cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
A new hybrid model based on machine learning and fuzzy logic for QoS enhancing in IoT Lagnfdi, Oussama; Myyara, Marouane; Darif, Anouar
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp624-632

Abstract

The fast expansion of internet of things (IoT) devices presents a more complicated scenario for maintaining a stable quality of service (QoS), which would guarantee the network’s dependable operation. The emergence of increasingly complex applications that call for additional devices makes this even more crucial. Adaptive intelligence solutions that guarantee optimal network behavior are therefore required. This paper presents a hybrid optimized solution for a three-layer IoT network that models the application, network, and perception layers of an IoT network using machine learning and fuzzy logic (FL). This method guarantees optimal QoS prediction with improved network adaptability by using fuzzy membership parameters. When the number of devices increases from 100 to 1,500, FLGA maintains an average QoS of 95% to 87%, while FL maintains 84% and RANDOM maintains 79%. At the application level, genetic algorithm (GA) continues to outperform RANDOM by 15.57% and FL by 6.32%. The goal of this paper is to provide a solid network solution that could enhance the consistency of QoS performance in order to combat the increasingly complex scenario of an IoT network.
ETV: efficient text vision for text localization in natural scene images Suman, Suman; H. N., Champa
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp812-822

Abstract

In the current digital era, the extraction and comprehension of textual information from images have emerged as pivotal tasks. With the exponential growth of text documents, efficient processing and analysis have become imperative. However, text localization in images remains challenging due to complex backgrounds, uneven illumination, diverse text styles, and perspective distortions, rendering traditional optical character recognition (OCR) techniques inadequate. To address these challenges, this paper proposes an integrated method named efficient text vision (ETV). ETV combines the OCR capabilities of Tesseract with the efficient and accurate scene text detector (EAST) algorithm, supplemented by nonmaximum suppression (NMS). The Tesseract OCR component facilitates the extraction and identification of individual characters, while EAST excels in the efficient detection and localization of complete text sections. The incorporation of NMS enhances localization accuracy by eliminating redundant or overlapping bounding boxes.
Control of multi-level NPC inverters in PV/grid systems using ADRC and MADRC Dinar, Gherici; Tahour, Ahmed
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp456-469

Abstract

Grid-connected photovoltaic (PV) systems consist of solar panels that convert sunlight into electrical energy, interconnected directly with the utility grid. These systems comprise several key components: PV, multilevel, controllers, and grid interface equipment. In this context, fivelevel inverters are increasingly favoured over three-level inverters due to their ability to reduce total harmonic distortion (THD), improve efficiency, and ensure better power quality in grid-connected applications. This research presents a three-level enhanced control scheme aimed at optimizing the performance of a grid-connected photovoltaic system with a five-level inverter. A fractional-order proportional-integral (FOPI) controller is utilized for maximum power point tracking (MPPT) to ensure precise tracking under variable irradiance conditions. At the grid-interface stage, a modified active disturbance rejection controller (MADRC) is developed for grid-interface, featuring an inner loop for DC-link voltage regulation based on Lyapunov theory, leading to improved dynamic performance with lower THD of the grid current and enhanced efficiency. Simulation results highlight the effectiveness of the proposed system. Compared with the FOPI-ADRC, a three-level configuration (0.38% THD), the proposed FOPI-MADRC with a five-level inverter achieves superior performance, with only (0.22% THD). These results confirm the advantages of combining advanced control strategies with multilevel inverter technology in improving both power quality and system efficiency.
Robust palmprint biometric solution for secure mobile authentication Nguyen, Son; Luangsodsai, Arthorn; Bhattarakosol, Pattarasinee
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp680-689

Abstract

Smartphones increasingly rely on biometric authentication for access to financial and personal services, creating a need for palmprint recognition that is accurate, fast, and deployable on device. This paper proposes an end-to-end smartphone palmprint authentication framework that integrates guided mobile image capture, landmark-based region-of-interest (ROI) extraction, and compact embedding inference. A ResNet-18 teacher is first trained with self-supervised contrastive learning to reduce dependence on labeled biometric data, then distilled into a lightweight MobileNetV3 student for efficient mobile deployment. The learned embeddings support both on device verification and large-scale identification using an approximate nearest neighbor index (FAISS). Experiments on a public Kaggle palm dataset achieve 99.2% accuracy with a 0.15% equal error rate (EER). On an iPhone 13, the end-to-end pipeline runs in 87.0 ms with a 12.4 MB student model. For a 1 million-entry gallery, FAISS provides 32 ms query latency while maintaining 99.5% Recall@1. Limitations include evaluation under mostly controlled capture conditions and the absence of an explicit liveness or presentation attack detection (PAD) module; future work will address unconstrained testing and anti-spoofing integration.
Smart home automation using internet of things R., Roopa; B., Pallavi; Neelima, Lakshmi; J., Parikshith; Agarwal, Kashish
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp579-588

Abstract

This research paper delves into the development and implementation of an advanced home automation system utilizing internet of things (IoT) technology to bolster safety and comfort within residential environments. The proposed system architecture revolves around an ESP8266 microcontroller board interfaced with a diverse array of sensors, including motion detectors, temperature and humidity sensors, and air quality sensors specifically designed to detect gas leaks. Additionally, the system incorporates a servo motor for stove control and relays for fan activation. The described system adds novel safety-focused features, including servo-controlled stoves and fan-gas leak integration, making it applicable for critical home safety scenarios. However, it shares common weaknesses with existing systems, such as inadequate attention to security, energy efficiency, and scalability. By addressing these gaps, this system could set itself apart as a comprehensive IoT solution for home automation.
Engineering intelligence for sustainable and secure digital futures Sutikno, Tole
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp453-455

Abstract

This editorial introduces Volume 41, Number 2 (February 2026) of the Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), which presents a diverse collection of peer-reviewed articles reflecting recent advances in electrical engineering, electronics, and computer science. The issue highlights the convergence of power and energy systems, artificial intelligence, cybersecurity, the Internet of Things (IoT), and datadriven engineering methodologies in addressing contemporary technological and societal challenges, with key contributions focusing on renewable energy integration, intelligent control strategies, secure and trusted digital infrastructures, smart IoT-based systems, and AI-driven applications in healthcare, finance, industrial automation, and human-centered computing. Particular emphasis is placed on energy efficiency, system resilience, explainable and trustworthy artificial intelligence, and sustainable engineering practices. Collectively, the published works demonstrate how interdisciplinary research can bridge theory and real-world implementation while supporting the United Nations Sustainable Development Goals, including affordable and clean energy, good health and well-being, sustainable cities, responsible consumption, and strong digital institutions. By fostering innovation, cross-domain collaboration, and responsible technology development, this issue of IJEECS aims to advance secure, intelligent, and sustainable engineering solutions that respond to both current demands and future global challenges. This issue further reinforces the journal’s commitment to advancing engineering intelligence that is ethically grounded, environmentally responsible, and resilient by design.
Assessment of detection methods for back-end process defects in equipment and devices in semiconductor manufacturing Roslan, Ameer Farhan; Mat Ibrahim, Masrullizam; Zarifie Hashim, Nik Mohd; Mohd Noh, Mohd Syahrin Amri; Sutikno, Tole
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp494-503

Abstract

Defect detection plays a pivotal part in the manufacturing process of semiconductors. Defects can be rooted in the product on its own, as well as the tools used to process and make the product, particularly the equipment and machinery used. Defect detection is crucial in semiconductor manufacturing, where even minor flaws can compromise product performance. Defect detection in the backend process of semiconductor manufacturing, specifically in die attach and die bonding, is critical for ensuring product quality and reliability. Die attach involves securing semiconductor chips onto substrates, while die bonding involves connecting wires to the chip. Detecting defects during these processes is vital to prevent issues such as misalignment, inadequate bonding, or contamination, which can lead to malfunctioning chips or devices. Various techniques such as visual inspection, automated optical inspection (AOI), and X-ray imaging are utilized to identify defects like cracks, voids, or irregularities in bond formation. By employing rigorous defect detection measures, manufacturers can uphold stringent quality standards and produce reliable semiconductor devices for various applications.
Energy-efficient AI-enhanced secure routing for protecting IoT networks from advanced attacks R., Leelavathi; A., Vidya
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp%p

Abstract

This paper proposes artificial intelligence-enhanced secure routing (AIRS), a lightweight AI-enhanced secure routing protocol for internet of things (IoT) networks operating under advanced routing attacks. Unlike existing approaches that treat intrusion detection and routing separately, AIRS tightly integrates anomaly scoring into trust-aware routing decisions using a compact random forest model designed for constrained nodes. The anomaly detector is trained offline on simulated IoT traffic features and deployed for real-time inference during routing. Extensive Cooja simulations demonstrate that AIRS improves intrusion detection accuracy and packet delivery while reducing energy consumption compared to secure-RPL and trust-LEACH. The current validation is limited to simulation environments, and real-world testbed evaluation is left for future work.
IoT-enabled connected incubator with redundant communication for real-time neonatal monitoring Mellal, Naçima; Maatallah, Soumia Hadj; Merazga, Ammar; Bouchouareb, Rachida; Nacer, Souad
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp633-644

Abstract

Premature birth remains a major challenge in neonatal care, especially in resource-constrained settings, where continuous monitoring and timely intervention are limited. Most existing neonatal incubators offer limited real-time monitoring, unreliable alerting, and lack communication redundancy, potentially delaying critical responses. This paper presents a comprehensive internet of thing (IoT) enabled connected incubator with redundant communication (Wi-Fi and GSM) for real-time monitoring of physiological and environmental parameters. The system integrates sensing, processing, cloud connectivity, a mobile application, and multi-channel alerts (App notifications, SMS, voice calls, and local alarms). It was experimentally evaluated under controlled laboratory conditions. Quantitative evaluation shows a cloud transmission success rate of 99.1%, end-to-end communication latency below 1 second via Wi-Fi and 2.2 seconds via GSM, with 98% of alerts successfully delivered within 6 seconds. The proposed system provides a low-cost, reliable platform that enhances neonatal safety, supports timely clinical decisions, and is scalable for resource-constrained healthcare environments.
Intelligent cybersecurity framework for real-time threat detection and data protection Viswanath, Gunti; Rao, Kurapati Srinivasa
Indonesian Journal of Electrical Engineering and Computer Science Vol 41, No 2: February 2026
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v41.i2.pp504-514

Abstract

Organizations operating across cloud, mobile, and enterprise environments are increasingly exposed to sophisticated cyberattacks that traditional rule-based security systems struggle to detect in real time. These legacy approaches lack adaptability, making it difficult to continuously monitor distributed networks, identify anomalies, and prevent zero-day threats before sensitive data is compromised. To address these challenges, this paper proposes an intelligent cybersecurity framework that integrates real-time network monitoring with AI/ML-based anomaly detection models. The framework utilizes structured preprocessing, feature engineering, and supervised learning on the UNSW-NB15 dataset (version 2015, Cyber Range Lab) to enhance detection accuracy and reduce response time. The experimental setup evaluates multiple ML classifiers using stratified train- test splitting and 5-fold cross-validation, ensuring robust performance validation. Experimental results show that the random forest (RF) model achieves 94.28% accuracy, a 2.93% false-positive rate, and an average detection time of 0.41 seconds, outperforming other baseline models. In addition to the detection layer, the framework incorporates mobile device management (MDM) controls and cloud-storage policy enforcement to strengthen organizational security posture. The main contributions of this work include: i) a unified AI/ML-driven anomaly detection model, ii) integration of MDM and cloud policy enforcement for end-to-end protection, and iii) improved empirical performance validated using a benchmark cybersecurity dataset. This combined architecture significantly enhances real-time threat identification and reduces alert latency, supporting a more security-aware and resilient enterprise environment.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue