Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Gradient descent optimization based weighted federated learning for privacy-preserving framework

10.11591/ijai.v15.i1.pp878-887
Gururaj Prakash Murthy , Chandrashekhar Pomu Chavan
Federated learning (FL) is a disseminated machine learning (ML) paradigm that gained significant consideration in modern days, particularly in a domain of the internet of things (IoT). FL saves communication bandwidth when compared to centralized ML processes by eliminating the need to transmit raw client data to a central server, thereby enhancing data privacy. Nevertheless, participant privacy is still compromised through inference attacks and similar threats. Additionally, a data excellence provided through clients can differs significantly, and excessive inclusion of low-quality data during training may degrade the overall performance of the global model. Hence, this research introduces a gradient descent optimization assisted weighted federated learning (GDO-WFL) method for privacy preservation. The proposed GDO-WFL approach is significantly efficient as it strengthens privacy preservation through reducing exposure to inference attacks and optimises gradient updates for secure learning. Through weighting client contributions based on data quality, an undesirable effect of low-quality data can be minimised, helping to maintain a strength as well as accuracy of the global model. The experimental results illustrate a proposed GDO-WFL approach maintains an overall accuracy of 99.3 and 91.5% on MNIST and CIFAR-10 datasets as compared to the existing method of FedlabX method.
Volume: 15
Issue: 1
Page: 878-887
Publish at: 2026-02-01

An artificial intelligence technology for promoting hom-thong banana agriculture system

10.11591/ijai.v15.i1.pp568-579
Ratsames Tanveenukool , Suwit Somsuphaprungyos , Boonyarit Nokkurth , Likit Chamuthai , Patumwadee Bonguleaum , Parinya Natho
The hom-thong banana, being a high-value Thai export variety, is facing significant risk from disease outbreaks affecting crop yield and quality. Traditional visual inspection methods in detection of diseases are labor consuming, error-prone. This research addresses these limitations by developing a new artificial intelligence (AI)-based automatic disease detection system for the hom-thong banana industry on top of cutting-edge computer vision technology. The study employed deep learning object detection models, contrasting Roboflow, you only look once (YOLO)v11, and YOLOv12 architectures, which were trained on a large dataset of 2,576 images of Thai banana plantations. With systematic data augmentation techniques, the dataset was augmented to 6,184 images of seven types of disease under varied environmental conditions. The method entailed extensive preprocessing and evaluation of performance through precision, recall, and mean average precision (mAP) metrics. Outcomes indicated that YOLOv12 outperformed with 93.3% accuracy, 83.3% sensitivity, and 86.3% mAP@50 compared to standard inspection schemes. This research is applicable to Thailand's smart agriculture initiative by providing farmers with low-cost, accurate, and effective disease monitoring equipment. The application of this AI system has the ability to enhance the yield of crops, reduce losses, and enhance the competitiveness of Thai banana exports in the global market, in support of sustainable agricultural development.
Volume: 15
Issue: 1
Page: 568-579
Publish at: 2026-02-01

Adversarial examples in Arabic language

10.11591/ijai.v15.i1.pp941-952
Safae Laatyaoui , Mohammed Saber
Adversarial attacks have a great popularity in the artificial intelligence (AI) domain. In the natural language processing (NLP) field, various techniques have been used to evaluate the vulnerability of deep learning (DL) models. It is observed that while most studies focused on generating adversarial examples in English language, Arabic adversarial attacks have received little attention. This paper presents a two-step method to create adversarial examples in Arabic language: first, the most important words are identified. Then, the proposed transformation algorithm is applied. Only small and imperceptible manipulations based on common mistakes in Arabic writing mislead the popular pre-trained language model (PLM) bidirectional encoder representations from transformers (BERT) retrained on the book reviews in Arabic dataset (BRAD) on the sentiment analysis (SA) task and decrease its performance: the classification accuracy was reduced by an average of 3.44%. This drop in accuracy shows that the model was successfully attacked.
Volume: 15
Issue: 1
Page: 941-952
Publish at: 2026-02-01

Benchmarking machine learning models for natural disaster prediction with synthetic IoT data

10.11591/ijai.v15.i1.pp257-268
Moath Alsafasfeh , Abdullah Alhasanat , Atheer Bassel , Moahand Alhasanat
Natural disasters pose severe threats to human life and infrastructure, demanding robust early warning systems (EWS) supported by machine learning (ML) and internet of things (IoT)-based sensing. This study benchmarks ML models for predicting floods and earthquakes using synthetic IoT sensor data. A dataset comprising nine environmental and seismic parameters was generated and labeled into three classes: no disaster, flood, and earthquake, where the feature preprocessing was applied during model training. Logistic regression (LR), random forest (RF), and extreme gradient boosting (XGBoost) models were trained and evaluated using accuracy, precision, recall, and F1-score. Experimental results on the World-A test set show that ensemble models consistently outperform LR, with XGBoost and RF achieving F1-scores of up to 97%and99%,respectively, compared to79%forLR.Anindependenttestonthe separately generated World-B dataset revealed that ensemble models maintained higher generalization capability with F1-scores of 80% for XGBoost and 78% for RF. In contrast, LR showed substantial degradation with an F1-score of 54%. Stress testing on the World-B dataset under simulated situations, such as sensor failures, noise injection, and extreme weather events, confirms the resilience performance of ensemble models in comparison to LR. These results demonstrate the usefulness of ensemble learning in handling unpredictable IoT data for disaster prediction and highlight their potential integration into intelligent EWS. Future work will focus on expanding the framework to include cross-time prediction, incorporating additional environmental features, and deploying the models in real-time IoT systems for field validation.
Volume: 15
Issue: 1
Page: 257-268
Publish at: 2026-02-01

Single hidden layer feedforward neural networks for indoor air quality prediction

10.11591/ijai.v15.i1.pp322-328
Dwi Marisa Midyanti , Syamsul Bahri , Ilhamsyah Ilhamsyah , Zalikhah Khairunnisa , Hafizhah Insani Midyanti
Indoor air quality (IAQ) has become a problem because it affects human health, comfort, and productivity. Predicting air quality is a complex task due to the dynamic nature of IAQ variable values simultaneously. In this study, the single hidden layer feedforward neural networks model is used, namely radial basis function (RBF), self-organizing maps (SOM)-RBF, and extreme learning machine (ELM) to classify IAQ. This study also observed the effect of the number of neurons in the hidden layer on the model accuracy and overfitting of each network. The experimental results show that the number of neurons in the hidden layer can affect the accuracy of the RBF and SOM-RBF models. Among the three models used, RBF produces very good training data accuracy but also the most significant overfitting value. The largest overall accuracy was obtained using SOM-RBF, with a value of 86.37%.
Volume: 15
Issue: 1
Page: 322-328
Publish at: 2026-02-01

The Bender’s decomposition model to optimize temporary waste disposal sites based on general algebraic modeling system

10.11591/ijeecs.v41.i2.pp666-679
Sisca Octarina , Fitri Maya Puspita , Endro Setyo Cahyono , Evi Yuliza , Pebriyanti Simanjuntak , Siti Suzlin Supadi
Waste constitutes a substantial problem in urban and residential locales, as the volume of refuse escalates in tandem with population increase, deteriorating community quality of life. One solution to this problem is to provide temporary waste disposal sites (TWDS). This research discussed optimizing TWDS in the Sukarami Subdistrict, Palembang City, which consists of seven villages. The current TWDS in the Sukarami Subdistrict is irregular, with some sites located close together and others far apart. The optimization problem is solved by formulating the set covering problem (SCP) model, namely the set covering location problem (SCLP), the p-Median problem, and the Bender’s decomposition model. All models were solved using the general algebraic modeling system (GAMS) software. The research introduces a Bender’s decomposition model based on the SCLP model. The Sukarami Subdistrict has 29 TWDS located in only five villages. Using the SCLP and Bender’s decomposition models, the study identified 19 optimal TWDS in the Sukarami Subdistrict. Based on the solution of the p-Median problem, there are seven TWDS that can meet each village’s demand. This study recommends the optimal TWDS obtained from the Bender’s decomposition model. Additionally, two TWDS are recommended to be added, each in Sukodadi and Talang Betutu villages.
Volume: 41
Issue: 2
Page: 666-679
Publish at: 2026-02-01

Botnet detection: a system for identifying DGA-based botnets using LightGBM

10.11591/ijeecs.v41.i2.pp833-844
Mumtazimah Mohamad , Nazirah Abd Hamid , Sanaa A. A. Ghaleb , Siti Dhalila Mohd Satar , Suhailan Safei , Wan Mohd Amir Fazamin Wan Hamzah , Lim En En
Botnets present a major challenge to detecting anomalies in domain generation algorithms (DGAs). Botmasters use DGAs to create numerous domain names to communicate with command-and-control servers, complicating the detection process. Traditional blacklisting methods struggle to effectively identify anomalous DGA domain names amid the vast number of randomly generated domains, leading to a greater risk of detection being evaded. The proliferation of DGA-based botnets has created an urgent need for robust detection methods. Various techniques and attributes have been utilised to categorise different DGA families, yet the dynamic nature of DGA domain names renders the current blacklisting algorithms ineffective. Additionally, the dynamic characteristics of DGAs further complicate classification, emphasising the need for machine learning models to improve detection accuracy and enhance cyber defence. This study proposes a robust solution to address the challenges posed by DGA-based botnets by developing an innovative machine learning-based model for domain name classification. The model leverages the light gradient boosting algorithm (LightGBM) and integrates n-gram features to enhance the detection of malicious DGA domains. This approach offers superior accuracy, adaptability, and efficiency in identifying and classifying anomalous domain names, achieving 96% precision when detecting true DGA domains. This system represents a significant advancement in cybersecurity and anomaly detection.
Volume: 41
Issue: 2
Page: 833-844
Publish at: 2026-02-01

An investigation of different low-power circuits and enhanced energy efficiency in medical applications

10.11591/ijeecs.v41.i2.pp478-493
Prabhu R , Sivakumar Rajagopal
This research investigates the application of low-power circuits in medical devices and imaging systems. The primary goal is to address the growing demand for energy-efficient solutions in medical applications. There is an increasing need for energy-efficient solutions due to the development of medical technologies, particularly implanted and battery-operated medical devices. This paper explores the integration of adiabatic logic as a critical enabler for achieving low power consumption in medical applications. The study looks into different low-power circuit designs and technologies that optimize power usage without sacrificing performance. Adiabatic circuits offer a promising substitute for conventional circuitry in low-energy design. The research examines several low-power circuit designs and technologies that maximize power efficiency without compromising functionality. In low-energy design, adiabatic circuits present a possible alternative to traditional circuitry. Adiabatic logic aims to create energy-efficient digital circuits that consume significantly less power than conventional complementary metal-oxide-semiconductor (CMOS) circuits. We accomplish this by recovering and recycling energy that would otherwise be lost as heat and carefully controlling energy flows during switching events. Adiabatic logic is precious in battery-operated and energy-constrained devices.
Volume: 41
Issue: 2
Page: 478-493
Publish at: 2026-02-01

A hybrid edge–cloud computing framework for low-latency, energy-efficient, and sustainable smart city applications

10.11591/ijeecs.v41.i2.pp791-799
Kamal Saluja , Tanya Khaneja , Sunil Gupta , Reema Goyal , Wai Yie Leong
Smart-city applications demand ultra-low latency, high reliability, and sustainable operation, which are difficult to achieve using cloud-only or edge-only computing paradigms. This study suggests a carbon-conscious architecture for managing smart cities’ intelligent job offloading between the edge and the cloud. This is made possible by the Internet of Things and driven by reinforcement learning (RL). A deep Q-network (DQN) is used to dynamically assign tasks to cloud servers and edge nodes based on how much energy they use, how long it takes to send data over the network, and how much bandwidth they have. A lightweight permissioned blockchain layer makes sure that data is correct across all of its parts, and carbon-aware scheduling puts low-carbon resources first. EdgeCloudSim is used to test the system with real-world smart city workloads. When compared to systems that simply use the cloud, the proposed solution showed a 64.6% drop in average latency, a 24.2% drop in energy use, and a 15% drop in carbon emissions. Combining artificial intelligence (AI)-driven orchestration with scheduling that takes sustainability into account in a hybrid edge-cloud environment yields positive outcomes.
Volume: 41
Issue: 2
Page: 791-799
Publish at: 2026-02-01

Contextualized clinical anomaly detection with explainable AI and patient modeling

10.11591/ijeecs.v41.i2.pp614-623
Amel Elketroussi , Bachir Djebbar , Ibtissem Bekkouche
This study aims to reduce alarm fatigue and improve the clinical relevance of alerts in intensive care by combining sequential modeling, patient contextualization, explainable artificial intelligence (XAI), and probability calibration. To this end, we leverage the adult cohorts from MIMIC-III/IV, segmented into four-hour windows, explicitly handling missing data and constructing a context vector that integrates demographics, comorbidities, and therapeutic interventions. The approach relies on a tabular autoencoder, an long short-term memory (LSTM) autoencoder, and a transformer, complemented by an adjustment layer based on auditable clinical rules, local explanations (LIME/SHAP), and post-hoc calibration (temperature scaling). Evaluation involves receiver operating characteristic (ROC)/precision–recall (PR) area under the curve (AUC), F1-score, sensitivity and specificity, as well as calibration metrics (ECE, Brier score), alert burden, ablation studies, robustness tests, and subgroup fairness analyses. Across all experiments, the complete model (+Context+XAI+Calibration) outperforms baselines in AUPRC and F1, reduces alert burden, and improves calibration while providing understandable explanations. Specifically, the proposed model improves ROC AUC from 0.74 to 0.89 and reduces alert burden by approximately one third compared to clinical thresholds.
Volume: 41
Issue: 2
Page: 614-623
Publish at: 2026-02-01

Enhanced soil moisture sensing using graphene-coated copper electrodes

10.11591/ijeecs.v41.i2.pp470-477
Nuralam Nuralam , Rizdam Firly Muzakki , Sri Lestari Kusumastuti
Soil moisture monitoring is essential for precision agriculture to optimize irrigation and increase crop productivity. Traditional conductivity-based sensors often face limitations such as low sensitivity, slow response, and measurement instability. This study presents a simple and effective enhancement method by applying a graphene coating on copper electrodes using the drop casting technique. Experimental evaluations were conducted on natural soil samples at varying moisture levels. The graphene-coated sensor exhibited a significantly higher sensitivity of 23.0 Ω/% compared to 12.0 Ω/% for the uncoated sensor, a faster response time of approximately 5 seconds, and improved measurement consistency with a reduced standard deviation of ±15 Ω. Graphene's superior electrical conductivity and strong water affinity are key factors contributing to this performance improvement. These findings indicate that graphene-coated sensors offer a promising solution for reliable, cost-effective soil moisture monitoring in smart farming systems.
Volume: 41
Issue: 2
Page: 470-477
Publish at: 2026-02-01

Joint angle prediction and joint-type classification in human gait analysis using explainable deep reinforcement learning

10.11591/ijeecs.v41.i2.pp564-578
Deepak N. R. , Soumya Naik P. T. , Ambika P. R. , Shaik Sayeed Ahamed
Human gait analysis is a key component of rehabilitation, prosthetics, and sports science, especially for clinical evaluation and the development of adaptive assistive technologies. Accurate joint-angle estimation and dependable joint-type classification remain difficult because of the complex temporal behavior of gait signals and the limited interpretability of many deep learning (DL) approaches. While recent techniques have enhanced predictive accuracy, their clinical applicability is often limited by insufficient transparency and adaptability in learning mechanisms. To overcome these limitations, this work proposes an integrated framework that unifies DL, reinforcement learning (RL), and explainable artificial intelligence (XAI). Stochastic depth neural networks (SDNN) are applied for joint-angle regression, whereas deep feature factorization networks (DFFN) are used for multi-class joint-type classification. Optimization is achieved using Q-learning (QL) and mutual information maximization (MIM), ensuring stable convergence and improved learning efficiency. To improve interpretability, the framework incorporates counterfactual and contrastive explanations, feature ablation studies, and prediction probability analysis. Experimental findings show that the SDNN MIM model attains an R2 score of 0.9881, with RL rewards increasing from 0.997 to 0.999 during regression training. For joint-type classification, the DFFN MIM model achieves an accuracy of 0.95, with reward values improving from 0.90 to 0.98. These results demonstrate the effectiveness of the proposed framework in delivering accurate and interpretable gait predictions, supporting its relevance to biomechanics, healthcare, personalized rehabilitation, and intelligent assistive systems.
Volume: 41
Issue: 2
Page: 564-578
Publish at: 2026-02-01

A new hybrid model based on machine learning and fuzzy logic for QoS enhancing in IoT

10.11591/ijeecs.v41.i2.pp624-632
Oussama Lagnfdi , Marouane Myyara , Anouar Darif
The fast expansion of internet of things (IoT) devices presents a more complicated scenario for maintaining a stable quality of service (QoS), which would guarantee the network’s dependable operation. The emergence of increasingly complex applications that call for additional devices makes this even more crucial. Adaptive intelligence solutions that guarantee optimal network behavior are therefore required. This paper presents a hybrid optimized solution for a three-layer IoT network that models the application, network, and perception layers of an IoT network using machine learning and fuzzy logic (FL). This method guarantees optimal QoS prediction with improved network adaptability by using fuzzy membership parameters. When the number of devices increases from 100 to 1,500, FLGA maintains an average QoS of 95% to 87%, while FL maintains 84% and RANDOM maintains 79%. At the application level, genetic algorithm (GA) continues to outperform RANDOM by 15.57% and FL by 6.32%. The goal of this paper is to provide a solid network solution that could enhance the consistency of QoS performance in order to combat the increasingly complex scenario of an IoT network.
Volume: 41
Issue: 2
Page: 624-632
Publish at: 2026-02-01

Intelligent cybersecurity framework for real-time threat detection and data protection

10.11591/ijeecs.v41.i2.pp504-514
Gunti Viswanath , Kurapati Srinivasa Rao
Organizations operating across cloud, mobile, and enterprise environments are increasingly exposed to sophisticated cyberattacks that traditional rule-based security systems struggle to detect in real time. These legacy approaches lack adaptability, making it difficult to continuously monitor distributed networks, identify anomalies, and prevent zero-day threats before sensitive data is compromised. To address these challenges, this paper proposes an intelligent cybersecurity framework that integrates real-time network monitoring with AI/ML-based anomaly detection models. The framework utilizes structured preprocessing, feature engineering, and supervised learning on the UNSW-NB15 dataset (version 2015, Cyber Range Lab) to enhance detection accuracy and reduce response time. The experimental setup evaluates multiple ML classifiers using stratified train- test splitting and 5-fold cross-validation, ensuring robust performance validation. Experimental results show that the random forest (RF) model achieves 94.28% accuracy, a 2.93% false-positive rate, and an average detection time of 0.41 seconds, outperforming other baseline models. In addition to the detection layer, the framework incorporates mobile device management (MDM) controls and cloud-storage policy enforcement to strengthen organizational security posture. The main contributions of this work include: i) a unified AI/ML-driven anomaly detection model, ii) integration of MDM and cloud policy enforcement for end-to-end protection, and iii) improved empirical performance validated using a benchmark cybersecurity dataset. This combined architecture significantly enhances real-time threat identification and reduces alert latency, supporting a more security-aware and resilient enterprise environment.
Volume: 41
Issue: 2
Page: 504-514
Publish at: 2026-02-01

Robust palmprint biometric solution for secure mobile authentication

10.11591/ijeecs.v41.i2.pp680-689
Son Nguyen , Arthorn Luangsodsai , Pattarasinee Bhattarakosol
Smartphones increasingly rely on biometric authentication for access to financial and personal services, creating a need for palmprint recognition that is accurate, fast, and deployable on device. This paper proposes an end-to-end smartphone palmprint authentication framework that integrates guided mobile image capture, landmark-based region-of-interest (ROI) extraction, and compact embedding inference. A ResNet-18 teacher is first trained with self-supervised contrastive learning to reduce dependence on labeled biometric data, then distilled into a lightweight MobileNetV3 student for efficient mobile deployment. The learned embeddings support both on device verification and large-scale identification using an approximate nearest neighbor index (FAISS). Experiments on a public Kaggle palm dataset achieve 99.2% accuracy with a 0.15% equal error rate (EER). On an iPhone 13, the end-to-end pipeline runs in 87.0 ms with a 12.4 MB student model. For a 1 million-entry gallery, FAISS provides 32 ms query latency while maintaining 99.5% Recall@1. Limitations include evaluation under mostly controlled capture conditions and the absence of an explicit liveness or presentation attack detection (PAD) module; future work will address unconstrained testing and anti-spoofing integration.
Volume: 41
Issue: 2
Page: 680-689
Publish at: 2026-02-01
Show 47 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration