Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

25,002 Article Results

Improved Bi-GRU for parkinson’s disease severity analysis

10.11591/ijeecs.v37.i2.pp1140-1149
Malathi Arunachalam , Ramalakshmi Ramar , Vaibhav Gandhi , Bhuvanesh Ananthan
Parkinson’s disease (PD) is a common neuro-degenerative issue, evaluated via the continuous deterioration of motor functions over time. This condition leads to a gradual decline in movement capabilities. For diagnosing clinical set of PDs, medical experts utilize medical observations. These observations are highly based on the expert’s experience and can vary among clinicians due to its subjective nature, leading to differences in evaluation. The gait patterns of individuals with PD typically exhibit distinctions from those of adults. Evaluating these gait malformations not only aids in diagnosing PD but can also enable the categorization of severity stages with respect to symptoms of motor movement. Therefore, this paper introduces a classification of gait model based on the optimized deep learning (DL) model bidirectional gated recurrent unit-artificial hummingbird optimizer (BI-GRU-AHO). The training and testing involved the sequential segmentation of the right and left instances from the signals of vertical ground reaction force (VGRF) based on the identified gait cycle. The outcomes of the proposed BI-GRU-AHO exhibits reliable and accurate assessment of PD and achieved better accuracy of 98.7 %. The proposed model is trained and tested satisfactorily; hence it can be implemented in a real-time environment by integrating the model into a software application or system capable of receiving real-time data from PD patients.
Volume: 37
Issue: 2
Page: 1140-1149
Publish at: 2025-02-01

Sailfish-cat algorithm-enhanced generative adversarial network for attack detection in internet of things-Fog network authentication

10.11591/ijece.v15i1.pp1109-1122
Pallavi Kanthamangala Niranjan , Ravikumar Venkatesh
The internet of things (IoT) has emerged as a prominent and influential concept within the realm of computing. Various attack detection methods are devised for detecting attacks in IoT-Fog environment. Despite all these efforts, attack detection still remained as a challenging task due to factors such as low latency, resource constraints of IoT devices, scalability issues, and distribution complexities. All these challenges are addressed in this paper by designing an efficient attack detection technique named as sailfish- cat optimization-based generative adversarial network (SaCO-based GAN) tailored for the IoT-Fog framework. This proposed approach introduces the SaCO-based GAN for IoT-Fog attack detection utilizing deep learning and feature-based classification, validated through experiments showing superior performance metrics. Notably, the SaCO optimization technique is utilized to train the GAN. Experimental results demonstrate the efficacy of the SaCO-based GAN with a maximum recall of 92.15%, a maximum precision of 91.21%, and a maximum F-Measure of 92.16%, outperforming existing techniques in IoT-Fog attack detection. The paper recommends enhancing scalability, implementing real-time detection strategies, rigorously testing robustness against diverse attack scenarios, and integrating with existing IoT security frameworks for practical deployment.
Volume: 15
Issue: 1
Page: 1109-1122
Publish at: 2025-02-01

Review of gait recognition systems: approaches and challenges

10.11591/ijece.v15i1.pp349-355
Sachin B. Mandlik , Rekha Labade , Sachin Vasant Chaudhari , Balasaheb Shrirangao Agarkar
Gait recognition (GR) has emerged as a significant biometric identification technique, leveraging an individual's walking pattern for various applications such as surveillance, forensic analysis, and person identification. Despite its non-intrusive nature, GR systems face challenges due to their sensitivity to pose variations, limiting functionality in real-world scenarios where people exhibit diverse walking styles and body orientations. This review paper aims to comprehensively discuss GR systems, focusing on approaches and challenges in designing accurate and robust systems capable of handling bodily variations. GR's prominence spans across domains including surveillance, security, healthcare, and human-computer interaction, positioning it as a versatile biometric modality complementary to the traditional methods like fingerprint and face recognition. The review offers an in-depth analysis of GR systems, detailing silhouette-based, model-based, and deep-learning approaches. Silhouette-based methods capture gait information by analyzing the outline and locomotion of a person’s silhouette, while model-based approaches utilize skeletal models to describe gait patterns. The paper elucidates the challenges and limitations of GR systems, encompassing factors such as walking conditions, clothing, viewpoint, and environmental influences. Additionally, it explores potential future directions in GR research, highlighting the technology’s ongoing evolution and integration into diverse applications. As a valuable resource, this review serves researchers, practitioners, and policymakers by providing insights into the current state of GR systems and avenues for further research and development. It underscores the importance of addressing challenges to enhance GR’s accuracy and robustness, ensuring its continued relevance in biometric identification across various domains.
Volume: 15
Issue: 1
Page: 349-355
Publish at: 2025-02-01

Natural smart home automation system using LSTM based on household behaviour

10.11591/ijeecs.v37.i2.pp758-770
Mochamad Susantok , Farhana Ahmad Po’ad , Ariffuddin Joret , Maulina Hilwa Salsabillah
A smart home automation system (SHAS) utilizing data-driven learning is an advanced internet of things (IoT) application aimed to learn household behavior to prevent miniatur circuit breaker (MCB) trips due to overload. Unlike traditional deterministic methods, this study leverages a layered AI model, featuring real-time data collection, long short-term memory (LSTM) based learning, and an automatic control system. The LSTM classification model generates precise ON/OFF control signals sent to IoT smartplugs, optimizing appliance usage and reducing the risk of electrical overload. Data from smartplug sensors, including appliance status and environmental factors like power consumption, temperature, and humidity, were collected every minute over three months, yielding 80,818 data points. The system's performance was evaluated on three appliances: Air Conditioner, Television, and Water Pump Machine. Results showed high accuracy for Television at 98% and Water Pump Machine at 97.6%, with slightly lower accuracy for Air Conditioner at 81.9%. This demonstrates the system's effectiveness in real-world applications. The scalability and adaptability of the Natural SHAS model to different appliances and environments mark a significant advancement in smart home automation, offering a practical solution for preventing electrical overload and improving household energy management.
Volume: 37
Issue: 2
Page: 758-770
Publish at: 2025-02-01

Influence of metal particles shape on direct current voltage electric properties of nanofluids

10.11591/ijece.v15i1.pp56-66
Daniar Fahmi , Muhammad Fadlan Akbar , I Made Yulistya Negara , I Gusti Ngurah Satriyadi Hernanda , Dimas Anton Asfani , Risyad Alauddin Zaidan , Arkan Fadhilah
It is widely recognized that the application of nanoparticles has the potential to improve the dielectric properties of transformer oil. Nevertheless, there is a scarcity of studies that have utilized pure nanofluids, and in practical applications, it is inevitable for transformer oil to become contaminated. Therefore, this study conducted tests to investigate how the shape and size of metal contaminants impact the dielectric performance of Fe3O4 nanofluids. The findings from the levitation voltage test indicate that as the size and diameter of the particle increase, the levitation voltage value measured also increases, and conversely. Moreover, a higher concentration of nanoparticles leads to a higher measured levitation voltage value. On the other hand, the breakdown voltage test results demonstrate that larger and sharper particles result in lower measured breakdown voltage values, and vice versa. The simulation outcomes regarding electric field distribution reveal that larger and sharper particles correspond to higher measured electric field values, while the opposite is true for smaller and less sharp particles.
Volume: 15
Issue: 1
Page: 56-66
Publish at: 2025-02-01

Challenges of implementing protection systems in smart grids: a review

10.11591/ijeecs.v37.i2.pp715-729
Sabat Anwari , Dini Fauziah , Lita Lidyawati
Based on the emergence of increasingly advanced technology, the conventional power grid can be upgraded to a smart grid by adding bidirectional communication, computer algorithms, and equipment that uses artificial intelligence (AI). A smart grid is a revolution in the current electricity network that can control the two-way generation and transmission process by utilizing an intelligent system so that the distribution of electric power can be handled optimally and in real time. The challenge of the smart grid is that there are distributed generators and microgrids that must be controlled in real time with rapidly changing loads. To meet these criteria, several points are proposed, i.e., finding an effective procedure to construct self-healing capability; developing a protection system based on AI; and proposing a systematic procedure to realize self-healing and protection systems with the help of a multi-agent system (MAS). Multi-agent systems are one of the AI approaches. Each agent can work independently and can also communicate with one another and with other devices on the network. Agents used as models can be classified into several categories, such as grid component agents, distributed resource agents, end-user agents, failure control agents, data analysis agents, and graphical visualization agents.
Volume: 37
Issue: 2
Page: 715-729
Publish at: 2025-02-01

Early skin disease diagnosis by using artificial neural network for internet of healthcare things

10.11591/ijeecs.v37.i2.pp1032-1041
Wan Mohd Yaakob Wan Bejuri , Mohd Murtadha Mohamad , Michelle Tang , Aina Khairina Ahmad Khair , Yusuf Athallah Adriyansyah , Fauziah Kasmin , Zulkifli Tahir
Internet of healthcare things (IoHT) represents a burgeoning field that leverages pervasive technologies to create technology driven environments for healthcare professionals, thereby enhancing the delivery of efficient healthcare services. In remote and isolated areas, such as rural communities and boarding schools, access to healthcare professionals (especially dermatologists) can be particularly challenging. However, these areas often lack the specialized expertise required for effective skin disease consultations. Thus, the purpose of this research is to design a scheme of early skin disease diagnosis for internet of healthcare things that is accessible anywhere and anytime. In this research, the image of skin disease from patient will be taken by using a mobile phone for predicting and identifying the disease. This proposed scheme will diagnose skin disease and convert it be meaningful information. As a result, it show our proposed scheme can be the most consistent in term of accuracy and loss compared to others method. Overall, this research represents a significant step toward improving healthcare accessibility and empowering individuals to manage their own health. Furthermore, the proposed scheme is anticipated to contribute significantly to the IoHT field, benefiting both academia and societal health outcomes.
Volume: 37
Issue: 2
Page: 1032-1041
Publish at: 2025-02-01

Utilization meta-analysis to identify the convenience of eBooks (visual and audio) for learning

10.11591/ijece.v15i1.pp529-539
Jefri Mailool , Janu Arlinwibowo , Yulia Linguistika
This research aims to conclude the influence of eBooks in the learning process throughout the world. The meta-analysis design taken was a group contrast between control and experimental groups with a random effect size model. The criteria used are time “data published 2018–2023,” published in English, type of publication is a quantitative research article, the research design is a difference between control and experimental groups, containing complete data “mean, sample size, and standard deviation,” and recorded in the Scopus database. Data collection was guided by the PRISMA method. The results of the analysis showed that the data were heterogeneous and free from publication bias. The results of the analysis showed that there was a large “positive” effect as indicated by a p-value <0.001<5% “95% confidence interval” and a total effect size=0.86 [0.61; 1.11]. It can be concluded based on the latest findings that eBooks have an equally good effect on all conditions which are influenced by the type of competency developed, the eBook information base, the type of eBook, and class size.
Volume: 15
Issue: 1
Page: 529-539
Publish at: 2025-02-01

Intrusion detection and prevention using Bayesian decision with fuzzy logic system

10.11591/ijece.v15i1.pp1200-1208
Satheeshkumar Sekar , Palaniraj Rajidurai Parvathy , Gopal Kumar Gupta , Thiruvenkadachari Rajagopalan , Chethan Chandra Subhash Chandra Basappa Basavaraddi , Kuppan Padmanaban , Subbiah Murugan
Nowadays, intrusion detection and prevention method has comprehended the notice to decrease the effect of intruders. denial of service (DoS) is an attack that formulates malicious traffic is distributed into an exacting network device. These attackers absorb with a valid network device, the valid device will be compromised to insert malicious traffic. To solve these problems, the Bayesian decision model with a fuzzy logic system based on intrusion detection and prevention (BDFL) is introduced. This mechanism separates the DoS packets based on the type of validation, such as packet and flow validation. The BDFL mechanism uses a fuzzy logic system (FLS) for validating the data packets. Also, the key features of the algorithm are excerpted from data packets and categorized into normal, doubtful, and malicious. Furthermore, the Bayesian decision (BD) decide two queues as malicious and normal. The BDFL mechanism is experimental in a network simulator environment, and the operations are measures regarding DoS attacker detection ratio, delay, traffic load, and throughput.
Volume: 15
Issue: 1
Page: 1200-1208
Publish at: 2025-02-01

Novel five-patch compact microstrip Yagi-alike antenna for Ka-band applications

10.11591/ijeecs.v37.i2.pp878-887
Raj Kumar Singh , Kumari Mamta , Navin Kumar Sinha , Vinay Kumar Choudhary
This paper discusses the process of designing and fabricating a novel compact microstrip patch Yagi-like antenna having five-patch radiating element at operating frequency 31 GHz with a bandwidth of 1 GHz. The developed design aims to optimize the antenna performance. The overall dimension of the antenna being 17× 14 × 0.8 mm3, based on RT Duroid 5880 substrate having dielectric loss tangent of 0.0009 and relative permittivity 2.2. The effectiveness of the performance of proposed design was evaluated using the electromagnetic solver Ansoft high-frequency structure simulator (HFSS) and validated by the laboratory measurements on the antenna prototype. The measured results are consistent with the simulation prediction. The designed antenna achieved directional radiation and the performances with voltage standing wave ratio (VSWR) < 1.32, return loss -17 dB and gain of 6 dBi. The measured results are compared with those existing in literature. The proposed antenna design has proven very effective in terms of the intended design and parameters which make it suitable for satellite application and wireless communication.
Volume: 37
Issue: 2
Page: 878-887
Publish at: 2025-02-01

Innovative power sharing and secondary controls for meshed microgrids

10.11591/ijece.v15i1.pp99-113
Youssef Amine Ait Ben Hassi , Youssef Hennane , Abdelmajid Berdai
In alternating current (AC) microgrids, the prevalent approach for controlling the power distribution between generators and loads is droop control. This decentralized technique ensures accurate power sharing; however, its utility is restricted by significant drawbacks. Notably, in scenarios involving dissimilar power sources, mismatched impedance lines, or meshed microgrids, conventional droop control fails to ensure effective reactive power sharing among inverters, often leading to notable circulating currents. Hence, the primary objective of this paper is twofold: firstly, to examine limitations inherent to conventional droop control; secondly, to introduce a robust power-sharing methodology for AC microgrids. This novel approach is specifically designed to achieve consistent sharing of active and reactive power across meshed topology microgrids. The technique considers the presence of distributed power loads and the dynamic nature of the topology. Despite the attainment of satisfactory active and reactive power sharing, deviations in voltage and frequency occasionally manifest. To address this issue, a supplementary control mechanism is proposed as a third phase. This secondary control method focuses on reinstating the microgrid's voltage and frequency to rated values, all while upholding the precision of power sharing. The efficacy of this multi-stage methodology is rigorously validated through simulations using MATLAB/Simulink and practical experimentations.
Volume: 15
Issue: 1
Page: 99-113
Publish at: 2025-02-01

Flooding distributed denial of service detection in software-defined networking using k-means and naïve Bayes

10.11591/ijece.v15i1.pp817-826
Hicham Yzzogh , Hafssa Benaboud
Software-defined networking (SDN) is a network architecture that enables the separation of the control plane and data plane, facilitating centralized management of the network. While centralized control offers numerous benefits, it also comes with certain drawbacks. Flooding distributed denial of service (DDoS) attacks pose a significant threat in SDN environments. These attacks involve overwhelming a target system with a large volume of packets, aiming to disrupt its functionality. In this paper, we propose a new approach for detecting DDoS attacks based on multiple k-means models and the naive Bayes algorithm. Our methodology involves training multiple k-means models to cluster each data point within every column of the dataset, where each column represents a feature. This process results in a new dataset with the same shape, containing only clusters, except the column containing the target variable (labels). These clusters are then used as input by naïve Bayes to perform binary classification. We assessed our approach using the InSDN and CIC-DDoS2017 datasets. The results underscore the impressive accuracy of our model, achieving 99.9839% on the InSDN dataset and 99.7030% on the CIC-DDoS2017 dataset. This performance was achieved by optimizing the desired number of clusters.
Volume: 15
Issue: 1
Page: 817-826
Publish at: 2025-02-01

Analysis of LLC resonant converter performance with PIDD2 controller for electric vehicle application

10.11591/ijeecs.v37.i2.pp749-757
Sathya K. , K. P. Guruswamy
The key uses of the latest developments is electric vehicles (EV’s). As a result, several researchers were drawn to EV’s control to propose appropriate controllers and predicted that control engineers face a challenge when it comes to regulating the LLC resonant converter output voltage. In this regard, the study proposes a PID Type modified controller for regulation of voltage across output in LLC resonant converter. The design and control procedure of this modified proportional integral derivative double derivative (PIDD2) is explained along with EDF modeling in LLC resonant converter. This work proposes to use two controllers to drive the voltage output of a resonant converter LLC to constantly track the desired value. Proportional integral derivative controller (PID) is the first, while the PIDD2 method is the foundation of the second. Every controller has undergone simulation testing and the results are compared based on how the evaluated controllers respond dynamically in accordance with settling time, rising time and overshoot.
Volume: 37
Issue: 2
Page: 749-757
Publish at: 2025-02-01

Optimal turning of a 2-DOF proportional-integral-derivative controller based on a chess algorithm for load frequency control

10.11591/ijece.v15i1.pp146-155
Techatat Buranaaudsawakul , Kittipong Ardhan , Sitthisak Audomsi , Worawat Sa-ngiamvibool , Rattapon Dulyala
Load frequency control is necessary for power system management. The power system must maintain a frequency range to ensure power supply stability. System faults and demand fluctuations may cause frequencies to change quickly. System stability and integrity suffer. We are optimizing the two-degree-of-freedom (2-DOF) proportional-integral-derivative (PID) controllers chess algorithm. This article addresses electrical load frequency regulation. We employ classical control theory and current adjustment. It aims for electrical system efficiency and dependability. It checks for errors using integral absolute error (IAE), integral squared error (ISE), integral of time multiply absolute error (ITAE), and integral time squared error (ITSE). Particle swarm algorithm (PSO) compares performance. The IAE of 0.03364, nearly identical to it, shows that chess trumps other algorithms in many scenarios. The chess algorithm's ISE was 0.00035, like PSO's 0.03363. The ISE was 0.00036, indicating PSO's error-reduction capabilities. For the chess algorithm, PSO is 0.07929, and ITAE is 0.07647. This indicates the PSO responds faster to system breakdowns and load changes. Finally, the chess algorithm's ITSE is 0.00072, below the PSO 0.00076. The chess algorithm is better at managing long-term load frequency.
Volume: 15
Issue: 1
Page: 146-155
Publish at: 2025-02-01

Q-learning based forecasting early landslide detection in internet of thing wireless sensor network

10.11591/ijece.v15i1.pp425-434
Devasahayam Joseph Jeyakumar , Boominathan Shanmathi , Parappurathu Bahulayan Smitha , Shalini Chowdary , Thamizharasan Panneerselvam , Rajagopalan Srinath , Muthuraj Mariselvam , Mohanan Murali
The issue of climate modification and human actions terminates in a chain of hazardous developments, comprehensive of landslides. The traditional approaches of observing the environmental attributes that is actually obtaining rainfall data from places can be cruel and suppressing supervising necessitated for careful infliction. Thus, landslide forecasting and early notice is a significant application via wireless sensor networks (WSN) to reduce loss of life and property. Because of the heavy preparation of sensors in landslide prostrate regions, clustering is a resourceful method to minimize unnecessary transmission. In this article we introduce Q-learning based forecasting early landslide detection (Q-LFD) in internet of things (IoT) WSN. The Q-LFD mechanism utilizes a dingo optimization algorithm (DOA) to choose the best cluster head (CH). Furthermore, the Q-learning algorithm forecast the landslide by soil water capacity, soil layer, soil temperature, Seismic vibrations, and rainfall. Experimental results illustrate the Q-LFD mechanism raises the landslide detection accuracy. In addition, it minimizes the false positive, false negative ratio.
Volume: 15
Issue: 1
Page: 425-434
Publish at: 2025-02-01
Show 53 of 1667

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration