Vai al contenuto principale della pagina

Information Technology and Systems : ICITS 2024, Volume 1



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Rocha Álvaro Visualizza persona
Titolo: Information Technology and Systems : ICITS 2024, Volume 1 Visualizza cluster
Pubblicazione: Cham : , : Springer, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (481 pages)
Altri autori: FerrásCarlos  
Hochstetter DiezJorge  
Diéguez RebolledoMauricio  
Nota di contenuto: Intro -- Preface -- Contents -- Big Data Analytics and Applications -- Detection of Fake News Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Theoretical Framework -- 5 Results -- 6 Conclusions -- References -- HJ-Biplot and Clustering Techniques for Analyzing Water Quality: A Case Study*-16pt -- 1 Introduction -- 2 Data Acquisition -- 3 Methodology -- 4 Results and Discussion -- 4.1 General Analysis -- 4.2 Analysis by Regions of the River -- 4.3 Analysis According to Months -- 5 Conclusions -- References -- Customer Segmentation in Online Retail Using K-Means Clustering Classification and Principal Component Biplot -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dataset -- 3.2 Data Treatment -- 3.3 Cohort Analysis -- 3.4 Recency, Frequency, Monetary Value (RFM) Analysis -- 3.5 Clustering, K-Means -- 3.6 Principal Component Analysis (PCA) Biplot -- 4 Results and Discussion -- 4.1 Data Treatment -- 4.2 Dataset Analysis -- 4.3 Cohort Analysis -- 4.4 Recency, Frequency, Monetary Value(RFM) -- 4.5 Clustering - Kmeans -- 4.6 PCA Analysis -- 5 Conclusion and Recommendation -- References -- COVID Interactive Query Answering Using a Data Cube -- 1 Introduction -- 2 Related Work -- 3 Comparing Data Processing and Queries -- 3.1 Data Acquisition and Integration -- 3.2 Data Extraction and Transformation -- 3.3 Data Loading -- 3.4 Incremental Data Loading -- 3.5 Query Answering -- 4 Example of Graph Results -- 5 Conclusions -- References -- Influence of Indoor Conditions on Sick Building Syndrome: A Data-Driven Investigation -- 1 Introduction -- 2 Collected Data -- 3 Data Analysis -- 4 Lessons Learned -- 5 Conclusions -- 6 Future Works -- References -- Analysis of a Scheduling System as a Proposal for Automatic Generation Using Machine Learning -- 1 Introducción -- 2 Related Topics -- 2.1 Machine Learning.
2.2 Related Machine Learning Algorithms -- 3 Proposal -- 4 Methodology -- 4.1 Sample Definition -- 4.2 Data Collection -- 4.3 Data Analysis -- 4.4 Data Presentation -- 5 Results -- 6 Conclusions and Future Work -- References -- Computer Networks, Mobility and Pervasive Systems -- Taxonomy of Malicious URL Detection Techniques -- 1 Introduction -- 2 Characteristics of URLs -- 3 Taxonomy of Detection Techniques -- 3.1 Rules-Based Detection Techniques -- 3.2 Machine Learning-Based Detection Techniques -- 3.3 Comparison of Detection Techniques -- 4 Conclusions -- References -- Unmanned Aerial Systems: A Systematic Literature Review -- 1 Introduction -- 2 Terminology -- 3 Methodology -- 4 Findings -- 5 Conclusion -- References -- Ethics, Computers and Security -- Vulnerability Analysis - Business Case -- 1 Introduction -- 2 Methodology -- 2.1 Vulnerability Analysis Tools -- 2.2 Vulnerability Analysis -- 3 Results -- 3.1 Results of the First-Round Analysis -- 3.2 Results from the Second Round of Analysis -- 3.3 "Vulnerability Age" in the Information System -- 4 Conclusions -- References -- Information Security Vulnerabilities Using Steganography as the Art of Hiding Information -- 1 Introduction -- 2 Methodology -- 2.1 Planning the Review -- 2.2 Conducting the Review -- 2.3 Analysis of Results -- 3 Conclusions -- References -- Artificial Intelligence for Cybersecurity: Use Cases and Country Perspective -- 1 Introduction -- 2 Applying AI Methods for Cybersecurity -- 3 The Situation in Slovenia and the EU -- 3.1 Slovenia -- 3.2 European Union -- 4 Proposed Roadmap for Development -- 4.1 Short-Term Goals and Measures -- 4.2 Medium-Term Goals and Measures -- 4.3 Long-Term Goals and Measures -- 5 Conclusion -- References -- Analysis of Plaintext Features in DoH Traffic for DGA Domains Detection -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology.
3.1 Data Capture and Features Extraction -- 3.2 Labelling and Data Pre-processing -- 3.3 Classification Module -- 4 Dataset -- 5 Analyses and Discussion -- 5.1 Relevance of Features Analysis -- 5.2 Results Analysis -- 6 Conclusion and Future Scope -- References -- Cybersecurity for Higher Education Institutions: General Strategy Vision -- 1 Introduction -- 1.1 The Problem and the Opportunity -- 2 Cybersecurity Strategy for a Higher Education Institution -- 2.1 Design of a Cybersecurity Strategy -- 3 Conclusions -- References -- Ethics and AI in Higher Education: A Study on Students' Perceptions -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Demographic Profile and Frequency of Use of AI Tools (SRQ1) -- 3.2 AI Tools Identified (SRQ2) -- 3.3 Reasons Given by Students for Using AI in Academic Activities (SRQ3) -- 3.4 Main Concerns Presented by Students Regarding Using AI in Academic Activities (SRQ4) -- 4 Discussion -- 5 Final Considerations and Future Work -- References -- Human-Computer Interaction -- Development of a Method for the Early Detection of Alzheimer Using CT Images, Deep Learning Techniques and Hyper-parameter Tuning -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experiment Design -- 4.1 Characteristics of the Data Set -- 4.2 Quality Measurements -- 4.3 Method Optimization Parameters -- 5 Results -- 5.1 Optimal Parameters -- 5.2 Model Reliability -- 6 Conclusion -- References -- An Accessibility Review: Google Classroom -- 1 Introduction -- 2 Accessibility in Brazil -- 3 Human-Computer Interface Assessments -- 3.1 ISO/IEC 25010 Standard -- 3.2 Electronic Government Accessibility Model -- 4 Research Methodology -- 5 Results -- 5.1 Previous Accessibility Evaluation -- 5.2 Updated Accessibility Evaluation -- 6 Discussion -- 6.1 Google Classroom Through the Years -- 7 Conclusion -- References -- Health Informatics.
Revolutionizing Parkinson's Disease Diagnosis: An Advanced Data Science and Machine Learning Architecture -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Design of Experiments -- 5 Results and Discussion -- 6 Conclusions -- References -- A New Method for Stimulating Memory and Visual-Motor Coordination in Older Adults Through Basic Electronics Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Pilot Experiment and Preliminary Results -- 5 Conclusions -- References -- Visual Characterization of Gathered Data for Digital Phenotyping -- 1 Introduction -- 2 Related Work -- 3 Data Collection Platform -- 4 Data Monitoring and Presentation -- 5 Conclusions -- References -- Comparative Analysis of Spatial Agglomeration Methods Getis-Ord and Besag and Newell for Dengue Epidemiology Paraíba, Brazil -- 1 Introduction -- 2 Spatial Clustering Methods and Related Work -- 2.1 Getis-Ord -- 2.2 Besag-Newell -- 2.3 Spatial Incidence Ratio -- 3 Research Methodology -- 3.1 Study Location and Data Collection -- 4 Results and Analysis -- 5 Discussion -- 6 Conclusion -- References -- Intelligent and Decision Support Systems -- Making the Case for Establishing a South African AI Innovation Hub -- 1 Introduction -- 2 The South African AI Landscape -- 3 Benefits and Potential Contributions of AI -- 4 Dangers and Disadvantages of AI -- 5 Contextual AI -- 6 Innovation Hubs -- 7 A Contextual Solution -- 8 Summary and Conclusion -- References -- AI-Driven Decision Support in Public Administration: An Analytical Framework -- 1 Introduction -- 2 Features for AI Frameworks and Tools in Public Administration -- 3 An Analytical Framework for Public Administration -- 3.1 Data Collection/Acquisition -- 3.2 Preprocessing -- 3.3 AI Application -- 3.4 Data Analysis -- 3.5 Data Presentation -- 4 Results -- 4.1 Textual Corpora Dedicated to Public Security.
4.2 Misinformation on the Vaccination Campaign Against COVID-19 in Brazil -- 5 The Future of the Initiative: Using Computer Vision -- 6 Final Considerations -- References -- A New Hybrid Search Approach to Optimize the Retrieval of Information from the Website at the Universidad Politécnica Salesiana -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Information Collection -- 3.2 Architecture Design -- 3.3 Implementation of the Search Process -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Intelligent Educational Agent for Education Support Using Long Language Models Through Langchain -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Solution Proposals -- 3.2 Tools and Technologies -- 3.3 Rule Design and Response Logic -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Artificial Intelligence Applied to Human Resources Management: A Bibliometric Analysis -- 1 Introduction -- 2 Related Work -- 3 Bibliometric Study -- 3.1 Methodology Used -- 3.2 Set the Objectives of the Analysis -- 3.3 Data Extraction -- 3.4 Data Preprocessing -- 3.5 Multi-dimensional Analysis -- 3.6 Overall Results of the Analysis -- 4 Results and Conclusions -- 5 Future Works -- References -- Enhancing Sentiment Analysis of Corruption-Related Comments on Social Networks in Ecuador Using Techniques of Machine Learning: LSTM, Linear Regression, and Support Vector Machine -- 1 Introduction -- 1.1 SVM Models -- 1.2 Linear Regression Models -- 1.3 LSTM Models -- 2 Proposed Method -- 2.1 Data Collection and Processing -- 2.2 Data Preparation -- 2.3 Text Representation -- 2.4 Training -- 2.5 Prediction Evaluation and Results -- 2.6 Results Interpretation -- 3 Experiment Design -- 3.1 General Dataset Description -- 3.2 Data Preparation -- 3.3 Word Representation -- 3.4 Machine Learning Technique Parameters -- 4 Results and Discussion.
5 Conclusion.
Titolo autorizzato: Information Technology and Systems  Visualizza cluster
ISBN: 3-031-54235-5
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910841869203321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems Series