Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

24,883 Article Results

Intrusion detection based on generative adversarial network with random forest for cloud networks

10.11591/ijece.v15i2.pp2491-2498
Gnanam Jeba Rosline , Pushpa Rani
The development of cloud computing enables individuals and organizations to access a wide range of online programs and services. Because of its nature, numerous users can access and distribute cloud infrastructure. In cloud computing several security threats change the data and operations. A network's ability to detect malicious activity and possible threats is greatly aided by intrusion detection. To solve these issues, intrusion detection based on generative adversarial network with random forest (GAN-RF) for cloud networks is introduced. The function of the generative adversarial networks (GANs) based network abnormality recognition system is evaluated. It uses the CICIDS2018 dataset to detect intrusion. GAN is utilized to improve network anomaly detection in conjunction with an ensemble random forest (RF) classifier. The GAN-RF model achieved 95.01% of accuracy for intrusion detection and obtain better recall and F1-score. Extensive assessments and valuations illustrate the efficiency of the GAN-RF approach in accurately identifying network issues.
Volume: 15
Issue: 2
Page: 2491-2498
Publish at: 2025-04-01

Two-scale decomposition and deep learning fusion for visible and infrared images

10.11591/ijece.v15i2.pp1593-1601
Ruhan Bevi Azad , Hari Unnikrishnan , Lokesh Gopinath
The paper focuses on the fusion of visible and infrared images to generate composite images that preserve both the thermal radiation information from the infrared spectrum and the detailed texture from the visible spectrum. The proposed approach combines traditional methods, such as two-scale decomposition, with deep learning techniques, specifically employing an autoencoder architecture. The source images are subjected to two-scale decomposition, which extracts high-frequency detail and low-frequency base information. Additionally, an algorithmic unravelling technique establishes a logical connection between deep neural networks and traditional signal processing algorithms. The model consists of two encoders for decomposition and a decoder after the unravelling operation. During testing, a fusion layer merges the decomposed feature maps, and the decoder generates the fused image. Evaluation metrics including entropy, average gradient, spatial frequency and standard deviation are employed to subjectively assess fusion quality. The proposed approach demonstrates promise for effectively combining visible and infrared imagery for various applications.
Volume: 15
Issue: 2
Page: 1593-1601
Publish at: 2025-04-01

Improving water quality parameter prediction with multi-level linear regression model and hybrid feature selection

10.11591/ijece.v15i2.pp2381-2391
Aleefia Khurshid , Samruddhi Korke , Yudhir Kothari , Shruti Alone , Khushali Bais
Predicting and modeling the quality of water is essential to guarantee that the water is safe to drink. The chlorine content in water needs to be monitored in real-time to provide a consistent supply of drinkable water. Additionally, potassium and chlorine have a major impact on how appealing the water is, as they are important components that influence taste and odor. Therefore, to evaluate the levels of chlorine and potassium, this work presents a multivariable linear regression approach backed by a hybrid feature extraction method. To bridge the gap between the filter and wrapper approaches, a hybrid approach is used to remove unnecessary information and reduce processing time and complexity. Here the quantitative parameters, in conjunction with categorical parameters, are instrumental in enabling accurate prediction of two water quality parameters. The two developed multi-level regression (MLR) models for the prediction of potassium and chloride are useful when factors affecting water parameters fluctuate at the site level as well as over larger spatial or temporal scales giving consumers a visual representation of how each parameter influences prediction. The converged model outperforms in comparison with other machine learning algorithms with an MAE of 7.42e-15 for potassium and 3.72e-14 for chloride.
Volume: 15
Issue: 2
Page: 2381-2391
Publish at: 2025-04-01

An improved key scheduling for advanced encryption standard with expanded round constants and non-linear property of cubic polynomials

10.11591/ijece.v15i2.pp2455-2467
Muthu Meenakshi Ganesan , Sabeen Selvaraj
The advanced encryption standard (AES) offers strong symmetric key encryption, ensuring data security in cloud computing environments during transmission and storage. However, its key scheduling algorithm is known to have flaws, including vulnerabilities to related-key attacks, inadequate nonlinearity, less complicated key expansion, and possible side-channel attack susceptibilities. This study aims to strengthen the independence among round keys generated by the key expansion process of AES—that is, the value of one round key does not reveal anything about the value of another round key—by improving the key scheduling process. Data sets of random, low, and high-density initial secret keys were used to evaluate the strength of the improved key scheduling algorithm through the National Institute of Standards and Technology (NIST) frequency test, the avalanche effect, and the Hamming distance between two consecutive round keys. A related-key analysis was performed to assess the robustness of the proposed key scheduling algorithm, revealing improved resistance to key-related cryptanalysis.
Volume: 15
Issue: 2
Page: 2455-2467
Publish at: 2025-04-01

Android-based smart digital marketplace application on agricultural commodities using a new variant recommendation system

10.11591/ijece.v15i2.pp1968-1977
Subiyanto Subiyanto , Sucihatiningsih Dian Wisika Prajanti , Nur Azis Salim , Setya Budi Arif Prabowo , Deyndrawan Sutrisno , Andika Anantyo , Dewi Anggriani
In the marketing of agricultural products, addressing the challenges associated with extensive distribution chains is essential, as these directly affect sellers. Additionally, the vast array of available product options often overwhelms customers, complicating their efforts to identify and purchase items that align with their preferences. This work aims to develop a smart e-commerce application for agribusiness, specifically designed for agricultural products on the Android platform. The application integrates a recommendation system that utilizes geolocation-aware neural graph collaborative filtering (GA-NGCF), which facilitates product marketing for farmers and streamlines the product search and selection process for users based on personalized preferences. The development process encompassed various stages, from planning to rigorous testing. The application’s recommendation system, which implements GA-NGCF, operates based on three primary elements: the creation of a geolocation graph of user-item data, the integration of information between neighboring nodes, and the prediction of user preferences. The resulting smart agribusiness e-commerce application, enhanced by GA-NGCF, demonstrated marked improvements in recommendation accuracy and overall application performance during testing. Empirical results indicated substantial enhancements in recommendation metrics, with GA-NGCF achieving a recall of 0.34, a precision of 0.36, and normalized discounted cumulative gain of 0.37, thereby outperforming existing models.
Volume: 15
Issue: 2
Page: 1968-1977
Publish at: 2025-04-01

Enhancing engineering education through virtual reality: a systematic study on immersive engineering education practices

10.11591/ijece.v15i2.pp1889-1899
Tarek Riaji , Sanae El Hassani , Fatima Ezzahrae M'hamdi Alaoui
This article explores the integration of virtual reality (VR) and associated technologies in engineering education, focusing on the pedagogical approaches adopted in this integration, which we refer to as immersive engineering education. This study considers the application possibilities and the transformative impact of VR on engineering education. The article addresses the critical collection and analysis of VR applications in engineering education. It covers main VR-related papers published from 2015 to February 2024 and indexed in Scopus, Web of Sciences, or both, and discussing design, development challenges, and collaborative tools. Empirical evidence showcases improved engagement, motivation, and learning outcomes. The findings offer modern insights for educators and researchers on leveraging VR for impactful learning experiences, while also noting the need for further research in this evolving field.
Volume: 15
Issue: 2
Page: 1889-1899
Publish at: 2025-04-01

Classification of brain stroke based on susceptibility-weighted imaging using machine learning

10.11591/ijece.v15i2.pp1602-1611
Shaarmila Kandaya , Norhashimah Mohd Saad , Abdul Rahim Abdullah , Ezreen Farina Shair , Ahmad Sobri Muda , Muhammad Izzat Ahmad Sabri
Magnetic resonance imaging (MRI) is used to identify brain disorders, particularly strokes. Rapid treatment, often referred to as "time is brain," is emphasized in recent studies, stressing the significance of early intervention within six hours of stroke onset to save lives and enhance outcomes. The traditional manual diagnosis of brain strokes by neuroradiologists is both subjective and time-intensive. To tackle this challenge, this study introduces an automated method for classify brain stroke from MRI images based on pre- and post-stroke patients. The technique employs machine learning, with a focus on susceptibility weighted imaging (SWI) sequences, and involves four stages: preprocessing, segmentation, feature extraction, classification and performance evaluation. The paper proposes classification and performance evaluation to determine stroke region according to three types of categories, those are poor improvement, moderate improvement and good improvement stroke patients based on pre and post patients. Then, performance evaluation is verified using accuracy, sensitivity and specificity. Results indicate that the hybrid support vector machine and bagged tree (SVMBT) yields the best performance for stroke lesion classification, achieving the highest accuracy which is 99% and showing significant improvement for stroke patients. In conclusion, the proposed stroke classification technique demonstrates promising potential for brain stroke diagnosis, offering an efficient and automated tool to assist medical professionals in timely and accurate assessments.
Volume: 15
Issue: 2
Page: 1602-1611
Publish at: 2025-04-01

An adaptive audio wave steganography using simulated annealing algorithm

10.11591/ijece.v15i2.pp2237-2253
Atef Ahmed Obeidat , Mohmmed Jazi Bawaneh , Sawsan Yousef Abu Shqair , Hamdi A. Al-Omari , Emad Fawzi Al-shalabi
The science of information security has increased in importance to encounter the espionage and information theft. This research proposes a new steganography framework that utilizes simulated annealing (SA) as an artificial intelligence algorithm to support the process of hiding a binary secret message file within an audio wave file. The best path for embedding the secret data inside the audio file is determined through SA that searches for the preferred path according to the content of the host audio file and secret message to be hidden. The least significant bit (LSB) technique was employed to hide message bytes, in which each audio-chosen byte will hold one bit from a secret message byte. The hiding process constructs the stego audio file and extraction key that will be required in an extraction process. The authorized user requires an extraction key and a decryption key to retrieve the hidden message. On the other hand, the attacker requires knowledge of the aforementioned keys and working algorithms that were employed in the hidden process. Robustness against data extraction, detection, imperceptibility (phonological hearing), security, peak signal to noise ratio (PSNR), mean square error (MSE) and capacity as security performance measures were used to evaluate the system. The maximum size of the data to be hidden may reach 12.5% of the data size of the host audio file, in which the average value of MSE and PSNR are (0.0041, 74.73), respectively.
Volume: 15
Issue: 2
Page: 2237-2253
Publish at: 2025-04-01

Maximum expansion with contiguity constraints scheduling algorithm: enhancing uplink transmission in long-term evolution vehicular environments

10.11591/ijece.v15i2.pp1709-1719
Shafinaz Ismail , Shajahan Maidin , Darmawaty Mohd Ali , Mohd Kamarulnizam Abdul Rahim
Uplink scheduling has become increasingly important due to increased activities like uploading videos, photos, and file sharing. Many users share or stream live videos and engage with social networks, significantly increasing uplink data traffic volume. Single carrier frequency division multiple access (SC-FDMA) is favored for its power efficiency and high data rates, benefiting user equipment (UE) battery life. However, maintaining the contiguity of resource blocks (RBs) poses challenges in uplink scheduling. The maximum expansion with contiguity constraints (MECC) algorithm has been introduced to address this challenge. MECC prioritizes contiguity, fairness, and throughput for users at the cell edge. The algorithm operates in two phases: initially allocating RBs proportionally and assigning RBs with the highest metrics while ensuring contiguity. Performance evaluation of MECC, conducted under conditions simulating vehicular movement at 30 km/h, demonstrates its superiority over other algorithms. MECC provides high fairness and throughput for both real-time (RT) and non-real-time (NRT) traffic, making it the preferred scheduler for ensuring quality of service (QoS) for both traffic types. Its focus on contiguity, fairness, throughput, and spectral efficiency establishes MECC as a valuable tool for optimizing uplink transmission in mobile networks, addressing the evolving needs of users in today's digital landscape.
Volume: 15
Issue: 2
Page: 1709-1719
Publish at: 2025-04-01

Study on postal life insurance attributes and its growth prediction using machine learning algorithms

10.11591/ijeecs.v38.i1.pp622-631
Thangavelu Ananadaraj Rajasekaran , Pichamuthu Vijayalakshmi , Velayutham Rajendran
The oldest insurer in the country, since 1884, is Postal Insurance. For today's livelihood, the citizens of India's life-saving coverage and insurance have become necessary. For customers to overcome difficult situations, life insurance is crucial in creating confidence. This is one of the highlights of the Postal organization. Under postal life insurance (PLI), the volume of new policies is enrolled throughout India, and a supervised machine learning (ML) process for finding the business cluster is carried out based on this data, which is discussed. A ML algorithm that predicts the growth for the future, using a suitable algorithm for accessing the features and process to identify the prediction model, has been developed, which is the main goal of this study. Simulation results show that expected is one of the most important variables used to predict and that both random forest (RF) and logistic regression outperformed the other two models. The RF model is the most effective and fastest in predicting the system's future state, and it shows the highest value for the PLI product.
Volume: 38
Issue: 1
Page: 622-631
Publish at: 2025-04-01

Optimizing convolutional neural networks-based ensemble learning for effective herbal leaf disease detection

10.11591/ijece.v15i2.pp2416-2426
Ni Luh Wiwik Sri Rahayu Ginantra , Christina Purnama Yanti , Made Suci Ariantini
This study aims to optimize convolutional neural networks (CNN)-based ensemble learning models to enhance accuracy and stability in detecting herbal leaf diseases. The dataset used in this study is sourced from the “Lontar Taru Pramana” collection, which includes various images of herbal leaves affected by different diseases such as Ancak Bacterial Spot, Dapdap Mosaic Virus, and Kelor Powdery Mildew. Several CNN models, including VGG16, AlexNet, ResNet50, DenseNet121, MobileNetV2, and InceptionV2, were evaluated. Among these, the ensemble models combining VGG16, DenseNet121, and MobileNetV2 were selected due to their superior performance. The ensemble model achieved precision scores of 0.81 for class 1, 0.76 for class 2, and 0.78 for class 3, with corresponding recall scores of 0.8167, 0.74, and 0.7633, and F1-scores of 0.8133, 0.75, and 0.7717 respectively. These results indicate significant improvements in model performance and robustness.
Volume: 15
Issue: 2
Page: 2416-2426
Publish at: 2025-04-01

A comprehensive analysis of different models: skin cancer detection

10.11591/ijece.v15i2.pp2404-2415
Amruta Thorat , Chaya Jadhav
Due to fast-growing worldwide air pollution and ozone layer destruction, an alarming number of people are found to have skin cancer, more than any other kind of cancer combined. It is known to be one of the deadliest malignancies; if not identified and cured in its early stages, it is likely to spread to other body parts. Early detection is critical and helps prevent cancer from spreading. This allows for early decisions on diagnostic and treatment options. Early diagnosis and discovery, combined with the right treatment, can save lives. In this paper, we have done a detailed survey on various techniques and models developed for skin cancer detection and also discussed different security-related issues. This work thoroughly explores the several types of models utilized to identify cancer in the skin.
Volume: 15
Issue: 2
Page: 2404-2415
Publish at: 2025-04-01

Vehicle side control of a wireless power transfer charger using optimized artificial neural network

10.11591/ijece.v15i2.pp1487-1498
Marouane El Ancary , Abdellah Lassioui , Hassan El Fadil , Anwar Hasni , Yassine El Asri , Zakariae El Idrissi
This paper investigates a new approach to control a wireless power transfer (WPT) charger for electric vehicles (EVs) employing an optimized artificial neural network (ANN). Enhancing the efficiency and robustness of such systems is crucial, and integrating artificial intelligence (AI)-based solutions has introduced innovative approaches in this field. The proposed method enables precise regulation of battery charging voltage even under challenging conditions, such as coil misalignment or shared grounding assemblies for multiple EVs. To assess the stability and robustness of the proposed controller, its performance was evaluated under scenarios of coil misalignment and shared grounding assemblies for EVs with varying battery voltages. The controller effectively eliminated overshoot and significantly reduced residual output voltage ripple by 4.33% compared to a conventional proportional-integral (PI) controller, demonstrating the superior performance and reliability of the ANN-based control approach.
Volume: 15
Issue: 2
Page: 1487-1498
Publish at: 2025-04-01

A unique YOLO-based gated attention deep convolution network-Lichtenberg optimization algorithm model for a precise breast cancer segmentation and classification

10.11591/ijece.v15i2.pp1670-1685
Vinoth Rathinam , Sasireka Rajendran , Valarmathi Krishnasamy
A novel you only look once (YOLO)-based gated attention deep convolution network (GADCN) classification algorithm is developed and utilized in this present study for the detection of breast cancer. In this framework, contrast enhancement-based histogram equalization is applied initially to produce the normalized breast image with reduced noise artifacts. Then, the breast region is accurately segmented from the preprocessed images with low complexity and segmentation error using the YOLO-based attention network model. To diagnose breast cancer with better accuracy, the GADCN model is used to predict the exact class of image (i.e., benign or malignant). During classification, the activation function is optimally computed with the use of the Lichtenberg optimization algorithm (LOA). It aids in achieving improved classification performance with little complexity in training and assessment. The significance of the present study includes the use of a unique, YOLO-based GADCN-LOA model that helps in the prediction of breast cancer with higher accuracy. It was observed that the model exhibited 99% accuracy for the datasets utilized. In addition, the selected model outperforms well with sensitivity, specificity, precision, and F1-score. Hence the proposed model could be exploited for the diagnosis of breast cancer at an early stage to enable preventive care.
Volume: 15
Issue: 2
Page: 1670-1685
Publish at: 2025-04-01

Tackling the anomaly detection challenge in large-scale wireless sensor networks

10.11591/ijece.v15i2.pp2479-2490
Tamara Zhukabayeva , Aigul Adamova , Lazzat Zholshiyeva , Yerik Mardenov , Nurdaulet Karabayev , Dilaram Baumuratova
One of the areas of ensuring the security of a wireless sensor network (WSN) is anomaly detection, which identifies deviations from normal behavior. In our paper, we investigate the optimal anomaly detection algorithms in a WSN. We highlight the problems in anomaly detection, and we also propose a new methodology using machine learning. The effectiveness of the k-nearest neighbor (kNN) and Z Score methods is evaluated on the data obtained from WSN devices in real time. According to the experimental study, the Z Score methodology showed a 98.9% level of accuracy, which was much superior to the kNN 43.7% method. In order to ensure accurate anomaly detection, it is crucial to have access to high-quality data when conducting a study. Our research enhances the field of WSN security by offering a novel approach for detecting anomalies. We compare the performance of two methods and provide evidence of the superior effectiveness of the Z Score method. Our future research will focus on exploring and comparing several approaches to identify the most effective anomaly detection method, with the ultimate goal of enhancing the security of WSN.
Volume: 15
Issue: 2
Page: 2479-2490
Publish at: 2025-04-01
Show 8 of 1659

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration