{"title":"Computationally efficient handwritten Telugu text recognition","authors":"Buddaraju Revathi, M. V. D. Prasad, N. K. Gattim","doi":"10.11591/ijeecs.v34.i3.pp1618-1626","DOIUrl":"https://doi.org/10.11591/ijeecs.v34.i3.pp1618-1626","url":null,"abstract":"Optical character recognition (OCR) for regional languages is difficult due to their complex orthographic structure, lack of dataset resources, a greater number of characters and similarity in structure between characters. Telugu is popular language in states of Andhra and Telangana. Telugu exhibits distinct separation between characters within a word, making a character-level dataset sufficient. With a smaller dataset, we can effectively recognize more words. However, challenges arise during the training of compound characters, which are combinations of vowels and consonants. These are considered as two or more characters based on associated vattus and dheerghams with the base character. To address this challenge, each compound character is encoded into a numerical value and used as input during training, with subsequent retrieval during recognition. The segmentation issue arises from overlapping characters caused by varying handwritten styles. For handling segmentation issues at the character level arising from handwritten styles, we have proposed an algorithm based on the language's features. To enhance word-level accuracy a dictionary-based model was devised. A neural network utilizing the inception module is employed for feature extraction at various scales, achieving word-level accuracy rates of 78% with fewer trainable parameters.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141233411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent-of-things multiagent system for smart home energy monitoring","authors":"Ratna kumari Vemuri, Chinni Bala Vijaya Durga, Syed Abuthahir Syed Ibrahim, Nagaraju Arumalla, Senthilvadivu Subramanian, Lakshmi Bhukya","doi":"10.11591/ijeecs.v34.i3.pp1858-1867","DOIUrl":"https://doi.org/10.11591/ijeecs.v34.i3.pp1858-1867","url":null,"abstract":"The proliferation of IoT devices has ushered in a new era of smart homes, where efficient energy management is a paramount concern. Multiagent artificial intelligence-of-things (MAIoT) has emerged as a promising approach to address the complex challenges of smart home energy management. This research study examines MAIoT's components, functioning, benefits, and drawbacks. MAIoT systems improve energy efficiency and user comfort by combining multiagent systems and IoT devices. However, privacy, security, interoperability, scalability, and user acceptability must be addressed. As technology advances, MAIoT in smart home energy management will offer more sophisticated and adaptable solutions to cut energy consumption and promote sustainability. This article describes how energy status and internal pricing signals affect group intelligent decision making and the interaction dynamics between consumers or decision makers. In a multiagent configuration based on the new concept of artificial intelligence-of-things, this intelligent home energy management challenge is simulated and illustrated using software and hardware. Based on sufficient experimental simulations, this paper suggested that residential clients can significantly improve their economic benefit and decision-making efficiency.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141231017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Van-Dinh Do, Van-Hung Le, Huu-Son Do, Van-Nam Phan, Trung-Hieu Te
{"title":"TQU-HG dataset and comparative study for hand gesture recognition of RGB-based images using deep learning","authors":"Van-Dinh Do, Van-Hung Le, Huu-Son Do, Van-Nam Phan, Trung-Hieu Te","doi":"10.11591/ijeecs.v34.i3.pp1603-1617","DOIUrl":"https://doi.org/10.11591/ijeecs.v34.i3.pp1603-1617","url":null,"abstract":"Hand gesture recognition has great applications in human-computer interaction (HCI), human-robot interaction (HRI), and supporting the deaf and mute. To build a hand gesture recognition model using deep learning (DL) with high results then needs to be trained on many data and in many different conditions and contexts. In this paper, we publish the TQU-HG dataset of large RGB images with low resolution (640×480) pixels, low light conditions, and fast speed (16 fps). TQU-HG dataset includes 60,000 images collected from 20 people (10 male, 10 female) with 15 gestures of both left and right hands. A comparative study with two branches: i) based on Mediapipe TML and ii) Based on convolutional neural networks (CNNs) (you only look once (YOLO); YOLOv5, YOLOv6, YOLOv7, YOLOv8, YOLO-Nas, single shot multiBox detector (SSD) VGG16, residual network (ResNet)18, ResNext50, ResNet152, ResNext50, MobileNet V3 small, and MobileNet V3 large), the architecture and operation of CNNs models are also introduced in detail. We especially fine-tune the model and evaluate it on TQU-HG and HaGRID datasets. The quantitative results of the training and testing are presented (F1-score of YOLOv8, YOLO-Nas, MobileNet V3 small, ResNet50 is 98.99%, 98.98%, 99.27%, 99.36%, respectively on the TQU-HG dataset and is 99.21%, 99.37%, 99.36%, 86.4%, 98.3%, respectively on the HaGRID dataset). The computation time of YOLOv8 is 6.19 fps on the CPU and 18.28 fps on the GPU.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141233406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. S. Mopari, D. More, A. Bhalchandra, Pannala Krishna Murthy, K. Jadhav
{"title":"Analysis of converter transformer pressboard insulation degradation under surge using mathematical morphology","authors":"S. S. Mopari, D. More, A. Bhalchandra, Pannala Krishna Murthy, K. Jadhav","doi":"10.11591/ijeecs.v34.i3.pp1434-1443","DOIUrl":"https://doi.org/10.11591/ijeecs.v34.i3.pp1434-1443","url":null,"abstract":"Nowadays, with the significant expansion of industrial growth, the bulk power requirement can only be satisfied through high-voltage direct current HVDC transmission. The converter transformer is the utmost vital part of the HVDC transmission. Pressboard insulation is most commonly used as inter-disc insulation in converter transformers. During working conditions due to elevated temperature and different operational stresses, insulation material gets deteriorated. It may cause a risk to the life of the converter transformer. The effects of elevated temperatures as well as frequency on pressboard insulation of the converter transformer are examined in this study. The condition evaluation and morphological changes in pressboard insulation at elevated temperatures can evaluate with the help of frequency domain spectroscopy (FDS) and atomic force microscopy (AFM) techniques. The impact of elevated temperatures on insulation material can be analyzed based on surface roughness and dielectric parameters. In MATLAB Simulink environment, a dual winding single-phase converter transformers valve side star winding 60 discs model is constructed for impulse test. Based upon arrival time and velocity of traveling wave, insulation degradation location can be identified by using mathematical morphology. The simulation results demonstrate that the suggested method can notably located degradation across disc winding.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141234306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mwaffaq Abu AlHija, Hamza Jehad Alqudah, Hiba Dar-Othman
{"title":"Uncovering botnets in IoT sensor networks: a hybrid self-organizing maps approach","authors":"Mwaffaq Abu AlHija, Hamza Jehad Alqudah, Hiba Dar-Othman","doi":"10.11591/ijeecs.v34.i3.pp1840-1857","DOIUrl":"https://doi.org/10.11591/ijeecs.v34.i3.pp1840-1857","url":null,"abstract":"The integration of the internet of things (IoT) has revolutionized diverse industries, introducing interconnected devices and IoT sensor networks for improved data acquisition. However, this connectivity exposes IoT ecosystems to emerging threats, with botnets posing significant risks to security. This research aims to develop an innovative solution for detecting botnets in IoT sensor networks. Leveraging insights from existing research, the study focuses on designing a hybrid self-organization map (SOM) Approach that integrates lightweight deep learning (DL) techniques. The objective is to enhance detection accuracy by exploring various DL architectures. Proposed methodology aims to balance computational efficiency for resource-constrained IoT devices while improving the discriminatory power of the detection system. The study advancing IoT cybersecurity and addresses critical challenges in botnet detection within IoT sensor networks. The testing of the artificial neural networks (ANN) classifier involves three models, each represented based on parameters related to the construction of the training models. The most effective ANN achieves 86%, works on anomaly intrusion detection systems (AIDS).","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141234883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dewi Pusparani Sinambela, B. Rahmatullah, Noor Hidayah Che Lah, Ahmad Wiraputra Selamat
{"title":"Machine learning approaches for predicting postpartum hemorrhage: a comprehensive systematic literature review","authors":"Dewi Pusparani Sinambela, B. Rahmatullah, Noor Hidayah Che Lah, Ahmad Wiraputra Selamat","doi":"10.11591/ijeecs.v34.i3.pp2087-2095","DOIUrl":"https://doi.org/10.11591/ijeecs.v34.i3.pp2087-2095","url":null,"abstract":"Postpartum hemorrhage (PPH) represents a significant threat to maternal health, particularly in developing countries, where it remains a leading cause of maternal mortality. Unfortunately, only 60% of pregnant women at high risk for PPH are identified, leaving 40% undetected until they experience PPH. To address this critical issue and ensure timely intervention, leveraging rapidly advancing technology with machine learning (ML) methodologies for maternal health prediction is imperative. This review synthesizes findings from 43 selected research articles, highlighting the predominant ML techniques employed in PPH prediction. Among these, logistic regression (LR), extreme gradient boosting (XGB), random forest (RF), and decision tree (DT) emerge as the most frequently utilized methods. By harnessing the power of ML, we aim to foster technological advancements in the healthcare sector, with a particular focus on maternal health and ultimately contribute to the reduction of maternal mortality rates worldwide.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141230293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Achmad Arif Bryantono, Leonardo Kamajaya, Fitri Fitri, S. Sungkono, Herwandi Herwandi, Agwin Fahmi Fahanani
{"title":"Integrated electronic system for FET biosensor assessment based on current-voltage curve tracing","authors":"Achmad Arif Bryantono, Leonardo Kamajaya, Fitri Fitri, S. Sungkono, Herwandi Herwandi, Agwin Fahmi Fahanani","doi":"10.11591/ijeecs.v34.i3.pp1463-1471","DOIUrl":"https://doi.org/10.11591/ijeecs.v34.i3.pp1463-1471","url":null,"abstract":"Field-effect transistor (FET) biosensors are pivotal in diverse applications, from environmental monitoring to healthcare diagnostics. Current-voltage (I-V) curve tracing is a powerful method for evaluating FET biosensor behavior, enabling comprehensive analysis of their FET biosensor characteristics. Traditional I-V curve tracing methods often require complex and expensive equipment, limiting their accessibility and practicality for routine sensor assessment. This study aims to develop and demonstrate an integrated electronic system for assessing FET biosensors using I-V curve tracing. The integrated electronic system uses readily available components, including microcontrollers, analog circuitry, and user-friendly software. We developed a compact, low-cost device that generates I-V curves for the FET biosensor. The integrated electronic system successfully generated I-V curves for various FET biosensors. The system demonstrated consistent, reliable performance, portability, and ease of use, making it a practical solution for routine sensor assessment. The average error in measurements using bipolar junction transistors (BJT) and metal-oxide-semiconductor field-effect transistors (MOSFETs) results in 2.62%, and measurements at different pH levels have a sensitivity of 21.6 mV/pH and a linearity of 0.9892. This innovation contributes to the advancement of FET biosensor technology. In the future, the developments should focus on ensuring their accuracy and reliability in various sensor fields.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141230753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel identifiable data sharing mechanism for multiple participants in cloud computing","authors":"Jayalakshmi Karemallaiah, Prabha Revaiah","doi":"10.11591/ijeecs.v34.i3.pp1444-1451","DOIUrl":"https://doi.org/10.11591/ijeecs.v34.i3.pp1444-1451","url":null,"abstract":"Recent applications and growth on the internet have generated a lot of popularity and adoption of cloud computing which aims to assure the various computing resources. Data storage is one of the primary resources offered by the cloud; however, considering the multiple users in the particular cloud raises major concerns due to security. Recent researches shown great potential for providing efficient data sharing with multiple users. However, tracing of the data provider is still concerned to be a major issue. Hence, this research work proposes identifiable data sharing for multiple users (IDSMU) mechanism which aims to provide security for multiple users in a particular cloud group. At first, IDSMU creates the general participants (GP)-key for secure access to data. Further, IDSMU creates the trusted participants (TP) based on the reputation which further helps in creating the key generation. A novel signature scheme is used for identifying the participants; IDSMU is evaluated on computation count and efficiency is proved by comparing with an existing model considering computation count.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141231591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Al-Ansi, Abdullah M. Al-Ansi, A. Muthanna, A. Koucheryavy
{"title":"Blockchain technology integration in service migration to 6G communication networks: a comprehensive review","authors":"Ahmed Al-Ansi, Abdullah M. Al-Ansi, A. Muthanna, A. Koucheryavy","doi":"10.11591/ijeecs.v34.i3.pp1654-1664","DOIUrl":"https://doi.org/10.11591/ijeecs.v34.i3.pp1654-1664","url":null,"abstract":"The next generation of wireless networks, 6G is being designed with data-intensive applications. One of the key technologies that will enable 6G is blockchain technology. The emergence of blockchain technology and 6G networks has revolutionized service migration. Service migration in 6G networks is a complex process that requires the integration of new technologies, such as artificial intelligence (AI), edge computing, and network slicing. Motivated by these facts, this comprehensive review includes an overview of blockchain and service migration integration in 6G. First, state of art, development frame work and related works were introduced. Then, we used content analysis by WordStat software and bibliographic analysis by VOSviewer to analysis the current status of service migration and blockchain integration in 6G networks. Next, patterns and characteristics, benefits and challenges and potential cases were reviewed. Then, we proposed an architectural blockchain-based model including decentralized architecture, edge computing, network slicing, software-defined networking, and 5G-6G interworking in 6G. Finally, we described potential application service migration-based in 6G networks including digital twin (DT), holograms, robot avatar, high density internet of things (IoT), AR and VR in 6G and collected open research and future directions of service migration and blockchain.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141232024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohanavel Jothish Kumar, Suman Mishra, E. G. Reddy, M. Rajmohan, Subbiah Murugan, Narayanasamy Aswin Vignesh
{"title":"Bayesian decision model based reliable route formation in internet of things","authors":"Mohanavel Jothish Kumar, Suman Mishra, E. G. Reddy, M. Rajmohan, Subbiah Murugan, Narayanasamy Aswin Vignesh","doi":"10.11591/ijeecs.v34.i3.pp1665-1673","DOIUrl":"https://doi.org/10.11591/ijeecs.v34.i3.pp1665-1673","url":null,"abstract":"Security provisioning has become an important issue in wireless multimedia networks because of their crucial task of supporting several services. This paper presents Bayesian decision model based reliable route formation in internet of things (BDMI). The main objective of the BDMI approach is to distinguish unreliable sensor nodes and transmit the data efficiently. Active and passive attack recognition methods identify unreliable node sensor nodes. Remaining energy, node degree, and packet transmission rate parameters to observe their node possibilities for recognizing the passive unreliable nodes. In active recognition, the base station (BS) confirms every sensor node identity, remaining energy, supportive node rate, node location, and link efficiency parameters to detect active unreliable sensor nodes. The Bayesian decision model (BDM) efficiently isolates an unreliable sensor node in the multimedia network. Simulation outcomes illustrate that the BDMI approach can efficiently enhance unreliable node detection and minimize the packet loss ratio in the network.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141229239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}