1 option
Software Engineering Application in Systems Design : Proceedings of 6th Computational Methods in Systems and Software 2022, Volume 1 / edited by Radek Silhavy, Petr Silhavy, Zdenka Prokopova.
Springer eBooks EBA - Intelligent Technologies and Robotics Collection 2023 Available online
View online- Format:
- Book
- Series:
- Lecture Notes in Networks and Systems, 2367-3389 ; 596
- Language:
- English
- Subjects (All):
- Computational intelligence.
- Software engineering.
- Computational Intelligence.
- Software Engineering.
- Local Subjects:
- Computational Intelligence.
- Software Engineering.
- Physical Description:
- 1 online resource (871 pages)
- Edition:
- 1st ed. 2023.
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2023.
- Summary:
- This book presents the latest research on software engineering application in informatics. The fields of software engineering, informatics, computer science, and artificial intelligence are critical for study in the intelligent systems issue space. This is the first part of the refereed proceedings of the 6th Computational Methods in Systems and Software 2022 (CoMeSySo 2022). The CoMeSySo 2022 conference, which is being hosted online, is breaking down barriers. CoMeSySo 2021 aims to provide a worldwide venue for debate of the most recent high-quality research findings.
- Contents:
- Intro
- Preface
- Program Committee
- Contents
- Determining the Level of Awareness of Electronic Waste Impact on the Environment Among Students in at University of Technology: A Case Study
- 1 Introduction
- 2 Methods
- 2.1 Study Design
- 2.2 Participants Characteristics and Their Selection
- 2.3 Gathering the Data
- 2.4 Data Analysis
- 2.5 Ethics for the Study
- 3 Findings
- 3.1 Theme 1: Disposal
- 3.2 Theme 2: Institutional Management of e-waste
- 3.3 Theme 3: E-waste Impact on the Environment
- 3.4 Theme 4: Knowledge of E-waste Terminology
- 4 Discussion
- References
- Assessment of the Awareness Level of E-waste and Factors That Influence Informal Recycling: A Case Study of E-waste Pickers in Local Municipality-Gauteng Province
- 2.1 Background and Characteristics of the Participants
- 2.2 Selection of the Participants and the Data Gathering
- 2.3 Ethics for the Study
- 2.4 Data Analysis for the Study
- 3.1 Theme 1: Harmful Effects of e-waste Informal Recycling
- 3.2 Theme 2: Knowledge of the Term E-waste
- 3.3 Theme 3: Informal Recycling Workers
- 3.4 Theme 4: Poverty, Education and Unemployment
- Novel Simulation Modelling of Energy-Efficient Routing Scheme Using Scheduling Approach in Internet-of-Things
- 2 Related Work
- 3 Problem Description
- 4 Proposed Methodology
- 5 Algorithm Implementation
- 6 Results Discussion
- 7 Conclusion
- BMA Algorithm for Smartphone Purchase Decisions
- 2 Literature Review
- 2.1 Purchase Decision
- 2.2 Product Features
- 2.3 Social Influence
- 2.4 Product Price
- 2.5 Brand Name
- 3 Methodology
- 3.1 Sample Analysis
- 3.2 Measurement Scales
- 3.3 Analytical Approach
- 4 Results and Discussion
- 4.1 Descriptive Statistics.
- 4.2 BMA (Bayesian Model Averaging) Algorithm
- 5 Conclusions
- The Fast Algorithm for Demodulation of Differential Amplitude Phase Shift Keyed Signals
- 2 Differential Phase Shift Keyed Signal
- 3 Forming a Differential Phase Shift Keyed Signal
- 4 Digital Demodulation of the Differential Phase Shift Keyed Signal
- 5 The Noise Immunity of the Demodulation Algorithms
- 6 Signal-to-Noise Ratio
- On the Digital Algorithms for the DASK Signal Noncoherent Demodulation
- 2 A Differential Amplitude Shift Keyed Signal
- 3 The Demodulation Algorithm
- 4 The Noise Immunity of the Amplitude Ratio Demodulation
- 5 Gaussian Approximation
- 6 Calculating the Probability of Erroneous Demodulation of the Amplitude Ratio
- 7 The DASK Signal Power Characteristics
- 8 Conclusion
- A Computational Error Method to Datapath Single Event Transient Analysis
- 2 Computational Error Representation of the Transient Error Effect
- 2.1 Transient Error Model
- 2.2 Input Dependency of the Error
- 3 Simulation Results
- 4 Conclusion
- Research and Development Corrective Automorphism of Repeated Code for Quantum Error Correction
- 2 Corrective Automorphism of Repeated Code
- 3 Development of Surface Code for Error Correction
- Minimax Filtering of the Complex Code Shift Keyed Signals
- 2 Time Resolution of the Arbitrary Complex Code Shift Keyed Signals
- 3 The Efficiency of the Minimax Filtration of the PSK and APSK Pulse Signals
- Feature Extraction and Selection of Kidney Ultrasound Images Using a Deep CNN and PCA
- 2 Methodology
- 3 Image Acquisition
- 4 Preprocessing
- 5 VGG16
- 6 PCA
- 7 Result.
- 7.1 Experimental Setup
- 7.2 Performance Metrics
- 7.3 Performance Analysis
- 8 Discussion
- 9 Conclusion
- Process Control Laboratory
- 2 Materials and Methods
- 2.1 RT 010 - Level Control
- 2.2 RT 020 - Flow Control
- 2.3 RT 030 - Pressure Control
- 2.4 RT 040 - Temperature Control
- 2.5 RT 050 - Speed Control
- 2.6 RT 060 - Position Control
- 2.7 LabJack U12 Acquisition Card
- 3 Results and Discussion
- 3.1 Experimental Identification
- 3.2 On-Off Controller
- 3.3 PID Controller
- 3.4 Model Predictive Controller
- Kinect-Based Evaluation of Severity of Facial Paresis: Pilot Study
- 1.1 Biomedical Background
- 2.1 Data Acquisition
- 2.2 Data Pre-processing
- 2.3 Data Processing
- 2.4 Statistical Modeling
- Explanation of the Predictive Controller and the Effect of Its Tuning on the Control Quality
- 2.1 Cost Function Definition
- 2.2 Predictions and Predictor for State-Space Model
- 2.3 Predictions and Predictor for Transfer Function Model
- 2.4 Problem Solution
- 2.5 GUNT Training Systems
- 3.1 RT 050-Speed Control-State-Space MPC
- 3.2 RT 050-Speed Control-Transfer Function MPC
- 3.3 RT 060-Position Control-State-Space MPC
- 3.4 RT 060-Position Control-Transfer Function MPC
- Learningchain. A Novel Blockchain-Based Meritocratic Marketplace for Training Distributed Machine Learning Models
- 2 Research Objective
- 3 Literature Review
- 4 Related Work
- 5 System Model
- 5.1 Formal Notions of the Beez Blockchain
- 6 Experiments and Obtained Results
- 7 Conclusion and Future Work
- References.
- Hiding Simple Text Files in Multimedia Files: A New Method and Its Implementation
- 2 Related Research
- 3 Method
- 3.1 Text to Image
- 3.2 Text to Sound
- 3.3 Modifications
- 3.4 Implementation
- 3.5 Applications
- 3.6 Example
- 3.7 Case Study
- 4.1 Hiding in Another Multimedia Files
- 4.2 Comparison with LSB Method
- 4.3 Encryption
- 4.4 Limitations
- How to Optimally Reconfigure Average Consensus with Maximum-Degree Weights in Bipartite Regular Graphs
- 2 Theoretical Background
- 2.1 Average Consensus with Maximum-Degree Weights in Bipartite Regular Graphs
- 2.2 Five Conditions for Detecting Bipartite Regular Topology in Distributed Fashion
- 3 Research Methodology and Metrics for Performance Evaluation
- 4 Experiments and Discussion about Observed Phenomena
- 5 Conclusion
- Blockchain as an Object of Value Assessment
- 3 Results
- Analysis of Mimetic Muscle Rehabilitation: Multi-platform Facemarks Detection
- 2.1 Automatic Exercises Detection
- 2.2 Android Platform
- 2.3 iOS Platform
- 2.4 Windows Platform
- 3.1 Android
- 3.2 iOS
- 3.3 Windows
- 4 Future Work
- Suitability of MQTT and REST Communication Protocols for AIoT or IIoT Devices Based on ESP32 S3
- 2 Background
- 3 Materials and Methods
- 4 Experiment Design
- 5 Experiment Implementation and Result
- 6 Conclusions
- Goal Modeling for Linked Data Exploitation of Municipalities Data Access in South Africa
- 1.1 Governmental Structure
- 1.2 Information Technology Adoption in South African Municipalities
- 1.3 Background of Linked Data.
- 1.4 Objectives
- 2 Goal Modeling to Capture Competency Questions
- 2.1 Early Requirements Analysis: The Goal-Oriented Model of the Municipality
- 2.2 Late Requirements Analysis: Modelling the Competency Questions
- 2.3 Late Requirement Actor Goals Modeling
- 2.4 Empirical Evaluation of Competency Questions
- 3 Translating Natural Language Competency Questions into SPARQL Queries
- 3.1 Competency Questions Translation Approach
- 3.2 Categorizing the Competency Questions
- 3.3 Extracting Entity or Entities from Questions
- 3.4 Constructing the Appropriate SPARQL Queries
- 4 Conclusion and Future Work
- Application of the K-medians Clustering Algorithm for Test Analysis in E-learning
- 2 Method
- 3 Program Implementation
- 4 The Effect of the Obtained Results on the Test Questions of the E-course
- Pursuit on the Plane by Objects Moving Away from the Trajectory of the Defending Object, with Simulation of the Detection Area
- 2 Problem Statement
- 3 Theory and Experimental Results
- 3.1 Methods of Parallel Approach and Correction During the Chase
- 3.2 The Descent Function of Catching Objects from the Pursuer's Trajectory
- 3.3 Formation of a Tracking Area for Pursuing Objects
- 3.4 The Behavior Model of the Pursuing Object
- 4 Discussion of Experiments
- Prediction of the Failure of a Business Process Event Using Event Log and Deep Learning
- 2 Related Works
- 2.1 Business Process Failure
- 2.2 Loop Based Process
- 2.3 Critics
- 3 Description and Preprocessing of the Dataset
- 4 Prediction Model
- 4.1 Recurrent Neural Network (RNN)
- 4.2 Convolutional Neural Network (CNN)
- 5 Results
- 6 Explainability
- The Demand Dynamics Forecasting for Perishable Products
- 1 Introduction.
- 2 Problem Statement.
- Notes:
- Includes bibliographical references and index.
- Other Format:
- Print version: Silhavy, Radek Software Engineering Application in Systems Design
- ISBN:
- 3-031-21435-8
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.