Vai al contenuto principale della pagina

Information Systems and Technologies : WorldCIST 2023, Volume 1



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Rocha Alvaro Visualizza persona
Titolo: Information Systems and Technologies : WorldCIST 2023, Volume 1 Visualizza cluster
Pubblicazione: Cham : , : Springer, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (615 pages)
Altri autori: AdeliHojjat  
DzemydaGintautas  
MoreiraFernando  
CollaValentina  
Nota di contenuto: Intro -- Preface -- Organization -- Contents -- Computer Networks, Mobility and Pervasive Systems -- Physarum-Inspired Enterprise Network Redesign -- 1 Introduction -- 2 Related Work -- 3 Modeling Enterprise Network Redesign -- 3.1 Modeling Physarum Model for Network Redesign -- 4 Proposed Method -- 5 Results and Discussion -- 6 Conclusions -- References -- Improving LoRaWAN RSSI-Based Localization in Harsh Environments: The Harbor Use Case -- 1 Introduction -- 2 Related Work -- 3 LoRaWAN Experimental Testbed -- 4 Evaluation Results -- 4.1 Distance Estimation by Using Single PL Method -- 4.2 Distance Estimation by Using Multi-slope PL Method -- 4.3 Location Estimation by Using Fingerprint Method -- 5 Conclusion -- References -- Impact of Traffic Sampling on LRD Estimation -- 1 Introduction -- 2 Background -- 2.1 Sampling -- 2.2 Properties of Internet Traffic -- 2.3 Methods for Estimating the Parameters H and -- 3 Experimental Environment -- 3.1 Sampling Framework and Datasets -- 3.2 Data Preprocessing -- 3.3 Selfis - LRD Estimation -- 4 Results and Discussion -- 5 Conclusions -- References -- Features Extraction and Structure Similarities Measurement of Complex Networks -- 1 Introduction -- 2 Review on Similarity Measurements -- 2.1 Graph Similarity Measurement Algorithms -- 3 Materials and Methods -- 4 Results and Discussion -- 5 Conclusions -- References -- Big Data Analytics and Applications -- Technology Use by Nigerian Smallholder Farmers and the Significant Mediating Factors -- 1 Introduction -- 2 Literature Review -- 2.1 Agricultural Technologies -- 2.2 The Social, Economic and Environmental Impact of Digital Agricultural Technology -- 2.3 Technology Adoption -- 2.4 The Factors that Determine the Adoption of Technology by Smallholder Farmers -- 3 Conclusions -- References -- Balancing Plug-In for Stream-Based Classification.
1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experiments and Results -- 4.1 Crowdsourced Data Set Results -- 4.2 Transportation Data Set Results -- 4.3 Comparison with Synthetic Data Generators -- 5 Conclusions -- References -- Explainable Classification of Wiki Streams -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experiments and Results -- 5 Conclusions -- References -- Reconstruction of Meteorological Records with PCA-Based Analog Ensemble Methods -- 1 Introduction -- 2 Meteorological Dataset -- 3 Determination of the Principal Components -- 4 Analog Ensemble Combined with PCA -- 5 Experimental Evaluation -- 6 Conclusion -- References -- Analysis of the Characteristics of Different Peer-To-Peer Risky Loans -- 1 Introduction -- 2 Related Literature -- 3 Research Methodologies -- 4 Data Analysis and Results -- 5 Conclusion -- References -- Physics-Informed Autoencoders with Intrinsic Differential Equations for Anomaly Detection in Industrial Processes -- 1 Introduction -- 2 Physics-Informed Machine Learning -- 2.1 Transformations -- 2.2 Integrating Ordinary Differential Equations -- 3 Autoencoder Architecture for Anomaly Detection -- 4 Results -- 4.1 Test Data -- 4.2 Wavelet Preprocessing -- 4.3 Results Due to the Inclusion of the Differential Equation -- 5 Summary -- References -- Big Data as a Tool for Analyzing Academic Performance in Education -- 1 Introduction -- 2 Methods and Materials -- 2.1 Obtaining and Processing Information -- 2.2 Identification and Organization of Data -- 2.3 Data Analysis -- 2.4 Correlation Between Attributes -- 3 Results -- 3.1 Classifiers -- 4 Conclusions -- References -- Ethics, Computers and Security -- Phishing and Human Error. Beyond Training and Simulations -- 1 Introduction -- 2 What is Phishing? -- 3 Human Error Theory. Why Are We Prone to Error?.
4 Phishing. A Human Error in the Digital Context -- 5 Conclusions -- References -- Towards a Cybersecurity Awareness Plan for Casinos: An Initial Review for Internal Workers -- 1 Introduction -- 2 Background and Related Concepts -- 2.1 Cybersecurity Culture -- 2.2 ISO 27001 -- 2.3 NIST -- 3 Methodology -- 3.1 Company Context -- 3.2 Role Definition -- 3.3 Identification of Key Activities -- 3.4 Material Design -- 3.5 Program Implementation -- 3.6 Program Evaluation -- 4 A Preliminary Test -- 5 Results -- 6 Conclusions and Discussion -- References -- Ethical Framework for the Software Development Process: A Systematic Mapping Study -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Proposed Solution -- 5 Discussion of Results and Limitations -- 6 Conclusions and Future Work -- References -- Social Engineering as the Art of Deception in Cyber-Attacks: A Mapping Review -- 1 Introduction -- 2 Methodology -- 3 Discussion -- 4 Conclusions -- References -- Several Online Pharmacies Leak Sensitive Health Data to Third Parties -- 1 Introduction -- 2 Related Work -- 3 Study Setting and Methodology -- 4 Results: Analysis on Personal Data Sent to Third Parties -- 5 Discussion -- 6 Conclusions -- References -- Verifying the Situation of Cybersecurity in Portugal`s Municipalities -- 1 Introduction -- 1.1 Research Objectives -- 1.2 Methodology -- 2 Background -- 2.1 Literature Review -- 2.2 Strategic Goals for Alignment with European Cybersecurity Commission -- 2.3 Standard ISO/IEC 27002:2022 -- 2.4 National Cybersecurity Strategies (NCSS) -- 3 The Survey -- 4 Application and Results -- 5 Discussions and Conclusions -- 6 Limitations of This Study -- References -- Authentication, Authorization, Administration and Audit Impact on Digital Security -- 1 Introduction -- 2 State of Art -- 3 Method -- 3.1 Planning, Policies and Procedures.
3.2 Defence Information Systems Agency -- 3.3 Diagnosis -- 4 Proposal -- 5 Conclusions -- 6 Future Work -- References -- Generation Z's [Incoherent] Approach Toward Instagram's Privacy Policy -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Data Analysis and Discussion - Descriptive Statistics -- 5 Data Analysis and Discussion - The Chi-Square Test of Association -- 6 Conclusion -- References -- Human-Computer Interaction -- User eXperience (UX) Evaluation in Virtual Reality (VR) -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Identify the Research Questions -- 3.2 Identify Relevant Studies -- 3.3 Study Selection -- 4 Results -- 4.1 Attitudinal Methods -- 4.2 Behavioral Methods -- 4.3 Comparison of Methods -- 5 Conclusions -- References -- Natural Hand Gesture Interaction for 3D Transformations in Immersive VR -- 1 Introduction -- 2 User Interface Design and Implementation -- 2.1 Rotation -- 2.2 Scaling -- 3 Results and Discussion -- 4 Conclusions -- References -- VTubers, Their Global Expansion and Impact on Modern Society -- 1 Introduction -- 2 Literature Review -- 2.1 Background -- 2.2 Agencies Expansion and Strategy -- 2.3 Companies Using VTubers for Marketing -- 3 Methodology -- 4 Findings/Discussion -- 4.1 Portuguese Citizens -- 4.2 U.S. Citizens -- 5 Conclusion and Future Research -- References -- Generation Y Health Care Professionals and Their Acceptance of Chatbots -- 1 Introduction -- 2 Methodical Approach -- 2.1 Study 1: Interviews -- 2.2 Study 2: Survey -- 3 Results -- 4 Discussion -- 5 Limitations -- 6 Conclusion -- References -- TV Notifications to Promote Trustworthy News and Local School Newspapers -- 1 Introduction -- 2 TV Notifications Strategies to Promote Local Community and Social Engagement with School Newspapers -- 2.1 A News Creation Tool for School Newspapers.
2.2 A Personalized Notification System for the TV Ecosystem -- 2.3 Goals of the Proposed Solution -- 2.4 System Architecture -- 2.5 Results Achieved -- 3 Final Remarks -- References -- Students' Habits, Strategies, and Decisive Factors Around Course Selection -- 1 Introduction -- 2 Related Work -- 3 Motivating Context and Research Questions -- 4 The Survey -- 4.1 Participants & -- Procedure -- 4.2 Data Collection & -- Analysis -- 4.3 Findings -- 5 Discussion -- 5.1 The Value of Timely Advising -- 5.2 Students' Preferences Around Courses and Instructors -- 5.3 Better Support for Enrollment -- 6 Limitations and Future Work -- 7 Conclusion -- References -- Contrasting Analysis Between Motion Capture Technologies -- 1 Introduction -- 2 Literature Review -- 3 Experiment Development -- 4 Conclusions -- References -- Health Informatics -- ASCAPE - An Intelligent Approach to Support Cancer Patients -- 1 Introduction -- 2 ASCAPE Architecture -- 3 Federated Learning in ASCAPE -- 4 Conclusion -- References -- Factors Influencing the Effectiveness of Medical Products Stock Management in Polish Hospitals - Research Results -- 1 Introduction -- 2 Literature Review -- 3 A Survey Study -- 3.1 A Survey Methodology -- 3.2 A Survey Results -- 4 Discussion -- 5 Conclusions -- References -- Generation of Synthetic X-Rays Images of Rib Fractures Using a 2D Enhanced Alpha-GAN for Data Augmentation -- 1 Introduction -- 2 Related Work -- 3 Generative Model Architecture -- 4 Material and Methods -- 5 Results -- 6 Discussion and Conclusion -- References -- Children's Hearing Loss Assessment Application Development and Execution Processes Using Systems Engineering Approach -- 1 Introduction -- 2 Review of the Literature -- 2.1 Consultation Team -- 2.2 Requirements Engineering -- 2.3 Functional Allocations, Design Synthesis, Systems Testing and Integration.
3 Theoretical Underpinning.
Titolo autorizzato: Information Systems and Technologies  Visualizza cluster
ISBN: 3-031-45642-4
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910838271203321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems Series