𝔖 Scriptorium
✦   LIBER   ✦

📁

Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (Studies in Computational Intelligence, 951)

✍ Scribed by Roger Lee (editor), Jong Bae Kim (editor)


Publisher
Springer
Year
2021
Tongue
English
Leaves
248
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This edited book presents scientific results of the 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2021-Winter) which was held on January 28–30, at Ho Chi Minh City, Vietnam. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way and research results about all aspects (theory, applications, and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.
The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members ofthe program committee and underwent further rigorous rounds of review. From this second round of review, 18 of most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.

✦ Table of Contents


Preface
Contents
Contributors
A Study on the Analysis and Classification of Security Threats According to the Characteristics of Public Service Computer Network
1 Introduction
2 Related Study
2.1 Characteristics of Security Threats
2.2 Current State of Public Service Network Separation Technology
3 Research Method
3.1 Public Service Network Structure
3.2 Procedure to Establish the Scenario
3.3 Scenario-Based Security Training
3.4 Framework to Cope with Security Threats to Public Service
4 Conclusions
References
Understanding Factors Influencing Intention to Use E-government Services in Vietnam: Focused on Privacy and Security Concerns
1 Introduction
2 Literature Review
2.1 Privacy and Security in E-government
2.2 Trust in E-government
2.3 TAM and E-government
3 Research Model and Hypotheses
4 Data Analysis
5 Conclusions
References
An Empirical Study of Prioritization Decision on the Establishment of Distribution Public Big Data Systems
1 Introduction
2 Literature Review
2.1 Big-Data Platform: Technical Structure of Distribution Big-Data
2.2 Establishment Factor of Distribution Public Data System
2.3 Expert Opinion Mining
3 Research Design
3.1 Definition of Cluster and Sub-task
4 Empirical Analysis
4.1 AHP Analysis
4.2 ANP Analysis
4.3 Hierarchical Construct Model Analysis
5 Conclusions
5.1 Research Summary and Implication
5.2 Research Limitation and Future Challenges
References
A Study on the Structural Relationship Between Social Capital, Dynamic Capability and Business Performance in the Supply Chain Environment
1 Introduction
2 Theoretical Background and Hypotheses
2.1 Social Capital
2.2 Dynamic Capabilities
3 Research Method
3.1 Data Collection
3.2 Measurement
4 Empirical Analysis
4.1 Testing the Measurement Model and Structural Model
4.2 Hypothesis Testing
5 Conclusions
References
Design and Implementation of 3-Phase Home Plugin Gateway PLC Router System
1 Introduction
2 Background
3 Design and Implementation of 3-Phase Home Plugin Gateway PLC Router System
3.1 System Model
3.2 3-Phase Home Plug-In Gateway PLC Router System Evaluation
3.3 Smart Grid Demonstration Complex Operation Management System
4 Conclusion
References
Study of Malicious Script Analysis Methodology via GBM
1 Introduction
2 Malware Trends and Analysis Environment
2.1 Information Service Trends
2.2 Malware Trends
2.3 Malware Analysis Environment
3 Machine Learning
3.1 Machine Learning Usage
3.2 Machine Learning Requirement
4 Supervised Machine Learning for Script Malware Detection
4.1 Security Environment Analysis
4.2 Learning Element Extractioning
5 Implement
5.1 Implement Environment
5.2 Detection Rate by Learning Model
5.3 Detection Rate Analysis
6 Conclusion
References
Model of Factors Influencing the EWOM Writing Intention of E-commerce Customers in Vietnam
1 Introduction
2 Theoretical Background and Hypotheses
2.1 WOM and eWOM
2.2 Online Consumer Reviews as Electronic Word of Mouth
2.3 Theory of Planned Behavior (TPB)—Its Effect on the Behavior Intention
2.4 Determinants for Attitude of a Buyer to Write an eWOM for an E-commerce Product/Service
3 Research Method and Measurement
3.1 Sample and Data Collection
3.2 Measures
3.3 Sample and Data Collection
3.4 Results
4 Discussion
5 Conclusion
References
Study on the Impact of Activity-Based Flexible Office Characteristics on the Employees’ Innovative Behavioral Intention
1 Introduction
2 Theoretical Background
2.1 A-FO Model
2.2 Socio-Technical Systems
2.3 Need–Supply Fit Theory
2.4 Job Demands-Resources Theory
2.5 IT Infrastructure
2.6 Media Richness Theory
2.7 Investment Theory of Creativity
3 Research Design
3.1 Variable Settings
3.2 Research Model
3.3 Definition of Variables
4 Empirical Analysis
4.1 Data Collection
4.2 Sample Characteristics
4.3 Exploratory Factor Analysis and Reliability Verification
4.4 Confirmatory Factor Analysis
4.5 Verification of Structural Equation Model Fit
4.6 Verification of the Research Model
5 Conclusion
References
The Effects of Rapport-Building on Customer Attitude and Loyalty in Medical Service
1 Introduction
2 Theoretical Background and Hypotheses
2.1 Medical Service
2.2 Rapport-Building Behaviors
2.3 Customer Attitude
2.4 Relationships Among Rapport-Building Behaviors, Customer Attitudes, and Customer Loyalty
3 Research Method
4 Analysis and Results
5 Conclusions
References
Design and Implementation of Open Source Based on IoT and Robot Manipulator Arm Training Equipment
1 Introduction
2 Background
3 Design and Implementation of the IoT Platform Education System Based on Open Source Hardware
3.1 System Structure
3.2 Hardware Design
3.3 Software Design
3.4 Implementation of Raspberry Pi Gateway
4 Testing and Evaluation
5 Conclusion
References
A Study on Improved Authentication Technique in Cloud Computing
1 Introduction
2 Cloud Computing
2.1 Cloud Computing Models
3 Cloud-Based User Authentication Technique
3.1 2-Tier User Authentication Technique
4 Performance Evaluation
4.1 Experimental Environment
4.2 Performance Analysis
5 Conclusion
References
A Study on Drum Transcription Using Machine Learning Focused on Discrimination of Acoustic Drum and Electronic Drum Sound
1 Introduction
2 Research Background
2.1 Music Information Retrieval(MIR) Research
2.2 Drum Transcription Research
2.3 Issue on Drum Transcription
3 Research Methods
3.1 Data Collection
3.2 Experimental Environment
3.3 Data for Machine Learning
4 Experiment Result
4.1 Spectrogram Build
4.2 Training
4.3 Test Result
5 Conclusions
5.1 Research Summary and Implication
5.2 Future Challenges and Discussion Topics
References
Remeasurement Dispatching Rule for Semiconductor EDS Process
1 Introduction
1.1 Research Background and Purpose
1.2 Research Method and Scope
2 Previous Research
3 Definition of the Problem
4 Algorithm
4.1 The Solution Spaces
4.2 GAPM Algorithm
5 Simulation
5.1 Simulation Modeling
5.2 Evaluation of GAPM Algorithm
6 Conclusions
References
Fall Detection Method Based on Pose Estimation Using GRU
1 Introduction
2 Related Work
3 Vision Based Fall Detection
3.1 Algorithm
3.2 Feature Extraction for HSGC
4 Experiments
4.1 Pose Dataset
4.2 Sequential Dataset
4.3 GRU Training and Classification
4.4 Experimental Configuration
5 Results
6 Conclusions
Reference
Stacked-Autoencoder Based Anomaly Detection with Industrial Control System
1 Introduction
2 Related Work
2.1 ICS Dataset
2.2 Anomaly Detection
3 Proposed Model
3.1 SAE Based Anomaly Detection
3.2 Deep SVDD Based Anomaly Detection
4 Unknown Attack Detection Results
4.1 Result of SAE
4.2 Result of Deep SVDD
4.3 Overall Result
5 Conclusions
References
A Study on Intention to Participate in Blockchain-Based Talent Donation Platform
1 Introduction
2 Theoretical Background
2.1 Talent Donation Definition
2.2 Similar Concept of Talent Donation
2.3 Talent Donation Platform
2.4 Blockchain
3 Research Design
3.1 Research Model
3.2 Research Hypothesis
3.3 Operational Definition of Variables
4 Empirical Data Analysis
4.1 Exploratory Factor Analysis
4.2 Confirmation Factor Analysis
4.3 Discriminant Validity
4.4 Hypothesis Test
5 Conclusion
References
The Effects of Product’s Visual Preview and Customer Review on Sale Performance in Mobile Commerce
1 Introduction
2 Literature Review
2.1 Visual Preview Attributes and Sale Performance
2.2 Review Attributes and Sale Performance
2.3 Stimulus-Organism-Response(S-O-R) Model
3 Research Design
4 Empirical Data Analysis
4.1 Data Collection
4.2 Image Attributes Extraction
4.3 Review Aspect Extraction and Sentiment Mining
4.4 Data Preprocessing and Coding
4.5 Regression Analysis
5 Conclusions
5.1 Research Summary and Implication
5.2 Limitations
References
A Study on Factors Affecting the Intention to Use Library Information System
1 Introduction
2 Theoretical Background
2.1 Status and Concepts Definition
2.2 Literature Review
3 Research Design
3.1 Extracting Factors Using Delphi
3.2 Analytic Hierarchy Process
3.3 Structural Equation Model and Hypothesis
4 Empirical Data Analysis
4.1 Data Collection
4.2 Reliability and Convergence Validity
4.3 Model Fit and Discriminant Validity
4.4 Hypothesis Test
5 Conclusions
References
Author Index


📜 SIMILAR VOLUMES


Software Engineering, Artificial Intelli
✍ Roger Lee (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book presents scientific results of the 22nd ACIS International Fall Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2021-Fall) which was held on November 24–26, 2021, at Taichung, Taiwan. The aim of this conference w

Software Engineering, Artificial Intelli
✍ Roger Lee (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book presents scientific results of the 22nd ACIS International Fall Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2021-Fall) which was held on November 24–26, 2021, at Taichung, Taiwan. The aim of this conference w

Software Engineering, Artificial Intelli
✍ Igor Crk, Chris Gniady (auth.), Roger Lee, Naohiro Ishii (eds.) 📂 Library 📅 2009 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p><P>The purpose of the 10<SUP>th</SUP> Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2009) to be held on May 27 – 29, 2009 in Daegu, Korea is to bring together scientist, engineers, computer users, students to share their experienc

Software Engineering, Artificial Intelli
✍ Shorta Nakashima, Shenglin Mu (auth.), Roger Lee (eds.) 📂 Library 📅 2013 🏛 Springer International Publishing 🌐 English

<p>This edited book presents scientific results of the 14th ACIS/IEEE International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2013), held in Honolulu, Hawaii, USA on July 1-3, 2013. The aim of this conference was to bring togethe

Software Engineering, Artificial Intelli
✍ Roger Lee, Jong Bae Kim 📂 Library 📅 2022 🏛 Springer 🌐 English

<div>This edited book presents scientific results of the 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2021-Winter) which was held on January 28–30, at Ho Chi Minh City, Vietnam. The aim of this conferen

Software Engineering, Artificial Intelli
✍ Roger Lee 📂 Library 📅 2022 🏛 Springer 🌐 English

Presents scientific results of the 22nd ACIS International Fall Virtual Conference Covers many aspects of computer science and discusses the practical challenges encountered and the solutions adopted Includes, topics such as component-based software engineering, software specification and arch