000 08248nam a22006615i 4500
001 978-3-031-28332-1
003 DE-He213
005 20240207153454.0
007 cr nn 008mamaa
008 230506s2023 sz | s |||| 0|eng d
020 _a9783031283321
_9978-3-031-28332-1
050 4 _aQA76.9.D343
072 7 _aUNF
_2bicssc
072 7 _aUYQE
_2bicssc
072 7 _aCOM021030
_2bisacsh
072 7 _aUNF
_2thema
072 7 _aUYQE
_2thema
082 0 4 _a006.312
_223
245 1 0 _aITNG 2023 20th International Conference on Information Technology-New Generations
_h[electronic resource] /
_cedited by Shahram Latifi.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2023.
300 _aXIII, 457 p. 1 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Intelligent Systems and Computing,
_x2194-5365 ;
_v1445
500 _aAcceso multiusuario
505 0 _aChapter 1. Loop Closure Detection in Visual SLAM Based on Convolutional Neural Network. Chapter 2 -- Getting Local and Personal: Toward Building a Predictive Model for COVID in Three United States Cities. Chapter 3 -- Improved Significant Wave Height Prediction by an LSTM and EEMD Method. Chapter 4 -- A Deep Learning Approach for Sentiment and Emotional Analysis of Lebanese Arabizi Twitter Data. Chapter 5 -- A two-step approach to boost neural network generalizability in predicting defective software. Chapter 6 -- A Principal Component Analysis-based Scoring Mechanism to Quantify Crime Hot Spots in a City. Chapter 7 -- Tuning neural networks for superior accuracy on resource-constrained edge microcontrollers. Chapter 8 -- BigQuery Intersection Congestion Prediction. Chapter 9 -- A Detection Method for Stained Asbestos Based on Dyadic Wavelet Packet Transform and a Locally Adaptive Method of Edge Extraction. Chapter 10 -- Machine Learning - Fake Product Prediction System. Chapter 11 -- Ontology of Vulnerabilities and Attacks on VLAN Verifying X.509 Certificate Extensions. Chapter 12 -- Detecting Malicious Browser Extensions by Combining Machine Learning and Feature Selection. Chapter 13 -- A Lightweight Mutual Authentication and Key Generation Scheme in IoV Ecosystem. Chapter 14 -- To reject or not reject - that is the question, the case of BIKE post quantum KEM. Chapter 15 -- IoT forensics: Machine to Machine Embedded with SIM Card. Chapter 16 -- Streaming Platforms Based on Blockchain Technology: A Business Model Impact Analysis. Chapter 17 -- Digital Forensic Investigation Framework for Dashcam. Chapter 18 -- Conflicts between UX designers, front-end and back-end software developers: good or bad for productivity?. Chapter 19 -- Generalized EEG Data Acquisition and Processing System. Chapter 20 -- Supporting Technical Adaptation and Implementation of Digital Twins in Manufacturing. Chapter 21 -- Towards Specifying and Evaluating the Trustworthiness of an AI-enabled System. Chapter 22 -- Description and Consistency Checking of Distributed Algorithms in UML Models using Composite Structure and State Machine Diagrams. Chapter 23 -- Simulation and comparison of different scenarios of a Workflow net using Process Mining. Chapter 24 -- Making Sense of Failure Logs in an Industrial DevOps Environment. Chapter 25 -- Analysis of News Article various countries on a specific event using Semantic Network Analysis. Chapter 26 -- AN APPROACH TO ASSIST OPHTHALMOLOGISTS IN GLAUCOMA DETECTION USING DEEP LEARNING. Chapter 27 -- Multtestlib: An Approach to Unit Testing Using Parallel Processing in Python. Chapter 28 -- DEFD : Adapted decision tree ensemble for financial fraud detection. Chapter 29 -- Prediction of Bike Sharing Activities using Machine Learning and Data Analytics. Chapter 30 -- ICT: Attendance & Contact Tracing During a Pandemic. Chapter 31 -- Towards Cloud Teaching and Learning: A COVID 19 era in South Africa. Chapter 32 -- Learning Object as a Mediator in the User/Learner's Zone of Proximal Development. Chapter 33 -- Quality Assessment of Open Educational Resources based on Data Provenance. Chapter 34 -- Quality Assessment of Open Educational Resources: a systematic review. Chapter 35 -- Chapter 36 -- Predicting COVID-19 Occurrences from MDL-based Segmented Comorbidities and Logistic Regression. Chapter 37 -- Internet of Things Applications for Cold Chain Vaccine Tracking: A Systematic Literature Review. Chapter 38 -- GDPR and FAIR compliant decision support system design for triage and disease detection. Chapter 39 -- Truckfier - A multiclass vehicle detection and counting tool for real-world highway scenarios. Chapter 40 -- Explaining Multimodal Image Retrieval Using A Vision and Language Task Model. Chapter 41 -- A Process to Support Heuristic Evaluation and Tree Testing from a UX Integrated Perspective. Chapter 42 -- Description and Verification of Systolic Array Parallel Computation Model in Synchronous Circuit using LOTOS. Chapter 43 -- A Virtual Reality Mining Training Simulator for Proximity Detection. Chapter 44 -- A Performance Analysis of Different MongoDB Consistency Levels. Chapter 45 -- Information extraction and ontology population using car insurance reports. Chapter 46 -- Description of Restricted Object Reservation System using Specification and Description Language VDM++. Chapter 47 -- A Demographic Model to Predict Arrests by Race: An Exploratory Approach. Chapter 48 -- An Efficient Approach to Wireless Firmware Update Based on Erasure Correction Coding. Chapter 49 -- Complex Network Analysis of the US Marine Highway Network. Chapter 50 -- Directed Acyclic Network and Turn Constraint Paths.
520 _aThis volume represents the 18th International Conference on Information Technology - New Generations (ITNG), 2021. ITNG is an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and health care are the among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, a best student award, poster award, service award, a technical open panel, and workshops/exhibits from industry, government and academia. This publication is unique as it captures modern trends in IT with a balance of theoretical and experimental work. Most other work focus either on theoretical or experimental, but not both. Accordingly, we do not know of any competitive literature.
541 _fUABC ;
_cPerpetuidad
650 0 _aData mining.
650 0 _aInformation storage and retrieval systems.
650 0 _aSoftware engineering.
650 0 _aArtificial intelligence.
650 0 _aCooperating objects (Computer systems).
650 0 _aCloud Computing.
650 1 4 _aData Mining and Knowledge Discovery.
650 2 4 _aInformation Storage and Retrieval.
650 2 4 _aSoftware Engineering.
650 2 4 _aArtificial Intelligence.
650 2 4 _aCyber-Physical Systems.
650 2 4 _aCloud Computing.
700 1 _aLatifi, Shahram.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031283314
776 0 8 _iPrinted edition:
_z9783031283338
776 0 8 _iPrinted edition:
_z9783031283345
830 0 _aAdvances in Intelligent Systems and Computing,
_x2194-5365 ;
_v1445
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-28332-1
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cLIBRO_ELEC
999 _c260515
_d260514