cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 65 Documents
Search results for , issue "Vol 38, No 2: May 2025" : 65 Documents clear
Emerging approaches of artificial intelligence tools for distance learning: a review Faouzi, Ghita; Amrous, Naila; El Faddouli, Nour-Eddine; Khabouze, Mostafa
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 2: May 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i2.pp1219-1230

Abstract

Learning management system (LMS) is the best way to deliver educational content in the context of higher education, by settings students worldwide with high-quality educational material. This paper principally seeks to examine the use of e-learning platforms in the last years from 2019 to 2023, which has coincided with the pandemic period, by elucidating the benefits and limitations of e-learning platforms, analyzing the real-world artificial intelligence (AI) algorithms used and their operating context. A comprehensive literature search was conducted on different electronic databases to identify relevant studies related to e-learning and AI tools used during this period by applying inclusion, exclusion criteria and preferred reporting items for systematic reviews and meta-analysis (PRISMA) process. Based on this review the tools were necessary social media and free communication platforms that offer the flexibility and build autonomy to students. On the other hand, many challenges are arisen due to the lack of experience in the term of using those tools or due to technical problems, for this reason, the use of AI tools to enhance learning experience still one of the approved solutions.
An embedded system for the classification of sleep disorders using ECG signals Rajani Kumari, Lavu Venkata; Daravath, Babishamili; Sai, Yarlagadda Padma
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 2: May 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i2.pp767-773

Abstract

Sleep apnea (SA) is a well-known sleep disorder. It predominantly appears due to lack of oxygen in humans. Identifying SA at an early stage can help early diagnosis. The primary motto of our research is to identify SA using electrocardiogram (ECG) signals. Here, three classes are considered for classification. One is normal (N), and the other two are SA classes obstructive sleep apnea (OA) and central sleep apnea (CA). ECG signals are accumulated for MIT-BIH polysomnographic dataset. The ECG data divided into ECG segments and labelled using annotation file. The proposed deep long short-term memory (LSTM) model is then trained using ECG segments and further tested. The model is then finetuned and optimized to obtain the best accuracy. An accuracy of 98.51% is obtained. In addition, performance measures like precision, sensitivity, specificity, F-score are also evaluated. The model is then deployed on NVIDIA’s Jetson nano board to build a prototype. Our model is effective, promising and outperformed existing state of art techniques.
Deep learning-based cryptanalysis in recovering the secret key and plaintext on lightweight cryptography Fatma, Yulia; Remli, Muhammad Akmal; Mohamad, Mohd Saberi; Al Amien, Januar
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 2: May 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i2.pp1115-1123

Abstract

The development of machine learning (ML) technologies provide a new development direction for cryptanalysis. Several ML research in the field of cryptanalysis was carried out to identify the cryptographic algorithm used, find out the secret key, and even recover the secret message The first objective of this study is to see how much influence optimization and activation function have on the multi-layer perceptron (MLP) model in performing cryptanalysis. The second research objective, which is to compare the performance of cryptanalysis in recovering keys and the plaintext. Several experiments have been carried out, the observed parameters found that the use of the rectified linear unit (ReLU) activation function and the ADAM optimizer improves the performance of deep learning (DL)-based cryptanalysis as evidenced by a significantly smaller error rate. DL-based cryptanalysis works more effectively in recovering keys than recovering plaintext. DL-based cryptanalysis managed to recover the keys with an average loss of 0.007, an average of 49 epochs, and an average time of 0.178 minutes.
End-user software engineering approach: improve spreadsheets capabilities using Python-based user-defined functions Elserwy, Tamer Bahgat; Aly, Tarek; El-Demerdash, Basma E.
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 2: May 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i2.pp1024-1032

Abstract

End-user computing enables non-developers to handle data and applications, boosting collaboration and productivity. Spreadsheets are a key example of end-user programming environments that are extensively utilized in business for data analysis. However, the functionalities of Excel have limitations compared to specialized programming languages. This study aims to address this shortcoming by proposing a prototype that integrates Python's features into Excel via standalone desktop Python-based user-defined functions (UDFs). This method mitigates potential latency concerns linked to cloud-based solutions. This study employs Excel-DNA (dynamic network access) and IronPython; Excel-DNA facilitates the creation of custom Python functions that integrate smoothly with Excel's calculation engine, while IronPython allows these Python UDFs to run directly within Excel. Core components include C# and visual studio tools office (VSTO) add-ins, which enable communication between Python and Excel. This approach grants users the chance to execute Python UDFs for various tasks such as mathematical computations and predictions — all within the familiar Excel environment. The prototype showcases seamless integration, enabling users to invoke Python-based UDFs just like built in Excel functions. This study enhances the capabilities of spreadsheets by harnessing Python's strengths within Excel. Future work may focus on expanding the Python UDF library and examining user experiences with this innovative approach to data analysis.
Enhanced vegetation encroachment detection along power transmission corridors using random forest algorithm Somasundaram, Deepa; Sivaraj, Nivetha; Shalinirajan, Shalinirajan; Karuppiah, Santhi; Rajendran, Sudha
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 2: May 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i2.pp1376-1382

Abstract

Vegetation encroachment along power transmission corridors poses significant risks to infrastructure safety and reliability, necessitating effective monitoring and management strategies. This study introduces an innovative methodology for detecting vegetation encroachment using a combination of manual and automatic processes integrated with the random forest algorithm. The issue of vegetation encroachment is critical as it can lead to power interruptions and safety hazards if not addressed promptly. The objective of this research is to develop a scalable and cost-effective solution for vegetation management in power infrastructure maintenance. The methodology involves manual patch extraction and labeling to ensure the accuracy of the training dataset, combined with automatic feature extraction techniques to capture relevant information from satellite imagery. Leveraging the random forest algorithm, the model constructs an ensemble of decision trees based on the extracted features, achieving robust classification accuracy. Findings from this study demonstrate that the proposed approach enables consistent and timely identification of vegetation encroachment in new satellite imagery. Stored model parameters facilitate efficient testing, enhancing the system's ability to provide proactive interventions. This scalable solution significantly reduces reliance on manual labor and offers a cost-effective method for continuous monitoring, ultimately contributing to the resilience and safety of power transmission infrastructure.

Filter by Year

2025 2025


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue