cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Robot control and kinematic analysis with 6DoF manipulator using direct kinematic method Khalaf S Gaeid; Asaad F Nashee; Ibrahim A. Ahmed; Mohammed H. Dekheel
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2482

Abstract

The robots pay important role in all parts of our life. Hence, the modeling of the robot is essential to develop the performance specification. Robot model of six degree of freedom (6DoF) manipulator implemented numerically using model-based technique. The kinematic analysis and simulation were studied with Inverse kinematics of the robot manipulator through Denevit and Hartenberg method. Matrix transformation method is used in this work in order to separate joint variables from kinematic equations. The finding of the desired configuration is obtained precisely in all motion trajectory along the end-effector path. MATLAB/SIMULINK with R2018b is used for the implementation of the model-based robot system. Simulation results showed that the robot rinks follow their references smoothly and precisely and ensure the effectiveness of direct kinematic algorithm in the analysis and control of the robotic field.
Discretization methods for Bayesian networks in the case of the earthquake Devni Prima Sari; Dedi Rosadi; Adhitya Ronnie Effendie; Danardono Danardono
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2007

Abstract

The Bayesian networks are a graphical probability model that represents interactions between variables. This model has been widely applied in various fields, including in the case of disaster. In applying field data, we often find a mixture of variable types, which is a combination of continuous variables and discrete variables. For data processing using hybrid and continuous Bayesian networks, all continuous variables must be normally distributed. If normal conditions unsatisfied, we offer a solution, is to discretize continuous variables. Next, we can continue the process with the discrete Bayesian networks. The discretization of a variable can be done in various ways, including equal-width, equal-frequency, and K-means. The combination of BN and k-means is a new contribution in this study called the k-means Bayesian networks (KMBN) model. In this study, we compared the three methods of discretization used a confusion matrix. Based on the earthquake damage data, the K-means clustering method produced the highest level of accuracy. This result indicates that K-means is the best method for discretizing the data that we use in this study.
Enhancement of digital signature algorithm in bitcoin wallet Farah Maath Jasem; Ali Makki Sagheer; Abdullah M. Awad
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2339

Abstract

Bitcoin is a peer-to-peer electronic cash system largely used for online financial transactions. It gained popularity due to its anonymity, privacy, and comparatively low transaction cost. Its wallet heavily relies on elliptic curve digital signature algorithm (ECDSA). Weaknesses in such algorithms can significantly affect the safety and the security of bitcoin wallets. In this paper, a secure key management wallet was designed based on several changes in the wallet parts. In the cold wallet, we employed an image-based passphrase to achieve a strong entropy source of master seed. The hot wallet, the proposed Key_Gen algorithm is modifying to the key generation step of the ECDSA that it is to generate a fresh key pair at each transaction. The final part ensures recovering all keys on both hot and cold wallets without daily backups in case of losing the wallet. The findings prove that the proposed cold wallet is resisting against a dictionary attack and overcoming the memorizing problem. The proposed hot wallet model acquires good anonymity and privacy for bitcoin users by eliminating transaction likability without additional cost. The execution time for signing a transaction of the proposed model is~70 millisecond, which is then important in the bitcoin domain.
Behavioral studies of surge protection components Teik Hua Kuan; Kuew Wai Chew; Kein Huat Chua
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2665

Abstract

In our daily life, almost all the items we used, being a computer, television, lift or vehicle we drive consist of some kind of electrical or electronics component inside. The operation of these devices could be severely affected by lightning activity or electrical switching events, as there are more than 2000 thunderstorms in progress at any time resulting in 100 lightning flashes to ground per second. In practice, any device using electricity will subject to surge damages induced from the lightning or switching of heavy load. Surge protection device (SPD) is added at the power distribution panel and critical process loop to prevent damage subsequently cause plant shutdown. There are many questions raised on the SPD. How can this small device protect the equipment from large energy release by the lightning? What is inside the device? How does it work? This paper provides comprehensive detail in revealing the science and engineering behind the SPD, its individual component characteristic and how does it work. The technical information presented is limited to surge protection on equipment; surge protection for building structure will not be discussed here.
Signature PSO: A novel inertia weight adjustment using fuzzy signature for LQR tuning Achmad Komarudin; Novendra Setyawan; Leonardo Kamajaya; Mas Nurul Achmadiah; Zulfatman Zulfatman
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2667

Abstract

Particle swarm optimization (PSO) is an optimization algorithm that is simple and reliable to complete optimization. The balance between exploration and exploitation of PSO searching characteristics is maintained by inertia weight. Since this parameter has been introduced, there have been several different strategies to determine the inertia weight during a train of the run. This paper describes the method of adjusting the inertia weights using fuzzy signatures called signature PSO. Some parameters were used as a fuzzy signature variable to represent the particle situation in a run. The implementation to solve the tuning problem of linear quadratic regulator (LQR) control parameters is also presented in this paper. Another weight adjustment strategy is also used as a comparison in performance evaluation using an integral time absolute error (ITAE). Experimental results show that signature PSO was able to give a good approximation to the optimum control parameters of LQR in this case.
NON-INVASIVE GLUCOSE MONITORING DEVICES: A REVIEW Farhan Affendi Mohamad Yunos, Muhammad; Nordin, Anis Nurashikin
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2668

Abstract

Diabetes is a growing chronic disease that affect millions of people in the world. Regular monitoring of blood glucose levels in patients is necessary to keep the disease under control. Current methods of blood glucose monitoring devices are typically invasive, causing discomfort to the patients. Non-invasive glucose monitoring devices are a possible game changer for diabetic patients as it reduces discomfort and provides continuous monitoring. This manuscript presents a review of non-invasive glucose biosensors with particular focus on leading technologies available in the market, such as microwave sensing, near-infrared spectroscopy, iontophoresis, and optical methods. This paper intends to describe non-invasive blood glucose monitoring methods using various biological fluids (sweat, saliva, interstitial fluid, urine), highlighting the advantages and drawbacks in latest device development. This review also discusses future trends of glucose detection devices and how it will improve patients? quality of life.
Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote monitoring Amirun Murtaza Abd Jalil; Roslina Mohamad; Nuzli Mohamad Anas; Murizah Kassim; Saiful Izwan Suliman
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2669

Abstract

In this paper, an implementation of vehicle ventilation system using microcontroller NodeMCU is described, as an internet of things (IoT) platform. A low-cost wireless fidelity (Wi-Fi) microchip ESP8266 integrated with NodeMCU provides full-stack transmission control protocol/internet protocol (TCP/IP) to communicate between mobile applications. This chip is capable to monitor and control sensor devices connected to the IoT platform. In this reserach, data was collected from a temperature sensor integrated to the platform, which then monitored using Blynk application. The vehicle ventilation system was activated/deactivated through mobile application and controlled using ON/OFF commands sent to the connected devices. From the results, the vehicle ventilation system built using NodeMCU microcontroller is capable to provide near real-time data monitoring for temperature in the car before and after the ventilation system was applied.
DEH-DoSv6: A defendable security model against IPv6 extension headers denial of service attack Marlon A. Naagas; Alvin R. Malicdem; Thelma D. Palaoag
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2670

Abstract

With the rapid depletion of IPv4 protocol in these recent years, the IETF introduced IPv6 as a solution to address the exhaustion, however, as a new protocol exists, new characteristics have been introduced and new threats have been discovered. Extension Headers are the new characteristics of IPv6 that have an emerging and re-emerging security threats that is needed to be taken into consideration during the full migration to the IPv6 network. This study revealed that up to this moment, the popular vendors are still vulnerable and doesn’t have any default protection to deal with extension headers’ Denial of Service Attack (DoS). Also, this study leads to the development of new security model which creates a new solution to address the emerging threats of IPv6 extension headers’ Denial of Service Attack. Moreover, the results of this study show that our proposed security model is more effective in terms of neutralizing the unwanted traffic causing evasion attack by filtering, rate-limiting and discarding the malformed packets of prohibited extension headers’ payload versus the traditional router protection.
MULTISCHEME FEEDFORWARD ARTIFICIAL NEURAL NETWORK ARCHITECTURE FOR DDOS ATTACK DETECTION Muhammad, Arif Wirawan; Feresa Mohd Foozy, Cik; Malik, Kamaruddin
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2671

Abstract

Distributed denial of service attack classified as a structured attack to deplete server, sourced from various bot computers to form a massive data flow. Distributed denial of service (DDoS) data flows behave as regular data packet flows, so it is challenging to distinguish between the two. Data packet classification to detect DDoS attacks is one solution to prevent DDoS attacks and to maintain server resources maintained. The machine learning method especially artificial neural network (ANN), is one of the effective ways to detect the flow of data packets in a computer network. Based on the research that has carried out, it concluded that ANN with hidden layer architecture that contains neuron twice as neuron on the input layer (2n) produces a stable detection accuracy value on Quasi-Newton, Scaled-Conjugate and Resilient-Propagation training functions. Based on the studies conducted, it concluded that ANN Architecture sufficiently affected the Scaled-Conjugate and Resilient-Propagation training functions, otherwise the Quasi-Newton training function. The best detection accuracy achieved from the experiment is 99.60%, 1.000 recall, 0.988 precision, and 0.993 f-measure using the Quasi-Newton training function with 6-(12)-2 neural network architecture
Development of patch stack antenna for CP-SAR sensor Muhammad Fauzan Edy Purnomo; Vita Kusumasari; Rusmi Ambarwati; Sigit Kusmaryanto; Sholeh Hadi Pramono; Dwi Fadila Kurniawan; Akio Kitagawa
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2672

Abstract

In this paper, we obtain the basic configuration of the left-hand circular polarization (LHCP) array two patches stack triangular truncated microstrip antenna. This construction use the basic corporate feed microstrip-line with modified lossless T-junction power divider on radiating patch for circularly polarized-synthetic aperture radar (CP-SAR) sensor embedded on airspace with compact, small, and simple configuration. The design of Circular Polarization (CP) is realized by truncating the whole three tips and adjusting the parameters of antenna at the resonant frequency, f=5.2 GHz. The results of characteristic performance and S-parameter for the LHCP array two patches stack antenna at the resonant frequency show successively about 7.24 dBic of gain, 1.99 dB of axial ratio (Ar), and -11.43 dB of S-parameter. Moreover, the impedance bandwidth and the 3 dB-Ar bandwidth of this antenna are around 560 MHz (10.77%) and 50 MHz (0.96%), respectively.

Page 86 of 291 | Total Record : 2901


Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue