Support Vector Regression (SVR) is a powerful supervised machine learning model especially well suited to the normalized or binarized data. However, its quadratic complexity in the number of training examples eliminates it from training on large datasets, especially high dimensional with frequent retraining requirement. We propose a simple two-stage greedy selection of training data for SVR to maximize its validation set accuracy at the minimum number of training examples and illustrate the performance of such strategy in the context of Clash Royale Challenge 2019, concerned with efficient decks’ win rate prediction. Hundreds of thousands of labelled data examples were reduced to hundreds, optimized SVR was trained on to maximize the validation R2 score. The proposed model scored the first place in the Cash Royale 2019 challenge, outperforming over hundred of competitive teams from around the world.
{"title":"Greedy Incremental Support Vector Regression","authors":"D. Ruta, Ling Cen, Q. Vu","doi":"10.15439/2019F364","DOIUrl":"https://doi.org/10.15439/2019F364","url":null,"abstract":"Support Vector Regression (SVR) is a powerful supervised machine learning model especially well suited to the normalized or binarized data. However, its quadratic complexity in the number of training examples eliminates it from training on large datasets, especially high dimensional with frequent retraining requirement. We propose a simple two-stage greedy selection of training data for SVR to maximize its validation set accuracy at the minimum number of training examples and illustrate the performance of such strategy in the context of Clash Royale Challenge 2019, concerned with efficient decks’ win rate prediction. Hundreds of thousands of labelled data examples were reduced to hundreds, optimized SVR was trained on to maximize the validation R2 score. The proposed model scored the first place in the Cash Royale 2019 challenge, outperforming over hundred of competitive teams from around the world.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123760817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we present the results of an opinion survey among 52 agile practitioners who evaluated the importance of 26 selected elements of the agile mindset to the effectiveness of an agile team. In total, we have identified 70 unique agile mindset elements based on 11 literature sources and 5 interviews with industry experts. 7 elements belonged to the “support for business goals” category, 20 to the “relationships within the team” category, 24 to the “individual features” category, and 19 to the “organization of work” category. Our survey shows the relative importance of the selected 26 agile mindset elements according to our respondents which is not fully consistent with the principles behind the Agile Manifesto.
{"title":"On the Agile Mindset of an Effective Team – An Industrial Opinion Survey","authors":"J. Miler, Paulina Gaida","doi":"10.15439/2019F198","DOIUrl":"https://doi.org/10.15439/2019F198","url":null,"abstract":"In this paper we present the results of an opinion survey among 52 agile practitioners who evaluated the importance of 26 selected elements of the agile mindset to the effectiveness of an agile team. In total, we have identified 70 unique agile mindset elements based on 11 literature sources and 5 interviews with industry experts. 7 elements belonged to the “support for business goals” category, 20 to the “relationships within the team” category, 24 to the “individual features” category, and 19 to the “organization of work” category. Our survey shows the relative importance of the selected 26 agile mindset elements according to our respondents which is not fully consistent with the principles behind the Agile Manifesto.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116042051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Brzoza-Woch, Tomasz Michalec, Maksymilian Wojczuk, T. Szydlo
This article presents a concept of a system which can be utilized as a remote management add-on for embedded devices. It can be applied to resource-constrained wireless sensors and IoT nodes based on a general purpose microcontroller unit or a field programmable gate array (FPGA) chip. The proposed solution facilitates remote firmware update, management, and operation monitoring. Thanks to the utilization of standard protocols and interfaces, the proposed system is very flexible and it can be easily customized for multiple modern microcontrollers or programmable logic chips. The presented system can be an efficient solution for fast prototyping and it can be an alternative to a time-consuming process of bootloader development for ad hoc devices. It can also be applied to remote laboratory access for educational purposes. A proof of concept prototype implementation has been successfully developed and evaluated. The implementation is available on a free license and utilizes a commonly available and inexpensive hardware platform.
{"title":"Remote Programming and Reconfiguration System for Embedded Devices","authors":"R. Brzoza-Woch, Tomasz Michalec, Maksymilian Wojczuk, T. Szydlo","doi":"10.15439/2019F170","DOIUrl":"https://doi.org/10.15439/2019F170","url":null,"abstract":"This article presents a concept of a system which can be utilized as a remote management add-on for embedded devices. It can be applied to resource-constrained wireless sensors and IoT nodes based on a general purpose microcontroller unit or a field programmable gate array (FPGA) chip. The proposed solution facilitates remote firmware update, management, and operation monitoring. Thanks to the utilization of standard protocols and interfaces, the proposed system is very flexible and it can be easily customized for multiple modern microcontrollers or programmable logic chips. The presented system can be an efficient solution for fast prototyping and it can be an alternative to a time-consuming process of bootloader development for ad hoc devices. It can also be applied to remote laboratory access for educational purposes. A proof of concept prototype implementation has been successfully developed and evaluated. The implementation is available on a free license and utilizes a commonly available and inexpensive hardware platform.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125484601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study is a part research on the effect of information and communication technologies (ICT) adoption on sustainable development in the enterprises’ context [1][3]. Its main purpose is to identify parameters stimulating the progress of ICT adoption and sustainable development and assess the two constructs based on these parameters. The identified parameters of ICT adoption are grouped into four categories i.e., ICT outlay, information culture, ICT management, and ICT quality, whereas the parameters of sustainable development are classified into ecological, economic, sociocultural, and political sustainability categories. This study employs a quantitative approach and descriptive statistics are employed to evaluate the levels of ICT adoption and sustainable development. The survey questionnaire was used and data collected from 394 enterprises were analyzed. The research findings reveal that digital and socio-cultural competences of employees and managers, financial capabilities ensuring ICT projects as well as law regulations associated with ICT adoption, and information security were at the highest level within enterprises. However, the lowest level was specific for BI and ERP system adoption as well as the adoption of latest management concepts and the exploitation of synergies between national ICT projects and own ones. Moreover, the improvement of efficiency and effectiveness of customer services, better and more efficient organization of work, the enhancement of customer satisfaction and loyalty and the acquirement of new customers and markets were at the highest level within enterprises. However, the lowest level was specific for enterprises’ participation in the democratic public decision-making as well as energy savings and environmental protection. This study advances ongoing research on ICT adoption and sustainable development by exploring parameters which can be used to describe and assess the levels of ICT adoption and sustainable development in the context of enterprises. Moreover, these parameters help clarify areas that need further improvement and stimulate the progress of ICT adoption and sustainable development.
{"title":"Exploring Levels of ICT Adoption and Sustainable Development - The Case of Polish Enterprises","authors":"E. Ziemba","doi":"10.15439/2019F145","DOIUrl":"https://doi.org/10.15439/2019F145","url":null,"abstract":"This study is a part research on the effect of information and communication technologies (ICT) adoption on sustainable development in the enterprises’ context [1][3]. Its main purpose is to identify parameters stimulating the progress of ICT adoption and sustainable development and assess the two constructs based on these parameters. The identified parameters of ICT adoption are grouped into four categories i.e., ICT outlay, information culture, ICT management, and ICT quality, whereas the parameters of sustainable development are classified into ecological, economic, sociocultural, and political sustainability categories. This study employs a quantitative approach and descriptive statistics are employed to evaluate the levels of ICT adoption and sustainable development. The survey questionnaire was used and data collected from 394 enterprises were analyzed. The research findings reveal that digital and socio-cultural competences of employees and managers, financial capabilities ensuring ICT projects as well as law regulations associated with ICT adoption, and information security were at the highest level within enterprises. However, the lowest level was specific for BI and ERP system adoption as well as the adoption of latest management concepts and the exploitation of synergies between national ICT projects and own ones. Moreover, the improvement of efficiency and effectiveness of customer services, better and more efficient organization of work, the enhancement of customer satisfaction and loyalty and the acquirement of new customers and markets were at the highest level within enterprises. However, the lowest level was specific for enterprises’ participation in the democratic public decision-making as well as energy savings and environmental protection. This study advances ongoing research on ICT adoption and sustainable development by exploring parameters which can be used to describe and assess the levels of ICT adoption and sustainable development in the context of enterprises. Moreover, these parameters help clarify areas that need further improvement and stimulate the progress of ICT adoption and sustainable development.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127956882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the recent years, it has been shown that real world-problems are often comprised of two, interdependent subproblems. Often, solving them independently does not lead to the solution to the entire problem. In this article, a Travelling Thief Problem is considered, which combines a Travelling Salesman Problem with a Knapsack Problem. A Non-Dominated Sorting Genetic Algorithm II (NSGA-II) is investigated, along with its recent modification - a Non-Dominated Tournament Genetic Algorithm (NTGA). Each method is investigated in two configurations. One, with generic representation, and genetic operators. The other, specialized to the given problem, to show how the specialization of genetic operators leads to better results. The impact of the modifications introduced by NTGA is verified. A set of Quality Measures is used to verify the convergence, and diversity of the resulting PF approximations, and efficiency of the method. A set of experiments is carried out. It is shown that both methods work almost the same when generic representation is used. However, NTGA outperforms classical NSGA-II in the specialized results.
{"title":"A Specialized Evolutionary Approach to the bi-objective Travelling Thief Problem","authors":"Maciej Laszczyk, P. Myszkowski","doi":"10.15439/2019F191","DOIUrl":"https://doi.org/10.15439/2019F191","url":null,"abstract":"In the recent years, it has been shown that real world-problems are often comprised of two, interdependent subproblems. Often, solving them independently does not lead to the solution to the entire problem. In this article, a Travelling Thief Problem is considered, which combines a Travelling Salesman Problem with a Knapsack Problem. A Non-Dominated Sorting Genetic Algorithm II (NSGA-II) is investigated, along with its recent modification - a Non-Dominated Tournament Genetic Algorithm (NTGA). Each method is investigated in two configurations. One, with generic representation, and genetic operators. The other, specialized to the given problem, to show how the specialization of genetic operators leads to better results. The impact of the modifications introduced by NTGA is verified. A set of Quality Measures is used to verify the convergence, and diversity of the resulting PF approximations, and efficiency of the method. A set of experiments is carried out. It is shown that both methods work almost the same when generic representation is used. However, NTGA outperforms classical NSGA-II in the specialized results.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127332127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Road networks exist in the form of polylines with attributes within the GIS databases. Such a representation renders the geographic data impracticable for 3D road traffic simulation. In this work, we propose a method to transform raw GIS data into a realistic, operational model for real-time road traffic simulation. For instance, the proposed raw to simulation ready data transformation is achieved through several curvature estimation, interpolation/approximation, and clustering schemes. The obtained results show the performance of our approach and prove its adequacy to real traffic simulation scenario as can be seen in this video1.
{"title":"A GIS Data Realistic Road Generation Approach for Traffic Simulation","authors":"Yacine Amara, Abdenour Amamra, Yasmine Daheur, Lamia Saichi","doi":"10.15439/2019F223","DOIUrl":"https://doi.org/10.15439/2019F223","url":null,"abstract":"Road networks exist in the form of polylines with attributes within the GIS databases. Such a representation renders the geographic data impracticable for 3D road traffic simulation. In this work, we propose a method to transform raw GIS data into a realistic, operational model for real-time road traffic simulation. For instance, the proposed raw to simulation ready data transformation is achieved through several curvature estimation, interpolation/approximation, and clustering schemes. The obtained results show the performance of our approach and prove its adequacy to real traffic simulation scenario as can be seen in this video1.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the classic algorithm, palmprint recognition requires extraction of palmprint features before classification and recognition, which will affect the recognition rate. To solve this problem, this paper uses the convolutional neural network (CNN) structure Alexnet to realize palmprint recognition. First, according to the characteristics of the geometric shape of palmprint, the ROI area of palmprint was cut out. Then the ROI area after processing is taken as input of convolutional neural network. Next the PRelu activation function is used to train the network to select the best learning rate and super parameters. Finally, the palmprint was classified and identified. The method was applied to PolyU Multi-Spectral Palmprint Image Database and PolyU 2D+3D Palmprint Database, and the recognition rate of a single spectrum was up to 99.99%.
{"title":"Palmprint Recognition Based on Convolutional Neural Network-Alexnet","authors":"Weiyong Gong, Xinman Zhang, Bohua Deng, Xuebin Xu","doi":"10.15439/2019F248","DOIUrl":"https://doi.org/10.15439/2019F248","url":null,"abstract":"In the classic algorithm, palmprint recognition requires extraction of palmprint features before classification and recognition, which will affect the recognition rate. To solve this problem, this paper uses the convolutional neural network (CNN) structure Alexnet to realize palmprint recognition. First, according to the characteristics of the geometric shape of palmprint, the ROI area of palmprint was cut out. Then the ROI area after processing is taken as input of convolutional neural network. Next the PRelu activation function is used to train the network to select the best learning rate and super parameters. Finally, the palmprint was classified and identified. The method was applied to PolyU Multi-Spectral Palmprint Image Database and PolyU 2D+3D Palmprint Database, and the recognition rate of a single spectrum was up to 99.99%.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134608241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Using stereo-based depth cameras outdoors on drones can lead to challenging situations for stereo algorithms calculating a depth map. A false depth value indicating an object close to the drone can confuse obstacle avoidance algorithms and lead to erratic behavior during the drone flight. We analyze the encountered issues from real-world tests together with practical solutions including a post-processing method to modify depth maps against outliers with wring depth values.
{"title":"Depth Map Improvements for Stereo-based Depth Cameras on Drones","authors":"Daniel Pohl, Sergey Dorodnicov, Markus Achtelik","doi":"10.15439/2019F66","DOIUrl":"https://doi.org/10.15439/2019F66","url":null,"abstract":"Using stereo-based depth cameras outdoors on drones can lead to challenging situations for stereo algorithms calculating a depth map. A false depth value indicating an object close to the drone can confuse obstacle avoidance algorithms and lead to erratic behavior during the drone flight. We analyze the encountered issues from real-world tests together with practical solutions including a post-processing method to modify depth maps against outliers with wring depth values.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129163038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the contemporary problems, and at the same time a challenge, with development und usage of supply chain Information Systems are the issues associated with privacy and cyber security, which emerged due to new requirements of legal regulations and directives. The human factor belongs to the biggest risks within these issues. Leak of information, phishing, unauthorized access are the main problems. Also vulnerability of the systems due to new information technologies is an important topic. In this paper we discuss development and usage of Information Systems with regard to the security aspects associated to the software development lifecycle. We present our approach on examples of a user authentication process in logistics.
{"title":"Information Systems Development and Usage with Consideration of Privacy and Cyber Security Aspects","authors":"Janusz Jablonski, S. Robak","doi":"10.15439/2019F261","DOIUrl":"https://doi.org/10.15439/2019F261","url":null,"abstract":"One of the contemporary problems, and at the same time a challenge, with development und usage of supply chain Information Systems are the issues associated with privacy and cyber security, which emerged due to new requirements of legal regulations and directives. The human factor belongs to the biggest risks within these issues. Leak of information, phishing, unauthorized access are the main problems. Also vulnerability of the systems due to new information technologies is an important topic. In this paper we discuss development and usage of Information Systems with regard to the security aspects associated to the software development lifecycle. We present our approach on examples of a user authentication process in logistics.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115908487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Augmented Reality and Gamification are displaying beneficial effects to enhance user experience and performance in many domains. They are widespread across many areas like education, industrial training, marketing, and services. However, the idea of combining the two approaches for an innovative training instrument is fairly new, especially in assembly training. Moreover, learning about the effects of gamification on human, user engagement, in particular, is a complicated subject. There have been several efforts toward this direction, yet the overall situation is still nascent. In this work, we present a gamified augmented reality training for an industrial task and investigate user engagement effect while training with the gamified and the nongamified system. The result shows that people perform better and engage to a greater degree in the gamified design.
{"title":"Gamified Augmented Reality Training for An Assembly Task: A Study About User Engagement","authors":"D. Nguyen, G. Meixner","doi":"10.15439/2019F136","DOIUrl":"https://doi.org/10.15439/2019F136","url":null,"abstract":"Augmented Reality and Gamification are displaying beneficial effects to enhance user experience and performance in many domains. They are widespread across many areas like education, industrial training, marketing, and services. However, the idea of combining the two approaches for an innovative training instrument is fairly new, especially in assembly training. Moreover, learning about the effects of gamification on human, user engagement, in particular, is a complicated subject. There have been several efforts toward this direction, yet the overall situation is still nascent. In this work, we present a gamified augmented reality training for an industrial task and investigate user engagement effect while training with the gamified and the nongamified system. The result shows that people perform better and engage to a greater degree in the gamified design.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127827491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}