Proceedings of Ninth International Congress on Information and Communication Technology ICICT 2024, London, Volume 1

This open access book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19–22, 2024. It discusses emerging topics pertaining to information and communication technology (ICT) for manage...

Full description

Saved in:
Bibliographic Details
Main Authors: Yang, Xin-She, Sherratt, Simon, Dey, Nilanjan, Joshi, Amit
Format: eBook
Language:English
Published: Singapore Springer Nature 2024
Springer
Edition:1
Series:Lecture Notes in Networks and Systems
Subjects:
ISBN:9789819745814, 9819745810, 9789819745807, 9819745802
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract This open access book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19–22, 2024. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT), and e-mining. Written by respected experts and researchers working on ICT, the book offers an asset for young researchers involved in advanced studies. The work is presented in ten volumes.
AbstractList This open access book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19–22, 2024. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT), and e-mining. Written by respected experts and researchers working on ICT, the book offers an asset for young researchers involved in advanced studies. The work is presented in ten volumes.
Author Yang, Xin-She
Sherratt, Simon
Joshi, Amit
Dey, Nilanjan
Author_xml – sequence: 1
  fullname: Yang, Xin-She
– sequence: 2
  fullname: Sherratt, Simon
– sequence: 3
  fullname: Dey, Nilanjan
– sequence: 4
  fullname: Joshi, Amit
BookMark eNpdjTtPwzAUhY14CFr6A5AYMrIE_HY8MEBUoFIFDBWMlp3YaSC1i5MO_fe4lAExnXvPd869I3Dkg7cAXCB4jSAUN1IUuSxQLkVOWVJ6ACbJS5YUO4Me_ttPwAhRRnCRdnoKJn3_ASEkmHLGxBl4f42hsrZufdNnwWXPrR-W2cwPNno9tMHrLiuDb6LtE_eJuBBXPyTTvk5stdr4tto7C1stfehCsz0Hx053vZ386hi8PUwX5VM-f3mclXfzXGNCMc25wAWHrIJSaopMVRviuLS1JhSKumLEOO2o0cgizV3BRe0QxM4UmtvKGEnG4Gp_eB3D18b2g7ImhM_K-iHqTk3vS4I4I4TgFL3dR4NeW6_WsV3puFVBt6prTdzPOxJiozBUDEKFMGdCSYIFTf3Lv_066N2nXiFKhWDkG3bUfBI
ContentType eBook
DBID V1H
A7I
DOI 10.1007/978-981-97-4581-4
DatabaseName DOAB: Directory of Open Access Books
OAPEN
DatabaseTitleList

Database_xml – sequence: 1
  dbid: V1H
  name: DOAB: Directory of Open Access Books
  url: https://directory.doabooks.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9789819745814
9819745810
Edition 1
Editor Yang, Xin-She
Sherratt, Simon
Joshi, Amit
Dey, Nilanjan
Editor_xml – sequence: 1
  fullname: Yang, Xin-She
– sequence: 2
  fullname: Sherratt, Simon
– sequence: 3
  fullname: Dey, Nilanjan
– sequence: 4
  fullname: Joshi, Amit
ExternalDocumentID EBC31653332
oai_library_oapen_org_20_500_12657_93274
144775
GroupedDBID A7I
AABBV
AAHEH
AAKKN
AALJR
AAQKC
ABEEZ
ABHYI
ABLGM
ADZDO
AEKFX
AFHEQ
AGWHU
AIQUZ
ALMA_UNASSIGNED_HOLDINGS
ALNDD
AMYHB
BBABE
CZZ
EIXGO
IEZ
SBO
TPJZQ
V1H
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
ID FETCH-LOGICAL-a23424-6728605c099a41bcdb3f69eda3407dc53bfaf4ba1e1a6f867df102fb8a6ecbb93
IEDL.DBID V1H
ISBN 9789819745814
9819745810
9789819745807
9819745802
IngestDate Wed Aug 20 03:09:45 EDT 2025
Wed Dec 10 14:54:14 EST 2025
Tue Oct 07 23:56:17 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident TK5101-5105.9
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a23424-6728605c099a41bcdb3f69eda3407dc53bfaf4ba1e1a6f867df102fb8a6ecbb93
OCLC 1453289744
OpenAccessLink https://directory.doabooks.org/handle/20.500.12854/144775
PQID EBC31653332
PageCount 352
ParticipantIDs proquest_ebookcentral_EBC31653332
oapen_primary_oai_library_oapen_org_20_500_12657_93274
oapen_doabooks_144775
PublicationCentury 2000
PublicationDate 2024
PublicationDateYYYYMMDD 2024-01-01
PublicationDate_xml – year: 2024
  text: 2024
PublicationDecade 2020
PublicationPlace Singapore
PublicationPlace_xml – name: Singapore
PublicationSeriesTitle Lecture Notes in Networks and Systems
PublicationYear 2024
Publisher Springer Nature
Springer
Publisher_xml – name: Springer Nature
– name: Springer
SSID ssj0003246557
Score 2.3832562
Snippet This open access book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology,...
SourceID proquest
oapen
SourceType Publisher
SubjectTerms Artificial intelligence
Big Data and Data Mining
Cloud Communications and Networks
Communications engineering / telecommunications
Computer networking and communications
Computer science
Computing and Information Technology
Electronics and communications engineering
Human Computer Interaction
ICICT 2024 Proceedings
Information and Communication Technology
Internet of Things
Sensor Networks and Embedded Systems
Society and culture: general
Society and Social Sciences
Technology, Engineering, Agriculture, Industrial processes
Wireless Communications
Subtitle ICICT 2024, London, Volume 1
TableOfContents Intro -- Preface -- Contents -- Editors and Contributors -- Perceptions and Experiences of Severe Content in Content Moderation Teams: A Qualitative Study -- 1 Introduction -- 2 Methods -- 2.1 Study Design -- 2.2 Participants -- 2.3 Inclusion Criteria -- 2.4 Procedure and Ethical Approval -- 2.5 Materials -- 2.6 Analysis -- 3 Results -- 3.1 Theme 1: Perceived Content Categories -- 3.2 Theme 2-Content Impact on Perceived Stress -- 4 Discussion -- References -- Unveiling the Television News Puzzle: Tracking TV News Consumption Behaviors Amidst and Beyond the Covid-19 Pandemic -- 1 Introduction -- 2 Literature Review -- 2.1 TV Viewing and Consumption Pattern -- 2.2 TV News During and After Pandemic -- 3 Theoretical Framework -- 3.1 Uses and Gratification Theory -- 4 Methodology -- 5 Result -- 6 Conclusion and Discussion -- References -- Behaviors and Patterns of TV News Viewing in Malaysia During and After Covid-19 Pandemic -- 1 Introduction -- 2 Literature Review -- 2.1 Impact of the Covid-19 Pandemic Toward Malaysians TV Viewing Behaviors and Patterns -- 2.2 The Roles of TV to Malaysians During the Covid-19 Pandemic -- 2.3 Factors to the Changes in Malaysian TV News Viewership During the Pandemic -- 2.4 Fear Appeal Theory in TV News Viewership -- 3 Methods -- 4 Results -- 5 Conclusion -- References -- Comparative Evaluation of Anomaly Detection Methods for Fraud Detection in Online Credit Card Payments -- 1 Introduction -- 2 Related Works -- 3 Experiments and Datasets -- 3.1 Dataset -- 3.2 Experimental Settings -- 4 Results -- 4.1 Models Hyperparameters -- 4.2 Fraud Detection Performances -- 5 Discussion -- 5.1 Distribution Shift -- 5.2 Anomaly Detection Methods for Ensembling -- 6 Conclusion -- References -- Exploratory Customer Discovery Through Simulation Using ChatGPT and Prompt Engineering -- 1 Introduction -- 1.1 Context
1.2 Objectives and Research Questions -- 2 Review of Related Work -- 3 Method -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Ethical Education Data Mining Framework for Analyzing and Evaluating Large Language Model-Based Conversational Intelligent Tutoring Systems for Management and Entrepreneurship Courses -- 1 Introduction -- 1.1 Objective and Research Questions -- 2 Review of Related Literature -- 3 Methodology -- 4 Discussion -- 5 Conclusion -- References -- Sensing the Emergence of New Structure in Matter and Life and Its Impact on Physics, Chemistry, and Biology, in a Light-Based Quantum Computational Model -- 1 Introduction -- 2 The Fourfold Quantum-Computational Model of Light -- 3 The Fifth Construct in a Quantum-Computational Model of Light -- 4 Sensing the Fivefold Electromagnetic Spectrum -- 5 Sensing the Fivefold Structure of Quantum Particles -- 6 Sensing the Fivefold Structure of the Periodic Table -- 7 Sensing the Fivefold Structure of Molecular Plans in Cells -- 8 Summary and Conclusion -- References -- VOTUM: Secure and Transparent E-Voting System -- 1 Introduction -- 2 Related Works -- 3 Main Contribution -- 3.1 Method -- 4 Experiments -- 4.1 Experiments Protocol -- 4.2 Results -- 4.3 Discussion -- 5 Conclusions and Perspectives -- References -- Simulation and Fault Diagnostics Using I-V and P-V Curve Tracing -- 1 Introduction -- 2 Types of Faults in the PV Array -- 3 Photovoltaic I-V Curve Analysis -- 4 Simulation Models -- 4.1 Case Study One-Partial Shading -- 4.2 Case Study Two-Module Mismatch -- 4.3 Case Study Three-Short-Circuit Fault -- 5 Conclusion -- References -- Comparing Adopter, Tester, and Non-adopter of Collaborative Augmented Reality for Industrial Services -- 1 Introduction -- 2 Theoretical Background -- 2.1 Collaborative Augmented Reality -- 2.2 Related Work -- 3 Methodology
4.2 Questions B: User Experience, App Visibility and Identification -- 4.3 Questions C: Splash Screen Experience -- 4.4 Questions D: Text Selection and Its Utility -- 4.5 Questions E: Screen Zoom User Experience -- 4.6 Questions F: Screen Edge and Corners Experience -- 4.7 Questions G: Offline Usability -- 4.8 Question H: Status Bar Readability -- 4.9 Question I: Navigation -- 4.10 Questions J: OS Light and Dark Mode -- 4.11 Questions K: Design Elements Touch Feedback -- 4.12 Questions L: Horizontal Mode -- 4.13 Questions M: OS Default Language -- 4.14 Questions N: App Notification -- 5 Conclusions -- References -- An Automated and Goal-Oriented Clustering Procedure -- 1 Introduction -- 2 Automated Clustering Procedure -- 2.1 Clustering Methods and Hyperparameters -- 2.2 Clustering Performance Metrics -- 2.3 Automated Clustering Algorithm -- 2.4 Implementation -- 3 Empirical Study -- 3.1 Data Sources -- 3.2 Experimental Procedure -- 3.3 Use Case: The Hepatitis C Dataset -- 4 Results -- 4.1 The Comparison to K-Means -- 5 Conclusions and Discussion -- References -- Proposal for a New Separation Method for Reproducing Images with Properties in the Visible and Near-Infrared Spectrum -- 1 Introduction -- 2 Artistic Dyes Under Light Blockades -- 3 Artwork Duality in VIS/NIR-Z Spectra -- 4 CMYK Reproduction and Reproduction in Art Monographs -- 5 Conclusion -- References -- Epidemic Information Extraction for Event-Based Surveillance Using Large Language Models -- 1 Introduction and Background -- 2 Data -- 2.1 ProMED -- 2.2 WHO Disease Outbreaks News -- 3 Methods -- 3.1 EpiTator -- 3.2 Pythia-12b -- 3.3 Mpt-30b-chat -- 3.4 Llama-2-70b-chat -- 3.5 Mistral-7b-openorca -- 3.6 Zephyr-7b-alpha -- 3.7 Gpt-4-32k -- 3.8 Gpt-4-FewShots -- 3.9 Open-Ensemble -- 4 Computational Experiments -- 5 Conclusions -- References
3.1 Sampling and Data Collection -- 3.2 Missing Data Analysis and Data Imputation -- 3.3 Sample Profile -- 4 Results -- 4.1 Benefits and Opportunities -- 4.2 Challenges and Barriers -- 5 Discussion -- 6 Conclusion -- Appendix 1 -- Appendix 2 -- References -- Cyber Victimization: Tools Used to Combat Cybercrime and Victim Characteristics -- 1 Introduction -- 2 Background -- 2.1 Types of Cybercrimes -- 2.2 Impact of Cybercrime on End Users -- 2.3 End-User Personality Impact on Cybercrime Victimization -- 2.4 Cybersecurity Tool Use and Non-Use -- 2.5 Problem -- 3 Methods -- 3.1 Compensation -- 3.2 Quality Control -- 3.3 Demographics -- 3.4 Materials -- 4 Results and Analysis -- 4.1 Cyber Victimization and Cybersecurity Tools -- 4.2 Demographics and Cybersecurity Tools -- 5 Discussion -- 5.1 Limitations -- 6 Conclusion -- 6.1 Future Research -- References -- Binary Segmentation of Malaria Parasites Using U-Net Segmentation Approach: A Case of Rwanda -- 1 Introduction -- 2 The Detection Method -- 2.1 Datasets, Annotation, and Preprocessing -- 2.2 U-Net Architecture -- 2.3 Training -- 3 Results and Discussion -- 4 Limitations and Recommendations -- 5 Conclusion -- References -- PLC-Based Traffic Light Control for Flexible Testing of Automated Mobility -- 1 Introduction -- 2 System Architecture -- 3 Evaluation and Testing -- 3.1 Network Wide Testing -- 3.2 Processor Load Testing -- 4 Conclusion -- References -- User Perceptions of Progressive Web App Features: An Analytical Approach and a Systematic Literature Review -- 1 Introduction -- 2 Systematic Literature Review -- 2.1 Conducting the SRL -- 2.2 Study Selection Criteria -- 2.3 Final Considerations of the Review -- 3 PWA Development Features -- 3.1 Usability Evaluation -- 4 Results Obtained -- 4.1 Questions A: PWA Installation and Initialisation
Effects of Inductive Load on Photovoltaic Systems -- 1 Introduction -- 2 Method -- 2.1 Sizing of the PV Array -- 2.2 Modelling of the Inverter System -- 2.3 Modelling of the Asynchronous Machine -- 2.4 PV System Interfaced with Asynchronous Machine -- 3 Outcome of Simulation Results -- 3.1 Asynchronous Machine Interfaced with PV System -- 4 Conclusion -- References -- Low Code Development Cycle Investigation -- 1 Introduction -- 2 Theoretical Background of Low Code Development -- 3 Low Code Development Life Cycle Model -- 4 Conclusions -- References -- TermX-Bridging the Gap: Implementing CTS2 and FHIR Compatible Terminology Server -- 1 Introduction -- 1.1 Rationale for CTS2 Implementation -- 1.2 PostgreSQL as the Database Management Platform -- 1.3 TermX -- 1.4 FHIR Terminology Module -- 1.5 Building Blocks of the Terminology Module -- 2 Methodology -- 3 Results -- 3.1 CTS2 Conceptual Model -- 3.2 FHIR Terminology Conceptual Model -- 3.3 The Comparison of CTS2 and FHIR Conceptual Models -- 3.4 Database Design -- 3.5 CTS2 Data Model to FHIR Terminology Resources -- 4 Discussion -- 5 Conclusion -- References -- An Improved Technique for Generating Effective Noises of Adversarial Camera Stickers -- 1 Introduction -- 1.1 Contribution -- 1.2 Organization of the Paper -- 2 Adversarial Attacks -- 2.1 Explanations of Adversarial Attacks -- 2.2 Related Research 1: Digital World Attacks -- 2.3 Related Research 2: Physical World Attacks -- 3 Our Proposed Method -- 3.1 Drawback of Previous Work -- 3.2 Details of Our Proposed Method -- 4 Evaluation Results and Discussion -- 4.1 Experimental Setup -- 4.2 Experimental Flow -- 4.3 Results -- 4.4 Discussion -- 5 Conclusion -- References -- Artificial Intelligence in Breast Cancer Diagnosis: "Synergy-Net" in Campania FESR-POR (European Fund of Regional Development-Regional Operative Program) Research Project
1 Introduction
Title Proceedings of Ninth International Congress on Information and Communication Technology
URI https://directory.doabooks.org/handle/20.500.12854/144775
https://library.oapen.org/handle/20.500.12657/93274
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=31653332
Volume 1011
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED4BZYClPEV5VEZiDdSOH8lKRVUkVHVAwGbZji1YEkQLv59zkpZWiIklkXND7HNif3e2vw_gitrIsJKyxGBAm_CCqcTKwiXBKC98joA31D39oCaT7OUln65IfTUDeRV3NVcm4sxZvZzfUA5gpH4tBpERIRP8BkMBpcQmdDDEkVG14YmOl-kVxAlSCNVQ7OQ47SkusFbr5Vr0aWlkKwW6XAFtSWjRkOSRIRzvPIojmXdf_hq_60lp1P1Hc_ag4-Mph33Y8OUBdBfaDqT91Q9gd4Wo8BCep8t5bkaqQCZv5fyVrGUTybAq69idVCVpDzlFC8FKkLVjKOQnnX8ET6O7x-E4aSUZEsNSzngiFcswAnIILA2n1hU2DTL3hUkxMiycSG0wgVtDPTUyZFIVASFMsJmR3lmbp8ewVValPwEipeU8Sl_zzHHn8FpQNQiZ8DRIakMPjmov64XrdOOiHsjm-XvDx6EjQ3ab89KNBX2s2UCjczVlUiiNKFXxHlwuukvXS9Ht_ld9dztMqUTgm7LTP156BjsM4UyTfDmHrfnHp7-Abfc1f5t99BGRq_t-_QV-A5Hf1TI
linkProvider Open Access Publishing in European Networks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Proceedings+of+Ninth+International+Congress+on+Information+and+Communication+Technology&rft.series=Lecture+Notes+in+Networks+and+Systems&rft.date=2024-01-01&rft.pub=Springer+Nature&rft.isbn=9789819745814&rft_id=info:doi/10.1007%2F978-981-97-4581-4&rft.externalDBID=V1H&rft.externalDocID=144775
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9789819745814/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9789819745814/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9789819745814/sc.gif&client=summon&freeimage=true