Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

A comparative study of large language models with chain-of thought prompting for automated program repair

10.11591/ijai.v14.i6.pp4579-4589
Eko Darwiyanto , Rizky Akbar Gusnaen , Rio Nurtantyana
Automatic code repair is an important task in software development to reduce bugs efficiently. This research focuses on developing and evaluating a chain-of-thought (CoT) prompting approach to improve the ability of large language models (LLMs) in automated program repair (APR) tasks. CoT prompting is a technique that guides LLM to generate step-by-step explanations before providing the final answer, so it is expected to improve the accuracy and quality of code repair. This research uses the QuixBugs dataset to evaluate the performance of several LLM models, including DeepSeek-V3 and GPT-4o, with two prompting methods, namely standard and CoT prompting. The evaluation is based on the average number of plausible patches generated as well as the estimated token usage cost. The results show that CoT prompting improves performance in most models compared with the standard. DeepSeek-V3 recorded the highest performance with an average of 36.6 plausible patches and the lowest cost of $0.006. GPT-4o also showed competitive results with an average of 35.8 plausible patches and a cost of $0.226. These results confirm that CoT prompting is an effective technique to improve LLM reasoning ability in APR tasks.
Volume: 14
Issue: 6
Page: 4579-4589
Publish at: 2025-12-01

Fine-tuning multilingual transformers for Hinglish sentiment analysis: a comparative evaluation with BiLSTM

10.11591/ijai.v14.i6.pp4684-4693
Jyoti S. Verma , Jaimin N. Undavia
Growing trend of code-mixing in languages, in the form of Hinglish, greatly tests the skills of conventional sentiment analysis tools. The research contributes a fine-tuned multilingual transformer model built exclusively for classifying sentiment of Hinglish customer reviews. Drawing from pre trained BERT-base-multilingual-case architecture, the model gets transformed with the process of fine-tuning the same on synthetically prepared and balanced dataset simulating positive, negative, and neutral sentiments. Sophisticated methods like focal loss for addressing the class imbalance and mixed precision training for maximization of computational effectiveness are embedded within the training process. Experimental results suggest that the proposed method significantly captures the fine-grained linguistic patterns of code-mixed text, improving sentiment classification accuracy. The results show promising potential for enhancing customer feedback analysis in e-commerce, social media monitoring, and customer support use cases, where it is crucial to comprehend the sentiment behind code-mixed reviews.
Volume: 14
Issue: 6
Page: 4684-4693
Publish at: 2025-12-01

Securing post-quantum cryptography: side-channel resilience in CRYSTALS-Kyber key encapsulation mechanism

10.11591/ijai.v14.i6.pp5251-5267
Shreyas Kasture , Sudhanshu Maurya , Alakshendra Pratap Singh , Amit Shukla , Arnav Kotiyal , Kashish Mirza
This study evaluates side-channel vulnerabilities in hardware implementations of the cryptographic suite for Algebraic lattices (CRYSTALS)-Kyber key encapsulation mechanism (KEM) using correlation and differential power analysis (DPA) techniques. Unprotected field-programmable gate array (FPGA) implementations across all Kyber parameter sets were successfully compromised, revealing significant information leakage. Attack complexity scaled linearly with key size. Additive Boolean masking provided varying protection levels, with 4-bit masking offering a 100× security increase at notable performance cost. Performance characterization showed increased slice utilization and reduced maximum frequency for higher-order masking. A novel hybrid countermeasure combining higher-order masking with controlled time randomization enhanced protection against machine learning-based attacks. Comprehensive power trace analysis using 12-bit precision at 500 MS/s sampling rates was conducted. Statistical evaluation utilized Pearson's correlation and Welch's t-tests with a 0.8 threshold for key recovery. Real world validation in IoT, financial, and satellite scenarios highlighted practical post-quantum cryptography (PQC) deployment challenges. The study provides concrete design guidance for efficiently securing hardware Kyber implementations against side-channel attacks.
Volume: 14
Issue: 6
Page: 5251-5267
Publish at: 2025-12-01

Optimal battery sizing using modified spider monkey optimization in grid connected microgrids

10.11591/ijra.v14i3.pp356-365
Meraj Fatima , Manne Rama Subbamma
Microgrids (MGs) must have optimally sized storage and renewable energy sources to operate efficiently, economically, and reliably. MG may benefit from optimization techniques in their scheduling and sizing since they have a variety of energy sources with varying availability conditions and necessary costs. In this research, a novel modified spider monkey-based energy management system (MSM-EMS) has been proposed by increasing the photovoltaic (PV) or battery energy storage system (BESS) module capacity while minimizing grid connectivity dependency. The fundamental idea behind the proposed approach is greater dependability at the lowest feasible cost. By taking into account the BESS utilization factor and PV forced outage rates in a MG, the method becomes more realistic. Despite the absence of renewable energy sources and the grid, the proposed strategy provided critical loads according to schedule while maintaining reserve margins. Experimental findings demonstrate that the modified spider monkey optimization (MSMO)-based algorithm can determine the best BESS size and PV depending on cost. In comparison to particle swarm optimization (PSO) of $2756.1 and ABC of $2912.65, the ideal cost for EMS-MSMO is $2215.77 which is relatively low compared to the existing technique. As a result, the suggested MSMO algorithm and innovative energy management system has been optimized along with PV and battery dimensions.
Volume: 14
Issue: 3
Page: 356-365
Publish at: 2025-12-01

Crowdsourcing in Kazakhstan’s higher education in the system of dual education as predictor of universal competencies

10.11591/ijere.v14i6.32200
Mukhtar Tolegen , Botagoz Baimukhambetova , Irina Rovnyakova , Natalya Radchenko , Svetlana Sakhariyeva , Perizate Anafia
The rapid transformation of professional competencies and the emergence of new professions every 3-5 years have accentuated the quest for effective means to facilitate the process of predicting future universal competencies among university graduates. An empirical study was conducted in three stages: organizational, investigative, and analytical. The crowdsourcing process algorithm comprised information gathering, idea generation, filtering, and voting. The findings suggest the feasibility of applying crowdsourced forecasting in the educational sector, where a clear trend towards alignment with real sectors of the economy and constantly changing market business environment conditions is evident. Calculations revealed that consensus decision-making was achieved regarding competencies such as 3D modeling and computer graphics, multilingualism, emotional intelligence, project management competencies, legal literacy, neural networks and big data, intercultural communication, digital competencies, export potential of the agricultural sector, logistics outsourcing, systems thinking, virtual reality competencies, artificial intelligence proficiency, analytics, and critical thinking, as confirmed by the analysis of variance. Forecasts indicated a predominance of subject-specific competencies associated with the growing volatility of the Kazakhstani labor market. The formulated profile of future universal competency development serves as an additional guideline in the development of educational programs (EPs) in professional training directions. Modified crowdsourcing design and methodology for measuring results can be utilized or adapted for addressing other challenges facing the higher education system that require feedback.
Volume: 14
Issue: 6
Page: 4614-4627
Publish at: 2025-12-01

Optimization of maternal healthcare at the village level in reducing maternal mortality in Bali, Indonesia

10.11591/ijphs.v14i4.26820
Panca Dwi Prabawa , I Ketut Widnyana , Ni Putu Pandawani , Wayan Maba
Although maternal mortality rates in Bali have declined, the achievement remains below the government’s target, highlighting the need to strengthen the role of villages as the frontline of development. This study aims to identify alternative strategies to accelerate maternal mortality reduction by examining the supply of maternal healthcare services and the demand reflected in women’s utilization of these services at the village level. Using the analytic hierarchy process (AHP) to map accessibility across villages and servqual model to evaluate women’s perceptions of maternal healthcare services provided through integrated services post (posyandu) and village health post (Poskesdes), the study reveals significant disparities in accessibility across villages, particularly in Tabanan, Bangli, and Karangasem Regencies. While overall perceptions of healthcare quality are positive, the largest and most significant service quality gaps occur in tangibility and responsiveness. Based on these findings, the study recommends prioritizing villages with limited access to maternal healthcare services by ensuring health coverage for pregnant women from low-income households and guaranteeing the availability of midwives in villages through incentive schemes, while adopting community-based approaches to effectively reach migrant populations and improve their utilization of maternal healthcare services.
Volume: 14
Issue: 4
Page: 1765-1778
Publish at: 2025-12-01

Content validity of an innovative behavior rubric for polytechnic engineering students

10.11591/ijere.v14i6.33370
Nor Aisyah Che Derasid , Aede Hatib Musta’amal @ Jamal , Nornazira Suhairom , Hary Suswanto
In engineering education, fostering innovative behaviors is crucial for preparing students to tackle complex, real-world challenges. Developing an assessment tool or rubric that accurately measures innovative behavior is essential to provide educators with the means to systematically evaluate students’ innovative potential. This article mainly focuses on assessing the content validity of the innovative behavior assessment rubric, which is designed to measure the innovative behavior of engineering students. The rubric was designed around three core dimensions: problem recognition, idea generation, and idea implementation. Content validity was assessed using the item-level content validity index (I-CVI), scale-level content validity index (S-CVI), and modified kappa statistic. Expert evaluations resulted in a final 35-item rubric, with an overall S-CVI of 0.85, indicating high content validity. Items with I-CVI values below 0.70 were either revised or removed to ensure relevance and clarity. The study highlights the importance of expert judgment in the validation process and underscores the utility of both I-CVI and kappa in refining assessment tools. Future research will focus on construct and criterion validation, as well as practical application across diverse educational contexts.
Volume: 14
Issue: 6
Page: 4307-4319
Publish at: 2025-12-01

The level of scientific research skills of the biology students in the Philippines

10.11591/ijere.v14i6.34323
Chillet G. Credo , Justin Vianey M. Embalsado , Jed V. Madlambayan , Rich Paulo S. Lim , Maica S. Pineda , Ricardo C. Salunga , Arnel A. Diego , Tracy John A. Credo
Scientific research is essential in advancing human knowledge and in driving technological advancements. Students in the bachelor of science in biology program are expected to accomplish scientific research as a curriculum requirement. Possessing scientific research skills is essential for producing high-quality research outputs. A scale for assessing scientific research skills among senior high school students is available, however, there is an instrumentation gap in evaluating these skills at the tertiary level. In this regard, a research gap also exists in the assessment of students’ scientific research skills. Confirmatory factor analysis (CFA) using the JAMOVI software was utilized to establish the validity and reliability of the scientific research skill scale. The study included 133 officially enrolled biology students who voluntarily agreed to participate. The results provided compelling evidence that the tool effectively assesses scientific research skills in three key areas: scientific information development skills, scientific research management skills, and scientific research processing skills. This also affirmed the relevance of the three key areas in the biology program. The results also revealed that the level of scientific research skills of the students is on the average level across all three areas. This reflected an existing issue in the field of scientific research as mastery of skills is crucial in producing quality output, hence the study has significant implications for curriculum developers and policymakers of higher education institutions. There is a need to revisit the curriculum and to incorporate opportunities to enhance scientific research skills across various science subjects.
Volume: 14
Issue: 6
Page: 4517-4527
Publish at: 2025-12-01

Combining convolutional operators in unsupervised networks for kidney abnormalities

10.11591/ijai.v14.i6.pp4541-4551
Aekkarat Suksukont , Anuruk Prommakhot , Jakkree Srinonchat
Deep learning plays a pivotal role in advancing the diagnosis of renal dysfunction, achieving performance levels comparable to those of medical experts. However, disease domain variations and model differences can impact learning quality. To address renal dysfunction, we propose dual stream convolutional (DSC) and dual-input convolutional (DIC) for unsupervised learning. The proposed network is designed to process multi scale data and employs parallel data aggregation to enhance learning capabilities, improving the reliability of the experimental results. DSC achieved training losses of 0.0069, 0.0056, 0.0042, and 0.0048 for normal, cyst, stone, and tumor datasets, respectively, while DIC achieved losses of 0.0066, 0.0063, 0.0044, and 0.0058 for the same categories. The experimental results demonstrate that our proposed models outperform state of-the-art approaches, making them well-suited for broad application in clinical research studies.
Volume: 14
Issue: 6
Page: 4541-4551
Publish at: 2025-12-01

University students’ perceptions on developing constructivist learning approach in classroom settings

10.11591/ijere.v14i6.35117
Cuc Thi Doan , Tuan Van Vu , Ai Nhan Nguyen
This study investigated tertiary students’ perceptions regarding constructivist learning in the context of higher education in Vietnam. It aimed to examine the general perceptions of university students towards constructivist learning and the effects of constructivist learning on students’ learning outcomes. It also examined the conditions that make students more likely to embrace or resist these approaches. The study evaluated the engagement of students in problem-solving activities through the use of constructivist learning methods. A mixed-methods approach was employed, combining both quantitative and qualitative data. Specifically, the study involved a survey of 384 students from Hanoi Law University, using a researcher-made Likert-scale questionnaire and semi-structured interviews of 20 students from the sample. While descriptive and inferential statistics were used to analyze the quantitative data, the qualitative data were thematically analyzed for common themes and patterns. The results indicate that although the participants acknowledge the benefits of constructivist methods, particularly in fostering critical thinking and problem-solving, there is still uncertainty about their ability to engage in a self-directed learning approach. The findings suggest that while the constructivist approach has been recognized, practical efforts have not been made in teaching practices, teacher training, and assessment methods to create an interactive, student-centered learning environment in Vietnam.
Volume: 14
Issue: 6
Page: 4264-4275
Publish at: 2025-12-01

Multi-dimensional brand experiences in co-branded products across generations

10.11591/ijaas.v14.i4.pp1018-1027
Yana Erlyana , Lim Jing Yi
As consumer expectations evolve, brands are tasked with creating multifaceted experiences that resonate with different generations. This study examines the influence of sensory, affective, behavioral, and cognitive brand experiences on consumer perceptions of co-branded products, with a focus on two key cohorts: Generation Y (Gen Y) and Generation Z (Gen Z). A mixed-methods approach, integrating quantitative surveys and qualitative focus groups, was employed to gain deeper insights into generational differences in brand engagement. The findings reveal that Gen Y consumers prioritize emotional and behavioral experiences, seeking meaningful interactions and emotional connections that align with their values and life stages. In contrast, Gen Z consumers are more interested in sensory novelty and cognitive engagement, favoring brands that emphasize originality, digital interactions, and distinctive experiences. Both generations showed strong reactions to behavioral factors, particularly direct product interactions. These insights highlight the importance of tailoring brand experience strategies to the unique preferences of each generation. By embedding sensory, emotional, and cognitive elements into brand experiences, companies can create deeper emotional connections with consumers, enhance brand value, and build long-term loyalty. The results offer actionable strategies for brand managers seeking differentiation and sustainable success in today’s competitive market environment.
Volume: 14
Issue: 4
Page: 1018-1027
Publish at: 2025-12-01

Kannada handwritten numeral recognition through deep learning and optimized hyperparameter tuning

10.11591/ijai.v14.i6.pp5038-5048
Ujwala B. S. , Pramod Kumar S. , H. R. Mahadevaswamy , Sumathi K.
The classification of handwritten numerals is a vital and challenging task in developing automated systems, including postal address sorting and license plate recognition. The present study elucidates a new methodology for recognizing Kannada handwritten numerals using deep learning ResNet and VGG architecture with transfer learning. The challenge in Kannada handwritten recognition is complicated structural hierarchy and large vocabulary. The major problem in deep neural networks is vanishing gradient, which can lead to degradation in character recognition, and was addressed using our new methodology using ResNet architecture. We apply the proposed ResNet method in various real-world applications and compare it with convolutional neural networks (CNN) architecture, VGG. The experiment was implemented with the Google Colab software version on a self-created dataset, with handwritten Kannada numerals fed as the input to the recognition process. Our proposed method achieved a high accuracy of 99.20% on training samples and a generalization accuracy of 97.5% on test samples, indicating our method's effectiveness in recognizing handwritten Kannada numerals.
Volume: 14
Issue: 6
Page: 5038-5048
Publish at: 2025-12-01

Comparative evaluation of machine learning models for intrusion detection in WSNs using the IDSAI dataset

10.11591/ijai.v14.i6.pp4913-4922
Mansour Lmkaiti , Houda Moudni , Hicham Mouncif
This paper provides comparative assessment of three lightweight machine learning (ML) models (logistic regression (LR), random forest (RF), and gradient boosting (GB)), which are employed to detect intrusions in wireless sensor networks (WSNs) using the IDSAI dataset. The goal is to determine the most effective and deployable classifier within the constraints of WSN resources. In order to prevent data leakage and report accuracy, precision, recall, F1-score, and receiver operating characteristic-area under the curve (ROC-AUC) with mean±SD, we implement stratified 5-fold cross validation with in fold preprocessing. The results indicate that RF provides the most optimal generalization and overall performance (accuracy 0.9994 ± 0.0001, precision 0.9995±0.0001, recall 0.9994±0.0001, F1-score 0.9994±0.0001, ROC–AUC 0.9998 ± 0.0000). RF is closely followed by GB (accuracy 0.9990±0.0001, precision 0.9995±0.0001, recall 0.9985±0.0001, F1-score 0.9990 ± 0.0001, ROC-AUC ≈ 1.0000). LR demonstrates limitations in linearly overlapping classes, as evidenced by its high precision but reduced recall (accuracy 0.9167±0.0010, precision 0.9829±0.0002, recall 0.8481±0.0018, F1-score 0.9105 ± 0.0011, ROC–AUC 0.9707 ± 0.0001). In order to evaluate deployability, we characterize the inference throughput on a modest PC: LR ∼ 6.5 × 105 samples/s, GB ∼ 2.2 × 105 samples/s, and RF ∼ 1.3 × 105 samples/s, indicating a tiered intrusion detection system (IDS) (LR at sensors, RF at cluster-heads, and GB at the gateway). We also address the potential dangers of overfitting that may arise from the cleanliness of the dataset and provide a roadmap for future validation on a more diverse set of traffic. The research establishes a baseline for lightweight IDS in actual WSNs that is deployable and reproducible.
Volume: 14
Issue: 6
Page: 4913-4922
Publish at: 2025-12-01

Dynamic service-aware network selection framework for multi objective optimization in 5G-advanced heterogeneous wireless networks

10.11591/ijai.v14.i6.pp4993-5007
Bhavana Srinivas , Nadig Vijayendra Uma Reddy
The increasing complexity of heterogeneous wireless networks (HWNs) and the diverse requirements of mobility patterns and service classes necessitate advanced solutions for network selection and resource optimization. Existing models often fall short in addressing dynamic mobility scenarios and service differentiation, leading to inefficiencies in resource allocation, suboptimal throughput, and increased latency. To overcome these limitations, this study proposes a dynamic service-aware network selector (DSANS) framework for 5G-advanced environments. The framework integrates an adaptive deep decision network (ADDN) for multi-objective optimization, addressing critical quality of service (QoS) metrics such as throughput, delay, and energy efficiency while enhancing quality of experience (QoE) for applications like enhanced mobile broadband (eMBB), ultra-reliable low latency communication (URLLC), and internet of things (IoT). The DSANS framework dynamically adapts to mobility patterns and varying network conditions, ensuring efficient resource estimation and optimal network selection. Simulation results highlight its superiority, achieving up to 25% improvement in throughput and a 15% reduction in latency compared to state-of-the-art algorithms. These findings validate DSANS as a robust solution for mitigating the limitations of existing models, optimizing network performance, and meeting the stringent demands of next-generation HWNs.
Volume: 14
Issue: 6
Page: 4993-5007
Publish at: 2025-12-01

A review of driver distraction detection while driving based on convolutional neural networks

10.11591/ijai.v14.i6.pp4415-4426
Ghady Alhamad , Mohamad-Bassam Kurdy
Driver distraction represents a major cause of traffic accidents, posing a serious threat to human life. In this review, we present the latest research findings of driver distraction detection based on convolutional neural networks (CNNs). In general, the analysis of driver behavior while driving is represented by either detecting driver drowsiness or attention diversion from driving by other activities, all of which fall under the definition of driver distraction. Facial features are often the basis for detecting driver drowsiness. In most papers, it is typically done by eye blinking, yawning, and head movement. As for the driver attention diversion, it is through the position of the hand and face. It involves many activities, text messages, making phone calls, adjusting the radio, consuming beverages, reaching for objects behind the driver, applying makeup, interacting with passengers, and other similar distractions. However, suggesting new methodologies in driver distraction detection and choosing appropriate CNN-based techniques is a big challenge given the wide variety experiments and studies in this field. Therefore, previous papers should be revisited to produce new methods by taking advantage of the techniques used. As a result, this paper reviews research approaches and reveals the effectiveness of CNN in detecting driver distraction. Finally, the article lists techniques that can be used as benchmarks in this context.
Volume: 14
Issue: 6
Page: 4415-4426
Publish at: 2025-12-01
Show 82 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration