cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 65 Documents
Search results for , issue "Vol 35, No 3: September 2024" : 65 Documents clear
Automatic human height measurement system based on camera sensor with deep-learning and linear regression analysis Fadllullah, Arif; Zulfia, Rahmatuz; Pradana, Awang; Yudhistira Akbar, Muhammad Adhiya
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1627-1636

Abstract

This study proposes a new approach for automatically measuring human height using a camera sensor with deep learning and linear regression analysis. The camera sensor is used to capture real-time images of human objects. The image is then processed with a YOLO4-based convolutional neural network (CNN) to separate the region of interest (ROI) of the human object from the background. The pixel value of the ROI vertical line is then converted into height in centimeters by the linear regression equation. The system was tested on 40 primary samples, with 20 samples used as control data and 20 samples used as test data. From the results of testing 20 control data samples, the linear regression equation was obtained as y' = 0.4034x + 24.938, which was then applied to convert the system's predicted height in centimeters for 20 test samples. The test results for 20 test samples showed that an average F1_score was 1, the R_square obtained was 0.93, the root mean square errors (RMSE) was 0.02, and the percentage of accuracy was 99.00%. The test results showed that the system was able to automatically detect human height with a very high level of correlation/similarity and accuracy between actual and predicted height.
Virality classification from Twitter data using pre-trained language model and multi-layer perceptron Tedjasulaksana, Jeffrey Junior; Girsang, Abba Suganda
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1952-1962

Abstract

Twitter is one of the well-known text-based social media that is often used to disseminate content. According to Katadata, Indonesia ranked fifth in the world in 2023. So many people or organizations want to make tweets go viral. Therefore, this research aims to develop a model that uses tweet data from the Indonesian language Twitter social media to categorize the level of virality. There are several tasks in classifying the level of virality, such as upsampling data, predicting sentiment and emotion, and text embedding. Upsampling data was carried out because the dataset used was an imbalanced dataset. Data upsampling, emotions, and text embedding is carried out using the bidirectional encoder representation from transformers (BERT) model. Meanwhile, sentiment prediction uses the Ro-bustly optimized BERT pretraining approach (RoBERTa). The results of text embedding, sentiment, emotion, will be combined with Twitter metadata then all features will be fed into the multi-layer perceptron (MLP) model to classifying the level of virality which is divided into 3 classes based on the number of retweets, namely low, medium and high. The proposed method produces an F1-score of 49% and an accuracy of 95% and performs better than the baseline model.
A general framework for metaverse based on parallel computing and HPC Al Khaldy, Mohammad Ali; Al-Qerem, Ahmad; Aldweesh, Amjad; Alauthman, Mohammad
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1895-1905

Abstract

As virtual and actual universes merge inside the creating metaverse, requests have pointedly ascended for continuous, intuitive, and intense encounters. The ability of the metaverse to effectively analyze and render complicated links and information supplied by clients is critical for realizing that goal. These demanding computational demands are starting to be supported by parallel processing, and high-performance computing (HPC) is beyond uncertainty key to this domain. The integrative framework presented in this paper addresses the core challenges of inertness, flexibility, and ease of use while integrating equal registration into the metaverse. The system enables prompt handling of client actions and quick response times by distributing calculations over multiple processors, which is essential for the seamless client experience. It also manages the vast amount of metaverse material and interactions as well as the various data processing needs. The paper looks at intrinsic equal processing difficulties in this unique climate, including creating versatile and energy-effective equal calculations that consider load adjusting and asset designation. It features the need to democratize equal figuring assets to produce metaverse extension while accentuating the significance of information protection and security conventions in multi-client settings. The cooperative energy between metaverse development and equal registering progressions vows to push limits, empowering remarkable degrees of virtual submersion and collaboration.
Intrusion detection system for cloud environment based on convolutional neural networks and PSO algorithm Rosline, Gnanam Jeba; Rani, Pushpa
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1499-1506

Abstract

Authentication of clients and their applications to cloud services is a major concern. Network security and the identification of hostile activities are greatly aided by intrusion detection systems (IDS). In general, optimisation strategies can be applied to improve IDS model performance. Convolutional neural networks (CNN) and other deep learning (DL) algorithms is utilised to enhance IDS’s capability to identify and categories intrusions. IDSs can identify prior attacks, adapt to changing threats, and minimise false positives by utilising these strategies. In this work, a lightweight CNN is proposed for intrusion detection in cloud environment. The main contribution of this research is to use particle swarm optimization (PSO), ametaheuristic algorithm to find the CNNs optimal parameters that comprise the number of convolutional layers, the size of the filter utilized in the convolutional procedure, the number of convolutional filters, and the batch size. Heuristic based searches are useful for solving these kinds of problems. The experimental outcomes demonstrate that the proposed method reaches 91.70% of accuracy, 91.82% of precision, 91.99% of recall and 91.90% of F1-score. Cloud providers can gain from improved security measures by incorporating the proposed IDS paradigm into cloud settings, thereby minimizing unauthorized access and any data breaches.
Investigation of digital rupiah acceptance using UTAUT-3 model Mau Bere, Alejandro Billyjoe; Putra, Richard Win; Wedari, Linda Kusumaning
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1710-1721

Abstract

The adoption of central bank digital currencies (CBDC) has been popular in many countries, especially Indonesia which currently develops its own CBDC called digital rupiah, due to its potential benefits such as financial inclusion. Despite the potential benefits of digital rupiah, there is a lack of understanding regarding factors that affect digital rupiah user acceptance. This research aims to investigate the potential factor affecting the user acceptance of digital rupiah using the unified theory of acceptance and use of technology (UTAUT-3) model, incorporating awareness and privacy as additional variables. There are 218 respondents to this study from five provinces in Indonesia: Jakarta, West Java, East Java, Central Java, and Yogyakarta. The data were analyzed using the SEM-PLS method. The results of this study found that performance expectancy, effort expectancy, habit, personal innovativeness, and awareness are the significant factors that affect the behavioral intention of digital rupiah meanwhile facilitating condition, habit, personal innovativeness, and behavioral intention are the factors that significantly affect the use behavior of digital rupiah. This study identifies key factors influencing the user acceptance of the digital rupiah, providing valuable insights for stakeholders seeking to promote its adoption and use in Indonesia.
Sqrt-Loglogish CNN and Markov model for 5G spectrum sensing application Rajanna, Anupama; Kulkarni, Srimannarayana; Prasad, Sarappadi Narasimha
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1480-1490

Abstract

The research presents innovative methods for spectrum sensing in 5G networks, using the Sqrt-Loglogish convolutional neural network (SL-CNN) and hidden orthogonal intuitionistic fuzzy Markov model (HOIFMM). The proposed methods aim to tackle issues related to detecting principal user signals accurately, mitigating interference, and efficiently utilizing the spectrum in wideband spectrum environments due to their diverse and ever changing characteristics. The Sqrt-Loglogish CNN improves spectrum sensing by addressing static threshold dependency and potential overfitting. The HOIFMM offers a complex framework for predicting sparsity levels and primary user patterns. The results highlight the effectiveness of the suggested techniques in differentiating primary user signals from noise and interference, resulting in enhanced interference management tactics and overall network performance. MATLAB simulation is performed and compared the proposed methods performance with existing state-of-the-art methods such as CNN, deep neural network (DNN), long short-term memory (LSTM) and artificial neural networks (ANN). The proposed method has outperformed existing methods in terms of sensitivity, accuracy, and precision. Future endeavors include improving these methods, investigating sophisticated machine learning algorithms, and doing real world validations to guarantee scalability and resilience in various 5G deployment situations. This research advances the spectrum sensing capabilities in 5G networks, potentially improving efficiency, reliability, and quality of service.
Prevention of credit card fraud transaction using GA feature selection for web-based application Sreekanth, Kavuri; Mamidi, Ratnababu; Reddy, Thumu Srinivas; Maddileti, Kuruva; Deepthi, Darivemula
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1645-1652

Abstract

Credit card fraud (CCF) is a regular event that generates financial losses. A considerable share of the significantly increased volume of internet transactions is made with credit cards. CCF detection programmes are consequently highly prioritised by banks and other financial organisations. These fraudulent transactions can come in a wide variety of formats and categories. To maintain data integrity, financial institutions support digital transactions. One of the most popular ways to pay the products and services can be done by both online and offline by using a credit card. Thus, there is a higher possibility of fraud during these financial transactions. This informs programmers to the requirement for a reliable technique for identifying successful fraud. Credit card users and businesses that accept credit cards have recently had to contend with the serious issue of CCF. Application-level frauds and transaction level frauds are the two categories into which CCF controlled frauds are divided. Therefore, utilizing genetic algorithm (GA) feature selection for web-based applications, it is advised to use this strategy as a method for the prevention of CCF transaction. This method's performance is evaluated based on a number of factors, including accuracy, recall, and specificity.
Design and analysis of low power sense amplifier for static random access memory Yadav, Vishal; Tiwari, Brij Bihari
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1447-1455

Abstract

Today’s era is a digital world where each and every section of the society is experiencing and encountering with semiconductor chips. In very large-scale integration (VLSI) circuits the design of static random-access memory (SRAM) plays a crucial role in ensuring both low-power consumption and high-speed performance. The sense amplifiers (SA) are integral parts for information accessing storage in SRAM IC design. This paper introduces a dual voltage latch sense amplifier (DVLSA) for SRAM integrated circuits (IC). The comparative analyses of various SA are studied and then design a low-power SA through the implementation of energy-efficient technique. Further, we have elucidated the causes of delay and power dissipation in different SA with useful solutions and performance evaluation is conducted by comparing the proposed design with existing SA reported in the literature. The performance parameters such as power 1.604 uw, energy 470.50 fJ, delay 80.04 ps, and current 5.406 are scrutinized to assess the efficiency of the designs. The cell outcomes have been validated with cadence tool on 180 nm technology and operate at 1.8 V. The proposed design, namely, DVLSA demonstrates minimal energy consumption and low power dissipation, making it a promising advancement in SRAM IC technology.
Stock market index prediction based on market trend using LSTM Yenireddy, Ankireddy; Narayana, Marimganti Srinivasa; Bangaru Ganesh, Kalla Venkata; Kumar, Guvvaladinne Prasanna; Venkateswarlu, Madduri
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1601-1609

Abstract

The stock market data analysis has received interest as a result of technological advancements and the investigation of new machine learning models, since these models provide a platform for traders and business people to choose gaining stocks. The business price prediction is a challenging and extremely complex process due to the impact of several factors on company prices. The numerous patterns that the stock market goes, they have been the focus of extensive research and analysis by numerous experts. There are several large data sets accessible, an artificial intelligence and machine learning techniques are developing quickly, and because of the machine’s improved computational power, complex stock price prediction algorithms can be developed. This paper presents stock market index prediction based on market trend using long short-term memory (LSTM). Using built-in application programmable interface (API), Yahoo Finance offers a simple method to programmatically retrieve any historical stock prices of an organization using the ticker name. The standard and poor’s 500 index (S&P 500 index) include the firms that have been taken into consideration here. Utilizing the selected input variable, single-layer and multi-layer LSTM models are implemented, and the measurement parameters of mean absolute error (MAE), root mean square error (RMSE), and correlation coefficient (R) are used to compare each performance. Nearly all of the real closing price’s curve and the prediction curve’s closing price for test data overlap. A potential stock investor may benefit significantly from such a prediction by using it to make well-informed choices that would increase his earnings.
Improving k-nearest neighbor performance using permutation feature importance to predict student success in study Jana Satvika, Gd. Aditya; Sukajaya, I. N.; Gunadi, I Gede Aris
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1835-1844

Abstract

The timely graduation of students is a critical indicator of academic quality assessment. Therefore, universities should use effective predictive systems to identify earlier potential lateness of graduation. This study aimed to improve the K-nearest neighbor (K-NN) algorithm’s ability to predict student on-time graduation. It evaluated K-NN algorithm performance with and without the permutation feature importance (PFI) technique, using a dataset of 460 student graduation records from 2014 to 2017. The training data was oversampled, adjusting the ratio of minority class samples from 13% to 100% of the majority class samples. The result shows that integrating PFI into the K-NN model improved K-NN performance by 10 iterations of the PFI process, N-shuffle varying from 10 to 100 for each iteration, and a minority class sample ratio of 25%. The accuracy score improved from 90.22% to 92.39%, precision from 50.00% to 62.50%, F1-score from 52.63% to 58.82%, while recall remained consistent at 55.56%. The PFI analysis showed that achievement index for the 1st semester or IPS 1 had the least impact on the model. The study suggested using a comprehensive approach to determine the n-shuffle of PFI based on the number of test data for a more accurate feature contribution pattern.

Filter by Year

2024 2024


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue