cover
Contact Name
Imam Much Ibnu Subroto
Contact Email
imam@unissula.ac.id
Phone
-
Journal Mail Official
ijai@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN : 20894872     EISSN : 22528938     DOI : -
IAES International Journal of Artificial Intelligence (IJ-AI) publishes articles in the field of artificial intelligence (AI). The scope covers all artificial intelligence area and its application in the following topics: neural networks; fuzzy logic; simulated biological evolution algorithms (like genetic algorithm, ant colony optimization, etc); reasoning and evolution; intelligence applications; computer vision and speech understanding; multimedia and cognitive informatics, data mining and machine learning tools, heuristic and AI planning strategies and tools, computational theories of learning; technology and computing (like particle swarm optimization); intelligent system architectures; knowledge representation; bioinformatics; natural language processing; multiagent systems; etc.
Arjuna Subject : -
Articles 1,722 Documents
Customer reviews analytics on food delivery services in social media: a review Noor Sakinah Shaeeali; Azlinah Mohamed; Sofianita Mutalib
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 9, No 4: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v9.i4.pp691-699

Abstract

Food delivery services have gained attention and become a top priority in developed cities by reducing travel time and waiting time by offering online food delivery options for a variety of dishes from a wide variety of restaurants. Therefore, customer analytics have been considered in business analysis by enabling businesses to collect and analyse customer feedback to make business decisions to be more advanced in the future. This paper aims to study the techniques used in customer analytics for food delivery services and identify the factors of customers’ reviews for food delivery services especially in social media. A total of 53 papers reviewed, several techniques and algorithms on customer analytics for food delivery services in social media are Lexicon, machine learning, natural language processing (NLP), support vector machine (SVM), and text mining. The paper further analyse the challenges and factors that give impacts to the customers’ reviews for food delivery services. These findings would be appropriate for development and enhancement of food delivery services in future works.
Estimating PV models using multi-group salp swarm algorithm Mohammad Al-Shabi; Chaouki Ghenai; Maamar Bettayeb; Fahad Faraz Ahmad; Mamdouh El Haj Assad
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 2: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i2.pp398-406

Abstract

In this paper, a multi-group salp swarm algorithm (MGSSA) is presented for estimating the photovoltaic (PV) solar cell models. The SSA is a metaheuristic technique that mimics the social behavior of the salp. The salps work in a group that follow a certain leader. The leader approaches the food source and the rest follows it, hence resulting in slow convergence of SSA toward the solution. For several groups, the searching mechanism is going to be improved. In this work, a recently developed algorithm based on several salp groups is implemented to estimate the single-, double-, triple-, Quadruple-, and Quintuple-diode models of a PV solar cell. Six versions of MGSSA algorithms are developed with different chain numbers; one, two, four, six, eight and half number of the salps. The results are compared to the regular particle swarm optimization (PSO) and some of its newly developed forms. The results show that MGSSA has a faster convergence rate, and shorter settling time than SSA. Similar to the inspired actual salp chain, the leader is the most important member in the chain; the rest has less significant effect on the algorithm. Therefore, it is highly recommended to increase the number of leaders and reduce the chain length. Increasing the number of leaders (number of groups) can reduce the root mean squared error (RMSE) and maximum absolute error (MAE) by 50% of its value.
Spike neuron optimization using deep reinforcement learning Tan Szi Hui; Mohamad Khairi Ishak
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 1: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i1.pp175-183

Abstract

Deep reinforcement learning (DRL) which involved reinforcement learning and artificial neural network allows agents to take the best possible actions to achieve goals. Spiking Neural Network (SNN) faced difficulty in training due to the non-differentiable spike function of spike neuron. In order to overcome the difficulty, Deep Q network (DQN) and Deep Q learning with normalized advantage function (NAF) are proposed to interact with a custom environment. DQN is applied for discrete action space whereas NAF is implemented for continuous action space. The model is trained and tested to validate its performance in order to balance the firing rate of excitatory and inhibitory population of spike neuron by using both algorithms. Training results showed both agents able to explore in the custom environment with OpenAI Gym framework. The trained model for both algorithms capable to balance the firing rate of excitatory and inhibitory of the spike neuron. NAF achieved 0.80% of the average percentage error of rate of difference between target and actual neuron rate whereas DQN obtained 0.96%. NAF attained the goal faster than DQN with only 3 steps taken for actual output neuron rate to meet with or close to target neuron firing rate.
Intrusion detection with deep learning on internet of things heterogeneous network Sharipuddin Sharipuddin; Benni Purnama; Kurniabudi Kurniabudi; Eko Arip Winanto; Deris Stiawan; Darmawijoyo Hanapi; Mohd. Yazid Idris; Rahmat Budiarto
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i3.pp735-742

Abstract

The difficulty of the intrusion detection system in heterogeneous networks is significantly affected by devices, protocols, and services, thus the network becomes complex and difficult to identify. Deep learning is one algorithm that can classify data with high accuracy. In this research, we proposed deep learning to intrusion detection system identification methods in heterogeneous networks to increase detection accuracy. In this paper, we provide an overview of the proposed algorithm, with an initial experiment of denial of services (DoS) attacks and results. The results of the evaluation showed that deep learning can improve detection accuracy in the heterogeneous internet of things (IoT).
Conceptual model of the recursive entity modelling method after revision Rifai Amal; Tzemmout Mohamed Amine; Sadiq Abdelalime
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i3.pp602-613

Abstract

In this work, we present the rectifications that we brought on recursive entity modeling method into lasts articles. Then, we establish the recursive entity modeling method global conceptual diagram in order to conceive a space name and database for this method in future works. Therefore, in the first section, we present an overview of the recursive entity modeling method conceptual model; then, in the second section, we present recursive entity modeling method revisited elements (relationships, component, roles, conception, path, node, connection); and in the third section, we conceive a general conceptual diagram describing the components of the recursive entity modeling method.
Classification of EEG signal using EACA based approach at SSVEP-BCI Ashwini S. R.; H. C. Nagaraj
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i3.pp717-726

Abstract

The brain-computer-interfaces (BCI) can also be referred towards a mindmachine interface that can provide a non-muscular communication channel in between the computer device and human brain. To measure the brain activity, electroencephalography (EEG) has been widely utilized in the applications of BCI to work system in real-time. It has been analyzed that the identification probability performed with other methodologies do not provide optimal classification accuracy. Therefore, it is required to focus on the process of feature extraction to achieve maximum classification accuracy. In this paper, a novel process of data-driven spatial has been proposed to improve the detection of steady state visually evoked potentials (SSVEPs) at BCI. Here, EACA has been proposed, which can develop the reproducibility of SSVEP across many trails. Further this can be utilized to improve the SSVEP from a noisy data signal by eliminating the activities of EEG background. In the simulation process, the SSVEP dataset recorded from given 11 subjects are considered. To validate the performance, the state-of-art method is considered to compare with the EDCA based proposed approach.
Vehicle detection and tracking for traffic management Mallikarjun Anandhalli; Vishwanth P. Baligar; Pavana Baligar; Pooja Deepsir; Mithali Iti
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 1: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i1.pp66-73

Abstract

The detection of object with respect to Vehicle and tracking is the most needed step in computer research area as there is wide investment being made form Intelligent Traffic Management. Due to changes in vision or scenes, detection and tracking of vehicle under different drastic conditions has become most challenging process because of the illumination, shadows etc. To overcome this, we propose a method which uses TensorFlow fused with corner points of the vehicles for detection of vehicle and tracking of an vehicle is formulated again, the location of the object which is detected is passed to track the detected object, using the tracking algorithm based on CNN. The proposed algorithm gives result of 90.88% accuracy of detection in video sequences under different conditions of climate.
Virtual machine migration in MEC based artificial intelligence technique Ali OUACHA; Mohamed EL Ghmary
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 1: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i1.pp244-252

Abstract

The whole world is inundated with smaller devices equipped with wireless communication interfaces. At the same time, the amount of data generated by these devices is becoming more important. The smaller size of these devices has the disadvantage of being short of processing and storage resources (memory, processes, energy,...), especially when it needs to process larger amounts of data. In order to overcome this weakness and process massive data, devices must help each other. A low-resource node can delegate the execution of a set of computionly heavy tasks to another machine in the network to process them for it. The machine with sufficient computational resources must also deposit the appropriate environment represented by the adapted virtual machine. Thus, in this paper, in order to migrate the virtual machine to an edge server in a mobile edge computing environment, we have proposed an approach based on artificial intelligence. More specifically, the main idea of this paper is to cut a virtual machine into several small pieces and then send them to an appropriate target node (Edge Server) using the ant colony algorithm. In order to test and prove the effectiveness of our approach, several simulations are made by NS3. The obtained results show that our approach is well adapted to mobile environments.
Automated tumor segmentation in MR brain image using fuzzy c-means clustering and seeded region methodology Mustafa Zuhaer Nayef AL-Dabagh
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 2: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i2.pp284-290

Abstract

Automated segmentation of a tumor is still a considerably exciting research topic in the medical imaging processing field, and it plays a considerable role in forming a right diagnosis, to aid effective medical treatment. In this work, a fully automated system for segmentation of the brain tumor in MRI images is introduced. The suggested system consists of three parts: Initially, the image is pre-processed to enhance contrast, eliminate noise, and strip the skull from the image using filtering and morphological operations. Secondly, segmentation of the image happens using two techniques, fuzzy c-means clustering (FCM) and with the application of a seeded region growing algorithm (SGR). Thirdly, this method proposes a post-processing step to smooth segmentation region edges using morphological operations. The testing of the proposed system involved 233 patients, which included 287 MRI images. A comparison of the results ensued, with the manual verification of the traces performed by doctors, which ultimately proved an average Dice Coefficient of 90.13% and an average Jaccard Coefficient of 82.60% also, by comparison with traditional segmentation techniques such as FCM method. The segmentation results and quantitative data analysis demonstrates the effectiveness of the suggested system.
Fuzzy mamdani logic inference model in the loading of distribution substation transformer SCADA system Rahma Farah Ningrum; Riki Ruli A. Siregar; Darma Rusjdi
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 2: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i2.pp298-305

Abstract

The research objective of supervisory control and data acquisition (SCADA), with fuzzy Mamdani logic simulation on the loading section of distribution transformer substations. Data acquisition is available when saving SAIFI SAIDI data and storing the results of monitoring equipment. The method used is Mamdani fuzzy logic, there are two input variables, namely current and voltage devices. The membership function in Mamdani fuzzy logic has been created based on the input current and voltage variables. Currently: parameter {0, 600} low is created {0, 350, 450, 600}, normal {400-650} parameter is created {400, 500, 550, 650}, parameter high {≥600} is created {600, 650, 750, 1000}, when determining the voltage: low {≤10.5} parameters {0 4 7 10.5}, normal {9-14} parameters {9, 10, 13, 14} and high {≥13} - parameters {13, 14, 15, 16}. Based on the results of the Mamdani logic rule test on the output current containing a transformer and a voltage sensor, the results obtained are IF (normal current; (630) AND voltage (high); (13.2) (high load transformer). The components in the simulation tool include miniature substations made with the 1A travel substation model, 3A substation as the main substation, the relay as distribution substation as the monitoring application. Telestatus and Telecontrol use a microcontroller. Initial scenario. After substation is resumed, data is stored after downtime, service life, duration, and data period. Initial scenario After substation is resumed, data is stored after downtime, service life, duration, and data period.

Page 36 of 173 | Total Record : 1722


Filter by Year

2012 2025


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 4: December 2024 Vol 13, No 3: September 2024 Vol 13, No 2: June 2024 Vol 13, No 1: March 2024 Vol 12, No 4: December 2023 Vol 12, No 3: September 2023 Vol 12, No 2: June 2023 Vol 12, No 1: March 2023 Vol 11, No 4: December 2022 Vol 11, No 3: September 2022 Vol 11, No 2: June 2022 Vol 11, No 1: March 2022 Vol 10, No 4: December 2021 Vol 10, No 3: September 2021 Vol 10, No 2: June 2021 Vol 10, No 1: March 2021 Vol 9, No 4: December 2020 Vol 9, No 3: September 2020 Vol 9, No 2: June 2020 Vol 9, No 1: March 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 More Issue