cover
Contact Name
Heri Nurdiyanto
Contact Email
Heri Nurdiyanto
Phone
-
Journal Mail Official
internationaljournalair@gmail.com
Editorial Address
-
Location
Kota metro,
Lampung
INDONESIA
International Journal of Artificial Intelligence Research
Published by STMIK Dharma Wacana
ISSN : -     EISSN : 25797298     DOI : -
International Journal Of Artificial Intelligence Research (IJAIR) is a peer-reviewed open-access journal. The journal invites scientists and engineers throughout the world to exchange and disseminate theoretical and practice-oriented topics of Artificial intelligent Research which covers four (4) majors areas of research that includes 1) Machine Learning and Soft Computing, 2) Data Mining & Big Data Analytics, 3) Computer Vision and Pattern Recognition, and 4) Automated reasoning. Submitted papers must be written in English for initial review stage by editors and further review process by minimum two international reviewers.
Arjuna Subject : -
Articles 37 Documents
COUNTING THE NUMBER OF ACTIVE SPERMATOZOA MOVEMENTS USING IMPROVEMENT ADAPTIVE BACKGROUND LEARNING ALGORITHM Masdiyasa, I Gede Susrama; Purbasari, Intan Yuniar; Hatta, Moch.
International Journal of Artificial Intelligence Research Vol 4, No 1 (2020): In Press
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29099/ijair.v4i1.94

Abstract

The most important early stage in sperm infertility research is the detection of sperm objects. The success rate in separating sperm objects from semen fluid has an important role for further analysis. This research performed the detection and calculation of human spermatozoa. The detected sperm was the moving sperm in the video data. An improvement of Adaptive Background Learning was applied to detect the moving sperm. The purpose of this method is to improve the performance of Adaptive Background Learning algorithm in background subtraction process to detect and calculate moving sperm on the microscopic video of sperm fluid. This paper also compared several other background subtraction algorithms to conclude the appropriate background subtraction algorithm for sperm detection and sperm counting. The process done in this research was preprocessing using the Gaussian filter. The next was background subtraction process, followed by morphology operation. To test or validate the detection results of any background subtraction algorithm used, the foreground mask results from the morphological operation were compared to the ground truth of moving sperm image. For visualization purposes, every BLOB area (white object in binary image) on the foreground were given a bounding box to the original frame and the number of BLOB objects present in the foreground mask were counted. This shows that the system had been able to detect and calculate moving sperm. Based on the test results, Adaptive Background Learning method had a value of F-measure of 0.9205 and succeeded in extracting sperm shape close to the original form compared to other methods.
MACHINE LEARNING-BASED DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION ON INTRUSION DETECTION SYSTEM REGARDING TO FEATURE SELECTION Azhari, Ahmad; Muhammad, Arif Wirawan; Foozy, Cik Feresa Mohd
International Journal of Artificial Intelligence Research Vol 4, No 1 (2020): In Press
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29099/ijair.v4i1.156

Abstract

Distributed Service Denial (DDoS) is a type of network attack, which each year increases in volume and intensity.  DDoS attacks also form part of the major types of cyber security threats so far. Early detection plays a key role in avoiding the catastrophic effects on server infrastructure from DDoS attacks. Detection techniques in the traditional Intrusion Detection System (IDS) are far from perfect compared to a number of modern techniques and tools used by attackers, because the traditional IDS only uses signature-based detection or anomaly-based detection models and causes a lot of false positive flags, since the flow of computer network data packets has complex properties in terms of both size and source. Based on the  deficiency in the ordinary IDS, this study aims to detect DDoS attacks by using machine learning techniques to enhance IDS policy development.  According to the experiment the selection of features plays an important role in the precision of the detection results and in the performance of machine learning in classification problems. The combination of seven key selected dataset features used as an input neural network classifier in this study provides the highest accuracy value at 97.76%.
COMPARISON ANALYSIS OF K-NEAREST NEIGHBOR AND NAïVE BAYES IN DETERMINING TALENT OF ADOLESCENCE Jusman, Yessi; Rahmalina, Widdya; Zarman, Juni
International Journal of Artificial Intelligence Research Vol 4, No 1 (2020): In Press
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29099/ijair.v4i1.118

Abstract

Adolescence always searches for the identity to shape the personality character. This paper aims to use the artificial intelligent analysis to determine the talent of the adolescence. This study uses a sample of children aged 10-18 years with testing data consisting of 100 respondents. The algorithm used for analysis is the K-Nearest Neigbor and Naive Bayes algorithm. The analysis results are performance of accuracy results of both algorithms of classification. In knowing the accurate algorithm in determining children's interests and talents, it can be seen from the accuracy of the data with the confusion matrix using the RapidMiner software for training data, testing data, and combined training and testing data. This study concludes that the K-Nearest Neighbor algorithm is better than Naive Bayes in terms of classification accuracy.
RETRACTED : Decision support system in Predicting the Best teacher with Multi Atribute Decesion Making Weighted Product (MADMWP) Method Solikhun, Solikhun
International Journal of Artificial Intelligence Research Vol 1, No 1 (2017): June
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (124.218 KB) | DOI: 10.29099/ijair.v1i1.1

Abstract

Following a rigorous, carefully concerns and considered review of the article published in International Journal of Artificial Intelligence Research to article entitled “Decision support system in Predicting the Best teacher with Multi-Attribute Decision Making Weighted Product (MADMWP) Method” Vol 1, No 1, pp. 47-53, June 2017, DOI: https://doi.org/10.29099/ijair.v1i1.1This paper has been found to be in violation of the International Journal of Artificial Intelligence Research Publication principles and has been retracted.The article contained redundant material, the editor investigated and found that the paper published in JURASIK(Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol. 1, No. 1, pp. 56-63, 2016,  http://ejurnal.tunasbangsa.ac.id/index.php/jurasik/article/view/9The document and its content have been removed from International Journal of Artificial Intelligence Research, and reasonable effort should be made to remove all references to this article.
Factors Analysis And Profit Achievement For Trading Company By Using Rough Set Method Sembiring, Muhammad Ardiansyah; Azhar, Zulfi
International Journal of Artificial Intelligence Research Vol 1, No 1 (2017): June
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (488.668 KB) | DOI: 10.29099/ijair.v1i1.15

Abstract

This research has been done to analysis the financial raport fortrading company and it is  intimately  related  to  some  factors  which  determine  the profit of company. The result of this reseach is showed about  New Knowledge and perform of the rule. In  discussion, by followed data mining process and using Rough Set method. Rough Set is to analyzed the performance of the result. This  reseach will be assist to the manager of company with draw the intactandobjective. Rough set method is also to difined  the rule of discovery process and started the formation about Decision System, Equivalence Class, Discernibility Matrix,  Discernibility Matrix Modulo D, Reduction and General Rules. Rough set method is efective model about the performing analysis in the company. Keywords : Data Mining, General Rules, Profit,. Rough Set.
Web Application To Monitor Logistics Distribution of Disaster Relief Using the CodeIgniter Framework Jamil, Mohamad; Lessy, Mohammad Ridwan
International Journal of Artificial Intelligence Research Vol 1, No 2 (2017): December
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (110.587 KB) | DOI: 10.29099/ijair.v1i2.23

Abstract

Disaster management is the responsibility of the central government and local governments. The principles of disaster management, among others, are quick and precise, priorities, coordination and cohesion, efficient and effective manner. Help that is needed by most societies are logistical assistance, such as the assistance covers peoples everyday needs, such as food, instant noodles, fast food, blankets, mattresses etc. Logistical assistance is needed for disaster management, especially in times of disasters. The support of logistical assistance must be timely, to the right location, target, quality, quantity, and needs. The purpose of this study is to make a web application to monitorlogistics distribution of disaster relefusing CodeIgniter framework. Through this application, the mechanisms of aid delivery will be easily controlled from and heading to the disaster site
The Phenomenon of Research and Development Method in Research of Software Engineering Mufadhol, Mufadhol; Siswanto, Siswanto; Susatyono, Djarot Dian; Dewi, Maya Utami
International Journal of Artificial Intelligence Research Vol 1, No 1 (2017): June
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (355.555 KB) | DOI: 10.29099/ijair.v1i1.4

Abstract

Progress of science and technology is very influential to development of software engineering. Communication between software developers and prospective users of software engineering by prototype system is very important in the development of software engineering. Research and Development method in research of software engineering is very suitable be used because supports the existence of such communications. But it is found there are several research that use this method with not perfect or not completed, so research results produced less fit with purpose. This paper will be explain how to used the stages must be carried out in research of software engineering with the method of research and development, in order to make the research more be effectively and efficiently as well as software development efforts that simultaneously accompanied by the validation effort for the results to be achieved in accordance with the expected goals.
Application of Smart Bats Algorithm for Optimal Design of Power Stabilizer System at Sengkang Power Plant Djalal, Muhammad Ruswandi; Yunus, Muhammad Yunus; Nawir, Herman; Imran, Andi
International Journal of Artificial Intelligence Research Vol 1, No 2 (2017): December
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (478.323 KB) | DOI: 10.29099/ijair.v1i2.26

Abstract

The problem of using Power System Stabilizer (PSS) in generator excitation is how to determine the optimal PSS parameter. To overcome these problems, the authors use a method of intelligent bats based algorithm to design PSS. Bat Algorithm is an algorithm that works based on bat behavior in search of food source. Correlation with this research is, food sources sought by bats represent as PSS parameters to be optimized. Bats algorithm will work based on a specified destination function, namely Integral Time Absolute Error (ITAE). In this research will be seen the deviation of velocity and rotor angle of each generator, in case of disturbance in bakaru generator. The analysis results show that the uncontrolled system produces a large overshoot oscillation, and after the addition of PSS oscillation control equipment can be muted. So that the overshoot and settling time of each generator can be reduced and the generator can quickly go to steady state condition
Design of the expert system to analyze disease in Plant Teak using Forward Chaining Poningsih, Poningsih
International Journal of Artificial Intelligence Research Vol 1, No 1 (2017): June
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (250.647 KB) | DOI: 10.29099/ijair.v1i1.11

Abstract

Teak is one kind of plant that is already widely known and developed by the wider community in the form of plantations and community forests. This is because until now Teak wood is a commodity of luxury, high quality, the price is expensive, and high economic value. Expert systems are a part of the method sciences artificial intelligence to make an application program disease diagnosis teak computerized seek to replace and mimic the reasoning process of an expert or experts in solving the problem specification that can be said to be a duplicate from an expert because science knowledge is stored inside a database  Expert System for the diagnosis of disease teak using forward chaining method aims to explore the characteristics shown in the form of questions in order to diagnose the disease teak with web-based software. Device keel expert system can recognize the disease after consulting identity by answering some of the questions presented by the application of expert systems and can infer some kind of disease in plants teak. Data disease known customize rules (rules) are made to match the characteristics of teak disease and provide treatment solutions.
Mapping of MAC Address with Moving WiFi Scanner Hidayat, Arief; Terabe, Shintaro; Yaginuma, Hideki
International Journal of Artificial Intelligence Research Vol 1, No 2 (2017): December
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (489.193 KB) | DOI: 10.29099/ijair.v1i2.27

Abstract

Recently, Wifi is one of the most useful technologies that can be used for detecting and counting MAC Address. This paper described using of WiFi scanner which carried out seven times circulated the bus. The method used WiFi and GPS are to counting MAC address as raw data from the pedestrian smartphone, bus passenger or WiFi devices near from the bus as long as the bus going around the route. There are seven processes to make map WiFi data.

Page 1 of 4 | Total Record : 37