Bulletin of Electrical Engineering and Informatics最新文献

筛选
英文 中文
Design and implementation of pulse width modulation gate control signals for two-level three-phase inverters 两级三相逆变器脉宽调制栅极控制信号的设计与实现
Bulletin of Electrical Engineering and Informatics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.4249
E. Aboadla, Kushsairy Kadir, Sheroz Khan
{"title":"Design and implementation of pulse width modulation gate control signals for two-level three-phase inverters","authors":"E. Aboadla, Kushsairy Kadir, Sheroz Khan","doi":"10.11591/eei.v13i2.4249","DOIUrl":"https://doi.org/10.11591/eei.v13i2.4249","url":null,"abstract":"The switching control circuit in a DC to AC inverter is the critical part that is applied to control the power transistors insulated-gate bipolar transistor (IGBTs) and metal-oxide semiconductor field-effect transistor (MOSFETs). This paper proposes a high-performance and low-cost pulse width modulation (PWM) control signal with a 120º phase shift circuit for a two-level three-phase inverter. Typically, a PWM signal with a 120º phase shift for three-phase inverters is generated with the help of analogue components with more complicated designs and power losses or by using a microcontroller with necessary programming or coding. The proposed solution is to design a 120° three-phase shift circuit based on D flip-flops and the 555-timer to generate the clock signal for the flip-flop input in addition to the dead-time control circuit. The proposed circuit is controlled by one square wave signal as an input signal to generate six output PWM control signals at 50 Hz to operate six MOSFETs in the three-phase inverter. Simulation results in power simulation software PSIM and PROTEUS simulation tools are used to verify the proposed circuit. Hardware implementation of the proposed circuit and three-phase inverter is carried out to validate the performance of the proposed design.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140354805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowering hate speech detection: leveraging linguistic richness and deep learning 增强仇恨言论检测能力:利用语言的丰富性和深度学习
Bulletin of Electrical Engineering and Informatics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6938
Gde Bagus, Janardana Abasan, Erwin Budi Setiawan
{"title":"Empowering hate speech detection: leveraging linguistic richness and deep learning","authors":"Gde Bagus, Janardana Abasan, Erwin Budi Setiawan","doi":"10.11591/eei.v13i2.6938","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6938","url":null,"abstract":"Social media has become a vital part of most modern human personal life. Twitter is one of the social media that was formed from the development of communication technology. A lot of social media gives users the freedom to express themselves. This facility is misused by users, so hate speech is spread. Designing a system to detect hate speech intelligently is needed. This study uses the hybrid deep learning (HDL) and solo deep learning (SDL) approach with the convolutional neural networks (CNN) and bidirectional gated recurrent unit (Bi-GRU) algorithm. There are 4 models built, namely CNN, Bi-GRU, CNN+Bi-GRU, and Bi-GRU+CNN. Term frequency-inverse document frequency (TF-IDF) is used for feature extraction, which is to get linguistic features to be analyzed and studied. FastText is used to perform feature expansion to minimize mismatched vocabulary. Four scenarios are run. CNN with an accuracy of 87.63%, Bi-GRU produces an accuracy of 87.46%, CNN+Bi-GRU provides an accuracy of 87.47% and Bi-GRU+CNN provides an accuracy of 87.34%. The ability of this approach to understand the context is qualified. HDL outperforms SDL in terms of n-gram type, where HDL can understand sentences broken down by hybrid n-gram types, namely Unigram-Bigram-Trigram which is a complex n-gram hybrid.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140356962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification and keyword extraction of online harassment text in Thai social network 泰国社交网络中网络骚扰文本的分类和关键词提取
Bulletin of Electrical Engineering and Informatics Pub Date : 2023-12-01 DOI: 10.11591/eei.v12i6.5939
Siranuch Hemtanon, Ketsara Phetkrachang, Wachira Yangyuen
{"title":"Classification and keyword extraction of online harassment text in Thai social network","authors":"Siranuch Hemtanon, Ketsara Phetkrachang, Wachira Yangyuen","doi":"10.11591/eei.v12i6.5939","DOIUrl":"https://doi.org/10.11591/eei.v12i6.5939","url":null,"abstract":"Online harassment in social network services (SNS) is a type of cyberbullying issue that needs to be addressed and required preventive measures. In this paper, we develop a detection of cyberbullying regarding harassment textual posts in Thai on the Facebook SNS. We collect public posts and ask experts to label the post as positive or negative regarding harassment posts or not. The annotated data are trained for binary classification considering words in the centre as features to predict malicious intent to insult and threaten other users. The information gain score obtained in generating a prediction model is ranked for the top 20 words with the highest score as significant words involving online harassment. From experiments, the results show that the detection performance obtained a 0.78 f1 score on average. The result analysis indicated that the word surface approach helps detect insulting post decently, but some posts with metaphor to tone down the malicious intent may not be detected as harmful semantic intent are hidden behind word form. Top-20 significant words for bullying showed that bullying posts were body-shaming and lower social status.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138609924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A highly scalable CF recommendation system using ontology and SVD-based incremental approach 使用本体和基于 SVD 的增量方法的高度可扩展 CF 推荐系统
Bulletin of Electrical Engineering and Informatics Pub Date : 2023-12-01 DOI: 10.11591/eei.v12i6.6261
Sajida Mhammedi, Noreddine Gherabi, Hakim El Massari, Zineb Sabouri, Mohamed Amnai
{"title":"A highly scalable CF recommendation system using ontology and SVD-based incremental approach","authors":"Sajida Mhammedi, Noreddine Gherabi, Hakim El Massari, Zineb Sabouri, Mohamed Amnai","doi":"10.11591/eei.v12i6.6261","DOIUrl":"https://doi.org/10.11591/eei.v12i6.6261","url":null,"abstract":"In recent years, the need of recommender systems has increased to enhance user engagement, provide personalized services, and increase revenue, especially in the online shopping industry where vast amounts of customer data are generated. Collaborative filtering (CF) is the most widely used and effective approach for generating appropriate recommendations. However, the current CF approach has limitations in addressing common recommendation problems such as data inaccuracy recommendations, sparsity, scalability, and significant errors in prediction. To overcome these challenges, this study proposes a novel hybrid CF method for movie recommendations that combines the incremental singular value decomposition approach with an item-based ontological semantic filtering approach in two phases, online and offline. The ontology-based technique is leveraged to enhance the accuracy of predictions and recommendations. Evaluating our method on a real-world movie recommendation dataset using precision, F1 scores, and mean absolute error (MAE) demonstrates that our system generates accurate predictions while addressing sparsity and scalability issues in recommendation system. Additionally, our method has the advantage of reduced running time.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138612021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realization of fractional order lowpass filter using different approximation techniques 使用不同近似技术实现分数阶低通滤波器
Bulletin of Electrical Engineering and Informatics Pub Date : 2023-12-01 DOI: 10.11591/eei.v12i6.5750
Battula Tirumala Krishna, M. Janarthanan
{"title":"Realization of fractional order lowpass filter using different approximation techniques","authors":"Battula Tirumala Krishna, M. Janarthanan","doi":"10.11591/eei.v12i6.5750","DOIUrl":"https://doi.org/10.11591/eei.v12i6.5750","url":null,"abstract":"Many research groups are starting to pay serious attention to the problem of fractional-order circuits. In this paper, a new approach to designing fractional order low-pass filter (FOLPF) is presented. Finding a rational approximation of the fractional Laplace operator sα is a crucial step in the design of fractional order filters. A comparative study of the most widely used approximation techniques named continued fraction expansion (CFE) method and Biquadratic Approximation (RE) method is performed. Then the transfer function of the proposed FOLPF is calculated. Using operational amplifier, the proposed filter is synthesized. The proposed circuit is simulated using Texas instruments TINA software. The results obtained outperform the existing methods.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138615373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An electronic nose for insecticides detection in food: the case of alpha-cypermethrin in Swiss chard 用于检测食品中杀虫剂的电子鼻:瑞士甜菜中甲型氯氰菊酯的案例
Bulletin of Electrical Engineering and Informatics Pub Date : 2023-12-01 DOI: 10.11591/eei.v12i6.5956
Ali Amkor, A. Aboulkacem, Noureddine El Barbri
{"title":"An electronic nose for insecticides detection in food: the case of alpha-cypermethrin in Swiss chard","authors":"Ali Amkor, A. Aboulkacem, Noureddine El Barbri","doi":"10.11591/eei.v12i6.5956","DOIUrl":"https://doi.org/10.11591/eei.v12i6.5956","url":null,"abstract":"Due to the disturbingly high quantities of pesticides found in recent years, it has become essential to analyze the food composition intended for consumption. In this study and from a similar angle, we are interested in the detection of alpha-cypermethrin insecticide residues in edible Swiss chard. To this end, we suggest an electronic nose that was constructed using metal oxide gas sensors. Following data collection and pre-processing, two machine learning algorithms—principal component analysis (PCA) and support vector machine (SVM)—were used to analyze the sensor matrix data. The PCA method initially showed that the first three principal components (PCs) may account for more than 96.5% of the sample variation with a clear distinction between known groups corresponding to treated and untreated samples. The identification of untreated Swiss chard from treated one was then accomplished using the SVM method with five folds cross-validation, with a success rate of 92.3%. These results show that our suggestion, which is quick, easy, and affordable, can be utilized as an effective substitute for current methods for identifying Swiss chard that has been treated with the hazardous alpha-cypermethrin.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138621657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake account detection in social media using machine learning methods: literature review 使用机器学习方法检测社交媒体中的虚假账户:文献综述
Bulletin of Electrical Engineering and Informatics Pub Date : 2023-12-01 DOI: 10.11591/eei.v12i6.5334
Nalia Graciella Kerrysa, Ika Qutsiati Utami
{"title":"Fake account detection in social media using machine learning methods: literature review","authors":"Nalia Graciella Kerrysa, Ika Qutsiati Utami","doi":"10.11591/eei.v12i6.5334","DOIUrl":"https://doi.org/10.11591/eei.v12i6.5334","url":null,"abstract":"With the rapid development of emerging technologies in the industrial revolution 4.0 or 5.0, social media has become one of the social environments to carry out social activities, both socializing and advertising. However, since it is an open platform by nature, cybercrime occurrence in social media is inevitable. Currently, more than a million fake accounts are existing on Instagram, Twitter, and Facebook, intending to increase followers, spread hoaxes, and spam. On one hand, it is difficult to manually eliminate these accounts on social media platforms. On the other hand, research on automatic fake account detection has been carried out for more than a decade. This study provides literature reviews aiming to deliver information about several methods and machine learning algorithms with the performances measured in identifying fake accounts on three well-known social media platforms: Twitter, Instagram, and Facebook.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138992194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of single axis tracker technology and automatic battery monitoring in solar hybrid systems 太阳能混合动力系统中的单轴跟踪器技术和自动电池监测性能
Bulletin of Electrical Engineering and Informatics Pub Date : 2023-12-01 DOI: 10.11591/eei.v12i6.5506
Habib Satria, Sapto Nisworo, Jaka Windarta, Rahmad B. Y. Syah
{"title":"Performance of single axis tracker technology and automatic battery monitoring in solar hybrid systems","authors":"Habib Satria, Sapto Nisworo, Jaka Windarta, Rahmad B. Y. Syah","doi":"10.11591/eei.v12i6.5506","DOIUrl":"https://doi.org/10.11591/eei.v12i6.5506","url":null,"abstract":"Utilization of elevation angles and azimuth angles is a very important part in maximizing solar energy into electrical energy in photovoltaic (PV). One way to maximize PV power output is to design a single axis tracker system and take into account the azimuth and elevation angles of the sun using the sun position calculator application. The single axis tracker system is set based on the position of the angle of inclination of the surface of the PV 45°, then the angle of 90° and the angle of inclination of 135°. The test results show that the single axis tracker PV system design can work based on the angle settings that have been programmed. Then the use of a battery control system to support the PV reliability system automatically cuts off electricity when the battery voltage drops below 12 V during cloudy weather conditions and excessive battery usage. The integration of the PZEM-017 module with the battery will support monitoring of battery power usage in real time. PV energy data conversion performance uses single axis tracker technology for maximum power reaching 631.72 Watt DC at 12.00 pm and the lowest power reaching 56.02 Watt DC at 6.00 pm.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139016067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative study of Gaussian mixture algorithm and K-means algorithm for efficient energy clustering in MWSN 高斯混合算法与 K-means 算法在 MWSN 中进行高效能量聚类的比较研究
Bulletin of Electrical Engineering and Informatics Pub Date : 2023-12-01 DOI: 10.11591/eei.v12i6.5707
Iman Ameer Ahmad, Muna Mohammed Jawad Al-Nayar, Ali M. Mahmood
{"title":"A comparative study of Gaussian mixture algorithm and K-means algorithm for efficient energy clustering in MWSN","authors":"Iman Ameer Ahmad, Muna Mohammed Jawad Al-Nayar, Ali M. Mahmood","doi":"10.11591/eei.v12i6.5707","DOIUrl":"https://doi.org/10.11591/eei.v12i6.5707","url":null,"abstract":"Wireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving energy of up to 92% at 4,500 rounds.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138609046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On-off attack detection in trust model using intra-daily variability for the IoT 在信任模型中利用物联网的日内变化检测攻击行为
Bulletin of Electrical Engineering and Informatics Pub Date : 2023-12-01 DOI: 10.11591/eei.v12i6.6110
Sornalakshmi Kannan, Revathi Venkataraman, G. Ramachandran
{"title":"On-off attack detection in trust model using intra-daily variability for the IoT","authors":"Sornalakshmi Kannan, Revathi Venkataraman, G. Ramachandran","doi":"10.11591/eei.v12i6.6110","DOIUrl":"https://doi.org/10.11591/eei.v12i6.6110","url":null,"abstract":"The growth of the internet of things (IoT) increases the need to develop the trust computational model for heterogeneous networks with various IoT devices. Trust models are considered as an effective tool to mitigate insider attacks induced by IoT devices. However, trust models are exposed to on-off attacks, in which devices randomly exhibit good and bad behaviors to avoid being categorized as low-trust devices. The objective of this work is to recognize the malicious devices executing on-off attacks in IoT applications. This paper introduces an on-off attack detection strategy for the trust computational model based on the non-parametric index named intra-daily variability (IV). IV indicates trust fragmentation which depends on the frequency and the transitions between periods of low and high trust values of a device. The higher value of IV indicates the occurrence of fragmented trust values and the lower value of IV indicates the occurrence of non-fragmented trust values. Experimental results show that the proposed model outperforms the baseline methods by increasing the on-off attack detection rate.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138610261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信