دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Dae-Ki Kang, Rayner Alfred, Zamhar Iswandono Bin Awang Ismail, Aslina Baharum, Vinesh Thiruchelvam سری: Lecture Notes in Electrical Engineering, 983 ISBN (شابک) : 9811984050, 9789811984051 ناشر: Springer سال نشر: 2023 تعداد صفحات: 684 [685] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 19 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Proceedings of the 9th International Conference on Computational Science and Technology: ICCST 2022, 27–28 August, Johor Bahru, Malaysia به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجموعه مقالات نهمین کنفرانس بین المللی علوم و فناوری محاسباتی: ICCST 2022، 27-28 اوت، جوهور باهرو، مالزی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مجموعه مقالات نهمین کنفرانس بینالمللی علوم و فناوری محاسباتی (ICCST 2022)، که در جوهور بارو، مالزی، در 27 تا 28 آگوست 2022 برگزار شد، گردآوری شده است. مشارکتهای مربوطه طیف وسیعی از تکنیکها و راهحلهای محاسباتی جدید را به پزشکان و محققان ارائه میدهد. ، مسائل نوظهور را شناسایی کنید و مسیرهای تحقیقاتی آینده را ترسیم کنید و همچنین به آنها نشان دهید که چگونه آخرین روش های محاسباتی در مقیاس بزرگ و با کارایی بالا را اعمال کنند.
This book gathers the proceedings of the 9th International Conference on Computational Science and Technology (ICCST 2022), held in Johor Bahru, Malaysia, on August 27–28, 2022. The respective contributions offer practitioners and researchers a range of new computational techniques and solutions, identify emerging issues, and outline future research directions, while also showing them how to apply the latest large-scale, high-performance computational methods.
Preface Keynote Speakers Contents The Equity of Pedagogical Approaches in E-Learning Initiatives in Higher Education Institutions in United Arab Emirates 1 Introduction 2 Related Works 2.1 UTAUT Cultural Constructs 2.2 Adoption of E-Learning and Culture 2.3 Blackboard Learn Cultural Pedagogy 2.4 The UAE Culture and Learning Pedagogies 2.5 A Brief Description of the Gaps 3 Theoretical Framework 3.1 Epistemology and Ontology 4 Research Methodology 4.1 Data Collection 4.2 Quality and Trustworthiness of the Study or Findings 4.3 Ethical Issues and Limitations 5 Data Analysis Technique 6 Findings 7 Conclusion and Recommendations References Malay Fake News Classification Using a Deep Learning Approach 1 Introduction 2 Related Works 3 Methods 3.1 Datasets 3.2 Text Pre-processing 3.3 Building the RNN Model 3.4 Training the RNN Model 3.5 Evaluating the RNN Model 4 Results and Discussion 5 Conclusion References Iterative Method for Solving Nonlinear Fredholm Integral Equations Using Quarter-Sweep Newton-PKSOR Method 1 Introduction 2 Methodology 3 Numerical Experiments 4 Conclusions References Analysis on the Performance of Healthcare Industry in Malaysia with TOPSIS Model 1 Introduction 2 Data and Methodology 2.1 Data 2.2 TOPSIS 3 Empirical Results 4 Conclusion References Prosthetic Parts for Protecting Mobile Robots 1 Introduction 2 Animals with Shells 3 Proposed Protection Mechanisms 3.1 Umbrella 3.2 Four-Bar 3.3 Retractable Roof 3.4 Turtle 3.5 Box Shell 4 Conclusions and Future Work References Secret Key Design Using an Algebraic Procedure (KAP) for Encrypted Energy Internet-of-Things (EIoT) Contents 1 Introduction 2 The Proposed Secret Key Design Using an Algebraic Procedure (KAP) Schematic Representation 3 The Proposed KAP Design 3.1 KAP Inputs Design 3.2 Proposed KAP Secret-Key Length Design 3.3 KAP Input (Plaintext)—Math-Based Procedure 3.4 KAP Secret-Key—Scheme and Block Diagram 4 Results and Discussion 4.1 Time Complexity 4.2 Time Based Efficiency 5 Conclusion References Overview on Online Examination Proctoring Using Machine Learning 1 Introduction 2 Online Proctoring 3 Review of Proctoring Integration Services 4 Machine Learning Implementation in Online Proctoring 5 Conclusion References Facial Micro-expressions Analysis: Its Databases, Feature Extraction, and Classification Methods 1 Introduction 1.1 Taxonomy of Micro-expressions 2 Micro-expressions Databases 2.1 Posed Databases 2.2 Spontaneous Databases 3 Features Extraction 3.1 Handcrafted Features 3.2 Learning-Based Features 4 Classification 4.1 Support Vector Machine (SVM) 4.2 Extreme Learning Machine (ELM) 4.3 K-Nearest Neighbors (k-NN) 4.4 Random Forest (RF) 4.5 Sparse Representation Classifier (SRC) 4.6 Advanced Genetic Algorithm (AGA) 4.7 Spatio-Temporal Recurrent Convolutional Networks (STRCN) 4.8 Graph Convolutional Networks (GCN) 5 Conclusion References Development of ‘SiPantik’ for the Teachers’ Test Items Production 1 Introduction 2 Literature Review 2.1 The Concept of Producing Test Items 2.2 System Development Life Cycle 3 Methodology 4 Finding and Discussion 4.1 Result 4.2 System Development SiPantik 4.3 Discussion 5 Conclusion References Face Illumination Reduction Using MADPIP Restoration Approach to Biometric Patient Authentication System 1 Introduction 2 Related Works 2.1 Low Light Illumination Invariant Method 2.2 Passive Illumination Reduction Approaches 2.3 Active Illumination Reduction Approaches 3 Methods 3.1 Multiple Adaptive Derivatives for Passive Image Processing (MADPIP)—Global and Local Features 3.2 Dataset 3.3 Experimental Setup 4 Results and Discussion 4.1 Global Features Retrieval 4.2 Local Features Retrieval 5 Conclusion References Smart Cattle: Cattle Live Weight Estimation Based on a Deep Learning Approach 1 Introduction 2 Related Works 3 Methods 3.1 Dataset Collection 3.2 Designing the CNN Model 4 Results and Discussion 5 Conclusion References The Design of a New IT Governance Framework to Optimize the Utilization of Information Technology for MSME 1 Introduction 2 Literature Review 2.1 IT Governance Framework 2.2 Micro, Small, Medium Enterprises (MSME) 2.3 Related Research 3 Method 4 Research Framework 4.1 Architecture Readiness 4.2 Technology Adoption 4.3 Service Management 4.4 Continual Improvement 4.5 Leader Involvement 4.6 Network Capability 5 Discussion 6 Conclusion References A Safe Box Safety System with Facial Authentication for Multiple Users 1 Introduction 2 Materials and Methods 2.1 Enrollment Phase 2.2 Authentication Phase 2.3 Internet of Things (IoT) Phase 2.4 Performance Evaluation Phase 3 Results and Discussion 4 Conclusion References Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review 1 Introduction 2 Methodology 3 Result of SLR 3.1 List of Paper Publications 3.2 Result of Individual Study 4 Discussion 5 Conclusion References Movies and Learning: Does Watching Movies Help Students Improve Learn English? 1 Introduction 2 Related Works 3 Methodology 4 Result and Analysis 5 Findings and Discussion 6 Conclusion and Recommendations References Analyzing the Financial Performance of Transportation Companies with Goal Programming Model 1 Introduction 2 Methodology 3 Results and Discussion 4 Conclusion References Virtual Reality Vehicle Inspection Routine (VR-VIR): Evaluation of Technology Acceptance 1 Introduction 2 Literature Review 2.1 Related Work 2.2 Virtual Reality Vehicle Inspection Routine (VR-VIR) 2.3 Technology Acceptance Model (TAM) 3 Methodology 4 Result and Discussion 4.1 Virtual Reality Vehicle Inspection Routine (VR-VIR) 5 Conclusion References Attendance Management System with Half-Covered and Full-Facial Recognition Feature 1 Introduction 2 Related Work 3 Methodology 4 Prototype Design 5 Prototype Testing 6 Conclusion and Future Work References Employing Smart Educational Aids and Multimedia to Teach Reading Skill to Students with Specific Learning Difficulty: Effectiveness Identification and Task Specificity 1 Introduction 2 Introduction 2.1 Related Studies 2.2 Aims of the Study 3 Methodology 4 Analysis 4.1 Performance of the Subjects in the Pre-and- Post-Test: Comparison Between the Treatment and Control Groups 5 Conclusions and Recommendations References Educational Video Production: Literature Review on Issues and Challenges of Digital Video Composition 1 Introduction 1.1 Pre-educational Film Development 1.2 Digital Video Compositing 2 Issues and Challenges of Digital Video Composition in Education 2.1 Review on Related Literature 2.2 Insufficient T&L Quality Approach in Educational Videos 2.3 Visual Aesthetics Recommendation 2.4 Video Length Proxy 2.5 Scant Publications on Innovative Self-directed Learning Tools, Experimental Investigation and Engagement Measurement 3 Identifying the Problems in Educational Video Production 3.1 The Importance of T&L Instruments in Production Value for Educational Video 3.2 The Absence of Curiosity on Tools and Methodological Aspect 3.3 The Pedagogy Approach May Not Be the Right Concept Embedded in Educational Video 3.4 Educators Should Give Learners More Control 4 Conclusions References Fitweet: Arduino-Based Smartwatch for Early Anticipatory Anxiety Notification System 1 Introduction 2 Related Works 2.1 Mental Health Detection in Online Social Networks (OSNs) 2.2 Mental Health Detection Using the Internet of Things (IoT) 3 Methodology 3.1 Data Collection and Labelling 3.2 Data Cleaning and Pre-processing 3.3 Emotion Detection Model (EDM) Training 3.4 Arduino Smartwatch Development 3.5 Body Condition’s Rule-Based Matrix 3.6 Final Rule-Based Matrix 4 System Development 4.1 Web-Based System with Emotion Detection Model (EDM) 5 Results 5.1 Emotion Detection Model (EDM) 5.2 System Testing (UAT) 6 Conclusion References Student’s Mental Health Diagnostic Expert System Using DASS Analysis and Rule-Based Reasoning: A Proposal 1 Introduction 2 Related Works 2.1 Review of Existing Applications 3 Counsellor’s Perception and Experience in Diagnosing Student’s Mental Health 3.1 Interview Findings 3.2 Summary of Findings from Interview and System Development 3.3 Rule-Based Reasoning 4 Identifying the Proposed Mental Health Expert System 4.1 Methodology 4.2 System Architecture 5 Conclusion References Complementary Preparation for Frame Alignment Algorithms Using PYNQ-Z2 FPGA 1 Introduction 2 Hardware 2.1 PYNQ-Z2 FPGA 2.2 Data Flow 3 Methodology 3.1 DNA Sequence to Amino Acid Sequence Conversion 3.2 Amino Acid Sequence to Blosum62 Index Conversion 4 Results and Discussion 4.1 Execution Time and Speedup Test 5 Conclusion References Identification and Analysis of Maize Leaf Diseases and Insect Pests Based on Machine Learning 1 Introduction 2 Application of Traditional Machine Learning 3 Application of Deep Learning in Crop Disease Identification 4 Comparison and Analysis 5 Conclusion References Information Technology Model for Health Sector in Oman 1 Introduction 2 Modern Technology 3 Injecting Information Technology into the Health Sector 4 Methodology 5 Results 6 Discussions 7 Conclusion References A Simulation Approaches in Modelling the Assessment for Evacuation Model 1 Introduction 2 Evacuation Model 3 Modelling Simulation Methodology 3.1 Software and Hardware Requirements 3.2 Level 14 Floor Plan Layout 3.3 Mapping Floor Plan 3.4 Level 14 Simulation Studies 4 Result and Discussion 4.1 Level 14 Simulation Studies Results 4.2 Analysis of the Lowest Average Time Taken Results 5 Conclusion References Gamified Augmented Reality Mobile Application for Tourism in Kuching 1 Introduction 2 Literature Review 3 Research Method 4 Result and Discussion 5 Comparison with Other Works 6 Conclusion and Future Works References Prediction of CO2 Breakthrough Time in Packed Bed Adsorption Column Using Artificial Neural Network 1 Introduction 2 Packed Bed Column Mathematical Model 3 ANN Architecture for CO2 Breakthrough Time Prediction 3.1 CO2 Breakthrough Time Dataset Generation and Preprocessing for ANN 3.2 Topology and Activation Functions for ANN Model 4 Results and Discussion 4.1 Packed Bed Column Mathematical Model Validation 4.2 Effect of Data Transformation Techniques and Activation Functions on the Learning Ability of ANN 4.3 CO2 Breakthrough Time Prediction by Artificial Neural Network 5 Conclusion References A Deep Learning Model with Name Attention to Predict the Stock Trend from News Headline 1 Introduction 2 Related Works 3 Methodology 4 Experiments 5 Conclusions References Hand Gesture Signature Recognition with Machine Learning Algorithms 1 Introduction 2 Related Works 3 The Proposed System 4 Database and Experimental Protocol 5 Performance Results and Discussion 6 Conclusion References Optimization of Convolutional Neural Network in Paddy Disease Detection 1 Introduction 2 Related Works 3 Methods 3.1 Datasets 3.2 Methods 3.3 Optimizing CNN Parameters: Epochs and Dropout Rate 3.4 Efficiency Evaluation of the CNN Model Based on Accuracy 4 Results and Discussion 5 Conclusion References Method Fragments for Service Oriented Architecture Realization: Review and Future Research Directions 1 Introduction 2 Literature Review 3 Results and Analysis 3.1 Service Discovery 3.2 Service Selection 3.3 Service Negotiation 3.4 Supporting Method Fragments 4 Research Directions and Future Aspects 5 Conclusion References Identification of Banana Leaf Diseases and Detection 1 Introduction 2 Related Work 3 Dataset Description 4 Proposed Approach 4.1 Image Resize 4.2 Convolutional Neural Network 4.3 Convolution Layer 4.4 Pooling Layer 4.5 Fully Connected Layer 4.6 Softmax Layer 4.7 Model Training 4.8 Training Settings 4.9 Evaluation Tool 5 Results and Discussion 6 Conclusion References Development of a Detection System for Endangered Mammals in Negros Island, Philippines Using YOLOv5n 1 Introduction 2 Related Literature 2.1 Object Detection Algorithms 2.2 Computer Vision Systems in Animal Detection 3 Methodology 3.1 Proposed System 3.2 Proposed Dataset 3.3 Augmentation 3.4 Data Preparation 3.5 YOLOv5 Architecture 3.6 Activation Function 3.7 Optimization Function 3.8 Loss Function 4 Metrics 4.1 Precision 4.2 Recall 4.3 F1 Score 4.4 Mean Average Precision (mAP) 4.5 Losses 5 Experiment 5.1 Experimental Parameters 5.2 PR Curve 5.3 F1 Score 5.4 Experimental Results 6 Conclusions References A Study on the Performances of the SPRT Control Chart When Estimating Process Parameters 1 Introduction 2 The Working Mechanism of the SPRT Chart 3 Results and Discussions 3.1 Distribution of the CATS for the SPRT Chart with Estimated Process Parameters 3.2 AATS and SDATS of the SPRT Chart with Estimated Process Parameters 3.3 Sample Size Recommendations for the SPRT Chart with Estimated Process Parameters 4 Conclusion References Exploration and Showcase of FSMs and HFSMs Traffic in Low-Cost Educational Driving Simulator 1 Introduction 2 Basis of Implementation 3 Methodology 3.1 Educational Driving Simulator 3.2 Finite State Machine 3.3 Hierarchical Finite State Machine 4 Discussion 4.1 Technology 4.2 Implementation 4.3 Potential Effects 5 Conclusion References An Investigation of the Relationship Between Agricultural Price and Its Determinants in Malaysia 1 Introduction 2 Literature Review 3 Data Collections 4 Methods 4.1 Granger Causality Tests 4.2 Co-integration Tests 5 Results 5.1 Data Preparation 5.2 Granger Causality Test 5.3 Johansen Cointegration Test 6 Conclusion References Hybrid Wireless Home Security System Using Bluetooth and IoT Technologies 1 Introduction 2 System Architecture 2.1 Targeted Home Concept 2.2 Hardware Description 2.3 Software Description 3 Result Demonstration 3.1 Hardware Prototype 3.2 Bluetooth Application (Low-End Function) 3.3 IoT Platform (High-End Function) 4 Conclusion References The Perspectives on Developing a Conceptual Model for Exploring Emergent Behaviors in Complex Systems 1 Introduction 2 Related Work on Modelling Emergent Behavior 3 Discussion 4 Perspectives for Developing Conceptual Model 4.1 Types of Emergent Behavior 4.2 Potential Source of the Existences 4.3 The Related Artifacts 4.4 The Stakeholders’ Knowledge 5 Conclusion References Performance Analysis of Transformerless Photovoltaic Three-Phase Inverter Using Sinusoidal Pulse Width Modulation (SPWM) Method 1 Introduction 2 Methodology 3 Results and Discussion 3.1 Output Performance of Photovoltaic 3.2 Output Performance of Inverter 3.3 Output Performance of Inverter 4 Conclusion References Long COVID Emotion Analyzer: Using Machine Learning Approach 1 Introduction 2 Literature Review 3 Issue to Be Addressed 4 Methodology 5 Results 6 Discussion 7 Conclusion References A Study on Strain-Based Elements for Solid Mechanics: Initial Formulation 1 Introduction 2 Related Works 3 Methodology 4 Simulation Setup 5 Results and Discussion 6 Conclusion References A Blockchain-Based E-Voting System 1 Introduction 1.1 Security Prerequisites 2 Literature Review 2.1 Cryptographic Based Approach 2.2 Blockchain Technology 3 Proposed Solution 3.1 Ethereum 3.2 Tools and Languages 4 Implementation 4.1 Database 4.2 Smart Contract 4.3 Ganache and Metamask Setting 5 Result and Findings 5.1 Security Fulfillment 5.2 Smart Contract Evaluation 6 Conclusion and Future Works References Equipment Failure Analysis for Oil and Gas Industry with an Ensemble Predictive Model 1 Introduction 2 Literature Review 2.1 Predictive Analytics 2.2 Applications of Failure Analysis 3 Methodology 3.1 Unsupervised Learning 3.2 Sequential Minimal Optimization 3.3 Ensemble Learning 4 Experimental Setup 4.1 Dataset Description 4.2 Classifiers Selected 4.3 Data Preprocessing, Training and Evaluation 5 Results 6 Discussion 7 Conclusion References Classification of Oil Palm Fresh Fruit Bunches (FFB) Based on Its Maturity Colour Using Convolutional Neural Network (CNN) Approach 1 Introduction 2 Related Works 3 Methods 3.1 Datasets 3.2 Designing the Convolutional Neural Network (CNN) Architecture 4 Results and Discussion 5 Conclusion References Copy-Move Forgery Detection Using Canny Edge Detector and SIFT-Based Blob Analysis 1 Introduction 2 Related Works 3 Proposed Method 4 Preprocessing 5 SIFT Feature Generation 5.1 Scale-Space Extrema Detection 5.2 Key Point Localization 6 Blob Detection 6.1 Advantage of Using Blobs in Copy-Move Forgery 6.2 Identifying SIFT Interest Points Located Within the Same Blob 7 Feature Matching and Forgery Detection 8 Experimental Results 8.1 Description of Datasets and Metrics Used for the Evaluation 8.2 Results 9 Conclusion References An Optimization for Access Point Placement in Indoor Communication 1 Introduction 2 Materials and Methods 2.1 Network Model and Tools 2.2 Problem Investigation 2.3 Performance Evaluation 3 Results and Discussions 3.1 Network Availability Issues Analysis 3.2 Performance Evaluation 3.3 Optimized Design of the Proposing Network Model. 3.4 Comparison of the State of the Art 4 Conclusions and Future Work References The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation 1 Introduction 2 Related Works 3 Proposed Hybrid of IFDO-WOABAT Algorithm 3.1 Evaluation and Experiment Setting on Function Optimization 3.2 Crowd Evacuation Simulation Experiment 4 Results and Discussions 5 Conclusions and Future Work References Cyberbully Detection Survey: Malay-English Glossary of Cyberbullying Incidents 1 Introduction 2 Related Works in Cyberbullying Prevention 3 Methodology 3.1 Questionnaire Design 3.2 Procedure 4 Results and Analysis 4.1 Demographics Information Section 4.2 Cyberbullying Information Section 4.3 Scenarios Section 5 Threats to Validity 6 Conclusion References VANET Performance Evaluation for Malaysian Urban Federal Highway 1 Introduction 1.1 Background Study 1.2 VANET Communication Architecture 2 VANET Highway Environment Researches 3 VANET Simulation Setup 4 Performance Evaluation Metrics 5 Results and Analysis 5.1 Experiment 1—Obstacle Existence Impact on V2R Communications 6 Conclusion References Design and Development of Maiji Mountain Grottoes Immersive Virtual Reality Learning Environment 1 Introduction 2 Related Works 2.1 Virtual Reality Technology Background 2.2 Virtual Reality for Education 2.3 Virtual Reality for Cultural Heritage or Archaeology 3 Method and Tools 4 Design and Develop 4.1 Interactive Scenes 4.2 Learning-Guide Model 5 Conclusion and Outlook References A Diagnostic Method for Detecting Tomato Leaf Diseases Based on a Deep Learning Approach 1 Introduction 2 Related Works 3 Methods 3.1 Data Collection 3.2 Building CNN Model and Data Modeling 3.3 Model Optimization 3.4 Model Assessment 4 Results and Discussion 5 Conclusion References