top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Communication and Smart Technologies : Proceedings of ICOMTA 2021
Communication and Smart Technologies : Proceedings of ICOMTA 2021
Autore Rocha Álvaro
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (600 pages)
Altri autori (Persone) BarredoDaniel
López-LópezPaulo Carlos
Puentes-RiveraIván
Collana Smart Innovation, Systems and Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-5792-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Honorary Committee -- International Scientific Committee President -- International Organizing Committee President -- Local Organizing Committee President -- Organizing Committee -- International Scientific Committee -- Contents -- About the Editors -- Digital Communication, Systems and Processes -- Absences Predictive Model of for the Outpatient Unit in a Public Hospital -- 1 Introduction -- 2 Materials and Methods -- 2.1 Understanding the Business -- 2.2 Understanding the Data -- 2.3 Data Transformation -- 2.4 Modeling -- 2.5 Evaluation -- 3 Discussion of Results -- 4 Conclusions -- References -- Automatic Data Warehouse Generation Model from BI Requirements in Natural Language -- 1 Introduction -- 1.1 Data Quality -- 1.2 Data Integration -- 1.3 Natural Language -- 2 Scope of the Problem -- 3 Work Hypothesis -- 4 Proposed Model -- 5 Validation -- 5.1 Education Domain -- 5.2 Conclusions and Future Work -- References -- Automation of an Educational Data Mining Model Applying Interpretable Machine Learning and Auto Machine Learning -- 1 Introduction -- 2 Status of the Issue -- 3 Work Hypothesis -- 4 Proposed Model -- 5 Conclusion and Future Works -- References -- Examining the Tech Stacks of Czech and Slovak Untrustworthy Websites -- 1 Introduction -- 1.1 The Czech and Slovak Untrustworthy Website Landscape -- 2 Methods -- 3 Results -- 3.1 Top-Level Domain Names and Domain Name Registrars -- 3.2 Hosting and E-mail Providers -- 3.3 Trackers -- 4 Discussion -- References -- A Prospective Model of a Digital Epidemiological Surveillance 4.0 Based on the Peruvian Public Health System -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Model Inputs -- 3.2 Epidemiological Surveillance Process -- 3.3 Planning Phase -- 3.4 Execution Phase -- 4 Outputs (Social Impact) of the Model -- 5 Model Components -- 6 Conclusions.
References -- The Relevance of Internal Communication in Innovation Processes: The Bosch Case Study -- 1 Introduction -- 2 Communicating for Innovation -- 3 Action Research in an Industrial Company -- 4 Results and Discussion -- 4.1 Understanding Communication in Project Management Environment -- 4.2 Communication Flows and Interaction Difficulties -- 4.3 Communication Channels: The Dispersion and Replication of Information -- 4.4 Expectations Regarding the Development of a New Communication System -- 5 Conclusions -- References -- Model Maturity to Determine Student Profile During COVID-19 Pandemic at Public University -- 1 Introduction -- 2 State of Art -- 3 Proposal -- 3.1 Phase 1: Characterize the Student -- 3.2 Phase 2: Define the Student's Profile -- 3.3 Phase 3: Establish Change Strategies -- 4 Validation -- 4.1 Phase 1: Characterize the Student -- 4.2 Phase 2: Define the Student's Profile -- 4.3 Phase 3: Establishing Change Strategies -- 5 Conclusions -- References -- Political Communication, Technology and Applications -- Social Media and Online Political Activism in Protest Communication Strategies: Friends or Foes? -- 1 Introduction: Political Activism, Communication and Democracy in the Context of Social Media -- 2 Social Media as an Opportunity for Online Political Activism -- 2.1 The Self-mediation of Protest -- 2.2 The Civic Monitoring of Power Centres -- 2.3 New Opportunities in Shaping the Public Agenda -- 3 Social Media as an Obstacle to Online Political Activism -- 3.1 Difficulties in Capturing the Interest of Mainstream Media -- 3.2 The Structural Dependence on Commercial Social Media -- 4 Conclusions -- References -- When Memes Become a Serious Business: Memetics as a Political Communication Strategy in the United States and Ecuador -- 1 Introduction -- 2 The Globalization of Memetics -- 2.1 Memetics and Politics.
2.2 Ecuador and United States: Globalized Humor and Politics -- 3 Methodology -- 3.1 Units of Analysis -- 4 Results -- 4.1 Making Fun: When the Powerful are Silenced -- 4.2 Mocking and Flaming: When Freedom of Expression Finds Limitations -- 5 Discussion -- 6 Conclusions -- References -- Realities and Challenges of a Democracy in Crisis. Impact of Disinformation and Populism on the Media System -- 1 Democracy at Stake: Political Leadership and the State of the Public Sphere -- 2 Populism and Fake News: Looking for Roots -- 3 Fact-Checking for Social Media Platforms -- References -- LatamCovidNewsCheck. Meta-classification of Fact Checking Platforms in Latin America During the Covid-19 Pandemic -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Formal Aspects of News Verification Agencies -- 3.2 Categorization of News About Covid-19. LatamCovidNewsCheck -- 4 Conclusions -- References -- The Media and the Spanish Monarchy: The Mediating Role of Ideology -- 1 Introduction: The Media and Selective Perception -- 2 Monarchy: Trust, Ideology and Selective Perception -- 3 Objectives, Hypotheses, Method and Variables -- 4 News Monitoring and the Impact of Scandal on the Perception of the Spanish Monarchy -- 5 Conclusions -- References -- Post-feminism and Post-truth in Reggaeton Video Clips on Youtube -- 1 Introduction -- 1.1 Normalized Machismo in Reggaeton Music Videos -- 1.2 New Feminist Proposals in the Reggaeton Industry -- 2 Methodology -- 2.1 Ethical Considerations -- 3 Results and Discussion -- 3.1 Sexual Agency in the Female Empowerment Narrative -- 3.2 Female Empowerment from the Art Direction -- 4 Conclusions -- References -- Twitter and Politics: An Analysis of the Account of Former Peruvian President @MartinVizcarraC Before and During the Pandemic -- 1 Introduction and Literature Review -- 2 Material and Methodology -- 3 Analysis of Results.
4 Conclusions -- References -- Framing and Immigration: New Frames in Media and Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Framing Theory -- 2.2 Agenda-Setting Theory -- 2.3 Stereotypes and Prejudices of the Immigrant Population in Spain -- 3 Research Method -- 4 Results -- 5 Discussion and Conclusion -- References -- Posting to Belong: Instagram Features Enhance Marketed Goods Used as Conduits to Leverage Group Affiliation -- 1 Introduction -- 2 Literature Background -- 2.1 The Need to Belong to a Group -- 2.2 Belonging-Oriented Consumption and Belonging Conduits -- 2.3 Instagram and the Search for Belonging -- 3 Methods -- 3.1 Sample -- 3.2 Data Collection -- 3.3 Analysis Procedure -- 4 Results -- 4.1 Theme 1: Use of Resources Traded in the Market -- 4.2 Theme 2: Instagram Extends the Belonging Conduit -- 4.3 Theme 3: Music Amplifies the Belonging Conduit -- 5 Discussion -- References -- Is Facebook a Tool to Achieve True Friendship? A Study from an Ascetic Perspective -- 1 Introduction -- 2 Literature Review -- 3 Results -- 3.1 Fellowship -- 3.2 Camaraderie -- 3.3 Sympathy -- 4 Conclusions -- References -- Fact-Checking on COVID-19 After a Year of Global Infodemic. Analysis of Digital Misinformation in Spain, Portugal and Latin America -- 1 Introduction -- 1.1 Fact-Checking as a Reaction to Information Disorders -- 1.2 Fact-Checkers in a Global Infodemic Scenario -- 2 Method -- 3 Results -- 3.1 Characteristics of the Fact-Checked Misinformation -- 3.2 International Circulation of the Information that Was Fact-Checked -- 3.3 Correlation Between Web Search Queries and Publication of Fact-Checks -- 4 Discussion and Conclusions -- References -- Post-truth of Female Empowerment in the Fake News of Peruvian Reality Shows -- 1 Introduction -- 1.1 The Peruvian Media Ecosystem and Women Sexualized Representation -- 2 Methodology.
2.1 Ethical Considerations -- 3 Results and Discussion -- 3.1 The Use of Fake News with a Level of Facticity -- 3.2 Post-truth of Female Empowerment -- 4 Conclusions -- References -- YouTuber and Instagrammer Phenomenon in the Andean Community -- 1 Introduction -- 1.1 Social Media in the Andean Community -- 1.2 Phenomenal YouTuber and Instagrammer -- 2 Design and Materials -- 3 Results -- 3.1 Influencer Profile and Language -- 4 By Way of Conclusion -- References -- Intellectual Disability in Media and Political Agendas and Its Status as a Social Minority -- 1 Introduction -- 2 The Social Issues of Intellectual Disability -- 3 The Agendas' Role -- 3.1 The Media Agenda: A Social Role for Intellectual Disability -- 3.2 The Political Agenda: A Public Role for Intellectual Disability -- 4 Objectives and Methodology -- 5 Results -- 5.1 The Political Agenda -- 5.2 The Media Agenda -- 6 Discussion and Conclusions -- References -- The Emotions of the Outbreak. Topics, Sentiments and Politics on Twitter During Chilean October -- 1 Introduction -- 1.1 Social Context -- 2 Review of Literature -- 2.1 Twitter, Emotions and Protest Mobilization -- 3 Methodology -- 3.1 Techniques of Analyses -- 3.2 Sample, Textual Corpus -- 4 Results -- 4.1 Topic Modeling Analysis -- 4.2 Sentiment Analysis -- 4.3 Discussion -- 5 Conclusions -- References -- Use of Technological Means and Personal Data in Electoral Activities: Persuasive Voters -- 1 Introduction -- 2 Use of Technological Means and Personal Data in Electoral Activities: Persuadable Voters -- 3 Other Conclusions -- References -- Political Communication in Europe. The Role of the Lobby and Its Communication Strategies -- 1 Lobby and Political Communication -- 2 Strategies of Lobbies in European Union -- 3 Communication in the Commission and Parliament -- 4 Conclusion -- References.
Institutional Advertising in the Face of COVID-19 Hoaxes: Strategies, Messages and Narratives in the Spanish Case.
Altri titoli varianti Communication and Smart Technologies
Record Nr. UNINA-9910502654403321
Rocha Álvaro  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication, Smart Technologies and Innovation for Society : Proceedings of CITIS 2021
Communication, Smart Technologies and Innovation for Society : Proceedings of CITIS 2021
Autore Rocha Álvaro
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (765 pages)
Altri autori (Persone) López-LópezPaulo Carlos
Salgado-GuerreroJuan Pablo
Collana Smart Innovation, Systems and Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-4126-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Communication, Smart Technologies and Innovation for Society
Record Nr. UNINA-9910502612903321
Rocha Álvaro  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Developments and Advances in Defense and Security : Micrads 2023
Developments and Advances in Defense and Security : Micrads 2023
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2024
Descrizione fisica 1 online resource (0 pages)
Disciplina 355.03
Altri autori (Persone) Fajardo-ToroCarlos Hernán
RodríguezJosé María Riola
Collana Smart Innovation, Systems and Technologies Series
ISBN 981-9988-94-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Part I Administration, Economy, and Logistics Applied to Defense -- 1 Strategic Positions of Actors Related to the Defense Industry in Ecuador -- 1.1 Introduction -- 1.2 Materials and Methods -- 1.3 Results -- 1.4 Conclusions -- References -- 2 Critical Factors on Lean Implementation to the Portuguese Aeronautic Industry -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Methodology -- 2.4 Results and Discussion -- 2.5 Conclusions -- References -- 3 Prioritization of Maintenance Repair Overhaul Capabilities Development for Military Aviation -- 3.1 Introduction -- 3.2 Methodology -- 3.3 Analysis and Results -- 3.4 Conclusion -- References -- Part II Artificial Intelligence and Machine Learning -- 4 Artificial Intelligence and Its Impact on Digital Transformation Processes -- 4.1 Introduction -- 4.2 Methodology -- 4.3 Artificial Intelligence-Digital Transformation -- 4.3.1 The Growth of Artificial Intelligence in Companies -- 4.3.2 How Companies Are Using Artificial Intelligence -- 4.3.3 Technology, Key in Digital Transformation -- 4.3.4 The Importance of Digital Transformation in a Data-Driven World -- 4.4 Results -- 4.4.1 Relationship Between Artificial Intelligence and Digital Transformation -- 4.4.2 Main Challenges and Opportunities Presented by the Implementation of Artificial Intelligence in Digital Transformation Processes -- 4.4.3 Discussion -- 4.5 Conclusion -- References -- Part III Chemical, Biological, and Nuclear Defense -- 5 Evaluation of Different Substrates for Electrodeposition of Riboflavin Films for Determination of Boric Acid in Eye Drops -- 5.1 Introduction -- 5.1.1 Carbon Composite Materials as Substrates for Poly Riboflavin -- 5.2 Spectrometric Techniques for Determination of Boron as a Comparison -- 5.3 Electroanalytical Techniques for Determination of Boron.
5.4 Objectives -- 5.5 Materials and Methods -- 5.6 Voltammetric Determination of Boric Acid in Eye Drops Samples -- 5.7 Comparative Method UV-Vis Absorption Spectrophotometry -- 5.8 Results and Discussion -- 5.8.1 Sensors Evaluation -- 5.8.2 Electrosynthesis and Characterization of Poly Riboflavin -- 5.8.3 Use of Contact Angle Measurements (normal upper ThetaΘ) to Evaluate the Interaction Between the Different Substrates and the Film Monomer -- 5.8.4 Evaluation of Topography and Roughness Using Atomic Force Microscopy (AFM) -- 5.8.5 Determination of Boric Acid -- 5.8.6 Determination of Boric Acid in Eye Drops -- 5.8.7 Comparative Spectrophotometric Method -- 5.9 Conclusions and Perspectives -- References -- Part IV Cybersecurity and Cyberdefense -- 6 Governance Under Threat? AI in the Social Rehabilitation System of Ecuador: An Application of the Bayesian Model -- 6.1 Introduction -- 6.1.1 Approach to Governance -- 6.1.2 Governance Proponents -- 6.1.3 Particularities of Governance -- 6.1.4 Benefits of Governance -- 6.1.5 Limitations of Governance -- 6.2 What Do We Know About Governance? -- 6.3 Threats to Governance in Ecuador -- 6.4 Artificial Intelligence as a Solution to Governance? -- 6.5 Methodology -- 6.6 Results -- 6.7 Discussion -- 6.8 Conclusions -- 6.9 Recommendations -- References -- 7 Integrating Random Linear Network Coding and Content Delivery Networks for Reduced Latency in Heterogeneous Network Processing of Mobile Devices -- 7.1 Introduction -- 7.2 State of Art -- 7.3 Coding and Distributing RLNC by CDN and Heterogeneous Devices -- 7.3.1 Mathematical Formulation of RLNC -- 7.4 Design of Experiments -- 7.5 Analysis of Results -- 7.6 Conclusions -- References -- Part V Defense Engineering (General) -- 8 Artificial Intelligence Applications in Military Logistics Operations -- 8.1 Introduction -- 8.2 Development -- 8.2.1 Logistics 4.0.
8.2.2 The Characteristics of Logistics Use in Modern Conflicts -- 8.2.3 The Application of AI in Military Operations Logistics -- 8.3 Final Considerations -- References -- Part VI Information and Communication Technology in Education -- 9 Web 4.0 Tools Applied to Improve Collaborative Learning in Object-Oriented Programming -- 9.1 Introduction -- 9.2 Methodology -- 9.3 Results -- 9.4 Discussion -- References -- 10 Using Artificial Intelligence to Prevent Drowsiness Based on Facial Recognition -- 10.1 Introduction -- 10.2 Conception -- 10.3 Implementation and Results -- 10.4 Futures Improvements -- 10.5 Conclusion -- References -- 11 Impact of an Augmented Reality Environment in Learning Computer Networks Principles -- 11.1 Introduction -- 11.2 Materials and Methods -- 11.2.1 Population and Sample Size -- 11.2.2 Gathering Data -- 11.2.3 Steps on Data Analysis -- 11.2.4 Survey -- 11.2.5 Augmented Reality-Based Software App -- 11.3 Evaluation of Results -- 11.4 Conclusions -- References -- 12 The Impact of Numerical Shifts on the Field Artillery Firing Accuracy -- 12.1 Introduction -- 12.2 Call for Fire -- 12.3 Approximations in Grid Coordinate Locations -- 12.4 Approximations in Polar Plot Location -- 12.5 Approximations in Location by Metric VPI from an RP -- 12.6 Comparative Synthesis -- 12.7 Conclusions -- References -- 13 Self-perception Scale on Videoconferencing in University Students -- 13.1 Introduction -- 13.1.1 Videoconference -- 13.1.2 Psychopedagogical -- 13.1.3 Interactivity -- 13.1.4 Technological Capacity -- 13.2 Methodology -- 13.3 Results -- 13.3.1 Exploratory Factorial Analysis -- 13.3.2 Confirmatory Factor Analysis -- 13.4 Conclusions -- References -- 14 Management of Operational Usability Requirements: The Key to Saving Resources and Good Performance of Military Materials -- 14.1 Introduction -- 14.1.1 Technology Readiness Level.
14.1.2 Operational Requirements on Brazilian Army -- 14.1.3 Research Problems -- 14.1.4 Objective -- 14.2 Methods -- 14.3 Results and Discussion -- 14.3.1 Military Warfare Education Line -- 14.3.2 Operational Requirements for the Last 5 years in the Brazilian Army -- 14.3.3 One Proposal for Saving Resources and Improving Equipment Usability -- 14.4 Conclusion -- References -- 15 ChatGPT to Motivate Critical Thinking in the Teaching-Learning Process of First Semester Students at the Technical University of Ambato -- 15.1 Introduction -- 15.2 State of the Art -- 15.2.1 Critical Thinking and Higher Education -- 15.2.2 Test to Evaluate the PC of University Students -- 15.2.3 ChatGPT -- 15.3 Methodology -- 15.4 Results -- 15.5 Conclusions y Future Works -- References -- 16 Digital and Traditional Channels in the Internal Communication of a University in Peru -- 16.1 Introduction -- 16.2 Literature Review -- 16.2.1 Internal Communication at the University -- 16.2.2 Traditional Media in Internal Communication -- 16.2.3 Digital Media in Internal Communication -- 16.3 Methods -- 16.3.1 Longitudinal Survey Study -- 16.3.2 Opinion Analysis Study -- 16.4 Results -- 16.4.1 Sample Description -- 16.4.2 Q1: What is the Frequency of Communication with the Authorities? -- 16.4.3 Q2: What is the Frequency of Receiving Notifications? -- 16.4.4 Q3: What is the Frequency of Traditional Media Usage? -- 16.4.5 Q4: What is the Frequency of Use of Digital Media? -- 16.5 Q5: What Are the Opinions of the Members About Internal Communication? -- 16.6 Discussion -- 16.7 Conclusion -- References -- Part VII Leadership and e-Leadership -- 17 Characteristics of Leadership in a Military Context: Systematic Literature Review by PRISMA Method -- 17.1 Introduction -- 17.2 Methodology -- 17.3 Main Findings and Discussion -- 17.4 Conclusion -- References -- Part VIII Military Marketing.
18 Brand Image Mediated by Satisfaction Through Organizational Culture and Cultural Hierarchy. A Study in the Technical School of the Army -- 18.1 Introduction -- 18.2 Methodology -- 18.3 Results -- 18.4 Conclusions -- References -- Part IX Simulation and Computer Vision in Military Applications -- 19 Open RCS: An Open-Source Platform for Numerical Evaluation of Radar Cross Section of 3D Targets -- 19.1 Introduction -- 19.2 Theoretical Foundation: Radar Cross Section (RCS) -- 19.3 Computational Methods Applied by RCS Softwares -- 19.4 Open RCS: An Open-Source Platform for Numerical Evaluation of Radar Cross Section of 3D Targets -- 19.5 Conclusions and Future Works -- References -- Author Index.
Record Nr. UNINA-9910847584703321
Rocha Álvaro  
Singapore : , : Springer Singapore Pte. Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Developments and Advances in Defense and Security : Proceedings of MICRADS 2021
Developments and Advances in Defense and Security : Proceedings of MICRADS 2021
Autore Rocha Álvaro
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (521 pages)
Disciplina 355.03
Altri autori (Persone) Fajardo-ToroCarlos Hernan
RodríguezJosé María Riola
Collana Smart Innovation, Systems and Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-4884-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Part I Cybersecurity and Cyberdefense -- 1 An Analysis of Cyber Espionage Process -- 1.1 Introduction -- 1.2 Cyber Espionage -- 1.2.1 The Role of Malware in Cyber Espionage -- 1.3 General Process of Cyber Espionage -- 1.4 Discussion -- 1.5 Conclusions -- References -- 2 Portuguese Concerns and Impact on Behaviour About Cybersecurity: A Comparison with the European Average -- 2.1 Introduction -- 2.2 Cybersecurity Study in Europe -- 2.2.1 Europeans' Concerns About Cybersecurity -- 2.2.2 Impact on Behaviour -- 2.2.3 Impact on the Security of Online Accounts -- 2.2.4 Attitudes to Cybersecurity -- 2.3 Discussion -- 2.4 Conclusion -- References -- 3 Impact of Social Engineering Attacks: A Literature Review -- 3.1 Introduction -- 3.2 Methods -- 3.2.1 Research Questions -- 3.2.2 The Inclusion and Exclusion Criteria -- 3.2.3 Search Process -- 3.2.4 Analysis of Primary Studies -- 3.3 Results -- 3.4 Discussion -- 3.5 Conclusions -- References -- 4 Maritime Cyberdefense Actors Taxonomy for Command and Control -- 4.1 Introduction -- 4.2 Methodology -- 4.3 Maritime Cyberdefense Key Actors -- 4.4 Cyberdefense Capabilities -- 4.5 Cyberdefense Strategic Attitude -- 4.6 Complementary Classifications -- 4.7 Results -- 4.8 Conclusions -- References -- 5 Enabling Sustainable Management Through Kalman Filtering in glossaLAB: A Case Study on Cyber-Subsidiarity -- 5.1 Introduction: Lights and Shadows of Information Prosperity -- 5.2 An Alternative Architecture for the Digital World Based on Network Structural Properties -- 5.2.1 The Viable System Model as a Paradigm of Sustainability -- 5.3 Cyber-subsidiarity Model Applied to Interdisciplinary Knowledge Co-creation: Leveraging Transdisciplinarity -- 5.3.1 glossaLAB Project -- 5.3.2 Information Management for Sustainability and Autonomy.
5.3.3 Information Filtering Across Organization Levels -- References -- 6 Digital Transformation Impact in Security and Privacy -- 6.1 Introduction -- 6.2 Digital Transformation in Security and Privacy. Problem Statement -- 6.3 Research Analysis -- 6.4 General Findings -- 6.4.1 Strength Identification Relative to Disruption -- 6.4.2 Weakness Identification Relative to Disruption -- 6.4.3 Why Is This an Opportunity? -- 6.4.4 Why Is It a Threat? -- 6.4.5 How Does This Disruption Solve Privacy and Security Problems? -- 6.4.6 Further Areas of Research to Consider -- 6.5 Conclusions -- References -- 7 ISOLA: An Innovative Approach to Cyber Threat Detection in Cruise Shipping -- 7.1 Introduction -- 7.2 Cyber Risks in Cruising Ships -- 7.2.1 Cyber Risks: From Threats to Vulnerabilities and Contingency Plans -- 7.2.2 Cyber Risks at Sea -- 7.2.3 Cyber Risks on Board -- 7.3 The ISOLA Architecture -- 7.3.1 ISOLA Principles -- 7.3.2 Toward Ships Data Fusion -- 7.4 Discussion on Further Needs -- 7.5 Conclusion -- References -- 8 Analysis of the Cybersecurity in Wireless Sensor Networks (WSN): A Review Literature -- 8.1 Introduction -- 8.2 Related Work -- 8.3 Methodology -- 8.3.1 Planning the Review -- 8.3.2 Conduct of the Search -- 8.3.3 Analysis -- 8.4 Discussion and Conclusions -- References -- Part II Computer Networks, Mobility and Pervasive Systems -- 9 Green Energy for Nodes of Hybrid Fiber-Coaxial Networks in the Transmission and Distribution of Signals to the End Customer -- 9.1 Introduction -- 9.2 Materials and Methods -- 9.2.1 Importance of Quality Service -- 9.2.2 Network Integration with Service Quality in Mind -- 9.2.3 Distributed Installation Cabinets -- 9.2.4 Operating Scenarios -- 9.2.5 Hybrid System Simulations -- 9.3 Results and Discussions -- 9.4 Conclusions -- References -- Part III Analysis and Signal Processing.
10 Comparative Analysis of High Frequencies for the Broken Bar Fault Diagnosis Using MCSA and Park's Vector Demodulation -- 10.1 Introduction -- 10.2 Materials and Methods -- 10.2.1 Motor Current Signature Analysis (MCSA) -- 10.2.2 Transformation of Reference Variables to Associated Variables -- 10.2.3 Fault Caused by Broken Bars (BRB). -- 10.2.4 Implementation in Experimental Development. -- 10.3 Results and Discussion -- 10.3.1 MCSA Analysis for Broken Bar Fault -- 10.3.2 Demodulation of the Reference Signal. -- 10.4 Conclusions -- References -- Part IV Wearable Technology and Assistance Devices -- 11 Nexus of Electrospun Nanofibers and Additive Processing-Overview of Wearable Tactical Gears for CBRNE Defense -- 11.1 Introduction -- 11.2 Materials and Methods-An Overview of Electrospinning and Additive Processing -- 11.3 Characteristics of Fibers -- 11.4 Applications Space of Nanofibers in Defense and Security -- 11.4.1 Biomedical Application -- 11.4.2 Sensors-Chem.-Bio, VOCs, Explosives, and Biomarkers -- 11.4.3 Textile: Force Protection, ICT, Tactile Sensors -- 11.5 Rapid Prototyping, Conclusion, and Path Forward -- References -- Part V Simulation and Computer Vision in Military Applications -- 12 Towards Real-Time Drone Detection Using Deep Neural Networks -- 12.1 Introduction -- 12.2 Methodology -- 12.2.1 Dataset -- 12.2.2 Training -- 12.2.3 Validation -- 12.3 Hypothesis -- 12.4 Results -- 12.5 Conclusions -- References -- 13 Detection of Opencast Mining Sites from Multispectral Satellite Images -- 13.1 Introduction -- 13.1.1 Related Works -- 13.1.2 Contribution -- 13.2 Methodology -- 13.2.1 Data Preparation -- 13.2.2 Support Vector Machine (SVM) for Image Segmentation -- 13.2.3 Fully Convolutional Neural Network (FCN) for Semantic Segmentation -- 13.3 Evaluation of Image Segmentation Techniques -- 13.3.1 Image Preprocessing.
13.3.2 Results of the Segmentation Process Using the SVM -- 13.3.3 Semantic Segmentation Using the FCN -- 13.4 Conclusions -- References -- 14 Impact of the Use of Simulators on Training and Specialization in the Navy -- 14.1 Introduction -- 14.2 Background -- 14.3 Simulator's Technological Environment -- 14.3.1 Simulation -- 14.3.2 Simulators Pedagogy -- 14.4 Methodology -- 14.4.1 Design -- 14.4.2 Measured Variables and Applied Instruments -- 14.4.3 Population and Sample -- 14.5 Results -- 14.6 Conclusions -- References -- 15 Comparison Between Two Novel Approaches in Automatic Breast Cancer Detection and Diagnosis and Its Contribution in Military Defense -- 15.1 Introduction -- 15.2 Materials and Methods -- 15.3 Results -- 15.4 Comparison and Discussion -- 15.5 Military Defense Contribution -- 15.6 Conclusion -- References -- Part VI Weapons and Combat Systems -- 16 Model-Driven Engineering as the Interface for Tactical Operation Order of Mixed Robot/Human Platoons -- 16.1 Introduction -- 16.2 Background -- 16.3 Vision -- 16.4 Model-Driven Engineering -- 16.5 Metamodel for Operation Order -- 16.6 Conclusion -- References -- Part VII Chemical, Biological and Nuclear Defense -- 17 Decontamination of Seawater in a Harbor: Case Study of Potential Bioterrorism Attack -- 17.1 Introduction -- 17.2 Ballast Water-Source of Bacteriological Seawater Pollution -- 17.3 Proposed Methods for Decontamination of Seawater in a Harbor -- 17.3.1 Prevention of Bioaerosol Formation from Seawater Using MICP -- 17.3.2 Prevention of Bioaerosol Formation from Seawater Using Aerobic Oxidation of Salts of Calcium or Iron with Long-Chain Organic Acids -- 17.4 Conclusion and Discussion -- References -- 18 Trace Detection of C-4 on Aluminum Using Mid-Infrared Reflection-Absorption Quantum Cascade Laser Spectroscopy -- 18.1 Introduction -- 18.2 Materials and Methods.
18.2.1 Reagents -- 18.2.2 Sample Preparation -- 18.2.3 Instrumentation -- 18.3 Results and Discussion -- 18.3.1 Spectral Profile -- 18.3.2 Partial Least Squares (PLS) Regression Analysis of Standards -- 18.4 Conclusion -- References -- 19 Nanomaterials, Energy Devices and Defense: Metal Oxides and Supercapacitors -- 19.1 Introductions -- 19.1.1 Defense and Nanotechnology -- 19.1.2 Nanomaterials and Devices -- 19.2 Supercapacitors -- 19.2.1 Supercapacitor Design and Components -- 19.3 Final Remarks -- References -- 20 Cellulose Acetate/ABS Blends as Insulating Phases for 3D Printing of Carbon-Based Composite Sensors -- 20.1 Introduction -- 20.2 Materials and Methods -- 20.2.1 Materials and Blends Preparation -- 20.2.2 Composite Electrodes Preparing -- 20.2.3 Characterization Details -- 20.2.4 Measurement Details -- 20.3 Results and Discussions -- 20.4 Conclusions -- References -- Part VIII Health Informatics in Military Applications -- 21 Stress Biomarkers Detection Using Non-invasive Methods for Textiles Integrated Sensors Development -- 21.1 Introduction -- 21.2 Materials and Methods -- 21.2.1 Chemicals -- 21.2.2 Sampling -- 21.2.3 LC-MS/MS -- 21.2.4 Electrochemistry -- 21.3 Results and Discussion -- 21.3.1 Blood Results -- 21.3.2 LC-MS/MS Results -- 21.3.3 Comparison Between Blood and Sweat Results -- 21.3.4 Electrochemistry Analysis -- 21.4 Conclusion -- References -- 22 Detecting Autism Spectrum Disorder Using Data Mining -- 22.1 Introduction -- 22.2 Related Work -- 22.3 Methodology -- 22.3.1 Business Understanding -- 22.3.2 Data Understanding -- 22.3.3 Data Preparation -- 22.3.4 Modeling -- 22.3.5 Evaluation -- 22.4 Results and Discussion -- 22.5 Conclusions -- References -- 23 Classification of Dementia in Adults -- 23.1 Introduction -- 23.2 Related Work -- 23.3 Methodology -- 23.3.1 Business Understanding -- 23.3.2 Data Understanding.
23.3.3 Data Preparation.
Record Nr. UNINA-9910508472403321
Rocha Álvaro  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 3
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 3
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (507 pages)
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-60221-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Information and Knowledge Management -- Improving Change Management in Large Engineering Projects: A Case Study -- 1 Introduction -- 2 Literature Review -- 2.1 Engineering Change Process -- 2.2 Impacts of Change Management -- 2.3 Tools and Techniques -- 3 Research Methodology -- 4 Case Study Analysis -- 5 Proposals for Improvement -- 5.1 Review of Standard Activities in Each ECR Phase -- 5.2 Development of ECR Status Tracking -- 6 Discussion -- 7 Conclusions -- References -- MITEC Model for Talent Management to Small and Medium Enterprises Develop with  Design Science Research -- 1 Introduction -- 2 Methodology: Design Science Research -- 3 Application Design Science Research for MITEC -- 4 Design Science Research Conclusion -- 5 Conclusion and Future Work -- References -- Proposal to Improve Risk Management in New Product Development Projects in an Automotive Company -- 1 Introduction -- 2 Theoretical Background -- 2.1 Project Management -- 2.2 Risk Management -- 3 Research Methodology -- 4 Case Study -- 4.1 Current Risk Management Plan -- 4.2 Team Maturity in Risk Management -- 5 Proposal of Improvements -- 6 Conclusions and Future Research -- References -- Limitations that Hinder the Successful Application of a Knowledge Management Model in Research Centers in a Higher Education Institution -- 1 Introduction -- 2 Literature Review -- 3 Material and Methods -- 4 Results -- 5 Discussion and Analysis of Results -- 6 Conclusions -- References -- Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise -- 1 Introduction -- 2 Research Approach -- 3 Cyber Security Information Sharing -- 4 Cyber Security Exercise -- 5 Technical Implementation -- 5.1 Implemented Construction -- 5.2 Modeled Cyber Security Exercise a Real Life Test Event -- 6 Results.
6.1 Free-Form Feedback -- 6.2 Feedback Survey -- 7 Conclusion -- References -- Companies Amidst Evolving Digital Media Challenges in CSR Communication. Systematic Literature Review -- 1 Introduction -- 2 Theoretical Background -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Ga-starfish: A Gamified Retrospective -- 1 Introduction -- 2 Background -- 2.1 Retrospective -- 2.2 Starfish Technique -- 2.3 Gamification -- 2.4 Social and Human Factors -- 3 Related Work -- 4 Method -- 5 Results -- 5.1 Phase A: Planning -- 5.2 Phase B: Design -- 5.3 Phase C: Pilot Test -- 5.4 Phase D: Scheduling -- 5.5 Phase E: Evaluation -- 6 Discussion -- 7 Conclusions and Future Work -- References -- The Strategy Implementation of Account-Based Marketing (ABM)-The Stratio Case -- 1 Introduction -- 2 Literature Review -- 2.1 Marketing in the Business-to-Business Marketplace -- 2.2 Relationship Marketing -- 2.3 Account-Based Marketing -- 2.4 The Sales Funnel of Traditional Marketing and Account-Based Marketing -- 2.5 Types of Account-Based Marketing -- 2.6 Benefits of the Account-Based Marketing Strategy -- 2.7 Implementation of the Account-Based Marketing Strategy -- 2.8 Measuring the Returns of the Account-Based Marketing Strategy -- 3 Methodology -- 4 Case Study-Stratio Automotive -- 4.1 Stratio Automotive in a Glance -- 4.2 Implementing the Account-Based Marketing Strategy at Stratio Automotive -- 5 Results and Discussion -- 6 Conclusion -- References -- Approach to the Consumption of Fake News. The Case of Ecuador -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Conclusions -- References -- Syntax in Emoji Sequences on Social Media Posts -- 1 Introduction -- 2 Research Methodology -- 2.1 Inclusion and Exclusion Criteria -- 2.2 Databases -- 3 Results Analysis -- 4 Conclusions and Future Work -- References.
Trends and Collaborations in Information Systems and Technologies: A Bibliometric Analysis of WorldCIST Proceedings -- 1 Introduction -- 2 Related Work -- 3 Data Collection and Processing -- 4 Findings -- 4.1 Authorship Trends -- 4.2 Thematic Analysis -- 4.3 Collaboration Patterns -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Comparative Assessment of Wrappers and Filters for Detecting Cyber Intrusions -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Experimental Design -- 4.1 Intrusion Detection Datasets -- 4.2 Proposed Method -- 5 Empirical Results and Discussion -- 5.1 Cleaning and Transforming Data -- 5.2 Comparison of Filters and Wrappers FS Techniques and the Best Combinations of FS-Classifier -- 6 Conclusion and Future Work -- References -- Multiclass Intrusion Detection in IoT Using Boosting and Feature Selection -- 1 Introduction -- 2 Related Works -- 3 Experimental Design -- 3.1 Datasets Description -- 3.2 Performance Measure -- 3.3 Methodology -- 4 Results and Discussions -- 4.1 Determining the Optimal Number of Estimators for Each Boosting Technique -- 4.2 Optimal Combinations of FS and Boosting Methods Across Varied Feature Percentages -- 5 Conclusion and Future Work -- References -- Is ChatGPT Able to Generate Texts that Are Easy to Understand and Read? -- 1 Introduction -- 2 Background -- 3 Methodology -- 4 Design of the study -- 4.1 Text Comprehensibility Indicators -- 4.2 Corpus -- 5 Results -- 5.1 Word Count Analysis -- 5.2 Readability Index -- 5.3 Simple Linguistic Structures -- 6 Conclusion and Discussion -- Appendix I. Linguistic Elements Analyzed -- References -- Does a Lack of Transparency Lead to the Dark Side of Social Media? a Study in South Western Europe According to Gender and Age -- 1 Introduction -- 2 Literature Review -- 2.1 Beauty Standards -- 2.2 Beauty Standards Over Time.
2.3 Globalization of Beauty Standards -- 3 Social Media and Young People's Body Image -- 3.1 Negative Strategies Adopted by Social Media to Exploit Personal Insecurities -- 4 Methodology -- 5 Results and Discussion -- 6 Chi-Square Tests -- 6.1 Conclusions Regarding Fisher's Exact Test and the Chi-Square Test -- 7 Conclusion and Future Research -- References -- Analysis of the Impact of Orthogonality in the Readability of the OBO Foundry Ontologies -- 1 Introduction -- 2 Materials and Methods -- 2.1 Human Readability Properties in OWL Ontologies -- 2.2 The Orthogonal View of the OBO Foundry Repository -- 2.3 The Reuse-Based Readability Metrics -- 3 Results and Discussion -- 3.1 Experimental Setup -- 3.2 Comparison by Number of Entities -- 3.3 Analysis of Human Readability -- 4 Conclusions -- References -- Do Habit and Privacy Matter in a Post Pandemic-Era? Mobile Apps Acceptance of the Private Healthcare Sector in Portugal -- 1 Introduction -- 2 Conceptual Model -- 3 Methodology -- 4 Results -- 4.1 Measurement Model Evaluation -- 4.2 Structural Model -- 5 Conclusion -- References -- The Role of Online Product Information in Enabling Electronic Retail/E-tailing -- 1 Introduction -- 2 Literature Review -- 2.1 Product Information and Information Availability -- 2.2 Information Search -- 2.3 Conceptual Framework -- 3 Methodology -- 4 Data and Analysis -- 4.1 Results -- 4.2 Discussion -- 4.3 Main Contributions -- 5 Conclusion -- References -- Habitat Suitability Assessment of Three Passerine Birds Using Ensemble Learning with Diverse Models -- 1 Introduction -- 2 Material and Methods -- 2.1 Birds' Dataset -- 2.2 Environmental Data -- 2.3 Experiment Workflow -- 3 Results and Discussions -- 3.1 Evaluation of the Eight Single Machine Learning Techniques -- 3.2 Evaluation of the Heterogeneous Ensembles Compared to Their Single Models.
4 Conclusion and Future Works -- References -- Budgeted Recommendation with Delayed Feedback -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Algorithm Design -- 4.1 Search for Top Responsive Arms -- 4.2 Resource Allocation with Delays -- 5 Experiments -- 6 Conclusion -- References -- AI in Higher Education: Assessing Acceptance, Learning Enhancement, and Ethical Considerations Among University Students -- 1 Introduction -- 2 Literature Review -- 2.1 Acceptance of AI in Higher Education -- 2.2 Learning Enhancement -- 2.3 Ethical Considerations -- 3 Methodology -- 4 Results and Discussion -- 4.1 Acceptance -- 4.2 Learning Enhancement -- 4.3 Ethical Considerations -- 5 Conclusion -- References -- Intellectual Capital and Information Technologies in Education: Some Insights -- 1 Introduction -- 2 Literature Review -- 3 Conclusions -- References -- Integrating an Advanced Evolutionary Intelligence System into the Internal Contracting Operations at Centro Hospitalar Universitário Lisboa Central -- 1 Introduction -- 1.1 Internal Contracting Process -- 1.2 Evolutionary Intelligence -- 2 General and Specific Objectives -- 3 Methods -- 4 Conclusion -- References -- Language Policy in the Social Media - Efforts to Revitalize Indigenous Languages in Peru -- 1 Introduction -- 2 Theoretical Foundations: Language Policy, Multilingual Ability and Language Revitalization -- 3 Language Policy in the (Social) Media -- 4 Language Revitalization -- 5 The Revitalization of Quechua in the Music and the Social Media -- 6 The Revitalization of Quechua in Academic Contexts -- 7 Aspirations to the Revitalization of Mochica -- 8 Discussion -- 9 Conclusions -- References -- A Graph-Based Approach for Searching and Visualizing of Resources and Concepts in Data Science -- 1 Introduction -- 2 Background -- 2.1 An Introduction to Knowledge Graphs.
2.2 Related Work.
Record Nr. UNINA-9910857796603321
Rocha Álvaro  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 1
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 1
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (242 pages)
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-60215-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Big Data Analytics and Applications -- An Overview on the Use of Machine Learning Algorithms for Identifying Anomalies in Industrial Valves -- 1 Introduction -- 2 Methodology for Conducting the SLR -- 3 Summary of the Findings -- 4 Deeper Analysis of the Findings -- 4.1 Datasets -- 5 Conclusions, Limitations and Future Work -- References -- Framework for Real-Time Predictive Maintenance Supported by Big Data Technologies -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 RUL Prediction -- 5 Conclusions -- References -- Emotional Evaluation of Open-Ended Responses with Transformer Models -- 1 Introduction -- 2 Related Work -- 3 Objectives -- 4 Proposed Method -- 4.1 Prompt Engineering -- 4.2 Use of GPT-3.5 -- 4.3 Use of SpaCy -- 5 Experiments and Results -- 5.1 Emotion Analysis -- 5.2 Polarity Analysis -- 6 Conclusions -- References -- Big Data Analytics in the Supply Chain: A Bibliometric Review of Scholarly Research from 2012 to 2023 -- 1 Introduction -- 2 Big Data Analytics in the Supply Chain -- 3 Methodology -- 4 Results -- 5 Discussion and Implications -- 6 Conclusions -- References -- Human-Machine Interface Based on Electromyographic (EMG) Signals Aimed at Limb Rehabilitation for Diabetic Patients -- 1 Introduction -- 2 State of Art -- 3 Justification of the Study -- 4 Materials and Methods -- 5 Results -- 6 Conclusion -- References -- Incidence Assessment of Diabetes by Delegation in the United Mexican States Applying the Multilayer Perceptron Neural Network -- 1 Introduction -- 2 Materials and Methods -- 2.1 Healthcare System -- 2.2 Use of Data with Neural Network -- 3 Results -- 4 Conclusion -- References -- Computer Networks, Mobility and Pervasive Systems.
Exploiting Physarum-Inspired Vacant Particle Transport Model to Redesign an Enterprise Network -- 1 Introduction -- 2 Background -- 3 Modeling Enterprise Network Redesign Through Vacant Particle Transportation Model -- 4 Computational Flow of the Proposed Redesign Process -- 5 Results and Discussion -- 5.1 Behavior of the Proposed Redesign Algorithm -- 6 Conclusion -- References -- Simulation of Autonomous Driving Systems for the City of Macas Using Matlab Driving Scenario Design App -- 1 Introduction -- 2 Methodology -- 3 Development -- 4 Results -- 5 Discussion -- 6 Conclusions -- References -- Efficient Implementation of a GNSS Base Station with RTK Receiver for Topography -- 1 Introduction -- 2 Materials and Methods -- 2.1 GNSS Devices -- 2.2 Programming and Configuration of Components -- 3 Results and Discussion -- 3.1 System Tests -- 3.2 Results Analysis -- 4 Conclusions -- References -- Refining Cyber Situation Awareness with Honeypots in Case of a Ransomware Attack -- 1 Introduction -- 2 Ransomware -- 2.1 Taxonomy of a Ransomware Attack -- 3 Capabilities of Honeypot Technology in Ransomware Detection -- 4 Construction -- 5 Results -- 6 Conclusion -- References -- Machine Learning for Forensic Occupancy Detection in IoT Environments -- 1 Introduction -- 2 Related Work -- 3 Study Description -- 3.1 Dataset -- 3.2 Exploratory Data Analysis -- 4 Outlier Detection and Treatment -- 4.1 Data Preprocessing -- 4.2 Data Normalization -- 4.3 Model Evaluation -- 5 Discussion of Results -- 6 Limitations -- 7 Conclusion -- References -- Advancing Cardiovascular Imaging: Deep Learning-Based Analysis of Blood Flow Displacement Vectors in Ultrasound Video Sequences -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 2.2 Methods -- 2.3 Metrics -- 3 Experiment and Results -- 3.1 Region of Interest Selection Results.
3.2 Results of the Dense Optical Flow Automatic Annotation -- 3.3 Results of the DL Blood Displacement Vectors Estimation -- 4 Conclusion -- References -- Ethics, Computers and Security -- Artificial Intelligence Cyberattacks in Red Teaming: A Scoping Review -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Attack Methods -- 3.2 Attack Targets -- 3.3 Summaries -- 4 Conclusion -- References -- Third-Party Data Leaks in the Websites of Finnish Social and Healthcare Districts -- 1 Introduction -- 2 Previous Research -- 3 Methodology and Study Setting -- 4 Results -- 5 Discussion -- 6 Conclusions -- References -- A Model for Assessing the Adherence of E-Identity Solutions to Self-Sovereign Identity -- 1 Introduction -- 2 Methodology -- 3 A Model to Assess Self-Sovereign Identity Solutions -- 4 Assessment of VIDchain -- 5 Discussion of the Results -- 6 Limitations and Conclusions -- References -- S.O.S. - My Grandparents: Using the Concepts of IoT, AI and ML for the Detection of Falls in the Elderly -- 1 Introduction -- 2 The Study of Specialized Literature -- 3 Materials and Methods -- 4 Implementation, Results and Discussions -- 5 Conclusions -- References -- Ethics and Security in the Era of Big Data: Innovative Challenges and Educational Strategies -- 1 Introduction -- 2 Background -- 2.1 The Ethical Landscape -- 2.2 Human Nature Theory in IT Education -- 2.3 Developing Capabilities for Ethical IT Practice -- 2.4 Application of Ethical Theories to Big Data Challenges -- 2.5 Curricular Innovations for Ethical Big Data Use -- 3 Methodology -- 4 Results -- 4.1 Curriculum -- 4.2 Survey Results -- 4.3 Integration of Ethical Theories and Security Practices -- 4.4 Preparedness for Future Challenges -- 5 Discussion -- 6 Conclusions -- References -- Human-Computer Interaction.
Farming and Automation. How Professional Visions Change with the Introduction of ICT in Greenhouse Cultivation -- 1 Introduction -- 2 Rationale -- 3 Related Work -- 4 Background -- 5 Theoretical Framework -- 6 The Interviews -- 6.1 Results -- 6.2 Discussion -- 7 Conclusions -- References -- Implementation Human-Computer Interaction on the Internet of Things Technologies: A Bibliometric Analysis -- 1 Introduction -- 2 Materials and Methods -- 2.1 Search Execution -- 3 Results and Discussion -- 3.1 General Information on the Domain -- 3.2 Annual Scientific Production in the Domain -- 3.3 Universities and Research Centers Are Prominent in the Domain -- 3.4 Productivity of Countries in the Domain -- 3.5 Thematic Evolution in the Domain -- 4 Conclusions -- References -- Sustainability and Usability Evaluation of E-Commerce Portals -- 1 Introduction -- 2 Materials and Methods -- 3 Results -- 4 Discussion and Conclusion -- References -- Who is Really Happier? Re-examining the Portrayal of Happiness on Social Media and the Persistence of Misperception -- 1 Introduction -- 2 Methodology -- 2.1 Participants and Procedure -- 2.2 Measures -- 3 Results -- 3.1 Descriptive Statistics -- 3.2 Correlations Amongst Self-reported Happiness, Perceived Happiness, Discrepancy of Happiness, Gender and Age -- 3.3 Gender and Age Variations in Self-reported and Perceived Happiness -- 3.4 Happiness Misperception in the Sample as a Whole -- 3.5 Happiness Misperception Across Gender Groups -- 3.6 Happiness Misperception Across Age Groups -- 3.7 Happiness Misperception Across Age and Gender -- 4 Discussion -- 5 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910857785103321
Rocha Álvaro  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 4
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 4
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (236 pages)
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-60224-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Information Technologies in Education -- Heuristics for Designing Pervasive Game Experiences in the Older Adult Population -- 1 Introduction -- 2 Background -- 2.1 Proposed Model: Pervasiveness Pyramid -- 3 Materials and Methods -- 3.1 Exploratory and Experimental Stage -- 3.2 Descriptive Stage -- 3.3 Correlational and Selection Stage -- 3.4 Specification Stage -- 4 Conclusions and Future Work -- Appendix A -- References -- Mental Stress Analysis During Visual- And Text-Based Language Learning by Measuring Heart Rate Variability -- 1 Introduction -- 2 Previous Work -- 2.1 Comparative Study of Visual- and Text-Based Language -- 2.2 Hybrid Languages -- 2.3 Gap Between Visual- and Text-Based Languages -- 2.4 Our Previous Research -- 3 Experimental Method -- 3.1 Experiment Participants -- 3.2 Web Service Used for Experiments -- 3.3 Tasks Used for Experiment -- 3.4 Equipment Used in Experiments -- 3.5 Experiment Flow -- 4 Experimental Result -- 5 Analysis -- 5.1 Test of Difference Between Group A and Group B -- 5.2 Test for Population Mean Difference -- 6 Conclusion and Future Work -- References -- The Challenges of Learning Assessment in the Age of Artificial Intelligence -- 1 Introduction -- 2 Methodology -- 3 Challenges of Learning Assessment -- 4 Conclusions -- 5 Limitations and Future Research -- References -- OqKay: A Semi-automatic System Approach to Question Extraction -- 1 Introduction -- 2 Related Works -- 3 Method -- 3.1 Proposed Process -- 3.2 "OqKay" Assessment -- 4 Results and Discussions -- 4.1 Strategies that Help Extract Issues -- 4.2 Teachers' Perceptions When Using the "OqKay" System to Extract Questions -- 5 Final Considerations -- References -- Building and Analyzing an Open Educational Resource Repository on the Inovaula Platform -- 1 Introduction.
2 Reuse of OER in Brazilian Education -- 3 Method -- 3.1 Repository Implementation -- 3.2 Resource Base Creation -- 3.3 OERR Usability Evaluation -- 4 Results -- 4.1 Concept Implementation -- 4.2 Usability Assessment -- 5 Conclusions and Future Work -- References -- L& -- D Model of Information Technology Application for Remote Teaching and Learning in Physical Education at Technical University -- 1 Introduction -- 2 Background and Related Work -- 3 Method -- 4 Results -- 4.1 Model Description -- 4.2 Approbation of the Model -- 4.3 Indicators -- 5 Discussion -- 6 Conclusions -- References -- Maximising Attendance in Higher Education: How AI and Gamification Strategies Can Boost Student Engagement and Participation -- 1 Introduction -- 2 Preliminary Literature Review -- 2.1 Gamification in Education -- 2.2 AI's Role in Revolutionizing Gamification in Education -- 3 Methodology -- 4 Discussion and Conclusion -- References -- Psychometric Properties of a Scale Designed to Assess Satisfaction and Continued Intention to Utilize E-learning Among Nutrition Sciences Students -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Discussion -- 5 Conclusion -- Annex -- Annex 1. Scale items and constructs in English (original) and Portuguese (translation). -- References -- Software Testing in Ecuadorian University Education: A Debt to the Software Industry -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Research Questions -- 3.2 Survey Design -- 3.3 Population, Sample and Data Collection -- 3.4 Threats to Validity -- 4 Execution and Results -- 4.1 General Characteristics of the Respondents -- 4.2 RQ1: How is the Current State of Knowledge Related to Software Testing in Basic and Intermediate Level University Students Who Study Careers Related to Computer Science Prior to Taking the Subject Corresponding to Software Testing?.
4.3 RQ2: Do Teachers of Subjects Related to Programming Use Theoretical and Practical Arguments During Teaching with the Use of Automated Software Testing Tools? -- 4.4 RQ3: Are Upper-Level University Students Motivated to Put Software Testing into Practice as Part of an Indispensable Culture in Software Development in the Industry? -- 5 Conclusions and Discussion -- References -- Examining the Digital Gap: Pre-service Teachers' Needs and Expectations -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Question 1 -- 3.2 Question 2 -- 4 Discussion and Implications -- 5 Limitations -- 6 Conclusion -- References -- Empowering the Teaching and Learning of Geometry in Basic Education by Combining Extended Reality and Machine Learning -- 1 Introduction -- 2 Literature Background on the Use of Extended Reality and Machine Learning on Education -- 3 Proposed Conceptual Model -- 4 Prototype Developed -- 4.1 Technologies Used -- 4.2 Features Implemented -- 4.3 Ongoing and Future Development -- 5 Conclusion -- References -- (Re)thinking Teacher Training in the Digital Age: Teacher Training Models for Online Practice -- 1 Introduction -- 2 Methodology -- 3 Teacher Training Models -- 4 Conclusions -- References -- Gender Bias in Tech - Young People's Perception of STEM in Portugal -- 1 Methodology - Systematic Literature Review -- 2 Systematic Literature Review -- 3 Data Collection and Processing -- 4 Survey Design -- 5 Survey Data -- 6 Data Preparation with Power Query and Power BI -- 7 Data Analysis -- 8 Discussion of Results -- 9 Comparing with Related Works -- 10 Conclusion -- References -- Digital Technology in Higher Education: Exponential Function Case -- 1 Introduction -- 2 The Mathematical Working Space (MWS) -- 3 The Task -- 4 Analysis of Expected Mathematical Production -- 5 Conclusions -- References.
Adapting Traditional Whiteboarding for Remote Education Using Real-Time Handwritten Content Detection System -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 3.1 Design Constraints -- 3.2 Content Detector -- 3.3 User Applications -- 4 Conclusions -- References -- Studies at a Specialized University in the Post-pandemic Period from the Students' Point of View: New Realities and Challenges -- 1 Introduction -- 2 Studies in the Post-pandemic Era -- 3 Post-pandemic Studies in Higher Education Institutions of Health Sciences -- 4 Studies at a Specialized University in the Post-pandemic Period from the Students' Point of View -- 5 Conclusions -- References -- Participating Elementary School Children in UI Design Process of Learning Environment: Case KidNet -- 1 Introduction -- 2 Related Research -- 3 Research Approach -- 3.1 Case Study Description -- 3.2 Case Study Protocol -- 3.3 Case Study Implementation -- 4 Results -- 4.1 Illustrations of UI Designs -- 4.2 Comparison of UI Designs -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Analyzing University Dropout Rates Using Bayesian Methods: A Case Study in University Level in Mexico -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dataset -- 3.2 Procedure -- 3.3 Data Processing and Transformation -- 3.4 Model to Identify School Dropout Patterns -- 3.5 School Dropout Web Platform -- 4 Results -- 5 Discussion and Conclusion -- References -- Cloud Computing Platforms to Improve Shuar Chicham Writing Skills -- 1 Introduction -- 2 Context -- 2.1 Collaborative Learning -- 2.2 E - Writing -- 2.3 Alfresco -- 2.4 Redbooth -- 3 Results -- 4 Conclusions -- References -- Beyond the Screen: Exploring Students' Views on Social Media's Impact in Education -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Rationale for Methodology Selection.
3.2 Data Collection Procedure -- 3.3 Participant Recruitment and Data Collection -- 4 Findings -- 4.1 Attention and Collaboration -- 4.2 Social Media and Collaboration for Academic Work -- 4.3 Choice of Social Media Platforms -- 5 Discussions -- 5.1 How Does the Frequency and Purpose of Social Media Use Influence Students' Academic Attention, Motivation Influenced by Self-Regulation? -- 5.2 How Does Social Media Facilitate Collaboration Among Students, Including Group Project Coordination, Knowledge Sharing, and Peer-To-Peer Learning, and How Does This Collaboration Impact Students' Academic Outcomes? -- 5.3 What Factors Influence Students' Preferences for Specific Social Media Platforms for Academic Purposes? -- 6 Conclusion -- References -- Information Technologies in Radiocommunications -- Radio Coverage Analysis for a Mobile Private Network -- 1 Introduction -- 2 Propagation Models -- 2.1 The ITU-R 1225 Propagation Model -- 2.2 The ITU-R 528-3 Propagation Model -- 2.3 The ITU-R P.2001-4 Propagation Model -- 2.4 The ITU-R 1546-6 Propagation Model -- 2.5 The ITU-R 525/526-11 Propagation Model -- 2.6 The M.2412 UMa Propagation Model -- 3 Implementation of the Private Mobile Network -- 3.1 Limitations of the Implemented MPN -- 4 Results and Analysis -- 5 Conclusion and Future Work -- References -- Tunable Reflector/Absorber Surfaces for Next Generation Wireless Communication Systems -- 1 Introduction -- 2 Switchable Reflector/Absorber Meta-surface Unit Cell -- 2.1 Unit Cell Layout and Principle of Operation -- 2.2 Unit Cell Characterization -- 3 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910857786603321
Rocha Álvaro  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 2
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 2
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (293 pages)
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-60218-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Intelligent and Decision Support Systems -- MAGNAT: Maritime Management Ensemble Learning System -- 1 Introduction -- 2 Related Work -- 3 MAGNAT -- 3.1 Principle -- 3.2 Model Architecture Design -- 3.3 Intelligent Aggregation -- 4 Performance Evaluation -- 5 Discussions -- 6 Conclusion -- References -- Stock Market Prediction: Integrating Explainable AI with Conv2D Models for Candlestick Image Analysis -- 1 Introduction -- 1.1 Objectives of the Research -- 2 Related Work -- 3 Method -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 Model Architecture -- 4.3 Explainable AI Techniques -- 4.4 Evaluation Metrics -- 4.5 Experimental Design -- 4.6 Model Training and Accuracy -- 5 Discussion -- 5.1 Explainability -- 5.2 Insights Gained -- 5.3 Limitations and Future Work -- 6 Conclusion -- References -- Resources Optimization and Value-Based Prioritization for at Risk Cultural Heritage Assets Management -- 1 Introduction -- 2 Literature Review -- 3 Optimization of the Rescue and Recovery Process for Cultural Heritage Assets -- 4 Results and Discussion -- 5 Conclusion -- References -- Expert Systems in Information Security: A Comprehensive Exploration of Awareness Strategies Against Social Engineering Attacks -- 1 Introduction -- 2 Social Engineering -- 2.1 Social Engineering Attacks -- 3 Snowball: Strategy -- 4 Results -- 4.1 Summary Introduction to Results -- 4.2 Overview of Seed Articles -- 5 Discussion -- 6 Conclusion -- 7 Recommendations for Future Research -- References -- Multi-class Model to Predict Pain on Lower Limb Intermittent Claudication Patients -- 1 Introduction -- 2 Case Study -- 2.1 Feature Extraction and Correlation -- 2.2 Pain Prediction Models -- 3 Results -- 3.1 Classification Tree Models -- 3.2 7-Nearest Neighbors Models -- 4 Discussions -- 5 Conclusions and Future Work -- References.
Collaborative Filtering Recommendation Systems Based on Deep Learning: An Experimental Study -- 1 Introduction -- 2 Deep Learning-Based Recommender System -- 2.1 Deep Learning-Based Collaborative Filtering Recommender Systems -- 2.2 Deep Learning Models -- 2.3 Challenges of Collaborative Filtering Recommender Systems Based on Deep Learning -- 3 Results -- 3.1 Experimentl Setup -- 3.2 Experimental Results -- 4 Conclusions and Future Work -- References -- Assessment of LSTM and GRU Models to Predict the Electricity Production from Biogas in a Wastewater Treatment Plant -- 1 Introduction -- 2 Material and Methods -- 3 Experiments -- 4 Results and Discussion -- 5 Conclusions -- References -- Fusing Temporal and Contextual Features for Enhanced Traffic Volume Prediction -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Data Preprocessing -- 3.3 LSTM for Traffic Data Prediction -- 3.4 LSTM and Categorical Features Integration in a Hybrid Neural Network -- 3.5 Evaluation Metrics -- 4 Experimental Results -- 4.1 Training -- 4.2 Performance Comparison for Traffic Volume Prediction -- 4.3 Feature Influence Analysis -- 5 Conclusion and Future Work -- References -- Target-vs-One and Target-vs-All Classification of Epilepsy Using Deep Learning Technique -- 1 Introduction -- 2 Epilepsy Seizure and Computational Techniques -- 2.1 Epilepsy Seizure (ES) -- 2.2 Computational Techniques to Classify the ES -- 3 Propose Framework and Evaluation Setup -- 3.1 Subject Dataset and Preprocessing -- 3.2 Model Evaluation Setup -- 3.3 TvO Strategy for ES Using Deep Learning -- 3.4 TvA Strategy for ES Using Deep Learning -- 4 Results and Discussion -- 5 Conclusion -- References -- Health Informatics -- OralDentalSoft: Open-Source Web Application for Dental Office Management -- 1 Introduction -- 2 Related Work.
3 Description of the Proposed Methodology for Open-Source Development: OSCRUM -- 4 Case Study -- 5 Case Study Results -- 6 Discussion of Results -- 7 Conclusion and Future Work -- References -- A Scoping Review of the Use of Blockchain and Machine Learning in Medical Imaging Applications -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Studies' Selection -- 3.2 Demographic Characteristics -- 3.3 Purposes of the Studies -- 3.4 Experimental Characteristics of the Studies -- 4 Discussion and Conclusion -- References -- The Role of Electronic Health Records to Identify Risk Factors for Developing Long COVID: A Scoping Review -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Studies' Selection -- 3.2 Geographical Distribution -- 3.3 Studies' Design -- 3.4 Risk Factors -- 4 Discussion -- 5 Conclusion -- References -- Machine Learning Approaches to Support Medical Imaging Diagnosis of Pancreatic Cancer - A Scoping Review -- 1 Introduction -- 2 Methods -- 2.1 Databases Search -- 2.2 Inclusion and Exclusion Criteria -- 2.3 Selection Procedures -- 2.4 Synthesis and Reporting -- 3 Results -- 3.1 Selection Process -- 3.2 Demographic Characteristics of the Included Studies -- 3.3 Experimental Characteristics of the Included Studies -- 4 Discussion -- 5 Conclusion -- References -- Virtual Reality in the Pain Management of Pediatric Burn Patients, A Scoping Review -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Selection of the Studies -- 3.2 Geographical Distribution -- 3.3 Studies' Design and Participants -- 3.4 VR Interventions -- 3.5 Clinical Outcomes -- 4 Discussion and Conclusion -- References -- Defining the "Smart Hospital": A Literature Review -- 1 Introduction -- 2 Literature Review -- 2.1 Theoretical Background -- 2.2 Smart Hospital Equipment and Systems -- 2.3 Smart Hospital Services -- 3 A Comparison of Terms -- 3.1 Agile Hospital.
3.2 Green Hospital -- 3.3 Hybrid Hospital -- 4 Conclusions and Future Thoughts -- References -- Deep Learning for Healthcare: A Web-Microservices System Ready for Chest Pathology Detection -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Front-End Development -- 3.2 Back-End Development -- 3.3 AI Model Integration and Pathology Prediction -- 4 Results -- 4.1 Performance Evaluation of the Model -- 4.2 AI Explainability Integration -- 5 Discussion -- 6 Conclusions -- 7 Future Works -- References -- Risk Factors in the Implementation of Information Systems in a Federal University Hospital -- 1 Introduction -- 2 Related Work -- 3 Theoretical Framework -- 3.1 Information Technology Risk -- 3.2 Hospital Information System -- 3.3 Implementation of the Management Application for University Hospitals - AGHU -- 3.4 Description of the Risk Factors Identified in the Literature and Presented by Santos et al. (2020) -- 4 Methodology -- 5 Results -- 5.1 Profile of Specialists by Length of Service -- 5.2 Risk Factor (FR1): Change of Environment -- 5.3 Risk Factor (FR2): Difficulty in Using the System -- 5.4 Risk Factor (FR3): Data Manipulation Failure -- 5.5 Risk Factor (FR4): Lack of Resources -- 5.6 Risk Factor (FR5): Emergence of New Requirements -- 5.7 Risk Factor (FR6): Installation Problem -- 5.8 Risk Factor (FR7): Crashing and Restart Issues -- 5.9 Risk Factor (FR8): Testers Don't Do a Good Job -- 5.10 Risk Factor (RF9): Effect on the Environment -- 5.11 Risk Factor (FR10): Too Many Software Failures -- 5.12 Risk Factor (FR11): User's Resistance to Change -- 5.13 Other Risk Factors Identified -- 5.14 Relative Frequency by Response Category -- 5.15 Degree of Agreement of Answers -- 5.16 TreeMap: Percentage of Comparison of the Risk Factors Found in the Literature in Relation to the Risk Factors Identified in the Implementation of the AGHU.
6 Conclusion -- References -- The Challenges of Blockchain in Healthcare Entrepreneurship -- 1 Introduction -- 2 Theories and Concepts -- 3 Applications of Blockchain to Entrepreneurial Health Projects -- 4 Challenges -- 5 Discussion -- 6 Conclusion and Further Research -- References -- Determinants Associated with Treatment Discontinuation in Tacna Health Network Tuberculosis Patients -- 1 Introduction -- 2 Method -- 3 Results -- 4 Discussion -- 5 Conclusions -- References -- Comprehensive Analysis of Feature Extraction Methods for Emotion Recognition on Motor Imagery from Multichannel EEG Recordings -- 1 Introduction -- 2 Related Work -- 3 Background and Theory -- 3.1 Notch Filtering -- 3.2 High-Pass Filtering -- 3.3 Down-Sampling Filter -- 3.4 CAR Montage Filter -- 3.5 Statistical Features -- 3.6 Wavelet Analysis Features -- 3.7 Higher Order Spectra Features -- 3.8 Hjorth Features -- 3.9 Fractal Dimension Features -- 3.10 GSVM Classifier -- 3.11 CART Classifier -- 4 Methodology -- 4.1 Dataset -- 4.2 Design -- 4.3 Implementation -- 5 Experiments and Results -- 5.1 Experimental Setup -- 5.2 Evaluation Metrics -- 5.3 Results -- 6 Discussion -- 7 Conclusion -- References -- Control of Respiratory Ventilators Using Boussignac Valve -- 1 Introduction -- 2 Model of Respirator-Human Interaction Using Boussignac Valve Simulator -- 2.1 Model of the Boussignac Valve and Control System -- 2.2 Compartment Model of Lung -- 2.3 System Control Based on Boussignac Valve -- 3 Conclusion -- References -- Deep Learning Brain MRI Segmentation and 3D Reconstruction: Evaluation of Hippocampal Atrophy in Mesial Temporal Lobe Epilepsy -- 1 Introduction -- 2 Subjects and MR Imagining -- 3 Proposed Approach for the 2D Image Segmentation and 3D Objects Asymmetry Analysis -- 3.1 Preprocessing and Data Augmentation -- 3.2 Post-processing.
3.3 Hippocampus Volume and Asymmetry Index Computing.
Record Nr. UNINA-9910857787303321
Rocha Álvaro  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 6
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 6
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (394 pages)
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-60328-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- 1st Workshop on Data Privacy and Protection in Modern Technologies -- GDPR-Compliant Data Breach Detection: Leveraging Semantic Web and Blockchain -- 1 Introduction -- 2 Related Work -- 3 Use Case Scenario -- 3.1 System Design and Methodology -- 4 Conclusion and Future Works -- References -- Leveraging Blockchain Technologies for Secure and Efficient Patient Data Management in Disaster Scenarios -- 1 Introduction -- 2 Our Contributions -- 3 State of the Art Related Studies -- 4 Proposed Solution -- 4.1 System Model -- 4.2 System Model Bringing Blockchain into the Use Case -- 5 Challenges (1/3) -- 5.1 Preventing the Pharmacy from Reading Patient's Sensitive Data While Preserving the Correctness of Drug Assignments: -- 5.2 Disallow the Patient to Assign Drugs -- 5.3 Design a Blockchain Based System that Can Welcome New Patients: -- 5.4 Hyperledger Fabric Network Topology and Configuration -- 5.5 Overview and Workflow of the Chaincode: -- 6 Conclusion and Future Works -- References -- Oracles in Blockchain Architectures: A Literature Review on Their Implementation in Complex Multi-organizational Processes -- 1 Introduction -- 2 Methodology -- 2.1 Systematic Review Design -- 2.2 Identification of Sources -- 3 Results -- 3.1 Types of Oracles -- 3.2 Limitations of Oracles -- 3.3 Strengths of Oracles -- 4 Discussion -- 4.1 Essential Characteristics of Blockchain Oracles for Facilitating Complex Multi-organizational Processes. -- 4.2 Impact of Oracle Characteristics on Blockchain Information Integrity. -- 4.3 Differential Oracle Characteristics: Process Type and Organization Influence. -- 4.4 Challenges and Solutions in Deploying Complex Processes in Multi-organizational Blockchain Architectures. -- 5 Conclusions -- References -- 1st Workshop on Railway Operations, Modeling and Safety.
Cost Effective Predictive Railway Track Maintenance -- 1 Introduction -- 2 Theoretical Background -- 2.1 The Effect of the Substructure on Maintenance Costs -- 3 Research and Data Model -- 3.1 Data Simulation -- 3.2 Prediction Model -- 4 Results -- 5 Discussion -- 5.1 Limitations and Future Research -- 5.2 Concluding Remarks -- References -- 3rd Workshop on Digital Marketing and Communication, Technologies, and Applications -- The Impact of Using Digital Platforms and Sharing Online Experiences on the Reputation of a Company -- 1 Introduction -- 2 Literature Review -- 3 Methodology and Data Analysis -- 4 Results -- 5 Conclusions -- References -- Activating a Brand Through Digital Marketing: The Case of 'Os Bonitos' -- 1 Introduction -- 2 Literature Review -- 2.1 Brand -- 2.2 Digital Marketing -- 2.3 Digital Brand Activation -- 3 Research Methodology -- 4 Analysis and Discussion of Results -- 5 Conclusions -- References -- Social Marketing Importance for the Sustainability of Third Sector Organizations -- 1 Introduction -- 2 Theoretical Framework -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusions -- References -- The Impact of Process Automation on Employee Performance -- 1 Introduction -- 2 Literature Review -- 2.1 Characterization of the Automotive Industry at National Level -- 2.2 Organizational Processes -- 2.3 Business Intelligence -- 2.4 Corporate Performance Management -- 3 Methodology -- 3.1 Research Objectives -- 4 Analysis and Discussion of Results -- 4.1 Characterization of the Sample -- 4.2 Descriptive Analysis of the Dimensions -- 5 Conclusions, Limitations, and Future Work -- References -- Effect of Social Media on Workplace Procrastination Among Employees in Bosnia and Herzegovina -- 1 Introduction -- 2 The Phenomenon of Procrastination and Social Media -- 3 Data and Method -- 4 Research Findings -- 5 Discussion.
6 Conclusion -- References -- Challenges of Using E-commerce in Bosnia and Herzegovina from the Perspective of Online Store Owners -- 1 Introduction -- 2 Methodology and Sample Structure -- 3 Presentation of Empirical Research Findings -- 4 Conclusion -- References -- Analyzing São Paulo's Place Branding Positioning in Promotional Videos (2017-2019) -- 1 Introduction -- 2 Methods -- 3 Promotional Video: São Paulo - Embracing Multiculturalism -- 4 Video: Embrace São Paulo -- 5 Video: How Not to Love São Paulo -- 6 Conclusions -- References -- The Influence of TikTok in Portuguese Millennials' Footwear Consumer Behaviour -- 1 Introduction -- 2 Theoretical Framework -- 2.1 The Rise and Power of TikTok -- 2.2 TikTok's Influence on Consumer Behavior -- 2.3 Millennials as Consumers -- 3 Methodology -- 3.1 Research Questions and Objectives -- 3.2 Methods, and Strategies -- 3.3 Survey -- 3.4 Focus Group -- 4 Results -- 4.1 Results from the Survey -- 5 Discussion -- 5.1 Addressing the Research Questions -- 6 Conclusions -- 7 Managerial Implications, Main Limitations, and Further Possibilities -- References -- 4th Workshop on Open Learning and Inclusive Education Through Information and Communication Technology -- Promoting Inclusion in the Brazilian Educational Scenario: Actions for Teacher Training -- 1 Introduction -- 2 Theoretical Foundations -- 2.1 Inclusion in the Brazilian Context -- 2.2 Disabilities -- 2.3 Teacher Training About Inclusion -- 2.4 Related Works -- 3 Methodology -- 4 Results About Teacher Training in the Brazilian Context -- 4.1 Actions to Promote the Inclusion of Elderly People in the Educational Context -- 4.2 Actions to Promote Knowledge About Accessibility in the Context of Higher Education -- 4.3 Actions to Promote the Inclusion of Students with Visual Impairments -- 4.4 Actions to Promote the Inclusion of Students with ASD.
4.5 Actions to Check for Signs of Neurodevelopmental Disorders in Early Childhood Children -- 5 Conclusions -- References -- 1st Workshop on Environmental Data Analytics -- Impact of Preprocessing Using Substitution on the Performance of Selected NER Models - Methodology -- 1 Introduction -- 2 Concept of Pseudo Word Substitution -- 3 Methodology -- 3.1 Data -- 3.2 Replacing Words with Pseudo Words -- 3.3 Model Training -- 3.4 Performing a Test Scenario -- 3.5 Performance Evaluation -- 3.6 Experiment Limitations -- 4 Conclusion -- References -- Correlation n-ptychs of Multidimensional Datasets -- 1 Introduction -- 2 Correlation n-ptychs Nested in Multidimensional Datasets -- 3 Pattern Recognition in Renewable Energy Dataset with the Use of Correlation n-ptychs -- 4 Conclusion -- References -- Performance Analysis of the Data Aggregation in the Oracle Database -- 1 Introduction -- 2 SQL Statement Execution -- 3 Problem -- 4 Proposed Solutions and Enhancements -- 5 Computational Study -- 6 Results and Conclusions -- References -- BipartiteJoin: Optimal Similarity Join for Fuzzy Bipartite Matching -- 1 Introduction -- 2 Related Work -- 3 Optimal Count Q-Gram Filter -- 4 Approximate Count Q-Gram Filter -- 5 Experiments -- 6 Conclusion -- References -- Scalable Similarity Joins for Fast and Accurate Record Deduplication in Big Data -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Self-Join in Similarity Space -- 4.1 Optimal Count Q-Gram Filter -- 4.2 Approximate Count Q-gram Filter -- 5 Experiments -- 6 Conclusion -- References -- Impact of Preprocessing Using Substitution on the Performance of Selected NER Models - Results -- 1 Introduction -- 2 Concept of Pseudo Word Substitution -- 3 Methodology -- 3.1 Data -- 3.2 Models Implementations -- 3.3 Replacing Words with Pseudo Words -- 3.4 Test Scenarios -- 3.5 Evaluation -- 4 Results.
5 Discussion and Conclusions -- References -- Oracle APEX as a Tool for Data Analytics -- 1 Introduction -- 2 Oracle APEX and Cloud Integration -- 2.1 Oracle APEX Overview -- 2.2 Oracle Cloud Integration -- 2.3 Oracle Autonomous Database -- 2.4 Oracle Cloud Infrastructure Services -- 3 Climate Anomaly Detection Application -- 3.1 Climate Anomaly Detection Principle -- 3.2 Receiving and Loading Climate Data -- 3.3 Showcase of Climate Anomaly Detection Application -- 4 Conclusion -- References -- Phishing Webpage Longevity -- 1 Introduction -- 2 Data Collection Approach -- 2.1 Solution for Collecting the Phishing Webpages Status -- 3 Data Preparation -- 3.1 Confirmed Phishing URLs -- 3.2 Time-Delay Impact -- 3.3 Duplicate Records Removal -- 3.4 Adjustment of Status for Small Pages -- 4 Phishing Webpages Longevity Analysis -- 4.1 Longevity During the First Ten Minutes -- 4.2 Longevity Within First Two Weeks -- 4.3 Longevity Within Months -- 4.4 Volatility of Ratio Between Active and Inactive Webpages -- 4.5 Ratio of Active Webpages by the Source Data Feed -- 4.6 Median and Mean Lifespan of Active Webpage -- 5 Summary -- References -- 1st Workshop on AI in Education -- A Conceptual Architecture for Building Intelligent Applications for Cognitive Support in Dementia Care -- 1 Introduction -- 2 Methodology -- 2.1 Dementia Overview -- 2.2 Information Systems for Mental Diseases -- 2.3 Brain and Cognitive Games -- 3 Conceptual Architecture for Cognitive Support in Dementia Care -- 3.1 Functional Requirements -- 3.2 Conceptual Architecture -- 3.3 Prototype -- 4 Conclusion -- References -- 1st Workshop on Artificial Intelligence Models and Artifacts for Business Intelligence Applications -- Improving Customer Service Through the Use of Chatbot at Enma Spa Huancayo, Peru -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion.
5 Conclusions.
Record Nr. UNINA-9910861098203321
Rocha Álvaro  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 5
Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 5
Autore Rocha Álvaro
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (326 pages)
Altri autori (Persone) AdeliHojjat
DzemydaGintautas
MoreiraFernando
Poniszewska-MarańdaAneta
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-60227-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Organizational Models and Information Systems -- Implementing Scaled Agile Framework Methodology Principles in the Quality Assurance Process -- 1 Introduction -- 2 Literature Review -- 3 Structured Methodology for Implementing SAFe Principles in QA -- 3.1 Area 1 - Team Increment -- 3.2 Area 2 - System Increment -- 3.3 Area 3 - Solution Increment -- 3.4 Area 4 - Release Increment -- 4 Implementing SAFe Principles in QA - Case Study -- 4.1 Area 1 - Team Increment -- 4.2 Area 2 - System Increment -- 4.3 Area 3 - Solution Increment -- 4.4 Area 4 - Release Increment -- 5 Discussion -- 6 Conclusion -- References -- Using Knowledge Graph and KD-Tree Random Forest for Image Retrieval -- 1 Introduction -- 2 Related Works -- 3 Proposed Theoretical -- 3.1 A KD-Tree Random Forest for Visual Relationship Classification -- 3.2 Process of Building Relationship Graph -- 3.3 Process of Building Knowledge Graph -- 4 A Model of Proposed Image Retrieval -- 5 Experiment and Evaluate Results -- 6 Conclusion and Development Orientation -- References -- Blockchain in the Portuguese Public Electronic Service -- 1 Introduction -- 2 Blockchain in Portuguese Electronic Service -- 3 Method and Strategic Areas -- 3.1 Spatial -- 3.2 Demography -- 3.3 Health -- 3.4 Water -- 3.5 Energy -- 3.6 Mobility -- 3.7 Climate and Meteorology -- 4 Discussion -- 5 Conclusion -- References -- Social Media Use: How Does Critical Consumption of News Impact Voting Persuasion in Angola? -- 1 Introduction -- 2 Political Participation -- 3 Hypotheses Development -- 3.1 Critical Consumption and News Exposure -- 3.2 News Exposure and Voting Persuasion -- 3.3 Age and Voting Persuasion -- 4 Methodology -- 5 Results -- 5.1 Multigroup Analysis -- 6 Discussion -- 7 Conclusions -- References.
Exploring the Performance of Large Language Models for Data Analysis Tasks Through the CRISP-DM Framework -- 1 Introduction -- 2 Literature Review -- 2.1 CRISP-DM -- 2.2 Large Language Models -- 3 Methodology -- 4 Results -- 4.1 Discussion -- 4.2 Main Contributions -- 5 Conclusion -- References -- An Exploratory Big Data Approach to Understanding Commitment in Projects -- 1 Introduction -- 2 Review of Literature -- 3 Research Methodology -- 4 Findings -- 5 Future Research Directions -- 6 Conclusion -- References -- Low-Cost System for Monitoring Water Quality Parameters in Lentic and Lotic Ecosystems -- 1 Introduction -- 2 State of the Art -- 3 Requirements Analysis -- 4 Implementation -- 5 Simulation and Testing -- 6 Conclusions and Future Work -- References -- A Unified Approach to Real-Time Public Transport Data Processing -- 1 Introduction -- 2 Transport Systems Structure Modeling -- 3 Proposed Solution -- 4 Results and Evaluation -- 5 Discussion -- 6 Conclusion -- References -- Proportional Integral and Derivative Auto Tuning of Industrial Controllers Using the Relay Feedback Method -- 1 Introduction -- 2 Methodology -- 2.1 Data Collection -- 2.2 Generation of the Mathematical Model of the Level Process -- 3 Analysis and Results -- 4 Conclusions -- References -- Reinforcement Learning for Process Mining: Business Process Optimization -- 1 Introduction -- 2 Data Description -- 2.1 Event Log Structure -- 2.2 Select a Bottleneck State -- 2.3 Apply the Absorption State Effect -- 2.4 Generate the Source and Target Activities from the Log Event -- 2.5 Eliminate Short-Path Cases and Calculate the Transition Probability -- 3 Methodology -- 3.1 Q-Learning Algorithm -- 3.2 Deep Q-Network Algorithm -- 4 Results -- 5 Conclusion -- References -- SAMSEF: An Agile Software Maintenance Leveraging Scrum Framework for Improved Efficiency and Effectiveness.
1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Empirical Study -- 3.2 Proposed Framework -- 3.3 Case Study -- 4 Findings -- 5 Conclusion -- References -- Software and Systems Modeling -- Distribution of Invalid Users on an SSH Server -- 1 Introduction -- 2 Theory -- 3 Methods -- 4 Dataset -- 5 Model Development -- 6 Results -- 7 Security Solution -- 8 Discussion and Conclusions -- References -- BERT Transformers Performance Comparison for Sentiment Analysis: A Case Study in Spanish -- 1 Introduction -- 1.1 General Objective -- 1.2 Specific Objectives -- 2 Background -- 2.1 Encoder -- 2.2 Decoder -- 2.3 Attention -- 2.4 BERT Versions -- 3 Related Works -- 4 Experimentation -- 5 Analysis of the Results -- 6 Conclusions -- References -- Open Software Catalogue - Supporting the Management of Research Software -- 1 Introduction -- 2 Background -- 3 Research Software -- 3.1 Issues and Problems -- 4 Overview of Existing Solutions -- 5 Open Software Catalogue -- 5.1 Solution -- 6 Conclusions -- References -- Semantic Analysis of API Blueprint and OpenAPI Specification -- 1 Introduction -- 2 Research Overview -- 2.1 Technological Background -- 2.2 Related Work -- 3 Implementation -- 3.1 Semantic Analysis -- 3.2 Mapping of apib to oas -- 4 Evaluation and Discussion -- 5 Conclusion -- References -- Classification Model for the Detection of Anxiety in University Students: A Case Study at UNMSM -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Preprocessing -- 3.3 Training -- 3.4 Hyperparameter Setting -- 4 Analysis and Interpretation of Results -- 5 Discussion -- 6 Ethical Considerations -- 7 Conclusions and Future Works -- References -- Synergizing First-Principles and Machine Learning: Predicting Steel Flatness in the Era of Digital Twins and Physics-Informed Intelligence -- 1 Introduction.
2 Basics of Strip Flatness -- 3 Digital Twin System -- 4 Flatness Prediction Algorithm -- 4.1 First Principle Models -- 4.2 Resulting Prediction Model -- 4.3 Sensitivity Analysis -- 5 Summary -- References -- Software Systems, Architectures, Applications and Tools -- Solving the Relational Data Access Problem with Data Access Services -- 1 Introduction -- 2 Data Access Services -- 2.1 Query Service -- 2.2 Command Service -- 2.3 Repository Service -- 3 Reference Engine -- 3.1 Service Builder -- 3.2 Service Engine -- 4 Complexity Scale -- 5 Complexity Test -- 5.1 Test Service -- 5.2 Test Result -- 6 Advantages -- 7 Summary -- References -- Baseline Proposal of User Experience Practices in the Software Engineering Process: Global MVM Case -- 1 Introduction -- 2 Methodology -- 3 Background -- 4 Solution -- 4.1 Diagnostic -- 4.2 Baseline Construction -- 5 Results -- 5.1 Expert Evaluation -- 5.2 Validation of UX Practices -- 6 Conclusions -- References -- Exploring the Convolutional Neural Networks Architectures for Quadcopter Crop Monitoring -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 4 Results and Findings -- 5 Conclusion -- References -- The State of Smalltalk to Java Transformation: Approaches Review -- 1 Introduction -- 2 About Languages -- 2.1 Smalltalk -- 2.2 Java -- 2.3 Language Differences -- 3 Previous Work -- 3.1 Foundations -- 3.2 Transformation via Translation -- 3.3 Alternative Solutions -- 4 Comparisons -- 5 Conclusion -- References -- A Self-adaptive HPL-Based Benchmark with Dynamic Task Parallelism for Multicore Systems -- 1 Introduction -- 2 Background -- 2.1 Linpack Benchmark -- 2.2 Eigen Library -- 3 Related Work -- 4 SA-HPL for Multicore Systems -- 5 Experiments and Evaluations -- 5.1 Baseline and Self-adaptive Scheduling -- 6 Conclusion and Future Work -- References.
Computer Systems Analysis Focused on the Detection of Violence Against Women: Challenges in Data Science -- 1 Introduction -- 1.1 Study Contribution -- 2 Materials and Methods -- 2.1 Research Questions -- 2.2 Selection Criteria -- 2.3 Inclusion Criteria -- 2.4 Exclusion Criteria -- 3 Results -- 3.1 Analysis of Relevant Findings -- 4 Discussion -- 5 Conclusions -- References -- Azure Kubernetes Services WebRouting AddOn -- 1 Introduction -- 2 Azure Kubernetes Services -- 2.1 General Kubernetes Concepts -- 2.2 Azure Kubernetes Services and NGINX Ingress Controller -- 2.3 Other Azure Concepts -- 3 Experimental Setup and Benefits -- 4 Web Application with WebRouting AddOn -- 4.1 User Experience -- 4.2 Web Application Routing Deployment -- 4.3 Grant Permission for Web Application Routing -- 4.4 Demo Start -- 5 Conclusions -- References -- Clustering and Optimization Algorithms to Enable Reliable 6G Mobile Molecular Communications -- 1 Introduction -- 2 State of the Art on Mobile Molecular Communications -- 3 Achieving Reliable Massive Mobile Molecular Communications -- 3.1 Evaluation of the Distribution and Position of Biomachines -- 3.2 Identity Management and Tracking: Reliable Communications -- 4 Experimental Validation: Simulation and Results -- 5 Conclusions and Future Works -- References -- Security Assessment of an Internet of Things Device -- 1 Introduction -- 1.1 Current Insights in Internet of Things Security -- 1.2 Paper Objectives and Structure -- 2 Vulnerability Assessment of the IoT Device -- 2.1 Research Methodology -- 2.2 Uncovering the Credentials Through a Brute-Force Attack -- 2.3 Reverse Engineering the Firmware -- 3 Automation Proof of Concept Application -- 3.1 Security Assessment Application -- 3.2 Validation of the Proposed Investigation -- 4 Conclusions -- 4.1 Paper Contributions -- 4.2 Future Directions of Development.
References.
Record Nr. UNINA-9910861095403321
Rocha Álvaro  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui