Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,593 Article Results

Identification types of plant using convolutional neural network

10.11591/ijece.v15i6.pp5827-5836
Radityo Hendratmojo Jati Notonegoro , Hustinawaty Hustinawaty
Artificial intelligence can be implemented in fields that related to environmental education by providing knowledge for taxonomy which recognize and identify plant species based on its features. The variety of plant species that inhabit in a certain area allows many plant species to be found that look similar so that difficult to distinguish and recognize a particular plant. Convolutional neural network (CNN) often used in object detection, you only look once (YOLO), one of CNN’s object detections, could identify object in real time and obtained good performance and accuracy in several researched. However, no studies have ever identified a plant from its flowers, leaves, and fruits. Therefore, the main object of this paper is identified types of plant with CNN (YOLOv8). The YOLOv8 model with 0.01 learning rate, 32 batch size, stochastic gradient descent (SGD) optimizer obtained highest precision of 69.62% and F1 score of 61.22%, recall of 54.73%, mAP50 and mAP50 – 90 on the training data of 57.61% and 42.49%.
Volume: 15
Issue: 6
Page: 5827-5836
Publish at: 2025-12-01

Optimization of a level shifter integrated with a gate driver using TSMC 130 nm CMOS technology

10.11591/ijece.v15i6.pp5223-5233
Hicham Guissi , Khadija Slaoui
Modern electronic systems increasingly operate across multiple voltage domains, necessitating robust and efficient level shifter (LS) circuits to ensure reliable inter-domain communication. In low-power digital applications, minimizing propagation delay and transition time is critical for achieving high-speed and energy-efficient operation. This work presents a high-performance level shifter optimized for integration within Li-ion battery charger systems. The proposed design achieves a substantial reduction in propagation delays from 0.15 to 0.09062 ns while preserving signal integrity. When integrated with a gate driver, the overall structure exhibits a propagation delay of 0.20468 ns and a transition time of 0.014 ns, marking a significant improvement from the previous 0.036 ns. Furthermore, the proposed circuit occupies only 0.00039 mm² of silicon area, representing a 92% reduction compared to prior implementations (0.05 mm²). The complete design was implemented using Taiwan semiconductor manufacturing company (TSMC) 130 nm complementary metal–oxide– semiconductor (CMOS) technology, with both schematic simulation and layout carried out in the Cadence Virtuoso design environment. These results underscore the potential of the proposed solution for compact and high-efficiency system-on-chip (SoC) battery management applications.
Volume: 15
Issue: 6
Page: 5223-5233
Publish at: 2025-12-01

Integration of ultra-wideband elliptical antenna with frequency selective surfaces array for performance improvement in wireless communication

10.11591/ijece.v15i6.pp5515-5523
Saleh Omar , Chokri Baccouch , Rhaimi Belgacem Chibani
The integration of frequency selective surfaces (FSS) with antennas has gained significant attention due to its ability to enhance key radio frequency (RF) performance parameters such as gain, directivity, and bandwidth, making it highly beneficial for modern wireless communication systems. In this work, we propose and investigate an ultra-wideband (UWB) elliptical antenna operating within the 5.2 to 10 GHz frequency range. To further improve its performance, we integrate the antenna with a 13×13 FSS array. The impact of the FSS on the antenna’s characteristics is analyzed, showing a remarkable gain enhancement from 2.6 dBi (without FSS) to 10.05 dBi (with FSS). These results confirm the effectiveness of FSS integration in optimizing UWB antenna performance, making it a promising approach for advanced wireless communication applications.
Volume: 15
Issue: 6
Page: 5515-5523
Publish at: 2025-12-01

Memoryless state-recovery cryptanalysis method for lightweight stream cipher – A5/1

10.11591/ijece.v15i6.pp5453-5465
Khedkar Aboli Audumbar , Uday Pandit Khot , Balaji G. Hogade
Cryptology refers to the discipline concerned with securing communication and data in transit by transforming it into an unintelligible form, thereby preventing interpretation by unauthorized entities. Cryptanalysis is the study and practice of analyzing cryptographic systems with the aim of uncovering their weaknesses, finding vulnerabilities and obtaining unauthorized access to encrypted data. A5/1 is a lightweight stream cipher used to protect GSM communications. There are two memoryless cryptanalysis techniques used for this cipher which are Golic’s Guess-and-determine attack and Zhang’s Near Collision attack. In this paper a new guessing technique called move guessing technique used to construct linear equation filter along with Golic’s guess and determine technique is studied. Two modifications in move guessing technique are proposed for recovery of internal states S0 and S1. Further, a novel algorithm is proposed to select the modification to get minimum time complexity for recovery of internal states S0 and S1. The proposed algorithm gives minimum time complexity of 229.3138 at t = 14 for recovery of S0 state and 243.246 for recovery of S1 at t = 22.
Volume: 15
Issue: 6
Page: 5453-5465
Publish at: 2025-12-01

Explainable fault diagnosis using discrete grey wolf optimization algorithm for photovoltaic system

10.11591/ijece.v15i6.pp5286-5296
Slimani Hassina , Chouhal Ouahiba , Beddiaf Yassine , Mahdaoui Rafik , Haouassi Hichem , Hamdi Roumaissa
The present article introduces the discrete grey wolf optimization algorithm (DGWOA), a novel variant of the grey wolf optimizer (GWO). DGWOA integrates discrete optimization techniques with explainable artificial intelligence (XAI) methodologies. This approach aims to overcome limitations associated with traditional fault diagnosis methods, such as limited accuracy in identifying complex patterns and low interpretability. Furthermore, it mitigates early convergence problems commonly encountered in optimization algorithms and enhances adaptability to discrete classification challenges. The DGWOA algorithm is designed to generate interpretable classification rules for fault detection through a stochastic search strategy. The explainability provided by the model not only enhances decision-making transparency but also improves diagnostic efficiency and predictive accuracy. The proposed algorithm was evaluated using a photovoltaic system dataset and benchmarked against established rule-based classifiers. DGWOA consistently achieved a classification accuracy of 99.48% and a precision of 100%, demonstrating its effectiveness in enhancing fault detection. Moreover, the interpretability of the generated classification rules contributes to the generation of outcomes that are both actionable and comprehensible to decision-makers.
Volume: 15
Issue: 6
Page: 5286-5296
Publish at: 2025-12-01

Enhancing system integrity with Merkle tree: efficient hybrid cryptography using RSA and AES in hash chain systems

10.11591/ijece.v15i6.pp5679-5689
Irza Nur Fauzi , Farikhin Farikhin , Ferry Jie
An analysis is conducted to address the growing threats of data theft and unauthorized manipulation in digital transactions by integrating \structures within hash chain systems using hybrid cryptography techniques, specifically Rivest-Shamir-Adleman (RSA) and advanced encryption standard (AES) algorithms. This approach leverages AES for efficient symmetric data encryption and RSA for secure key exchanges, while the hash chain framework ensures that each data block is cryptographically linked to its predecessor, reinforcing system integrity. The Merkle tree structure plays a crucial role by allowing precise and rapid detection of unauthorized data changes. Empirical analyses demonstrate notable improvements in both the efficiency of cryptographic processes and the robustness of data validation, underscoring the method’s applicability in high data throughput environments such as educational institutions. This research makes a substantive contribution to information security by offering a sophisticated solution that strengthens data protection practices, ensuring greater resilience against increasingly sophisticated data threats.
Volume: 15
Issue: 6
Page: 5679-5689
Publish at: 2025-12-01

Enhancing supply chain agility with advanced weather forecasting

10.11591/ijece.v15i6.pp5904-5913
Imane Zeroual , Jaber El Bouhdidi
This article presents a solution that leverages artificial intelligence techniques to enhance urban freight transportation planning and organization through the integration of weather forecasting data. We identify key challenges in the current urban logistics landscape and introduce a range of machine learning models designed to predict delivery delays. Logistic regression serves as the foundational model, analyzing historical delivery data in conjunction with weather conditions to assess the likelihood of delays, thus enabling informed decision-making for companies. Additionally, we evaluate two other machine learning models to determine the most effective approach for our specific context, assessing their accuracy and capacity to deliver actionable insights. By improving the predictive capabilities of urban freight systems, this research aims to streamline operations, reduce costs, and enhance overall service reliability, contributing to more efficient and resilient urban transportation networks.
Volume: 15
Issue: 6
Page: 5904-5913
Publish at: 2025-12-01

Plant disease detection and classification: based on machine learning and Eig(Hess)-co-occurrence histograms of oriented gradients

10.11591/ijece.v15i6.pp5336-5346
El Aroussi El Mehdi , Barakat Latifa , Silkan Hassan
Agricultural districts provide high-quality food and contribute substantially to economic growth and population support. However, plant diseases can directly reduce food production and threaten species diversity. The use of precise, automated detection techniques for early disease identification can improve food quality and mitigate economic losses. Over the past decade, numerous methods have been proposed for plant disease classification, and in recent years the focus has shifted toward deep learning approaches because of their outstanding performance. In this study, we employ the Eig(Hess)-co-occurrence histograms of oriented gradients (CoHOG) descriptor alongside pre-trained machine-learning models to accurately identify various plant diseases. We apply principal component analysis (PCA) for dimensionality reduction, thereby enhancing computational efficiency and overall model performance. Our experiments were conducted on the popular PlantVillage database, which contains 54,305 images across 38 disease classes. We evaluate model performance using classification accuracy, sensitivity, specificity, and F1-score, and we perform a comparative analysis against state-of-the-art methods. The findings indicate that the approach we proposed achieves up to 99.83% accuracy, outperforming existing models. Additionally, we test the robustness of our method under various conditions to highlight its potential for real-world agricultural applications.
Volume: 15
Issue: 6
Page: 5336-5346
Publish at: 2025-12-01

The evolution of routing in VANET: an analysis of solutions based on artificial intelligence and software-defined networks

10.11591/ijece.v15i6.pp5388-5400
Lewys Correa Sánchez , Octavio José Salcedo Parra , Jorge Gómez
This study explored the evolution of vehicular ad hoc networks (VANET) and focused on the challenges and opportunities for routing in these dynamic environments. Despite advancements in traditional protocols, a significant gap persists in the ability to adapt to highly mobile environments with variable traffic, which limits routing efficiency and quality of service. Emerging technologies, such as artificial intelligence (AI) and software- defined networks (SDN), are discussed that have the potential to revolutionize the management of VANET. Machine learning can be used to predict traffic, optimize routes, and adapt routing protocols in real-time. Furthermore, SDN can simplify routing management and enable greater flexibility in network configurations. A comprehensive overview of the convergence of AI and SDN is presented, and the potential complementarities between these technologies to address routing challenges in VANET are explored. Finally, the implications of efficient routing in VANET for road safety, traffic management, and the development of new applications are discussed, and future research lines are identified to address challenges such as scalability, data security, and computational efficiency in vehicular environments.
Volume: 15
Issue: 6
Page: 5388-5400
Publish at: 2025-12-01

Empowering low-resource languages: a machine learning approach to Tamil sentiment classification

10.11591/ijict.v14i3.pp941-949
Saleem Raja Abdul Samad , Pradeepa Ganesan , Justin Rajasekaran , Madhubala Radhakrishnan , Peerbasha Shebbeer Basha , Varalakshmi Kuppusamy
Sentiment analysis is essential for deciphering public opinion, guiding decisions, and refining marketing strategies. It plays a crucial role in monitoring public sentiment, fostering customer engagement, and enhancing relationships with businesses' target audiences by analyzing emotional tones and attitudes in vast textual data. Sentiment analysis is extremely limited, particularly for languages like Tamil, due to limited application in diverse linguistic contexts with fewer resources. Given its global impact and linguistic diversity, addressing this gap is crucial for a more nuanced understanding of sentiments in India. In the context of Tamil, the need for sentiment analysis models is particularly crucial due to its status as one of the classical languages spoken by millions. The cultural, social, and historical nuances embedded in Tamil language usage require tailored sentiment analysis approaches that can capture the subtleties of sentiment expression. This paper introduces a novel method that assesses the performance of various text embedding methods in conjunction with a range of machine learning (ML) algorithms to enhance sentiment classification for Tamil text, with a specific focus on lyrics. Experiments notably emphasize FastText word embedding as the most effective method, showcasing superior results with a remarkable 78% accuracy when coupled with the support vector classification (SVC) model.
Volume: 14
Issue: 3
Page: 941-949
Publish at: 2025-12-01

Javanese and Sundanese speech recognition using Whisper

10.11591/csit.v6i3.p253-261
Alim Raharjo , Amalia Zahra
Automatic speech recognition (ASR) technology is essential for advancing human-computer interaction, particularly in a linguistically diverse country like Indonesia, where approximately 700 native languages are spoken, including widely used languages like Javanese and Sundanese. This study leverages the pre-trained Whisper Small model an end‑to‑end transformer pretrained on 680,000 hours of multilingual speech, fine tuning it specifically to improve ASR performance for these low resource languages. The primary goal is to increase transcription accuracy and reliability for Javanese and Sundanese, which have historically had limited ASR resources. Approximately 100 hours of speech from OpenSLR were selected, covering both reading and conversational prompts, the data exhibited dialectal variation, ambient noise, and incomplete demographic metadata, necessitating normalization and fixed‑length padding. with model evaluation based on the word error rate (WER) metric. Unlike approaches that combine separate acoustic encoders with external language models, Whisper unified architecture streamlines adaptation for low‑resource settings. Evaluated on held‑out test sets, the fine‑tuned models achieved Word Error Rates of 14.97% for Javanese and 2.03% for Sundanese, substantially outperforming baseline systems. These results demonstrate Whisper effectiveness in low‑resource ASR and highlight its potential to enhance transcription accuracy, support language preservation, and broaden digital access for underrepresented speech communities. 
Volume: 6
Issue: 3
Page: 253-261
Publish at: 2025-11-01

Optimizing energy distribution efficiency in wireless sensor networks using the hybrid LEACH-DECAR algorithm

10.11591/csit.v6i3.p262-273
Muhammad Abyan Nizar Muntashir , Vera Noviana Sulistyawan , Noor Hudallah
Wireless sensor network (WSN) is a network system consisting of various supporting components that integrate information to the base station. In its operation, delivery is greatly influenced by energy usage because limited battery supply causes variability in energy consumption on node activity factors, communication distance, and environmental conditions. So, in order to increase performance and energy efficiency, a routing protocol is required by selecting the best path through cluster head. The technique of determining the cluster head (CH) based on energy is used to avoid irregularity (randomness). In this study, the hybrid routing protocol selects CH based on the remaining energy, considering distance, coverage radius, and energy metrics. The system test evaluation compares the implementation of low-energy adaptive clustering hierarchy (LEACH) and hybrid LEACH- Distributed, energy and coverage-aware routing (DECAR). The results of 300 rounds show that the hybrid achieves a packet delivery ratio close to 100% and a throughput of 78.22 Kbps, while LEACH achieves a packet delivery ratio of 92.18% and a throughput of 247.15 Kbps. The average energy consumption of LEACH is 99.27%, while the hybrid shows much greater efficiency at 30.55%. This study emphasizes the significance of maintaining equilibrium performance and energy consumption in the development of future routing protocols.
Volume: 6
Issue: 3
Page: 262-273
Publish at: 2025-11-01

Cloud computing needs to explore into sky computing

10.11591/csit.v6i3.p294-306
Arif Ullah , Hassnae Remmach , Hanane Aznaoui , Canan Batur Şahin , Amine Mrhari
This paper evaluates key issues in cloud computing and introduces a novel model, known as sky computing, to address these challenges. Cloud computing, a transformative technology, has played a critical role in reshaping modern operations—especially following the COVID-19 pandemic, when many human activities shifted to technology-driven platforms. It offers multiple service models, including Software as a Service, Hardware as a Service, Desktop as a Service, Backup as a Service, and Network as a Service, each tailored to user requirements. However, the rapid expansion of cloud-based technologies and interconnected systems has intensified infrastructure and scalability challenges. Sky computing, or the “cloud of clouds,” emerges as an advanced layer above traditional cloud models, enabling dynamically provisioned, distributed domains built over multiple serial clouds. Its core capability lies in offering variable computing capacity and storage resources with dynamic, real-time support, providing a robust and unified platform by integrating diverse cloud resources. This paper reviews related technologies, summarizes prior research on sky computing, and discusses its structural design. Furthermore, it examines the limitations of current cloud computing frameworks and highlights how sky computing could overcome these barriers, positioning it as a pivotal architecture for the future of distributed computing.
Volume: 6
Issue: 3
Page: 294-306
Publish at: 2025-11-01

Characteristics ransomware stop/djvu remk and erqw variants with static-dinamic analysis

10.11591/csit.v6i3.p283-293
Dodon Turianto Nugrahadi , Friska Abadi , Rudy Herteno , Muliadi Muliadi , Muhammad Alkaff , Muhammad Alvin Alfando
Ransomware has developed into various new variants every year. One type of ransomware is STOP/DJVU, containing more than 240+ variants. This research to determine changes in differences characteristics and impact between ransomware variants STOP/DJVU remk, which is a variant from 2020, and the erqw variant from 2023, through a mixed-method research approach. Observation, simulation using mixing static and dynamic malware analysis methods. Both variants are from the Malware Bazaar site. The total characteristics based on dynamic analysis, the remk variant has 177, and the erqw variant has 190, which increased by 1.8%. The total characteristics based on static analysis, the remk variants have 586, and the erqw variants have 736, which increased by 5.7%. All characteristics from remk to erqw increasing in dynamic analysis, except the number of payloads that decreased about 20%. In static analysis, all characteristics from remk to erqw increase except the number of sections decreased about 1.5%. It can be the affected CPU performance, because the remk variant affects performance by increasing CPU work by 3.74%, while the erqw variant affects performance by reducing CPU work by 1.18%, both compared with normal CPU. which will affect the ransomware's destructive work and require changes in its handling.
Volume: 6
Issue: 3
Page: 283-293
Publish at: 2025-11-01

Multi-visual modality for collaborative filtering-based personalized POI recommendations

10.11591/ijeecs.v40.i2.pp978-987
Sudarat Arthan , Kreangsak Tamee
Point-of-interest (POI) recommendation systems help users discover locations that match their interests. However, these systems often suffer from data sparsity due to limited user check-in history. To address this challenge, this study proposed a novel user profiling framework that incorporates multiple visual modalities derived from user-generated photos. Three types of visual-based user profiles were constructed: image label-based, image feature-based, and a fused profile, combining both modalities through score-level fusion. We conducted extensive experiments on two real-world datasets. The results demonstrate that visual-based profiles, particularly the image feature-based profile, consistently improve recommendation performance under sparse data conditions. Although the fused profile offered stable results, it did not consistently outperform the single modality. Furthermore, performance was sensitive to the number of nearest neighbors and the amount of training data. These findings highlight the importance of modality selection and fusion strategy in visual-based POI recommendation systems.
Volume: 40
Issue: 2
Page: 978-987
Publish at: 2025-11-01
Show 9 of 1907

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration