top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Communication and Smart Technologies : Proceedings of ICOMTA 2021
Communication and Smart Technologies : Proceedings of ICOMTA 2021
Autore Rocha Álvaro
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (600 pages)
Altri autori (Persone) BarredoDaniel
López-LópezPaulo Carlos
Puentes-RiveraIván
Collana Smart Innovation, Systems and Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-5792-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Honorary Committee -- International Scientific Committee President -- International Organizing Committee President -- Local Organizing Committee President -- Organizing Committee -- International Scientific Committee -- Contents -- About the Editors -- Digital Communication, Systems and Processes -- Absences Predictive Model of for the Outpatient Unit in a Public Hospital -- 1 Introduction -- 2 Materials and Methods -- 2.1 Understanding the Business -- 2.2 Understanding the Data -- 2.3 Data Transformation -- 2.4 Modeling -- 2.5 Evaluation -- 3 Discussion of Results -- 4 Conclusions -- References -- Automatic Data Warehouse Generation Model from BI Requirements in Natural Language -- 1 Introduction -- 1.1 Data Quality -- 1.2 Data Integration -- 1.3 Natural Language -- 2 Scope of the Problem -- 3 Work Hypothesis -- 4 Proposed Model -- 5 Validation -- 5.1 Education Domain -- 5.2 Conclusions and Future Work -- References -- Automation of an Educational Data Mining Model Applying Interpretable Machine Learning and Auto Machine Learning -- 1 Introduction -- 2 Status of the Issue -- 3 Work Hypothesis -- 4 Proposed Model -- 5 Conclusion and Future Works -- References -- Examining the Tech Stacks of Czech and Slovak Untrustworthy Websites -- 1 Introduction -- 1.1 The Czech and Slovak Untrustworthy Website Landscape -- 2 Methods -- 3 Results -- 3.1 Top-Level Domain Names and Domain Name Registrars -- 3.2 Hosting and E-mail Providers -- 3.3 Trackers -- 4 Discussion -- References -- A Prospective Model of a Digital Epidemiological Surveillance 4.0 Based on the Peruvian Public Health System -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Model Inputs -- 3.2 Epidemiological Surveillance Process -- 3.3 Planning Phase -- 3.4 Execution Phase -- 4 Outputs (Social Impact) of the Model -- 5 Model Components -- 6 Conclusions.
References -- The Relevance of Internal Communication in Innovation Processes: The Bosch Case Study -- 1 Introduction -- 2 Communicating for Innovation -- 3 Action Research in an Industrial Company -- 4 Results and Discussion -- 4.1 Understanding Communication in Project Management Environment -- 4.2 Communication Flows and Interaction Difficulties -- 4.3 Communication Channels: The Dispersion and Replication of Information -- 4.4 Expectations Regarding the Development of a New Communication System -- 5 Conclusions -- References -- Model Maturity to Determine Student Profile During COVID-19 Pandemic at Public University -- 1 Introduction -- 2 State of Art -- 3 Proposal -- 3.1 Phase 1: Characterize the Student -- 3.2 Phase 2: Define the Student's Profile -- 3.3 Phase 3: Establish Change Strategies -- 4 Validation -- 4.1 Phase 1: Characterize the Student -- 4.2 Phase 2: Define the Student's Profile -- 4.3 Phase 3: Establishing Change Strategies -- 5 Conclusions -- References -- Political Communication, Technology and Applications -- Social Media and Online Political Activism in Protest Communication Strategies: Friends or Foes? -- 1 Introduction: Political Activism, Communication and Democracy in the Context of Social Media -- 2 Social Media as an Opportunity for Online Political Activism -- 2.1 The Self-mediation of Protest -- 2.2 The Civic Monitoring of Power Centres -- 2.3 New Opportunities in Shaping the Public Agenda -- 3 Social Media as an Obstacle to Online Political Activism -- 3.1 Difficulties in Capturing the Interest of Mainstream Media -- 3.2 The Structural Dependence on Commercial Social Media -- 4 Conclusions -- References -- When Memes Become a Serious Business: Memetics as a Political Communication Strategy in the United States and Ecuador -- 1 Introduction -- 2 The Globalization of Memetics -- 2.1 Memetics and Politics.
2.2 Ecuador and United States: Globalized Humor and Politics -- 3 Methodology -- 3.1 Units of Analysis -- 4 Results -- 4.1 Making Fun: When the Powerful are Silenced -- 4.2 Mocking and Flaming: When Freedom of Expression Finds Limitations -- 5 Discussion -- 6 Conclusions -- References -- Realities and Challenges of a Democracy in Crisis. Impact of Disinformation and Populism on the Media System -- 1 Democracy at Stake: Political Leadership and the State of the Public Sphere -- 2 Populism and Fake News: Looking for Roots -- 3 Fact-Checking for Social Media Platforms -- References -- LatamCovidNewsCheck. Meta-classification of Fact Checking Platforms in Latin America During the Covid-19 Pandemic -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Formal Aspects of News Verification Agencies -- 3.2 Categorization of News About Covid-19. LatamCovidNewsCheck -- 4 Conclusions -- References -- The Media and the Spanish Monarchy: The Mediating Role of Ideology -- 1 Introduction: The Media and Selective Perception -- 2 Monarchy: Trust, Ideology and Selective Perception -- 3 Objectives, Hypotheses, Method and Variables -- 4 News Monitoring and the Impact of Scandal on the Perception of the Spanish Monarchy -- 5 Conclusions -- References -- Post-feminism and Post-truth in Reggaeton Video Clips on Youtube -- 1 Introduction -- 1.1 Normalized Machismo in Reggaeton Music Videos -- 1.2 New Feminist Proposals in the Reggaeton Industry -- 2 Methodology -- 2.1 Ethical Considerations -- 3 Results and Discussion -- 3.1 Sexual Agency in the Female Empowerment Narrative -- 3.2 Female Empowerment from the Art Direction -- 4 Conclusions -- References -- Twitter and Politics: An Analysis of the Account of Former Peruvian President @MartinVizcarraC Before and During the Pandemic -- 1 Introduction and Literature Review -- 2 Material and Methodology -- 3 Analysis of Results.
4 Conclusions -- References -- Framing and Immigration: New Frames in Media and Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Framing Theory -- 2.2 Agenda-Setting Theory -- 2.3 Stereotypes and Prejudices of the Immigrant Population in Spain -- 3 Research Method -- 4 Results -- 5 Discussion and Conclusion -- References -- Posting to Belong: Instagram Features Enhance Marketed Goods Used as Conduits to Leverage Group Affiliation -- 1 Introduction -- 2 Literature Background -- 2.1 The Need to Belong to a Group -- 2.2 Belonging-Oriented Consumption and Belonging Conduits -- 2.3 Instagram and the Search for Belonging -- 3 Methods -- 3.1 Sample -- 3.2 Data Collection -- 3.3 Analysis Procedure -- 4 Results -- 4.1 Theme 1: Use of Resources Traded in the Market -- 4.2 Theme 2: Instagram Extends the Belonging Conduit -- 4.3 Theme 3: Music Amplifies the Belonging Conduit -- 5 Discussion -- References -- Is Facebook a Tool to Achieve True Friendship? A Study from an Ascetic Perspective -- 1 Introduction -- 2 Literature Review -- 3 Results -- 3.1 Fellowship -- 3.2 Camaraderie -- 3.3 Sympathy -- 4 Conclusions -- References -- Fact-Checking on COVID-19 After a Year of Global Infodemic. Analysis of Digital Misinformation in Spain, Portugal and Latin America -- 1 Introduction -- 1.1 Fact-Checking as a Reaction to Information Disorders -- 1.2 Fact-Checkers in a Global Infodemic Scenario -- 2 Method -- 3 Results -- 3.1 Characteristics of the Fact-Checked Misinformation -- 3.2 International Circulation of the Information that Was Fact-Checked -- 3.3 Correlation Between Web Search Queries and Publication of Fact-Checks -- 4 Discussion and Conclusions -- References -- Post-truth of Female Empowerment in the Fake News of Peruvian Reality Shows -- 1 Introduction -- 1.1 The Peruvian Media Ecosystem and Women Sexualized Representation -- 2 Methodology.
2.1 Ethical Considerations -- 3 Results and Discussion -- 3.1 The Use of Fake News with a Level of Facticity -- 3.2 Post-truth of Female Empowerment -- 4 Conclusions -- References -- YouTuber and Instagrammer Phenomenon in the Andean Community -- 1 Introduction -- 1.1 Social Media in the Andean Community -- 1.2 Phenomenal YouTuber and Instagrammer -- 2 Design and Materials -- 3 Results -- 3.1 Influencer Profile and Language -- 4 By Way of Conclusion -- References -- Intellectual Disability in Media and Political Agendas and Its Status as a Social Minority -- 1 Introduction -- 2 The Social Issues of Intellectual Disability -- 3 The Agendas' Role -- 3.1 The Media Agenda: A Social Role for Intellectual Disability -- 3.2 The Political Agenda: A Public Role for Intellectual Disability -- 4 Objectives and Methodology -- 5 Results -- 5.1 The Political Agenda -- 5.2 The Media Agenda -- 6 Discussion and Conclusions -- References -- The Emotions of the Outbreak. Topics, Sentiments and Politics on Twitter During Chilean October -- 1 Introduction -- 1.1 Social Context -- 2 Review of Literature -- 2.1 Twitter, Emotions and Protest Mobilization -- 3 Methodology -- 3.1 Techniques of Analyses -- 3.2 Sample, Textual Corpus -- 4 Results -- 4.1 Topic Modeling Analysis -- 4.2 Sentiment Analysis -- 4.3 Discussion -- 5 Conclusions -- References -- Use of Technological Means and Personal Data in Electoral Activities: Persuasive Voters -- 1 Introduction -- 2 Use of Technological Means and Personal Data in Electoral Activities: Persuadable Voters -- 3 Other Conclusions -- References -- Political Communication in Europe. The Role of the Lobby and Its Communication Strategies -- 1 Lobby and Political Communication -- 2 Strategies of Lobbies in European Union -- 3 Communication in the Commission and Parliament -- 4 Conclusion -- References.
Institutional Advertising in the Face of COVID-19 Hoaxes: Strategies, Messages and Narratives in the Spanish Case.
Altri titoli varianti Communication and Smart Technologies
Record Nr. UNINA-9910502654403321
Rocha Álvaro  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication, Smart Technologies and Innovation for Society : Proceedings of CITIS 2021
Communication, Smart Technologies and Innovation for Society : Proceedings of CITIS 2021
Autore Rocha Álvaro
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (765 pages)
Altri autori (Persone) López-LópezPaulo Carlos
Salgado-GuerreroJuan Pablo
Collana Smart Innovation, Systems and Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-4126-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Communication, Smart Technologies and Innovation for Society
Record Nr. UNINA-9910502612903321
Rocha Álvaro  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Developments and Advances in Defense and Security : Proceedings of MICRADS 2021
Developments and Advances in Defense and Security : Proceedings of MICRADS 2021
Autore Rocha Álvaro
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (521 pages)
Disciplina 355.03
Altri autori (Persone) Fajardo-ToroCarlos Hernan
RodríguezJosé María Riola
Collana Smart Innovation, Systems and Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-4884-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Part I Cybersecurity and Cyberdefense -- 1 An Analysis of Cyber Espionage Process -- 1.1 Introduction -- 1.2 Cyber Espionage -- 1.2.1 The Role of Malware in Cyber Espionage -- 1.3 General Process of Cyber Espionage -- 1.4 Discussion -- 1.5 Conclusions -- References -- 2 Portuguese Concerns and Impact on Behaviour About Cybersecurity: A Comparison with the European Average -- 2.1 Introduction -- 2.2 Cybersecurity Study in Europe -- 2.2.1 Europeans' Concerns About Cybersecurity -- 2.2.2 Impact on Behaviour -- 2.2.3 Impact on the Security of Online Accounts -- 2.2.4 Attitudes to Cybersecurity -- 2.3 Discussion -- 2.4 Conclusion -- References -- 3 Impact of Social Engineering Attacks: A Literature Review -- 3.1 Introduction -- 3.2 Methods -- 3.2.1 Research Questions -- 3.2.2 The Inclusion and Exclusion Criteria -- 3.2.3 Search Process -- 3.2.4 Analysis of Primary Studies -- 3.3 Results -- 3.4 Discussion -- 3.5 Conclusions -- References -- 4 Maritime Cyberdefense Actors Taxonomy for Command and Control -- 4.1 Introduction -- 4.2 Methodology -- 4.3 Maritime Cyberdefense Key Actors -- 4.4 Cyberdefense Capabilities -- 4.5 Cyberdefense Strategic Attitude -- 4.6 Complementary Classifications -- 4.7 Results -- 4.8 Conclusions -- References -- 5 Enabling Sustainable Management Through Kalman Filtering in glossaLAB: A Case Study on Cyber-Subsidiarity -- 5.1 Introduction: Lights and Shadows of Information Prosperity -- 5.2 An Alternative Architecture for the Digital World Based on Network Structural Properties -- 5.2.1 The Viable System Model as a Paradigm of Sustainability -- 5.3 Cyber-subsidiarity Model Applied to Interdisciplinary Knowledge Co-creation: Leveraging Transdisciplinarity -- 5.3.1 glossaLAB Project -- 5.3.2 Information Management for Sustainability and Autonomy.
5.3.3 Information Filtering Across Organization Levels -- References -- 6 Digital Transformation Impact in Security and Privacy -- 6.1 Introduction -- 6.2 Digital Transformation in Security and Privacy. Problem Statement -- 6.3 Research Analysis -- 6.4 General Findings -- 6.4.1 Strength Identification Relative to Disruption -- 6.4.2 Weakness Identification Relative to Disruption -- 6.4.3 Why Is This an Opportunity? -- 6.4.4 Why Is It a Threat? -- 6.4.5 How Does This Disruption Solve Privacy and Security Problems? -- 6.4.6 Further Areas of Research to Consider -- 6.5 Conclusions -- References -- 7 ISOLA: An Innovative Approach to Cyber Threat Detection in Cruise Shipping -- 7.1 Introduction -- 7.2 Cyber Risks in Cruising Ships -- 7.2.1 Cyber Risks: From Threats to Vulnerabilities and Contingency Plans -- 7.2.2 Cyber Risks at Sea -- 7.2.3 Cyber Risks on Board -- 7.3 The ISOLA Architecture -- 7.3.1 ISOLA Principles -- 7.3.2 Toward Ships Data Fusion -- 7.4 Discussion on Further Needs -- 7.5 Conclusion -- References -- 8 Analysis of the Cybersecurity in Wireless Sensor Networks (WSN): A Review Literature -- 8.1 Introduction -- 8.2 Related Work -- 8.3 Methodology -- 8.3.1 Planning the Review -- 8.3.2 Conduct of the Search -- 8.3.3 Analysis -- 8.4 Discussion and Conclusions -- References -- Part II Computer Networks, Mobility and Pervasive Systems -- 9 Green Energy for Nodes of Hybrid Fiber-Coaxial Networks in the Transmission and Distribution of Signals to the End Customer -- 9.1 Introduction -- 9.2 Materials and Methods -- 9.2.1 Importance of Quality Service -- 9.2.2 Network Integration with Service Quality in Mind -- 9.2.3 Distributed Installation Cabinets -- 9.2.4 Operating Scenarios -- 9.2.5 Hybrid System Simulations -- 9.3 Results and Discussions -- 9.4 Conclusions -- References -- Part III Analysis and Signal Processing.
10 Comparative Analysis of High Frequencies for the Broken Bar Fault Diagnosis Using MCSA and Park's Vector Demodulation -- 10.1 Introduction -- 10.2 Materials and Methods -- 10.2.1 Motor Current Signature Analysis (MCSA) -- 10.2.2 Transformation of Reference Variables to Associated Variables -- 10.2.3 Fault Caused by Broken Bars (BRB). -- 10.2.4 Implementation in Experimental Development. -- 10.3 Results and Discussion -- 10.3.1 MCSA Analysis for Broken Bar Fault -- 10.3.2 Demodulation of the Reference Signal. -- 10.4 Conclusions -- References -- Part IV Wearable Technology and Assistance Devices -- 11 Nexus of Electrospun Nanofibers and Additive Processing-Overview of Wearable Tactical Gears for CBRNE Defense -- 11.1 Introduction -- 11.2 Materials and Methods-An Overview of Electrospinning and Additive Processing -- 11.3 Characteristics of Fibers -- 11.4 Applications Space of Nanofibers in Defense and Security -- 11.4.1 Biomedical Application -- 11.4.2 Sensors-Chem.-Bio, VOCs, Explosives, and Biomarkers -- 11.4.3 Textile: Force Protection, ICT, Tactile Sensors -- 11.5 Rapid Prototyping, Conclusion, and Path Forward -- References -- Part V Simulation and Computer Vision in Military Applications -- 12 Towards Real-Time Drone Detection Using Deep Neural Networks -- 12.1 Introduction -- 12.2 Methodology -- 12.2.1 Dataset -- 12.2.2 Training -- 12.2.3 Validation -- 12.3 Hypothesis -- 12.4 Results -- 12.5 Conclusions -- References -- 13 Detection of Opencast Mining Sites from Multispectral Satellite Images -- 13.1 Introduction -- 13.1.1 Related Works -- 13.1.2 Contribution -- 13.2 Methodology -- 13.2.1 Data Preparation -- 13.2.2 Support Vector Machine (SVM) for Image Segmentation -- 13.2.3 Fully Convolutional Neural Network (FCN) for Semantic Segmentation -- 13.3 Evaluation of Image Segmentation Techniques -- 13.3.1 Image Preprocessing.
13.3.2 Results of the Segmentation Process Using the SVM -- 13.3.3 Semantic Segmentation Using the FCN -- 13.4 Conclusions -- References -- 14 Impact of the Use of Simulators on Training and Specialization in the Navy -- 14.1 Introduction -- 14.2 Background -- 14.3 Simulator's Technological Environment -- 14.3.1 Simulation -- 14.3.2 Simulators Pedagogy -- 14.4 Methodology -- 14.4.1 Design -- 14.4.2 Measured Variables and Applied Instruments -- 14.4.3 Population and Sample -- 14.5 Results -- 14.6 Conclusions -- References -- 15 Comparison Between Two Novel Approaches in Automatic Breast Cancer Detection and Diagnosis and Its Contribution in Military Defense -- 15.1 Introduction -- 15.2 Materials and Methods -- 15.3 Results -- 15.4 Comparison and Discussion -- 15.5 Military Defense Contribution -- 15.6 Conclusion -- References -- Part VI Weapons and Combat Systems -- 16 Model-Driven Engineering as the Interface for Tactical Operation Order of Mixed Robot/Human Platoons -- 16.1 Introduction -- 16.2 Background -- 16.3 Vision -- 16.4 Model-Driven Engineering -- 16.5 Metamodel for Operation Order -- 16.6 Conclusion -- References -- Part VII Chemical, Biological and Nuclear Defense -- 17 Decontamination of Seawater in a Harbor: Case Study of Potential Bioterrorism Attack -- 17.1 Introduction -- 17.2 Ballast Water-Source of Bacteriological Seawater Pollution -- 17.3 Proposed Methods for Decontamination of Seawater in a Harbor -- 17.3.1 Prevention of Bioaerosol Formation from Seawater Using MICP -- 17.3.2 Prevention of Bioaerosol Formation from Seawater Using Aerobic Oxidation of Salts of Calcium or Iron with Long-Chain Organic Acids -- 17.4 Conclusion and Discussion -- References -- 18 Trace Detection of C-4 on Aluminum Using Mid-Infrared Reflection-Absorption Quantum Cascade Laser Spectroscopy -- 18.1 Introduction -- 18.2 Materials and Methods.
18.2.1 Reagents -- 18.2.2 Sample Preparation -- 18.2.3 Instrumentation -- 18.3 Results and Discussion -- 18.3.1 Spectral Profile -- 18.3.2 Partial Least Squares (PLS) Regression Analysis of Standards -- 18.4 Conclusion -- References -- 19 Nanomaterials, Energy Devices and Defense: Metal Oxides and Supercapacitors -- 19.1 Introductions -- 19.1.1 Defense and Nanotechnology -- 19.1.2 Nanomaterials and Devices -- 19.2 Supercapacitors -- 19.2.1 Supercapacitor Design and Components -- 19.3 Final Remarks -- References -- 20 Cellulose Acetate/ABS Blends as Insulating Phases for 3D Printing of Carbon-Based Composite Sensors -- 20.1 Introduction -- 20.2 Materials and Methods -- 20.2.1 Materials and Blends Preparation -- 20.2.2 Composite Electrodes Preparing -- 20.2.3 Characterization Details -- 20.2.4 Measurement Details -- 20.3 Results and Discussions -- 20.4 Conclusions -- References -- Part VIII Health Informatics in Military Applications -- 21 Stress Biomarkers Detection Using Non-invasive Methods for Textiles Integrated Sensors Development -- 21.1 Introduction -- 21.2 Materials and Methods -- 21.2.1 Chemicals -- 21.2.2 Sampling -- 21.2.3 LC-MS/MS -- 21.2.4 Electrochemistry -- 21.3 Results and Discussion -- 21.3.1 Blood Results -- 21.3.2 LC-MS/MS Results -- 21.3.3 Comparison Between Blood and Sweat Results -- 21.3.4 Electrochemistry Analysis -- 21.4 Conclusion -- References -- 22 Detecting Autism Spectrum Disorder Using Data Mining -- 22.1 Introduction -- 22.2 Related Work -- 22.3 Methodology -- 22.3.1 Business Understanding -- 22.3.2 Data Understanding -- 22.3.3 Data Preparation -- 22.3.4 Modeling -- 22.3.5 Evaluation -- 22.4 Results and Discussion -- 22.5 Conclusions -- References -- 23 Classification of Dementia in Adults -- 23.1 Introduction -- 23.2 Related Work -- 23.3 Methodology -- 23.3.1 Business Understanding -- 23.3.2 Data Understanding.
23.3.3 Data Preparation.
Record Nr. UNINA-9910508472403321
Rocha Álvaro  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 2 / / edited by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 2 / / edited by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda
Autore Rocha Álvaro
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (293 pages)
Disciplina 006.3
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering - Data processing
Application software
Computational Intelligence
Data Engineering
Computer and Information Systems Applications
ISBN 9783031602184
3031602188
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Maritime Management Ensemble Learning System -- Stock Market Prediction Integrating Explainable AI with Conv2D Models for Candlestick Image Analysis -- Resources optimization and value based prioritization for at risk cultural heritage assets management -- Expert Systems in Information Security A Comprehensive Exploration of Awareness Strategies Against Social Engineering Attacks -- Collaborative filtering recommendation systems based on deep learning An Experimental Study -- Assessment of LSTM and GRU models to predict the electricity production from biogas in a Wastewater Treatment Plant -- Fusing Temporal and Contextual Features for Enhanced Traffic Volume Prediction -- Target vs One and Target vs All classification of epilepsy using deep learning technique.
Record Nr. UNINA-9910857787303321
Rocha Álvaro  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 3 / / edited by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 3 / / edited by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda
Autore Rocha Álvaro
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (507 pages)
Disciplina 006.3
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering - Data processing
Application software
Computational Intelligence
Data Engineering
Computer and Information Systems Applications
ISBN 9783031602214
3031602218
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Improving Change Management in Large Engineering Projects A Case Study -- MITEC Model for Talent Management to Small and Medium Enterprises develop with Design Science Research -- Proposal to Improve Risk Management in New Product Development Projects in an Automotive Company -- Limitations that hinder the successful application of a knowledge management model in research centers in a higher education institution -- Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise -- Companies Amidst Evolving Digital Media Challenges in CSR Communication Systematic literature review.
Record Nr. UNINA-9910857796603321
Rocha Álvaro  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 6 / / edited by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 6 / / edited by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda
Autore Rocha Álvaro
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (394 pages)
Disciplina 006.3
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering - Data processing
Application software
Computational Intelligence
Data Engineering
Computer and Information Systems Applications
ISBN 9783031603280
3031603281
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Semantic Blockchain Data Breach Detection Model -- Leveraging Blockchain Technologies for Secure and Efficient Patient Data Management in Disaster Scenarios -- Oracles in Blockchain architectures A literature review on their implementation in complex multi organizational processes -- Cost Effective Predictive Track Maintenance -- The impact of using digital platforms and sharing online experiences on the reputation of a company -- Activating a brand through Digital Marketing the case of Os Bonitos -- Social Marketing Importance for the Sustainability of Third Sector Organizations -- The Impact of Process Automation on Employee Performance -- Effect of social media on workplace procrastination among employees in Bosnia and Herzegovina -- Challenges of using e commerce in Bosnia and Herzegovina from the perspective of online store owners.
Record Nr. UNINA-9910861098203321
Rocha Álvaro  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 5 / / edited by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 5 / / edited by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda
Autore Rocha Álvaro
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (326 pages)
Disciplina 006.3
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering - Data processing
Application software
Computational Intelligence
Data Engineering
Computer and Information Systems Applications
ISBN 9783031602276
3031602277
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementing Scaled Agile Framework Methodology Principles in the Quality Assurance Process -- Using Knowledge Graph And Kd Tree Random Forest For Image Retrieval -- Blockchain in the Portuguese public electronic service -- Social Media Use How is critical consumption of news impacting voting persuasion in Angola -- Exploring the Performance of Large Language Models for Data Analysis Tasks through the CRISP DM Framework -- Analyzing Project Managers Organizational Commitment A Big Data Approach to Understanding Managerial Engagement -- Low cost system for monitoring water quality parameters in lentic and lotic ecosystems -- A Unified Approach to Real Time Public Transport Data Processing.
Record Nr. UNINA-9910861095403321
Rocha Álvaro  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 1 / / edited by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 1 / / edited by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda
Autore Rocha Álvaro
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (242 pages)
Disciplina 006.3
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering - Data processing
Application software
Computational Intelligence
Data Engineering
Computer and Information Systems Applications
ISBN 9783031602153
3031602153
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Overview on the Use of Machine Learning Algorithms for Identifying Anomalies in Industrial Valves -- Framework for Real-time Predictive Maintenance supported by Big Data Technologies -- Emotional evaluation on open-ended responses with transformer models -- Big data analytics in the supply chain: a bibliometric review of scholarly research from 2012 to 2023 -- Human-machine interface based on electromyographic (EMG) signals aimed at limb rehabilitation for diabetic patients -- Incidence assessment of diabetes by delegation in the United Mexican States applying the multilayer perceptron neural network -- Exploiting Physarum-inspired Vacant Particle Transport Model to Redesign an Enterprise Network -- SIMULATION OF AUTONOMOUS DRIVING SYSTEMS FOR THE CITY OF MACAS USING MATLAB DRIVING SCENARIO DESIGN APP.
Record Nr. UNINA-9910857785103321
Rocha Álvaro  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 4 / / edited by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 4 / / edited by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda
Autore Rocha Álvaro
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (236 pages)
Disciplina 006.3
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering - Data processing
Application software
Computational Intelligence
Data Engineering
Computer and Information Systems Applications
ISBN 9783031602245
3031602242
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Heuristics For Designing Pervasive Game Experiences In The Older Adult Population -- Mental Stress Analysis during Visual and Text based Language Learning by Measuring Heart Rate Variability -- The challenges of learning assessment in the age of artificial intelligence -- OqKay A Semi automatic System Approach to Question Extraction -- Building and Analyzing an Open Educational Resource Repository on the Inovaula Platform -- L and D model of information technology application for distance teaching and learning in physical education at technical university -- Maximising Attendance in Higher Education How AI and Gamification Strategies Can Boost Student Engagement and Participation -- Psychometric properties of a scale designed to assess satisfaction and continued intention to utilize e learning among nutrition sciences students -- Software testing in Ecuadorian University Education A debt to the Software Industry -- Examining the Digital Gap Pre service Teachers Needs and Expectations.
Record Nr. UNINA-9910857786603321
Rocha Álvaro  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Technology and Systems : ICITS 2023, Volume 1 / / edited by Álvaro Rocha, Carlos Ferrás, Waldo Ibarra
Information Technology and Systems : ICITS 2023, Volume 1 / / edited by Álvaro Rocha, Carlos Ferrás, Waldo Ibarra
Autore Rocha Álvaro
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (633 pages)
Disciplina 006.3
Altri autori (Persone) FerrásCarlos
IbarraWaldo
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering - Data processing
Application software
Computational Intelligence
Data Engineering
Computer and Information Systems Applications
ISBN 9783031332586
303133258X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Big Data Analytics and Applications -- On the Use of Parallel Architectures in DNA Methylation Analysis -- 1 Introduction -- 2 Sample Alignment and Methylation Status Inference -- 3 Detection of Differentially Methylated Regions (DMRs) -- 4 Artificial Intelligence for Methylation Analysis -- 5 Conclusions -- References -- Automation for IBNR Provision Using Power BI and Excel -- 1 Introduction -- 1.1 Generalities -- 2 Methodology -- 3 Results -- 4 Conclusions -- References -- Visualizing the Risks of De-anonymization in High-Dimensional Data -- 1 Introduction -- 2 Related Work and Contribution -- 3 Methods -- 3.1 k-Anonymity -- 3.2 l-Diversity -- 3.3 Spatiotemporal Data Anonymity -- 3.4 Textual Data Anonymity -- 3.5 Financial Transactions Data Anonymity -- 3.6 Aggregation-Based Data Anonymity -- 4 Application -- 5 Conclusion and Future Work -- References -- Computer Networks, Mobility and Pervasive Systems -- Wireless Mesh for Schools in the Emberá Comarca -- 1 Introduction -- 2 Methodology -- 3 Internet Connections -- 4 Why Mesh Networks? -- 5 Model -- 6 Conclusions -- 7 Future Work -- References -- Implementation of a 2.4 GHz Biquad Antenna for a Microwave and Antenna Laboratory -- 1 Introduction -- 2 Development -- 3 Results -- 4 Conclusions -- References -- TaguaSpot: A Versatile Radio Access Networks Design for the Integration of Indigenous Communities to the Information Society -- 1 Introduction -- 2 Connectivity Challenges in Indigenous Communities -- 2.1 The Ella Puru Community, a Case Study -- 2.2 Potential Project Risks -- 2.3 Potential Benefits -- 3 Design Requirements of a Versatile Access Network for Indigenous Communities -- 3.1 Requirements -- 3.2 Design Considerations -- 4 TaguaSpot High-Level Design -- 5 Conclusions -- References -- Ethics, Computers and Security.
Vulnerability Analysis in the Business Organization -- 1 Introduction -- 2 Methodology -- 2.1 Vulnerability Analysis Tools -- 2.2 Vulnerability Analysis Process -- 2.3 Environment Description -- 3 Results -- 3.1 Lifetime of Vulnerability in the Information System -- 4 Conclusions -- References -- Information Security: Identification of Risk Factors Through Social Engineering -- 1 Introduction -- 2 Risk Factors for Social Engineering Attacks -- 2.1 Computational Techniques for Social Engineering -- 2.2 Non-computational Techniques for Social Engineering -- 3 Methodology -- 3.1 Social Engineering Attack Vectors -- 4 Results -- 5 Techniques to Prevent Social Engineering Attacks -- 6 Conclusion -- References -- The Information Security Function and the CISO in Colombia: 2010-2020 -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Research Instrument -- 3.2 Sample -- 4 Results -- 4.1 Function of the Information Security Area and Role of the Professional -- 4.2 Evolution of the Information Security Professional Profile -- 5 Discussion -- 5.1 Security Function, Steadily Growing -- 5.2 Cybersecurity Professional Profile, a Path of Experience and Expansion -- 6 Conclusions -- References -- Privacy and Cyber-Security Using Information Systems: A Proposal for Knowledge, Skills, and Attitudes -- 1 Introduction -- 2 Background -- 3 Methodology -- 4 Results and Discussions -- 5 Future Work -- 6 Conclusions -- References -- A Case Study of a Privacy-Invading Browser Extension -- 1 Introduction -- 2 The Attack Scenario -- 3 Implementation -- 4 Discussion -- 5 Conclusion -- References -- Human-Computer Interaction -- An Animatronic Robot to Provide Therapeutic Support to Preschool Children Attending Medical Consultations -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Movement Control System -- 5 Experimentation and Results.
5.1 Structural Analysis -- 6 Conclusions -- References -- Evaluating the Engagement by Design Methodology in Crowdsourcing Initiatives -- 1 Introduction -- 2 Related Works -- 3 Engagement by Design Cards -- 4 Application of the Engagement by Design Methodology -- 5 Analysis of Cards Choice -- 6 Evaluation of Ideas Generated by the Engagement by Design Methodology -- 6.1 Results -- 7 Lessons Learned -- 8 Conclusion -- References -- Applying Semiotic Engineering in Game Pre-production to Promote Reflection on Player Privacy -- 1 Introduction -- 2 Theoretical Foundation -- 2.1 Semiotic Engineering -- 2.2 Game Development -- 2.3 Privacy in Games -- 3 Rationale for Using Semiotic Engineering -- 4 Proposed Approach -- 4.1 Guiding Questions to Reflect on Privacy -- 4.2 Example of How to Answer the Questions -- 5 Final Remarks and Future Work -- References -- The Consumer Influence of Digital Coupon Distribution Through a Referral Program -- 1 Introduction -- 2 Literature Review -- 2.1 Sales Promotion and Digital Coupon -- 2.2 Referral Program -- 2.3 Consumer Perception: Principles of Influence and Decision-Making -- 3 Methodology -- 3.1 Research Question and Hypotheses -- 3.2 Methodology, Variables, Data and Sample -- 3.3 Study Context and Procedures -- 3.4 Data, Factor, Reliability Analysis and Anova -- 3.5 Results -- 4 Conclusions -- 4.1 Final Considerations, Scientific and Managerial Contributions -- 4.2 Limitations and Future Research -- References -- Digital Travel - A Study of Travellers' Views of a Digital Visit to Mexico -- 1 Introduction -- 2 Methods and Focus: A Digital Visit to Mexico -- 2.1 Characteristics of the Participants and the Survey -- 2.2 Visiting Mexico in Forza Horizon 5 -- 3 Data Analysis and Results -- 4 Discussion -- References -- Health Informatics -- Medical Entities Extraction with Metamap and cTAKES from Spanish Texts.
1 Introduction -- 1.1 UMLS -- 1.2 Metamap -- 1.3 cTAKES -- 2 Methodology -- 3 Results -- 4 Comparison of Metamap and cTAKES -- 5 Conclusion -- References -- Health Records Management in Trust Model Blockchain-Based -- 1 Introduction -- 2 State of the Art -- 2.1 Blockchain Technology -- 2.2 Health Records Concepts -- 3 Related Work -- 4 Methodology -- 5 Proposed Trust Model -- 6 Conclusion -- References -- Digital Transformation and Adoption of Electronic Health Records: Critical Success Factors -- 1 Introduction -- 2 Background -- 2.1 Digital Transformation and Electronic Health Records -- 2.2 Latin America and the Caribbean, and Barriers to EHR Adoption -- 3 Proposal -- 3.1 Critical Success Factors (CSFs) for Evaluating the Conditions for Health Services -- 3.2 Configuration of CSF to EHR Adoption -- 3.3 Operationalization of the CSFs -- 4 Towards the Evaluation and Application of the CSFs -- 4.1 Case Study -- 5 Conclusions -- References -- Comorbidity Analysis in the Mexican Population Affected by SARS-CoV2 -- 1 Introduction -- 1.1 Data Acquisition -- 1.2 Data Processing -- 2 Affectation Index -- 3 Comorbidity Statistics -- 4 Conclusions -- References -- Practical Guidelines for Developing Secure FHIR Applications -- 1 Introduction -- 1.1 Motivation -- 1.2 FHIR Standard and Security -- 1.3 The Security Challenge of FHIR API Based Applications -- 2 Methods and Materials -- 2.1 Guidelines -- 2.2 Testing -- 3 Results -- 3.1 Guidelines -- 3.2 Testing -- 4 Discussion -- References -- Intelligent System to Provide Support in the Analysis of Colposcopy Images Based on Artificial Vision and Deep Learning: A First Approach for Rural Environments in Ecuador -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Pilot Experiment and Preliminary Results -- 4.1 Training the Neural Network.
4.2 Measurement of Perception of the Mobile Application and the Web Application -- 5 Conclusions -- References -- Comparison of Transfer Learning vs. Hyperparameter Tuning to Improve Neural Networks Precision in the Early Detection of Pneumonia in Chest X-Rays -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 CNN Architecture -- 3.2 VGGNet -- 3.3 ResNet -- 3.4 MobileNet -- 3.5 Hyperparameter Tuning -- 4 Experiment and Preliminary Results -- 5 Conclusion -- References -- A Smart Mirror Based on Computer Vision and Deep Learning to Support the Learning of Sexual Violence Prevention and Self-care Health in Youth with Intellectual Disabilities -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Experimentation and Results -- 5 Conclusions -- References -- Intelligent and Decision Support Systems -- Weight Prediction of a Beehive Using Bi-LSTM Network -- 1 Introduction -- 2 Database -- 2.1 LSTM Network -- 2.2 Bi-LSTM Network -- 2.3 Performance Measures -- 2.4 Bi-LSTM Configuration -- 3 Results and Discussion -- 4 Conclusions -- References -- Criteria Selection and Decision-Making Support in IT Governance: A Study via Fuzzy AHP Applied to a Multi-institutional Consortium -- 1 Introduction -- 2 Theoretical Reference -- 3 Methodology -- 3.1 Business Analysis -- 3.2 Preparation -- 3.3 Application of the Questionnaire for Data Collection -- 3.4 Fuzzy AHP Application-Results -- 4 Application of the Methodology -- 4.1 Selection of Criteria and Alternative -- 4.2 Application of Fuzzy AHP -- 5 Conclusions -- References -- Machine Learning Model Optimization for Energy Efficiency Prediction in Buildings Using XGBoost -- 1 Introduction -- 2 Methodology -- 2.1 Data Ingestion -- 2.2 Data Pre-processing -- 2.3 Building the Model -- 2.4 Model Tuning -- 3 Results -- 4 Discussion -- 5 Conclusion -- References.
Analysis of the Azores Accommodation Offer in Booking.Com Using an Unsupervised Learning Approach.
Record Nr. UNINA-9910734862803321
Rocha Álvaro  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui