Linked e-resources
Details
Table of Contents
Intro
Preface
Keynote Speakers
Contents
The Equity of Pedagogical Approaches in E-Learning Initiatives in Higher Education Institutions in United Arab Emirates
1 Introduction
2 Related Works
2.1 UTAUT Cultural Constructs
2.2 Adoption of E-Learning and Culture
2.3 Blackboard Learn Cultural Pedagogy
2.4 The UAE Culture and Learning Pedagogies
2.5 A Brief Description of the Gaps
3 Theoretical Framework
3.1 Epistemology and Ontology
4 Research Methodology
4.1 Data Collection
4.2 Quality and Trustworthiness of the Study or Findings
4.3 Ethical Issues and Limitations
5 Data Analysis Technique
6 Findings
7 Conclusion and Recommendations
References
Malay Fake News Classification Using a Deep Learning Approach
1 Introduction
2 Related Works
3 Methods
3.1 Datasets
3.2 Text Pre-processing
3.3 Building the RNN Model
3.4 Training the RNN Model
3.5 Evaluating the RNN Model
4 Results and Discussion
5 Conclusion
References
Iterative Method for Solving Nonlinear Fredholm Integral Equations Using Quarter-Sweep Newton-PKSOR Method
1 Introduction
2 Methodology
3 Numerical Experiments
4 Conclusions
References
Analysis on the Performance of Healthcare Industry in Malaysia with TOPSIS Model
1 Introduction
2 Data and Methodology
2.1 Data
2.2 TOPSIS
3 Empirical Results
4 Conclusion
References
Prosthetic Parts for Protecting Mobile Robots
1 Introduction
2 Animals with Shells
3 Proposed Protection Mechanisms
3.1 Umbrella
3.2 Four-Bar
3.3 Retractable Roof
3.4 Turtle
3.5 Box Shell
4 Conclusions and Future Work
References
Secret Key Design Using an Algebraic Procedure (KAP) for Encrypted Energy Internet-of-Things (EIoT) Contents
1 Introduction
2 The Proposed Secret Key Design Using an Algebraic Procedure (KAP) Schematic Representation
3 The Proposed KAP Design
3.1 KAP Inputs Design
3.2 Proposed KAP Secret-Key Length Design
3.3 KAP Input (Plaintext)-Math-Based Procedure
3.4 KAP Secret-Key-Scheme and Block Diagram
4 Results and Discussion
4.1 Time Complexity
4.2 Time Based Efficiency
5 Conclusion
References
Overview on Online Examination Proctoring Using Machine Learning
1 Introduction
2 Online Proctoring
3 Review of Proctoring Integration Services
4 Machine Learning Implementation in Online Proctoring
5 Conclusion
References
Facial Micro-expressions Analysis: Its Databases, Feature Extraction, and Classification Methods
1 Introduction
1.1 Taxonomy of Micro-expressions
2 Micro-expressions Databases
2.1 Posed Databases
2.2 Spontaneous Databases
3 Features Extraction
3.1 Handcrafted Features
3.2 Learning-Based Features
4 Classification
4.1 Support Vector Machine (SVM)
4.2 Extreme Learning Machine (ELM)
Preface
Keynote Speakers
Contents
The Equity of Pedagogical Approaches in E-Learning Initiatives in Higher Education Institutions in United Arab Emirates
1 Introduction
2 Related Works
2.1 UTAUT Cultural Constructs
2.2 Adoption of E-Learning and Culture
2.3 Blackboard Learn Cultural Pedagogy
2.4 The UAE Culture and Learning Pedagogies
2.5 A Brief Description of the Gaps
3 Theoretical Framework
3.1 Epistemology and Ontology
4 Research Methodology
4.1 Data Collection
4.2 Quality and Trustworthiness of the Study or Findings
4.3 Ethical Issues and Limitations
5 Data Analysis Technique
6 Findings
7 Conclusion and Recommendations
References
Malay Fake News Classification Using a Deep Learning Approach
1 Introduction
2 Related Works
3 Methods
3.1 Datasets
3.2 Text Pre-processing
3.3 Building the RNN Model
3.4 Training the RNN Model
3.5 Evaluating the RNN Model
4 Results and Discussion
5 Conclusion
References
Iterative Method for Solving Nonlinear Fredholm Integral Equations Using Quarter-Sweep Newton-PKSOR Method
1 Introduction
2 Methodology
3 Numerical Experiments
4 Conclusions
References
Analysis on the Performance of Healthcare Industry in Malaysia with TOPSIS Model
1 Introduction
2 Data and Methodology
2.1 Data
2.2 TOPSIS
3 Empirical Results
4 Conclusion
References
Prosthetic Parts for Protecting Mobile Robots
1 Introduction
2 Animals with Shells
3 Proposed Protection Mechanisms
3.1 Umbrella
3.2 Four-Bar
3.3 Retractable Roof
3.4 Turtle
3.5 Box Shell
4 Conclusions and Future Work
References
Secret Key Design Using an Algebraic Procedure (KAP) for Encrypted Energy Internet-of-Things (EIoT) Contents
1 Introduction
2 The Proposed Secret Key Design Using an Algebraic Procedure (KAP) Schematic Representation
3 The Proposed KAP Design
3.1 KAP Inputs Design
3.2 Proposed KAP Secret-Key Length Design
3.3 KAP Input (Plaintext)-Math-Based Procedure
3.4 KAP Secret-Key-Scheme and Block Diagram
4 Results and Discussion
4.1 Time Complexity
4.2 Time Based Efficiency
5 Conclusion
References
Overview on Online Examination Proctoring Using Machine Learning
1 Introduction
2 Online Proctoring
3 Review of Proctoring Integration Services
4 Machine Learning Implementation in Online Proctoring
5 Conclusion
References
Facial Micro-expressions Analysis: Its Databases, Feature Extraction, and Classification Methods
1 Introduction
1.1 Taxonomy of Micro-expressions
2 Micro-expressions Databases
2.1 Posed Databases
2.2 Spontaneous Databases
3 Features Extraction
3.1 Handcrafted Features
3.2 Learning-Based Features
4 Classification
4.1 Support Vector Machine (SVM)
4.2 Extreme Learning Machine (ELM)