cover
Contact Name
Imam Much Ibnu Subroto
Contact Email
imam@unissula.ac.id
Phone
-
Journal Mail Official
ijai@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN : 20894872     EISSN : 22528938     DOI : -
IAES International Journal of Artificial Intelligence (IJ-AI) publishes articles in the field of artificial intelligence (AI). The scope covers all artificial intelligence area and its application in the following topics: neural networks; fuzzy logic; simulated biological evolution algorithms (like genetic algorithm, ant colony optimization, etc); reasoning and evolution; intelligence applications; computer vision and speech understanding; multimedia and cognitive informatics, data mining and machine learning tools, heuristic and AI planning strategies and tools, computational theories of learning; technology and computing (like particle swarm optimization); intelligent system architectures; knowledge representation; bioinformatics; natural language processing; multiagent systems; etc.
Arjuna Subject : -
Articles 1,808 Documents
Serial parallel dataflow-pipelined processing architecture based accelerator for 2D transform-quantization in video coder and decoder Shivarudraiah, Sumalatha; Rajeswari, Rajeswari
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp798-809

Abstract

The video coder and decoder (CODEC) standards from MPEG-4 to the recent versatile video codec (VVC), adopted lossy compression methodologies, which involves transformation, quantization and entropy coding. The growing usage of video data in all means of communication demands more bandwidth and storage requirements. While compression with redundancy removal by transform coefficient coding, the focal point is the crucial sequential data flow and data processing structures. Handling the block wise data near to the processing unit prior and after computation will reduce the data waiting time of the processing unit, hence accelerating the targeted functionality. The proposed serial parallel data-flow pipelined processing architecture (SPDPA) accelerates the speed of processing unit by on chip data availability and parallel data accessing options and also with the pipeline operations of transformation, data transpose and quantization. The post implementation results of the architecture targeted to 16 nm and 28 nm field programmable gate array (FPGA) shows that there is a trade-off between power and frequency of operations for various block sizes. The design targeted to 16 nm works for higher frequencies with an average power consumption 0.64 w as compared to 28 nm FPGA which consumes less average power of 0.15 w.
Detection and identification of un-uniformed shape text from blurred video frames Channegowda, Ravikumar Hodikehosahally; Srinivasaiah, Raghavendra; Jankatti, Santosh Kumar; B, Meenakshi; Jinachandra, Niranjana Shravanabelagola; Tavarekere Hombegowda, Raveendra Kumar
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 4: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i4.pp4795-4805

Abstract

The identification and recognition of text from video frames have received a lot of attention recently, that makes many computer vision-based applications conceivable. In this study, we modify the picture mask and the original identification of the mask region convolution neural network and permit detection in three levels, including holistic, sequence, and at the level of pixels. To identify the texts and determine the text forms, semantics at the pixel and holistic levels can be used. With masking and detection, existences of the character and the word are separated and recognised. In addition, text detection using the results of 2-D feature space instance segmentation is done. Moreover, we explore text recognition using an attention-based optical character recognition (OCR) method with mask region convolution neural networks (R-CNN) to address and detect the problem of smaller and blurrier texts at the sequential level. Using attribute maps of the word occurrences in sequence to seq, the OCR method calculates the character sequence. At last, a fine-grained learning strategy is proposed to constructs models at word level using the annotated datasets, resulting in the training of a more precise and reliable model. The well-known benchmark datasets ICDAR 2013 and ICDAR 2015 are used to test our suggested methodology.
Real-time anomaly detection in electric motor operation noise Nguyen, Van-Khanh; Thai, Bao-Toan; Tran, Vy-Khang; Pham, Hai; Nguyen, Chi-Ngon
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 4: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i4.pp3814-3826

Abstract

Anomaly detection plays a very important role in many fields to identify abnormalities occurring in the system earlier. This study proposes a new abnormality detection solution for 3-phase electric motors based on their working noise. Normal and abnormal operating noise data sets for an electric motor were acquired in the laboratory. These datasets are converted into the corresponding two-dimensional gray spectrogram image sets. The normal set is used to train the autoencoder (AE) model to find the abnormality evaluation threshold. This threshold is validated again with anomalous data sets. The trained AE is then quantized to be installed on a system consisting of two duo-core microcontroller units (MCUs) for real-time testing. Free real-time operating system (FreeRTOS), a real-time operating system, is used to schedule tasks on the system. Experimental results show that the designed anomaly detector can accurately detect over 99% of abnormal events. The system can communicate with a supervisory control and data acquisition (SCADA) application running on the S7-1200 programmable logic controller (PLC) platform using the Modbus transmission control protocol (TCP) protocol. The SCADA application can continuously record evaluated results from the system and adjust abnormal thresholds for the system directly on the human-machine interface (HMI) screen.
Fastest Moroccan license plate recognition using a lightweight modified YOLOv5 model Fadili, Abdelhak; El Aroussi, Mohammed; Fakhri, Youssef
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp527-537

Abstract

Morocco is witnessing an alarming surge in road accidents. Automatic license plate recognition (ALPR) technology is vital in enhancing road safety. It en- ables applications like traffic management, law enforcement, and toll collection by automatically identifying vehicles on the roads. This paper integrated the ShuffleNet V2 architecture into the end-to-end YOLOv5 object detection sys- tem. The goal was to develop a model capable of accurately detecting Moroc- can license plates with an 87% accuracy rate. The proposed model was able to achieve high processing speeds of 60 frames per second (FPS) while maintain- ing a compact size of 1.3 megabytes and a limited computational requirement of 0.44 million floating-point operations. Compared to other models used in similar contexts, this model demonstrates superior performance and high com- patibility with embedded systems, making it a promising solution for addressing road safety challenges in Morocco.
A new approach based on genetic algorithm for computation offloading optimization in multi-access edge computing networks Myyara, Marouane; Lagnfdi, Oussama; Darif, Anouar; Farchane, Abderrazak
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 4: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i4.pp4186-4194

Abstract

The proliferation of smart devices and the increasing demand for resource-intensive applications present significant challenges in terms of computational efficiency, leading to surge in data traffic. While cloud computing offers partial solutions, its centralized architecture raises concerns about latency. Multi-access edge computing (MEC) emerges as promising alternative by deploying servers at the network edge to bring computations closer to user devices. However, optimizing computation offloading in the dynamic MEC environment remains a complex challenge. This paper introduces novel genetic algorithm-based approach for efficient computation offloading in MEC, considering processing and transmission delays, user preferences, and system constraints. The proposed approach integrates computation offloading and resource allocation algorithm based on evolutionary principles, combined with a greedy strategy to maximize overall system performance. By utilizing genetic algorithms, the proposed method enables dynamic adaptation to changing conditions, eliminating the need for intricate mathematical models and providing an appealing solution to the complexities inherent in MEC. The urgency of this research arises from the critical need to enhance mobile application performance. Simulation results demonstrate the robustness and efficacy of our approach in achieving near-optimal solutions while efficiently balancing computation offloading, minimizing latency, and maximizing resource utilization. Our approach offers flexibility and adaptability, contributing to advancement of MEC networks and addressing the requirements of latency-sensitive applications.
Financial text embeddings for the Russian language: a global vectors-based approach Malyshenko, Kostyantyn A.; Anashkin, Dmitriy
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp692-701

Abstract

The article presents a software implementation of the linguistic embedding method for the Russian language, based on the global vectors for word representation (GloVe) model. The GloVe method allows to obtain word vectors that reflect their semantic and syntactic properties. The resulting vector model can be used in various natural language processing (NLP) tasks, such as machine translation and text clustering. The article describes the architecture of software that implements a method similar to the GloVe algorithm for Russian-language financial texts. The mechanisms used to train the model as well as to compute word vectors are described. Testing with typical classification methods demonstrated that the developed program generates accurate vector representations of Russian-language texts, proving effective in various NLP tasks. This work is one of the first studies devoted to the software implementation of the GloVe method for the Russian language using learning algorithms based on sparse matrices. The results of this study can be used in various NLP tasks, such as machine translation and text clustering.
Utilization of convolutional neural network in image interpretation techniques for detecting kidney disease Sulaksono, Nanang; Adi, Kusworo; Isnanto, Rizal
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp602-613

Abstract

This research is conducted with deep learning for kidney stone disease detection including cysts, stones, normal, and tumors using axial computerized tomography (CT) scan images. The author uses augmentation, generative adversarial networks (GANs), original, and synthetic minority over-sampling technique (SMOTE) to classify kidney disease (cyst, stone, normal, and tumor). This study uses the public dataset nazmul0087 and primary data/data from the hospital, using convolutional neural network (CNN) models, namely augmentation, GANs, original, and SMOTE by training and testing. The results of the accuracy value of the training model (dataset nazmul0087) in the detection of kidney cysts, stones, tumors, and normal. The results of augmentation value are 99.93%, GANs 100%, original 100%, and SMOTE 99.93%. In the results of the training model, a very high accuracy value is obtained, with perfect results. The testing model's accuracy value in detecting kidney cysts, stones, tumors, and normal kidney tissue in the original dataset and hospital data. The results of augmentation value are 11.48%, GANs 17.96%, original 21.76%, and SMOTE 20.41%. In the results of the training model, the highest accuracy value is obtained in the original model. For the testing model to automatically diagnose kidney illness and obtain a high accuracy value, which can enhance patient outcomes and save health care costs, we advise using it in conjunction with the original model.
Enhancing legal research through knowledge-infused information retrieval for Vietnamese labor law Pham, Vuong; Huy Le, Hoang; Phu Ngo, Thinh; Nguyen, Binh; Nguyen, Diem; D. Nguyen, Hien
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 4: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i4.pp3962-3973

Abstract

The role of intelligent information retrieval systems in legal research optimization has become increasingly recognized. There are many methods for exhibiting advance mentsin the proficient retrieval of legal documents. However, those methods fail to tackle the specific challenges encountered in real-world labor law searches. This research breaks new ground in Vietnamese labor law retrieval by leveraging a comprehensive dataset of 300,000 documents a cross diverse cat egories (20 document types and 27 legal fields) to train and evaluate retrieval models specifically designed for Vietnamese labor law. Unlike previous approaches, this work goes beyond simple information retrieval. It also constructs question & answer (Q&A) dataset specifically tailored to this legal domain. Be sides, this study introduces a novel approach of in corporating a legal ontology built from the data set itself. This knowledge in fusion significantly improves retrieval performance across legal search tasks, as demon strated through rigorous experimentation. These advancements empower intelligent systems to grasp the intricate semantic nuances of Vietnamese labor law.
Seeding precision: a mask region based convolutional neural networks classification approach for the classification of paddy seeds Nambiar, Rajashree; Bhat, Ranjith; Kumara, Varuna
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 4: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i4.pp4138-4146

Abstract

The generation of sufficient training data that is accurately labelled for a deep neural network involves a significant amount of effort and frequently constitutes a bottleneck in the implementation process. For the purpose of this research, we are training a neural network model to perform instance segmentation and classification of crop seeds for various rice cultivars. Synthetically constructed dataset is used here. The concept of domain randomization, which offers a productive alternative to the laborious process of data annotation, serves as the basis for our methodology. We make use of the domain randomization technique in order to produce synthetic data, and the mask region-based convolutional neural network (Mask R-CNN) architecture is utilized in order to train our neural network models. A cultivar name is used to designate the seeds, and they are differentiated from one another using colors that are comparable to those used in the actual dataset of paddy cultivars. Our mission focuses on the identification and categorization of rice paddy varieties within automatically generated photographs. Farmers are able to accurately sort crop seeds from a variety of rice cultivars with the use of this approach, which is particularly useful for phenotyping and optimizing yields in laboratory settings.
Methodology applied to computer audit with artificial intelligence: a systematic review Reymundez Suarez, Sheyla; Martínez Huamani, Bryan; Acuña Meléndez, María; Ovalle, Christian
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 4: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i4.pp3727-3738

Abstract

This systematic review focused on evaluating the impact of the machine learning operations (MLOps) methodology on anomaly detection and the integration of artificial intelligence (AI) projects in computer auditing. Data collection was carried out by searching for articles in databases, such as Scopus and PubMed, covering the period from 2018 to 2024. The rigorous application of the preferred reporting items for systematic reviews and metaanalyses (PRISMA) methodology allowed 88 significant records to be selected from an initial set of 1,389, highlighting the completeness of the selection phase. Both quantitative and qualitative analysis of the data obtained revealed emerging trends in the research and provided key insights into the implementation of MLOps in AI projects, especially in response to increasing complexity, whereby the adoption of the MLOps methodology stands out as a crucial component to optimize anomaly detection and improve integration in the context of information technology auditing. This systematic approach not only consolidates current knowledge but also stands as an essential guide for researchers and practitioners, and the information derived from this systematic review provides valuable guidance for future practices and decisions at the intersection of AI and information technology auditing.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 15, No 1: February 2026 Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 4: December 2024 Vol 13, No 3: September 2024 Vol 13, No 2: June 2024 Vol 13, No 1: March 2024 Vol 12, No 4: December 2023 Vol 12, No 3: September 2023 Vol 12, No 2: June 2023 Vol 12, No 1: March 2023 Vol 11, No 4: December 2022 Vol 11, No 3: September 2022 Vol 11, No 2: June 2022 Vol 11, No 1: March 2022 Vol 10, No 4: December 2021 Vol 10, No 3: September 2021 Vol 10, No 2: June 2021 Vol 10, No 1: March 2021 Vol 9, No 4: December 2020 Vol 9, No 3: September 2020 Vol 9, No 2: June 2020 Vol 9, No 1: March 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 More Issue