Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

The development of contextual chat interactions with retrieval-augmented generation system for facilitating learning hadith

10.11591/ijeecs.v39.i2.pp987-995
Rio Nurtantyana , Yudi Priyadi , Eko Darwiyanto
This study explores the development and implementation of a retrieval-augmented generation (RAG) system using the large language model (LLM) to enhance the learning of hadith through a chat interface for high school students. This study addresses challenges in optimizing RAG configurations and problems associated with traditional educational methods that lack interactivity. In addition, the RAG system was designed to replace real teacher interactions, offering a chat feature that provides contextual answers to real-life scenarios related to Hadith. Various configurations were tested, with a focus on the Matn component, achieving a high accuracy score with a mean of .754 and demonstrating efficiency in context relevance with a mean of .797. Results indicated significant accessibility using our RAG system for learning hadith via WhatsApp’s chat interface. Hence, this study highlights the potential of RAG systems in transforming educational environments and offers insights into the development of technology for interactive Hadith learning solutions.
Volume: 39
Issue: 2
Page: 987-995
Publish at: 2025-08-01

Non-small cell lung cancer active compounds discovery holding on protein expression using machine learning models

10.11591/ijai.v14.i4.pp2815-2825
Hamza Hanafi , M’hamed Aït Kbir , Badr Dine Rossi Hassani
Computational methods have transformed the field of drug discovery, which significantly helped in the development of new treatments. Nowadays, researchers are exploring a wide ranger of opportunities to identify new compounds using machine learning. We conducted a comparative study between multiple models capable of predicting compounds to target non-small cell lung cancer, we focused on integrating protein expressions to identify potential compounds that exhibit a high efficacy in targeting lung cancer cells. A dataset was constructed based on the trials available in the ChEMBL database. Then, molecular descriptors were calculated to extract structure-activity relationships from the selected compounds and feed into several machine learning models to learn from. We compared the performance of various algorithms. The multilayer perceptron model exhibited the highest F1 score, achieving an outstanding value of 0,861. Moreover, we present a list of 10 drugs predicted as active in lung cancer, all of which are supported by relevant scientific evidence in the medical literature. Our study showcases the potential of combining protein expression analysis and machine learning techniques to identify novel drugs. Our analytical approach contributes to the drug discovery pipeline, and opens new opportunities to explore and identify new targeted therapies.
Volume: 14
Issue: 4
Page: 2815-2825
Publish at: 2025-08-01

Enhancing anomaly detection performance using ResNet50 and BiLSTM networks on benchmark datasets

10.11591/ijece.v15i4.pp3727-3736
Dipak Ramoliya , Amit Ganatra
Detection of abnormal activity from large video sequences is one of the biggest challenges because of ambiguity in different activities. Over the last many years, several cameras have been placed to cover the public and private sectors to monitor abnormal human activity and surveillance. In recent years, deep learning and computer vision have significantly impacted this kind of surveillance. Intelligent systems that can automatically identify unusual events in video streams are currently in high demand. A deep learning-based combinational model has been proposed to detect abnormal activity from input video streams. The proposed study uses a combination of convolution and sequential models. A ResNet50 network with a residual connection was used for initial feature extraction. The proposed bidirectional long short-term memory (BiLSTM) network has improved the extracted ResNet50 features. Simulation of the proposed model was experimented on two benchmark datasets for anomaly detection UCF Crime and ShanghaiTech. Simulation of proposed architecture has achieved 97.55% and 91.94% remarkable accuracy for UCF Crime and ShanghaiTech datasets respectively.
Volume: 15
Issue: 4
Page: 3727-3736
Publish at: 2025-08-01

An improved approximate parallel prefix adder for high performance computing applications: a comparative analysis

10.11591/ijict.v14i2.pp382-392
Vamsidhar Anagani , Kasi Geethanjali , Anusha Gorantla , Annamreddy Devi
Binary adders are fundamental in digital circuit designs, including digital signal processors and microprocessor data path units. Consequently, significant research has focused on improving adders’ power-delay efficiency. The carry tree adder (CTA) is alternatively referred to as the parallel prefix adder (PPA), is among the fastest adders, achieving superior performance in very large scale integrated (VLSI) implementations through efficient concurrent carry generation and propagation. This study introduces approximate PPAs (AxPPAs) by applying approximations in prefix operators (POs). Four types of AxPPAs approximate kogge-stone, approximate brent-kung, approximate ladner fischer, and approximate sparse kogge-stone-were designed and implemented on FPGA with bit widths up to 64-bit. Delay measurements from static timing analysis using Xilinx ISE design suite version 14.7 indicate that AxPPAs exhibit better latency performance than traditional PPAs. The AxPPA sparse kogge-stone, in particular, demonstrated superior area and speed performance, achieving a delay of 2.501ns for a 16-bit addition.
Volume: 14
Issue: 2
Page: 382-392
Publish at: 2025-08-01

Efficiently tracking and recognition of human faces in real-time video stream with high accuracy and performance

10.11591/ijeecs.v39.i2.pp1261-1268
Imran Ulla Khan , D. R. Kumar Raja
Real time tracking and recognition of human faces in video streams is a critical challenge in computer vision. Existing systems often struggle to balance accuracy and performance, particularly in dynamic environments with varying lighting conditions, occlusions, and rapid movements. High computational overhead and latency further hinder their deployment in realworld applications. These limitations underscore the need for a robust solution capable of maintaining high accuracy and real-time efficiency under diverse conditions. This research addresses these challenges by developing a deep learning-based system that efficiently tracks and recognizes human faces in real-time video streams. Proposed system integrates advanced face detection models you only look once version 5 (YOLOv5) with state-of-theart tracking algorithms, such as deep simple online and real time tracking (SORT), to ensure consistency and robustness. By leveraging graphics processing unit (GPU) acceleration, the system achieves optimal performance while minimizing latency. Multi-frame analysis techniques are incorporated to enhance accuracy in detecting and recognizing faces, even under challenging conditions such as partial occlusions and motion blur. Developed system has broad applications across multiple domains, including surveillance and security, where it can enhance real-time monitoring in crowded environments for seamless face tracking in interactive systems. By focusing on efficiency, robustness, and adaptability this work offering a scalable and high-performance solution for real-time human face tracking and recognition.
Volume: 39
Issue: 2
Page: 1261-1268
Publish at: 2025-08-01

A hybrid machine learning approach for malicious website detection and accuracy enhancement

10.11591/ijeecs.v39.i2.pp1027-1034
Ahmed Abu-Khadrah , Shayma Alkhamis , Ali Mohd Ali , Muath Jarrah
Malicious URLs are web addresses purposely generated for a user’s detriment. Some examples include phishing scams in which the victim is fooled into logging into a fake site or portals for downloading malware where any click on a link invites a hostile program to the user’s device. The damage done to an individual’s finances, confidential information, and even reputation due to malicious URLs makes it crucial to devise means of countering these threats. This can be achieved by creating an intelligent model that identifies suspicious characteristics common to these websites. The objective of this research is to design a novel hybrid machine learning algorithm-based model for detecting malicious websites. A random forest, decision tree, and extreme gradient boosting (XGBoost) are the three hybrid classification algorithms proposed for the study. Accuracy in detection will help prevent and reduce the effects of such websites. The accuracy rate in this research is 98.7%, precision is at 98.9%, and recall at 98.5%. With these results, it follows that the hybrid model is more effective than training any individual algorithm with the given dataset.
Volume: 39
Issue: 2
Page: 1027-1034
Publish at: 2025-08-01

Recognizing AlMuezzin and his Maqam using deep learning approach

10.11591/ijeecs.v39.i2.pp1360-1372
Nahlah Mohammad Shatnawi , Khalid M. O. Nahar , Suhad Al-Issa , Enas Ahmad Alikhashashneh
Speech recognition is an important topic in deep learning, especially to Arabic language in an attempt to recognize Arabic speech, due to the difficulty of applying it because of the nature of the Arabic language, its frequent overlap, and the lack of available sources, and some other limitations related to the programming matters. This paper attempts to reduce the gap that exists between speech recognition and the Arabic language and attempts to address it through deep learning. In this paper, the focus is on Call for Prayer (Aladhan: ناذآلا ) as one of the most famous Arabic words, where its form is stable, but it differs in the notes and shape of its sound, which is known as the phonetic Maqam (Maqam: ماقملا  يتوصلا ). In this paper, a solution to identify the voice of AlMuezzin ( نذؤملا ), recognize AlMuezzin, and determine the form of the Maqam through VGG-16 model presented. The VGG-16 model examined with 4 extracted features: Chroma feature, LogFbank feature, MFCC feature, and spectral centroids. The best result obtained was with chroma features, where the accuracy of Aladhan recognition reached 96%. On the other hand, the classification of Maqam with the highest accuracy reached of 95% using spectral centroids feature.
Volume: 39
Issue: 2
Page: 1360-1372
Publish at: 2025-08-01

An approach-based ensemble methods to predict school performance for Moroccan students

10.11591/ijeecs.v39.i2.pp1211-1220
Abdallah Maiti , Abdallah Abarda , Mohamed Hanini
Education is a key factor in Morocco's development, with school performance serving as a critical measure of the education system’s quality. However, disparities in student outcomes remain, influenced by socioeconomic, demographic, and infrastructural factors. Our study aims to develop a predictive model to assess and improve school performance in Morocco using ensemble machine learning techniques, focusing on the stacking approach. Data from the Massar platform includes variables such as gender, age, type of school, parental occupation, academic results, and residential area. After rigorous data cleaning and preprocessing, a stacking model was created by combining predictions from five base models: random forest, gradient boosting, k-nearest neighbors (KNN), support vector machine (SVM), and multi-layer perceptron (MLP). A random forest metamodel was used to integrate these results. The experimental results of the paper demonstrate the effectiveness of our approach. The stacking model achieved an accuracy of 78.70%, surpassing the individual base models. The meta-model demonstrated strong reliability, achieving an F1 score of 78.62% while reducing false negatives and ensuring balanced predictions. Among the base models, neural networks showed the best performance, achieving the highest predictive accuracy. This research highlights the potential of stacking methods for predicting school performance. Incorporating additional variables, such as parental education and teacher attributes, could further refine the model and enhance Morocco’s educational outcomes.
Volume: 39
Issue: 2
Page: 1211-1220
Publish at: 2025-08-01

A multi-tier framework of decentralized computing environment for precision agriculture (DCEPA)

10.11591/ijeecs.v39.i2.pp1072-1080
Kiran Muniswamy Panduranga , Roopashree Hejjaji Ranganathasharma
Although collecting enormous volumes of heterogeneous data from many sensors and guaranteeing real-time decision-making are problems, precision agriculture (PA) has emerged as a promising approach to increase agricultural efficiency. The efficacy of current centralized solutions is limited in large-scale agricultural settings due to resource limitations and data saturation. In order to solve these problems, this paper suggests a decentralized computing environment for precision agriculture (DECPA), which divides resource management and data processing among several layers (end, edge, and cloud). DECPA optimizes task execution and resource allocation in the field by utilizing ensemble machine learning models (deep neural network (DNN), long short-term memory (LSTM), autoencoder (AE), and support vector machine (SVM)) and a multi-tier architecture. The findings demonstrate that DECPA combined with DNN performs better than alternative models, achieving a 20% decrease in energy usage, an 18% speedup in response time, a 5% improvement in accuracy, and a 51% reduction in latency. This illustrates the system’s capacity to manage massive amounts of data effectively while preserving peak performance. To sum up, DECPA uses decentralized resources and cutting-edge machine learning models to provide a scalable and affordable precision agriculture solution. To improve the system’s flexibility and real-time responsiveness, future research will investigate additional optimization and use in various agricultural contexts.
Volume: 39
Issue: 2
Page: 1072-1080
Publish at: 2025-08-01

Identification of chilli leaf disease using contrast limited histogram equalisation and k-means clustering

10.11591/ijeecs.v39.i2.pp1100-1108
Shiny Rajendrakumar , Rajashekarappa Rajashekarappa , Vasudev K. Parvati
Plant disease diagnosis is crucial for preventing productivity and quality losses in agricultural products. Because plants are continually attacked by insects, bacterial infections, and smaller scale organisms it is necessary for early diagnosis disease control is a vital part of profitable chilli crop production, hence early diagnosis of disease identification is an important aspect of crop management. This paper discusses strategies for detecting disease effectively in order to improve chilli plant product quality. An image processing technique based on identification of chilli leaf disease using contrast limited histogram equalisation and k-means clustering (KMC). The approach was carried out in five stages: acquiring the image, preprocessing, extracting features, classifying the diseases, and showing the outcome. This work offers a thorough implementation of CLAHE for preprocessing, k-means cluster for feature extraction and support vector machine (SVM) for classification of chilli leaf diseases. The accuracy was tested for standard chilli dataset for major 2 types of diseases including anthracnose and bacterial blight form kaggle dataset with varying samples of 70:30 and 60:40 respectively and it is observed that the average accuracy improved to 98% compared to existing techniques.
Volume: 39
Issue: 2
Page: 1100-1108
Publish at: 2025-08-01

Clustering technique for dense D2D communication in RIS-aided multicell cellular network

10.11591/ijeecs.v39.i2.pp927-940
Misfa Susanto , Soraida Sabella , Lukmanul Hakim , Rudi Kurnianto , Azrina Abd Aziz
Device-to-device (D2D) communication and reconfigurable intelligent surface (RIS) are well-known as two promising technologies for nextgeneration cellular communication networks. D2D users operate on the same spectrum as traditional cellular users, potentially leading to increased interference and reduced efficiency in frequency resource usage. RIS provides a remedy for clearing blocked signals from obstructions by reflecting the desired signals to the intended receiver. However, RIS elements reflect not only the desired signals but also the interference signals. This paper proposes a distance-based clustering method aimed at creating a grouping algorithm for neighboring D2D users using different channels, thereby reducing co-channel interference. The simulation indicates that the proposed clustering method for D2D users' equipment (DUEs) leads to a 0.72 dB increase in signal-to-interference-plus-noise ratio (SINR), enhances throughput to 11.25 Mbps, and reduces the bit error rate by up to 24×10⁻² compared to the baseline system. The study findings also indicate that cellular users' equipment (CUEs) experience satisfactory signal quality, even with the presence of DUEs on the cellular network. Our clustering algorithm is feasible to deploying D2D densely in RIS-aided cellular network without significantly affecting CUE performance.
Volume: 39
Issue: 2
Page: 927-940
Publish at: 2025-08-01

Optimization of IoT-based monitoring system for automatic power factor correction using PZEM-004T sensor

10.11591/ijeecs.v39.i2.pp860-873
Maman Somantri , Mochamad Rizal Fauzan , Irgi Surya
Power factor correction (PFC) is crucial for improving energy efficiency and reducing excessive power consumption, especially in inductive loads commonly found in household and industrial environments. Conventional PFC methods often rely on manual capacitor switching, which is inefficient and impractical for real-time applications. This study proposes an IoT-based automatic power factor monitoring and correction system that dynamically adjusts the power factor using real-time data analysis. The system integrates NodeMCU ESP32 and the PZEM-004T sensor to monitor electrical parameters and automatically switch capacitors based on power factor conditions. The research follows the ADDIE approach (analysis, design, development, implementation, evaluation) to ensure a structured development process. Experimental results demonstrate an average power factor improvement of 48.77% and a reduction in current consumption by 39.90%, significantly enhancing energy efficiency. The system's web-based interface allows real-time monitoring with an average data transmission response time of 207.67 ms, ensuring efficient remote management. Compared to existing systems, the proposed approach eliminates manual intervention and optimizes PFC adaptively. Future research should focus on expanding system reliability, testing on larger-scale applications, and integrating artificial intelligence (AI) for predictive power factor adjustments.
Volume: 39
Issue: 2
Page: 860-873
Publish at: 2025-08-01

Hierarchical enhanced deep encoder-decoder for intrusion detection and classification in cloud IoT networks

10.11591/ijeecs.v39.i2.pp1176-1188
Ramya K. M. , Rajashekhar C. Biradar
Securing cloud-based internet of things (IoT) networks against intrusions and attacks is a significant challenge due to their complexity, scale, and the diverse nature of connected devices. IoT networks consist of billions of devices, computer servers, data transmission networks, and application computers, all communicating vast amounts of data that must adhere to various protocols. This study introduces a novel approach, termed hierarchical enhanced deep encoder-decoder with adaptive frequency decomposition (HED-EDFD), and is designed to address these challenges within cloud-based IoT environments. The HED-EDFD methodology integrates adaptive frequency decomposition, specifically adaptive frequency decomposition, with a deep encoder-decoder model. This integration allows for the extraction and utilization of frequency domain features from time-sequence IoT data. By decomposing data into multiresolution wavelet coefficients, the model captures both high-frequency transient changes and low-frequency trends, essential for detecting potential intrusions. The deep encoder-decoder model, enhanced with deep contextual attention mechanisms, processes these features to identify complex patterns indicative of malicious activities. The hierarchical structure of the approach includes a hierarchical wavelet-based attention mechanism, which enhances the accuracy and robustness of feature extraction and classification. To address the issue of imbalanced intrusion data, a cosine-based SoftMax classifier is employed, ensuring effective recognition of minority class samples.
Volume: 39
Issue: 2
Page: 1176-1188
Publish at: 2025-08-01

Wolfram Alpha based-inventory model for damaged items of pharmaceutics by utilizing exponential demand rate

10.11591/ijeecs.v39.i2.pp1145-1154
Indrawati Indrawati , Fitri Maya Puspita , Siti Suzlin Supadi , Evi Yuliza , Farah Nabilah Tampubolon
In this study, an inventory model is developed for pharmaceutical products that deteriorate over time with an exponential demand rate. The discussion of exponential demand is rarely explored but has the advantage that the demand value toward total cost remains positive. This study assumes allowable shortages and complete backlogging, making it necessary to design an optimal policy for deteriorating goods with an exponential demand rate. The model shows that the initial stock decreases over time, potentially leading to shortages before the next order arrives. The optimal solution indicates that the inventory reaches the zero point at 𝑡1 = 0.0000011 and the cycle length 𝑇1 = 0.012 resulting in an average minimum total cost of 𝑇𝐶̅̅̅̅ = $17,133.9 per cycle by Wolfram Alpha. Sensitivity analysis measures the changes of the results in the increasing value of 𝑇𝐶̅̅̅̅ for all parameters. Exponential function variables (𝑎 and 𝑏) produces 𝑡1 and 𝑇1 stable values. On increasing the cost of each damage (𝐷𝐶) and constant damage rate (𝜃) produces a 𝑡1 stable value, but the value of 𝑇1 increases. An increase in storage costs (h) results in a decrease in the value of 𝑡1 and 𝑇1. Increasing in the cost of shortages (s) resulted in an increase in the value of 𝑡1 and a decrease in the value of 𝑇1.
Volume: 39
Issue: 2
Page: 1145-1154
Publish at: 2025-08-01

Performance evaluation of a photovoltaic system with phase change material in Guwahati

10.11591/ijeecs.v39.i2.pp737-746
Pallavi Roy , Bani Kanta Talukdar
Recently, there has been a lot of interest in solar photovoltaic (PV) technology as a clean and renewable energy source. The operating temperature of PV modules significantly impacts their performance; as the temperature rises, the modules perform worse. The phase change material (PCM) paraffin wax has been used to cool a PV system passively. The experiment was carried out during summer over three months, viz. April, May, and June when relative humidity was around 80.75% to 86.5% with two identical 20-watt PV panels in Guwahati, India (26.1332° North and 91.6214° East). One panel was coated with PCM, while the other panel functioned as a point of reference. The study reveals an impressive result: the output power produced by the system with PCM was 9.8%, 13.1%, and 10.3% greater than the reference PV, while the surface temperature had been lowered by 21.6%, 26.2%, and 30.6% in the three respective months. High humidity delays the release of latent heat of paraffin wax and hence improves its thermal conductivity. This study adds to the continuing efforts to promote sustainable energy solutions and creates new opportunities to enhance the performance of PV systems.
Volume: 39
Issue: 2
Page: 737-746
Publish at: 2025-08-01
Show 156 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration