0% found this document useful (0 votes)
8 views

Intelligent Algorithms in Software Engineering: Proceedings of the 9th Computer Science On-line Conference 2020, Volume 1 Radek Silhavy - Read the ebook online or download it to own the full content

The document provides information about various eBooks available for download at textbookfull.com, specifically focusing on proceedings from the Computer Science On-line Conference 2020 edited by Radek Silhavy. It highlights multiple volumes covering topics such as intelligent algorithms, applied informatics, and software engineering perspectives. The series aims to disseminate research results in intelligent systems and computing across diverse disciplines rapidly.

Uploaded by

miaotzoras
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Intelligent Algorithms in Software Engineering: Proceedings of the 9th Computer Science On-line Conference 2020, Volume 1 Radek Silhavy - Read the ebook online or download it to own the full content

The document provides information about various eBooks available for download at textbookfull.com, specifically focusing on proceedings from the Computer Science On-line Conference 2020 edited by Radek Silhavy. It highlights multiple volumes covering topics such as intelligent algorithms, applied informatics, and software engineering perspectives. The series aims to disseminate research results in intelligent systems and computing across diverse disciplines rapidly.

Uploaded by

miaotzoras
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

Explore the full ebook collection and download it now at textbookfull.

com

Intelligent Algorithms in Software Engineering:


Proceedings of the 9th Computer Science On-line
Conference 2020, Volume 1 Radek Silhavy

https://textbookfull.com/product/intelligent-algorithms-in-
software-engineering-proceedings-of-the-9th-computer-
science-on-line-conference-2020-volume-1-radek-silhavy/

OR CLICK HERE

DOWLOAD EBOOK

Browse and Get More Ebook Downloads Instantly at https://textbookfull.com


Click here to visit textbookfull.com and download textbook now
Your digital treasures (PDF, ePub, MOBI) await
Download instantly and pick your perfect format...

Read anywhere, anytime, on any device!

Applied Informatics and Cybernetics in Intelligent Systems


Proceedings of the 9th Computer Science On line Conference
2020 Volume 3 Radek Silhavy
https://textbookfull.com/product/applied-informatics-and-cybernetics-
in-intelligent-systems-proceedings-of-the-9th-computer-science-on-
line-conference-2020-volume-3-radek-silhavy/
textbookfull.com

Artificial Intelligence Methods in Intelligent Algorithms


Proceedings of 8th Computer Science On line Conference
2019 Vol 2 Radek Silhavy
https://textbookfull.com/product/artificial-intelligence-methods-in-
intelligent-algorithms-proceedings-of-8th-computer-science-on-line-
conference-2019-vol-2-radek-silhavy/
textbookfull.com

Artificial Intelligence and Bioinspired Computational


Methods Proceedings of the 9th Computer Science On line
Conference 2020 Vol 2 Radek Silhavy
https://textbookfull.com/product/artificial-intelligence-and-
bioinspired-computational-methods-proceedings-of-the-9th-computer-
science-on-line-conference-2020-vol-2-radek-silhavy/
textbookfull.com

Software Engineering Perspectives and Application in


Intelligent Systems Proceedings of the 5th Computer
Science On line Conference 2016 CSOC2016 Vol 2 1st Edition
Radek Silhavy
https://textbookfull.com/product/software-engineering-perspectives-
and-application-in-intelligent-systems-proceedings-of-the-5th-
computer-science-on-line-conference-2016-csoc2016-vol-2-1st-edition-
radek-silhavy/
textbookfull.com
Software Engineering Trends and Techniques in Intelligent
Systems Proceedings of the 6th Computer Science On line
Conference 2017 CSOC2017 Vol 3 1st Edition Radek Silhavy
https://textbookfull.com/product/software-engineering-trends-and-
techniques-in-intelligent-systems-proceedings-of-the-6th-computer-
science-on-line-conference-2017-csoc2017-vol-3-1st-edition-radek-
silhavy/
textbookfull.com

Software Engineering and Algorithms in Intelligent Systems


Radek Silhavy

https://textbookfull.com/product/software-engineering-and-algorithms-
in-intelligent-systems-radek-silhavy/

textbookfull.com

Software Engineering Perspectives in Intelligent Systems:


Proceedings of 4th Computational Methods in Systems and
Software 2020, Vol.1 Radek Silhavy
https://textbookfull.com/product/software-engineering-perspectives-in-
intelligent-systems-proceedings-of-4th-computational-methods-in-
systems-and-software-2020-vol-1-radek-silhavy/
textbookfull.com

Software Engineering Perspectives in Intelligent Systems:


Proceedings of 4th Computational Methods in Systems and
Software 2020, Vol.2 Radek Silhavy
https://textbookfull.com/product/software-engineering-perspectives-in-
intelligent-systems-proceedings-of-4th-computational-methods-in-
systems-and-software-2020-vol-2-radek-silhavy/
textbookfull.com

Cybernetics and Algorithms in Intelligent Systems Radek


Silhavy

https://textbookfull.com/product/cybernetics-and-algorithms-in-
intelligent-systems-radek-silhavy/

textbookfull.com
Advances in Intelligent Systems and Computing 1224

Radek Silhavy Editor

Intelligent
Algorithms
in Software
Engineering
Proceedings of the 9th Computer
Science On-line Conference 2020,
Volume 1
Advances in Intelligent Systems and Computing

Volume 1224

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156


Radek Silhavy
Editor

Intelligent Algorithms
in Software Engineering
Proceedings of the 9th Computer Science
On-line Conference 2020, Volume 1

123
Editor
Radek Silhavy
Faculty of Applied Informatics
Tomas Bata University in Zlín
Zlín, Czech Republic

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-3-030-51964-3 ISBN 978-3-030-51965-0 (eBook)
https://doi.org/10.1007/978-3-030-51965-0
© Springer Nature Switzerland AG 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

Software engineering research papers and topics are presented in this proceedings.
This proceedings is a Vol. 1 of the Computer Science On-line Conference. Papers in
this part discuss intelligent algorithms, application of machine and statistical
learning in the software engineering research.
This book constitutes the refereed proceedings of the Intelligent Algorithms in
Software Engineering section of the 9th Computer Science On-line Conference
2020 (CSOC 2020), held online in April 2020.
CSOC 2020 has received (all sections) more than 270 submissions from more
than 35 countries. More than 65% of accepted submissions were received from
Europe, 21% from Asia, 8% from Africa, 4% from America and 2% from Australia.
CSOC 2020 conference intends to provide an international forum for the dis-
cussion of the latest high-quality research results in all areas related to computer
science.
Computer Science On-line Conference is held online, and modern communi-
cation technology, which are broadly used, improves the traditional concept of
scientific conferences. It brings equal opportunity to participate for all researchers
around the world.
I believe that you find the following proceedings exciting and useful for your
research work.

April 2020 Radek Silhavy

v
Organization

Program Committee

Program Committee Chairs


Petr Silhavy Tomas Bata University in Zlin, Faculty
of Applied Informatics, Czech Republic
Radek Silhavy Tomas Bata University in Zlin, Faculty
of Applied Informatics, Czech Republic
Zdenka Prokopova Tomas Bata University in Zlin, Faculty
of Applied Informatics, Czech Republic
Roman Senkerik Tomas Bata University in Zlin, Faculty
of Applied Informatics, Czech Republic
Roman Prokop Tomas Bata University in Zlin, Faculty
of Applied Informatics, Czech Republic
Viacheslav Zelentsov Doctor of Engineering Sciences, Chief
Researcher of St.Petersburg Institute
for Informatics and Automation of Russian
Academy of Sciences (SPIIRAS), Russia
Roman Tsarev Department of Informatics, Siberian Federal
University, Krasnoyarsk, Russia

Program Committee Members


Boguslaw Cyganek Department of Computer Science, University
of Science and Technology, Krakow, Poland
Krzysztof Okarma Faculty of Electrical Engineering, West
Pomeranian University of Technology,
Szczecin, Poland
Monika Bakosova Institute of Information Engineering, Automation
and Mathematics, Slovak University
of Technology, Bratislava, Slovak Republic

vii
viii Organization

Pavel Vaclavek Faculty of Electrical Engineering


and Communication, Brno University
of Technology, Brno, Czech Republic
Miroslaw Ochodek Faculty of Computing, Poznan University
of Technology, Poznan, Poland
Olga Brovkina Global Change Research Centre Academy
of Science of the Czech Republic, Brno,
Czech Republic, and Mendel University
of Brno, Czech Republic
Elarbi Badidi College of Information Technology,
United Arab Emirates University, Al Ain,
United Arab Emirates
Luis Alberto Morales Rosales Head of the Master Program in Computer
Science, Superior Technological Institute
of Misantla, Mexico
Mariana Lobato Baes Superior Technological of Libres, Mexico
Abdessattar Chaâri Laboratory of Sciences and Techniques
of Automatic Control and Computer
Engineering, University of Sfax, Tunisian
Republic
Gopal Sakarkar Shri. Ramdeobaba College of Engineering
and Management, Republic of India
V. V. Krishna Maddinala GD Rungta College of Engineering
& Technology, Republic of India
Anand N. Khobragade Maharashtra Remote Sensing Applications
(Scientist) Centre, Republic of India
Abdallah Handoura Computer and Communication Laboratory,
Telecom Bretagne, France

Technical Program Committee Members


Ivo Bukovsky Roman Senkerik
Maciej Majewski Petr Silhavy
Miroslaw Ochodek Radek Silhavy
Bronislav Chramcov Jiri Vojtesek
Eric Afful Dazie Eva Volna
Michal Bliznak Janez Brest
Donald Davendra Ales Zamuda
Radim Farana Roman Prokop
Martin Kotyrba Boguslaw Cyganek
Erik Kral Krzysztof Okarma
David Malanik Monika Bakosova
Michal Pluhacek Pavel Vaclavek
Zdenka Prokopova Olga Brovkina
Martin Sysel Elarbi Badidi
Organization ix

Organizing Committee Chair


Radek Silhavy Tomas Bata University in Zlin, Faculty of
Applied Informatics,
email: [email protected]

Conference Organizer (Production)


Silhavy s.r.o.
Website: https://www.openpublish.eu
Email: [email protected]
Conference Website, Call for Papers
https://www.openpublish.eu
Contents

A Prescriptive Analytical Logic Model Incorporated with Analytic


Hierarchy Process for Software Application Error Analysis . . . . . . . . . 1
Hoo Meng Wong, Sagaya Sabestinal Amalathas, and Tatana Zitkova
Software Requirement in Iterative SDLC Model . . . . . . . . . . . . . . . . . . 26
Olatunji J. Okesola, Ayodele A. Adebiyi, Ayoade A. Owoade,
Oyetunde Adeaga, Oluseyi Adeyemi, and Isaac Odun-Ayo
Simplified Framework of Natural Language Processing
for Structure Management of Current-Age Data . . . . . . . . . . . . . . . . . . 35
J. Shruthi and Suma Swamy
Design and Software Implementation of Heuristic and Suboptimal
Strategies for the Mancala/Kalah Game . . . . . . . . . . . . . . . . . . . . . . . . . 44
Libor Pekař, Jiří Andrla, and Jan Dolinay
Sector-Selective Hybrid Scheme Facilitating Hardware
Supportability Over Image Compression . . . . . . . . . . . . . . . . . . . . . . . . 54
D. R. Premachand and U. Eranna
Performance Evaluation of Joint Rate-Distortion Model
of Video Codec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
S. K. Veena and K. Mahesh Rao
To Defeat DDoS Attacks in Cloud Computing Environment Using
Software Defined Networking (SDN) . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
B. N. Yuvaraju and M. Narender
Oriented Petri Nets as Means of Describing
a Human-Computer Interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Kamelia Shoilekova and Desislava Baeva
FPGA Based Transient Fault Generate and Fault Tolerant
for Asynchronous and Synchronous Circuits . . . . . . . . . . . . . . . . . . . . . 103
Y. N. Sharath Kumar and P. Dinesha

xi
xii Contents

Designing an Energy Efficient Routing for Subsystems Sensors


in Internet of Things Eco-System Using Distributed Approach . . . . . . . 111
G. N. Anil
The Compare of Solo Programming and Pair Programming
Strategies in a Scrum Team: A Multi-agent Simulation . . . . . . . . . . . . . 122
Zhe Wang
Fair Random Access with Track-Based SNR Scheduling
for Full-Duplex Wireless Powered Communication Networks . . . . . . . . 148
Xiaowa Yong and Inwhee Joe
A DTN Gateway-Based Architecture for Web Access
in Space Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Mwamba Kasongo Dahouda, Ducsun Lim, Kyungrak Lee, and Inwhee Joe
Multi-objective Scheduling Optimization for ETL Tasks
in Cluster Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Zhenxue Xu, Hui Li, Mei Chen, Zhenyu Dai, Huanjun Li, and Ming Zhu
An LSTM-Based Encoder-Decoder Model for State-of-Charge
Estimation of Lithium-Ion Batteries . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Shengmin Cui, Xiaowa Yong, Sanghwan Kim, Seokjoon Hong,
and Inwhee Joe
Analysis of Social Engineering Attacks Using Exploit Kits . . . . . . . . . . . 189
Tebogo Mokoena, Tranos Zuva, and Martin Appiah
Bipolar Disorder: A Pathway Towards Research Progress
in Identification and Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
K. A. Yashaswini and Shreyas Rao
Managing Electronic Waste with Recycling:
A Review of Developing and Developed Regions . . . . . . . . . . . . . . . . . . 215
Ramadile Moletsane
Trajectory Modeling in a Pursuit Problem
with Curvature Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
A. A. Dubanov
An Approach to Using Templates for Modeling Exceptions
in Terms of Petri Nets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
D. V. Leontev, D. I. Kharitonov, D. S. Odyakova, and R. V. Parakhin
PeBAO: A Performance Bottleneck Analysis and Optimization
Framework in Concurrent Environments . . . . . . . . . . . . . . . . . . . . . . . . 248
Di Chen, Hui Li, Mei Chen, Zhenyu Dai, Huanjun Li, Ming Zhu,
and Jian Zhang
Contents xiii

Matlab Code Generation and Consumption . . . . . . . . . . . . . . . . . . . . . . 261


Daniel Kuchár, Martin Bartoň, Peter Schreiber, and Pavol Tanuška
The Problem of Preventing the Development of Critical
Combinations of Events in Large-Scale Systems . . . . . . . . . . . . . . . . . . 274
A. S. Bogomolov, A. F. Rezchikov, V. A. Kushnikov, V. A. Ivashchenko,
T. E. Shulga, A. A. Samartsev, E. V. Kushnikova, E. V. Berdnova,
E. Yu. Kalikinskaya, and O. V. Kushnikov
Using Software Package “Multimeat-Expert” for Modeling
and Optimization of Composition Chopped Meat Product
with Vegetable Additive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Darya A. Kolpakova, Lilia V. Naimushina, Galina A. Gubanenko,
Tatyana V. Korbmakher, Irina D. Zykova, and Ekaterina A. Rechkina
Application of Machine Learning for Document Classification
and Processing in Adaptive Information Systems . . . . . . . . . . . . . . . . . . 291
Artem Obukhov and Mikhail Krasnyanskiy
SNR-Based TDMA Scheduling with Continuous Energy Transfer
for Wireless Powered Communication Networks . . . . . . . . . . . . . . . . . . 301
Deukgong Yoon and Inwhee Joe
Comparative Analysis of Software Development Life
Cycle Models (SDLC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Jide E. T. Akinsola, Afolakemi S. Ogunbanwo, Olatunji J. Okesola,
Isaac J. Odun-Ayo, Florence D. Ayegbusi, and Ayodele A. Adebiyi
Development Quantum Method of Image Recognition Using
Boundaries Selection and Transformation of a Quantum State . . . . . . . 323
Sergey Gushanskiy, Maxim Polenov, and Viktor Potapov
The Preparation of Graphic Models for a Virtual Reality
Application in Unity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Pavel Pokorný and Michal Birošík
An Application for Solving Truth Functions . . . . . . . . . . . . . . . . . . . . . 341
Pavel Pokorný and Daniel Ševčík
Factors Influencing Acceptance of Technology by Senior Citizens:
A Systematic Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Adibah Hanun Abu Seman, Rohiza Ahmad,
and Hitham Seddig Alhassan Alhussian
Modeling Business Process and Events . . . . . . . . . . . . . . . . . . . . . . . . . . 366
Sabah Al-Fedaghi and Majd Makdessi
xiv Contents

The Study of Optimization Method for Axisymmetric Aerodynamic


Profile in the Gas Flow by Using Evolutionary Algorithms . . . . . . . . . . 380
Nikolay Nikolaevich Chernov, Alexander Viktorovich Palii,
Vladimir Vladimirovich Ignatyev, Andrey Vladimirovich Kovalev,
Andrey Michailovich Maevskiy, and Aleksandr Viktorovich Maksimov
MicroPython as a Development Platform for IoT Applications . . . . . . . 388
Gabriel Gaspar, Peter Fabo, Michal Kuba, Juraj Dudak,
and Eduard Nemlaha
Cycle-Breaking Approach to Reduce Inconsistency
in Pairwise Comparisons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Vladimir Sudakov and Alexey Kurennykh
Statistical Analysis for Customer Product Reviews in Russian
Internet Segment Using Text Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Polina Tuchkova and Vadim Sufiyanov
Methodology for Job Advertisements Analysis in the Labor Market
in Metropolitan Cities: The Case Study of the Capital of Russia . . . . . . 413
Eugene Pitukhin, Marina Astafyeva, and Irina Astafyeva
Constructing a Learner Model Based on the Latent Cognitive
Structure of an Online Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Igor Nekhaev, Ilya Zhuykov, and Artyom Illarionov
Coarse-Grained vs. Fine-Grained Lithuanian Dependency Parsing . . . . 450
Jurgita Kapočiūtė-Dzikienė and Robertas Damaševičius
Eye-Tracking Study of Direction Influence of User’s Attention
for Intelligence System Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Veronika Ander, Petr Cihelka, Jan Tyrychtr, Tomáš Benda,
Hana Vostrá Vydrová, and Dana Klimešová
Parallel Algorithm for K-Means Clustering in Wood
Species Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
P. H. Gunawan and Taufik Fathurahman
Synthesis of Fuzzy Algorithms Controlling the Temperature
of the Polymer in the Extruder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484
V. I. Bozhko, E. V. Naumenko, V. F. Kornyushko, and R. R. Biglov
Search-Based Wrapper Feature Selection Methods in Software
Defect Prediction: An Empirical Analysis . . . . . . . . . . . . . . . . . . . . . . . 492
Abdullateef O. Balogun, Shuib Basri, Said A. Jadid,
Saipunidzam Mahamad, Malek A. Al-momani, Amos O. Bajeh,
and Ammar K. Alazzawi
Development of a Method for Modeling Entangled Quantum
Computations Applicable in the Simon’s Quantum Algorithm . . . . . . . . 504
Gorbunov Alexander, Sergey Gushanskiy, and Viktor Potapov
Contents xv

Development of the Architecture of the System for Detecting


Objects in Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
Sergey Smagin and Ilya Manzhula
Algorithmic and Software Support for Technological
Decision-Making in the Process of Induction Soldering . . . . . . . . . . . . . 521
Anton Milov, Vadim Tynchenko, Vyacheslav Petrenko,
and Sergei Kurashkin
Automated Extraction of Paradigmatic Relationships
from Natural Language Texts on the Basis of the Complex
of Heterogeneous Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
V. V. Dikovitsky and M. G. Shishaev
HNM: Hexagonal Network Model for Comprehensive Smart City
Management in Internet-of-Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
Eisha Akanksha
Multicriteria Model for Evaluation of Outsourcing Services
by Logistics Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
Marcelo Crispim Salazar, Placido Rogério Pinheiro,
and Isaura Cardoso Cavalcante de Castro
A Proposal of Kubernetes Scheduler Using Machine-Learning
on CPU/GPU Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Ishak Harichane, Sid Ahmed Makhlouf, and Ghalem Belalem
Integration of the MATLAB System and the Object-Oriented
Programming System C# Based on the Microsoft COM Interface
for Solving Computational and Graphic Tasks . . . . . . . . . . . . . . . . . . . 581
Sergey Adadurov, Yulia Fomenko, Anatoly Khomonenko,
and Alexander Krasnovidov
The Heterogeneities Elimination in the Process of Data Insertion
Procedures Creation in Structure-Independent Databases . . . . . . . . . . . 590
Andrey Grishchenko, Yury Rogozov, and Sergey Kucherov
Paidagogos S.G.: Development and Programming of the Serious
Game Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
Marián Hosťovecký, Miroslav Ölvecký, and Katarína Pribilová
Some Methods for Constructing Solution Generators of a Search
Method in the State Space for Declaring Logical Tasks . . . . . . . . . . . . . 605
Olga N. Polovikova, Alexander V. Zharikov, Larisa L. Smolyakova,
and Tanya V. Mikheeva

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619


A Prescriptive Analytical Logic Model
Incorporated with Analytic Hierarchy Process
for Software Application Error Analysis

Hoo Meng Wong1(B) , Sagaya Sabestinal Amalathas1 , and Tatana Zitkova2


1 Taylor’s University, Subang Jaya, Selangor, Malaysia
[email protected]
2 Prague, Czech Republic

Abstract. Software application is still playing an important role in today’s busi-


ness operation. However, the software application error can arise either within the
software application layer or due to any other factor outside the software applica-
tion layer. The root cause analysis activity becomes much more time consuming
to identify the valid error. With that, it arises the problem statement that the dura-
tion of root cause analysis on software application error carries crucial impact to
the service restoration. The objective of this proposed logic model is to conduct
decision making process to identify the valid software application error. This logic
model consists of the algorithm to carry various important processes include the
identification of the root cause in a more accurate manner, and shorten the duration
of root cause analysis activity. The design of Analytic Hierarchy Process (AHP)
hierarchy will depend on the software application errors and other involved errors
found from different layers. As these errors become the participants, they can be
grouped further based on the error categories. Once the hierarchy is constructed,
the participants analyze it through a series of pairwise comparisons that derive
numerical scales of measurement for the nodes. The priorities are associated with
the nodes, and the nodes carry weights of the criteria or alternatives. By the pri-
ority, the valid error and the preferred resolution can be decided. Indeed many
past researches in AHP had been published, however there is a knowledge gap
of AHP in software application error analysis. Therefore this Prescriptive Ana-
lytical Logic Model (PAL) incorporates with AHP into the proposed algorithm is
required. At the end this logic model contributes a new knowledge in the area of
log file analysis to shorten the total time spent on root cause analysis activity.

Keywords: Analytic hierarchy process · Application log file analysis ·


Application log file debugging · Machine learning

1 Introduction

Business companies adopt Information Technology (IT) as a strategic enabler to sustain


their business operations. When the software application becomes crucial for processing
the business transactions, it has lower toleration for downtime expected by the company

© Springer Nature Switzerland AG 2020


R. Silhavy (Ed.): CSOC 2020, AISC 1224, pp. 1–25, 2020.
https://doi.org/10.1007/978-3-030-51965-0_1
2 H. M. Wong et al.

management. This was clearly supported by Labels: Data Center, Downtime, www.
evolven.com (2014), and indeed software application downtime can cause the business
operation ceased. Business company has option that it can run an IT production support
team to provide support service to whichever business-as-usual (BAU) system running
in the organization. Another option is that it can engage service provider to provide the
same IT support service. Regardless whichever option is chosen, the time spent on con-
ducting root cause analysis on software application error is crucial. Without accurately
identifying the valid error, it creates impact to the service restoration to the software
application.
As of the fact, identifying the root cause of the software application error is crucial
before the resolution is decided and deployed into production environment. There are
several required actions in the root cause analysis activity. These actions are:-

i. Collecting related information from different log files.


ii. Selecting the related log events based on the time event when software application
error occurred.

Most of the time, collecting input information for root cause analysis is time con-
suming. This statement is supported by Management Logic (2012) stated that “The most
time consuming aspect of Root Cause Analysis (RCA). Practitioners must gather the all
the evidence to fully understand the incident or failure.”. On the other hand, Horvath
(2015) had also pointed out that “While the analysis itself can be time-consuming, the
chance to mitigate or eliminate the root causes of several recurring problems/ problem
patterns is definitely worth the effort.”. Hence, it is crucial to look for an efficient method
to reduce the prolonging time at the root cause analysis activity.
Generally, each software application has its built-in event logging ability. The pur-
pose of this event logging records the information of what activity is carried out or
even what incident is occurred at that exact time. This information includes appropriate
debugging information, and later the same information can be analyzed for software
application root cause analysis purpose. The concern raised to the required information
logging is that how much logging information is accepted as sufficient for software
application root cause analysis. In addition, what is the appropriate category for the
logging event such as information, error, debug, and fatal should be fetched as the input
information to the root cause analysis activity. In the situation that if the extensive event
logging level is enabled, this can lead to excessive logging information generated. With
that, there are two issues raised.

i. The first issue is that, the performance of software application is reduced by


comparing with before and after extensive event logging option is enabled.
ii. The second issue is that, the manual analysis activity is becoming much more difficult
and even tedious to identify the root cause of the software application error.

Therefore, in the software application development process, it is a great concern on


how much detail event logging should be logged into the log file. At the same time, the
event logging must mitigate the performance impact created to the software application.
These mentioned concerns had also been highlighted by Loggly (2017) and Panda (2011).
A Prescriptive Analytical Logic Model Incorporated 3

As per the following Fig. 1, Operating System communicates between software


application and assigned resources (such as CPU, Memory, Network, and Hard Disk)
on the virtual machine. Software application has to interact with Operating System
to obtain allocated server resources to handle software application processing. This is
because software application has high dependency on server resources to carry out its
execution. Without the server resources, software application cannot execute itself at the
software application layer. Further more, software application requires to communicate
to its database server through the Local Area Network (LAN) for retrieving and updating
software application data.

Fig. 1. Software Application is required sufficient server resources to execute all its functionality.

To identify the root cause of software application error, it can be prolong under the
following challenges.

i. Software application log is hard to be understand.


ii. Error is occurred beyond software application layer, such as Operating System,
Network, and Database layers. Software application log alone is insufficient to
identify the actual error.
iii. IT support personnel has insufficient knowledge and experience in performing
analysis.
iv. Root cause analysis is conducted manually, crucial information is overlooked.
v. Historical error events are taking even longer time to be located.

With all the mentioned concerns and scenarios, by depending software application
log file alone is not sufficient to conduct software application root cause analysis when-
ever error is occurred beyond the software application layer. Hence a proposed research
is required for establishing a prescriptive analytical logic model. This proposed logic
4 H. M. Wong et al.

model incorporated the proposed algorithm to conduct the root cause analysis activity. It
must target to increase the accuracy for error identification, and to reduce the prolonging
time spent on the duration of root cause analysis. Therefore, this is a good potential to
contribute new knowledge to the software application analysis.

2 Significant of the Study


The proposed research is not focusing on the time spent of developing the resolution. This
is because if the valid error is not identified accurately, then it is very high chances that
the resolution may not resolve the real issue. Therefore, the ultimate focus must fall on
the root cause analysis and how fast the valid can be identified during the analysis activity
is crucial. By reducing the prolonging time spent on root cause analysis, and improving
the accuracy of identifying valid software application error. It can resume the software
application service to the users in a shorter total time taken. This is because with today’s
rapid business competitive world, time consuming on analysis and trouble-shooting
activities is unacceptable. Furthermore, it is a continuous battle for the IT support to face
day-to-day software application error challenge in order to provide reliable up-time for
the software application utilized in the business organization. On the other hand, business
companies must still continue to utilize their existing software applications (without
incur any additional operation budget). At the same time, it must continue to allow the
companies to save the investment budget on spending the capital amount to replace all
or partial of the software applications. Without introduces any new software application,
companies can avoid to re-train their users on using the new software applications.
This propose logic model brings the above benefits to business companies which are
using software application for their daily operations crucially. The objective is to get the
valid error fixed and to mitigate any same error re-occurrence in the near future. Over
the years there were various researches had been done at this area such as consolidate
the logs or integrate the logs for analysis. In fact, there had been very few attempts to
propose an algorithm on root cause analysis beyond the software application layer. To
support this, Valdman (2001) had showed more detailed log file analysis by comparing
the past published techniques whereas other studies were only indicated intentions or
suggestions. Moreover, there is no attempt to incorporate Analytic Hierarchy Process
(AHP) for decision making on valid software application error. This can be supported by
Vaidya and Kumar (2004) that they had reviewed Analytic Hierarchy Process (AHP) with
150 application papers in total. There is no knowledge in applying AHP on identifying
valid error. Hence, this is a great potential in this research which brings contribution to
business intelligent studies.

3 Motivations
There are three major motivations trigger the statement of problem.
The 1st Motivation
With the software application error log file alone, it may not be adequate for analysis to
identify the root cause of software application error if the cause is outside the software
application layer. The impacts are shown along with the involved components.
A Prescriptive Analytical Logic Model Incorporated 5

Environment Impact
Infrastructure Layer.

i. Operating System fails and running unstable.


ii. Network Communication fails.

Software Application Layer.

i. Software Application Defect.


ii. Web Service fails.
iii. Messaging Queue is full.
iv. Backend agents are not processing the data in the Messaging Queue.
v. Database is not responding.

Equipment Impact
Insufficient of server resources such as CPU, Memory, Disk, Network Card
Bandwidth.
The 2nd Motivation
Time consuming to read through the software application log file manually during
root cause analysis activity. The impacts are shown along with the supporting points.
Management Impact

i. Software applications cannot afford to have downtime as it can impact the business
operation.
ii. High expectation on software application support team by the management to resume
software application service when software application service or certain functions
are unavailable.

People Impact
The time spent on analyzing the software application error manually will be longer if
the input information is taking longer time to analyze before the valid root cause is
identified.
The 3rd Motivation
The root cause analysis activity is conducted by human, it is very subjective to the
person would make a right or wrong judgment on the software application error. The
impact is shown along with the supporting point.
People Impact (Different from the 2nd Motivation)
Experience, Knowledge, Skill - Any wrong judgment on the valid software application
error would lead to a wrong direction to create a useless resolution and eventually end
up with wasting effort and time to fix a wrong software application error.
This has derived the following fish bone diagram to illustrate all the involved impacts
(Fig. 2).
The fish bone diagram illustrates that it has four major impacts contributed to
the statement of problem. These impacts are Management, People, Environment and
Equipment.
6 H. M. Wong et al.

Fig. 2. Fish bone diagram to illustrate issues contributed to the software application malfunction-
ing.

• Management is always looking for effective outcome as they have sat a big amount
as part of the yearly budge of the year to the software application support team
department.
• People is mainly referring to the support team member’s capability whether the person
is capable to analyze the software application error, or even whether the person is able
to work under pressure.
• Environment consists of infrastructure and software application layers. The issues
happened in Environment can lead to the statement of problem would be far more
complicated and hard to identify the root cause of the error, because of the complexity
of the software application running in a multiple tier environment.
• Lastly is the Equipment that is referring to insufficient of server resources will also
lead to the statement of problem.

4 Statement of Problem

The time duration of root cause analysis conducted on software application error carries
crucial impact to the service restoration of business operation.
Explanation: The total time taken to resolve the software application error consists of the
duration for conducting the root cause analysis activity, and the duration for applying the
resolution. The solution may or may not involve the Software Development Life Cycle
(SDLC) activity for developing the fix by depending on the requirements of the fix. The
proposed resolution is focusing on shorten the time consumption on conducting the root
cause analysis activity.
A Prescriptive Analytical Logic Model Incorporated 7

5 Research Objectives
(1) To mitigate prolonging time duration on conducting root cause analysis activity.
(2) To improve accuracy on identifying the root cause whenever error is occurred.

There are different perspectives derived from the two primary objectives and it
is required to be listed down for determination. The points from the three different
perspective are shown as follows:-
Business Perspective

i. To reduce the entire duration of software application downtime by efficiently


identifying the software application root cause.
ii. To mitigate the possibility of re-occurrence on the same software application error.
iii. To bring down the total software application downtime percentage in a financial
year.

Technical Perspective

i. To mitigate prolonging on conducting root cause analysis activity.


ii. To improve accuracy on identifying the software application error’s root cause.
iii. To build experience based on past analyzed result and resolution activities stored.

Knowledge Contribution Perspective

i. To contribute new knowledge on software application error analysis by using Analytic


Hierarchy Process (AHP).

6 Literature Review
According to the past research, Stewart (2012) is focusing on debugging real-time soft-
ware application error using logic analyzer debug macros, whereby Eick et al. (1994)
they are focusing on presenting the error logs in a readable manner. Moreover, Wendy
and Dolores (1993) suggested to focus on error detection in software application at the
time of software development and maintenance. However, Salfner and Tschirpke (2015)
are focusing on analyzing error logs by applying the proposed algorithms in order to
predict future failure. Their software application error analysis approaches focus on soft-
ware application error log obtained from software application database. Some literature
suggested that the software application error analysis would be better if it is built in dur-
ing the software development process. This approach is still within the same application
development boundary without factoring in any other area of concerns. It can cause the
software application failure. In another way of explanation, whenever hardware CPU and
memory utilization is running high, or even storage disk space is running low, software
application logging may not be accurate anymore. Hence, the root cause analysis would
not be accurate to identify the real issue to understand the main reason to cause the soft-
ware application failure. Murínová (2015) had attempted to integrate multiple log files
8 H. M. Wong et al.

from various software monitoring tool and network devices for better root cause analysis
on Web application error. However, there is no proposed model stated in the research.
Even until Landauer et al. (2018), they introduced an unsupervised cluster evolution
approach that is a self-learning algorithm that detects anomalies in terms of conducting
log file analysis. However, this approach is under machine learning rather than AHP.
From a different point of view, this approach is good because it can be adopted into the
proposed model to detect the software application error. Hence, this is a great potential
to propose a logic model to research a new approach towards developing an algorithm
for software application error analysis. At the same time to contribute new knowledge
in the area of software application root cause analysis using AHP. By comparing the
above secondary data with the proposed logic model, it can be noticed that the focus
boundary on software application analysis. The technique to identify the root cause of
software application is different. They focus on software application boundary whereby
the proposed model focuses horizontally on all possible boundaries. In addition, due to
the focus boundary is different, it leads to the technique to identify the root cause of
software application also different.
On the other hand, there is a valid question such that why the PAL does not incorporate
Machine Learning instead. According to Klass (2018), the simple definition of Machine
Learning is that the algorithm in an IT system has the ability to independently find
solutions to problems by recognizing patterns in databases. Which means, the required
data must be fed into the IT system and processed under the algorithm in advance in
order to recognize the patterns in the data stock with the predefined definitions. Lastly,
the IT system must also contain the following unique abilities as the requirements, which
are:-

i. To find, to extract and to summarize the relevant data.


ii. To make predictions based on the analysis data.
iii. To calculate probabilities for specific results.
iv. To adapt to certain developments autonomously.
v. To optimize processes based on recognized patterns.

By referencing to the definition and requirements of Machine Learning, and com-


paring to PAL. PAL does not have the full abilities like Machine Learning but it has only
partial unique abilities. Such as i and v. PAL has the algorithm to make decision over
the valid error and preferred resolution targeted to the valid error. On the other hand,
PAL has the ability to pick up the uncommon error, and provide suggested actions based
on the analysis result across multiple log files at the time of software application error
occurred. Although at the beginning stage, human is involved to respond to the uncom-
mon error. Even the human may require to perform fine tuning to the configuration file
of the PAL for better handling the uncommon error. PAL will still improve itself from
event by event to recognize the uncommon errors and turn them to become known errors
to PAL.
The following table provides the feature comparison between Machine Learning and
PAL (Table 1).
Machine Learning is required to scan through the entire database and pick up the
data based on the recognized patterns. With the recognized patterns, it then applies its
A Prescriptive Analytical Logic Model Incorporated 9

Table 1. The feature comparison between Machine Learning and PAL.

Activity no. Machine learning PAL


1 Defined algorithm Defined algorithm
2 Recognizing patterns in databases Recognizing patterns in log files
3 To find, to extract and to summarize the To find, to extract and to summarize the
relevant data relevant log events based on error event
occurring timing
4 To make predictions based on the Optional feature for future works
analysis data
5 To calculate probabilities for specific Not available
results
6 To adapt to certain developments Not available
autonomously
7 To optimize processes based on To optimize root cause analysis after
recognized patterns successfully recognizing uncommon
error becoming known error along with
preferred resolution

unique abilities. However, by comparing Machine Learning with PAL, there are certainly
differences.
The primary objective of PAL is to mitigate prolonging on conducting root cause
analysis activity. Hence, to eliminate unnecessary log scanning activities must be avoid-
able during the root cause analysis. Indeed to fulfill the primary objective, the following
approaches of PAL are proposed as follows:-

• Using the “time” of software application error event when it occurred as the key to
extract out log events from all the related logs.
• Extract only the exact amount of input information is important. Then, scan the error
only from the extracted amount of log rows.
• Standard error events are easily classified based on keyword, except for those unknown
error events.
• The PAL’s standard analysis module does the specific action based on the specific
error event occurred.
• The PAL’s analysis activity is based on the configurations of “Standard” and “Com-
plex” analysis modules together with the studies of past analysis and applied resolution
retrieved from the proposed model’s knowledge-based database.
• The situation can be happened such as more than one possible resolution is applicable
to resolve the identified root cause. Decision making is required.
• All the current analysis activities and resolution steps will be stored into a knowledge-
based database for the future reference.
• PAL is trained by the real data sponsored by SRM, IBM.
10 H. M. Wong et al.

Based on the given primary objective of PAL, and along with the proposed
approaches. The detail feature differences between Machine Learning and PAL can
be further compared into the following Table 2.
With the comparisons, although PAL has certain similarities comparing with
Machine Learning. However, the primary objective and approaches are different. There-
fore, PAL cannot be categorized to have Machine Learning intelligent, but it has the
ability to make decision using AHP approach to fulfill the research objective, i.e. to
mitigate prolonging on conducting root cause analysis activity. Indeed, the proposed
algorithm in PAL is aiming to handle ad-hoc error with immediate action rather than
spending longer time to recognize the error pattern or to perform error prediction.

7 Research Proposed

With a server (regardless it is physical or virtual) box, you have multiple layers. Most
common logs that are required is:-

i. System monitoring log for server resources such as CPU, Memory and Hard Disk
usage.
ii. Network monitoring log for the server such as network communication within the
Local Area Network (LAN).
iii. Operating System event log for server.

The illustration of multiple layers for a server can be referred to Fig. 1.


On the other hand, the software application especially for those that are rated at
enterprise level category, it involves multiple tiers such as Web Client tier, Web Container
tier, Application Container tier, and Database tier. Beside the Wen Client tier, each tier
has its own log file. Certain tiers are even having multiple log files based on the software
application design. Hence, the proposed research is to develop an algorithm towards
to a prescriptive analytical logic model for analyzing software application error. The
analysis is based on the logs retrieved from various software applications by referring
to the following figure.

7.1 Proposed Research Scope

The proposed scope of this research is to define the algorithm. The algorithm consists of
simple and complex analysis inside the prescriptive analytical logic model for software
application error analysis. Therefore, by having the proposed logic model in the pro-
duction environment, the logic model is required to react to software application error
when the error is detected in the software application log file. With this logic model, it
is also required to retrieve other related log files through various software applications
shown as Fig. 3. The proposed algorithm mainly consists of two analysis areas, which
are simple and complex analysis to form a prescriptive analytical logic.
A Prescriptive Analytical Logic Model Incorporated 11

Table 2. The detail feature differences between Machine Learning and PAL.

Activity no. Machine learning PAL


1 Scan the entire database and pick up the a. Use exact “time” of software
data based on the recognized patterns application error event when it
occurred as the key to extract out log
events from all the related logs based
on 5-min-before-and-after rule
b. Extract only the exact amount of
input information is important.
Then, scan the error only from the
extracted amount of log rowsc.
c. Standard error events are easily
classified based on keyword stored
in the configuration file, except for
those unknown error events
2 To find, to extract and to summarize the d. Root cause analysis is conducted
relevant data based on the configurations of
“Standard” and “Complex” analysis
modules together with the studies of
past analysis and applied resolution
retrieved from the proposed model’s
knowledge-based database
e. For “Standard” error first time
occurrence, resolution steps are
applied based on the “Standard”
analysis module
f. For “Standard” error re-occurrence,
resolution steps are applied based on
the “Complex” analysis module
g. For “Complex” error (or
undetermined error), the decision of
either applying resolution steps or
producing analysis report are carried
out based on the predefined
configurations stored in the
configuration file
3 To optimize processes based on h. All the current analysis activities
recognized patterns and resolution steps will be stored
into a knowledge-based database for
the future reference
i. The information stored inside the
knowledge-based database is served
as one of the input information of
“Complex” analysis module
12 H. M. Wong et al.

Fig. 3. The proposed software application analysis algorithm will analyze across multiple
databases.

7.2 Proposed Simple Analysis


For simple analysis area, it is required to build the predefined logic to handle the com-
mon software application error, whereby this model is to guide the system builder on
answering a set of predefined questions on common software application errors and carry
out the predefined activities only react to these common software application error, for
example, restarting the software application process if it is stopped.

7.3 Proposed Complex Analysis


For complex analysis area, it is required to build a logic which collects necessary log
events as data from the involved software applications. The collected data will serve as
input information at the initial stage. With the collected data, this model will base on
the past incidents determined as the system behavior. By combined with the predefined
templates, the automated analysis activities will be triggered and finally generate the
analysis outcome along with the suggested resolution steps and action to the IT support
team. This complex analysis would have three different modes which are “manual”,
“semi-auto” and “fully-auto” offered to the IT support team. As for the complex analysis
A Prescriptive Analytical Logic Model Incorporated 13

area, by predicting the software application behavior, it performs the suggested steps
and carry out the action against the software application error based on the analysis.
This will prevent future application failure based on the permission given to the offered
mode by the IT support team.
By focusing into the re-occur software application errors, these errors occur in a
specific pattern or feature, and the solution is often straight forward (can be applied after
validating the specific pattern or feature) to resolve the incidents. The human involvement
on this type of incidents would require less analysis but more on validating activities.
Hence if the validating activities can be predefined into a checklist, the logic model can
pick up the ultimate predefined solution and react to the incident automatically. This can
be achieved by the combination of the answers (yield from the validating activities in
the checklist). This would be the preferred method in the logic model that handles the
common software application incidents. We call this logic as simple analysis. The same
simple analysis logic can be applied to manage Server (a physical or virtual box running
a vendor Operating System) or even Networking devices (such as switch or router) if
they have incidents occur in the specific pattern or feature.
The software application errors which have no uniform pattern or feature, for this
type of software application errors. The percentage of human involvement is high. This is
because the person who handles the incident requires to obtain the software application
log files and to search any similar error logged in the past. We call these files and
records as input information. With the input information obtained, the person conducts
the analysis activities before the person can identify the software application error root
cause. Only the preferred resolution steps is agreed then it is applied to resolve the
software application error.
For the first time occurring software application error. If both yielding input infor-
mation activities and analysis activities can be automated. Base on the outcome of the
analysis activities, human expects to see a list down of each possible root cause along
with the proposed resolution steps in a complete list. Then, the decision is on the per-
son to choose which is the preferred option. If the person chooses to proceed with the
suggested resolution steps, then the person will receive the final question. The question
is expecting the response from the person, whether agrees to let the automated activities
execute the same suggested resolution steps automatically in the future if the same inci-
dent occurs again. Of course, this logic has the ability to handle unpredictable software
application errors by performing simulated analysis activities comparing with human,
we call this logic as complex analysis.
Whenever the complex analysis is triggered. It will pull the related logs based on
specific time frame (duration) before and during the software application failure from
various application logs. These logs are:-

i. Software Application logs is the beginning to trigger the root cause analysis,
ii. Configuration management logs is for understanding any recent applied software
application patches or Operating System patches,
iii. Performing and capacity monitoring logs is for identifying any hardware resources
running insufficient, and
iv. Production support ticketing tool logs is for cross-checking any related issue recently
occurred under the predefined database scheme.
14 H. M. Wong et al.

These above logs as input information will be utilized crucially for root cause analysis
to resolve the software application issue.
Indeed, the simple analysis can be existed independently at the initial stage. How-
ever, when the specific number of reoccur incidents hits. The complex analysis will be
activated to perform the required analysis activities automatically. It will produce the
complete analysis report and suggestion(s). Base on this suggested design, the complex
analysis would have a loosely but it is fairly important relationship with the simple
analysis. This is because the complex analysis needs to understand how many times the
simple analysis has handled the same incidents in the past. This information is crucial
to make a decision on suggesting the reasonable resolution steps to the human after the
complex analysis produces the analysis report.

7.4 Proposed Algorithm, Architecture Design, and Solution Modeling


The proposed algorithm under the Prescriptive Analytical Logic Model includes the
crucial activities in the following Table 3.

Table 3. The proposed process activity under proposed algorithm.

No. Algorithm
1 with the granted permission, retrieve and/or integrate various log files obtained from all
involved software application log files/databases
2 Identify whether the newly reported software application error is first time occurrence or
re-occurrence by cross-checking the database which is associated to the prescriptive
analytical logic
3 Identify possible log data and select the necessary log data for analysis under the defined
software application error classification
4 Allocate weight to each possible software application error based on Analytic hierarchy
process (AHP)
5 Shortlist the software application error under the highest weight
6 Analyze the selected log data for shortlisted software application errors and define
possible resolution option
7 Allocate weight to each possible resolution option based on AHP
8 Shortlist the preferred resolution option under the highest weight
9 Deploy the preferred resolution option to fix the software application error under the
predefined condition
10 Store the analysis result and resolution action into a database which is associated to the
prescriptive analytical logic for future reference and knowledge base activities

The architectural design of the PAL is derived from the proposed algorithm and the
Fig. 4 is shown as follows:-
The PAL algorithm design consists of simple and complex analysis design, proposed
analytic hierarchy process design and knowledge based database design. From the simple
A Prescriptive Analytical Logic Model Incorporated 15

Fig. 4. The architecture design of prescriptive analytical logic model.

and complex analysis design, it further derives to top-down and bottom up design. All of
these designs will form PAL algorithm design as the complete model design. The PAL
consists of two configuration files that are the brain of the PAL to identify the known
errors and the action of the preferred resolution. This can be explained bu using the
process flow design of PAL (Fig. 5).
The process flow design of PAL:-
The Process Flow Design explains the use of the configuration files (first and second)
during the execution of the PAL. First configuration file is for error cross-reference
and the second configuration file is for carrying out the preferred action based on the
recognized error. The entire flow is explained as follows:-
Process 1
Use any existing market approach to detect Software Application error. This is because
the PAL should not re-invent the wheel. It should utilize the existing available approach
from the market for software application detection.
Process 2
Validate the new found Software Application error (Cross check with the first Configu-
ration file). The first configuration file contains the information regarding to the involved
software application, databases, and the knowledge based database.

• Based on the date and time of the new found Software Application error, PAL extracts
the events from the involved software application and databases to form a dataset.
• Then, based on the new found software application error as well as any error found
in the dataset as per the given date and time, PAL can cross-reference from the first
configuration file to identify out whether it is a new error or known error. Which
means, PAL will require to map out any error defined in the first configuration file.
• Based on the defined error to identify the new found error is actually a known error
in either an Alert, Warning or Valid Error category, or it is unidentified and really a
new found error.
Exploring the Variety of Random
Documents with Different Content
Private Maurace R. Bolton, Canadian Infantry, son of Mr. William
Bolton, Town Head Cottages, Low Bentham, killed in action 8th
March, 1916. Aged 25 years.

Trooper Luke Ellison, Scottish Horse, son of Mr. Walter Ellison,


Ermysted Street, Skipton, died in training at Aldershot 26th March,
1916. Aged 19 years.
Corporal Arthur Hale, Royal Berks. Regt., son of Mr. S. P. Hale, 25,
Pendle Street, Skipton, killed in action 31st March, 1916.

Private H. Leach, Duke of Well.’s Regt., of Addingham, died of wounds


2nd March, 1916. Aged 38 years.
Lance-Corporal Charles Russell, West Yorks. Regt., son of Mr. E. H.
Russell, Station Master, Hellifield, killed in action March, 1916. Aged
24 years.

Sergeant George Sanderson, Duke of Well.’s Regt., son of Mrs.


Sanderson, Croft Head Terrace, Glusburn, killed in action 2nd March,
1916. Aged 26 years.
Private Ben Townson, Duke of Well.’s Regt., of Addingham, killed in
action 2nd March, 1916. Aged 27 years.

Lance-Cpl. H. Marsden Walton, Coldstream Guards, son of Mr. Charles


Walton, Settle, presumed dead March, 1916.
Private Jerome Barrett, Duke of Well.’s Regt., of Skipton, killed in
action 26th April, 1916. Aged 28 years.

Corporal Ernest Brown, Cheshire Regt., of Barnoldswick, killed in


action 6th April, 1916. Aged 33 years.
Private Alfred Baldwin, East Lancs. Regt., son of Mrs. Baldwin, 3,
Bessie Street, Barnoldswick, officially presumed killed in
Mesopotamia 9th April, 1916. Aged 36 years.

Private Arthur Hudson, Canadian Corps, son of the late Mr.


Marmaduke Hudson, Brook St., Skipton, killed in action April, 1916.
Private J. W. Hawkins, Duke of Well.’s Regt., of Broughton Road,
Skipton, died of wounds 25th April, 1916. Aged 34 years.

Private Robert Heaps, East Lancs. Regt., of 86, Rainhall Road,


Barnoldswick, killed in action with Indian Exp. Force 19th April,
1916. Aged 28 years.
Private Joseph R. Lord, King’s Own Royal Lancs. Regt., son of Mrs.
Lord, 66, Reedley Avenue, Nelson, and a native of Settle, presumed
dead, April, 1916.

Corporal Charles William Luff, Duke of Well.’s Regt., of Gargrave,


killed in action 26th April, 1916.
Private John Lang, Seaforth Highlanders, of 55, Red Lion Street,
Earby, killed in action in the Persian Gulf 20th April, 1916. Aged 24
years.

Private George Leatt, South African Corps, son of Mr. George Leatt,
Pendle Street, Skipton, died of Fever in South Africa 28th April,
1916. Aged 33 years.
Private Thomas Leatt, Berks. Regt., son of Mr. & Mrs. George Leatt,
Pendle Street, Skipton, killed in action April, 1916.

Private Dennis J. Nixon, Dorset Regt., of King St., Barnoldswick, killed


in action in Mesopotamia 22nd April, 1916. Aged 39 years.
Private Sam Naylor, Indian Exp. Force, son of Mr. George Naylor,
formerly of Gargrave, killed in action with the relief force to Kut,
April, 1916.

Private W. Pickover, Duke of Well.’s Regt., of Shuttleworth Street,


Earby, killed in action April, 1916.
Regt. Sergt.-Major John Parker, D.C.M., Manchester Regt., son of the
late Mr. James Parker, Ribble Terrace, Settle, died at Farnborough
April, 1916. Aged 40 years.

Private Frank Thompson, York & Lancs. Regt., son of Mr. & Mrs.
Richmond Thompson, Harding House, Crosshills, died as the result
of a motor car accident in France 10th April, 1916.
Rifleman Harry Thornton, King’s Royal Rifles, of Barnoldswick, died of
wounds 30th April, 1916. Aged 20 years.

Private Fred Fisher, Duke of Well’s Regt., son of Mr. T. Fisher, 20,
Bolton Road. Addingham, died of wounds 5th May, 1916. Aged 21
years.
Rifleman Frederick Ryder, King’s Royal Rifles, formerly of Addingham,
presumed killed May, 1916. Aged 26 years.

Private Thomas W. Shuttleworth, West Yorks. Regt., of Crosshills, killed


in action 2nd May, 1916. Aged 22 years.
Private James Walsh, Duke of Well.’s Regt., son of Mrs. Thomas Walsh,
77, Colne Road, Earby, killed in action May, 1916. Aged 25 years.

Private J. Bell, Canadian Exp. Force, son of Mr. Thomas Bell, Castle
Hill, Settle, killed in action 14th June, 1916.
First Class P.O. Frank Collins, H.M.S. “Indefatigable,” of Crosshills,
killed in action in the Battle of Jutland, 1st June, 1916.

Seaman George Earnshaw, H.M.S. “Defence,” son of Mr. Tom Earnshaw,


Church Street, Carleton, killed in action in the Jutland battle 1st
June, 1916. Aged 18 years.
Sergeant Kayley Earnshaw, D.C.M., West Yorks. Regt., of Scosthrop,
Airton, killed in action June, 1916.

Private Charles Evans, Seaforth Highlanders, of Austwick, accidentally


drowned in the Persian Gulf 29th June, 1916. Aged 22 years.
Private Smith Hardacre, Duke of Well.’s Regt., of Crosshills, killed in
action 13th June, 1916. Aged 30 years.

Sergeant Ernest Hoyles, Canadian Highlanders, son of Mr. & Mrs.


Hoyles, 14, Montgomery Street, Skipton, killed in action June, 1916.
Aged 31 years.
Corporal C. H. Hopwood, Canadian Division, son of Mr. & Mrs.
Hopwood, L. & Y. Terrace, Hellifield, killed in action 3rd June, 1916.
Aged 30 years.

Rifleman Nicholas Harrison, King’s Royal Rifles, son of Mr. Nicholas


Harrison, Rathmell, Settle, killed in action 19th June, 1916. Aged 22
years.
Private J. D. Knight, Australian Infantry, of Skipton, killed in action
June, 1916. Aged 30 years.

Lance Corporal Albert Lister, Canadian Corps, son of Mr. & Mrs. J. W.
Lister, Low Bentham, killed in action 3rd June, 1916. Aged 26 years.
Private L. Parker, Canadian Exp. Force, brother of Mr. James Parker,
Ives Scarr, Ingleton, killed in action 7th June, 1916. Aged 37 years.

Private Harry R. Toft, Royal Fusiliers, son of the late Reverend J. Toft,
formerly of Skipton, killed in action 7th June, 1916. Aged 23 years.
Private John Young, Duke of Well.’s Regt., son of the late Mr. John
Young, Burton-in-Lonsdale, died at Clipstone Camp, 30th June,
1916. Aged 30 years.

Corporal E. C. Briggs, Duke of Well.’s Regt., son of Regt.


Quartermaster Sergt. Briggs, 22, Ermysted Street, Skipton, killed in
action July, 1916. Aged 19 years.
Private William Burgess, Duke of Well.’s Regt., son of Mr. & Mrs.
Burgess, 18, George Street, Skipton, killed in action 3rd July, 1916.
Aged 24 years.

Private Harry Birch, Duke of Well.’s Regt., of Burnsall, died of wounds


7th July, 1916.
Sergeant John Baldwin, Duke of Well.’s Regt., son of the late Mr.
William Baldwin, 93, Bolton Road, Silsden, killed in action 7th July,
1916. Aged 24 years.

Private Fred Benson, Duke of Well.’s Regt., son of Mr. William Benson,
199, Crag View, Cowling, killed in action 11th July, 1916.
Private F. Baldwin, Canadian Exped. Force, son of Mr. & Mrs. D.
Baldwin, formerly of Settle, killed in action July, 1916.

Sergeant Wilfred Blackburn, Duke of Well.’s Regt., of West Hall Farm,


Addingham, killed in action July, 1916. Aged 23 years.
Corporal John Bentham, East Lancs. Regt., son of Mrs. J. Bentham, 52,
Esk Lane, Barnoldswick, died 30th July, 1916. Aged 22 years.

Private A. W. Bailey, Duke of Well.’s Regt., of Otterburn, Bell Busk,


killed in action 29th July, 1916. Aged 20 years.
Private James Banks, Duke of Well.’s Regt., son of the late Mr. W.
Banks, Burtersett, Hawes, died of wounds 26th July, 1916. Aged 22
years.

Private William Boocock, Duke of Well.’s Regt., of 15, Montrose


Terrace, Barnoldswick, officially presumed killed 7th July, 1916. Aged
22 years.
Corporal Ernest Cowgill, Duke of Well.’s Regt., son of Mr. T. Cowgill,
Primrose Hill, Skipton, killed in action 25th July, 1916. Aged 22
years.

Private Joseph Clapham, West Yorks. Regt., son of Mrs. B. A. Clapham,


Craven Heifer Inn, Ingleton, killed in action 7th July, 1916. Aged 33
years.
Private Thomas B. Cartman, Duke of Well.’s Regt., son of Mrs.
Rishworth, Moorside Farm, Silsden, died of wounds 12th July, 1916.
Aged 22 years.

Private Harry Crane, Duke of Well.’s Regt., son of Mr. James Crane,
49, Rainhall Road, Barnoldswick, killed in action 25th July, 1916.
Aged 22 years.
Private S. Cross, Royal Fusiliers, of Clapham, killed in action 7th July,
1916.

Private Maurice Robinson Crowther, Leeds Pals Regt., son of Mr. John
Crowther, Ridley House, Grassington, officially reported killed in
action 1st July, 1916.
Private Herbert Clarke, West Yorks. Regt. son of Mr. Clarke, Kirkgate,
Settle, officially presumed killed 14th July, 1916.

Private Parrington Dixon, Prince of Wales Yorks. Regt., only son of Mr.
& Mrs. T. Dixon, Gawthrop, Dent, presumed killed in action 1st July,
1916. Aged 19 years.
Private John Bruce Davidson, Duke of Well.’s Regt., son of Mr. Joseph
Davidson, Dent, died of wounds 14th July, 1916, Aged 22 years.

Private E. Ellershaw, Duke of Well.’s Regt., son of Mrs. Lord, Nelson,


formerly of Settle, killed in action 7th July, 1916. Aged 26 years.
Corporal T. F. Ellis, Royal Welsh Fusiliers, of 63, Keighley Road,
Cowling, killed in action 20th July, 1916.

Private T. Earnshaw, Duke of Well.’s Regt., son of Mrs. Earnshaw,


Airton, Kirkby Malham, killed in action 1st July, 1916.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like