LEADER 11071nam 22004813 450 001 9910878056603321 005 20240730080253.0 010 $a9789819735624$b(electronic bk.) 010 $z9789819735617 035 $a(MiAaPQ)EBC31569904 035 $a(Au-PeEL)EBL31569904 035 $a(CKB)33468920800041 035 $a(EXLCZ)9933468920800041 100 $a20240730d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of Ninth International Congress on Information and Communication Technology $eICICT 2024, London, Volume 4 205 $a1st ed. 210 1$aSingapore :$cSpringer,$d2024. 210 4$d©2024. 215 $a1 online resource (656 pages) 225 1 $aLecture Notes in Networks and Systems Series ;$vv.1014 311 08$aPrint version: Yang, Xin-She Proceedings of Ninth International Congress on Information and Communication Technology Singapore : Springer,c2024 9789819735617 327 $aIntro -- Preface -- Contents -- Editors and Contributors -- Impact of Institutional Support on First-Year Undergraduate Students' Cybersecurity Compliance Behaviour -- 1 Introduction -- 1.1 Research Questions -- 2 Literature Review -- 2.1 Cybersecurity Compliance (CSC) -- 3 Theoretical Foundation -- 3.1 Theory of Planned Behaviour -- 3.2 The Formation of Habits -- 3.3 Conceptual Framework and Hypotheses Generation -- 3.4 Institutional Support (IS) -- 3.5 Self-efficacy (SE) -- 3.6 Response Efficacy (RE) -- 3.7 Will -- 3.8 Cybersecurity Compliance Behaviour (CCB) -- 4 The Method -- 4.1 The Design -- 4.2 Participants -- 4.3 The Instrument -- 4.4 Data Analysis Techniques -- 5 Data Analysis and Results -- 5.1 The Measurement Model -- 5.2 Convergent Validity -- 5.3 Discriminant Validity -- 5.4 The Structural Model -- 5.5 Mediation Analysis -- 6 Discussion of Findings -- 7 Conclusion -- 8 Limitations of the Study and Prospects -- References -- CodeConnect Classroom: A Coding Education Tool Enabling Collaborative Learning, Real-Time Feedback, and Student Engagement -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 WebSocket Integration -- 3.2 Room Creation and Identification -- 3.3 Features of the Editor -- 3.4 Real-Time Interaction -- 3.5 User Guidance -- 3.6 Security Measures -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- TourMate: Enhancing Tourist Experiences Through Personalized Guidance with Weather Prediction -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Website -- 3.2 Integration of Essential API -- 3.3 Google Map Integration with Hidden Place Feature -- 4 Proposed System -- 4.1 Key Features of the TourMate System -- 5 Results and Discussion -- 6 Conclusion -- References -- The Use of Augmented Reality Tools in Marketing: Opportunities and Limitations in the Latvian Market -- 1 Introduction. 327 $a2 The Use of Augmented Reality in Latvia -- 3 What Is Preventing You Use It? -- 4 What Motivates the Use of AR? -- 5 How Virtual Reality Affects Consumers -- 6 Future Opportunities for AR -- 7 Discussion -- 8 Conclusions -- References -- CodePedia: Crafting the Ultimate Java Learning Odyssey for Novice Programmers -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Text Editor -- 3.2 Compiler -- 3.3 Error Messages with Explanation Generator -- 3.4 Visual Debugger -- 3.5 Hinting System -- 3.6 Tutorial Hub -- 3.7 Quiz Challenges -- 3.8 Real-Time Java Challenging Platform -- 3.9 Ranking System -- 4 Results and Discussion -- 5 Conclusion -- References -- Cognitive Complexity Analysis and Optimization Tool for Java -- 1 Introduction -- 2 Related Work on Calculating Cognitive Complexity -- 3 Methodology -- 3.1 Metrics Overview -- 3.2 System Overview -- 4 Conclusion -- References -- Social Entrepreneurship and Artificial Intelligence: How Entrepreneurs Shape Innovation? The Lebanese Case -- 1 Introduction -- 2 Introduction -- 2.1 Social Entrepreneurship (SE) -- 2.2 Artificial Intelligence (AI) -- 2.3 AI and Social Entrepreneurial Decision-Making -- 3 Methodology -- 3.1 The Context of the Study -- 3.2 Exploratory Study -- 4 Findings, Discussion, and Implications -- 5 Conclusion, Limitations, and Future Research -- References -- Enterprise Intelligent Management Analysis and Visualization Based on Data Mining -- 1 Introduction -- 2 The Proposed Method -- 2.1 Intelligent Financial Health Situation Analysis -- 2.2 Intelligent Investment Value Analysis -- 3 Analysis and Visualization of Enterprise Smart Management Results -- 3.1 The Analysis and Visualization of Balance Sheet -- 3.2 The Clustering Analysis and Visualization of Financial Health Situation -- 3.3 The Analysis, Prediction, and Visualization of the Stock Price -- 4 Conclusion. 327 $aReferences -- A Novel Approach to Regional E-government Measurement: The Case of Georgia -- 1 Introduction -- 2 Literature Review -- 2.1 The Concept of E-governance and the Proposed Methods of Assessment of the Level of Development of E-government -- 2.2 Research Problem -- 2.3 Proposed Index -- 3 Methodology -- 4 Model's Consequences -- 5 Conclusion -- References -- Impact of Police Communication Channels on the Police and the Suburban and Rural Community During the COVID-19 Pandemic -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 3.1 Sample -- 3.2 Instrument and Data Collection -- 4 Analytical Plan -- 5 Findings -- 6 Discussion and Conclusion -- References -- The Role of Artificial Intelligence in the Process of Improving Communication Systems of Strategic Objects -- 1 Introduction -- 2 Theoretical Framework -- 3 Main Research Questions -- 4 Research Methodology -- 5 Main Findings and Discussion -- 6 Conclusion -- References -- Secure Connections in Local Networks Despite Multiple Stakeholders -- 1 Introduction -- 2 Our Approach -- 2.1 Device Attestation -- 2.2 Runtime Authentication Using PKI -- 2.3 Multiple Stakeholders -- 2.4 Loss of a Certificate -- 2.5 Secure Reset Without Enabling DoS Attacks -- 3 PKI2go -- 4 Conclusion -- References -- Innovative Solar Battery System Integration for Eco-Friendly Electric Vehicle Charging Stations -- 1 Introduction -- 2 Materials and Method -- 2.1 Micro-grid Modeling -- 2.2 Energy Management Scenario -- 3 Results -- 3.1 Case 1: The Electric Vehicle is Connected to the System -- 3.2 Case 2: The Electric Vehicle is not Connected to the System -- 4 Conclusion -- References -- English-to-Bangla Language Translation: A Comparative Study of GPT-3 and Attention-Based Encoder Decoder -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Model -- 3.3 Encoding. 327 $a3.4 Attention Mechanism -- 3.5 Decoding -- 3.6 GPT-3 -- 4 Experiment Results -- 4.1 Embedding-Based Analysis -- 4.2 BLEU Score Analysis -- 4.3 Human Based-Manual Analysis -- 5 Conclusion -- References -- Covering-Based Feedback Verification in Gazebo Simulation for Husky Mobile Robot -- 1 Introduction -- 2 Closed-Loop Design Method -- 2.1 Covering Method -- 2.2 Suggested Approach of Feedback Design -- 3 Feedback Design for a Given Model -- 3.1 Kinematics Model of Husky Robot -- 3.2 Model Based Feedback Design -- 4 Simulation Results -- 5 Conclusion and Future Work -- References -- Machine Learning and Multi-criteria Analysis on the Forex Market -- 1 Introduction -- 2 Related Works -- 3 Trading Systems and Signals -- 4 Efficiency Measures -- 5 Multi-criteria Decision Making Problem -- 6 Numerical Experiments -- 7 Conclusions -- References -- Toward a Readiness Assessment Model for Technology Adoption in Small and Medium Agricultural Industry -- 1 Introduction -- 2 Identified Problem -- 3 Theoretical Framework -- 3.1 Research Questions -- 3.2 State of the Art -- 3.3 Key Definitions -- 4 Readiness Assessment Model for Technology Adoption Validation -- 5 Research Progress -- 6 Conclusions and Future Work -- References -- Impact of Artificial Intelligence and Human Factors in Hybrid Intelligence Dentistry -- 1 Introduction -- 2 Impact of Artificial Intelligence and Human Factors in Hybrid Intelligence Dentistry (Strengths and Weaknesses) -- 3 Clinical Examples from Practice Using DIAGNOCAT AI in Dentistry Related to Human Factors -- 4 Results and Discussion -- 5 Conclusion -- References -- Visual Explanation of Classification Model Using Prototypical Contrastive Embedding in Cervical Cytology -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Problem Formulation -- 3.2 Model -- 3.3 Training -- 3.4 Test and Visualization -- 4 Experiments. 327 $a4.1 Dataset -- 4.2 Implementation -- 4.3 Experiment Setting -- 4.4 Result -- 5 Conclusions -- References -- GooseFlowMeter: A Flow Extractor for the Analysis of GOOSE Messages -- 1 Introduction -- 2 GOOSE in a Nutshell -- 3 IEC 61850 Vulnerabilities -- 4 GooseFlowMeter -- 4.1 Flow-Level Network Traffic -- 4.2 Flow Definition -- 4.3 Features Selection -- 5 Experiments and Results -- 5.1 Testbed Environment -- 5.2 Metrics -- 5.3 Classification Algorithms -- 5.4 Results -- 6 Related Work -- 7 Conclusion -- References -- Scalable, Masterless, Distributed, and Redundant Motor Control for PLC Using Object Orientation and Recursivity -- 1 Introduction -- 2 Background -- 2.1 Modern PLCs -- 2.2 Modern PLC Programming -- 3 Related Work -- 4 System Design -- 4.1 Hardware Setup -- 4.2 Software Setup -- 4.3 Implementation Setup -- 5 Realization and Discussion -- 6 Conclusion and Future Scope -- References -- The Use of User-Centred Design Strategies to Design Wearable Mobile Health Technologies: A Systematic Literature Review -- 1 Introduction -- 2 UCD Strategies -- 3 Research Method -- 3.1 Research Objective -- 3.2 Search Terms -- 3.3 Selection Criteria -- 3.4 The Selection Process -- 3.5 The Data Extraction and Analysis Process -- 4 Findings -- 4.1 Most Used UCD Strategies -- 4.2 Health Conditions Included in the Articles -- 4.3 Wearable Technologies -- 5 Discussion -- 5.1 Interactive Requirements' Gathering -- 5.2 Joint Design -- 5.3 Usability and Functionality Evaluation -- 5.4 Scope of Applicability of UCD Strategies -- 6 Conclusion -- References -- Automatic Instance Segmentation Labeling of Road Sign Image from Bounding Box Data -- 1 Introduction -- 2 Related Works -- 2.1 Image Labeling -- 2.2 GrabCut -- 3 Methodology -- 3.1 Dataset -- 3.2 Background Removal -- 3.3 Contour Retrieval -- 4 Experiments and Results -- 4.1 GrabCut Result. 327 $a4.2 Get Contour Results. 410 0$aLecture Notes in Networks and Systems Series 700 $aYang$b Xin-She$0781375 701 $aSherratt$b Simon$01751095 701 $aDey$b Nilanjan$0846728 701 $aJoshi$b Amit$01265590 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910878056603321 996 $aProceedings of Ninth International Congress on Information and Communication Technology$94185934 997 $aUNINA