{"title":"Design Of Push-Up Detector Applications Using Quality Function Development And Anthropometry For Movement Error Detection","authors":"A. Muzakir, Christofora Desi Kusmindari","doi":"10.29099/ijair.v3i1.69","DOIUrl":"https://doi.org/10.29099/ijair.v3i1.69","url":null,"abstract":"Push-up is the simplest and most widely performed sport. Although simple, it also has a high risk of injury risk if done not in accordance with the rules. Push-up detector is a good push-up motion monitoring solution. In this way, nonstandard movements can be detected and corrected immediately. It has two motion sensors integrated with Arduino-based microcontroller. From this detector tool got the data of push-up result from sensor mounted. Sensor data will be displayed in the application in real-time. Quality function development is used to determine the criteria of the user. The sample data involved 200 participants who followed the testing of this tool and got 90% who can do the push-up correctly. Factors that affect the height, age, and weight. Tests conducted on adolescent boys aged 18-23 years. The results of this study is an application capable of monitoring each push-up movement to position in accordance with the provisions to minimize injuries resulting from movement errors.","PeriodicalId":334856,"journal":{"name":"International Journal of Artificial Intelligence Research","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115913471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Based Prediction versus Human-as-a-Security-Sensor","authors":"S. Haque","doi":"10.29099/IJAIR.V3I1.83","DOIUrl":"https://doi.org/10.29099/IJAIR.V3I1.83","url":null,"abstract":"Phishing is one of the most common cyber threats in the world today. It is a type of social engineering attack where the attacker lures unsuspecting victims into carrying out certain tasks mostly to steal personal and sensitive information. These stolen information are exploited to commit further crimes e.g. blackmails, data theft, financial theft, malware installation etc. This study was carried out to tackle this problem by designing an anti-phishing learning algorithm to detect phishing emails and also to study the accuracies of human phishing prediction to machine prediction. A graphical user interface was designed to emulate an email-client system that popped-up a warning on detecting a phishing mail successfully and collection of predictions made by expert and non-expert users on anti-phishing techniques. These predictions were compared to the predictions made by the machine learning algorithm to compare the efficiencies of all predictions considered in this research. The performance of the classifier used was measured with metrics such as confusion matrix, accuracy, receiver operating characteristic curve and area under graph","PeriodicalId":334856,"journal":{"name":"International Journal of Artificial Intelligence Research","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133580755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yulmaini Yulmaini, Anuar Sanusi, M. A. E. Yusendra
{"title":"The Implementation of AHP for Determining Dominant Criteria in Higher Education Competitiveness Development Strategy Based on Information Technology","authors":"Yulmaini Yulmaini, Anuar Sanusi, M. A. E. Yusendra","doi":"10.29099/IJAIR.V3I1.85","DOIUrl":"https://doi.org/10.29099/IJAIR.V3I1.85","url":null,"abstract":"The existence of Higher Education has a huge role in nation and state’s life through tri dharma of Higher Education named education, research and community service. Higher Education can produce economic innovations based on knowledge so that, it will increase productivity and nation competitiveness. Higher Education must have strategies that will be carried out, therefore they are able to compete with other higher education according to stakeholder needs. The purposes of this research are to analyze 2 (two) models of information technology relations in the higher education competitiveness development strategy determining the most dominant criteria according to the higher education development direction (Relevance, Academic Atmosphere, Internal Management, Sustainability, Efficiency and Productivity, Access and Equit and Leadership). The method of this reserach is AHP method in wich the data are collected through questionnaires to respondents in collage. The criteria of this research are internal management & organization, academic atmosphere and university competitive sustainability. The results of this research are the information technology relations model with internal management, and the relation model between internal management and efficiency & productivities, and also the most dominant criteria in the higher education competitiveness development strategy are the criteria of Academic Atmosphere, Efficiency and Productivity.","PeriodicalId":334856,"journal":{"name":"International Journal of Artificial Intelligence Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130745562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distance and Fuzzy Classifiers Alliance: The Solution to Off-line Arabic Signature Verification System for Forensic Science","authors":"S. Darwish, Zainab H. Noori","doi":"10.29099/IJAIR.V2I2.66","DOIUrl":"https://doi.org/10.29099/IJAIR.V2I2.66","url":null,"abstract":"Signature of a person is one of the most popular and legally accepted behavioral biometrics that provides secure means for verification and personal identification in many applications such as financial, commercial and legal transactions. The objective of the signature verification system is to classify between genuine and forgery that is often associated with intrapersonal and interpersonal variability. Unlike other languages, Arabic has unique features; it contains diacritics, ligatures, and overlapping. Because of lacking any form of dynamic information during the Arabic signature writing process, it will be more difficult to obtain higher verification accuracy. This paper addresses the above difficulty by introducing a novel Off-Line Arabic signature verification algorithm. Different from state-of-the-art works that adopt one-level of verification or multiple classifiers based on statistical learning theory; this work employs two-level of fuzzy set related verification. The level one verification depends on finding the total difference between the features extracted from the test signature and the mean values of each corresponding features in the training signatures (owning the same signature). Whereas, the level two verification relies on the output of the fuzzy logic module depending on the membership functions that has been created from the signature features in the training dataset for a specific signer. It is concluded from the experimental results that the verification system performs well and has the ability to reduce both False Acceptance Rate (FAR) and False Rejection Rate (FRR).","PeriodicalId":334856,"journal":{"name":"International Journal of Artificial Intelligence Research","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131617181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solution Search Simulation The Shortest Step On Chess Horse Using Breadth-First Search Algorithm","authors":"A. Bastian, Rezha Nugraha","doi":"10.29099/ijair.v2i2.58","DOIUrl":"https://doi.org/10.29099/ijair.v2i2.58","url":null,"abstract":"Horse seed in the chess board movement resembles the letter L. The chess pieces are one of a very hard-driven beans and seeds are often also the most dangerous if not carefully considered every movement. Simulation of this problem provides a chess board size n x n. Target (goal) of this problem is to move a horse beans of a certain position on a chess board position to the desired destination with the shortest movement simulates all possible solutions to get to the goal position. This problem is also one of the classic problems in artificial intelligence (AI). Settlement of this problem can use the help system and tree production tracking.Therefore, designed a simulation applications by utilizing several techniques of simulation programming and Breadth-First Search method. With this method, all nodes will be traced and the nodes at level n will be visited first before visiting the nodes at level n + 1. The purpose of this study is to design a software that is able to find all the solutions for the shortest movement toward the goal position by using the system of production and tracking tree.Results from this paper is that the software is able to find all solutions shortest movement a horse beans from the initial position to the goal position and displays the simulation of the movement of the horse in the chess board.","PeriodicalId":334856,"journal":{"name":"International Journal of Artificial Intelligence Research","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124375536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. A. Lesnussa, C. G. Mustamu, F. K. Lembang, M. W. Talakua
{"title":"APPLICATION OF BACKPROPAGATION NEURAL NETWORKS IN PREDICTING RAINFALL DATA IN AMBON CITY","authors":"Y. A. Lesnussa, C. G. Mustamu, F. K. Lembang, M. W. Talakua","doi":"10.29099/IJAIR.V2I2.59","DOIUrl":"https://doi.org/10.29099/IJAIR.V2I2.59","url":null,"abstract":"The Artificial Neural Networks is a process of information system on certain traits which as representatives of the human neural networks. The Artificial Neural Networks can be applied in every area of human life, one of them is environment especially about prediction of climate or weather. In this research, the artificial neural network is used to predict the rainfall with Backpropagation method and using MATLAB software. The other meteorology parameters used to predict the rainfall are air temperature, air velocity and air pressure. The result showed less accuracy level is 80% by using alpha 0,7, iteration number (epoch) 10000 and MSE value = 0,0218. Therefore, the result of rainfall prediction system is accurate.","PeriodicalId":334856,"journal":{"name":"International Journal of Artificial Intelligence Research","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128424344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bio-inspired Expert System based on Genetic Algorithm for Printer Identification in Forensic Science","authors":"S. Darwish, Hany M. Elgohary","doi":"10.29099/IJAIR.V2I2.67","DOIUrl":"https://doi.org/10.29099/IJAIR.V2I2.67","url":null,"abstract":"Printer identification models are provided for the goal of distinguishing the printer that produced a suspicious imprinted document. Source identification of a published document can easily be a significant procedure intended for the forensic science. The arising problem is that the extraction of many features of the printed document for printer identification sometimes increases time and reduces the classification accuracy since a lot of the document features may come to be repetitive and non-beneficial. Distinct combinatorial collection of features will need to be acquired in order to preserve the most effective fusion to accomplish the maximum accuracy. This paper presents an intelligent machine learning algorithm for printer identification that adopts both of texture features formulated from gray level co-occurrence matrix of the printed letter ''WOO'' and genetic heuristic search to select the optimal reduced feature set. This integration aims to achieve high classification accuracy based on small group of discriminative features. For classification, the system utilizes k-nearest neighbors (KNN) to recognize the source model of the printer for its simplicity. Experimental results validate that the suggested system has high taxonomy accuracy and requires less computation time.","PeriodicalId":334856,"journal":{"name":"International Journal of Artificial Intelligence Research","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125025972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum Inspired Genetic Programming Model to Predict Toxicity Degree for Chemical Compounds","authors":"S. Darwish","doi":"10.29099/IJAIR.V2I2.64","DOIUrl":"https://doi.org/10.29099/IJAIR.V2I2.64","url":null,"abstract":"Cheminformatics plays a vital role to maintain a large amount of chemical data. A reliable prediction of toxic effects of chemicals in living systems is highly desirable in domains such as cosmetics, drug design, food safety, and manufacturing chemical compounds. Toxicity prediction topic requires several new approaches for knowledge discovery from data to paradigm composite associations between the modules of the chemical compound; such techniques need more computational cost as the number of chemical compounds increases. State-of-the-art prediction methods such as neural network and multi-layer regression that requires either tuning parameters or complex transformations of predictor or outcome variables are not achieving high accuracy results. This paper proposes a Quantum Inspired Genetic Programming “QIGP” model to improve the prediction accuracy. Genetic Programming is utilized to give a linear equation for calculating toxicity degree more accurately. Quantum computing is employed to improve the selection of the best-of-run individuals and handles parsimony pressure to reduce the complexity of the solutions. The results of the internal validation analysis indicated that the QIGP model has the better goodness of fit statistics and significantly outperforms the Neural Network model.","PeriodicalId":334856,"journal":{"name":"International Journal of Artificial Intelligence Research","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124771664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ajao Lukman Adewale, Ajao Falilat Jumoke, M. Adegboye, Abideen A. Ismail
{"title":"An Embedded Fuzzy Logic Based Application for Density Traffic Control System","authors":"Ajao Lukman Adewale, Ajao Falilat Jumoke, M. Adegboye, Abideen A. Ismail","doi":"10.29099/IJAIR.V2I1.44","DOIUrl":"https://doi.org/10.29099/IJAIR.V2I1.44","url":null,"abstract":"The control of density traffic at cross junction road usually manned by human efforts or implementation of automatic traffic light system. This system seem and proves to be inefficient with some challenges. The major constraints of this traffic control are as a result of the inability of most traffic control systems to assign appropriate waiting time for vehicles based on the lane density. Also with little or no consideration for pedestrians, emergency and security agents priorities. In view of this, an intelligent density traffic control system using (fuzzy logic) which is capable of providing priority to the road users based on the density and emergency situations was developed and presented in this paper. This system will obtain the approximate amount of vehicle and presence of pedestrians respectfully on each lane with help of Infrared Sensors (IR) and siren detection system for emergency and security road users. The working principle of this system depending on the logic inputs rules given into the processing unit by the (sensors, S1 and S2) which helps the system to generates a timing sequence that best suit the number of vehicles and pedestrians available on the lane at point in time.","PeriodicalId":334856,"journal":{"name":"International Journal of Artificial Intelligence Research","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126231446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Vision and Image Processing: A Paper Review","authors":"Victor Wiley, Thomas Lucas","doi":"10.29099/IJAIR.V2I1.42","DOIUrl":"https://doi.org/10.29099/IJAIR.V2I1.42","url":null,"abstract":"Computer vision has been studied from many persective. It expands from raw data recording into techniques and ideas combining digital image processing, pattern recognition, machine learning and computer graphics. The wide usage has attracted many scholars to integrate with many disciplines and fields. This paper provide a survey of the recent technologies and theoretical concept explaining the development of computer vision especially related to image processing using different areas of their field application. Computer vision helps scholars to analyze images and video to obtain necessary information, understand information on events or descriptions, and scenic pattern. It used method of multi-range application domain with massive data analysis. This paper provides contribution of recent development on reviews related to computer vision, image processing, and their related studies. We categorized the computer vision mainstream into four group e.g., image processing, object recognition, and machine learning. We also provide brief explanation on the up-to-date information about the techniques and their performance.","PeriodicalId":334856,"journal":{"name":"International Journal of Artificial Intelligence Research","volume":"37 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120883862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}