cover
Contact Name
Imam Much Ibnu Subroto
Contact Email
imam@unissula.ac.id
Phone
-
Journal Mail Official
ijai@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN : 20894872     EISSN : 22528938     DOI : -
IAES International Journal of Artificial Intelligence (IJ-AI) publishes articles in the field of artificial intelligence (AI). The scope covers all artificial intelligence area and its application in the following topics: neural networks; fuzzy logic; simulated biological evolution algorithms (like genetic algorithm, ant colony optimization, etc); reasoning and evolution; intelligence applications; computer vision and speech understanding; multimedia and cognitive informatics, data mining and machine learning tools, heuristic and AI planning strategies and tools, computational theories of learning; technology and computing (like particle swarm optimization); intelligent system architectures; knowledge representation; bioinformatics; natural language processing; multiagent systems; etc.
Arjuna Subject : -
Articles 121 Documents
Search results for , issue "Vol 13, No 3: September 2024" : 121 Documents clear
Transfer learning scenarios on deep learning for ultrasoundbased image segmentation Bani Unggul, Didik; Iriawan, Nur; Kuswanto, Heri
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3273-3282

Abstract

Deep learning coupled with transfer learning, which involves reusing a pretrained model's network structure and parameter values, offers a rapid and accurate solution for image segmentation. Differing approaches exist in updating transferred parameters during training. In some studies, parameters remain frozen or untrainable (referred to as TL-S1), while in others, they act as trainable initial values updated from the first iteration (TL-S2). We introduce a new state-of-the-art transfer learning scenario (TL-S3), where parameters initially remain unchanged and update only after a specified cutoff time. Our research focuses on comparing the performance of these scenarios, a dimension yet unexplored in the literature. We simulate on three architectures (Dense-UNet-121, Dense-UNet-169, and Dense-UNet-201) using an ultrasound-based dataset with the left ventricular wall as the region of interest. The results reveal that the TL-S3 consistently outperforms the previous state-of-the-art scenarios, i.e., TL-S1 and TL-S2, achieving correct classification ratios (CCR) above 0.99 during training with noticeable performance spikes post-cutoff. Notably, two out of three top-performing models in the validation data also originate from TL-S3. Finally, the best model is the Dense-UNet-121 with TL-S3 and a 20% cutoff. It achieves the highest CCR for training 0.9950, validation 0.9699, and testing data 0.9695, confirming its excellence.
A three-step combination strategy for addressing outliers and class imbalance in software defect prediction Rizky Pribadi, Muhammad; Dwi Purnomo, Hindriyanto; Hendry, Hendry
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp2987-2998

Abstract

Software defect prediction often involves datasets with imbalanced distributions where one or more classes are underrepresented, referred to as the minority class, while other classes are overrepresented, known as the majority class. This imbalance can hinder accurate predictions of the minority class, leading to misclassification. While the synthetic minority oversampling technique (SMOTE) is a widely used approach to address imbalanced learning data, it can inadvertently generate synthetic minority samples that resemble the majority class and are considered outliers. This study aims to enhance SMOTE by integrating it with an efficient algorithm designed to identify outliers among synthetic minority samples. The resulting method, called reduced outliers (RO)-SMOTE, is evaluated using an imbalanced dataset, and its performance is compared to that of SMOTE. RO-SMOTE first performs oversampling on the training data using SMOTE to balance the dataset. Next, it applies the mining outlier algorithm to detect and eliminate outliers. Finally, RO-SMOTE applies SMOTE again to rebalance the dataset before introducing it to the underlying classifier. The experimental results demonstrate that RO-SMOTE achieves higher accuracy, precision, recall, F1-score, and area under curve (AUC) values compared to SMOTE.
Detection of vague object signatures on deep learning surveillance devices Swardika, I Ketut; Widyastuti Santiary, Putri Alit
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3262-3272

Abstract

The deep learning of object detection has become a breakthrough in recent years. Many papers demonstrated that this method records significant reliability results. However, the question arises whether objects that were successfully detected are initially conditioned clear in daylight. The object being detected is in the form of a photographic product that has numerous problems. It can be distant or have low-contrast so that their signatures are challenging to recognize, especially detection of persons in surveillance systems for dark-environments. This paper contributes to proving the deep learning method capable of detecting night-person (NP) with high precision and recall in the dark without image enhancement, by using ordinary cameras which operate on day-night or visible-near infrared spectrum runs on embedded systems. For that, an infrared-cut filter mechanical shutter is designed to block for the day or deliver infrared light for the night. The NP signatures are illuminated by an external infrared light source, providing three-channel high-resolution images. The distance of a NP from the camera becomes a decisive successful detection. The external infrared light source makes objects under or overexposed affecting the object being recognized. The validation with thoroughly new data of the NP constantly provides high precision and recall.
Advanced digital competency assessment of vocational teachers': A new approach based on fuzzy-analytical hierarcy process Ramadhan Islami, Aditya; Abdullah, Ade Gafar; Widiaty, Isma; Yulia, Cica; Lukman Hakim, Dadang; Handoko, Erfan; Subekti, Eri; Rahmawati, Sherly
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp2781-2795

Abstract

Teachers need digital competence to adapt easily to the current digital era. This study tries to discover the perceptions of vocational high school (VHS) teachers in Indonesia related to advanced digital competencies, which include information, communication, content creation, digital security, and problem-solving competencies. The multi-criteria Analytical Hierarchy Process (AHP) problem-solving method is used to rank the priority digital competencies that are most mastered by the respondents, and then their performance is validated by the fuzzy AHP artificial intelligence-based method. A poll was conducted with 392 respondents, with the research instrument adopting the digital competency measurement platform from DigComp. The study's results show that the fuzzy AHP method has proven that the classical AHP method is a very good way to prioritize VHS teachers' digital skills based on several factors. The two methods gave almost identical results in determining the priority order of VHS teacher digital competencies. The survey results reveal that VHS teachers in Indonesia must immediately develop their skills in terms of digital content creation and digital security. Teachers, teacher professional organizations, and decision-makers are expected to use the findings of this study as a reference in implementing VHS teacher digital competency improvement trainings.
Enhanced multi-ethnic speech recognition using pitch shifting generative adversarial networks Nugroho, Kristiawan; Hadiono, Kristophorus; Sutanto, Felix; Marutho, Dhendra; Farooq, Omar
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp2904-2911

Abstract

Research in the field of speech recognition is a challenging research area. Various approaches have been applied to build robust models. A problem faced in speech recognition research is overfitting, especially if there is insufficient data to train the model. A large enough amount of data can train the model well, resulting in high accuracy. Data augmentation is an approach often used to increase the quantity of dataset. This research uses a data augmentation approach, namely pitch shifting, to increase the quantity of speech dataset, which is then processed into spectrogram data and then classified using a generative adversarial network (GAN). Using the pitch shifting-generative adversarial network (PS-GAN) model, this research produces high accuracy performance in multi-ethnic speech recognition, namely 98.43%, better than several similar studies.
Design of novel convolution neural network model for lung cancer detection by using sensitivity maps Saxena, Sugandha; Narasimha Prasad, Sarappadi
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3218-3227

Abstract

Despite the existence of numerous models for detecting lung cancer, there is still room for achieving higher levels of accuracy. In this paper, a maximum sensitivity neural network (MSNN) has been proposed. As the name suggests, the model aims to achieve high sensitivity and offers a viable remedy to minimize the number of false positive in oder to improve the overall accuracy for lung cancer detection. The MSNN model is a promising model since it can efficiently interpret grayscale lung computed tomography (CT) scan images as inputs and can be trained using just a few images also. This model has surpassed previous deep learning models by obtaining a remarkable sensitivity of 94.6% and an accuracy of 96.9%. A sensitivity map is created, offering important insights into the critical regions for finding malignant nodules. This innovative method has shown outstanding performance in identifying lung cancer with a low false positive rate which can increase the accuracy of medical diagnoses.
Machine learning-based decision-making approach for predicting defects detection: a case study Barzizza, Elena; Biasetton, Nicolo; Ceccato, Riccardo; Molena, Alberto
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3052-3060

Abstract

In today’s highly competitive global market, industries must produce faultless products to achieve profitability. Machine learning (ML) algorithms provide a possible method to improve quality standards by enabling the prediction of the outcome of quality control processes. This article presents a real case study based on ML algorithms suggested to develop a knowledge-based intelligent supervisory system to predict defect products in the fashion industry. Defect detection is formulated as a binary classification problem, and several ML algorithms have been compared to determine the most suitable one on the available data. The random forest (RF), LightGBM, and C5.0 algorithms exhibit comparable high-end performances on the pre-processed dataset made available by the company. Nevertheless, since the aim of the analysed industry is to reduce the rate of false negative observations (i.e., the proportion of defected-free products wrongly classified), the best method results is RF, as it minimizes this metric.
Anamoly based intrusion detection using ensemble machine learning and block-chain Mekala, Srinivasa Rao; Nazma, Shaik; Nava Chaitanya, Kumbhagiri; Ambica, Thota
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp2754-2762

Abstract

A major issue facing the quickly evolving technological world is the surge in security concerns, particularly for critical Internet-of-Things (IoT) applications like health care and the military. Early security attack detection is crucial for safeguarding important resources. Our research focuses on developing an anomaly-based intrusion detection system (IDS) using machine learning (ML) models. With the use of voting strategies, Bagging Ensemble, Boosting Ensemble, and Random Forest, we created a robust and long-lasting IDS. The F1 score is a crucial metric for measuring accurate predictions at the class level and serves as the focus of these ML systems. Maintaining a high F1 score in critical applications highlights the constant need for development. Make use of the latest CICIoT2023 data-set employ Hyper-ledger Fabric to create a private channel in order to bolster the security of our IDS through the usage of block-chain technology. We use block-chain's immutable record and cryptographic techniques to establish a decentralized, tamper-proof environment. Consequently, our proposed approach provides an efficient intrusion detection system that significantly enhances resource protection and alerting the user in prior with intruder information   incritical regions for Internet of Things security applications.
Comparing logistic regression and extreme gradient boosting on student arguments Wahyuningsih, Tri; Manongga, Danny; Sembiring, Irwan
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3119-3128

Abstract

Identifying the effectiveness level and quality of students' arguments poses a challenge for teachers. This is due to the lack of techniques that can accurately assist in identifying the effectiveness and quality of students' arguments. This research aims to develop a model that can identify effectiveness categories in students' arguments. The method employed involves the logistic regression+XGBoost algorithm combined with separate implementations of term frequency-inverse document frequency (TF-IDF) and CountVectorizer. Student argument data were collected and processed using natural language processing techniques. The research results indicate that TF-IDF outperforms in identifying effectiveness classes in student arguments with an accuracy of 66.20%. The multi-output classification yielded an accuracy of 89.32% in the initial testing, which further improved to 92.34% after implementing one-hot encoding. A novel finding in this research is the superiority of TF-IDF as a technique for identifying effectiveness classes in student arguments compared to CountVectorizer. The implications of this research include the development of a model that can assist teachers in identifying the effectiveness level of students' arguments, thereby improving the quality of learning and enhancing students' argumentative competence.
Quantitative strategies of different loss functions aggregation for knowledge distillation Doan, Huong-Giang; Nguyen, Ngoc-Trung
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3240-3249

Abstract

Deep learning models have been successfully applied to many visual tasks. However, they tend to be increasingly cumbersome due to their high computational complexity and large storage requirements. How to compress convolutional neural network (CNN) models while still maintain their efficiency has received increasing attention from the community, and knowledge distillation (KD) is efficient way to do this. Existing KD methods have focused on the selection of good teachers from multiple teachers, or KD layers, which is cumbersome, expensive computationally, and requires large neural networks for individual models. Most of teacher and student modules are CNN-based networks. In addition, recent proposed KD methods have utilized cross entropy (CE) loss function at student network and KD network. This research focuses on the quantifiable evaluation of teacher-student model, in which knowledge is not only distilled from training models that have the same CNN architecture but also from different architectures. Furthermore, we propose combination of CE, balance cross entropy (BCE), and focal loss functions to not only soften the value of loss function in transferring knowledge from large teacher model to small student model but also increase classification performance. The proposed solution is evaluated on four benchmark static image datasets, and the experimental results show that our proposed solution outperforms the state-of-the-art (SOTA) methods from 2.67% to 9.84% at top 1 accuracy.

Page 12 of 13 | Total Record : 121


Filter by Year

2024 2024


Filter By Issues
All Issue Vol 15, No 1: February 2026 Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 4: December 2024 Vol 13, No 3: September 2024 Vol 13, No 2: June 2024 Vol 13, No 1: March 2024 Vol 12, No 4: December 2023 Vol 12, No 3: September 2023 Vol 12, No 2: June 2023 Vol 12, No 1: March 2023 Vol 11, No 4: December 2022 Vol 11, No 3: September 2022 Vol 11, No 2: June 2022 Vol 11, No 1: March 2022 Vol 10, No 4: December 2021 Vol 10, No 3: September 2021 Vol 10, No 2: June 2021 Vol 10, No 1: March 2021 Vol 9, No 4: December 2020 Vol 9, No 3: September 2020 Vol 9, No 2: June 2020 Vol 9, No 1: March 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 More Issue