cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,138 Documents
Research and implementation of the medical text analysis algorithm for predicting mortality Zhenisgul Rakhmetullina; Saule Belginova; Alibekkyzy Karlygash; Aigerim Ismukhamedova; Shynar Tezekpaeva
Indonesian Journal of Electrical Engineering and Computer Science Vol 34, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v34.i3.pp1965-1977

Abstract

Mortality prediction has a role to play in the development of a descriptive measure of the quality of care that provides a fair and equitable means of comparing and evaluating hospitals. This article describes a study of a medical text analysis algorithm for mortality prediction that used big data in the form of unstructured medical notes. The article describes the concept of using text mining technology for medical systems, a method for preprocessing medical data to predict patient mortality, an algorithm for predicting patient deaths based on the logistic regression classifier and presents a software module for implementing the proposed algorithm.
Implementation of an Arabic spell checker Rafik Kassmi; Samir Mbarki; Abdelaziz Mouloudi
Indonesian Journal of Electrical Engineering and Computer Science Vol 34, No 1: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v34.i1.pp322-332

Abstract

This paper outlines the implementation of a spell checker for the Arabic language, leveraging the capabilities of NooJ and its functionality, specifically noojapply. In this paper, we shall proceed to provide clear definitions and comprehensive descriptions of several categories of spelling errors. Next, we will provide a comprehensive introduction to the NooJ platform and its command-line utility, noojapply. In the subsequent section, we shall outline the four main phases of our spell checker prototype. We intend to develop a local grammar in NooJ for the purpose of error detection. Afterwards, a morphological grammar and a local grammar will be created in NooJ with the aim of providing an exhaustive list of possible corrections. Following that, a revised algorithm will be employed to arrange these candidates in descending order of ranking. Subsequently, a web user interface will be developed to visually represent our research efforts. Finally, we will proceed to showcase a series of tests and evaluations conducted on our prototype, Al Mudaqiq.
Machine learning for real estate valuation: Astana, Kazakhstan case Barlybayev, Alibek; Sankibayev, Arman; Niyazova, Rozamgul; Akimbekova, Gulnara
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp1110-1121

Abstract

Purpose of this research is to investigate the accuracy of machine learning models in forecasting and evaluating house prices, and to understand the key factors that impact pricing. The study involved analyzing data scraped from real estate ads in the “sale of secondary housing” category on the website krisha.kz. The paper emphasizes the importance of understanding the factors that affect house prices, such as quality, location, size, and building materials. It was concluded that these factors have a strong correlation with house price prediction. The information available on krisha.kz was found to be a useful resource for finding good apartments. The data collected by the scraper was analyzed by models: Linear regression (LR), interactions linear regression (ILR), robust linear regression (RLR), fine tree regression (FTR), medium tree regression (MTR), coarse tree regression (CTR), linear support vector machine (LSVM), quadratic SVM (QSVM), medium gaussian SVM (MGSVM), rational quadratic gaussian process regression (RQGPR), boosted trees (BoosT), bagged trees (BagT), neural network based on the bayesian regularization algorithm (BR-BPNN). BR-BPNN showed better results than other models, with an MSE of 32.14 and R of 0.9899.
Privacy-preserving authentication approach for vehicular networks Chindika Mulambia; Sudeep Varshney; Amrit Suman
Indonesian Journal of Electrical Engineering and Computer Science Vol 34, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v34.i3.pp1674-1681

Abstract

Vehicle AdHoc networks have an important role in intelligent transport systems that enhance safety in road usage by transmitting real traffic updates in terms of congestion and road accidents. The dynamic nature of the vehicular AdHoc networks make them susceptible to attacks because once malicious users gain access to the network they can transform traffic data. It is essential to protect the vehicular ad hoc network because any attack can cause unwanted harm, to solve this it is important to have an approach that detects malicious vehicles and not give them access to the network. The proposed approach is a privacy preserving authentication approach that authenticates vehicles before they have access to the vehicular network thereby identifying malicious vehicles. The model was executed in docker container that simulates the network in a Linux environment running Ubuntu 20.04. The model enhances privacy by assigning Pseudo IDs to authenticated vehicles and the results demonstrate effectiveness of the solution in that unlike other models it boasts faster authentication and lower computational overhead which is necessary in a vehicular network scenario.
Fast Naïve Bayes classifiers for COVID-19 news in social networks Hasan Dwi Cahyono; Atara Mahadewa; Ardhi Wijayanto; Dewi Wisnu Wardani; Haryono Setiadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 34, No 2: May 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v34.i2.pp1033-1041

Abstract

The growth of fake news has emerged as a substantial societal concern, particularly in the context of the COVID-19 pandemic. Fake news can lead to unwarranted panic, misinformed decisions, and a general state of confusion among the public. Existing methods to detect and filter out fake news have accuracy, speed, and data distribution limitations. This study explores a fast and reliable approach based on Naïve Bayes algorithms for fake news detection on COVID-19 news in social networks. The study used a dataset of 10,700 tweets and applied text pre-processing, term-weighting, document frequency thresholding (DFT), and synthetic minority oversampling techniques (SMOTE) to prepare the data for classification. The study assessed the performance and runtime of four models: gradient boosting (GDBT), decision tree (DT), multinomial Naïve Bayes (MNB), and complement Naïve Bayes (CNB). The testing results showed that the CNB model reaches the highest accuracy, precision, recall, and F1-score of approximately 92% each, with the shortest runtime of 0.55 seconds. This study highlights the potential of the CNB model as an effective tool for detecting online fake news about COVID-19, given its superior performance and rapid processing time.
Employing educational data mining techniques to predict programming students at-risk of dropping out B. Casillano, Niel Francis; Cantilang, Karen W.
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp1219-1226

Abstract

This research primary aimed at evaluating various predictive models in predicting programming students at risk of dropping out. It also aimed at identifying attributes that are significant in predicting students at risk of dropping. The educational data mining process (EDM) was utilized as the research framework. The study conducted a ten-fold cross-validation, revealing that the k-nearest neighbors (kNN) algorithm achieved the highest classification accuracy at 95.5%. The decision tree model followed closely with a 94.9% accuracy, logistic regression exhibited 94.4%, and the neural network model yielded a classification accuracy of 93.2%. Further analysis, including confusion matrices and receiver operating characteristic (ROC) curves, provided detailed insights into the models' performance. Notably, the decision tree algorithm excelled in identifying students who did not drop out, with a misclassification rate of 9 out of 30 for dropped students. Analysis also showed that students’ assignments completed (AC), laboratory work (LW), and attendance (ATT) were the strongest predictors in identifying students at risk of dropping. Results of the study can be used by instructors to identify in advance student at risk of dropping and provide them with the necessary intervention to improve performance in programming.
Cartoon single-image super-resolution approach based on generative adversarial network Guangxing Wang; Seong-Yoon Shin; Jong-Chan Kim
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1557-1566

Abstract

In recent years, the study of a single image super-resolution (SISR) is crucial to improving image resolution and using hardware technology to improve image resolution. SISR is widely used in satellite remote sensing, video surveillance, and medical image processing because it mainly relies on deep learning algorithms to realize the conversion from low-resolution (LR) images to high-resolution images. It has the advantages of low cost, simple operation, and high efficiency. This paper proposes an image super-resolution method based on a generative adversarial network named text localization generative adversarial nets (TLGAN) model. The method is improved based on super-resolution generative adversarial networks (SRGAN), and the batch normalization layer is removed, which significantly reduces the computational burden of the model. In TLGAN model, we used the transfer learning method to pre-trained the model on the large dataset ImageNet, and then apply the pre-trained model to the cartoon image data set animes to achieve image super-resolution. Experimental results report that the proposed method has the advantages of fast running speed and excellent visual perception of super-resolution images compared with bicubic interpolation and SRGAN method.
A rest tremor detection system based on internet of thing technology Safira Faizah; Dian Nugraha; Mohammed N. Abdulrazaq; Brainvendra Widi Dionova; Muhammad Irsyad Abdullah; Leni Novianti
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 1: January 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i1.pp476-484

Abstract

This article outlines the creation of a health detection system designed to identify rest tremors in Parkinson's disease (PD). The system leverages internet of things (IoT) technology to measure frequencies derived from human activities, excluding other symptoms such as heartbeat and voice recording. The core components include the Arduino Nano microcontroller and the Node ESP MCU 8266 V3 for data processing. The system employs an accelerometer sensor positioned at the body's center axis to gauge the frequency of motor symptoms associated with resting tremors, particularly when the hands are at rest in the lap. The findings indicate that 9 samples displayed symptoms of rest tremor. The recorded p-value, standing at 0.884, signifies a robust correlation between the two variables at a significant threshold of 0.01 or 1%.
High-gain UWB elliptical and circular slotted antipodal Vivaldi antenna for through wall detection Ahmed, Sajjad; Katiran, Norshidah; Joret, Ariffuddin; Mohd Shah, Shaharil; Ahmed, Arslan; Tusin, Najwanisa
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp148-155

Abstract

The paper describes a high-gain ultra-wideband (UWB) elliptical and circular slotted antipodal Vivaldi antenna (ECS-AVA) that is designed for through-wall detection systems. The antenna flares are loaded with elliptical and circular slots to improve the gain and broaden the bandwidth. To validate the efficacy of the designed antenna, a prototype of ECS-AVA is fabricated and subjected to measurements. The experimental findings suggest that the designed antenna can handle signals effectively across a range from 3.1 GHz to 10.6 GHz, as shown by its measured impedance bandwidth, with │S11│≤ -10 dB. The obtained measurements results are consistent with the results of the CST simulation. The proposed antenna exhibits improved radiation patterns in the UWB band with peak gain values ranging from 4.8 dB to 11.9 dB.
Class imbalance aware drift identification model for detecting diverse attack in streaming environment Arati Shahapurkar; Rudragoud Patil; Kiran K. Tangod
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 2: February 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i2.pp981-989

Abstract

Detecting fraudulent transactions in a streaming environment presents several challenges including the large volume of data, the need for real-time detection, and the potential for data drift. To address these challenges a robust model is needed that utilizes machine learning techniques to classify transactions in real-time. Hence, this paper proposes a model for detecting fraudulent transactions in a streaming environment using xtream gradient boost (XGBoost), cross-validation and class imbalance aware drift identification (CIADI) model. The performance of the proposed method is evaluated using datasets named credit card and Network Security Laboratory (NSL-KDD) dataset. The results demonstrate that the model can effectively detect fraudulent transactions with high accuracy, recall, and F-measure. The results show that the proposed CIADI model attained 95.63% for the credit card dataset which is higher accuracy in comparison to the generative-adversarial networks (GAN), network-anomaly-detection scheme-based on feature-representation and data-augmentation (NADS-RA) and feature-aware XGBoost (FA-XGB). Further the proposed CIADI model attained 98.5% for the NSL-KDD dataset which is higher accuracy in comparison to the NADS-RA, stacked-nonsymmetric deep-autoencoder (sNDAE) and convolutional neural-network (CNN). This study suggests that the proposed method can be an effective model for detecting fraudulent transactions in streaming environments.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue