Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

25,002 Article Results

A variant of particle swarm optimization in cloud computing environment for scheduling workflow applications

10.11591/ijeecs.v38.i2.pp1392-1401
Ashish Tripathi , Rajnesh Singh , Suveg Moudgil , Pragati Gupta , Nitin Sondhi , Tarun Kumar , Arun Pratap Srivastava
Cloud computing offers on-demand access to shared resources, with user costs based on resource usage and execution time. To attract users, cloud providers need efficient schedulers that minimize these costs. Achieving cost minimization is challenging due to the need to consider both execution and data transfer costs. Existing scheduling techniques often fail to balance these costs effectively. This study proposes a variant of the particle swarm optimization algorithm (VPSO) for scheduling workflow applications in a cloud computing environment. The approach aims to reduce both execution and communication costs. We compared VPSO with several PSO variants, including Inertia-weighted PSO, gaussian disturbed particle swarm optimization (GDPSO), dynamic-PSO, and dynamic adaptive particle swarm optimization with self-supervised learning (DAPSO-SSL). Results indicate that VPSO generally offers significant cost reductions and efficient workload distribution across resources, although there are specific scenarios where other algorithms perform better. VPSO provides a robust and cost-effective solution for cloud workflow scheduling, enhancing task-resource mapping and reducing costs compared to existing methods. Future research will explore further enhancements and additional PSO variants to optimize cloud resource management.
Volume: 38
Issue: 2
Page: 1392-1401
Publish at: 2025-05-01

Boosting stroke prediction with ensemble learning on imbalanced healthcare data

10.11591/ijeecs.v38.i2.pp1137-1148
Outmane Labaybi , Mohamed Bennani Taj , Khalid El Fahssi , Said El Garouani , Mohamed Lamrini , Mohamed El Far
Detecting strokes at the early day is crucial for preventing health issues and potentially saving lives. Predicting strokes accurately can be challenging, especially when working with unbalanced healthcare datasets. In this article, we suggest a thorough method combining machine learning (ML) algorithms and ensemble learning techniques to improve the accuracy of predicting strokes. Our approach includes using preprocessing methods for tackling imbalanced data, feature engineering for extracting key information, and utilizing different ML algorithms such as random forests (RF), decision trees (DT), and gradient boosting (GBoost) classifiers. Through the utilization of ensemble learning, we amalgamate the advantages of various models in order to generate stronger and more reliable predictions. By conducting thorough tests and assessments on a variety of datasets, we demonstrate the efficacy of our approach in addressing the imbalanced stroke datasets and greatly enhances prediction accuracy. We conducted comprehensive testing and validation to ensure the reliability and applicability of our method, improving the accuracy of stroke prediction and supporting healthcare planning and resource allocation strategies.
Volume: 38
Issue: 2
Page: 1137-1148
Publish at: 2025-05-01

Intelligent voice control system for UAV with mobile robot

10.11591/ijeecs.v38.i2.pp1061-1072
Sabyrzhan Atanov , Khuralay Moldamurat , Makhabbat Bakyt , Dariga Zinagabdenova , Aibek Moldamurat , Berik Zhumazhanov , Adil Maidanov
The article presents a voice control system for unmanned aerial vehicles (UAVs) and an integrated mobile robot, based on artificial intelligence (AI). The system recognizes voice commands in the Kazakh language, converted into Latin transliteration, providing intuitive control of the UAV and robot. The performance of the system in various scenarios including agriculture, environmental monitoring and search and rescue operations is investigated. The system showed high accuracy of command recognition (95%) and efficient control of the UAV and robot. The proposed system opens up new possibilities for the use of UAVs and robots in various fields, increasing their autonomy, flexibility and ease of use.
Volume: 38
Issue: 2
Page: 1061-1072
Publish at: 2025-05-01

An efficient hardware implementation of number theoretic transform for CRYSTALS-Kyber post-quantum cryptography

10.11591/ijeecs.v38.i2.pp732-743
Trang Hoang , Tu Dinh Anh Duong , Thinh Quang Do
CRYSTALS-Kyber was chosen to be the standardized key encapsulation mechanisms (KEMs) out of the finalists in the third round of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) standardization program. Since the number theoretic transform (NTT) was used to reduce the computational complexity of polynomial multiplication, it has always been a crucial arithmetic component in CRYSTALS-Kyber design. In this paper, a simple and efficient architecture for NTT is presented where we easily archived the functionality of polynomial multiplication with efficient computation time. Only 857 Look-Up Tables and 744 flip-flops were utilized in our NTT design, which consisted of two processing elements (PEs) and two butterfly cores within each PE.
Volume: 38
Issue: 2
Page: 732-743
Publish at: 2025-05-01

Performance of rocket data communication system using wire rope isolator on sounding rocket RX

10.11591/ijeecs.v38.i2.pp783-793
Kandi Rahardiyanti , Shandi Prio Laksono , Khaula Nurul Hakim , Yuniarto Wimbo Nugroho , Andreas Prasetya Adi , Salman Salman , Kurdianto Kurdianto
The rocket experiment (RX) ballistic rocket requires a reliable data communication system capable of withstanding intense vibrations and shocks during flight. This study investigates the application of wire rope isolators (WRI) to damper mechanical disturbances and protect the rocket's communication system. Installation of WRI position and direction in this experiment with compression position. A series of vibration tests were conducted using 4 WRI installed in the rocket’s 30 kg data communication compartment, vibration test results frequency between 4 Hz and 1500 Hz with acceleration of 8.37 g to 20.37 g, higher "g" readings on the test object sensor compared to vibration machine readings are usually caused by phenomena such as resonance, differences in dynamic response, non-linear behavior, sensor placement location, and swing effects when the vibration machine oscillates. This is a natural mechanical response to external vibrations during testing. While the results of flight tests rocket RX has an acceleration of 8 g to 9.3 g. The results showed that the WRI dampers are effective in protecting the data communication system and ensuring the uninterrupted transmission of flight data to the ground control station (GCS).
Volume: 38
Issue: 2
Page: 783-793
Publish at: 2025-05-01

A deep learning approach to detect DDoS flooding attacks on SDN controller

10.11591/ijeecs.v38.i2.pp1245-1255
Abdullah Ahmed Bahashwan , Mohammed Anbar , Selvakumar Manickam , Taief Alaa Al-Amiedy , Iznan H. Hasbullah
Software-defined networking (SDN), integrated into technologies like internet of things (IoT), cloud computing, and big data, is a key component of the fourth industrial revolution. However, its deployment introduces security challenges that can undermine its effectiveness. This highlights the urgent need for security-focused SDN solutions, driving advancements in SDN technology. The absence of inherent security countermeasures in the SDN controller makes it vulnerable to distributed denial of service (DDoS) attacks, which pose a significant and pervasive threat. These attacks specifically target the controller, disrupting services for legitimate users and depleting its resources, including bandwidth, memory, and processing power. This research aims to develop an effective deep learning (DL) approach to detect such attacks, ensuring the availability, integrity, and consistency of SDN network functions. The proposed DL detection approach achieves 98.068% accuracy, 98.085% precision, 98.067% recall, 98.057% F1-score, 1.34% false positive rate (FPR), and 1.713% detection time.
Volume: 38
Issue: 2
Page: 1245-1255
Publish at: 2025-05-01

S-commerce: competition drives action through small medium enterprise top management

10.11591/ijeecs.v38.i2.pp1042-1050
Erwin Sutomo , Nur Shamsiah Abdul Rahman , Awanis Romli
This study investigates the factors influencing the continued use of S-commerce in small and medium enterprises (SMEs), focusing on the roles of top management (TM) support, competitive pressure (CP), facilitating conditions, and service quality. Data were collected from 341 SME owners and analyzed using SEM. Data was analyzed with SmartPLS using a two-step approach. The findings indicate that TM support significantly impacts the continued use of S-commerce by influencing facilitating conditions and service quality while CP affects TM behavior and usage continuity. However, the findings reveal that operational factors, such as infrastructure and service quality, play a more critical role in sustaining S-commerce engagement than external pressures. Facilitating conditions, in particular, were found to have a strong influence on service quality and platform engagement, underscoring the importance of technical and organizational resources. The study extends prior research by highlighting the interplay between internal and external drivers in fostering the continuous use of S-commerce, offering practical insights for SMEs and future research directions.
Volume: 38
Issue: 2
Page: 1042-1050
Publish at: 2025-05-01

Optimizing cloud tasks scheduling based on the hybridization of darts game hypothesis and beluga whale optimization technique

10.11591/ijeecs.v38.i2.pp1195-1207
Manish Chhabra , Rajesh E.
This paper presents the hybridization of two metaheuristic algorithms which belongs to different categories, for optimizing the tasks scheduling in cloud environment. Hybridization of a game-based metaheuristic algorithm namely, darts game optimizer (DGO), with a swarm-based metaheuristic algorithm namely, beluga whale optimization (BWO), yields to the evolution of a new algorithm known as “hybrid darts game hypothesis – beluga whale optimization” (hybrid DGH-BWO) algorithm. Task scheduling optimization in cloud environment is a critical process and is determined as a non-deterministic polynomial (NP)-hard problem. Metaheuristic techniques are high-level optimization algorithms, designed to solve a wide range of complex, optimization problems. In the hybridization of DGO and BWO metaheuristic algorithms, expedition and convergence capabilities of both algorithms are combined together, and this enhances the chances of finding the higher-quality solutions compared to using a single algorithm alone. Other benefits of the proposed algorithm: increased overall efficiency, as “hybrid DGH-BWO” algorithm can exploit the complementary strengths of both DGO and BWO algorithms to converge to optimal solutions more quickly. Wide range of diversity is also introduced in the search space and this helps in avoiding getting trapped in local optima.
Volume: 38
Issue: 2
Page: 1195-1207
Publish at: 2025-05-01

Discrete wavelet transform and convolutional neural network based handwritten Sanskrit character recognition

10.11591/ijeecs.v38.i2.pp1367-1375
Shraddha V. Shelke , Dinesh M. Chandwadkar , Sunita P. Ugale , Rupali V. Chothe
Sanskrit is one of the ancient languages from which the majority of present Indian languages are developed. Although the national mission for manuscripts (NMM) is digitizing handwritten Sanskrit manuscripts, there are still a lot of papers that need to be digitized. Recognition of handwritten script is a challenging task due to individual differences in writing styles and how those variations alter over time. The Sanskrit language is written in Devanagari script. A novel approach using discrete wavelet transform (DWT) and convolutional natural network (CNN) is proposed in this paper. Devanagari handwritten character dataset which includes 2000 handwritten images of 36 classes (2000*36=72000) is used in this research. Fine-tuned GoogLeNet model implemented here gave optimum values of epochs and learning rate of 15 and 0.01 respectively. Classification accuracy obtained by proposed DWT – CNN model is 98.97% with a loss of 0.098. Fine-tuned GoogLeNet model achieves 99.68% accuracy with a 0.0635 loss. Results obtained are also compared with existing approaches and found superior.
Volume: 38
Issue: 2
Page: 1367-1375
Publish at: 2025-05-01

Data mining and cardiac health: predicting heart attack risks

10.11591/ijeecs.v38.i2.pp1010-1023
Inoc Rubio Paucar , Laberiano Andrade-Arenas
In a context where heart attacks continue to be a global health concern, the lack of precision in predicting who is at higher risk poses a critical challenge due to the variability of risk factors and complex interactions among them. The research aims to develop predictive models for heart attack risks using data mining techniques, employing the knowledge discovery in databases methodology (KDD) and the k-means algorithm with RapidMiner studio. The primary objective is to identify patterns and risk profiles, allowing for early identification of at-risk individuals, considering factors like obesity, diabetes, alcoholism, and stress, to reduce preventable deaths and improve cardiac healthcare. This innovative approach combines cardiac health, data mining, and KDD methodology to address the challenge of predicting heart attack risks and has the potential to enhance medical care and save lives. The predominant results obtained were that cluster 1 with a fraction of 0.312 and a percentage of 31.2% of the attribute diabetes was one of the most prevalent causes of cardiac risk. Finally, the research concluded that people with diabetes are more likely to have cardiac risk associated with dietary factors or consumption of other substances.
Volume: 38
Issue: 2
Page: 1010-1023
Publish at: 2025-05-01

Assessment of cloud-free normalized difference vegetation index data for land monitoring in Indonesia

10.11591/ijeecs.v38.i2.pp845-853
Ahmad Luthfi Hadiyanto , Sukristiyanti Sukristiyanti , Arif Hidayat , Indri Pratiwi
Continuous land monitoring in Indonesia using optical remote sensing satellites is difficult due to frequent clouds. Therefore, we studied the feasibility of monthly land monitoring during the second half of 2019, using moderate resolution imaging spectroradiometer (MODIS) normalized difference vegetation index (NDVI) data from Terra and Aqua satellites. We divide the Indonesian area into seven regions (Sumatra, Java, Kalimantan, Sulawesi, Nusa Tenggara, Maluku, and Papua) and examine NDVI data for each of the regions. We also calculated the cloud occurrence percentage every hour using Himawari-8 data to compare cloud conditions at different acquisition times. This research shows that Terra satellite provides more cloud-free pixels than Aqua while combining data from both significantly increase the cloud-free NDVI pixels. Monthly monitoring is feasible in most regions because the cloudy areas are less than 10%. However, in Sumatra, the cloudy area was more than 10% in October 2019. We need to include further data processing to improve the feasibility of continuous monitoring in Sumatra. This research concludes that monthly monitoring is still feasible in Indonesia, although some data require further processing. The use of additional data from other satellites in the monitoring can be an option for further research.
Volume: 38
Issue: 2
Page: 845-853
Publish at: 2025-05-01

Trends in machine learning for predicting personality disorder: a bibliometric analysis

10.11591/ijeecs.v38.i2.pp1299-1307
Heni Sulistiani , Admi Syarif , Warsito Warsito , Khairun Nisa Berawi
Over the last decade, research on artificial intelligence (AI) in the medical field has increased. However, unlike other disciplines, AI in personality disorders is still in the minority. For this reason, we conduct a map research using bibliometric and build a visualization map using VOSviewer in AI to predict personality disorders. We conducted a literature review using the systematic literature review (SLR) method, consisting of three stages: planning, implementation, and reporting. The evaluation involved 22 scientific articles on AI in predicting personality disorders indexed by Scopus Quartile Q1–Q4 from the Google Scholar database during the last five years, from 2018–2023. In the meantime, the results of bibliometric analysis have led to the discovery of information about the most productive publishers, the evolution of scientific articles, and the quantity of citations. In addition, VOSviewer’s visualization of the most frequently occurring terms in abstracts and titles has made it easier for researchers to find novel and infrequently studied subjects in AI on personality disorders.
Volume: 38
Issue: 2
Page: 1299-1307
Publish at: 2025-05-01

Detection of COVID-19 based on cough sound and accompanying symptom using LightGBM algorithm

10.11591/ijeecs.v38.i2.pp940-949
Wiharto Wiharto , Annas Abdurrahman , Umi Salamah
Coronavirus disease 19 (COVID-19) is an infectious disease whose diagnosis is carried out using antigen-antibody tests and reverse transcription polymerase chain reaction (RT-PCR). Apart from these two methods, several alternative early detection methods using machine learning have been developed. However, it still has limitations in accessibility, is invasive, and its implementation involves many parties, which could potentially even increase the risk of spreading COVID-19. Therefore, this research aims to develop an alternative early detection method that is non-invasive by utilizing the LightGBM algorithm to detect COVID-19 based on the results of feature extraction from cough sounds and accompanying symptoms that can be identified independently. This research uses cough sound samples and symptom data from the Coswara dataset, and cough sound’s features were extracted using the log mel-spectrogram, mel frequency cepstrum coefficient (MFCC), chroma, zero crossing rate (ZCR), and root mean square (RMS) methods. Next, the cough sound features are combined with symptom data to train the LightGBM. The model trained using cough sound features and patient symptoms obtained the best performance with 95.61% accuracy, 93.33% area under curve (AUC), 88.74% sensitivity, 97.91% specificity, 93.17% positive prediction value (PPV), and 96.33% negative prediction value (NPV). It can be concluded that the trained model has excellent classification capabilities based on the AUC values obtained.
Volume: 38
Issue: 2
Page: 940-949
Publish at: 2025-05-01

A GRU-based approach for botnet detection using deep learning technique

10.11591/ijeecs.v38.i2.pp1098-1105
Suchetha G. , Pushpalatha K.
The increasing volume of network traffic data exchanged among interconnected devices on the internet of things (IoT) poses a significant challenge for conventional intrusion detection systems (IDS), especially in the face of evolving and unpredictable security threats. It is crucial to develop adaptive and effective IDS for IoT to mitigate false alarms and ensure high detection accuracy, particularly with the surge in botnet attacks. These attacks have the potential to turn seemingly harmless devices into zombies, generating malicious traffic that disrupts network operations. This paper introduces a novel approach to IoT intrusion detection, leveraging machine learning techniques and the extensive UNSW-NB15 dataset. Our primary focus lies in designing, implementing, and evaluating machine learning (ML) models, including K-nearest neighbors (KNN), random forest (RF), long short-term memory (LSTM), and gated recurrent unit (GRU), against prevalent botnet attacks. The successful testing against prominent Bot- net attacks using a dedicated dataset further validates its potential for enhancing intrusion detection accuracy in dynamic and evolving IoT landscapes.
Volume: 38
Issue: 2
Page: 1098-1105
Publish at: 2025-05-01

High-efficiency multimode charging interface for Li-Ion battery with renewable energy sources in 180 nm CMOS

10.11591/ijeecs.v38.i2.pp744-754
Hajjar Mamouni , Karim El Khadiri , Anass El Affar , Mohammed Ouazzani Jamil , Hassan Qjidaa
The high-efficiency multi-source Lithium-Ion battery charger with multiple renewable energy sources described in the present paper is based on supply voltage management and a variable current source. The goal of charging the battery in a constant current (CC) mode and controlling the supply voltage of the charging circuit are both made achievable using a variable current source, which may improve the battery charger’s energy efficiency. The battery must be charged with a degraded current by switching from the CC state for the constant voltage (CV) state to prevent harming the Li-Ion battery. The Cadence Virtuoso simulator was utilized to obtain simulation results for the charging circuit, which is constructed in 0.18 μm CMOS technology. The simulation results obtained using the Cadence Virtuoso simulator, provide a holding current trickle charge (TC) of approximately 250 mA, a maximum charging current (LC) of approximately 1.3 A and a maximum battery voltage of 4.2 V, and takes only 29 minutes to charge.
Volume: 38
Issue: 2
Page: 744-754
Publish at: 2025-05-01
Show 7 of 1667

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration