AC ICWI 2022 Proceedings

 

ac2022 Proceedings of the International Conference on Applied Computing 2022 and WWW/Internet 2022

Lisbon, Portugal, 8-9 November, 2022

Edited by Hans Weghorn and Pedro Isaias

ISBN (Book): 978-989-8704-44-3
ISBN (CD-ROM):

Titles Published in This Volume

PROSPECTS FOR THE IMPLEMENTATION OF HEURISTIC ALGORITHMS FROM THE EVOLUTIONARY COMPUTING AS NEW EXPERIMENTAL APPROACHES IN SYNTHETIC BIOLOGY: IN SILICO TESTS
Alexander Spirov and Ekaterina Myasnikova

DEEP LEARNING APPROACH TO CLASSIFYING SOLAR RADIO BURSTS
Herman le Roux, Günther Richard Drevin, Roelf Du Toit Strauss and Petrus Johannes Steyn

TORUS-CONNECTED TOROIDS: AN INTERCONNECTION NETWORK FOR MASSIVELY PARALLEL SYSTEMS
Antoine Bossard

MULTIPLE INHERITANCE MECHANISMS IN LOGIC OBJECTS APPROACH BASED ON A MULTIPLE SPECIALISATION OF OBJECTS
Macaire Ngomo

SUNSPOT DETECTION USING DEEP LEARNING TECHNIQUES
Pieter Swanepoel, Günther Richard Drevin, Roelf Du Toit Strauss and Petrus Johannes Steyn

FIRST SYCL IMPLEMENTATION OF THE THREE-DIMENSIONAL SUBSURFACE XCA-FLOW CELLULAR AUTOMATON AND PERFORMANCE COMPARISON AGAINST CUDA
Donato D'Ambrosio, Giovanni Terremoto, Alessio De Rango, Luca Furnari, Alfonso Senatore and Giuseppe Mendicino

ENHANCED FEATURE EXTRACTION USING OPTIMAL WHITENING AND STACKED AUTOENCODERS
Archana Mathur, Akarsha Paralkar and Pramod Jain Saligrama Amendra Kumar

IDENTIFYING AND CHARACTERIZING CONCEPTS IN UNSTRUCTURED TEXTS USING AUTOMATIC ANNOTATION
Tiago Fraga, Orlando Belo and Anabela Barros

GAMIFIED VR SIMULATION IN NURSING EDUCATION: HOW TO GENERATE VALUE WITH VR IN NURSING EDUCATION
Roger Seiler, Ruben Straumann, Christian Weber and Andreas Block

ONTOLOGY MODEL FOR SMART OPEN LEARNING ENVIRONMENT BASED ON COPUTATIONAL THINKING
Bènène Fradi and Lilia Cheniti-Belcadhi

VR IN NURSING EDUCATION - HIGH-FIDELITY VS LOW-FIDELITY IMPLEMENTATIONS
Roger Seiler, Benjamin Lemcke and Andreas Block

EVALUATION OF DATA OPTIMAL STORAGE SYSTEM IN HYBRID CLOUD
Miho Imazaki, Satoshi Kaneko, Norihisa Komoda and Takenao Ohkawa

E-MONEY SECURITY DILEMMA: ADVANCED CYBERSECURITY MECHANISMS AND LEGACY MOBILE PAYMENTS IN SUB-SAHARAN AFRICA
Fabrice Neza, Anthony Joseph and Mary Joseph

SUPERVISED LEARNING BASED APPROACH FOR TURBOFAN ENGINES FAILURE PROGNOSIS WITHIN THE BELIEF FUNCTION FRAMEWORK
Rachid Hamza and Safa Ben Ayed

SUNSPOT DETECTION AND TRACKING USING IMAGE PROCESSING TECHNIQUES
Ruben Du Toit, Günther Richard Drevin and Roelf Du Toit Strauss

HIDROUFF DENSITY CALCULATOR: AN OPEN-SOURCE SOFTWARE FOR PREDICTING DENSITY OF COMPLEX MIXTURES USING PENG-ROBINSON EQUATION OF STATE (PREOS)
Valesca Moura de Sousa, Felipe Pereira de Moura, Mateus Pereira de Sousa, Rogério Fernandes Lacerda and Fernanda G. O. Passos

DESIGN AND IMPLEMENTATION OF A CHATBOT AS A TOOL TO ASSIST A HELPDESK TEAM
Diogo Pinto Ribeiro, Ana Anjo and Pedro Rangel Henriques

HMEDASYS: HOME MEDICATION INTAKE ALERT SYSTEM
Jardson Rodrigues, Christophe Soares, Pedro Sobral, Rui S. Moreira and José M. Torres

FROM PRACTICE TO SCIENCE: SOCIAL REACTIONS CAUSED BY CONVERSATIONAL AGENTS — A LITERATURE REVIEW FOR RESEARCHERS AND PRACTITIONERS
Sophie Hundertmark, Hans-Georg Fill and Edy Portmann

A STEP CLOSER TO UNDERSTANDING IMPLEMENTATION OF BUSINESS INTELLIGENCE IN THE ORGANIZATIONAL OPERATIONS: A SYSTEMATIC LITERATURE REVIEW
Ljerka Luic, Neva Babic and Ante Roncevic

MULTIVARIANT ANALYSIS IN VIDEO AD MARKETING CAMPAIGNS FOR WEB TRAFFIC QUALITY OPTIMIZATION
Marta López and Fernando Perales

CLASSIFICATION OF FINANCIAL MARKETS INFLUENCERS ON TWITTER
Inês Almeida and André Sabino

COVID19: INTELLIGENT CHATBOT AND FINANCIAL AID APPLICATION
Kenza Douifir, Naoual Chaouni Benabdellah and Ali Idri

ENHANCING TYPE SYSTEMS WITH FIRST-CLASS PATTERNS
Lutz Hamel, Timothy Colaneri and Oliver McLaughlin

INTELLIGENT SEMANTIC BASED FRAMEWORK FOR PERSONALIZED REHABILITATION TO CHILDREN WITH CEREBRAL PALSY
Rahma Haouas Zahwanie, Lilia Cheniti-Belcadhi and Saoussen Layouni

EXCHANGING PERSONAL DATA THROUGH BLOCKCHAIN TECHNOLOGY TO FULFIL INCREASING PRIVACY NEEDS
Petrus J. Roos and Henri E. van Rensburg

PROMOTING CYBERSECURITY AWARENESS UTILIZING A "BUILD YOUR OWN ADVENTURE" SERIOUS GAME
Christo Croucamp, Günther Richard Drevin and Dirk Snyman

USE OF YOLOV5 OBJECT DETECTION ALGORITHMS FOR INSECT DETECTION
Lino Oliveira, Margarida Victoriano, Adilia Alves and José Pereira

STATE-OF-THE-ART ANALYSIS OF ARTIFICIAL INTELLIGENCE APPROACHES IN THE MARITIME INDUSTRY
Christos Kontzinos, Ioanna Kanellou, Vasilis Michalakopoulos, Spiros Mouzakitis, Giannis Tsapelas, Panagiotis Kapsalis, Giorgos Kormpakis and Dimitris Askounis

ESTABLISHING CYBERSECURITY AWARENESS OF TECHNICAL SECURITY MEASURES THROUGH A SERIOUS GAME
Jaden Harding, Dirk Snyman and Gunther Richard Drevin

A QUALITATIVE STUDY ON THE PERCEIVED DRIVERS OF THE DIGITAL DIVIDE IN A DEVELOPING COUNTRY
Ayanda Magida and Brian Armstrong

A PROOF OF CONCEPT: CYBERSECURITY LEARNING CONTENT IN LTI BASED, EDUCATIONAL SYSTEMS
Ehm Kannegieser, Sergius Dyck and Daniel Atorf

A CASE STUDY FOR ANALYSIS AND PREDICTION IN LEARNING USING A PEER LEARNING SYSTEM
Adelina Aleksieva-Petrova and Milen Petrov

CO-CREATING ICT SOLUTIONS TO AID MIGRANT INTEGRATION: LESSONS LEARNED FROM THE H2020 MIICT PROJECT
Karen Latricia Hough and Babak Akhgar

THE LEGAL UNCERTAINTY ASPECT OF THE REGULATORY APPROACH REGARDING ONLINE CONTENT MODERATION
Eduardo Helfer de Farias and Gabriel Rached

EXPLORING CLOUD COMPUTING PREVALENCE FOR COMPETITIVE ADVANTAGE IN ONLINE PUBLICATION PLATFORMS
Tendani J. Lavhengwa

INFORMATION SYSTEMS INFRASTRUCTURE DEVELOPMENT - ROAD AHEAD
Seppo J. Sirkemaa

AI ADOPTION IN HEALTHCARE: TRUST AND PRIVACY CONCERNS
Mousa Albashrawi
 

 

Social Media Links

Search

Login