cover
Contact Name
Imam Much Ibnu Subroto
Contact Email
imam@unissula.ac.id
Phone
-
Journal Mail Official
ijai@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN : 20894872     EISSN : 22528938     DOI : -
IAES International Journal of Artificial Intelligence (IJ-AI) publishes articles in the field of artificial intelligence (AI). The scope covers all artificial intelligence area and its application in the following topics: neural networks; fuzzy logic; simulated biological evolution algorithms (like genetic algorithm, ant colony optimization, etc); reasoning and evolution; intelligence applications; computer vision and speech understanding; multimedia and cognitive informatics, data mining and machine learning tools, heuristic and AI planning strategies and tools, computational theories of learning; technology and computing (like particle swarm optimization); intelligent system architectures; knowledge representation; bioinformatics; natural language processing; multiagent systems; etc.
Arjuna Subject : -
Articles 1,808 Documents
Deep retino-network for automatic quantification of diabetic retinopathy Amin Jameel, Syed; Mohamed Shanavas, Abdul Rahim
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3306-3313

Abstract

Diabetic retinopathy (DR) is the ocular manifestation of the systemic disease. Since it is the most prevalent cause of blindness in the world, it demands a significant amount of therapeutic attention. As a result, a precise assessment of the DR condition as well as its evolution is very important for treatment. In this work, an automated quantification of diabetic retinopathy state (AQDRS) using fundus images is proposed. The state of DR is classified into 0 (low) to 3 (high) with the help of a deep retino-network (DRN). Before the classification by DRN, an image down-sampling scheme is employed. A DRN consists of convolution layer and max-pooling layers to extract the deep retina features and fully connected layer (FCL) for AQDRS where feed-forward neural network is employed for the classification. The performance of AQDRS by DRN for grading DR is evaluated using methods to evaluate segmentation and indexing techniques in the field of retinal ophthalmology (MESSIDOR) database. Results show that the AQDRS by DRN can able to extract the relevant discriminative information for grading the fundus image. The average accuracy on normal images in MESSIDOR database is 97.9% and it is 95.3% for DR images.
Hyperparameters optimization XGBoost for network intrusion detection using CSE-CIC-IDS 2018 dataset Chimphlee, Witcha; Chimphlee, Siriporn
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp817-826

Abstract

With the introduction of high-speed internet access, the demand for security and dependable networks has grown. In recent years, network attacks have gotten more complex and intense, making security a vital component of organizational information systems. Network intrusion detection systems (NIDS) have become an essential detection technology to protect data integrity and system availability against such attacks. NIDS is one of the most well-known areas of machine learning software in the security field, with machine learni ng algorithms constantly being developed to improve performance. This research focuses on detecting abnormalities in societal infiltration using the hyperparameters optimization XGBoost (HO-XGB) algorithm with the Communications Security Establishment-The Canadian Institute for Cybersecurity-Intrusion Detection System2018 (CSE-CIC-IDS2018) dataset to get the best potential results. When compared to typical machine learning methods published in the literature, HO-XGB outperforms them. The study shows that XGBoost outperforms other detection algorithms. We refined the HO-XGB model's hyperparameters, which included learning_rate, subsample, max_leaves, max_depth, gamma, colsample_bytree, min_child_weight, n_estimators, max_depth, and reg_alpha. The experimental findings reveal that HO-XGB1 outperforms multiple parameter settings for intrusion detection, effectively optimizing XGBoost's hyperparameters.
The cooperative algorithm with auxiliary objectives for the truck and trailer routing problem Pérez-Rodríguez, Ricardo; Urbán-Rivero, Luis Eduardo
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp2683-2693

Abstract

In this paper, a cooperative algorithm with auxiliary objectives is proposed to resolve the truck and trailer routing problem. In this proposal, each member of the population does not represent a complete solution as in almost any evolutionary algorithm. In addition, for each member, an aptitude is not possible to compute based only on its codification, because the member has only partial information of the solution. All the members of the population have partial information of the solution. Therefore, these members need to cooperate to obtain an aptitude for the entire population. This way of computing fitness is clearly a gap in the literature, and must be investigated. Moreover, the multi-objectivization approach incorporates an important feature to the proposed algorithm in order to improve its performance, i.e., the multi-objectivization approach permits to identify the best trips using the auxiliary objectives. Enough experimental results are shown that the cooperative algorithm is competitive against other current evolutionary algorithms. There no exist statistically significant difference between the cooperative algorithm and the others.
Anomaly detection using deep learning based model with feature attention Nayak, Rikin J.; Chaudhari, Jitendra P.
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp383-390

Abstract

Anomaly detection is a difficult problem with numerous industrial applications, such as analyzing the quality of objects using images. Anomaly detection is the process of identifying outliers in a given dataset. Recently, machine learning approaches to computer vision problems have outperformed classical state-of-the-art approaches. Anomaly detection problems can be solved using supervised approaches. However, labelled datasets are hard to obtain. Thus, many researchers have taken an unsupervised approach to solving the problem of anomaly detection. In this study, we use an adversarial auto encoder model as a base model and create a custom model to detect anomalies in images and videos. The model was trained exclusively on normal data. The modified national institute of standards and technology database (MNIST) dataset achieved an area under curve (AUC) score of 0.872 for anomaly detection, while the University of California San Diego (UCSD) anomaly dataset (Video dataset) achieved an AUC score of 0.74 for Ped1 and 0.87 for Ped2. To calculate the anomaly score, the concept of attention weights is combined with the reconstruction loss, and the proposed method outperformed other similar methods designed for the same problem. However, the usefulness of the proposed model was demonstrated through the detection of anomalies, and the model is still being improved for use in real-world situations.
Face and liveness detection with criminal identification using machine learning and image processing techniques for security system Shinde, Pratibha; Raundale, Ajay R.
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp722-729

Abstract

In the past, real-world photos have been used to train classifiers for face liveness identification since the related face presentation attacks (PA) and real-world images have a high degree of overlap. The use of deep convolutional neural networks (CNN) and real-world face photos together to identify the liveness of a face, however, has received very little study. A face recognition system should be able to identify real faces as well as efforts at faking utilizing printed or digital presentations. A true spoofing avoidance method involves observing facial liveness, such as eye blinking and lip movement. However, this strategy is rendered useless when defending against replay assaults that use video. The anti-spoofing technique consists of two modules: the ConvNet classifier module and the blinking eye module, which measure lip and eye movement. The results of the testing demonstrate that the developed module is capable of identifying various face spoof assaults, including those made with the use of posters, masks, or smartphones. To assess the convolutional features in this study adaptively fused from deep CNN produced face pictures and convolutional layers learned from real-world identification. Extensive tests using intra-database and cross-database scenarios on cutting-edge face anti-spoofing databases including CASIA, OULU, NUAA and replay-attack dataset demonstrate that the proposed solution methods for face liveness detection. The algorithm has a 94.30% accuracy rate.
Performance aware algorithm design for elastic resource workflow management of cluster consolidation to handle enterprise big data Kalyani, BJD; Krishna Murthy, Pannala; Neelima, Sarabu
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp2747-2753

Abstract

Integration and deployment of big data and business analytics application with cloud computing are more attractive as a service and are trending practice. This hybrid workflow is rapidly increasing and will trigger a revolution for enterprise data handling, information retrieval and computing. This paper presents hybrid workflow management framework for big data and multi cloud computing systems in a two-step approach. Linear optimization-based resource assessment algorithm is planned in the first step. Cluster oriented elastic resource allocation and workflow management techniques are concentrated in the second step. This paper also focus on performance evaluation parameters includes execution time, through put with multi task work flow optimization model. The proposed framework is efficiently managed the implementation of hybrid workflows by finetuning the evaluation attributes and provides improvement in terms of response time an average of 6%.
Predicting the classification of high vowel sound by using artificial neural network: a study in forensic linguistics Susanto, Susanto; Nanda, Deri Sis
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp195-200

Abstract

One of the tasks in forensic linguistics, especially forensic phonetics, is evaluating the speech sounds in the recordings. The speech evaluation aims at identifying and verifying speakers to predict if the sound were spoken by the suspect or not. The common problem in the task is determining which acoustic features of the speech sounds are reliable for the speaker identification and verification. The purpose of this research is studying formant frequencies to predict high vowel sounds /i/, and /u/ by using artificial neural network (ANN). Using three various normalization methods (i.e., softmax, z-score and sigmoid), we utilized multilayer perceptron on backpropagation ANN with the architectural models of 4-5-2, 4-10-2 and 4-20-2. The results show that the z-score normalization method provides higher accuracy than the other two in all formations and the 4-10-2 formation has shown the highest accuracy (92.26%).
Multi-granularity tooth analysis via YOLO-based object detection models for effective tooth detection and classification AbuSalim, Samah; Zakaria, Nordin; Maqsood, Aarish; Saboor, Abdul; Kwang Hooi, Yew; Mokhtar, Norehan; Jadid Abdulkadir, Said
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp2081-2092

Abstract

Effective and intelligent methods to classify medical images, especially in dentistry, can assist in building automated intra-oral healthcare systems. Accurate detection and classification of teeth is the first step in this direction. However, the same class of teeth exhibits significant variations in surface appearance. Moreover, the complex geometrical structure poses challenges in learning discriminative features among the tooth classes. Due to these complex features, tooth classification is one of the challenging research domains in deep learning. To address the aforementioned issues, the presented study proposes discriminative local feature extraction at different granular levels using you only look once (YOLO) models. However, this necessitates a granular intra-oral image dataset. To facilitate this requirement, a dataset at three granular levels (two, four, and seven teeth classes) is developed. YOLOv5, YOLOv6, and YOLOv7 models were trained using 2,790 images. The results indicate superior performance of YOLOv6 for two-class classification achieving a mean average precision (mAP) value of 94%. However, as the granularity level is increased, the performance of YOLO models decreases. For, four and seven-class classification problems, the highest mAP value of 87% and 79% was achieved by YOLOv5 respectively. The results indicate that different levels of granularity play an important role in tooth detection and classification.
Smart agriculture model in detecting oil palm plantation diseases using a convolution neural network Gunawan, Gunawan; Zarlis, Muhammad; Sihombing, Poltak; Sutarman, Sutarman
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3164-3171

Abstract

Planning models for sustainable crop care in the context of smart agriculture are complex issues as they involve many factors such as productivity, quality, growth sustainability, workforce use, and information technology use. In this study, we will create an optimized model using a convolution neural network (CNN) that can classify and monitor plant diseases. Part of the plant care system is to be aware of plant diseases and to be able to deal with them immediately. This study aims to acquire a new smart farming model for integrated crop care. The results of this research are findings in the form of a CNN model for classifying plant diseases detected from the leaves of the plants studied in oil palm. Testing using Google Colab obtains 100% accuracy and 99% accuracy using a teachable machine. The contributions of this paper create a new model in the field of informatics, especially in the field of intelligent agriculture based on information technology.
Signature verification based on proposed fast hyper deep neural network Hashim, Zainab; Mohsin, Hanaa; Alkhayyat, Ahmed
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp961-973

Abstract

Many industries have made widespread use of the handwittern signature verification system, including banking, education, legal proceedings, and criminal investigation, in which verification and identification are absolutely necessary. In this research, we have developed an accurate offline signature verification model that can be used in a writer-independent scenario. First, the handwitten signature images went through four preprocessing stages in order to be suitable for finding the unique features. Then, three different types of features namely principal component analysis (PCA) as appearance-based features, gray-level co-occurrence matrix (GLCM) as texture-features, and fast Fourier transform (FFT) as frequency-features are extracted from signature images in order to build a hybrid feature vector for each image. Finally, to classify signature features, we have designed a proposed fast hyper deep neural network (FHDNN) architecture. Two different datasets are used to evaluate our model these are SigComp2011, and CEDAR datasets. The results collected demonstrate that the suggested model can operate with accuracy equal to 100%, outperforming several of its predecessors. In the terms of (precision, recall, and F-score) it gives a very good results for both datasets and exceeds (1.00, 0.487, and 0.655 respectively) on Sigcomp2011 dataset and (1.00, 0.507, and 0.672 respectively) on CEDAR dataset.

Page 90 of 181 | Total Record : 1808


Filter by Year

2012 2026


Filter By Issues
All Issue Vol 15, No 1: February 2026 Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 4: December 2024 Vol 13, No 3: September 2024 Vol 13, No 2: June 2024 Vol 13, No 1: March 2024 Vol 12, No 4: December 2023 Vol 12, No 3: September 2023 Vol 12, No 2: June 2023 Vol 12, No 1: March 2023 Vol 11, No 4: December 2022 Vol 11, No 3: September 2022 Vol 11, No 2: June 2022 Vol 11, No 1: March 2022 Vol 10, No 4: December 2021 Vol 10, No 3: September 2021 Vol 10, No 2: June 2021 Vol 10, No 1: March 2021 Vol 9, No 4: December 2020 Vol 9, No 3: September 2020 Vol 9, No 2: June 2020 Vol 9, No 1: March 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 More Issue