Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Data analysis and visualization on titanic and student’s performance datasets-an exploratory study

10.11591/ijict.v14i1.pp68-76
Seong-Cheol Kim , Surender Reddy Salkuti , Alka Manvayalar Suresh , Madhu Sree Sankaran
Exploratory data analysis (EDA) is all about exploring the data in order to identify any underlying pattern before you try to use it to make a predictive model. It also plays a major role in the data discovery process as it is used to analyze data and to recapitulate their different characteristics, which is displayed efficiently with the help of data visualization methods. This paper aims to identify errors in the dataset, to understand the existing hidden structure and to identify new ones, to detect points in a dataset that deviate to a greater extent from the collected data (outliers), and also to find any relationship or intersection between the variables and constants. Two datasets are used namely ‘Titanic’ and ‘student’s performance’ to perform data analysis and ‘data visualization’ to depict ‘exploratory data analysis’ which acts as an important set of tools for recognizing a qualitative understanding. The datasets were explored and hence it assisted with identifying patterns, outliers, corrupt data, and discovering the relationship between the fields in the dataset.
Volume: 14
Issue: 1
Page: 68-76
Publish at: 2025-04-01

An model for structured the NoSQL databases based on machine learning classifiers

10.11591/ijict.v14i1.pp229-239
Amine Benmakhlouf
Today, the majority of data generated and processed in organizations is unstructured. NoSQL database management systems perform the management of this data. The problem is that these unstructured databases cannot be analyzed by traditional OLAP analytical treatments. The latter are mainly used in structured relational databases. In order to apply OLAP analyses on NoSQL data, the structuring of this data is essential. In this paper, we propose a model for structuring the data of a document-oriented NoSQL database using machine learning (ML). This method is broken down into three steps, first the vectorization of documents, then the learning via different ML algorithms and finally the classification, which guarantees that documents with the same structure will belong to the same collection. Therefore, the modeling of a data warehouse can be carried out in order to create OLAP cubes. Since the models found by learning allow the parallel computation of the classifier, our approach represents an advantage in terms of speed since we will avoid doubly iterative algorithms, which rely on textual comparisons (TC). A comparative study of the performances is carried out in this work in order to detect the most efficient methods to perform this type of classification.
Volume: 14
Issue: 1
Page: 229-239
Publish at: 2025-04-01

Explainable zero-shot learning and transfer learning for real time Indian healthcare

10.11591/ijict.v14i1.pp91-101
Swati Saigaonkar , Vaibhav Narawade
Clinical note research is globally recognized, but work on real-time data, particularly from India, is still lagging. This study initiated by training models on medical information mart for intensive care (MIMIC) clinical notes, focusing on conditions like chronic kidney disease (CKD), myocardial infarction (MI), and asthma using the structured medical domain bidirectional encoder representations from transformers (SMDBERT) model. Subsequently, these models were applied to an Indian dataset obtained from two hospitals. The key difference between publicly available datasets and real-time data lies in the prevalence of certain diseases. For example, in a real-time setting, tuberculosis may exist, but the MIMIC dataset lacks corresponding clinical notes. Thus, an innovative approach was developed by combining a fine-tuned SMDBERT model with a customized zero-shot learning method to effectively analyze tuberculosis-related clinical notes. Another research gap is the lack of explainability because deep learning (DL) models are inherently black-box. To further strengthen the reliability of the models, local interpretable model-agnostic explanations (LIME) and shapley additive explanations (SHAP) explanations were projected along with narrative explanations which generated explanations in a natural language format. Thus, the research provides a significant contribution with ensemble technique of zero-shot learning and SMDBERT model with an accuracy of 0.92 as against the specialized models like scientific BERT (SCIBERT), biomedical BERT (BIOBERT) and clinical BioBERT.
Volume: 14
Issue: 1
Page: 91-101
Publish at: 2025-04-01

A multi-scale convolutional neural network and discrete wavelet transform based retinal image compression

10.11591/ijeecs.v38.i1.pp243-253
Dalila Chikhaoui , Mohammed Beladgham , Mohamed Benaissa , Abdelmalik Taleb-Ahmed
The different applications of medical images have contributed significantly to the growing amount of image data. As a result, compression techniques become essential to allow real-time transmission and storage within limited network bandwidth and storage space. Deep learning, particularly convolutional neural networks (CNN) have marked rapid advances in many computer vision tasks and have progressively drawn attention for being used in image compression. Therefore, we present a method for compressing retinal images based on deep CNN and discrete wavelet transform (DWT). To further enhance CNN capabilities, multi-scale convolutions are introduced into the network architecture. In this proposed method, multiscale CNNs are used to extract useful features to provide a compact representation at the encoding stage and guarantee a better reconstruction quality of the image at the decoding stage. Based on compression efficiency and reconstructed image quality, a wide range of experiments have been conducted to validate the proposed technique performance compared with popular image compression standards and existing deep learning-based methods. At a compression ratio (CR) of 80, the proposed method achieved an average peak signal-to-noise ratio (PSNR) value of 38.98 dB and 96.8% similarity in terms of multi-scale structural similarity (MS-SSIM), demonstrating its effectiveness.
Volume: 38
Issue: 1
Page: 243-253
Publish at: 2025-04-01

Development of clustering with Bayesian algorithm for optimal route formation in software-defined radio underwater WSN

10.11591/ijeecs.v38.i1.pp254-261
Anoop Sreeraj , Vijayalakshmi P , Velayutham Rajendran
Underwater wireless sensor networks (UWSNs) have recently offered chances to investigate oceans and thus enhance the underwater world. WSNs are imperative for discovering the ocean region. Software-defined networking (SDN) improves flexibility and uses the clustering method to improve lifespan. This article introduces the Development of a clustering process with a Bayesian algorithm (CPBA) for optimal route formation in software-defined radio UWSN. The clustering concept improves energy efficiency; however, cluster head (CH) selection is challenging. The present clustering mechanisms could be more successful in suitably assigning the node's energy. This mechanism utilizes a slap swarm optimization algorithm to pick out the optimal CH by node energy and distance among inter-cluster as well as intra-cluster. In addition, the Bayesian algorithm selects the best forwarder from sender to base station. Thus, enhances efficiency. The simulation results demonstrate that the UWSN improves both the 23% packet forward ratio and 0.014 joule energy. Furthermore, it minimizes the 30% network delay.
Volume: 38
Issue: 1
Page: 254-261
Publish at: 2025-04-01

Enhancing spam detection using Harris Hawks optimization algorithm

10.12928/telkomnika.v23i2.26615
Mosleh; Al-Ahliyya Amman University M. Abualhaj , Sumaya; Al-Ahliyya Amman University Nabil Alkhatib , Ahmad; Al-Ahliyya Amman University Adel Abu-Shareha , Adeeb; Al-Ahliyya Amman University M. Alsaaidah , Mohammed; Universiti Sains Malaysia (USM) Anbar
This paper employs machine learning (ML) algorithms to identify and classify spam emails. The Harris Hawks optimization (HHO) algorithm can detect the crucial features that distinguish spam from ham emails. The HHO algorithm decreased the number of features in the ISCX-URL2016 spam dataset from 72 to 10. Implementing this will enhance the efficiency and cognitive acquisition of the ML algorithms. The decision tree (DT), Naive Bayes (NB), and AdaBoost algorithms are evaluated and contrasted to identify spam emails. The random search algorithm is used to optimize the significant hyperparameters of each algorithm for the specific task of spam identification. All three ML algorithms showed exceptional accuracy in detecting spam emails during the conducted testing. The DT algorithm attained a remarkable accuracy rate of 99.75%. The AdaBoost algorithm ranks second with an incredible accuracy of 99.67%. Finally, the NB algorithm attained an accuracy of 96.30%. The results demonstrate that the HHO algorithm shows promise in recognizing the crucial features of spam emails.
Volume: 23
Issue: 2
Page: 447-454
Publish at: 2025-04-01

A hybrid machine learning approach for improved ponzi scheme detection using advanced feature engineering

10.11591/ijict.v14i1.pp50-58
Fahad Hossain , Mehedi Hasan Shuvo , Jia Uddin
Ponzi schemes deceive investors with promises of high returns, relying on funds from new investors to pay earlier ones, creating a misleading appearance of profitability. These schemes are inherently unsustainable, collapsing when new investments wane, leading to significant financial losses. Many researchers have focused on detecting such schemes, but challenges remain due to their evolving nature. This study proposes a novel hybrid machine-learning approach to enhance Ponzi scheme detection. Initially, we train an XGBoost classifier and extract its features. Meanwhile, we tokenize opcode sequences, train a gated recurrent unit (GRU) model on these sequences, and extract features from the GRU. By concatenating the features from the XGBoost classifier and the GRU, we train a final XGBoost model on this combined feature set. Our methodology, leveraging advanced feature engineering and hybrid modeling, achieves a detection accuracy of 96.57%. This approach demonstrates the efficacy of combining XGBoost and GRU models, along with sophisticated feature engineering, in identifying fraudulent activities in Ethereum smart contracts. The results highlight the potential of this hybrid model to offer more robust and accurate Ponzi scheme detection, addressing the limitations of previous methods.
Volume: 14
Issue: 1
Page: 50-58
Publish at: 2025-04-01

IDCCD: evaluation of deep learning for early detection caries based on ICDAS

10.11591/ijeecs.v38.i1.pp381-392
Rina Putri Noer Fadilah , Rasmi Rikmasari , Saiful Akbar , Arlette Suzy Setiawan
Dental caries is a common oral disease in children, influenced by environmental, psychological, behavioral, and biological factors. The American academy of pediatric dentistry recommends screening from the time the first tooth erupts or at one year of age to prevent caries, which mostly affects children from racial and ethnic minorities. In Indonesia, the 2023 health survey reported a caries prevalence of 84.8% in children aged 5-9 years. This research introduces early caries detection using three deep learning models: faster-RCNN, you only look once (YOLO) V8, and detection transformer (DETR), using Indonesian dental caries characteristic datasets (IDCCD) focused on Indonesian data with international caries detection and assessment system (ICDAS) classification D0 to D6. The results showed that YOLO V8-s and DETR gave good results, with mean average precision (mAP) of 41.8% and 41.3% for intersection over union (IoU) 50, and 24.3% and 26.2% for IoU 50:90. Precision-recall (PR) curves show that both models have high precision at low recall (0 to 0.2), but precision decreases sharply as recall increases. YOLO V8-s showed a slower and more regular decrease in precision, indicating a more stable performance compared to DETR.
Volume: 38
Issue: 1
Page: 381-392
Publish at: 2025-04-01

Enhancing patient navigation and referral through tele-referral system with geographical information systems

10.11591/ijeecs.v38.i1.pp281-291
Winston G. Domingo , Virdi C. Gonzales , Jennifer A. Gamay
A tele-referral system with a geographic information system (GIS) integrates telehealth services with spatial data to enhance healthcare delivery. Resource constraints can significantly impact the effectiveness of a tele-referral system with GIS. Addressing delayed or missed referrals is critical to ensuring timely patient care and improving health outcomes. Implementing a tele-referral system with GIS can significantly enhance healthcare delivery by leveraging spatial data and telehealth technologies to improve access, efficiency, and outcomes. One major issue is the lack of access to specialists, particularly in underprivileged communities. Patients face accessing specialized care due to a cumbersome referral process or long wait times, as well as the lack of patient engagement. The results showed that the GIS-enabled tele-referral system significantly reduced patient waiting times and improved the coordination of care. By incorporating these functionalities and strategies, the tele-referral system with GIS can effectively address issues related to delayed or missed referrals, ensuring timely patient care and improving overall health outcomes. By incorporating these strategies and functionalities, the tele-referral system with GIS can effectively address limited access to specialists, ensuring timely patient care and optimal use of available resources.
Volume: 38
Issue: 1
Page: 281-291
Publish at: 2025-04-01

Enhancing financial cybersecurity via advanced machine learning: analysis, comparison

10.11591/ijai.v14.i2.pp1281-1289
Grace Odette Boussi , Himanshu Gupta , Syed Akhter Hossain
The financial sector is a prime target for cyber-attacks due to the sensitive nature of the data it handles. As the frequency and sophistication of cyber threats continue to rise, implementing effective security measures becomes paramount. In this paper we provide a comprehensive comparison of six prominent machine learning techniques utilized in the financial industry for cyber-attack prevention. The study aims to identify the best-performing model and subsequently compares its performance with a proposed model tailored to the specific challenges faced by financial institutions. This paper looks at using advanced machine learning methods to make cybersecurity stronger for financial institutions. The work explores the deployment of cutting-edge machine learning algorithms - logistic regression, random forest, support vector machines (SVM), K-nearest neighbour (KNN), naïve Bayes, extreme gradient boosting (XGBoost), and deep learning technique (Dense Layer) - to fortify the cybersecurity framework within financial institutions. Through a meticulous analysis and comparative study, we explore the efficacy, scalability, and practical implementation aspects of various machine learning algorithms tailored to address cybersecurity concerns. Additionally, we propose a framework for integrating the most effective machine learning models into existing cybersecurity infrastructure, offering insights into bolstering resilience against evolving cyber threats. In our comparison, XGBoost exhibited outstanding performance with an accuracy of 95%.
Volume: 14
Issue: 2
Page: 1281-1289
Publish at: 2025-04-01

Cost-effective IoT-based automated vehicle headlight control system: design and implementation

10.11591/ijict.v14i1.pp325-333
Momotaz Begum , Nayeem Ullah , Mehedi Hasan Shuvo , Towhidul Islam , Thofazzol Hossen , Jia Uddin
The current world would be difficult without vehicles, which offer vital advantages for social connectivity, mobility, and technical advancement. Though motor vehicles provide benefits to passenger transportation, they also present certain challenges in their use. A major issue is nighttime traffic accidents caused by headlamps from automobiles traveling in reverse directions, that's why there is a high probability of accidents due to the glare on the driver's eyes. The phrase "Troxler effect" refers to an unexpected glare that a motorist recognizes. In this paper, we will provide an optimal solution to this challenge/Troxler effect. The primary objective of this paper is to design an internet of things (IoT)-based smart headlight control model. Our system introduced a cost-effective vehicle’s headlights controlled by light detection. According to this paper, a vehicle’s headlights are automatically rotated down when the sensor detects lights from the opposite direction of the vehicle headlights. We tried to reduce the road accident rate with our proposed system. This type of technology will prove useful in the motor vehicle sector and offer an innovative approach that ensures driver safety as well as increasing economic development.
Volume: 14
Issue: 1
Page: 325-333
Publish at: 2025-04-01

Connected caregiving: investigating mothers in the era of digital access

10.11591/ijict.v14i1.pp347-354
Anissa Saidi , Wong Yee Von , Tirzah Zubeidah Zachariah@ Omar , Lim Seong Pek , Rita Wong Mee Mee , Khoo Kim Leng
Mothers have embraced and utilized digital access for nurturing and personal use to enhance their roles while balancing newfound demands. The Internet has provided mothers access to information on various topics, including pregnancy, childbirth, and infant care. Social media tools and platforms have also provided mothers with a space to connect with other mothers, share experiences, and seek support. This scoping review aims to identify the relationship of the focus skills among mothers in utilizing digital access. Four databases, including Scopus, web of science (WOS), education resources information centre (ERIC), and ScienceDirect, were used in this research, which found 36 articles for eligibility. Only 16 articles are eligible for analysis and reference after the exclusion and inclusion process for data collection. Based on the 16 publications examining mothers’ use of internet access, four essential skills have been identified. These included social, digital, cultural, and problem-solving skills and are acknowledged as being related to digital access mothering. The findings show these skills are offered to mothers through digital access, fostering diverse skill sets, contributing to their empowerment, and supporting sustainable development goal 5: gender equality, aiming to enhance women’s roles and ensure equal opportunities through digital inclusion.
Volume: 14
Issue: 1
Page: 347-354
Publish at: 2025-04-01

Dual-band MIMO antenna for wideband THz communication in future 6G applications

10.12928/telkomnika.v23i2.26553
Jamal; Daffodil International University Hossain Nirob , Kamal; Daffodil International University Hossain Nahin , Md. Ashraful; Daffodil International University Haque , Md. Sharif; Daffodil International University Ahammed , Narinderjit Singh; INTI International University Sawaran Singh , Redwan; Daffodil International University A. Ananta , Md. Kawsar; Daffodil International University Ahmed , Liton; Pabna University of Science and Technology Chandra Paul
This paper presents an industrial and innovation dual-band multiple-input multiple-output (MIMO) antenna designed for terahertz (THz) frequencies to enhance future sixth-generation (6G) communication systems. The antenna utilizes a polyimide substrate with a thickness of 12 µm, a dielectric constant of 3.5 and a tangent loss of 0.0027. Both the patch and the ground plane are constructed from copper, ensuring robust performance. The antenna achieves resonance at 5.45 THz with a gain of 14 dB and a bandwidth of 0.7 THz and at 6.34 THz with a gain of 14.44 dB and a bandwidth of 1.77 THz. Additionally, it demonstrates a minor peak at 7.4 THz and a maximum efficiency of 95.87%. The transmission coefficient shows an isolation of -31.01 dB, indicating excellent separation between antenna elements. Key MIMO performance metrics, containing the envelope correlation coefficient (ECC), diversity gain (DG), mean effective gain (MEG), total active reflection coefficient (TARC), and channel capacity loss (CCL), were analyzed, displaying optimum performance. An analogous circuit was designed and simulated in advanced design system (ADS) to validate these discoveries, creating comparable reflection coefficients to those attained from computer simulation technology (CST) simulations. These findings approve the antenna’s possible for THz-band 6G wireless communication applications.
Volume: 23
Issue: 2
Page: 295-305
Publish at: 2025-04-01

Managing cyber resilience literacy for consumers

10.11591/ijict.v14i1.pp122-131
Tatiana Antipova , Simona Riurean
It seems inevitable that digitalization will have a profound and irreversible impact on our lives, and it seems reasonable to suppose that our world will never be the same again. Objectives of this study is to gain insight into consumers’ understanding of cyber security threats and their willingness to enhance their cyber resilience. To achieve this, a survey was conducted using AI tools such as Open ChatGPT, Copilot and PI. The survey was distributed selectively among consumers via Google Form. The results of the survey conducted during the study indicated that the majority of respondents (72%) expressed interest in attending online interactive seminars to gain more knowledge about managing cybersecurity threats. However, respondents with the lowest cyber resilience knowledge did not express the same level of interest. With technology becoming an increasingly important aspect in our everyday lives, it is becoming ever clearer that cybersecurity posture relies on the behavior consumers and organizations. Based on the rule that ‘never trust, always verify’ we designed ‘cybersecurity zero-trust framework model’ for consumers that allows them to protect themselves against cybersecurity threats. In an ever-shifting landscape of cybersecurity, it is important to recognize the value of continuous education as a necessity, not just an option.
Volume: 14
Issue: 1
Page: 122-131
Publish at: 2025-04-01

Machine learning based stator-winding fault severity detection in induction motors

10.11591/ijeecs.v38.i1.pp182-192
Partha Mishra , Shubhasish Sarkar , Sandip Saha Chowdhury , Santanu Das
Approximately 35% of all induction motor defects are caused by stator inter-turn faults. In this paper a novel algorithm has been proposed to analyze the three-phase stator current signals captured from the motor while it is in operation. The suggested method seeks to identify stator inter-turn short circuit faults in early stage and take the appropriate action to prevent the motor's condition from getting worse. Three-phase current signals have been captured under healthy and faulty conditions of the motor. Involving discrete wavelet transform (DWT) based decomposition followed by reconstruction using inverse DWT (IDWT), 50 Hz fundamental component has been removed from the captured raw current signals. Subsequently, from each phase current 15 statistical parameters have been retrieved. The statistical parameters include mean, standard deviation, skewness, kurtosis, peak-to-peak, root mean square (RMS), energy, crest factor, form factor, impulse factor, and margin factor. At the end, a standard machine learning algorithm namely error correcting output codes-support vector machine (ECOC-SVM) has been employed to classify six different severity of stator winding faults. The proposed fault diagnosis method is load and motor-rating independent.
Volume: 38
Issue: 1
Page: 182-192
Publish at: 2025-04-01
Show 234 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration