Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

ELLMW: an enhanced vision–language model for reliable text extraction from manually composed scripts

10.11591/ijres.v15.i1.pp194-203
Dhivya Venkatesh , Brintha Rajakumari Sivaraj
While conventional optical character recognition (OCR) systems can digitize text, they struggle with diverse handwriting styles, noisy inputs, and unstructured layouts, limiting their effectiveness. This study proposes enhanced large language model whisperer (ELLMW), a vision–language framework for accurate text extraction (TE) from fully handwritten scripts. The methodology integrates advanced preprocessing (noise reduction, binarization, and skew correction), deep learning–based handwriting recognition convolutional neural network–long short-term memory (CNN–LSTM), and LLM-based post-correction to ensure context-aware and structurally coherent outputs. The system converts scanned images, portable document formats (PDFs), and irregularly formatted answer sheets into machine-readable text, while automatically correcting errors in spelling, grammar, and layout. Experimental evaluation on a curated dataset of handwritten examination answer scripts (HEAS) demonstrates that ELLMW achieves 97.8% accuracy, 1.04%-character error rate (CER), and 3.24%-word error rate, outperforming widely used OCR tools including Tesseract, EasyOCR, Google Cloud Vision (GCV), PaddleOCR, ABBYY FineReader, and Transym OCR. The results highlight the model’s robustness across varying handwriting styles, noisy backgrounds, and complex document structures.
Volume: 15
Issue: 1
Page: 194-203
Publish at: 2026-03-01

Design and implementation of a novel approximate carry look ahead adder for low-power FIR filter applications

10.11591/ijres.v15.i1.pp248-258
Badiganchela Shiva Kumar , Galiveeti Umamaheswara Reddy
Approximate computing is a low-power circuit design strategy that trades off computational accuracy for gains in speed, power efficiency, and area reduction. This approach achieves considerable power and area efficiency by introducing acceptable errors. The acceptable error in computation systems refers to a loss in accuracy that does not affect overall system performance. Approximate computing is mainly suitable for multimedia and signal processing applications. In this work, a novel approximate carry look-ahead adder (CLA) based on logical level modification is proposed. The new carry prediction term is derived to reduce the overall propagation delay of the addition operation. The proposed multi-bit adder design uses a square root based division method to partition the adder stages. Moreover, the proposed adder is applied in finite impulse response (FIR) filter implementation to evaluate the performance in real-time applications. The proposed adder and FIR filter are coded in Verilog and verified using the Xilinx simulator. The result shows that the proposed FIR filter achieves better results in terms of all parameters.
Volume: 15
Issue: 1
Page: 248-258
Publish at: 2026-03-01

Design of a solar system with a PID controller based on the Tyrannosaurus optimization algorithm

10.11591/ijres.v15.i1.pp170-182
Kadhim Sabah Rahimah , Issa Ahmed Abed , Afrah Abood Abdul Kadhim
Although photovoltaic (PV) power generation systems are an efficient way to use solar energy, their conversion efficiency is very low. Keeping the DC output power from the panel consistent is the key challenge with solar PV systems. Radiation and temperature are two variables that can impact a panel's output power. This study proposes a unique hunting-based optimization technique called the Tyrannosaurus optimization algorithm (TROA). It is demonstrated that the TROA can be used to achieve maximum power point tracking (MPPT) for lithium-ion battery charging with solar panels. Tyrannosaurus Rex hunting techniques served as the model for this approach. MPPT is used to regulate the solar array's output in PV systems. A buck converter is used by the charge controller to convert DC to DC. To provide the most power, it is utilized to balance the impedance of batteries and solar panels. To maximize power transfer, the algorithm modifies the gating signal's duty cycle based on the voltage and current detected by the solar panel. Three well-known optimization methods are contrasted with TROA's performance: gorilla troops optimization (GTO) algorithm, perticle swarm optimization (PSO), and cultural algorithm (CA). In contrast to current approaches, the proposed approach has yielded superior results.
Volume: 15
Issue: 1
Page: 170-182
Publish at: 2026-03-01

Multi-modal sensor integration in chicken-fish-vegetable greenhouse agriculture based on internet of things

10.11591/ijres.v15.i1.pp138-149
Muhammad Risal , Pujianti Wahyuningsih , Suwatri Jura , Irmawaty Iskandar , Abdul Jalil
Integrated chicken-fish-vegetable farming is a type of agriculture that combines the benefits of them within a single ecosystem. The objective of this study is to develop a control and monitoring system for integrated greenhouse-based chicken-fish-vegetable farming using the internet of things (IoT). The monitoring method employs the integration of multi-modal sensors in the greenhouse, consisting of a camera, water level, DHT11, pH, TDS, DS18B20, light dependent resistor (LDR), and infrared (IR) sensor. The camera functions as a visual monitoring tool for the farm, water level sensor detects hydroponic water levels, DHT11 measures air temperature and humidity, pH sensor measures water acidity, TDS sensor detects water nutrients, DS18B20 measures pond water temperature, LDR detects weather conditions, and IR sensor measures sunlight intensity. The processing units used to control the sensors and output devices are the ESP32 and Raspberry Pi. The system outputs include a relay for pump control, an LCD for text messages, and IoT information visualization using the Blynk platform. The results of this study demonstrate that the multi-modal sensor device can effectively monitor the conditions of integrated greenhouse-based chicken-fish-vegetable farming, achieving an accuracy of up to 96%, with an average data transmission time of 6 seconds through the Blynk IoT platform.
Volume: 15
Issue: 1
Page: 138-149
Publish at: 2026-03-01

Inquisitive biometric feature analysis and implementation for recognition tasks using camouflaged segmentation with AI and IoT

10.11591/ijres.v15.i1.pp119-129
Mahesh Shankarrao Patil , Harsha J. Sarode , Abhijit Banubakode , Prakash Tukaram Patil , Nutan Patil , Vijayakumar Varadarajan , Deshinta Arrova Dewi
A vital role in reconfigurable and embedded systems which are deployed in smart environements and healthcare monitoring applications is played by human activity recognition (HAR). However, the potential leakage of sensitive user attributes raises serious privacy issues due to collection of data from the end devices and it needs to be transmitted to more powerful platforms for inference. Addressing this key challenge is principally crucial for resource-constrained embedded systems where efficiency of energy is a chief design requirement. The aim of this paper is present an energy-aware, privacy-preserving HAR framework appropriate for low-power embedded platforms. A machine learning–based camouflaged signal segmentation technique is proposed to transform the data collected from the sensor by eliminating sensitive information while preserving activity-relevant features. For characterization of trade off between the energy consumption and accuracy of recognition, parameters are extensively tuned by careful optimization in this proposed model. Experimental evaluations demonstrate that the method significantly reduces the inference of sensitive attributes such as gender, age, height, and weight, with minimal impact on HAR accuracy. Furthermore, the system supports configurable trade-offs between energy usage and classification performance, making it suitable for implementation on low-power embedded devices.
Volume: 15
Issue: 1
Page: 119-129
Publish at: 2026-03-01

Portable verification IP: a UVM-based approach for reusable verification environments in complex IP and SoC verification

10.11591/ijres.v15.i1.pp78-85
Harinagarjun Chippagi , Vangala Sumalatha
Reusable and portable verification techniques are becoming more and more necessary due to the growing complexity of system-on-chip (SoC) designs and the need for quick time-to-market. In order to facilitate cross-project reusability, automation, and scalability in SoC verification, this paper introduces a portable verification IP (PVIP) framework based on the universal verification methodology (UVM). The suggested framework improves coverage efficiency and verification portability across heterogeneous platforms by integrating UVM with the portable stimulus standard (PSS). In comparison to traditional UVM-based methods, experimental evaluation shows that the PVIP framework achieves 92% functional coverage, enhances reusability by 87%, and shortens verification cycle time by 27%. These findings demonstrate how PVIP can greatly speed up verification closure, minimize engineering effort, and assist in the development of the next generation of intelligent, scalable, and industry-ready SoC verification environments.
Volume: 15
Issue: 1
Page: 78-85
Publish at: 2026-03-01

Advances in Parkinson’s disease diagnosis and treatment using artificial intelligence: a review

10.11591/csit.v7i1.p121-130
Mehr Ali Qasimi , Züleyha Yılmaz Acar
Parkinson’s disease (PD) diagnosis and monitoring have significantly improved because to current advancements in artificial intelligence (AI), particularly in the areas of deep learning (DL) and machine learning (ML). Early-stage insensitivity of traditional diagnostic techniques necessitates the use of clever, data-driven alternatives. AI-powered noninvasive diagnostic methods like speech recognition, handwriting analysis, and neuroimaging categorization are the main topic of this technical review. We provide a summary of comparative performance measures from recent models, highlighting their practical usefulness, data modality, and accuracy. Also covered are important issues like data variability, real-world implementation, and model interpretability. Unlike prior surveys that primarily report accuracy metrics, this review explicitly focuses on identifying the gap between experimental AI performance and real-world clinical deployment, emphasizing interpretability, validation, and scalability challenges in PD diagnosis. The purpose of this letter is to provide guidance for researchers creating deployable and clinically valid AI systems for PD detection.
Volume: 7
Issue: 1
Page: 121-130
Publish at: 2026-03-01

Design and development of an enhanced U-shaped microstrip antenna for super wideband applications in next-generation wireless systems

10.11591/ijres.v15.i1.pp204-213
Mani Periyasamy , Shankar Sharma Karthikeyan Jayalakshmi
The proposed enhanced U-shaped microstrip antenna is conceived with the aim of meeting the emerging needs of super wideband (SWB) applications in contemporary wireless communication systems. An efficient upgraded U-shaped patch design, in combination with substrate enhancements and impedance matching methods, is introduced in this work to remarkably increase the operational bandwidth, gain, and radiation efficiency of antenna. The antenna aims SWB achievement with the help of optimized dimensions and it is designed in such a way that it minimizes ground wave losses. It maximizes the impedance matching over a frequency range of 2 MHz to 20 GHz. Through various simulation outputs and experimental verifications, the antenna designed demonstrates excellent performance with a broad impedance bandwidth greater than 100% and the radiation patterns that are stable beyond entire frequency band. This work illustrates that the enhanced U-shaped microstrip antenna can attain the needs of next-generation communication technologies with specific criteria, and it establishes an efficient solution to SWB systems without sacrificing performance, cost, or size issues.
Volume: 15
Issue: 1
Page: 204-213
Publish at: 2026-03-01

FPGA implementation and bit error rate analysis of the forward error correction algorithms in voice signals

10.11591/ijres.v15.i1.pp86-96
Ramjan Khatik , Afzal Shaikh , Shraddha Sawant , Pritika Patil
The idea of codes (VITERBI) is broadly utilized as a part of the wireless communication system as a result of their less complex nature in the decoding of transmitted message. This paper attempts to develop a performance analysis of the decoder by methods for bit error rate (BER) examination. The Galois field based decoder calculation is only utilized as a part of the communication systems. The decoder calculation-based Viterbi based decoder is carried out using field programmable gate arrays (FPGA) and MATLAB. This paper looks at the execution examination of both the calculations. The reconfigurable processor called Microblaze on the Spartan 3E FPGA is utilized for this purpose. MATLAB based code is used to see the BER analysis after the FPGA implementation output.
Volume: 15
Issue: 1
Page: 86-96
Publish at: 2026-03-01

Implementation of face recognition using Python

10.11591/csit.v7i1.p1-9
Febrian Wahyu Christanto , Husnul Arifin , Christine Dewi , Teguh Prasandy
Artificial intelligence (AI)-based technology systems are developing rapidly. Along with technological development the number of criminal cases caused by facial forgery is also growing. Cases of theft and housebreaking with fake photos are a common problem in Semarang. In 2022–2023 the number of cases of theft and housebreaking reached 372,965 with a crime risk level of 137/100,000 people. To overcome this problem the facial recognition system used in the door security system uses digital image processing. This method works by imitating how nerve cells communicate with interconnected neurons, or more precisely, how artificial neural networks function in humans. As training data, image capture and facial recognition are carried out using a webcam and the Python programming language with the TensorFlow library. The image processing algorithm uses 400 facial images with an accuracy rate of 95%. However further development is needed to improve the efficiency and accuracy of the system to produce better results.
Volume: 7
Issue: 1
Page: 1-9
Publish at: 2026-03-01

Bridging archaeological visibility analysis and real-time 3D visualization

10.11591/csit.v7i1.p93-101
George Malaperdas , Georgia Delli
This paper investigates the integration of geographic information systems (GIS)-based visibility analysis—commonly known as viewshed analysis—with real-time 3D rendering in unreal engine, specifically within the context of archaeological and cultural heritage applications. Visibility maps are an essential tool in archaeological research, helping scholars understand the spatial relationships, sightlines, and symbolic visibility between structures, monuments, and landscapes. However, traditional GIS viewshed analysis is often static and limited to 2D environments. This project proposes a method to bring visibility analysis into immersive 3D environments by visualizing GIS-generated data within unreal engine. The methodology involves generating a viewshed from a given digital elevation model (DEM) using established GIS software. The resulting raster is then exported and processed into a texture or material mask compatible with unreal engine. Once imported, the data is mapped onto a 3D landscape model, allowing users to explore visibility dynamically, including first-person or VR-based navigation. This interdisciplinary approach contributes to the field of digital archaeology by enhancing spatial interpretation and audience engagement through immersive geovisualization. It also outlines a flexible pipeline for integrating geospatial datasets into 3D environments, potentially applicable to site management, public education, and digital preservation efforts.
Volume: 7
Issue: 1
Page: 93-101
Publish at: 2026-03-01

Deep learning for sentiment analysis and topic extraction in health insurance

10.11591/csit.v7i1.p66-73
Muzondiwa Karomo , Mainford Mutandavari , Wilton Muzava
Social media has transformed into a vital channel for real-time, unsolicited feedback in healthcare, yet health insurance providers often lack the tools to mine insights from such data. This study proposes a cloud-based system leveraging deep learning for sentiment analysis and topic modeling tailored to the Commercial and Industrial Medical Aid Society (CIMAS) health insurance in Zimbabwe. Using bidirectional encoder representations from transformers (BERT), a convolutional neural network (CNN), a random forest (RF), and autoencoders, the system processes multilingual data from platforms like Twitter and Facebook, identifying customer concerns in real time. Over 15,000 posts were analyzed, with CNN achieving 91.4% accuracy in sentiment classification and BERTopic extracting coherent themes. The system detected issues such as claim delays, app navigation problems, and unreported anomalies. Findings demonstrate that AI can improve service delivery, customer satisfaction, and responsiveness in African insurance contexts.
Volume: 7
Issue: 1
Page: 66-73
Publish at: 2026-03-01

Review on patch antenna for 5G Networks at Ka-Band

10.11591/csit.v7i1.p102-110
Md. Nurullah Al Nasib , Md. Sohel Rana
Microstrip antennas for Ka-band wireless applications will be thoroughly examined in this research. To utilize 5G wireless applications, a new research topic that has been established is the creation of microstrip patch antennas. Patch antennae are made of different shapes, such as rectangles, circular shapes, triangles, donuts, rings, etc. Many substrate materials are used in patch antenna designs. This article examines the geometric configurations of antennas, the many methods of analysis for attributes of antennas, the dimensions of antennas, the issues that antennas face, and the potential solutions to those challenges. Wireless communication technologies, such as television broadcasts, microwave ovens, mobile phones, wireless local area networks (LANs), Bluetooth, global positioning systems (GPS), and two-way radios, all use it. This article examines the geometric structures of antennas, including several characteristics and materials by which they are constructed, as well as the numerous shapes they can produce. This paper will also examine return loss (S11), bandwidth, voltage standing wave ratio (VSWR), gain, directivity, efficiency, and Bandwidth discussed in the prior studies. In the future, a novel patch antenna can be designed for 5G wireless applications.
Volume: 7
Issue: 1
Page: 102-110
Publish at: 2026-03-01

Car selection in games using multi-objective optimization by ratio analysis based on player achievement

10.11591/csit.v7i1.p30-45
Caesar Nafiansyah Putra , Fresy Nugroho , Mochamad Imamudin , Dwi Pebrianti , Jehad Abdelhamid Hammad , Tri Mukti Lestari , Dian Maharani , Alfina Nurrahman
The selection menu in some racing games usually uses a random system for vehicle selection. However, this random feature generally randomizes the selection of the index without considering factors that support the player's abilities. Therefore, this study aims to develop a racing game that can suggest vehicles that have been adjusted to the player's performance. Vehicle recommendations are made using the multi-objective optimization on the basis of ratio analysis (MOORA) method as its method. The MOORA calculation ranks vehicles based on criteria such as mileage, fuel efficiency, speed, agility, and others collected in previous games. The results of this study show the effectiveness of using the MOORA method in recommending vehicles that match the player's skills, thereby improving the overall player experience. In addition, the usability test produced a system usability scale (SUS) score of 82.4, so it is included in the very good category.
Volume: 7
Issue: 1
Page: 30-45
Publish at: 2026-03-01

FPGA implementation of a coprocessor architecture for random data generation and encryption

10.11591/ijres.v15.i1.pp21-30
Manoj Kumar
Coprocessors are designed to perform some specific tasks to enhance system performance and speed. Information security is the main focus in internet of thing (IoT), cryptography, and cybersecurity applications. In this work, a coprocessor architecture is designed to generate 4-bits of random data and perform encryption. Coprocessor architecture uses true random number generator (TRNG) and pseudo-random number generator (PRNG) architectures to generate random data. Modified linear feedback shift register (LFSR)-based PRNG and modified transition effect ring oscillator (TERO) and ring oscillator-based TRNG architectures are designed and implemented for performing encryption. A serial-in-parallel-out (SIPO) shift register circuit is used to generate 4-bit random data. A 15-bit instruction word is assigned to coprocessor architecture to perform its task. The coprocessor architecture is designed using VHSIC Hardware Description Language (VHDL) and implemented on an Artix-7 field programmable gate array (FPGA). All simulation and synthesis results of the proposed coprocessor architecture are obtained by the Xilinx Vivado 2015.2 tool. Coprocessor architecture efficiency (throughput (Mbps)/LUTs) is 2.31, and it operates at a 100 MHz clock.
Volume: 15
Issue: 1
Page: 21-30
Publish at: 2026-03-01
Show 14 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration