cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,138 Documents
Hybrid deep learning with pelican optimization algorithm for M2M communication on UAV image classification Sharmili, Kasturi Chandrahaasan; Kumar, Chevella Anil; Subbaiyan, Arunmurugan; Beena Bethel, Gundemadugula Nelson; Puliyanjalil, Ezudheen; Sapkale, Pallavi
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1526-1534

Abstract

Machine-to-machine (M2M) communication for unmanned aerial vehicle (UAVs) and image classification is essential to current remote sensing and data processing. UAVs and ground stations or other linked devices exchange information seamlessly using M2M communication. M2M connectivity helps UAVs with cameras and sensors communicate aerial pictures in real time or post-mission for image categorization and analysis. During flight, UAVs acquire massive volumes of picture data. Image classification, commonly using deep learning (DL) methods like convolutional neural network (CNN), automatically categorizes and annotates photos based on predetermined classes or attributes. This work uses UAV photos to produce hybrid deep learning with pelican optimization algorithm for M2M communication (HDLPOA-M2MC). HDLPOA-M2MC automates UAV picture class identification. GhostNet model is used to derive features in HDLPOA-M2MC. The HDLPOA-M2MC approach leverages pelican optimization algorithm (POA) for hyperparameter adjustment in this investigation. Finally, autoencoder-deep belief network (AE-DBN) model can classify. The HDLPOA-M2MC method’s enhanced outcomes were shown by several studies. The complete results showed that HDLPOA M2MC performed better across measures.
Improved deep learning architecture for skin cancer classification Owida, Hamza Abu; Alshdaifat, Nawaf; Almaghthawi, Ahmed; Abuowaida, Suhaila; Aburomman, Ahmad; Al-Momani, Adai; Arabiat, Mohammad; Chan, Huah Yong
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp501-508

Abstract

A leading cause of mortality globally, skin cancer is deadly. Early skin cancer diagnosis reduces mortality. Visual inspection is the main skin cancer diagnosis tool; however, it is imprecise. Researchers propose deep-learning techniques to assist physicians identify skin tumors fast and correctly. Deep convolutional neural networks (CNNs) can identify distinct objects in complex tasks. We train a CNN on photos with merely pixels and illness labels to classify skin lesions. We train on HAM-10000 using a CNN. On the HAM10000 dataset, the suggested model scored 95.23% efficiency, 95.30% sensitivity, and 95.91% specificity.
A multi-criteria trust-enhanced collaborative filtering algorithm for personalized tourism recommendations Shambour, Qusai Y.; Al-Zyoud, Mahran M.; Alsaaidah, Adeeb M.; Abualhaj, Mosleh M.; Abu-Shareha, Ahmad A.
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1919-1928

Abstract

The exponential growth of online information has LED to significant challenges in navigating data overload, particularly in the tourism industry. Travelers are overwhelmed with choices regarding destinations, accommodations, dining, and attractions, making it difficult to select options that best meet their needs. Recommender systems have emerged as a promising solution to this problem, aiding users in decision-making by providing personalized suggestions based on their preferences. Traditional collaborative filtering (CF) methods, however, face limitations, such as data sparsity and reliance on single rating scores, which do not fully capture the complexity of user preferences. This study proposes a hybrid multi-criteria trust-enhanced CF (HMCTeCF) algorithm to improve the accuracy and robustness of tourism recommendations. HMCTeCF improves the quality of recommendations by integrating multi-criteria user preferences with trust relationships among users and between items. Experimental results using real-world datasets, including Restaurants-TripAdvisor and Hotels-TripAdvisor, demonstrate that HMCTeCF outperforms benchmark CF-based recommendation methods. It achieves higher prediction accuracy and coverage rate, effectively addressing the data sparsity problem. This innovative algorithm facilitates a more personalized and enriching travel experience, particularly in scenarios with limited user data. The findings highlight the importance of considering multiple criteria and trust relationships in developing robust recommendation systems for the tourism industry.
MobileNet based secured compliance through open web application security projects in cloud system Vallabhaneni, Rohith; Vaddadi, Srinivas A; Somanathan Pillai, Sanjaikanth E. Vadakkethil; Addula, Santosh Reddy; Ananthan, Bhuvanesh
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1661-1669

Abstract

The daunting issues that are promptly faced worldwide are the sophisticated cyber-attacks in all kinds of organizations and applications. The development of cloud computing pushed organizations to shift their business towards the virtual machines of the cloud. Nonetheless, the lack of security throughout the programmatic and declarative levels explicitly prone to cyber-attacks in the cloud platform. The exploitation of web pages and the cloud is due to the uncrated open web application security projects (OWASP) fragilities and fragilities in the cloud containers and network resources. With the utilization of advanced hacking vectors, the attackers attack data integrity, confidentiality, and availability. Hence, it’s ineluctable to frame the application security-based technique for the reduction of attacks. In concern to this, we propose a novel Deep learning-based secured advanced web application firewall to overcome the lack of missing programmatic and declarative level securities in the application. For this, we adopted the MobileNet-based technique to ensure the assurance of security. Simulations are effectuated and analyzed the robustness with the statistical parameters such as accuracy, precision, sensitivity, and specificity and made the comparative study with the existing works. Our proposed technique surpasses all the other techniques and provides better security in the cloud.
System availability assessment and optimization of a series-parallel system using a genetic algorithm Chaudhary, Priya; Bansal, Shikha
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp153-162

Abstract

To optimize the operational availability of the series-parallel system and provide useful insights for maintenance planning, the study attempts to investigate the availability of a ball mill unit. These four different components make up the ball mill production system: “drum,” “ring-gear,” “gearbox,” and “electric motor.” There is a chain mechanism connecting all four components. The “ring gear” and “electric motor” components are composed of two independent units, one of which serves the desired purpose and the other is maintained in cold standby. The “drum” and “gearbox” of the components each contain only one unit. Therefore, a novel mathematical model is designed and implemented in this work by assuming arbitrary repair rates and exponentially distributed failure rates using the Markov process and Chapman-Kolmogorov equations. This study explored the availability with a normalization method and used genetic algorithm techniques to optimize ball mill availability. Putting this article into practice is of great benefit when developing an appropriate maintenance program. Through this, the study achieves maximum production. To investigate the behavior of several performance characteristics of the ball mill production system, numerical results and corresponding graphs are also specifically created for specific values of subsystem parameters, such as failure rate, and repair rate to increase the system’s overall efficiency.
Comparative efficiency analysis of RF power amplifiers with fixed bias and envelope tracking bias Babu, Ambily; Shivaleelavathi, Bangalore Gangadharaiah; Yatnalli, Veeramma
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 2: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i2.pp808-816

Abstract

RF power amplifier (RF PA) finds its application in almost all the areas of electronics, mobile communication being identified as a major area. The paper performs a comparative efficiency analysis of RF power amplifiers operating with a fixed bias and an envelope tracking bias. Simulations are performed using Keysight advanced design system (ADS) tool. A class a RF PA operating at a 12 dB gain is fixed for the work. 16 QAM LTE signal operating at 5 MHz input frequency, with a peak to average power ratio (PAPR) of 6.0 dB is used as input signal. An envelope simulation at 2.5 GHz is performed on the RF power amplifier. Simulation result shows an improvement of 12% in power added efficiency (PAE) at 6 dB back-off and 6.422% in mean PAE while using envelope tracking power amplifiers, compared to RF PA with fixed supply. Envelope tracking power amplifiers reduced AM/AM distortions also by a factor of 0.248. The results obtained are much better than that obtained using a conventional RF PA with fixed bias. RF PA being the most power dissipative block in a mobile handset, improving its efficiency contributes directly to a great improvement in the battery lifetime of mobile phones. The major challenges faced by envelope tracking PA (ETPA) designers in achieving this efficiency improvement is also delineated in the paper.
Solar irradiation intensity forecasting for solar panel power output analyze Sucita, Tasma; Hakim, Dadang Lukman; Hidayahtulloh, Rizky Heryanto; Fahrizal, Diki
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp74-85

Abstract

Accurate forecasting of global horizontal irradiance (GHI) is critical for optimizing solar power plant (SPP) output, particularly in tropical locales where solar potential is high yet underutilized due to forecasting challenges. This research aims to enhance GHI prediction in one of the major cities of Indonesia, where existing models struggle with the area’s natural climate unpredictability. Our analysis harnesses a decade of data 2011-2020, including GHI, temperature, and the Sky Insolation Clearness Index, to calibrate and compare these methodologies. We evaluate and contrast the exponential smoothing method versus the more complicated artificial neural network (ANN). Our findings reveal that the ANN method, notably its fourth iteration model with 12 input and hidden layers, substantially outperforms exponential smoothing with a low error rate of 1.12%. The use of these methodologies forecasts an average energy output of 252,405 Watt for a solar panel with specification 15.3% efficiency and 1.31 m2 surface area throughout the 2021 to 2025 timeframe. The work offers the ANN method as a strong prediction tool for SPP development and urges a further exploration into more advanced forecasting methodologies to better harness solar energy.
Artificial intelligence-based weather prediction framework using neural networks Kaushik, Keshav; Chhabra, Gunjan; Bharany, Salil; Rehman, Ateeq Ur; Hamam, Habib
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1836-1848

Abstract

For humans, weather prediction is vital in making rational everyday choices and avoiding risk. Accurate weather forecasting is regarded as one of the world’s most difficult issues. New weather forecasting, unlike conventional techniques, relies on a mixture of computer simulations, observation (via balloons and satellites), and information of patterns and trends (via local weather analysts and weather stations). Predictions are rendered with fair precision using such techniques. Prediction algorithms based on complicated formulas run the majority of computational models used for prediction. This paper highlights the prediction of weather with the artificial neural networks (ANN) using the latest available smart computing devices. To assess the effectiveness of the model, comparison research is conducted with the other existing models in the same area. The result demonstrates that our approach is better in comparison to other similar research and products. The comparative analysis has been undergone which confirms the superiority of our proposed techniques with an accuracy of 90.4%.
Comparative analysis of selected optimization algorithms for mobile agents’ migration pattern Oyediran, Mayowa O.; Ajagbe, Sunday Adeola; Ojo, Olufemi S.; Elegbede, Adedayo Wasiat; Adio, Michael Olumuyiwa; Adeniyi, Abidemi Emmanuel; Adebayo, Isaiah O.; Obuzor, Princewill Chima; Adigun, Matthew Olusegun
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp685-693

Abstract

Mobile agents are agents that can migrate from host-to-host to work in a heterogeneous network environment. A mobile agent can migrate from host-to-host in its plan with the statistics generated on each host through a route known as migration pattern. Migration pattern therefore is the route the agents use to travel within the plan from the first host to the last host. However, there is a need for a comparison between the commonly used optimization algorithms in developing migration patterns for mobile agents with respect to some evaluation metrics. In this paper, the three techniques firefly algorithm (FFA), honeybee optimization (HBO) and particle swarm optimization (PSO) were used for developing migration patterns for mobile agents and their comparison was done based on migration time, time complexity and network load as metrics. PSO is discovered to perform better in terms of network load with an average of 242.3905 bits per second (bps), time complexity with an average of 41.2688 number of nodes (n), and migration/transmission time with an average of 4.203462 seconds (s).
Privacy-preserving data mining optimization for big data analytics using deep reinforcement learning Utomo, Wiranto Herry; Rosalina, Rosalina; Afriyadi, Afriyadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1929-1937

Abstract

The rapid growth of big data analytics has heightened concerns about data privacy, necessitating the development of advanced privacy-preserving techniques. This research addresses the challenge of optimizing privacy-preserving data mining (PPDM) for big data analytics through the innovative application of deep reinforcement learning (DRL). We propose a novel framework that integrates DRL to dynamically balance privacy and utility, ensuring robust data protection while maintaining analytical accuracy. The framework employs a reinforcement learning agent to adaptively select optimal privacy-preserving strategies based on the evolving data environment and user requirements, while ensuring compliance with the latest security and privacy standards such as ISO/IEC 27001:2023. Experimental results demonstrate significant improvements in both privacy protection and data utility, surpassing traditional PPDM methods. Our findings highlight the potential of DRL in enhancing privacy-preserving mechanisms, offering a scalable and efficient solution for secure big data analytics.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue