Muutke küpsiste eelistusi

Intelligent Human Computer Interaction: 16th International Conference, IHCI 2024, Twente, The Netherlands, November 13-16, 2024, Revised Selected Papers, Part I [kõvakaaneline]

(Herausgegeben:Singh, Dhananjay; van 't Klooster, Jan-Willem; Tiwary, Uma Shanker)
  • Bibliog. andmed: 2025. xxi, 459 S. XXI, 459 p. 194 illus., 161 illus. in color. 235 mm
  • Formaat: Kartoniert
  • Sari: Lecture Notes in Computer Science 15557
  • Kirjastus: SPRINGER, BERLIN; SPRINGER NATURE SWITZERLAND; SPRING
  • ISBN-13: 9783031887048
  • Bibliog. andmed: 2025. xxi, 459 S. XXI, 459 p. 194 illus., 161 illus. in color. 235 mm
  • Formaat: Kartoniert
  • Sari: Lecture Notes in Computer Science 15557
  • Kirjastus: SPRINGER, BERLIN; SPRINGER NATURE SWITZERLAND; SPRING
  • ISBN-13: 9783031887048
This volume LNCS 15557 constitutes the refereed proceedings of 16th International Conference on Intelligent Human Computer Interaction, IHCI 2024, held in Twente, The Netherlands, during November 13-16, 2024.The 37 full papers and 2 short papers were carefully reviewed and selected from 107 submissions. They were categorized under the topical sections as follows:Learning in healthcare and wellbeingRobots and conversation agentsPhysical world and PostersHuman factorsAlgorithims and computer visionHuman factors in cybersecurity

A VR experience exposing the hidden curriculum of the operating room a case study.- LifeCharger SynCare Mobile App: a preliminary usability study.- From Theory to Practice Simulation in Anesthesiology through Active Learning Experiences.- Methods for Optimizing Diagnostic Data for Patients with a Given Condition.- An Exploration of Phantom Touch as a Design Aspect to Enhance Wellbeing and Safety in Social VR.- Predictive Analytics for Stress Management in Nursing A Machine Learning Approach Using Wearable IoT Devices.- Robot-to-Robot Collaborative Knowledge Sharing with Human Operators under Constraint Resources through Connotative 2.5D Mapping.- Context aware Robotic Assistance for Workers using Intention Recognition and Semantic Digital Twin.- Conversational Agent Design A Comprehensive Analysis of Research from Leading Conferences.- Enhancing Firefighting Robot s Capability A Comprehensive Implementation for Enhancing Firefighting Robot s Operations.- A Novel Framework for

Collaborative Knowledge Sharing and Learning for Disaster Response Robots.- More Human, Less Bot How Anthropomorphism Impacts User Experience in Customer Support Chatbots.- I prefer robot cats! Reflections on robot animal like morphology from an in the wild Child Robot Interaction workshop.- Pipeline leak detection Leveraging Acoustic Emission Signal Processing and Machine Learning.- Application of Machine Learning Techniques for Leak Detection in a Horizontal Pipeline Transporting a Water Glycerol Mixture.- Connected lives Revolutionizing health and social interaction with wearable technology in India.- Online Monitoring System of Groundwater in the Aral Region Based on the Internet of Things.- Enhancing Meal Search Engine for Fitness Applications using Semantic Search with Sentence Transformers.- Addressing Graphviz File Generation Issue in CPN Tools: A Java based Solution.- What Does Remote Driving Mean for People A Futurespective Design Approach.- Controller adaptive Digit

al Assistant (CODA) Interim conclusions on the development of a new ATC system.- Reimagining the Utility of Dash Cam Data in Autonomous Travel Contexts A Service Design Proposal.- Keyframe Extraction based on Large Vision Transformer Model and kNN DBSCAN Clustering.- Improving Polyps Segmentation in Colonoscopy Images using Modified UNet3+ Network.- Scheduling for Lecturers using Genetic Algorithm with Fuzzy Constraints.- No Code Computer Vision.- Transfer Learning to Identify Multilingual Machine Genenrated Text.- A Novel Preprocessing Method for Transforming Federal Sentencing Data to Ensure Unbiased AI Adjudication Research Using Large Language Models.- Computational Analysis of User Experience of Password-Based Authentication Systems.- Computational Analysis of Human Factors in Spear Phishing Attacks An Adaptive Network Model.- Analysing the Rise of Biohacking in a Tech Driven City Assessing Risks through Adaptive Network Modeling.- An Adaptive Network Model to Analyse Cyber S

ecurity Understanding Cyber Threats in Financial Institutions.- Understanding Insider Threats Behaviour An Adaptive Network Model of The Evolution of an Insider Threat.- Organizational Response to APT Attacks Computational Analysis by Behavioral Network Modelling.- Adversarial Attack Detection In Intrusion Detection System Using Machine Learning.- Enhancing Data Privacy with Lattice-Based Encryption Technique.- Improving Threat Recognition in X-ray Security Inspection using Transformers.