cover
Contact Name
Imam Much Ibnu Subroto
Contact Email
imam@unissula.ac.id
Phone
-
Journal Mail Official
ijai@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN : 20894872     EISSN : 22528938     DOI : -
IAES International Journal of Artificial Intelligence (IJ-AI) publishes articles in the field of artificial intelligence (AI). The scope covers all artificial intelligence area and its application in the following topics: neural networks; fuzzy logic; simulated biological evolution algorithms (like genetic algorithm, ant colony optimization, etc); reasoning and evolution; intelligence applications; computer vision and speech understanding; multimedia and cognitive informatics, data mining and machine learning tools, heuristic and AI planning strategies and tools, computational theories of learning; technology and computing (like particle swarm optimization); intelligent system architectures; knowledge representation; bioinformatics; natural language processing; multiagent systems; etc.
Arjuna Subject : -
Articles 84 Documents
Search results for , issue "Vol 14, No 4: August 2025" : 84 Documents clear
A deep learning-based framework for automatic detection of COVID-19 using chest X-ray and CT-scan images Kalli, Sivanagireddy; Kumar, Bukka Narendra; Jagadeesh, Saggurthi; Ravi Kumar, Kushagari Chandramouli
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i4.pp3192-3200

Abstract

COVID-19 has profoundly impacted global public health, underscoring the need for rapid detection methods. Radiography and radiologic imaging, especially chest X-rays, enable swift diagnosis of infected individuals. This study delves into leveraging machine learning to identify COVID-19 from X-ray images. By gathering a dataset of 9,000 chest X-rays and CT scans from public resources, meticulously vetted by board-licensed radiologists to confirm COVID-19 presence, the research sets a robust foundation. However, further validation is essential expanding datasets to encompass enough COVID-19 cases enhances convolutional neural network (CNN) accuracy. Among various machine learning techniques, deep learning excels in identifying distinct patterns on imaging characteristics discernible in chest radiographs of COVID-19 patients. Yet, extensive validation across diverse datasets and clinical trials is crucial to ensure the robustness and generalizability of these models. The conversation extends into complexities, including ethical considerations around patient privacy and integrating intelligent tech into clinical workflows. Collaborating closely with healthcare professionals ensures this technology complements the established diagnostic approach. Despite the potential to detect COVID-19 using chest X-ray imaging findings, thorough research and validation, alongside ethical deliberations, are vital before implementing it in the healthcare field. The results show that the proposed model achieved classification accuracy and F1 score of 96% and 98%, respectively, for the X-ray images.
Contract-based federated learning framework for intrusion detection system in internet of things networks Saputra, Yuris Mulya; Putri, Divi Galih Prasetyo; Putra, Jimmy Trio; Murti, Budi Bayu; Wahyono, Wahyono
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i4.pp3324-3333

Abstract

A plethora of national vital infrastructures connected to internet of things (IoT) networks may trigger serious data security vulnerabilities. To address the issue, intrusion detection systems (IDS) were investigated where the behavior and traffic of IoT networks are monitored to determine whether malicious attacks or not occur through centralized learning on a cloud. Nonetheless, such a method requires IoT devices to transmit their local network traffic data to the cloud, thereby leading to data breaches. This paper proposes a federated learning (FL)-based IDS on IoT networks aiming at improving the intrusion detection accuracy without privacy leakage from the IoT devices. Specifically, an IoT service provider can first motivate IoT devices to participate in the FL process via a contract-based incentive mechanism according to their local data. Then, the FL process is executed to predict IoT network traffic types without sending IoT devices’ local data to the cloud. Here, each IoT device performs the learning process locally and only sends the trained model to the cloud for the model update. The proposed FL-based system achieves a higher utility (up to 44%) than that of a non-contract-based incentive mechanism and a higher prediction accuracy (up to 3%) than that of the local learning method using a real-world IoT network traffic dataset.
Application of self-organizing map for modeling the Aquilaria malaccensis oil using chemical compound Che Hassan, Mohammad Arif Fahmi; Mohd Yusoff, Zakiah; Ismail, Nurlaila; Taib, Mohd Nasir
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i4.pp2889-2898

Abstract

Agarwood oil, known as ‘black gold’ or the ‘wood of God,’ is a globally prized essential oil derived naturally from the Aquilaria tree. Despite its significance, the current non-standardized grading system varies worldwide, relying on subjective assessments. This paper addresses the need for a consistent classification model by presenting an overview of Aquilaria malaccensis oil quality using the self-organizing map (SOM) algorithm. Derived from the Thymelaeaceae family, Aquilaria malaccensis is a primary source of agarwood trees in the Malay Archipelago. Agarwood oil extraction involves traditional methods like solvent extraction and hydro-distillation, yielding a complex mixture of chromone derivatives, oxygenated sesquiterpenes, and sesquiterpene hydrocarbons. This study categorizes agarwood oil into high and low grades based on chemical compounds, utilizing the SOM algorithm with inputs of three specific compounds: β-agarofuran, α-agarofuran, and 10-epi-φ-eudesmol. Findings demonstrate the efficacy of SOM-based quality grading in distinguishing agarwood oil grades, offering a significant contribution to the field. The non-standardized grading system's inefficiency and subjectivity underscore the necessity for a standardized model, making this research crucial for the agarwood industry's advancement.
A survey of missing data imputation techniques: statistical methods, machine learning models, and GAN-based approaches Sadegh, Rifaa; Mohameden, Ahmed; Salihi, Mohamed Lemine; Nanne, Mohamedade Farouk
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i4.pp2876-2888

Abstract

Efficiently addressing missing data is critical in data analysis across diverse domains. This study evaluates traditional statistical, machine learning, and generative adversarial network (GAN)-based imputation methods, emphasizing their strengths, limitations, and applicability to different data types and missing data mechanisms (missing completely at random (MCAR), missing at random (MAR), missing not at random (MNAR)). GAN-based models, including generative adversarial imputation network (GAIN), view imputation generative adversarial network (VIGAN), and SolarGAN, are highlighted for their adaptability and effectiveness in handling complex datasets, such as images and time series. Despite challenges like computational demands, GANs outperform conventional methods in capturing non-linear dependencies. Future work includes optimizing GAN architectures for broader data types and exploring hybrid models to enhance imputation accuracy and scalability in real-world applications.
Federated deep learning intrusion detection system on software defined-network based internet of things Dhirar, Heba; Hamad, Ali H.
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i4.pp3109-3120

Abstract

The internet of things (IoT) and software-defined networks (SDN) play a significant role in enhancing efficiency and productivity. However, they encounter possible risks. Artificial intelligence (AI) has recently been employed in intrusion detection systems (IDSs), serving as an important instrument for improving security. Nevertheless, the necessity to store data on a centralized server poses a potential threat. Federated learning (FL) addresses this problem by training models locally. In this work, a network intrusion detection system (NIDS) is implemented on multi-controller SDN-based IoT networks. The interplanetary file system (IPFS) FL has been employed to share and train deep learning (DL) models. Several clients participated in the training process using custom generated dataset IoT-SDN by training the model locally and sharing the parameters in an encrypted format, improving the overall effectiveness, safety, and security of the network. The model has successfully identified several types of attacks, including distributed denial of service (DDoS), denial of service (DoS), botnet, brute force, exploitation, malware, probe, web-based, spoofing, recon, and achieving an accuracy of 99.89% and a loss of 0.005.
Unpacking the drivers of artificial intelligence regulation: driving forces and critical controls in artificial intelligence governance Atoum, Ibrahim; Altahat, Salahiddin
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i4.pp2655-2666

Abstract

The burgeoning field of artificial intelligence (AI) necessitates a nuanced approach to governance that integrates technological advancement, ethical considerations, and regulatory oversight. As various AI governance frameworks emerge, a fragmented landscape hinders effective implementation. This article examines the driving forces behind AI regulation and the essential control mechanisms that underpin these frameworks. We analyze market-driven, state-driven, and rights-driven regulatory approaches, focusing on their underlying motivations. Furthermore, critical regulatory controls such as data governance, risk management, and human oversight are highlighted to demonstrate their roles in establishing effective governance structures. Additionally, the importance of international cooperation and stakeholder collaboration in addressing the challenges posed by rapid technological change is emphasized. By providing insights into the strengths, weaknesses, and potential synergies of different governance models, this study contributes to the development of equitable and effective AI regulatory frameworks that encourage innovation while safeguarding societal interests. Ultimately, the findings aim to inform policymakers, industry leaders, and civil society organizations in their efforts to foster a future where AI is utilized responsibly and equitably for the betterment of humanity.
Survey on 3D biometric traits for human identification Gangachannaiah, Divya; Shivaraj, Mamatha Aruvanalli; Nagaraj, Honganur Chandrasekharaiah; Paga, Prasanna Gururaj
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i4.pp3143-3152

Abstract

Individuals are verified and identified using Biometric technology based on their biological or behavioral traits. Biometric-based personal authentication systems are more reliable and user friendly, overruns the traditional personal authentication systems. The physiological biometric traits get abraded due to aging and massive work, while the behavioral biometric traits are having high variations due to external factors such as fatigue, and mood. Among the physiological biometric traits, Finger geometry patterns are widely deployed authentication system reason being its stability, user acceptability and uniqueness. Recent trends in Biometrics attempt to incorporate 3D domain traits, 3D reconstruction is done using 2D multiple images. 3D images are usually more robust and illumination invariant as compared to their 2D counterparts. 3D reconstruction algorithms are compared by finding mean square error (MSE).
Lightweight mutual authentication protocol for resource-constrained radio frequency identification tags with PRINCE cipher Naik, Mahendra Shridhar; Sreekantha, Desai Karanam; Sairam, Kanduri V S S S S; Nataraju, Chaitra Soppinahally
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i4.pp3435-3443

Abstract

Radio frequency identification (RFID) is a key technology for the internet of things (IoT), with widespread applications in the commercial, healthcare, enterprise, and community sectors. However, privacy and security concerns remain with RFID systems. This manuscript presents a novel RFID-based mutual authentication protocol (MAP) using the PRINCE cipher to address these concerns. The proposed MAP leverages a PRINCE cipher architecture capable of both encryption and decryption based on a mode signal. It performs five encryption and two decryption processes during tag and reader mutual authentication, with updated seed values ensuring synchronization and secure data communication. The PRINCE cipher implementation utilizes less than 1% of slices, operates at 226 MHz with a latency of 3.5 clock cycles (CC), and has a throughput of 4.125 Gbps. The complete RFID-based MAP consumes 721 mW of power, occupies 2% of the chip area, and achieves a latency of 35.5 CC and a throughput of 262 Mbps. This represents a 25% reduction in latency, a 40% increase in throughput, and a 30% decrease in execution time compared to existing MAP approaches. The findings demonstrate the potential of the proposed MAP to enhance latency, throughput, and execution time, offering a promising solution for secure and efficient RFID authentication.
Revolutionizing internet of things intrusion detection using machine learning with unidirectional, bidirectional, and packet features Elsi, Zulhipni Reno Saputra; Stiawan, Deris; Yudho Suprapto, Bhakti; Syamsul Arifin, M. Agus; Yazid Idris, Mohd.; Budiarto, Rahmat
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i4.pp3047-3062

Abstract

Detection of attacks on internet of things (IoT) networks is an important challenge that requires effective and efficient solutions. This study proposes the use of various machine learning (ML) techniques in classifying attacks using unidirectional, bidirectional, and packet features. The proposed methods that implement decision tree (DT), random forest (RF), extreme gradient boosting classifier (XGBC), AdaBoost (AB) and linear discriminant analysis (LDA) work perfectly with all kinds of datasets and includes. It also works very well with data type-based feature selection (DTBFS) and correlation-based feature selection (CBFS). The experiment results show a significant improvement compared to previous studies and reveals that unidirectional and bidirectional features provide higher accuracy compared to packet features. Furthermore, ML models, particularly DT, and RF, have faster computing times compared to more complex deep learning models. This analysis also shows potential overfitting in some models, which requires further validation with different datasets. Based on these findings, we recommend the use of RF and DT for scenarios with unidirectional and bidirectional features, while AB and LDA for packet features. The study concludes that using the right ML techniques along with features that work in both directions can make an intrusion detection system for IoT networks becomes very accurate.
Non-small cell lung cancer active compounds discovery holding on protein expression using machine learning models Hanafi, Hamza; Aït Kbir, M’hamed; Rossi Hassani, Badr Dine
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i4.pp2815-2825

Abstract

Computational methods have transformed the field of drug discovery, which significantly helped in the development of new treatments. Nowadays, researchers are exploring a wide ranger of opportunities to identify new compounds using machine learning. We conducted a comparative study between multiple models capable of predicting compounds to target non-small cell lung cancer, we focused on integrating protein expressions to identify potential compounds that exhibit a high efficacy in targeting lung cancer cells. A dataset was constructed based on the trials available in the ChEMBL database. Then, molecular descriptors were calculated to extract structure-activity relationships from the selected compounds and feed into several machine learning models to learn from. We compared the performance of various algorithms. The multilayer perceptron model exhibited the highest F1 score, achieving an outstanding value of 0,861. Moreover, we present a list of 10 drugs predicted as active in lung cancer, all of which are supported by relevant scientific evidence in the medical literature. Our study showcases the potential of combining protein expression analysis and machine learning techniques to identify novel drugs. Our analytical approach contributes to the drug discovery pipeline, and opens new opportunities to explore and identify new targeted therapies.

Filter by Year

2025 2025


Filter By Issues
All Issue Vol 15, No 1: February 2026 Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 4: December 2024 Vol 13, No 3: September 2024 Vol 13, No 2: June 2024 Vol 13, No 1: March 2024 Vol 12, No 4: December 2023 Vol 12, No 3: September 2023 Vol 12, No 2: June 2023 Vol 12, No 1: March 2023 Vol 11, No 4: December 2022 Vol 11, No 3: September 2022 Vol 11, No 2: June 2022 Vol 11, No 1: March 2022 Vol 10, No 4: December 2021 Vol 10, No 3: September 2021 Vol 10, No 2: June 2021 Vol 10, No 1: March 2021 Vol 9, No 4: December 2020 Vol 9, No 3: September 2020 Vol 9, No 2: June 2020 Vol 9, No 1: March 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 More Issue