Bulletin of Electrical Engineering and Informatics
Bulletin of Electrical Engineering and Informatics ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication, computer engineering, computer science, information technology and informatics from the global world. The journal publishes original papers in the field of electrical (power), electronics, instrumentation & control, telecommunication and computer engineering; computer science; information technology and informatics. Authors must strictly follow the guide for authors. Please read these instructions carefully and follow them strictly. In this way you will help ensure that the review and publication of your paper is as efficient and quick as possible. The editors reserve the right to reject manuscripts that are not in accordance with these instructions.
Articles
22 Documents
Search results for
, issue
"Vol 7, No 4: December 2018"
:
22 Documents
clear
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Prajanto Wahyu Adi;
Farah Zakiyah Rahmanti;
Edy Winarno
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1012.114 KB)
|
DOI: 10.11591/eei.v7i4.690
CRT was a widely used algorithm in the development of watermarking methods. The algorithm produced good image quality but it had low robustness against compression and filtering. This paper proposed a new watermarking scheme through dual band IWT to improve the robustness and preserving the image quality. The high frequency sub band was used to index the embedding location on the low frequency sub band. In robustness test, the CRT method resulted average NC value of 0.7129, 0.4846, and 0.6768 while the proposed method had higher NC value of 0.7902, 0.7473, and 0.8163 in corresponding Gaussian filter, JPEG, and JPEG2000 compression test. Meanwhile the both CRT and proposed method had similar average SSIM value of 0.9979 and 0.9960 respectively in term of image quality. The result showed that the proposed method was able to improve the robustness and maintaining the image quality.
A Simple Way to Maintain the Top 50 Ranking Scientists in the SINTA from Excessive Self-Citations
Tole Sutikno;
Herman Yuliansyah;
Lina Handayani
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v7i4.674
Top 50 authors in the Science and Technology Index (SINTA) is become popular as Indonesian top 50 ranking scientists to measure both the productivity and quality of the publications. Unfortunately, to get a high ranking in SINTA, some authors are strongly indicated that they do instant and unfair ways through citation cartels or self-citation. Based on manual investigation, excessive self-citations are conducted through publication in international conference. This paper proposed a simple way to drop abuse of excessive self-citations by categorized research articles as main publication and others as secondary publication based on Scopus database. This method is proposed to avoid perverse and unintended effects on the direction of research and publication in Indonesia.
Defense-through-Deception Network Security Model: Securing University Campus Network from DOS/DDOS Attack
M. A. Naagas;
E. L. Mique Jr;
T. D. Palaoag;
J. S. Dela Cruz
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (576.494 KB)
|
DOI: 10.11591/eei.v7i4.1349
Denial of Service (DOS) and (DDOS) Distributed Denial of Service attacks have become a major security threat to university campus network security since most of the students and teachers prepare online services such as enrolment, grading system, library etc. Therefore, the issue of network security has become a priority to university campus network management. Using online services in university network can be easily compromised. However, traditional security mechanisms approach such as Defense-In-Depth (DID) Model is outdated in today’s complex network and DID Model has been used as a primary cybersecurity defense model in the university campus network today. However, university administration should realize that Defense-In-Depth (DID) are playing an increasingly limited role in DOS/DDoS protection and this paper brings this fact to light. This paper presents that the Defense-In-Depth (DID) is not capable of defending complex and volatile DOS/DDOS attacks effectively. The test results were presented in this study in order to support our claim. The researchers established a Defense-In-Depth (DID) Network model at the Central Luzon State University and penetrated the Network System using DOS/DDOS attack to simulate the real network scenario. This paper also presents the new approach Defense-through-Deception network security model that improves the traditional passive protection by applying deception techniques to them that give insights into the limitations posed by the Defense-In-Depth (DID) Model. Furthermore, this model is designed to prevent an attacker who has already entered the network from doing damage.
Simple Mail Box Design of Dual Band Microstrip Patch Antenna for Wireless LAN Communications
K. Thana Pakkiam;
K. Baskaran;
J. S. Mandeep
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (558.548 KB)
|
DOI: 10.11591/eei.v7i4.1350
In this paper, a simple mail box design of a dual band microstrip patch antenna, is proposed, designed, fabricated and measured for wireless LAN communications. The proposed antenna is designed using the TLC 30 (TACONIC) substrate, with a relative permittivity of 4.3 and substrate height of 1.6mm. It is designed to operate at 2.44 GHz and 5. 30 GHz respectively. The proposed antenna is the size of 31mm x 34mm x1.6mm and is incited by a 50 Ω micro strip feed line. The characteristics of the antenna are designed and the performance of the modelled antenna is evaluated using CST Microwave Studio. The return loss, radiation patterns and peak antenna gain of 6.5 dBi for frequency 2.44 GHz and 6.2 dBi for 5.30 GHz is separately and successfully plotted. The fabricated prototype exhibits an agreement between the measured and simulated return loss.
Hybridization of Bat and Genetic Algorithm to Solve N-Queens Problem
Abbas Fadhile Jasim Al-Gburi;
Syibrah Naim;
Aziz Nasser Boraik
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (461.907 KB)
|
DOI: 10.11591/eei.v7i4.1351
In this paper, a hybrid of Bat-Inspired Algorithm (BA) and Genetic Algorithm (GA) is proposed to solve N-queens problem. The proposed algorithm executes the behavior of microbats with changing pulse rates of emissions and loudness to final all the possible solutions in the initialization and moving phases. This dataset applied two metaheuristic algorithms (BA and GA) and the hybrid to solve N-queens problem by finding all the possible solutions in the instance with the input sizes of area 8*8, 20*20, 50*50, 100*100 and 500*500 on a chessboard. To find the optimal solution, consistently, ten run have been set with 100 iterations for all the input sizes. The hybrid algorithm obtained substantially better results than BA and GA because both algorithms were inferior in discovering the optimal solutions than the proposed randomization method. It also has been discovered that BA outperformed GA because it requires a reduced amount of steps in determining the solutions.
Fuzzy Logic Approach to Identify Deprivation Index in Peninsular Malaysia
Muhammad Azam Haris Che Amat;
Syibrah Naim;
Syerrina Zakaria
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (441.46 KB)
|
DOI: 10.11591/eei.v7i4.1352
Deprivation indices are similar to inequalities index or index of disadvantageous. It was built to measure the basic necessities in a specific study area or region. There were many indices that have been constructed in the previous study. However, since these indices had depended mostly on two factors; socio-economic conditions and geography of the study area, thus different result would be generated in different areas. The objective of this study is to construct the new index based on above factors in Peninsular Malaysia by using a fuzzy logic approach. This study employed twelve variables from different facilities condition that was obtained from Malaysia 2000’s census report. These variables were considered as input parameters in the fuzzy logic system. Data turned into linguistic variables and shaped into rules in the form of IF-ELSE conditions. After that, the centroid of area method is applied to acquire the final deprivation index for a specific district in Peninsular Malaysia. The result showed that less developed states generated lower index for examples Kelantan and Kedah while more developed states generated a higher index for examples Selangor and W.P. Kuala Lumpur.
Analysis on the Performance of Technology Companies with Z-score Model
Lam Weng Hoe;
Yeoh Hong Beng;
Lam Weng Siew;
Chen Jia Wai
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (584.968 KB)
|
DOI: 10.11591/eei.v7i4.1353
Local technology sector plays a significant role in information and communication technology (ICT) based innovations and applications which enhance organizational performance as well as national economic growth and labor productivity. In this paper, financial performance of the listed Malaysia companies in technology sector is analyzed and evaluated. Altman’s Z-score model is proposed due to its robustness in determining companies’ financial distress level using five financial ratios as variables. The computed Z-score values classify the financial status of the companies into distress, grey and safe zones. This study investigates the financial data of 23 listed technology-based companies in the Main Market of Bursa Malaysia over the period of 2013 to 2017. The findings reveal that the percentage of safe zone companies increase throughout the five years whereas distress zone companies decline. It is concluded that financial ratio for market value of equity to total liabilities is the dominant factor that directly influences the level of financial distress among these technology-based companies in Malaysia. These research outcomes provide an insight to investors or policy makers to develop future planning in order to avoid financial failure in local technology sector.
Number of Iteration Analysis for Complex FSS Shape Using GA for Efficient ESG
Nornikman Hassan;
Zahriladha Zakaria;
Badrul Hisham Ahmad;
Naim Che Pee;
Siti Nadzirah Salleh;
Mohamad Zoinol Abidin Abd Aziz;
Mohd Fareq Abdul Malek;
Mohd Khairy Ismail
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (506.558 KB)
|
DOI: 10.11591/eei.v7i4.1354
ESG stand for Energy-Saving Glass is a special shielded glass with a metallic oxide layer to abuse undesirable of infrared and ultraviolet radiation into construction assemblies like our home. Firstly, different number of the iteration is the main thing to study a performance of the frequency selective surface shape using genetic algorithm (GA) for efficient energy saving glass (ESG). Three different values for the number of iterations were taken that is 1500, 2000 1nd 5000. Before that, the response of this complex FSS shape on incident electromagnetic wave with different symmetry shape are investigating. Three of them are no symmetrical shape, ¼ symmetrical shape, and 1/8 symmetrical shape. The 1500 number simulation considered about 89.000 per second, compared with 2000 iteration and 5000 iterations had consumed 105.09 per second and 196.00 per second, respectively. For 1/8 symmetry complex FSS shape, it demonstrations the improved performance of transmission loss at 1.2 GHz with - 40 dB. A 2 dB of transmission loss is achieved at WLAN application of 2.45 GHz with 0°, 30°, and 45° incidence angle shows.
Microwave Planar Sensor for Determination of the Permittivity of Dielectric Material
Mohd Khairy Ismail;
Zahriladha Zakaria;
Nornikman Hassan;
Sam Weng Yik;
Mohd Mawardy Abdullah
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (748.906 KB)
|
DOI: 10.11591/eei.v7i4.1355
This paper proposed a single port rectangular microwave resonator sensor. This sensor operates at the resonance frequency of 4GHz. The sensor consists of micro-strip transmission line and applied the enhancement method. The enhancement method is able to improve the return loss of the sensor, respectively. Plus, the proposed sensor is designed and fabricated on Roger 5880 substrate. Based on the results, the percentage of error for the proposed rectangular sensor is 0.2% to 8%. The Q-factor of the sensor is 174.
Mobile Business Intelligence Acceptance Model for Organisational Decision Making
Lim Yee Fang;
Nurulhuda Firdaus Mohd Azmi;
Yazriwati Yahya;
Haslina Sarkan;
Nilam Nur Amir Sjarif;
Suriayati Chuprat
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (286.339 KB)
|
DOI: 10.11591/eei.v7i4.1356
Mobile Business Intelligence (BI) is the ability to access BI-related data such as key performance indicators (KPIs), business metric and dashboard through mobile device. Mobile BI addresses the use-case of remote or mobile workers that need on-demand access to business-critical data. User acceptance on mobile BI is an essential in order to identify which factors influence the user acceptance of mobile BI application. Research on mobile BI acceptance model on organizational decision-making is limited due to the novelty of mobile BI as newly emerged innovation. In order to answer gap of the adoption of mobile BI in organizational decision-making, this paper reviews the existing works on mobile BI Acceptance Model for organizational decision-making. Two user acceptance models which are Technology Acceptance Model and Technology Acceptance Model for Mobile Services will be review. Realizing the essential of strategic organizational decision-making in determining success of organizations, the potential of mobile BI in decision-making need to be explore. Since mobile BI still in its infancy, there is a need to study user acceptance and usage behavior on mobile BI in organizational decision-making. There is still opportunity for further investigate the impact of mobile BI on organizational decision-making.