Skip to main content

2019 | Buch

Software Engineering and Algorithms in Intelligent Systems

Proceedings of 7th Computer Science On-line Conference 2018, Volume 1

insite
SUCHEN

Über dieses Buch

This book presents new software engineering approaches and methods, discussing real-world problems and exploratory research that describes novel approaches, modern design techniques, hybrid algorithms and empirical methods. This book constitutes part of the refereed proceedings of the Software Engineering and Algorithms in Intelligent Systems Section of the 7th Computer Science On-line Conference 2018 (CSOC 2018), held in April 2018.

Inhaltsverzeichnis

Frontmatter
The Digitization of Society – Case of Specific Chosen State Alliance of Four Central European States

The purpose of this research is to study the process of the Visegrad Group citizens being gradually incorporated in the digital environment. The present digital world needs digital sovereign residents who are competent i.e. capable of dealing with Information Age systems; electronic devices, digital computers and modern scientific technologies and are open i.e. who are open and proactively ready to benefit from advantages and challenge possible risks of intended usage. Further requirements on the direction through the entire digital world are digital access and the spreader usage of distinctive products and services. An online survey was conducted examining this development, and respondents were questioned on certain issues and aspects of the digital world in the Visegrad Group; including countries as the Czech Republic, Hungary, Poland and Slovakia

Michal Beno, Darina Saxunova
An Efficient Security System in Wireless Local Area Network (WLAN) Against Network Intrusion

The computer network faces any kind of unauthorized activities i.e. Network Intrusion (NI). The detection of these NI needs a better understanding of how the attacks work. The NI detection is necessary to protect the system information in current activities of the cyber attacks. This paper is intended to improve the security aspect in the Wireless Local Area Network (WLAN) by implementing a machine learning approach i.e. Support Vector Machines (SVMs). In this, the computer lab generated data are used for experimentation. The SVM detects the NI by recognizing the patterns of attack. The simulation outcome of the proposed security framework recognizes the NI and bells the alarm. The analysis of this security system is performed by considering the efficiency of detection and false alarm rate that offers significant coverage and effective detection.

P. H. Latha, R. Vasantha
FMHT: A Novel Framework for Mitigating Hidden Terminal Issue in Wireless Mesh Network

Various researchers have theoretically discussed the Hidden terminal problem in Wireless Mesh Network (WMN), but almost no standard implementation or modeling is being explored in recent years when WMN is used in large-scale communication in the presence of interference and collision. Therefore, this paper presents a framework called as Framework for Mitigating Hidden Terminal FMHT that contributes to the identification of hidden terminal followed by compensating the communication loss by introducing a novel algorithm for enhancing channel capacity. The sole target was to improve the Quality-of-Service in WMN over different conditions of dynamic traffic. The proposed system also assists in formulating an effective decision for traffic flow admission where the simulation outcome shows better improvement in data delivery performance in contrast to existing techniques.

T. H. Naveen, G. Vasanth
Recursive Algorithm for Exhaustive Search of Possible Multiversion Software Realizations with the Choice of the Optimal Versions Set

N-version software is used all over the world as one of the approaches that can provide with the high level of reliability and software fault tolerance. The application of redundant module versions of software allows to obtain a correct result even if there is an error in the separate module versions. However, the program redundancy that can increase software reliability needs extra resources. It results in an optimization problem. There is a necessity for a certain variant of multiversion software realization i.e. such a modules versions set is required that demands less resources and guarantees high level of reliability simultaneously. The exhaustive search of all possible multiversion software realizations is carried out by the recursive algorithm proposed in the article.

Roman Yu Tsarev, Denis V. Gruzenkin, Galina V. Grishina
Noise Detection and Elimination by Using Analytical Approach

The existence of noise periodically decreases the total contains required to transmit over the GSM channel. Also, due to increased challenges in the upcoming communication system for noise cancellations in the voice as well as in data transmitted. The existing filters were not able to perform the effective noise cancellation, thus this paper introduces analytical approach to detect both the GSM transient signals of superior or inferior form and then to cancel its noise level. The proposed approach considers the probability theory to perform the modeling of the system and allocate the power of the transitive device along with noise level. The result analysis of the proposed system gives that it offers the detection of the different noise forms and also can significantly determines the both the superior as well as inferior signal quality. These outcomes suggest that the design of accurate filter can be efficient for noise cancellation in GSM signal.

N. Rekha, Fathima Jabeen
A Novel Experimental Prototype for Assessing IoT Performance on Real-Time Analytics

Internet-of-Things (IoT) is one of the stepping stone to future ubiquitous computing with the aid of cloud environment. We reviewed the existing literature to find that there are more theoretical-based study and less standard and established modeling approach to claim the efficiency of the IoT application. Therefore, we present simple and novel prototyping of our experimental framework that not only offers real-time analysis of heterogeneous and dynamic sensory data captured from different IoT nodes but also offer a very user-friendly experience to carry out any form of an analytical operation on the top of it. The study outcome shows good streaming of real-time data of different physical attributes with better capability to read and analyze the real-time information. The prototype will offer simpler experience to handle IoT-based data and open avenues of various researches on IoT.

B. C. Manujakshi, K. B. Ramesh
FAN: Framework for Authentication of Nodes in Mobile Adhoc Environment of Internet-of-Things

The Mobile Adhoc Network (MANET) has undergone significant improvement in the form of routing capabilities but still it lacks security potentials owing to its dynamic topology problems. Adoption of MANET in ubiquitous environment e.g. Internet-of-Things (IoT) could significant increase the communication capability but it could introduce significant level of threats too at same time. Therefore, the proposed manuscript introduces a Framework for Authentication (FAN) of mobile nodes where the technique first offers light-weight ciphering technique to initial stage of node communication followed by providing a significant access permission to authorized mobile nodes only to participate in data dissemination process. This analytical technique is also proven to offer communication efficiency apart from security against major potential threats on IoT environment.

G. N. Anil
Towards a Conceptual Model of Intelligent Information System for Smart Tourism Destinations

Smart tourism destinations represent a new concept of application of information technologies and information sharing in destinations, leading to the higher competitiveness and satisfaction of all relevant stakeholders, including tourists as tourism product co-creators and co-promoters of a destination. Although the use of information technologies in tourism destinations is well analyzed, the requirements on information system integrating all relevant technologies have not been conceptualized so far. Therefore the aim of the paper is to propose a conceptual model of intelligent information system for smart tourism destinations based on the state-of-the art technologies applied in tourism destinations. The selected smart destinations are analyzed together with the use of information technologies during the travel behavior. The proposed model consists of three layers – data collection, processing and exchange. The article contributes to the new paradigm research – the management of smart destinations and use of big data in tourism development.

Tomáš Gajdošík
An Integrated Schema for Efficient Face Recognition in Social Networking Platforms

The conceptual background of face recognition (FR) evolved witnessing various contributions in the past two decades which has been extended towards a wide area of applications including commercial and law enforcement security solutions both. However, it has become a foundation of several breakthroughs on various research aspects associated with cloud computing (CC) driven big data analytics and machine learning platforms. The extended research track in this specific domain claimed to transform the conventional view of solving the problems associated with analytics based FR in social media platforms. The study also aimed to explore various scope of integrating conventional social media (SM) based big data analytics (BD) technology on FR considering an approach of machine learning (ML). Thereby it has formulated a novel framework well capable of face detection considering a machine learning approach on a cloud operated SN platforms. The study formulated analytical approach namely computationally efficient face recognition (CE-FR) schema for face tagging on big data driven SN platforms. The effectiveness of the study further evaluated to validate the performance of the proposed FR system.

Ramesh Shahabadkar, S. Sai Satyanarayana Reddy
Functional Specification to Support Security Risk Assessment of Large Systems

Measuring the security of organizations is needed to obtain security evidence. We believe that common security identification and quantification related to system’s functionalities can be extended to be used in other systems. Security measurements are common at the business process layer. This paper supports the development of security metrics according to each function of a related system. An elementary metric quantify risk by system’s function. This leads to improve security risk analysis and communication for decision making.

Neila Rjaibi, Latifa Ben Arfa Rabai
The Way of Quality Management of the Decision Making Software Systems Development

The different characteristics of the decision making system’s software quality are analyzed. In spite of a lot of research comprehensive criterion of the software quality management still exists only on an informal level. There are described the differences between Russian GOST R standard and ISO. It is shown that the quality of the software is a manageable indicator can be represented by an acyclic connected graph G, in which the upper level is represented by the following characteristics according to the standard ISO. The task of the providing of the planned quality level is formalized as the optimization one taking into consideration the vectors of the control activities and environment states. Special attention is given to the quality characteristics of the intellectual systems. Plan of the activities is validated by the Boolean functions, for this aim graph of the causal relationships is built and transferred to the logic scheme. The plan can be built at any stage of the software life cycle.

O. N. Dolinina, V. A. Kushnikov, V. V. Pechenkin, A. F. Rezchikov
An IoT Approach to Positioning of a Robotic Vehicle

This paper presents and evaluates one approach to the problems of automatic control of a vehicle movement in a large outdoor area. The positioning of the vehicle in the area is provided by iBeacons, located at the edges of the given surface. The iBeacon is a small and low-power device which periodically transmits its UUID (Universally Unique Identifier) number through the interface of a Bluetooth 4.x. The vehicle should be able to calculate its position according to the power of the signal, considering the location of the iBeacons. To be more specific, the triangulation method is applied to determine the position. According to the set of experiments presented at the end of the paper, the position error of a robotic vehicle is mostly less then 1 m.

Miroslav Dvorak, Petr Dolezel
Preparing Influence Analysis of Meteoparameters on Production Process

The aim of the paper was to describe analyzing influence of meteoparameters on production process. We compiled proposal for collecting data and recommendations for researchers solving similar problems in the future. The first part defines terms related to the topic (Big Data, Knowledge Discovery in Databases, and Data Mining) and analyze the chosen topic via opinions of experts. Weather influences production process mostly via human factor, so this part describes influence that meteoparameters have on human health, behavior and job performance. The second part deals with two types of input data – meteoparameters (parameters of weather) and data from production process. It describes the data, their cleaning, integration and selection, and generating of an additional dataset. The third part focuses on acquiring knowledge from the data via several data mining methods. It describes statistical analysis and consequent corrections of the data, building of data mining model, and compares individual methods. That results in proposal for collecting data and recommendations, both of which are based on problems that had arisen in the process of the analysis. The fourth, final part concludes with summarizing sequence of steps of the process.

Jela Abasova, Pavol Tanuska
Data Model Design in Automatic Transit System (PRT) Simulation Software

Simulation has become a very important factor in the field of Automated Transit Network – Personal Rapid Transit (ATN-PRT) design. Multiple traffic conditions, as well as model structure and movement parameters lead to increase in the number of simulation experiments which must be performed to evaluate ATN control algorithms. This article aims to show some guidelines for design of such simulation systems, with particular emphasis on data model design in object oriented programming (OOP) for massive simulations. These guidelines are presented in the context of Feniks Personal Rapid Transit (PRT) simulator development, but are also valid for other graph-based simulation software.

Jakub Lorenc, Wiktor B. Daszczuk, Waldemar Grabski
Patch-Based Denoising with K-Nearest Neighbor and SVD for Microarray Images

Irrespective of certain major advancement in filtering process in medical images, the denoising operation in microarray images are still considered to be unsolved and offers a large scope of research. Existing denoising principles are less investigated on such complex and massive dimensional microarray image that leads to the development of the proposed system. We present a method of performing simple denoising operation considering the presence of Gaussian noise in microarray image. From the target image denoising method, an improved version of patch-based denoising approach has been developed considering various forms of distance-based matching methods. The study outcome of the proposed system has been found to offer better peak signal-to-noise ratio and structural similarity index in contrast to existing filtering techniques.

S. Elavaar Kuzhali, D. S. Suresh
Hypervisors Comparison and Their Performance Testing

This paper is devoted to comparing approaches to the implementation of virtualization based on the use of the most common hypervisors. The paper considers advantages of using virtual machines while creating modern network infrastructure; as well as this, it describes a number of experiments on starting different hypervisors in one selected host along with the installation of two virtual machines with identical configurations. The results of CPU utilization and statistics on the use of a random access memory by hypervisors without virtual machines and with virtual machines are presented; conclusions on using different hypervisors are drawn.

Maxim Polenov, Vyacheslav Guzik, Vladislav Lukyanov
The Multicriteria Model Support to Decision in the Evaluation of Service Quality in Customer Service

Understanding the needs of the customer is one of the key factors in achieving competitive advantage. For that reason, the expectation associated to the management of the relationship with the client are very challenging. In context, we observed the need to identify the factors that go in a successful customer service in order to monitor the quality of such service. The purpose of this paper is to identify and classify influencing elements of the customer’s satisfaction with after sales service using a multi-criteria model of decision. We contextualize customer relationship marketing and then we use cognitive mapping to pinpoint the factors that are more relevant and that affect the client’s overall satisfaction with the post sales service.

Tatyana Belém de Oliveira Barreto, Plácido Rogério Pinheiro, Carolina Ferreira Gomes Silva
Intelligent Method of Reconfiguring the Mechanical Transport System

This paper presents the problem of controlling the transportation of cargo in the mechanical transport system. The overall efficiency of the system includes the costs of reconfiguration, involving both software and manual changes in the parameters and relationships of equipment components. The decision-making phase about choosing the reconfiguration method is preceded by the analysis of the utility of possible methods. The complexity of the solution of the considered problem consists in the ambiguous estimation of the network state due to the considerable number of parameters and incompleteness of information about their values. Except the status, the reconfiguration effect depends on the dynamics of the input flows and the effect of the external environment on the network after reconfiguration. The way of the solution of the problem, based on the image representation of the reconfiguration experience, is considered. The model of the image representation of knowledge and reasoning on their basis is described. The advantage of model of representation of precedents of reconfiguring by images is analyzed. The example of the image representation of situations reflecting the set of knowledge about the input flow, the degree of congestion of the subnet, and the forecast of the behavior of the reconfigured network is given. The boundaries of application of the proposed method are analyzed.

Stanislav Belyakov, Marina Savelyeva
Efficient Load Balancing and Multicasting for Uncertain-Source SDN: Real-Time Link-Cost Monitoring

Software-Defined Networking (SDN) is the next generation network architecture with a new approach to design, build and manage computer networks. Multicasting is a way of transmitting the same content to different destinations. In this paper, we propose an efficient load balancing and multicasting scheme for uncertain-source SDN, using current link cost monitoring. We consider the balance of bandwidth utilization, tree building, and the process of uncertain-source selection. We name this scheme RTLMUS (Real-Time Link Monitoring Uncertain-Source). We then ensure that each destination node connect to just one potential source node. Simulation results demonstrate that our algorithm can improve the network bandwidth utilization and successfully select the multicast source node from the set of potential uncertain-sources.

Thabo Semong, Kun Xie
Decision Trees Accuracy Improvement for Production Errors Classification

The paper is focused on improvement of classification accuracy of decision trees used in the data mining process. Real production data from the paint shop process serve as its basis. The proposal utilizes various approaches for selection of target attribute intervals and classes and key attributes for classification. The decision tree parameters are optimized to obtain the best possible combination. The results are evaluated across multiple decision tree algorithms.

Michal Kebisek, Lukas Spendla, Pavol Tanuska, Lukas Hrcka
The Computational Structure of the Quantum Computer Simulator and Its Performance Evaluation

This paper describes the basics of performance, as well as the structural and functional component of the development and implementation of the quantum computer simulator. In accordance with this, the computational structure of the quantum computer simulator has been derived, taking into account all the available features of constructing a simulator of a quantum computing device. Also, a software implementation of the derived universal computational structure of such simulator that satisfies and operates according to the principles of this scheme is implemented.

Viktor Potapov, Sergei Gushanskiy, Vyacheslav Guzik, Maxim Polenov
Integration of Production Line with the Wonderware Platform

The aim of this paper is to create communication between Wonderware and model of the production line using DAServer. The paper consists of three parts. The first part deals with the introduction of Wonderware and the options it provides. The second part provides a brief overview of the Wonderware modules that we have used. And the third part shows the results we have achieved in creating communication.

Andrea Vaclavova, Michal Kebisek
The Semantic Models of Arctic Zone Legal Acts Visualization for Express Content Analysis

Currently, large amounts of data are available in text form. However, due to the characteristic features of the text in natural languages, the development of fully automatic methods for analyzing the semantics of texts is a difficult task. This paper describes the composition, structure and some areas of application of the developed technologies of semantic analysis and visualization of semantic models of text documents. Also, methods for visual express content analysis of documents are described. These methods are part of the technology for visualizing semantic models of text documents and implemented as independent software tools. To demonstrate the main features of the technology, the experience of using the visualization of semantic document models for visual express content analysis of legal acts regulating the development of spatially-distributed systems of various levels and analysis of the results is described in detail. The final part of the paper identifies some promising areas of application of the developed technologies, as well as determines the main directions for further work and the possibilities to expand the functionality of the methods of visual express content analysis of text documents.

A. V. Vicentiy, V. V. Dikovitsky, M. G. Shishaev
Proposal of a DTN Routing Scheme for Educational Social Networks in Developing Countries

In developing countries where education is lacking, there are many regions without telecommunications infrastructure. The DTN (Delay and Disruption Tolerant Network) is a method of communication that does not rely on communications infrastructure, and one that can be used for reliable data transfer even in adverse environments. In this study, we aim to promote educational support in developing countries without telecommunications infrastructure using DTN and the educational SNS, Edmodo. We propose a system of data communication without waste, which, by considering the time in which children are free, limits distribution of content to those children who do not have free time, and distributes content as a priority to children who do have free time. Additionally, by comparing the proposed system with the conventional system in which data communication was conducted indiscriminately for all children met, we demonstrate the effectiveness of the proposed system in promoting educational support in developing countries that lack telecommunications infrastructure.

Takahiro Koita, Shin Harada
Fetal Hypoxia Detection Based on Deep Convolutional Neural Network with Transfer Learning Approach

Electronic fetal monitoring (EFM) device which is used to record Fetal Heart Rate (FHR) and Uterine Contraction (UC) signals simultaneously is one of the significant tools in terms of the present obstetric clinical applications. In clinical practice, EFM traces are routinely evaluated with visual inspection by observers. For this reason, such a subjective interpretation has been caused various conflicts among observers to arise. Although the existing of international guidelines for ensuring more consistent assessment, the automated FHR analysis has been adopted as the most promising solution. In this study, an innovative approach based on deep convolutional neural network (DCNN) is proposed to classify FHR signals as normal and abnormal. The proposed method composes of three stages. FHR signals are passed through a set of preprocessing procedures in order to ensure more meaningful input images, firstly. Then, a visual representation of time-frequency information, spectrograms are obtained with the help of the Short Time Fourier Transform (STFT). Finally, DCNN method is utilized to classify FHR signals. To this end, the colored spectrograms images are used to train the network. In order to evaluate the proposed model, we conducted extensive experiments on the open CTU-UHB database considering the area under the receiver operating characteristic curve and other several performance metrics derived from the confusion matrix. Consequently, we achieved encouraging results.

Zafer Cömert, Adnan Fatih Kocamaz
Analysis of Causes for Differences in Modeling Results of Multi-hop Wireless Networks Using Various Network Simulators

Simulation is the main way to test multi-step wireless networks. Creating a simulation model of a multi-hop wireless network is a laborious task associated with the use of specialized software tools, called network simulators. In this paper, the modern experience of modeling multi-hop wireless networks is considered, and the main problems are formulated. One of the main problems is the impossibility of a comparative analysis of the simulation experiments results conducted by various researchers. We attempted to classify the reasons for the differences in the results of simulation of multi-hop wireless networks using various network simulators. The proposed classification is designed to help researchers improve the quality of multi-hop wireless networks modelling and improve interaction among researchers. In addition, the paper suggests preventive ways to minimize differences in the results of simulation experiments.

I. O. Datyev, A. A. Pavlov, M. V. Ashkadov, M. G. Shishaev
Pattern Lock Evaluation Framework for Mobile Devices: Memorizability and Timing Issues

The paper concerns the influence of memory, forgetting and timing issues on the security of mobile applications. The designed framework system was used to further elaboration of the automatic measure, which estimates the quality (strength) of unlock gesture patterns. The data analysis described in detail presents the relations between human subjective ratings of patterns’ complexity and memorizability levels in regards to computed values of quality measure and real-life time spans needed to enter and re-enter the pattern.

Agnieszka Bier, Adrian Kapczyński, Zdzisław Sroczyński
On Finding Model Smells Based on Code Smells

A smell in an artifact is a sign that the artifact may have a technical debt, meaning that it may contain the results of one or more sub-optimal design decisions. The debt makes it more difficult to understand, maintain, extend, and reuse the artifact. Technical debt could appear in any technical artifact. Currently the debt in source code is in the center of attention. Modeling is an important system development activity. Models can have technical debt and a sign of it is the presence of one or more model smells. This paper introduces a catalog of 46 model smells (https://github.com/erki77/model-smells) that has been created based on a set of code smells. The cataloged smells are general but their examples are given based on system analysis models. The main takeaway is that most of the considered code smells are instances of generic problems that can also occur in models.

Erki Eessaar, Ege Käosaar
Synthesis of Intellectual Tools to Support Models Translation for Mobile Robotic Platforms

This paper is about the models translation support for mobile robotic platform simulation. Application of expert system and multilanguage translation tools were proposed to hasten and simplify the process of models’ code generation in the required format at mobile robotic platform development. Usage of intelligent support and the created translating module was explained and illustrated on the example of models conversion into the format required for Robot Operating System. The Developed application was examined and the results were reviewed.

Maxim Polenov, Artem Kurmaleev, Sergey Gushanskiy
The Tool for the Innovation Activity Ontology Creation and Visualization

In this paper the problem of automatic application of the semantic analysis methods to documents on financial and economic topics in order to visualize the semantic environment map of innovation activity is discussed. The tool for the innovation activity ontology creation and visualization based on associative ontology approach is proposed.

Sergey V. Kuleshov, Alexandra A. Zaytseva, Alexey J. Aksenov
Modeling and Performance Analysis of Priority Queuing Systems

The paper presents the results of modeling and analysis of data performance on systems that support QoS (Quality of Service). In order to evaluate the performance of the modeled systems used were TPN (Timed Petri Nets). Studied were mechanisms of traffic shaping systems based on PQS (Priority Queuing System). Tested was the impact of the mechanism of generating traffic using TPN. Moreover, discussed were the basic mechanisms and queuing systems occurring in QoS structures. It is shown that models can be effectively used in the modeling and analysis of the performance of computer systems.

Dariusz Strzęciwilk, Włodek M. Zuberk
Method of User Interface Design Based on Semantic Approach

Eliminate the reason and achieve the preservation of the meaning of user actions in the domain, and fully meet the user requirements in the interface of the information system is possible if to create a methodological framework (a general methodological description) of user interfaces development that will be a common sign form of models organization and will be understandable to all participants of the interface development process, including the user. It is proposed to represent the user actions in the domain in the form of mechanisms of action and on the bases of them to build a process of interface design. The paper presents the method of user interface design based on semantic approach and demonstrates a short example of its usage.

Svetlana A. Belikova, Yury I. Rogozov, Alexandr S. Sviridov
Embedded Software Monitoring Using Pulse Width Modulation as a Communication Channel for Low Pin Count Microcontroller Applications

Low pin count microcontrollers are used in numerous applications, especially in power control. Pin number reduction complicates real–time monitoring and debugging. Two modulation techniques for transmission data using PWM (Pulse Width Modulation) channel without significant influence on main application of this channel are proposed in this paper. Two modulation techniques: Additive Pulse Width Fluctuation and Differential Pulse Width Fluctuation are proposed with appropriate demodulation methods.

Przemyslaw Mazurek, Dawid Bak
Synthesis of the Life Cycle Stages of Information Systems Development

The problem of agreeing points of view on the target system being developed, often inseparable from the problem of mutual stakeholders understanding in the process of information systems development, as a special case of complex technical systems, is one of the most fundamental today. The paper considers the solution of this problem and suggests a methodology for the synthesis of the stages of the information systems development life cycle. This methodology assumes two models: a model for creating knowledge (concepts), and a model for reconciling knowledge. In the paper the main aspects of these models and the process of their use are considered. The ideas proposed in the work are aimed at formalizing the process of information systems development and removing the empirical component that currently present in the information systems design.

Alexandr N. Belikov, Yuri I. Rogozov, Oksana V. Shevchenko
Towards Requirements Engineering Process for Self-adaptive Embedded Systems

At present, there are a large number of embedded systems (ES) which need to modify their behavior at run time in response to changing environmental conditions (sensor failures, noisy networks, malicious threats, unexpected input…etc.) or in the cases where the requirements themselves needs to change. i.e. ES require self-adaptive capabilities. This kind of ES has been widely used in different domain, for instance in the smart home systems, automotive systems, telecommunication systems, environmental monitoring and others. Unfortunately, up to now, there are few researchers which interest for the high level design process of the self-adaptive embedded systems (SAES) specifically in the field of requirement engineering (RE). For this reason, the objectives of this paper is to try as much as possible to recall and compare between existing works build around the RE of SAES in the sake of identifying advantages and weak points of each work.

Zina Mecibah, Fateh Boutekkouk
An Approach to Develop Software that Uses Blockchain

Nowadays Blockchain technology has a great market visibility. The popularization of this concept can be attributed to the exponential success of the Bitcoin cryptocurrency, launched in 2008 by Satoshi Nakamoto. The disruptive vision of this technology and the diverse possibilities of application in different businesses have been generating a series of changes and investments in the market, especially in the financial sector. The emergence of several Fintechs (Startups from the financial sector) that guide their software to Blockchain demonstrates the investments made to advance this technology. In this work, a bibliographical research was carried out in order to understand the state of the art of Blockchain and an experience of use was presented, where an application was developed using this technology, being source of information for the detailed definition of a software development process, based on Lean Startup, to support startups working with projects involving Blockchain.

Samantha Almeida, Adriano Albuquerque, Andreia Silva
Metrics in Software Development and Evolution with Design Patterns

Software metrics are employed in software development and maintenance to assess different quality attributes, support processes of software design, testing, and reengineering. We overview software metrics used with regard to design patterns, especially these dealing with object-oriented program features. Metrics of this kind have also supported certain approaches to refactoring to design patterns. However, code refactoring to design patterns requires selection of suitable code parts and taking decisions about pattern application. In order to make this process partially or fully automated, specialized relevance metrics have been proposed. They were designed as a structure-based assessment of an adequacy of code to be transformed into a given design pattern. Relevance metrics for refactoring to selected design patterns (Replace Type Code with Class, Replace State-Altering Conditions with State) are presented in the paper. The metrics were tested in a prototype tool for automated refactoring of Java programs to design patterns, giving satisfactory results.

Anna Derezińska
Design and Validation of a Scheme of Infrastructure of Servers, Under the PPDIOO Methodology, in the University Institution - ITSA

This document describes the process of project development named Design and validation of the Infrastructure Servers in the University Institution - ITSA, in which a modeling was developed for several important network services such as Active Directory, DNS, DHCP, Web, databases and Mail. This project establishes a series of recommendations based on the performance of several tests, which aims to help improve the performance of existing technological infrastructure and the organization of network information. In this process, the specific requirements were collected to design and develop an optimal solution for user control, the organization of active directory, centralized DHCP service on servers and validation redundancy of certain important services network server level. The current logical topology of the active directory was identified and diagrammed and an outline of the new desired structure of the same was made, including subdomains for each site following the guidelines established in the lifecycle of Cisco (PPDIOO).

Leonel Hernandez, Genett Jimenez
Accelerating Massive Astronomical Cross-Match Based on Roaring Bitmap over Parallel Database System

In order to reduce the large network overhead and the heavy cost of cross-match on the astronomical catalog in the database cluster, we proposed a novel method of cross-matches based on Roaring Bitmap. Firstly, we store astronomical catalog data in column-oriented storage with compression setup to reduce I/O overhead of accessing field in the parallel database system. Secondly, we create the spatial index, which maps the 2D coordinates into integer number. Then, using Roaring Bitmap convert the spatial index into a bitmap index. Finally, the received spatial range search of cross-match is translated into bitmap operations to achieve batch processing. The experiments over the real large-scale astronomical data show that the proposed method is 4 to 10 times faster than traditional method, meanwhile, only consume less than 10% of memory resource.

Jianfeng Zhang, Hui Li, Mei Chen, Zhenyu Dai, Ming Zhu
Proposal of the Methodology for Identification of Repetitive Sequences in Big Data

The aim of this paper is to propose and describe methodology for identification of repetitive sequences in big data sets. These repetitive sequences can represent for example sequences of failures that emerge in industrial processes. Proposed methodology deals with sequences which are based on time, when the elements of particular sequence emerged. One way to approach such identification is to use so called brute-force scanning, but this approach is very demanding on computational power and computational time for big data sets cases. Our methodology approaches this issue from the side of data mining and data analysis point of view.

Martin Nemeth, German Michalconok
Computing Importance Value of Medical Data Parameters in Classification Tasks and Its Evaluation Using Machine Learning Methods

This paper aims to evaluate the importance values of medical data parameters for further classification tasks. One of the steps of proposed methodology for analyzing medical data is initial data analysis. One part of the initial data analysis is to determine the importance rate of parameters in given data set. The reason behind this step is to provide overview of the parameters and the idea of choosing right predictors for classification task. Statistica 13 software provides a tool for determining the importance rate of each data parameter, which can be found in feature selection module. However, it is not always clear whether is the importance rate correct or not.

Andrea Peterkova, Martin Nemeth, German Michalconok, Allan Bohm
The Concept of Constructing the Designer for Processes of Algorithms

The paper presents the results of theoretical research in the field of new methods of designing intelligent systems. The concept of self-projecting as a set of system and non-systemic states are introduced. Modern science tries to solve the interdisciplinary problem of eliminating the difference between the forms of representing the same meaning of finished knowledge by creating a universal abstract form of representation of knowledge. The process of obtaining knowledge is represented by the operation of creating a form of complete knowledge that are already acquired by the thinking.Solving the problem of the semantic gap and other problems of systemic research will probably be possible only if the problem of co-building a model of the process of self-designing of knowledge that must be built on the basis of universal operations of self-knowledge, self-construction or knowledge acquisition is solved.

Yuri Rogozov
The Method of Forming Contents for a NoSQL Storage of Configurable Information System

Configurable information systems operate under conditions of uncertainty regarding stored data and sources for filling this data. The change and expansion of functionality raises the problem of data collection and preparation, which, in turn, is connected with the integration of heterogeneous structures both in structure and in format. The technical solution to the problem is the use of ETL-systems that automate the operations of extracting, transforming and loading data into the store by rigidly defined rules. In the issues of data selection, exclusively the data specialist makes definition of rules for drive and transformation, the decision, which is a consequence of the lack of a methodological basis. This, in turn, raises such problems as the excess accuracy and inconsistency of imported data, a narrow specialization of rules (up to uniqueness) with a limited number of analytical models and known requirements for the data mart. The article presents the concept of the method for creating the content of NoSQL-storage of a configurable information system.

Sergey Kucherov, Yuri Rogozov, Elena Borisova
Computation of Nonlinear Free-Surface Flows Using the Method of Fundamental Solutions

A meshless numerical model for nonlinear free surface water waves is presented in this paper, to demonstrate that the localized method of fundamental solutions (MFS) is a stable, accurate tool for simulating and modeling the nonlinear propagation of gravity waves in the approximation of irrotational, incompressible and the fluid is assumed to be inviscid. Using the fundamental solution of the Laplace equation as the radial basis function, the problem is solved by collocation of boundary points. The present model is a first applied to simulate the generation of monochromatic periodic gravity waves by applying a semi-analytical or semi-numerical method to resolve the nonlinear gravity waves propagation, have verified by different orders of linear problems. As an application we are interested in the mechanisms of the interaction of a rectangular obstacle fixed on the bottom of the numerical wave tank (NWT) in the presence of the waves in order to provide information on attenuation process, and validate the numerical tool that we have developed for the treatment of this problem.

Mohamed Loukili, Laila El Aarabi, Soumia Mordane
Quality of Service for Aggregated VoIP Streams

A new method for assuring the quality of service for aggregated streams of VoIP in ICT packet networks is presented. This approach takes into consideration the presence of the self-similarity phenomenon in network traffic and introduces a new, approximated relation between the level of self-similarity and its influence on the performance of queueing systems with finite buffer size. A new algorithm for determining of reservation parameters for aggregated VoIP streams is proposed and discussed.

Przemysław Włodarski
Improving Case Based Software Effort Estimation Using a Multi-criteria Decision Technique

Producing an accurate effort estimate is essential for effective software project management, and yet remains highly challenging and difficult to achieve, especially at the early stage of software development, because very little detail about the project are known at its beginning. To cope with this challenge, we present a novel framework for software effort estimation, which takes an incremental approach on one hand, using a case-based reasoning (CBR) model, while considering a comprehensive set of different types of requirements models on the other hand, including functional requirements (FRs), non-functional requirements (NFRs), and domain properties (DPs). Concerning the use of CBR, this framework offers a multi-criteria technique for enhancing the accuracy of similarity measures among cases of multiple past projects that are similar to the current software project, towards determining and selecting the most similar one. We have tested our proposed framework on 36 (students’) projects and the results are very encouraging, in the sense that the difference between the estimated effort and the actual effort was lower than 10% in most cases.

Fadoua Fellir, Khalid Nafil, Rajaa Touahni, Lawrence Chung
Automated Logical-Probabilistic Methodology and Software Tool as Component of the Complex of Methodologies and Software Tools for Evaluation of Reliability and Survivability of Onboard Equipment of Small Satellites

The paper presents solutions for current problems with estimation and analysis of indicators of reliability and survivability in onboard equipment (OE) of small satellites (SS) based on the logical-probabilistic approach to the reliability and survivability estimation of complex systems. There were developed modified logical-probabilistic method and software tool for evaluating the reliability and survivability of OE SS systems. The correctness of suggested method and software tool was shown by computational experiments on some systems of OE SS similar to Belarusian SS, later compared with “Arbitr” software complex results. The software tool was integrated into the complex of methodologies and software tools for evaluation, analysis and prediction of the values of reliability and survivability indicators of OE SS in local desktop and distributed web versions.

Vadim Skobtsov, Natalia Lapitskaja, Roman Saksonov, Semyon Potryasaev
A Multicriteria Structured Model to Assist the Course Offering Assertiveness

Decision-making processes within companies are increasingly complex. This is due to the fact that the amount of data available and the various variables that should be considered in the decision-making process. In the field of professional education, it is no different, the decision to choose which course should be offered becomes an activity of high complexity because of the various criteria that must be considered for the assertiveness of the offer, such as profitability, client profile, macroeconomic characteristics, program content, characteristics of the locality of the course, among others. Once the scenario is presented, the objective of this work is to propose a model of selection and prioritization of variables for the choice of courses offered in the professional education institution National Commercial Apprenticeship Services through the Multiple Criteria Decision Analysis. We present the context of the decision of the problem and, applying the cognitive mapping, we identify the most relevant criteria to detect which characteristics that most impact in the decision making.

Rodrigues Forte de Lima Silva Junior, Plácido Rogério Pinheiro
Algorithms for Congestion Control in LTE Mobile Networks

In the modern cellular data networks, with the tremendous amount of mobile devices, the constantly decreasing prices of the hardware and according the trends worldwide, provisioning of the data service and its quality will soon become an impossible task. Since current mobile cellular standards are unable to serve and meet the needs of this increase, the network will eventually become congested. As we are investigating data networks, they are based on the TCP protocol. TCP has various congestion control schemes used in both wired and wireless network, such as Cubic, Vegas, Reno, etc. Most modern cellular systems have already been migrated to 3G and 4G, so it could be very useful to identify which algorithm performs best in LTE (4G) wireless network. As most of the platforms for mobile devices, such as phones and tablets are unix/linux based and the current default algorithm in Linux is Cubic, the focus in this article will be on real-time modification and testing of the congestion control parameters of TCP CUBIC.

Teodor Iliev, Tsviatko Bikov, Grigor Mihaylov, Elena Ivanova, Ivaylo Stoyanov, Ventsislav Keseev
Backmatter
Metadaten
Titel
Software Engineering and Algorithms in Intelligent Systems
herausgegeben von
Radek Silhavy
Copyright-Jahr
2019
Electronic ISBN
978-3-319-91186-1
Print ISBN
978-3-319-91185-4
DOI
https://doi.org/10.1007/978-3-319-91186-1