Information and Communication Technologies [[electronic resource] ] : 11th Ecuadorian Conference, TICEC 2023, Cuenca, Ecuador, October 18–20, 2023, Proceedings / / edited by Jorge Maldonado-Mahauad, Jorge Herrera-Tapia, Jorge Luis Zambrano-Martínez, Santiago Berrezueta
| Information and Communication Technologies [[electronic resource] ] : 11th Ecuadorian Conference, TICEC 2023, Cuenca, Ecuador, October 18–20, 2023, Proceedings / / edited by Jorge Maldonado-Mahauad, Jorge Herrera-Tapia, Jorge Luis Zambrano-Martínez, Santiago Berrezueta |
| Autore | Maldonado-Mahauad Jorge |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (495 pages) |
| Disciplina | 004.6 |
| Altri autori (Persone) |
Herrera-TapiaJorge
Zambrano-MartínezJorge Luis BerrezuetaSantiago |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer networks
Data structures (Computer science) Information theory Software engineering Operating systems (Computers) Artificial intelligence Computers, Special purpose Computer Communication Networks Data Structures and Information Theory Software Engineering Operating Systems Artificial Intelligence Special Purpose and Application-Based Systems |
| ISBN | 3-031-45438-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Data Science and Machine Learning: Uncovering the Effects of the Russia-Ukraine Conflict on Cryptocurrencies: A Data-driven Analysis with Clustering and Biplot Techniques -- Human Trafficking in Social Networks: A Review of Machine Learning Techniques -- Exploring the Performance of Deep Learning in High-Energy Physics -- Human actions recognition system based on Neural Networks -- Big Data Architecture for Air Pollution Spatial Visualization: Quito, Ecuador -- The Role of Twitter in Media Coverage during Humanitarian Crises. Data mining from International News Agencies -- Applied Metaheuristics in International Trading: A Systematic Review -- Finding an Integrated Ultraviolet Radiation Index Using Fuzzy Logic Techniques -- Forecasting the Consumer Price Index of Ecuador using Classical and Advanced Time Series Models -- Forecasting PM2.5 concentrations in ambient air using a transformer based neural network -- Machine Learning Applied to the Analysis of Glacier Masses -- Profit vs Accuracy: Balancing the Impact on Users Introduced by Profit-Aware Recommender Systems -- Augmenting Data with DCGANs to Improve Skin Lesions Classification -- Unraveling the power of 4D residual blocks and transfer learning in violence detection -- ICTs and their Applications: Brainwaves communication system for people with reduced mobility and verbal impairment -- Advanced metrics to evaluate autistic children's attention and emotions from facial characteristics using a human-robot-game interface -- Performance analysis of You Only Look Once, RetinaNet, and Single Shot Detector applied to vehicle detection and counting -- Tumor kidney segmentation from CT images using residual U-net architecture -- Classification of Alzheimer disease’s Severity Using Support Vector Machine and Deep Feature Extraction of Convolutional Neural Networks: a Contrasting of Methodologies -- Creation of an alert device for early detection of epilepsy using an EEG signal power threshold -- Optimal location of the electric vehicle charging stands using multi-objective evolutionary algorithms: Cuenca city as a case study -- Detecting Parkinson’s Disease with Convolutional Neural Networks: Voice Analysis and Deep Learning -- Hyperparameter Tuning in a Dual Channel U-Net for Medical Image Segmentation -- Vitreous Hemorrhage Segmentation in Fundus Images by using an Efficient-UNet Network -- A non-invasive portable solution to estimate hemoglobin levels in the blood -- Mask R-CNN and YOLOv8 comparison to perform tomato maturity recognition task -- Software Development -- Development of a distributed hydrological model of continuous generation, in a GIS environment -- A Domain-Specific Language and Model-Based Engine for Implementing IoT Dash- board Web Applications -- Feasibility of using serious MIDI-AM videogames as resources in early childhood education -- Search and Visualization of Researcher Networks: Co-authorship in Ecuador -- Visualization Models Applied to Atmospheric Pollutants and Meteorological Variables: A Systematic Literature Review. |
| Record Nr. | UNISA-996558570703316 |
Maldonado-Mahauad Jorge
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and Communication Technologies : 11th Ecuadorian Conference, TICEC 2023, Cuenca, Ecuador, October 18–20, 2023, Proceedings / / edited by Jorge Maldonado-Mahauad, Jorge Herrera-Tapia, Jorge Luis Zambrano-Martínez, Santiago Berrezueta
| Information and Communication Technologies : 11th Ecuadorian Conference, TICEC 2023, Cuenca, Ecuador, October 18–20, 2023, Proceedings / / edited by Jorge Maldonado-Mahauad, Jorge Herrera-Tapia, Jorge Luis Zambrano-Martínez, Santiago Berrezueta |
| Autore | Maldonado-Mahauad Jorge |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (495 pages) |
| Disciplina | 004.6 |
| Altri autori (Persone) |
Herrera-TapiaJorge
Zambrano-MartínezJorge Luis BerrezuetaSantiago |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer networks
Data structures (Computer science) Information theory Software engineering Operating systems (Computers) Artificial intelligence Computers, Special purpose Computer Communication Networks Data Structures and Information Theory Software Engineering Operating Systems Artificial Intelligence Special Purpose and Application-Based Systems |
| ISBN |
9783031454387
3031454383 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Data Science and Machine Learning: Uncovering the Effects of the Russia-Ukraine Conflict on Cryptocurrencies: A Data-driven Analysis with Clustering and Biplot Techniques -- Human Trafficking in Social Networks: A Review of Machine Learning Techniques -- Exploring the Performance of Deep Learning in High-Energy Physics -- Human actions recognition system based on Neural Networks -- Big Data Architecture for Air Pollution Spatial Visualization: Quito, Ecuador -- The Role of Twitter in Media Coverage during Humanitarian Crises. Data mining from International News Agencies -- Applied Metaheuristics in International Trading: A Systematic Review -- Finding an Integrated Ultraviolet Radiation Index Using Fuzzy Logic Techniques -- Forecasting the Consumer Price Index of Ecuador using Classical and Advanced Time Series Models -- Forecasting PM2.5 concentrations in ambient air using a transformer based neural network -- Machine Learning Applied to the Analysis of Glacier Masses -- Profit vs Accuracy: Balancing the Impact on Users Introduced by Profit-Aware Recommender Systems -- Augmenting Data with DCGANs to Improve Skin Lesions Classification -- Unraveling the power of 4D residual blocks and transfer learning in violence detection -- ICTs and their Applications: Brainwaves communication system for people with reduced mobility and verbal impairment -- Advanced metrics to evaluate autistic children's attention and emotions from facial characteristics using a human-robot-game interface -- Performance analysis of You Only Look Once, RetinaNet, and Single Shot Detector applied to vehicle detection and counting -- Tumor kidney segmentation from CT images using residual U-net architecture -- Classification of Alzheimer disease’s Severity Using Support Vector Machine and Deep Feature Extraction of Convolutional Neural Networks: a Contrasting of Methodologies -- Creation of an alert device for early detection of epilepsy using an EEG signal power threshold -- Optimal location of the electric vehicle charging stands using multi-objective evolutionary algorithms: Cuenca city as a case study -- Detecting Parkinson’s Disease with Convolutional Neural Networks: Voice Analysis and Deep Learning -- Hyperparameter Tuning in a Dual Channel U-Net for Medical Image Segmentation -- Vitreous Hemorrhage Segmentation in Fundus Images by using an Efficient-UNet Network -- A non-invasive portable solution to estimate hemoglobin levels in the blood -- Mask R-CNN and YOLOv8 comparison to perform tomato maturity recognition task -- Software Development -- Development of a distributed hydrological model of continuous generation, in a GIS environment -- A Domain-Specific Language and Model-Based Engine for Implementing IoT Dash- board Web Applications -- Feasibility of using serious MIDI-AM videogames as resources in early childhood education -- Search and Visualization of Researcher Networks: Co-authorship in Ecuador -- Visualization Models Applied to Atmospheric Pollutants and Meteorological Variables: A Systematic Literature Review. |
| Record Nr. | UNINA-9910747596803321 |
Maldonado-Mahauad Jorge
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information and communication technologies : 10th Ecuadorian conference, TICEC 2022, Manta, Ecuador, October 12-14, 2022 : proceedings / / Jorge Herrera-Tapia [and three others], editors
| Information and communication technologies : 10th Ecuadorian conference, TICEC 2022, Manta, Ecuador, October 12-14, 2022 : proceedings / / Jorge Herrera-Tapia [and three others], editors |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
| Descrizione fisica | 1 online resource (320 pages) |
| Disciplina | 006.3 |
| Collana | Communications in computer and information science |
| Soggetto topico | Computational intelligence |
| ISBN | 3-031-18272-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- ICT's Applications -- An Online BCI System Based in SSVEPs to Control IoT Devices -- 1 Introduction -- 2 State of Art -- 3 Methodology -- 4 Development of the Solution -- 4.1 First Increment -- 4.2 Second Increment -- 4.3 Third Increment -- 4.4 Fourth Increment -- 4.5 Test of the Integrated Prototype -- 5 Results and Discussion -- 5.1 Results -- 5.2 Discussion -- 6 Conclusions -- References -- Collision Avoidance Simulation Using Voronoi Diagrams in a Centralized System of Holonomic Multi-agents -- 1 Introduction -- 2 Related Work -- 2.1 Collision Avoidance -- 2.2 Voronoi Diagrams -- 2.3 Multi-agent Navigation -- 3 Methodology -- 3.1 Model Proposal -- 3.2 Two-Dimensional Environment -- 3.3 Heuristics to Deal with Deadlock -- 3.4 QP-Based Receding Horizons Control Algorithm -- 3.5 Analytical Geometrical Algorithm -- 3.6 Optimal Reciprocal Collision Avoidance Algorithm -- 3.7 Analysis Method -- 4 Results and Discussion -- 4.1 Construction of Voronoi Diagram -- 4.2 Deadlock -- 4.3 Evaluation of Algorithms -- 4.4 Implementation -- 5 Conclusions -- 5.1 Future Work -- References -- Intelligent Electromyograph for Early Detection of Myopathy and Neuropathy Using EMG Signals and Neural Network Model -- 1 Introduction -- 2 Materials and Methods -- 2.1 Obtaining and Process Signal -- 2.2 Database Creation -- 2.3 Develop the Predictive Model -- 2.4 Prediction of Health Status -- 3 Results -- 3.1 Obtaining and Process Signal -- 3.2 Neural Network -- 3.3 Web Application -- 4 Discussion -- 5 Conclusion -- References -- Underwater Wireless Sensor Networks and Cryptographic Applications -- 1 Introduction -- 2 Underwater Wireless Sensor Networks -- 2.1 Problems Related to UWSNs -- 3 Motivations -- 4 Challenges Related to Cryptographic Security -- 4.1 Security Attacks on UWSNs.
4.2 Problems of Cryptographic Primitives -- 4.3 Cryptographic Algorithms Applied to Secure Protocols -- 4.4 Discussion -- 5 Conclusions -- References -- Design of a Sensor Network for Drinking Water Control in the Maria of Merced Educational Unit -- 1 Introduction -- 2 Materials and Methods -- 2.1 Analysis of the Current Situation at the UEMM -- 2.2 Proposed WSN Design -- 2.3 Statistical Method of Results -- 3 Results and Validation -- 3.1 Simulation Results -- 3.2 Statistical Analysis of Data Exported by the OPNET Simulator -- 3.3 Validation by Normality Testing -- 4 Conclusions -- References -- Drinking Water and Sewerage at the Universidad de las Fuerzas Armadas ESPE and Implementation of an Internet of Things Flowmeter -- 1 Introduction -- 1.1 University of the Armed Forces -- 1.2 Drinking-Water and Sewerage -- 1.3 Flowmeter IoT -- 1.4 Flowmeter IoT Data Analysis with Recurrence Maps -- 2 Methodology -- 2.1 Study Zone -- 2.2 Implementation of the IoT Flowmeter -- 2.3 Data Processing -- 3 Results and Discussions -- 3.1 Drinking Water, Pressures, and Sewerage with Problems Encountered -- 3.2 Measurement of the Population of the Universidad de las Fuerzas Armadas ESPE -- 3.3 Implementation of IoT Flowmeter -- 3.4 Determination of the Drinking Water Supply at the University -- 4 Conclusions -- References -- Indicators to Evaluate Elements of Industry 5.0 in the Textile Production of MSMEs -- 1 Introduction -- 2 Related Research -- 3 Methodology -- 4 Results and Discussion -- 4.1 Results of the Systematic Literature Review -- 4.2 Analysis and Selection of Indicators -- 5 Conclusions -- Appendix A - List of References Considered in the SLR -- Appendix B - Set of Indicators and Sheets -- References -- Technological Accessibility and Digital Health Education Associated with the Use of Smart Healthcare by Obstetricians in Peru -- 1 Introduction. 2 Methodology -- 2.1 Research Design and Population Under Study -- 2.2 Variables -- 2.3 Data Collection Procedure -- 2.4 Statistical Analysis -- 2.5 Ethical Considerations -- 3 Results -- 4 Discussion -- 5 Conclusions and Future Steps -- 5.1 Conclusions -- 5.2 Future Steps -- Appendix -- References -- Data Science -- Adaptation of a Process Mining Methodology to Analyse Learning Strategies in a Synchronous Massive Open Online Course -- 1 Introduction -- 2 Related Work -- 2.1 Analysis of Learning Strategies in MOOCs: Methods and Techniques -- 2.2 Learning Strategies Across Contexts -- 2.3 Research Questions -- 3 Method -- 3.1 Context: MOOC and Sample -- 3.2 Procedure -- 4 Results -- 4.1 RQ1: To What Extend Can We Replicate (Partially or Totally) the Methodology Applied in the Previous Study by [18] to Extract Learners' Learning Strategies in a MOOC? -- 4.2 RQ2: How do Learners' Learning Strategies in This New Context Differ from Those from the Previous Study? -- 5 Conclusion and Discussion -- 5.1 Summary of Results -- 5.2 Implications -- 5.3 Limitations -- References -- Ecuador Agricultural Product Price Forecast: A Comparative Study of Deep Learning Models -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Cleaning -- 3.2 Data Preparation -- 3.3 Models Preparation -- 3.4 Training Models -- 3.5 Models Evaluation -- 4 Experiments -- 4.1 Materials -- 4.2 Experiment 1: Comparison Between Models -- 4.3 Experiment 2: Best Models with Different Datasets -- 4.4 Experiment 3: Hyperparameter Tuning and Optimizer -- 4.5 Experimental Setup -- 5 Results and Discussion -- 5.1 Comparison Between Models -- 5.2 Best Model with Different Datasets -- 5.3 Hyperparameter Tuning and Optimizer -- 5.4 Discussion -- 6 Conclusion -- References -- Assessing the COVID-19 Vaccination Process via Functional Data Analysis -- 1 Introduction. 1.1 Contribution and Related Work -- 2 Materials -- 2.1 Data Description -- 2.2 Handling the Missing Data -- 3 Methods: Functional Data Analysis -- 3.1 B-Spline Basis -- 3.2 Smoothing Parameter -- 3.3 Functional Principal Component Analysis (FPCA) -- 3.4 Functional Cluster Analysis -- 4 Results and Discussion -- 4.1 Data Smoothing -- 4.2 FPCA -- 4.3 FPC Scores -- 4.4 Perturbations of the Mean Function -- 4.5 Functional Clustering -- 5 Conclusions and Further Studies -- References -- A Methodology to Develop an Outdoor Activities Recommender Based on Air Pollution Variables -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Data Analysis -- 3.4 Evaluation of the Optimal Number of Clusters -- 3.5 Results -- 4 Evaluation of the Methodology -- 4.1 Objectives and Research Questions -- 4.2 Context and Survey Design -- 4.3 Results and Data Interpretation -- 5 Threats to Validity -- 6 Conclusions -- References -- Improving with Metaheuristics the Item Selection in Parallel Coordinates Plot -- 1 Introduction -- 2 Related Works -- 3 Problem Formulation -- 3.1 Visualization Issue on PCP -- 3.2 PCP Metaheuristic Solution -- 3.3 Threats to Validity -- 4 Results -- 5 Conclusions -- References -- Implementation of Clustering Techniques to Data Obtained from a Memory Match Game Oriented to the Cognitive Function of Attention -- 1 Introduction -- 2 Related Works -- 3 Application of the Methodology -- 3.1 Cluster Application -- 4 Conclusion -- References -- Q-Learning in a Multidimensional Maze Environment -- 1 Introduction -- 1.1 Q-learning -- 2 Related Work -- 3 Methodology -- 3.1 Maze Design: Environment -- 3.2 Depth-First Search (DFS) -- 3.3 How the Agent Explores and Learns -- 3.4 Implementation Details -- 4 Results -- 5 Discussion -- 6 Conclusions -- 7 Future Work -- References. Cyberbullying Through the Lens of Data Science -- 1 Introduction -- 2 Related Work -- 3 Systematic Literature Review -- 3.1 Planning the Review -- 3.2 Conducting the Review -- 4 Conclusions -- Appendix 1 -- References -- Software Development -- Comparative Study of Image Degradation and Restoration Techniques -- 1 Introduction -- 2 Degradation Restoration Modeling -- 2.1 Degradation Functions -- 2.2 Restoration Filters -- 3 Results of Modeling -- 3.1 Dataset -- 3.2 Measuring Similarity -- 3.3 Image Degradation Results -- 3.4 Image Restoration Results -- 3.5 Evaluation Results -- 4 Conclusions -- References -- IOWA Rough-Fuzzy Support Vector Data Description -- 1 Introduction -- 2 Literature Review -- 2.1 Rough-Fuzzy Support Vector Data Description -- 2.2 Ordered Weighted Average -- 2.3 Recent Advances on SVDD -- 3 Proposed Methodology for IOWA-RFSVDD -- 4 Computational Experiments -- 5 Conclusions and Future Work -- References -- Preparation of a Social Engineering Attack, from Scratch to Compromise: A USB Dropper and Impersonation Approach -- 1 Introduction -- 1.1 Motivation -- 1.2 Goals -- 2 Background -- 2.1 Social Engineering -- 2.2 Common Attacks -- 2.3 Human Weakness Exploitation -- 2.4 Tailgating -- 2.5 Empathy -- 2.6 Attack Structure -- 2.7 USB Dropper -- 2.8 Bad USB Drive -- 2.9 Impersonation -- 2.10 Pretext -- 2.11 Persuasion -- 2.12 Social Engineering in the Enterprise -- 2.13 Awareness -- 3 Methodology -- 3.1 The Preparation -- 3.2 Tools -- 4 Results and Discussion -- References -- Information Security at Higher Education Institutions: A Systematic Literature Review -- 1 Introduction -- 2 Methodology and Tools -- 2.1 Research Questions -- 2.2 Document Search -- 2.3 Article Selection -- 2.4 Relevant Data Mining -- 3 Results -- 4 Discussion -- 5 Conclusions -- References -- Author Index. |
| Record Nr. | UNISA-996495564503316 |
| Cham, Switzerland : , : Springer, , [2022] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and communication technologies : 10th Ecuadorian conference, TICEC 2022, Manta, Ecuador, October 12-14, 2022 : proceedings / / Jorge Herrera-Tapia [and three others], editors
| Information and communication technologies : 10th Ecuadorian conference, TICEC 2022, Manta, Ecuador, October 12-14, 2022 : proceedings / / Jorge Herrera-Tapia [and three others], editors |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
| Descrizione fisica | 1 online resource (320 pages) |
| Disciplina | 006.3 |
| Collana | Communications in computer and information science |
| Soggetto topico | Computational intelligence |
| ISBN | 3-031-18272-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- ICT's Applications -- An Online BCI System Based in SSVEPs to Control IoT Devices -- 1 Introduction -- 2 State of Art -- 3 Methodology -- 4 Development of the Solution -- 4.1 First Increment -- 4.2 Second Increment -- 4.3 Third Increment -- 4.4 Fourth Increment -- 4.5 Test of the Integrated Prototype -- 5 Results and Discussion -- 5.1 Results -- 5.2 Discussion -- 6 Conclusions -- References -- Collision Avoidance Simulation Using Voronoi Diagrams in a Centralized System of Holonomic Multi-agents -- 1 Introduction -- 2 Related Work -- 2.1 Collision Avoidance -- 2.2 Voronoi Diagrams -- 2.3 Multi-agent Navigation -- 3 Methodology -- 3.1 Model Proposal -- 3.2 Two-Dimensional Environment -- 3.3 Heuristics to Deal with Deadlock -- 3.4 QP-Based Receding Horizons Control Algorithm -- 3.5 Analytical Geometrical Algorithm -- 3.6 Optimal Reciprocal Collision Avoidance Algorithm -- 3.7 Analysis Method -- 4 Results and Discussion -- 4.1 Construction of Voronoi Diagram -- 4.2 Deadlock -- 4.3 Evaluation of Algorithms -- 4.4 Implementation -- 5 Conclusions -- 5.1 Future Work -- References -- Intelligent Electromyograph for Early Detection of Myopathy and Neuropathy Using EMG Signals and Neural Network Model -- 1 Introduction -- 2 Materials and Methods -- 2.1 Obtaining and Process Signal -- 2.2 Database Creation -- 2.3 Develop the Predictive Model -- 2.4 Prediction of Health Status -- 3 Results -- 3.1 Obtaining and Process Signal -- 3.2 Neural Network -- 3.3 Web Application -- 4 Discussion -- 5 Conclusion -- References -- Underwater Wireless Sensor Networks and Cryptographic Applications -- 1 Introduction -- 2 Underwater Wireless Sensor Networks -- 2.1 Problems Related to UWSNs -- 3 Motivations -- 4 Challenges Related to Cryptographic Security -- 4.1 Security Attacks on UWSNs.
4.2 Problems of Cryptographic Primitives -- 4.3 Cryptographic Algorithms Applied to Secure Protocols -- 4.4 Discussion -- 5 Conclusions -- References -- Design of a Sensor Network for Drinking Water Control in the Maria of Merced Educational Unit -- 1 Introduction -- 2 Materials and Methods -- 2.1 Analysis of the Current Situation at the UEMM -- 2.2 Proposed WSN Design -- 2.3 Statistical Method of Results -- 3 Results and Validation -- 3.1 Simulation Results -- 3.2 Statistical Analysis of Data Exported by the OPNET Simulator -- 3.3 Validation by Normality Testing -- 4 Conclusions -- References -- Drinking Water and Sewerage at the Universidad de las Fuerzas Armadas ESPE and Implementation of an Internet of Things Flowmeter -- 1 Introduction -- 1.1 University of the Armed Forces -- 1.2 Drinking-Water and Sewerage -- 1.3 Flowmeter IoT -- 1.4 Flowmeter IoT Data Analysis with Recurrence Maps -- 2 Methodology -- 2.1 Study Zone -- 2.2 Implementation of the IoT Flowmeter -- 2.3 Data Processing -- 3 Results and Discussions -- 3.1 Drinking Water, Pressures, and Sewerage with Problems Encountered -- 3.2 Measurement of the Population of the Universidad de las Fuerzas Armadas ESPE -- 3.3 Implementation of IoT Flowmeter -- 3.4 Determination of the Drinking Water Supply at the University -- 4 Conclusions -- References -- Indicators to Evaluate Elements of Industry 5.0 in the Textile Production of MSMEs -- 1 Introduction -- 2 Related Research -- 3 Methodology -- 4 Results and Discussion -- 4.1 Results of the Systematic Literature Review -- 4.2 Analysis and Selection of Indicators -- 5 Conclusions -- Appendix A - List of References Considered in the SLR -- Appendix B - Set of Indicators and Sheets -- References -- Technological Accessibility and Digital Health Education Associated with the Use of Smart Healthcare by Obstetricians in Peru -- 1 Introduction. 2 Methodology -- 2.1 Research Design and Population Under Study -- 2.2 Variables -- 2.3 Data Collection Procedure -- 2.4 Statistical Analysis -- 2.5 Ethical Considerations -- 3 Results -- 4 Discussion -- 5 Conclusions and Future Steps -- 5.1 Conclusions -- 5.2 Future Steps -- Appendix -- References -- Data Science -- Adaptation of a Process Mining Methodology to Analyse Learning Strategies in a Synchronous Massive Open Online Course -- 1 Introduction -- 2 Related Work -- 2.1 Analysis of Learning Strategies in MOOCs: Methods and Techniques -- 2.2 Learning Strategies Across Contexts -- 2.3 Research Questions -- 3 Method -- 3.1 Context: MOOC and Sample -- 3.2 Procedure -- 4 Results -- 4.1 RQ1: To What Extend Can We Replicate (Partially or Totally) the Methodology Applied in the Previous Study by [18] to Extract Learners' Learning Strategies in a MOOC? -- 4.2 RQ2: How do Learners' Learning Strategies in This New Context Differ from Those from the Previous Study? -- 5 Conclusion and Discussion -- 5.1 Summary of Results -- 5.2 Implications -- 5.3 Limitations -- References -- Ecuador Agricultural Product Price Forecast: A Comparative Study of Deep Learning Models -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Cleaning -- 3.2 Data Preparation -- 3.3 Models Preparation -- 3.4 Training Models -- 3.5 Models Evaluation -- 4 Experiments -- 4.1 Materials -- 4.2 Experiment 1: Comparison Between Models -- 4.3 Experiment 2: Best Models with Different Datasets -- 4.4 Experiment 3: Hyperparameter Tuning and Optimizer -- 4.5 Experimental Setup -- 5 Results and Discussion -- 5.1 Comparison Between Models -- 5.2 Best Model with Different Datasets -- 5.3 Hyperparameter Tuning and Optimizer -- 5.4 Discussion -- 6 Conclusion -- References -- Assessing the COVID-19 Vaccination Process via Functional Data Analysis -- 1 Introduction. 1.1 Contribution and Related Work -- 2 Materials -- 2.1 Data Description -- 2.2 Handling the Missing Data -- 3 Methods: Functional Data Analysis -- 3.1 B-Spline Basis -- 3.2 Smoothing Parameter -- 3.3 Functional Principal Component Analysis (FPCA) -- 3.4 Functional Cluster Analysis -- 4 Results and Discussion -- 4.1 Data Smoothing -- 4.2 FPCA -- 4.3 FPC Scores -- 4.4 Perturbations of the Mean Function -- 4.5 Functional Clustering -- 5 Conclusions and Further Studies -- References -- A Methodology to Develop an Outdoor Activities Recommender Based on Air Pollution Variables -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Data Analysis -- 3.4 Evaluation of the Optimal Number of Clusters -- 3.5 Results -- 4 Evaluation of the Methodology -- 4.1 Objectives and Research Questions -- 4.2 Context and Survey Design -- 4.3 Results and Data Interpretation -- 5 Threats to Validity -- 6 Conclusions -- References -- Improving with Metaheuristics the Item Selection in Parallel Coordinates Plot -- 1 Introduction -- 2 Related Works -- 3 Problem Formulation -- 3.1 Visualization Issue on PCP -- 3.2 PCP Metaheuristic Solution -- 3.3 Threats to Validity -- 4 Results -- 5 Conclusions -- References -- Implementation of Clustering Techniques to Data Obtained from a Memory Match Game Oriented to the Cognitive Function of Attention -- 1 Introduction -- 2 Related Works -- 3 Application of the Methodology -- 3.1 Cluster Application -- 4 Conclusion -- References -- Q-Learning in a Multidimensional Maze Environment -- 1 Introduction -- 1.1 Q-learning -- 2 Related Work -- 3 Methodology -- 3.1 Maze Design: Environment -- 3.2 Depth-First Search (DFS) -- 3.3 How the Agent Explores and Learns -- 3.4 Implementation Details -- 4 Results -- 5 Discussion -- 6 Conclusions -- 7 Future Work -- References. Cyberbullying Through the Lens of Data Science -- 1 Introduction -- 2 Related Work -- 3 Systematic Literature Review -- 3.1 Planning the Review -- 3.2 Conducting the Review -- 4 Conclusions -- Appendix 1 -- References -- Software Development -- Comparative Study of Image Degradation and Restoration Techniques -- 1 Introduction -- 2 Degradation Restoration Modeling -- 2.1 Degradation Functions -- 2.2 Restoration Filters -- 3 Results of Modeling -- 3.1 Dataset -- 3.2 Measuring Similarity -- 3.3 Image Degradation Results -- 3.4 Image Restoration Results -- 3.5 Evaluation Results -- 4 Conclusions -- References -- IOWA Rough-Fuzzy Support Vector Data Description -- 1 Introduction -- 2 Literature Review -- 2.1 Rough-Fuzzy Support Vector Data Description -- 2.2 Ordered Weighted Average -- 2.3 Recent Advances on SVDD -- 3 Proposed Methodology for IOWA-RFSVDD -- 4 Computational Experiments -- 5 Conclusions and Future Work -- References -- Preparation of a Social Engineering Attack, from Scratch to Compromise: A USB Dropper and Impersonation Approach -- 1 Introduction -- 1.1 Motivation -- 1.2 Goals -- 2 Background -- 2.1 Social Engineering -- 2.2 Common Attacks -- 2.3 Human Weakness Exploitation -- 2.4 Tailgating -- 2.5 Empathy -- 2.6 Attack Structure -- 2.7 USB Dropper -- 2.8 Bad USB Drive -- 2.9 Impersonation -- 2.10 Pretext -- 2.11 Persuasion -- 2.12 Social Engineering in the Enterprise -- 2.13 Awareness -- 3 Methodology -- 3.1 The Preparation -- 3.2 Tools -- 4 Results and Discussion -- References -- Information Security at Higher Education Institutions: A Systematic Literature Review -- 1 Introduction -- 2 Methodology and Tools -- 2.1 Research Questions -- 2.2 Document Search -- 2.3 Article Selection -- 2.4 Relevant Data Mining -- 3 Results -- 4 Discussion -- 5 Conclusions -- References -- Author Index. |
| Record Nr. | UNINA-9910616393003321 |
| Cham, Switzerland : , : Springer, , [2022] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||