Information Technology and Systems : ICITS 2025, Volume 3 / / edited by Alvaro Rocha, Carlos Ferrás, Hiram Calvo
| Information Technology and Systems : ICITS 2025, Volume 3 / / edited by Alvaro Rocha, Carlos Ferrás, Hiram Calvo |
| Autore | Rocha Alvaro |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (573 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
FerrásCarlos
CalvoHiram |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Application software Computational Intelligence Data Engineering Computer and Information Systems Applications |
| ISBN | 9783031931031 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911018650403321 |
Rocha Alvaro
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information Technology and Systems : ICITS 2025, Volume 2 / / edited by Alvaro Rocha, Carlos Ferrás, Hiram Calvo
| Information Technology and Systems : ICITS 2025, Volume 2 / / edited by Alvaro Rocha, Carlos Ferrás, Hiram Calvo |
| Autore | Rocha Alvaro |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (518 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
FerrásCarlos
CalvoHiram |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Application software Computational Intelligence Data Engineering Computer and Information Systems Applications |
| ISBN |
9783031931062
9783031931055 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911018752203321 |
Rocha Alvaro
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information Technology and Systems : ICITS 2025, Volume 1
| Information Technology and Systems : ICITS 2025, Volume 1 |
| Autore | Rocha Alvaro |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Cham : , : Springer, , 2025 |
| Descrizione fisica | 1 online resource (701 pages) |
| Disciplina | 004 |
| Altri autori (Persone) |
FerrásCarlos
CalvoHiram |
| Collana | Lecture Notes in Networks and Systems Series |
| ISBN | 3-031-93109-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911028659803321 |
Rocha Alvaro
|
||
| Cham : , : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information Technology and Systems : ICITS 2023, Volume 1 / / edited by Álvaro Rocha, Carlos Ferrás, Waldo Ibarra
| Information Technology and Systems : ICITS 2023, Volume 1 / / edited by Álvaro Rocha, Carlos Ferrás, Waldo Ibarra |
| Autore | Rocha Álvaro |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (633 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
FerrásCarlos
IbarraWaldo |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Application software Computational Intelligence Data Engineering Computer and Information Systems Applications |
| ISBN |
9783031332586
303133258X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Contents -- Big Data Analytics and Applications -- On the Use of Parallel Architectures in DNA Methylation Analysis -- 1 Introduction -- 2 Sample Alignment and Methylation Status Inference -- 3 Detection of Differentially Methylated Regions (DMRs) -- 4 Artificial Intelligence for Methylation Analysis -- 5 Conclusions -- References -- Automation for IBNR Provision Using Power BI and Excel -- 1 Introduction -- 1.1 Generalities -- 2 Methodology -- 3 Results -- 4 Conclusions -- References -- Visualizing the Risks of De-anonymization in High-Dimensional Data -- 1 Introduction -- 2 Related Work and Contribution -- 3 Methods -- 3.1 k-Anonymity -- 3.2 l-Diversity -- 3.3 Spatiotemporal Data Anonymity -- 3.4 Textual Data Anonymity -- 3.5 Financial Transactions Data Anonymity -- 3.6 Aggregation-Based Data Anonymity -- 4 Application -- 5 Conclusion and Future Work -- References -- Computer Networks, Mobility and Pervasive Systems -- Wireless Mesh for Schools in the Emberá Comarca -- 1 Introduction -- 2 Methodology -- 3 Internet Connections -- 4 Why Mesh Networks? -- 5 Model -- 6 Conclusions -- 7 Future Work -- References -- Implementation of a 2.4 GHz Biquad Antenna for a Microwave and Antenna Laboratory -- 1 Introduction -- 2 Development -- 3 Results -- 4 Conclusions -- References -- TaguaSpot: A Versatile Radio Access Networks Design for the Integration of Indigenous Communities to the Information Society -- 1 Introduction -- 2 Connectivity Challenges in Indigenous Communities -- 2.1 The Ella Puru Community, a Case Study -- 2.2 Potential Project Risks -- 2.3 Potential Benefits -- 3 Design Requirements of a Versatile Access Network for Indigenous Communities -- 3.1 Requirements -- 3.2 Design Considerations -- 4 TaguaSpot High-Level Design -- 5 Conclusions -- References -- Ethics, Computers and Security.
Vulnerability Analysis in the Business Organization -- 1 Introduction -- 2 Methodology -- 2.1 Vulnerability Analysis Tools -- 2.2 Vulnerability Analysis Process -- 2.3 Environment Description -- 3 Results -- 3.1 Lifetime of Vulnerability in the Information System -- 4 Conclusions -- References -- Information Security: Identification of Risk Factors Through Social Engineering -- 1 Introduction -- 2 Risk Factors for Social Engineering Attacks -- 2.1 Computational Techniques for Social Engineering -- 2.2 Non-computational Techniques for Social Engineering -- 3 Methodology -- 3.1 Social Engineering Attack Vectors -- 4 Results -- 5 Techniques to Prevent Social Engineering Attacks -- 6 Conclusion -- References -- The Information Security Function and the CISO in Colombia: 2010-2020 -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Research Instrument -- 3.2 Sample -- 4 Results -- 4.1 Function of the Information Security Area and Role of the Professional -- 4.2 Evolution of the Information Security Professional Profile -- 5 Discussion -- 5.1 Security Function, Steadily Growing -- 5.2 Cybersecurity Professional Profile, a Path of Experience and Expansion -- 6 Conclusions -- References -- Privacy and Cyber-Security Using Information Systems: A Proposal for Knowledge, Skills, and Attitudes -- 1 Introduction -- 2 Background -- 3 Methodology -- 4 Results and Discussions -- 5 Future Work -- 6 Conclusions -- References -- A Case Study of a Privacy-Invading Browser Extension -- 1 Introduction -- 2 The Attack Scenario -- 3 Implementation -- 4 Discussion -- 5 Conclusion -- References -- Human-Computer Interaction -- An Animatronic Robot to Provide Therapeutic Support to Preschool Children Attending Medical Consultations -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Movement Control System -- 5 Experimentation and Results. 5.1 Structural Analysis -- 6 Conclusions -- References -- Evaluating the Engagement by Design Methodology in Crowdsourcing Initiatives -- 1 Introduction -- 2 Related Works -- 3 Engagement by Design Cards -- 4 Application of the Engagement by Design Methodology -- 5 Analysis of Cards Choice -- 6 Evaluation of Ideas Generated by the Engagement by Design Methodology -- 6.1 Results -- 7 Lessons Learned -- 8 Conclusion -- References -- Applying Semiotic Engineering in Game Pre-production to Promote Reflection on Player Privacy -- 1 Introduction -- 2 Theoretical Foundation -- 2.1 Semiotic Engineering -- 2.2 Game Development -- 2.3 Privacy in Games -- 3 Rationale for Using Semiotic Engineering -- 4 Proposed Approach -- 4.1 Guiding Questions to Reflect on Privacy -- 4.2 Example of How to Answer the Questions -- 5 Final Remarks and Future Work -- References -- The Consumer Influence of Digital Coupon Distribution Through a Referral Program -- 1 Introduction -- 2 Literature Review -- 2.1 Sales Promotion and Digital Coupon -- 2.2 Referral Program -- 2.3 Consumer Perception: Principles of Influence and Decision-Making -- 3 Methodology -- 3.1 Research Question and Hypotheses -- 3.2 Methodology, Variables, Data and Sample -- 3.3 Study Context and Procedures -- 3.4 Data, Factor, Reliability Analysis and Anova -- 3.5 Results -- 4 Conclusions -- 4.1 Final Considerations, Scientific and Managerial Contributions -- 4.2 Limitations and Future Research -- References -- Digital Travel - A Study of Travellers' Views of a Digital Visit to Mexico -- 1 Introduction -- 2 Methods and Focus: A Digital Visit to Mexico -- 2.1 Characteristics of the Participants and the Survey -- 2.2 Visiting Mexico in Forza Horizon 5 -- 3 Data Analysis and Results -- 4 Discussion -- References -- Health Informatics -- Medical Entities Extraction with Metamap and cTAKES from Spanish Texts. 1 Introduction -- 1.1 UMLS -- 1.2 Metamap -- 1.3 cTAKES -- 2 Methodology -- 3 Results -- 4 Comparison of Metamap and cTAKES -- 5 Conclusion -- References -- Health Records Management in Trust Model Blockchain-Based -- 1 Introduction -- 2 State of the Art -- 2.1 Blockchain Technology -- 2.2 Health Records Concepts -- 3 Related Work -- 4 Methodology -- 5 Proposed Trust Model -- 6 Conclusion -- References -- Digital Transformation and Adoption of Electronic Health Records: Critical Success Factors -- 1 Introduction -- 2 Background -- 2.1 Digital Transformation and Electronic Health Records -- 2.2 Latin America and the Caribbean, and Barriers to EHR Adoption -- 3 Proposal -- 3.1 Critical Success Factors (CSFs) for Evaluating the Conditions for Health Services -- 3.2 Configuration of CSF to EHR Adoption -- 3.3 Operationalization of the CSFs -- 4 Towards the Evaluation and Application of the CSFs -- 4.1 Case Study -- 5 Conclusions -- References -- Comorbidity Analysis in the Mexican Population Affected by SARS-CoV2 -- 1 Introduction -- 1.1 Data Acquisition -- 1.2 Data Processing -- 2 Affectation Index -- 3 Comorbidity Statistics -- 4 Conclusions -- References -- Practical Guidelines for Developing Secure FHIR Applications -- 1 Introduction -- 1.1 Motivation -- 1.2 FHIR Standard and Security -- 1.3 The Security Challenge of FHIR API Based Applications -- 2 Methods and Materials -- 2.1 Guidelines -- 2.2 Testing -- 3 Results -- 3.1 Guidelines -- 3.2 Testing -- 4 Discussion -- References -- Intelligent System to Provide Support in the Analysis of Colposcopy Images Based on Artificial Vision and Deep Learning: A First Approach for Rural Environments in Ecuador -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Pilot Experiment and Preliminary Results -- 4.1 Training the Neural Network. 4.2 Measurement of Perception of the Mobile Application and the Web Application -- 5 Conclusions -- References -- Comparison of Transfer Learning vs. Hyperparameter Tuning to Improve Neural Networks Precision in the Early Detection of Pneumonia in Chest X-Rays -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 CNN Architecture -- 3.2 VGGNet -- 3.3 ResNet -- 3.4 MobileNet -- 3.5 Hyperparameter Tuning -- 4 Experiment and Preliminary Results -- 5 Conclusion -- References -- A Smart Mirror Based on Computer Vision and Deep Learning to Support the Learning of Sexual Violence Prevention and Self-care Health in Youth with Intellectual Disabilities -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Experimentation and Results -- 5 Conclusions -- References -- Intelligent and Decision Support Systems -- Weight Prediction of a Beehive Using Bi-LSTM Network -- 1 Introduction -- 2 Database -- 2.1 LSTM Network -- 2.2 Bi-LSTM Network -- 2.3 Performance Measures -- 2.4 Bi-LSTM Configuration -- 3 Results and Discussion -- 4 Conclusions -- References -- Criteria Selection and Decision-Making Support in IT Governance: A Study via Fuzzy AHP Applied to a Multi-institutional Consortium -- 1 Introduction -- 2 Theoretical Reference -- 3 Methodology -- 3.1 Business Analysis -- 3.2 Preparation -- 3.3 Application of the Questionnaire for Data Collection -- 3.4 Fuzzy AHP Application-Results -- 4 Application of the Methodology -- 4.1 Selection of Criteria and Alternative -- 4.2 Application of Fuzzy AHP -- 5 Conclusions -- References -- Machine Learning Model Optimization for Energy Efficiency Prediction in Buildings Using XGBoost -- 1 Introduction -- 2 Methodology -- 2.1 Data Ingestion -- 2.2 Data Pre-processing -- 2.3 Building the Model -- 2.4 Model Tuning -- 3 Results -- 4 Discussion -- 5 Conclusion -- References. Analysis of the Azores Accommodation Offer in Booking.Com Using an Unsupervised Learning Approach. |
| Record Nr. | UNINA-9910734862803321 |
Rocha Álvaro
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information Technology and Systems : Proceedings of ICITS 2020 / / edited by Álvaro Rocha, Carlos Ferrás, Carlos Enrique Montenegro Marin, Víctor Hugo Medina García
| Information Technology and Systems : Proceedings of ICITS 2020 / / edited by Álvaro Rocha, Carlos Ferrás, Carlos Enrique Montenegro Marin, Víctor Hugo Medina García |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XIX, 732 p. 249 illus., 193 illus. in color.) |
| Disciplina | 006.3 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Engineering—Data processing Application software Computational Intelligence Data Engineering Information Systems Applications (incl. Internet) |
| ISBN | 3-030-40690-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Review of information systems with technological development for tourism planning with an emphasis on host communities -- A Systematic Review on IoT and E-services Co-Production -- Conceptual Framework for Social Media Usage in Public Services – An Indian Perspective -- Extending Persuasive System Design Frameworks: an Exploratory Study -- A new mathematical model for the vehicle routing problem with backhauls and time windows -- Using Architecture Patterns in the Conceptual Model of an eGov Software. |
| Record Nr. | UNINA-9910484792403321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information Technology and Systems : Proceedings of ICITS 2019 / / edited by Álvaro Rocha, Carlos Ferrás, Manolo Paredes
| Information Technology and Systems : Proceedings of ICITS 2019 / / edited by Álvaro Rocha, Carlos Ferrás, Manolo Paredes |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XXI, 978 p. 394 illus., 247 illus. in color.) |
| Disciplina | 006.3 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
| ISBN | 3-030-11890-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910483570703321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||