This document proposes an expert gamification system (EGS) to provide guidelines for implementing gamification in virtual and cross-cultural software teams (VCCST). The EGS would extend an expert system to include gamification tools, a cultural data database using Hofstede's cultural dimensions, and an expert knowledge source on psychological theories of motivation and flow. It describes how the EGS could analyze cultural data, detect when teams are in a state of "flow", and determine appropriate game mechanics and activities based on cultural factors to help resolve issues in VCCST. A prototype is being developed and initial findings are encouraging.
AN EXPERT GAMIFICATION SYSTEM FOR VIRTUAL AND CROSS-CULTURAL SOFTWARE TEAMScsandit
Gamification is the concept of applying game elements in non-game context platforms to motivate people to participate in planned activities to achieve goals.
Gamification has been applied to academic fields including software engineering (SE) in recent years. Many gamification implementations in SE have been ad hoc and lacked standardized guidelines. This paper introduces a new concept of building an expert gamification system(EGS) to provide guidelines for the implementation of gamification for virtual and cross cultural software teams (VCCST). The system will extend the core of a regular expert system to include gamification tools, a supplementary database, and an expert knowledge source. The cross-cultural data for the EGS contains the Hofstede's cultural dimensions (HCD).
As more and more VCCST are formed in recent years, many issues have been raised in those teams stemming from miscommunication and cultural conflicts. This paper uses the EGS to help resolve the issues in VCCST.
APPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPScsandit
Mobile applications are becoming an emerging property in today’s world. Delivering high quality mobile applications by improving the quality of the user interface is a definitive guide in building successful mobile applications and will have a significant increase in the market for that application. This paper addresses some issues related to mobile user interface, current input system and user dictionary. After analysing these issues we have proposed a new system by making some improvements to the current input system and user dictionary. In order to improve the current system, we have taken some issues related to one of the most widely used data entry methods ‘Keyboard’ and proposed some improvements by introducing Smart Optimized Keyboard (STOKE). We have provided the results, which include performance, reduction in number of keystrokes, and screen space. This describes the significant change after adopting the proposed keyboard. In the end, we have proposed an optimized way of building up
the user dictionary, which assists the user in inserting the input very easily, rapidly and effectively. In a combine, these two will help in providing the best user experience to the users.
Using these slides, I presented my paper titled "Institutional works in scholarly networks: A rapprochement between agency and structure" at the 2014 Academy of Management annual meeting. In the paper, I attempt to find an answer to the question: how noble ideas emerge in academia?
Impact of Expert System as Tools for Efficient Teaching and Learning Process ...rahulmonikasharma
Introducing an expert system as tool in the teaching and learning process in the Nigeria educational system is a much needed step to improving the process, this is because it is filled with a few challenges involved. The advent of computer system has definitely opened way to Computer Aided Instruction (CAI) for which an expert system is one. An expert system is a well known area of artificial intelligence which is a computerized tool designed to enhance the quality and availability of knowledge required in educational system. The general society sees CAI/expert system as inevitable and a must in teaching and learning process. Borrowing a leaf from the civilized world in their knowledge preservation and distribution, it now becomes necessary for the Nigeria educational system to adopt CAI, and especially expert to duplicate the rare knowledge and experience of a few experts in different fields of education and to place the Nigerian educational system at par with their international counterparts. Though expert system has enormous benefits, they remain un-established as a useful technology due to few research and documentation. This research work proposes that the effective introduction of expert system in teaching and learning process in Nigerian educational system should be adopted as its advantages over traditional chalk-talk method is innumerable.
A case study of using the hybrid model of scrum and six sigma in software dev...IJECEIAES
The world of software engineering is constantly discovering new ways that lead to an increase in team performance in the production of software products and, at the same time, brings the customer's further satisfaction. With the advent of agile methodologies in software development, these objectives have been considered more seriously by software teams and companies. Due to their very nature, agile methodologies have the potential to be integrated with other methodologies or specific managerial approaches defined in line with agility objectives. One of the cases is Six Sigma, which is used in organizations by focusing on organizational change and process improvement. In the present study, attempts were made to present the hybrid software development approach, including Scrum, as the most common agile and Six Sigma methodology. This approach was practically used in a case study, and the obtained results were analyzed. The results of this evaluation showed that this hybrid method could lead to the increased team performance and customer satisfaction. However, besides these two achievements, an increase in the number of re-works, number of defects discovered, and the duration of the project implementation were also observed. These cases are in line with the main objectives of Scrum and Six Sigma and are justifiable and acceptable due to achieving those objectives.
Modelling turn away intention of information technology professionals in Bang...IJECEIAES
Despite, Bangladesh produces many IT graduates each year but only one tenth of total graduates contribute in IT development sector. In order to keep the contribution to economy through IT development, it is crucial for IT industry to know the factors that influence turn away of IT graduates. In this paper, building upon role stress theory, we develop a research model to explore the influence of workplace exhaustion and threat of professional obsolescence (TPO). Data were gathered from 185 IT professionals from 15 different IT companies through survey questionnaire. The structural equation modelling technique was used to test the paths. The results suggests that strong influence of TPO on turn-away intentions. Result also suggests significant roles of work overload, family-career conflict and control over career and workplace exhaustion on turn away intention. This paper contributes to the body of work dedicated to helping us better understand the turn away behaviour from the workplace exhaustion and TPO perspectives. From the viewpoint of practice, this research sheds light on some of the challenges that the IT industry might face when making strategy and policy to control turn away from IT profession in Bangladesh.
AN EXPERT GAMIFICATION SYSTEM FOR VIRTUAL AND CROSS-CULTURAL SOFTWARE TEAMScsandit
Gamification is the concept of applying game elements in non-game context platforms to motivate people to participate in planned activities to achieve goals.
Gamification has been applied to academic fields including software engineering (SE) in recent years. Many gamification implementations in SE have been ad hoc and lacked standardized guidelines. This paper introduces a new concept of building an expert gamification system(EGS) to provide guidelines for the implementation of gamification for virtual and cross cultural software teams (VCCST). The system will extend the core of a regular expert system to include gamification tools, a supplementary database, and an expert knowledge source. The cross-cultural data for the EGS contains the Hofstede's cultural dimensions (HCD).
As more and more VCCST are formed in recent years, many issues have been raised in those teams stemming from miscommunication and cultural conflicts. This paper uses the EGS to help resolve the issues in VCCST.
APPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPScsandit
Mobile applications are becoming an emerging property in today’s world. Delivering high quality mobile applications by improving the quality of the user interface is a definitive guide in building successful mobile applications and will have a significant increase in the market for that application. This paper addresses some issues related to mobile user interface, current input system and user dictionary. After analysing these issues we have proposed a new system by making some improvements to the current input system and user dictionary. In order to improve the current system, we have taken some issues related to one of the most widely used data entry methods ‘Keyboard’ and proposed some improvements by introducing Smart Optimized Keyboard (STOKE). We have provided the results, which include performance, reduction in number of keystrokes, and screen space. This describes the significant change after adopting the proposed keyboard. In the end, we have proposed an optimized way of building up
the user dictionary, which assists the user in inserting the input very easily, rapidly and effectively. In a combine, these two will help in providing the best user experience to the users.
Using these slides, I presented my paper titled "Institutional works in scholarly networks: A rapprochement between agency and structure" at the 2014 Academy of Management annual meeting. In the paper, I attempt to find an answer to the question: how noble ideas emerge in academia?
Impact of Expert System as Tools for Efficient Teaching and Learning Process ...rahulmonikasharma
Introducing an expert system as tool in the teaching and learning process in the Nigeria educational system is a much needed step to improving the process, this is because it is filled with a few challenges involved. The advent of computer system has definitely opened way to Computer Aided Instruction (CAI) for which an expert system is one. An expert system is a well known area of artificial intelligence which is a computerized tool designed to enhance the quality and availability of knowledge required in educational system. The general society sees CAI/expert system as inevitable and a must in teaching and learning process. Borrowing a leaf from the civilized world in their knowledge preservation and distribution, it now becomes necessary for the Nigeria educational system to adopt CAI, and especially expert to duplicate the rare knowledge and experience of a few experts in different fields of education and to place the Nigerian educational system at par with their international counterparts. Though expert system has enormous benefits, they remain un-established as a useful technology due to few research and documentation. This research work proposes that the effective introduction of expert system in teaching and learning process in Nigerian educational system should be adopted as its advantages over traditional chalk-talk method is innumerable.
A case study of using the hybrid model of scrum and six sigma in software dev...IJECEIAES
The world of software engineering is constantly discovering new ways that lead to an increase in team performance in the production of software products and, at the same time, brings the customer's further satisfaction. With the advent of agile methodologies in software development, these objectives have been considered more seriously by software teams and companies. Due to their very nature, agile methodologies have the potential to be integrated with other methodologies or specific managerial approaches defined in line with agility objectives. One of the cases is Six Sigma, which is used in organizations by focusing on organizational change and process improvement. In the present study, attempts were made to present the hybrid software development approach, including Scrum, as the most common agile and Six Sigma methodology. This approach was practically used in a case study, and the obtained results were analyzed. The results of this evaluation showed that this hybrid method could lead to the increased team performance and customer satisfaction. However, besides these two achievements, an increase in the number of re-works, number of defects discovered, and the duration of the project implementation were also observed. These cases are in line with the main objectives of Scrum and Six Sigma and are justifiable and acceptable due to achieving those objectives.
Modelling turn away intention of information technology professionals in Bang...IJECEIAES
Despite, Bangladesh produces many IT graduates each year but only one tenth of total graduates contribute in IT development sector. In order to keep the contribution to economy through IT development, it is crucial for IT industry to know the factors that influence turn away of IT graduates. In this paper, building upon role stress theory, we develop a research model to explore the influence of workplace exhaustion and threat of professional obsolescence (TPO). Data were gathered from 185 IT professionals from 15 different IT companies through survey questionnaire. The structural equation modelling technique was used to test the paths. The results suggests that strong influence of TPO on turn-away intentions. Result also suggests significant roles of work overload, family-career conflict and control over career and workplace exhaustion on turn away intention. This paper contributes to the body of work dedicated to helping us better understand the turn away behaviour from the workplace exhaustion and TPO perspectives. From the viewpoint of practice, this research sheds light on some of the challenges that the IT industry might face when making strategy and policy to control turn away from IT profession in Bangladesh.
Collaborative Knowledge Management in Organization from SECI model FrameworkNatapone Charsombut
A presentation file for TIIM conference 2010 Pattaya Thailand,
ABSTRACT
In the age of social collaboration and sharing that enables by Web 2.0 and Linked Data, many organizations adapt themselves into advantages of interactive, sharing, reusing, interoperability and collaboration on World Wide Web. Organizational learning which is sub of knowledge management also greatly gains benefit from this emerging collaboration culture too. It provides abilities to share valuable insights, to reduce redundant work, to avoid reinventing the wheel, to reduce training time for new employees, to retain intellectual capital as employee turnover in an organization, and to adapt to changing environments and markets.
However, user created content from Web 2.0 multiplying with published structure of data according to Linked Data concept will be a massive amount of data. It is inevitable facing the overwhelming of data. Traditional knowledge management is not designed to extract knowledge from social collaboration. We need a framework that fit for knowledge transfer in highly interaction environment.
SECI model which is a knowledge management based on collaborative knowledge transfer in organization seem to be the best candidate for navigating knowledge creation in this case. This study attempts to address how to apply SECI model to knowledge management system in collaborative organization.
LOAD DISTRIBUTION COMPOSITE DESIGN PATTERN FOR GENETIC ALGORITHM-BASED AUTONO...ijsc
Current autonomic computing systems are ad hoc solutions that are designed and implemented from the
scratch. When designing software, in most cases two or more patterns are to be composed to solve a bigger
problem. A composite design patterns shows a synergy that makes the composition more than just the sum
of its parts which leads to ready-made software architectures. As far as we know, there are no studies on
composition of design patterns for autonomic computing domain. In this paper we propose pattern-oriented
software architecture for self-optimization in autonomic computing system using design patterns
composition and multi objective evolutionary algorithms that software designers and/or programmers can
exploit to drive their work. Main objective of the system is to reduce the load in the server by distributing
the population to clients. We used Case Based Reasoning, Database Access, and Master Slave design
patterns. We evaluate the effectiveness of our architecture with and without design patterns compositions.
The use of composite design patterns in the architecture and quantitative measurements are presented. A
simple UML class diagram is used to describe the architecture.
Knowledge Sharing in Workplace: Motivators and DemotivatorsIJMIT JOURNAL
This paper gives an overview of knowledge sharing in workplace. Based on the review of critical literatures by the authors, they infer that knowledge sharing in workplace can be influenced by motivators and
demotivators. Activities of knowledge sharing in organizations may be on organization level or individual
level. Knowledge sharing of both levels is critical to the success or failure of knowledge management inside
and outside of organizations. Age, culture, and industry were all found to affect knowledge sharing among workers. A common stereotype is that older workers hoard knowledge because they are more insecure and feel threatened by younger workers. Since older workers have more valuable knowledge, younger workers
needed to entice their older colleagues to share their valuable knowledge with them. The paper focus on
motivators and demotivators to sharing Knowledge in workplace. Theories and research pertaining to why
workers share knowledge are reviewed. While all industry need knowledge and innovation, it is also true
that the pace of change and the need to innovate differs from industry to industry. Technology was
acknowledged to have a high important role in increasing productivity of knowledge sharing. It plays a critical role in creating, storing and distributing explicit knowledge in an accessible and expeditious manner.
An Expert Gamification System with Psychological Theories for Virtual and Cro...ijseajournal
Gamification is the concept of applying game elements in non-game context platforms to motivate people to
participate in planned activities to achieve goals.
Gamification has been applied to academic fields including software engineering (SE) in recent years.
Many gamification implementations in SE have been ad hoc and lacked standardized guidelines. This paper
introduces a new concept of building an expert gamification system (EGS) to provide guidelines for the
implementation of gamification for virtual and cross cultural software teams (VCCST). The system will
extend the core of a regular expert system to include gamification tools, a supplementary database, and an
expert knowledge source. The cross-cultural data for the EGS contains the Hofstede's cultural dimensions
(HCD). The expert knowledge source contains information from Maslow’s hierarchy of needs (MHON),
flow theory and self-determination theory (SDT).
As more and more VCCST are formed in recent years, many issues have been raised in those teams
stemming from miscommunication and cultural conflicts. This paper uses the EGS to help resolve the
issues in VCCST. Also, this paper is an extension of a previous paper written by the same authors in this
similar topic.
Hybrid Intelligent Systems Prompt Science Analysisijtsrd
Hybrid Intelligent Systems HIS represent a novel paradigm in artificial intelligence, synthesizing diverse AI techniques to create more powerful and adaptable systems. This abstract delves into the core attributes and applications of Hybrid Intelligent Systems, emphasizing their multidisciplinary approach. By integrating rule based systems, expert systems, machine learning, fuzzy logic, and other AI methodologies, Hybrid Intelligent Systems harnesses the complementary strengths of different techniques. This integration enables improved problem solving capabilities, flexibility, and performance across various domains. Hybrid Intelligent System’s adaptability is a key feature, allowing for dynamic adjustments based on the nature of tasks and evolving environments. This adaptability is facilitated by components that incorporate adaptive learning, ensuring continuous improvement over time. The versatility of Hybrid Intelligent Systems is evident in its real world applications, spanning industries such as finance, healthcare, and manufacturing. However, the ethical dimensions of Hybrid Intelligent Systems development and deployment cannot be overstated. Transparency, fairness, user privacy protection, and accountability are paramount principles to uphold, reinforcing responsible and ethical use of these advanced technologies. As Hybrid Intelligent Systems continues to evolve, its collaborative nature, balancing artificial and human intelligence, positions it as a pivotal force in addressing complex challenges and shaping the future of AI. Manish Verma "Hybrid Intelligent Systems: Prompt Science Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63426.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/63426/hybrid-intelligent-systems-prompt-science-analysis/manish-verma
A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...mlaij
This study aims to introduce a discussion platform and curriculum designed to help people understand how
machines learn. Research shows how to train an agent through dialogue and understand how information
is represented using visualization. This paper starts by providing a comprehensive definition of AI literacy
based on existing research and integrates a wide range of different subject documents into a set of key AI
literacy skills to develop a user-centered AI. This functionality and structural considerations are organized
into a conceptual framework based on the literature. Contributions to this paper can be used to initiate
discussion and guide future research on AI learning within the computer science community.
Artificial Intelligence Role in Modern Science Aims, Merits, Risks and Its Ap...ijtsrd
Artificial Intelligence AI is a growing field at the intersection of computer science, mathematics, and engineering, focused on creating machines capable of intelligent behavior. Over the years, AI has evolved from rule based systems to data driven approaches, prominently leveraging machine learning and deep learning. This evolution has led to AI systems capable of complex tasks such as pattern recognition, natural language processing, and decision making. The applications of AI are vast and diverse, permeating industries like healthcare, finance, automotive, retail, and education. AI driven technologies enable efficient automation, precise data analysis, personalized experiences, and improved decision making. However, with these advancements come ethical and culture concerns, including biases, data privacy, job displacement, and the responsible development and deployment of AI. Striking a balance between AIs potential and its associated risks necessitates a holistic approach, incorporating transparency, fairness, robust regulations, and ongoing research. This abstract encapsulates AIs transformative potential, emphasizing the importance of responsible AI development to ensure a positive impact on society while mitigating risks. Manish Verma "Artificial Intelligence Role in Modern Science: Aims, Merits, Risks and Its Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-5 , October 2023, URL: https://www.ijtsrd.com/papers/ijtsrd59910.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/59910/artificial-intelligence-role-in-modern-science-aims-merits-risks-and-its-applications/manish-verma
Application and Methods of Deep Learning in IoTIJAEMSJORNAL
In this talk, we provide a comprehensive overview of how to use a subset of advanced AI techniques, most specifically Deep Learning (DL), to bolster analytics as well as learning in the IoT URL. First and foremost, we define a development environment that integrates big data designs with deep learning models to promote rapid experimentation. There are three main promises made in the proposal: To begin, it illustrates a big data engineering that facilitates big data assortment in the same way that businesses facilitate deep learning models. Then, the language for creating a data perspective is shown, one that transforms the many streams of large data into a format that can be used by an advanced learning system. Third, it demonstrates the success of the framework by applying the tool to a wide range of deep learning use cases. We provide a generalized basis for a variety of DL architectures using numerical examples. We also evaluate and summarize major published research projects that made use of DL in the IoT context. Wonderful Internet of Things gadgets that have integrated DL into their prior knowledge are often discussed.
Improving Decision Making Skills through Business Simulation.docxsheronlewthwaite
Improving Decision Making Skills
through Business Simulation Gaming and Expert Systems
Alexander Fuchsberger
University of Nebraska, Omaha
[email protected]
Abstract
Business simulations as experimental learning tools
are common, but they usually train specific
predetermined aspects. Research on artificial
intelligence among business simulations is rare, and
therefore, featured in this paper. The purpose of this
research is to explore the use of business simulations
games as an experimental learning tool through a
contemporary, web-based application featuring
artificial intelligence and mobile support. An expert
system guides and advises the players, while they
manage their virtual business in a competitive market
against other participants. The core element is the
design process of an artifact, based on the Design
Science methodology. The training and learning
effects on the participants are observed via the
artifact itself in a series of experiments and an
additional survey. Twenty-six students in Austria
were chosen as the sample group to reveal and
measure the improvements in decision making,
experimental learning capabilities and the biasing
ability of the artificial intelligence.
1. Introduction
Today the decision-making process within
organizations is increasingly complex. All decision
makers in businesses require basic understanding of
organizational structure and how business elements
influence each other. In universities effective work is
done by providing students with the necessary
knowledge about business concepts like production
optimization, marketing, strategies, human resource
management, and so on. But the theoretical
knowledge is rarely put to practice. Avramenko [1]
finds that the educational process in business schools
fails to equip students with employability skills.
Business simulation games encourage teamwork
and decision-making, in a risk-free environment [2].
Players develop a holistic view of the business, they
learn that sometimes alternatives have to be
considered and that losses in an early stage might
lead to higher profit in a later stage. Business games
and simulations became popular over the last 20
years; and they differ in complexity, focus, settings
or intentions. They are web or application-based and
can include random elements.
This research aims to design such a business
simulation, which allows multiple players to train
their management skills in a competitive
environment. No perfect utilization can be reached
only by the player’s actions; other players are
influencing the participant’s outcome as well.
Another core element of this research was to
provide a setting where an expert system can take a
substantial and useful part in such a simulation game.
The idea was to develop a virtual “mentor”, which
acts as an advisor and biases the human player in his
or her decisions. Therefore, the primary research
objectives are:
Ho ...
Understanding and Supporting Intersubjective Meaning Making in Socio-Technica...Sebastian Dennerlein
This dissertation will elaborate on the understanding of intersubjective meaning making by analyzing the traces of collaborative knowledge construction users leave behind in socio-technical systems. Therefore, it will draw upon more theoretical and more formal models of cognitive psychology to describe and explain the underlying process
in detail. This is done with the goal to support intersubjective meaning
making and thus elevate informal collaborative knowledge construction
in nowadays aordances of social media.
An Analytical Study on Knowledge Sharing within the Organizationijcnes
The better management of knowledge within the organization will lead to improved innovation and competitive advantage. The main goal of the firm� better utilization of internal and external knowledge. This core knowledge is found in individuals, communities of interest and their connections. An organization�s data is found in its computer systems but a company�s intelligence is found, in its biological and social systems. Though it is acclaimed as a good method, there are some setbacks in the process of knowledge sharing[KS] among the employees. This paper explores the possible ways to establish organization using social computing tools to facilitate Knowledge Sharing and create a social data mining among all the members of organization. Social Data Mining Network Analysis (SDMNA) techniques have been used to study KS patterns which take place between employees and departments. This SDMNA graph reveals the structure of social data mining network highlighting connectivity, clustering and strength of relationships between employees.
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...IJITE
Team work is an important training element of future software engineers. However, the evaluation of the
performance of collaboration among individuals is very subjective. Meanwhile, how to effectively
promote the collaboration in an academic setting is an even more challenging task. The lack of a common
standard or method for the assessment is a practical issue in software engineering projects. With the
rapid development of shared authoring environments, such as Wiki, more and more educational
institutions are studying the adaptability of such kind of collaborative platforms. In order to study the
applicability of adopting wiki-based shared authoring environments in software engineering education,
we have proposed three major research questions. By solving these problems, we try to answer some of
the most important questions in adopting shared authoring platforms in academic settings.
Collaborative Knowledge Management in Organization from SECI model FrameworkNatapone Charsombut
A presentation file for TIIM conference 2010 Pattaya Thailand,
ABSTRACT
In the age of social collaboration and sharing that enables by Web 2.0 and Linked Data, many organizations adapt themselves into advantages of interactive, sharing, reusing, interoperability and collaboration on World Wide Web. Organizational learning which is sub of knowledge management also greatly gains benefit from this emerging collaboration culture too. It provides abilities to share valuable insights, to reduce redundant work, to avoid reinventing the wheel, to reduce training time for new employees, to retain intellectual capital as employee turnover in an organization, and to adapt to changing environments and markets.
However, user created content from Web 2.0 multiplying with published structure of data according to Linked Data concept will be a massive amount of data. It is inevitable facing the overwhelming of data. Traditional knowledge management is not designed to extract knowledge from social collaboration. We need a framework that fit for knowledge transfer in highly interaction environment.
SECI model which is a knowledge management based on collaborative knowledge transfer in organization seem to be the best candidate for navigating knowledge creation in this case. This study attempts to address how to apply SECI model to knowledge management system in collaborative organization.
LOAD DISTRIBUTION COMPOSITE DESIGN PATTERN FOR GENETIC ALGORITHM-BASED AUTONO...ijsc
Current autonomic computing systems are ad hoc solutions that are designed and implemented from the
scratch. When designing software, in most cases two or more patterns are to be composed to solve a bigger
problem. A composite design patterns shows a synergy that makes the composition more than just the sum
of its parts which leads to ready-made software architectures. As far as we know, there are no studies on
composition of design patterns for autonomic computing domain. In this paper we propose pattern-oriented
software architecture for self-optimization in autonomic computing system using design patterns
composition and multi objective evolutionary algorithms that software designers and/or programmers can
exploit to drive their work. Main objective of the system is to reduce the load in the server by distributing
the population to clients. We used Case Based Reasoning, Database Access, and Master Slave design
patterns. We evaluate the effectiveness of our architecture with and without design patterns compositions.
The use of composite design patterns in the architecture and quantitative measurements are presented. A
simple UML class diagram is used to describe the architecture.
Knowledge Sharing in Workplace: Motivators and DemotivatorsIJMIT JOURNAL
This paper gives an overview of knowledge sharing in workplace. Based on the review of critical literatures by the authors, they infer that knowledge sharing in workplace can be influenced by motivators and
demotivators. Activities of knowledge sharing in organizations may be on organization level or individual
level. Knowledge sharing of both levels is critical to the success or failure of knowledge management inside
and outside of organizations. Age, culture, and industry were all found to affect knowledge sharing among workers. A common stereotype is that older workers hoard knowledge because they are more insecure and feel threatened by younger workers. Since older workers have more valuable knowledge, younger workers
needed to entice their older colleagues to share their valuable knowledge with them. The paper focus on
motivators and demotivators to sharing Knowledge in workplace. Theories and research pertaining to why
workers share knowledge are reviewed. While all industry need knowledge and innovation, it is also true
that the pace of change and the need to innovate differs from industry to industry. Technology was
acknowledged to have a high important role in increasing productivity of knowledge sharing. It plays a critical role in creating, storing and distributing explicit knowledge in an accessible and expeditious manner.
An Expert Gamification System with Psychological Theories for Virtual and Cro...ijseajournal
Gamification is the concept of applying game elements in non-game context platforms to motivate people to
participate in planned activities to achieve goals.
Gamification has been applied to academic fields including software engineering (SE) in recent years.
Many gamification implementations in SE have been ad hoc and lacked standardized guidelines. This paper
introduces a new concept of building an expert gamification system (EGS) to provide guidelines for the
implementation of gamification for virtual and cross cultural software teams (VCCST). The system will
extend the core of a regular expert system to include gamification tools, a supplementary database, and an
expert knowledge source. The cross-cultural data for the EGS contains the Hofstede's cultural dimensions
(HCD). The expert knowledge source contains information from Maslow’s hierarchy of needs (MHON),
flow theory and self-determination theory (SDT).
As more and more VCCST are formed in recent years, many issues have been raised in those teams
stemming from miscommunication and cultural conflicts. This paper uses the EGS to help resolve the
issues in VCCST. Also, this paper is an extension of a previous paper written by the same authors in this
similar topic.
Hybrid Intelligent Systems Prompt Science Analysisijtsrd
Hybrid Intelligent Systems HIS represent a novel paradigm in artificial intelligence, synthesizing diverse AI techniques to create more powerful and adaptable systems. This abstract delves into the core attributes and applications of Hybrid Intelligent Systems, emphasizing their multidisciplinary approach. By integrating rule based systems, expert systems, machine learning, fuzzy logic, and other AI methodologies, Hybrid Intelligent Systems harnesses the complementary strengths of different techniques. This integration enables improved problem solving capabilities, flexibility, and performance across various domains. Hybrid Intelligent System’s adaptability is a key feature, allowing for dynamic adjustments based on the nature of tasks and evolving environments. This adaptability is facilitated by components that incorporate adaptive learning, ensuring continuous improvement over time. The versatility of Hybrid Intelligent Systems is evident in its real world applications, spanning industries such as finance, healthcare, and manufacturing. However, the ethical dimensions of Hybrid Intelligent Systems development and deployment cannot be overstated. Transparency, fairness, user privacy protection, and accountability are paramount principles to uphold, reinforcing responsible and ethical use of these advanced technologies. As Hybrid Intelligent Systems continues to evolve, its collaborative nature, balancing artificial and human intelligence, positions it as a pivotal force in addressing complex challenges and shaping the future of AI. Manish Verma "Hybrid Intelligent Systems: Prompt Science Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63426.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/63426/hybrid-intelligent-systems-prompt-science-analysis/manish-verma
A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...mlaij
This study aims to introduce a discussion platform and curriculum designed to help people understand how
machines learn. Research shows how to train an agent through dialogue and understand how information
is represented using visualization. This paper starts by providing a comprehensive definition of AI literacy
based on existing research and integrates a wide range of different subject documents into a set of key AI
literacy skills to develop a user-centered AI. This functionality and structural considerations are organized
into a conceptual framework based on the literature. Contributions to this paper can be used to initiate
discussion and guide future research on AI learning within the computer science community.
Artificial Intelligence Role in Modern Science Aims, Merits, Risks and Its Ap...ijtsrd
Artificial Intelligence AI is a growing field at the intersection of computer science, mathematics, and engineering, focused on creating machines capable of intelligent behavior. Over the years, AI has evolved from rule based systems to data driven approaches, prominently leveraging machine learning and deep learning. This evolution has led to AI systems capable of complex tasks such as pattern recognition, natural language processing, and decision making. The applications of AI are vast and diverse, permeating industries like healthcare, finance, automotive, retail, and education. AI driven technologies enable efficient automation, precise data analysis, personalized experiences, and improved decision making. However, with these advancements come ethical and culture concerns, including biases, data privacy, job displacement, and the responsible development and deployment of AI. Striking a balance between AIs potential and its associated risks necessitates a holistic approach, incorporating transparency, fairness, robust regulations, and ongoing research. This abstract encapsulates AIs transformative potential, emphasizing the importance of responsible AI development to ensure a positive impact on society while mitigating risks. Manish Verma "Artificial Intelligence Role in Modern Science: Aims, Merits, Risks and Its Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-5 , October 2023, URL: https://www.ijtsrd.com/papers/ijtsrd59910.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/59910/artificial-intelligence-role-in-modern-science-aims-merits-risks-and-its-applications/manish-verma
Application and Methods of Deep Learning in IoTIJAEMSJORNAL
In this talk, we provide a comprehensive overview of how to use a subset of advanced AI techniques, most specifically Deep Learning (DL), to bolster analytics as well as learning in the IoT URL. First and foremost, we define a development environment that integrates big data designs with deep learning models to promote rapid experimentation. There are three main promises made in the proposal: To begin, it illustrates a big data engineering that facilitates big data assortment in the same way that businesses facilitate deep learning models. Then, the language for creating a data perspective is shown, one that transforms the many streams of large data into a format that can be used by an advanced learning system. Third, it demonstrates the success of the framework by applying the tool to a wide range of deep learning use cases. We provide a generalized basis for a variety of DL architectures using numerical examples. We also evaluate and summarize major published research projects that made use of DL in the IoT context. Wonderful Internet of Things gadgets that have integrated DL into their prior knowledge are often discussed.
Improving Decision Making Skills through Business Simulation.docxsheronlewthwaite
Improving Decision Making Skills
through Business Simulation Gaming and Expert Systems
Alexander Fuchsberger
University of Nebraska, Omaha
[email protected]
Abstract
Business simulations as experimental learning tools
are common, but they usually train specific
predetermined aspects. Research on artificial
intelligence among business simulations is rare, and
therefore, featured in this paper. The purpose of this
research is to explore the use of business simulations
games as an experimental learning tool through a
contemporary, web-based application featuring
artificial intelligence and mobile support. An expert
system guides and advises the players, while they
manage their virtual business in a competitive market
against other participants. The core element is the
design process of an artifact, based on the Design
Science methodology. The training and learning
effects on the participants are observed via the
artifact itself in a series of experiments and an
additional survey. Twenty-six students in Austria
were chosen as the sample group to reveal and
measure the improvements in decision making,
experimental learning capabilities and the biasing
ability of the artificial intelligence.
1. Introduction
Today the decision-making process within
organizations is increasingly complex. All decision
makers in businesses require basic understanding of
organizational structure and how business elements
influence each other. In universities effective work is
done by providing students with the necessary
knowledge about business concepts like production
optimization, marketing, strategies, human resource
management, and so on. But the theoretical
knowledge is rarely put to practice. Avramenko [1]
finds that the educational process in business schools
fails to equip students with employability skills.
Business simulation games encourage teamwork
and decision-making, in a risk-free environment [2].
Players develop a holistic view of the business, they
learn that sometimes alternatives have to be
considered and that losses in an early stage might
lead to higher profit in a later stage. Business games
and simulations became popular over the last 20
years; and they differ in complexity, focus, settings
or intentions. They are web or application-based and
can include random elements.
This research aims to design such a business
simulation, which allows multiple players to train
their management skills in a competitive
environment. No perfect utilization can be reached
only by the player’s actions; other players are
influencing the participant’s outcome as well.
Another core element of this research was to
provide a setting where an expert system can take a
substantial and useful part in such a simulation game.
The idea was to develop a virtual “mentor”, which
acts as an advisor and biases the human player in his
or her decisions. Therefore, the primary research
objectives are:
Ho ...
Understanding and Supporting Intersubjective Meaning Making in Socio-Technica...Sebastian Dennerlein
This dissertation will elaborate on the understanding of intersubjective meaning making by analyzing the traces of collaborative knowledge construction users leave behind in socio-technical systems. Therefore, it will draw upon more theoretical and more formal models of cognitive psychology to describe and explain the underlying process
in detail. This is done with the goal to support intersubjective meaning
making and thus elevate informal collaborative knowledge construction
in nowadays aordances of social media.
An Analytical Study on Knowledge Sharing within the Organizationijcnes
The better management of knowledge within the organization will lead to improved innovation and competitive advantage. The main goal of the firm� better utilization of internal and external knowledge. This core knowledge is found in individuals, communities of interest and their connections. An organization�s data is found in its computer systems but a company�s intelligence is found, in its biological and social systems. Though it is acclaimed as a good method, there are some setbacks in the process of knowledge sharing[KS] among the employees. This paper explores the possible ways to establish organization using social computing tools to facilitate Knowledge Sharing and create a social data mining among all the members of organization. Social Data Mining Network Analysis (SDMNA) techniques have been used to study KS patterns which take place between employees and departments. This SDMNA graph reveals the structure of social data mining network highlighting connectivity, clustering and strength of relationships between employees.
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...IJITE
Team work is an important training element of future software engineers. However, the evaluation of the
performance of collaboration among individuals is very subjective. Meanwhile, how to effectively
promote the collaboration in an academic setting is an even more challenging task. The lack of a common
standard or method for the assessment is a practical issue in software engineering projects. With the
rapid development of shared authoring environments, such as Wiki, more and more educational
institutions are studying the adaptability of such kind of collaborative platforms. In order to study the
applicability of adopting wiki-based shared authoring environments in software engineering education,
we have proposed three major research questions. By solving these problems, we try to answer some of
the most important questions in adopting shared authoring platforms in academic settings.
CREATING AND SHARING KNOWLEDGE THROUGH A CORPORATE SOCIAL NETWORKING SITE: TH...Julio Figueroa
Paper published in PACIS2012
There have been various claims that enterprise social networking sites (ESN) might improve business effectiveness and performance. Nevertheless, many of the initiatives supported by ESNs have failed. This paper argues that divergent perceptions about ESNs across the different levels of the organization may explain failures in ESNs’ design and implementation. Using an extended version of the Technological Frames of Reference framework (Orlikowski & Gash, 1994), this paper reports on a study that analyzed employee’s perceptions about an ESN within a software engineering firm. It was found that significant divergent perceptions in the organization led to a social order that discouraged employees to create and share knowledge through the ESN. This paper highlights the importance of aligning top management perceptions about the ESN with its actual scope. It also highlights the relevance of aligning perceptions about the ESN across the different levels of the organization. This paper proposes extending the original Technological Frames of Reference framework in order to better understand people’s perceptions about technologies that support knowledge management systems. It also proposes an explanatory model for understanding how people’s perceptions about a corporate social networking site impact on its usage.
This is the presentation of the Juan Cruz-Benito’s PhD “On data-driven systems analyzing, supporting and enhancing users’ interaction and experience” that was defended on September 3rd, 2018 in the Faculty of Sciences at University of Salamanca Spain. This PhD was graded with the maximum qualification “Sobresaliente Cum Laude”.
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
2. 148 Computer Science & Information Technology (CS & IT)
[2]. This paper extends the core of an expert system to include gamification tools, a
supplementary database with the cross-cultural data, and the expert knowledge source from
theory of flow to build the EGS. The core of an expert system consists of the inference engine
and the knowledge base. Figure 1 is a high-level view of the EGS.
Figure 1. High Level View of the EGS
The EGS consists of the following modules:
1. Gamification Tools
2. User Interface
3. Inference Engine
4. Knowledge Base
5. Supplementary Database
6. Expert Knowledge Source
2. RELATED WORK
Gamification has been extensively researched by different types of researchers in recent years.
However, there are very few studies in building an EGS as a tool for implementing gamification.
Some gamification studies are intended for learning and discussed in the context of education.
Other work tried to verify whether or not gamification works [3]. Some analysis has been done to
investigate the gamification mechanisms and see how gamification influences behaviours [4].
Some research has indicated that gamification provides positive effects in motivation. Some
studies are descriptive in nature and they have no actual listed experiment results of gamification
reported [5], [6], [7], [8]. Several studies explore conceptual frameworks for classroom learning
only [9].
For VCCST, some studies describe their conflicts and issues in detail but offer little help or
guidance for them [10], [11]. Other research identifies the specific attributes relevant to cross-
cultural concerns but does not show how to resolve the issues [12]. Some studies describe how to
do cross-cultural surveys [13]. There are very few studies offering solutions for using an EGS.
3. Computer Science & Information Technology (CS & IT) 149
3. VIRTUAL AND CROSS CULTRUAL SOFTWARE TEAM
Globalization of markets has been a major theme in recent years and more software teams are
working in cross cultural environments from outsourcing or insourcing work strategies [10]. It is
common for a large software project to have teams in more than one location and in different
countries. Many VCCST are formed across the globe with engineers from different parts of the
world [14]
It has been reported that the software projects with VCCST have quite a few issues and
challenges.Most of the problems are about conflicts in culture and its adverse impact to the
dynamics of the team [10], [15]. In a few instances, the software engineers view their co-workers
from different cultures as rivals rather than teammates. This paper designs an EGS to promote
team work and collaboration for VCCST to smoothen their conflicts and problems.
4. EXPERT GAMIFCATION SYSTEM
The EGS extends the core of an expert system and consists of six components as shown in Figure
1. The core elements of an expert system are the inference engine and the knowledge base. The
inference engine is an automated reasoning system that evaluates the current state of the
knowledge base, applies relevant rules, and then asserts new knowledge into the knowledge base.
The knowledge base represents facts and rules. Knowledge in an expert system may originate
from many sources such as reports, databases, case studies, empirical data, and domain experts
[2].
Other components in the EGS are the gamification tools, a user interface, a supplementary
database, and an expert knowledge source. The gamification tools include the game mechanics
and the platform. For example, Microsoft SharePoint can be used as a gamification tool. These
tools will contain the software team profile and personal profiles. The profiles will store and show
the team scores and individual scores respectively. The user interface facilitates the
communications between the project admins, users, and the EGS.
The supplementary database contains the cultural data and project data. The expert knowledge
source contains the theory of flow information. The following two sections describe the cultural
data and the theory of flow for this EGS.
4.1. Hofstede's cultural dimensions
Hofstede's cultural dimensions (HCD) theory is a framework for cross-cultural communication. It
describes the effects of a society's culture on the values of its members, and how these values
relate to behaviour using a structure derived from factor analysis [16]. According to Hofstede the
most important differences between cultures can be captured by finding to what extent members
of these cultures differ with regard to six values [17]:
1. Power distance index (PDI) - The power distance index is defined as the extent to which
less powerful people in an organization will accept and expect power to be distributed.
2. Individualism/Collectivism (IDV) – Differences between the degrees within the
Individualism vs. Collectivism index.
3. Masculinity/Femininity (MAS) - Differences between the degrees within the Masculinity
vs. Femininity index.
4. 150 Computer Science & Information Technology (CS & IT)
4. Uncertainty avoidance index (UAI) - Differences between the degrees within the
Uncertainty Avoidance Index.
5. Long-term/Short-term Orientation (LTO) - Differences between the degrees within the
Long-Term vs. Short-Term Orientation index.
6. Indulgence vs. Restraint (IND) - Differences between the degrees within the Indulgent vs.
Restraint index.
Table 1 shows the Hofstede’s values for these cultural dimensions for Australia, China, India,
Japan, Netherlands, UK, and USA [17]. The EGS further categorizes the countries into regions
such as Australia (AUS), Asia, Europe (EU), and North America (NAM) for further region
processing as shown in the second columns of Table 1.
Table 1. Hofstede’s Cultural Dimensions
Country Region PDI INV MAS UAI LTO IND
Australia AUS 36 90 61 51 31 71
China Asia 80 20 66 30 87 24
India Asia 77 48 56 40 51 26
Japan Asia 50 42 90 88 75 42
Netherlands EU 38 80 14 53 67 68
UK EU 30 89 62 30 20 69
USA NAM 40 91 62 46 26 68
Among the HCD, three dimensions have more effect on gamification. They are Individualism,
Masculinity, and Uncertainty:
1. Individualism (INV)
This is the index to indicate how people think with the mentality of “I” or “We.” Some countries
are very “individual” focused. They focus more on themselves and careers versus their group.
The game design should take this into consideration. If the culture is more individual focused,
game mechanics such as leaderboards should be used.
2. Masculinity (MAS)
Masculinity is defined as “a preference in society for achievement, heroism, assertiveness and
material rewards for success.” Its counterpart represents “a preference for cooperation, modesty,
caring for the weak and quality of life.” [17] This dimension gives important information in
setting up the right game mechanics for certain cultures. For instance, many Scandinavian
countries have a very low score in MAS. In those cultures, there is an important concept known
as Janteloven [8]. Janteloven is essentially a set of rules for encouraging social equality, social
stability, and uniformity in which one should never try to stick out from the crowd. The
Netherlands is an example with a score of 14 in MAS. The EGS should take this into
consideration by not focusing the games on competitiveness and leaderboards. Rather, it should
promote notions of equality and creativity for them [18], [19].
3. Uncertainty Avoidance (UAI)
The uncertainty avoidance index is defined as “a society's tolerance for ambiguity” in which
people embrace something unexpected, or go away from the status quo. Societies that score a
high degree in this index tend to prefer strict codes of behaviour, guidelines, laws, and absolute
5. Computer Science & Information Technology (CS & IT) 151
Truth. A lower degree in this index shows more acceptance of differing thoughts. Society tends to
impose fewer regulations, ambiguity is more accustomed to [17]. The game design should take
this into consideration.
4.2. Psychological factors and flow detection
Gamification uses the psychology of engagement to motivate people. Psychology can be applied
to the non-technical aspects of SE like personality, teamwork, leadership, decision-making,
culture, motivation and human tendencies [15].
Abraham H. Maslow was a renowned psychologist in the field of motivation. He published the
famous Hierarchy of Needs in 1943 [18]. It is a pyramid depicting the five levels of needs,
namely
1. Biological and Physiological: air, food, shelter, water, sex, & rest
2. Safety: health, protection, stability, freedom from fear & security
3. Love and Belonging: love, intimacy, friendship, family, & affiliating
4. Esteem: self-esteem, independence, status, confidence, achievement & respect
5. Self-actualization: realizing personal potential, self-fulfilment & peak experiences
Self-actualization is the peak level in which a person's full potential is realized. Maslow describes
this level as the desire to accomplish everything that one can: to become the most that one can be
[18].
4.2.1. Theory of flow and group flow
Self-actualized people are those who come to find meanings to life that are important to them and
that fulfil them. Many of them experience a common phenomenon called flow, proposed by
Csikszentmihalyi [20].When people are in a state of flow, they will feel focused and concentrated.
They may feel a sense of ecstasy, great inner clarity, a sense of serenity, timelessness, and
intrinsic motivation. The flow is the balance between the skill level and the challenge of a task.
When a task is too difficult, it causes people to worry. When a task is too simple, people will be
bored. When a task is balanced between skill and difficulty, the individual will reach a state of
heightened focus and immersion [20]. Some research further extends the flow theory for groups.
Keith Sawyer developed specific triggers needed for creating group flow [21]. Figure 2 shows the
theory of flow. The EGS should try to keep the team in the flow and should be able to detect the
flow zone.
Figure 2. Flow Theory
6. 152 Computer Science & Information Technology (CS & IT)
4.2.2. Flow Zone Detection
The EGS should find ways to measure and detect the flow zone. There are some methods in
measuring flow with questionnaires: Nakamura & Csikszentmihalyi enlist the various ways of
measuring flow for Concept of Flow; Intrinsic Motivation Inventory with 10 Questionnaires; John
Marshall Reeve: Agentic Engagement Scale Questionnaires; Davin Pavlas Play Experience
Questionnaire [21]. Other than using the questionnaires, the EGS can use the game statistics to
detect the flow zone. Figure 3 shows a simple game flow in which the ‘flow’ loop is indicated
with bigger arrows.
Figure 3. A Simple Game Flow
The EGS should monitor the game and collect the game statistics. The EGS should set up rules to
determine if a team is in a flow state. Table 5 shows a sample of the game statistics. The average
percentage of hits in that table can be a strong indicator for detecting a flow state. For example, if
that percentage is at least at a certain value, then the EGS should assume that the team is in a flow
state or zone. It may be a trial and error process to finalize the right value for that percentage. The
percentage can be cross checked with the questionnaire method to find the optimal value.
4.3 Determining Game Mechanics and Activities
The EGS should extract the cultural information and use that information to configure the game
mechanics in the system. Table 2 contains the game mechanics, the associated emotions, and
their values for INV, MAS and UAI. The values represent the recommendations from the EGS for
the game mechanics. For example, the value of ‘all’ in INV means that game mechanic is good
for all values of INV. The value of ‘high’ in INV means the game mechanic is good if INV is
high. The same rule applies to the value of ‘low’. If all three HCDs have the same ‘high’ value
for the same game mechanics, it reinforces the recommendations. If the HCDs have different
recommendations, INV will have the highest preference and MAS will have the second highest
preference.
Table 2. Game mechanics and cultural factors
Game mechanics Emotions INV MAS UAI
Points Reward all all all
Badges Achievement all high all
Leaderboards Competition high high high
Levels Status high high high
Progress bars Achievement all all high
Storyline Engagement all all all
Feedback Engagement all all high
7. Computer Science & Information Technology (CS & IT) 153
Challenge/between
users
Competition all high all
Virtual gifts Altruism / Self-expression all low low
System for
sharing/exchanging
Collaboration/
Community
low low all
Table 3 shows a list of activities with their corresponding values for INV, MAS, or UAI. The
rules for recommendation are similar to the ones in Table 2. For example, the value of ‘low’ in
INV for ‘helping others’ means that activity is recommended when it has a low INV value. The
same rule applies to other activities and HCDs. Also, the HCD values in the table can be changed
when more knowledge or experience is gathered.
Table 3. Activity table with cultural factors
Activities INV MAS UAI
Inviting peers to design review all all all
Participating in a design review all all high
Inviting peers to a code review all all all
Participating in a code review all all all
Inviting peers to a test plan review all all all
Participating in a test plan review all all all
Helping others low low all
Giving people credits low low all
Being a team player low low all
Resolving issues all low high
Collaboration activities low low all
Innovative idea all all all
Voting for an idea low low all
Beating the deadline high all high
Documenting code all all high
Best practice all all high
Writing unit tests all all high
4.4. Sample Data
A simple prototype is developing at this time. The preliminary findings are encouraging. Table 4
contains some sample inputs to the EGS for demo purpose. These inputs drive the EPS based
rules mentioned in 4.3 and the 4.2.2 example.
Table 4. Inputs to the system
Attributes Examples
Project Name VCCST Enhancement
Project Description A demo to show how the EGS works
Domain of interest Software engineering
Team Info Cross-Cultural
Team Location Virtual
Countries USA, India, China
# of team members 20, 12, 18
# of analyst, developers, testers 4,12,4
SE Methodology Agile
8. 154 Computer Science & Information Technology (CS & IT)
The ESG will recommend a list of game mechanics and activities for the software project. Each
individual group is customized. The EGS collects statistics from the project for analysis. One of
the important tasks is to detect the flow zone for the software project team.
Table 5 shows a sample of the game statistics. The EGS uses the values from INV, MAS, UAI,
and the team cultural data to determine the initial ‘target %’ for the flow zone. As more project
data are stored and accumulated, the EGS can use the past data as reference and knowledge for
further ‘target %’ refinement and fine tuning. If the HCD recommend the activities, the ‘target
%’ for those activities will be higher than others.
Table 5. Sample game statistics
In Table 5, the ‘Hit %’ is calculated by ‘# of hits’ / ‘# of players’. In this sample data, there are 4
analysts, 12 developers, and 4 testers – a total of 20 players. The system assigns players to the
activities according to their roles. The system collects the games statistics including the number
of hits from each activity. The system compares the average ‘Hit %’ and the average ‘Target hit
%’ to determine the status of the flow zone. In Table 5, 47.94% is the average ‘Hit %’ and
75.59% for the average ‘Target hit %’. Since the average ‘Hit %’ is lower than the average
‘Target hit %’, the EGS will infer that the project team is not in a flow zone. The EGS will send
alerts to the system admins and project managers. They can choose to adjust the game
mechanics/activities and or make comments about the project. The project data will be stored and
served as reference and knowledge data for future projects. A SharePoint community site will be
used as a platform for collaboration, community, and data collection.
11. Computer Science & Information Technology (CS & IT) 157
Dr. LiGuo Huang
http://lyle.smu.edu/~lghuang/
Dr. LiGuo Huang Associate Professor, Department of Computer Science and
Engineering at the Southern Methodist University (SMU), Dallas, TX, USA. She
received both her Ph.D. and M.S. from the Computer Science Department and Center
for Systems and Software Engineering (CSSE) at the University of Southern California (USC). Her current
research focuses on mining and learning from systems and software engineering repositories, software
quality assurance and information dependability, process modelling, simulation and improvement,
stakeholder/value-based software engineering, and software metrics. Her research has been supported by
NSF, US Department of Defense (DoD) and NSA. She had been intensively involved in initiating the
research on stakeholder/value-based integration of systems and software engineering and published related
papers in IEEE Computer and IEEE Software.