{"title":"Automated Office Software Test Method","authors":"Lin Zhang, Ning Li, Xia Hou, Yingai Tian","doi":"10.1145/3384544.3384564","DOIUrl":"https://doi.org/10.1145/3384544.3384564","url":null,"abstract":"Office software may have program vulnerabilities in terms of functionality. To discover and solve these vulnerabilities, it's essential to conduct test on its application programming interface (API). But how to test in a heterogeneous platform and how to realize test automation are the two major difficulties. This article proposes an automated office software test method, which separates the operation platform from the test platform, and is driven by test cases. In this way, it can effectively facilitate the test in a heterogeneous platform, and improve the automation degree. In such a case, this article designs an automated office software test system. Comparing with previous manual test systems, it is with a higher automation degree, and can save a large amount of human cost in office software test.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131334689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spatial Pyramid Block for Oracle Bone Inscription Detection","authors":"Guoying Liu, Jici Xing, Jing Xiong","doi":"10.1145/3384544.3384561","DOIUrl":"https://doi.org/10.1145/3384544.3384561","url":null,"abstract":"The detection of Oracle Bone Inscription (OBI) is one of the most fundamental aspects of oracle bone morphology. However, the detection method depending on experts' experience requires longterm learning and accumulation for professional knowledge. This paper investigated the performance of the deep-learning-based object detection framework in the OBI dataset, then selected the one with the best performance as the baseline and made a series of optimization. Specifically, we first redesigned the sizes and ratios of the anchor box according to the data characteristics by using K- means clustering. Secondly, we extracted some typical noises from OBI for data augmentation. Finally, Focal Loss and Mixed-precision are used to improve the model precision and compress the memory footprint. To further improve the performance, the Spatial Pyramid Block is proposed, which can stabilize features and suppress noise interference. Experiments on our OBI benchmarks validate the superiority of the proposed method that achieves 82.1% F-measure suppressing several mainstream object detectors. Our dataset and algorithms will soon be available at http://jgw.aynu.edu.cn.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125920254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Mahmud, Md Gulzar Hussain, S. Kabir, Hasnain Ahmad, Mahmudus Sobhan
{"title":"A Keyword Based Technique to Evaluate Broad Question Answer Script","authors":"T. Mahmud, Md Gulzar Hussain, S. Kabir, Hasnain Ahmad, Mahmudus Sobhan","doi":"10.1145/3384544.3384604","DOIUrl":"https://doi.org/10.1145/3384544.3384604","url":null,"abstract":"Evaluation is the method of assessing and determining the educational system through various techniques such as verbal or viva-voice test, subjective or objective written test. This paper presents an efficient solution to evaluate the subjective answer script electronically. In this paper, we proposed and implemented an integrated system that examines and evaluates the written answer script. This article focuses on finding the keywords from the answer script and then compares them with the keywords that have been parsed from both open and closed domain. The system also checks the grammatical and spelling errors in the answer script. Our proposed system tested with answer scripts of 100 students and gives precision score 0.91.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121538126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Educational Tool Aimed at Learning Metaheuristics","authors":"Md. Abdul Kader, Jamal A. Jamaluddin, K. Z. Zamli","doi":"10.1145/3384544.3384597","DOIUrl":"https://doi.org/10.1145/3384544.3384597","url":null,"abstract":"In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. This tool can be an educational assistant for beginners to learn metaheuristic in theoretical lectures as well as practical sessions. Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. However, this application is a useful tool that will help not only beginner learners but also the researchers. This paper also describes the proposed software tool and the mentioned metaheuristics in detail and provides future research work on it.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131268138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid \"Quantum and Classical\" Method for Outlier Detection","authors":"Rabah Mazouzi, P. Harel","doi":"10.1145/3384544.3384576","DOIUrl":"https://doi.org/10.1145/3384544.3384576","url":null,"abstract":"In this paper, we present a novel method for outlier detection based on a hybrid approach involving both quantum and classical computing. The proposed method proceeds according to two steps: The first step uses classical computing by preparing and initializing components for the second step involving quantum computing. The latter uses adapted versions of some well-referenced quantum algorithms such as the quantum calculation of Hamming distance, and the minimum finding of Durr-Hoyer. The proposed method is based on the calculation of the distance between the instance to be tested and its Kth nearest neighbor. The test instance is thus considered an outlier if the calculated distance is greater than a given threshold T. At the end of this paper, we present an experimentation of the method and a performance analysis showing a quadratic improvement in terms of computational complexity compared to classical methods of outlier detection.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132719616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Cultural Relics Protection Micro-environment Monitoring System Based on ZigBee Wireless Communication","authors":"Changsong Ma, Hong-Xia Rong, Yushu Liu","doi":"10.1145/3384544.3384553","DOIUrl":"https://doi.org/10.1145/3384544.3384553","url":null,"abstract":"Because cultural relics have strict requirements on environmental indicators such as temperature, humidity, light and gas, environmental monitoring for museum cultural relics showcases has become a necessary means of cultural relic protection. This paper designs and implements a museum cultural relic microenvironment monitoring system based on ZigBee wireless communication network technology. The system is mainly composed of two parts: sensor monitoring terminal and upper-level data analysis and recording software. The sensor monitoring terminal uses CC2530 chip as the control core and can be configured as coordinator in the ZigBee network, which is responsible for the establishment and management of the ZigBee network. It can also be configured as a terminal in the ZigBee network. It can detect the micro-environment of the showcase with a variety of sensors supporting the I2C bus, and upload the test results to the coordinator in ZigBee network. The upper-level data analysis and recording software is written in C# language, which is mainly responsible for the management of devices in the ZigBee network and the acquisition of environmental parameters detected by the terminals in the ZigBee network. The test shows that the cultural relic protection micro-environment monitoring system has low power consumption, convenient networking and strong scalability, and can realize the detection of various environmental parameters, which can be well applied to the micro-environment monitoring of museum cultural relics showcases.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Kawu, Abdulkarim Abdullahi, Elijah Joseph, Amit Mishra, A. Abdulrahman
{"title":"MIRCS","authors":"A. Kawu, Abdulkarim Abdullahi, Elijah Joseph, Amit Mishra, A. Abdulrahman","doi":"10.1145/3384544.3384578","DOIUrl":"https://doi.org/10.1145/3384544.3384578","url":null,"abstract":"The development and use of educational technologies (edutech) have seen some advance over the years in most developing countries. Most Higher Education Institutions' (HEI) in developing countries have result processing software as part of an overall edutech suite. However, adoption or use of the result software has largely been web-based, hence only internet enabled phones (feature or smartphones) or PCs are able to access it. In this paper, we present MIRCS, a low-end USSD-SMS based system designed for checking Higher Education semester results in resource limited settings like Africa. MIRCS can be accessed by students without internet and by using any type of phone, including basic phone. We design the systems working with users from our University, a Higher Education Institution in a developing country and report preliminary results from trials with 784 students. Based on this trial, the system records up to 89% successful access rate from recorded 3136 USSD sessions over four (4) telecommunication networks.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123730930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Determine Minimum Support in Association Rule","authors":"Erna Hikmawati, K. Surendro","doi":"10.1145/3384544.3384563","DOIUrl":"https://doi.org/10.1145/3384544.3384563","url":null,"abstract":"The growth of increasingly complex data now raises new challenges in the world of technology. Large volumes of data store a lot of knowledge that can help in the decision-making process. One way to find knowledge in big data is by the Association Rule. The association rule is a technique in data mining that can produce rules based on the frequency of items appearing from a transactional database. One thing that is critical in the association rule is the determination of the minimum support value used to determine which items will be included in the formation of rules. If the minimum support value that is set is too small, it causes too many items to be involved in establishing the rules. Conversely, if the minimum support is too large, the number of items involved in forming the rule is too small. The problem in determining the minimum support value greatly affects the accuracy of the resulting rule. In this paper, various methods will be discussed to determine the minimum value of support through study literature based on related research. In addition, it explains research opportunities that can be done in the future about the minimum value of support determination in the association rule.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132782757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements Traceability Management Support Tool for UML Models","authors":"Kaito Yoshino, Saeko Matsuura","doi":"10.1145/3384544.3384586","DOIUrl":"https://doi.org/10.1145/3384544.3384586","url":null,"abstract":"Traceability between system requirements and the artifacts produced by the software development process contributes to the development of reliable software. This paper proposes a method of ensuring traceability by automatically generating an initial sequence diagram from an activity diagram; the activity diagram not only defines user-system interactions, but it also describes the feasibility of use cases via data modeling in a class diagram. These sequence diagrams evolve through changes that are made to the particulars of a system design; these sequence diagrams can be used to generate source code. As a result, the requirements can be traced to the program codes.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124648651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Packet Reachability Verification in OpenFlow Networks","authors":"N. Yoshiura, Keigo Sugiyama","doi":"10.1145/3384544.3384573","DOIUrl":"https://doi.org/10.1145/3384544.3384573","url":null,"abstract":"OpenFlow is a network technology that enables to control network equipment centrally, to realize complicated forwarding of packets and to change network topologies flexibly. In OpenFlow networks, network equipment is separated into OpenFlow switches and OpenFlow controllers. OpenFlow networks are configured by programs in OpenFlow controllers. NetCore is one of programming languages for OpenFlow and is used in functional programming language Haskell. Programs in Haskell may be verified in Coq which is a formal proof management system. For NetCore, a method which verifies OpenFlow networks was proposed. In the method, the properties that are verified must be described in logic manually. This paper proposes a method of automatic verification of packet reachability by automatically generating logical formulas for reachability verification. This paper also evaluates the proposed method by experiment.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127841201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}