{"title":"The Application of Virtual Technology Based on Posture Recognition in Art Design Teaching","authors":"Qinyan Gao","doi":"10.14569/ijacsa.2023.0140589","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140589","url":null,"abstract":"—With the development of virtual technology, posture recognition technology has been integrated into virtual technology. This new technology allows users to further understand and observe the activities carried out in life scenes based on their original observation of the external world. And it enables them to make intelligent decisions. Existing posture recognition cannot meet the requirements of precise positioning in virtual environments. Therefore, a two-stage three-dimensional pose recognition model is proposed. The experiment illustrates that the three-dimensional gesture recognition performance is excellent. In addition, under the ablation experiment, the error accuracy of the research model decreased by more than 5 mm, and the overall error accuracy decreased by 10%. In the P-R curve, the accuracy rate of the model reaches 0.741, and the recall rate reaches 0.65. When conducting empirical analysis, the virtual posture disassembly action is complete; the disassembly error is less than 5%, and the disassembly error accuracy is good. The fit degree of the leg bending amplitude reaches over 96%, and the fit degree of the arm bending amplitude reaches over 95%. When the model is applied to actual teaching, the overall satisfaction score of teachers and students reaches 94.6 points. This has effectively improved the teaching effect of art design and is of great significance to the development of education in China.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"90 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72593355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aatila Mustapha, Lachgar Mohamed, Hrimech Hamid, Kartit Ali
{"title":"Machine Learning Techniques in Keratoconus Classification: A Systematic Review","authors":"Aatila Mustapha, Lachgar Mohamed, Hrimech Hamid, Kartit Ali","doi":"10.14569/ijacsa.2023.0140569","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140569","url":null,"abstract":"—Machine learning (ML) algorithms are being integrated into several disciplines. Ophthalmology is one field of health sector that has benefited from the advantages and capacities of ML in processing of different types of data. In a large number of studies, the detection and classification of various diseases, such as keratoconus, was carried out by analyzing corneal characteristics, in different data types (images, measurements, etc.), using ML tools. The main objective of this study was to conduct a rigorous systematic review of the use of ML techniques in the detection and classification of keratoconus. Papers considered in this study were selected carefully from Scopus and Web of Science digital databases, according to their content and to the adoption of ML methods in the classification of keratoconus. The selected studies were reviewed to identify different ML techniques implemented and the data types handled in the diagnosis of keratoconus. A total of 38 articles, published between 2005 and 2022, were retained for review and discussion of their content.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72795760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Denoising using Wavelet Cycle Spinning and Non-local Means Filter","authors":"Giat Karyono, Asmala Ahmad, S. A. Asmai","doi":"10.14569/ijacsa.2023.0140356","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140356","url":null,"abstract":"—Removing as much noise as possible in an image while preserving its fine details is a complex and challenging task. We propose a wavelet-based and non-local means (NLM) denoising method to overcome the problem. Two well-known wavelets: dual-tree complex wavelet transform (DT-CWT) and discrete wavelet transform (DWT), have been used to change the noise image into several wavelet coefficients sequentially. NLM filtering and universal hard thresholding with cycle spinning have been used for thresholding on its approximation and detail coefficients, respectively. The inverse two-dimensional DWT was applied to the modified wavelet coefficients to obtain the denoised image. We conducted experiments with twelve test images on the set12 data set, adding the additive Gaussian white noise with variances of 10 to 90 in increments of 10. Three evaluation metrics, such as peak signal noise to rate (PSNR), structural similarity index metric (SSIM), and mean square error (MSE), have been used to evaluate the effectiveness of the proposed denoising method. From these measurement results, the proposed denoising method outperforms DT-CWT, DWT, and NLM almost in all noise levels except for the noise level of 10. At that noise level, the proposed denoising method is lower than NLM but better than DT-CWT and DWT.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"22 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74449077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Speaker Recognition for Degraded Human Voice using Modified-MFCC and LPC with CNN","authors":"Amit Moondra, P. Chahal","doi":"10.14569/ijacsa.2023.0140416","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140416","url":null,"abstract":"org","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"191 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74458282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heart Disease Classification and Recommendation by Optimized Features and Adaptive Boost Learning","authors":"Pardeep Kumar, Ankit Kumar","doi":"10.14569/ijacsa.2023.01403103","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.01403103","url":null,"abstract":"—In recent decades, cardiovascular diseases have eclipsed all others as the main reason for death in both low and middle income countries. Early identification and continuous clinical monitoring can reduce the death rate associated with heart disorders. Neither service is yet accessible, as it requires more intellect, time, and skill to effectively detect cardiac disorders in all circumstances and to advise a patient for 24 hours. In this study, researchers suggested a Machine Learning-based approach to forecast the development of cardiac disease. For precise identification of cardiac disease, an efficient ML technique is required. The proposed method works on five classes, one normal and four diseases. In the research, all classes were assigned a primary task, and recommendations were made based on that. The proposed method optimises feature weighting and selects efficient features. Following feature optimization, adaptive boost learning using tree and KNN bases is used. In the trial, sensitivity improved by 3-4%, specificity by 4-5%, and accuracy by 3-4% compared to the previous approach.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"37 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74665844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Elashmawy, I. Elamvazuthi, L. I. Izhar, S. Paramasivam, Steven W. Su
{"title":"Detection of Tuberculosis Based on Hybridized Pre-Processing Deep Learning Method","authors":"Mohamed Elashmawy, I. Elamvazuthi, L. I. Izhar, S. Paramasivam, Steven W. Su","doi":"10.14569/ijacsa.2023.0140808","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140808","url":null,"abstract":"—The disease, tuberculosis (TB) is a serious health concern as it primarily affects the lungs and can lead to fatalities. However, early detection and treatment can cure the disease. One potential method for detecting TB is using Computer Aided Diagnosis (CAD) systems, which can analyze Chest X-Ray Images (CXR) for signs of TB. This paper proposes a new approach for improving the performance of CAD systems by using a hybrid pre-processing method for Convolutional Neural Network (CNN) models. The goal of the research is to enhance the accuracy and Area Under Curve (AUC) of detection for TB in CXR images by combining two different pre-processing methods and multi-classifying different manifestations of the disease. The hypothesis is that this approach will result in more accurate detection of TB in CXR images. To achieve this, this research used augmentation and segmentation techniques to pre-process the CXR images before feeding them into a pre-trained CNN model for classification. The VGG16 model managed to achieve an AUC of 0.935, an accuracy of 90% and a 0.8975 F1-score with the proposed pre-processing method.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"32 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77542027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Automated Impact Analysis Approach for Test Cases based on Changes of Use Case based Requirement Specifications","authors":"Adisak Intana, Kanjana Laosen, Thiwatip Sriraksa","doi":"10.14569/ijacsa.2023.01401105","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.01401105","url":null,"abstract":"—Change Impact Analysis (CIA) is essential to the software development process that identifies the potential effects of changes during the development process. The changing of requirements always impacts on the software testing because some parts of the existing test cases may not be used to test the software. This affects new test cases to be entirely generated from the changed version of software requirements specification that causes a considerable amount of time and effort to generate new test cases to re-test the modified system. Therefore, this paper proposes a novel automatic impact analysis approach of test cases based on changes of use case based requirement specification. This approach enables a framework and CIA algorithm where the impact of test cases is analysed when the requirement specification is changed. To detect the change, two versions as before-change and after-change of the use case model are compared. Consequently, the patterns representing the cause of variable changes are classified and analysed. This results in the existing test cases to be analysed whether they are completely reused, partly updated as well as additionally generated. The new test cases are generated automatically by using the Combination of Equivalence and Classification Tree Method (CCTM). This benefits the level of testing coverage with a minimised number of test cases to be enabled and the redundant test cases to be eliminated. The automation of this approach is demonstrated with the developed prototype tool. The validation and evaluation result with two real case studies from Hospital Information System (HIS) together with perspective views of practical specialists confirms the contribution of this tool that we seek.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77746108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khiem H. G, K. V, Huong H. L, Quy T. L, P. N., N. K, T. N., B. K, Trong D. P. N., Hieu M. D., Bao Q. T., Khoa D. T.
{"title":"Implementing a Blockchain, Smart Contract, and NFT Framework for Waste Management Systems in Emerging Economies: An Investigation in Vietnam","authors":"Khiem H. G, K. V, Huong H. L, Quy T. L, P. N., N. K, T. N., B. K, Trong D. P. N., Hieu M. D., Bao Q. T., Khoa D. T.","doi":"10.14569/ijacsa.2023.01408107","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.01408107","url":null,"abstract":".","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"31 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77811186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nazirah Abd. Hamid, S. R. Selamat, R. Ahmad, M. Mohamad
{"title":"Hamming Distance Approach to Reduce Role Mining Scalability","authors":"Nazirah Abd. Hamid, S. R. Selamat, R. Ahmad, M. Mohamad","doi":"10.14569/ijacsa.2023.0140654","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140654","url":null,"abstract":"Role-based Access Control has become the standard of practice for many organizations for restricting control on limited resources in complicated infrastructures or systems. The main objective of the role mining development is to define appropriate roles that can be applied to the specified security access policies. However, the mining scales in this kind of setting are extensive and can cause a huge load on the management of the systems. To resolve the above mentioned problems, this paper proposes a model that implements Hamming Distance approach by rearranging the existing matrix as the input data to overcome the scalability problem. The findings of the model show that the generated file size of all datasets substantially have been reduced compared to the original datasets It has also shown that Hamming Distance technique can successfully reduce the mining scale of datasets ranging between 30% and 47% and produce better candidate roles. Keywords—Role-based Access Control; role mining; hamming distance; data mining","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"116 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80438654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Endang Wahyu Pamungkas, Divi Galih Prasetyo Putri, A. Fatmawati
{"title":"Hate Speech Detection in Bahasa Indonesia: Challenges and Opportunities","authors":"Endang Wahyu Pamungkas, Divi Galih Prasetyo Putri, A. Fatmawati","doi":"10.14569/ijacsa.2023.01406125","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.01406125","url":null,"abstract":"This study aims to provide an overview of the current research on detecting abusive language in Indonesian social media. The study examines existing datasets, methods, and challenges and opportunities in this field. The research found that most existing datasets for detecting abusive language were collected from social media platforms such as Twitter, Facebook, and Instagram, with Twitter being the most commonly used source. The study also found that hate speech is the most researched type of abusive language. Various models, including traditional machine learning and deep learning approaches, have been implemented for this task, with deep learning models showing more competitive results. However, the use of transformer-based models is less popular in Indonesian hate speech studies. The study also emphasizes the importance of exploring more diverse phenomena, such as islamophobia and political hate speech. Additionally, the study suggests crowdsourcing as a potential solution for the annotation approach for labeling datasets. Furthermore, it encourages researchers to consider code-mixing issues in abusive language datasets in Indonesia, as it could improve the overall model performance for detecting abusive language in Indonesian data. The study also suggests that the lack of effective regulations and the anonymity afforded to users on most social networking sites, as well as the increasing number of Twitter users in Indonesia, have contributed to the rising prevalence of hate speech in Indonesian social media. The study also notes the importance of considering code-mixed language, out-of-vocabulary words, grammatical errors, and limited context when working with social media data. Keywords—Abusive language; hate speech detection; machine learning; social media","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"5 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76312984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}