cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 65 Documents
Search results for , issue "Vol 37, No 2: February 2025" : 65 Documents clear
A novel AI model for the extraction and prediction of Alzheimer disease from electronic health record V. Maju, Sonam; Sirya Pushpam, Gnana Prakasi Oliver
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp1023-1031

Abstract

Dark data is an emerging concept, with its existence, identification, and utilization being key areas of research. This study examines various aspects and impacts of dark data in the healthcare domain and designs a model to extract essential clinical parameters for Alzheimer's from electronic health records (EHR). The novelty of dark data lies in its significant impact across sectors. In healthcare, even the smallest data points are crucial for diagnosis, prediction, and treatment. Thus, identifying and extracting dark data from medical data corpora enhances decision-making. In this research, a natural language processing (NLP) model is employed to extract clinical information related to Alzheimer's disease, and a machine learning algorithm is used for prediction. Named entity recognition (NER) with SpaCy is utilized to extract clinical departments from doctors' descriptions stored in EHRs. This NER model is trained on custom data containing processed EHR text and associated entity annotations. The extracted clinical departments can then be used for future Alzheimer's diagnosis via support vector machine (SVM) algorithms. Results show improved accuracy with the use of extracted dark data, highlighting its importance in predicting Alzheimer's disease. This research also explores the presence of dark data in various domains and proposes a dark data extraction model for the clinical domain using NLP.
Modified-vehicle detection and localization model for autonomous vehicle traffic system Juyal, Amit; Sharma, Sachin; Bhadula, Shuchi
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp1183-1200

Abstract

The modification of vehicles for financial gain is an evolving tendency observed in India. Recognizing and detecting of these modified illicit cars is an important but critical task in autonomous vehicles (AV). It is always possible for a cyclist or pedestrian to traverse obstacles or other fixed objects that appear in front of any moving vehicle. Vehicles that are autonomous or self-driving require a different system to quickly identify both stationary and moving objects. A deep learning model named you only look once version 5 (YOLOv5)-convolutional block attention module (CBAM) is proposed here for the Indian traffic system which is based on YOLOv5m. The proposed algorithm, YOLOv5-CBAM, has three major components. The first module, the backbone module is employed for feature extraction. The second module is to detect static as well as dynamic objects at the same time and the third CBAM module is adopted in the backbone and neck part, which mainly focuses on the more prominent features. Two cross stage partial (CSP) modules were used after every convolutional layer resulting in an additional head to the proposed model. Four head modules equipped with anchor boxes performed the final detection. For the present dataset, the proposed model showed 98.2% mean average precision (mAP), 98.4% precision, and 94.8% recall as compared to the original YOLOv5m.
A novel CNN-ANN fusion approach for improved facial emotion detection Sawant, Viraj; Shaikh, Husna; Palkar, Bhakti; Kazi, Sanam; Jasani, Wasim; Rampurawala, Lamiya; Naser Shaikh, Mohammed
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp959-967

Abstract

In recent years, the field of emotion recognition has witnessed an increased interest due to the rise of deep learning techniques. However, one of the persistent difficulties in this domain, which we have attempted to address, is the variability in image sizes utilized. In this study, we have reviewed the work by different researchers and summarized their key findings. In our research, we introduce a novel technique that integrates the strengths of 1D convolutional neural networks (CNNs) and artificial neural networks (ANNs) through a late fusion model, leveraging CNNs' shared weights and automatic feature learning for spatial and temporal data, alongside ANN's comprehensive feature consideration. Our research findings highlight the effectiveness of this approach, which achieves a remarkable accuracy of 92.42%, along with other evaluation metrics demonstrating notable results. Furthermore, we conduct a comprehensive analysis of the proposed method, comparing it with advanced methods in the field of facial emotion recognition. Through this comparative analysis, we demonstrate the superiority of our proposed approach, addressing challenges that have not yet been addressed till date, thus leading to progress in this field.
Proposed strategies for lightning performance improvement of 35 kV distribution lines in Vietnam Tung Tran, Anh; Son Tran, Thanh
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp689-699

Abstract

Lightning strikes frequently cause power outages on 35 kV distribution lines in Vietnam. These lines was normally protected with a sparse density of surge arrester and typically do not make use of shield wire. On the other hand, a single rod, that is frequently used as the grounding electrode, is not suitable for some region with high value of soil resistivity. Therefore, it is of particular of interest to investigate the solutions to protect the medium voltage lines from the back-flashover due to lightning strikes by analyzing the impact of the grounding impedance, the surge arrester density and the installation of the shield wire. The finite element method and the electromagnetic transient program EMTP-RV are combined in this work to propose techniques for increasing the critical flashover current of 35 kV lines in Hanoi city. The obtained results showed that the installation of shield wires combined with high density of surge arrester and reduced grounding impedance value can achive a very significant improvement of the overall lightning performance of the line.
Kimball data warehouse for the sales analysis process in a manufacturing business in Perú Vidal Carlos, Palomino; Obregon Patricia, Condori
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp1093-1101

Abstract

The main goal of this research is to demonstrate that the use of innovative technology like business intelligence (BI) in a specific type of business significantly impacts their sales processes, enhancing decision-making, promotional strategies, and consequently customer loyalty and sales growth. The case study is a manufacturing business located in Lima, Peru. The information requirements of this business were analyzed, and a data mart model was created using the Kimball methodology. This multidimensional model enabled the comparison of client sales trends to propose new promotions and marketing strategies. The data analysis used to evaluate the results included hypothesis testing, analysis of employee responses to questionnaires to measure the impact of technology use on sales processes, and data reviews to assess sales increases both before and after the implementation of this technology. In both cases, the approval of the BI technology by the employees was satisfactory, and the increase in sales quantity was significant.
Research trends in spatial modeling of PM2.5 concentration using machine learning: a bibliometric review Wahyuni, Retno Tri; Hanafi, Dirman; Tomari, M. Razali; Sihabudin Sahid, Dadang Syarif
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp1317-1327

Abstract

Spatial modeling is commonly used to map research variables, including particulate matter 2.5 (PM2.5) concentrations, in specific areas. The article that surveys publications on the application of machine learning in spatial modeling of PM2.5 using bibliometric methods has not been identified yet. This paper aims to analyze trends in applying machine learning in the spatial modeling of PM2.5 using bibliometric methods. The review was conducted on publications indexed in the Scopus database over the decade (2014–2023) comprising 335 articles. The analysis included co-authorship and co-occurrence using VOSviewer. From the two stages of analysis, it can be concluded that research on this topic has constantly increased over the past 10 years, with the highest productivity coming from researchers in China. This research topic is multidisciplinary, with most publications appearing in environmental science. The research also shows a very high collaboration rate of 0.98. A deeper examination of the keywords reveals the most commonly used machine learning techniques by researchers. The random forest method is the most frequently found in the analyzed documents, followed by deep learning, long short-term memory (LSTM), extreme gradient boosting (XGBoost), and ensemble model.
Advancing airway management for ventilation optimization in critical healthcare with cloud computing and deep learning Krishnamoorthi, Suresh Kumar; Karthi, Govindharaju; Radhika, Moorthy; Rathinam, Anantha Raman; Raju, Ayalapogu Ratna; Pinjarkar, Latika; Srinivasan, Chelliah
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp1053-1063

Abstract

Improving patient outcomes in critical care settings is significantly connected to effective ventilation control. This research introduces a new method for improving ventilation methods in critical healthcare utilizing a long short-term memory (LSTM) network hosted in the cloud. Ventilators, pulse oximeters, and capnography are just a few examples of medical equipment that input data into the system, which then uploads the data to the cloud for analysis. The LSTM network can learn from data patterns and correlations, drawing on respiratory parameters' time dynamics, to provide real-time suggestions and predictions for ventilation settings. The system aims to improve clinical results and reduce the risk of ventilator-induced lung damage by tailoring ventilation techniques according to each patient's requirements and by forecasting potential issues. Due to remote monitoring technology, medical professionals can quickly analyze their patient's conditions and act accordingly. The system allows for continuous improvement using iterative learning of more data and feedback. With the ability to optimize breathing and enhance patient care in critical healthcare situations, a hopeful development in airway management is needed.
Systematic review for attack tactics, privacy, and safety models in big data systems Chaymae, Majdoubi; Youssef, Gahi; Saida, El Mendili
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp1234-1250

Abstract

This systematic review explores cyberattack tactics, privacy concerns, and safety measures within big data systems, focusing on the critical challenges of maintaining data security in today's complex digital environments. The review begins by categorizing various cyberattacks, laying the groundwork for understanding the threats to big data. It identifies key vulnerabilities that compromise privacy and safety, and examines the ethical implications of these issues. The role of artificial intelligence in enhancing security defenses is highlighted as a crucial aspect of mitigating these threats. Additionally, a comparative assessment of regulatory frameworks such as GDPR, NIST, and ISO 27001 is provided, emphasizing the importance of legal and compliance considerations in data protection. The review concludes by proposing a structured approach to cyberattack detection and processing, advocating for strategies that address both technical vulnerabilities and regulatory requirements, followed by a critical discussion on the usability of previous methods for mobile security, highlighting adaptability and performance, discussing explainability and Gen AI adoption. This work offers valuable insights for researchers, practitioners, and policymakers, contributing to the ongoing discourse on cybersecurity in the big data era.
Hybrid resource optimization strategy in heterogeneous wireless networks Gadde, Nagaraja; Shivaswamy, Rashmi; Halasinanagenahalli Siddamal, Ramesh Babu; Gowrishankar, Gowrishankar; Thimma Raju, Govindaih; Suryakumar Prabhu Vijay, Subramani
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp829-838

Abstract

The future generation of heterogeneous wireless networks (HWNs) will combine various radio access technologies for connecting various mobile subscribers (MS) based on the quality of service (QoS) and wireless network parameters, connecting MS to the best possible wireless network (WN) has been a trending research topic in HWNs. Existing resource optimization methods are designed to meet the QoS of network criteria and user preferences are neglected. Very limited work is done for resource optimization considering user preferences. However, these models are designed considering multi-mode terminals (MMTs) running a single service at a time under a low-density network; as a result, cannot be adopted to run multiple services simultaneously and; thus, fail to meet current users’ service dynamics requirement. Further, fails to bring good tradeoffs between reducing interference and improving performance. In addressing the research problem this work introduced a hybrid resource optimization strategy (HROS) to reduce interference by establishing channel availability and enhancing resource utilization through game theory. The HROS proves the existence of nash equilibrium (NE) improves throughput by 16.32% and reduces collision by 26.16% over the existing resource optimization-based network selection (RONS) scheme.
Adversarially robust federated deep learning models for intrusion detection in IoT Ennaji, El Mahfoud; El Hajla, Salah; Maleh, Yassine; Mounir, Soufyane
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp937-947

Abstract

Ensuring the robustness, security, and privacy of machine learning is a pivotal objective, crucial for unlocking the complete potential of the internet of things (IoT). Deep neural networks have proven to be vulnerable to adversarial perturbations imperceptible to humans. These perturbations can give rise to adversarial attacks, leading to erroneous predictions by deep neural networks, particularly in intrusion detection within the IoT environment. This paper introduces a federated adversarial learning framework designed to protect both data privacy and deep neural network models. This framework consists of federated learning for data privacy and adversarial training on IoT devices to enhance model robustness. The experiments show that adversarial training at the Fog node devices significantly improves the robustness of a federated learning model against adversarial attacks when compared to normal training. Furthermore, the proposed adversarial deep federated learning model is validated using the Edge-IIoTset dataset, achieving an accuracy rate of 91.23% in the detection of attacks.

Filter by Year

2025 2025


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue