首页 > 最新文献

International Journal of Artificial Intelligence & Robotics (IJAIR)最新文献

英文 中文
Emotion Detection in Twitter Social Media Using Long Short-Term Memory (LSTM) and Fast Text 基于长短期记忆和快速文本的Twitter社交媒体情感检测
Pub Date : 2021-05-31 DOI: 10.25139/IJAIR.V3I1.3827
M. Riza, N. Charibaldi
Emotion detection is important in various fields such as education, business, employee recruitment. In this study, emotions will be detected with text that comes from Twitter because social media makes users tend to express emotions through text posts. One of the social media that has the highest user growth rate in Indonesia is Twitter. This study will use the LSTM method because this method is proven to be better than previous studies. Word embedding fast text will also be used in this study to improve Word2Vec and GloVe that cannot handle the problem of out of vocabulary (OOV). This research produces the best accuracy for each word embedding as follows, Word2Vec produces an accuracy of 73,15%, GloVe produces an accuracy of 60,10%, fast text produces an accuracy of 73,15%. The conclusion in this study is the best accuracy was obtained by Word2Vec and fast text. The fast text has the advantage of handling the problem of out of vocabulary (OOV), but in this study, it cannot improve the accuracy of word 2vec. This study has not been able to produce very good accuracy. This is because of the data used. In future works, to get even better results, it is expected to apply other deep learning methods, such as CNN, BiLSTM, etc. It is hoped that more data will be used in future studies.
情感检测在教育、商业、员工招聘等各个领域都很重要。在本研究中,情感将通过来自Twitter的文本进行检测,因为社交媒体使用户倾向于通过文本帖子来表达情感。Twitter是印尼用户增长率最高的社交媒体之一。本研究将使用LSTM方法,因为该方法被证明比以往的研究更好。本研究还将使用单词嵌入快速文本来改进Word2Vec和GloVe无法处理out of vocabulary (OOV)的问题。本研究得出的每个词嵌入的最佳准确率如下,Word2Vec产生的准确率为73,15%,GloVe产生的准确率为66,10%,fast text产生的准确率为73,15%。本研究的结论是使用Word2Vec和fast text获得了最好的准确率。快速文本在处理词汇量不足(OOV)问题上具有优势,但在本研究中,它并不能提高单词2vec的准确率。这项研究还不能产生很好的准确性。这是因为所使用的数据。在未来的工作中,为了得到更好的结果,我们希望应用其他的深度学习方法,如CNN、BiLSTM等。希望在未来的研究中使用更多的数据。
{"title":"Emotion Detection in Twitter Social Media Using Long Short-Term Memory (LSTM) and Fast Text","authors":"M. Riza, N. Charibaldi","doi":"10.25139/IJAIR.V3I1.3827","DOIUrl":"https://doi.org/10.25139/IJAIR.V3I1.3827","url":null,"abstract":"Emotion detection is important in various fields such as education, business, employee recruitment. In this study, emotions will be detected with text that comes from Twitter because social media makes users tend to express emotions through text posts. One of the social media that has the highest user growth rate in Indonesia is Twitter. This study will use the LSTM method because this method is proven to be better than previous studies. Word embedding fast text will also be used in this study to improve Word2Vec and GloVe that cannot handle the problem of out of vocabulary (OOV). This research produces the best accuracy for each word embedding as follows, Word2Vec produces an accuracy of 73,15%, GloVe produces an accuracy of 60,10%, fast text produces an accuracy of 73,15%. The conclusion in this study is the best accuracy was obtained by Word2Vec and fast text. The fast text has the advantage of handling the problem of out of vocabulary (OOV), but in this study, it cannot improve the accuracy of word 2vec. This study has not been able to produce very good accuracy. This is because of the data used. In future works, to get even better results, it is expected to apply other deep learning methods, such as CNN, BiLSTM, etc. It is hoped that more data will be used in future studies.","PeriodicalId":365842,"journal":{"name":"International Journal of Artificial Intelligence & Robotics (IJAIR)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132566307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Traffic Light Automation with Camera Tracker and Microphone to Recognize Ambulance Using the HAAR Cascade Classifier Method 基于HAAR级联分类器的交通信号灯自动识别救护车
Pub Date : 2020-12-01 DOI: 10.25139/ijair.v2i2.3194
Eldha Nur Ramadhana Putra, Edi Prihartono, Budi Santoso
Lack of knowledge by road users regarding these priorities, especially when there is a passing ambulance that is often stuck in traffic at a crossroads due to accumulated vehicles and the traffic light is still red. The purpose of this paper is to simulate traffic light automation by giving a green light every time an ambulance passes by using the HAAR and Computer Vision methods. The HAAR method is used for training data from less sharp images as part of the Ambulance object classification process. The Computer Vision method is used as a tool in image processing objects to processing the image captured by the Camera. Hardware through the microphone performs pattern recognition to pick up ambulance sirens. The test result at the average frequency caught by the microphone is 1.3 kHz. The test results of the System to capture ambulance objects received a precision value of 75%, a recall of 100%, and an accuracy of 75%.
道路使用者对这些优先事项缺乏了解,特别是当一辆救护车经过时,由于车辆积聚而经常在十字路口受阻,而交通灯仍然是红色的。本文的目的是利用HAAR和计算机视觉方法模拟交通信号灯自动化,每次救护车通过时都给绿灯。HAAR方法用于从较不清晰的图像中训练数据,作为救护车对象分类过程的一部分。计算机视觉方法作为图像处理对象的工具,对摄像机捕获的图像进行处理。硬件通过麦克风执行模式识别来接收救护车的警报声。在麦克风捕获的平均频率下的测试结果为1.3 kHz。系统捕获救护车对象的测试结果精度值为75%,召回率为100%,准确率为75%。
{"title":"Traffic Light Automation with Camera Tracker and Microphone to Recognize Ambulance Using the HAAR Cascade Classifier Method","authors":"Eldha Nur Ramadhana Putra, Edi Prihartono, Budi Santoso","doi":"10.25139/ijair.v2i2.3194","DOIUrl":"https://doi.org/10.25139/ijair.v2i2.3194","url":null,"abstract":"Lack of knowledge by road users regarding these priorities, especially when there is a passing ambulance that is often stuck in traffic at a crossroads due to accumulated vehicles and the traffic light is still red. The purpose of this paper is to simulate traffic light automation by giving a green light every time an ambulance passes by using the HAAR and Computer Vision methods. The HAAR method is used for training data from less sharp images as part of the Ambulance object classification process. The Computer Vision method is used as a tool in image processing objects to processing the image captured by the Camera. Hardware through the microphone performs pattern recognition to pick up ambulance sirens. The test result at the average frequency caught by the microphone is 1.3 kHz. The test results of the System to capture ambulance objects received a precision value of 75%, a recall of 100%, and an accuracy of 75%.","PeriodicalId":365842,"journal":{"name":"International Journal of Artificial Intelligence & Robotics (IJAIR)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122836322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message Security Using Rivest-Shamir-Adleman Cryptography and Least Significant Bit Steganography with Video Platform 利用 Rivest-Shamir-Adleman 密码学和视频平台的最小显著位隐写术实现信息安全
Pub Date : 2020-12-01 DOI: 10.25139/ijair.v2i2.3150
Widad Muhammad, D. H. Sulaksono, S. Agustini
All over the world, information technology has developed into a critical communication medium. One of them is digital messaging. We can connect and share information in real-time using digital messages. Without us knowing it, advances in message delivery are not only followed by kindness. Message security threats are also growing. Many unauthorized parties try to intercept critical information sent for the benefit of certain parties. As a countermeasure, various message security techniques exist to protect the messages we send. One of them is cryptography and steganography. Cryptography is useful for converting our messages into coded text so that unauthorized parties cannot read them. Meanwhile, steganography is useful for hiding our encrypted messages into several media, such as videos. This research will convert messages into ciphertext using the Rivest-Shamir-Adleman method and then insert them into video media using the Least Significant Bit method. There are four types of messages tested with different sizes. All messages will be encrypted and embedding using the Python programming language. Then the video will be tested using the MSE, PSNR, and Histogram methods. So we get a value that shows which message gets the best results. So that the message sent is more guaranteed authenticity and reduces the possibility of message leakage.
在世界各地,信息技术已发展成为一种重要的通信媒介。数字信息就是其中之一。我们可以利用数字信息实时连接和共享信息。在我们不知不觉中,信息传递的进步不仅带来了善意。信息安全威胁也在不断增加。许多未经授权的方面试图截获为某些方面的利益而发送的重要信息。作为对策,有各种信息安全技术来保护我们发送的信息。密码学和隐写术就是其中之一。加密技术可以将我们的信息转换成编码文本,这样未经授权的人就无法读取。与此同时,隐写术可以将我们的加密信息隐藏到视频等多种媒体中。本研究将使用 Rivest-Shamir-Adleman 方法把信息转换成密码文本,然后使用最小显著位法把它们插入视频媒体。测试的信息有四种类型,大小各不相同。所有信息都将使用 Python 编程语言进行加密和嵌入。然后将使用 MSE、PSNR 和直方图方法对视频进行测试。这样我们就能得到一个值,显示哪条信息的效果最好。这样,发送的信息真实性就更有保证,也降低了信息泄露的可能性。
{"title":"Message Security Using Rivest-Shamir-Adleman Cryptography and Least Significant Bit Steganography with Video Platform","authors":"Widad Muhammad, D. H. Sulaksono, S. Agustini","doi":"10.25139/ijair.v2i2.3150","DOIUrl":"https://doi.org/10.25139/ijair.v2i2.3150","url":null,"abstract":"All over the world, information technology has developed into a critical communication medium. One of them is digital messaging. We can connect and share information in real-time using digital messages. Without us knowing it, advances in message delivery are not only followed by kindness. Message security threats are also growing. Many unauthorized parties try to intercept critical information sent for the benefit of certain parties. As a countermeasure, various message security techniques exist to protect the messages we send. One of them is cryptography and steganography. Cryptography is useful for converting our messages into coded text so that unauthorized parties cannot read them. Meanwhile, steganography is useful for hiding our encrypted messages into several media, such as videos. This research will convert messages into ciphertext using the Rivest-Shamir-Adleman method and then insert them into video media using the Least Significant Bit method. There are four types of messages tested with different sizes. All messages will be encrypted and embedding using the Python programming language. Then the video will be tested using the MSE, PSNR, and Histogram methods. So we get a value that shows which message gets the best results. So that the message sent is more guaranteed authenticity and reduces the possibility of message leakage.","PeriodicalId":365842,"journal":{"name":"International Journal of Artificial Intelligence & Robotics (IJAIR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130060140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Automatic Sliding Doors Using RFID and Arduino 基于RFID和Arduino的自动滑动门
Pub Date : 2020-07-01 DOI: 10.25139/ijair.v2i1.2706
Yudi Kristyawan, Achmad Dicky Rizhaldi
 The door is an important component in a building as security. It is used as access in and out of a room. People in the modern era now want everyday life that is completely automated, so that the work can be done easily without wasting energy and can shorten the time. Along with the rapid development, the need for effectiveness and efficiency is prioritized in various fields. The purpose of this paper is to design an automatic sliding door that only detects one Radio Frequency Identification (RFID) card to open and close. The use of RFID systems can strengthen the security level of building access. This study uses a data processing method in the form of an ID number generated from a tag. Specifications in the discussion of the results in this study include a motor that uses a 12-volt DC motor, a maximum door weight of 5 kg, can only detect one RFID to open and close the door, and the sliding door used is one door. The results of system testing are obtained to open a door that is without load, and the door can move 14 cm from the distance of the door hole so that it opens. Doors with a load of 1-1.5 kg also move 14 cm from the distance of the door opening when open. Doors with a load of 2-3 kg only move 12.5-9.5 cm from the distance of the door so that it opens. When the door gets heavier 3.5-4 kg, the door moves only 7.5-3 cm from the distance the door hole remains closed.
门是建筑物安全的重要组成部分。它被用作进出房间的通道。现代人现在希望日常生活完全自动化,这样工作就可以轻松完成,不浪费精力,可以缩短时间。随着经济的快速发展,各个领域对效益和效率的需求都是优先考虑的。本文的目的是设计一种仅检测一张射频识别(RFID)卡即可开启和关闭的自动推拉门。RFID系统的使用可以加强楼宇门禁的安全级别。本研究采用标签生成的ID号形式的数据处理方法。本研究结果讨论中的规格包括使用12伏直流电机的电机,门的最大重量为5 kg,只能检测一个RFID来打开和关闭门,使用的滑动门是一个门。得到系统测试的结果,打开一扇无负载的门,门可以从门孔的距离移动14cm,从而打开。负载为1-1.5公斤的门在打开时也会从门打开的距离移动14厘米。负载2-3公斤的门只能从门的距离移动12.5-9.5厘米才能打开。当门的重量增加到3.5- 4kg时,门的移动距离仅为门孔闭合距离的7.5- 3cm。
{"title":"An Automatic Sliding Doors Using RFID and Arduino","authors":"Yudi Kristyawan, Achmad Dicky Rizhaldi","doi":"10.25139/ijair.v2i1.2706","DOIUrl":"https://doi.org/10.25139/ijair.v2i1.2706","url":null,"abstract":" The door is an important component in a building as security. It is used as access in and out of a room. People in the modern era now want everyday life that is completely automated, so that the work can be done easily without wasting energy and can shorten the time. Along with the rapid development, the need for effectiveness and efficiency is prioritized in various fields. The purpose of this paper is to design an automatic sliding door that only detects one Radio Frequency Identification (RFID) card to open and close. The use of RFID systems can strengthen the security level of building access. This study uses a data processing method in the form of an ID number generated from a tag. Specifications in the discussion of the results in this study include a motor that uses a 12-volt DC motor, a maximum door weight of 5 kg, can only detect one RFID to open and close the door, and the sliding door used is one door. The results of system testing are obtained to open a door that is without load, and the door can move 14 cm from the distance of the door hole so that it opens. Doors with a load of 1-1.5 kg also move 14 cm from the distance of the door opening when open. Doors with a load of 2-3 kg only move 12.5-9.5 cm from the distance of the door so that it opens. When the door gets heavier 3.5-4 kg, the door moves only 7.5-3 cm from the distance the door hole remains closed.","PeriodicalId":365842,"journal":{"name":"International Journal of Artificial Intelligence & Robotics (IJAIR)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116825253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Implementation of MMS Steganography With The LSB Method 用LSB方法实现彩信隐写
Pub Date : 2020-06-03 DOI: 10.25139/ijair.v2i1.2653
Dian Ahkam Sani, Mohammad Zoqi Sarwani, Muhamad Agus Setiawan
Around the world, the internet (interconnection network) has developed into one of the most popular data communication media. With a variety of illegal information retrieval techniques that are developing, many people are trying to access information that is not their right. Various techniques to protect confidential information from unauthorized persons have been carried out to secure important data. Steganography is a science and art for writing hidden messages so that no other party knows the existence of the message. The three results of tests conducted by the LSB method can be used to hide messages into images. The first test was successful by writing a message that less than 31 characters stored in the picture, the second succeeded in writing a message equal to 31 characters stored in the picture, the third failed to write a message of more than 31 characters stored in the picture.
在世界范围内,互联网(互联网络)已经发展成为最流行的数据通信媒体之一。随着各种非法信息检索技术的发展,许多人试图获取不属于他们的信息。为了确保重要资料的安全,当局采取了各种技术,以保护机密资料不受未经授权人士的侵犯。隐写术是一门科学和艺术,用于书写隐藏的信息,使其他人不知道信息的存在。通过LSB方法进行的三个测试结果可以用于将消息隐藏到图像中。第一次测试成功地写入了少于31个字符存储在图片中的消息,第二次测试成功地写入了等于31个字符存储在图片中的消息,第三次测试失败地写入了多于31个字符存储在图片中的消息。
{"title":"An Implementation of MMS Steganography With The LSB Method","authors":"Dian Ahkam Sani, Mohammad Zoqi Sarwani, Muhamad Agus Setiawan","doi":"10.25139/ijair.v2i1.2653","DOIUrl":"https://doi.org/10.25139/ijair.v2i1.2653","url":null,"abstract":"Around the world, the internet (interconnection network) has developed into one of the most popular data communication media. With a variety of illegal information retrieval techniques that are developing, many people are trying to access information that is not their right. Various techniques to protect confidential information from unauthorized persons have been carried out to secure important data. Steganography is a science and art for writing hidden messages so that no other party knows the existence of the message. The three results of tests conducted by the LSB method can be used to hide messages into images. The first test was successful by writing a message that less than 31 characters stored in the picture, the second succeeded in writing a message equal to 31 characters stored in the picture, the third failed to write a message of more than 31 characters stored in the picture.","PeriodicalId":365842,"journal":{"name":"International Journal of Artificial Intelligence & Robotics (IJAIR)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126629849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genetic Algorithm for Optimizing Traveling Salesman Problems with Time Windows (TSP-TW) 带时间窗旅行商问题的遗传算法优化
Pub Date : 2019-10-31 DOI: 10.25139/ijair.v1i1.2024
Juwairiah Juwairiah, Dicky Pratama, H. Rustamaji, Herry Sofyan, Dessyanto Boedi Prasetyo
The concept of Traveling Salesman Problem (TSP) used in the discussion of this paper is the Traveling Salesman Problem with Time Windows (TSP-TW), where the time variable considered is the time of availability of attractions for tourists to visit. The algorithm used for optimizing the solution of Traveling Salesman Problem with Time Windows (TSP-TW) is a genetic algorithm. The search for a solution for determining the best route begins with the formation of an initial population that contains a collection of individuals. Each individual has a combination of different tourist sequence. Then it is processed by genetic operators, namely crossover with Partially Mapped Crossover (PMX) method, mutation using reciprocal exchange method, and selection using ranked-based fitness method. The research method used is GRAPPLE. Based on tests conducted, the optimal generation size results obtained in solving the TSP-TW problem on the tourist route in the Province of DIY using genetic algorithms is 700, population size is 40, and the combination of crossover rate and mutation rate is 0.70 and 0.30 There is a tolerance time of 5 seconds between the process of requesting distance and travel time and the process of forming a tourist route for the genetic algorithm process.
本文讨论中使用的旅行推销员问题(TSP)的概念是带时间窗口的旅行推销员问题(TSP- tw),其中考虑的时间变量是游客参观景点的可用时间。求解带时间窗的旅行商问题(TSP-TW)的优化算法是一种遗传算法。寻找确定最佳路线的解决方案始于形成包含个体集合的初始种群。每个个体都有不同的旅游序列组合。然后对遗传算子进行处理,即利用部分映射交叉(PMX)方法进行交叉,利用互反交换方法进行突变,利用基于秩的适应度方法进行选择。使用的研究方法是GRAPPLE。经过测试,利用遗传算法求解DIY省旅游路线TSP-TW问题得到的最优代数结果为700,种群规模为40,交叉率和突变率组合为0.70和0.30,遗传算法过程中请求距离和行程时间的过程与形成旅游路线的过程之间有5秒的容差时间。
{"title":"Genetic Algorithm for Optimizing Traveling Salesman Problems with Time Windows (TSP-TW)","authors":"Juwairiah Juwairiah, Dicky Pratama, H. Rustamaji, Herry Sofyan, Dessyanto Boedi Prasetyo","doi":"10.25139/ijair.v1i1.2024","DOIUrl":"https://doi.org/10.25139/ijair.v1i1.2024","url":null,"abstract":"The concept of Traveling Salesman Problem (TSP) used in the discussion of this paper is the Traveling Salesman Problem with Time Windows (TSP-TW), where the time variable considered is the time of availability of attractions for tourists to visit. The algorithm used for optimizing the solution of Traveling Salesman Problem with Time Windows (TSP-TW) is a genetic algorithm. The search for a solution for determining the best route begins with the formation of an initial population that contains a collection of individuals. Each individual has a combination of different tourist sequence. Then it is processed by genetic operators, namely crossover with Partially Mapped Crossover (PMX) method, mutation using reciprocal exchange method, and selection using ranked-based fitness method. The research method used is GRAPPLE. Based on tests conducted, the optimal generation size results obtained in solving the TSP-TW problem on the tourist route in the Province of DIY using genetic algorithms is 700, population size is 40, and the combination of crossover rate and mutation rate is 0.70 and 0.30 There is a tolerance time of 5 seconds between the process of requesting distance and travel time and the process of forming a tourist route for the genetic algorithm process.","PeriodicalId":365842,"journal":{"name":"International Journal of Artificial Intelligence & Robotics (IJAIR)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121100605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Indonesian Sign Language API (OpenSIBI API) as The Gateway Services for Myo Armband 印尼手语API (OpenSIBI API)作为Myo Armband的网关服务
Pub Date : 2019-10-31 DOI: 10.25139/ijair.v1i1.2026
M. Zikky, R. Hakkun, Buchori Rafsanjani
We create an API (Application Programming Interface) for Indonesian Sign Language (Sistem Isyarat Bahasa Indonesia/SIBI) which is called OpenSIBI. In this case study, we use the Myo Armband device to capture hand gesture data movement. It uses five sensors: Accelerometer, Gyroscope, Orientation, Orientation-Euler, and EMG. First, we record, convert and save those data into JSON dataset in the server as data learning. Then, every data request (trial data) from the client will compare them using k-NN Normalization process. OpenSIBI API works as the middleware which integrated to RabbitMQ as the queue request arranger. Every service request from the client will automatically spread to the server with the queue process. As the media observation, we create a client data request by SIBI Words and Alphabeth Game, which allows the user to answer several stages of puzzle-game with Indonesian Sign Language hand gesture. Game-player must use the Myo armband as an interactive device that reads the hand movement and its fingers for answering the questions given. Thus, the data will be classified and normalized by the k-NN algorithm, which will be processed on the server. In this process, data will pass OpenAPI SIBI (which connected to RabbitMQ) to queue every incoming data-request. So, the obtained data will be processed one by one and sent it back to the client as the answer.
我们为印尼手语(SIBI)创建了一个API(应用程序编程接口),称为OpenSIBI。在本案例研究中,我们使用Myo Armband设备来捕获手势数据运动。它使用五个传感器:加速度计、陀螺仪、方向、方向-欧拉和肌电图。首先,我们将这些数据记录、转换并保存到服务器端的JSON数据集中作为数据学习。然后,来自客户端的每个数据请求(试验数据)将使用k-NN归一化过程对它们进行比较。OpenSIBI API作为中间件集成到RabbitMQ中作为队列请求安排器。来自客户机的每个服务请求都将通过队列进程自动传播到服务器。作为媒体观察,我们通过SIBI Words and Alphabeth Game创建了一个客户数据请求,允许用户用印度尼西亚手语手势回答几个阶段的益智游戏。游戏玩家必须使用Myo臂环作为一个互动设备,读取手的运动和手指来回答给定的问题。因此,数据将通过k-NN算法进行分类和归一化,并在服务器上进行处理。在这个过程中,数据将通过OpenAPI SIBI(连接到RabbitMQ)来对每个传入的数据请求进行排队。因此,获得的数据将被逐一处理并作为答案发送回客户端。
{"title":"Indonesian Sign Language API (OpenSIBI API) as The Gateway Services for Myo Armband","authors":"M. Zikky, R. Hakkun, Buchori Rafsanjani","doi":"10.25139/ijair.v1i1.2026","DOIUrl":"https://doi.org/10.25139/ijair.v1i1.2026","url":null,"abstract":"We create an API (Application Programming Interface) for Indonesian Sign Language (Sistem Isyarat Bahasa Indonesia/SIBI) which is called OpenSIBI. In this case study, we use the Myo Armband device to capture hand gesture data movement. It uses five sensors: Accelerometer, Gyroscope, Orientation, Orientation-Euler, and EMG. First, we record, convert and save those data into JSON dataset in the server as data learning. Then, every data request (trial data) from the client will compare them using k-NN Normalization process. OpenSIBI API works as the middleware which integrated to RabbitMQ as the queue request arranger. Every service request from the client will automatically spread to the server with the queue process. As the media observation, we create a client data request by SIBI Words and Alphabeth Game, which allows the user to answer several stages of puzzle-game with Indonesian Sign Language hand gesture. Game-player must use the Myo armband as an interactive device that reads the hand movement and its fingers for answering the questions given. Thus, the data will be classified and normalized by the k-NN algorithm, which will be processed on the server. In this process, data will pass OpenAPI SIBI (which connected to RabbitMQ) to queue every incoming data-request. So, the obtained data will be processed one by one and sent it back to the client as the answer.","PeriodicalId":365842,"journal":{"name":"International Journal of Artificial Intelligence & Robotics (IJAIR)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133607587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher 使用单字母密码改进Vegenere密码以提高数据安全性
Pub Date : 2019-10-31 DOI: 10.25139/ijair.v1i1.2029
S. Agustini, W. M. Rahmawati, M. Kurniawan
The rapid progression of exchange data by public networks is important, especially in information security. We need to keep our information safe from attackers or intruders. Furthermore, information security becomes needed for us. Many kind cipher methods of cryptography are improved to secure information such as monoalphabetic cipher and polyalphabetic cipher. Cryptography makes readable messages becoming non-readable messages. One of the popular algorithms of a polyalphabetic cipher is Vigenere cipher. Vigenere cipher has been used for a long time, but this algorithm has weaknesses. The calculation of the encryption process is only involving additive cipher, it makes this algorithm vulnerability to attacker based on frequency analysis of the letter. The proposed method of this research is making Vigenere cipher more complex by combining monoalphabetic cipher and Vigenere cipher. One of the monoalphabetic ciphers is Affine cipher. Affine cipher has two steps in the encryption process that are an additive cipher and a multiplicative cipher. Our proposed method has been simulated with Matlab. We also tested the vulnerability of the result of encryption by Vigenere Analyzer and Analysis Monoalphabetic Substitution. It shows that our method overcomes the weakness of Vigenere Cipher. Vigenere cipher and Affine cipher are classical cryptography that has a simple algorithm of cryptography. By combining Vigenere cipher and Affine cipher will make a new method that more complex algorithm.
公共网络交换数据的快速发展具有重要意义,特别是在信息安全方面。我们需要保护我们的信息不受攻击者或入侵者的侵害。此外,信息安全成为我们所需要的。为了保证信息的安全,人们改进了许多密码学的密码方法,如单字母密码和多字母密码。密码学使可读消息变成不可读消息。一个流行的多字母密码算法是维吉纳尔密码。Vigenere密码已经被使用了很长时间,但是这种算法存在弱点。加密过程的计算只涉及加性密码,这使得该算法容易受到基于字母频率分析的攻击者的攻击。本研究提出的方法是将单字母密码和维吉内雷密码相结合,使维吉内雷密码更加复杂。一种单字母密码是仿射密码。仿射密码在加密过程中有两个步骤:加性密码和乘性密码。用Matlab对该方法进行了仿真。我们还测试了Vigenere Analyzer和Analysis mono字母替换加密结果的漏洞。结果表明,该方法克服了Vigenere密码的缺点。维吉纳尔密码和仿射密码是具有简单密码算法的经典密码学。将Vigenere密码与仿射密码相结合,提出了一种新的算法,使算法更加复杂。
{"title":"Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher","authors":"S. Agustini, W. M. Rahmawati, M. Kurniawan","doi":"10.25139/ijair.v1i1.2029","DOIUrl":"https://doi.org/10.25139/ijair.v1i1.2029","url":null,"abstract":"The rapid progression of exchange data by public networks is important, especially in information security. We need to keep our information safe from attackers or intruders. Furthermore, information security becomes needed for us. Many kind cipher methods of cryptography are improved to secure information such as monoalphabetic cipher and polyalphabetic cipher. Cryptography makes readable messages becoming non-readable messages. One of the popular algorithms of a polyalphabetic cipher is Vigenere cipher. Vigenere cipher has been used for a long time, but this algorithm has weaknesses. The calculation of the encryption process is only involving additive cipher, it makes this algorithm vulnerability to attacker based on frequency analysis of the letter. The proposed method of this research is making Vigenere cipher more complex by combining monoalphabetic cipher and Vigenere cipher. One of the monoalphabetic ciphers is Affine cipher. Affine cipher has two steps in the encryption process that are an additive cipher and a multiplicative cipher. Our proposed method has been simulated with Matlab. We also tested the vulnerability of the result of encryption by Vigenere Analyzer and Analysis Monoalphabetic Substitution. It shows that our method overcomes the weakness of Vigenere Cipher. Vigenere cipher and Affine cipher are classical cryptography that has a simple algorithm of cryptography. By combining Vigenere cipher and Affine cipher will make a new method that more complex algorithm.","PeriodicalId":365842,"journal":{"name":"International Journal of Artificial Intelligence & Robotics (IJAIR)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130093363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Speech to Text Processing for Interactive Agent of Virtual Tour Navigation 虚拟导航交互式Agent的语音到文本处理
Pub Date : 2019-10-31 DOI: 10.25139/ijair.v1i1.2030
Dian Ahkam Sani, Muchammad Saifulloh
The development of science and technology is one way to replace the method of human interaction with computers, one of which is to provide voice input. Conversion of sound into text form with the Backpropagation method can be understood and realized through feature extraction, including the use of Linear Predictive Coding (LPC). Linear Predictive Coding is one way to represent the signal in obtaining the features of each sound pattern. In brief, the way this speech recognition system worked was by inputting human voice through a microphone (analog signal) which then sampled with a sampling speed of 8000 Hz so that it became a digital signal with the assistance of sound card on the computer. The digital signal from the sample then entered the initial process using LPC, so that several LPC coefficients were obtained. The LPC outputs were then trained using the Backpropagation learning method. The results of the learning were classified with a word and stored in a database afterwards. The results of the test were in the form of an introduction program that able display the voice plots. the results of speech recognition with voice recognition percentage of respondents in the database iss 80% of the 100 data in the test in Real Time
科技的发展是用计算机取代人类交互方式的一种方式,其中之一就是提供语音输入。用反向传播方法将声音转换为文本形式可以通过特征提取来理解和实现,其中包括使用线性预测编码(LPC)。线性预测编码是一种表示信号的方法,可以获得每个声音模式的特征。简而言之,这种语音识别系统的工作方式是通过麦克风输入人的声音(模拟信号),然后以8000hz的采样速度在计算机上的声卡的帮助下将其变成数字信号。然后,利用LPC将来自样品的数字信号进入初始过程,从而获得多个LPC系数。然后使用反向传播学习方法训练LPC输出。学习的结果用一个词分类,然后存储在数据库中。测试结果以能够显示语音情节的介绍程序的形式出现。在Real Time测试的100个数据中,语音识别结果与数据库中应答者的语音识别百分比为80%
{"title":"Speech to Text Processing for Interactive Agent of Virtual Tour Navigation","authors":"Dian Ahkam Sani, Muchammad Saifulloh","doi":"10.25139/ijair.v1i1.2030","DOIUrl":"https://doi.org/10.25139/ijair.v1i1.2030","url":null,"abstract":"The development of science and technology is one way to replace the method of human interaction with computers, one of which is to provide voice input. Conversion of sound into text form with the Backpropagation method can be understood and realized through feature extraction, including the use of Linear Predictive Coding (LPC). Linear Predictive Coding is one way to represent the signal in obtaining the features of each sound pattern. In brief, the way this speech recognition system worked was by inputting human voice through a microphone (analog signal) which then sampled with a sampling speed of 8000 Hz so that it became a digital signal with the assistance of sound card on the computer. The digital signal from the sample then entered the initial process using LPC, so that several LPC coefficients were obtained. The LPC outputs were then trained using the Backpropagation learning method. The results of the learning were classified with a word and stored in a database afterwards. The results of the test were in the form of an introduction program that able display the voice plots. the results of speech recognition with voice recognition percentage of respondents in the database iss 80% of the 100 data in the test in Real Time","PeriodicalId":365842,"journal":{"name":"International Journal of Artificial Intelligence & Robotics (IJAIR)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116302592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Personality Classification through Social Media Using Probabilistic Neural Network Algorithms 基于概率神经网络算法的社交媒体人格分类
Pub Date : 2019-10-31 DOI: 10.25139/ijair.v1i1.2025
Mohammad Zoqi Sarwani, Dian Ahkam Sani, Fitria Chabsah Fakhrini
Today the internet creates a new generation with modern culture that uses digital media. Social media is one of the popular digital media. Facebook is one of the social media that is quite liked by young people. They are accustomed to conveying their thoughts and expression through social media. Text mining analysis can be used to classify one's personality through social media with the probabilistic neural network algorithm. The text can be taken from the status that is on Facebook. In this study, there are three stages, namely text processing, weighting, and probabilistic neural networks for determining classification. Text processing consists of several processes, namely: tokenization, stopword, and steaming. The results of the text processing in the form of text are given a weight value to each word by using the Term Inverse Document Frequent (TF / IDF) method. In the final stage, the Probabilistic Neural Network Algorithm is used to classify personalities. This study uses 25 respondents, with 10 data as training data, and 15 data as testing data. The results of this study reached an accuracy of 60%.
今天,互联网创造了使用数字媒体的现代文化的新一代。社交媒体是一种流行的数字媒体。Facebook是年轻人非常喜欢的社交媒体之一。他们习惯于通过社交媒体来传达自己的想法和表达。文本挖掘分析可以利用概率神经网络算法通过社交媒体对一个人的性格进行分类。文本可以取自Facebook上的状态。在本研究中,有三个阶段,即文本处理、加权和概率神经网络来确定分类。文本处理包括几个过程,即:标记化、停词和处理。文本形式的文本处理结果通过术语逆文档频率(TF / IDF)方法赋予每个单词一个权重值。最后,利用概率神经网络算法对人格进行分类。本研究使用25个被调查者,其中10个数据作为训练数据,15个数据作为测试数据。这项研究的结果达到了60%的准确率。
{"title":"Personality Classification through Social Media Using Probabilistic Neural Network Algorithms","authors":"Mohammad Zoqi Sarwani, Dian Ahkam Sani, Fitria Chabsah Fakhrini","doi":"10.25139/ijair.v1i1.2025","DOIUrl":"https://doi.org/10.25139/ijair.v1i1.2025","url":null,"abstract":"Today the internet creates a new generation with modern culture that uses digital media. Social media is one of the popular digital media. Facebook is one of the social media that is quite liked by young people. They are accustomed to conveying their thoughts and expression through social media. Text mining analysis can be used to classify one's personality through social media with the probabilistic neural network algorithm. The text can be taken from the status that is on Facebook. In this study, there are three stages, namely text processing, weighting, and probabilistic neural networks for determining classification. Text processing consists of several processes, namely: tokenization, stopword, and steaming. The results of the text processing in the form of text are given a weight value to each word by using the Term Inverse Document Frequent (TF / IDF) method. In the final stage, the Probabilistic Neural Network Algorithm is used to classify personalities. This study uses 25 respondents, with 10 data as training data, and 15 data as testing data. The results of this study reached an accuracy of 60%.","PeriodicalId":365842,"journal":{"name":"International Journal of Artificial Intelligence & Robotics (IJAIR)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132551089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
International Journal of Artificial Intelligence & Robotics (IJAIR)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1