cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Bulletin of Electrical Engineering and Informatics ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication, computer engineering, computer science, information technology and informatics from the global world. The journal publishes original papers in the field of electrical (power), electronics, instrumentation & control, telecommunication and computer engineering; computer science; information technology and informatics. Authors must strictly follow the guide for authors. Please read these instructions carefully and follow them strictly. In this way you will help ensure that the review and publication of your paper is as efficient and quick as possible. The editors reserve the right to reject manuscripts that are not in accordance with these instructions.
Arjuna Subject : -
Articles 539 Documents
Super Resolution Imaging Needs Better Registration for Better Quality Results Varsha Hemant Patil; Kharate G K; Kamlapur Snehal Mohan
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (72.751 KB) | DOI: 10.11591/eei.v1i1.225

Abstract

In this paper, trade-off between effect of registration error and number of images used in the process of super resolution image reconstruction is studied. Super Resolution image reconstruction is three phase process, of which registration is of at most importance. Super resolution image reconstruction uses set of low resolution images to reconstruct high resolution image during registration. The study demonstrates the effects of registration error and benefit of more number of low resolution images on the quality of reconstructed image. Study reveals that the registration error degrades the reconstructed image and without better registration methodology, a better super resolution method is still not of any use. It is noticed that without further improvement in the registration technique, not much improvement can be achieved by increasing number of input low resolution images.
A Secure Image Encryption Algorithm Based on Hill Cipher System S.K. Muttoo; Deepika Aggarwal; Bhavya Ahuja
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (857.004 KB) | DOI: 10.11591/eei.v1i1.226

Abstract

We present a technique of image encryption based on Hill cipher system that provides better security than existing approach of Bibhudendra Acharya et al. by rendering the image content completely scrambled using multiple self-invertible keys, block shuffling and a new developed pel transformation. The Hill cipher algorithm is one of the symmetric key algorithms having several advantages in encryption. However, the inverse of the matrix used for encrypting the plain text in this algorithm may not always exist. Moreover this algorithm is susceptible to known plain text attack. Our proposed algorithm is aimed at better encryption of all types of images even ones with uniform background and makes the image encryption scheme more secure.
Solving Hashiwokakero Puzzle Game with Hashi Solving Techniques and Depth First Search Reza Firsandaya Malik; Rusdi Efendi; Eriska Amrina Pratiwi
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (162.556 KB) | DOI: 10.11591/eei.v1i1.227

Abstract

Hashiwokakero is a logic puzzle game that sharpen the brain and very popular in Japan. This paper discusses about how to find a solution in the Hashi puzzle game using Hashi Solving techniques, such as: Just Enough Neighbor, One Unsolved neighbor, Few Neighbor, Leftovers and Isolation. Hashi Solving techniques are used to find and build bridges that can definitely be built across the island, while Depth First Search (DFS) will search and build bridges that have not been found by Hashi Solving techniques. The results shown that Hashi Solving Techniques and DFS able to solve every Hashi puzzle scenario.
Characterization of Voltage Sags and its Mitigation Using Custom Power Devices in Emerging Power System Ravindra Kumar; Surya Prakash Singh; Bindeshwar Singh; Ravi Prakash Vishvakarma
Bulletin of Electrical Engineering and Informatics Vol 1, No 2: June 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (563.273 KB) | DOI: 10.11591/eei.v1i2.228

Abstract

Voltage sags are short duration reductions in RMS voltage caused by short circuits, overloads and starting of large motors. Voltage sag is much more of a global problem. For proper analysis and mitigation of voltage sag, their characterization is important. The magnitude and durations are main characteristics of voltage sag. In this paper voltage sag and their characteristics have been presented in a comprehensive way. How voltage sags occur, what are their characteristics and impact on equipments behavior for different conditions. Through voltage source converters, it is possible to compensate for the drop in system voltage or even to temporarily take over the supply completely. The shunt and series controllers are based on power-electronic voltage source converters. For a full compensation both reactive and active power are needed. Only not for deep voltage sags but it is possible to compensate the drop in voltage magnitude by injecting reactive power only.
Efficient Closed Form Cut-Off Planes and Propagation Planes Characteristics for Dielectric Slab Loaded Boundary Value Problems Junaid Zafar
Bulletin of Electrical Engineering and Informatics Vol 1, No 2: June 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (273.252 KB) | DOI: 10.11591/eei.v1i2.229

Abstract

The geometrical relationship between the cut-off and propagating planes of any waveguide system is a prerequisite for any design process. The characterization of cut-off planes and optimisation are challenging for numerical methods, closed-form solutions are always preferred. In this paper Maxwells coupled field equations are used to characterise twin E-plane and H-plane slab loaded boundary value problems. The single mode bandwidths and dispersion characteristics of these structures are presented and critically compared. The impact of slab mobility upon cut-off and propagations planes has been envisaged. The presented formulation has been extended further to derive a vectorized Green function expression linking electric and magnetic fields for the characterization of planar waveguide structures.
CDMA2000 Past, Present and Future Saad Zaman Asif
Bulletin of Electrical Engineering and Informatics Vol 1, No 2: June 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (739.344 KB) | DOI: 10.11591/eei.v1i2.230

Abstract

The article looked into the possible future of 3GPP2s CDMA2000 1X and CDMA2000 1xEV-DO networks. The 3G CDMA2000 family of standards including EV-DO (Evolution Data Optimized) is in the daily use of more than 600 million customers across the globe. During the last few years the development efforts around CDMA2000 had been declined and its importance had been overshadowed by more advanced 3GPP LTE and IEEE WiMAX mobile broadband technologies. Due to these reasons, CDMA2000 operators are looking for alternative migration paths. The article investigated multiple facets for the future of CDMA2000 industry and these aspects were covered both from research and operational perspectives. The article first focused on the short term interoperability challenges to LTE and WiMAX and provided some antidotes for addressing these hurdles. The key challenges that were investigated include spectrum planning, authentication and security, end-to-end QoS (Quality of Service), voice enablement and data service continuity. The investigation revealed that a new QoS mapping mechanism between EV-DO and WiMAX similar to the one shown in the article is required for smooth operation. The analysis further indicated that CSFB (Circuit Switched Fallback) and SVLTE (Simultaneous Voice and LTE) were two techniques which could be used to support CS voice on an LTE/CDMA network; however they had different inter-radio access technology interworking requirements. In the following section performance aspects of both WiMAX and EV-DO were highlighted indicating a deep dip in throughput values once the users switches from WiMAX to EV-DO. The article concluded by discussing the future roadmap of CDMA2000 from 1X Advanced and DO Advanced perspectives. A performance comparison between 1X and 1X Advanced and EV-DO and DO Advanced was also presented.
A Comparative Study of Risk Assessment Methodologies for Information Systems SANTOSH K PANDEY
Bulletin of Electrical Engineering and Informatics Vol 1, No 2: June 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (169.105 KB) | DOI: 10.11591/eei.v1i2.231

Abstract

In todays dynamic and changing economic environment, businesses are subjected to greater risks than ever before. As a result of this, IT Project Leaders/Managers/Director/Senior Technical Staff should be in a position to identify the business risks that an organization faces and the risk management policies that an organization has to effectively manage those risks. These risks may be related with the Finance, Accounting, Information Systems and their security etc. Here, in this paper, we are emphasizing on Information Systems Security risks. Risk assessment is currently used as a key technique for managing Information Systems Security. Every organization is implementing the risk management methods. Risk assessment is a part of this superset, Risk Management. There are various information security risk assessment methods available that can be implemented by the organization, and each has different approaches to assess the information security risks. Organizations find it difficult to select an information security risk assessment method; therefore there is a need for a critical review of existing risk assessment methodologies. This paper presents a brief discussion on the top risk assessment methodologies, particularly COBRA, CORAS, CRAMM, OCTAVE, SOMAP, and NIST Guide, along with strengths and weaknesses of each one. After that a comparative study is also done on the basis of the review results. Further research directions may also be taken by the weaknesses section. This work provides an evaluation to determine whether an information security risk assessment method is in line with information technology governance or not. The research paper will help the Senior IT Personnel to provide their recommendations for using a risk assessment methodology based on the specific requirements of an organization.
Development of Online Environmental Monitoring System with Location Awareness Dhiren P Mistry; Kiran R Trivedi
Bulletin of Electrical Engineering and Informatics Vol 1, No 2: June 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v1i2.232

Abstract

Despite the economic downturn, there have been quite a few new developments in the world of remote measurements lately. This Paper introduced the concept of OEMS where sensors connected to the microcontroller based system and which is the part of enterprises, retail outlets, factories, and warehouse or any remote place. The system sends the data to the Internet where specialized web applications receive the information for processing and display. One of these specialized web applications is Pachube, (http://www.pachube.com) which bills itself as a real-time data brokerage platform. Pachube enables people to tag and share real time sensor data from objects, devices and spaces around the world. The system basically sense the Environmental parameter like temperature, humidity, Carbon Monoxide Level, level of Alcohol Gases, of the Area in which system is located. By using a GPS technology, track the location of the area in terms of latitude and longitude. All the data of Sensors and GPS data uploaded to the Pachube using a GPRS with the help of GSM Modem.
Review of Multimodal Biometric Identification Using Hand Feature and Face Sampada A. Dhole; V H Patil
Bulletin of Electrical Engineering and Informatics Vol 1, No 3: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (228.532 KB) | DOI: 10.11591/eei.v1i3.233

Abstract

In the era of Information Technology, openness of the information is a major concern. As the confidentiality and integrity of the information is critically important, it has to be secured from unauthorized access. Security refers to prohibit some unauthorized persons from some important data or from some precious assets. So we need accurateness on automatic personal identification in various applications such as ATM, driving license, passports, citizen’s card, cellular telephones, voter’s ID card etc. Unimodal system carries some problems such as Noise in sensed data, Intra-class variations, Inter-class similarities, Non-universality and Spoof attacks. The accuracy of system is improved by combining different biometric traits which are called multimodal. This system gives more accuracy as it would be difficult for imposter to spoof multiple biometric traits simultaneously. This paper reviews different methods for fusion of biometric traits.
New Proxy Blind Multi Signature based on Integer-Factorization and Discrete-Logarithm Problems Swati Verma; Birendra Kumar Sharma
Bulletin of Electrical Engineering and Informatics Vol 1, No 3: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (57.637 KB) | DOI: 10.11591/eei.v1i3.234

Abstract

Digital proxy multi-signature and blind signature scheme are found very useful for the purpose of electronic voting and electronic cash transaction. In proxy multi-signature, many original signers can delegate their signing power to a proxy signer in such a way that the proxy signer can sign any message on behalf of original signers. In blind signature, the signer cannot make a linkage between the blind signature and the identity of the requester. Proxy blind multi-signature is the combination of proxy multi-signature and blind signature. In this paper, we propose a new proxy blind multi-signature scheme based on integer factorization problem (IFP) and discrete logarithm problem (DLP) to improve the security aspect. It satisfies the security properties of both the blind signature and the proxy multi-signature scheme.

Page 5 of 54 | Total Record : 539