cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 65 Documents
Search results for , issue "Vol 35, No 1: July 2024" : 65 Documents clear
Investigation of linear models for control of water flow and temperature in a water supply system Asset, Askhat; Mansurova, Madina; Zhmud, Vadim; Kopesbaeva, Aksholpan; Dzheksenbaev, Nurbolat
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp113-123

Abstract

In some cases, the object model is a set of parallel models of the same general appearance, but with different parameters. The most common model is a model in the form of a serial connection of a first- or second-order filter and a delay link. An example is the water supply system of a large residential building or a group of houses. From the most general considerations, we can expect that such an object can be approximately described by a simpler model, replacing the sum of identical-looking models with different parameters with a single model of this type with averaged parameters, however, finding many parameters simply in the form of an average is, apparently, an unreasonable approach. It seems more reasonable to find the parameters by the approximating model by numerical optimization, in which the integral from the module or from the square of the deviation of the output signal of such a model from the output signal of the exact model is minimized when the test signal is applied. For linear models, the most reasonable test signal is a single step effect. This article tests this hypothesis and provides the results of this test.
Identification of soluble solid content and total acid content using real-time visual inspection system Moorthy, C. H. V. K. N. S. N.; Tripathi, Mukesh Kumar; Hudagi, Manjunath R.; Hadimani, Lingaraj A.; Chavan, Gayatri Sanjay; Angadi, Sanjeevkumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp238-246

Abstract

This paper presents the framework for identifying materials using a fused descriptor-based approach, leverage computer vision techniques. The system is structured into three phases: derivation, extraction, and portrayal. Initially, the system employs K-means gathering techniques for establishing derivation. Following derivation, the system utilizes variety, texture, and shape-based feature extraction methods to extract relevant features from the soluble solid content and total acid content using real-time visual inspection system. A “consolidating” fusion feature is explored in the final phase using classification algorithms like C4.5, support vector machines (SVM), and k-nearest neighbors (KNN). The performance evaluation of the recognition system demonstrates promising results, with accuracy rates of 97.89%, 94.60%, and 90.25% achieved by using C4.5, SVM, and KNN separately. This indicates that the proposed fusion strategy effectively supports accurately recognizing materials using a fused descriptor-based approach.
The object detection model uses combined extraction with KNN and RF classification Kurniati, Florentina Tatrin; Manongga, Daniel HF; Sembiring, Irwan; Wijono, Sutarto; Huizen, Roy Rudolf
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp436-445

Abstract

Object detection plays an important role in various fields. Developing detection models for 2D objects that experience rotation and texture variations is a challenge. In this research, the initial stage of the proposed model integrates the gray-level co-occurrence matrix (GLCM) and local binary patterns (LBP) texture feature extraction to obtain feature vectors. The next stage is classifying features using k-nearest neighbors (KNN) and random forest (RF), as well as voting ensemble (VE). System testing used a dataset of 4,437 2D images, the results for KNN accuracy were 92.7% and F1-score 92.5%, while RF performance was lower. Although GLCM features improve performance on both algorithms, KNN is more consistent. The VE approach provides the best performance with an accuracy of 93.9% and an F1-score of 93.8%, this shows the effectiveness of the ensemble technique in increasing object detection accuracy. This study contributes to the field of object detection with a new approach combining GLCM and LBP as feature vectors as well as VE for classification.
Development of mathematical methods for diagnosing kidney diseases using fuzzy set tools Myrzakerimova, Alua; Kolesnikova, Kateryna
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp405-417

Abstract

An approach based on fuzzy set theory is presented in the scientific article to enhance the efficiency of diagnosing kidney diseases by decreasing the time required for making medical decisions. The suggested approach employs fuzzy models and algorithms that consider the uncertainty and variability of clinical data to optimize the assessment of the functional state of the kidneys, taking into account various risk factors and individual characteristics of patients. The paper suggests a technique to develop a system of fuzzy decision rules. This technique combines E. Shortliff’s iterative rules with functions from the studied classes of kidney diseases. Mathematical modeling and experimental studies have indicated relatively high effectiveness in classifying different forms of kidney diseases. The results can be used to formulate intelligent decision support systems in clinical practice and improve diagnostic and monitoring processes. Moreover, the findings may aid in shaping more targeted and effective health policies at the national and regional levels, enhancing access to healthcare, and promoting the population’s overall health.
Energy efficient slotted synchronization approach in LoRaWAN Shayo, Eva; Abdalla, Abdi T.; Mwambela, Alfred; Sutikno, Tole
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp203-212

Abstract

In recent years, long-range wide-area networks (LoRaWAN) have gained much attention as low-power wide-area networks. LoRaWAN uses ALOHA as the medium access control protocol, where the end devices transmit data randomly and retransmit it up to eight times if collisions occur. ALOHA is not energy efficient and works perfectly for a smaller network. Several techniques, including the use of synchronization and scheduling schemes, to deal with the limitations imposed by ALOHA in LoRaWAN have been reported in the literature. However, the existing synchronization and scheduling algorithms transmit synchronization messages randomly using one super frame with fixed time slots that accommodate devices using different spreading factors, which limit the LoRaWAN network's scalability. This work proposes a slotted synchronization mechanism for transmitting synchronization requests to the gateway. The performance of the slotted synchronization was evaluated through simulation using packet delivery ratio (PDR) and energy efficiency as the performance parameters. The results indicate that when the number of devices in the network increases, a time-slotted synchronization consumes less energy, on average, by about 0.2 mAh. The use of a slotted synchronization can improve the energy efficiency of the end devices as collisions are completely avoided, achieving a PDR of 100%.
High-gain UWB elliptical and circular slotted antipodal Vivaldi antenna for through wall detection Ahmed, Sajjad; Katiran, Norshidah; Joret, Ariffuddin; Mohd Shah, Shaharil; Ahmed, Arslan; Tusin, Najwanisa
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp148-155

Abstract

The paper describes a high-gain ultra-wideband (UWB) elliptical and circular slotted antipodal Vivaldi antenna (ECS-AVA) that is designed for through-wall detection systems. The antenna flares are loaded with elliptical and circular slots to improve the gain and broaden the bandwidth. To validate the efficacy of the designed antenna, a prototype of ECS-AVA is fabricated and subjected to measurements. The experimental findings suggest that the designed antenna can handle signals effectively across a range from 3.1 GHz to 10.6 GHz, as shown by its measured impedance bandwidth, with │S11│≤ -10 dB. The obtained measurements results are consistent with the results of the CST simulation. The proposed antenna exhibits improved radiation patterns in the UWB band with peak gain values ranging from 4.8 dB to 11.9 dB.
Advancing medical imaging with GAN-based anomaly detection Ounasser, Nabila; Rhanoui, Maryem; Mikram, Mounia; El Asri, Bouchra
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp570-582

Abstract

Anomaly detection in medical imaging is a complex challenge, exacerbated by limited annotated data. Recent advancements in generative adversarial networks (GANs) offer potential solutions, yet their effectiveness in medical imaging remains largely uncharted. We conducted a targeted exploration of the benefits and constraints associated with GAN-based anomaly detection techniques. Our investigations encompassed experiments employing eight anomaly detection methods on three medical imaging datasets representing diverse modalities and organ/tissue types. These experiments yielded notably diverse results. The results exhibited significant variability, with metrics spanning a wide range (area under the curve (AUC): 0.475-0.991; sensitivity: 0.17-0.98; specificity: 0.14-0.97). Furthermore, we offer guidance for implementing anomaly detection models in medical imaging and anticipate pivotal avenues for future research. Results unveil varying performances, influenced by factors like dataset size, anomaly subtlety, and dispersion. Our findings provide insights into the complex landscape of anomaly detection in medical imaging, offering recommendations for future research and deployment.
URL shortener for web consumption: an extensive and impressive security algorithm Gochhait, Saikat; Rathore, Yogesh Singh; Leonova, Irina; Pandey, Mahima Shanker; Saraswat, Bal Krishna; Maurya, Santosh Kumar; Singh, Hare Ram; Bansal, Nidhi
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp284-291

Abstract

URL stands for uniform resource locator are the addresses of the unique resources on the internet. We all need URLs to access any type of resource on the internet, such as any web page, and document. Sometimes URLs can be long, irrelative and unattractive and unable to send sometimes via email. So, for this, we proposed a URL shortener web application based on the Python-Django platform which is fast and makes your long URLs in the shortest form which you can share on social media platforms. It makes all the messy, unattractive URLs short and shareable. Writing paper proposed a premium section in our application that gives access to the customizable URLs and analytics of your shorten URLs. Customizable URLs are the URLs you create by your own keywords. By creating a premium profile with the application, you can create your own URLs by using your own keywords. We have considered security a major part of the application that prevents the short URLs from being hacked or redirected to any advertising website or content. We store all the data related to the URL to show you the best view of your analytics and update it regularly. Main contribution in this field that for web application that provides users with a fast, secure and shortest URL for their using long URLs. Comparatively to other services that are currently available, the application provides superior security, availability, and confidentiality.
Potato leaf disease detection through ensemble average deep learning model and classifying the disease severity Chowdhury, Nishu; Sultana, Jeenat; Rahman, Tanim; Chowdhury, Tanjia; Khan, Fariba Tasnia; Chakraborty, Arpita
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp494-502

Abstract

The varying crop species, symptoms of crop diseases, and environmental conditions make early detection of potato leaf disease difficult. Potato leaf diseases are difficult to identify in their early stages because of these reasons. An ensemble model is developed using the ResNet50V2 and DenseNet201 transfer learning algorithms in this study for identifying potato leaf diseases. For this work, 5,702 images were collected from the potato leaf disease dataset and the Plant Village Potato dataset. The datasets include valid, test, and train subdirectories, and the images are taken on 5 epochs. By including three more dense layers in each model and then ensemble that model, the performance of leaf classification may also be improved. Accurately and appropriately, the suggested ensemble averaging model identifies potato leaf phases. So, the accuracy of the suggested ensemble model is achieved with perfect precision. On the second level, the severity of the disorder is assessed using the K mean clustering algorithm. To determine the disease's severity, this system examines each pixel in the early and late blight images. It will be classified as severe if more than 50% of the pixels are damaged.
Artificial intelligence powered internet of vehicles: securing connected vehicles in 6G Kumar Raja, Depa Ramachandraiah; Abas, Zuraida Abal; Akula, Chandra Sekhar; Kumar, Yellapalli Dileep; Kumar, Goshtu Hemanth; Eswari, Venappagari
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp213-221

Abstract

The rapid advancements in automotive technology and the emergence of next-generation networks such as 5G and 6G are laying the foundation for the internet of vehicles (IoV), a revolutionary concept to transform transportation systems. The convergence of artificial intelligence (AI) and connected vehicles IoV is driving a paradigm shift in the transportation sector, especially in the dynamic framework of 5G and future 6G networks. This survey paper provides a thorough survey of the evolving AI-based IoV security landscape. We explore key areas of 5G/6G networks, focusing on the complex interplay of machine learning (ML) and deep learning (DL) in enhancing vehicle-to-everything (V2X) security and connected vehicles. Addressing the unique challenges of 6G, this paper outlines future directions for improving security and highlights open research issues. This comprehensive survey, which aims to provide information and guidance to both researchers and practitioners, contributes to a detailed understanding of the security issues associated with connected vehicles in the emerging 6G era.

Filter by Year

2024 2024


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue