cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
,
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Arjuna Subject : -
Articles 627 Documents
Routing in Networks using Genetic Algorithm Meenakshi Moza; Suresh Kumar
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (472.962 KB) | DOI: 10.11591/eei.v6i1.574

Abstract

With the increase in traffic, internet service providers are trying their best to provide maximum utilization of resources available. The current traffic load has to be taken into account for computation of paths in routing protocols. Network applications; require the shortest paths to be used for communication purposes. Addressing the selection of path, from a known source to destination is the basic aim of this paper. This paper proposes a method of calculating the shortest path for a network using a combination of Open shortest path first and Genetic Algorithm (OSGA). Genetic Algorithm is used in this paper for optimization of routing. It helps in enhancing the performance of the routers.
Comparison of PID Controller with Model Predictive Controller for Milk Pasteurization Process Tesfaye Alamirew; V. Balaji; Nigus Gabbeye
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (650.155 KB) | DOI: 10.11591/eei.v6i1.575

Abstract

Proportional–Integral–Derivative (PID) controllers are used in many of the Industries for various process control applications. PID controller yields a long settling time and overshoot which is not good for the process control applications. PID is not suitable for many of the complex process control applications. This research paper is about developing  a better type of controller, known as MPC (Model Predictive Control). The aim of the paper is to design MPC and PID for a pasteurization process. In this manuscript comparison of PID controller with MPC is made and the responses are presented. MPC is an advanced control strategy that uses the internal dynamic model of the process and a history of past control moves and a combination of many different technologies to predict the future plant output. The dynamics of the pasteurization process was estimated by using system identification from the experimental data. The quality of different model structures was checked using best fit with data validation, residual and stability analysis. Auto-regressive with exogenous input (ARX322) model was chosen as a model structure of the pasteurization process and fits about 80.37% with datavalidation. MPC and PID control strategies were designed using ARX322 model structure. The controller performance was compared based on settling time, percent of overshoot and stability analysis and the results are presented.
Adaptive Fuzzy Gain of Power System Stabilizer to Improve the Global Stability Mohammed Mekhanet; Lakhdar Mokrani; Aissa Ameur; Yacine Attia
Bulletin of Electrical Engineering and Informatics Vol 5, No 4: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (687.959 KB) | DOI: 10.11591/eei.v5i4.576

Abstract

The lead-lag power system stabilizer has several parameters to be optimized.In fact, the number of these latter increases with the number of generators constituting the multi-machine system.In this work, we propose anew approach of an adaptive and robust PSS; it achieves encouraging results by adjusting the gain using fuzzy logic and in the same time we use the same PSSs for each machine. In the first place, we could check that the gain is among the most critical parameters of the lead lag PSS. The parameters are globally optimized by the genetic algorithm, after that an expertise on the speed and the gain variations allow the value prediction according to the velocity deviation. To validate our results, a robustness test was made on a multimachine system IEEE (3 machines 9 bus), for different loads and the results showed good performance and robustness of the presented PSS.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing Algorithm Rakesh Kumar Saini; Ritika Ritika; Sandip Vijay
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (356.459 KB) | DOI: 10.11591/eei.v6i1.577

Abstract

Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
Z Source Inverter Topologies-A Survey V. Saravanan; M. Aravindan; V. Balaji; M. Arumugam
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (423.145 KB) | DOI: 10.11591/eei.v6i1.579

Abstract

Need for alternative energy sources to satisfy the rising demand in energy consumption elicited the research in the area of power converters/inverters. An increasing interest of using Z source inverter/converter in power generation involving renewable energy sources like wind and solar energy for both off grid and grid tied schemes were originated from 2003. This paper surveys the literature of Z source inverters/converter topologies that were developed over the years.
Performance of OFDM System under Different Fading Channels and Channel Coding Pratima Manhas; M. K. Soni
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (441.58 KB) | DOI: 10.11591/eei.v6i1.591

Abstract

Orthogonal frequency division multiplexing (OFDM) is a type of multicarrier modulation (MCM) technique in which larger bandwidth is divided into parallel narrow bands each of which is modulated by different subcarriers. All the subcarriers are orthogonal to each other and hence it reduces the interference among various subcarriers. OFDM technique is an efficient modulation technique used in certain wired and wireless application.In a wireless communication channel, the transmitted signal can travel from transmitter to receiver over multiple reflective paths. This results to multipath fading which causes fluctuations in amplitude, phase and angle of arrival of the received signal. For example, the signal which is transmitted from BTS (base transceiver station) may suffer multiple reflections from the buildings nearby, before reaching the mobile station. Such multipath fading channels are classified into slow fading/fast fading and frequency-selective/flat fading channels. This paper discusses the performance of OFDM system using various fading channels and channel coding. The parameter which is known as Bit error rate (BER) is calculated under different fading channels (AWGN, Rayleigh and Rician) for different digital modulation (BPSK, QPSK and QAM) and Channel coding (linear/Cyclic coding). Matlab Simulink tool is used to calculate the BER parameter.
Circuits for Optical Based Line of Sight Voice Communication Devasis Haldar; Shagun Panwar; Vipul Kumar; Ayush Goswami; Sakshi Dhawan
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (321.791 KB) | DOI: 10.11591/eei.v6i1.592

Abstract

We present here line of sight communication between a person and his neighbour with the help of optical signal produced by a laser torch which act as a carrier. It is therefore a wireless communication and the transmission can go up to 500 meters. We used photodiode to receive the signal at the receiver. The transmitter circuit comprises condenser microphone transistor amplifier BC547 followed by an op-amp stage built around µA741. When we give a voice signal from the mike, it converts the voice signal into the electrical signal. This electrical signal is fed to IC741 (op-amp) for amplification. The gain of the op-amp can be controlled with the help of 1-mega-ohm potentiometer. The AF output from IC is coupled to the base of a class B amplifier which, in turn, modulates the signal. The transmitter uses 5V power supply. However, the 3-volt laser torch (after removal of its battery) can be directly connected to the circuit-with the body of the torch connected to the class B. The photodiode converts the optical signal into electrical signal and again this signal is amplified using IC741 and a combination of class B push pull amplifiers. The receiver circuit uses an NPN photodiode as the light sensor that is followed by a two-stage transistor preamplifier and IC741 based audio Power amplifier. The receiver does not need any complicated alignment. Just keep the photodiode oriented towards the remote transmitter’s laser point and adjust the volume control for a clear sound. The sensor must not directly face the sun.
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics Abdul Fadlil; Imam Riadi; Sukma Aji
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (995.882 KB) | DOI: 10.11591/eei.v6i2.605

Abstract

Distributed Denial of Service (DDoS) is a type of attack using the volume, intensity, and more costs mitigation to increase in this era. Attackers used many zombie computers to exhaust the resources available to a network, application or service so that authorize users cannot gain access or the network service is down, and it is a great loss for Internet users in computer networks affected by DDoS attacks. In the Network Forensic, a crime that occurs in the system network services can be sued in the court and the attackers will be punished in accordance with law. This research has the goal to develop a new approach to detect DDoS attacks based on network traffic activity were statistically analyzed using Naive Bayes method. Data were taken from the training and testing of network traffic in a core router in Master of Information Technology Research Laboratory University of Ahmad Dahlan Yogyakarta. The new approach in detecting DDoS attacks is expected to be a relation with Intrusion Detection System (IDS) to predict the existence of DDoS attacks.
Segmentation Comparing Eggs Watermarking Image and Original Image Anton Yudhana; Sunardi Sunardi; Shoffan Saifullah
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (436.281 KB) | DOI: 10.11591/eei.v6i1.595

Abstract

The research used watermarking techniques to obtain the image originality. The aims of the research were to identify small area in eggs properly and compared preprocessing, the methods, and the results of image processing. The study has been improved from the previous papers by combined all methods and analysis was obtained.This study was conducted by using centroid and the bounding box for determining the object and the small area of chicken eggs. The segmentation method was used to compare the original image and the watermarked image. Image processing using image data that are subject watermark to maintain the authenticity of the images used in the study will the impact in delivering the desired results. In the identification of chicken eggs using watermark image using several methods are expected to provide results as desired. Segmentation also deployed to process the Image and counted the objects. The results showed that the process of segmentation and objects counting determined that the original image and watermarked image had the same value and recognized eggs. Identification had determined percentage of 100% for all the samples.
Chaos Image Encryption Methods: A Survey Study Sabah Fadhel; Mohd Shafry; Omar Farook
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (235.1 KB) | DOI: 10.11591/eei.v6i1.599

Abstract

With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.