cover
Contact Name
Imam Much Ibnu Subroto
Contact Email
imam@unissula.ac.id
Phone
-
Journal Mail Official
ijai@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN : 20894872     EISSN : 22528938     DOI : -
IAES International Journal of Artificial Intelligence (IJ-AI) publishes articles in the field of artificial intelligence (AI). The scope covers all artificial intelligence area and its application in the following topics: neural networks; fuzzy logic; simulated biological evolution algorithms (like genetic algorithm, ant colony optimization, etc); reasoning and evolution; intelligence applications; computer vision and speech understanding; multimedia and cognitive informatics, data mining and machine learning tools, heuristic and AI planning strategies and tools, computational theories of learning; technology and computing (like particle swarm optimization); intelligent system architectures; knowledge representation; bioinformatics; natural language processing; multiagent systems; etc.
Arjuna Subject : -
Articles 1,808 Documents
The incorporation of stacked long short-term memory into intrusion detection systems for botnet attack classification Heryanto, Ahmad; Stiawan, Deris; Hermansyah, Adi; Firnando, Rici; Pertiwi, Hanna; Bin Idris, Mohd Yazid; Budiarto, Rahmat
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3657-3670

Abstract

Botnets are a common cyber-attack method on the internet, causing infrastructure damage, data theft, and malware distribution. The continuous evolution and adaptation to enhanced defense tactics make botnets a strong and difficult threat to combat. In light of this, the study's main objective was to find out how well techniques like principal component analysis (PCA), synthetic minority oversampling technique (SMOTE), and long short-term memory (LSTM) can help find botnet attacks. PCA shows the ability to reduce the feature dimensions in network data, allowing for a more efficient and effective representation of the patterns contained. The SMOTE addresses class imbalances in the dataset, enhancing the model's ability to recognize suspicious activity. Furthermore, LSTM classifies sequential data, understanding complex network patterns and behaviors often used by botnets. The combination of these three methods provided a substantial improvement in detecting suspicious botnet activities. We also evaluated the effectiveness using performance metrics such as accuracy, precision, recall, and F1-score. The results showed an accuracy of 96.77%, precision of 88.95%, recall of 88.58%, and F1-score of 88.64%, indicating that the proposed model was reliable in detecting botnet traffic compared to other deep learning models. Furthermore, LSTM can classify sequential data, understanding complex network patterns and behaviors often used by botnets.
Embedded artificial intelligence system using deep learning and raspberrypi for the detection and classification of melanoma Dahdouh, Yousra; Anouar, Abdelhakim Boudhir; Ahmed, Mohamed Ben
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp1104-1111

Abstract

Melanoma is a kind of skin cancer that originates in melanocytes responsible for producing melanin, it can be a severe and potentially deadly form of cancer because it can metastasize to other regions of the body if not detected and treated early. To facilitate this process, Recently, various computer-assisted low-cost, reliable, and accurate diagnostic systems have been proposed based on artificial intelligence (AI) algorithms, particularly deep learning techniques. This work proposed an innovative and intelligent system that combines the internet of things (IoT) with a Raspberry Pi connected to a camera and a deep learning model based on the deep convolutional neural network (CNN) algorithm for real-time detection and classification of melanoma cancer lesions. The key stages of our model before serializing to the Raspberry Pi: Firstly, the preprocessing part contains data cleaning, data transformation (normalization), and data augmentation to reduce overfitting when training. Then, the deep CNN algorithm is used to extract the features part. Finally, the classification part with applied Sigmoid Activation Function. The experimental results indicate the efficiency of our proposed classification system as we achieved an accuracy rate of 92%, a precision of 91%, a sensitivity of 91%, and an area under the curve- receiver operating characteristics (AUC-ROC) of 0.9133.
Optimization of opinion mining classification techniques using dragonfly algorithm Rani, Mikanshu; Singh, Jaswinder
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3567-3575

Abstract

With the rapid evolution and growth of the internet, many individuals are using websites, blogs, and social media, and sharing their opinions about any product or service on online social platforms. Opinion mining (OM) is a field of analyzing opinions or reviews given by the public about services or products on online resources into positive, negative, or neutral classes. Governments, businesses, and researchers are using OM to analyze the reviews or opinions of the public. Thus, OM is helping individuals and businesses in better decision making. This paper mainly focuses on the feature extraction, performance analysis of OM classifiers and optimization using swarm intelligence (SI). Our proposed work: i) evaluates the performance of OM classification techniques after data collection, pre-processing, and feature extraction, ii) applies the dragonfly algorithm (DA) for optimization, and iii) evaluates the performance of OM classification techniques after applying DA and compares it with the observed performance of OM classifiers before optimization. The experimental results show that OM classification techniques perform better after optimization using DA in terms of precision, recall, f-score, and accuracy.
Using deep neural networks in classifying electromyography signals for hand gestures Al-Khazzar, Ahmed M.; Altaweel, Zainab; Hussain, Jabbar S.
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp217-227

Abstract

Electromyography (EMG) signals are used for various applications, especially in smart prostheses. Recognizing various gestures (hand movements) in EMG systems introduces challenges. These challenges include the noise effect on EMG signals and the difficulty in identifying the exact movement from the collected EMG data amongst others. In this paper, three neural network models are trained using an open EMG dataset to classify and recognize seven different gestures based on the collected EMG data. The three implemented models are: a four-layer deep neural network (DNN), an eight-layer DNN, and a five-layer convolutional neural network (CNN). In addition, five optimizers are tested for each model, namely Adam, Adamax, Nadam, Adagrad, and AdaDelta. It has been found that four layers achieve respectable recognition accuracy of 95% in the proposed model. 
Toward accurate Amazigh part-of-speech tagging Bani, Rkia; Amri, Samir; Zenkouar, Lahbib; Guennoun, Zouhair
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp572-580

Abstract

Part-of-speech (POS) tagging is the process of assigning to each word in a text its corresponding grammatical information POS. It is an important pre-processing step in other natural language processing (NLP) tasks, so the objective of finding the most accurate one. The previous approaches were based on traditional machine learning algorithms, later with the development of deep learning, more POS taggers were adopted. If the accuracy of POS tagging reaches 97%, even with the traditional machine learning, for high resourced language like English, French, it’s far the case in low resource language like Amazigh. The most used approaches are traditional machine learning, and the results are far from those for rich language. In this paper, we present a new POS tagger based on bidirectional long short-term memory for Amazigh language and the experiments that have been done on real dataset shows that it outperforms the existing machine learning methods.
Automatic detection of safety requests in web and mobile applications using natural language processing techniques Salmi, Salim; Oughdir, Lahcen
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3489-3497

Abstract

Web and mobile applications have become an essential part of our daily lives. However, as the usage of these applications increases, so does the potential for safety concerns. It is crucial for application developers to ensure that their applications are safe and secure for users. One way to achieve this is through the identification and processing of safety requests made by users. This research paper proposes a method for identifying safety requests made by users in web and mobile applications using natural language processing (NLP) and deep learning techniques. The approach involves training a machine learning and deep learning model on a dataset of user requests to identify and classify safety requests. The models are then integrated into the application’s code to automatically detect and respond to safety requests. A case study on a ride-sharing application showed that the proposed approach achieved high accuracy in identifying safety requests, with an F1 score of 0.85. The proposed method can be applied to vari- ous web and mobile applications to improve safety and security, and reduce the workload of manual safety request processing.
Assessing public satisfaction of public service application using supervised machine learning Zharif Mustaqim, Ilham; Melani Puspasari, Hasna; Tri Utami, Avita; Syalevi, Rahmad; Ruldeviyani, Yova
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp1608-1618

Abstract

The COVID-19 pandemic has enormously affected the economic situation worldwide, including in Indonesia resulting in 30 million Indonesian tumbling into penury. The Ministry of Social Affairs initiated a program to distribute social assistance aimed at the poorest households. ‘Aplikasi Cek Bansos’ is a public service application that aims to validate their status towards the social assistance program. Understanding the public sentiment and factors affecting public satisfaction levels is crucial to be performed. The goal of this study is to perform a comparative study of supervised machine learning to learn the sentiment of the public and the dominant variable resulting in public satisfaction. Support vector machine, Naïve Bayes dan K-nearest neighbor (KNN) are performed to seek the highest accuracy. This experiment discovered that the KNN algorithm produced outstanding performance where the accuracy hit 99.21%. Sentiment prediction indicated negative perception as the majority covering 83.81%. Trigrams analysis is performed to learn themes affecting satisfaction levels toward the application. Negative themes are grouped into the following categories: App instability, hope for improvement, navigation issues, and low-quality content. Some recommendations are offered for the Ministry of Social Affairs and developers, to overcome negative feedback and enhance public satisfaction level towards the application.
Knee osteoarthritis automatic detection using U-Net Abdellatif, Ahmed Salama; Rahouma, Kamel Hussien; E. Mansour, Fatma
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp2122-2130

Abstract

Knee osteoarthritis or OA is one of the most common diseases that can affect the elderly and overweight people. OA is occurred as the result of wear, tear, and progressive loss of articular cartilage. Kellgren-Lawrence system is a common method of classifying the severity of osteoarthritis depends on knee joint width. According to Kellgren-Lawrence, knee OA is divided into five classes; one class represents a normal knee and the others represent four levels of knee OA. In this work, we aim to automatically detect knee OA according to the Kellgren-Lawrence classification. The proposed system uses the U-Net architecture. The overall system yielded an accuracy of 96.3% during training.
Contextual embedding generation of underwater images using deep learning techniques Kerai, Shivani; Khekare, Ganesh
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3111-3118

Abstract

This article delves into the cutting-edge realm of artificial intelligence, specifically focusing on its application in marine research via underwater image analysis. It introduces an innovative, integrated approach that combines object detection with image captioning tailored for the aquatic domain. Central to this approach is the advanced technique of image feature extraction, complemented by the strategic implementation of attention mechanisms within neural networks. These mechanisms are key in enhancing the precision and contextual understanding of underwater imagery. The efficacy of this method is underscored by extensive experiments on diverse underwater datasets. Results show notable improvements in detecting and describing complex underwater scenes, thereby providing invaluable insights for marine biologists, environmentalists, and the broader scientific community. This exploration marks a significant advancement in marine research, offering a new lens through which the underwater world can be understood and preserved.
Backbone search for object detection for applications in intrusion warning systems Thuan, Nguyen Duc; Huong, Nguyen Thi Lan; Hong, Hoang Si
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp1129-1138

Abstract

In this work, we propose a novel backbone search method for object detection for applications in intrusion warning systems. The goal is to find a compact model for use in embedded thermal imaging cameras widely used in intrusion warning systems. The proposed method is based on faster region-based convolutional neural network (Faster R-CNN) because it can detect small objects. Inspired by EfficientNet, the sought-after backbone architecture is obtained by finding the most suitable width scale for the base backbone (ResNet50). The evaluation metrics are mean average precision (mAP), number of parameters, and number of multiply–accumulate operations (MACs). The experimental results showed that the proposed method is effective in building a lightweight neural network for the task of object detection. The obtained model can keep the predefined mAP while minimizing the number of parameters and computational resources. All experiments are executed elaborately on the person detection in intrusion warning systems (PDIWS) dataset. 

Page 96 of 181 | Total Record : 1808


Filter by Year

2012 2026


Filter By Issues
All Issue Vol 15, No 1: February 2026 Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 4: December 2024 Vol 13, No 3: September 2024 Vol 13, No 2: June 2024 Vol 13, No 1: March 2024 Vol 12, No 4: December 2023 Vol 12, No 3: September 2023 Vol 12, No 2: June 2023 Vol 12, No 1: March 2023 Vol 11, No 4: December 2022 Vol 11, No 3: September 2022 Vol 11, No 2: June 2022 Vol 11, No 1: March 2022 Vol 10, No 4: December 2021 Vol 10, No 3: September 2021 Vol 10, No 2: June 2021 Vol 10, No 1: March 2021 Vol 9, No 4: December 2020 Vol 9, No 3: September 2020 Vol 9, No 2: June 2020 Vol 9, No 1: March 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 More Issue