001454500 000__ 07469cam\a2200649\i\4500 001454500 001__ 1454500 001454500 003__ OCoLC 001454500 005__ 20230314003215.0 001454500 006__ m\\\\\o\\d\\\\\\\\ 001454500 007__ cr\cn\nnnunnun 001454500 008__ 230209s2023\\\\sz\a\\\\o\\\\\100\0\eng\d 001454500 020__ $$a9783031253447$$q(electronic bk.) 001454500 020__ $$a3031253442$$q(electronic bk.) 001454500 020__ $$z9783031253430 001454500 020__ $$z3031253434 001454500 0247_ $$a10.1007/978-3-031-25344-7$$2doi 001454500 035__ $$aSP(OCoLC)1369492921 001454500 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP 001454500 049__ $$aISEA 001454500 050_4 $$aQ342 001454500 08204 $$a006.3$$223/eng/20230209 001454500 1112_ $$aInformation Systems and Advanced Technologies (Conference)$$n(12th :$$d2022 :$$cOnline). 001454500 24510 $$a12th International Conference on Information Systems and Advanced Technologies "ICISAT 2022" :$$bintelligent information, data science and decision support system /$$cMohamed Ridda Laouar, Valentina Emilia Balas, Brahim Lejdel, Sean Eom, Mohamed Amine Boudia, editors. 001454500 24630 $$aICISAT 2022 001454500 264_1 $$aCham :$$bSpringer,$$c[2023] 001454500 264_4 $$c©2023 001454500 300__ $$a1 online resource (ix, 577 pages) :$$billustrations (chiefly color). 001454500 336__ $$atext$$btxt$$2rdacontent 001454500 337__ $$acomputer$$bc$$2rdamedia 001454500 338__ $$aonline resource$$bcr$$2rdacarrier 001454500 4901_ $$aLecture notes in networks and systems ;$$vvolume 624 001454500 500__ $$aInternational conference proceedings. 001454500 5050_ $$aIntro -- Contents -- Modelling of Propagation Loss for Single Trees Using Simulated Coppice at Microwave Frequencies -- 1 Introduction -- 2 Measurement Details -- 3 Conclusion -- References -- A New Collective Simulated Annealing with Adapted Objective Function for Web Service Selection -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experimentation -- 5 Case Study -- 6 Conclusion -- References -- An Image Encryption-Based Method for Handwritten Digit Recognition -- 1 Introduction -- 2 Related Works -- 3 Image Encryption Systems -- 3.1 RSA Encryption -- 3.2 ECC Encryption 001454500 5058_ $$a3.3 Chaos Encryption -- 3.4 Knight Encryption -- 3.5 Arnold Encryption -- 3.6 Joseph Encryption -- 4 Proposed Method -- 5 Experimentation and Results -- 6 Conclusion and Perspectives -- References -- The Malaysian Higher Education Students' Perceptions and Acceptance Toward Mobile Learning During the COVID-19 Pandemic -- 1 Introduction -- 1.1 Mobile Learning in Malaysia During the COVID-19 Pandemic -- 2 Purpose and Objectives of the Study -- 3 The Conceptual Framework -- 4 Methodology -- 5 Results and Discussion -- 5.1 Respondent Profile -- 5.2 Perceptions of Mobile Technology Adoption 001454500 5058_ $$a5.3 Mobile Learning Perceptions and Acceptance During the COVID-19 Pandemic -- 5.4 Open-Ended Items -- 6 Conclusion -- References -- Face Masks Use and Face Perception: Social Judgments and Emotion Recognition -- 1 Introduction -- 2 Key Parameters -- 2.1 Sex Recognition -- 2.2 Age Estimation -- 2.3 Trustworthiness -- 2.4 Attractiveness -- 2.5 Approachability -- 2.6 Emotion Perception -- 3 The Current Study -- 3.1 Participants -- 3.2 Materials and Stimuli -- 4 Design -- 4.1 Procedure -- 4.2 Data Analysis -- 5 Results -- 5.1 Experiment 1 -- 5.2 Experiment 2 -- 6 Discussion -- References 001454500 5058_ $$aBibliometric Analysis of Research Publication Trends on the ICT Use in Government Institutions from 2015-2022 -- 1 Introduction -- 2 Literature Review -- 2.1 Use ICT in Government -- 2.2 Bibliometrics Analysis -- 3 Research Methods -- 4 Finding and Discussion -- 4.1 Analysis of Global Publication -- 4.2 Mapping of Co-occurrences Analysis -- 4.3 Topic Classification and Theme Descriptions -- 5 Conclusion -- References -- A Paring-Free ID-Based Authenticated Key Agreement Protocol for IoT Environment -- 1 Introduction -- 1.1 Motivation -- 1.2 Outline of Paper -- 2 Related Work 001454500 5058_ $$a3 Technical Background -- 3.1 Diffie Hellman Key Agreement Protocol -- 3.2 Elliptic Curve Cryptography -- 3.3 ECDL Hard Problem -- 3.4 Computational Diffie-Hellman Hard (CDHP) Problem -- 3.5 Identity-Based Encryption -- 4 Proposed Scheme -- 4.1 Setup -- 4.2 Private Key Extraction -- 4.3 Session Key Agreement -- 5 Security Analysis -- 5.1 MITM Attack -- 5.2 Known Provisionally Information Attack -- 5.3 Known Key Attack -- 5.4 Perfect Forward Security -- 5.5 PKG Forward Security -- 5.6 No Key Dominant -- 5.7 Replication and Unidentified Key Share Attack -- 6 Conclusion -- References 001454500 506__ $$aAccess limited to authorized users. 001454500 520__ $$aThe ICISAT2022 conference provided a forum for research and developments in the field of information systems and advanced technologies and new trends in developing information systems organizational aspects of their development and intelligent aspects of the final product. The aim of the ICIS1T2022 is to report progress and development of methodologies, technologies, planning and implementation, tools, and standards in information systems, technologies, and sciences. ICISAT2022 aims at addressing issues related to the intelligent information, data science, and decision support system, from multidisciplinary perspectives and to discuss the research, teaching, and professional practice in the field. The book of ICISAT2022 includes selected papers from the 12th International Conference on Information Systems and Advanced Technologies "ICISAT2022", organized online during August 26-27, 2022. In this book, researchers, professional software, and systems engineers from around the world addressed intelligent information, data science, and decision support system for the conference. The ideas and practical solutions described in the book are the outcome of dedicated research by academics and practitioners aiming to advance theory and practice in this research domain. The list of topics is in all the areas of modern intelligent information systems and technologies such as neural networks, evolutionary computing, adaptive systems, pervasive system, ubiquitous system, E-learning and teaching, knowledge-based paradigms, learning paradigms, intelligent data analysis, intelligent decision making and support system, intelligent network security, web intelligence, deep learning, natural language processing, image processing, general machine learning, and unsupervised learning. 001454500 588__ $$aDescription based on print version record. 001454500 650_0 $$aComputational intelligence$$vCongresses. 001454500 650_0 $$aComputer systems$$vCongresses. 001454500 655_0 $$aElectronic books. 001454500 655_7 $$aConference papers and proceedings.$$2lcgft 001454500 7001_ $$aLaouar, Mohamed Ridda,$$eeditor.$$1https://isni.org/isni/0000000434607134 001454500 7001_ $$aBalas, Valentina Emilia,$$eeditor.$$1https://isni.org/isni/0000000425522366 001454500 7001_ $$aLejdel, Brahim,$$eeditor. 001454500 7001_ $$aEom, Sean B.,$$eeditor.$$1https://isni.org/isni/0000000117470648 001454500 7001_ $$aBoudia, Mohamed Amine,$$eeditor. 001454500 77608 $$iPrint version:$$aInformation Systems and Advanced Technologies (Conference) (12th : 2022 : Online), creator.$$t12th International Conference on Information Systems and Advanced Technologies "ICISAT 2022".$$dCham : Springer, 2023$$z9783031253430$$w(OCoLC)1363815863 001454500 830_0 $$aLecture notes in networks and systems ;$$vv. 624. 001454500 852__ $$bebk 001454500 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-25344-7$$zOnline Access$$91397441.1 001454500 909CO $$ooai:library.usi.edu:1454500$$pGLOBAL_SET 001454500 980__ $$aBIB 001454500 980__ $$aEBOOK 001454500 982__ $$aEbook 001454500 983__ $$aOnline 001454500 994__ $$a92$$bISE