LEADER 05609nam 22004333 450 001 9910799221003321 005 20240105080300.0 010 $a3-031-47727-8 035 $a(MiAaPQ)EBC31051706 035 $a(Au-PeEL)EBL31051706 035 $a(EXLCZ)9929510374400041 100 $a20240105d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Problems Solved by Information Technology and Software 205 $a1st ed. 210 1$aCham :$cSpringer International Publishing AG,$d2024. 210 4$d©2024. 215 $a1 online resource (131 pages) 225 1 $aSpringerBriefs in Applied Sciences and Technology Series 311 08$aPrint version: Ismail, Azman Applied Problems Solved by Information Technology and Software Cham : Springer International Publishing AG,c2024 9783031477263 327 $aIntro -- Preface -- Contents -- Development of a Motion Activated Security Cam for Monitoring Applications -- 1 Introduction -- 2 Methodology -- 2.1 Project Development -- 2.2 Hardware Component -- 2.3 Software Development -- 3 Results and Discussion -- 4 Conclusion -- References -- Development of a Sign Language Translator Based on Gestures-To-Words Using IoT -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Development -- 3.2 Hardware Installation -- 4 Results and Discussion -- 5 Conclusion -- References -- Energy Management System for ICU Wards -- 1 Introduction -- 2 Materials and Methods -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Two Factor Authentication: Voice Biometric and Token-Based Authentication -- 1 Introduction -- 1.1 Issues with Single-Scheme Password Authentication -- 1.2 Two Factor Authentication -- 1.3 Federated Authentication -- 1.4 OpenID Connect (OIDC) -- 1.5 Biometric Authentication -- 1.6 Voice Biometric Authentication -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- Development of a Forest Fire Prevention System Using Fuzzy Logic Control -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- Smart Glove: The Sign Language Translator for Mute-Deaf Citizens -- 1 Introduction -- 2 Materials and Method -- 2.1 The Smart Glove Module -- 2.2 The Mobile Application Modules -- 3 Results and Discussion -- 4 Conclusion -- References -- The Application of Technology Organization Environment Framework in the Approaches for Smart Warehouse Adoption -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- Promoting and Preserving Malaysian Folktales Through Augmented Reality Technology -- 1 Introduction -- 2 Medium for Promoting Folktales and Preservation Method -- 3 Methodology. 327 $a4 Results and Discussion -- 5 Future Works and Recommendations -- References -- The Development of a Self-Balancing Robot Based on Complementary Filter and Arduino -- 1 Introduction -- 2 Experimental Investigations -- 3 Results and Discussion -- 4 Conclusion -- References -- Development of Vertical Indoor Farming Using an Arduino and IoT -- 1 Introduction -- 2 Methodology -- 3 Result and Discussion -- 4 Conclusion and Recommendations -- References -- Designing an Augmented Reality Application as a Tool for Entomophobia Treatment -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 Results and Discussion -- 4.1 User Interface -- 4.2 User Experience -- 4.3 The Effectiveness of Insecto-Aid -- 5 Conclusion -- References -- The Readiness of Logistics Service Providers to Meet the Rapidly Growing Digital Economy in Malaysia -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- Review of the Use of Digital Media Products by Small and Medium Enterprises in Malaysia During the Covid-19 Pandemic Crisis -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- The Influence of Information Communication Technology Towards the Success of Ro-Ro Ferry Service at Penang Port -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion -- 5 Discussion -- 6 Conclusion -- References -- Pass Matrix Based Graphical Password Authentication on the Android Platform -- 1 Introduction -- 2 Problem Definition -- 3 Related Work -- 3.1 Recognition Based Technique -- 3.2 One-Time Password -- 4 Motivation -- 4.1 Graphical Password Authentication -- 4.2 Encrypt the One-Time-Password (EOTP) -- 5 Proposed System -- 6 Results and Discussion -- 7 Conclusion -- References. 327 $aDevelopment of a Driver Detection System for Somnolence and Alertness Based on Image Processing Techniques -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Acquisition and Experimental Setup -- 3.2 Data Validation -- 3.3 Data Editing -- 3.4 Data Transfer by Using FileZilla Client -- 3.5 Pre-Processing -- 3.6 Feature Extraction -- 3.7 Data Analysis and Classification -- 4 Results and Discussion -- 5 Conclusions -- References. 410 0$aSpringerBriefs in Applied Sciences and Technology Series 700 $aIsmail$b Azman$01312196 701 $aZulkipli$b Fatin Nur$01431779 701 $aMohd Daril$b Mohd Amran$01586063 701 $aÖchsner$b Andreas$0317948 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910799221003321 996 $aApplied Problems Solved by Information Technology and Software$93872333 997 $aUNINA