首页 > 最新文献

Indonesian Journal of Electrical Engineering and Computer Science最新文献

英文 中文
Decision support system using Dhouib-Matrix-TP1 heuristic for pentagonal fuzzy transportation problem 针对五边形模糊运输问题使用 Dhouib-Matrix-TP1 启发式的决策支持系统
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp642-654
Souhail Dhouib, Aïda Kharrat, Saima Dhouib, Tole Sutikno
In this paper, a decision support system (DSS) is provided to assist the decision-maker in obtaining the best solution for the transportation problem under uncertainty. Fuzzy parameters of the transportation problem are presented by pentagonal fuzzy numbers. The centroid ranking function transforms these pentagonal fuzzy numbers into crisp ones. Then, a novel, improved greedy method named Dhouib-Matrix-TP1 (DM-TP1) is used in order to help the decision-maker promptly find a suitable solution. Specifically, this DSS is composed of three components: the data base component considers a pentagonal fuzzy number; the Model Base component thinks through the original heuristic DM-TP1; and the User Interface component deliberates the convivial graphical output of the generated transportation plan solution using the Python programming language. Experiments in the literature on fuzzy transportation problems show that the novel proposed heuristic, DM-TP1, is easy to understand and allows the decision-maker to handle transportation problems under pentagonal fuzzy numbers. Also, the DM-TP1 is robust and can be applied to find a feasible initial solution in less time.
本文提供了一个决策支持系统(DSS),以帮助决策者在不确定条件下获得运输问题的最佳解决方案。运输问题的模糊参数由五边形模糊数表示。中心点排序函数将这些五边形模糊数转换为清晰数。然后,使用一种名为 Dhouib-Matrix-TP1 (DM-TP1)的新颖、改进的贪婪方法,以帮助决策者及时找到合适的解决方案。具体来说,该 DSS 由三个部分组成:数据库部分考虑五边形模糊数;模型基础部分通过原始启发式 DM-TP1 进行思考;用户界面部分使用 Python 编程语言对生成的交通计划解决方案的会话图形输出进行审议。有关模糊交通问题的文献实验表明,所提出的新启发式 DM-TP1 易于理解,并允许决策者处理五边形模糊数下的交通问题。此外,DM-TP1 具有鲁棒性,可以在较短时间内找到可行的初始解。
{"title":"Decision support system using Dhouib-Matrix-TP1 heuristic for pentagonal fuzzy transportation problem","authors":"Souhail Dhouib, Aïda Kharrat, Saima Dhouib, Tole Sutikno","doi":"10.11591/ijeecs.v35.i1.pp642-654","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp642-654","url":null,"abstract":"In this paper, a decision support system (DSS) is provided to assist the decision-maker in obtaining the best solution for the transportation problem under uncertainty. Fuzzy parameters of the transportation problem are presented by pentagonal fuzzy numbers. The centroid ranking function transforms these pentagonal fuzzy numbers into crisp ones. Then, a novel, improved greedy method named Dhouib-Matrix-TP1 (DM-TP1) is used in order to help the decision-maker promptly find a suitable solution. Specifically, this DSS is composed of three components: the data base component considers a pentagonal fuzzy number; the Model Base component thinks through the original heuristic DM-TP1; and the User Interface component deliberates the convivial graphical output of the generated transportation plan solution using the Python programming language. Experiments in the literature on fuzzy transportation problems show that the novel proposed heuristic, DM-TP1, is easy to understand and allows the decision-maker to handle transportation problems under pentagonal fuzzy numbers. Also, the DM-TP1 is robust and can be applied to find a feasible initial solution in less time.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"39 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141704908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on integration of ontology and deep learning in cultural heritage image retrieval 本体论与深度学习在文化遗产图像检索中的融合综述
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp583-592
Fikri Budiman, E. Sugiarto, Novi Hendriyanto
Image retrieval methods are currently developing towards big data processing. The literature review is focused on image big data extraction with cultural heritage domain as training and testing datasets. The development of image retrieval process starts from content-based using machine algorithms, deep learning to ontology-based. Image recognition research with cultural heritage domain is conducted because of the importance of preserving and appreciating cultural heritage, in this case, cultural heritage images such as Indonesian Batik are discussed. Batik motif images are Indonesian cultural heritage that has thousands of motifs that are grouped into many classes with a non-linear hyperplane. The problem is focused on processing big data that has many classes. Currently research is evolving into knowledge-based image retrieval using ontologies due to semantic gap constraints. The results of this literature study can be the basis for developing research on the application of appropriate deep learning algorithms so as to utilize the hierarchy of classes and subclasses of image ontologies with cultural heritage domains.
目前,图像检索方法正朝着大数据处理方向发展。文献综述的重点是以文化遗产领域为训练和测试数据集的图像大数据提取。图像检索过程的发展从基于内容的机器算法、深度学习到基于本体的算法。开展文化遗产领域的图像识别研究是因为保护和欣赏文化遗产的重要性,在本例中,讨论的是印尼蜡染等文化遗产图像。蜡染图案图像是印尼的文化遗产,其中有成千上万的图案,这些图案通过非线性超平面被分成许多类别。这个问题的重点是处理有许多类别的大数据。由于语义差距的限制,目前的研究正在向使用本体的基于知识的图像检索发展。本文献研究的结果可作为应用适当的深度学习算法开展研究的基础,从而利用文化遗产领域图像本体的类和子类的层次结构。
{"title":"Review on integration of ontology and deep learning in cultural heritage image retrieval","authors":"Fikri Budiman, E. Sugiarto, Novi Hendriyanto","doi":"10.11591/ijeecs.v35.i1.pp583-592","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp583-592","url":null,"abstract":"Image retrieval methods are currently developing towards big data processing. The literature review is focused on image big data extraction with cultural heritage domain as training and testing datasets. The development of image retrieval process starts from content-based using machine algorithms, deep learning to ontology-based. Image recognition research with cultural heritage domain is conducted because of the importance of preserving and appreciating cultural heritage, in this case, cultural heritage images such as Indonesian Batik are discussed. Batik motif images are Indonesian cultural heritage that has thousands of motifs that are grouped into many classes with a non-linear hyperplane. The problem is focused on processing big data that has many classes. Currently research is evolving into knowledge-based image retrieval using ontologies due to semantic gap constraints. The results of this literature study can be the basis for developing research on the application of appropriate deep learning algorithms so as to utilize the hierarchy of classes and subclasses of image ontologies with cultural heritage domains.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"28 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141713890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grid impact analysis on wind power plant interconnection in strengthening electricity systems 加强电力系统中风力发电厂互联的电网影响分析
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp32-41
A. Senen, Arif Kurniawan, Hasna Satya Dini, Dwi Anggaini
The Timor system is one of the large systems in the East Nusa Tenggara region. Based on the general plan for electricity supply for 2021-2030, there is a plan to interconnect a 2x11 MW wind power plant. The addition of wind power plants will pose a considerable threat to the system due to the intermittency nature of renewable energy plants. Therefore, a comprehensive grid impact study is needed to convince network managers that adding wind farms will not cause disruptions to the system either locally or in general and is expected to strengthen the electricity system. The power flow simulation results, installing a 2x11 MW wind farm on the Timor system can improve voltage quality and reduce losses on both 70 and 150 kV systems. For transient stability, the frequency value on the Timor system still meets the grid code requirements. In addition, the simulation results of the intermittency impact of the wind power plant output show that the Timor system is still in a stable condition. The stability of the rotor angle of the existing power plant when the transient stability simulation is carried out shows that it is still in a balanced condition.
帝汶系统是东努沙登加拉地区的大型系统之一。根据 2021-2030 年电力供应总体规划,计划互联一座 2x11 兆瓦的风力发电厂。由于可再生能源发电厂的间歇性,风力发电厂的增加将对系统构成相当大的威胁。因此,需要进行全面的电网影响研究,使电网管理者相信增加风力发电厂不会对局部或整体系统造成干扰,并有望加强电力系统。电力流模拟结果表明,在帝汶系统中安装 2x11 兆瓦风力发电场可改善电压质量,减少 70 千伏和 150 千伏系统的损耗。在暂态稳定性方面,帝汶系统的频率值仍然符合电网规范要求。此外,风力发电厂输出间歇性影响的模拟结果显示,帝汶系统仍处于稳定状态。在进行暂态稳定性仿真时,现有发电厂转子角度的稳定性表明其仍处于平衡状态。
{"title":"Grid impact analysis on wind power plant interconnection in strengthening electricity systems","authors":"A. Senen, Arif Kurniawan, Hasna Satya Dini, Dwi Anggaini","doi":"10.11591/ijeecs.v35.i1.pp32-41","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp32-41","url":null,"abstract":"The Timor system is one of the large systems in the East Nusa Tenggara region. Based on the general plan for electricity supply for 2021-2030, there is a plan to interconnect a 2x11 MW wind power plant. The addition of wind power plants will pose a considerable threat to the system due to the intermittency nature of renewable energy plants. Therefore, a comprehensive grid impact study is needed to convince network managers that adding wind farms will not cause disruptions to the system either locally or in general and is expected to strengthen the electricity system. The power flow simulation results, installing a 2x11 MW wind farm on the Timor system can improve voltage quality and reduce losses on both 70 and 150 kV systems. For transient stability, the frequency value on the Timor system still meets the grid code requirements. In addition, the simulation results of the intermittency impact of the wind power plant output show that the Timor system is still in a stable condition. The stability of the rotor angle of the existing power plant when the transient stability simulation is carried out shows that it is still in a balanced condition.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"103 S2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141696038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing authenticity and trust in social media: an automated approach for detecting fake profiles 提高社交媒体的真实性和信任度:检测虚假资料的自动方法
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp292-300
M. V. Unni, J. S., Jacob Joseph Kalapurackal, Saba Fatma
Fake profile detection on social media is a critical task intended for detecting and alleviating the existence of deceptive or fraudulent user profiles. These fake profiles, frequently generated with malicious intent, could engage in different forms of spreading disinformation, online fraud, or spamming. A range of techniques is employed to solve these problems such as natural language processing (NLP), machine learning (ML), and behavioural analysis, to examine engagement patterns, user-generated content, and profile characteristics. This paper proposes an automated fake profile detection using the coyote optimization algorithm with deep learning (FPD-COADL) method on social media. This multifaceted approach scrutinizes user-generated content, engagement patterns, and profile attributes to differentiate genuine user accounts from deceptive ones, ultimately reinforcing the authenticity and trustworthiness of social networking platforms. The presented FPD-COADL method uses robust data pre-processing methods to enhance the uniformness and quality of data. Besides, the FPD-COADL method applies deep belief network (DBN) for the recognition and classification of fake accounts. Extensive experiments and evaluations on own collected social media datasets underscore the effectiveness of the approach, showcasing its potential to identify fake profiles with high scalability and precision.
社交媒体上的虚假用户配置文件检测是一项重要任务,旨在检测和减少欺骗性或欺诈性用户配置文件的存在。这些虚假用户配置文件通常是出于恶意生成的,可能以不同形式传播虚假信息、进行在线欺诈或发送垃圾邮件。为解决这些问题,我们采用了一系列技术,如自然语言处理(NLP)、机器学习(ML)和行为分析,以检查参与模式、用户生成的内容和档案特征。本文提出了在社交媒体上使用带有深度学习(FPD-COADL)的土狼优化算法自动检测虚假个人资料的方法。这种多层面的方法会仔细检查用户生成的内容、参与模式和个人资料属性,以区分真实用户账户和欺骗性账户,最终加强社交网络平台的真实性和可信度。所介绍的 FPD-COADL 方法采用稳健的数据预处理方法来提高数据的统一性和质量。此外,FPD-COADL 方法还应用了深度信念网络(DBN)对虚假账户进行识别和分类。在自己收集的社交媒体数据集上进行的大量实验和评估凸显了该方法的有效性,展示了它在识别虚假资料方面的潜力,具有很高的可扩展性和精确性。
{"title":"Enhancing authenticity and trust in social media: an automated approach for detecting fake profiles","authors":"M. V. Unni, J. S., Jacob Joseph Kalapurackal, Saba Fatma","doi":"10.11591/ijeecs.v35.i1.pp292-300","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp292-300","url":null,"abstract":"Fake profile detection on social media is a critical task intended for detecting and alleviating the existence of deceptive or fraudulent user profiles. These fake profiles, frequently generated with malicious intent, could engage in different forms of spreading disinformation, online fraud, or spamming. A range of techniques is employed to solve these problems such as natural language processing (NLP), machine learning (ML), and behavioural analysis, to examine engagement patterns, user-generated content, and profile characteristics. This paper proposes an automated fake profile detection using the coyote optimization algorithm with deep learning (FPD-COADL) method on social media. This multifaceted approach scrutinizes user-generated content, engagement patterns, and profile attributes to differentiate genuine user accounts from deceptive ones, ultimately reinforcing the authenticity and trustworthiness of social networking platforms. The presented FPD-COADL method uses robust data pre-processing methods to enhance the uniformness and quality of data. Besides, the FPD-COADL method applies deep belief network (DBN) for the recognition and classification of fake accounts. Extensive experiments and evaluations on own collected social media datasets underscore the effectiveness of the approach, showcasing its potential to identify fake profiles with high scalability and precision.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"36 S2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141698366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware-realized secure transceiver for human body communication in wireless body area networks 用于无线体域网络中人体通信的硬件实现的安全收发器
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp601-609
Chaitra Soppinahally Nataraju, D. K. Sreekantha, K. Sairam
Wireless body area networks (WBANs), featuring wearable and implantable devices for collecting physiological data are increasingly critical in healthcare for enabling continuous remote monitoring, diagnostic improvements, and treatment optimization. Secure communication within WBANs is essential to protect sensitive health data from unauthorized access and manipulation. This paper introduces a novel secure digital (SD)- human body communication (HBC) Transceiver (TR) system, tailored for WBAN applications, that prioritizes security and offers significant enhancements in size, power efficiency, speed, and data transmission efficiency over current solutions. Leveraging a combination of frequency-selective (FS) digital transmission with walsh codes (WCs) or quadrature amplitude modulation (QAM), and incorporating one-round encryption and decryption modules, the system complies with the IEEE 802.15.6 standard, ensuring broad compatibility. Specifically, the QAM-based SD-HBC TR system exhibits a 4% reduction in chip area, a 7.6% increase in operating frequency, a 3.4% decrease in power consumption, a 27.5% reduction in latency, and improvements of 33% in throughput and 35.5% in efficiency. Importantly, it achieves a bit error rate (BER) of up to 10-8 , demonstrating high reliability across communication methods. This research significantly advances secure communication in WBANs, offering a promising approach for enhancing the reliability, efficiency, and security of healthcare monitoring technologies.
无线体域网(WBAN)采用可穿戴和植入式设备收集生理数据,在医疗保健领域越来越重要,可实现持续远程监控、诊断改进和治疗优化。要保护敏感的健康数据免遭未经授权的访问和篡改,WBAN 内的安全通信至关重要。本文介绍了一种专为 WBAN 应用量身定制的新型安全数字(SD)-人体通信(HBC)收发器(TR)系统,该系统将安全放在首位,与现有解决方案相比,在尺寸、能效、速度和数据传输效率方面都有显著提升。该系统将频率选择(FS)数字传输与沃尔什编码(WC)或正交调幅(QAM)相结合,并集成了单轮加密和解密模块,符合 IEEE 802.15.6 标准,确保了广泛的兼容性。具体而言,基于 QAM 的 SD-HBC TR 系统的芯片面积减少了 4%,工作频率提高了 7.6%,功耗降低了 3.4%,延迟降低了 27.5%,吞吐量提高了 33%,效率提高了 35.5%。重要的是,它实现了高达 10-8 的误码率 (BER),显示了各种通信方法的高可靠性。这项研究极大地推动了无线局域网的安全通信,为提高医疗监控技术的可靠性、效率和安全性提供了一种前景广阔的方法。
{"title":"Hardware-realized secure transceiver for human body communication in wireless body area networks","authors":"Chaitra Soppinahally Nataraju, D. K. Sreekantha, K. Sairam","doi":"10.11591/ijeecs.v35.i1.pp601-609","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp601-609","url":null,"abstract":"Wireless body area networks (WBANs), featuring wearable and implantable devices for collecting physiological data are increasingly critical in healthcare for enabling continuous remote monitoring, diagnostic improvements, and treatment optimization. Secure communication within WBANs is essential to protect sensitive health data from unauthorized access and manipulation. This paper introduces a novel secure digital (SD)- human body communication (HBC) Transceiver (TR) system, tailored for WBAN applications, that prioritizes security and offers significant enhancements in size, power efficiency, speed, and data transmission efficiency over current solutions. Leveraging a combination of frequency-selective (FS) digital transmission with walsh codes (WCs) or quadrature amplitude modulation (QAM), and incorporating one-round encryption and decryption modules, the system complies with the IEEE 802.15.6 standard, ensuring broad compatibility. Specifically, the QAM-based SD-HBC TR system exhibits a 4% reduction in chip area, a 7.6% increase in operating frequency, a 3.4% decrease in power consumption, a 27.5% reduction in latency, and improvements of 33% in throughput and 35.5% in efficiency. Importantly, it achieves a bit error rate (BER) of up to 10-8 , demonstrating high reliability across communication methods. This research significantly advances secure communication in WBANs, offering a promising approach for enhancing the reliability, efficiency, and security of healthcare monitoring technologies.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"254 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141711627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient controller-based architecture for AES algorithm using FPGA 使用 FPGA 的 AES 算法基于控制器的高效架构
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp397-404
Reshma Nadaf, Satish S. Bhairannawar
The importance of crucial current technical advancements, particularly those centered on the cryptography process such as Cryptographic advanced encryption standard (AES) hardware architectures are gaining momentum with respect to improving the speed and area optimizations. In this paper, we have proposed a novel architecture to implement AES on a reconfigurable hardware i.e., field programmable gate arrays (FPGA). The controller in AES algorithm is responsible to generate the signals to perform operations to generate the 128 bits ciphertext. The proposed controller uses multiplexer and synchronous register-based approach to obtain area and speed efficient on the FPGA hardware. The entire architecture of AES with proposed controller is implemented on Virtex 5, Virtex 6, and Virtex 7series using XilinxISE 14.7 and tested for critical path delay, frequency, slices, efficiency and throughput. It is observed that all the parameters are improved compared to existing architectures achieving the throughput of 32.29, 40.01, and 43.01 Gbps respectively. The key benefit of this approach is the high level of parallelism it displays in a quick and efficient manner.
当前重要的技术进步,尤其是以加密过程为中心的技术进步,如加密高级加密标准(AES)硬件架构,在提高速度和优化面积方面的发展势头日益强劲。在本文中,我们提出了一种在可重构硬件(即现场可编程门阵列(FPGA))上实现 AES 的新型架构。AES 算法中的控制器负责生成信号,以执行生成 128 位密码文本的操作。建议的控制器使用多路复用器和基于同步寄存器的方法,以在 FPGA 硬件上获得高效的面积和速度。使用 XilinxISE 14.7 在 Virtex 5、Virtex 6 和 Virtex 7 系列上实现了带有拟议控制器的整个 AES 架构,并对关键路径延迟、频率、切片、效率和吞吐量进行了测试。测试结果表明,与现有架构相比,所有参数都有所提高,吞吐量分别达到 32.29、40.01 和 43.01 Gbps。这种方法的主要优点是以快速高效的方式实现了高水平的并行性。
{"title":"An efficient controller-based architecture for AES algorithm using FPGA","authors":"Reshma Nadaf, Satish S. Bhairannawar","doi":"10.11591/ijeecs.v35.i1.pp397-404","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp397-404","url":null,"abstract":"The importance of crucial current technical advancements, particularly those centered on the cryptography process such as Cryptographic advanced encryption standard (AES) hardware architectures are gaining momentum with respect to improving the speed and area optimizations. In this paper, we have proposed a novel architecture to implement AES on a reconfigurable hardware i.e., field programmable gate arrays (FPGA). The controller in AES algorithm is responsible to generate the signals to perform operations to generate the 128 bits ciphertext. The proposed controller uses multiplexer and synchronous register-based approach to obtain area and speed efficient on the FPGA hardware. The entire architecture of AES with proposed controller is implemented on Virtex 5, Virtex 6, and Virtex 7series using XilinxISE 14.7 and tested for critical path delay, frequency, slices, efficiency and throughput. It is observed that all the parameters are improved compared to existing architectures achieving the throughput of 32.29, 40.01, and 43.01 Gbps respectively. The key benefit of this approach is the high level of parallelism it displays in a quick and efficient manner.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"59 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141716231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving non-line-of-sight situations in indoor positioning with ultra-wideband sensors via federated Kalman filter 通过联合卡尔曼滤波器改善使用超宽带传感器进行室内定位时的非视距情况
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp247-254
Mehmet Nasuhcan Türker, Taner Arsan
Ultra-wideband (UWB) technology is renowned for its exceptional performance in fast data transmission and precise positioning. However, it faces sensitivity challenges when the tagged object is not in direct line of sight, resulting in position inaccuracies. Applying the federated Kalman filter (FKF), this research focuses on mitigating position deviation induced by non-line-of-sight (NLOS) scenarios in UWB technology. The utilization of the FKF in NLOS scenarios has demonstrated a noteworthy reduction in position deviation. This study uses the FKF to analyze measurements taken under line-of-sight (LOS) and NLOS conditions within indoor settings. The outcomes of this study provide a promising foundation for future research endeavors in the field of UWB technology, emphasizing the potential for improved performance and accuracy in challenging operational environments.
超宽带 (UWB) 技术因其在快速数据传输和精确定位方面的卓越性能而闻名于世。然而,当被标记物体不在视线范围内时,超宽带技术就会面临灵敏度方面的挑战,从而导致定位不准确。本研究应用联合卡尔曼滤波器(FKF),重点研究如何在 UWB 技术中减少非视线(NLOS)情况下引起的位置偏差。在非视距场景中使用 FKF 已证明可显著减少位置偏差。本研究使用 FKF 分析室内环境中视线 (LOS) 和 NLOS 条件下的测量结果。本研究的成果为未来 UWB 技术领域的研究工作奠定了良好的基础,强调了在具有挑战性的操作环境中提高性能和精度的潜力。
{"title":"Improving non-line-of-sight situations in indoor positioning with ultra-wideband sensors via federated Kalman filter","authors":"Mehmet Nasuhcan Türker, Taner Arsan","doi":"10.11591/ijeecs.v35.i1.pp247-254","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp247-254","url":null,"abstract":"Ultra-wideband (UWB) technology is renowned for its exceptional performance in fast data transmission and precise positioning. However, it faces sensitivity challenges when the tagged object is not in direct line of sight, resulting in position inaccuracies. Applying the federated Kalman filter (FKF), this research focuses on mitigating position deviation induced by non-line-of-sight (NLOS) scenarios in UWB technology. The utilization of the FKF in NLOS scenarios has demonstrated a noteworthy reduction in position deviation. This study uses the FKF to analyze measurements taken under line-of-sight (LOS) and NLOS conditions within indoor settings. The outcomes of this study provide a promising foundation for future research endeavors in the field of UWB technology, emphasizing the potential for improved performance and accuracy in challenging operational environments.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141697587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNN and Adaboost fusion model for multiface recognition based automated verification system of students attendance 基于多人脸识别的学生考勤自动核查系统的 CNN 和 Adaboost 融合模型
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp133-139
Nashaat M. Hussain Hassan, Mahmoud A. Moussa, Mohamed Hassan M. Mahmoud
In recent times, companies and institutions globally are increasingly adopting automated systems for recording employee attendance due to the inefficiency and error-prone nature of traditional methods. Face recognition is the fastest, most natural, and most accurate way to identify someone, despite its difficulty. Remote deployment and control of the technology using internet of things (IoT) protocols provides real-time attendance data worldwide. We use the Haar-cascade algorithm to detect and extract features and the adaptive boost algorithm confused with convolutional neural network (CNN) algorithm to recognize the face in our proposed smart attendance system. Per frame, the proposed system recognizes multiple faces. Face recognition in 18 conditions was designed into the proposed system to ensure its versatility. The system's graphical user interface (GUI) was made for average users. This work is more important because IoT technology records student attendance and sends data to authorities. We use Raspberry Pi 4 and camera module for our suggested system. Python and OpenCV libraries tested the multiple face image recognition proposal in 18 situations under four conditions. Single-face image recognition was compared to other methods. In most cases, the proposed method was 100% accurate and outperformed related methods.
近来,由于传统方法效率低且容易出错,全球的公司和机构越来越多地采用自动化系统记录员工出勤情况。人脸识别虽然困难,却是最快、最自然、最准确的识别方法。利用物联网(IoT)协议对该技术进行远程部署和控制,可在全球范围内提供实时考勤数据。在我们提出的智能考勤系统中,我们使用哈尔级联算法来检测和提取特征,并使用与卷积神经网络(CNN)算法相混淆的自适应提升算法来识别人脸。拟议的系统每帧可识别多张人脸。为了确保系统的通用性,我们在拟建系统中设计了 18 种条件下的人脸识别功能。系统的图形用户界面(GUI)是为普通用户设计的。这项工作更为重要,因为物联网技术可以记录学生出勤情况并将数据发送给相关部门。我们建议的系统使用 Raspberry Pi 4 和摄像头模块。Python 和 OpenCV 库在四种条件下的 18 种情况下测试了多人脸图像识别建议。单脸图像识别与其他方法进行了比较。在大多数情况下,建议的方法准确率为 100%,优于相关方法。
{"title":"CNN and Adaboost fusion model for multiface recognition based automated verification system of students attendance","authors":"Nashaat M. Hussain Hassan, Mahmoud A. Moussa, Mohamed Hassan M. Mahmoud","doi":"10.11591/ijeecs.v35.i1.pp133-139","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp133-139","url":null,"abstract":"In recent times, companies and institutions globally are increasingly adopting automated systems for recording employee attendance due to the inefficiency and error-prone nature of traditional methods. Face recognition is the fastest, most natural, and most accurate way to identify someone, despite its difficulty. Remote deployment and control of the technology using internet of things (IoT) protocols provides real-time attendance data worldwide. We use the Haar-cascade algorithm to detect and extract features and the adaptive boost algorithm confused with convolutional neural network (CNN) algorithm to recognize the face in our proposed smart attendance system. Per frame, the proposed system recognizes multiple faces. Face recognition in 18 conditions was designed into the proposed system to ensure its versatility. The system's graphical user interface (GUI) was made for average users. This work is more important because IoT technology records student attendance and sends data to authorities. We use Raspberry Pi 4 and camera module for our suggested system. Python and OpenCV libraries tested the multiple face image recognition proposal in 18 situations under four conditions. Single-face image recognition was compared to other methods. In most cases, the proposed method was 100% accurate and outperformed related methods.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"7 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141700739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
URL shortener for web consumption: an extensive and impressive security algorithm 用于网络消费的 URL 短缩器:广泛且令人印象深刻的安全算法
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp284-291
Saikat Gochhait, Yogesh Singh Rathore, Irina Leonova, Mahima Shanker Pandey, Bal Krishna Saraswat, Santosh Kumar Maurya, Hare Ram Singh, Nidhi Bansal
URL stands for uniform resource locator are the addresses of the unique resources on the internet. We all need URLs to access any type of resource on the internet, such as any web page, and document. Sometimes URLs can be long, irrelative and unattractive and unable to send sometimes via email. So, for this, we proposed a URL shortener web application based on the Python-Django platform which is fast and makes your long URLs in the shortest form which you can share on social media platforms. It makes all the messy, unattractive URLs short and shareable. Writing paper proposed a premium section in our application that gives access to the customizable URLs and analytics of your shorten URLs. Customizable URLs are the URLs you create by your own keywords. By creating a premium profile with the application, you can create your own URLs by using your own keywords. We have considered security a major part of the application that prevents the short URLs from being hacked or redirected to any advertising website or content. We store all the data related to the URL to show you the best view of your analytics and update it regularly. Main contribution in this field that for web application that provides users with a fast, secure and shortest URL for their using long URLs. Comparatively to other services that are currently available, the application provides superior security, availability, and confidentiality.
URL 是统一资源定位符的缩写,是互联网上独特资源的地址。我们都需要 URL 来访问互联网上的任何类型的资源,如任何网页和文档。有时,URL 会很长、不相关、不美观,而且有时无法通过电子邮件发送。因此,我们提出了一个基于 Python-Django 平台的 URL 缩短器网络应用程序,它速度快,能将冗长的 URL 缩短为最短的形式,并能在社交媒体平台上分享。它能让所有杂乱无章、缺乏吸引力的网址变得简短并可分享。撰写论文建议在我们的应用程序中添加一个高级版块,以便访问可定制的 URL 和对缩短后的 URL 进行分析。自定义 URL 是指您根据自己的关键字创建的 URL。通过在应用程序中创建高级配置文件,您可以使用自己的关键字创建自己的 URL。我们将安全性作为应用程序的主要部分,以防止短网址被黑客攻击或重定向到任何广告网站或内容。我们会存储所有与 URL 相关的数据,为您提供最佳的分析视图,并定期更新。我们在这一领域的主要贡献在于为用户提供快速、安全、最短的URL的网络应用程序。与目前可用的其他服务相比,该应用程序提供了卓越的安全性、可用性和保密性。
{"title":"URL shortener for web consumption: an extensive and impressive security algorithm","authors":"Saikat Gochhait, Yogesh Singh Rathore, Irina Leonova, Mahima Shanker Pandey, Bal Krishna Saraswat, Santosh Kumar Maurya, Hare Ram Singh, Nidhi Bansal","doi":"10.11591/ijeecs.v35.i1.pp284-291","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp284-291","url":null,"abstract":"URL stands for uniform resource locator are the addresses of the unique resources on the internet. We all need URLs to access any type of resource on the internet, such as any web page, and document. Sometimes URLs can be long, irrelative and unattractive and unable to send sometimes via email. So, for this, we proposed a URL shortener web application based on the Python-Django platform which is fast and makes your long URLs in the shortest form which you can share on social media platforms. It makes all the messy, unattractive URLs short and shareable. Writing paper proposed a premium section in our application that gives access to the customizable URLs and analytics of your shorten URLs. Customizable URLs are the URLs you create by your own keywords. By creating a premium profile with the application, you can create your own URLs by using your own keywords. We have considered security a major part of the application that prevents the short URLs from being hacked or redirected to any advertising website or content. We store all the data related to the URL to show you the best view of your analytics and update it regularly. Main contribution in this field that for web application that provides users with a fast, secure and shortest URL for their using long URLs. Comparatively to other services that are currently available, the application provides superior security, availability, and confidentiality.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of machine learning algorithms in the early detection of Parkinson's disease: a comparative study 评估早期检测帕金森病的机器学习算法:一项比较研究
Q2 Mathematics Pub Date : 2024-07-01 DOI: 10.11591/ijeecs.v35.i1.pp222-237
Joselyn Zapata-Paulini, M. Cabanillas-Carbonell
Parkinson's is a neurodegenerative disease that generally affects people over 60 years of age. The disease destroys neurons and increases the accumulation of α-synuclein in many parts of the brain stem, although at present its causes remain unknown. It is therefore a priority to identify a method that can detect the disease, and this is where machine learning models become important. This study aims to perform a comparative analysis of machine learning models focused on the early detection of Parkinson's disease. Logistic regression (LR), support vector machines (SVM), decision trees (DT), extra trees classifiers (ETC), K-nearest neighbors (KNN), random forests (RF), adaptive boosting (AdaBoost) and gradient boosting (GB) algorithms are described and developed to identify the one that offers the best performance. In the training stage, we used the Oxford University dataset for Parkinson's disease detection, which has a total of 23 attributes and 195 records on patient voice recordings. The article is structured into six sections, such as introduction, related work, methodology, results, discussions, and conclusions. The metrics of accuracy, sensitivity, F1 count, and precision were used to measure the models' performance. The results position the KNN model as the best predictor with 95% accuracy, precision, sensitivity, and F1 score.
帕金森病是一种神经退行性疾病,一般影响 60 岁以上的人群。这种疾病会破坏神经元,增加α-突触核蛋白在脑干许多部位的积聚,但目前其病因仍然不明。因此,当务之急是找到一种能够检测这种疾病的方法,而这正是机器学习模型的重要作用所在。本研究旨在对侧重于早期检测帕金森病的机器学习模型进行比较分析。对逻辑回归(LR)、支持向量机(SVM)、决策树(DT)、额外树分类器(ETC)、K-近邻(KNN)、随机森林(RF)、自适应提升(AdaBoost)和梯度提升(GB)算法进行了描述和开发,以找出性能最佳的算法。在训练阶段,我们使用了牛津大学的帕金森病检测数据集,该数据集共有 23 个属性和 195 条患者语音记录。文章分为六个部分,如引言、相关工作、方法、结果、讨论和结论。准确度、灵敏度、F1 计数和精确度等指标被用来衡量模型的性能。结果表明,KNN 模型以 95% 的准确率、精确度、灵敏度和 F1 分数成为最佳预测模型。
{"title":"Evaluation of machine learning algorithms in the early detection of Parkinson's disease: a comparative study","authors":"Joselyn Zapata-Paulini, M. Cabanillas-Carbonell","doi":"10.11591/ijeecs.v35.i1.pp222-237","DOIUrl":"https://doi.org/10.11591/ijeecs.v35.i1.pp222-237","url":null,"abstract":"Parkinson's is a neurodegenerative disease that generally affects people over 60 years of age. The disease destroys neurons and increases the accumulation of α-synuclein in many parts of the brain stem, although at present its causes remain unknown. It is therefore a priority to identify a method that can detect the disease, and this is where machine learning models become important. This study aims to perform a comparative analysis of machine learning models focused on the early detection of Parkinson's disease. Logistic regression (LR), support vector machines (SVM), decision trees (DT), extra trees classifiers (ETC), K-nearest neighbors (KNN), random forests (RF), adaptive boosting (AdaBoost) and gradient boosting (GB) algorithms are described and developed to identify the one that offers the best performance. In the training stage, we used the Oxford University dataset for Parkinson's disease detection, which has a total of 23 attributes and 195 records on patient voice recordings. The article is structured into six sections, such as introduction, related work, methodology, results, discussions, and conclusions. The metrics of accuracy, sensitivity, F1 count, and precision were used to measure the models' performance. The results position the KNN model as the best predictor with 95% accuracy, precision, sensitivity, and F1 score.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141705828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Indonesian Journal of Electrical Engineering and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1