<p><span>This book covers the following main topics: A) information and knowledge management; B) organizational models and information systems; C) software and systems modeling; D) software systems, architectures, applications and tools; E) multimedia systems and applications; F) computer networks,
Information Systems and Technologies: WorldCIST 2023, Volume 1 (Lecture Notes in Networks and Systems, 799)
â Scribed by Alvaro Rocha (editor), Hojjat Adeli (editor), Gintautas Dzemyda (editor), Fernando Moreira (editor), Valentina Colla (editor)
- Publisher
- Springer
- Year
- 2024
- Tongue
- English
- Leaves
- 615
- Edition
- 1st ed. 2024
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book is composed of a selection of articles from the 11st World Conference on Information Systems and Technologies, held between 4 and 5 of April 2023, at Sant'Anna School of Advanced Studies, in Pisa, Italy. WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences, and challenges of modern Information Systems and Technologies research, together with their technological development and applications. The main and distinctive topics covered are: A) Information and Knowledge Management; B) Organizational Models and Information Systems; C) Software and Systems Modeling; D) Software Systems, Architectures, Applications, and Tools; E) Multimedia Systems and Applications; F) Computer Networks, Mobility, and Pervasive Systems; G) Intelligent and Decision Support Systems; H) Big Data Analytics and Applications; I) HumanâComputer Interaction; J) Ethics, Computers, and Security; K) Health Informatics; L) Information Technologies in Education; M) Information Technologies in Radiocommunications; and N) Technologies for Biomedical Applications.
⌠Table of Contents
Preface
Organization
Contents
Computer Networks, Mobility and Pervasive Systems
Physarum-Inspired Enterprise Network Redesign
1 Introduction
2 Related Work
3 Modeling Enterprise Network Redesign
3.1 Modeling Physarum Model for Network Redesign
4 Proposed Method
5 Results and Discussion
6 Conclusions
References
Improving LoRaWAN RSSI-Based Localization in Harsh Environments: The Harbor Use Case
1 Introduction
2 Related Work
3 LoRaWAN Experimental Testbed
4 Evaluation Results
4.1 Distance Estimation by Using Single PL Method
4.2 Distance Estimation by Using Multi-slope PL Method
4.3 Location Estimation by Using Fingerprint Method
5 Conclusion
References
Impact of Traffic Sampling on LRD Estimation
1 Introduction
2 Background
2.1 Sampling
2.2 Properties of Internet Traffic
2.3 Methods for Estimating the Parameters H and
3 Experimental Environment
3.1 Sampling Framework and Datasets
3.2 Data Preprocessing
3.3 Selfis - LRD Estimation
4 Results and Discussion
5 Conclusions
References
Features Extraction and Structure Similarities Measurement of Complex Networks
1 Introduction
2 Review on Similarity Measurements
2.1 Graph Similarity Measurement Algorithms
3 Materials and Methods
4 Results and Discussion
5 Conclusions
References
Big Data Analytics and Applications
Technology Use by Nigerian Smallholder Farmers and the Significant Mediating Factors
1 Introduction
2 Literature Review
2.1 Agricultural Technologies
2.2 The Social, Economic and Environmental Impact of Digital Agricultural Technology
2.3 Technology Adoption
2.4 The Factors that Determine the Adoption of Technology by Smallholder Farmers
3 Conclusions
References
Balancing Plug-In for Stream-Based Classification
1 Introduction
2 Related Work
3 Proposed Method
4 Experiments and Results
4.1 Crowdsourced Data Set Results
4.2 Transportation Data Set Results
4.3 Comparison with Synthetic Data Generators
5 Conclusions
References
Explainable Classification of Wiki Streams
1 Introduction
2 Related Work
3 Proposed Method
4 Experiments and Results
5 Conclusions
References
Reconstruction of Meteorological Records with PCA-Based Analog Ensemble Methods
1 Introduction
2 Meteorological Dataset
3 Determination of the Principal Components
4 Analog Ensemble Combined with PCA
5 Experimental Evaluation
6 Conclusion
References
Analysis of the Characteristics of Different Peer-To-Peer Risky Loans
1 Introduction
2 Related Literature
3 Research Methodologies
4 Data Analysis and Results
5 Conclusion
References
Physics-Informed Autoencoders with Intrinsic Differential Equations for Anomaly Detection in Industrial Processes
1 Introduction
2 Physics-Informed Machine Learning
2.1 Transformations
2.2 Integrating Ordinary Differential Equations
3 Autoencoder Architecture for Anomaly Detection
4 Results
4.1 Test Data
4.2 Wavelet Preprocessing
4.3 Results Due to the Inclusion of the Differential Equation
5 Summary
References
Big Data as a Tool for Analyzing Academic Performance in Education
1 Introduction
2 Methods and Materials
2.1 Obtaining and Processing Information
2.2 Identification and Organization of Data
2.3 Data Analysis
2.4 Correlation Between Attributes
3 Results
3.1 Classifiers
4 Conclusions
References
Ethics, Computers and Security
Phishing and Human Error. Beyond Training and Simulations
1 Introduction
2 What is Phishing?
3 Human Error Theory. Why Are We Prone to Error?
4 Phishing. A Human Error in the Digital Context
5 Conclusions
References
Towards a Cybersecurity Awareness Plan for Casinos: An Initial Review for Internal Workers
1 Introduction
2 Background and Related Concepts
2.1 Cybersecurity Culture
2.2 ISO 27001
2.3 NIST
3 Methodology
3.1 Company Context
3.2 Role Definition
3.3 Identification of Key Activities
3.4 Material Design
3.5 Program Implementation
3.6 Program Evaluation
4 AÂ Preliminary Test
5 Results
6 Conclusions and Discussion
References
Ethical Framework for the Software Development Process: A Systematic Mapping Study
1 Introduction
2 Related Work
3 Research Method
4 Proposed Solution
5 Discussion of Results and Limitations
6 Conclusions and Future Work
References
Social Engineering as the Art of Deception in Cyber-Attacks: A Mapping Review
1 Introduction
2 Methodology
3 Discussion
4 Conclusions
References
Several Online Pharmacies Leak Sensitive Health Data to Third Parties
1 Introduction
2 Related Work
3 Study Setting and Methodology
4 Results: Analysis on Personal Data Sent to Third Parties
5 Discussion
6 Conclusions
References
Verifying the Situation of Cybersecurity in Portugal`s Municipalities
1 Introduction
1.1 Research Objectives
1.2 Methodology
2 Background
2.1 Literature Review
2.2 Strategic Goals for Alignment with European Cybersecurity Commission
2.3 Standard ISO/IEC 27002:2022
2.4 National Cybersecurity Strategies (NCSS)
3 The Survey
4 Application and Results
5 Discussions and Conclusions
6 Limitations of This Study
References
Authentication, Authorization, Administration and Audit Impact on Digital Security
1 Introduction
2 State of Art
3 Method
3.1 Planning, Policies and Procedures.
3.2 Defence Information Systems Agency
3.3 Diagnosis
4 Proposal
5 Conclusions
6 Future Work
References
Generation Zâs [Incoherent] Approach Toward Instagramâs Privacy Policy
1 Introduction
2 Literature Review
3 Methodology
4 Data Analysis and Discussion â Descriptive Statistics
5 Data Analysis and Discussion â The Chi-Square Test of Association
6 Conclusion
References
Human-Computer Interaction
User eXperience (UX) Evaluation in Virtual Reality (VR)
1 Introduction
2 Background
3 Methodology
3.1 Identify the Research Questions
3.2 Identify Relevant Studies
3.3 Study Selection
4 Results
4.1 Attitudinal Methods
4.2 Behavioral Methods
4.3 Comparison of Methods
5 Conclusions
References
Natural Hand Gesture Interaction for 3D Transformations in Immersive VR
1 Introduction
2 User Interface Design and Implementation
2.1 Rotation
2.2 Scaling
3 Results and Discussion
4 Conclusions
References
VTubers, Their Global Expansion and Impact on Modern Society
1 Introduction
2 Literature Review
2.1 Background
2.2 Agencies Expansion and Strategy
2.3 Companies Using VTubers for Marketing
3 Methodology
4 Findings/Discussion
4.1 Portuguese Citizens
4.2 U.S. Citizens
5 Conclusion and Future Research
References
Generation Y Health Care Professionals and Their Acceptance of Chatbots
1 Introduction
2 Methodical Approach
2.1 Study 1: Interviews
2.2 Study 2: Survey
3 Results
4 Discussion
5 Limitations
6 Conclusion
References
TV Notifications to Promote Trustworthy News and Local School Newspapers
1 Introduction
2 TV Notifications Strategies to Promote Local Community and Social Engagement with School Newspapers
2.1 A News Creation Tool for School Newspapers
2.2 A Personalized Notification System for the TV Ecosystem
2.3 Goals of the Proposed Solution
2.4 System Architecture
2.5 Results Achieved
3 Final Remarks
References
Studentsâ Habits, Strategies, and Decisive Factors Around Course Selection
1 Introduction
2 Related Work
3 Motivating Context and Research Questions
4 The Survey
4.1 Participants & Procedure
4.2 Data Collection & Analysis
4.3 Findings
5 Discussion
5.1 The Value of Timely Advising
5.2 Studentsâ Preferences Around Courses and Instructors
5.3 Better Support for Enrollment
6 Limitations and Future Work
7 Conclusion
References
Contrasting Analysis Between Motion Capture Technologies
1 Introduction
2 Literature Review
3 Experiment Development
4 Conclusions
References
Health Informatics
ASCAPE - An Intelligent Approach to Support Cancer Patients
1 Introduction
2 ASCAPE Architecture
3 Federated Learning in ASCAPE
4 Conclusion
References
Factors Influencing the Effectiveness of Medical Products Stock Management in Polish Hospitals - Research Results
1 Introduction
2 Literature Review
3 AÂ Survey Study
3.1 AÂ Survey Methodology
3.2 AÂ Survey Results
4 Discussion
5 Conclusions
References
Generation of Synthetic X-Rays Images of Rib Fractures Using a 2D Enhanced Alpha-GAN for Data Augmentation
1 Introduction
2 Related Work
3 Generative Model Architecture
4 Material and Methods
5 Results
6 Discussion and Conclusion
References
Childrenâs Hearing Loss Assessment Application Development and Execution Processes Using Systems Engineering Approach
1 Introduction
2 Review of the Literature
2.1 Consultation Team
2.2 Requirements Engineering
2.3 Functional Allocations, Design Synthesis, Systems Testing and Integration
3 Theoretical Underpinning
4 Research Methodology
5 Case Descriptions and Analysis
5.1 Consultation Team Collaborations
5.2 Requirements Engineering
5.3 Functional Allocations, Design Synthesis and System Testing
5.4 System Integration
6 Discussions
7 Conclusions
References
Smartphones and Wristbands Detect Stress as Good as Intrusive Physiological Devices
1 Introduction
2 Mental State Detection
2.1 Detecting Mental Health Issues from Sensors
2.2 Public Databases Based on Smart Devices
3 Detecting Mental Health Issues
3.1 Data Aggregation and Preprocessing
3.2 Classifiers
4 Experimental Setup
4.1 The Experimental Environment
4.2 The Classifiers
5 Results
5.1 Evaluating Non-intrusive Smartphone Data (StudentLife)
5.2 Evaluating Intrusive Physiological Data (PASS and WESAD)
5.3 Discussion
6 Conclusions and Future Work
References
Open-Source Web System for Veterinary Management: A Case Study of OSCRUM
1 Introduction
2 Related Work
3 Description of the Proposed OSS Development Methodology: OSCRUM
4 Case Study
5 Case Study Results
6 Discussion and Limitations
7 Conclusion and Future Work
References
Smart Stress Relief â An EPS@ISEP 2022 Project
1 Introduction
2 Preliminary Studies
2.1 Related Work
2.2 Ethics
2.3 Marketing
2.4 Sustainability
3 Proposed Solution
3.1 Concept
3.2 Design
4 Prototype Development and Assembly
5 Product Evaluation
5.1 Tests and Results
5.2 Discussion
6 Conclusion
6.1 Achievements
6.2 Future Development
References
LIDia: A Serious Game for Type 1 Diabetes Education
1 Introduction
2 Background
2.1 Serious Games in Education
3 LIDia: Learn and Improve Diabetes
3.1 LIDia v1
4 Development Status and Future Work
References
Automatic Hemorrhage Detection in Magnetic Resonance Imaging in Cerebral Amyloid Angiopathy
1 Introduction
2 Materials and Methods
3 Experimental Results
4 Discussion and Conclusion
References
Subthalamic Nucleus and Substantia Nigra Automatic Segmentation Using Convolutional Segmentation Transformers (Conv-SeTr)
1 Introduction
2 Related Work
3 The Dataset and Methods
3.1 Dataset Pre-processing
3.2 Data Augmentation
3.3 The Base Models and Their Performance
3.4 Comparison of the Base Models' Performance
4 The Proposed Model Architecture
5 Conclusions
References
Intelligent and Decision Support Systems
Application of Binary Petri Nets to Knowledge Representation and Inference
1 Introduction
2 Binary Petri Nets
3 Net Representation of Production Rules
4 Algorithm
5 Illustrating Example
6 Experiments and Results
7 Summary
References
Credit Risk Scoring: AÂ Stacking Generalization Approach
1 Introduction
2 Materials and Methods
2.1 Stacked Regression Ensemble for Credit Scoring
2.2 Individual Credit Scoring Models and Stacking Framework
2.3 Sample Credit Dataset and Variables
2.4 Predictive Performance Evaluation Criteria
3 Results
4 Conclusions and Discussion
References
Camera- and Sensor Data-Based Process Observation in Liquid Steel Production
1 Introduction
2 Linear Data
3 Integral Data
3.1 Region of Interest
3.2 Texture Parameters
4 Conclusion and Outlook
References
Risks in the Process of Transparency in the Transmission of Live Sessions by Internet: A Case Study in the Brazilian Chamber of Deputies
1 Introduction
2 Theoretical Reference
2.1 Political Transparency
2.2 Legislative Process
2.3 ISO 31000 - Risk Management
2.4 Live Broadcast
2.5 Incident Management
3 Methodology
3.1 Research Method
3.2 Research Structuring
4 Results and Analysis
4.1 Document Survey
4.2 Mapping
4.3 Data Collection
4.4 Application of FMEA
4.5 Identified Improvements
5 Conclusion and Future Work
References
Demand Driven Material Requirements Planning: Using the Buffer Status to Schedule Replenishment Orders
1 Introduction
2 Background
3 Simulation Study
3.1 Production System
3.2 DDMRP Control
3.3 Experimental Design and Performance Measures
4 Results
5 Conclusions
References
Detecting and Predicting Smart Car Collisions in Hybrid Environments from Sensor Data
1 Introduction
2 Related Work
3 Methodology
3.1 Data Extraction Process
3.2 Sensor Information and Collision Cases
3.3 Classifiers
4 Experimental Setup
5 Results
5.1 Detecting Collision
5.2 Predicting Collisions
6 Discussion and Future Work
7 Conclusions
References
Detection of Racism on Multilingual Social Media: An NLP Approach
1 Introduction
2 Related Research
3 Datasets and Annotations
3.1 Dataset
3.2 Annotation
4 Method
4.1 Preprocessing
4.2 Vectorization
4.3 Learning
5 Experimental Results
6 Discussion
7 Conclusion and Future Work
References
Integrated Information Theory with PyPhi: Testing and Improvement Strategies
1 Introduction
2 Background
2.1 Integrated Information Theory (IIT)
2.2 Minimum Information Partition (MIP)
2.3 PyPhi
3 Interventions
3.1 Minimum Information Partition (MIP)
3.2 Current PyPhi Solution
3.3 âallpartitionsâ Method
4 Suggested Strategy
4.1 Test Plan
4.2 PyPhi Configuration
4.3 Distance Measures Supported by PyPhi
4.4 Partitioning Schemes Supported by Pyphi
5 Results
6 Conclusions and Future Work
Appendix
References
Recursive Least Squares Identification with Extreme Learning Machine (RLS-ELM)
1 Introduction
2 The Problem Characteristics
2.1 Experimental Data
2.2 Least Squares (LS)
2.3 Recursive Least Squares (RLS)
2.4 Single Hidden Layer Propagation Networks (SLFNs) Whit Random Hiden Neurons
2.5 Methodology
3 Experimental Results
3.1 LS
3.2 RLS
3.3 RLS-ELM
3.4 The Algorithms Comparative Study
4 Conclusion
References
A Data-Driven Cyber Resilience Assessment for Industrial Plants
1 Introduction
2 Methodology for Data-Driven Cyber Resilience Assessment
3 Results
3.1 Base Scenario Analysis
3.2 Attack Scenarios Analysis
3.3 Assess Resilience Metrics
4 Conclusion
References
Parallelization Algorithm for the Calculation of Typical Testors Based on YYC
1 Introduction
2 Testor Theory
3 Block's Algorithm Based on YYC
3.1 Two Blocks of a Basic Matrix
3.2 YYC in the Block's Approximation
3.3 Block's Approximation Algorithm
3.4 Parallelization of Block's Algorithm
4 Experiments and Application
4.1 Synthetic Basic Matrices
4.2 Application to QSAR Biodegradation Data Set
5 Conclusions and Further Work
References
AI Data Analysis and SOM for the Monitoring and Improvement of Quality in Rolled Steel Bars
1 Introduction
2 Industrial Context and Setâup
2.1 Data Collection and Management Framework
2.2 Available Data Description
3 AIâBased Data Preâprocessing
3.1 Outliers Detection and Removal Through AI Techniques
3.2 Variables Selection
4 SOM for Quality Monitornig and Process Control
4.1 Design and Training of the SOM Model
4.2 Exploitation of the SOM Model
5 Conclusions and Future Work
References
Performance Comparisons of Association Rule Learning Algorithms on a Supermarket Data
1 Introduction
2 Literature Review
3 Association Rule Learning Algorithms
3.1 Apriori Algorithm
3.2 FP-Growth Algorithm
3.3 TOP-K Rules Algorithm
3.4 TNR Algorithm
3.5 Closed Association Rule Learning
3.6 GCD (Greatest Common Divisors) Algorithm
4 Experiment
4.1 Data Used
4.2 Data Preprocessing
4.3 Run Algorithms
4.4 Result and Discussion
5 Conclusion
References
An Ontology-Based Approach for Risk Evaluation in Human-Machine Interaction
1 Introduction
2 Background and Related Works
2.1 Preliminary Hazard Analysis (PHA)
2.2 Safety in Human-Machine Interaction
2.3 Ontology for Risk
3 Ontology for Human-Machine Interaction - OHMI
4 Discussion and Results
5 Conclusions and Future Work
References
Speech Recognition Using HMM-CNN
1 Introduction
2 Frameworks for Speech Recognition
3 Methodology
3.1 Feature Extraction - Mel-Frequency Cepstral Coefficients
4 Markov Chains, Markov Processes, Markov Model, and Hidden Markov Model
4.1 Hidden Markov Model
5 Convolutional Neural Network
5.1 Proposed Approach: CNN and HMM
6 Results, Discussions, and Conclusions
References
AI Solutions for Inter-organisational Care: A Case Based Analysis
1 Introduction
2 Related Research
3 Method
4 The Stockholm Health Care Case
5 Identified Problems and Solutions
5.1 Coordinating Between Caregivers: Asynchronously
5.2 Coordinating Between Caregivers: Synchronously
5.3 Improve Registered Information
5.4 Managing Information Overload
5.5 Refining Information for a New Purpose
5.6 Transferring Patient Information
5.7 Accessing Information in Shared Systems
5.8 Information for Prediction
6 Discussion
7 Conclusions
References
Breast Cancer Stage Determination Using Deep Learning
1 Introduction
2 Related Works
3 Methods
3.1 Dataset
3.2 Methodology
3.3 Data Preprocessing
4 Results and Discussion
4.1 Cropping 256âĂâ256
5 Conclusion
References
Optimal Cut-Off Points for Pancreatic Cancer Detection Using Deep Learning Techniques
1 Introduction
2 Methodology
2.1 Classification Accuracy and Cut-Off Point Selection
2.2 Image Sets and Data Pre-processing
2.3 Deep Learning-Based Framework
3 Evaluation
4 Discussion and Conclusions
References
Computational Approaches for the Automatic Quantification of Cells from Brain Images
1 Introduction
2 Methodology
3 Results
4 Proposed Approaches
4.1 Classical Computational Approach
4.2 Deep Learning Approach
5 Conclusion
References
Design and Implementation of a Well-Being Index for Knowledge Assessment
1 Introduction
2 Well-Being Indexes
3 Assessing Knowledge Using an Index
4 Conclusions and Future Work
References
Information Technologies in Radiocommunications
Experimental Assessment of Fractal Miniaturization for Planar Inverted-F Antennas
1 Introduction
2 Miniaturized PIFA Designs
2.1 Minkowski Pre-fractal Design
2.2 Evolution of the Minkowski Pre-fractal Design
3 Realization and Measurement
3.1 Impedance Bandwidth
3.2 Boresight Gain
3.3 Radiation Efficiency
4 Conclusion
References
Author Index
đ SIMILAR VOLUMES
<p><span>This book covers the following main topics: A) information and knowledge management; B) organizational models and information systems; C) software and systems modeling; D) software systems, architectures, applications and tools; E) multimedia systems and applications; F) computer networks,
<p><span>This book covers the following main topics: A) information and knowledge management; B) organizational models and information systems; C) software and systems modeling; D) software systems, architectures, applications and tools; E) multimedia systems and applications; F) computer networks,
<p><span>This book is composed by the papers written in English and accepted for presentation and discussion at The 2023 International Conference on Information Technology & Systems (ICITS'23), held at Universidad Nacional de San Antonio Abad del Cusco, in Cusco, Peru, between the 24</span><span
<span>This book is composed of a selection of articles from the 11st World Conference on Information Systems and Technologies, held between 4 and 5 of April 2023, at Sant'Anna School of Advanced Studies, in Pisa, Italy. WorldCIST is a global forum for researchers and practitioners to present and dis
<span>This book is composed of a selection of articles from the 11st World Conference on Information Systems and Technologies, held between 4 and 5 of April 2023, at Sant'Anna School of Advanced Studies, in Pisa, Italy. WorldCIST is a global forum for researchers and practitioners to present and dis