cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 66 Documents
Search results for , issue "Vol 35, No 2: August 2024" : 66 Documents clear
On-chip based power estimation for CMOS VLSI circuits using support vector machine Nagarajan, Sridevi; Mahadeviah, Prasanna Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp804-811

Abstract

Power estimation has a major impact on the reliability of very-large-scale integration (VLSI) circuits. As a results power estimation is highly needed in VLSI circuits at the early stages. One of the evident challenges in integrated circuit (IC) industry is development and investigation of techniques for the reduction of design complexity due to the growing process variations and reduction of chip manufacturing turnaround time. Under these conditions, the higher design levels of average power estimation before the chip manufacturing process is highly essential for the calculation of power budget and to take the necessary steps for the reduction of power consumption. Over the years, most of the approaches were designed to estimate the power usage, however, most of the conventional techniques are time consuming, resource-intensive and largely manual. Machine learning techniques have received much attention in many of the engineering applications and are capable for modelling the complex systems through historical data. Hence, in this work on chip-based power estimation for complementary metal-oxide-semiconductor (CMOS) VLSI using support-vector machine (SVM) is presented to estimate the power. The SVM is employed to estimate the usage of power at runtime. The performance of this model is evaluated in terms of Power usage, delay, data accuracy and error rate.
Semi-decentralized Lyapunov-based formation control of multiple omnidirectional mobile robots Agung, Hendi Wicaksono; Jordan, Fransisco
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp823-833

Abstract

This paper introduces an advanced formation control algorithm based on a Lyapunov approach for coordinating multiple omnidirectional mobile robots in collaborative object transport tasks. The semi-decentralized strategy ensures that the robots maintain a predefined geometric formation, crucial for stability during material transportation, and dynamically adapt to avoid collisions using onboard sensors. Experimental with a physical robot simulator demonstrates successful maintenance of line and triangle formations achieving an average side length maintenance of 1.00 meters with minimal deviation. Quantitative analysis across 30 experimental runs reveals consistent performance, with a maximum side length fluctuation of only 2 centimeters, validating the effectiveness of maintaining formation within a multi-robot system (MRS) framework. The Lyapunov-based approach proves to be an efficient method for cooperative object transport, achieving consistent performance with minimal deviation.
An autonomous robotic arm for efficient rock collection in uncharted territories Deshmukh, Sanjay; Thakker, Bhaumik Hitesh; Gupte, Vedangi Nilesh; Kapadia, Taher Kutbuddin
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp779-786

Abstract

The autonomous rock collector using robotic arm for exploration of unknown territories (ARCAxUT) is introduced as an innovative solution for the efficient retrieval of rock samples in unexplored space regions. Traditional, human-reliant methods are costly and hazardous, prompting the development of ARCAxUT. Equipped with a smart robotic arm, an RGB-D camera, and NUC computer, the system autonomously detects and estimates the mass of various rock samples. Validated in simulated and real-world environments, the algorithm ensures precise gripper control, achieving an impressive 95.4% accuracy in rock size estimation. This breakthrough offers transformative capabilities for space missions, revolutionizing celestial body sample collection and advancing broader societal implications in space exploration technologies.
A proposed semantic keywords search engine for Indonesian Qur’an translation based on word embedding Trisnawati, Liza; Binti Samsudin, Noor Azah; Bin Ahmad Khalid, Shamsul Kamal; Bin Ahmad Shaubari, Ezak Fadzrin; Sukri, Sukri; Indra, Zul
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp987-995

Abstract

Obtaining relevant information from the Holy Qur’an can be really challenging for people who cannot speak Arabic, such as the Indonesian people. One technology implementation which is commonly used to tackle this problem is to develop a search engine application for Al-Qur’an verses. This paper proposes a search engine based on semantic representation keywords for the Indonesian translation of the Al-Qur’an which consists of 3 phases i.e., data preparation, document representation, and search engine development. In the first stage, the Al-Qur’an dataset was built using the official translation of the Al-Qur’an from the Ministry of Religion and then enriched with the Wikipedia corpus. The second phase is document representation which produces feature vectors by utilizing the Word2Vec algorithm. Finally, the development of a search engine that can find the most relevant verses by calculating the cosine similarity between the document and the keywords. It was found that the proposed search engine succeeded in exceeding the performance of ordinary search engines by finding wider information due to the use of semantic keywords. Apart from that, the proposed search engine succeeded in maintaining the relevance of search results by achieving precision and recall levels of 98.7% and 97.3% respectively.
IoT-based system to detect and control natural gas leaks in residential kitchens Pillco-Sanchez, Max Jhonatan; Huatuco-Villanueva, Alex Antonio; Sanchez-Ramirez, Jhony Miguel; Cabana-Cáceres, Maritza; Castro-Vargas, Cristian
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp761-778

Abstract

Natural gas is widely used in many homes for cooking, but a lack of gas leak detection has led to large fires and accidents. This article presents the design and implementation of a natural gas detection and extraction system for domestic kitchens in Lima, Peru. The ESP32 microcontroller allowed remote circuit control, resulting in a more convenient setup than the Arduino UNO microcontroller. After calibration of the sensors and their corresponding programming, three actions were established in response to different gas levels: alarm activation, space ventilation and gas extraction, and thermal shutdown. Strategic sensor placement and improved physical presentation of the system were performed to ensure accurate readings and effective deployment. The results demonstrate the proper functioning of the circuit and its ability to prevent accidents related to gas leaks. The designed system offers the advantage of remote monitoring, providing access to the user from any location. In conclusion, this project offers a comprehensive solution to prevent accidents caused by gas leaks in home kitchens. With satisfactory results in terms of operation and rapid response, the project demonstrates its effectiveness in accident prevention. This design offers a practical and accessible solution, improving security and bringing peace of mind to homes.
Ensemble learning techniques against structured query language injection attacks Odeh, Ammar; Taleb, Anas Abu
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp1004-1012

Abstract

Structured query language (SQL) injection threats pose severe risks to web applications, necessitating robust detection measures. This study introduced DSQLIA, employing ensemble learning algorithms-Bagging, Stacking, and AdaBoost classifiers-for SQL injection detection. Results unveiled the bagging classifier's 84% accuracy with perfect precision (100%) but moderate recall (68%). The stacking classifier achieved 85% accuracy, exceptional precision (99%), and balanced memory (72%), yielding an 83% F1-Score. Remarkably, the AdaBoost classifier outperformed, achieving 99% accuracy, high precision (98%), and outstanding recall (99%), leading to a remarkable 99% F1-Score. These findings highlight AdaBoost's superior ability to identify malicious queries with minimal false positives accurately. Overall, this research underscores the potential of ensemble learning in fortifying web application security against SQL injection attacks, emphasizing the AdaBoost classifier's exceptional performance in achieving precise and comprehensive detection.
Combined wavelet transforms and neural network feed-forward model for ECG peak detection and classification Badiger, Raghavendra; Manickam, Prabhakar
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp1343-1360

Abstract

We have focused on development of a combined approach for electrocardiogram (ECG) signal filtering and various ECG peak detection. The filtering model is based on the combination of wavelet transform and neural network where after computing the wavelet coefficients the neural network feed-forward model is used to update the weights. The filtered signal is processed through the convolution layers and bidirectional long short-term memory (Bi-LSTM) architecture to perform the ECG peak detection. Further, we apply a combined feature extraction strategy where wavelet transform and morphological feature are extracted to classify the ECG beats as classify 5 different types of heartbeats, including premature ventricular contraction (PVC), left bundle branch block (LBBB), right bundle branch block (RBBB), PACE, and atrial premature contraction (APC) to examine the heart condition. The feature extraction phase uses wavelet transform, morphological features and high-order statistics to generate the robust features. The obtained feature vector is processed through the principal component analysis (PCA) module to reduce the dimension of feature vector. These features are trained by using support vector machine (SVM) and k-nearest neighbor (KNN) supervised model. The proposed approach is tested on publicly available MIT-BIH dataset where performance analysis shows that the proposed approach obtained average precision, sensitivity and error as 99.98%, 99.96%, and 0.101 which outperforms the existing filtering and peak detection schemes.
Energy efficient routing protocol for enhancing the network lifetime in wireless sensor network Hiremath, Veeresh; Kerur, Sidlingappa; Gudnavar, Anand
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp944-957

Abstract

Wireless sensor networks (WSNs) confront significant challenges related to battery capacity, as sensor nodes operate on limited energy resources. To address this issue, low energy adaptive clustering hierarchy (LEACH) protocol is commonly employed for power management in WSNs. LEACH is commonly used for power management. Here, sensing region is divided into clusters and sectors, placing a gateway node at the center to minimize energy consumption during data transmission. It employs one-hop, two-hop, or three-hop pathways based on node proximity to the base station (BS) to optimize energy usage. Network performance is assessed using rounds, throughput, and energy usage. MATLAB simulations compare the proposed approach with dual layer LEACH (DL-LEACH) and LEACH, showing significant improvements in network lifetime. The proposed scheme outperforms LEACH by 515% and 347% for 20% and 50% node depletion, respectively. Compared to DL-LEACH, it extends network lifetime by 27% and 59% under similar scenarios. Sectoring, clustering, and multi-hop communication reduce energy consumption, enhancing network lifetime and addressing WSN challenges effectively.
Dual image watermarking based on NSST-LWT-DCT for color image Avivah, Siti Nur; Ernawan, Ferda; Mat Raffei, Anis Farihan
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp907-915

Abstract

Advanced internet technology allows unauthorized individuals to modify and distribute digital images. Image watermarking is a popular solution for copyright protection and ensuring digital security. This research presents an embedding scheme with a set of conditions using non-subsampled Shearlet transform (NSST), lifting wavelet transform (LWT), and discrete cosine transform (DCT). Red and green channels are employed for the embedding process. The red channel is converted by NSST-LWT. The low-frequency area (LL) frequency is then split into small blocks of 8×8, each partition block is then transformed by DCT. The DCT coefficient of (3,4), (5,2), (5,3), (3,5), called matrix M1, and (2,5), (4,3), (6,2), (4,4), called matrix M2 are selected for singular value decomposition (SVD) process. With a set of conditions, the watermark bits are incorporated into those singular values. The green channel is cropped to get the center image before splitting into 4×4 pixels. The block components are then selected based on the least entropy value for the embedding regions. The selected blocks are then computed using LWT-SVD. A set of conditions for U(1,1) and U(2,1) are used to incorporate the watermark logo. The experimental findings reveal that the suggested scheme achieves high imperceptibility and resilience under various evaluating attacks with an average peak signal-to-noise ratio (PSNR) and correlation value (NC) values are up to 43.89 dB and 0.96, respectively.
Extracting geo-references from social media text using bi-long short term memory networks Mangal, Dharmendra; Makwana, Hemant
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp1263-1270

Abstract

The social media data provides great source of information about global and local events, with millions of users. More precisely, the fact that brief messages are practical and are highly popular. Many recent studies have been motivated to estimate the location of the events identified by tracking posts in social media text messages. It might be difficult to extract location data and estimate the location of an event while maintaining a sufficient level of situation awareness, particularly in disaster situations like fires or traffic accidents. In this presented work we proposed an approach to identify geo-references in the text messages. We used bi-directional long short term memory (LSTM) neural networks to extract location information in the text messages. The results show that applying Bi-LSTM on dataset gives high level accuracy after fine-tuning (up to 10 epochs). The testing results show that accuracy achieved is 0.98 and 0.076 loss value. This proves that the proposed methodology is better than the previous conditional random field (CRF)-based approaches.

Filter by Year

2024 2024


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue