Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Multi-robot architecture based on hybridized blockchain model

10.11591/ijece.v15i2.pp1511-1520
Rahul Harish Kumar , Gopalakrishnan Muthu Subramanian , Sahana Bailuguttu
Multi-robot systems (MRS) are groups of robots that coordinate to complete a given task. In communication-based systems, the integrity of the information shared between robots becomes highly important as any security threat due to a malicious node in the system can cause a chain reaction to compromise the entire system. This paper proposes a hybridized blockchain model-based architecture (HBMA) built on robot operating system (ROS) which offers a semi-decentralized environment into which any communication-based algorithm can be plugged in. A security monitoring system is also provided with the architecture that identifies and shuts down malicious robots while also sending out alerts about the threat. This architecture is used to create secured, coupled approaches to localization of multi-robots and multi-robot path planning. This approach is validated on both physical robots and simulations run on ROS.
Volume: 15
Issue: 2
Page: 1511-1520
Publish at: 2025-04-01

Cost-effective IoT-based automated vehicle headlight control system: design and implementation

10.11591/ijict.v14i1.pp325-333
Momotaz Begum , Nayeem Ullah , Mehedi Hasan Shuvo , Towhidul Islam , Thofazzol Hossen , Jia Uddin
The current world would be difficult without vehicles, which offer vital advantages for social connectivity, mobility, and technical advancement. Though motor vehicles provide benefits to passenger transportation, they also present certain challenges in their use. A major issue is nighttime traffic accidents caused by headlamps from automobiles traveling in reverse directions, that's why there is a high probability of accidents due to the glare on the driver's eyes. The phrase "Troxler effect" refers to an unexpected glare that a motorist recognizes. In this paper, we will provide an optimal solution to this challenge/Troxler effect. The primary objective of this paper is to design an internet of things (IoT)-based smart headlight control model. Our system introduced a cost-effective vehicle’s headlights controlled by light detection. According to this paper, a vehicle’s headlights are automatically rotated down when the sensor detects lights from the opposite direction of the vehicle headlights. We tried to reduce the road accident rate with our proposed system. This type of technology will prove useful in the motor vehicle sector and offer an innovative approach that ensures driver safety as well as increasing economic development.
Volume: 14
Issue: 1
Page: 325-333
Publish at: 2025-04-01

Automated tomato leaf disease recognition using deep convolutional networks

10.11591/ijece.v15i2.pp1850-1860
Amir Sohel , Md Mizanur Rahman , Md Umaid Hasan , MD Kafiul Islam , Lamia Rukhsara , Tapasy Rabeya
Agriculture is essential for the entire global population. An advanced, robust, and empirically sound agriculture sector is essential for nourishing the global population. Various leaf diseases cause financial hardships for farmers and related businesses. Early identification of foliar diseases in crops would greatly help farmers, leading to a substantial increase in agricultural productivity. The tomato is a widely recognized and nourishing food that is easily accessible and highly favored by farmers. Early diagnosis of tomato leaf diseases is crucial to maximize tomato crop production. This study aims to utilize a deep learning approach to accurately detect and classify damaged leaves and disease patterns in tomato leaf images. By employing a substantial quantity of deep convolutional network models, we achieved a high level of precision in diagnosing the condition. The dataset used in our study work is a self-contained dataset obtained by direct observation of tomato fields in rural areas of Bangladesh. It consists of four classes: healthy, black mold, grey mold, and powdery mildew. In this study work, we utilized various image pre-processing techniques and applied VGG16, InceptionV3, DenseNet121, and AlexNet models. Our results showed that the DenseNet121 model attained the higher accuracy of 97%. This discovery guarantees accurate detection of tomato diseases in a rapid manner, ushering in a new agricultural revolution.
Volume: 15
Issue: 2
Page: 1850-1860
Publish at: 2025-04-01

Three-position gearshifts remote control for agricultural tractors

10.12928/telkomnika.v23i2.26666
Thewin; Rajamangala University of Technology Isan Sakunbunyong , Tossapol; Rajamangala University of Technology Isan Jangnoi , Tanawat; Rajamangala University of Technology Isan Chalardsakul , Viroch; Rajamangala University of Technology Isan Sukontanakarn
This research presents the development and evaluation of a three-position gearshifts remote control system for agricultural tractors, designed to improve operational efficiency and reduce operator fatigue. The system utilizes a programmable logic controller to remotely control a linear actuator, enabling seamless gear shifting between three predetermined positions. The primary objective is to provide operators with a convenient, ergonomic alternative to traditional manual gear shifting, particularly in challenging or confined working environments. The system was tested under two conditions: first, with a programmable logic controller controlling the linear actuator via a remote transmitter; second, with the system installed on an actual tractor and tested in a road scenario. Results from both tests demonstrate the system’s effectiveness in enhancing ease of operation, reducing physical strain, and maintaining gearshifts precision. The findings suggest that the remote control system offers significant potential for improving tractor operation, particularly for tasks requiring frequent gear changes or when working in difficult terrain. This research contributes to the ongoing development of automation in agricultural machinery, offering insights into remote control applications and the integration of electromechanical systems in agricultural vehicles.
Volume: 23
Issue: 2
Page: 473-483
Publish at: 2025-04-01

G2M weighting: a new approach based on multi-objective assessment data (case study of MOORA method in determining supplier performance evaluation)

10.11591/ijeecs.v38.i1.pp403-416
Nirwana Hendrastuty , Setiawansyah Setiawansyah , M. Ghufroni An’ars , Fitrah Amalia Rahmadianti , Very Hendra Saputra , Miftahur Rahman
Criteria weighting methods in decision support system (DSS) face various challenges and limitations that can affect their accuracy and reliability. One of the main challenges is subjectivity, this subjective assessment can reduce the objectivity and consistency of results. The main objective of the new weighting method grey geometric mean (G2M) weighting is to provide more objective and robust criteria weights under conditions of uncertainty and incomplete data. The new G2M weighting approach has a significant potential impact on the DSS field, it has the potential to generate more effective and efficient decisions, which can improve organizational performance, reduce risk and optimize outcomes. Pearson correlation test results of two sets of rankings generated by DSS methods namely grey relational analysis (GRA), simple additive weighting (SAW), multi-attributive ideal-real comparative analysis (MAIRCA), weighted product (WP), combined compromise solution (COCOSO), vlsekriterijumska optimizacija i kompromisno resenje (VIKOR), and a new additive ratio assessment (ARAS) that there is a strong positive correlation between the two methods using G2M weighting criteria. The high correlation value indicates that the rankings of the methods used tend to move together, giving confidence in the consistency and validity of the resulting ranking results. This gives confidence that both methods can be used simultaneously or interchangeably with consistent results. The use of G2M weighting in the DSS method used can support better decision-making by providing consistent information and validity of ranking results.
Volume: 38
Issue: 1
Page: 403-416
Publish at: 2025-04-01

An efficient frequent itemsets finding in distributed datasets with minimum communication overhead

10.11591/ijeecs.v38.i1.pp496-507
Houda Essalmi , Anass El Affar
Finding frequent itemsets is an essential researched technique and a challenging task of data mining. Traditional approaches for distributed frequent itemsets require massive communication overhead among different distributed datasets. In this paper, we adopt a new strategy for optimizing the time of communications/synchronizations from large datasets and, we present a novel algorithm for discovering frequent itemsets in different distributed datasets on the slave sites called finding efficient distributed frequent itemsets (FEDFI). The proposed algorithm is capable of generating the important frequent itemsets by applying an efficient technique for pruning the candidate itemsets. The experimental results confirm that our algorithm FEDFI performs better than Apriori and candidate distribution (CD) algorithms in terms of communication and computation costs.
Volume: 38
Issue: 1
Page: 496-507
Publish at: 2025-04-01

Model of semiconductor converters for the simulation of an asymmetric loads in an autonomous power supply system

10.11591/ijece.v15i2.pp1332-1347
Saidjon Tavarov , Mihail Senyuk , Murodbek Safaraliev , Sergey Kokin , Alexander Tavlintsev , Andrey Svyatykh
This article is devoted to the development of computer model with semiconductor converters for the simulation of asymmetric loads allowing to solve the voltage symmetry problems under asymmetric loads (active and active-inductive) for isolated electric networks with renewable energy sources (mini hydroelectric power plants). A model of a symmetry device has been developed in the MATLAB/Simulink environment based on a proportional-integral controller and a relay controller - P. The effectiveness of their use depends on the load's nature. The implementation of a voltage converter is presented considering a three-phase inverter with discrete key switching at 120, 150, and 180 degrees with a purely active load. Based on the harmonic analysis of the three-phase voltage at discrete conversion, the value of the first harmonic is determined. Voltage transformations under active-inductive load at 120, 150, and 180 degrees are mathematically described. To determine the harmonic spectrum, an analysis of the fast Fourier transform for the three-phase voltage of a MATLAB/Simulink semiconductor converter was carried out. It is established that the alternating current output voltage is generated on the output side of the inverter of a three-phase voltage source through a three-phase load connected by a star with a harmonic suppression method.
Volume: 15
Issue: 2
Page: 1332-1347
Publish at: 2025-04-01

Efficient blockchain based solution for secure medical record management

10.11591/ijict.v14i1.pp59-67
Debani Prasad Mishra , B Rajeev , Soubhagya Ranjan Mallick , Rakesh Kumar Lenka , Surender Reddy Salkuti
Electronic medical records (EMRs) have become a key player in the healthcare ecosystem contributing to the assessment of ailments, the choice of the treatment avenue, and the delivery of services. However, there is consideration of EMR storage whereby centralized storage leads to increased security and privacy issues in the patient’s record. In this paper, we proposed a blockchain and interplanetary file system (IPFS) based prototype model for EMR management. It provides a smart contract-enabled decentralized storage platform where healthcare data security, availability, and access management are prioritized. This model also employs cryptographic techniques to protect sensitive healthcare data. Finally, the model is evaluated in a realistic scenario. The experimental results demonstrate that compared to the current systems, the proposed prototype model outperforms them in terms of efficiency, privacy, and security.
Volume: 14
Issue: 1
Page: 59-67
Publish at: 2025-04-01

Conceptualization of IoT architectures

10.11591/ijict.v14i1.pp334-346
Gaetanino Paolone , Romolo Paesani , Jacopo Camplone , Andrea Piazza , Paolino Di Felice
Although there is a large interest about internet of things (IoT) architectures, still there is no consensus on their conceptualization in the extant literature. This lack of information in conceptualization is problematic because it hampers the deep understanding of the appeared proposals, as well as the adoption of a shared workflow by the involved architects of these systems. Thus, a concise and agreed-upon conceptualization of IoT architectures is called for. This paper aims at giving a contribution on the topic. We start by reviewing the available standards, then, in light of their suggestions, a workflow to be followed in the definition of the architecture descriptions (ADs) of IoT systems is detailed and, in addition, a sample case study, which implements that workflow, is proposed. The contributions are sufficiently abstract to be applicable also to the description of the architecture of artificial intelligence of things (AIoT) systems.
Volume: 14
Issue: 1
Page: 334-346
Publish at: 2025-04-01

Predictive model for converting leads into repeat order customer using machine learning

10.11591/ijict.v14i1.pp20-30
Deryan Everestha Maured , Gede Putra Kusuma
In the competitive business landscape, customer relationship management (CRM) is pivotal for managing customer relationships. Lead generation and customer retention are critical aspects of CRM as they contribute to sustaining business growth and profitability. Also, identifying and converting leads into repeat customers is essential for optimizing revenue and minimizing promotional costs. This study focuses on developing a predictive model using machine learning techniques to convert leads into repeat order customers in conventional businesses. Leveraging data from a motorcycle distribution company in Jakarta and Tangerang, the study compares the performance of various models for predicting repeat orders. This includes individual models like DeepFM, random forest, and gradient boosting decision tree models. Additionally, it explores the effectiveness of stacking these models using logistic regression as a meta-learner. Furthermore, the study implements backward feature elimination for feature selection and hyperband for hyperparameter tuning to enhance model performance. The results indicate that Stacking model using base model default configuration stands out as the most robust, achieving the highest scores in accuracy (0.95), area under the curve receiver-operating characteristic curve (AUC-ROC) (0.67), log loss (0.19), weighted average precision (0.95), weighted average recall (0.95), and weighted average F1- score (0.92), effectively handling the imbalanced dataset.
Volume: 14
Issue: 1
Page: 20-30
Publish at: 2025-04-01

Boosting industrial internet of things intrusion detection: leveraging machine learning and feature selection techniques

10.11591/ijai.v14.i2.pp1232-1241
Lahcen Idouglid , Said Tkatek , Khalid Elfayq
The rapid integration of industrial internet of things (IIoT) technologies into Industry 4.0 has revolutionized industrial efficiency and automation, but it has also exposed critical vulnerabilities to cyber threats. This paper delves into a comprehensive evaluation of machine learning (ML) classifiers for detecting anomalies in IIoT environments. By strategically applying feature selection techniques, we demonstrate significant enhancements in both the accuracy and efficiency of these classifiers. Our findings reveal that feature selection not only boosts detection rates but also minimizes computational demands, making it a cornerstone for developing resilient intrusion detection systems (IDS) tailored for Industry 4.0. The insights garnered from this study pave the way for deploying more robust security frameworks, safeguarding the integrity and reliability of IIoT infrastructures in modern industrial settings.
Volume: 14
Issue: 2
Page: 1232-1241
Publish at: 2025-04-01

Flexible hybrid graphene-based NFC tag antenna for temperature monitoring application

10.11591/ijeecs.v38.i1.pp227-242
Najwa Mohd Faudzi , Ahmad Rashidy Razali , Asrulnizam Abd Manaf , Nurul Huda Abd Rahman , Ahmad Azlan Ab Aziz , Syed Muhammad Hafiz , Suraya Sulaiman , Nora’zah Abdul Rashid , Amirudin Ibrahim , Aiza Mahyuni Mozi
A hybrid graphene-based material, composed of reduced graphene oxide (rGO) and silver nanoparticle (AgNP), has been proposed for a near field communication (NFC) tag antenna with an integrated, flexible temperature monitoring circuit. The limited availability of high-conductivity graphene-based materials in the market has restricted the use of graphene in NFC tag applications. Therefore, this paper proposes a hybrid graphene-based composition featuring a high conductivity of 3.95×106 S/m. The feasibility of this material for NFC tags had not been validated previously, which is the main motivation for this research. The synthesis of the materials, along with the design, fabrication, and characterization of the NFC tag, is also presented. Results show that the inkjet-printed tag achieves a good reading range of up to 3 cm and demonstrates robustness against bending from 60⁰ to 190⁰, maintaining a maximum reading range of 1.3 cm. Performance on various materials, such as plastic, paper, and carton, also shows minimal impact on frequency shifting. Additionally, the graphene-based NFC tag integrates well with the temperature circuit, effectively monitoring temperatures in the 20-60 ⁰C range in real-time. This makes the developed tag suitable for applications such as food safety monitoring systems through NFC-integrated packaging.
Volume: 38
Issue: 1
Page: 227-242
Publish at: 2025-04-01

Tree-based models and hyperparameter optimization for assessing employee performance

10.11591/ijeecs.v38.i1.pp569-577
Rendra Gustriansyah , Shinta Puspasari , Ahmad Sanmorino , Nazori Suhandi , Dewi Sartika
The Palembang city fire and rescue service (FRS) is encountering challenges in adhering to national standards for fire response time. Hence, the Palembang city FRS is committed to enhancing employee performance through quarterly performance assessments based on various criteria such as attendance, work targets, behavior, education, and performance reports. This study proposes tree-based models in machine learning (ML) and hyperparameter optimization to assess the performance of Palembang city FRS employees. Tree-based models encompass decision trees (DT), random forests (RF), and extreme gradient boosting (XGB). The predictive performance of each model was evaluated using the confusion matrix (CM), the area under the receiver operating characteristic (AUROC), and the kappa coefficient (KC). The results indicate that RF performs better than DT and XGB in the sensitivity, AUROC, and KC metrics by 1.0000, 0.9874, and 0.8584, respectively.
Volume: 38
Issue: 1
Page: 569-577
Publish at: 2025-04-01

Secure financial application using homomorphic encryption

10.11591/ijeecs.v38.i1.pp595-602
Vijaykumar Bidve , Aruna Pavate , Rahul Raut , Shailesh Kediya , Pakiriswamy Sarasu , Koteswara Rao Anne , Aryani Gangadhara , Ashfaq Shaikh
In today’s digital age, the security and privacy of financial transactions are paramount. With the advent of technologies like homomorphic encryption, it is now possible to perform computations on encrypted data without the need to decrypt it first, offering a promising avenue for secure financial applications. This research paper explores the implementation and implications of utilizing homomorphic encryption in financial applications to safeguard sensitive data while maintaining computational integrity. By employing homomorphic encryption techniques, financial institutions can enhance the confidentiality of their clients’ information, protect against data breaches, and enable secure computations on encrypted data. The paper discusses the principles of homomorphic encryption, its applications in financial systems, challenges, and potential solutions. Additionally, it examines real-world examples and case studies where homomorphic encryption has been employed successfully, highlighting its effectiveness in ensuring the privacy and security of financial transactions. Overall, this paper aims to provide insights into the role of homomorphic encryption in creating secure financial applications and its potential to revolutionize the way sensitive financial data is handled and processed.
Volume: 38
Issue: 1
Page: 595-602
Publish at: 2025-04-01

Real time hand gesture detection by using convolutional neural network for in-vehicle infortainment systems

10.11591/ijict.v14i1.pp42-49
Wan Mohd Yaakob Wan Bejuri , Siti Azira Asmai , Raja Rina Raja Ikram , Nur Raidah Rahim , Najwan Khambari , Mohd Sanusi Azmi , Yus Sholva
Nowadays, a variety of technologies on autonomous vehicles have been extensively developed, including in-vehicle infotainment (IVI). It have been noted as one of the key services in the automobile industry. In the near future, people will be able to watch some virtual reality (VR) movies through the streaming service provided in the vehicle. However, a person sometime not tend to be joy while watching espcially when the remote controller or audio sensory controller lack of battery or too far from IVI panel. Thus, the purpose of this research is to design a scheme of real time hand gesture detection for in-vehicle infotainment system, in order to create human computer experience. In this research, the image of human palm hand will be taken by using camera for recognize the hand gesture action. This proposed scheme will recognize human gesture and convert to be computer intruction, that can be understood by IVI device. As a result, it show our proposed scheme can be the most consistent in term of accuracy and loss compared to others method. Overall, this research represents a significant step toward improving better user experience. Furthermore, the proposed scheme is anticipated to contribute significantly to the IVI field, benefiting both academia and societal outcomes.
Volume: 14
Issue: 1
Page: 42-49
Publish at: 2025-04-01
Show 223 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration