cover
Contact Name
Heri Nurdiyanto
Contact Email
Heri Nurdiyanto
Phone
-
Journal Mail Official
internationaljournalair@gmail.com
Editorial Address
-
Location
Kota metro,
Lampung
INDONESIA
International Journal of Artificial Intelligence Research
Published by STMIK Dharma Wacana
ISSN : -     EISSN : 25797298     DOI : -
International Journal Of Artificial Intelligence Research (IJAIR) is a peer-reviewed open-access journal. The journal invites scientists and engineers throughout the world to exchange and disseminate theoretical and practice-oriented topics of Artificial intelligent Research which covers four (4) majors areas of research that includes 1) Machine Learning and Soft Computing, 2) Data Mining & Big Data Analytics, 3) Computer Vision and Pattern Recognition, and 4) Automated reasoning. Submitted papers must be written in English for initial review stage by editors and further review process by minimum two international reviewers.
Arjuna Subject : -
Articles 621 Documents
An Implementation of Fuzzy PD Control Design for Five Flip Folders Folding Machine Using Arduino Mega2560 pambudi, wahyu setyo; Zuliari, Efrita Arfah; Firmansyah, Riza Agung; Nasiruddin, Muhammad Hasbi
International Journal of Artificial Intelligence Research Vol 4, No 1 (2020): June
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (496.112 KB) | DOI: 10.29099/ijair.v3i2.90

Abstract

The arm manipulator application that has 1 degree of freedom (DOF) can be used to flip folders in folding machines. The used actuator in folding machine is a Brushed DC motor. The Fuzzy-PD control system in this application is using Arduino Mega2560 microcontroller. Application of Fuzzy-PD control system on folding machine is able to move 5 flip folders. This Fuzzy-PD control system is able to improve the system response when there is a load, where the difference is only 7.73% from the no load condition. In addition, to implement this flip folder, a stochastic based method (ARX) is also applied on this system so it can be simulated directly. The simulation results from this folding machine model have a time constant of 0.510s, rise time of 1.501s, settling time of 1.5320s and delay time of 0.353s.
Comparison Analysis of K-Nearest Neighbor and Naïve Bayes in Determining Talent of Adolescence Jusman, Yessi; Rahmalina, Widdya; Zarman, Juni
International Journal of Artificial Intelligence Research Vol 4, No 1 (2020): June
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (303.209 KB) | DOI: 10.29099/ijair.v4i1.118

Abstract

Adolescence always searches for the identity to shape the personality character. This paper aims to use the artificial intelligent analysis to determine the talent of the adolescence. This study uses a sample of children aged 10-18 years with testing data consisting of 100 respondents. The algorithm used for analysis is the K-Nearest Neigbor and Naive Bayes algorithm. The analysis results are performance of accuracy results of both algorithms of classification. In knowing the accurate algorithm in determining children's interests and talents, it can be seen from the accuracy of the data with the confusion matrix using the RapidMiner software for training data, testing data, and combined training and testing data. This study concludes that the K-Nearest Neighbor algorithm is better than Naive Bayes in terms of classification accuracy.
Machine Learning-Based Distributed Denial of Service Attack Detection on Intrusion Detection System Regarding to Feature Selection Muhammad, Arif Wirawan; Foozy, Cik Feresa Mohd; Azhari, Ahmad
International Journal of Artificial Intelligence Research Vol 4, No 1 (2020): June
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (484.09 KB) | DOI: 10.29099/ijair.v4i1.156

Abstract

Distributed Service Denial (DDoS) is a type of network attack, which each year increases in volume and intensity.  DDoS attacks also form part of the major types of cyber security threats so far. Early detection plays a key role in avoiding the catastrophic effects on server infrastructure from DDoS attacks. Detection techniques in the traditional Intrusion Detection System (IDS) are far from perfect compared to a number of modern techniques and tools used by attackers, because the traditional IDS only uses signature-based detection or anomaly-based detection models and causes a lot of false positive flags, since the flow of computer network data packets has complex properties in terms of both size and source. Based on the  deficiency in the ordinary IDS, this study aims to detect DDoS attacks by using machine learning techniques to enhance IDS policy development.  According to the experiment the selection of features plays an important role in the precision of the detection results and in the performance of machine learning in classification problems. The combination of seven key selected dataset features used as an input neural network classifier in this study provides the highest accuracy value at 97.76%.
Counting the Number of Active Spermatozoa Movements Using Improvement Adaptive Background Learning Algorithm I Gede Susrama Masdiyasa; Intan Yuniar Purbasari; Moch. Hatta; Achmad Junaidic
International Journal of Artificial Intelligence Research Vol 4, No 1 (2020): June
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (479.012 KB) | DOI: 10.29099/ijair.v4i1.94

Abstract

The most important early stage in sperm infertility research is the detection of sperm objects. The success rate in separating sperm objects from semen fluid has an important role for further analysis. This research performed the detection and calculation of human spermatozoa. The detected sperm was the moving sperm in the video data. An improvement of Adaptive Background Learning was applied to detect the moving sperm. The purpose of this method is to improve the performance of Adaptive Background Learning algorithm in background subtraction process to detect and calculate moving sperm on the microscopic video of sperm fluid. This paper also compared several other background subtraction algorithms to conclude the appropriate background subtraction algorithm for sperm detection and sperm counting. The process done in this research was preprocessing using the Gaussian filter. The next was background subtraction process, followed by morphology operation. To test or validate the detection results of any background subtraction algorithm used, the foreground mask results from the morphological operation were compared to the ground truth of moving sperm image. For visualization purposes, every BLOB area (white object in binary image) on the foreground were given a bounding box to the original frame and the number of BLOB objects present in the foreground mask were counted. This shows that the system had been able to detect and calculate moving sperm. Based on the test results, Adaptive Background Learning method had a value of F-measure of 0.9205 and succeeded in extracting sperm shape close to the original form compared to other methods.
Artificial Intelligence Influence In Education 4.0 To Architecture Cloud Based E-Learning System Hendradi, Purwono; Ghani, Mohd Khanapi Abd; Mahfuzah, S.N; Yudatama, Uky; Prabowo, N Agung; Widyanto, R Arri
International Journal of Artificial Intelligence Research Vol 4, No 1 (2020): June
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (279.781 KB) | DOI: 10.29099/ijair.v4i1.109

Abstract

Business Application Layer in the Architecture of E-learning cloud is an important part, because it is the part that differentiates it from the application of cloud in other fields. The development of education today recognizes the term Education 4.0 which is an adaptation of the Industrial era 4.0 where in this era the role of Artificial Intelligent is important. In this paper the author will review a part of the cloud-based architecture of E-Learning which will correspond with Education 4.0. The aim will be to produce a Cloud-Based E-learning system Architecture design that can be used as a guideline in the direction of Education 4.0.
Data Envelopment Analysis with Lower Bound on Input to Measure Efficiency Performance of Department in Universitas Malikussaleh Dahlan Abdullah; Cut Ita Erliana; Muhammad Fikry
International Journal of Artificial Intelligence Research Vol 4, No 1 (2020): June
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (299.606 KB) | DOI: 10.29099/ijair.v4i1.164

Abstract

DEA has become one of the most appropriate methods for comparing the various Decision-Making Units (DMU) associated with public services such as universities.  There are two primary outputs that can be used to measure college performance, namely: the number of graduates and the number of publications.  While the primary input of college efficiency measurement is the number of teaching staff and the number of students.  The higher learning institution is  Universitas Malikussaleh, located in Lhokseumawe, a city in the Aceh province of Indonesia. This paper develops a method to evaluate the efficiency of all departments in Universitas Malikussaleh using DEA with bounded input. The extreme dissimilarity between the weights often found in DEA applications. In this paper, we develop a new DEA model, which can be transformed into a particular case of the bi-level linear program to calculate the lower boundary of input from the pessimistic viewpoints based on the shortcomings of the existing approaches. In the case of having a single input, providing lower bounds for the input weights by imposing the conditions that it uses for the average input level of the DMU being assessed uses per unit of output.  Accordingly, we present some essential differences inefficiency of those departments. Finally, we discuss the effort that should be made by these departments in order to become efficient
A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing Hidayat, Taufik; Mahardiko, Rahutomo
International Journal of Artificial Intelligence Research Vol 4, No 1 (2020): June
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (344.268 KB) | DOI: 10.29099/ijair.v4i1.154

Abstract

Cloud computing is one revolution in information technology (IT) that can share resources, services and data through a network among users. Because users have same rights on the network to transfer data, data are vulnerable to be attacked by unauthorized person. Lately, data security in a system only concentrates on data storage on cloud by utilizing internet security, but a little concentration is found during data transfer. By considering security as a serious problem, an encryption-based proposed system is presented to secure during data transfer. Authors propose an approach to boost system security during data transfer in order to prevent data theft by unauthorized person. To prevent an attack by unauthorized person, Advanced Encryption Standard (AES) will be proposed to secure data transfer and storage in cloud computing. For better future, authors will propose Systematic Literature Review (SLR) to generate suggestions and opportunities in AES cloud computing.
Covid-19: Digital Signature Impact on Higher Education Motivation Performance Untung Rahardja; Sudaryono Sudaryono; Nuke Puji Lestari Santoso; Adam Faturahman; Qurotul Aini
International Journal of Artificial Intelligence Research Vol 4, No 1 (2020): June
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (450.23 KB) | DOI: 10.29099/ijair.v4i1.171

Abstract

At present, the process of validating documents for certain purposes cannot be done face-to-face because of the Covid-19 pandemic. Therefore, this research aims to maximize the existence of smart digital signature technology that guarantees its safety and validity without having to meet face to face. Encrypted digital signatures with RSA-SHA256 with cloud storage features that can share documents. The waterfall method for building systems, the collection of data generated for analysis by observation, and online questionnaires using Google Form.  Based on the characteristics of the system, the satisfaction factor analysis of the system with the Slovin formula processed by the SUS score resulted in a score of 95 > 70. The final result of this study is that the digital signature system has a significant impact on increasing motivation to facilitate authorization and secure documents.
Analysis of Expert System for Early Diagnosis of Disorders During Pregnancy Using the Forward Chaining Method Basiroh, Basiroh; Priyatno, Priyatno; Kareem, Shahab Wahhab; Nurdiyanto, Heri
International Journal of Artificial Intelligence Research Vol 5, No 1 (2021): June 2021
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (361.062 KB) | DOI: 10.29099/ijair.v5i1.203

Abstract

Nowadays technological developments are increasingly having a positive influence on the development of human life, including in the health sector. One of them is an expert system that can transfer an expert's knowledge into a computer application to simplify and speed up the diagnosis of a disorder or disease in humans. The purpose of this final project is to design an application to diagnose diseases that occur during pregnancy which is caused by the existence of these pregnancies to simplify and speed up the diagnosis of diseases experienced by pregnant women. This study uses the forward chaining method. By involving experts in this expert system analysis according to current needs. Users are given easy access to information on several types of pregnancy disorders and their symptoms, as well as consultation through several questions that the user must answer to find out the results of the diagnosis. While experts are facilitated in system management, both the process of adding, updating and, deleting data.
The Development of ITSM Research in Indonesia: A Systematic Literature Review Hayadi, B.Herawan; Sukmana, Husni Teja; Shafiera, Eghar; Kim, Jin-Mook
International Journal of Artificial Intelligence Research Vol 5, No 2 (2021): December 2021
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (631.666 KB) | DOI: 10.29099/ijair.v5i2.233

Abstract

IT Service Management (ITSM) is a framework used to support businesses by increasing IT service quality. Several studies have tried to examine the development of ITSM based on their respective interests. However, the development of ITSM in Indonesia has not been widely studied, such as the types of research that are most often investigated, what domains are often researched, the areas and types of companies being studied. The things above are the main objectives of this research. The method used in capturing data, screening, and analysis is the systematic literature review method. There are many findings obtained from this research. One of them is the domination of the service operation research area (45%) among other areas. Meanwhile, applied research had been researched quite consistently over the last five years. From these results,  it can be noticed that a deeper understanding of the synchronization between business and IT is needed. This is in accordance with the objectives of ITSM implementation so that future research is expected to provide balance in other areas, such as service strategy, design, transition, operation, and continuous service improvement.

Page 4 of 63 | Total Record : 621