Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,428 Article Results

Impact of batch size on stability in novel re-identification model

10.11591/ijai.v14.i4.pp2724-2733
Mossaab Idrissi Alami , Abderrahmane Ez-zahout , Fouzia Omary
This research introduces ConvReID-Net, a custom convolutional neural network (CNN) developed for person re-identification (Re-ID) focusing on the batch size dynamics and their effect on training stability. The model architecture consists of three convolutional layers, each followed by batch normalization, dropout, and max-pooling layers for regularization and feature extraction. The final layers include flattened and dense layers, optimizing the extracted features for classification. Evaluated over 50 epochs using early stopping, the network was trained on augmented image data to enhance robustness. The study specifically examines the influence of batch size on model performance, with batch size 64 yielding the best balance between validation accuracy (96.68%) and loss (0.1962). Smaller (batch size 32)and larger (batch size 128) configurations resulted in less stable performance, underscoring the importance of selecting an optimal batch size. These findings demonstrate ConvReID-Net’s potential for real-world Re-ID applications, especially in video surveillance systems. Future work will focus on further hyperparameter tuning and model improvements to enhance training efficiency and stability.
Volume: 14
Issue: 4
Page: 2724-2733
Publish at: 2025-08-01

Application of self-organizing map for modeling the Aquilaria malaccensis oil using chemical compound

10.11591/ijai.v14.i4.pp2889-2898
Mohammad Arif Fahmi Che Hassan , Zakiah Mohd Yusoff , Nurlaila Ismail , Mohd Nasir Taib
Agarwood oil, known as ‘black gold’ or the ‘wood of God,’ is a globally prized essential oil derived naturally from the Aquilaria tree. Despite its significance, the current non-standardized grading system varies worldwide, relying on subjective assessments. This paper addresses the need for a consistent classification model by presenting an overview of Aquilaria malaccensis oil quality using the self-organizing map (SOM) algorithm. Derived from the Thymelaeaceae family, Aquilaria malaccensis is a primary source of agarwood trees in the Malay Archipelago. Agarwood oil extraction involves traditional methods like solvent extraction and hydro-distillation, yielding a complex mixture of chromone derivatives, oxygenated sesquiterpenes, and sesquiterpene hydrocarbons. This study categorizes agarwood oil into high and low grades based on chemical compounds, utilizing the SOM algorithm with inputs of three specific compounds: β-agarofuran, α-agarofuran, and 10-epi-φ-eudesmol. Findings demonstrate the efficacy of SOM-based quality grading in distinguishing agarwood oil grades, offering a significant contribution to the field. The non-standardized grading system's inefficiency and subjectivity underscore the necessity for a standardized model, making this research crucial for the agarwood industry's advancement.
Volume: 14
Issue: 4
Page: 2889-2898
Publish at: 2025-08-01

Optimized pap-smear image enhancement: hybrid Perona-Malik diffusion filter-CLAHE using spider monkey optimization

10.11591/ijai.v14.i4.pp2765-2775
Ach Khozaimi , Isnani Darti , Wuryansari Muharini Kusumawinahyu , Syaiful Anam
Pap-smear image quality is crucial for cervical cancer detection. This study introduces an optimized hybrid approach that combines the Perona-Malik diffusion (PMD) filter with contrast-limited adaptive histogram equalization (CLAHE) to enhance pap-smear image quality. The PMD filter reduces the image noise, whereas CLAHE improves the image contrast. The hybrid method was optimized using spider monkey optimization (SMO PMD-CLAHE). Blind/reference-less image spatial quality evaluator (BRISQUE) and contrast enhancement-based image quality (CEIQ) are the new objective functions for the PMD filter and CLAHE optimization, respectively. The simulations were conducted using the SIPaKMeD dataset. The results indicate that SMO outperforms state-of-the-art methods in optimizing the PMD filter and CLAHE. The proposed method achieved an average effective measure of enhancement (EME) of 5.45, root mean square (RMS) contrast of 60.45, Michelson’s contrast (MC) of 0.995, and entropy of 6.80. This approach offers a new perspective for improving pap-smear image quality.
Volume: 14
Issue: 4
Page: 2765-2775
Publish at: 2025-08-01

Interoperability in healthcare: a critical review of ontology approaches and tools for building prescription frameworks

10.11591/ijict.v14i2.pp366-381
Eunice Chinatu Okon , Tshiamo Sigwele , Malatsi Galani , Tshepiso Mokgetse , Hlomani Hlomani
Efficient healthcare interoperability is pivotal for delivering high-quality patient care. This research article presents a critical review of ontology based approaches and tools in the development of ontology-based electronic prescriptions (e-prescription), with a focus on enhancing healthcare interoperability. The investigation encompasses two major domains: ontology overview and healthcare interoperability using semantic e-prescription. In the ontology overview, we scrutinize various aspects of ontology development, including the methodologies, languages, tools, and evaluation metrics adopted from literature. Notable comparisons between ontologies and databases are explored. Additionally, we delve into the challenges associated with ontology development and provide a comprehensive summary of methodologies, languages, tools, and evaluation approaches. Healthcare interoperability using semantic e-prescription undertakes a detailed review of e-prescription systems, emphasizing their critical role in healthcare interoperability. A thorough examination of frameworks facilitating semantic e-prescription is presented, offering a nuanced perspective on their contributions and limitations. The section concludes with a concise summary of the key findings from the e-prescription framework review. The article further addresses challenges in healthcare interoperability, including data standardization and system integration issues. To direct continuing research efforts that integrate cutting-edge technologies and interdisciplinary collaborations, future directions and emerging trends are outlined.
Volume: 14
Issue: 2
Page: 366-381
Publish at: 2025-08-01

A novel fuzzy logic based sliding mode control scheme for non-linear systems

10.11591/ijai.v14.i4.pp2676-2688
Abdul Kareem , Varuna Kumara
Sliding mode control (SMC) has been widely used in the control of non-linear systems due to many inherent properties like superposition, multiple isolated equilibrium points, finite escape time, limit cycle, bifurcation. This research proposes super-twisting controller architecture with a varying sliding surface; the sliding surface being adjusted by a simple single input-single output (SISO) fuzzy logic inference system. The proposed super-twisting controller utilizes a varying sliding surface with an online slope update using a SISO fuzzy logic inference system. This rotates sliding surface in the direction of enhancing the dynamic performance of the system without compromising steady state performance and stability. The performance of the proposed controller is compared to that of the basic super-twisting sliding mode (STSM) controller with a fixed sliding surface through simulations for a benchmark non-linear system control system model with parametric uncertainties and disturbances. The simulation results have confirmed that the proposed approach has the improved dynamic performance in terms of faster response than the typical STSM controller with a fixed sliding surface. This improved dynamic performance is achieved without affecting robustness, system stability and level of accuracy in tracking. The proposed control approach is straightforward to implement since the sliding surface slope is regulated by a SISO fuzzy logic inference system. The MATLAB/Simulink is used to display the efficiency of proposed system over conventional system.
Volume: 14
Issue: 4
Page: 2676-2688
Publish at: 2025-08-01

Imagery based plant disease detection using conventional neural networks and transfer learning

10.11591/ijai.v14.i4.pp2701-2712
Ali Mhaned , Salma Mouatassim , Mounia El Haji , Jamal Benhra
Ensuring the sustainability of global food production requires efficient plant disease detection, challenge conventional methods struggle to address promptly. This study explores advanced techniques, including convolutional neural networks (CNNs) and transfer learning models (ResNet and VGG), to improve plant disease identification accuracy. Using a plant disease dataset with 65 classes of healthy and diseased leaves, the research evaluates these models' effectiveness in automating disease recognition. Preprocessing techniques, such as size normalization and data augmentation, are employed to enhance model reliability, and the dataset is divided into training, testing, and validation sets. The CNN model achieved accuracies of 95.45 and 94.52% for 128×128 and 256×256 image sizes, respectively. ResNet50 proved the best performer, reaching 98.38 and 98.63% accuracy, while VGG16 achieved 97.99 and 98.34%. These results highlight ResNet50's superior ability to capture intricate features, making it a robust tool for precision agriculture. This research provides practical solutions for early and accurate disease identification, helping to improve crop management and food security.
Volume: 14
Issue: 4
Page: 2701-2712
Publish at: 2025-08-01

Advancing semiconductor integration: 3D ICs and Perylene-N as superior liner material for minimizing TSV clamour coupling

10.11591/ijict.v14i2.pp605-613
Pradyumna Kumar Dhal , Murkur Rajesh , Shaik Hussain Vali , Sadhu Radha Krishna , Malagonda Siva Kumar , Vempalle Rafi
The semiconductor industry faces substantial challenges with planar integration (2D ICs), prompting a significant shift towards vertical IC integration, known as three-dimensional IC (3D ICs). This deliberate slant not only amplifies bandwidth and boosts system action but also effectively reduces power consumption through scaling. 3D ICs intricately coordinate IC chips by vertically stacking them and establishing electrical connections using through silicon vias (TSVs). TSV clamour coupling emerges as a critical factor influencing system performance, particularly between signalcarrying TSVs (ETSV) and victim TSVs. This study showcases significant advancements in electrical integrity by effectively minimizing clamour coupling from TSVs to the silicon substrate. This is achieved through the application of CMOS-compatible dielectric materials as liner structures. Various proposed structures have been meticulously analyzed across an assortment of parameters, encompassing electrical signals and high frequencies. Moreover, the study rigorously investigates clamour coupling across different types of TSVs, including ETSV, thermal TSV (TTSV), and heat sources. Perylene-N emerges as a standout performer among the tested liner materials, demonstrating superior clamour coupling performance across all proposed models, even at higher frequencies such as THz. In this study a novel dielectric material Perylene-N compared with the conventional SiO2 (silicon dioxide). Notably, Perylene-N exhibited a remarkable 33 dB improvement in noise coupling performance at terahertz (THz) frequencies. The results were thoroughly verified and validated in the research work.
Volume: 14
Issue: 2
Page: 605-613
Publish at: 2025-08-01

Revolutionizing internet of things intrusion detection using machine learning with unidirectional, bidirectional, and packet features

10.11591/ijai.v14.i4.pp3047-3062
Zulhipni Reno Saputra Elsi , Deris Stiawan , Bhakti Yudho Suprapto , M. Agus Syamsul Arifin , Mohd. Yazid Idris , Rahmat Budiarto
Detection of attacks on internet of things (IoT) networks is an important challenge that requires effective and efficient solutions. This study proposes the use of various machine learning (ML) techniques in classifying attacks using unidirectional, bidirectional, and packet features. The proposed methods that implement decision tree (DT), random forest (RF), extreme gradient boosting classifier (XGBC), AdaBoost (AB) and linear discriminant analysis (LDA) work perfectly with all kinds of datasets and includes. It also works very well with data type-based feature selection (DTBFS) and correlation-based feature selection (CBFS). The experiment results show a significant improvement compared to previous studies and reveals that unidirectional and bidirectional features provide higher accuracy compared to packet features. Furthermore, ML models, particularly DT, and RF, have faster computing times compared to more complex deep learning models. This analysis also shows potential overfitting in some models, which requires further validation with different datasets. Based on these findings, we recommend the use of RF and DT for scenarios with unidirectional and bidirectional features, while AB and LDA for packet features. The study concludes that using the right ML techniques along with features that work in both directions can make an intrusion detection system for IoT networks becomes very accurate.
Volume: 14
Issue: 4
Page: 3047-3062
Publish at: 2025-08-01

Unpacking the drivers of artificial intelligence regulation: driving forces and critical controls in artificial intelligence governance

10.11591/ijai.v14.i4.pp2655-2666
Ibrahim Atoum , Salahiddin Altahat
The burgeoning field of artificial intelligence (AI) necessitates a nuanced approach to governance that integrates technological advancement, ethical considerations, and regulatory oversight. As various AI governance frameworks emerge, a fragmented landscape hinders effective implementation. This article examines the driving forces behind AI regulation and the essential control mechanisms that underpin these frameworks. We analyze market-driven, state-driven, and rights-driven regulatory approaches, focusing on their underlying motivations. Furthermore, critical regulatory controls such as data governance, risk management, and human oversight are highlighted to demonstrate their roles in establishing effective governance structures. Additionally, the importance of international cooperation and stakeholder collaboration in addressing the challenges posed by rapid technological change is emphasized. By providing insights into the strengths, weaknesses, and potential synergies of different governance models, this study contributes to the development of equitable and effective AI regulatory frameworks that encourage innovation while safeguarding societal interests. Ultimately, the findings aim to inform policymakers, industry leaders, and civil society organizations in their efforts to foster a future where AI is utilized responsibly and equitably for the betterment of humanity.
Volume: 14
Issue: 4
Page: 2655-2666
Publish at: 2025-08-01

Deep learning algorithms for breast cancer detection from ultrasound scans

10.11591/ijict.v14i2.pp427-437
Lawysen Lawysen , Gede Putra Kusuma
Breast cancer is a highly dangerous disease and the leading cause of cancer related deaths among women. Early detection of breast cancer is considered quite challenging but can offer significant benefits, as various treatment interventions can be initiated earlier. The focus of this research is to develop a model to detect breast cancer based on ultrasound results using deep learning algorithms. In the initial stages, several preprocessing processes, including image transformation and image augmentation were performed. Two types of models were developed: utilizing mask files and without using mask files. Two types of models were developed using four deep learning algorithms: residual network (ResNet)-50, VGG16, vision transformer (ViT), and data-efficient image transformer (DeiT). Various algorithms, such as optimization algorithms, loss functions, and hyperparameter tuning algorithms, were employed during the model training process. Accuracy used as the performance metric to measure the model’s effectiveness. The model developed with ResNet-50 became the best model, achieving an accuracy of 94% for the model using mask files. In comparison, the model developed with ResNet-50 and DeiT became the best model for the model without mask files, with an accuracy of 80%. Therefore, it can be concluded that using mask files is crucial for producing the best-performing model.
Volume: 14
Issue: 2
Page: 427-437
Publish at: 2025-08-01

The growth and trends information technology endangered language revitalization research: Insight from a bibliometric study

10.11591/ijece.v15i4.pp3888-3903
Leonardi Paris Hasugian , Syifaul Fuada , Triana Mugia Rahayu , Apridio Edward Katili , Feby Artwodini Muqtadiroh , Nur Aini Rakhmawati
Since United Nations Educational, Scientific and Cultural Organization (UNESCO) declared endangered languages, researchers have revitalized endangered languages in many fields. This study discusses a bibliometric analysis conducted to investigate research on the topic of revitalization of endangered languages in information technology. The study's aim is to assess research topics by identifying authors, institutions, and countries that influence research collaboration. The Scopus dataset (from 2002-2024) was obtained from journal articles (n=62) and conference papers (n=76) and visualized using VOSviewer 1.6.20. The analysis outcomes reveal a fluctuating trend with an increasing pattern. The United States, Canada, and China were identified as the top three countries in terms of publications. Meanwhile, the University of Alberta, Université du Québec à Montréal, University of Auckland, and University of Hawaiʻi at Mānoa are the most prolific institutions on this topic, with two authors from the Université du Québec à Montréal, Sadat and Le, being the most productive. The dominant research is related to computational linguistics. Meanwhile, topics such as phonetic posteriograms, integrated frameworks, and artificial intelligence are some of the potential research areas that can be explored in the future. Its implications for exposing the extent to which the development of endangered language revitalization can be accommodated in the field of information technology.
Volume: 15
Issue: 4
Page: 3888-3903
Publish at: 2025-08-01

Challenges of recommender systems in finance and banking: a systematic review

10.11591/ijai.v14.i4.pp2559-2567
Lossan Bonde , Abdoul Karim Bichanga
Recommender systems are widely applied in various domains, including e-commerce, marketing, and education. Despite their popularity, recommender systems are not widely used in finance and banking. This paper aims to identify the challenges associated with using recommender systems in finance and banking and recommend directions for future research. Using a systematic literature review (SLR) method, 52 papers were selected and analyzed. A three-step process was used to make the selection. First, a keyword search was made to identify a seed list of sources. A snowball technique with specific inclusion and exclusion criteria was applied to expand the list. Finally, a quick study was made to produce the final list of sources to consider. Through the study of the 52 relevant papers, three main challenges: i) transparency, ethics, and data privacy; ii) handling complex content information and accounting for multiple user behaviors; and iii) explainability of AI models were identified. This study has established the barriers to adopting recommender systems in the finance and banking industry. Specific subjects of concern identified include cold-start problems, personalization, fraud detection, transparency, and data privacy. The study recommends further research leveraging advanced machine learning models and emerging technologies to fill the gap.
Volume: 14
Issue: 4
Page: 2559-2567
Publish at: 2025-08-01

Bolstering image encryption techniques with blockchain technology - a systematic review

10.11591/ijict.v14i2.pp594-604
Narmadha Annadurai , Agusthiyar Ramu
Multimedia data plays a momentous role in present world. With the advancements in various fields of research like internet of things (IoT), industrial IoT (IIoT), cloud computing, medical image processing, and many more technologies, the digital images have already encroached the multimedia eon. The major challenge lies in providing a tamper proof image with higher level of security and confidentiality while being transmitted through a public network. Image encryption techniques are considered to be the predominant method to anticipate security from any unauthorized user access. This has indeed provoked the researchers to create new diverse and hybrid algorithms for encrypting the images. At present blockchain has been the most prevalently discussed method for security and the next level of security can be foreseen using the blockchain encryption techniques. This paper identifies the literature which mainly focuses on assorted image encryption techniques with blockchain technology applied on digital images from heterogeneous sources. An overview has been proposed to discuss on these techniques.
Volume: 14
Issue: 2
Page: 594-604
Publish at: 2025-08-01

Deep transfer learning for classification of ECG signals and lip images in multimodal biometric authentication systems

10.11591/ijai.v14.i4.pp3160-3171
Latha Krishnamoorthy , Ammasandra Sadashivaiah Raju
Authentication plays an essential role in diverse kinds of application that requires security. Several authentication methods have been developed, but biometric authentication has gained huge attention from the research community and industries due to its reliability and robustness. This study investigates multimodal authentication techniques utilizing electrocardiogram (ECG) signals and face lip images. Leveraging transfer learning from pre-trained ResNet and VGG16 models, ECG signals and photos of the lip area of the face are used to extract characteristics. Subsequently, a convolutional neural network (CNN) classifier is employed for classification based on the extracted features. The dataset used in this study comprises ECG signals and face lip images, representing distinct biometric modalities. Through the integration of transfer learning and CNN classification, improving the reliability and precision of multimodal authentication systems is the primary objective of the study. Verification results show that the suggested method is successful in producing trustworthy authentication using multimodal biometric traits. The experimental analysis shows that the proposed deep transfer learning-based model has reported the average accuracy, F1-score, precision, and recall as 0.962, 0.970, 0.965, and 0.966, respectively.
Volume: 14
Issue: 4
Page: 3160-3171
Publish at: 2025-08-01

An improved approximate parallel prefix adder for high performance computing applications: a comparative analysis

10.11591/ijict.v14i2.pp382-392
Vamsidhar Anagani , Kasi Geethanjali , Anusha Gorantla , Annamreddy Devi
Binary adders are fundamental in digital circuit designs, including digital signal processors and microprocessor data path units. Consequently, significant research has focused on improving adders’ power-delay efficiency. The carry tree adder (CTA) is alternatively referred to as the parallel prefix adder (PPA), is among the fastest adders, achieving superior performance in very large scale integrated (VLSI) implementations through efficient concurrent carry generation and propagation. This study introduces approximate PPAs (AxPPAs) by applying approximations in prefix operators (POs). Four types of AxPPAs approximate kogge-stone, approximate brent-kung, approximate ladner fischer, and approximate sparse kogge-stone-were designed and implemented on FPGA with bit widths up to 64-bit. Delay measurements from static timing analysis using Xilinx ISE design suite version 14.7 indicate that AxPPAs exhibit better latency performance than traditional PPAs. The AxPPA sparse kogge-stone, in particular, demonstrated superior area and speed performance, achieving a delay of 2.501ns for a 16-bit addition.
Volume: 14
Issue: 2
Page: 382-392
Publish at: 2025-08-01
Show 49 of 1896

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration