<p><span>This book covers the following main topics: A) information and knowledge management; B) organizational models and information systems; C) software and systems modeling; D) software systems, architectures, applications and tools; E) multimedia systems and applications; F) computer networks,
Information Systems and Technologies: WorldCIST 2022, Volume 1 (Lecture Notes in Networks and Systems, 468)
✍ Scribed by Alvaro Rocha (editor), Hojjat Adeli (editor), Gintautas Dzemyda (editor), Fernando Moreira (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 722
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book covers the following main topics: A) information and knowledge management; B) organizational models and information systems; C) software and systems modeling; D) software systems, architectures, applications and tools; E) multimedia systems and applications; F) computer networks, mobility and pervasive systems; G) intelligent and decision support systems; H) big data analytics and applications; I) human–computer interaction; J) ethics, computers and security; K) health informatics; L) information technologies in education; M) information technologies in radio communications; N) technologies for biomedical applications.
This book is composed by a selection of articles from The 2022 World Conference on Information Systems and Technologies (WorldCIST'22), held between April 12 and 14, in Budva, Montenegro.
WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences, and challenges of modern information systems and technologies research, together with their technological development and applications.
✦ Table of Contents
Preface
Contents
Big Data Analytics and Applications
Anomalies and Breakpoint Detection for a Dataset of Firefighters' Operations During the COVID-19 Period in France
1 Introduction
2 State of the Art
3 Methodology
3.1 Feature Selection
3.2 Breakpoint Detection
3.3 Anomalies Detection
4 Number of Firefighters' Interventions
5 Discussion
6 Conclusion
References
Personality-Informed Restaurant Recommendation
1 Introduction
2 Literature Review
2.1 Restaurant Recommendation Systems
2.2 Personality
3 Technical Background
3.1 Topic Modelling
3.2 Tree Based Prediction and Classification - XGBoost
4 Methodology
5 Dataset
6 Results
7 Conclusion
References
A Novel Clustering Anomaly Detection of PCA Based Time Series Features with CNC Machines Data
1 Introduction
2 Related Work
3 Methods
3.1 Data Processing and Analysis
3.2 Methods
4 Results
5 Conclusions
References
A Taxonomy of Big Data Analytics in Circular Economy: Perspectives from the Fashion Industry
1 Introduction
2 Contextualising Circular Economy in the Fashion Industry
3 Proposed Taxonomy of Big Data Analytics Applied to Circular Business Models in Fashion Industry
3.1 Functionalities
3.2 Processes
3.3 Barriers
3.4 Data Sources
4 Conclusions
References
Explanation Plug-In for Stream-Based Collaborative Filtering
1 Introduction
2 Related Work
3 Proposed Method
3.1 Trust & Reputation Profiling
3.2 Cascade Filter
3.3 Explanations
3.4 Evaluation
4 Experiments and Results
4.1 Data Set
4.2 Results
5 Conclusions
References
A Comparative Study on Improving Straggler Tasks in Hadoop
1 Introduction
2 Methods of Straggler Task
2.1 LATE (Longest Approximate Time to End) Method
2.2 PSE (Partial Speculative Execution) Method
2.3 LSE (Linear Speculative Execution) Method
2.4 MMC (Multi-message Communication MMC) Method
2.5 Earlier LATE Method
2.6 ANN (Artificial Neural Network) Method
2.7 SEWANN Method
3 Discussion and Comparison Between Different Strategies
3.1 Comparison Between Different Strategies
3.2 Comparison Between Different Strategies
4 Conclusion and Future Work
References
Parabolic Threshold Discretization for Big Data
1 Introduction
2 Discretization Process
2.1 Discretization Properties
3 Discretization Methods
4 The PTD Method (Parabolic Threshold Discretization)
5 Results
5.1 Wine Database
5.2 Yeast Database
5.3 Breast Tissue
5.4 Liver Disorder
6 Conclusion
References
Custom Data Augmentation Technique (A Deeper Insight)
1 Motivation
2 Experiment with Manual Data Distribution
2.1 Training Configuration for a Baseline Model
2.2 Training Configuration for DNNs with Data Augmentation on the Train Set
2.3 Training Configuration for CNN with Custom Data Augmentation on Train/Validation Set Separately
3 Generalizability of the CNN Classifier for NFRs
4 Discussion and Limitation
References
Knowledge-Based Identification of Homogenous Structures in Gene Sets
1 Introduction
2 Methods
2.1 Identification of Homogenous Groups in Gene Sets
2.2 Validation of Homogenous Structures in Comparison to Related Work
3 Results
4 Discussion
5 Conclusion
References
Relating Biometric Sensors with Serious Games Results
1 Introduction
2 Background
2.1 Eye Movements
2.2 Emotions
2.3 Sensors
3 Experiment
3.1 Data Collection
4 Results Discussion
5 Conclusion and Future Work
References
Computer Networks, Mobility and Pervasive Systems
An Optimization Algorithm for the Efficient Distribution of Resources in 6G Verticals
Abstract
1 Introduction
2 State of the Art on 6G Resource Management Solutions
3 An Optimization Algorithm for Resource Distribution
3.1 Mobility Model: Bayesian Prediction-Correction Algorithm
3.2 Mobile Traffic Model
3.3 Network Model and Resource Management Algorithm
4 Experimental Validation: Simulation and Results
5 Conclusions and Future Works
Acknowledgments
References
Is Web Browsing Secure?
1 Introduction
2 Background
3 Related Work
4 Analysis Criterion: Methodology and Metrics
4.1 Traffic Generation and Navigation Profile
4.2 Evaluation Metrics
5 Assessing Web Client Security and Privacy: Comparative Study
5.1 Traffic Statistics
5.2 Protocols, Vulnerabilities and Optimizations
6 Conclusions and Future Work
References
Fuzzy Analysis for Assessing Trust Space Within Wireless Sensor Networks
1 Introduction
2 Related Work
3 Modelling the Uncertainties and Trustworthiness
3.1 Selection of Trust Factors
3.2 Analyzing Uncertain Trust-Subspace Using Fuzzy Logic
4 Results and Discussion
4.1 Fuzzy Input/Output Membership Functions and Fuzzy Inference System Model for Exploring Trustworthiness
4.2 Trustworthiness Estimation for a Test Dataset
5 Conclusions
References
Techniques Involved in the Development of the New Dataset for Anomaly Detection in Computer Networks
1 Introduction
2 Techniques Involved in the Development of the New Dataset
2.1 Traffic Collection
2.2 Data Stream/Storage
2.3 Anomaly/Cyberattacks Detection
3 Applying Machine Learning Algorithms for Anomaly Detection
4 Conclusions
References
Modelling Medical Devices with Honeypots: A Conceptual Framework
1 Introduction
2 The Need for Situation Awareness
2.1 Common Technical Characteristics of the Medical Devices
2.2 Challenges in Technical Visibility
3 Phases of the Cyber Attack and Capabilities of the Honeypot Technology
3.1 Decomposing Cyber Attacks
3.2 Cyber Kill Chain
3.3 Detection Capabilities from the Perspective of Data Analytics
4 Construction
5 Conclusion
References
WhatsApp’s Influence on African and Urban Communication Satisfaction: The Case of Cameroon
1 Introduction
2 Theoretical Background
2.1 Related Works and TAM
2.2 WhatsApp as Social Phenomena in Developing Countries
3 Research Model and Hypotheses Development
4 Research Methodology and Results
4.1 Conceptual Development
4.2 Refinement of the Conceptual Framework
4.3 Data Collection
4.4 Data Analysis and Discussion
4.5 Results of Data Analysis
5 Conclusion and Discussion
References
Ethics, Computers and Security
Blockchain Redacting Algorithm with Storing Votes Inside the Chain
1 Introduction
2 Related Work
3 Research Objectives
4 Rules for Redacting Block Records
5 Block Sections and Fields
6 Adding Blocks
7 Editing Blocks
8 Conclusion
References
Maturity Concept and Model Review
1 Introduction
2 The Maturity Model Concept
3 Models for Assessing the Maturity Level
3.1 Organization’s Capabilities and Management System Maturity Models
3.2 Maturity Models for Organization’s Management Subsystems
3.3 Models for Assessing the Process Maturity Levels
4 Conclusion
References
Managing Uncertainty and Complexity: Emerging Challenges in Cyber Security
1 Introduction
2 Risk Perception in the Digital Context: Conceptualization of Uncertainty
3 Security and Control Standards and Best Practices: Agreements and Disagreements
4 Management of Uncertainty and Complexity in Cyber Security
5 Conceptual Framework for Decisions in a Cyber Environment: Anticipation, Dissuasion and Resiliency
6 Conclusions
References
Integrate Generalized Suffix Tree into Dictionary Attack
1 Introduction
2 Background
3 Data Analysis
4 Conclusion
References
Where Does Your Data Go? Comparing Network Traffic and Privacy Policies of Public Sector Mobile Applications
1 Introduction
2 Related Work
3 The Setting of the Study
4 Results
4.1 Network Traffic Analysis
4.2 Analysis of Privacy Policies
4.3 Comparison Between Observed Data Collection, Privacy Policies and Permissions
5 Discussion
6 Conclusions
References
Educational Effects of the Case Method in Teaching AI Ethics
1 Introduction
2 Background and Issues for AI Ethics Education
3 Proposal: Development of Ethics Case
4 Case Method Education as an Experiment
4.1 Experiment Flow
4.2 Pre- and Post-questionnaire Design for AI Ethics Education
5 Experimental Result and Discussion
6 Conclusions
Appendix. Case Materials - Summary Version
References
Human-Computer Interaction
Robots as Transitional Objects for Young Children
1 Introduction
2 What Is a Transitional Object?
2.1 Animism and Children
2.2 Suspension of Disbelief
3 Social Robots and Their Properties
3.1 Related Work
3.2 A Possible Example of Transitional Object in Robotics
4 Discussion and Conclusion
References
Digital Trust Indicators in Human-Computer Interaction
1 Introduction
1.1 Literature Review
2 Methods and Materials
3 Results
3.1 Results of the Students Surveyed at Emperor Alexander I St. Petersburg State Transport University (Russia)
3.2 Consolidated Data of a Series of Surveys of Russian Citizens on the Problem of Trust in Smart Technologies in Network Interactions
4 Discussion
4.1 Indicators of Technological and Social Trust in Digital Interactions
4.2 Comprehensive Digital Trust Indicators
5 Conclusion
References
Investigating STEM Students' First-Time Experience with Smart Glasses
1 Introduction
2 Related Work
2.1 UX and Wearable Devices
2.2 Smart Glasses in Educational Settings
2.3 Education-Oriented AR Apps
3 Experimental Design
3.1 Participants
3.2 Apparatus
3.3 Procedure
3.4 Data Collection
4 Findings
4.1 Quantitative Analysis
4.2 Qualitative Analysis
5 Discussion
6 Conclusion and Future Work
References
Studying the User Experience of an Educational AR-Based App for Smart Glasses
1 Introduction
2 Related Work
3 The STEM Education app
4 Experimental Design
4.1 Participants
4.2 Apparatus
4.3 Procedure
4.4 Data Collection
5 Results
5.1 Quantitative Analysis
5.2 Qualitative Analysis
6 Conclusion and Future Work
References
An Evaluation of Artificial Intelligence Components in E-Commerce Fashion Platforms
1 Introduction
2 Related Work
3 Methodology
4 Data Analysis and Discussion
4.1 Quantitative Analysis
4.2 Qualitative Analysis
5 Concluding Remarks
References
Image Relevance on Websites and Readability
1 Introduction
2 Literature Review
3 Methodology
4 Evaluation
4.1 Results
5 Conclusion
References
SSVEP Based BCI Control of a Robot Swarm
1 Introduction
1.1 Terrestrial Environment
1.2 Aerial Environment
2 BCI Systems Use in Robotics
3 Spider Swarm Robots Controlled by SSVEP-BCI
4 Conclusions
References
Sonification of Information Security Incidents in an Organization Using a Multistep Cooperative Game Model
1 Introduction
2 Materials and Methods
3 Markov Model of a Sonified Security System
4 Musical Coding
5 Conclusion
References
Embodied Communication Agents: A Scoping Review of the Impact of Applications to Support Older Adults
1 Introduction
2 Methods
3 Results
3.1 Selection of the Studies
3.2 Demographics of the Included Studies
3.3 Terminology
3.4 Purpose of the Included Studies
3.5 Communication Features of the ECAs Being Developed
3.6 Experimental Setups
4 Discussion and Conclusion
References
Motion Sensors Based Human Arm Pose Estimation
1 Introduction
2 Experiment Design
3 Modeling and Simulation
4 Conclusions
References
Alexa to Support Patients with Dementia and Family Caregivers in Challenging Behaviors
1 Introduction
2 Background
3 Interview to Caregivers
3.1 Data Collection
4 Model
4.1 Triggers
4.2 Strategies
4.3 Emotions/Feelings
5 Amazon Alexa as a Support for Challenging Behaviors
6 Case Study
6.1 Results
7 Conclusion and Future Work
References
Social Aspects of Software Testing: Comparative Studies in Asia
1 Introduction
2 Method
2.1 Objectives
2.2 Instrument Selection
2.3 Sampling
2.4 Reliability and Validity
3 Data Collection: Results and Findings
3.1 Advantages of Testing Careers
3.2 Drawbacks of Testing Careers
4 Discussions
5 Implications to Computer Science and Software Engineering Curricula
6 Conclusions and Future Directions
Appendix A – Survey Questions
References
Use of Cloud Computing Tools on Pedagogical and Educational Contexts
1 Introduction
2 Conceptual Framework
2.1 Use of ICTs in the Teaching of Military
2.2 Maps Applications
3 Methodology
3.1 Contextualization and Description of the Experience
3.2 Use of Cloud Computing Tools
4 Conclusions
References
Mobile Technologies as a Support Tool for the Development of Communicative Competencies
1 Introduction
2 Theoretical Background
2.1 Key Competencies in Education
2.2 Communicative Competencies
2.3 Mobile Technologies in Education
3 Current State of Research
4 Research Proposal
5 Discussion
6 Conclusion
References
Electromyography in the Context of Flow Measurement
1 Literature Review
1.1 Flow and Immersion
1.2 Universal Emotions
1.3 Motivation
1.4 Electromyography
1.5 Research Goals
2 Experiment
2.1 Apparatus and Procedure
2.2 Questionnaires - Design Methodology
3 Preliminary Results
References
Usability Evaluation of Educational Serious Games
1 Introduction
2 Related Paperwork
3 Methodology
4 Discussion of Results
4.1 Profile
4.2 Games Usability Evaluation
4.3 Game Categories
5 Conclusion
References
The Role of a Chabot Personality in the Attitude of Consumers Towards a Banking Brand
1 Introduction
2 Theoretical Framework
2.1 The Contribution of Chatbot Personalization in Marketing
3 Methodology and Procedures
3.1 Study Design
3.2 Sample
3.3 Data Collection and Procedures
4 Results
4.1 Satisfaction Using Chatbot as Client Service Channel
4.2 Dialogue as Part of the Chatbot’s Personality
4.3 Relationship Between Chatbot Personality and Brand Values
4.4 Relationship Between the Chatbot’s Personality and the Feeling of Trust
5 Discussion and Conclusions
References
Health Informatics
Comparison of Clusters Algorithms to Identify Patterns in Information Related to Cervical Cancer
1 Introduction
2 Materials and Methods
2.1 Dataset
2.2 Data Pre-processing
2.3 Algorithms
3 Results
4 Discussion
5 Conclusions
References
Implementing Web-Based Clinical Breast Cancer Monitoring Application in Remote Areas: Lesson from the State of Sabah
1 Introduction
2 Review of the Literature
3 Research Methodology
4 Discussions
5 Conclusions
References
A Novel Approach to Visualize a Complete Spectrum of Alpha Diversity: Richness, Evenness and Abundance
1 Introduction
1.1 Diversity
2 Materials and Methods
2.1 Methods
2.2 Data
2.3 Arguments
2.4 Implementation
3 Results
4 Conclusions
References
Systematic Map of Machine Learning Based Breast Cancer Screening
1 Introduction
2 Research Methodology
2.1 Research Questions
2.2 Search Strategy
2.3 Study Selection
2.4 Data Extraction Strategy and Synthesis
2.5 Threats to Validity
3 Results
3.1 Overview of the Selected Studies
3.2 RQ1: What are Publication Venues and in Which Years were the Selected Studies Related to ML for BCS Published?
3.3 RQ2: What Types of Contribution did the Article Make to the Area of ML in BCS?
3.4 RQ3: What are the Modalities of BCS Investigated by ML Techniques?
4 Discussion
4.1 RQ1: What are Publication Venues and in Which Years were the Selected Studies Related to ML for BCS Published?
4.2 RQ2: What Type of Contributions were Made to the Area of ML in BCS?
4.3 RQ3: What are the Modalities of BCS Investigated by ML Techniques?
5 Conclusion and Future Work
References
Deep Stacked Ensemble for Breast Cancer Diagnosis
1 Introduction
2 Background
2.1 Pre-trained DCNNs Architectures
2.2 Stacked Generalization Ensemble Learning Technique
3 Related Work
4 Data Preparation
5 Empirical Design
5.1 Experiment Configuration
5.2 Experimental Process
5.3 Abbreviation
6 Results and Discussions
6.1 Performance of the Seven DL Techniques
6.2 Results of the Stacked Model
7 Threats to Validity
8 Conclusion
References.
Deep Hybrid AdaBoost Ensembles for Histopathological Breast Cancer Classification
1 Introduction
2 Background
3 Related Work
4 Materials and Methods
4.1 Data Preparation
4.2 Experimental Process
4.3 Threats of Validity
4.4 Abbreviation
5 Results and Discussion
5.1 Evaluating and Comparing the Impact of the Number of Trees on the AdaBoost Ensembles Performances Over Each FE and MF
5.2 Evaluating and Comparing the AdaBoost Ensembles and Single DT Classifiers
5.3 Which DL Technique as FE Gives the Best AdaBoost Ensemble?
6 Conclusion and Future Work
References
Performance-Interpretability Tradeoff of Mamdani Neuro-Fuzzy Classifiers for Medical Data
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Mamdani based Neuro-Fuzzy Systems
4 Experimental Design
4.1 Data Description
4.2 Performance Measures
4.3 Interpretability Measures
4.4 Borda Count Voting System
4.5 Experimental Process
5 Results and Discussion
5.1 Which Mamdani based Classifier Achieves the Best Performance?
5.2 Which Mamdani based Classifier Achieves the Best Interpretability?
5.3 Which Mamdani based Classifier Achieves the Best Performance-Interpretability Tradeoff?
6 Threats to Validity
7 Conclusion and Future Work
References
Systematic Map of Data Mining for Gynecologic Oncology
1 Introduction
2 Research Methodology
2.1 Mapping Questions
2.2 Search Strategy
2.3 Study Selection
2.4 Data Extraction Strategy and Synthesis
3 Results and Discussion
3.1 Study Selection
3.2 MQ1: In Which Years and what Publication Venues/Sources were the Selected Articles Published?
3.3 MQ2: What is The Most Tackled Gynecologic Neoplasm in Terms of DM/ML Techniques?
3.4 MQ3: What Gynecologic Oncology’s Medical Tasks are Addressed with DM/ML Techniques?
4 Conclusion and Future Work
References
Machine and Deep Learning Predictive Techniques for Blood Glucose Level
1 Introduction
2 Machine Learning and Deep Learning Techniques
3 Data Description and Performance Criteria
3.1 Data Description
3.2 Performance Criteria and Significance Test
4 Experimental Design
4.1 Models Construction
4.2 Data Preparation and Evaluation Method
4.3 Experimental Process
5 Results and Discussion
6 Conclusion and Future Work
References
A Conversational Agent for Promoting Physical Activity Among COPD Patients
1 Introduction
2 Conversational Agents – Chatbots
2.1 Types of Chatbots
3 Development Process
3.1 User Experience Evaluation
4 Discussion and Outputs
5 Conclusions and Future Work
References
Assessing Software Sustainability of Connected Health Applications
1 Introduction
2 Materials and Methods
3 Results
4 Discussion
5 Conclusion and Future Works
References
Mobile Applications in Support and Monitoring of Alzheimer's Patients
1 Introduction
2 Related Work
3 mHealth for Alzheimer
4 Wider Support Environment
4.1 General Architecture
4.2 Implementation Example
5 Conclusion
References
Intelligent and Decision Support Systems
Can the Price of BTC Bitcoin Be Forecast Successfully with NARX Neural Networks?
1 Introduction
2 Background and Related Work
2.1 BTC Bitcoin
2.2 Cryptocurrency Price Forecasting
3 Methodology
3.1 BTC Bitcoin Dataset Preprocessing
3.2 Nonlinear Autoregressive Models with eXogenous Input (NARX)
3.3 NARX Open Loop Neural Network for Representing Historical Data
3.4 NARX Closed-Loop Neural Network and Step-by-Step Price Forecasting
4 Results and Discussion
4.1 Experimental Setup
4.2 Historical Data Representation
4.3 Forecasting
5 Conclusions and Future Work
References
A Fake News Detection and Credibility Ranking Platform for Portuguese Online News
1 Introduction
2 Related Work
2.1 Fake News Detection Projects and Methods
2.2 Portuguese Fact-Checking Websites
3 Methodology
3.1 Dataset Development
3.2 Processing Methodology and Metrics
3.3 Exploratory Experiments
3.4 Discussion of Exploratory Results
4 Proposed Solution
4.1 Architecture
4.2 System Specifications and Performances
4.3 Proof-of-Concept
5 Conclusions and Future Work
References
Ontology Based Risk Self-assessment and Mitigation for Teleworkers
1 Introduction
2 State of the Art
2.1 Definitions of Telework and Other Types of Remote Work
2.2 Teleworking Risks
2.3 Teleworking Risks Breakdown Structure
2.4 Mitigation Measures and Adaptations
2.5 Ontology for Teleworking Risks and Control Measures
2.6 Ontology Transformation
3 Ontology Driven Self-assessment Risk Evaluation
3.1 An Integrated Database for Self-evaluation and Recommendations
3.2 A Tool for Risk Evaluation
4 Discussion
5 Conclusion
6 Future Work
References
Performance Evaluation of Colour Codes on Thermal Image Analysis – Application in the Wood Damage Detection
1 Introduction
2 Materials and Methods
2.1 Materials and Equipment
2.2 Methods
3 Results and Discussion
4 Conclusions
References
Short-Term CPI Inflation Forecasting: Probing with Model Combinations
1 Introduction
2 Materials and Methods
2.1 Bayesian Model Averaging
2.2 Construction of the Model Space: The Model Confidence Set
2.3 The Learning Algorithms: CPI Inflation Forecasting Methods
3 Results and Discussion
4 Conclusion
References
Continuously Learning from User Feedback
1 Introduction
2 Background
3 Architecture
3.1 Feature Management and User Feedback
3.2 Model Re-training and Update
3.3 Explainability
3.4 Monitoring and Self-evaluation
4 Conclusions and Future Work
References
The Quest to Become a Data-Driven Entity: Identification of Socio-enabling Factors of AI Adoption
1 Introduction
2 AI Adoption
2.1 Diffusion of Innovations Theory (DOI)
3 Research Approach
3.1 Research Context and Data Gathering
3.2 Data Analysis
4 Discussion of Results
5 Conclusion
References
How to Predict Patient Arrival in the Emergency Room
1 Introduction
2 Materials and Methods
2.1 Data Collection and Analysis
2.2 Data Preparation
2.3 Testing the Algorithms
3 Results
4 Discussion
5 Conclusion
References
Detecting One-Pixel Attacks Using Variational Autoencoders
1 Introduction
2 Method
2.1 Variational Autoencoder
2.2 Model Architecture
2.3 Anomaly Score
2.4 Evaluation Metrics
3 Experiment Setup
3.1 Data and Target Classifier
3.2 Training and Deployment
3.3 Training Parameters
4 Results
4.1 Minkowski Distance Exponent
4.2 Anomaly Threshold
4.3 Evaluation Metrics Results
4.4 Tests with Images Outside the Training Set
5 Conclusion
References
Optimization of a Deep Learning Model for Skin Cancer Detection with Magnitude-Based Weight Pruning
1 Introduction
2 Methodology
2.1 Data Ingestion
2.2 Data Pre-processing
2.3 Building the CNN
2.4 Pruning
3 Results
4 Discussion
5 Conclusion
References
Modelling a Framework to Obtain Violence Detection with Spatial-Temporal Action Localization
1 Introduction
2 State of the Art
2.1 Action Recognition
2.2 Publics Datasets
3 Experiments
3.1 Dataset
3.2 Models and Training Details
4 Results and Discussion
5 Conclusions and Future Work
References
Intellectual Capital and the Activity Sectors: Some Evidence on the Relationships
1 Introduction
2 Literature Review
3 Conclusions
References
Virtual Assistance in the Context of the Industry 4.0: A Case Study at Continental Advanced Antenna
1 Introduction
2 Industry 4.0 Solutions
3 Context-Ware Applications and Virtual Assistants
3.1 Context-Ware Applications
3.2 Virtual Assistants
4 Continental Advanced Antenna
4.1 Production Planning and Monitoring
4.2 Production Management
4.3 The Case for a Virtual Assistant
5 Prototype
5.1 Architecture
5.2 Implementation
6 Test and Conclusions
7 Future Work
References
Notes on Fifth Dimension Modelling in Cardiovascular System Using Artificial Intelligence-Based Tools
1 Introduction
2 Related Works on Five-Dimension Model
3 Existing Software and Methods
3.1 Software
3.2 Methods
4 Support of the Artificial Intelligence to Model the Fifth Dimension
5 Conclusion
References
An Ontological Proposal for the Assistance of People with Disabilities
1 Introduction
2 Materials y Methods
3 Proposed Architecture
3.1 Information Request Module
3.2 Speech Query Module
3.3 Knowledge Representation Module
4 Discussion
5 Expected Contributions
References
Recommendation Systems in the Context of Diabetes Mellitus Type 2: A Bibliometric Analysis
1 Introduction
2 Methods
2.1 Study Design
2.2 Bibliographic Database
2.3 Software and Data Analysis
3 Results
3.1 Keywords
3.2 Publication Year
3.3 Country
3.4 Type of Document
3.5 Source
3.6 Subject
3.7 Author and Co-authorships
3.8 Affiliation
3.9 Funding
4 Discussion
5 Conclusion
References
Analyzing the Efficiency of Recommender Systems Using Machine Learning
1 Introduction
2 Background
2.1 Recommender Systems
2.2 Machine Learning
3 Machine Learning Process
4 Analyzing the Efficiency of RedEMC’s Recommender System
5 Conclusions and Future Work
References
Requirement Specification for a Remote Monitoring System to Support the Management of Vascular Diseases
1 Introduction
2 Methods
3 Results
3.1 State of the Art
3.2 Requirement Specification
4 Discussion
5 Conclusions
References
Correction to: A Conversational Agent for Promoting Physical Activity Among COPD Patients
Correction to: Chapter “A Conversational Agent for Promoting Physical Activity Among COPD Patients” in: A. Rocha et al. (Eds.): Information Systems and Technologies, LNNS 468, https://doi.org/10.1007/978-3-031-04826-5_49
Author Index
📜 SIMILAR VOLUMES
<span>This book is composed of a selection of articles from the 11st World Conference on Information Systems and Technologies, held between 4 and 5 of April 2023, at Sant'Anna School of Advanced Studies, in Pisa, Italy. WorldCIST is a global forum for researchers and practitioners to present and dis
<p><span>This book covers the following main topics: A) information and knowledge management; B) organizational models and information systems; C) software and systems modeling; D) software systems, architectures, applications and tools; E) multimedia systems and applications; F) computer networks,
<p><span>This book is composed by the papers written in English and accepted for presentation and discussion at The 2023 International Conference on Information Technology & Systems (ICITS'23), held at Universidad Nacional de San Antonio Abad del Cusco, in Cusco, Peru, between the 24</span><span
<p><span>This book is composed by the papers written in English and accepted for presentation and discussion at The 2022 International Conference on Information Technology & Systems (ICITS'22), held at Tecnológico de Costa Rica, in San Carlos, Costa Rica, between the 9th and the 11th of February
<span>This book is composed of a selection of articles from the 11st World Conference on Information Systems and Technologies, held between 4 and 5 of April 2023, at Sant'Anna School of Advanced Studies, in Pisa, Italy. WorldCIST is a global forum for researchers and practitioners to present and dis