<p>This book constitutes the refereed proceedings of the 4th Computational Methods in Systems and Software 2020 (CoMeSySo 2020) proceedings. Software engineering, computer science and artificial intelligence are crucial topics for the research within an intelligent systems problem domain. The CoMeSy
Software Engineering Application in Systems Design: Proceedings of 6th Computational Methods in Systems and Software 2022, Volume 1
✍ Scribed by Radek Silhavy, Petr Silhavy, Zdenka Prokopova
- Publisher
- Springer
- Year
- 2023
- Tongue
- English
- Leaves
- 871
- Series
- Lecture Notes in Networks and Systems, 596
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book presents the latest research on software engineering application in informatics. The fields of software engineering, informatics, computer science, and artificial intelligence are critical for study in the intelligent systems issue space.
This is the first part of the refereed proceedings of the 6th Computational Methods in Systems and Software 2022 (CoMeSySo 2022). The CoMeSySo 2022 conference, which is being hosted online, is breaking down barriers. CoMeSySo 2021 aims to provide a worldwide venue for debate of the most recent high-quality research findings.
✦ Table of Contents
Preface
Program Committee
Contents
Determining the Level of Awareness of Electronic Waste Impact on the Environment Among Students in at University of Technology: A Case Study
1 Introduction
2 Methods
2.1 Study Design
2.2 Participants Characteristics and Their Selection
2.3 Gathering the Data
2.4 Data Analysis
2.5 Ethics for the Study
3 Findings
3.1 Theme 1: Disposal
3.2 Theme 2: Institutional Management of e-waste
3.3 Theme 3: E-waste Impact on the Environment
3.4 Theme 4: Knowledge of E-waste Terminology
4 Discussion
References
Assessment of the Awareness Level of E-waste and Factors That Influence Informal Recycling: A Case Study of E-waste Pickers in Local Municipality—Gauteng Province
1 Introduction
2 Methods
2.1 Background and Characteristics of the Participants
2.2 Selection of the Participants and the Data Gathering
2.3 Ethics for the Study
2.4 Data Analysis for the Study
3 Findings
3.1 Theme 1: Harmful Effects of e-waste Informal Recycling
3.2 Theme 2: Knowledge of the Term E-waste
3.3 Theme 3: Informal Recycling Workers
3.4 Theme 4: Poverty, Education and Unemployment
4 Discussion
References
Novel Simulation Modelling of Energy-Efficient Routing Scheme Using Scheduling Approach in Internet-of-Things
1 Introduction
2 Related Work
3 Problem Description
4 Proposed Methodology
5 Algorithm Implementation
6 Results Discussion
7 Conclusion
References
BMA Algorithm for Smartphone Purchase Decisions
1 Introduction
2 Literature Review
2.1 Purchase Decision
2.2 Product Features
2.3 Social Influence
2.4 Product Price
2.5 Brand Name
3 Methodology
3.1 Sample Analysis
3.2 Measurement Scales
3.3 Analytical Approach
4 Results and Discussion
4.1 Descriptive Statistics
4.2 BMA (Bayesian Model Averaging) Algorithm
5 Conclusions
References
The Fast Algorithm for Demodulation of Differential Amplitude Phase Shift Keyed Signals
1 Introduction
2 Differential Phase Shift Keyed Signal
3 Forming a Differential Phase Shift Keyed Signal
4 Digital Demodulation of the Differential Phase Shift Keyed Signal
5 The Noise Immunity of the Demodulation Algorithms
6 Signal-to-Noise Ratio
7 Conclusion
References
On the Digital Algorithms for the DASK Signal Noncoherent Demodulation
1 Introduction
2 A Differential Amplitude Shift Keyed Signal
3 The Demodulation Algorithm
4 The Noise Immunity of the Amplitude Ratio Demodulation
5 Gaussian Approximation
6 Calculating the Probability of Erroneous Demodulation of the Amplitude Ratio
7 The DASK Signal Power Characteristics
8 Conclusion
References
A Computational Error Method to Datapath Single Event Transient Analysis
1 Introduction
2 Computational Error Representation of the Transient Error Effect
2.1 Transient Error Model
2.2 Input Dependency of the Error
3 Simulation Results
4 Conclusion
References
Research and Development Corrective Automorphism of Repeated Code for Quantum Error Correction
1 Introduction
2 Corrective Automorphism of Repeated Code
3 Development of Surface Code for Error Correction
4 Conclusion
References
Minimax Filtering of the Complex Code Shift Keyed Signals
1 Introduction
2 Time Resolution of the Arbitrary Complex Code Shift Keyed Signals
3 The Efficiency of the Minimax Filtration of the PSK and APSK Pulse Signals
4 Conclusion
References
Feature Extraction and Selection of Kidney Ultrasound Images Using a Deep CNN and PCA
1 Introduction
2 Methodology
3 Image Acquisition
4 Preprocessing
5 VGG16
6 PCA
7 Result
7.1 Experimental Setup
7.2 Performance Metrics
7.3 Performance Analysis
8 Discussion
9 Conclusion
References
Process Control Laboratory
1 Introduction
2 Materials and Methods
2.1 RT 010 - Level Control
2.2 RT 020 - Flow Control
2.3 RT 030 - Pressure Control
2.4 RT 040 - Temperature Control
2.5 RT 050 - Speed Control
2.6 RT 060 - Position Control
2.7 LabJack U12 Acquisition Card
3 Results and Discussion
3.1 Experimental Identification
3.2 On-Off Controller
3.3 PID Controller
3.4 Model Predictive Controller
4 Conclusion
References
Kinect-Based Evaluation of Severity of Facial Paresis: Pilot Study
1 Introduction
1.1 Biomedical Background
2 Materials and Methods
2.1 Data Acquisition
2.2 Data Pre-processing
2.3 Data Processing
2.4 Statistical Modeling
3 Results and Discussion
4 Conclusion
References
Explanation of the Predictive Controller and the Effect of Its Tuning on the Control Quality
1 Introduction
2 Materials and Methods
2.1 Cost Function Definition
2.2 Predictions and Predictor for State-Space Model
2.3 Predictions and Predictor for Transfer Function Model
2.4 Problem Solution
2.5 GUNT Training Systems
3 Results and Discussion
3.1 RT 050—Speed Control—State-Space MPC
3.2 RT 050—Speed Control—Transfer Function MPC
3.3 RT 060—Position Control—State-Space MPC
3.4 RT 060—Position Control—Transfer Function MPC
4 Conclusion
References
Learningchain. A Novel Blockchain-Based Meritocratic Marketplace for Training Distributed Machine Learning Models
1 Introduction
2 Research Objective
3 Literature Review
4 Related Work
5 System Model
5.1 Formal Notions of the Beez Blockchain
6 Experiments and Obtained Results
7 Conclusion and Future Work
References
Hiding Simple Text Files in Multimedia Files: A New Method and Its Implementation
1 Introduction
2 Related Research
3 Method
3.1 Text to Image
3.2 Text to Sound
3.3 Modifications
3.4 Implementation
3.5 Applications
3.6 Example
3.7 Case Study
4 Discussion
4.1 Hiding in Another Multimedia Files
4.2 Comparison with LSB Method
4.3 Encryption
4.4 Limitations
5 Conclusions
References
How to Optimally Reconfigure Average Consensus with Maximum-Degree Weights in Bipartite Regular Graphs
1 Introduction
2 Theoretical Background
2.1 Average Consensus with Maximum-Degree Weights in Bipartite Regular Graphs
2.2 Five Conditions for Detecting Bipartite Regular Topology in Distributed Fashion
3 Research Methodology and Metrics for Performance Evaluation
4 Experiments and Discussion about Observed Phenomena
5 Conclusion
References
Blockchain as an Object of Value Assessment
1 Introduction
2 Methodology
3 Results
4 Discussion
5 Conclusion
References
Analysis of Mimetic Muscle Rehabilitation: Multi-platform Facemarks Detection
1 Introduction
2 Materials and Methods
2.1 Automatic Exercises Detection
2.2 Android Platform
2.3 iOS Platform
2.4 Windows Platform
3 Results
3.1 Android
3.2 iOS
3.3 Windows
4 Future Work
5 Conclusion
References
Suitability of MQTT and REST Communication Protocols for AIoT or IIoT Devices Based on ESP32 S3
1 Introduction
2 Background
3 Materials and Methods
4 Experiment Design
5 Experiment Implementation and Result
6 Conclusions
References
Goal Modeling for Linked Data Exploitation of Municipalities Data Access in South Africa
1 Introduction
1.1 Governmental Structure
1.2 Information Technology Adoption in South African Municipalities
1.3 Background of Linked Data
1.4 Objectives
2 Goal Modeling to Capture Competency Questions
2.1 Early Requirements Analysis: The Goal-Oriented Model of the Municipality
2.2 Late Requirements Analysis: Modelling the Competency Questions
2.3 Late Requirement Actor Goals Modeling
2.4 Empirical Evaluation of Competency Questions
3 Translating Natural Language Competency Questions into SPARQL Queries
3.1 Competency Questions Translation Approach
3.2 Categorizing the Competency Questions
3.3 Extracting Entity or Entities from Questions
3.4 Constructing the Appropriate SPARQL Queries
4 Conclusion and Future Work
References
Application of the K-medians Clustering Algorithm for Test Analysis in E-learning
1 Introduction
2 Method
3 Program Implementation
4 The Effect of the Obtained Results on the Test Questions of the E-course
5 Conclusion
References
Pursuit on the Plane by Objects Moving Away from the Trajectory of the Defending Object, with Simulation of the Detection Area
1 Introduction
2 Problem Statement
3 Theory and Experimental Results
3.1 Methods of Parallel Approach and Correction During the Chase
3.2 The Descent Function of Catching Objects from the Pursuer’s Trajectory
3.3 Formation of a Tracking Area for Pursuing Objects
3.4 The Behavior Model of the Pursuing Object
4 Discussion of Experiments
References
Prediction of the Failure of a Business Process Event Using Event Log and Deep Learning
1 Introduction
2 Related Works
2.1 Business Process Failure
2.2 Loop Based Process
2.3 Critics
3 Description and Preprocessing of the Dataset
4 Prediction Model
4.1 Recurrent Neural Network (RNN)
4.2 Convolutional Neural Network (CNN)
5 Results
6 Explainability
7 Conclusion
References
The Demand Dynamics Forecasting for Perishable Products
1 Introduction
2 Problem Statement
3 Mathematical Model
4 Realization
4.1 Additive Decomposition Model
4.2 Multiplicative Decomposition Model
5 Conclusion
References
On the Software Projects’ Duration Estimation Using Support Vector Regression
1 Introduction
2 Related Works
3 Background
3.1 Multiple Linear Regression
3.2 Support Vector Regression
4 Experiment
4.1 Data Preprocessing
4.2 Experiment Setup
4.3 Evaluation Criteria
5 Result and Discussion
6 Conclusion
References
Modeling Tasks of Patient Assistance and Emergency Management in Medical Cyber-Physical Systems
1 Introduction
2 Related Work
3 Methods and Results
4 Conclusion
References
Analysis of Collaborative Filtration Parameters
1 Introduction
2 Formation of Recommendations Using Collaborative Filtering
2.1 Collaborative Filtering Algorithm
2.2 Finding Similarities Between Objects Using Cosine Similarity
2.3 Determination of the Quality of the Generated Recommendations
3 Investigation of Parameters
3.1 Dataset for the Study
3.2 Selection of Research Parameters
3.3 Effective Number of Nearby Users for a Specific Total Number of Users
3.4 Analysis of the Influence of Parameters on the Quality of Recommendations
3.5 Analysis of the Influence of Parameters on the Speed of the Algorithm
3.6 Determining the Effective Ratio of Parameters
4 Conclusions
References
A Modelling of Novel Approach for Stock Portfolio Management Using Unsupervised Algorithm and Deep Reinforcement Technique
1 Introduction
2 Related Work
3 Proposed Methodology
4 Implementation Strategy
4.1 Portfolio Management
4.2 Trading Algorithm
5 Result and Discussion
6 Conclusion
References
Development of Motion Analysis Tool for Orthopedic Diseases: Inertial Measurements
1 Introduction
1.1 State of the Art
2 Inertial Measurements Unit - IMU
3 IMU Application
3.1 Architecture
3.2 AHRS Algorithm
4 PC Application
5 Conclusion
6 Future Work
References
Simulation of Multiple Autonomous Mobile Robots Using a Gazebo Simulator
1 Introduction
2 Methods
2.1 Components of the Robotic System
2.2 Hardware Abstract Layer
2.3 Communication with the Gazebo
2.4 PLC Data Structure
2.5 Multiple Robots Inside the Simulator
2.6 Virtual PLC Inside a Gazebo Model
3 Results and Discussion
4 Conclusion
References
AVL Based on Fusion of IMU, GPS and Camera Sensors
1 Introduction
2 Matlab Simulation
2.1 Driving Scenario
3 Fusion Filter
3.1 Loosely-Coupled Method
3.2 Orientation as Quaternion
4 Matlab Implementation
4.1 IMU Sensor Model
4.2 GPS Receiver Model
4.3 Monocular Visual Odometry Model
5 Simulation Setup
5.1 Carrying Out the Simulation
5.2 Interpretation and Analysis of Results
5.3 Localization Based on Data from the IMU
5.4 Localization Based on IMU + GPS
5.5 Localization Based on IMU + MVO
5.6 Localization Based on Fusion of IMU + GPS + MVO
5.7 Discussion of Simulation Results
6 Conclusion
References
An AI-Based Platform Architecture with Situational Awareness for Travel Plans
1 Introduction
2 Related Research
2.1 Situation Recognition Technology
2.2 Utilization of Ontology
2.3 Utilizing the Ontology of Situational Awareness Technology
3 System Architecture
3.1 Overview
3.2 S/W Architecture Configuration
4 Implementation
5 Conclusion
References
Cyber-Physical Test Facility for Certification of Robotic Unmanned Aerial Systems
1 Introduction
2 Functional Analysis of the Certification System for Unmanned Aerial Systems
3 Formal Statement of the Problem of Certification of Unmanned Aerial Systems
4 Flight Model System for Testing and Certification of Unmanned Aerial Systems
5 Conclusion
References
Information Models of UAVs Group Control
1 Introduction
2 Mathematical Models of UAVs
3 Models and Forecasts of Information Signals
4 Conclusion
References
A Computational Approach to Calculate the Hydrographic Zero Along the Moroccan Atlantic Coast (Port of Mohammedia) Using Matlab
1 Introduction
2 Methods
2.1 Study Area
2.2 Tide Gauge and Data
2.3 Data Processing Tools
3 Results
3.1 Signal Filtering
3.2 Spectral Analysis
3.3 Predictions
3.4 Redefine the Hydrographic Zero
4 Conclusion
References
Nanotechnology on Perspective Computer Science
1 Introduction
2 A Review to Perspective
3 Phenomenon and Paradigm in Perspective
4 Nano and Computer as Perspective
4.1 From Nano to Technology
4.2 From Science to Nano
5 Conclusion
References
A 3D Visualization of Zlín in the Eighteen–Nineties in the Unreal Engine Environment
1 Introduction
2 A Short History of Zlín
3 Used Resources and Software
3.1 Acquiring Resources
3.2 Software Used
4 Modelling and Exporting
5 Creation of the Application
5.1 Creating a Scene
5.2 Scene Accessories
5.3 Control and Application Menu
6 Results
7 Conclusion
References
Reference Method for the Care of Health Consultations of Older Adult Users Based on Chatbot, in a Context of Pandemic
1 Introduction
2 Method
2.1 Definition of Use Case and Exploration
2.2 Conversation Scripts
2.3 Design and Test
2.4 Development of the Chatbot
3 Results
4 Conclusions
References
Prototype Technology Decision Support System for the EBW Process
1 Introduction
2 Mathematical Support of the Software System
3 Software Design
4 Software System Informational Support
5 Description of the Programmer System
6 Conclusion
References
Modeling the Temperature Distribution in an Electron Beam Welded Bimetallic Ring with COMSOL Multiphysics
1 Introduction
2 Material and Methods
3 Result and Discussion
4 Conclusion
References
Voice Recording Setup in Clinical Practice
1 Introduction
2 Recording Setup
3 Software Voice Analyst
4 On Text Selection and Measurement
5 Conclusions
References
Development of Automated Control System of Electron-Beam Welding Process
1 Introduction
2 Applied Mathematical Methods
2.1 Correlation Analysis
2.2 Regression Analysis
2.3 Artificial Neural Networks
2.4 Nonparametric Regression
3 Description of the Operation of the Program
4 Description of the Software System
5 Results
6 Conclusion
References
IoT Device Using LoRaWAN for Data Transfer for Long Distances
1 Introduction
2 Background
3 Materials and Methods
4 Experiment Implementation and Result
5 Conclusions
References
Using Technical and Structural Coefficients of Economic Statistics to Equalize Flows of Input-Output Table
1 Introduction
2 Methods, Models, Data
3 Results
3.1 Creating by Equalize Input-Output Table Accounts
3.2 Realization by Equalize Input-Output Table Accounts
4 Discussions
5 Conclusion
References
Application of the Method of Expert Assessments in Determining the Level of Criticality of the Information Security Vulnerability of Smart Contracts
1 Introduction
2 Basic Approaches to iS Threat and Vulnerability Analysis
3 Methodology for Determining the Criticality Level of iS Vulnerability
3.1 Degree of Initial Security of BS
3.2 Relevance of iS Vulnerability Implementation
3.3 Degree of Possible Damage from the Implementation of an iS Vulnerability
3.4 Labor Intensity of iS Vulnerability Implementation
3.5 Calculation of iS Vulnerability Criticality Level
4 Validation of the Proposed Methodology for Determining the Level of Criticality of iS Vulnerability
4.1 Determination of the Relevance of Reentrancy Implementation
4.2 Determination of the Degree of Initial Security of BS
4.3 Determination of the Degree of Possible Damage from the Implementation of a Reentrancy
4.4 Determination of the Labor Intensity of Reentrancy Implementation
4.5 Results and Analysis
5 Conclusion/Future Work
References
Stabilization of Second-Order Systems Using a P/I-Delayed Controller
1 Introduction
2 Theoretical Background
2.1 Principle of the Design Method
2.2 Determination of the Stabilization Pair ( kp ,ki )
3 Practical Part
3.1 Numerical Example I
3.2 Numerical Example II
4 Conclusion
References
Analysis of Data Gathering and Processing Modes During the Primary Identification of Radio Signals Through the Panoramic Spectral Analysis
1 Introduction
2 Initial Data Generation for the Primary Identification of Signals
3 The Concept of the Spectral Mask and Its Use for the Generation of Identification Decision Determining Statistics
4 A Generalized Signal Identification Algorithm
5 Cyclic Signal Identification and the Data Update Problem
6 The Features of a Deferred Mode of Data Gathering and Processing
7 The Features of a Synchronous Mode of Data Gathering and Processing
8 Estimation of the Time Parameters of the Proposed Modes
9 Conclusion
References
Business Model as a Basic Building Block of Business Architecture
1 Introduction
2 Business Architecture
3 Business Model
4 Linking Business Model to Business Architecture
5 Conclusion
References
Facial Recognition Technologies Patent Landscape
1 Introduction
2 Discussion
3 Processing
3.1 The Current State of the Face Recognition Technology Market
3.2 Patent Activity in the Field of Face Recognition Technologies
3.3 The Main Technological Niches in the Field of Face Recognition
4 Conclusion
References
Method for Distributed Mapping of Terrain by a Heterogeneous Group of Robots Based on Google Cartographer
1 Introduction
2 Overview and Classification of SLAM Algorithms
3 The Developed Solution
4 Description of UAV and Ground-Based Robot Models
5 Experiments
6 Conclusion
References
Geoportal Systems as an Access Point to Spatial Data Infrastructure
1 Introduction
2 Related Work
3 Research Method
4 Results and Discussions
5 Conclusion
References
Low Input Voltage DC-DC Converter for Harvesting Energy by Microbial Fuel Cell
1 Introduction
2 Statement of Problem
3 Ultra-low Voltage Energy Converter
4 Microbial Fuel Cell
5 Manufacturing of Microbial Fuel Cell
6 Manufacturing of the Load Power Driver
7 Results
7.1 Blocking Oscillator. Selection of Winding Inductance
7.2 Demonstration of the Load Operation
8 Conclusion
References
Underwater Object Tracking with 2D Sonar Signals Preprocessed Using the Virtual High-Dynamic Range Enhancement Method
1 Introduction
2 Image Acquisition Platform
2.1 Hardware
2.2 Software
3 Image Enhancement with VHDR
4 Tests
5 Conclusion and Future Works
References
Error-Free 2d Pictogrammic Syntax in a Programming Learning Environment for Preschool Children
1 Introduction
1.1 A Distinctive Feature of the Textless Programming Environment PiktoMir
1.2 The Main Problem Solved in This Article
2 Methodology
2.1 Proposed Way to Solve the Main Problem
2.2 The Advantage of Shifting the Emphasis from Syntax to Semantics
3 Results
3.1 General Scheme for Interpreting the PiktoMir Program Composed in Error-Free Syntax
3.2 Program Examples
3.3 Outline of a Formal Algorithm for Compiling the Body of a Single Subroutine in the Pikto Language
4 Discussion
5 Conclusion
References
Comparison of Stabilization with P/I-Delayed Controllers for Second-Order Systems Using Built-In MATLAB Heuristic Optimization Methods
1 Introduction
2 Preliminaries and Statement of the Problem
2.1 Closed-Loop Control and Stabilization Pair ( kp , ki )
2.2 Error Index
3 Heuristic Optimization Methods
3.1 Simulated Annealing
3.2 Genetic Algorithm
3.3 Pattern Search
4 Numerical Optimization Results
4.1 Considered Plant Models and Their Controllers
4.2 The Stability Region in the ( kp ,ki ) Plane
4.3 Main Results
5 Conclusion
References
Using a Distributed Architecture of a Geographic Information System to Support Thin Clients
1 Introduction
2 Geographic Information Systems Architecture
3 GIS Application
4 Experiments
5 Conclusion
References
Estimating the Approximate Necessity of Essential Medicines in Syria Using Machine Learning
1 Introduction
2 Estimation of the Demand of Essential Medicines
2.1 Problem Statement
2.2 Research Methodology
2.3 Understanding the Role of Essential Medicines
2.4 Dataset
2.5 Random Forest Classifier
2.6 Implementation
2.7 Results and Analysis
3 Conclusion/Future Work
References
Web Scanner: An Innovative Prototype for Checking Web Vulnerability
1 Introduction
2 Motivation
3 Related Work
4 Problem Definition and Objectives
5 Flowchart and Algorithm
6 Results and Discussion
7 Conclusion
References
Analysis of the Performance of NewSQL Databases Compared to RDBMS Based on Linux OS
1 Introduction
2 Related Work and Explanations
2.1 RDBMS
2.2 NewSQL Databases
2.3 Performance
3 Methodology
3.1 Databases
3.2 Data Set
3.3 Test Settings
3.4 KPIs
4 Performance Test Results
5 Conclusion and Future Research
References
Improving the Performance of Effort Estimation in Terms of Function Point Analysis by Balancing Datasets
1 Introduction
2 Research Questions
3 Related Works
4 Dataset Description
5 Experimental Design
6 Criteria Validations
7 Results and Discussion
8 Conclusion and Future Work
References
The Model of Interface Structure for Technical Systems Based on a Communication of Logics
1 Introduction
2 The Problem of Communication in the Existing Paradigm of Developing Interfaces of Technical Systems
3 The Model of the Structure of the Interface of Technical Systems Based on the Communication of Logics
4 Conclusions
References
Classification of Interaction Participants in the Formation of the Trajectory of Diagnosis and Treatment of Bronchopulmonary Diseases to Design Agents of a Multi-agent System
1 Introduction
2 Problem Description and Problem Statement
3 Known Approaches to Solving Such Problems
4 Proposed Approach
4.1 Classification of Interaction Participants in the Formation of the PATient’s Treatment Trajectory
4.2 Choosing a Digital Platform for Multi-agent Modeling
4.3 Multi-agent Model for the Formation of a Rational Trajectory for the Diagnosis and Treatment of a Patient
4.4 Development of a Multi-agent Model for the Formation of a Trajectory for the Diagnosis and Treatment of a Patient in the Digital Platform AnyLogic
5 Primary Data Processing for Subsequent Modeling
6 Conclusion
References
Intelligent Decision Support Based on Mental User Models: Research Design
1 Introduction
2 Materials and Methods
3 Results
4 Conclusions and Future Work
References
Comparison of Web Pagebuilders and Their Use in Teaching Web Development
1 Introduction
2 Teaching Websites in a Graphical Way
2.1 Block-Base Coding
2.2 Block Programming or Websites
3 Using Pagebuilders in Practice
4 Known Pagebuilders
4.1 Bootstrap Studio
4.2 Wix
4.3 Elementor
4.4 Weebly
4.5 Webnode
5 Comparison of Pagebuilders
6 Conclusion
References
Understanding the Labor Market from the Bottom Up with an Agent-Based Model
1 Introduction
2 The Labor Market: From Economic Modeling to Agent-Based Modeling
3 Proposed Labor Market Model
3.1 The Migratory Process
3.2 The Job Search Process
4 Simulations and Results
4.1 Scenarios Tested
5 Conclusion
References
Predicting Threat Degree for Onset of Type 2 Diabetes Mellitus Based on Machine Learning Methods
1 Introduction
2 Problem Definition and Suggested Decision
2.1 State of Art
2.2 Date Structure and Synthesis
2.3 Construction of Logistic Regression Model
3 Results
4 Discussions
5 Conclusions
References
A Creating of Processes and Threads in MS Windows
1 Introduction
2 Threads Versus Processes
2.1 Processes
2.2 Threads
3 A Time Measurement
4 Measuring the Creation Time of Processes and Threads
4.1 Time Measurement Summary
5 Conclusions
References
Agriculture, Hunting, Forestry, and Fishing Industry of Kazakhstan Economy: Input-Output Analysis
1 Introduction
2 Methods, Models, Data
3 Results
3.1 Disbalance and (+) Over- and/or (−) Under-Evaluation in Agriculture Industry Flows
3.2 Disbalance and (+) Over- and/or (−) Under-Evaluation in Rest of Economics Flows
4 Discussions
5 Conclusion
Appendix
References
Interdisciplinary Research and Development Projects’ Application Domains Classification
1 Introduction
2 Materials and Methods
3 Results
4 Discussion
5 Conclusion
References
Non-fungible Tokens: Value for Digital Arts and Pricing Factors
1 Introduction
2 NFT Art: Concept and Factors of Pricing
3 Modeling the Pricing Factors of NFT Art Collection “Unicly CryptoPunks”
4 Conclusions
References
Intelligent Methods for Restructuring Digital Science-Intensive Solutions of Network Innovation Institutions
1 Introduction
2 Materials and Methods
3 Results
4 Discussion
5 Conclusion
References
Decision Support System for Multi-criteria Information-Logical Analysis of Scientific and Technical Projects of Innovative Enterprises
1 Introduction
2 Materials and Methods
3 Results
4 Discussion
5 Conclusion
References
An Expert System for the Priorities Formation in Sustainable Development Fundamental Research
1 Introduction
2 Materials and Methods
3 Results
4 Discussion
5 Conclusion
References
Applying Verbal Decision Analysis for Public Research and Technology Advancement
1 Introduction
2 Materials and Methods
3 Results
4 Discussion
5 Conclusion
References
Finding Research Community Structures Based on Semantic Relations of Concepts
1 Introduction
2 Materials and Methods
3 Results
4 Discussion
5 Conclusion
References
Author Index
📜 SIMILAR VOLUMES
<p><span>This book constitutes the first part of refereed proceedings of the 5th Computational Methods in Systems and Software 2021 (CoMeSySo 2021). The CoMeSySo 2021 Conference is breaking the barriers, being held online. CoMeSySo 2021 intends to provide an international forum for the discussion of
<p>This book constitutes the refereed proceedings of the 4th Computational Methods in Systems and Software 2020 (CoMeSySo 2020) proceedings. Software engineering, computer science and artificial intelligence are crucial topics for the research within an intelligent systems problem domain. The CoMeSy
<span>This book presents cutting-edge research and methodologies in software engineering, specifically focusing on systems and network systems. It showcases novel development approaches and network system optimizations, highlighting the field's dynamic evolution. The book is designed for experts, sc
<span>This book presents cutting-edge research and methodologies in software engineering, specifically focusing on systems and network systems. It showcases novel development approaches and network system optimizations, highlighting the field's dynamic evolution. The book is designed for experts, sc
<p><p>This book presents real-world problems and exploratory research that describes novel approaches in software engineering, cybernetics and algorithms in the context of intelligent systems.</p><p>It constitutes the refereed proceedings of the 3rd Computational Methods in Systems and Software 2019