Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Optimizing photovoltaic system performance through MPPT synergetic adaptive control

10.11591/ijeecs.v38.i2.pp808-820
Kamel Hadjadj , Hadjira Attoui
This paper investigates enhancement of energy conversion through the implementation of new MPPT control strategy based on synergetic adaptive control (SAC) for a photovoltaic system. The architecture of this system encompasses a photovoltaic module, a DC-DC boost converter, a resistive load, and an MPPT controller. The controller amalgamates two distinct methodologies: the initial algorithm deduces the peak power current through a perturbation and observation (P&O) method, which serves as the reference point for the subsequent algorithm founded on synergetic adaptive control. The parameters for the latter are refined through the particle swarm optimization (PSO) technique This innovative method is employed to ascertain the optimal power output across varying weather conditions, aiming to enhance power transmission performance irrespective of meteorological variations. The efficacy of this strategy was affirmed through a comparative study with the conventional P&O method using MATLAB/Simulink simulations, which verified the superior performance of the proposed algorithm.
Volume: 38
Issue: 2
Page: 808-820
Publish at: 2025-05-01

End-user software engineering approach: improve spreadsheets capabilities using Python-based user-defined functions

10.11591/ijeecs.v38.i2.pp1024-1032
Tamer Bahgat Elserwy , Tarek Aly , Basma E. El-Demerdash
End-user computing enables non-developers to handle data and applications, boosting collaboration and productivity. Spreadsheets are a key example of end-user programming environments that are extensively utilized in business for data analysis. However, the functionalities of Excel have limitations compared to specialized programming languages. This study aims to address this shortcoming by proposing a prototype that integrates Python's features into Excel via standalone desktop Python-based user-defined functions (UDFs). This method mitigates potential latency concerns linked to cloud-based solutions. This study employs Excel-DNA (dynamic network access) and IronPython; Excel-DNA facilitates the creation of custom Python functions that integrate smoothly with Excel's calculation engine, while IronPython allows these Python UDFs to run directly within Excel. Core components include C# and visual studio tools office (VSTO) add-ins, which enable communication between Python and Excel. This approach grants users the chance to execute Python UDFs for various tasks such as mathematical computations and predictions — all within the familiar Excel environment. The prototype showcases seamless integration, enabling users to invoke Python-based UDFs just like built in Excel functions. This study enhances the capabilities of spreadsheets by harnessing Python's strengths within Excel. Future work may focus on expanding the Python UDF library and examining user experiences with this innovative approach to data analysis.
Volume: 38
Issue: 2
Page: 1024-1032
Publish at: 2025-05-01

Measuring political influence during elections using a deep learning approach

10.11591/ijeecs.v38.i2.pp1273-1288
Abderrazzak Cherkaoui , Omar El Beqqali
This contribution introduces a methodology for measuring political influence on Twitter during the 2020 U.S. presidential election campaign. The approach employs deep knowledge scores, which are generated through sentiment analysis of Tweets from users responding to influential users, coupled with an assessment of the strength of their interactions. The deep knowledge scores enable the categorization of three types of Twitter’s users engaging with influential users: influenced users, distrustful users, and connected users. Our approach, structured around a five-layer framework, effectively constructs networks of trust and distrust, and establishes the relationship between fluctuations in trust or distrust levels and the topics discussed by influential users.
Volume: 38
Issue: 2
Page: 1273-1288
Publish at: 2025-05-01

RNN-driven integration of spatial, temporal, features for Indian sign language recognition and video captioning

10.11591/ijeecs.v38.i2.pp821-829
Ajay Manohar Pol , Shrinivas A. Patil
This paper presents a novel model that integrates spatial features from residual blocks and temporal features from FFT, alongside a sophisticated RNN architecture comprising BiLSTM, gated recurrent units (GRU) layers, and multi-head attention. Achieving nearly 99% accuracy on both WLASL and INCLUDE datasets, this model outperforms standard CNN pretrained models in feature extraction. Notably, the BiLSTM and GRU combination proves superior to other combinations such as LSTM and GRU. The BLEU score analysis further validates the model's efficacy, with scores of 0.51 and 0.54 on the WLASL and INCLUDE datasets, respectively. These results affirm the model's proficiency in capturing intricate spatial and temporal nuances inherent in sign language gestures, enhancing accessibility and communication for the deaf and hard-of-hearing communities. The comparison highlights the superiority of this paper's proposed model over standard approaches, emphasizing the significance of the integrated architecture. Continued refinement and optimization hold promise for further augmenting the model's performance and applicability in real-world scenarios, contributing to inclusive communication environments.
Volume: 38
Issue: 2
Page: 821-829
Publish at: 2025-05-01

An embedded system for the classification of sleep disorders using ECG signals

10.11591/ijeecs.v38.i2.pp767-773
Lavu Venkata Rajani Kumari , Babishamili Daravath , Yarlagadda Padma Sai
Sleep apnea (SA) is a well-known sleep disorder. It predominantly appears due to lack of oxygen in humans. Identifying SA at an early stage can help early diagnosis. The primary motto of our research is to identify SA using electrocardiogram (ECG) signals. Here, three classes are considered for classification. One is normal (N), and the other two are SA classes obstructive sleep apnea (OA) and central sleep apnea (CA). ECG signals are accumulated for MIT-BIH polysomnographic dataset. The ECG data divided into ECG segments and labelled using annotation file. The proposed deep long short-term memory (LSTM) model is then trained using ECG segments and further tested. The model is then finetuned and optimized to obtain the best accuracy. An accuracy of 98.51% is obtained. In addition, performance measures like precision, sensitivity, specificity, F-score are also evaluated. The model is then deployed on NVIDIA’s Jetson nano board to build a prototype. Our model is effective, promising and outperformed existing state of art techniques.
Volume: 38
Issue: 2
Page: 767-773
Publish at: 2025-05-01

Deep learning-based cryptanalysis in recovering the secret key and plaintext on lightweight cryptography

10.11591/ijeecs.v38.i2.pp1115-1123
Yulia Fatma , Muhammad Akmal Remli , Mohd Saberi Mohamad , Januar Al Amien
The development of machine learning (ML) technologies provide a new development direction for cryptanalysis. Several ML research in the field of cryptanalysis was carried out to identify the cryptographic algorithm used, find out the secret key, and even recover the secret message The first objective of this study is to see how much influence optimization and activation function have on the multi-layer perceptron (MLP) model in performing cryptanalysis. The second research objective, which is to compare the performance of cryptanalysis in recovering keys and the plaintext. Several experiments have been carried out, the observed parameters found that the use of the rectified linear unit (ReLU) activation function and the ADAM optimizer improves the performance of deep learning (DL)-based cryptanalysis as evidenced by a significantly smaller error rate. DL-based cryptanalysis works more effectively in recovering keys than recovering plaintext. DL-based cryptanalysis managed to recover the keys with an average loss of 0.007, an average of 49 epochs, and an average time of 0.178 minutes.
Volume: 38
Issue: 2
Page: 1115-1123
Publish at: 2025-05-01

Word embedding for contextual similarity using cosine similarity

10.11591/ijeecs.v38.i2.pp1170-1180
Yessy Asri , Dwina Kuswardani , Amanda Atika Sari , Atikah Rifdah Ansyari
Perspectives on technology often have similarities in certain contexts, such as information systems and informatics engineering. The source of opinion data comes from the Quora application, with a retrieval limit of the last 5 years. This research aims to implement Indo-bidirectional encoder representations from transformers (BERT), a variant of the BERT model optimized for Indonesian language, in the context of information system (IS) and information technology (IT) topic classification with 414 original data, which, after being augmented using the synonym replacement method, The generated data becomes 828. Data augmentation aims to evaluate the performance of models by using synonyms and rearranging text while maintaining meaning and structure. The approach used is to label the opinion text based on the cosine similarity calculation of the embedding token from the IndoBERT model. Then, the IndoBERT model is applied to classify the reviews. The experimental results show that the approach of using IndoBERT to classify SI and IT topics based on contextual similarity achieves 90% accuracy based on the confusion matrix. These positive results show the great potential of using transformer-based language models, such as IndoBERT, to support the analysis of comments and related topics in Indonesian.
Volume: 38
Issue: 2
Page: 1170-1180
Publish at: 2025-05-01

Implementation of innovative deep learning techniques in smart power systems

10.11591/ijeecs.v38.i2.pp723-731
Odugu Rama Devi , Pavan Kumar Kolluru , Nagul Shaik , Kamparapu V. V. Satya Trinadh Naidu , Chunduri Mohan , Pottasiri Chandra Mohana Rai , Lakshmi Bhukya
The integration of deep learning techniques into smart power systems has gained significant attention due to their potential to optimize energy management, enhance grid reliability, and enable efficient utilization of renewable energy sources. This research article explores the enhanced application of deep learning techniques in smart power systems. It provides an overview of the key challenges faced by traditional power systems and presents various deep learning methodologies that can address these challenges. The results showed that the root mean square errors (RMSE) for the weekend power load forecast were 18.4 for the random forest and 18.2 for the long short-term memory (LSTM) algorithm, while 28.6 was predicted by the support vector machine (SVM) algorithm. The authors' approach provides the most accurate forecast (15.7). After being validated using real-world load data, this technique provides reliable power load predictions even when load oscillations are present. The article also discusses recent advancements, future research directions, and potential benefits of utilizing deep learning techniques in smart power systems.
Volume: 38
Issue: 2
Page: 723-731
Publish at: 2025-05-01

Enhancing SDN security using ensemble-based machine learning approach for DDoS attack detection

10.11591/ijeecs.v38.i2.pp1073-1085
Abdinasir Hirsi , Lukman Audah , Adeb Salh , Mohammed A. Alhartomi , Salman Ahmed
Software-defined networking (SDN) is a groundbreaking technology that transforms traditional network frameworks by separating the control plane from the data plane, thereby enabling flexible and efficient network management. Despite its advantages, SDN introduces vulnerabilities, particularly distributed denial of service (DDoS) attacks. Existing studies have used single, hybrid, and ensemble machine learning (ML) techniques to address attacks, often relying on generated datasets that cannot be tested because of accessibility issues. A major contribution of this study is the creation of a novel, publicly accessible dataset, and benchmarking the proposed approach against existing public datasets to demonstrate its effectiveness. This paper proposes a novel approach that combines ensemble learning models with principal component analysis (PCA) for feature selection. The integration of ensemble learning models enhances predictive performance by leveraging multiple algorithms to improve accuracy and robustness. The results showed that the ensemble of random forests (ENRF) model achieved the highest performance across all metrics with 100% accuracy, precision, recall, and F1-score. This study provides a comprehensive solution to the limitations of existing models by offering superior performance, as evidenced by the comparative analysis, establishing this approach as the best among the evaluated models.
Volume: 38
Issue: 2
Page: 1073-1085
Publish at: 2025-05-01

Enhanced vegetation encroachment detection along power transmission corridors using random forest algorithm

10.11591/ijeecs.v38.i2.pp1376-1382
Deepa Somasundaram , Nivetha Sivaraj , Shalinirajan Shalinirajan , Santhi Karuppiah , Sudha Rajendran
Vegetation encroachment along power transmission corridors poses significant risks to infrastructure safety and reliability, necessitating effective monitoring and management strategies. This study introduces an innovative methodology for detecting vegetation encroachment using a combination of manual and automatic processes integrated with the random forest algorithm. The issue of vegetation encroachment is critical as it can lead to power interruptions and safety hazards if not addressed promptly. The objective of this research is to develop a scalable and cost-effective solution for vegetation management in power infrastructure maintenance. The methodology involves manual patch extraction and labeling to ensure the accuracy of the training dataset, combined with automatic feature extraction techniques to capture relevant information from satellite imagery. Leveraging the random forest algorithm, the model constructs an ensemble of decision trees based on the extracted features, achieving robust classification accuracy. Findings from this study demonstrate that the proposed approach enables consistent and timely identification of vegetation encroachment in new satellite imagery. Stored model parameters facilitate efficient testing, enhancing the system's ability to provide proactive interventions. This scalable solution significantly reduces reliance on manual labor and offers a cost-effective method for continuous monitoring, ultimately contributing to the resilience and safety of power transmission infrastructure.
Volume: 38
Issue: 2
Page: 1376-1382
Publish at: 2025-05-01

Optimal land distribution for ambiguous profit vegetable crops using multi-objective fuzzy linear programming

10.11591/ijeecs.v38.i2.pp1162-1169
Pranav Dixit , Sohan Lal Tyagi
Decisions in agriculture had been driven by methodical planning to increase yields to cater to the needs of overwhelming populations while also allowing farmers to prosper. Allocating land to various crops by making use of limited resources is becoming a crucial challenge for achieving higher profits. To make cropping pattern decisions, farmers traditionally rely on experience, instinct, and comparisons with their neighbors. Since profit varies depending on many factors, intuition and experience usually cannot guarantee optimal (maximum) profits. A number of research studies on linear programming (LP) have shown optimum cropping patterns when crop prices (profits) are fixed. Vegetable crops, also known as cash crops, are subject to a high degree of price volatility owing to the fact that their production is costly and they carry a significant risk of not being profitable, despite the fact that they provide higher earnings than food crops. The net returns of crops in agriculture are greatly impacted by price uncertainty. With the use of the optimization tool TORA, a step-by-step process is shown in this paper to solve the model and manage the volatility in vegetable crop profitability using fuzzy multi-objective linear programming (FMOLP).
Volume: 38
Issue: 2
Page: 1162-1169
Publish at: 2025-05-01

A novel mobile application for personality assessment based on the five-factor model and graphology

10.11591/ijeecs.v38.i2.pp915-927
Ahmed Remaida , Zineb Sabri , Benyoussef Abdellaoui , Chakir Fri , Yassine Lakhchaf , Younès El Bouzekri El Idrissi , Mohammed Amine Lafraxo , Aniss Moumen
With the rising interest over the last decade, automated graphology has emerged as a promising filed of research, providing new insights on personality traits prediction on the basis of handwriting analysis. Although, few practical solutions to automate the extraction of handwriting features and personality prediction exist in the literature. This work aims to contribute to closing the gap in automated handwriting personality prediction by proposing a novel mobile application that uses robust feature extraction and machine learning models to predict big five personality traits. Our findings, based on high correlations between handwriting characteristics and personality traits, revealed convincing links. Notably, extraversion and extraversion have strong correlations with top margin feature, whereas agreeableness is expressed through line spacing. These findings emphasize the ability of automated graphology to properly interpret individual personalities. The proposed system achieved exceptional accuracy by using well known machine learning classifiers. The testing accuracy exceeded 92% in binary classification and 87% in multi-class case scenario, proving the adaptability and dependability of the system’s architecture. Our Android app promises to provide users with unprecedented insights into their personalities, establishing a robust tool for psychological assessment and self-discovery.
Volume: 38
Issue: 2
Page: 915-927
Publish at: 2025-05-01

The integration of metaverse technology in healthcare: a comprehensive review and future research directions

10.11591/ijeecs.v38.i2.pp975-987
Rita Roy , Tarinmoy Das , Dimitrios Alexios Karras
The impact of using the metaverse in healthcare is investigated in this research work. Emerging technologies are essential to enhancing medical consultants’ care, especially in developing countries like India. The study filters and reviews the pertinent literature using the scientific procedures and rationales for systematic literature reviews (SPAR-4-SLR) methodology. The initial search yielded 180 articles. Forty-four articles were considered for the study after screening the papers in light of the research questions and relevant literature. The theory-context-characteristics-methodology (TCCM) framework is used in this study to assess future metaverse research trends. This study also used the context, intervention, mechanism, and outcome (CIMO) logic for planning and decision-making. This study examines the development of metaverse research over the past ten years and supports research findings published in peer-reviewed journals. Based on the TCCM framework, recommendations have been made for additional research.
Volume: 38
Issue: 2
Page: 975-987
Publish at: 2025-05-01

Accurate segmentation of fruit based on deep learning

10.11591/ijeecs.v38.i2.pp1331-1338
Esraa Abu Elsoud , Omar Alidmat , Suhaila Abuowaida , Esraa Alhenawi , Nawaf Alshdaifat , Ahmad Aburomman , Huah Yong Chan
In the last few years, deep learning has exhibited its efficacy and capacity in the field of computer vision owing to its exceptional precision and widespread acceptance. The primary objective of this study is to investigate an improved approach for segmentation in the context of various fruit categories. Despite the utilization of deep learning, the current segmentation techniques for various fruit items exhibit subpar performance. The proposed enhanced multiple fruit segmentation algorithm has the following main steps: 1) modifying the size of the filter, 2) the process of optimizing the ResNet-101 block involves selecting the most suitable count of repetitions. The multiple fruit dataset is split 80% in the training stage and 20% in the testing stage. These images were utilized to train a deep learning (DL) based algorithm, which aims to identify multiple fruit items within images accurately. The proposed algorithm has a lower training time compared to the other algorithms. The thresholds exhibit greater values compared to the thresholds of state-of-the-art algorithms.
Volume: 38
Issue: 2
Page: 1331-1338
Publish at: 2025-05-01

Chebyshev distance-embedded twin support vector machine for skewed classification problems

10.11591/ijeecs.v38.i2.pp1383-1391
Sai Lakshmi Balasubramanian , Gajendran Ganesan
Support vector machine (SVM) is a pivotal classification algorithm, and its evolutionary counterpart, the twin SVM (TWSVM), has gained acclaim for its advanced generalization capabilities, particularly in handling imbalanced data. TWSVMs achieve swift training by explicitly exploring a pair of non-parallel hyperplanes, yet selecting numerical values for hyperparameters poses a challenge due to the uncertainty introduced by random preferences. This paper presents a novel approach, the Chebyshev distance-based TWSVM, specifically designed for hyperparameter tuning in imbalanced binary classification. This innovative model mitigates the uncertainty of hyperparameter selection by leveraging Chebyshev distance, thereby enhancing the generalization capabilities of the TWSVM. To evaluate its efficacy, computational tests were conducted on publicly accessible real-world benchmark datasets across various domains, including non-linear cases. The results demonstrate that the Chebyshev distance-based TWSVM outperforms several existing methods, achieving superior performance with reduced computational time and setting a new benchmark in the field.
Volume: 38
Issue: 2
Page: 1383-1391
Publish at: 2025-05-01
Show 210 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration