cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Bulletin of Electrical Engineering and Informatics ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication, computer engineering, computer science, information technology and informatics from the global world. The journal publishes original papers in the field of electrical (power), electronics, instrumentation & control, telecommunication and computer engineering; computer science; information technology and informatics. Authors must strictly follow the guide for authors. Please read these instructions carefully and follow them strictly. In this way you will help ensure that the review and publication of your paper is as efficient and quick as possible. The editors reserve the right to reject manuscripts that are not in accordance with these instructions.
Arjuna Subject : -
Articles 539 Documents
Segmentation Comparing Eggs Watermarking Image and Original Image Anton Yudhana; Sunardi Sunardi; Shoffan Saifullah
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (436.281 KB) | DOI: 10.11591/eei.v6i1.595

Abstract

The research used watermarking techniques to obtain the image originality. The aims of the research were to identify small area in eggs properly and compared preprocessing, the methods, and the results of image processing. The study has been improved from the previous papers by combined all methods and analysis was obtained.This study was conducted by using centroid and the bounding box for determining the object and the small area of chicken eggs. The segmentation method was used to compare the original image and the watermarked image. Image processing using image data that are subject watermark to maintain the authenticity of the images used in the study will the impact in delivering the desired results. In the identification of chicken eggs using watermark image using several methods are expected to provide results as desired. Segmentation also deployed to process the Image and counted the objects. The results showed that the process of segmentation and objects counting determined that the original image and watermarked image had the same value and recognized eggs. Identification had determined percentage of 100% for all the samples.
Chaos Image Encryption Methods: A Survey Study Sabah Fadhel; Mohd Shafry; Omar Farook
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v6i1.599

Abstract

With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
Design of a Low Cost Remotly Operated Vehicle with 3 Dof Navigation Romi Wiryadinata; Annisa Sucianti Nurliany; Imamul Muttakin; Teguh Firmansyah
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (825.053 KB) | DOI: 10.11591/eei.v6i1.596

Abstract

One type of underwater robot is the ROV (Remotely Operated Vehicle) whose movements are controlled directly by humans from the water surface. In this paper, ROV prototype has been designed and tested with three DoF (Degrees of Freedom) and controlled by a joystick which is connected with UTP (Unshielded Twisted Pair) cables as data transmission between joystick with a microcontroller embedded in the robot. This prototype has 3 thrusters with 3 degrees of freedom, 1 rotational motion (heave) and 2 translational motion (yaw and surge), with direction of movement up, down, forward, backward, turn right, and turn left. Speed mode setting when forward movement on PWM (Pulse Width Modulation) 75% = 0,037 m/s, 90% = 0.053 m/s and 100% = 0,071 m/s, while the reverse speed by 75% = 0,034 m/s, 90% = 0.045 m/s and 100% = 0.059 m/s, when the ROV moves up is 0,042 m/s, down 0.032 m/s, turn right 9 o/s and turn left 15 o/s set with fixed PWM value, is 100%.
Robotic Leg Design to Analysis the Human Leg Swing from Motion Capture Riky Tri Yunardi; Aji Akbar Firdaus; Eva Inaiyah Agustin
Bulletin of Electrical Engineering and Informatics Vol 6, No 3: September 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (766.684 KB) | DOI: 10.11591/eei.v6i3.645

Abstract

In this paper presented the prototype of robotic leg has been designed, constructed and controlled. These prototype are designed from a geometric of human leg model with three joints moving in 2D plane. Robot has three degree of freedom using DC servo motor as a joint actuators: hip, knee and ankle. The mechanical leg constructed using aluminum alloy and acrylic material. The control movement of this system is based on motion capture data stored on a personal computer. The motions are recorded with a camera by use of a marker-based to track movement of human leg. Propose of this paper is design of robotic leg to present the analysis of motion of the human leg swing and to testing the system ability to create the movement from motion capture. The results of this study show that the design of robotic leg was capable for practical use of the human leg motion analysis. The accuracy of orientation angles of joints shows the average error on hip is 1.46º, knee is 1.66º, and ankle is 0.46º. In this research suggesting that the construction of mechanic is an important role in the stabilization of the movement sequence.
Stack Contention-alleviated Precharge Keeper for Pseudo Domino Logic Deepika Bansal; Brahmadeo Prasad Singh; Ajay Kumar
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (762.306 KB) | DOI: 10.11591/eei.v6i2.597

Abstract

The dynamic circuits are supposed to offer superior speed and low power dissipation over static CMOS circuits. The domino logic circuits are used for high system performance but suffer from the precharge pulse degradation. This article provides different design topologies on the domino circuits to overcome the charge sharing and charge leakage with reference to the power dissipation and delay. The precharge keeper circuit has been proposed such that the keeper transistors also work as the precharge transistors to realize multiple output function. The performance improvement of the circuit’s analysis have been done for adders and logic gates using HSPICE tool. The proposed keeper techniques reveal lower power dissipation and lesser delay over the standard keeper circuit with less transistor count for different process variation.
Energy Aware Heuristic approach for Cluster Head Selection in Wireless Sensor Networks A. Tamizharasi M. E.; J. Jasmine Selvathai M. E.; A. Kavi Priya; Maarlin R.; Harinetha M.
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (641.364 KB) | DOI: 10.11591/eei.v6i1.598

Abstract

Wireless sensor networks idea is envisioned and defined as self-deployed, error prone, long living inexpensive communication devices that are densely deployed to collect data from physical space. Sensor nodes communicate with each other to detect events depending on the application, to collect and process data, and to transmit the sensed information to the base station by hopping the data from node to node. Major challenge in wireless network is energy consumption, since the sensor devices are deployed on unattended wide areas and replacing their batteries is not very feasible. Therefore, designing energy-aware algorithms becomes a major challenge for extending the lifetime of sensors. The lifetime of the network can be maximized by selecting the most optimal cluster head. In this paper, a heuristic decision making approach is proposed for producing energy-aware clusters with optimal selection of cluster head. This helps to improve the efficiency and accuracy and overcome the drawbacks like getting trapped at a local extreme in the optimization process.
The Role of Organizational and Individual Factors in Knowledge Management System Acceptance Setiawan Assegaff
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (445.554 KB) | DOI: 10.11591/eei.v6i2.606

Abstract

The aim of this study is to investigates the how individual and organizational factors influence people behavior in using knowledge management.  This research applied Technology Acceptance Model (TAM) as a basis theory; TAM was enriched with individual and organizational factors for this study. A survey approach was conducted for data collection. Three of institutions in Banking Sector at Indonesia were invited to join this study and 215 knowledge workers were participated for the survey. Data from survey were analyzed through Structural Equations Model (SEM) using PLS (Partial Least Square) V2. The conclusion specify that ‘‘individual elements’’ and ‘‘organizational elements’’ are the significantly affect people behavior in KMS acceptance factors that influence knowledge worker behavior in knowledge sharing. However this study not found relationship between individual and organization factors and “perceived ease of use” construct with people behavior in accept KMS.
Internet Prospective Study Jesus Antonio Alvarez-Cedillo; Elizabeth Acosta Gonzaga; Mario Aguilar-Fernández; Patricia Perez-Romero
Bulletin of Electrical Engineering and Informatics Vol 6, No 3: September 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (411.36 KB) | DOI: 10.11591/eei.v6i3.653

Abstract

The Internet is currently the largest network of communication worldwide and is where technological advances could be observed. The original creation of the Internet was based on the idea that this network would be formed mainly by multiple independent networks with an arbitrary design. The Internet is the place where all countries communicate and disseminate information in real time, this phenomenon directly affects economies, businesses, and society. This article shows what the future of the Internet is, our research carries out a qualitative prospective analysis on projects and investigations in which the scientific community is currently working, the information is analyzed, and the highlighted topics are shown.
Improving the Performance of CBIR on Islamic Women Apparels Using Normalized PHOG Cut Mutia; Fitri Arnia; Rusdha Muharar
Bulletin of Electrical Engineering and Informatics Vol 6, No 3: September 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (860.666 KB) | DOI: 10.11591/eei.v6i3.657

Abstract

The designs of Islamic women apparels is dynamically changing, which can be shown by emerging of online shops selling clothing with fast updates of newest models. Traditionally, buying the clothes online can be done by querying the keywords to the retrieval system. The approach has a drawback that the keywords cannot describe the clothes designs precisely. Therefore, a searching based on content–known as content-based image retrieval (CBIR)–is required. One of the features used in CBIR is the shape. This article presents a new normalization approach to the Pyramid Histogram of Oriented Gradients (PHOG) as a mean for shape feature extraction of women Islamic clothing in a retrieval system. We refer to the proposed approach as normalized PHOG (NPHOG). The Euclidean distance measured the similarity of the clothing. The performance of the system was evaluated by using 340 clothing images, comprised of four clothing categories, 85 images for each category: blouse-pants, long dress, outerwear, and tunic. The recall and precision parameters measured the retrieval performance; the Histogram of Oriented Gradients (HOG) and PHOG were the methods for comparison. The experiments showed that NPHOG improved the HOG and PHOG performance in three clothing categories.
Improving K-NN Internet Traffic Classification Using Clustering and Principle Component Analysis Adi Suryaputra Paramita
Bulletin of Electrical Engineering and Informatics Vol 6, No 2: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (435.798 KB) | DOI: 10.11591/eei.v6i2.608

Abstract

K-Nearest Neighbour (K-NN) is one of the popular classification algorithm, in this research K-NN use to classify internet traffic, the K-NN is appropriate for huge amounts of data and have more accurate classification, K-NN algorithm has a disadvantages in computation process because K-NN algorithm calculate the distance of all existing data in dataset. Clustering is one of the solution to conquer the K-NN weaknesses, clustering process should be done before the K-NN classification process, the clustering process does not need high computing time to conqest the data which have same characteristic, Fuzzy C-Mean is the clustering algorithm used in this research. The Fuzzy C-Mean algorithm no need to determine the first number of clusters to be formed, clusters that form on this algorithm will be formed naturally based datasets be entered. The Fuzzy C-Mean has weakness in clustering results obtained are frequently not same even though the input of dataset was same because the initial dataset that of the Fuzzy C-Mean is less optimal, to optimize the initial datasets needs feature selection algorithm. Feature selection is a method to produce an optimum initial dataset Fuzzy C-Means. Feature selection algorithm in this research is Principal Component Analysis (PCA). PCA can reduce non significant attribute or feature to create optimal dataset and can improve performance for clustering and classification algorithm. The resultsof this research is the combination method of classification, clustering and feature selection of internet traffic dataset was successfully modeled internet traffic classification method that higher accuracy and faster performance.