Table of Contents
Detection and Estimation of Schizophrenia Severity from Acoustic Features with Inclusion of K-means as Voice Activity Detection Function | |
Sheriff Alimi, Afolashade Oluwakemi Kuyoro, Monday Okpoto Eze, Oyebola Akande | 1-17 |
EfficientNet Model for Multiclass Classification of The Correctness of Wearing Face Mask | |
Khadijah Khadijah, Retno Kusumaningrum, Rismiyati Rismiyati, Nur Sabilly | 18-29 |
IVFD: An Intelligent Video Forgery Detection Framework Leveraging InceptionV3 and GRU for Enhanced Forensics | |
Kumbham Bhargavi, M Jahir Pasha, Rajitha Kotoju, M. Sree Vani | 30-44 |
Transfer Learning for Detecting Alzheimer’s Disease in Brain Using Magnetic Resonance Images | |
Md. Monirul Islam, Jia Uddin | 45-56 |
Improving Channel Gain of 6G Communications Systems Supported by Intelligent Reflective Surface | |
Abbas Thajeel Rhaif Alsahlanee, Jehan Kadhim Shareef Al-Safi | 57-68 |
Simulation-Based Evaluation of Dense Convolutional Neural Networks for Skin Cancer Detection | |
Kavita Behara, Ernest Bhero, John Terhile Agee | 69-94 |
Enhanced Field-Oriented Control for Synchronous Reluctance Motor Using Fuzzy Logic | |
Sayed O. Madbouly | 95-109 |
Developing a Prototype for Enhancing Data Security in LoRaBased Theft Detection Systems Using ASCON-128 Encryption | |
Fetty Amelia, Bella Wulandari Hartejo | 110-124 |
Enhancing LEACH Protocol with Multi-Criteria Decision Making for Prolonged Network Lifetime in WSNs | |
Mohammed A. Altaha, Ghazwan Abdulnabi Al Ali | 125-136 |
Optimizing Data Survivability in Unattended Wireless Sensor Networks: A Machine Learning Approach to Cluster Head Selection and Hybrid Homomorphic Encryption | |
Haritha K Sivaraman, Rangaiah L | 137-155 |
Leveraging Gradient based Optimization based Unequal Clustering Algorithm for Hotspot Problem in Wireless Sensor Networks | |
Jenita Mary Arockiam, Archana R. Panhalkar, Rajkumar Shankarrao Bhosale, S. Kavitha, Desidi Narsimha Reddy, Swetha Kodali | 156-168 |
Methodological Approach to Automated Recognition of Atrial Fibrillation and Subsequent Classification | |
Abas Lampezhev, Naur Ivanov, Tagirbek Aslanov, Muhamed Nogmov, Viktor Lysenko | 169-183 |
A Novel Methodology for Container Scheduling and Load Balancing in Distributed Environments | |
Saravanan M.S, Neelima Gogineni | 184-195 |
A Survey on Blockchain-Based Routing in Communication Networks | |
Patikiri Arachchige D.S.N. Wijesekara | 196-225 |
Clustering the Addiction Levels of Drug Users Using Fuzzy C-Mean | |
Okfalisa Okfalisa, Pramulia Suliandri, Ola A. Alwesabi, Bolat Tassuov, Raimbayeva Saule, Kurdyukov Vitaliy, Zahidah Zulkifli, Lestari Handayani | 226-238 |
A Novel Compact CPW-fed Octagonal-Shaped Slotted Antenna for UWB Applications | |
A. Franklin Alex Joseph, B. Jothi, R. Shantha Sheela, N. Anitha, S.B. Priya, C. Mohan | 239-248 |
Leveraging Ensemble Learning Models for Human Activity Recognition | |
M. Janaki, Sarojini Balakrishnan | 249-260 |
Dual Band Circular Polarized Design of Rectangular Microstrip Antenna For GPS L-band and Galileo E-band Applications | |
Amit A. Deshmukh, Tejal P. Page, Venkata A. P. Chavali | 261-276 |
Systematic Literature Review: Security Challenges of IoT-based Smart Home Systems | |
Abdullah Ali Ben-Nakhi, Mostafa Abd El-barr, Kalim Uddin Qureshi | 277-293 |
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272
This work is licensed under a Creative Commons Attribution 4.0 International License.