Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

25,002 Article Results

Determination of biomass energy potential based on regional characteristics using adaptive clustering method

10.11591/ijece.v15i1.pp46-55
Ginas Alvianingsih , Haslenda Hashim , Jasrul Jamani Jamian , Adri Senen
Determining the energy potential of biomass is the first step in selecting the most suitable and efficient energy conversion technology based on regional characteristics. The approach to estimating and determining biomass potential generally uses geospatial technology related to collecting and processing data about mapping an area. Unfortunately, this method is inadequate for simulating the interaction between variables, nor can it provide accurate predictions for the biomass supply chain. As a result, the results obtained from this method tend to be biased and macro, particularly in regions experiencing rapid land-use development. In this paper, the author has developed a clustering methodology with a fuzzy c-means (FCM) algorithm to determine biomass energy potential based on regional characteristics to produce data clusters with high accuracy. Grouping the characteristics of clustering-based areas involves grouping physical or abstract objects into classes or similar objects.
Volume: 15
Issue: 1
Page: 46-55
Publish at: 2025-02-01

A novel secure and energy aware LOADng routing protocol for IoT: an application to smart agriculture

10.11591/ijeecs.v37.i2.pp1005-1013
Touhami Sana , Belghachi Mohamed
In the burgeoning domain of the internet of things (IoT), efficient and secure communication protocols are crucial for the seamless operation of diverse applications. This paper proposes a novel routing protocol, termed secure and energy aware LOADng (SEA-LOADng), tailored for IoT deployments in the context of smart agriculture. The protocol is designed to address the unique challenges posed by agricultural environments, including limited energy resources and the need for robust security measures. The proposed protocol leverages LOADng, a lightweight and efficient routing protocol suitable for low-power and lossy networks characteristic of IoT deployments. Through innovative energy-aware mechanisms, it optimizes the power usage of IoT devices, thus prolonging their operational lifespan and reducing maintenance overhead. Moreover, stringent security measures are integrated into the protocol to safeguard sensitive data transmitted within the IoT network. To assess the efficacy of the proposed protocol, comprehensive simulations are carried out using realistic smart agriculture scenarios. The results demonstrate significant improvements in energy efficiency compared to LOADng protocol, while maintaining robust security against hello flood attack.
Volume: 37
Issue: 2
Page: 1005-1013
Publish at: 2025-02-01

Timed concurrent system modeling and verification of home care plan

10.11591/ijece.v15i1.pp870-882
Acep Taryana , Dieky Adzkiya , Muhammad Syifa'ul Mufid , Imam Mukhlash
A home care plan (HCP) can be integrated with an electronic medical records (EMR) system, serving as an example of a real-time system with concurrent processes. To ensure effective operation, HCPs must be free of software bugs. In this paper, we explore the modeling and verification of HCPs from the perspective of scheduling data operationalization. Specifically, we investigate how patients can obtain home services while preventing scheduling conflicts in the context of limited resources. Our goal is to develop and verify robust models for this purpose. We employ formalism to construct and validate the model, following these steps: i) develop requirements and specifications; ii) create a model with concurrent processes using timed automata; and iii) verify the model using UPPAAL tools. Our study focuses on HCP implementation at a regional general hospital in Banyumas District, Central Java, Indonesia. The results include models and specifications based on timed automata and timed computation tree logic (TCTL). We successfully verified a concurrent model that utilizes synchronized counter variables and a sender-receiver approach to analyze collision constraints arising from the synchronization of patient and resource plans.
Volume: 15
Issue: 1
Page: 870-882
Publish at: 2025-02-01

Measuring anxiety level on phobia using electrodermal activity, electrocardiogram and respiratory signals

10.11591/ijece.v15i1.pp337-348
Khusnul Ain , Osmalina Nur Rahma , Endah Purwanti , Richa Varyan , Sayyidul Istighfar Ittaqilah , Danny Sanjaya Arfensia , Tiara Dyah Sosialita , Fitriyatul Qulub , Rifai Chai
People with spider phobia experience excessive anxiety reactions when exposed to spiders that will interfere with daily life. Diagnosing and measuring anxiety levels in patients with spider phobia is a complex challenge. Conventional diagnosis requires psychological evaluations and clinical interviews that take time and often result in a high degree of subjectivity. Therefore, there is a need for a more objective and efficient approach to measuring anxiety levels in patients. This study performs anxiety level classification based on electrodermal activity, electrocardiogram (ECG) and respiratory signals using the dataset of Arachnophobia subjects. Each raw data is preprocessed using 24 types of features. Feature performance is processed using the recursive feature elimination method. Data processing was performed in 3 anxiety levels (high, medium, low) and two anxiety levels (high, low) with the support vector machine method and hold-out validation method (7:3). The performance of the model is evaluated by showing the accuracy, precision, recall and F1 score values. The polynomial kernel can perform optimal classification and obtain 100% accuracy in 2 classes and three classes with 100% precision, recall, and F1 score values. This result shows excellent potential in measuring anxiety levels that correlate with mental health issues.
Volume: 15
Issue: 1
Page: 337-348
Publish at: 2025-02-01

Navigating the smart contract threat landscape: a systematic review

10.11591/ijeecs.v37.i2.pp1209-1224
Unyime Ufok Ibekwe , Uche M. Mbanaso , Nwojo Agwu Nnanna , Umar Adam Ibrahim
Smart contracts have emerged as a transformative technology within the blockchain ecosystem, facilitating the automated and trustless execution of agreements. Their adoption spans diverse sectors such as education, agriculture, healthcare, government, real estate, transportation, supply chain, and global initiatives like Central Bank Digital Currencies (CBDCs). However, the security of smart contracts has become a significant concern, as vulnerabilities in their design and implementation can lead to severe consequences such as financial losses and system failures. This systematic review consolidates findings from 78 selected research articles, identifying key vulnerabilities affecting smart contracts and categorizing them into a taxonomy encompassing code-level, environment-dependent, and user-related vulnerabilities. It also examines the threats that exploit these vulnerabilities and the most effective detection techniques. The domain-based classification presented in this review aims to assist researchers, software engineers, and developers in identifying and mitigating significant security flaws related to the design, implementation, and deployment of smart contracts. A comprehensive understanding of these issues is essential for enhancing the security and reliability of the blockchain ecosystem, ultimately fostering the development of more secure and robust decentralized applications for end users.
Volume: 37
Issue: 2
Page: 1209-1224
Publish at: 2025-02-01

Innovative power sharing and secondary controls for meshed microgrids

10.11591/ijece.v15i1.pp99-113
Youssef Amine Ait Ben Hassi , Youssef Hennane , Abdelmajid Berdai
In alternating current (AC) microgrids, the prevalent approach for controlling the power distribution between generators and loads is droop control. This decentralized technique ensures accurate power sharing; however, its utility is restricted by significant drawbacks. Notably, in scenarios involving dissimilar power sources, mismatched impedance lines, or meshed microgrids, conventional droop control fails to ensure effective reactive power sharing among inverters, often leading to notable circulating currents. Hence, the primary objective of this paper is twofold: firstly, to examine limitations inherent to conventional droop control; secondly, to introduce a robust power-sharing methodology for AC microgrids. This novel approach is specifically designed to achieve consistent sharing of active and reactive power across meshed topology microgrids. The technique considers the presence of distributed power loads and the dynamic nature of the topology. Despite the attainment of satisfactory active and reactive power sharing, deviations in voltage and frequency occasionally manifest. To address this issue, a supplementary control mechanism is proposed as a third phase. This secondary control method focuses on reinstating the microgrid's voltage and frequency to rated values, all while upholding the precision of power sharing. The efficacy of this multi-stage methodology is rigorously validated through simulations using MATLAB/Simulink and practical experimentations.
Volume: 15
Issue: 1
Page: 99-113
Publish at: 2025-02-01

A review and bibliometric analysis of traceability system development in the agricultural and food sector in Indonesia

10.11591/ijeecs.v37.i2.pp1064-1076
Yusnan Hasani Siregar , Pradeka Brilyan Purwandoko , Wiwiek Harsonowati , Muhammad Achirul Nanda , Rudy Tjahjohutomo , Diana Atma Budiman , Laila Rahmawati , Novita Dwi Susanti
Several technologies and methods for traceability systems in the agriculture and food sectors have developed rapidly in recent decades. There has been an increase in traceability system research in many developing countries, including Indonesia. Our review collects data from the Scopus database to study the development and dynamics of research on traceability systems and to identify emerging technological trends in the field. This paper uses bibliometric analysis by VOSviewer to find out studies regarding traceability. Our findings reveal traceability system research in Indonesia encompasses 1,264 documents within the Scopus database from 1998 to 2022. The number of studies on traceability systems has increased significantly after 2016. Most scholarly articles on traceability technology are disseminated as conference proceedings. These traceability systems have been established and are widely adopted to ensure the quality and safety of agricultural and food products, monitor species diversity, and oversee environmental parameters. The objective of the user influences the development of the traceability system. Technologies such as deoxyribonucleic acid (DNA) barcoding, unmanned aerial vehicles (UAVs), satellites, wireless sensor networks (WSNs), blockchain, product tagging, spectroscopy, and smart packaging rapidly advance to enhance traceability capabilities.
Volume: 37
Issue: 2
Page: 1064-1076
Publish at: 2025-02-01

Intrusion detection and prevention using Bayesian decision with fuzzy logic system

10.11591/ijece.v15i1.pp1200-1208
Satheeshkumar Sekar , Palaniraj Rajidurai Parvathy , Gopal Kumar Gupta , Thiruvenkadachari Rajagopalan , Chethan Chandra Subhash Chandra Basappa Basavaraddi , Kuppan Padmanaban , Subbiah Murugan
Nowadays, intrusion detection and prevention method has comprehended the notice to decrease the effect of intruders. denial of service (DoS) is an attack that formulates malicious traffic is distributed into an exacting network device. These attackers absorb with a valid network device, the valid device will be compromised to insert malicious traffic. To solve these problems, the Bayesian decision model with a fuzzy logic system based on intrusion detection and prevention (BDFL) is introduced. This mechanism separates the DoS packets based on the type of validation, such as packet and flow validation. The BDFL mechanism uses a fuzzy logic system (FLS) for validating the data packets. Also, the key features of the algorithm are excerpted from data packets and categorized into normal, doubtful, and malicious. Furthermore, the Bayesian decision (BD) decide two queues as malicious and normal. The BDFL mechanism is experimental in a network simulator environment, and the operations are measures regarding DoS attacker detection ratio, delay, traffic load, and throughput.
Volume: 15
Issue: 1
Page: 1200-1208
Publish at: 2025-02-01

Performance analysis of 10 machine learning models in lung cancer prediction

10.11591/ijeecs.v37.i2.pp1352-1364
Joselyn Zapata-Paulini , Michael Cabanillas-Carbonell
Lung cancer is one of the diseases with the highest incidence and mortality in the world. Machine learning (ML) models can play an important role in the early detection of this disease. This study aims to identify the ML algorithm that has the best performance in predicting lung cancer. The algorithms that were contrasted were logistic regression (LR), decision tree (DT), k-nearest neighbors (KNN), gaussian Naive Bayes (GNB), multinomial Naive Bayes (MNB), support vector classifier (SVC), random forest (RF), extreme gradient boosting (XGBoost), multilayer perceptron (MLP) and gradient boosting (GB). The dataset used was provided by Kaggle, with a total of 309 records and 16 attributes. The study was developed in several phases, such as the description of the ML models and the analysis of the dataset. In addition, the contrast of the models was performed under the metrics of specificity, sensitivity, F1 count, accuracy, and precision. The results showed that the SVC, RF, MLP, and GB models obtained the best performance metrics, achieving 98% accuracy, 98% precision, and 98% sensitivity.
Volume: 37
Issue: 2
Page: 1352-1364
Publish at: 2025-02-01

Refining thyroid function evaluation: a comparative study of preprocessing methods in diffuse reflectance spectroscopy

10.11591/ijece.v15i1.pp303-310
Wincent Anto Win Shalini , Thulasi Rajalakshmi , Selvanayagam Vasanthadev Suryakala
Thyroid dysfunction, comprising conditions such as hyperthyroidism and hypothyroidism, represents a substantial global health challenge, necessitating timely and precise diagnosis for effective therapeutic intervention and patient welfare. Conventional diagnostic modalities often involve invasive procedures, that could cause discomfort and inconvenience for individuals. The non-invasive techniques like diffuse reflectance spectroscopy (DRS) can offer a promising alternative. This study underscores the critical role of preprocessing methods in enhancing the accuracy of thyroid hormone functionality through a non-invasive approach. In the proposed study the spectral data acquired from the DRS setup are subjected to different preprocessing techniques to improve the efficacy of the prediction model. Thirty individuals with thyroid dysfunction were included in the study, and preprocessing methods such as baseline correction, multiplicative scatter correction (MSC), and standard normal variate (SNV), were systematically evaluated. The study highlights that SNV preprocessing outperformed other methods with a root mean square error (RMSE) of 0.005 and an R² of 0.99. In contrast, MSC resulted in an RMSE of 0.87 and an R² of 0.86, while baseline correction showed a RMSE of 0.84 and an unusual R² of 1.09, indicating potential issues. SNV proved to be the most effective technique.
Volume: 15
Issue: 1
Page: 303-310
Publish at: 2025-02-01

Utilization meta-analysis to identify the convenience of eBooks (visual and audio) for learning

10.11591/ijece.v15i1.pp529-539
Jefri Mailool , Janu Arlinwibowo , Yulia Linguistika
This research aims to conclude the influence of eBooks in the learning process throughout the world. The meta-analysis design taken was a group contrast between control and experimental groups with a random effect size model. The criteria used are time “data published 2018–2023,” published in English, type of publication is a quantitative research article, the research design is a difference between control and experimental groups, containing complete data “mean, sample size, and standard deviation,” and recorded in the Scopus database. Data collection was guided by the PRISMA method. The results of the analysis showed that the data were heterogeneous and free from publication bias. The results of the analysis showed that there was a large “positive” effect as indicated by a p-value <0.001<5% “95% confidence interval” and a total effect size=0.86 [0.61; 1.11]. It can be concluded based on the latest findings that eBooks have an equally good effect on all conditions which are influenced by the type of competency developed, the eBook information base, the type of eBook, and class size.
Volume: 15
Issue: 1
Page: 529-539
Publish at: 2025-02-01

Efficient deep learning approach for enhancing plant leaf disease classification

10.11591/ijeecs.v37.i2.pp1112-1120
Meroua Belmir , Wafa Difallah , Abdelkader Ghazli
The widespread occurrence of plant diseases is a major factor in the reduction of agricultural output, affecting both crop quality and quantity. These diseases typically begin on the leaves, influenced by alterations in plant structure and growing techniques, and can eventually spread over the entire plant. This results in a notable decrease in crop variety and yield. Successfully managing these diseases depends on accurately classifying and detecting leaf infections early, which is essential for controlling their spread and ensuring healthy plant growth. To address these challenges, this paper introduces an efficient approach for detecting plant leaf diseases. A concatenation of pre-trained convolutional neural networks (CNN) for enhanced plant leaf disease using transfer learning technique is implemented, with a specific focus on accurate early detection, utilizing the comprehensive new plant diseases dataset. The combined residual network-50 (ResNet-50) with densely connected convolutional network-121 (DenseNet-121) architecture aims to provide an efficient and reliable solution to these critical agricultural concerns. Various evaluation metrics were utilized to evaluate the robustness of the proposed hybrid model. The proposed ResNet-50 with the DenseNet-121 hybrid model achieved a rate of accuracy of 99.66%.
Volume: 37
Issue: 2
Page: 1112-1120
Publish at: 2025-02-01

Influence of metal particles shape on direct current voltage electric properties of nanofluids

10.11591/ijece.v15i1.pp56-66
Daniar Fahmi , Muhammad Fadlan Akbar , I Made Yulistya Negara , I Gusti Ngurah Satriyadi Hernanda , Dimas Anton Asfani , Risyad Alauddin Zaidan , Arkan Fadhilah
It is widely recognized that the application of nanoparticles has the potential to improve the dielectric properties of transformer oil. Nevertheless, there is a scarcity of studies that have utilized pure nanofluids, and in practical applications, it is inevitable for transformer oil to become contaminated. Therefore, this study conducted tests to investigate how the shape and size of metal contaminants impact the dielectric performance of Fe3O4 nanofluids. The findings from the levitation voltage test indicate that as the size and diameter of the particle increase, the levitation voltage value measured also increases, and conversely. Moreover, a higher concentration of nanoparticles leads to a higher measured levitation voltage value. On the other hand, the breakdown voltage test results demonstrate that larger and sharper particles result in lower measured breakdown voltage values, and vice versa. The simulation outcomes regarding electric field distribution reveal that larger and sharper particles correspond to higher measured electric field values, while the opposite is true for smaller and less sharp particles.
Volume: 15
Issue: 1
Page: 56-66
Publish at: 2025-02-01

Enhancing data cleaning process on accounting data for fraud detection

10.11591/ijeecs.v37.i2.pp1014-1022
Mohamad Affendi Abdul Malek , Kamarularifin Abd Jalil
Data cleaning is a crucial step in fraud detection as it involves identifying and correcting any inaccuracies or inconsistencies in the data. This can help to ensure that the data being used for fraud detection is reliable and accurate, which in turn can improve the effectiveness of fraud detection algorithms. Due to the overwhelming amount of data, data cleaning specific for fraud detection is a very important activity for the auditor to find the appropriate information. Therefore, a new accounting data cleaning for fraud detection is needed. In this paper, an enhancement of the process of fraud detection by accounting auditors through the implementation of accounting data cleaning technique is proposed. The proposed technique was embedded in a prototype system called accounting data cleaning for fraud detection (ADCFD). Through experiment, the performance of the proposed technique through ADCF is compared with those obtained from the IDEA system, using the same dataset. The results show that the proposed enhanced technique through ADCFD system performed better than the IDEA system.
Volume: 37
Issue: 2
Page: 1014-1022
Publish at: 2025-02-01

Gamification in work-based learning in vocational education to support students' coding abilities

10.11591/ijeecs.v37.i2.pp1262-1273
Nizwardi Jalinus , Ganefri Ganefri , Syahril Syahril , Mahesi Agni Zaus , Syaiful Islami
This article studied the integration of gamification in work-based learning within vocational education as a means to support students' coding abilities. By applying game mechanics such as points, badges, leaderboards, and challenges, we aimed to motivate and engage students in coding activities that mirror real-world industry practices. The inclusion of gamified elements into the curriculum was designed to make the learning process more interactive, fostering a competitive yet collaborative environment that enhances students' interest and perseverance in coding tasks. This research employed a quasi-experimental design with pre-test and post-test measures to assess the impact of gamification on coding proficiency, comparing the outcomes of students participating in gamified learning environments with those in traditional settings. The findings indicate a significant improvement in the coding skills of students exposed to gamified work-based learning, suggesting that gamification can serve as an effective pedagogical tool in vocational education, better preparing students for industry demands.
Volume: 37
Issue: 2
Page: 1262-1273
Publish at: 2025-02-01
Show 52 of 1667

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration