{"title":"Framework for Assessing Professional Growth of Software Developers","authors":"T. Afanasieva, I. A. Zagaichuk, A. S. Zhelepov","doi":"10.1145/3323933.3324064","DOIUrl":"https://doi.org/10.1145/3323933.3324064","url":null,"abstract":"The distribution of issues and tasks among software developers in IT companies is important project manager problem. In the paper a JSM model is proposed based on professional growth index of software developers. Special questionnaire, framework and software tools are presented for calculating the professional growth index of software developers. The discussion of usage and example of calculating of professional growth index are presented.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115335307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Nicolas, D. Khadraoui, Adnan Imeri, Marie-Laure Watrinet, A. Khadraoui
{"title":"Data Model Management for Supporting Volunteer's Occupation Services","authors":"D. Nicolas, D. Khadraoui, Adnan Imeri, Marie-Laure Watrinet, A. Khadraoui","doi":"10.1145/3323933.3324063","DOIUrl":"https://doi.org/10.1145/3323933.3324063","url":null,"abstract":"This paper presents briefly the SpONSOR project and the developed Data Management Services, acting as a glue between the User Requirements, the System Requirements and the development of the core IT software components managing the occupation services developed during the SpONSOR project. This gives an overview of the main services provided by the platform, the chosen architecture model including the relationships between the different conceptual models and the data models implemented within the platform. The main outcome of this work will constitute an input for the development of the platform as a complete service-oriented system supporting and publishing an API for managing organizations, opportunities and volunteers.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116258199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design Solution for Dynamic Material Transportation Management","authors":"J. Mrázek, Lucia Ďuricová, M. Hromada","doi":"10.1145/3323933.3324061","DOIUrl":"https://doi.org/10.1145/3323933.3324061","url":null,"abstract":"The article deals with the planning and implementation of material transport. The quantity of transported material increases year after year. The article focuses on the issue of responsiveness to the crisis situation at the planning stage or during the transport process. Crisis or emergencies are common every day in road transport. Solutions and opportunities to respond to these events are inadequate. The proposed tool makes a static planning a dynamically controlled transport process.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122248417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Printed Arabic Text Database for Automatic Recognition Systems","authors":"Hassina Bouressace, J. Csirik","doi":"10.1145/3323933.3324082","DOIUrl":"https://doi.org/10.1145/3323933.3324082","url":null,"abstract":"Document image analysis and recognition are important topics in artificial intelligence as they are necessary for the retrieval of documents. Hence, the availability of a database with good script samples is a key requirement for machine-learning processes. Good printed text databases exist for Latin languages. However, there is a lack of databases with Arabic samples. This paper presents a new comprehensive database called PATD (Printed Arabic Text Database), which contains eight hundred and ten images scanned in grayscale format and different resolutions, leading to two thousand and nine hundred and fifty-four images (smartphone-captured images) under varying capture conditions (blurred, at different angles and in different light). It is based on ten newspapers created with different structures, and an open-vocabulary, multi-font, multi-size and multi-style text. The database is described in detail and it is intended for the research community.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122557510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gender and Age Difference in Personal Involvement Inventory on Preventive Awareness Ad in Malaysia","authors":"L. Chew, Ong Lee Yeng, Loo Eng Keong","doi":"10.1145/3323933.3324057","DOIUrl":"https://doi.org/10.1145/3323933.3324057","url":null,"abstract":"Personal involvement is the factor identified as the determinant of a successful ad campaign. High involvement leads to high engagement and high relevance to the ad content. In any public awareness campaign, however, high personal involvement is not always guaranteed. In preventive awareness campaign, in particular, personal involvement is usually low. Beside proving this empirically, this study also attempts to find out about the attitudinal and emotional responses of the audience toward the public awareness ads. The study found that despite having relatively lower personal involvement in term of ad content, the audience relates higher with the value aspects of the ads.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123985275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Watermarking for Tamper Detection and Content Recovery Applications Based on a Preservative Bi-Level Moment Approach with Shuffling","authors":"H. Al-Otum, Alaa W. Alansari","doi":"10.1145/3323933.3324078","DOIUrl":"https://doi.org/10.1145/3323933.3324078","url":null,"abstract":"In this paper, a modified color image watermarking is presented to be used for tamper detection and content recovery applications. The proposed technique is based on the bi-level moment-preserving approach where the developed technique maps the image blocks using a shuffling approach to improve resistance to attacks. Simulations have shown that the proposed technique exhibits better performance when compared to the classical bi-level moment-preserving technique in terms of the watermarking imperceptibility and recovery quality.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133149985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Mathematical Modelling of the Soft Targets Assessment","authors":"Lucia Ďuricová, M. Hromada, J. Mrázek","doi":"10.1145/3323933.3324062","DOIUrl":"https://doi.org/10.1145/3323933.3324062","url":null,"abstract":"The soft targets are closely related with the risk of attack to the group of the people. This problem can cause the fatal consequences to the population. Current situation on the world reflect the fear of the attack in the soft targets. We can see the fear of life in these public places. Each of us spells time in the shopping center or in the park every day. Between the characteristics of the soft targets belong a considerable number of the persons at the same time in the same area. In additional to this object has not implemented the adequate security or safety measures, which can help Integrated Rescue System to detect the attacker or help him to solve this situation. The main aim of the proposed methodology is to support the operators in the decision-making process and to positive increase the situation in this object. The main aim of the proposed software tool is the analysis of the objects features and according these features the software can propose the security measures.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124118757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","authors":"","doi":"10.1145/3323933","DOIUrl":"https://doi.org/10.1145/3323933","url":null,"abstract":"","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131670344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}