{"title":"Multi-criteria recommender system model for lockdown decision of Covid-19","authors":"Erna Hikmawati, N. Maulidevi, K. Surendro","doi":"10.1145/3457784.3457790","DOIUrl":"https://doi.org/10.1145/3457784.3457790","url":null,"abstract":"A lockdown is an appropriate method to suppress the spread of COVID-19 in a region. However, apart from the spread of COVID-19, it also affects various aspects and sectors. Therefore, a lockdown decision for a region must go through a careful planning before being finalized. There are many criteria to be considered in a lockdown decision, among them are the number of positive cases, health facilities and demographic situation in an area. This article will discuss a recommender system model that may assist the lockdown decision in a region by considering several criteria originating from multiple databases. in this model had two kinds of inputs, namely internal and external databases. In this case, Internal database is reproduction number of covid-19 case in West Java. External Database is elderly age number ratiom health facility number ratio, nurse ratio and medical worker ratio (specialists and general practitioners), beds in health facilities and population density. The outputs of this method were decisions whether to implement lockdown or new normal for a region in accordance of predetermined parameters. The results of this model can be used for the government in formulating strategies to reduce the number of spread of Covid-19 in terms of determining which areas should apply lockdown.","PeriodicalId":373716,"journal":{"name":"Proceedings of the 2021 10th International Conference on Software and Computer Applications","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127320975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMT-Based Theorem Verification for Testing-Based Formal Verification","authors":"Kenta Sugai, H. Hosobe, Shaoying Liu","doi":"10.1145/3457784.3457823","DOIUrl":"https://doi.org/10.1145/3457784.3457823","url":null,"abstract":"Testing-based formal verification with symbolic execution (TBFV-SE) checks whether programs correctly implement their formal specification. Given a formal specification and a program, it first derives a theorem expressing the correctness property of the executed program paths and then formally verifies the validity of the theorem. However, such theorems still need to be verified manually due to the lack of a tool support for dealing with expressions involved. In this paper, we propose a method for automatically verifying theorems for TBFV-SE. This method uses an SMT solver to check whether a theorem is valid. For this purpose, the method converts the conditions in the theorems written in the SOFL specification language into appropriate constraints that are supported by the SMT solver. We present a tool to support the method, and present two case studies to demonstrate how the tool works in the context of Java programs and SOFL specifications.","PeriodicalId":373716,"journal":{"name":"Proceedings of the 2021 10th International Conference on Software and Computer Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124596339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Inundation Level using Tweets in Indonesian Language","authors":"Kwee Felicia Ilona, I. Budi","doi":"10.1145/3457784.3457806","DOIUrl":"https://doi.org/10.1145/3457784.3457806","url":null,"abstract":"Extreme flood events are expected to occur more frequently as climate change has yet to show signs of improvement. This has the potential to lead to higher rainfall and floods that would come more quickly. Early warning systems may sometimes fail to provide quick information when conditions in the field may not match to what is known in the information center, such as a malfunctioning water pump or a water level that has increased relatively quickly. Therefore, this study aims to provide an alternative source of information that may provide inundation level during flood condition based on tweets from Twitter. The proposed model is expected to provide output in the form of inundation level categories, namely “high”, “medium”, “low”, and “unknown”. 10-fold stratified cross validation with seven variations of classifiers were used to evaluate the model. The best relevance classification resulted in 90.6% accuracy (SVM Linear SVC), 89.05% average precision (SVM RBF), and 82.03% average F1-score (SVM Linear SVC) and average recall of 84.10% (Logistic Regression). The best classification results of inundation level resulted in accuracy (82.74%), average precision (85.44%) average recall (68.07%) and average F1-score (71.43%). All of them were obtained by using the SVM Linear SVC.","PeriodicalId":373716,"journal":{"name":"Proceedings of the 2021 10th International Conference on Software and Computer Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132606932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of software tools in the domain of field service management","authors":"Marco Pretterhofer, V. Mezhuyev","doi":"10.1145/3457784.3457801","DOIUrl":"https://doi.org/10.1145/3457784.3457801","url":null,"abstract":"In the digital era, companies are switching from manual workforce management to the use of integrated tools, which automate planning steps and provide effective electronic business management solutions. The market for such software is growing rapidly. In addition to established software providers such as SAP and Oracle, many smaller software companies are now providing their independent software packages. Companies that have decided to deploy a field service management tool now face the challenge of evaluation and selection criteria. This paper gives a detailed overview of existing tools in the domain of field service management and elaborates an approach for the evaluation of the tools. The approach was applied to evaluate the tools in the service processes of industrial companies. SAP Field Service Management was ranked as the top product in a case study. The tools from Odyssee and Salesforce received significant ratings in the categories that refer to their functional aspects. The results of the study can be used by corporate management to support decision making for selecting software applications.","PeriodicalId":373716,"journal":{"name":"Proceedings of the 2021 10th International Conference on Software and Computer Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129863117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nayab Gull, M. Rashid, F. Azam, Yawar Rasheed, Muhammad Waseem Anwar
{"title":"A Block-chain Oriented Model Driven Framework for handling Inconsistent Requirements in Global Software Development","authors":"Nayab Gull, M. Rashid, F. Azam, Yawar Rasheed, Muhammad Waseem Anwar","doi":"10.1145/3457784.3457799","DOIUrl":"https://doi.org/10.1145/3457784.3457799","url":null,"abstract":"Requirements engineering (RE) is one of the most important phases in software development process. Therefore, the handling of inconsistent/ conflicting requirements is considered as a major issue in the requirements phase. Due to the evolving practices of Global Software Development (GSD), where the development team is geographically spread, the phase of RE is more prone to inconsistencies. Many approaches have been suggested to overcome the problem, however, these solutions are very limited in their scope and does not fit the peculiarities of GSD configurations. On the other hand, Block Chain methodology has shown promising results in various domains and has very sophisticated features like transparency and decentralization to support the management of inconsistent requirements. Similarly, Model Driven Software Engineering (MDSE) is marked with abstraction and reducing complexity which may be benefited to handle inconsistent requirements. Consequently, this article introduces a Block chain Oriented Model Driven (BOMO) framework by integrating the concepts of RE and Block Chains in the context of MDSE. This allows the effective management of inconsistent requirements through block chain technique with simplicity as offered by MDSE. As part of the framework, a meta-model is proposed which has been subsequently evolved into a Sirius graphical modelling tool. The applicability of the proposed framework has been demonstrated via a case study. Experimental results prove that the proposed framework may be used with sufficient reliability and can be further evolved to handle inconsistent requirements in a promising manner.","PeriodicalId":373716,"journal":{"name":"Proceedings of the 2021 10th International Conference on Software and Computer Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128719985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of Preemptive Scheduling of the Independent Tasks Using Timed Automata","authors":"Amarat Pimkote, W. Vatanawood","doi":"10.1145/3457784.3457786","DOIUrl":"https://doi.org/10.1145/3457784.3457786","url":null,"abstract":"To consider the effects of preemptive scheduling occurred in the concurrent threads of the independent tasks with priority values, we propose an alternative to simulate the preemptive scheduling using timed automata tool. Firstly, each independent task with priority value is expected to be represented as an ordinary timing diagram with its priority value. The timing diagram focuses on the state changings within and among lifeline along a linear timeline, of a particular independent task. Then, we propose a set of translating rules to map the timing diagrams and their associated priority values into the corresponding timed automata with the extra dormant states as to serve the task preemptions. Our resulting timed automata are sufficient and ready to be simulated using UPPAAL real-time simulation tool, yielding the model-in-loop simulation as to verify the logic hazards that might be found in the preemptive scheduling. The possibility of the violation of the hard time constraint and deadlock is checked.","PeriodicalId":373716,"journal":{"name":"Proceedings of the 2021 10th International Conference on Software and Computer Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130147024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RL-BIN++: Overcoming Binary Instrumentation Challenges in the Presence of Obfuscation Techniques and Problematic Features","authors":"Amir Majlesi-Kupaei, Danny Kim, R. Barua","doi":"10.1145/3457784.3457825","DOIUrl":"https://doi.org/10.1145/3457784.3457825","url":null,"abstract":"This paper improves upon an earlier binary rewriter we designed called RL-Bin. Unlike static rewrites, which are inherently non-robust, RL-Bin uses a dynamic design and thus is more robust. However, although RL-Bin works for most compiled binaries, real-world features commonly found in obfuscated binaries are still not handled. The features include anti-disassembly, dynamically modified code, anti-rewriting, anti-debugging, and code convention violation. This paper presents RL-Bin++, an improved version of RL-Bin, that handles various problematic real-world features, thus correctly rewriting for nearly all benign binaries. We demonstrate that RL-Bin++ can efficiently instrument heavily obfuscated binaries (overhead averaging 2.76x, compared to 4.11x, and 5.31x overhead for DynamoRIO and Pin, which are comparable or lower overheads. However, the main achievement is that we achieved this while maintaining the low overhead of RL-Bin for unobfuscated binaries (only 1.05x). This makes RL-Bin++ the only robust binary instrumentation solution capable of being deployed in live systems since the overhead of DynamoRIO (1.16x), and Pin (1.29x) for unobfuscated binaries is too high for use in live systems.","PeriodicalId":373716,"journal":{"name":"Proceedings of the 2021 10th International Conference on Software and Computer Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114273923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"911 4 COVID-19: Analyzing Impact of COVID-19 on 911 Call Behavior","authors":"Gulustan Dogan, Rachel Carroll, G. M. Demirci","doi":"10.1145/3457784.3457785","DOIUrl":"https://doi.org/10.1145/3457784.3457785","url":null,"abstract":"This paper explores the impact of COVID-19 on 911 Call behavior to help first responders develop effective solutions to emergent situations proactively. Correct prediction of call volume and call type helps first responders optimize resource allocation. We used time series regression to explore the relationship between the number of COVID-19 cases, weather, and stay-at-home orders using 911 Call records in New Hanover County, North Carolina, USA. We divided 911 calls into six categories: breathing, domestic violence, injury, psychiatric, traffic, and violence-related calls. We observed a positive correlation between the number of COVID-19 cases and the number of 911 calls in all categories except domestic violence. We also developed a Bayesian regression prediction model to forecast the number of 911 calls given the number of COVID-19 cases. Our model excelled regarding domestic violence and total calls, and achieved satisfactory results for traffic and violence calls. To our knowledge, there is no prior relevant work, so we were unable to compare our results with other models.","PeriodicalId":373716,"journal":{"name":"Proceedings of the 2021 10th International Conference on Software and Computer Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131110323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges in Combining Agile Development and CMMI: A Systematic Literature Review","authors":"Alex Ferdinansyah, B. Purwandari","doi":"10.1145/3457784.3457803","DOIUrl":"https://doi.org/10.1145/3457784.3457803","url":null,"abstract":"Recently, Agile Development has emerged as an alternative approach in software engineering. The Agile Software Development (ASD) process provides the ability to cope with ever-changing requirements. On the other hand, the Capability Maturity Model Integration, one of the Software Process Improvement Framework, is widely used to provide software development organizations with structure and stability in their software process. It enables organizations to generate software processes with better quality software, the productivity increase of the development team, and minimal risk of failure. The idea behind combining the Capability Maturity Model Integration (CMMI) and Agile aims to create a software development procedure that is stable and continues to improve while also providing agility for dealing with dynamic business needs. This research compiles the experiences of combining both software and identifies challenges for the collaborative implementation process. This study also highlights the extent of the compatibility of CMMI and Agile Development. This research followed a standardized Systematic Literature Review procedure and used the approach known as Preferred Reporting Items for Systematic Reviews and Meta-Analyses or PRISMA. The findings indicate that the main challenges with regard to combining CMMI and Agile are the lack of relevant knowledge and experience and the culture of CMMI, Agile, or sometimes both. The limited scope of Agile itself poses another considerable challenge. Agile focuses on software development projects, while CMMI has a broader range, from project-level development to organization-level process improvement. This review also finds that Agile Development is compatible with CMMI at a maturity level of 2 and 3. Future studies should determine the optimal method for overcoming the obstacles associated with combining CMMI and Agile.","PeriodicalId":373716,"journal":{"name":"Proceedings of the 2021 10th International Conference on Software and Computer Applications","volume":"4 () 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130056833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Data Generation Model Based on Improved SeqGAN","authors":"Jian Dou, Shuang Qie, Jizhe Lu, Yi Ren","doi":"10.1145/3457784.3457791","DOIUrl":"https://doi.org/10.1145/3457784.3457791","url":null,"abstract":"With the demand of integrated energy metering business and the rise of artificial intelligence technology, the data generation model of digital equipment has become the focus of attention. As the most widely used method in the field of image generation, the implicit method based on GAN has great development potential and strong domain expansion ability. The addition of reinforcement learning method makes the GAN correlation algorithm suitable for data generation of discrete data. This paper proposes an improved SeqGAN model, reconstructs the original SeqGAN model, improves the roll-out module of the original model, uses model parameters lagging behind the generator, and increases the stability of long sequence reinforcement learning. Compared with some existing popular algorithms, the performance of the proposed model algorithm is significantly better than that of the comparison algorithm when the training times are enough (more than 150 times), which lays a foundation for its application in data generation of digital equipment.","PeriodicalId":373716,"journal":{"name":"Proceedings of the 2021 10th International Conference on Software and Computer Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116361340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}