دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1]
نویسندگان: Radek Silhavy
سری:
ISBN (شابک) : 9783030774424, 3030774422
ناشر: Springer Nature
سال نشر: 2021
تعداد صفحات: 755
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 78 Mb
در صورت تبدیل فایل کتاب Software Engineering and Algorithms: Proceedings of 10th Computer Science On-line Conference 2021, Vol. 1 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مهندسی نرم افزار و الگوریتم ها: مجموعه مقالات دهمین کنفرانس آنلاین علوم کامپیوتر 2021، جلد. 1 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مجموعه مقالات داوری بخش مهندسی نرم افزار و الگوریتم ها از دهمین کنفرانس آنلاین علوم کامپیوتر 2021 (CSOC 2021) است که در آوریل 2021 به صورت آنلاین برگزار شد. تحقیقات مهندسی نرم افزار و کاربردهای آن در الگوریتم های هوشمند نقش اساسی در تحقیقات علوم کامپیوتر در این کتاب روش های نوین تحقیق، کاربرد یادگیری ماشینی و آماری در تحقیقات مهندسی نرم افزار ارائه شده است.
This book constitutes the refereed proceedings of the Software Engineering and Algorithms section of the 10th Computer Science On-line Conference 2021 (CSOC 2021), held on-line in April 2021. Software engineering research and its applications to intelligent algorithms take an essential role in computer science research. In this book, modern research methods, application of machine and statistical learning in the software engineering research are presented.
Preface Organization Program Committee Program Committee Chairs Program Committee Members Technical Program Committee Members Organizing Committee Chair Conference Organizer (Production) Conference website, Call for Papers Contents Multi-agent Simulation of Agile Team Dynamics: An Investigation on Team Strategies Perspective 1 Introduction 1.1 Agent-Based Modelling 1.2 What is an Agent and Its Characteristics? 1.3 What is a Multi-agent System? 1.4 Scrum Background 1.5 Pair Programming 1.6 Research Motivation 2 Related Works 3 Methods 3.1 Strategy Design 3.2 Solo Strategy 3.3 Same Level Pairing 3.4 Cross Level Pairing 3.5 Strategy Types 3.6 Must Pair Strategy 3.7 Intelligent Pair Strategy 3.8 Evaluation Metrics 3.9 Scrum Environment, Agents and User Stories 4 Experiments Results and Discussion 4.1 Fixed Testing 5 Summary References SBAP: A Novel Secure Bucket Access Protocol for Leveraging User’s Data Privacy in Cloud Environment 1 Introduction 2 Related Work 3 Problem Description 4 System Model: Proposed Methodology 4.1 Authorization Model 4.2 System Architecture 5 Algorithm Implementation 6 Results Discussion 7 Conclusion References Energy Distribution Modeling During the Electron Beam Welding Using Dynamically Changing Thermophysical Parameters of the Product 1 Introduction 2 Reconstruction of Regression Dependencies for Thermophysical Parameters of the Product 3 Development of an Algorithm for Calculating the Thermal Field 4 Experimental Study 5 Results Discussions 6 Conclusion References Agile Architecture Frameworks: Challenges and Open Issues 1 Introduction 2 Background 3 Agile Architecture Frameworks 4 Challenges and Open Issues 5 Conclusion References Novel Approach of Video Tracking System Using Learning-Based Mechanism over Crowded Environment 1 Introduction 2 Related Work 3 Problem Description 4 Proposed Methodology 5 Algorithm Implementation 5.1 Algorithm for Extraction of Significant Cells 5.2 Algorithm for Extracting Learning-Based Features 6 Results Analysis 7 Conclusion References A Survey on Supporting the Software Engineering Process Using Artificial Intelligence 1 Introduction 2 Background 2.1 Software Engineering and the Software Crisis 2.2 Software Development Life Cycle Models 2.3 Multi-objective Optimization 2.4 Evolutionary Algorithms 3 Challenges 3.1 Software Engineering Challenges 3.2 SDLCs Challenges 4 Software Engineering and Evolutionary Algorithms 4.1 Effort Estimation 4.2 Design and Coding 4.3 Testing 5 Conclusion References Automation of Electron Beam Input During the Welding of Thin-Walled Structures 1 Introduction 2 Mathematical Description Software Automation Tasks 3 Algorithmic Support of the Automated System 4 Software 5 Experimental Study 6 Conclusion References Evolution of Contrast and Illumination Adjustment Techniques for Dental Imaging to Assist Effective Implant 1 Introduction 2 Related Work 3 Problem Description 4 Proposed System 4.1 Evolution of Contrast Adjustment Techniques 4.2 Evolution of Brightness and Illuminance Adjustments Techniques 5 Result Analysis 6 Conclusion References Maturity Models, Challenges and Open Issues 1 Introduction 2 Background 3 Related work on Maturity Models 3.1 Challenges and Open issues 4 Conclusion References The Model of Parallel Convergence in the Group of Pursuers’ Plane with Simultaneous Achievement of the Goal 1 Introduction 2 The Problem Statement 3 Methodology for Solving the Problem 3.1 Conclusion References Information System for Food Origin Monitoring 1 Introduction to the Problem 2 Food Database 3 Application to Support Food Producers 4 Discussion and Conclusions References Novel Framework for on Demand Preprocessing Towards Facilitating Diagnosis of Diabetic Retinopathy 1 Introduction 2 Related Work 3 Proposed System 3.1 Geometrical Adjustment 3.2 Filtering Mechanism 3.3 Contrast Enhancement 4 Result Analysis 5 Conclusion References Organization of Measurement Data Collection and Primary Processing Regional Environmental Monitoring Systems 1 Introduction 2 Task Setting 3 Problem-Solving Method 4 Typical Structure of the Subsystem for Measurement, Information Collection and Primary Processing in Regional Environmental Monitoring Systems 5 Data Exchange Between Data Processing Nodes 6 Conclusion References Design of an Optimal Framework to Evaluate the Throughput in Downlink Channel in LTE 1 Introduction 2 Review of Literature 3 System Model 4 Implementation 5 Result and Discussion 5.1 Numerical Outcome 6 Conclusion References Bioinspired Approach to Microstrip Transmission Line Design 1 Automated Synthesis of a Microstrip Transmission Line Using (GA) 1.1 Genetic Algorithm 1.2 Microstrip Line Development 2 Conclusion References Analysis of Transformation Tools Applicable on NewSQL Databases 1 Introduction 2 Related Work and Explanations 2.1 Cloud Computing 2.2 NewSQL 2.3 ACID Model 2.4 CAP Theorem 3 Methodology 3.1 Databases and Transformation Tools 3.2 Evaluation Criteria 4 Analysis 5 Conclusion and Future Research References Multi-level Trust Modelling to Resist Impact of Routing Attacks on Reliable Data/Communication Transactions in MANET-IoT Ecosystem 1 Introduction 2 Related Work 3 Proposed Model 3.1 Network Configuration 3.2 Multi-level Trust Computation 3.3 Trust-Oriented Routing 4 Result Analysis 5 Conclusion References Improving Determine Lexical Meanings for Mongolian Cyrillic Script and Its Used to Keyword Extraction 1 Introduction 2 Related Work 3 Methodology of Parsing Word Structure, Determining Lexical Meanings 3.1 Lexical Meaning of Mongolian Cyrillic Script /Lexical Meanings at Written Language/ 3.2 Part of Speech at Mongolian Cyrillic Script 3.3 Orthography of Mongolian Cyrillic Script and Types of Inflecting Word 3.4 Changes of Word Stem 3.5 Morphotactic (Word Stem + Suffix) 3.6 Parsing Word Structure 3.7 Algorithm for Parsing Inflectional Suffixes 4 Experiments 4.1 Assessment Used Datas 4.2 Result Evaluation of Parsing Word Structure and Extracting Word Stem 4.3 Evaluating the Contribution of Parse Word Structure to Keyword Extraction 4.4 Evaluation Methods 4.5 Evaluation Datasets 4.6 Evaluation Results 5 Conclusion References Multidimensional Analysis of NewSQL Database Systems 1 Introduction 2 Related Work and Terms 2.1 SQL and Relational DBMS 2.2 NoSQL and Unstructured Data 2.3 NewSQL Systems 3 Methodology and Criteria 3.1 Taxonomy 3.2 Criteria 4 Analysis 4.1 Data Model 4.2 Transactionality 4.3 Querying Capabilities 4.4 Scalability 4.5 Security 4.6 Costs and Infrastructural Support 5 Further Investigation and Expansion Areas 5.1 Conclusions 5.2 Opportunities References A Survey on Challenges Facing Artificial Intelligence Based Pattern Recognition for Business Oriented Big Data Analytics and Solutions 1 Introduction 2 Background 2.1 Big Data 2.2 Data Science 2.3 Data Analysis 2.4 Artificial Intelligence 2.5 K-Means Clustering 3 Challenges 3.1 Data Challenges 3.2 Data Science Challenges 4 AI Based Big Data Analytics 5 Conclusion References Operationalizing Analytics with NewSQL 1 Introduction 2 Related Work and Definitions 2.1 Overview of the Data Industry 2.2 Big Data 2.3 Data Management and Big Data 3 NewSQL Evolution 3.1 NewSQL Data Stores 3.2 Gartner Hype Cycle Research Methodology 4 Analysis 4.1 Analyzed Systems 4.2 Taxonomy and Analysis 5 Conclusions 5.1 Opportunities and Expansion Areas References Grouping-Based Hybrid Channel Access Mechanism for Ultra-Dense IEEE 802.11 ax Networks 1 Introduction 2 Proposed Grouping-Based Hybrid Channel Access Mechanism 2.1 Protocol Description 2.2 Grouping Algorithm Details 3 Performance Analysis 4 Results and Discussions 4.1 BSR Delivery 2BSR2opt and RU Efficiency 4.2 Throughput 5 Conclusion References Mathematical Optimization, the Effect of the Catalyst and Solvent on the Process of Starch Sulfation with Sulfamic Acid 1 Introduction 2 Experimental 2.1 Features of the Starch Sulfation 2.2 Calculation 2.3 Elemental Analysis 2.4 Fourier-Transform Infrared Spectroscopy 3 Results and Discussion 4 Conclusions References Research and Development Circuits for Error Correction 1 Introduction 2 Modeling a Circuit for Error Correction 2.1 Initial State 2.2 Encoding 2.3 Overlay Noise 2.4 Bug Fixes 3 Conclusion References Formal Development of Fault Tolerance by Replication of Distributed Database Systems 1 Introduction 2 Related Works 3 Why Replicate? 4 SQL Server Replication 5 Types of Replication Within SQL Server 5.1 Snapshot Replication 5.2 Transactional Replication 5.3 Merge Replication 6 Modeling and Refinement in Event B 7 Formal Modeling of Replication Within SQL Server in Event-B 7.1 Snapshot Replication 7.2 Transactional replication. 8 Discussion and Statistics 9 Conclusion References Fault Detection Model for Multi Robotic System Using Formal Method Event-B 1 Introduction 2 Modelling in Event-B 3 Fault Detection Techniques 4 Formal Modelling of Fault Detection in Event-B 4.1 Abstract Model 4.2 Refinement Model 4.3 Proof Statistics 5 Discussion 6 Conclusion References Fault Tolerant Sensor Network Using Formal Method Event-B 1 Introduction 2 Related Works 3 Definition of Basic Terms and Concepts 4 Modeling in Event-B 4.1 Why Event-B 4.2 Event-B Structure 5 Fault Tolerant Model in Cyber-Physical Systems 6 Modeling the FMS in Event-B 6.1 Variables 6.2 Events 6.3 Refinement 6.4 Proof Statistics 7 Transforming EVENT B Models into Verified C# Implementations 7.1 C# Translation Philosophy 7.2 FMS Simulation in C# 8 Conclusions References Modeling the Temperature Field Distribution at the Stages of Input-Output of the Electron Beam 1 Introduction 2 Mathematical Model for Calculating the Thermal Field 3 Simulation Modeling 4 Experimental Study 5 Results Discussion 6 Conclusion References Object Classification from a Hyper Spectral Image Using Spectrum Bands with Wavelength and Feature Set 1 Introduction 2 Related Work 3 Problem Description 4 Proposed Methodology 4.1 Wavelength (λ) in Spectral Band (Sb) of HSI 4.2 Transformation of HSI to the Optimal RGB 4.3 Object Class Visualization 4.4 Least Square Method (LSM) for Afs 4.5 Classification Based on Afs 5 Result Analysis 6 Conclusion References Historical 3D Visualisations of Starý Světlov Castle Using Blender and Unreal Engine 1 Introduction 2 A Short History of Starý Světlov Castle 3 Resources and Software Used 3.1 Acquiring Resources 3.2 Software Used 4 Modelling 5 Texturing 6 Application Creation 7 Conclusion References Optimization of the Process of Obtaining Ethanol-Lignin from Abies Bark (Abies Sibirica) 1 Introduction 2 Experimental 3 Results and Discussion 4 Conclusions References Physical Complexity of Algorithms 1 Introduction 2 Algorithm Performance 3 Conclusion References The Usage of Declarative Integrity Constraints in the SQL Databases of Some Existing Software 1 Introduction 2 Related Works 3 The Method 4 Analysis Results 4.1 Key Constraints 4.2 Foreign Key (Referential) Constraints 4.3 Check Constraints 4.4 NOT NULL Constraints 5 Final Thoughts 6 Conclusion References Average Consensus with Perron Matrix for Alleviating Inaccurate Sensor Readings Caused by Gaussian Noise in Wireless Sensor Networks 1 Introduction 2 Theoretical Background into Topic 2.1 Model of Average Consensus Algorithm over Wireless Sensor Networks 2.2 Analyzed Average Consensus Weights 2.3 Implemented Stopping Criterion Proposed for Wireless Sensor Networks 3 Applied Research Methodology 4 Experimental Part 5 Conclusion References A Conversion of 3D Graphics from Blender to Unreal Engine 1 Introduction 2 Software Descriptions 2.1 Blender 2.2 Unreal Engine 3 3D Graphics for Conversion 4 Conversion Formats 4.1 The .fbx Format 4.2 The .abc Format 4.3 The .obj Format 4.4 The .glb/.gltf Formats 4.5 The .usd Format 4.6 Blender for Unreal Engine Plug-Ins 5 Conversion and Results 6 Conclusion References Technology for Dynamic Configuring of the Decision Support System for Personnel Security of the Regional Mining and Chemical Cluster 1 Introduction 2 Background 3 Methods 4 Results 5 Conclusion References Novel Secure Scheme for On-Field Sensors for Data Aggregation in Precision Agriculture 1 Introduction 2 Related Work 3 Problem Description 4 Proposed Methodology 5 Algorithm Implementation 6 Results Discussion 7 Conclusion References Conversion Methods of Data Mining Analysis in Algorithms of Statistical and Nowcasting Forecast of Convective Precipitation 1 Introduction 2 Methods 2.1 Input Data 2.2 Conoversion Methods 3 Results 4 Conclusion References Interval of Spatial Correlation of Fading in a Single-Beam Decameter Radio Line 1 Introduction 2 Analysis of DCM Wave Propagation in the Ionosphere with Small-Scale Inhomogeneities 3 Spatial Correlation Function of a Single-Beam Decameter Radio Line 4 Analysis of the Refined Spatial Correlation Function of A Single-Beam Decameter Radio Line 5 Conclusion References Virtual Reality Model Assessment Platform: Transfer Models to a Standalone Virtual Reality Headset 1 Introduction 2 Materials and Methods 3 Software Development 3.1 GUI and Screen Manager 3.2 File Management 3.3 Model Repository 4 Results and Discussion 5 Conclusion References Implementing Dynamic Mathematics Software in Calculus II for Engineering Students: Quadratic Surfaces 1 Introduction 2 Method 2.1 Instruments 3 Difficulties Faced by Students on Quadratic Surface 4 Students’ Behavior Initial Analysis During the Calculus II Class 5 Using Hawgent to Help Visualize Quadratic Surface 6 Engineering Students’ Response on Learning Calculus II Using Hawgent 7 Conclusion and Limitation of the Study References A Machine Learning Framework for Inter-frame Prediction for Effective Motion Estimation 1 Introduction 2 Related Work 3 Problem Description 4 Proposed Methodology 5 Algorithm Implementation 6 Results Discussion 7 Conclusion References Distributed Library Model Based on Distributed Ledger Technology for Monitoring and Diagnostics System 1 Introduction 2 The Principles of Building a Distributed Library Based on a Distributed Ledger 2.1 Algorithms of the Model of a Component of the Monitoring and Diagnostics System - A Distributed Library Based on Distributed Ledger Technology 2.2 Connection Point 2.3 Service Programs 2.4 The Algorithm of the Service Program “Data Reception Subtask” 2.5 The Algorithm of the Service Program “Data Processing Subtask” 3 Conclusion References Business Process Reengineering for Health Care Management and Medical Insurance: The Case of Russia 1 Introduction 2 Methods 3 Results 3.1 Conditions for Digitalization of Territorial Compulsory Health Insurance Funds 3.2 Digitalization of Interaction Between Participants of the CHI System 4 Discussions References An Approach to Adjust Effort Estimation of Function Point Analysis 1 Introduction 2 Research Questions 3 Background 3.1 Function Point Analysis 3.2 The Variant of Sofware Effort Estimation 4 Data Pre-processing 5 Regression-Based Adjusting Effort 5.1 Dataset Description 5.2 Adj-Effort Setting 6 Criteria Validation 7 Results and Discussion 8 Conclusion and Future Work References M-Learning Autonomous Model for Learning Mathematics with MatiMath Application in Students of a Confessional 1 Introduction 2 Literature Review 2.1 E-Learning 2.2 M-Learning 2.3 M-Learning Standard and Specification Objects 2.4 M-Learning Standards and Specifications 2.5 Metadata 2.6 Content Packs 2.7 Educational Design 3 Methodology 3.1 Criteria of the Model 3.2 M-Learning Model Requirements for Math Learning 3.3 Development of the Application 3.4 Implementation of the Application 4 Results 5 Conclusions References Methods and Models of Resource Allocation in Load Balancing Clusters 1 Introduction 2 Resource Allocation in Load Balancing Clusters: Problem Statement 3 Numerical Experiment 4 Conclusion References Requirements Engineering in Agile Software Startups - Insights from Multiple Case Studies 1 Introduction 2 Background on Agile Procedure Models and Agile Requirements Engineering 2.1 Agile Procedure Models 2.2 Agile Requirements Engineering 3 Related Work on Requirement Engineering in Startups 4 Case Study Design 5 Criteria for Assessment 6 Studied Startups 6.1 AbiliCor 6.2 Kiwih 6.3 Swip.World 7 Analysis of Results 8 Flexibility in Startups: First Insights 9 Conclusion and Future Work References Manipulator: A Novel Collusion Attack on Trust Management Systems in Social IoT 1 Introduction 2 Background and Motivation 2.1 Trust 2.2 Trust-Related Attacks 2.3 The Prevalence of Attacks and Countermeasures 3 Manipulator: A Novel Collusion Attack on Trust Management Systems 3.1 Motivation of the Manipulator Attack 3.2 Generation of the Manipulator Attack 4 Vulnerabilities of Trust Management Systems Against the Manipulator Attack 5 Conclusion and Future Works References Computer Science and Information Technology Students’ Self-regulated Learning and Knowledge Sharing Behavior as Drivers of Individual Innovative Behavior 1 Introduction 2 A Review of the Literature 2.1 Course Design Characteristics 2.2 Individual Innovative Behavior 2.3 Knowledge Sharing Behavior 2.4 Self-regulated Learning 3 Methods 3.1 Evaluating Model Fit and Goodness of Fit Statistics 4 Results 4.1 Multicollinearity 5 Discussions 5.1 Contributions of the Present Research References The Geoimage Generation Method for Decision Support Systems Based on Natural Language Text Analysis 1 Introduction 2 Related Works 3 Materials and Methods 4 Results 5 Discussion and Future Work References Item-Share Propagation Link Applying for Recommendation 1 Introduction 2 Background 3 Approach 3.1 Problem and Motivation 3.2 Modelling with a Weighted Bipartite Network 3.3 Item Link Prediction 3.4 Recommendation Task 4 Experimentation 4.1 Datasets 4.2 Comparison Methods 4.3 Metrics 5 Results and Discussion 6 Conclusion and Future Work References Empirical Evidence in Early Stage Software Effort Estimation Using Data Flow Diagram 1 Introduction 2 Research Objective 3 Research Methods 3.1 Function Point Analysis 3.2 The Work Effort Calculation 3.3 Early Function Points 3.4 Function Points Estimation from Data Flow Diagram Method 4 The Proposed Method 5 Experiments 5.1 Experimental Setup 5.2 Evaluation Criteria 6 Result and Discussion 6.1 Case-Study 6.2 Empirical Validation 7 Conclusion References Analysis of the Cybersecurity Weaknesses of DLT Ecosystem 1 DLT in the Light of Cybersecurity 2 Methodology 3 DLT Security Constraints 4 Distribution of DLT Cybersecurity Weaknesess 4.1 Architectural Security Weaknesess 4.2 Organizational Weaknesses 4.3 Privacy Challenges 5 Conclusions and Recommendations References A Hybrid Approach with Machine Learning Towards Opinion Mining for Complex Textual Content 1 Introduction 2 Related Work 3 Problem Description 4 Proposed Methodology 5 Algorithm Implementation 5.1 Hybrid Approach for Complex Content 5.2 Machine Learning Approach for Complex Content 6 Results Discussion 7 Conclusion References SCRUM Framework Extended with Clean Architecture Practices for Software Maintainability 1 Introduction 1.1 Research Context 1.2 Related Literature 2 Method 3 Results 3.1 Identification of Clean Architecture Requirements and Practices 3.2 Identification of Scrum Aspects to Extend 3.3 Scrum Extended Framework Specification (Scrum-CA) 4 Results 4.1 Validate the Framework Extended in the Pilot Project 4.2 Conclusions References The Properties of Multistep Runge-Kutta Methods for Neutral Delay Differential Equations 1 Introduction 2 Multistep Runge-Kutta Methods for NDDEs and the Nonlinear Stability 2.1 Some Concepts 2.2 The Stability of Multistep RK Methods 3 The Convergence of Multistep RK Method for NDDEs 4 Conclusions References Comparison of Modified Object Detected Graph Cut and Hybrid Ant Colony Optimization - k-means for MRI Images Segmentation 1 Introduction 2 Hybrid Ant Colony Optimization k-means Method for Image Segmentation 2.1 Modified Object Detected Graph Cut Image Segmentation Algorithm 3 Testing Hybrid ACO-k-means and Modified Object Detected Graph Cut Segmentation Methods 4 Conclusion References Robotic Sorting Line Model Using Coloured Petri Net 1 Introduction 1.1 Motivation 2 Problem Definition 2.1 Problem Statement 2.2 Coloured Petri Net Model Creation 2.3 Timed Coloured Petri Net Model 2.4 Experimental Procedure 3 Results 4 Discussion References Implementation of Elliptic Curve Cryptography Between Autonomous Vehicles and Control Center 1 Introduction 2 Corporate Network 3 OpenSSL Library 4 Choice of the Elliptic Curve 5 Creating Encryption Keys 6 WiFi Communication Setup 7 Exchange of Public Keys 8 Data Encryption and Electronic Signature Signing 9 Decrypting and Digital Signature Verification 10 Conclusion References The Hybrid Methods of Object Detection and Localization in Images 1 Introduction 2 Post-processing Method Based on Clustering Areas of Characteristic Image 3 A Method for Detecting Connected Regions of a Characteristic Image Based on a Template 4 Conclusion References Author Index