My Account Log in

1 option

CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI) : Advances and Applications in Computer Science, Electronics and Industrial Engineering. Proceedings of the Conference on Computer Science, Electronics and Industrial Engineering (CSEI 2022) / edited by Marcelo V. Garcia, Carlos Gordón-Gallegos.

Springer eBooks EBA - Intelligent Technologies and Robotics Collection 2023 Available online

View online
Format:
Book
Contributor:
García, Marcelo V., editor.
Gordón-Gallegos, Carlos, editor.
Series:
Lecture Notes in Networks and Systems, 2367-3389 ; 678
Language:
English
Subjects (All):
Computational intelligence.
Industrial engineering.
Production engineering.
Computational Intelligence.
Industrial and Production Engineering.
Local Subjects:
Computational Intelligence.
Industrial and Production Engineering.
Physical Description:
1 online resource (697 pages)
Edition:
1st ed. 2023.
Place of Publication:
Cham : Springer Nature Switzerland : Imprint: Springer, 2023.
Summary:
This book provides insights into the 5th Edition of the Proceedings of the Conference on Computer Science, Electronics, and Industrial Engineering (CSEI 2022) held in Ambato, Ecuador. This event brings together researchers, students, and professionals from the industrial and academic sectors, seeking to create and strengthen links between issues of joint interest, thus promoting technology and innovation nationwide. The topics of knowledge covered by the event are smart trends for industrial applications, the Internet of things (IoT), control and automation engineering, computer science, and health informatics. The book is helpful for active researchers and practitioners in the field.
Contents:
Intro
Preface
Organization
About the Speakers
Deep Learning for Computational Support in the Restoration of Cultural Heritage Artifacts
Multi-feed Antenna Designed by Characteristic Modes Theory
Approach to Optimize the Production and Demand of Electrical Energy through Systems of Inequalities and a Regression Model
Agile Computing
Sensors and Microfluidics, from Biomedical Applications to Industry
Contents
About the Editors
Computer Science
QR Codes as a Strategy in Political Marketing 2.0
1 Introduction
2 State of the Art
2.1 QR Codes in Digital Marketing
2.2 Success Factors in Political Marketing
3 Methodology
4 Results
5 Discussion
References
Methodology for Cyber Threat Intelligence with Sensor Integration
2 Definitions and Related Works
2.1 Threat Intelligence Generation Process
2.2 Data Model
2.3 Criteria for Data Enrichment
2.4 Related Works
3 Proposed Methodology
4 Proof of Concept
4.1 Proof of Concept Architecture
4.2 Results
4.3 Proposed Methodology Versus Related Works
5 Conclusion
Multi-agent Architecture for Passive Rootkit Detection with Data Enrichment
2 Concepts
2.1 Advanced Persistent Threat (APT)
2.2 Data Enrichment
2.3 Multi-agent Systems
2.4 Onion Network (TOR)
3 Related Works
3.1 MADEX
3.2 NERD
4 Proposed Architecture
4.1 Detection Strategy
5 Results
5.1 Legitimate FLows
5.2 Suspicious Flows
5.3 Enrichment System
5.4 Visualization
5.5 Conclusions
OSINT Methods in the Intelligence Cycle
2 Related Work
2.1 Williams and Blum OSINT Cycle
2.2 Berkeley Protocol OSINT Cycle
2.3 The Bellingcat OSINT Cycle.
2.4 Pastor-Galindo et al. OSINT Approaches
3 Techniques and Methods
3.1 Techniques for Gathering Information According to Pastor-Galindo et al. ch4pastor2020not
3.2 Techniques for Analysis Described in the Berkeley Protocol ch4UnitedspsNations
3.3 Techniques Used in Social Media Content Analysis Based on Williams and Blum Approach ch4williams2018defining
3.4 Methods Described as Workflows of Techniques
4 Proposed Method
Mobile Marketing as a Communication Strategy in Politics 2.0
2.1 Web 2.0
2.2 Apps
2.3 Mobile-Marketing
2.4 Politics 2.0
2.5 Political Communication Strategies
2.6 Political Marketing
2.7 Apps in Politics
4.1 Application TAM Model
Spatial Concentration of Deaths from Chronic-Degenerative Diseases in the Province of Tungurahua (2016-2020), Ecuador
2 Study Area
6 Conclusions
Appendix A Annexes
Methodology to Improve the Quality of Cyber Threat Intelligence Production Through Open Source Platforms
2 Related Works
3 Definitions
3.1 Intelligence Cycle
3.2 Threat Intelligence Platform
3.3 Enrichment
4 Methodology
5 Procedures
6 Discussions
7 Conclusions and Future Work
Evaluation of Web Accessibility in the State Citizen Service Portals Most Used by Disabled People
2 Method
3 Results
4 Conclusions
Failure of Tech Startups: A Systematic Literature Review
2 Methodology
2.1 Protocol Planning
2.2 Protocol Development
2.3 Data Recovery
2.4 Study Selection
2.5 Quality Assessment
2.6 Data Extraction
2.7 Data Synthesis
3 Results.
3.1 Overview of Studies
3.2 Factors of Tech Startup Failure
3.3 Limitations of This Review
4 Discussion
5 Conclusions
Augmented Reality System as a 5.0 Marketing Strategy in Restaurants: A Case Study in Ambato Ecuador
2 Case Study
3 AR System
4.1 System Usability Scale
4.2 Marketing Strategy
5 Conclusions and Future Work
Kinect-Enabled Electronic Game for Developing Cognitive and Gross Motor Skills in 4-5-Year-Old Children
1.1 Related Work
2 Materials and Methods
3 Electronic Game
3.1 Architecture
3.2 System Functioning
Optimizing User Information Value in a Web Search Through the Whittle Index
2 Formulation of RMABP, and the Indexation Approach
2.1 One-Armed Restless Bandit Problem and RMABP
2.2 Index Policy to Approximate the RMABP Solution
2.3 AG Algorithm and PLC-Indexability Conditions
3 Adjusting Link Parameters to Use the AG Algorithm
4 Simulations and Discussion
4.1 Experiment 1
4.2 Experiment 2
4.3 Experiment 3
4.4 Experiment 4
4.5 Experiment 5
5 Future Works
Artificial Intelligence
PCAnEn - Hindcasting with Analogue Ensembles of Principal Components
2 Meteorological Dataset
2.1 Data Characterization
2.2 Data Correlation
3 Methods
3.1 Principal Components Analysis
3.2 Dimension Reduction of the Dataset
3.3 Combining PCA with AnEn (PCAnEn)
4 Experiments with the PCAnEn Method
4.1 Comparing Accuracy
4.2 Comparing Performance
Prediction Models for Car Theft Detection Using CCTV Cameras and Machine Learning: A Systematic Review of the Literature
2 Materials and Methods.
2.1 Search Methodology
2.2 Criteria for Inclusion and Exclusion
2.3 Research Questions
2.4 Studies Selection
3 Results and Discussion
3.1 Answer to RQ1
3.2 Answer to RQ2
3.3 Answer to RQ3
3.4 Answer to RQ4
3.5 Data Source
4 Analysis of the Studies
4.1 Models (Q1)
4.2 Metrics (Q2)
4.3 Activities Detected (Q3)
4.4 Pre-processing Techniques (Q4)
Optimization of Vortex Dynamics on a Sphere
2 Statement of the Control Problem
3 Conversion to an Optimization Problem
4 Flow Created by Several Vortices
4.1 Flow Created by Two Vortices (N=2).
4.2 Flow Created by Three Vortices (N=3).
4.3 Flow Created by Four Vortices (N=4).
Home Automation System for People with Limited Upper Limb Capabilities Using Artificial Intelligence
3.1 HGR Model
3.2 Communication Protocol
3.3 Control of Bulb, Blind and Door
4 Experimentation
7 Discussion
Electronics Engineering
Development of a Controller Using the Generalized Minimum Variance Algorithm for a Twin Rotor Mimic System (TRMS)
2.1 System Identification
2.2 Generalized Minimum Variance Controllers
3 Analysis and Results
3.1 The Wilcoxon Test
Metaheuristics of the Artificial Bee Colony Used for Optimizing a PID Dahlin in Arm Platform
2.1 Data Acquisition Using the STM32F4-Discovery Card
2.2 Identification of the Transfer Function
2.3 PID-DAHLIN Controller Development
2.4 PID-Dahlin Tuning Using ABC
3.1 Continuous-Time System Response Optimized with ABC Tuned to the ITAE Performance Index.
3.2 Results Obtained Using the Wilcoxon Test
Drone Design for Urban Fire Mitigation
2 Literature Review
3 System Proposal
3.1 Mechanical Design
3.2 Electronic Design
3.3 Integration with the Mechanism
4 Cloud-Based Web Application Design
4.1 ADD Process Design
4.2 Computer Vision Algorithm
5 Summary
Drone Collaboration Using OLSR Protocol in a FANET Network for Traffic Monitoring in a Smart City Environment
2 Methods and Materials
2.1 Gauss Markov Mobility Model
2.2 Simulation Platform
2.3 Simulation Structure and Parameters
3 Implementation of the Proposal
3.1 Performance Metrics
4 Implementation Results
Solar Panels for Low Power Energy Harvesting
2.1 Design
2.2 Simulation
2.3 Characterization
2.4 DC-DC Converter Circuit
2.5 Battery Charger Circuit
3 Analysis of Results
3.1 Series Configuration
3.2 Parallel Configuration
3.3 Mixed Configuration
Effect of Slots in Rectangular Geometry Patch Antennas for Energy Harvesting in 2.4GHz Band
2.1 Antenna Design
2.2 Slots
2.3 Study Parameters
2.4 Simulation
2.5 Fabrication
2.6 Characterization
Monitoring and Control System for Energy Harvesting IoT Applications
3.1 Proposed System Design
3.2 Hardware Design
3.3 Software Design
4 Discussion of Results
4.1 Comparison of Voltage Measurements Between a Fluke Multimeter and the Proposed Energy Harvesting Monitoring System
References.
RF Energy Harvesting System Based on Spiral Logarithmic Dipole Rectenna Array.
Notes:
Includes bibliographical references and index.
Other Format:
Print version: Garcia, Marcelo V. CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)
ISBN:
9783031305924
OCLC:
1378393018

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account