<span>This book constitutes the refereed proceedings of the 8th International Conference on Information, Communication and Computing Technology, ICICCT 2023, held in New Delhi, India, during May 27, 2023.<br>The 14 full papers included in this book were carefully reviewed and selected from 60 submis
Information and Communication Technology and Applications: Third International Conference, ICTA 2020, Minna, Nigeria, November 24–27, 2020, Revised ... in Computer and Information Science)
✍ Scribed by Sanjay Misra (editor), Bilkisu Muhammad-Bello (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 762
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes revised selected papers from the Third International Conference on Information and Communication Technology and Applications, ICTA 2020, held in Minna, Nigeria, in November 2020. Due to the COVID-19 pandemic the conference was held online.
The 67 full papers were carefully reviewed and selected from 234 submissions. The papers are organized in the topical sections on Artificial Intelligence, Big Data and Machine Learning; Information Security Privacy and Trust; Information Science and Technology.
✦ Table of Contents
Preface
Welcome Message
Organization
Abstracts of Keynotes
Artificial Intelligence for Industry and Environment
Covid-19: A Personal Impact Assessment
Modern Challenges in Computational Science
Contents
Artificial Intelligence, Big Data and Machine Learning
Multi-class Model MOV-OVR for Automatic Evaluation of Tremor Disorders in Huntington’s Disease
1 Introduction
2 Materials and Methods
2.1 Test Subjects, Procedure and Data Set
2.2 Problems for Fingers
2.3 Archimedean Spiral Trajectory
2.4 Multi-class SVM Model
3 Experimental Results
4 Conclusion
References
Application of Big Data Analytics for Improving Learning Process in Technical Vocational Education and Training
1 Introduction
2 Literature Review
2.1 Conceptual Framework
2.2 Social Constructivist Theory
2.3 Concept and Benefit of Big Data in Education
2.4 Big Data Analytics Techniques in Education
2.5 Big Data Analytics in the Context of TVET Education
2.6 Summary of Literature Review
3 Methodology
4 Results and Discussion
4.1 Research Question 1
4.2 Research Question 2
4.3 Discussion of Findings
5 Conclusion
6 Recommendations
References
A Survey for Recommender System for Groups
1 Introduction
2 Related Works
3 Elicitation of Preference
3.1 Acquisition of Preferences Without Explicit Specification
3.2 Acquisition of Preferences with Explicit Specification
3.3 Adapting Preference Specification to the Requirements of Group Recommendation
4 Techniques for Elicitation of Preference
4.1 Techniques Based on Machine Learning Approaches
4.2 Techniques Based on Interaction Mode
4.3 Techniques Based on Algorithm
4.4 Techniques Based on Reviews
5 Categorization of Strategies
6 Strategies in Applications
7 Conclusion
References
Prediction of Malaria Fever Using Long-Short-Term Memory and Big Data
1 Introduction
2 Big Data in the Healthcare System
2.1 Clinical Data
2.2 Environmental Data
3 Methodology
3.1 The Staging Procedure of LSTM Is as Follows
3.2 Model
4 Results and Discussion
4.1 Performance Evaluation Metrics
5 Conclusions
References
Improving the Prediction Accuracy of Academic Performance of the Freshman Using Wonderlic Personnel Test and Rey-Osterrieth Complex Figure
1 Introduction
1.1 IQ Test and CGPA
1.2 ROCF and Academic Performance
1.3 Linear Regression to Predict Academic Performance
2 Methodology
2.1 Ethics and Standards
2.2 Participants
2.3 The Wonderlic Personnel Test
2.4 ROCF
2.5 Dataset Formation
3 Results
3.1 Bivariate Correlation
3.2 Regression Analysis
3.3 Testing Models
4 Discussion
5 Conclusion
References
Comparative Analyses of Machine Learning Paradigms for Operators’ Voice Call Quality of Service
1 Introduction
2 Literature Review
3 Method, Materials, Results and Discussion
3.1 Data Collection
3.2 Description of Dataset and Classification Techniques
3.3 Classification Techniques
3.4 Description of Performance Evaluation Techniques
3.5 Results and Discussion
3.6 Validation of Data Collection Techniques Using Correlation Model
4 Conclusion and Recommendation
References
LearnFuse: An Efficient Distributed Big Data Fusion Architecture Using Ensemble Learning Technique
1 Introduction
2 Related Works
3 Methodology and Materials
3.1 Dataset and Study Area
3.2 Materials and Algorithms
4 Results and Discussion
5 Conclusion and Future Works
References
A Gaussian Mixture Model with Firm Expectation-Maximization Algorithm for Effective Signal Power Coverage Estimation
1 Introduction
2 Materials and Method
2.1 Sample Data
2.2 The Gaussian Mixture Model
2.3 The Expectation Maximization Algorithm
3 Results and Discussion
4 Conclusion and Future Work
References
Analysis and Classification of Biomedical Data Using Machine Learning Techniques
1 Introduction
2 Literature Survey
3 Materials and Methodology
3.1 Dataset
3.2 Performance Evaluation
3.3 Accuracy
3.4 Recall
3.5 Precision
3.6 F1 Score
4 Implementation
4.1 K- Nearest Neighbor
4.2 Naïve Bayes
4.3 Random Forest
4.4 Correlation
4.5 Count of Non-cancer and Cancer
5 Results and Discussion
6 Conclusion and Future Scope
References
Emotion Recognition of Speech in Hindi Using Dimensionality Reduction and Machine Learning Techniques
1 Introduction
2 Literature Survey
3 Methodology
3.1 Speech Corpora
3.2 Feature Extraction
3.3 Feature Selection
4 Results and Discussions
5 Conclusion and Future work
References
Application of Supervised Machine Learning Based on Gaussian Process Regression for Extrapolative Cell Availability Evaluation in Cellular Communication Systems
1 Introduction
2 Materials and Methods
2.1 Concept of Service Availability
2.2 The Five-Nine: Service Availability Targets
2.3 Gaussian Regression Process
2.4 GPR Approximation Methods
2.5 Service Availability Data and GPR Approximation Selection Algorithm
3 Results and Discussion
4 Conclusion
References
Anomaly Android Malware Detection: A Comparative Analysis of Six Classifiers
1 Introduction
2 Related Works
3 The Methodology
3.1 The Detection Framework
3.2 Data Collection and Extraction
3.3 The Classification Algorithms
4 Results Analysis and Discussion
4.1 Naive Bayes Results Analysis
4.2 Simple Logistic Results Analysis
4.3 Random Forest Results Analysis
4.4 PART Results Analysis
4.5 Results Analysis for Support Vector Machine (SVM)
4.6 Results Analysis for k-Nearest Neighbours (kNN)
4.7 Comparison Analysis of the Heterogeneous Predictive Models
4.8 Comparison of Best Developed Models with Existing Works
5 Conclusion
References
Credit Risk Prediction in Commercial Bank Using Chi-Square with SVM-RBF
1 Introduction
2 Related Works
3 Materials and Methods
3.1 Bank Credit Scoring Benefits
3.2 Data Mining
3.3 Dataset
3.4 Method
3.5 Chi-Square Algorithm
3.6 Support Vector Machine (SVM)
3.7 Evaluation
4 Results and Discussions
5 Conclusion
References
A Conceptual Hybrid Model of Deep Convolutional Neural Network (DCNN) and Long Short-Term Memory (LSTM) for Masquerade Attack Detection
1 Introduction
2 Literature Review
2.1 Computer Security Attacks
2.2 Machine Learning, Deep Learning and Deep Neural Network
2.3 Review of Related Works
2.4 Research Gap
3 The Proposed Hybrid Deep Neural Network Masquerade Detection Model
3.1 Research Approach
3.2 The Tokenization Layer
3.3 The Vectorization Layer
3.4 Convolution Layer
3.5 Max-Pooling Layer
3.6 The LSTM Layer
3.7 Model Training
4 Implementation and Evaluation Plan
4.1 Proposed Implementation
4.2 Performance Metrics
5 Conclusion
References
An Automated Framework for Swift Lecture Evaluation Using Speech Recognition and NLP
1 Introduction
1.1 Purpose of the Study
2 Review of Related Literature
3 Instruments
3.1 Programming Tools
3.2 NLP Text Processing
4 Methodology
4.1 Overview of the Framework
4.2 Process Flow in the Framework
5 Experiment
6 Results
6.1 Accuracy of Conversion
6.2 Results of the Experiment
7 Discussion and Conclusion
8 Future Researches
References
DeepFacematch: A Convolutional Neural Network Model for Contactless Attendance on e-SIWES Portal
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Acquisition and Augmentation
3.2 DeepFacematch Model Design
3.3 Contactless Attendance App Based on DeepFacematch and Location API
4 Experimental Results and Discussion
5 Conclusion
References
Hausa Intelligence Chatbot System
1 Introduction
2 Literature Review
2.1 Text Based Chatbots
2.2 Voice Based Chatbots
3 Methodology
3.1 System Analysis
3.2 System Design
4 System Testing and Validation
4.1 System Testing
4.2 Validation
5 Conclusion
References
An Empirical Study to Investigate Data Sampling Techniques for Improving Code-Smell Prediction Using Imbalanced Data
1 Introduction
2 Related Work
3 Research Methods
3.1 Experimental Dataset
3.2 Software Metrics
3.3 Data Sampling Techniques to Handle Imbalanced Data
3.4 Feature Selection Techniques
3.5 Classification Algorithms
4 Research Framework
5 Experiment Results
6 Comparison
7 Conclusion
References
A Statistical Linguistic Terms Interrelationship Approach to Query Expansion Based on Terms Selection Value
1 Introduction
2 Review of Related Work
3 Methodology
3.1 Proposed Approach
4 Experiments Results and Discussion
4.1 Experiments Results
4.2 Discussion
5 Conclusion and Future Work
References
Validation of Student Psychological Player Types for Game-Based Learning in University Math Lectures
1 Introduction
2 Methodology
2.1 Outline
2.2 Game-Based Learning
2.3 HEXAD Questionnaire and the Psychological Player Types
2.4 Correlation Analysis
2.5 PCA Analysis
2.6 Factor Analysis
3 Results
3.1 Data Collection
3.2 Statistical Analysis
3.3 Results of Correlation Analysis
3.4 Results of PCA Analysis
3.5 Results of Factor Analysis
3.6 Evaluation of Reliability
4 Conclusion
References
Outlier Detection in Multivariate Time Series Data Using a Fusion of K-Medoid, Standardized Euclidean Distance and Z-Score
1 Introduction
2 Related Work
3 Methodology
3.1 Data Acquisition
3.2 Data Selection
3.3 Data Clustering (K-Medoid)
3.4 Object Distance
3.5 Distance Summation
3.6 Outlier Detection Techniques
3.7 Performance Metrics
3.8 Algorithm Fusion
4 Results and Discussion
5 Conclusion
6 Future Works
References
An Improved Hybridization in the Diagnosis of Diabetes Mellitus Using Selected Computational Intelligence
1 Introduction
2 Related Work
3 An Overview of the Techniques
3.1 Brief Description of Some Computational Intelligence Techniques Used
3.2 Genetic Algorithm
3.3 Genetic-Neuro-Fuzzy Inference System (GNFIS)
4 Methodology
4.1 Model Diagram
4.2 Data Used for the System
5 Result and Discussion
5.1 Performance Evaluation Metrics
5.2 Genetic Neuro-Fuzzy Inference Diagnostic System Experimental Results
6 Conclusion and Recommendation
References
Optimizing the Classification of Network Intrusion Detection Using Ensembles of Decision Trees Algorithm
1 Introduction
2 Related Works
3 The Methods and Materials
3.1 Network Intrusion Detection System Data Set
3.2 C4.5 Decision Trees Classifier
3.3 Ensemble Models
3.4 Ensemble Model Simulation
3.5 Validation of the Classification Model
4 Results and Discussion
4.1 Data Identification and Collection Results
4.2 Simulation of Ensemble NIDS Results
4.3 Results of Validation of Ensemble NIDS
5 Conclusion
References
Identification of Bacterial Leaf Blight and Powdery Mildew Diseases Based on a Combination of Histogram of Oriented Gradient and Local Binary Pattern Features
1 Introduction
2 Related Work
3 Methodology
3.1 Data Collection (Image Acquisition)
3.2 Image Color-Based Segmentation (K-Means Clustering)
3.3 Image Pre-processing
3.4 Feature Extraction
3.5 Feature Normalization
3.6 Feature Combination
3.7 Disease Classification
3.8 Performance Metrics
4 Result and Discussion
5 Conclusion
6 Future Work
References
Feature Weighting and Classification Modeling for Network Intrusion Detection Using Machine Learning Algorithms
1 Introduction
2 Review of Related Literature
3 Materials and Methods
3.1 NIDS System Architecture
3.2 Data Identification and Collection
3.3 The Weighting of Feature Relevance
3.4 Formulation of Classification Model
3.5 Classification Model Evaluation metrics
4 Experimental Setup and Results Discussion
4.1 Results of Feature Selection
4.2 Results of Classification Models
5 Conclusion
References
Spoof Detection in a Zigbee Network Using Forge-Resistant Network Characteristics (RSSI and LQI)
1 Introduction
2 Fundamental Concepts
3 Materials and Method
4 Results and Discussion
5 Summary and Conclusion
References
Face Morphing Attack Detection in the Presence of Post-processed Image Sources Using Neighborhood Component Analysis and Decision Tree Classifier
1 Introduction
2 Related Work
3 Methodology
3.1 Data Collection
3.2 Post-processing (Image Sharpening)
3.3 Face Pre-processing
3.4 Feature Extraction
3.5 Feature Selection
3.6 Image Classification
3.7 Performance Metrics
4 Results and Discussion
5 Conclusion
6 Future Works
References
Enhanced Back-Translation for Low Resource Neural Machine Translation Using Self-training
1 Introduction
1.1 Summary of Contributions
2 Related Works
2.1 Back-Translation
2.2 Forward Translation and Self-training
3 Methodology
3.1 Neural Machine Translation (NMT)
3.2 Overview of the Method
3.3 Data
3.4 Set-Up
4 Experiments and Results
4.1 Forward Translation
4.2 Tagged Forward Translation
4.3 Pre-training and Fine-Tuning
4.4 English Vietnamese (En-Vi)
4.5 Back-Translation
5 Discussion
6 Conclusion and Future Work
References
Information Security Privacy and Trust
SIMP-REAUTH: A Simple Multilevel Real User Remote Authentication Scheme for Mobile Cloud Computing
1 Introduction
2 Related Works
3 Materials and Methods
3.1 User Account
3.2 Password Interface
3.3 Voice Authentication Module
3.4 Face Image Authentication
4 Performance Evaluation
5 Results and Discussion
6 Conclusion
References
Formulation and Optimization of Overcurrent Relay Coordination in Distribution Networks Using Metaheuristic Algorithms
1 Introduction
2 Materials
2.1 Directional Overcurrent Relay Coordination
2.2 The IEEE Standard 15-Bus Radial Network
3 Methods
3.1 OCR Problem Formulation
3.2 Smell Agent Optimization (SAO)
4 Results and Discussion
4.1 Results Analysis on IEEE 15-Bus System
4.2 Results Analysis on IEEE 30-Bus Test
5 Conclusion and Recommendation
References
A Gamified Technique to Improve Users’ Phishing and Typosquatting Awareness
1 Introduction
2 Methodology
2.1 Components of the Proposed System
3 Implementation
4 Results and Discussion
4.1 Testing and Rating
4.2 Discussion of Findings
5 Conclusion
References
Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices
1 Introduction
2 Literature Review
2.1 Ubiquitous Data Protection Issues
2.2 Hardening of Data Encryption Schemes
2.3 Privacy Preservation Approaches
2.4 Related Studies
3 Methodology
3.1 Mathematical Model of the Proposed Sooner Cryptosystem
3.2 Performance Evaluation Parameters
3.3 Experimental Parameters
4 Results
5 Conclusion
References
Comparative Performance Analysis of Anti-virus Software
1 Introduction
2 Review of Related Literatures
3 Malware Detection and Evasion Techniques
4 Materials and Methods
5 Discusion of Results
5.1 Performance Measures
6 Conclusion
References
An Efficient Lightweight Cryptographic Algorithm for IoT Security
1 Introduction
2 Security and Privacy of Internet of Things
3 Methodology
3.1 TEA Encryption Process
3.2 TEA Decryption Process
4 Experimental Results and Discussion
5 Conclusion
References
Analysis and Classification of Some Selected Media Apps Vulnerability
1 Introduction
2 Related Works
2.1 Justification of the Study
3 Methodology
3.1 Experiment Setting
3.2 Materials
3.3 Classification Algorithms
4 Results and Discussion
4.1 Performance Metrics
4.2 Results Presentation
4.3 Result Discussion
5 Conclusion
6 Recommendation
References
Appraisal of Electronic Banking Acceptance in Nigeria Amidst Cyber Attacks Using Unified Theory of Acceptance and Use of Technology
1 Introduction
2 Literature Review
2.1 Cyber Attacks
3 Methodology
3.1 Research Design
3.2 Population of the Study
3.3 Data Collection
3.4 Research Model
4 Result and Discussion
5 Conclusion
References
Information Science and Technology
A Scoping Review of the Literature on the Current Mental Health Status of Developers
1 Introduction
2 Preliminaries
2.1 Affect
2.2 Happiness
2.3 Software Development Life Cycle
2.4 Qualitative Research
2.5 Quantitative Research
2.6 Mixed Method Research
2.7 Open-Closed Ended Questions
3 Related Works
4 Development of Hypotheses
5 Conclusion
References
Gamifying Users’ Learning Experience of Scrum
1 Introduction
2 Background
3 Related Work
4 ScrumGame
5 Experimental Results
5.1 Setup
5.2 Pre-test and Post-test
5.3 Psychological Variables Under Study
5.4 Hypothesis Statement
6 Analysis of Results
7 Conclusions
References
Visualizing Multilevel Test-to-Code Relations
1 Introduction
2 Visualization Approach
3 Implementation and Possible Usage
4 Evaluation
5 Related Work
6 Conclusion and Future Work
References
Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future Direction
1 Introduction
2 Literature Review
2.1 Related Studies
2.2 Mapping of the Study
3 Review Methodology
3.1 Research Questions
4 Results and Discussion
4.1 Current Trends
4.2 Challenges and Issues of Mobile-Based Learning System and Its Applications
4.3 Existing Methodology and Solutions to Privacy and Security
4.4 Opportunities and Future Directions
4.5 Future Directions
5 Conclusion
References
Drug Verification System Using Quick Response Code
1 Introduction
2 Related Works
3 Proposed Mobile Application Framework
4 Proposed Mobile Application Requirements
4.1 System Algorithm
4.2 System Algorithm
5 Implementation
6 Conclusion
7 Future Work
References
A Novel Approach to News Archiving from Newswires
1 Introduction
1.1 Problem Statement
2 Related Work
3 Materials and Methods
3.1 Relevance Marking
3.2 News Extraction
3.3 Indexing and Search
4 Results and Discussion
4.1 Implementation
4.2 Experimental Data Source
4.3 Experimental Results
4.4 Evaluation
5 Conclusion
References
Mobile Application Software Usability Evaluation: Issues, Methods and Future Research Directions
1 Introduction
2 Literature Review
2.1 The Concept of Software Usability
2.2 Mapping Studies
2.3 Justification for the New Study
3 Research Methodology
4 Results of the Study
4.1 Present State of Mobile Application Usability Evaluation
4.2 Usability and Accessibility Evaluation Methods
4.3 Problems of Usability and Accessibility Evaluation of Mobile Applications
4.4 Future Focus of Mobile Applications Usability Evaluations
5 Conclusion
References
Perception of Social Media Privacy Among Computer Science Students
1 Introduction
2 Related Work
3 Methodology
4 Questionnaire Analysis
4.1 Characteristics of Respondents
4.2 Type of Device Owned
4.3 Frequency of Use
4.4 Privacy Policies and Settings
4.5 Students’ Gender and Social Media Privacy Features
4.6 Students’ Age Range and Enabled Privacy Settings
4.7 Most Used Social Media Site and Privacy Settings
4.8 Discussion of Findings
5 Conclusion
References
An Efficient Holistic Schema Matching Approach
1 Introduction
2 Related Work
3 Problem Statement
4 The hMatcher Approach
4.1 The Frequent Elements Generator
4.2 The Schema Matcher
4.3 The Rare Elements Matcher
5 Experiments and Evaluations
5.1 Datasets
5.2 Measures
5.3 Results and Discussions
6 Conclusion and Future Work
References
AnnoGram4MD: A Language for Annotating Grammars for High Quality Metamodel Derivation
1 Introduction
2 Background
2.1 Elements of a Software Language
2.2 Grammars
2.3 Metamodels
2.4 Annotations
3 AnnoGram4MD
3.1 Abstract and Concrete Syntaxes
3.2 Case Study
3.3 Semantics Domain
3.4 Semantics Mapping
4 Related Works
5 Conclusions
References
Design and Implementation of an IoT Based Baggage Tracking System
1 Introduction
2 Background
3 Literature Review
3.1 Internet of Things (IoT)
3.2 Radio-Frequency Identification (RFID)
3.3 Related Studies on IoT Based Baggage Tracking System
3.4 The Problem
4 System Description
5 Materials and Methods
5.1 Circuit Design and Simulation
6 Testing and Results
7 Conclusion
References
Validation of Computational-Rabi’s Driver Training Model for Prime Decision-Making
1 Introduction
2 Method
2.1 Computational-Rabi’s Driver Training (C-RDT) Model
2.2 Validation of C-RDT Model
2.3 Game Simulator
2.4 Instrument
2.5 Experimental Procedures
3 Results and Discussions
3.1 Simulator Analysis
3.2 The Questionnaire Analysis.
4 Conclusion
References
Efficient Approaches to Agile Cost Estimation in Software Industries: A Project-Based Case Study
1 Introduction
2 Related Work
3 Methodology
3.1 Data Collection
4 Discussion and Analysis
5 Conclusion
References
Efficient Traffic Control System Using Fuzzy Logic with Priority
1 Introduction
2 Literature Review and Contributions
3 Materials and Method
4 Simulations, Results and Discussions
4.1 Simulation Graphs
5 Conclusions and Future Research Direction
References
An Enhanced WordNet Query Expansion Approach for Ontology Based Information Retrieval System
1 Introduction
2 Related Works
3 Framework of Ontology Based Information Retrieval (IR) System
4 Enhanced Wordnet Query Expansion
5 Results and Discussion
6 Conclusion and Future Work
References
Design of a Robotic Wearable Shoes for Locomotion Assistance System
1 Introduction
2 Related Work
3 Materials and Methods
3.1 A Modeling Architecture of Human-Robotic Joint Alignments
3.2 Hardware System Design and Implementation of Human-Robotic Shoes
4 Results and Discussion
4.1 System Performance Evaluation
4.2 Evaluation Analysis
5 Conclusion
References
Design of Cash Advance Payment System in a Developing Country: A Case Study of First Bank of Nigeria Mortgages Limited
1 Introduction
2 Literature Review
3 Materials and Method
4 System Implementation and Evaluation
4.1 The New System Analysis
5 Conclusion and Recommendation
References
Users’ Perception of the Telecommunication Technologies Used for Improving Service Delivery at Federal University Libraries in Anambra and Enugu State
1 Introduction
2 Review of Related Literature
3 Presentation and Analysis of Data
4 Discussion of Major Findings
5 Conclusion
References
A Step by Step Guide for Choosing Project Topics and Writing Research Papers in ICT Related Disciplines
1 Introduction
2 Selection of Topic/Area of Research
2.1 Area of Interest – Should be of Your Interest
2.2 Problem depending on Duration of Project
2.3 Hot Topics on Current Issues
2.4 Related to the Job Market
2.5 Long Term Vision for Your Carrier
2.6 Selection of Topic and Supervisor
3 Review of Literature
3.1 Prepare Search String – This Can Be Done in the Following Way
3.2 Search Selection Procedure
4 Components of Paper
4.1 Title of the paper
4.2 Abstract
4.3 Introduction
4.4 Literature Review/State of the art
4.5 Materials and Methods/ Research Methodology/Proposed Work/Solution (Design/Framework/Model)
4.6 Evaluation and Validation
4.7 Conclusion and Future work
4.8 References
4.9 Appendix
5 Types of Review Papers
5.1 Comment Paper
5.2 Review/Analysis Paper Paper
5.3 Meta-Analysis and Survey
5.4 Systematic Literature Review
6 After Completing Work-Searching of Conferences and Journal
7 Conclusion
Appendix
References
Author Index
📜 SIMILAR VOLUMES
<span>This book constitutes the refereed proceedings of the 6th International Conference on New Trends in Information and Communications Technology Applications, NTICT 2022, held in Baghdad, Iraq, during November 16–17, 2022. <br>The 14 full papers included in this book were carefully reviewed and s
<span>This book constitutes refereed proceedings of the 5th International Conference on New Trends in Information and Communications Technology Applications, NTICT 2021, held in Baghdad, Iraq, in November 2021. <br>The 13 full papers presented were thoroughly reviewed and selected from 52 qualified
<span>This book constitutes refereed proceedings of the 9th Conference on Information and Communication Technologies of Ecuador, TICEC 2021, held at the Universidad Politécnica Salesiana (UPS) campus in November 2021. The conference was organized in hybrid mode.<br>The 24 full papers were carefully
<span>This book constitutes refereed proceedings of the Third International Conference on Computer and Communication Engineering, CCCE 2023, held in Stockholm, Sweden, in March 2023.<br>The 18 full papers presented were carefully reviewed and selected from 36 submissions. The papers are organized in
<span>This book constitutes the proceedings of the 18th International Conference, ICTERI 2023, held in Ivano-Frankivsk, Ukraine, during September 18–22, 2023.</span><p><span>The 21 full papers included in this volume were carefully reviewed and selected from 90 submissions. The volume focuses on res