Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,593 Article Results

Impact of criticality analysis on the operational availability of Scooptrams LH203 in the Huarochirí Mining Industry

10.11591/ijeecs.v40.i1.pp118-126
José Castro Puma , Jorge Augusto Sánchez Ayte , Margarita Murillo Manrique , Jacinto Joaquín Vertiz Osores , Richard Flores Caceres
This study addresses the decline in the operational availability of low-profile loading equipment used in underground mining, a challenge primarily attributed to shortcomings in the implementation of preventive maintenance strategies. The main objective is to propose a preventive maintenance model based on criticality analysis aimed at improving the availability and operational efficiency of such equipment. Adopting a quantitative approach with a non-experimental, cross-sectional design, the research applies a descriptive method to assess the impact of the maintenance plan on equipment availability, using operational and maintenance data collection and analysis. The results reveal a significant increase in equipment availability from 79.20% to 92.57% following the implementation of the model. This highlights the relevance of maintenance strategies grounded in criticality analysis and real-time monitoring technologies. The findings underscore the success of the proposed model in enhancing both availability and operational efficiency, and demonstrate its potential for replication in other mining sectors to promote safer and more efficient operations.
Volume: 40
Issue: 1
Page: 118-126
Publish at: 2025-10-01

Phishing URL prediction – two-phase model using logistic regression and finite state automata

10.11591/ijeecs.v40.i1.pp356-365
Nisha T N , Dhanya Pramod
The human factor in security is more important when they become the carriers of attacks on enterprises. Phishing attacks can be classified as insider attacks when the employees unintentionally participate in the attack propagation. Since complete user training is a myth, enterprises must implement detection tools for phishing attacks on their network perimeters. This research discusses a two-phase model for phishing URL detection, in which the first phase identifies the properties of URLs that detect phishing and their relative weight using logistic regression. The second phase checks the probability of a new URL being categorized as phishing using the knowledge achieved during the first phase using the dynamically created Finite state machines. The model defines a malicious score (MS), which can be used to check any URL in real-time to identify whether it is phishing or not. The model described in this work has been experimented with different benchmarking datasets to verify the performance. The model provided a decent result in classifying a URL as phishing or naive. The malicious score (MS) defined by this model can be used to evaluate any URL and can be used as a filtering mechanism for end-point phishing URL detection. The key contribution is towards developing a two-phase model which evaluates the URL with the help of self-crafted features without reliance on a feature set. This accommodates the model's hyper-competitive phishing URL detection area in cyber security.
Volume: 40
Issue: 1
Page: 356-365
Publish at: 2025-10-01

Machine identification codes of color laser printers: revisiting privacy and security

10.11591/ijeecs.v40.i1.pp137-145
Shreya Arora , Rajendra Kumar Sarin , Pooja Puri
Forging legal documents has been easier and faster with the advancement of technology. Printer identification has become a critical field for tracing criminals and validating the authenticity of documents. The current study uses a non-destructive method to detect and identify covert embedded hidden information (machine identification codes (MIC)). Samples were collected from popular brands, including Xerox and HP color laser printers, to attain this aim. Their printouts were then scanned at 600 dpi using a Konica Minolta scanner. Scanned images were subjected to graphic editors for linear and non-linear adjustments. Following this, yellow-toner dots were observed as a base pattern. Grayscale imaging with a computational approach to analyze the yellow dot patterns was utilized for intensity-focused analysis, with edge detection algorithms applied using Python to enhance and highlight the converted patterns in printed documents. The printouts from Xerox printers exhibited repeating patterns. However, no such detailed information was observed in prints from HP printers, even when analyzed using binary code for deductions. A notable variation was detected in the yellow tracking dots among both brands, which can be instrumental in identifying the origin of printouts and scanned images for forensic investigations. This methodology provides conclusive and dependable accuracy.
Volume: 40
Issue: 1
Page: 137-145
Publish at: 2025-10-01

