cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 64 Documents
Search results for , issue "Vol 33, No 3: March 2024" : 64 Documents clear
Stress and anxiety detection: deep learning and higher order statistic approach Vaishali M. Joshi; Deepthi D. Kulkarni; Nilesh J. Uke
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1567-1575

Abstract

Today's teenagers are dealing with anxiety and stress. Anxiety, depression, and suicide rates have increased in recent years because of increased social rivalry. The research is focused on detecting anxiety in students due to exam pressure to reduce the potential harm to a person's wellness. Research is performed on databases for anxious states based on psychological stimulation (DASPS) and our own database. The measured signal is divided into sub bands that correspond to the electroencephalogram (EEG) rhythms using the Butterworth sixth-order order filter. In higher dimensional space, the nonlinearities of each sub-band signal are analyzed using higher order statistics third-order cumulants (TOC). We have classified stress and anxiety using the support vector machine (SVM), K-nearest neighbor (K-NN), and deep learning bidirectional long short-term memory (BiLSTM) network. In comparison to previous techniques, the proposed system's performance using BiLSTM is quite good. The best accuracy in this analysis was 87% on the DASPS database and 98% on the own database. Finally, subjects with high stress levels had more gamma activity than subjects with little stress. This could be an important attribute in the classification of stress.
Hybrid model for brain tumor detection using convolution neural networks Bhagyalaxmi Kuntiyellannagari; Bhoopalan Dwarakanath; Panuganti VijayaPal Reddy
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1775-1781

Abstract

The development of abnormal cells in the brain, some of which may turn out to be cancerous, is known as a brain tumor. Magnetic resonance imaging (MRI) is the most common technique for detecting brain tumors. Information about the abnormal tissue growth in the brain is visible from the MRI scans. In most research papers, machine learning (ML) and deep learning (DL) algorithms are applied to detect brain tumors. The radiologist can make speedy decisions because of this prediction. The proposed work creates a hybrid convolution neural networks (CNN) model and logistic regression (LR). The visual geometry group16 (VGG16) which was pre-trained model is used for the extraction of features. To reduce the complexity, we eliminated the last eight layers of VGG16. From this transformed model, the features are extracted in the form of a vector array. These features fed into different ML classifiers like support vector machine (SVM), and Naïve Bayes (NB), LR, extreme gradient boosting (XGBoost), AdaBoost, and random forest for training and testing. The performance of different classifiers is compared. The CNN-LR hybrid combination outperformed the remaining classifiers. The evaluation measures such as Recall, precision, F1-score, and accuracy of the proposed CNN-LR model are 94%, 94%, 94%, and 91% respectively.
A hybrid deep learning approach for enhanced network intrusion detection K. Prabu; P. Sudhakar
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1915-1923

Abstract

The contemporary era places paramount importance on network security and cloud environments, driven by increased data transmission demands, the flexibility of cloud services, and the prevalence of global resources. Addressing the escalating threat of computer malware, the development of efficient intrusion detection systems (IDS) is imperative. This research focuses on the challenges posed by imbalanced datasets and the necessity for unsupervised learning to enhance network security. The proposed hybrid deep learning method utilizes raw data from the CSE-CIC-IDS-2018 dataset, integrating imbalanced and unsupervised learning techniques. After preprocessing and normalization, feature extraction through principal component analysis (PCA) reduces dimensionality from seventy-eight fields to ten essential features. Clustering, employing the density-based spatial clustering of applications with noise (DBSCAN) algorithm optimized with particle swarm optimization (PSO), is applied to the extracted features, distinguishing between attack and non-attack packets. Addressing dataset imbalances, imbalanced learning techniques are employed, and unsupervised learning is exemplified through the AutoEncoder (AE) algorithm. The attack cluster’s data is input into AE, a deep learning-based approach, yielding outputs for attack classification. The proposed technique (PCA+DBSCANPSO+AE) achieves an impressive 99.19% accuracy in intrusion detection, surpassing contemporary methodologies and five existing techniques. This research not only enhances accuracy but also addresses imbalanced learning challenges, utilizing the power of unsupervised learning for robust network security.
Transformer faults identification via fuzzy logic approach Babagana Ali Dapshima; Renu Mishra; Priyanka Tyagi
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1327-1335

Abstract

The need for a constant electricity supply is at an alarming rate especially in the 21st century due to the high rate of increase in industrialization across the globe. Conventional protection schemes such as differential relays, Buchholz relay, and other techniques such as genetic algorithms and artificial neural networks, do not match the precision and reliability needed for transformer fault indentification, due to their complexity in computation, tedious training system, time consumption, and need the of human experts. The method proposed in this research is the use of a fuzzy inference system in detecting potential faults in power system transformers. The faults in the transformer were observed and analyzed using a simulation system of MATLAB/Simulink software. The suggested approach ensures swift identification of faults as it relies on if-then rules and only uses current and voltage measurements with 100% independence toward the power flow direction, making it highly reliable and simple to implement compared to other techniques for transformer fault identification.
Deep transfer learning model for brain tumor segmentation and classification using UNet and chopped VGGNet Jayashree Shedbalkar; Kappargaon Prabhushetty
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1405-1415

Abstract

Brain tumors (BT) are a leading cause of cancer-related mortality worldwide, underscoring the critical need for early and precise detection to improve patient survival rates. Computer-aided diagnosis (CAD) plays a pivotal role in early BT detection by providing medical experts with valuable information image analysis. Various researchers have developed distinct methodologies, drawing from both machine and deep learning approaches. ML relies on manual feature analysis, which entails a time-intensive procedure of selecting an optimal feature extractor and necessitates domain experts with a deep understanding of feature selection. Conversely, deep learning methods exhibit superior performance compared to ML owing to their end-to-end, automated, high-level, and robust attribute mining capabilities. In this study introduced an innovative two-stage framework designed for the automatic classification of BT. In the initial stage, utilize U-Net models to conduct BT segmentation as part of the pre-processing step. Subsequently, in the second stage, utilize the improved BT images as input for a transfer learning-based model known as visual geometry group neural network (VGGNet), which excels in BT classification. The experimental analysis shows that the proposed approach has reported the average classification accuracy as 98.6%, 98.76%, and 99.45% for Meningioma, Glioma, and Pituitary BTs, respectively.
Cartoon single-image super-resolution approach based on generative adversarial network Guangxing Wang; Seong-Yoon Shin; Jong-Chan Kim
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1557-1566

Abstract

In recent years, the study of a single image super-resolution (SISR) is crucial to improving image resolution and using hardware technology to improve image resolution. SISR is widely used in satellite remote sensing, video surveillance, and medical image processing because it mainly relies on deep learning algorithms to realize the conversion from low-resolution (LR) images to high-resolution images. It has the advantages of low cost, simple operation, and high efficiency. This paper proposes an image super-resolution method based on a generative adversarial network named text localization generative adversarial nets (TLGAN) model. The method is improved based on super-resolution generative adversarial networks (SRGAN), and the batch normalization layer is removed, which significantly reduces the computational burden of the model. In TLGAN model, we used the transfer learning method to pre-trained the model on the large dataset ImageNet, and then apply the pre-trained model to the cartoon image data set animes to achieve image super-resolution. Experimental results report that the proposed method has the advantages of fast running speed and excellent visual perception of super-resolution images compared with bicubic interpolation and SRGAN method.
AES-128 reduced-round permutation by replacing the MixColumns function Jerico S. Baladhay; Edjie M. De Los Reyes
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1641-1652

Abstract

Ensuring the protection of digital data is of utmost importance in our current reliance on network operations. However, security measures such as data encryption often result in decreased performance speed. This paper enhanced the 128-bit version of the advanced encryption standard (AES) by substituting the MixColumns function with a permutation-based approach and decreasing the overall number of rounds. The evaluation results indicate a substantial enhancement in the speed of encryption and decryption, with a 76.76% improvement in encryption time and a 55.46% improvement in decryption time. Furthermore, it is important to mention that the modifications implemented in the standard AES did not compromise its security in relation to the strict avalanche criterion. The avalanche effect of the modified AES is 52.92%, surpassing the minimum requirement of 50%. Finally, the modified AES demonstrated a 31.12% increase in throughput for encryption and a 25.50% increase for decryption when compared to the original AES, using the sample dataset.
Towards an automatic classification of welding defect by convolutional neural network and robot classifier Nissabouri Salah; Ennadafy Hamza; Jammoukh Mustapha; Khalifa Mansouri
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1768-1774

Abstract

The control process of welding requires manual operations, and this consumes time. Robot classifier can help by automatic detection of welding defect and by taking rapid actions to correct in situ the defect. This paper presents a convolutional neural network (CNN) model developed to classify the welding defect like splash, twisty, overlap, edge and copper adhesion based on machine vision. Using a resistance spot welding (RSW) dataset the CNN model was trained and evaluated to achieve the best performance. The batch size was varied to quantify its effect on the precision of the model. The model can predict the type of welding surface by confidence of 99.86%.
Intelligent decision-making in healthcare telemonitoring via forward-backward chaining and IoT Agwin Fahmi Fahanani; Novita Titis Harbiyanti; Nurvandy Nurvandy; Fitri Fitri; Ari Murtono; Leonardo Kamajaya
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1436-1447

Abstract

Healthcare telemonitoring has emerged as a promising approach to remotely monitor patients remotely, enabling timely intervention and personalized care. Internet of things (IoT) device-generated patient data necessitates innovative solutions for intelligent healthcare decision-making, as current methods struggle to provide timely, context-aware, and data-driven recommendations, resulting in suboptimal patient care. This study aims to develop an intelligent decision-making framework for healthcare telemonitoring by leveraging forward-backward chaining and IoT technology. The research focuses on a system using forward-backward chaining algorithms to analyze real-time patient data from IoT devices. It utilizes machine learning models to adapt to changing conditions and refine decision-making, demonstrating its ability to provide real-time context-aware recommendations. Temperature, blood pressure, oxygen level, and heart rate measurement errors are 2.01%, 1.74 to 2.13%, 0.61%, and 1.45%, respectively. The success rate of early disease diagnosis using an expert system is 81%, with an average application interface responsiveness time of 4.978 s. The integration of IoT data with intelligent decision-making algorithms in healthcare telemonitoring has the potential to revolutionize patient care. However, future work should focus on scalability and interoperability for diverse healthcare settings.
Optimizing dual modal biometric authentication: hybrid HPO-ANFIS and HPO-CNN framework Sandeep Pratap Singh; Shamik Tiwari
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1676-1693

Abstract

In the realm of secure data access, biometric authentication frameworks are vital. This work proposes a hybrid model, with a 90% confidence interval, that combines "hyperparameter optimization-adaptive neuro-fuzzy inference system (HPO-ANFIS)" parallel and "hyperparameter optimization-convolutional neural network (HPO-CNN)" sequential techniques. This approach addresses challenges in feature selection, hyperparameter optimization (HPO), and classification in dual multimodal biometric authentication. HPO-ANFIS optimizes feature selection, enhancing discriminative abilities, resulting in improved accuracy and reduced false acceptance and rejection rates in the parallel modal architecture. Meanwhile, HPO-CNN focuses on optimizing network designs and parameters in the sequential modal architecture. The hybrid model's 90% confidence interval ensures accurate and statistically significant performance evaluation, enhancing overall system accuracy, precision, recall, F1 score, and specificity. Through rigorous analysis and comparison, the hybrid model surpasses existing approaches across critical criteria, providing an advanced solution for secure and accurate biometric authentication.

Filter by Year

2024 2024


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue