Pub Date : 2024-07-01DOI: 10.11591/ijeecs.v35.i1.pp475-484
R. Dhanal, V. R. Ghorpade
This study presents a comprehensive exploration of sentiment analysis across diverse domains through the introduction of a multi-source domain dataset encompassing hospitals, laptops, restaurants, cell phones, and electronics. Leveraging this extensive dataset, an enhanced latent Dirichlet allocation (E-LDA) model is proposed for topic modeling and aspect extraction, demonstrating superior performance with a remarkable coherence score of 0.5727. Comparative analyses with traditional LDA and other existing models showcase the efficacy of E-LDA in capturing sentiments and specific attributes within different domains. The extracted topics and aspects reveal valuable insights into domain-specific sentiments and aspects, contributing to the advancement of sentiment analysis methodologies. The findings underscore the significance of considering multi-source datasets for a more holistic understanding of sentiment in diverse text corpora.
{"title":"Aspect term extraction from multi-source domain using enhanced latent Dirichlet allocation","authors":"R. Dhanal, V. R. Ghorpade","doi":"10.11591/ijeecs.v35.i1.pp475-484","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp475-484","url":null,"abstract":"This study presents a comprehensive exploration of sentiment analysis across diverse domains through the introduction of a multi-source domain dataset encompassing hospitals, laptops, restaurants, cell phones, and electronics. Leveraging this extensive dataset, an enhanced latent Dirichlet allocation (E-LDA) model is proposed for topic modeling and aspect extraction, demonstrating superior performance with a remarkable coherence score of 0.5727. Comparative analyses with traditional LDA and other existing models showcase the efficacy of E-LDA in capturing sentiments and specific attributes within different domains. The extracted topics and aspects reveal valuable insights into domain-specific sentiments and aspects, contributing to the advancement of sentiment analysis methodologies. The findings underscore the significance of considering multi-source datasets for a more holistic understanding of sentiment in diverse text corpora.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"125 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141711594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.11591/ijeecs.v35.i1.pp1-13
Anil Kumar Dharavatu, Srinu Naik Ramavathu
The rapid increase of environmental impacts together global warming is conquered by substantial selection of electric-vehicles (EV’s) over the internal-combustion engine (ICE) vehicles. The replacement of these vehicles in transportation industry has led to reducing the running cost, ecological emissions, vehicle maintenance. The EV’s are operated by available battery energy and energized through utility-grid integrated EV charging stations. It is noted that, such charging stations may introduce power-quality issues, highly impacting the electric-grid due to presence of power electronic conversion devices in EV charging stations. The primary emphasis of power-quality impacts on electrical distribution grid are counteracted by employing active universal power-quality conditioner (AUPQC) device. The main role of AUPQC has been selected for mitigation of various PQ problems on both electric-grid side and charging station by using feasible control objective. In this work, a novel generalized voltage-current reference (GVCR) control objective has been proposed for extraction of fundamental reference voltage-current signals. The key findings are simple mathematical notations, no transformations, fast response, low dv/dt switch stress, low switching loss and maximum efficiency. The main goal is design, operation and performance of proposed GVCR controlled AUPQC device has been validated under integration of various EV chargers to electric-grid by using MATLAB/Simulink computing tool, simulation results are presented for analysis and interpretation.
{"title":"PQ enhancement in grid connected EV charging station using novel GVCR control algorithm for AUPQC device","authors":"Anil Kumar Dharavatu, Srinu Naik Ramavathu","doi":"10.11591/ijeecs.v35.i1.pp1-13","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp1-13","url":null,"abstract":"The rapid increase of environmental impacts together global warming is conquered by substantial selection of electric-vehicles (EV’s) over the internal-combustion engine (ICE) vehicles. The replacement of these vehicles in transportation industry has led to reducing the running cost, ecological emissions, vehicle maintenance. The EV’s are operated by available battery energy and energized through utility-grid integrated EV charging stations. It is noted that, such charging stations may introduce power-quality issues, highly impacting the electric-grid due to presence of power electronic conversion devices in EV charging stations. The primary emphasis of power-quality impacts on electrical distribution grid are counteracted by employing active universal power-quality conditioner (AUPQC) device. The main role of AUPQC has been selected for mitigation of various PQ problems on both electric-grid side and charging station by using feasible control objective. In this work, a novel generalized voltage-current reference (GVCR) control objective has been proposed for extraction of fundamental reference voltage-current signals. The key findings are simple mathematical notations, no transformations, fast response, low dv/dt switch stress, low switching loss and maximum efficiency. The main goal is design, operation and performance of proposed GVCR controlled AUPQC device has been validated under integration of various EV chargers to electric-grid by using MATLAB/Simulink computing tool, simulation results are presented for analysis and interpretation.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"89 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.11591/ijeecs.v35.i1.pp213-221
D. R. Kumar Raja, Z. A. Abas, Chandra Sekhar Akula, Yellapalli Dileep Kumar, Goshtu Hemanth Kumar, Venappagari Eswari
The rapid advancements in automotive technology and the emergence of next-generation networks such as 5G and 6G are laying the foundation for the internet of vehicles (IoV), a revolutionary concept to transform transportation systems. The convergence of artificial intelligence (AI) and connected vehicles IoV is driving a paradigm shift in the transportation sector, especially in the dynamic framework of 5G and future 6G networks. This survey paper provides a thorough survey of the evolving AI-based IoV security landscape. We explore key areas of 5G/6G networks, focusing on the complex interplay of machine learning (ML) and deep learning (DL) in enhancing vehicle-to-everything (V2X) security and connected vehicles. Addressing the unique challenges of 6G, this paper outlines future directions for improving security and highlights open research issues. This comprehensive survey, which aims to provide information and guidance to both researchers and practitioners, contributes to a detailed understanding of the security issues associated with connected vehicles in the emerging 6G era.
{"title":"Artificial intelligence powered internet of vehicles: securing connected vehicles in 6G","authors":"D. R. Kumar Raja, Z. A. Abas, Chandra Sekhar Akula, Yellapalli Dileep Kumar, Goshtu Hemanth Kumar, Venappagari Eswari","doi":"10.11591/ijeecs.v35.i1.pp213-221","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp213-221","url":null,"abstract":"The rapid advancements in automotive technology and the emergence of next-generation networks such as 5G and 6G are laying the foundation for the internet of vehicles (IoV), a revolutionary concept to transform transportation systems. The convergence of artificial intelligence (AI) and connected vehicles IoV is driving a paradigm shift in the transportation sector, especially in the dynamic framework of 5G and future 6G networks. This survey paper provides a thorough survey of the evolving AI-based IoV security landscape. We explore key areas of 5G/6G networks, focusing on the complex interplay of machine learning (ML) and deep learning (DL) in enhancing vehicle-to-everything (V2X) security and connected vehicles. Addressing the unique challenges of 6G, this paper outlines future directions for improving security and highlights open research issues. This comprehensive survey, which aims to provide information and guidance to both researchers and practitioners, contributes to a detailed understanding of the security issues associated with connected vehicles in the emerging 6G era.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"18 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.11591/ijeecs.v35.i1.pp610-619
Deep Kamal Sharma, Ompal Singh
Supply-chain management involves moving storage supplies from origin to consumption, with manufacturers running production based on quadratic demand, distributors and retailers monitoring inventory. When a new product is released, demand often rises linearly and then declines dramatically when an alternative becomes available. Shortages are not allowed. Players' inventory will decrease at a rate of (1/(1+m-t)), where m is fixed lifetime, greater than the replenishment time. Deteriorating goods experience constant mass loss or usefulness, but preservation technology can help the damaged item to be consumed. Retailers with direct customer relationships can reduce stock spoilage through good warehouses. Manufacturers' storage systems have a higher deterioration rate. Two-tier trade credit financing is examined in this model. Distributors offer specific credit terms to stores, while manufacturers provide a grace period for invoicing. Distributors and retailers must pay interest on unsold inventories if invoices aren't settled on time. An integrated storage system reduces costs by minimizing costs through multiple shipments from manufacturers to distributors and retailers, and by adjusting replenishment times for each player. The resolution process is designed so that the supply chain operator gets the best possible decision. Therefore, results are authorized using mathematical examples for different scenarios. Management decisions are suggested.
供应链管理涉及将存储用品从原产地运送到消费地,生产商根据二次需求进行生产,分销商和零售商监控库存。当一种新产品发布时,需求往往呈线性上升,当有替代品出现时,需求又会急剧下降。不允许出现短缺。参与者的库存将以 (1/(1+m-t)) 的速度减少,其中 m 为固定寿命,大于补货时间。变质的商品会不断大量损耗或失去效用,但保存技术可以帮助损坏的商品被消耗掉。与客户有直接关系的零售商可以通过良好的仓库减少存货损耗。制造商的仓储系统变质率较高。本模型研究了两级贸易信贷融资。分销商向商店提供特定的信贷条件,而制造商则提供开具发票的宽限期。如果不按时结算发票,分销商和零售商必须为未售出的库存支付利息。综合仓储系统通过从制造商到分销商和零售商的多次装运,以及调整每个参与者的补货时间,最大限度地降低成本。解决流程的设计是为了让供应链操作员获得最佳决策。因此,我们使用数学实例对不同情况下的结果进行了授权。提出了管理决策建议。
{"title":"Inventory model having preservation technology with fix lifetime under two level trade credit policy","authors":"Deep Kamal Sharma, Ompal Singh","doi":"10.11591/ijeecs.v35.i1.pp610-619","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp610-619","url":null,"abstract":"Supply-chain management involves moving storage supplies from origin to consumption, with manufacturers running production based on quadratic demand, distributors and retailers monitoring inventory. When a new product is released, demand often rises linearly and then declines dramatically when an alternative becomes available. Shortages are not allowed. Players' inventory will decrease at a rate of (1/(1+m-t)), where m is fixed lifetime, greater than the replenishment time. Deteriorating goods experience constant mass loss or usefulness, but preservation technology can help the damaged item to be consumed. Retailers with direct customer relationships can reduce stock spoilage through good warehouses. Manufacturers' storage systems have a higher deterioration rate. Two-tier trade credit financing is examined in this model. Distributors offer specific credit terms to stores, while manufacturers provide a grace period for invoicing. Distributors and retailers must pay interest on unsold inventories if invoices aren't settled on time. An integrated storage system reduces costs by minimizing costs through multiple shipments from manufacturers to distributors and retailers, and by adjusting replenishment times for each player. The resolution process is designed so that the supply chain operator gets the best possible decision. Therefore, results are authorized using mathematical examples for different scenarios. Management decisions are suggested.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"223 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141692832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.11591/ijeecs.v35.i1.pp428-435
N. Nisha, N. S. Gill, P. Gulia
Thousands of devices communicate globally to share data and information without any human intervention. A network of physical objects with numerous sensors and other network hardware to exchange data with servers and additional devices that are linked is referred to as the "internet of things (IoT)”. The actions hurting the communication system are known as intrusions. Security features such as (integrity, and confidentiality) within IoT networks are compromised when any kind of intrusion occurs. To identify multiple infiltration types in an environment where IoT is enabled, an intrusion detection system (IDS) is required. In environments where IoT is enabled, security vulnerabilities are now more prevalent than ever. In this study, the IoT architecture is reviewed, and potential security risks at each tier are investigated. It is also hoped that this research will stimulate thought about the expanding risks posed by unprotected IoT devices. The paper also intends to provide an in-depth analysis of intrusion detection systems for identifying and classifying security threats in an IoT-enabled environment. Furthermore, this study investigates a variety of efficient machine learning-based methods for detecting cyberattacks on IoT devices.
{"title":"A review of intrusion detection system and security threat in internet of things enabled environment","authors":"N. Nisha, N. S. Gill, P. Gulia","doi":"10.11591/ijeecs.v35.i1.pp428-435","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp428-435","url":null,"abstract":"Thousands of devices communicate globally to share data and information without any human intervention. A network of physical objects with numerous sensors and other network hardware to exchange data with servers and additional devices that are linked is referred to as the \"internet of things (IoT)”. The actions hurting the communication system are known as intrusions. Security features such as (integrity, and confidentiality) within IoT networks are compromised when any kind of intrusion occurs. To identify multiple infiltration types in an environment where IoT is enabled, an intrusion detection system (IDS) is required. In environments where IoT is enabled, security vulnerabilities are now more prevalent than ever. In this study, the IoT architecture is reviewed, and potential security risks at each tier are investigated. It is also hoped that this research will stimulate thought about the expanding risks posed by unprotected IoT devices. The paper also intends to provide an in-depth analysis of intrusion detection systems for identifying and classifying security threats in an IoT-enabled environment. Furthermore, this study investigates a variety of efficient machine learning-based methods for detecting cyberattacks on IoT devices.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"2002 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141707558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diagnosis and prognosis are especially difficult areas of medical research related to cancer due to the high incidence of breast cancer, which has surpassed all other cancers in terms of female mortality. Another factor that has a substantial influence on the quality of life of cancer patients is the fear that they may experience a relapse of their disease. The objective of the study is to give medical practitioners a more effective strategy for using ensemble learning techniques to forecast when breast cancer may recur. This research aimed to investigate the usage of deep neural networks (DNNs) and artificial neural networks (ANNs) in addition to machine learning (ML) based approaches, including bagging, averaging, and voting, to enhance the efficacy of breast cancer relapse diagnosis on two breast cancer relapse datasets. Results from the empirical study demonstrate that the proposed ensemble learning-enabled approach improves accuracies by 96.31% and 95.81%, precisions by 96.70% and 96.15%, sensitivities by 98.88% and 98.68%, specificities by 84.62% in both, F1-scores by 97.78% and 97.40%, and area under the curve (AUCs) of 0.987 and 0.978, with University Medical Centre, Institute of Oncology (UMCIO) and Wisconsin prognostic breast cancer (WPBC) datasets respectively. Consequently, these improved disease outcomes may encourage physicians to use this model to make better treatment choices.
{"title":"Breast cancer relapse disease prediction improvements with ensemble learning approaches","authors":"Ghanashyam Sahoo, Ajit Kumar Nayak, Pradyumna Kumar Tripathy, Abhilash Pati, Amrutanshu Panigrahi, Adyasha Rath, Bhimasen Moharana","doi":"10.11591/ijeecs.v35.i1.pp335-342","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp335-342","url":null,"abstract":"Diagnosis and prognosis are especially difficult areas of medical research related to cancer due to the high incidence of breast cancer, which has surpassed all other cancers in terms of female mortality. Another factor that has a substantial influence on the quality of life of cancer patients is the fear that they may experience a relapse of their disease. The objective of the study is to give medical practitioners a more effective strategy for using ensemble learning techniques to forecast when breast cancer may recur. This research aimed to investigate the usage of deep neural networks (DNNs) and artificial neural networks (ANNs) in addition to machine learning (ML) based approaches, including bagging, averaging, and voting, to enhance the efficacy of breast cancer relapse diagnosis on two breast cancer relapse datasets. Results from the empirical study demonstrate that the proposed ensemble learning-enabled approach improves accuracies by 96.31% and 95.81%, precisions by 96.70% and 96.15%, sensitivities by 98.88% and 98.68%, specificities by 84.62% in both, F1-scores by 97.78% and 97.40%, and area under the curve (AUCs) of 0.987 and 0.978, with University Medical Centre, Institute of Oncology (UMCIO) and Wisconsin prognostic breast cancer (WPBC) datasets respectively. Consequently, these improved disease outcomes may encourage physicians to use this model to make better treatment choices.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141713868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.11591/ijeecs.v35.i1.pp263-273
Z. M. Shaikh, S. Ramadass
Deep learning algorithms have revolutionized various fields by achieving remarkable results in time series analysis. Among the different architectures, recurrent neural networks (RNNs) have played a significant role in sequential data processing. This study presents a comprehensive comparison of prominent RNN variants: long short-term memory (LSTM), Bidirectional LSTM (BiLSTM), gated recurrent unit (GRU), bidirectional GRU (BiGRU), and RNN, to analyze their respective strengths and weaknesses of national stock exchange India (NSEI). The Python application developed for this research aims to evaluate and determine the most effective algorithm among the variants. To conduct the evaluation, data from the public domain covering the period from 1/1/2004 to 30/06/2023 is collected. The dataset considers significant events such as demonetization, market crashes, the COVID-19 pandemic, downturns in the automobile sector, and rises in unemployment. Stocks from various sectors including banking, automobile, oil and gas, metal, and Pharma are selected for analysis. Finally, the results reveal that algorithm performance varies across different stocks. Specifically, in certain cases, BiLSTM outperforms, while in others, both BiGRU and LSTM are surpassed. Notably, the overall performance of simple RNN is consistently the lowest across all stocks.
{"title":"Unveiling deep learning powers: LSTM, BiLSTM, GRU, BiGRU, RNN comparison","authors":"Z. M. Shaikh, S. Ramadass","doi":"10.11591/ijeecs.v35.i1.pp263-273","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp263-273","url":null,"abstract":"Deep learning algorithms have revolutionized various fields by achieving remarkable results in time series analysis. Among the different architectures, recurrent neural networks (RNNs) have played a significant role in sequential data processing. This study presents a comprehensive comparison of prominent RNN variants: long short-term memory (LSTM), Bidirectional LSTM (BiLSTM), gated recurrent unit (GRU), bidirectional GRU (BiGRU), and RNN, to analyze their respective strengths and weaknesses of national stock exchange India (NSEI). The Python application developed for this research aims to evaluate and determine the most effective algorithm among the variants. To conduct the evaluation, data from the public domain covering the period from 1/1/2004 to 30/06/2023 is collected. The dataset considers significant events such as demonetization, market crashes, the COVID-19 pandemic, downturns in the automobile sector, and rises in unemployment. Stocks from various sectors including banking, automobile, oil and gas, metal, and Pharma are selected for analysis. Finally, the results reveal that algorithm performance varies across different stocks. Specifically, in certain cases, BiLSTM outperforms, while in others, both BiGRU and LSTM are surpassed. Notably, the overall performance of simple RNN is consistently the lowest across all stocks.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"99 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141713594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.11591/ijeecs.v35.i1.pp354-365
S. Bouhsissin, N. Sael, F. Benabbou, Abdelfettah Soultana
Machine learning (ML) techniques empower computers to learn from data and make predictions or decisions in various domains, while preprocessing methods assist in cleaning and transforming data before it can be effectively utilized by ML. Feature selection in ML is a critical process that significantly influences the performance and effectiveness of models. By carefully choosing the most relevant and informative attributes from the dataset, feature selection enhances model accuracy, reduces overfitting, and minimizes computational complexity. In this study, we leverage the UAH-DriveSet dataset to classify driver behavior, employing Filter, embedded, and wrapper methods encompassing 10 distinct feature selection techniques. Through the utilization of diverse ML algorithms, we effectively categorize driver behavior into normal, drowsy, and aggressive classes. The second objective is to employ feature selection techniques to pinpoint the most influential features impacting driver behavior. As a results, random forest emerges as the top-performing classifier, achieving an impressive accuracy of 96.4% and an F1-score of 96.36% using backward feature selection in 7.43 s, while K-nearest neighbour (K-NN) attains an accuracy of 96.29% with forward feature selection in 0.05 s. Following our comprehensive results, we deduce that the primary influential features for studying driver behavior include speed (km/h), course, yaw, impact time, road width, distance to the ahead vehicle, vehicle position, and number of detected vehicles.
机器学习(ML)技术赋予计算机从数据中学习并在不同领域做出预测或决策的能力,而预处理方法则有助于在 ML 有效利用数据之前对其进行清理和转换。人工智能中的特征选择是一个关键过程,对模型的性能和有效性有重大影响。通过从数据集中精心选择最相关、信息量最大的属性,特征选择可以提高模型的准确性,减少过拟合,并最大限度地降低计算复杂度。在本研究中,我们利用 UAH-DriveSet 数据集对驾驶员行为进行分类,采用了包含 10 种不同特征选择技术的过滤法、嵌入法和包装法。通过使用不同的 ML 算法,我们有效地将驾驶员行为分为正常、昏昏欲睡和激进三个类别。第二个目标是采用特征选择技术,找出对驾驶员行为影响最大的特征。根据综合结果,我们推断出研究驾驶员行为的主要影响特征包括速度(km/h)、路线、偏航、撞击时间、道路宽度、与前方车辆的距离、车辆位置和检测到的车辆数量。
{"title":"Enhancing machine learning algorithm performance through feature selection for driver behavior classification","authors":"S. Bouhsissin, N. Sael, F. Benabbou, Abdelfettah Soultana","doi":"10.11591/ijeecs.v35.i1.pp354-365","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp354-365","url":null,"abstract":"Machine learning (ML) techniques empower computers to learn from data and make predictions or decisions in various domains, while preprocessing methods assist in cleaning and transforming data before it can be effectively utilized by ML. Feature selection in ML is a critical process that significantly influences the performance and effectiveness of models. By carefully choosing the most relevant and informative attributes from the dataset, feature selection enhances model accuracy, reduces overfitting, and minimizes computational complexity. In this study, we leverage the UAH-DriveSet dataset to classify driver behavior, employing Filter, embedded, and wrapper methods encompassing 10 distinct feature selection techniques. Through the utilization of diverse ML algorithms, we effectively categorize driver behavior into normal, drowsy, and aggressive classes. The second objective is to employ feature selection techniques to pinpoint the most influential features impacting driver behavior. As a results, random forest emerges as the top-performing classifier, achieving an impressive accuracy of 96.4% and an F1-score of 96.36% using backward feature selection in 7.43 s, while K-nearest neighbour (K-NN) attains an accuracy of 96.29% with forward feature selection in 0.05 s. Following our comprehensive results, we deduce that the primary influential features for studying driver behavior include speed (km/h), course, yaw, impact time, road width, distance to the ahead vehicle, vehicle position, and number of detected vehicles.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"95 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141695710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.11591/ijeecs.v35.i1.pp42-51
Faiçal Kharchouche, Yousra Malaoui, O. Bouketir
This study presents the characterization and optimization of BaTiO3-doped ZnO-based varistors for electrical and electronic applications. The varistors were prepared using a conventional ceramic procedure and were sintered at a temperature of 1,000 °C with different concentrations of BaTiO3 (0 and 3 mol%) added to the Bi2O3/ZnO-based varistor composition (99.5 mol% ZnO and 0.5 mol% Bi2O3). The results showed that the addition of BaTiO3 led to the formation of various oxides and solid solutions, such as Bi12TiO20, BaTiO3, and (Bi2O3)0.80 (BaO)0.20. The dielectric constant and grain size decreased with increasing BaTiO3 content, while the non-linearity coefficient, electric fields (Eb) increased, and dielectric loss (Tanδ) decreased. The optimized varistor contains 2 mol% BaTiO3 and an electric field of 148.08 V/mm, which are superior to those of the BaTiO3/Bi2O3/ZnO-based varistor. During this study, we were able to observe that a slight addition of BaTiO3 will increase the breakdown voltage and the coefficient of nonlinearity and this will allow us to develop low-dimensional varistors and install them in the high-voltage domain.
{"title":"Study of BaTiO3-doped Bi2O3/ZnO varistor microstructure and its electrical characteristics","authors":"Faiçal Kharchouche, Yousra Malaoui, O. Bouketir","doi":"10.11591/ijeecs.v35.i1.pp42-51","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp42-51","url":null,"abstract":"This study presents the characterization and optimization of BaTiO<sub>3</sub>-doped ZnO-based varistors for electrical and electronic applications. The varistors were prepared using a conventional ceramic procedure and were sintered at a temperature of 1,000 °C with different concentrations of BaTiO<sub>3</sub> (0 and 3 mol%) added to the Bi<sub>2</sub>O<sub>3</sub>/ZnO-based varistor composition (99.5 mol% ZnO and 0.5 mol% Bi<sub>2</sub>O<sub>3</sub>). The results showed that the addition of BaTiO<sub>3</sub> led to the formation of various oxides and solid solutions, such as Bi1<sub>2</sub>TiO<sub>20</sub>, BaTiO<sub>3</sub>, and (Bi<sub>2</sub>O<sub>3</sub>)<sub>0.80</sub> (BaO)<sub>0.20</sub>. The dielectric constant and grain size decreased with increasing BaTiO<sub>3</sub> content, while the non-linearity coefficient, electric fields (Eb) increased, and dielectric loss (Tanδ) decreased. The optimized varistor contains 2 mol% BaTiO<sub>3</sub> and an electric field of 148.08 V/mm, which are superior to those of the BaTiO<sub>3</sub>/Bi<sub>2</sub>O<sub>3</sub>/ZnO-based varistor. During this study, we were able to observe that a slight addition of BaTiO<sub>3</sub> will increase the breakdown voltage and the coefficient of nonlinearity and this will allow us to develop low-dimensional varistors and install them in the high-voltage domain.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"21 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141710054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.11591/ijeecs.v35.i1.pp191-202
F. Kamoun-Abid, Hounaida Frikha, Amel Meddeb-Makhoulf, F. Zarai
In the realm of healthcare applications leveraging cloud technology, ongoing progress is evident, yet current approaches are rigid and fail to adapt to the dynamic environment, particularly when network and virtual machine (VM) resources undergo modifications mid-execution. Health data is stored and processed in the cloud as virtual resources supported by numerous VMs, necessitating critical optimization of virtual node and data placement to enhance data application processing time. Network security poses a significant challenge in the cloud due to the dynamic nature of the topology, hindering traditional firewalls’ ability to inspect packet contents and leaving the network vulnerable to potential threats. To address this, we propose dividing the cloud topology into zones, each monitored by a controller to oversee individual VMs under firewall protection, a framework termed divided-cloud, aiming to minimize network congestion while strategically placing new VMs. Employing machine learning (ML) techniques, such as decision tree (DT) and linear discriminant analysis (LDA), we achieved improved accuracy rates for adding new controllers, reaching a maximum of 89%, and used the K-neighbours classifier method to determine optimal locations for new VMs, achieving an accuracy of 83%.
{"title":"Automating cloud virtual machines allocation via machine learning","authors":"F. Kamoun-Abid, Hounaida Frikha, Amel Meddeb-Makhoulf, F. Zarai","doi":"10.11591/ijeecs.v35.i1.pp191-202","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp191-202","url":null,"abstract":"In the realm of healthcare applications leveraging cloud technology, ongoing progress is evident, yet current approaches are rigid and fail to adapt to the dynamic environment, particularly when network and virtual machine (VM) resources undergo modifications mid-execution. Health data is stored and processed in the cloud as virtual resources supported by numerous VMs, necessitating critical optimization of virtual node and data placement to enhance data application processing time. Network security poses a significant challenge in the cloud due to the dynamic nature of the topology, hindering traditional firewalls’ ability to inspect packet contents and leaving the network vulnerable to potential threats. To address this, we propose dividing the cloud topology into zones, each monitored by a controller to oversee individual VMs under firewall protection, a framework termed divided-cloud, aiming to minimize network congestion while strategically placing new VMs. Employing machine learning (ML) techniques, such as decision tree (DT) and linear discriminant analysis (LDA), we achieved improved accuracy rates for adding new controllers, reaching a maximum of 89%, and used the K-neighbours classifier method to determine optimal locations for new VMs, achieving an accuracy of 83%.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141705750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}