10862nam 22004813 450 991087898840332120240804090256.0981-9732-89-1(MiAaPQ)EBC31579322(Au-PeEL)EBL31579322(CKB)33601156200041(EXLCZ)993360115620004120240804d2024 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierProceedings of Ninth International Congress on Information and Communication Technology ICICT 2024, London, Volume 51st ed.Singapore :Springer,2024.©2024.1 online resource (670 pages)Lecture Notes in Networks and Systems Series ;v.1000981-9732-88-3 Intro -- Preface -- Contents -- Editors and Contributors -- A New Wavelet Visual Weighting Model to Optimize Image Coding and Quality Evaluation Based on the Human Psychovisual Quality Properties -- 1 Introduction -- 2 Wavelet Visually Based Image Quality Coding -- 3 Wavelet Visual-Based Image Quality -- 4 Results and Discussion -- 5 Conclusion and Perspectives -- References -- Optimizing the IoT PAYLOAD Encryption Watermarking-Oriented Applying Computational Intelligence and Visual Quality Coding to Improve the Vehicular Speed Controller Platform's Features -- 1 Introduction -- 2 Road Safety Platform Architecture -- 3 AI Vehicle Recognition and Image Watermarking Integration -- 4 Results and Discussion -- 5 Conclusion -- References -- Influence of Ethical Behavior on Job Satisfaction of Members of Information System Project Team -- 1 Introduction -- 2 Theoretical Background -- 2.1 Job Satisfaction -- 2.2 Ethical Culture -- 2.3 Ethical Climate -- 2.4 Ethical Leadership -- 3 Research Design and Methodology -- 4 Data Analysis -- 4.1 Validity and Reliability -- 4.2 Significance of Structural Model -- 4.3 Hypothesis Testing -- 5 Discussion of Results -- 6 Conclusion -- References -- To Be or Not To Be-After AI Revolution -- 1 Introduction -- 2 AI Tools-Student Survey 2023 May -- 2.1 Survey Environments -- 2.2 Awareness, Liking, Confidence, and Frequency of Usage -- 2.3 Future Career, Professional Usage -- 2.4 Cheating -- 3 Summary -- References -- Use of Analytical Methods in Variant Forecasting Tasks -- 1 Introduction -- 2 Materials and Method -- 3 Results -- 4 Conclusion -- References -- Toward a Classification of Factors Influencing eWOM in Online Shopping Through a Systematic Literature Review -- 1 Introduction -- 2 Electronic Word-of-Mouth (eWOM) -- 3 Methodology and Results -- 4 Conclusion, Limits, and Implications -- References.Away from Theory: A Cloud Storage Application with Public Key Searchable Encryption Feature -- 1 Introduction -- 1.1 Contribution -- 1.2 Organization -- 2 Application Overview -- 2.1 Comprehensive Feature Set -- 2.2 Submodule Interplay -- 3 Auth Submodule -- 4 FileManager Submodule -- 5 SearchableEncryption Submodule -- 6 Interaction Among Submodules -- 7 Conclusion -- References -- Developing a Serious Game for Acute Pain Detection by Utilizing Virtual Reality and Brain-Computer Interfaces -- 1 Introduction -- 2 Background -- 2.1 Brain-Computer Interfaces -- 2.2 Serious Games -- 2.3 Fourier Analysis -- 2.4 Pain -- 3 Methodology -- 3.1 Pain Detection -- 4 Results and Discussion -- 4.1 Results from Pain Detection CNN -- 5 Further Research -- 6 Conclusion -- References -- Hidden Knowledge Extraction for Association Rule Mining Technique Based on the Apriori and Frequent Pattern Growth Algorithms: A Case Study -- 1 General Introduction -- 2 Problem Statement Formulation -- 2.1 Problem Associated with Apriori Algorithm -- 2.2 Proposed Solution of the Problem -- 3 Related Works -- 3.1 Apriori Algorithm Related Work -- 3.2 Frequent Pattern Growth Related Work -- 4 Research Methodology -- 4.1 Data Description -- 4.2 Frequent Pattern Growth Algorithm -- 4.3 Apriori Algorithm Pseudo-Code -- 4.4 Performance Metrics Used for the Analysis of the Rules -- 5 Implementation of the Algorithms -- 5.1 Useful Data Structure Identification -- 5.2 Analysis of the Memory Requirements of the Algorithms -- 6 Experimental Results and Discussion -- 7 Conclusions -- References -- Integration of Distributed Intrusion Detection Systems in IoT Infrastructure -- 1 Introduction -- 2 Machine Learning Background -- 3 Related Works -- 4 Methodology -- 4.1 Proposed Security Framework for the Intrusion Detection in the IoT Infrastructure.4.2 Proposed Deployment Model-Based Distributed Intrusion Detection System (DIDS) -- 5 Experimental Setup -- 5.1 Performance Analysis Measures -- 5.2 Evaluation -- 6 Conclusion and Future Work Avenue -- References -- Predictive Analysis Model to Improve the Control of Eating Disorders in Adolescents in Metropolitan Lima Based on Machine Learning -- 1 Introduction -- 1.1 Importance of the Problem -- 2 Contribution -- 2.1 Related Works -- 3 Predictive Analysis Model of Eating Disorders in Adolescents -- 4 Method -- 4.1 Participants -- 4.2 Procedure -- 4.3 Predictive Model -- 4.4 Architecture -- 4.5 Main Contribution -- 5 Experimentation -- 6 Results -- 7 Validation -- 8 Discussion -- 9 Conclusion -- References -- A Predictive Model to Support Decision-Making for the Accreditation of Learning Programs Using Data Mining and Machine Learning -- 1 Introduction -- 2 Literature Review -- 2.1 Accreditation Process with ABET -- 2.2 Big Data in University Teaching -- 2.3 A Framework for Automation to Evaluate Academic Accreditation Requirements in Saudi Arabian Universities -- 2.4 An Integrated Perspective on Data Analytics in Higher Education -- 2.5 An Updated Survey on Learning Analytics and Educational Data Mining -- 3 Methodology -- 3.1 Data Preprocess -- 3.2 Methods -- 3.3 Web Design and Implementation -- 3.4 Interpretation/Application -- 4 Results -- 4.1 Model Evaluation -- 4.2 Confusion Matrix -- 4.3 ROC Curve -- 4.4 Web Implementation Results -- 5 Discussion and Conclusion -- References -- Design of a Blockchain-Based Organ Donation and Transplantation Management Framework -- 1 Introduction -- 2 Overview of Blockchain Technology -- 3 Organ Donation and Transplantation Management Framework -- 4 System Requirements -- 5 Conclusions -- References -- Audio Style Transfer Using a Modified Lightweight TimbreTron Pipeline -- 1 Introduction -- 2 Methodology.2.1 Data Selection -- 2.2 Data Cleaning and Feature Engineering -- 2.3 Our Proposed Pipeline -- 2.4 Architecture -- 3 Discussion and Results -- 3.1 Validation Methodology -- 3.2 Results -- 4 Future Work and Conclusion -- 4.1 Future Work -- 5 Conclusion -- References -- Deep Dive into Invoice Intelligence: A Benchmark Study of Leading Models for Automated Invoice Data Extraction -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Acquisition -- 3.2 Model Training -- 3.3 Models Overview -- 3.4 Experiments -- 4 Results -- 4.1 Overall Performance Analysis -- 4.2 Performance on Key Fields -- 4.3 Resource Consumption Results -- 5 Conclusion -- 6 Future Work -- References -- Combined ECG Analysis Approach Based on Detection of Deviation from the Personal or Population Norm Using Wearable Devices -- 1 Introduction -- 1.1 Background -- 1.2 Problem Statement -- 1.3 Objectives -- 2 Literature Review -- 2.1 AI Analysis of ECG to Detect Deviation from the Population Norm -- 2.2 Real-Time ECG Monitoring via Wearable Technology -- 2.3 Multi-step or Combined Analysis for ECG Data Interpretation -- 2.4 Individual Model Training Coupled with Wearable Technology -- 3 Methodology -- 3.1 Personal ECG Norm Model Generation Process -- 3.2 Concept Architecture -- 4 Expected Results and Requirements -- 4.1 Expected Results -- 4.2 Requirements -- 5 Challenges and Solutions -- 5.1 Challenges -- 5.2 Solutions -- 6 Conclusion and Future Directions -- References -- Atenea Lab: A Softwarized IoT Laboratory for Research and Knowledge Transfer -- 1 Introduction -- 1.1 Motivation -- 1.2 Proposal and Key Points -- 1.3 Contribution -- 2 State of the Art -- 3 Our Proposal: Atenea Lab -- 3.1 Architecture -- 3.2 User Operation -- 4 Atenea Lab in Practice -- 4.1 Test and Limitations -- 4.2 An Agrifood Prototype -- 5 Conclusions and Future Work -- References.Exploring the Antecedents of Purchase Intention for Organic and Healthy Foods: A Systematic Literature Review -- 1 Introduction -- 2 Purchase Intention -- 3 Organic Food -- 4 Healthy Food -- 4.1 Healthy/Unhealthy Eating Definition -- 4.2 Mind/Body Healthy Eating Definition -- 4.3 Healthy Eating Guidelines -- 5 Methodology and Results -- 5.1 Step 1-Preparation of the Research Question -- 5.2 Step 2-Search for Studies and Works Related to the Research Question -- 5.3 Step 3-Selection and Evaluation of Studies -- 5.4 Step 4-Analysis and Synthesis -- 5.5 Step 5-Results and Reporting -- 6 Conclusion and Limits -- References -- Communicating Universe -- 1 Introduction -- 2 Quantifying Shannon Information -- 3 Probabilities and Odds -- 4 Communicating Physics -- 5 One Picture of Micro- and Macro-world -- 6 Conclusion -- References -- An Overview on Diagnosis of Endometriosis Disease Based on Machine Learning Methods -- 1 Introduction -- 2 Endometriosis and Medical Imaging -- 3 Constructing an Informative Training Dataset -- 4 Feature Extraction and Selection -- 5 Machine Learning Algorithms for Endometriosis Analysis -- 6 Model Training, Validation, and Evaluation -- 7 Clinical Integration and Real-World Impact -- 8 Future Directions and Challenges -- 9 Conclusion -- References -- Blockchain-Integrated Chatbot -- 1 Introduction -- 2 Chatbots in Customer Service-Advantages and Drawbacks -- 2.1 Food Delivery Chatbot -- 2.2 Building Our Food Delivery Chatbot -- 3 Integration of Blockchain Technology in Chatbot -- 3.1 Theoretical Framework of a Blockchain-Integrated Chatbot -- 4 Discussion-Advantages and Disadvantages of a Blockchain-Integrated Chatbot -- 5 Conclusion -- References -- Switching from DOORS to DOORS Next Generation. Identifying the Main Usability Issues. A Case Study -- 1 Introduction -- 2 Theoretical Background.2.1 Requirements Engineering Process.Lecture Notes in Networks and Systems SeriesYang Xin-She781375Sherratt Simon1751095Dey Nilanjan846728Joshi Amit1265590MiAaPQMiAaPQMiAaPQBOOK9910878988403321Proceedings of Ninth International Congress on Information and Communication Technology4185934UNINA