cover
Contact Name
Imam Much Ibnu Subroto
Contact Email
imam@unissula.ac.id
Phone
-
Journal Mail Official
ijai@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN : 20894872     EISSN : 22528938     DOI : -
IAES International Journal of Artificial Intelligence (IJ-AI) publishes articles in the field of artificial intelligence (AI). The scope covers all artificial intelligence area and its application in the following topics: neural networks; fuzzy logic; simulated biological evolution algorithms (like genetic algorithm, ant colony optimization, etc); reasoning and evolution; intelligence applications; computer vision and speech understanding; multimedia and cognitive informatics, data mining and machine learning tools, heuristic and AI planning strategies and tools, computational theories of learning; technology and computing (like particle swarm optimization); intelligent system architectures; knowledge representation; bioinformatics; natural language processing; multiagent systems; etc.
Arjuna Subject : -
Articles 1,808 Documents
Speaker identification under noisy conditions using hybrid convolutional neural network and gated recurrent unit Anito, Wondimu Lambamo; Srinivasagan, Ramasamy; Jifara, Worku; Alzahrani, Ali
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp1050-1062

Abstract

Speaker identification is biometrics that classifies or identifies a person from other speakers based on speech characteristics. Recently, deep learning models outperformed conventional machine learning models in speaker identification. Spectrograms of the speech have been used as input in deep learning-based speaker identification using clean speech. However, the performance of speaker identification systems gets degraded under noisy conditions. Cochleograms have shown better results than spectrograms in deep learning-based speaker recognition under noisy and mismatched conditions. Moreover, hybrid convolutional neural network (CNN) and recurrent neural network (RNN) variants have shown better performance than CNN or RNN variants in recent studies. However, there is no attempt conducted to use a hybrid CNN and enhanced RNN variants in speaker identification using cochleogram input to enhance the performance under noisy and mismatched conditions. In this study, a speaker identification using hybrid CNN and the gated recurrent unit (GRU) is proposed for noisy conditions using cochleogram input. VoxCeleb1 audio dataset with real-world noises, white Gaussian noises (WGN) and without additive noises were employed for experiments. The experiment results and the comparison with existing works show that the proposed model performs better than other models in this study and existing works.
Optimized robust fuzzy sliding mode control for efficient wastewater treatment: a comprehensive study Kumara, Varuna; Ganesan, Ezhilarasan
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp631-638

Abstract

Wastewater treatment plants (WWTPs) are plagued by nonlinearities, uncertainties, and disturbances that degrade control performance and may even lead to severe instability. The WWTP control issue has received a lot of research and development during the last several decades. One well-known way of designing a resilient control system is called sliding mode control (SMC). The SMC's greatest strength lies in its innate resistance to disturbances and uncertainty. Incorporating fuzzy SMC would eliminate the chattering effect, the primary drawback of traditional sliding-mode controller, without sacrificing robustness against parametric uncertainties, modeling errors, and variable dynamic loads. This article discusses the hybridization of fuzzy logic with sliding mode control to provide highly excellent stability and accuracy in a control system. As a means of optimizing the fuzzy SMC, the gradient-free optimization technique known as the Jaya algorithm is investigated. By repeatedly altering a population of individual solutions, this population-based method can deal with both limited and unbounded optimization issues.
Artificial intelligence in the United Arab Emirates public sector: a systematic literature review Akhoirshieda, Modafar Shaker; Naim Ku Khalif, Ku Muhammad; Awang, Suryanti
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp2472-2481

Abstract

This systematic literature review examines United Arab Emirates (UAE) public sector artificial intelligence (AI) use, impact, and challenges. Using the preferred reporting items for systematic reviews and meta-analyses (PRISMA) protocol, 20 relevant Scopus articles were selected for the study. Data from selected articles were used to analyse AI's use, benefits, and drawbacks in the UAE's public sector. Quality assessment was done throughout the review process. The results showed that AI is being used more in the UAE's public sector to improve efficiency, cost savings, decision-making, and service delivery. The review also found data, privacy, security, technical, infrastructure, AI, and user challenges. Publication bias and the lack of AI studies in the UAE's public sector limit the study. The findings have major implications for policy and practice, emphasising the need for AI strategies and UAE-specific solutions.
Transfer learning for epilepsy detection using spectrogram images Edderbali, Fatima; Harmouchi, Mohammed; Essoukaki, Elmaati
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp1022-1029

Abstract

Epilepsy stands out as one of the common neurological diseases. The neural activity of the brain is observed using electroencephalography (EEG). Manual inspection of EEG brain signals is a slow and arduous process, which puts heavy load on neurologists and affects their performance. The aim of this study is to find the best result of classification using the transfer learning model that automatically identify the epileptic and the normal activity, to classify EEG signals by using images of spectrogram which represents the percentage of energy for each coefficient of the continuous wavelet. Dataset includes the EEG signals recorded at monitoring unit of epilepsy used in this study to presents an application of transfer learning by comparing three models Alexnet, visual geometry group (VGG19) and residual neural network ResNet using different combinations with seven different classifiers. This study tested the models and reached a different value of accuracy and other metrics used to judge their performances, and as a result the best combination has been achieved with ResNet combined with support vector machine (SVM) classifier that classified EEG signals with a high success rate using multiple performance metrics such as 97.22% accuracy and 2.78% the value of the error rate.
The performance analysis of hyper-heuristics algorithms over examination timetabling problems Muklason, Ahmad; Tendio, Yusnardo; Angelita Depari, Helena; Arif Nuriman, Muhammad; Agung Premananda, I Gusti
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp2155-2164

Abstract

In general, uncapacitated exam timetabling is conducted manually, which can be time-consuming. Many studies aim to automate and optimize uncapacitated exam timetabling. However, pinpointing the most efficient algorithm is challenging since most studies assert that their algorithms surpass previous ones. To identify the optimal algorithm, this research evaluates the performance of four algorithms: Hill climbing (HC), simulated annealing (SA), great deluge (GD), and tabu search (TS) in addressing the exam timetabling problem. The Kempe chain operator’s influence on optimization solutions is also examined. A simple random method is employed to select the low-level heuristic (LLH). The Carter (Toronto) dataset served as the test material, with each algorithm undergoing 200,000 iterations for comparison. The results indicate that the TS algorithm is superior, providing the best solution in 13 instances. The use of a tabu list enhanced the search process’s efficiency by preventing redundant modifications. The Kempe chain LLH exhibited a tendency towards achieving better solutions.
Sentence embedding to improve rumour detection performance model Anggrainingsih, Rini; Wihidayat, Endar Suprih; Widoyono, Bambang
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp115-121

Abstract

Recently, most individuals have preferred accessing the most recent news via social media platforms like Twitter as their primary source of information. Moreover, Twitter enables users to post and distribute tweets quickly and unsupervised. As a result, Twitter has become a popular platform for disseminating false information, such as rumours. These rumours were then propagated as accurate and influenced public opinion and decision-making. The issue will arise when a decision or policy with substantial consequences is made based on rumours. To avoid the negative impacts of rumours, several researchers have attempted to detect them automatically as early as feasible. Previous studies employed supervised learning methods to identify Twitter rumours and relied on feature extraction algorithms to extract tweet content and context elements. However, manually extracting features is time-consuming and labour-intensive. To encode each tweet's sentence as a vector based on its contextual meaning, we proposed utilising Bidirectional Encoder Representation of Transformer (BERT) as a sentence embedding. We then used these vectors to train some classifier models to detect rumours. Finally, we compared the performance of BERT-based models to feature engineering-based models. We discovered that the suggested BERT-based model improved all parameters by around 10% compared to the feature engineering-based classification model.
Verifiable data distribution technique for multiple applicants in a cloud computing ecosystem Karemallaiah, Jayalakshmi; Revaiah, Prabha
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp1241-1249

Abstract

Cloud computing is the most exploited research technology in both industry and academia due to wide application and increases in adoption from global organizations. In cloud, computing data storage is one of the primary resources offered through cloud computing, however, an increase in participants raises major security concerns, as the user has no hold over the data. Furthermore, recent research has shown great potential for efficient data sharing with multiple participants. Existing researches suggest complicated and inefficient cloud security architecture. Hence, this research work proposes identifiable data sharing for multiple users (IDSMU) mechanism, which aims to provide security for multiple users in a particular cloud group. A novel signature scheme is used for identifying the participants, further verification of the Novel Signature Scheme is proposed along with a retraction process where the secret keys of the participant and the sender is cross-verified; at last, a module is designed for the elimination of any malicious participants within the group. IDSMU is evaluated on computation count and efficiency is proved by comparing with an existing model considering computation count. IDSMU performs marginal improvisation over the existing model in comparison with the existing model using the novel signature scheme. 
Feature level fusion of multi-source data for network intrusion detection Somashekar, Harshitha; Halebidu Basavaraju, Pramod
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp2956-2962

Abstract

The generation of data, collecting, and refining in computer networks have increased exponentially in recent years. Network attacks have also grown in prevalence with this proliferation of data and are now an inherent issue in complicated networks. Current network intrusion detection systems (NIDS) have significant issues with regard to anomaly detection. Several machine learning classification approaches are used to create NIDSs, but they are not sufficiently sophisticated to reliably detect complicated or synthetic attacks, especially if working with a lot of multi-scale data. Data fusion has been used in network intrusion detection to address these issues. For network intrusion detection, we suggested a multi-source data fusion technique in this research, which combines specific features from two datasets to produce a single dataset. Also, a machine learning classifier with fewer parameters is utilized for the fused dataset. The random forest shows the best classification accuracy compared to others in this work. For the normal classification, model accuracy is 92.8%, and the proposed fusion model showed 97.3% accuracies. Furthermore, the findings show that, when compared to other cutting-edge techniques, the suggested model is substantially more effective in detecting intrusions.
Under-sampling technique for imbalanced data using minimum sum of euclidean distance in principal component subset Kasemtaweechok, Chatchai; Suwannik, Worasait
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp305-318

Abstract

Imbalanced datasets are characterized by a substantially smaller number of data points in the minority class compared to the majority class. This imbalance often leads to poor predictive performance of classification models when applied in real-world scenarios. There are three main approaches to handle imbalanced data: over-sampling, under-sampling, and hybrid approach. The over-sampling methods duplicate or synthesize data in the minority class. On the other hand, the under-sampling methods remove majority class data. Hybrid methods combine the noise-removing benefits of under-sampling the majority class with the synthetic minority class creation process of over-sampling. In this research, we applied principal component (PC) analysis, which is normally used for dimensionality reduction, to reduce the amount of majority class data. The proposed method was compared with eight state-of-the-art under-sampling methods across three different classification models: support vector machine, random forest, and AdaBoost. In the experiment, conducted on 35 datasets, the proposed method had higher average values for sensitivity, G-mean, the Matthews correlation coefficient (MCC), and receiver operating characteristic curve (ROC curve) compared to the other under-sampling methods. 
Design of a novel deep network model for spinal cord injury prediction Venkatapathi Raju, P. R. S. S.; Asanambigai, Valayapathy; Babu Mudunuri, Suresh
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp2131-2142

Abstract

Degenerative cervical myelopathy must be diagnosed with magnetic resonance imaging (MRI) which predicts spinal cord injury (SCI). The growing volume of medical imaging data can be managed by deep learning models, which provide a preliminary interpretation of images taken in basic care settings. Our main goal was to create a deep-learning approach that could identify SCI using MRI data. This work concentrates on modeling a novel 2D-convolutional neural networks (2D-CNN) approach for predicting SCI. For holdouts, training, and validation, various datasets of patients were created. Two experts assigned labels to the images. The holdout dataset was used to evaluate the performance of our deep convolutional neural network (DCNN) over the image data from the available dataset. The dataset is acquired from the online resource for training and validation purpose. With the available dataset, the anticipated model attains 94% AUC, 0.1 p-value, and 92.2% accuracy. The anticipated model might make cervical spine MRI scan interpretation more accurate and reliable.

Page 98 of 181 | Total Record : 1808


Filter by Year

2012 2026


Filter By Issues
All Issue Vol 15, No 1: February 2026 Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 4: December 2024 Vol 13, No 3: September 2024 Vol 13, No 2: June 2024 Vol 13, No 1: March 2024 Vol 12, No 4: December 2023 Vol 12, No 3: September 2023 Vol 12, No 2: June 2023 Vol 12, No 1: March 2023 Vol 11, No 4: December 2022 Vol 11, No 3: September 2022 Vol 11, No 2: June 2022 Vol 11, No 1: March 2022 Vol 10, No 4: December 2021 Vol 10, No 3: September 2021 Vol 10, No 2: June 2021 Vol 10, No 1: March 2021 Vol 9, No 4: December 2020 Vol 9, No 3: September 2020 Vol 9, No 2: June 2020 Vol 9, No 1: March 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 More Issue