Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Exploring artificial intelligence adoption challenges: bridging the technology gap for marketing advancements

10.11591/ijai.v15.i1.pp56-65
Susi Susanti Tindaon , Jonas Meylan Freddy Banurea
Artificial intelligence (AI) holds immense potential to enhance marketing strategies for micro, small, and medium enterprises (MSMEs). However, significant barriers, including financial constraints, limited digital literacy, and inadequate government support, hinder its widespread adoption. This study compares AI adoption challenges across two Indonesian MSME ecosystems; tourism-oriented Bali and agrarian Garut using the diffusion of innovation (DOI) lens and complementary model⎯technology organization environment (TOE), technology acceptance model (TAM), unified theory of acceptance and use of technology (UTAUT). The findings reveal that MSMEs in Bali exhibit characteristics of "early adopters" and "early majority," driven by the demands of the tourism sector. In contrast, MSMEs in Garut align more with "late majority" and "laggard" profiles, constrained by infrastructural and resource limitations. By mapping these regional disparities onto the DOI curve, this study provides actionable insights for policymakers. It advocates for the development of ecosystem-aware, tailored strategies to bridge the digital divide and foster inclusive digital transformation, enabling MSMEs across diverse regions to leverage AI for a sustainable competitive advantage.
Volume: 15
Issue: 1
Page: 56-65
Publish at: 2026-02-01

Unmanned aerial vehicle systems: key management and intrusion response techniques

10.11591/ijai.v15.i1.pp972-986
Reshma C. Sonawane , A. Muthukrishnan
Protecting information is crucial for unmanned aerial vehicle (UAV) network communications, particularly during delicate tasks such as surveillance and reconnaissance. While encryption safeguards data privacy, managing and distributing keys in UAV settings poses significant challenges due to the vehicles' mobility and limited processing power. This research proposes an efficient key management scheme utilizing elliptic curve cryptography (ECC) and bilinear pairings, complemented by a lightweight intrusion detection system (IDS). The method employs behavior-based anomaly detection, using cluster-based watchdogs and trust assessment to identify and isolate harmful nodes. Additionally, applying compression techniques before encryption helps to reduce transmission load. Simulation in NS2 demonstrates performance improvements of 6-10% in throughput, 4-6% in packet delivery ratio (PDR), and a 13-17% reduction in delay compared to elliptic curve cryptography Diffie–Hellman (ECCDH) and pairwise encryption methods.
Volume: 15
Issue: 1
Page: 972-986
Publish at: 2026-02-01

Pneumonia classification from chest X-rays using significant feature selection and machine learning

10.11591/ijai.v15.i1.pp592-603
Yugandhar Chodagam , Manjunatha Hiremath
The chest X-ray images of normal lungs differ only subtly from those of lungs with pneumonia, making image-based diagnosis highly challenging. To address this issue, we developed a machine learning (ML)-based, lightweight, end-to-end Python package that processes chest X-ray images, implements robust feature selection methods, and classifies the images using various algorithms. While many studies have focused on improving classification accuracy using newer methods, few have addressed the interpretability of the extracted features or the growing computational demands of complex models. We used four publicly available datasets and extracted first-order, textural, and transform-based radiomic features to test our package. Features were selected using the Shapley additive explanations (SHAP) combined with recursive feature elimination (RFE) and stability selection algorithms. Our final solution contains a method that extracts a finite set of features identified by stability selection and feeds them as inputs into classical ML algorithms. Our model achieved 98% accuracy on the primary dataset, and 97%±1, 96%±2, and 94%±2% accuracy on the other three datasets. Our approach is fast, self-contained, and requires only an ideal set of features, making it suitable for resource-constrained clinical environments.
Volume: 15
Issue: 1
Page: 592-603
Publish at: 2026-02-01

Artificial intelligence framework for multi-stage lung disease detection with audio signals

10.11591/ijai.v15.i1.pp106-115
Bandreddi Venkata Seshukumari , Jyothirmayi Tayi , Rajeshkhanna Bhuthkuri , Bhavani Madireddy , Jhansi Yellapu , Bodapati Venkata Rajanna , Nitalaksheswara Rao Kolukula , Siva Sairam Prasad Kodali , Jayasree Pinajala , James Stephen Meka , Chilakala Rami Reddy
Automated diagnostic systems are increasingly pivotal in advancing the accuracy and efficiency of medical diagnostics. Due to abnormal changes in human life and pollution, lung disease and cancer cases increasing in huge number. Identification and prediction of lung diseases may help to increase the human life span. This study introduces a robust framework for automatic lung disease detection using respiratory sound signals. The methodology brings together a series of activities like preprocessing, feature extraction, selection, and classification to improve diagnostic accuracy. The adaptive empirical stockwell-transform (AEST) is used to enhance the quality of the signal, whereby extracting and refining features, mainly Mel-frequency cepstral coefficients (MFCC), and Mel-spectrograms, are used. The scalable convolutional geyser network (SCGN) helps to mitigate challenges posed by imbalanced datasets, redundant features, and overfitting, ensuring reliable classification of the features. The model is validated when using the International Conference on Biomedical and Health Informatics (ICBHI) dataset, which validates the performance indicators of the model (F1-score 0.94, accuracy 0.95, precision 0.93, recall 0.94). This is shown superior performance compared to other existing models and demonstrates the framework's ability to diagnose a serviceable and reliable medical diagnosis; which indicates the strengths of combining advances in signal processing and scalable deep learning (DL) in healthcare applications.
Volume: 15
Issue: 1
Page: 106-115
Publish at: 2026-02-01

Comparison of image enhancement methods for pratima theft detection using artificial intelligence

10.11591/ijai.v15.i1.pp213-228
Made Sudarma , Ni Wayan Sri Ariyani , I Putu Agus Eka Darma Udayana , Ida Bagus Gde Pranatayana , Lie Jasa
The theft of pratima in Balinese temples threatens the spiritual and cultural balance of the community. These sacred objects, regarded as manifestations of God in Hinduism, hold profound religious significance, and their loss represents both material and spiritual desecration. To address this issue, this study investigates a security system that leverages image enhancement for low-light detection. Four techniques—contrast limited adaptive histogram equalization (CLAHE), adaptive histogram equalization (AHE), histogram equalization (HE), and gamma correction—were evaluated to improve image quality. CLAHE yielded the lowest mean squared error (MSE) of 21.16 and the highest peak signal-to-noise ratio (PSNR) of 38.13 dB. For object detection, VGG-19 and AlexNet were assessed. The best configuration, VGG-19 with HE, reached 83.33% accuracy and 93.75% recall, and achieved a receiver operating characteristic area under the curve (ROC AUC) of 0.90±0.02 across five runs. Thresholds derived from the ROC analysis were selected using the Youden J statistic to balance sensitivity and specificity. The approach outperformed lightweight and classical baselines in AUC, indicating superior discrimination under low illumination. These findings show that superior image quality does not always align with higher detection accuracy, and they highlight the importance of pairing effective enhancement with robust detectors for temple security. The study contributes practical insights for preserving Balinese cultural and spiritual heritage by strengthening efforts to protect pratima against theft.
Volume: 15
Issue: 1
Page: 213-228
Publish at: 2026-02-01

Efficient data streaming in dynamic vehicular networks: a hybrid controller for seamless connectivity

10.11591/ijai.v15.i1.pp229-236
Prathibha Thimmappa , Mayuri Kundu
The demand for highly efficient data transmission is being increasingly demanded for dynamic vehicular networks, especially in the case of internet-of-vehicle (IoV). The current data transmission methods are known to encounter inefficiencies in terms of unreliable routing and restricted scalability. Evolving studies have found artificial intelligence (AI) based schemes more suitable to address these issues; however, there are no significant innovations towards developing a potential framework that can not only increase data transmission performance but also minimize the analytical overheads of AI. Hence, this paper presents a novel baseline framework by introducing an optimized controller structure at anchor points with the inclusion of novel ideologies of orientation degree and selection of mediating node. The proposed model witnesses 32.3 dB of signal quality, 857 kbps throughput, 81 ms delay, and 171 ms of response time, exhibiting much better performance in contrast to the frequently used data transmission method. The proposed model contributes to a solid foundation for any futuristic AI model for efficient and reliable data transmission in IoV.
Volume: 15
Issue: 1
Page: 229-236
Publish at: 2026-02-01

Autoencoder and GAN-aided plant disease detection in rice and cotton via hybrid feature extraction and decision tree classification

10.11591/ijai.v15.i1.pp707-724
Anandraddi Naduvinamani , Jayashri Rudagi , Mallikarjun Anandhalli
In agriculture, crop diseases caused by pathogens, including bacteria, viruses, and fungi, pose a significant threat to the effectiveness of agricultural productivity. Some major crops in India such as rice and cotton are adversely impacted, leading to economic loss and loss of production. Timely intervention and sustainable agriculture depend on proper and early identification of diseases. In this paper, we propose a novel plant disease detection framework that integrates generative adversarial network (GAN) based image denoising with feature extraction and decision tree (DT) classification. The GAN module effectively removes noise from agricultural images, enhancing quality and stability under challenging imaging conditions. Following denoising, a combination of color, texture, and gradient features is extracted to obtain rich and discriminative patterns, which are then used to train a DT classifier for disease identification. Experiments are conducted on benchmark datasets comprising rice and cotton leaf images. The proposed system achieves superior performance, with 98.70% accuracy, 98.20% precision, 97.22% recall, and 98.50% F1 score, outperforming existing methods. These results demonstrate that the GAN-based denoising approach, combined with traditional feature-based classification, offers a robust, efficient, and practical solution for modern agricultural disease monitoring systems.
Volume: 15
Issue: 1
Page: 707-724
Publish at: 2026-02-01

Predicting university student dropouts in Latin America using machine learning

10.11591/ijai.v15.i1.pp628-641
Laberiano Andrade-Arenas , Inoc Rubio Paucar , Margarita Giraldo Retuerto , Cesar Yactayo-Arias
In the university context, student dropout has become one of the most recurring problems, both in the short and long term. The objective of this research was to develop a predictive model using the random forest (RF) algorithm to identify patterns associated with university dropout. To achieve this, the knowledge discovery in databases (KDD) methodology was applied, which encompasses the stages of selection, preprocessing, transformation, data mining, and interpretation of results. The RF model demonstrated superior performance compared to other evaluated models, achieving an accuracy of 87%, a precision of 86%, a recall of 85%, an F1-score of 85%, and an receiver operating characteristic (ROC) area under the curve (AUC) of 0.91, highlighting its high predictive capability compared to other techniques analyzed. Therefore, the application of the proposed model is recommended in various university institutions in order to identify potential dropout cases at an early stage.
Volume: 15
Issue: 1
Page: 628-641
Publish at: 2026-02-01

Artificial intelligence in writing: unveiling a research landscape

10.11591/ijai.v15.i1.pp66-75
Wan Rusydiah Salehudin , Zilal Saari , Hafiza Abas
This study examines the expanding research landscape of artificial intelligence (AI) in writing, a field that continues to reshape the way ideas are produced, refined, and communicated. While AI has been widely examined in education and technology, limited research has mapped its thematic evolution and ethical dimensions in writing. To address this gap, 1,596 publications indexed in Scopus between 2021 and 2024 were analyzed using bibliometric mapping tools such as Scopus analyzer and VOSviewer. The analysis covers publication patterns, collaboration networks, and keyword relationships to trace the intellectual structure of the field. The results indicate a sharp increase in scholarly output over the past four years, supported by contributions from multiple disciplines, including computer science, social sciences, and education. Several thematic clusters were identified, centering on AI-assisted creative writing, authorship ethics, educational use, and cross-sector innovation. Despite these advances, ethical frameworks and responsible AI applications in writing remain underexplored. This paper offers a comprehensive overview of current trends and presents a foundation for future research on how AI can be integrated into writing practices responsibly and in ways that uphold human creativity and academic integrity.
Volume: 15
Issue: 1
Page: 66-75
Publish at: 2026-02-01

Secure and interoperable electronic health record exchange using blockchain and ECDHE-based access control

10.11591/ijai.v15.i1.pp310-321
Krishna Prasad Narasimha Rao , Chinnaiyan Selvan
Electronic health records (EHRs) act as comprehensive records of health related transactions and essential resources of data in the healthcare sector. However, the integrity and security problems of EHR continue to be inflexible. The architecture of blockchain-enabled EHR addresses the issues of integrity efficiently. This paper developed the decentralized patient centric healthcare data management (PCHDM) system using blockchain enabled EHR architecture for addressing problems with access control, record privacy and data confidentiality. This framework places the patient at the control center, ensuring secure storage of EHR records and obtaining efficient data management through the integration of blockchain and interplanetary file system (IPFS). To prevent access by unauthorized users, the proposed elliptic curve Diffie-Hellman ephemeral (ECDHE) mechanism incorporates smart contract-enabled access control for managing EHR transactions and enforcing access strategies. This architecture incorporates hyperledger fabric endorsement policies (HFRP) to address scalability problems while preserving patient privacy and securing medical data. The developed method secures the EHR data and facilitates the data exchange across heterogeneous healthcare platforms, ensuring standard communication among different EHR systems. The architecture is assessed with parameters of time for block creation, the computational overhead of transaction with encryption key size and EHR upload and download time.
Volume: 15
Issue: 1
Page: 310-321
Publish at: 2026-02-01

Real-time object detection to classify export quality of mangosteen using variants of you only look once version 8

10.11591/ijai.v15.i1.pp116-128
Dian Sa'adillah Maylawati , Mi’raj Fuadi , Kurniawan Yniarto , Yuhendra AP , Rizky Rahmat Nugraha , Akbar Hidayatullah Harahap , Agung Wahana
Mangosteen is one of the leading export commodities from Indonesia. Despite its great economic potential, only about 25% of Indonesian mangosteens meet export standards, mainly due to visual defects such as yellow sap and spots on the skin of the fruit. The process of sorting export worthy mangosteens has been done manually, which tends to be time consuming and inconsistent. Therefore, this study aims to utilize artificial intelligence technology in building a real-time image recognition model to improve the efficiency and accuracy of the export-quality mangosteen sorting process. This study uses you only look once version 8 (YOLOv8) as an image recognition model with YOLOv8 variants, including nano, small, medium, large, and extra large variants. The results of the study using 4,014 primary and 255 secondary data of mangosteen, the highest performance is reached by YOLOv8 medium 82% of accuracy, 0.856 of mean average precision (mAP)50, and 0.616 of mAP50-95. This result is obtained from 70% training, 20% validation, and 10% testing data with epoch stop 85. These results indicate that the model can provide good performance in mangosteen export quality classification. This research contributes to the fields of agricultural technology and artificial intelligence by offering an innovative solution to a practical problem, enhancing efficiency, accuracy, and scalability in export-quality mangosteen sorting.
Volume: 15
Issue: 1
Page: 116-128
Publish at: 2026-02-01

Gradient descent optimization based weighted federated learning for privacy-preserving framework

10.11591/ijai.v15.i1.pp878-887
Gururaj Prakash Murthy , Chandrashekhar Pomu Chavan
Federated learning (FL) is a disseminated machine learning (ML) paradigm that gained significant consideration in modern days, particularly in a domain of the internet of things (IoT). FL saves communication bandwidth when compared to centralized ML processes by eliminating the need to transmit raw client data to a central server, thereby enhancing data privacy. Nevertheless, participant privacy is still compromised through inference attacks and similar threats. Additionally, a data excellence provided through clients can differs significantly, and excessive inclusion of low-quality data during training may degrade the overall performance of the global model. Hence, this research introduces a gradient descent optimization assisted weighted federated learning (GDO-WFL) method for privacy preservation. The proposed GDO-WFL approach is significantly efficient as it strengthens privacy preservation through reducing exposure to inference attacks and optimises gradient updates for secure learning. Through weighting client contributions based on data quality, an undesirable effect of low-quality data can be minimised, helping to maintain a strength as well as accuracy of the global model. The experimental results illustrate a proposed GDO-WFL approach maintains an overall accuracy of 99.3 and 91.5% on MNIST and CIFAR-10 datasets as compared to the existing method of FedlabX method.
Volume: 15
Issue: 1
Page: 878-887
Publish at: 2026-02-01

A comprehensive survey of cyberbullying on social media: challenges, detection, and AI-based prevention

10.11591/ijai.v15.i1.pp86-96
Ammar Odeh , Osama Alhaj Hassan , Anas Abu Taleb , Abobakr Aboshgifa , Nabil Belhaj
Cyberbullying is a pervasive issue in the digital landscape, particularly on social media platforms, where individuals engage in online harassment, intimidation, and abuse. Unlike traditional bullying, cyberbullying has a broader reach, anonymity, and persistence, making it a growing concern for mental health, social well-being, and online safety. This paper provides a comprehensive survey of cyberbullying trends, its psychological and social impacts, and the role of social media in amplifying the problem. It explores existing detection and prevention strategies, including artificial intelligence (AI)-driven approaches, policy frameworks, and platform-based moderation techniques. Furthermore, it discusses challenges in enforcement, the limitations of automated detection systems, and the need for improved legal measures. This paper uniquely contributes an integrated perspective on cyberbullying detection and prevention by synthesizing current research across psychological, sociocultural, and technical dimensions. It emphasizes underexplored gaps such as multilingual detection, real-time moderation, and cross-platform enforcement, and proposes a layered framework to guide future research and policy.
Volume: 15
Issue: 1
Page: 86-96
Publish at: 2026-02-01

Evaluating the detected communities using traditional algorithms on keyword co-occurrence networks

10.11591/ijai.v15.i1.pp919-928
Kiruthika R. , Krishnaveni Sakkarapani
Community detection is one of the most significant research areas in network analysis, which helps to understand the internal structure of large networks. This work utilizes the traditional community detection methods on a keyword co-occurrence graph derived from the Scopus bibliographic database. This research article primarily focused on the index keywords of deep learning driven publications obtained from three major network Scopus bibliometric datasets (SBD), namely SBD_1 as 2006-2013, SBD_2 as 2014-2016, and SBD_3 as 2017. For this proposed model framework, the existing traditional algorithms, including Louvain, greedy modularity optimization (GMO), Leiden, Infomap, speaker-listener label propagation algorithm (SLPA), Walktrap, SpinGlass, K-Clique, and Clauset, Newman and Moore (CNM) methods are applied to detect communities from the network and carried out through Python. Comparisons among these algorithms, Leiden, SpinGlass, and Louvain are considered as better algorithms for our work based on the detected communities, modularity score and other metrics to evaluate the performance of detected communities from the network. This research proposes an ideology for the selection process of algorithms that depends on different factors like network characteristics, network structure, dataset size, and computational efficiency. This analysis suggests a unique perspective on the effectiveness of each method in the Scopus bibliometric network and its potential to enhance research topic exploration.
Volume: 15
Issue: 1
Page: 919-928
Publish at: 2026-02-01

TAHRF: enhancing personalized tourism recommendations with dynamic adaptation

10.11591/ijai.v15.i1.pp374-382
Mohamed Badouch , Mehdi Boutaounte
The rapid growth of online tourism data intensifies information overload, while conventional recommender systems struggle with sparsity, cold-start issues, and single-criteria ratings. This paper presents the trust-aware hybrid recommendation framework (TAHRF), which integrates user-item trust propagation, multi-criteria ratings, and dynamic preference adaptation. TAHRF employs Euclidean-Jaccard trust metrics, item connectivity, and rating consistency, combined with a feedback-driven weighting mechanism. Experiments on TripAdvisor datasets show superior performance: mean absolute error (MAE) reduced to 0.98 (restaurants) and 0.71 (hotels), outperforming multi-criteria tensor-based collaborative filtering (MC-TeCF) baselines. TAHRF also achieves higher precision@5, with coverage maintained under extreme sparsity. Ablation studies confirm the critical role of trust propagation, multi-criteria analysis, and adaptive weighting. TAHRF advances personalized, transparent, and adaptive tourism recommendations.
Volume: 15
Issue: 1
Page: 374-382
Publish at: 2026-02-01
Show 43 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration