cover
Contact Name
Imam Much Ibnu Subroto
Contact Email
imam@unissula.ac.id
Phone
-
Journal Mail Official
ijai@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN : 20894872     EISSN : 22528938     DOI : -
IAES International Journal of Artificial Intelligence (IJ-AI) publishes articles in the field of artificial intelligence (AI). The scope covers all artificial intelligence area and its application in the following topics: neural networks; fuzzy logic; simulated biological evolution algorithms (like genetic algorithm, ant colony optimization, etc); reasoning and evolution; intelligence applications; computer vision and speech understanding; multimedia and cognitive informatics, data mining and machine learning tools, heuristic and AI planning strategies and tools, computational theories of learning; technology and computing (like particle swarm optimization); intelligent system architectures; knowledge representation; bioinformatics; natural language processing; multiagent systems; etc.
Arjuna Subject : -
Articles 81 Documents
Search results for , issue "Vol 14, No 1: February 2025" : 81 Documents clear
Smart contracts vulnerabilities detection using ensemble architecture of graphical attention model distillation and inference network Preethi, Preethi; Ulla, Mohammed Mujeer; Anni, Ashwitha; Murthy, Pavithra Narasimha; Renukaradhya, Sapna
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp724-736

Abstract

Smart contracts are automated agreements executed on a blockchain, offering reliability through their immutable and distributed nature. Yet, their unalterable deployment necessitates precise preemptive security checks, as vulnerabilities could lead to substantial financial damages henceforth testing for vulnerabilities is necessary prior to deployment. This paper presents the graphical attention model distillation and inference network (GAMDI-Net), a pioneering methodology that significantly enhances smart contract vulnerability detection. GAMDI-Net introduces a unique graphical learning module that employs attention mechanism networks to transform complex contract code into a smart graphical representation. In addition to this a dual-modality model distillation and mutual modality learning mechanism, GAMDI-Net excels in synthesizing semantic and control flow data to predict absent bytecode embeddings with high accuracy. This methodology not only improves the precision of vulnerability detection but also addresses scalability and efficiency challenges, reinforcing trust in the deployment of secure smart contracts within the blockchain ecosystem.
Method for developing and partitioning graph-based data warehouses using association rules Labzioui, Redouane; Letrache, Khadija; Ramdani, Mohammed
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp810-821

Abstract

The evolution of modern databases has led to a variety of not only structured query language (NoSQL) models, particularly graph-oriented-databases. This growth has encouraged businesses to explore graph-based business intelligence (BI) solutions. This paper explores three essential aspects in the domain of graph warehouse: the establishment of efficient graph warehouses, the significance of data historization, and the development of effective strategies for graph partitioning. It starts by building a BI system within a graph database. Subsequently, the paper emphasizes the pivotal role of data historization, highlighting the slowly graph changing dimension (SGCD) approach as a versatile framework for accommodating varied dimensional changes, additionally; the paper introduces a novel partitioning strategy utilizing association rules algorithms, for optimized and scalable graph warehouse management.
DriveNet: A deep learning framework with attention mechanism for early driving maneuver prediction M'haouach, Mohamed; Sassioui, Abdellatif; Bouhoute, Afaf; Fardousse, Khalid
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp44-53

Abstract

Inappropriate driving maneuvers are the leading cause of many car accidents. These accidents can be prevented if they are identified in advance and the driver is given the necessary assistance. Anticipating maneuvers is crucial for driving assistance systems in order to alert drivers and take appropriate measures to avoid or mitigate danger. In this paper, we introduce DriveNet a new approach that combines information about the driver’s behavior as well as the driving environment to predict the driving maneuvers. DriveNet utilizes a combination of convolutional neural network (CNN) and long short-term memory (LSTM) with attention mechanism to extract spatial information and capture long temporal dependencies. We evaluate DriveNet by performing a series of experiments using the publicly available Brain4Cars dataset. The findings show that the proposed approach achieves state-of-the-art performance and outperforms most previous methods. DriveNet has achieved an accuracy of 91.24%, a precision of 90.13%, and a recall of 91.44% for anticipation 4 seconds before the maneuvers occur.
A multi-algorithm approach for phishing uniform resource locator’s detection Sree Guddanti, Devi; Chiramdasu, Rupa; Gayathri Uppuluri, Mahalakshmi
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp358-367

Abstract

Nowadays, the internet is used to organise a wide range of cybersecurity risks. Threats to cybersecurity include a broad spectrum of malevolent actions and possible hazards that affect data, networks, and digital systems. Cybersecurity dangers that are commonly encountered are distributed denial-of-service (DDoS) attacks, phishing, and malware. Phishing attempts frequently use text messages, email, and uniform resource locators (URLs) to target specific people while impersonating trustworthy sourcesin an effort to trick the victim. Consequently, machine learning plays a critical role in stopping cybercrimes, especially those that involve phishing assaults. The suggested model is based on a well constructed dataset that has been enhanced with 32 features. By combining the features of several machine learning methods, such as random forest, CatBoost, AdaBoost, and multilayer perceptron, the suggested model greatly increases the precision of phishing URL detection. Evaluation indicators that highlight the model's effectiveness in defending against cyber threats include precision, recall, accuracy, and F1-score. These metrics also highlight the urgent need for proactive cybersecurity measures.
Detection of location-specific intra-cranial brain tumors Usharani, Shola; Lakshmanan, Rama Parvathy; Rajakumaran, Gayathri; Basu, Aritra; Nandam, Anjana Devi; Depuru, Sivakumar
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp428-438

Abstract

Mutations or abnormalities in genes can occasionally cause cells to grow uncontrolled, resulting in a tumor, which is very dangerous. These are the most prevalent cancer causes. They are caused by significant damage to genes in a specific cell during a person's existence. Brain tumors are increasing rapidly, majorly brain tumor cases in the US are projected to rise from 27,000 in 2020 to 31,000 in 2023 at an annual growth rate of 1.5%, all the cases are rising because of the detection of the tumors in the late phase. Thus, it needs the hour to create something which can solve this anomaly and help us detect the tumor rapidly and efficiently. While major research papers on brain tumor detection mainly focus on the detection and classification of the tumors, the presented research aims to first detect the tumor using pre-recognized photos using machine learning object detection models. Then after successful detection of the tumor, the study team plans to determine its precise coordinates and display the tumor and its location in the picture.
Improving the performance of the fuzzy-internet of things joint system by using an efficient service deployment algorithm Razzaq, Ali Ahmed; Rao, Kunjam Nageswara
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp172-181

Abstract

The aim of this paper to present research proposes a quality of service (QoS)-fog service placement algorithm, which is in the context of providing better performance when there are requests for high-priority (delay-sensitive) services. Our proposed algorithm attempts to maintain the implementation of delay-sensitive services within a fog environment. Its performance was evaluated by comparing it with two placement strategies (cloud only, edge-ward), using the MobFogSim simulator. The results showed that the proposal achieved better performance than the two mentioned strategies, from two perspectives (according to the scenarios). The first is at the service level, where the algorithm was able to achieve a lower average response time and the other is at the system level, as it was able to reduce the total energy consumption by adopting a mechanism to save energy when there is a low network load.
Parallel rapidly exploring random tree method for unmanned aerial vehicles autopilot development using graphics processing unit processing Mochurad, Lesia; Davidekova, Monika; Mitoulis, Stergios-Aristoteles
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp712-723

Abstract

Autonomous air movement systems hold great potential for transforming various industries, making their development essential. Autopilot design involves advanced technologies like artificial intelligence, machine learning, and big data. This paper focuses on developing a parallel rapidly-exploring random tree (RRT) algorithm using compute unified device architecture (CUDA) technology for efficient processing on graphics processing units (GPUs). The study evaluates the algorithm's performance in automated trajectory planning for unmanned aerial vehicles (UAVs). Numerical experiments show that the parallel algorithm outperforms the sequential central processing unit (CPU)-based version, especially as task complexity and state space dimensions increase. In scenarios with numerous obstacles, the parallel algorithm maintains stable performance, making it well-suited for various applications. Comparisons with CPU-based methods highlight the advantages of GPU use, particularly in terms of speed and efficiency. Additionally, the performance of two GPU models, NVIDIA RTX 2070 and T4 is compared, with the T4 demonstrating superior performance for similar tasks. Future research should explore integrating multiple algorithms for a more comprehensive UAV autopilot system. The proposed approach stands out for its stability and practical applicability in real-world autopilot implementations.
Automatic diabetes prediction with explainable machine learning techniques Haque, Adiba; Islam, Sanjida; Mim, Nusrat Rahim; Meem, Sabrina Mannan; Saha, Ananya; Khan, Riasat
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp408-415

Abstract

Diabetes is a metabolic disorder caused by various genetic, physiological and behavioral factors. It occurs due to an imbalance in the body’s insulin processing, which results in elevated blood sugar levels. Its early diagnosis can alleviate the risk of other deadly diseases. The onset and accurate detection of diabetes can decrease the progression of different complications and dysfunction of tissues. The principal objective of this article is to utilize machine learning approaches to predict the existence of diabetes in female patients at a primary stage. Multiple machine learning, including ensemble classifiers with the Pima Indian dataset and a private dataset obtained from a local Bangladeshi hospital, are used in this work. We employed feature scaling, synthetic oversampling technique (SMOTE), and hyperparameter optimization with GridSearchCV to get the best performance from different machine learning algorithms. The support vector machine (SVM) with the SMOTE framework and default hyperparameters achieved the accuracy and F1 score of 87% and 91%, respectively. The accuracy and F1 score of the SVM model improved to 95% and 91%, respectively, with hyperparameter optimization. Finally, explainable artificial intelligence with the local interpretable model-agnostic explanations (LIME) is employed to illustrate the predictability of the SVM technique.
Neural networks based-simple estimated model for greenhouse gas emission from irrigated paddy fields Arif, Chusnul; Purwanto, Yohanes Aris; Rudiyanto, Rudiyanto; Mizoguchi, Masaru
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp231-239

Abstract

The current study aims to develop a simple model for estimating greenhouse gas emissions originating from paddy fields, utilizing backpropagation neural networks. The model integrated three input parameters: soil moisture, soil temperature, and soil electrical conductivity (EC), while generating estimations for two output parameters: methane (CH4) and nitrous oxide (N2O) emissions. The model was put into practice across three different irrigation systems, i.e., continuous flooded (FL), wet (WT), and dry (DR) regimes. For model training and validation, the input parameters were measured by a single 5-TE sensor. Concurrently, CH4 and N2O emissions were determined utilizing a closed chamber, and gas samples were subjected to laboratory analysis. Findings unveiled that the developed model accurately estimated CH4 and N2O emissions, demonstrating commendable coefficient of determination (R2) values ranging from 0.60 to 0.97 for validation process. Notably, the WT irrigation system exhibited the highest precision, boasting R2 values of 0.97 for CH4 and 0.73 for N2O estimation, respectively. Conversely, the FL irrigation system has the lowest accuracy with R2 values of 0.66 and 0.60. Despite variances in accuracy across irrigation systems, the overall performance remained deemed acceptable, warranting the model's applicability for estimating greenhouse gas emissions under diverse irrigation scenarios.
Bring your own device readiness and productivity framework: a structured partial least square approach Nik Rosli, Nik Nur Izzati; Mohamad Rosman, Mohamad Rahimi; Alias, Noor Rahmawati; Mohd Shukry, Amira Idayu; Razlan, Noor Masliana; Alimin, Noor Azreen
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp749-759

Abstract

Bring your own device (BYOD) is defined as the practice that allow users to bring their private owned devices to organizations or institutions. BYOD bring benefits to both organizations and education sector in terms of cost efficient and productivity enhancement. However, there is a dearth of research on the determinant and impact of BYOD adoption in the context of educational sector. Therefore, the purpose of this study is to develop a BYOD readiness and impact framework based on four dimensions, namely technological readiness, individual readiness, contextual readiness, and organisational readiness. This study employed a quantitative research approach, utilizing an online survey questionnaire as the primary research instrument. Findings were analysed based on descriptive and inferential statistics using statistical package for social sciences (SPSS) version 26 and SmartPLS version 4.0. The findings shows that individual readiness, contextual readiness, and organisational readiness have a positive and significant relationship with BYOD adoption, while technological readiness proof to be an insignificant predictor. Subsequently, BYOD adoption also proven as a positive and significant predictor capable to improve user’s productivity.

Filter by Year

2025 2025


Filter By Issues
All Issue Vol 15, No 1: February 2026 Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 4: December 2024 Vol 13, No 3: September 2024 Vol 13, No 2: June 2024 Vol 13, No 1: March 2024 Vol 12, No 4: December 2023 Vol 12, No 3: September 2023 Vol 12, No 2: June 2023 Vol 12, No 1: March 2023 Vol 11, No 4: December 2022 Vol 11, No 3: September 2022 Vol 11, No 2: June 2022 Vol 11, No 1: March 2022 Vol 10, No 4: December 2021 Vol 10, No 3: September 2021 Vol 10, No 2: June 2021 Vol 10, No 1: March 2021 Vol 9, No 4: December 2020 Vol 9, No 3: September 2020 Vol 9, No 2: June 2020 Vol 9, No 1: March 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 More Issue