cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
,
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Arjuna Subject : -
Articles 627 Documents
Performance Comparison of Artificial Intelligence Techniques for Non-intrusive Electrical Load Monitoring Khairuddin Khalid; Azah Mohamed; Ramizi Mohamed; Hussain Shareef
Bulletin of Electrical Engineering and Informatics Vol 7, No 2: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (743.69 KB) | DOI: 10.11591/eei.v7i2.1190

Abstract

The increased awareness in reducing energy consumption and encouraging response from the use of smart meters have triggered the idea of non-intrusive load monitoring (NILM). The purpose of NILM is to obtain useful information about the usage of electrical appliances usually measured at the main entrance of electricity to obtain aggregate power signal by using a smart meter. The load operating states based on the on/off loads can be detected by analysing the aggregate power signals. This paper presents a comparative study for evaluating the performance of artificial intelligence techniques in classifying the type and operating states of three load types that are usually available in commercial buildings, such as fluorescent light, air-conditioner and personal computer. In this NILM study, experiments were carried out to collect information of the load usage pattern by using a commercial smart meter. From the power parameters captured by the smart meter, effective signal analysis has been done using the time time (TT)-transform to achieve accurate load disaggregation. Load feature selection is also considered by using three power parameters which are real power, reactive power and the TT-transform parameters. These three parameters are used as inputs for training the artificial intelligence techniques in classifying the type and operating states of the loads. The load classification results showed that the proposed extreme learning machine (ELM) technique has successfully achieved high accuracy and fast learning compared with artificial neural network and support vector machine. Based on validation results, ELM achieved the highest load classification with 100% accuracy for data sampled at 1 minute time interval.
Optimal Configuration of Wind Farms in Radial Distribution System Using Particle Swarm Optimization Technique Mahesh Kumar; Bhagwan Das; Perumal Nallagownden; Irraivan Elamvazuthi; Sadia Ali Khan
Bulletin of Electrical Engineering and Informatics Vol 7, No 2: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (926.487 KB) | DOI: 10.11591/eei.v7i2.1224

Abstract

Recently, a wide range of wind farm based distributed generations (DGs) are being integrated into distribution systems to fulfill energy demands and to reduce the burden on transmission corridors. The non-optimal configuration of DGs could severely affect the distribution system operations and control. Hence, the aim of this paper is to analyze the wind data in order to build a mathematical model for power output and pinpoint the optimal location. The overall objective is minimization of power loss reduction in distribution system. The five years of wind data was taken from 24o 44’ 29” North, 67o 35’ 9” East coordinates in Pakistan. The optimal location for these wind farms were pinpointed via particle swarm optimization (PSO) algorithm using standard IEEE 33 radial distribution system. The result reveals that the proposed method helps in improving renewable energy near to load centers, reduce power losses and improve voltage profile of the system. Moreover, the validity and performance of the proposed model were also compared with other optimization algorithms.
Distributed Scheme To Authenticate Data Storage Security In Cloud Computing Bandarupalli, Rakesh; Rajitha, O.; Parveen Sultana, H.
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v7i3.715

Abstract

Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centers, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features.  Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers.  In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the data management and services may not be absolutely truthful.  This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation and Feature Point Matching Anil Gupta
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (306.232 KB) | DOI: 10.11591/eei.v7i3.754

Abstract

With the development of Image processing editing tools and software, an image can be easily manipulated. The image manipulation detection is vital for the reason that an image can be used as legal evidence, in the field of forensics investigations, and also in numerous various other fields. The image forgery detection based on pixels aims to validate the digital image authenticity with no aforementioned information of the main image. There are several means intended for tampering a digital image, for example, copy-move or splicing, resampling a digital image (stretch, rotate, resize), removal as well as the addition of an object from your image. Copy move image forgery detection is utilized to figure out the replicated regions as well as the pasted parts, however forgery detection may possibly vary dependant on whether or not there is virtually any post-processing on the replicated part before inserting the item completely to another party. Typically, forgers utilize many operations like rotation, filtering, JPEG compression, resizing as well as the addition of noise to the main image before pasting, that make this thing challenging to recognize the copy move image forgery. Hence, forgery detector needs to be robust to any or all manipulations and also the latest editing software tools. This research paper illustrates recent issues in the techniques of forgery detection and proposes a advanced copy–move forgery detection scheme using adaptive over-segmentation and feature point matching. The proposed scheme integrates both block-based and key point-based forgery detection methods.
SGSC Framework: Smart Government in Supply Chain Based on FODA Ahmad Nurul Fajar; Ditdit Nugeraha Utama
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (505.337 KB) | DOI: 10.11591/eei.v7i3.817

Abstract

Smart System has implemented in government sector. There are varies Implementation that was utilized by research activities for numerous domains is very broad. Besides that, the Industry, transportation and health, also where such a system is incredibly beneficial. This study discuss supply chain and governmental link issue, coordination of all stakeholder in supply chain has to reflect the government role. It support with the condition in Indonesian government environment is unique. It is a challenge to construct smart system based on Feature Oriented Domain Analysis (FODA) approach. It can produce software product line (SPL). We proposed framework for develop software product line for smart supply chain in government sector. It is used to enhance and improve the development of software systems by multiple software system developers. It will be a guidance for construct smart government, and more specificity in supply chain for government system area environment. It is called SGSC Framework. It consists of four layers, such as optimization layer, integration layer, supply chain layer and data layer.
An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method Prajna Deshanta Ibnugraha; Lukito Edi Nugroho; Paulus Insap Santosa
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (835.108 KB) | DOI: 10.11591/eei.v7i3.847

Abstract

Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
E-Learning Effectiveness Analysis in Developing Countries: East Nusa Tenggara, Indonesia Perspective Sfenrianto Sfenrianto; Ellen Tantrisna; Habibullah Akbar; Mochamad Wahyudi
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (244.482 KB) | DOI: 10.11591/eei.v7i3.849

Abstract

The adoption of e-learning in developing countries like Indonesian Universities have been focused in urban areas like the big cities, especially in Java island. There is a lack of development of e-learning in a remote city like Kupang East Nusa Tenggara Indonesia which is located far away from the capital city. This research aims to assess the effectiveness of e-learning by analyzing three factors in one of the higher institution in Kupang city, i.e. Sekolah Tinggi Kesehatan Citra Mandiri Husada Kupang (STIKes CHMK). The factors include culture, technology and infrastructure, and content satisfaction. The data were collected using questionnaires. Research shows that with proper preparation for e-learning, the acceptance of e-learning in rural areas is significantly high. This finding suggests that e-learning can greatly benefit the students like Kupang city in developing countries.
Speaker Recognition in Content-based Image Retrieval for a High Degree of Accuracy Suhartono Suhartono; Fresy Nugroho; Muhammad Faisal; Muhammad Ainul Yaqin; Suyanta Suyanta
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (728.047 KB) | DOI: 10.11591/eei.v7i3.957

Abstract

The purpose of this research is to measure the speaker recognition accuracy in Content-Based Image Retrieval. To support research in speaker recognition accuracy, we use two approaches for recognition system: identification and verification, an identification using fuzzy Mamdani, a verification using Manhattan distance. The test results in this research. The best of distance mean is size 32x32. The best of the verification for distance rate is 965, and the speaker recognition system has a standard error of 5% and the system accuracy is 95%. From these results, we find that there is an increase in accuracy of almost 2.5%. This is due to a combination of two approaches so the system can add to the accuracy of speaker recognition.
Oscillatory Stability Prediction Using PSO Based Synchronizing and Damping Torque Coefficients Nor Azwan Mohamed Kamari; I. Musirin; Z. A. Hamid; M. H. M. Zaman
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (651.535 KB) | DOI: 10.11591/eei.v7i3.961

Abstract

This paper presents the assessment of stability domains for the angle stability condition of the power system using Particle Swarm Optimization (PSO) technique. An efficient optimization method using PSO for synchronizing torque coefficients Ks and damping torque coefficients Kd to identify the angle stability condition on multi-machine system. In order to accelerate the determination of angle stability, PSO is proposed to be implemented in this study. The application of the proposed algorithm has been justified as the most accurate with lower computation time as compared to other optimization techniques such as Evolutionary Programming (EP) and Artificial Immune System (AIS). Validation with respect to eigenvalues determination, Least Square (LS) method and minimum damping ratio ξmin confirmed that the proposed technique is feasible to solve the angle stability problems.
Creating Color Image Features Using Local Contrast Method Ayman Al-Rawashdeh; Ziad Al-Qadi
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (699.305 KB) | DOI: 10.11591/eei.v7i3.1216

Abstract

Digital color images are now one of the most popular data types used in the digital processing environment. Color image recognition plays an important role in many vital applications, which makes the enhancement of image recognition or retrieval system an important issue. Using color image pixels to recognize or retrieve the image, but the issue of the huge color image size that requires accordingly more time and memory space to perform color image recognition and/or retrieval. In the current study, image local contrast was used to create local contrast victor, which was then used as a key to recognize or retrieve the image. The proposed local contrast method was properly implemented and tested. The obtained results proved its efficiency as compared with other methods.