Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

An algorithm for training neural networks with L1 regularization

10.11591/ijai.v14.i5.pp3781-3789
Ekaterina Gribanova , Roman Gerasimov
This paper presents a new algorithm for building neural network models that automatically selects the most important features and parameters while improving prediction accuracy. Traditional neural networks often use all available input parameters, leading to complex models that are slow to train and prone to overfitting. The proposed algorithm addresses this challenge by automatically identifying and retaining only the most significant parameters during training, resulting in simpler, faster, and more accurate models. We demonstrate the practical benefits of the proposed algorithm through two real-world applications: stock market forecasting using the Wilshire index and business profitability prediction based on company financial data. The results show significant improvements over conventional methods: models use fewer parameters–creating simpler, more interpretable solutions–achieve better prediction accuracy, and require less training time. These advantages make the algorithm particularly valuable for business applications where model simplicity, speed, and accuracy are crucial. The method is especially beneficial for organizations with limited computational resources or that require fast model deployment. By automatically selecting the most relevant features, it reduces the need for manual feature engineering and helps practitioners build more efficient predictive models without requiring deep technical expertise in neural network optimization.
Volume: 14
Issue: 5
Page: 3781-3789
Publish at: 2025-10-01

Identification of factors that influence student satisfaction from the analysis of voice messaging from WhatsApp: a case study

10.11591/ijere.v14i5.27328
Omar Chamorro-Atalaya , Giorgio Aquije-Cardenas , Raymundo Carranza-Noriega , Lilly Moreno-Chinchay , Yurfa Medina-Bedón , Rufino Alejos-Ipanaque , Abel Tasayco-Jala , Susan Gonzales-Saldaña
In these times when there is talk of a return to a new normality in education after what happened due to the pandemic, it is necessary to permanently evaluate the perception of student satisfaction, contributing to the results obtained through traditional methods such as the survey, with methods in which open opinions can be analyzed as in the case of voice analysis. In this sense, this article describes a case study, which aims to identify the factors that influence student satisfaction with respect to teaching performance, based on the analysis of WhatsApp voice messaging. The study has a qualitative approach, exploratory level and non-experimental design. It was possible to identify various factors grouped into five categories: i) planning; ii) didactic strategies; iii) communication; iv) administration of the class session; and v) professional and personal characteristics of the teacher. Therefore, it is concluded that it is possible to close the gaps between the factors that are sensitive and relevant for the university, when a questionnaire with delimited questions is applied to observe only some factors of student satisfaction, with respect to those sensitive factors and relevant to students, by analyzing their comments from the use of voice messaging from mobile applications.
Volume: 14
Issue: 5
Page: 3744-3755
Publish at: 2025-10-01

Anomaly-based intrusion detection leveraging optimized firewall log analysis: a real-time machine learning solution

10.11591/ijece.v15i5.pp4785-4802
Tran Cong Hung , Dam Minh Linh , Han Minh Chau , Ngo Xuan Thoai , Thai Duc Phuong , Huynh De Thu
Firewall logs play a vital role in cybersecurity by recording network traffic and flagging potential threats. This study evaluates five machine learning algorithms-decision tree (DT), random forest (RF), extra trees (ET), CatBoost (CB), and AdaBoost (AB)-on a dataset of 65,532 firewall log entries. Models were assessed using accuracy, precision, recall, training/prediction time, and Pearson correlation for feature selection, across multiple train-test splits. The DT model achieved the best performance, reaching 99.45% test accuracy, 97.457% precision, and 93.389% recall at a 7:3 split, along with the fastest training time (0.20642s). We propose real-time flow-level intrusion detection (RT-FLID), novel, lightweight, real-time intrusion detection system that leverages multithreaded processing and flow-level analysis to boost detection speed and scalability. Unlike existing approaches that rely heavily on deep packet inspection or computationally intensive processing, RT-FLID requires minimal resources while maintaining high detection accuracy. The architecture efficiently handles large traffic volumes and dynamically identifies anomalies such as distributed denial-of-service (DDoS) and port scans. Validated on real-world logs, the system maintained high accuracy in critical classes like “deny” and “reset-both.” These findings highlight RT-FLID’s novelty and practical advantages, demonstrating its potential for deployment in high-throughput, low-latency network environments.
Volume: 15
Issue: 5
Page: 4785-4802
Publish at: 2025-10-01

Performance evaluation of distribution network with change of load by connecting wind DG

10.11591/ijeecs.v39.i3.pp1459-1466
Swathi Sankepally , Sravana Kumar Bali
The aim of this research is to determine the optimal location and size of a minimum number of distributed generators (DGs) needed to maintain the stable operation of an IEEE 85-bus distributed network. The main objective is to ensure the stability of the distribution network by optimizing the placement and capacity of DGs. This is accomplished through the utilization of particle swarm optimization (PSO). The stability of the distribution network is checked by evaluating the voltages and power losses using load flow. The stability of the distribution network is assessed using boundary criteria that are not altered by more than 5% of the nominal voltage value. The distribution network voltage stability is assessed using various case studies, one of that involves a change in load driven by connecting WDG and the other by a change in power supply from wind DGs due to varying wind speed. The PSO is implemented in IEEE-85 bus distribution network using MATLAB software.
Volume: 39
Issue: 3
Page: 1459-1466
Publish at: 2025-09-01

Comprehensive secure code review analysis of web application security vulnerabilities

10.11591/ijeecs.v39.i3.pp1807-1814
Azlinda Abdul Aziz , Nur Razia Mohd Suradi , Rahayu Handan , Mohd Noor Rizal Arbain
A secure code review is a process of software development involves systematic examination of application code. However, web applications evolving of cyber threats makes it challenging to conduct adequate security. Therefore, this paper conducts a comprehensive secure code review analysis to protect any crucial aspect of web security from potential threats and vulnerabilities. The application code is scanned for security issues during the real review and the results are classified according to the areas of vulnerability. As a result, the application code risk level and list of risk categories were defined. This result assists in prioritizing issues for resolution, beginning with the most critical problems to lower risk levels. Next, list of risk categories that give the most significant security vulnerabilities affect to application codes are defined. SQL injection, weak password handling, insecure direct object reference, information exposure, improper session management, missing input validation, deprecated functions, and lack of comments are defined as a risk category. Moreover, the result of application code weakness in the security of the application code is determined based on the level of risk and categories. Thus, analysis result offers the developers a clear perspective on protects the web applications from threats and vulnerabilities.
Volume: 39
Issue: 3
Page: 1807-1814
Publish at: 2025-09-01

Smartphone-based fingerprint authentication using siamese neural networks with ridge flow attention mechanism

10.11591/ijeecs.v39.i3.pp1622-1632
Benchergui Malika Imane , Ghazli Abdelkader , Senouci M. Benaoumeur
Authenticating finger photo images captured using a smartphone camera provides a good alternative solution in place of the traditional method-based sensors. This paper introduces a novel approach to enhancing fingerprint authentication by leveraging images captured via a mobile camera. The method employs a siamese neural network (SNN) combined with a ridge flow attention mechanism and convolutional neural networks (CNN). Our approach begins with collecting a dataset consisting of finger images from two individuals then we apply multiple preprocessing techniques to extract fingerprint images, followed by generating augmented data to improve model robustness, scaling, and normalizing them to form images suitable for model training. Next, we generate positive and negative pairs for training a SNN. We used the SNN with CNN for feature extraction, combined with an attention mechanism that focuses on the ridge flow pattern of fingerprints to improve feature relevance which significantly contributed to the performance enhancement. As for the testing performance, our model has an accuracy of 90%, precision of 89%, recall of 83%, F1 score of 86%, area under the curve (AUC) 95 %, and 13% of equal error rate (EER) when using smartphone-captured images for fingerprint recognition.
Volume: 39
Issue: 3
Page: 1622-1632
Publish at: 2025-09-01

Comprehensive multiclass debris detection for solar panel maintenance using ANN models

10.11591/ijeecs.v39.i3.pp1489-1498
Renuka Devi S. M. , Vaishnavi J. , Gayatri A. , Ragini K. , Ramesh Reddy K. , Koti Reddy B.
Solar photovoltaic (PV) technology has emerged as a leading renewable energy solution globally. However, maintaining optimal performance remains a challenge due to the accumulation of debris, including dust, bird droppings, and other contaminants on the panels. These deposits significantly reduce the efficiency of solar panels, necessitating regular monitoring and cleaning. Automated inspection systems provide a cost-effective alternative to traditional methods by minimizing labor-intensive efforts. This study proposes a machine learning-based framework for detecting and classifying several types of debris on solar panels. The methodology utilizes gray-level co-occurrence matrix (GLCM) texture features and key statistical features extracted from RGB, HSV, and LAB color spaces. A dataset comprising 19 distinct classes, such as “Without Dust,” “Bird Droppings,” “Black Soil,” and “Sand,” was employed to train and evaluate the models. Among the tested classification techniques, artificial neural networks (ANN) achieved a notable accuracy of 93.94%, demonstrating their effectiveness in identifying and categorizing debris. This work underscores the potential of machine learning-based feature extraction and classification techniques to automate solar panel inspection and facilitate targeted cleaning interventions, thereby enhancing overall system efficiency.
Volume: 39
Issue: 3
Page: 1489-1498
Publish at: 2025-09-01

Enhancing privacy in document-oriented databases using searchable encryption and fully homomorphic encryption

10.11591/ijeecs.v39.i3.pp1661-1672
Abdelilah Belhaj , Soumia Ziti , Souad Najoua Lagmiri , Karim El Bouchti
In cloud-based not only SQL (NoSQL) databases, maintaining data privacy and the integrity are critically challenged by the risks of unauthorized external access and potential threats from malicious insiders. This paper presents a proxy-based solution that provides privacy-preserving by combining searchable encryption and brakerski-fan-vercauteren (BFV) fully homomorphic encryption (FHE) to facilitate secure search and aggregate query execution on encrypted data. Through extensive performance evaluations and security analyses, we show that our approach offers a robust solution for privacy-preserving data operations, with performance overhead introduced by the use of FHE. This solution gives an opportunity for a robust framework for secure data management and querying in NoSQL databases, with promising implications for practical deployment and future research. This work represents a significant advancement in the secure handling of data in NoSQL oriented databases, supplying a practical solution for privacy-conscious organizations.
Volume: 39
Issue: 3
Page: 1661-1672
Publish at: 2025-09-01

A smart wearable posture correcting device based on spine curvature and vibration measurement

10.11591/ijeecs.v39.i3.pp1514-1524
Jerome Christhudass , Manimegalai Perumal , Kowsalya Balachandran , Sella Dharshini Chella Muthu , Keerthana Balasubramanian
In the United States, aalmost $50 billion is expended in neck pain therapy each year. Poor posture, which affects the primary tendon responsible for reproducing finished tasks on time, has previously been recognized as a major source of upper spine discomfort. The primary objective of this study is to design and develop a device that not only detects deviations in posture but also employs vibration alerts to encourage corrective actions. The methodology involves the integration of an inertial measurement unit (IMU) sensor and a Flex Sensor to measure the angle and position of the spine, enabling real-time posture assessment. Additionally, a Piezo-electric sensor is incorporated to measure the vibration of the user's spine. The device provides real-time feedback via a mobile application to help users maintain optimal posture. Data analysis involved filtering and machine learning-based classification to assess posture deviations. The system demonstrated an accuracy of 90% in classifying posture states, with an average error of 2.7° in spine curvature measurement. This research contributes to the field of wearable technology by offering an innovative solution for posture correction, emphasizing the importance of proactive interventions in fostering healthy habits.
Volume: 39
Issue: 3
Page: 1514-1524
Publish at: 2025-09-01

An improved hybrid AC to DC converter suitable for electric vehicles applications

10.11591/ijeecs.v39.i3.pp1499-1513
Khaled A. Mahafzah , Mohamad A. Obeidat , Hesham Alsalem , Ayman Mansour , Eleonora Riva Sanseverino
This paper introduces a novel hybrid AC-DC converter designed for various applications like DC micro-grids, Electric Vehicle setups, and the integration of renewable energy resources into electric grids. The suggested hybrid converter involves a diode bridge rectifier, two interconnected single ended primary inductor converter (SEPIC) and Flyback converters, and two additional auxiliary controlled switches. These extra switches facilitate switching between SEPIC, Flyback, or a combination of both. The paper ex-tensively discusses the operational modes using mathematical equations, deriving specific duty cycles for each switch based on the circuit parameters. This hybrid converter aims to decrease total harmonic distortion (THD) in the line current. The findings exhibit a THD of approximately 14.51%, showcasing a 3% reduction compared to prior hybrid converters, thereby enhancing the power factor of the line current. Furthermore, at rated load conditions, the proposed converter achieves 90% efficiency. To validate the proposed hybrid converter’s functionality, a 4.5 kW converter is simulated and performed using MATLAB/Simulink after configuring the appropriate passive parameters.
Volume: 39
Issue: 3
Page: 1499-1513
Publish at: 2025-09-01

SDN multi-access edge computing for mobility management

10.11591/ijeecs.v39.i3.pp1846-1854
Sri Ramachandra Lakkaiah , Hareesh Kumbhinarasaiah
In recent trends, multi-access edge computing (MEC) is becoming a realistic framework for extensive social networking. The rapid proliferation of internet of things (IoT) devices has led to an unprecedented increase in data generation, placing significant strain on conventional cloud computing infrastructure. MEC also supports ultra-reliable and low latency communications (URLLC) by delivering information and computational resources more quickly to mobile users. As a result, the need for low-latency and reliable communication has become paramount. This paper proposes an MEC architecture that integrates software defined networking (SDN) and virtualization techniques, where MEC enables the orchestration and organization of mobile edge hosts (MEH). Furthermore, the proposed MEC-SDN design minimizes latency while ensuring consistent ultra-low latency communications. The result analysis clearly demonstrates that the proposed MEC-SDN model achieves latency of 6-14 ms, bandwidth of 5.2 Mbits/sec, and SDN-BWMS of 5.4 Mbits/sec, outperforming the existing SDN-Mobile Core Network model. Mobile edge systems are enabled in this research to provide mobility support for users.
Volume: 39
Issue: 3
Page: 1846-1854
Publish at: 2025-09-01

A solar PV-fed MF-DVR for compensation of grid-islanding issues and power-quality issues in grid-connected distribution system

10.11591/ijeecs.v39.i3.pp1480-1488
Tharinaematam Bhavani , Durgam Rajababu , Md Mujahid Irfan
Difficulties with the quality of power come up as an effect of the inte-conneted renewable energy through grid called as distribution generation (DG) scheme. The voltage harmonics and swell-sag are happened in the utility grid as a result of power quality issues, affecting end-level consumers. Moreover, grid islanding issues is considered the most affected problem in distribution system for affecting the uninterrupted energy-flow to respective load demand. The main aim of this paper provides affective designing of the suitable cost-effective multi-functional dynamic voltage restorer (MF-DVR) has been proposed for resolving the problems. The major objective is mitigation of voltage-interruptions during grid-islanding, voltage-sag, voltage-swell and voltage-harmonics, any voltage quality in the utility grid, by utilizing the solar photovoltaic (PV) integrated MF-DVR as DG scheme through synchronous reference frame (SRF) control theory. Also, it can regulate the voltage and phase of the distribution system during sudden voltage interruptions occurred in grid-islanding. The performance of the proposed SRF controlled MFDVR for power-quality (PQ) improvement and DG integration during grid-islanding has been validated via Matlab/Simulink computing tool; the simulation findings are shown with an appealing comparison analysis.
Volume: 39
Issue: 3
Page: 1480-1488
Publish at: 2025-09-01

Development of an automatic processing system for predicting the earthquake signals using machine learning techniques

10.11591/ijeecs.v39.i3.pp2023-2031
Mukesh Kumar Gupta , Brijesh Kumar
Earthquake signals are crucial for minimizing the impact of seismic activities. Current algorithms face difficulties in correctly identifying P-waves and assessing magnitudes, which affects the amount of advance warning given. It is crucial to establish standardized methods for the effective selection and integration of multiple algorithms. Machine learning techniques could considerably enhance detection reliability. The research seeks to rectify this shortfall and strengthen automated detection as well as prediction capabilities. The model's performance is assessed using real earthquake data in simulations compared to individual algorithms. The objective of this research is to develop an optimized multi-algorithm framework that enhances the warning lead times and overall reliability. This framework underpinning this method is shaped by the operational demands inherent in early warning systems. The objective of the work is to contribute to the betterment of seismic risk reduction. An ML methodology, merging several distinct detection algorithms, will be deployed along with a tailored prioritization system. The intention is to strengthen the model's dependability and its overall level of consistency. The ML-based multi-algorithm framework significantly boosts the performance of Early Earthquake Warning Systems, providing a scalable approach to enhance automated detection and public safety, ultimately advancing the effectiveness of seismic hazard reduction through quicker and more accurate warnings.
Volume: 39
Issue: 3
Page: 2023-2031
Publish at: 2025-09-01

Enhancing Qur'anic recitation through machine learning: a predictive approach to Tajweed optimization

10.11591/ijeecs.v39.i3.pp1562-1570
Mohamed Amine Daoud , Nayla Fatima Hadjar Kherfan , Abdelkader Bouguessa , Sid Ahmed Mokhtar Mostefaoui
The human voice is a powerful medium for conveying emotion, identity, and intellect. Arabic, as the language of the Qur'an, holds deep spiritual and linguistic importance. Reciting the Qur'an correctly involves following Tajweed rules, which ensure phonetic precision and aesthetic quality. However, mastering these rules is challenging due to complex pronunciation and articulation variations, often requiring expert guidance. Traditional learning methods lack personalized feedback, making it difficult for learners to identify and correct errors. With the rise of machine learning, new opportunities have emerged to support Qur’anic recitation through intelligent analysis of Tajweed patterns and error prediction. This study presents a predictive model that identifies Qur’an reciters using ensemble learning techniques. By incorporating deep learning models like gated recurrent units (GRUs), long short-term memory (LSTM), and recurrent neural network (RNN), the system effectively captures the vocal features unique to each reciter. The model achieves an accuracy rate of 88.57%, demonstrating its potential to support Qur’anic learning and preservation. Nonetheless, its performance may be affected by audio quality and limited training data diversity. To improve adaptability and robustness, future work will focus on enriching the dataset and optimizing the model to generalize better across a broader range of reciters.
Volume: 39
Issue: 3
Page: 1562-1570
Publish at: 2025-09-01

Adaptive deep learning framework for multi-scale plant disease detection

10.11591/ijeecs.v39.i3.pp1976-1989
Tejashwini C. Gadag , D. R. Kumar Raja
Plant disease detection is a critical task in modern agriculture, directly impacting crop yield, food security, and sustainable farming practices. Traditional methods rely on expert visual inspection, which is time-consuming, inconsistent, and inaccessible in remote areas. This study introduces an advanced deep learning (DL) framework, the adaptive multi-scale convolutional network (AMS-ConvNet), optimized for accurate and efficient plant disease identification. hierarchical feature extraction network (HFEN) integrates the multi-domain attention framework (MDAF) and adaptive scale fusion module (ASFM) to enhance feature extraction and address challenges such as complex natural backgrounds, non-uniform leaf structures, and varying environmental conditions. The proposed framework employs pre-trained knowledge adaptation (PTKA) techniques to improve generalization and overcome data scarcity. Comprehensive evaluations on multiple datasets demonstrate the model's better performance, achieving state-of-the-art metrics in precision, recall, F1-score, and accuracy. Furthermore, this approach ensures scalability and adaptability, making it suitable for real-field conditions. The study emphasizes the importance of robust, automated solutions in minimizing crop losses, reducing labor costs, and enhancing agricultural sustainability through precision disease management.
Volume: 39
Issue: 3
Page: 1976-1989
Publish at: 2025-09-01
Show 124 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration