<span>These proceedings offer an insightful exploration of integrating data analytics in system engineering. This book highlights the essential role of data in driving innovation, optimizing processes, and solving complex challenges in the field. Targeted at industry professionals, researchers, and
Data Analytics in System Engineering: Proceedings of 7th Computational Methods in Systems and Software 2023, Vol. 4 (Lecture Notes in Networks and Systems, 935)
â Scribed by Radek Silhavy (editor), Petr Silhavy (editor)
- Publisher
- Springer
- Year
- 2024
- Tongue
- English
- Leaves
- 550
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
These proceedings offer an insightful exploration of integrating data analytics in system engineering. This book highlights the essential role of data in driving innovation, optimizing processes, and solving complex challenges in the field. Targeted at industry professionals, researchers, and enthusiasts, this book serves as a comprehensive resource, providing actionable insights and showcasing transformative applications of data in engineering. It is a must-read for anyone keen on understanding and participating in the ongoing evolution of system engineering in our data-centric world.
⌠Table of Contents
Preface
Organization
Contents
Evaluating the Reliability of Tests Used in LMS Moodle for E-Learning
1 Introduction
2 Methods
3 Results
4 Conclusion
References
Data Mart in Business Intelligence with Hefesto for Sales Area in a Dental Clinic
1 Introduction
2 Materials and Methods
2.1 Requirements Analysis. [Phase 1-Hefesto]
3 Results and Discussion
4 Conclusion
References
Features of Building Automated Educational Systems with Virtual and Augmented Reality Technologies
1 Introduction
2 Methods
3 Results and Discussion
4 Conclusion
References
Information and Communication Technology Skills for Instruction Performance: Beliefs and Experiences from Public School Educators
1 Introduction
2 Problem Statement
3 Methodology
4 Results
4.1 Information and Communication Technology (ICT) Skills for Instruction Performance
4.2 The Effectiveness ICT Applications on Supporting Instruction Performances
5 Discussion
6 Conclusion
References
Managing Information Quality for Learning Instruction: Insights from Public Administration Officersâ Experiences and Practices
1 Introduction
1.1 Problem Statement and Objectives
2 Literature Review
3 Methodology
3.1 Design of Study
3.2 Respondent Zone
4 Research Results and Discussion
4.1 Practical Implementation of Information Quality Achievement on Preaching Program
4.2 Process of Information Accuracy Enhancement Through Preaching Materials Arrangement
5 Conclusion
References
Development of Multivariate Stock Prediction System Using N-Hits and N-Beats
1 Introduction
2 Literature Review
2.1 Neural Hierarchical Interpolation for Time Series Forecasting (N-HiTS)
2.2 Neural Basis Expansion Analysis for Interpretable Time Series Forecasting (N-BEATS)
3 Methodology
4 Result and Discussion
4.1 Data Preprocessing
4.2 Model Construction
4.3 Model Result and Analysis
4.4 Application Result
5 Conclusion
References
Fractal Method for Assessing the Efficiency of Application of Closed Artificial Agroecosystems
1 Introduction
2 Materials and Methods
3 Discussion
4 Conclusion
References
Application of a Bioinspired Search Algorithm in Assessing Semantic Similarity of Objects from Heterogeneous Ontologies
1 Introduction
2 Analytical Overview and Problem Statement
3 Approach to Semantic Similarity Assessment
4 Modified Bioinspired Algorithm of White Mole Colony
5 Experiment
6 Conclusion
References
Leveraging Deep Object Detection Models for Early Detection of Cancerous Lung Nodules in Chest X-Rays
1 Introduction
2 Related Works
3 Methods and Materials
3.1 Faster-RCNN
3.2 Yolov5
3.3 EfficientDet
3.4 Dataset
3.5 Data Preprocessing and Format Conversion
3.6 Training and Validation
3.7 Training Configurations
3.8 Training Parameters
3.9 Final Architecture of the System
4 Results and Deployment
5 Conclusion
References
Analyzing Data by Applying Neural Networks to Identify Patterns in the Data
1 Introduction
2 Materials and Method
3 Results
4 Discussion
5 Conclusion
References
Intelligent Data Analysis as a Method of Determining the Influence of Various Factors on the Level of Customer Satisfaction of the Company
1 Introduction
2 Methods and Materials
3 Results
3.1 Analysis of All Attributes
3.2 Analyzing Two Groups of Attributes
3.3 Analyzing the Attributes with the Highest Importance
3.4 Analysis of Attributes with the Highest Correlation Coefficient
4 Conclusion
References
Correlation Analysis and Predictive Factors for Building a Mathematical Model
1 Introduction
2 Data Research
3 Conclusion
References
Geoportals in Solving the Problem of Natural Hazards Monitoring
1 Introduction
2 Related Work and Research Methods
3 Analysis of the Distribution of Spectral Channels in the Problem of Land Classification
4 Fire Monitoring by Means of Geoportals
5 Conclusion
References
Implementation of Individual Learning Trajectories in LMS Moodle
1 Introduction
2 Implementation of the Logic of Learning by Individual Trajectory in LMS Moodle on the Basis of the Concept of Reverse Programming
3 Conclusion
References
Application of Fuzzy Logic for Evaluating Student Learning Outcomes in E-Learning
1 Introduction
2 Methods
3 Results and Discussion
4 Conclusion
References
Advancing Recidivism Prediction for Male Juvenile Offenders: A Machine Learning Approach Applied to Prisoners in Hunan Province
1 Introduction
1.1 Research Goal
2 Related Works
3 Methodology
3.1 SAVRY
3.2 Dataset
3.3 Data Pre-processing
3.4 Feature Selection Method
3.5 Hyper Parameter Optimization
3.6 Learning Algorithms
3.7 Performance Metrics
3.8 Exploration with Ensemble Models
4 Results and Discussion
4.1 Performance Metrics Comparison for Various Algorithms
4.2 Performance Analysis of Different Algorithms with Hyperparameter Optimization
4.3 Performance Analysis of Different Algorithms After Using Various Feature Selection Methods
4.4 Error Analysis on Different Algorithms
4.5 Explainable AI
5 Conclusion and Future Scope
References
Development of Automated Essay Scoring System Using DeBERTa as a Transformer-Based Language Model
1 Introduction
2 Related Works
2.1 Traditional Approach
2.2 Deep Learning Approach
2.3 Pre-trained Language Model Approach
3 Methodology
3.1 Dataset Used
3.2 Text Preprocessing
3.3 Score Normalization
3.4 Loss Function
3.5 Evaluation Metric
3.6 Data Flow Diagram (DFD) System Design
4 Experiments
4.1 Automated Essay Scoring Model
4.2 Setup
4.3 Result and Discussions
5 Conclusion and Future Work
References
Prediction of Glycemic Control in Diabetes Mellitus Patients Using Machine Learning
1 Introduction
2 Related Works
3 Methodology
3.1 Dataset
3.2 Exploratory Data Analysis
3.3 Data Preprocessing
3.4 Splitting Dataset
3.5 Feature Selection
3.6 Min-Max Scaling
3.7 Under Sampling Technique
3.8 SMOTE
3.9 Classifiers Algorithms and Hyper-parameter Optimization
4 Experiment and Results
4.1 Performance Metrics
4.2 Experimental Results Without Sampling Technique
4.3 Experimental Results with Under Sampling Technique
4.4 Experimental Results with SMOTE
4.5 Learning Curve
4.6 LIME
4.7 SHAP
5 Discussion
6 Conclusion
References
Efficient Object Detection in Fused Visual and Infrared Spectra for Edge Platforms
1 Introduction
2 Related Work
3 Methodology
3.1 The Proposed Architecture for Spectra Fusion
3.2 Fusion Mechanism
4 Experimental Results
4.1 Dataset
4.2 Training
5 Conclusions
References
Designing AI Components for Diagnostics of Carotid Body Tumors
1 Introduction
2 Research Method
3 Results
3.1 Development of the RADIMALIB Library
4 Discussion and Future Work
References
A Review of the Concept, Applications, Risks and Control Strategies for Digital Twin
1 Introduction
2 Concept of Digital Twins
3 Architectural Context of Digital Twins
4 Application of Digital Twins
4.1 The Technologies Enabling Digital Twins
5 Risks and Challenges Associated with Digital Twins
6 Integration of Interdisciplinary Model
6.1 Risk Control Strategies for Digital Twins
7 Discussions and Recommendations
8 Conclusions
References
Processing of the Time Series of Passenger Railway Transport in EU Countries
1 Introduction
2 Data and Methods
2.1 Source Data from the Eurostat Database
2.2 Data Mining Software Orange and Design of Workflow
3 Results
4 Discussion
5 Conclusion
References
Factors Influencing Performance Evaluation of e-Government Diffusion
1 Introduction
2 Related Work
3 Research Model and Hypothesis
4 Research Methodology
4.1 Data Collection
4.2 Questionnaire Design
5 Results
5.1 Descriptive Statistics
5.2 Reliability Test
5.3 Factor Analysis
5.4 Regression Analysis
6 Data Analysis and Discussion
7 Limitations
8 Conclusion
References
An Analysis of Readiness for the Adoption of Augmented and Virtual Reality in the South African Schooling System
1 Introduction
1.1 Background of the Study
2 Related Studies
3 Methodology
3.1 Research Methodology
3.2 Sampling Techniques
3.3 Hypothesis for the Study
4 Experiments and Results
4.1 Reliability and Validity
4.2 Factor Analysis
4.3 Descriptive Statistical Analysis
4.4 One Sample t-test
4.5 Regression
5 Conclusion
References
Review of Technology Adoption Models and Theories at Organizational Level
1 Introduction
2 Literature Review
2.1 Defining Technology Adoption
2.2 Technology Adoption Theories and Models
3 The Systematic Review of the Empirical Literature on Technology-Organization-Environment (TOE) Framework
3.1 The Studies that Used (TOE) Framework with Other Theories
4 Discussion
5 Conclusion
References
Algorithmic Optimization Techniques for Operations Research Problems
1 Understanding the Landscape of Optimization
1.1 Modeling the Real World
1.2 Crafting the Blueprint of Optimization
2 Applications of Algorithmic Optimization
3 Conclusion and Challenges
References
Complex Comparison of Statistical and Econometrics Methods for Sales Forecasting
1 Introduction
2 Background
3 Data
4 Experiments Design
5 Metrics
6 Models
6.1 Baseline Models
6.2 Exponential Smoothing Models
6.3 Sparse or Intermittent Models
6.4 Multiple Seasonalities
6.5 Theta Family
6.6 ARCH Family
6.7 ARIMA Family
7 Results
8 Discussion and Future Work
9 Conclusion
References
The Meaning of Business and Software Architecture in the Enterprise Architecture
1 Business Architecture is the Bridge Between Software Architecture and Enterprise Architecture
2 Overlap of the Three Architectures
3 Basic Aspects of Building the Business Architecture
4 Conclusion
References
Towards Data-Driven Artificial Intelligence Models for Monitoring, Modelling and Predicting Illicit Substance Use
1 Introduction
1.1 Significance of the Study
2 Materials and Method
2.1 Study Design
2.2 Search Strategy
2.3 Study Selection and Eligibility Criteria
2.4 Data Extraction
2.5 Risk-of-Bias and Quality Assessment of Included Sources
3 Results Analysis and Discussion
3.1 Analysis of Risk-of-Bias
3.2 Artificial Intelligence Models for Predicting Illicit Substance Abuse
3.3 Risk Factors for Modelling Substance Abuse Using Artificial Intelligence Models
4 Barriers, Challenges and Recommendations for Integrating Data-Driven Artificial Intelligence Models for Tackling Illicit Substance Use
5 Conclusion
References
On the Maximal Sets of the Shortest Vertex-Independent Paths
1 Introduction
2 Preliminary Information: Definitions and Notations
3 Problem Statement
4 Algorithm Description
4.1 Algorithm 1
4.2 Algorithm 2
5 Modeling of Test Cases
6 Conclusion
References
Using Special Graph Invariants in Some Applied Network Problems
1 Introduction. The Problem of Isomorphism of Graphs
2 Preliminaries
3 Some Results of Computational Experiments
4 Theorem on the Relation of the Randich Index and the Double Vector
5 Conclusion
References
Analysis of Digital Analog Signal Filters
1 Introduction
2 Noise Synthesis
3 Signal Generation
4 Filters
4.1 Arithmetic Mean Filter
4.2 Median Filter
4.3 Exponential Running Average
4.4 Simple Kalman Filter
5 Comparative Analysis of Filters
6 Conclusion
References
Readiness for Smart City in Municipalities in Mbabane, Eswatini
1 Introduction
2 Related Work
3 Research Model and Hypothesis
4 Research Methodology
4.1 Data Collection
4.2 Questionnaire Design
5 Results
5.1 Reliability Test
5.2 Factor Analysis
6 Limitations
7 Conclusion
References
Assessment of Investment Attractiveness of Small Enterprises in Agriculture Based on Fuzzy Logic
1 Introduction
2 Methods, Models, Data
2.1 Unification of Indicators for Assessing Investment Attractiveness
3 Results
4 Discussions
References
Security in SCADA System: A Technical Report on Cyber Attacks and Risk Assessment Methodologies
1 Introduction
1.1 Background
1.2 Problem Statement
1.3 Objectives
1.4 Scope and Methodology
2 Overview of SCADA System
2.1 SCADA Layers
2.2 SCADA Architecture
2.3 SCADA Generations
2.4 Key Characteristics of SCADA System
3 The Evolving Threat Landscape: Common Attack Vectors and Vulnerabilities Specific to SCADA Systems
3.1 Threats and Attacks on SCADA
3.2 Common Attack Vectors
3.3 Vulnerabilities in SCADA Systems
4 Related Work
4.1 Compatibility Table
5 Methodology
5.1 Data Collection
5.2 Research Design
5.3 Data Analysis
5.4 Ethical Considerations
5.5 Limitations
5.6 Validity and Reliability
6 Risk Assessment Methodologies: Identifying, Analyzing, and Mitigating Risks
6.1 Importance of Risk Assessment in SCADA Systems
6.2 Risk Assessment Frameworks
6.3 Risk Assessment Approaches
6.4 Risk Mitigation Strategies
7 Implications of Effective Risk Assessment in Enhancing the Security of SCADA Systems
7.1 Proactive Identification of Vulnerabilities and Risks
7.2 Prioritization of Security Investments and Resource Allocation
7.3 Compliance with Regulations and Standards
7.4 Improved Incident Response and Resilience
7.5 Adaptation to Evolving Threat Landscape
7.6 Continuous Improvement of Security Measures
8 Future Trends Related to SCADA Systems
8.1 Comprehensive Analysis
9 Results and Discussion
9.1 Vulnerabilities in SCADA Systems
9.2 Common Attack Vectors
9.3 Risk Assessment Methodologies
9.4 Implications of Effective Risk Assessment
9.5 Case Studies
9.6 Limitations and Future Research
10 Summary and Conclusion
10.1 Key Findings
10.2 Conclusion
References
A Shap Interpreter-Based Explainable Decision Support System for COPD Exacerbation Prediction
1 Introduction
2 Previous Work
3 Materials and Methods
3.1 Dataset of COPD Patients
3.2 Classification Models
3.3 Evaluation Metrics
3.4 The Context of SHAP Interpreter
4 Results and Discussion
5 Conclusion
References
A Generic Methodology for Designing Smart Environment Based on Discrete-Event Simulation: A Conceptual Model
1 Introduction
2 Literature
3 Smart Environment, Technologies, and Smartness Features
4 Simulation-Based Assessment of Smart Enabling Technology: Proposed Methodology
4.1 Defining the Model: The Processes Parameters
4.2 Designing a Smart Environment Based on Discrete-Event Simulation the methodology
5 Conclusion
References
From Algorithms to Grants: Leveraging Machine Learning for Research and Innovation Fund Allocation
1 Introduction
2 Literature Review
2.1 Text Classification Algorithms
2.2 Related Works
3 Methodology
3.1 Design and Implementation of the Web Based System
3.2 Model Design and Implementation
4 Results and Discussions
4.1 Text Classification Modelsâ Performance
4.2 The Support Vector Machine (SVM)
5 Conclusion
6 Recommendations and Future Work
References
Ways and Directions of Development of the Terminal of Increased Security for Biometric Identification When Interacting with the Russian Unified Biometric System
1 Introduction
1.1 General Information
1.2 The Problem of Protecting Biometric Identification Endpoints
1.3 Legal Aspects of Biometrics Use in Russia
1.4 Unified Biometric System. Overview of the System and Interaction Procedures
2 Methodology
2.1 Justification of the Choice of the Way of Development of Biometric Terminal of Increased Security
2.2 The Concept of a Biometric Terminal with Enhanced Security
2.3 Building a Threat Model for a Biometric Authentication System
3 Discussion
4 Conclusion
References
Research of the Correlation Between the Results of Detection the Liveliness of a Face and Its Identification by Facial Recognition Systems
1 Introduction
1.1 General Information
1.2 Literature Review
2 Methodology
2.1 Tasks of Face Recognition and Anti-spoofing
2.2 Data Sets Used
3 Results and Discussion
4 Conclusion
References
Cooperative Cost Sharing of Joint Working Capital in Financial Supply Networks
1 Financial Supply Chain and its Management Tools
1.1 Cooperation in Financial Supply Chains
1.2 Collaborative Cash Conversion Cycle Formalization
2 Reduction and Allocation of Joint Working Capital Costs
2.1 Working Capital Costs for a Single Company
2.2 Game-Theoretical Approach for Joint Working Capital Cost Sharing
2.3 Coalition Payoffs
2.4 Example
3 Conclusion
References
Profit Prediction Model for Steel Enterprises Based on Commodity Prices of Inputs and Outputs
1 Introduction
2 Related Work
3 Approach
3.1 General
3.2 Methodology
3.3 Model Performance
3.4 Specific Conclusions
3.5 Expand and Optimize the Model
3.6 The Continuous Upgrade Model
3.7 Building a Weekly Predictive Model
3.8 Model for Enterprises Using EAF Technology
3.9 Specific Conclusions
4 Conclusions
References
Author Index
đ SIMILAR VOLUMES
<span>This book presents cutting-edge research and methodologies in software engineering, specifically focusing on systems and network systems. It showcases novel development approaches and network system optimizations, highlighting the field's dynamic evolution. The book is designed for experts, sc
<span>This book presents cutting-edge research and methodologies in software engineering, specifically focusing on systems and network systems. It showcases novel development approaches and network system optimizations, highlighting the field's dynamic evolution. The book is designed for experts, sc
<div>This book constitutes the second part of refereed proceedings of the 5th Computational Methods in Systems and Software 2021 (CoMeSySo 2021) proceedings. The real-world problems related to data science and algorithm design related to systems and software engineering are presented in this papers.
<p><span>This book constitutes the first part of refereed proceedings of the 5th Computational Methods in Systems and Software 2021 (CoMeSySo 2021). The CoMeSySo 2021 Conference is breaking the barriers, being held online. CoMeSySo 2021 intends to provide an international forum for the discussion of
<p>This book constitutes the refereed proceedings of the 4th Computational Methods in Systems and Software 2020 (CoMeSySo 2020) proceedings. Software engineering, computer science and artificial intelligence are crucial topics for the research within an intelligent systems problem domain. The CoMeSy