cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Hybrid ensemble learning framework for epileptic seizure detection using electroencephalograph signals Chetana Rachappa; Mahantesh Kapanaiah; Vidhyashree Nagaraju
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1502-1509

Abstract

An automated method for accurate prediction of seizures is critical to enhance the quality of epileptic patients While numerous existing studies develop models and methods to identify an efficient feature selection and classification of electroencephalograph (EEG) data, recent studies emphasize on the development of ensemble learning methods to efficiently classify EEG signals in effective detection of epileptic seizures. Since EEG signals are non-stationary, traditional machine learning approaches may not suffice in effective identification of epileptic seizures. The paper proposes a hybrid ensemble learning framework that systematically combines pre-processing methods with ensemble machine learning algorithms. Specifically, principal component analysis (PCA) or t-distributed stochastic neighbor embedding (t-SNE) combined along k-means clustering followed by ensemble learning such as extreme gradient boosting algorithms (XGBoost) or random forest is considered. Selection of ensemble learning methods is justified by comparing the mean average precision score with well known methodologies in epileptic seizure detection domain when applied to real data set. The proposed hybrid framework is also compared with other simple supervised machine learning algorithms with training set of varying size. Results suggested that the proposed approach achieves significant improvement in accuracy compared with other algorithms and suggests stability in classification accuracy even with small sized data.
High stability in color chromaticity of warm white emitting diode with dual-hue SrSi2O2N2:Eu2+,Yb2+ phosphor My Hanh Nguyen Thi; Phan Xuan Le; Nguyen Le Thai
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i3.pp1258-1263

Abstract

In this study, we analyzed and developed a phosphor with a nitridiosilicate based and emitting color changing from green to orange to apply to our white-light-emitting diodes (WLEDs). Eu2+ and Yb2+ trap sites of two-doped SrSi2O2N2:Eu2+,Yb2+ (SrYb) nitridosilicate emit a wide emission in the region between green and orange. Through calculating the decompose time of the green-emission power donor, we could determine the converted energy between the active ions. Furthermore, we also analyzed the impact of co-doping with varied active ion ratios on the photoluminescence (PL) characteristics. As the concentration of Yb2+ increases, the red emission dominates the green. This was because the obtained phoshor's emission depended on the activator ion components. To generate white light, a combination of the acquired phosphor and the InGaN blue LED chip with a 450 nm wavelength was used. With only two steps, we could detect the hue balance management. Firstly, by modifying the Eu2+ and Yb2+ concentration, we can conduct a green-to-orange proportion optimization. Following that, the commission onillumination (CIE) coordinates were transformed to [0.4071; 0.3789] from the original position, which was [0.2805; 0.2014] by enhancing the phosphor powder amount. An environment which has a CRI of around 89 is the optimum condition for conducting white light.
Hybrid agile development phases: the practice in software projects as performed by software engineering team Norzariyah Yahya; Siti Sarah Maidin
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 3: March 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i3.pp1738-1749

Abstract

The combination of scrum and waterfall is one of the software engineering teams that preferred hybrid agile models. The purpose of combining the two models is to leverage the advantages of each also to tailor the hybrid agile model to the needs of the project. However, to what extent are the phases, stages, and features of scrum and waterfall implemented in a software project remains unclear. Additionally, which phase will employ scrum, and when will waterfall be deemed optimal is also the arising question. This research adopted a qualitative study, and interviews are used as a data collection instrument. The interview is conducted based on an interview protocol, and thematic analysis is utilized to extract the themes from the interviews. This study investigates how the scrum and waterfall models are utilized in a software project, and three themes were identified in answering the research question. The findings indicate five development phases in a hybrid agile project and that waterfall is the preferable model in planning, while development is on scrum, and project testing and deployment could be either waterfall or scrum.
An efficient ontology model with query execution for accurate document content extraction Poluru Eswaraiah; Hussain Syed
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 2: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i2.pp981-989

Abstract

The technique of extracting important documents from massive data collections is known as information retrieval (IR). The dataset provider coupled with the increasing demand for high-quality retrieval results, has resulted in traditional information retrieval approaches being increasingly insufficient to meet the challenge of providing high-quality search results. Research has concentrated on information retrieval and interactive query formation through ontologies in order to overcome these challenges, with a specific emphasis on enhancing the functionality between information and search queries in order to bring the outcome sets closer to the research requirements of users. In the context of document retrieval technologies, it is a process that assists researchers in extracting documents from data collections. It is discussed in this research how to use ontology-based information retrieval approaches and techniques, taking into account the issues of ontology modelling, processing, and the transformation of ontological knowledge into database search queries. In this research work, an efficient optimized ontology model with query execution for content extraction from documents (OOM-QE-CE) is proposed. The existing ontology-to-database transformation and mapping methodologies are also thoroughly examined in terms of data and semantic loss, structural mapping and domain knowledge applicability.
Cost-effective and user-friendly vehicle tracking system using GPS and GSM technology based on IoT Nazmul Islam Akanda; Md. Alomgir Hossain; Md. Mazharul Islam Fahad; Md. Nur Rahman; Khairunnaher Khairunnaher
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1826-1833

Abstract

Security is very apart important for vehicles to prevent the injury as vehicle theft is very common phenomenon now a days. We can ensure the security of our vehicles via monitoring our vehicles 24/7. There are many possible ways to track a vehicle. A few groups do not concern about the users need. Our research is about the tracking vehicle according to user’s demand. We are concerning on low budget, better geographic coordinate and easy user access. The system needs global positioning system (GPS) and global system for mobile telecommunications (GSM) technology. User can access the system by short message service (SMS) on a mobile phone. GSM module communicate with the user and GPS module communicate with satellite to get latitude and longitude coordinate. Location of vehicle's on earth is determined using Google Maps.
Maximization of the power delivered from permanent magnet synchronous generator wind energy conversion system to the grid based on using moth flame optimization Shimaa Aly Hussien; Mahmoud Adel Deab; Fadwa Alrowais
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i3.pp1347-1357

Abstract

In recent years, optimization techniques have been developed to improve accuracy and reduce execution time. The moth flame optimization technique (MFO) adapts to moth behavior. This design is based on the moth's transverse orientation. Over long distances, they maintain a fixed angle with respect to the moon at night. They spiral around the lights, however. Moths are trapped in a deadly spiral as the light approaches; eventually, they all converge on it. Furthermore, they are created by artificial light and fly similarly. To maximize the power delivered to the grid, moth flame optimization (MFO) is used to optimize the controller parameters of the wind energy conversion system (WECS). A permanent magnet synchronous generator (PMSG) implements a grid-connected WECS. a grid side converter (GSC) and a generator machine side converter (MSC) are used. A simulation package was used to model the proposed model. PSIM software was used to simulate power circuits and converters. Simulations were done in MATLAB. As a result, the obtained controller coefficients minimize both overshoot and steady-state error. Particle swarm optimization (PSO) and harmony search optimization (HSO) results were compared. MFO is a reliable method.
Fully synthesizable multi-gate dynamic voltage comparator for leakage reduction and low power application Udara Yedukondalu; Vinod Arunachalam; Vasudha Vijayasri Bolisetty; Ravikumar Guru Samy
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i2.pp716-723

Abstract

The paper presents the implementation of a standard cell multigate fully synthesizable rail-to-rail dynamic voltage comparator. The dynamic voltage comparator works on deep sub-threshold supply voltage VDD =0.3 V with common mode inputs. The common-mode input range is VDD/2 with minimum input offset voltage ranging between 8mV to 28mV. Thus the circuit is simulated at 180nm Complementary Metal-Oxide Semiconductor (CMOS) process. Hence the dynamic voltage comparator has measured and tabulated by corresponding output voltage, power dissipation. But the performance of CMOS device is not good when compared with Fin Field-Effect Transistor (FinFET) device. The leakage current is more in CMOS devices while in FinFET device due to the control of multi-Gates on the channel, the leakage current is reduced. This will improve the power consumption in the FinFET device when compared to CMOS devices. The comparator results shows that CMOS device is inferior when compared with FinFET device comparator. For the implementation of the comparator Spice model were used in this work. The software used in the project is synopsis Hspice.
Single parity check node adapted to polar codes with dynamic frozen bit equivalent to binary linear block codes Driss Khebbou; Idriss Chana; Hussain Ben-Azza
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 2: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i2.pp816-824

Abstract

In the context of decoding binary linear block codes by polar code decoding techniques, we propose in this paper a new optimization of the serial nature of decoding the polar codes equivalent to binary linear block codes. In addition to the special nodes proposed by the simplified successive-cancellation list technique, we propose a new special node allowing to estimate in parallel the bits of its sub-code. The simulation is done in an additive white gaussian noise channel (AWGN) channel for several linear block codes, namely bose–chaudhuri–hocquenghem codes (BCH) codes, quadratic-residue (QR) codes, and linear block codes recently designed in the literature. The performance of the proposed technique offers the same performance in terms of frame error rate (FER) as the ordered statistics decoding (OSD) algorithm, which achieves that of maximum likelihood decoder (MLD), but with high memory requirements and computational complexity.
A robust 4.0 dual-classifier for determining the internal condition of watermelons using YOLOv4-tiny and sensory Kehinde A. Adeniji; Moses O. Onibonoje; Agbaje Minevesho; Temitayo Ejidokun; Olusegun O. Omitola
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1834-1844

Abstract

This study presents a robust internet of things (IoT) based approach to solve the challenge of sorting fruit (watermelons) either as a raw material or final product in fruit manufacturing lines. A real-time objection detection technique called you only look once (YOLO) was used in the features detection, extraction, and matching of watermelons. The hardware framework of the system was developed on an Arduino microprocessor which integrates the sensors and camera into the system. The accuracy of the developed classifier is about 88% with a loss of 0.3, with images captured automatically saved on a designated folder which makes the detection and classification of upcoming products in the production line more accurate. The classified watermelons were further categorized into two possible states of ripe or rotten condition with an accuracy rate of 85%-90% with the tested data. These data were sent to the cloud via the Wi-Fi module and can be accessed using the Things Speak website (which is an application programming interface (API) for data retrieval and storage via the internet). An easy download option was incorporated into the system to obtain data from predictions and the cloud to a designated comma separated values (CSV) file locally for documentation and reference.
Entropy-based distributed denial of service attack detection in software-defined networking Mohammed Ibrahim Kareem; Mahdi Nsaif Jasim
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i3.pp1542-1549

Abstract

Software defined networking (SDN) is a new network architecture that allows for centralized network control. The separation of the data plane from the control plane, which establishes a programmable network environment, is the key breakthrough underpinning SDN. The controller facilitates the deployment of services that specify control policies and delivers these rules to the data plane using a common protocol such as OpenFlow at the control plane. Despite the many advantages of this design, SDN security remains a worry because the aforementioned chapter expands the network's attack surface. In fact, denial of service (DoS) assaults pose a significant threat to SDN settings in a variety of ways, owing to flaws in the data and control layers. This work shows how distributed denial of service (DDoS) attack detection is based on the entropy variation of the destination IP address. The study takes advantage of the OpenFlow protocol's (OFP) flexibility and an OpenFlow controller (POX) to apply the proposed method. An entropy computation to determine the distributed features of DDoS traffic is developed and it is capable of detecting a user datagram protocol (UDP) flood attack after 0.445 seconds this type of attack occurred.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue