Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

Intelligent Algorithms in Software

Engineering: Proceedings of the 9th


Computer Science On-line Conference
2020, Volume 1 Radek Silhavy
Visit to download the full and correct content document:
https://textbookfull.com/product/intelligent-algorithms-in-software-engineering-procee
dings-of-the-9th-computer-science-on-line-conference-2020-volume-1-radek-silhavy/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Applied Informatics and Cybernetics in Intelligent


Systems Proceedings of the 9th Computer Science On line
Conference 2020 Volume 3 Radek Silhavy

https://textbookfull.com/product/applied-informatics-and-
cybernetics-in-intelligent-systems-proceedings-of-the-9th-
computer-science-on-line-conference-2020-volume-3-radek-silhavy/

Artificial Intelligence Methods in Intelligent


Algorithms Proceedings of 8th Computer Science On line
Conference 2019 Vol 2 Radek Silhavy

https://textbookfull.com/product/artificial-intelligence-methods-
in-intelligent-algorithms-proceedings-of-8th-computer-science-on-
line-conference-2019-vol-2-radek-silhavy/

Artificial Intelligence and Bioinspired Computational


Methods Proceedings of the 9th Computer Science On line
Conference 2020 Vol 2 Radek Silhavy

https://textbookfull.com/product/artificial-intelligence-and-
bioinspired-computational-methods-proceedings-of-the-9th-
computer-science-on-line-conference-2020-vol-2-radek-silhavy/

Software Engineering Perspectives and Application in


Intelligent Systems Proceedings of the 5th Computer
Science On line Conference 2016 CSOC2016 Vol 2 1st
Edition Radek Silhavy
https://textbookfull.com/product/software-engineering-
perspectives-and-application-in-intelligent-systems-proceedings-
of-the-5th-computer-science-on-line-
Software Engineering Trends and Techniques in
Intelligent Systems Proceedings of the 6th Computer
Science On line Conference 2017 CSOC2017 Vol 3 1st
Edition Radek Silhavy
https://textbookfull.com/product/software-engineering-trends-and-
techniques-in-intelligent-systems-proceedings-of-the-6th-
computer-science-on-line-conference-2017-csoc2017-vol-3-1st-
edition-radek-silhavy/

Software Engineering and Algorithms in Intelligent


Systems Radek Silhavy

https://textbookfull.com/product/software-engineering-and-
algorithms-in-intelligent-systems-radek-silhavy/

Software Engineering Perspectives in Intelligent


Systems: Proceedings of 4th Computational Methods in
Systems and Software 2020, Vol.1 Radek Silhavy

https://textbookfull.com/product/software-engineering-
perspectives-in-intelligent-systems-proceedings-of-4th-
computational-methods-in-systems-and-software-2020-vol-1-radek-
silhavy/

Software Engineering Perspectives in Intelligent


Systems: Proceedings of 4th Computational Methods in
Systems and Software 2020, Vol.2 Radek Silhavy

https://textbookfull.com/product/software-engineering-
perspectives-in-intelligent-systems-proceedings-of-4th-
computational-methods-in-systems-and-software-2020-vol-2-radek-
silhavy/

Cybernetics and Algorithms in Intelligent Systems Radek


Silhavy

https://textbookfull.com/product/cybernetics-and-algorithms-in-
intelligent-systems-radek-silhavy/
Advances in Intelligent Systems and Computing 1224

Radek Silhavy Editor

Intelligent
Algorithms
in Software
Engineering
Proceedings of the 9th Computer
Science On-line Conference 2020,
Volume 1
Advances in Intelligent Systems and Computing

Volume 1224

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156


Radek Silhavy
Editor

Intelligent Algorithms
in Software Engineering
Proceedings of the 9th Computer Science
On-line Conference 2020, Volume 1

123
Editor
Radek Silhavy
Faculty of Applied Informatics
Tomas Bata University in Zlín
Zlín, Czech Republic

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-3-030-51964-3 ISBN 978-3-030-51965-0 (eBook)
https://doi.org/10.1007/978-3-030-51965-0
© Springer Nature Switzerland AG 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

Software engineering research papers and topics are presented in this proceedings.
This proceedings is a Vol. 1 of the Computer Science On-line Conference. Papers in
this part discuss intelligent algorithms, application of machine and statistical
learning in the software engineering research.
This book constitutes the refereed proceedings of the Intelligent Algorithms in
Software Engineering section of the 9th Computer Science On-line Conference
2020 (CSOC 2020), held online in April 2020.
CSOC 2020 has received (all sections) more than 270 submissions from more
than 35 countries. More than 65% of accepted submissions were received from
Europe, 21% from Asia, 8% from Africa, 4% from America and 2% from Australia.
CSOC 2020 conference intends to provide an international forum for the dis-
cussion of the latest high-quality research results in all areas related to computer
science.
Computer Science On-line Conference is held online, and modern communi-
cation technology, which are broadly used, improves the traditional concept of
scientific conferences. It brings equal opportunity to participate for all researchers
around the world.
I believe that you find the following proceedings exciting and useful for your
research work.

April 2020 Radek Silhavy

v
Organization

Program Committee

Program Committee Chairs


Petr Silhavy Tomas Bata University in Zlin, Faculty
of Applied Informatics, Czech Republic
Radek Silhavy Tomas Bata University in Zlin, Faculty
of Applied Informatics, Czech Republic
Zdenka Prokopova Tomas Bata University in Zlin, Faculty
of Applied Informatics, Czech Republic
Roman Senkerik Tomas Bata University in Zlin, Faculty
of Applied Informatics, Czech Republic
Roman Prokop Tomas Bata University in Zlin, Faculty
of Applied Informatics, Czech Republic
Viacheslav Zelentsov Doctor of Engineering Sciences, Chief
Researcher of St.Petersburg Institute
for Informatics and Automation of Russian
Academy of Sciences (SPIIRAS), Russia
Roman Tsarev Department of Informatics, Siberian Federal
University, Krasnoyarsk, Russia

Program Committee Members


Boguslaw Cyganek Department of Computer Science, University
of Science and Technology, Krakow, Poland
Krzysztof Okarma Faculty of Electrical Engineering, West
Pomeranian University of Technology,
Szczecin, Poland
Monika Bakosova Institute of Information Engineering, Automation
and Mathematics, Slovak University
of Technology, Bratislava, Slovak Republic

vii
viii Organization

Pavel Vaclavek Faculty of Electrical Engineering


and Communication, Brno University
of Technology, Brno, Czech Republic
Miroslaw Ochodek Faculty of Computing, Poznan University
of Technology, Poznan, Poland
Olga Brovkina Global Change Research Centre Academy
of Science of the Czech Republic, Brno,
Czech Republic, and Mendel University
of Brno, Czech Republic
Elarbi Badidi College of Information Technology,
United Arab Emirates University, Al Ain,
United Arab Emirates
Luis Alberto Morales Rosales Head of the Master Program in Computer
Science, Superior Technological Institute
of Misantla, Mexico
Mariana Lobato Baes Superior Technological of Libres, Mexico
Abdessattar Chaâri Laboratory of Sciences and Techniques
of Automatic Control and Computer
Engineering, University of Sfax, Tunisian
Republic
Gopal Sakarkar Shri. Ramdeobaba College of Engineering
and Management, Republic of India
V. V. Krishna Maddinala GD Rungta College of Engineering
& Technology, Republic of India
Anand N. Khobragade Maharashtra Remote Sensing Applications
(Scientist) Centre, Republic of India
Abdallah Handoura Computer and Communication Laboratory,
Telecom Bretagne, France

Technical Program Committee Members


Ivo Bukovsky Roman Senkerik
Maciej Majewski Petr Silhavy
Miroslaw Ochodek Radek Silhavy
Bronislav Chramcov Jiri Vojtesek
Eric Afful Dazie Eva Volna
Michal Bliznak Janez Brest
Donald Davendra Ales Zamuda
Radim Farana Roman Prokop
Martin Kotyrba Boguslaw Cyganek
Erik Kral Krzysztof Okarma
David Malanik Monika Bakosova
Michal Pluhacek Pavel Vaclavek
Zdenka Prokopova Olga Brovkina
Martin Sysel Elarbi Badidi
Organization ix

Organizing Committee Chair


Radek Silhavy Tomas Bata University in Zlin, Faculty of
Applied Informatics,
email: radek@silhavy.cz

Conference Organizer (Production)


Silhavy s.r.o.
Website: https://www.openpublish.eu
Email: csoc@openpublish.eu
Conference Website, Call for Papers
https://www.openpublish.eu
Contents

A Prescriptive Analytical Logic Model Incorporated with Analytic


Hierarchy Process for Software Application Error Analysis . . . . . . . . . 1
Hoo Meng Wong, Sagaya Sabestinal Amalathas, and Tatana Zitkova
Software Requirement in Iterative SDLC Model . . . . . . . . . . . . . . . . . . 26
Olatunji J. Okesola, Ayodele A. Adebiyi, Ayoade A. Owoade,
Oyetunde Adeaga, Oluseyi Adeyemi, and Isaac Odun-Ayo
Simplified Framework of Natural Language Processing
for Structure Management of Current-Age Data . . . . . . . . . . . . . . . . . . 35
J. Shruthi and Suma Swamy
Design and Software Implementation of Heuristic and Suboptimal
Strategies for the Mancala/Kalah Game . . . . . . . . . . . . . . . . . . . . . . . . . 44
Libor Pekař, Jiří Andrla, and Jan Dolinay
Sector-Selective Hybrid Scheme Facilitating Hardware
Supportability Over Image Compression . . . . . . . . . . . . . . . . . . . . . . . . 54
D. R. Premachand and U. Eranna
Performance Evaluation of Joint Rate-Distortion Model
of Video Codec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
S. K. Veena and K. Mahesh Rao
To Defeat DDoS Attacks in Cloud Computing Environment Using
Software Defined Networking (SDN) . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
B. N. Yuvaraju and M. Narender
Oriented Petri Nets as Means of Describing
a Human-Computer Interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Kamelia Shoilekova and Desislava Baeva
FPGA Based Transient Fault Generate and Fault Tolerant
for Asynchronous and Synchronous Circuits . . . . . . . . . . . . . . . . . . . . . 103
Y. N. Sharath Kumar and P. Dinesha

xi
xii Contents

Designing an Energy Efficient Routing for Subsystems Sensors


in Internet of Things Eco-System Using Distributed Approach . . . . . . . 111
G. N. Anil
The Compare of Solo Programming and Pair Programming
Strategies in a Scrum Team: A Multi-agent Simulation . . . . . . . . . . . . . 122
Zhe Wang
Fair Random Access with Track-Based SNR Scheduling
for Full-Duplex Wireless Powered Communication Networks . . . . . . . . 148
Xiaowa Yong and Inwhee Joe
A DTN Gateway-Based Architecture for Web Access
in Space Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Mwamba Kasongo Dahouda, Ducsun Lim, Kyungrak Lee, and Inwhee Joe
Multi-objective Scheduling Optimization for ETL Tasks
in Cluster Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Zhenxue Xu, Hui Li, Mei Chen, Zhenyu Dai, Huanjun Li, and Ming Zhu
An LSTM-Based Encoder-Decoder Model for State-of-Charge
Estimation of Lithium-Ion Batteries . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Shengmin Cui, Xiaowa Yong, Sanghwan Kim, Seokjoon Hong,
and Inwhee Joe
Analysis of Social Engineering Attacks Using Exploit Kits . . . . . . . . . . . 189
Tebogo Mokoena, Tranos Zuva, and Martin Appiah
Bipolar Disorder: A Pathway Towards Research Progress
in Identification and Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
K. A. Yashaswini and Shreyas Rao
Managing Electronic Waste with Recycling:
A Review of Developing and Developed Regions . . . . . . . . . . . . . . . . . . 215
Ramadile Moletsane
Trajectory Modeling in a Pursuit Problem
with Curvature Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
A. A. Dubanov
An Approach to Using Templates for Modeling Exceptions
in Terms of Petri Nets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
D. V. Leontev, D. I. Kharitonov, D. S. Odyakova, and R. V. Parakhin
PeBAO: A Performance Bottleneck Analysis and Optimization
Framework in Concurrent Environments . . . . . . . . . . . . . . . . . . . . . . . . 248
Di Chen, Hui Li, Mei Chen, Zhenyu Dai, Huanjun Li, Ming Zhu,
and Jian Zhang
Contents xiii

Matlab Code Generation and Consumption . . . . . . . . . . . . . . . . . . . . . . 261


Daniel Kuchár, Martin Bartoň, Peter Schreiber, and Pavol Tanuška
The Problem of Preventing the Development of Critical
Combinations of Events in Large-Scale Systems . . . . . . . . . . . . . . . . . . 274
A. S. Bogomolov, A. F. Rezchikov, V. A. Kushnikov, V. A. Ivashchenko,
T. E. Shulga, A. A. Samartsev, E. V. Kushnikova, E. V. Berdnova,
E. Yu. Kalikinskaya, and O. V. Kushnikov
Using Software Package “Multimeat-Expert” for Modeling
and Optimization of Composition Chopped Meat Product
with Vegetable Additive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Darya A. Kolpakova, Lilia V. Naimushina, Galina A. Gubanenko,
Tatyana V. Korbmakher, Irina D. Zykova, and Ekaterina A. Rechkina
Application of Machine Learning for Document Classification
and Processing in Adaptive Information Systems . . . . . . . . . . . . . . . . . . 291
Artem Obukhov and Mikhail Krasnyanskiy
SNR-Based TDMA Scheduling with Continuous Energy Transfer
for Wireless Powered Communication Networks . . . . . . . . . . . . . . . . . . 301
Deukgong Yoon and Inwhee Joe
Comparative Analysis of Software Development Life
Cycle Models (SDLC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Jide E. T. Akinsola, Afolakemi S. Ogunbanwo, Olatunji J. Okesola,
Isaac J. Odun-Ayo, Florence D. Ayegbusi, and Ayodele A. Adebiyi
Development Quantum Method of Image Recognition Using
Boundaries Selection and Transformation of a Quantum State . . . . . . . 323
Sergey Gushanskiy, Maxim Polenov, and Viktor Potapov
The Preparation of Graphic Models for a Virtual Reality
Application in Unity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Pavel Pokorný and Michal Birošík
An Application for Solving Truth Functions . . . . . . . . . . . . . . . . . . . . . 341
Pavel Pokorný and Daniel Ševčík
Factors Influencing Acceptance of Technology by Senior Citizens:
A Systematic Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Adibah Hanun Abu Seman, Rohiza Ahmad,
and Hitham Seddig Alhassan Alhussian
Modeling Business Process and Events . . . . . . . . . . . . . . . . . . . . . . . . . . 366
Sabah Al-Fedaghi and Majd Makdessi
xiv Contents

The Study of Optimization Method for Axisymmetric Aerodynamic


Profile in the Gas Flow by Using Evolutionary Algorithms . . . . . . . . . . 380
Nikolay Nikolaevich Chernov, Alexander Viktorovich Palii,
Vladimir Vladimirovich Ignatyev, Andrey Vladimirovich Kovalev,
Andrey Michailovich Maevskiy, and Aleksandr Viktorovich Maksimov
MicroPython as a Development Platform for IoT Applications . . . . . . . 388
Gabriel Gaspar, Peter Fabo, Michal Kuba, Juraj Dudak,
and Eduard Nemlaha
Cycle-Breaking Approach to Reduce Inconsistency
in Pairwise Comparisons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Vladimir Sudakov and Alexey Kurennykh
Statistical Analysis for Customer Product Reviews in Russian
Internet Segment Using Text Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Polina Tuchkova and Vadim Sufiyanov
Methodology for Job Advertisements Analysis in the Labor Market
in Metropolitan Cities: The Case Study of the Capital of Russia . . . . . . 413
Eugene Pitukhin, Marina Astafyeva, and Irina Astafyeva
Constructing a Learner Model Based on the Latent Cognitive
Structure of an Online Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Igor Nekhaev, Ilya Zhuykov, and Artyom Illarionov
Coarse-Grained vs. Fine-Grained Lithuanian Dependency Parsing . . . . 450
Jurgita Kapočiūtė-Dzikienė and Robertas Damaševičius
Eye-Tracking Study of Direction Influence of User’s Attention
for Intelligence System Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Veronika Ander, Petr Cihelka, Jan Tyrychtr, Tomáš Benda,
Hana Vostrá Vydrová, and Dana Klimešová
Parallel Algorithm for K-Means Clustering in Wood
Species Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
P. H. Gunawan and Taufik Fathurahman
Synthesis of Fuzzy Algorithms Controlling the Temperature
of the Polymer in the Extruder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484
V. I. Bozhko, E. V. Naumenko, V. F. Kornyushko, and R. R. Biglov
Search-Based Wrapper Feature Selection Methods in Software
Defect Prediction: An Empirical Analysis . . . . . . . . . . . . . . . . . . . . . . . 492
Abdullateef O. Balogun, Shuib Basri, Said A. Jadid,
Saipunidzam Mahamad, Malek A. Al-momani, Amos O. Bajeh,
and Ammar K. Alazzawi
Development of a Method for Modeling Entangled Quantum
Computations Applicable in the Simon’s Quantum Algorithm . . . . . . . . 504
Gorbunov Alexander, Sergey Gushanskiy, and Viktor Potapov
Contents xv

Development of the Architecture of the System for Detecting


Objects in Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
Sergey Smagin and Ilya Manzhula
Algorithmic and Software Support for Technological
Decision-Making in the Process of Induction Soldering . . . . . . . . . . . . . 521
Anton Milov, Vadim Tynchenko, Vyacheslav Petrenko,
and Sergei Kurashkin
Automated Extraction of Paradigmatic Relationships
from Natural Language Texts on the Basis of the Complex
of Heterogeneous Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
V. V. Dikovitsky and M. G. Shishaev
HNM: Hexagonal Network Model for Comprehensive Smart City
Management in Internet-of-Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
Eisha Akanksha
Multicriteria Model for Evaluation of Outsourcing Services
by Logistics Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
Marcelo Crispim Salazar, Placido Rogério Pinheiro,
and Isaura Cardoso Cavalcante de Castro
A Proposal of Kubernetes Scheduler Using Machine-Learning
on CPU/GPU Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Ishak Harichane, Sid Ahmed Makhlouf, and Ghalem Belalem
Integration of the MATLAB System and the Object-Oriented
Programming System C# Based on the Microsoft COM Interface
for Solving Computational and Graphic Tasks . . . . . . . . . . . . . . . . . . . 581
Sergey Adadurov, Yulia Fomenko, Anatoly Khomonenko,
and Alexander Krasnovidov
The Heterogeneities Elimination in the Process of Data Insertion
Procedures Creation in Structure-Independent Databases . . . . . . . . . . . 590
Andrey Grishchenko, Yury Rogozov, and Sergey Kucherov
Paidagogos S.G.: Development and Programming of the Serious
Game Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
Marián Hosťovecký, Miroslav Ölvecký, and Katarína Pribilová
Some Methods for Constructing Solution Generators of a Search
Method in the State Space for Declaring Logical Tasks . . . . . . . . . . . . . 605
Olga N. Polovikova, Alexander V. Zharikov, Larisa L. Smolyakova,
and Tanya V. Mikheeva

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619


A Prescriptive Analytical Logic Model
Incorporated with Analytic Hierarchy Process
for Software Application Error Analysis

Hoo Meng Wong1(B) , Sagaya Sabestinal Amalathas1 , and Tatana Zitkova2


1 Taylor’s University, Subang Jaya, Selangor, Malaysia
hoomeng@hotmail.com
2 Prague, Czech Republic

Abstract. Software application is still playing an important role in today’s busi-


ness operation. However, the software application error can arise either within the
software application layer or due to any other factor outside the software applica-
tion layer. The root cause analysis activity becomes much more time consuming
to identify the valid error. With that, it arises the problem statement that the dura-
tion of root cause analysis on software application error carries crucial impact to
the service restoration. The objective of this proposed logic model is to conduct
decision making process to identify the valid software application error. This logic
model consists of the algorithm to carry various important processes include the
identification of the root cause in a more accurate manner, and shorten the duration
of root cause analysis activity. The design of Analytic Hierarchy Process (AHP)
hierarchy will depend on the software application errors and other involved errors
found from different layers. As these errors become the participants, they can be
grouped further based on the error categories. Once the hierarchy is constructed,
the participants analyze it through a series of pairwise comparisons that derive
numerical scales of measurement for the nodes. The priorities are associated with
the nodes, and the nodes carry weights of the criteria or alternatives. By the pri-
ority, the valid error and the preferred resolution can be decided. Indeed many
past researches in AHP had been published, however there is a knowledge gap
of AHP in software application error analysis. Therefore this Prescriptive Ana-
lytical Logic Model (PAL) incorporates with AHP into the proposed algorithm is
required. At the end this logic model contributes a new knowledge in the area of
log file analysis to shorten the total time spent on root cause analysis activity.

Keywords: Analytic hierarchy process · Application log file analysis ·


Application log file debugging · Machine learning

1 Introduction

Business companies adopt Information Technology (IT) as a strategic enabler to sustain


their business operations. When the software application becomes crucial for processing
the business transactions, it has lower toleration for downtime expected by the company

© Springer Nature Switzerland AG 2020


R. Silhavy (Ed.): CSOC 2020, AISC 1224, pp. 1–25, 2020.
https://doi.org/10.1007/978-3-030-51965-0_1
2 H. M. Wong et al.

management. This was clearly supported by Labels: Data Center, Downtime, www.
evolven.com (2014), and indeed software application downtime can cause the business
operation ceased. Business company has option that it can run an IT production support
team to provide support service to whichever business-as-usual (BAU) system running
in the organization. Another option is that it can engage service provider to provide the
same IT support service. Regardless whichever option is chosen, the time spent on con-
ducting root cause analysis on software application error is crucial. Without accurately
identifying the valid error, it creates impact to the service restoration to the software
application.
As of the fact, identifying the root cause of the software application error is crucial
before the resolution is decided and deployed into production environment. There are
several required actions in the root cause analysis activity. These actions are:-

i. Collecting related information from different log files.


ii. Selecting the related log events based on the time event when software application
error occurred.

Most of the time, collecting input information for root cause analysis is time con-
suming. This statement is supported by Management Logic (2012) stated that “The most
time consuming aspect of Root Cause Analysis (RCA). Practitioners must gather the all
the evidence to fully understand the incident or failure.”. On the other hand, Horvath
(2015) had also pointed out that “While the analysis itself can be time-consuming, the
chance to mitigate or eliminate the root causes of several recurring problems/ problem
patterns is definitely worth the effort.”. Hence, it is crucial to look for an efficient method
to reduce the prolonging time at the root cause analysis activity.
Generally, each software application has its built-in event logging ability. The pur-
pose of this event logging records the information of what activity is carried out or
even what incident is occurred at that exact time. This information includes appropriate
debugging information, and later the same information can be analyzed for software
application root cause analysis purpose. The concern raised to the required information
logging is that how much logging information is accepted as sufficient for software
application root cause analysis. In addition, what is the appropriate category for the
logging event such as information, error, debug, and fatal should be fetched as the input
information to the root cause analysis activity. In the situation that if the extensive event
logging level is enabled, this can lead to excessive logging information generated. With
that, there are two issues raised.

i. The first issue is that, the performance of software application is reduced by


comparing with before and after extensive event logging option is enabled.
ii. The second issue is that, the manual analysis activity is becoming much more difficult
and even tedious to identify the root cause of the software application error.

Therefore, in the software application development process, it is a great concern on


how much detail event logging should be logged into the log file. At the same time, the
event logging must mitigate the performance impact created to the software application.
These mentioned concerns had also been highlighted by Loggly (2017) and Panda (2011).
A Prescriptive Analytical Logic Model Incorporated 3

As per the following Fig. 1, Operating System communicates between software


application and assigned resources (such as CPU, Memory, Network, and Hard Disk)
on the virtual machine. Software application has to interact with Operating System
to obtain allocated server resources to handle software application processing. This is
because software application has high dependency on server resources to carry out its
execution. Without the server resources, software application cannot execute itself at the
software application layer. Further more, software application requires to communicate
to its database server through the Local Area Network (LAN) for retrieving and updating
software application data.

Fig. 1. Software Application is required sufficient server resources to execute all its functionality.

To identify the root cause of software application error, it can be prolong under the
following challenges.

i. Software application log is hard to be understand.


ii. Error is occurred beyond software application layer, such as Operating System,
Network, and Database layers. Software application log alone is insufficient to
identify the actual error.
iii. IT support personnel has insufficient knowledge and experience in performing
analysis.
iv. Root cause analysis is conducted manually, crucial information is overlooked.
v. Historical error events are taking even longer time to be located.

With all the mentioned concerns and scenarios, by depending software application
log file alone is not sufficient to conduct software application root cause analysis when-
ever error is occurred beyond the software application layer. Hence a proposed research
is required for establishing a prescriptive analytical logic model. This proposed logic
4 H. M. Wong et al.

model incorporated the proposed algorithm to conduct the root cause analysis activity. It
must target to increase the accuracy for error identification, and to reduce the prolonging
time spent on the duration of root cause analysis. Therefore, this is a good potential to
contribute new knowledge to the software application analysis.

2 Significant of the Study


The proposed research is not focusing on the time spent of developing the resolution. This
is because if the valid error is not identified accurately, then it is very high chances that
the resolution may not resolve the real issue. Therefore, the ultimate focus must fall on
the root cause analysis and how fast the valid can be identified during the analysis activity
is crucial. By reducing the prolonging time spent on root cause analysis, and improving
the accuracy of identifying valid software application error. It can resume the software
application service to the users in a shorter total time taken. This is because with today’s
rapid business competitive world, time consuming on analysis and trouble-shooting
activities is unacceptable. Furthermore, it is a continuous battle for the IT support to face
day-to-day software application error challenge in order to provide reliable up-time for
the software application utilized in the business organization. On the other hand, business
companies must still continue to utilize their existing software applications (without
incur any additional operation budget). At the same time, it must continue to allow the
companies to save the investment budget on spending the capital amount to replace all
or partial of the software applications. Without introduces any new software application,
companies can avoid to re-train their users on using the new software applications.
This propose logic model brings the above benefits to business companies which are
using software application for their daily operations crucially. The objective is to get the
valid error fixed and to mitigate any same error re-occurrence in the near future. Over
the years there were various researches had been done at this area such as consolidate
the logs or integrate the logs for analysis. In fact, there had been very few attempts to
propose an algorithm on root cause analysis beyond the software application layer. To
support this, Valdman (2001) had showed more detailed log file analysis by comparing
the past published techniques whereas other studies were only indicated intentions or
suggestions. Moreover, there is no attempt to incorporate Analytic Hierarchy Process
(AHP) for decision making on valid software application error. This can be supported by
Vaidya and Kumar (2004) that they had reviewed Analytic Hierarchy Process (AHP) with
150 application papers in total. There is no knowledge in applying AHP on identifying
valid error. Hence, this is a great potential in this research which brings contribution to
business intelligent studies.

3 Motivations
There are three major motivations trigger the statement of problem.
The 1st Motivation
With the software application error log file alone, it may not be adequate for analysis to
identify the root cause of software application error if the cause is outside the software
application layer. The impacts are shown along with the involved components.
A Prescriptive Analytical Logic Model Incorporated 5

Environment Impact
Infrastructure Layer.

i. Operating System fails and running unstable.


ii. Network Communication fails.

Software Application Layer.

i. Software Application Defect.


ii. Web Service fails.
iii. Messaging Queue is full.
iv. Backend agents are not processing the data in the Messaging Queue.
v. Database is not responding.

Equipment Impact
Insufficient of server resources such as CPU, Memory, Disk, Network Card
Bandwidth.
The 2nd Motivation
Time consuming to read through the software application log file manually during
root cause analysis activity. The impacts are shown along with the supporting points.
Management Impact

i. Software applications cannot afford to have downtime as it can impact the business
operation.
ii. High expectation on software application support team by the management to resume
software application service when software application service or certain functions
are unavailable.

People Impact
The time spent on analyzing the software application error manually will be longer if
the input information is taking longer time to analyze before the valid root cause is
identified.
The 3rd Motivation
The root cause analysis activity is conducted by human, it is very subjective to the
person would make a right or wrong judgment on the software application error. The
impact is shown along with the supporting point.
People Impact (Different from the 2nd Motivation)
Experience, Knowledge, Skill - Any wrong judgment on the valid software application
error would lead to a wrong direction to create a useless resolution and eventually end
up with wasting effort and time to fix a wrong software application error.
This has derived the following fish bone diagram to illustrate all the involved impacts
(Fig. 2).
The fish bone diagram illustrates that it has four major impacts contributed to
the statement of problem. These impacts are Management, People, Environment and
Equipment.
6 H. M. Wong et al.

Fig. 2. Fish bone diagram to illustrate issues contributed to the software application malfunction-
ing.

• Management is always looking for effective outcome as they have sat a big amount
as part of the yearly budge of the year to the software application support team
department.
• People is mainly referring to the support team member’s capability whether the person
is capable to analyze the software application error, or even whether the person is able
to work under pressure.
• Environment consists of infrastructure and software application layers. The issues
happened in Environment can lead to the statement of problem would be far more
complicated and hard to identify the root cause of the error, because of the complexity
of the software application running in a multiple tier environment.
• Lastly is the Equipment that is referring to insufficient of server resources will also
lead to the statement of problem.

4 Statement of Problem

The time duration of root cause analysis conducted on software application error carries
crucial impact to the service restoration of business operation.
Explanation: The total time taken to resolve the software application error consists of the
duration for conducting the root cause analysis activity, and the duration for applying the
resolution. The solution may or may not involve the Software Development Life Cycle
(SDLC) activity for developing the fix by depending on the requirements of the fix. The
proposed resolution is focusing on shorten the time consumption on conducting the root
cause analysis activity.
A Prescriptive Analytical Logic Model Incorporated 7

5 Research Objectives
(1) To mitigate prolonging time duration on conducting root cause analysis activity.
(2) To improve accuracy on identifying the root cause whenever error is occurred.

There are different perspectives derived from the two primary objectives and it
is required to be listed down for determination. The points from the three different
perspective are shown as follows:-
Business Perspective

i. To reduce the entire duration of software application downtime by efficiently


identifying the software application root cause.
ii. To mitigate the possibility of re-occurrence on the same software application error.
iii. To bring down the total software application downtime percentage in a financial
year.

Technical Perspective

i. To mitigate prolonging on conducting root cause analysis activity.


ii. To improve accuracy on identifying the software application error’s root cause.
iii. To build experience based on past analyzed result and resolution activities stored.

Knowledge Contribution Perspective

i. To contribute new knowledge on software application error analysis by using Analytic


Hierarchy Process (AHP).

6 Literature Review
According to the past research, Stewart (2012) is focusing on debugging real-time soft-
ware application error using logic analyzer debug macros, whereby Eick et al. (1994)
they are focusing on presenting the error logs in a readable manner. Moreover, Wendy
and Dolores (1993) suggested to focus on error detection in software application at the
time of software development and maintenance. However, Salfner and Tschirpke (2015)
are focusing on analyzing error logs by applying the proposed algorithms in order to
predict future failure. Their software application error analysis approaches focus on soft-
ware application error log obtained from software application database. Some literature
suggested that the software application error analysis would be better if it is built in dur-
ing the software development process. This approach is still within the same application
development boundary without factoring in any other area of concerns. It can cause the
software application failure. In another way of explanation, whenever hardware CPU and
memory utilization is running high, or even storage disk space is running low, software
application logging may not be accurate anymore. Hence, the root cause analysis would
not be accurate to identify the real issue to understand the main reason to cause the soft-
ware application failure. Murínová (2015) had attempted to integrate multiple log files
8 H. M. Wong et al.

from various software monitoring tool and network devices for better root cause analysis
on Web application error. However, there is no proposed model stated in the research.
Even until Landauer et al. (2018), they introduced an unsupervised cluster evolution
approach that is a self-learning algorithm that detects anomalies in terms of conducting
log file analysis. However, this approach is under machine learning rather than AHP.
From a different point of view, this approach is good because it can be adopted into the
proposed model to detect the software application error. Hence, this is a great potential
to propose a logic model to research a new approach towards developing an algorithm
for software application error analysis. At the same time to contribute new knowledge
in the area of software application root cause analysis using AHP. By comparing the
above secondary data with the proposed logic model, it can be noticed that the focus
boundary on software application analysis. The technique to identify the root cause of
software application is different. They focus on software application boundary whereby
the proposed model focuses horizontally on all possible boundaries. In addition, due to
the focus boundary is different, it leads to the technique to identify the root cause of
software application also different.
On the other hand, there is a valid question such that why the PAL does not incorporate
Machine Learning instead. According to Klass (2018), the simple definition of Machine
Learning is that the algorithm in an IT system has the ability to independently find
solutions to problems by recognizing patterns in databases. Which means, the required
data must be fed into the IT system and processed under the algorithm in advance in
order to recognize the patterns in the data stock with the predefined definitions. Lastly,
the IT system must also contain the following unique abilities as the requirements, which
are:-

i. To find, to extract and to summarize the relevant data.


ii. To make predictions based on the analysis data.
iii. To calculate probabilities for specific results.
iv. To adapt to certain developments autonomously.
v. To optimize processes based on recognized patterns.

By referencing to the definition and requirements of Machine Learning, and com-


paring to PAL. PAL does not have the full abilities like Machine Learning but it has only
partial unique abilities. Such as i and v. PAL has the algorithm to make decision over
the valid error and preferred resolution targeted to the valid error. On the other hand,
PAL has the ability to pick up the uncommon error, and provide suggested actions based
on the analysis result across multiple log files at the time of software application error
occurred. Although at the beginning stage, human is involved to respond to the uncom-
mon error. Even the human may require to perform fine tuning to the configuration file
of the PAL for better handling the uncommon error. PAL will still improve itself from
event by event to recognize the uncommon errors and turn them to become known errors
to PAL.
The following table provides the feature comparison between Machine Learning and
PAL (Table 1).
Machine Learning is required to scan through the entire database and pick up the
data based on the recognized patterns. With the recognized patterns, it then applies its
A Prescriptive Analytical Logic Model Incorporated 9

Table 1. The feature comparison between Machine Learning and PAL.

Activity no. Machine learning PAL


1 Defined algorithm Defined algorithm
2 Recognizing patterns in databases Recognizing patterns in log files
3 To find, to extract and to summarize the To find, to extract and to summarize the
relevant data relevant log events based on error event
occurring timing
4 To make predictions based on the Optional feature for future works
analysis data
5 To calculate probabilities for specific Not available
results
6 To adapt to certain developments Not available
autonomously
7 To optimize processes based on To optimize root cause analysis after
recognized patterns successfully recognizing uncommon
error becoming known error along with
preferred resolution

unique abilities. However, by comparing Machine Learning with PAL, there are certainly
differences.
The primary objective of PAL is to mitigate prolonging on conducting root cause
analysis activity. Hence, to eliminate unnecessary log scanning activities must be avoid-
able during the root cause analysis. Indeed to fulfill the primary objective, the following
approaches of PAL are proposed as follows:-

• Using the “time” of software application error event when it occurred as the key to
extract out log events from all the related logs.
• Extract only the exact amount of input information is important. Then, scan the error
only from the extracted amount of log rows.
• Standard error events are easily classified based on keyword, except for those unknown
error events.
• The PAL’s standard analysis module does the specific action based on the specific
error event occurred.
• The PAL’s analysis activity is based on the configurations of “Standard” and “Com-
plex” analysis modules together with the studies of past analysis and applied resolution
retrieved from the proposed model’s knowledge-based database.
• The situation can be happened such as more than one possible resolution is applicable
to resolve the identified root cause. Decision making is required.
• All the current analysis activities and resolution steps will be stored into a knowledge-
based database for the future reference.
• PAL is trained by the real data sponsored by SRM, IBM.
10 H. M. Wong et al.

Based on the given primary objective of PAL, and along with the proposed
approaches. The detail feature differences between Machine Learning and PAL can
be further compared into the following Table 2.
With the comparisons, although PAL has certain similarities comparing with
Machine Learning. However, the primary objective and approaches are different. There-
fore, PAL cannot be categorized to have Machine Learning intelligent, but it has the
ability to make decision using AHP approach to fulfill the research objective, i.e. to
mitigate prolonging on conducting root cause analysis activity. Indeed, the proposed
algorithm in PAL is aiming to handle ad-hoc error with immediate action rather than
spending longer time to recognize the error pattern or to perform error prediction.

7 Research Proposed

With a server (regardless it is physical or virtual) box, you have multiple layers. Most
common logs that are required is:-

i. System monitoring log for server resources such as CPU, Memory and Hard Disk
usage.
ii. Network monitoring log for the server such as network communication within the
Local Area Network (LAN).
iii. Operating System event log for server.

The illustration of multiple layers for a server can be referred to Fig. 1.


On the other hand, the software application especially for those that are rated at
enterprise level category, it involves multiple tiers such as Web Client tier, Web Container
tier, Application Container tier, and Database tier. Beside the Wen Client tier, each tier
has its own log file. Certain tiers are even having multiple log files based on the software
application design. Hence, the proposed research is to develop an algorithm towards
to a prescriptive analytical logic model for analyzing software application error. The
analysis is based on the logs retrieved from various software applications by referring
to the following figure.

7.1 Proposed Research Scope

The proposed scope of this research is to define the algorithm. The algorithm consists of
simple and complex analysis inside the prescriptive analytical logic model for software
application error analysis. Therefore, by having the proposed logic model in the pro-
duction environment, the logic model is required to react to software application error
when the error is detected in the software application log file. With this logic model, it
is also required to retrieve other related log files through various software applications
shown as Fig. 3. The proposed algorithm mainly consists of two analysis areas, which
are simple and complex analysis to form a prescriptive analytical logic.
A Prescriptive Analytical Logic Model Incorporated 11

Table 2. The detail feature differences between Machine Learning and PAL.

Activity no. Machine learning PAL


1 Scan the entire database and pick up the a. Use exact “time” of software
data based on the recognized patterns application error event when it
occurred as the key to extract out log
events from all the related logs based
on 5-min-before-and-after rule
b. Extract only the exact amount of
input information is important.
Then, scan the error only from the
extracted amount of log rowsc.
c. Standard error events are easily
classified based on keyword stored
in the configuration file, except for
those unknown error events
2 To find, to extract and to summarize the d. Root cause analysis is conducted
relevant data based on the configurations of
“Standard” and “Complex” analysis
modules together with the studies of
past analysis and applied resolution
retrieved from the proposed model’s
knowledge-based database
e. For “Standard” error first time
occurrence, resolution steps are
applied based on the “Standard”
analysis module
f. For “Standard” error re-occurrence,
resolution steps are applied based on
the “Complex” analysis module
g. For “Complex” error (or
undetermined error), the decision of
either applying resolution steps or
producing analysis report are carried
out based on the predefined
configurations stored in the
configuration file
3 To optimize processes based on h. All the current analysis activities
recognized patterns and resolution steps will be stored
into a knowledge-based database for
the future reference
i. The information stored inside the
knowledge-based database is served
as one of the input information of
“Complex” analysis module
12 H. M. Wong et al.

Fig. 3. The proposed software application analysis algorithm will analyze across multiple
databases.

7.2 Proposed Simple Analysis


For simple analysis area, it is required to build the predefined logic to handle the com-
mon software application error, whereby this model is to guide the system builder on
answering a set of predefined questions on common software application errors and carry
out the predefined activities only react to these common software application error, for
example, restarting the software application process if it is stopped.

7.3 Proposed Complex Analysis


For complex analysis area, it is required to build a logic which collects necessary log
events as data from the involved software applications. The collected data will serve as
input information at the initial stage. With the collected data, this model will base on
the past incidents determined as the system behavior. By combined with the predefined
templates, the automated analysis activities will be triggered and finally generate the
analysis outcome along with the suggested resolution steps and action to the IT support
team. This complex analysis would have three different modes which are “manual”,
“semi-auto” and “fully-auto” offered to the IT support team. As for the complex analysis
A Prescriptive Analytical Logic Model Incorporated 13

area, by predicting the software application behavior, it performs the suggested steps
and carry out the action against the software application error based on the analysis.
This will prevent future application failure based on the permission given to the offered
mode by the IT support team.
By focusing into the re-occur software application errors, these errors occur in a
specific pattern or feature, and the solution is often straight forward (can be applied after
validating the specific pattern or feature) to resolve the incidents. The human involvement
on this type of incidents would require less analysis but more on validating activities.
Hence if the validating activities can be predefined into a checklist, the logic model can
pick up the ultimate predefined solution and react to the incident automatically. This can
be achieved by the combination of the answers (yield from the validating activities in
the checklist). This would be the preferred method in the logic model that handles the
common software application incidents. We call this logic as simple analysis. The same
simple analysis logic can be applied to manage Server (a physical or virtual box running
a vendor Operating System) or even Networking devices (such as switch or router) if
they have incidents occur in the specific pattern or feature.
The software application errors which have no uniform pattern or feature, for this
type of software application errors. The percentage of human involvement is high. This is
because the person who handles the incident requires to obtain the software application
log files and to search any similar error logged in the past. We call these files and
records as input information. With the input information obtained, the person conducts
the analysis activities before the person can identify the software application error root
cause. Only the preferred resolution steps is agreed then it is applied to resolve the
software application error.
For the first time occurring software application error. If both yielding input infor-
mation activities and analysis activities can be automated. Base on the outcome of the
analysis activities, human expects to see a list down of each possible root cause along
with the proposed resolution steps in a complete list. Then, the decision is on the per-
son to choose which is the preferred option. If the person chooses to proceed with the
suggested resolution steps, then the person will receive the final question. The question
is expecting the response from the person, whether agrees to let the automated activities
execute the same suggested resolution steps automatically in the future if the same inci-
dent occurs again. Of course, this logic has the ability to handle unpredictable software
application errors by performing simulated analysis activities comparing with human,
we call this logic as complex analysis.
Whenever the complex analysis is triggered. It will pull the related logs based on
specific time frame (duration) before and during the software application failure from
various application logs. These logs are:-

i. Software Application logs is the beginning to trigger the root cause analysis,
ii. Configuration management logs is for understanding any recent applied software
application patches or Operating System patches,
iii. Performing and capacity monitoring logs is for identifying any hardware resources
running insufficient, and
iv. Production support ticketing tool logs is for cross-checking any related issue recently
occurred under the predefined database scheme.
14 H. M. Wong et al.

These above logs as input information will be utilized crucially for root cause analysis
to resolve the software application issue.
Indeed, the simple analysis can be existed independently at the initial stage. How-
ever, when the specific number of reoccur incidents hits. The complex analysis will be
activated to perform the required analysis activities automatically. It will produce the
complete analysis report and suggestion(s). Base on this suggested design, the complex
analysis would have a loosely but it is fairly important relationship with the simple
analysis. This is because the complex analysis needs to understand how many times the
simple analysis has handled the same incidents in the past. This information is crucial
to make a decision on suggesting the reasonable resolution steps to the human after the
complex analysis produces the analysis report.

7.4 Proposed Algorithm, Architecture Design, and Solution Modeling


The proposed algorithm under the Prescriptive Analytical Logic Model includes the
crucial activities in the following Table 3.

Table 3. The proposed process activity under proposed algorithm.

No. Algorithm
1 with the granted permission, retrieve and/or integrate various log files obtained from all
involved software application log files/databases
2 Identify whether the newly reported software application error is first time occurrence or
re-occurrence by cross-checking the database which is associated to the prescriptive
analytical logic
3 Identify possible log data and select the necessary log data for analysis under the defined
software application error classification
4 Allocate weight to each possible software application error based on Analytic hierarchy
process (AHP)
5 Shortlist the software application error under the highest weight
6 Analyze the selected log data for shortlisted software application errors and define
possible resolution option
7 Allocate weight to each possible resolution option based on AHP
8 Shortlist the preferred resolution option under the highest weight
9 Deploy the preferred resolution option to fix the software application error under the
predefined condition
10 Store the analysis result and resolution action into a database which is associated to the
prescriptive analytical logic for future reference and knowledge base activities

The architectural design of the PAL is derived from the proposed algorithm and the
Fig. 4 is shown as follows:-
The PAL algorithm design consists of simple and complex analysis design, proposed
analytic hierarchy process design and knowledge based database design. From the simple
A Prescriptive Analytical Logic Model Incorporated 15

Fig. 4. The architecture design of prescriptive analytical logic model.

and complex analysis design, it further derives to top-down and bottom up design. All of
these designs will form PAL algorithm design as the complete model design. The PAL
consists of two configuration files that are the brain of the PAL to identify the known
errors and the action of the preferred resolution. This can be explained bu using the
process flow design of PAL (Fig. 5).
The process flow design of PAL:-
The Process Flow Design explains the use of the configuration files (first and second)
during the execution of the PAL. First configuration file is for error cross-reference
and the second configuration file is for carrying out the preferred action based on the
recognized error. The entire flow is explained as follows:-
Process 1
Use any existing market approach to detect Software Application error. This is because
the PAL should not re-invent the wheel. It should utilize the existing available approach
from the market for software application detection.
Process 2
Validate the new found Software Application error (Cross check with the first Configu-
ration file). The first configuration file contains the information regarding to the involved
software application, databases, and the knowledge based database.

• Based on the date and time of the new found Software Application error, PAL extracts
the events from the involved software application and databases to form a dataset.
• Then, based on the new found software application error as well as any error found
in the dataset as per the given date and time, PAL can cross-reference from the first
configuration file to identify out whether it is a new error or known error. Which
means, PAL will require to map out any error defined in the first configuration file.
• Based on the defined error to identify the new found error is actually a known error
in either an Alert, Warning or Valid Error category, or it is unidentified and really a
new found error.
Another random document with
no related content on Scribd:
prospects again began to dawn upon him. He again mingled in the society
of the village; and the dictator’s chair in the chimney-corner, which had
been vacated during this short interregnum, was given up to him cheerfully.
He was beloved, esteemed, looked up to, by every one. Another
circumstance, too, seemed likely to add to his happiness: he fixed his
affections on a young woman, the daughter of an inhabitant of the place; his
passion was returned with interest, and the latter opposed no obstacle to its
gratification.
On a sudden his whole appearance and behaviour was altered. He
seemed as if awaking from a delightful dream; nothing which he had loved
or pursued appeared to have charms for him any longer. When he was
questioned as to the cause of his depression, he hinted obscurely that “it
was no matter; the infamy which his parents had heaped upon him he would
bear alone; he would entangle no one else in the misery which was and
must be his own portion.” This was all the explanation he gave; but it was
enough to show that he had given himself up to the dominion of a morbid
sensibility, which must finally be his destruction.
He ceased to lead, as he formerly was wont to do, the opinions and
pursuits of his neighbours. They had always bowed to his criticisms, his
logic, his lectures; but criticism, logic, and lectures were now silent. He
would sit in the chair of dignity hour after hour, and utter no word:
sometimes, however, he would appear to shake off, with a painful struggle,
the feelings which oppressed him, and would break out suddenly into
flashes of a broad but irresistible humour, which Burns, in his brightest
moments, could not have surpassed; and then he would relapse again into
gloom and taciturnity. But his mind, thus kept in a state of continual
agitation and excitement, was sinking fast beneath it. The girl, too, whom
he loved, was wretched through his refinement of passion. She believed
herself slighted, and her coldness aggravated his torments. This could not
last! It did not.
One day he did not make his appearance in the village. One of his
friends, going to his cottage, found the door fastened; and, upon calling,
received no answer. The neighbourhood became alarmed; and several of his
acquaintance searched in vain for him. He was not by the stream, where he
often sat in solitude till the noxious dew fell round him; nor in the grove,
where he used to listen to the nightingales till fancy filled up the pauses in
their songs; nor by the window, where he would stand and gaze
unconsciously till the sight of that dear face drove him from the scene of
enchantment. At last they forced open his door; I entered with them. The
poor youth was sitting at his writing-table, in his old patron’s armchair; the
pen seemed to have just fallen from his hand; the ink on its nib was hardly
dry; but he was quite still, quite silent, quite cold.
His last thoughts seemed to have been spent upon the stanzas which
were on the table before him. I will transcribe them, rather as an illustration
of his story than as a specimen of his talents. Some of the lines gave rise to
a conjecture that he had been the author of his own death, but nothing
appeared to warrant the suspicion.

I have a devil in my brain!—


He haunts me when I sleep,
And points his finger at my ρain,
And will not let me weep:
And ever, as he hears me groan,
He says the cause is all my own.

I shall be calm anon!—I had


A pleasant dream of bliss;
And now they tell me I am mad—
Why should I mourn for this?
My good, kind parents! Answer ye,
For what I am, and am to be.

Alas! I have forgotten, dear,


The pledging and the vow;
There is a falsehood in my tear,
I do not love thee now:
Or how could I endure to go,
And look, and laugh, and leave thee so?

Thou shall not come to my caress,


Thou shalt not bear my name;
Nor sorrow in my wretchedness,
Nor wither in my shame;
Mine is the misery and the moan,
And I will die—but die alone!

Him too I saw carried to his narrow dwelling-place. In his latter days he
had been regarded by his companions with a kind of superstitious awe; and,
as his coffin fell with its solemn, reverberating sound, into its allotted space,
the bearers looked upon each other with an expression of conscious
mystery, and many shook their heads in silence. I lingered round the spot
when they departed, and planted a rose upon his humble mound.
I was to leave the village the next day in order to fix my abode among
the haunts of busy men. In the evening, feeling a melancholy which I could
not shake off, I took up my hat and wandered towards the churchyard. From
a distance I perceived a bright and delicate figure hastily retiring from my
approach. I leaned over the remains of the kind, the enthusiastic, the
affectionate! The rose which I had planted there glistened beneath the
moon. It was not the dew: it was something more clear, more precious—it
was one beautiful tear! I had rather have such a tear on my grave than a
pyramid of marble.
ON TRUE FRIENDSHIP.

“Infido scurræ distabit amicus.”—Horace.

How very seldom do we find any one who has a relish for real friendship—
who can set a due value upon its approbation, and pay a due regard to its
censures! Adulation lives, and pleases; truth dies, and is forgotten. The
flattery of the fool is always pungent and delicious; the rebuke of the wise
is ever irksome and hateful. Wherefore, then, do we accuse the Fates when
they withhold from us the blessings of friendship, if we ourselves have not
the capacity for enjoying them?
Schah Sultan Hossein, says an old Persian fable, had two favourites.
Mahamood was very designing and smooth-tongued; Selim was very open
and plain-spoken. After a space, the intrigues of Mahamood had the upper
hand, and Selim was banished from the court. Then Zobeide, the mother of
the Sultan’s mother, a wise woman, and one learned in all the learning of
the Persians, stood before the throne, and spoke thus:—
“When I was young I was said to be beautiful. Upon one occasion a
great fête was to be given. The handmaids dressed my hair in an inner
apartment. ‘Look,’ said one, ‘how bright are her eyes!’ ‘What a
complexion,’ said another, ‘is upon her cheeks!’ ‘What sweetness,’ cried a
third, ‘in her voice!’ I grew sick of all this adulation. I sent my woman from
me, and complained to myself bitterly. ‘Why have I not,’ I cried, ‘some
friend on whom I can rely; who will tell me with sincerity when the roses
on my cheeks begin to fade and the darkness of my eyebrows to want
colouring? But alas! this is impossible.’
“As I spoke, a beneficent Genius rose from the ground before me. ‘I
have brought thee,’ he said, ‘what thou didst require: thou shalt no longer
have occasion to reproach the Prophet for denying thee that which, if
granted, thou wouldst thyself destroy.’ So saying, he held forth to me a
small locket, and disappeared.
“I opened it impatiently. It contained a small plate, in shape like a
horseman’s shield, but so bright that the brightness of twenty shields would
be dim before it: I looked, and beheld every charm upon which I valued
myself reflected upon its surface. ‘Delightful monitor!’ I exclaimed, ‘thou
shalt ever be my companion; in thee I may safely confide; thou art not
mercenary, nor changeable; thou wilt always speak to me the truth—as thou
dost now!’ and I kissed its polish exultingly, and hastened to the fête.
“Something happened to ruffle my temper, and I returned to the palace
out of humour with myself and the world. I took up my treasure. Heavens!
what a change was there! My eyes were red with weeping—my lips
distorted with vexation; my beauty was changed into deformity—my
dimples were converted into frowns. ‘Liar!’ I cried, in a frenzy of passion,
‘what meanest thou by this insolence? Art thou not in my power, and dost
thou provoke me to wrath?’ I dashed my monitor to the earth, and went in
search of the consolation of my flatterers!”
Zobeide here ceased. I know not whether the reader will comprehend the
application of her narrative. The Sultan did—and Selim was recalled.
THE COUNTRY CURATE.

“Tenui censu, sine crimine notum,


Et properare loco, et cessare, et quærere, et uti.”—Hor.

It was with feelings of the most unmixed delight that on my way to the
north I contemplated spending one evening with my old friend Charles
Torrens. I call him my friend, although he is six or seven years my senior;
because his manners and his habits have always nearly resembled those of a
boy, and have seemed more suitable to my age than to his. Some years ago,
partly in consequence of his own imprudence, the poor fellow was in very
low circumstances; but he has now, by one of those sudden freaks of
fortune which nobody knows how to account for, become sleek and fat, and
well-to-do in the world; with a noble patron, a pretty wife, and the next
presentation to a living of a thousand a year.
I arrived at the village of —— about sunset, and inquired for the house
of Mr. Torrens. Of the children to whom I applied no one seemed to
understand me at all; at last one of them, a ’cuter lad than his companions,
scratched his head for half a minute, and exclaimed, “Oh! why, sure, you
mean Master Charles, our curate! Gracious! to think of calling him Mr.
Torrens!” I afterwards learned that this hopeful disciple had the office of
looking to the curate’s night-lines. However, he led me to the house,
giggling all the way at the formality of “Mr. Torrens.” I was prepared by
this to find my old acquaintance as warm, and as wild, and as childish as
ever.
His residence was a red brick dwelling-house, which you would call a
house by right and a cottage by courtesy: it seemed to possess, like the
owner, all requisites for hospitality and kindness, and to want, like him, all
pretensions to decoration and show. “This is as it should be,” I said to
myself; “I shall sleep soundly beneath such a roof as this;” and so I threw
up the latch of the garden-gate, and went in. Charles was in the kitchen
garden behind the house, looking at his strawberry beds. I walked round to
meet him. I will not describe the pleasure with which we shook hands: my
readers well know what it is to meet a dear and cherished friend after a long
absence. I know not which was the happier of the two.
“Well,” he said, “here I am, you see, settled in a snug competency, with a
dry roof over my head, and a little bit of turf around me. I have had some
knowledge of Fortune’s slippery ways, and I thank my stars that I have
pretty well got out of her reach. Charles Torrens can never be miserable
while there’s good fishing every hour in the day in his lordship’s ponds, and
good venison every Sunday in the year in his lordship’s dining-room. Here
you see me settled, as it were, in my otium cum dignitate, without a wish
beyond the welfare of my wife and the ripening of my melons; and what
gives my enjoyments their greatest zest, Peregrine, is, that though the road
to them was rather a hilly one, I kept out of the gutters as well as I could.
What is it Horace says, Peregrine?

Neque majorem feci ratione malâ rem,


Nec sum facturus vitio culpâve minorem;—

that is, I did not grow rich like a rascal, and I sha’n’t grow poor like a fool;
though (thanks to my uncle, the Nabob) I can afford to give a young friend
a bed and a breakfast, without pinching myself and my servants the next
week! But, bless me! how I am letting my tongue run on. I haven’t
introduced you to Margaret yet;” and so saying, he took my arm, and
hurried me into his drawing-room. His bride was a very pleasing woman—a
lover might well call her a beautiful one; she seemed about one-and-twenty,
and possessed every requisite to confer happiness upon a husband of my
friend’s wandering habits. She had sufficient good-nature to let him wander
abroad, but she had, at the same time, sufficient attractions to keep him at
home; her forbearance never scolded him for his stay at another’s hearth,
but her good sense always took care to make his own agreeable to him. A
clever wife would have piqued him, a silly wife would have bored him:
Margaret was the aurea mediocritas, and I could see that he was sincerely
attached to her.
The next morning I walked into his library, and was not a little amused
by the heterogeneous treasures which it presented. Paley seemed somewhat
surprised to find himself on the same shelf with “The Complete Angler,”
and Blair, in his decent vestment of calf-skin, was looking with
consummate contempt upon the morocco coat of his next neighbour,
Colonel Thornton. A fowling-piece, fishing-rod, and powder-horn were the
principal decorations of the room.
On the table was a portfolio containing a variety of manuscripts,
unfinished sermons, stanzas, complete in all but the rhymes; bills, receipts,
and recipes for the diseases of horses. Among them I found a little
memorandum-book for 1818: it contained a sketch of his way of life
previous to his accession of fortune. I transcribed four days of it, and hope
he will thank me for putting them in print.
“Monday, 10 o’clock.—Breakfast. Mem. My clerk tells me admirable
coffee may be made with burnt crusts of bread—an ingenious plan and a
frugal! Am engaged to eat my mutton with the Vicar of the next parish, so
that I have leisure to speculate for to-morrow. 12 o’clock.—Rode over to
my Aunt Picquet’s. N.B. A plaguy old woman, but has excellent cherry-
brandy, and all the fruits of Alcinous in her garden. Managed to oblige her
by conveying home some fine pines in a basket. 5 o’clock.—Dinner. Old
Decker, his wife, and young Decker of Brasenose. Mem. Young Decker a
great fool, but takes good care of the cellar. On my return sent my pines to
the Hall (know Sir Harry’s have failed this year), and received, per bearer,
an invitation to join in the eating to-morrow.
“Tuesday.—After breakfast a water-excursion with the Hon. F. Goree.
The poor little fellow very ingeniously fell out of the boat. I contrived to
catch him by the collar in time to prevent him from spoiling his curls; but
he was quite outrageous because I ruined his neckcloth. Eh bien! I lose
nothing, for I never compassed a dinner with the Countess yet. 7 o’clock.—
Dinner at the Hall. A large party. Began my manœuvres very badly, by
correcting a mistake of the old gentleman’s about ‘Hannibal, the Roman
general;’ recovered my ground, unconsciously, by a lucky dispute I had
with his opponent in politics. A good dinner. Hinted how much I preferred a
saddle of mutton cold. Praised the wine and drank it with equal avidity. In
the evening played the flute, joined in a catch, and took a beating at chess
from her ladyship with all imaginable complacency. Have certainly made
great progress at the Hall. Must dance with the Baronet’s daughter at the
ball on Thursday.
“Wednesday.—Wet morning. Nothing to be done. Cold saddle, with
compliments, sent over from the Hall. Pocketed the affront and dined on the
mutton.
“Thursday.—My mare has sprained her shoulder. How am I to get to the
rooms to-night? 1 o’clock.—Walked out. Met young Lawson. Hinted
Rosinante’s calamity, and secured a seat in the curricle. 10 o’clock.—The
curricle called. L. nearly lodged me in a ditch. Au reste, a pleasant drive.
Mem. To dine with him at six to-morrow, and he is to take me in the
evening to a quadrille at the Landrishes’. The rooms very full. Certainly
intended to dance with the Baronet’s beauty. Made a villanous mistake, and
stood up with Caroline Berry. My Roxana avoided me all the rest of the
evening. How stupid! Have certainly ruined myself at the Hall!”
This sort of life must have been very annoying to such a man as Charles
Torrens; however, he has now freed himself from it. “Good-by,” he said, as
we shook hands, and parted; “you’ll come to us again, Perry. I was a harum-
scarum dog when you knew me last; but if the river of life is rough, there is
nothing like an affectionate wife to steady the boat!”
ESSAY ON THE POEMS OF HOMER, AND THE MANNERS OF
THE AGE IN WHICH HE LIVED.
“Philo-Musus” has sent us an essay, of considerable length, upon the
merits and beauties of the Art of Poetry. We are persuaded, however, that of
such merits and beauties none of our readers need to be informed; and
therefore “Philo-Musus” lies at our publisher’s till called for.
We are going, however, to make some observations upon one advantage
to be derived from poetry, which our good friend has altogether omitted. We
mean the power which it possesses of handing down to posterity an exact
picture of the customs and manners of a very distant age. By its aid we can
trace through successive years the variations which gradually take place in
warfare and in letters, in habits and in costume; we can gaze with reverence
upon the superstitions which have become extinct, and smile upon
comparing the nascent follies of the age of demigods with the full-blown
follies of the age of men. Homer, as he stands pre-eminent among the
ancient bards in all other requisites, is equally so in this. Notwithstanding
the force of his numbers, the fertility of his invention, the grandeur of his
story, and the excellency of the moral precepts which are interspersed
throughout it, we are inclined to value him less upon these considerations
than upon the faithful representation which he has given us of the manners
of his heroes. For these reasons we have put his name at the top of this
paper, although in the course of it we shall probably indulge ourselves in
more frequent digressions than ever the old gentleman himself made use of.
To those who had rather have from us a well-digested essay than a series of
straggling remarks, we must say what we have often said before:—“We are
boys, and we have not the presumption to suppose ourselves capable of
criticising the studies, or regulating the taste, of our schoolfellows. Our aim
has not been, and is not, to instruct, but to amuse.” With this preface, we put
our Homer before us, mend our pen, and begin.
The “Odyssey,” which describes the travels and sufferings of an
individual, has, of course, more numerous sketches of private life than the
“Iliad,” the actors in which seem, as it were, to be upon a public stage, and
to stalk in the tragic buskin from one end of the poem to the other. But we
cannot help wondering at the manner in which the poet has so frequently
interwoven in his most gorgeous descriptions some allusion to the
commerce or the arts of his countrymen; his similes, in particular, are
perpetually borrowed from the works of the farmer or the mechanic. Some
have found fault with Homer upon this head, arguing that the images which
he introduces are, in some instances, too mean for the dignity of the epic
style. He has been defended from the charge by abler pens than ours; and
therefore we shall only observe, at present, that allowing these passages to
be blemishes, they are blemishes more valuable to us than the greatest
beauties could have been: if his descriptions of rustic manners are faults,
Homer, like his own Achilles, would be less interesting were he less faulty.
The first observation which occurs to us (for we intend to write, like
sentimental ladies, quite at random) is that the besiegers of Ilium were
ignorant of one of the fiercest pests of modern times, coined money.

Ἔνθεν ἄρ’ οἰνίζοντο καρῃκομόωντες Ἀχαιοἰ,


Ἄλλοι μὲν χαλκῷ, ἄλλοι δ’ αίθωνι σιδήρῳ,
Ἄλλοι δὲ ῥινοῖς, ἄλλοι δ’ αὺτοῖσι βόεσσιν,
Ἄλλοι δ’ ἀνδραπόδεσσι·

Each, in exchange, proportioned treasures gave;


Some brass, or iron; some an ox, or slave.

Not a word in the bargain of pounds, shillings, and pence. If these noxious
ideas had then existed, we should have had the sellers of the wine
exclaiming, in the style of one of our old ballad writers:
Noe pence, nor halfpence, by my faye,
But a noble in gold so round!

And we should have had the buyers replying, in all the lengthy insolence of
Homeric compounds:

I have gold to discharge all that I call!


If it be forty pence, I will pay all.

Again, when Agamemnon endeavours to appease the anger of Achilles


by the offer of sumptuous presents, he presents him with a magnificent list
of the cities in his gift; and, in order to describe the value of them, is
obliged to have recourse to the vague epithets of “εὖ
ναιομένα”—“ποιήεσσαν”—“βαθύλειμον”—“ἀμπελόεσσαν.” Now, if
Ηomer’s heroes had understood anything of coinage, the poet would have
avoided all this circumlocution, and presented us at once with a clear
statement of the yearly revenues, in the style of the above-quoted songster:

For Plumpton Park I will give thee,


With tenements fair beside;
’Tis worth three hundred markes by the yeare,
To maintain thy good cow-hide.

This, however, is mere jesting. The next consideration we shall offer will be
a more serious one. How happy were the men of that age! They had no such
crime as forgery, no discussions about stocks, no apprehensions of a paper
currency. There was no liability to imposition; no necessity for pamphlets.
At the present crisis, when the increase of forgery and the dread of national
bankruptcy occupy so large a portion of public attention, we, in common
with other more practised quacks, come humbly forward with our nostrum.
Is it not “a consummation devoutly to be wished” that Britain would
consent to forego the use of these horrible mischief-workers, these bits of
silver, or of silver paper, and return contentedly to the original method of
traffic, making her payments in oxen or in sheep? The veriest bungler may
forge a shilling, but the veriest adept would find it plaguy difficult to forge
an ox.
If it be true that the ancient Greeks were thus ignorant of stamped money
(for we are only repeating what has been observed upon the subject before
us), it cannot but surprise us that they had made so great a proficiency in
other arts, without the use of what appears in modern times absolutely
indispensable to social intercourse. From the descriptions of Homer they
should seem to have been, in a great measure, in possession of our arts, our
ideas of policy, our customs, our superstitions. Although living at so remote
a period they enjoyed many of our luxuries; although corrupted and debased
by the grossest of religious codes, they entertained many of our notions of
morality: the most skilful artisan, and the most enlightened sage, may, even
in our days, find in the poems of Homer always an incitement to curiosity,
and frequently a source of instruction.
Many a lady of ton (if ladies of ton were in the habit of studying Homer)
would be astonished at learning that her last new lustres would sink into
insignificance by the side of the candelabras of Alcinous:

Χρύσειοι δ’ ἄρα κοῦροι ἐϋδμήτων ἐπὶ βωμῶν,


Ἔστασαν, αἰθομένας δαΐδας μετὰ χερσὶν ἔχοντες,
Φαίνοντες νύκτας κατὰ δώματα δαιτυμόνεσσιν.

Refulgent pedestals the walls surround,


Which boys of gold with flaming torches crowned;
The polished ore, reflecting every ray,
Blazed on the banquets with a double day.

Nor would she be less amazed, upon turning from these inanimate
attendants, and learning the number and duties of the housemaids:
Πεντήκοντα δέ οἱ δμωαὶ κατὰ δῶμα γυναίκες, κ. τ. λ.

Full fifty handmaids form the household train;


Some turn the mill, or sift the golden grain;
Some ply the loom; their busy fingers move
Like poplar-trees when Zephyr fans the grove.

Indeed, throughout his whole description of the palace and gardens of


Alcinous, the poet seems, to have expended all his ideas of luxury and
magnificence. The colouring of the picture must of course be supposed to
be much heightened by the graces of fiction and ornament; but nevertheless
the objects of it must certainly have been sketched from the manners and
usages which were before the eyes of the designer. Upon the first of these
passages it is to be observed that the Greeks of those days were ignorant of
any contrivance in the way of lamps: they banqueted or deliberated by the
light of fires or the blaze of torches—rude even in their refinements and
barbarous in their most surpassing splendour. As to the fifty housemaids,
we must recollect that it was necessary to retain a great number of female
attendants, where the women had the charge of almost every menial
employment, and the males seemed to live for little else but pleasure and
war.
One example we may derive from the rude manners of that age, which it
would be well if the more polished society of this would remember and
imitate: we allude to the constant reliance which was placed upon religion
in affairs of every kind. No voyage was commenced—no war undertaken—
no treaty concluded—without a recurrence of sacrifice and ceremony.
Hence the extraordinary sanctity which was always attached to the persons
of their priests; hence also the veneration which was paid to their poets; for
as the themes of their earliest songs were generally the praise or the actions
of some member of their multifarious mythology, the celebrators partook of
the honours which were paid to those whom they celebrated; and the verse
which flowed in the name of any of their divinities was supposed to proceed
from their immediate inspiration. Princes therefore generally retained in
their household a bard or sage (for the terms were nearly synonymous),
though we are not so wicked as to suppose that the office of fool, among the
ancient Saxons, bore any analogy to that of bard among the ancient Greeks.
There is an example of this custom in the opening of the “Odyssey” which
has always pleased us very much. The poet has been describing the
debauchery and insolence of the suitors of Penelope—

A brutal crowd,
With insolence, and wine, elate and loud.

And when his readers are disgusted by the extravagance and luxury which
revels in the property of another, he introduces, by way of relief to the
glaring colouring of the rest of the picture, the person of an old man, who
still retains the post which he had held under Ulysses, and is compelled
reluctantly to sweep the strings of his lyre by the mandate of the dissolute
usurpers:
Κήρυξ δ’ ὲν χερσὶν κίθαριν περικαλλέα θῆκε
Φημίῳ, ὄς ῥ’ ἤειδε παρὰ μνηστῆρσιν ἀνάγκῃ·
Ἦτοι ὂ φορμίζων άνεβάλλετο καλὸν ἀείδειν·

To Phemius was consigned the chorded lyre,


Whose hand reluctant touched the warbling wire;
Phemius, whose voice divine could sweetest sing
High strains, responsive to the vocal string.

This, however, is a custom by no means peculiar to the Greeks. We know


that each of the Highland clans retained a bard expressly for the purpose of
celebrating the clan and its chief. We imagine we have seen something of
the same kind mentioned relative to the American and Indian tribes.
The subject of the “Iliad” of course calls forth long and spirited
descriptions of the mode of warfare in use among the ancient Greeks. This
appears to us to exhibit plainer marks of barbarism than any other part of
their character. They had all the untutored ferocity, the dependence on
personal strength or courage, which is characteristic of the earliest ages,
without the studied manœuvres and the laboured machines which malicious
invention afterwards introduced. The greatest quality inherent in a
commander was not skill of head, but strength of limb; few seemed to lay
claim to any nobler distinctions than those which were to be found in the
space between their shoulders. We know not whether the rude struggling of
these uncultivated warriors is not a more interesting spectacle than the cold-
blooded massacres of modern days. In the hand-to-hand conflict of two
princes there is passion, and fury, and enthusiasm, for which we look in
vain to the cold and calculating tactics of l’art militaire.
The war, indeed, of those times was naturally deficient in everything
technical or scientific. It abounded in instances of individual devotion and
of desperate enterprise, but had no means of supplying by art the defect of
numbers, or of overcoming an obstinate enemy by a regular siege. It rather
resembled the foray of a few pillaging tribes, than the contest between two
powerful nations.
We shall see nothing to wonder at in this their undisciplined warfare,
when we remember that piracy, which it so nearly resembled, was a mode
of life to which they were greatly addicted. They saw in it nothing
dishonourable; but on the contrary esteemed it a brave and worthy
employment: their greatest heroes exercised it without the smallest scruple.
They rather gloried in their robberies, and recounted with a feeling of pride
their achievements and their plunder. Here again there is a manifest
similarity between their ideas and those of the Highland clans. We do not
know indeed if a very close parallel might not be drawn between the
greaved Greek and the plaided mountaineer. We shall throw out a hint or
two upon the subject, and recommend the plan to Mr. Golightly, if he
wishes to be witty in our next Number.
In the first place, the love of rapine which we have just mentioned is
inherent in both: the towns which fall beneath the ravages of the Greek are
probably little superior in importance to the villages which excite the
cupidity of the Scot. Both nations possess the same romantic notions of
individual bravery: both value their booty rather from its being the prize of
battle, than from the weight of the gold, or the number of the cattle, of
which it consists. And to say the truth, when we behold, on the one side,
Achilles retiring from his conquests, with his captives, and his treasures,
and his beeves; and when we see, on the other, the chieftain of some kilted
clan returning to his native fastnesses, and driving the fat of the land before
him, we hardly know which of the two cuts the more respectable figure.
Why do we attach such splendid ideas to the terror of Troy? His rival is a
more picturesque object for the design of the painter, he is as muscular a
model for the chisel of the sculptor; but the piracies of the Mountaineer will
never be celebrated like the piracies of the Myrmidon; for, alas! Gaelic will
never sound so classical as Greek!
Many of the superstitions of the one nation bear a striking resemblance
to those of the other. Both of them believe that their sages have the faculty
of foreseeing and predicting future events; both of them place great reliance
on signs and auguries; both imagine that the soul exists after death, and that
it continues to take an interest in the pursuits and the friends whom it left
upon earth. Much as we are attached to the fooleries of our old friends
before Troy—to the victims, and the priests, and the oracles, we must
confess that, to our taste, the plaided seer, rapt up in his vacant trance of
second-sight, is a more interesting and a more poetical object than all the
mummeries of Delphos or Dodona. But there is one point in this legendary
species of religion, in which the similarity appears to us rather remarkable.
We allude to that extraordinary union of the opposite doctrines of free-will
and predestination, which so forcibly obtrudes itself upon our notice in
examining the traditions of both countries. To discuss this point at any
length would require a greater portion of time than we can devote to it; and
we shall therefore content ourselves with observing that the fabulous self-
devotion of Achilles, who is said to have remained at Troy, although
conscious that he was destined to die there, appears to us to have taken its
rise from those notions of an unavoidable fate which Homer so frequently
expresses. But this trait, which, as has been often observed, adds such an
exalted merit to the character of the hero, has many parallels in the conduct
of the Scottish clansmen, whose chieftains we frequently find going with
alacrity to battle, although feeling a consciousness that they are seeking
their death. But look you there again!—the self-devotion of the
Mountaineer will never be celebrated like the self-devotion of the
Myrmidon; for, alas! Gaelic will never sound so classical as Greek!
Another conspicuous ingredient in the character of both is the pride
which both take in ancestry. The Greek and the Highlander take an equal
delight in tracing the river of their blood through distant generations,
although we fancy that the latter pays rather the most attention to the purity
of the stream. When he looks over the tree of his genealogy, and exults in
the glorious names which he finds among its foliage, his feelings are not the
less honest, nor his happiness the less fervent, because he sees no Jupiter in
the root and no Venus perched among the branches. And truly we do not see
why the descent of the Greek is of greater moment than the descent of the
Scot, except that patronymics in ides, and ion, and iades have certainly a
nobler sound than plain, simple, unsophisticated Mac. But look you there
again!—the ancestry of the Mountaineer will never be celebrated like the
ancestry of the Myrmidon; for, alas! Gaelic will never sound so classical as
Greek!
When any important quarrel calls for a union of the forces under their
numerous petty princes, the gathering of the Greek nations is precisely the
gathering of the Highland clans. In both the Commander-in-chief is chosen
by the vote of the assembled leaders; in both, his authority is cramped and
frustrated by the exclusive allegiance which is owed by each separate clan
to its respective chieftain. In both, as may be supposed from the ill-
concocted materials of which both armies are composed, quarrels and
dissensions are perpetually taking place. And why are not the disputes of
the tartans as worthy of song as the disputes of the spears and the helmets?
They often arise from the same passions; they often spring from equally
insignificant causes; they often lead to equally tragical results. But look you
there again!—the quarrels of the Mountaineer will never be celebrated like
the quarrels of the Myrmidon; for, alas! Gaelic will never sound so classical
as Greek!
We might go on to trace the simile, in the same strain, through many
other qualities and customs. We might instance their mutual fondness for
athletic exercises—the absolute authority exercised by the chiefs over the
persons of their followers—the belief prevalent among both nations of the
efficacy of music and charms in the cure of wounds—the custom of being
constantly attended by large dogs—the union of heart and hand, which in
both cases exists between the chief and his foster-brother. But this is idle—
the tout-ensemble of the Mountaineer will never be celebrated like the tout-
ensemble of the Myrmidon; for, alas! Gaelic will never sound so classical as
Greek!
And now that we come to the end of what ought to have been ended a
page ago, we recollect that we have been wandering through a great tract of
paper; and we hear Mr. Golightly bellowing in our ears a reproof, in which
we fear our readers will join him: “Mr. Swinburne, Mr. Swinburne, Quid ad
rem?”
THE WEDDING:

A ROMAN TALE.

“Oh! snatched away in beauty’s bloom,


On thee shall press no ponderous tomb!”
Byron.

By the side of the Latin Way, amidst many other mementoes of fallen
greatness or faded beauty, there arose a small pillar of white marble, bearing
neither emblem nor inscription. The singular simplicity of its appearance
frequently excited the attention and inquiries of the passers-by, but no one
gratified their curiosity. She whom that marble commemorated was known
to few; and those who remembered her told not of her virtues, for they
shrank from the pain they felt in the recital.
Julia was the daughter of distinguished and wealthy parents, in the reign
of Tiberius. She was an only child, and had been educated with the fondest
attention. When she attained her eighteenth year she was very beautiful: she
was taller than most women; her nose was aquiline, her hair dark and
glossy; the smile that played on her lips was provokingly arch, and in her
large blue eyes dignity was inexpressibly combined with tenderness. The
qualities of her heart were not inferior to those of her person; so that it is
not to be wondered at that the hand of Julia was solicited in marriage by the
heirs of many of the first families in Rome.
But she had early given away her affections to the son of her father’s
brother. Young Cœlius was younger than his cousin, and fortune had given
him a lower station in life and a humbler property. He was very handsome,
however, very accomplished, and perfectly amiable; so that the parents of
Julia made no difficulty of acceding to the match. The preliminary
ceremonies had been gone through: the hallowed straw[5] had been broken
between the young couple; the dower had been settled; the augurs had been
consulted, and had returned a favourable answer. Finally, Cœlius had
presented to his future bride the sacred ring which was to be the pledge of
their eternal affection. It was a plain circle of gold, with the inscription “in
æternum!” It was customary to put these rings upon the fourth finger of the
left hand, because it was imagined that a vein ran immediately from that
finger to the heart. It was a foolish superstition, but Cœlius was observed to
shudder when Julia placed her ring upon the wrong finger.
One of the rejected suitors of Julia was a favourite with the Emperor.
When our tale is of a creature so pure and so unhappy as Julia, we cannot
waste our time in describing the characters of the wretches by whom her
death was effected. It is enough for our purpose to say that Marcius made
use of the influence he possessed in such a manner that the father of Julia
trembled for his fortune and his life; he began to retract the engagements by
which he was bound to his nephew, and to devise plans for the marriage of
his daughter with the court favourite.
Cœlius was an orphan. He had been educated under the same roof with
Julia; and his guardians had hitherto been amply repaid for the expense of
his maintenance by the reflection that they were instructing the husband of
their child. Now, however, they began to be vexed by having him always
before their eyes; they saw that the accomplishment of their scheme was
impossible while he remained with their daughter, and they prepared to
remove him. The union of those affectionate hearts was procrastinated for a
long time upon various pretences; at last the young man was sent, in order
to complete his education, upon a tour, with permission to return in a year
and claim his betrothed bride.
The year passed sadly away. He was forbidden to keep up any
correspondence with his cousin until its expiration. At last the happy June
arrived which allowed him to return—which permitted him to meet the gaze
of those bright eyes, in whose sight only he seemed to live. He flew to
Rome on the wings of expectancy!
As he approached the dwelling-place of his hopes, his thoughts, his
happiness, circumstances occurred which filled him with the gloomiest
forebodings. Several of his young acquaintance, when they met him, shook
their heads, and endeavoured to avoid his address. As he passed by the
mansion of his once-contemned rival, he observed a slave clad in unusual
finery; and “What!” he said, “is Marcius to feast the Emperor to-day?”
“Marcius,” said the slave, “will feast a fairer guest—he will bring home his
bride to-night!” Cœlius started as if a viper had crossed his path; but he
recovered himself immediately. “It was but a suspicion!” he said, “and I
will have done with it!” He said no more, but ran on with desperate
impetuosity to the well-known door. He heeded not the malicious rumours,
and the compassionate whispers, which were circulated around him: with a
fluttering heart and faltering step he hurried to the chamber which had been
the scene of their last parting. As he put his hand upon the door, a thousand
visions flocked upon his brain. “Then she was good, and affectionate, and
beautiful, and true; and she looked upon me so tenderly, and spoke to me so
kindly;—and now, will her look be as tender, and her voice as kind? I will
be in suspense no longer!” He thrust open the door and stood in her
presence.
She was sitting at the window, half-shaded from his view by some
beautiful orange-trees. She did not seem to have observed his entrance; for
she did not rise from her seat, nor move her head from the delicate white
hand which was supporting it. “Julia!” he cried, in a voice of the wildest
passion; but she did not stir. “Julia,” he said, coming nearer, and speaking in
a calmer tone; still she was motionless. “Julia,” he whispered gently,
bending his head over the orange-blossoms. Their lips almost met; she
started from him as if from profanation. “Cœlius!” she exclaimed, “this
must not be! I have broken the holy cake[6] with another! To-night I shall be
the wife of Marcius.”
He lifted his hands to Heaven; a curse rose to his lips. “May the vows
you have falsified—may the hopes you have blighted—may the heart you
have broken—— But no, Julia,” he continued, as he gazed upon her rayless
eye, and her colourless cheek; “you have suffered much—and I cannot—I
cannot reproach you!” He hid his tears with his hands, and rushed into the
street.
She had indeed suffered much! Her face had become pale and emaciated,
her step melancholy and slow: she no longer took her wonted care in
arranging her dress, or setting in order her luxuriant hair; but this was not
the alteration which had shocked her unfortunate lover—it was the languor
which had succeeded to her natural liveliness, the despondency in her every
accent, the absence of soul in her every look!
The evening came, and the ceremony was near at hand. Julia suffered her
attendants to adorn her, reckless herself of the pains they took and the
decorations they bestowed. They put upon her a long white robe, quite
plain; it would have well set off the bloom of her loveliness, but upon the

You might also like