Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Automatic vehicle accident detection and alerting notification using internet of things

10.11591/ijict.v14i1.pp315-324
Vijay Savani , Viranchi Pandya , Dhairya Senghani , Shreya Nahta , Risheen Agrawal
Immigrants in developing countries have indirectly encouraged increased automobile use, leading to a strong association between automobile accidents and their victims. However, recent technological developments, especially artificial intelligence and electronics, seem promising in overcoming these risks. This research paper focuses on complex systems developed using internet of things (IoT) technology. The system integrates various components such as micro controller, radio frequency identification (RFID) card reader for license validation, liquid crystal display (LCD), Ultrasonic sensor for interference, measuring device and global positioning system (GPS) unit. Additionally, the system has a simple mail transfer protocol (SMTP) server that can send timely email alerts to emergency responds and log email addresses for real-time emergency detection. This facilitates rapid response and emergency rescue, thereby reduces the risk of accidents and increases overall safety.
Volume: 14
Issue: 1
Page: 315-324
Publish at: 2025-04-01

Enhancing credit card security using RSA encryption and tokenization: a multi-module approach

10.11591/ijict.v14i1.pp132-140
Mainak Saha , M. Trinath Basu , Arpita Gupta , K. Ashrith , Chevella Vamshi Vardhan Reddy , Shashanth Reddy , Rohith Reddy
The security of credit card information remains a critical challenge, with existing methods often falling short in safeguarding data integrity, confidentiality, and privacy. Traditional approaches frequently transmit sensitive information in unencrypted formats, exposing it to significant risks of unauthorized access and breaches. This study introduces a robust security framework that leverages Rivest-Shamir-Adleman (RSA) encryption and tokenization to protect credit card information during transactions. The proposed solution is structured into three key modules: merchant, tokenization, and token vault. The merchant module works in tandem with the tokenization module to generate transaction validation tokens and securely transmit credit card data. The token vault, maintained on a secure cloud storage platform, acts as a restricted-access database, ensuring that sensitive information is encrypted and inaccessible to unauthorized entities. Through this multi-layered approach, the study demonstrates a significant enhancement in the security of credit card transactions, effectively mitigating the risks of data breaches and unauthorized disclosures. The findings indicate that the proposed method not only addresses existing security vulnerabilities but also offers a scalable and efficient solution for protecting financial transactions.
Volume: 14
Issue: 1
Page: 132-140
Publish at: 2025-04-01

Hybrid model detection and classification of lung cancer

10.11591/ijai.v14.i2.pp1496-1506
Rami Yousuf , Eman Yaser Daraghmi
Lung cancer ranks among the most prevalent malignancies worldwide. Early detection is pivotal to improving treatment outcomes for various cancer types. The integration of artificial intelligence (AI) into image processing, coupled with the availability of comprehensive historical lung cancer datasets, provides the chance to create a classification model based on deep learning, thus improving the precision and effectiveness of detecting lung cancer. This not only aids laboratory teams but also contributes to reducing the time to diagnosis and associated costs. Consequently, early detection serves to conserve resources and, more significantly, human lives. This study proposes convolutional neural network (CNN) models and transfer learning-based architectures, including ResNet50, VGG19, DenseNet169, and InceptionV3, for lung cancer classification. An ensemble approach is used to enhance overall cancer detection performance. The proposed ensemble model, composed of five effective models, achieves an F1-score of 97.77% and an accuracy rate of 97.5% on the IQ-OTH/NCCD test dataset. These findings highlight the effectiveness and dependability of our novel model in automating the classification of lung cancer, outperforming prior research efforts, streamlining diagnosis processes, and ultimately contributing to the preservation of patients' lives.
Volume: 14
Issue: 2
Page: 1496-1506
Publish at: 2025-04-01

High-bandwidth millimetre wave multiple-input multiple-output antenna for 38 GHz 5G mobile applications

10.12928/telkomnika.v23i2.26491
Md. Ashraful; Daffodil International University Haque , Md. Kawsar; Daffodil International University Ahmed , Narinderjit Singh; INTI International University Sawaran Singh , Md. Afzalur; Universiti Kebangsaan Malaysia (UKM) Rahman , Md. Sharif; Daffodil International University Ahammed , Redwan; Daffodil International University A. Ananta , Kamal; Daffodil International University Hossain Nahin , Jamal; Daffodil International University Hossain Nirob , Liton; Pabna University of Science and Technology Chandra Paul
This study assesses the efficacy of an industrial and innovation antenna by scrutinizing its performance using simulations and an equivalent resistor, inductor, and capacitor (RLC) circuit model. By utilizing computer simulation technology (CST) modeling techniques, the antenna’s small dimensions of 37.75×31.75 mm2 are considered concerning the minimum frequency. The antenna functions at a frequency of 38 GHz, with a bandwidth of 11 GHz. It has a maximum gain of 8.875 dB and demonstrates excellent isolation (-27.627 dB) and efficiency (98.859%), respectively. By designing and simulating a comparable RLC circuit in advanced design system (ADS), we have confirmed the accuracy and reliability of the data acquired via CST. Both CST and ADS simulators yielded similar reflection coefficients. This antenna is a superb option for the 38 GHz frequency range in 5G wireless communication.
Volume: 23
Issue: 2
Page: 283-294
Publish at: 2025-04-01

Integrating deep learning and optimization algorithms to forecast real-time stock prices for intraday traders

10.11591/ijece.v15i2.pp2254-2263
Nilesh B. Korade , Mahendra B. Salunke , Amol Bhosle , Dhanashri Joshi , Kavita Patil , Sunil M. Sangve , Rushali A. Deshmukh , Aparna S. Patil
The number of stock investors is steadily increasing due to factors such as the availability of high-speed internet, smart trading platforms, lower trading commissions, and the perception that trading is an effective way of earning extra income to enhance financial stability. Accurate forecasting is crucial to earning profits in the stock market, as it allows traders to anticipate price changes and make strategic investments. The traders must skillfully negotiate short-term market changes to maximize gains and minimize losses, as intraday profit mostly depends on the timing of buy and sell decisions. In the presented work, we provide minute-by-minute forecasts that assist intraday traders in making the best decisions on when to buy and sell, consequently maximizing profits on each trade they make. We have implemented a one-dimensional convolutional neural network and bidirectional long-short-term memory (1DCNN-BiLSTM) optimized with particle swarm optimizer (PSO) to forecast the value of stocks for each minute using real-time data extracted from Yahoo Finance. The proposed method is evaluated against state-of-the-art technology, and the results demonstrate its strong potential to accurately forecast the opening price, stock movement, and price for the next timeframe. This provides valuable insights for intraday traders to make informed buy or sell decisions.
Volume: 15
Issue: 2
Page: 2254-2263
Publish at: 2025-04-01

Interactive communication human-robot interface for reduced mobility people assistance

10.11591/ijai.v14.i2.pp917-924
Robinson Jiménez Moreno , Anny Astrid Espitia Cubillos , Esperanza Rodríguez Carmona
Communication between a robot and its user is essential for the execution of tasks, even more so in a scenario where the robot is designed to assist people with reduced mobility. This document presents the evaluation of a conversation script between a human user and a robot for assistance using pre-recorded responses, for this a methodology with three phases was proposed and applied: establishment of the training scheme of a convolutional network that allows recognize user's words for execution of tasks by the robot, generation of dialogue between the user and possible interactions with the assistive robot and finally, the measurement of perception of interface users. Results show a high level of accuracy with words selected to command the robot, using a convolutional neural network, with an audio input discriminated in its components mel frequency cepstral coefficients (MFCCs) and command sets of male and female voices. It was possible to establish a dialogue model with three scenes to recognize the residential environment, rename spaces and execute action commands to move elements. It is concluded the designed instrument is reliable and the perception of proposed interactive communication interface is good in terms of usability (effectiveness, efficiency, and user satisfaction).
Volume: 14
Issue: 2
Page: 917-924
Publish at: 2025-04-01

Ensemble approach to rumor detection with BERT, GPT, and POS features

10.11591/ijict.v14i1.pp276-286
Barsha Pattanaik , Sourav Mandal , Rudra Mohan Tripathy , Arif Ahmed Sekh
As vast amounts of rumor content are transmitted on social media, it is very challenging to detect them. This study explores an ensemble approach to rumor detection in social media messages, leveraging the strengths of advanced natural language processing (NLP) models. Specifically, we implemented three distinct models: (i) generative pre-trained transformer (GPT) combined with a bidirectional long short-term memory (BiLSTM) network; (ii) a model integrating part-of-speech (POS) tagging with bidirectional encoder representations from transformers (BERT) and BiLSTM, and (iii) a model that merges POS tagging with GPT and BiLSTM. We included additional features from the dataset in all these models. Each model captures different linguistic, syntactical, and contextual features within the text, contributing uniquely to the classification task. To enhance the robustness and accuracy of our predictions, we employed an ensemble method using hard voting. This technique aggregates the predictions from each model, determining the final classification based on the majority vote. Our experimental results demonstrate that the ensemble approach significantly outperforms individual models, achieving superior accuracy in identifying rumors. To determine the performance of our model, we used PHEME and Weibo datasets available publicly. We found our model gave 97.6% and 98.4% accuracy, respectively, on the datasets and has outperformed the state-of-the-art models.
Volume: 14
Issue: 1
Page: 276-286
Publish at: 2025-04-01

Machine learning based stator-winding fault severity detection in induction motors

10.11591/ijeecs.v38.i1.pp182-192
Partha Mishra , Shubhasish Sarkar , Sandip Saha Chowdhury , Santanu Das
Approximately 35% of all induction motor defects are caused by stator inter-turn faults. In this paper a novel algorithm has been proposed to analyze the three-phase stator current signals captured from the motor while it is in operation. The suggested method seeks to identify stator inter-turn short circuit faults in early stage and take the appropriate action to prevent the motor's condition from getting worse. Three-phase current signals have been captured under healthy and faulty conditions of the motor. Involving discrete wavelet transform (DWT) based decomposition followed by reconstruction using inverse DWT (IDWT), 50 Hz fundamental component has been removed from the captured raw current signals. Subsequently, from each phase current 15 statistical parameters have been retrieved. The statistical parameters include mean, standard deviation, skewness, kurtosis, peak-to-peak, root mean square (RMS), energy, crest factor, form factor, impulse factor, and margin factor. At the end, a standard machine learning algorithm namely error correcting output codes-support vector machine (ECOC-SVM) has been employed to classify six different severity of stator winding faults. The proposed fault diagnosis method is load and motor-rating independent.
Volume: 38
Issue: 1
Page: 182-192
Publish at: 2025-04-01

Imposing neural networks and PSO optimization in the quest for optimal ankle-foot orthosis dynamic modelling

10.12928/telkomnika.v23i2.25876
Annisa; Universiti Malaysia Sarawak Jamali , Aida Suriana; Universiti Malaysia Sarawak Abdul Razak , Shahrol; Shibaura Institute of Technology Mohamaddan
Individuals with abnormal walking patterns due to various conditions face significant challenges in daily activities, especially walking. Ankle-foot orthosis (AFO) devices are crucial in providing essential support to their lower limbs. Accurately modeling the dynamic behavior of AFO systems, particularly in predicting ground reaction forces, is a complex yet vital task to ensure their effectiveness. This research develops dynamic models for AFO systems using advanced modeling techniques, employing both parametric and non-parametric approaches. Parametric methods, such as particle swarm optimization (PSO), and non-parametric methods, like multi-layer perceptron (MLP) neural networks, are utilized through system identification methods. According to the findings, the MLP neural network continuously generates objective results and performs exceptionally well in correctly detecting the AFO system, attaining a noticeably lower mean squared prediction error of 0.000011. This research highlights the potential of advanced modeling techniques, particularly MLP neural networks, in enhancing AFO system modeling accuracy. Although parametric techniques like PSO are useful, the MLP approach performs better, offering insightful information about modelling AFO systems and indicating that non-parametric techniques like MLP neural networks have potential to further AFO creation and control.
Volume: 23
Issue: 2
Page: 484-494
Publish at: 2025-04-01

Three-position gearshifts remote control for agricultural tractors

10.12928/telkomnika.v23i2.26666
Thewin; Rajamangala University of Technology Isan Sakunbunyong , Tossapol; Rajamangala University of Technology Isan Jangnoi , Tanawat; Rajamangala University of Technology Isan Chalardsakul , Viroch; Rajamangala University of Technology Isan Sukontanakarn
This research presents the development and evaluation of a three-position gearshifts remote control system for agricultural tractors, designed to improve operational efficiency and reduce operator fatigue. The system utilizes a programmable logic controller to remotely control a linear actuator, enabling seamless gear shifting between three predetermined positions. The primary objective is to provide operators with a convenient, ergonomic alternative to traditional manual gear shifting, particularly in challenging or confined working environments. The system was tested under two conditions: first, with a programmable logic controller controlling the linear actuator via a remote transmitter; second, with the system installed on an actual tractor and tested in a road scenario. Results from both tests demonstrate the system’s effectiveness in enhancing ease of operation, reducing physical strain, and maintaining gearshifts precision. The findings suggest that the remote control system offers significant potential for improving tractor operation, particularly for tasks requiring frequent gear changes or when working in difficult terrain. This research contributes to the ongoing development of automation in agricultural machinery, offering insights into remote control applications and the integration of electromechanical systems in agricultural vehicles.
Volume: 23
Issue: 2
Page: 473-483
Publish at: 2025-04-01

SMOTE tree-based autoencoder multi-stage detection for man-in-the-middle in SCADA

10.11591/ijeecs.v38.i1.pp133-144
Freska Rolansa , Jazi Eko Istiyanto , Afiahayati Afiahayati , Aufaclav Zatu Kusuma Frisky
Security incidents targeting supervisory control and data acquisition (SCADA) infrastructure are increasing, which can lead to disasters such as pipeline fires or even lost of lives. Man-in-the-middle (MITM) attacks represent a significant threat to the security and reliability of SCADA. Detecting MITM attacks on the Modbus SCADA networks is the objective of this work. In addition, this work introduces SMOTE tree-based autoencoder multi-stage detection (STAM) using the Electra dataset. This work proposes a four-stage approach involving data preprocessing, data balancing, an autoencoder, and tree classification for anomaly detection and multi-class classification. In terms of attack identification, the proposed model performs with highest precision, detection rate/recall, and F1 score. In particular, the model achieves an F1 score of 100% for anomaly detection and an F1 score of 99.37% for multi-class classification, which is preeminence to other models. Moreover, the enhanced performance of multi-class classification with STAM on minority attack classes (replay and read) has shown similar characteristics in features and a reduced number of misclassifications in these classes.
Volume: 38
Issue: 1
Page: 133-144
Publish at: 2025-04-01

Improved colored cubes teaching kit in representing and simplifying Boolean logic functions

10.11591/ijece.v15i2.pp1446-1454
Ibrahim Elewah , Sara Jalaleddine , Omar A. Tbeileh , Stavros Yainnakou , Azzam Kamzoul , Sara El-Morhabi , Maria Gergi Tabet , Rania Hafez
This work presents, explains, and discusses a colored variables cubes teaching kit. The cubes teaching kit is designed based on the cubes method that was developed to graphically simplify the Boolean logic functions with three, four, five, and six variables. This renewed method is developed to overcome the limitation of the conventional Karnaugh maps method in terms of simplifying Boolean functions with a maximum of four variables only. Students can use the teaching kit to place each cube in its right position. Based on the label of each cube, students will be able to figure out the function minterm number. After that, the students will sort the cubes to represent the function. Eventually, the students will develop the competency to check the cubes adjacency, and this will lead them to formulate simplified Boolean expressions. Students' engagement is expected to improve when theoretical knowledge is implemented using a three-dimensional physical cube teaching kit. The aim of this work is that both the educators and students, in engineering and engineering technology programs, can benefit from the adaptation and even more from the modification of the proposed approach to facilitate the achievement of their learning objectives.
Volume: 15
Issue: 2
Page: 1446-1454
Publish at: 2025-04-01

Comparison of word embedding features using deep learning in sentiment analysis

10.12928/telkomnika.v23i2.26223
Jasmir; Universitas Dinamika Bangsa Jasmir , Errissya; Universitas Dinamika Bangsa Rasywir , Herti; Universitas Dinamika Bangsa Yani , Agus; Universitas Dinamika Bangsa Nugroho
In this research, we use several deep learning methods with the word embedding feature to see their effect on increasing the evaluation value of classification performance from processing sentiment analysis data. The deep learning methods used are conditional random field (CRF), bidirectional long short term memory (BLSTM) and convolutional neural network (CNN). Our test uses social media data from Netflix application user comments. Through experimentation on different iterations of various deep learning techniques alongside multiple word embedding characteristics, the BLSTM algorithm achieved the most notable accuracy rate of 79.5% prior to integrating word embedding features. On the other hand, the highest accuracy value results when using the word embedding feature can be seen in the BLSTM algorithm which uses the word to vector (Word2Vec) feature with a value of 87.1%. Meanwhile, a very significant change in value increase was obtained from the FastText feature in the CNN algorithm. After all the evaluation processes were carried out, the best classification evaluation results were obtained, namely the BLSTM algorithm with stable values on all word embedding features.
Volume: 23
Issue: 2
Page: 416-425
Publish at: 2025-04-01

A survey on novel approach to semantic computing for domain specific multi-lingual man-machine interaction

10.11591/ijict.v14i1.pp1-10
Anjali Bohra , Nemi Chand Barwar
Natural language processing (NLP) helps computational linguists to understand, process, and extract information from natural languages. Linguist Panini signifies ’information coding’ in a language and explains that Karakas are semanticosyntactic relations between nouns and verbs that resemble participant roles of modern case grammar. Computational grammar maps vibhakti (inflections) of nominals and verbs to their participant roles. Karaka’s theory extracts semantic roles in the sentences which act as intermediate steps for various NLP tasks. The survey shows that NLP seeks to bridge the gap for man-machine interaction. The work presents the impact of machine learning on natural language processing with changing trends from traditional to modern scenarios with Panini’s classification scheme for semantic computing facilitating machine understanding. The study presents the significance of Karaka for semantic computing, methodologies for extracting semantic roles, and analysis of various deep learning-based language processing systems for applications like question answering. The survey covered around 50 research articles and 21 Karaka-based NLP systems performing multiple tasks like machine translation, question-answering systems, and text summaries using machine learning tools and frameworks. The work includes surveys from renowned journals, books, and relevant conferences, as well as descriptions of the latest trends and technologies in the machine learning domain.
Volume: 14
Issue: 1
Page: 1-10
Publish at: 2025-04-01

Memory management of firewall filtering rules using modified tree rule approach

10.11591/ijict.v14i1.pp141-152
Dhwani Hakani , Palvinder Singh Mann
Firewalls are essential for safety and are used for protecting a great deal of private networks. A firewall’s goal is to examine every incoming and outgoing data before granting access. A notable kind of conventional firewall is the rule-based firewall. However, when it comes to job performance, traditional listed-rule firewalls are limited, and they become useless when utilized with some networks that have extremely big firewall rule sets. This study proposes a model firewall architecture called “TreeRule Firewall,” which has benefits and functions effectively in large-scale networks like “cloud.” In order to improve cloud network security, this study suggests a modified tree rule firewall (MTRF cloud) that eliminates rule discrepancies. For the matching firewall policy, this work creates a tree rule firewall. There are no duplicate rules created by the proposed improved tree rule firewall. Also, memory utilization of different size rules is compared.
Volume: 14
Issue: 1
Page: 141-152
Publish at: 2025-04-01
Show 230 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration