cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,138 Documents
Flexible hybrid graphene-based NFC tag antenna for temperature monitoring application Mohd Faudzi, Najwa; Razali, Ahmad Rashidy; Abd Manaf, Asrulnizam; Abd Rahman, Nurul Huda; Ab Aziz, Ahmad Azlan; Hafiz, Syed Muhammad; Sulaiman, Suraya; Rashid, Nora’zah Abdul; Ibrahim, Amirudin; Mozi, Aiza Mahyuni
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i1.pp227-242

Abstract

A hybrid graphene-based material, composed of reduced graphene oxide (rGO) and silver nanoparticle (AgNP), has been proposed for a near field communication (NFC) tag antenna with an integrated, flexible temperature monitoring circuit. The limited availability of high-conductivity graphene-based materials in the market has restricted the use of graphene in NFC tag applications. Therefore, this paper proposes a hybrid graphene-based composition featuring a high conductivity of 3.95×106 S/m. The feasibility of this material for NFC tags had not been validated previously, which is the main motivation for this research. The synthesis of the materials, along with the design, fabrication, and characterization of the NFC tag, is also presented. Results show that the inkjet-printed tag achieves a good reading range of up to 3 cm and demonstrates robustness against bending from 60⁰ to 190⁰, maintaining a maximum reading range of 1.3 cm. Performance on various materials, such as plastic, paper, and carton, also shows minimal impact on frequency shifting. Additionally, the graphene-based NFC tag integrates well with the temperature circuit, effectively monitoring temperatures in the 20-60 ⁰C range in real-time. This makes the developed tag suitable for applications such as food safety monitoring systems through NFC-integrated packaging.
Enhancing attack detection in IoT through integration of weighted emphasis formula with XGBoost Al Amien, Januar; Ab Ghani, Hadhrami; Md Saleh, Nurul Izrin; Soni, Soni
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i1.pp641-648

Abstract

This research addresses the challenge of detecting attacks in the internet of things (IoT) environment, where minority classes often go unnoticed due to the dominance of majority classes. The primary objective is to introduce and integrate the imbalance ratio formula (IRF) into the XGBoost algorithm, aiming to provide greater emphasis on minority classes and ensure the model's focus on attack detection, particularly in binary and multiclass scenarios. Experimental validation using the IoTID20 dataset demonstrates the significant enhancement in attack detection accuracy achieved by integrating IRF into XGBoost. This enhancement contributes to the consistent improvement in distinguishing attacks from normal traffic, thereby resulting in a more reliable attack detection system in complex IoT environments. Moreover, the implementation of IRF enhances the robustness of the XGBoost model, enabling effective handling of imbalanced datasets commonly encountered in IoT security applications. This approach advances intrusion detection systems by addressing the challenge of class imbalance, leading to more accurate and efficient detection of malicious activities in IoT networks. The practical implications of these findings include the enhancement of cybersecurity measures in IoT deployments, potentially mitigating the risks associated with cyber threats in interconnected smart environments.
Optimizing FBMC/OQAM: Hermite filter and DFT-based precoding for PAPR reduction Anupriya, Anupriya; Nandal, Vikas
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i1.pp76-87

Abstract

In the ever-evolving landscape of wireless communication, there is a persistent quest for modulation schemes that optimize spectral efficiency, reduce interference, and enhance overall system performance. This paper introduces a novel modulation technique that synergistically improves on the strengths of filter bank multi-carrier (FBMC). A distinctive feature of our approach is the deployment of the Hermite prototype filter in the FBMC system, diverging from traditional FBMC architectures. An advanced precoding strategy leveraging a pruned discrete fourier transform (pDFT) paired with scaling is also introduced. This combination promises reduced inter-symbol interference and heightened spectral efficiency. As the management of the peak-to-average power ratio (PAPR) is a significant challenge in FBMC systems to addressing this iterative particle swarm optimization (IPSO) algorithm is proposed. Evaluations are carried out to demonstrate the efficiency of the proposes scheme in reducing PAPR substantially for FBMC/OQAM framework. Experiments are conducted and comparisons are performed among several prominent multicarrier modulation schemes. The results from the experiments indicate that the application of IPSO algorithm with Hermite functions and applied to an FBMC/OQAM system using pruned DFT has been successful in reducing the PAPR also a 6-13% decrease in error rate has been shown across varying QAM orders regardless of SNR level.
Secure financial application using homomorphic encryption Bidve, Vijaykumar; Pavate, Aruna; Raut, Rahul; Kediya, Shailesh; Sarasu, Pakiriswamy; Rao Anne, Koteswara; Gangadhara, Aryani; Shaikh, Ashfaq
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i1.pp595-602

Abstract

In today’s digital age, the security and privacy of financial transactions are paramount. With the advent of technologies like homomorphic encryption, it is now possible to perform computations on encrypted data without the need to decrypt it first, offering a promising avenue for secure financial applications. This research paper explores the implementation and implications of utilizing homomorphic encryption in financial applications to safeguard sensitive data while maintaining computational integrity. By employing homomorphic encryption techniques, financial institutions can enhance the confidentiality of their clients’ information, protect against data breaches, and enable secure computations on encrypted data. The paper discusses the principles of homomorphic encryption, its applications in financial systems, challenges, and potential solutions. Additionally, it examines real-world examples and case studies where homomorphic encryption has been employed successfully, highlighting its effectiveness in ensuring the privacy and security of financial transactions. Overall, this paper aims to provide insights into the role of homomorphic encryption in creating secure financial applications and its potential to revolutionize the way sensitive financial data is handled and processed.
Ensemble learning weighted average meta-classifier for palm diseases identification Abden, Sofiane; Bendjima, Mostefa; Benkrama, Soumia
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i1.pp303-311

Abstract

Crop diseases lead to significant losses for farmers and threaten the global food supply. The date palm, valued for its nutritional benefits and drought resistance in desert climates, is a vital export crop for many countries in the Middle East and North Africa, second only to hydrocarbons. However, various diseases pose a threat to this important plant. Therefore, early disease prediction using deep learning (DL) is essential to prevent the deterioration of date palm crops. The aim of this paper is to apply a robust ensemble method (EL) combining tree transfer learning (TL) models Resnet50, DenseNet201, and InceptionV3, and compares its performance with the CNN-SVM model and the tree TL models mentioned previously. The models were applied to a date palm dataset containing three classes: White scale, brown spot, and healthy leaf. The training and validation sets were applied to a public dataset, while the testing set was applied to a local dataset captured manually to check the model’s performance. As a result, we considered that the ensemble method gave very satisfactory results compared to other methods. Our hybrid model reached a testing accuracy of 98% while achieving an amazing training and validation accuracy of 99.94% and 98.14%, respectively.
Enhanced hippopotamus optimization algorithm for power system stabilizers Aribowo, Widi; Mzili, Toufik; Sabo, Aliyu
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i1.pp22-31

Abstract

This article presents techniques for modifying the power system stabilizer's (PSS) parameters. An enhanced version of the hippocampal optimization algorithm (HO) is presented here. HO represents a novel approach in metaheuristic methodology, having been inspired by the observed clinging behavior in hippos. The notion of the HO is defined using a trinary-phase model that includes their position updates in rivers or ponds, defensive techniques against predators, and mathematically described evasive methods. To confirm the efficacy of the recommended approach, this article provides comparison simulations of the PSS objective function and transient response. This study employs validation through a comparison between Original HO and conventional methods. Simulation results demonstrate that, when compared to competing algorithms, the suggested approach yields optimal results and, in some cases, exhibits fast convergence. It is known that, in comparison to the original HO approach, the recommended way can lower the average undershoot of the rotor angel and speed by 12.049% and 26.97%, respectively.
Analysis of similarity index between iThenticate and Ouriginal plagiarism detection software: a comprehensive study Rahman, Md. Hamidur; Danno, Bayissa Leta; Wase Mola, Dessalegn; Islam, Muhammad Shahidul; Hussain Andrabi, Syed Murtaza; Reza, Md. Nasim; Shaw, Dhananjoy
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 3: March 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i3.pp2096-2104

Abstract

Intellectual property plagiarism is increasingly prominent in contemporary society, involving the unethical practice of claiming someone else's ideas, words, or creative works without proper acknowledgment. This study aimed to compare the performance of iThenticate and Ouriginal plagiarism detection software by analyzing their similarity index. Twenty original manuscripts (N=20) were examined for content similarity, with each manuscript analyzed first with Ouriginal and then with iThenticate. The focus was on comparing the two tools based on matched sources, word matches, and overall similarity index percentage. Data analysis using SPSS v26 included descriptive statistics, an independent t-test, correlation, and ranking of the similarity percentages, with significance set at p<0.05. The results indicated no significant differences in matching sources, matching words, or similarity index (p>0.05) between iThenticate and Ouriginal. A strong positive correlation (r=.758, p<.000) was observed between the similarity indices of the two software programs. The analysis of the low similarity range (≤10%) also revealed no statistical significant difference (p>.05). However, the mean similarity percentage detected by iThenticate was higher at 11.40%, compared to 6.85% for Ouriginal. Based on the findings, both iThenticate and Ouriginal demonstrated comparable effectiveness in detecting plagiarism, highlighting their importance in curbing academic dishonesty and protecting intellectual property rights.
Fake review detection using enhanced ensemble support vector machine system on e-commerce platform Joseph, Seenia; Hemalatha, S.
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i1.pp478-485

Abstract

Due to the quick growth of online marketing transactions, including buying and selling, fake reviews are created to promote the product market and mislead new customers. E-commerce customers can post reviews and comments on the goods or services they obtained. Before making a purchase, new customers frequently read the feedback and comments posted on the website. Nowadays customers find it very difficult to identify whether the reviews are fake or not, but doing so is essential. So, it's very crucial to develop an online spam detection system to help both consumers and producers in their decision-making. The reviewer's behaviour and important review characteristics can help you identify fake reviews. The importance of this study is to develop a fake review detection system on e-commerce platforms using an enhanced ensemble support vector machine system in which the Euclidean distance is replaced with the Mahalanobis distance metric. Review texts collected from Amazon and Yelp were given as input data sets into the constructed model and classified as fake or real.
Predicting peak demand for electricity consumption using time series data and machine learning model S., Suriya; R., Agusthiyar
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i1.pp668-676

Abstract

Energy consumption is influenced by various factors, including the proliferation of electronic devices, technological advancements, economic growth, agricultural development, and population increase. Each of these factors contributes to the rising demand for energy. This paper addresses the challenge of predicting peak energy demand (ED) by utilizing historical time series data from the past five years, combined with temperature data from Tamil Nadu’s official sources. We employed feature engineering techniques to prepare the data for machine learning models, specifically XGBoost regressor, lasso, and ridge regression. The time series data was then analyzed using both univariate and multivariate models, including auto regressive integrated moving average (ARIMA) and vector autoregressive (VAR) models. The results show that our models can effectively forecast ED, providing critical insights for policymakers and stakeholders involved in energy planning and resource management.
Multimodal perception for enhancing human computer interaction through real-world affect recognition Raut, Karishma; Kulkarni, Sujata; Sawant, Ashwini
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i1.pp428-438

Abstract

Human-Computer Interaction can benefit from real-world affect recognition in applications like healthcare and assistive robotics. Human express emotions through various modalities, with audio-visual being the most significant. Using a unimodal approach, such as only speech or visual, is challenging in natural, dynamic environments. The proposed methodology integrated a pretrained model with a convolution neural network (CNN) to provide a robust initialization point and address the limited availability of facial expression data. The multimodal framework enhances discriminative power by combining visual scores with speech. This work addresses the challenges at each stage of the real-world affect recognition framework, including data preprocessing, feature extraction, feature fusion, and final classification. A 1D-CNN is employed for training on spectral and prosodic audio features, while deep visual features are processed using a 2D-CNN. The proposed system's performance was evaluated on the extended Cohn-Kanade (CK+), acted-facial-expressions in-the-wild (AFEW), and real-world-affective-face-database (RAF) datasets, which are commonly used in face recognition research. Experimental results indicate that 2% to 5% of visual data from natural settings were undetected, and the inclusion of the audio modality improved performance by providing relevant and supplementary information.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue