cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Bulletin of Electrical Engineering and Informatics ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication, computer engineering, computer science, information technology and informatics from the global world. The journal publishes original papers in the field of electrical (power), electronics, instrumentation & control, telecommunication and computer engineering; computer science; information technology and informatics. Authors must strictly follow the guide for authors. Please read these instructions carefully and follow them strictly. In this way you will help ensure that the review and publication of your paper is as efficient and quick as possible. The editors reserve the right to reject manuscripts that are not in accordance with these instructions.
Arjuna Subject : -
Articles 539 Documents
Development of a Radio Frequency Remote-Controlled Amphibious Solid Waste Collecting Mobot Jay Robert B. Del Rosario; Romwell B. Andutan; Adelfos R. Bautista; Patrick Henry L. Pangilinan; Ruby Anne O. Vega
Bulletin of Electrical Engineering and Informatics Vol 5, No 3: September 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (934.015 KB) | DOI: 10.11591/eei.v5i3.540

Abstract

Robots in general are used to aid people in different tasks from simple activities to activities that prevent also people from harm. In fields of Robotics it is important that these robots are not complete replacements of humanity but mere tools that will improve human lives and more so save lives if possible. In this paper, the group presented a remote-controlled mobot with amphibious capabilities. The system is accessible through a radio frequency transmitter and receiver which there is an executable file that allows the mobot to be controlled. The characterization of the system and its performance are presented here as well.
Simulation and Implementation of a Wireless Metal Detector with Variety of Flexible Responses- A Solution to Extensive Security Threats Awais Ahmed; Hassan Sarwar
Bulletin of Electrical Engineering and Informatics Vol 5, No 3: September 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (970.093 KB) | DOI: 10.11591/eei.v5i3.541

Abstract

We proposed a design of a wireless metal detector in this research article. A system is designed which offers a variety of electrical equipments necessary for a privatized metal sensor. The main objective of this research is to provide a mature solution to the recent security threads all over the world by designing a localized wireless metal detection system. Different analysis has been shown graphically in this article. In addition, the system is kept flexible to respond to a security threat e.g. in case of a metal detection. The case study chosen for this article is Pakistan, a country facing extensive threats in the age of globalization.
New Electromagnetic Force-Displacement Sensor Amine Benabdellah; Zakarya Abbassi; Abdelrhani Nakheli
Bulletin of Electrical Engineering and Informatics Vol 5, No 3: September 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (325.166 KB) | DOI: 10.11591/eei.v5i3.542

Abstract

A new electromagnetic force-displacement sensor is presented. Its operating principle is based on the fundamental laws of electromagnetism (Faraday-Lenz law) and the mechanical properties of a spring. The active elements are two coils made by a wire of 60 µm in diameter. Using different wire diameters or different number of wire turns in the coil modify the intensity of the magnetic field and the sensor response. The average accuracy of the sensor is about ∆d=1µm, and as a force sensor is about ∆F=1µN. This sensor could be successfully used for the manufacture of several measuring instruments.
Efficient Hardware Architecture for Cyclostationary Detector D Damodaram; T Venkateswarlu
Bulletin of Electrical Engineering and Informatics Vol 5, No 3: September 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (644.165 KB) | DOI: 10.11591/eei.v5i3.543

Abstract

Cognitive radio is one of the modern techniques which is evolved for utilising the unused spread spectrum effectively in wireless communication. In cognitive radio system the foremost concept is sensing the holes (spaces) in the frequency spectrum allotted and it facilitates a way that how effectively and efficiently the bandwidth is used by finding the spectrum holes in a designated spectrum. There are various methods available for sensing the spectrum and one such a sensing method is cyclostationary detection.  The method of cyclostationary feature mainly focuses on detecting whether the primary user is present or absent. The threshold of a signal is calculated by cyclic cross-periodogram matrix of the corresponding signal to determine the presence of signal or noise. The difficulty in evaluating the targeted threshold is evaded by training an artificial neural network by extracted cyclostationary feature vectors which are obtained by FFT accumulation method. This paper proposes a hardware architecture for cyclostationary detection.
A Naïve Visual Cryptographic Algorithm for the Transfer of Compressed Medical Images Shivaputra Shivaputra; HS Sheshadri; V Lokesha
Bulletin of Electrical Engineering and Informatics Vol 5, No 3: September 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1029.143 KB) | DOI: 10.11591/eei.v5i3.544

Abstract

The transmission of a suitably compressed image over a bandwidth, over long distances, gives rise towards a new era in the field of information technology. A gradual increase in this appending scenic application, involving the transfer of the images securely over the Ethernet has become an increasingly important aspect to be addressed during thou phenomenon, especially in the transfer of the digital medical images vividly, encapsulated with abundant information related to these images. The compressed medical images of the DICOM format contain certain amount of confidential data, pertaining to a clinical research or to an individual, and the confidentiality of the same has to be preserved from various security threats and eves-dropping. With a widespread applications among various multimedia applicative systems, telemedicine, medical imaging, military and certain safety-critical applications, inter-net and intra-net communicative applications, etc, a reliable transfer of suitable information, efficiently & securely is considered as one of the revolutionary aims in today’s communication technology and visual cryptographic methodologies. Real-time applications as such detailed above majorly is concerned with the security measures and many algorithms have been developed as a proof for various visual cryptographic methodologies. In this paper we propose an efficient and a reliable visual cryptographic methodology which focuses on the encryption and decryption of the two-dimensional DICOM standard compressed medical image, effectively.  This paper discusses an efficient design of 192 bit encoder using AES Rijndael Algorithm with the decomposition of an image into square image size blocks and the image blocks are shuffled using 2D CAT map. The shuffling of the image blocks/pixels employs a Logistic map of these image pixels coupled with 2D mapping of the pixels of the DICOM standard medical image, generated randomly, being the control parameter thereby creating a confusion between the cipher and the plain image, gradually increasing the resistive factor against the significant attacks. This paper proposes various analytical metrics such as correlation analysis, entropy analysis, homogeneity analysis, energy analysis, contrast and mean of absolute deviation analysis, to evaluate the proposed algorithm, and their suitability in image encryption applications.
Security Technology by using Firewall for Smart Grid Ayla Hasanalizadeh Khosroshahi; Hossein Shahinzadeh
Bulletin of Electrical Engineering and Informatics Vol 5, No 3: September 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (817.361 KB) | DOI: 10.11591/eei.v5i3.545

Abstract

Due to the increasing development of computer systems and information networks, power grids should change extensively too. Nowadays, substantial movement has begun to implement the Smart Grid industry around the world. Since with the creation of smart electricity grids, it is possible to access the internal network from the external spaces, it is also necessary to protect information and data against unauthorized access. Therefore, a firewall should be used for information security. The firewall based on existing security regulations, decides which data is incoming to the network or going out of the network. Considering the discussions of passive defense topics at the national level and also the high importance of information security in Smart Grids, in this paper, in addition to examining the Firewalls, its advantages and disadvantages are also stated. Although the firewall has a major role in establishing security, and its installation and appropriate configuration can only be one of the primary activities in this field, we should also take advantage of other security mechanisms to enhance the security of the Smart Grid.
Characterization of Capacitive Comb-finger MEMS Accelerometers Aaditi Joshi; Sangram Redkar; Thomas Sugar
Bulletin of Electrical Engineering and Informatics Vol 4, No 4: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (793.865 KB) | DOI: 10.11591/eei.v4i4.546

Abstract

This paper discusses various methods for testing the performance of MEMS capacitive comb-finger accelerometers manufactured by Sandia National Laboratories. The use of Capacitive MEMS devices requires complex circuits for measurement of capacitance. Sandia MEMS accelerometer’s capacitance changes in a very small femto-farad (fF) range. The performance of accelerometer is tested using Analog Devices AD7747 sigma-delta capacitance to digital converter. The response of a MEMS capacitive accelerometer to various tests is useful for testing and characterization and investigate it’s suitability for various applications
A Hybrid Methodology for Performance Assessment of Campus Network Li Mao; De-yu Qi
Bulletin of Electrical Engineering and Informatics Vol 4, No 4: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (126.57 KB) | DOI: 10.11591/eei.v4i4.547

Abstract

In this paper, we propose a combined methodology of fuzzy analytic hierarchy process (FAHP) and data envelopment analysis (DEA) in order to apply it to multivariate analysis and integrated evaluation. With FAHP method, the relative importance levels of different available indicators are determined. And the DEA model is used to obtain the efficiency performances of the use case of network measurement. Finally network performance is evaluated by means of integrating available indicator weights with efficiency performances. It is quite important that the integrated methodology considers both personal preferences and objective relative efficiency for assessment simultaneously to avoid the bias of single methodology.
Location-Based Services and Privacy Protection under Mobile Cloud Computing Yan Yan; Hao Xiaohong; Wang Wanjun
Bulletin of Electrical Engineering and Informatics Vol 4, No 4: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (356.106 KB) | DOI: 10.11591/eei.v4i4.548

Abstract

Location-based services can provide personalized services based on location information of moving objects and have already been widely used in public safety services, transportation, entertainment and many other areas. With the rapid development of mobile communication technology and popularization of intelligent terminals, there will be great commercial prospects to provide location-based services under mobile cloud computing environment. However, the high adhesion degree of mobile terminals to users not only brings facility but also results in the risk of privacy leak. The paper introduced the necessities and advantages to provide location-based services under mobile cloud computing environment, stressed the importance to protect location privacy in LBS services, pointed out new security risks brought by mobile cloud computing, and proposed a new framework and implementation method of LBS service. The cloud-based LBS system proposed in this paper is able to achieve privacy protection from the confidentiality of outsourced data and integrity of service results, and can be used as a reference while developing LBS system under mobile cloud computing environment.
NCTF-FL Controller for Pendulum Balancing System Noor Hisham Jalani
Bulletin of Electrical Engineering and Informatics Vol 4, No 4: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (290.572 KB) | DOI: 10.11591/eei.v4i4.549

Abstract

Pendulum Balancing of Linear Servo System consists of a cart driven by a DC motor, via a rack and pinion mechanism to ensure consistent and continuous traction. The cart is also equipped with a rotary joint to which a free turning rod (or pendulum) can be attached. This concept paper proposed a combination of Nominal Characteristic Trajectory Following (NCTF) and Fuzzy Logic (FL) to control the position of the cart and to balance the pendulum. The proposed controllers are expected to have a simple design method and achieved high performances.