top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information and Communication Technologies [[electronic resource] ] : 11th Ecuadorian Conference, TICEC 2023, Cuenca, Ecuador, October 18–20, 2023, Proceedings / / edited by Jorge Maldonado-Mahauad, Jorge Herrera-Tapia, Jorge Luis Zambrano-Martínez, Santiago Berrezueta
Information and Communication Technologies [[electronic resource] ] : 11th Ecuadorian Conference, TICEC 2023, Cuenca, Ecuador, October 18–20, 2023, Proceedings / / edited by Jorge Maldonado-Mahauad, Jorge Herrera-Tapia, Jorge Luis Zambrano-Martínez, Santiago Berrezueta
Autore Maldonado-Mahauad Jorge
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (495 pages)
Disciplina 004.6
Altri autori (Persone) Herrera-TapiaJorge
Zambrano-MartínezJorge Luis
BerrezuetaSantiago
Collana Communications in Computer and Information Science
Soggetto topico Computer networks
Data structures (Computer science)
Information theory
Software engineering
Operating systems (Computers)
Artificial intelligence
Computers, Special purpose
Computer Communication Networks
Data Structures and Information Theory
Software Engineering
Operating Systems
Artificial Intelligence
Special Purpose and Application-Based Systems
ISBN 3-031-45438-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Science and Machine Learning: Uncovering the Effects of the Russia-Ukraine Conflict on Cryptocurrencies: A Data-driven Analysis with Clustering and Biplot Techniques -- Human Trafficking in Social Networks: A Review of Machine Learning Techniques -- Exploring the Performance of Deep Learning in High-Energy Physics -- Human actions recognition system based on Neural Networks -- Big Data Architecture for Air Pollution Spatial Visualization: Quito, Ecuador -- The Role of Twitter in Media Coverage during Humanitarian Crises. Data mining from International News Agencies -- Applied Metaheuristics in International Trading: A Systematic Review -- Finding an Integrated Ultraviolet Radiation Index Using Fuzzy Logic Techniques -- Forecasting the Consumer Price Index of Ecuador using Classical and Advanced Time Series Models -- Forecasting PM2.5 concentrations in ambient air using a transformer based neural network -- Machine Learning Applied to the Analysis of Glacier Masses -- Profit vs Accuracy: Balancing the Impact on Users Introduced by Profit-Aware Recommender Systems -- Augmenting Data with DCGANs to Improve Skin Lesions Classification -- Unraveling the power of 4D residual blocks and transfer learning in violence detection -- ICTs and their Applications: Brainwaves communication system for people with reduced mobility and verbal impairment -- Advanced metrics to evaluate autistic children's attention and emotions from facial characteristics using a human-robot-game interface -- Performance analysis of You Only Look Once, RetinaNet, and Single Shot Detector applied to vehicle detection and counting -- Tumor kidney segmentation from CT images using residual U-net architecture -- Classification of Alzheimer disease’s Severity Using Support Vector Machine and Deep Feature Extraction of Convolutional Neural Networks: a Contrasting of Methodologies -- Creation of an alert device for early detection of epilepsy using an EEG signal power threshold -- Optimal location of the electric vehicle charging stands using multi-objective evolutionary algorithms: Cuenca city as a case study -- Detecting Parkinson’s Disease with Convolutional Neural Networks: Voice Analysis and Deep Learning -- Hyperparameter Tuning in a Dual Channel U-Net for Medical Image Segmentation -- Vitreous Hemorrhage Segmentation in Fundus Images by using an Efficient-UNet Network -- A non-invasive portable solution to estimate hemoglobin levels in the blood -- Mask R-CNN and YOLOv8 comparison to perform tomato maturity recognition task -- Software Development -- Development of a distributed hydrological model of continuous generation, in a GIS environment -- A Domain-Specific Language and Model-Based Engine for Implementing IoT Dash- board Web Applications -- Feasibility of using serious MIDI-AM videogames as resources in early childhood education -- Search and Visualization of Researcher Networks: Co-authorship in Ecuador -- Visualization Models Applied to Atmospheric Pollutants and Meteorological Variables: A Systematic Literature Review.
Record Nr. UNISA-996558570703316
Maldonado-Mahauad Jorge  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communication Technologies : 11th Ecuadorian Conference, TICEC 2023, Cuenca, Ecuador, October 18–20, 2023, Proceedings / / edited by Jorge Maldonado-Mahauad, Jorge Herrera-Tapia, Jorge Luis Zambrano-Martínez, Santiago Berrezueta
Information and Communication Technologies : 11th Ecuadorian Conference, TICEC 2023, Cuenca, Ecuador, October 18–20, 2023, Proceedings / / edited by Jorge Maldonado-Mahauad, Jorge Herrera-Tapia, Jorge Luis Zambrano-Martínez, Santiago Berrezueta
Autore Maldonado-Mahauad Jorge
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (495 pages)
Disciplina 004.6
Altri autori (Persone) Herrera-TapiaJorge
Zambrano-MartínezJorge Luis
BerrezuetaSantiago
Collana Communications in Computer and Information Science
Soggetto topico Computer networks
Data structures (Computer science)
Information theory
Software engineering
Operating systems (Computers)
Artificial intelligence
Computers, Special purpose
Computer Communication Networks
Data Structures and Information Theory
Software Engineering
Operating Systems
Artificial Intelligence
Special Purpose and Application-Based Systems
ISBN 9783031454387
3031454383
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Science and Machine Learning: Uncovering the Effects of the Russia-Ukraine Conflict on Cryptocurrencies: A Data-driven Analysis with Clustering and Biplot Techniques -- Human Trafficking in Social Networks: A Review of Machine Learning Techniques -- Exploring the Performance of Deep Learning in High-Energy Physics -- Human actions recognition system based on Neural Networks -- Big Data Architecture for Air Pollution Spatial Visualization: Quito, Ecuador -- The Role of Twitter in Media Coverage during Humanitarian Crises. Data mining from International News Agencies -- Applied Metaheuristics in International Trading: A Systematic Review -- Finding an Integrated Ultraviolet Radiation Index Using Fuzzy Logic Techniques -- Forecasting the Consumer Price Index of Ecuador using Classical and Advanced Time Series Models -- Forecasting PM2.5 concentrations in ambient air using a transformer based neural network -- Machine Learning Applied to the Analysis of Glacier Masses -- Profit vs Accuracy: Balancing the Impact on Users Introduced by Profit-Aware Recommender Systems -- Augmenting Data with DCGANs to Improve Skin Lesions Classification -- Unraveling the power of 4D residual blocks and transfer learning in violence detection -- ICTs and their Applications: Brainwaves communication system for people with reduced mobility and verbal impairment -- Advanced metrics to evaluate autistic children's attention and emotions from facial characteristics using a human-robot-game interface -- Performance analysis of You Only Look Once, RetinaNet, and Single Shot Detector applied to vehicle detection and counting -- Tumor kidney segmentation from CT images using residual U-net architecture -- Classification of Alzheimer disease’s Severity Using Support Vector Machine and Deep Feature Extraction of Convolutional Neural Networks: a Contrasting of Methodologies -- Creation of an alert device for early detection of epilepsy using an EEG signal power threshold -- Optimal location of the electric vehicle charging stands using multi-objective evolutionary algorithms: Cuenca city as a case study -- Detecting Parkinson’s Disease with Convolutional Neural Networks: Voice Analysis and Deep Learning -- Hyperparameter Tuning in a Dual Channel U-Net for Medical Image Segmentation -- Vitreous Hemorrhage Segmentation in Fundus Images by using an Efficient-UNet Network -- A non-invasive portable solution to estimate hemoglobin levels in the blood -- Mask R-CNN and YOLOv8 comparison to perform tomato maturity recognition task -- Software Development -- Development of a distributed hydrological model of continuous generation, in a GIS environment -- A Domain-Specific Language and Model-Based Engine for Implementing IoT Dash- board Web Applications -- Feasibility of using serious MIDI-AM videogames as resources in early childhood education -- Search and Visualization of Researcher Networks: Co-authorship in Ecuador -- Visualization Models Applied to Atmospheric Pollutants and Meteorological Variables: A Systematic Literature Review.
Record Nr. UNINA-9910747596803321
Maldonado-Mahauad Jorge  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and communication technologies : 10th Ecuadorian conference, TICEC 2022, Manta, Ecuador, October 12-14, 2022 : proceedings / / Jorge Herrera-Tapia [and three others], editors
Information and communication technologies : 10th Ecuadorian conference, TICEC 2022, Manta, Ecuador, October 12-14, 2022 : proceedings / / Jorge Herrera-Tapia [and three others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (320 pages)
Disciplina 006.3
Collana Communications in computer and information science
Soggetto topico Computational intelligence
ISBN 3-031-18272-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- ICT's Applications -- An Online BCI System Based in SSVEPs to Control IoT Devices -- 1 Introduction -- 2 State of Art -- 3 Methodology -- 4 Development of the Solution -- 4.1 First Increment -- 4.2 Second Increment -- 4.3 Third Increment -- 4.4 Fourth Increment -- 4.5 Test of the Integrated Prototype -- 5 Results and Discussion -- 5.1 Results -- 5.2 Discussion -- 6 Conclusions -- References -- Collision Avoidance Simulation Using Voronoi Diagrams in a Centralized System of Holonomic Multi-agents -- 1 Introduction -- 2 Related Work -- 2.1 Collision Avoidance -- 2.2 Voronoi Diagrams -- 2.3 Multi-agent Navigation -- 3 Methodology -- 3.1 Model Proposal -- 3.2 Two-Dimensional Environment -- 3.3 Heuristics to Deal with Deadlock -- 3.4 QP-Based Receding Horizons Control Algorithm -- 3.5 Analytical Geometrical Algorithm -- 3.6 Optimal Reciprocal Collision Avoidance Algorithm -- 3.7 Analysis Method -- 4 Results and Discussion -- 4.1 Construction of Voronoi Diagram -- 4.2 Deadlock -- 4.3 Evaluation of Algorithms -- 4.4 Implementation -- 5 Conclusions -- 5.1 Future Work -- References -- Intelligent Electromyograph for Early Detection of Myopathy and Neuropathy Using EMG Signals and Neural Network Model -- 1 Introduction -- 2 Materials and Methods -- 2.1 Obtaining and Process Signal -- 2.2 Database Creation -- 2.3 Develop the Predictive Model -- 2.4 Prediction of Health Status -- 3 Results -- 3.1 Obtaining and Process Signal -- 3.2 Neural Network -- 3.3 Web Application -- 4 Discussion -- 5 Conclusion -- References -- Underwater Wireless Sensor Networks and Cryptographic Applications -- 1 Introduction -- 2 Underwater Wireless Sensor Networks -- 2.1 Problems Related to UWSNs -- 3 Motivations -- 4 Challenges Related to Cryptographic Security -- 4.1 Security Attacks on UWSNs.
4.2 Problems of Cryptographic Primitives -- 4.3 Cryptographic Algorithms Applied to Secure Protocols -- 4.4 Discussion -- 5 Conclusions -- References -- Design of a Sensor Network for Drinking Water Control in the Maria of Merced Educational Unit -- 1 Introduction -- 2 Materials and Methods -- 2.1 Analysis of the Current Situation at the UEMM -- 2.2 Proposed WSN Design -- 2.3 Statistical Method of Results -- 3 Results and Validation -- 3.1 Simulation Results -- 3.2 Statistical Analysis of Data Exported by the OPNET Simulator -- 3.3 Validation by Normality Testing -- 4 Conclusions -- References -- Drinking Water and Sewerage at the Universidad de las Fuerzas Armadas ESPE and Implementation of an Internet of Things Flowmeter -- 1 Introduction -- 1.1 University of the Armed Forces -- 1.2 Drinking-Water and Sewerage -- 1.3 Flowmeter IoT -- 1.4 Flowmeter IoT Data Analysis with Recurrence Maps -- 2 Methodology -- 2.1 Study Zone -- 2.2 Implementation of the IoT Flowmeter -- 2.3 Data Processing -- 3 Results and Discussions -- 3.1 Drinking Water, Pressures, and Sewerage with Problems Encountered -- 3.2 Measurement of the Population of the Universidad de las Fuerzas Armadas ESPE -- 3.3 Implementation of IoT Flowmeter -- 3.4 Determination of the Drinking Water Supply at the University -- 4 Conclusions -- References -- Indicators to Evaluate Elements of Industry 5.0 in the Textile Production of MSMEs -- 1 Introduction -- 2 Related Research -- 3 Methodology -- 4 Results and Discussion -- 4.1 Results of the Systematic Literature Review -- 4.2 Analysis and Selection of Indicators -- 5 Conclusions -- Appendix A - List of References Considered in the SLR -- Appendix B - Set of Indicators and Sheets -- References -- Technological Accessibility and Digital Health Education Associated with the Use of Smart Healthcare by Obstetricians in Peru -- 1 Introduction.
2 Methodology -- 2.1 Research Design and Population Under Study -- 2.2 Variables -- 2.3 Data Collection Procedure -- 2.4 Statistical Analysis -- 2.5 Ethical Considerations -- 3 Results -- 4 Discussion -- 5 Conclusions and Future Steps -- 5.1 Conclusions -- 5.2 Future Steps -- Appendix -- References -- Data Science -- Adaptation of a Process Mining Methodology to Analyse Learning Strategies in a Synchronous Massive Open Online Course -- 1 Introduction -- 2 Related Work -- 2.1 Analysis of Learning Strategies in MOOCs: Methods and Techniques -- 2.2 Learning Strategies Across Contexts -- 2.3 Research Questions -- 3 Method -- 3.1 Context: MOOC and Sample -- 3.2 Procedure -- 4 Results -- 4.1 RQ1: To What Extend Can We Replicate (Partially or Totally) the Methodology Applied in the Previous Study by [18] to Extract Learners' Learning Strategies in a MOOC? -- 4.2 RQ2: How do Learners' Learning Strategies in This New Context Differ from Those from the Previous Study? -- 5 Conclusion and Discussion -- 5.1 Summary of Results -- 5.2 Implications -- 5.3 Limitations -- References -- Ecuador Agricultural Product Price Forecast: A Comparative Study of Deep Learning Models -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Cleaning -- 3.2 Data Preparation -- 3.3 Models Preparation -- 3.4 Training Models -- 3.5 Models Evaluation -- 4 Experiments -- 4.1 Materials -- 4.2 Experiment 1: Comparison Between Models -- 4.3 Experiment 2: Best Models with Different Datasets -- 4.4 Experiment 3: Hyperparameter Tuning and Optimizer -- 4.5 Experimental Setup -- 5 Results and Discussion -- 5.1 Comparison Between Models -- 5.2 Best Model with Different Datasets -- 5.3 Hyperparameter Tuning and Optimizer -- 5.4 Discussion -- 6 Conclusion -- References -- Assessing the COVID-19 Vaccination Process via Functional Data Analysis -- 1 Introduction.
1.1 Contribution and Related Work -- 2 Materials -- 2.1 Data Description -- 2.2 Handling the Missing Data -- 3 Methods: Functional Data Analysis -- 3.1 B-Spline Basis -- 3.2 Smoothing Parameter -- 3.3 Functional Principal Component Analysis (FPCA) -- 3.4 Functional Cluster Analysis -- 4 Results and Discussion -- 4.1 Data Smoothing -- 4.2 FPCA -- 4.3 FPC Scores -- 4.4 Perturbations of the Mean Function -- 4.5 Functional Clustering -- 5 Conclusions and Further Studies -- References -- A Methodology to Develop an Outdoor Activities Recommender Based on Air Pollution Variables -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Data Analysis -- 3.4 Evaluation of the Optimal Number of Clusters -- 3.5 Results -- 4 Evaluation of the Methodology -- 4.1 Objectives and Research Questions -- 4.2 Context and Survey Design -- 4.3 Results and Data Interpretation -- 5 Threats to Validity -- 6 Conclusions -- References -- Improving with Metaheuristics the Item Selection in Parallel Coordinates Plot -- 1 Introduction -- 2 Related Works -- 3 Problem Formulation -- 3.1 Visualization Issue on PCP -- 3.2 PCP Metaheuristic Solution -- 3.3 Threats to Validity -- 4 Results -- 5 Conclusions -- References -- Implementation of Clustering Techniques to Data Obtained from a Memory Match Game Oriented to the Cognitive Function of Attention -- 1 Introduction -- 2 Related Works -- 3 Application of the Methodology -- 3.1 Cluster Application -- 4 Conclusion -- References -- Q-Learning in a Multidimensional Maze Environment -- 1 Introduction -- 1.1 Q-learning -- 2 Related Work -- 3 Methodology -- 3.1 Maze Design: Environment -- 3.2 Depth-First Search (DFS) -- 3.3 How the Agent Explores and Learns -- 3.4 Implementation Details -- 4 Results -- 5 Discussion -- 6 Conclusions -- 7 Future Work -- References.
Cyberbullying Through the Lens of Data Science -- 1 Introduction -- 2 Related Work -- 3 Systematic Literature Review -- 3.1 Planning the Review -- 3.2 Conducting the Review -- 4 Conclusions -- Appendix 1 -- References -- Software Development -- Comparative Study of Image Degradation and Restoration Techniques -- 1 Introduction -- 2 Degradation Restoration Modeling -- 2.1 Degradation Functions -- 2.2 Restoration Filters -- 3 Results of Modeling -- 3.1 Dataset -- 3.2 Measuring Similarity -- 3.3 Image Degradation Results -- 3.4 Image Restoration Results -- 3.5 Evaluation Results -- 4 Conclusions -- References -- IOWA Rough-Fuzzy Support Vector Data Description -- 1 Introduction -- 2 Literature Review -- 2.1 Rough-Fuzzy Support Vector Data Description -- 2.2 Ordered Weighted Average -- 2.3 Recent Advances on SVDD -- 3 Proposed Methodology for IOWA-RFSVDD -- 4 Computational Experiments -- 5 Conclusions and Future Work -- References -- Preparation of a Social Engineering Attack, from Scratch to Compromise: A USB Dropper and Impersonation Approach -- 1 Introduction -- 1.1 Motivation -- 1.2 Goals -- 2 Background -- 2.1 Social Engineering -- 2.2 Common Attacks -- 2.3 Human Weakness Exploitation -- 2.4 Tailgating -- 2.5 Empathy -- 2.6 Attack Structure -- 2.7 USB Dropper -- 2.8 Bad USB Drive -- 2.9 Impersonation -- 2.10 Pretext -- 2.11 Persuasion -- 2.12 Social Engineering in the Enterprise -- 2.13 Awareness -- 3 Methodology -- 3.1 The Preparation -- 3.2 Tools -- 4 Results and Discussion -- References -- Information Security at Higher Education Institutions: A Systematic Literature Review -- 1 Introduction -- 2 Methodology and Tools -- 2.1 Research Questions -- 2.2 Document Search -- 2.3 Article Selection -- 2.4 Relevant Data Mining -- 3 Results -- 4 Discussion -- 5 Conclusions -- References -- Author Index.
Record Nr. UNISA-996495564503316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and communication technologies : 10th Ecuadorian conference, TICEC 2022, Manta, Ecuador, October 12-14, 2022 : proceedings / / Jorge Herrera-Tapia [and three others], editors
Information and communication technologies : 10th Ecuadorian conference, TICEC 2022, Manta, Ecuador, October 12-14, 2022 : proceedings / / Jorge Herrera-Tapia [and three others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (320 pages)
Disciplina 006.3
Collana Communications in computer and information science
Soggetto topico Computational intelligence
ISBN 3-031-18272-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- ICT's Applications -- An Online BCI System Based in SSVEPs to Control IoT Devices -- 1 Introduction -- 2 State of Art -- 3 Methodology -- 4 Development of the Solution -- 4.1 First Increment -- 4.2 Second Increment -- 4.3 Third Increment -- 4.4 Fourth Increment -- 4.5 Test of the Integrated Prototype -- 5 Results and Discussion -- 5.1 Results -- 5.2 Discussion -- 6 Conclusions -- References -- Collision Avoidance Simulation Using Voronoi Diagrams in a Centralized System of Holonomic Multi-agents -- 1 Introduction -- 2 Related Work -- 2.1 Collision Avoidance -- 2.2 Voronoi Diagrams -- 2.3 Multi-agent Navigation -- 3 Methodology -- 3.1 Model Proposal -- 3.2 Two-Dimensional Environment -- 3.3 Heuristics to Deal with Deadlock -- 3.4 QP-Based Receding Horizons Control Algorithm -- 3.5 Analytical Geometrical Algorithm -- 3.6 Optimal Reciprocal Collision Avoidance Algorithm -- 3.7 Analysis Method -- 4 Results and Discussion -- 4.1 Construction of Voronoi Diagram -- 4.2 Deadlock -- 4.3 Evaluation of Algorithms -- 4.4 Implementation -- 5 Conclusions -- 5.1 Future Work -- References -- Intelligent Electromyograph for Early Detection of Myopathy and Neuropathy Using EMG Signals and Neural Network Model -- 1 Introduction -- 2 Materials and Methods -- 2.1 Obtaining and Process Signal -- 2.2 Database Creation -- 2.3 Develop the Predictive Model -- 2.4 Prediction of Health Status -- 3 Results -- 3.1 Obtaining and Process Signal -- 3.2 Neural Network -- 3.3 Web Application -- 4 Discussion -- 5 Conclusion -- References -- Underwater Wireless Sensor Networks and Cryptographic Applications -- 1 Introduction -- 2 Underwater Wireless Sensor Networks -- 2.1 Problems Related to UWSNs -- 3 Motivations -- 4 Challenges Related to Cryptographic Security -- 4.1 Security Attacks on UWSNs.
4.2 Problems of Cryptographic Primitives -- 4.3 Cryptographic Algorithms Applied to Secure Protocols -- 4.4 Discussion -- 5 Conclusions -- References -- Design of a Sensor Network for Drinking Water Control in the Maria of Merced Educational Unit -- 1 Introduction -- 2 Materials and Methods -- 2.1 Analysis of the Current Situation at the UEMM -- 2.2 Proposed WSN Design -- 2.3 Statistical Method of Results -- 3 Results and Validation -- 3.1 Simulation Results -- 3.2 Statistical Analysis of Data Exported by the OPNET Simulator -- 3.3 Validation by Normality Testing -- 4 Conclusions -- References -- Drinking Water and Sewerage at the Universidad de las Fuerzas Armadas ESPE and Implementation of an Internet of Things Flowmeter -- 1 Introduction -- 1.1 University of the Armed Forces -- 1.2 Drinking-Water and Sewerage -- 1.3 Flowmeter IoT -- 1.4 Flowmeter IoT Data Analysis with Recurrence Maps -- 2 Methodology -- 2.1 Study Zone -- 2.2 Implementation of the IoT Flowmeter -- 2.3 Data Processing -- 3 Results and Discussions -- 3.1 Drinking Water, Pressures, and Sewerage with Problems Encountered -- 3.2 Measurement of the Population of the Universidad de las Fuerzas Armadas ESPE -- 3.3 Implementation of IoT Flowmeter -- 3.4 Determination of the Drinking Water Supply at the University -- 4 Conclusions -- References -- Indicators to Evaluate Elements of Industry 5.0 in the Textile Production of MSMEs -- 1 Introduction -- 2 Related Research -- 3 Methodology -- 4 Results and Discussion -- 4.1 Results of the Systematic Literature Review -- 4.2 Analysis and Selection of Indicators -- 5 Conclusions -- Appendix A - List of References Considered in the SLR -- Appendix B - Set of Indicators and Sheets -- References -- Technological Accessibility and Digital Health Education Associated with the Use of Smart Healthcare by Obstetricians in Peru -- 1 Introduction.
2 Methodology -- 2.1 Research Design and Population Under Study -- 2.2 Variables -- 2.3 Data Collection Procedure -- 2.4 Statistical Analysis -- 2.5 Ethical Considerations -- 3 Results -- 4 Discussion -- 5 Conclusions and Future Steps -- 5.1 Conclusions -- 5.2 Future Steps -- Appendix -- References -- Data Science -- Adaptation of a Process Mining Methodology to Analyse Learning Strategies in a Synchronous Massive Open Online Course -- 1 Introduction -- 2 Related Work -- 2.1 Analysis of Learning Strategies in MOOCs: Methods and Techniques -- 2.2 Learning Strategies Across Contexts -- 2.3 Research Questions -- 3 Method -- 3.1 Context: MOOC and Sample -- 3.2 Procedure -- 4 Results -- 4.1 RQ1: To What Extend Can We Replicate (Partially or Totally) the Methodology Applied in the Previous Study by [18] to Extract Learners' Learning Strategies in a MOOC? -- 4.2 RQ2: How do Learners' Learning Strategies in This New Context Differ from Those from the Previous Study? -- 5 Conclusion and Discussion -- 5.1 Summary of Results -- 5.2 Implications -- 5.3 Limitations -- References -- Ecuador Agricultural Product Price Forecast: A Comparative Study of Deep Learning Models -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Cleaning -- 3.2 Data Preparation -- 3.3 Models Preparation -- 3.4 Training Models -- 3.5 Models Evaluation -- 4 Experiments -- 4.1 Materials -- 4.2 Experiment 1: Comparison Between Models -- 4.3 Experiment 2: Best Models with Different Datasets -- 4.4 Experiment 3: Hyperparameter Tuning and Optimizer -- 4.5 Experimental Setup -- 5 Results and Discussion -- 5.1 Comparison Between Models -- 5.2 Best Model with Different Datasets -- 5.3 Hyperparameter Tuning and Optimizer -- 5.4 Discussion -- 6 Conclusion -- References -- Assessing the COVID-19 Vaccination Process via Functional Data Analysis -- 1 Introduction.
1.1 Contribution and Related Work -- 2 Materials -- 2.1 Data Description -- 2.2 Handling the Missing Data -- 3 Methods: Functional Data Analysis -- 3.1 B-Spline Basis -- 3.2 Smoothing Parameter -- 3.3 Functional Principal Component Analysis (FPCA) -- 3.4 Functional Cluster Analysis -- 4 Results and Discussion -- 4.1 Data Smoothing -- 4.2 FPCA -- 4.3 FPC Scores -- 4.4 Perturbations of the Mean Function -- 4.5 Functional Clustering -- 5 Conclusions and Further Studies -- References -- A Methodology to Develop an Outdoor Activities Recommender Based on Air Pollution Variables -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Data Analysis -- 3.4 Evaluation of the Optimal Number of Clusters -- 3.5 Results -- 4 Evaluation of the Methodology -- 4.1 Objectives and Research Questions -- 4.2 Context and Survey Design -- 4.3 Results and Data Interpretation -- 5 Threats to Validity -- 6 Conclusions -- References -- Improving with Metaheuristics the Item Selection in Parallel Coordinates Plot -- 1 Introduction -- 2 Related Works -- 3 Problem Formulation -- 3.1 Visualization Issue on PCP -- 3.2 PCP Metaheuristic Solution -- 3.3 Threats to Validity -- 4 Results -- 5 Conclusions -- References -- Implementation of Clustering Techniques to Data Obtained from a Memory Match Game Oriented to the Cognitive Function of Attention -- 1 Introduction -- 2 Related Works -- 3 Application of the Methodology -- 3.1 Cluster Application -- 4 Conclusion -- References -- Q-Learning in a Multidimensional Maze Environment -- 1 Introduction -- 1.1 Q-learning -- 2 Related Work -- 3 Methodology -- 3.1 Maze Design: Environment -- 3.2 Depth-First Search (DFS) -- 3.3 How the Agent Explores and Learns -- 3.4 Implementation Details -- 4 Results -- 5 Discussion -- 6 Conclusions -- 7 Future Work -- References.
Cyberbullying Through the Lens of Data Science -- 1 Introduction -- 2 Related Work -- 3 Systematic Literature Review -- 3.1 Planning the Review -- 3.2 Conducting the Review -- 4 Conclusions -- Appendix 1 -- References -- Software Development -- Comparative Study of Image Degradation and Restoration Techniques -- 1 Introduction -- 2 Degradation Restoration Modeling -- 2.1 Degradation Functions -- 2.2 Restoration Filters -- 3 Results of Modeling -- 3.1 Dataset -- 3.2 Measuring Similarity -- 3.3 Image Degradation Results -- 3.4 Image Restoration Results -- 3.5 Evaluation Results -- 4 Conclusions -- References -- IOWA Rough-Fuzzy Support Vector Data Description -- 1 Introduction -- 2 Literature Review -- 2.1 Rough-Fuzzy Support Vector Data Description -- 2.2 Ordered Weighted Average -- 2.3 Recent Advances on SVDD -- 3 Proposed Methodology for IOWA-RFSVDD -- 4 Computational Experiments -- 5 Conclusions and Future Work -- References -- Preparation of a Social Engineering Attack, from Scratch to Compromise: A USB Dropper and Impersonation Approach -- 1 Introduction -- 1.1 Motivation -- 1.2 Goals -- 2 Background -- 2.1 Social Engineering -- 2.2 Common Attacks -- 2.3 Human Weakness Exploitation -- 2.4 Tailgating -- 2.5 Empathy -- 2.6 Attack Structure -- 2.7 USB Dropper -- 2.8 Bad USB Drive -- 2.9 Impersonation -- 2.10 Pretext -- 2.11 Persuasion -- 2.12 Social Engineering in the Enterprise -- 2.13 Awareness -- 3 Methodology -- 3.1 The Preparation -- 3.2 Tools -- 4 Results and Discussion -- References -- Information Security at Higher Education Institutions: A Systematic Literature Review -- 1 Introduction -- 2 Methodology and Tools -- 2.1 Research Questions -- 2.2 Document Search -- 2.3 Article Selection -- 2.4 Relevant Data Mining -- 3 Results -- 4 Discussion -- 5 Conclusions -- References -- Author Index.
Record Nr. UNINA-9910616393003321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui