K. Sharma, Firdous Hussain Mohammad, Deepak Parashar
{"title":"Apache Spark in Riot Games: A Case Study on Data Processing and Analytics","authors":"K. Sharma, Firdous Hussain Mohammad, Deepak Parashar","doi":"10.14569/ijacsa.2023.0140704","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140704","url":null,"abstract":"—This case study examines Riot Games' use of Apache Spark and its effects on data processing and analytics. Riot Games is a well-known game production studio. The developer Riot Games, best known for the well-liked online multiplayer game League of Legends, manages enormous volumes of data produced daily by millions of players. Riot Games handled and analyzed this data quickly using Apache Spark, a distributed computing technology that made insightful findings and improved user experiences. This case study explores Riot Games' difficulties, the company's adoption of Apache Spark, its implementation, and the advantages of utilizing Spark's capabilities. We evaluated the drawbacks and advantages of adopting Spark in the gaming sector and offered suggestions for game creators wishing to embrace Spark for their data processing and real-time analytics requirements. Our study adds to the increasing body of knowledge on the use of Spark in the gaming sector and offers suggestions and insights for both game producers and researchers.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"58 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86584915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fuzzy Reward and Punishment Scheme for Vehicular Ad Hoc Networks","authors":"Rezvi Shahariar, C. Phillips","doi":"10.14569/ijacsa.2023.0140601","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140601","url":null,"abstract":"—Trust management is an important security approach for the successful implementation of Vehicular Ad Hoc Networks (VANETs). Trust models evaluate messages to assign reward or punishment. This can be used to influence a driver’s future behaviour. In the author’s previous work, a sender-side based trust management framework is developed which avoids the receiver evaluation of messages. However, this does not guarantee that a trusted driver will not lie. These “untrue attacks” are resolved by the RSUs using collaboration to rule on a dispute, providing a fixed amount of reward and punishment. The lack of sophistication is addressed in this paper with a novel fuzzy RSU controller considering the severity of incident, driver past behaviour, and RSU confidence to determine the reward or punishment for the conflicted drivers. Although any driver can lie in any situation, it is expected that trustworthy drivers are more likely to remain so, and vice versa. This behaviour is captured in a Markov chain model for sender and reporter drivers where their lying characteristics depend on trust score and trust state. Each trust state defines the driver’s likelihood of lying using different probability distribution. An extensive simulation is performed to evaluate the performance of the fuzzy assessment and examine the Markov chain driver behaviour model with changing the initial trust score of all or some drivers in Veins simulator. The fuzzy and the fixed RSU assessment schemes are compared, and the result shows that the fuzzy scheme can encourage drivers to improve their behaviour.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"12 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86952175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Medical Slide Images Processing using Depth Learning in Histopathological Studies of Cerebellar Cortex Tissue","authors":"Xiang Zhang, Xiaowei Shi, Xingyi Zhang","doi":"10.14569/ijacsa.2023.0140167","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140167","url":null,"abstract":"—Today, with the advancement of science and technology, artificial intelligence evolves and grows along with human beings. Clinical specialists rely only on their knowledge and experience, as well as the results of complex and time-consuming clinical trials, despite the inevitable human errors of diagnosis work. Performing malignant and dangerous diseases, the use of machine learning makes it clear that the ability and capacity of these techniques are beneficial to help correctly diagnose diseases, reduce human error, improve diagnosis, and start treatment as soon as possible. In diseases, image processing and artificial intelligence is widely used in medicine and applied in stereological, histopathology. One of the essential activities for diagnosing the disease using artificial intelligence and machine learning is the fragmentation of images and classification of medical images, which is used to diagnose the disease with the help of images of the patient obtained from medical devices. In this article, we have worked on classifying medical histopathological images of brain tissue. The images are not of good quality due to sampling with standard equipment, and an attempt is made to improve the quality of the images by operating. Also, all images are segmented using the U-NET algorithm. In order to improve performance in classification, segmented images are used to classify images into two classes, normal and abnormal, instead of the images themselves. The images in the data set used in this study have a small number of images. Due to the use of a convolutional neural network algorithm to extract the feature and classify the images, more images are needed. Therefore, the data amplification technique to overcome this problem is used. Finally, the convolutional neural network has been used to extract features from images and classify fragmented images. Experimental results shown that the proposed method presented better performance compared to other existing methods.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"18 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87076853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Technology for Intelligent Management of Energy, Equipment and Security in Smart House","authors":"Fang Yuan, Yan Zhang, Junchao Zhang","doi":"10.14569/ijacsa.2023.0140108","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140108","url":null,"abstract":"—The Internet of Things means that many of the daily devices used by humans will share their functions and information with each other or with humans by connecting to the Internet. The most important factor of the Internet of Things is the integration of several technologies and communication solutions. Identification and tracking technologies, wired and wireless sensors and active networks, protocols for increasing communication and intelligence of objects are the most important parts of the Internet of Things. In this article, an attempt has been made to determine the parts that can be used to make a house smart among the concepts and technologies related to web-based programs based on Internet of Things technology. Since it is very time-consuming to investigate the effect of all the Internet of Things technologies in smart homes, by studying and examining various types of research, the web-based program based on the Internet of Things is selected as an independent variable, and its effect on smart home management is investigated. For this purpose, a web-based program based on the Internet of Things for intelligent building energy management, intelligent equipment management, and intelligent security has been designed and implemented. As experimental results shown the proposed method the proposed method achieves better results compared to other existing methods in energy consumption by 33.8% reducing energy usage.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"28 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87080553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Daud, Muhammad Haziq Lim Abdullah, M. H. Zakaria
{"title":"Serious Game Design Principles for Children with Autism to Facilitate the Development of Emotion Regulation","authors":"N. Daud, Muhammad Haziq Lim Abdullah, M. H. Zakaria","doi":"10.14569/ijacsa.2023.01405100","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.01405100","url":null,"abstract":"—Autism spectrum disorder (ASD) is a deficit-driven neurodevelopmental condition in three areas, which are social interactions, communication, and the presence of restricted interests and repetitive behaviours. Children with autism mainly suffer from emotional disturbance that emerges as meltdowns, tantrums, and aggression, increasing the risk of developing mental health issues. Several studies have assessed the use of serious games in helping children with autism enhance their communication, learning, and social skills. Significantly, these serious games focus on the strengths and weaknesses of the disorder to establish a comfortable and controlled environment that is able to support children with autism. However, there is still a lack of evidence in studies exploring the use of serious games for children with autism to facilitate the development of emotion regulation. The aim of this study is to consolidate and propose a new serious game design principle for children with autism to facilitate the development of emotion regulation. The target age of the children involved in this study ranged between 6 and 12. A review of previous literature on serious game design principles was conducted. More than 70 articles related to serious games for children with autism were analysed using thematic analysis. This study found 16 elements that influenced the designing and developing process of creating a serious game for children with autism. It has been organised and categorised into five attributes (user, game objectives, game elements, game aesthetics, and player experience). Certainly, this study demonstrates the needs and requirements of children with autism when designing serious games.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"140 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86256969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning-based Sentence Embeddings using BERT for Textual Entailment","authors":"M. Alsuhaibani","doi":"10.14569/ijacsa.2023.01408108","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.01408108","url":null,"abstract":"—This study directly and thoroughly investigates the practicalities of utilizing sentence embeddings, derived from the foundations of deep learning, for textual entailment recognition, with a specific emphasis on the robust BERT model. As a cornerstone of our research, we incorporated the Stanford Natural Language Inference (SNLI) dataset. Our study emphasizes a meticulous analysis of BERT’s variable layers to ascertain the optimal layer for generating sentence embeddings that can effectively identify entailment. Our approach deviates from traditional methodologies, as we base our evaluation of entailment on the direct and simple comparison of sentence norms, subsequently highlighting the geometrical attributes of the embeddings. Experimental results revealed that the L 2 norm of sentence embeddings, drawn specifically from BERT’s 7th layer, emerged superior in entailment detection compared to other setups.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"70 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86339129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Recommendation Model of College English MOOC based on Hybrid Recommendation Algorithm","authors":"Yifang Ding, J. Hao","doi":"10.14569/ijacsa.2023.0140464","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140464","url":null,"abstract":"Establishing a reasonable and efficient compulsory education balance index system is very important to boost the all-around of compulsory education development, and then realize the course recommendation for students with different attributes. Based on this, the research aimed at the problems in college English education and evaluation, aimed to establish a college English MOOC education and evaluation system based on the improved neural network recommendation algorithm. The research first constructed the college English MOOC education and evaluation data elements, and then established a genetic algorithm improved neural network algorithm (BP Neural Network Optimization Algorithm Based on Genetic Algorithm, GA-BP), and finally analyzed the effect of the assembled model. These results show that the fitness of the GA-BP model reaches the set expectation when the evolutionary algebra reaches 10 times, and its fitness is 0.6. The corresponding threshold and weight are obtained, and the threshold and weight are substituted into the model. After repeated iterative training, the model finally reached an error of 10-3 when it was trained 12 times, and the expected accuracy was achieved. The R value of each set hovered around 0.97, and the fitting degree was high, which showed that the GA-BP model proposed in the study had a better fitting degree. The difference between the expected value and the output value is mainly distributed in the [-0.08083, 0.06481] interval. To sum up, the GA-BP model proposed in the study has an excellent effect on college English education and evaluation. This evaluation model has a faster learning rate and a higher prediction accuracy and more stable performance. Keywords—Genetic algorithm; education quality assessment; BP neural network; college English MOOC","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86519764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Land-cover Classification Feature Selection in Arid Areas based on Sentinel-2 Imagery and Spectral Indices","authors":"Mohammed Saeed, Asmala Ahmad, O. Mohd","doi":"10.14569/ijacsa.2023.0140312","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140312","url":null,"abstract":"org","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"186 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80627839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Single-valued Pentagonal Neutrosophic Geometric Programming Approach to Optimize Decision Maker’s Satisfaction Level","authors":"Satyabrata Nath, P. Das, P. Debnath","doi":"10.14569/ijacsa.2023.0140439","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140439","url":null,"abstract":"Achieving the desired level of satisfaction for a decision-maker in any decision-making scenario is considered a challenging endeavor because minor modifications in the process might lead to incorrect findings and inaccurate decisions. In order to maximize the decision-maker’s satisfaction, this paper proposes a Single-valued Neutrosophic Geometric Programming model based on pentagonal fuzzy numbers. The decision-maker is typically assumed to be certain of the parameters, but in reality, this is not the case, hence the parameters are presented as neutrosophic fuzzy values. The decision-maker, with this strategy, is able to achieve varying levels of satisfaction and dissatisfaction for each constraint and even complete satisfaction for certain constraints. Here the decision maker aims to achieve the maximum level of satisfaction while maintaining the level of hesitation and minimizing dissatisfaction in order to retain an optimum solution. Furthermore, transforming the objective function into a constraint adds one more layer to the Ndimensional multi-parametrizes and . The advantages of this multi-parametrized proposed method over the existing ones are proven using numerical examples. Keywords—Decision making; pentagonal neutrosophic numbers; single-valued neutrosophic geometric programming; multi-parametric programming","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"75 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80664918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved 3D Rotation-based Geometric Data Perturbation Based on Medical Data Preservation in Big Data","authors":"Jayanti Dansana, M. R. Kabat, P. Pattnaik","doi":"10.14569/ijacsa.2023.0140592","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140592","url":null,"abstract":"— With the rise in technology, a huge volume of data is being processed using data mining, especially in the healthcare sector. Usually, medical data consist of a lot of personal data, and third parties utilize it for the data mining process. Perturbation in health care data highly aids in preventing intruders from utilizing the patient’s privacy. One of the challenges in data perturbation is managing data utility and privacy protection. Medical data mining has certain special properties compared with other data mining fields. Hence, in this work, the machine learning (ML) based perturbation approach is introduced to provide more privacy to healthcare data. Here, clustering and IGDP-3DR processes are applied to improve healthcare privacy preservation. Initially, the dataset is pre-processed using data normalization. Then, the dimensionality is reduced by SVD with PCA (singular value decomposition with Principal component analysis). Then, the clustering process is performed by IFCM (Improved Fuzzy C means). The high-dimensional data are divided into several segments by IFCM, and every partition is set as a cluster. Then, improved Geometric Data Perturbation (IGDP) is used to perturb the clustered data. IGDP is a combination of GDP with 3D rotation (3DR). Finally, the perturbed data are classified using a machine learning (ML) classifier - kernel Support Vector Machine- Horse Herd Optimization (KSVM-HHO) to classify the perturbed data and ensure better accuracy. The overall evaluation of the proposed KSVM-HHO is carried out in the Python platform. The performance of the IGDP-KSVM-HHO is compared over the two benchmark datasets, Wisconsin prognostic breast cancer (WBC) and Pima Indians Diabetes (PID) dataset. For the WBC dataset, the proposed method obtains an overall accuracy of 98.08% perturbed data, and for the PID dataset, the proposed method obtains an overall accuracy of 98.04%.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"70 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80672950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}