cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 111 Documents
Search results for , issue "Vol 14, No 3: June 2024" : 111 Documents clear
Predictive models in Alzheimer's disease: an evaluation based on data mining techniques Andrade-Arenas, Laberiano; Rubio-Paucar, Inoc; Yactayo-Arias, Cesar
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp2988-3002

Abstract

The increasing prevalence of Alzheimer's disease in older adults has raised significant concern in recent years. Aware of this challenge, this research set out to develop predictive models that allow early identification of people at risk for Alzheimer's disease, considering several variables associated with the disease. To achieve this objective, data mining techniques were employed, specifically the decision tree algorithm, using the RapidMiner Studio tool. The sample explore modify model and assess (SEMMA) methodology was implemented systematically at each stage of model development, ensuring an orderly and structured approach. The results obtained revealed that 45.00% of people with dementia present characteristics that identify them as candidates for confirmation of a diagnosis of Alzheimer's disease. In contrast, 52.78% of those who do not have dementia show no danger of contracting the disease. In the conclusion of the research, it was noted that most patients diagnosed with Alzheimer's are older than 65 years, indicating that this stage of life tends to trigger brain changes associated with the disease. This finding underscores the importance of considering age as a key factor in the early identification of the disease.
Improved Vigenere approach incorporating pseudorandom affine functions for encrypting color images El Bourakkadi, Hamid; Chemlal, Abdelhakim; Tabti, Hassan; Kattass, Mourad; Jarjar, Abdellatif; Benazzi, Abdelhamid
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp2684-2694

Abstract

This article presents an improvement to the traditional Vigenere encryption method, specifically adapted for the encryption of color images. This enhancement relies on the use of two chaotic maps widely employed in the field of cryptography. After vectorizing the original image and calculating the initialization value, which alters the seeding pixel to trigger the encryption process, our approach integrates two new large substitution tables. These tables are linked to confusion and diffusion functions, incorporating multiple reversible pseudo-random affine functions at the pixel level. Finally, a global permutation is applied to the entire resulting vector to increase the temporal complexity of potential attacks on our system. Simulations conducted on a diverse set of images of various sizes and formats demonstrate the resilience of our approach against any unexpected attacks.
Redefining brain tumor segmentation: a cutting-edge convolutional neural networks-transfer learning approach Saifullah, Shoffan; Dreżewski, Rafał
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp2583-2591

Abstract

Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to precisely delineate tumor boundaries from magnetic resonance imaging (MRI) scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The model is rigorously trained and evaluated, exhibiting remarkable performance metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical image analysis and enhance healthcare outcomes. This research paves the way for future exploration and optimization of advanced CNN models in medical imaging, emphasizing addressing false positives and resource efficiency.
Design of higher gain linearly polarized 2×2 microstrip patch array antenna for wireless communication Gani, Prakash G.; Hegde, Shriram P.
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp2695-2707

Abstract

The fifth-generation technology is popular and best as far as data rates are concerned for wireless applications. To meet the increased demand of the modern world for faithful communication, this research work is carried out. In this approach, a single patch, 1×2 array, and 2×2 array are designed using a low-cost FR4 dielectric substrate (Є????=4.4) covering the 3.3–3.8 GHz frequency band. Due to the lack of gain from arrays in the present research, an attempt is made to achieve excellent gain from arrays with a minimum number of patches. First, the gain of a single inset-fed antenna is compared with another normal single patch of the same thickness but with an additional air dielectric medium. Next, the second single patch is extended to obtain a rectangular 1×2 array and a 2×2 array antenna. A second single patch measuring 50×32.5×0.8 mm is designed assuming an infinite ground plane. It has 3 mm air gap between the patch strip and the ground. Air acts as a second dielectric layer that reduces power loss. This allows a maximum gain of 15.2 dB with a return loss of -22 dB. Also, antenna efficiency and bandwidth are 91% and 267.69 MHz, respectively.
Data mining for predictive analysis in gynecology: a focus on cervical health Andrade-Arenas, Laberiano; Rubio-Paucar, Inoc; Yactayo-Arias, Cesar
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp2822-2833

Abstract

Currently, data mining based on the application of detection of important patterns that allow making decisions according to cervical cancer is a problem that affects women from the age of 24 years and older. For this purpose, the Rapid Miner Studio tool was used for data analysis according to age. To perform this analysis, the knowledge discovery in databases (KDD) methodology was used according to the stages that this methodology follows, such as data selection, data preparation, data mining and evaluation and interpretation. On the other hand, the comparison of methodologies such as the standard intersectoral process for data mining (Crips-dm), KDD and sample, explore, modify, model, evaluate (Semma) is shown, which is separated by dimensions and in each dimension both methodologies are compared. In that sense, a graph was created comparing algorithmic models such as naive Bayes, decision tree, and rule induction. It is concluded that the most outstanding result was -1.424 located in cluster 4 in the attribute result date.
Comprehensive review of load balancing in cloud computing system Oyediran, Mayowa O.; Ojo, Olufemi S.; Ajagbe, Sunday Adeola; Aiyeniko, Olukayode; Chima Obuzor, Princewill; Adigun, Matthew Olusegun
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp3244-3255

Abstract

Load balancing plays a critical role in optimizing resource utilization and enhancing performance in cloud computing systems. As cloud environments grow in scale and complexity, efficient load balancing mechanisms become increasingly vital. This paper presents a comprehensive review of load balancing techniques in cloud computing systems, with a focus on their applicability, advantages, and limitations. The review encompasses both static and dynamic load balancing approaches, evaluating their effectiveness in addressing the challenges posed by cloud infrastructure, such as heterogeneity, scalability, and variability in workload demands. Furthermore, the review examines load balancing algorithms considering factors such as resource utilization, response time, fault tolerance, and energy efficiency. Additionally, the impact of load balancing on cloud performance metrics, including throughput, latency, and scalability, is analyzed. This review aims to provide insights into the state-of-the-art load balancing strategies and serve as a valuable resource for researchers, practitioners, and system designers involved in the development and optimization of cloud computing systems.
Half mirror algorithm: a metaheuristic that hybridizes swarm intelligence and evolution-based system Kusuma, Purba Daru; Hasibuan, Faisal Candrasyah
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp3320-3331

Abstract

This paper promotes a new metaheuristic called the half mirror algorithm (HMA). As its name suggests, HMA offers a new kind of mirroring search. HMA is developed by hybridizing swarm intelligence and the evolution system. Swarm intelligence is adopted by constructing several autonomous agents called swarms. On the other hand, the evolution system is adopted using arithmetic crossover based on a particular reference called a mirror. Four mirrors are used in HMA: the best swarm member, a randomly selected swarm member, the central point of the space, and the corresponding swarm member. During the confrontative assessment, HMA is confronted with average and subtraction-based optimization (ASBO), total interaction algorithm (TIA), walrus optimization algorithm (WaOA), coati optimization algorithm (COA), and clouded leopard optimization (CLO). The result shows that HMA is superior to ASBO, TIA, WaOA, COA, and CLO in 20, 19, 19, 20, and 20 out of 23 functions, respectively. Moreover, HMA has found the global optimal of eight functions. It means the superiority of HMA occurs in almost entire functions. In the future, the mirroring search can be combined with the guided and neighborhood search to construct a more powerful metaheuristic.
Enhancing wireless sensor network security with optimized cluster head selection and hybrid public-key encryption Puttaswamy, Chaya; Kanakapura Shivaprasad, Nandini Prasad
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp2976-2987

Abstract

This paper introduces an integrated methodology that enhances both the efficiency and security of wireless sensor networks (WSNs) against various active attacks. A two-fold strategy is proposed that incorporates an advanced cluster head (CH) selection and a customized, lightweight encryption protocol. The CH selection process is optimized through a multi-phase approach using fuzzy logic, local and global network qualifiers, and a trust index to ensure the election of CHs that are not only energy-efficient but also reliable. To complement the robust CH selection, the study introduces a hybrid yet lightweight encryption scheme customized Rivest-Shamir-Adleman (c-RSA) and customized advanced encryption standard (c-AES) algorithms. This scheme is customized for WSNs with limited computational resources, maintaining strong encryption standards while significantly reducing energy consumption and computational overhead. Experimental results demonstrate that the proposed system substantially enhances network performance, exhibiting a 34.15% improvement in energy efficiency and a 30.95% increase in reliability over existing methods such as LEACH and its modified versions. This comprehensive approach underscores the potential for a synergistic design in WSNs that does not compromise on security while optimizing operational efficiency.
Automated classification of brain tumor-based magnetic resonance imaging using deep learning approach Owida, Hamza Abu; AlMahadin, Ghayth; Al-Nabulsi, Jamal I.; Turab, Nidal; Abuowaida, Suhaila; Alshdaifat, Nawaf
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp3150-3158

Abstract

The treatment of brain tumors poses significant challenges and contributes to a significant number of deaths on a global scale. The process of identifying brain tumors in medical practice involves the visual analysis of photographs by healthcare experts, who manually delineate the tumor locations. However, this approach is characterized by its time-consuming nature and susceptibility to errors. In recent years, scholars have put forth automated approaches to early detection of brain tumors. However, these techniques face challenges attributed to their limited precision and significant false-positive rates. There is a need for an effective methodology to identify and classify tumors, which involves extracting reliable features and achieving precise disease classification. This work presents a novel model architecture that is derived from the EfficientNetB3. The suggested framework has been trained and assessed on a dataset consisting of 7,023 magnetic resonance images. The findings of this study indicate that the fused feature vector exhibits superior performance compared to the individual vectors. Furthermore, the technique that was provided showed superior performance compared to the currently available systems and attained a 100% accuracy rate. As a result, it is viable to employ this technique within a clinical environment for the purpose of categorizing brain tumors based on magnetic resonance images scans.
Network intrusion detection system by applying ensemble model for smart home Amru, Malothu; Jagadeesh Kannan, Raju; Narasimhan Ganesh, Enthrakandi; Muthumarilakshmi, Surulivelu; Padmanaban, Kuppan; Jeyapriya, Jeyaprakash; Murugan, Subbiah
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp3485-3494

Abstract

The exponential advancements in recent technologies for surveillance become an important part of life. Though the internet of things (IoT) has gained more attention to develop smart infrastructure, it also provides a large attack surface for intruders. Therefore, it requires identifying the attacks as soon as possible to provide a secure environment. In this work, the network intrusion detection system, by applying the ensemble model (NIDSE) for Smart Homes is designed to identify the attacks in the smart home devices. The problem of classifying attacks is considered a classification predictive modeling using eXtreme gradient boosting (XGBoosting). It is an ensemble approach where the models are added sequentially to correct the errors until no further improvements or high performance can be made. The performance of the NIDSE is tested on the IoT network intrusion (IoT-NI) dataset. It has various types of network attacks, including host discovery, synchronized sequence number (SYN), acknowledgment (ACK), and hypertext transfer protocol (HTTP) flooding. Results from the cross-validation approach show that the XGBoosting classifier classifies the nine attacks with micro average precision of 94% and macro average precision of 85%.

Page 7 of 12 | Total Record : 111


Filter by Year

2024 2024


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue