Articles
9,174 Documents
Hybrid ensemble learning framework for epileptic seizure detection using electroencephalograph signals
Chetana Rachappa;
Mahantesh Kapanaiah;
Vidhyashree Nagaraju
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i3.pp1502-1509
An automated method for accurate prediction of seizures is critical to enhance the quality of epileptic patients While numerous existing studies develop models and methods to identify an efficient feature selection and classification of electroencephalograph (EEG) data, recent studies emphasize on the development of ensemble learning methods to efficiently classify EEG signals in effective detection of epileptic seizures. Since EEG signals are non-stationary, traditional machine learning approaches may not suffice in effective identification of epileptic seizures. The paper proposes a hybrid ensemble learning framework that systematically combines pre-processing methods with ensemble machine learning algorithms. Specifically, principal component analysis (PCA) or t-distributed stochastic neighbor embedding (t-SNE) combined along k-means clustering followed by ensemble learning such as extreme gradient boosting algorithms (XGBoost) or random forest is considered. Selection of ensemble learning methods is justified by comparing the mean average precision score with well known methodologies in epileptic seizure detection domain when applied to real data set. The proposed hybrid framework is also compared with other simple supervised machine learning algorithms with training set of varying size. Results suggested that the proposed approach achieves significant improvement in accuracy compared with other algorithms and suggests stability in classification accuracy even with small sized data.
High stability in color chromaticity of warm white emitting diode with dual-hue SrSi2O2N2:Eu2+,Yb2+ phosphor
My Hanh Nguyen Thi;
Phan Xuan Le;
Nguyen Le Thai
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v27.i3.pp1258-1263
In this study, we analyzed and developed a phosphor with a nitridiosilicate based and emitting color changing from green to orange to apply to our white-light-emitting diodes (WLEDs). Eu2+ and Yb2+ trap sites of two-doped SrSi2O2N2:Eu2+,Yb2+ (SrYb) nitridosilicate emit a wide emission in the region between green and orange. Through calculating the decompose time of the green-emission power donor, we could determine the converted energy between the active ions. Furthermore, we also analyzed the impact of co-doping with varied active ion ratios on the photoluminescence (PL) characteristics. As the concentration of Yb2+ increases, the red emission dominates the green. This was because the obtained phoshor's emission depended on the activator ion components. To generate white light, a combination of the acquired phosphor and the InGaN blue LED chip with a 450 nm wavelength was used. With only two steps, we could detect the hue balance management. Firstly, by modifying the Eu2+ and Yb2+ concentration, we can conduct a green-to-orange proportion optimization. Following that, the commission onillumination (CIE) coordinates were transformed to [0.4071; 0.3789] from the original position, which was [0.2805; 0.2014] by enhancing the phosphor powder amount. An environment which has a CRI of around 89 is the optimum condition for conducting white light.
Hybrid agile development phases: the practice in software projects as performed by software engineering team
Norzariyah Yahya;
Siti Sarah Maidin
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 3: March 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v29.i3.pp1738-1749
The combination of scrum and waterfall is one of the software engineering teams that preferred hybrid agile models. The purpose of combining the two models is to leverage the advantages of each also to tailor the hybrid agile model to the needs of the project. However, to what extent are the phases, stages, and features of scrum and waterfall implemented in a software project remains unclear. Additionally, which phase will employ scrum, and when will waterfall be deemed optimal is also the arising question. This research adopted a qualitative study, and interviews are used as a data collection instrument. The interview is conducted based on an interview protocol, and thematic analysis is utilized to extract the themes from the interviews. This study investigates how the scrum and waterfall models are utilized in a software project, and three themes were identified in answering the research question. The findings indicate five development phases in a hybrid agile project and that waterfall is the preferable model in planning, while development is on scrum, and project testing and deployment could be either waterfall or scrum.
An efficient ontology model with query execution for accurate document content extraction
Poluru Eswaraiah;
Hussain Syed
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 2: February 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v29.i2.pp981-989
The technique of extracting important documents from massive data collections is known as information retrieval (IR). The dataset provider coupled with the increasing demand for high-quality retrieval results, has resulted in traditional information retrieval approaches being increasingly insufficient to meet the challenge of providing high-quality search results. Research has concentrated on information retrieval and interactive query formation through ontologies in order to overcome these challenges, with a specific emphasis on enhancing the functionality between information and search queries in order to bring the outcome sets closer to the research requirements of users. In the context of document retrieval technologies, it is a process that assists researchers in extracting documents from data collections. It is discussed in this research how to use ontology-based information retrieval approaches and techniques, taking into account the issues of ontology modelling, processing, and the transformation of ontological knowledge into database search queries. In this research work, an efficient optimized ontology model with query execution for content extraction from documents (OOM-QE-CE) is proposed. The existing ontology-to-database transformation and mapping methodologies are also thoroughly examined in terms of data and semantic loss, structural mapping and domain knowledge applicability.
Cost-effective and user-friendly vehicle tracking system using GPS and GSM technology based on IoT
Nazmul Islam Akanda;
Md. Alomgir Hossain;
Md. Mazharul Islam Fahad;
Md. Nur Rahman;
Khairunnaher Khairunnaher
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i3.pp1826-1833
Security is very apart important for vehicles to prevent the injury as vehicle theft is very common phenomenon now a days. We can ensure the security of our vehicles via monitoring our vehicles 24/7. There are many possible ways to track a vehicle. A few groups do not concern about the users need. Our research is about the tracking vehicle according to user’s demand. We are concerning on low budget, better geographic coordinate and easy user access. The system needs global positioning system (GPS) and global system for mobile telecommunications (GSM) technology. User can access the system by short message service (SMS) on a mobile phone. GSM module communicate with the user and GPS module communicate with satellite to get latitude and longitude coordinate. Location of vehicle's on earth is determined using Google Maps.
Maximization of the power delivered from permanent magnet synchronous generator wind energy conversion system to the grid based on using moth flame optimization
Shimaa Aly Hussien;
Mahmoud Adel Deab;
Fadwa Alrowais
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v27.i3.pp1347-1357
In recent years, optimization techniques have been developed to improve accuracy and reduce execution time. The moth flame optimization technique (MFO) adapts to moth behavior. This design is based on the moth's transverse orientation. Over long distances, they maintain a fixed angle with respect to the moon at night. They spiral around the lights, however. Moths are trapped in a deadly spiral as the light approaches; eventually, they all converge on it. Furthermore, they are created by artificial light and fly similarly. To maximize the power delivered to the grid, moth flame optimization (MFO) is used to optimize the controller parameters of the wind energy conversion system (WECS). A permanent magnet synchronous generator (PMSG) implements a grid-connected WECS. a grid side converter (GSC) and a generator machine side converter (MSC) are used. A simulation package was used to model the proposed model. PSIM software was used to simulate power circuits and converters. Simulations were done in MATLAB. As a result, the obtained controller coefficients minimize both overshoot and steady-state error. Particle swarm optimization (PSO) and harmony search optimization (HSO) results were compared. MFO is a reliable method.
Fully synthesizable multi-gate dynamic voltage comparator for leakage reduction and low power application
Udara Yedukondalu;
Vinod Arunachalam;
Vasudha Vijayasri Bolisetty;
Ravikumar Guru Samy
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i2.pp716-723
The paper presents the implementation of a standard cell multigate fully synthesizable rail-to-rail dynamic voltage comparator. The dynamic voltage comparator works on deep sub-threshold supply voltage VDD =0.3 V with common mode inputs. The common-mode input range is VDD/2 with minimum input offset voltage ranging between 8mV to 28mV. Thus the circuit is simulated at 180nm Complementary Metal-Oxide Semiconductor (CMOS) process. Hence the dynamic voltage comparator has measured and tabulated by corresponding output voltage, power dissipation. But the performance of CMOS device is not good when compared with Fin Field-Effect Transistor (FinFET) device. The leakage current is more in CMOS devices while in FinFET device due to the control of multi-Gates on the channel, the leakage current is reduced. This will improve the power consumption in the FinFET device when compared to CMOS devices. The comparator results shows that CMOS device is inferior when compared with FinFET device comparator. For the implementation of the comparator Spice model were used in this work. The software used in the project is synopsis Hspice.
Single parity check node adapted to polar codes with dynamic frozen bit equivalent to binary linear block codes
Driss Khebbou;
Idriss Chana;
Hussain Ben-Azza
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 2: February 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v29.i2.pp816-824
In the context of decoding binary linear block codes by polar code decoding techniques, we propose in this paper a new optimization of the serial nature of decoding the polar codes equivalent to binary linear block codes. In addition to the special nodes proposed by the simplified successive-cancellation list technique, we propose a new special node allowing to estimate in parallel the bits of its sub-code. The simulation is done in an additive white gaussian noise channel (AWGN) channel for several linear block codes, namely bose–chaudhuri–hocquenghem codes (BCH) codes, quadratic-residue (QR) codes, and linear block codes recently designed in the literature. The performance of the proposed technique offers the same performance in terms of frame error rate (FER) as the ordered statistics decoding (OSD) algorithm, which achieves that of maximum likelihood decoder (MLD), but with high memory requirements and computational complexity.
A robust 4.0 dual-classifier for determining the internal condition of watermelons using YOLOv4-tiny and sensory
Kehinde A. Adeniji;
Moses O. Onibonoje;
Agbaje Minevesho;
Temitayo Ejidokun;
Olusegun O. Omitola
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i3.pp1834-1844
This study presents a robust internet of things (IoT) based approach to solve the challenge of sorting fruit (watermelons) either as a raw material or final product in fruit manufacturing lines. A real-time objection detection technique called you only look once (YOLO) was used in the features detection, extraction, and matching of watermelons. The hardware framework of the system was developed on an Arduino microprocessor which integrates the sensors and camera into the system. The accuracy of the developed classifier is about 88% with a loss of 0.3, with images captured automatically saved on a designated folder which makes the detection and classification of upcoming products in the production line more accurate. The classified watermelons were further categorized into two possible states of ripe or rotten condition with an accuracy rate of 85%-90% with the tested data. These data were sent to the cloud via the Wi-Fi module and can be accessed using the Things Speak website (which is an application programming interface (API) for data retrieval and storage via the internet). An easy download option was incorporated into the system to obtain data from predictions and the cloud to a designated comma separated values (CSV) file locally for documentation and reference.
Entropy-based distributed denial of service attack detection in software-defined networking
Mohammed Ibrahim Kareem;
Mahdi Nsaif Jasim
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v27.i3.pp1542-1549
Software defined networking (SDN) is a new network architecture that allows for centralized network control. The separation of the data plane from the control plane, which establishes a programmable network environment, is the key breakthrough underpinning SDN. The controller facilitates the deployment of services that specify control policies and delivers these rules to the data plane using a common protocol such as OpenFlow at the control plane. Despite the many advantages of this design, SDN security remains a worry because the aforementioned chapter expands the network's attack surface. In fact, denial of service (DoS) assaults pose a significant threat to SDN settings in a variety of ways, owing to flaws in the data and control layers. This work shows how distributed denial of service (DDoS) attack detection is based on the entropy variation of the destination IP address. The study takes advantage of the OpenFlow protocol's (OFP) flexibility and an OpenFlow controller (POX) to apply the proposed method. An entropy computation to determine the distributed features of DDoS traffic is developed and it is capable of detecting a user datagram protocol (UDP) flood attack after 0.445 seconds this type of attack occurred.