cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 36 Documents
Search results for , issue "Vol 41, No 2: February 2026" : 36 Documents clear
Botnet detection: a system for identifying DGA-based botnets using LightGBM Mohamad, Mumtazimah; Abd Hamid, Nazirah; A. Ghaleb, Sanaa A.; Mohd Satar, Siti Dhalila; Safei, Suhailan; Fazamin Wan Hamzah, Wan Mohd Amir; En En, Lim
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp833-844

Abstract

Botnets present a major challenge to detecting anomalies in domain generation algorithms (DGAs). Botmasters use DGAs to create numerous domain names to communicate with command-and-control servers, complicating the detection process. Traditional blacklisting methods struggle to effectively identify anomalous DGA domain names amid the vast number of randomly generated domains, leading to a greater risk of detection being evaded. The proliferation of DGA-based botnets has created an urgent need for robust detection methods. Various techniques and attributes have been utilised to categorise different DGA families, yet the dynamic nature of DGA domain names renders the current blacklisting algorithms ineffective. Additionally, the dynamic characteristics of DGAs further complicate classification, emphasising the need for machine learning models to improve detection accuracy and enhance cyber defence. This study proposes a robust solution to address the challenges posed by DGA-based botnets by developing an innovative machine learning-based model for domain name classification. The model leverages the light gradient boosting algorithm (LightGBM) and integrates n-gram features to enhance the detection of malicious DGA domains. This approach offers superior accuracy, adaptability, and efficiency in identifying and classifying anomalous domain names, achieving 96% precision when detecting true DGA domains. This system represents a significant advancement in cybersecurity and anomaly detection.
Enhancing industrial cybersecurity via IoT device-trusted remote attestation framework with zero trust architecture in brewery operations Salman, Muhammad; Budiyanto, Alan
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp720-730

Abstract

The rapid expansion of industrial internet of things (IIoT) adoption in Industry 4.0 has improved automation and real-time control yet simultaneously increased security risks in operational technology (OT) environments, where device integrity and system reliability are critical. Existing attestation approaches such as SAFEHIVE, SEDA, CRA, and ERASMUS provide scalable verification capabilities but still lack continuous hardware-rooted validation and adaptive access control required for real-time industrial systems. To address this gap, this study proposes a hybrid cybersecurity framework that integrates IoT device-trusted remote attestation (ID-TRA) based on trusted platform module (TPM) with zero trust architecture (ZTA) to ensure continuous device trustworthiness in brewery operations. The framework was implemented on an industrial testbed with programmable logic controllers (PLCs), edge devices, and industrial switches, and it was evaluated through measurements of attestation latency, false positive rate, communication overhead, and TPM resource utilization. Experimental results show that the framework achieves an average attestation latency of 250 ms, a false positive rate below 2%, and a communication overhead of only 1.1%, while TPM resource usage remains within acceptable bounds (62% CPU and 48 MB RAM). These outcomes demonstrate that the proposed solution can reliably detect unauthorized firmware modifications, prevent compromised devices from accessing critical network zones, and maintain compatibility with real-time control processes. Overall, the integration of ID-TRA and ZTA enhances device-level assurance and strengthens industrial cybersecurity resilience against firmware tampering, replay attacks, and unauthorized lateral movement.
A new hybrid model based on machine learning and fuzzy logic for QoS enhancing in IoT Lagnfdi, Oussama; Myyara, Marouane; Darif, Anouar
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp624-632

Abstract

The fast expansion of internet of things (IoT) devices presents a more complicated scenario for maintaining a stable quality of service (QoS), which would guarantee the network’s dependable operation. The emergence of increasingly complex applications that call for additional devices makes this even more crucial. Adaptive intelligence solutions that guarantee optimal network behavior are therefore required. This paper presents a hybrid optimized solution for a three-layer IoT network that models the application, network, and perception layers of an IoT network using machine learning and fuzzy logic (FL). This method guarantees optimal QoS prediction with improved network adaptability by using fuzzy membership parameters. When the number of devices increases from 100 to 1,500, FLGA maintains an average QoS of 95% to 87%, while FL maintains 84% and RANDOM maintains 79%. At the application level, genetic algorithm (GA) continues to outperform RANDOM by 15.57% and FL by 6.32%. The goal of this paper is to provide a solid network solution that could enhance the consistency of QoS performance in order to combat the increasingly complex scenario of an IoT network.
ETV: efficient text vision for text localization in natural scene images Suman, Suman; H. N., Champa
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp812-822

Abstract

In the current digital era, the extraction and comprehension of textual information from images have emerged as pivotal tasks. With the exponential growth of text documents, efficient processing and analysis have become imperative. However, text localization in images remains challenging due to complex backgrounds, uneven illumination, diverse text styles, and perspective distortions, rendering traditional optical character recognition (OCR) techniques inadequate. To address these challenges, this paper proposes an integrated method named efficient text vision (ETV). ETV combines the OCR capabilities of Tesseract with the efficient and accurate scene text detector (EAST) algorithm, supplemented by nonmaximum suppression (NMS). The Tesseract OCR component facilitates the extraction and identification of individual characters, while EAST excels in the efficient detection and localization of complete text sections. The incorporation of NMS enhances localization accuracy by eliminating redundant or overlapping bounding boxes.
Control of multi-level NPC inverters in PV/grid systems using ADRC and MADRC Dinar, Gherici; Tahour, Ahmed
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp456-469

Abstract

Grid-connected photovoltaic (PV) systems consist of solar panels that convert sunlight into electrical energy, interconnected directly with the utility grid. These systems comprise several key components: PV, multilevel, controllers, and grid interface equipment. In this context, fivelevel inverters are increasingly favoured over three-level inverters due to their ability to reduce total harmonic distortion (THD), improve efficiency, and ensure better power quality in grid-connected applications. This research presents a three-level enhanced control scheme aimed at optimizing the performance of a grid-connected photovoltaic system with a five-level inverter. A fractional-order proportional-integral (FOPI) controller is utilized for maximum power point tracking (MPPT) to ensure precise tracking under variable irradiance conditions. At the grid-interface stage, a modified active disturbance rejection controller (MADRC) is developed for grid-interface, featuring an inner loop for DC-link voltage regulation based on Lyapunov theory, leading to improved dynamic performance with lower THD of the grid current and enhanced efficiency. Simulation results highlight the effectiveness of the proposed system. Compared with the FOPI-ADRC, a three-level configuration (0.38% THD), the proposed FOPI-MADRC with a five-level inverter achieves superior performance, with only (0.22% THD). These results confirm the advantages of combining advanced control strategies with multilevel inverter technology in improving both power quality and system efficiency.
Robust palmprint biometric solution for secure mobile authentication Nguyen, Son; Luangsodsai, Arthorn; Bhattarakosol, Pattarasinee
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp680-689

Abstract

Smartphones increasingly rely on biometric authentication for access to financial and personal services, creating a need for palmprint recognition that is accurate, fast, and deployable on device. This paper proposes an end-to-end smartphone palmprint authentication framework that integrates guided mobile image capture, landmark-based region-of-interest (ROI) extraction, and compact embedding inference. A ResNet-18 teacher is first trained with self-supervised contrastive learning to reduce dependence on labeled biometric data, then distilled into a lightweight MobileNetV3 student for efficient mobile deployment. The learned embeddings support both on device verification and large-scale identification using an approximate nearest neighbor index (FAISS). Experiments on a public Kaggle palm dataset achieve 99.2% accuracy with a 0.15% equal error rate (EER). On an iPhone 13, the end-to-end pipeline runs in 87.0 ms with a 12.4 MB student model. For a 1 million-entry gallery, FAISS provides 32 ms query latency while maintaining 99.5% Recall@1. Limitations include evaluation under mostly controlled capture conditions and the absence of an explicit liveness or presentation attack detection (PAD) module; future work will address unconstrained testing and anti-spoofing integration.
Smart home automation using internet of things R., Roopa; B., Pallavi; Neelima, Lakshmi; J., Parikshith; Agarwal, Kashish
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp579-588

Abstract

This research paper delves into the development and implementation of an advanced home automation system utilizing internet of things (IoT) technology to bolster safety and comfort within residential environments. The proposed system architecture revolves around an ESP8266 microcontroller board interfaced with a diverse array of sensors, including motion detectors, temperature and humidity sensors, and air quality sensors specifically designed to detect gas leaks. Additionally, the system incorporates a servo motor for stove control and relays for fan activation. The described system adds novel safety-focused features, including servo-controlled stoves and fan-gas leak integration, making it applicable for critical home safety scenarios. However, it shares common weaknesses with existing systems, such as inadequate attention to security, energy efficiency, and scalability. By addressing these gaps, this system could set itself apart as a comprehensive IoT solution for home automation.
Engineering intelligence for sustainable and secure digital futures Sutikno, Tole
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp453-455

Abstract

This editorial introduces Volume 41, Number 2 (February 2026) of the Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), which presents a diverse collection of peer-reviewed articles reflecting recent advances in electrical engineering, electronics, and computer science. The issue highlights the convergence of power and energy systems, artificial intelligence, cybersecurity, the Internet of Things (IoT), and datadriven engineering methodologies in addressing contemporary technological and societal challenges, with key contributions focusing on renewable energy integration, intelligent control strategies, secure and trusted digital infrastructures, smart IoT-based systems, and AI-driven applications in healthcare, finance, industrial automation, and human-centered computing. Particular emphasis is placed on energy efficiency, system resilience, explainable and trustworthy artificial intelligence, and sustainable engineering practices. Collectively, the published works demonstrate how interdisciplinary research can bridge theory and real-world implementation while supporting the United Nations Sustainable Development Goals, including affordable and clean energy, good health and well-being, sustainable cities, responsible consumption, and strong digital institutions. By fostering innovation, cross-domain collaboration, and responsible technology development, this issue of IJEECS aims to advance secure, intelligent, and sustainable engineering solutions that respond to both current demands and future global challenges. This issue further reinforces the journal’s commitment to advancing engineering intelligence that is ethically grounded, environmentally responsible, and resilient by design.
Assessment of detection methods for back-end process defects in equipment and devices in semiconductor manufacturing Roslan, Ameer Farhan; Mat Ibrahim, Masrullizam; Zarifie Hashim, Nik Mohd; Mohd Noh, Mohd Syahrin Amri; Sutikno, Tole
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp494-503

Abstract

Defect detection plays a pivotal part in the manufacturing process of semiconductors. Defects can be rooted in the product on its own, as well as the tools used to process and make the product, particularly the equipment and machinery used. Defect detection is crucial in semiconductor manufacturing, where even minor flaws can compromise product performance. Defect detection in the backend process of semiconductor manufacturing, specifically in die attach and die bonding, is critical for ensuring product quality and reliability. Die attach involves securing semiconductor chips onto substrates, while die bonding involves connecting wires to the chip. Detecting defects during these processes is vital to prevent issues such as misalignment, inadequate bonding, or contamination, which can lead to malfunctioning chips or devices. Various techniques such as visual inspection, automated optical inspection (AOI), and X-ray imaging are utilized to identify defects like cracks, voids, or irregularities in bond formation. By employing rigorous defect detection measures, manufacturers can uphold stringent quality standards and produce reliable semiconductor devices for various applications.
Energy-efficient AI-enhanced secure routing for protecting IoT networks from advanced attacks R., Leelavathi; A., Vidya
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp%p

Abstract

This paper proposes artificial intelligence-enhanced secure routing (AIRS), a lightweight AI-enhanced secure routing protocol for internet of things (IoT) networks operating under advanced routing attacks. Unlike existing approaches that treat intrusion detection and routing separately, AIRS tightly integrates anomaly scoring into trust-aware routing decisions using a compact random forest model designed for constrained nodes. The anomaly detector is trained offline on simulated IoT traffic features and deployed for real-time inference during routing. Extensive Cooja simulations demonstrate that AIRS improves intrusion detection accuracy and packet delivery while reducing energy consumption compared to secure-RPL and trust-LEACH. The current validation is limited to simulation environments, and real-world testbed evaluation is left for future work.

Page 2 of 4 | Total Record : 36


Filter by Year

2026 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue