1. VOSviewer analysis of studies on software selection in the logistics sectorBukra Doganer Duman, Mehmet Adak, Alican Güleç, 2024, review article Abstract: Outsourcing in logistics is an important step to reduce costs and increase operational efficiency. In this sense, it is possible to come across outsourcing in many areas of logistics processes. One of the outsourcing steps is the decision to select the software. Choosing the right software can affect the market share of the organization and the implementation time, effort, and cost. The findings of this research will help the marketing and sales teams of software product companies to develop key points and also enable end users to make informed decisions in selecting software packages for the organization. In this study, the studies in the literature were examined through the Scopus database, and co-citation analysis was performed using the VOSviewer program. As a result of the analysis, the articles analyzed were divided into four clusters and explained. Keywords: logistics, software selection, VOSviewer Published in DKUM: 01.10.2024; Views: 0; Downloads: 1 Link to file This document has many files! More... |
2. Analysis of Methodologies and Tools for Software Development in Different ArchitecturesMaksim Nikitashin, 2024, master's thesis Abstract: In modern software development, three of the most popular application architectures are commonly used: monolithic, service-oriented, and microservices. At the same time, plenty of different methodologies, primarily agile ones, and tools are in use to plan and manage software projects. The research studies relations between these two entities to define the most popular and suitable methodologies and tools for projects, implementing each specific architecture. The research consists of 2 parts: qualitative and quantitative. The first one includes the study of the theoretical basis and related sources to find out the most popular modern methodologies and tools considering their characteristics and each specific architecture. Based on these characteristics, a definition of the most suitable ones is made. The second part represents preliminary statistical research among people, currently employed in software development companies about their opinions on the thematic. The second part includes 36 professionals, employed in different roles. In this part, descriptive statistics and correlation analysis are used. The results have some limitations related to the limited scope of literature studied and also to the size and representativeness of the sample. However, they are useful both for people working in software development, especially for leading personnel, making decisions about project management, and for researchers as a good starting point for continuing research. The results show the necessity of further investigation of the topic due to inconsistency between the scientific literature research and real business world research. Also, we have found out possible correlation between employees’ satisfaction and tools used in project management.
In reference to IEEE copyrighted material which is used with permission in this thesis, the IEEE does not endorse any of University of Maribor’s products or services. Internal or personal use of this material is permitted. If interested in reprinting/republishing IEEE copyrighted material for advertising or promotional purposes or for creating new collective works for resale or redistribution, please go to http://www.ieee.org/publications_standards/publications/rights/rights_link.html to learn how to obtain a License from RightsLink. If applicable, University Microfilms and/or ProQuest Library, or the Archives of Canada may supply single copies of the dissertation. Keywords: agile methodologies, software, monolithic architecture, service-oriented architecture, microservices Published in DKUM: 25.09.2024; Views: 0; Downloads: 4 Full text (1,01 MB) |
3. Commit-level software change intent classification using a pre-trained transformer-based code modelTjaša Heričko, Boštjan Šumak, Sašo Karakatič, 2024, original scientific article Abstract: Software evolution is driven by changes made during software development and maintenance. While source control systems effectively manage these changes at the commit level, the intent behind them are often inadequately documented, making understanding their rationale challenging. Existing commit intent classification approaches, largely reliant on commit messages, only partially capture the underlying intent, predominantly due to the messages’ inadequate content and neglect of the semantic nuances in code changes. This paper presents a novel method for extracting semantic features from commits based on modifications in the source code, where each commit is represented by one or more fine-grained conjoint code changes, e.g., file-level or hunk-level changes. To address the unstructured nature of code, the method leverages a pre-trained transformer-based code model, further trained through task-adaptive pre-training and fine-tuning on the downstream task of intent classification. This fine-tuned task-adapted pre-trained code model is then utilized to embed fine-grained conjoint changes in a commit, which are aggregated into a unified commit-level vector representation. The proposed method was evaluated using two BERT-based code models, i.e., CodeBERT and GraphCodeBERT, and various aggregation techniques on data from open-source Java software projects. The results show that the proposed method can be used to effectively extract commit embeddings as features for commit intent classification and outperform current state-of-the-art methods of code commit representation for intent categorization in terms of software maintenance activities undertaken by commits. Keywords: software maintenance, code commit, mining software repositories, adaptive pre-training, fine-tuning, semantic code embedding, CodeBERT, GraphCodeBERT, classification, code intelligence Published in DKUM: 14.08.2024; Views: 87; Downloads: 7 Full text (1,65 MB) |
4. Computer science education in ChatGPT Era: experiences from an experiment in a programming course for novice programmersTomaž Kosar, Dragana Ostojić, Yu David Liu, Marjan Mernik, 2024, original scientific article Abstract: The use of large language models with chatbots like ChatGPT has become increasingly popular among students, especially in Computer Science education. However, significant debates exist in the education community on the role of ChatGPT in learning. Therefore, it is critical to understand the potential impact of ChatGPT on the learning, engagement, and overall success of students in classrooms. In this empirical study, we report on a controlled experiment with 182 participants in a first-year undergraduate course on object-oriented programming. Our differential study divided students into two groups, one using ChatGPT and the other not using it for practical programming assignments. The study results showed that the students’ performance is not influenced by ChatGPT usage (no statistical significance between groups with a p-value of 0.730), nor are the grading results of practical assignments (p-value 0.760) and midterm exams (p-value 0.856). Our findings from the controlled experiment suggest that it is safe for novice programmers to use ChatGPT if specific measures and adjustments are adopted in the education process. Keywords: large language models, ChatGPT, artificial intelligence, controlled experiment, object-oriented programming, software engineering education Published in DKUM: 12.08.2024; Views: 59; Downloads: 3 Full text (492,37 KB) |
5. Digitalizacija registra prostovoljcev v črni goriLuka Popović, 2024, undergraduate thesis Abstract: The present thesis focuses on the development of a platform that will digitalize the volunteer log in Montenegro. To best understand the needs of our platform, we first need to gain a better understanding of what volunteering is, how it is carried out, and by whom, all taking into consideration the legal context. The currently existing solution for logging volunteer hours is highly impractical and seemingly has a low number of uses, indicating a need for renewal. In Montenegro, volunteering as well as any efforts volunteers put in have low recognition. Our solution is an easy-to-use, web platform developed in Flutter that enables seamless tracking of all volunteer services and activities and sets the foundation for a digital platform for everything related to volunteering on a national level. The research identifies the necessary functionalities through questionnaires for volunteers and interviews with volunteer managers and coordinators. Additionally, it explores the legal outline and how it navigates the desired outcome. Finally, an application is presented alongside the recommended improvements that will be added in the future. The developed platform allows for easy and comprehensive volunteer activity data tracking and helps streamline the volunteer management process. Its implementation would help with the national recognition of volunteer, as well as the skills and competencies one acquires through it. Keywords: Keywords: volunteer management, digital logbook, software development, flutter app Published in DKUM: 01.07.2024; Views: 128; Downloads: 15 Full text (2,26 MB) |
6. |
7. Robotic bin-picking : benchmarking robotics grippers with modified YCB object and model setTone Lerher, Primož Bencak, Luka Bizjak, Darko Hercog, Boris Jerman, 2023, published scientific conference contribution Abstract: Robotic bin-picking is increasingly important in the order-picking process in intralogistics. However, many aspects of the robotic bin-picking process (object detection, grasping, manipulation) still require the research community's attention. Established methods are used to test robotic grippers, enabling comparability of the research community's results. This study presents a modified YCB Robotic Gripper Assessment Protocol that was used to evaluate the performance of four robotic grippers (twofingered, vacuum, gecko, and soft gripper). During the testing, 45 objects from the modified YCB Object and Model Set from the packaging categories, tools, small objects, spherical objects, and deformable objects were grasped and manipulated. The results of the robotic gripper evaluation show that while some robotic grippers performed substantially well, there is an expressive grasp success variation over diverse objects. The results indicate that selecting the object grasp point next to selecting the most suitable robotic gripper is critical in successful object grasping. Therefore, we propose grasp point determination using mechanical software simulation with a model of a two-fingered gripper in an ADAMS/MATLAB cosimulation. Performing software simulations for this task can save time and give comparable results to real-world experiments. Keywords: intralogistics, robotic bin-picking, YCB protocol, robotic gripper evaluation, mechanical software simulations, performance analysis Published in DKUM: 21.03.2024; Views: 298; Downloads: 11 Full text (773,38 KB) This document has many files! More... |
8. Improved formal verification of SDN-based firewalls by using TLA+Tatjana Kapus, 2023, original scientific article Abstract: In an article published in IEEE Access in 2020, researchers present an approach to using TLA + for the formal verification of whether a network of SDN (Software-Defined Networking) switches implements the filtering rules of a given monolithic firewall. The distributed as well as monolithic firewalls are specified with TLA + . It is shown that the correctness of the former with respect to the latter can be verified automatically by using the TLC model checker. The main contributions of this paper are the following improvements of that approach. Firstly, by specifying switches without using any variables, the time needed for the model checking is reduced significantly. For example, the verification of the same networks takes a few seconds with the new approach and does not end after several hours with the previous one. Secondly, the following problem is solved. With the latter, if a monolithic firewall allows a packet to pass through, all the paths in the distributed firewall which the packet is routed on must allow the same. Otherwise, the model checker proclaims the distributed firewall to be in error. We present an additional approach to the verification, which gives a positive answer if at least one of the paths allows the packet to pass through. Keywords: firewalls, formal specification, formal verification, logic, model checking, software defined networking Published in DKUM: 04.12.2023; Views: 285; Downloads: 22 Full text (1,24 MB) This document has many files! More... |
9. Identifying key activities, artifacts and roles in agile engineering of secure software with hierarchical clusteringAnže Mihelič, Tomaž Hovelja, Simon Vrhovec, 2023, original scientific article Abstract: Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in AESS. To gain initial sets of activities, artifacts, and roles, the literature was first extensively reviewed. Activities, artifacts, and roles were then cross-evaluated with similarity matrices. Finally, similarity matrices were converted into distance matrices, enabling the use of Ward’s hierarchical clustering method for consolidating activities, artifacts, and roles into clusters. Clusters of activities, artifacts, and roles were then named as key activities, artifacts, and roles. We identified seven key activities (i.e., security auditing, security analysis and testing, security training, security prioritization and monitoring, risk management, security planning and threat modeling; and security requirements engineering), five key artifacts (i.e., security requirement artifacts, security repositories, security reports, security tags, and security policies), and four key roles (i.e., security guru, security developer, penetration tester, and security team) in AESS. The identified key activities, artifacts, and roles can be used by software development teams to improve their software engineering processes in terms of software security. Keywords: secure software development, security engineering, agile methods, agile development, software development, software engineering, software security, application security, cybersecurity, cyber resilience Published in DKUM: 29.11.2023; Views: 417; Downloads: 10 Full text (557,17 KB) This document has many files! More... |
10. Agile development of secure software for small and medium-sized enterprisesAnže Mihelič, Simon Vrhovec, Tomaž Hovelja, 2023, original scientific article Abstract: Although agile methods gained popularity and became globally widespread, developing secure software with agile methods remains a challenge. Method elements (i.e., roles, activities, and artifacts) that aim to increase software security on one hand can reduce the characteristic agility of agile methods on the other. The overall aim of this paper is to provide small- and medium-sized enterprises (SMEs) with the means to improve the sustainability of their software development process in terms of software security despite their limitations, such as low capacity and/or financial resources. Although software engineering literature offers various security elements, there is one key research gap that hinders the ability to provide such means. It remains unclear not only how much individual security elements contribute to software security but also how they impact the agility and costs of software development. To address the gap, we identified security elements found in the literature and evaluated them for their impact on software security, agility, and costs in an international study among practitioners. Finally, we developed a novel lightweight approach for evaluating agile methods from a security perspective. The developed approach can help SMEs to adapt their software development to their needs. Keywords: secure software development, security engineering, agile, small and medium sized enterprises, software development management, security Published in DKUM: 29.11.2023; Views: 494; Downloads: 7 Full text (2,58 MB) This document has many files! More... |