cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 2,901 Documents
Analyzing the impact of the number of nodes on the performance of the routing protocols in manet environment Hussein M. Haglan; Salama A. Mostafa; Noor Zuraidin Mohd Safar; Aida Mustapha; Mohd. Zainuri Saringatb; Hosam Alhakami; Wajdi Alhakami
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2516

Abstract

Mobile Ad-hoc Networks (MANETs) are independent systems that can work without the requirement for unified controls, pre-setup to the paths/routes or advance communication structures. The nodes/hubs of a MANET are independently controlled, which permit them to behave unreservedly in a randomized way inside the MANET. The hubs can leave their MANET and join different MANETs whenever the need arises. These attributes, in any case, may contrarily influence the performance of the routing conventions (or protocols) and the general topology of the systems. Along these lines, MANETs include uniquely planned routing conventions that responsively as well as proactively carry out the routing. This paper assesses and looks at the effectiveness (or performance) of five directing conventions which are AOMDV, DSDV, AODV, DSR and OLSR in a MANET domain. The research incorporates executing a simulating environment to look at the operation of the routing conventions dependent on the variable number of hubs. Three evaluation indices are utilized: Throughput (TH), Packet Delivery Ratio (PDR), and End-to-End delay (E2E). The assessment outcomes indicate that the AODV beats other conventions in the majority of the simulated scenarios.
Traid-bit embedding process on Arabic text steganography method Roshidi Din; Reema Ahmed Thabit; Nur Izura Udzir; Sunariya Utama
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2518

Abstract

The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.
An enhanced fireworks algorithm to generate prime key for multiple users in fingerprinting domain Hussein Ali Ismael; Jamal Mustafa Abbas; Salama A. Mostafa; Ali Hussein Fadel
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2521

Abstract

This work presents a new method to enhance the performance of fireworks algorithm to generate a prime key for multiple users. A threshold technique in image segmentation is used as one of the major steps. It is used processing the digital image. Some useful algorithms and methods for dividing and sharing an image, including measuring, recognizing, and recognizing, are common. In this research, we proposed a hybrid technique of fireworks and camel herd algorithms (HFCA), where Fireworks are based on 3-dimension (3D) logistic chaotic maps. Both, the Otsu method and the convolution technique are used in the pre-processing image for further analysis. The Otsu is employed to segment the image and find the threshold for each image, and convolution is used to extract the features of the used images. The sample of the images consists of two images of fingerprints taken from the Biometric System Lab (University of Bologna). The performance of the anticipated method is evaluated by using FVC2004 dataset. The results of the work enhanced algorithm, so quick response code (QRcode) is used to generate a stream key by using random text or number, which is a class of symmetric-key algorithm that operates on individual bits or bytes.
Deblurring of noisy iris images in iris recognition Shahrizan Jamaludin; Nasharuddin Zainal; W Mimi Diyana W Zaki
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2467

Abstract

Iris recognition used the iris features to verify and identify the identity of human. The iris has many advantages such as stability over time, easy to use and high recognition accuracy. However, the poor quality of iris images can degrade the recognition accuracy of iris recognition system. The recognition accuracy of this system is depended on the iris pattern quality captured during the iris acquisition. The iris pattern quality can degrade due to the blurry image. Blurry image happened due to the movement during image acquisition and poor camera resolution. Due to that, a deblurring method based on the Wiener filter was proposed to improve the quality of iris pattern. This work is significant since the proposed method can enhance the quality of iris pattern in the blurry image. Based to the results, the proposed method improved the quality of iris pattern in the blurry image. Moreover, it recorded the fastest execution time to improve the quality of iris pattern compared to the other methods.
Data-based PID control of flexible joint robot using adaptive safe experimentation dynamics algorithm Mohd Ashraf Ahmad; Haszuraidah Ishak; Ahmad Nor Kasruddin Nasir; Normaniha Abd Ghani
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2472

Abstract

This paper proposes the data-based PID controller of flexible joint robot based on adaptive safe experimentation dynamics (ASED) algorithm. The ASED algorithm is an enhanced version of SED algorithm where the updated tuning variable is modified to adapt to the change of the objective function. By adopting the adaptive term to the updated equation of SED, it is expected that the convergence accuracy can be further improved. The effectiveness of the ASED algorithm is verified to tune the PID controller of flexible joint robot. In this flexible joint control problem, two PID controllers are utilized to control both rotary angle tracking and vibration of flexible joint robot. The performance of the proposed data-based PID controller is assessed in terms of trajectory tracking of angular motion, vibration reduction and statistical analysis of the pre-defined control objective function. The simulation results showed that the data-based PID controller based on ASED is able to produce better control accuracy than the conventional SED based method.
Physical activity prediction using fitness data: Challenges and issues Nur Zarna Elya Zakariya; Marshima Mohd Rosli
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2474

Abstract

In the new healthcare transformations, individuals are encourage to maintain healthy life based on their food diet and physical activity routine to avoid risk of serious disease. One of the recent healthcare technologies to support self health monitoring is wearable device that allow individual play active role on their own healthcare. However, there is still questions in terms of the accuracy of wearable data for recommending physical activity due to enormous fitness data generated by wearable devices. In this study, we conducted a literature review on machine learning techniques to predict suitable physical activities based on personal context and fitness data. We categorize and structure the research evidence that has been publish in the area of machine learning techniques for predicting physical activities using fitness data. We found 10 different models in behavior change technique (BCT) and we selected two suitable models which are fogg behavior model (FBM) and trans-theoretical behavior model (TTM) for predicting physical activity using fitness data. We proposed a conceptual framework which consists of personal fitness data, combination of TTM and FBM to predict the suitable physical activity based on personal context. This study will provide new insights in software development of healthcare technologies to support personalization of individuals in managing their own health.
Statistical survey and comprehensive review on human skin detection Hussein Ali Hussein Al Naffakh; Rozaida Ghazali; Nidhal Khdhair El Abbadi
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2486

Abstract

With the advancement of data society today, pictures have turned out to be increasingly imperative. Automatic detection of human skin has been an area of active research for the past few years. Human skin detection assumes a vital job in a wide scope of picture preparing applications going from face detection, steganography, face tracking, age detection, discover pornographic images, the discovery of skin diseases gesture analysis and substance based picture recovery frameworks and to different human PC association spaces. Detecting human skin in complex pictures have ended up being a difficult issue since skin shading can fluctuate drastically in its appearance because of numerous variables, for example, illumination, race, maturing, imaging conditions, and complex foundation. In this study, we will study and analyze skin researches, where we will treat the weakness of previous research of survey on human skin detection methods. The reason for this investigation is to give a state-of-the-art study on human skin molding and detection methods in 1998-2019 periods. Furthermore, this research presented the statistical study for each issue stated before. We finish up with a few ramifications for a future course. Study results will benefit all researchers who are interested in human skin detection topic.
Single event latch-up detection for nano-satellite external solar radiation mitigation system Norsuzila Yaa’cob; Muhammad Fauzan Ayob; Noraisyah Tajudin; Murizah Kassim; Azita Laily Yusof
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2488

Abstract

This paper presents the single event latch-up (SEL) detection for nano-satellite external solar radiation mitigation system. In this study, the SEL detection analysis was conducted using circuit test and simulation. An electrical power subsystem (EPS) is a part of all CubeSat bus subsystems and it comprises solar arrays, rechargeable batteries, and a power control and distribution unit (PCDU). In order to extract the maximum power generated by the solar arrays, a peak power tracking topology is required. This may lead to the SEL with the presence of high voltage produced by solar. To overcome the SEL problems, the circuit test and simulation must be done so that the flow of SEL will be easily detected and mitigate. The method that been used are by using microcontroller, the SEL will be created in the certain time. The programable integrated circuit (PIC) are used to mitigate SEL effect. It indicates that, the SEL occur very fast in certain time. When the simulation is conducted by using SPENVIS, the result shows, only single event upset (SEU) was affected on UiTMSAT-1.
Analyzing bit error rate of relay sensors selection in wireless cooperative communication systems Ahmed Allawy Alawady; Ahmed Alkhayyat; Mohammed Ahmed Jubair; Mustafa Hamid Hassan; Salama A. Mostafa
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2492

Abstract

Cooperative communication systems, which make use of the intermediate relays between the transmitter and the receiver, have been employed as an effective technique to combat the channel fading and to enhance system performance. Cooperative systems have some drawbacks such as high latency and may diversity order not guaranteed. To alleviate the negative effects of these factors, the relay selection protocol is employed in cooperative communication systems to increase overall cooperative system performance. Relay selection in the cooperative systems enables the source to cooperate with the single relay node rather than multiple relay nodes which guaranteed the diversity order.
A review of human skin detection applications based on image processing Hussein Ali Hussein Al Naffakh; Rozaida Ghazali; Nidhal Khdhair El Abbadi; Ali Nadhim Razzaq
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2497

Abstract

In computer science, virtual image processing is the use of a digital computer to manipulate digital images through an algorithm for many applications. To begin with a new research topic, the must trend application that gets many requests to develop should know. Therefore, many applications based on human skin and human life are reviewed in this article, such as detection, classification, blocking, cryptography, identification, localization, steganography, segmentation, tracking, and recognition. In this article, the published articles with the topic of human skin-based image processing are investigated. The international publishers, such as Springer, IEEE, arXiv, and Elsevier are selected. The searching is implemented with the duration criteria of 2015-2019. It noted that human skin detection and recognition are the most repetitive articles with 43% and 28.5%, respectively of the total number of the investigated articles. The usage of human skin models is being widely used in the image processing of various applications.

Page 88 of 291 | Total Record : 2901


Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue