Applied informatics : Fifth International Conference, ICAI 2022, Arequipa, Peru, October 27-29, 2022, proceedings / / edited by Hector Florez and Henry Gomez |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (472 pages) |
Disciplina | 215 |
Collana | Communications in Computer and Information Science |
Soggetto topico | Computer science |
ISBN | 3-031-19647-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Artificial Intelligence -- A Genetic Algorithm for Scheduling Laboratory Rooms: A Case Study -- 1 Introduction -- 2 Related Works -- 3 Materials and Methods -- 4 Experimental Setup -- 5 Experimental Results -- 6 Conclusion -- References -- COVID-19 Article Classification Using Word-Embedding and Different Variants of Deep-Learning Approach -- 1 Introduction -- 2 Related Work -- 2.1 Text Classification -- 2.2 Deep Learning Methods -- 3 Study Design -- 3.1 Experimental Dataset -- 3.2 Word Embedding -- 3.3 Feature Selection and Dimensionality Reduction -- 3.4 Deep Learning Models -- 3.5 Research Methodology -- 4 Findings and Discussion -- 4.1 RQ1: Which Word Embedding Technique Results in the Best Performance? -- 4.2 RQ2: What Is the Impact of Feature Selection and Dimensionality Reduction on the Performance? -- 4.3 RQ3: Which of the Eight Structures for the DL Neural Network Is the Most Suitable for Text Classification? -- 4.4 How Do the Performances of the Models Trained on the Title Dataset Compare with Those Trained on the Content Dataset? -- 5 Conclusion -- References -- Crop Classification Using Deep Learning: A Quick Comparative Study of Modern Approaches -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Understanding and Preparation -- 3.2 Modeling -- 3.3 Evaluation -- 4 Results and Discussion -- 5 Conclusions and Future Works -- References -- Internet of Things (IoT) for Secure and Sustainable Healthcare Intelligence: Analysis and Challenges -- 1 Introduction -- 2 Basic Elements of IoT Environment -- 3 IoT Applications for Healthcare Intelligence -- 3.1 Types of IoT Applications in Healthcare -- 4 Sustainable IoT Techniques for Error Reduction, and Challenges (Security) in Healthcare Delivery -- 4.1 Healthcare Error Reduction Using Secured IoT Solutions.
4.2 Healthcare Optimization Using IoT -- 4.3 Security Challenges in Healthcare Intelligence Delivery -- 5 Conclusion and Future Direction -- References -- Multiple Colour Detection of RGB Images Using Machine Learning Algorithm -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Overall Framework -- 3.2 K-Nearest Neighbour (KNN) -- 3.3 RGB Colour Histogram -- 3.4 Colour Classification Using KNN -- 4 Implementation and Results -- 4.1 Feature Extraction -- 4.2 Comparison -- 5 Conclusion -- References -- Neural Model-Based Similarity Prediction for Compounds with Unknown Structures -- 1 Introduction -- 2 Materials and Methods -- 2.1 Embeddings Construction -- 2.2 Neural Model -- 2.3 Dataset Construction -- 3 Results -- 3.1 Embeddings Selection -- 3.2 Optimization of the Neural Architecture -- 3.3 Similarity Prediction in Compounds of Unknown Structure -- 4 Conclusions -- References -- Data Analysis -- Classifying Incoming Customer Messages for an e-Commerce Site Using Supervised Learning -- 1 Introduccion -- 2 Related Work -- 3 Integration of Data Sources -- 4 Data Preparation -- 5 Modeling -- 6 Evaluation -- 7 Deployment -- 8 Conclusions and Future Work -- References -- Comparison of Machine Learning Models for Predicting Rainfall in Tropical Regions: The Colombian Case -- 1 Introduction -- 2 Literature Review -- 3 Data Understanding -- 3.1 Descriptive Statistics -- 4 Methodology -- 4.1 The Model -- 5 Model Evaluation -- 6 Discussion -- 7 Conclusions -- References -- Deep Mining Covid-19 Literature -- 1 Introduction -- 2 Dataset -- 3 Related Work -- 3.1 Search Engines -- 3.2 Mining of Cord19 -- 4 Text Mining -- 4.1 Classical Topic Modelling with Bag of Words: From LSA to LDA -- 4.2 Beyond Bag of Words: Text Classification and Clustering with Word Embeddings -- 4.3 Topic Analysis with Deep Architectures -- 5 Experiments -- 5.1 Preparing the Data. 5.2 Finding the Most Prominent Topics -- 6 Conclusion -- References -- Keyword-Based Processing for Assessing Short Answers in the Educational Field -- 1 Introduction -- 2 State of the Art -- 3 Methodology -- 3.1 Automated Scoring -- 3.2 Effective Feedback -- 4 Results -- 4.1 Program Functioning -- 4.2 Relationship Between Calculated and Real Mark -- 4.3 Influence of Each Keyterm on the Mark -- 5 Discussion -- 6 Conclusions -- References -- Statistical Characterization of Image Intensities in Regions Inside Arteries to Facilitate the Extraction of Center Lines in Atherosclerosis Frameworks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Statistically Estimating Level of Intensities for Pathogenic Arteries -- 3 Results -- 3.1 Institution 1. Statistical Values for Lumen, Calcifications and Background -- 3.2 Institution 2. Statistical Values for Lumen, Calcifications and Background -- 3.3 Institution 3. Statistical Values for Lumen, Calcifications and Background -- 3.4 Institution 4. Statistical Values for Lumen, Calcifications and Background -- 4 Discussion -- 5 Conclusions -- References -- Text Encryption with Advanced Encryption Standard (AES) for Near Field Communication (NFC) Using Huffman Compression -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Result and Discussion -- 5 Conclusion -- References s -- Decision Systems -- A Systematic Review on Phishing Detection: A Perspective Beyond a High Accuracy in Phishing Detection -- 1 Introduction -- 2 Methodology -- 2.1 Research Question Formulation -- 2.2 Sourcing of Relevant Literature -- 2.3 Literature Selection -- 3 Phishing Detection Stages, When? -- 3.1 Prevention Stage -- 3.2 Diffusion Stage -- 3.3 Mitigation Stage -- 4 Phishing Information Sources ¿Where? -- 5 Phishing Characterization What? -- 5.1 Challenges for Feature Selection -- 6 Phishing Detection How?. 6.1 Surveyed Papers for Detecting Phishing -- 6.2 Blacklist-Whitelist Approach -- 6.3 Heuristic Approaches -- 6.4 Machine Learning -- 6.5 Detection Phishing Methods -- 7 Opportunities for Future Researches -- 7.1 Identifying Challenges in the Review -- 7.2 Include of Brand Information to Improve Phishing Representation -- 7.3 How Patterns and Brand Features Can be Used in Prevention Stages -- 8 Conclusions -- References -- Application of Duality Properties of Renyi Entropy for Parameter Tuning in an Unsupervised Machine Learning Task -- 1 Introduction -- 2 The Entropic Approach to Topic Modeling -- 2.1 Introduction into Topic Modeling -- 2.2 Free Energy of a Textual Collection -- 2.3 Renyi and Tsallis Entropies for Textual Collections -- 3 The Duality of Topic Modeling -- 4 Results and Discussion -- 4.1 Description of Numerical Experiments -- 4.2 Renyi Entropy of Topic Models with E-M Algorithms (pLSA and VLDA Models) -- 4.3 Renyi Entropy of LDA Gibbs Sampling Model -- 5 Conclusion -- References -- Preliminary Study for Impact of Social Media Networks on Traffic Prediction -- 1 Introduction -- 2 Background -- 2.1 Social Media and Traffic Prediction -- 3 Method and Experimental Setting -- 3.1 Information Diffusion Model -- 3.2 Prediction Model -- 3.3 Experimental Setting -- 4 Evaluation and Validation -- 4.1 Case Study 1: All of 511NYC Accounts and Followers -- 4.2 Case Study 2: Account 55009968 and Network -- 4.3 Case Study 3: Merged Networks from Case Studies 1 and 2 -- 5 Conclusions and Discussion -- References -- Website Phishing Detection Using Machine Learning Classification Algorithms -- 1 Introduction -- 2 Literature Review -- 2.1 Single Classification Algorithm -- 2.2 Hybrid Classification Algorithms -- 3 Dataset Description -- 4 Methodology -- 4.1 XGBoost -- 4.2 Random Forest (RF) -- 4.3 Support Vector Machine (SVM) -- 4.4 Naïve Bayes (NB). 4.5 Logistic Regression -- 4.6 K-Nearest Neighbours (KNN) -- 4.7 Decision Tree (DT) -- 4.8 AdaBoost -- 5 Implementation -- 6 Results and Discussion -- 7 Conclusions -- References -- Health Care Information Systems -- AESRSA: A New Cryptography Key for Electronic Health Record Security -- 1 Introduction -- 2 Background -- 2.1 Cryptography Keys -- 2.2 Common Cryptography Keys -- 3 Related Work -- 4 Approach for EHR Security Based on Improved Cryptography -- 4.1 Data Source -- 4.2 Implementation Environment -- 4.3 Implementation -- 4.4 Performance Evaluation -- 5 Experimental Result and Analysis -- 5.1 Result of EHR Data Encryption Evaluation -- 5.2 Result of EHR Data Decryption Process Evaluation -- 5.3 Analysis -- 6 Conclusions and Future Work -- References -- Detection of COVID-19 Using Denoising Autoencoders and Gabor Filters -- 1 Introduction -- 1.1 Artificial Intelligence (AI) -- 1.2 Chest Radiograph (CRG) -- 1.3 Computed Tomography (CT) Scan -- 2 Related Work -- 3 Existing Framework -- 3.1 DeepCoroNet -- 3.2 Deep Belief Networks (DBN) -- 3.3 Multilayer Perceptron (MLP) -- 3.4 Local Binary Patterns (LBP) -- 3.5 Issue Description -- 4 Datasets -- 5 Proposed Framework -- 5.1 Denoising Autoencoders -- 5.2 Gabor Filter -- 5.3 Architecture Explanation of Proposed Framework -- 6 Experimental Outcome -- 6.1 Overall Performance -- 6.2 Datasets for Training -- 6.3 Data Analysis -- 7 Conclusion -- References -- Development of a Mobile Application to Save Lives on Catastrophic Situations -- 1 Introduction -- 2 Seismic Hazards in Colombia -- 3 Natural Emergencies in Colombia -- 4 Colombian Geological Service -- 5 A Mobile Technology Strategy -- 5.1 Test and Operations -- 6 Conclusions -- References -- Internet of Things with Wearable Devices and Artificial Intelligence for Elderly Uninterrupted Healthcare Monitoring Systems -- 1 Introduction. 2 Materials and Methods. |
Record Nr. | UNISA-996495562403316 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied informatics : Fifth International Conference, ICAI 2022, Arequipa, Peru, October 27-29, 2022, proceedings / / edited by Hector Florez and Henry Gomez |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (472 pages) |
Disciplina | 215 |
Collana | Communications in Computer and Information Science |
Soggetto topico | Computer science |
ISBN | 3-031-19647-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Artificial Intelligence -- A Genetic Algorithm for Scheduling Laboratory Rooms: A Case Study -- 1 Introduction -- 2 Related Works -- 3 Materials and Methods -- 4 Experimental Setup -- 5 Experimental Results -- 6 Conclusion -- References -- COVID-19 Article Classification Using Word-Embedding and Different Variants of Deep-Learning Approach -- 1 Introduction -- 2 Related Work -- 2.1 Text Classification -- 2.2 Deep Learning Methods -- 3 Study Design -- 3.1 Experimental Dataset -- 3.2 Word Embedding -- 3.3 Feature Selection and Dimensionality Reduction -- 3.4 Deep Learning Models -- 3.5 Research Methodology -- 4 Findings and Discussion -- 4.1 RQ1: Which Word Embedding Technique Results in the Best Performance? -- 4.2 RQ2: What Is the Impact of Feature Selection and Dimensionality Reduction on the Performance? -- 4.3 RQ3: Which of the Eight Structures for the DL Neural Network Is the Most Suitable for Text Classification? -- 4.4 How Do the Performances of the Models Trained on the Title Dataset Compare with Those Trained on the Content Dataset? -- 5 Conclusion -- References -- Crop Classification Using Deep Learning: A Quick Comparative Study of Modern Approaches -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Understanding and Preparation -- 3.2 Modeling -- 3.3 Evaluation -- 4 Results and Discussion -- 5 Conclusions and Future Works -- References -- Internet of Things (IoT) for Secure and Sustainable Healthcare Intelligence: Analysis and Challenges -- 1 Introduction -- 2 Basic Elements of IoT Environment -- 3 IoT Applications for Healthcare Intelligence -- 3.1 Types of IoT Applications in Healthcare -- 4 Sustainable IoT Techniques for Error Reduction, and Challenges (Security) in Healthcare Delivery -- 4.1 Healthcare Error Reduction Using Secured IoT Solutions.
4.2 Healthcare Optimization Using IoT -- 4.3 Security Challenges in Healthcare Intelligence Delivery -- 5 Conclusion and Future Direction -- References -- Multiple Colour Detection of RGB Images Using Machine Learning Algorithm -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Overall Framework -- 3.2 K-Nearest Neighbour (KNN) -- 3.3 RGB Colour Histogram -- 3.4 Colour Classification Using KNN -- 4 Implementation and Results -- 4.1 Feature Extraction -- 4.2 Comparison -- 5 Conclusion -- References -- Neural Model-Based Similarity Prediction for Compounds with Unknown Structures -- 1 Introduction -- 2 Materials and Methods -- 2.1 Embeddings Construction -- 2.2 Neural Model -- 2.3 Dataset Construction -- 3 Results -- 3.1 Embeddings Selection -- 3.2 Optimization of the Neural Architecture -- 3.3 Similarity Prediction in Compounds of Unknown Structure -- 4 Conclusions -- References -- Data Analysis -- Classifying Incoming Customer Messages for an e-Commerce Site Using Supervised Learning -- 1 Introduccion -- 2 Related Work -- 3 Integration of Data Sources -- 4 Data Preparation -- 5 Modeling -- 6 Evaluation -- 7 Deployment -- 8 Conclusions and Future Work -- References -- Comparison of Machine Learning Models for Predicting Rainfall in Tropical Regions: The Colombian Case -- 1 Introduction -- 2 Literature Review -- 3 Data Understanding -- 3.1 Descriptive Statistics -- 4 Methodology -- 4.1 The Model -- 5 Model Evaluation -- 6 Discussion -- 7 Conclusions -- References -- Deep Mining Covid-19 Literature -- 1 Introduction -- 2 Dataset -- 3 Related Work -- 3.1 Search Engines -- 3.2 Mining of Cord19 -- 4 Text Mining -- 4.1 Classical Topic Modelling with Bag of Words: From LSA to LDA -- 4.2 Beyond Bag of Words: Text Classification and Clustering with Word Embeddings -- 4.3 Topic Analysis with Deep Architectures -- 5 Experiments -- 5.1 Preparing the Data. 5.2 Finding the Most Prominent Topics -- 6 Conclusion -- References -- Keyword-Based Processing for Assessing Short Answers in the Educational Field -- 1 Introduction -- 2 State of the Art -- 3 Methodology -- 3.1 Automated Scoring -- 3.2 Effective Feedback -- 4 Results -- 4.1 Program Functioning -- 4.2 Relationship Between Calculated and Real Mark -- 4.3 Influence of Each Keyterm on the Mark -- 5 Discussion -- 6 Conclusions -- References -- Statistical Characterization of Image Intensities in Regions Inside Arteries to Facilitate the Extraction of Center Lines in Atherosclerosis Frameworks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Statistically Estimating Level of Intensities for Pathogenic Arteries -- 3 Results -- 3.1 Institution 1. Statistical Values for Lumen, Calcifications and Background -- 3.2 Institution 2. Statistical Values for Lumen, Calcifications and Background -- 3.3 Institution 3. Statistical Values for Lumen, Calcifications and Background -- 3.4 Institution 4. Statistical Values for Lumen, Calcifications and Background -- 4 Discussion -- 5 Conclusions -- References -- Text Encryption with Advanced Encryption Standard (AES) for Near Field Communication (NFC) Using Huffman Compression -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Result and Discussion -- 5 Conclusion -- References s -- Decision Systems -- A Systematic Review on Phishing Detection: A Perspective Beyond a High Accuracy in Phishing Detection -- 1 Introduction -- 2 Methodology -- 2.1 Research Question Formulation -- 2.2 Sourcing of Relevant Literature -- 2.3 Literature Selection -- 3 Phishing Detection Stages, When? -- 3.1 Prevention Stage -- 3.2 Diffusion Stage -- 3.3 Mitigation Stage -- 4 Phishing Information Sources ¿Where? -- 5 Phishing Characterization What? -- 5.1 Challenges for Feature Selection -- 6 Phishing Detection How?. 6.1 Surveyed Papers for Detecting Phishing -- 6.2 Blacklist-Whitelist Approach -- 6.3 Heuristic Approaches -- 6.4 Machine Learning -- 6.5 Detection Phishing Methods -- 7 Opportunities for Future Researches -- 7.1 Identifying Challenges in the Review -- 7.2 Include of Brand Information to Improve Phishing Representation -- 7.3 How Patterns and Brand Features Can be Used in Prevention Stages -- 8 Conclusions -- References -- Application of Duality Properties of Renyi Entropy for Parameter Tuning in an Unsupervised Machine Learning Task -- 1 Introduction -- 2 The Entropic Approach to Topic Modeling -- 2.1 Introduction into Topic Modeling -- 2.2 Free Energy of a Textual Collection -- 2.3 Renyi and Tsallis Entropies for Textual Collections -- 3 The Duality of Topic Modeling -- 4 Results and Discussion -- 4.1 Description of Numerical Experiments -- 4.2 Renyi Entropy of Topic Models with E-M Algorithms (pLSA and VLDA Models) -- 4.3 Renyi Entropy of LDA Gibbs Sampling Model -- 5 Conclusion -- References -- Preliminary Study for Impact of Social Media Networks on Traffic Prediction -- 1 Introduction -- 2 Background -- 2.1 Social Media and Traffic Prediction -- 3 Method and Experimental Setting -- 3.1 Information Diffusion Model -- 3.2 Prediction Model -- 3.3 Experimental Setting -- 4 Evaluation and Validation -- 4.1 Case Study 1: All of 511NYC Accounts and Followers -- 4.2 Case Study 2: Account 55009968 and Network -- 4.3 Case Study 3: Merged Networks from Case Studies 1 and 2 -- 5 Conclusions and Discussion -- References -- Website Phishing Detection Using Machine Learning Classification Algorithms -- 1 Introduction -- 2 Literature Review -- 2.1 Single Classification Algorithm -- 2.2 Hybrid Classification Algorithms -- 3 Dataset Description -- 4 Methodology -- 4.1 XGBoost -- 4.2 Random Forest (RF) -- 4.3 Support Vector Machine (SVM) -- 4.4 Naïve Bayes (NB). 4.5 Logistic Regression -- 4.6 K-Nearest Neighbours (KNN) -- 4.7 Decision Tree (DT) -- 4.8 AdaBoost -- 5 Implementation -- 6 Results and Discussion -- 7 Conclusions -- References -- Health Care Information Systems -- AESRSA: A New Cryptography Key for Electronic Health Record Security -- 1 Introduction -- 2 Background -- 2.1 Cryptography Keys -- 2.2 Common Cryptography Keys -- 3 Related Work -- 4 Approach for EHR Security Based on Improved Cryptography -- 4.1 Data Source -- 4.2 Implementation Environment -- 4.3 Implementation -- 4.4 Performance Evaluation -- 5 Experimental Result and Analysis -- 5.1 Result of EHR Data Encryption Evaluation -- 5.2 Result of EHR Data Decryption Process Evaluation -- 5.3 Analysis -- 6 Conclusions and Future Work -- References -- Detection of COVID-19 Using Denoising Autoencoders and Gabor Filters -- 1 Introduction -- 1.1 Artificial Intelligence (AI) -- 1.2 Chest Radiograph (CRG) -- 1.3 Computed Tomography (CT) Scan -- 2 Related Work -- 3 Existing Framework -- 3.1 DeepCoroNet -- 3.2 Deep Belief Networks (DBN) -- 3.3 Multilayer Perceptron (MLP) -- 3.4 Local Binary Patterns (LBP) -- 3.5 Issue Description -- 4 Datasets -- 5 Proposed Framework -- 5.1 Denoising Autoencoders -- 5.2 Gabor Filter -- 5.3 Architecture Explanation of Proposed Framework -- 6 Experimental Outcome -- 6.1 Overall Performance -- 6.2 Datasets for Training -- 6.3 Data Analysis -- 7 Conclusion -- References -- Development of a Mobile Application to Save Lives on Catastrophic Situations -- 1 Introduction -- 2 Seismic Hazards in Colombia -- 3 Natural Emergencies in Colombia -- 4 Colombian Geological Service -- 5 A Mobile Technology Strategy -- 5.1 Test and Operations -- 6 Conclusions -- References -- Internet of Things with Wearable Devices and Artificial Intelligence for Elderly Uninterrupted Healthcare Monitoring Systems -- 1 Introduction. 2 Materials and Methods. |
Record Nr. | UNINA-9910617307103321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied informatics : fourth international conference, ICAI 2021, Buenos Aires, Argentina, October 28-30, 2021 : proceedings / / edited by Hector Florez and Ma Florencia Pollo-Cattaneo |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (512 pages) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science Ser. |
Soggetto topico |
Computer networks
Education - Data processing Application software |
ISBN | 3-030-89654-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Artificial Intelligence -- A Chatterbot Based on Genetic Algorithm: Preliminary Results -- 1 Introduction -- 2 Related Works -- 3 Database -- 4 The Use of Genetic Algorithm -- 4.1 Initial Population Generation -- 4.2 Mutation -- 4.3 Evaluation -- 4.4 Pseudo-code -- 5 Experimental Setup -- 6 Experimental Results -- 7 Conclusions -- References -- A Supervised Approach to Credit Card Fraud Detection Using an Artificial Neural Network -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Exploration -- 3.2 Feature Scaling -- 3.3 Model Development -- 3.4 Training and Testing of the Model -- 4 Results and Discussion -- 4.1 Data Exploration -- 4.2 ANN Model Built with Phython's Keras -- 4.3 Performance Evaluation of the Proposed Model -- 5 Conclusion -- References -- Machine Learning Classification Based Techniques for Fraud Discovery in Credit Card Datasets -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Dataset -- 3.2 Proposed Method -- 3.3 Performance Evaluation -- 4 Result and Discussions -- 4.1 Discussion -- 5 Conclusion and Future Research Direction -- References -- Object Detection Based Software System for Automatic Evaluation of CursogramasImages -- 1 Introduction -- 2 Problem Description -- 3 Proposed Solution -- 3.1 Construction of the Symbol Detection Model -- 3.2 Implementation of the Evaluation Program -- 4 Results -- 4.1 Generation of Test Cases -- 4.2 Analysis of a Case Study -- 4.3 Verification of the Robustness with "Noisy" Images -- 4.4 Discussions of the Evaluation Results -- 5 Conclusions -- References -- Sign Language Recognition Using Leap Motion Based on Time-Frequency Characterization and Conventional Machine Learning Techniques -- 1 Introduction -- 2 Materials and Methods -- 2.1 User Disposition for Data Acquisition.
2.2 Dataset -- 2.3 Data Cleansing and Segmentation -- 2.4 Data Transformation and Sampling -- 2.5 Feature Extraction -- 2.6 Classification -- 3 Results and Discussion -- 4 Conclusions -- References -- Solar Radiation Prediction Using Machine Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Estimation Model Using Machine Learning -- 4 Estimation Model Results Using Machine Learning -- 5 Conclusions -- References -- Towards More Robust GNN Training with Graph Normalization for GraphSAINT -- 1 Introduction -- 2 Related Work -- 2.1 The Sampling Strategy of GraphSAINT -- 2.2 The Typical Normalization Technique -- 3 Methodology -- 4 Experiments -- 5 Conclusions -- References -- Data Analysis -- A Complementary Approach in the Analysis of the Human Gut Microbiome Applying Self-organizing Maps and Random Forest -- 1 Introduction -- 2 Methods -- 2.1 Dataset -- 2.2 Self-organizing Maps (SOMs) -- 2.3 Random Forest -- 3 Results -- 3.1 Characteristics of the Study Population -- 3.2 SOM Analysis -- 3.3 Random Forest -- 4 Discussion -- 5 Conclusions -- References -- An Evaluation of Intrinsic Mode Function Characteristic of Non-Gaussian Autorregresive Processes -- 1 Introduction -- 2 Empirical Mode Decomposition Features and Stochastic Processes -- 2.1 Stochastic Processes -- 2.2 Empirical Mode Decomposition Features -- 2.3 Time-Frequency Related Features -- 2.4 Energy-Entropy Related Features -- 3 Numerical Results and Discussion -- 4 Conclusions -- References -- Analysing Documents About Colombian Indigenous Peoples Through Text Mining -- 1 Introduction -- 2 Related Work -- 3 Definition of the Corpus -- 3.1 Characterisation Documents -- 3.2 News Articles -- 3.3 Constitutional Court Rulings -- 4 Overall Analysis of the Corpus -- 5 News Article Sentiment Analysis -- 6 Timeline Generation -- 7 Conclusions -- References. Application of a Continuous Improvement Method for Graphic User Interfaces Through Intelligent Systems for a Language Services Company -- 1 Introduction -- 2 Proposed Method -- 2.1 Interactive Genetic Algorithms -- 2.2 General Structure of the Proposed Method -- 3 Results -- 3.1 Induction -- 3.2 Intervention Elements Selection -- 3.3 Configuration -- 3.4 Initial Population Generation -- 3.5 GUIs Modification -- 3.6 Deployment -- 3.7 Measurement -- 3.8 Evaluation -- 3.9 Crossover and Mutation -- 3.10 Subsequent Generations -- 3.11 Closing -- 4 Analysis of the Results -- 5 Conclusions -- References -- Descriptive Analysis Model to Improve the Pension Contributions Collection Process for Colpensiones -- 1 Introduction -- 2 Methodology and Materials -- 2.1 Background -- 3 Related Work -- 4 Methodology -- 5 Results -- 5.1 Geographical Zones -- 6 Conclusions and Future Work -- References -- User Response-Based Fake News Detection on Social Media -- 1 Introduction -- 2 Related Work -- 2.1 News Content-Based Approach -- 2.2 Social Context Approach -- 3 Methodologies -- 3.1 Extract User Response Attributes -- 3.2 Apply Text Preprocessing -- 3.3 Encode Emotions -- 3.4 Extract Features -- 3.5 Merge Attributes -- 3.6 Build Model -- 4 Experimental Results and Analysis -- 4.1 Dataset -- 4.2 Experimental Settings -- 4.3 Performance Comparison (RQ1) -- 4.4 Which Algorithm Fits Best? (RQ2) -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Decision Systems -- A Multi-objective Mathematical Optimization Model and a Mobile Application for Finding Best Pedestrian Routes Considering SARS-CoV-2 Contagions -- 1 Introduction -- 2 Related Work -- 3 Multi-objective Mathematical Optimization Model -- 3.1 Interaction Cost Function -- 3.2 Pedestrian Traffic Simulation on the University Campus -- 3.3 Pareto Front Development -- 4 Heuristic. 4.1 Bi-Objective Problem Understanding -- 4.2 Single Cost Approach to Solution Heuristic -- 4.3 Results Comparisson and Validation with the Pareto Front -- 4.4 Results Comparisons and Validation Based on the Mathematical Model -- 5 Mobile Application Design -- 5.1 Validations -- 6 Conclusions -- References -- An Improved Course Recommendation System Based on Historical Grade Data Using Logistic Regression -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Pre-processing -- 3.3 Feature Selection -- 3.4 Division of Data -- 3.5 Wide and Deep Recommender -- 3.6 Performance Evaluation Metrics -- 4 Results and Discussion -- 5 Conclusion -- References -- Predictive Academic Performance Model to Support, Prevent and Decrease the University Dropout Rate -- 1 Introduction -- 2 Preliminaries -- 2.1 Student Desertion -- 2.2 Functioning of Notes at University and in General at Colombian Universities -- 3 Methods -- 3.1 Data Preparation -- 3.2 Data Analysis -- 4 Modeling Academic Performance with Machine Learning -- 4.1 Models Used -- 4.2 Training Process -- 4.3 TESTING the MODEL -- 5 Discussion -- 6 Conclusion -- References -- Proposed Algorithm to Digitize the Root-Cause Analysis and 8Ds of the Automotive Industry -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Problem Statement -- 4.1 Stage 1. -- 4.2 Stage 2: -- 5 Smart QRCI Design -- 5.1 Stage 3: -- 6 Conclusions -- References -- Health Care Information Systems -- Blood Pressure Morphology as a Fingerprint of Cardiovascular Health: A Machine Learning Based Approach -- 1 Introduction -- 2 Methods -- 2.1 Signal Analysis -- 2.2 Models -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Characterizing Musculoskeletal Disorders. A Case Study Involving Kindergarten Employees -- 1 Introduction -- 2 Materials and Methods -- 2.1 Evalu@ Parametrization. 2.2 The Kuourika Questionnaire (KQ) Administration -- 3 Results -- 3.1 Discomfort in the Upper Body -- 3.2 Analysing Discomfort by Upper Body Joint -- 3.3 General Discomfort Timing in the Last 12 Months -- 3.4 Upper Body Discomfort Timing in the Last 12 Months -- 3.5 Discomfort in the Last Seven Days -- 3.6 Duration of the Discomfort Episodes -- 3.7 Annoyance Vs. Disability Time -- 4 Discussion -- 5 Conclusion -- References -- Comparison of Heart Rate Variability Analysis with Empirical Mode Decomposition and Fourier Transform -- 1 Introduction -- 2 Materials and Methods -- 2.1 Simulated Signal -- 2.2 Dataset -- 2.3 Resampling -- 2.4 HRV Signal Analysis -- 2.5 Software Tools -- 3 Results -- 4 Discussion -- 4.1 Conclusions -- References -- Evalu@ + Sports. Creatine Phosphokinase and Urea in High-Performance Athletes During Competition. a Framework for Predicting Injuries Caused by Fatigue -- 1 Introduction -- 2 Materials and Methods -- 2.1 EV-box Configuration -- 2.2 EV-Surv Configuration -- 2.3 Variable Independence -- 2.4 Studied Indexes -- 3 Results -- 3.1 Tracking CPK and Urea -- 3.2 Joint Analysis of the Variables -- 4 Discussion -- 5 Conclusion -- References -- Heart Rate Variability: Validity of Autonomic Balance Indicators in Ultra-Short Recordings -- 1 Introduction -- 2 Materials and Methods -- 2.1 Subjects -- 2.2 HRV Analysis -- 2.3 Poincaré Geometric Domain -- 2.4 Statistical Analysis -- 2.5 Results -- 2.6 Discussion -- 2.7 Conclusions -- References -- Image Processing -- An Improved Machine Learnings Diagnosis Technique for COVID-19 Pandemic Using Chest X-ray Images -- 1 Introduction -- 2 Review of Related Work -- 3 Materials and Methods -- 3.1 Dataset -- 3.2 The Flowchart for the Propose Model -- 4 Experimentation of the Proposed Model -- 4.1 Pre-processing -- 4.2 Diagnosis Models, Parameters and Metrics -- 5 Results and Discussion. 5.1 ROC Curves. |
Record Nr. | UNISA-996464498403316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Informatics : Fourth International Conference, ICAI 2021, Buenos Aires, Argentina, October 28–30, 2021, Proceedings / / edited by Hector Florez, Ma Florencia Pollo-Cattaneo |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (512 pages) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Application software
Computer networks Education - Data processing Machine learning Computer systems Computer and Information Systems Applications Computer Communication Networks Computers and Education Machine Learning Computer System Implementation Informàtica Tecnologia de la informació |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-89654-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Artificial Intelligence -- Data Analysis -- Decision Systems -- Health Care Information Systems -- Image Processing -- Security Services -- Simulation and Emulation -- Smart Cities -- Software and Systems Modeling -- Software Design Engineering. |
Record Nr. | UNINA-9910506405803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied informatics : Third International Conference, ICAI 2020, Ota, Nigeria, October 29-31, 2020, proceedings / / edited by Hector Florez, Sanjay Misra |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XVI, 520 p. 536 illus., 167 illus. in color.) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science |
Soggetto topico | Computer science |
ISBN | 3-030-61702-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Artificial Intelligence -- Business Process Management -- Cloud Computing -- Data Analysis -- Decision Systems -- Health Care Information Systems -- Human-Computer Interaction -- Image Processing -- Learning Management Systems -- Software Design Engineering. |
Record Nr. | UNISA-996465343303316 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Informatics : Third International Conference, ICAI 2020, Ota, Nigeria, October 29–31, 2020, Proceedings / / edited by Hector Florez, Sanjay Misra |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVI, 520 p. 536 illus., 167 illus. in color.) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Application software
Artificial intelligence Computer engineering Computer networks Computer vision Education - Data processing Computer and Information Systems Applications Artificial Intelligence Computer Engineering and Networks Computer Vision Computers and Education |
ISBN | 3-030-61702-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Artificial Intelligence -- Business Process Management -- Cloud Computing -- Data Analysis -- Decision Systems -- Health Care Information Systems -- Human-Computer Interaction -- Image Processing -- Learning Management Systems -- Software Design Engineering. |
Record Nr. | UNINA-9910427704303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied Informatics : Second International Conference, ICAI 2019, Madrid, Spain, November 7–9, 2019, Proceedings / / edited by Hector Florez, Marcelo Leon, Jose Maria Diaz-Nafria, Simone Belli |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (xiv, 548 pages) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Application software
Artificial intelligence Education - Data processing Software engineering Computer engineering Computer networks Computer and Information Systems Applications Artificial Intelligence Computers and Education Software Engineering Computer Engineering and Networks |
ISBN | 3-030-32475-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910349270003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied Informatics : First International Conference, ICAI 2018, Bogotá, Colombia, November 1-3, 2018, Proceedings / / edited by Hector Florez, Cesar Diaz, Jaime Chavarriaga |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIII, 380 p. 164 illus.) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Application software
Computer organization Computer Applications Computer Systems Organization and Communication Networks |
ISBN | 3-030-01535-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data analysis -- Decision systems -- Health care information systems -- IT architectures -- Learning management systems -- Mobile information processing systems -- Robotic autonomy -- Software design engineering. |
Record Nr. | UNINA-9910299295703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|