𝔖 Scriptorium
✦   LIBER   ✦

📁

Data Analytics in System Engineering: Proceedings of 7th Computational Methods in Systems and Software 2023, Vol. 3 (Lecture Notes in Networks and Systems)

✍ Scribed by Radek Silhavy (editor), Petr Silhavy (editor)


Publisher
Springer
Year
2024
Tongue
English
Leaves
473
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


These proceedings offer an insightful exploration of integrating data analytics in system engineering. This book highlights the essential role of data in driving innovation, optimizing processes, and solving complex challenges in the field. Targeted at industry professionals, researchers, and enthusiasts, this book serves as a comprehensive resource, providing actionable insights and showcasing transformative applications of data in engineering. It is a must-read for anyone keen on understanding and participating in the ongoing evolution of system engineering in our data-centric world.

✦ Table of Contents


Preface
Organization
Contents
Interpretable Rules with a Simplified Data Representation - a Case Study with the EMBER Dataset
1 Introduction
2 Related Works
3 Methodology
3.1 Experiments
3.2 Dataset Description and Preprocessing
3.3 Tree Visualisation
3.4 Feature Selections Methods
3.5 Evaluation Setup
4 Results and Discussion
4.1 Evaluation of Models
4.2 Extracted Rules
5 Conclusion
References
Spatial Econometric Models: The Pursuit of an Accurate Spatial Structure with an Application to Labor Market
1 Introduction
2 Spatial Models: Definition, Estimation and Evaluation
2.1 Spatial Lag Model
2.2 Existing Estimation Approaches – Comparison of Methods
2.3 Model Evaluation: Selection and Testing
3 Heuristic Enhancement of Spatial Information
3.1 Motivation and Underlying Assumptions
3.2 Combination of Distance-Based Information with Sectoral Data
3.3 Enhanced Spatial Structures: Robustness and Stability Aspects
4 Empirical Illustration Based on Labor Market Data
5 Conclusions
References
Use of Neighborhood-Based Bridge Node Centrality Tuple for Preferential Vaccination of Nodes to Reduce the Number of Infected Nodes in a Complex Real-World Network
1 Introduction
2 Neighborhood-Based Bridge Node Centrality (NBNC) Tuple
3 Procedure to Simulate the SIS Model
4 SIS Simulations for Real-World Networks
5 Related Work
6 Conclusions and Future Work
References
Social Media Applications’ Privacy Policies for Facilitating Digital Living
1 Introduction
2 Literature
3 Research Methodology
4 Findings
4.1 Understanding and Perception
5 Recommendations
5.1 Privacy Policies: Tinder
5.2 Privacy Policy: Facebook
5.3 Instagram
5.4 Spotify
5.5 Similarities
6 Conclusion
References
Correlation Analysis of Student's Competencies and Employ-Ability Tracer Study of Telkom University Graduates
1 Introduction
2 Methodology
2.1 Spearman's Rank-Order Correlation
2.2 Chi-Square Test of Independence
2.3 Logit Regression Correlation Analysis
2.4 Data Preprocessing
3 Results and Discussion
4 Conclusion
References
Hardware Design and Implementation of a Low-Cost IoT-Based Fire Detection System Prototype Using Fuzzy Application Methods
1 Introduction
1.1 Background Study
2 Related Works
3 Methodology
4 Fuzzy Application Methods
4.1 Derived Mathematical Fuzzy-Based Membership Functions (MF) of the Proposed Fire Detection System Prototype
4.2 Proposed Fuzzy Logic Controller for the Low-Cost Fire Detection System
4.3 Architectural Overview of the Proposed Fuzzy-Based Fire Detection System Prototype
5 Schematic Circuit Design of the Proposed Fire Detection System Prototype
5.1 Hardware Requirement
5.2 Software Requirement
6 Framework of the Proposed Fire Detection System Prototype Using Fuzzy Methods
6.1 Lab. Experimental Setup
6.2 Serial Monitor Output
6.3 Extracted Summary of Obtained Result Output from Lab. Experiment
7 Results and Discussion
8 Performance Evaluation of the Proposed Fire Detection System Prototype
9 Conclusion and Future Works
References
Closing the Data Gap: A Comparative Study of Missing Value Imputation Algorithms in Time Series Datasets
1 Introduction
2 Imputation Methods for Time Series
2.1 K-Nearest Neighbor Imputation
2.2 Expectation-Maximization Imputation
2.3 Multiple Imputation by Chained Equations
3 Experimental Results
3.1 Dataset Description
3.2 Methodology
3.3 Results and Evaluation
4 Conclusion
References
Motivation to Learn in an E-learning Environment with Fading Mark
1 Introduction
2 Method
3 Results and Discussion
4 Conclusion
References
Hub Operation Pricing in the Intermodal Transportation Network
1 Introduction
2 Intermodal Transportation Network
3 Freight Flow Assignment
4 A Single Layer of Hubs in the Case of Affine Functions
5 Strategies for Intermodal Hub Operation Pricing
6 Conclusion
References
A New Approach to Eliminating the “Flip” Effect of the Approximating Function Under Conditions of a Priori Uncertainty
1 Introduction
2 Formulation of the Problem
3 Discussion of Research Results
4 Conclusions
References
Modeling the Alienability of an Electronic Document
1 Introduction
2 Mathematical Formulation of the Problem of Assessing the Alienability of an Electronic Document
3 Mathematical Model of the Alienability of an Electronic Document
4 Mathematical Model of the Alienability of the Original Electronic Document
5 Mathematical Model of Alienability of a Normalized Copy of an Electronic Document
6 Development of a Mathematical Model of Metadata Alienability
7 Development of a Mathematical Model of Alienability of Related Data
8 An Example of a Scale of Values for Assessing the Probability of Non-alienation
9 Conclusion
References
Automatic Generation of an Algebraic Expression for a Boolean Function in the Basis {∧, ∨, }
1 Introduction
2 Method
3 Results and Discussion
4 Conclusion
References
Applying a Recurrent Neural Network to Implement a Self-organizing Electronic Educational Course
1 Introduction
2 Method
3 Results and Discussion
4 Conclusion
References
Empowering Islamic-Based Digital Competence and Skills: How to Drive It into Reconstructing Safety Strategy from Gender Violence
1 Introduction
2 Literature Review
2.1 Digital Competence and Skills
2.2 Digital Safety Strategy from Gender Violence
3 Methodology
4 Analysis and Discussion
4.1 Driving Pathway of Digital Competence and Skills for Safety Strategy from Gender Violence
4.2 Adapting Digital Competence and Practical Skills for Safety Strategy from Gender Violence
4.3 Empowering Digital Competence and Skills for Safety Strategy from Gender Violence
4.4 Expanding Knowledge Comprehension for Safety Strategy from Gender Violence
4.5 Strengthening Practical Skills as Continued Improvement for Safety Strategy from Gender Violence
5 Conclusion
References
From Digital Ethics to Digital Community: An Islamic Principle on Strengthening Safety Strategy on Information
1 Introduction
2 Literature Review
2.1 Understanding of Digital Ethics
2.2 Digital Ethics as Strategic Skills in Digital Community
2.3 Digital Ethics and Digital Trust as Key Element for Safety Strategy
3 Methodology
4 Analysis and Discussion
4.1 Expanding Safety Strategy Through Digital Ethics for Information Assurance
4.2 Enhancing Safety Strategy Through Digital Ethics-Based Information Transparency Assurance
4.3 Empowering Safety Strategy Through Digital Ethics on Information Accuracy
5 Conclusion
References
Cyber Security Management in Metaverse: A Review and Analysis
1 Introduction
2 Evolution of the Metaverse
3 Metaverse and Emerging Technologies
4 The Relationship Between Metaverse and Virtual Reality
5 Metaverse Security Challenges
6 Analysis of the Cyber Security Controls for the Metaverse
7 Discussions and Recommendations
8 Conclusions
References
Enhancing Educational Assessment: Leveraging Item Response Theory’s Rasch Model
1 Item Response Theory (IRT)
1.1 Key Principles and Foundations of Item Response Theory
1.2 Types of IRT Models
1.3 Advantages of IRT Over Classical Test Theory in Educational Assessment
2 Rasch Model
3 Research and Results
4 Conclusion
References
Particular Analysis of Regression Effect Sizes Applied on Big Data Set
1 Introduction
2 Exploration of Behaviour of Regression Effect Size
3 Results
4 Conclusion
References
Applied Analysis of Differences by Cross-Correlation Functions
1 Introduction
2 Applied Observing Differences by Cross-Correlations
3 Results
4 Conclusion
References
Paraphrasing in the System of Automatic Solution of Planimetric Problems
1 Introduction
2 Methodology
3 Experiments Results
3.1 Paraphrasing and Syntax
3.2 An Expanded View of Paraphrasing
4 Discussion
5 Conclusion
References
The Formation of Ethno-Cultural Competence in Students Through the Use of Electronic Educational Resources
1 Introduction
2 Methods
3 Results
4 Discussion
5 Conclusion
References
A Model of Analysis of Daily ECG Monitoring Data for Detection of Arrhythmias of the “Bigeminy” Type
1 Introduction
2 Methods
3 Results
4 Conclusion
References
Development of a Data Mart for Business Analysis of the University’s Economic Performance
1 Introduction
2 Research Methodology
2.1 Data Consolidation
2.2 Multidimensional Model
3 Research Results and Discussion
3.1 “University Economic Performance” Dashboard
3.2 Dashboards “Income from the Budget Form of Financing” and “Income from the Contract Form of Financing”
4 Conclusion
References
Explainability Improvement Through Commonsense Knowledge Reasoning
1 Introduction
2 Related Work
2.1 Explainable AI
2.2 Complexity
2.3 Scope
2.4 Dependency
2.5 Commonsense Reasoning
3 Methodology
3.1 Problem Statement
3.2 Proposed Methodology
3.3 Dataset Description
4 Result and Discussions
4.1 Experimental Design
4.2 Result
5 Conclusions
References
Approximability of Semigroups with Finiteness Conditions
1 Representation of Finite Semigroups by Graphs
2 Finite Approximation of Semigroups
3 Conclusion
References
Semigroup Invariants of Graphs with Respect to Their Approximability
1 Introduction. The Problem of Isomorphism of Graphs and Semigroups
2 Semigroup Invariants of Graphs
3 Main Theorem
4 Conclusion
References
Algorithmizing Aspects of Some Combinatorial Block-Designs Implemented in Network Systems
1 Introduction
2 Methods
2.1 Parameters of Network Systems with Combinatorial Block Design Structure
2.2 On Algorithmization of CBD and CCBD
3 Results: Algorithms
3.1 Algorithms for Systems of Steiner Triples [1]
3.2 Algorithms for Projective Planes PP(2,n) Based on Block Bases
3.3 Algorithms for Projective Geometries PG(3,n) Based on Block Bases
3.4 Algorithms for Projective Planes PP(2,n) Based on the Balancing of Element and Block Identifiers
3.5 Algorithms for Projective Geometries PG(3,n) Based on the Balancing of Element and Block Identifiers
3.6 Algorithms for Cyclic Projective Planes PP(2,n) and
3.7 Algorithms for Linear Transversal Combinatorial Block-Designs TD(2,k,n)
3.8 Algorithms for Quadratic Transversal Combinatorial Block-Designs TD(3,k,n)
4 Discussion: About Using Basic Algorithms
4.1 Algorithms for Affine Geometries
4.2 Other Compositions of Basic Algorithms
4.3 About Numerical Notations of Algorithms
4.4 On Algorithms Combined CBD Blocks and Dual Block Computing
5 Analisys: Complexity Estimation, Examples
5.1 Algorithms Complexity Estimation
5.2 Same Examples of Algorithms Implementation
6 Conclusion
References
Spectral Method of Analysis and Complex Processing of Video Information from Multi-Zone Images
1 Introduction. Problem Statement
2 System State Model
3 Computational Algorithm
4 Conclusion
References
Cyber-Physical Control System for Personal Protective Equipment Against Infectious Diseases Transmitted by Airborne Droplets
1 Introduction
2 Methods
3 Results and Discussion
4 Conclusion
References
Concept of Smart Personal Protection Equipment Against Infectious Diseases
1 Introduction
2 Methods
3 Results and Discussion
4 Conclusion
References
Software for Urban Space Researching with Public Data for Irkutsk
1 Introduction
2 Data Sources
3 Methods
3.1 Data Collection Methods
3.2 Data Analysis Methods
3.3 Data Visualization
4 Analysis Results
5 Conclusions
References
Core-Intermediate-Peripheral Index: Factor Analysis of Neighborhood and Shortest Paths-Based Centrality Metrics
1 Introduction
2 Factor Analysis of Centrality Dataset
3 Evaluation with Real-World Networks
4 Related Work
5 Conclusions and Future Work
References
Multipole Engineering of Optical Forces
1 Introduction
2 Methods
3 Results
4 Discussions
5 Conclusion
References
Data Mart in Business Intelligence with Ralph Kimball for Commercial Sales
1 Introduction
2 Materials and Methods
2.1 Project Planning
2.2 Ralph Kimball Methodology
2.3 Business Model
2.4 Identification of Measurements and the Facts Table
2.5 Milestones
2.6 Dimensional Model
2.7 Data Mart Design
2.8 Resolution of Milestones
2.9 Architecture
3 Results
4 Conclusions
References
Intelligent Endoscopic Examination of Internal Openings for Drilling Quality Control
1 Introduction
2 State of the Art
3 Methods
4 Results
5 Discussion
6 Conclusion
References
Foreign Languages Teaching Technologies and Methods in Traditional and Distance Forms of Learning
1 Introduction
2 Methods
2.1 Project-Based Method
2.2 Collaborative Learning
2.3 The Use of the Language Portfolio
2.4 Audiovisual and Computer Technologies
2.5 Distance Learning
2.6 Conclusions
3 Results
4 Discussion
5 Conclusion
References
The Usage of Distance Educational Technologies for Learning English
1 Introduction
2 Methods
3 Results
4 Conclusion
References
Evaluating the Effectiveness of Flipped Classrooms Using Linear Regression
1 Introduction
2 Methods
3 Results and Discussion
4 Conclusion
References
Building a Digital Twin of a Social Media User Based on Implicit Profile Data
1 Introduction
2 State of the Art
3 Methods
4 Results
5 Discussion
6 Conclusion
References
Analysis of a Data Set to Determine the Dependence of Airline Passenger Satisfaction
1 Introduction
2 Data Science
3 Common Dataset
4 Partitioning the Data Set into Groups
4.1 Class
4.2 Gender
4.3 Type of Travel
5 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Data Analytics in System Engineering: Pr
✍ Radek Silhavy (editor), Petr Silhavy (editor) 📂 Library 📅 2024 🏛 Springer 🌐 English

<span>These proceedings offer an insightful exploration of integrating data analytics in system engineering. This book highlights the essential role of data in driving innovation, optimizing processes, and solving complex challenges in the field. Targeted at industry professionals, researchers, and

Software Engineering Methods in Systems
✍ Radek Silhavy (editor), Petr Silhavy (editor) 📂 Library 📅 2024 🏛 Springer 🌐 English

<span>This book presents cutting-edge research and methodologies in software engineering, specifically focusing on systems and network systems. It showcases novel development approaches and network system optimizations, highlighting the field's dynamic evolution. The book is designed for experts, sc

Software Engineering Methods in Systems
✍ Radek Silhavy (editor), Petr Silhavy (editor) 📂 Library 📅 2024 🏛 Springer 🌐 English

<span>This book presents cutting-edge research and methodologies in software engineering, specifically focusing on systems and network systems. It showcases novel development approaches and network system optimizations, highlighting the field's dynamic evolution. The book is designed for experts, sc

Data Science and Intelligent Systems: Pr
✍ Radek Silhavy (editor), Petr Silhavy (editor), Zdenka Prokopova (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<div>This book constitutes the second part of refereed proceedings of the 5th Computational Methods in Systems and Software 2021 (CoMeSySo 2021) proceedings. The real-world problems related to data science and algorithm design related to systems and software engineering are presented in this papers.

Software Engineering Application in Info
✍ Radek Silhavy (editor), Petr Silhavy (editor), Zdenka Prokopova (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book constitutes the first part of refereed proceedings of the 5th Computational Methods in Systems and Software 2021 (CoMeSySo 2021). The CoMeSySo 2021 Conference is breaking the barriers, being held online. CoMeSySo 2021 intends to provide an international forum for the discussion of

Software Engineering Perspectives in Sys
✍ Radek Silhavy (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>The study of software engineering and its applications to system engineering is critical in computer science research. Modern research methodologies, as well as the use of machine and statistical learning in software engineering research, are covered in this book. This book contains the ref