<span>This book presents cutting-edge research and methodologies in software engineering, specifically focusing on systems and network systems. It showcases novel development approaches and network system optimizations, highlighting the field's dynamic evolution. The book is designed for experts, sc
Software Engineering Application in Informatics: Proceedings of 5th Computational Methods in Systems and Software 2021, Vol. 1 (Lecture Notes in Networks and Systems, 232)
✍ Scribed by Radek Silhavy (editor), Petr Silhavy (editor), Zdenka Prokopova (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 1020
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the first part of refereed proceedings of the 5th Computational Methods in Systems and Software 2021 (CoMeSySo 2021). The CoMeSySo 2021 Conference is breaking the barriers, being held online. CoMeSySo 2021 intends to provide an international forum for the discussion of the latest high-quality research results.
The software engineering, computer science, and artificial intelligence are crucial topics for the research within an intelligent systems problem domain.
✦ Table of Contents
Preface
Organization
Program Committee
Program Committee Chairs
International Program Committee Members
Organizing Committee Chair
Conference Organizer (Production)
Conference Website, Call for Paper
Contents
Relationship Between the Level of Economic Development and Education Level of the Employed Population
1 Introduction
2 Literature Review
3 Methodology, Materials and Research Methods
4 Research Results
5 Discussion
6 Conclusion
References
Replacing the Reinforcement Learning (RL) to the Auto Reinforcement Learning (AutoRL) Algorithms to Find the Optimal Structure of Business Processes in the Bank
1 Introduction
2 RL – AutoRL Replacement Specifics
3 AutoRL Usage Algorithm
4 Conclusions
References
Features of Using Programs for Casting Processes Modeling
1 Introduction
2 Materials and Methods
3 Experimental Results and Discussion
4 Conclusion
References
Development of an Information System to Help Identify Symptoms and Predict the Spread of COVID-19 Using Artificial Intelligence
1 Introduction
2 The Application of Neural Networks to Classification of Users Group at Risk
3 The Forecasting the Spread of Infection
4 The User Interaction with the Program
5 Conclusion
References
Use of Analytic Hierarchy Process in Tasks of Knowledge Visualization
1 Introduction
2 Stages of Applying Saaty’s Analytic Hierarchy Method
3 Conclusion
References
Blockchain-Oriented Software Development Issues: A Literature Review
1 Introduction
2 Background
3 Research Design
4 Data Analysis and Results
5 Conclusion and Future Works
References
Identification of Magnetic Levitation System
1 Introduction
2 Input Data Processing
2.1 Gathering Input Data
2.2 Input Data Processing Using Moving-Average Filter
2.3 Input Data Processing Using Fast Fourier Transform Filter
2.4 Comparison of the Input Data Processing Methods
3 First Principle Modeling
3.1 Introduction to CE 152 System
3.2 Identification Directly Measurable Parameters
3.3 Identification Remaining Parameters
4 Verification of the Model
4.1 Design of Simply Control Circuit for the CE 152 System
4.2 Verification by Simulation and Real-World Experiment
5 Conclusion
References
The Optimal Model for Consumers’ E-wallets Usage Intention
1 Introduction
2 Literature Review
2.1 E-wallets
2.2 Unified Theory of Acceptance and Use of Technology (UTAUT)
2.3 Usage Intention
2.4 Performance Expectancy
2.5 Effort Expectancy
2.6 Social Influence
2.7 Facilitating Conditions
2.8 Promotion
2.9 Perceived Privacy and Security
3 Research Methodology
3.1 Analytical Technique
3.2 Data and Sample
4 Results and Discussion
4.1 Results
4.2 Discussion
5 Conclusions and Limitations
References
Issues and Possibilities of Personal Data Remote Processing in the COVID19 Pandemic Environment
1 Statement of the Problem
2 Requirements of Regulators for the Personal Data Protection
3 Technical Aspects of the Remote Personal Data Processing
4 Organizational and Legal Aspects of the Remote Personal Data Processing
4.1 Identification and Authentication of Access Subjects and Access Objects (IAF)
4.2 Access Control of Access Subjects to Access Objects (UPD)
4.3 Software Environment Limitation (OPS)
4.4 Protection of Data Digital Media (ZNI)
4.5 Security Event Logging (RSB)
4.6 Antivirus Protection (AVZ)
4.7 Intrusions Detection (Prevention) (SOV)
4.8 Personal Data Security Control (Analysis) (ANZ)
4.9 Ensuring the Integrity of the Information System and Personal Data (OCL)
4.10 Ensuring the Personal Data Availability (ODT)
4.11 Virtualization Environment Protection (ZSV)
4.12 Technical Equipment Protection (ZTS)
5 Conclusion
References
Oil Consumption Analysis in the USA in Current Time
1 Introduction
2 The Exponential Trend Highlighting Areas
3 Fluctuations Analysis Manifested in the Oil Consumption Dynamics
4 Search Shift Function
5 Autocorrelation Function Definition
6 Examining Critical Boundaries
7 Conclusion
References
The Nestle Share Price Dynamics Analysis and Forecasting
1 Introduction
2 The Nestle Shares Exchange Rate Analysis
3 Intensive Growth Model
3.1 First Growth Rate Model
3.2 Second Growth Rate Model
3.3 Third Growth Rate Model
4 Limited Height Model
4.1 Gompertz Model
4.2 Logistic Model
5 Near-Periods Definition
5.1 Finding Near-Periods
5.2 Finding the Restructuring Phase
6 Forecast
References
The Procter and Gamble Stock Price Dynamics Analysis and Forecasting
1 Introduction
2 The Procter and Gamble Shares Price Characteristics Analysis
3 Intensive Growth Model
4 Second Growth Rate Model
5 Limited-Growth Model (Gomperc)
6 Near-Periods Definition
7 Finding a Development Unsustainable Phase
8 Conclusion
References
Measuring the Adoption of Biometric Verification Technique Implementations on Mobile Devices
1 Introduction
1.1 Statement of the Problem, Research Questions and Objective of the Study
2 Related Work
2.1 Open Issues on the Adoption of Biometric Authentication Techniques
3 Methodology
4 Findings
4.1 Regression Analysis
5 Discussion
6 Study Limitations and Suggestions for Further Research
7 Conclusion
References
Thermal Processes with Thermal Feedback in Electronic Systems and Their Modeling by Nonlinear Matrix Equations
1 Introduction
2 Proposed Method for Solving Nonlinear Matrix Equations with a Polynomial Right-Hand Side
3 Example of Using the Method
4 Conclusion
References
Software for Determining Functional Properties of Tribological Conjugations
1 Introduction
2 Software Design
3 Conclusion
References
Algorithmic Procedure for the Reduction of the Classifier Based on the ε-, δ-criterion in the Method of Logical Analysis of Data
1 Introduction
2 Materials and Methods
3 Results
3.1 Classification of the Results of Radar Scans of the Ionosphere
3.2 SPAM Detection by Email
4 Conclusions
References
Information Security Audit Method Based on the Use of a Neuro-Fuzzy System
1 Introduction
2 Review and Analysis of the Literature
3 Statement of the Problem
4 Methods and Models
5 Software Implementation of Intelligent DSS for Information Security Audit Based on the Use of a Neuro-Fuzzy System
6 Discussion of the Results
7 Conclusion
References
Detection of Steel Surface Defects Using U-Net with Pre-trained Encoder
1 Introduction
2 Image Segmentation Using U-Net
3 Proposed Method
3.1 Overview and Motivation
3.2 Network Architecture
3.3 Evaluation Metrics
4 Steel Defect Dataset
5 Training and Experimental Results
5.1 Training and Implementation
5.2 Experimental Results and Discussion
6 Conclusions
References
Free Software at School and the Educational Process: Current State, Systematization of Typical Problems
1 Introduction
2 Review of the Literature Devoted to the Problems of Transition to Free Software (Back to the Background)
3 Materials and methods
4 Results
5 Discussion and conclusion
References
The Relationship Between the Gender; Age and Home Educational Resources and Mathematics Achievement in TIMSS 2015: Multilevel Analysis
1 Introduction
2 Method
2.1 TIMSS Survey
2.2 Measures and Covariates
3 Multilevel Analysis
3.1 Schools Difference in Mathematics Achievement
3.2 Variation of Student's Achievement as a Function of HER ``(a) at the Student's Level and (b) Across Schools
3.3 Difference Between Girls and Boys in Mathematics Achievement
3.4 Variation of Students Achievement as Function of Age: (a) at the Student's Level and (b) Across Schools
4 Results
5 Conclusion
References
Development of a Business Architecture Model and Its Role in Constructing an Organizational Architecture
1 Introduction
2 Business Architecture as an Element of the Organization Architecture
3 Relationship Between the Development Stages of Business and Software Architectures
4 Conclusion
References
Stacking-Based Ensemble Learning Method for House Price Prediction
1 Introduction
2 Related Work
3 Data Analysis and Pre-processing
3.1 Original Data
3.2 Data Correlation Analysis
3.3 Data Pre-processing
4 Ensemble Learning Based Prediction Model
4.1 Base Model Analysis
4.2 Stacking Ensemble Model
5 Results
6 Conclusion
References
Methodology for the Development of Adaptive Training Systems Based on Neural Network Methods
1 Introduction
2 Methods
2.1 Analysis of Existing Development Methodologies and Architectures of Adaptive Systems
2.2 Statement of the Research Problem
2.3 Methodology for the Development of Adaptive Training Systems
3 Results
4 Conclusion
References
Multi-agent Simulation of Agile Team Dynamics: Experiments on Team Strategies Comparisons
1 Introduction
1.1 Agent-Based Modelling
1.2 What is an Agent and Its Characteristics?
1.3 What is Multi-agent System?
1.4 Scrum Background
1.5 Pair Programming
1.6 Research Motivation
2 Literature Review
2.1 Task Allocation Research
3 Method
3.1 Strategy Design
3.2 Solo Strategy
3.3 Same Level Pairing
3.4 Cross Level Pairing
3.5 Strategy Types
3.6 Must Pair Strategy
3.7 Intelligent Pair Strategy
3.8 Evaluation Metrics
3.9 Scrum Environment, Agents and User Stories
4 Experiments
4.1 Fixed Testing
4.2 All Possible Combinations
4.3 Random Testing Setup
4.4 Experimental Result
4.5 Random Testing
5 Summary
6 Conclusion and Future Work
References
Comparison of Software Simulation and Network Testbed of DDoS Attacks for IPv4 and IPv6 Networks
1 Introduction
2 Software Simulation vs. Network Testbed
3 Experimental Scenarios and Results
4 Conclusion
References
Benchmarking NewSQL Cloud-Native or Cloud-Hosted Databases
1 Introduction
2 Related Work and Definitions
2.1 Cloud Computing
2.2 Big Data Management
2.3 Benchmarking
2.4 Database Benchmarking
2.5 Cloud Benchmarking
3 Methods
3.1 Considerations
3.2 Phases
3.3 Taxonomy
4 Discussions
4.1 Conclusions
4.2 Opportunities and Expansion Areas
References
Multifactorial Analysis in Problems of Group Pursuit
1 Introduction
2 Formulation of the Problem
3 Theory
4 Experimental Results
5 Discussion of Results
6 Conclusion
References
Personalized Diet Web-Service: Business Modeling and Development
1 Introduction
2 Market Research
3 Business Modeling and Software Engineering
4 Discussion
References
Designing a Wearable Wrist Body Thermometer Using Resistance Temperature Detector with Wireless Data for Non-contact Measurement
1 Introduction
2 Methodology
2.1 Conceptual Framework
2.2 Design of Analog Front-End for Temperature Sensor
2.3 Implementation of Wearable Wrist Thermometer
2.4 Development of Wireless Data Transmission to Cloud-Based on IEEE Std 11073-10408
2.5 Device Calibration
2.6 Device Testing
3 Results and Discussion
3.1 The Wrist Body Thermometer Using RTD with Wireless Data for Non-contact Measurement
3.2 Test for Voltage Outputs of the Front-End Readout Circuit
3.3 Device Functionality Testing
3.4 Device Accuracy Testing
3.5 Device Precision Testing
3.6 Device Efficiency Testing
3.7 Device Characterization
4 Conclusion and Recommendations
4.1 Conclusion
4.2 Recommendations
References
Internet of Things and Global System for Mobile Based Temperature and Humidity Monitoring System
1 Introduction
2 Methodology
2.1 Conceptual Framework
2.2 System Process Flowchart
2.3 IoT and SMS Notification
2.4 Setup
2.5 Hardware
2.6 Architectural Design of the Study
3 Results and Discussion
3.1 Temperature and Relative Humidity Processing
3.2 Feedbacks and Real Time Updates
3.3 Switch Feature
3.4 Quarterly Update Monitoring
3.5 Rate of Change of Temperature
3.6 Output Accuracy Test
3.7 Statistical Treatment
3.8 Application to Actual
4 Conclusion and Recommendations
4.1 Conclusion
4.2 Recommendations
References
Reliability Models for Smartphone Applications
1 Introduction
2 Reliability for Smartphone Applications
3 SRGMs Applied to Smartphone Applications
3.1 Existing Reliability Models
3.2 Datasets
3.3 Experiments
3.4 Evaluation
4 Failure Data Analysis Using Model Distributions
4.1 Results
5 Discussion
5.1 Operational Environment and Usage Profiles of Smartphones Applications
5.2 Hardware and Software Limitations
5.3 Need to Re-examine the Standard Assumptions
5.4 The Answers to the Research Questions
6 Threats to Validity
7 Conclusions
References
Non-square Multivariable System Control Case Study – Static Optimal Compensator Design and Application
1 Introduction
2 Controlled System and Compensator Design
3 Control Without Compensator
4 Control with Static Compensator
5 Conclusion
References
An Essential Intelligent Framework for Regulatory Compliance Management in the Public Sector: The Case of Healthcare Insurance in Egypt
1 Introduction
2 State of the Art
3 Proposed Framework
3.1 Framework Architecture
3.2 Design-Time Regulatory Compliance Approach
4 A Running Example
4.1 Example Overview
4.2 Results and Analysis
5 Conclusions and Future Work
References
Empowering Adaptive Learning Technology: Practical Insights from Social Network Site (SNS)
1 Introduction
2 Literature Review
2.1 Between Digital Learning and Adaptive Learning Technology
2.2 Towards Social Network Site (SNS)-Based Learning Platform
3 Methodology
4 Analysis and Discussion
4.1 Comprehensive Way for Sharing Information Across Learning Enhancement
4.2 Social Network Site-Based Learning Strategy Enhancement
4.3 Connecting Significant Interplay of Professional and Moral Responsibility
5 Conclusion
References
Digital Learning Enhancement Through Social Network Site (SNS)
1 Introduction
2 Literature Review
2.1 Social Network Site (SNS) in Education Setting
2.2 SNS for Digital Learning Enhancement
3 Methodology
4 Analysis and Discussion
4.1 Empowering Digital Learning Enhancement Through SNS Platform
4.2 Expanding Online-Based Strategic Approach for Learning Enhancement
4.3 Incorporating Professional and Ethical Balance in Learning Process
5 Conclusion
References
Measuring Success of Information System (IS) in Small and Medium Enterprises (SMEs) in Gauteng
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Collection
4 Results
4.1 Regression Analysis
5 Formal Representation of the Confirmed Regression Model
6 Conclusion
References
Evolving Technological Advancements and Its Effectivity Study in Intelligent Traffic System
1 Introduction
2 Essential of ITS
3 Existing Approaches
3.1 Routing-Based Approach
3.2 Congestion Avoidance Approach
3.3 Priority-Based Approach
3.4 Interference-Mitigation Approach
4 Research Trend
5 Research Gap
6 Conclusion
References
User-Configurable Structure of Decision Support System for Clinical Risk Management
1 Introduction
2 Methods
2.1 The Structure of the Decision Support System
2.2 User-Configurable Principles in the SACRAL-CRM
3 Results
4 Discussions
5 Conclusion
References
Heterogeneous Dynamic Hybrid Algorithm in Cloud Computing to Load Balance to Improve Cloud Server Speed Efficiency
1 Introduction
2 Problem Statement
3 Existing Load Balancing Algorithms and Method
3.1 Existing Load Balancing Algorithms and Method
4 Proposed Hybrid Load Balancing Algorithm in Cloud Computing
4.1 System Modeling
4.2 Objective Function
4.3 Proposed Hybrid Algorithm KNN-PSO
5 The Experiments Using the Proposed Hybrid Algorithm for Improving Load Balancing in Cloud Computing
5.1 The Results of the Knn-PSO Algorithm Performance Check Experiments for the Number of User Requests
6 Conclusion
References
A Machine Learning Whale Algorithm Applied to the Resource Allocation Problems
1 Introduction
2 KnapSack Problem
3 Binary Whale Algorithm
3.1 Initialization and Element Weighting
3.2 K-Means Transition Ranking Operator
3.3 Repair Operator
4 Results
4.1 Insight of BKWH Algorithm
5 Conclusions
References
Inference Methods for Evaluable Knowledge Bases
1 Introduction
2 Evaluable Knowledge Bases
3 Chaining Inference and Resolution
4 Inference Without Reductio Ad Absurdum
5 Related Work
6 Conclusion
References
A Review of e-Learning System Success Models
1 Introduction
2 Models Measuring the Success of the e-Learning Systems
2.1 The DeLone and McLean IS Success Model
2.2 A Re-specified D&M Model
2.3 The Lin’s Virtual Communities Model
2.4 The Lee-Post Model
2.5 The Wang and Chiu Model
2.6 The MELSS Model
2.7 The Dorobat’s ELSS Model
2.8 The e-Learning Success Model
2.9 The Integrated e-Learning Success Model
2.10 The Structural Model for Students’ Adoption of LMSs and Their Behavioural Intention to Use the Systems
2.11 Kurt’s e-Learning System Through the Lens of IS Success Model
3 Discussion on Issues Emerging from the Literature Review
4 Contribution to the Body of Knowledge
5 Conclusions and Future Research Work
References
Distributed Flooding Algorithm for Sensor Fusion in Synchronous/Asynchronous Wireless Sensor Networks
1 Introduction
2 Distributed Flooding Algorithm for Sensor Fusion
3 Applied Research Methodology
4 Experiments and Discussion
5 Conclusion
References
An Adaptive Network Model for Sleep Paralysis: The Risk Factors and Working Mechanisms
1 Introduction
2 Neurological Background
2.1 Regular Sleep
2.2 Sleep Paralysis
2.3 The Hallucinations
3 The Modeling Approach Used
4 The Designed Adaptive Network Model
5 Simulation Experiments
5.1 Simulation of a Regular Sleep Cycle
5.2 Simulation of Sleep Paralysis
5.3 Simulation of Sleep Paralysis with Genetic Vulnerability for Hallucinations
5.4 Simulation Sleep Paralysis Without Hallucination Due to Pimavanserin
6 Discussion
References
Localization of the Radio Signal with the Unknown Non-power Parameter
1 Introduction
2 The Problem Statement
3 The Method of Study
4 The Quasi-likelihood Estimation Algorithm
5 The Maximum Likelihood Estimation Algorithm
6 The Quasi-optimal Estimation Algorithm
7 Conclusion
References
Fast Digital Devices for Accumulating and Measuring Parameters of Deterministic and Random Signals
1 Introduction
2 Signal Integration
3 Fast Integrator Designed Based on the Rectangle Method
4 Fast Integrator Designed Based on Simpson’s Rule
5 Integrator Simulation
6 Relative Integration Error
7 Digital Root-Mean-Square Signal Meter
8 Digital Meter of Statistical Characteristics of Random Signals
9 Conclusion
References
A Method of Improving the Reliability of the Nodes Containing Ledger Replicas
1 Introduction
2 Reliability Issues of the Edge- and Fog- Processing
3 A Method of Improving the Reliability of the Nodes with Ledger Replicas
4 Simulation Results
5 Conclusion
References
A Hybrid Approach for Protecting Clinical and Genomic Data Using Lossless Stego-DNA Compression
1 Introduction
2 Related Works
3 Proposed Approach
4 Material and Methodology
4.1 Sender Side
4.2 Receiver Side
5 Experimental Results
6 Conclusion and Future Work
References
Analysis of Counterfeits Using Color Models for the Presentation of Painting in Virtual Reality
1 Introduction
2 Methods
2.1 Visual Cues Method
2.2 RGB to HSL Color Model Conversion
2.3 Color Measuring Equipment
3 Image Capture an Original Artwork
4 Digital Processing of the Scanned Image
5 Visual Comparison of Artwork in Virtual Reality
6 Conclusion
References
Application of a Process Automation Approach in Investigative Activity Flows of Investigation Units: An Experience
1 Introduction
2 Research Methodology
3 Background and Related Work
4 The Experience
4.1 Scenario
4.2 Experience Planning
4.3 Experience Execution
4.4 Results and Discussions
5 Conclusion
References
Sizing of Hybrid Renewable Energy System Based on Nature-Inspired Search Method and LPSP Model
1 Introduction
2 Related Work
3 Proposed Model
3.1 Proposed Mathematical Model of the Kestrel-Based Search Algorithm
3.2 Mathematical Model to Compute Power Generated from the Solar Plant
3.3 Mathematical Model to Compute Power Generated from Wind Plant
3.4 Model of Battery Storage
3.5 Model of Reliability
3.6 Mathematical Model on the Cost of Power from the Hybrid RES
3.7 Economic Model
3.8 Objective Function
4 Algorithmic Step to Implement the Proposed Model
5 Parameter Setting for the Model
6 Experiment Results
7 Conclusion
References
Development of a Simulation Model of Personnel Logistics of a Mining and Chemical Cluster
1 Introduction
2 Background
3 Methods and Tools
4 Results
4.1 Architecture of the Poly-model Complex
4.2 Formal Description of Agent-based Models of the Movement of Labor Resources of the Cluster
4.3 Preliminary Results of Computational Experiments
5 Discussion
6 Conclusion
References
MobileNetV2 in the Classification of Avian Influenza and CRD in Chickens
1 Introduction
2 The Poposed Methodology
2.1 Linear Bottlenecks
2.2 Depthwise Separable Convolution
2.3 Inverted Residual Block
3 Experiments and Results
3.1 Data Preparation
3.2 Training
3.3 Evaluation Metrics
3.4 Result
4 Discussion
5 Conclusions
References
Diverging Mobile Technology’s Cognitive Techniques into Tackling Malaria in Sub-Saharan Africa: A Review
1 Introduction
2 Methodology
2.1 Search Strategy
2.2 Inclusion and Exclusion Criteria
2.3 Eligibility Criteria
3 Results Analysis
3.1 Digital Technologies Utilized to Develop Malaria Applications
4 Discussion of the Results
4.1 Implementation Challenges Faced by Malaria Mobile Interventions and Applications in Africa
5 All-Inclusive Generic Framework for Developing Data-Driven Malaria Digital Interventions in Africa
6 Conclusion
References
Corporative Financing of Innovative Activity in the Russian Regions
1 Introduction
2 Review of Literature
3 Materials and Methods
4 Results of the Calculation Experiment
5 Conclusions
References
Mathematical Modeling of Various Physical Processes in Technical Systems Described by Polynomial Matrix Equations
1 Introduction
2 Method of Solving Polynomial Matrix-Vector Equation
2.1 Reduction of Original Matrix-Vector Equation to Matrix Equation and Diagonalization of Matrix of System of Eqs. (1)
2.2 Determination of Equations to Which Elements of Matrix Din Similarity Transformation TDT - 1Must Adhere
2.3 Determination of Unknown Solution Vector xof Nonlinear Eq. (1) with Polynomial Right-Hand Side (2)
3 Example of Method Application
4 Conclusion
References
Light Rail Transit (LRT) Passenger Management System Using Image Processing Algorithm with Raspberry Pi and Multiple Cameras
1 Introduction
2 Review of Related Literature
2.1 Covid-19 and Its Mode of Transmission
2.2 Social Distancing as a Preventive Measure to Covid-19
2.3 Crowd Monitoring Systems in Public Transportation
2.4 Current LRT Crowd Control System
2.5 Image Processing for Passenger Counting
2.6 Gaussian Blur
2.7 Thresholding Binary
2.8 Image Dilation
2.9 Image Contour
2.10 Region of Interest
2.11 Centroid Computation
2.12 Object Tracking
2.13 Real-Time Passenger Counting Using Cameras
2.14 Multiple Webcam in a Raspberry Pi
3 Methodology
3.1 Project Design
3.2 Conceptual Framework
3.3 Hardware Design
3.4 Software Development
3.5 Process Flowchart
3.6 Early Warning System and Alarm
3.7 Idle Time
3.8 Device Set-Up
3.9 Graphical User Interface
3.10 Actual Prototype
3.11 Calibration
3.12 Testing of the Prototype
4 Results and Discussion
4.1 Passenger Counter
4.2 Alarm System
4.3 People Sitting/Standing Near the Door
4.4 Idle Time Testing
5 Conclusion
6 Recommendations
References
Analysis of Intersection of Working Areas Within the Human-Robot Interaction in a Shared Workspace
1 Introduction
2 Related Work
3 Simulation of Human and Robot Workspaces
3.1 Human-Robot Motion Field During Collaboration
3.2 The Workspace of a Collaborative Robot
3.3 Finding the Intersection of Workspaces of Human and Robot Agents
4 Conclusions and Future Work
References
New Technologies in Solar Power Plant Study in the MATLAB Program Applied to the Conditions of Angarsk City
1 Introduction
2 Methods
3 Results
4 Conclusion
References
Methods for Functional Risks Assessment
1 Functional Risk as a Factor in the Occurrence of Losses
2 Trust and Likelihood Measures on Finite Frames
3 Combining Confidence Building Measures
4 Possibilistic Assessment of Attack Graph Nodes
5 Conclusion
References
Algorithms and Devices for Non-coherent Digital Processing of the Multi-level Amplitude Differential Phase-Shift Keyed Signals
1 Introduction
2 The Signal Models
3 The Demodulation Algorithms
4 The Probabilities of Erroneous Decisions
5 The Noise Immunity When Using the ADBPSK Signals
6 The Noise Immunity When Using the ADQPSK Signals
7 The Energy Efficiency
8 Conclusion
References
Realization of an Interdependent Architecture for Sustainable Agro-Economic Industry 4.0 for Post-Covid-19 Pandemic Economic Era
1 Introduction
2 Review of Literature
3 Key Research Gap Finding
4 Proposed Model
4.1 Modeling Social Distance Compliance Cultivation Process
4.2 Modelling of Sustainability
4.3 Modelling of Industry 4.0
4.4 Collaborative Architecture of Social Distancing- Sustainability and Industry 4.0
5 Results and Analysis
5.1 Analysis of Energy
5.2 Analysis of Environment
5.3 Analysis of Economy
5.4 Analysis of Health Hazard
5.5 Analysis of Housing
5.6 Safety
6 Conclusion
References
Development of Text-to-Sign Language Translator for Bengali Sign Language
1 Introduction
2 Bengali Text-to-Sign Language Translator
2.1 Problem Statement
2.2 Steps for Developing Proposed Bengali Language Translator
2.3 Understanding the Joining of Signs
2.4 Dataset for Bengali Sign Language
2.5 Implementation of Proposed Translator
2.6 Results and Analysis
3 Conclusion / Future Work
References
A Conceptual Consumer Data Protection Maturity Model for Government Adoption: South African Context
1 Introduction
2 Research Methodology
3 Problem Identification and Analysis
4 Maturity Model Design
5 Proposed Consumer Data Protection Maturity Model (CDPMM)
6 Summary of Expert Review Findings
7 Conclusions
References
Analyzing Correlation of the Relationship Between Technical Complexity Factors and Environmental Complexity Factors for Software Development Effort Estimation
1 Introduction
2 Background
2.1 Use Case Points
2.2 Correlation-Based Feature Selection
2.3 Multiple Linear Regression
3 Research Methodology
3.1 Data Description
3.2 Evaluation Criteria
3.3 Methodology Used
4 Results
4.1 RQ1
4.2 RQ2
5 Conclusions
References
Entropy Modeling of Random Vectors in the Presence of Discrete Components
1 Introduction
2 Methods
3 Results
3.1 Data Groupings
3.2 Scoring Indicators
4 Discussions
4.1 Example 1
4.2 Example 2
5 Conclusion
References
Calibrating Function Complexity in Enhancement Project for Improving Function Points Analysis Estimation
1 Introduction
2 Background
2.1 Function Point Analysis
2.2 The Multiple Linear Regression
3 Research Methodology
3.1 Data Description
3.2 Evaluation Criteria
3.3 Methodology Used
4 Result and Discussion
5 Conclusion
References
Analysis of «Leader – Followers» Algorithms in Problem of Trajectory Planning for a Group of Multi-rotor UAVs
1 Introduction
2 Analysis of Path Planning Algorithms for Leader
2.1 Principle of Operation of A Algorithm
2.2 Principle of Operation of RRT Algorithm
2.3 Principle of Operation of RRT Algorithm
2.4 Principle of Operation of Visibility Graph Algorithm
3 Description of the «Leader-Follower» Strategy
4 Results of Comparison of Planning Algorithms and Simulation of a Group Flight in Gazebo
5 Conclusion
References
The Factors that Influence the Users’ Adoption and Acceptance of Cloud Computing at a University of Technology in South Africa
1 Introduction
1.1 Problem Statement
1.2 Research Question
1.3 Aim and Objectives
2 Literature Review
3 Methodology
3.1 Research Design
3.2 Population, Sample and Sample Technique
3.3 Ethical Consideration
3.4 Data Collection and Instruments
3.5 Validity and Reliability
4 Data Analysis
4.1 Demographic Information
4.2 Validity and Reliability
4.3 Hypothesis Testing
5 Conclusion
References
Fuzzy Control Model to Determine the Score in Virtual Reality-Based Appendectomy Practices
1 Introduction
2 Methods
3 Results
4 Discussion
References
Recommender System for Enterprise Resource Planning
1 Introduction
2 Formulation of the Problem
3 Development of a Combined Algorithm
4 Conclusion
References
Applying an Agent-Based Approach to Modeling COVID-19
1 Introduction
2 Literature Review
3 Formalization of the Method
4 Results
5 Conclusion
References
What Keeps You Going? Modelling Motivation and Lifestyle Change in Patients with Type 2 Diabetes
1 Introduction
2 Method
3 The Adaptive Network Model
4 Simulation Results
5 Discussion
6 Conclusion
References
Aggressive Action Recognition Using Pre-trained 3D CNNs with Attention
1 Introduction
2 Prior Work
3 Proposed Model
3.1 Inception 3D Neural Network
3.2 Residual 3D Neural Network
3.3 Residual (2+1)D Neural Network
4 Experimental Setup, Results and Discussion
5 Conclusion
References
Control of the Group of Mobile Robots Without Pre-planned Route for Monitoring and Diagnostic Purposes
1 Introduction
2 The Subtask of Determining the Number of UAV Subgroups Required to Scan Areas
3 The Subtask of Distribution of Scanning Sub-Areas Between UAV Subgroups
4 The Subtask of UAV Distribution by Subgroups
5 The Subtask of UAV Distribution by Scan Bands
6 Conclusions
References
CSMI-AW: Computational System for Medical Image Authentication Using Watermarking
1 Introduction
2 Related Work
3 Problem Description
4 Proposed Methodology
4.1 CSMI-AW: Load Ix IAsset: Chest x-Ray
4.2 CSMI-AW: Load Wm Wmessage
4.3 CSMI-AW: Embedding Procedure in Spectral Domain
5 Algorithm Implementation
6 Results Discussion
7 Conclusion
References
Development of Scientific-Methodological Approaches to Frame Analysis of the Effectiveness of Organizational Systems
1 Introduction
2 Methods
3 Results
4 Discussions
5 Conclusion
References
The Technology of Spatial Relations Visualization Based on the Analysis of Natural Language Texts
1 Introduction
2 Materials and Methods
3 Results and Discussion
4 Discussion and Future Work
References
Fault Detection Model for Software Correctness and Reliability
1 Introduction
2 Literature Survey
2.1 An Overview of Prior Research
2.2 Strategies for Testing Software
2.3 Testing Process of Software Development
3 Method
3.1 Proofing the Correctness and Reliability of Software System
4 Benefit of TESTMATICA Model
5 Result
6 Conclusion and Recommendations
References
Author Index
📜 SIMILAR VOLUMES
<span>This book presents cutting-edge research and methodologies in software engineering, specifically focusing on systems and network systems. It showcases novel development approaches and network system optimizations, highlighting the field's dynamic evolution. The book is designed for experts, sc
<div>This book constitutes the second part of refereed proceedings of the 5th Computational Methods in Systems and Software 2021 (CoMeSySo 2021) proceedings. The real-world problems related to data science and algorithm design related to systems and software engineering are presented in this papers.
<span>These proceedings offer an insightful exploration of integrating data analytics in system engineering. This book highlights the essential role of data in driving innovation, optimizing processes, and solving complex challenges in the field. Targeted at industry professionals, researchers, and
<span>These proceedings offer an insightful exploration of integrating data analytics in system engineering. This book highlights the essential role of data in driving innovation, optimizing processes, and solving complex challenges in the field. Targeted at industry professionals, researchers, and
<p><span>This book presents the latest research on software engineering application in informatics. The fields of software engineering, informatics, computer science, and artificial intelligence are critical for study in the intelligent systems issue space.</span></p><p><span>This is the first part