cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,138 Documents
Advancing airway management for ventilation optimization in critical healthcare with cloud computing and deep learning Krishnamoorthi, Suresh Kumar; Karthi, Govindharaju; Radhika, Moorthy; Rathinam, Anantha Raman; Raju, Ayalapogu Ratna; Pinjarkar, Latika; Srinivasan, Chelliah
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp1053-1063

Abstract

Improving patient outcomes in critical care settings is significantly connected to effective ventilation control. This research introduces a new method for improving ventilation methods in critical healthcare utilizing a long short-term memory (LSTM) network hosted in the cloud. Ventilators, pulse oximeters, and capnography are just a few examples of medical equipment that input data into the system, which then uploads the data to the cloud for analysis. The LSTM network can learn from data patterns and correlations, drawing on respiratory parameters' time dynamics, to provide real-time suggestions and predictions for ventilation settings. The system aims to improve clinical results and reduce the risk of ventilator-induced lung damage by tailoring ventilation techniques according to each patient's requirements and by forecasting potential issues. Due to remote monitoring technology, medical professionals can quickly analyze their patient's conditions and act accordingly. The system allows for continuous improvement using iterative learning of more data and feedback. With the ability to optimize breathing and enhance patient care in critical healthcare situations, a hopeful development in airway management is needed.
Systematic review for attack tactics, privacy, and safety models in big data systems Chaymae, Majdoubi; Youssef, Gahi; Saida, El Mendili
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp1234-1250

Abstract

This systematic review explores cyberattack tactics, privacy concerns, and safety measures within big data systems, focusing on the critical challenges of maintaining data security in today's complex digital environments. The review begins by categorizing various cyberattacks, laying the groundwork for understanding the threats to big data. It identifies key vulnerabilities that compromise privacy and safety, and examines the ethical implications of these issues. The role of artificial intelligence in enhancing security defenses is highlighted as a crucial aspect of mitigating these threats. Additionally, a comparative assessment of regulatory frameworks such as GDPR, NIST, and ISO 27001 is provided, emphasizing the importance of legal and compliance considerations in data protection. The review concludes by proposing a structured approach to cyberattack detection and processing, advocating for strategies that address both technical vulnerabilities and regulatory requirements, followed by a critical discussion on the usability of previous methods for mobile security, highlighting adaptability and performance, discussing explainability and Gen AI adoption. This work offers valuable insights for researchers, practitioners, and policymakers, contributing to the ongoing discourse on cybersecurity in the big data era.
Integrating ELECTRA and BERT models in transformer-based mental healthcare chatbot Zeniarja, Junta; Paramita, Cinantya; Subhiyakto, Egia Rosi; Rakasiwi, Sindhu; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Savicevic, Anamarija Jurcev
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 1: January 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i1.pp315-324

Abstract

Over the last decade, the surge in mental health disorders has necessitated innovative support methods, notably artificial intelligent (AI) chatbots. These chatbots provide prompt, tailored conversations, becoming crucial in mental health support. This article delves into the use of sophisticated models like convolutional neural network (CNN), long-short term memory (LSTM), efficiently learning an encoder that classifies token replacements accurately (ELECTRA), and bidirectional encoder representation of transformers (BERT) in developing effective mental health chatbots. Despite their importance for emotional assistance, these chatbots struggle with precise and relevant responses to complex mental health issues. BERT, while strong in contextual understanding, lacks in response generation. Conversely, ELECTRA shows promise in text creation but is not fully exploited in mental health contexts. The article investigates merging ELECTRA and BERT to improve chatbot efficiency in mental health situations. By leveraging an extensive mental health dialogue dataset, this integration substantially enhanced chatbot precision, surpassing 99% accuracy in mental health responses. This development is a significant stride in advancing AI chatbot interactions and their contribution to mental health support.
Facial emotion recognition based on upper features and transfer learning Zohra, Ennaji Fatima; Hamada, El Kabtane
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 1: January 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i1.pp530-539

Abstract

Facial expression recognition (FER) in the upper face focuses on the analysis and recognition of emotions based on features extracted from the upper region of the face. This region typically affects the eyes, eyebrows, forehead, and sometimes the upper cheeks. Since these areas are often less affected by face masks or other facial coverings, FER algorithms can concentrate on capturing and interpreting the relevant facial cues, such as eye movements, eyebrow positions, and forehead wrinkles, to accurately recognize and classify different emotions. By focusing on the upper face, FER systems can mitigate the impact of occlusions caused by masks and still provide meaningful insights into the emotional states of individuals. In this work, a FER approach focusing on the upper region is proposed. Several experiments have been made using the CK+ dataset in addition to a comparison between the emotion recognition scores using the upper and the entire face in order to determine whether this area can reflect the real expressed emotion. The results of our approach are promising compared to previous studies with an accuracy up to 96%.
Hybrid resource optimization strategy in heterogeneous wireless networks Gadde, Nagaraja; Shivaswamy, Rashmi; Halasinanagenahalli Siddamal, Ramesh Babu; Gowrishankar, Gowrishankar; Thimma Raju, Govindaih; Suryakumar Prabhu Vijay, Subramani
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp829-838

Abstract

The future generation of heterogeneous wireless networks (HWNs) will combine various radio access technologies for connecting various mobile subscribers (MS) based on the quality of service (QoS) and wireless network parameters, connecting MS to the best possible wireless network (WN) has been a trending research topic in HWNs. Existing resource optimization methods are designed to meet the QoS of network criteria and user preferences are neglected. Very limited work is done for resource optimization considering user preferences. However, these models are designed considering multi-mode terminals (MMTs) running a single service at a time under a low-density network; as a result, cannot be adopted to run multiple services simultaneously and; thus, fail to meet current users’ service dynamics requirement. Further, fails to bring good tradeoffs between reducing interference and improving performance. In addressing the research problem this work introduced a hybrid resource optimization strategy (HROS) to reduce interference by establishing channel availability and enhancing resource utilization through game theory. The HROS proves the existence of nash equilibrium (NE) improves throughput by 16.32% and reduces collision by 26.16% over the existing resource optimization-based network selection (RONS) scheme.
Field-level sugarcane yield estimation utilizing Sentinel-2 time-series and machine learning B. U., Rekha; Desai, Veena V.; Kuri, Suresh; Ajawan, Pratijnya S; Jha, Sunil Kumar; Patil, V. C.
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 1: January 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i1.pp475-487

Abstract

This work focused on developing a methodology for using machine learning (ML) approaches to establish a pre-harvest yield prediction model for sugarcane at field level by integrating time-series remote sensing imagery data with ML techniques. Ground truth agro data and thirty-one spectral vegetation indices were extracted from Sentinel-2 imagery and were considered for yield modeling. A two-level feature selection technique was used to determine the most significant variables that best correlated with sugarcane yield to predict yield in advance. Seven ML algorithms, including those based on regularization, decision trees, and ensemble methods like boosting, were used to predict yield. The approach achieved the highest R2 score of 0.73 and the lowest root mean squared error (RMSE) of 13.45 t/ha with random forest (RF) among the seven ML models tested. Furthermore, all feature selection procedures identified normalized difference red edge (NDRE), red edge chlorophyll index (RECI), and ratio vegetation index (RVI) as major yield-driving variables. The experiments during feature selection demonstrated the potential of red edge spectral bands in development of a reliable sugarcane-yield prediction approach. The RF model obtained using the proposed methodology outperforms the two baseline models developed using NDVI and GNDVI indices, with an improved RMSE of 16-18%.
Adversarially robust federated deep learning models for intrusion detection in IoT Ennaji, El Mahfoud; El Hajla, Salah; Maleh, Yassine; Mounir, Soufyane
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp937-947

Abstract

Ensuring the robustness, security, and privacy of machine learning is a pivotal objective, crucial for unlocking the complete potential of the internet of things (IoT). Deep neural networks have proven to be vulnerable to adversarial perturbations imperceptible to humans. These perturbations can give rise to adversarial attacks, leading to erroneous predictions by deep neural networks, particularly in intrusion detection within the IoT environment. This paper introduces a federated adversarial learning framework designed to protect both data privacy and deep neural network models. This framework consists of federated learning for data privacy and adversarial training on IoT devices to enhance model robustness. The experiments show that adversarial training at the Fog node devices significantly improves the robustness of a federated learning model against adversarial attacks when compared to normal training. Furthermore, the proposed adversarial deep federated learning model is validated using the Edge-IIoTset dataset, achieving an accuracy rate of 91.23% in the detection of attacks.
An evaluation model of website testing framework based on ISO 25010 performance efficiency Kurniasari, Dias Tri; Rochimah, Siti
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp1130-1139

Abstract

Testing is an important aspect of software development. Automation testing is now widely used to achieve better and more efficient results. Various automation testing frameworks are available in the market. However, one of the major challenges is determining which automation testing framework is suitable for testing. This study proposes an evaluation model for evaluating web automation testing frameworks based on seven performance efficiency factors to address this issue. The model evaluates five types of transactions commonly used on the web; CRUD, Get Massive Data, search, file upload, and file download. In addition, the tested frameworks are categorized as good, medium, and low. To measure the success of the research, expert weighting was also used. Based on the results obtained for all types of transactions, almost all classifications between the experimental results and weighting were in the same class. Although the model was found to be effective with a 100% accuracy rate, it had an accuracy rate of 80% for upload transactions. The outcomes of this study serve as a valuable reference for choosing suitable software for both tested frameworks and other software applications. In future studies focus on narrowing the selection based on not only performance but also functionality and ease of use.
A novel model for detecting web defacement attacks transformer using plain text features Hoang, Xuan Dau; Nguyen, Trong Hung; Pham, Hoang Duy
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 1: January 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i1.pp232-240

Abstract

Over the last decade, web defacements and other types of web attacks have been considered serious security threats to web-based services and systems of many enterprises and organizations. A website defacement attack can bring severe repercussions to the website owner, such as immediate discontinuance of the website operations and damage to the owner’s reputation, which may lead to enormous monetary losses. Several solutions and tools for monitoring and detecting web defacements have been designed and developed. Some solutions and tools are limited to static web pages, while others can handle dynamic ones but demand significant computational power. The existing proposals’ other issues are relatively low detection rates and high false alarm rates because many crucial elements of web pages, including embedded code and images are not properly processed. This paper proposes a novel model for detecting web defacements to address these issues. The model is based on the bidirectional long-short term memory (Bi-LSTM) deep learning method using features of the plain text content extracted from web pages. Comprehensive testing on over 96,000 web pages dataset demonstrates that the proposed Bi-LSTM-based web defacement detection model outperforms earlier methods, achieving a 96.04% overall accuracy and a 2.03% false positive rate.
A deep learning model with an inductive transfer learning for forgery image detection Bevinamarad, Prabhu; H. Unki, Prakash; Bhandage, Venkatesh
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp801-810

Abstract

Due to the availability of affordable electronic devices and several advanced online and offline multimedia content editing applications, the frequency of image manipulation has increased. In addition, the manipulated images are presented as evidence in courtrooms, circulated on social media and uploaded upon authentication to deceive the situation. This study implements a deep learning (DL) framework with inductive transfer learning (ITL) by using a pre-trained network to benefit from the discovered feature maps rather than starting from scratch and fine-tuning the process to check and classify whether the suspected image is authenticated or forged effectively. To experiment with the proposed model, we used both Columbian uncompressed image splicing detection (CUISD) and the CoMoFoD dataset for training and testing. We measured the model’s performance by changing hyperparameters and confirmed the better selection of values for the hyperparameter to yield compromised results. As per the evaluation results, our model showed improved results by classifying new instances of images with an average precision of 89.00%, recall of 86.43%, F1-score of 87.32, and accuracy of 87.72% and consistently performed better compared to other methods currently in use.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue