cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Imbalanced dataset classification using fuzzy ARTMAP and computational intelligence techniques Anita Kushwaha; Ravi Shanker Pandey
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp909-916

Abstract

Recently, fuzzy adaptive resonance theory mapping (ARTMAP) neural networks are applied to solving complex problems due to their plasticity-stability capability and resonance property. An imbalanced dataset occurs when there is the presence of one class containing a greater number of instances than other classes. It is skewed representation of data. Many standard algorithms have failed in mitigating imbalanced dataset problems. There are four paradigms used-data level, algorithm level, cost-sensitive, and ensemble method in solving imbalanced dataset problems. Here we put forward a method to solve the imbalanced dataset problem by a brain-neuron framework and an ensemble of a special type of artificial neural network (ANN) called fuzzy ARTMAP thereafter we applied a clustering algorithm known as fuzzy C-means clustering to handle missing value and also propose to make fuzzy ARTMAP cost-sensitive. Results indicate 100% accuracy in classification.
Query-based image tagging model using ensemble learning with enhanced artificial bee colony optimization Ravi Babu Devareddi; Atluri Srikrishna
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp870-881

Abstract

Digital images make up most multimedia data and are analysed in computer vision applications. Daily uploads of millions of pictures to Internet archives such as satellite image repositories complicate multimedia content and image graphs. As feature vectors, content based image retrieval (CBIR) and image classification models represent high-level image viewpoints. Observing photos recognizes objects and evaluates their significance for image enhancement. To access the visual information of big datasets, efficiently retrieve and query picture graphs. The artificial bee colony (ABC) algorithm is inspired by the foraging behaviour of honeybee swarms. ABC is susceptible to laziness in convergence and local optimums, just like other optimization methods. This study created an enhanced ABC (EABC) model to enhance precision. This study presents query-based image tagging model using ensemble learning with EABC (QbITM-ELEABC) for CBIR for appropriately tagging images based on the query image. We examine a number of convolutional neural network (CNNs) with varying topologies that can be trained on the dataset with varying degrees of similarity. As representations, each network extracts class probability vectors from images. The final image representation is created by combining the ensemble's class probability vectors with image.
Flexible and secure continues data transmission among multiple users in cloud environment Ezhilarasan Elumalai; Dinakaran Muruganandam
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp1192-1200

Abstract

Cloud computing is an internet based computing where the sharable information, software and resources are provided based on demand devices. Where, the rapid development and pervasive growth of unavoidable sending of message advances, there are expanding requests of adaptable cryptographic natives to protected group data transactions and computing platforms in cloud. Group key agreement (GKA) protocol enables a group to share a standard encryption key across an open network so that only members of the group may decode the ciphertexts encoded using the secret encryption key that has been released. However, a sender cannot deny any specific member from decryptions the ciphertexts in cloud. However, before sending a message to a group, a user must join the group and follow the GKA protocol to provide the intended members access to a secret key. To find a better solution for the above-mentioned issues, flexible and secure continues data transmission (FSCDT) algorithm is proposed to offer dynamic and secure data transfer broadcasting without full trust of key authority in unreliable cloud environment. It provides compete security proof, outlines the requirements of the aggregatability of the secret attribute based FSCDT building block. Based on experimental evaluations, FSCDT algorithm minimizes encryption time, decryption time and communication cost.
Distributed resource allocation model with presence of multiple jammer for underwater wireless sensor networks Sheetal Bagali; Ramakrishnan Sundaraguru
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp1002-1010

Abstract

Underwater-wireless sensor network (WSN) are prone to the jamming attacks; mainly in case of reactive jamming. Reactive jamming has emerged as one of the critical security threat for underwater-WSN; this occurs due to the reactive jammer capabilities of controlling and regulating jamming duration. Further reactive jammer possesses low detection probability and high vulnerability; moreover the existing model has been designed in consideration with terrestrial-WSN. Hence these models possesses limited capabilities of detecting the jamming and distinguish among uncorrupted and corrupted packets; also it fails to adapt with the dynamic environment. Furthermore co-operative mechanism of jamming model is presented for utilizing the resources in efficient way; however only few existing work has been carried out through the co-operative jamming detection; especially under presence of multiple jammer nodes. For overcoming research issues this paper presents distributed resource allocation (DRA) model adopting cross layer architecture under presence of multiple jammer. DRA algorithm is designed for allocating resource to jammer user in optimal manner. Experiment outcome shows the proposed DRA model achieves much better detection rate considering multi-jammer environment. Thus aid in achieving much better detection accuracy, packet drop, packet transmission and resource utilization performance.
A comprehensive survey on deep-learning based gait recognition for humans in the COVID-19 pandemic Md Shohel Sayeed; Ibrahim Bin Yusof; Mohd Fikri Azli bin Abdullah; Md Ahsanul Bari; Pa Pa Min
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp882-902

Abstract

Human gait recognition is a biometric technique that has been utilized for security purposes for the last decade. Gait recognition is an appealing biometric modality that aims to identify individuals based on the way they walk. The outbreak of the novel coronavirus (COVID-19), has spread across the world. The number of people infected with COVID-19 is rising rapidly throughout the world. Even though some vaccines for this pandemic have been developed to minimize the effects of COVID-19, deep learning-based gait recognition techniques have shown themselves to be an effective tool for identifying the individuals wearing face mask in COVID-19 pandemic. These techniques play an important part in reducing the rate of COVID-19 spreading throughout the world in the context of the COVID-19 pandemic. Deep learning methods are currently dominating the state-of-the-art in gait recognition and have fostered real-world applications. The main objective of this paper is to provide a comprehensive overview of recent advancements in gait recognition with deep learning, including datasets, test protocols, state-of-the-art solutions, challenges, and future research directions. The purpose of this discussion is to identify current challenges that need to be addressed as well as to suggest some directions for future research that could be explored.
Unmanned aerial vehicle: a review and future directions Mahmood A. Al-Shareeda; Murtaja Ali Saare; Selvakumar Manickam
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp778-786

Abstract

The use of unmanned aerial vehicles (UAVs) will be crucial in the next generation of wireless communications infrastructure. When compared to traditional ground-based solutions, it is expected that their use in a variety of communication-based applications will increase coverage and spectrum efficiency. In this paper, we provide a detailed review of all relevant research works as follows. This paper presents types of UAVs (e.g., wireless coverage, military, agriculture, medical applications, environment, and climate, and delivery and transportation), characteristics of UAVs (e.g., node density, altering system topology, node mobility, radio broadcasting mode, frequency band, localization, and power consumption and network lifetime), the application of UAVs (e.g., Multi-UAV cooperation, UAV-to-VANET collaborations, and UAV-to-ground tasks). Additionally, this paper reviews the routing protocols of UAVs (e.g., topology-based, position-based, heterogeneous, delay-tolerant networks (DTNs), swarm-Based, and cluster-based) and simulation tools (e.g., OMNeT++, AVENS, MATLAB, NS3, SUMO, and OPNET). The design and development of any new methods for UAVs may use this work as a guide and reference.
A survey on automatic engagement recognition methods: online and traditional classroom Ajitha Sukumaran; Arun Manoharan
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp1178-1191

Abstract

Student engagement in a learning environment is directly related to students’ perception and involvement of the educational activities in the class, along with their physical and mental health. This paper presents an extensive survey of the various automatic engagement detection approaches and algorithms based on computer vision, physiological and neurological signals analysis-based methods. The computer vision-based techniques depend on the traits captured by image sensors such as facial expressions, gesture and posture analysis, and gaze direction. The physiological and neurological signal based approach depends on the sensor data, like heart rate (HR), electroencephalogram (EEG), blood pressure (BP), and galvanic skin response (GSR). A brief analysis of the available datasets for Engagement Recognition and its features are also summarized. This study highlights a few commercially available wearables which provides the physiological signals that helps in student’s attentivity recognition. Our study reveal that the accuracy of engagement recognition system will increase if we increase the number of modalities used. In this survey, we intend to support the upcoming researchers as well as tutors of smart education set up by providing an overview of existing or proposed approaches of automatic engagement detection techniques in different scenarios.
New blender-based augmentation method with quantitative evaluation of CNNs for hand gesture recognition Huong-Giang Doan; Ngoc-Trung Nguyen
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp796-806

Abstract

In this study, we extensively analyze and evaluate the performance of recent deep neural networks (DNNs) for hand gesture recognition and static gestures in particular. To this end, we captured an unconstrained hand dataset with complex appearances, shapes, scales, backgrounds, and viewpoints. We then deployed some new trending convolution neuron networks (CNNs) for gesture classification. We arrived at three major conclusions: i) DenseNet121 architecture is the best recognition rate through almost evaluated red, green, blue (RGB) and augmentation datasets. Its performance is outstanding in most original works; ii) blender-based augmentation help to significantly increase 9% of accuracy, compared to the use of a RGB cues; iii) most CNNs can achieve impressive results at 97% accuracy when the training and testing datasets come from the same lab-based or constrained environment. Their performance is drastically reduced when dealing with gestures collected in unconstrained environments. In particular, we validated the best CNN on a new unconstrained dataset. We observed a significant reduction with an accuracy of only 74.55%. This performance can be improved up to 80.59% by strategies such as blender-based and/or GAN-based data augmentations to obtain an acceptable result of 83.17%. These findings contribute crucial factors and make fruitful recommendations for the development of a robust hand-based interface in practice
Blackhole attacks in internet of things networks: a review Noor Hisham Kamis; Warusia Yassin; Mohd Faizal Abdollah; Siti Fatimah Abdul Razak; Sumendra Yogarayan
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp1080-1090

Abstract

The internet of things (IoT) is one of data revolution area and is the following extraordinary mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that are used on a regular basis would be connected to the current of the internet. IPv6 over low-power wireless personal area networks (6LoWPAN) is a one of IPv6 header pressure technology, and accordingly, it is vulnerable to attack. The IoT is a combination of devices with restricted resource assets like memory, battery power, and computational capability. To solve this, RPL or routing protocol for low power Lossy network is deploy by utilizing a distance vector scheme. One of denial of service (Dos) attack to RPL network is blackhole attack in which the assailant endeavors to become a parent by drawing in a critical volume of traffic to it and drop all packets. In this paper, we discuss research on numerous attacks and current protection methods, focusing on the blackhole attack. There is also discussion of challenge, open research issues and future perspectives in RPL security. Furthermore, research on blackhole attacks and specific detection technique proposed in the literature is also been presented.
Using support vector machine regression to reduce cloud security risks in developing countries Sanaa Hammad Dhahi; Estqlal Hammad Dhahi; Ban Jawad Khadhim; Shaymaa Taha Ahmed
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp1159-1166

Abstract

The use of the cloud by governments throughout the world is being aggressively investigated to increase efficiency and reduce costs. The majority of cloud computing risk management programs prioritize addressing cloud security issues that government organizations may face when they choose to adopt cloud computing systems, but these programs lack evidence of security risks, and problems with using cloud computing in developing nations are uncommon, so they called for more research in this area. The objective of this paper is to use quantitative models namely Spearman's Rank correlation coefficient, simple regression, and support vector machine regression (SVMR) for estimating cloud security issues based on cloud control factors for improving the mitigation of cloud computing security issues based on control factors using intelligent models in a government organization. Identify the proper cloud control factors for every cloud security issue from estimation errors using a standard for performance measurement like mean square error (MSE) and root mean square error (RMSE), performance measurement to evaluate and validate proposed models. SVMR is an approach to enhance practices for cloud security platforms to mitigate risks and infrastructure for cloud adoption in developing countries in this paper.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue