1.

Record Nr.

UNINA9910842298203321

Autore

Iglesias Andres

Titolo

Proceedings of World Conference on Information Systems for Business Management : ISBM 2023, Volume 1

Pubbl/distr/stampa

Singapore : , : Springer, , 2024

©2024

ISBN

981-9983-46-0

Edizione

[1st ed.]

Descrizione fisica

1 online resource (487 pages)

Collana

Lecture Notes in Networks and Systems Series ; ; v.833

Altri autori (Persone)

ShinJungpil

PatelBharat

JoshiAmit

Disciplina

658.4038011

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Intro -- Preface -- Contents -- Editors and Contributors -- About the Editors -- Contributors -- Tesla-Twitter Merger-A Revolution in Business Through Social Networks -- 1 Introduction -- 1.1 Tweeting the Past: Unveiling Twitter's Journey -- 1.2 Electrifying Innovation: Tracing Tesla's Journey -- 2 Advancements of Twitter and Tesla Through Its Emergence -- 2.1 Twitter's Evolving Landscape: Exploring the Journey of Progress and Innovation -- 2.2 Tesla's Technological Breakthroughs: Pioneering Advancements in Electric Mobility -- 3 Infrastructure of Twitter and Tesla -- 4 Revenue Generation -- 4.1 Twitter Revenue Generation -- 4.2 Tesla Revenue Generation -- 5 Annual Income -- 5.1 Twitter Annual Income -- 5.2 Tesla -- 6 Purpose of Tesla Acquiring Tesla -- 7 Conclusion -- References -- Risk Management for Artificial General Intelligence by Limited Liability Companies -- 1 Introduction -- 2 Artificial General Intelligence Under the EU AI Act -- 2.1 Introduction of General Purpose AI Systems by the AI Act -- 2.2 Introduction of General Purpose AI Systems -- 2.3 Negotiating Position (Final Draft) on the AI Act -- 2.4 Co-regulation of the AI Act and Other Legislation -- 2.5 Why a Business Entity for an AGI System or GPAIS Is Needed? -- 3 Limited Liability Companies for AGI Businesses -- 3.1 Establishing an LLC -- 3.2 Legal Personhood for Autonomous AGI Systems by LLCs -- 4 Limited Liability and Financial



Risk Management -- 4.1 Vertical Liability Shield Against Risks for LLC -- 4.2 Horizontal Liability Shields Against Risks for LLC -- 4.3 Protected and Registered Series LLCs -- 5 Discussion and Conclusion -- References -- Pod Migration with Optimized Containers Using Persistent Volumes in Kubernetes -- 1 Introduction -- 2 Related Research -- 3 Proposed Method -- 4 Design -- 5 Evaluation -- 5.1 Experimental Set Up -- 6 Conclusions and Future Research.

References -- Information Systems in Large Scale Government Projects in India: A Case Study of PMAY -- 1 Introduction -- 2 Literature Review -- 3 PMAY Implementation: A Brief Overview -- 4 Analysis of PMAY Data -- 5 Conclusion -- References -- mHealth Apps on the Rise: Exploring the Influence of App and Individual Characteristics on Adoption -- 1 Introduction -- 2 Literature Review -- 2.1 TAM Model -- 2.2 Key Characteristics of mHealth Apps Users -- 2.3 Key Characteristics of mHealth Apps -- 3 Research Design -- 3.1 Measures -- 3.2 Data Collection -- 4 Results -- 4.1 Measurement Model Results -- 4.2 Hypothesis Testing -- 5 Discussion -- 6 Implications -- 7 Limitations -- References -- Study of Power Optimization Algorithms for Secure Communication with Untrusted AF Relays -- 1 Introduction -- 2 Network Model and Scheme Description -- 2.1 Eavesdropping Scenario -- 2.2 Relay Selection -- 2.3 Secrecy Rate -- 3 Power Optimization Methods -- 3.1 Nelder-Mead Method (N-M) -- 3.2 Broyden-Fletcher-Goldfarb-Shanno Algorithm (BFGS) -- 3.3 Conjugate-Gradient Method (CG) -- 3.4 Second Derivative Test (DT) -- 3.5 Exhaustive Search Algorithm (ES) -- 4 Numerical Results and Discussion -- 5 Conclusions -- References -- GAN-Based Anomaly Intrusion Detection for Industrial Controller System -- 1 Introduction -- 2 Related Works -- 3 Secure Water Treatment -- 4 Generative Adversarial Network for Data Generation -- 5 Proposed Method -- 5.1 Dataset -- 5.2 Generation of More Samples Using Generative Adversarial Network -- 5.3 Multi-layer Perceptron -- 5.4 Performance Evaluation -- 6 Result -- 7 Conclusion -- References -- A Communication Architecture Approach for Mitigating Complexities in Smart Manufacturing Units by Means of Information Appropriateness -- 1 Introduction -- 2 Background -- 2.1 Challenges with Executing Information Appropriateness -- 3 Case Study.

4 Discussion -- 5 Conclusion -- References -- A Survey on Taxonomy of Data Governance for Cloud-Based Services -- 1 Introduction -- 2 Survey Questions -- 2.1 Criteria of Questionnaire -- 2.2 Profile of the Participants -- 3 Analysis of Data -- 4 Analysis of Survey Outcome -- 5 Proposed Recommendations -- 5.1 New Category as Accessibility -- 5.2 Justification for Accessibility -- 5.3 Subcategories of Accessibility -- 5.4 Justification for Subcategories of Accessibility -- 5.5 Function as a Service (FaaS) as an Independent Subcategory -- 5.6 Justification for Function as a Service (FaaS) -- 5.7 Data as a Service (DaaS) as an Independent Subcategory -- 5.8 Justification for Data as a Service (DaaS) -- 6 Conclusion -- References -- Optimal Allocation of Mobile Finance Company Agents Using Convex Hull Optimization -- 1 Introduction -- 2 Market Analysis -- 2.1 Mobile Finance Services (MFS) -- 2.2 Agent -- 2.3 MFS in Bangladesh -- 3 Literature Review -- 4 Dataset -- 4.1 Data Collection -- 4.2 Data Processing -- 5 Methodology -- 5.1 Standard Linear Model -- 5.2 User Distribution -- 5.3 Service Area of an Agent -- 5.4 Users Outside Service Coverage -- 5.5 Clustering Users -- 5.6 Convex Hull Algorithm -- 5.7 Allocating New Agents -- 6 Result Analysis -- 6.1 Linear Regression -- 6.2 Optimum Allocation of Agents -- 7 Conclusion -- References -- Sentiment Analysis Using Fuzzy Model -- 1 Introduction -- 2 Literature Review -- 3 Background -- 4 Proposed Model -- 5



Results and Discussion -- 6 Conclusion and Future Work -- References -- Exploiting Metadata for Intelligent and Secure JSON REST API Services -- 1 Introduction -- 1.1 Motivating Examples -- 1.2 Contribution and Applications -- 1.3 Organization -- 2 Preliminaries -- 2.1 JSON Data -- 2.2 JSON Data Request and Reply -- 3 REST API Services -- 4 Rewriting Queries: Private Authorized Approach.

4.1 Using Additional Table for Query Rewriting -- 4.2 Using a User-Role for Partial-Ordering to Rewrite a Query -- 5 Using a Markov Model for Prediction: Predictive Approach -- 6 Conclusion -- References -- Covid-19 and Online Shopping of Groceries Across Generation Cohorts in Sweden -- 1 Introduction -- 2 Method -- 2.1 Sampling and Data Collection -- 2.2 Measures and Analyzes -- 3 Findings -- 4 Discussion and Conclusion -- 4.1 Discussion of the Findings -- 4.2 Methodological Limitation and Recommendations to Future Research -- 4.3 Practical Implications -- 4.4 Conclusion -- References -- Advancements in Machine Learning and Computer Vision Approaches for Food and Nutrient Recognition from Images: A Survey -- 1 Introduction -- 2 Food Image Datasets -- 3 Food Image Recognition with Deep Learning -- 3.1 Custom Build Models -- 3.2 Transfer Learning Models -- 4 Food Nutrient Estimation -- 5 Food Volumetric Estimation -- 6 Assessing Effectiveness of Deep Learning Models -- 6.1 Saliency Map -- 6.2 Grad-CAM -- 7 Outstanding Issues and Challenges -- 8 Conclusion -- References -- PoI Recommendation System: A Blended Approach -- 1 Introduction -- 2 Related Work -- 2.1 Geographical Constraints -- 2.2 Temporal Constraints -- 2.3 User Preference -- 3 Proposed Model -- 3.1 Geographical Module -- 3.2 Temporal Module -- 3.3 User Preference Module -- 3.4 Blender Module -- 3.5 Outcome Preparatory Module -- 4 Results -- 5 Conclusion -- References -- Is Blockchain Technology a Feasible Solution for P2P Lending Platforms to Improve Operational Ability? -- 1 Introduction -- 2 Conceptual Framework -- 3 Literature Review -- 3.1 Applicability Issues of Blockchain Technology in Fintech -- 3.2 Blockchain and P2P Lending Platforms -- 4 Objectives and Methodology -- 5 Discussion -- 6 Conclusion -- References.

Multi-instance Contingent Fusion for the Verification of Infant Fingerprints -- 1 Introduction -- 2 Methodology -- 2.1 Covenant University Newborn and Infant Fingerprint (CU-NIF) Database -- 2.2 Fingerprint Acquisition -- 2.3 Experimental Protocol -- 3 Results and Discussion -- 4 Conclusion and Recommendations -- References -- Exploiting Neural Network Model for Hiding and Triggering Malware -- 1 Introduction -- 2 Related Work -- 2.1 Stegomalware and Steganography -- 2.2 StegoNet -- 2.3 DeepLocker -- 2.4 Exploitation Using AI -- 3 Methodology -- 4 Implementation -- 5 Countermeasures -- 6 Conclusion -- References -- Enhancing Student Engagement and Performance Evaluation: An Integrated Approach for Quality Learning Management System -- 1 Introduction -- 2 Background Study -- 3 Proposed Model -- 4 Implementation of the Proposed Model -- 5 Conclusion -- References -- Breaking Bias: Alpha Weighted Loss in Multi-objective Learning Taming Gender Stereotypes -- 1 Introduction -- 2 Related Work -- 3 Data Description -- 4 Exploratory Data Analysis -- 5 Methodology -- 5.1 Data Prepossessing and Segregation -- 5.2 BERT Embedding -- 5.3 Linear Classification -- 5.4 Loss Function -- 5.5 Backpropagation and Optimization -- 5.6 Selection of Optimal Alpha Value -- 6 Evaluation Metrics -- 7 Results -- 8 Conclusion -- References -- Development and Evaluation of a Voice Command App for Smartphone Interaction Using the Speech-to-Text API -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Accuracy Assessment -- 3.2 Performance Metrics -- 3.3 Functionality



Assessment -- 3.4 Usability Evaluation -- 3.5 Performance on Different Devices -- 4 Limitations -- 5 Conclusion -- References -- Hybrid CNN + LSTM Model for Accurate Hindi Handwritten Digit Recognition -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 3.1 Proposed Methodology -- 3.2 Experimental Setup.

3.3 Experimental Model.