cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,138 Documents
Monitoring water quality parameters impacted by Indonesia’s weather using internet of things Riftiarrasyid, Mohammad Faisal; Soewito, Benfano
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1426-1436

Abstract

Increasing need for food resources, State of Indonesia to strive to maximize the output of food production. Not only in agriculture but also aquaculture results are also trying to be improved. This is also supported by the increase of Indonesia’s national fish consumption rate from 50.69 Kg per capita in 2018 to 55.37 Kg per capita in 2021. Recent aquaculture research only explored topics about monitoring the cultivation environment. But there have been no studies exploring how bad the impact of weather on the process of farming. Hence, this study aims to measure the influence of weather on freshwater aquaculture pond water quality and analyze its impact on fish growth namely Oreochromis Sp., using pH sensors and dissolved oxygen (DO). Then a weather simulation was carried out based on Indonesia’s tropical climate, which majorly consists of sunny and rainy weather. The experimental results indicate the instability of the pH value during the rainy period. DO values tend to decrease at the end of periods of sunny weather. Moreover, fish growth analysis showed that there was a decrease in food conversion ratio (FCR) by 0.956, specific growth rate (SGR) by 2.13% and survival rate (SR) by 5.715% during rainy weather.
Classification of endometrial adenocarcinoma using histopathology images with extreme learning machine method Rulaningtyas, Riries; Rahaju, Anny Setijo; Dewi, Rosa Amalia; Hanifah, Ummi; Purwanti, Endah; Rahma, Osmalina Nur; Katherine, Katherine
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 2: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i2.pp961-971

Abstract

As many as 70-80% of endometrial cancer cases are endometrial adenocarcinoma. Histopathological assessment is based on the degree of differentiation, into well-differentiated, moderate-differentiated, and poorly-differentiated. Management and prognosis differ between grades, so differential diagnosis in determining the degree of tumor differentiation is crucial for appropriate treatment decisions. Histopathological image analysis offers detailed diagnostic results, but manual analysis by a pathologist is very complicated, error-prone, quite tedious, and time-consuming. Therefore, an automatic diagnostic system is needed to assist pathologists in grading the tumor. This research aims to determine the degree of differentiation of endometrial adenocarcinoma based on histopathological images. The extreme learning machine (ELM) method performs image classification with gray level run long matrix (GLRLM) features and a combination of local binary pattern (LBP)-GLRLM features as input. Experimental results show that the ELM model can achieve satisfactory performance. Training accuracy, testing accuracy, and model precision with GLRLM features were 97.13%, 91.33%, and 80% and combined LBPGLRLM features were 91.03%, 71.33%, and 100%. Overall, the model created can determine the degree of tumor differentiation and is useful in providing a second opinion for pathologists.
A model proposal for enhancing cyber security in industrial IoT environments Buja, Atdhe; Apostolova, Marika; Luma, Artan
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp231-241

Abstract

The revolution of the industrial sector in the automated one has happened with the use of the Industrial Internet of things (IIoT). They are providing unprecedented possibilities for connection, and automation. Also, the ubiquitous of IIoT has brought new cyber security challenges, putting sensitive data at risk. This research paper proposes a comprehensive model for enhancing the cyber security of IIoT systems. Our model integrates various countermeasures, including a proactive assessment of security vulnerabilities, examination of identified vulnerabilities, categorizing data, delivery of comprehensive reports, and assurance of effective countermeasures based on a cost-benefit approach, aligned with industry standards and frameworks. The proposed model aims to address the need for the development of robust and resilient cyber security solutions for IIoT environments. This research work introduces the proposed model's main functions, integration, workflow, and references. With this research, we contribute to the enhancement of cyber security in the IIoT environment by proposing a model that assists with proactive assessment, effective response, and informed decision-making. We envision that the proposed model will support industrial organizations in securing their IIoT systems against cyber threats, ultimately have stability and secure industrial operations.
DDoS-attacks prevention using MinE-DT an adaptive security and energy optimization integration of NIPS in wireless sensor networks Ramachandra, Bharathi; Surekha, T. P.
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 2: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i2.pp1226-1233

Abstract

Wireless sensor networks (WSNs) have revolutionized data collection in diverse environments, from industrial settings to natural ecosystems. However, their decentralized nature and energy constraints pose unique security and operational challenges. Previous research provided foundational insights into WSN security but lacked comprehensive strategies for real-time intrusion prevention and efficient energy utilization. Our work employs a multi-layered approach, integrating network intrusion prevention systems (NIPS) with WSNs and leveraging machine learning for threat detection. We developed MinE-DT (minimum energy-direct transmission) hybrid routing an integrated WSN model that not only identifies and mitigates distributed denial-of-service (DDoS) attack but also optimizes energy consumption, ensuring prolonged network longevity without compromising security. The proposed model's distinctiveness lies in its fusion of NIPS with energy-saving algorithms, offering a dual advantage of enhanced security and energy efficiency. Utilizing a combination of simulations and theoretical analysis, our methodology yielded promising results, showcasing significant improvements in threat detection rates and energy conservation.
Towards robust security in WSN: a comprehensive analytical review and future research directions Zhukabayeva, Tamara; Zholshiyeva, Lazzat; Ven-Tsen, Khu; Mardenov, Yerik; Adamova, Aigul; Karabayev, Nurdaulet; Abdildayeva, Assel; Baumuratova, Dilaram
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp318-337

Abstract

One of the most important aspects of the effective functioning of wireless sensor network (WSN) is their security. Despite significant progress in WSN security, there are still several unresolved issues. Many review studies have been published on the problems of possible attacks on WSN and their identification. However, due to the lack of their systematic analysis, it is not possible to fully substantiate practical recommendations for the effective application of the proposed solutions in the field of WSN security. In particular, the creation of methods that provide a high degree of security while minimizing computational effort and costs, and the development of effective methods for detecting and preventing attacks on WSN. The purpose of this document is to fill this gap. The article presents the results of the study in the form of a systematic analysis of the literature with a targeted selection of sources to identify the most effective methods for detecting and preventing attacks on WSN. By identifying the security of WSN, which has not yet been addressed in research works, the review aims to reduce its impact. As a result, our extended taxonomy is presented, including attack types, datasets, effective WSN attack detection methods, countermeasures, and intrusion detection systems (IDS).
Enhancing diagonal comprehension with advanced topic modeling technique: DIAG-LDA Sifi, Fatima-Zahrae; Sabbar, Wafae; El Mzabi, Amal
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 2: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i2.pp1261-1272

Abstract

With the speed increase of reviews or other forms of text, natural language has the ability to convey large and complex amounts of information in relatively small communications. This capability is being leveraged by the machine-learning algorithm known as latent dirichlet allocation (LDA), which can be utilized to discover latent topics within documents. LDA can be also used to generate summaries or abstracts from a given set of documents. However, LDA can struggle to identify topics in short documents or in data with high levels of noise. This article will introduce a new method for topic modeling with LDA based on diagonal reading for sentences (DIAG-LDA). Primarily, the features are selected using the TF-IDF algorithm, and the highest relevant features are extracted using the confidence value. Besides, the classification step is executed utilizing the LDA classifier. Ultimately, we evaluate our model using the convolutional neural network algorithm. The experiment results show that DIAG-LDA performs well in identifying features from text data, achieving a 94.4%, and 89.5% in accuracy for the datasets on international economics and the political economy.
Tourism itinerary recommendation using vehicle routing problem time windows and analytics hierarchy process Nasution, Surya Michrandi; Septiawan, Reza Rendian; Azmi, Fairuz
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp517-534

Abstract

Bandung and Lembang are cities that are chosen by tourists as their destinations. Even though these cities are located side-by-side, each city has different characteristics. Bandung has many hotels and culinary spots, meanwhile, Lembang has many scenery spots. Tourists usually have limited time to visit all the destinations on holiday, which makes them choose several destinations. This paper proposes a tourism itinerary recommendation system based on the calculation of the most optimal route between destinations using the vehicle routing problem with time windows (VRPTW). Later, the optimal route is defined using the shortest path algorithm (Dijkstra). Data for the algorithm came from the collaboration between the several road information and criteria weights that are determined using the analytics hierarchy process (AHP). According to the simulation, the criteria weights are 6.9%, 62.7%, 18.6%, and 11.9% for route length, traffic condition, travel time, and weather condition, respectively. Moreover, the optimal number of tourism itinerary plans is 4 destinations. As the usage of computational resources, it takes 31.8% and 61.9% of CPU and memory usage. The time processing increases exponentially as the increment of the number of requested stops. The output of this research is expected to be a solution to the tourist itinerary plan.
MPCNN: a novel approach for detecting human Monkeypox from skin lesion images leveraging deep neural network Kabir, Sk. Shalauddin; Hosen, Md. Apu; Moz, Shahadat Hoshen; Galib, Syed Md.
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1573-1582

Abstract

The global healthcare scenario encounters a substantial challenge caused by the widespread outbreak of Monkeypox affecting over 65 countries. Limited availability of polymerase chain reaction (PCR) tests and biochemical assays necessitates alternative strategies. This study explores the viability of computer-aided identification of Monkeypox through the analysis of skin lesion images, offering a potential solution, particularly in resource-constrained settings. Employing data augmentation techniques, we augment the dataset to enhance its robustness. Subsequently, we utilize various pre-trained deep learning models, including EfficientNetB3, VGG16, ResNet50, AlexNet, and EfficientNet for classification tasks related to Monkeypox and other diseases. The achieved accuracies for these models are 98.48%, 69.19%, 91.41%, 78.38%, and 94.44%, respectively. We introduce a novel modified convolutional neural network (CNN) architecture named MPCNN to further improve performance. Our proposed MPCNN model demonstrates exceptional accuracy, precisely identifying Monkeypox patients with a remarkable precision of 99.49%. This technological advancement in disease identification holds significant promise for enhancing healthcare strategies and response mechanisms in the context of global health concerns.
Sustainable energy harvesting system for low-power underwater sensing devices Salagare, Sahana; Sudha, Pattipati Naga; Palani, Karthik
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1379-1387

Abstract

In marine scientific research, ocean monitoring is crucial where the battery powered sensor devices are placed under the water to collect different information like temperature, pressure, and turbidity in underwater sensor networks (UWSNs). Thus, keeping these devices active for longer periods is challenging. In the last decades, the piezoelectric transducer (PZT) material has been used widely for constructing more environmentally friendly energy harvesting systems. The PZT harvester offers a promising solution by eliminating the need for batteries for running devices in the future with less maintenance. The PZT harvester allows the system to generate higher voltage to run low-power devices. This paper designed and developed a new renewable energy harvester system using PZT transducers for running different types of underwater sensor devices like temperature, turbidity, and obstacle sensors. The proposed PZT-based energy harvester employs a two stage amplification model for generating higher voltage and current to run multiple devices. The sensing information collected from these sensors is transmitted to the cloud which is later utilized for analysis and decision making. Experiment results show the proposed PZT-based energy harvester can generate a voltage of 13 volts (V) and a current of 43.3 milliampere (mA) equivalent to 562 milliwatt (mW) which is very good to run multiple low-power underwater sensor devices.
Mutual information-MOORA based feature weighting on naive bayes classifier for stunting data Prabiantissa, Citra Nurina; Hakimah, Maftahatul; Rozi, Nanang Fakhrur; Puspitasari, Ira; Yamani, Laura Navika; Mahendra, Victoria Lucky
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 2: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i2.pp972-982

Abstract

One effort to reduce stunting rates is to predict stunting status early in toddlers. This study applies Naive Bayes (NB) to build a stunting prediction model because it is simple and easy to use. This study proposes a filter-based feature weighting technique to overcome the NB assumption, which states that each feature has the same contribution to the target. The frequency of an event in a dataset influences the feature weighting using mutual information criteria. This is the gap in the filter-based ranking highlighted in this study. Therefore, this study proposes a feature-weighting method that combines mutual information with the MOORA (MI-MOORA) decision-making method. This technique makes it possible to include external factors as criteria for ranking important features. For stunting cases, the external consideration for ranking purposes is the assessment of nutrition experts based on their experience in dealing with stunted toddlers. The MI-MOORA technique makes the availability of clean water the most influential feature that contributes to the stunting status. In the ten best features, the MI-MOORA ranking results are dominated by family factors. Based on the performance evaluation results of NB and other classifiers, MI-MOORA can improve the performance of stunt prediction models.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue