cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Bulletin of Electrical Engineering and Informatics ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication, computer engineering, computer science, information technology and informatics from the global world. The journal publishes original papers in the field of electrical (power), electronics, instrumentation & control, telecommunication and computer engineering; computer science; information technology and informatics. Authors must strictly follow the guide for authors. Please read these instructions carefully and follow them strictly. In this way you will help ensure that the review and publication of your paper is as efficient and quick as possible. The editors reserve the right to reject manuscripts that are not in accordance with these instructions.
Arjuna Subject : -
Articles 539 Documents
Assessment of Electromagnetic Absorption towards Human Head Using Specific Absorption Rate Abdul Rashid O. Mumi; R. Alias; Jiwa Abdullah; Samsul Haimi Dahlan; Jawad Ali
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (554.721 KB) | DOI: 10.11591/eei.v7i4.1357

Abstract

This paper presents a compact square slot patch antenna characterstics for wireless body area network (WBANs) applications.The assessment of the effects of electromagnetic energy (EM) on the human head is necessary because the sensitivity of human head to high radiation level. Although, structuring of low EM antennas is a major problem in the improvement of portable device and reducing the size of of the antenna is a major concern. However, performance of antenna reduces when antenna operates near human body which is lossy and complex in nature. The proposed antenna operates at 5.8GHz of the ISM Band for WBAN applications. The antenna has been designed and simulated with two different types of multilayer human head phantoms to characterize the antenna near the human head.The multilayer head phantom is constructed by five layers tissues head model using CST Microwave studio. Therefore, antenna with spherical phantom has the highest SAR value 0.206 W/Kg, while antenna with cubical phantom contributed the lowest SAR value of 0.166 for 10 g tissue at 5.8 GHz frequency exposed, whereas, the antenna with cubical phantom and spherical phantom have gain of 6.46 dBi and 6.2 dBi GHz respectively. It was observed that antenna performance significantly increased. The presented prototype has a potential to work for ISM applications.
Improving Consistency of UML Diagrams and Its Implementation Using Reverse Engineering Approach Vasanthi Kaliappan; Norhayati Mohd Ali
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (567.871 KB) | DOI: 10.11591/eei.v7i4.1358

Abstract

Software development deals with various changes and evolution that cannot be avoided due to the development processes which are vastly incremental and iterative. In Model Driven Engineering, inconsistency between model and its implementation has huge impact on the software development process in terms of added cost, time and effort. The later the inconsistencies are found, it could add more cost to the software project. Thus, this paper aims to describe the development of a tool that could improve the consistency between Unified Modeling Language (UML) design models and its C# implementation using reverse engineering approach. A list of consistency rules is defined to check vertical and horizontal consistencies between structural (class diagram) and behavioral (use case diagram and sequence diagram) UML diagrams against the implemented C# source code. The inconsistencies found between UML diagrams and source code are presented in a textual description and visualized in a tree view structure.
Python Application: Visual Approach of Hopfield Discrete Method for Hiragana Images Recognition Dicky Nofriansyah; Hendriktio Freizello
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (492.996 KB) | DOI: 10.11591/eei.v7i4.691

Abstract

Python is a dynamic object-oriented programming language. Python provides strong support for integration with other programming languages and other tools. Python programming is rarely used in the field of artificial intelligence, especially artificial neural networks. This research focuses on running Python programming to recognize hiragana letters. In learning the character of Hiragana, one can experience difficulties because of the many combinations of vowels that form new letters by different means of reading and meaning. Discrete Hopfield network is a fully connected, that every unit is attached to every other unit. This network has asymmetrical weights. At Hopfield Network, each unit has no relationship with itself. Therefore it is expected that a computer system that can help recognize the Hiragana Images. With this pattern recognition Application of Hiragana Images, it is expected the system can be developed further to recognize the Hiragana Images quickly and precisely.
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation and Feature Point Matching Anil Gupta
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (306.232 KB) | DOI: 10.11591/eei.v7i3.754

Abstract

With the development of Image processing editing tools and software, an image can be easily manipulated. The image manipulation detection is vital for the reason that an image can be used as legal evidence, in the field of forensics investigations, and also in numerous various other fields. The image forgery detection based on pixels aims to validate the digital image authenticity with no aforementioned information of the main image. There are several means intended for tampering a digital image, for example, copy-move or splicing, resampling a digital image (stretch, rotate, resize), removal as well as the addition of an object from your image. Copy move image forgery detection is utilized to figure out the replicated regions as well as the pasted parts, however forgery detection may possibly vary dependant on whether or not there is virtually any post-processing on the replicated part before inserting the item completely to another party. Typically, forgers utilize many operations like rotation, filtering, JPEG compression, resizing as well as the addition of noise to the main image before pasting, that make this thing challenging to recognize the copy move image forgery. Hence, forgery detector needs to be robust to any or all manipulations and also the latest editing software tools. This research paper illustrates recent issues in the techniques of forgery detection and proposes a advanced copy–move forgery detection scheme using adaptive over-segmentation and feature point matching. The proposed scheme integrates both block-based and key point-based forgery detection methods.
SGSC Framework: Smart Government in Supply Chain Based on FODA Ahmad Nurul Fajar; Ditdit Nugeraha Utama
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (505.337 KB) | DOI: 10.11591/eei.v7i3.817

Abstract

Smart System has implemented in government sector. There are varies Implementation that was utilized by research activities for numerous domains is very broad. Besides that, the Industry, transportation and health, also where such a system is incredibly beneficial. This study discuss supply chain and governmental link issue, coordination of all stakeholder in supply chain has to reflect the government role. It support with the condition in Indonesian government environment is unique. It is a challenge to construct smart system based on Feature Oriented Domain Analysis (FODA) approach. It can produce software product line (SPL). We proposed framework for develop software product line for smart supply chain in government sector. It is used to enhance and improve the development of software systems by multiple software system developers. It will be a guidance for construct smart government, and more specificity in supply chain for government system area environment. It is called SGSC Framework. It consists of four layers, such as optimization layer, integration layer, supply chain layer and data layer.
Distribution Network Reconfiguration Using Binary Particle Swarm Optimization to Minimize Losses and Decrease Voltage Stability Index Aji Akbar Firdaus; Ontoseno Penangsang; Adi Soeprijanto; Dimas Fajar U.P.
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (906.197 KB) | DOI: 10.11591/eei.v7i4.821

Abstract

Power losses and voltage drop are existing problems in radial distribution networks. This power losses and voltage drop affect the voltage stability level. Reconfiguring the network is a form of approach to improve the quality of electrical power. The network reconfiguration aims to minimize power losses and voltage drop as well as decreasing the Voltage Stability Index (VSI). In this research, network reconfiguration uses binary particle swarm optimization algorithm and Bus Injection to Branch Current-Branch Current to Bus Voltage (BIBC-BCBV) method to analyze the radial system power flow. This scheme was tested on the 33-bus IEEE radial distribution system 12.66 kV. The simulation results show that before reconfiguration, the active power loss is 202.7126 kW and the VSI is 0.20012. After reconfiguration, the active power loss and VSI decreased to 139.5697 kW and 0.14662, respectively. It has decreased the power loss for 31.3136% significantly while the VSI value is closer to zero.
Features for Cross Spectral Image Matching: A Survey Maulisa Oktiana; Fitri Arnia; Yuwaldi Away; Khairul Munadi
Bulletin of Electrical Engineering and Informatics Vol 7, No 4: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (532.648 KB) | DOI: 10.11591/eei.v7i4.843

Abstract

In recent years, cross spectral matching has been gaining attention in various biometric systems for identification and verification purposes. Cross spectral matching allows images taken under different electromagnetic spectrums to match each other. In cross spectral matching, one of the keys for successful matching is determined by the features used for representing an image. Therefore, the feature extraction step becomes an essential task. Researchers have improved matching accuracy by developing robust features. This paper presents most commonly selected features used in cross spectral matching. This survey covers basic concepts of cross spectral matching, visual and thermal features extraction, and state of the art descriptors. In the end, this paper provides a description of better feature selection methods in cross spectral matching.
An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method Prajna Deshanta Ibnugraha; Lukito Edi Nugroho; Paulus Insap Santosa
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (835.108 KB) | DOI: 10.11591/eei.v7i3.847

Abstract

Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
E-Learning Effectiveness Analysis in Developing Countries: East Nusa Tenggara, Indonesia Perspective Sfenrianto Sfenrianto; Ellen Tantrisna; Habibullah Akbar; Mochamad Wahyudi
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (244.482 KB) | DOI: 10.11591/eei.v7i3.849

Abstract

The adoption of e-learning in developing countries like Indonesian Universities have been focused in urban areas like the big cities, especially in Java island. There is a lack of development of e-learning in a remote city like Kupang East Nusa Tenggara Indonesia which is located far away from the capital city. This research aims to assess the effectiveness of e-learning by analyzing three factors in one of the higher institution in Kupang city, i.e. Sekolah Tinggi Kesehatan Citra Mandiri Husada Kupang (STIKes CHMK). The factors include culture, technology and infrastructure, and content satisfaction. The data were collected using questionnaires. Research shows that with proper preparation for e-learning, the acceptance of e-learning in rural areas is significantly high. This finding suggests that e-learning can greatly benefit the students like Kupang city in developing countries.
Performance analysis of low-complexity welch power spectral density for automatic frequency analyser Teh Yi Jun; Asral Bahari Jambek; Uda Hashim
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (466.858 KB) | DOI: 10.11591/eei.v8i1.1393

Abstract

The aim of this paper is to investigate the performance of the Low Complexity Welch Power Spectral Density Computation (PSDC). This algorithm is an improvement from Welch PSDC method to reduce the computational complexity of the method. The effect of the sampling rate and the input frequency toward to accuracy of frequency detection is being evaluated. From the experiment results, sampling rate nearest to the twice of the input frequency provides the highest accuracy which achieved 99%. The ability of the algorithm to perform complex signal also has been investigated.