cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Temperature monitoring using polymer optical fiber with integration to the internet of things Hazura Haroon; Siti Khadijah Idris; Anis Suhaila Mohd Zain; Hanim Abdul Razak; Fauziyah Salehuddin
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2673

Abstract

In this paper, a polymer optical fiber (POF) is applied for temperature measuring of water solution using a light source of 650nm. The aim is to analyse the impact of temperature variations on the output of POF sensor device in terms of output power and sensitivity. From the study, the POF sensor shows a linear trend when the temperature is increased from 30°C to 80°C with the sensitivity of the polymer optical fiber for output power to the temperature are 0.00973 dBm/°C or 0.14797 nW/°C, for optical characterization and 0.0011 V/°C for electrical characterization. The integration of the Internet of Things to the system helps the user to monitor the temperature of various spaces anywhere at any time. The sensed values are controlled by Arduino Uno R3 and then sent to Blynk to provide wireless monitoring by the user. 
THE SEARCH FOR SCIENCE AND TECHNOLOGY VERSES IN QUR’AN AND HADITH Taufik, Ichsan; Jaenudin, Mohamad; Badriyah, Fatimah Ulwiyatul; Subaeki, Beki; Kurahman, Opik Taupik
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2674

Abstract

Currently, the Vector Space Model algorithm has been widely implemented for the document search feature because of its reliability in retrieving information. One of them in the search for verses of the Qur'an based on the translation. However, if the phrase or word used is different (even though it has one meaning) with the word in the document in the database, the system will not display the verse. As we know that the Qur'an has a very deep meaning, so an interpretation of the verse is needed. Therefore, this research focuses on implementing the Vector Space Model (VSM) algorithm for searching verses and hadiths in science and technology by using the discussion parameters of these verses or hadiths. The test results obtained with 20 keyword samples using metric recall were 81% with an average time of 2.24 seconds.
Correlation of learning disabilities to porn addiction based on EEG Norhaslinda Kamaruddin; Nurul Izzati Mat Razi; Abdul Wahab
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2462

Abstract

Researchers were able to correlate porn addiction based on electroencephalogram (EEG) signal analysis to the psychological instruments’ findings. In this paper we attempt to correlate the porn addiction to various cases of learning disorders through analyzing EEG signals. Since porn addiction involved the brainwave power at the frontal of the brain, which reflects the executive functions, this may have correlation to learning disorder. Only three types of learning disorder will be of interest in our study involving dyslexic, attention deficit and hyperactivity disorder (ADHD) and autistic children because they involved reduced intellectual ability observed from the lack of listening, speaking, reading, writing, reasoning, or mathematical proficiencies. Children with such disorder when expose to the internet unfiltered porn contents may have minimal understanding of the negative effects of the contents. Such unmonitored exposure to pornographic contents may result to porn addiction because it may trigger excitement and induced pleasure. Experimental results show strong correlation of learning disorders to porn addiction, which can be worthwhile for further analysis. In addition, this paper also indicates that analyzing brainwave patterns could provide a better insight into predicting and detecting children with learning disorders and addiction with direct analysis of the brain wave patterns.
Visualizing stemming techniques on online news articles text analytics Nurul Atiqah Razmi; Muhammad Zharif Zamri; Sharifah Syafiera Syed Ghazalli; Noraini Seman
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2504

Abstract

Stemming is the process to convert words into their root words by the stemming algorithm. It is one of the main processes in text analytics where the text data needs to go through stemming process before proceeding to further analysis. Text analytics is a very common practice nowadays that is practiced toanalyze contents of text data from various sources such as the mass media and media social. In this study, two different stemming techniques; Porter and Lancaster are evaluated. The differences in the outputs that are resulted from the different stemming techniques are discussed based on the stemming error and the resulted visualization. The finding from this study shows that Porter stemming performs better than Lancaster stemming, by 43%, based on the stemming error produced. Visualization can still be accommodated by the stemmed text data but some understanding of the background on the text data is needed by the tool users to ensure that correct interpretation can be made on the visualization outputs.
Mobile ad-hoc network routing protocols of time-critical events for search and rescue missions Marwan Hamid Hassan; Salama A. Mostafa; Hairulnizam Mahdin; Aida Mustapha; Azizul Azhar Ramli; Mustafa Hamid Hassan; Mohammed Ahmed Jubair
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2506

Abstract

The most important experiences we discovered from several disasters are that cellular networks were vulnerable, and the loss of the communication system may have a catastrophic consequence. Mobile ad-hoc networks (MANETs) play a significant role in the construction of campus, resident, battlefield and search/rescue region. MANET is an appropriate network for supporting a communication where is no permanent infrastructure. MANET is an effective network that uses to establishing urgent communication between rescue members in critical situations like, disaster or natural calamities. The sending and receiving data in MANET is depending on the routing protocols to adapt the dynamic topology and maintain the routing information. Consequently, This paper evaluates the performance of three routing protocols in MANET: ad-hoc on-demand distance vector (AODV), destination sequenced distance vector (DSDV), and ad-hoc on-demand multipath distance vector (AOMDV). These protocols are inherent from different types of routing protocols: single-path, multi-path, reactive and proactive mechanisms. The NS2 simulator is utilized to evaluate the quality of these protocols. Several metrics are used to assess the performance of these protocols such: packet delivery ratio (PDR), packet loss ratios (PLR), throughput (TP), and end-to-end delay (E2E delay). The outcomes reveal the AOMDV is the most suitable protocol for time-critical events of search and rescue missions.
Cyclic voltammetry readout circuitry for DNA biosensor application I. H. Hamzah; A. A. Malik; A. F. A. Rahim; Z. H. C. Soh
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2507

Abstract

Cyclic voltammetry electrochemical biosensors reported a wide usage and applications for its fast response, able to be miniaturized and its sensitivity. However, the bulky, expensive and laboratory-based readout circuitry made it impossible to be used in the field-based environment. A miniaturized and portable readout circuitry for the DNA detection using hybridization technique had been design and developed in this work. It embedded with fabricated FR4 based sensor and produced respective current when the applied voltage was within the range of 0 to 0.5 V. The readout circuitry had been verified with five analysis environments. Bare Au with distilled water (dH2O), bare Au with ferricyanide reagent solution, DNA immobilization, DNA non-hybridization and DNA hybridization. All the results performed produced peak cathodic current when the applied input voltage is within 0.5 V to 3 V and hence proved that the miniaturized and portable readout circuitry is suitable to be implemented for cyclic voltammetry electrochemical biosensor.
Review on feature-based method performance in text steganography Mohd Hilal Muhammad; Hanizan Shaker Hussain; Roshidi Din; Hafiza Samad; Sunariya Utama
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2508

Abstract

The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the solution to protect the information that is able to hide the hidden message that is unrecognized by human or machine vision. This paper concerns about one of the categories in steganography on medium of text called text steganography that specifically focus on feature-based method. This paper reviews some of previous research effort in last decade to discover the performance of technique in the development the feature-based on text steganography method. Then, ths paper also concern to discover some related performance that influences the technique and several issues in the development the feature-based on text steganography method.
Optimal tuning of a wind plant energy production based on improved grey wolf optimizer Mohd Zaidi Mohd Tumari; Mohd Muzaffar Zahar; Mohd Ashraf Ahmad
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2509

Abstract

The tuning of optimal controller parameters in wind plant is crucial in order to minimize the effect of wake interaction between turbines. The purpose of this paper is to develop an improved grey wolf optimizer (I-GWO) in order to tune the controller parameters of the turbines so that the total energy production of a wind plant is increased. The updating mechanism of original GWO is modified to improve the efficiency of exploration and exploitation phase while avoiding trapping in local minima solution. A row of ten turbines is considered to evaluate the effectiveness of the I-GWO by maximizing the total energy production. The proposed approach is compared with original GWO and previously published modified GWO. Finally, I-GWO produces the highest total energy production as compared to other methods, as shown in statistical performance analysis.
Wireless sensor network calibration technique for low-altitude unmanned aerial vehicle localization in paddy field Azhar Jaafar; Norashikin M. Thamrin; Noorolpadzilah Mohamed Zan
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2512

Abstract

This paper presents the use of the received signal strength indicator (RSSI) from the RF signal to estimate the distance from a point where the signal is transmitted to the point where the signal is received. This can be a challenge as in the paddy field, the watery and dry conditions, as well as the height of the paddy plant can affect signal transmission during this estimation process. Two low-cost ground beacons, Beacon1 and Beacon2 (The coordinator), are used and placed in a known location with a fixed distance across the paddy field, which becomes the reference point during the distance estimation for the unmanned aerial vehicle (UAV). These signals are analyzed by using the non-right-angle trigonometry computation, to estimate the distance between the transmitter and the receiver. The estimated distance is compared with the measured value to determine the efficiency of this approach. The calibration trendlines of these beacons in the open, watery and dry paddy fields are discussed and presented. It is found that the dry paddy field gives less RSSI mean error and proved that humidity can contribute to the distance estimation error.
Integration of LED-based lighting in academic buildings for energy efficiency considerations Mohamad Zhafran Hussin; Saiful Firdaus Abdul Shukor; Nor Diyana Md Sin; Yusrina Yusof; Muhammad Zairil Muhammad Nor; Noor Hasliza Abdul Rahman
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2513

Abstract

This paper presents an assessment by integration of LED T8 tube lamps in academic buildings for energy efficiency considerations. The proposed project was implemented in conjunction with a national mission, national energy efficiency action plan (NEEAP) for 10-year implementation period of 2016-2025 in reducing allocation on subsidies for efficient expenditure towards energy-saving measures. A case of study in a real environment at one of the UiTM’s buildings as a target task area has been tested by replacing a LED lighting technology in consideration of current operating costs and power factor performances. From the results, LED T8 tubes have shown a better power factor of 0.89 compared to fluorescent lamps with about 0.61 and primarily driven by economic benefits in terms of cost savings of up to 50% with return-on-investment (ROI) 6 months after installation. By integrating this technology, nearly 50% of the total energy consumption in indoor lighting system could be significantly saved, thus reducing the total cost of electricity bills in the future within the target area.

Page 87 of 291 | Total Record : 2901


Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue