cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 64 Documents
Search results for , issue "Vol 33, No 3: March 2024" : 64 Documents clear
Interoperability of Botswana’s healthcare systems using semantic prescription ontologies Eunice Chinatu Okon; Tshiamo Sigwele; Galani Malatsi; Tshepiso Mokgetse; Hlomani Hlomani
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1782-1792

Abstract

The developing country of Botswana’s health information system faces interoperability challenges mainly due to the lack of shared patient medical data and histories between private and public healthcare providers, which leads to increased medical errors, increased healthcare costs, and potentially fatal outcomes. This research proposes an intelligent electronic prescription ontology (IEPO) framework to share Botswana’s patient electronic health records (EHRs) between private and public healthcare systems for a standardized and semantically rich data exchange. IEPO was evaluated for interoperability using the recall metric for completeness to capture the degree of all relevant information for exchange and the precision metric for accuracy performance to gauge the degree of error minimization during interoperability. The harmonic means of precision and recall called the F1- score, offered the overall interoperability performance. IEPO outperformed related works by 75% in recall, 54% in precision, and 76% in F1-score, demonstrating improved interoperability performance. Furthermore, IEPO was evaluated for correctness and expressiveness through competency questions via queries, results confirming correct and expressive responses.
Detecting attacks on e-mail Yujia Fang; Gabriela Mogos
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1576-1588

Abstract

E-mail has become a popular communication tool widely used by universities, enterprises and governments. Despite the convenience it brought to people, attacks on e-mail happen very frequently in the range of the world, causing large economic loss and occupying a mass of network bandwidth every year. The hazards from e-mail attacks underline the importance of detecting and resisting spam in an efficient and timely way. Using Python, we built Na¨ıve Bayes (NB) and support vector machine (SVM) filters for emails. The filtering performance of NB and SVM email filters applying different kernel functions was compared and evaluated based on several evaluation indices including accuracy, precision, and total cost ratio (TCR). Also, in order to optimize the filters, the influences of stop words removal, feature numbers and other parameters in the filtering algorithms were monitored.
An improved post-hurricane building damaged detection method based on transfer learning Guangxing Wang; Seong-Yoon Shin; Gwanghyun Jo
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1546-1556

Abstract

After a natural disaster, it is very important for the government to conduct a damaged assessment as soon as possible. Fast and accurate disaster assessment helps the government disaster relief departments allocate resources and respond quickly and effectively to minimize the losses caused by the disaster. Usually, the method of measuring disaster losses is to rely on manual field exploration and measurement, and then calculate and label the damaged buildings or land, or rely on unmanned collections to remotely collect pictures of the disaster-stricken area, and compare the original pictures to carry out the disaster annotation and calculation. These methods are time-consuming, labor-intensive, and inefficient. This paper proposes a post-hurricane building damage detection method based on transfer learning, which uses deep learning image classification algorithms to achieve post-disaster satellite image damage detection and classification, thereby improving disaster assessment efficiency and preparing for disaster relief and post-disaster reconstruction. The proposed method adopts the theory of transfer learning, establishes a disaster image detection model based on the convolutional neural network model, and uses the 2017 Hurricane Harvey data as the experimental data set. Experiments have proved that our proposed model accuracy of disaster detection reaches 97%, which is 1% higher than other models.
A scoping review of artificial intelligence-based robot therapy for children with disabilities Rusnani Yahya; Rozita Jailani; Fazah Akhtar Hanapiah; Nur Khalidah Zakaria
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1855-1865

Abstract

The integration of artificial intelligence (AI)-based robot therapy (AIBRT) has become prominent in addressing the needs of children with disabilities, including autism spectrum disorder (ASD), attention deficit hyperactivity disorder (ADHD), learning disabilities, and speech delays. However, questions arise regarding the effectiveness of different AI techniques in enhancing therapy for children with specific needs. This review explores current literature on AIBRT for children with disabilities, aiming to understand the efficacy and potential of various AI techniques in improving their therapy. This paper presents a comprehensive search of research articles published from 2019 to September 2023. 39 articles focusing on AI-based robot platforms, the employed treatment or therapy methods, assessment procedures during therapy, and the variables or parameters used to measure intervention effectiveness have been discussed in detail. These AI-based robot platforms have been utilized to engage individuals diagnosed with ASD, offering therapeutic interventions and assessments. In conclusion, the integration of AI and robotics in therapy shows promise for enhancing the development and quality of life for children with disabilities. The findings of this review have implications for therapists, practitioners, and researchers interested in incorporating AI applications into therapy practices. This integration can lead to improved therapy outcomes, optimized children’s development, and enhanced quality of life.
One level deep convolutional neural network for facial key points detection Abdelaali Benaiss; Rachid El Ayachi; Mohamed Biniz; Mustapha Oujaoura
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1694-1704

Abstract

Facial landmark detection has a lot of applications in face recognition, face alignment, facial expression recognition, video surveillance and security systems. In the existing literature, there are multiple methods utilizing convolutional neural networks (CNNs) that address this problem in various ways. In many cases, the models use a tree-like structure of CNNs to achieve better results. This paper proposes a combination of three parallel deep convolutional neural networks (DCNNs) to estimate the accurate localization of each keypoint. The first one focuses on the whole face to outperform five points, including the eyes, nose, and mouth corners. The second one focuses on the eyes-nose parts to outperform three points, specifically the eyes and nose. The last one focuses on the nose-mouth parts to outperform three points, namely the nose and mouth corners. Further, we combine all outputs of the three DCNNs and take the average value of each detected key point as the final output. In the first step, we improvthe the parameter efficiency and accuracy of each DCNNs through a set of experiments using the labeled face parts in-the-wild database (LFPW) and the helen facial feature dataset (Helen). Then, we demonstrate that our approach yields more accurate estimations of facial key points than two state-of-the-art methods and commercial software in terms of accuracy.
Intrusion detection system in cloud computing by utilizing VTR-HLSTM based on deep learning Valavan Woothukadu Thirumaran; Nalini Joseph; Umarani Srikanth
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1829-1842

Abstract

Cloud computing (CC) is a rapidly developing IT approach with intrusion detection system being a crucial tool for safeguarding virtual networks and machines from potential threats, thereby mitigating security concerns in the cloud environment. The intrusion detection system (IDS) system demands significant improvements, primarily based on optimizing performance and bolstering security measures. This research aims to implement an IDS in cloud computing utilizing deep learning (DL) method. The DL model is a promising technique and is widely used to detect intrusions. The implemented hierarchical long short-term memory (HLSTM) method’s performance is evaluated for feature selection through variance threshold-based regression (VTR) on two IDS network datasets: Bot-IoT and network security lab-knowledge discovery and data mining (NSL-KDD). This paper concludes the use of an intrusion detection network resulting in high security and performance. Moreover, the implemented method on the NSL-KDD and Bot-IoT datasets obtains respective accuracies of 99.50% and 0.995. It is compared with the existing methods namely, ensemble ID model for CC utilizing DL, LeNet, fuzzy deep neural network with a Honey Bader algorithm for privacy-preserving ID, and improved metaheuristics with a fuzzy logic-based IDS for cloud security, and beluga whale-tasmanian devil optimization based on deep convolutional neural network (CNN) with TL, chronological slap swarm algorithm-based deep belief network (DBN), and dragonfly improved invasive weed optimization-based Shepard CNN.
A novel approach for detecting sensor-based semiconductor fault yield classification using convolutional neural networks Mohammed Altaf Ahmed; Suleman Alnatheer
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1448-1464

Abstract

In the proposed research, data from the semiconductor industry is considered for analysis. In this research, there is a requirement for significantly more space for storage, processing will take significantly more time, and there will be a significant amount of duplicate data. So, the utilization of dimensionality reduction strategies is required so as to lessen the number of spectral bands while maintaining the maximum amount of relevant information. Our contribution can be broken down into two parts: To begin, we suggest a filter-based technique that we call interband redundancy analysis (IBRA). This method is based on a collinearity analysis that is performed among a band and its neighbors. By performing the given research, redundant bands can be omitted, which in turn significantly brings down the search space. Next, we take the findings of the IBRA and use a wrapper-based technique known as greedy spectral selection (GSS) to choose bands on the basis of the information entropy values of those bands. We are later training a convolutional neural network to evaluate how well the present selection is working. We also propose an optimization algorithm for performance enhancement known as bacterial foraging optimization.
Ethical hacking: real evaluation model of brute force attacks in password cracking Buthayna Al Sharaa; Saed Thuneibat
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1653-1659

Abstract

Despite ongoing efforts to convince users of the value of password security and to enforce password creation standards on them, in many information systems the human factor still plays a role. In addition, not only do most users’ password creation and management practices largely remain unchanged, but password cracking tools and more critically, computer hardware also continue to advance. In this paper we present a model in ethical hacking; the proposed model concentrated on brute force attacks for password cracking. The main novelty of our work is that it first presents a mathematical model that calculates the number of different password permutations of varying lengths. Then the brute force attack is modelled using the Markov chain model and a method is developed to formulate the conventional optimization problem, which is classified as a discrete nonlinear problem. The experiments’ results demonstrate and validate the method’s effectiveness and suitability.
Improving web-oriented information systems efficiency using Redis caching mechanisms Maksim Vladimirovich Privalov; Mariya Valerevna Stupina
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1667-1675

Abstract

The responsiveness of a web application with minimum latency time and maximum web pages loading speed is determined by its overall performance. When dealing with a large number of users and amount of data, the performance of web applications is significantly affected by ways of data processing, storage and access. This paper identifies the significance of data caching process to speed up access to relational database. The study examines approaches to improve the performance of web applications through the joint use of MySQL relational database management system (DBMS) and Redis NoSQL DBMS. The practical part of the study presents a description of a web application built based on Java and Spring Boot framework. The paper proposes the implementation of the caching strategies that take into account the principles of aspect-oriented programming. Made experiments on performance testing of the developed web application with and without caching are presented. The presented results of the study allowed us to conclude that it is possible to improve the performance of web applications by the optimal use of caching strategies when performing database queries.
Non-linear control for enhanced solar power under partial shading and AC load variations Sabri Khadija; El Maguiri Ouadia; Farchi Abdelmajid
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1347-1362

Abstract

This paper solves the control problem to track the maximum power in grid-connected PV systems to catch up with the changes and meet the energy demand, given the irregular and arbitrary nature of the solar source. Our work addresses the following objectives: i) extracting the maximum available power under partial shading, ii) and having a unit power factor. To achieve the above objectives, we have integrated two control components. The first one is dedicated to the extraction of the maximum power point (MPPT) particle swarming algorithm (PSO) with a backstepping controller, by shaking on the DC/DC converter duty cycle to increase the robustness and stability of the system. The backstepping control of the three-phase voltage source inverter is the second part. To verify the effectiveness of the introduced system, modelling and simulation are verified in MATLAB/Simulink.

Filter by Year

2024 2024


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue