首页 > 最新文献

Indonesian Journal of Electrical Engineering and Computer Science最新文献

英文 中文
Inventory model having preservation technology with fix lifetime under two level trade credit policy 两级贸易信贷政策下具有固定寿命保存技术的库存模型
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp610-619
Deep Kamal Sharma, Ompal Singh
Supply-chain management involves moving storage supplies from origin to consumption, with manufacturers running production based on quadratic demand, distributors and retailers monitoring inventory. When a new product is released, demand often rises linearly and then declines dramatically when an alternative becomes available. Shortages are not allowed. Players' inventory will decrease at a rate of (1/(1+m-t)), where m is fixed lifetime, greater than the replenishment time. Deteriorating goods experience constant mass loss or usefulness, but preservation technology can help the damaged item to be consumed. Retailers with direct customer relationships can reduce stock spoilage through good warehouses. Manufacturers' storage systems have a higher deterioration rate. Two-tier trade credit financing is examined in this model. Distributors offer specific credit terms to stores, while manufacturers provide a grace period for invoicing. Distributors and retailers must pay interest on unsold inventories if invoices aren't settled on time. An integrated storage system reduces costs by minimizing costs through multiple shipments from manufacturers to distributors and retailers, and by adjusting replenishment times for each player. The resolution process is designed so that the supply chain operator gets the best possible decision. Therefore, results are authorized using mathematical examples for different scenarios. Management decisions are suggested.
供应链管理涉及将存储用品从原产地运送到消费地,生产商根据二次需求进行生产,分销商和零售商监控库存。当一种新产品发布时,需求往往呈线性上升,当有替代品出现时,需求又会急剧下降。不允许出现短缺。参与者的库存将以 (1/(1+m-t)) 的速度减少,其中 m 为固定寿命,大于补货时间。变质的商品会不断大量损耗或失去效用,但保存技术可以帮助损坏的商品被消耗掉。与客户有直接关系的零售商可以通过良好的仓库减少存货损耗。制造商的仓储系统变质率较高。本模型研究了两级贸易信贷融资。分销商向商店提供特定的信贷条件,而制造商则提供开具发票的宽限期。如果不按时结算发票,分销商和零售商必须为未售出的库存支付利息。综合仓储系统通过从制造商到分销商和零售商的多次装运,以及调整每个参与者的补货时间,最大限度地降低成本。解决流程的设计是为了让供应链操作员获得最佳决策。因此,我们使用数学实例对不同情况下的结果进行了授权。提出了管理决策建议。
{"title":"Inventory model having preservation technology with fix lifetime under two level trade credit policy","authors":"Deep Kamal Sharma, Ompal Singh","doi":"10.11591/ijeecs.v35.i1.pp610-619","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp610-619","url":null,"abstract":"Supply-chain management involves moving storage supplies from origin to consumption, with manufacturers running production based on quadratic demand, distributors and retailers monitoring inventory. When a new product is released, demand often rises linearly and then declines dramatically when an alternative becomes available. Shortages are not allowed. Players' inventory will decrease at a rate of (1/(1+m-t)), where m is fixed lifetime, greater than the replenishment time. Deteriorating goods experience constant mass loss or usefulness, but preservation technology can help the damaged item to be consumed. Retailers with direct customer relationships can reduce stock spoilage through good warehouses. Manufacturers' storage systems have a higher deterioration rate. Two-tier trade credit financing is examined in this model. Distributors offer specific credit terms to stores, while manufacturers provide a grace period for invoicing. Distributors and retailers must pay interest on unsold inventories if invoices aren't settled on time. An integrated storage system reduces costs by minimizing costs through multiple shipments from manufacturers to distributors and retailers, and by adjusting replenishment times for each player. The resolution process is designed so that the supply chain operator gets the best possible decision. Therefore, results are authorized using mathematical examples for different scenarios. Management decisions are suggested.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"223 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141692832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial intelligence powered internet of vehicles: securing connected vehicles in 6G 人工智能驱动的车联网:确保 6G 联网汽车的安全
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp213-221
D. R. Kumar Raja, Z. A. Abas, Chandra Sekhar Akula, Yellapalli Dileep Kumar, Goshtu Hemanth Kumar, Venappagari Eswari
The rapid advancements in automotive technology and the emergence of next-generation networks such as 5G and 6G are laying the foundation for the internet of vehicles (IoV), a revolutionary concept to transform transportation systems. The convergence of artificial intelligence (AI) and connected vehicles IoV is driving a paradigm shift in the transportation sector, especially in the dynamic framework of 5G and future 6G networks. This survey paper provides a thorough survey of the evolving AI-based IoV security landscape. We explore key areas of 5G/6G networks, focusing on the complex interplay of machine learning (ML) and deep learning (DL) in enhancing vehicle-to-everything (V2X) security and connected vehicles. Addressing the unique challenges of 6G, this paper outlines future directions for improving security and highlights open research issues. This comprehensive survey, which aims to provide information and guidance to both researchers and practitioners, contributes to a detailed understanding of the security issues associated with connected vehicles in the emerging 6G era.
汽车技术的飞速发展以及 5G 和 6G 等下一代网络的出现,为车联网(IoV)这一改变交通系统的革命性概念奠定了基础。人工智能(AI)和车联网 IoV 的融合正在推动交通领域的范式转变,尤其是在 5G 和未来 6G 网络的动态框架内。本调查报告对不断发展的基于人工智能的 IoV 安全形势进行了全面调查。我们探讨了 5G/6G 网络的关键领域,重点关注机器学习 (ML) 和深度学习 (DL) 在增强车对物 (V2X) 安全性和互联车辆方面的复杂相互作用。针对 6G 的独特挑战,本文概述了提高安全性的未来方向,并重点介绍了开放式研究课题。这项全面调查旨在为研究人员和从业人员提供信息和指导,有助于详细了解新兴 6G 时代与联网车辆相关的安全问题。
{"title":"Artificial intelligence powered internet of vehicles: securing connected vehicles in 6G","authors":"D. R. Kumar Raja, Z. A. Abas, Chandra Sekhar Akula, Yellapalli Dileep Kumar, Goshtu Hemanth Kumar, Venappagari Eswari","doi":"10.11591/ijeecs.v35.i1.pp213-221","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp213-221","url":null,"abstract":"The rapid advancements in automotive technology and the emergence of next-generation networks such as 5G and 6G are laying the foundation for the internet of vehicles (IoV), a revolutionary concept to transform transportation systems. The convergence of artificial intelligence (AI) and connected vehicles IoV is driving a paradigm shift in the transportation sector, especially in the dynamic framework of 5G and future 6G networks. This survey paper provides a thorough survey of the evolving AI-based IoV security landscape. We explore key areas of 5G/6G networks, focusing on the complex interplay of machine learning (ML) and deep learning (DL) in enhancing vehicle-to-everything (V2X) security and connected vehicles. Addressing the unique challenges of 6G, this paper outlines future directions for improving security and highlights open research issues. This comprehensive survey, which aims to provide information and guidance to both researchers and practitioners, contributes to a detailed understanding of the security issues associated with connected vehicles in the emerging 6G era.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"18 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review of intrusion detection system and security threat in internet of things enabled environment 入侵检测系统与物联网环境中的安全威胁综述
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp428-435
N. Nisha, N. S. Gill, P. Gulia
Thousands of devices communicate globally to share data and information without any human intervention. A network of physical objects with numerous sensors and other network hardware to exchange data with servers and additional devices that are linked is referred to as the "internet of things (IoT)”. The actions hurting the communication system are known as intrusions. Security features such as (integrity, and confidentiality) within IoT networks are compromised when any kind of intrusion occurs. To identify multiple infiltration types in an environment where IoT is enabled, an intrusion detection system (IDS) is required. In environments where IoT is enabled, security vulnerabilities are now more prevalent than ever. In this study, the IoT architecture is reviewed, and potential security risks at each tier are investigated. It is also hoped that this research will stimulate thought about the expanding risks posed by unprotected IoT devices. The paper also intends to provide an in-depth analysis of intrusion detection systems for identifying and classifying security threats in an IoT-enabled environment. Furthermore, this study investigates a variety of efficient machine learning-based methods for detecting cyberattacks on IoT devices.
数以千计的设备在全球范围内进行通信,共享数据和信息,无需任何人工干预。拥有大量传感器和其他网络硬件、可与服务器和其他相连设备交换数据的物理对象网络被称为 "物联网(IoT)"。伤害通信系统的行为被称为入侵。当发生任何形式的入侵时,物联网网络内的安全功能(完整性和保密性)都会受到损害。要在启用物联网的环境中识别多种入侵类型,就需要入侵检测系统(IDS)。在启用物联网的环境中,安全漏洞比以往任何时候都更加普遍。本研究回顾了物联网架构,并调查了各层次的潜在安全风险。本研究还希望能引发人们对未受保护的物联网设备所带来的不断扩大的风险的思考。本文还打算对入侵检测系统进行深入分析,以识别物联网环境中的安全威胁并对其进行分类。此外,本研究还探讨了多种基于机器学习的高效方法,用于检测物联网设备受到的网络攻击。
{"title":"A review of intrusion detection system and security threat in internet of things enabled environment","authors":"N. Nisha, N. S. Gill, P. Gulia","doi":"10.11591/ijeecs.v35.i1.pp428-435","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp428-435","url":null,"abstract":"Thousands of devices communicate globally to share data and information without any human intervention. A network of physical objects with numerous sensors and other network hardware to exchange data with servers and additional devices that are linked is referred to as the \"internet of things (IoT)”. The actions hurting the communication system are known as intrusions. Security features such as (integrity, and confidentiality) within IoT networks are compromised when any kind of intrusion occurs. To identify multiple infiltration types in an environment where IoT is enabled, an intrusion detection system (IDS) is required. In environments where IoT is enabled, security vulnerabilities are now more prevalent than ever. In this study, the IoT architecture is reviewed, and potential security risks at each tier are investigated. It is also hoped that this research will stimulate thought about the expanding risks posed by unprotected IoT devices. The paper also intends to provide an in-depth analysis of intrusion detection systems for identifying and classifying security threats in an IoT-enabled environment. Furthermore, this study investigates a variety of efficient machine learning-based methods for detecting cyberattacks on IoT devices.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"2002 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141707558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of an enhanced dual-band microstrip patch antenna with defected ground structures for WLAN and WiMax 为 WLAN 和 WiMax 设计带缺陷接地结构的增强型双频微带贴片天线
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp165-174
Mohamed Lemine El Issawi, Dominic Bernard Onyango Konditi, A. D. Usman
This research presents an innovative dual-band microstrip patch antenna design enhanced with defected ground structures (DGS) and barium strontium titanate (BST) thin film, tailored for wireless local area network (WLAN) and WiMax applications. The first design phase involved the development of an microstrip patch antenna (MPA) using an flame retardant (FR4) substrate with a permittivity (εr1) of 4.3 and a thickness of 1.524 mm, enhanced with DGS. This configuration achieved a single-band resonance at 4.1 GHz, with a bandwidth of 0.82 GHz and a return loss (S11) of -32 dB. The second phase involved the integration of a BST thin film, with a high permittivity(εr2) of 250 and a thickoness of 0.1 mm, into the DGS-enhanced microstrip patch antenna (MPA). This mdification led to a transformation in the antenna's performance, enabling dual-band operation at resonance frequencies of 2.8 GHz and 5.8 GHz. Further, there was a corresponding substantial increase in bandwidth to 1.34 GHz and 1.25 GHz, respectively, an improvement in S11 values to -16.3 dB and -21.4 dB. Moreover, and antenna’s size of 14×10×1.524 mm3 . The study underscores the critical role of innovative material use and design optimization in advancing antenna technology, offering significant enhancements in bandwidth, and miniaturization, for wireless communication systems.
本研究提出了一种创新的双频微带贴片天线设计,采用缺陷接地结构 (DGS) 和钛酸锶钡 (BST) 薄膜进行增强,适用于无线局域网 (WLAN) 和 WiMax 应用。第一设计阶段包括开发一种微带贴片天线(MPA),使用阻燃(FR4)基板,其介电常数(εr1)为 4.3,厚度为 1.524 毫米,并使用 DGS 增强。这种配置实现了 4.1 GHz 的单频共振,带宽为 0.82 GHz,回波损耗 (S11) 为 -32 dB。第二阶段是在 DGS 增强型微带贴片天线 (MPA) 中集成 BST 薄膜,该薄膜具有 250 的高介电常数(εr2)和 0.1 毫米的厚度。这种改进使天线的性能发生了变化,实现了在 2.8 GHz 和 5.8 GHz 共振频率下的双频工作。此外,带宽也相应大幅增加到 1.34 GHz 和 1.25 GHz,S11 值分别提高到 -16.3 dB 和 -21.4 dB。此外,天线尺寸为 14×10×1.524 立方毫米。这项研究强调了创新材料的使用和设计优化在推动天线技术发展中的关键作用,可显著提高无线通信系统的带宽和小型化。
{"title":"Design of an enhanced dual-band microstrip patch antenna with defected ground structures for WLAN and WiMax","authors":"Mohamed Lemine El Issawi, Dominic Bernard Onyango Konditi, A. D. Usman","doi":"10.11591/ijeecs.v35.i1.pp165-174","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp165-174","url":null,"abstract":"This research presents an innovative dual-band microstrip patch antenna design enhanced with defected ground structures (DGS) and barium strontium titanate (BST) thin film, tailored for wireless local area network (WLAN) and WiMax applications. The first design phase involved the development of an microstrip patch antenna (MPA) using an flame retardant (FR4) substrate with a permittivity (εr1) of 4.3 and a thickness of 1.524 mm, enhanced with DGS. This configuration achieved a single-band resonance at 4.1 GHz, with a bandwidth of 0.82 GHz and a return loss (S11) of -32 dB. The second phase involved the integration of a BST thin film, with a high permittivity(εr2) of 250 and a thickoness of 0.1 mm, into the DGS-enhanced microstrip patch antenna (MPA). This mdification led to a transformation in the antenna's performance, enabling dual-band operation at resonance frequencies of 2.8 GHz and 5.8 GHz. Further, there was a corresponding substantial increase in bandwidth to 1.34 GHz and 1.25 GHz, respectively, an improvement in S11 values to -16.3 dB and -21.4 dB. Moreover, and antenna’s size of 14×10×1.524 mm3 . The study underscores the critical role of innovative material use and design optimization in advancing antenna technology, offering significant enhancements in bandwidth, and miniaturization, for wireless communication systems.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"26 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141710525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breast cancer relapse disease prediction improvements with ensemble learning approaches 利用集合学习方法改进乳腺癌复发疾病预测
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp335-342
Ghanashyam Sahoo, Ajit Kumar Nayak, Pradyumna Kumar Tripathy, Abhilash Pati, Amrutanshu Panigrahi, Adyasha Rath, Bhimasen Moharana
Diagnosis and prognosis are especially difficult areas of medical research related to cancer due to the high incidence of breast cancer, which has surpassed all other cancers in terms of female mortality. Another factor that has a substantial influence on the quality of life of cancer patients is the fear that they may experience a relapse of their disease. The objective of the study is to give medical practitioners a more effective strategy for using ensemble learning techniques to forecast when breast cancer may recur. This research aimed to investigate the usage of deep neural networks (DNNs) and artificial neural networks (ANNs) in addition to machine learning (ML) based approaches, including bagging, averaging, and voting, to enhance the efficacy of breast cancer relapse diagnosis on two breast cancer relapse datasets. Results from the empirical study demonstrate that the proposed ensemble learning-enabled approach improves accuracies by 96.31% and 95.81%, precisions by 96.70% and 96.15%, sensitivities by 98.88% and 98.68%, specificities by 84.62% in both, F1-scores by 97.78% and 97.40%, and area under the curve (AUCs) of 0.987 and 0.978, with University Medical Centre, Institute of Oncology (UMCIO) and Wisconsin prognostic breast cancer (WPBC) datasets respectively. Consequently, these improved disease outcomes may encourage physicians to use this model to make better treatment choices.
由于乳腺癌发病率高,女性死亡率已超过所有其他癌症,因此诊断和预后是与癌症有关的医学研究中特别困难的领域。另一个对癌症患者生活质量产生重大影响的因素是他们对疾病复发的恐惧。本研究的目的是为医疗从业者提供一种更有效的策略,利用集合学习技术预测乳腺癌可能复发的时间。本研究旨在探讨在两个乳腺癌复发数据集上,除了基于机器学习(ML)的方法(包括套袋法、平均法和投票法)外,如何使用深度神经网络(DNN)和人工神经网络(ANN)来提高乳腺癌复发诊断的有效性。实证研究结果表明,所提出的集合学习方法使准确率分别提高了 96.31% 和 95.81%,精确度分别提高了 96.70% 和 96.15%,灵敏度分别提高了 98.88% 和 98.68%,特异性分别提高了 84.大学医学中心肿瘤研究所(UMCIO)和威斯康星预后乳腺癌(WPBC)数据集的 F1 分数分别为 97.78% 和 97.40%,曲线下面积(AUC)分别为 0.987 和 0.978。因此,这些改善的疾病预后可能会鼓励医生使用该模型做出更好的治疗选择。
{"title":"Breast cancer relapse disease prediction improvements with ensemble learning approaches","authors":"Ghanashyam Sahoo, Ajit Kumar Nayak, Pradyumna Kumar Tripathy, Abhilash Pati, Amrutanshu Panigrahi, Adyasha Rath, Bhimasen Moharana","doi":"10.11591/ijeecs.v35.i1.pp335-342","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp335-342","url":null,"abstract":"Diagnosis and prognosis are especially difficult areas of medical research related to cancer due to the high incidence of breast cancer, which has surpassed all other cancers in terms of female mortality. Another factor that has a substantial influence on the quality of life of cancer patients is the fear that they may experience a relapse of their disease. The objective of the study is to give medical practitioners a more effective strategy for using ensemble learning techniques to forecast when breast cancer may recur. This research aimed to investigate the usage of deep neural networks (DNNs) and artificial neural networks (ANNs) in addition to machine learning (ML) based approaches, including bagging, averaging, and voting, to enhance the efficacy of breast cancer relapse diagnosis on two breast cancer relapse datasets. Results from the empirical study demonstrate that the proposed ensemble learning-enabled approach improves accuracies by 96.31% and 95.81%, precisions by 96.70% and 96.15%, sensitivities by 98.88% and 98.68%, specificities by 84.62% in both, F1-scores by 97.78% and 97.40%, and area under the curve (AUCs) of 0.987 and 0.978, with University Medical Centre, Institute of Oncology (UMCIO) and Wisconsin prognostic breast cancer (WPBC) datasets respectively. Consequently, these improved disease outcomes may encourage physicians to use this model to make better treatment choices.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141713868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aspect term extraction from multi-source domain using enhanced latent Dirichlet allocation 利用增强型潜在 Dirichlet 分配从多源域提取特征词
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp475-484
R. Dhanal, V. R. Ghorpade
This study presents a comprehensive exploration of sentiment analysis across diverse domains through the introduction of a multi-source domain dataset encompassing hospitals, laptops, restaurants, cell phones, and electronics. Leveraging this extensive dataset, an enhanced latent Dirichlet allocation (E-LDA) model is proposed for topic modeling and aspect extraction, demonstrating superior performance with a remarkable coherence score of 0.5727. Comparative analyses with traditional LDA and other existing models showcase the efficacy of E-LDA in capturing sentiments and specific attributes within different domains. The extracted topics and aspects reveal valuable insights into domain-specific sentiments and aspects, contributing to the advancement of sentiment analysis methodologies. The findings underscore the significance of considering multi-source datasets for a more holistic understanding of sentiment in diverse text corpora.
本研究通过引入包含医院、笔记本电脑、餐馆、手机和电子产品在内的多源领域数据集,对不同领域的情感分析进行了全面探索。利用这个广泛的数据集,我们提出了一种用于主题建模和方面提取的增强型潜在 Dirichlet 分配(E-LDA)模型,该模型表现出卓越的性能,一致性得分高达 0.5727。与传统 LDA 和其他现有模型的对比分析表明,E-LDA 在捕捉不同领域中的情感和特定属性方面非常有效。提取的主题和方面揭示了特定领域情感和方面的宝贵见解,有助于情感分析方法的进步。研究结果强调了考虑多源数据集的重要性,以便更全面地了解不同文本语料库中的情感。
{"title":"Aspect term extraction from multi-source domain using enhanced latent Dirichlet allocation","authors":"R. Dhanal, V. R. Ghorpade","doi":"10.11591/ijeecs.v35.i1.pp475-484","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp475-484","url":null,"abstract":"This study presents a comprehensive exploration of sentiment analysis across diverse domains through the introduction of a multi-source domain dataset encompassing hospitals, laptops, restaurants, cell phones, and electronics. Leveraging this extensive dataset, an enhanced latent Dirichlet allocation (E-LDA) model is proposed for topic modeling and aspect extraction, demonstrating superior performance with a remarkable coherence score of 0.5727. Comparative analyses with traditional LDA and other existing models showcase the efficacy of E-LDA in capturing sentiments and specific attributes within different domains. The extracted topics and aspects reveal valuable insights into domain-specific sentiments and aspects, contributing to the advancement of sentiment analysis methodologies. The findings underscore the significance of considering multi-source datasets for a more holistic understanding of sentiment in diverse text corpora.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"125 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141711594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling deep learning powers: LSTM, BiLSTM, GRU, BiGRU, RNN comparison 揭开深度学习的神秘面纱:LSTM、BiLSTM、GRU、BiGRU、RNN 比较
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp263-273
Z. M. Shaikh, S. Ramadass
Deep learning algorithms have revolutionized various fields by achieving remarkable results in time series analysis. Among the different architectures, recurrent neural networks (RNNs) have played a significant role in sequential data processing. This study presents a comprehensive comparison of prominent RNN variants: long short-term memory (LSTM), Bidirectional LSTM (BiLSTM), gated recurrent unit (GRU), bidirectional GRU (BiGRU), and RNN, to analyze their respective strengths and weaknesses of national stock exchange India (NSEI). The Python application developed for this research aims to evaluate and determine the most effective algorithm among the variants. To conduct the evaluation, data from the public domain covering the period from 1/1/2004 to 30/06/2023 is collected. The dataset considers significant events such as demonetization, market crashes, the COVID-19 pandemic, downturns in the automobile sector, and rises in unemployment. Stocks from various sectors including banking, automobile, oil and gas, metal, and Pharma are selected for analysis. Finally, the results reveal that algorithm performance varies across different stocks. Specifically, in certain cases, BiLSTM outperforms, while in others, both BiGRU and LSTM are surpassed. Notably, the overall performance of simple RNN is consistently the lowest across all stocks.
深度学习算法在时间序列分析方面取得了令人瞩目的成果,为各个领域带来了革命性的变化。在不同的架构中,递归神经网络(RNN)在序列数据处理中发挥了重要作用。本研究全面比较了著名的 RNN 变体:长短期记忆 (LSTM)、双向 LSTM (BiLSTM)、门控递归单元 (GRU)、双向 GRU (BiGRU) 和 RNN,以分析它们在印度国家证券交易所 (NSEI) 中各自的优缺点。为本研究开发的 Python 应用程序旨在评估和确定这些变体中最有效的算法。为进行评估,收集了从 2004 年 1 月 1 日至 2023 年 6 月 30 日期间公共领域的数据。数据集考虑了一些重大事件,如非货币化、市场崩溃、COVID-19 大流行、汽车行业衰退和失业率上升。分析选取了银行、汽车、石油天然气、金属和医药等多个行业的股票。最后,分析结果表明,不同股票的算法性能各不相同。具体来说,在某些情况下,BiLSTM 的表现优于其他算法,而在其他情况下,BiGRU 和 LSTM 的表现都超过了其他算法。值得注意的是,在所有股票中,简单 RNN 的整体性能始终最低。
{"title":"Unveiling deep learning powers: LSTM, BiLSTM, GRU, BiGRU, RNN comparison","authors":"Z. M. Shaikh, S. Ramadass","doi":"10.11591/ijeecs.v35.i1.pp263-273","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp263-273","url":null,"abstract":"Deep learning algorithms have revolutionized various fields by achieving remarkable results in time series analysis. Among the different architectures, recurrent neural networks (RNNs) have played a significant role in sequential data processing. This study presents a comprehensive comparison of prominent RNN variants: long short-term memory (LSTM), Bidirectional LSTM (BiLSTM), gated recurrent unit (GRU), bidirectional GRU (BiGRU), and RNN, to analyze their respective strengths and weaknesses of national stock exchange India (NSEI). The Python application developed for this research aims to evaluate and determine the most effective algorithm among the variants. To conduct the evaluation, data from the public domain covering the period from 1/1/2004 to 30/06/2023 is collected. The dataset considers significant events such as demonetization, market crashes, the COVID-19 pandemic, downturns in the automobile sector, and rises in unemployment. Stocks from various sectors including banking, automobile, oil and gas, metal, and Pharma are selected for analysis. Finally, the results reveal that algorithm performance varies across different stocks. Specifically, in certain cases, BiLSTM outperforms, while in others, both BiGRU and LSTM are surpassed. Notably, the overall performance of simple RNN is consistently the lowest across all stocks.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"99 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141713594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing machine learning algorithm performance through feature selection for driver behavior classification 通过为驾驶员行为分类选择特征来提高机器学习算法性能
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp354-365
S. Bouhsissin, N. Sael, F. Benabbou, Abdelfettah Soultana
Machine learning (ML) techniques empower computers to learn from data and make predictions or decisions in various domains, while preprocessing methods assist in cleaning and transforming data before it can be effectively utilized by ML. Feature selection in ML is a critical process that significantly influences the performance and effectiveness of models. By carefully choosing the most relevant and informative attributes from the dataset, feature selection enhances model accuracy, reduces overfitting, and minimizes computational complexity. In this study, we leverage the UAH-DriveSet dataset to classify driver behavior, employing Filter, embedded, and wrapper methods encompassing 10 distinct feature selection techniques. Through the utilization of diverse ML algorithms, we effectively categorize driver behavior into normal, drowsy, and aggressive classes. The second objective is to employ feature selection techniques to pinpoint the most influential features impacting driver behavior. As a results, random forest emerges as the top-performing classifier, achieving an impressive accuracy of 96.4% and an F1-score of 96.36% using backward feature selection in 7.43 s, while K-nearest neighbour (K-NN) attains an accuracy of 96.29% with forward feature selection in 0.05 s. Following our comprehensive results, we deduce that the primary influential features for studying driver behavior include speed (km/h), course, yaw, impact time, road width, distance to the ahead vehicle, vehicle position, and number of detected vehicles.
机器学习(ML)技术赋予计算机从数据中学习并在不同领域做出预测或决策的能力,而预处理方法则有助于在 ML 有效利用数据之前对其进行清理和转换。人工智能中的特征选择是一个关键过程,对模型的性能和有效性有重大影响。通过从数据集中精心选择最相关、信息量最大的属性,特征选择可以提高模型的准确性,减少过拟合,并最大限度地降低计算复杂度。在本研究中,我们利用 UAH-DriveSet 数据集对驾驶员行为进行分类,采用了包含 10 种不同特征选择技术的过滤法、嵌入法和包装法。通过使用不同的 ML 算法,我们有效地将驾驶员行为分为正常、昏昏欲睡和激进三个类别。第二个目标是采用特征选择技术,找出对驾驶员行为影响最大的特征。根据综合结果,我们推断出研究驾驶员行为的主要影响特征包括速度(km/h)、路线、偏航、撞击时间、道路宽度、与前方车辆的距离、车辆位置和检测到的车辆数量。
{"title":"Enhancing machine learning algorithm performance through feature selection for driver behavior classification","authors":"S. Bouhsissin, N. Sael, F. Benabbou, Abdelfettah Soultana","doi":"10.11591/ijeecs.v35.i1.pp354-365","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp354-365","url":null,"abstract":"Machine learning (ML) techniques empower computers to learn from data and make predictions or decisions in various domains, while preprocessing methods assist in cleaning and transforming data before it can be effectively utilized by ML. Feature selection in ML is a critical process that significantly influences the performance and effectiveness of models. By carefully choosing the most relevant and informative attributes from the dataset, feature selection enhances model accuracy, reduces overfitting, and minimizes computational complexity. In this study, we leverage the UAH-DriveSet dataset to classify driver behavior, employing Filter, embedded, and wrapper methods encompassing 10 distinct feature selection techniques. Through the utilization of diverse ML algorithms, we effectively categorize driver behavior into normal, drowsy, and aggressive classes. The second objective is to employ feature selection techniques to pinpoint the most influential features impacting driver behavior. As a results, random forest emerges as the top-performing classifier, achieving an impressive accuracy of 96.4% and an F1-score of 96.36% using backward feature selection in 7.43 s, while K-nearest neighbour (K-NN) attains an accuracy of 96.29% with forward feature selection in 0.05 s. Following our comprehensive results, we deduce that the primary influential features for studying driver behavior include speed (km/h), course, yaw, impact time, road width, distance to the ahead vehicle, vehicle position, and number of detected vehicles.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"95 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141695710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of BaTiO3-doped Bi2O3/ZnO varistor microstructure and its electrical characteristics 掺杂 BaTiO3 的 Bi2O3/ZnO 变阻器微观结构及其电气特性研究
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp42-51
Faiçal Kharchouche, Yousra Malaoui, O. Bouketir
This study presents the characterization and optimization of BaTiO3-doped ZnO-based varistors for electrical and electronic applications. The varistors were prepared using a conventional ceramic procedure and were sintered at a temperature of 1,000 °C with different concentrations of BaTiO3 (0 and 3 mol%) added to the Bi2O3/ZnO-based varistor composition (99.5 mol% ZnO and 0.5 mol% Bi2O3). The results showed that the addition of BaTiO3 led to the formation of various oxides and solid solutions, such as Bi12TiO20, BaTiO3, and (Bi2O3)0.80 (BaO)0.20. The dielectric constant and grain size decreased with increasing BaTiO3 content, while the non-linearity coefficient, electric fields (Eb) increased, and dielectric loss (Tanδ) decreased. The optimized varistor contains 2 mol% BaTiO3 and an electric field of 148.08 V/mm, which are superior to those of the BaTiO3/Bi2O3/ZnO-based varistor. During this study, we were able to observe that a slight addition of BaTiO3 will increase the breakdown voltage and the coefficient of nonlinearity and this will allow us to develop low-dimensional varistors and install them in the high-voltage domain.
本研究介绍了用于电气和电子应用的掺杂 BaTiO3 的氧化锌基压敏电阻的表征和优化。变阻器采用传统陶瓷程序制备,并在 1,000 °C 温度下烧结,在 Bi2O3/ZnO 基变阻器成分(99.5 摩尔 ZnO 和 0.5 摩尔 Bi2O3)中添加了不同浓度的 BaTiO3(0 和 3 摩尔%)。结果表明,加入 BaTiO3 后形成了各种氧化物和固溶体,如 Bi12TiO20、BaTiO3 和 (Bi2O3)0.80 (BaO)0.20。随着 BaTiO3 含量的增加,介电常数和晶粒尺寸减小,而非线性系数、电场(Eb)增加,介电损耗(Tanδ)减小。优化后的变阻器含有 2 mol% 的 BaTiO3,电场为 148.08 V/mm,优于基于 BaTiO3/Bi2O3/ZnO 的变阻器。在这项研究中,我们观察到少量添加 BaTiO3 就能提高击穿电压和非线性系数,这将使我们能够开发低维变阻器,并将其应用于高压领域。
{"title":"Study of BaTiO3-doped Bi2O3/ZnO varistor microstructure and its electrical characteristics","authors":"Faiçal Kharchouche, Yousra Malaoui, O. Bouketir","doi":"10.11591/ijeecs.v35.i1.pp42-51","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp42-51","url":null,"abstract":"This study presents the characterization and optimization of BaTiO<sub>3</sub>-doped ZnO-based varistors for electrical and electronic applications. The varistors were prepared using a conventional ceramic procedure and were sintered at a temperature of 1,000 °C with different concentrations of BaTiO<sub>3</sub> (0 and 3 mol%) added to the Bi<sub>2</sub>O<sub>3</sub>/ZnO-based varistor composition (99.5 mol% ZnO and 0.5 mol% Bi<sub>2</sub>O<sub>3</sub>). The results showed that the addition of BaTiO<sub>3</sub> led to the formation of various oxides and solid solutions, such as Bi1<sub>2</sub>TiO<sub>20</sub>, BaTiO<sub>3</sub>, and (Bi<sub>2</sub>O<sub>3</sub>)<sub>0.80</sub> (BaO)<sub>0.20</sub>. The dielectric constant and grain size decreased with increasing BaTiO<sub>3</sub> content, while the non-linearity coefficient, electric fields (Eb) increased, and dielectric loss (Tanδ) decreased. The optimized varistor contains 2 mol% BaTiO<sub>3</sub> and an electric field of 148.08 V/mm, which are superior to those of the BaTiO<sub>3</sub>/Bi<sub>2</sub>O<sub>3</sub>/ZnO-based varistor. During this study, we were able to observe that a slight addition of BaTiO<sub>3</sub> will increase the breakdown voltage and the coefficient of nonlinearity and this will allow us to develop low-dimensional varistors and install them in the high-voltage domain.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"21 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141710054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automating cloud virtual machines allocation via machine learning 通过机器学习自动分配云虚拟机
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp191-202
F. Kamoun-Abid, Hounaida Frikha, Amel Meddeb-Makhoulf, F. Zarai
In the realm of healthcare applications leveraging cloud technology, ongoing progress is evident, yet current approaches are rigid and fail to adapt to the dynamic environment, particularly when network and virtual machine (VM) resources undergo modifications mid-execution. Health data is stored and processed in the cloud as virtual resources supported by numerous VMs, necessitating critical optimization of virtual node and data placement to enhance data application processing time. Network security poses a significant challenge in the cloud due to the dynamic nature of the topology, hindering traditional firewalls’ ability to inspect packet contents and leaving the network vulnerable to potential threats. To address this, we propose dividing the cloud topology into zones, each monitored by a controller to oversee individual VMs under firewall protection, a framework termed divided-cloud, aiming to minimize network congestion while strategically placing new VMs. Employing machine learning (ML) techniques, such as decision tree (DT) and linear discriminant analysis (LDA), we achieved improved accuracy rates for adding new controllers, reaching a maximum of 89%, and used the K-neighbours classifier method to determine optimal locations for new VMs, achieving an accuracy of 83%.
在利用云技术的医疗保健应用领域,取得的进展是显而易见的,但目前的方法比较僵化,无法适应动态环境,特别是当网络和虚拟机(VM)资源在执行过程中发生修改时。健康数据作为由众多虚拟机支持的虚拟资源在云中存储和处理,因此有必要对虚拟节点和数据位置进行关键优化,以延长数据应用的处理时间。由于拓扑结构的动态性,网络安全在云中构成了巨大挑战,阻碍了传统防火墙检查数据包内容的能力,使网络容易受到潜在威胁。为解决这一问题,我们建议将云拓扑结构划分为若干区域,每个区域由一个控制器监控,以监督受防火墙保护的单个虚拟机,这一框架被称为 "分割云"(divided-cloud),旨在最大限度地减少网络拥塞,同时战略性地放置新的虚拟机。利用机器学习(ML)技术,如决策树(DT)和线性判别分析(LDA),我们提高了添加新控制器的准确率,最高达到 89%,并使用 K-neighbours 分类器方法确定新虚拟机的最佳位置,准确率达到 83%。
{"title":"Automating cloud virtual machines allocation via machine learning","authors":"F. Kamoun-Abid, Hounaida Frikha, Amel Meddeb-Makhoulf, F. Zarai","doi":"10.11591/ijeecs.v35.i1.pp191-202","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp191-202","url":null,"abstract":"In the realm of healthcare applications leveraging cloud technology, ongoing progress is evident, yet current approaches are rigid and fail to adapt to the dynamic environment, particularly when network and virtual machine (VM) resources undergo modifications mid-execution. Health data is stored and processed in the cloud as virtual resources supported by numerous VMs, necessitating critical optimization of virtual node and data placement to enhance data application processing time. Network security poses a significant challenge in the cloud due to the dynamic nature of the topology, hindering traditional firewalls’ ability to inspect packet contents and leaving the network vulnerable to potential threats. To address this, we propose dividing the cloud topology into zones, each monitored by a controller to oversee individual VMs under firewall protection, a framework termed divided-cloud, aiming to minimize network congestion while strategically placing new VMs. Employing machine learning (ML) techniques, such as decision tree (DT) and linear discriminant analysis (LDA), we achieved improved accuracy rates for adding new controllers, reaching a maximum of 89%, and used the K-neighbours classifier method to determine optimal locations for new VMs, achieving an accuracy of 83%.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141705750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Indonesian Journal of Electrical Engineering and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1