Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Survey on 3D biometric traits for human identification

10.11591/ijai.v14.i4.pp3143-3152
Divya Gangachannaiah , Mamatha Aruvanalli Shivaraj , Honganur Chandrasekharaiah Nagaraj , Prasanna Gururaj Paga
Individuals are verified and identified using Biometric technology based on their biological or behavioral traits. Biometric-based personal authentication systems are more reliable and user friendly, overruns the traditional personal authentication systems. The physiological biometric traits get abraded due to aging and massive work, while the behavioral biometric traits are having high variations due to external factors such as fatigue, and mood. Among the physiological biometric traits, Finger geometry patterns are widely deployed authentication system reason being its stability, user acceptability and uniqueness. Recent trends in Biometrics attempt to incorporate 3D domain traits, 3D reconstruction is done using 2D multiple images. 3D images are usually more robust and illumination invariant as compared to their 2D counterparts. 3D reconstruction algorithms are compared by finding mean square error (MSE).
Volume: 14
Issue: 4
Page: 3143-3152
Publish at: 2025-08-01

Insights from the vision-mission statements of Philippine and other ASEAN universities: a K-means clustering analysis

10.11591/ijai.v14.i4.pp3386-3394
Julius Ceazar G. Tolentino , John Paul P. Miranda
This study analyzed the vision and mission statements (VMS) of 117 Philippine state universities and colleges (SUCs) and compared them with 330 other ASEAN universities to identify thematic trends and institutional priorities. Using web scraping and K-means clustering, the study identified thematic clusters in VMS. Thematic trends through word frequency and collocation analyses provided further insights and a comparative analysis examined differences between Philippine SUCs and other ASEAN universities. Philippine SUCs’ vision statements formed three clusters: global competitiveness, premier recognition, and regional leadership in science and technology. Mission statements clustered into: mandated functions, global innovation, and advancement in the sciences. Philippine SUCs emphasized institutional prestige, workforce development, and sustainability while other ASEAN universities focus more on knowledge creation, student empowerment, and internationalization. Philippine SUCs aligned their VMS with national development and global ranking metrics and prioritizes institutional recognition and economic contributions more than the other ASEAN universities. Future studies should expand to more private institutions and international comparisons to assess broader higher education trends.
Volume: 14
Issue: 4
Page: 3386-3394
Publish at: 2025-08-01

Music genre classification using Inception-ResNet architecture

10.11591/ijai.v14.i4.pp3300-3310
Fauzan Valdera , Ajib Setyo Arifin
Music genres help categorize music but lack strict boundaries, emerging from interactions among public, marketing, history, and culture. With Spotify hosting over 80 million tracks, organizing digital music is challenging due to the sheer volume and diversity. Automating music genre classification aids in managing this vast array and attracting customers. Recently, convolutional neural networks (CNNs) have been used for their ability to extract hierarchical features from images, applicable to music through spectrograms. This study introduces the Inception-ResNet architecture for music genre classification, significantly improving performance with 94.10% accuracy, precision of 94.19%, recall of 94.10%, F1-score of 94.08%, and 149,418 parameters on the GTZAN dataset, showcasing its potential in efficiently managing and categorizing large music databases.
Volume: 14
Issue: 4
Page: 3300-3310
Publish at: 2025-08-01

Lightweight mutual authentication protocol for resource-constrained radio frequency identification tags with PRINCE cipher

10.11591/ijai.v14.i4.pp3435-3443
Mahendra Shridhar Naik , Desai Karanam Sreekantha , Kanduri V S S S S Sairam , Chaitra Soppinahally Nataraju
Radio frequency identification (RFID) is a key technology for the internet of things (IoT), with widespread applications in the commercial, healthcare, enterprise, and community sectors. However, privacy and security concerns remain with RFID systems. This manuscript presents a novel RFID-based mutual authentication protocol (MAP) using the PRINCE cipher to address these concerns. The proposed MAP leverages a PRINCE cipher architecture capable of both encryption and decryption based on a mode signal. It performs five encryption and two decryption processes during tag and reader mutual authentication, with updated seed values ensuring synchronization and secure data communication. The PRINCE cipher implementation utilizes less than 1% of slices, operates at 226 MHz with a latency of 3.5 clock cycles (CC), and has a throughput of 4.125 Gbps. The complete RFID-based MAP consumes 721 mW of power, occupies 2% of the chip area, and achieves a latency of 35.5 CC and a throughput of 262 Mbps. This represents a 25% reduction in latency, a 40% increase in throughput, and a 30% decrease in execution time compared to existing MAP approaches. The findings demonstrate the potential of the proposed MAP to enhance latency, throughput, and execution time, offering a promising solution for secure and efficient RFID authentication.
Volume: 14
Issue: 4
Page: 3435-3443
Publish at: 2025-08-01

Federated deep learning intrusion detection system on software defined-network based internet of things

10.11591/ijai.v14.i4.pp3109-3120
Heba Dhirar , Ali H. Hamad
The internet of things (IoT) and software-defined networks (SDN) play a significant role in enhancing efficiency and productivity. However, they encounter possible risks. Artificial intelligence (AI) has recently been employed in intrusion detection systems (IDSs), serving as an important instrument for improving security. Nevertheless, the necessity to store data on a centralized server poses a potential threat. Federated learning (FL) addresses this problem by training models locally. In this work, a network intrusion detection system (NIDS) is implemented on multi-controller SDN-based IoT networks. The interplanetary file system (IPFS) FL has been employed to share and train deep learning (DL) models. Several clients participated in the training process using custom generated dataset IoT-SDN by training the model locally and sharing the parameters in an encrypted format, improving the overall effectiveness, safety, and security of the network. The model has successfully identified several types of attacks, including distributed denial of service (DDoS), denial of service (DoS), botnet, brute force, exploitation, malware, probe, web-based, spoofing, recon, and achieving an accuracy of 99.89% and a loss of 0.005.
Volume: 14
Issue: 4
Page: 3109-3120
Publish at: 2025-08-01

Application of self-organizing map for modeling the Aquilaria malaccensis oil using chemical compound

10.11591/ijai.v14.i4.pp2889-2898
Mohammad Arif Fahmi Che Hassan , Zakiah Mohd Yusoff , Nurlaila Ismail , Mohd Nasir Taib
Agarwood oil, known as ‘black gold’ or the ‘wood of God,’ is a globally prized essential oil derived naturally from the Aquilaria tree. Despite its significance, the current non-standardized grading system varies worldwide, relying on subjective assessments. This paper addresses the need for a consistent classification model by presenting an overview of Aquilaria malaccensis oil quality using the self-organizing map (SOM) algorithm. Derived from the Thymelaeaceae family, Aquilaria malaccensis is a primary source of agarwood trees in the Malay Archipelago. Agarwood oil extraction involves traditional methods like solvent extraction and hydro-distillation, yielding a complex mixture of chromone derivatives, oxygenated sesquiterpenes, and sesquiterpene hydrocarbons. This study categorizes agarwood oil into high and low grades based on chemical compounds, utilizing the SOM algorithm with inputs of three specific compounds: β-agarofuran, α-agarofuran, and 10-epi-φ-eudesmol. Findings demonstrate the efficacy of SOM-based quality grading in distinguishing agarwood oil grades, offering a significant contribution to the field. The non-standardized grading system's inefficiency and subjectivity underscore the necessity for a standardized model, making this research crucial for the agarwood industry's advancement.
Volume: 14
Issue: 4
Page: 2889-2898
Publish at: 2025-08-01

Optimized pap-smear image enhancement: hybrid Perona-Malik diffusion filter-CLAHE using spider monkey optimization

10.11591/ijai.v14.i4.pp2765-2775
Ach Khozaimi , Isnani Darti , Wuryansari Muharini Kusumawinahyu , Syaiful Anam
Pap-smear image quality is crucial for cervical cancer detection. This study introduces an optimized hybrid approach that combines the Perona-Malik diffusion (PMD) filter with contrast-limited adaptive histogram equalization (CLAHE) to enhance pap-smear image quality. The PMD filter reduces the image noise, whereas CLAHE improves the image contrast. The hybrid method was optimized using spider monkey optimization (SMO PMD-CLAHE). Blind/reference-less image spatial quality evaluator (BRISQUE) and contrast enhancement-based image quality (CEIQ) are the new objective functions for the PMD filter and CLAHE optimization, respectively. The simulations were conducted using the SIPaKMeD dataset. The results indicate that SMO outperforms state-of-the-art methods in optimizing the PMD filter and CLAHE. The proposed method achieved an average effective measure of enhancement (EME) of 5.45, root mean square (RMS) contrast of 60.45, Michelson’s contrast (MC) of 0.995, and entropy of 6.80. This approach offers a new perspective for improving pap-smear image quality.
Volume: 14
Issue: 4
Page: 2765-2775
Publish at: 2025-08-01

An optimal pheromone-based route discovery stage for 5G communication process in wireless sensor networks

10.11591/ijai.v14.i4.pp2788-2796
Sinduja Mysore Siddaramu , Kanathur Ramaswamy Rekha
The rapid advancement of 5G communication underscores the need for heightened efficiency within wireless sensor networks (WSNs), where challenges such as data loss, inefficiency, and jitter are exacerbated by complex operations. This paper presents the optimal pheromone-based route discovery stage (OpRDS) algorithm, inspired by the natural foraging behaviors of ants, as a novel solution designed to optimize routing processes in the dynamic and demanding 5G environments. The study conducts a comparative analysis of OpRDS against traditional routing protocols, including the ad hoc on-demand distance vector (AODV), destination-sequenced distance-vector (DSDV), dynamic source routing (DSR), and zone routing protocol (ZRP), focusing on key performance metrics such as packet delivery ratio (PDR), latency, throughput, routing overhead (RO), energy consumption (EC), network lifespan, route discovery speed, and scalability. Our results reveal that OpRDS significantly outperforms the conventional protocols, evidencing a 2% increase in PDR, a 5.5% decrease in latency, a 6.7% rise in throughput, an 8.3% reduction in RO, an 11.1% decrease in EC (resulting in an 11% extension of network lifespan), a 10% improvement in route discovery speed, and a 6.7% enhancement in scalability. These findings highlight the algorithm's superior efficiency and adaptability in addressing the robust demands of 5G networks.
Volume: 14
Issue: 4
Page: 2788-2796
Publish at: 2025-08-01

Transforming images into words: optical character recognition solutions for image text extraction

10.11591/ijai.v14.i4.pp3412-3420
Jyoti Wadmare , Sunita Patil , Dakshita Kolte , Kapil Bhatia , Palak Desai , Ganesh Wadmare
Optical character recognition (OCR) tool is a boon and greatest advancement in today’s emerging technology which has proven its remarkability in recent years by making it easier for humans to convert the textual information in images or physical documents into text data making it useful for analysis, automation processes and improvised productivity for different purposes. This paper presents the designing, development and implementation of a novel OCR tool aiming at text extraction and recognition tasks. The tool incorporates advanced techniques such as computer vision and natural language processing (NLP) which offer powerful performance for various document types. The performance of the tool is subject to metrics like analysis, accuracy, speed, and document format compatibility. The developed OCR tool provides an accuracy of 98.8% upon execution providing a character error rate of 2.4% and word error rate (WER) of 2.8%. OCR tool finds its applications in document digitization, personal identification, archival of valuable documents, processing of invoices, and other documents. OCR tool holds an immense amount of value for researchers, practitioners and many organizations which seek effective techniques for relevant and accurate text extraction and recognition tasks.
Volume: 14
Issue: 4
Page: 3412-3420
Publish at: 2025-08-01

A deep learning-based framework for automatic detection of COVID-19 using chest X-ray and CT-scan images

10.11591/ijai.v14.i4.pp3192-3200
Sivanagireddy Kalli , Bukka Narendra Kumar , Saggurthi Jagadeesh , Kushagari Chandramouli Ravi Kumar
COVID-19 has profoundly impacted global public health, underscoring the need for rapid detection methods. Radiography and radiologic imaging, especially chest X-rays, enable swift diagnosis of infected individuals. This study delves into leveraging machine learning to identify COVID-19 from X-ray images. By gathering a dataset of 9,000 chest X-rays and CT scans from public resources, meticulously vetted by board-licensed radiologists to confirm COVID-19 presence, the research sets a robust foundation. However, further validation is essential expanding datasets to encompass enough COVID-19 cases enhances convolutional neural network (CNN) accuracy. Among various machine learning techniques, deep learning excels in identifying distinct patterns on imaging characteristics discernible in chest radiographs of COVID-19 patients. Yet, extensive validation across diverse datasets and clinical trials is crucial to ensure the robustness and generalizability of these models. The conversation extends into complexities, including ethical considerations around patient privacy and integrating intelligent tech into clinical workflows. Collaborating closely with healthcare professionals ensures this technology complements the established diagnostic approach. Despite the potential to detect COVID-19 using chest X-ray imaging findings, thorough research and validation, alongside ethical deliberations, are vital before implementing it in the healthcare field. The results show that the proposed model achieved classification accuracy and F1 score of 96% and 98%, respectively, for the X-ray images.
Volume: 14
Issue: 4
Page: 3192-3200
Publish at: 2025-08-01

Hybrid convolutional vision transformer for extrusion-based 3D food-printing defect classification

10.11591/ijai.v14.i4.pp3311-3323
Cholid Mawardi , Agus Buono , Karlisa Priandana , Herianto Herianto
Deep learning is generally used to perform remote monitoring of three-dimensional (3D) printing results, including extrusion-based 3D food printing. One of the widely used deep learning algorithms for defect detection in 3D printing is the convolutional neural network (CNN). However, the process requires high computational costs and a large dataset. This research proposes the Con4ViT model, a hybrid model that combines the strengths of vision transformer with the inherent feature extraction capabilities of CNN. The locally extracted features in the CNN were merged using the transformers’ global features with four transformer encoder blocks. The proposed model has a smaller number of parameters compared to other lightweight pre-trained deep learning models such as VGG16, VGG19, EfficientNetB2, InceptionV3, and ResNet50. Thus, the proposed model is simplified. Simulations were conducted to classify defect and non-defect images obtained from the printing results of a developed extrusion-based 3D food printing device. Simulation results showed that the model produced an accuracy of 95.43%, higher than the state-of-the-art techniques, i.e., VGG16, VGG19, MobileNetV2, EfficientNetB2, InceptionV3, and ResNet50, with accuracies of 77.88, 86.30, 82.95, 90.87, 84.62, and 93.83%, respectively. This research shows that the proposed Con4ViT model can be used for 3D food printing defect detection with high accuracy.
Volume: 14
Issue: 4
Page: 3311-3323
Publish at: 2025-08-01

Domain-specific knowledge and context in large language models: challenges, concerns, and solutions

10.11591/ijai.v14.i4.pp2568-2578
Kiran Mayee Adavala , Om Adavala
Large language models (LLMs) are ubiquitous today with major usage in the fields of industry, research, and academia. LLMs involve unsupervised learning with large natural language data, obtained mostly from the internet. There are several challenges that arise because of these data sources. One such challenge is with respect to domain-specific knowledge and context. This paper deals with the major challenges faced by LLMs due to data sources, such as, lack of domain expertise, understanding specialized terminology, contextual understanding, data bias, and the limitations of transfer learning. This paper also discusses some solutions for the mitigation of these challenges such as pre-training LLMs on domain-specific corpora, expert annotations, improving transformer models with enhanced attention mechanisms, memory-augmented models, context-aware loss functions, balanced datasets, and the use of knowledge distillation techniques.
Volume: 14
Issue: 4
Page: 2568-2578
Publish at: 2025-08-01

Modified zero-reference deep curve estimation for contrast quality enhancement in face recognition

10.11591/ijai.v14.i4.pp3274-3286
Muhammad Kahfi Aulia , Dyah Aruming Tyas
Face recognition systems remain challenged by variable lighting conditions. While zero-reference deep curve estimation (Zero-DCE) effectively enhances low-light images, it frequently induces overexposure in normal- and high-brightness scenarios. This study introduces modified Zero-DCE combined with three established enhancement techniques: contrast stretching (CS), contrast limited adaptive histogram equalization (CLAHE), and brightness preserving dynamic histogram equalization (BPDHE). Evaluations employed the extended Yale face database B and face recognition technology (FERET) datasets, with 10 representative samples assessed using the blind/referenceless image spatial quality evaluator (BRISQUE) metric. Modified Zero-DCE with BPDHE produced optimal enhancement quality, achieving a mean BRISQUE score of 16.018. On the extended Yale face database B, visual geometry group 16 (VGG16) integrated with modified Zero-DCE and CLAHE attained 83.65% recognition accuracy, representing a 6.08-percentage-point improvement over conventional Zero-DCE. For the 200-subject FERET subset, residual network 50 (ResNet50) with modified Zero-DCE and CLAHE achieved 67.41% accuracy. Notably, standard Zero-DCE with CLAHE demonstrated superior robustness in extremely low-light conditions, highlighting the illumination-dependent performance characteristics of these enhancement approaches.
Volume: 14
Issue: 4
Page: 3274-3286
Publish at: 2025-08-01

Imagery based plant disease detection using conventional neural networks and transfer learning

10.11591/ijai.v14.i4.pp2701-2712
Ali Mhaned , Salma Mouatassim , Mounia El Haji , Jamal Benhra
Ensuring the sustainability of global food production requires efficient plant disease detection, challenge conventional methods struggle to address promptly. This study explores advanced techniques, including convolutional neural networks (CNNs) and transfer learning models (ResNet and VGG), to improve plant disease identification accuracy. Using a plant disease dataset with 65 classes of healthy and diseased leaves, the research evaluates these models' effectiveness in automating disease recognition. Preprocessing techniques, such as size normalization and data augmentation, are employed to enhance model reliability, and the dataset is divided into training, testing, and validation sets. The CNN model achieved accuracies of 95.45 and 94.52% for 128×128 and 256×256 image sizes, respectively. ResNet50 proved the best performer, reaching 98.38 and 98.63% accuracy, while VGG16 achieved 97.99 and 98.34%. These results highlight ResNet50's superior ability to capture intricate features, making it a robust tool for precision agriculture. This research provides practical solutions for early and accurate disease identification, helping to improve crop management and food security.
Volume: 14
Issue: 4
Page: 2701-2712
Publish at: 2025-08-01

Revolutionizing internet of things intrusion detection using machine learning with unidirectional, bidirectional, and packet features

10.11591/ijai.v14.i4.pp3047-3062
Zulhipni Reno Saputra Elsi , Deris Stiawan , Bhakti Yudho Suprapto , M. Agus Syamsul Arifin , Mohd. Yazid Idris , Rahmat Budiarto
Detection of attacks on internet of things (IoT) networks is an important challenge that requires effective and efficient solutions. This study proposes the use of various machine learning (ML) techniques in classifying attacks using unidirectional, bidirectional, and packet features. The proposed methods that implement decision tree (DT), random forest (RF), extreme gradient boosting classifier (XGBC), AdaBoost (AB) and linear discriminant analysis (LDA) work perfectly with all kinds of datasets and includes. It also works very well with data type-based feature selection (DTBFS) and correlation-based feature selection (CBFS). The experiment results show a significant improvement compared to previous studies and reveals that unidirectional and bidirectional features provide higher accuracy compared to packet features. Furthermore, ML models, particularly DT, and RF, have faster computing times compared to more complex deep learning models. This analysis also shows potential overfitting in some models, which requires further validation with different datasets. Based on these findings, we recommend the use of RF and DT for scenarios with unidirectional and bidirectional features, while AB and LDA for packet features. The study concludes that using the right ML techniques along with features that work in both directions can make an intrusion detection system for IoT networks becomes very accurate.
Volume: 14
Issue: 4
Page: 3047-3062
Publish at: 2025-08-01
Show 60 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration