|
|
Hybrid Event
|
Papers |
F. Temole, D. Atanasova (University of Ruse, Ruse, Bulgaria) Role, Importance and Significance of Software Quality
In software development processes, as in other forms within the mechanical environment, the objectives of least costs, adherence to due dates and item quality must be taken into consideration. Great software system must satisfy different already concurred quality perspectives or product characteristics. Since of the gigantic significance of quality within the advancement of computer program items, computer program quality administration ought to be coordinates into software ventures. Software quality administration ought to make and keep up program quality with the assistance of specialized and hierarchical measures. As it were when the above-mentioned goals have been satisfied can one talk of financial computer program advancement. Software quality management can ensure that the software has the required level of quality. Quality objectives should be set, and their degree of fulfilment can be determined during development. In this paper, the essential findings from the expert interviews on the role and importance as well as the significance of software quality are brought together and a reflection is made between statements from business practice (experts) and science (theory), whereby the state of both research and practice can be decisively improved.
|
S. Prokić, N. Luburić, J. Slivka, A. Kovačević (University of Novi Sad, Novi Sad, Serbia) Identification of Code Properties that Support Code Smell Analysis
Code smells are structures in code that imply potential maintainability problems and may negatively impact software quality. One of the critical challenges with code smells is that their definitions are often vague, difficult to comprehend and subjective, making them hard to reliably and consistently detect and analyze by humans and automated systems. Most existing code smell detection approaches rely heavily on human interpretation and are typically supported by structural code metrics. Unfortunately, many of these approaches are incomplete and do not cover a range of code properties that could indicate potential code smells.
This paper analyzes code smell detection approaches to identify code properties used for code smell detection and analysis. Informed by our previous work and the literature, we define five code properties used by humans and automatic detectors to identify code smells. We demonstrate how various code properties can be mapped to the 22 code smells defined by Martin Fowler. The resulting catalog of properties can help software engineers and code maintainability researchers analyze code smells and build automated code smell detectors that examine properties beyond the traditional structural metrics.
|
S. Salii, J. Ajdari, X. Zenuni (South East European University, Tetovo, Macedonia) Migrating to a Microservice Architecture: Benefits and Challenges
Considering the need for scalability, flexible configuration, easier development, maintenance and rapid agile development, many organizations are moving to a microservices architecture. This migration process is undertaken by organizations to change their software architecture and mature the benefits offered by microservices architecture. However, performing a migration towards microservices is not a trivial and structured process, and many challenges have been identified along the way.
In this research paper, we investigate the migration process and the adoption of microservices in different organizations by conducting a survey with industry practitioners, mainly focusing on the reasons for migration, the advantages that this architecture brings and the obstacles encountered during the migration.
The expected result of the research is to contribute to the findings reported in the scientific literature, highlighting relevant problems and possible directions for future research.
|
F. Jovanov, V. Zdraveski, M. Gusev, M. Kostoska (Faculty of Computer Sciences and Engineering, Skopje, Macedonia) Optimization and Parallelization of Object-Relational Mappers
Most of today’s software is connected to the Internet, no matter its type/usage. The developers of these applications constantly have to make important decisions that impact the software’s performance. One predominant area of these discussions is whether to use Object Relational Mappings or native SQL. In this paper, we introduce a new Java library called RQL and an algorithm to drastically optimize ORMs, specifically time and memory complexity, as well as the number of database calls that they produce. We set a hypothesis to check if this new approach performs better than the conventional one. The evaluation of conducted experiments proves that the new approach based on the division of work to separate threads, proper decision-making, partitioning, in-memory data mapping, entity pre-processing and the avoidance of Cartesian products and n+1 issues achieves better performance and reduces resource requirements.
|
Break |
D. Fonović, S. Sovilj, N. Tanković (Juraj Dobrila University of Pula, Pula, Croatia) A Survey of End-to-End Congestion Mechanisms in the Field of IoT
The Internet of Things (IoT) is a global network of devices capable of communicating and exchanging data with other devices and systems mainly via the Internet using specific communication protocols. The number of such devices that can be connected to the Internet due to progress in various technological areas (such as communication technologies, microelectronic circuits, sensors, embedded systems, smartphones etc.) is constantly growing. This leads to network congestion due to the large amount of dana exchanged between devices. In addition, IoT devices are resource-constrained, further exacerbating network congestion. Network congestion leads to additional communication delay, low network bandwidth and waste of computer resources. This is one of the important aspects when some IoT applications exchange critical information (e.g., monitoring the patient's health condition in the application of IoT in smart healthcare). As the number of IoT applications increases, so does the need to modify or introduce new protocols to deal with the problems of adapting to network conditions. In the IoT layered architecture, the transport layer plays an important role in managing the end-to-end connection to the services of the upper application IoT layer. An important function of the transmission layer of the IoT layer is congestion control. This paper presents an overview of related research on the congestion control mechanism of the IoT architecture's transport layer, advantages, disadvantages, and current problems of the transport layer in IoT applications.
|
E. Leka (Polytechnic University of Tirana, Tirane, Albania), E. Hoxha, G. Rexha (Albanian University, Tirane, Albania) Security and Privacy Concerns Associated with the Internet of Things (IoT) and the Role of Adapting Blockchain and Machine Learning - A Systematic Literature Review
The Internet of Things (IoT) is one of the most important technologies of our day, and it will continue to become more significant as more businesses realize the competitive advantages of having connected devices. Blockchain helps maintain correct data that is unaltered and permanent. At the same time, the IoT addresses hardware connected via the internet and may use machine learning to discover trends and produce accurate projections utilizing this data. These three technologies have taken the place of the conventional methods that were previously employed for the design and architecture of new devices. Combining them yields a wide range of potential outcomes, some of which might result in the next great thing. We also contend that this convergence will speed up the development of autonomous models and information technology that aids companies in managing the security and privacy of their clients. We highlight and expose several challenges and upcoming research areas using machine learning algorithms and blockchain techniques to address security and privacy issues in the IoT space. In this paper, we thoroughly analyse the use of blockchain and machine learning technologies for IoT, focusing on security and privacy. Critical thoughtful writing has been heightened by examining research articles published in well-regarded journals between 2018 and 2023. Finally, there are still challenges that can steer academics toward potential future advancement in IoT security and privacy.
|
B. Karahodža, E. Avdagić-Golub, A. Čolaković (Faculty of Traffic and Communications, Sarajevo, Bosnia and Herzegovina) Applying Balanced Scorecard in Software Process Improvement: A Case Study of Small Software Organization
Software processes consist of a complex set of activities required to deliver software products within predicted quality, costs, and deadlines. To accomplish such goals, a software organization needs a quality and mature software process as a prerequisite for success. Adopting Software Capability Maturity Model Integration (CMMI) represents a well-known path in the pursuit of mature software processes. However, its implementation is a subject of a permanent effort that implies different approaches and methods, and often leads to unsuccessful or limited success, though. This is especially emphasized in small software companies given the dynamic environment influenced by different factors, including insufficient resources, changes in technology, and staff turnover. In this paper, a case study of a small software company implementing software process improvement is presented. In a tailored approach to process improvement, a specific method using the balanced scorecard as input into the IDEAL model has been designed, enabling a narrow link between business goals and specific improvement goals. The results show that the software process and selected performance indicators were improved, and suggest the potential of the proposed approach in small organizations.
|
S. Urlić, Ž. Car (Faculty of Electrical Engineering and Computing, Zagreb, Croatia) Application of Hybrid Project Management Methodology in Development of Software Systems
Selection of project management methodology in development of software systems is very challenging, especially taking into consideration that every project is unique. In this paper hybrid approach as a combination of traditional plan-driven and agile methodologies of project management, with emphasis on applying Scrum in waterfall project management, in development of web-applications is analyzed. This paper provides results of seven qualitative researches done through interviews with project managers and statistical data analysis of survey respondents (n = 47). Results of qualitative research show that most projects follow a pattern in which waterfall methodology of project management is combined with agile practices - agile was used in almost all projects which were the subject of research in project phase of Development. Results of quantitative research conducted through a survey confirmed that Scrum and waterfall are the most frequently used methodologies in web application development projects and also indicated the frequency of overlapping of Development and Testing project phases. Paper provides guidelines for combining waterfall model with agile models and emphasizes the importance of planning, analyzing user requirements and defining software architecture at the beginning of the project, as well as delivering multiple minor development versions to users for testing.
|
|
Basic information:
Chairs:
Tihana Galinac Grbac (Croatia), Darko Huljenić (Croatia)
Program Committee:
Stipo Čelar (Croatia), Andrej Grgurić (Croatia), Igor Ljubi (Croatia), Mladen Sokele (Croatia), Nikola Tanković (Croatia), Mladen Tomić (Croatia), Linda Vicković (Croatia)
Registration / Fees:
REGISTRATION / FEES
|
Price in EUR
|
EARLY BIRD
Up to 8 May 2023 |
REGULAR
From 9 May 2023 |
Members of MIPRO and IEEE |
230 |
260 |
Students (undergraduate and graduate), primary and secondary school teachers |
120 |
140 |
Others |
250 |
280 |
The discount doesn't apply to PhD students.
Contact:
Tihana Galinac Grbac
Juraj Dobrila University of Pula
Faculty of Informatics
Zagrebacka 30
HR-52100 Pula, Croatia
GSM: +385 99 3820 750
E-mail: tihana.galinac@unipu.hr
The best papers will get a special award.
Accepted papers will be published in the ISSN registered conference proceedings. Presented papers in English will be submitted for inclusion in the IEEE Xplore Digital Library.
.............
There is a possibility that the selected scientific papers with some further modification and refinement are being published in the following journals: Journal of Computing and Information Technology (CIT), MDPI Applied Science, MDPI Information Journal, Frontiers and EAI Endorsed Transaction on Scalable Information Systems.
Location:
Opatija is the leading seaside resort of the Eastern Adriatic and one of the most famous tourist destinations on the Mediterranean. With its aristocratic architecture and style, Opatija has been attracting artists, kings, politicians, scientists, sportsmen, as well as business people, bankers and managers for more than 170 years.
The tourist offer in Opatija includes a vast number of hotels, excellent restaurants, entertainment venues, art festivals, superb modern and classical music concerts, beaches and swimming pools – this city satisfies all wishes and demands.
Opatija, the Queen of the Adriatic, is also one of the most prominent congress cities in the Mediterranean, particularly important for its ICT conventions, one of which is MIPRO, which has been held in Opatija since 1979, and has attracted more than a thousand participants from over forty countries. These conventions promote Opatija as one of the most desirable technological, business, educational and scientific centers in South-eastern Europe and the European Union in general.
For more details, please visit www.opatija.hr and visitopatija.com.
|
|
|
Currently there are no news |
|
|
|
|