10890nam 22004933 450 991086109540332120240519090252.03-031-60227-7(MiAaPQ)EBC31343078(Au-PeEL)EBL31343078(CKB)32063087400041(EXLCZ)993206308740004120240519d2024 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierGood Practices and New Perspectives in Information Systems and Technologies WorldCIST 2024, Volume 51st ed.Cham :Springer International Publishing AG,2024.©2024.1 online resource (326 pages)Lecture Notes in Networks and Systems Series ;v.9893-031-60226-9 Intro -- Preface -- Organization -- Contents -- Organizational Models and Information Systems -- Implementing Scaled Agile Framework Methodology Principles in the Quality Assurance Process -- 1 Introduction -- 2 Literature Review -- 3 Structured Methodology for Implementing SAFe Principles in QA -- 3.1 Area 1 - Team Increment -- 3.2 Area 2 - System Increment -- 3.3 Area 3 - Solution Increment -- 3.4 Area 4 - Release Increment -- 4 Implementing SAFe Principles in QA - Case Study -- 4.1 Area 1 - Team Increment -- 4.2 Area 2 - System Increment -- 4.3 Area 3 - Solution Increment -- 4.4 Area 4 - Release Increment -- 5 Discussion -- 6 Conclusion -- References -- Using Knowledge Graph and KD-Tree Random Forest for Image Retrieval -- 1 Introduction -- 2 Related Works -- 3 Proposed Theoretical -- 3.1 A KD-Tree Random Forest for Visual Relationship Classification -- 3.2 Process of Building Relationship Graph -- 3.3 Process of Building Knowledge Graph -- 4 A Model of Proposed Image Retrieval -- 5 Experiment and Evaluate Results -- 6 Conclusion and Development Orientation -- References -- Blockchain in the Portuguese Public Electronic Service -- 1 Introduction -- 2 Blockchain in Portuguese Electronic Service -- 3 Method and Strategic Areas -- 3.1 Spatial -- 3.2 Demography -- 3.3 Health -- 3.4 Water -- 3.5 Energy -- 3.6 Mobility -- 3.7 Climate and Meteorology -- 4 Discussion -- 5 Conclusion -- References -- Social Media Use: How Does Critical Consumption of News Impact Voting Persuasion in Angola? -- 1 Introduction -- 2 Political Participation -- 3 Hypotheses Development -- 3.1 Critical Consumption and News Exposure -- 3.2 News Exposure and Voting Persuasion -- 3.3 Age and Voting Persuasion -- 4 Methodology -- 5 Results -- 5.1 Multigroup Analysis -- 6 Discussion -- 7 Conclusions -- References.Exploring the Performance of Large Language Models for Data Analysis Tasks Through the CRISP-DM Framework -- 1 Introduction -- 2 Literature Review -- 2.1 CRISP-DM -- 2.2 Large Language Models -- 3 Methodology -- 4 Results -- 4.1 Discussion -- 4.2 Main Contributions -- 5 Conclusion -- References -- An Exploratory Big Data Approach to Understanding Commitment in Projects -- 1 Introduction -- 2 Review of Literature -- 3 Research Methodology -- 4 Findings -- 5 Future Research Directions -- 6 Conclusion -- References -- Low-Cost System for Monitoring Water Quality Parameters in Lentic and Lotic Ecosystems -- 1 Introduction -- 2 State of the Art -- 3 Requirements Analysis -- 4 Implementation -- 5 Simulation and Testing -- 6 Conclusions and Future Work -- References -- A Unified Approach to Real-Time Public Transport Data Processing -- 1 Introduction -- 2 Transport Systems Structure Modeling -- 3 Proposed Solution -- 4 Results and Evaluation -- 5 Discussion -- 6 Conclusion -- References -- Proportional Integral and Derivative Auto Tuning of Industrial Controllers Using the Relay Feedback Method -- 1 Introduction -- 2 Methodology -- 2.1 Data Collection -- 2.2 Generation of the Mathematical Model of the Level Process -- 3 Analysis and Results -- 4 Conclusions -- References -- Reinforcement Learning for Process Mining: Business Process Optimization -- 1 Introduction -- 2 Data Description -- 2.1 Event Log Structure -- 2.2 Select a Bottleneck State -- 2.3 Apply the Absorption State Effect -- 2.4 Generate the Source and Target Activities from the Log Event -- 2.5 Eliminate Short-Path Cases and Calculate the Transition Probability -- 3 Methodology -- 3.1 Q-Learning Algorithm -- 3.2 Deep Q-Network Algorithm -- 4 Results -- 5 Conclusion -- References -- SAMSEF: An Agile Software Maintenance Leveraging Scrum Framework for Improved Efficiency and Effectiveness.1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Empirical Study -- 3.2 Proposed Framework -- 3.3 Case Study -- 4 Findings -- 5 Conclusion -- References -- Software and Systems Modeling -- Distribution of Invalid Users on an SSH Server -- 1 Introduction -- 2 Theory -- 3 Methods -- 4 Dataset -- 5 Model Development -- 6 Results -- 7 Security Solution -- 8 Discussion and Conclusions -- References -- BERT Transformers Performance Comparison for Sentiment Analysis: A Case Study in Spanish -- 1 Introduction -- 1.1 General Objective -- 1.2 Specific Objectives -- 2 Background -- 2.1 Encoder -- 2.2 Decoder -- 2.3 Attention -- 2.4 BERT Versions -- 3 Related Works -- 4 Experimentation -- 5 Analysis of the Results -- 6 Conclusions -- References -- Open Software Catalogue - Supporting the Management of Research Software -- 1 Introduction -- 2 Background -- 3 Research Software -- 3.1 Issues and Problems -- 4 Overview of Existing Solutions -- 5 Open Software Catalogue -- 5.1 Solution -- 6 Conclusions -- References -- Semantic Analysis of API Blueprint and OpenAPI Specification -- 1 Introduction -- 2 Research Overview -- 2.1 Technological Background -- 2.2 Related Work -- 3 Implementation -- 3.1 Semantic Analysis -- 3.2 Mapping of apib to oas -- 4 Evaluation and Discussion -- 5 Conclusion -- References -- Classification Model for the Detection of Anxiety in University Students: A Case Study at UNMSM -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Preprocessing -- 3.3 Training -- 3.4 Hyperparameter Setting -- 4 Analysis and Interpretation of Results -- 5 Discussion -- 6 Ethical Considerations -- 7 Conclusions and Future Works -- References -- Synergizing First-Principles and Machine Learning: Predicting Steel Flatness in the Era of Digital Twins and Physics-Informed Intelligence -- 1 Introduction.2 Basics of Strip Flatness -- 3 Digital Twin System -- 4 Flatness Prediction Algorithm -- 4.1 First Principle Models -- 4.2 Resulting Prediction Model -- 4.3 Sensitivity Analysis -- 5 Summary -- References -- Software Systems, Architectures, Applications and Tools -- Solving the Relational Data Access Problem with Data Access Services -- 1 Introduction -- 2 Data Access Services -- 2.1 Query Service -- 2.2 Command Service -- 2.3 Repository Service -- 3 Reference Engine -- 3.1 Service Builder -- 3.2 Service Engine -- 4 Complexity Scale -- 5 Complexity Test -- 5.1 Test Service -- 5.2 Test Result -- 6 Advantages -- 7 Summary -- References -- Baseline Proposal of User Experience Practices in the Software Engineering Process: Global MVM Case -- 1 Introduction -- 2 Methodology -- 3 Background -- 4 Solution -- 4.1 Diagnostic -- 4.2 Baseline Construction -- 5 Results -- 5.1 Expert Evaluation -- 5.2 Validation of UX Practices -- 6 Conclusions -- References -- Exploring the Convolutional Neural Networks Architectures for Quadcopter Crop Monitoring -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 4 Results and Findings -- 5 Conclusion -- References -- The State of Smalltalk to Java Transformation: Approaches Review -- 1 Introduction -- 2 About Languages -- 2.1 Smalltalk -- 2.2 Java -- 2.3 Language Differences -- 3 Previous Work -- 3.1 Foundations -- 3.2 Transformation via Translation -- 3.3 Alternative Solutions -- 4 Comparisons -- 5 Conclusion -- References -- A Self-adaptive HPL-Based Benchmark with Dynamic Task Parallelism for Multicore Systems -- 1 Introduction -- 2 Background -- 2.1 Linpack Benchmark -- 2.2 Eigen Library -- 3 Related Work -- 4 SA-HPL for Multicore Systems -- 5 Experiments and Evaluations -- 5.1 Baseline and Self-adaptive Scheduling -- 6 Conclusion and Future Work -- References.Computer Systems Analysis Focused on the Detection of Violence Against Women: Challenges in Data Science -- 1 Introduction -- 1.1 Study Contribution -- 2 Materials and Methods -- 2.1 Research Questions -- 2.2 Selection Criteria -- 2.3 Inclusion Criteria -- 2.4 Exclusion Criteria -- 3 Results -- 3.1 Analysis of Relevant Findings -- 4 Discussion -- 5 Conclusions -- References -- Azure Kubernetes Services WebRouting AddOn -- 1 Introduction -- 2 Azure Kubernetes Services -- 2.1 General Kubernetes Concepts -- 2.2 Azure Kubernetes Services and NGINX Ingress Controller -- 2.3 Other Azure Concepts -- 3 Experimental Setup and Benefits -- 4 Web Application with WebRouting AddOn -- 4.1 User Experience -- 4.2 Web Application Routing Deployment -- 4.3 Grant Permission for Web Application Routing -- 4.4 Demo Start -- 5 Conclusions -- References -- Clustering and Optimization Algorithms to Enable Reliable 6G Mobile Molecular Communications -- 1 Introduction -- 2 State of the Art on Mobile Molecular Communications -- 3 Achieving Reliable Massive Mobile Molecular Communications -- 3.1 Evaluation of the Distribution and Position of Biomachines -- 3.2 Identity Management and Tracking: Reliable Communications -- 4 Experimental Validation: Simulation and Results -- 5 Conclusions and Future Works -- References -- Security Assessment of an Internet of Things Device -- 1 Introduction -- 1.1 Current Insights in Internet of Things Security -- 1.2 Paper Objectives and Structure -- 2 Vulnerability Assessment of the IoT Device -- 2.1 Research Methodology -- 2.2 Uncovering the Credentials Through a Brute-Force Attack -- 2.3 Reverse Engineering the Firmware -- 3 Automation Proof of Concept Application -- 3.1 Security Assessment Application -- 3.2 Validation of the Proposed Investigation -- 4 Conclusions -- 4.1 Paper Contributions -- 4.2 Future Directions of Development.References.Lecture Notes in Networks and Systems SeriesRocha Álvaro1077024Adeli Hojjat784299Dzemyda Gintautas1063020Moreira Fernando1726194Poniszewska-Marańda Aneta1738705MiAaPQMiAaPQMiAaPQBOOK9910861095403321Good Practices and New Perspectives in Information Systems and Technologies4161317UNINA