cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 65 Documents
Search results for , issue "Vol 36, No 3: December 2024" : 65 Documents clear
An efficient convolutional neural network for adversarial training against adversarial attack Vaddadi, Srinivas A.; Somanathan Pillai, Sanjaikanth E. Vadakkethil; Addula, Santosh Reddy; Vallabhaneni, Rohith; Ananthan, Bhuvanesh
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1769-1777

Abstract

Convolutional neural networks (CNN) are widely used by researchers due to their extensive advantages over various applications. However, images are highly susceptible to malicious attacks using perturbations that are unrecognized even under human intervention. This causes significant security perils and challenges to CNN-related applications. In this article, an efficient adversarial training model against malevolent attacks is demonstrated. This model is highly robust to black-box malicious examples, it is processed with different malicious samples. Initially, malicious training models like fast gradient descent (FGS), recursive-FGSM (I-FGS), Deep-Fool, and Carlini and Wagner (CW) techniques are utilized that generate adversarial input by means of the CNN acknowledged to the attacker. In the experimentation process, the MNIST dataset comprising 60K and 10K training and testing grey-scale images are utilized. In the experimental section, the adversarial training model reduces the attack accuracy rate (ASR) by an average of 29.2% for different malicious inputs, when preserving the accuracy of 98.9% concerning actual images in the MNIST database. The simulation outcomes show the preeminence of the model against adversarial attacks.
A set of embedding rules in IWT for watermark embedding in image watermarking Hafidz, Muhammad Afnan; Ernawan, Ferda; Bakar, Suraya Abu; Fakhreldin, Mohammad
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1512-1520

Abstract

The development of new technologies has made image watermarking crucial in the digital era to preserve and protect illegal distribution of images against unauthorized users. This paper presents a robust image watermarking technique that employs a set of embedding rules in the three-level of integer wavelet transform (IWT). The proposed method aims to achieve high robustness of image watermarking while maintaining the imperceptibility. The proposed scheme divides the red and green layers into non-overlapping 16×16 blocks. Three levels of IWT are applied to obtain 2×2 LL sub-band, four coefficients of IWT are then modified based on the proposed set of rules for embedding watermark. The experimental results demonstrate a comparison of the proposed embedding and the existing methods. The proposed scheme produced an average NC value of 0.965 against the median filter. The results also showed the imperceptibility of the the image with a PSNR of 45.1760 db and SSIM of 0.9995.
Impact of high-k insulators on electrical properties of junctionless double gate strained transistor Kaharudin, Khairil Ezwan; Salehuddin, Fauziyah; Mohd Zain, Anis Suhaila; Jalaludin, Nabilah Ahmad; Arith, Faiz; Mat Junos, Siti Aisah; Ahmad, Ibrahim
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1437-1447

Abstract

High-k dielectric insulators are required to reduce leakage and increase transistor performance. They are able to impact the mobility of carriers in transistors positively, leading to better device performance in advanced transistor architecture. Nevertheless, an in-depth analysis of how high-k dielectric insulators influence transistor characteristics must be carried out to determine their suitability. The objective of this study is to investigate the impact of high-k insulators towards electrical properties of junctionless double gate strained transistor. The simulation works is done using process/device simulator Silvaco Athena/Atlas. Based on the retrieved results, the magnitude of ION, on-off ratio, gm, and Cint for TiO2-based device are approximately 63%, 99%, 62%, and 89% respectively higher than the lowest permittivity material-based device. The TiO2-based device also exhibits the lowest magnitude in IOFF and SS compared to others. However, a significant degradation in fT magnitude have been observed for TiO2-based device significantly due to its large capacitances
High-resolution aerial monitoring using DL for identifying abnormal activity based on visual patterns in drone videos Tripathi, Mukesh Kumar; Moorthy, Chellapilla V. K. N. S. N.; Kadam, Sandeep; Shewale, Chaitali; Shelke, Priya; Futane, Pravin R.
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1827-1835

Abstract

Unmanned aerial vehicles (UAVs) and sophisticated deep learning (DL) models have made the application of artificial intelligence (AI) more popular. This has resulted in an increase in the number of attempts to improve high-resolution aerial monitoring using DL for identifying abnormal activity based on visual patterns in drone videos. The study introduces a one-class support vector machine (OC-SVM) oddity locator for low-altitude, limited-scope UAVs used for ethereal video surveillance. The primary goal is to improve UAV-based observation capabilities by identifying areas or things of interest without prior knowledge, hence improving tasks like queue control, vehicle following, and hazardous product identification. The framework makes use of OC-SVM because of its quick and lightweight setup, making it suitable for continuous operation on low-computational UAVs. It empowers the identification of several peculiarities necessary for low-elevation reconnaissance by using textural characteristics to recognise both large-scale and tiny structures. Examine the UAV mosaicking and change location (UMCD) dataset to demonstrate the effectiveness of the framework, which achieves excellent accuracy and outperforms traditional methods by about one fifth in a variety of metrics. The suggested model compares with current methods, demonstrating superior accuracy and performance in recognition of peculiarities. Evaluation metrics include F1-score, review, exactness, and accuracy. The model demonstrates that it always encounters an oddity with a review compromise of up to seven on ten, achieving complete accuracy.
Aqua-stream: an IoT based smart water management system for sustainable living Siraparapu, Sri Ramya; Azad, S. M. A. K.
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1460-1469

Abstract

Aqua-stream, an innovative internet of things (IoT) enabled water management system, utilizes the power of long short-term memory (LSTM) networks, a sophisticated time-series forecasting machine learning technique with Kafka. Aqua-stream seamlessly integrates LSTM within the Kafka streaming architecture for efficient real-time data processing, ensuring quick responses to emerging water management needs. LSTM is employed for real-time anomaly detection, dynamically analyzing streaming data to prevent leaks through automated shut-off valves. The system’s comprehensive dashboard utilizes LSTM insights for live water quality analysis; adaptive scheduling based on individual preferences and personalized recommendations, enhancing cost-effective water management. This streamlined approach extends to the smart gardening system, where LSTM guides automation for optimal plant care incorporating sensors to monitor soil moisture, temperature, and sunlight levels. This system automatically adjusts watering and lighting to ensure optimal conditions for plant growth. Users can control and monitor their garden remotely via a smartphone, facilitating plant care while saving water and energy. Aqua-stream redefines home water management, offering a holistic solution that combines intelligent water conservation with smart gardening for a sustainable and connected living experience. Aqua-stream represents a seamless integration of LSTM-based machine learning and IoT technologies, offering an intelligent, yet simplified, solution for sustainable and connected living.
A multi-criteria trust-enhanced collaborative filtering algorithm for personalized tourism recommendations Shambour, Qusai Y.; Al-Zyoud, Mahran M.; Alsaaidah, Adeeb M.; Abualhaj, Mosleh M.; Abu-Shareha, Ahmad A.
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1919-1928

Abstract

The exponential growth of online information has LED to significant challenges in navigating data overload, particularly in the tourism industry. Travelers are overwhelmed with choices regarding destinations, accommodations, dining, and attractions, making it difficult to select options that best meet their needs. Recommender systems have emerged as a promising solution to this problem, aiding users in decision-making by providing personalized suggestions based on their preferences. Traditional collaborative filtering (CF) methods, however, face limitations, such as data sparsity and reliance on single rating scores, which do not fully capture the complexity of user preferences. This study proposes a hybrid multi-criteria trust-enhanced CF (HMCTeCF) algorithm to improve the accuracy and robustness of tourism recommendations. HMCTeCF improves the quality of recommendations by integrating multi-criteria user preferences with trust relationships among users and between items. Experimental results using real-world datasets, including Restaurants-TripAdvisor and Hotels-TripAdvisor, demonstrate that HMCTeCF outperforms benchmark CF-based recommendation methods. It achieves higher prediction accuracy and coverage rate, effectively addressing the data sparsity problem. This innovative algorithm facilitates a more personalized and enriching travel experience, particularly in scenarios with limited user data. The findings highlight the importance of considering multiple criteria and trust relationships in developing robust recommendation systems for the tourism industry.
Artificial intelligence-based weather prediction framework using neural networks Kaushik, Keshav; Chhabra, Gunjan; Bharany, Salil; Rehman, Ateeq Ur; Hamam, Habib
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1836-1848

Abstract

For humans, weather prediction is vital in making rational everyday choices and avoiding risk. Accurate weather forecasting is regarded as one of the world’s most difficult issues. New weather forecasting, unlike conventional techniques, relies on a mixture of computer simulations, observation (via balloons and satellites), and information of patterns and trends (via local weather analysts and weather stations). Predictions are rendered with fair precision using such techniques. Prediction algorithms based on complicated formulas run the majority of computational models used for prediction. This paper highlights the prediction of weather with the artificial neural networks (ANN) using the latest available smart computing devices. To assess the effectiveness of the model, comparison research is conducted with the other existing models in the same area. The result demonstrates that our approach is better in comparison to other similar research and products. The comparative analysis has been undergone which confirms the superiority of our proposed techniques with an accuracy of 90.4%.
Privacy-preserving data mining optimization for big data analytics using deep reinforcement learning Utomo, Wiranto Herry; Rosalina, Rosalina; Afriyadi, Afriyadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1929-1937

Abstract

The rapid growth of big data analytics has heightened concerns about data privacy, necessitating the development of advanced privacy-preserving techniques. This research addresses the challenge of optimizing privacy-preserving data mining (PPDM) for big data analytics through the innovative application of deep reinforcement learning (DRL). We propose a novel framework that integrates DRL to dynamically balance privacy and utility, ensuring robust data protection while maintaining analytical accuracy. The framework employs a reinforcement learning agent to adaptively select optimal privacy-preserving strategies based on the evolving data environment and user requirements, while ensuring compliance with the latest security and privacy standards such as ISO/IEC 27001:2023. Experimental results demonstrate significant improvements in both privacy protection and data utility, surpassing traditional PPDM methods. Our findings highlight the potential of DRL in enhancing privacy-preserving mechanisms, offering a scalable and efficient solution for secure big data analytics.
MPCNN: a novel approach for detecting human Monkeypox from skin lesion images leveraging deep neural network Kabir, Sk. Shalauddin; Hosen, Md. Apu; Moz, Shahadat Hoshen; Galib, Syed Md.
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1573-1582

Abstract

The global healthcare scenario encounters a substantial challenge caused by the widespread outbreak of Monkeypox affecting over 65 countries. Limited availability of polymerase chain reaction (PCR) tests and biochemical assays necessitates alternative strategies. This study explores the viability of computer-aided identification of Monkeypox through the analysis of skin lesion images, offering a potential solution, particularly in resource-constrained settings. Employing data augmentation techniques, we augment the dataset to enhance its robustness. Subsequently, we utilize various pre-trained deep learning models, including EfficientNetB3, VGG16, ResNet50, AlexNet, and EfficientNet for classification tasks related to Monkeypox and other diseases. The achieved accuracies for these models are 98.48%, 69.19%, 91.41%, 78.38%, and 94.44%, respectively. We introduce a novel modified convolutional neural network (CNN) architecture named MPCNN to further improve performance. Our proposed MPCNN model demonstrates exceptional accuracy, precisely identifying Monkeypox patients with a remarkable precision of 99.49%. This technological advancement in disease identification holds significant promise for enhancing healthcare strategies and response mechanisms in the context of global health concerns.
A hybrid classification approach for automatically recognizing COVID-19 using deep transfer learning using chest radiographs Pinjara, Murthuja; Babu G., Anjan
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1605-1612

Abstract

Coronavirus 2019 causes COVID-19, a worldwide epidemic. It endangers millions globally. Early illness detection improves recovery and control. X-ray image processing is used to categorise and identify COVID-19 in the present study. Preprocessing, feature extraction using local binary pattern (LBP) and edge orient histogram (EOH), and classification utilising K-nearest neighbour (KNN), Navie Bayes, support vector machine (SVM), and transfer learning convolution neural networks (CNNs) are some of the stages that are implemented in the process. Other phases in the process include preprocessing, feature extraction, and preprocessing. LBP+KNN, EOH+KNN, LBP+SVM, EOH +SVM, CNN+LBP, and CNN+EOH are the outputs derived from the combinations of feature extraction operators and classifiers. Other possible outcomes are CNN+EOH and CNN+LBP. A total of 4,000 pictures were used as the basis for conducting an analysis of the performance of six different models. In order to train the models, 10-fold cross-validation was used, and their accuracy was measured accordingly. The evaluation results indicate a high level of accuracy in diagnosis, ranging from 90.2% to 97.56%. The CNN+LBP and CNN+EOH models have demonstrated superior performance compared to other models, achieving average accuracies ranging from 96.66% and 98.54%.

Filter by Year

2024 2024


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue