Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,061 Article Results

High gain multi-layered microstrip patch antenna for x- band applications

10.11591/ijict.v15i1.pp343-355
Jada Nageswara Rao , Ragipindi Ramana Reddy
This research investigates the development of a multi-stacked microstrip antenna featuring two patch elements positioned in a layered configuration. The antenna design incorporates three substrates with different dielectric constants, separated by an air gap, to evaluate their impact on improving bandwidth and gain. The primary objective of this research is to enhance the efficiency of a microstrip patch antenna by utilising a multilayer substrate structure. Simulation results indicate that stacking substrates with varying dielectric properties significantly enhances antenna performance. The bandwidth increases considerably, from 1.38 GHz to 2.37 GHz, while the peak gain improves from 6.6 dBi to 7.9 dBi. These advancements highlight the antenna's effectiveness in operating within the X-band frequency range, making it suitable for wireless and satellite communication systems. The design and its performance were analysed using high-frequency structure simulator (HFSS) simulation software, which validated its practical feasibility. This innovative configuration addresses the bandwidth limitations typically associated with conventional microstrip antennas, ensuring improved operational efficiency for modern communication technologies. The findings highlight the benefits of utilising a multi-stacked structure to achieve superior antenna performance, particularly in advanced communication applications.
Volume: 15
Issue: 1
Page: 343-355
Publish at: 2026-03-01

Video-based physical violence detection model for efficient public space surveillance

10.11591/ijict.v15i1.pp161-170
Erick Erick , Benfano Soewito
This study aims to develop an effective real-time model for detecting violence in public spaces, focusing on achieving a balance between accuracy and computational efficiency. We evaluate various model architectures, with the main comparison between the ConvLSTM2D and Conv3D models commonly used in video analysis to capture spatial and temporal features. The ConvLSTM2D model, combined with preprocessing layers such as change detection and motion blur, showed optimal performance, achieving 86% accuracy after Bayesian optimization. With a low parameter count of 25,137, this model enables fast inference in just 0.010 seconds, making it suitable for real-time applications that require efficient computation. In contrast, the Conv3D model, which is also combined with preprocessing layers such as change detection and motion blur and has more than nine million parameters, shows a lower accuracy of 77.5% as well as a slower inference time of 0.025 seconds, making it unsuitable for real-time applications. The results of this study show that the ConvLSTM2D model is promising for real-time violence detection systems in public spaces, where a fast and accurate response is essential to prevent further acts of violence.
Volume: 15
Issue: 1
Page: 161-170
Publish at: 2026-03-01

A survey on fronthaul signaling of user-centric cell-free massive MIMO networks

10.11591/ijict.v15i1.pp302-312
Syed Tariq Ali , Anamika Singh
The mandate for high data rates in mobile communication is increasing and will continue to do so in the future. Although the latest network technologies can meet this demand, they result in more-dense networks. Networks like ultra-dense networks and massive multiple-input multiple-output provide very high data rates, but they cannot meet the future demand. The main issue with existing networks is inter-cell interference and variations in quality of service esp. at the cell edges, leading to research on new network architectures that offer intelligent coordination and collaboration capabilities are being researched, like user-centric cell-free (UC-CF) massive-multipleinput-multiple-output (mMIMO). This network combines the best of ultradense networks and mMIMO and eliminates cell edge problems. It is served by access points that cooperate and coordinate with each other. This paper reviews the challenges and opportunities in physical layer parameterfronthaul signaling for UC-CF mMIMO. We discuss the basics of the network, the importance of fronthaul signaling, and propose various approaches in the literature to address challenges and identify research gaps and provide future directions. Our aims to provide a comprehensive overview of the current state of fronthaul signaling and highlight the key issues that need to be addressed to realize its full potential.
Volume: 15
Issue: 1
Page: 302-312
Publish at: 2026-03-01

Smart accommodation solution: innovative boarding house locator in Bayombong municipality

10.11591/ijict.v15i1.pp1-12
Carmelo Alejo D. Bisquera , Vilchor G. Perdido , Napoleon Anthony M. Mendoza
The search for affordable and conveniently located student accommodation is a common challenge, especially for students unfamiliar with their surroundings. This study presented the development and evaluation of a geographical information system (GIS)-enabled boarding house locator developed for Nueva Vizcaya State University (NVSU) students. The platform simplified the accommodation search process by providing a digital solution that integrates spatial data, real-time updates, and filtering options. The platform significantly reduced the time and cost of traditional housing searches. It helped students save 181.25 minutes per search and an average of 35 PHP in transportation costs compared to conventional methods like physical visits and word-of-mouth. Usability testing with 175 participants revealed high satisfaction, with the platform receiving an average rating of 4.83 for usability and 4.75 for performance. Key features such as interactive maps, location-based searches, and real-time updates enhanced the user experience by providing accurate, and up-to-date listings. The GIS-based platform outperformed traditional search methods in terms of efficiency and user satisfaction and offered a digital solution to common housing challenges faced by students. The results suggested the platform had strong potential for wider application at other universities. Overall, this system provides a scalable, cost-effective solution to improve student accommodation search and management.
Volume: 15
Issue: 1
Page: 1-12
Publish at: 2026-03-01

A high linearity low noise amplifier with modified differential inductor for bluetooth profiles

10.11591/ijict.v15i1.pp323-331
Ghattamaneni Usharani , Sourirajan Varadarajan
In today’s rapidly evolving communication landscape, electronic devices rely heavily on high-performance components to ensure seamless connectivity. A low-noise amplifier (LNA) is a critical front-end element in any receiver chain, where its performance significantly influences the overall system efficiency. As integrated circuits continue to shrink with advancements in technology, challenges such as linearity degradation have become increasingly prominent. This work presents a modified derivative (MD) narrowband common source low-noise amplifier (CSLNA) designed using 0.13 µm CMOS technology, offering improved linearity and frequency characteristics. The proposed design adopts a hybrid architecture, combining a folded cascode gain stage with a common-gate configuration. An optimized modified differential inductor is employed at the input for effective impedance matching and reduced noise figure (NF). The implemented LNA achieves a gain of 25.81 dB, an input return loss of –24.86 dB, and maintains a low NF of 0.3 dB at an operating frequency of 2.4 GHz. Furthermore, the linearity metrics-third-order input intercept point (IIP3) and 1 dB compression pointare significantly improved to –16.70 dBm and –21.89 dBm, respectively. These results highlight the LNA's suitability for Bluetooth and other shortrange wireless communication applications.
Volume: 15
Issue: 1
Page: 323-331
Publish at: 2026-03-01

A unified intelligent AI platform for resolving citizens' queries related to beneficiary service using AI -Powered chatbots a practical apparoach

10.11591/ijict.v15i1.pp267-275
Parveen Mehta , Shweta Bansal
The daily many rural citizens visit government offices to inquire about beneficiary services that support poor and illiterate citizens. However, without proper knowledge, many eligible citizens fail to benefit from these services. In the artificial intelligence (AI) era, AI-powered chatbots, such as AI agents, can provide valuable support to the villagers and provide them with complete information at their door step. In this paper, a proposed framework, using a chatbot, to reduce the communication gap between citizens and government officials to improve service delivery performance. This chatbot is developed by using a built large language model, python libraries, fast API, and mongodb data base. Our findings demonstrate the challenges of imbalanced data and suggest improvements for future implementations. The system enhances service delivery by automating eligibility checks and reducing office visit frequency by up to 60%.
Volume: 15
Issue: 1
Page: 267-275
Publish at: 2026-03-01

Plant disease sensing using image processing (with CNN)

10.11591/ijict.v15i1.pp93-101
Haresh Rajkumar , Harry Jakin S. , Sudhakar Thirumalaivasal Devanathan , Booapthy Kannan
Plant disease is a significant challenge for agriculture, leading to reduced yield, economic loss, and environmental impact. Leveraging digital photos of plant leaves, convolutional neural networks (CNNs) have emerged as promising tools for disease detection. The methodology involves several steps, including image pre-processing, segmentation, feature extraction using CNNs. Crucially, a diverse dataset comprising images of both healthy and diseased leaves under varying conditions is necessary for training accurate models. Transfer learning, particularly with pre-trained models like ImageNet, can further enhance accuracy, allowing for better performance with fewer training samples. The proposed method demonstrates impressive results, achieving over 95% accuracy, outperforming existing state-of-the-art techniques. This system could serve as a valuable tool for farmers, facilitating timely disease identification and treatment, ultimately leading to increased agricultural yields, reduced financial losses, and the adoption of more sustainable farming practices. Additionally, beyond its practical applications, the proposed system holds promise for advancing sustainable agriculture by promoting environmentally friendly farming methods and contributing to the overall resilience and productivity of agricultural systems.
Volume: 15
Issue: 1
Page: 93-101
Publish at: 2026-03-01

Renewable energy optimization for sustainable power generation

10.11591/ijict.v15i1.pp365-373
Debani Prasad Mishra , Sarita Samal , Rohit Kumar , Arun Kumar Sahoo , Surender Reddy Salkuti
To improve sustainability in power generation, this study presents a thorough data-driven method for maximizing renewable energy sources. It employs measures like capacity utilization factor (CUF) and efficiency to evaluate the performance of solar and wind energy using historical weather and energy-generating data. The study offers practical suggestions for improving renewable energy systems, such as weather-energy correlation analysis and machine learning-based forecasting models. In addition, a comparative analysis is carried out to ascertain which energy source is better, and useful real-world data is provided, including a summary of all India’s total renewable energy generation (excluding large hydro) for June 2023 and a performance comparison year over year. A useful, data-driven approach for enhancing renewable energy is provided by this work, which advances the topic of sustainable energy.
Volume: 15
Issue: 1
Page: 365-373
Publish at: 2026-03-01

DFIG integration with ReLIFT converter for grid-connected systems: ANFIS MPPT control

10.11591/ijict.v15i1.pp21-29
Aravindhan Karunanithy , Chidambararaj Natarajan , Sanjay Selvan Arul Manimaran Malathy , Siva Malavan Elantherayan Sharmila
Although dispersed generation and non-linear loads provide difficulties for contemporary power systems that depend on power electronics, renewable energy sources (RES) are essential for meeting the world’s energy demands. This paper provides a unique method for maximum power point tracking (MPPT) in doubly fed induction generators (DFIG) system using an Adaptive network based fuzzy inference system (ANFIS) inference system. The suggested ANFIS MPPT controller adaptively modifies discontinuous control gain to reduce chattering phenomena in the excitation system while preserving the resilience of the closed-loop system. Prior to using a DQ control theory controller for rotor magnitude adjustment to accomplish vector control of active and reactive power, the turbine and DFIG must be modeled. The converter maximizes output current while striving for unity power factor and allowable harmonic content.
Volume: 15
Issue: 1
Page: 21-29
Publish at: 2026-03-01

Enhanced smart farming security with class-aware intrusion detection in fog environment

10.11591/ijict.v15i1.pp257-266
Selvaraj Palanisamy , Radhakrishnan Rajamani , Prabakaran Pramasivam , Mani Sumithra , Prabu Kaliyaperumal , Rajakumar Perumal
The adoption of the internet of things (IoT) in smart farming has enabled real-time data collection and analysis, leading to significant improvements in productivity and quality. However, incorporating diverse sensors across large-scale IoT systems creates notable security challenges, particularly in dynamic environments like Fog-to-Things architectures. Threat actors may exploit these weaknesses to disrupt communication systems and undermine their integrity. Tackling these issues necessitates an intrusion detection system (IDS) that achieves a balance between accuracy, resource optimization, compatibility, and affordability. This study introduces an innovative deep learning-driven IDS tailored for fog-assisted smart farming environments. The proposed system utilizes a class-aware autoencoder for detecting anomalies and performing initial binary classification, with a SoftMax layer subsequently employed for multi-class attack categorization. The model effectively identifies various threats, such as distributed denial of service (DDoS), ransomware, and password attacks, while enhancing security performance in environments with limited resources. By utilizing the Fog-to-Things architecture, the proposed IDS guarantees reliable and low-latency performance under extreme environmental conditions. Experimental results on the TON_IoT dataset reveal excellent performance, surpassing 98% accuracy in both binary and multi-class classification tasks. The proposed model outperforms conventional models (convolutional neural network (CNN), recurrent neural network (RNN), deep neural network (DNN), and gated recurrent unit (GRU)), highlighting its superior accuracy and effectiveness in securing smart farming networks.
Volume: 15
Issue: 1
Page: 257-266
Publish at: 2026-03-01

A comparative analysis of PoS tagging tools for Hindi and Marathi

10.11591/ijict.v15i1.pp120-137
Pratik Narayanrao Kalamkar , Prasadu Peddi , Yogesh Kumar Sharma
Many tools exist for performing parts of speech (PoS) data tagging in Hindi and Marathi. Still, no standard benchmark or performance evaluation data exists for these tools to help researchers choose the best according to their needs. This paper presents a performance comparison of different PoS taggers and widely available trained models for these two languages. We used different granularity data sets to compare the performance and precision of these tools with the Stanford PoS tagger. Since the tag sets used by these PoS taggers differ, we propose a mapping between different PoS tagsets to address this inherent challenge in tagger comparison. We tested our proposed PoS tag mappings on newly created Hindi and Marathi movie scripts and subtitle datasets since movie scripts are different in how they are formatted and structured. We shall be surveying and comparing five parts of speech taggers viz. IMLT Hindi rules-based PoS tagger, LTRC IIIT Hindi PoS tagger, CDAC Hindi PoS tagger, LTRC Marathi PoS tagger, CDAC Marathi PoS tagger. It would also help us evaluate how the Bureau of Indian Standards’s (BIS) tag set of Indian languages compares to the Universal Dependency (UD) PoS tag set, as no studies have been conducted before to evaluate this aspect.
Volume: 15
Issue: 1
Page: 120-137
Publish at: 2026-03-01

Enhancing intellectual property rights management through blockchain integration

10.11591/ijict.v15i1.pp111-119
Raghavan Sheeja , Sherwin Richard R. , Shreenidhi Kovai Sivabalan , Srinivas Madhavan
The generational improvement has significantly converted several industries, and the area of intellectual property rights (IPR) isn’t any exception. IPRs, being as important as they are, need to be securely managed in some way. Blockchain, with its decentralized and immutable nature, gives a promising answer for enhancing the management of intellectual property (IP). This paper explores the strategic integration of blockchain generation for the control of IPR. The proposed system consists of a complete system, from registration and validation to predictive evaluation and royalty distribution, all facilitated through clever contracts. The use of zero-knowledge proofs guarantees the safety and confidentiality of sensitive information. The paper discusses the advantages and future implications of implementing this type of device.
Volume: 15
Issue: 1
Page: 111-119
Publish at: 2026-03-01

Classification and regression tree model for diabetes prediction

10.11591/ijict.v15i1.pp207-216
Farah Najidah Noorizan , Nur Anida Jumadi , Li Mun Ng
Diabetes mellitus is characterized by excessive blood glucose that occurs when the pancreas malfunctions while producing insulin. High blood glucose levels can cause chronic damage to organs, particularly the eyes and kidneys. Diabetes prediction models traditionally use a variety of machine learning (ML) algorithms by combining data from the glucose levels, patient health parameters, and other biomarkers. Prior research on diabetes prediction using various algorithms, such as support vector machine (SVM) and decision tree (DT) models, demonstrates an accuracy rate of approximately 70%, which is relatively modest. Therefore, in this study, a classification and regression tree (CART) multiclassifier model has been proposed to improve the accuracy of diabetes prediction, which is based on three classes: non-diabetic, pre-diabetic, and diabetic. The study involved data preprocessing steps, hyperparameter tuning, and evaluation of performance metrics. The model achieved 97% accuracy while utilizing the value of 5 for the number of leaves per node, the value of 10 for the maximum number of splits, and deviance as the split criterion, which also resulted in a precision of 98%, recall of 97%, and F1-score of 98%, showing that the proposed multiclassifier model can accurately predict diabetes. In conclusion, the proposed CART model with the best hyperparameter setting can enable the highest accuracy in predicting diabetes classes.
Volume: 15
Issue: 1
Page: 207-216
Publish at: 2026-03-01

Reputation-enhanced two-way hybrid algorithm for detecting attacks in WSN

10.11591/ijict.v15i1.pp428-437
Divya Bharathi Selvaraj , Veni Sundaram
Wireless sensor networks (WSNs) are susceptible to a variety of attacks, such as data tampering attacks, blackhole attacks, and grayhole attacks, that can affect the reliability of communication. We proposed a reputationenhanced two-way hybrid algorithm (RCHA) that uses cryptographic hash functions and reputation-based trust management to detect and de-escalate attacks accurately. The RCHA algorithm implements two hash functions RACE integrity primitives’ evaluation message digest (RIPEMD) and secure hash algorithm (SHA-3), to initiate the integrity check for the entire packet sent across the network. Every node in the WSN tracks a reputation score for each neighbor the node is connected to, and this score is dynamically updated based on the behavior of each neighbor. If a neighboring node’s reputation drops below a threshold, the node is sent a maliciousness designation. At that time, the node will broadcast an alert message to its neighboring nodes and begin to reroute its data through one of its trusted neighbors to ensure the reliability of the communication. The simulation results reported that the RCHA algorithm improved the accuracy of the attack detection rate and the number of packets delivered compared to traditional attack detection methods. The RCHA algorithm was able to maintain low computational and energy overhead for the WSN, making it an attractive option for a resource-constrained application in a WSN. Given the trends towards more collaborative networks, the reputation mechanism in the RCHA algorithm improves the overall reliability and capabilities of the WSN, regardless of adversaries.
Volume: 15
Issue: 1
Page: 428-437
Publish at: 2026-03-01

Neural-network based representation framework for adversary identification in internet of things

10.11591/ijece.v15i6.pp%p
Thanuja Narasimhamurthy , Gunavathi Hosahalli Swamy
Machine learning is one of the potential solutions towards optimizing the security strength towards identifying complex forms of threats in internet of things (IoT). However, a review of existing machine learning-based approaches showcases their sub-optimal performance when exposed to dynamic forms of unseen threats without any a priori information during the training stage. Hence, this manuscript presents a novel machine-learning framework towards potential threat detection capable of identifying the underlying patterns of rapidly evolving threats. The proposed system uses a neural network-based learning model emphasizing representation learning where an explicit masked indexing mechanism is presented for high-level security against unknown and dynamic adversaries. The benchmarked outcome of the study shows to accomplish 11% maximized threat detection accuracy and 33% minimized algorithm processing time.
Volume: 15
Issue: 6
Page: 6043-6052
Publish at: 2025-12-18
Show 3 of 1938

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration