cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Multi-feature based automatic facial expression recognition using deep convolutional neural network Dixit, Anjali; Kasbe, Tanmay
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 3: March 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i3.pp1406-1419

Abstract

Deep multi-task learning is one of the most challenging research topics widely explored in the field of recognition of facial expression. Most deep learning models rely on the class labels details by eliminating the local information of the sample data which deteriorates the performance of the recognition system. This paper proposes multi-feature-based deep convolutional neural networks (D-CNN) that identify the facial expression of the human face. To enhance the accuracy of recognition systems, the multi-feature learning model is employed in this study. The input images are preprocessed and enhanced via three filtering methods i.e., Gaussian, Wiener, and adaptive mean filtering. The preprocessed image is then segmented using a face detection algorithm. The detected face is further applied with local binary pattern (LBP) that extracts the facial points of each facial expression. These are then fed into the D-CNN that effectively recognizes the facial expression using the features of facial points. The proposed D-CNN is implemented, and the results are compared to the existing support vector machine (SVM). The analysis of deep features helps to extract the local information from the data without incurring a higher computational effort.
An internet of things-based automatic brain tumor detection system Md. Lizur Rahman; Ahmed Wasif Reza; Shaiful Islam Shabuj
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 1: January 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i1.pp214-222

Abstract

Due to the advances in information and communication technologies, the usage of the internet of things (IoT) has reached an evolutionary process in the development of the modern health care environment. In the recent human health care analysis system, the amount of brain tumor patients has increased severely and placed in the 10th position of the leading cause of death. Previous state-of-the-art techniques based on magnetic resonance imaging (MRI) faces challenges in brain tumor detection as it requires accurate image segmentation. A wide variety of algorithms were developed earlier to classify MRI images which are computationally very complex and expensive. In this paper, a cost-effective stochastic method for the automatic detection of brain tumors using the IoT is proposed. The proposed system uses the physical activities of the brain to detect brain tumors. To track the daily brain activities, a portable wrist band named Mi Band 2, temperature, and blood pressure monitoring sensors embedded with Arduino-Uno are used and the system achieved an accuracy of 99.3%. Experimental results show the effectiveness of the designed method in detecting brain tumors automatically and produce better accuracy in comparison to previous approaches.
Secure dynamic source routing protocol for defending black hole attacks in mobile Ad hoc networks M. Mohanapriya; Nitish Joshi; Mohit Soni
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp582-590

Abstract

Wireless Ad Hoc Network is a dynamically organized network on emergency situations, in which a group of wireless devices send data among themselves without requiring any base stations for forwarding data. Here the nodes itself perform the functions of routing. This important characteristic of mobile ad hoc networks allows the hassle free set up of the network for communications in different crisis such as battlefield and natural disaster zones. Multi hop communication in MANET is achieved by the cooperation of nodes in forwarding data packets. This feature of MANET is largely exploited to launch a security attack called black hole attack. A light weight solution called SEC-DSR is proposed to defend the network from black hole attack and enables communication among nodes even in the presence of attackers. In this scheme, by analyzing only the control packets used for routing in the network, the compromised nodes launching the attack are identified. From the collective judgment by the participating nodes in the routing path, a secure route free of black hole nodes is selected for communication by the host. Simulation results validate and ensure the effectiveness of the proposed solution tested on an ad hoc network with compromised black hole nodes.
Protecting Android based applications from malware affected through SMS messages J. Sasi Bhanu; J. K. R. Sastry; T. Chandrasekhara Reddy
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1580-1589

Abstract

Users use Android-based applications for communicating through emailing, text messaging, and transmission of audio and video objects. The attackers manipulate the email, text, videos, or audio so that users' receipt of the messages causes malware through their handheld devices. A runtime routine is invoked, which causes damage to the local resources of the mobile phone. The manipulation of the messages is done using different signatures, making it difficult to recognize the same using a single approach. Multiple approaches are sometimes required to detect different signature-based incoming messages. Choosing a method that suits the signature of the incoming message is the key. Malware can also enter at the time of installing third-party apps, clicking on the links provided in the messages, installing and invoking the malware in the background. Many issues are involved in dealing with malware detecting, prevention, and curing. A comprehensive architecture is required to deal with every aspect of dealing malware. In this paper, a comprehensive architecture is presented that considers malware's issue, especially concerning malware affected through short message service (SMS) messages operated under the Android operating system. The disection of the SMS messages have been implemented and 99% accuracy has been achieved.
On the evaluation of the IEEE 802.11ac WLAN performance with QoS deployment Ziyad Khalaf Farej; Omer Mohammed Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 3: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i3.pp1618-1627

Abstract

The increase in the number of users on wireless local area networks (WLAN) and the development of large size applications have increased the demand for high-speed data rate and low latency. The IEEE 802.11ac was developed to provide very high throughput WLANs. Many enhancements are added to the medium access control (MAC) and physical (PHY) layers to increase data rate and improve network performance, these features enable the IEEE 802.11ac standard to provide quality of service (QoS) for multimedia applications. This paper concentrates on the impact of QoS on the system performance in term of delay and throughput. Four scenarios are proposed to investigate the network performance with different (from 1 up to 8) spatial stream (SS). The objective modular network testbed in C++ (OMNet++ modeler v5.5.1) is used to simulate and model these scenarios. For 8Ă—8 SS, the results of simulation show the best throughput (maximum) and delay (minimum) values of (622, 484, 399.3, 382.96 Mbps) and (0.0211, 0.0589, 0.1037, 0.1202 sec) for 5, 15, 30 and 45 node number scenarios respectively. Although the number of nodes increases, the system performance decreases, however when QoS is deployed the performance is enhanced and its best improvement is obtained at the highest (45) node number scenario with values of 94.4% and 56.1% for throughput and delay respectively.
e-SimNet: a visual similar product recommender system for E-commerce Ssvr Kumar Addagarla; Anthoniraj Amalanathan
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i1.pp563-570

Abstract

Visual similarity recommendations have an immense role in E-commerce portals. Fetching the appropriate similar products and suggesting to the buyers based on the product image's visual features is complex. Here in our research, we presented an efficient E-commerce similar product network model (e-SimNet) for visually similar recommendations. To achieve our objective, we have performed image feature extraction and generating embeddings using deep learning techniques and built an Index tree using the approximate nearest neighbor oh yeah (ANNOY) algorithm. Further, we have fetches top-N the near similar items using distance measure. We have benchmarked our model in terms of accuracy, error rate, and results show that better than other state-of-the-art approaches with 96.22% of accuracy.
Design and simulation of an adaptive beam smart antenna using MATLAB Aaron Don M. Africa; Rica Rizabel M. Tagabuhin; Jan Jayson S. D. Tirados
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 3: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i3.pp1584-1593

Abstract

Signals transmitted over a long range of distance may pass through several obstacles and scatter, taking multiple paths to reach the receiver. Beamforming antennas are controlled electronically to adjust the radiation pattern following the first received signal. This allows the antenna to maximize the received signal and consequently, suppress the interfering signals received. A smart antenna should be able to diminish noise, increase the signal to noise ratio, and have better system competence. The adaptive beam makes use of the spacing of the several antennas and the phase of the signal of each antenna array to control the shape and direction of the signal beam. This paper focuses on the use of smart antennas using an adaptive beam method as a better system for the transmission of signals. A simulation between the existing Omnidirectional antenna system and the smart antenna system will be made and compared. The paper will discuss the corresponding advantages that a smart antenna system has compared to the Omnidirectional antenna system.
Automatic construction of generic stop words list for hausa text Bichi, Abdulkadir Abubakar; Samsudin, Ruhaidah; Hassan, Rohayanti
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 3: March 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i3.pp1501-1507

Abstract

Stop-words are words having the highest frequencies in a document without any significant information. They are characterized by having common relations within a cluster. They are the noise of the text that are evenly distributed over a document. Removal of stop words improve the performance and accuracy of information retrieval algorithms and machine learning at large. It saves the storage space by reducing the vector space dimension, and helps in effective documents indexing. This research generated a list of Hausa stop words automatically using aggregated method by combining frequency and statistics methods. The experiments are conducted using a primarily collected Hausa corpus consisting of 841 Hausa news articles of size 646862 words and finally a list of distinct 81 Hausa stop words is generated.
Design an intelligent hybrid position/force control for above knee prosthesis based on adaptive neuro-fuzzy inference system Mithaq N. Raheema; Dhirgaam A. Kadhim; Jabbar S. Hussein
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i2.pp675-685

Abstract

This paper reviews the position/force control approach for governs an efficient knee joint in an active lower limb prosthesis, and the inter facing current control algorithm with human gate parameter is inserted. Two techniques are used to collect gait cycle data of leg: first, the foot ground force is obtained by the force platform device based on its position (x, y), then data of knee joint angles is recorded by using a video-camera device.The collected information is sent and used in the proposed intelligent controller. This intelligent control system used an adaptive neuro-fuzzy inference system (ANFIS) circuit in addition to the proportional integral derivative (PID) controller. This hybrid ANFIS-PID control system simulates and provides the ground force values. The experimental results show anexcellent response and lower root mean square error (RMSE) compared with each of PID and ANFIS controller that implemented for a similar purpose. In summary, the results showed acceptably stable performance of the proposedposition/force controller based on hybrid ANFIS-PID system. It can be concluded that the finest performance of the controlled force, as quantified by the RMSE criteria, is perceived by the proposed hybrid scheme depending on the controller intelligent decision circuit.
A new application for fast prediction and protection of electrical drive wheel speed using machine learning methodology Medjdoub Khessam; Abdelkader Lousdad; Abdeldjebar Hazzab; Miloud Rezkallah; Ambrish Chandra
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i3.pp1290-1298

Abstract

This paper introduces a non-linear implementation of the speed control technique of permanent magnetic synchronous motors (PMSM) using electronic differential (ED) command. Artificial neural network (ANN) coupled with particles swarm optimization (ANN-PSO) are implemented to control wheel speed and steering angle. The main purpose of the PMSM system and its application is the command of electric vehicles (EV). In the controller design, three-phase currents and rotor speed shall be measurable and eligible for feedback. Our propulsion platform consists of two PMSM in the back. The study with implemented ANN-PSO is performed after collecting the data from the ED to manage the control of speed EV, Left and right of steering angle and steering ahead. Based on this strategy, a new application can be provided in the GPS application to give the information as input (curved path angle) to ANN-PSO. Next, the application of ANN-PSO can estimate the parameters of ED to avoid the slip, as well as improves better performance and dynamic stability of electric vehicle drive systems.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue