Vai al contenuto principale della pagina
Titolo: | Information and communication technologies : 10th Ecuadorian conference, TICEC 2022, Manta, Ecuador, October 12-14, 2022 : proceedings / / Jorge Herrera-Tapia [and three others], editors |
Pubblicazione: | Cham, Switzerland : , : Springer, , [2022] |
©2022 | |
Descrizione fisica: | 1 online resource (320 pages) |
Disciplina: | 006.3 |
Soggetto topico: | Computational intelligence |
Persona (resp. second.): | Herrera-TapiaJorge |
Nota di bibliografia: | Includes bibliographical references and index. |
Nota di contenuto: | Intro -- Preface -- Organization -- Contents -- ICT's Applications -- An Online BCI System Based in SSVEPs to Control IoT Devices -- 1 Introduction -- 2 State of Art -- 3 Methodology -- 4 Development of the Solution -- 4.1 First Increment -- 4.2 Second Increment -- 4.3 Third Increment -- 4.4 Fourth Increment -- 4.5 Test of the Integrated Prototype -- 5 Results and Discussion -- 5.1 Results -- 5.2 Discussion -- 6 Conclusions -- References -- Collision Avoidance Simulation Using Voronoi Diagrams in a Centralized System of Holonomic Multi-agents -- 1 Introduction -- 2 Related Work -- 2.1 Collision Avoidance -- 2.2 Voronoi Diagrams -- 2.3 Multi-agent Navigation -- 3 Methodology -- 3.1 Model Proposal -- 3.2 Two-Dimensional Environment -- 3.3 Heuristics to Deal with Deadlock -- 3.4 QP-Based Receding Horizons Control Algorithm -- 3.5 Analytical Geometrical Algorithm -- 3.6 Optimal Reciprocal Collision Avoidance Algorithm -- 3.7 Analysis Method -- 4 Results and Discussion -- 4.1 Construction of Voronoi Diagram -- 4.2 Deadlock -- 4.3 Evaluation of Algorithms -- 4.4 Implementation -- 5 Conclusions -- 5.1 Future Work -- References -- Intelligent Electromyograph for Early Detection of Myopathy and Neuropathy Using EMG Signals and Neural Network Model -- 1 Introduction -- 2 Materials and Methods -- 2.1 Obtaining and Process Signal -- 2.2 Database Creation -- 2.3 Develop the Predictive Model -- 2.4 Prediction of Health Status -- 3 Results -- 3.1 Obtaining and Process Signal -- 3.2 Neural Network -- 3.3 Web Application -- 4 Discussion -- 5 Conclusion -- References -- Underwater Wireless Sensor Networks and Cryptographic Applications -- 1 Introduction -- 2 Underwater Wireless Sensor Networks -- 2.1 Problems Related to UWSNs -- 3 Motivations -- 4 Challenges Related to Cryptographic Security -- 4.1 Security Attacks on UWSNs. |
4.2 Problems of Cryptographic Primitives -- 4.3 Cryptographic Algorithms Applied to Secure Protocols -- 4.4 Discussion -- 5 Conclusions -- References -- Design of a Sensor Network for Drinking Water Control in the Maria of Merced Educational Unit -- 1 Introduction -- 2 Materials and Methods -- 2.1 Analysis of the Current Situation at the UEMM -- 2.2 Proposed WSN Design -- 2.3 Statistical Method of Results -- 3 Results and Validation -- 3.1 Simulation Results -- 3.2 Statistical Analysis of Data Exported by the OPNET Simulator -- 3.3 Validation by Normality Testing -- 4 Conclusions -- References -- Drinking Water and Sewerage at the Universidad de las Fuerzas Armadas ESPE and Implementation of an Internet of Things Flowmeter -- 1 Introduction -- 1.1 University of the Armed Forces -- 1.2 Drinking-Water and Sewerage -- 1.3 Flowmeter IoT -- 1.4 Flowmeter IoT Data Analysis with Recurrence Maps -- 2 Methodology -- 2.1 Study Zone -- 2.2 Implementation of the IoT Flowmeter -- 2.3 Data Processing -- 3 Results and Discussions -- 3.1 Drinking Water, Pressures, and Sewerage with Problems Encountered -- 3.2 Measurement of the Population of the Universidad de las Fuerzas Armadas ESPE -- 3.3 Implementation of IoT Flowmeter -- 3.4 Determination of the Drinking Water Supply at the University -- 4 Conclusions -- References -- Indicators to Evaluate Elements of Industry 5.0 in the Textile Production of MSMEs -- 1 Introduction -- 2 Related Research -- 3 Methodology -- 4 Results and Discussion -- 4.1 Results of the Systematic Literature Review -- 4.2 Analysis and Selection of Indicators -- 5 Conclusions -- Appendix A - List of References Considered in the SLR -- Appendix B - Set of Indicators and Sheets -- References -- Technological Accessibility and Digital Health Education Associated with the Use of Smart Healthcare by Obstetricians in Peru -- 1 Introduction. | |
2 Methodology -- 2.1 Research Design and Population Under Study -- 2.2 Variables -- 2.3 Data Collection Procedure -- 2.4 Statistical Analysis -- 2.5 Ethical Considerations -- 3 Results -- 4 Discussion -- 5 Conclusions and Future Steps -- 5.1 Conclusions -- 5.2 Future Steps -- Appendix -- References -- Data Science -- Adaptation of a Process Mining Methodology to Analyse Learning Strategies in a Synchronous Massive Open Online Course -- 1 Introduction -- 2 Related Work -- 2.1 Analysis of Learning Strategies in MOOCs: Methods and Techniques -- 2.2 Learning Strategies Across Contexts -- 2.3 Research Questions -- 3 Method -- 3.1 Context: MOOC and Sample -- 3.2 Procedure -- 4 Results -- 4.1 RQ1: To What Extend Can We Replicate (Partially or Totally) the Methodology Applied in the Previous Study by [18] to Extract Learners' Learning Strategies in a MOOC? -- 4.2 RQ2: How do Learners' Learning Strategies in This New Context Differ from Those from the Previous Study? -- 5 Conclusion and Discussion -- 5.1 Summary of Results -- 5.2 Implications -- 5.3 Limitations -- References -- Ecuador Agricultural Product Price Forecast: A Comparative Study of Deep Learning Models -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Cleaning -- 3.2 Data Preparation -- 3.3 Models Preparation -- 3.4 Training Models -- 3.5 Models Evaluation -- 4 Experiments -- 4.1 Materials -- 4.2 Experiment 1: Comparison Between Models -- 4.3 Experiment 2: Best Models with Different Datasets -- 4.4 Experiment 3: Hyperparameter Tuning and Optimizer -- 4.5 Experimental Setup -- 5 Results and Discussion -- 5.1 Comparison Between Models -- 5.2 Best Model with Different Datasets -- 5.3 Hyperparameter Tuning and Optimizer -- 5.4 Discussion -- 6 Conclusion -- References -- Assessing the COVID-19 Vaccination Process via Functional Data Analysis -- 1 Introduction. | |
1.1 Contribution and Related Work -- 2 Materials -- 2.1 Data Description -- 2.2 Handling the Missing Data -- 3 Methods: Functional Data Analysis -- 3.1 B-Spline Basis -- 3.2 Smoothing Parameter -- 3.3 Functional Principal Component Analysis (FPCA) -- 3.4 Functional Cluster Analysis -- 4 Results and Discussion -- 4.1 Data Smoothing -- 4.2 FPCA -- 4.3 FPC Scores -- 4.4 Perturbations of the Mean Function -- 4.5 Functional Clustering -- 5 Conclusions and Further Studies -- References -- A Methodology to Develop an Outdoor Activities Recommender Based on Air Pollution Variables -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Data Analysis -- 3.4 Evaluation of the Optimal Number of Clusters -- 3.5 Results -- 4 Evaluation of the Methodology -- 4.1 Objectives and Research Questions -- 4.2 Context and Survey Design -- 4.3 Results and Data Interpretation -- 5 Threats to Validity -- 6 Conclusions -- References -- Improving with Metaheuristics the Item Selection in Parallel Coordinates Plot -- 1 Introduction -- 2 Related Works -- 3 Problem Formulation -- 3.1 Visualization Issue on PCP -- 3.2 PCP Metaheuristic Solution -- 3.3 Threats to Validity -- 4 Results -- 5 Conclusions -- References -- Implementation of Clustering Techniques to Data Obtained from a Memory Match Game Oriented to the Cognitive Function of Attention -- 1 Introduction -- 2 Related Works -- 3 Application of the Methodology -- 3.1 Cluster Application -- 4 Conclusion -- References -- Q-Learning in a Multidimensional Maze Environment -- 1 Introduction -- 1.1 Q-learning -- 2 Related Work -- 3 Methodology -- 3.1 Maze Design: Environment -- 3.2 Depth-First Search (DFS) -- 3.3 How the Agent Explores and Learns -- 3.4 Implementation Details -- 4 Results -- 5 Discussion -- 6 Conclusions -- 7 Future Work -- References. | |
Cyberbullying Through the Lens of Data Science -- 1 Introduction -- 2 Related Work -- 3 Systematic Literature Review -- 3.1 Planning the Review -- 3.2 Conducting the Review -- 4 Conclusions -- Appendix 1 -- References -- Software Development -- Comparative Study of Image Degradation and Restoration Techniques -- 1 Introduction -- 2 Degradation Restoration Modeling -- 2.1 Degradation Functions -- 2.2 Restoration Filters -- 3 Results of Modeling -- 3.1 Dataset -- 3.2 Measuring Similarity -- 3.3 Image Degradation Results -- 3.4 Image Restoration Results -- 3.5 Evaluation Results -- 4 Conclusions -- References -- IOWA Rough-Fuzzy Support Vector Data Description -- 1 Introduction -- 2 Literature Review -- 2.1 Rough-Fuzzy Support Vector Data Description -- 2.2 Ordered Weighted Average -- 2.3 Recent Advances on SVDD -- 3 Proposed Methodology for IOWA-RFSVDD -- 4 Computational Experiments -- 5 Conclusions and Future Work -- References -- Preparation of a Social Engineering Attack, from Scratch to Compromise: A USB Dropper and Impersonation Approach -- 1 Introduction -- 1.1 Motivation -- 1.2 Goals -- 2 Background -- 2.1 Social Engineering -- 2.2 Common Attacks -- 2.3 Human Weakness Exploitation -- 2.4 Tailgating -- 2.5 Empathy -- 2.6 Attack Structure -- 2.7 USB Dropper -- 2.8 Bad USB Drive -- 2.9 Impersonation -- 2.10 Pretext -- 2.11 Persuasion -- 2.12 Social Engineering in the Enterprise -- 2.13 Awareness -- 3 Methodology -- 3.1 The Preparation -- 3.2 Tools -- 4 Results and Discussion -- References -- Information Security at Higher Education Institutions: A Systematic Literature Review -- 1 Introduction -- 2 Methodology and Tools -- 2.1 Research Questions -- 2.2 Document Search -- 2.3 Article Selection -- 2.4 Relevant Data Mining -- 3 Results -- 4 Discussion -- 5 Conclusions -- References -- Author Index. | |
Titolo autorizzato: | Information and Communication Technologies |
ISBN: | 3-031-18272-3 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910616393003321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |