Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Determinants of cigarette consumption among Indonesian adolescents: a cross-sectional study

10.11591/ijphs.v14i2.25304
Musparlin Halid , Lili Amaliah , Sri Nurcahyati , Krisnita Dwi Jayanti , Supriatin Supriatin , Suyitno Suyitno , Maretalinia Maretalinia
Adolescent smokers in Indonesia remain a problem that impacts educational output. This study aimed to examine the determinants of cigarette consumption among school-age adolescents. The study employed a cross-sectional design in Lombok Island, West Nusa Tenggara Province, Indonesia. The study collected data from January 2022 to July 2023. The total sample in this study consisted of 819 adolescents from junior high and senior high schools (SHS). Among all respondents, 438 adolescents (53.5%) reported smoking >10 stems/day. The binary logistic regression results revealed that significant variables associated with cigarette consumption included males aged 14 to 16, who drank alcohol more than three times a week, consumed more than three liters of alcohol a week, had low parental education levels, had peer influence, were exposed to social media, had parents who smoked, and had experienced parental divorce. The collaboration between stakeholders at the school level and parents, such as counseling and supervision intensive, can prevent adolescent smoking behavior.
Volume: 14
Issue: 2
Page: 561-568
Publish at: 2025-06-01

Exploring the effectiveness of multiclass decision jungle for internet of things security

10.11591/ijece.v15i3.pp3095-3106
Smitha Rajagopal , Abhik Sarkar , Venkat Narayanan Manjunath
Network intrusion detection systems (NIDS) are vital in protecting computer networks against cyber security incidents. The relationship between NIDS and internet of things (IoT) security is pivotal and NIDS plays a significant role in ensuring the security and reliability of IoT ecosystems. Ensuring the security of IoT devices is critical for several reasons. It helps safeguard sensitive information, guarantees the dependability of crucial infrastructure, meets regulatory obligations, and fosters user confidence. As the IoT ecosystem expands, prioritizing security is essential to minimize risks and maximize the benefits of connected devices. Given the ever-expanding cyber threat landscape, the multiclass classification task is essential to empower the NIDS with an ability to distinguish between various attack patterns in less computational time. The multiclass decision jungle algorithm is investigated to optimize the performance of NIDS. The research has considered permutation feature importance to include only the relevant features from the data. Using a contemporary dataset such as CICIOT 2023, the study has demonstrated an impressive attack detection rate of over 90% for 20 modern attack types. This research has investigated the effectiveness of IoT security measures and its prospective contributions to the field of cyber security.
Volume: 15
Issue: 3
Page: 3095-3106
Publish at: 2025-06-01

A comparison of approaches for modeling software security requirements using unified modeling language extensions

10.11591/ijece.v15i3.pp2911-2927
Syed Muhammad Junaid Hassan , Aamir Shahab , Fatima Ali Tabba , Muath Alrammal , Fadi Abu-Amara , Muhammad Nadeem
The unified modeling language (UML) supports extension mechanisms called stereo-types, tagged values, and constraints to extend its modeling capabilities. These extension mechanisms are utilized to create new and customized profiles. Their applications in modeling emerging security requirements are discussed. To model authentication, availability, integrity, access control, confidentiality, data integrity, non-repudiation, authorization, encryption, hashing, and session mechanisms, a set of novel stereotypes is proposed in this paper. The proposed stereotypes inherit from baseline security requirements. Further, security concepts within the UML diagram are represented using these stereotypes. In addition, the proposed stereotypes were evaluated with the help of human subject evaluation using real-world scenarios to illustrate the usefulness of these stereotypes in modelling security requirements. The contribution of this paper is a stereotyped model security requirements and library of existing security notations with high quality symbols which can be incorporated in existing and new stereotypes and diagrams to facilitate the process of security requirement modelling. Results indicate that the proposed stereotyped model improves the modeling process of security requirements. It also provides a better representation of emerging security mechanisms in software design. Finally, during the software development process, stakeholders enjoy improved communication and understanding of security requirements.
Volume: 15
Issue: 3
Page: 2911-2927
Publish at: 2025-06-01

Genetic algorithm-adapted activation function optimization of deep learning framework for breast mass cancer classification in mammogram images

10.11591/ijece.v15i3.pp2820-2833
Noor Fadzilah Razali , Iza Sazanita Isa , Siti Noraini Sulaiman , Muhammad Khusairi Osman , Noor Khairiah A. Karim , Dayang Suhaida Awang Damit
The convolutional neural network (CNN) has been explored for mammogram cancer classification to aid radiologists. CNNs require multiple convolution and non-linearity repetitions to learn data sparsity, but deeper networks often face the vanishing gradient effect, which hinders effective learning. The rectified linear unit (ReLU) activation function activates neurons only when the output exceeds zero, limiting activation and potentially lowering performance. This study proposes an adaptive ReLU based on a genetic algorithm (GA) to determine the optimal threshold for neuron activation, thus improving the restrictive nature of the original ReLU. We compared performances on the INbreast and IPPT-mammo mammogram datasets using ReLU and leakyReLU activation functions. Results show accuracy improvements from 95.0% to 97.01% for INbreast and 84.9% to 87.4% for IPPT-mammo with ReLU and from 93.03% to 99.0% for INbreast and 84.03% to 91.06% for IPPT-mammo with leakyReLU. Significant accuracy improvements were observed for breast cancer classification in mammograms, demonstrating its potential to aid radiologists with more robust and reliable diagnostic tools.
Volume: 15
Issue: 3
Page: 2820-2833
Publish at: 2025-06-01

Highly sensitive microwave sensor for metallic mine detection

10.11591/ijece.v15i3.pp2631-2641
Maged A. Aldhaeebi , Thamer S. Almoneef
This study introduces an innovative microwave system for detecting buried metallic landmines, providing an alternative to conventional imaging approaches. The system consists of two highly sensitive sensors, each configured with identical antennas arranged in a triangular formation to enhance sensitivity. The proposed microwave sensors exhibit exceptional sensitivity in detecting metallic landmines buried at various depths within sand and at different distances. Simulation and experimental studies were conducted using a foam box filled with sand and a metallic cube to simulate a landmine. The sensor’s sensitivity is evidenced by shifts in both the magnitude and phase of insertion loss (𝑆21) between scenarios with and without a metallic mine, attributed to differences in dielectric properties between the sand and the mine in the microwave spectrum. The results from both simulations and experiments confirm the sensor’s capability to detect metallic mines at varying depths within the sand medium. The proposed system offers significant advantages over imaging technologies for mine detection, including cost-effectiveness, simplicity, and ease of data processing without the need for complex imaging algorithms.
Volume: 15
Issue: 3
Page: 2631-2641
Publish at: 2025-06-01

A prediction of coconut and coconut leaf disease using MobileNetV2 based classification

10.11591/ijece.v15i3.pp2834-2844
Kavitha Magadi Gopalakrishna , Raviprakash Madenur Lingaraju
This research is aimed at effectively predicting coconut and coconut leaf disease using enhanced MobileNetV2 and ResNet50 methods. The stages involved in this implemented method are data collection, pre-processing, feature extraction, and classification. At first, data is collected from coconut and coconut leaf datasets. Gaussian filter and data augmentation techniques are applied on these images to eliminate noise during the pre-processing phase. Then, features are extracted using ResNet50 technique, while the diseases are classified using MobileNetV2 approach. In comparison to the existing methods namely, EfficientDet-D2, DL-assisted whitefly detection model (DL-WDM), and modified inception net-based hyper tuning support vector machine (MIN-SVM), the proposed method achieves superior classification values with 99.99% and 99.2% accuracy for coconut leaf and for coconuts, respectively.
Volume: 15
Issue: 3
Page: 2834-2844
Publish at: 2025-06-01

A gamified online learning environment with comprehensive assessments and software integration

10.11591/ijaas.v14.i2.pp416-429
Swati Shilaskar , Shripad Bhatlawande , Rupali Deshpande , Shivam Shinde , Jyoti Madake , Anjali Solanke
The National Achievement Survey (NAS), conducted by the Ministry of Education, India, highlighted a concerning decline in mathematics proficiency among students in Maharashtra as they advance through grades. This trend is further aggravated by the limited availability of online resources in Marathi, hindering their learning progress. To address this, a pilot study was proposed to develop a specialized online platform tailored for Marathi medium students, integrating gamification and artificial intelligence (AI)-driven feedback to enhance engagement and comprehension. The pilot project, conducted at a Marathi medium school with approval from the principal, focused on polynomial division tests for 8th-grade students over four days. Results revealed that despite the easy level test's higher difficulty, students scored higher on the medium level test, possibly due to an adjustment period to the online platform. Notably, some students performed better on the hard-level test, indicating the platform's potential to improve performance. While promising, the study's limitations, including a small sample size, highlight the need for further research with a larger cohort and the integration of automatic suggestions for concept-specific games and assessments in future iterations to optimize the platform's effectiveness.
Volume: 14
Issue: 2
Page: 416-429
Publish at: 2025-06-01

Psychological distress and coping responses among occupational safety and health competent post-COVID-19 era in Malaysia

10.11591/ijphs.v14i2.25010
Fauzah Rahimah Mohd Ali , Hafizah Pasi , Muhamad Arif Ibrahim , Raemy Mad Zein , Joy Khong Chooi Yee , Ruzita Mohd Shariff , Nur Alyani Fahmi Salihen
Amidst the COVID-19 pandemic, mental health challenges have emerged, highlighting the need to identify psychological distress and coping strategies, particularly among occupational safety and health (OSH) competent persons. This is a cross-sectional study measuring stress, anxiety, and depression levels while exploring coping mechanisms among OSH professionals in Malaysia during the COVID-19 recovery phase, using DASS-21 and Brief-COPE questionnaires. The findings indicate that chronic illness increases the risk of depression (p=0.005) and stress (p=0.047). Higher income is associated with greater risks of depression (p<0.001) and stress (p<0.001). Monthly expenses exceeding budget limits heighten the risk of depression (p<0.001) and anxiety (p=0.024). Conversely, older age decreases the risk of both depression (p<0.001) and stress (p=0.001). Caring for family members affected by COVID-19 reduces depression (p<0.001) and stress (p<0.001). Having more monthly savings decreases the risk of depression (p<0.001) and anxiety (p=0.017). The study reveals that stress individuals prefer emotional focus coping (p=0.006). Addressing these factors is crucial for mitigating psychological distress among OSH professionals.
Volume: 14
Issue: 2
Page: 779-789
Publish at: 2025-06-01

Bridging technology and healthcare: user acceptance of a surgical site infection system

10.11591/ijaas.v14.i2.pp523-532
Afan Fatkhur Akhmad , Maria Ulfa
Surgical site infections (SSI) continue to be a problem for surgeons, and unfortunately, SSI information systems are underutilized. This study analyzed the user acceptance of the SSI information system based on the extended technology acceptance model (TAM2). A cross-sectional questionnaire-based study. The variables studied intention to use (IU), perceived ease of use (PEOU), demographic factors (FD), subjective norm (SN), Image (I), job relevance (JR), output quality (OQ), result demonstrability (RD), perceived usefulness (PU). Data were collected by filling out questionnaires and then analyzed using smart-partial least squares (PLS). In total, 61 nurses were included. Most respondents are aged 31-35 (26.23%), and most working periods are between 11-15 years (27.87%). There were significant positive effects on SN to PU (β=0.12; p 0.05). This study concluded that PEOU is the most influential variable in the IU the SSI information system.
Volume: 14
Issue: 2
Page: 523-532
Publish at: 2025-06-01

A review on ischemic heart disease prediction frameworks using machine learning

10.11591/ijaas.v14.i2.pp361-372
Kabo Clifford Bhende , Tshiamo Sigwele , Chandapiwa Mokgethi , Aone Maenge , Venu Madhav Kuthadi
Ischemic heart disease (IHD) is a leading cause of mortality worldwide, calling for advanced predictive models for timely intervention. Current literature reviews on machine learning (ML)-based IHD prediction frameworks often focus on predictive accuracy but lack depth in areas like dataset diversity, model interpretability, and privacy considerations. Existing IHD prediction frameworks face limitations, including reliance on small, homogenous datasets, limited critical analysis, and issues with model transparency, reducing their clinical utility. This review addresses these gaps through a systematic, comparative analysis of popular ML models, such as random forest (RF) and support vector machines (SVM), noting their strengths and limitations. Key contributions include a qualitative examination of prevalent tools, datasets, and evaluation metrics, identification of gaps in dataset diversity and interpretability; and recommendations for improving model transparency and data privacy. Major findings reveal a trend toward ensemble models for accuracy but highlight the need for explainable artificial intelligence (AI) to support clinical decisions. Future directions include using federated learning to enhance data privacy, integrating unstructured data for comprehensive prediction, and advancing explainable AI to build trust among healthcare providers. By addressing these areas, this review aims to guide future research toward developing robust, transparent ML frameworks that can be more effectively deployed in clinical settings.
Volume: 14
Issue: 2
Page: 361-372
Publish at: 2025-06-01

A comprehensive survey on automatic image captioning-deep learning techniques, datasets and evaluation parameters

10.11591/ijece.v15i3.pp3257-3266
Harshil Chauhan , Chintan Thacker
Automatic image captioning is a pivotal intersection of computer vision and natural language processing, aiming to generate descriptive textual content from visual inputs. This comprehensive survey explores the evolution and state-of-the-art advancements in image caption generation, focusing on deep learning techniques, benchmark datasets, and evaluation parameters. We begin by tracing the progression from early approaches to contemporary deep learning methodologies, emphasizing encoder-decoder based models and transformer-based models. We then systematically review the datasets that have been instrumental in training and benchmarking image captioning models, including MSCOCO, Flickr30k, Flickr8k, and PASCAL 1k, discussing image count, types of scenes, and sources. Furthermore, we delve into the evaluation metrics employed to assess model performance, such as bilingual evaluation understudy (BLEU), metric for evaluation of translation with explicit ordering (METEOR), recall-oriented understudy for gisting evaluation (ROUGE), and consensus-based image description evaluation (CIDEr), analyzing their domains, bases, and measurement criteria. Through this survey, we aim to provide a detailed understanding of the current landscape, identify challenges, and propose future research directions in automatic image captioning.
Volume: 15
Issue: 3
Page: 3257-3266
Publish at: 2025-06-01

SIGAN: a generative adversarial network architecture for sketch to photo synthesis

10.11591/ijece.v15i3.pp3118-3126
Buddannagari Latha , Athiyoor Kannan Velmurugan
Of late, with the rise of artificial intelligence (AI) and deep learning (DL) models, image translation has become a very important phenomena which could produce realistic photographic results. Synthesizing new images is widely used in different applications including the ones used by investigation agencies. Image generation from hand-drawn sketch to realistic photos and vice versa is required in different computer vision applications. Generative adversarial network (GAN) architecture is extensively employed for generating images. However, there is need for investigating further on improvising GAN architecture and the underlying loss functions towards leveraging performance. In this paper, we put forth a GAN architecture known as sketch-image GAN (SIGAN) for synthesizing realistic photos from hand-drawn sketches. Both generator (G) and discriminator (D) components are designed based on DL models following a non-cooperative game theory towards improving image generation performance. SIGAN exploits improvised image representation and learning of data distribution. The algorithm we have proposed is known as learning-based sketch-image generation (LbSIG). This algorithm exploits SIGAN architecture for efficiently generating realistic photo from given hand-drawn sketch. SIGAN is assessed using a benchmark dataset called CUHK face sketch database (CUFS). From the empirical study, it is observed that the proposed SIGAN architecture with underlying deep learning models could outperform existing GAN models in terms of Fréchet inception distance (FID) with 38.2346%.
Volume: 15
Issue: 3
Page: 3118-3126
Publish at: 2025-06-01

Leukemia detection using SegNet and faster region-based convolutional neural network

10.11591/ijece.v15i3.pp3028-3038
Della Reasa Valiaveetil , T. Kanimozhi
Prevention of cancer is mostly attained by surveillance of the transformation zones. White blood cells (WBCs) are established in the bone marrow and intemperate growth of WBC leads to leukemia. Hematologists examine the microscopic images in manual method for predicting leukemia, but it is very complex process and without any guaranteed for accurate. In this proposed study, deep learning techniques involved to segment and classify the three types of leukemia like acute lymphocytic leukemia (ALL), acute myeloid leukemia (AML) and chronic lymphocytic leukemia (CLL) using the BioGps dataset. The purpose of deep learning in medical science enhances the accuracy and precision of determining leukemia in early stages. In this study, introducing a sigmoid stretching (SS) in pixel enhancement for preprocessing; SegNet (St) is comfort to extract the structural features of the leukocytes and to segment the normal and blast cells for a clear classification; faster region-based convolutional neural network (faster R- CNN) carried under the process of classification and optimization done by dragon fly algorithm. The result of this work achieves best accuracy related to the existing techniques of convolutional neural network (CNN) such as support vector machine (SVM), k-nearest neighbors (kNN) and Bayesian model. This study achieves the accuracy rate of 97%, precision rate of 94% and sensitivity rate of 90% respectively with low complexity.
Volume: 15
Issue: 3
Page: 3028-3038
Publish at: 2025-06-01

Exploring the effectiveness of hybrid artificial bee PyCaret classifier in delay tolerant network against intrusions

10.11591/ijece.v15i3.pp3149-3161
Rajashri Chaudhari , Manoj Deshpande
In challenging environments with intermittent connectivity and the absence of end-to-end paths, delay tolerant networks (DTNs) require robust security measures to safeguard against potential threats. This study addresses these issues by implementing an intrusion detection system (IDS) enhanced with machine learning techniques. Common threats such as distributed denial-of-service (DDoS) and flood attacks are tackled using datasets like network intrusion detection (NID) and flood attack datasets. Multiple machines learning methods, including k-nearest neighbors (K-NN), decision trees (DT), logistic regression (LR), and others, are utilized to improve detection accuracy. A PyCaret-based approach is developed to increase efficiency while preserving attack detection accuracy in DTNs. Comparative research demonstrates that PyCaret outperforms Scikit-learn models, and the artificial bee PyCaret classifier (ABPC) optimizes hyperparameters to improve model performance. NS2 simulation shows the system's ability to thwart attacks, offering useful insights into DTN security and improving communication reliability in various situations.
Volume: 15
Issue: 3
Page: 3149-3161
Publish at: 2025-06-01

Investigating power quality issues in electric buggy battery charger systems: analysis and mitigation strategies

10.11591/ijece.v15i3.pp2534-2544
Wan Muhamad Hakimi Wan Bunyamin , Samshul Munir Muhamad , Wan Salha Saidon , Rahimi Baharom
This paper investigates power quality issues in the battery charger system of an electric buggy. Key power quality parameters such as total harmonic distortion (THD), power factor (PF), input voltage, and input current, were measured and analyzed during the charging process. The findings reveal significant power quality challenges, with THD levels exceeding IEEE 519 standards, indicating inefficiencies and potential risks such as increased heating and stress on charger components. Power factor readings reveal a substantial reactive power component, further contributing to inefficiency. To address these issues, the study recommends implementing harmonic mitigation techniques, such as passive and active filters, to reduce THD levels, using power factor correction methods, and optimizing charging algorithms to manage power demand more effectively. Continuous monitoring of charging parameters is essential for maintaining optimal performance and reliability. Adhering to standards is crucial for the efficient and reliable operation of electric vehicle (EV) charging systems, with regular compliance testing and benchmarking necessary to identify improvement areas and maintain a high-quality charging infrastructure. The proposed solutions aim to develop a sustainable and efficient charging system for electric buggies, providing valuable insights and recommendations for future research and development in power electronics and drive systems for EV applications.
Volume: 15
Issue: 3
Page: 2534-2544
Publish at: 2025-06-01
Show 186 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration