100% found this document useful (5 votes)
67 views65 pages

Software Engineering Perspectives in Intelligent Systems: Proceedings of 4th Computational Methods in Systems and Software 2020, Vol.1 Radek Silhavy

Proceedings

Uploaded by

huskachuanqo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (5 votes)
67 views65 pages

Software Engineering Perspectives in Intelligent Systems: Proceedings of 4th Computational Methods in Systems and Software 2020, Vol.1 Radek Silhavy

Proceedings

Uploaded by

huskachuanqo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

Download the Full Version of textbook for Fast Typing at textbookfull.

com

Software Engineering Perspectives in Intelligent


Systems: Proceedings of 4th Computational Methods
in Systems and Software 2020, Vol.1 Radek Silhavy

https://textbookfull.com/product/software-engineering-
perspectives-in-intelligent-systems-proceedings-of-4th-
computational-methods-in-systems-and-
software-2020-vol-1-radek-silhavy/

OR CLICK BUTTON

DOWNLOAD NOW

Download More textbook Instantly Today - Get Yours Now at textbookfull.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Software Engineering Perspectives in Intelligent Systems:


Proceedings of 4th Computational Methods in Systems and
Software 2020, Vol.2 Radek Silhavy
https://textbookfull.com/product/software-engineering-perspectives-in-
intelligent-systems-proceedings-of-4th-computational-methods-in-
systems-and-software-2020-vol-2-radek-silhavy/
textboxfull.com

Computational Statistics and Mathematical Modeling Methods


in Intelligent Systems Proceedings of 3rd Computational
Methods in Systems and Software 2019 Vol 2 Radek Silhavy
https://textbookfull.com/product/computational-statistics-and-
mathematical-modeling-methods-in-intelligent-systems-proceedings-
of-3rd-computational-methods-in-systems-and-software-2019-vol-2-radek-
silhavy/
textboxfull.com

Software Engineering and Algorithms in Intelligent Systems


Radek Silhavy

https://textbookfull.com/product/software-engineering-and-algorithms-
in-intelligent-systems-radek-silhavy/

textboxfull.com

Computational and Statistical Methods in Intelligent


Systems Radek Silhavy

https://textbookfull.com/product/computational-and-statistical-
methods-in-intelligent-systems-radek-silhavy/

textboxfull.com
Software Engineering Perspectives and Application in
Intelligent Systems Proceedings of the 5th Computer
Science On line Conference 2016 CSOC2016 Vol 2 1st Edition
Radek Silhavy
https://textbookfull.com/product/software-engineering-perspectives-
and-application-in-intelligent-systems-proceedings-of-the-5th-
computer-science-on-line-conference-2016-csoc2016-vol-2-1st-edition-
radek-silhavy/
textboxfull.com

Intelligent Algorithms in Software Engineering:


Proceedings of the 9th Computer Science On-line Conference
2020, Volume 1 Radek Silhavy
https://textbookfull.com/product/intelligent-algorithms-in-software-
engineering-proceedings-of-the-9th-computer-science-on-line-
conference-2020-volume-1-radek-silhavy/
textboxfull.com

Software Engineering Trends and Techniques in Intelligent


Systems Proceedings of the 6th Computer Science On line
Conference 2017 CSOC2017 Vol 3 1st Edition Radek Silhavy
https://textbookfull.com/product/software-engineering-trends-and-
techniques-in-intelligent-systems-proceedings-of-the-6th-computer-
science-on-line-conference-2017-csoc2017-vol-3-1st-edition-radek-
silhavy/
textboxfull.com

Cybernetics and Algorithms in Intelligent Systems Radek


Silhavy

https://textbookfull.com/product/cybernetics-and-algorithms-in-
intelligent-systems-radek-silhavy/

textboxfull.com

Artificial Intelligence and Algorithms in Intelligent


Systems Radek Silhavy

https://textbookfull.com/product/artificial-intelligence-and-
algorithms-in-intelligent-systems-radek-silhavy/

textboxfull.com
Advances in Intelligent Systems and Computing 1294

Radek Silhavy
Petr Silhavy
Zdenka Prokopova Editors

Software
Engineering
Perspectives in
Intelligent Systems
Proceedings of 4th Computational
Methods in Systems and
Software 2020, Vol.1
Advances in Intelligent Systems and Computing

Volume 1294

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
Indexed by SCOPUS, DBLP, EI Compendex, INSPEC, WTI Frankfurt eG,
zbMATH, Japanese Science and Technology Agency (JST), SCImago.
All books published in the series are submitted for consideration in Web of
Science.

More information about this series at http://www.springer.com/series/11156


Radek Silhavy Petr Silhavy
• •

Zdenka Prokopova
Editors

Software Engineering
Perspectives in Intelligent
Systems
Proceedings of 4th Computational Methods
in Systems and Software 2020, Vol.1

123
Editors
Radek Silhavy Petr Silhavy
Faculty of Applied Informatics Faculty of Applied Informatics
Tomas Bata University in Zlín Tomas Bata University in Zlín
Zlín, Czech Republic Zlín, Czech Republic

Zdenka Prokopova
Faculty of Applied Informatics
Tomas Bata University in Zlín
Zlín, Czech Republic

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-3-030-63321-9 ISBN 978-3-030-63322-6 (eBook)
https://doi.org/10.1007/978-3-030-63322-6
© The Editor(s) (if applicable) and The Author(s), under exclusive license
to Springer Nature Switzerland AG 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

This book constitutes the refereed proceedings of the Computational Methods in


Systems and Software 2020 (CoMeSySo 2020), held in October 2020.
CoMeSySo 2020 conference intends to provide an international forum for the
discussion of the latest high-quality research results in all areas related to intelligent
systems. The addressed topics are the theoretical aspects and applications of soft-
ware engineering, computational methods or artificial intelligence. The papers
address topics as software engineering, cybernetics and automation control theory,
econometrics, mathematical statistics or artificial.
CoMeSySo 2020 has received (all sections) 308 submissions, 184 of them were
accepted for publication.
The volume Software Engineering Perspectives in Intelligent Systems brings the
discussion of new approaches and methods to real-world problems. Furthermore,
the exploratory research that describes novel approaches in the software engi-
neering and informatics in the scope of the intelligent systems is presented.
The editors believe that readers will find the following proceedings interesting
and useful for their research work.

September 2020 Radek Silhavy


Petr Silhavy
Zdenka Prokopova

v
Organization

Program Committee
Program Committee Chairs
Petr Silhavy Department of Computers and Communication
Systems, Faculty of Applied Informatics,
Tomas Bata University in Zlin,
Czech Republic
Radek Silhavy Department of Computers and Communication
Systems, Faculty of Applied Informatics,
Tomas Bata University in Zlin,
Czech Republic
Zdenka Prokopova Department of Computers and Communication
Systems, Tomas Bata University in Zlin,
Czech Republic
Krzysztof Okarma Faculty of Electrical Engineering,
West Pomeranian University of Technology,
Szczecin, Poland
Roman Prokop Department of Mathematics, Tomas Bata
University in Zlin, Czech Republic
Viacheslav Zelentsov Doctor of Engineering Sciences, Chief
Researcher of St. Petersburg Institute
for Informatics and Automation of Russian
Academy of Sciences (SPIIRAS),
Russian Federation
Lipo Wang School of Electrical and Electronic Engineering,
Nanyang Technological University, Singapore
Silvie Belaskova Head of Biostatistics, St. Anne's University
Hospital Brno, International Clinical Research
Center, Czech Republic

vii
viii Organization

Roman Tsarev Department of Informatics, Siberian Federal


University, Krasnoyarsk, Russia

International Program Committee Members


Pasi Luukka President of North European Society for Adaptive
and Intelligent Systems & School of Business
and School of Engineering Sciences
Lappeenranta University of Technology,
Finland
Ondrej Blaha Louisiana State University Health Sciences
Center New Orleans, New Orleans,
United States of America
Izabela Jonek-Kowalska Faculty of Organization and Management,
The Silesian University of Technology,
Poland
Maciej Majewski Department of Engineering of Technical
and Informatic Systems, Koszalin University
of Technology, Koszalin, Poland
Alena Vagaska Department of Mathematics, Informatics
and Cybernetics, Faculty of Manufacturing
Technologies, Technical University of Kosice,
Slovak Republic
Boguslaw Cyganek Department of Computer Science, University
of Science and Technology, Krakow, Poland
Piotr Lech Faculty of Electrical Engineering, West
Pomeranian University of Technology,
Szczecin, Poland
Monika Bakosova Institute of Information Engineering, Automation
and Mathematics, Slovak University
of Technology, Bratislava, Slovak Republic
Pavel Vaclavek Faculty of Electrical Engineering and
Communication, Brno University
of Technology, Brno, Czech Republic
Miroslaw Ochodek Faculty of Computing, Poznan University
of Technology, Poznan, Poland
Olga Brovkina Global Change Research Centre Academy
of Science of the Czech Republic, Brno,
Czech Republic
Elarbi Badidi College of Information Technology,
United Arab Emirates University, Al Ain,
United Arab Emirates
Gopal Sakarkar Shri. Ramdeobaba College of Engineering
and Management, Republic of India
Organization ix

V. V. Krishna Maddinala GD Rungta College of Engineering


and Technology, Republic of India
Anand N. Khobragade Scientist, Maharashtra Remote Sensing
Applications Centre, Republic of India
Abdallah Handoura Computer and Communication Laboratory,
Telecom Bretagne – France

Organizing Committee Chair


Radek Silhavy Tomas Bata University in Zlin, Faculty
of Applied Informatics,
Email: [email protected]

Conference Organizer (Production)


Silhavy s.r.o.
Web: http://comesyso.openpublish.eu
Email: [email protected]
Conference website, Call for Papers
http://comesyso.openpublish.eu
Contents

Smart City Technology Investment Solution Support System


Accounting Multi-factories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
V. Lakhno, V. Malyukov, O. Kryvoruchko, A. Desiatko, and Y. Shestak
Institutionalization of Intelligent Digital Customs . . . . . . . . . . . . . . . . . . 12
Viktor Makrusev, Valentin Vakhrushev, and Amir Nasibullin
Implementation of the Internet of Things Application Based
on Spring Boot Microservices and REST Architecture . . . . . . . . . . . . . 20
Satish Reddy Modugu and Hassan Farhat
Modelling and Simulation of Scrum Team Strategies:
A Multi-agent Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Zhe Wang
Development of a Scheme of a Hardware Accelerator of Quantum
Computing for Correction Quantum Types of Errors . . . . . . . . . . . . . . 64
Sergey Gushanskiy, Valery Pukhovskiy, Viktor Potapov,
and Alexander Kozlovskiy
Personalized Information Representation to Anonymous Users:
Digital Signage Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Nikolay Shilov and Nikolay Teslya
Development of a Web Application of Facilitate Multidisciplinary
Rehabilitation of Children with Cleft Lip and Palate . . . . . . . . . . . . . . . 87
O. V. Dudnik, Ad. A. Mamedov, A. B. Maclennan, Y. O. Volkov,
G. E. Odzhaggulieva, S. -M. A. Akhmetkhanov, N. V. Gorlova,
and Ma Guopei
Quality Assessment Method for GAN Based on Modified Metrics
Inception Score and Fréchet Inception Distance . . . . . . . . . . . . . . . . . . . 102
Artem Obukhov and Mikhail Krasnyanskiy

xi
xii Contents

On Systematics of the Information Security of Software


Supply Chains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Alexander Barabanov, Alexey Markov, and Valentin Tsirlov
Comprehensive Intelligent Information Security Management System
(CIISMS) for Supply Networks: The Actor-Network Perspective . . . . . . 130
Yury Iskanderov and Mikhail Pautov
3D Face Capture for Rehabilitation Progress Assessment After
Brain Surgery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Jakub Tomeš, Jan Kohout, and Jan Mareš
An Ontological Approach to the Text Sample Size Adaptation
for the False Pseudonyms Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
I. S. Korovin, A. B. Klimenko, and I. B. Safronenkova
It Was Never About the Language: Paradigm Impact on Software
Design Decisions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Laura M. Castro
Deep Neural Network Acoustic Model Baseline for Character-Level
Transcription of Naturally Spoken Czech Language . . . . . . . . . . . . . . . 170
Martin Vejvar
Problems of Software Developing for the Automation
of Scientific Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Alexander V. Solovyev and Irina V. Tumanova
E- Learning Readiness Frameworks and Models . . . . . . . . . . . . . . . . . . 200
Irene Kolo and Tranos Zuva
Arabic Question Answering System Using Graph Ontology . . . . . . . . . . 212
Mohamed S. Zeid, Nahla A. Belal, and Yasser El-Sonbaty
Stability Study of a Protection Structure by Stacking
GSC Geosynthetics: Application to the Port
of Corisco (Equatorial Guinea) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Mustapha Mouhid, Laila Mouakkir, Soumia Mordane, Mohamed Loukili,
Mohamed Chagdali, and Brahim El Bouni
Comparative Analysis of Products for Testing Software . . . . . . . . . . . . 242
Alexander Fedosov, Dina Eliseeva, Nina Khodakova, Olga Mnatsakanyan,
and Natalia Kulikova
A Novel Adaptive Web-Based Environment to Help Deafblind
Individuals in Accessing the Web and Lifelong Learning . . . . . . . . . . . . 253
Samaa M. Shohieb, Ceymi Doenyas, and Shaibou Abdoulai Haji
Impact of Agile Methodology Use on Project Success
in Organizations - A Systematic Literature Review . . . . . . . . . . . . . . . . 267
Makoena Moloto, Anneke Harmse, and Tranos Zuva
Contents xiii

Fingerprint Alteration Classification Using Convolutional


Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Shayekh Mohiuddin Ahmed Navid, Umme Kulsum Ritu,
Nabiul Hoque Khandakar, Ishrat Jahan Ananya, Shawan Shurid,
Nabeel Mohammed, and Sifat Momen
Numerical Modeling of the Wave-Structure Interaction Using
the Boundary Element Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Laila El Aarabi, Laila Mouakkir, and Soumia Mordane
Transition from Serverfull to Serverless Architecture
in Cloud-Based Software Applications . . . . . . . . . . . . . . . . . . . . . . . . . . 304
Oliviu Matei, Pawel Skrzypek, Robert Heb, and Alexandru Moga
Comparison of Document Generation Algorithms Using
the Docs-as-Code Approach and Using a Text Editor . . . . . . . . . . . . . . 315
Marina Igorevna Ozerova, Ilya Evgenievich Zhigalov,
and Vitatliy Vasilievich Vershinin
A Proactive University Library Book Recommender System . . . . . . . . . 327
Tadesse Zewdu Mekonnen and Tranos Zuva
Conflict Resolution in Process Models Merging . . . . . . . . . . . . . . . . . . . 336
Asma Hachemi and Mohamed Ahmed-Nacer
Medical Chatbot Techniques: A Review . . . . . . . . . . . . . . . . . . . . . . . . . 346
Andrew Reyner Wibowo Tjiptomongsoguno, Audrey Chen,
Hubert Michael Sanyoto, Edy Irwansyah, and Bayu Kanigoro
A Model for Effectively Teaching Information Technology . . . . . . . . . . 357
Leila Goosen
Identifying Wood Types Using Convolutional Neural Network . . . . . . . 372
Rostina, P. H. Gunawan, and Esa Prakasa
Mathematical Model of Heat and Mass Transfer in a Colloidal
Suspension with Nanoparticles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Sergey Smagin, Polina Vinoogradova, Ilya Manzhula, and Alber Livashvili
Review of Current Data Mining Techniques Used in the Software
Effort Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Julius Olufemi Ogunleye
Dispatching GPU Distributed Computing When Modeling Large
Network Communities of Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Donat Ivanov and Eduard Melnik
OIDC Authentication for Educational Purposes and Solving
Problems for Localization of Faults in Combinational Circuits . . . . . . . 419
Barish Yumerov and Galina Ivanova
xiv Contents

Users Activity Time Series Features on Social Media . . . . . . . . . . . . . . . 430


Andrey M. Fedorov, Igor O. Datyev, and Andrey L. Shchur
Architecture of the Decision Support System for Personnel Security
of the Regional Mining and Chemical Cluster . . . . . . . . . . . . . . . . . . . . 442
V. V. Bystrov, D. N. Khaliullina, and S. N. Malygina
Fault-Tolerant Management for the Edge Devices on the Basis
of Consensus with Elected Leader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
Melnik E. V., Klimenko A. B., and Korobkin V. V.
Simulation of Digital Logic Principles Using DCBLPy with IoT
in Packet Tracer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Lukas Hapl and Hashim Habiballa
An Algorithm for Constructing an Efficient Investment Portfolio . . . . . 482
Vera Ivanyuk and Dmitry Berzin
Development of an Intelligent Ensemble Forecasting System . . . . . . . . . 491
Vera Ivanyuk, Andrey Sunchalin, and Anna Sunchalina
Intelligent Methods for Predicting Financial Time Series . . . . . . . . . . . . 501
Vera Ivanyuk and Kirill Levchenko
ASC-Analysis of the Dependence of Volume and Structure of Highly
Productive Dairy Cattle Incidence in Krasnodar Region . . . . . . . . . . . . 510
E. V. Lutsenko, V. A. Grin, K. A. Semenenko, M. P. Semenenko,
E. V. Kuzminova, and N. D. Kuzminov
Detecting the Abrupt Change in the Bandwidth of a Fast-
Fluctuating Gaussian Random Process . . . . . . . . . . . . . . . . . . . . . . . . . . 527
Oleg Chernoyarov, Serguei Dachian, Tatiana Demina,
Alexander Makarov, and Alexandra Salnikova
Cognitive Interaction of Robot Communities, Simulation Modeling . . . . 542
G. V. Gorelova, E. V. Melnik, A. B. Klimenko, and I. B. Safronenkova
Construction of an Automated Process Control System
for the Exploitation of Oil and Gas Fields in a Heterogeneous
Information Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Gritsenko Yury, Senchenko Pavel, and Sidorov Anatoly
Mobile Robots Groups Use for Monitoring and Data Collection
in Continuous Missions with Limited Communications . . . . . . . . . . . . . 571
Donat Ivanov
The Analysis of EEG Signal and Comparison of Classification
Algorithms Using Machine Learning Methods . . . . . . . . . . . . . . . . . . . . 582
Andrea Nemethova, Dmitrii Borkin, and Martin Nemeth
Contents xv

The Analysis of EEG Signal and Finding Correlations Between


Right-Handed and Left-Handed People . . . . . . . . . . . . . . . . . . . . . . . . . 591
Martin Nemeth, Andrea Nemethova, and Dmitrii Borkin
Research of Data Analysis Techniques for Vibration Monitoring
of Technological Equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
Vladimir Bukhtoyarov, Danil Zyryanov, Vadim Tynchenko,
Kirill Bashmur, and Eduard Petrovsky
Using the Mathematical Modeling Method for Forecasting Severe
Bronchial Obstruction Syndrome with ARVI in Children . . . . . . . . . . . 606
L. V. Kramar and T. Yu. Larina
Recognition Recipes with Deep Machine Learning . . . . . . . . . . . . . . . . . 615
Sergey V. Ulyanov, Andrey Filipyev, and Kirill Koshelev
Computer Simulation of the Structural Properties of Energetic
Materials Using High Performance Computing . . . . . . . . . . . . . . . . . . . 623
Igor A. Fedorov, Tatyana S. Reyn, and Sergei N. Karabtsev
Some New Approaches to Comparative Evaluation of Algorithms
for Calculating Distances Between Genomic Sequences . . . . . . . . . . . . . 633
Boris Melnikov, Marina Trenina, Anastasia Nichiporchuk,
Elena Melnikova, and Mikhail Abramyan
Basis Finite Automata in Some Minimization Problems. Part I:
Introduction and the General Description of the Algorithms . . . . . . . . . 643
Boris Melnikov and Aleksandra Melnikova
Effect of Bitcoin Volatility on Altcoins Pricing . . . . . . . . . . . . . . . . . . . . 652
Artur Meynkhard
Development of Image Dataset Using Hand Gesture Recognition
System for Progression of Sign Language Translator . . . . . . . . . . . . . . . 665
Arifa Ashrafi, Victor Sergeevich Mokhnachev,
Yuriy Nikolaevich Philippovich, and Lyubov Petrovna Tsilenko
Component of Decision Support Subsystem for Monitoring
and Predicting of Hazardous Processes at the Base of Analysis
of Macro Zoobenthos Communities of Azov Sea . . . . . . . . . . . . . . . . . . 676
E. V. Melnik, N. I. Bulysheva, M. V. Orda-Zhigulina,
and D. V. Orda-Zhigulina
Cognitive Model for Monitoring and Predicting Dangerous Natural
Processes for Hydro Ecosystem Analysis . . . . . . . . . . . . . . . . . . . . . . . . 688
D. V. Orda-Zhigulina, M. V. Orda-Zhigulina, and A. A. Rodina
Application of the GERT Method to Visualize the Process
of Managing Receivables and Payables of an Enterprise . . . . . . . . . . . . 696
Svetlana B. Globa, Vladimir P. Maslovsky, Nina M. Butakova,
and Viktoria V. Berezovaya
xvi Contents

Predicting Default Probability of Bank’s Corporate Clients


in the Czech Republic. Comparison of Generalized Additive Models
and Support Vector Machine Approaches . . . . . . . . . . . . . . . . . . . . . . . 709
Mariya Oleynik and Tomáš Formánek
Data Harmonization for Heterogeneous Datasets in Big Data - A
Conceptual Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723
Ganesh Kumar, Shuib Basri, Abdullahi Abubakar Imam,
and Abdullateef Oluwagbemiga Balogun
A Productivity Optimising Model for Improving Software
Effort Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
Vo Van Hai, Ho Le Thi Kim Nhung, and Huynh Thai Hoc
AdamOptimizer for the Optimisation of Use Case
Points Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747
Huynh Thai Hoc, Vo Van Hai, and Ho Le Thi Kim Nhung
An Evaluation of Technical and Environmental Complexity Factors
for Improving Use Case Points Estimation . . . . . . . . . . . . . . . . . . . . . . . 757
Ho Le Thi Kim Nhung, Huynh Thai Hoc, and Vo Van Hai
Gestural Interface to Support Car Drivers Interacting
with Smartphone: A Systematic Literature Review . . . . . . . . . . . . . . . . 769
Jayasankari Ganasan and Ahmad Sobri Hashim
The Price Determinants of Bitcoin as a New Digital Form of Money . . . 784
Vladislav Rutskiy, Sarfaraz Javed, Shahzool Hazimin Azizam,
Nikita Chudopal, Kirill Zhigalov, Roman Kuzmich, Alexander Pupkov,
and Roman Tsarev
Cyber Safety Awareness Framework for South African Schools . . . . . . 793
Dorothy Scholtz, Elmarie Kritzinger, and Adele Botha
Decision-Making-Based Modeling of Auxiliary Diagnosis
of Ischemic Stroke in Recovery Period . . . . . . . . . . . . . . . . . . . . . . . . . . 809
Dongxue Zhang, Zhihui Huang, Hui Wang, and Xiaomin Zhu
The Proposal of Customized Convolutional Neural Network Using
for Image Blur Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Dmitrii Borkin, Martin Nemeth, and Andrea Nemethova
Statistical Characteristics of Decisions Made by a Neural Network
Molecule with Quadrant Quantization and a Molecule with Data
Quantization by Two Ellipses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
Aleksandr Ivanov and Tatyana Zolotareva
Contents xvii

Development of E-Insurance Through Market Institutions:


The Example of Digital Compulsory Third-Party Motor Insurance . . . . 836
Vladislav Rutskiy, Ekaterina Konovalova, Younes El Amrani,
Svetlana Kapustina, Oleg Ikonnikov, Natalia Bystrova, and Roman Tsarev
Using an Expert Panel to Validate the Malaysian SMEs-Software
Process Improvement Model (MSME-SPI) . . . . . . . . . . . . . . . . . . . . . . . 844
Malek A. Almomani, Shuib Basri, Omar Almomani,
Luiz Fernando Capretz, Abdullateef Balogun, Moath Husni,
and Abdul Rehman Gilal
Single Disease DRGs Based on Hospitalization Costs
of Hypertensive Patients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860
Hui Wang, Zhihui Huang, Xiaomin Zhu, and Xin Deng
Burst Detection in Social Media Communities . . . . . . . . . . . . . . . . . . . . 871
Andrey M. Fedorov, Igor O. Datyev, and Andrey L. Shchur
Assessment of Biomedical Risk Factors Associated with Adverse
Pregnancy Outcomes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883
Natalia Lukyanova and Olga Melnikova
NGBoost Interpretation Using LIME for Alcoholic EEG Signal
Based on GLDM Feature Extraction . . . . . . . . . . . . . . . . . . . . . . . . . . . 894
Dandi Trianta Barus, Fikhri Masri, and Achmad Rizal
Modeling of Product Heating at the Stage of Beam Input
in the Process of Electron Beam Welding Using the COMSOL
Multiphysics System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905
Sergei Kurashkin, Daria Rogova, Vadim Tynchenko,
Vyacheslav Petrenko, and Anton Milov
Breaking Microsoft Azure Information Protection Viewer Using
Memory Dump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 913
Ján Mojžiš and Štefan Balogh
Comparison of Various NoSQL Databases for Unstructured
Industrial Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 921
Andrea Vaclavova and Michal Kebisek
Topic Clustering of Social Media Using Multilayer Text Analysis . . . . . 931
V. V. Dikovitsky and A. M. Fedorov
Searching the Hyper-heuristic for the Traveling Salesman Problem
with Time Windows by Genetic Programming . . . . . . . . . . . . . . . . . . . . 939
Václav Hrbek and Jan Merta
xviii Contents

A Multi-criteria Model Application in the Prioritization


of Processes for Automation in the Scenario of Intelligence
and Investigation Units . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 947
Gleidson Sobreira Leite, Adriano Bessa Albuquerque,
and Plácido Rogério Pinheiro
On the Scheduling of Industrial IoT Tasks in a Fog
Computing Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 966
Elarbi Badidi
IMC Strategy Using Neural Networks for 3D Printer Bed
Temperature Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 979
Dominik Stursa, Libor Havlicek, Libor Kupka, and Petr Dolezel
A Comparison of Processes and Threads Creation . . . . . . . . . . . . . . . . . 990
Martin Sysel
Planning and Approving Corporate Resource Development . . . . . . . . . . 998
Yuri Kondrashov, Olga Glushkova, and Dmitry Kobzev
Fast-Growing Firms – “Gazelles” in Modern Russia: An Empirical
Study of Growth Factors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1011
Vladislav Rutskiy, Marina Solodova, Roman Tsarev, Irina Yarygina,
and Omer Faruk Derindag
Combining Earth Remote Sensing and Land Wireless Sensor
Networks Data in Smart Agriculture Information Products . . . . . . . . . . 1023
Ilya Ginzburg, Sergey Padalko, and Maxim Terentiev
A Model for the Operating Management of the Aircraft
Maintenance Composition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1032
Andrey Stankevich
The Problem of Rational Allocation of Resources
for Replacing Aircraft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1042
Vladimir A. Sudakov and Tatiana V. Sivakova
Data Science Around the Indexed Literature Perspective . . . . . . . . . . . . 1051
Mahyuddin K. M. Nasution, Opim Salim Sitompul,
Erna Budhiarti Nababan, Esther S. M. Nababan,
and Emerson P. Sinulingga
Comprehensive Assessment of a Student Using Neural Network
Algorithms for Students of Technical Specialities and Areas
of Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1066
Vladimir Simonov and Dina Eliseeva
A Review on Intenet of Things Smart Homes, Challenges, Open Issues
and Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1073
Bryan David Julies and Tranos Zuva
Contents xix

Applying Bayesian Network to Assess the Levels of Skills Mastering


in Adaptive Dynamic OER-Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1090
Igor Nekhaev, Ilya Zhuykov, Suren Manukyants,
and Artyom Maslennikov
Clustering Large DataSet’ to Prediction Business Metrics . . . . . . . . . . . 1117
Rahmad Syah, Marischa Elveny, and Mahyuddin K. M. Nasution
Multiple Radiotechnical System for the Takeoff and Landing Zones
of Unmanned Aerial Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1128
A. R. Bestugin, V. A. Zavyalov, S. G. Petukhov, I. A. Kirshina,
and O. M. Filonov
Patterns of Long-Term Dynamics of World Gold Production . . . . . . . . 1137
R. I. Dzerjinski, E. N. Pronina, and M. R. Dzerjinskaya

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147


Smart City Technology Investment Solution
Support System Accounting Multi-factories

V. Lakhno1 , V. Malyukov1 , O. Kryvoruchko2 ,


A. Desiatko2(&) , and Y. Shestak2
1
Faculty of Information Security, Computer Science and Communication,
National University of Life and Environmental Sciences of Ukraine,
Kyiv, Ukraine
[email protected], [email protected]
2
Faculty of Information Technologies, Kyiv National University of Trade
and Economics, Kyiv, Ukraine
{kryvoruchko_ev,desyatko,shestack}@knute.edu.ua

Abstract. This article proposes a model for decision support system (DSS) in
the process of financing into information technology (IT) for Smart City. Pro-
posed model has the capacity to find a solution in analytical approach for the
problem using means of bilinear differential quality games with several terminal
surfaces. The new class of bilinear differential games was considered during the
research course of optimal financing strategies into IT for Smart City. The
resulting approach along with a new class of equations made it possible to
adequately describe financing processes taking into consideration the multifac-
torial nature of the problem statement. The software product DSS “IT Invest”
was developed, with help of which it became possible to reduce the discrepancy
between forecasting data and the real productivity of investments into IT for
Smart City. Moreover it become possible to concurrently optimize investment
strategies among all investment parties.

Keywords: Smart City  Rational investment system  Decision support 


Differential game  Software product  Information-driven systems  Information
systems

1 Introduction

At the present days many investment market players are looking for new promising
technologies for investing their financial resources. Digital technologies sphere con-
sidered as one of the most promising area for investment. Nowadays, innovative digital
technologies determine the pace of development not only in the field of IT, but also
development and modernization trends of traditional industries and economic sectors
[1]. Moreover, not all investors realize that investing in IT is a risky, albeit promising
area [1, 2]. According to statistics, after the end of the active investment stage, not more
than 11–16% of IT projects will be able to achieve self-sufficiency and bring profit to
the investor.

© The Editor(s) (if applicable) and The Author(s), under exclusive license
to Springer Nature Switzerland AG 2020
R. Silhavy et al. (Eds.): CoMeSySo 2020, AISC 1294, pp. 1–11, 2020.
https://doi.org/10.1007/978-3-030-63322-6_1
2 V. Lakhno et al.

Thus, investors who are thinking about choosing among directions for investing
into IT and needing support in deciding on preferred strategies for investing their
financial resources are much like gold diggers. That is, until the investor is able to find
the coveted nugget, he has to review a huge amount of empty ore. In many research
papers [3, 4] authors noted that, in order to increase the evaluation effectiveness and
efficiency of such investment projects, it is advisable to use the potential of various
computerized decision support systems (DSS). It is especially valuable when it is about
investing in large IT projects. For example, during the predictive assessment, which
informational technology has more priority and is more promising for the investor
when investing financial resources in Smart City. Investors can have a diametrically
different vision of the initial points for investment of their resources among new
directions of the postulates of classical urbanism and digitalization of all aspects of
urban activity convergence. For example, some investors consider the development of
energy-saving technologies within the framework of Smart City as a priority, while
others primarily want to develop technologies related to the safety of residents and
monitoring of the rule of law [5, 6]. Along the way, we note that in this situation, the
divergence of the invested financial resources productivity rate for investors will be
different. And this, in turn, dictates the need to find rational strategies for investing in
such complex projects as Smart City. And it is quite difficult for the investors to
manage it without appropriate computer support in making decisions on choosing
strategies.
All of the above written has predetermined the relevance of the topic of our study.
One of the priority tasks of which is the development of new models and an appropriate
software product that is useful for investors in the search for rational strategies for
investing in Smart City IT. Also, such as DSS will be useful in predicting the real
investment productivity in IT Smart City.

2 Literature Review

According to a range of authors [7–9], the development of such a direction as math-


ematical support for decision-making during the selection of a rational strategy for
investing in IT (Smart City in particular) should be accompanied by a synthesis of new
models and methods. These new methods and models form the computing core of
computer DSS, which is designed to simplify the task for investors. Note that there are
quite different approaches from the point of view of the mathematical apparatus used in
such models. For example, the authors of [10, 11] describe the application of classical
economic and mathematical models. However, in most situations, these models do not
take into account many parameters of investing in Smart City in the context of
obtaining predictive assessment of the appropriateness of a particular financial resource
investment strategy by the investor. In [12–14], authors note that in the relation to this
class of problems, the most adequate models describing the behavior of a complex
system are models based on game theory.
As an analysis of studies in this area showed, most of the models and algorithms
presented in [15–17] do not contain real recommendations and predictive estimates for
Smart City investors. Existing DSSs are not suitable for the purposes of real choice
Smart City Technology Investment Solution Support System 3

decision making of strategies by the investor when investing financial resources in


Smart City and are not very informative for evaluating real investment projects and
investor options.
These circumstances necessitate the relevance of new models and software products
focused on cross-platform applications development, that would be capable to support
decision making procedures in search for rational strategies of continuous investment
into IT Smart City.

3 Goals and Objectives of the Study

This research aims to develop a model based on the use of bilinear differential quality
game means with several terminal surfaces for a decision support system in the process
of financing information technologies for Smart City.

Research objectives:
– development of a model and algorithms for a decision support system for the search
of rational continuous investment strategies into Smart City IT;
– testing of the model during a computational experiment and development of the
decision support system for choosing rational continuous investment strategies into
IT Smart City.

4 Methods and Models


4.1 Problem Statement
The problem of investing into IT that ensures the functioning of Smart City is the key
to the paradigm of innovative development of both megacities and medium-sized cities.
This is due to the fact that IT has recently begun to determine the development of many
urban infrastructures, for example, such as urban logistics, security, energy, water
supply, etc. [17–19]. For development Smart City IT needs not only to have financial
resources (FR - cFinR), but also to be able to use them correctly [20, 21]. However, the
proper use of financial resources requires the development of appropriate tools. As
noted above, one of the most effective tool is the use of DSS. DSS with the core of the
gaming-oriented computational model allows constructively determining rational
strategies for allocating financial resources for the development of IT for Smart City.
There is no universal model that takes into account all the factors corresponding to
the problem under consideration. This means that for its solution it is necessary to
develop a set of models that make it possible to optimize the procedure for finding
rational strategies for distributing financial resources for IT for Smart City.
4 V. Lakhno et al.

4.2 A Model Based on the Use of Means of Bilinear Differential Quality


Games with Several Terminal Surfaces
The following is a model that takes into account factors such as the multiplicity of IT
for Smart City technologies and the continuity of the investment process by investors.
We formulate the model. Note that the statement of the problem itself continues our
previous research in this direction [9, 14].
Two investors (players) manage a dynamic system in multidimensional spaces. It is
defined by a set of bilinear differential equations with dependent motions. Sets of
strategies (U) and (V) of players and terminal surfaces S0 , F0 . The goal of the first
player (hereinafter Inv1) to bring a dynamic system with the help of his control
strategies on the terminal surface S0 no matter how the second player acts (hereinafter
Inv2). The goal of Inv2 is to bring a dynamic system using its control strategies to the
terminal surface F0 , no matter how Inv1 acts. The problem under consideration gen-
erates two subtasks from the point of view of the first ally player and from the point of
view of the second ally player [9, 17].
The article considers the subtask from the point of view of the first ally player, since
the subtask from the point of view of the second ally player is symmetrical. The
solution is to find the set of initial states of the players and their strategies. These
strategies will allow objects to bring the system to one or another surface.
In subtask 1, an ally player is treated for Inv1, an adversary is treated for Inv2. And
vice versa - in subtask 2, the ally player is treated as Inv2, and the opposing player is
treated as Inv1. Both players try to invest their FR in IT.
We assume that Inv1 has a set hð0Þ ¼ ðh1 ð0Þ; . . .; hn ð0ÞÞ of financial resources
(hi ð0Þ - FR for the development of i new technology for Smart City). Accordingly, Inv2
has f ð0Þ ¼ ðf1 ð0Þ; . . .; fn ð0ÞÞ (fi ð0Þ - FR for the development of i new technology for
Smart City). These sets determine the predicted, at the moment t ¼ 0, size of FinR of
the players for each new IT for Smart City).
We describe the dynamics of FinR change for players as following:

dhðtÞ=dt ¼ hðtÞ þ B1  hðtÞ þ ½ðA1 þ R1 Þ  E  UðtÞ  B1  hðtÞ  ½ðA2 þ R2 Þ  E  VðtÞ  B2  f ðtÞ;


df ðtÞ=dt ¼ f ðtÞ þ B2  f ðtÞ  ½ðA2 þ R2 Þ  E  VðtÞ  B2  f ðtÞ  ½ðA1 þ R1 Þ  E  UðtÞ  B1  hðtÞ;

where
hi ðtÞ 2 Rn ; f ðtÞ 2 Rn ; UðtÞ; VðtÞ – square n - order matrices with positive elements
ui ðtÞ; vi ðtÞ 2 ½0; 1 on the diagonals of diagonal matrices UðtÞ; VðtÞ, respectively;
B1 ; B2 – transformation matrices FinR Inv1 and Inv2 upon their successful imple-
mentation in IT for Smart City, which are square matrices order with positive
elements gij1 ; gi2 ; respectively;
A1 ; R1 - diagonal matrices with positive elements that characterize the interest rate
of Inv2 for financial investments and the share of return on investment of Inv2 in
relation to Inv1 investments in IT for Smart City;
A2 ; R2 - diagonal matrices with positive elements that characterize the interest rate
of Inv1 for financial investments and the share of return on investment of Inv1 in
relation to Inv2 investments in IT for Smart City;
Smart City Technology Investment Solution Support System 5

E unit n -order matrix


The interaction ends when the following conditions are met:

ðhðtÞ; f ðtÞÞ 2 S0 ; ð1Þ

ðhðtÞ; f ðtÞÞ 2 F0 : ð2Þ

Assuming that

[
n
S0 ¼ fðh; f Þ : ðh; f Þ 2 R2n ; h  0; fi ¼ 0g; F0
i¼1
[
n
¼ fðh; f Þ : ðh; f Þ 2 R2n ; f  0; hi ¼ 0g:
i¼1

If condition (1) is fulfilled, we believe that the IT financing procedure for Smart
City has been completed. That is, Inv2 didn’t have enough FinR for at least one of IT to
continue the continuous investment process (for example, the investor does not have
enough funds to develop LoRa technology, but enough funds to develop Smart grid
technologies, video surveillance in Smart City, etc.). If condition (2) is fulfilled, then
we believe that the continuous IT investment procedure for Smart City has also been
completed. That is, Inv1 did not have enough FinR to continue the continuous
investment process for at least one of the IT. If both conditions (1) and (2) are not
fulfilled, we believe that the continuous investment process for Smart City continues.
The process of continuous IT investment procedure for Smart City was considered
as part of a positional differential game scheme with full information [9, 17].

4.3 The Solution to the Problem of Finding the Sets of “Preference”


of the Investor of His Optimal Strategies
The solution to subtask 1 is to find the sets of “preference” for Inv1 and its optimal
strategies. Similarly, the task is posed from the point of view Inv2.
Here are the conditions under which the solution to the game is found, i.e. range of
“preferences” W1 and optimal strategies for Inv1. These conditions will be given by
matrix inequalities.
1) ðA1  R1 Þ  E  0; ðA2  R2 Þ  E  0;
2) ðA1  R1 Þ  E  0; ðA2  R2 Þ  E  0;
3) ðA1  R1 Þ  E  0; ðA2  R2 Þ  E  0;
4) ðA1  R1 Þ  E  0; ðA2  R2 Þ  E  0:
5) All other options for the relations of the elements of these matrices.
6 V. Lakhno et al.

Let’s introduce the notation.

X
n
Gi ¼ ½ðA2 þ R2 Þ  B2 ij ;
j¼1
Xn Xn X
n
Si ¼ f½ðA1 þ R1 Þ  E  B1 ih g=f f½ðA1 þ R1 Þ  Egij  f½ðA2 þ R2 Þ  E  B2 ghj g;
h¼1 j¼1 j¼1
Xn Xn Xn
Gi1 ¼ f½ðA1 þ R1 Þ  E  B1 ih g=f f½ðA1 þ R1 Þ  Egij  ½ðA1 þ R1 Þ  B1 hj g;
h¼1 j¼1 j¼1
Xn
Si1 ¼ f½ðA1 þ R1 Þ  E  B1 ij g;
j¼1
Xn
Fi ¼ ½ðA1 þ R1 Þ  B1 ij ;
j¼1
X n X
n X
n
Hi ¼ f½ðA2 þ R2 Þ  E  B2 ih g=f f½ðA2 þ R2 Þ  Egij  f½ðA1 þ R1 Þ  E  B1 ghj g;
h¼1 j¼1 j¼1
Xn
H1i ¼ f½ðA2 þ R2 Þ  E  B2 ij g;
j¼1
Xn Xn X
n
F1i ¼ f½ðA2 þ R2 Þ  E  B2 ih g=f f½ðA2 þ R2 Þ  Egij  ½ðA2 þ R2 Þ  B2 hj g;
h¼1 j¼1 j¼1
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
ðq Þi ¼ ½Gi  Gi1 =½2  Si1  þ f½Gi  Gi1 =½2  Si1 g2 þ ½Si =Si1 ;
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
ðu Þi ¼ ½F i  F1i =½2  H1i  þ f½F i  F1i =½2  H1i g2 þ ½H i =H1i :

In the framework of these notations for case 1), the set of preference W1 is defined
as following:

[
n
W1 ¼ W1i ;
i¼1
[n X
n X
n
W1i ¼ fðhð0Þ; f ð0ÞÞ 2 R2n
þ ; ðq Þi  fi ð0Þ f½ðA1 þ R1 Þ  Eih = ½ðA1 þ R1 Þ  Eij g  hh ð0Þ;
i¼1 h¼1 j¼1
X
n X
n
8i ¼ 1; . . .; n; ðu Þi  hi ð0Þ f½ðA2 þ R2 Þ  E  B2 ih =f ½ðA2 þ R2 Þ  E  B2 ij g  fh ð0Þg:
h¼1 j¼1

The first player’s optimal strategy would be U ðtÞ ¼ E:


For cases 2)–5), the preference sets of the first player and his optimal strategies are
found similarly. In the same way, the solution of the subtask can be also found by the
second ally player.
Smart City Technology Investment Solution Support System 7

5 Computational Experiment

Computational experiments were performed in the Maple environment, see Fig. 1, 2.


As the initial data were taken from investment projects into Smart City technology in
large cities of Ukraine - Kiev, Kharkov, Lviv, Zaporozhye. Figures 1 and 2 show the
results for two calculation tests during a computational experiment.
As a result of the experiment, many investor strategies were identified. Two cases
were considered. First case assumed that the first investor manages investments, which
are described by two variables. It was assumed that the equations that specify the
changes in the variables of the first player are the same. The second investor manages
the investments described by one variable. In the second case, the situation is similar,
except for the assumption that the equations defining the changes in the variables of the
first investor are the same. They are different.
There are many initial states of objects and their strategies during the experiment
These strategies allow objects to bring the system to one or another terminal surface
S0 , F0 .
On the plane (Fig. 1), the vertical axis is Inv2 financial resources. Two horizontal
axes (x, y) - Inv1 financial resources. The area under both hyperplanes at the same time
(“below” them) is W1 (the area of “preference” for Inv1).
On Fig. 1, numeral 1 denotes a hyperplane, which defines the area located below
the hyperplane, in which the first investor guarantees himself the preservation of his
financial resources for both components. Numeral 2 denotes a hyperplane that defines
the area located below this hyperplane, in which the first investor is able to ensure the
loss of financial resources of the second investor.

Fig. 1. Results of a computational experiment 1


8 V. Lakhno et al.

Fig. 2. The results of computational experiment 2

On Fig. 2 the vertical axis also denotes Inv2 financial resources and the two hor-
izontal axes (x, y) - Inv1 financial resources. The area under the three hyperplanes at the
same time (“below” them) is W1 (the area of “preference” for Inv1).
On Fig. 2 numerals 1 and 2 indicate hyperplanes that define the area below these
hyperplanes, in which the first investor guarantees himself the preservation of his
financial resources for both components. Numeral 3 denotes a hyperplane that defines
the area located below this hyperplane, in which the first investor has the opportunity to
ensure the loss of financial resources of the second investor.
Obtained results demonstrate the effectiveness of the proposed approach. During
the testing of the model in the Maple environment, as well as the Invest Smart City
software product, the correctness of the results was established.

6 IT Invest Software

Based on the model and data obtained during the computational experiments, the
software system IT Invest was implemented. DSS allows investor to graphically visu-
alize the conclusions of the system about the advisability of choosing one or another
version of the strategies for continuous investment in Smart City IT. DSS was imple-
mented in the C # programming language. A general view of the DSS interface after
receiving the system output and the corresponding surface graph is shown in Fig. 3.
An example of the DSS output is shown at the bottom of the form window to
visualize the graphical interpretation of the solution. Interpretation of the decision in
DSS: in this case, the first player, applying his optimal strategy, achieves the goal in
cooperation. This means that the second player will lose his financial resource, despite
his opposition to the first player.
Smart City Technology Investment Solution Support System 9

Fig. 3. General view of the DSS decision output window and the system output about the
appropriateness of the strategy used by the investor

DSS “IT Invest” was simulating cases when the strategies of the players bring them
to the corresponding terminal surfaces. The visualization window of the DSS “IT
Invest” (Fig. 3.) shows: abscissa axis – financial resources of the first investor (H);
ordinate axis – financial resources of the second investor (Q).
At the bottom of the window (Fig. 3) the output generated by the DSS is shown.
Currently, the DSS interface is only implemented in Russian and Ukrainian
localization.

7 Discussion of the Results of Computational Experiments


and the Work of DSS “IT Invest”

Figures 1 and 2 show that if the parameters determining the investment process of the
parties satisfy condition 1), then the first investor in his area of preference has a
strategy in which he will not lose his financial resources.
Along with the positive characteristics and advantages of the considered model, it
also has drawbacks. So, the drawback of the model is the fact that the predictive
assessment data obtained using the IT Invest DSS when choosing investment strategies
in Smart City did not always coincide with the actual data.
Model and software product DSS “IT Invest” can be scaled up for other investment
into information technology tasks, for example to create information and control sys-
tems for trading enterprises.
However, in comparison with the available models, the proposed solution improves
the efficiency and predictability for the investor by an average of 9–12% [8, 12].
Further prospects for the development of this study, presented in the framework of the
article, is the transfer of accumulated experience to the actual practice of optimizing
investment policy in technology for Smart City.
10 V. Lakhno et al.

8 Conclusion

A model for a decision support system in the process of financing in information


technology (IT) for Smart City was proposed. Unlike the existing, this model made it
possible to analytically find a solution to the problem using the means of bilinear
differential quality games with several terminal surfaces; it is a very difficult task for
such differential games in multidimensional spaces to find a solution in an analytical
form.
In the course of finding optimal strategies for financing IT for Smart City problem
solving, a new class of bilinear differential games was considered. The resulting
solution and a new class of equations made it possible to adequately describe the
financing processes taking into account multifactorial nature in the statement of the
problem;
The “IT Invest” software product was developed in the Visual Studio 2019 envi-
ronment. The “IT Invest” product reduces the discrepancies between forecasting data
and the real return on investment in IT for Smart City. At the same time, it makes
possible the optimization of IT investment strategies for Smart City by all parties of the
investment process.

References
1. Naym, J., Hossain, M.A.: Does investment in information and communication technology
lead to higher economic growth: evidence from Bangladesh. Int. J. Bus. Manag. 11(6), 302
(2016)
2. Khallaf, A., Omran, M.A., Zakaria, T.: Explaining the inconsistent results of the impact of
information technology investments on firm performance: a longitudinal analysis. J. Acc.
Organ. Change 13(3), 359–380 (2017)
3. Mohammed, A.N.N.A.M., Hu, W., Obrenovic, B., Aina, A.A.M.: An empirical assessment
of the link between decision support system (DSS) capabilities, competencies and firm
performance: a mediating role of absorptive capacity. In: Proceedings of the 2017
International Conference on Management Engineering, Software Engineering and Service
Sciences, pp. 193–198. ACM, January 2017
4. Sandström, J., Kyläheiko, K., Collan, M.: Managing uncertainty in long life cycle
investments: unifying investment planning, management, and post-audit with a fuzzy DSS.
Int. J. Bus. Innov. Res. 11(1), 133–145 (2016)
5. Albino, V., Berardi, U., Dangelico, R.M.: Smart cities: definitions, dimensions, performance,
and initiatives. J. Urban Technol. 22(1), 3–21 (2015)
6. Angelidou, M.: Smart cities: a conjuncture of four forces. Cities 47, 95–106 (2015)
7. Irani, Z., Sharif, A., Kamal, M.M., Love, P.E.: Visualising a knowledge mapping of
information systems investment evaluation. Expert Syst. Appl. 41(1), 105–125 (2014)
8. Lakhno, V., Malyukov, V., Bochulia, T., Hipters, Z., Kwilinski, A., Tomashevska, O.:
Model of managing of the procedure of mutual financial investing in information
technologies and smart city systems. Int. J. Civ. Eng. Technol. (IJCIET) 9(8), 1802–1812
(2018)
9. Altuntas, S., Dereli, T.: A novel approach based on DEMATEL method and patent citation
analysis for prioritizing a portfolio of investment projects. Expert Syst. Appl. 42(3), 1003–
1012 (2015)
Smart City Technology Investment Solution Support System 11

10. Gottschlich, J., Hinz, O.: A decision support system for stock investment recommendations
using collective wisdom. Decis. Support Syst. 59, 52–62 (2014)
11. Strantzali, E., Aravossis, K.: Decision making in renewable energy investments: a review.
Renew. Sustain. Energy Rev. 55, 885–898 (2016)
12. Cascetta, E., Carteni, A., Pagliara, F., Montanino, M.: A new look at planning and designing
transportation systems: a decision-making model based on cognitive rationality, stakeholder
engagement and quantitative methods. Transp. Policy 38, 27–39 (2015)
13. Akhmetov, B.B., Lakhno, V.A., et al.: The choice of protection strategies during the bilinear
quality game on cyber security financing. Bull. Natl. Acad. Sci. Repub. Kaz. (3), 6–14
(2018)
14. Smit, H.T., Trigeorgis, L.: Flexibility and games in strategic investment. Multinational
Finance J. 14(1/2), 125–151 (2010)
15. Arasteh, A.: Considering the investment decisions with real options games approach.
Renew. Sustain. Energy Rev. 72, 1282–1294 (2017)
16. Akhmetov, B.S., Akhmetov, B.B., et al.: Adaptive model of mutual financial investment
procedure control in cybersecurity systems of situational transport centers. News Natl. Acad.
Sci. Repub. Kaz. Ser. Geol. Tech. Sci. 3(435), 159–172 (2019)
17. Lee, J.H., Phaal, R., Lee, S.H.: An integrated service-device-technology roadmap for smart
city development. Technol. Forecast. Soc. Change 80(2), 286–306 (2013)
18. Paskaleva, K.A.: Enabling the smart city: the progress of city e-governance in Europe. Int.
J. Innov. Reg. Dev. 1(4), 405–422 (2009)
19. Vadgama, C.V., Khutwad, A., Damle, M., Patil, S.: Smart funding options for developing
smart cities: a proposal for India. Indian J. Sci. Technol. 8(34), 1–12 (2015)
20. Washburn, D., Sindhu, U., Balaouras, S., Dines, R.A., Hayes, N., Nelson, L.E.: Helping
CIOs understand “smart city” initiatives. Growth 17(2), 1–17 (2009)
Another Random Scribd Document
with Unrelated Content
(b.) The embassies to Gelo, Argos, etc., were sent after the
despatch of the spies (vii. 146, ad init., 148, ad init.).
(c.) Gelo, after the departure of the joint embassy (vii. 163), and
when he heard that Xerxes had crossed the Hellespont (ibid.), sent
the treasure-ships to Delphi.
(d.) Before he sent these vessels he knew that he had to expect a
Carthaginian attack (vii. 165, ad fin.).
The evidence is inconclusive. We lack the means of deciding the
sequence of the departure of the embassy and of the acquisition of
the information with regard to the coming of the Carthaginian
expedition.
7
Bergk, “Pœtæ Lyrici Græci,” Ed. 4, v. iii. p. 485: Πολλὴν δὲ
παρασχεῖν σύμμαχον Ἕλλησιν χεῖρ᾿ ἐς ἐλευθερίην.
8
Vide Note at end of chapter.
9
Livy, xxxvi. 15—“Hoc jugum (Œta) ab Leucate et man ad occidentem
verso per Ætoliam ad alterum mare orienti objectum tendens ea
aspreta rupesque interjectas habet, ut non modo exercitus sed ne
expediti quidem facile ullas ad transitum calles inveniant;” and again
(Livy, xxxvi. 17), Acilius Glabrio, speaking of Thermopylæ, “Quippe
portæ sunt hæ, et unus inter duo maria clausis omnibus velut
naturalis transitus est.”
0
There is considerable mule traffic through it at the present day.
1
It would, I reckon, be possible for a traveller to go from one plain to
the other by this route without attaining a height much over a
thousand feet.
2
It may be well to adduce one or two striking instances of this, apart
from the one at present under consideration:⁠—

1. Circ. 350 b.c., Thermopylæ was the great obstacle to Philip’s


advance south. His energies were centred in getting hold of
the pass. He never attempted an assault upon it, but finally
got hold of it by bribing Phalæcus, the Phocian condottiere.
He then left a garrison at Nicæa near Thermopylæ (Dem. ad
Ep. Phil. 4). There must have been some supreme objection
from a military point of view to the Asopos pass, since Philip,
who can hardly be suspected of military incapacity, never
tried to turn Thermopylæ by using it. He was not pressed for
time. He patiently allowed years to elapse before he got hold
of Thermopylæ. Thermopylæ was all-valuable to him, and,
what is more striking, absolutely necessary, in his opinion, for
an advance southwards. (Vide Hogarth, “Philip and
Alexander”).

2. In 279 b.c. (Pausanias, x. 20) Brennus, with more than 150,000


Gauls, invaded Greece. The object of the expedition was
plunder and nothing else. If he could have got past
Thermopylæ that object would have been attained. With such
numbers he could have done what he liked, especially if, after
getting through the Asopos defile, he had, before going
south, turned Thermopylæ by way of Hyampolis and forced
the Greeks to evacuate that pass. Pausanias, who seems to
have ample information as to the details of this Celtic raid,
gives the following list of the defending force:⁠—
Bœotians, 10,000 infantry, 500 cavalry; Phocians, 3000
infantry, 500 cavalry; Megareans, 4000 infantry; Ætolians,
7000 infantry, with numerous light armed, and cavalry;
Athenians, 1000 infantry, 500 cavalry, with numerous
triremes; Mercenaries from Macedonia and Asia, 1000
infantry.
The total cannot have been far short of 25,000 men.
The force was so large that the commanders were enabled
not merely to provide for the defence of the pass itself, but
were also able to send out cavalry and light armed to dispute
the passage of the Spercheios, a move which Brennus, who
was, as Pausanias remarks, “not altogether wanting in
understanding, nor, for a barbarian, without a certain amount
of experience in devising stratagems,” frustrated by sending a
number of his men across the bar at the river mouth. On this
the Greek advanced guard retreated to the pass. Brennus
then had bridges thrown across the river, and attacked
Heraklea. The Heraklea of that date was probably situated on
the mountain immediately west of the mouth of the Asopos
ravine, on a site now known as Sideroporto. He did not take
the place; and Pausanias adds in reference to this, that
Heraklea was to him “a matter of lesser moment: he
considered the main point to be to drive out of the pass those
who were in occupation of it, and to make good his passage
into Greece south of Thermopylæ.”
It is of course manifest that such a passage as the Asopos
ravine would be easily defensible, and the Herakleots may
have blocked it. There is no question that, had it been
passable, Brennus might have used it. The striking fact is that
he did not use it, but spent his strength on a terrific failure at
Thermopylæ.
3. In 224 (vide Polyb. xi. 52) Antigonus, wishing to get to the
Isthmus, marched with his army by way of Eubœa. “He took
this route,” says Polybius, “because the Ætolians, after trying
other expedients for preventing Antigonus bringing this aid,
now forbade his marching south of Thermopylæ with an
army, threatening that, if he did, they would offer armed
opposition to his passage.”
It is to be noted that, as at the time of Brennus’ assault,
the defenders of the pass were also in possession of
Heraklea.
4. In b.c. 208 (vide Polyb. x. 41) the Ætolians, seeking to prevent
the passage of Philip of Macedon southwards to aid his allies,
“secure the pass of Thermopylæ with trenches and stockades
and a formidable garrison, satisfied that they would then shut
out Philip, and entirely prevent him from coming to the
assistance of his allies south of the pass.”
In this case also (vide chap. 42) the Ætolians were in
possession of Heraklea.
5. In a passage already quoted, Livy (xxxvi. 15) is most emphatic
in his statement that the only practicable military route by
Œta is that through Thermopylæ. He is describing the attack
of the Romans under Acilius Glabrio upon the troops of
Antiochus who were defending the pass, and it is again
reported that the allies of the defenders were in possession of
Heraklea.
We are now in possession of practically all the data which can be
obtained from the ancient historians with regard to the exact
significance of the Asopos ravine, and the route through it. It must
of course be borne in mind that the information of the historian Livy
with regard to the topography of the Thermopylæ region was
second-hand; but yet, in spite of that, there is a certain consistency
about the evidence which enables us to form highly probable
conclusions with regard to the exact value of this factor in the
strategical geography of the region.
It seems to me to have been a recognized principle in later times
that an effective defence of Œta included the occupation of Heraklea
as well as of Thermopylæ, and the only conceivable reason for the
existence of such a view is that Heraklea commanded the passage of
the Asopos ravine.
The site of the Heraklea of this period is to be sought, I venture to
think, at the place called Sideroporto, where there are large remains
of a strongly fortified town. It is high on the slope of Œta, in an
exceedingly inaccessible position, in the angle, as it were, between
the Asopos ravine and the line of the Trachinian cliffs.
A local tradition, probably of recent date, and due, like so many
traditions of modern Greece, to the visit of some inquirer whom the
natives regarded as an authority, attaches the name of Heraklea to
certain ruins which stand on the summit of a remarkable flat-topped
mountain in the valley at the head of the Asopos ravine, to which
reference has been already made, between the plains of Malis and
Doris. It is infinitely more probable, however, that this was the
stronghold of those Œteans whom Thucydides mentions.
The site is more than two hours distant from the nearest point of
the Malian plain, at the outlet of the Asopos ravine.
3
Cp. H. vii. 175, ad fin.
4
It has been criticized in modern times on strategical principles (e.g.
by Delbrück), for which a universality of truth has been claimed. It is
said that, given two adversaries of equal strength, that one places
himself at a disadvantage who attempts to defend the passage of a
range of mountains. It is manifest that the assailant can concentrate
his efforts on the forcing of one passage, whereas the defender has
to distribute his defence among all the practicable passages of the
chain. In the particular case of Mount Œta it is urged that there was,
besides Thermopylæ, at least one practicable passage, and this is
stated to have followed the modern road from Malis into Doris;
which passes over the low part of the chain immediately east of the
Asopos ravine.
Could it be proved that such a road ever existed the general
criticism would be sound. As a fact, all but demonstrable proof exists
that no such road, practicable from a military point of view, ever did
exist in ancient times. Leave out of the calculation the Greek of 480
and the Gaul of 279—although in the case of the latter, if Pausanias’
evidence be worth anything, the Malians showed a very pardonable
desire to expedite his departure from the region, and would have
been most anxious to show Brennus such a road, had it existed—
and merely take into consideration the Greek, the Macedonian, and
the Roman of later times. For years and years these peoples were
fighting in every part of North-East Greece. They knew its
topography by heart. The land became the veriest strategic
chessboard that ever existed in ancient warfare, on which every
move could be calculated to a nicety. And yet Thermopylæ remained
the same—that square on the board where king and consul could
alike be checked. Could it have been so had such a path existed?
It has already been seen that the holding of Heraklea was
regarded as a necessary factor in the defence of Thermopylæ. That
Heraklea was almost certainly situated at Sideroporto, commanding
the Asopos ravine indeed, but cut off by that very ravine—a mere
crack several miles long and nine hundred feet deep—from the line
taken by this imaginary road; that is to say, Heraklea would have
been absolutely useless for its defence. If it existed, why then did
neither Greek, Macedonian, nor Roman use it? Why did Philip of
Macedon, the father of Alexander, shirk the attack on a pass which
he could so easily have avoided?
It has already been said that the Greeks have made a new road
along that line. It is an excellent piece of work, but so great is the
climb to the summit of the pass that a two-horse carriage takes
three hours to accomplish it. The gradient of the hill-side can best be
imagined when it is stated that after climbing for an hour and a
quarter along this road, the traveller finds himself within less than
half a mile of the point from which the climb began, and the greater
part of that half-mile is vertical.
In criticizing ancient warfare a tendency is but too frequently
displayed to ignore the main factor of all warfare—the human
element. In criticizing Greek warfare in particular, it is, moreover, too
often the case that the critic is either unaware of, or has never
realized, the nature of the country with which he is dealing. An
ordinary Greek hill-side, though it appears easy of passage when
viewed from even a short distance, presents difficulties which can
hardly be paralleled in any other country in Europe. Thick, low,
strong bush, much of it thorny, covers it just to a sufficient depth to
hide the thickly sown, razor-edged rocks beneath. Human nature as
represented by the Greek hoplite in his heavy armour could not face
it, and progress over it even for a light-armed man is very slow and
very exhausting. The strategy and tactics of war are bounded by the
difficult rather than by the impossible. There can be no question that
the passage over this part of the range of Œta can never have been
practicable to anything more than the merest skeleton of a flying
column, and could not possibly have been negotiated by any force
sufficiently large to affect the defence of Thermopylæ by any turning
movement, or sufficiently well provided with provisions to
accomplish the long circuit which such a turning movement would
have demanded.
There is one more striking proof that such a road did not exist in
480. Had it existed it must have crossed that path of the Anopæa by
which Hydarnes and his men turned the pass. If so, why did he
make the long circuit by the Asopos ravine, when a shorter way was
practicable?
5
Cf. the mistake made as to the defensive nature of the position at
Tempe; also, the ignorance of the existence of the path of the
Anopæa at Thermopylæ.
6
The expedition to Thessaly was made while Xerxes was at Abydos,
certainly not later than April, 480. The departure of Leonidas for
Thermopylæ took place a little before the Carnean festival, about the
beginning of the month of August.
7
Diodorus’ account of the circumstances preceding the battle is
manifestly an imaginary tale of indeterminate origin concocted after
the event.
8
This seems to indicate that the Persian camp was altogether outside
the west gate, and not any part of it in the plain of Anthele.
9
This shows clearly that the wall was not, as some have supposed, on
the low ground at the pass of the middle gate, but on the neck of
the first mound (vide note on Topography of Thermopylæ). Had it
been on the low ground, the scout would, from the comb of the
mass of stream débris of the great ravine, have been able to see
over it.
0
These last words are, I believe, the true translation of the
expression in Herodotus. There would be little point in repeating the
fact of the river flowing through the ravine as a sort of mark of the
identity of a stream whose course the historian had recently
described with considerable detail. There is much point in the
indication of what investigation at the present day shows to have
been the fact, that this path did start from the Asopos ravine.
My own impression is that it sprang into use originally as a means
of communication between that upper valley which I have
mentioned as existing in the range of Œta, and probably also the
Dorian plain, and Thermopylæ, when a flood of the Asopos rendered
the ravine impassable. It would also form a direct means of
communication between the Œteans and Locrians without passing
through Trachinia.
1
It is of course impossible to deduct the number of killed in the
previous fighting, simply because we have no information as to what
that number was.
2
Epialtes’ calculation that the circuit of the path would be completed
about the middle of the morning must, judging from the details
given of the actual march, have been singularly correct.
3
Leake says that the descent was not much less than the ascent in
actual distance; but that as the ground was better, and the march
performed by daylight, the time spent was shorter. Leake is certainly
in error. The place were the Phocians were surprised is recognizable
with certainty, I think, at the present day. It corresponds with what
Herodotus tells us of the incident, and it is absolutely the only place
along the whole path where the events narrated could have taken
place. When the Persians reached that point, which is probably the
highest altitude attained by the path, they would have traversed
two-thirds of the whole distance. I must say that Leake’s attempt to
reconcile his views with those of Herodotus by saying that the rest of
the path is easier than that previously traversed is quite contrary to
my own actual experience. From the summit to Drakospilia its
character is that of a track winding amid rocks through a thick fir
forest. Not until you get close to Drakospilia does the country really
open up.
4
They advanced, that is to say, to a position somewhere near the
modern baths.
5
They had fought, that is, on the low ground at the foot of
Kallidromos immediately to the west of the mound.
6
The statement that they already knew that they must be taken in
the rear is in accord with Herodotus’ idea of what took place. It is,
however, probable that they heard early from Alpenoi, to which
some of their sick had been sent, of the fact that the other division
of their army had not succeeded in stopping, or, possibly, had not
attempted to stop Hydarnes.
7
The pillar at Sparta, with their names inscribed upon it, remained
standing in Pausanias’ time (iii. 14, 1).
8
The position was well designed for a last desperate stand. The rear
was protected by the small but deep valley between the first and
second mound. It is noticeable that they did not attempt to defend
the wall. It may seem strange that they should not have done this.
The position of the wall, however, running along the neck of land
joining the hillock and the slope at Kallidromos, would expose its
defenders to an attack from the rear. The Greeks evidently retreated
from their position near the modern baths; through the narrows
between that and the hillock; and up to the west slope of the latter,
passing the wall at the summit of the slope on to the mound itself.
9
The parallel diary of events as it appears in Herodotus is as
follows:⁠—
Day. Thermopylæ. Artemisium.
1 Persian army leaves
Therma.
Day. Thermopylæ. Artemisium.
12 Persian fleet leaves Therma and
reaches Magnesian coast.
13 Storm begins in morning.
14 Army reaches Malis. Storm continues.
15 Storm continues.
16 Storm ceases. Fleet moves to Aphetæ.
Despatch of 200 vessels round Eubœa.
First sea fight.
17 Second sea fight after the arrival of 53
Athenian ships.
18 First attack on Third sea fight. News of disaster at
Thermopylæ. Thermopylæ in the evening.
19 Second attack on
Thermopylæ.
20 Disaster at
Thermopylæ.
0
Herodotus does not give any indication as to the time at which the
Greeks received news of the disaster. It is necessary therefore to
make certain calculations as to the earliest possible moment at
which the news can have reached them. As far as can be seen from
the narrative, the ten Persian scouting vessels started from Therma
on the same day as the main body of the fleet, but probably at an
earlier hour. It must have been well on in the morning before they
came upon the Greek vessels off the mouth of the Peneius, which is
fifty miles from Therma. The only conceivable means by which news
of the engagement could have reached Skiathos, some seventy miles
south of this point, is by the appearance of those ten vessels with
the captured Greek ships in their company. That being the case, the
Greek fleet at Artemisium cannot have received the news before the
evening of the day.
1
The ancient Mekistos.
2
It is more probable that it was under the shelter of the great cliffs of
Mount Kandili, in the neighbourhood of the modern Limni. There is a
sandy shore for many miles at the foot of those cliffs, upon which
vessels might be conveniently drawn up.
3
A nine-knot steamer takes about seven hours from Chalkis to
Stylida, which is about the same distance as from Chalkis to
Artemisium. There is no question that a trireme could maintain a
high rate of speed for hours together. Nor is there reason to doubt
Herodotus’ statement that the voyage of the Persian fleet from
Therma to the Sepiad strand took but one day, a distance, that is to
say, of one hundred and twenty miles in fourteen hours of daylight,
over eight miles an hour—even supposing that such a large number
of vessels could put out and put in in the dark. The probability is,
however, that the fleet never went to Chalkis at all; or, if it did, that
it moved up the Euripus after receiving the news of the disaster to
the Persian fleet, so as to be ready to go to Artemisium without
delay so soon as the storm ceased.
4
The strong bias which Herodotus displays in his references to
Themistocles is of itself sufficient to render the tale of bribery open
to suspicion. Furthermore, the sum mentioned, thirty talents, is an
extraordinarily large sum for the people of North Eubœa to raise at
short notice.
5
Diod. xi. 12, mentions this, but gives the number of the squadron as
three hundred.
6
Diodorus gives no exact indication of the time of despatch, though
he mentions it immediately after describing the arrival at Aphetæ.
7
Same day as first engagement (vide note over page).
8
If any calculation can be made from this very defective chapter of
Herodotus’ history, this day must have been the eighteenth day. The
three combats at Artemisium are represented as having taken place
on successive days. The last took place on the day of the
H. viii 14, 15.
disaster at Thermopylæ, i.e. the twentieth day.
H. viii. 9. Therefore the first took place on the eighteenth, and it is
represented as having taken place on the evening of the
day on which the council of war was held.
9
This view is supported by Herodotus’ account of what took place
next day. The storm in which the Persian flying squadron is wrecked
takes place on the evening of the eighteenth day. When the storm
ceased we do not know. But it is certain that the fifty-three Attic
vessels must have ridden it out at Chalkis, and that they, after it was
over, made the long voyage from Chalkis to Artemisium, where they
found the Greek fleet. The storm must have been a brief one; and if,
as Herodotus says, there had been a definite resolution on the part
of the Greek commanders to move south in the early hours of the
morning of the nineteenth day, no reason is apparent why it should
not have been carried out. The real design of the Greeks was
probably to make an attempt to beat the divided Persian fleet in
detail.
0
Though Herodotus is aware of a connection between the positions at
Thermopylæ and Artemisium, there is nothing whatever in his
account which suggests that he understood how necessary the
connection was for the maintenance of the pass. Had he appreciated
this, he would hardly have treated as serious history such parts of
the Artemisium tradition of his time as asserted that the responsible
Greek commanders ever entertained the idea of such action as must
have inevitably sacrificed the lives of the defenders of the pass. He
has given the irresponsible gossip and criticism of the Peloponnesian
section of the fleet the appearance of responsible and authoritative
design, and has served up the whole with copious Attic sauce. There
is, however, no reason for supposing that the historian was in any
way guilty of historical dishonesty. He simply did not possess that
knowledge of military affairs which would have enabled him to see
the flaws in the evidence which came to his hand; and this negative
defect was further complicated by what was, from the point of view
of strict history, the positive one of accepting anything in the
tradition of the war which would bring into relief the patriotic
services of Athens. If we tone down the intensely Attic colouring in
Herodotus’ account of Artemisium, that is to say, such passages as
are designed to bring into relief the difficulty of keeping the fleet at
its station, we have, in all probability, a good historical account, in so
far as it goes, of this part of the campaign of 480.
1
The manœuvre of the διέκπλους seems one of the most simple
things in the world when it has been discovered. Yet in modern
times it took the English sailors more than a century of hard fighting
to find out its effectiveness. Thucydides, who knows what he is
talking about in naval matters, certainly conveys the impression that
it was an invention of his own time, or, at any rate, that it had, as a
manœuvre, been gradually evolved within the period of the
Pentekontaëtia. And yet, here we have it at Artemisium! Nay, more
than that, fourteen years earlier, according to Herodotus, Dionysios
of Phokæa was trying to teach it to those unappreciative Ionians at
Ladé. It is probable that both in this passage and in the one relating
to Ladé, Herodotus is guilty of an anachronism in attributing that
manœuvre to the naval warfare of the first quarter of the fifth
century. The term was probably much in men’s mouths at the time
which he wrote, and, in his ignorance of naval matters, he assumed
that the ruling idea in the sea tactics of his own day might be safely
attributed to the previous generation. Compare also H. viii. 11 with
Thuc. ii. 83, ad fin.
2
There is an undesigned consistency between the two accounts of
the effects of the storm in North and South Eubœa respectively. A
glance at the map will show that, (1) in the North, the driving of the
wreckage towards the shores of Aphetæ; (2) in the South, the
driving of the 200 vessels upon the Hollows of Eubœa, both indicate
a storm from the South or S.S.W.
3
It seems to have taken some thirty hours to round Skiathos, and
voyage down the east coast of Eubœa.
4
The identity of these bays with Τά Κοίλα has been called in question
in modern times. If this passage in Herodotus were the only
evidence we possessed, the question of their position would
manifestly be a very open one. All that Herodotus’ language seems
to indicate is that they were a well-known feature in the geography
of South Eubœa. Had they not been so, we should have expected so
painstaking a topographer to have given some indications of their
actual position. His silence, and the inference to be drawn from it, is
not without significance. The Hollows would hardly have been a
well-known feature had they been east of the South Cape, away
from the line of sea traffic; whereas on the west shore they would
be in full view of all vessels using the frequented passage of the
Euripus. I think, too, that any one who has seen that coast of
Eubœa, either from Attica, or when passing up the channel, cannot
but have been struck with the depth of the colour which the retiring
coast-line of these bays gives to the Eubœan landscape thus viewed.
Their recesses give that appearance of “hollowness” from which the
ancient name must have been derived. We are not, however,
dependent on Herodotus alone for indications as to their locality.
Vide Liv. 31, 47; Strabo, 445; Valer Max. 1, 8, 10.
5
It is exceedingly unlikely that the Persian squadron would have been
able to force the narrows at Chalkis, if, as was almost certainly the
case, the fifty-three Attic vessels were ready to defend it. But had
they put in at Eretria and blocked the channel south, the position of
the main Greek fleet, in case of anything resembling a reverse at
Artemisium, would have been very precarious.
6
The fact that they were able to single out a special contingent for
attack confirms, by implication, Diodorus’ statement as to the
scattered nature of the anchorage at Aphetæ.
7
The effect of the engagement on the minds of the Greeks is
mentioned in language which is almost, word for word, a repetition
of that which he has used on a previous occasion. He says, Δρησμὸν
δὴ ἐβούλευον ἔσω ἐς τὴν Ἑλλάδα.—H. viii. 18. Cf. the expression in
viii. 4.
8
In speaking of Doris, Herodotus says: Ή δὲ χώρη αὕτη ἐστὶ
μητρόπολις Δωριέων τῶν ἐν Πελοποννήσῳ. That the land had a
Dorian population in the fifth century b.c. is undoubtedly the case;
but its claim to be metropolis of the Dorians of the south was in all
probability set up by the Spartan authorities, as affording a
convenient pretext for interference in Greek affairs north of Isthmus.
It is probable that this corner of Greece, of which the Malian plain
was the centre, contained patches of various peoples which had in
different ages traversed the peninsula, or which had been driven into
its mountain fastnesses by the passage of invaders:⁠—Dorians,
Œtæans, Trachinians, etc., were probably such remains of larger
tribes.
9
Herodotus seems from his language to assume (viii. 31) that the
whole army had come south by the Dorian route. That is, either a
mistake; or, more probably, the impression his language gives is due
to a mere omission. Few details are given of any part of the route of
the army.
0
The position at Delphi, from a military point of view, is by no means
weak, provided Amphissa be occupied, and the great pass from the
north be thus closed. Under those circumstances, unless the
assailant is in a position to land troops at the head of the Krissæan
gulf, the only line of attack is along this easily defensible path from
the west. It is imaginable that Xerxes, knowing it to be an open
town, under-estimated the difficulty of its capture.
1
Pogon is an almost land-locked harbour between the island of
Kalauria and the mainland.
2

A Comparison of the Lists Vessels


of at Artemisium and Salamis
respectively.
T. = trireme; P. = pentekonters.
Artemisium. Salamis.
{127 T.
Athenians (some Platæans in crews at
53 T. later} 180 T.
Artemisium)
180 T.
Corinthians 40 T. 40 T.
Megareans 20 T. 20 T.
Chalkidians in Athenian ships 20 T. 20 T.
Æginetans 18 T. 30 T.
Sikyonians 12 T. 15 T.
Lacedæmonians 10 T. 16 T.
Epidaurians 8 T. 10 T.
Eretrians 7 T. 7 T.
Trœzenians 5 T. 5 T.
Styreans 2 T. 2 T.
Keians 2 T.; 2 P. 2 T.; 2 P.
Opuntian Locrians 7 P. —
Hermionians — 3 T.
Ambrakiots — 7 T.
Leukadians — 3 T.
Naxians — 4 T.
Kythnians — 1 T.; 1 P.
Krotonians — 1 T.
Malians — 2 P.
Siphnians — 1 P.
Artemisium. Salamis.
Seriphians — 1 P.
366 T.;
324 T.; 9 P.
7 P.
Æschylus gives 310 as the number of the Greek fleet. Valuable as
is the testimony of the poet with regard to those incidents in the
battle which he observed as an eye-witness, his evidence on the dry
question of numbers is not likely to be exact.
3
She did, indeed, send sixty vessels, to observe, so said the patriot
Greeks, how the war went, but not with any intention of taking part
therein. The Corcyræans’ own excuse for their non-participation was
that their fleet had been unable to round Malea.
4
The mistake may be that of a manuscript copyist; but such mistakes
are so common in the text of Herodotus, that they afford strong
ground for supposing that the historian was, like the men of his
time, inaccurate in numerical calculations. The mistake may be in
Paus. ii. 29. 5. the detailed list. Pausanias implies that the Æginetan
contingent was superior in numbers to that of the
Corinthian, that is to say, more than forty. If the number were forty-
two, the total given by Herodotus would be correct; and it is
noticeable in this reference that he himself, in speaking of the
H. viii. 46. number of ships which Ægina supplied, says: “Of the
islanders the Æginetans supplied thirty; they had indeed
other ships manned; but with these they were guarding their own
country; but with the thirty best sailers they fought at Salamis.”
5
By Professor J. W. Bury.
6
Macan, Herod, iv., v., vi., “Athens and Ægina.”
7
Note on the Reference to Siris in Themistocles’ Speech.—The
reference to Siris inevitably suggests that this reported passage in
Themistocles’ speech is an invention of later date arising from the
colonization of Thurii in or about 443. The rapid growth of Athenian
trade in the earlier part of the fifth century, and its peculiar
development along the western route, render it possible, however,
that an idea of settlement on or near the deserted city of Sybaris
may have been long anterior to the actual settlement, and may have
been mooted even before 480. If Plutarch is to be believed,
Themistocles had direct relations with Corcyra, and gave the name
of Sybaris to one, and the name of Italia to the other of his
daughters (Plut. Them. 32).
8
H. viii. 74. τέλος δὲ ἐξερράγη ἐς τὸ μέσον. Cf. also Diod. xi. 16, ad
fin.
9
This Council of War must have been held on the morning of the day
preceding the battle. It lasted, in all probability, several hours, and, if
so, this would indicate the afternoon as the time at which Xerxes
received the message of Themistocles. On this point, then, the
indications in the narrative of Æschylus and Herodotus are in
agreement.
0
Plut. Them. also mentions the same name; but the testimony is
probably dependent on that of Herodotus.
1
There is a curious triangular concord at this point in the history.
Diodorus says that the Egyptian contingent was sent to block the
strait towards the Megarid (xi. 17).
Plutarch says 200 vessels were sent to close the passage round
Salamis (Them. 12).
Herodotus mentions that the Egyptian contingent numbered 200
(vii. 89).
2
This would account for the fact implied by Æsch. Pers. 400: the two
fleets when they started their movement were not in sight of one
another, though, very shortly after the movement began, the Persian
fleet was visible to the Greeks. The latter would first catch sight of it
after it rounded the Kynosura promontory and the island.
3
Cf. Arist. 8, where the revocation is said to have taken place τρίτῳ
ἔτει after the sentence.
4
Cf. Stein’s brief note on the translation of the words στὰς ἐπὶ τὸ
συνέδριον in H. viii. 79.
5
In so far as I know, this last very important point was first raised by
Prof. J. B. Bury in an article in the Classical Review on “Aristides at
Salamis.”
6
This is Professor Bury’s suggestion. It is open to the objection that
Herodotus expressly mentions the arrival of this vessel (H. viii. 83)
immediately before the battle began. But this objection is not by any
means insuperable. It is much more probable, under the
circumstances, that Herodotus made a mistake as to the time of its
arrival, than that it managed at the time he mentions to force its
way through the blockading fleets at either end of the strait.
7
It would seem as if it were a description of this movement, taken
from his notes on, or sources of information for, the details of the
battle, which Herodotus has used by mistake in describing the
movement of the Persian fleet during the night. He has, of course,
intensely confused the original description by reading into it what he
knew to be the object of that night-movement—the surrounding of
the Greek fleet by blocking the issues both to east and west of it;
but, eliminating this motive from his description, it is possible to see
that in its original form it must have resembled very closely the
description of the advance of the Persian fleet which has been drawn
from the details which Æschylus and Diodorus give.
H. viii. 76. “The west wing put out and made a circling movement
towards Salamis.” It has been already pointed out that by “west
wing” Herodotus evidently means, not the west wing in the original
formation, but the west wing when the fleet had completed the
movement, and had taken up the position which he imagined it to
have assumed when the movement was complete. This “west wing”
would be the east wing in the original position. That it cannot have
been the original west wing has been pointed out in a previous note.
If this correction be made, Herodotus’ language in describing this
movement is peculiarly applicable to the movement of that part of
the Persian fleet which entered the strait by the channel east of
Psyttaleia—ἀνῆγον κυκλούμενοι πρὸς τὴν Σαλαμῖνα; and the
applicability becomes still more striking in view of the evidence,
which will be given later, that this wing of the Persian fleet got in
advance of the other.
The left wing, which would use the channel west of Psyttaleia, is
equally referred to in the words: “Those about Keos and Kynosura
put out in order,” to which he adds, in accordance with his
knowledge that part of the object of the night-movement was the
blocking of the straits, “And they occupied the whole strait as far as
Munychia with their ships.”
8
This phenomenon of the morning wind is very common in the Greek
seas. It will be remembered that Phormio based his tactics in his first
battle with the Corinthian fleet just outside the Corinthian gulf on its
occurrence. I have experienced it there; and on the three occasions
on which I have been through the Strait of Salamis, once in the
summer of 1895, and twice in the summer of 1899, I have
experienced it on each occasion. It began in all three cases quite
suddenly, a little before seven in the morning, blowing from the
west, right down that part of the strait south of Ægaleos. It was
extremely violent while it lasted, though it did not raise a dangerous
sea. To the inexperienced it gave the impression that it meant the
beginning of a very windy day. On two occasions it ceased about
8.30, on the other, shortly after nine, and the dead calm by which it
had been preceded ensued once more.
9
As is shown by the presence of an Attic vessel opposite the Persian
left, where her ships must almost certainly have been.
0
Cf. Æsch. Pers. 724,—Ναυτικὸς στρατὸς κακωθεὶς πεζὸν ὤλεσε
στρατόν. Thuc. i. 73, 5.—Νικωθεις γὰρ ταῖς ναυσίν ὡς οὐκέτι αὐτῷ
ὁμοίας οὔσης της δυνάμεως κατὰ τάχος τῷ πλέονι τοῦ στρατοῦ
ἀπεχώρησεν.
1
Modern historians have taken this account of the intended or
attempted construction of the mole too seriously. It has been
pointed out, for instance, that the only point in the strait east of the
bay of Eleusis at which it could possibly be carried out, is at the
narrows where the island of St. George contracts the width of the
channel, and that it is impossible that, under the circumstances as
they stood, Xerxes should have been able to bring vessels to that
part of the strait. But Herodotus never attempts to give the
impression that the operation was ever undertaken seriously; he
makes it plain, indeed, that it was not. If that were so, and it was
merely designed to give the Greeks a wrong impression, it did not in
the least matter whether it was made at a possible or impossible
point. Ktesias, Pers. 26, and Strabo, 395, say that the mole was
begun before the battle. This would imply that a serious attempt was
made to construct it. The notorious unreliability of Ktesias, and the
lateness of Strabo’s evidence, render this account of the matter
unworthy of consideration.
2
H. viii. 103. Λέγουσα γὰρ ἐπετύγχανε τὰ πὲρ᾿ αὐτὸς ἐνόεε.
3
Οὐδεμία συμφορὴ μεγάλη ἔσται σεό τε περιεόντος καὶ ἐκείνων τῶν
πρηγμάτων περὶ οἶκον τὸν σόν.
4
It has been suggested that the real intention was to induce the
Ionians to revolt. The behaviour of this contingent in the recent
battle was not calculated to encourage such a plan, conceived within
a few days of the actual fight.
5
Ἐπείτε οὐκ ἐπαύετο λέγων ταῦτα ὁ Τιμόδημος, etc.
6
May it not be suggested that some archæologist acquainted with the
extant remains of Phœnician Carthage might confer a distinct service
on history by examining the structures at Agrigentum which date
from this period? The workman as well as the designer must have
set his mark there.
7
It has already been remarked that his description of Thermopylæ is
that of a traveller coming from the north—“from Achaia”—as he
himself says.
8
Herodotus himself (ix. 8) takes this view of the matter. He implies
that the Spartans did not care whether the Athenians medized or not
after the wall was completed. It is quite out of the question,
however, to suppose that the Spartans could have regarded with
equanimity the possible transference of the Athenian fleet to the
Persian side. They had the experience of Artemisium and Salamis to
guide them.
9
It is sometimes assumed from H. vii. 229, that the usual quota was
one helot to each hoplite; but a more probable interpretation of that
passage is that the reference is to the personal armed servant who
accompanied each hoplite to war, and that it cannot be deduced
therefrom that the body of these formed the whole number of the
helots present on an ordinary occasion.
Modern criticism of the impossibility of despatching so large a
force unknown to the Athenian embassy is not convincing. We do
not know the place at which it gathered. It is extremely likely that a
large number of helots were drawn from Messenia, and joined the
army at Orestheion, where the great route from Messenia meets the
route from Sparta by way of the valley of the Eurotas.
0
His departure from the Isthmus is ascribed by Herodotus to the fact
that when he was sacrificing ἐπὶ τῷ Πέρσῃ an eclipse of the sun took
place. This eclipse has been calculated to have occurred on the 2nd
of October, 480. If so, it would be about the time of the Persian
retreat from Attica after Salamis, and Stein’s conjecture that the
sacrifice had something to do with a plan to harass the Persian
retreat, has a certain amount of probability in its favour.
1
If Sparta had been careless as to whether Athens medized or not,
she might, probably would, have despatched troops to the Isthmus
at an earlier date. But if she was waiting until pressure of
circumstances forced Athens to adopt Peloponnesian views as to the
line of defence, then the delay is accounted for. Had her army been
at the Isthmus when Mardonius advanced into Bœotia, the
Athenians would certainly have called upon it to carry out the
agreement, and march to the northward of Kithæron. In that case
the Spartan government would have been obliged either to comply,
or, by a refusal, to show in the most unmistakeable manner possible
the war policy which it intended to adopt.
2
I was, I confess, surprised to find in August, 1899, that, in spite of
the excellent road to Megara from Bœotia by the way of Eleusis, the
track on the old line of the Platæa-Megara road is still largely used.
3
A road has been constructed through it in recent years, running from
Kriekouki on the Bœotian side to Villa on the south of the range.
4
I am inclined to think that the site of Skolos is that which Leake, and
others following him, have identified with Erythræ. Paus. ix. 4, 3,
says that if before crossing the Asopos river on the road from Platæa
to Thebes, you turned off down the stream, and went about forty
stades, i.e. four and three-quarter miles, you came to the ruins of
Skolos. This would place it not far east of the road from Thebes to
Dryoskephalæ. He speaks of Skolos in another passage as a village
of Parasopia beneath Kithæron, a rugged place, and δυσοικητός.
That seems to preclude the idea of its being near the river, which
traverses alluvial lands at this part of its course. The ruins identified
by Leake as Erythræ cannot belong to that town if the testimony of
Herodotus and Pausanias is accurately worded. This point will be
discussed in a later note. In actual fact, however, the exact site of
Skolos is very difficult to determine. My main reason for suggesting
that it stood where Leake places Erythræ is that those ruins are the
only ruins in the neighbourhood indicated by Pausanias, and are
certainly not the ruins of Erythræ.
5
It is necessary to pursue so obvious a line of argument, because, for
some incomprehensible reason, modern historians have thought it
right to judge of the plans of these able Persian commanders as
though they were dictated by no higher considerations than such as
might occur to an untutored savage.
6
The weakness of this line in case of attack from the north was
conclusively shown twenty years later in the manœuvres which led
to the battle of Tanagra.
7
It is almost certain that an ancient road from Eleusis followed the
eminently natural line taken by the modern road from Eleusis to
Eleutheræ. There was also, in all probability, a route from Athens to
Eleutheræ which did not enter Eleusis at all, but, branching from the
Sacred Way near the Rheitoi after traversing the low pass through
Mount Ægaleos, went up the Thriasian plain and joined the road
from Eleusis among the low hills of Western Attica.
8
These ridges will be found numbered 1, 2, 3, 4, 5, 6, in the
accompanying map.
9
Marked A 6 in the map.
0
Called in the map, for purposes of distinction, the Asopos ridge, the
Long ridge, and the Plateau.
1
Those of the streams marked A 4 and A 5 on the map.
2
During my stay at Kriekouki, in December ’92–January ’93, the
rainfall was at times extraordinarily heavy. Nevertheless, I had not
on any occasion the slightest difficulty in crossing any of the
streams, and it was not even necessary to get wet in so doing. On
one occasion also I happened to be following the line of one of the
watercourses leading to the Œroë amid a downpour of rain such as
we rarely see in England, which had been going on with more or less
continuity for the previous fourteen hours; and yet, as I descended
the brook towards the plain the water became less and less until, on
the plain, there was no water running in the stream bed.
3
Pausanias knew the roads through these two passes.
(1) Platæa-Athens road.
He says (xi. 1, 6) that Neokles, the Bœotarch, in his surprise of
Platæa in the year 374, led the Thebans οὐ τὴν εὐθεῖαν ἀπὸ τῶν
Θηβῶν τὴν πεδιάδα, τὴν δὲ ἐπὶ Ὑσιὰς ἦγε πρὸς Ἐλευθερῶν τε καὶ τῆς
Ἀττικῆς.
There will be occasion to show that Hysiæ was in all probability a
small place, on a site just outside the southernmost end of the
village of Kriekouki. It was therefore at the eastern side of the
opening of the valley through which the road from Platæa to Athens
passed. The remains of that ancient road are, however, at the other
side of the valley opening; and, therefore, Hysiæ was not upon it.
Probably, however, down the valley came a track which is still used,
and which, after passing through the village of Kriekouki, goes due
north to Thebes in a line parallel to the main road from
Dryoskephalæ. This would be the road which Pausanias here
mention. It would, in entering the valley to the pass, go close to this
site of Hysiæ. Of the identity of this site it will be necessary to speak
in a later note.
In 379, after the revolution in Thebes (X. H. v. 4, 14), the
Spartans despatched Kleombrotos with a force to Bœotia. As
Chabrias, with Athenian peltasts, was guarding “the road through
Eleutheræ,” he went, κατὰ τὴν εἰς Πλαταιὰς φέρουσαν.
This is almost certainly the Platæa-Athens pass. Kleombrotos
probably did not discover that the Dryoskephalæ pass was guarded
until he got to Eleutheræ. After doing so he turned to the left and
made his way through the Platæa-Athens pass, exterminating a
small body of troops which attempted to defend it.
(2) The Platæa-Megara road.
Pausanias (ix. 2, 3) says, Τοῖς δὲ ἐκ Μεγάρων ἰοῦσι πηγή τέ ἐστιν
ἐν δεξιᾷ καὶ προελθοῦσιν ὀλίγον πέτρα· καλοῦσι δὲ τὴν μὲν
Ἀκταίωνος κοίτην.
In the previous sentence he has expressly spoken of the road
from Eleutheræ to Platæa. The Megara road is therefore a different
road. The κοὶτη Ἀκταίωνος can, I think, be determined with sufficient
certainty at the present day. It is on the top of a low cliff, probably
the πέτρα mentioned, overhanging the sources of the stream O 3.
Near the foot of the cliff is an ancient well, known in Leake’s time as
the Vergutiani Spring.
4
Ἐπὶ τῆς ὑπωρέης τοῦ Κιθαιρῶνος.
5
The site of Erythræ.
Colonel Leake identified it with certain ruins which are found at
the foot of the mountain slope several miles east of the road from
Dryoskephalæ to Thebes. The available evidence seems to me to be
strongly against this view.
(1) The traditional site is where I have placed it, though I am
afraid that but little stress can be laid on traditions in modern
Greece.
(2) Its comparatively frequent mention by Greek writers seems to
indicate that, though a small place, its position was of some
importance. If Leake’s view be correct this cannot have been the
case. If it were where I believe it to have been, it would be at the
northern exit of one of the most important passes in Greece. There
is an ancient φρουρίον on the bastion of Kithæron to the east of the
site. Its remains are so scanty, however, that they do not afford any
clue as to its date.
(3) There are remains of ancient buildings on the site. There are
also remains of an ancient well, besides which is a heap of stones,
from which two stones were obtained a few years ago with
inscriptions showing them to have belonged to a temple of
Eleusinian Demeter. Pausanias mentions so many temples in the
neighbourhood dedicated to that deity, that the discovery
contributes but little to the identification of the site. I was informed
at Kriekouki last year (August, 1899) that those particular stones
were known to have been originally discovered on another site. As
neither my informant nor any one else could tell me whence, why, or
by whom they were removed, I did not place much credence in the
report.
(4) Pausanias says (ix. 2, 1), Γῆς δὲ τῆς Πλαταιίδος ἐν τῶ
Κιθαιρῶνι ὀλίγον τῆς εὐθείας ἐκτραπεῖσιν ἐς δεξιὰν Ὑσιῶν καὶ
Ἐρυθρῶν ἐρείπιά ἐστι; and further on (ix. 2, 2), he says, referring to
the road of which he is speaking: αὕτη μὲν (i.e. ὅδος) ἀπ’
Ἐλευθερῶν ἐς Πλάταιαν ἄγει. The road referred to is of course the
Athens-Platæa road, on which he is travelling towards Platæa. Can
any one suppose that Pausanias would have used the expression
quoted, especially the word ὀλίγον, had the ruins of Erythræ, as
Leake conjectured, lain some three and a half miles away from the
nearest point of this road, and hidden from it, moreover, by the
great projecting bastion of Kithæron, which is shown at the south-
east corner of the accompanying map?
Leake quotes Thucydides (iii. 24), who says that the two hundred
and twelve fugitives from Platæa first took the Thebes road in order
to put their pursuers off the scent, and then turning, ᾔεσαν τὴν πρὸς
τὸ ὄρος φέρουσαν ὁδόν ἐς Ἐρύθρας καὶ Ὑσιάς, καὶ λαβόμενοι τῶν
ὀρῶν διαφεύγουσιν ἐς τὰς Ἀθήνας. Meanwhile the pursuers were
searching the road along the ὐπωρέη. This last road would lead the
pursuers near the site where I conjecture Hysiæ to have stood, and
the objection may be raised that it is unlikely that the fugitives would
have gone to a place close to the road along which they could see
the pursuers were searching for them. It is, however, to be remarked
that Thucydides does not say that they went to either Erythræ or
Hysiæ. Had he intended to imply this he would have mentioned
those places in their proper order, Hysiæ first and Erythræ second.
Whenever he refers to the actual course taken by a body of men, or
by a fleet, he invariably mentions the places touched at or arrived at
in their geographical order. Vide Th. ii. 48, 1; ii. 56, 5; ii. 69, 1; iv. 5,
2; vii. 2, 2; vii. 31, 2.
The passage seems perfectly comprehensible and in accord with
the hypothesis which I put forward with respect to the positions of
Hysiæ and Erythræ. These fugitives, turning from the Platæa-Thebes
road, took the track which in modern times leads from Pyrgos to
Kriekouki, and which in ancient times would be the road from
Thespiæ to Hysiæ, Erythræ, and the passes. They did not go to but
towards those places, making in reality for those high rugged
bastions to the north-east of the pass of Dryoskephalæ.
But, after all, Pausanias’ words in the passage quoted dispose
effectively of Colonel Leake’s site. He would not have described a
place twenty-five stades away from the road as a short distance to
the right of it.
(5) Herodotus (ix. 15) speaks of the Persian camp as ἀρξάμενον
ἀπὸ Ἐρυθρέων παρὰ Ὑσιάς, κατέτεινε δὲ ἐς τὴν Πλαταίιδα γῆν.
These words merely show that Erythræ was east of Hysiæ.
(6) Perhaps one of the strongest pieces of evidence is Herodotus’
statement that the first Greek position was “at Erythræ.” Is it
conceivable that the Greek force, especially in its then state of
feeling with regard to the Persians, would be likely, after issuing
from the pass of Dryoskephalæ, to turn east along Kithæron, leave
the pass open, and take up a position with their backs to a part of
the range through which there was no passage of retreat?
(7) We are told later that their reason for moving to their second
position was the question of water-supply. This accords with the
present state of the locality about the traditional Erythræ. The
streams in that neighbourhood have but little water in them in the
dry season.
(8) The ground in this neighbourhood accords peculiarly with the
description given by Herodotus of the first engagement.
6
Marked ridges 1, 2, 3, 4, in the map.
7
These positions will be found marked upon the accompanying map.
It is necessary, however, to explain the evidence on which they are
determined.
8
The details of the contingents given by Herodotus are:⁠—
Lacedæmonians—
Spartans 5000
Periœki 5000
Helots 35,000
Tegeans 1500
Corinthians 5000
Potidæans 300
Orchomenians (Arcadia) 600
Sikyonians 3000
Epidaurians 800
Trœzenians 1000
Lepreans 200
Mykenæans and Tirynthians 400
Phliasians 1000
Hermionians 300
Eretrians and Styreans 600
Chalkidians 400
Ambrakiots 500
Leukadians and Anaktorians 800
Paleans from Kephallenia 200
Æginetans 500
Megareans 3000
Platæans 600
Athenians 8000
Miscellaneous light-armed troops 34,500
Total 108,200
9
I.e. A 1. In the days before scientific survey there was frequently the
utmost confusion with regard to the application of names to the
head streams of main rivers. This generally took the form of
applying the name of the main stream to several of its feeders. The
tendency of the local population was to apply the well-known name
to that upper tributary which was in their immediate neighbourhood,
and was therefore best known to them. Examples of this are
frequent in England; the upper waters of the Thames are a case in
point. In early sketch maps it will be found that the name Thames is
applied with the utmost diversity to the head streams of the river,
and even a tributary so far down as the Evenlode is sometimes given
the name of the main river. This is, I fancy, what has taken place
with regard to the Asopos. The Platæans, with whom Herodotus
must have come in contact in the course of his visit to the region,
called this stream, A 1, by the name of the main river, and
consequently “Asopos” in Herodotus is to be understood to mean
this stream up to its junction with the stream which comes from the
west, rising not far from Leuktra, and, after that, to refer to what is
really the main river. From Platæa itself the course of this stream is
plainly traceable in the plain, running along the western base of the
Asopos ridge. The stream coming from Leuktra is not visible, and it
is quite conceivable that Herodotus never had any definite
knowledge of its existence. In Leake’s time (vide his sketch map) the
inhabitants of Kriekouki seem to have called the stream, A 6,
Asopos. It is not so called at the present day. My own impression is,
however, that Herodotus, although he heard the Platæans speak of
A 1 as the Asopos, may in one passage refer to the stream from
Leuktra with a special attribute: τὸν Ἀσωπὸν τὸν ταύτῃ ῥέοντα (H.
ix. 31). A sentence previously, at the end of Chapter 30, he has a
reference to the Asopos without any qualification, οὗτοι μὲν νὺν
ταχθέντες ἐπὶ τῷ Ἀσωπῷ ἐστρατοπεδἐυοντο, and this reference is
undoubtedly to A 1, which is to him, as other references in his
narrative show, the upper Asopos “ordinarily so called.”
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like