Bulletin of Electrical Engineering and Informatics

Journal Information
ISSN / EISSN : 20893191 / 23029285
Current Publisher: Institute of Advanced Engineering and Science (10.11591)
Former Publisher: Universitas Ahmad Dahlan (10.12928)
Total articles ≅ 652
Current Coverage
Archived in

Latest articles in this journal

Negin Ahmadi, Zahra Khajenasir Jahromi
Bulletin of Electrical Engineering and Informatics, Volume 9; doi:10.11591/eei.v9i2.1620

The telecommunications platforms of the electricity industry, including optical fiber, wireless, radio and microwave, despite providing sufficient bandwidth to transmit power market data, have limitations and disadvantages that are particularly apparent in remote suburban areas. PLC technology provides such facilities relatively. So this paper aim is providing practical solutions for the transmission of electricity market meters data through this type of PLC. This paper examines how to transfer the data from the electricity market to the central server using a PLC telecommunications platform and a practical example at 132 kV. In this case, the appropriate option is PLC. In this paper, it has been shown that there is the possibility of sending market data onto the PLC platform in transient and over- voltage transmission lines, which so far seemed to be impractical. With the comprehensive implementation of this work in the country's electricity industry, especially regional electricity, a major step will be taken to create a smart grid for meter readings. Due to the successful outcome of the experiment, it is possible to easily connect the PLC, the availability of this platform in many posts, a large and new smart grid for reading electricity meter readings.
Farah Qasim Ahmed Alyousuf, Roshidi Din
Bulletin of Electrical Engineering and Informatics, Volume 9; doi:10.11591/eei.v9i2.2069

This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation of the techniques used in text steganography. This paper aims to identify the main techniques of text steganography, which are feature-based, and word-rule based, to recognize the various techniques used with them. As a result, the primary technique used in the text steganography was feature-based technique due to its simplicity and secured. Meanwhile, the common parameter metrics utilized in text steganography were security, capacity, robustness, and embedding time. Future efforts are suggested to focus on the methods used in text steganography.
Muhammad Ilhamdi Rusydi, Syafii Syafii, Rizka Hadelina, Elmiyasna Kimin, Agung W. Setiawan, Andrivo Rusydi
Bulletin of Electrical Engineering and Informatics, Volume 9; doi:10.11591/eei.v9i2.1194

Hand gesture recognition is a topic that is still investigated by many scientists for numerous useful aspects. This research investigated hand gestures for sign language number zero to nine. The hand gesture recognition was based on finger direction patterns. The finger directions were detected by a Leap Motion Controller. Finger direction pattern modeling was based on two methods: threshold and artificial neural network. Threshold model 1 contained 15 rules based on the range of finger directions on each axis. Threshold model 2 was developed from model 1 based on the behavior of finger movements when the subject performed hand gestures. The ANN model of the system was designed with four neurons at the output layer, 15 neurons at the input layer, seven neurons at the first hidden layer and 5 neurons at the second hidden layer. The artificial neural network used the logsig as the activation function. The result shows that the first threshold model has the lowest accuracy because the rule is too complicated and rigid. The threshold model 2 can improve the threshold model, but it still needs development to reach better accuracy. The ANN model gave the best result among the developed model with 98% accuracy. LMC produces useful biometric data for hand gesture recognition.
N. Illias, N. H. Abdul Hamid, Z. A. Shaffiei
Bulletin of Electrical Engineering and Informatics, Volume 9; doi:10.11591/eei.v9i3.2065

Managing the complaint is tough to handle, efficient response to the complaints from the customer can be an indicator to measure an organization’s performance. We’ve chosen Politeknik Nilai as one of the institutions that are facing daily complaints from the students and parents. Currently, they are using the manual form to lodge a complaint and receive the feedback via email. In this study, we developed an android based mobile application to manage the students’ complaint. With mobile apps, the management can prevent the loss of complaint forms and keep track of the records. This system will send feedback and notification directly via students’ mobile phone. This study referred to the ten principles for effective complaint handling by Ombudsman. We only referred to eight principles to construct the PNSCares. The methodology used to develop mobile apps is using the Mobile Application Development Life Cycle (MADLC). System Usability Scale (SUS) is used to measure the effectiveness of the mobile apps. The feedbacks from ten respondents on the PNSCares prototype are good with 72 scores in SUS for perceived usefulness and ease of use factor. Based on the result, the prototype is effective and easy to use.
Farah Qasim Ahmed Alyousuf, Roshidi Din, Alaa Jabbar Qasim
Bulletin of Electrical Engineering and Informatics, Volume 9; doi:10.11591/eei.v9i2.2068

This paper presents several techniques used in digital steganography in term of spatial and transform domain. Additionally, it analyses the performance and the metric evaluation of the techniques used in digital steganography based on spatial and transform domain. This paper aims to identify the main mediums of digital steganography, which are image-based, video-based and audio-based, in order to recognize the various techniques used with them. As a result, the primary technique used in the digital medium was LSB technique in the spatial domain, while in the transform domain, the main technique used was differentiated between DTC and DWT. Meanwhile, the common domain utilized in digital steganography was the spatial domain due to its simplicity and high embedding capacity. The future efforts for this paper will be considering the feature based in text steganography.
M. A. Ilyas, Maisara Othman, Rahmat Talib, R. Yahya, M. Yaacob, S. M. Mustam, M. B. Jaafar, C. B. M. Rashidi
Bulletin of Electrical Engineering and Informatics, Volume 9; doi:10.11591/eei.v9i2.1871

In this paper, a performance study of 8-Pulse-Position Modulation (PPM), 8-Digital Pulse Interval Modulation (DPIM), and 8-Reverse Dual Header-Pulse Interval Modulation (RDH-PIM) implementation in Verilog hardware design language is presented. The hardware design is chosen over software design since it could provide much more flexibility in term of transmission rate and reduce the workload of the processor in the complete system. Using 50 MHz clock as the reference data clock speeds, the transmission rate recorded are 11.11 Msymbol/second or 33.33 Mbps, 9.09 Msymbol/s or 27.27 Mbps, and 6.25 Msymbol/s or 18.75 Mbps for 8-RDH-PIM, 8-DPIM, and 8-PPM respectively. We conclude that 8-RDH-PIM modulator design provides better performance in term of bandwidth utilization and transmission rate as compared to 8-PPM and 8-DPIM.
Siddesh K. B., Basavaraja Banakara, R. Shivarudraswamy
Bulletin of Electrical Engineering and Informatics, Volume 9; doi:10.11591/eei.v9i2.2100

This paper presents an enhanced sliding mode controller (SMC) operation, chattering analysis and loading conditions of the SMC DC-DC buck converter. Sliding mode portion, chattering attenuation are analyzed by using a conventional and proposed reaching law in buck converter. A proposed tan hyperbolic reaching law (THRL) is originated to be useful in terms of chattering mitigation and fast convergence. The major drawback of the conventional reaching law viz, it bypasses the main portion of the sliding mode portion to ensure fast reaching. It causes more chattering, more time to reach the steady state on the switching surface. The most significant improvement of SMC is that it guarantees strengthening the sliding mode phase. The proposed tan hyperbolic reaching law is being hit here during an exponential adjustment so that the attributes of it, covers complete sliding mode portion, chattering mitigation and fast reaching time. In turn, cause fewer switching loss in the buck converter. Even external disturbances and uncertainty of the system occurs. The loading conditions are applied to proposed tan hyperbolic reaching law and analyzed. Simulation analysis conducted by MATLAB/Simulink.
K. A. F. A. Samah, A. A. Sharip, I. Musirin, N. Sabri, M. H. Salleh
Bulletin of Electrical Engineering and Informatics, Volume 9; doi:10.11591/eei.v9i2.2081

This paper describes a reliability study on the adaptation of Dijkstra’s Algorithm (DA) in the indoor environment for navigation purposes. Gateway KLIA2 located at Sepang, Selangor, Malaysia has been chosen as the area for case study. Gateway KLIA2 is divided into 4 levels but this research focused on Level 2 only that consists of 129 shop lots. A survey conducted towards 68 public respondents before the adaptation and most of them responded that they are not aware of the surrounding of KLIA2 and are facing difficulties in finding the information or location of certain places inside the building. DA was chosen because it helps the users to navigate using the shortest path to destination. It is proven that through the adaptation of DA, we are able to provide the shortest distance for indoor navigation from current location to the destination location. G-INS is reliable based on the functionality and reliability testing conducted towards 15 users with the distance reduction of 47% t-test result of 0.01303 (p<0.05), indicates the system is accepted
S. L. Yeoh, S. K. Yee, N. T. J. Ong, S. H. Dahlan, C. K. Sia
Bulletin of Electrical Engineering and Informatics, Volume 9; doi:10.11591/eei.v9i2.1848

Due to proliferation of electronic devices, the electromagnetic field (EMF) exposure affect human health in long term. On the other hand the operation electronic devices will be affected if the radiation level is too high. To reduce the radiation exposure, shielding is always used. Instead of building a shielding enclosure inside a building, it is more practical to improve the shielding capability of the building itself. Hence, this project intend to investigate the shielding effectiveness (SE) of cement added with graphite. Eight cement-graphite specimens with different percentages (0%, 3%, 7%, 11%, 15%, 19%, 25% and 30%) are prepared. They have been casted into the waveguide mold with size of 4.75 cm x 1 cm x 2.22 cm and taken for measurement directly. The SE measurement setup involve a pair of waveguide with frequency range of 3.8 GHz to 6 GHz and vector network analyser (VNA). Throughout the study, it is found that the percentage of graphite powder will affect the SE of the specimens. The SE is independent on its curing duration. More than 11% of graphite is needed to improve the SE of cement block in between 3.8 GHz to 6 GHz. The highest SE of 33 dB is achieved when the sample contains 30% of graphite with thickness of 1cm.
A. F. Hasan, S. A. Z. Murad, F. A. Bakar, T. Z. A. Zulkifli
Bulletin of Electrical Engineering and Informatics, Volume 9; doi:10.11591/eei.v9i2.1854

A 28 GHz power amplifier (PA) using CMOS 0.18 µm Silterra process technology for milimeter wave applications is reported. Maximizing the power added efficiency (PAE) and output power are achieved by optimize the circuit with power divider and cascade configuration. In addition, reverse body bias is also employed for realizing excellent PAE and power consumption. A three stage CMOS PA with power combiner is designed and simulated. The simulation results show that the proposed PA consumes 62.56 mW and power gain (S21) of 8.08 dB is achieved at 28 GHz. The PA achieves saturated power (Psat) of 12.62 dBm and maximum PAE of 23.74% with output 1-dB compression point (OP1dB) 10.85 dBm. These results demonstrate the proposed power amplifier architecture is suitable for 5G applications.
Back to Top Top