International Journal of Electrical and Computer Engineering Research https://www.ijecer.org/ijecer <p>International Journal of Electrical and Computer Engineering Research (IJECER) is an academic journal that publishes research articles and review articles emerging from theoretical and experimental studies in all fields of electrical and computer engineering. IJECER is an open access, free publication and peer-reviewed journal. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles, or use them for any other lawful purpose, without asking prior permission from the publisher or the author. In addition, there is no APC fee. In order for the articles submitted to the journal to be evaluated, they should not have been published elsewhere before and the similarity rate should be less than 20%. <br />The main aim of IJECER is to publish quality original scientific papers and bring together the latest research and development in various fields of science and technology related electrical and computer enginerring. IJECER is published quarterly a year, in March, June, September and December. Permanent links to published papers are maintained by using the Digital Object Identifier (DOI) system by CrossRef.</p> <p>The topics related to this journal include but are not limited to:</p> <table border="0" width="100%"> <tbody> <tr> <td>Electrical engineering<br />Computer engineering<br />Electronics engineering<br />Biomedical engineering<br />Mechatronics engineering<br />Electrical energy and power<br />Internet of things emerging technologies<br />Internet technologies, and smart devices<br />Computer science and information technology<br />Artificial intelligence and soft computing<br />Computational science and engineering<br />Big data and cloud computing<br />Signal, image and speech processing<br />Networking and the internet</td> <td>Pattern recognition<br />Renewable energy<br />Algorithms and applications<br />Green technologies in information<br />Circuits and electronics<br />Power electronics and drives<br />Wireless sensor network<br />Computer software engineering<br />Communications and wireless networks<br />Sensors and actuators<br />Computer vision and robotics<br />Embedded systems<br />Radar and sonar systems<br />Robotics</td> </tr> </tbody> </table> ECER en-US International Journal of Electrical and Computer Engineering Research 2791-6677 Algorithm-Driven Multi-User Platform for Decentralized Coordination in Self-Organizing UAV Swarms https://www.ijecer.org/ijecer/article/view/465 <p>This paper introduces a comprehensive software platform designed to coordinate self-organizing UAV swarms through a secure and modular client-server system. Developed with multi-user collaboration in mind, the platform features an intuitive, cross-platform interface that allows users to define mission tasks, construct navigation graphs, and monitor swarm activity in real time.</p> <p>At the heart of the system is a robust path-planning algorithm based on the rotor-router model with loop reversibility, which enables reliable and evenly distributed task coverage without relying on randomness. To enhance fault tolerance and ensure resilience in communication-limited environments, the platform employs a gossip-based broadcast algorithm. This allows swarm members to share information efficiently and maintain coordinated behaviour, even when some nodes experience failures or connectivity issues.</p> <p>A built-in simulation module enables users to test and refine swarm coordination strategies before deployment, reducing operational risk and improving mission reliability. By simulating various environmental conditions and mission scenarios, users can evaluate system behaviour and optimize task execution. In parallel, the platform supports real-time 3D panorama generation from UAV-captured images, providing rich visual context and enabling more effective post-mission analysis.</p> <p>Taken together, these features form a scalable, secure, and highly flexible system for managing decentralized drone swarms. The platform is well-suited for applications that demand coordination across multiple agents, including environmental monitoring, search and rescue, infrastructure inspection, and autonomous exploration. It bridges theoretical rigor with practical usability, offering a reliable toolset for both researchers and mission operators. Our work builds on earlier systems, introducing hybrid rotor-router initialization, algorithmic no-fly zone enforcement, and dual-toolchain image stitching.</p> Agit Atashyan Artyom Lazyan Davit Hayrapetyan Vahagn Poghosyan Suren Poghosyan Copyright (c) 2025 International Journal of Electrical and Computer Engineering Research https://creativecommons.org/licenses/by-nc-nd/4.0 2025-06-15 2025-06-15 5 2 7 13 10.53375/ijecer.2025.465 Framework for Monitoring Malicious Channels in Phishing Campaigns: A Cyber Threat Intelligence Perspective https://www.ijecer.org/ijecer/article/view/451 <p>Phishing campaigns are becoming more sophisticated, using encrypted communication platforms like telegram to coordinate their activities and store stolen information. This paper introduces a structured and scalable framework that supports cyber threat intelligence (CTI) efforts in monitoring malicious telegram channels linked to phishing activity.The framework is based on a combination of machine learning and human expertise, and it leverages a large dataset of telegram messages and their corresponding labels to train and evaluate the performance of the model. The methodology involves four interconnected stages: extracting hidden artifacts from phishing code, gaining unauthorized access to private telegram groups, analyzing collected data automatically, and implementing counterintelligence measures to prevent detection. Initial findings validate the framework's ability to detect indicators of compromise (IoCs) and visualize the attacker's infrastructure. Additional functionalities like integration with threat intelligence platforms and artificial intelligence-based data enrichment enhance the framework's versatility and usefulness. This method improves proactive communication monitoring, providing a secure and flexible solution for tracking adversarial communication channels.</p> Ivo Ricardo Dias Rosa Copyright (c) 2025 International Journal of Electrical and Computer Engineering Research https://creativecommons.org/licenses/by-nc-nd/4.0 2025-06-15 2025-06-15 5 2 1 6 10.53375/ijecer.2025.451