top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Technology and Systems : ICITS 2024, Volume 1
Information Technology and Systems : ICITS 2024, Volume 1
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (481 pages)
Altri autori (Persone) FerrásCarlos
Hochstetter DiezJorge
Diéguez RebolledoMauricio
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-54235-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Big Data Analytics and Applications -- Detection of Fake News Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Theoretical Framework -- 5 Results -- 6 Conclusions -- References -- HJ-Biplot and Clustering Techniques for Analyzing Water Quality: A Case Study*-16pt -- 1 Introduction -- 2 Data Acquisition -- 3 Methodology -- 4 Results and Discussion -- 4.1 General Analysis -- 4.2 Analysis by Regions of the River -- 4.3 Analysis According to Months -- 5 Conclusions -- References -- Customer Segmentation in Online Retail Using K-Means Clustering Classification and Principal Component Biplot -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dataset -- 3.2 Data Treatment -- 3.3 Cohort Analysis -- 3.4 Recency, Frequency, Monetary Value (RFM) Analysis -- 3.5 Clustering, K-Means -- 3.6 Principal Component Analysis (PCA) Biplot -- 4 Results and Discussion -- 4.1 Data Treatment -- 4.2 Dataset Analysis -- 4.3 Cohort Analysis -- 4.4 Recency, Frequency, Monetary Value(RFM) -- 4.5 Clustering - Kmeans -- 4.6 PCA Analysis -- 5 Conclusion and Recommendation -- References -- COVID Interactive Query Answering Using a Data Cube -- 1 Introduction -- 2 Related Work -- 3 Comparing Data Processing and Queries -- 3.1 Data Acquisition and Integration -- 3.2 Data Extraction and Transformation -- 3.3 Data Loading -- 3.4 Incremental Data Loading -- 3.5 Query Answering -- 4 Example of Graph Results -- 5 Conclusions -- References -- Influence of Indoor Conditions on Sick Building Syndrome: A Data-Driven Investigation -- 1 Introduction -- 2 Collected Data -- 3 Data Analysis -- 4 Lessons Learned -- 5 Conclusions -- 6 Future Works -- References -- Analysis of a Scheduling System as a Proposal for Automatic Generation Using Machine Learning -- 1 Introducción -- 2 Related Topics -- 2.1 Machine Learning.
2.2 Related Machine Learning Algorithms -- 3 Proposal -- 4 Methodology -- 4.1 Sample Definition -- 4.2 Data Collection -- 4.3 Data Analysis -- 4.4 Data Presentation -- 5 Results -- 6 Conclusions and Future Work -- References -- Computer Networks, Mobility and Pervasive Systems -- Taxonomy of Malicious URL Detection Techniques -- 1 Introduction -- 2 Characteristics of URLs -- 3 Taxonomy of Detection Techniques -- 3.1 Rules-Based Detection Techniques -- 3.2 Machine Learning-Based Detection Techniques -- 3.3 Comparison of Detection Techniques -- 4 Conclusions -- References -- Unmanned Aerial Systems: A Systematic Literature Review -- 1 Introduction -- 2 Terminology -- 3 Methodology -- 4 Findings -- 5 Conclusion -- References -- Ethics, Computers and Security -- Vulnerability Analysis - Business Case -- 1 Introduction -- 2 Methodology -- 2.1 Vulnerability Analysis Tools -- 2.2 Vulnerability Analysis -- 3 Results -- 3.1 Results of the First-Round Analysis -- 3.2 Results from the Second Round of Analysis -- 3.3 "Vulnerability Age" in the Information System -- 4 Conclusions -- References -- Information Security Vulnerabilities Using Steganography as the Art of Hiding Information -- 1 Introduction -- 2 Methodology -- 2.1 Planning the Review -- 2.2 Conducting the Review -- 2.3 Analysis of Results -- 3 Conclusions -- References -- Artificial Intelligence for Cybersecurity: Use Cases and Country Perspective -- 1 Introduction -- 2 Applying AI Methods for Cybersecurity -- 3 The Situation in Slovenia and the EU -- 3.1 Slovenia -- 3.2 European Union -- 4 Proposed Roadmap for Development -- 4.1 Short-Term Goals and Measures -- 4.2 Medium-Term Goals and Measures -- 4.3 Long-Term Goals and Measures -- 5 Conclusion -- References -- Analysis of Plaintext Features in DoH Traffic for DGA Domains Detection -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology.
3.1 Data Capture and Features Extraction -- 3.2 Labelling and Data Pre-processing -- 3.3 Classification Module -- 4 Dataset -- 5 Analyses and Discussion -- 5.1 Relevance of Features Analysis -- 5.2 Results Analysis -- 6 Conclusion and Future Scope -- References -- Cybersecurity for Higher Education Institutions: General Strategy Vision -- 1 Introduction -- 1.1 The Problem and the Opportunity -- 2 Cybersecurity Strategy for a Higher Education Institution -- 2.1 Design of a Cybersecurity Strategy -- 3 Conclusions -- References -- Ethics and AI in Higher Education: A Study on Students' Perceptions -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Demographic Profile and Frequency of Use of AI Tools (SRQ1) -- 3.2 AI Tools Identified (SRQ2) -- 3.3 Reasons Given by Students for Using AI in Academic Activities (SRQ3) -- 3.4 Main Concerns Presented by Students Regarding Using AI in Academic Activities (SRQ4) -- 4 Discussion -- 5 Final Considerations and Future Work -- References -- Human-Computer Interaction -- Development of a Method for the Early Detection of Alzheimer Using CT Images, Deep Learning Techniques and Hyper-parameter Tuning -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experiment Design -- 4.1 Characteristics of the Data Set -- 4.2 Quality Measurements -- 4.3 Method Optimization Parameters -- 5 Results -- 5.1 Optimal Parameters -- 5.2 Model Reliability -- 6 Conclusion -- References -- An Accessibility Review: Google Classroom -- 1 Introduction -- 2 Accessibility in Brazil -- 3 Human-Computer Interface Assessments -- 3.1 ISO/IEC 25010 Standard -- 3.2 Electronic Government Accessibility Model -- 4 Research Methodology -- 5 Results -- 5.1 Previous Accessibility Evaluation -- 5.2 Updated Accessibility Evaluation -- 6 Discussion -- 6.1 Google Classroom Through the Years -- 7 Conclusion -- References -- Health Informatics.
Revolutionizing Parkinson's Disease Diagnosis: An Advanced Data Science and Machine Learning Architecture -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Design of Experiments -- 5 Results and Discussion -- 6 Conclusions -- References -- A New Method for Stimulating Memory and Visual-Motor Coordination in Older Adults Through Basic Electronics Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Pilot Experiment and Preliminary Results -- 5 Conclusions -- References -- Visual Characterization of Gathered Data for Digital Phenotyping -- 1 Introduction -- 2 Related Work -- 3 Data Collection Platform -- 4 Data Monitoring and Presentation -- 5 Conclusions -- References -- Comparative Analysis of Spatial Agglomeration Methods Getis-Ord and Besag and Newell for Dengue Epidemiology Paraíba, Brazil -- 1 Introduction -- 2 Spatial Clustering Methods and Related Work -- 2.1 Getis-Ord -- 2.2 Besag-Newell -- 2.3 Spatial Incidence Ratio -- 3 Research Methodology -- 3.1 Study Location and Data Collection -- 4 Results and Analysis -- 5 Discussion -- 6 Conclusion -- References -- Intelligent and Decision Support Systems -- Making the Case for Establishing a South African AI Innovation Hub -- 1 Introduction -- 2 The South African AI Landscape -- 3 Benefits and Potential Contributions of AI -- 4 Dangers and Disadvantages of AI -- 5 Contextual AI -- 6 Innovation Hubs -- 7 A Contextual Solution -- 8 Summary and Conclusion -- References -- AI-Driven Decision Support in Public Administration: An Analytical Framework -- 1 Introduction -- 2 Features for AI Frameworks and Tools in Public Administration -- 3 An Analytical Framework for Public Administration -- 3.1 Data Collection/Acquisition -- 3.2 Preprocessing -- 3.3 AI Application -- 3.4 Data Analysis -- 3.5 Data Presentation -- 4 Results -- 4.1 Textual Corpora Dedicated to Public Security.
4.2 Misinformation on the Vaccination Campaign Against COVID-19 in Brazil -- 5 The Future of the Initiative: Using Computer Vision -- 6 Final Considerations -- References -- A New Hybrid Search Approach to Optimize the Retrieval of Information from the Website at the Universidad Politécnica Salesiana -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Information Collection -- 3.2 Architecture Design -- 3.3 Implementation of the Search Process -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Intelligent Educational Agent for Education Support Using Long Language Models Through Langchain -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Solution Proposals -- 3.2 Tools and Technologies -- 3.3 Rule Design and Response Logic -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Artificial Intelligence Applied to Human Resources Management: A Bibliometric Analysis -- 1 Introduction -- 2 Related Work -- 3 Bibliometric Study -- 3.1 Methodology Used -- 3.2 Set the Objectives of the Analysis -- 3.3 Data Extraction -- 3.4 Data Preprocessing -- 3.5 Multi-dimensional Analysis -- 3.6 Overall Results of the Analysis -- 4 Results and Conclusions -- 5 Future Works -- References -- Enhancing Sentiment Analysis of Corruption-Related Comments on Social Networks in Ecuador Using Techniques of Machine Learning: LSTM, Linear Regression, and Support Vector Machine -- 1 Introduction -- 1.1 SVM Models -- 1.2 Linear Regression Models -- 1.3 LSTM Models -- 2 Proposed Method -- 2.1 Data Collection and Processing -- 2.2 Data Preparation -- 2.3 Text Representation -- 2.4 Training -- 2.5 Prediction Evaluation and Results -- 2.6 Results Interpretation -- 3 Experiment Design -- 3.1 General Dataset Description -- 3.2 Data Preparation -- 3.3 Word Representation -- 3.4 Machine Learning Technique Parameters -- 4 Results and Discussion.
5 Conclusion.
Record Nr. UNINA-9910841869203321
Rocha Álvaro  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Technology and Systems : ICITS 2024, Volume 2
Information Technology and Systems : ICITS 2024, Volume 2
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (485 pages)
Altri autori (Persone) FerrásCarlos
Hochstetter DiezJorge
Diéguez RebolledoMauricio
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-54256-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Multimedia Systems and Applications -- Efficiency Evaluation of Mobile Vision Transformers -- 1 Introduction -- 2 Related Work -- 3 Experiments -- 3.1 Database -- 3.2 Evaluation Metrics -- 3.3 Implementation Details -- 3.4 Image Classification Results -- 3.5 Face Alignment Results -- 3.6 Ablation Study -- 4 Conclusions -- References -- Online Shopping Experience: The Case of Zara -- 1 Introduction -- 2 Theoretical Framework -- 2.1 Perceived Quality of the Website -- 2.2 Social Influence and Recommendation -- 2.3 Performance Expectation -- 2.4 Trust -- 2.5 Consumer Satisfaction -- 2.6 Consumer Loyalty -- 2.7 Income -- 3 Method -- 4 Results and Discussion -- 5 Conclusions and Implications -- References -- Virtual Reality as a Tool for the Reconstruction and Dissemination of Cuenca's Cultural Heritage: Cases of the ``Puente Roto'' Bridge and the ``Cornelio Merchán'' Building -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Discussion -- 5 Conclusions -- References -- Lextutor Program as a Tool to Teach ESL Vocabulary -- 1 Introduction -- 2 Theoretical Framework -- 2.1 Vocabulary Learning -- 2.2 Lextutor.ca Program -- 3 Methodology -- 4 Survey Results -- 5 Conclusions -- References -- Study on Stereo AI Based Zed-2i Camera -- 1 Introduction -- 2 Installation Method of ZED-2i Camera -- 2.1 Hardware Interface of ZED-2i Camera with Computer -- 2.2 Software and Tools Used -- 2.3 CUDA Toolkit -- 2.4 Other Extensions and Features -- 3 Experiment Execution and Results in Different Environments -- 3.1 Indoor Experiment -- 3.2 Outdoor Experiment -- 3.3 Pros and Cons of Results -- 3.4 Implication and Impacts of Results and Future Direction -- 4 Discussion and Conclusion -- References -- Systematic Review of Motion Sensors and Their Energy Efficiency -- 1 Introduction -- 2 Methodology -- 2.1 Research Planning.
2.2 Procedure for Information Search -- 2.3 Obtained Results. -- 3 Analysis -- 4 Conclusions -- References -- Organizational Models and Information Systems -- Technical and Business Risk Management in Software Startups -- 1 Introduction -- 2 Background -- 2.1 Types of Risks -- 2.2 Risk Management -- 2.3 Related Works -- 3 Methodological Design -- 3.1 Research Questions -- 3.2 Key Informants -- 3.3 Data Collection -- 3.4 Reading and Coding Responses -- 4 Results -- 4.1 Participating Software Startups -- 4.2 Risk Management Activities -- 4.3 Risk Identification Methods -- 4.4 Technical and Business Risks -- 4.5 Risk Management Strategies -- 5 Discussion -- 6 Conclusions and Further Work -- References -- The Impact of Insufficient Organisational Change Management on Enterprise Resource Planning Benefits: A South African Case Study -- 1 Introduction -- 2 Literature Review (Summary) -- 3 Research Methodology -- 4 Case Descriptions -- 5 Findings and Discussion -- 5.1 ERP Benefits -- 5.2 Organisational Change Management Activities -- 5.3 Impact of OCM on ERP Benefits -- 6 Conclusion -- References -- Infrastructure Overlays and Digital Chimeras: Keys for Reading Information Infrastructures -- 1 Introduction -- 2 Two cases in Swiss Agriculture -- 2.1 TIP: The Individual Animal Overlay -- 2.2 ADA: The Production Unit Overlay and Its Fully Distributed Chimera -- 3 Overlay-Chimera Examples -- 3.1 The Container Overlay in Transport Infrastructures -- 3.2 The Order Overlay in e-Commerce Infrastructures (Amazon) -- 3.3 The Interbank Transfer Overlay in Financial Infrastructures (SWIFT) -- 3.4 The Reliable Byte-Stream Connection Overlay in Internet Infrastructures (TCP/IP) -- 4 Discussion -- 5 Conclusion -- References -- Handover Analysis of Mobile Cellular Network in a Populated City -- 1 Handover Problems: Monitoring Ang Performance Optimization -- 2 Methodology.
2.1 Data Collection and Preprocessing -- 2.2 Statistical Analysis of RF Parameters in the HO Process -- 2.3 Machine Learning Methods -- 3 Results -- 3.1 Statistical Analysis of Handover Parameters in Cellular Networks Based on Field Measurements -- 3.2 Analysis of Handover in LTE Cellular Networks Using Machine Learning -- References -- The Development of an Architecture Using Traditional and Modern Recursive Neural Networks and Natural Language Processing to Increase the Accuracy of Response on Client Doubts Related to Public Services -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Recollection of Data -- 3.2 Natural Language Preprocessing -- 3.3 Vocabulary/Dictionary Generation -- 3.4 Training and Modeling -- 3.5 Evaluation of Experiments and Results -- 3.6 Interpretation of Results -- 4 Conclusions -- References -- A Systematic Mapping Study on the Use and Development of Research Software -- 1 Introduction -- 2 Related Works -- 3 Systematic Mapping Protocol -- 3.1 Research Goals and Questions -- 3.2 Search Strategy -- 3.3 Study Selection -- 3.4 Data Extraction -- 4 Results -- 4.1 RQ1. What Are Types of Contributions Have Been Emerged to Support the Research Software Use and Development? -- 4.2 RQ2. Which Type of Research Has Been Conducted Regarding Research Software? -- 4.3 RQ3. Which Types of Empirical Evaluation Have Been Performed in Research Regarding Research Software? -- 4.4 RQ4. Which Topics Have Been Addressed in Research Regarding Research Software? -- 5 Discussion -- 6 Threats to Validity -- 7 Conclusions -- References -- Software Systems, Architectures, Applications and Tools -- Successful Case in the Development and Implementation of a Multi-company Inventory Management System Based on Communication Protocols Remote Procedure Calls (GRPC) and Server-Sent Events (SSE) -- 1 Introduction -- 2 Related Works.
3 Methodology -- 4 Results -- 4.1 Inventory Control -- 4.2 Distribution Route Generation -- 5 Discussion -- 6 Conclusion -- References -- A Dynamic Language System for Authoring Procedural Scenarios in Virtual Reality Environment Applications -- 1 Introduction -- 2 Literature Review -- 2.1 Virtual Reality -- 2.2 Programming Language Development -- 2.3 Language Compilers -- 3 Related Works -- 4 Conceptual Architecture -- 5 Implementation, Functioning and Limitations -- 5.1 Solution Steps -- 5.2 Functioning and Limitations -- 6 Validations and Results -- 6.1 Language Functionality -- 6.2 Authoring Process of VR -- 7 Final Considerations and Future Works -- References -- Using 5G Technologies and Predictive Models to Achieve a Flexible Network Capacity in Supercomputing Centers -- 1 Introduction -- 2 State of the Art: Networking in Supercomputing Centers -- 3 Flexible Network Capacity in Supercomputing Centers -- 3.1 Traffic Prediction Model and Congestion Detection -- 3.2 5G Communication Deployment -- 4 Experimental Validation: Simulation and Results -- 5 Conclusions and Future Works -- References -- Implementation of Euclidean Clustering for Object Detection Using 3D LiDAR in an Autonomous Vehicle Prototype with Embedded System and ROS -- 1 Introduction -- 1.1 Current Research -- 1.2 Contribution and Outline -- 2 Proposed Method -- 2.1 Infrastructure -- 2.2 Data Processing and Analysis -- 3 Point Cloud Preprocessing -- 3.1 PCD -- 3.2 VoxelGrid -- 3.3 Region of Interest (ROI) -- 4 Segmentation -- 4.1 Random Sample Consensus -- 5 Clustering and Tracking -- 5.1 Euclidean Clustering -- 5.2 Obstacle Tracking -- 6 Results -- 7 Conclusions -- References -- Using Blockchain Technology in Providing Mobile Financial Services to Alleviate Financial Exclusion in South Africa -- 1 Introduction and Background -- 2 Literature Review and Theoretical Framework.
2.1 Defining Financial Inclusion -- 2.2 Barriers to Financial Inclusion -- 2.3 Financial Inclusion in the South African Context -- 2.4 Challenges Addressed by Blockchain-Based Solutions -- 3 Research Methodology -- 4 Data Analysis and Findings -- 4.1 Usefulness and Effectiveness -- 4.2 Outcomes and Impact -- 4.3 Usability -- 5 Discussion -- 5.1 Usefulness and Effectiveness -- 5.2 Outcomes and Impact -- 5.3 Usability -- 6 Conclusion -- References -- Collaborative Platform for Intelligent Monitoring of Diabetic Foot Patients - Colab4IMDF -- 1 Introduction and Contextualisation -- 2 Background -- 3 Intelligent Systems Approach -- 3.1 Health Information Systems -- 3.2 Multi-Agent Systems -- 3.3 Microservices -- 4 Colab4IMDF Architecture -- 4.1 Main Contributions -- 5 Conclusions and Future Work -- References -- Immersive Shopping Experiences: The Role of Augmented Reality in E-Commerce -- 1 Introduction -- 2 Methodology and Article Selection -- 3 Discussion of Results -- 3.1 Analysis of Articles Resulting from the Selection -- 4 Conclusions -- 4.1 Article Analysis Discussion -- 4.2 Authors' Conclusions -- 4.3 Limitations and Future Research -- References -- A Predictive Model of Early Alerts to Improve the Availability of Internet and Data Service of a Telecommunications Company Through the XGBoost Algorithm -- 1 Introduction -- 2 Theoretical Framework -- 2.1 Data Mining Techniques -- 2.2 XGBoost (Extreme Gradient Boosting) -- 2.3 Methodology CRISP-DM -- 3 Experimental Setup -- 3.1 Phase 1. Business Understanding -- 3.2 Phase 2. Data Understanding -- 3.3 Phase 3. Data Preparation -- 4 Modeling and Results -- 4.1 Phase 4. Modeling -- 4.2 Phase 5. Evaluation -- 5 Discussion -- 6 Conclusions -- References -- Software and Systems Modeling -- Towards Multi-agent Specification of Health Care Systems Using π-Calculus -- 1 Introduction -- 2 Environment.
3 Pi Calculus.
Record Nr. UNINA-9910841872203321
Rocha Álvaro  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui