cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 111 Documents
Search results for , issue "Vol 15, No 2: April 2025" : 111 Documents clear
Predicting stock prices using ensemble learning techniques Elsayed, Salma; Salah, Ahmad; Elhenawy, Ibrahim; Abdellah, Marwa
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1783-1792

Abstract

Stock price prediction has grown in importance due to its role in determining the future worth of business shares. There are several approaches for stock price prediction that can be classified into machine learning, deep learning, and ensemble learning methods. To predict stock prices, we proposed collecting a dataset for different well-known stocks, e.g., Microsoft. The utilized datasets consist of two parts; the first part contains a set of tweets for the stocks under investigation in this study which were collected from the X social media platform and the other part contains the stock prices. Sentimental features of the tweets were extracted and merged with the stock price changes. Then, we framed the problem as a regression task. we aim to analyze the performance gap between ensemble learning and other machine learning (ML) and deep learning (DL) models for predicting stock prices based on tweets. In this context, different ensemble learning models were proposed to predict the price change of each stock. Besides, several machine learning and deep learning models were used for comparison purposes. Several evaluation metrics were utilized to evaluate the performance of the proposed models. The experimental results proved that the stacking regressor model outperformed the other models.
Five-level three phase cascaded H-bridge inverter using digital signal processor control for renewable energy applications Hiransing, Bancha; Wasuri, Boonthong; Kuankid, Sanya; Muangpool, Thanin
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1348-1360

Abstract

This article presents a five-level three-phase cascaded H-bridge inverter for renewable energy applications, aimed at reducing total harmonic distortion (THD) and enhancing efficiency. The inverter uses a digital signal processing board, TMS320F28335, to generate pulse-width modulation signals through MATLAB/Simulink, ensuring precise control. The experimental setup includes an 84 VDC input voltage and a 300-watt load. Simulation and experimental results closely align, validating the accuracy of the simulation model. The output voltage shows a stepped pattern characteristic of multilevel inverters, significantly reducing harmonic distortion. THD analysis reveals a substantial reduction at higher modulation indices, with particularly low THD at a modulation index of 0.95. Consistent THD levels across modulation indices of 0.5, 0.8, and 0.95 demonstrate robust performance under varying conditions. Comparative analysis indicates that the proposed inverter achieves lower THD levels than traditional inverters, enhancing power quality and system efficiency. The five-level three-phase cascaded H-bridge inverter offers a promising solution for renewable energy applications by significantly reducing THD and improving power quality. Its robust performance and scalability potential contribute valuable advancements to renewable energy systems.
A novel technique for selecting financial parameters and technical indicators to predict stock prices bagalkot, Sneha S.; H. A., Dinesha; Naik, Nagaraj
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2192-2201

Abstract

Stock price predictions are crucial in financial markets due to their inherent volatility. Investors aim to forecast stock prices to maximize returns, but accurate predictions are challenging due to frequent price fluctuations. Most literature focuses on technical indicators, which rely on historical data. This study integrates both financial parameters and technical indicators to predict stock prices. It involves three main steps: identifying essential financial parameters using recursive feature elimination (RFE), selecting quality stocks with a decision tree (DT), and forecasting stock prices using artificial neural networks (ANN), deep neural networks (DNN), and extreme gradient boosting (XGBoost). The models’ performance is evaluated with root mean square error (RMSE) and mean absolute error (MAE) scores. ANN and DNN models showed superior performance compared to the XGBoost model. The experiments utilized Indian stock data.
An innovative Arabic light stemmer developed using a hybrid approach Namly, Driss; Bouzoubaa, Karim
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2356-2363

Abstract

Our study introduces an innovative light stemming tool tailored for Arabic morphology challenges. In conformance with the templatic and concatenative structures, our stemmer utilizes a combination of clitic stripping, lexicon-based, and statistical disambiguation techniques to ensure accurate stemming. To accomplish this, we rely on our clitic rules lexicon to detect all potential combinations of clitics for each input entry. Subsequently, we depend on an extensive lexicon of over 7 million stems to verify the potential stems. Lastly, we employ a statistical model to ascertain the most likely stem based on the sentence's context. Experimental results demonstrate the effectiveness of the proposed stemmer in comparison with existing ones. Using different datasets, our stemmer achieves higher accuracy and F1 scores, highlighting its efficiency in Arabic stemming tasks.
Improving water quality parameter prediction with multi-level linear regression model and hybrid feature selection Khurshid, Aleefia; Korke, Samruddhi; Kothari, Yudhir; Alone, Shruti; Bais, Khushali
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2381-2391

Abstract

Predicting and modeling the quality of water is essential to guarantee that the water is safe to drink. The chlorine content in water needs to be monitored in real-time to provide a consistent supply of drinkable water. Additionally, potassium and chlorine have a major impact on how appealing the water is, as they are important components that influence taste and odor. Therefore, to evaluate the levels of chlorine and potassium, this work presents a multivariable linear regression approach backed by a hybrid feature extraction method. To bridge the gap between the filter and wrapper approaches, a hybrid approach is used to remove unnecessary information and reduce processing time and complexity. Here the quantitative parameters, in conjunction with categorical parameters, are instrumental in enabling accurate prediction of two water quality parameters. The two developed multi-level regression (MLR) models for the prediction of potassium and chloride are useful when factors affecting water parameters fluctuate at the site level as well as over larger spatial or temporal scales giving consumers a visual representation of how each parameter influences prediction. The converged model outperforms in comparison with other machine learning algorithms with an MAE of 7.42e-15 for potassium and 3.72e-14 for chloride.
Underwater energy harvesting model for agricultural applications using stochastic network calculus Vignesh, S. R.; Sukumaran, Rajeev
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2031-2041

Abstract

Underwater wireless sensor network (UWSN) is a specialized type of wireless sensor network (WSN) designed for underwater communication among sensor nodes deployed in oceans for monitoring purposes such as observing marine life, detecting pollutants, and keeping track of oceanographic conditions. Managing limited energy in harsh underwater environments presents unique challenges compared to terrestrial networks. This research addresses this challenge by developing a reliable energy harvesting model. It analyzes the effects of delay and energy storage constraints on the energy harvesting rate (EHR), a measure of the energy replenished over time to maintain sensor node operations. It quantifies the amount of energy that can be harvested and stored within a given period, which is crucial for sustaining the network's functionality. The study includes analyzing and simulating the model analytically using discrete event simulators to evaluate delay performance bounds. Simulation results indicate that larger packet sizes require a higher minimum EHR, while stricter delay requirements decrease it for a fixed arrival rate.
Enhanced embedded system for various synthetic electrocardiogram generation using McSharry’s dynamic equation Hikmah, Nada Fitrieyatul; Setiawan, Rachmad; Andanis, Nafila Cahya; Pranata, Aldo
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1620-1631

Abstract

n electrocardiogram (ECG) is a signal that describes the heart’s electrical activity. Signal processing techniques are necessary to extract meaningful information from ECG signals. Researchers often use large databases like the PhysioNet database to evaluate the performance of algorithms. However, these databases have limitations concerning the lack of temporal or morphological variations. This study addresses this limitation by introducing a synthetic ECG capable of producing both normal 12-lead ECG signals and abnormal ECG signals and implementing it into the microcontroller. The primary contribution involves developing a synthetic ECG model using McSharry's dynamic equation model and implementing it using Mikromedia 5 for STM32F4 Capacitive as a microcontroller. This model enables users to set the desired heart rate and accurately replicates ECG waveforms using parameters ????????, ????????, and ????????, each determines the peak’s magnitude, the peak’s time duration, and the angular velocity of the trajectory. The synthetic ECG was evaluated qualitatively and quantitatively, demonstrating waveform similarity to the ECG signals. This study implies that the synthetic ECG model serves as a valuable tool for researchers and practitioners in electrocardiography. It enables the generation of normal and abnormal ECG signals, aiding in algorithm development and potentially enhancing the understanding and diagnosis of heart conditions.
An improved key scheduling for advanced encryption standard with expanded round constants and non-linear property of cubic polynomials Ganesan, Muthu Meenakshi; Selvaraj, Sabeen
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2455-2467

Abstract

The advanced encryption standard (AES) offers strong symmetric key encryption, ensuring data security in cloud computing environments during transmission and storage. However, its key scheduling algorithm is known to have flaws, including vulnerabilities to related-key attacks, inadequate nonlinearity, less complicated key expansion, and possible side-channel attack susceptibilities. This study aims to strengthen the independence among round keys generated by the key expansion process of AES—that is, the value of one round key does not reveal anything about the value of another round key—by improving the key scheduling process. Data sets of random, low, and high-density initial secret keys were used to evaluate the strength of the improved key scheduling algorithm through the National Institute of Standards and Technology (NIST) frequency test, the avalanche effect, and the Hamming distance between two consecutive round keys. A related-key analysis was performed to assess the robustness of the proposed key scheduling algorithm, revealing improved resistance to key-related cryptanalysis.
Intrusion detection based on generative adversarial network with random forest for cloud networks Rosline, Gnanam Jeba; Rani, Pushpa
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2491-2498

Abstract

The development of cloud computing enables individuals and organizations to access a wide range of online programs and services. Because of its nature, numerous users can access and distribute cloud infrastructure. In cloud computing several security threats change the data and operations. A network's ability to detect malicious activity and possible threats is greatly aided by intrusion detection. To solve these issues, intrusion detection based on generative adversarial network with random forest (GAN-RF) for cloud networks is introduced. The function of the generative adversarial networks (GANs) based network abnormality recognition system is evaluated. It uses the CICIDS2018 dataset to detect intrusion. GAN is utilized to improve network anomaly detection in conjunction with an ensemble random forest (RF) classifier. The GAN-RF model achieved 95.01% of accuracy for intrusion detection and obtain better recall and F1-score. Extensive assessments and valuations illustrate the efficiency of the GAN-RF approach in accurately identifying network issues.
Advancing network security: a comparative research of machine learning techniques for intrusion detection Rysbekov, Shynggys; Aitbanov, Abylay; Abdiakhmetova, Zukhra; Kartbayev, Amandyk
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2271-2281

Abstract

In the current digital era, the advancement of network-based technologies has brought a surge in security vulnerabilities, necessitating complex and dynamic defense mechanisms. This paper explores the integration of machine learning techniques within intrusion detection systems (IDS) to tackle the intricacies of modern network threats. A detailed comparative analysis of various algorithms, including k-nearest neighbors (KNN), logistic regression, and perceptron neural networks, is conducted to evaluate their efficiency in detecting and classifying different types of network intrusions such as denial of service (DoS), probe, user to root (U2R), and remote to local (R2L). Utilizing the national software laboratory knowledge discovery and data mining (NSL-KDD) dataset, a standard in the field, the study examines the algorithms’ ability to identify complex patterns and anomalies indicative of security breaches. Principal component analysis is utilized to streamline the dataset into 20 principal components for data processing efficiency. Results indicate that the neural network model is particularly effective, demonstrating exceptional performance metrics across accuracy, precision, and recall in both training and testing phases, affirming its reliability and utility in IDS. The potential for hybrid models combining different machine learning (ML) strategies is also discussed, highlighting a path towards more robust and adaptable IDS solutions.

Page 11 of 12 | Total Record : 111


Filter by Year

2025 2025


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue