Proceedings of Ninth International Congress on Information and Communication Technology ICICT 2024, London, Volume 1
This open access book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19–22, 2024. It discusses emerging topics pertaining to information and communication technology (ICT) for manage...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Singapore
Springer Nature
2024
Springer |
| Edition: | 1 |
| Series: | Lecture Notes in Networks and Systems |
| Subjects: | |
| ISBN: | 9789819745814, 9819745810, 9789819745807, 9819745802 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | This open access book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19–22, 2024. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT), and e-mining. Written by respected experts and researchers working on ICT, the book offers an asset for young researchers involved in advanced studies. The work is presented in ten volumes. |
|---|---|
| AbstractList | This open access book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19–22, 2024. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT), and e-mining. Written by respected experts and researchers working on ICT, the book offers an asset for young researchers involved in advanced studies. The work is presented in ten volumes. |
| Author | Yang, Xin-She Sherratt, Simon Joshi, Amit Dey, Nilanjan |
| Author_xml | – sequence: 1 fullname: Yang, Xin-She – sequence: 2 fullname: Sherratt, Simon – sequence: 3 fullname: Dey, Nilanjan – sequence: 4 fullname: Joshi, Amit |
| BookMark | eNpdjTtPwzAUhY14CFr6A5AYMrIE_HY8MEBUoFIFDBWMlp3YaSC1i5MO_fe4lAExnXvPd869I3Dkg7cAXCB4jSAUN1IUuSxQLkVOWVJ6ACbJS5YUO4Me_ttPwAhRRnCRdnoKJn3_ASEkmHLGxBl4f42hsrZufdNnwWXPrR-W2cwPNno9tMHrLiuDb6LtE_eJuBBXPyTTvk5stdr4tto7C1stfehCsz0Hx053vZ386hi8PUwX5VM-f3mclXfzXGNCMc25wAWHrIJSaopMVRviuLS1JhSKumLEOO2o0cgizV3BRe0QxM4UmtvKGEnG4Gp_eB3D18b2g7ImhM_K-iHqTk3vS4I4I4TgFL3dR4NeW6_WsV3puFVBt6prTdzPOxJiozBUDEKFMGdCSYIFTf3Lv_066N2nXiFKhWDkG3bUfBI |
| ContentType | eBook |
| DBID | V1H A7I |
| DOI | 10.1007/978-981-97-4581-4 |
| DatabaseName | DOAB: Directory of Open Access Books OAPEN |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: V1H name: DOAB: Directory of Open Access Books url: https://directory.doabooks.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISBN | 9789819745814 9819745810 |
| Edition | 1 |
| Editor | Yang, Xin-She Sherratt, Simon Joshi, Amit Dey, Nilanjan |
| Editor_xml | – sequence: 1 fullname: Yang, Xin-She – sequence: 2 fullname: Sherratt, Simon – sequence: 3 fullname: Dey, Nilanjan – sequence: 4 fullname: Joshi, Amit |
| ExternalDocumentID | EBC31653332 oai_library_oapen_org_20_500_12657_93274 144775 |
| GroupedDBID | A7I AABBV AAHEH AAKKN AALJR AAQKC ABEEZ ABHYI ABLGM ADZDO AEKFX AFHEQ AGWHU AIQUZ ALMA_UNASSIGNED_HOLDINGS ALNDD AMYHB BBABE CZZ EIXGO IEZ SBO TPJZQ V1H Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 |
| ID | FETCH-LOGICAL-a23424-6728605c099a41bcdb3f69eda3407dc53bfaf4ba1e1a6f867df102fb8a6ecbb93 |
| IEDL.DBID | V1H |
| ISBN | 9789819745814 9819745810 9789819745807 9819745802 |
| IngestDate | Wed Aug 20 03:09:45 EDT 2025 Wed Dec 10 14:54:14 EST 2025 Tue Oct 07 23:56:17 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum_Ident | TK5101-5105.9 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a23424-6728605c099a41bcdb3f69eda3407dc53bfaf4ba1e1a6f867df102fb8a6ecbb93 |
| OCLC | 1453289744 |
| OpenAccessLink | https://directory.doabooks.org/handle/20.500.12854/144775 |
| PQID | EBC31653332 |
| PageCount | 352 |
| ParticipantIDs | proquest_ebookcentral_EBC31653332 oapen_primary_oai_library_oapen_org_20_500_12657_93274 oapen_doabooks_144775 |
| PublicationCentury | 2000 |
| PublicationDate | 2024 |
| PublicationDateYYYYMMDD | 2024-01-01 |
| PublicationDate_xml | – year: 2024 text: 2024 |
| PublicationDecade | 2020 |
| PublicationPlace | Singapore |
| PublicationPlace_xml | – name: Singapore |
| PublicationSeriesTitle | Lecture Notes in Networks and Systems |
| PublicationYear | 2024 |
| Publisher | Springer Nature Springer |
| Publisher_xml | – name: Springer Nature – name: Springer |
| SSID | ssj0003246557 |
| Score | 2.3832562 |
| Snippet | This open access book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology,... |
| SourceID | proquest oapen |
| SourceType | Publisher |
| SubjectTerms | Artificial intelligence Big Data and Data Mining Cloud Communications and Networks Communications engineering / telecommunications Computer networking and communications Computer science Computing and Information Technology Electronics and communications engineering Human Computer Interaction ICICT 2024 Proceedings Information and Communication Technology Internet of Things Sensor Networks and Embedded Systems Society and culture: general Society and Social Sciences Technology, Engineering, Agriculture, Industrial processes Wireless Communications |
| Subtitle | ICICT 2024, London, Volume 1 |
| TableOfContents | Intro -- Preface -- Contents -- Editors and Contributors -- Perceptions and Experiences of Severe Content in Content Moderation Teams: A Qualitative Study -- 1 Introduction -- 2 Methods -- 2.1 Study Design -- 2.2 Participants -- 2.3 Inclusion Criteria -- 2.4 Procedure and Ethical Approval -- 2.5 Materials -- 2.6 Analysis -- 3 Results -- 3.1 Theme 1: Perceived Content Categories -- 3.2 Theme 2-Content Impact on Perceived Stress -- 4 Discussion -- References -- Unveiling the Television News Puzzle: Tracking TV News Consumption Behaviors Amidst and Beyond the Covid-19 Pandemic -- 1 Introduction -- 2 Literature Review -- 2.1 TV Viewing and Consumption Pattern -- 2.2 TV News During and After Pandemic -- 3 Theoretical Framework -- 3.1 Uses and Gratification Theory -- 4 Methodology -- 5 Result -- 6 Conclusion and Discussion -- References -- Behaviors and Patterns of TV News Viewing in Malaysia During and After Covid-19 Pandemic -- 1 Introduction -- 2 Literature Review -- 2.1 Impact of the Covid-19 Pandemic Toward Malaysians TV Viewing Behaviors and Patterns -- 2.2 The Roles of TV to Malaysians During the Covid-19 Pandemic -- 2.3 Factors to the Changes in Malaysian TV News Viewership During the Pandemic -- 2.4 Fear Appeal Theory in TV News Viewership -- 3 Methods -- 4 Results -- 5 Conclusion -- References -- Comparative Evaluation of Anomaly Detection Methods for Fraud Detection in Online Credit Card Payments -- 1 Introduction -- 2 Related Works -- 3 Experiments and Datasets -- 3.1 Dataset -- 3.2 Experimental Settings -- 4 Results -- 4.1 Models Hyperparameters -- 4.2 Fraud Detection Performances -- 5 Discussion -- 5.1 Distribution Shift -- 5.2 Anomaly Detection Methods for Ensembling -- 6 Conclusion -- References -- Exploratory Customer Discovery Through Simulation Using ChatGPT and Prompt Engineering -- 1 Introduction -- 1.1 Context 1.2 Objectives and Research Questions -- 2 Review of Related Work -- 3 Method -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Ethical Education Data Mining Framework for Analyzing and Evaluating Large Language Model-Based Conversational Intelligent Tutoring Systems for Management and Entrepreneurship Courses -- 1 Introduction -- 1.1 Objective and Research Questions -- 2 Review of Related Literature -- 3 Methodology -- 4 Discussion -- 5 Conclusion -- References -- Sensing the Emergence of New Structure in Matter and Life and Its Impact on Physics, Chemistry, and Biology, in a Light-Based Quantum Computational Model -- 1 Introduction -- 2 The Fourfold Quantum-Computational Model of Light -- 3 The Fifth Construct in a Quantum-Computational Model of Light -- 4 Sensing the Fivefold Electromagnetic Spectrum -- 5 Sensing the Fivefold Structure of Quantum Particles -- 6 Sensing the Fivefold Structure of the Periodic Table -- 7 Sensing the Fivefold Structure of Molecular Plans in Cells -- 8 Summary and Conclusion -- References -- VOTUM: Secure and Transparent E-Voting System -- 1 Introduction -- 2 Related Works -- 3 Main Contribution -- 3.1 Method -- 4 Experiments -- 4.1 Experiments Protocol -- 4.2 Results -- 4.3 Discussion -- 5 Conclusions and Perspectives -- References -- Simulation and Fault Diagnostics Using I-V and P-V Curve Tracing -- 1 Introduction -- 2 Types of Faults in the PV Array -- 3 Photovoltaic I-V Curve Analysis -- 4 Simulation Models -- 4.1 Case Study One-Partial Shading -- 4.2 Case Study Two-Module Mismatch -- 4.3 Case Study Three-Short-Circuit Fault -- 5 Conclusion -- References -- Comparing Adopter, Tester, and Non-adopter of Collaborative Augmented Reality for Industrial Services -- 1 Introduction -- 2 Theoretical Background -- 2.1 Collaborative Augmented Reality -- 2.2 Related Work -- 3 Methodology 4.2 Questions B: User Experience, App Visibility and Identification -- 4.3 Questions C: Splash Screen Experience -- 4.4 Questions D: Text Selection and Its Utility -- 4.5 Questions E: Screen Zoom User Experience -- 4.6 Questions F: Screen Edge and Corners Experience -- 4.7 Questions G: Offline Usability -- 4.8 Question H: Status Bar Readability -- 4.9 Question I: Navigation -- 4.10 Questions J: OS Light and Dark Mode -- 4.11 Questions K: Design Elements Touch Feedback -- 4.12 Questions L: Horizontal Mode -- 4.13 Questions M: OS Default Language -- 4.14 Questions N: App Notification -- 5 Conclusions -- References -- An Automated and Goal-Oriented Clustering Procedure -- 1 Introduction -- 2 Automated Clustering Procedure -- 2.1 Clustering Methods and Hyperparameters -- 2.2 Clustering Performance Metrics -- 2.3 Automated Clustering Algorithm -- 2.4 Implementation -- 3 Empirical Study -- 3.1 Data Sources -- 3.2 Experimental Procedure -- 3.3 Use Case: The Hepatitis C Dataset -- 4 Results -- 4.1 The Comparison to K-Means -- 5 Conclusions and Discussion -- References -- Proposal for a New Separation Method for Reproducing Images with Properties in the Visible and Near-Infrared Spectrum -- 1 Introduction -- 2 Artistic Dyes Under Light Blockades -- 3 Artwork Duality in VIS/NIR-Z Spectra -- 4 CMYK Reproduction and Reproduction in Art Monographs -- 5 Conclusion -- References -- Epidemic Information Extraction for Event-Based Surveillance Using Large Language Models -- 1 Introduction and Background -- 2 Data -- 2.1 ProMED -- 2.2 WHO Disease Outbreaks News -- 3 Methods -- 3.1 EpiTator -- 3.2 Pythia-12b -- 3.3 Mpt-30b-chat -- 3.4 Llama-2-70b-chat -- 3.5 Mistral-7b-openorca -- 3.6 Zephyr-7b-alpha -- 3.7 Gpt-4-32k -- 3.8 Gpt-4-FewShots -- 3.9 Open-Ensemble -- 4 Computational Experiments -- 5 Conclusions -- References 3.1 Sampling and Data Collection -- 3.2 Missing Data Analysis and Data Imputation -- 3.3 Sample Profile -- 4 Results -- 4.1 Benefits and Opportunities -- 4.2 Challenges and Barriers -- 5 Discussion -- 6 Conclusion -- Appendix 1 -- Appendix 2 -- References -- Cyber Victimization: Tools Used to Combat Cybercrime and Victim Characteristics -- 1 Introduction -- 2 Background -- 2.1 Types of Cybercrimes -- 2.2 Impact of Cybercrime on End Users -- 2.3 End-User Personality Impact on Cybercrime Victimization -- 2.4 Cybersecurity Tool Use and Non-Use -- 2.5 Problem -- 3 Methods -- 3.1 Compensation -- 3.2 Quality Control -- 3.3 Demographics -- 3.4 Materials -- 4 Results and Analysis -- 4.1 Cyber Victimization and Cybersecurity Tools -- 4.2 Demographics and Cybersecurity Tools -- 5 Discussion -- 5.1 Limitations -- 6 Conclusion -- 6.1 Future Research -- References -- Binary Segmentation of Malaria Parasites Using U-Net Segmentation Approach: A Case of Rwanda -- 1 Introduction -- 2 The Detection Method -- 2.1 Datasets, Annotation, and Preprocessing -- 2.2 U-Net Architecture -- 2.3 Training -- 3 Results and Discussion -- 4 Limitations and Recommendations -- 5 Conclusion -- References -- PLC-Based Traffic Light Control for Flexible Testing of Automated Mobility -- 1 Introduction -- 2 System Architecture -- 3 Evaluation and Testing -- 3.1 Network Wide Testing -- 3.2 Processor Load Testing -- 4 Conclusion -- References -- User Perceptions of Progressive Web App Features: An Analytical Approach and a Systematic Literature Review -- 1 Introduction -- 2 Systematic Literature Review -- 2.1 Conducting the SRL -- 2.2 Study Selection Criteria -- 2.3 Final Considerations of the Review -- 3 PWA Development Features -- 3.1 Usability Evaluation -- 4 Results Obtained -- 4.1 Questions A: PWA Installation and Initialisation Effects of Inductive Load on Photovoltaic Systems -- 1 Introduction -- 2 Method -- 2.1 Sizing of the PV Array -- 2.2 Modelling of the Inverter System -- 2.3 Modelling of the Asynchronous Machine -- 2.4 PV System Interfaced with Asynchronous Machine -- 3 Outcome of Simulation Results -- 3.1 Asynchronous Machine Interfaced with PV System -- 4 Conclusion -- References -- Low Code Development Cycle Investigation -- 1 Introduction -- 2 Theoretical Background of Low Code Development -- 3 Low Code Development Life Cycle Model -- 4 Conclusions -- References -- TermX-Bridging the Gap: Implementing CTS2 and FHIR Compatible Terminology Server -- 1 Introduction -- 1.1 Rationale for CTS2 Implementation -- 1.2 PostgreSQL as the Database Management Platform -- 1.3 TermX -- 1.4 FHIR Terminology Module -- 1.5 Building Blocks of the Terminology Module -- 2 Methodology -- 3 Results -- 3.1 CTS2 Conceptual Model -- 3.2 FHIR Terminology Conceptual Model -- 3.3 The Comparison of CTS2 and FHIR Conceptual Models -- 3.4 Database Design -- 3.5 CTS2 Data Model to FHIR Terminology Resources -- 4 Discussion -- 5 Conclusion -- References -- An Improved Technique for Generating Effective Noises of Adversarial Camera Stickers -- 1 Introduction -- 1.1 Contribution -- 1.2 Organization of the Paper -- 2 Adversarial Attacks -- 2.1 Explanations of Adversarial Attacks -- 2.2 Related Research 1: Digital World Attacks -- 2.3 Related Research 2: Physical World Attacks -- 3 Our Proposed Method -- 3.1 Drawback of Previous Work -- 3.2 Details of Our Proposed Method -- 4 Evaluation Results and Discussion -- 4.1 Experimental Setup -- 4.2 Experimental Flow -- 4.3 Results -- 4.4 Discussion -- 5 Conclusion -- References -- Artificial Intelligence in Breast Cancer Diagnosis: "Synergy-Net" in Campania FESR-POR (European Fund of Regional Development-Regional Operative Program) Research Project 1 Introduction |
| Title | Proceedings of Ninth International Congress on Information and Communication Technology |
| URI | https://directory.doabooks.org/handle/20.500.12854/144775 https://library.oapen.org/handle/20.500.12657/93274 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=31653332 |
| Volume | 1011 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED4BZYClPEV5VEZiDdSOH8lKRVUkVHVAwGbZji1YEkQLv59zkpZWiIklkXND7HNif3e2vw_gitrIsJKyxGBAm_CCqcTKwiXBKC98joA31D39oCaT7OUln65IfTUDeRV3NVcm4sxZvZzfUA5gpH4tBpERIRP8BkMBpcQmdDDEkVG14YmOl-kVxAlSCNVQ7OQ47SkusFbr5Vr0aWlkKwW6XAFtSWjRkOSRIRzvPIojmXdf_hq_60lp1P1Hc_ag4-Mph33Y8OUBdBfaDqT91Q9gd4Wo8BCep8t5bkaqQCZv5fyVrGUTybAq69idVCVpDzlFC8FKkLVjKOQnnX8ET6O7x-E4aSUZEsNSzngiFcswAnIILA2n1hU2DTL3hUkxMiycSG0wgVtDPTUyZFIVASFMsJmR3lmbp8ewVValPwEipeU8Sl_zzHHn8FpQNQiZ8DRIakMPjmov64XrdOOiHsjm-XvDx6EjQ3ab89KNBX2s2UCjczVlUiiNKFXxHlwuukvXS9Ht_ld9dztMqUTgm7LTP156BjsM4UyTfDmHrfnHp7-Abfc1f5t99BGRq_t-_QV-A5Hf1TI |
| linkProvider | Open Access Publishing in European Networks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Proceedings+of+Ninth+International+Congress+on+Information+and+Communication+Technology&rft.series=Lecture+Notes+in+Networks+and+Systems&rft.date=2024-01-01&rft.pub=Springer+Nature&rft.isbn=9789819745814&rft_id=info:doi/10.1007%2F978-981-97-4581-4&rft.externalDBID=V1H&rft.externalDocID=144775 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9789819745814/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9789819745814/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9789819745814/sc.gif&client=summon&freeimage=true |

