This edited book presents scientific results of the 20th IEEE/ACIS International Conference on Software Engineering Research, Management, and Applications (SERA2022) held on May 25, 2022, in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.
The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 12 of the conference’s most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
Author(s): Roger Lee
Series: Studies in Computational Intelligence, 1053
Publisher: Springer
Year: 2022
Language: English
Pages: 209
City: Cham
Foreword
Preface
Contents
Contributors
Examining the Factors that Influence Customers’ Intention to Use Smartwatches in Malaysia Using UTAUT2 Model
1 Introduction
2 Literature Review
2.1 Smartwatches and Health Monitoring
2.2 Unified Theory of Acceptance and Use of Technology
3 Theoretical Framework and Development of Hypotheses
3.1 Performance Expectancy
3.2 Effort Expectancy
3.3 Social Influence
3.4 Facilitating Conditions
3.5 Hedonic Motivation
3.6 Price Value
3.7 Personal Innovativeness
3.8 Perceived Risk
3.9 Healthology
3.10 Moderating Effects
4 Methodology
4.1 Data Collection and Sampling
4.2 Measures
4.3 Data Analysis
5 Results
5.1 Assessment of Measurement Model
5.2 Assessment of Structural Model
5.3 Moderation Analysis
6 Discussion
7 Conclusions
References
Generating Adversarial Robust Defensive CAPTCHA (GARD-CAPTCHA) in Convolutional Neural Networks
1 Introduction
2 Related Work
3 Extracting Crucial Pixels for Adversarial Perturbations
3.1 Threat Model
3.2 Problem Formulation
3.3 Convolution and Pooling Operations in CNN
3.4 CAPTCHA Image Generation
4 Performance Evaluation
4.1 Methodology
4.2 Experimental Results
5 Discussion
6 Final Remarks
References
A Deep Learning Approach for Lantana Camara Weed Detection and Localization in the Natural Environment
1 Introduction
2 Related Work
3 The Deep Learning Approach
3.1 Data Acquisition and Processing
3.2 Object Detection
3.3 Anchor Box
3.4 Evaluation Metrics
4 Results
5 Conclusion
References
Modeling Concretizations in Software Design
1 Introduction
2 The Approach
3 Related Work
4 The Abstraction/Concretization Model
4.1 Concretizations and Configurations
4.2 Architectural Styles
4.3 Design Principles
4.4 Concretization Levels
5 Concretization Example
6 Discussion
7 Conclusions
References
A Practical Style Guide and Templates Repository for Writing Effective Use Cases
1 Introduction
2 Related Work
2.1 Use Case Patterns
2.2 From Patterns to Style Guide and Templates
3 Use Case Specification Style Guide
3.1 Generic Use Case Specification Format
3.2 Use Case Naming
3.3 Actors
3.4 Trigger
3.5 Use Case Description
3.6 Action Steps
3.7 Extensions
3.8 Data Requirement in a Use Case
3.9 Business Rules
3.10 Related Use Cases
4 Scaffolding a Use Case with a Use Case Templates Repository
5 Case Study
6 Discussion
6.1 Results
6.2 Limitations
7 Conclusion and Future Work
References
Label Correction of Sound Data with Label Noise Using Self Organizing Map
1 Introduction
2 Related Work
2.1 Self-Organizing Map
2.2 DenseNet
2.3 Dataset
2.4 Environmental Sound Classification
3 Method
3.1 Label Centroids Based Correction
3.2 SOM Centroids, Distance Based Correction
3.3 SOM Centroids, Distance Ratio Based Correction
3.4 SOM Centroids Distance with Fixed Ratio Based Correction
4 Result and Discussion
5 Conclusion
References
Evaluation Method of Enterprise Cybersecurity
1 Introduction
2 Related Work
3 Cybersecurity Evaluation Index System
3.1 Index System Framework
3.2 Cybersecurity Assets and External Testing
3.3 Cybersecurity Management and Technology
4 Comprehensive Calculation
4.1 Index Weighting
4.2 Index Synthesis
5 Implementation and Experiment
5.1 Index Weighting
5.2 Experimental Results
6 Discussion
7 Conclusion
References
A Multi-model Multi-task Learning System for Hurricane Genesis Prediction
1 Introduction
2 Related Works
3 Problem Definition
4 Our Proposed Multi-model Multi-task System
4.1 LSTM Models
4.2 Multitask Learning
4.3 Ensemble Model
4.4 Multi-model Multi-task System
5 Performance Evaluation
5.1 Implementation
5.2 Datasets
5.3 Feature Engineering
5.4 Look-Back Window
5.5 Weak Learners
5.6 Discussion of Results
6 Conclusions
References
Development of Autonomous Driving Adaptive Simulation System Using Deep Learning Process Model
1 Introduction
2 Background of the Study
3 Design of Lane Vehicle Detection Applying Deep Learning Model Improve Yolov3
3.1 System Architecture
3.2 Development of Deep Learning model Yolov3 Detection Network
3.3 Proposal Design of Improved Yolov3 Object Detection
4 System Design of Vision Vehicle Detection Test Bench Adaptive Highway Lane Following Test Bench/Simulation 3D Scenario
4.1 Vision Vehicle Detector
4.2 Lane Following Controller
4.3 Proposed Calculation Method of the Bounding Box
4.4 Experimental Environment
5 Experimental and Simulation Result
5.1 Experiment Result of Improved Yolov3
5.2 System Experimental Results
5.3 Experiment Result of Improved Yolov3
6 Evaluation
6.1 Execution Environment
6.2 Proposed Algorithm Performance
6.3 Discussion
7 Conclusion and Future Work
References
An OCL Implementation for Model-Driven Engineering of C++
1 Introduction
2 MDE4CPP Project Fundamentals
3 Method
3.1 Model-Driven OCL Constraint Checker Development for C++
3.2 Selected Implementation Details
4 OCL4CPP Library Application
4.1 Simple Ecore- or UML-Based Applications
4.2 Model-Driven Development of Ecore- or UML-Based Applications
4.3 Model-Driven Development of fUML- and OCL-Based Applications
5 Validation and Evaluation
5.1 Test Cases
5.2 First Performance Evaluations
5.3 fUML- and OCL-Based Application Example
6 Conclusion
References
Improving Students' Readiness Toward the Labor Market Through Customized Learning
1 Introduction
2 Literature Review
2.1 Related Standards
3 Proposed Student E-learning System
3.1 Collect Learning Materials
3.2 Extract Required Skills from Job Postings
3.3 Construct Learning Path
3.4 Create Learning Material
3.5 Construct Customized Learning Path
4 Conclusion
References
Assessing Software Fault Risk with Machine Learning
1 Introduction
2 Discussion
3 Approach
4 Evaluation
5 Related Work
6 Conclusions and Future Work
References
Author Index