cover
Contact Name
Imam Much Ibnu Subroto
Contact Email
imam@unissula.ac.id
Phone
-
Journal Mail Official
ijai@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN : 20894872     EISSN : 22528938     DOI : -
IAES International Journal of Artificial Intelligence (IJ-AI) publishes articles in the field of artificial intelligence (AI). The scope covers all artificial intelligence area and its application in the following topics: neural networks; fuzzy logic; simulated biological evolution algorithms (like genetic algorithm, ant colony optimization, etc); reasoning and evolution; intelligence applications; computer vision and speech understanding; multimedia and cognitive informatics, data mining and machine learning tools, heuristic and AI planning strategies and tools, computational theories of learning; technology and computing (like particle swarm optimization); intelligent system architectures; knowledge representation; bioinformatics; natural language processing; multiagent systems; etc.
Arjuna Subject : -
Articles 123 Documents
Search results for , issue "Vol 13, No 2: June 2024" : 123 Documents clear
Design of smoke detection system using deep learning and sensor fusion with recursive feature elimination cross-validation Julian, James; Bagas Dewantara, Annastya; Wahyuni, Fitri
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp1658-1667

Abstract

The fire safety system is an important component that controls material and immaterial losses. Fire disasters are generally indicated by the appearance of excess smoke and changes in temperature, pressure, and changes in other parameters in the environment. Conventional smoke sensors are limited in reading parameter changes around their environment, making them less effective in early fire detection. This study aims to design a smoke detection system as an early fire detection system, using sensor fusion based on deep learning using the recursive feature elimination method with cross-validation (RFECV) using a random forest classifier used to select optimal parameters from public datasets as the basis for determining the sensor to be used. Based on the RFECV optimal feature, a deep learning algorithm was performed and obtained an accuracy of 0.99, a precision of 0.99, a recall of 1.00, and an F1 score of 0.99, with a latency time of 34.02 μs, which is 71.76% times faster than the original model.
An ensemble-based approach for effective distributed denial of service attack detection in software defined networking Ahmed, Mohammed Majid; Abdulkader, Hasan
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp2019-2026

Abstract

Software defined networking (SDN) is a network framework that aims to redefine network characteristics through the programmability of network components, faster and larger network monitoring, centralized network operation, and effective detection of fraudulent traffic and special malfunctions. However, SDN networks are vulnerable to security threats that can cause complete network failure. To address this issue, in this paper, machine learning techniques are suggested for the swift detection of attacks. Various methods for detecting distributed denial of service (DDoS) attacks are evaluated, and the study identifies the most precise method for categorizing such attacks within a SDN network. The results indicate that the proposed system achieves high accuracy in detecting DDoS attacks, with ensemble learning achieving 99% accuracy. This indicates a remarkable improvement percentage in comparison to the approaches of decision tree (DT), k-nearest neighbors (KNN), and support vector machine (SVM).
A novel framework for analyzing internet of things datasets for machine learning and deep learning-based intrusion detection systems Arief, Muhammad; Gunawan, Made; Septiadi, Agung; Wibowo, Mukti; Pragesjvara, Vitria; Supriatna, Kusnanda; Satriyo Nugroho, Anto; Baskara Nugraha, I Gusti Bagus; Supangkat, Suhono Harso
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp1574-1584

Abstract

To generate a machine learning (ML) and deep learning (DL) architecture with good performance, we need a decent dataset for the training and testing phases of the development process. Starting with the knowledge discovery and data mining (KDD) Cup 99 dataset, numerous datasets have been produced since 1998 to be utilized in the ML and DL-based intrusion detection systems (IDS) training and testing process. Because there are so many datasets accessible, it might be challenging for researchers to choose which dataset to employ. Therefore, a framework for evaluating dataset appropriateness with the research to be conducted is becoming increasingly crucial as new datasets are regularly created. Additionally, given the growing popularity of internet of things (IoT) devices and an increasing number of specific datasets for IoT in recent years, it is essential to have a specific framework for IoT datasets. Therefore, this research aims to develop a new framework for evaluating IoT datasets for ML and DL-based IDS. The study's findings include, first, a novel framework for assessing IoT datasets, second, a comparison of this novel framework to other existing frameworks, and third, an analysis of five IoT datasets by using the new framework.
Computer model for detecting tsunami wave hazard on built-up land using machine learning and sentinel 2A satellite imagery Joko Prasetyo, Sri Yulianto; Sulistyo, Wiwin; Christanto, Erwien; Hasiholan Simanjuntak, Bistok
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp1535-1546

Abstract

The aim of this research is to compile a tsunami wave hazard scale based on built-up land density extracted and classified by machine learning from Sentinel 2A satellite and digital elevation model (DEM) imageries. This research was carried out in 5 stages, namely: (i) pre-processing of Sentinel 2A and DEM images, (ii) Classification of VI data using the machine learning algorithms, (iii) Spatial prediction using the ordinary kriging method, (iv) Field testing using the confusion matrix method, (v) Preparation of decision matrix for tsunami wave hazard. The results of the study show that the most accurate classification algorithm for classifying built-up indices data is the k-nearest neighbor (k-NN) algorithm. The results of the statistical accuracy test show that the most accurate is normalized difference built-up index (NDBI) with a mean of square error (MSE) value of 0.073 and a mean of absolute error (MAE) of 0.003. DEM analysis shows that the research area is at an altitude of 0–15 meters above sea level so it is in the high vulnerability to medium vulnerability category. Field testing showed user accuracy of 91.11%, manufacturer accuracy of 92.16%, and overall average accuracy of 91%.
Low-resolution facial emotion recognition on low-cost devices Dwisnanto Putro, Muhamad; Litouw, Jane; Poekoel, Vecky Canisius
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp2201-2211

Abstract

The low-resolution input image is a crucial challenge for applying facial emotion recognition in real-world scenarios. The critical problem is that valuable object features are relatively lost in the extraction process due to their small size. On the other hand, this vision system is required by a machine to run smoothly on lowcost devices. Facial emotion recognition using a lightweight feature extractor is proposed in this study to effectively capture crucial facial components in a lowresolution image. To compromise the running speed, this work offers an efficient feature convolution to discriminate specific facial features. In addition, the system is embedded with an attentive module to capture important features and correlate them. Our model performance is evaluated on low-resolution public datasets achieving the accuracy of 97.34%, 81.10%, and 80.12% on Karolinska directed emotional faces (KDEF), real-world affective faces database (RFDB), and facial expression recognition 2013 plus (FER2013Plus), respectively. The practical application demands that the deep learning model can operate fast on inexpensive devices. Consequently, the model achieved a speed of 290 frames per second (FPS) on a central processing unit (CPU) device.
Enhancing service excellence: analyzing natural language question answering with advanced cosine similarity Arifudin, Riza; Subhan, Subhan; Ifriza, Yahya Nur
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp1773-1781

Abstract

Information related to student services in higher education must be produced and disseminated in various forms. Covid-19 pandemic, student services with a remote model related to this question and answer become very important. To carry out this automation process, the advanced cosine similarity method is used to check the similarity of the questions to the database and statistics to calculate the similarity value of each word. The proposed paper proceeds with three phases. The first stage to solve this problem is the data processed in question; the professional next step is word insertion. It converts alphanumeric words to vector format. Each word is a vector that represents a point in space with a certain dimension. The recommended advanced cosine similarity data still must be analyzed into a statistical approach. We will measure accuracy to get results so that optimal results and answers are obtained, research procedures are carried out based on literature study, initial data collection and observation, system development, system testing, system analysis, and system evaluation. This research implemented in universities with student chat automation applications providing an accuracy 83.90% given by natural language question answering system (NLQAS) so that it can improve excellent service in universities.
Generative adversarial network-based phishing URL detection with variational autoencoder and transformer Kaitholikkal Sasi, Jishnu; Balakrishnan, Arthi
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp2165-2172

Abstract

Phishing attacks pose a constant threat to online security, necessitating the development of efficient tools for identifying malicious URLs. In this article, we propose a novel approach to detect phishing URLs employing a generative adversarial network (GAN) with a variational autoencoder (VAE) as the generator and a transformer model with self-attention as the discriminator. The VAE generator is trained to produce synthetic URLs. In contrast, the transformer discriminator uses its self-attention mechanism to focus on the different parts of the input URLs to extract crucial features. Our model uses adversarial training to distinguish between legitimate and phishing URLs. We evaluate the effectiveness of the proposed method using a large set of one million URLs that incorporate both authentic and phishing URLs. Experimental results show that our model is effective, with an impressive accuracy of 97.75%, outperforming the baseline models. This study significantly improves online security by offering a novel and highly accurate phishing URL detection method.
Coronavirus risk factor by Sugeno fuzzy logic Qasim Hasan, Saba; Omar Al-Nima, Raid Rafi; Esmail Mahmmod, Sahar
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp1420-1429

Abstract

World recently faced big challenges with the pandemic of coronavirus disease 2019 (COVID-19). Governments suffer from the problem of appropriately identifying the risk factor of this virus and establishing their safety procedures accordingly. This paper concentrates on designing a coronavirus risk factor (CRF) by the power of Sugeno fuzzy logic (SFL). The main advantage of the CRF is that it can provides a quick and suitable risk evaluation. According to the degree of severity, three essential parameters are considered: number of infected cases, number of people in intensive care units (ICU) and number of deaths. All of these parameters are provided per population. Such interesting and promising outcomes are attained, where the total effect is found equal to 95.3%.
Financial technology forecasting using an evolving connectionist system for lenders and borrowers: ecosystem behavior Al-Khowarizmi, Al-Khowarizmi; Watts, Michael J.; Efendi, Syahril; Abdulbasah Kamil, Anton
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp2386-2394

Abstract

Financial technology (FinTech) which is included in the development of digitalization in the financial sector in the industrial era 4.0. FinTech can make any transactions anywhere with the pillars of peer-to-peer (P2P) lending, merchants, and crowdfunding. In the P2P lending pillar, there are borrowers and lenders who are digitized in FinTech devices. FinTech in Indonesia is controlled by a state agency called the financial services authority or otoritas jasa keuangan (OJK). In the movement of P2P lending, there are borrowers and lenders who can be said to be investors where these activities are reported to the OJK. This data can be forecasted using a neural network approach such as evolving connectionist system (ECoS), which is a method capable of forecasting with learning that develops in the hidden layer. In this research article, we present results on forecasting borrowers with a mean absolute percentage error (MAPE) of 0.148% and forecasting lenders with an accuracy measurement with MAPE of 0.209% with a learning rate 1=0.6 and a learning rate 2=0.3. So, this forecasting model can be said as an optimization in FinTech activities on the behavior of borrowers and lenders.
Hand gesture-based automatic door security system using squeeze and excitation residual networks Prihanto, Surya; Effendy, Nazrul; Nopriadi, Nopriadi
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp1619-1624

Abstract

Viruses can be transmitted in various ways; one spreads through airborne droplets or the touch of multiple objects. This can occur in any area, including the entrance to the house or access to a room or deposit box. The spread of viruses that cause diseases like COVID-19 has caused many human casualties, and there is still the possibility of similar conditions appearing in the future. Several things need to be done to reduce the chances of spreading disease due to viruses, including developing contactless security support methods. This paper proposes a security system using hand gesture recognition using squeeze and excitation residual networks (SE-ResNet). This research offers a hand gesture recognition system for an automatic door system using SE-ResNet and the residual network (ResNet).

Page 7 of 13 | Total Record : 123


Filter by Year

2024 2024


Filter By Issues
All Issue Vol 15, No 1: February 2026 Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 4: December 2024 Vol 13, No 3: September 2024 Vol 13, No 2: June 2024 Vol 13, No 1: March 2024 Vol 12, No 4: December 2023 Vol 12, No 3: September 2023 Vol 12, No 2: June 2023 Vol 12, No 1: March 2023 Vol 11, No 4: December 2022 Vol 11, No 3: September 2022 Vol 11, No 2: June 2022 Vol 11, No 1: March 2022 Vol 10, No 4: December 2021 Vol 10, No 3: September 2021 Vol 10, No 2: June 2021 Vol 10, No 1: March 2021 Vol 9, No 4: December 2020 Vol 9, No 3: September 2020 Vol 9, No 2: June 2020 Vol 9, No 1: March 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 More Issue