top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Fourth International Congress on Information and Communication Technology : ICICT 2019, London, Volume 2 / / edited by Xin-She Yang, Simon Sherratt, Nilanjan Dey, Amit Joshi
Fourth International Congress on Information and Communication Technology : ICICT 2019, London, Volume 2 / / edited by Xin-She Yang, Simon Sherratt, Nilanjan Dey, Amit Joshi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XIV, 539 p. 233 illus., 142 illus. in color.)
Disciplina 006.312
Collana Advances in Intelligent Systems and Computing
Soggetto topico Electrical engineering
Data mining
Computer security
Communications Engineering, Networks
Data Mining and Knowledge Discovery
Systems and Data Security
ISBN 981-329-343-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto PESOHA: Privacy-preserving Evaluation System for Online Healthcare Applications -- Computer Vision and Hybrid Reality for Construction Safety Risks: a Pilot Study -- Data Reduction Using NMF for Outlier Detection Method in Wireless Sensor Networks -- Measuring Customer Satisfaction on Software Based Products: A Case study of ASAS-ERP Software at the University of Botswana -- To Develop a Water Quality Monitoring System for Aquaculture Areas Based on Agent Model -- Identifying Intrusions in Dynamic Environments using Semantic Trajectories and BIM for Worker Safety -- The ontological Approach in Organic Chemistry Intelligent System Development -- Effective way of Deriving the Context from a Handwritten Image/Object -- E-Voting System Based on Multiple Ballots Casting -- Against Malicious SSL/TLS Encryption: Identify.
Record Nr. UNINA-9910373901003321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fourth International Congress on Information and Communication Technology : ICICT 2019, London, Volume 1 / / edited by Xin-She Yang, Simon Sherratt, Nilanjan Dey, Amit Joshi
Fourth International Congress on Information and Communication Technology : ICICT 2019, London, Volume 1 / / edited by Xin-She Yang, Simon Sherratt, Nilanjan Dey, Amit Joshi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (516 pages)
Disciplina 004
Collana Advances in Intelligent Systems and Computing
Soggetto topico Electrical engineering
Data mining
Computer security
Communications Engineering, Networks
Data Mining and Knowledge Discovery
Systems and Data Security
ISBN 981-15-0637-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910366610803321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 3
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 3
Autore Yang Xin-She
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (663 pages)
Altri autori (Persone) SherrattSimon
DeyNilanjan
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819735594
9789819735587
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- A Transformer and Federated Learning Techniques for Detecting DDoS Attacks in IoT Environments -- 1 Introduction -- 2 Related Work -- 3 Structural Model -- 4 Experimental Approach -- 4.1 Datasets Description -- 4.2 Data Pre-processing -- 5 Experimental Results -- 5.1 Results of CICDDoS2019 Dataset -- 5.2 Results of TON-IoT Dataset -- 5.3 Results of LATAM-DDoS-IoT Dataset -- 6 Conclusion and Future Work -- References -- Sensory Substitution in Music: Enhancing Deaf Perception Through Vibrotactile Feedback -- 1 Introduction -- 2 Method -- 2.1 The Audio File -- 2.2 Sinusoidal Modeling + FX -- 2.3 HRTF (Head-Related Transfer Function) -- 2.4 Hardware Implementation -- 3 Experiment -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Bridging Nanomachines: Bidirectional Channel in a Bio-inspired System -- 1 Introduction -- 2 Model -- 3 Results Verification Using PRISM Tool -- 4 Conclusions -- References -- Distributed Deep Learning-Based Model for Financial Fraud Detection in Supply Chain Networks -- 1 Introduction -- 2 Related Work -- 3 Distributed Deep Learning-Based Model for Financial Fraud Detection in Supply Chain Networks -- 3.1 Apache Spark on Cloud Databricks -- 3.2 Distributed Deep Learning-Based Model -- 3.3 Training and Evaluation Metrics -- 4 Case Study -- 4.1 Dataset and Data Preparation -- 4.2 Class Imbalance Problem and Data Splitting -- 5 Result and Discussion -- 6 Conclusion -- References -- Smart Living -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Design -- 3.2 Method -- 3.3 Controller -- 4 Results -- 4.1 Each System Performance -- 4.2 Feedback on User Satisfaction Gathered from Frequent Room Occupants -- 5 Conclusions -- References.
A Performance Comparison Between a Digital Shadow and a Digital Twin in a Mixed Model Stochastic System -- 1 Introduction -- 2 Background -- 2.1 Mixed Model Stochastic System -- 2.2 Current Techniques Deployed for Cycle Time Reduction -- 2.3 Digital Shadow (DS) vs Digital Twin (DT) -- 3 Methodology -- 3.1 The Experimental Setup -- 3.2 The Development of the Digital Shadow and Digital Twin -- 4 Results -- 4.1 Digital Shadow -- 4.2 Digital Twin -- 4.3 A Comparison Between the Digital Shadow and the Digital Twin -- 5 Conclusion and Future Works -- References -- Characteristics for HVDC GIS/GIL Spacer Under DC Superimposed Lightning Impulse Voltage Conditions -- 1 Introduction -- 2 Methodology and Governing Equations -- 2.1 CF3I and CO2 Microscopic Ion Collision and Reaction Rate -- 2.2 Physical Field -- 3 Results -- 3.1 Electric Field Calculation Under DC Superimposed Lightning Impulse Voltage -- 4 Conclusions -- References -- CCMT: A Code Complexity Measuring Tool -- 1 Introduction -- 2 The CCC Measure -- 3 Methodology -- 4 Proposed System -- 5 Results -- 6 Discussion -- 7 Conclusion -- References -- Pertinent Issues in Artificial Intelligence Systems Adoption -- 1 Introduction -- 2 Methodology -- 3 Theoretical Brief -- 4 Results -- 4.1 Management Support -- 4.2 Lack of Skills -- 4.3 Data Security and Privacy -- 4.4 Ethical Issues -- 5 Discussion -- 5.1 Limitations and Future Suggestions -- 6 Conclusion -- References -- Facial Expression Recognition: A Lite Deep Learning-Based Approach -- 1 Introduction -- 2 Method -- 2.1 Preprocessing -- 2.2 Facial Expression Recognition System -- 2.3 Dataset -- 3 Experimental Results and Evaluation -- 4 Discussion -- References -- Bilinear Pooling of Transformer Embeddings for Blind Image Quality Assessment -- 1 Introduction -- 2 Related Work -- 2.1 Blind Image Quality Assessment -- 2.2 Bilinear Pooling.
3 Methodology -- 3.1 Feature Extraction -- 3.2 Quality Assessment Model -- 3.3 Learning Objective -- 4 Evaluation -- 4.1 Experiment Setup -- 4.2 Results and Analysis -- 4.3 Ablation Studies -- 5 Conclusion -- References -- E-voting and E-recapitulation System Using Smart Cards and Smart Contracts on the Ethereum Blockchain -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 System Design -- 3.2 Threat Modeling and Testing Scenario -- 4 Results and Discussion -- 4.1 Implementation -- 4.2 Security Analysis -- 4.3 Discussion -- 5 Conclusion -- References -- EnsUNet: Enhancing Brain Tumor Segmentation Through Fusion of Pre-trained Models -- 1 Introduction -- 2 Materials and Methods -- 2.1 The Proposed Medical Image Segmentation System -- 2.2 Models Implementation and Proposed EnsUNet Method -- 2.3 Fusion Score -- 3 Experimental Evaluation -- 3.1 Data Augmentation -- 3.2 Evaluation Metrics -- 3.3 Comparison with State of the Art -- 3.4 K-Cross Validation -- 3.5 Evaluation of the Experimental Hypothesis -- 4 Comparison and Discussion -- 4.1 Predictions of Individual Models and Proposed EnsUNet -- 5 Conclusion -- References -- Problems of Optimizing Informaciologically Complicated Systems for Technical Support of Medical Rehabilitation in the Modern Context -- 1 Introduction -- 2 Optimal Time Period for Operating Repair of Physical Therapy Equipment -- 3 Calculation of Weight and Volume of the Equipment for Technical Support of Medical Rehabilitation -- 4 Derivation of a Generalized Functional-Statistical Criterion for Assessment of Efficiency, Quality and Optimization -- 5 Some Particular Statistical Criteria for Assessing the Efficiency of the Informaciologically Complicated Systems of Technical Support for Medical Rehabilitation -- 6 Conclusions -- References.
Determining the Physiological Cost of a Military Serviceman's Activity in the Field Using Innovative Miniature Devices and Advance ECG Analysis: Different Scenarios of Use -- 1 Introduction -- 2 Materials and Methods -- 3 Determination of Functional Reserve During the Command-and-Staff Game on the Training Ground -- 4 Determination of the Functional Reserve During the Training of SOF Military Personnel -- 5 Determination of Functional Reserve Using Long-Term Monitoring by Wearable Devices During Performance of Senior Officers' Daily Duties -- 6 Determination of Functional Reserve Using Miniature Devices with Finger Electrodes in the Unit at the Stage of Preparation for Participation in Combat Operations and During Measures to Restore Combat Capability -- 7 Conclusions -- References -- Food-Talks: Food Ordering and Delivering Application for Visually Challenged -- 1 Introduction -- 1.1 Functionality and User Experience -- 1.2 Accessibility and Inclusivity -- 1.3 Operational Efficiency -- 1.4 Feedback and Improvement -- 2 Literature Review -- 3 Methodology -- 3.1 System Familiarization -- 3.2 Requirements Assessment -- 3.3 Frontend and Backend Development -- 4 Proposed System's Functionality -- 4.1 User Registration and Login Management -- 4.2 Food Menu Management -- 4.3 Product Identification -- 4.4 Order Tracking -- 4.5 User Interaction and Accessibility -- 4.6 Voice Command Recognition -- 4.7 Order Customization and Order Verification -- 4.8 Desktop Application Modules -- 4.9 Integration with Alan AI -- 4.10 User Testing and Evaluation -- 4.11 Data Analysis and UI/UX Assessment -- 5 Results and Discussion -- 6 Conclusion -- References -- Enhancing Diabetic Retinopathy Grading with Advanced Diffusion Models -- 1 Introduction -- 2 Materials and Methods -- 2.1 IDRiD Dataset -- 2.2 Framework Description -- 2.3 Data Augmentation.
3 Results and Discussion -- 3.1 Data Augmentation Results -- 3.2 Classification Results -- 4 Conclusion -- References -- Fuzzy Logic-Based Metric for Machine Translation Evaluation -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 3.1 Step 1: Fuzzy-Based Evaluation Metric Development. -- 3.2 Step 2: Neural Machine Translation Prototype -- 3.3 Step 3: Turkish Sentence Translation. -- 3.4 Step 4: Translation Result Evaluation -- 4 Proposed Fuzzy-Based Automatic Translation Evaluation Metric -- 4.1 Concept of Fuzzy Logic -- 4.2 The Proposed Fuzzy-Based Metric -- 4.3 Execution Steps of the Proposed Fuzzy-Based Metrics -- 4.4 Bilingual Evaluation Understudy -- 5 Results and Finding -- 6 Conclusion and Future Directions -- References -- CodeRookie: Educational Java Programming Environment for Beginners -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Online Java Compiler -- 3.2 Save Compiled Code History -- 3.3 AI-Driven Feedback Tool -- 3.4 Java Theory Learning Point -- 3.5 Community Support Forum -- 4 Discussion -- 5 Conclusion -- References -- An Internet of Medical Things for Covid-19 Health Indicators Monitoring -- 1 Introduction -- 2 Proposed IoMT System for Monitoring Health Indicators of Covid-19 Patients -- 2.1 System Architecture and Principle -- 2.2 Hardware Specification -- 3 Implementation Results Discussions -- 4 Conclusions and Future Works -- References -- Method for Statistical Evaluation of Nonlinear Model Parameters in Statistical Learning Algorithms -- 1 Methodology Grounding -- 1.1 Evaluation of the Existing Methods -- 2 Suggested Methodology -- 3 Experiments -- 3.1 Transcendental Model -- 3.2 Exponential Model -- References -- Deep Auscultation with Demographic Data: Detecting Respiratory Anomalies Using Convolutional Neural Networks and Autoencoders -- 1 Introduction -- 2 Related Work.
2.1 Multi-modal Data in Deep Learning.
Record Nr. UNINA-9910878052603321
Yang Xin-She  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 4
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 4
Autore Yang Xin-She
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (656 pages)
Altri autori (Persone) SherrattSimon
DeyNilanjan
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819735624
9789819735617
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Impact of Institutional Support on First-Year Undergraduate Students' Cybersecurity Compliance Behaviour -- 1 Introduction -- 1.1 Research Questions -- 2 Literature Review -- 2.1 Cybersecurity Compliance (CSC) -- 3 Theoretical Foundation -- 3.1 Theory of Planned Behaviour -- 3.2 The Formation of Habits -- 3.3 Conceptual Framework and Hypotheses Generation -- 3.4 Institutional Support (IS) -- 3.5 Self-efficacy (SE) -- 3.6 Response Efficacy (RE) -- 3.7 Will -- 3.8 Cybersecurity Compliance Behaviour (CCB) -- 4 The Method -- 4.1 The Design -- 4.2 Participants -- 4.3 The Instrument -- 4.4 Data Analysis Techniques -- 5 Data Analysis and Results -- 5.1 The Measurement Model -- 5.2 Convergent Validity -- 5.3 Discriminant Validity -- 5.4 The Structural Model -- 5.5 Mediation Analysis -- 6 Discussion of Findings -- 7 Conclusion -- 8 Limitations of the Study and Prospects -- References -- CodeConnect Classroom: A Coding Education Tool Enabling Collaborative Learning, Real-Time Feedback, and Student Engagement -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 WebSocket Integration -- 3.2 Room Creation and Identification -- 3.3 Features of the Editor -- 3.4 Real-Time Interaction -- 3.5 User Guidance -- 3.6 Security Measures -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- TourMate: Enhancing Tourist Experiences Through Personalized Guidance with Weather Prediction -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Website -- 3.2 Integration of Essential API -- 3.3 Google Map Integration with Hidden Place Feature -- 4 Proposed System -- 4.1 Key Features of the TourMate System -- 5 Results and Discussion -- 6 Conclusion -- References -- The Use of Augmented Reality Tools in Marketing: Opportunities and Limitations in the Latvian Market -- 1 Introduction.
2 The Use of Augmented Reality in Latvia -- 3 What Is Preventing You Use It? -- 4 What Motivates the Use of AR? -- 5 How Virtual Reality Affects Consumers -- 6 Future Opportunities for AR -- 7 Discussion -- 8 Conclusions -- References -- CodePedia: Crafting the Ultimate Java Learning Odyssey for Novice Programmers -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Text Editor -- 3.2 Compiler -- 3.3 Error Messages with Explanation Generator -- 3.4 Visual Debugger -- 3.5 Hinting System -- 3.6 Tutorial Hub -- 3.7 Quiz Challenges -- 3.8 Real-Time Java Challenging Platform -- 3.9 Ranking System -- 4 Results and Discussion -- 5 Conclusion -- References -- Cognitive Complexity Analysis and Optimization Tool for Java -- 1 Introduction -- 2 Related Work on Calculating Cognitive Complexity -- 3 Methodology -- 3.1 Metrics Overview -- 3.2 System Overview -- 4 Conclusion -- References -- Social Entrepreneurship and Artificial Intelligence: How Entrepreneurs Shape Innovation? The Lebanese Case -- 1 Introduction -- 2 Introduction -- 2.1 Social Entrepreneurship (SE) -- 2.2 Artificial Intelligence (AI) -- 2.3 AI and Social Entrepreneurial Decision-Making -- 3 Methodology -- 3.1 The Context of the Study -- 3.2 Exploratory Study -- 4 Findings, Discussion, and Implications -- 5 Conclusion, Limitations, and Future Research -- References -- Enterprise Intelligent Management Analysis and Visualization Based on Data Mining -- 1 Introduction -- 2 The Proposed Method -- 2.1 Intelligent Financial Health Situation Analysis -- 2.2 Intelligent Investment Value Analysis -- 3 Analysis and Visualization of Enterprise Smart Management Results -- 3.1 The Analysis and Visualization of Balance Sheet -- 3.2 The Clustering Analysis and Visualization of Financial Health Situation -- 3.3 The Analysis, Prediction, and Visualization of the Stock Price -- 4 Conclusion.
References -- A Novel Approach to Regional E-government Measurement: The Case of Georgia -- 1 Introduction -- 2 Literature Review -- 2.1 The Concept of E-governance and the Proposed Methods of Assessment of the Level of Development of E-government -- 2.2 Research Problem -- 2.3 Proposed Index -- 3 Methodology -- 4 Model's Consequences -- 5 Conclusion -- References -- Impact of Police Communication Channels on the Police and the Suburban and Rural Community During the COVID-19 Pandemic -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 3.1 Sample -- 3.2 Instrument and Data Collection -- 4 Analytical Plan -- 5 Findings -- 6 Discussion and Conclusion -- References -- The Role of Artificial Intelligence in the Process of Improving Communication Systems of Strategic Objects -- 1 Introduction -- 2 Theoretical Framework -- 3 Main Research Questions -- 4 Research Methodology -- 5 Main Findings and Discussion -- 6 Conclusion -- References -- Secure Connections in Local Networks Despite Multiple Stakeholders -- 1 Introduction -- 2 Our Approach -- 2.1 Device Attestation -- 2.2 Runtime Authentication Using PKI -- 2.3 Multiple Stakeholders -- 2.4 Loss of a Certificate -- 2.5 Secure Reset Without Enabling DoS Attacks -- 3 PKI2go -- 4 Conclusion -- References -- Innovative Solar Battery System Integration for Eco-Friendly Electric Vehicle Charging Stations -- 1 Introduction -- 2 Materials and Method -- 2.1 Micro-grid Modeling -- 2.2 Energy Management Scenario -- 3 Results -- 3.1 Case 1: The Electric Vehicle is Connected to the System -- 3.2 Case 2: The Electric Vehicle is not Connected to the System -- 4 Conclusion -- References -- English-to-Bangla Language Translation: A Comparative Study of GPT-3 and Attention-Based Encoder Decoder -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Model -- 3.3 Encoding.
3.4 Attention Mechanism -- 3.5 Decoding -- 3.6 GPT-3 -- 4 Experiment Results -- 4.1 Embedding-Based Analysis -- 4.2 BLEU Score Analysis -- 4.3 Human Based-Manual Analysis -- 5 Conclusion -- References -- Covering-Based Feedback Verification in Gazebo Simulation for Husky Mobile Robot -- 1 Introduction -- 2 Closed-Loop Design Method -- 2.1 Covering Method -- 2.2 Suggested Approach of Feedback Design -- 3 Feedback Design for a Given Model -- 3.1 Kinematics Model of Husky Robot -- 3.2 Model Based Feedback Design -- 4 Simulation Results -- 5 Conclusion and Future Work -- References -- Machine Learning and Multi-criteria Analysis on the Forex Market -- 1 Introduction -- 2 Related Works -- 3 Trading Systems and Signals -- 4 Efficiency Measures -- 5 Multi-criteria Decision Making Problem -- 6 Numerical Experiments -- 7 Conclusions -- References -- Toward a Readiness Assessment Model for Technology Adoption in Small and Medium Agricultural Industry -- 1 Introduction -- 2 Identified Problem -- 3 Theoretical Framework -- 3.1 Research Questions -- 3.2 State of the Art -- 3.3 Key Definitions -- 4 Readiness Assessment Model for Technology Adoption Validation -- 5 Research Progress -- 6 Conclusions and Future Work -- References -- Impact of Artificial Intelligence and Human Factors in Hybrid Intelligence Dentistry -- 1 Introduction -- 2 Impact of Artificial Intelligence and Human Factors in Hybrid Intelligence Dentistry (Strengths and Weaknesses) -- 3 Clinical Examples from Practice Using DIAGNOCAT AI in Dentistry Related to Human Factors -- 4 Results and Discussion -- 5 Conclusion -- References -- Visual Explanation of Classification Model Using Prototypical Contrastive Embedding in Cervical Cytology -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Problem Formulation -- 3.2 Model -- 3.3 Training -- 3.4 Test and Visualization -- 4 Experiments.
4.1 Dataset -- 4.2 Implementation -- 4.3 Experiment Setting -- 4.4 Result -- 5 Conclusions -- References -- GooseFlowMeter: A Flow Extractor for the Analysis of GOOSE Messages -- 1 Introduction -- 2 GOOSE in a Nutshell -- 3 IEC 61850 Vulnerabilities -- 4 GooseFlowMeter -- 4.1 Flow-Level Network Traffic -- 4.2 Flow Definition -- 4.3 Features Selection -- 5 Experiments and Results -- 5.1 Testbed Environment -- 5.2 Metrics -- 5.3 Classification Algorithms -- 5.4 Results -- 6 Related Work -- 7 Conclusion -- References -- Scalable, Masterless, Distributed, and Redundant Motor Control for PLC Using Object Orientation and Recursivity -- 1 Introduction -- 2 Background -- 2.1 Modern PLCs -- 2.2 Modern PLC Programming -- 3 Related Work -- 4 System Design -- 4.1 Hardware Setup -- 4.2 Software Setup -- 4.3 Implementation Setup -- 5 Realization and Discussion -- 6 Conclusion and Future Scope -- References -- The Use of User-Centred Design Strategies to Design Wearable Mobile Health Technologies: A Systematic Literature Review -- 1 Introduction -- 2 UCD Strategies -- 3 Research Method -- 3.1 Research Objective -- 3.2 Search Terms -- 3.3 Selection Criteria -- 3.4 The Selection Process -- 3.5 The Data Extraction and Analysis Process -- 4 Findings -- 4.1 Most Used UCD Strategies -- 4.2 Health Conditions Included in the Articles -- 4.3 Wearable Technologies -- 5 Discussion -- 5.1 Interactive Requirements' Gathering -- 5.2 Joint Design -- 5.3 Usability and Functionality Evaluation -- 5.4 Scope of Applicability of UCD Strategies -- 6 Conclusion -- References -- Automatic Instance Segmentation Labeling of Road Sign Image from Bounding Box Data -- 1 Introduction -- 2 Related Works -- 2.1 Image Labeling -- 2.2 GrabCut -- 3 Methodology -- 3.1 Dataset -- 3.2 Background Removal -- 3.3 Contour Retrieval -- 4 Experiments and Results -- 4.1 GrabCut Result.
4.2 Get Contour Results.
Record Nr. UNINA-9910878056603321
Yang Xin-She  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 7
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 7
Autore Yang Xin-She
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2024
Descrizione fisica 1 online resource (636 pages)
Altri autori (Persone) SherrattSimon
DeyNilanjan
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9733-02-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- A Literature Review on Teaching and Learning Database Normalisation: Approaches and Tools -- 1 Introduction and Background -- 2 Review of Related Work -- 3 Methodology -- 4 Approaches and Models -- 5 Tools and Applications -- 6 Discussion and Conclusion -- References -- Development of Text-Reading Camera to Assist the Legally Blind Using Neural Network Image Processing Algorithm -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- Rotational Vibration-Based Piezoelectric Energy Harvesting with Bandwidth Enhancement Through Magnetic Oscillators -- 1 Introduction -- 2 Analytical Model and Parameters -- 3 Results -- 4 Conclusion -- References -- Learner-Centered Learning Activity Support Service Based on Push Messages -- 1 Introduction -- 2 Related Works -- 3 Requirements and Architecture of the Learner-Centered Learning Information System -- 3.1 Requirements of Learning-Centered Learning Information Service -- 3.2 Design of the Learner-Centered Learning Activity Support System -- 4 Implements of the Learner-Centered Learning Activity Support Services -- 5 Conclusion -- References -- Employing AI to Predict the Cambodia Securities Exchange Index -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Least Square Approach -- 3.2 Deep Learning Algorithm -- 3.3 Sample Size and Data Collection -- 3.4 Performance Measures -- 4 Findings and Analysis -- 5 Conclusion -- References -- The South African Government's COVID-19 Message: An Analysis of the Official YouTube Channel Titles -- 1 Introduction -- 2 South Africa's Response to the COVID-19 Pandemic -- 3 Social Media Use in Crisis Environments -- 4 Methodology -- 5 Findings -- 5.1 The Message Components -- 5.2 The Message -- 5.3 The Desired Message Outcomes -- 6 Discussion -- 7 Conclusion.
References -- SolAR: Immersive Learning Through an Augmented Reality Application -- 1 Introduction -- 2 Related Work -- 3 System Design -- 3.1 Brainstorming -- 3.2 AR Prototype Design in Unity Game Engine -- 3.3 Final Design -- 4 System Design -- 5 Future Work and Conclusion -- References -- Generalized Krylov Subspace-Based MOR of Periodic Systems -- 1 Introduction -- 2 LDTP System -- 2.1 Lyapunov Equations -- 2.2 Lifted LDTP System Representation -- 3 Generalized Inverses -- 4 Krylov Subspace Method -- 5 Periodic Structured Arnoldi -- 6 Numerical Analysis -- 7 Conclusion -- References -- Navigating the Digital Horizon: Emerging Technologies in Value-Added Tax Management -- 1 Introduction -- 2 Theoretical Background: VAT Management and Technology -- 2.1 The Digital Transformation of VAT Management -- 2.2 The Role of Technology in VAT Management: An Evolving Landscape -- 3 Research Design -- 3.1 Data Sample, Data Collection and Preprocessing -- 3.2 Bibliometric Analyses -- 4 Results and Discussion -- 5 Conclusion -- References -- Traffic Analysis and Signal Timing Optimization of Typical Suburban Intersections -- 1 Introduction -- 2 Traffic Situation Survey and Analysis of the Typical Suburban Intersection -- 2.1 Current Status of Signal Timing -- 2.2 Investigation and Analysis of the Current Situation of Traffic Flow -- 2.3 Problems at Intersections -- 3 Optimization Design of Traffic Signal Timing at Intersections -- 3.1 Optimization Design of Signal Timing -- 3.2 Optimization Effect Evaluation -- 4 Conclusion -- References -- Statistical Analysis of Stakeholders Perception on Adoption of AI/ML in Sustainable Agricultural Practices in Rural Development -- 1 Introduction -- 2 Methodology -- 3 Result and Discussion -- 4 Discussion -- 5 Dependent Variables -- 6 Control Variables -- 7 Implications for Rural Development -- 8 Conclusions -- References.
Self-hosted Open-Source Dependency Management Solutions -- 1 Introduction -- 2 Methodology -- 3 Search Process -- 3.1 Search Strings -- 4 Comparison Criteria -- 4.1 Open-Source Availability -- 4.2 Dependency Pull Capability -- 4.3 Built-In Cloud Solution Support -- 4.4 Common Vulnerabilities and Exposures -- 4.5 Active Maintenance -- 4.6 Single Sign On -- 4.7 License -- 4.8 Supported Programming Language -- 4.9 Tech Stack -- 5 Comparison of Software Solutions -- 5.1 Single Programming Language Support Solutions -- 5.2 Multi-programming Language Support Solutions -- 5.3 Docker and Containerization -- 6 Discussion of Applicability of the Solutions -- 6.1 Applicability of Language-Specific Solutions in Dependency Management -- 6.2 Applicability of Solutions Supporting Multiple Programming Languages -- 6.3 Applicability of Docker in Dependency Management -- 6.4 Future Work -- 6.5 Conclusion -- References -- The Use of Blockchain for Identity and Access Management (IAM) in Multi-cloud -- 1 Introduction -- 2 Identification and Authentication -- 3 Identity Management Across Multiple Cloud Instances -- 3.1 Federated Identity Management -- 3.2 Self-Sovereign Identity -- 4 Blockchain -- 5 CloudBloc Model -- 5.1 Components of the CloudBloc Model -- 5.2 Steps in the CloudBloc Model -- 6 CloudBloc Implementation -- 6.1 CloudBloc Components and the Prototype -- 6.2 Integration of CloudBloc Components -- 7 Results -- 8 Conclusion -- References -- Leveraging Machine Learning for Identifying Occupancy Patterns from Power Data with a Moving Window Feature Extraction Method -- 1 Introduction -- 2 Study Methodology -- 2.1 Aggregated Power Consumption Datasets -- 2.2 Data Preparation and Processing -- 3 Results and Discussion -- 3.1 Machine Leaning Algorithms -- 3.2 Window Size Analysis -- 3.3 Classification Results -- 4 Conclusion -- References.
Dimensional Reduction to Improve Learning Recommender Systems Precision Based on Grades -- 1 Introduction -- 2 Review of Matrix Factorization Techniques -- 2.1 Single Value Decomposition (SVD) -- 2.2 SVD++ -- 2.3 Matrix Factorization -- 2.4 Non-negative Matrix Factorization -- 2.5 Bayesian Matrix Factorization -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- Assessing Ethical Implications of ChatGPT in Higher Education: A Focus on Students -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Falsification or Alteration of Documents -- 3.2 Dishonest Academic Practices -- 3.3 Identity Theft -- 3.4 Drugs -- 4 Discussion -- 5 Conclusions -- References -- Predicting Student Success in Higher Education with Social, Economic, and Education Variables Using Machine Learning Techniques -- 1 Introduction -- 2 Review of Matrix Factorization Techniques -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- The Media Role in Preventing Radicalization: The Police Students' Perspective -- 1 Introduction -- 2 Methods -- 2.1 Sample -- 2.2 Instrument and Data Collection -- 3 Analytic Method -- 4 Results -- 5 Discussion and Conclusion -- References -- Proxy Re-encryption Protocol in Off-Road Emergency -- 1 Introduction -- 2 Preliminaries -- 2.1 Participants -- 2.2 Application Scenario -- 2.3 Security Building Blocks -- 3 Construction -- 3.1 Notations -- 3.2 System Setup -- 3.3 Whole Protocol -- 4 Discussion -- 4.1 Security Analysis -- 4.2 Efficiency Analysis -- 5 Conclusion -- References -- Bridging Social Media and Cryptocurrency: A Deep Learning-Based Twitter Sentiment Analysis for Bitcoin Market -- 1 Introduction -- 2 Novelty Aspect -- 3 Literature Review -- 4 Proposed Research Methodology -- 4.1 Proposed Method and Pre-processing -- 4.2 Dataset Documentation -- 4.3 Long Short-Term Memory (LSTM) -- 4.4 Convolutional Neural Network (CNN).
4.5 Artificial Neural Network (ANN) -- 4.6 Recurrent Neural Network (RNN) -- 4.7 Model Development -- 4.8 Sentiment Analysis -- 5 Result Analysis and Discussion -- 5.1 The Logic on Integration of Twitter Sentiment Data with Bitcoin Price Data -- 5.2 Deep Learning Model Result Interpretation -- 5.3 Bitcoin Price Forecasting -- 5.4 Evaluation Metrics -- 6 Limitations Highlight for Potential Improvement and Future Research -- 7 Conclusion -- References -- Mouse Dynamics-Based Online Fraud Detection System for Online Education Platforms -- 1 Introduction -- 2 Literature Review -- 2.1 Data and Attribute Comparison Matrix -- 3 Data Collection and Preprocessing -- 4 Experiments and Evaluation -- 4.1 Scenario 1: Including l in the Commonly Employed Feature Set -- 4.2 Scenario 2: Removing l from the Commonly Employed Feature Set -- 4.3 Scenario 3: Removing l and t from the Commonly Employed Feature Set -- 4.4 Evaluating User Behavior-Centric Feature Set -- 4.5 Evaluating Reliability of Features -- 5 Conclusion -- References -- Silent Subcarrier-Based Interference Rejection Combining for Mobile Black-Space Cognitive Radios -- 1 Introduction -- 2 Scenarios and Methods for IRC-Based BS-CR -- 2.1 Methods -- 3 IRC for Black-Space Cognitive Radio -- 3.1 Estimation of the Spatial Covariance Matrix -- 3.2 Interpolation-Based Interference Covariance Tracking with Mobility -- 3.3 IRC Process -- 4 Simulation Results -- 5 Conclusion -- References -- What Affects Customer Engagement Among E-Wallet Customers in Indonesia -- 1 Introduction -- 2 Literature Review -- 2.1 Service-Dominant Logic Theory (S-D Logic Theory) -- 2.2 Customer Commitment -- 2.3 Customer Trust -- 2.4 Service Experience -- 2.5 Positive Emotion -- 2.6 Customer Satisfaction -- 3 Methodology -- 4 Results -- 4.1 Sample Profiles -- 4.2 Assessment of Measurement Model -- 4.3 Assessment of Structural Model.
5 Conclusion and Implications.
Record Nr. UNINA-9910878052903321
Yang Xin-She  
Singapore : , : Springer Singapore Pte. Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 8
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 8
Autore Yang Xin-She
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (649 pages)
Altri autori (Persone) SherrattSimon
DeyNilanjan
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819733057
9789819733040
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- A Review on Image Steganography -- 1 Introduction -- 2 Literature Review -- 3 LSB Steganography -- 3.1 Steps Taken in LSB Steganography -- 3.2 Implementation and Result -- 4 Steganalysis -- 4.1 The Detection Processes -- 5 Discussion -- 6 Conclusion -- References -- Developing Personalised Islamic Learning in Digital Age: Pedagogical and Technological Integration for Open Learning Resources (OLR) -- 1 Introduction -- 2 Literature Review -- 3 Results and Analysis -- 3.1 Building Pedagogical and Technological Integration for Open Learning Resources in Higher Education Context -- 3.2 Enhancing Open Learning Resources for Digital Innovative Learning Environment in Higher Education -- 4 Conclusion -- References -- Quantum Codes from Cyclic Codes over the Ring R = IFq + uIFq + vIFq +uv IFq + v2IFq+ uv2IFq -- 1 Introduction -- 2 Preliminaries -- 3 Gray Map -- 4 Cyclic Codes over R -- 5 Quantum Codes over IFq -- References -- Effect of the New Energy Vehicles Pilot Policy on PM2.5 Emissions: Insights from Cities at the Prefecture-Level China -- 1 Introduction -- 2 Empirical Model and Variables -- 2.1 Theoretical Framework -- 2.2 Mechanism Analysis -- 2.3 Variables and Data -- 3 Results and Discussion -- 3.1 Benchmark Regression Results Analysis -- 3.2 Propensity Score Matching Difference-In-Difference (PSM-DID) Test -- 3.3 Mechanism Analysis -- 4 Conclusion -- References -- From Technology Adaptation to Technology Adoption: An Insight into Public Islamic School Administrative Management -- 1 Introduction -- 2 Literature Review -- 2.1 School Administrative Personnel -- 2.2 Duties and Functions of School Administrative Personnel -- 3 Research Results and Discussion -- 3.1 Adapting Technology Adoption for Student Administration -- 3.2 Adapting Technology Adoption for Curriculum Administration.
4 Conclusion -- References -- Augmented Reality Model in Supporting Instruction Process: A Critical Review -- 1 Introduction -- 2 Methodology -- 3 Analysis and Discussion -- 3.1 Enhancing AR in Supporting Instruction Process -- 3.2 Facilitating AR with Digital-Based Design for Learning Instruction -- 4 Implications and Future Directions -- 5 Conclusion -- References -- Examining Purchase Intent in Indonesian E-commerce Cosmetics -- 1 Introduction -- 2 Theoretical Basis -- 2.1 E-business Management -- 2.2 Purchase Intentions -- 2.3 E-commerce -- 2.4 E-service Quality -- 2.5 E-satisfaction -- 2.6 Brand Image -- 3 Research Methodology -- 4 Conclusion -- References -- Integration of Facial Recognition and Facemask Detection for Enhanced Access Control Systems: A Post-epidemic Solution -- 1 Introduction -- 2 Literature Review and Related Work -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preparation -- 3.3 Pre-trained Model Architecture -- 3.4 Model Training -- 3.5 Facial Recognition -- 3.6 Image Capture and Database Entry -- 3.7 Haar Cascade Classifier for Face Detection -- 3.8 Image Storage and API Communication -- 3.9 LBPH Face Recognizer Training -- 3.10 Confidence Threshold and Training Efficiency -- 3.11 API Communication for Model Sharing -- 4 Results and Discussion -- 5 Conclusion -- References -- A Systematic Literature Review on the Impact of the COVID-19 Pandemic on Digital Access and the Digital Divide in South African Higher Education -- 1 Introduction -- 2 Background and Significance -- 3 Objective -- 4 Research Method -- 5 Data Sources and Search Terms -- 6 Data Extraction -- 7 Data Analysis -- 8 Findings -- 8.1 Matrix Analysis -- 8.2 Thematic Analysis Findings -- 9 Discussion -- 9.1 Digital Access Disparities Among SA University Students, Pre-pandemic -- 9.2 Factors Affecting Digital Device Access During the Pandemic.
9.3 Impact of Digital Device Inequalities on Participation During the Pandemic on Marginalised Students -- 9.4 Strategies/Implementations Implemented to Address the Digital Divide -- 10 Conclusion -- 11 Limitations -- 12 Future Research -- References -- Quadratic Stabilizability of Switched Affine Descriptor Systems -- 1 Introduction -- 2 Preliminaries -- 3 State-Dependent Switching Laws -- 3.1 Stabilization at the Origin -- 3.2 Stabilization Around an Equilibrium Point Different to the Origin -- 4 Conclusion -- References -- Predicting Health Status of Maize Crops by Integrating IoT Technology and Inception-v3 Convolutional Neural Network in Precision Agriculture -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Tools, Resources, and Materials Used -- 3.2 Process of Collecting Data -- 3.3 Data Analysis -- 4 Results and Discussions -- 4.1 Inception-v3 Architecture Diagram -- 4.2 Model Training -- 4.3 Results Obtained -- 5 Conclusion and Future Works -- References -- The Classification of the Children Capacity by Cluster -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Research Data Collection -- 3.2 Research Methods -- 4 Processing -- 5 Results -- 6 Conclusion -- Appendix 1 -- References -- Driver Development for GPIO Control in a Linux Environment -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 The Physical Device -- 3.2 The Driver -- 3.3 The User Space Application -- 3.4 Implementation -- 4 Results -- 5 Future Work -- 6 Conclusion -- References -- Diffusion-Based Convolutional Recurrent Neural Network for Improving Sound Event Detection -- 1 Background -- 2 Method -- 2.1 LD-Based Module -- 2.2 CNN Module -- 2.3 Feature-Map Attention Module -- 2.4 RNN Module -- 3 Experimental Setup -- 3.1 Datasets -- 3.2 Measures -- 3.3 Experimental Settings -- 4 Results and Analysis.
4.1 Comparison of Different Pooling Methods for CNNs Classifiers in the DCRNN Model -- 4.2 Comparison of LSTM-RNNs and GRU-RNNs of the DCRNN Model -- 4.3 Comparison of the DCRNN Model with Other Advanced SE Approaches -- 5 Conclusions -- References -- Leveraging Geographic Research, Web Applications and Surveys in the Construction of Educational Strategies in Ecuador -- 1 Introduction -- 2 Data and Methods -- 2.1 BCH Exam and Technical Geographical Research Background -- 2.2 Design and Implementation of the WAS -- 2.3 Management of Contact with the Representatives of the EIs and Organization of the Workshops -- 2.4 Survey Design and Response Analysis -- 3 Results -- 3.1 Workshop Attendance and Respondent Profile -- 3.2 WAS Usage Monitoring -- 3.3 Analysis of Survey Questions -- 3.4 Tabulation of the Themes on Academic Performance -- 4 Discussion -- 4.1 On Good Practices for Developing WAS in Scientific Dissemination Processes -- 4.2 Achievements and Errors in EIs Communication -- 4.3 Proposed Strategies for Improving Access to Higher Education Based on SDG 4 -- 4.4 Lessons Learned from the Pandemic -- 5 Conclusion -- Appendix Proposed Strategies to Improve Academic Performance Based on the Fourth SDG 4 Goals and Means of Implementation -- References -- Serious Gaming for Cultural Heritage: The Case Study of the Domus of Abellinum -- 1 Introduction -- 2 Literature Review -- 3 Case Study and Methodology -- 3.1 Data Acquisition and Point Cloud Optimization -- 3.2 3D Modeling -- 3.3 Serious Game -- 3.4 Testing Phase -- 4 Discussion and Conclusion -- 4.1 Future Developments -- References -- The Metaverse and Revolutionary Perspectives for the Smart Cities of the Future -- 1 Introduction -- 2 Related Work -- 3 Metaverse and Smart Cities: New Perspectives and Opportunities -- 4 Future Implications in the Metaverse.
4.1 Interoperability in the Metaverse: A Scientific Analysis -- 4.2 Security and Privacy in the Metaverse: An In-Depth Analysis -- 4.3 Network Requirements in the Metaverse: A Scientific Perspective -- 4.4 Data Management in the Metaverse: A Scientific Perspective -- 4.5 Digital Addiction and Mental Health in the Metaverse: A Scientific Analysis -- 4.6 Law and Jurisdiction in the Metaverse: An In-Depth Analysis -- 4.7 Environmental Pollution in the Metaverse: A Scientific Analysis -- 5 Conclusion -- References -- A Comparative Study of Machine-Learning Algorithms for Indoor Localization Based on the Wi-Fi Fingerprint According to User Postures -- 1 Introduction -- 2 State of the Art of the Previous Works -- 3 Methodology and System Model -- 4 Performance Analysis and Simulation -- 4.1 Simulation Description -- 4.2 Discussion Analysis -- 5 Conclusion -- References -- The Implementation of Quantum Annealing for Ensemble Pruning -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 The Method's Concept -- 3.2 Experimental Settings -- 4 Experimental Analysis -- 4.1 Ensemble Sizes -- 4.2 Ensemble Accuracy -- 4.3 Discussion -- 5 Conclusion -- References -- Structural Model of a Hydrostatic Cryogenic Liquid Storage and Pressurization Tank in the Food Sector -- 1 Introduction -- 2 State of the Art -- 2.1 Fuel Storage Tanks -- 2.2 Cryogenic Hydrogen Storage Tank -- 2.3 Non-destructive Inspection with Penetrant Dyes -- 3 Contribution -- 4 Validation -- 4.1 Penetrant Dye Testing -- 4.2 Hydrostatic Test -- 4.3 Sensors for the Hydrostatic Test -- 4.4 Pressure Sensor of the Device -- 5 Conclusions -- References -- Internal Flow Model of a Helical Centrifugal Atomizer for Cold Preservation Systems in the Fishing Industry -- 1 Introduction -- 1.1 A Subsection Sample -- 2 State of the Art -- 2.1 Ultrasonic Atomization -- 2.2 Electrospray Atomization.
2.3 Pneumatic Atomization.
Record Nr. UNINA-9910878984403321
Yang Xin-She  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 5
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 5
Autore Yang Xin-She
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (670 pages)
Altri autori (Persone) SherrattSimon
DeyNilanjan
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9732-89-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- A New Wavelet Visual Weighting Model to Optimize Image Coding and Quality Evaluation Based on the Human Psychovisual Quality Properties -- 1 Introduction -- 2 Wavelet Visually Based Image Quality Coding -- 3 Wavelet Visual-Based Image Quality -- 4 Results and Discussion -- 5 Conclusion and Perspectives -- References -- Optimizing the IoT PAYLOAD Encryption Watermarking-Oriented Applying Computational Intelligence and Visual Quality Coding to Improve the Vehicular Speed Controller Platform's Features -- 1 Introduction -- 2 Road Safety Platform Architecture -- 3 AI Vehicle Recognition and Image Watermarking Integration -- 4 Results and Discussion -- 5 Conclusion -- References -- Influence of Ethical Behavior on Job Satisfaction of Members of Information System Project Team -- 1 Introduction -- 2 Theoretical Background -- 2.1 Job Satisfaction -- 2.2 Ethical Culture -- 2.3 Ethical Climate -- 2.4 Ethical Leadership -- 3 Research Design and Methodology -- 4 Data Analysis -- 4.1 Validity and Reliability -- 4.2 Significance of Structural Model -- 4.3 Hypothesis Testing -- 5 Discussion of Results -- 6 Conclusion -- References -- To Be or Not To Be-After AI Revolution -- 1 Introduction -- 2 AI Tools-Student Survey 2023 May -- 2.1 Survey Environments -- 2.2 Awareness, Liking, Confidence, and Frequency of Usage -- 2.3 Future Career, Professional Usage -- 2.4 Cheating -- 3 Summary -- References -- Use of Analytical Methods in Variant Forecasting Tasks -- 1 Introduction -- 2 Materials and Method -- 3 Results -- 4 Conclusion -- References -- Toward a Classification of Factors Influencing eWOM in Online Shopping Through a Systematic Literature Review -- 1 Introduction -- 2 Electronic Word-of-Mouth (eWOM) -- 3 Methodology and Results -- 4 Conclusion, Limits, and Implications -- References.
Away from Theory: A Cloud Storage Application with Public Key Searchable Encryption Feature -- 1 Introduction -- 1.1 Contribution -- 1.2 Organization -- 2 Application Overview -- 2.1 Comprehensive Feature Set -- 2.2 Submodule Interplay -- 3 Auth Submodule -- 4 FileManager Submodule -- 5 SearchableEncryption Submodule -- 6 Interaction Among Submodules -- 7 Conclusion -- References -- Developing a Serious Game for Acute Pain Detection by Utilizing Virtual Reality and Brain-Computer Interfaces -- 1 Introduction -- 2 Background -- 2.1 Brain-Computer Interfaces -- 2.2 Serious Games -- 2.3 Fourier Analysis -- 2.4 Pain -- 3 Methodology -- 3.1 Pain Detection -- 4 Results and Discussion -- 4.1 Results from Pain Detection CNN -- 5 Further Research -- 6 Conclusion -- References -- Hidden Knowledge Extraction for Association Rule Mining Technique Based on the Apriori and Frequent Pattern Growth Algorithms: A Case Study -- 1 General Introduction -- 2 Problem Statement Formulation -- 2.1 Problem Associated with Apriori Algorithm -- 2.2 Proposed Solution of the Problem -- 3 Related Works -- 3.1 Apriori Algorithm Related Work -- 3.2 Frequent Pattern Growth Related Work -- 4 Research Methodology -- 4.1 Data Description -- 4.2 Frequent Pattern Growth Algorithm -- 4.3 Apriori Algorithm Pseudo-Code -- 4.4 Performance Metrics Used for the Analysis of the Rules -- 5 Implementation of the Algorithms -- 5.1 Useful Data Structure Identification -- 5.2 Analysis of the Memory Requirements of the Algorithms -- 6 Experimental Results and Discussion -- 7 Conclusions -- References -- Integration of Distributed Intrusion Detection Systems in IoT Infrastructure -- 1 Introduction -- 2 Machine Learning Background -- 3 Related Works -- 4 Methodology -- 4.1 Proposed Security Framework for the Intrusion Detection in the IoT Infrastructure.
4.2 Proposed Deployment Model-Based Distributed Intrusion Detection System (DIDS) -- 5 Experimental Setup -- 5.1 Performance Analysis Measures -- 5.2 Evaluation -- 6 Conclusion and Future Work Avenue -- References -- Predictive Analysis Model to Improve the Control of Eating Disorders in Adolescents in Metropolitan Lima Based on Machine Learning -- 1 Introduction -- 1.1 Importance of the Problem -- 2 Contribution -- 2.1 Related Works -- 3 Predictive Analysis Model of Eating Disorders in Adolescents -- 4 Method -- 4.1 Participants -- 4.2 Procedure -- 4.3 Predictive Model -- 4.4 Architecture -- 4.5 Main Contribution -- 5 Experimentation -- 6 Results -- 7 Validation -- 8 Discussion -- 9 Conclusion -- References -- A Predictive Model to Support Decision-Making for the Accreditation of Learning Programs Using Data Mining and Machine Learning -- 1 Introduction -- 2 Literature Review -- 2.1 Accreditation Process with ABET -- 2.2 Big Data in University Teaching -- 2.3 A Framework for Automation to Evaluate Academic Accreditation Requirements in Saudi Arabian Universities -- 2.4 An Integrated Perspective on Data Analytics in Higher Education -- 2.5 An Updated Survey on Learning Analytics and Educational Data Mining -- 3 Methodology -- 3.1 Data Preprocess -- 3.2 Methods -- 3.3 Web Design and Implementation -- 3.4 Interpretation/Application -- 4 Results -- 4.1 Model Evaluation -- 4.2 Confusion Matrix -- 4.3 ROC Curve -- 4.4 Web Implementation Results -- 5 Discussion and Conclusion -- References -- Design of a Blockchain-Based Organ Donation and Transplantation Management Framework -- 1 Introduction -- 2 Overview of Blockchain Technology -- 3 Organ Donation and Transplantation Management Framework -- 4 System Requirements -- 5 Conclusions -- References -- Audio Style Transfer Using a Modified Lightweight TimbreTron Pipeline -- 1 Introduction -- 2 Methodology.
2.1 Data Selection -- 2.2 Data Cleaning and Feature Engineering -- 2.3 Our Proposed Pipeline -- 2.4 Architecture -- 3 Discussion and Results -- 3.1 Validation Methodology -- 3.2 Results -- 4 Future Work and Conclusion -- 4.1 Future Work -- 5 Conclusion -- References -- Deep Dive into Invoice Intelligence: A Benchmark Study of Leading Models for Automated Invoice Data Extraction -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Acquisition -- 3.2 Model Training -- 3.3 Models Overview -- 3.4 Experiments -- 4 Results -- 4.1 Overall Performance Analysis -- 4.2 Performance on Key Fields -- 4.3 Resource Consumption Results -- 5 Conclusion -- 6 Future Work -- References -- Combined ECG Analysis Approach Based on Detection of Deviation from the Personal or Population Norm Using Wearable Devices -- 1 Introduction -- 1.1 Background -- 1.2 Problem Statement -- 1.3 Objectives -- 2 Literature Review -- 2.1 AI Analysis of ECG to Detect Deviation from the Population Norm -- 2.2 Real-Time ECG Monitoring via Wearable Technology -- 2.3 Multi-step or Combined Analysis for ECG Data Interpretation -- 2.4 Individual Model Training Coupled with Wearable Technology -- 3 Methodology -- 3.1 Personal ECG Norm Model Generation Process -- 3.2 Concept Architecture -- 4 Expected Results and Requirements -- 4.1 Expected Results -- 4.2 Requirements -- 5 Challenges and Solutions -- 5.1 Challenges -- 5.2 Solutions -- 6 Conclusion and Future Directions -- References -- Atenea Lab: A Softwarized IoT Laboratory for Research and Knowledge Transfer -- 1 Introduction -- 1.1 Motivation -- 1.2 Proposal and Key Points -- 1.3 Contribution -- 2 State of the Art -- 3 Our Proposal: Atenea Lab -- 3.1 Architecture -- 3.2 User Operation -- 4 Atenea Lab in Practice -- 4.1 Test and Limitations -- 4.2 An Agrifood Prototype -- 5 Conclusions and Future Work -- References.
Exploring the Antecedents of Purchase Intention for Organic and Healthy Foods: A Systematic Literature Review -- 1 Introduction -- 2 Purchase Intention -- 3 Organic Food -- 4 Healthy Food -- 4.1 Healthy/Unhealthy Eating Definition -- 4.2 Mind/Body Healthy Eating Definition -- 4.3 Healthy Eating Guidelines -- 5 Methodology and Results -- 5.1 Step 1-Preparation of the Research Question -- 5.2 Step 2-Search for Studies and Works Related to the Research Question -- 5.3 Step 3-Selection and Evaluation of Studies -- 5.4 Step 4-Analysis and Synthesis -- 5.5 Step 5-Results and Reporting -- 6 Conclusion and Limits -- References -- Communicating Universe -- 1 Introduction -- 2 Quantifying Shannon Information -- 3 Probabilities and Odds -- 4 Communicating Physics -- 5 One Picture of Micro- and Macro-world -- 6 Conclusion -- References -- An Overview on Diagnosis of Endometriosis Disease Based on Machine Learning Methods -- 1 Introduction -- 2 Endometriosis and Medical Imaging -- 3 Constructing an Informative Training Dataset -- 4 Feature Extraction and Selection -- 5 Machine Learning Algorithms for Endometriosis Analysis -- 6 Model Training, Validation, and Evaluation -- 7 Clinical Integration and Real-World Impact -- 8 Future Directions and Challenges -- 9 Conclusion -- References -- Blockchain-Integrated Chatbot -- 1 Introduction -- 2 Chatbots in Customer Service-Advantages and Drawbacks -- 2.1 Food Delivery Chatbot -- 2.2 Building Our Food Delivery Chatbot -- 3 Integration of Blockchain Technology in Chatbot -- 3.1 Theoretical Framework of a Blockchain-Integrated Chatbot -- 4 Discussion-Advantages and Disadvantages of a Blockchain-Integrated Chatbot -- 5 Conclusion -- References -- Switching from DOORS to DOORS Next Generation. Identifying the Main Usability Issues. A Case Study -- 1 Introduction -- 2 Theoretical Background.
2.1 Requirements Engineering Process.
Record Nr. UNINA-9910878988403321
Yang Xin-She  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 6
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 6
Autore Yang Xin-She
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2024
Descrizione fisica 1 online resource (635 pages)
Altri autori (Persone) SherrattSimon
DeyNilanjan
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9732-99-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Academic Rating Index: 4IR Supervision Model -- 1 Introduction -- 2 Supervisor Challenges -- 3 Design Science Research Methodology: Academic Rating Index -- 3.1 Problem Relevance -- 3.2 Design Search Process -- 3.3 Design of the Artifact -- 3.4 Research Rigor -- 4 Development Results (Contribution and Communication) -- 5 Discussion and Conclusion -- References -- Variational Quantum Algorithms in Finance -- 1 Introduction -- 2 Hybrid Quantum-Classical System -- 2.1 The Cost Function -- 2.2 Ansatze -- 2.3 Optimizers -- 3 Portfolio Optimization-Mean Variance Analysis -- 4 Price/Option Prediction -- 5 Conclusion -- References -- Early-Stopped Technique for BCH Decoding Algorithm Under Tolerant Fault Probability -- 1 Introduction -- 2 Early Stopped Approach Based on the View of Discrepancy for the BM Algorithm -- 2.1 Heuristics for Consecutive Zero Discrepancies -- 2.2 Numerical Analysis of Fault Probability for the Proposed Early Stopped Technique -- 3 Complexity Analysis -- 4 Numerical Results -- 5 Conclusion -- References -- Value Creation via Blockchain Technology: A Systematic Literature Review and Future Research Agenda -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 3.1 RQ1: What Is the Current State of Blockchain Value and Value Creation Research? -- 3.2 RQ2: What Are the Underlying Research Themes? -- 3.3 RQ3: What Are the Potential Opportunities for Future Research? -- 4 Conclusion -- References -- A 3D Virtual Laboratory for Computer Hardware Classes -- 1 Introduction -- 2 Related Works -- 3 Design and Development -- 3.1 Design -- 3.2 Development and Results -- 4 Conclusion -- References -- Method of Multifactor Analysis of the Alternatives Using the Example of Multi-criterial Selection of the Optimal Cargo Transportation Route -- 1 Introduction.
2 The Idea of Solving the Problem -- 3 Infological Model of Optimal Cargo Transportation Routing Indicators -- 4 Calculation of the Route Optimality Indicators -- 4.1 Building a Graph of the Transport Network -- 4.2 Calculating Partial Criteria for an Optimal Route on a Graph -- 4.3 Construction of Routes on a Graph -- 5 Determination of Route Optimality from the List of Alternatives -- 5.1 Normalization Partial Optimality Criteria -- 5.2 Formation of Generalized Criteria for Route Optimality -- 5.3 Normalized of Generalized Criteria of Route Optimality -- 5.4 Establish an Integrated Optimality Criterion -- 5.5 Choosing the Optimal Route -- 6 Conclusions -- References -- Detection of Cyberbullying Text in Bangla Using N-Gram Analysis and Machine Learning Approaches -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Word Tagging -- 4 Result and Discussion -- 5 Conclusion -- References -- Sound Source Distance Measurement Using Complex Sparse Bayesian Estimation with a Small Microphone Array System -- 1 Introduction -- 2 Overview of the Estimation Method -- 2.1 Configuration of Microphones and Voxels -- 2.2 Problem Formulation -- 2.3 Sparse Bayesian Estimation -- 2.4 Overview of Estimation Algorithm -- 3 Evaluation with Sinusoidal Signals -- 3.1 Evaluation with One Sound Source -- 3.2 Evaluation with Two Sound Sources -- 4 Evaluation with Speech Signals -- 4.1 Speech Signals Used in Experiments -- 4.2 Simulation Experiment Results -- 4.3 Discussions -- 5 Conclusion -- References -- How Blockchain and the Metaverse Can Transform the E-Commerce Domain -- 1 Introduction -- 2 Related Research -- 2.1 Blockchain and E-Commerce -- 2.2 Metaverse and E-Commerce -- 3 Case Study -- 3.1 Methodology -- 3.2 Implementation -- 4 Conclusion and Future Research -- References.
HR Development Strategy Through Training Towards Superior Tourism on the Department of Tourism, Youth and Sports at Bulukumba Regency, Indonesia -- 1 Introduction -- 2 Method -- 3 Results and Discussion -- 3.1 Recruitment -- 3.2 Education -- 3.3 Training -- 4 Conclusion -- References -- Predictive Modelling of Himalayan Soil Movement: Addressing Imbalance with Synthetic Variational Autoencoder Data in Kamand Valley -- 1 Introduction -- 2 Background -- 3 Study Area and Data Description -- 4 Methods -- 4.1 Proposed Multi-LSTM-RF -- 4.2 Model Optimisation -- 5 Results -- 6 Discussion and Conclusion -- References -- Using the Decision Tree Model Method for Data Analysis -- 1 Introduction -- 2 Materials and Method -- 3 Results -- 4 Conclusion -- References -- Localization of Region of Interest from Retinal Fundus Image for Early Detection of Glaucoma -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Pre-processing Fundus Images -- 3.2 Deep CNN Model for Classification -- 3.3 Features Extracted Between the Layers -- 4 Results and Discussions -- 5 Conclusion -- References -- Hardware Accelerators for Classification of Thoracic Disorders: A Survey -- 1 Introduction -- 2 Background and Motivation -- 3 Classification of Accelerators -- 4 FPGA-Based Hardware for Deep Learning -- 4.1 Performance Study -- 4.2 Addressing the Challenges -- 5 Conclusion -- References -- Offline Signature Verification Based on Neural Network -- 1 Introduction -- 2 Related Works -- 3 Principal Component Analysis (PCA) -- 4 Proposed Verification System -- 5 Artificial Neural Network Results -- 6 Conclusion -- References -- Multi-hop Wireless Network for Residential DC Microgrid Energy Management -- 1 Introduction -- 2 Development and Methodology -- 2.1 Battery Energy Storage System, Power Balancing and Control.
3 Residential Energy Management and Control System Model -- 4 Multi-hop Network Simulation -- 5 Simulation Results -- 5.1 Scenario1 -- 5.2 Scenario 2 -- 5.3 Scenario 3 -- 6 Conclusion -- References -- Deliberative Communication in Bulgaria: Risks and Opportunities -- 1 Introduction -- 2 Deliberative Democracy Developments -- 3 Deliberative Communication -- 4 Risks and Opportunities for Deliberative Communication -- 4.1 Legal and Ethical Regulation -- 4.2 Journalism -- 4.3 Media Usage Patterns -- 4.4 Media-Related Competences -- 5 Conclusion -- References -- Development of an Automated Feeder for Free Grazing Meat-Producing Animals -- 1 Introduction -- 2 Principle of Operation -- 3 Technical Equipment -- 4 Algorithm and Block Schemes -- 5 Potential Challenges and Solutions in Implementing Such a System -- 6 Future Steps -- 7 Conclusion -- References -- Innovative Solutions for Sustainable Businesses-ErfindenTech Pvt. Ltd. -- 1 Introduction -- 2 Literature Review -- 3 Research Objective -- 4 Research Methodology -- 5 Findings -- 6 Conclusions and Recommendations -- References -- A Comparative Study on Two Apple Leaves Datasets Captured Under Diverse Conditions -- 1 Introduction -- 2 Literature Review -- 3 Background -- 3.1 Image Processing -- 3.2 Computer Vision -- 3.3 Deep Learning -- 4 Material and Methods -- 4.1 Apple Datasets -- 4.2 Data Augmentation -- 4.3 Architecture -- 5 Results and Discussions -- 6 Conclusions -- References -- A New Classification of Target Coverage Models in WSNs, Survey and Algorithms and Future Directions -- 1 Introduction -- 2 Wireless Sensor Network Issues -- 3 Coverage Types Classification and the Relationship Between Them -- 4 Target Coverage Problem -- 5 Our Classification of Target Coverage -- 6 Current, Challenges, and Future Trends of Target Coverage -- 7 Conclusion -- References.
Neural Network MPPT Control of an On-Grid Wind Energy System -- 1 Introduction -- 2 Boost Converter Modeling -- 3 MPPT Control -- 4 Results and Discussion -- 5 Conclusion -- References -- Color-Based Segmentation of Geometrical Shapes Using the Modified PCNN -- 1 Introduction -- 2 The Modified PCNN Model -- 3 The Experimental Results -- 4 Conclusions -- References -- Addressing the Business Disruption Through the Development and Pilot Testing of Caviturismo: A Web Portal for Cavite Tourism -- 1 Introduction -- 2 Methodology -- 2.1 Content Creation -- 2.2 Software Design -- 2.3 Software Development -- 2.4 Software Testing -- 3 Results and Discussion -- 3.1 Description of the System -- 3.2 Test Results -- 4 Conclusions and Recommendations -- References -- An Overview on Testing Big Data Applications -- 1 Introduction -- 2 Background -- 3 Typical Components of Big Data Applications -- 4 Testing the Identified Components -- 5 Conclusion -- References -- What Is a Managed Backup?-A Literature Review Delimiting Terminologies -- 1 Introduction -- 2 Background -- 2.1 Cloud Computing -- 2.2 Managed Service -- 2.3 Backup -- 3 Examination of the Terminology -- 3.1 The Review Protocol -- 3.2 The Findings -- 3.3 Delimitation of the Concepts -- 4 Conclusion -- References -- iFCVP: An Integrated FCNP-VWA-PROMETHEE Method for On-Demand Charging Scheduling in WRSNs -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 An Overview of an Integrated FCNP-VWA-PROMETHEE -- 3.2 System Model -- 4 Proposed Scheme -- 4.1 Ordering the Charge Locations -- 4.2 Partial Charging Time -- 4.3 Determination of pCT -- 5 Performance Evaluation -- 5.1 Simulation Settings -- 5.2 Simulation Results and Analysis -- 6 Conclusion -- References -- Predicting Drought Based on Weather and Soil Data Analysis -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Methodology.
4.1 Random Forest Model Without Resampling.
Record Nr. UNINA-9910878069203321
Yang Xin-She  
Singapore : , : Springer Singapore Pte. Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 2
Proceedings of Ninth International Congress on Information and Communication Technology : ICICT 2024, London, Volume 2
Autore Yang Xin-She
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (647 pages)
Altri autori (Persone) SherrattSimon
DeyNilanjan
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9735-56-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Terraria AI: YOLO Interface for Decision-Making Algorithms -- 1 Introduction -- 1.1 You only Look once -- 1.2 Video Game Description Language -- 1.3 General Video Game Artificial Intelligence -- 1.4 Monte Carlo Tree Search -- 1.5 Rolling Horizon Evolutionary Algorithm -- 1.6 Terraria -- 1.7 Novelty and Research Structure -- 2 Related Work -- 3 Design -- 3.1 YOLO Model -- 3.2 Forward Model -- 3.3 Decision-Making Algorithm -- 3.4 Game Environment -- 3.5 Terraria Settings -- 4 Methodology -- 5 Results -- 6 Discussion -- 7 Conclusion and Future Work -- References -- Analysis of Machine Learning Methods for Speech Disfluencies' Classification -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Segmentation -- 3.2 Feature Extraction -- 3.3 Classification -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Credit Risk Management Innovation in Bank Based on Blockchain Technology -- 1 Introduction -- 2 Literature Review -- 2.1 MSMEs, Problem of Agency, and Credit Risk -- 2.2 Traditional Credit Risk Management at Bank -- 2.3 Credit Risk Management at Bank Based on Blockchain Technology -- 3 Research Method -- 4 Finding and Discussion -- 4.1 Credit Risk Management Based on Traditional Approach -- 4.2 Credit Risk Management Innovation Based on Blockchain Technology -- 4.3 Advantages of Blockchain Technology as Credit Risk Management Innovation -- 4.4 Comparison Between Traditional Credit Risk and Credit Risk Management Innovation -- 4.5 Implementation of Credit Risk Management Innovation -- 5 Conclusion -- References -- Software MARTA: Improvements in Cell Segmentation and CX43 Lateralization Assessment -- 1 Introduction -- 2 Materials and Methods -- 2.1 Sample Collection -- 2.2 Determination of Dominant Orientation -- 2.3 Mask Generation.
2.4 Dilation and Mask Generation -- 2.5 Cardiomyocytes Detection -- 2.6 Morphological Characterization and Filtering of Cardiomyocytes -- 2.7 Evaluation Methods for Segmentation -- 2.8 CX43 Quantification and Lateralization Assessment -- 3 Results -- 3.1 Segmentation Performance -- 3.2 Lateralization Assessment -- 4 Discussion -- 5 Conclusion -- References -- Battery Temperature Forecasting Method: Li-Ion Batteries Case Study -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Battery Data Description and Preprocessing -- 3.2 ARIMA -- 3.3 LSTM -- 4 Assessment of Methods -- 5 Results and Discussion -- 5.1 ARIMA Model Results -- 5.2 LSTM Model Results -- 5.3 Forecasting Models Implementation -- 5.4 Battery Type B0045 Analysis -- 5.5 Battery Type B0046 Analysis -- 5.6 Battery Type B0047 Analysis -- 5.7 Battery Type B0048 Analysis -- 6 Discussion -- 7 Practical Implications and Challenges -- 8 Conclusion -- References -- Modeling of a Pandemic Compliant Smart Classroom Door for Nigerian Education System -- 1 Introduction -- 1.1 Motivation -- 1.2 Concept of Doors -- 1.3 Types of Automated and Smart Door Designs -- 2 Review of Related Works -- 2.1 New Classroom Door Design Model -- 2.2 Comparison of Review-Related Works and Research Gap -- 2.3 Door Control Actions that Can Be Linked to Backend Web Applications and School Information Systems -- 3 Implementation Materials -- 4 Design Model and Analysis -- 4.1 New Classroom Door Design Model -- 4.2 Benefit of the New Smart Classroom Door -- 5 Result and Discussion -- 6 Conclusion -- References -- Technological Resources for the Treatment of ADHD: A Systematic Review -- 1 Introduction -- 2 Method -- 2.1 Research Design -- 3 Results -- 3.1 Sample Size -- 3.2 Country -- 3.3 Educational Level of Participants -- 3.4 Population Type -- 3.5 Type of Technological Development.
3.6 Technological Development: Name and Features -- 4 Discussion -- References -- Enhanced Hybrid Skin Detection Method Using Multiple 3D Volumes and Threshold Optimization -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experimental Results -- 5 Conclusion -- References -- Beaver Habitat Terrain Identification Using Aerial Imagery -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Datasets -- 3.2 Models -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Evaluation Study on Digitalized Administrative Approval Reform: Example of the Economic and Technological Development Zone -- 1 Introduction -- 2 Literature Review -- 3 Theory -- 4 Method -- 5 Measures -- 5.1 Promote the Digitalization and Intelligent Upgrading of the Government Service Center -- 5.2 Data Sharing and Operational Synergies to Meet Public Needs -- 5.3 Admit the Scenario-Based Personalized Approval Services -- 6 Conclusion -- References -- Prediction of Customer Underwriting of Policies in Banking Institutions Through Machine Learning -- 1 Introduction -- 1.1 The Problem and Fundamentals of Machine Learning -- 1.2 Description of the Proposed Method -- 1.3 Bank Marketing Campaigns -- 1.4 Related Work -- 2 Proposed Method -- 3 Design of Experiments -- 4 Results -- 5 Conclusions -- References -- Design and Construction of an Animatronic Head Capable of Expressing Emotions and Facilitating Therapy for Children with Autism -- 1 Introduction -- 2 Facial Expressions -- 3 Mechanical and Aesthetic Module -- 3.1 Eye Mechanism -- 3.2 Mouth Mechanism -- 3.3 Neck Mechanism -- 4 The Electrical and Electronic Module -- 4.1 Actuators -- 4.2 Printed Circuit Board -- 5 Interaction Module -- 5.1 Artificial Vision -- 5.2 Graphical User Interface -- 6 Functional Test -- 7 Results and Discussion -- 8 Conclusions and Outlook -- References.
Fusion of Hyperspectral and Multispectral Images for Land Use Segmentation -- 1 Introduction -- 2 Literature and Related Work -- 3 Datasets -- 4 Method -- 5 Results and Discussion -- 6 Conclusion -- References -- Urban Terrain Segmentation Using Multispectral Satellite Imagery -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion and Further Work -- References -- Facilitating Welfare Technology for Children/Youth -- 1 Introduction -- 1.1 Background -- 1.2 The Objective of This Research -- 2 Theoretical Framework -- 2.1 Diffusion of Innovation -- 2.2 Characteristics of Innovation -- 3 Method -- 4 Analyzing -- 5 Diffusion Related to Children/Youth -- 6 Concluding Remarks -- References -- A Quantum Computing-Based System for Portfolio Optimization Using Future Asset Values and Automatic Reduction of the Investment Universe -- 1 Introduction -- 2 Related Work -- 3 Inputs and Outputs of Q4FuturePOP -- 4 Q4FuturePOP: Quantum Computing-Based System for Portfolio Optimization with Future Asset Values and Automatic Universe Reduction -- 4.1 Predicted Dataset Generation Module-PDG -- 4.2 Quantum Computing Solver Module-QCS -- 4.3 Assets Universe Reduction Module-AUR -- 5 Discussion on the Preliminary Performance -- 6 Conclusions and Future Work -- References -- Distribution-Specific Augmentation for Domain Generalization -- 1 Introduction -- 2 Related Work -- 2.1 Data-Centric AI -- 2.2 Distribution Shift -- 3 Distribution-Specific Augmentation -- 3.1 Domain Generalization -- 3.2 Augmentation -- 3.3 Decomposition -- 3.4 Algorithm Description -- 4 Application of RPCA-PCP -- 4.1 Synthetic Dataset -- 4.2 IWildCam 2020 -- 5 Classification Results -- 5.1 Synthetic Dataset -- 5.2 IWildCam 2020 -- 6 Discussion -- References -- Load Flow of 210 MW Wind Farm Using ETAP -- 1 Introduction -- 1.1 Background.
1.2 ETAP Software -- 1.3 Paper Organization -- 2 Study Case Description: Wind Farm Details -- 3 Methods and Materials -- 3.1 Modeling of the Components and Network of the Electrical System -- 3.2 Development of Load Flow Equations -- 3.3 Numerical Techniques Solution of Load Flow Equations -- 4 Simulation of Load Flow in ETAP -- 5 Conclusion -- References -- Volumetric Attention Mechanism-Based Deep Learning for Breast Cancer Diagnosis in Digital Breast Tomosynthesis -- 1 Introduction -- 2 Methodology -- 2.1 Data Description and Preprocessing -- 2.2 Volumetric Attention Mechanism (VAM) Model Development -- 3 Results and Discussion -- 4 Conclusions -- References -- Automated Transcription of MTM Motions in a Virtual Environment -- 1 Introduction -- 2 Previous Work -- 3 Contribution -- 3.1 Algorithm Procedure -- 3.2 User Study -- 4 Study Results -- 4.1 SSQ Results -- 4.2 Results of the TLX -- 4.3 Comparison Against a Manual Data Transcription -- 5 Discussion -- 6 Conclusion and Future Work -- References -- A Categorical Transformer with a Data Science Approach for Recommendation Systems Based on Collaborative Filtering -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Design of Experiments -- 5 Results and Conclusions -- References -- Imagery Data Impact Analysis in Machine Learning Algorithm Performance for Bushfire Detection Systems -- 1 Introduction -- 2 Methodology -- 2.1 Problem Statement -- 2.2 Dataset -- 2.3 Algorithms -- 3 Results and Discussion -- 3.1 Experiment 1 -- 3.2 Experiment 2 -- 3.3 Experiment 3 -- 4 Conclusion -- References -- Balancing Autonomy, Resource Management, and Internship Integration: Challenges and Strategies in Hybrid Learning -- 1 Introduction -- 2 Challenges in Running Autonomy in Higher Education -- 2.1 Challenges in Managing Various Academic Components.
2.2 Challenges in Conducting Lectures and Labs with Respect to Semester-Long and Year-Long Internship Students.
Record Nr. UNINA-9910879583403321
Yang Xin-She  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Sixth International Congress on Information and Communication Technology : ICICT 2021, London, Volume 3
Proceedings of Sixth International Congress on Information and Communication Technology : ICICT 2021, London, Volume 3
Autore Yang Xin-She
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (1045 pages)
Altri autori (Persone) SherrattSimon
DeyNilanjan
JoshiAmit
Collana Lecture Notes in Networks and Systems Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-1781-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Refining the Efficiency of R-CNN in Pedestrian Detection -- 1 Introduction -- 2 Pedestrian Detection Methods -- 3 Improving R-CNN Detector -- 3.1 Proposed Architectural Innovation of the R-CNN Detector Base Network -- 3.2 Proposed R-CNN Training Workflow -- 4 Training and Testing the R-CNN Detector -- 4.1 Classification Models Applied -- 4.2 Datasets -- 4.3 Training Data Pre-Processing -- 4.4 Performance Measures -- 5 Experimental Results -- 6 Conclusion -- References -- Towards Spark-Based Deep Learning Approach for Fraud Detection Analysis -- 1 Introduction -- 2 Proposed Spark-Based Deep Learning Architecture -- 3 Experimental Results -- 4 Conclusion and Discussion -- References -- Enhanced Dual-Band Bandstop Filter with Stepped-Impedance Resonators Using a Computer-Aided Optimization Technique -- 1 Introduction -- 2 DBBSF with SIRs -- 3 TSM -- 4 Results and Discussion -- 5 Conclusion -- References -- Self-Presentation and Social Anxiety on Facebook -- 1 Introduction -- 2 Literature Review -- 2.1 Belonging, Personality, and Self-Presentation on Facebook -- 2.2 Self-Expression, Self Esteem, and Self-Concept on Facebook -- 2.3 Social Comparison of Users on Facebook -- 2.4 Social Anxiety on Facebook -- 3 Methodology -- 3.1 Subjects/Participants -- 3.2 Research Design -- 4 Result -- 4.1 Social Media Usage -- 4.2 Self Presentation and User-Perception on Facebook -- 4.3 Social Anxiety on Facebook -- 5 Conclusion and Discussion -- References -- Automatic Regional Estimation of Myocardial Strain Using Deep Learning -- 1 Introduction -- 2 State of the Art of Automatic Methods for Cardiac Strain and Strain Rate Evaluation in MRI -- 2.1 Characterization of Myocardial Deformation -- 2.2 The Different Methods of Assessing Myocardial Strain in MRI.
2.3 Automatic Methods of Assessing Myocardial Deformation Using Deep Learning -- 3 Results and Discussions -- 4 Conclusion -- References -- Adversarial LSTM-Based Sequence-to-Sequence Model for Drug-Related Reactions Understanding -- 1 Introduction -- 2 Literature Background -- 2.1 Deep Neural Network Methods -- 2.2 Medical Concepts Normalization -- 3 Proposed Approach -- 4 Implementation and Experiments -- 5 Conclusion -- References -- Structural Organization of the Server System of Multiuser Device for Home Health Control -- 1 Introduction -- 2 System Description -- 3 Conclusion -- References -- Analyzing the Most Influencing Factors in Limiting the Spread of COVID-19 Disease -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 3.1 Government Responses -- 3.2 Population Density and Age -- 3.3 Healthcare Factors -- 3.4 Temperature, Humidity, and Wind Speed -- 4 Analysis -- 4.1 Population Density -- 4.2 Age -- 4.3 HealthCare -- 4.4 Temperature/Humidity and Wind Speed -- 4.5 Government Responses -- 5 Conclusion -- References -- Performance Comparison of Two Java-Based Actor Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Akka Concepts -- 2.2 Theatre Concepts -- 2.3 Actor Programming Style -- 3 The Iterated Prisoner's Dilemma Case Study -- 3.1 A PIPD Theatre Model -- 3.2 Porting the PIPD Model to Akka -- 4 Experimental Results -- 5 Conclusions -- References -- E-government Research in Africa: A Systematic Review -- 1 Introduction -- 2 Methodology -- 2.1 Data Sources -- 2.2 Inclusion and Exclusion Criteria -- 2.3 Search and Selection Process -- 3 Findings and Discussion -- 3.1 Year of Publication and Outlets -- 3.2 Research Themes -- 3.3 Nature of the Platform -- 3.4 Geographical Context of the Study -- 3.5 Underlying Theories/Frameworks/Models -- 3.6 Underlying Methods -- 4 Identified Gaps for Future Research.
4.1 Using Other Methodologies and Larger Sample Sizes -- 4.2 Theorization of E-government Studies -- 4.3 More Studies on Challenges in Implementing and Accessing E-government Platforms -- 5 Conclusion, Implications, and Limitations -- References -- Control to Manipulate Robotic Arms Using Augmented Reality -- 1 Introduction -- 2 Development -- 2.1 Kinematic Model -- 2.2 Control -- 3 Results Obtained -- 4 Conclusions -- References -- Analysis of Website Quality and City Government's Twitter Accounts in East Java Province, Indonesia -- 1 Introduction -- 2 Literature Review -- 2.1 The Use of Website on E-government -- 2.2 Measurement of the Quality of Government Website -- 2.3 Social Media on Government: Official Twitter Accounts -- 3 Method -- 4 Results -- 4.1 Website Quality on City Government -- 4.2 Social Media on Government: Official Twitter -- 5 Conclusion -- References -- How Does Local Government Use the Website and Twitters as Public Services Tools? A Case Study of Aceh Province Government, Indonesia -- 1 Introduction -- 2 Literature Review -- 2.1 Government Behavior -- 2.2 How ICT Effecting Behavior -- 2.3 ICT Performance on Services -- 3 Research Methods -- 4 Results and Discussion -- 4.1 Analysis of the Quality and Speed of Access to City Government Websites in Aceh Province -- 5 Use of City Government Twitter Accounts -- 6 Conclusion -- References -- How Does the Local Government Provide Official Website and Twitter Quality? Case Study of Three Local Governments of Indonesia -- 1 Introduction -- 2 Literature Review -- 2.1 The Use of Website on E-Government -- 2.2 E-governance -- 2.3 Public Services -- 2.4 Measuring Quality of Government Website -- 2.5 Quality of E-Government Service -- 3 Method -- 4 Result -- 4.1 Website Quality on City Government -- 4.2 City Government Official Twitter Account -- 5 Conclusion -- References.
Cloud Computing Adoption-Based Digital Open Government Services: Challenges and Barriers -- 1 Introduction -- 2 Cloud Building Blocks for Digital Open Government -- 2.1 Cloud Challenges -- 3 Digital Open Government Challenges -- 3.1 Technological Challenges -- 3.2 Users Aspects -- 3.3 Social Challenges -- 3.4 Financial Challenges -- 4 Methodology -- 5 Result and Finding -- 5.1 Summary of the Questionnaire -- 5.2 Participants Details -- 6 Explanation of the Research Questions -- 6.1 Users' Views of Cloud-Based DOG Hurdles -- 6.2 IT-Employees' Views of Cloud-Based DOG Obstacles -- 6.3 Respondents' Views of the Really Significant Challenges -- 6.4 Assessment of Challenges Perceptions -- 7 Conclusion -- References -- Teacher Agency: Navigating the Virtual Learning Environment in the New Normal -- 1 Introduction -- 1.1 The PLMS as the Primary Virtual Instructional Delivery System -- 1.2 The PMLS as a Negotiated Learning Platform -- 2 Main Objective and Research Problems -- 3 Research Methodology -- 4 Conditions Facilitating the Virtual Learning Environment -- 4.1 Student Context and Parental Involvement -- 4.2 The Nature of PLMS and Online Learning -- 4.3 Teacher Agency -- 5 Derived Virtual Teaching Models -- 6 Structuring Free Rein: Resolving Constraints -- 7 Conclusion -- References -- Secure Trusted Operating System Based on Microkernel Architecture -- 1 Background -- 2 Related Work -- 3 Our Work -- 3.1 Trusted OS Architecture -- 3.2 Trusted OS Kernel -- 3.3 Trusted OS System Service -- 4 Evaluation -- 4.1 Trusted OS Kernel -- 4.2 Trusted OS System Service -- 5 Conclusions -- References -- The Case of Fabric and Textile Industry: The Emerging Role of Digitalization, Internet-of-Things and Industry 4.0 for Circularity -- 1 Introduction -- 2 Circular Economy in Textile Industry -- 3 Digital Solutions for Textile Circularity -- 4 IoT and Circular Fashion.
5 Conclusions and Discussions -- References -- Quality Assessment of Text Data Using C-RNN -- 1 Introduction -- 2 Related Work -- 2.1 Text Feature Extraction and Representation Techniques -- 2.2 Text Quality Assessment Techniques -- 2.3 Convolutional Neural Network -- 2.4 Recurrent Neural Networks -- 2.5 Convolutional Recurrent Neural Network -- 3 Proposed Method -- 3.1 Dataset -- 3.2 Data Pre-Processing -- 3.3 Proposed Deep Learning Model -- 3.4 Other Classification Methods -- 4 Evaluation and Results -- 5 Conclusion and Future Work -- References -- Casablanca Smart City Project: Urbanization, Urban Growth, and Sprawl Challenges Using Remote Sensing and Spatial Analysis -- 1 Introduction -- 2 Related Works -- 2.1 Smart Cities Definition and Characteristics -- 2.2 Casablanca Smart City Model -- 3 Study Area -- 4 Spatial Data -- 5 Methodology -- 5.1 Data Processing Workflow -- 5.2 Satellite Imagery Classification -- 6 Results Analysis -- 6.1 Land Use Cover Maps and Change Detection -- 7 Conclusion -- References -- Facial Expressions Classification on Android Smartphone for a User -- 1 Introduction -- 2 Related Work -- 3 Automatic System for Facial Expression Evaluation-Theoretical Background and State of the Art -- 3.1 State of the Art -- 4 Methodology for Facial Expression Evaluation System -- 5 Experiment and Evaluation of Success Rate -- 5.1 System Architecture -- 5.2 Result and Discussion -- 6 Conclusion and Future Development -- References -- A Survey in IoT for Healthcare Applications -- 1 Introduction -- 2 Internet-of-Things (IoT) -- 2.1 IoT -- 2.2 Essential Component of IoT -- 2.3 Applications in IoT -- 2.4 Diverse Purposes of Internet-of-Things in Health Care Systems -- 2.5 Key Advantages of Internet-of-Things in Health Care Systems -- 2.6 Some Parameters Are Used in Healthcare System -- 2.7 Sensors in Healthcare System.
2.8 Some Opportunities of Internet-of-Things in Healthcare.
Altri titoli varianti Proceedings of Sixth International Congress on Information and Communication Technology
Record Nr. UNINA-9910502658503321
Yang Xin-She  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui