International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
111 Documents
Search results for
, issue
"Vol 14, No 1: February 2024"
:
111 Documents
clear
The role of Louvain-coloring clustering in the detection of fraud transactions
Mardiansyah, Heru;
Suwilo, Saib;
Nababan, Erna Budhiarti;
Efendi, Syahril
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v14i1.pp608-616
Clustering is a technique in data mining capable of grouping very large amounts of data to gain new knowledge based on unsupervised learning. Clustering is capable of grouping various types of data and fields. The process that requires this technique is in the business sector, especially banking. In the transaction business process in banking, fraud is often encountered in transactions. This raises interest in clustering data fraud in transactions. An algorithm is needed in the cluster, namely Louvain’s algorithm. Louvain’s algorithm is capable of clustering in large numbers, which represent them in a graph. So, the Louvain algorithm is optimized with colored graphs to facilitate research continuity in labeling. In this study, 33,491 non-fraud data were grouped, and 241 fraud transaction data were carried out. However, Louvain’s algorithm shows that clustering increases the amount of data fraud of 90% by accurate.
A study of feature extraction for Arabic calligraphy characters recognition
Zoizou, Abdelhay;
Errebiai, Chaimae;
Zarghili, Arsalane;
Chaker, Ilham
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v14i1.pp870-877
Optical character recognition (OCR) is one of the widely used pattern recognition systems. However, the research on ancient Arabic writing recognition has suffered from a lack of interest for decades, despite the availability of thousands of historical documents. One of the reasons for this lack of interest is the absence of a standard dataset, which is fundamental for building and evaluating an OCR system. In 2022, we published a database of ancient Arabic words as the only public dataset of characters written in Al-Mojawhar Moroccan calligraphy. Therefore, such a database needs to be studied and evaluated. In this paper, we explored the proposed database and investigated the recognition of Al-Mojawhar Arabic characters. We studied feature extraction by using the most popular descriptors used in Arabic OCR. The studied descriptors were associated with different machine learning classifiers to build recognition models and verify their performance. In order to compare the learned and handcrafted features on the proposed dataset, we proposed a deep convolutional neural network for character recognition. Regarding the complexity of the character shapes, the results obtained were very promising, especially by using the convolutional neural network model, which gave the highest accuracy score.
Memory built-in self-repair and correction for improving yield: a review
Sontakke, Vijay;
Atchina, Delsikreo
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v14i1.pp140-156
Nanometer memories are highly prone to defects due to dense structure, necessitating memory built-in self-repair as a must-have feature to improve yield. Today’s system-on-chips contain memories occupying an area as high as 90% of the chip area. Shrinking technology uses stricter design rules for memories, making them more prone to manufacturing defects. Further, using 3D-stacked memories makes the system vulnerable to newer defects such as those coming from through-silicon-vias (TSV) and micro bumps. The increased memory size is also resulting in an increase in soft errors during system operation. Multiple memory repair techniques based on redundancy and correction codes have been presented to recover from such defects and prevent system failures. This paper reviews recently published memory repair methodologies, including various built-in self-repair (BISR) architectures, repair analysis algorithms, in-system repair, and soft repair handling using error correcting codes (ECC). It provides a classification of these techniques based on method and usage. Finally, it reviews evaluation methods used to determine the effectiveness of the repair algorithms. The paper aims to present a survey of these methodologies and prepare a platform for developing repair methods for upcoming-generation memories.
Experimental analysis of intrusion detection systems using machine learning algorithms and artificial neural networks
Abdulkareem, Ademola;
Somefun, Tobiloba Emmanuel;
Mutalub, Adesina Lambe;
Adeyinka, Adewale
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v14i1.pp983-992
Since the invention of the internet for military and academic research purposes, it has evolved to meet the demands of the increasing number of users on the network, who have their scope beyond military and academics. As the scope of the network expanded maintaining its security became a matter of increasing importance. With various users and interconnections of more diversified networks, the internet needs to be maintained as securely as possible for the transmission of sensitive information to be one hundred per cent safe; several anomalies may intrude on private networks. Several research works have been released around network security and this research seeks to add to the already existing body of knowledge by expounding on these attacks, proffering efficient measures to detect network intrusions, and introducing an ensemble classifier: a combination of 3 different machine learning algorithms. An ensemble classifier is used for detecting remote to local (R2L) attacks, which showed the lowest level of accuracy when the network dataset is tested using single machine learning models but the ensemble classifier gives an overall efficiency of 99.8%.
Efficient network management and security in 5G enabled internet of things using deep learning algorithms
Poojari Thippeswamy, Sowmya Naik;
Raghavan, Ambika Padinjareveedu;
Rajgopal, Manjunath;
Sujith, Annie
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v14i1.pp1058-1070
The rise of fifth generation (5G) networks and the proliferation of internet-of-things (IoT) devices have created new opportunities for innovation and increased connectivity. However, this growth has also brought forth several challenges related to network management and security. Based on the review of literature it has been identified that majority of existing research work are limited to either addressing the network management issue or security concerns. In this paper, the proposed work has presented an integrated framework to address both network management and security concerns in 5G internet-of-things (IoT) network using a deep learning algorithm. Firstly, a joint approach of attention mechanism and long short-term memory (LSTM) model is proposed to forecast network traffic and optimization of network resources in a, service-based and user-oriented manner. The second contribution is development of reliable network attack detection system using autoencoder mechanism. Finally, a contextual model of 5G-IoT is discussed to demonstrate the scope of the proposed models quantifying the network behavior to drive predictive decision making in network resources and attack detection with performance guarantees. The experiments are conducted with respect to various statistical error analysis and other performance indicators to assess prediction capability of both traffic forecasting and attack detection model.
Investigation of auto-oscilational regimes of the system by dynamic nonlinearities
Siddikov, Isamidin;
Khalmatov, Davronbek;
Alimova, Gulchekhra;
Khujanazarov, Ulugbek;
Feruzaxon, Sadikova;
Usanov, Mustafaqul
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v14i1.pp230-238
The paper proposes a method for the analysis and synthesis of self-oscillations in the form of a finite, predetermined number of terms of the Fourier series in systems reduced to single-loop, with one element having a nonlinear static characteristic of an arbitrary shape and a dynamic part, which is the sum of the products of coordinates and their derivatives. In this case, the nonlinearity is divided into two parts: static and dynamic nonlinearity. The solution to the problem under consideration consists of two parts. First, the parameters of self-oscillations are determined, and then the parameters of the nonlinear dynamic part of the system are synthesized. When implementing this procedure, the calculation time depends on the number of harmonics considered in the first approximation, so it is recommended to choose the minimum number of them in calculations. An algorithm for determining the self-oscillating mode of a control system with elements that have dynamic nonlinearity is proposed. The developed method for calculating self-oscillations is suitable for solving various synthesis problems. The generated system of equations can be used to synthesize the parameters of both linear and nonlinear parts. The advantage is its versatility.
Survey on detecting and preventing web application broken access control attacks
Anas, Ahmed;
Elgamal, Salwa;
Youssef, Basheer
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v14i1.pp772-781
Web applications are an essential component of the current wide range of digital services proposition including financial and governmental services as well as social networking and communications. Broken access control vulnerabilities pose a huge risk to that echo system because they allow the attacker to circumvent the allocated permissions and rights and perform actions that he is not authorized to perform. This paper gives a broad survey of the current research progress on approaches used to detect access control vulnerabilities exploitations and attacks in web application components. It categorizes these approaches based on their key techniques and compares the different detection methods in addition to evaluating their strengths and weaknesses. We also spotted and elaborated on some exciting research gaps found in the current literature, Finally, the paper summarizes the general detection approaches and suggests potential research directions for the future.
Synthesis of the neuro-fuzzy regulator with genetic algorithm
Siddikov, Isamiddin;
Porubay, Oksana;
Rakhimov, Temurbek
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v14i1.pp184-191
Real-acting objects are characterized by the presence of various types of random perturbations, which significantly reduce the quality of the control process, which determines the use of modern methods of intellectual technology to solve the problem of synthesis of control systems of structurally complex dynamic objects, allowing to compensate the influence of external factors with the properties of randomness and partial uncertainty. The article considers issues of synthesis of the automatic control system of dynamic objects by applying the theory of intelligent control. In this case, a neural network based on radial-basis functions is used at each discrete interval for neuro-fuzzy approximation of the control system, allowing real-time adjustment of the regulator parameters. The radial basis function is designed to approximate functions defined in the implicit form of pattern sets. The neuro-fuzzy regulator's parameter configuration is accomplished using a genetic algorithm, enabling more efficient computation to determine the regulator's set parameters. The regulator's parameters are represented as a vector, facilitating their application to multidimensional objects. To determine the optimal tuning parameters of the neuro-fuzzy regulator, characterized by high convergence and the possibility of determining global extrema, a genetic algorithm was used. The effectiveness of the neuro-fuzzy regulator is explained by the possibility of providing quality control of the dynamic object under random perturbations and uncertainty of input data.
Unconsidered but influencing interference in unmanned aerial vehicle cabling system
Setyadewi, Imas Tri;
Prabowo, Yanuar;
Wibowo, Priyo;
Priambodo, Purnomo Sidi
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v14i1.pp22-30
The increasing complexity of electrical and electronic systems in unmanned aerial vehicles (UAVs) has raised concerns regarding unwanted electromagnetic interference (EMI) due to limited compartment space. Recent studies have highlighted the UAV cabling as the primary pathway for interference. This paper presents a novel approach to investigating the effects of interference power, polarization angle, and distance from the interference source on EMI in UAV cable systems. Measurements and simulations were performed to analyze the influence of these factors on the radiation received by the cable. A linear dipole antenna, operating at a frequency of 905 MHz, served as the radiation source, while a single wire cable pair terminated with a 50-ohm resistor was employed as the victim. The findings reveal that the power transmitted by the source, the distance between the cable and the source, and the polarization angle have a significant impact on the electromagnetic interference received by the cable. Notably, a perpendicular orientation of the cable to the interference source (antenna) in the far-field yielded a reduction of up to 15 dBm in EMI. The results underscore the necessity for more sophisticated models and comprehensive measurements to fully comprehend the diverse factors affecting polarization losses in practical scenarios.
Enhancing COVID-19 forecasting through deep learning techniques and fine-tuning
López, Alba Puelles;
Martínez-Béjar, Rodrigo;
Kusrini, Kusrini;
Setyanto, Arief;
Agastya, I Made Artha
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v14i1.pp934-943
In this study, a comprehensive analysis of classical linear regression forecasting models and deep learning techniques for predicting coronavirus disease of 2019 (COVID-19) pandemic data was presented. Among the deep learning models, the long short-term memory (LSTM) neural network demonstrated superior performance, delivering accurate predictions with minimal errors. The neural network effectively addressed overfitting and underfitting issues through rigorous tuning. However, the diversity of countries and dataset attributes posed challenges in achieving universally optimal predictions. The current study explored the application of the LSTM in predicting healthcare resource demand and optimizing hospital management to provide potential solutions for overcrowding and cost reduction. The results showed the importance of leveraging advanced deep learning techniques for improved COVID-19 forecasting and extending the application of the models to address broader healthcare challenges beyond the pandemic. To further enhance the model performance, future work needed to incorporate additional attributes, such as vaccination rates and immune percentages.