cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 65 Documents
Search results for , issue "Vol 38, No 3: June 2025" : 65 Documents clear
Blue light therapy device for wound healing Kamal, Minahil; Kamal, Aleena; Abid, Azka; Ahmed, Sarah; Hussain, Syed Muddusir; Ur Rahman, Jawwad Sami; Selvaperumal, Sathish Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp1527-1539

Abstract

Cuts, diabetic ulcers, and pressure sores are examples of chronic skin wounds that pose a serious healthcare danger because of their delayed healing rates. This problem emphasizes the necessity of creating noninvasive, economical, and successful wound treatment plans. Conventional treatments, such as skin grafting, negative pressure wound therapy, and hyperbaric oxygen therapy, have demonstrated effectiveness; nevertheless, they are frequently costly, intrusive, and have possible side effects. On the other hand, blue light treatment has become a viable substitute due to its antimicrobial characteristics and capacity to encourage cellular restoration. However, there is a crucial gap in the development of a portable, noninvasive, and cost-effective photobiomodulation device for wound treatment and monitoring, despite its demonstrated potential in wound healing. This work aims to address this gap by creating a novel blue light therapy tool specifically suited for wound healing. The gadget allows for controlled blue light exposure and real-time temperature monitoring to minimize overheating. It has a portable arm housing with integrated blue light strips, a temperature sensor, and an integrated fan. An STM 32 microcontroller powers the system’s pulse width modulation (PWM) technology, which modifies light intensity and therapy duration in response to conditions unique to each wound. This novel strategy seeks to improve the effectiveness of wound healing, lower the likelihood of adverse effects, and offer patients and healthcare providers a workable alternative that is noninvasive, inexpensive, and easy to use.
Weierstrass scale space representation and composite dilated U-net based convolution for early glaucoma diagnosis Zahir Hussain, Abdul Basith; Mohamed Sulaiman, Sulthan Ibrahim
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp1661-1672

Abstract

Glaucoma is one of the common causes of blindness in the current world. Glaucoma is a blinding optic neuropathy characterized by the degeneration of retinal ganglion cells (RGCs). Accurate diagnosis and monitoring of glaucoma are challenging task through eye examinations and additional tests. To achieve accurate diagnosis of glaucoma with higher sensitivity and specificity, novel method called Weierstrass scale space representation and composite dilated U-net based convolution (WSSR-CDC) is introduced. At first, the Weierstrass transform scale space representation is employed to enhance image structures at various scales with higher accuracy of region of interest (ROI) detection using Euler’s identity. Next, CDC model is utilized with several layers. In input layer, preprocessed input images are taken as input. Fragment derivative are formulated for every preprocessed input. Log cosh dice loss function and optic cup to disc ratio are computed for segmented glaucoma detected results. With this, the accurate diagnosis of glaucoma is made with minimal error. The WSSR-CDC method was evaluated using the glaucoma fundus imaging dataset with several factors. The results show that the WSSR-CDC method outperforms conventional techniques, improving accuracy by 24% and sensitivity by 18%. It demonstrates promising results in fast, accurate, diagnosis of glaucoma.
Analysis of real-time multi-surveillance detection model using YOLO v5 Pramanik, Tapas; Burade, Prakash Gajananrao; Sharma, Sanjeev
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp1634-1641

Abstract

Implementation of this advanced nighttime monitoring system provides one of the basic requirements toward the creation of an intelligent urban environment. The nighttime effective monitoring is highly enabled due to seamless integration of multi-directional cameras working as advanced sensors enhancing security measures in smart cities. This paper addresses the mentioned issues directly by proposing the you only look once version 5 (YOLOv5) model dedicated to object detection. It is experimentally confirmed, based on the dataset results, that the mean average precision of YOLOv5 multi-scale (YOLOv5MS) reaches an impressive 88.7%. The results unmistakably confirm domination of the model and its good ability to work over a network of more than 50 security cameras under the high restrictions of our operation. The use of state-of-art nighttime surveillance systems is an important constituent element in the construction of smart urban environment. The smooth interaction between multiple-angle cameras, which work as perceptive sensors, substantially upgrades the functionality of nighttime surveillance and strengthens security practices for smart cities. The current work presented the YOLOv5 model specifically designed for the task of target detection, targeting these issues head-on. The empirical data obtained from the dataset point to an outstanding mean average precision (mAP) of 88.7% for YOLOv5MS. Such results clearly prove the superiority of the model and demonstrate its excellent performance in a network of more than 50 security cameras under our harsh operational conditions.
Enhancing business analytics predictions with hybrid metaheuristic models: a multi-attribute optimization approach Syah, Rahmad B. Y.; Elveny, Marischa; Nasution, Mahyuddin K. M.
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp1830-1839

Abstract

This approach aims to optimize business analytical predictions through multiattribute optimization using a hybrid metaheuristic model based on the modified particle swarm optimization (MPSO) and gravitational search optimization (GSO) algorithms. This research uses a variety of data, such as revenue, expenses, and customer behavior, to improve predictive modeling and achieve superior results. MPSO, an interparticle collaborative mechanism, efficiently explores the search space, whereas GSO models’ gravitational interactions between particles to solve optimization problems. The integration of these two algorithms can improve the performance of business analytical predictions by increasing model precision and accuracy, as well as speeding up the optimization process. Model validation test results, precision 95.60%, recall 96.35%, accuracy 96.69%, and F1 score 96.11%. This research contributes to the development of more sophisticated and effective business analysis techniques to face the challenges of an increasingly complex business world.
Chaotic crow search enhanced CRNN: a next-gen approach for IoT botnet attack detection Antony, Veena; Thangarasu, Nainan
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp1745-1754

Abstract

Internet of things (IoT) botnet attack detection is crucial for reducing and identifying hostile threats in networks. To create efficient threat detection systems, deep learning (DL) and machine learning (ML) are currently being used in many sectors, mostly in information security. The botnet attack categorization problem is difficult as data dimensionality increases. By combining convolutional and recurrent neural layers, our work effectively addressed the vanishing and expanding gradient difficulties, improving the ability to capture spatial and temporal connections. The problem of weight decaying and class imbalance affects the accuracy rate of the existing DL models. In convolutional neural network (CNN), fully connected layer optimizes the hyperparameters by utilizing its comprehension of the chaotic crow search method. The chaotic mapping maintains equilibrium between the global and local search spaces. The crow's strategy for hiding food is the main source of inspiration for optimizing the learning rate, weight, and bias components involved in the prediction process. When compared to other existing algorithms, the UNSW-NB15 dataset's results for IoT botnet attack detection in the presence of a high degree of class imbalance demonstrated the effectiveness of the proposed convolutional recurrent neural network (CRNN) boosted with chaotic crow searching algorithm, which produced the highest detection rate with the lowest false alarm rate.
Integrating gamification to increase users’ engagement to adhere COVID-19 interventions using extended TAM Afiq Kalana, Mohd Hazim; Junaini, Syahrul Nizam; Jali, Suriati Khartini; Rosmansyah, Yusep; Putri, Atina; Kamal, Ahmad Alif
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp1936-1945

Abstract

Gamification has shown potential for enhancing motivation and engagement, yet its effectiveness in promoting adherence to COVID-19 preventive measures remains underexplored. With decreasing public attentiveness, this study examines the role of gamification in encouraging compliance with health protocols through an extended technology acceptance model (TAM) and structural equation modeling (SEM). A gamified mobile application was developed, incorporating features such as points, badges, and progress tracking, and was designed to appeal to younger audiences. Data collected from 150 secondary school students in Sarawak, Malaysia, indicated that perceived usefulness, perceived ease of use, and attitude toward the app significantly influenced engagement with COVID-19 preventive measures. Among these factors, perceived usefulness demonstrated the strongest effect on engagement (β = 0.424, t = 4.812, p < 0.001). The findings highlight the potential of gamification to enhance compliance with COVID-19 protocols.
A simple machine learning technique for sensor network wireless denial-of-service detection Hameed, Shaik Abdul; Indurthi, Ravindra Kumar; Arumalla, Gopya Sri; Bachu, Venkatesh; Malluvalasa, Lakshmi S. N.; Peteti, Venkateswara Rao
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp1690-1697

Abstract

Wireless sensor networks (WSNs) are integral to numerous applications but are vulnerable to denial-of-service (DoS) attacks, which can severely compromise their functionality. This research proposes a lightweight machine learning approach to detect DoS attacks in WSNs. Specifically, we investigate the efficacy of decision tree (DT) algorithms with the Gini feature selection method, alongside random forest (RF), extreme gradient boosting (XGBoost), and k-nearest neighbor (KNN) classifiers. Data collected from normal and DoS attack scenarios are preprocessed and used to train these models. Experimental results showcase the effectiveness of the proposed approach, with the DT algorithm exhibiting high accuracy exceeding 90%, surpassing other classifiers in computational efficiency and interpretability. This study contributes to enhancing the security and reliability of WSNs, offering insights into potential future optimizations and algorithmic explorations for robust DoS attack detection.
A novel deep learning based spatial delay feature aware encoder decoder module for enhanced CSI feedback in massive MIMO Jayashankar, Parinitha; Rangaswamy, Chigalakkappa; Shobha, Byrappa N.
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp1862-1869

Abstract

The algorithm presented in this study addresses the challenge of reconstructing downlink channel state information (CSI) in massive multiple input multiple output (MIMO) systems with a focus on enhancing efficiency and accuracy. It begins by acquiring both downlink and uplink CSI data alongside other critical parameters such as the number of iterations and convolutional filter specifications. The process initiates with the vectorization of downlink CSI data followed by compression through a fully connected layer, effectively reducing dimensionality to manage computational complexity. The iterative reconstruction phase then unfolds, where each iteration updates an intermediary variable using a refined formula that incorporates the compressed CSI representation and correction factors. This iterative refinement aims to progressively enhance the accuracy of the reconstructed CSI. A pivotal aspect of the algorithm involves an optimized Encoder-Decoder framework designed to handle spatial-delay features inherent in MIMO systems. This framework employs thresholding operations to eliminate insignificant features, ensuring that the reconstructed CSI accurately reflects the crucial aspects of the channel. Simultaneously, an information module utilizes uplink CSI data to adjust weights during reconstruction, thereby further refining the accuracy of the downlink CSI estimation.
Design of face recognition based effective automated smart attendance system Bangare, Jyoti L.; Chikmurge, Diptee; Kaliyaperumal, Karthikeyan; Meenakshi, Meenakshi; Bangare, Sunil L.; Kasat, Kishori; Rane, Kantilal Pitambar; Veluri, Ravi Kishore; Omarov, Batyrkhan; Jawarneh, Malik; Raghuvanshi, Abhishek
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp2020-2030

Abstract

The issue of automatic attendance marking has been successfully resolved in recent years through the utilization of standard biometric approaches. Although this strategy is automated and forward-thinking, its use is hindered by time constraints. Acquiring a thumb impression requires the individual to form a line, which might lead to inconvenience. The innovative visual system utilizes a computer and camera to detect and record students’ attendance based on their facial features. This article presents a face recognition based automatic attendance system. This system includes- image acquisition, image enhancement using histogram equalization, image segmentation by fuzzy C means clustering technique, building classification model using K-nearest neighbour (KNN), support vector machine (SVM) and AdaBoost technique. For experimental work, 500 images of students of a class are selected at random. Accuracy of KNN algorithm in proposed framework is 98.75%. It is higher than the accuracy of SVM (96.25%) and AdaBoost (86.50%). KNN is also performing better on parameters likesensitivity, specificity, precision and F_measure.
Predictive modeling of electric vehicle loads through driving behavior analysis Mishra, Debani Prasad; Pradhan, Rudranarayan; Singh, Saksham; Singh, Anurag; Kumar, Ayush; Salkuti, Surender Reddy
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp1431-1439

Abstract

Electric vehicles (EVs) can potentially be integrated into microgrids via vehicle-to-grid (V2G) technology, which enhances the energy system's stability and durability. This paper provides an in-depth examination and evaluation of V2G integration in microgrid systems. It analyses the present state of research as well as possible uses, challenges, and directions for V2G technology in the future. This article addresses the technological, economic, and regulatory aspects of implementing V2G and provides case studies and pilot projects to shed light on potential benefits and barriers associated with its adoption. The research highlights how V2G contributes to more efficient integration of renewable energy sources, grid stabilization, and cost savings for EV owners. It also addresses the latest developments in technology and proposed laws aimed at encouraging growing applications of V2G.

Filter by Year

2025 2025


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue