cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
,
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Arjuna Subject : -
Articles 627 Documents
Context Based Classification of Reviews Using Association Rule Mining, Fuzzy Logics and Ontology Razia Sulthana A; Subburaj Ramasamy
Bulletin of Electrical Engineering and Informatics Vol 6, No 3: September 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (466.504 KB) | DOI: 10.11591/eei.v6i3.682

Abstract

The Internet has facilitated the growth of recommendation system owing to the ease of sharing customer experiences online. It is a challenging task to summarize and streamline the online textual reviews. In this paper, we propose a new framework called Fuzzy based contextual recommendation system. For classification of customer reviews we extract the information from the reviews based on the context given by users. We use text mining techniques to tag the review and extract context. Then we find out the relationship between the contexts from the ontological database. We incorporate fuzzy based semantic analyzer to find the relationship between the review and the context when they are not found therein. The sentence based classification predicts the relevant reviews, whereas the fuzzy based context method predicts the relevant instances among the relevant reviews. Textual analysis is carried out with the combination of association rules and ontology mining. The relationship between review and their context is compared using the semantic analyzer which is based on the fuzzy rules.
An Accurate Facial Component Detection Using Gabor Filter K. Sudhakar; P. Nithyanandam
Bulletin of Electrical Engineering and Informatics Vol 6, No 3: September 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (508.309 KB) | DOI: 10.11591/eei.v6i3.683

Abstract

Face detection is a critical task to be resolved in a variety of applications. Since faces include various expressions it becomes a difficult task to detect the exact output. Face detection not only play a main role in personal identification but also in various fields which includes but not limited to image processing, pattern recognition, graphics and other application areas. The proposed system performs the face detection and facial components using Gabor filter. The results show accurate detection of facial components
Optimized OFDM Model Using CMA Channel Equalization for BER Evaluation Pratima Manhas; M.K Soni
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (651.96 KB) | DOI: 10.11591/eei.v6i2.614

Abstract

Orthogonal Frequency Division Multiplexing (OFDM) is a type of Multicarrier Modulation (MCM) technique in which entire bandwidth is divided into large number of small sub-carriers and each subcarrier is transmitted parallel to achieve higher data rates. It has various applications like Digital Audio Broadcasting (DAB), Digital Video Broadcasting (DVB) and wireless LAN.OFDM technique is widely used in wireless communication system because of its very high data rate. The performance of FFT based OFDM system using Linear and cyclic channel coding and Constant Modulus Algorithm (CMA) equalizer is simulated using simulink model. The BER saving using the optimized proposed model with both linear and cyclic channel coding along with CMA equalizer is evaluated. The proposed work using cyclic channel coding with QPSK/QAM modulation and CMA as channel equalization under AWGN channel results in 52.6% and 96.3% BER reduction as compared to conventional OFDM model without channel coding, channel equalization and channel fading. So, CMA equalizer is used to enhance the performance of OFDM system.
Proactive Scheduling in Cloud Computing Ripandeep Kaur; Gurjot Kaur
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (492.247 KB) | DOI: 10.11591/eei.v6i2.649

Abstract

Autonomic fault aware scheduling is a feature quite important for cloud computing and it is related to adoption of workload variation. In this context, this paper proposes an fault aware pattern matching autonomic scheduling for cloud computing based on autonomic computing concepts.  In order to validate  the proposed solution, we performed two experiments one with traditional approach and other other with pattern recognition fault aware approach. The results show the effectiveness of the scheme.
A Hybrid Digital Watermarking Approach Using Wavelets and LSB Kumar, V. Ashok; Dharmaraj, C.; Rao, Ch. Srinivasa
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v6i2.650

Abstract

The present paper proposes a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. The present approach utilizes Alphabet Pattern (AP) approach generating shuffled image in the first stage and Pell’s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applies on each 5×5 sib images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image.  Apply the Discrete Cosign Transform in the first stage later applies N levels Discrete Wavelet Transform (DWT) for reducing up to the size of the watermark image. Insert the water mark image in LHn Sub band of the wavelet image using LSB concept. Simulation results show that proposed technique produces better PSNR and similarity measure. The experimental results indicate that present approach is more reliable and secure efficient.The robustness of the proposed scheme is evaluated against various image-processing attacks.
Watermarking and Cryptography Based Image Authentication on Reconfigurable Platform Altaf O. Mulani; P. B. Mane
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (571.515 KB) | DOI: 10.11591/eei.v6i2.651

Abstract

Now-a-days, multimedia based applications have been developed rapidly. Digital information is easy to process but it allows illegal users to access the data. For protecting the data from this illegal use, Digital Rights Management (DRM) can be used. DRM allows secure exchange of digital data over internet or other electronic media. In this paper, FPGA based implementation of DWT alongwith Advanced Encryption Standard (AES) based watermarking is discussed. With this approach, improved security can be achieved. The complete system is designed using HDL and simulated using Questasim and MATLAB Simulink model. The synthesis result shows that this implementation occupies only 2117 slices and maximum frequency reported for this design is 228.064 MHz.
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for an Evolving System C J Satish; Anand M
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (692.316 KB) | DOI: 10.11591/eei.v6i2.652

Abstract

Traceability Management plays a key role in tracing the life of a requirement through all the specifications produced during the development phase of a software project. A lack of traceability information not only hinders the understanding of the system but also will prove to be a bottleneck in the future maintenance of the system. Projects that maintain traceability information during the development stages somehow fail to upgrade their artefacts or maintain traceability among the different versions of the artefacts that are produced during the maintenance phase. As a result the software artefacts lose the trustworthiness and engineers mostly work from the source code for impact analysis. The goal of our research is on understanding the impact of visualizing traceability links on change management tasks for an evolving system. As part of our research we have implemented a Traceability Visualization Tool-VTrace that manages software artefacts and also enables the visualization of traceability links. The results of our controlled experiment show that subjects who used the tool were more accurate and faster on change management tasks than subjects that didn’t use the tool.
Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network Mirdan Syahid Mulya Sudrajat; Doan Perdana; Ridha Muldina Negara
Bulletin of Electrical Engineering and Informatics Vol 6, No 3: September 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (721.478 KB) | DOI: 10.11591/eei.v6i3.622

Abstract

Virtualization is a new revolutionary approach in networking industry, its make possible to build several virtual machine (VM) in one physical hardware. In virtualization practice, one VM might be connected to others, but not all of VM in one environment must be connected due the privacy and security issues. One of the solutions which can address this issue is tunneling protocol. Tunneling protocol is a layer-2-in-layer-3 protocol which can isolate tenant traffic in virtualize environment. This research conducted about the performance of VXLAN and NVGRE tunneling protocol which works on virtualize environment and aims to determine the perfomances of throughput, delay, jitter, and vCPU Usage using variable packet size in range of 128-1514 byte. From the the result, can be conclude that both of tunneling protocol can isolate the traffic between tenant. For the performance result, NVGRE has the highest value of throughput, 771,02 Mbps and the VXLAN got 753,62 Mbps. For the delay NVGRE got 2.24 ms and VXLAN got 2.29 ms. For the jitter, NVGRE has better rate value of 0.361 ms, than VXLAN value of 0.348 ms, and the vCPU usage performance, NVGRE has the highest performance too that value is 60.57%. So on overall performance NVGRE has the better performance than VXLAN.
Electronic Information Board Based on AVR Atmega128 for TEWS in Cilacap Galih Mustiko Aji; Artdhita Fajar Pratiwi; Purwiyanto Purwiyanto; Chairunnisa Chairunnisa; Achmad Munir
Bulletin of Electrical Engineering and Informatics Vol 7, No 2: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1191.449 KB) | DOI: 10.11591/eei.v7i2.677

Abstract

Dissemination methods of tsunami Information in Cilacap uses voice and siren. There are some constraints on the methods, especially in social aspects for particular society. Utilization of electronic information board is one of alternative solutions that can be offered to the society in responding tsunami information or warning. In this paper, a wireless electronic information board is designed to display the tsunami disaster warning visually. In normal condition or when there is no disaster, the information board can be utilized to display the information about evacuation procedure. The proposed electronic information board is implemented in multicolor using three sets of LED dot matrix panel P10 which have 32 x 16 pixels resolution and is controlled using microcontroller. The result showed that this device was capable to show the tsunami information such as “Status Awas”, “Status Siaga”, “Status Waspada”, and “Evacuation Route”.
Robot Motion Control Using the Emotiv EPOC EEG System Sandy Akbar Dewangga; Handayani Tjandrasa; Darlis Herumurti
Bulletin of Electrical Engineering and Informatics Vol 7, No 2: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (360.633 KB) | DOI: 10.11591/eei.v7i2.678

Abstract

Brain-computer interfaces have been explored for years with the intent of using human thoughts to control mechanical system. By capturing the transmission of signals directly from the human brain or electroencephalogram (EEG), human thoughts can be made as motion commands to the robot. This paper presents a prototype for an electroencephalogram (EEG) based brain-actuated robot control system using mental commands. In this study, Linear Discriminant Analysis (LDA) and Support Vector Machine (SVM) method were combined to establish the best model. Dataset containing features of EEG signals were obtained from the subject non-invasively using Emotiv EPOC headset. The best model was then used by Brain-Computer Interface (BCI) to classify the EEG signals into robot motion commands to control the robot directly. The result of the classification gave the average accuracy of 69.06%.