Information and Communication Technologies

Information and Communication Technologies

10th Ecuadorian Conference, TICEC 2022, Manta, Ecuador, October 12-14, 2022, Proceedings

Herrera-Tapia, Jorge; Berrezueta-Guzman, Santiago; Rodriguez-Morales, Germania; Fonseca C., Efrain R.

Springer International Publishing AG

10/2022

311

Mole

Inglês

9783031182716

15 a 20 dias

Descrição não disponível.
?ICT?s Applications.- An online BCI system based in SSVEPs to control IoT devices.- Collision Avoidance Simulation using Voronoi Diagrams in a Centralized System of Holonomic Multi-Agents.- Intelligent Electromyograph for Early Detection of Myopathy and Neuropathy using EMG signals and Neural Network Model.- Underwater wireless sensor networks and cryptographic applications.- Design of a sensor network for drinking water control in the Maria of Merced Educa-tional Unit.- Drinking water and sewerage at the Universidad de las Fuerzas Armadas ESPE and Implementation of an Internet of Things flowmeter.- Indicators to evaluate elements of Industry 5.0 in the textile production of MSMEs.- Technological Accessibility and Digital Health Education Associated with the Use of Smart Healthcare by Obstetricians in Peru.- Data Science.- Adaptation of a process Mining Methodology to Analyse Learning Strategies in a Synchronous Massive Open Online Course.- Ecuador Agricultural Product Price Forecast: a Comparative Study of Deep Learning Models.- Assessing the COVID-19 Vaccination Process via Functional Data Analysis.- A Methodology to Develop an Outdoor Activities Recommender based on Air Pollution Variables.- Improving with Metaheuristics the Item Selection in Parallel Coordinates Plot.- Implementation of clustering techniques to data obtained from a Memory Match Game oriented to the cognitive function of attention.- Q-Learning in a Multidimensional Maze Environment.- Cyberbullying through the lens of data science.- Software Development.- Comparative Study of Image Degradation and Restoration Techniques.- IOWA Rough-Fuzzy Support Vector Data Description.- Preparation of a Social Engineering attack, from scratch to compromise: A USB drop-per and Impersonation approach.- Information Security at Higher Education Institutions: A systematic Literature Review.
artificial intelligence;clustering algorithms;computer networks;computer security;computer vision;correlation analysis;cryptography;data integration;data mining;data security;databases;graph theory;Human-Computer Interaction (HCI);image processing;machine learning;network protocols;signal processing;user interfaces