Fourth International Congress on Information and Communication Technology : ICICT 2019, London, Volume 2 / / edited by Xin-She Yang, Simon Sherratt, Nilanjan Dey, Amit Joshi |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XIV, 539 p. 233 illus., 142 illus. in color.) |
Disciplina | 006.312 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Electrical engineering
Data mining Computer security Communications Engineering, Networks Data Mining and Knowledge Discovery Systems and Data Security |
ISBN | 981-329-343-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | PESOHA: Privacy-preserving Evaluation System for Online Healthcare Applications -- Computer Vision and Hybrid Reality for Construction Safety Risks: a Pilot Study -- Data Reduction Using NMF for Outlier Detection Method in Wireless Sensor Networks -- Measuring Customer Satisfaction on Software Based Products: A Case study of ASAS-ERP Software at the University of Botswana -- To Develop a Water Quality Monitoring System for Aquaculture Areas Based on Agent Model -- Identifying Intrusions in Dynamic Environments using Semantic Trajectories and BIM for Worker Safety -- The ontological Approach in Organic Chemistry Intelligent System Development -- Effective way of Deriving the Context from a Handwritten Image/Object -- E-Voting System Based on Multiple Ballots Casting -- Against Malicious SSL/TLS Encryption: Identify. |
Record Nr. | UNINA-9910373901003321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Fourth International Congress on Information and Communication Technology : ICICT 2019, London, Volume 1 / / edited by Xin-She Yang, Simon Sherratt, Nilanjan Dey, Amit Joshi |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (516 pages) |
Disciplina | 004 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Electrical engineering
Data mining Computer security Communications Engineering, Networks Data Mining and Knowledge Discovery Systems and Data Security |
ISBN | 981-15-0637-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910366610803321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 3 |
Autore | Yang Xin-She |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (663 pages) |
Altri autori (Persone) |
SherrattSimon
DeyNilanjan JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN |
9789819735594
9789819735587 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- A Transformer and Federated Learning Techniques for Detecting DDoS Attacks in IoT Environments -- 1 Introduction -- 2 Related Work -- 3 Structural Model -- 4 Experimental Approach -- 4.1 Datasets Description -- 4.2 Data Pre-processing -- 5 Experimental Results -- 5.1 Results of CICDDoS2019 Dataset -- 5.2 Results of TON-IoT Dataset -- 5.3 Results of LATAM-DDoS-IoT Dataset -- 6 Conclusion and Future Work -- References -- Sensory Substitution in Music: Enhancing Deaf Perception Through Vibrotactile Feedback -- 1 Introduction -- 2 Method -- 2.1 The Audio File -- 2.2 Sinusoidal Modeling + FX -- 2.3 HRTF (Head-Related Transfer Function) -- 2.4 Hardware Implementation -- 3 Experiment -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Bridging Nanomachines: Bidirectional Channel in a Bio-inspired System -- 1 Introduction -- 2 Model -- 3 Results Verification Using PRISM Tool -- 4 Conclusions -- References -- Distributed Deep Learning-Based Model for Financial Fraud Detection in Supply Chain Networks -- 1 Introduction -- 2 Related Work -- 3 Distributed Deep Learning-Based Model for Financial Fraud Detection in Supply Chain Networks -- 3.1 Apache Spark on Cloud Databricks -- 3.2 Distributed Deep Learning-Based Model -- 3.3 Training and Evaluation Metrics -- 4 Case Study -- 4.1 Dataset and Data Preparation -- 4.2 Class Imbalance Problem and Data Splitting -- 5 Result and Discussion -- 6 Conclusion -- References -- Smart Living -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Design -- 3.2 Method -- 3.3 Controller -- 4 Results -- 4.1 Each System Performance -- 4.2 Feedback on User Satisfaction Gathered from Frequent Room Occupants -- 5 Conclusions -- References.
A Performance Comparison Between a Digital Shadow and a Digital Twin in a Mixed Model Stochastic System -- 1 Introduction -- 2 Background -- 2.1 Mixed Model Stochastic System -- 2.2 Current Techniques Deployed for Cycle Time Reduction -- 2.3 Digital Shadow (DS) vs Digital Twin (DT) -- 3 Methodology -- 3.1 The Experimental Setup -- 3.2 The Development of the Digital Shadow and Digital Twin -- 4 Results -- 4.1 Digital Shadow -- 4.2 Digital Twin -- 4.3 A Comparison Between the Digital Shadow and the Digital Twin -- 5 Conclusion and Future Works -- References -- Characteristics for HVDC GIS/GIL Spacer Under DC Superimposed Lightning Impulse Voltage Conditions -- 1 Introduction -- 2 Methodology and Governing Equations -- 2.1 CF3I and CO2 Microscopic Ion Collision and Reaction Rate -- 2.2 Physical Field -- 3 Results -- 3.1 Electric Field Calculation Under DC Superimposed Lightning Impulse Voltage -- 4 Conclusions -- References -- CCMT: A Code Complexity Measuring Tool -- 1 Introduction -- 2 The CCC Measure -- 3 Methodology -- 4 Proposed System -- 5 Results -- 6 Discussion -- 7 Conclusion -- References -- Pertinent Issues in Artificial Intelligence Systems Adoption -- 1 Introduction -- 2 Methodology -- 3 Theoretical Brief -- 4 Results -- 4.1 Management Support -- 4.2 Lack of Skills -- 4.3 Data Security and Privacy -- 4.4 Ethical Issues -- 5 Discussion -- 5.1 Limitations and Future Suggestions -- 6 Conclusion -- References -- Facial Expression Recognition: A Lite Deep Learning-Based Approach -- 1 Introduction -- 2 Method -- 2.1 Preprocessing -- 2.2 Facial Expression Recognition System -- 2.3 Dataset -- 3 Experimental Results and Evaluation -- 4 Discussion -- References -- Bilinear Pooling of Transformer Embeddings for Blind Image Quality Assessment -- 1 Introduction -- 2 Related Work -- 2.1 Blind Image Quality Assessment -- 2.2 Bilinear Pooling. 3 Methodology -- 3.1 Feature Extraction -- 3.2 Quality Assessment Model -- 3.3 Learning Objective -- 4 Evaluation -- 4.1 Experiment Setup -- 4.2 Results and Analysis -- 4.3 Ablation Studies -- 5 Conclusion -- References -- E-voting and E-recapitulation System Using Smart Cards and Smart Contracts on the Ethereum Blockchain -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 System Design -- 3.2 Threat Modeling and Testing Scenario -- 4 Results and Discussion -- 4.1 Implementation -- 4.2 Security Analysis -- 4.3 Discussion -- 5 Conclusion -- References -- EnsUNet: Enhancing Brain Tumor Segmentation Through Fusion of Pre-trained Models -- 1 Introduction -- 2 Materials and Methods -- 2.1 The Proposed Medical Image Segmentation System -- 2.2 Models Implementation and Proposed EnsUNet Method -- 2.3 Fusion Score -- 3 Experimental Evaluation -- 3.1 Data Augmentation -- 3.2 Evaluation Metrics -- 3.3 Comparison with State of the Art -- 3.4 K-Cross Validation -- 3.5 Evaluation of the Experimental Hypothesis -- 4 Comparison and Discussion -- 4.1 Predictions of Individual Models and Proposed EnsUNet -- 5 Conclusion -- References -- Problems of Optimizing Informaciologically Complicated Systems for Technical Support of Medical Rehabilitation in the Modern Context -- 1 Introduction -- 2 Optimal Time Period for Operating Repair of Physical Therapy Equipment -- 3 Calculation of Weight and Volume of the Equipment for Technical Support of Medical Rehabilitation -- 4 Derivation of a Generalized Functional-Statistical Criterion for Assessment of Efficiency, Quality and Optimization -- 5 Some Particular Statistical Criteria for Assessing the Efficiency of the Informaciologically Complicated Systems of Technical Support for Medical Rehabilitation -- 6 Conclusions -- References. Determining the Physiological Cost of a Military Serviceman's Activity in the Field Using Innovative Miniature Devices and Advance ECG Analysis: Different Scenarios of Use -- 1 Introduction -- 2 Materials and Methods -- 3 Determination of Functional Reserve During the Command-and-Staff Game on the Training Ground -- 4 Determination of the Functional Reserve During the Training of SOF Military Personnel -- 5 Determination of Functional Reserve Using Long-Term Monitoring by Wearable Devices During Performance of Senior Officers' Daily Duties -- 6 Determination of Functional Reserve Using Miniature Devices with Finger Electrodes in the Unit at the Stage of Preparation for Participation in Combat Operations and During Measures to Restore Combat Capability -- 7 Conclusions -- References -- Food-Talks: Food Ordering and Delivering Application for Visually Challenged -- 1 Introduction -- 1.1 Functionality and User Experience -- 1.2 Accessibility and Inclusivity -- 1.3 Operational Efficiency -- 1.4 Feedback and Improvement -- 2 Literature Review -- 3 Methodology -- 3.1 System Familiarization -- 3.2 Requirements Assessment -- 3.3 Frontend and Backend Development -- 4 Proposed System's Functionality -- 4.1 User Registration and Login Management -- 4.2 Food Menu Management -- 4.3 Product Identification -- 4.4 Order Tracking -- 4.5 User Interaction and Accessibility -- 4.6 Voice Command Recognition -- 4.7 Order Customization and Order Verification -- 4.8 Desktop Application Modules -- 4.9 Integration with Alan AI -- 4.10 User Testing and Evaluation -- 4.11 Data Analysis and UI/UX Assessment -- 5 Results and Discussion -- 6 Conclusion -- References -- Enhancing Diabetic Retinopathy Grading with Advanced Diffusion Models -- 1 Introduction -- 2 Materials and Methods -- 2.1 IDRiD Dataset -- 2.2 Framework Description -- 2.3 Data Augmentation. 3 Results and Discussion -- 3.1 Data Augmentation Results -- 3.2 Classification Results -- 4 Conclusion -- References -- Fuzzy Logic-Based Metric for Machine Translation Evaluation -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 3.1 Step 1: Fuzzy-Based Evaluation Metric Development. -- 3.2 Step 2: Neural Machine Translation Prototype -- 3.3 Step 3: Turkish Sentence Translation. -- 3.4 Step 4: Translation Result Evaluation -- 4 Proposed Fuzzy-Based Automatic Translation Evaluation Metric -- 4.1 Concept of Fuzzy Logic -- 4.2 The Proposed Fuzzy-Based Metric -- 4.3 Execution Steps of the Proposed Fuzzy-Based Metrics -- 4.4 Bilingual Evaluation Understudy -- 5 Results and Finding -- 6 Conclusion and Future Directions -- References -- CodeRookie: Educational Java Programming Environment for Beginners -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Online Java Compiler -- 3.2 Save Compiled Code History -- 3.3 AI-Driven Feedback Tool -- 3.4 Java Theory Learning Point -- 3.5 Community Support Forum -- 4 Discussion -- 5 Conclusion -- References -- An Internet of Medical Things for Covid-19 Health Indicators Monitoring -- 1 Introduction -- 2 Proposed IoMT System for Monitoring Health Indicators of Covid-19 Patients -- 2.1 System Architecture and Principle -- 2.2 Hardware Specification -- 3 Implementation Results Discussions -- 4 Conclusions and Future Works -- References -- Method for Statistical Evaluation of Nonlinear Model Parameters in Statistical Learning Algorithms -- 1 Methodology Grounding -- 1.1 Evaluation of the Existing Methods -- 2 Suggested Methodology -- 3 Experiments -- 3.1 Transcendental Model -- 3.2 Exponential Model -- References -- Deep Auscultation with Demographic Data: Detecting Respiratory Anomalies Using Convolutional Neural Networks and Autoencoders -- 1 Introduction -- 2 Related Work. 2.1 Multi-modal Data in Deep Learning. |
Record Nr. | UNINA-9910878052603321 |
Yang Xin-She | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 4 |
Autore | Yang Xin-She |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (656 pages) |
Altri autori (Persone) |
SherrattSimon
DeyNilanjan JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN |
9789819735624
9789819735617 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Impact of Institutional Support on First-Year Undergraduate Students' Cybersecurity Compliance Behaviour -- 1 Introduction -- 1.1 Research Questions -- 2 Literature Review -- 2.1 Cybersecurity Compliance (CSC) -- 3 Theoretical Foundation -- 3.1 Theory of Planned Behaviour -- 3.2 The Formation of Habits -- 3.3 Conceptual Framework and Hypotheses Generation -- 3.4 Institutional Support (IS) -- 3.5 Self-efficacy (SE) -- 3.6 Response Efficacy (RE) -- 3.7 Will -- 3.8 Cybersecurity Compliance Behaviour (CCB) -- 4 The Method -- 4.1 The Design -- 4.2 Participants -- 4.3 The Instrument -- 4.4 Data Analysis Techniques -- 5 Data Analysis and Results -- 5.1 The Measurement Model -- 5.2 Convergent Validity -- 5.3 Discriminant Validity -- 5.4 The Structural Model -- 5.5 Mediation Analysis -- 6 Discussion of Findings -- 7 Conclusion -- 8 Limitations of the Study and Prospects -- References -- CodeConnect Classroom: A Coding Education Tool Enabling Collaborative Learning, Real-Time Feedback, and Student Engagement -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 WebSocket Integration -- 3.2 Room Creation and Identification -- 3.3 Features of the Editor -- 3.4 Real-Time Interaction -- 3.5 User Guidance -- 3.6 Security Measures -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- TourMate: Enhancing Tourist Experiences Through Personalized Guidance with Weather Prediction -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Website -- 3.2 Integration of Essential API -- 3.3 Google Map Integration with Hidden Place Feature -- 4 Proposed System -- 4.1 Key Features of the TourMate System -- 5 Results and Discussion -- 6 Conclusion -- References -- The Use of Augmented Reality Tools in Marketing: Opportunities and Limitations in the Latvian Market -- 1 Introduction.
2 The Use of Augmented Reality in Latvia -- 3 What Is Preventing You Use It? -- 4 What Motivates the Use of AR? -- 5 How Virtual Reality Affects Consumers -- 6 Future Opportunities for AR -- 7 Discussion -- 8 Conclusions -- References -- CodePedia: Crafting the Ultimate Java Learning Odyssey for Novice Programmers -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Text Editor -- 3.2 Compiler -- 3.3 Error Messages with Explanation Generator -- 3.4 Visual Debugger -- 3.5 Hinting System -- 3.6 Tutorial Hub -- 3.7 Quiz Challenges -- 3.8 Real-Time Java Challenging Platform -- 3.9 Ranking System -- 4 Results and Discussion -- 5 Conclusion -- References -- Cognitive Complexity Analysis and Optimization Tool for Java -- 1 Introduction -- 2 Related Work on Calculating Cognitive Complexity -- 3 Methodology -- 3.1 Metrics Overview -- 3.2 System Overview -- 4 Conclusion -- References -- Social Entrepreneurship and Artificial Intelligence: How Entrepreneurs Shape Innovation? The Lebanese Case -- 1 Introduction -- 2 Introduction -- 2.1 Social Entrepreneurship (SE) -- 2.2 Artificial Intelligence (AI) -- 2.3 AI and Social Entrepreneurial Decision-Making -- 3 Methodology -- 3.1 The Context of the Study -- 3.2 Exploratory Study -- 4 Findings, Discussion, and Implications -- 5 Conclusion, Limitations, and Future Research -- References -- Enterprise Intelligent Management Analysis and Visualization Based on Data Mining -- 1 Introduction -- 2 The Proposed Method -- 2.1 Intelligent Financial Health Situation Analysis -- 2.2 Intelligent Investment Value Analysis -- 3 Analysis and Visualization of Enterprise Smart Management Results -- 3.1 The Analysis and Visualization of Balance Sheet -- 3.2 The Clustering Analysis and Visualization of Financial Health Situation -- 3.3 The Analysis, Prediction, and Visualization of the Stock Price -- 4 Conclusion. References -- A Novel Approach to Regional E-government Measurement: The Case of Georgia -- 1 Introduction -- 2 Literature Review -- 2.1 The Concept of E-governance and the Proposed Methods of Assessment of the Level of Development of E-government -- 2.2 Research Problem -- 2.3 Proposed Index -- 3 Methodology -- 4 Model's Consequences -- 5 Conclusion -- References -- Impact of Police Communication Channels on the Police and the Suburban and Rural Community During the COVID-19 Pandemic -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 3.1 Sample -- 3.2 Instrument and Data Collection -- 4 Analytical Plan -- 5 Findings -- 6 Discussion and Conclusion -- References -- The Role of Artificial Intelligence in the Process of Improving Communication Systems of Strategic Objects -- 1 Introduction -- 2 Theoretical Framework -- 3 Main Research Questions -- 4 Research Methodology -- 5 Main Findings and Discussion -- 6 Conclusion -- References -- Secure Connections in Local Networks Despite Multiple Stakeholders -- 1 Introduction -- 2 Our Approach -- 2.1 Device Attestation -- 2.2 Runtime Authentication Using PKI -- 2.3 Multiple Stakeholders -- 2.4 Loss of a Certificate -- 2.5 Secure Reset Without Enabling DoS Attacks -- 3 PKI2go -- 4 Conclusion -- References -- Innovative Solar Battery System Integration for Eco-Friendly Electric Vehicle Charging Stations -- 1 Introduction -- 2 Materials and Method -- 2.1 Micro-grid Modeling -- 2.2 Energy Management Scenario -- 3 Results -- 3.1 Case 1: The Electric Vehicle is Connected to the System -- 3.2 Case 2: The Electric Vehicle is not Connected to the System -- 4 Conclusion -- References -- English-to-Bangla Language Translation: A Comparative Study of GPT-3 and Attention-Based Encoder Decoder -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Model -- 3.3 Encoding. 3.4 Attention Mechanism -- 3.5 Decoding -- 3.6 GPT-3 -- 4 Experiment Results -- 4.1 Embedding-Based Analysis -- 4.2 BLEU Score Analysis -- 4.3 Human Based-Manual Analysis -- 5 Conclusion -- References -- Covering-Based Feedback Verification in Gazebo Simulation for Husky Mobile Robot -- 1 Introduction -- 2 Closed-Loop Design Method -- 2.1 Covering Method -- 2.2 Suggested Approach of Feedback Design -- 3 Feedback Design for a Given Model -- 3.1 Kinematics Model of Husky Robot -- 3.2 Model Based Feedback Design -- 4 Simulation Results -- 5 Conclusion and Future Work -- References -- Machine Learning and Multi-criteria Analysis on the Forex Market -- 1 Introduction -- 2 Related Works -- 3 Trading Systems and Signals -- 4 Efficiency Measures -- 5 Multi-criteria Decision Making Problem -- 6 Numerical Experiments -- 7 Conclusions -- References -- Toward a Readiness Assessment Model for Technology Adoption in Small and Medium Agricultural Industry -- 1 Introduction -- 2 Identified Problem -- 3 Theoretical Framework -- 3.1 Research Questions -- 3.2 State of the Art -- 3.3 Key Definitions -- 4 Readiness Assessment Model for Technology Adoption Validation -- 5 Research Progress -- 6 Conclusions and Future Work -- References -- Impact of Artificial Intelligence and Human Factors in Hybrid Intelligence Dentistry -- 1 Introduction -- 2 Impact of Artificial Intelligence and Human Factors in Hybrid Intelligence Dentistry (Strengths and Weaknesses) -- 3 Clinical Examples from Practice Using DIAGNOCAT AI in Dentistry Related to Human Factors -- 4 Results and Discussion -- 5 Conclusion -- References -- Visual Explanation of Classification Model Using Prototypical Contrastive Embedding in Cervical Cytology -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Problem Formulation -- 3.2 Model -- 3.3 Training -- 3.4 Test and Visualization -- 4 Experiments. 4.1 Dataset -- 4.2 Implementation -- 4.3 Experiment Setting -- 4.4 Result -- 5 Conclusions -- References -- GooseFlowMeter: A Flow Extractor for the Analysis of GOOSE Messages -- 1 Introduction -- 2 GOOSE in a Nutshell -- 3 IEC 61850 Vulnerabilities -- 4 GooseFlowMeter -- 4.1 Flow-Level Network Traffic -- 4.2 Flow Definition -- 4.3 Features Selection -- 5 Experiments and Results -- 5.1 Testbed Environment -- 5.2 Metrics -- 5.3 Classification Algorithms -- 5.4 Results -- 6 Related Work -- 7 Conclusion -- References -- Scalable, Masterless, Distributed, and Redundant Motor Control for PLC Using Object Orientation and Recursivity -- 1 Introduction -- 2 Background -- 2.1 Modern PLCs -- 2.2 Modern PLC Programming -- 3 Related Work -- 4 System Design -- 4.1 Hardware Setup -- 4.2 Software Setup -- 4.3 Implementation Setup -- 5 Realization and Discussion -- 6 Conclusion and Future Scope -- References -- The Use of User-Centred Design Strategies to Design Wearable Mobile Health Technologies: A Systematic Literature Review -- 1 Introduction -- 2 UCD Strategies -- 3 Research Method -- 3.1 Research Objective -- 3.2 Search Terms -- 3.3 Selection Criteria -- 3.4 The Selection Process -- 3.5 The Data Extraction and Analysis Process -- 4 Findings -- 4.1 Most Used UCD Strategies -- 4.2 Health Conditions Included in the Articles -- 4.3 Wearable Technologies -- 5 Discussion -- 5.1 Interactive Requirements' Gathering -- 5.2 Joint Design -- 5.3 Usability and Functionality Evaluation -- 5.4 Scope of Applicability of UCD Strategies -- 6 Conclusion -- References -- Automatic Instance Segmentation Labeling of Road Sign Image from Bounding Box Data -- 1 Introduction -- 2 Related Works -- 2.1 Image Labeling -- 2.2 GrabCut -- 3 Methodology -- 3.1 Dataset -- 3.2 Background Removal -- 3.3 Contour Retrieval -- 4 Experiments and Results -- 4.1 GrabCut Result. 4.2 Get Contour Results. |
Record Nr. | UNINA-9910878056603321 |
Yang Xin-She | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 7 |
Autore | Yang Xin-She |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2024 |
Descrizione fisica | 1 online resource (636 pages) |
Altri autori (Persone) |
SherrattSimon
DeyNilanjan JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9733-02-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- A Literature Review on Teaching and Learning Database Normalisation: Approaches and Tools -- 1 Introduction and Background -- 2 Review of Related Work -- 3 Methodology -- 4 Approaches and Models -- 5 Tools and Applications -- 6 Discussion and Conclusion -- References -- Development of Text-Reading Camera to Assist the Legally Blind Using Neural Network Image Processing Algorithm -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- Rotational Vibration-Based Piezoelectric Energy Harvesting with Bandwidth Enhancement Through Magnetic Oscillators -- 1 Introduction -- 2 Analytical Model and Parameters -- 3 Results -- 4 Conclusion -- References -- Learner-Centered Learning Activity Support Service Based on Push Messages -- 1 Introduction -- 2 Related Works -- 3 Requirements and Architecture of the Learner-Centered Learning Information System -- 3.1 Requirements of Learning-Centered Learning Information Service -- 3.2 Design of the Learner-Centered Learning Activity Support System -- 4 Implements of the Learner-Centered Learning Activity Support Services -- 5 Conclusion -- References -- Employing AI to Predict the Cambodia Securities Exchange Index -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Least Square Approach -- 3.2 Deep Learning Algorithm -- 3.3 Sample Size and Data Collection -- 3.4 Performance Measures -- 4 Findings and Analysis -- 5 Conclusion -- References -- The South African Government's COVID-19 Message: An Analysis of the Official YouTube Channel Titles -- 1 Introduction -- 2 South Africa's Response to the COVID-19 Pandemic -- 3 Social Media Use in Crisis Environments -- 4 Methodology -- 5 Findings -- 5.1 The Message Components -- 5.2 The Message -- 5.3 The Desired Message Outcomes -- 6 Discussion -- 7 Conclusion.
References -- SolAR: Immersive Learning Through an Augmented Reality Application -- 1 Introduction -- 2 Related Work -- 3 System Design -- 3.1 Brainstorming -- 3.2 AR Prototype Design in Unity Game Engine -- 3.3 Final Design -- 4 System Design -- 5 Future Work and Conclusion -- References -- Generalized Krylov Subspace-Based MOR of Periodic Systems -- 1 Introduction -- 2 LDTP System -- 2.1 Lyapunov Equations -- 2.2 Lifted LDTP System Representation -- 3 Generalized Inverses -- 4 Krylov Subspace Method -- 5 Periodic Structured Arnoldi -- 6 Numerical Analysis -- 7 Conclusion -- References -- Navigating the Digital Horizon: Emerging Technologies in Value-Added Tax Management -- 1 Introduction -- 2 Theoretical Background: VAT Management and Technology -- 2.1 The Digital Transformation of VAT Management -- 2.2 The Role of Technology in VAT Management: An Evolving Landscape -- 3 Research Design -- 3.1 Data Sample, Data Collection and Preprocessing -- 3.2 Bibliometric Analyses -- 4 Results and Discussion -- 5 Conclusion -- References -- Traffic Analysis and Signal Timing Optimization of Typical Suburban Intersections -- 1 Introduction -- 2 Traffic Situation Survey and Analysis of the Typical Suburban Intersection -- 2.1 Current Status of Signal Timing -- 2.2 Investigation and Analysis of the Current Situation of Traffic Flow -- 2.3 Problems at Intersections -- 3 Optimization Design of Traffic Signal Timing at Intersections -- 3.1 Optimization Design of Signal Timing -- 3.2 Optimization Effect Evaluation -- 4 Conclusion -- References -- Statistical Analysis of Stakeholders Perception on Adoption of AI/ML in Sustainable Agricultural Practices in Rural Development -- 1 Introduction -- 2 Methodology -- 3 Result and Discussion -- 4 Discussion -- 5 Dependent Variables -- 6 Control Variables -- 7 Implications for Rural Development -- 8 Conclusions -- References. Self-hosted Open-Source Dependency Management Solutions -- 1 Introduction -- 2 Methodology -- 3 Search Process -- 3.1 Search Strings -- 4 Comparison Criteria -- 4.1 Open-Source Availability -- 4.2 Dependency Pull Capability -- 4.3 Built-In Cloud Solution Support -- 4.4 Common Vulnerabilities and Exposures -- 4.5 Active Maintenance -- 4.6 Single Sign On -- 4.7 License -- 4.8 Supported Programming Language -- 4.9 Tech Stack -- 5 Comparison of Software Solutions -- 5.1 Single Programming Language Support Solutions -- 5.2 Multi-programming Language Support Solutions -- 5.3 Docker and Containerization -- 6 Discussion of Applicability of the Solutions -- 6.1 Applicability of Language-Specific Solutions in Dependency Management -- 6.2 Applicability of Solutions Supporting Multiple Programming Languages -- 6.3 Applicability of Docker in Dependency Management -- 6.4 Future Work -- 6.5 Conclusion -- References -- The Use of Blockchain for Identity and Access Management (IAM) in Multi-cloud -- 1 Introduction -- 2 Identification and Authentication -- 3 Identity Management Across Multiple Cloud Instances -- 3.1 Federated Identity Management -- 3.2 Self-Sovereign Identity -- 4 Blockchain -- 5 CloudBloc Model -- 5.1 Components of the CloudBloc Model -- 5.2 Steps in the CloudBloc Model -- 6 CloudBloc Implementation -- 6.1 CloudBloc Components and the Prototype -- 6.2 Integration of CloudBloc Components -- 7 Results -- 8 Conclusion -- References -- Leveraging Machine Learning for Identifying Occupancy Patterns from Power Data with a Moving Window Feature Extraction Method -- 1 Introduction -- 2 Study Methodology -- 2.1 Aggregated Power Consumption Datasets -- 2.2 Data Preparation and Processing -- 3 Results and Discussion -- 3.1 Machine Leaning Algorithms -- 3.2 Window Size Analysis -- 3.3 Classification Results -- 4 Conclusion -- References. Dimensional Reduction to Improve Learning Recommender Systems Precision Based on Grades -- 1 Introduction -- 2 Review of Matrix Factorization Techniques -- 2.1 Single Value Decomposition (SVD) -- 2.2 SVD++ -- 2.3 Matrix Factorization -- 2.4 Non-negative Matrix Factorization -- 2.5 Bayesian Matrix Factorization -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- Assessing Ethical Implications of ChatGPT in Higher Education: A Focus on Students -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Falsification or Alteration of Documents -- 3.2 Dishonest Academic Practices -- 3.3 Identity Theft -- 3.4 Drugs -- 4 Discussion -- 5 Conclusions -- References -- Predicting Student Success in Higher Education with Social, Economic, and Education Variables Using Machine Learning Techniques -- 1 Introduction -- 2 Review of Matrix Factorization Techniques -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- The Media Role in Preventing Radicalization: The Police Students' Perspective -- 1 Introduction -- 2 Methods -- 2.1 Sample -- 2.2 Instrument and Data Collection -- 3 Analytic Method -- 4 Results -- 5 Discussion and Conclusion -- References -- Proxy Re-encryption Protocol in Off-Road Emergency -- 1 Introduction -- 2 Preliminaries -- 2.1 Participants -- 2.2 Application Scenario -- 2.3 Security Building Blocks -- 3 Construction -- 3.1 Notations -- 3.2 System Setup -- 3.3 Whole Protocol -- 4 Discussion -- 4.1 Security Analysis -- 4.2 Efficiency Analysis -- 5 Conclusion -- References -- Bridging Social Media and Cryptocurrency: A Deep Learning-Based Twitter Sentiment Analysis for Bitcoin Market -- 1 Introduction -- 2 Novelty Aspect -- 3 Literature Review -- 4 Proposed Research Methodology -- 4.1 Proposed Method and Pre-processing -- 4.2 Dataset Documentation -- 4.3 Long Short-Term Memory (LSTM) -- 4.4 Convolutional Neural Network (CNN). 4.5 Artificial Neural Network (ANN) -- 4.6 Recurrent Neural Network (RNN) -- 4.7 Model Development -- 4.8 Sentiment Analysis -- 5 Result Analysis and Discussion -- 5.1 The Logic on Integration of Twitter Sentiment Data with Bitcoin Price Data -- 5.2 Deep Learning Model Result Interpretation -- 5.3 Bitcoin Price Forecasting -- 5.4 Evaluation Metrics -- 6 Limitations Highlight for Potential Improvement and Future Research -- 7 Conclusion -- References -- Mouse Dynamics-Based Online Fraud Detection System for Online Education Platforms -- 1 Introduction -- 2 Literature Review -- 2.1 Data and Attribute Comparison Matrix -- 3 Data Collection and Preprocessing -- 4 Experiments and Evaluation -- 4.1 Scenario 1: Including l in the Commonly Employed Feature Set -- 4.2 Scenario 2: Removing l from the Commonly Employed Feature Set -- 4.3 Scenario 3: Removing l and t from the Commonly Employed Feature Set -- 4.4 Evaluating User Behavior-Centric Feature Set -- 4.5 Evaluating Reliability of Features -- 5 Conclusion -- References -- Silent Subcarrier-Based Interference Rejection Combining for Mobile Black-Space Cognitive Radios -- 1 Introduction -- 2 Scenarios and Methods for IRC-Based BS-CR -- 2.1 Methods -- 3 IRC for Black-Space Cognitive Radio -- 3.1 Estimation of the Spatial Covariance Matrix -- 3.2 Interpolation-Based Interference Covariance Tracking with Mobility -- 3.3 IRC Process -- 4 Simulation Results -- 5 Conclusion -- References -- What Affects Customer Engagement Among E-Wallet Customers in Indonesia -- 1 Introduction -- 2 Literature Review -- 2.1 Service-Dominant Logic Theory (S-D Logic Theory) -- 2.2 Customer Commitment -- 2.3 Customer Trust -- 2.4 Service Experience -- 2.5 Positive Emotion -- 2.6 Customer Satisfaction -- 3 Methodology -- 4 Results -- 4.1 Sample Profiles -- 4.2 Assessment of Measurement Model -- 4.3 Assessment of Structural Model. 5 Conclusion and Implications. |
Record Nr. | UNINA-9910878052903321 |
Yang Xin-She | ||
Singapore : , : Springer Singapore Pte. Limited, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 8 |
Autore | Yang Xin-She |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (649 pages) |
Altri autori (Persone) |
SherrattSimon
DeyNilanjan JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN |
9789819733057
9789819733040 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- A Review on Image Steganography -- 1 Introduction -- 2 Literature Review -- 3 LSB Steganography -- 3.1 Steps Taken in LSB Steganography -- 3.2 Implementation and Result -- 4 Steganalysis -- 4.1 The Detection Processes -- 5 Discussion -- 6 Conclusion -- References -- Developing Personalised Islamic Learning in Digital Age: Pedagogical and Technological Integration for Open Learning Resources (OLR) -- 1 Introduction -- 2 Literature Review -- 3 Results and Analysis -- 3.1 Building Pedagogical and Technological Integration for Open Learning Resources in Higher Education Context -- 3.2 Enhancing Open Learning Resources for Digital Innovative Learning Environment in Higher Education -- 4 Conclusion -- References -- Quantum Codes from Cyclic Codes over the Ring R = IFq + uIFq + vIFq +uv IFq + v2IFq+ uv2IFq -- 1 Introduction -- 2 Preliminaries -- 3 Gray Map -- 4 Cyclic Codes over R -- 5 Quantum Codes over IFq -- References -- Effect of the New Energy Vehicles Pilot Policy on PM2.5 Emissions: Insights from Cities at the Prefecture-Level China -- 1 Introduction -- 2 Empirical Model and Variables -- 2.1 Theoretical Framework -- 2.2 Mechanism Analysis -- 2.3 Variables and Data -- 3 Results and Discussion -- 3.1 Benchmark Regression Results Analysis -- 3.2 Propensity Score Matching Difference-In-Difference (PSM-DID) Test -- 3.3 Mechanism Analysis -- 4 Conclusion -- References -- From Technology Adaptation to Technology Adoption: An Insight into Public Islamic School Administrative Management -- 1 Introduction -- 2 Literature Review -- 2.1 School Administrative Personnel -- 2.2 Duties and Functions of School Administrative Personnel -- 3 Research Results and Discussion -- 3.1 Adapting Technology Adoption for Student Administration -- 3.2 Adapting Technology Adoption for Curriculum Administration.
4 Conclusion -- References -- Augmented Reality Model in Supporting Instruction Process: A Critical Review -- 1 Introduction -- 2 Methodology -- 3 Analysis and Discussion -- 3.1 Enhancing AR in Supporting Instruction Process -- 3.2 Facilitating AR with Digital-Based Design for Learning Instruction -- 4 Implications and Future Directions -- 5 Conclusion -- References -- Examining Purchase Intent in Indonesian E-commerce Cosmetics -- 1 Introduction -- 2 Theoretical Basis -- 2.1 E-business Management -- 2.2 Purchase Intentions -- 2.3 E-commerce -- 2.4 E-service Quality -- 2.5 E-satisfaction -- 2.6 Brand Image -- 3 Research Methodology -- 4 Conclusion -- References -- Integration of Facial Recognition and Facemask Detection for Enhanced Access Control Systems: A Post-epidemic Solution -- 1 Introduction -- 2 Literature Review and Related Work -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preparation -- 3.3 Pre-trained Model Architecture -- 3.4 Model Training -- 3.5 Facial Recognition -- 3.6 Image Capture and Database Entry -- 3.7 Haar Cascade Classifier for Face Detection -- 3.8 Image Storage and API Communication -- 3.9 LBPH Face Recognizer Training -- 3.10 Confidence Threshold and Training Efficiency -- 3.11 API Communication for Model Sharing -- 4 Results and Discussion -- 5 Conclusion -- References -- A Systematic Literature Review on the Impact of the COVID-19 Pandemic on Digital Access and the Digital Divide in South African Higher Education -- 1 Introduction -- 2 Background and Significance -- 3 Objective -- 4 Research Method -- 5 Data Sources and Search Terms -- 6 Data Extraction -- 7 Data Analysis -- 8 Findings -- 8.1 Matrix Analysis -- 8.2 Thematic Analysis Findings -- 9 Discussion -- 9.1 Digital Access Disparities Among SA University Students, Pre-pandemic -- 9.2 Factors Affecting Digital Device Access During the Pandemic. 9.3 Impact of Digital Device Inequalities on Participation During the Pandemic on Marginalised Students -- 9.4 Strategies/Implementations Implemented to Address the Digital Divide -- 10 Conclusion -- 11 Limitations -- 12 Future Research -- References -- Quadratic Stabilizability of Switched Affine Descriptor Systems -- 1 Introduction -- 2 Preliminaries -- 3 State-Dependent Switching Laws -- 3.1 Stabilization at the Origin -- 3.2 Stabilization Around an Equilibrium Point Different to the Origin -- 4 Conclusion -- References -- Predicting Health Status of Maize Crops by Integrating IoT Technology and Inception-v3 Convolutional Neural Network in Precision Agriculture -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Tools, Resources, and Materials Used -- 3.2 Process of Collecting Data -- 3.3 Data Analysis -- 4 Results and Discussions -- 4.1 Inception-v3 Architecture Diagram -- 4.2 Model Training -- 4.3 Results Obtained -- 5 Conclusion and Future Works -- References -- The Classification of the Children Capacity by Cluster -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Research Data Collection -- 3.2 Research Methods -- 4 Processing -- 5 Results -- 6 Conclusion -- Appendix 1 -- References -- Driver Development for GPIO Control in a Linux Environment -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 The Physical Device -- 3.2 The Driver -- 3.3 The User Space Application -- 3.4 Implementation -- 4 Results -- 5 Future Work -- 6 Conclusion -- References -- Diffusion-Based Convolutional Recurrent Neural Network for Improving Sound Event Detection -- 1 Background -- 2 Method -- 2.1 LD-Based Module -- 2.2 CNN Module -- 2.3 Feature-Map Attention Module -- 2.4 RNN Module -- 3 Experimental Setup -- 3.1 Datasets -- 3.2 Measures -- 3.3 Experimental Settings -- 4 Results and Analysis. 4.1 Comparison of Different Pooling Methods for CNNs Classifiers in the DCRNN Model -- 4.2 Comparison of LSTM-RNNs and GRU-RNNs of the DCRNN Model -- 4.3 Comparison of the DCRNN Model with Other Advanced SE Approaches -- 5 Conclusions -- References -- Leveraging Geographic Research, Web Applications and Surveys in the Construction of Educational Strategies in Ecuador -- 1 Introduction -- 2 Data and Methods -- 2.1 BCH Exam and Technical Geographical Research Background -- 2.2 Design and Implementation of the WAS -- 2.3 Management of Contact with the Representatives of the EIs and Organization of the Workshops -- 2.4 Survey Design and Response Analysis -- 3 Results -- 3.1 Workshop Attendance and Respondent Profile -- 3.2 WAS Usage Monitoring -- 3.3 Analysis of Survey Questions -- 3.4 Tabulation of the Themes on Academic Performance -- 4 Discussion -- 4.1 On Good Practices for Developing WAS in Scientific Dissemination Processes -- 4.2 Achievements and Errors in EIs Communication -- 4.3 Proposed Strategies for Improving Access to Higher Education Based on SDG 4 -- 4.4 Lessons Learned from the Pandemic -- 5 Conclusion -- Appendix Proposed Strategies to Improve Academic Performance Based on the Fourth SDG 4 Goals and Means of Implementation -- References -- Serious Gaming for Cultural Heritage: The Case Study of the Domus of Abellinum -- 1 Introduction -- 2 Literature Review -- 3 Case Study and Methodology -- 3.1 Data Acquisition and Point Cloud Optimization -- 3.2 3D Modeling -- 3.3 Serious Game -- 3.4 Testing Phase -- 4 Discussion and Conclusion -- 4.1 Future Developments -- References -- The Metaverse and Revolutionary Perspectives for the Smart Cities of the Future -- 1 Introduction -- 2 Related Work -- 3 Metaverse and Smart Cities: New Perspectives and Opportunities -- 4 Future Implications in the Metaverse. 4.1 Interoperability in the Metaverse: A Scientific Analysis -- 4.2 Security and Privacy in the Metaverse: An In-Depth Analysis -- 4.3 Network Requirements in the Metaverse: A Scientific Perspective -- 4.4 Data Management in the Metaverse: A Scientific Perspective -- 4.5 Digital Addiction and Mental Health in the Metaverse: A Scientific Analysis -- 4.6 Law and Jurisdiction in the Metaverse: An In-Depth Analysis -- 4.7 Environmental Pollution in the Metaverse: A Scientific Analysis -- 5 Conclusion -- References -- A Comparative Study of Machine-Learning Algorithms for Indoor Localization Based on the Wi-Fi Fingerprint According to User Postures -- 1 Introduction -- 2 State of the Art of the Previous Works -- 3 Methodology and System Model -- 4 Performance Analysis and Simulation -- 4.1 Simulation Description -- 4.2 Discussion Analysis -- 5 Conclusion -- References -- The Implementation of Quantum Annealing for Ensemble Pruning -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 The Method's Concept -- 3.2 Experimental Settings -- 4 Experimental Analysis -- 4.1 Ensemble Sizes -- 4.2 Ensemble Accuracy -- 4.3 Discussion -- 5 Conclusion -- References -- Structural Model of a Hydrostatic Cryogenic Liquid Storage and Pressurization Tank in the Food Sector -- 1 Introduction -- 2 State of the Art -- 2.1 Fuel Storage Tanks -- 2.2 Cryogenic Hydrogen Storage Tank -- 2.3 Non-destructive Inspection with Penetrant Dyes -- 3 Contribution -- 4 Validation -- 4.1 Penetrant Dye Testing -- 4.2 Hydrostatic Test -- 4.3 Sensors for the Hydrostatic Test -- 4.4 Pressure Sensor of the Device -- 5 Conclusions -- References -- Internal Flow Model of a Helical Centrifugal Atomizer for Cold Preservation Systems in the Fishing Industry -- 1 Introduction -- 1.1 A Subsection Sample -- 2 State of the Art -- 2.1 Ultrasonic Atomization -- 2.2 Electrospray Atomization. 2.3 Pneumatic Atomization. |
Record Nr. | UNINA-9910878984403321 |
Yang Xin-She | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 5 |
Autore | Yang Xin-She |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (670 pages) |
Altri autori (Persone) |
SherrattSimon
DeyNilanjan JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9732-89-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- A New Wavelet Visual Weighting Model to Optimize Image Coding and Quality Evaluation Based on the Human Psychovisual Quality Properties -- 1 Introduction -- 2 Wavelet Visually Based Image Quality Coding -- 3 Wavelet Visual-Based Image Quality -- 4 Results and Discussion -- 5 Conclusion and Perspectives -- References -- Optimizing the IoT PAYLOAD Encryption Watermarking-Oriented Applying Computational Intelligence and Visual Quality Coding to Improve the Vehicular Speed Controller Platform's Features -- 1 Introduction -- 2 Road Safety Platform Architecture -- 3 AI Vehicle Recognition and Image Watermarking Integration -- 4 Results and Discussion -- 5 Conclusion -- References -- Influence of Ethical Behavior on Job Satisfaction of Members of Information System Project Team -- 1 Introduction -- 2 Theoretical Background -- 2.1 Job Satisfaction -- 2.2 Ethical Culture -- 2.3 Ethical Climate -- 2.4 Ethical Leadership -- 3 Research Design and Methodology -- 4 Data Analysis -- 4.1 Validity and Reliability -- 4.2 Significance of Structural Model -- 4.3 Hypothesis Testing -- 5 Discussion of Results -- 6 Conclusion -- References -- To Be or Not To Be-After AI Revolution -- 1 Introduction -- 2 AI Tools-Student Survey 2023 May -- 2.1 Survey Environments -- 2.2 Awareness, Liking, Confidence, and Frequency of Usage -- 2.3 Future Career, Professional Usage -- 2.4 Cheating -- 3 Summary -- References -- Use of Analytical Methods in Variant Forecasting Tasks -- 1 Introduction -- 2 Materials and Method -- 3 Results -- 4 Conclusion -- References -- Toward a Classification of Factors Influencing eWOM in Online Shopping Through a Systematic Literature Review -- 1 Introduction -- 2 Electronic Word-of-Mouth (eWOM) -- 3 Methodology and Results -- 4 Conclusion, Limits, and Implications -- References.
Away from Theory: A Cloud Storage Application with Public Key Searchable Encryption Feature -- 1 Introduction -- 1.1 Contribution -- 1.2 Organization -- 2 Application Overview -- 2.1 Comprehensive Feature Set -- 2.2 Submodule Interplay -- 3 Auth Submodule -- 4 FileManager Submodule -- 5 SearchableEncryption Submodule -- 6 Interaction Among Submodules -- 7 Conclusion -- References -- Developing a Serious Game for Acute Pain Detection by Utilizing Virtual Reality and Brain-Computer Interfaces -- 1 Introduction -- 2 Background -- 2.1 Brain-Computer Interfaces -- 2.2 Serious Games -- 2.3 Fourier Analysis -- 2.4 Pain -- 3 Methodology -- 3.1 Pain Detection -- 4 Results and Discussion -- 4.1 Results from Pain Detection CNN -- 5 Further Research -- 6 Conclusion -- References -- Hidden Knowledge Extraction for Association Rule Mining Technique Based on the Apriori and Frequent Pattern Growth Algorithms: A Case Study -- 1 General Introduction -- 2 Problem Statement Formulation -- 2.1 Problem Associated with Apriori Algorithm -- 2.2 Proposed Solution of the Problem -- 3 Related Works -- 3.1 Apriori Algorithm Related Work -- 3.2 Frequent Pattern Growth Related Work -- 4 Research Methodology -- 4.1 Data Description -- 4.2 Frequent Pattern Growth Algorithm -- 4.3 Apriori Algorithm Pseudo-Code -- 4.4 Performance Metrics Used for the Analysis of the Rules -- 5 Implementation of the Algorithms -- 5.1 Useful Data Structure Identification -- 5.2 Analysis of the Memory Requirements of the Algorithms -- 6 Experimental Results and Discussion -- 7 Conclusions -- References -- Integration of Distributed Intrusion Detection Systems in IoT Infrastructure -- 1 Introduction -- 2 Machine Learning Background -- 3 Related Works -- 4 Methodology -- 4.1 Proposed Security Framework for the Intrusion Detection in the IoT Infrastructure. 4.2 Proposed Deployment Model-Based Distributed Intrusion Detection System (DIDS) -- 5 Experimental Setup -- 5.1 Performance Analysis Measures -- 5.2 Evaluation -- 6 Conclusion and Future Work Avenue -- References -- Predictive Analysis Model to Improve the Control of Eating Disorders in Adolescents in Metropolitan Lima Based on Machine Learning -- 1 Introduction -- 1.1 Importance of the Problem -- 2 Contribution -- 2.1 Related Works -- 3 Predictive Analysis Model of Eating Disorders in Adolescents -- 4 Method -- 4.1 Participants -- 4.2 Procedure -- 4.3 Predictive Model -- 4.4 Architecture -- 4.5 Main Contribution -- 5 Experimentation -- 6 Results -- 7 Validation -- 8 Discussion -- 9 Conclusion -- References -- A Predictive Model to Support Decision-Making for the Accreditation of Learning Programs Using Data Mining and Machine Learning -- 1 Introduction -- 2 Literature Review -- 2.1 Accreditation Process with ABET -- 2.2 Big Data in University Teaching -- 2.3 A Framework for Automation to Evaluate Academic Accreditation Requirements in Saudi Arabian Universities -- 2.4 An Integrated Perspective on Data Analytics in Higher Education -- 2.5 An Updated Survey on Learning Analytics and Educational Data Mining -- 3 Methodology -- 3.1 Data Preprocess -- 3.2 Methods -- 3.3 Web Design and Implementation -- 3.4 Interpretation/Application -- 4 Results -- 4.1 Model Evaluation -- 4.2 Confusion Matrix -- 4.3 ROC Curve -- 4.4 Web Implementation Results -- 5 Discussion and Conclusion -- References -- Design of a Blockchain-Based Organ Donation and Transplantation Management Framework -- 1 Introduction -- 2 Overview of Blockchain Technology -- 3 Organ Donation and Transplantation Management Framework -- 4 System Requirements -- 5 Conclusions -- References -- Audio Style Transfer Using a Modified Lightweight TimbreTron Pipeline -- 1 Introduction -- 2 Methodology. 2.1 Data Selection -- 2.2 Data Cleaning and Feature Engineering -- 2.3 Our Proposed Pipeline -- 2.4 Architecture -- 3 Discussion and Results -- 3.1 Validation Methodology -- 3.2 Results -- 4 Future Work and Conclusion -- 4.1 Future Work -- 5 Conclusion -- References -- Deep Dive into Invoice Intelligence: A Benchmark Study of Leading Models for Automated Invoice Data Extraction -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Acquisition -- 3.2 Model Training -- 3.3 Models Overview -- 3.4 Experiments -- 4 Results -- 4.1 Overall Performance Analysis -- 4.2 Performance on Key Fields -- 4.3 Resource Consumption Results -- 5 Conclusion -- 6 Future Work -- References -- Combined ECG Analysis Approach Based on Detection of Deviation from the Personal or Population Norm Using Wearable Devices -- 1 Introduction -- 1.1 Background -- 1.2 Problem Statement -- 1.3 Objectives -- 2 Literature Review -- 2.1 AI Analysis of ECG to Detect Deviation from the Population Norm -- 2.2 Real-Time ECG Monitoring via Wearable Technology -- 2.3 Multi-step or Combined Analysis for ECG Data Interpretation -- 2.4 Individual Model Training Coupled with Wearable Technology -- 3 Methodology -- 3.1 Personal ECG Norm Model Generation Process -- 3.2 Concept Architecture -- 4 Expected Results and Requirements -- 4.1 Expected Results -- 4.2 Requirements -- 5 Challenges and Solutions -- 5.1 Challenges -- 5.2 Solutions -- 6 Conclusion and Future Directions -- References -- Atenea Lab: A Softwarized IoT Laboratory for Research and Knowledge Transfer -- 1 Introduction -- 1.1 Motivation -- 1.2 Proposal and Key Points -- 1.3 Contribution -- 2 State of the Art -- 3 Our Proposal: Atenea Lab -- 3.1 Architecture -- 3.2 User Operation -- 4 Atenea Lab in Practice -- 4.1 Test and Limitations -- 4.2 An Agrifood Prototype -- 5 Conclusions and Future Work -- References. Exploring the Antecedents of Purchase Intention for Organic and Healthy Foods: A Systematic Literature Review -- 1 Introduction -- 2 Purchase Intention -- 3 Organic Food -- 4 Healthy Food -- 4.1 Healthy/Unhealthy Eating Definition -- 4.2 Mind/Body Healthy Eating Definition -- 4.3 Healthy Eating Guidelines -- 5 Methodology and Results -- 5.1 Step 1-Preparation of the Research Question -- 5.2 Step 2-Search for Studies and Works Related to the Research Question -- 5.3 Step 3-Selection and Evaluation of Studies -- 5.4 Step 4-Analysis and Synthesis -- 5.5 Step 5-Results and Reporting -- 6 Conclusion and Limits -- References -- Communicating Universe -- 1 Introduction -- 2 Quantifying Shannon Information -- 3 Probabilities and Odds -- 4 Communicating Physics -- 5 One Picture of Micro- and Macro-world -- 6 Conclusion -- References -- An Overview on Diagnosis of Endometriosis Disease Based on Machine Learning Methods -- 1 Introduction -- 2 Endometriosis and Medical Imaging -- 3 Constructing an Informative Training Dataset -- 4 Feature Extraction and Selection -- 5 Machine Learning Algorithms for Endometriosis Analysis -- 6 Model Training, Validation, and Evaluation -- 7 Clinical Integration and Real-World Impact -- 8 Future Directions and Challenges -- 9 Conclusion -- References -- Blockchain-Integrated Chatbot -- 1 Introduction -- 2 Chatbots in Customer Service-Advantages and Drawbacks -- 2.1 Food Delivery Chatbot -- 2.2 Building Our Food Delivery Chatbot -- 3 Integration of Blockchain Technology in Chatbot -- 3.1 Theoretical Framework of a Blockchain-Integrated Chatbot -- 4 Discussion-Advantages and Disadvantages of a Blockchain-Integrated Chatbot -- 5 Conclusion -- References -- Switching from DOORS to DOORS Next Generation. Identifying the Main Usability Issues. A Case Study -- 1 Introduction -- 2 Theoretical Background. 2.1 Requirements Engineering Process. |
Record Nr. | UNINA-9910878988403321 |
Yang Xin-She | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 6 |
Autore | Yang Xin-She |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2024 |
Descrizione fisica | 1 online resource (635 pages) |
Altri autori (Persone) |
SherrattSimon
DeyNilanjan JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9732-99-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Academic Rating Index: 4IR Supervision Model -- 1 Introduction -- 2 Supervisor Challenges -- 3 Design Science Research Methodology: Academic Rating Index -- 3.1 Problem Relevance -- 3.2 Design Search Process -- 3.3 Design of the Artifact -- 3.4 Research Rigor -- 4 Development Results (Contribution and Communication) -- 5 Discussion and Conclusion -- References -- Variational Quantum Algorithms in Finance -- 1 Introduction -- 2 Hybrid Quantum-Classical System -- 2.1 The Cost Function -- 2.2 Ansatze -- 2.3 Optimizers -- 3 Portfolio Optimization-Mean Variance Analysis -- 4 Price/Option Prediction -- 5 Conclusion -- References -- Early-Stopped Technique for BCH Decoding Algorithm Under Tolerant Fault Probability -- 1 Introduction -- 2 Early Stopped Approach Based on the View of Discrepancy for the BM Algorithm -- 2.1 Heuristics for Consecutive Zero Discrepancies -- 2.2 Numerical Analysis of Fault Probability for the Proposed Early Stopped Technique -- 3 Complexity Analysis -- 4 Numerical Results -- 5 Conclusion -- References -- Value Creation via Blockchain Technology: A Systematic Literature Review and Future Research Agenda -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 3.1 RQ1: What Is the Current State of Blockchain Value and Value Creation Research? -- 3.2 RQ2: What Are the Underlying Research Themes? -- 3.3 RQ3: What Are the Potential Opportunities for Future Research? -- 4 Conclusion -- References -- A 3D Virtual Laboratory for Computer Hardware Classes -- 1 Introduction -- 2 Related Works -- 3 Design and Development -- 3.1 Design -- 3.2 Development and Results -- 4 Conclusion -- References -- Method of Multifactor Analysis of the Alternatives Using the Example of Multi-criterial Selection of the Optimal Cargo Transportation Route -- 1 Introduction.
2 The Idea of Solving the Problem -- 3 Infological Model of Optimal Cargo Transportation Routing Indicators -- 4 Calculation of the Route Optimality Indicators -- 4.1 Building a Graph of the Transport Network -- 4.2 Calculating Partial Criteria for an Optimal Route on a Graph -- 4.3 Construction of Routes on a Graph -- 5 Determination of Route Optimality from the List of Alternatives -- 5.1 Normalization Partial Optimality Criteria -- 5.2 Formation of Generalized Criteria for Route Optimality -- 5.3 Normalized of Generalized Criteria of Route Optimality -- 5.4 Establish an Integrated Optimality Criterion -- 5.5 Choosing the Optimal Route -- 6 Conclusions -- References -- Detection of Cyberbullying Text in Bangla Using N-Gram Analysis and Machine Learning Approaches -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Word Tagging -- 4 Result and Discussion -- 5 Conclusion -- References -- Sound Source Distance Measurement Using Complex Sparse Bayesian Estimation with a Small Microphone Array System -- 1 Introduction -- 2 Overview of the Estimation Method -- 2.1 Configuration of Microphones and Voxels -- 2.2 Problem Formulation -- 2.3 Sparse Bayesian Estimation -- 2.4 Overview of Estimation Algorithm -- 3 Evaluation with Sinusoidal Signals -- 3.1 Evaluation with One Sound Source -- 3.2 Evaluation with Two Sound Sources -- 4 Evaluation with Speech Signals -- 4.1 Speech Signals Used in Experiments -- 4.2 Simulation Experiment Results -- 4.3 Discussions -- 5 Conclusion -- References -- How Blockchain and the Metaverse Can Transform the E-Commerce Domain -- 1 Introduction -- 2 Related Research -- 2.1 Blockchain and E-Commerce -- 2.2 Metaverse and E-Commerce -- 3 Case Study -- 3.1 Methodology -- 3.2 Implementation -- 4 Conclusion and Future Research -- References. HR Development Strategy Through Training Towards Superior Tourism on the Department of Tourism, Youth and Sports at Bulukumba Regency, Indonesia -- 1 Introduction -- 2 Method -- 3 Results and Discussion -- 3.1 Recruitment -- 3.2 Education -- 3.3 Training -- 4 Conclusion -- References -- Predictive Modelling of Himalayan Soil Movement: Addressing Imbalance with Synthetic Variational Autoencoder Data in Kamand Valley -- 1 Introduction -- 2 Background -- 3 Study Area and Data Description -- 4 Methods -- 4.1 Proposed Multi-LSTM-RF -- 4.2 Model Optimisation -- 5 Results -- 6 Discussion and Conclusion -- References -- Using the Decision Tree Model Method for Data Analysis -- 1 Introduction -- 2 Materials and Method -- 3 Results -- 4 Conclusion -- References -- Localization of Region of Interest from Retinal Fundus Image for Early Detection of Glaucoma -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Pre-processing Fundus Images -- 3.2 Deep CNN Model for Classification -- 3.3 Features Extracted Between the Layers -- 4 Results and Discussions -- 5 Conclusion -- References -- Hardware Accelerators for Classification of Thoracic Disorders: A Survey -- 1 Introduction -- 2 Background and Motivation -- 3 Classification of Accelerators -- 4 FPGA-Based Hardware for Deep Learning -- 4.1 Performance Study -- 4.2 Addressing the Challenges -- 5 Conclusion -- References -- Offline Signature Verification Based on Neural Network -- 1 Introduction -- 2 Related Works -- 3 Principal Component Analysis (PCA) -- 4 Proposed Verification System -- 5 Artificial Neural Network Results -- 6 Conclusion -- References -- Multi-hop Wireless Network for Residential DC Microgrid Energy Management -- 1 Introduction -- 2 Development and Methodology -- 2.1 Battery Energy Storage System, Power Balancing and Control. 3 Residential Energy Management and Control System Model -- 4 Multi-hop Network Simulation -- 5 Simulation Results -- 5.1 Scenario1 -- 5.2 Scenario 2 -- 5.3 Scenario 3 -- 6 Conclusion -- References -- Deliberative Communication in Bulgaria: Risks and Opportunities -- 1 Introduction -- 2 Deliberative Democracy Developments -- 3 Deliberative Communication -- 4 Risks and Opportunities for Deliberative Communication -- 4.1 Legal and Ethical Regulation -- 4.2 Journalism -- 4.3 Media Usage Patterns -- 4.4 Media-Related Competences -- 5 Conclusion -- References -- Development of an Automated Feeder for Free Grazing Meat-Producing Animals -- 1 Introduction -- 2 Principle of Operation -- 3 Technical Equipment -- 4 Algorithm and Block Schemes -- 5 Potential Challenges and Solutions in Implementing Such a System -- 6 Future Steps -- 7 Conclusion -- References -- Innovative Solutions for Sustainable Businesses-ErfindenTech Pvt. Ltd. -- 1 Introduction -- 2 Literature Review -- 3 Research Objective -- 4 Research Methodology -- 5 Findings -- 6 Conclusions and Recommendations -- References -- A Comparative Study on Two Apple Leaves Datasets Captured Under Diverse Conditions -- 1 Introduction -- 2 Literature Review -- 3 Background -- 3.1 Image Processing -- 3.2 Computer Vision -- 3.3 Deep Learning -- 4 Material and Methods -- 4.1 Apple Datasets -- 4.2 Data Augmentation -- 4.3 Architecture -- 5 Results and Discussions -- 6 Conclusions -- References -- A New Classification of Target Coverage Models in WSNs, Survey and Algorithms and Future Directions -- 1 Introduction -- 2 Wireless Sensor Network Issues -- 3 Coverage Types Classification and the Relationship Between Them -- 4 Target Coverage Problem -- 5 Our Classification of Target Coverage -- 6 Current, Challenges, and Future Trends of Target Coverage -- 7 Conclusion -- References. Neural Network MPPT Control of an On-Grid Wind Energy System -- 1 Introduction -- 2 Boost Converter Modeling -- 3 MPPT Control -- 4 Results and Discussion -- 5 Conclusion -- References -- Color-Based Segmentation of Geometrical Shapes Using the Modified PCNN -- 1 Introduction -- 2 The Modified PCNN Model -- 3 The Experimental Results -- 4 Conclusions -- References -- Addressing the Business Disruption Through the Development and Pilot Testing of Caviturismo: A Web Portal for Cavite Tourism -- 1 Introduction -- 2 Methodology -- 2.1 Content Creation -- 2.2 Software Design -- 2.3 Software Development -- 2.4 Software Testing -- 3 Results and Discussion -- 3.1 Description of the System -- 3.2 Test Results -- 4 Conclusions and Recommendations -- References -- An Overview on Testing Big Data Applications -- 1 Introduction -- 2 Background -- 3 Typical Components of Big Data Applications -- 4 Testing the Identified Components -- 5 Conclusion -- References -- What Is a Managed Backup?-A Literature Review Delimiting Terminologies -- 1 Introduction -- 2 Background -- 2.1 Cloud Computing -- 2.2 Managed Service -- 2.3 Backup -- 3 Examination of the Terminology -- 3.1 The Review Protocol -- 3.2 The Findings -- 3.3 Delimitation of the Concepts -- 4 Conclusion -- References -- iFCVP: An Integrated FCNP-VWA-PROMETHEE Method for On-Demand Charging Scheduling in WRSNs -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 An Overview of an Integrated FCNP-VWA-PROMETHEE -- 3.2 System Model -- 4 Proposed Scheme -- 4.1 Ordering the Charge Locations -- 4.2 Partial Charging Time -- 4.3 Determination of pCT -- 5 Performance Evaluation -- 5.1 Simulation Settings -- 5.2 Simulation Results and Analysis -- 6 Conclusion -- References -- Predicting Drought Based on Weather and Soil Data Analysis -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Methodology. 4.1 Random Forest Model Without Resampling. |
Record Nr. | UNINA-9910878069203321 |
Yang Xin-She | ||
Singapore : , : Springer Singapore Pte. Limited, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 2 |
Autore | Yang Xin-She |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (647 pages) |
Altri autori (Persone) |
SherrattSimon
DeyNilanjan JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9735-56-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Terraria AI: YOLO Interface for Decision-Making Algorithms -- 1 Introduction -- 1.1 You only Look once -- 1.2 Video Game Description Language -- 1.3 General Video Game Artificial Intelligence -- 1.4 Monte Carlo Tree Search -- 1.5 Rolling Horizon Evolutionary Algorithm -- 1.6 Terraria -- 1.7 Novelty and Research Structure -- 2 Related Work -- 3 Design -- 3.1 YOLO Model -- 3.2 Forward Model -- 3.3 Decision-Making Algorithm -- 3.4 Game Environment -- 3.5 Terraria Settings -- 4 Methodology -- 5 Results -- 6 Discussion -- 7 Conclusion and Future Work -- References -- Analysis of Machine Learning Methods for Speech Disfluencies' Classification -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Segmentation -- 3.2 Feature Extraction -- 3.3 Classification -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Credit Risk Management Innovation in Bank Based on Blockchain Technology -- 1 Introduction -- 2 Literature Review -- 2.1 MSMEs, Problem of Agency, and Credit Risk -- 2.2 Traditional Credit Risk Management at Bank -- 2.3 Credit Risk Management at Bank Based on Blockchain Technology -- 3 Research Method -- 4 Finding and Discussion -- 4.1 Credit Risk Management Based on Traditional Approach -- 4.2 Credit Risk Management Innovation Based on Blockchain Technology -- 4.3 Advantages of Blockchain Technology as Credit Risk Management Innovation -- 4.4 Comparison Between Traditional Credit Risk and Credit Risk Management Innovation -- 4.5 Implementation of Credit Risk Management Innovation -- 5 Conclusion -- References -- Software MARTA: Improvements in Cell Segmentation and CX43 Lateralization Assessment -- 1 Introduction -- 2 Materials and Methods -- 2.1 Sample Collection -- 2.2 Determination of Dominant Orientation -- 2.3 Mask Generation.
2.4 Dilation and Mask Generation -- 2.5 Cardiomyocytes Detection -- 2.6 Morphological Characterization and Filtering of Cardiomyocytes -- 2.7 Evaluation Methods for Segmentation -- 2.8 CX43 Quantification and Lateralization Assessment -- 3 Results -- 3.1 Segmentation Performance -- 3.2 Lateralization Assessment -- 4 Discussion -- 5 Conclusion -- References -- Battery Temperature Forecasting Method: Li-Ion Batteries Case Study -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Battery Data Description and Preprocessing -- 3.2 ARIMA -- 3.3 LSTM -- 4 Assessment of Methods -- 5 Results and Discussion -- 5.1 ARIMA Model Results -- 5.2 LSTM Model Results -- 5.3 Forecasting Models Implementation -- 5.4 Battery Type B0045 Analysis -- 5.5 Battery Type B0046 Analysis -- 5.6 Battery Type B0047 Analysis -- 5.7 Battery Type B0048 Analysis -- 6 Discussion -- 7 Practical Implications and Challenges -- 8 Conclusion -- References -- Modeling of a Pandemic Compliant Smart Classroom Door for Nigerian Education System -- 1 Introduction -- 1.1 Motivation -- 1.2 Concept of Doors -- 1.3 Types of Automated and Smart Door Designs -- 2 Review of Related Works -- 2.1 New Classroom Door Design Model -- 2.2 Comparison of Review-Related Works and Research Gap -- 2.3 Door Control Actions that Can Be Linked to Backend Web Applications and School Information Systems -- 3 Implementation Materials -- 4 Design Model and Analysis -- 4.1 New Classroom Door Design Model -- 4.2 Benefit of the New Smart Classroom Door -- 5 Result and Discussion -- 6 Conclusion -- References -- Technological Resources for the Treatment of ADHD: A Systematic Review -- 1 Introduction -- 2 Method -- 2.1 Research Design -- 3 Results -- 3.1 Sample Size -- 3.2 Country -- 3.3 Educational Level of Participants -- 3.4 Population Type -- 3.5 Type of Technological Development. 3.6 Technological Development: Name and Features -- 4 Discussion -- References -- Enhanced Hybrid Skin Detection Method Using Multiple 3D Volumes and Threshold Optimization -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experimental Results -- 5 Conclusion -- References -- Beaver Habitat Terrain Identification Using Aerial Imagery -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Datasets -- 3.2 Models -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Evaluation Study on Digitalized Administrative Approval Reform: Example of the Economic and Technological Development Zone -- 1 Introduction -- 2 Literature Review -- 3 Theory -- 4 Method -- 5 Measures -- 5.1 Promote the Digitalization and Intelligent Upgrading of the Government Service Center -- 5.2 Data Sharing and Operational Synergies to Meet Public Needs -- 5.3 Admit the Scenario-Based Personalized Approval Services -- 6 Conclusion -- References -- Prediction of Customer Underwriting of Policies in Banking Institutions Through Machine Learning -- 1 Introduction -- 1.1 The Problem and Fundamentals of Machine Learning -- 1.2 Description of the Proposed Method -- 1.3 Bank Marketing Campaigns -- 1.4 Related Work -- 2 Proposed Method -- 3 Design of Experiments -- 4 Results -- 5 Conclusions -- References -- Design and Construction of an Animatronic Head Capable of Expressing Emotions and Facilitating Therapy for Children with Autism -- 1 Introduction -- 2 Facial Expressions -- 3 Mechanical and Aesthetic Module -- 3.1 Eye Mechanism -- 3.2 Mouth Mechanism -- 3.3 Neck Mechanism -- 4 The Electrical and Electronic Module -- 4.1 Actuators -- 4.2 Printed Circuit Board -- 5 Interaction Module -- 5.1 Artificial Vision -- 5.2 Graphical User Interface -- 6 Functional Test -- 7 Results and Discussion -- 8 Conclusions and Outlook -- References. Fusion of Hyperspectral and Multispectral Images for Land Use Segmentation -- 1 Introduction -- 2 Literature and Related Work -- 3 Datasets -- 4 Method -- 5 Results and Discussion -- 6 Conclusion -- References -- Urban Terrain Segmentation Using Multispectral Satellite Imagery -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion and Further Work -- References -- Facilitating Welfare Technology for Children/Youth -- 1 Introduction -- 1.1 Background -- 1.2 The Objective of This Research -- 2 Theoretical Framework -- 2.1 Diffusion of Innovation -- 2.2 Characteristics of Innovation -- 3 Method -- 4 Analyzing -- 5 Diffusion Related to Children/Youth -- 6 Concluding Remarks -- References -- A Quantum Computing-Based System for Portfolio Optimization Using Future Asset Values and Automatic Reduction of the Investment Universe -- 1 Introduction -- 2 Related Work -- 3 Inputs and Outputs of Q4FuturePOP -- 4 Q4FuturePOP: Quantum Computing-Based System for Portfolio Optimization with Future Asset Values and Automatic Universe Reduction -- 4.1 Predicted Dataset Generation Module-PDG -- 4.2 Quantum Computing Solver Module-QCS -- 4.3 Assets Universe Reduction Module-AUR -- 5 Discussion on the Preliminary Performance -- 6 Conclusions and Future Work -- References -- Distribution-Specific Augmentation for Domain Generalization -- 1 Introduction -- 2 Related Work -- 2.1 Data-Centric AI -- 2.2 Distribution Shift -- 3 Distribution-Specific Augmentation -- 3.1 Domain Generalization -- 3.2 Augmentation -- 3.3 Decomposition -- 3.4 Algorithm Description -- 4 Application of RPCA-PCP -- 4.1 Synthetic Dataset -- 4.2 IWildCam 2020 -- 5 Classification Results -- 5.1 Synthetic Dataset -- 5.2 IWildCam 2020 -- 6 Discussion -- References -- Load Flow of 210 MW Wind Farm Using ETAP -- 1 Introduction -- 1.1 Background. 1.2 ETAP Software -- 1.3 Paper Organization -- 2 Study Case Description: Wind Farm Details -- 3 Methods and Materials -- 3.1 Modeling of the Components and Network of the Electrical System -- 3.2 Development of Load Flow Equations -- 3.3 Numerical Techniques Solution of Load Flow Equations -- 4 Simulation of Load Flow in ETAP -- 5 Conclusion -- References -- Volumetric Attention Mechanism-Based Deep Learning for Breast Cancer Diagnosis in Digital Breast Tomosynthesis -- 1 Introduction -- 2 Methodology -- 2.1 Data Description and Preprocessing -- 2.2 Volumetric Attention Mechanism (VAM) Model Development -- 3 Results and Discussion -- 4 Conclusions -- References -- Automated Transcription of MTM Motions in a Virtual Environment -- 1 Introduction -- 2 Previous Work -- 3 Contribution -- 3.1 Algorithm Procedure -- 3.2 User Study -- 4 Study Results -- 4.1 SSQ Results -- 4.2 Results of the TLX -- 4.3 Comparison Against a Manual Data Transcription -- 5 Discussion -- 6 Conclusion and Future Work -- References -- A Categorical Transformer with a Data Science Approach for Recommendation Systems Based on Collaborative Filtering -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Design of Experiments -- 5 Results and Conclusions -- References -- Imagery Data Impact Analysis in Machine Learning Algorithm Performance for Bushfire Detection Systems -- 1 Introduction -- 2 Methodology -- 2.1 Problem Statement -- 2.2 Dataset -- 2.3 Algorithms -- 3 Results and Discussion -- 3.1 Experiment 1 -- 3.2 Experiment 2 -- 3.3 Experiment 3 -- 4 Conclusion -- References -- Balancing Autonomy, Resource Management, and Internship Integration: Challenges and Strategies in Hybrid Learning -- 1 Introduction -- 2 Challenges in Running Autonomy in Higher Education -- 2.1 Challenges in Managing Various Academic Components. 2.2 Challenges in Conducting Lectures and Labs with Respect to Semester-Long and Year-Long Internship Students. |
Record Nr. | UNINA-9910879583403321 |
Yang Xin-She | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of Sixth International Congress on Information and Communication Technology : ICICT 2021, London, Volume 3 |
Autore | Yang Xin-She |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (1045 pages) |
Altri autori (Persone) |
SherrattSimon
DeyNilanjan JoshiAmit |
Collana | Lecture Notes in Networks and Systems Ser. |
Soggetto genere / forma | Electronic books. |
ISBN | 981-16-1781-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Refining the Efficiency of R-CNN in Pedestrian Detection -- 1 Introduction -- 2 Pedestrian Detection Methods -- 3 Improving R-CNN Detector -- 3.1 Proposed Architectural Innovation of the R-CNN Detector Base Network -- 3.2 Proposed R-CNN Training Workflow -- 4 Training and Testing the R-CNN Detector -- 4.1 Classification Models Applied -- 4.2 Datasets -- 4.3 Training Data Pre-Processing -- 4.4 Performance Measures -- 5 Experimental Results -- 6 Conclusion -- References -- Towards Spark-Based Deep Learning Approach for Fraud Detection Analysis -- 1 Introduction -- 2 Proposed Spark-Based Deep Learning Architecture -- 3 Experimental Results -- 4 Conclusion and Discussion -- References -- Enhanced Dual-Band Bandstop Filter with Stepped-Impedance Resonators Using a Computer-Aided Optimization Technique -- 1 Introduction -- 2 DBBSF with SIRs -- 3 TSM -- 4 Results and Discussion -- 5 Conclusion -- References -- Self-Presentation and Social Anxiety on Facebook -- 1 Introduction -- 2 Literature Review -- 2.1 Belonging, Personality, and Self-Presentation on Facebook -- 2.2 Self-Expression, Self Esteem, and Self-Concept on Facebook -- 2.3 Social Comparison of Users on Facebook -- 2.4 Social Anxiety on Facebook -- 3 Methodology -- 3.1 Subjects/Participants -- 3.2 Research Design -- 4 Result -- 4.1 Social Media Usage -- 4.2 Self Presentation and User-Perception on Facebook -- 4.3 Social Anxiety on Facebook -- 5 Conclusion and Discussion -- References -- Automatic Regional Estimation of Myocardial Strain Using Deep Learning -- 1 Introduction -- 2 State of the Art of Automatic Methods for Cardiac Strain and Strain Rate Evaluation in MRI -- 2.1 Characterization of Myocardial Deformation -- 2.2 The Different Methods of Assessing Myocardial Strain in MRI.
2.3 Automatic Methods of Assessing Myocardial Deformation Using Deep Learning -- 3 Results and Discussions -- 4 Conclusion -- References -- Adversarial LSTM-Based Sequence-to-Sequence Model for Drug-Related Reactions Understanding -- 1 Introduction -- 2 Literature Background -- 2.1 Deep Neural Network Methods -- 2.2 Medical Concepts Normalization -- 3 Proposed Approach -- 4 Implementation and Experiments -- 5 Conclusion -- References -- Structural Organization of the Server System of Multiuser Device for Home Health Control -- 1 Introduction -- 2 System Description -- 3 Conclusion -- References -- Analyzing the Most Influencing Factors in Limiting the Spread of COVID-19 Disease -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 3.1 Government Responses -- 3.2 Population Density and Age -- 3.3 Healthcare Factors -- 3.4 Temperature, Humidity, and Wind Speed -- 4 Analysis -- 4.1 Population Density -- 4.2 Age -- 4.3 HealthCare -- 4.4 Temperature/Humidity and Wind Speed -- 4.5 Government Responses -- 5 Conclusion -- References -- Performance Comparison of Two Java-Based Actor Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Akka Concepts -- 2.2 Theatre Concepts -- 2.3 Actor Programming Style -- 3 The Iterated Prisoner's Dilemma Case Study -- 3.1 A PIPD Theatre Model -- 3.2 Porting the PIPD Model to Akka -- 4 Experimental Results -- 5 Conclusions -- References -- E-government Research in Africa: A Systematic Review -- 1 Introduction -- 2 Methodology -- 2.1 Data Sources -- 2.2 Inclusion and Exclusion Criteria -- 2.3 Search and Selection Process -- 3 Findings and Discussion -- 3.1 Year of Publication and Outlets -- 3.2 Research Themes -- 3.3 Nature of the Platform -- 3.4 Geographical Context of the Study -- 3.5 Underlying Theories/Frameworks/Models -- 3.6 Underlying Methods -- 4 Identified Gaps for Future Research. 4.1 Using Other Methodologies and Larger Sample Sizes -- 4.2 Theorization of E-government Studies -- 4.3 More Studies on Challenges in Implementing and Accessing E-government Platforms -- 5 Conclusion, Implications, and Limitations -- References -- Control to Manipulate Robotic Arms Using Augmented Reality -- 1 Introduction -- 2 Development -- 2.1 Kinematic Model -- 2.2 Control -- 3 Results Obtained -- 4 Conclusions -- References -- Analysis of Website Quality and City Government's Twitter Accounts in East Java Province, Indonesia -- 1 Introduction -- 2 Literature Review -- 2.1 The Use of Website on E-government -- 2.2 Measurement of the Quality of Government Website -- 2.3 Social Media on Government: Official Twitter Accounts -- 3 Method -- 4 Results -- 4.1 Website Quality on City Government -- 4.2 Social Media on Government: Official Twitter -- 5 Conclusion -- References -- How Does Local Government Use the Website and Twitters as Public Services Tools? A Case Study of Aceh Province Government, Indonesia -- 1 Introduction -- 2 Literature Review -- 2.1 Government Behavior -- 2.2 How ICT Effecting Behavior -- 2.3 ICT Performance on Services -- 3 Research Methods -- 4 Results and Discussion -- 4.1 Analysis of the Quality and Speed of Access to City Government Websites in Aceh Province -- 5 Use of City Government Twitter Accounts -- 6 Conclusion -- References -- How Does the Local Government Provide Official Website and Twitter Quality? Case Study of Three Local Governments of Indonesia -- 1 Introduction -- 2 Literature Review -- 2.1 The Use of Website on E-Government -- 2.2 E-governance -- 2.3 Public Services -- 2.4 Measuring Quality of Government Website -- 2.5 Quality of E-Government Service -- 3 Method -- 4 Result -- 4.1 Website Quality on City Government -- 4.2 City Government Official Twitter Account -- 5 Conclusion -- References. Cloud Computing Adoption-Based Digital Open Government Services: Challenges and Barriers -- 1 Introduction -- 2 Cloud Building Blocks for Digital Open Government -- 2.1 Cloud Challenges -- 3 Digital Open Government Challenges -- 3.1 Technological Challenges -- 3.2 Users Aspects -- 3.3 Social Challenges -- 3.4 Financial Challenges -- 4 Methodology -- 5 Result and Finding -- 5.1 Summary of the Questionnaire -- 5.2 Participants Details -- 6 Explanation of the Research Questions -- 6.1 Users' Views of Cloud-Based DOG Hurdles -- 6.2 IT-Employees' Views of Cloud-Based DOG Obstacles -- 6.3 Respondents' Views of the Really Significant Challenges -- 6.4 Assessment of Challenges Perceptions -- 7 Conclusion -- References -- Teacher Agency: Navigating the Virtual Learning Environment in the New Normal -- 1 Introduction -- 1.1 The PLMS as the Primary Virtual Instructional Delivery System -- 1.2 The PMLS as a Negotiated Learning Platform -- 2 Main Objective and Research Problems -- 3 Research Methodology -- 4 Conditions Facilitating the Virtual Learning Environment -- 4.1 Student Context and Parental Involvement -- 4.2 The Nature of PLMS and Online Learning -- 4.3 Teacher Agency -- 5 Derived Virtual Teaching Models -- 6 Structuring Free Rein: Resolving Constraints -- 7 Conclusion -- References -- Secure Trusted Operating System Based on Microkernel Architecture -- 1 Background -- 2 Related Work -- 3 Our Work -- 3.1 Trusted OS Architecture -- 3.2 Trusted OS Kernel -- 3.3 Trusted OS System Service -- 4 Evaluation -- 4.1 Trusted OS Kernel -- 4.2 Trusted OS System Service -- 5 Conclusions -- References -- The Case of Fabric and Textile Industry: The Emerging Role of Digitalization, Internet-of-Things and Industry 4.0 for Circularity -- 1 Introduction -- 2 Circular Economy in Textile Industry -- 3 Digital Solutions for Textile Circularity -- 4 IoT and Circular Fashion. 5 Conclusions and Discussions -- References -- Quality Assessment of Text Data Using C-RNN -- 1 Introduction -- 2 Related Work -- 2.1 Text Feature Extraction and Representation Techniques -- 2.2 Text Quality Assessment Techniques -- 2.3 Convolutional Neural Network -- 2.4 Recurrent Neural Networks -- 2.5 Convolutional Recurrent Neural Network -- 3 Proposed Method -- 3.1 Dataset -- 3.2 Data Pre-Processing -- 3.3 Proposed Deep Learning Model -- 3.4 Other Classification Methods -- 4 Evaluation and Results -- 5 Conclusion and Future Work -- References -- Casablanca Smart City Project: Urbanization, Urban Growth, and Sprawl Challenges Using Remote Sensing and Spatial Analysis -- 1 Introduction -- 2 Related Works -- 2.1 Smart Cities Definition and Characteristics -- 2.2 Casablanca Smart City Model -- 3 Study Area -- 4 Spatial Data -- 5 Methodology -- 5.1 Data Processing Workflow -- 5.2 Satellite Imagery Classification -- 6 Results Analysis -- 6.1 Land Use Cover Maps and Change Detection -- 7 Conclusion -- References -- Facial Expressions Classification on Android Smartphone for a User -- 1 Introduction -- 2 Related Work -- 3 Automatic System for Facial Expression Evaluation-Theoretical Background and State of the Art -- 3.1 State of the Art -- 4 Methodology for Facial Expression Evaluation System -- 5 Experiment and Evaluation of Success Rate -- 5.1 System Architecture -- 5.2 Result and Discussion -- 6 Conclusion and Future Development -- References -- A Survey in IoT for Healthcare Applications -- 1 Introduction -- 2 Internet-of-Things (IoT) -- 2.1 IoT -- 2.2 Essential Component of IoT -- 2.3 Applications in IoT -- 2.4 Diverse Purposes of Internet-of-Things in Health Care Systems -- 2.5 Key Advantages of Internet-of-Things in Health Care Systems -- 2.6 Some Parameters Are Used in Healthcare System -- 2.7 Sensors in Healthcare System. 2.8 Some Opportunities of Internet-of-Things in Healthcare. |
Altri titoli varianti | Proceedings of Sixth International Congress on Information and Communication Technology |
Record Nr. | UNINA-9910502658503321 |
Yang Xin-She | ||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|