A multi-path routing protocol for IoT-based sensor networks

10.11591/ijeecs.v40.i1.pp225-235
Udaya Suriya Rajkumar Dhamodharan , Krishna Prasad Karani , Saranya Pichandi , Kavitha Palani , Sathiyaraj Rajendran
Internet of things (IoT) based sensors are to link a big number of low-cost and power-integrated devices in a reliable manner. Numerous military and adventurous applications are regulated by communication among IoT sensors. The multi-path routing protocol (MRP) approach presented in this research to enhance secure routing in IoT sensors is significant. This technique makes use of data transfer routing and the relationships between network components. It finds the most efficient route between the nodes that minimizes communication overhead and is both reliable and economical in terms of shortest duration. The particle swarm optimization (PSO) technique is used to find the shortest path that is most cost-effective. To reach the target node, end-to-end data transmission must transit via intermediary nodes, which are provided by the routing path node history. The optimal path is chosen by MRP from PSO, and it traces the path to identify the intermediate nodes. In the unlikely event of a crisis, MRP offers the most affordable backup route for data transfer. When compared to earlier techniques, the outcomes of these current approaches enhance network efficiency, balance energy consumption among nodes, and routing attacks.
Volume: 40
Issue: 1
Page: 225-235
Publish at: 2025-10-01

Distributed formation control with obstacle and collision avoidance for humanoid robot

10.11591/ijeecs.v40.i1.pp108-117
Faisal Wahab , Bambang Riyanto Trilaksnono
Formation control has become a popular research topic in recent years. A common challenge in formation control is ensuring that robots can avoid obstacles and maintain a safe distance from one another to prevent collisions while forming a formation. In this research, a distributed formation control approach for a multi-robot system (MRS) with obstacle and collision avoidance is presented. The distributed formation control architecture is based on a consensus algorithm and consists of four layers: consensus tracking, consensus-based formation control, behavior, and physical robot layers. The system was implemented and evaluated through both simulations and experiments. Humanoid robots were used as the platform for these implementations. The result of the simulations and experiments show that the distributed formation control system successfully guided the robots into desired formation while also avoiding obstacles and preventing collisions with other robots.
Volume: 40
Issue: 1
Page: 108-117
Publish at: 2025-10-01

Gender identification from tribal speech using several learning techniques

10.11591/ijeecs.v40.i1.pp316-326
Subrat Kumar Nayak , Kumar Surjeet Chaudhury , Nirmal Keshari Swain , Yugandhar Manchala , Ajit Kumar Nayak , Smitaprava Mishra , Nrusingha Tripathy
Language processing and linguistics researchers are interested in gender identification through audio, as human voices have many distinctive features. Although several gender identification algorithms have been developed, the accuracy and efficiency of the system can still be improved. Despite extensive studies on the topic in various languages, there aren’t many studies on gender identification in the KUI language. Using a variety of machine learning (ML) and deep learning (DL) classifiers, including decision tree (DT), multilayer perceptron (MLP), gradient boosting (GB), linear discriminant analysis (LDA), recurrent neural networks (RNN), long short-term memory (LSTM), gated recurrent units (GRU), and transformer, the goal of this study is to assess the accuracy of gender identification among diverse KUI language speakers. To verify the effectiveness of the suggested model, several prediction evaluation metrics were calculated, such as the area under the receiver operating characteristic curve (AUC), F1-score, precision, accuracy, and recall. While the findings are compared to other learning models, the gradient-boosting strategy yielded better results with an accuracy rate of 97.0%.
Volume: 40
Issue: 1
Page: 316-326
Publish at: 2025-10-01

Design of high-efficiency microinverter for a photovoltaic system with low harmonic distortion

10.11591/ijeecs.v40.i1.pp67-77
Walter Naranjo Lourido , Jhon Manuel Sanchez Fierro , Diana Paola Monroy Cadena , Javier Eduardo Martínez Baquero
This article presents the design of a modular pure sine wave microinverter with a high-efficiency maximum power point tracking (MPPT) regulator for photovoltaic (PV) systems. The design starts with a DC/DC buck-boost chopper regulator, simulated using the perturb and observe (P&O) algorithm. Next, a high-frequency DC/AC conversion stage is implemented using a toroidal transformer to achieve various voltage levels and isolated power sources. Finally, a 27-level multilevel inverter is designed to produce a pure sine wave with minimal total harmonic distortion (THD). Simulation results indicate that the microinverter achieves a total efficiency of 90% and produces a pure wave output with 3% harmonic distortion. Compared to commercial solutions, the proposed design enhances efficiency while integrating key components. Additionally, the system maintains a cost-effectiveness and directly proportional to its energy efficiency, making it a viable and cost-effective solution for PV energy conversion.
Volume: 40
Issue: 1
Page: 67-77
Publish at: 2025-10-01

Realization of Bernstein-Vazirani quantum algorithm in an interactive educational game

10.12928/telkomnika.v23i5.26929
David; Calvin Institute of Technology Gosal , Timothy Rudolf; Calvin Institute of Technology Tan , Yozef; Calvin Institute of Technology Tjandra , Hendrik Santoso; Calvin Institute of Technology Sugiarto
Quantum algorithms are celebrated for their computational superiority over classical counterparts, yet they pose significant learning challenges for non-physics audiences. Among these, the Bernstein-Vazirani (BV) algorithm stands out for its quantum speedup by efficiently identifying a secret binary string. However, the accessibility of such algorithms remains constrained by their inherent technical complexity. To address this educational gap, this paper introduces a gamified, web-based tool that innovatively reinterprets the BV algorithm’s complex mathematical settings through an into engaging scenario of identifying broken lamps. Players assume the role of an investigator, utilizing both classical and quantum solvers to identify faulty lamps with minimal queries. By transforming the BV algorithm into an intuitive gameplay experience, the tool helps reducing technical barriers, making quantum concepts much more comprehensible for educators and students than traditional methods that demand rigorous mathematical understanding. Developed using Qiskit, IBM’s Python package for quantum computation, and deployed via Flask, a popular Python microframework for building web applications, the game effectively simplifies complex quantum algorithms while demonstrating the practical applications of quantum speedup. This contribution advances quantum education by merging technical depth with interactive design, fostering a broader understanding of quantum principles and inspiring new innovations in gamified learning.
Volume: 23
Issue: 5
Page: 1247-1257
Publish at: 2025-10-01

Forecasting of nuclear energy trends in Romania using XGBoost

10.11591/ijeecs.v40.i1.pp78-84
Suman Chowdhury , Dilip Kumar Das
The energy demand continues to rise due to the exponential growth of the world's population. In today's world, every aspect of life, including industry, education, household, transport, and healthcare, relies on energy. Generating power in an environmentally friendly manner is a major concern. Predicting nuclear energy production depends on various factors. Researchers used the extreme gradient boost (XGBoost) machine learning algorithm for prediction. The study revealed that the RMSE validation value is 25.10810, while the training value is 15.01759 after 2000 iterations. According to the study, Romania has the potential to produce 1,300 MW of electricity in a single day through nuclear energy. Nuclear energy production can be a viable solution for decarburization and meeting energy needs. The prompt of nuclear energy in the present world is harnessing to the utmost level so that energy crisis can be mitigated for a long run. This paper tries to show the potentiality of nuclear energy in Romania predicting the future trends with the help of time series analysis.
Volume: 40
Issue: 1
Page: 78-84
Publish at: 2025-10-01

DigiScope: IoT-enhanced deep learning for skin cancer prognosis

10.11591/ijeecs.v40.i1.pp202-215
Aymane Edder , Fatima-Ezzahraa Ben-Bouazza , Oumaima Manchadi , Idriss Tafala , Bassma Jioudi
In dermatology, early identification and intervention are crucial for optimizing patient outcomes in skin cancer care. Recent technological advances, particularly in the internet of things (IoT), have led to significant growth in telemedicine. This study introduces a cutting-edge system that proactively predicts the emergence of skin cancer by combining deep learning algorithms, IoT devices, and sophisticated medical imaging techniques. The experimental setup leverages a high-resolution mobile camera for dermoscopy, associated with a cloud-integrated machine learning framework. The proposed algorithm comprehensively examines lesion characteristics, Utilizing color, texture, and shape characteristics to evaluate the probability of malignancy. Subsequently, a cloud-hosted machine learning model analyzes and scrutinizes the collected data, yielding a thorough diagnostic evaluation. Initial results reveal that this system achieves an impressive predictive accuracy rate exceeding 97.6%, enabling swift and efficient skin cancer detection. These promising findings emphasize the potential for rapid, efficient, and proactive diagnosis, significantly improving patient prognosis and reinforcing the value of telemedicine in contemporary healthcare.
Volume: 40
Issue: 1
Page: 202-215
Publish at: 2025-10-01

Optimal placement of wind turbine to minimize voltage variance in distributed grid considering harmonic distortion

10.11591/ijeecs.v40.i1.pp57-66
Dinh Chung Phan , Dinh Truc Ha
This paper suggested an algorithm to choose the optimal location of wind turbines (WT) in a distribution grid. The optimal position is calculated so that the maximal voltage variance in the distribution grid is minimized. This paper considers the harmonic current emitted by WT and the limitation of total harmonic distortion of voltage waves at nodes in the distribution grid. This proposed approach is written in MATLAB software and validated through a sample distribution grid, IEEE 33-bus. The verifying results demonstrated that by applying the suggested algorithm, the maximal voltage variance due to the variation of the power output of WT is minimized, the total harmonic distortion value at all buses remains within the operating range, and the electrical loss in the grid is reduced. Moreover, by considering the limitation of total harmonic distortion, the number of WT allowed to be installed in the grid is able to limited.
Volume: 40
Issue: 1
Page: 57-66
Publish at: 2025-10-01

Substrate thickness variation on the frequency response of microstrip antenna for mm-wave application

10.12928/telkomnika.v23i5.26731
Bello Abdullahi; Universiti Sains Malaysia Muhammad , Mohd Fadzil; Universiti Sains Malaysia Ain , Mohd Nazri; Universiti Sains Malaysia Mahmud , Mohd Zamir; Universiti Sains Malaysia Pakhuruddin , Ahmadu; Universiti Sains Malaysia Girgiri , Mohamad Faiz Mohamed; Collaborative Microelectronic Design Excellence Center (CEDEC) Omar
Substrate height (Hs) is an important parameter that influences antenna propagation. This research designed a low-profile 28 GHz microstrip antenna on a polyimide substrate with varying Hs using CST Studio software. The simulated results and MINITAB software were used to develop regression model equations, which analyzed the impact of Hs variation on the antenna performance. The proposed models’ equations have indicated an increase in average responses of resonant frequency (Fr), percentage bandwidth (% BW), gain (G), return loss (RL), and efficiency (ƞ) as the Hs decreased. The antenna achieved a BW of 3.87 GHz at Hs 0.525 mm and 5.54 GHz at 0.025 mm, a G of 3.89 dBi at Hs 0.525 mm and 3.91 dBi at Hs 0.025 mm, and an ƞ of 94.19% at Hs 0.525 mm and 98.24% at Hs 0.025 mm. The antenna was fabricated and tested, and the experimental results were validated with the models’ equations. The thinner substrate resulted in an improvement in the antenna performance.
Volume: 23
Issue: 5
Page: 1188-1200
Publish at: 2025-10-01

Development of hydraulic servo controller for mechanical testing with optimization of PID tuning methods

10.12928/telkomnika.v23i5.26784
Djoko Wahyu; BRIN Karmiadji , Harris; BRIN Zenal , Dede Lia; Universitas Pancasila Zariatin , Arif; Indonesian Institute of Technology Krisbudiman , Andi Muhdiar; BRIN Kadir , Yudi; BRIN Irawadi , Indra Hardiman; BRIN Mulyowardono , Budi; BRIN Prasetiyo , Nofriyadi; BRIN Nurdam , Tri; BRIN Widodo
This study explores the use of hydraulic servo control (HSC) systems in static and dynamic structural testing, focusing on optimizing proportional, integral, derivative (PID) controller tuning. The HSC system comprises three main components: hydraulic, control, and measurement systems. To achieve optimal performance, the research begins with preparing setpoint displacement/force data and developing mathematical models for the cylinder actuator and servo valve, incorporating sensors like load cells and linear variable differential transducers (LVDTs). A closed-loop transfer function is used to predict outputs that align closely with setpoint values. Three PID tuning methods—Ziegler-Nichols, Cohen-Coon, and adaptive control—are evaluated. Simulation results show all methods yield satisfactory performance with evaluation errors below 1.5%. Implementation tests further confirm effectiveness, with root mean square deviation (RMSD) values under 1%, indicating high precision. Despite promising results, the study acknowledges limitations due to restricted datasets and test conditions. Future research should address broader dynamic load variations, nonlinearities such as fluid leakage and hysteresis, and integrate intelligent optimization techniques like machine learning to enhance robustness and adaptability. This work contributes to improving the reliability and accuracy of HSC systems in structural testing, paving the way for smarter, more responsive control strategies in engineering applications.
Volume: 23
Issue: 5
Page: 1404-1414
Publish at: 2025-10-01

DDoS attack detection using optimal scrutiny boosted graph convolutional and bidirectional long short-term memory

10.12928/telkomnika.v23i5.27046
Huda Mohammed; Urmia University Ibadi , Asghar Asgharian; Urmia University Sardroud
The distributed denial of service (DDoS) attack occurs when massive traffic from numerous computers is directed to a server or network, causing crashes and disrupting functionality. Such attacks often shut down websites or applications temporarily and remain among the most critical cybersecurity challenges. Detecting DDoS is difficult and must occur before mitigation. Recently, machine learning and deep learning (ML/DL) have been employed for detection; however, architectural limitations restrict their effectiveness against evolving attack methods. This paper presents a novel framework, scrutiny boosted graph convolutional–bidirectional long short-term memory and vision transformer (SBGC-BiLSTM-ViT), which integrates graph convolutional, BiLSTM, and ViT models with machine learning classifiers such as support vector machine (SVM), Naïve Bayes (NB), random forest (RF), and K-nearest neighbors (KNN). The integration enables autonomous extraction of critical features, enhancing precision in detecting and classifying DDoS attacks. To further boost performance, a Bayesian optimization algorithm (BOA) is applied for hyperparameter tuning of SBGC and ML methods. Evaluation on benchmark datasets UNSW-NB15 and CICDDoS2019 demonstrates that the proposed approach achieves higher accuracy and effectively identifies new DDoS variants, outperforming conventional methods.
Volume: 23
Issue: 5
Page: 1212-1227
Publish at: 2025-10-01

Lexicon-based comparison for suicide sentiment analysis on Twitter (X)

10.12928/telkomnika.v23i5.25711
Munawar; Esa Unggul University Munawar , Dwi; Universitas Esa Unggul Sartika , Fathinatul; Esa Unggul University Husnah
Suicidal individuals frequently share their desires on social media. As a result, it was determined that a learning machine for early detection of suicide issues on social media was required. This study aims to examine Twitter (X) users’ suicide-related sentiment expressions. The results of searching X for the keywords ‘suicide’, ‘wish to die’, and ‘want to commit suicide’ for 4 months yielded 5,535 tweets. Following the cleaning process, 2,425 tweets were collected. The findings of labeling with the lexicon-based valence aware dictionary and sentiment reasoner (VADER) and Indonesia sentiment (INSET) lexicon, which psychologists confirmed, revealed that VADER was more accurate (92.1%) than INSET (81.6%). Sentiment research reveals negative (86.4%), positive (11.1%), and neutral (2.5%) sentiment. Support vector machine (SVM), K-nearest neighbor (KNN), and Naïve Bayes modeling results show accuracy above 86%, with SVM having the best accuracy (87.65%). Because of its great accuracy, this model can be used to identify and analyze suspicious behavior relating to suicide on X. Further research is still required, despite the excellent identification of early indicators of suicide ideation from social media posts.
Volume: 23
Issue: 5
Page: 1314-1322
Publish at: 2025-10-01
Show 18 of 1907

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration