Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Imagery based plant disease detection using conventional neural networks and transfer learning

10.11591/ijai.v14.i4.pp2701-2712
Ali Mhaned , Salma Mouatassim , Mounia El Haji , Jamal Benhra
Ensuring the sustainability of global food production requires efficient plant disease detection, challenge conventional methods struggle to address promptly. This study explores advanced techniques, including convolutional neural networks (CNNs) and transfer learning models (ResNet and VGG), to improve plant disease identification accuracy. Using a plant disease dataset with 65 classes of healthy and diseased leaves, the research evaluates these models' effectiveness in automating disease recognition. Preprocessing techniques, such as size normalization and data augmentation, are employed to enhance model reliability, and the dataset is divided into training, testing, and validation sets. The CNN model achieved accuracies of 95.45 and 94.52% for 128×128 and 256×256 image sizes, respectively. ResNet50 proved the best performer, reaching 98.38 and 98.63% accuracy, while VGG16 achieved 97.99 and 98.34%. These results highlight ResNet50's superior ability to capture intricate features, making it a robust tool for precision agriculture. This research provides practical solutions for early and accurate disease identification, helping to improve crop management and food security.
Volume: 14
Issue: 4
Page: 2701-2712
Publish at: 2025-08-01

Optimizing convolutional neural network hyperparameters to enhance liver segmentation accuracy in medical imaging

10.11591/ijece.v15i4.pp3876-3887
Iwan Purnama , Agus Perdana Windarto , Solikhun Solikhun
Liver segmentation in medical imaging is a crucial step in various clinical applications, such as disease diagnosis, surgical planning, and evaluation of response to therapy, which require a high degree of precision for accurate results. This research focuses on increasing the accuracy of liver segmentation by optimizing hyperparameters in the convolutional neural network (CNN) model using the developed ResNet architecture. The uniqueness of this research lies in the application of hyperparameter optimization methods such as random search and Bayesian optimization, which allow broader and more efficient exploration than conventional approaches. The results show that the DeepLabV3Plus model (the proposed model) significantly outperforms the standard ResNet in the image segmentation task. DeepLabV3Plus shows excellent performance with an MIoU score of 0.965, a PA Score of 0.929, and a meager loss value of 0.011. These results show that DeepLabV3Plus is able to recognize and predict segmentation areas very accurately and consistently and minimize prediction errors effectively. In conclusion, the results of this study show a significant improvement in segmentation accuracy, with the optimized model providing better performance in the evaluation.
Volume: 15
Issue: 4
Page: 3876-3887
Publish at: 2025-08-01

Blockchain as a digital governance tool: A systematic review

10.11591/ijece.v15i4.pp3986-3995
Cesar Patricio-Peralta , Jimmy Ramirez Villacorta , Milton Amache Sánchez , Jacker Paredes Meneses , Jesús Zamora Mondragon , Luis Segura Terrones , Paul Torres Santos , César Veliz Manrique , Walter Patricio Peralta
This systematic review explores the implementation of blockchain technology as a digital governance tool, focusing specifically on the Peruvian context. In the digital transformation era, blockchain has established itself as an innovative solution to manage and authenticate information. This research focuses on optimizing administrative and governmental processes in Peru, a country where document verification is crucial in legal, financial, educational, and medical procedures. The methodology used follows the problem/population, intervention, comparison, outcome, context (PICOC) model. 56 high-impact articles were selected in Scopus, prioritizing those in the areas of engineering, computer science, and business, and published between 2022 and 2025. The objective was to define the scope and structure of the research questions. These questions address the implementation of blockchain and its applications in digital governance to ensure security and reliability in administrative procedures. Through a comprehensive literature review, we seek to provide a comprehensive view of how blockchain could transform the interaction between citizens and the Peruvian government by automating document verification. In addition, successful cases from other countries and similar sectors will be analyzed, evaluating their feasibility and applicability in the Peruvian context. This approach will allow us to identify both the potential benefits and the challenges and implications associated with the integration of blockchain into government processes in Perú.
Volume: 15
Issue: 4
Page: 3986-3995
Publish at: 2025-08-01

Evaluation of the dynamic performance and practical limitations of a two-wheeled self-balancing robot

10.11591/ijece.v15i4.pp3613-3620
Rupasinghe Arachchige Don Dhanushka Dharmasiri , Malagalage Kithsiri Jayananda
Two-wheeled self-balancing robots (TWSBR) are statically unstable. However, using closed-loop controllers can stabilize. In this work, the proportional-integral-derivative (PID) controller was designed to maintain the TWSBR stability by adding two zeros and a pole at the origin to the loop gain and by determining the parameter K via root-locus analysis. Then using the K value Kp, Ki, and Kd parameters were calculated. By applying an impulse response to the system, it was found that the system is able to reach a dynamic balance in less than 1.2 seconds with minimum steady-state error. The dynamic performance and limitations of the developed system were investigated. The highest disturbance angle that can be applied to the system while keeping the motor input voltage below 12 V, in order to create counterbalancing torque and achieve dynamic balance, is determined to be θ = 0.0524 rad. Additionally, it was found that the TWSBR system managed to retain stability in a significantly large range of sudden payload changes with the same PID controller.
Volume: 15
Issue: 4
Page: 3613-3620
Publish at: 2025-08-01

Navigating cyber investigations: strategies and tools for forensic data acquisition

10.11591/ijece.v15i4.pp4022-4030
Srinivas Kanakala , Vempaty Prashanthi , K. V. Sharada
The rapid proliferation of cybercrimes has underscored the critical importance of robust data acquisition methodologies in the field of digital forensics. This research publication explores various aspects of forensic data acquisition, focusing on techniques, tools, and best practices employed by forensic investigators to collect and preserve digital evidence effectively. Beginning with an overview of the escalating cyber threat landscape and the consequential need for forensic investigations, the publication delves into the fundamental concepts of data acquisition, emphasizing the significance of ensuring data integrity and admissibility in legal proceedings. It examines the process of acquiring both volatile and non-volatile data from diverse sources, including hard drives, RAM, and other digital storage media. Furthermore, evaluates a range of forensic imaging and validation methods, encompassing tools such as Belkasoft live RAM capturer, AccessData FTK Imager, and ProDiscover, alongside validation techniques using PowerShell utility and commercial forensic software. Through comprehensive analysis and discussion, this study serves as a valuable resource for forensic practitioners, researchers, and legal professionals seeking to enhance their understanding of forensic data acquisition methodologies in the ever-evolving landscape of cybercrime investigation.
Volume: 15
Issue: 4
Page: 4022-4030
Publish at: 2025-08-01

Optimization model of vehicle routing problem with heterogenous time windows

10.11591/ijece.v15i4.pp4043-4057
Herman Mawengkang , Muhammad Romi Syahputra , Sutarman Sutarman , Gerhard Wilhelm Weber
This study proposes a novel optimization framework for the vehicle routing problem with heterogeneous time windows, a critical aspect in logistics and supply chain operations. Unlike conventional vehicle routing problem (VRP) models that assume uniform service schedules and fleet capacities, our approach acknowledges the diverse time constraints and vehicle specifications often encountered in real-world scenarios. By formulating the problem as a mixed integer linear programming model, we incorporate constraints related to time windows, vehicle load capacities, and travel distances. To tackle the NP-hard complexity, we employ a hybrid strategy combining metaheuristic algorithms with exact methods, thus ensuring both solution quality and computational efficiency. Extensive computational experiments, conducted on benchmark datasets and real-world logistics data, confirm the superiority of our model in terms of solution quality, runtime, and adaptability. These findings underscore the model’s practicality for industries facing dynamic routing requirements and tight service windows. Furthermore, the proposed framework equips decision-makers with a robust tool for optimizing route planning, ultimately enhancing service quality, reducing operational costs, and promoting more reliable delivery outcomes.
Volume: 15
Issue: 4
Page: 4043-4057
Publish at: 2025-08-01

Federated deep learning intrusion detection system on software defined-network based internet of things

10.11591/ijai.v14.i4.pp3109-3120
Heba Dhirar , Ali H. Hamad
The internet of things (IoT) and software-defined networks (SDN) play a significant role in enhancing efficiency and productivity. However, they encounter possible risks. Artificial intelligence (AI) has recently been employed in intrusion detection systems (IDSs), serving as an important instrument for improving security. Nevertheless, the necessity to store data on a centralized server poses a potential threat. Federated learning (FL) addresses this problem by training models locally. In this work, a network intrusion detection system (NIDS) is implemented on multi-controller SDN-based IoT networks. The interplanetary file system (IPFS) FL has been employed to share and train deep learning (DL) models. Several clients participated in the training process using custom generated dataset IoT-SDN by training the model locally and sharing the parameters in an encrypted format, improving the overall effectiveness, safety, and security of the network. The model has successfully identified several types of attacks, including distributed denial of service (DDoS), denial of service (DoS), botnet, brute force, exploitation, malware, probe, web-based, spoofing, recon, and achieving an accuracy of 99.89% and a loss of 0.005.
Volume: 14
Issue: 4
Page: 3109-3120
Publish at: 2025-08-01

Development and evaluation of a smart home energy management system using internet of things and real-time monitoring

10.11591/ijece.v15i4.pp3977-3985
Mohamed Imran Mohamed Ariff , Nur Anim Abdul Halim , Mohammad Nasir Abdullah , Samsiah Ahmad , Masurah Mohamad , Anis Zafirah Azmi
This project presents the design and implementation of a smart home energy management system using internet of things (IoT) technology to optimize household energy consumption. The system integrates various sensors, including passive infrared (PIR), light dependent resistor (LDR), and DHT11, to collect real-time environmental data, which is processed by a NodeMCU microcontroller. The microcontroller controls home appliances using relays, while the Blynk mobile app and Streamlit web platform provide users with remote monitoring and control capabilities. Despite successfully optimizing energy usage, the system faces limitations such as high sensor sensitivity and potential hazards during high-load power demonstrations. To address these issues, future work proposes integrating additional sensors for improved accuracy and incorporating renewable energy sources for increased sustainability. This project aims to enhance energy efficiency, provide users with greater control over their energy consumption, and contribute to smart home automation by utilizing real-time data, IoT integration, and user-friendly interfaces.
Volume: 15
Issue: 4
Page: 3977-3985
Publish at: 2025-08-01

Enhancing face mask detection performance with comprehensive dataset and YOLOv8

10.11591/ijai.v14.i4.pp2634-2645
Trong Thua Huynh , Hoang Thanh Nguyen
In the context of the COVID-19 pandemic and the risk of similar infectious diseases, monitoring and promoting public health measures like wearing face masks have become crucial in controlling virus transmission. Deep learning-based mask recognition systems play an important role, but their effectiveness depends on the quality and diversity of training datasets. This study proposes the diverse and robust dataset for face mask detection (DRFMD), designed to address limitations of existing datasets and enhance mask recognition models' performance. DRFMD integrates data from sources such as AIZOO, face mask detector by Karan-Malik (KFMD), masked faces (MAFA), MOXA3K, properly wearing masked face detection dataset (PWMFD), and the Zalo AI challenge 2022, comprising 14,727 images with 29,846 instances, divided into training, validation, and testing sets. The dataset's scale and diversity ensure higher accuracy and better generalization for mask recognition models. Experiments with variations of the YOLOv8 model (n, s, m, l, x), an advanced object detection algorithm, on the DRFMD dataset, demonstrate superior performance through metrics like precision, recall, and mAP@50. Additionally, comparisons with previous dataset like FMMD show that models trained on DRFMD maintain strong generalization capabilities and higher performance. This study significantly contributes to improving accuracy of public health monitoring systems, aiding in the prevention of hazards from infectious diseases and air pollution.
Volume: 14
Issue: 4
Page: 2634-2645
Publish at: 2025-08-01

Load frequency control for integrated hydro and thermal power plant power system

10.11591/ijece.v15i4.pp3583-3592
Vu Tan Nguyen , Thinh Lam-The Tran , Dao Huy Tuan , Dinh Cong Hien , Vinh Phuc Nguyen , Van Van Huynh
Persistent electrical supply requires the power systems to be stable and reliable. Against varying load conditions, control strategies such as load frequency control (LFC) is a key mechanism to protect its stability. Traditional control strategies for LFC often face challenges due to system uncertainties, external disturbances, and nonlinearities. This paper presents an advanced approach to control load frequency and enhancing LFC in power systems by using sliding mode control (SMC). SMC offers powerful stability and robustness versus nonlinearities and perturbation, making it a promising approach for addressing the limitations of conventional control methods. We contemporary a comprehensive analysis of the SMC approach tailored for LFC, including the strategy and employment of the control algorithm. The proposed method makes use of a sliding/gliding surface to enable the system trajectories to be continuous on this surface despite parameter variations and external disturbances. Simulation results demonstrate significant improvements in frequency stability and system performance compared to conventional proportional-integral-derivative (PID) controllers. The paper also includes a comparative analysis of SMC with other modern control techniques, highlighting its advantages in terms of robustness and adaptability.
Volume: 15
Issue: 4
Page: 3583-3592
Publish at: 2025-08-01

Assessing the knowledge and practices of internet of things security and privacy among higher education students

10.11591/ijece.v15i4.pp4074-4086
Aigul Adamova , Tamara Zhukabayeva , Makpal Zhartybayeva , Laula Zhumabayeva
When multiple internet of things (IoT) devices interact, there are risks of privacy breaches, personal data leaks, various attacks, and device manipulation. Security is one of the most important technological research problems that currently exist for the IoT. The main purpose of the present paper is to determine the level of awareness of university students about existing security issues when using IoT devices. The paper presented the methodology of the survey. A questionnaire was developed covering four areas, such as fact-finding about general concepts of the IoT, security measures when using IoT devices, security threats and the presence of vulnerabilities of IoT devices, general policies, practices and shared responsibilities. A methodology for calculating the Awareness Level Index is proposed. This study has potential limitations. The effect estimates in the model are based on a survey of undergraduate and master’s degree students in “Computer Science” and “Software Engineering” within several universities. A total of 370 undergraduate and master’s students participated in the survey. The data processing resulted in the development of recommendations and suggested measures. This study will be useful for both stakeholders and researchers to develop effective strategies and make informed decisions.
Volume: 15
Issue: 4
Page: 4074-4086
Publish at: 2025-08-01

Deep feature representation for automated plant species classification from leaf images

10.11591/ijece.v15i4.pp3759-3768
Nikhil Inamdar , Manjunath Managuli , Uttam Patil
Automated plant species classification using leaf images holds immense potential for advancing agricultural research, biodiversity conservation, and ecological monitoring. This study introduces a novel approach leveraging deep feature representation to achieve accurate and efficient classification based on leaf morphology. Convolutional neural networks (CNNs), including VGG16, ResNet50, DenseNet1, Inception, and Xception, are employed to extract high-level features from leaf images, capturing intricate patterns essential for species differentiation. To manage the extensive feature set extracted by these models, optimization techniques such as principal component analysis (PCA), variance thresholding, and recursive feature elimination (RFE) are applied. These methods streamline the feature set, making the classification process more efficient. The optimized features are then trained using classifiers like support vector machine (SVM), k-nearest neighbors (K-NN), decision trees (DT), and naive Bayes (NB), achieving average accuracies of 98.6%, 96.6%, 99.6%, and 99.7%, respectively, across various cross-validation methods. Experimental results on benchmark datasets demonstrate the effectiveness of this approach, achieving state-of-the-art performance in plant species classification. This work underscores the potential of deep feature representation in automated plant species classification, offering valuable insights for applications in agriculture, ecology, and environmental science.
Volume: 15
Issue: 4
Page: 3759-3768
Publish at: 2025-08-01

Exploring the recurrent and sequential security patch data using deep learning approaches

10.11591/ijece.v15i4.pp4160-4171
Falah Muhammad Alam , Devi Fitrianah
The ever-changing nature of vulnerabilities and the intricacy of temporal connections make the classification of security patch data, both sequential and recurrent, a formidable challenge in cybersecurity. The goal of this research is to improve the efficacy and precision of security patch management by optimizing deep learning models to deal with these issues. In order to assess their performance on the PatchDB dataset, four models were used: recurrent neural networks (RNN), long short-term memory (LSTM), gated recurrent unit (GRU), and bidirectional LSTM (Bi-LSTM). Metrics like F1-score, area under the receiver operating characteristic curve (AUC-ROC), recall, accuracy, and precision were used to evaluate performance. When it came to processing sequential data, the GRU model was the most efficient, with the best accuracy (77.39%), recall (65.63%), and AUC-ROC score (0.8127). With a 75.17% accuracy rate and an AUC-ROC score of 0.7752, the RNN model successfully reduced false negatives. With AUC-ROC scores of 0.7792 and 0.8055, respectively, LSTM and Bi-LSTM had better specificity but more false negatives. To improve cybersecurity operations, decrease mitigation time, and automate the classification of security updates, this study presents a methodology. To improve the models' practicality, future efforts will center on increasing datasets and testing them in real-world settings.
Volume: 15
Issue: 4
Page: 4160-4171
Publish at: 2025-08-01

Energy-efficient secure software-defined networking with reinforcement learning and Weierstrass cryptography

10.11591/ijece.v15i4.pp4227-4238
Nagaraju Tumakuru Andanaiah , Malode Vishwanatha Panduranga Rao
In the age of rapidly advancing 5G connectivity, artificial intelligence (AI), and the internet of things (IoT), network data has grown enormously, demanding more efficient and secure management solutions. Traditional networking systems, limited by manual controls and static environments, are unable to fulfill the dynamic demands of modern internet services. This paper proposes an innovative software-defined networking (SDN) framework that utilizes exponential spline regression reinforcement learning (ESR-RL) with genus Weierstrass curve cryptography (GWCC) to boost energy efficiency and data security. The ESR-RL algorithm reliably anticipates network traffic patterns, optimizing path selection to enhance routing efficiency while minimizing consumption of energy. GWCC also enables strong encryption and decryption, considerably increasing data security without impacting system performance. To further improve network reliability, the Skellam distributed Siberian TIGER optimization algorithm (SDSTOA) is used to dynamically acquire features and balance loads, resulting in optimal network performance. Extensive simulations show that the proposed framework performs better than existing models in terms of accuracy, precision, recall, F-measure, sensitivity, and specificity. Improvements in latency, turnaround time, and network throughput demonstrate the framework's success. This scalable and adaptive technology establishes a new standard for SDN systems by providing a safe, energy-efficient, and performance-optimized strategy for future network infrastructures.
Volume: 15
Issue: 4
Page: 4227-4238
Publish at: 2025-08-01

Design strategies for solar photovoltaic integration in rural areas

10.11591/ijece.v15i4.pp3603-3612
Intan Mastura Saadon , Emy Zairah Ahmad , Nurbahirah Norddin , Norain Idris
This study explores the optimization of photovoltaic (PV) systems in the Sungai Tiang Camp region, Malaysia, with a focus on determining the ideal tilt angles to maximize energy generation in a tropical environment while incorporating a cost analysis. While existing studies optimize tilt angles for energy maximization in temperate regions, this study addresses the unique climatic and socio-economic conditions of rural Malaysia. Unlike fixed-tilt assumptions common in prior work, this research explores cost-effective, manually adjustable systems tailored for local weather patterns and rural affordability. To address this, the study examines the relationship between tilt angle, solar irradiance, temperature and output power. The results are analyzed to identify optimal configurations. Results reveal that tilt angles between 5° and 10° deliver the highest energy output, with slight seasonal adjustments for efficiency improvement. These findings align with Malaysia's tropical solar profile, offering practical insights for micro-scale solar deployments in similar climates. By addressing the unique needs of remote areas, this research contributes to bridging the gap in localized PV studies. Its outcomes not only enhance the understanding of solar PV performance in tropical conditions but also provide valuable guidelines for rural electrification and sustainable energy solutions in equatorial regions worldwide.
Volume: 15
Issue: 4
Page: 3603-3612
Publish at: 2025-08-01
Show 143 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration