{"title":"Hybrid approach redefinition with cluster-based instance selection in handling class imbalance problem","authors":"H. Hartono, Erianto Ongko, Dahlan Abdullah","doi":"10.26555/ijain.v7i3.515","DOIUrl":"https://doi.org/10.26555/ijain.v7i3.515","url":null,"abstract":"Class Imbalance problems often occur in the classification process, the existence of these problems is characterized by the tendency of a class to have instances that are much larger than other classes. This problem certainly causes a tendency towards low accuracy in minority classes with smaller number of instances and also causes important information on minority classes not to be obtained. Various methods have been applied to overcome the problem of the imbalance class. One of them is the Hybrid Approach Redefinition method which is one of the Hybrid Ensembles methods. The tendency to pay attention to the performance classifier, has led to an understanding of the importance of selecting an instance that will be used as a classifier. In the classic Hybrid Approach Redefinition method classifier selection is done randomly using the Random Under Sampling approach, and it is interesting to study how performance is obtained if the sampling process is based on Cluster-Based by selecting existing instances. The purpose of this study is to apply the Hybrid Approach Redefinition method with Cluster-Based Instance Selection (CBIS) approach so that it can obtain a better performance classifier. The results showed that Hybrid Approach Redefinition with cluster-based instance selection gave better results on the number of classifiers, data diversity, and performance classifiers compared to classic Hybrid Approach Redefinition.","PeriodicalId":52195,"journal":{"name":"International Journal of Advances in Intelligent Informatics","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84731791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. A. Zakaria, Amelia Ritahani Ismail, Nadzurah Zainal Abidin, Nur Hidayah Mohd Khalid, Afrujaan Yakath Ali
{"title":"Optimized COCOMO parameters using hybrid particle swarm optimization","authors":"N. A. Zakaria, Amelia Ritahani Ismail, Nadzurah Zainal Abidin, Nur Hidayah Mohd Khalid, Afrujaan Yakath Ali","doi":"10.26555/ijain.v7i2.583","DOIUrl":"https://doi.org/10.26555/ijain.v7i2.583","url":null,"abstract":"Software effort and cost estimation are crucial parts of software project development. It determines the budget, time, and resources needed to develop a software project. The success of a software project development depends mainly on the accuracy of software effort and cost estimation. A poor estimation will impact the result, which worsens the project management. Various software effort estimation model has been introduced to resolve this problem. COnstructive COst MOdel (COCOMO) is a well-established software project estimation model; however, it lacks accuracy in effort and cost estimation, especially for current projects. Inaccuracy and complexity in the estimated effort have made it difficult to efficiently and effectively develop software, affecting the schedule, cost, and uncertain estimation directly. In this paper, Particle Swarm Optimization (PSO) is proposed as a metaheuristics optimization method to hybrid with three traditional state-of-art techniques such as Support Vector Machine (SVM), Linear Regression (LR), and Random Forest (RF) for optimizing the parameters of COCOMO models. The proposed approach is applied to the NASA software project dataset downloaded from the promise repository. Comparing the proposed approach has been made with the three traditional algorithms; however, the obtained results confirm low accuracy before hybrid with PSO. Overall, the results showed that PSOSVM on the NASA software project dataset could improve effort estimation accuracy and outperform other models.","PeriodicalId":52195,"journal":{"name":"International Journal of Advances in Intelligent Informatics","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87012795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid ensemble deep learning approach for reliable breast cancer detection","authors":"M. Elshafey, T. Ghoniemy","doi":"10.26555/IJAIN.V7I2.615","DOIUrl":"https://doi.org/10.26555/IJAIN.V7I2.615","url":null,"abstract":"Article history Received January 18, 2021 Revised March 29, 2021 Accepted April 2, 2021 Available online April 20, 2021 Among the cancer diseases, breast cancer is considered one of the most prevalent threats requiring early detection for a higher recovery rate. Meanwhile, the manual evaluation of malignant tissue regions in histopathology images is a critical and challenging task. Nowadays, deep learning becomes a leading technology for automatic tumor feature extraction and classification as malignant or benign. This paper presents a proposed hybrid deep learning-based approach, for reliable breast cancer detection, in three consecutive stages: 1) fine-tuning the pre-trained Xception-based classification model, 2) merging the extracted features with the predictions of a two-layer stacked LSTM-based regression model, and finally, 3) applying the support vector machine, in the classification phase, to the merged features. For the three stages of the proposed approach, training and testing phases are performed on the BreakHis dataset with nine adopted different augmentation techniques to ensure generalization of the proposed approach. A comprehensive performance evaluation of the proposed approach, with diverse metrics, shows that employing the LSTM-based regression model improves accuracy and precision metrics of the fine-tuned Xception-based model by 10.65% and 11.6%, respectively. Additionally, as a classifier, implementing the support vector machine further boosts the model by 3.43% and 5.22% for both metrics, respectively. Experimental results exploit the proposed approach's efficiency with outstanding reliability in comparison with the recent stateof-the-art approaches.","PeriodicalId":52195,"journal":{"name":"International Journal of Advances in Intelligent Informatics","volume":"53 1","pages":"112"},"PeriodicalIF":0.0,"publicationDate":"2021-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91065047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pascal Maniriho, L. Mahoro, Zephanie Bizimana, Ephrem Niyigaba, T. Ahmad
{"title":"Reversible difference expansion multi-layer data hiding technique for medical images","authors":"Pascal Maniriho, L. Mahoro, Zephanie Bizimana, Ephrem Niyigaba, T. Ahmad","doi":"10.26555/IJAIN.V7I1.483","DOIUrl":"https://doi.org/10.26555/IJAIN.V7I1.483","url":null,"abstract":"a Department of Information and Communication Technology, Rwanda Polytechnic-IPRC Karongi, Karongi 85, Rwanda b Department of Information Technology, Vaal University of Technology, Vanderbijlpark 19000, South Africa c Department of Informatics, Institut Teknologi Sepuluh Nopember (ITS), Surabaya, 60111, Indonesia 1 pmaniriho@iprckarongi.rp.ac.rw; 2 lekim@vut.ac.za; 3 bizimana@iprckarongi.rp.ac.rw; 4 ictdepartment@iprckarongi.rp.ac.rw; 5 tohari@if.its.ac.id * corresponding author","PeriodicalId":52195,"journal":{"name":"International Journal of Advances in Intelligent Informatics","volume":"33 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76666679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Hidayat, I. R. Yanto, A. A. Ramli, M. F. M. Fudzee
{"title":"Similarity measure fuzzy soft set for phishing detection","authors":"R. Hidayat, I. R. Yanto, A. A. Ramli, M. F. M. Fudzee","doi":"10.26555/IJAIN.V7I1.605","DOIUrl":"https://doi.org/10.26555/IJAIN.V7I1.605","url":null,"abstract":"Article history Received December 29, 2020 Revised March 31, 2021 Accepted March 31, 2021 Available online March 31, 2021 Phishing is a serious web security problem, and the internet fraud technique involves mirroring genuine websites to trick online users into stealing their sensitive information and taking out their personal information, such as bank account information, usernames, credit card, and passwords. Early detection can prevent phishing behavior makes quick protection of personal information. Classification methods can be used to predict this phishing behavior. This paper presents an intelligent classification model for detecting Phishing by redefining a fuzzy soft set (FSS) theory for better computational performance. There are four types of similarity measures: (1) Comparison table, (2) Matching function, (3) Similarity measure, and (4) Distance measure. The experiment showed that the Similarity measure has better performance than the others in accuracy and recall, reached 95.45 % and 99.77 %, respectively. It concludes that FSS similarity measured is more precise than others, and FSS could be a promising approach to avoid phishing activities. This novel method can be implemented in social media software to warn the users as an early warning system. This model can be used for personal or commercial purposes on social media applications to protect sensitive data.","PeriodicalId":52195,"journal":{"name":"International Journal of Advances in Intelligent Informatics","volume":"5 1","pages":"101"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84297148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CAE-COVIDX: automatic covid-19 disease detection based on x-ray images using enhanced deep convolutional and autoencoder","authors":"Pranolo A. Hanafi, Yongyi Mao","doi":"10.26555/IJAIN.V7I1.577","DOIUrl":"https://doi.org/10.26555/IJAIN.V7I1.577","url":null,"abstract":"Since the first case in 2019, Corona Virus has been spreading all over the world. World Health Organization (WHO) announced that COVID-19 had become an international pandemic. There is an essential section to handle the spreading of the virus by immediate virus detection for patients. Traditional medical detection requires a long time, a specific laboratory, and a high cost. A method for detecting Covid-19 faster compared to common approaches, such as RT-PCR detection, is needed. The method demonstrated that it could produce an X-ray image with higher accuracy and consumed less time. We propose a novel method to extract image features and to classify COVID-19 using deep CNN combined with Autoencoder (AE) dubbed CAE-COVIDX. We evaluated and compared it with the traditional CNN and existing framework VGG16 involving 400 normal images of non-COVID19 and 400 positive COVID-19 diseases. The performance evaluation was conducted using accuracy, confusion matrix, and loss evaluation. Based on experiment results, the CAE-COVIDX framework outperforms previous methods in several testing scenarios. This framework's ability to detect Covid-19 in various nonstandard image X-rays could effectively help medical employers diagnose Covid-19 patients. It is an important factor to decrease the spreading of Covid-19 massively.","PeriodicalId":52195,"journal":{"name":"International Journal of Advances in Intelligent Informatics","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74728809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-domain sentiment analysis model on Indonesian YouTube comment","authors":"A. Aribowo, H. Basiron, N. Yusof, S. Khomsah","doi":"10.26555/IJAIN.V7I1.554","DOIUrl":"https://doi.org/10.26555/IJAIN.V7I1.554","url":null,"abstract":"A cross-domain sentiment analysis (CDSA) study in the Indonesian language and tree-based ensemble machine learning is quite interesting. CDSA is useful to support the labeling process of cross-domain sentiment and reduce any dependence on the experts; however, the mechanism in the opinion unstructured by stop word, language expressions, and Indonesian slang words is unidentified yet. This study aimed to obtain the best model of CDSA for the opinion in Indonesia language that commonly is full of stop words and slang words in the Indonesian dialect. This study was purposely to observe the benefits of the stop words cleaning and slang words conversion in CDSA in the Indonesian language form. It was also to find out which machine learning method is suitable for this model. This study started by crawling five datasets of the comments on YouTube from 5 different domains. The dataset was copied into two groups: the dataset group without any process of stop word cleaning and slang word conversion and the dataset group to stop word cleaning and slang word conversion. CDSA model was built for each dataset group and then tested using two types of tree-based ensemble machine learning, i.e., Random Forest (RF) and Extra Tree (ET) classifier, and tested using three types of non-ensemble machine learning, including Naïve Bayes (NB), SVM, and Decision Tree (DT) as the comparison. Then, It can be suggested that the accuracy of CDSA in Indonesia Language increased if it still removed the stop words and converted the slang words. The best classifier model was built using tree-based ensemble machine learning, particularly ET, as in this study, the ET model could achieve the highest accuracy by 91.19%. This model is expected to be the CDSA technique alternative in the Indonesian language.","PeriodicalId":52195,"journal":{"name":"International Journal of Advances in Intelligent Informatics","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91301215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructing decision rules from naive bayes model for robust and low complexity classification","authors":"Nabeel Al-A'araji, S. Al-Mamory, Ali Al-shakarchi","doi":"10.26555/IJAIN.V7I1.578","DOIUrl":"https://doi.org/10.26555/IJAIN.V7I1.578","url":null,"abstract":"Article history Selected paper from The 2020 Global Research Conference (GRaCe'20), Trengganu-Malaysia (Virtually), 16-18 October 2020, https://terengganu.uitm.edu.my/ grace2020/. Peer-reviewed by GRaCe'20 Scientific Committee and Editorial Team of IJAIN journal. Received October 26, 2020 Revised November 10, 2020 Accepted March 15, 2021 Available online March 31, 2021 A large spectrum of classifiers has been described in the literature. One attractive classification technique is a Naïve Bayes (NB) which has been relayed on probability theory. NB has two major limitations: First, it requires to rescan the dataset and applying a set of equations each time to classify instances, which is an expensive step if a dataset is relatively large. Second, NB may remain challenging for non-statisticians to understand the deep work of a model. On the other hand, Rule-Based classifiers (RBCs) have used IF-THEN rules (henceforth, rule-set), which are more comprehensible and less complex for classification tasks. For elevating NB limitations, this paper presents a method for constructing a rule-set from the NB model, which serves as RBC. Experiments of the constructing ruleset have been conducted on (Iris, WBC, Vote) datasets. Coverage, Accuracy, M-Estimate, and Laplace are crucial evaluation metrics that have been projected to rule-set. In some datasets, the rule-set obtains significant accuracy results that reach 95.33 %, 95.17% for Iris and vote datasets, respectively. The constructed rule-set can mimic the classification capability of NB, provide a visual representation of the model, express rules infidelity with acceptable accuracy; an easier method to interpreting and adjusting from the original model. Hence, the rule-set will provide a comprehensible and lightweight model than NB itself.","PeriodicalId":52195,"journal":{"name":"International Journal of Advances in Intelligent Informatics","volume":"15 12 1","pages":"76"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86977976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent feature selection using particle swarm optimization algorithm with a decision tree for DDoS attack detection","authors":"Aween Abubakr Saeed, N. Jameel","doi":"10.26555/IJAIN.V7I1.553","DOIUrl":"https://doi.org/10.26555/IJAIN.V7I1.553","url":null,"abstract":"Article history Received September 13, 2020 Revised November 9, 2020 Accepted November 18, 2020 Available online March 31, 2021 The explosive development of information technology is increasingly rising cyber-attacks. Distributed denial of service (DDoS) attack is a malicious threat to the modern cyber-security world, which causes performance disruption to the network servers. It is a pernicious type of attack that can forward a large amount of traffic to damage one or all target’s resources simultaneously and prevents authenticated users from accessing network services. The paper aims to select the least number of relevant DDoS attack detection features by designing an intelligent wrapper feature selection model that utilizes a binary-particle swarm optimization algorithm with a decision tree classifier. In this paper, the Binary-particle swarm optimization algorithm is used to resolve discrete optimization problems such as feature selection and decision tree classifier as a performance evaluator to evaluate the wrapper model’s accuracy using the selected features from the network traffic flows. The model’s intelligence is indicated by selecting 19 convenient features out of 76 features of the dataset. The experiments were accomplished on a large DDoS dataset. The optimal selected features were evaluated with different machine learning algorithms by performance measurement metrics regarding the accuracy, Recall, Precision, and F1-score to detect DDoS attacks. The proposed model showed a high accuracy rate by decision tree classifier 99.52%, random forest 96.94%, and multi-layer perceptron 90.06 %. Also, the paper compares the outcome of the proposed model with previous feature selection models in terms of performance measurement metrics. This outcome will be useful for improving DDoS attack detection systems based on machine learning algorithms. It is also probably applied to other research topics such as DDoS attack detection in the cloud environment and DDoS attack mitigation systems.","PeriodicalId":52195,"journal":{"name":"International Journal of Advances in Intelligent Informatics","volume":"256 1","pages":"37"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76781015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coloring picture fuzzy graphs through their cuts and its computation","authors":"I. Rosyida, S. Suryono","doi":"10.26555/IJAIN.V7I1.612","DOIUrl":"https://doi.org/10.26555/IJAIN.V7I1.612","url":null,"abstract":"Article history Selected paper from The 2020 3rd International Symposium on Advanced Intelligent Informatics (SAIN’20), Nanjing-China (Virtually), 25-26 November 2020, http://sain.ijain.org/2020/. Peerreviewed by SAIN’20 Scientific Committee and Editorial Team of IJAIN journal. Received October 31, 2020 Revised November 26, 2020 Accepted March 29, 2021 Available online March 31, 2021 In a fuzzy set (FS), there is a concept of alpha-cuts of the FS for alpha in [0,1]. Further, this concept was extended into (alpha,delta)-cuts in an intuitionistic fuzzy set (IFS) for delta in [0,1]. One of the expansions of FS and IFS is the picture fuzzy set (PFS). Hence, the concept of (alpha,delta)cuts was developed into (alpha,delta,beta)-cuts in a PFS where beta is an element of [0,1]. Since a picture fuzzy graph (PFG) consists of picture fuzzy vertex or edge sets or both of them, we have an idea to construct the notion of the (alpha,delta,beta)-cuts in a PFG. The steps used in this paper are developing theories and algorithms. The objectives in this research are to construct the concept of (alpha,delta,beta)-cuts in picture fuzzy graphs (PFGs), to construct the (alpha,delta,beta)-cuts coloring of PFGs, and to design an algorithm for finding the cut chromatic numbers of PFGs. The first result is a definition of the (alpha,delta,beta)-cut in picture fuzzy graphs (PFGs) where (alpha,delta,beta) are elements of a level set of the PFGs. Further, some properties of the cuts are proved. The second result is a concept of PFG coloring and the chromatic number of PFG based on the cuts. The third result is an algorithm to find the cuts and the chromatic numbers of PFGs. Finally, an evaluation of the algorithm is done through Matlab programming. This research could be used to solve some problems related to theories and applications of PFGs.","PeriodicalId":52195,"journal":{"name":"International Journal of Advances in Intelligent Informatics","volume":"31 1","pages":"63"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76757483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}