دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: سیستم های اطلاعاتی ویرایش: نویسندگان: Faisal Saeed, Fathey Mohammed, Abdulaziz Al-Nahari سری: Lecture Notes on Data Engineering and Communications Technologies, 72 ISBN (شابک) : 3030707121, 9783030707125 ناشر: Springer سال نشر: 2021 تعداد صفحات: 1271 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 99 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Innovative Systems for Intelligent Health Informatics: Data Science, Health Informatics, Intelligent Systems, Smart Computing به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب سیستمهای نوآورانه برای انفورماتیک سلامت هوشمند: علم داده، انفورماتیک سلامت، سیستمهای هوشمند، محاسبات هوشمند نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مقالاتی را ارائه می دهد که در مجموعه مقالات پنجمین کنفرانس بین المللی فناوری اطلاعات و ارتباطات قابل اعتماد 2020 (IRICT 2020) که به صورت مجازی در تاریخ 21 تا 22 دسامبر 2020 برگزار شد. موضوع اصلی کتاب «سیستم های نوآورانه برای سلامت هوشمند» است. انفورماتیک». در مجموع 140 مقاله به همایش ارسال شد، اما تنها 111 مقاله در این کتاب منتشر شد. این کتاب چندین موضوع تحقیقاتی داغ را ارائه میکند که شامل انفورماتیک سلامت، بیوانفورماتیک، بازیابی اطلاعات، هوش مصنوعی، محاسبات نرم، علم داده، تجزیه و تحلیل دادههای بزرگ، اینترنت اشیا (IoT)، سیستمهای ارتباطی هوشمند، امنیت اطلاعات، سیستمهای اطلاعات و مهندسی نرمافزار است. .
This book presents the papers included in the proceedings of the 5th International Conference of Reliable Information and Communication Technology 2020 (IRICT 2020) that was held virtually on December 21–22, 2020. The main theme of the book is “Innovative Systems for Intelligent Health Informatics”. A total of 140 papers were submitted to the conference, but only 111 papers were published in this book. The book presents several hot research topics which include health informatics, bioinformatics, information retrieval, artificial intelligence, soft computing, data science, big data analytics, Internet of things (IoT), intelligent communication systems, information security, information systems, and software engineering.
Preface Organization IRICT2020 Organizing Committee Honorary Co-chairs Conference General Chair Program Committee Chair General Secretary Technical Committee Chairs Publications Committee Publicity Committee IT and Multimedia Committee Treasure Committee Logistic Committee Chair Registration International Technical Committee Contents Intelligent Health Informatics Comparative Study of SMOTE and Bootstrapping Performance Based on Predication Methods 1 Introduction 2 Related Works 3 Experiments 4 Discussion 5 Conclusion References UPLX: Blockchain Platform for Integrated Health Data Management 1 Introduction 2 Blockchain Technology 3 Hyperledger Fabric 4 UPLX Interoperable Architecture 5 UPLX Data Structure 6 Conclusion References Convolutional Neural Networks for Automatic Detection of Colon Adenocarcinoma Based on Histopathological Images 1 Introduction 2 Methods and Dataset 2.1 Dataset 2.2 Convolutional Neural Networks 2.3 Proposed Model 2.4 Transfer Learning and Fine-Tune 3 Results 4 Discussion and Conclusion References Intelligent Health Informatics with Personalisation in Weather-Based Healthcare Using Machine Learning 1 Introduction 2 Background Study 2.1 Influence of Weather on Asthma and Eczema 2.2 Methods for Patients to Self-monitor Asthma and Eczema 2.3 Machine Learning in Weather-Based Healthcare 3 Methodology 4 Results and Discussion 5 Conclusion References A CNN-Based Model for Early Melanoma Detection 1 Introduction 2 Background 2.1 Related Works 2.2 Melanoma and Nevus Lesions 3 Methodology 3.1 Experimental Dataset 3.2 AlexNet Pre-trained Model 3.3 GoogleNet Pre-trained Model 4 Results and Discussion 5 Conclusion References SMARTS D4D Application Module for Dietary Adherence Self-monitoring Among Hemodialysis Patients 1 Introduction 1.1 Study Background 1.2 SMARTS D4D Module 2 Methodology 2.1 SMARTS D4D Module Development 2.2 Analysis of Existing Application System 2.3 Modules of Dual-Application Systems 2.4 Content and Face Validation Testing 3 Module Design, Development and Findings 3.1 Technology Deployed and System Architecture 3.2 Dual-System Implementation 3.3 Needs, Content and Face Validity Testing 4 Conclusion References Improved Multi-label Medical Text Classification Using Features Cooperation 1 Introduction 2 Preliminaries 2.1 Feature Extraction 2.2 Doc2Vec 2.3 Multi-label Classification 2.4 Multi-label Learning Approaches 3 Methodology 3.1 Medical Text Preprocessing 3.2 Feature Extraction 3.3 Multi-label Classification Stage 4 Experimental Results and Discussion 4.1 Used Data 4.2 Evaluation 5 Discussion 6 Conclusion References Image Modeling Through Augmented Reality for Skin Allergies Recognition 1 Introduction 1.1 Related Work 1.2 Proposed System 2 System Analysis, Design, and Implementation 3 System Testing and Evaluation 4 System Interface Design 5 Conclusion References Hybridisation of Optimised Support Vector Machine and Artificial Neural Network for Diabetic Retinopathy Classification 1 Introduction 2 Related Works 2.1 Support Vector Machine 2.2 Artificial Neural Network 2.3 Hybrid Machine Learning Algorithm 3 Proposed Work 3.1 Data from the Electronic Health Record 3.2 Performance Evaluation 3.3 The Overall Flow Architecture of Hybrid Optimised Support Vector Machine and Artificial Neural Network 4 Results 4.1 Comparison of Results Between SVM-NN, Optimised SVM, and Non-optimised SVM algorithms 5 Discussion 6 Conclusions References A Habit-Change Support Web-Based System with Big Data Analytical Features for Hospitals (Doctive) 1 Introduction 2 Related Work 2.1 Existing Systems 3 System Requirements and Analysis 3.1 Proposed Solutions 3.2 Development Methodology 3.3 System Architecture 4 Test and Evaluation of the System 4.1 Result 5 Conclusion and Future Work References An Architecture for Intelligent Diagnosing Diabetic Types and Complications Based on Symptoms 1 Introduction 2 Review of Literature 3 Research Methods 3.1 Back-Propagation Neural Networks 3.2 Data Clustering Algorithms 3.3 Fuzzy Logic Techniques 4 Result Analysis and Discussion 5 Conclusion References An Advanced Encryption Cryptographically-Based Securing Applicative Protocols MQTT and CoAP to Optimize Medical-IOT Supervising Platforms 1 Introduction 2 General Architecture 3 Methodology 3.1 Protocols Application IOT 4 Related Works 4.1 Comparative Study for the Proposed Protocols IOT 5 The Proposed Approach 6 Discussion 7 Conclusion and Perspectives References Pulmonary Nodule Classification Based on Three Convolutional Neural Networks Models 1 Introduction 2 Proposed Method 3 Experiments 3.1 Dataset and Preprocessing 3.2 Experiment Settings 3.3 Experiment Results 4 Conclusion References A Comparative Study on Liver Tumor Detection Using CT Images 1 Introduction 2 Related Works 3 Methodology 3.1 Data Collection 3.2 Data Augmentation 3.3 Machine Learning Techniques 3.4 Deep Learning Techniques 3.5 Transfer Learning 3.6 Deep Learning Pre-trained Model 4 Results and Discussion 5 Conclusion and Future Work References Brain Tumor Diagnosis System Based on RM Images: A Comparative Study 1 Introduction 2 Related Works 3 Methods 3.1 Dataset Collection Phase 3.2 Data Selection 3.3 Covert 3D MRI to JPEG Images 3.4 Deep Learning Method 3.5 Machine Learning Approach 3.6 Deep Learning Approach 3.7 Transfer Learning 3.8 Experimental Setup 4 Results and Discussion 5 Conclusion and Recommendations References Diagnosis of COVID-19 Disease Using Convolutional Neural Network Models Based Transfer Learning 1 Introduction 2 Related Works 3 Materials and Methods 3.1 Dataset Assembling 3.2 Proposed CNN Based Methodology 4 Results and Discussion 4.1 Training Results 4.2 Testing Results 4.3 Comparison with Related Works 5 Conclusion and Perspectives References Early Diagnosos of Parkinson’s Using Dimensionality Reduction Techniques 1 Introduction 2 Literature Review 3 Methodology 3.1 Data Set 3.2 Proposed Model 3.3 Dimensionality Reduction 3.4 Machine Learning Algorithms 4 Results and Discussion 5 Epilogue References Detection of Cardiovascular Disease Using Ensemble Machine Learning Techniques 1 Introduction 2 Related Work 3 Methodology 3.1 Dataset 3.2 Classification Algorithms 3.3 Evaluation Metrics 4 Results and Evaluation 5 Conclusion References Health Information Management Hospital Information System for Motivating Patient Loyalty: A Systematic Literature Review 1 Introduction 2 Methods 2.1 Literature Search 2.2 Inclusion and Exclusion Criteria 2.3 Data Extraction 3 Results 3.1 Search Results 4 Discussion 4.1 Prevalence of HIS Tasked with Motivating Patient Loyalty 4.2 Efficacy of HIS Tasked with Motivating Patient Loyalty 4.3 Gaps in the Literature 4.4 Limitations 5 Conclusions and Directions for Future Research References Context Ontology for Smart Healthcare Systems 1 Introduction 2 Related Work 3 Smart Healthcare Context Properties Analysis 4 Context Ontology for Mobile Service 5 The Evaluation of the Proposed Context Ontology 6 Conclusion and Future Work References A Modified UTAUT Model for Hospital Information Systems Geared Towards Motivating Patient Loyalty 1 Introduction 2 Literature Review 2.1 Capability 2.2 Configurability 2.3 Ease of Use/Help Desk Availability and Competence (EU) 2.4 Accessibility/Shareability 3 Modified UTAUT Model for HISPL 4 Conclusions and Directions for Future Work References Teamwork Communication in Healthcare: An Instrument (Questionnaire) Validation Process 1 Introduction 2 Literature Review 3 Model 4 Discussion 5 Conclusion 6 Appendix A References Potential Benefits of Social Media to Healthcare: A Systematic Literature Review 1 Introduction 2 Methodology 3 Results 3.1 User Classification 4 Discussion 5 Conclusion References Exploring the Influence of Human-Centered Design on User Experience in Health Informatics Sector: A Systematic Review 1 Introduction 2 Previous Works 3 Method 3.1 Research Questions 3.2 Search Strategy 3.3 Inclusion and Exclusion Criteria 3.4 Quality Assessment and Data Extraction 3.5 Data Analysis 4 Result 4.1 Year Published 4.2 Methodology 4.3 Publication Sources 4.4 Context of Study 4.5 Discussion of SLR 5 Discussion 6 Conclusion References An Emotional-Persuasive Habit-Change Support Mobile Application for Heart Disease Patients (BeHabit) 1 Introduction 1.1 Background 2 Proposed Solution 2.1 System Design 3 System Development Methodology 3.1 System Implementation 4 Testing and Evaluation 4.1 Unit Testing 4.2 Integration Testing 4.3 System Testing and User Acceptance Evaluation 5 Conclusion and Future Work References A Systematic Review of the Integration of Motivational and Behavioural Theories in Game-Based Health Interventions 1 Introduction 2 Integration of Theories 3 Review Procedure 3.1 Search Strategy 3.2 Data Analysis 4 Analysis 4.1 What Theories Were Targeted? 4.2 What Behaviours Were Targeted? 4.3 What Groups Were Targeted? 5 Discussion 6 Conclusion References Adopting React Personal Health Record (PHR) System in Yemen HealthCare Institutions 1 Introduction 2 Related Works 3 Advantages of Using and Improving the PHRs Systems 4 Methodology and System Design 4.1 Determining Level of Interest 4.2 System Technology Selection 4.3 System Framework and Users’ Interface 5 Conclusion References Artificial Intelligence and Soft Computing Application of Shuffled Frog-Leaping Algorithm for Optimal Software Project Scheduling and Staffing 1 Introduction 1.1 The SFLA Algorithm 2 Related Works 3 Methodology 3.1 Frog Representation 3.2 SFLA Design 3.3 Fitness Function 4 Results and Discussion 5 Conclusion References A Long Short Term Memory and a Discrete Wavelet Transform to Predict the Stock Price 1 Introduction 2 Literature Survey 3 Prediction Using DWT and LSTM 3.1 Discrete Wavelet Transform (DWT) 3.2 Long Short-Term Memory 4 Experimental Setup 4.1 Data Description 4.2 Prediction Procedure 5 Results 6 Conclusions and Future Work References Effective Web Service Classification Using a Hybrid of Ontology Generation and Machine Learning Algorithm 1 Introduction 2 Related Work 3 Proposed Classification Approach 3.1 Dataset Collection 3.2 Data Pre-processing 3.3 Designing Context Ontology 3.4 A Hybrid Approach of Ontology and SVMs Classifier 3.5 A Hybrid Approach of Ontology and NB Classifier 3.6 Training and Testing 3.7 Evaluation Metrics 4 Result Analysis 5 Future Work References Binary Cuckoo Optimisation Algorithm and Information Theory for Filter-Based Feature Selection 1 Introduction 2 Background 2.1 Binary Cuckoo Optimisation Algorithm 2.2 Information Gain Based Entropy 2.3 Mutual Information 2.4 Some Related Works 3 Proposed Approaches 3.1 BCOA Based MI for FS 3.2 BCOA Based Information Gain Entropy for FS 3.3 Relevance and Redundancy Weighted Values in BCOA-MI and βCOA-E 3.4 Experimental Design 4 Discussion of Results 4.1 Results of BCOA-MI and BCOA-E 4.2 Results of BCOA-MI and BCOA-E with ΒWeighted Values 4.3 Average Fitness of BCOA-MI and BCOA-E 4.4 Convergence Trends of BCOA-MI and BCOA-E 4.5 Comparison with Other Existing Approaches 5 Conclusions and Future Works References Optimized Text Classification Using Correlated Based Improved Genetic Algorithm 1 Introduction 1.1 Text Classification 1.2 Genetic Optimization 2 Related Works 3 Proposed Approach 3.1 Proposed IGA 3.2 IGA Based Text Classification 4 Experimental Environment 5 Results and Discussions 6 Conclusions References Multi-objective NPO Minimizing the Total Cost and CO2 Emissions for a Stand-Alone Hybrid Energy System 1 Introduction 2 The Problem of Optimal Sizing 2.1 Construction of the Proposed HES 2.2 Data Collection 2.3 Modeling of the Proposed HES 3 Nomadic People Optimizer (NPO) 3.1 The Objective of the Proposed Algorithm 4 Total System Cost CT 5 Total CO2 Emissions (ECO2T) 5.1 The Constraints 6 Results and Discussions 6.1 Optimal Configuration 7 Conclusions References A Real Time Flood Detection System Based on Machine Learning Algorithms 1 Introduction 2 Background and Related Work 2.1 Artificial-Neural-Networks (ANNs) 2.2 Adaptive-Neuro-Fuzzy Inference System (ANFIS) 2.3 Decision Tree (DT) and Ensemble-Prediction-Systems (EPSs) 3 Proposed Methodology 3.1 Experimental Design 4 Results and Discussion 5 Conclusions References Extracting Semantic Concepts and Relations from Scientific Publications by Using Deep Learning 1 Introduction 2 Ontology Construction Challenges 3 Deep Belief Network 4 Methodology 4.1 Concept Relevance Measurements 4.2 Semantic Relations 4.3 Extracting Semantic Concepts and Relations 5 Conclusion References Effectiveness of Convolutional Neural Network Models in Classifying Agricultural Threats 1 Introduction 2 Related Work 3 The Architecture of Convolutional Neural Network (CNN) 3.1 Convnet Layers 3.2 Activation Functions 3.3 Regularization 4 Research Methodology 4.1 Dataset Collection 4.2 Data Pre-processing 4.3 Applying the Convolutional Neural Network (CNN) Models 4.4 Training and Testing 5 Result Analysis 6 Future Work References A Study on Emotion Identification from Music Lyrics 1 Introduction 2 Emotion Models 3 Affective Lexicon 4 Features from Music Lyrics 5 Lyrics Datasets for Emotion Identification 6 A Review of Emotion Identification from Music Lyrics 7 Discussion 8 Conclusion References A Deep Neural Network Model with Multihop Self-attention Mechanism for Topic Segmentation of Texts 1 Introduction 2 Related Works 3 Model Architecture 3.1 Input Representation Layer 3.2 Bidirectional LSTM (BiLSTM) Layer 3.3 Highway Network Layer 3.4 Multihop Self-attention Layer 3.5 Output and Training 4 Experiments 4.1 Datasets 4.2 Evaluation Metrics 4.3 Baselines 4.4 Preprocessing 4.5 Training and Parameters 5 Results and Discussion 5.1 Comparison with the BayesSeg Model 5.2 Comparison with Att-CNN-BiLSTM Model 6 Conclusion References Data Science and Big Data Analytics Big Data Interoperability Framework for Malaysian Public Open Data 1 Introduction 2 The Proposed Big Data Interoperability Framework 3 Prototype 4 Conclusion References The Digital Resources Objects Retrieval: Concepts and Figures 1 Introduction 2 Digital Cultural Heritage Collections 3 Evaluation Performance Measurement in DRO Retrievals 4 Statistical Test in DROs 5 Findings 6 Summary and Conclusion References A Review of Graph-Based Extractive Text Summarization Models 1 Introduction 2 Extractive Text Summarization 3 Graph-Based ATS Models 3.1 Static Graph-Based Model 3.2 Dynamic Graph-Based Model 3.3 Graph Pruning-Based Model 3.4 Hypergraph-Based Model 3.5 Affinity Graph-Based Model 3.6 Semantic Graph-Based Model 3.7 Multigraph-Based Model 4 Discussion 5 Conclusion References Review on Emotion Recognition Using EEG Signals Based on Brain-Computer Interface System 1 Introduction 2 Brain-Computer Interface (BCI) 2.1 Medical Field 2.2 Entertainment Field 3 EEG Signals Acquisition 4 Feature Extraction 5 Classification Methods 6 Discussion of the Results of Emotion Recognition Methods Using EEG Signals 6.1 Technology Challenges 6.2 User Challenges 6.3 Discussion 7 Conclusions References A New Multi-resource Deadlock Detection Algorithm Using Directed Graph Requests in Distributed Database Systems 1 Introduction 2 Related Work 3 The Proposed Algorithm: Multi Resource Deadlock Detection (MRDD) 4 Analytical Model Analysis 4.1 Multi Resource Deadlock Detection in Two Sites with Eight Transactions 5 Performance Analysis 6 Conclusion References Big Data Analytics Model for Preventing the Spread of COVID-19 During Hajj Using the Proposed Smart Hajj Application 1 Introduction 2 Related Works 3 Methodology 3.1 First Step (Research Question) 3.2 Second Step (Data Collection) 3.3 Third Step (Investigation) 3.4 Fourth Step (Research) 3.5 Fifth Step (Results/Knowledge) 4 System Architecture 5 Conclusion References Financial Time Series Forecasting Using Prophet 1 Introduction 2 Literature Review and Current Practices 3 Prophet Model and Research Methodology 4 Experimental Results 4.1 Data Set and Evaluation Measure 4.2 Results 5 Conclusion References Facial Recognition to Identify Emotions: An Application of Deep Learning 1 Introduction 2 Background and Related Works 3 Proposed Recognition Approach 3.1 The Convolution Step 3.2 The Pooling Step 3.3 The Flattening 3.4 Optimization for Deep Learning 4 Test and Discussion 4.1 Test Data 4.2 Results 4.3 Evaluation Measure 4.4 Discussion 5 Conclusion References Text-Based Analysis to Detect Figure Plagiarism 1 Introduction 2 Methods 2.1 Similarity Score Based Text Comparison 3 Experimental Design and Dataset 4 Results and Evaluation 5 Conclusions and Future Work References A Virtual Exploration of al-Masjid al-Nabawi Using Leap Motion Controller 1 Introduction 2 Related Works 3 Methodology 3.1 Building the 3D Space 3.2 Interaction Technique 4 Results and Discussion 5 Conclusion and Future Work References Comparison of Data Analytic Techniques for a Spatial Opinion Mining in Literary Works: A Review Paper 1 Introduction 2 Methods for a Spatial Opinion Mining in Literary Works 2.1 Natural Language Processing and Text Analytics 2.2 Opinion Mining 2.3 Topic Modelling 2.4 Sentiment Analysis (SA) 3 Comparison and Discussion Between Sentiment Analysis and Topic Modelling Approaches 3.1 Comparison and Discussion on Different Sentiment Analysis Approaches 3.2 Comparison of Topic Modelling: Latent Dirichlet Allocation (LDA) and Latent Semantic Analysis (LSA) 4 Conclusion References Open Data in Prediction Using Machine Learning: A Systematic Review 1 Introduction 1.1 Background 1.2 Problem Description 2 Methodology 2.1 Research Questions (RQs) 2.2 Data Collection 2.3 Results Included 2.4 Data Extraction 2.5 Data Extraction 3 Results 3.1 Bibliometric Research Questions (BRQs) 3.2 Content Research Questions (CRQs) 4 Discussion 5 Conclusion and Research Opportunities References Big Data Analytics Based Model for Red Chili Agriculture in Indonesia 1 Introduction 1.1 Background 2 Methods 2.1 Review on Big Data Analytics 2.2 Proposed BDA Model. 3 Conclusion 3.1 Research Limitations and Future Research. References A Fusion-Based Feature Selection Framework for Microarray Data Classification 1 Introduction 2 Related Studies 3 Methods 3.1 Fusion-Based Feature Selection 3.2 Classification Phase 4 Experimental Design 4.1 Datasets 4.2 The Implemented Scenarios of the Proposed Framework 4.3 Performance Evaluation Measure 5 Results and Discussion 6 Conclusion References An Approach Based Natural Language Processing for DNA Sequences Encoding Using the Global Vectors for Word Representation 1 Introduction 2 Related Work 3 Method 3.1 Build the Corpus 3.2 Train the Embedding Model 3.3 Transform DNA Fragments into Numerical Vector Using Trained Embedding Model. 4 Datasets 5 Results and Discussion 6 Conclusion References Short-Term CO2 Emissions Forecasting Using Multi-variable Grey Model and Artificial Bee Colony (ABC) Algorithm Approach 1 Introduction 2 Grey Relational Analysis Methods 2.1 Multi-variable Grey Model GM(1,N). 2.2 ABC Algorithm Based GM(1,N) Model. 3 Results and Discussion 4 Conclusion References IoT and Intelligent Communication Systems A Reliable Single Prediction Data Reduction Approach for WSNs Based on Kalman Filter 1 Introduction 2 Proposed Approach 2.1 Data Reduction Phase (DR) 2.2 Data Prediction Phase (DR) 3 Implementation and Results 3.1 Datasets 3.2 Results and Analysis 4 Conclusion and Future Work References A Real-Time Groundwater Level Monitoring System Based on WSN, Taiz, Yemen 1 Introduction 2 Literature Work 3 The Proposed Groundwater Framework 3.1 Case Study 3.2 Methodology 4 Results and Discussions 5 Conclusion References Design and Simulation of Multiband Circular Microstrip Patch Antenna with CSRR for WLAN and WiMAX Applications 1 Introduction 2 Antenna Design Methodology 2.1 Development of the Initial Antenna 2.2 Improving the Antenna Characteristics 2.3 Parametric Analysis 3 Simulation Results and Discussion 4 Conclusion References Reference Architectures for the IoT: A Survey 1 Introduction 2 Background 3 Reference Architectures for IoTs 3.1 IoT Reference Architecture by Guth et al. [15] 3.2 Industrial Internet Reference Architecture (IIRA) [24] 3.3 WSO2’s Reference Architecture [1] 3.4 Internet of Things Architecture (IoT-A) [4, 8, 10, 16, 17, 24, 26] 3.5 IoT Architecture Reference Model (ARM) [3, 7] 4 Analysis of the Surveyed IoT RAs 5 Related Work 6 Conclusions References A Circular Multiband Microstrip Patch Antenna with DGS for WLAN/WiMAX/Bluetooth/UMTS/LTE 1 Introduction 2 The Proposed Multiband Microstrip Patch Antenna 2.1 Developing the Reference Antenna 2.2 The Optimized Antenna Design 3 Simulations and Results 3.1 Evaluating the Performance of the Optimized Antenna 3.2 Parametric Analysis 4 Conclusions References Anomaly Intrusion Detection Systems in IoT Using Deep Learning Techniques: A Survey 1 Introduction 2 Literature Review 3 Discussion 4 Techniques Used 5 Dataset Used 6 Limitations of the Existing Studies 7 Recommendation 8 Conclusion References Security and Threats in the Internet of Things Based Smart Home 1 Introduction 2 Smart Home Environment 2.1 Elements of Smart Homes 2.2 Internet of Things (IoT) Architecture 3 Security Threats in the IoT 3.1 Common Threats 4 Security Measures for Smart Home 4.1 Security Components 4.2 Security Attacks and Solutions 5 Derive Security Threats Countermeasure Frameworks 6 Conclusion References Simulation and Control of Industrial Composition Process Over Wired and Wireless Networks 1 Introduction 2 Methodology and Design Implementation 2.1 Controller Design 2.2 TrueTime Simulator 2.3 Topology of WNCS 2.4 Controller Design in TrueTime 3 Results and Discussion 3.1 Simulation of Wired Control System 3.2 Wired vs Wireless 4 Conclusion References Performance Degradation of Multi-class Classification Model Due to Continuous Evolving Data Streams 1 Introduction 2 Related Work 3 Research Methodology 3.1 Tentative Solution- Overview 4 Conclusion and Future Consideration References Compact Wide-Bandwidth Microstrip Antenna for Millimeter Wave Applications 1 Introduction 2 Antenna Design Procedure 2.1 Design Guidelines 3 Simulation Results and Discussions 3.1 Simulated Return Loss and Bandwidth 3.2 Simulated Voltage Standing Wave Ratio (VSWR) 3.3 Simulated 3D Gain 4 Conclusions References Dual-Band Rectangular Microstrip Patch Antenna with CSRR for 28/38 GHz Bands Applications 1 Introduction 2 Antenna Design Methodology 2.1 The Reference Antenna Design 3 Simulation Results and Discussion 3.1 Performance of the Optimized Antenna 3.2 Parametric Analysis 3.3 Performance Comparison with Previous Published Work 4 Conclusion References Dual Band Rectangular Microstrip Patch Antenna for 5G Millimeter-Wave Wireless Access and Backhaul Applications 1 Introduction 2 Antenna Design and Configuration 3 Parametric Analysis and Design Optimization 4 Results and Discussions 5 Conclusions References Design of Wireless Local Multimedia Communication Network (WLMmCN) Based on Android Application Without Internet Connection 1 Introduction 2 Technical Background 3 WLMmCN Architecture 4 Results 5 Conclusions References A Statistical Channel Propagation Analysis for 5G mmWave at 73 GHz in Urban Microcell 1 Introduction 2 Channel Propagation Models 3 MIMO-OFDM Communication Scenarios 4 The Key Parameters 5 Results, Analysis and Discussion 6 Conclusion References Advances in Information Security Robot Networks and Their Impact on Cyber Security and Protection from Attacks: A Review 1 Introduction 2 Related Works 3 Research Methodology 4 Importance of Cyber Security 5 Botnets Architectures 5.1 Centralized Architecture 5.2 Peer-To-Peer Architecture 5.3 Hybrid Architecture 6 How Botnets Attacks Works 7 Threats Represented by Botnets 8 Preventing Botnets Attacks 9 Improving Organizations and Individual Cyber Security 10 The Finding 11 Conclusion References An Efficient Fog-Based Attack Detection Using Ensemble of MOA-WMA for Internet of Medical Things 1 Introduction 2 Machine Learning Attack Detection in Security of IoMT 3 Methodology 3.1 Dataset and Methods 3.2 Research Design 3.3 Evaluation Metrics 4 Results and Discussion 5 Conclusion References A New DNA Based Encryption Algorithm for Internet of Things 1 Introduction 2 Background and Related Work 2.1 IoT and Encryption 2.2 Related Work 3 Proposed DNA Encryption Algorithm 4 Experimental Result and Discussion 5 Conclusion References Watermarking Techniques for Mobile Application: A Review 1 Introduction 2 Related Works 3 Watermarking for Mobile Applications 3.1 Mobile Architecture 4 Methodology 5 Discussion 6 Conclusion References Analysis and Evaluation of Template Based Methods Against Geometric Attacks: A Survey 1 Introduction 2 Literature Review 2.1 Template Based Methods in Transform Domains 2.2 Template Based Methods in Spatial Domains 3 Discussion 4 Conclusion References Survey of File Carving Techniques 1 Introduction 2 Traditional/Basic Carving Algorithm 2.1 Header/Footer Carving or Signature-Based Carving 2.2 Header/Maximum Size Carving’s Algorithm 2.3 Header/Embedded Length Carving 2.4 File-Structure Based Carving 3 Advance Carving Algorithm 3.1 Bifragment Gap Carving Algorithm 3.2 Aho-Corasick Algorithm 3.3 Hash-Based Carving Algorithm 3.4 Decision-Theoretic Algorithm (DECA) 3.5 Orphaned Fragment Carving Algorithm 4 Conclusion References Affecting Factors in Information Security Policy Compliance: Combine Organisational Factors and User Habits 1 Introduction 2 Literature Review 2.1 Organisation Commitment 2.2 Organisation Culture 2.3 Reward 2.4 Habit 3 Research Methodology 4 Research Finding 5 Discussion 6 Conclusion References Mitigation of Data Security Threats in Iraqi Dam Management Systems: A Case Study of Fallujah Dam Management System 1 Introduction 2 Background 2.1 Related Works 2.2 Case Study: Fallujah Dam 2.3 Security Issues 3 Method and Materials 3.1 Design of Dam Management System 3.2 Multi-Tier Secure Model 4 Findings and Discussion 5 Conclusions and Future Work References Advances in Information Systems Development and Validation of a Classified Information Assurance Scale for Institutions of Higher Learning 1 Introduction 2 Related Work 3 Methodology 3.1 Selection of Experts 3.2 Invitation of Participants and Distribution of Survey Forms 3.3 Analysis of Responses 3.4 Revision and Final Scale 4 Conclusion 5 Limitations References Sustainable e-Learning Framework: Expert Views 1 Introduction 2 The Successful Development of Sustainable e-learning 2.1 Sustainable e-learning Framework (SeLF) 3 Methodology 4 Results and Discussion 4.1 SeLF’s Contribution Towards Sustainability Approach 4.2 Sustainable e-learning Approach 4.3 Higher Education Practices 5 Conclusion References Derivation of a Customer Loyalty Factors Based on Customers’ Changing Habits in E-Commerce Platform 1 Introduction 2 Background of the Problem 3 Literature Review 3.1 E-commerce 3.2 Customer Service in E-commerce 3.3 Business-to-Consumer (B2C) 3.4 Customer Satisfaction in Customer Loyalty 3.5 Loyalty in E-commerce (E-loyalty) 3.6 Customers Changing Habits 4 Methodology 5 Model Development 5.1 Derivation of Factors 6 Conclusion References Analysis of Multimedia Elements Criteria Using AHP Method 1 Introduction 2 Literature Review 3 Methodology 3.1 Problem and Objective 3.2 Structure Elements into Criteria, Sub-criteria and Alternatives 3.3 The Pairwise Comparison Process 3.4 Calculate Weighting and Consistency Ratio (CR) Determination for the Interaction Element Criteria 3.5 Evaluate Alternatives According to Weighting and Get Ranking 4 Result and Finding 5 Conclusion References The Development of a Criteria-Based Group Formation Systems for Student Group Work 1 Introduction 2 Literature Review 3 Methodology 4 Prototype Development 5 User Acceptance 6 Conclusion References Trusted Factors of Social Commerce Product Review Video 1 Introduction 2 Systematic Literature Review (SLR) 2.1 Purpose of the Literature Review 2.2 Practical and Training 2.3 Searching for the Literature 2.4 Practical Screen 2.5 Quality of Appraisal 2.6 Data Extraction 3 SLR Findings 3.1 Product Review Video 3.2 Online Video Sharing Platforms 3.3 Trusted Factors of Product Review Video 4 Conclusion References Building Information Modelling Adoption: Systematic Literature Review 1 Introduction 2 Literature Review 3 Methodology 4 Findings and Analysis 4.1 Technology Adoption Theories in BIM Adoption Research 4.2 Independent Variables in BIM Adoption Studies 4.3 Dependent Variables in BIM Adoption Studies 5 Conclusion References Adoption of Smart Cities Models in Developing Countries: Focusing in Strategy and Design in Sudan 1 Introduction 2 Literature Review 3 A Guide for Applying the Smart City Model 3.1 Organizational Structure for the Smart City 3.2 Vision and Goals 3.3 Evaluation of E-readiness 3.4 Documenting Operations 3.5 Redesigned Processes 3.6 Executive Plan 3.7 Management of Change 4 Framework Analysis 5 Conclusion References Factors Affecting Customer Acceptance of Online Shopping Platforms in Malaysia: Conceptual Model and Preliminary Results 1 Introduction 2 Theoretical and Conceptual Background 2.1 Technology Acceptance Model 2.2 Related Factors on Customer Online Shopping Acceptance 3 Conceptual Model Constructs 3.1 Website Content 3.2 Website Design 3.3 Perceived Enjoyment 3.4 Perceived Ease of Use 3.5 Perceived Usefulness 3.6 Trust 3.7 Customer Service Quality 4 Methodology 5 Results and Data Analysis 5.1 Demographic Information 5.2 Measurement Model 6 Conclusion References Student Compliance Intention Model for Continued Usage of E-Learning in University 1 Introduction 2 Research Problem 3 Literature Review 4 Research Methodology 5 Proposed Model 6 Conclusion References Digital Information and Communication Overload Among Youths in Malaysia: A Preliminary Review 1 Introduction 2 Literature Review 2.1 Digital Information and Communication 2.2 The Impact of Information and Communication Overload 2.3 Information and Communication in Modern Day 3 Methodology 4 Discussion 5 Conclusion References The Effect of Using Social Networking Sites on Undergraduate Students’ Perception and Academic Performance at University of Taiz-Yemen 1 Introduction 1.1 Problem Statement 1.2 Research Objectives 1.3 Research Questions 2 Literature Review 3 Research Methodology 3.1 Measurement Variables 3.2 Data Analysis 4 Findings 4.1 Profile of Respondents 4.2 Most Popular SNSs for Academic Purposes 4.3 Student Use and Academic Performance 5 Conclusion References Building Information Modelling Adoption Model for Malaysian Architecture, Engineering and Construction Industry 1 Introduction 2 Literature Review 3 Methodology and Proposed Model 4 Findings and Analysis 4.1 Demographic Analysis 4.2 Measurement Model 4.3 Hypothesis Testing 5 Discussion and Conclusions References Digital Government Competency for Omani Public Sector Managers: A Conceptual Framework 1 Introduction 2 Related Work 2.1 Digital Government and Competencies 2.2 Related Theories on Digital Competency 2.3 The Gap in the Existing DGC Study 3 Methodology 3.1 Research Design 3.2 Data Collection 3.3 Data Analysis 4 Research Conceptual Framework 4.1 Management Competency 4.2 Soft Skills Competency 4.3 Digital Literacy 4.4 Digital Creativity and Innovation 4.5 Information Security Competency 4.6 Digital Leadership Competency 5 Conclusion and Future Work References Computational Vision and Robotics Landmark Localization in Occluded Faces Using Deep Learning Approach 1 Introduction 2 Related Studies 2.1 Models for Facial Landmark Localization 2.2 Dataset for Landmark Detection 3 Methodology and Implementation 4 Experimental Results 5 Conclusion and Future Work References Contrast Image Quality Assessment Algorithm Based on Probability Density Functions Features 1 Introduction 2 Optimization of Contrast Features in NR-IQA-CDI 2.1 Addressing the Problems of the Existing NR-IQA-CDI 2.2 Application of Monotonic PDF of Contrast Feature in NR-IQA-CDI 3 Experimental Results and Discussions 3.1 Evaluation Methodology 3.2 NR-IQA-CDI-MPCF Evaluation 3.3 Statistical Performance Analysis 4 Conclusion References The Impact of Data Augmentation on Accuracy of COVID-19 Detection Based on X-ray Images 1 Introduction 2 Related Work 3 Methodology and Dataset 3.1 Dataset 3.2 Convolutional Neural Networks 3.3 Data Augmentation 3.4 Proposed Model 4 Results 5 Discussion 6 Conclusion References A Fusion Schema of Hand-Crafted Feature and Feature Learning for Kinship Verification 1 Introduction 2 Related Works 3 Proposed Method 3.1 Hand-Crafted: Histogram of Oriented Gradients (HOG) 3.2 Feature Learning: Convolutional Neural Network (CNN) 3.3 Fusion Hand-Crafted Feature and Feature Learning 3.4 Features Subtracting Absolute Value 4 Experiments and Evaluation 4.1 KinFaceW-I and KinFaceW-II Databases 4.2 Experimental Setting 5 Results and Discussion 5.1 Experimental Results on KinFaceW-I and KinFaceW-II Databases 6 Conclusion and Future Works References Lossless Audio Steganographic Method Using Companding Technique 1 Introduction 2 Materials and Methods 2.1 Integer Wavelet Transform 2.2 Companding Techniques 2.3 Fredkin Gate 2.4 The Proposed Method 2.5 Performance Evaluation Metrics 3 Results and Discussion 4 Conclusions References Smart Traffic Light System Design Based on Single Shot MultiBox Detector (SSD) and Anylogic Simulation 1 Introduction 2 Methods 3 Results and Discussion 3.1 Design 3.2 Trial 3.3 Data Processing 3.4 Analysis 4 Conclusion References Learning Scope of Python Coding Using Immersive Virtual Reality 1 Introduction 2 Materials and Methods 2.1 Architecture of VR Learning Apps 2.2 Types of Interaction Techniques Used 2.3 Implementation Details 2.4 Experiments and Evaluation 3 Results and Discussion 3.1 Experiments I 3.2 Experiments II 4 Conclusion References Automatic Audio Replacement of Objectionable Content for Sri Lankan Locale 1 Introduction 2 Related Work 2.1 Automatic Objectionable Content Detection and Replacement in Audio 2.2 Automatic Objectionable Content Detection in Text 2.3 Libraries and Other Implementations 3 System Overview 3.1 DSP Module 3.2 Speech Recognition Module 3.3 NLP Module 3.4 Audio Replacing Module 4 Methodology 4.1 Data Corpus Collection 4.2 Preprocessing of Data 4.3 Building and Evaluating the Model 5 Evaluation 6 Conclusion References A Comparison of CNN and Conventional Descriptors for Word Spotting Approach: Application to Handwritten Document Image Retrieval 1 Introduction 2 Related Work 2.1 Supervised-Learning-Free Word-Spotting Techniques 2.2 Supervised-Learning Techniques 3 Methodology 3.1 Interest Points-Based Approach 3.2 CNN Based Approach 3.3 Handwritten Dataset 4 Result and Discussions 4.1 Results 4.2 Discussion 5 Conclusion References Handwritten Arabic Character Recognition: Comparison of Conventional Machine Learning and Deep Learning Approaches 1 Introduction 2 Overview of the Arabic Handwriting Recognition Systems 3 Proposed Methods 3.1 Method Based on Conventional Machine Learning 3.2 Method Based on Deep Learning Using CNN Models 4 Evaluation and Results 5 Conclusion References Document Image Edge Detection Based on a Local Hysteresis Thresholding and Automatic Setting Using PSO 1 Introduction 1.1 Overview of Edge Detection 2 Proposed Approach 2.1 Parameter Optimization Using PSO 2.2 Our Proposed Version of Pratt’s Formula 2.3 Toward an Unsupervised Segmentation Method Using an Adaptive Thresholding 3 Experimentation and Results 3.1 Evaluation of Conventional Edge Detectors Genericity 3.2 Evaluation of Our Improved Version of Pratt’s Metric 3.3 Our Proposed Method Evaluation 4 Discussion and Further Analysis 5 Conclusion References Fast I2SDBSCAN Based on Integral Volume of 3D Histogram: Application to Color Layer Separation in Document Images 1 Introduction 2 Existing Segmentation Methods 2.1 Segmentation Method Based on Edge/Region Detection or Binarization 2.2 Segmentation Based Elements Classification (or Clustering) 3 Our Pixel-Classification and Colorimetric Segmentation Approach 3.1 Steps of Our Approach 3.2 Our New Method of Fast Calculation of the Color Density 4 Evaluation and Results 4.1 Discussion 5 Conclusion References Enhancing Daily Life Skills Learning for Children with ASD Through Augmented Reality 1 Introduction 2 Related Works 3 Augmented Reality System-Overview 3.1 Analysis 3.2 Design 3.3 Prototype Development 4 Testing 5 Discussions 6 Future Work References Recent Computing and Software Engineering SpaceScience App: Development of a Mobile Application for School Children 1 Introduction 2 Literature Review 2.1 Mobile Devices 2.2 Development of Mobile Applications 2.3 Engagement in Gaming 2.4 Motivation in Gaming 3 Methodology 4 Results 4.1 Interview 4.2 Flowchart of the Project 4.3 SpaceScience Mobile Application 4.4 User Experience Testing 5 Conclusion References Research on Online Problem-Based Learning Among Undergraduate Students: A Systematic Review 1 Introduction 2 Method 2.1 Search Strategy 2.2 Inclusion and Exclusion Criteria 3 Results 3.1 Problem Based Learning Principles 3.2 Effects of Problem Based Learning 4 Final Remarks 5 Conclusion and Future Research References Derivation of Factors in Dealing Negative E-WOM for Maintaining Online Reputation 1 Introduction 2 Background of the Problem 3 Literature Review 3.1 Online Reputation 3.2 Maintaining Online Reputation 3.3 Negative E-WOM 3.4 Factors Dealing Negative E-WOM 3.5 Dealing Negative E-WOM Through CRM and Positive E-WOM in Maintaining Online Reputation 4 Methodology 5 Model in Dealing Negative E-WOM for Maintaining Online Reputation 5.1 Constructs 5.2 Model Development 6 Conclusion References A Terms Interrelationship Approach to Query Expansion Based on Terms Selection 1 Introduction 2 Related Works 3 Proposed Approach 3.1 Query and Text Preprocessing 3.2 Query Expansion 3.3 Documents Text Preprocessing and Indexing 4 Experiment Results and Discussion 4.1 Experiment Results 4.2 Discussion 5 Conclusion and Future Work References Multi-domain Business Intelligence Model for Educational Enterprise Resource Planning Systems 1 Introduction 2 Literature Review 2.1 Business Intelligence Models 2.2 Business Intelligence Tools and Applications 2.3 Enterprise Resource Planning Business Intelligence (ERPBI) 3 The Proposed Model 3.1 The Proposed BI Domains for Educational ERP System 3.2 Business Intelligence Steps 3.3 Data Warehouse 3.4 Business Intelligence Application 4 Discussion and Conclusion References Measuring Risk Mitigation Techniques in Agile Global Software Development 1 Introduction 2 Related Works 2.1 Risk Categories 3 Methodology 3.1 Comparison Criteria 3.2 Validation Technique 4 Results 4.1 Qualification of Panelist 4.2 Hypothesis Testing 5 Conclusion References Risk Mitigation Framework for Agile Global Software Development 1 Introduction 2 Related Work 3 Proposed RMAG 4 Applying RMAG in Agile Global Software Development Project Using SCRUM 5 Discussion and Result 6 Conclusion and Future Work Appendix A References Re-verification of the Improved Software Project Monitoring Task Model of the Agile Kanban (i-KAM) 1 Introduction 2 Overview of i-KAM 3 Methodology 4 Results 4.1 Understandability of the Terminologies Used in i-KAM 4.2 Relevance of the i-KAM Components 4.3 Feasibility of Criteria Used in i-KAM 4.4 Organization of the Connections and Flows in i-KAM 4.5 Comprehensiveness of i-KAM 5 Discussion 6 Conclusion References Author Index