Articles
65 Documents
Search results for
, issue
"Vol 35, No 3: September 2024"
:
65 Documents
clear
Automatic human height measurement system based on camera sensor with deep-learning and linear regression analysis
Fadllullah, Arif;
Zulfia, Rahmatuz;
Pradana, Awang;
Yudhistira Akbar, Muhammad Adhiya
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v35.i3.pp1627-1636
This study proposes a new approach for automatically measuring human height using a camera sensor with deep learning and linear regression analysis. The camera sensor is used to capture real-time images of human objects. The image is then processed with a YOLO4-based convolutional neural network (CNN) to separate the region of interest (ROI) of the human object from the background. The pixel value of the ROI vertical line is then converted into height in centimeters by the linear regression equation. The system was tested on 40 primary samples, with 20 samples used as control data and 20 samples used as test data. From the results of testing 20 control data samples, the linear regression equation was obtained as y' = 0.4034x + 24.938, which was then applied to convert the system's predicted height in centimeters for 20 test samples. The test results for 20 test samples showed that an average F1_score was 1, the R_square obtained was 0.93, the root mean square errors (RMSE) was 0.02, and the percentage of accuracy was 99.00%. The test results showed that the system was able to automatically detect human height with a very high level of correlation/similarity and accuracy between actual and predicted height.
Virality classification from Twitter data using pre-trained language model and multi-layer perceptron
Tedjasulaksana, Jeffrey Junior;
Girsang, Abba Suganda
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v35.i3.pp1952-1962
Twitter is one of the well-known text-based social media that is often used to disseminate content. According to Katadata, Indonesia ranked fifth in the world in 2023. So many people or organizations want to make tweets go viral. Therefore, this research aims to develop a model that uses tweet data from the Indonesian language Twitter social media to categorize the level of virality. There are several tasks in classifying the level of virality, such as upsampling data, predicting sentiment and emotion, and text embedding. Upsampling data was carried out because the dataset used was an imbalanced dataset. Data upsampling, emotions, and text embedding is carried out using the bidirectional encoder representation from transformers (BERT) model. Meanwhile, sentiment prediction uses the Ro-bustly optimized BERT pretraining approach (RoBERTa). The results of text embedding, sentiment, emotion, will be combined with Twitter metadata then all features will be fed into the multi-layer perceptron (MLP) model to classifying the level of virality which is divided into 3 classes based on the number of retweets, namely low, medium and high. The proposed method produces an F1-score of 49% and an accuracy of 95% and performs better than the baseline model.
A general framework for metaverse based on parallel computing and HPC
Al Khaldy, Mohammad Ali;
Al-Qerem, Ahmad;
Aldweesh, Amjad;
Alauthman, Mohammad
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v35.i3.pp1895-1905
As virtual and actual universes merge inside the creating metaverse, requests have pointedly ascended for continuous, intuitive, and intense encounters. The ability of the metaverse to effectively analyze and render complicated links and information supplied by clients is critical for realizing that goal. These demanding computational demands are starting to be supported by parallel processing, and high-performance computing (HPC) is beyond uncertainty key to this domain. The integrative framework presented in this paper addresses the core challenges of inertness, flexibility, and ease of use while integrating equal registration into the metaverse. The system enables prompt handling of client actions and quick response times by distributing calculations over multiple processors, which is essential for the seamless client experience. It also manages the vast amount of metaverse material and interactions as well as the various data processing needs. The paper looks at intrinsic equal processing difficulties in this unique climate, including creating versatile and energy-effective equal calculations that consider load adjusting and asset designation. It features the need to democratize equal figuring assets to produce metaverse extension while accentuating the significance of information protection and security conventions in multi-client settings. The cooperative energy between metaverse development and equal registering progressions vows to push limits, empowering remarkable degrees of virtual submersion and collaboration.
Intrusion detection system for cloud environment based on convolutional neural networks and PSO algorithm
Rosline, Gnanam Jeba;
Rani, Pushpa
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v35.i3.pp1499-1506
Authentication of clients and their applications to cloud services is a major concern. Network security and the identification of hostile activities are greatly aided by intrusion detection systems (IDS). In general, optimisation strategies can be applied to improve IDS model performance. Convolutional neural networks (CNN) and other deep learning (DL) algorithms is utilised to enhance IDS’s capability to identify and categories intrusions. IDSs can identify prior attacks, adapt to changing threats, and minimise false positives by utilising these strategies. In this work, a lightweight CNN is proposed for intrusion detection in cloud environment. The main contribution of this research is to use particle swarm optimization (PSO), ametaheuristic algorithm to find the CNNs optimal parameters that comprise the number of convolutional layers, the size of the filter utilized in the convolutional procedure, the number of convolutional filters, and the batch size. Heuristic based searches are useful for solving these kinds of problems. The experimental outcomes demonstrate that the proposed method reaches 91.70% of accuracy, 91.82% of precision, 91.99% of recall and 91.90% of F1-score. Cloud providers can gain from improved security measures by incorporating the proposed IDS paradigm into cloud settings, thereby minimizing unauthorized access and any data breaches.
Investigation of digital rupiah acceptance using UTAUT-3 model
Mau Bere, Alejandro Billyjoe;
Putra, Richard Win;
Wedari, Linda Kusumaning
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v35.i3.pp1710-1721
The adoption of central bank digital currencies (CBDC) has been popular in many countries, especially Indonesia which currently develops its own CBDC called digital rupiah, due to its potential benefits such as financial inclusion. Despite the potential benefits of digital rupiah, there is a lack of understanding regarding factors that affect digital rupiah user acceptance. This research aims to investigate the potential factor affecting the user acceptance of digital rupiah using the unified theory of acceptance and use of technology (UTAUT-3) model, incorporating awareness and privacy as additional variables. There are 218 respondents to this study from five provinces in Indonesia: Jakarta, West Java, East Java, Central Java, and Yogyakarta. The data were analyzed using the SEM-PLS method. The results of this study found that performance expectancy, effort expectancy, habit, personal innovativeness, and awareness are the significant factors that affect the behavioral intention of digital rupiah meanwhile facilitating condition, habit, personal innovativeness, and behavioral intention are the factors that significantly affect the use behavior of digital rupiah. This study identifies key factors influencing the user acceptance of the digital rupiah, providing valuable insights for stakeholders seeking to promote its adoption and use in Indonesia.
Sqrt-Loglogish CNN and Markov model for 5G spectrum sensing application
Rajanna, Anupama;
Kulkarni, Srimannarayana;
Prasad, Sarappadi Narasimha
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v35.i3.pp1480-1490
The research presents innovative methods for spectrum sensing in 5G networks, using the Sqrt-Loglogish convolutional neural network (SL-CNN) and hidden orthogonal intuitionistic fuzzy Markov model (HOIFMM). The proposed methods aim to tackle issues related to detecting principal user signals accurately, mitigating interference, and efficiently utilizing the spectrum in wideband spectrum environments due to their diverse and ever changing characteristics. The Sqrt-Loglogish CNN improves spectrum sensing by addressing static threshold dependency and potential overfitting. The HOIFMM offers a complex framework for predicting sparsity levels and primary user patterns. The results highlight the effectiveness of the suggested techniques in differentiating primary user signals from noise and interference, resulting in enhanced interference management tactics and overall network performance. MATLAB simulation is performed and compared the proposed methods performance with existing state-of-the-art methods such as CNN, deep neural network (DNN), long short-term memory (LSTM) and artificial neural networks (ANN). The proposed method has outperformed existing methods in terms of sensitivity, accuracy, and precision. Future endeavors include improving these methods, investigating sophisticated machine learning algorithms, and doing real world validations to guarantee scalability and resilience in various 5G deployment situations. This research advances the spectrum sensing capabilities in 5G networks, potentially improving efficiency, reliability, and quality of service.
Prevention of credit card fraud transaction using GA feature selection for web-based application
Sreekanth, Kavuri;
Mamidi, Ratnababu;
Reddy, Thumu Srinivas;
Maddileti, Kuruva;
Deepthi, Darivemula
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v35.i3.pp1645-1652
Credit card fraud (CCF) is a regular event that generates financial losses. A considerable share of the significantly increased volume of internet transactions is made with credit cards. CCF detection programmes are consequently highly prioritised by banks and other financial organisations. These fraudulent transactions can come in a wide variety of formats and categories. To maintain data integrity, financial institutions support digital transactions. One of the most popular ways to pay the products and services can be done by both online and offline by using a credit card. Thus, there is a higher possibility of fraud during these financial transactions. This informs programmers to the requirement for a reliable technique for identifying successful fraud. Credit card users and businesses that accept credit cards have recently had to contend with the serious issue of CCF. Application-level frauds and transaction level frauds are the two categories into which CCF controlled frauds are divided. Therefore, utilizing genetic algorithm (GA) feature selection for web-based applications, it is advised to use this strategy as a method for the prevention of CCF transaction. This method's performance is evaluated based on a number of factors, including accuracy, recall, and specificity.
Design and analysis of low power sense amplifier for static random access memory
Yadav, Vishal;
Tiwari, Brij Bihari
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v35.i3.pp1447-1455
Today’s era is a digital world where each and every section of the society is experiencing and encountering with semiconductor chips. In very large-scale integration (VLSI) circuits the design of static random-access memory (SRAM) plays a crucial role in ensuring both low-power consumption and high-speed performance. The sense amplifiers (SA) are integral parts for information accessing storage in SRAM IC design. This paper introduces a dual voltage latch sense amplifier (DVLSA) for SRAM integrated circuits (IC). The comparative analyses of various SA are studied and then design a low-power SA through the implementation of energy-efficient technique. Further, we have elucidated the causes of delay and power dissipation in different SA with useful solutions and performance evaluation is conducted by comparing the proposed design with existing SA reported in the literature. The performance parameters such as power 1.604 uw, energy 470.50 fJ, delay 80.04 ps, and current 5.406 are scrutinized to assess the efficiency of the designs. The cell outcomes have been validated with cadence tool on 180 nm technology and operate at 1.8 V. The proposed design, namely, DVLSA demonstrates minimal energy consumption and low power dissipation, making it a promising advancement in SRAM IC technology.
Stock market index prediction based on market trend using LSTM
Yenireddy, Ankireddy;
Narayana, Marimganti Srinivasa;
Bangaru Ganesh, Kalla Venkata;
Kumar, Guvvaladinne Prasanna;
Venkateswarlu, Madduri
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v35.i3.pp1601-1609
The stock market data analysis has received interest as a result of technological advancements and the investigation of new machine learning models, since these models provide a platform for traders and business people to choose gaining stocks. The business price prediction is a challenging and extremely complex process due to the impact of several factors on company prices. The numerous patterns that the stock market goes, they have been the focus of extensive research and analysis by numerous experts. There are several large data sets accessible, an artificial intelligence and machine learning techniques are developing quickly, and because of the machine’s improved computational power, complex stock price prediction algorithms can be developed. This paper presents stock market index prediction based on market trend using long short-term memory (LSTM). Using built-in application programmable interface (API), Yahoo Finance offers a simple method to programmatically retrieve any historical stock prices of an organization using the ticker name. The standard and poor’s 500 index (S&P 500 index) include the firms that have been taken into consideration here. Utilizing the selected input variable, single-layer and multi-layer LSTM models are implemented, and the measurement parameters of mean absolute error (MAE), root mean square error (RMSE), and correlation coefficient (R) are used to compare each performance. Nearly all of the real closing price’s curve and the prediction curve’s closing price for test data overlap. A potential stock investor may benefit significantly from such a prediction by using it to make well-informed choices that would increase his earnings.
Improving k-nearest neighbor performance using permutation feature importance to predict student success in study
Jana Satvika, Gd. Aditya;
Sukajaya, I. N.;
Gunadi, I Gede Aris
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v35.i3.pp1835-1844
The timely graduation of students is a critical indicator of academic quality assessment. Therefore, universities should use effective predictive systems to identify earlier potential lateness of graduation. This study aimed to improve the K-nearest neighbor (K-NN) algorithm’s ability to predict student on-time graduation. It evaluated K-NN algorithm performance with and without the permutation feature importance (PFI) technique, using a dataset of 460 student graduation records from 2014 to 2017. The training data was oversampled, adjusting the ratio of minority class samples from 13% to 100% of the majority class samples. The result shows that integrating PFI into the K-NN model improved K-NN performance by 10 iterations of the PFI process, N-shuffle varying from 10 to 100 for each iteration, and a minority class sample ratio of 25%. The accuracy score improved from 90.22% to 92.39%, precision from 50.00% to 62.50%, F1-score from 52.63% to 58.82%, while recall remained consistent at 55.56%. The PFI analysis showed that achievement index for the 1st semester or IPS 1 had the least impact on the model. The study suggested using a comprehensive approach to determine the n-shuffle of PFI based on the number of test data for a more accurate feature contribution pattern.