06834nam 22007215 450 99666035850331620250529130236.03-031-88705-010.1007/978-3-031-88705-5(CKB)39124574600041(DE-He213)978-3-031-88705-5(MiAaPQ)EBC32140542(Au-PeEL)EBL32140542(EXLCZ)993912457460004120250529d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierIntelligent Human Computer Interaction 16th International Conference, IHCI 2024, Twente, The Netherlands, November 13–16, 2024, Revised Selected Papers, Part I /edited by Dhananjay Singh, Jan-Willem van ’t Klooster, Uma Shanker Tiwary1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (XXI, 459 p. 194 illus., 161 illus. in color.) Lecture Notes in Computer Science,1611-3349 ;155573-031-88704-2 A VR experience exposing the hidden curriculum of the operating room a case study -- LifeCharger SynCare Mobile App: a preliminary usability study -- From Theory to Practice Simulation in Anesthesiology through Active Learning Experiences -- Methods for Optimizing Diagnostic Data for Patients with a Given Condition -- An Exploration of Phantom Touch as a Design Aspect to Enhance Wellbeing and Safety in Social VR -- Predictive Analytics for Stress Management in Nursing A Machine Learning Approach Using Wearable IoT Devices -- Robot-to-Robot Collaborative Knowledge Sharing with Human Operators under Constraint Resources through Connotative 2.5D Mapping -- Context aware Robotic Assistance for Workers using Intention Recognition and Semantic Digital Twin -- Conversational Agent Design A Comprehensive Analysis of Research from Leading Conferences -- Enhancing Firefighting Robot’s Capability A Comprehensive Implementation for Enhancing Firefighting Robot’s Operations -- A Novel Framework for Collaborative Knowledge Sharing and Learning for Disaster Response Robots -- More Human, Less Bot How Anthropomorphism Impacts User Experience in Customer Support Chatbots -- ‘I prefer robot cats!’ Reflections on robot animal like morphology from an in the wild Child Robot Interaction workshop -- Pipeline leak detection Leveraging Acoustic Emission Signal Processing and Machine Learning -- Application of Machine Learning Techniques for Leak Detection in a Horizontal Pipeline Transporting a Water Glycerol Mixture -- Connected lives Revolutionizing health and social interaction with wearable technology in India -- Online Monitoring System of Groundwater in the Aral Region Based on the Internet of Things -- Enhancing Meal Search Engine for Fitness Applications using Semantic Search with Sentence Transformers -- Addressing Graphviz File Generation Issue in CPN Tools: A Java based Solution -- What Does “Remote Driving” Mean for People A Futurespective Design Approach -- Controller adaptive Digital Assistant (CODA) Interim conclusions on the development of a new ATC system -- Reimagining the Utility of Dash Cam Data in Autonomous Travel Contexts A Service Design Proposal -- Keyframe Extraction based on Large Vision Transformer Model and kNN DBSCAN Clustering -- Improving Polyps Segmentation in Colonoscopy Images using Modified UNet3+ Network -- Scheduling for Lecturers using Genetic Algorithm with Fuzzy Constraints -- No Code Computer Vision -- Transfer Learning to Identify Multilingual Machine Genenrated Text -- A Novel Preprocessing Method for Transforming Federal Sentencing Data to Ensure Unbiased AI Adjudication Research Using Large Language Models -- Computational Analysis of User Experience of Password-Based Authentication Systems -- Computational Analysis of Human Factors in Spear Phishing Attacks An Adaptive Network Model -- Analysing the Rise of Biohacking in a Tech Driven City Assessing Risks through Adaptive Network Modeling -- An Adaptive Network Model to Analyse Cyber Security Understanding Cyber Threats in Financial Institutions -- Understanding Insider Threats Behaviour An Adaptive Network Model of The Evolution of an Insider Threat -- Organizational Response to APT Attacks Computational Analysis by Behavioral Network Modelling -- Adversarial Attack Detection In Intrusion Detection System Using Machine Learning -- Enhancing Data Privacy with Lattice-Based Encryption Technique -- Improving Threat Recognition in X-ray Security Inspection using Transformers.This volume LNCS 15557 constitutes the refereed proceedings of 16th International Conference on Intelligent Human Computer Interaction, IHCI 2024, held in Twente, The Netherlands, during November 13-16, 2024. The 37 full papers and 2 short papers were carefully reviewed and selected from 107 submissions. They were categorized under the topical sections as follows: Learning in healthcare and wellbeing Robots and conversation agents Physical world and Posters Human factors Algorithims and computer vision Human factors in cybersecurity.Lecture Notes in Computer Science,1611-3349 ;15557User interfaces (Computer systems)Human-computer interactionArtificial intelligenceComputer systemsSignal processingInformation technologyManagementUser Interfaces and Human Computer InteractionArtificial IntelligenceComputer System ImplementationSignal, Speech and Image ProcessingComputer Application in Administrative Data ProcessingUser interfaces (Computer systems)Human-computer interaction.Artificial intelligence.Computer systems.Signal processing.Information technologyManagement.User Interfaces and Human Computer Interaction.Artificial Intelligence.Computer System Implementation.Signal, Speech and Image Processing.Computer Application in Administrative Data Processing.005.437004.019Singh Dhananjayedthttp://id.loc.gov/vocabulary/relators/edtvan ’t Klooster Jan-Willemedthttp://id.loc.gov/vocabulary/relators/edtTiwary Uma Shankeredthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996660358503316Intelligent Human Computer Interaction2025651UNISA