Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,061 Article Results

DFIG integration with ReLIFT converter for grid-connected systems: ANFIS MPPT control

10.11591/ijict.v15i1.pp21-29
Aravindhan Karunanithy , Chidambararaj Natarajan , Sanjay Selvan Arul Manimaran Malathy , Siva Malavan Elantherayan Sharmila
Although dispersed generation and non-linear loads provide difficulties for contemporary power systems that depend on power electronics, renewable energy sources (RES) are essential for meeting the world’s energy demands. This paper provides a unique method for maximum power point tracking (MPPT) in doubly fed induction generators (DFIG) system using an Adaptive network based fuzzy inference system (ANFIS) inference system. The suggested ANFIS MPPT controller adaptively modifies discontinuous control gain to reduce chattering phenomena in the excitation system while preserving the resilience of the closed-loop system. Prior to using a DQ control theory controller for rotor magnitude adjustment to accomplish vector control of active and reactive power, the turbine and DFIG must be modeled. The converter maximizes output current while striving for unity power factor and allowable harmonic content.
Volume: 15
Issue: 1
Page: 21-29
Publish at: 2026-03-01

NLP-based fraudulent biomedical news identification using LSTM-SGD deep learning algorithm

10.11591/ijict.v15i1.pp179-188
Siva Dhievaraj , Agusthiyar Ramu
Concern over bio medical fake news is rising, particularly as false information about illnesses, medical procedures, and public health regulations becomes more prevalent. It is essential to recognize such false information, and deep learning (DL) algorithms can offer a potent remedy, especially when paired with sophisticated natural language processing (NLP) methods. This technique improves the model's capacity to ignore frequently used but uninformative terms and concentrate on important terminology. The model's capacity to concentrate on the most pertinent phrases for fake news identification is enhanced by the use of chi-squared, a statistical test that ascertains the dependency between various variables and aids in the removal of unnecessary data. By reducing less significant characteristics to zero, the Lasso approach, a kind of regression, is used for feature selection, guaranteeing that the model only utilizes the most predictive features for classification. A crucial step in getting the data ready for DL models is feature extraction, which turns unprocessed text into numerical data. After the structured data has been analyzed, algorithms like as stochastic gradient descent (SGD), long short-term memory (LSTM) may determine whether or not an article is accurate. The authenticity and dependability of medical information provided across platforms may be ensured by effectively identifying biomedical fake news by fusing DL with sophisticated NLP techniques.
Volume: 15
Issue: 1
Page: 179-188
Publish at: 2026-03-01

Enhancing intellectual property rights management through blockchain integration

10.11591/ijict.v15i1.pp111-119
Raghavan Sheeja , Sherwin Richard R. , Shreenidhi Kovai Sivabalan , Srinivas Madhavan
The generational improvement has significantly converted several industries, and the area of intellectual property rights (IPR) isn’t any exception. IPRs, being as important as they are, need to be securely managed in some way. Blockchain, with its decentralized and immutable nature, gives a promising answer for enhancing the management of intellectual property (IP). This paper explores the strategic integration of blockchain generation for the control of IPR. The proposed system consists of a complete system, from registration and validation to predictive evaluation and royalty distribution, all facilitated through clever contracts. The use of zero-knowledge proofs guarantees the safety and confidentiality of sensitive information. The paper discusses the advantages and future implications of implementing this type of device.
Volume: 15
Issue: 1
Page: 111-119
Publish at: 2026-03-01

Lightweight deep learning approach for retinal OCT image classification: A CNN with hybrid pooling and optimized learning

10.11591/ijict.v15i1.pp414-427
Parth R. Dave , Nikunj H. Domadiya
Optical coherence tomography (OCT) is a non-invasive technique through which a retina specialist can see the structure behind the eye. This technol ogy offers a key role to identify various abnormalities in the retina: Drusen, diabetic macular edema (DME) and choroidal neovascularization (CNV). However, manual analysis of OCT scans can be time-consuming and prone to variability among clinicians. To address this challenge, we present a lightweight and explainable deep learning-based approach for automatic classification of retinal OCT images. The primary goal of this research is a model that delivers high diagnostic accuracy. A computer-aided suggestive method can help retinal doctors automatically classify the anomalies with more confidence and precision. In this paper, we proposed a novel approach based on deep learning: a six-layer convolutional neural network (CNN) integrated with hybrid pooling for effective feature extraction. Data augmentation and exponential learning rate is implemented to handle data imbalance between classes and for stabilized learning consecutively. Our proposed approach achieved 98.75% of accuracy while testing on the dataset. To further enhance the interpretability of the model, we also integrate explainable AI (XAI) using class activation mapping (CAM) to visualize the critical regions in the retina that contribute to the classification decisions.
Volume: 15
Issue: 1
Page: 414-427
Publish at: 2026-03-01

A decision support system for mushroom classification using Naïve Bayesian algorithm

10.11591/ijict.v15i1.pp138-151
Vilchor G. Perdido , Thelma D. Palaoag
Mushrooms are rich in vitamins and proteins, a well-known superfood, however, cases of harmful mushroom consumption worldwide result in hallucinations, illness, or death. A significant challenge is that some poisonous mushrooms closely resemble edible varieties, making it difficult for mushroom foragers to distinguish between them. This study introduced KabuTeach, a decision support system (DSS) designed to classify mushrooms based on their morphological characteristics using the Naïve Bayes (NB) algorithm. The classification model was applied to a real-world dataset of 8,124 instances from Kaggle, containing 23 attributes. Evaluation metrics, including accuracy, recall, precision, specificity, and F1-score, were used to assess the classifier’s performance. Results indicated that the NB classification algorithm integrated into KabuTeach achieved a high accuracy level of 89.13%, using a 70:30 data split and 5-fold cross-validation approaches. The 0.98 AUC (area under the curve) value further concluded that the model was excellent in classifying between edible and poisonous mushrooms. These findings showed that KabuTeach is a reliable classification tool that aids mushroom foragers in differentiating mushrooms and promoting safer consumption practices. This innovation in agricultural technology could potentially reduce health risks by minimizing accidental ingestion of toxic mushrooms, ultimately contributing to public health safety.
Volume: 15
Issue: 1
Page: 138-151
Publish at: 2026-03-01

Fuzzy logic-based driver fatigue prediction system for safe and eco-friendly driving

10.11591/ijict.v15i1.pp84-92
Raghavan Sheeja , Chidambaranathan Bibin , Selvaraj Vanaja , Shakeela Joy Arul Dhas , Alex Arockia Abins , Padmavathi Balasubramaniam
The advancement of intelligent car systems in recent years has been significantly influenced by developments in information technology. Driver fatigue is a dominant problem in car accidents. The goal of advanced driving assistance is to develop an advanced driving assistance system (ADAS) a eco-friendly model which focuses on the detection of drowsy driver, to notify drivers of their fatigued condition to prevent accidents on the roads. With relation to driving, the driver mustn’t be distracted by alarms when they are not tired. The answer to this unanswered question is provided by 60- second photograph sequences that were taken when the subject’s face was visible. To reduce false positives, two alternative solutions for determining whether the driver is drowsy have been developed. To extract numerical data from photos and feed it into a fuzzy logic-based system, convolutional network is applied initially; later deep learning technique is followed. The fuzzy logic-based solution avoids the false alarm of the system.
Volume: 15
Issue: 1
Page: 84-92
Publish at: 2026-03-01

Classification and regression tree model for diabetes prediction

10.11591/ijict.v15i1.pp207-216
Farah Najidah Noorizan , Nur Anida Jumadi , Li Mun Ng
Diabetes mellitus is characterized by excessive blood glucose that occurs when the pancreas malfunctions while producing insulin. High blood glucose levels can cause chronic damage to organs, particularly the eyes and kidneys. Diabetes prediction models traditionally use a variety of machine learning (ML) algorithms by combining data from the glucose levels, patient health parameters, and other biomarkers. Prior research on diabetes prediction using various algorithms, such as support vector machine (SVM) and decision tree (DT) models, demonstrates an accuracy rate of approximately 70%, which is relatively modest. Therefore, in this study, a classification and regression tree (CART) multiclassifier model has been proposed to improve the accuracy of diabetes prediction, which is based on three classes: non-diabetic, pre-diabetic, and diabetic. The study involved data preprocessing steps, hyperparameter tuning, and evaluation of performance metrics. The model achieved 97% accuracy while utilizing the value of 5 for the number of leaves per node, the value of 10 for the maximum number of splits, and deviance as the split criterion, which also resulted in a precision of 98%, recall of 97%, and F1-score of 98%, showing that the proposed multiclassifier model can accurately predict diabetes. In conclusion, the proposed CART model with the best hyperparameter setting can enable the highest accuracy in predicting diabetes classes.
Volume: 15
Issue: 1
Page: 207-216
Publish at: 2026-03-01

Exploring diverse perspectives: enhancing black box testing through machine learning techniques

10.11591/ijict.v15i1.pp238-246
Heba Nafez Jalal , Aysh Alhroob , Ameen Shaheen , Wael Alzyadat
Black box testing plays a crucial role in software development, ensuring system reliability and functionality. However, its effectiveness is often hindered by the sheer volume and complexity of big data, making it difficult to prioritize critical test cases efficiently. Traditional testing methods struggle with scalability, leading to excessive resource consumption and prolonged testing cycles. This study presents an AI-driven test case prioritization (TCP) approach, integrating decision trees and genetic algorithms (GA) to optimize selection, eliminate redundancy, and enhance computational efficiency. Experimental results demonstrate a 96% accuracy rate and a 90% success rate in identifying relevant test cases, significantly improving testing efficiency. These findings contribute to advancing automated software testing methodologies, offering a scalable and efficient solution for handling large-scale, data-intensive testing environments.
Volume: 15
Issue: 1
Page: 238-246
Publish at: 2026-03-01

Reputation-enhanced two-way hybrid algorithm for detecting attacks in WSN

10.11591/ijict.v15i1.pp428-437
Divya Bharathi Selvaraj , Veni Sundaram
Wireless sensor networks (WSNs) are susceptible to a variety of attacks, such as data tampering attacks, blackhole attacks, and grayhole attacks, that can affect the reliability of communication. We proposed a reputationenhanced two-way hybrid algorithm (RCHA) that uses cryptographic hash functions and reputation-based trust management to detect and de-escalate attacks accurately. The RCHA algorithm implements two hash functions RACE integrity primitives’ evaluation message digest (RIPEMD) and secure hash algorithm (SHA-3), to initiate the integrity check for the entire packet sent across the network. Every node in the WSN tracks a reputation score for each neighbor the node is connected to, and this score is dynamically updated based on the behavior of each neighbor. If a neighboring node’s reputation drops below a threshold, the node is sent a maliciousness designation. At that time, the node will broadcast an alert message to its neighboring nodes and begin to reroute its data through one of its trusted neighbors to ensure the reliability of the communication. The simulation results reported that the RCHA algorithm improved the accuracy of the attack detection rate and the number of packets delivered compared to traditional attack detection methods. The RCHA algorithm was able to maintain low computational and energy overhead for the WSN, making it an attractive option for a resource-constrained application in a WSN. Given the trends towards more collaborative networks, the reputation mechanism in the RCHA algorithm improves the overall reliability and capabilities of the WSN, regardless of adversaries.
Volume: 15
Issue: 1
Page: 428-437
Publish at: 2026-03-01

Dynamic monitoring for enhancing QoS and security in distributed systems

10.11591/ijict.v15i1.pp313-322
Sudhakar Periyasamy , Vijayalakshmi Alagarsamy , Palani Latha , Karuppiah Tamilarasi , Thenmozhi Elumalai , Prabu Kaliyaperumal
Distributed systems are integral to modern digital infrastructure, supporting communication and data exchange across various sectors. Ensuring security while maintaining quality of service (QoS) in such environments presents a significant challenge. This study introduces a dynamic network monitoring system (DNMS) that incorporates adaptive monitoring mechanisms and dynamic security metrics to safeguard distributed systems. The proposed architecture utilizes an event analyzer (EA) to evaluate and classify system events based on criticality, enabling secure transmission decisions and efficient threat detection. Experimental evaluations demonstrate the DNMS achieves a low processing overhead of 12%, supports a high data handling capacity of 5,000 requests per second, and maintains a latency of just 150 milliseconds. Additionally, it ensures strong compliance with regulatory standards-achieving 95% alignment with GDPR and 97% with ISO 27001- and high threat detection accuracy, with 98% for phishing, 94% for malware, and 96% for insider threats. These results confirm the framework’s effectiveness in enhancing adaptive security, offering scalable and regulation-compliant solutions for complex distributed environments.
Volume: 15
Issue: 1
Page: 313-322
Publish at: 2026-03-01

Analysis of congestion management using generation rescheduling with augmented Mountain Gazelle optimizer

10.11591/ijict.v15i1.pp57-65
Chidambararaj Natarajan , Aravindhan Karunanithy , S. Jothika , R. P. Linda Joice
This study presents an original blockage of the executive’s approach utilizing age rescheduling with the augmented mountain gazelle optimizer (AMGO). Enlivened by the versatility of mountain gazelles, AMGO is applied to enhance age plans for a reasonable power framework situation. The strategy successfully mitigates clogs, taking into account functional imperatives, market elements, and vulnerabilities. Recreation results show AMGO’s heartiness, seriousness, and proficiency in contrast with existing strategies. Notwithstanding its heartiness in blockage the board, the AMGO presents a state-of-the-art versatile element, enlivened by the spryness of mountain gazelles, empowering constant changes in accordance with developing power framework conditions and contrasted and genetic algorithms and PSO. The review adds to propelling streamlining methods for clogging the executives, offering a promising device for improving power framework, unwavering quality and productivity.
Volume: 15
Issue: 1
Page: 57-65
Publish at: 2026-03-01

Self-adaptive firefly algorithm-based capacitor banks and distributed generation allocation in hybrid networks

10.11591/ijict.v15i1.pp374-383
Seong-Cheol Kim , Sravanthi Pagidipala , Surender Reddy Salkuti
Power system deregulation has made significant changes to the power grid through various technologies, privatization of entities, and improved efficiency and reliability. This work mainly focuses on different combinations of distributed generation (DG) and capacitor banks (CBs) integration to cater to multiple technical, economic, environmental, and reliable concerns. A new optimal planning framework is proposed for optimally allocating the DG units and CBs to achieve multiple objectives. In this work, an augmented objective function is formulated by considering active power losses, voltage deviation, and voltage stability index objectives. This objective function is solved considering various equality and inequality constraints. This work proposes a novel approach for allocation of DGs and CBs in the radial distribution systems (RDSs) using an evolutionary-based self-adaptive firefly algorithm (SAFA). The effectiveness of the developed planning approach is demonstrated on IEEE 33 bus RDS in MATLAB software. The obtained results indicate that proposed planning approach resulted in reduced power losses, voltage deviations, and improved voltage stability.
Volume: 15
Issue: 1
Page: 374-383
Publish at: 2026-03-01

A survey on fronthaul signaling of user-centric cell-free massive MIMO networks

10.11591/ijict.v15i1.pp302-312
Syed Tariq Ali , Anamika Singh
The mandate for high data rates in mobile communication is increasing and will continue to do so in the future. Although the latest network technologies can meet this demand, they result in more-dense networks. Networks like ultra-dense networks and massive multiple-input multiple-output provide very high data rates, but they cannot meet the future demand. The main issue with existing networks is inter-cell interference and variations in quality of service esp. at the cell edges, leading to research on new network architectures that offer intelligent coordination and collaboration capabilities are being researched, like user-centric cell-free (UC-CF) massive-multipleinput-multiple-output (mMIMO). This network combines the best of ultradense networks and mMIMO and eliminates cell edge problems. It is served by access points that cooperate and coordinate with each other. This paper reviews the challenges and opportunities in physical layer parameterfronthaul signaling for UC-CF mMIMO. We discuss the basics of the network, the importance of fronthaul signaling, and propose various approaches in the literature to address challenges and identify research gaps and provide future directions. Our aims to provide a comprehensive overview of the current state of fronthaul signaling and highlight the key issues that need to be addressed to realize its full potential.
Volume: 15
Issue: 1
Page: 302-312
Publish at: 2026-03-01

Securing Defi: a comprehensive review of ML approaches for detecting smart contract vulnerabilities and threats

10.11591/ijict.v15i1.pp438-446
Dhivyalakshmi Venkatraman , Manikandan Kuppusamy
The rapid evolution of decentralized finance (DeFi) has brought revolutionary innovations to global financial systems; however, it has also revealed some major security vulnerabilities, especially of smart contracts. Traditional auditing methods and static analysis tools are prone to fail in identifying sophisticated threats, including reentrancy attacks, front-running, oracle manipulation, and honeypots. This review discusses the growing role of machine learning (ML) in enhancing the security of DeFi systems. It provides a comprehensive overview of modern ML-based methods related to the detection of smart contract vulnerabilities, transaction-level fraud detection, and oracle trust assessment. The paper also provides publicly available datasets, necessary toolkits, and architectural designs used for developing and testing these models. Additionally, it provides future directions like federated learning, explainable AI, real-time mempool inspection, and cross-chain intelligence sharing. While it is full of promise, the application of ML in DeFi security is plagued by issues like data scarcity, interoperability, and explainability. This paper concludes by highlighting the need for standardised benchmarks, shared data initiatives, and the integration of ML into development pipelines to deliver secure, scalable, and reliable DeFi ecosystems.
Volume: 15
Issue: 1
Page: 438-446
Publish at: 2026-03-01

Electrifying the roads using wireless charging solutions for next-gen electric vehicles

10.11591/ijict.v15i1.pp102-110
Venkatesh Kumar Chandrasekaran , Ramesh Babu Muthu , Lekha Shri Sasidar , Malathi Mani
This paper outlines a solar charging device designed for electric vehicles (Evs), mitigating the drawbacks of conventional fuel-based transportation and environmental pollution. Because EVs are becoming more and more popular throughout the world, there are more of them on the road. Beyond environmental benefits, EVs offer cost savings by substituting expensive fuel with more economical electricity. The study introduces innovative solutions in EV charging, enabling separate charging stations, continuous motion charging, and wireless charging without external power sources. The communication and system operations are controlled by an ESP8266 controller. This advanced approach eliminates the need for intermittent charging stops, representing a solar-powered wireless charging solution for plug-in EVs in transit. This work underscores the critical importance of addressing energy and environmental sustainability.
Volume: 15
Issue: 1
Page: 102-110
Publish at: 2026-03-01
Show 2 of 1938

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration