Bulletin of Electrical Engineering and Informatics
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Articles
2,901 Documents
3D Reconstruction using convolution smooth method
Sofyan Arifianto;
Hardianto Wibowo;
Wildan Suharso;
Raditya Novidianto;
Dani Harmanto
Bulletin of Electrical Engineering and Informatics Vol 10, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i3.1991
3D imagery is an image with depth data. The use of depth information in 3D images still has many drawbacks, especially in the image results. Raw data on the 3D camera even does not look smooth, and there is too much noise. Noise in the 3D image is in the form of imprecise data, which results in a rough image. This research will use the convolution smooth methods to improve the 3D image. Will smooth noise in the 3D image, so the resulting image will be better. This smoothing system is called the blurring effect. This research has been tested on flat objects and objects with a circle contour. The test results on the flat surface obtained a distance of 1.3177, the test in the object with a flat surface obtained a distance of 0.4937, and the test in circle contour obtained a distance of 0.3986. This research found that the 3D image will be better after applying the convolution smooth method.
Band pass filter comparison of Hairpin line and square open-loop resonator method for digital TV community
Budi Prasetya;
Yuyun Siti Rohmah;
Dwi Andi Nurmantris;
Sarah Mulyawati;
Reza Dipayana
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2003
The selection of the right filter design method is a very important first step for a radio frequency engineer. This paper presents the comparison of two methods of band pass filter design using hairpin-line and square open-loop resonator. Both methods were applied to obtain filter designs that can work for broadcasting system in digital television community. Band pass filter was simulated using design software and fabricated using epoxy FR-4 substrate. The results of simulation and measurement shown return loss value at 27.3 dB for hairpin line band pass filter and 25.901 for square open-loop resonator band pass filter. Voltage standing wave ratio parameter values were 1.09 and 1.1067 for hairpin line and square open-loop band pass filter respectively. The insertion loss values for the Hairpin line band pass filter and square open-loop band pass filter were 0.9692 and near 0 dB, respectively. Fractional bandwidth, for hairpin line band pass filter, was 6.7% while for square open-loop band pass filter was 4.8%. Regarding the size, the dimension of square open-loop resonator was approximately five times larger than hairpin-line band pass filter. Based on the advantages of the hairpin line method, we recommend that researchers choose the filter for digital TV broadcasting.
Effect of the defected microstrip structure shapes on the performance of dual-band bandpass filter for wireless communications
Mussa Mabrok;
Zahriladha Zakaria;
Yully Erwanti Masrukin;
Tole Sutikno;
Hussein Alsariera
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2662
Due to the progression growth of multiservice wireless communication systems in a single device, multiband bandpass filter has attract a great attention to the end user. Therefore, multiband bandpass filter is a crucial component in the multiband transceivers systems which can support multiple services in one device. This paper presents a design of dual-band bandpass filter at 2.4 GHz and 3.5 GHz for WLAN and WiMAX applications. Firstly, the wideband bandpass filter is designed at a center frequency of 3 GHz based on quarter-wavelength short circuited stub. Three types of defected microstrip structure (DMS) are implemented to produce a wide notch band, which are T-inversed shape, C-shape, and U-shape. Based on the performance comparisons, U-shaped DMS is selected to be integrated with the bandpass filter. The designed filter achieved two passbands centered at 2.51 GHz and 3.59 GHz with 3 dB bandwidth of 15.94% and 15.86%. The proposed design is very useful for wireless communication systems and its applications such as WLAN and WiMAX.
A study of edge preserving filters in image matching
Rostam Affendi Hamzah;
A. F. Kadmin;
S. F. A. Gani;
K. A. Aziz;
T. M. F. T. Wook;
N. Mohamood;
M. G. Y. Wei
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.1947
This article presents a study on edge preserving filters in image matching which comprises a development of stereo matching algorithm using two edge preserving filters. Fundamentally, the framework is reconstructed by several sequential processes. The output of these processes is a disparity map or depth map. The corresponding points between two images require accurate matching to make accurate depth map estimation. Thus, the propose work in this article utilizes sum of squared differences (SSD) with dual edge preserving filters. These filters are used due to edge preserved properties and to increase the accuracy. The median filter (MF) and bilateral filter (BF) will be utilized. The SSD produces preliminary results with low noise and the edge preserving filters reduce noise on the low texture regions with edge preserving properties. Based on the experimental analysis using the standard benchmarking evaluation system from the Middlebury, the disparity map produced is 6.65% for all error pixels. It shows an accurate edge preserved properties on the disparity maps. To make the proposed work more reliable with current available methods, the quantitative measurement has been made to compare with other existing methods and it displays the proposed work in this article perform much better.
An improved age invariant face recognition using data augmentation
Kennedy Okokpujie;
Samuel John;
Charles Ndujiuba;
Joke A. Badejo;
Etinosa Noma- Osaghae
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2356
In spite of the significant advancement in face recognition expertise, accurately recognizing the face of the same individual across different ages still remains an open research question. Face aging causes intra-subject variations (such as geometric changes during childhood and adolescence, wrinkles and saggy skin in old age) which negatively affects the accuracy of face recognition systems. Over the years, researchers have devised different techniques to improve the accuracy of age invariant face recognition (AIFR) systems. In this paper, the face and gesture recognition network (FG-NET) aging dataset was adopted to enable the benchmarking of experimental results. The FG-Net dataset was augmented by adding four different types of noises at the preprocessing phase in order to improve the trait aging face features extraction and the training model used at the classification stages, thus addressing the problem of few available training aging for face recognition dataset. The developed model was an adaptation of a pre-trained convolution neural network architecture (Inception-ResNet-v2) which is a very robust noise. The proposed model on testing achieved a 99.94% recognition accuracy, a mean square error of 0.0158 and a mean absolute error of 0.0637. The results obtained are significant improvements in comparison with related works.
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
Chi- Bao Le;
Dinh- Thuan Do
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2102
This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV) relays which is suitable to implement in the internet of things (IoT) systems. To enhance system performance in order to overcome the large scale fading between the base station (BS) and destination as well as achieve the higher spectrum efficiency, where non-orthogonal multiple access (NOMA) strategies were typically applied for UAV relays to implement massive connections transmission. In particular, outage probability is evaluated via signal to noise ratio (SNR) criterion so that the terminal node can obtain reasonable performance. The derivations and analysis results showed that the considered fixed power allocation scheme provides performance gap among two signals at destination.The numerical simulation confirmed the exactness of derived expressions in the UAV assisted system.
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
Do, Dinh-Thuan;
Le, Chi-Bao
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2102
This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV) relays which is suitable to implement in the internet of things (IoT) systems. To enhance system performance in order to overcome the large scale fading between the base station (BS) and destination as well as achieve the higher spectrum efficiency, where non-orthogonal multiple access (NOMA) strategies were typically applied for UAV relays to implement massive connections transmission. In particular, outage probability is evaluated via signal to noise ratio (SNR) criterion so that the terminal node can obtain reasonable performance. The derivations and analysis results showed that the considered fixed power allocation scheme provides performance gap among two signals at destination.The numerical simulation confirmed the exactness of derived expressions in the UAV assisted system.
Data falsification attacks in advanced metering infrastructure
Hasventhran Baskaran;
Abbas M. Al-Ghaili;
Zul- Azri Ibrahim;
Fiza Abdul Rahim;
Saravanan Muthaiyah;
Hairoladenan Kasim
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2024
Smart grids are the cutting-edge electric power systems that make use of the latest digital communication technologies to supply end-user electricity, but with more effective control and can completely fill end user supply and demand. Advanced Metering Infrastructure (AMI), the backbone of smart grids, can be used to provide a range of power applications and services based on AMI data. The increased deployment of smart meters and AMI have attracted attackers to exploit smart grid vulnerabilities and try to take advantage of the AMI and smart meter’s weakness. One of the possible major attacks in the AMI environment is False Data Injection Attack (FDIA). FDIA will try to manipulate the user’s electric consumption by falsified the data supplied by the smart meter value in a smart grid system using additive and deductive attack methods to cause loss to both customers and utility providers. This paper will explore two possible attacks, the additive and deductive data falsification attack and illustrate the taxonomy of attack behaviors that results in additive and deductive attacks. This paper contributes to real smart meter datasets in order to come up with a financial impact to both energy provider and end-user.
Data falsification attacks in advanced metering infrastructure
Baskaran, Hasventhran;
Al-Ghaili, Abbas M.;
Ibrahim, Zul-Azri;
Rahim, Fiza Abdul;
Muthaiyah, Saravanan
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2024
Smart grids are the cutting-edge electric power systems that make use of the latest digital communication technologies to supply end-user electricity, but with more effective control and can completely fill end user supply and demand. Advanced Metering Infrastructure (AMI), the backbone of smart grids, can be used to provide a range of power applications and services based on AMI data. The increased deployment of smart meters and AMI have attracted attackers to exploit smart grid vulnerabilities and try to take advantage of the AMI and smart meter’s weakness. One of the possible major attacks in the AMI environment is False Data Injection Attack (FDIA). FDIA will try to manipulate the user’s electric consumption by falsified the data supplied by the smart meter value in a smart grid system using additive and deductive attack methods to cause loss to both customers and utility providers. This paper will explore two possible attacks, the additive and deductive data falsification attack and illustrate the taxonomy of attack behaviors that results in additive and deductive attacks. This paper contributes to real smart meter datasets in order to come up with a financial impact to both energy provider and end-user.
A Review of anomaly detection techniques in advanced metering infrastructure
Abbas M. Al-Ghaili;
Zul- Azri Ibrahim;
Syazwani Arissa Shah Hairi;
Fiza Abdul Rahim;
Hasventhran Baskaran;
Noor Afiza Mohd Ariffin;
Hairoladenan Kasim
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v10i1.2026
Advanced Metering Infrastructure (AMI) is a component of electrical networks that combines the energy and telecommunication infrastructure to collect, measure and analyze consumer energy consumptions. One of the main elements of AMI is a smart meter that used to manage electricity generation and distribution to end-user. The rapid implementation of AMI raises the need to deliver better maintenance performance and monitoring more efficiently while keeping consumers informed on their consumption habits. The convergence from analog to digital has made AMI tend to inherit the current vulnerabilities of digital devices that prone to cyber-attack, where attackers can manipulate the consumer energy consumption for their benefit. A huge amount of data generated in AMI allows attackers to manipulate the consumer energy consumption to their benefit once they manage to hack into the AMI environment. Anomalies detection is a technique can be used to identify any rare event such as data manipulation that happens in AMI based on the data collected from the smart meter. The purpose of this study is to review existing studies on anomalies techniques used to detect data manipulation in AMI and smart grid systems. Furthermore, several measurement methods and approaches used by existing studies will be addressed.