دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Radek Silhavy, Petr Silhavy, Zdenka Prokopova سری: Lecture Notes in Networks and Systems, 596 ISBN (شابک) : 303121434X, 9783031214349 ناشر: Springer سال نشر: 2023 تعداد صفحات: 870 [871] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 88 Mb
در صورت تبدیل فایل کتاب Software Engineering Application in Systems Design: Proceedings of 6th Computational Methods in Systems and Software 2022, Volume 1 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب کاربرد مهندسی نرم افزار در طراحی سیستم ها: مجموعه مقالات ششمین روش محاسباتی در سیستم ها و نرم افزار 2022، جلد 1 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب آخرین تحقیقات در مورد کاربرد مهندسی نرم افزار در انفورماتیک را ارائه می دهد. رشتههای مهندسی نرمافزار، انفورماتیک، علوم کامپیوتر و هوش مصنوعی برای مطالعه در فضای مسائل سیستمهای هوشمند حیاتی هستند.
این اولین بخش از مجموعه مقالات داوری است. ششمین روشهای محاسباتی در سیستمها و نرمافزار 2022 (CoMeSySo 2022). کنفرانس CoMeSySo 2022 که به صورت آنلاین میزبانی می شود، در حال شکستن موانع است. CoMeSySo 2021 با هدف ارائه یک مکان جهانی برای بحث در مورد جدیدترین یافته های تحقیقاتی با کیفیت بالا است.
This book presents the latest research on software engineering application in informatics. The fields of software engineering, informatics, computer science, and artificial intelligence are critical for study in the intelligent systems issue space.
This is the first part of the refereed proceedings of the 6th Computational Methods in Systems and Software 2022 (CoMeSySo 2022). The CoMeSySo 2022 conference, which is being hosted online, is breaking down barriers. CoMeSySo 2021 aims to provide a worldwide venue for debate of the most recent high-quality research findings.
Preface Program Committee Contents Determining the Level of Awareness of Electronic Waste Impact on the Environment Among Students in at University of Technology: A Case Study 1 Introduction 2 Methods 2.1 Study Design 2.2 Participants Characteristics and Their Selection 2.3 Gathering the Data 2.4 Data Analysis 2.5 Ethics for the Study 3 Findings 3.1 Theme 1: Disposal 3.2 Theme 2: Institutional Management of e-waste 3.3 Theme 3: E-waste Impact on the Environment 3.4 Theme 4: Knowledge of E-waste Terminology 4 Discussion References Assessment of the Awareness Level of E-waste and Factors That Influence Informal Recycling: A Case Study of E-waste Pickers in Local Municipality—Gauteng Province 1 Introduction 2 Methods 2.1 Background and Characteristics of the Participants 2.2 Selection of the Participants and the Data Gathering 2.3 Ethics for the Study 2.4 Data Analysis for the Study 3 Findings 3.1 Theme 1: Harmful Effects of e-waste Informal Recycling 3.2 Theme 2: Knowledge of the Term E-waste 3.3 Theme 3: Informal Recycling Workers 3.4 Theme 4: Poverty, Education and Unemployment 4 Discussion References Novel Simulation Modelling of Energy-Efficient Routing Scheme Using Scheduling Approach in Internet-of-Things 1 Introduction 2 Related Work 3 Problem Description 4 Proposed Methodology 5 Algorithm Implementation 6 Results Discussion 7 Conclusion References BMA Algorithm for Smartphone Purchase Decisions 1 Introduction 2 Literature Review 2.1 Purchase Decision 2.2 Product Features 2.3 Social Influence 2.4 Product Price 2.5 Brand Name 3 Methodology 3.1 Sample Analysis 3.2 Measurement Scales 3.3 Analytical Approach 4 Results and Discussion 4.1 Descriptive Statistics 4.2 BMA (Bayesian Model Averaging) Algorithm 5 Conclusions References The Fast Algorithm for Demodulation of Differential Amplitude Phase Shift Keyed Signals 1 Introduction 2 Differential Phase Shift Keyed Signal 3 Forming a Differential Phase Shift Keyed Signal 4 Digital Demodulation of the Differential Phase Shift Keyed Signal 5 The Noise Immunity of the Demodulation Algorithms 6 Signal-to-Noise Ratio 7 Conclusion References On the Digital Algorithms for the DASK Signal Noncoherent Demodulation 1 Introduction 2 A Differential Amplitude Shift Keyed Signal 3 The Demodulation Algorithm 4 The Noise Immunity of the Amplitude Ratio Demodulation 5 Gaussian Approximation 6 Calculating the Probability of Erroneous Demodulation of the Amplitude Ratio 7 The DASK Signal Power Characteristics 8 Conclusion References A Computational Error Method to Datapath Single Event Transient Analysis 1 Introduction 2 Computational Error Representation of the Transient Error Effect 2.1 Transient Error Model 2.2 Input Dependency of the Error 3 Simulation Results 4 Conclusion References Research and Development Corrective Automorphism of Repeated Code for Quantum Error Correction 1 Introduction 2 Corrective Automorphism of Repeated Code 3 Development of Surface Code for Error Correction 4 Conclusion References Minimax Filtering of the Complex Code Shift Keyed Signals 1 Introduction 2 Time Resolution of the Arbitrary Complex Code Shift Keyed Signals 3 The Efficiency of the Minimax Filtration of the PSK and APSK Pulse Signals 4 Conclusion References Feature Extraction and Selection of Kidney Ultrasound Images Using a Deep CNN and PCA 1 Introduction 2 Methodology 3 Image Acquisition 4 Preprocessing 5 VGG16 6 PCA 7 Result 7.1 Experimental Setup 7.2 Performance Metrics 7.3 Performance Analysis 8 Discussion 9 Conclusion References Process Control Laboratory 1 Introduction 2 Materials and Methods 2.1 RT 010 - Level Control 2.2 RT 020 - Flow Control 2.3 RT 030 - Pressure Control 2.4 RT 040 - Temperature Control 2.5 RT 050 - Speed Control 2.6 RT 060 - Position Control 2.7 LabJack U12 Acquisition Card 3 Results and Discussion 3.1 Experimental Identification 3.2 On-Off Controller 3.3 PID Controller 3.4 Model Predictive Controller 4 Conclusion References Kinect-Based Evaluation of Severity of Facial Paresis: Pilot Study 1 Introduction 1.1 Biomedical Background 2 Materials and Methods 2.1 Data Acquisition 2.2 Data Pre-processing 2.3 Data Processing 2.4 Statistical Modeling 3 Results and Discussion 4 Conclusion References Explanation of the Predictive Controller and the Effect of Its Tuning on the Control Quality 1 Introduction 2 Materials and Methods 2.1 Cost Function Definition 2.2 Predictions and Predictor for State-Space Model 2.3 Predictions and Predictor for Transfer Function Model 2.4 Problem Solution 2.5 GUNT Training Systems 3 Results and Discussion 3.1 RT 050—Speed Control—State-Space MPC 3.2 RT 050—Speed Control—Transfer Function MPC 3.3 RT 060—Position Control—State-Space MPC 3.4 RT 060—Position Control—Transfer Function MPC 4 Conclusion References Learningchain. A Novel Blockchain-Based Meritocratic Marketplace for Training Distributed Machine Learning Models 1 Introduction 2 Research Objective 3 Literature Review 4 Related Work 5 System Model 5.1 Formal Notions of the Beez Blockchain 6 Experiments and Obtained Results 7 Conclusion and Future Work References Hiding Simple Text Files in Multimedia Files: A New Method and Its Implementation 1 Introduction 2 Related Research 3 Method 3.1 Text to Image 3.2 Text to Sound 3.3 Modifications 3.4 Implementation 3.5 Applications 3.6 Example 3.7 Case Study 4 Discussion 4.1 Hiding in Another Multimedia Files 4.2 Comparison with LSB Method 4.3 Encryption 4.4 Limitations 5 Conclusions References How to Optimally Reconfigure Average Consensus with Maximum-Degree Weights in Bipartite Regular Graphs 1 Introduction 2 Theoretical Background 2.1 Average Consensus with Maximum-Degree Weights in Bipartite Regular Graphs 2.2 Five Conditions for Detecting Bipartite Regular Topology in Distributed Fashion 3 Research Methodology and Metrics for Performance Evaluation 4 Experiments and Discussion about Observed Phenomena 5 Conclusion References Blockchain as an Object of Value Assessment 1 Introduction 2 Methodology 3 Results 4 Discussion 5 Conclusion References Analysis of Mimetic Muscle Rehabilitation: Multi-platform Facemarks Detection 1 Introduction 2 Materials and Methods 2.1 Automatic Exercises Detection 2.2 Android Platform 2.3 iOS Platform 2.4 Windows Platform 3 Results 3.1 Android 3.2 iOS 3.3 Windows 4 Future Work 5 Conclusion References Suitability of MQTT and REST Communication Protocols for AIoT or IIoT Devices Based on ESP32 S3 1 Introduction 2 Background 3 Materials and Methods 4 Experiment Design 5 Experiment Implementation and Result 6 Conclusions References Goal Modeling for Linked Data Exploitation of Municipalities Data Access in South Africa 1 Introduction 1.1 Governmental Structure 1.2 Information Technology Adoption in South African Municipalities 1.3 Background of Linked Data 1.4 Objectives 2 Goal Modeling to Capture Competency Questions 2.1 Early Requirements Analysis: The Goal-Oriented Model of the Municipality 2.2 Late Requirements Analysis: Modelling the Competency Questions 2.3 Late Requirement Actor Goals Modeling 2.4 Empirical Evaluation of Competency Questions 3 Translating Natural Language Competency Questions into SPARQL Queries 3.1 Competency Questions Translation Approach 3.2 Categorizing the Competency Questions 3.3 Extracting Entity or Entities from Questions 3.4 Constructing the Appropriate SPARQL Queries 4 Conclusion and Future Work References Application of the K-medians Clustering Algorithm for Test Analysis in E-learning 1 Introduction 2 Method 3 Program Implementation 4 The Effect of the Obtained Results on the Test Questions of the E-course 5 Conclusion References Pursuit on the Plane by Objects Moving Away from the Trajectory of the Defending Object, with Simulation of the Detection Area 1 Introduction 2 Problem Statement 3 Theory and Experimental Results 3.1 Methods of Parallel Approach and Correction During the Chase 3.2 The Descent Function of Catching Objects from the Pursuer’s Trajectory 3.3 Formation of a Tracking Area for Pursuing Objects 3.4 The Behavior Model of the Pursuing Object 4 Discussion of Experiments References Prediction of the Failure of a Business Process Event Using Event Log and Deep Learning 1 Introduction 2 Related Works 2.1 Business Process Failure 2.2 Loop Based Process 2.3 Critics 3 Description and Preprocessing of the Dataset 4 Prediction Model 4.1 Recurrent Neural Network (RNN) 4.2 Convolutional Neural Network (CNN) 5 Results 6 Explainability 7 Conclusion References The Demand Dynamics Forecasting for Perishable Products 1 Introduction 2 Problem Statement 3 Mathematical Model 4 Realization 4.1 Additive Decomposition Model 4.2 Multiplicative Decomposition Model 5 Conclusion References On the Software Projects’ Duration Estimation Using Support Vector Regression 1 Introduction 2 Related Works 3 Background 3.1 Multiple Linear Regression 3.2 Support Vector Regression 4 Experiment 4.1 Data Preprocessing 4.2 Experiment Setup 4.3 Evaluation Criteria 5 Result and Discussion 6 Conclusion References Modeling Tasks of Patient Assistance and Emergency Management in Medical Cyber-Physical Systems 1 Introduction 2 Related Work 3 Methods and Results 4 Conclusion References Analysis of Collaborative Filtration Parameters 1 Introduction 2 Formation of Recommendations Using Collaborative Filtering 2.1 Collaborative Filtering Algorithm 2.2 Finding Similarities Between Objects Using Cosine Similarity 2.3 Determination of the Quality of the Generated Recommendations 3 Investigation of Parameters 3.1 Dataset for the Study 3.2 Selection of Research Parameters 3.3 Effective Number of Nearby Users for a Specific Total Number of Users 3.4 Analysis of the Influence of Parameters on the Quality of Recommendations 3.5 Analysis of the Influence of Parameters on the Speed of the Algorithm 3.6 Determining the Effective Ratio of Parameters 4 Conclusions References A Modelling of Novel Approach for Stock Portfolio Management Using Unsupervised Algorithm and Deep Reinforcement Technique 1 Introduction 2 Related Work 3 Proposed Methodology 4 Implementation Strategy 4.1 Portfolio Management 4.2 Trading Algorithm 5 Result and Discussion 6 Conclusion References Development of Motion Analysis Tool for Orthopedic Diseases: Inertial Measurements 1 Introduction 1.1 State of the Art 2 Inertial Measurements Unit - IMU 3 IMU Application 3.1 Architecture 3.2 AHRS Algorithm 4 PC Application 5 Conclusion 6 Future Work References Simulation of Multiple Autonomous Mobile Robots Using a Gazebo Simulator 1 Introduction 2 Methods 2.1 Components of the Robotic System 2.2 Hardware Abstract Layer 2.3 Communication with the Gazebo 2.4 PLC Data Structure 2.5 Multiple Robots Inside the Simulator 2.6 Virtual PLC Inside a Gazebo Model 3 Results and Discussion 4 Conclusion References AVL Based on Fusion of IMU, GPS and Camera Sensors 1 Introduction 2 Matlab Simulation 2.1 Driving Scenario 3 Fusion Filter 3.1 Loosely-Coupled Method 3.2 Orientation as Quaternion 4 Matlab Implementation 4.1 IMU Sensor Model 4.2 GPS Receiver Model 4.3 Monocular Visual Odometry Model 5 Simulation Setup 5.1 Carrying Out the Simulation 5.2 Interpretation and Analysis of Results 5.3 Localization Based on Data from the IMU 5.4 Localization Based on IMU + GPS 5.5 Localization Based on IMU + MVO 5.6 Localization Based on Fusion of IMU + GPS + MVO 5.7 Discussion of Simulation Results 6 Conclusion References An AI-Based Platform Architecture with Situational Awareness for Travel Plans 1 Introduction 2 Related Research 2.1 Situation Recognition Technology 2.2 Utilization of Ontology 2.3 Utilizing the Ontology of Situational Awareness Technology 3 System Architecture 3.1 Overview 3.2 S/W Architecture Configuration 4 Implementation 5 Conclusion References Cyber-Physical Test Facility for Certification of Robotic Unmanned Aerial Systems 1 Introduction 2 Functional Analysis of the Certification System for Unmanned Aerial Systems 3 Formal Statement of the Problem of Certification of Unmanned Aerial Systems 4 Flight Model System for Testing and Certification of Unmanned Aerial Systems 5 Conclusion References Information Models of UAVs Group Control 1 Introduction 2 Mathematical Models of UAVs 3 Models and Forecasts of Information Signals 4 Conclusion References A Computational Approach to Calculate the Hydrographic Zero Along the Moroccan Atlantic Coast (Port of Mohammedia) Using Matlab 1 Introduction 2 Methods 2.1 Study Area 2.2 Tide Gauge and Data 2.3 Data Processing Tools 3 Results 3.1 Signal Filtering 3.2 Spectral Analysis 3.3 Predictions 3.4 Redefine the Hydrographic Zero 4 Conclusion References Nanotechnology on Perspective Computer Science 1 Introduction 2 A Review to Perspective 3 Phenomenon and Paradigm in Perspective 4 Nano and Computer as Perspective 4.1 From Nano to Technology 4.2 From Science to Nano 5 Conclusion References A 3D Visualization of Zlín in the Eighteen–Nineties in the Unreal Engine Environment 1 Introduction 2 A Short History of Zlín 3 Used Resources and Software 3.1 Acquiring Resources 3.2 Software Used 4 Modelling and Exporting 5 Creation of the Application 5.1 Creating a Scene 5.2 Scene Accessories 5.3 Control and Application Menu 6 Results 7 Conclusion References Reference Method for the Care of Health Consultations of Older Adult Users Based on Chatbot, in a Context of Pandemic 1 Introduction 2 Method 2.1 Definition of Use Case and Exploration 2.2 Conversation Scripts 2.3 Design and Test 2.4 Development of the Chatbot 3 Results 4 Conclusions References Prototype Technology Decision Support System for the EBW Process 1 Introduction 2 Mathematical Support of the Software System 3 Software Design 4 Software System Informational Support 5 Description of the Programmer System 6 Conclusion References Modeling the Temperature Distribution in an Electron Beam Welded Bimetallic Ring with COMSOL Multiphysics 1 Introduction 2 Material and Methods 3 Result and Discussion 4 Conclusion References Voice Recording Setup in Clinical Practice 1 Introduction 2 Recording Setup 3 Software Voice Analyst 4 On Text Selection and Measurement 5 Conclusions References Development of Automated Control System of Electron-Beam Welding Process 1 Introduction 2 Applied Mathematical Methods 2.1 Correlation Analysis 2.2 Regression Analysis 2.3 Artificial Neural Networks 2.4 Nonparametric Regression 3 Description of the Operation of the Program 4 Description of the Software System 5 Results 6 Conclusion References IoT Device Using LoRaWAN for Data Transfer for Long Distances 1 Introduction 2 Background 3 Materials and Methods 4 Experiment Implementation and Result 5 Conclusions References Using Technical and Structural Coefficients of Economic Statistics to Equalize Flows of Input-Output Table 1 Introduction 2 Methods, Models, Data 3 Results 3.1 Creating by Equalize Input-Output Table Accounts 3.2 Realization by Equalize Input-Output Table Accounts 4 Discussions 5 Conclusion References Application of the Method of Expert Assessments in Determining the Level of Criticality of the Information Security Vulnerability of Smart Contracts 1 Introduction 2 Basic Approaches to iS Threat and Vulnerability Analysis 3 Methodology for Determining the Criticality Level of iS Vulnerability 3.1 Degree of Initial Security of BS 3.2 Relevance of iS Vulnerability Implementation 3.3 Degree of Possible Damage from the Implementation of an iS Vulnerability 3.4 Labor Intensity of iS Vulnerability Implementation 3.5 Calculation of iS Vulnerability Criticality Level 4 Validation of the Proposed Methodology for Determining the Level of Criticality of iS Vulnerability 4.1 Determination of the Relevance of Reentrancy Implementation 4.2 Determination of the Degree of Initial Security of BS 4.3 Determination of the Degree of Possible Damage from the Implementation of a Reentrancy 4.4 Determination of the Labor Intensity of Reentrancy Implementation 4.5 Results and Analysis 5 Conclusion/Future Work References Stabilization of Second-Order Systems Using a P/I-Delayed Controller 1 Introduction 2 Theoretical Background 2.1 Principle of the Design Method 2.2 Determination of the Stabilization Pair ( kp ,ki ) 3 Practical Part 3.1 Numerical Example I 3.2 Numerical Example II 4 Conclusion References Analysis of Data Gathering and Processing Modes During the Primary Identification of Radio Signals Through the Panoramic Spectral Analysis 1 Introduction 2 Initial Data Generation for the Primary Identification of Signals 3 The Concept of the Spectral Mask and Its Use for the Generation of Identification Decision Determining Statistics 4 A Generalized Signal Identification Algorithm 5 Cyclic Signal Identification and the Data Update Problem 6 The Features of a Deferred Mode of Data Gathering and Processing 7 The Features of a Synchronous Mode of Data Gathering and Processing 8 Estimation of the Time Parameters of the Proposed Modes 9 Conclusion References Business Model as a Basic Building Block of Business Architecture 1 Introduction 2 Business Architecture 3 Business Model 4 Linking Business Model to Business Architecture 5 Conclusion References Facial Recognition Technologies Patent Landscape 1 Introduction 2 Discussion 3 Processing 3.1 The Current State of the Face Recognition Technology Market 3.2 Patent Activity in the Field of Face Recognition Technologies 3.3 The Main Technological Niches in the Field of Face Recognition 4 Conclusion References Method for Distributed Mapping of Terrain by a Heterogeneous Group of Robots Based on Google Cartographer 1 Introduction 2 Overview and Classification of SLAM Algorithms 3 The Developed Solution 4 Description of UAV and Ground-Based Robot Models 5 Experiments 6 Conclusion References Geoportal Systems as an Access Point to Spatial Data Infrastructure 1 Introduction 2 Related Work 3 Research Method 4 Results and Discussions 5 Conclusion References Low Input Voltage DC-DC Converter for Harvesting Energy by Microbial Fuel Cell 1 Introduction 2 Statement of Problem 3 Ultra-low Voltage Energy Converter 4 Microbial Fuel Cell 5 Manufacturing of Microbial Fuel Cell 6 Manufacturing of the Load Power Driver 7 Results 7.1 Blocking Oscillator. Selection of Winding Inductance 7.2 Demonstration of the Load Operation 8 Conclusion References Underwater Object Tracking with 2D Sonar Signals Preprocessed Using the Virtual High-Dynamic Range Enhancement Method 1 Introduction 2 Image Acquisition Platform 2.1 Hardware 2.2 Software 3 Image Enhancement with VHDR 4 Tests 5 Conclusion and Future Works References Error-Free 2d Pictogrammic Syntax in a Programming Learning Environment for Preschool Children 1 Introduction 1.1 A Distinctive Feature of the Textless Programming Environment PiktoMir 1.2 The Main Problem Solved in This Article 2 Methodology 2.1 Proposed Way to Solve the Main Problem 2.2 The Advantage of Shifting the Emphasis from Syntax to Semantics 3 Results 3.1 General Scheme for Interpreting the PiktoMir Program Composed in Error-Free Syntax 3.2 Program Examples 3.3 Outline of a Formal Algorithm for Compiling the Body of a Single Subroutine in the Pikto Language 4 Discussion 5 Conclusion References Comparison of Stabilization with P/I-Delayed Controllers for Second-Order Systems Using Built-In MATLAB Heuristic Optimization Methods 1 Introduction 2 Preliminaries and Statement of the Problem 2.1 Closed-Loop Control and Stabilization Pair ( kp , ki ) 2.2 Error Index 3 Heuristic Optimization Methods 3.1 Simulated Annealing 3.2 Genetic Algorithm 3.3 Pattern Search 4 Numerical Optimization Results 4.1 Considered Plant Models and Their Controllers 4.2 The Stability Region in the ( kp ,ki ) Plane 4.3 Main Results 5 Conclusion References Using a Distributed Architecture of a Geographic Information System to Support Thin Clients 1 Introduction 2 Geographic Information Systems Architecture 3 GIS Application 4 Experiments 5 Conclusion References Estimating the Approximate Necessity of Essential Medicines in Syria Using Machine Learning 1 Introduction 2 Estimation of the Demand of Essential Medicines 2.1 Problem Statement 2.2 Research Methodology 2.3 Understanding the Role of Essential Medicines 2.4 Dataset 2.5 Random Forest Classifier 2.6 Implementation 2.7 Results and Analysis 3 Conclusion/Future Work References Web Scanner: An Innovative Prototype for Checking Web Vulnerability 1 Introduction 2 Motivation 3 Related Work 4 Problem Definition and Objectives 5 Flowchart and Algorithm 6 Results and Discussion 7 Conclusion References Analysis of the Performance of NewSQL Databases Compared to RDBMS Based on Linux OS 1 Introduction 2 Related Work and Explanations 2.1 RDBMS 2.2 NewSQL Databases 2.3 Performance 3 Methodology 3.1 Databases 3.2 Data Set 3.3 Test Settings 3.4 KPIs 4 Performance Test Results 5 Conclusion and Future Research References Improving the Performance of Effort Estimation in Terms of Function Point Analysis by Balancing Datasets 1 Introduction 2 Research Questions 3 Related Works 4 Dataset Description 5 Experimental Design 6 Criteria Validations 7 Results and Discussion 8 Conclusion and Future Work References The Model of Interface Structure for Technical Systems Based on a Communication of Logics 1 Introduction 2 The Problem of Communication in the Existing Paradigm of Developing Interfaces of Technical Systems 3 The Model of the Structure of the Interface of Technical Systems Based on the Communication of Logics 4 Conclusions References Classification of Interaction Participants in the Formation of the Trajectory of Diagnosis and Treatment of Bronchopulmonary Diseases to Design Agents of a Multi-agent System 1 Introduction 2 Problem Description and Problem Statement 3 Known Approaches to Solving Such Problems 4 Proposed Approach 4.1 Classification of Interaction Participants in the Formation of the PATient’s Treatment Trajectory 4.2 Choosing a Digital Platform for Multi-agent Modeling 4.3 Multi-agent Model for the Formation of a Rational Trajectory for the Diagnosis and Treatment of a Patient 4.4 Development of a Multi-agent Model for the Formation of a Trajectory for the Diagnosis and Treatment of a Patient in the Digital Platform AnyLogic 5 Primary Data Processing for Subsequent Modeling 6 Conclusion References Intelligent Decision Support Based on Mental User Models: Research Design 1 Introduction 2 Materials and Methods 3 Results 4 Conclusions and Future Work References Comparison of Web Pagebuilders and Their Use in Teaching Web Development 1 Introduction 2 Teaching Websites in a Graphical Way 2.1 Block-Base Coding 2.2 Block Programming or Websites 3 Using Pagebuilders in Practice 4 Known Pagebuilders 4.1 Bootstrap Studio 4.2 Wix 4.3 Elementor 4.4 Weebly 4.5 Webnode 5 Comparison of Pagebuilders 6 Conclusion References Understanding the Labor Market from the Bottom Up with an Agent-Based Model 1 Introduction 2 The Labor Market: From Economic Modeling to Agent-Based Modeling 3 Proposed Labor Market Model 3.1 The Migratory Process 3.2 The Job Search Process 4 Simulations and Results 4.1 Scenarios Tested 5 Conclusion References Predicting Threat Degree for Onset of Type 2 Diabetes Mellitus Based on Machine Learning Methods 1 Introduction 2 Problem Definition and Suggested Decision 2.1 State of Art 2.2 Date Structure and Synthesis 2.3 Construction of Logistic Regression Model 3 Results 4 Discussions 5 Conclusions References A Creating of Processes and Threads in MS Windows 1 Introduction 2 Threads Versus Processes 2.1 Processes 2.2 Threads 3 A Time Measurement 4 Measuring the Creation Time of Processes and Threads 4.1 Time Measurement Summary 5 Conclusions References Agriculture, Hunting, Forestry, and Fishing Industry of Kazakhstan Economy: Input-Output Analysis 1 Introduction 2 Methods, Models, Data 3 Results 3.1 Disbalance and (+) Over- and/or (−) Under-Evaluation in Agriculture Industry Flows 3.2 Disbalance and (+) Over- and/or (−) Under-Evaluation in Rest of Economics Flows 4 Discussions 5 Conclusion Appendix References Interdisciplinary Research and Development Projects’ Application Domains Classification 1 Introduction 2 Materials and Methods 3 Results 4 Discussion 5 Conclusion References Non-fungible Tokens: Value for Digital Arts and Pricing Factors 1 Introduction 2 NFT Art: Concept and Factors of Pricing 3 Modeling the Pricing Factors of NFT Art Collection “Unicly CryptoPunks” 4 Conclusions References Intelligent Methods for Restructuring Digital Science-Intensive Solutions of Network Innovation Institutions 1 Introduction 2 Materials and Methods 3 Results 4 Discussion 5 Conclusion References Decision Support System for Multi-criteria Information-Logical Analysis of Scientific and Technical Projects of Innovative Enterprises 1 Introduction 2 Materials and Methods 3 Results 4 Discussion 5 Conclusion References An Expert System for the Priorities Formation in Sustainable Development Fundamental Research 1 Introduction 2 Materials and Methods 3 Results 4 Discussion 5 Conclusion References Applying Verbal Decision Analysis for Public Research and Technology Advancement 1 Introduction 2 Materials and Methods 3 Results 4 Discussion 5 Conclusion References Finding Research Community Structures Based on Semantic Relations of Concepts 1 Introduction 2 Materials and Methods 3 Results 4 Discussion 5 Conclusion References Author Index