cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Highly sensitive microwave sensor for metallic mine detection Aldhaeebi, Maged A.; Almoneef, Thamer S.
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i3.pp2631-2641

Abstract

This study introduces an innovative microwave system for detecting buried metallic landmines, providing an alternative to conventional imaging approaches. The system consists of two highly sensitive sensors, each configured with identical antennas arranged in a triangular formation to enhance sensitivity. The proposed microwave sensors exhibit exceptional sensitivity in detecting metallic landmines buried at various depths within sand and at different distances. Simulation and experimental studies were conducted using a foam box filled with sand and a metallic cube to simulate a landmine. The sensor’s sensitivity is evidenced by shifts in both the magnitude and phase of insertion loss (????21) between scenarios with and without a metallic mine, attributed to differences in dielectric properties between the sand and the mine in the microwave spectrum. The results from both simulations and experiments confirm the sensor’s capability to detect metallic mines at varying depths within the sand medium. The proposed system offers significant advantages over imaging technologies for mine detection, including cost-effectiveness, simplicity, and ease of data processing without the need for complex imaging algorithms.
Exploring the effectiveness of multiclass decision jungle for internet of things security Rajagopal, Smitha; Sarkar, Abhik; Manjunath, Venkat Narayanan
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i3.pp3095-3106

Abstract

Network intrusion detection systems (NIDS) are vital in protecting computer networks against cyber security incidents. The relationship between NIDS and internet of things (IoT) security is pivotal and NIDS plays a significant role in ensuring the security and reliability of IoT ecosystems. Ensuring the security of IoT devices is critical for several reasons. It helps safeguard sensitive information, guarantees the dependability of crucial infrastructure, meets regulatory obligations, and fosters user confidence. As the IoT ecosystem expands, prioritizing security is essential to minimize risks and maximize the benefits of connected devices. Given the ever-expanding cyber threat landscape, the multiclass classification task is essential to empower the NIDS with an ability to distinguish between various attack patterns in less computational time. The multiclass decision jungle algorithm is investigated to optimize the performance of NIDS. The research has considered permutation feature importance to include only the relevant features from the data. Using a contemporary dataset such as CICIOT 2023, the study has demonstrated an impressive attack detection rate of over 90% for 20 modern attack types. This research has investigated the effectiveness of IoT security measures and its prospective contributions to the field of cyber security.
A prediction of coconut and coconut leaf disease using MobileNetV2 based classification Gopalakrishna, Kavitha Magadi; Lingaraju, Raviprakash Madenur
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i3.pp2834-2844

Abstract

This research is aimed at effectively predicting coconut and coconut leaf disease using enhanced MobileNetV2 and ResNet50 methods. The stages involved in this implemented method are data collection, pre-processing, feature extraction, and classification. At first, data is collected from coconut and coconut leaf datasets. Gaussian filter and data augmentation techniques are applied on these images to eliminate noise during the pre-processing phase. Then, features are extracted using ResNet50 technique, while the diseases are classified using MobileNetV2 approach. In comparison to the existing methods namely, EfficientDet-D2, DL-assisted whitefly detection model (DL-WDM), and modified inception net-based hyper tuning support vector machine (MIN-SVM), the proposed method achieves superior classification values with 99.99% and 99.2% accuracy for coconut leaf and for coconuts, respectively.
A comprehensive survey on automatic image captioning-deep learning techniques, datasets and evaluation parameters Chauhan, Harshil; Thacker, Chintan
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i3.pp3257-3266

Abstract

Automatic image captioning is a pivotal intersection of computer vision and natural language processing, aiming to generate descriptive textual content from visual inputs. This comprehensive survey explores the evolution and state-of-the-art advancements in image caption generation, focusing on deep learning techniques, benchmark datasets, and evaluation parameters. We begin by tracing the progression from early approaches to contemporary deep learning methodologies, emphasizing encoder-decoder based models and transformer-based models. We then systematically review the datasets that have been instrumental in training and benchmarking image captioning models, including MSCOCO, Flickr30k, Flickr8k, and PASCAL 1k, discussing image count, types of scenes, and sources. Furthermore, we delve into the evaluation metrics employed to assess model performance, such as bilingual evaluation understudy (BLEU), metric for evaluation of translation with explicit ordering (METEOR), recall-oriented understudy for gisting evaluation (ROUGE), and consensus-based image description evaluation (CIDEr), analyzing their domains, bases, and measurement criteria. Through this survey, we aim to provide a detailed understanding of the current landscape, identify challenges, and propose future research directions in automatic image captioning.
Deep learning for predicting drug-related problems in diabetes patients Smadi, Fatima M.; Al-Radaideh, Qasem A.
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i3.pp2998-3009

Abstract

Machine learning and deep learning have made advances in the healthcare domain. In this study, we aim to apply deep learning models to predict the drug-related problems (DRPs) status for diabetes patients. Also, to determine the appropriate model to use for classification using deep learning algorithms or machine learning methods to investigate which one performed better results for tabular data by comparing the achieved deep learning results with the machine learning methods to figure out which one gives better results. To apply the deep learning models, the same criteria that were applied in the previous study have been implemented in this investigation, and the same dataset was used. The results show that the machine learning algorithms especially the random forests for predicting the DRPs status outperform the deep learning models. For classification tasks in healthcare for tabular data, the findings of this study show that machine learning methods are the appropriate model instead of using deep learning to apply classification.
Improving breast cancer classification with a novel VGG19-based ensemble learning approach Taib, Chaymae; Ahmadi, Adnan El; Abdoun, Otman; Haimoudi, El Khatir
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i3.pp2809-2819

Abstract

Breast cancer is one of the most life-threatening diseases, particularly affecting women, highlighting the importance of early detection for improving survival rates. In this study, we propose a novel diagnostic framework that combines a modified VGG19 architecture with Bagging ensemble learning, using three base classifiers: decision tree (DT), logistic regression (LR), and support vector machine (SVM). We also compare this approach with twenty-four hybrid models, integrating various convolutional neural network (CNN) architectures (ResNet50, VGG19, ConvNextBase, DenseNet121, EfficientNetV2B0, EfficientNetB0, MobileNet, and NasNetMobile) with Bagging ensemble methods. Our results show that the proposed model outperforms all other architectures, especially when combined with SVM, achieving accuracy of 97% on the fine needle aspiration cytology (FNAC) dataset and 90% on the International Conference on Image Analysis and Recognition (ICIAR) dataset. This framework demonstrates strong potential for improving early breast cancer diagnosis.
Harnessing speed breakers potentials for electricity generation: a case study of Covenant University Orovwode, Hope Evwieroghene; Abubakar, John Amanesi; Josiah, Olutunde Oluwatimileyin; Abdullkareem, Ademola
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i3.pp2669-2680

Abstract

The global imperative to transition towards sustainable energy sources has sparked innovative solutions for energy generation and environmental conservation challenges. As fossil fuel usage for power generation continues to raise environmental concerns, converting kinetic energy from vehicular motion via speed breakers presents a unique avenue for renewable power production. This study explores the concept of utilizing speed breakers as a means of electricity generation to power little power-consuming but critical load, with Covenant University serving as a pertinent case study. This research investigates the technical, economic, and environmental implications of implementing speed breaker-based electricity generation within Covenant University. Analyzing the university's energy consumption patterns showed that some loads do not require much power but are critical. Street lighting is one of such loads. This study discerns the potential contribution of speed breaker-generated electricity to address energy demands by simulation and constructing a prototype. Advanced engineering tools, such as simulation software Fusion 360 and Proteus 8.0, were employed to model and integrate the roller speed breaker mechanism with the electrical infrastructure. The findings offer valuable insights into the viability of speed breaker-generated electricity as an alternative energy source, paving the way for sustainable energy practices in educational institutions and beyond.
Investigating power quality issues in electric buggy battery charger systems: analysis and mitigation strategies Bunyamin, Wan Muhamad Hakimi Wan; Muhamad, Samshul Munir; Saidon, Wan Salha; Baharom, Rahimi
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i3.pp2534-2544

Abstract

This paper investigates power quality issues in the battery charger system of an electric buggy. Key power quality parameters such as total harmonic distortion (THD), power factor (PF), input voltage, and input current, were measured and analyzed during the charging process. The findings reveal significant power quality challenges, with THD levels exceeding IEEE 519 standards, indicating inefficiencies and potential risks such as increased heating and stress on charger components. Power factor readings reveal a substantial reactive power component, further contributing to inefficiency. To address these issues, the study recommends implementing harmonic mitigation techniques, such as passive and active filters, to reduce THD levels, using power factor correction methods, and optimizing charging algorithms to manage power demand more effectively. Continuous monitoring of charging parameters is essential for maintaining optimal performance and reliability. Adhering to standards is crucial for the efficient and reliable operation of electric vehicle (EV) charging systems, with regular compliance testing and benchmarking necessary to identify improvement areas and maintain a high-quality charging infrastructure. The proposed solutions aim to develop a sustainable and efficient charging system for electric buggies, providing valuable insights and recommendations for future research and development in power electronics and drive systems for EV applications.
Application of artificial intelligence and machine learning in expert systems for the mining industry: modern methods and technologies Mutovina, Natalya; Nurtay, Margulan; Kalinin, Alexey; Tomilov, Aleksandr; Tomilova, Nadezhda
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i3.pp3291-3308

Abstract

The mining industry has changed significantly in recent decades with the introduction of advanced technologies such as artificial intelligence (AI) and machine learning (ML). These innovations contribute to the creation of expert systems that help in optimizing processes, increasing the safety and sustainability of operations. This article is a literature review of modern AI and ML methods and technologies used in the mining industry. Discusses various intelligent and expert systems used to improve productivity, reduce operating costs, improve occupational safety, environmental sustainability, machine automation, predictive analytics, quality monitoring and control, and inventory and logistics management. The advantages and disadvantages of different approaches are analyzed, as well as their potential impact on the future of the mining industry. The review highlights the importance of integrating AI and ML into mining processes to achieve more efficient and safer solutions.
Enhancing malware detection with genetic algorithms and generative adversarial networks Eddine, Abid Dhiya; Abdelkader, Ghazli; Mourad, Bouache
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i3.pp3064-3074

Abstract

Malware detection is a critical task in cybersecurity, necessitating the creation of robust and accurate detection models. Our proposal employs a holistic methodology for identifying and mitigating malware using deep learning techniques. Initially, a customized genetic algorithm is employed for feature selection, reducing dimensionality and enhancing the discriminatory power of the dataset. Subsequently, a deep neural network is trained on the selected features, achieving high accuracy and robust performance in distinguishing between malware and benign data. Generative adversarial networks are also utilized to evaluate model effectiveness on unseen data and ensure the model's robustness and generalization capabilities. Evaluation of the proposed model demonstrates accurate malware detection with high generalization capabilities. Furthermore, future research should focus on developing and deploying practical tools or systems that implement the proposed model for real-time malware detection in operational environments. This research makes a significant contribution to the field of malware detection and provides excellent opportunities for practical implementation in the field of cybersecurity.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue