 KB) | DOI: 10.11591/eei.v9i2.2064

Abstract

The electronic medical record has been more widely accepted due to its unarguable benefits when compared to a paper-based system. As electronic medical record becomes more popular, this raises many security threats against the systems. Common security vulnerabilities, such as weak authentication, cross-site scripting, SQL injection, and cross-site request forgery had been identified in the electronic medical record systems. To achieve the goals of using EMR, attaining security and privacy is extremely important. This study aims to propose a web framework with inbuilt security features that will prevent the common security vulnerabilities in the electronic medical record. The security features of the three most popular and powerful PHP frameworks Laravel, CodeIgniter, and Symfony were reviewed and compared. Based on the results, Laravel is equipped with the security features that electronic medical record currently required. This paper provides descriptions of the proposed conceptual framework that can be adapted to implement secure EMR systems.
PNSCares: The android based mobile application to manage student complaints N. Illias; N. H. Abdul Hamid; Z. A. Shaffiei
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (579.607 KB) | DOI: 10.11591/eei.v9i3.2065

Abstract

Managing the complaint is tough to handle, efficient response to the complaints from the customer can be an indicator to measure an organization’s performance. We’ve chosen Politeknik Nilai as one of the institutions that are facing daily complaints from the students and parents. Currently, they are using the manual form to lodge a complaint and receive the feedback via email. In this study, we developed an android based mobile application to manage the students’ complaint. With mobile apps, the management can prevent the loss of complaint forms and keep track of the records. This system will send feedback and notification directly via students’ mobile phone. This study referred to the ten principles for effective complaint handling by Ombudsman. We only referred to eight principles to construct the PNSCares. The methodology used to develop mobile apps is using the Mobile Application Development Life Cycle (MADLC). System Usability Scale (SUS) is used to measure the effectiveness of the mobile apps. The feedbacks from ten respondents on the PNSCares prototype are good with 72 scores in SUS for perceived usefulness and ease of use factor. Based on the result, the prototype is effective and easy to use.
Dynamic navigation indoor map using Wi-Fi fingerprinting mobile technology Srie Azrina Zulkiflie; Norhaslinda Kamaruddin; Abdul Wahab
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (595.957 KB) | DOI: 10.11591/eei.v9i2.2066

Abstract

This paper presents the exploitation of Wi-Fi signals sensors using fingerprinting method to capture the location and provide the possible navigation paths. Such approach is practical because current smartphones nowadays are equipped with inertial sensors that can capture the Wi-Fi signals from the Wi-Fi’s access points inside the building. From the comparative study conducted, the AnyPlace development tool is used for the development of dynamic navigation indoor map. Its components, namely; Architect, Viewer, Navigator and Logger are used for different specific functions. As a case study, we implement the proposed approach to guide user for navigation in Sunway Pyramid Shopping Mall, Malaysia as floor plan as well as using Google Maps as the base map for prove of concept. From the developer point of view, it is observed that the proposed approach is viable to create a dynamic navigation indoor map provided that the floor plans must be generated first. Such plan should be integrated with the SDK tool to work with the navigation APIs. It is hoped that the proposed work can be extended for more complex indoor map for better implementation.
Analysis review on spatial and transform domain technique in digital steganography Farah Qasim Ahmed Alyousuf; Roshidi Din; Alaa Jabbar Qasim
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (461.052 KB) | DOI: 10.11591/eei.v9i2.2068

Abstract

This paper presents several techniques used in digital steganography in term of spatial and transform domain. Additionally, it analyses the performance and the metric evaluation of the techniques used in digital steganography based on spatial and transform domain. This paper aims to identify the main mediums of digital steganography, which are image-based, video-based and audio-based, in order to recognize the various techniques used with them. As a result, the primary technique used in the digital medium was LSB technique in the spatial domain, while in the transform domain, the main technique used was differentiated between DTC and DWT. Meanwhile, the common domain utilized in digital steganography was the spatial domain due to its simplicity and high embedding capacity. The future efforts for this paper will be considering the feature based in text steganography.
Analysis review on feature-based and word-rule based techniques in text steganography Farah Qasim Ahmed Alyousuf; Roshidi Din
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (305.125 KB) | DOI: 10.11591/eei.v9i2.2069

Abstract

This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation of the techniques used in text steganography. This paper aims to identify the main techniques of text steganography, which are feature-based, and word-rule based, to recognize the various techniques used with them. As a result, the primary technique used in the text steganography was feature-based technique due to its simplicity and secured. Meanwhile, the common parameter metrics utilized in text steganography were security, capacity, robustness, and embedding time. Future efforts are suggested to focus on the methods used in text steganography.
Missing data exploration in air quality data set using R-package data visualisation tools Shamihah Muhammad Ghazali; Norshahida Shaadan; Zainura Idrus
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (393.088 KB) | DOI: 10.11591/eei.v9i2.2088

Abstract

Missing values often occur in many data sets of various research areas. This has been recognized as data quality problem because missing values could affect the performance of analysis results. To overcome the problem, the incomplete data set need to be treated or replaced using imputation method. Thus, exploring missing values pattern must be conducted beforehand to determine a suitable method. This paper discusses on the application of data visualisation as a smart technique for missing data exploration aiming to increase understanding on missing data behaviour which include missing data mechanism (MCAR, MAR and MNAR), distribution pattern of missingness in terms of percentage as well as the gap size. This paper presents the application of several data visualisation tools from five R-packges such as visdat, VIM, ggplot2, Amelia and UpSetR for data missingness exploration.  For an illustration, based on an air quality data set in Malaysia, several graphics were produced and discussed to illustrate the contribution of the visualisation tools in providing input and the insight on the pattern of data missingness. Based on the results, it is shown that missing values in air quality data set of the chosen sites in Malaysia behave as missing at random (MAR) with small percentage of missingness  and do contain long gap size of  missingness.
Cheap vs healthy: Analyzing McDonald’s menu using linear programming Nur Fadhilah Ibrahim; Thurga Dewi Arunasalan; Nurul Akmal Mohamed
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (399.783 KB) | DOI: 10.11591/eei.v9i2.2072

Abstract

The factors that influence food choices nowadays are time, cost and deliciousness. An obvious example is fast food. Although consumers are aware that fast food is not a healthy choice, many still chooses fast food because it is convenient. Therefore in this paper, by using linear programming, we analyzed McDonald’s Malaysia menu in order to find the cheapest menu and the ‘healthiest’ menu. We developed a linear programming model for McDonald’s Malaysia menu which adheres to Malaysia Recommended Nutrient Intake 2017 (RNI 2017). Then we solved the model and proposed the cheapest menu and also the ‘healthiest’ menu that meets the nutrient requirement based on RNI 2017. The result showed that price for the cheapest palatable menu is RM21.69 a day. For set menu, we found that no menu meets this requirement, suggesting that McDonald’s set menu should not be taken three times a day. The price for the ‘healthiest’ McDonald’s menu with the least total of fat, sugar and salt that meets the nutrient requirement is RM42.99 a day.
Evaluation of positive emotion in children mobile learning application Magrizef Gasah; Aslina Baharum; Nurul Hidayah Mat Zain; Suhaida Halamy; Rozita Hanapi; Noorsidi Aizuddin Mat Noor
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (451.708 KB) | DOI: 10.11591/eei.v9i2.2073

Abstract

This paper presents the evaluation of positive emotion in children's mobile learning applications. The mobile learning application is a teaching aid that can help students to self-study and increase the students’ interest in learning especially children. This paper will discuss how mobile learning application affects the children interest in school. The evaluation method implemented to evaluate the rate of positive emotion elicited by the children using mobile learning applications was a mixed method of qualitative and quantitative methods. Since emotion can be either negative or positive, the identification of a proper method or perspective was required to prove that positive emotion was really elicited. Next, the data was collected through the children’s assessment score, Electroencephalograms (EEG) device, Emotion identification using micro-expression (facial expression), Kort Scale and interview to confirm the positive emotion felt by the students. The result shows that all five perspectives or methods have shown that positive emotion is produced. It is found that the Mobile learning application can really trigger the children’s positive emotions.

Page 61 of 291 | Total Record : 2901


Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue