cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,138 Documents
An evaluation of multiple classifiers for traffic congestion prediction in Jordan Hassan, Mohammad; Arabiat, Areen
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp461-468

Abstract

This study contributes to the growing body of literature on traffic congestion prediction using machine learning (ML) techniques. By evaluating multiple classifiers and selecting the most appropriate one for predicting traffic congestion, this research provides valuable insights for urban planners and policymakers seeking to optimize traffic flow and reduce jamming and. Traffic jamming is a global issue that wastes time, pollutes the environment, and increases fuel usage. The purpose of this project is to forecast traffic congestion at One of the most congested areas in Amman city using multiple ML classifiers. The Naïve Bayes (NB), stochastic gradient descent (SGD) fuzzy unordered rule induction algorithm (FURIA), logistic regression (LR), decision tree (DT), random forest (RF), and multi-layer perceptron (MLP) classifiers have been chosen to predict traffic congestion at each street linked with our study area. These will be assessed by accuracy, F-measure, sensitivity, and precision evaluation metrics. The results obtained from all experiments show that FURIA is the classifier that presents the highest predictions of traffic congestion where By 100% achieved Accuracy, Precision, Sensitivity and F-measure. In the future further studies can be used more datasets and variables such as weather conditions; and drivers behavior that could integrated to predict traffic congestion accurately.
A robust method for detecting fake news using both machine and deep learning algorithms Alikhashashneh, Enas Ahmad; Nahar, Khalid M.O.; Abual-Rub, Mohammed; Alkhaldy, Hedaya M.
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1816-1826

Abstract

Spreading fake news and false information on social media is very common and can be done effortlessly due to the huge number of users of each of the various social media platforms. Another reason for having such a speedy spread of fake news (which makes about 40% of the information published on social media platforms) is the inability of these platform to verify the authenticity of the news before allowing it to be published. This research will use information technology to detect fake news/ false information and change this kind of technology from being the cause of the problem to a tool to solve it. This research provides a method that uses both machine learning (ML) and deep learning (DL) algorithms to detect fake information versus real information and compare the performance of the algorithms. The results of this research indicate that the algorithms that use term frequency inverse document frequency (TF-IDF) have achieved better results than the algorithms that use Word2Vec. Long short-term memory (LSTM) algorithm, however, has achieved the best performance; of 99% accuracy -when using TF-IDF, and 94% -when using Word2Vec.
Enhancing network lifetime in wireless sensor networks through coverage-aware optimized sensor activation Madagouda, Basavaraj K.; Sumathi, Ranganathaiah
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1535-1546

Abstract

Wireless sensor networks (WSNs) are a pivotal technology in the modern era, enabling the monitoring and sensing of environmental conditions across vast areas with unprecedented precision and flexibility. At the heart of WSNs lie crucial challenges such as optimizing coverage, extending network lifetime, and strategizing node deployment to ensure efficient operation while conserving energy. This paper introduces the coverage-aware optimized sensor activation and deployment (CAOSAD) Strategy, a novel methodology designed to address these challenges. By integrating advanced node placement algorithms and scheduling techniques, the EcoNet lifespan maximization (ELM) strategy significantly enhances area and target coverage, minimizes energy consumption, and thereby prolongs the network’s operational lifespan. We present a comprehensive framework that dynamically adjusts node activity based on a predictive model, ensuring robust coverage and connectivity with minimal energy expenditure. Through a series of simulations, the ELM strategy demonstrates a substantial improvement in network sustainability compared to existing methodologies, offering a promising approach for the development of future WSNs. By focusing on the synergy between coverage optimization, energy-efficient node deployment, and innovative scheduling algorithms, this paper contributes a ground-breaking perspective to the research and application of WSNs, setting a new benchmark for the design of eco-friendly and durable sensing infrastructures.
Modelling a neural network for analysing the results of segmentation of satellite images Kaldarova, Mira; Akanova, Akerke; Naizagarayeva, Akgul; Kazanbayeva, Albina; Ospanova, Nazira
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp614-621

Abstract

The study's relevance lies in addressing inaccuracies within satellite image segmentation, necessitating the development and implementation of neural network models for automated segmentation. The purpose of study is to develop a model of a neural network for training with data obtained from the segmentation of satellite images. The basis of the methodological approach in study is a combination of methods of system analysis of neural networks, which have had a substantial impact on the development of the computer vision industry, with an empirical study of the general principles of neural network modelling for the training on satellite images segmentation. In this study, the results were obtained, indicating that there is a fundamental possibility of developing and practical implementation of a neural network model to determine the quality of the obtained segmentation of images of agricultural fields. Satellite images of agricultural fields of the Republic of Kazakhstan are obtained, and segmentation of field images is performed using the developed neural network model for learning segmentation results. The practical importance of the results obtained in study lies in the possibility of their use in the development of functional models of neural networks for training the results of the segmentation of satellite images.
Enhanced driving assistance: automated day and night vehicle detection system utilizing convolutional neural networks Zaarane, Abdelmoghit; Slimani, Ibtissam; Elhabchi, Mourad; Atouf, Issam
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1532-1542

Abstract

This paper presents an enhanced real-time vehicle detection system using convolutional neural networks (CNNs) for both daytime and night-time conditions. Initially, the system determines the time of capture by analyzing the upper part of input images. For daytime detection, it uses normalized cross-correlation and two-dimensional discrete wavelet transform (2D-DWT) techniques. Night-time detection involves identifying vehicle lamps through color thresholding and connected component techniques, followed by symmetry analysis and CNN classification. The dataset for training includes images from the Caltech Cars, AOLP, KITTI Vision, and night-time vehicle detection datasets, ensuring robust performance across various lighting conditions. Experiments demonstrate the system's high accuracy, achieving 99.2% during the day and 98.27% at night, meeting real-time requirements and enhancing driving assistance systems' reliability.
An efficient data compression and storage technique with key management authentication in cloud space Pinnapati, Surekha; Shivanna, Prakasha
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1680-1687

Abstract

Cloud computing is one of the promising technologies that offers cost-effective choices for processing and storing the huge volumes of data. In today’s world, data is the most important asset that one can have but it needs to be handled and protected properly. Portability of data can be increased by reducing the size of the data to be stored because of the limited storage space. As a result, data compression has arisen significantly. Data compression is a useful technique for reducing data size and increasing the effectiveness of data transit and storage. Data compression reduces the size of a data file while using lossy or lossless compression. One of the newest techniques for data compression is data duplication, which can reduce the amount of data saved while removing unnecessary data and maintaining an exact copy of the data. This analysis presents an Efficient data compression and storage technique with key management authentication in cloud space. This approach uses Regressive probabilistic key encryption (RPKE) to encrypt the cloud data and Lempel-Ziv-77-Huffman coding (LZ77-HM) is used to compress the huge amounts of cloud data. The Performance of presented approach is evaluated in terms of compression ratio and compression rate.
Performance evaluation of PV configurations considering degradation rate and hot spots Asadi, Suresh Kumar; Sreeranganayakulu, Jinka; Kshatri, Sainadh Singh; Mohammad, Karimulla Syed
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1397-1403

Abstract

The rapid emergence and evolution of renewable energy sources such as solar energy has become a vital component of the global effort to meet the energy needs of the future. The major concerns for continuous solar photovoltaic (PV) generation are degradation rate, hot spots. These factors lead to the negative impact on PV mismatch losses, fill factor, maximum power and efficiency. To improve the performance of PV system, the simplest solution is PV panel configuration hence in this paper spider web tie (SWT) based PV Panel configuration in proposed. The proposed configuration is implemented on KC200GT PV Panel of 5×5 size PV panels considering degradation rate, hot spot. The performance of SWT configuration is compared with series-parallel (SP), bridge-link (BL), triple tied (TT), and photovoltaic (PV) panel configurations and performance parameters such as Vmp, Imp, Pmp, Voc, Isc. FF, ∆Pml, and η are calculated in all the cases. In all the cases the proposed SWT configuration exhibited the improved performance.
Convolutional neural networks breast cancer classification using Palestinian mammogram dataset Saadah, Hanin; Owda, Amani Yousef; Owda, Majdi
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 2: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i2.pp1149-1162

Abstract

Breast cancer is widespread across the globe. It’s the primary cause of death in cancer fatalities. According to the Palestinian Ministry of Health annual report, it ranked as the third reported death of all reported cancer deaths in the West Bank. Mammogram screening is the most common technique to diagnose breast abnormalities, but there is a challenge in the lack of skilled experts able to accurately interpret mammograms. Machine learning plays an important role in medical image processing particularly in early detection when the treatment is less expensive and available. In this paper we proposed different convolutional neural network (CNN) models to detect breast abnormalities with promising results. Six CNN models were used in this research on a unique (first-hand) dataset collected from the Palestinian Ministry of Health. The models are VGG16, VGG19, DenseNet121, ResNet50, Xception, and EfficientNetB7. Consequently, DenseNet121 outperformed other models with 0.83 and 0.85 for testing accuracy and area under curve (AUC) respectively. As a future work, the outperformed model can be combined with other patient data like genetic information, medical history, and lifestyle factors to evaluate the risk of developing specific diseases. This would increase the survival rate and enable proactive measures.
A joint learning classification for intent detection and slot filling with domain-adapted embeddings Muhammad, Yusuf Idris; Salim, Naomie; Zainal, Anazida
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp1306-1316

Abstract

For dialogue systems to function effectively, accurate natural language understanding is vital, relying on precise intent recognition and slot filling to ensure smooth and meaningful interactions. Previous studies have primarily focused on addressing each subtask individually. However, it has been discovered that these subtasks are interconnected and achieving better results requires solving them together. One drawback of the joint learning model is its inability to apply learned patterns to unseen data, which stems from a lack of large, annotated data. Recent approaches have shown that using pretrained embeddings for effective text representation can help address the issue of generalization. However, pretrained embeddings are merely trained on corpus that typically consist of commonly discussed matters, which might not necessarily contain domain specific vocabularies for the task at hand. To address this issue, the paper presents a joint model for intent detection and slot filling, harnessing pretrained embeddings and domain specific embeddings using canonical correlation analysis to enhance the model performance. The proposed model consists of convolutional neural network along with bidirectional long short-term memory (BiLSTM) for efficient joint learning classification. The results of the experiment show that the proposed model performs better than the baseline models.
Random forest algorithm with hill climbing algorithm to improve intrusion detection at endpoint and network Sekar, Satheesh Kumar; Parvathy, Palaniraj Rajidurai; Pinjarkar, Latika; Latha, Raman; Sathish, Mani; Reddy, Munnangi Koti; Murugan, Subbiah
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 1: January 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i1.pp134-142

Abstract

Cloud computing is a framework that enables end users to connect highly effective services and applications over the internet effortlessly. In the world of cloud computing, it is a critical problem to deliver services that are both safe and dependable. The best way to lessen the damage caused by entry into this environment is one of the primary security concerns. The fundamental advantage of a cooperative approach to intrusion detection system (IDS) is a superior vision of an action of network attack. This paper proposes a random forest (RF) algorithm with a hill-climbing algorithm (RFHC) to improve intrusion detection at the endpoint and network. Initially, it is used for feature selection, and the next process is to separate the intrusions detection. The feature selection is maintained by the hill climbing (HC) algorithm that chooses the best features. Then, we utilize the RF algorithm to separate the intrusion efficiently. The experimental results depict that the RFHC mechanism reached more acceptable results regarding recall, precision, and accuracy than a baseline mechanism. Moreover, it minimizes the miss detection ratio and enhances the intrusion detection ratio.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue