000 | 08248nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-031-28332-1 | ||
003 | DE-He213 | ||
005 | 20240207153454.0 | ||
007 | cr nn 008mamaa | ||
008 | 230506s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031283321 _9978-3-031-28332-1 |
||
050 | 4 | _aQA76.9.D343 | |
072 | 7 |
_aUNF _2bicssc |
|
072 | 7 |
_aUYQE _2bicssc |
|
072 | 7 |
_aCOM021030 _2bisacsh |
|
072 | 7 |
_aUNF _2thema |
|
072 | 7 |
_aUYQE _2thema |
|
082 | 0 | 4 |
_a006.312 _223 |
245 | 1 | 0 |
_aITNG 2023 20th International Conference on Information Technology-New Generations _h[electronic resource] / _cedited by Shahram Latifi. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aXIII, 457 p. 1 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Intelligent Systems and Computing, _x2194-5365 ; _v1445 |
|
500 | _aAcceso multiusuario | ||
505 | 0 | _aChapter 1. Loop Closure Detection in Visual SLAM Based on Convolutional Neural Network. Chapter 2 -- Getting Local and Personal: Toward Building a Predictive Model for COVID in Three United States Cities. Chapter 3 -- Improved Significant Wave Height Prediction by an LSTM and EEMD Method. Chapter 4 -- A Deep Learning Approach for Sentiment and Emotional Analysis of Lebanese Arabizi Twitter Data. Chapter 5 -- A two-step approach to boost neural network generalizability in predicting defective software. Chapter 6 -- A Principal Component Analysis-based Scoring Mechanism to Quantify Crime Hot Spots in a City. Chapter 7 -- Tuning neural networks for superior accuracy on resource-constrained edge microcontrollers. Chapter 8 -- BigQuery Intersection Congestion Prediction. Chapter 9 -- A Detection Method for Stained Asbestos Based on Dyadic Wavelet Packet Transform and a Locally Adaptive Method of Edge Extraction. Chapter 10 -- Machine Learning - Fake Product Prediction System. Chapter 11 -- Ontology of Vulnerabilities and Attacks on VLAN Verifying X.509 Certificate Extensions. Chapter 12 -- Detecting Malicious Browser Extensions by Combining Machine Learning and Feature Selection. Chapter 13 -- A Lightweight Mutual Authentication and Key Generation Scheme in IoV Ecosystem. Chapter 14 -- To reject or not reject - that is the question, the case of BIKE post quantum KEM. Chapter 15 -- IoT forensics: Machine to Machine Embedded with SIM Card. Chapter 16 -- Streaming Platforms Based on Blockchain Technology: A Business Model Impact Analysis. Chapter 17 -- Digital Forensic Investigation Framework for Dashcam. Chapter 18 -- Conflicts between UX designers, front-end and back-end software developers: good or bad for productivity?. Chapter 19 -- Generalized EEG Data Acquisition and Processing System. Chapter 20 -- Supporting Technical Adaptation and Implementation of Digital Twins in Manufacturing. Chapter 21 -- Towards Specifying and Evaluating the Trustworthiness of an AI-enabled System. Chapter 22 -- Description and Consistency Checking of Distributed Algorithms in UML Models using Composite Structure and State Machine Diagrams. Chapter 23 -- Simulation and comparison of different scenarios of a Workflow net using Process Mining. Chapter 24 -- Making Sense of Failure Logs in an Industrial DevOps Environment. Chapter 25 -- Analysis of News Article various countries on a specific event using Semantic Network Analysis. Chapter 26 -- AN APPROACH TO ASSIST OPHTHALMOLOGISTS IN GLAUCOMA DETECTION USING DEEP LEARNING. Chapter 27 -- Multtestlib: An Approach to Unit Testing Using Parallel Processing in Python. Chapter 28 -- DEFD : Adapted decision tree ensemble for financial fraud detection. Chapter 29 -- Prediction of Bike Sharing Activities using Machine Learning and Data Analytics. Chapter 30 -- ICT: Attendance & Contact Tracing During a Pandemic. Chapter 31 -- Towards Cloud Teaching and Learning: A COVID 19 era in South Africa. Chapter 32 -- Learning Object as a Mediator in the User/Learner's Zone of Proximal Development. Chapter 33 -- Quality Assessment of Open Educational Resources based on Data Provenance. Chapter 34 -- Quality Assessment of Open Educational Resources: a systematic review. Chapter 35 -- Chapter 36 -- Predicting COVID-19 Occurrences from MDL-based Segmented Comorbidities and Logistic Regression. Chapter 37 -- Internet of Things Applications for Cold Chain Vaccine Tracking: A Systematic Literature Review. Chapter 38 -- GDPR and FAIR compliant decision support system design for triage and disease detection. Chapter 39 -- Truckfier - A multiclass vehicle detection and counting tool for real-world highway scenarios. Chapter 40 -- Explaining Multimodal Image Retrieval Using A Vision and Language Task Model. Chapter 41 -- A Process to Support Heuristic Evaluation and Tree Testing from a UX Integrated Perspective. Chapter 42 -- Description and Verification of Systolic Array Parallel Computation Model in Synchronous Circuit using LOTOS. Chapter 43 -- A Virtual Reality Mining Training Simulator for Proximity Detection. Chapter 44 -- A Performance Analysis of Different MongoDB Consistency Levels. Chapter 45 -- Information extraction and ontology population using car insurance reports. Chapter 46 -- Description of Restricted Object Reservation System using Specification and Description Language VDM++. Chapter 47 -- A Demographic Model to Predict Arrests by Race: An Exploratory Approach. Chapter 48 -- An Efficient Approach to Wireless Firmware Update Based on Erasure Correction Coding. Chapter 49 -- Complex Network Analysis of the US Marine Highway Network. Chapter 50 -- Directed Acyclic Network and Turn Constraint Paths. | |
520 | _aThis volume represents the 18th International Conference on Information Technology - New Generations (ITNG), 2021. ITNG is an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and health care are the among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, a best student award, poster award, service award, a technical open panel, and workshops/exhibits from industry, government and academia. This publication is unique as it captures modern trends in IT with a balance of theoretical and experimental work. Most other work focus either on theoretical or experimental, but not both. Accordingly, we do not know of any competitive literature. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aData mining. | |
650 | 0 | _aInformation storage and retrieval systems. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aCooperating objects (Computer systems). | |
650 | 0 | _aCloud Computing. | |
650 | 1 | 4 | _aData Mining and Knowledge Discovery. |
650 | 2 | 4 | _aInformation Storage and Retrieval. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aCyber-Physical Systems. |
650 | 2 | 4 | _aCloud Computing. |
700 | 1 |
_aLatifi, Shahram. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031283314 |
776 | 0 | 8 |
_iPrinted edition: _z9783031283338 |
776 | 0 | 8 |
_iPrinted edition: _z9783031283345 |
830 | 0 |
_aAdvances in Intelligent Systems and Computing, _x2194-5365 ; _v1445 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-28332-1 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cLIBRO_ELEC | ||
999 |
_c260515 _d260514 |