cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Secure clustering and routing – based adaptive – bald eagle search for wireless sensor networks Ranganathasharma, Roopashree Hejjaji; Chandrashekaraiah, Yogeesh Ambalagere
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i4.pp3824-3832

Abstract

Wireless sensor networks (WSNs) are self-regulating networks consisting of several tiny sensor nodes for monitoring and tracking applications over extensive areas. Energy consumption and security are the two significant challenges in these networks due to their limited resources and open nature. To address these challenges and optimize energy consumption while ensuring security, this research proposes an adaptive – bald eagle search (A-BES) optimization algorithm enabled secure clustering and routing for WSNs. The A-BES algorithm selects secure cluster heads (SCHs) through several fitness functions, thereby reducing energy consumption across the nodes. Next, secure and optimal routes are chosen using A-BES to prevent malicious nodes from interfering with the communication paths and to enhance the overall network lifetime. The proposed algorithm shows significantly lower energy consumption, with values of 0.27, 0.81, 1.38, 2.27, and 3.01 J as the number of nodes increases from 100 to 300. This demonstrates a clear improvement over the existing residual energy-based data availability approach (REDAA).
Breast cancer identification using a hybrid machine learning system Arifin, Toni; Agung, Ignatius Wiseto Prasetyo; Junianto, Erfian; Agustin, Dari Dianata; Wibowo, Ilham Rachmat; Rachman, Rizal
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i4.pp3928-3937

Abstract

Breast cancer remains one of the most prevalent malignancies among women and is frequently diagnosed at an advanced stage. Early detection is critical to improving patient prognosis and survival rates. Messenger ribonucleic acid (mRNA) gene expression data, which captures the molecular alterations in cancer cells, offers a promising avenue for enhancing diagnostic accuracy. The objective of this study is to develop a machine learning-based model for breast cancer detection using mRNA gene expression profiles. To achieve this, we implemented a hybrid machine learning system (HMLS) that integrates classification algorithms with feature selection and extraction techniques. This approach enables the effective handling of heterogeneous and high-dimensional genomic data, such as mRNA expression datasets, while simultaneously reducing dimensionality without sacrificing critical information. The classification algorithms applied in this study include support vector machine (SVM), random forest (RF), naïve Bayes (NB), k-nearest neighbors (KNN), extra trees classifier (ETC), and logistic regression (LR). Feature selection was conducted using analysis of variance (ANOVA), mutual information (MI), ETC, LR, whereas principal component analysis (PCA) was employed for feature extraction. The performance of the proposed model was evaluated using standard metrics, including recall, F1-score, and accuracy. Experimental results demonstrate that the combination of the SVM classifier with MI feature selection outperformed other configurations and conventional machine learning approaches, achieving a classification accuracy of 99.4%.
A comparative study of deep learning-based network intrusion detection system with explainable artificial intelligence Kai, Tan Juan; Ong, Lee-Yeng; Leow, Meng-Chew
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i4.pp4109-4119

Abstract

In the rapidly evolving landscape of cybersecurity, robust network intrusion detection systems (NIDS) are crucial to countering increasingly sophisticated cyber threats, including zero-day attacks. Deep learning approaches in NIDS offer promising improvements in intrusion detection rates and reduction of false positives. However, the inherent opacity of deep learning models presents significant challenges, hindering the understanding and trust in their decision-making processes. This study explores the efficacy of explainable artificial intelligence (XAI) techniques, specifically Shapley additive explanations (SHAP) and local interpretable model-agnostic explanations (LIME), in enhancing the transparency and trustworthiness of NIDS systems. With the implementation of TabNet architecture on the AWID3 dataset, it is able to achieve a remarkable accuracy of 99.99%. Despite this high performance, concerns regarding the interpretability of the TabNet model's decisions persist. By employing SHAP and LIME, this study aims to elucidate the intricacies of model interpretability, focusing on both global and local aspects of the TabNet model's decision-making processes. Ultimately, this study underscores the pivotal role of XAI in improving understanding and fostering trust in deep learning -based NIDS systems. The robustness of the model is also being tested by adding the signal-to-noise ratio (SNR) to the datasets.
Energy-efficient secure software-defined networking with reinforcement learning and Weierstrass cryptography Andanaiah, Nagaraju Tumakuru; Rao, Malode Vishwanatha Panduranga
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i4.pp4227-4238

Abstract

In the age of rapidly advancing 5G connectivity, artificial intelligence (AI), and the internet of things (IoT), network data has grown enormously, demanding more efficient and secure management solutions. Traditional networking systems, limited by manual controls and static environments, are unable to fulfill the dynamic demands of modern internet services. This paper proposes an innovative software-defined networking (SDN) framework that utilizes exponential spline regression reinforcement learning (ESR-RL) with genus Weierstrass curve cryptography (GWCC) to boost energy efficiency and data security. The ESR-RL algorithm reliably anticipates network traffic patterns, optimizing path selection to enhance routing efficiency while minimizing consumption of energy. GWCC also enables strong encryption and decryption, considerably increasing data security without impacting system performance. To further improve network reliability, the Skellam distributed Siberian TIGER optimization algorithm (SDSTOA) is used to dynamically acquire features and balance loads, resulting in optimal network performance. Extensive simulations show that the proposed framework performs better than existing models in terms of accuracy, precision, recall, F-measure, sensitivity, and specificity. Improvements in latency, turnaround time, and network throughput demonstrate the framework's success. This scalable and adaptive technology establishes a new standard for SDN systems by providing a safe, energy-efficient, and performance-optimized strategy for future network infrastructures.
Optimized reactive power management system for smart grid architecture Raghvin, Manju Jayakumar; Bharamagoudra, Manjula R.; Dash, Ritesh
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i4.pp3707-3716

Abstract

The Indian power grid is an extensive and mature power system that transfers large amounts of electricity between two regions linked by a power corridor. The increased reliance on decentralized renewable energy sources (RESs), such as solar power, has led to power system instability and voltage variations. Power quality and dependability in a smart grid (SG) setting can be enhanced by the careful tracking and administration of solar energy generated by panels. This study proposes a number of reactive power regulation algorithms that take smart grids into account. When developing a kernel, debugging is a must in optimal reactive power management. In this research, a debugging primitive called physical memory protection (PMP), a security feature, is considered. Debugging in the kernel domain requires specialized tools, in contrast to the user space where we have kernel assistance. This research proposes an optimal reactive power management in smart grid using kernel debugging model (ORPM-SG-KDM) for managing the reactive power efficiently. This research achieved 98.5% accuracy in kernel debugging and 99.2% accuracy in optimal reactive power management. Kernel debugging accuracy is increased by 1.8% and 3% of reactive power management accuracy is increased.
Multi-layer convolutional autoencoder for recognizing three-dimensional patterns in attention deficit hyperactivity disorder using resting-state functional magnetic resonance imaging Begum, Zarina; Shaik, Kareemulla
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i4.pp3965-3976

Abstract

Attention deficit hyperactivity disorder (ADHD) is a neurological disorder that develops over time and is typified by impulsivity, hyperactivity, and attention deficiency. There have been noticeable changes in the patterns of brain activity in recent studies using functional magnetic resonance imaging (fMRI). Particularly in the prefrontal cortex. Machine learning algorithms show promise in distinguishing ADHD subtypes based on these neurobiological signatures. However, the inherent heterogeneity of ADHD complicates consistent classification, while small sample sizes limit the generalizability of findings. Additionally, methodological variability across studies contributes to inconsistent results, and the opaque nature of machine learning models hinders the understanding of underlying mechanisms. We suggest a novel deep learning architecture to overcome these issues by combining spatio-temporal feature extraction and classification through a hierarchical residual convolutional noise reduction autoencoder (HRCNRAE) and a 3D convolutional gated memory unit (GMU). This framework effectively reduces spatial dimensions, captures key temporal and spatial features, and utilizes a sigmoid classifier for robust binary classification. Our methodology was rigorously validated on the ADHD-200 dataset across five sites, demonstrating enhancements in diagnostic accuracy ranging from 1.26% to 9.6% compared to existing models. Importantly, this research represents the first application of a 3D Convolutional GMU for diagnosing ADHD with fMRI data. The improvements highlight the efficacy of our architecture in capturing complex spatio-temporal features, paving the way for more accurate and reliable ADHD diagnoses.
Optimizing internet of things based gas sensors: deep learning and performance optimization strategies Abdellatif, Mariam M.; Çifçi, Mehmet Akif; Ibrahim, Asmaa A.; Harb, Hany M.; Desuky, Abeer S.
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 5: October 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i5.pp4813-4828

Abstract

The rapid growth of industrialization and internet of things (IoT) driven advancements in Industry 5.0 necessitates efficient and user-friendly engineering solutions. Gas leakage incidents in coal mines, chemical enterprises, and households pose significant risks to ecosystems and human safety, emphasizing the need for automated and rapid gas-type detection. Traditional detection methods rely on single-source data and focus on isolated spatial or temporal features, limiting accuracy. This paper proposes a multimodal artificial intelligence (AI) fusion technique combining pre-trained convolutional neural networks (CNNs), such as VGG16, with a deep neural network (DNN) model. The particle swarm optimization (PSO) algorithm optimizes CNN hyperparameters, outperforming traditional trial-and-error methods. The system addresses challenges posed by gases being odorless, colorless, and tasteless, which limit conventional human detection methods. By leveraging sensor fusion, the late fusion technique integrates distinct network architectures for unified gas identification. Experimental results demonstrate 95% accuracy using DNN with gas sensor data, 96% with optimized VGG16 using thermal imaging, and 99.5% through multimodal late fusion. This IoT-enhanced solution outperforms single-sensor approaches, offering a robust and reliable gas leakage detection system suitable for industrial and smart city applications.
Strategic integration of social media in IT sector communication: designing effective practices Kesar, Benu; Joseph, Shaji
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 5: October 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i5.pp4653-4661

Abstract

This paper explores the transformative role of social media in enhancing communication and workflow efficiency within the information technology (IT) sector. We have introduced the adaptive social media for information technology collaboration (ASMIT) framework. Its goal is to provide a holistic strategy for digital transformation in the IT sector. Employing a mixed method approach, the research combines a systematic literature review with case study of HCL Technologies. Thematic analysis categorizes findings under five core pillars of the ASMIT framework. Results indicate that AI-driven tools, when embedded within collaborative social media platforms, significantly enhance organizational agility, project coordination, and security. The study contributes to IT scholarship by bridging technological integration with human-centered collaboration strategies.
Hybrid artificial intelligence approach to counterfeit currency detection Tarawneh, Monther
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 6: December 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i6.pp5804-5814

Abstract

The use of physical money continues, posing ongoing challenges in the form of counterfeit money. This problem not only poses a threat to economic stability but also undermines confidence in the financial systems in use. Traditional methods such as manual inspections and testing of security features have become ineffective in detecting advanced counterfeiting techniques on an ongoing basis. This study proposes a hybrid model that harnesses the power of artificial intelligence, combining convolutional neural networks (CNNs), long short-term memory networks (LSTMs), and support vector machines (SVMs) for counterfeit detection. The proposed model leverages the diverse strengths of a number of artificial intelligence techniques, combining the ability to detect counterfeiting, analyse visual aspects, and sequences of banknotes. The proposed model was tested using real Jordanian currency sets of different denominations and datasets generated using generative adversarial networks (GANs). The results showed that the model was able to detect counterfeiting with high accuracy of 98.6%. and minimal errors compared to other methods. This outstanding performance demonstrates the benefits of integrating artificial intelligence (AI) technologies and that there is room for development and solutions that can keep up with advanced counterfeiting strategies. The study demonstrates the importance of integrating AI in maintaining the integrity of physical currency transactions.
A systematic review of heuristic and meta-heuristic methods for dynamic task scheduling in fog computing environments Talhouni, Hamed; Ali, Noraida Haji; Yunus, Farizah; Atiewi, Saleh; Yahya, Yazrina
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 6: December 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i6.pp5986-6000

Abstract

The distributed fog node network and variable workloads make task distribution difficult in fog computing. Optimizing computing resources for dynamic workloads with heuristic and metaheuristic algorithms has shown potential. To address changing workloads, these algorithms enable real-time decision-making. This systematic review examines heuristic, meta-heuristic, and real-time dynamic job scheduling strategies in fog computing. Static methods like heuristic and meta-heuristic algorithms can help modify dynamic task scheduling in fog computing situations. This paper covers a current study area that stresses real-time approaches, meta-heuristics, and fog computing environments' dynamic nature. It also helps build reliable and scalable fog computing systems by spotting dynamic task scheduling trends, patterns, and issues. This study summarizes and analyzes the latest fog computing research on task-scheduling algorithms and their pros and cons to adequately address their issues. Fog computing task scheduling strategies are detailed and classified using a technical taxonomy. This work promises to improve system performance, resource utilization, and fog computing settings. The work also identifies fog computing job scheduling innovations and improvements. It reveals the strengths and weaknesses of present techniques, paving the way for fog computing research to address unresolved difficulties and anticipate future challenges.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue