cover
Contact Name
Imam Much Ibnu Subroto
Contact Email
imam@unissula.ac.id
Phone
-
Journal Mail Official
ijai@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN : 20894872     EISSN : 22528938     DOI : -
IAES International Journal of Artificial Intelligence (IJ-AI) publishes articles in the field of artificial intelligence (AI). The scope covers all artificial intelligence area and its application in the following topics: neural networks; fuzzy logic; simulated biological evolution algorithms (like genetic algorithm, ant colony optimization, etc); reasoning and evolution; intelligence applications; computer vision and speech understanding; multimedia and cognitive informatics, data mining and machine learning tools, heuristic and AI planning strategies and tools, computational theories of learning; technology and computing (like particle swarm optimization); intelligent system architectures; knowledge representation; bioinformatics; natural language processing; multiagent systems; etc.
Arjuna Subject : -
Articles 1,808 Documents
Deep ensemble architectures with heterogeneous approach for an efficient content-based image retrieval Asokaraj, Manimegalai; Kumar, Josephine Prem; Ashwin, Nanda
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 4: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i4.pp4843-4855

Abstract

In the field of digital image processing, content-based image retrieval (CBIR) has become essential for searching images based on visual content characteristics like color, shape, and texture, rather than relying on text-based annotations. To address the increasing demands for efficiency and precision in CBIR systems, we introduce the HybridEnsembleNet methodology. HybridEnsembleNet combines deep learning algorithms with an asymmetric retrieval framework to optimize feature extraction and comparison in extensive image databases. This novel approach, specifically custom-made for CBIR, employs a lightweight query structure skilled at handling large-scale data under resource-constrained environments. The experiments were performed on the ROxford and RParis datasets. The deep learning component of HybridEnsembleNet significantly refines the accuracy of image matching and retrieval. RParis The ROxford dataset, specifically in the medium and hard difficulty benchmarks, demonstrates an enhancement of 5.53% and 10.44%, respectively. Similarly, the RParis dataset, under medium and hard benchmarks, exhibits improvements of 3.01% and 5.83%, showcasing superior performance compared to existing models. By overcoming the traditional limitations of CBIR systems in mean average precision (mAP) metrics, HybridEnsembleNet provides a scalable, efficient, and more accurate solution for retrieving relevant images from vast digital libraries.
Efficient reduction of computational complexity in video surveillance using hybrid machine learning for event recognition Honnegowda, Jyothi; Mallikarjunaiah, Komala; Srikantaswamy, Mallikarjunaswamy
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp317-326

Abstract

This paper addresses the challenge of high computational complexity in video surveillance systems by proposing an efficient model that integrates hybrid machine learning algorithms (HML) for event recognition. Conventional surveillance methods struggle with processing vast amounts of video data in real-time, leading to scalability, and performance issues. Our proposed approach utilizes convolutional neural networks (CNNs) and recurrent neural networks (RNNs) to enhance the accuracy and efficiency of detecting events. By comparing our model with conventional surveillance techniques motion detection, background subtraction, and frame differencing. We demonstrate significant improvements in frame processing time, object detection speed, energy efficiency, and anomaly detection accuracy. The integration of dynamic model scaling and edge computing further optimizes computational resource usage, making our method a scalable and effective solution for real-time surveillance needs. This research highlights the potential of machine learning to revolutionize video surveillance, offering insights into developing more intelligent and responsive security systems. The results of your simulation analysis, indicating performance improvements in accuracy by 0.25%, 0.35%, and 0.45% for the motion detection algorithm, background subtraction, and frame differencing respectively, and in real-time data processing by 5.65%, 4.45%, and 6.75% for the motion detection algorithm, background subtraction, and frame differencing respectively, highlight the potential of machine learning to transform video surveillance into a more intelligent and responsive system.
Unveiling DNA sequences: a comparison of machine learning and deep learning techniques for prediction Rayesha, S. M. Shifana; Banu, Dr. Aisha; Rahman, Dr. Afzalur; Priya, Dr. Sharon
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 4: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i4.pp4583-4593

Abstract

DNA is the biological macromolecule unit that carries the information of all protein, amino acid sequences. With the help of this protein sequence, we explore the mutated gene and disease-causing mutated genomic pattern. Currently, the progression of genomic innovation is the source of DNA arrangement information developing at a dangerous rate—external factors have stimulated the volume of research into DNA genomes. Initially, the development process of DNA sequencing is accomplished with the support of the Database, data structures, and sequence similarity. The method is capable of extracting a particular property in DNA. We employ the deep learning algorithm to pull out protein sequences' features. The DNA sequence is classified based on the in-build protein structures extracted into the Fasta file. Therefore, the DNA sequence of E. Coli with 106 data sets and 57 nucleotides is tested experimentally. Finally, we compared the results with the existing decision tree algorithm, k-nearest neighbors (KNN)-classification, random forest, and neural networks. The deep learning algorithm yields higher efficiency of 98% compared to other machine learning algorithms. This highlights the potential of deep learning in genomics research and its ability to yield superior results in classifying DNA sequences.
Smart contracts vulnerabilities detection using ensemble architecture of graphical attention model distillation and inference network Preethi, Preethi; Ulla, Mohammed Mujeer; Anni, Ashwitha; Murthy, Pavithra Narasimha; Renukaradhya, Sapna
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp724-736

Abstract

Smart contracts are automated agreements executed on a blockchain, offering reliability through their immutable and distributed nature. Yet, their unalterable deployment necessitates precise preemptive security checks, as vulnerabilities could lead to substantial financial damages henceforth testing for vulnerabilities is necessary prior to deployment. This paper presents the graphical attention model distillation and inference network (GAMDI-Net), a pioneering methodology that significantly enhances smart contract vulnerability detection. GAMDI-Net introduces a unique graphical learning module that employs attention mechanism networks to transform complex contract code into a smart graphical representation. In addition to this a dual-modality model distillation and mutual modality learning mechanism, GAMDI-Net excels in synthesizing semantic and control flow data to predict absent bytecode embeddings with high accuracy. This methodology not only improves the precision of vulnerability detection but also addresses scalability and efficiency challenges, reinforcing trust in the deployment of secure smart contracts within the blockchain ecosystem.
Enhanced scene text recognition using deep learning based hybrid attention recognition network Patil, Ratnamala S; Hanji, Geeta; Huded, Rakesh
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 4: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i4.pp4927-4938

Abstract

The technique of automatically recognizing and transforming text that is present in pictures or scenes into machine-readable text is known as scene text recognition. It facilitates applications like content extraction, translation, and text analysis in real-world visual data by enabling computers to comprehend and extract textual information from images, videos, or documents. Scene text recognition is essential for many applications, such as language translation and content extraction from photographs. The hybrid attention recognition network (HARN), unique technology presented in this research, is intended to greatly improve efficiency and accuracy of text recognition in complicated scene situations. HARN makes use of cutting-edge elements including alignment-free sequence-to-sequence (AFS) module, creative attention mechanisms, and hybrid architecture that blends attention models with convolutional neural networks (CNNs). Thanks to its novel attention processes, HARN is capable of comprehending wide range of scene text components by capturing both local and global context information. Through faster network convergence, shorter training times, and better utilization of computing resources, the suggested technique raises bar for state-of-the-art. HARN’s versatility makes it a good choice for range of scene text recognition applications, including multilingual text analysis and data extraction. Extensive tests are conducted to assess the effectiveness of HARN approach and demonstrate it is ability to greatly influence real-world applications where accurate and efficient text recognition is essential.
Method for developing and partitioning graph-based data warehouses using association rules Labzioui, Redouane; Letrache, Khadija; Ramdani, Mohammed
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp810-821

Abstract

The evolution of modern databases has led to a variety of not only structured query language (NoSQL) models, particularly graph-oriented-databases. This growth has encouraged businesses to explore graph-based business intelligence (BI) solutions. This paper explores three essential aspects in the domain of graph warehouse: the establishment of efficient graph warehouses, the significance of data historization, and the development of effective strategies for graph partitioning. It starts by building a BI system within a graph database. Subsequently, the paper emphasizes the pivotal role of data historization, highlighting the slowly graph changing dimension (SGCD) approach as a versatile framework for accommodating varied dimensional changes, additionally; the paper introduces a novel partitioning strategy utilizing association rules algorithms, for optimized and scalable graph warehouse management.
Phishing detection using clustering and machine learning Al-Shalabi, Luai; Jazyah, Yahia Hasan
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 4: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i4.pp4526-4536

Abstract

Phishing is a prevalent and evolving cyber threat that continues to exploit human vulnerability to deceive individuals and organizations into revealing sensitive information. Phishing attacks encompass a range of tactics, from deceptive emails and fraudulent websites to social engineering techniques. Traditional methods of detection, such as signature-based approaches and rule-based filtering, have proven to be limited in their effectiveness, as attackers frequently adapt and create new, previously unseen phishing campaigns. Consequently, there is a growing need for more sophisticated and adaptable detection methods. In recent years, machine learning (ML) and artificial intelligence (AI) have played a significant role in enhancing phishing detection. These technologies leverage large datasets to train models capable of recognizing subtle patterns and anomalies in both email content and website behavior. This research proposes a hybrid algorithm to detect phishing attacks based on clustering and classification machine learning methods (CMLM): deep learning (DL) and decision tree (DT). Simulation results show that the proposed technique achieves a high percentage of accuracy in detecting phishing. 
Efficient cross-lingual plagiarism detection using bidirectional and auto-regressive transformers Bouaine, Chaimaa; Benabbou, Faouzia
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 4: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i4.pp4619-4629

Abstract

The pervasive availability of vast online information has fundamentally altered our approach to acquiring knowledge. Nevertheless, this wealth of data has also presented significant challenges to academic integrity, notably in the realm of cross-lingual plagiarism. This type of plagiarism involves the unauthorized copying, translation, ideas, or works from one language into others without proper citation. This research introduces a methodology for identifying multilingual plagiarism, utilizing a pre-trained multilingual bidirectional and auto-regressive transformers (mBART) model for document feature extraction. Additionally, a siamese long short-term memory (SLSTM) model is employed for classifying pairs of documents as either "plagiarized" or "non-plagiarized". Our approach exhibits notable performance across various languages, including English (En), Spanish (Es), German (De), and French (Fr). Notably, experiments focusing on the En-Fr language pair yielded exceptional results, with an accuracy of 98.83%, precision of 98.42%, recall of 99.32%, and F-score of 98.87%. For En-Es, the model achieved an accuracy of 97.94%, precision of 98.57%, recall of 97.47%, and an F-score of 98.01%. In the case of En-De, the model demonstrated an accuracy of 95.59%, precision of 95.21%, recall of 96.85%, and F-score of 96.02%. These outcomes underscore the effectiveness of combining the MBART transformer and SLSTM models for cross-lingual plagiarism detection.
DriveNet: A deep learning framework with attention mechanism for early driving maneuver prediction M'haouach, Mohamed; Sassioui, Abdellatif; Bouhoute, Afaf; Fardousse, Khalid
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp44-53

Abstract

Inappropriate driving maneuvers are the leading cause of many car accidents. These accidents can be prevented if they are identified in advance and the driver is given the necessary assistance. Anticipating maneuvers is crucial for driving assistance systems in order to alert drivers and take appropriate measures to avoid or mitigate danger. In this paper, we introduce DriveNet a new approach that combines information about the driver’s behavior as well as the driving environment to predict the driving maneuvers. DriveNet utilizes a combination of convolutional neural network (CNN) and long short-term memory (LSTM) with attention mechanism to extract spatial information and capture long temporal dependencies. We evaluate DriveNet by performing a series of experiments using the publicly available Brain4Cars dataset. The findings show that the proposed approach achieves state-of-the-art performance and outperforms most previous methods. DriveNet has achieved an accuracy of 91.24%, a precision of 90.13%, and a recall of 91.44% for anticipation 4 seconds before the maneuvers occur.
Deep learning approach for forensic facial reconstruction depends on unidentified skull M. Mohammed, Doaa; Elgendy, Mostafa; Taha, Mohamed
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 4: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i4.pp3858-3868

Abstract

Facial reconstruction, or facial approximation, is an essential problem in a criminal investigation involving reconstructing a victim's face from his skull to determine the victim's identification at a crime scene. Facial approximation plays a crucial part when there is a lack of clues with investigators. Investigators utilize facial approximation to guess the victims' identities. This research attempted to use computer-aided face reconstruction rather than traditional approaches. Traditional methods of face reconstruction include the use of clay or gypsum. Traditional procedures necessitate forensic professionals to rebuild the victim's face. This research uses the convolution neural network skull part with sift (CNNSPS) model is employed to reconstruct facial features from a skull image utilizing public datasets CelebAMask-HQ and MUG500+. The proposed algorithm was tested on unidentified skull databases, and celebrity faces were used. The genuine datasets are not available, which is the key issue in this research.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 15, No 1: February 2026 Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 4: December 2024 Vol 13, No 3: September 2024 Vol 13, No 2: June 2024 Vol 13, No 1: March 2024 Vol 12, No 4: December 2023 Vol 12, No 3: September 2023 Vol 12, No 2: June 2023 Vol 12, No 1: March 2023 Vol 11, No 4: December 2022 Vol 11, No 3: September 2022 Vol 11, No 2: June 2022 Vol 11, No 1: March 2022 Vol 10, No 4: December 2021 Vol 10, No 3: September 2021 Vol 10, No 2: June 2021 Vol 10, No 1: March 2021 Vol 9, No 4: December 2020 Vol 9, No 3: September 2020 Vol 9, No 2: June 2020 Vol 9, No 1: March 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 More Issue