cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 57 Documents
Search results for , issue "Vol 39, No 3: September 2025" : 57 Documents clear
Prediction of Parkinson's disease using feature selection and ensemble learning techniques T. D., Sharan; Joshi, Sujata
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 3: September 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i3.pp1736-1744

Abstract

Parkinson's disease (PD) is a progressive neurodegenerative disorder that significantly impacts quality of life and healthcare systems. Early detection is crucial for timely interventions that can mitigate disease progression and improve patient outcomes. This study leverages advanced machine learning (ML) techniques to detect PD using speech features as non-invasive biomarkers. A dataset containing 754 features derived from sustained vowel phonations of 252 individuals (188 PD patients, 64 healthy controls) was analyzed. The dataset, originally collected by Istanbul University and publicly hosted via the UCI ML repository, was accessed through Kaggle for preprocessing and analysis. To identify the most predictive features, we employed recursive feature elimination (RFE), random forest importance, lasso regression, and the boruta algorithm—ensuring robust feature selection while reducing dimensionality. The XGBoost model, optimised using synthetic minority oversampling technique (SMOTE) for class balancing, achieved an accuracy of 96.69%, a recall of 96%, and an F1-score of 98%. Model robustness was validated through 5-fold cross-validation, yielding an average accuracy of 89.54%. These findings establish a scalable, costeffective, and non-invasive framework for early PD detection, demonstrating the potential of speech analysis and ML in neurodegenerative disease management.
IoT-based real-time monitoring of river water quality: a case study of the Selangor River Ahmad Jafri, Nur Aqilah; Markom, Arni Munira; Yusof, Yusrina; Burham, Norhafizah; Markom, Marni Azira
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 3: September 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i3.pp1541-1552

Abstract

Monitoring river water quality is crucial for preserving freshwater ecosystems, ensuring public health, and supporting resource management. Traditional methods, while accurate, lack the scalability and real-time capabilities needed for proactive intervention. This study introduces an IoT based water quality monitoring system for the Selangor River, integrating sensors for pH, temperature, turbidity, and total dissolved solids (TDS) with a NodeMCU ESP32 microcontroller. To complement the IoT system, a handheld test pen was used to measure salinity and electrical conductivity (EC), offering additional insights into water quality. Field tests at four stations along the river revealed significant spatial variations. Station 1, near the river mouth, showed high salinity, EC, and TDS, indicating saltwater intrusion, with relatively low turbidity. Stations 2 and 3 recorded the highest turbidity levels, suggesting sedimentation and upstream activities, with moderate salinity and EC. Station 4, upstream, demonstrated stable freshwater characteristics, with low salinity, EC, and turbidity levels. The IoT system reliably monitored real-time parameters, and its measurements were validated against those from the handheld test pen. Minor discrepancies in TDS and temperature readings highlighted the importance of calibration.
Microservices caching for container-based IoT system in the edge and cloud Qasha, Rawaa; Sulyaman, Haleema
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 3: September 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i3.pp1652-1660

Abstract

Microservices enable agile development by dividing internet of things (IoT) programs into autonomous components, ensuring fault tolerance and parallel operation for enhanced productivity. Their adaptability across diverse service types and applications improves IoT system performance. On the other hand, the container is the preferred solution for microservices-based enterprises. To improve the effectiveness of the deployment system presented in our paper 1, we developed a new caching technique to significantly optimize the performance of the deployment system and automate the sharing and re-using of ready-to-run microservices that have been packaged as Docker images. The new caching techniques are seamlessly integrated with our deployment system to optimize the microservices caching of the IoT application by utilizing Docker-based container virtualization and Redis for consistent data sharing. In addition, DevOps and versioning tools such as GOCD and GitHub are integrated into our system to enhance the automatic deployment of the microservices resulting in self-contained, portable, and repeatable IoT microservices. The effectiveness of the proposed techniques is evaluated via various experiments implemented in various working environments where the results show reduced deployment time and the effort required to re-execute the microservices, in addition to the reduction of burden and error that occur when adopting a manual deployment.
Design and optimization strategy of HAWT using a local pitch angle adaptation Meghlaoui, Issam; Layadi, Toufik Madani
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 3: September 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i3.pp1467-1479

Abstract

In this paper, a smart design of a horizontal wind turbine (HAWT) has been developed. The developed design allows improving kinetic energy recuperation with high efficiency. The considered design of the wind turbine is characterized by a specific mechanical structure of blades. Each blade contains separated elements with an adaptable local pitch angle. To develop the smart wind turbine, a new algorithm for controlling the blade elements has been implemented. It allows estimating the distribution of the twist angle of each blade element. The achieved twist angle corresponds to the extracted optimal power provides by the wind turbine. The obtained results show a significant improvement relative to the wind turbine power coefficient under operating conditions. In fact, for some rotating velocity, the rate of this coefficient is increased by 21%. Moreover, notable kinetic energy recuperation is observed. Furthermore, smart orientation of elements proved optimal energy recuperation for a large scale of tip speed ratio and wind speed. In addition, the proposed structure of the wind turbine is more beneficial to minimize the axial thrust. Furthermore, the axial thrust of the wind turbine has been decreased by 21% for some operating velocity and specific conditions. As perspectives for the future works many ideas are suggested.
A hybrid approach to behavioral spam review detection on e-commerce platforms using apriori and CNN Wayal, Ganesh; Bhandari, Vijay
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 3: September 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i3.pp1837-1845

Abstract

Spam reviews significantly undermine the credibility of online review systems on e-commerce websites. This paper presents a hybrid methodology that combines the Apriori algorithm and convolutional neural networks (CNN) to efficiently identify and mitigate spam reviews. By examining user behavior, including activity patterns, reviewer reputation, temporal dynamics, and sentiment consistency, we propose a comprehensive model for understanding user interactions and engagement. To extract important information and build precise spam detection models, we use data mining and machine learning approaches. Furthermore, contextual and domain-specific analyses are conducted to improve detection strategies. The study highlights the significance of hybrid techniques in preserving the integrity of e-commerce platforms through successful industry implementations and presents evaluation metrics, problems, and future research objectives.
CNN-GRU based cyber-attack classification and detection with the CICIDS-2017 dataset using optimization algorithm for honey badger Mahesh, Katikam; Rao, Kunjam Nageswara
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 3: September 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i3.pp1765-1775

Abstract

The sheer volume of data exchanged has grown through information and communications technology (ICT) swiftly growing importance since the attackers benefit from illegal access to network data and introduce possible dangers for data theft or alteration. It is considered a significant barrier to monitor the network traffic for cyber-attack detection and classification with alarm ring to inform to network administrator. With KDD-CUP99, conventional machine learning methods like deep neural network (DNN), a kind of artificial neural network (ANN), cannot detect and classify novel attacks types and lacks clarity regarding accuracy. The CICIDS 2017 dataset, which is improved in this study, serves as training data for the model and useful framework that combines a hybrid convolutional neural network (CNN) with the gated recurrent unit (GRU) technique. The primary aim of this effort is to classify different security attacks and classify cyberthreats with honey badger optimization algorithm (HBOA). To strengthen the performance criteria for various assault types, such as F1-score, recall, precision, and others, the HBOA is utilized to modify the model parameters high-level features ought to be extracted from the network data using the hybrid model assessed and verified by simulation studies. The detection and classification output from the CNN-GRU model, which detects different security threats with greater accuracy of 94%.
Optimizing energy efficiency and improved security in wireless sensor networks using energy-centric MJSO and MACO for clustering and routing Kalaskar, Srinivas; Bhyri, Channappa
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 3: September 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i3.pp1964-1975

Abstract

Wireless sensor networks (WSNs) play a pivotal role in various applications, but their energy-constrained nature poses significant challenges to their sustainable operation. In this paper, we propose a novel approach to enhance energy efficiency in WSNs by leveraging energy-centric multi-objective jaya search optimization (MJSO) and multi-objective ant colony optimization (MACO) for clustering and routing. Our method aims to address the energy consumption issues by optimizing clustering and routing strategies simultaneously. The energy-centric MJSO algorithm is employed to intelligently organize sensor nodes into clusters, considering energy consumption, network coverage, and connectivity. The multi-objective MACO algorithm optimizes routing paths by balancing energy consumption and network lifetime objectives. Through integration and simulations, the approach enhances energy efficiency in WSNs for various applications like environmental monitoring and smart cities, advancing energy-efficient clustering and routing. By integrating energy-centric MJSO and MACO into clustering and routing protocols, WSNs can achieve significant improvements in energy efficiency and security while maintaining reliable communication and data delivery.
Utilizing metaheuristic optimization with transfer learning for efficient colorectal carcinoma detection in biomedical imaging Babu Ramisetti, Lova Naga; Reddy, Desidi Narsimha; Pathipati, Harikrishna; Srividya, Yenumula; Pesaru, Swetha
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 3: September 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i3.pp1693-1703

Abstract

Colorectal cancer (CRC) is the third most popular cancer across the world. Its morbidity and death are reduced by early screening and detection. The screening outcomes are enhanced by computer-aided detection (CAD) and artificial intelligence (AI) in screening models. Contemporary imaging technologies such as near-infrared (NIR) fluorescence and optical coherence tomography (OCT) are implemented to identify the early-phase CRC of the gastrointestinal tract (GI tract) via the identification of morphological and microvasculature changes. Most recently, deep learning (DL)-based approaches have been used directly on raw data. Nevertheless, they are hampered by biomedical data deficiency. These studies can enhance metaheuristic optimization using the transfer learning to detect colorectal cancer successfully (MHOTL-ECRCD). The MHOTL-ECRCD method concentrates on biomedical imaging of CRC categorization and detection. MHOTL-ECRCD minimizes noise through the process of adaptive bilateral filtering (ABF). In MHOTL-ECRCD methodology, Inception-ResNet-V2 is adopted to learn the inherent and complicated image preprocessing features thus used during feature extraction. To classify CRC and detect it, the gated recurrent unit (GRU) approach is applied. Lastly, parameters of the GRU model are optimized with a human evolutionary algorithm. Good classification results of MHOTL-ECRCD are demonstrated by a number of benchmark dataset trials. MHOTL-ECRCD technology superseded the recent techniques as large volumes of comparison were made.
Modelling and simulation of maximum power point tracking on partial shaded PV based-on a physical phenomenon-inspired metaheuristic algorithm Megantoro, Prisma; Dona Saya, Joy Sefine; Syahbani, Muhammad Akbar; Fadhilah, Marwan; Vigneshwaran, Pandi
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 3: September 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i3.pp1923-1937

Abstract

Maximum power point tracking (MPPT) is a technique to optimize the photovoltaic (PV) current generation, so it can improve the efficiency of solar energy harvesting. MPPT works by searching the voltage which generates the maximum power, called the maximum power point (MPP). MPP value changes by the fluctuance of ambient temperature and solar insolation level depicted by the I-V curve. Searching the MPP will be more complex if the partial shading is happened. The effect of partial shading will rise to more than one local MPPs. In this research, an optimization algorithm is modeled and simulated the MPPT technique in partial shading. The optimization uses the new metaheuristic algorithm which inspired from a physical phenomenon, called Archimedes optimization algorithm (AOA). The AOA uses mathematical modeling which has convergence capabilities, balanced exploration, and exploitation and is suitable for solving complex optimization technique, like MPPT. The research used varies partial insolation percentage. The implementation of MPPT-AOA compared to other metaheuristic algorithms to analysis its performance in the aspect of PV system parameters and tracking process parameters. The simulation result shows that the AOA can enrich the MPPT technique and improve the solar energy harvesting which is superior to other algorithms.
Smartphone-based fingerprint authentication using siamese neural networks with ridge flow attention mechanism Imane, Benchergui Malika; Abdelkader, Ghazli; Benaoumeur, Senouci M.
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 3: September 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i3.pp1622-1632

Abstract

Authenticating finger photo images captured using a smartphone camera provides a good alternative solution in place of the traditional method-based sensors. This paper introduces a novel approach to enhancing fingerprint authentication by leveraging images captured via a mobile camera. The method employs a siamese neural network (SNN) combined with a ridge flow attention mechanism and convolutional neural networks (CNN). Our approach begins with collecting a dataset consisting of finger images from two individuals then we apply multiple preprocessing techniques to extract fingerprint images, followed by generating augmented data to improve model robustness, scaling, and normalizing them to form images suitable for model training. Next, we generate positive and negative pairs for training a SNN. We used the SNN with CNN for feature extraction, combined with an attention mechanism that focuses on the ridge flow pattern of fingerprints to improve feature relevance which significantly contributed to the performance enhancement. As for the testing performance, our model has an accuracy of 90%, precision of 89%, recall of 83%, F1 score of 86%, area under the curve (AUC) 95 %, and 13% of equal error rate (EER) when using smartphone-captured images for fingerprint recognition.

Filter by Year

2025 2025


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue