ebook img

Software Engineering Research, Management and Applications PDF

210 Pages·2022·6.016 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Software Engineering Research, Management and Applications

Studies in Computational Intelligence 1053 Roger Lee   Editor Software Engineering Research, Management and Applications Studies in Computational Intelligence Volume 1053 Series Editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland The series “Studies in Computational Intelligence” (SCI) publishes new developments and advances in the various areas of computational intelligence—quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Of particular value to both the contributors and the readership are the short publication timeframe and the world-wide distribution, which enable both wide and rapid dissemination of research output. This series also publishes Open Access books. A recent example is the book Swan, Nivel, Kant, Hedges, Atkinson, Steunebrink: The Road to General Intelligence https://link.springer.com/book/10.1007/978-3-031-08020-3 Indexed by SCOPUS, DBLP, WTI Frankfurt eG, zbMATH, SCImago. All books published in the series are submitted for consideration in Web of Science. Roger Lee Editor Software Engineering Research, Management and Applications Editor Roger Lee ACIS Headquarters Mount Pleasant, MI, USA ISSN 1860-949X ISSN 1860-9503 (electronic) Studies in Computational Intelligence ISBN 978-3-031-09144-5 ISBN 978-3-031-09145-2 (eBook) https://doi.org/10.1007/978-3-031-09145-2 © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland Foreword The purpose of the 20th IEEE/ACIS International Conference on Software Engi- neering Research, Management and Applications (SERA2022) held on May 25, 2022 in Las Vegas, USA was to bring together researchers, scientists, engineers, industry practitioners, and students to discuss, encourage and exchange new ideas, research results, and experiences on all aspects of Computer and Information Science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers have selected the best 12 papers from those papers accepted for presentation at the conference in order to publish them in this volume. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. In “Examining the Factors that Influence Customers’ Intention to Use Smart- watches in Malaysia Using UTAUT2 Model”, Norazryana Mat Dawi, Ha Jin Hwang, Ahmad Jusoh, and Haeng Kon Kim examine the factors that influence customers to use smartwatches. The findings provide theoretical and practical implications for practitioners in the smartwatches market. In “Generating Adversarial Robust Defensive CAPTCHA (GARD-CAPTCHA) in Convolutional Neural Networks”, Pu Tian, Weixian Liao, Turhan Kimbrough, Erik Blasch, and Wei Yu investigate the defense of object image CAPTCHAs against DNN-based solvers. In “A Deep Learning Approach for Lantana Camara Weed Detection and Local- ization in the Natural Environment”, Wie Kiang Hi and Santoso Wibowo present a development of a deep learning approach for detecting and localizing lantana weed in the natural environment. In “Modeling Concretizations in Software Design”, Alexey Tazin, Shan Lu, Yanji Chen, Mieczyslaw M. Kokar and Jeff Smith discuss the preliminary results of an investigation of technologies that could enable rapid adaptation of software to changes in requirements and/or operating environments. In “A Practical Style Guide and Templates Repository for Writing Effective Use Cases”, Bingyang Wei, Lin Deng and Yi Wang develop a use case writing style guide and a small set of use case templates to slightly constrain the way a use case v vi Foreword is written. The results of this case study show qualitative improvements compared with an unconstrained use case writing approach. In “Label Correction of Sound Data with Label Noise Using Self Organizing Map”, Pildong Hwang and Yanggon Kim propose a label correction method using self-organizing map (SOM), which basically proposes three methods. In “Evaluation Method of Enterprise Cybersecurity”, Meng Zhang, Yue Zhou, Che Li, Shuang Li, Jianhua Wu, Chao Yan analyze the evaluation perspectives of information system and design a multi-level index system, which covers enterprise’s asset, management, technology, and testing results. In “A Multi-model Multi-task Learning System for Hurricane Genesis Predic- tion”, Martin Pineda, Qianlong Wang, Weixian Liao, Michael McGuire and Wei Yu aim to address the Tropical Cyclones (TC) prediction issue and propose a multi-model multi-task learning system for TC genesis prediction. In “Development of Autonomous Driving Adaptive Simulation System Using Deep Learning Process Model”, Symphorien Karl Yoki Donzia and Haeng-Kon Kim propose a method to detect the lane and the curve road on which the vehicle “improved YOLOV3” algorithm for autonomous vehicle image recognition using the coco dataset from the Matlab site and has a better performance compared to the previous Lane and Autonomous Vehicle Detection methods. In “An OCL Implementation for Model-Driven Engineering of C++”, Ralph Maschotta, Ndongmo Silatsa, Tino Jungebloud, Maximilian Hammer and Armin Zimmermann present a concept and implementation of OCL4CPP: an Object Constraint Language (OCL) parsing tool for checking, querying, and validating. In “Improving Students’ Readiness Toward the Labor Market Through Customized Learning”, Majed Almotairi, Hamdan Ziyad Alabsi, Yahya Alqahtani, Mohammed Abdulkareem Alyami, Majed M. Aljazaeri and Yeong-Tae Song propose a skill-based learning approach to improve students’ readiness, based on the labor market, through customized learning. In “Assessing Software Fault Risk with Machine Learning”, Naveen Ashish, Greg Barish and Steven Minton present a data-driven solution for assessing fault (defect) risk in software code. Their goal is to predict fault risk at the level of code check-in episodes, where individual commits are assessed for risk. It is our sincere hope that this volume provides stimulation and inspiration, and that it will be used as a foundation for works to come. May 2022 Lin Deng Towson University Towson, USA Junghwan “John” Rhee University of Central Oklahoma Edmond, USA Preface The purpose of the 20th IEEE/ACIS International Conference on Software Engi- neering Research, Management and Applications (SERA2022) held on May 25, 2022 in Las Vegas, USA was to bring together researchers, scientists, engineers, industry practitioners, and students to discuss, encourage, and exchange new ideas, research results, and experiences on all aspects of Software Engineering Research, Management and Applications, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers have selected the best 12 papers from those papers accepted for presentation at the conference in order to publish them in this volume. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. In Chap. 1, Norazryana Mat Dawi, Ha Jin Hwang, Ahmad Jusoh, and Haeng Kon Kim examine the factors that influence customers to use smartwatches. The findings provide theoretical and practical implications for practitioners in the smartwatch market. In Chap. 2, Pu Tian, Weixian Liao, Turhan Kimbrough, Erik Blasch, and Wei Yu investigate the defense of object image CAPTCHAs against DNN-based solvers. In Chap. 3, Wie Kiang Hi and Santoso Wibowo present a development of a deep learning approach for detecting and localizing lantana weed in the natural environment. In Chap. 4, Alexey Tazin, Shan Lu, Yanji Chen, Mieczyslaw M. Kokar, and Jeff Smith discuss the preliminary results of an investigation of technologies that could enable rapid adaptation of software to changes in requirements and/or operating environments. In Chap. 5, Bingyang Wei, Lin Deng, and Yi Wang develop a use case writing style guide and a small set of use case templates to slightly constrain the way a use case is written. The results of this case study show qualitative improvements compared with an unconstrained use case writing approach. In Chap. 6, Pildong Hwang and Yanggon Kim propose a label correction method using self-organizing map (SOM), which basically proposes three methods. vii viii Preface In Chap. 7, Meng Zhang, Yue Zhou, Che Li, Shuang Li, Jianhua Wu, Chao Yan analyze the evaluation perspectives of information system and design a multi-level index system, which covers enterprise’s asset, management, technology, and testing results. In Chap. 8, Martin Pineda, Qianlong Wang, Weixian Liao, Michael McGuire, and Wei Yu aim to address the Tropical Cyclones (TC) prediction issue and propose a multi-model multi-task learning system for TC genesis prediction. In Chap. 9, Symphorien Karl Yoki Donzia and Haeng-Kon Kim propose a method to detect the lane and the curve road on which the vehicle “improved YOLOV3” algorithm for autonomous vehicle image recognition using the coco dataset from the Matlab site and has a better performance compared to the previous Lane and Autonomous Vehicle Detection methods. In Chap. 10, Ralph Maschotta, Ndongmo Silatsa, Tino Jungebloud, Maxim- ilian Hammer, and Armin Zimmermann present a concept and implementation of OCL4CPP: an Object Constraint Language (OCL) parsing tool for checking, querying, and validating. In Chap. 11, Majed Almotairi, Hamdan Ziyad Alabsi, Yahya Alqahtani, Mohammed Abdulkareem Alyami, Majed M Aljazaeri, and Yeong-Tae Song propose a skills-based learning approach to improve students’ readiness, based on the labor market, through customized learning. In Chap. 12, Naveen Ashish, Greg Barish, and Steven Minton present a data- driven solution for assessing fault (defect) risk in software code. Their goal is to predict fault risk at the level of code check-in episodes, where individual commits are assessed for risk. It is our sincere hope that this volume provides stimulation and inspiration and that it will be used as a foundation for works to come. May 2022 Roger Lee Central Michigan University Mount Pleasant, USA Contents Examining the Factors that Influence Customers’ Intention to Use Smartwatches in Malaysia Using UTAUT2 Model .................... 1 Norazryana Mat Dawi, Ha Jin Hwang, Ahmad Jusoh, and Haeng Kon Kim Generating Adversarial Robust Defensive CAPTCHA (GARD-CAPTCHA) in Convolutional Neural Networks ............... 17 Pu Tian, Weixian Liao, Turhan Kimbrough, Erik Blasch, and Wei Yu A Deep Learning Approach for Lantana Camara Weed Detection and Localization in the Natural Environment ........................ 33 Wie Kiang Hi and Santoso Wibowo Modeling Concretizations in Software Design ........................ 47 Alexey Tazin, Shan Lu, Yanji Chen, Mieczyslaw M. Kokar, and Jeff Smith A Practical Style Guide and Templates Repository for Writing Effective Use Cases ................................................ 67 Bingyang Wei, Lin Deng, and Yi Wang Label Correction of Sound Data with Label Noise Using Self Organizing Map ................................................... 81 Pildong Hwang and Yanggon Kim Evaluation Method of Enterprise Cybersecurity ...................... 97 Meng Zhang, Yue Zhou, Che Li, Shuang Li, Jianhua Wu, and Chao Yan A Multi-model Multi-task Learning System for Hurricane Genesis Prediction ........................................................ 113 Martin Pineda, Qianlong Wang, Weixian Liao, Michael McGuire, and Wei Yu ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.