cover
Contact Name
Imam Much Ibnu Subroto
Contact Email
imam@unissula.ac.id
Phone
-
Journal Mail Official
ijai@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN : 20894872     EISSN : 22528938     DOI : -
IAES International Journal of Artificial Intelligence (IJ-AI) publishes articles in the field of artificial intelligence (AI). The scope covers all artificial intelligence area and its application in the following topics: neural networks; fuzzy logic; simulated biological evolution algorithms (like genetic algorithm, ant colony optimization, etc); reasoning and evolution; intelligence applications; computer vision and speech understanding; multimedia and cognitive informatics, data mining and machine learning tools, heuristic and AI planning strategies and tools, computational theories of learning; technology and computing (like particle swarm optimization); intelligent system architectures; knowledge representation; bioinformatics; natural language processing; multiagent systems; etc.
Arjuna Subject : -
Articles 120 Documents
Search results for , issue "Vol 13, No 1: March 2024" : 120 Documents clear
Blockchain and machine learning in education: a literature review Alhabeeb, Sarah; Alrusayni, Norah; Almutiri, Reem; Alhumud, Sarah; Al-Hagery, Mohammed Abdullah
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp581-596

Abstract

There is a growing influence around the use of technology in education, with many solutions already being implemented and many others being explored. Using various forms of technology to assist the educational process has increased dramatically in the previous decade in education systems in many respects. Both machine learning and the blockchain have had a significant impact on education. The purpose of this study is to conduct a literature review on the application of machine learning and blockchain technology in educational institutions. Additionally, this study examines the potential applications, benefits, and challenges those educational institutions may face as a result of using machine learning and blockchain technologies. Using machine learning and blockchain in educational systems will have a positive impact on the entire educational process and student achievement. Researchers, academics, and practitioners will benefit from this study to focus on a wider range of educational applications and solve the related issues of machine learning and blockchain technology in the education sector.
Automatic detection of broiler’s feeding and aggressive behavior using you only look once algorithm Wahjuni, Sri; Wulandari, Wulandari; Eknanda, Rafael Tektano Grandiawan; Susanto, Iman Rahayu Hidayati; Akbar, Auriza Rahmad
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp104-114

Abstract

The high market demand for broiler chickens requires that chicken farmers improve their production performance. Production cost and poultry welfare are important competitiveness aspects in the poultry industry. To optimize these aspects, chicken behavior such as feeding and aggression needs to be observed continuously. However, this is not practically done entirely by humans. Implementation of precision live stock farming with deep learning can provide continuous, real-time and automated decisions. In this study, the you only look once version 4 (YOLOv4) architecture is used to detect feeding and aggressive chicken behavior. The data used includes 1,045 feeding bounding boxes and 753 aggressive bounding boxes. The model training is performed using the k-fold cross validation method. The best mean average precision (mAP) values obtained were 99.98% for eating behavior and 99.4% for aggressive behavior.
Attendance management system using face recognition Jadhav, Ashish; Kamble, Dhwaniket; Rathod, Santosh B.; Kumar, Sumita; Kadam, Pratima; Dalwai, Mohammad
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp673-679

Abstract

Traditional attendance systems consist of registers marked by teachers, leading to human error and a lot of maintenance. Time consumption is a key point in this system. We wanted to revolutionize the digital tools available in today's time i.e., facial recognition. This project has revolutionized to overcome the problems of the traditional system. Face recognition and marking the present is our project. A database of all students in the class is kept in single folder, and attendance is marked if each student's face matches with one of the stored faces. Otherwise, the face is ignored and not marked for attendance. In our project, face detection (machine learning) is used.
Measurement by applying internet financial reporting on the level of information presentation in the competitive FinTech peer-to-peer lending industry Al-Khowarizmi, Al-Khowarizmi; Efendi, Syahril; Nasution, Mahyuddin Khairuddin Matyuso; Mawengkang, Herman
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp66-73

Abstract

Technological advances in the financial sector can certainly support the business decision-making process. Moreover, digital financial technology such as FinTech is a competitive industry that has both peer-to-peer (P2P) and merchant pillars. The industry must update its business activities through its information media. One of them is internet-based financial reporting or better known as internet financial reporting (IFR). IFR itself is a delivery of financial information that is carried out in real time and can be easily seen by the wider community by using the website as a medium. This study aims to determine whether the application of IFR to FinTech P2P Lending companies in Indonesia has been widely implemented or not. Later the variables used in this study are content, appearance, and timing with a total of 20 indicator variable items to be tested. The results of this paper show that 30 P2P lending FinTech Industries in Indonesia have been able to implement IFR with an average score of 80%. IFR scores obtained by each industry have almost the same value ranging from 65% to 95% with the highest total score of 95% and the lowest score of 65%.
Statistical performance assessment of supervised machine learning algorithms for intrusion detection system Afolabi, Hassan A.; Aburas, Abdurazzag A.
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp266-277

Abstract

Several studies have shown that an ensemble classifier's effectiveness is directly correlated with the diversity of its members. However, the algorithms used to build the base learners are one of the issues encountered when using a stacking ensemble. Given the number of options, choosing the best ones might be challenging. In this study, we selected some of the most extensively applied supervised machine learning algorithms and performed a performance evaluation in terms of well-known metrics and validation methods using two internet of things (IoT) intrusion detection datasets, namely network-based anomaly internet of things (N-BaIoT) and internet of things intrusion detection dataset (IoTID20). Friedman and Dunn's tests are used to statistically examine the significant differences between the classifier groups. The goal of this study is to encourage security researchers to develop an intrusion detection system (IDS) using ensemble learning and to propose an appropriate method for selecting diverse base classifiers for a stacking-type ensemble. The performance results indicate that adaptive boosting, and gradient boosting (GB), gradient boosting machines (GBM), light gradient boosting machines (LGBM), extreme gradient boosting (XGB) and deep neural network (DNN) classifiers exhibit better trade-off between the performance parameters and classification time making them ideal choices for developing anomaly-based IDSs.
Evaluating sentiment analysis and word embedding techniques on Brexit Moudhich, Ihab; Fennan, Abdelhadi
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp695-702

Abstract

In this study, we investigate the effectiveness of pre-trained word embeddings for sentiment analysis on a real-world topic, namely Brexit. We compare the performance of several popular word embedding models such global vectors for word representation (GloVe), FastText, word to vec (word2vec), and embeddings from language models (ELMo) on a dataset of tweets related to Brexit and evaluate their ability to classify the sentiment of the tweets as positive, negative, or neutral. We find that pre-trained word embeddings provide useful features for sentiment analysis and can significantly improve the performance of machine learning models. We also discuss the challenges and limitations of applying these models to complex, real-world texts such as those related to Brexit. 
Sampling methods in handling imbalanced data for Indonesia health insurance dataset Kurniadi, Felix Indra; Purwandari, Kartika; Wulandari, Ajeng; Permai, Syarifah Diana
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp348-357

Abstract

Health insurance fraud is one of the most frequently occurring fraudulent acts and has become a concern for every insurance. According to data from The Indonesian General Insurance Association or Asosiasi Asuransi Umum Indonesia (AAUI), the private insurance industry suffered losses up to billions rupiah throughout 2018 due to the fraudulent acts commited by the perpetrators. The problem in with the number of frauds in Indonesia is that the current system is highly vulnerable and they is still done manually. The other problem from this detection is imbalance data which often occurs in fraudulent cases. In this research, we used a sampling methods using several machine learning as the baseline. The result shows that the instance hardness thresholding algorithm and extreme gradient boosting gives the best performance for all the case. It shows the method can reduced the bias and can achieve better generalization.
Source printer identification using convolutional neural network and transfer learning approach F. El Abady, Naglaa; H. Zayed, Hala; Taha, Mohamed
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp948-960

Abstract

In recent years, Source printer identification has become increasingly important for detecting forged documents. A printer's distinguishing feature is its fingerprints. Each printer has a unique collection of fingerprints on every printed page. A model for identifying the source printer and classifying the questioned document into one of the printer classes is provided by source printer identification. A paper proposes a new approach that trains three different approaches on the dataset to choose the more accurate model for determining the printer's source. In the first, some pre-trained models are used as feature extractors, and support vector machine (SVM) is used to classify the generated features. In the second, we construct a two-dimensional convolutional neural network (2D-CNN) to address the source printer identification (SPI) problem. Instead of SoftMax, 2D-CNN is employed for feature extractors and SVM as a classifier. This approach obtains 93.75% 98.5% accuracy for 2D-CNN-SVM in the experiments. The SVM classifier enhanced the 2D-CNN accuracy by roughly 5% over the initial configuration. Finally, we adjusted 13 already-pre-trained CNN architectures using the dataset. Among the 13 pre-trained CNN models, DarkNet-19 has the greatest accuracy of 99.2 %. On the same dataset, the suggested approaches achieve well in terms of classification accuracy than the other recently released algorithms. 
Performance analysis of congestion-aware Q-routing algorithm for network on chip Srivastava, Smriti; Moharir, Minal; Gunisetty, Shivaneetha
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp798-806

Abstract

A network on chip’s performance is greatly impacted by network congestion due to the substantial increase in latency and energy utilized. Designing routing strategies that keep the network informed of the status of traffic is made easier by machine learning techniques. In this work, a reinforcement-based congestion-aware Q-routing (CAQR) technique has been presented. The proposed algorithm performed better in comparison to the conventional XY routing method tested against the SPEC CPU2006 benchmark suite in the gem5 NoC simulator tool. The suite used has 4 benchmarks, namely, namd, lbm, leslie3d and bzip2 which can be used for the cores in the network in any combination. The tests were run with 16 cores on a 44 network with the maximum instruction count supported by the system (here 5,000). The proposed Q-routing algorithm showed an average of 19% reduction for benchmark simulation as compared to the Dimension-ordered (X-Y) routing for readings of average packet latency which is a crucial factor in determining a network’s efficiency. The analysis also shows an average reduction of 24%, 10%, 23% and 47% in terms of average packet network latency, average flit latency, average flit network latency and average energy consumption across various benchmarks.
Video saliency-recognition by applying custom spatio temporal fusion technique Warad, Vinay C.; Fatima, Ruksar
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp82-91

Abstract

Video saliency detection is a major growing field with quite few contributions to it. The general method available today is to conduct frame wise saliency detection and this leads to several complications, including an incoherent pixel-based saliency map, making it not so useful. This paper provides a novel solution to saliency detection and mapping with its custom spatio-temporal fusion method that uses frame wise overall motion colour saliency along with pixel-based consistent spatio-temporal diffusion for its temporal uniformity. In the proposed method section, it has been discussed how the video is fragmented into groups of frames and each frame undergoes diffusion and integration in a temporary fashion for the colour saliency mapping to be computed. Then the inter group frame are used to format the pixel-based saliency fusion, after which the features, that is, fusion of pixel saliency and colour information, guide the diffusion of the spatio temporal saliency. With this, the result has been tested with 5 publicly available global saliency evaluation metrics and it comes to conclusion that the proposed algorithm performs better than several state-of-the-art saliency detection methods with increase in accuracy with a good value margin. All the results display the robustness, reliability, versatility and accuracy.

Page 9 of 12 | Total Record : 120


Filter by Year

2024 2024


Filter By Issues
All Issue Vol 15, No 1: February 2026 Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 4: December 2024 Vol 13, No 3: September 2024 Vol 13, No 2: June 2024 Vol 13, No 1: March 2024 Vol 12, No 4: December 2023 Vol 12, No 3: September 2023 Vol 12, No 2: June 2023 Vol 12, No 1: March 2023 Vol 11, No 4: December 2022 Vol 11, No 3: September 2022 Vol 11, No 2: June 2022 Vol 11, No 1: March 2022 Vol 10, No 4: December 2021 Vol 10, No 3: September 2021 Vol 10, No 2: June 2021 Vol 10, No 1: March 2021 Vol 9, No 4: December 2020 Vol 9, No 3: September 2020 Vol 9, No 2: June 2020 Vol 9, No 1: March 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 More Issue