The single-index model is a semi-parametric regression model that avoids the curse of dimensionality because of the linear combination of p-regression coefficients and covariates. Most of the works in this setting done for the homogenous single index models are limited and based on the minimum average conditional variance estimation (MAVE). To overcome these drawbacks, in this paper, we provide a robust and efficient estimate with modal regression for the single-index model under the existence of heteroscedasticity. The EM algorithm and bandwidth selection are employed to prepare the estimation method. Simulation studies demonstrate the performance of the proposed estimation; this method outperforms MAVE in various situations even if the errors are generated from a heavy-tailed distribution while it achieves the same efficiency as well as MAVE for the normally distributed errors. Finally, the application of the proposed method is illustrated by a real example of the heteroscedastic model.
{"title":"Modal Regression Estimation for Heteroscedastic Single-Index Model","authors":"Waled Khaled, Jinguan Lin","doi":"10.1145/3386164.3390517","DOIUrl":"https://doi.org/10.1145/3386164.3390517","url":null,"abstract":"The single-index model is a semi-parametric regression model that avoids the curse of dimensionality because of the linear combination of p-regression coefficients and covariates. Most of the works in this setting done for the homogenous single index models are limited and based on the minimum average conditional variance estimation (MAVE). To overcome these drawbacks, in this paper, we provide a robust and efficient estimate with modal regression for the single-index model under the existence of heteroscedasticity. The EM algorithm and bandwidth selection are employed to prepare the estimation method. Simulation studies demonstrate the performance of the proposed estimation; this method outperforms MAVE in various situations even if the errors are generated from a heavy-tailed distribution while it achieves the same efficiency as well as MAVE for the normally distributed errors. Finally, the application of the proposed method is illustrated by a real example of the heteroscedastic model.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126833730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The process in order for a future customer (household consumer or business consumer) to be connected to a gas network and address its energy needs requires a difficult, demanding and usually time-consuming sequence of steps. For this reason, both process optimization and minimization of administrative effort are issues of great importance for companies operating gas networks. The present study dealt with the optimization of the abovementioned process (New Customer Gas Connection) regarding a company operating as a natural gas network operator in Greece. For this purpose, interviews were conducted with the company's top management and employees in order to record the current situation (AS-IS) concerning the process. After the implementation of AS-IS analysis, existing process weaknesses were identified and an improved process was designed. At this point, the study introduced Industry 4.0 technologies, which are a developing and hot trend in the last decade, focusing on the use of sensors and actuators in order to automate a series of processes. Industry 4.0 is used mainly in industries, and its methodologies and tools have also been used in the gas industry. During the process reengineering (TO-BE), four Industry 4.0- related domains were identified, in which major improvements could be applied: the use of smart meters in order to measure gas consumption, the use of smart tags in order to manage the maintenance of gas equipment, the use of smart tags in order to control document traceability within the company and the coordination (integration) of the process using appropriate information systems. Based on the above, it is concluded that by using technologies and tools related to Industry 4.0, reorganizing processes and making a sensible investment, long-term savings can be achieved. In addition, the total duration of the process may be significantly reduced. The research effort should be continued by further analyzing more case studies which clarify the role and importance of managing and modeling business processes in conjunction with Industry 4.0, with the final aim of improving processes and performance of companies as a whole.
{"title":"Reengineering of the New Customer Gas Connection Process Utilizing Industry 4.0 Technologies: The Greek Case of Public Gas Distribution Networks S.A.","authors":"N. Panayiotou, V. P. Stavrou, K. Stergiou","doi":"10.1145/3386164.3387293","DOIUrl":"https://doi.org/10.1145/3386164.3387293","url":null,"abstract":"The process in order for a future customer (household consumer or business consumer) to be connected to a gas network and address its energy needs requires a difficult, demanding and usually time-consuming sequence of steps. For this reason, both process optimization and minimization of administrative effort are issues of great importance for companies operating gas networks. The present study dealt with the optimization of the abovementioned process (New Customer Gas Connection) regarding a company operating as a natural gas network operator in Greece. For this purpose, interviews were conducted with the company's top management and employees in order to record the current situation (AS-IS) concerning the process. After the implementation of AS-IS analysis, existing process weaknesses were identified and an improved process was designed. At this point, the study introduced Industry 4.0 technologies, which are a developing and hot trend in the last decade, focusing on the use of sensors and actuators in order to automate a series of processes. Industry 4.0 is used mainly in industries, and its methodologies and tools have also been used in the gas industry. During the process reengineering (TO-BE), four Industry 4.0- related domains were identified, in which major improvements could be applied: the use of smart meters in order to measure gas consumption, the use of smart tags in order to manage the maintenance of gas equipment, the use of smart tags in order to control document traceability within the company and the coordination (integration) of the process using appropriate information systems. Based on the above, it is concluded that by using technologies and tools related to Industry 4.0, reorganizing processes and making a sensible investment, long-term savings can be achieved. In addition, the total duration of the process may be significantly reduced. The research effort should be continued by further analyzing more case studies which clarify the role and importance of managing and modeling business processes in conjunction with Industry 4.0, with the final aim of improving processes and performance of companies as a whole.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127420871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing platform has powerful computing capacity and nearly infinite resource pool, which provides a strong guarantee for mass data storage and computing. Considering double security threats from malicious external attackers and "honest-but-curious" CSP (cloud service provider), users need to encrypt images to ensure the data security before outsourcing images to cloud. But encryption can have an impact on the necessary data services, such as content based image retrieval (CBIR). A secure CBIR method based on BoVW (Bag of Visual Words) model under cloud environment is proposed in the paper. Images are expressed as frequency histogram by BoVW model, orthogonal decomposition is utilized to divide it into two individual parts of component coefficients thus encryption operation and feature extraction operation can be executed separately, and orthogonal composition is used to fuse the encrypted operation results to construct secure image index. After encrypted image index and encrypted images are outsourced to CSP, distance comparison can be executed by CSP on feature extraction field without violating data privacy. Encrypted images with the closest distance to query trapdoor are returned to users to decrypt and obtain plain images. Any encryption algorithms can be used to encrypt images and search index by using orthogonal transformation, so that the proposed method is practicable. Retrieval precision is improved and better performance are achieved by using BoVW model. The security analysis and experimental results show our scheme has obvious advantages in security and retrieval performance.
云计算平台具有强大的计算能力和近乎无限的资源池,为海量数据的存储和计算提供了强有力的保障。考虑到恶意外部攻击者和“诚实但好奇”的云服务提供商CSP (cloud service provider)的双重安全威胁,用户在将图像外包给云之前,需要对图像进行加密,以确保数据安全。但是加密可能会对必要的数据服务产生影响,例如基于内容的图像检索(CBIR)。提出了一种基于BoVW (Bag of Visual Words)模型的云环境下安全的CBIR方法。采用BoVW模型将图像表示为频率直方图,利用正交分解将其分解为分量系数的两个独立部分,从而可以分别进行加密操作和特征提取操作,并利用正交组合将加密操作结果融合,构建安全的图像索引。加密图像索引和加密图像外包给CSP后,CSP可以在不侵犯数据隐私的情况下对特征提取领域进行距离比较。将与查询trapdoor距离最近的加密图像返回给用户解密,得到明文图像。任何加密算法都可以使用正交变换对图像进行加密和搜索索引,因此该方法是可行的。采用BoVW模型提高了检索精度,取得了较好的检索性能。安全性分析和实验结果表明,该方案在安全性和检索性能方面具有明显的优势。
{"title":"A Secure CBIR Method based on Bag-of-Visual-Words Model under Cloud Environment","authors":"Yanyan Xu, Xiao Zhao, Jiaying Gong","doi":"10.1145/3386164.3389099","DOIUrl":"https://doi.org/10.1145/3386164.3389099","url":null,"abstract":"Cloud computing platform has powerful computing capacity and nearly infinite resource pool, which provides a strong guarantee for mass data storage and computing. Considering double security threats from malicious external attackers and \"honest-but-curious\" CSP (cloud service provider), users need to encrypt images to ensure the data security before outsourcing images to cloud. But encryption can have an impact on the necessary data services, such as content based image retrieval (CBIR). A secure CBIR method based on BoVW (Bag of Visual Words) model under cloud environment is proposed in the paper. Images are expressed as frequency histogram by BoVW model, orthogonal decomposition is utilized to divide it into two individual parts of component coefficients thus encryption operation and feature extraction operation can be executed separately, and orthogonal composition is used to fuse the encrypted operation results to construct secure image index. After encrypted image index and encrypted images are outsourced to CSP, distance comparison can be executed by CSP on feature extraction field without violating data privacy. Encrypted images with the closest distance to query trapdoor are returned to users to decrypt and obtain plain images. Any encryption algorithms can be used to encrypt images and search index by using orthogonal transformation, so that the proposed method is practicable. Retrieval precision is improved and better performance are achieved by using BoVW model. The security analysis and experimental results show our scheme has obvious advantages in security and retrieval performance.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127260378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The authors attempted to construct a novel sensor networking system that estimates locations of sensor nodes as locations of humans wearing them via image processing. In this application, computationally efficient human localization is indispensable because the operation should be executed on embedded systems. To actualize human localization at a lower computational cost, this study proposes a novel tracking scheme using only detection results. Experimental results using the computer graphics (CG) dataset that was created using player locations of an actual soccer game showed that the proposed scheme outperformed existing schemes implemented in the OpenCV library.
{"title":"A Computationally Efficient Tracking Scheme for Localization of Soccer Players in an Aerial Video Sequence","authors":"R. Aoki, T. Oki, Hiro Yokokawa, R. Miyamoto","doi":"10.1145/3386164.3389091","DOIUrl":"https://doi.org/10.1145/3386164.3389091","url":null,"abstract":"The authors attempted to construct a novel sensor networking system that estimates locations of sensor nodes as locations of humans wearing them via image processing. In this application, computationally efficient human localization is indispensable because the operation should be executed on embedded systems. To actualize human localization at a lower computational cost, this study proposes a novel tracking scheme using only detection results. Experimental results using the computer graphics (CG) dataset that was created using player locations of an actual soccer game showed that the proposed scheme outperformed existing schemes implemented in the OpenCV library.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114393778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper explores the nature and trend of migration during 2018, on the example of Bosnia and Herzegovina. The politicization of migrants' issues as well as a number of other factors contributed to the attitude of criminalization and securitization of migrants. Most authors and researchers dealing with the issue of migrants as well as the security representatives themselves argue that migrants are not a security threat to Bosnia and Herzegovina and that the state should treat them humanely and treat them according to international standards. In this paper we have determined that it is necessary to work on building additional capacities to accommodate migrants who have not found any accommodation or are on routes of Bosnia and Herzegovina, and that is important to undertake activities on technical, material and financial support for migration management in Bosnia and Herzegovina. We have used a qualitative research approach with the use of interview techniques and desk analysis for the purpose of collecting and processing primary and secondary data.
{"title":"Securitization and Criminalization of Migrants in Bosnia and Herzegovina","authors":"Armin Kržalić, Nedzad Korajlic, S. Dinarevic","doi":"10.1145/3386164.3389104","DOIUrl":"https://doi.org/10.1145/3386164.3389104","url":null,"abstract":"The paper explores the nature and trend of migration during 2018, on the example of Bosnia and Herzegovina. The politicization of migrants' issues as well as a number of other factors contributed to the attitude of criminalization and securitization of migrants. Most authors and researchers dealing with the issue of migrants as well as the security representatives themselves argue that migrants are not a security threat to Bosnia and Herzegovina and that the state should treat them humanely and treat them according to international standards. In this paper we have determined that it is necessary to work on building additional capacities to accommodate migrants who have not found any accommodation or are on routes of Bosnia and Herzegovina, and that is important to undertake activities on technical, material and financial support for migration management in Bosnia and Herzegovina. We have used a qualitative research approach with the use of interview techniques and desk analysis for the purpose of collecting and processing primary and secondary data.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116707218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the digital design of typical Cyber-Physical System (CPS) and the construction requirements of Digital Twin System, this paper studies the fusion modeling and simulation method of CPS, including fusion modeling framework and model description, Cyber model and Physical model interface and interoperability mechanism, coordination and fusion simulation method for CPS heterogeneity model, etc. The modeling and simulation of Cyber-Physical System provides a theoretical and methodological basis for model-based design verification, evaluation and optimization of complex equipment.
{"title":"Cyber-Physical System Fusion Modeling and Simulation Method","authors":"Lijin Wu, Guoqiang Gu, Weihua Zhang","doi":"10.1145/3386164.3387294","DOIUrl":"https://doi.org/10.1145/3386164.3387294","url":null,"abstract":"Aiming at the digital design of typical Cyber-Physical System (CPS) and the construction requirements of Digital Twin System, this paper studies the fusion modeling and simulation method of CPS, including fusion modeling framework and model description, Cyber model and Physical model interface and interoperability mechanism, coordination and fusion simulation method for CPS heterogeneity model, etc. The modeling and simulation of Cyber-Physical System provides a theoretical and methodological basis for model-based design verification, evaluation and optimization of complex equipment.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117307186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a graph representation approach to automatically extract semantic information from Chinese patents, which can be used to provide semantic support for text-content based patent intelligent analysis. Two graph models are devised using graph representations, i.e., a keyword based text graph model and a dependency tree based text graph model. The first graph model is constructed by computing the similarities between two keywords, while the second graph model is constructed by extracting syntactic relations from text sentences. In the case study a frequent subgraph mining algorithm is utilized to discover frequent subgraph patterns based on the above two models, and such patterns were further used as features to build text classifiers for the purpose of testing the expressivity and effectiveness of the proposed graph models. The experimental results proves the validation of the proposed graph representation methods.
{"title":"Using Graph Representations for Semantic Information Extraction from Chinese Patents","authors":"Wei Ding, Junli Wang, Haohao Zhu","doi":"10.1145/3386164.3389093","DOIUrl":"https://doi.org/10.1145/3386164.3389093","url":null,"abstract":"This paper proposes a graph representation approach to automatically extract semantic information from Chinese patents, which can be used to provide semantic support for text-content based patent intelligent analysis. Two graph models are devised using graph representations, i.e., a keyword based text graph model and a dependency tree based text graph model. The first graph model is constructed by computing the similarities between two keywords, while the second graph model is constructed by extracting syntactic relations from text sentences. In the case study a frequent subgraph mining algorithm is utilized to discover frequent subgraph patterns based on the above two models, and such patterns were further used as features to build text classifiers for the purpose of testing the expressivity and effectiveness of the proposed graph models. The experimental results proves the validation of the proposed graph representation methods.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116281188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data Visualisations have been identified to play a critical role in business decision making, wherein it acts as a bridge between decision makers and the vast amount of unstructured data. Blockchain applications are being carefully assimilated into the technological space due to Bitcoin's rapid rise in the financial market. Consequently, researchers, technologists and cryptocurrency investors can understand the posture of this technology that leads to articulate technological and financial investment strategies. This paper investigates the role of data analyses in the prominent implementation of Blockchain. We characterise the adoption of Blockchain technology by analysing two types of datasets which are text and multivariate by fitting multiple time series and geographical location to reveal unrealised opportunities for potential income and innovation. In addition, to obtain the useful trends over time a temporal data analyses to fit the Twitter dataset, was conducted. With the automated knowledge discovered this will supplement the decision makers' demand to have a valuable data-driven business strategy, which in return will deliver business or investment opportunities.
{"title":"Trend Analyses for Blockchain Technology Innovations Using Data Analytics","authors":"Raymund Herradura, F. Thabtah, M. Andrews","doi":"10.1145/3386164.3390518","DOIUrl":"https://doi.org/10.1145/3386164.3390518","url":null,"abstract":"Data Visualisations have been identified to play a critical role in business decision making, wherein it acts as a bridge between decision makers and the vast amount of unstructured data. Blockchain applications are being carefully assimilated into the technological space due to Bitcoin's rapid rise in the financial market. Consequently, researchers, technologists and cryptocurrency investors can understand the posture of this technology that leads to articulate technological and financial investment strategies. This paper investigates the role of data analyses in the prominent implementation of Blockchain. We characterise the adoption of Blockchain technology by analysing two types of datasets which are text and multivariate by fitting multiple time series and geographical location to reveal unrealised opportunities for potential income and innovation. In addition, to obtain the useful trends over time a temporal data analyses to fit the Twitter dataset, was conducted. With the automated knowledge discovered this will supplement the decision makers' demand to have a valuable data-driven business strategy, which in return will deliver business or investment opportunities.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126920972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a 10 Gbps real-time millimeter wave OFDM experimental system using a highly efficient 64APSK modulation and 7/8 rate LDPC coding scheme. For the sensitivity of phase noise and the high peak to average power ratio (PAPR) in OFDM systems, common phase error (CPE) compensation algorithm and partial transmit sequence (PTS) PAPR suppression algorithm are implemented in this system. In this paper, a real-time 10Gbps 64-APSK end to end wireless transmission experiment system using reconfigurable Field Programmable Gate Array (FPGA) baseband modulator has built to verify the feasibility and effectiveness of our scheme.
{"title":"10Gbps Real-time OFDM Wireless Communication System","authors":"Jianbin Zou, K. Gao, Erbao Li","doi":"10.1145/3386164.3389094","DOIUrl":"https://doi.org/10.1145/3386164.3389094","url":null,"abstract":"This paper presents a 10 Gbps real-time millimeter wave OFDM experimental system using a highly efficient 64APSK modulation and 7/8 rate LDPC coding scheme. For the sensitivity of phase noise and the high peak to average power ratio (PAPR) in OFDM systems, common phase error (CPE) compensation algorithm and partial transmit sequence (PTS) PAPR suppression algorithm are implemented in this system. In this paper, a real-time 10Gbps 64-APSK end to end wireless transmission experiment system using reconfigurable Field Programmable Gate Array (FPGA) baseband modulator has built to verify the feasibility and effectiveness of our scheme.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software sustainability has generated much interest in the software engineering field in recent times, and has been widely investigated across different fields and from different standpoints. The relationship between software quality and software sustainability is still an open question. In this study, a literature survey and comparison was conducted using three-phases, having as a starting point the comparison of basic models for software quality. A follow-up study, conducted at a more comprehensive level to cover both basic models and the most cited tailored models., Software sustainability literature is investigated to find the most frequent characteristics. Finally, data gathered from these studies and a comparison shows a similarity in the top level of these characteristics between software sustainability and software quality, and the emphasis on sustainability, maintainability and portability. The study suggests that ISO 25010 can be utilised by software sustainability. As a future work, the findings will be investigated empirically to support designing software sustainability framework identifying the most important criteria in the technical dimension.
{"title":"A Comparison of Software Quality Characteristics and Software Sustainability Characteristics","authors":"Sulaiman Aljarallah, R. Lock","doi":"10.1145/3386164.3389078","DOIUrl":"https://doi.org/10.1145/3386164.3389078","url":null,"abstract":"Software sustainability has generated much interest in the software engineering field in recent times, and has been widely investigated across different fields and from different standpoints. The relationship between software quality and software sustainability is still an open question. In this study, a literature survey and comparison was conducted using three-phases, having as a starting point the comparison of basic models for software quality. A follow-up study, conducted at a more comprehensive level to cover both basic models and the most cited tailored models., Software sustainability literature is investigated to find the most frequent characteristics. Finally, data gathered from these studies and a comparison shows a similarity in the top level of these characteristics between software sustainability and software quality, and the emphasis on sustainability, maintainability and portability. The study suggests that ISO 25010 can be utilised by software sustainability. As a future work, the findings will be investigated empirically to support designing software sustainability framework identifying the most important criteria in the technical dimension.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133785243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}