Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,593 Article Results

Economical design of WAMS through soft computing: co-optimal PMU placement and communication infrastructure

10.11591/ijres.v14.i3.pp649-658
Banumalar Koodalsamy , Vanaja Narayanasamy , Muralidharan Srinivasan
Recently, utilities have developed and deployed wide area measurement systems (WAMS) to improve the electricity grid's ability to monitor, manage, and defend itself. In a typical WAMS setup, multiple measuring devices, communication systems, and energy management systems work together to gather, transmit, and then analyze data. Although there is substantial interdependence among these three capabilities, most research treats them independently. The work presented here minimizes the total cost of the communication infrastructure (CI) by taking into account the price of phasor measurement units (PMUs) and the placement of a phasor data concentrator (PDC) at the same time. The optimum CI and PDC placement has been built with Steiner tree optimization's help. There have also been practical operating scenarios of more realistic working conditions containing pre-installed PMU, pre-installed fiber optic and N-1 contingency. The optimization hurdle has been overcome by utilizing the binary firefly algorithm (BFFA), which has undergone testing on IEEE 14, 30, and 118 bus systems to demonstrate its effectiveness. A comparison has been offered, and it clearly demonstrates the proposed approach's superiority over previously published articles.
Volume: 14
Issue: 3
Page: 649-658
Publish at: 2025-11-01

Wideband frequency-reconfigurable antenna for sub-6 GHz wireless communication

10.11591/ijres.v14.i3.pp614-625
Tejal Tandel , Samir Trapasiya
This paper presents a compact dual-band frequency-reconfigurable monopole antenna for sub-6 GHz wireless applications. Using a single PIN diode, the antenna switches between 2.7 GHz and 3.9 GHz bands, achieving bandwidths of 472 MHz and 1130 MHz, respectively, with peak gains up to 1.65 dB. The demand for smaller devices has driven the development of compact antennas capable of operating across multiple bands. The main benefits of this antenna include its compact size, enhanced bandwidth, and design simplicity, which is achieved by integrating slots into the patch and introducing a tiny slot etched over the ground plane. The antenna is created using an FR4 material with a thickness of 1.6 mm and dimensions of 25×15 mm². The antenna prototype was fabricated and tested to validate its performance. Simulation optimization reveals that the antenna operates with a gain of 0.9–1.65 dB and a bandwidth of (472–1130 MHz). The design also achieves a VSWR of less than 1.3 and a radiation efficiency between 74% and 78%. The performance enhancement of the reconfigurable antenna was fine-tuned utilizing microwave solvers in both computer simulation technology (CST) and advance design system (ADS).
Volume: 14
Issue: 3
Page: 614-625
Publish at: 2025-11-01

Evaluation of the impact of machine learning on the prediction of residential energy consumption

10.11591/ijeecs.v40.i2.pp567-579
Richar Martín Machaca-Casani , Luis Alfredo Figueroa-Mayta , Joel Contreras-Nuñez
The objective of this research was to compare the performance of machine learning models and traditional statistical methods for the prediction of residential energy consumption, using a dataset with relevant variables such as consumption, temperature, time of day, type of housing, and energy usage habits. A quantitative and comparative methodology was applied, involving data preprocessing, variable encoding, and normalization, as well as division into training and testing sets. The random forest, support vector machine (SVM), deep neural network (MLP), and linear regression models were trained and evaluated using standard metrics such as mean absolute error (MAE), root mean squared error (RMSE), and R² on test and cross-validation sets. Results show that SVM and linear regression achieved better accuracy and generalization capability, while random forest and the deep neural network exhibited lower explanatory power, reflected in negative R² values. Using the trained models, a projection of residential energy consumption for the 2026–2030 period was performed, revealing a generally increasing trend across all models, although with differences in the magnitude of the predictions. In conclusion, under the current conditions, traditional models demonstrate greater robustness, highlighting the need to tailor algorithm selection to the data context. These projections provide a valuable tool for future energy planning.
Volume: 40
Issue: 2
Page: 567-579
Publish at: 2025-11-01

Design of a real-time prayer clock using geographic coordinates

10.11591/ijres.v14.i3.pp834-842
Massoum Noreddine‬‏ , Moulai Khatir Ahmed Nassim
Prayer times and calendar clock are a valuable system that relies on programs that we developed in Mikroc that allow to mathematically calculate these prayer times, which differ from one place (city) to another and from one day to another using geographical coordinates. The more precise these coordinates (latitude and longitude), the more precise the prayer times are. The research that we conducted was carried out using a 16F876A microcontroller that uses the 74HC595 circuit, an 8-bit serial input and parallel output shift register for storage. Outputs can be added to the microcontroller thanks to this. It is possible to manage this integrated circuit from three pins of our microcontroller.
Volume: 14
Issue: 3
Page: 834-842
Publish at: 2025-11-01

The smart e-bike ecosystem integrates internet of things and artificial intelligence

10.11591/csit.v6i3.p307-314
Tole Sutikno , Hendril Satrian Purnama
The smart e-bike ecosystem, a combination of internet of things (IoT) and artificial intelligence (AI), has transformed urban mobility. This study aims to shed light on the transformative potential of the smart e-bike ecosystem in the context of urban transportation solutions. It includes real-time navigation, crash detection, and a smart electric drive to encourage sustainable practices and reduce reliance on traditional vehicles. The use of smart locks and parking beacon systems creates a safe and efficient urban infrastructure, encouraging e-bike use. This approach reduces traffic congestion and carbon emissions. IoT frameworks in smart e-bikes improve the user experience and contribute to urban mobility solutions. Real-time monitoring of critical parameters, such as battery levels, speed, and maintenance requirements, keeps riders informed and safe at all times. IoT-enabled features, such as navigation assistance, shorten travel times and improve the efficiency of urban transportation systems. The evolution of smart e-bikes is consistent with the anticipated improvements of 6G networks, which promise to transform communication infrastructures. AI-powered features such as real-time navigation and crash detection make rides safer. The use of smart electric drives and cloud server technology promotes a data-driven approach to transportation. Future research and development should look into the use of advanced localization techniques to improve user experience while addressing accuracy and energy consumption issues.
Volume: 6
Issue: 3
Page: 307-314
Publish at: 2025-11-01

A dual-model machine learning approach to medicare fraud detection: combining unsupervised anomaly detection with supervised learning

10.11591/csit.v6i3.p245-252
Jesu Marcus Immanuvel Arockiasamy , Gowrishankar Bhoopathi
Medicare fraud, costing $54.35 billion in improper payments in 2024, undermines U.S. healthcare by draining resources meant for vulnerable populations. Traditional detection methods struggle with reactive designs, high false positives, and reliance on scarce labeled data, exacerbated by a 0.017% fraud prevalence. This paper proposes a dual-model machine learning framework to tackle these challenges. Unsupervised anomaly detection uses cluster-based local outlier factor (CBLOF) and empirical cumulative outlier detection (ECOD) to identify novel fraud patterns across 37 million records. These findings are validated by the list of excluded individuals/entities (LEIE). Supervised classification, with C4.5 decision trees and logistic regression, refines these anomalies using an 80:20 balanced dataset, reducing false positives by 63%. Key innovations include hybrid sampling to address class imbalance, LEIE integration for labeled validation, and parallelized processing of 2.1 million claims hourly. Achieving an area under the curve (AUC), a measure of model accuracy, of 88.3%, this approach outperforms single-model systems by 24%, blending exploratory detection with actionable precision. This scalable, interpretable framework potentially advances fraud detection, safeguarding public funds and Medicare’s integrity with a practical, adaptable solution for evolving threats.
Volume: 6
Issue: 3
Page: 245-252
Publish at: 2025-11-01

Experimental analysis and bug abstraction for distributed computation on ray framework

10.11591/ijeecs.v40.i2.pp789-800
Arnaldo Marulitua Sinaga , Wordyka Yehezkiel Nainggolan
This research aims to address challenges in distributed computing, focusing on the ray framework, which has potential for efficient parallel and distributed task execution. While methods such as model-checkers and fuzzing have been applied to detect bugs, both have limitations in handling the complexity of distributed computing, particularly in dealing with issues like state-space explosion and identifying rare bugs. This study proposes an alternative approach through experimental analysis and bug abstraction methods to discover, identify, and classify bugs in the ray framework. Experimental analysis involves isolating and re-testing bugs in a controlled environment to understand their characteristics, while bug abstraction analyzes the factors causing bugs to identify common patterns and characteristics. The results of this research successfully identified three main categories of bugs: crash, performance, and inaccurate status, and revealed bug characteristics that do not depend on actor instance multiplicity, actor type, specific event sequences, or particular configurations. This research makes a significant contribution to the development of more effective and efficient bug detection methods in distributed computing, particularly in the ray framework, and paves the way for further research to enhance the reliability of distributed systems. 
Volume: 40
Issue: 2
Page: 789-800
Publish at: 2025-11-01

Parallel graph algorithms on a RISCV-based many-core

10.11591/ijres.v14.i3.pp843-854
Ashuthosh Moolemajalu Ravikumar , Aakarsh Vinay , Krishna K. Nagar , Madhura Purnaprajna
Graph algorithms are essential in domains like social network analysis, web search, and bioinformatics. Their execution on modern hardware is vital due to the growing size and complexity of graphs. Traditional multi-core systems struggle with irregular memory access patterns in graph workloads. Reduced instruction set computer–five (RISC-V)-based many-core processors offer a promising alternative with their customizable open-source architecture suitable for optimization. This work focuses on parallelizing graph algorithms like breadth-first search (BFS) and PageRank (PR) on RISC-V many-core systems. We evaluated performance based on graph structure and processor architecture, and developed an analytical model to predict execution time. The model incorporates the unique characteristics of the RISC-V architecture and the types and numbers of instructions executed by multiple cores, with a maximum prediction error of 11%. Our experiments show a speedup of up to 11.55× for BFS and 7.56× for PR using 16 and 8 cores, respectively, over single-core performance. Comparisons with existing graph processing frameworks demonstrate that RISC-V systems can deliver up to 20× better energy efficiency on real-world graphs from the network repository.
Volume: 14
Issue: 3
Page: 843-854
Publish at: 2025-11-01

Critical success factor blockchain technology in renewable energy: systematic literature review

10.11591/ijres.v14.i3.pp821-833
Inayatulloh Inayatulloh , Thoyyibah T.
In recent years, blockchain technology has garnered considerable interest in the renewable energy sector. Nonetheless, scholars have yet to investigate the comprehensive assessment of critical success factors (CSFs) for the implementation of blockchain technology in renewable energy. Furthermore, the current research lacks a stage framework or a standardized set of CSFs for blockchain technology. This review study seeks to establish a stage framework and identify a set of common CSFs for the effective adoption of blockchain technology by examining published materials pertinent to the topic under investigation. This evaluation employs a systematic literature review and scientific mapping methodology to objectively ascertain a collection of CSFs. We examined 65 journal articles from the Scopus database and Google Scholar, concentrating on prominent journals, keywords, countries/regions, and documents within the CSF domain of blockchain technology in renewable energy. The findings indicate that nations including China, Australia, the United States, and Germany have made the most significant contributions to this field. Among the 20 CSFs, the foremost five are regulation, integration with current systems, scalability, and security. The proposal delineates four principal research gaps and prospective research trajectories: environmental effect assessment, standardization, user experience and interface design, and management control. The insights and CSF checklist for blockchain technology will facilitate successful exploration and implementation in renewable energy.
Volume: 14
Issue: 3
Page: 821-833
Publish at: 2025-11-01

Performance analysis of REST API in a real-time IoT-based vehicle monitoring system

10.11591/ijres.v14.i3.pp766-784
Rizki Ananta Dwiyanto , Giva Andriana Mutiara , Marlindia Ike Sari
This study studies the design and implementation of a REST API and its performance analysis for an internet of things (IoT)-based vehicles monitoring system. This system incorporates brake pad sensors, a tire pressure monitoring system (TPMS) for assessing tire pressure and temperature, light detection and ranging (LIDAR) for measuring tire thickness, and radio frequency identification (RFID) for tire identification. Data is gathered using an ESP32 microcontroller and transmitted in real-time to the server via a REST API over a wireless network. The JSON Web Token (JWT) authentication mechanism is employed to ensure data security. Testing indicates that this system has an average response time of 4–11 ms, with optimal performance recorded at 3.93 ms for the RFID sensor and peak performance at 9.19 ms for the LIDAR sensor. Load testing with 100 concurrent users demonstrates that the system maintains stability with a 100% data delivery success rate. Authentication testing demonstrates that the API is accessible solely with a valid token, hence preventing unauthorized access. This study's results demonstrate that integrating REST API with IoT monitoring systems facilitates real-time vehicle monitoring, enhances maintenance efficiency, and offers viable solutions for future predictive maintenance systems.
Volume: 14
Issue: 3
Page: 766-784
Publish at: 2025-11-01

Classification metrics for pet adoption prediction with machine learning

10.11591/ijres.v14.i3.pp638-648
Islamiyah Islamiyah , Muhammad Rivani Ibrahim , Suwardi Gunawan , Dyna Marisa Khairina , Erniati Erniati
Millions of pets are temporarily placed in shelters, making it challenging for shelters to ensure pets find permanent homes. High adoption rates are crucial for animal welfare and the sustainability of shelter operations. This study aims to identify key factors influencing pet adoption and create classification metrics using five machine learning (ML) classification model approaches to predict the likelihood of pet adoption, to find the best model performance for each analysis. The dataset was obtained from several features related to animal characteristics and adoption conditions. The results of the study present classification of metric models that indicate decision tree and random forest (RF) as the most effective models with superior performance in terms of accuracy and class separation ability. Further research provides initial exploration of ML models that are not only limited to classification models but also model integration into internet of things (IoT) systems for the implementation of a pet adoption prediction system based on ML inference. The implementation of ML classification models helps improve the efficiency of animal adoption programs and optimize shelter operations, ultimately increasing the chances of successful pet adoption. The results of the study provide insights into factors influencing pet adoption, minimizing the length of stay (LOS) in shelters, and contribute to practitioners/ researchers as a reference for exploring new related factors and exploring the performance of ML models, especially classification models.
Volume: 14
Issue: 3
Page: 638-648
Publish at: 2025-11-01

Implementation of hardware security module using elliptic curve cryptography for cyber-physical system

10.11591/ijres.v14.i3.pp705-716
B. Muthu Nisha , J. Selvakumar
The vision of sustainable development goal 9 (SDG 9) is realized through the integration of innovative technologies in the cyber-physical system (CPS). This work focuses on a smart network meter (SNM) application, designed to manage the extensive big data analytics required for processing and analyzing vast amounts of aggregated data in a short period. To address these demands, an advanced explicitly parallel instruction computing (AEPIC) approach is employed, leveraging a multi-core hardware security module (HSM) built on the elliptic curve cryptography (ECC) algorithm. Implementing the algorithm on various field programmable gate arrays (FPGAs) ensures adaptability to different hardware configurations, delivering scalable and optimized performance for big data aggregation in SNM applications. The proposed module showcases exceptional performance in design analysis. The Virtex-7 FPGA demonstrates excellent suitability for big data analytics in smart network applications, with dynamic power consumption accounting for 55% of total power and an on-chip power of 0.542 watts.
Volume: 14
Issue: 3
Page: 705-716
Publish at: 2025-11-01

Water quality monitoring using soft computing techniques in Udupi Region, Karnataka, India

10.12928/telkomnika.v23i5.26228
Krishnamurthy; Manipal Academy of Higher Education Nayak , Sumukha K.; Birla Institute of Technology and Science (BITS) Nayak , Supreetha Balavalikar; Manipal Academy of Higher Education Shivaram
A monitoring of water quality index parameters using soft computing technology is the current research focus as the main challenge of which is to design a soft computing algorithm with the highest accuracy and less computation time. For the secondary dataset obtained by the government database, this research proposes a water quality prediction and classification method based on decision tree algorithm. The comparative analysis is made for the different highest accuracy algorithms like decision tree algorithm with support vector machine (SVM), k-nearest neighbour (KNN) classifier, linear discriminant analysis, Naïve Bayes classifier and logistic regression. Decision tree algorithm had the highest accuracy compared to other algorithms. The KNN algorithm used as clustering algorithm to plot the two classes good and bad. The trend analysis of the water quality is performed with various water quality parameters like pH, fluoride and total dissolved solids (TDS) test results are plotted and observed for the variations of the values with respect to increase in time. The performance is measured with statistical indices and the prediction accuracy of 0.99 and mean squared error of 0.05. The results prove that the KNN algorithm found to be better for clustering purposes.
Volume: 23
Issue: 5
Page: 1333-1341
Publish at: 2025-10-10

DDoS attack detection using optimal scrutiny boosted graph convolutional and bidirectional long short-term memory

10.12928/telkomnika.v23i5.27046
Huda Mohammed; Urmia University Ibadi , Asghar Asgharian; Urmia University Sardroud
The distributed denial of service (DDoS) attack occurs when massive traffic from numerous computers is directed to a server or network, causing crashes and disrupting functionality. Such attacks often shut down websites or applications temporarily and remain among the most critical cybersecurity challenges. Detecting DDoS is difficult and must occur before mitigation. Recently, machine learning and deep learning (ML/DL) have been employed for detection; however, architectural limitations restrict their effectiveness against evolving attack methods. This paper presents a novel framework, scrutiny boosted graph convolutional–bidirectional long short-term memory and vision transformer (SBGC-BiLSTM-ViT), which integrates graph convolutional, BiLSTM, and ViT models with machine learning classifiers such as support vector machine (SVM), Naïve Bayes (NB), random forest (RF), and K-nearest neighbors (KNN). The integration enables autonomous extraction of critical features, enhancing precision in detecting and classifying DDoS attacks. To further boost performance, a Bayesian optimization algorithm (BOA) is applied for hyperparameter tuning of SBGC and ML methods. Evaluation on benchmark datasets UNSW-NB15 and CICDDoS2019 demonstrates that the proposed approach achieves higher accuracy and effectively identifies new DDoS variants, outperforming conventional methods.
Volume: 23
Issue: 5
Page: 1212-1227
Publish at: 2025-10-01

Lexicon-based comparison for suicide sentiment analysis on Twitter (X)

10.12928/telkomnika.v23i5.25711
Munawar; Esa Unggul University Munawar , Dwi; Universitas Esa Unggul Sartika , Fathinatul; Esa Unggul University Husnah
Suicidal individuals frequently share their desires on social media. As a result, it was determined that a learning machine for early detection of suicide issues on social media was required. This study aims to examine Twitter (X) users’ suicide-related sentiment expressions. The results of searching X for the keywords ‘suicide’, ‘wish to die’, and ‘want to commit suicide’ for 4 months yielded 5,535 tweets. Following the cleaning process, 2,425 tweets were collected. The findings of labeling with the lexicon-based valence aware dictionary and sentiment reasoner (VADER) and Indonesia sentiment (INSET) lexicon, which psychologists confirmed, revealed that VADER was more accurate (92.1%) than INSET (81.6%). Sentiment research reveals negative (86.4%), positive (11.1%), and neutral (2.5%) sentiment. Support vector machine (SVM), K-nearest neighbor (KNN), and Naïve Bayes modeling results show accuracy above 86%, with SVM having the best accuracy (87.65%). Because of its great accuracy, this model can be used to identify and analyze suspicious behavior relating to suicide on X. Further research is still required, despite the excellent identification of early indicators of suicide ideation from social media posts.
Volume: 23
Issue: 5
Page: 1314-1322
Publish at: 2025-10-01
Show 15 of 1907

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration