10th International Congress on Information and Communication Technology in concurrent with ICT Excellence Awards (ICICT 2025) will be held at London, United Kingdom | February 18 - 21 2025.
Sign up or log in to bookmark your favorites and sync them to your phone or calendar.
Authors - Omar Hamid, Homaiza Saud Ahmad, Ahmed Albayah, Fatima Dakalbab, Manar Abu Talib, Qassim Nasir Abstract - The science of photogrammetry has been developing rapidly in recent years. With the rise of tools adopting this science and the advancement of computer vision technologies, the potential of such software is being acknowledged by researchers and integrated by market professionals into various fields. To cope with the rapid changes and expanding range of photogrammetry tools, a methodology was developed to identify the most widely adopted software tools, whether open-source or commercial, by the research community and market professionals. This resulted in the identification of 37 tools for which we developed a comprehensive review and presented our findings through visualizations such as pie charts and graphs. Furthermore, a comparison between the tools was carried out based on seven different attributes describing them, in order to assist professionals and individuals in picking software for specific use cases.
Authors - Mona Kherees, Karen Renaud, Dania Aljeaid Abstract - Smart Tourism is the most rapidly expanding economic sector, with data serving as the foundation of all Smart Tourism operations when travelers participate in various tailored travel services before, during, and after their journeys. The massive volume of data collected through various Smart Tourism Technologies raises tourists’ concerns. They might adopt privacy-preserving behaviors, like restricting sharing, fabricating data, or refusing to disclose requested information. Consequently, service providers manipulate users into disclosing personal data by employing persuasive marketing techniques based on Cialdini’s principles. This research aimed to investigate how the persuasion strategies of Cialdini employed by tourism organizations or service providers influence privacy concerns and users’ willingness to share personal information. A mixed-methods approach, incorporating expert reviews, was utilized to propose and validate a framework based on the Antecedents-Privacy Concerns-Outcome (APCO) model.
Authors - Otshepeng Lethabo Malebye, Tevin Moodley Abstract - This paper explores integrating Knowledge Management principles within Project Management frameworks to address critical challenges project teams face, such as diminishing individual experience and employees applying their knowledge to the projects in which they are a part. This paper identifies common problems encountered in knowledge sharing, such as tacit knowledge externalisation and documentation within project environments, by exploring the KM principles and their relevance to project success. A proposed solution is presented by looking at existing systems, such as DocuWare and frameworks, Knowledge Management, and Project Management. This paper introduces a framework to demonstrate the significance of employing systematic processes for identifying, capturing, sharing, and applying knowledge within project teams. It utilises techniques such as interviews, post-project reviews, communities of practice, and training. By using the integrated approach, the proposed solution aims to solve knowledge silos, facilitate tacit knowledge externalisation, and improve knowledge documentation.
Authors - Ahamed Nishath S, Murugeswari R Abstract - