top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data-Centric Business and Applications : Towards Software Development (Volume 4) / / edited by Aneta Poniszewska-Marańda, Natalia Kryvinska, Stanisław Jarząbek, Lech Madeyski
Data-Centric Business and Applications : Towards Software Development (Volume 4) / / edited by Aneta Poniszewska-Marańda, Natalia Kryvinska, Stanisław Jarząbek, Lech Madeyski
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (270 pages)
Disciplina 658
658.4038
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Engineering—Data processing
Computational intelligence
Big data
Artificial intelligence
Data Engineering
Computational Intelligence
Big Data/Analytics
Artificial Intelligence
ISBN 3-030-34706-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Towards A Unified Requirements Model for Distributed High Performance Computing -- Bridging Requirements Engineering and Software Development Process -- Information Management System for an Administrative Office With RFID-Tagged Classified Documents -- Software Defect Prediction using Bad Code Smells: A Systematic Literature Review -- Software Development Artifacts in Large Agile Organizations: A Comparison Of Scaling Agile Methods -- Tabu Search Algortihm for Vehicle Routing Problem with Time Windows -- Code Smell Prediction Employing Machine Learning Meets Emerging Java Language Constructs -- Cloud Cognitive Services Based On Machine Learning Methods In Architecture Of Modern Knowledge Management Solutions -- Anti-Cheat Tool For Detecting Unauthorized User Interference In The Unity Engine Using Blockchain -- Approaches To Business Analysis in Scrum at Stepstone – Case Study -- Development Method of Innovative Projects in Higher Education Based on Traditional Software Building Process -- Light-weight Congestion Control for the DCCP: Implementation in the Linux Kernel.
Record Nr. UNINA-9910483314503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 3
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 3
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (507 pages)
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-60221-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Information and Knowledge Management -- Improving Change Management in Large Engineering Projects: A Case Study -- 1 Introduction -- 2 Literature Review -- 2.1 Engineering Change Process -- 2.2 Impacts of Change Management -- 2.3 Tools and Techniques -- 3 Research Methodology -- 4 Case Study Analysis -- 5 Proposals for Improvement -- 5.1 Review of Standard Activities in Each ECR Phase -- 5.2 Development of ECR Status Tracking -- 6 Discussion -- 7 Conclusions -- References -- MITEC Model for Talent Management to Small and Medium Enterprises Develop with  Design Science Research -- 1 Introduction -- 2 Methodology: Design Science Research -- 3 Application Design Science Research for MITEC -- 4 Design Science Research Conclusion -- 5 Conclusion and Future Work -- References -- Proposal to Improve Risk Management in New Product Development Projects in an Automotive Company -- 1 Introduction -- 2 Theoretical Background -- 2.1 Project Management -- 2.2 Risk Management -- 3 Research Methodology -- 4 Case Study -- 4.1 Current Risk Management Plan -- 4.2 Team Maturity in Risk Management -- 5 Proposal of Improvements -- 6 Conclusions and Future Research -- References -- Limitations that Hinder the Successful Application of a Knowledge Management Model in Research Centers in a Higher Education Institution -- 1 Introduction -- 2 Literature Review -- 3 Material and Methods -- 4 Results -- 5 Discussion and Analysis of Results -- 6 Conclusions -- References -- Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise -- 1 Introduction -- 2 Research Approach -- 3 Cyber Security Information Sharing -- 4 Cyber Security Exercise -- 5 Technical Implementation -- 5.1 Implemented Construction -- 5.2 Modeled Cyber Security Exercise a Real Life Test Event -- 6 Results.
6.1 Free-Form Feedback -- 6.2 Feedback Survey -- 7 Conclusion -- References -- Companies Amidst Evolving Digital Media Challenges in CSR Communication. Systematic Literature Review -- 1 Introduction -- 2 Theoretical Background -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Ga-starfish: A Gamified Retrospective -- 1 Introduction -- 2 Background -- 2.1 Retrospective -- 2.2 Starfish Technique -- 2.3 Gamification -- 2.4 Social and Human Factors -- 3 Related Work -- 4 Method -- 5 Results -- 5.1 Phase A: Planning -- 5.2 Phase B: Design -- 5.3 Phase C: Pilot Test -- 5.4 Phase D: Scheduling -- 5.5 Phase E: Evaluation -- 6 Discussion -- 7 Conclusions and Future Work -- References -- The Strategy Implementation of Account-Based Marketing (ABM)-The Stratio Case -- 1 Introduction -- 2 Literature Review -- 2.1 Marketing in the Business-to-Business Marketplace -- 2.2 Relationship Marketing -- 2.3 Account-Based Marketing -- 2.4 The Sales Funnel of Traditional Marketing and Account-Based Marketing -- 2.5 Types of Account-Based Marketing -- 2.6 Benefits of the Account-Based Marketing Strategy -- 2.7 Implementation of the Account-Based Marketing Strategy -- 2.8 Measuring the Returns of the Account-Based Marketing Strategy -- 3 Methodology -- 4 Case Study-Stratio Automotive -- 4.1 Stratio Automotive in a Glance -- 4.2 Implementing the Account-Based Marketing Strategy at Stratio Automotive -- 5 Results and Discussion -- 6 Conclusion -- References -- Approach to the Consumption of Fake News. The Case of Ecuador -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Conclusions -- References -- Syntax in Emoji Sequences on Social Media Posts -- 1 Introduction -- 2 Research Methodology -- 2.1 Inclusion and Exclusion Criteria -- 2.2 Databases -- 3 Results Analysis -- 4 Conclusions and Future Work -- References.
Trends and Collaborations in Information Systems and Technologies: A Bibliometric Analysis of WorldCIST Proceedings -- 1 Introduction -- 2 Related Work -- 3 Data Collection and Processing -- 4 Findings -- 4.1 Authorship Trends -- 4.2 Thematic Analysis -- 4.3 Collaboration Patterns -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Comparative Assessment of Wrappers and Filters for Detecting Cyber Intrusions -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Experimental Design -- 4.1 Intrusion Detection Datasets -- 4.2 Proposed Method -- 5 Empirical Results and Discussion -- 5.1 Cleaning and Transforming Data -- 5.2 Comparison of Filters and Wrappers FS Techniques and the Best Combinations of FS-Classifier -- 6 Conclusion and Future Work -- References -- Multiclass Intrusion Detection in IoT Using Boosting and Feature Selection -- 1 Introduction -- 2 Related Works -- 3 Experimental Design -- 3.1 Datasets Description -- 3.2 Performance Measure -- 3.3 Methodology -- 4 Results and Discussions -- 4.1 Determining the Optimal Number of Estimators for Each Boosting Technique -- 4.2 Optimal Combinations of FS and Boosting Methods Across Varied Feature Percentages -- 5 Conclusion and Future Work -- References -- Is ChatGPT Able to Generate Texts that Are Easy to Understand and Read? -- 1 Introduction -- 2 Background -- 3 Methodology -- 4 Design of the study -- 4.1 Text Comprehensibility Indicators -- 4.2 Corpus -- 5 Results -- 5.1 Word Count Analysis -- 5.2 Readability Index -- 5.3 Simple Linguistic Structures -- 6 Conclusion and Discussion -- Appendix I. Linguistic Elements Analyzed -- References -- Does a Lack of Transparency Lead to the Dark Side of Social Media? a Study in South Western Europe According to Gender and Age -- 1 Introduction -- 2 Literature Review -- 2.1 Beauty Standards -- 2.2 Beauty Standards Over Time.
2.3 Globalization of Beauty Standards -- 3 Social Media and Young People's Body Image -- 3.1 Negative Strategies Adopted by Social Media to Exploit Personal Insecurities -- 4 Methodology -- 5 Results and Discussion -- 6 Chi-Square Tests -- 6.1 Conclusions Regarding Fisher's Exact Test and the Chi-Square Test -- 7 Conclusion and Future Research -- References -- Analysis of the Impact of Orthogonality in the Readability of the OBO Foundry Ontologies -- 1 Introduction -- 2 Materials and Methods -- 2.1 Human Readability Properties in OWL Ontologies -- 2.2 The Orthogonal View of the OBO Foundry Repository -- 2.3 The Reuse-Based Readability Metrics -- 3 Results and Discussion -- 3.1 Experimental Setup -- 3.2 Comparison by Number of Entities -- 3.3 Analysis of Human Readability -- 4 Conclusions -- References -- Do Habit and Privacy Matter in a Post Pandemic-Era? Mobile Apps Acceptance of the Private Healthcare Sector in Portugal -- 1 Introduction -- 2 Conceptual Model -- 3 Methodology -- 4 Results -- 4.1 Measurement Model Evaluation -- 4.2 Structural Model -- 5 Conclusion -- References -- The Role of Online Product Information in Enabling Electronic Retail/E-tailing -- 1 Introduction -- 2 Literature Review -- 2.1 Product Information and Information Availability -- 2.2 Information Search -- 2.3 Conceptual Framework -- 3 Methodology -- 4 Data and Analysis -- 4.1 Results -- 4.2 Discussion -- 4.3 Main Contributions -- 5 Conclusion -- References -- Habitat Suitability Assessment of Three Passerine Birds Using Ensemble Learning with Diverse Models -- 1 Introduction -- 2 Material and Methods -- 2.1 Birds' Dataset -- 2.2 Environmental Data -- 2.3 Experiment Workflow -- 3 Results and Discussions -- 3.1 Evaluation of the Eight Single Machine Learning Techniques -- 3.2 Evaluation of the Heterogeneous Ensembles Compared to Their Single Models.
4 Conclusion and Future Works -- References -- Budgeted Recommendation with Delayed Feedback -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Algorithm Design -- 4.1 Search for Top Responsive Arms -- 4.2 Resource Allocation with Delays -- 5 Experiments -- 6 Conclusion -- References -- AI in Higher Education: Assessing Acceptance, Learning Enhancement, and Ethical Considerations Among University Students -- 1 Introduction -- 2 Literature Review -- 2.1 Acceptance of AI in Higher Education -- 2.2 Learning Enhancement -- 2.3 Ethical Considerations -- 3 Methodology -- 4 Results and Discussion -- 4.1 Acceptance -- 4.2 Learning Enhancement -- 4.3 Ethical Considerations -- 5 Conclusion -- References -- Intellectual Capital and Information Technologies in Education: Some Insights -- 1 Introduction -- 2 Literature Review -- 3 Conclusions -- References -- Integrating an Advanced Evolutionary Intelligence System into the Internal Contracting Operations at Centro Hospitalar Universitário Lisboa Central -- 1 Introduction -- 1.1 Internal Contracting Process -- 1.2 Evolutionary Intelligence -- 2 General and Specific Objectives -- 3 Methods -- 4 Conclusion -- References -- Language Policy in the Social Media - Efforts to Revitalize Indigenous Languages in Peru -- 1 Introduction -- 2 Theoretical Foundations: Language Policy, Multilingual Ability and Language Revitalization -- 3 Language Policy in the (Social) Media -- 4 Language Revitalization -- 5 The Revitalization of Quechua in the Music and the Social Media -- 6 The Revitalization of Quechua in Academic Contexts -- 7 Aspirations to the Revitalization of Mochica -- 8 Discussion -- 9 Conclusions -- References -- A Graph-Based Approach for Searching and Visualizing of Resources and Concepts in Data Science -- 1 Introduction -- 2 Background -- 2.1 An Introduction to Knowledge Graphs.
2.2 Related Work.
Record Nr. UNINA-9910857796603321
Rocha Álvaro  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 1
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 1
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (242 pages)
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-60215-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Big Data Analytics and Applications -- An Overview on the Use of Machine Learning Algorithms for Identifying Anomalies in Industrial Valves -- 1 Introduction -- 2 Methodology for Conducting the SLR -- 3 Summary of the Findings -- 4 Deeper Analysis of the Findings -- 4.1 Datasets -- 5 Conclusions, Limitations and Future Work -- References -- Framework for Real-Time Predictive Maintenance Supported by Big Data Technologies -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 RUL Prediction -- 5 Conclusions -- References -- Emotional Evaluation of Open-Ended Responses with Transformer Models -- 1 Introduction -- 2 Related Work -- 3 Objectives -- 4 Proposed Method -- 4.1 Prompt Engineering -- 4.2 Use of GPT-3.5 -- 4.3 Use of SpaCy -- 5 Experiments and Results -- 5.1 Emotion Analysis -- 5.2 Polarity Analysis -- 6 Conclusions -- References -- Big Data Analytics in the Supply Chain: A Bibliometric Review of Scholarly Research from 2012 to 2023 -- 1 Introduction -- 2 Big Data Analytics in the Supply Chain -- 3 Methodology -- 4 Results -- 5 Discussion and Implications -- 6 Conclusions -- References -- Human-Machine Interface Based on Electromyographic (EMG) Signals Aimed at Limb Rehabilitation for Diabetic Patients -- 1 Introduction -- 2 State of Art -- 3 Justification of the Study -- 4 Materials and Methods -- 5 Results -- 6 Conclusion -- References -- Incidence Assessment of Diabetes by Delegation in the United Mexican States Applying the Multilayer Perceptron Neural Network -- 1 Introduction -- 2 Materials and Methods -- 2.1 Healthcare System -- 2.2 Use of Data with Neural Network -- 3 Results -- 4 Conclusion -- References -- Computer Networks, Mobility and Pervasive Systems.
Exploiting Physarum-Inspired Vacant Particle Transport Model to Redesign an Enterprise Network -- 1 Introduction -- 2 Background -- 3 Modeling Enterprise Network Redesign Through Vacant Particle Transportation Model -- 4 Computational Flow of the Proposed Redesign Process -- 5 Results and Discussion -- 5.1 Behavior of the Proposed Redesign Algorithm -- 6 Conclusion -- References -- Simulation of Autonomous Driving Systems for the City of Macas Using Matlab Driving Scenario Design App -- 1 Introduction -- 2 Methodology -- 3 Development -- 4 Results -- 5 Discussion -- 6 Conclusions -- References -- Efficient Implementation of a GNSS Base Station with RTK Receiver for Topography -- 1 Introduction -- 2 Materials and Methods -- 2.1 GNSS Devices -- 2.2 Programming and Configuration of Components -- 3 Results and Discussion -- 3.1 System Tests -- 3.2 Results Analysis -- 4 Conclusions -- References -- Refining Cyber Situation Awareness with Honeypots in Case of a Ransomware Attack -- 1 Introduction -- 2 Ransomware -- 2.1 Taxonomy of a Ransomware Attack -- 3 Capabilities of Honeypot Technology in Ransomware Detection -- 4 Construction -- 5 Results -- 6 Conclusion -- References -- Machine Learning for Forensic Occupancy Detection in IoT Environments -- 1 Introduction -- 2 Related Work -- 3 Study Description -- 3.1 Dataset -- 3.2 Exploratory Data Analysis -- 4 Outlier Detection and Treatment -- 4.1 Data Preprocessing -- 4.2 Data Normalization -- 4.3 Model Evaluation -- 5 Discussion of Results -- 6 Limitations -- 7 Conclusion -- References -- Advancing Cardiovascular Imaging: Deep Learning-Based Analysis of Blood Flow Displacement Vectors in Ultrasound Video Sequences -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 2.2 Methods -- 2.3 Metrics -- 3 Experiment and Results -- 3.1 Region of Interest Selection Results.
3.2 Results of the Dense Optical Flow Automatic Annotation -- 3.3 Results of the DL Blood Displacement Vectors Estimation -- 4 Conclusion -- References -- Ethics, Computers and Security -- Artificial Intelligence Cyberattacks in Red Teaming: A Scoping Review -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Attack Methods -- 3.2 Attack Targets -- 3.3 Summaries -- 4 Conclusion -- References -- Third-Party Data Leaks in the Websites of Finnish Social and Healthcare Districts -- 1 Introduction -- 2 Previous Research -- 3 Methodology and Study Setting -- 4 Results -- 5 Discussion -- 6 Conclusions -- References -- A Model for Assessing the Adherence of E-Identity Solutions to Self-Sovereign Identity -- 1 Introduction -- 2 Methodology -- 3 A Model to Assess Self-Sovereign Identity Solutions -- 4 Assessment of VIDchain -- 5 Discussion of the Results -- 6 Limitations and Conclusions -- References -- S.O.S. - My Grandparents: Using the Concepts of IoT, AI and ML for the Detection of Falls in the Elderly -- 1 Introduction -- 2 The Study of Specialized Literature -- 3 Materials and Methods -- 4 Implementation, Results and Discussions -- 5 Conclusions -- References -- Ethics and Security in the Era of Big Data: Innovative Challenges and Educational Strategies -- 1 Introduction -- 2 Background -- 2.1 The Ethical Landscape -- 2.2 Human Nature Theory in IT Education -- 2.3 Developing Capabilities for Ethical IT Practice -- 2.4 Application of Ethical Theories to Big Data Challenges -- 2.5 Curricular Innovations for Ethical Big Data Use -- 3 Methodology -- 4 Results -- 4.1 Curriculum -- 4.2 Survey Results -- 4.3 Integration of Ethical Theories and Security Practices -- 4.4 Preparedness for Future Challenges -- 5 Discussion -- 6 Conclusions -- References -- Human-Computer Interaction.
Farming and Automation. How Professional Visions Change with the Introduction of ICT in Greenhouse Cultivation -- 1 Introduction -- 2 Rationale -- 3 Related Work -- 4 Background -- 5 Theoretical Framework -- 6 The Interviews -- 6.1 Results -- 6.2 Discussion -- 7 Conclusions -- References -- Implementation Human-Computer Interaction on the Internet of Things Technologies: A Bibliometric Analysis -- 1 Introduction -- 2 Materials and Methods -- 2.1 Search Execution -- 3 Results and Discussion -- 3.1 General Information on the Domain -- 3.2 Annual Scientific Production in the Domain -- 3.3 Universities and Research Centers Are Prominent in the Domain -- 3.4 Productivity of Countries in the Domain -- 3.5 Thematic Evolution in the Domain -- 4 Conclusions -- References -- Sustainability and Usability Evaluation of E-Commerce Portals -- 1 Introduction -- 2 Materials and Methods -- 3 Results -- 4 Discussion and Conclusion -- References -- Who is Really Happier? Re-examining the Portrayal of Happiness on Social Media and the Persistence of Misperception -- 1 Introduction -- 2 Methodology -- 2.1 Participants and Procedure -- 2.2 Measures -- 3 Results -- 3.1 Descriptive Statistics -- 3.2 Correlations Amongst Self-reported Happiness, Perceived Happiness, Discrepancy of Happiness, Gender and Age -- 3.3 Gender and Age Variations in Self-reported and Perceived Happiness -- 3.4 Happiness Misperception in the Sample as a Whole -- 3.5 Happiness Misperception Across Gender Groups -- 3.6 Happiness Misperception Across Age Groups -- 3.7 Happiness Misperception Across Age and Gender -- 4 Discussion -- 5 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910857785103321
Rocha Álvaro  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 4
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 4
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (236 pages)
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-60224-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Information Technologies in Education -- Heuristics for Designing Pervasive Game Experiences in the Older Adult Population -- 1 Introduction -- 2 Background -- 2.1 Proposed Model: Pervasiveness Pyramid -- 3 Materials and Methods -- 3.1 Exploratory and Experimental Stage -- 3.2 Descriptive Stage -- 3.3 Correlational and Selection Stage -- 3.4 Specification Stage -- 4 Conclusions and Future Work -- Appendix A -- References -- Mental Stress Analysis During Visual- And Text-Based Language Learning by Measuring Heart Rate Variability -- 1 Introduction -- 2 Previous Work -- 2.1 Comparative Study of Visual- and Text-Based Language -- 2.2 Hybrid Languages -- 2.3 Gap Between Visual- and Text-Based Languages -- 2.4 Our Previous Research -- 3 Experimental Method -- 3.1 Experiment Participants -- 3.2 Web Service Used for Experiments -- 3.3 Tasks Used for Experiment -- 3.4 Equipment Used in Experiments -- 3.5 Experiment Flow -- 4 Experimental Result -- 5 Analysis -- 5.1 Test of Difference Between Group A and Group B -- 5.2 Test for Population Mean Difference -- 6 Conclusion and Future Work -- References -- The Challenges of Learning Assessment in the Age of Artificial Intelligence -- 1 Introduction -- 2 Methodology -- 3 Challenges of Learning Assessment -- 4 Conclusions -- 5 Limitations and Future Research -- References -- OqKay: A Semi-automatic System Approach to Question Extraction -- 1 Introduction -- 2 Related Works -- 3 Method -- 3.1 Proposed Process -- 3.2 "OqKay" Assessment -- 4 Results and Discussions -- 4.1 Strategies that Help Extract Issues -- 4.2 Teachers' Perceptions When Using the "OqKay" System to Extract Questions -- 5 Final Considerations -- References -- Building and Analyzing an Open Educational Resource Repository on the Inovaula Platform -- 1 Introduction.
2 Reuse of OER in Brazilian Education -- 3 Method -- 3.1 Repository Implementation -- 3.2 Resource Base Creation -- 3.3 OERR Usability Evaluation -- 4 Results -- 4.1 Concept Implementation -- 4.2 Usability Assessment -- 5 Conclusions and Future Work -- References -- L& -- D Model of Information Technology Application for Remote Teaching and Learning in Physical Education at Technical University -- 1 Introduction -- 2 Background and Related Work -- 3 Method -- 4 Results -- 4.1 Model Description -- 4.2 Approbation of the Model -- 4.3 Indicators -- 5 Discussion -- 6 Conclusions -- References -- Maximising Attendance in Higher Education: How AI and Gamification Strategies Can Boost Student Engagement and Participation -- 1 Introduction -- 2 Preliminary Literature Review -- 2.1 Gamification in Education -- 2.2 AI's Role in Revolutionizing Gamification in Education -- 3 Methodology -- 4 Discussion and Conclusion -- References -- Psychometric Properties of a Scale Designed to Assess Satisfaction and Continued Intention to Utilize E-learning Among Nutrition Sciences Students -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Discussion -- 5 Conclusion -- Annex -- Annex 1. Scale items and constructs in English (original) and Portuguese (translation). -- References -- Software Testing in Ecuadorian University Education: A Debt to the Software Industry -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Research Questions -- 3.2 Survey Design -- 3.3 Population, Sample and Data Collection -- 3.4 Threats to Validity -- 4 Execution and Results -- 4.1 General Characteristics of the Respondents -- 4.2 RQ1: How is the Current State of Knowledge Related to Software Testing in Basic and Intermediate Level University Students Who Study Careers Related to Computer Science Prior to Taking the Subject Corresponding to Software Testing?.
4.3 RQ2: Do Teachers of Subjects Related to Programming Use Theoretical and Practical Arguments During Teaching with the Use of Automated Software Testing Tools? -- 4.4 RQ3: Are Upper-Level University Students Motivated to Put Software Testing into Practice as Part of an Indispensable Culture in Software Development in the Industry? -- 5 Conclusions and Discussion -- References -- Examining the Digital Gap: Pre-service Teachers' Needs and Expectations -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Question 1 -- 3.2 Question 2 -- 4 Discussion and Implications -- 5 Limitations -- 6 Conclusion -- References -- Empowering the Teaching and Learning of Geometry in Basic Education by Combining Extended Reality and Machine Learning -- 1 Introduction -- 2 Literature Background on the Use of Extended Reality and Machine Learning on Education -- 3 Proposed Conceptual Model -- 4 Prototype Developed -- 4.1 Technologies Used -- 4.2 Features Implemented -- 4.3 Ongoing and Future Development -- 5 Conclusion -- References -- (Re)thinking Teacher Training in the Digital Age: Teacher Training Models for Online Practice -- 1 Introduction -- 2 Methodology -- 3 Teacher Training Models -- 4 Conclusions -- References -- Gender Bias in Tech - Young People's Perception of STEM in Portugal -- 1 Methodology - Systematic Literature Review -- 2 Systematic Literature Review -- 3 Data Collection and Processing -- 4 Survey Design -- 5 Survey Data -- 6 Data Preparation with Power Query and Power BI -- 7 Data Analysis -- 8 Discussion of Results -- 9 Comparing with Related Works -- 10 Conclusion -- References -- Digital Technology in Higher Education: Exponential Function Case -- 1 Introduction -- 2 The Mathematical Working Space (MWS) -- 3 The Task -- 4 Analysis of Expected Mathematical Production -- 5 Conclusions -- References.
Adapting Traditional Whiteboarding for Remote Education Using Real-Time Handwritten Content Detection System -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 3.1 Design Constraints -- 3.2 Content Detector -- 3.3 User Applications -- 4 Conclusions -- References -- Studies at a Specialized University in the Post-pandemic Period from the Students' Point of View: New Realities and Challenges -- 1 Introduction -- 2 Studies in the Post-pandemic Era -- 3 Post-pandemic Studies in Higher Education Institutions of Health Sciences -- 4 Studies at a Specialized University in the Post-pandemic Period from the Students' Point of View -- 5 Conclusions -- References -- Participating Elementary School Children in UI Design Process of Learning Environment: Case KidNet -- 1 Introduction -- 2 Related Research -- 3 Research Approach -- 3.1 Case Study Description -- 3.2 Case Study Protocol -- 3.3 Case Study Implementation -- 4 Results -- 4.1 Illustrations of UI Designs -- 4.2 Comparison of UI Designs -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Analyzing University Dropout Rates Using Bayesian Methods: A Case Study in University Level in Mexico -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dataset -- 3.2 Procedure -- 3.3 Data Processing and Transformation -- 3.4 Model to Identify School Dropout Patterns -- 3.5 School Dropout Web Platform -- 4 Results -- 5 Discussion and Conclusion -- References -- Cloud Computing Platforms to Improve Shuar Chicham Writing Skills -- 1 Introduction -- 2 Context -- 2.1 Collaborative Learning -- 2.2 E - Writing -- 2.3 Alfresco -- 2.4 Redbooth -- 3 Results -- 4 Conclusions -- References -- Beyond the Screen: Exploring Students' Views on Social Media's Impact in Education -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Rationale for Methodology Selection.
3.2 Data Collection Procedure -- 3.3 Participant Recruitment and Data Collection -- 4 Findings -- 4.1 Attention and Collaboration -- 4.2 Social Media and Collaboration for Academic Work -- 4.3 Choice of Social Media Platforms -- 5 Discussions -- 5.1 How Does the Frequency and Purpose of Social Media Use Influence Students' Academic Attention, Motivation Influenced by Self-Regulation? -- 5.2 How Does Social Media Facilitate Collaboration Among Students, Including Group Project Coordination, Knowledge Sharing, and Peer-To-Peer Learning, and How Does This Collaboration Impact Students' Academic Outcomes? -- 5.3 What Factors Influence Students' Preferences for Specific Social Media Platforms for Academic Purposes? -- 6 Conclusion -- References -- Information Technologies in Radiocommunications -- Radio Coverage Analysis for a Mobile Private Network -- 1 Introduction -- 2 Propagation Models -- 2.1 The ITU-R 1225 Propagation Model -- 2.2 The ITU-R 528-3 Propagation Model -- 2.3 The ITU-R P.2001-4 Propagation Model -- 2.4 The ITU-R 1546-6 Propagation Model -- 2.5 The ITU-R 525/526-11 Propagation Model -- 2.6 The M.2412 UMa Propagation Model -- 3 Implementation of the Private Mobile Network -- 3.1 Limitations of the Implemented MPN -- 4 Results and Analysis -- 5 Conclusion and Future Work -- References -- Tunable Reflector/Absorber Surfaces for Next Generation Wireless Communication Systems -- 1 Introduction -- 2 Switchable Reflector/Absorber Meta-surface Unit Cell -- 2.1 Unit Cell Layout and Principle of Operation -- 2.2 Unit Cell Characterization -- 3 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910857786603321
Rocha Álvaro  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 2
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 2
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (293 pages)
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-60218-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Intelligent and Decision Support Systems -- MAGNAT: Maritime Management Ensemble Learning System -- 1 Introduction -- 2 Related Work -- 3 MAGNAT -- 3.1 Principle -- 3.2 Model Architecture Design -- 3.3 Intelligent Aggregation -- 4 Performance Evaluation -- 5 Discussions -- 6 Conclusion -- References -- Stock Market Prediction: Integrating Explainable AI with Conv2D Models for Candlestick Image Analysis -- 1 Introduction -- 1.1 Objectives of the Research -- 2 Related Work -- 3 Method -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 Model Architecture -- 4.3 Explainable AI Techniques -- 4.4 Evaluation Metrics -- 4.5 Experimental Design -- 4.6 Model Training and Accuracy -- 5 Discussion -- 5.1 Explainability -- 5.2 Insights Gained -- 5.3 Limitations and Future Work -- 6 Conclusion -- References -- Resources Optimization and Value-Based Prioritization for at Risk Cultural Heritage Assets Management -- 1 Introduction -- 2 Literature Review -- 3 Optimization of the Rescue and Recovery Process for Cultural Heritage Assets -- 4 Results and Discussion -- 5 Conclusion -- References -- Expert Systems in Information Security: A Comprehensive Exploration of Awareness Strategies Against Social Engineering Attacks -- 1 Introduction -- 2 Social Engineering -- 2.1 Social Engineering Attacks -- 3 Snowball: Strategy -- 4 Results -- 4.1 Summary Introduction to Results -- 4.2 Overview of Seed Articles -- 5 Discussion -- 6 Conclusion -- 7 Recommendations for Future Research -- References -- Multi-class Model to Predict Pain on Lower Limb Intermittent Claudication Patients -- 1 Introduction -- 2 Case Study -- 2.1 Feature Extraction and Correlation -- 2.2 Pain Prediction Models -- 3 Results -- 3.1 Classification Tree Models -- 3.2 7-Nearest Neighbors Models -- 4 Discussions -- 5 Conclusions and Future Work -- References.
Collaborative Filtering Recommendation Systems Based on Deep Learning: An Experimental Study -- 1 Introduction -- 2 Deep Learning-Based Recommender System -- 2.1 Deep Learning-Based Collaborative Filtering Recommender Systems -- 2.2 Deep Learning Models -- 2.3 Challenges of Collaborative Filtering Recommender Systems Based on Deep Learning -- 3 Results -- 3.1 Experimentl Setup -- 3.2 Experimental Results -- 4 Conclusions and Future Work -- References -- Assessment of LSTM and GRU Models to Predict the Electricity Production from Biogas in a Wastewater Treatment Plant -- 1 Introduction -- 2 Material and Methods -- 3 Experiments -- 4 Results and Discussion -- 5 Conclusions -- References -- Fusing Temporal and Contextual Features for Enhanced Traffic Volume Prediction -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Data Preprocessing -- 3.3 LSTM for Traffic Data Prediction -- 3.4 LSTM and Categorical Features Integration in a Hybrid Neural Network -- 3.5 Evaluation Metrics -- 4 Experimental Results -- 4.1 Training -- 4.2 Performance Comparison for Traffic Volume Prediction -- 4.3 Feature Influence Analysis -- 5 Conclusion and Future Work -- References -- Target-vs-One and Target-vs-All Classification of Epilepsy Using Deep Learning Technique -- 1 Introduction -- 2 Epilepsy Seizure and Computational Techniques -- 2.1 Epilepsy Seizure (ES) -- 2.2 Computational Techniques to Classify the ES -- 3 Propose Framework and Evaluation Setup -- 3.1 Subject Dataset and Preprocessing -- 3.2 Model Evaluation Setup -- 3.3 TvO Strategy for ES Using Deep Learning -- 3.4 TvA Strategy for ES Using Deep Learning -- 4 Results and Discussion -- 5 Conclusion -- References -- Health Informatics -- OralDentalSoft: Open-Source Web Application for Dental Office Management -- 1 Introduction -- 2 Related Work.
3 Description of the Proposed Methodology for Open-Source Development: OSCRUM -- 4 Case Study -- 5 Case Study Results -- 6 Discussion of Results -- 7 Conclusion and Future Work -- References -- A Scoping Review of the Use of Blockchain and Machine Learning in Medical Imaging Applications -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Studies' Selection -- 3.2 Demographic Characteristics -- 3.3 Purposes of the Studies -- 3.4 Experimental Characteristics of the Studies -- 4 Discussion and Conclusion -- References -- The Role of Electronic Health Records to Identify Risk Factors for Developing Long COVID: A Scoping Review -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Studies' Selection -- 3.2 Geographical Distribution -- 3.3 Studies' Design -- 3.4 Risk Factors -- 4 Discussion -- 5 Conclusion -- References -- Machine Learning Approaches to Support Medical Imaging Diagnosis of Pancreatic Cancer - A Scoping Review -- 1 Introduction -- 2 Methods -- 2.1 Databases Search -- 2.2 Inclusion and Exclusion Criteria -- 2.3 Selection Procedures -- 2.4 Synthesis and Reporting -- 3 Results -- 3.1 Selection Process -- 3.2 Demographic Characteristics of the Included Studies -- 3.3 Experimental Characteristics of the Included Studies -- 4 Discussion -- 5 Conclusion -- References -- Virtual Reality in the Pain Management of Pediatric Burn Patients, A Scoping Review -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Selection of the Studies -- 3.2 Geographical Distribution -- 3.3 Studies' Design and Participants -- 3.4 VR Interventions -- 3.5 Clinical Outcomes -- 4 Discussion and Conclusion -- References -- Defining the "Smart Hospital": A Literature Review -- 1 Introduction -- 2 Literature Review -- 2.1 Theoretical Background -- 2.2 Smart Hospital Equipment and Systems -- 2.3 Smart Hospital Services -- 3 A Comparison of Terms -- 3.1 Agile Hospital.
3.2 Green Hospital -- 3.3 Hybrid Hospital -- 4 Conclusions and Future Thoughts -- References -- Deep Learning for Healthcare: A Web-Microservices System Ready for Chest Pathology Detection -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Front-End Development -- 3.2 Back-End Development -- 3.3 AI Model Integration and Pathology Prediction -- 4 Results -- 4.1 Performance Evaluation of the Model -- 4.2 AI Explainability Integration -- 5 Discussion -- 6 Conclusions -- 7 Future Works -- References -- Risk Factors in the Implementation of Information Systems in a Federal University Hospital -- 1 Introduction -- 2 Related Work -- 3 Theoretical Framework -- 3.1 Information Technology Risk -- 3.2 Hospital Information System -- 3.3 Implementation of the Management Application for University Hospitals - AGHU -- 3.4 Description of the Risk Factors Identified in the Literature and Presented by Santos et al. (2020) -- 4 Methodology -- 5 Results -- 5.1 Profile of Specialists by Length of Service -- 5.2 Risk Factor (FR1): Change of Environment -- 5.3 Risk Factor (FR2): Difficulty in Using the System -- 5.4 Risk Factor (FR3): Data Manipulation Failure -- 5.5 Risk Factor (FR4): Lack of Resources -- 5.6 Risk Factor (FR5): Emergence of New Requirements -- 5.7 Risk Factor (FR6): Installation Problem -- 5.8 Risk Factor (FR7): Crashing and Restart Issues -- 5.9 Risk Factor (FR8): Testers Don't Do a Good Job -- 5.10 Risk Factor (RF9): Effect on the Environment -- 5.11 Risk Factor (FR10): Too Many Software Failures -- 5.12 Risk Factor (FR11): User's Resistance to Change -- 5.13 Other Risk Factors Identified -- 5.14 Relative Frequency by Response Category -- 5.15 Degree of Agreement of Answers -- 5.16 TreeMap: Percentage of Comparison of the Risk Factors Found in the Literature in Relation to the Risk Factors Identified in the Implementation of the AGHU.
6 Conclusion -- References -- The Challenges of Blockchain in Healthcare Entrepreneurship -- 1 Introduction -- 2 Theories and Concepts -- 3 Applications of Blockchain to Entrepreneurial Health Projects -- 4 Challenges -- 5 Discussion -- 6 Conclusion and Further Research -- References -- Determinants Associated with Treatment Discontinuation in Tacna Health Network Tuberculosis Patients -- 1 Introduction -- 2 Method -- 3 Results -- 4 Discussion -- 5 Conclusions -- References -- Comprehensive Analysis of Feature Extraction Methods for Emotion Recognition on Motor Imagery from Multichannel EEG Recordings -- 1 Introduction -- 2 Related Work -- 3 Background and Theory -- 3.1 Notch Filtering -- 3.2 High-Pass Filtering -- 3.3 Down-Sampling Filter -- 3.4 CAR Montage Filter -- 3.5 Statistical Features -- 3.6 Wavelet Analysis Features -- 3.7 Higher Order Spectra Features -- 3.8 Hjorth Features -- 3.9 Fractal Dimension Features -- 3.10 GSVM Classifier -- 3.11 CART Classifier -- 4 Methodology -- 4.1 Dataset -- 4.2 Design -- 4.3 Implementation -- 5 Experiments and Results -- 5.1 Experimental Setup -- 5.2 Evaluation Metrics -- 5.3 Results -- 6 Discussion -- 7 Conclusion -- References -- Control of Respiratory Ventilators Using Boussignac Valve -- 1 Introduction -- 2 Model of Respirator-Human Interaction Using Boussignac Valve Simulator -- 2.1 Model of the Boussignac Valve and Control System -- 2.2 Compartment Model of Lung -- 2.3 System Control Based on Boussignac Valve -- 3 Conclusion -- References -- Deep Learning Brain MRI Segmentation and 3D Reconstruction: Evaluation of Hippocampal Atrophy in Mesial Temporal Lobe Epilepsy -- 1 Introduction -- 2 Subjects and MR Imagining -- 3 Proposed Approach for the 2D Image Segmentation and 3D Objects Asymmetry Analysis -- 3.1 Preprocessing and Data Augmentation -- 3.2 Post-processing.
3.3 Hippocampus Volume and Asymmetry Index Computing.
Record Nr. UNINA-9910857787303321
Rocha Álvaro  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 6
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 6
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (394 pages)
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-60328-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- 1st Workshop on Data Privacy and Protection in Modern Technologies -- GDPR-Compliant Data Breach Detection: Leveraging Semantic Web and Blockchain -- 1 Introduction -- 2 Related Work -- 3 Use Case Scenario -- 3.1 System Design and Methodology -- 4 Conclusion and Future Works -- References -- Leveraging Blockchain Technologies for Secure and Efficient Patient Data Management in Disaster Scenarios -- 1 Introduction -- 2 Our Contributions -- 3 State of the Art Related Studies -- 4 Proposed Solution -- 4.1 System Model -- 4.2 System Model Bringing Blockchain into the Use Case -- 5 Challenges (1/3) -- 5.1 Preventing the Pharmacy from Reading Patient's Sensitive Data While Preserving the Correctness of Drug Assignments: -- 5.2 Disallow the Patient to Assign Drugs -- 5.3 Design a Blockchain Based System that Can Welcome New Patients: -- 5.4 Hyperledger Fabric Network Topology and Configuration -- 5.5 Overview and Workflow of the Chaincode: -- 6 Conclusion and Future Works -- References -- Oracles in Blockchain Architectures: A Literature Review on Their Implementation in Complex Multi-organizational Processes -- 1 Introduction -- 2 Methodology -- 2.1 Systematic Review Design -- 2.2 Identification of Sources -- 3 Results -- 3.1 Types of Oracles -- 3.2 Limitations of Oracles -- 3.3 Strengths of Oracles -- 4 Discussion -- 4.1 Essential Characteristics of Blockchain Oracles for Facilitating Complex Multi-organizational Processes. -- 4.2 Impact of Oracle Characteristics on Blockchain Information Integrity. -- 4.3 Differential Oracle Characteristics: Process Type and Organization Influence. -- 4.4 Challenges and Solutions in Deploying Complex Processes in Multi-organizational Blockchain Architectures. -- 5 Conclusions -- References -- 1st Workshop on Railway Operations, Modeling and Safety.
Cost Effective Predictive Railway Track Maintenance -- 1 Introduction -- 2 Theoretical Background -- 2.1 The Effect of the Substructure on Maintenance Costs -- 3 Research and Data Model -- 3.1 Data Simulation -- 3.2 Prediction Model -- 4 Results -- 5 Discussion -- 5.1 Limitations and Future Research -- 5.2 Concluding Remarks -- References -- 3rd Workshop on Digital Marketing and Communication, Technologies, and Applications -- The Impact of Using Digital Platforms and Sharing Online Experiences on the Reputation of a Company -- 1 Introduction -- 2 Literature Review -- 3 Methodology and Data Analysis -- 4 Results -- 5 Conclusions -- References -- Activating a Brand Through Digital Marketing: The Case of 'Os Bonitos' -- 1 Introduction -- 2 Literature Review -- 2.1 Brand -- 2.2 Digital Marketing -- 2.3 Digital Brand Activation -- 3 Research Methodology -- 4 Analysis and Discussion of Results -- 5 Conclusions -- References -- Social Marketing Importance for the Sustainability of Third Sector Organizations -- 1 Introduction -- 2 Theoretical Framework -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusions -- References -- The Impact of Process Automation on Employee Performance -- 1 Introduction -- 2 Literature Review -- 2.1 Characterization of the Automotive Industry at National Level -- 2.2 Organizational Processes -- 2.3 Business Intelligence -- 2.4 Corporate Performance Management -- 3 Methodology -- 3.1 Research Objectives -- 4 Analysis and Discussion of Results -- 4.1 Characterization of the Sample -- 4.2 Descriptive Analysis of the Dimensions -- 5 Conclusions, Limitations, and Future Work -- References -- Effect of Social Media on Workplace Procrastination Among Employees in Bosnia and Herzegovina -- 1 Introduction -- 2 The Phenomenon of Procrastination and Social Media -- 3 Data and Method -- 4 Research Findings -- 5 Discussion.
6 Conclusion -- References -- Challenges of Using E-commerce in Bosnia and Herzegovina from the Perspective of Online Store Owners -- 1 Introduction -- 2 Methodology and Sample Structure -- 3 Presentation of Empirical Research Findings -- 4 Conclusion -- References -- Analyzing São Paulo's Place Branding Positioning in Promotional Videos (2017-2019) -- 1 Introduction -- 2 Methods -- 3 Promotional Video: São Paulo - Embracing Multiculturalism -- 4 Video: Embrace São Paulo -- 5 Video: How Not to Love São Paulo -- 6 Conclusions -- References -- The Influence of TikTok in Portuguese Millennials' Footwear Consumer Behaviour -- 1 Introduction -- 2 Theoretical Framework -- 2.1 The Rise and Power of TikTok -- 2.2 TikTok's Influence on Consumer Behavior -- 2.3 Millennials as Consumers -- 3 Methodology -- 3.1 Research Questions and Objectives -- 3.2 Methods, and Strategies -- 3.3 Survey -- 3.4 Focus Group -- 4 Results -- 4.1 Results from the Survey -- 5 Discussion -- 5.1 Addressing the Research Questions -- 6 Conclusions -- 7 Managerial Implications, Main Limitations, and Further Possibilities -- References -- 4th Workshop on Open Learning and Inclusive Education Through Information and Communication Technology -- Promoting Inclusion in the Brazilian Educational Scenario: Actions for Teacher Training -- 1 Introduction -- 2 Theoretical Foundations -- 2.1 Inclusion in the Brazilian Context -- 2.2 Disabilities -- 2.3 Teacher Training About Inclusion -- 2.4 Related Works -- 3 Methodology -- 4 Results About Teacher Training in the Brazilian Context -- 4.1 Actions to Promote the Inclusion of Elderly People in the Educational Context -- 4.2 Actions to Promote Knowledge About Accessibility in the Context of Higher Education -- 4.3 Actions to Promote the Inclusion of Students with Visual Impairments -- 4.4 Actions to Promote the Inclusion of Students with ASD.
4.5 Actions to Check for Signs of Neurodevelopmental Disorders in Early Childhood Children -- 5 Conclusions -- References -- 1st Workshop on Environmental Data Analytics -- Impact of Preprocessing Using Substitution on the Performance of Selected NER Models - Methodology -- 1 Introduction -- 2 Concept of Pseudo Word Substitution -- 3 Methodology -- 3.1 Data -- 3.2 Replacing Words with Pseudo Words -- 3.3 Model Training -- 3.4 Performing a Test Scenario -- 3.5 Performance Evaluation -- 3.6 Experiment Limitations -- 4 Conclusion -- References -- Correlation n-ptychs of Multidimensional Datasets -- 1 Introduction -- 2 Correlation n-ptychs Nested in Multidimensional Datasets -- 3 Pattern Recognition in Renewable Energy Dataset with the Use of Correlation n-ptychs -- 4 Conclusion -- References -- Performance Analysis of the Data Aggregation in the Oracle Database -- 1 Introduction -- 2 SQL Statement Execution -- 3 Problem -- 4 Proposed Solutions and Enhancements -- 5 Computational Study -- 6 Results and Conclusions -- References -- BipartiteJoin: Optimal Similarity Join for Fuzzy Bipartite Matching -- 1 Introduction -- 2 Related Work -- 3 Optimal Count Q-Gram Filter -- 4 Approximate Count Q-Gram Filter -- 5 Experiments -- 6 Conclusion -- References -- Scalable Similarity Joins for Fast and Accurate Record Deduplication in Big Data -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Self-Join in Similarity Space -- 4.1 Optimal Count Q-Gram Filter -- 4.2 Approximate Count Q-gram Filter -- 5 Experiments -- 6 Conclusion -- References -- Impact of Preprocessing Using Substitution on the Performance of Selected NER Models - Results -- 1 Introduction -- 2 Concept of Pseudo Word Substitution -- 3 Methodology -- 3.1 Data -- 3.2 Models Implementations -- 3.3 Replacing Words with Pseudo Words -- 3.4 Test Scenarios -- 3.5 Evaluation -- 4 Results.
5 Discussion and Conclusions -- References -- Oracle APEX as a Tool for Data Analytics -- 1 Introduction -- 2 Oracle APEX and Cloud Integration -- 2.1 Oracle APEX Overview -- 2.2 Oracle Cloud Integration -- 2.3 Oracle Autonomous Database -- 2.4 Oracle Cloud Infrastructure Services -- 3 Climate Anomaly Detection Application -- 3.1 Climate Anomaly Detection Principle -- 3.2 Receiving and Loading Climate Data -- 3.3 Showcase of Climate Anomaly Detection Application -- 4 Conclusion -- References -- Phishing Webpage Longevity -- 1 Introduction -- 2 Data Collection Approach -- 2.1 Solution for Collecting the Phishing Webpages Status -- 3 Data Preparation -- 3.1 Confirmed Phishing URLs -- 3.2 Time-Delay Impact -- 3.3 Duplicate Records Removal -- 3.4 Adjustment of Status for Small Pages -- 4 Phishing Webpages Longevity Analysis -- 4.1 Longevity During the First Ten Minutes -- 4.2 Longevity Within First Two Weeks -- 4.3 Longevity Within Months -- 4.4 Volatility of Ratio Between Active and Inactive Webpages -- 4.5 Ratio of Active Webpages by the Source Data Feed -- 4.6 Median and Mean Lifespan of Active Webpage -- 5 Summary -- References -- 1st Workshop on AI in Education -- A Conceptual Architecture for Building Intelligent Applications for Cognitive Support in Dementia Care -- 1 Introduction -- 2 Methodology -- 2.1 Dementia Overview -- 2.2 Information Systems for Mental Diseases -- 2.3 Brain and Cognitive Games -- 3 Conceptual Architecture for Cognitive Support in Dementia Care -- 3.1 Functional Requirements -- 3.2 Conceptual Architecture -- 3.3 Prototype -- 4 Conclusion -- References -- 1st Workshop on Artificial Intelligence Models and Artifacts for Business Intelligence Applications -- Improving Customer Service Through the Use of Chatbot at Enma Spa Huancayo, Peru -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion.
5 Conclusions.
Record Nr. UNINA-9910861098203321
Rocha Álvaro  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 5
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 5
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (326 pages)
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-60227-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Organizational Models and Information Systems -- Implementing Scaled Agile Framework Methodology Principles in the Quality Assurance Process -- 1 Introduction -- 2 Literature Review -- 3 Structured Methodology for Implementing SAFe Principles in QA -- 3.1 Area 1 - Team Increment -- 3.2 Area 2 - System Increment -- 3.3 Area 3 - Solution Increment -- 3.4 Area 4 - Release Increment -- 4 Implementing SAFe Principles in QA - Case Study -- 4.1 Area 1 - Team Increment -- 4.2 Area 2 - System Increment -- 4.3 Area 3 - Solution Increment -- 4.4 Area 4 - Release Increment -- 5 Discussion -- 6 Conclusion -- References -- Using Knowledge Graph and KD-Tree Random Forest for Image Retrieval -- 1 Introduction -- 2 Related Works -- 3 Proposed Theoretical -- 3.1 A KD-Tree Random Forest for Visual Relationship Classification -- 3.2 Process of Building Relationship Graph -- 3.3 Process of Building Knowledge Graph -- 4 A Model of Proposed Image Retrieval -- 5 Experiment and Evaluate Results -- 6 Conclusion and Development Orientation -- References -- Blockchain in the Portuguese Public Electronic Service -- 1 Introduction -- 2 Blockchain in Portuguese Electronic Service -- 3 Method and Strategic Areas -- 3.1 Spatial -- 3.2 Demography -- 3.3 Health -- 3.4 Water -- 3.5 Energy -- 3.6 Mobility -- 3.7 Climate and Meteorology -- 4 Discussion -- 5 Conclusion -- References -- Social Media Use: How Does Critical Consumption of News Impact Voting Persuasion in Angola? -- 1 Introduction -- 2 Political Participation -- 3 Hypotheses Development -- 3.1 Critical Consumption and News Exposure -- 3.2 News Exposure and Voting Persuasion -- 3.3 Age and Voting Persuasion -- 4 Methodology -- 5 Results -- 5.1 Multigroup Analysis -- 6 Discussion -- 7 Conclusions -- References.
Exploring the Performance of Large Language Models for Data Analysis Tasks Through the CRISP-DM Framework -- 1 Introduction -- 2 Literature Review -- 2.1 CRISP-DM -- 2.2 Large Language Models -- 3 Methodology -- 4 Results -- 4.1 Discussion -- 4.2 Main Contributions -- 5 Conclusion -- References -- An Exploratory Big Data Approach to Understanding Commitment in Projects -- 1 Introduction -- 2 Review of Literature -- 3 Research Methodology -- 4 Findings -- 5 Future Research Directions -- 6 Conclusion -- References -- Low-Cost System for Monitoring Water Quality Parameters in Lentic and Lotic Ecosystems -- 1 Introduction -- 2 State of the Art -- 3 Requirements Analysis -- 4 Implementation -- 5 Simulation and Testing -- 6 Conclusions and Future Work -- References -- A Unified Approach to Real-Time Public Transport Data Processing -- 1 Introduction -- 2 Transport Systems Structure Modeling -- 3 Proposed Solution -- 4 Results and Evaluation -- 5 Discussion -- 6 Conclusion -- References -- Proportional Integral and Derivative Auto Tuning of Industrial Controllers Using the Relay Feedback Method -- 1 Introduction -- 2 Methodology -- 2.1 Data Collection -- 2.2 Generation of the Mathematical Model of the Level Process -- 3 Analysis and Results -- 4 Conclusions -- References -- Reinforcement Learning for Process Mining: Business Process Optimization -- 1 Introduction -- 2 Data Description -- 2.1 Event Log Structure -- 2.2 Select a Bottleneck State -- 2.3 Apply the Absorption State Effect -- 2.4 Generate the Source and Target Activities from the Log Event -- 2.5 Eliminate Short-Path Cases and Calculate the Transition Probability -- 3 Methodology -- 3.1 Q-Learning Algorithm -- 3.2 Deep Q-Network Algorithm -- 4 Results -- 5 Conclusion -- References -- SAMSEF: An Agile Software Maintenance Leveraging Scrum Framework for Improved Efficiency and Effectiveness.
1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Empirical Study -- 3.2 Proposed Framework -- 3.3 Case Study -- 4 Findings -- 5 Conclusion -- References -- Software and Systems Modeling -- Distribution of Invalid Users on an SSH Server -- 1 Introduction -- 2 Theory -- 3 Methods -- 4 Dataset -- 5 Model Development -- 6 Results -- 7 Security Solution -- 8 Discussion and Conclusions -- References -- BERT Transformers Performance Comparison for Sentiment Analysis: A Case Study in Spanish -- 1 Introduction -- 1.1 General Objective -- 1.2 Specific Objectives -- 2 Background -- 2.1 Encoder -- 2.2 Decoder -- 2.3 Attention -- 2.4 BERT Versions -- 3 Related Works -- 4 Experimentation -- 5 Analysis of the Results -- 6 Conclusions -- References -- Open Software Catalogue - Supporting the Management of Research Software -- 1 Introduction -- 2 Background -- 3 Research Software -- 3.1 Issues and Problems -- 4 Overview of Existing Solutions -- 5 Open Software Catalogue -- 5.1 Solution -- 6 Conclusions -- References -- Semantic Analysis of API Blueprint and OpenAPI Specification -- 1 Introduction -- 2 Research Overview -- 2.1 Technological Background -- 2.2 Related Work -- 3 Implementation -- 3.1 Semantic Analysis -- 3.2 Mapping of apib to oas -- 4 Evaluation and Discussion -- 5 Conclusion -- References -- Classification Model for the Detection of Anxiety in University Students: A Case Study at UNMSM -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Preprocessing -- 3.3 Training -- 3.4 Hyperparameter Setting -- 4 Analysis and Interpretation of Results -- 5 Discussion -- 6 Ethical Considerations -- 7 Conclusions and Future Works -- References -- Synergizing First-Principles and Machine Learning: Predicting Steel Flatness in the Era of Digital Twins and Physics-Informed Intelligence -- 1 Introduction.
2 Basics of Strip Flatness -- 3 Digital Twin System -- 4 Flatness Prediction Algorithm -- 4.1 First Principle Models -- 4.2 Resulting Prediction Model -- 4.3 Sensitivity Analysis -- 5 Summary -- References -- Software Systems, Architectures, Applications and Tools -- Solving the Relational Data Access Problem with Data Access Services -- 1 Introduction -- 2 Data Access Services -- 2.1 Query Service -- 2.2 Command Service -- 2.3 Repository Service -- 3 Reference Engine -- 3.1 Service Builder -- 3.2 Service Engine -- 4 Complexity Scale -- 5 Complexity Test -- 5.1 Test Service -- 5.2 Test Result -- 6 Advantages -- 7 Summary -- References -- Baseline Proposal of User Experience Practices in the Software Engineering Process: Global MVM Case -- 1 Introduction -- 2 Methodology -- 3 Background -- 4 Solution -- 4.1 Diagnostic -- 4.2 Baseline Construction -- 5 Results -- 5.1 Expert Evaluation -- 5.2 Validation of UX Practices -- 6 Conclusions -- References -- Exploring the Convolutional Neural Networks Architectures for Quadcopter Crop Monitoring -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 4 Results and Findings -- 5 Conclusion -- References -- The State of Smalltalk to Java Transformation: Approaches Review -- 1 Introduction -- 2 About Languages -- 2.1 Smalltalk -- 2.2 Java -- 2.3 Language Differences -- 3 Previous Work -- 3.1 Foundations -- 3.2 Transformation via Translation -- 3.3 Alternative Solutions -- 4 Comparisons -- 5 Conclusion -- References -- A Self-adaptive HPL-Based Benchmark with Dynamic Task Parallelism for Multicore Systems -- 1 Introduction -- 2 Background -- 2.1 Linpack Benchmark -- 2.2 Eigen Library -- 3 Related Work -- 4 SA-HPL for Multicore Systems -- 5 Experiments and Evaluations -- 5.1 Baseline and Self-adaptive Scheduling -- 6 Conclusion and Future Work -- References.
Computer Systems Analysis Focused on the Detection of Violence Against Women: Challenges in Data Science -- 1 Introduction -- 1.1 Study Contribution -- 2 Materials and Methods -- 2.1 Research Questions -- 2.2 Selection Criteria -- 2.3 Inclusion Criteria -- 2.4 Exclusion Criteria -- 3 Results -- 3.1 Analysis of Relevant Findings -- 4 Discussion -- 5 Conclusions -- References -- Azure Kubernetes Services WebRouting AddOn -- 1 Introduction -- 2 Azure Kubernetes Services -- 2.1 General Kubernetes Concepts -- 2.2 Azure Kubernetes Services and NGINX Ingress Controller -- 2.3 Other Azure Concepts -- 3 Experimental Setup and Benefits -- 4 Web Application with WebRouting AddOn -- 4.1 User Experience -- 4.2 Web Application Routing Deployment -- 4.3 Grant Permission for Web Application Routing -- 4.4 Demo Start -- 5 Conclusions -- References -- Clustering and Optimization Algorithms to Enable Reliable 6G Mobile Molecular Communications -- 1 Introduction -- 2 State of the Art on Mobile Molecular Communications -- 3 Achieving Reliable Massive Mobile Molecular Communications -- 3.1 Evaluation of the Distribution and Position of Biomachines -- 3.2 Identity Management and Tracking: Reliable Communications -- 4 Experimental Validation: Simulation and Results -- 5 Conclusions and Future Works -- References -- Security Assessment of an Internet of Things Device -- 1 Introduction -- 1.1 Current Insights in Internet of Things Security -- 1.2 Paper Objectives and Structure -- 2 Vulnerability Assessment of the IoT Device -- 2.1 Research Methodology -- 2.2 Uncovering the Credentials Through a Brute-Force Attack -- 2.3 Reverse Engineering the Firmware -- 3 Automation Proof of Concept Application -- 3.1 Security Assessment Application -- 3.2 Validation of the Proposed Investigation -- 4 Conclusions -- 4.1 Paper Contributions -- 4.2 Future Directions of Development.
References.
Record Nr. UNINA-9910861095403321
Rocha Álvaro  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Integrating Research and Practice in Software Engineering / / edited by Stan Jarzabek, Aneta Poniszewska-Marańda, Lech Madeyski
Integrating Research and Practice in Software Engineering / / edited by Stan Jarzabek, Aneta Poniszewska-Marańda, Lech Madeyski
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (VIII, 258 p. 116 illus., 46 illus. in color.)
Disciplina 006.3
Collana Studies in Computational Intelligence
Soggetto topico Computational intelligence
Engineering—Data processing
Computational Intelligence
Data Engineering
ISBN 3-030-26574-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Creating evolving project data sets in software engineering -- Mining Bug Repositories for Bug Triage Automation -- Scalable and Accurate Detection of Function Clones in Software using Multithreading -- Inferring hints for defect fixing order from requirements-to-test-case mappings -- Safety and Security Integrated SIL Evaluation Using the NFR Approach -- A Software Analysis Based Vulnerability Detection System For Smart Contracts -- Securing connection and data transfer between devices and IoT cloud service -- A data-driven conceptual modeling -- On Cognitive Biases in Requirements Elicitation -- Nuts and Bolts of Extracting Variability Models from Natural Language Requirements Documents -- On Importance of Non-functional Requirements in Agile Software Projects - A Survey -- Emerging Results: Evaluation of Selected UX Techniques by Product Managers – a Preliminary Survey -- Towards a Lightweight Approach for the Evaluation of Requirements Engineering Impact on Other IT Project Areas -- From COBOL to Business Rules - Extracting Business Rules from Legacy COBOL Code -- ISO 25010 support in Test Point Analysis for testing effort estimation.-Software for integration of manufacturing resources in the hybrid cloud model for Industry 4.0 -- Integration of Senior Software Project Courses in an Undergraduate Software Engineering Program.
Record Nr. UNINA-9910483714903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui