cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 111 Documents
Search results for , issue "Vol 15, No 2: April 2025" : 111 Documents clear
A unique YOLO-based gated attention deep convolution network-Lichtenberg optimization algorithm model for a precise breast cancer segmentation and classification Rathinam, Vinoth; Rajendran, Sasireka; Krishnasamy, Valarmathi
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1670-1685

Abstract

A novel you only look once (YOLO)-based gated attention deep convolution network (GADCN) classification algorithm is developed and utilized in this present study for the detection of breast cancer. In this framework, contrast enhancement-based histogram equalization is applied initially to produce the normalized breast image with reduced noise artifacts. Then, the breast region is accurately segmented from the preprocessed images with low complexity and segmentation error using the YOLO-based attention network model. To diagnose breast cancer with better accuracy, the GADCN model is used to predict the exact class of image (i.e., benign or malignant). During classification, the activation function is optimally computed with the use of the Lichtenberg optimization algorithm (LOA). It aids in achieving improved classification performance with little complexity in training and assessment. The significance of the present study includes the use of a unique, YOLO-based GADCN-LOA model that helps in the prediction of breast cancer with higher accuracy. It was observed that the model exhibited 99% accuracy for the datasets utilized. In addition, the selected model outperforms well with sensitivity, specificity, precision, and F1-score. Hence the proposed model could be exploited for the diagnosis of breast cancer at an early stage to enable preventive care.
A comprehensive analysis of different models: skin cancer detection Thorat, Amruta; Jadhav, Chaya
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2404-2415

Abstract

Due to fast-growing worldwide air pollution and ozone layer destruction, an alarming number of people are found to have skin cancer, more than any other kind of cancer combined. It is known to be one of the deadliest malignancies; if not identified and cured in its early stages, it is likely to spread to other body parts. Early detection is critical and helps prevent cancer from spreading. This allows for early decisions on diagnostic and treatment options. Early diagnosis and discovery, combined with the right treatment, can save lives. In this paper, we have done a detailed survey on various techniques and models developed for skin cancer detection and also discussed different security-related issues. This work thoroughly explores the several types of models utilized to identify cancer in the skin.
Novel technique to deblurring and blur detection techniques for enhanced visual clarity of ancient images Pawar, Poonam; Ainapure, Bharati
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2314-2324

Abstract

Digital image quality often degrades due to various factors such as noise and blur. Many images are affected by these issues, reducing their clarity and accuracy. This degradation is especially problematic for ancient images, significantly hampers the ability to analyze historical documents and artworks. This paper presents a novel approach to both blur detection and deblur ancient images, enhancing their clarity and readability. This research introduces a technique that combines wavelet transform and convolutional neural networks (CNNs) for effective blur identification and deblurring, specifically aimed at restoring blurred ancient images, regardless of the type of blur degradation. This novel approach demonstrated an average accuracy of 98.3% in blur detection on ancient image datasets. The performance of deblurring algorithms is typically evaluated using metrics such as peak signal-to-noise ratio (PSNR), mean squared error (MSE), and structural similarity index (SSIM) which quantify fidelity and quality of the deblurred images. In the deblurring, this approach produced PSNR values of 55.5 to 68.3 dB, MSE values of 2.99 to 11.1, and an SSIM of 0.9 across different types of blurs. These results show significant promise for the restoration of ancient images, providing researchers, historians, and archaeologists with valuable tool for conservation cultural heritage.
Advanced stress detection with optimized feature selection and hybrid neural networks Patil, Sangita Ajit; Paithane, Ajay Namdeorao
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1647-1655

Abstract

Stress impacts both mental and physical health, potentially leading to serious conditions like cardiovascular diseases and mental disorders. Early detection of stress is crucial for reducing these risks. This study aims to improve stress detection by analyzing physiological signals, specifically electroencephalography (EEG) and electrocardiogram (ECG). EEG is affordable, while ECG provides detailed insights into cardiovascular health. Feature selection is a major challenge in analyzing these signals. To address this, the research introduces a novel method that combines the Archimedes optimization algorithm (AoA) with the analytical hierarchical process (AHP) to enhance accuracy in both single and multimodal systems. The proposed multimodal system employs a parallel-structured convolutional neural network (CNN) with a deep architecture to extract spatial features and uses a long short-term memory (LSTM) network to capture temporal dynamics. Experimental results show significant improvements: ECG stress detection accuracy rises from 88.6% to 91.79%, EEG accuracy increases from 95% to 96.6%, and multimodal stress detection accuracy reaches 98.6%. These results highlight the effectiveness of the AoA-AHP-based feature selection technique in boosting stress detection accuracy, contributing to improved mental health management and overall well-being.
Improved convolutional neural network-based bearing fault diagnosis using multi-phase motor current signals Huu, Hai Dang; Bui, Ngoc-My; Hoang, Van-Phuc; Bui Quy, Thang; Hoang Thi, Yen
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1656-1669

Abstract

Diagnosing bearing faults of the induction motor is crucial for the maintenance of rotating electrical machines. Numerous methods have been developed and published for monitoring and classifying these faults using sensor data such as vibration, audio, and current signals. Ideally, the current phases are balanced; however, faults disrupt this symmetry, causing each phase to reveal unique diagnostic details. Consequently, studies that rely on a single phase of the current signal may not capture all fault-related characteristics. Research on motor bearing fault diagnosis using two current phases typically extracts features from each phase separately, applying machine learning to classify the faults. Currently, no approach has been proposed to extract features from both phases simultaneously. Furthermore, the proposed solutions have only been published with noise-free data. To address these challenges, this paper introduces an enhanced solution that improves the accuracy of motor bearing fault classification based on an improved convolutional neural network that processes current signals from two phases simultaneously. Experimental results demonstrate that the proposed method significantly outperforms traditional approaches, particularly in scenarios where the sample signals are noise-adding signals. Fault classification accuracy of the proposed improved convolutional neural network (MI-CNN) about 95.12% with noise-adding signals at the signal-to- noise ratio of 20 dB.
Tackling the anomaly detection challenge in large-scale wireless sensor networks Zhukabayeva, Tamara; Adamova, Aigul; Zholshiyeva, Lazzat; Mardenov, Yerik; Karabayev, Nurdaulet; Baumuratova, Dilaram
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2479-2490

Abstract

One of the areas of ensuring the security of a wireless sensor network (WSN) is anomaly detection, which identifies deviations from normal behavior. In our paper, we investigate the optimal anomaly detection algorithms in a WSN. We highlight the problems in anomaly detection, and we also propose a new methodology using machine learning. The effectiveness of the k-nearest neighbor (kNN) and Z Score methods is evaluated on the data obtained from WSN devices in real time. According to the experimental study, the Z Score methodology showed a 98.9% level of accuracy, which was much superior to the kNN 43.7% method. In order to ensure accurate anomaly detection, it is crucial to have access to high-quality data when conducting a study. Our research enhances the field of WSN security by offering a novel approach for detecting anomalies. We compare the performance of two methods and provide evidence of the superior effectiveness of the Z Score method. Our future research will focus on exploring and comparing several approaches to identify the most effective anomaly detection method, with the ultimate goal of enhancing the security of WSN.
Maximum expansion with contiguity constraints scheduling algorithm: enhancing uplink transmission in long-term evolution vehicular environments Ismail, Shafinaz; Maidin, Shajahan; Ali, Darmawaty Mohd; Rahim, Mohd Kamarulnizam Abdul
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1709-1719

Abstract

Uplink scheduling has become increasingly important due to increased activities like uploading videos, photos, and file sharing. Many users share or stream live videos and engage with social networks, significantly increasing uplink data traffic volume. Single carrier frequency division multiple access (SC-FDMA) is favored for its power efficiency and high data rates, benefiting user equipment (UE) battery life. However, maintaining the contiguity of resource blocks (RBs) poses challenges in uplink scheduling. The maximum expansion with contiguity constraints (MECC) algorithm has been introduced to address this challenge. MECC prioritizes contiguity, fairness, and throughput for users at the cell edge. The algorithm operates in two phases: initially allocating RBs proportionally and assigning RBs with the highest metrics while ensuring contiguity. Performance evaluation of MECC, conducted under conditions simulating vehicular movement at 30 km/h, demonstrates its superiority over other algorithms. MECC provides high fairness and throughput for both real-time (RT) and non-real-time (NRT) traffic, making it the preferred scheduler for ensuring quality of service (QoS) for both traffic types. Its focus on contiguity, fairness, throughput, and spectral efficiency establishes MECC as a valuable tool for optimizing uplink transmission in mobile networks, addressing the evolving needs of users in today's digital landscape.
An adaptive audio wave steganography using simulated annealing algorithm Obeidat, Atef Ahmed; Bawaneh, Mohmmed Jazi; Shqair, Sawsan Yousef Abu; Al-Omari, Hamdi A.; Al-shalabi, Emad Fawzi
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2237-2253

Abstract

The science of information security has increased in importance to encounter the espionage and information theft. This research proposes a new steganography framework that utilizes simulated annealing (SA) as an artificial intelligence algorithm to support the process of hiding a binary secret message file within an audio wave file. The best path for embedding the secret data inside the audio file is determined through SA that searches for the preferred path according to the content of the host audio file and secret message to be hidden. The least significant bit (LSB) technique was employed to hide message bytes, in which each audio-chosen byte will hold one bit from a secret message byte. The hiding process constructs the stego audio file and extraction key that will be required in an extraction process. The authorized user requires an extraction key and a decryption key to retrieve the hidden message. On the other hand, the attacker requires knowledge of the aforementioned keys and working algorithms that were employed in the hidden process. Robustness against data extraction, detection, imperceptibility (phonological hearing), security, peak signal to noise ratio (PSNR), mean square error (MSE) and capacity as security performance measures were used to evaluate the system. The maximum size of the data to be hidden may reach 12.5% of the data size of the host audio file, in which the average value of MSE and PSNR are (0.0041, 74.73), respectively.
A secure and cloud-based patient management system using attribute-based encryption algorithm Kalarani, Senthilkumar; Shobana, Mahalingam; Shankari, Edamakanti Uma; Praveena, Bolly Joshi; Shanthi, Subramaniam; Ramadevi, Rathinasabapathy; Sandiri, Rajendar
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2445-2454

Abstract

Using attribute-based encryption (ABE), cloud-based patient management systems may be made more secure and efficient. The goal is to provide a scalable encryption infrastructure with dynamic attribute handling and context-aware access control for safe data access. Encryption procedures should directly comply with regulatory criteria to secure healthcare data and ensure data privacy and integrity. Secure attribute issuance and revocation are achieved using advanced key management and real-time auditing and monitoring to identify and react to unauthorised access. To help healthcare providers handle data, user-centric security measures including extensive training and adaptive security procedures are used. The encryption system is implemented and maintained using cost-effective cloud and open-source methodologies to ensure seamless integration and operational effectiveness in healthcare contexts. First, secure patient management system dataset results reveal ABE algorithm encryption. The encrypted values are 8F5D6A..., 7C4A3B..., 6E3B2C..., 9D8A7B..., 5E4D3C.... in the second instance, derived from role-based access control of ABE. The patients are 25-60 years old, have medical codes 101-105, 201-205, and 301-305. For roles from different fields, attribute code is 401-406, level code is 501-505.
Enhancing engineering education through virtual reality: a systematic study on immersive engineering education practices Riaji, Tarek; Hassani, Sanae El; Alaoui, Fatima Ezzahrae M'hamdi
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1889-1899

Abstract

This article explores the integration of virtual reality (VR) and associated technologies in engineering education, focusing on the pedagogical approaches adopted in this integration, which we refer to as immersive engineering education. This study considers the application possibilities and the transformative impact of VR on engineering education. The article addresses the critical collection and analysis of VR applications in engineering education. It covers main VR-related papers published from 2015 to February 2024 and indexed in Scopus, Web of Sciences, or both, and discussing design, development challenges, and collaborative tools. Empirical evidence showcases improved engagement, motivation, and learning outcomes. The findings offer modern insights for educators and researchers on leveraging VR for impactful learning experiences, while also noting the need for further research in this evolving field.

Page 1 of 12 | Total Record : 111


Filter by Year

2025 2025


Filter By Issues
All Issue Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue