Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Comparative insights into nonlinear PID-based controller design approaches for industrial applications

10.11591/ijra.v14i2.pp191-203
Syed Najib Syed Salim , Mohd Fua’ad Rahmat , Lokman Abdullah , Shamsul Anuar Shamsudin , Khairun Najmi Kamaludin , Mazree Ibrahim
Proportional-integral-derivative (PID) controllers are established in manufacturing due to their simple design, robustness, and wide-ranging industrial applications. However, traditional PID controllers often struggle with the complexity and nonlinearity behaviors inherent in many control systems. As a result, ongoing and future research is focused on developing more stable PID controllers that function efficiently without heavily depending on exact mathematical models, by fine-tuning controller parameters. This study explores several PID-based controllers, including non-linear PID (N-PID), multi-rate non-linear PID (MN-PID), and self-regulating nonlinear PID (SN-PID), assessing and contrasting their performance. The efficacy and robustness of these control mechanisms are substantiated through comparative analyses with the sliding mode control technique, employing experimental data from a pneumatic actuator system to assess performance across varying load scenarios. SN-PID outperforms sliding mode controller (SMC) by 90.97% and PID by 89.90%, followed by MN-PID (85.58% over SMC, 83.86% over PID) and N-PID (78.08% over SMC, 75.49% over PID), while PID offers only 10.63% improvement over SMC. These findings provide valuable insights and recommendations for enhancing controller performance. These insights aim to guide control engineers in selecting the most appropriate N-PID design strategy for specific applications, ultimately improving system performance and operational efficiency in industrial environments.
Volume: 14
Issue: 2
Page: 191-203
Publish at: 2025-06-01

CP_SDUNet: road extraction using SDUNet and centerline preserving dice loss

10.11591/ijra.v14i2.pp260-272
Bayu Satria Persada , Muhammad Rifqi Priyo Susanto , Laksmita Rahadianti , Aniati Murni Arymurthy
Existing automatic road map extraction approaches on remote sensing images often fail because they cannot understand the spatial context of an image. Mainly because they could not learn the spatial context of the image and only knew the structure or texture of the image. These approaches only focus on regional accuracy instead of connectivity. Therefore, most approaches produce discontinuous outputs caused by buildings, shadows, and similarity to rivers. This study addresses the challenge of automatic road extraction, focusing on enhancing road connectivity and segmentation accuracy by proposing a network-based road extraction that uses a spatial intensifier module (DULR) and densely connected U-Net architecture (SDUNet) with a connectivity-preserving loss function (CP_clDice) called CP_SDUNet. This study analyzes the CP_clDice loss function for the road extraction task compared to the BCE Loss function to train the SDUNet model. The result shows that CP_SDUNet, performs best using an image size of 128×128 pixels and trained with the whole dataset with a combination of 20% clDice and 80% dice loss. The proposed method obtains a clDice score of 0.85 and an Interest over Union (IoU) score of 0.65 for the testing data. These findings demonstrate the potential of CP_SDUNet for reliable road extraction.
Volume: 14
Issue: 2
Page: 260-272
Publish at: 2025-06-01

Autonomy support and motivation in private music students: the role of basic psychological needs

10.11591/ijere.v14i3.33168
Qin Xiong , Mohamad Fitri Mohamad Haris
The objective of this research was to measure the impact of autonomous support and expectancy beliefs on autonomous motivation of students. The study investigated the impact of basic psychological needs on autonomous support. Furthermore, the mediating role of basic psychological needs is also analyzed. Using simple random sampling, the study collected cross-sectional data from 305 students on a Likert scale questionnaire at private music schools located in Nanchang, China. SPSS 26 and Smart PLS 4 are used for descriptive and inferential statistics and findings. The study found that autonomy support, expectancy beliefs and basic psychological needs have a significant impact on autonomous motivation. The study also found that autonomy support and expectancy beliefs also have significant influence on basic psychological needs. While the study found that basic psychological needs mediate the impact of autonomy support and expected beliefs on autonomous motivation. In addition, measuring the dimension of autonomous support, the study found that parental support and teachers’ support have a significant impact on autonomous motivation. While the study found that parental support and teachers’ support also have a significant impact on basic psychological needs. The study further confirmed that basic psychological needs positively mediate the impact of parental support and teachers’ support on autonomous motivation.
Volume: 14
Issue: 3
Page: 2018-2030
Publish at: 2025-06-01

IoT-based cricket environment system to maximize egg production and reduce mortality rate

10.11591/ijra.v14i2.pp281-289
Dominic Miracle Tjandrata , Suryadiputra Liawatimena
The deployment of Internet of things (IoT) technologies presents an opportunity to improve efficiency in cricket farming. This study investigates the implementation of an IoT-based system utilizing an ESP32 microcontroller, a suite of environmental sensors, and actuators. The system is supported by a ThingsBoard dashboard for data visualization and a Telegram bot for notifications. The setup was tested on a single cricket cage over a 28-day period and compared against a control group. Each cage contained 20 male and 100 female Cliring crickets. Key parameters analyzed included temperature, humidity, soil moisture, egg yield, food conversion ratio (FCR), and mortality rate. Findings show that the IoT-enabled cage consistently maintained optimal environmental conditions—temperature (20 to 32 °C), humidity (65% to 85%), and soil moisture (60% to 80%)—unlike the control, which experienced greater variability. The IoT cage yielded 87.28 grams of eggs, a 33.33% improvement over the control's 65.46 grams. Additionally, FCR improved from 2.53 to 2.01 grams per egg, and mortality rate dropped from 0.816 to 0.708. These results underscore the effectiveness of IoT systems in enhancing environmental stability, productivity, and survival rates in small- to medium-scale cricket farming operations.
Volume: 14
Issue: 2
Page: 281-289
Publish at: 2025-06-01

Internet of Things-enabled smart robotic baggage monitoring and tracking system for enhanced traveler convenience and security

10.11591/ijra.v14i2.pp290-300
Anita Gehlot , Rajesh Singh , Rahul Mahala , Vivek Kumar Singh , Mahim Raj Gupta
Baggage travel is a significant issue, causing inconveniences and financial losses for travellers. The rise in efficient international and domestic travel has led to the need for live baggage tracking systems. Traditional methods, such as manual tracking and locks, are inefficient and counterproductive due to power limitations. IoT has revolutionized baggage management by providing real-time tracking feedback and enhancing security. IoT-enhanced smart luggage systems use biometric locks, GPS tracking, and smart locking mechanisms to prevent theft and unauthorized usage. Geofencing allows users to draw boundaries for luggage, and smart luggage systems can adapt to airport security requirements. Some smart suitcases also have self-following features, allowing travellers to have better control over their bags. IoT-enabled baggage solutions also improve airport and travel centre efficiency. RFID and barcode identification devices enable airline employees to quickly recognize, monitor, and manage luggage, reducing waiting times and loss risks. Cloud-based systems allow users to remember their luggage and receive travel suggestions based on predicted frequency of use. IoT-enabled baggage management systems have the potential to transform airport ecosystems into smarter ones through automated tracking with minimal human involvement and errors. AI and machine learning can also proactively address concerns and improve the overall customer journey.
Volume: 14
Issue: 2
Page: 290-300
Publish at: 2025-06-01

Understanding golfers’ acceptance behavior toward robotic golf caddies by merging the task technology fits theory and the perceived risk theory

10.11591/ijra.v14i2.pp173-180
Kyuhyeon Joo , Heather Markham Kim , Jinsoo Hwang
The current paper was designed to understand how to form the acceptance behavior of golfers toward robotic golf caddies, which conducted a hypothetico-deductive approach. The study focused on two questions: i) Can the TTF theory explain the acceptance behavior of golfers toward robotic golf caddies? ii) Do perceived risks negatively affect the acceptance behavior of golfers toward robotic golf caddies? Thus, the study postulated the impacts of task/technology characteristics and the five perceived risks (i.e. financial, time, privacy, performance, and psychological) on task technology fit, and the link between task technology fit and behavioral intentions. The data was collected from 387 golfers in South Korea, and the hypotheses tests were conducted by structural equation modeling. The results of the data analysis indicate that both task and technology characteristics increase task technology fit, and the four dimensions of perceived risks, which include time, privacy, performance, and psychology, have a negative influence on task technology fit. In addition, task technology fit also increases behavioral intentions. The study provides theoretical contributions by filling the acknowledged research gaps, and it also presents managerial implications in regard to commercializing robotic caddies in the golf industry.
Volume: 14
Issue: 2
Page: 173-180
Publish at: 2025-06-01

The impact of leader motives in students: a systematic review

10.11591/ijere.v14i3.31418
Anil DCosta , Joseph Chacko Chennattuserry , G. S. Prakasha
Leader motives elucidate the driving forces behind leadership behavior and decision-making, which are pivotal for understanding effective leadership dynamics across diverse contexts. In this context, the systematic literature review (SLR) analyzed leader motives among students, providing insights into the underlying drivers shaping leadership behaviors within educational environments. This paper aims to understand how leader motives impact student behavior, academic performance, and social dynamics within educational environments. Based on McClelland’s needs theory as a conceptual framework, the review examines students’ prevalence and manifestations of achievement, power, and affiliation motives. This study systematically reviewed 16 papers, scholarly databases, and pertinent literature published between 2007 and 2024. A preferred reporting items for systematic reviews and meta-analysis (PRISMA) method was used to report the items. The findings underscore the importance of nurturing leader motives in educational settings, which contribute to positive student outcomes and foster leadership development through the lens of need theory. This study contributes to understanding how leader motives can elevate leadership behaviors and outcomes, offering valuable insights for policymakers and academic leaders aiming to enhance educational quality.
Volume: 14
Issue: 3
Page: 2144-2153
Publish at: 2025-06-01

Designing high power efficient finite impulse response filters with three-four inexact adder-integrated Booth multiplier

10.11591/ijra.v14i2.pp204-213
Manju Inasu Kollannur , Oudaya Coumar Souprayen
Finite impulse response (FIR) filters are widely utilized in several applications in digital signal processing, including data transmission, photography, digital audio, and biomedicine. It is necessary to use high sample rates for FIR filters, while moderate sample rates are needed for low-power circuits. To solve these problems, a Booth multiplier based on three-four inexact adder-based multiplication (TFIE-BM) was proposed. The goal of the proposed TFIE-based FIR Booth multiplier is to lower area usage, latency, and power consumption. The proposed method utilizes the spotted hyena optimizer (SHO) to find the optimal filter coefficient (FC) by minimizing the pass power consumption and Transition bandwidth. Moreover, a high-performance three-four inexact adder (TIFE adder) has been introduced, which uses fewer XOR gates for sum and carry generation, indicating that the logic has been simplified to reduce hardware complexity. By increasing speed and decreasing the FIR filter's critical path delay, a modified Booth multiplier that uses a 5:2 compressor is introduced. The overall delay of the proposed approach is 23.4%, 18.7%, 12.3%, and 5.7% lower than that of the Radix-4 Booth multiplier, CSA Booth multiplier, hybrid multiplier, and traditional Booth multiplier, respectively.
Volume: 14
Issue: 2
Page: 204-213
Publish at: 2025-06-01

Comparison of deep learning models: CNN and VGG-16 in identifying pornographic content

10.11591/ijai.v14.i3.pp1884-1899
Reza Chandra , Adang Suhendra , Lintang Yuniar Banowosari , Prihandoko Prihandoko
In 2020, a total of 59,741 websites were blocked by the Indonesian government due to containing negative content, including pornography, with 14,266 websites falling into this category. However, these blocked websites could still be accessed by the public using virtual private networks (VPNs). This prompted the research idea to quickly identify pornographic content. This study aims to develop a system capable of identifying websites suspected of containing pornographic image content, using a deep learning approach with convolutional neural network (CNN) and visual geometry group 16 (VGG-16) model. The two models were then explored comprehensively and holistically to determine which model was most effective in detecting pornographic content quickly. Based on the findings of the comparison between testing the CNN and VGG-16 models, research results showed that the best test results were obtained in the eighth experiment using the CNN model at an epoch value level of 50 and a learning rate of 0.001 of 0.9487 or 94.87%. This can be interpreted that the CNN model is more effective in detecting pornographic content quickly and accurately compared to using the VGG-16 model.
Volume: 14
Issue: 3
Page: 1884-1899
Publish at: 2025-06-01

NAPLAM: a novel ledger-based algorithm for detection and mitigation of sinkhole attacks in routing protocol for low power and lossy networks-based Internet of things

10.11591/ijra.v14i2.pp248-259
Akshaya Dhingra , Vikas Sindhu , Lakshay Dhingra
The Internet of Things (IoT) is a network of connected physical objects that collect and share data over the Internet. However, routing attacks can disrupt data exchange, especially multi-node sinkhole attacks in low power and lossy IoT networks (LLNs). To support communication in LLN IoT, the IPv6-based routing protocol for LLNs (RPL) is used. Despite having several advantages, RPL also faces challenges like being vulnerable to attacks, having limited resources, compatibility, and scalability issues. Additionally, traditional security methods often do not work well for LLN-IoT devices because they lack the necessary computing power. To overcome these challenges, we have proposed a novel ledger-based framework called network and packet ledger to ascertain malicious devices using routing protocol for LLN (NAPLAM-RPL). This framework can effectively detect and mitigate multi-node sinkhole attacks in IoT networks. This paper also compares NAPLAM-RPL with similar protocols using the NetSim Simulator. The experimental analysis shows that NAPLAM-RPL improves network performance and outperforms existing methods like RF-trust, SoS-RPL, INTI, C-TRUST, and heartbeat algorithm in crucial areas, including packet delivery rate (PDR), throughput, End-to-End (E2E) delay, energy consumed, and detection accuracy.
Volume: 14
Issue: 2
Page: 248-259
Publish at: 2025-06-01

A new era of technological change in the restaurant industry: focusing on perceived values of robot servers

10.11591/ijra.v14i2.pp143-150
Jinsoo Hwang , Kyuhyeon Joo , Joonho Moon
The objective of this research is to examine the perceived values of robot servers, which include utilitarian and hedonic values, and how this influences willingness to pay more in the restaurant industry. This paper also examined the differences between the two sub-dimensions of perceived value, which are based on the demographic factors of the respondents. This research performed a data analysis based on a sample size of 295 participants, and the results indicated that the two sub-dimensions of perceived value play a crucial role in regard to the formation of willingness to pay more. Furthermore, the results showed that there were differences in perceived value in regard to the demographic factors.
Volume: 14
Issue: 2
Page: 143-150
Publish at: 2025-06-01

An integrated framework for data breach on the dark web in brand monitoring data hunting

10.11591/ijece.v15i3.pp3162-3170
Siti Arpah Ahmad , Muhammad Al’Imran Mohd Khairuddin , Nor Shahniza Kamal Bashah , Nurul Aishah Ab Raman
In today's digital landscape, data breaches pose a substantial threat, with the dark web serving as a prevalent platform for malevolent actors to perpetrate such incidents. Currently, security analysts use various tools to solve the problem, which is very time-consuming. This paper introduces a novel framework that integrates data breach monitoring within the dark web, focusing on brand monitoring and data hunting. The framework starts from the scraping process and continues with the utilisation of the Splunk dashboard. The dashboard provides an exhaustive overview of data breaches related to brands for both manual inquiries and rule-based detection mechanisms. The framework comprises five phases: data sourcing, data collection, integration, monitoring, and visualisation. The visualisation phase encompasses alert generation, notification mechanisms, and reporting functionalities. Moreover, the monitoring phase provides real-time surveillance, advanced search capabilities, brand monitoring, and threat intelligence integration. The integration phase involves security information and event management (SIEM) systems and security orchestration, automation, and response (SOAR) systems. This paper's result contributes to enhancing the National Institute of Standards and Technology (NIST) cybersecurity framework, offering a comprehensive solution to the data breaches challenge within the dark web and the frontiers of knowledge and security practices.
Volume: 15
Issue: 3
Page: 3162-3170
Publish at: 2025-06-01

Electroencephalography classification technique based on statistical denoising and modified k-nearest neighbor algorithm with bipolar sigmoid rectified linear unit’s function

10.11591/ijece.v15i3.pp2786-2795
Thejaswini Bekkalale Mahalingegowda , Glan Devadhas George , Satheesha Tumakur Yoga , Kaliyamoorthy Ezhilarasan
Accurate classification of electroencephalography (EEG) data is much needed for early identification of diseases to treat various disorders. In this paper, we propose EEG classification technique based on statistical denoising & modified k-nearest neighbor (k-NN) algorithm with bipolar sigmoid rectified linear units (ReLU) function. The EEG data is subjected to statistical methods to remove the artifacts and then applied to modified k-NN algorithm to categorize the appropriate features giving preference to neighbors closer to one another considering the weighted votes of the k-nearest neighbors before selecting the class label based on the highest weighted vote. A customized activation function that combines these two functions called as hybrid function that uses various portions of each function in particular ranges is used in our work i.e., use of bipolar sigmoid for negative values and the ReLU function for positive values which helps to limit the signal in a particular range. The proposed algorithm's detection accuracy is tested for the confusion matrix of true positive (TP), false positive (FP), false negative (FN)and true negative (TN) and compared to the detection accuracy of other existing algorithms, demonstrating the algorithm's efficiency with a classification accuracy of almost 85 percent and sensitivity of 91% for standard Kaggle Dataset.
Volume: 15
Issue: 3
Page: 2786-2795
Publish at: 2025-06-01

Design of H-/H∞ based fault detection filter for linear uncertain systems using linear matrix inequalities

10.11591/ijra.v14i2.pp214-226
Masood Ahmad , Rosmiwati Mohd-Mokhtar
One of the significant challenges in model-based fault detection is achieving robustness against disturbances and model uncertainties while ensuring sensitivity to faults. This study proposes an optimized approach for designing fault detection filters for discrete-time linear systems with norm-bounded model uncertainties. The design leverages the H-/H∞ optimization framework and is expressed through linear matrix inequality constraints. The filter is designed to produce a residual signal that balances two opposing objectives: minimizing the impact of disturbances and model uncertainties while maximizing fault sensitivity. The effectiveness of the proposed method is demonstrated through simulations involving sensor and actuator fault detection in the well-known three-tank system. Simulation results illustrate the method's ability to maintain robustness against disturbances and uncertainties while effectively detecting faults in the system.
Volume: 14
Issue: 2
Page: 214-226
Publish at: 2025-06-01

A novel approach to enhance rice foliar disease detection: custom data generators, advanced augmentation, hybrid fine-tuning, and regularization techniques with DenseNet121

10.11591/ijra.v14i2.pp237-247
Govindarajan Subburaman , Mary Vennila Selvadurai
Rice leaf diseases impact crop yield, leading to food shortages and economic losses. Early, automated detection is essential but often hindered by accuracy challenges. This study contributes to improving model robustness against diverse and adversarial inputs by proposing a custom data generator that applies Albumentation-based advanced augmentations, such as Gaussian blur, noise addition, brightness/contrast adjustments, and coarse dropout, to enhance model generalization. Five deep learning architectures—simple convolutional neural network (CNN), ResNet50, EfficientNetB0, Inception v3, and DenseNet121—were evaluated for classifying six categories: bacterial blight, brown spot, leaf blast, leaf scald, narrow brown spot, and healthy leaf. A hybrid model approach is proposed, fine-tuning the DenseNet121 model by unfreezing its last 20 layers, which balances transfer learning benefits with domain-specific feature extraction. Regularization techniques, including L2 regularization and a reduced dropout rate, are incorporated to control overfitting. Additionally, a custom learning rate scheduler is proposed to promote stable training. DenseNet121 achieved the highest performance, with an accuracy of 98.41%, demonstrating the effectiveness of these advanced augmentation and tuning strategies in rice leaf disease classification.
Volume: 14
Issue: 2
Page: 237-247
Publish at: 2025-06-01
Show 206 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration