LEADER 00803nam 2200229 450 001 9910839399803321 005 20240318112421.0 100 $a20240318d2006----u y0engy50 ba 101 0 $aita 102 $aIT 105 $a 000zy 200 1 $aQualche osservazione sul repubblicanesimo e sulla presenza di Machiavelli in Vincenzo Cuoco$fdi Fulvio Tessitore 210 $a[Napoli]$cLiguori Editore$d2006 215 $aP. 206-211$d15 cm 300 $aestratto da: Archivio di storia della cultura. - anno 19. (2006) 700 1$aTessitore,$bFulvio$04713 901 $aLG 912 $a9910839399803321 952 $aDFT OPUSC. 19 (09)$b2024/2129$fFLFBC 959 $aFLFBC 996 $aQualche osservazione sul repubblicanesimo e sulla presenza di Machiavelli in Vincenzo Cuoco$94133697 997 $aUNINA LEADER 06834nam 22007215 450 001 996660358503316 005 20250529130236.0 010 $a3-031-88705-0 024 7 $a10.1007/978-3-031-88705-5 035 $a(CKB)39124574600041 035 $a(DE-He213)978-3-031-88705-5 035 $a(MiAaPQ)EBC32140542 035 $a(Au-PeEL)EBL32140542 035 $a(EXLCZ)9939124574600041 100 $a20250529d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIntelligent Human Computer Interaction $e16th International Conference, IHCI 2024, Twente, The Netherlands, November 13?16, 2024, Revised Selected Papers, Part I /$fedited by Dhananjay Singh, Jan-Willem van ?t Klooster, Uma Shanker Tiwary 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XXI, 459 p. 194 illus., 161 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15557 311 08$a3-031-88704-2 327 $aA VR experience exposing the hidden curriculum of the operating room a case study -- LifeCharger SynCare Mobile App: a preliminary usability study -- From Theory to Practice Simulation in Anesthesiology through Active Learning Experiences -- Methods for Optimizing Diagnostic Data for Patients with a Given Condition -- An Exploration of Phantom Touch as a Design Aspect to Enhance Wellbeing and Safety in Social VR -- Predictive Analytics for Stress Management in Nursing A Machine Learning Approach Using Wearable IoT Devices -- Robot-to-Robot Collaborative Knowledge Sharing with Human Operators under Constraint Resources through Connotative 2.5D Mapping -- Context aware Robotic Assistance for Workers using Intention Recognition and Semantic Digital Twin -- Conversational Agent Design A Comprehensive Analysis of Research from Leading Conferences -- Enhancing Firefighting Robot?s Capability A Comprehensive Implementation for Enhancing Firefighting Robot?s Operations -- A Novel Framework for Collaborative Knowledge Sharing and Learning for Disaster Response Robots -- More Human, Less Bot How Anthropomorphism Impacts User Experience in Customer Support Chatbots -- ?I prefer robot cats!? Reflections on robot animal like morphology from an in the wild Child Robot Interaction workshop -- Pipeline leak detection Leveraging Acoustic Emission Signal Processing and Machine Learning -- Application of Machine Learning Techniques for Leak Detection in a Horizontal Pipeline Transporting a Water Glycerol Mixture -- Connected lives Revolutionizing health and social interaction with wearable technology in India -- Online Monitoring System of Groundwater in the Aral Region Based on the Internet of Things -- Enhancing Meal Search Engine for Fitness Applications using Semantic Search with Sentence Transformers -- Addressing Graphviz File Generation Issue in CPN Tools: A Java based Solution -- What Does ?Remote Driving? Mean for People A Futurespective Design Approach -- Controller adaptive Digital Assistant (CODA) Interim conclusions on the development of a new ATC system -- Reimagining the Utility of Dash Cam Data in Autonomous Travel Contexts A Service Design Proposal -- Keyframe Extraction based on Large Vision Transformer Model and kNN DBSCAN Clustering -- Improving Polyps Segmentation in Colonoscopy Images using Modified UNet3+ Network -- Scheduling for Lecturers using Genetic Algorithm with Fuzzy Constraints -- No Code Computer Vision -- Transfer Learning to Identify Multilingual Machine Genenrated Text -- A Novel Preprocessing Method for Transforming Federal Sentencing Data to Ensure Unbiased AI Adjudication Research Using Large Language Models -- Computational Analysis of User Experience of Password-Based Authentication Systems -- Computational Analysis of Human Factors in Spear Phishing Attacks An Adaptive Network Model -- Analysing the Rise of Biohacking in a Tech Driven City Assessing Risks through Adaptive Network Modeling -- An Adaptive Network Model to Analyse Cyber Security Understanding Cyber Threats in Financial Institutions -- Understanding Insider Threats Behaviour An Adaptive Network Model of The Evolution of an Insider Threat -- Organizational Response to APT Attacks Computational Analysis by Behavioral Network Modelling -- Adversarial Attack Detection In Intrusion Detection System Using Machine Learning -- Enhancing Data Privacy with Lattice-Based Encryption Technique -- Improving Threat Recognition in X-ray Security Inspection using Transformers. 330 $aThis volume LNCS 15557 constitutes the refereed proceedings of 16th International Conference on Intelligent Human Computer Interaction, IHCI 2024, held in Twente, The Netherlands, during November 13-16, 2024. The 37 full papers and 2 short papers were carefully reviewed and selected from 107 submissions. They were categorized under the topical sections as follows: Learning in healthcare and wellbeing Robots and conversation agents Physical world and Posters Human factors Algorithims and computer vision Human factors in cybersecurity. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15557 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aArtificial intelligence 606 $aComputer systems 606 $aSignal processing 606 $aInformation technology$xManagement 606 $aUser Interfaces and Human Computer Interaction 606 $aArtificial Intelligence 606 $aComputer System Implementation 606 $aSignal, Speech and Image Processing 606 $aComputer Application in Administrative Data Processing 615 0$aUser interfaces (Computer systems) 615 0$aHuman-computer interaction. 615 0$aArtificial intelligence. 615 0$aComputer systems. 615 0$aSignal processing. 615 0$aInformation technology$xManagement. 615 14$aUser Interfaces and Human Computer Interaction. 615 24$aArtificial Intelligence. 615 24$aComputer System Implementation. 615 24$aSignal, Speech and Image Processing. 615 24$aComputer Application in Administrative Data Processing. 676 $a005.437 676 $a004.019 702 $aSingh$b Dhananjay$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $avan ?t Klooster$b Jan-Willem$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTiwary$b Uma Shanker$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996660358503316 996 $aIntelligent Human Computer Interaction$92025651 997 $aUNISA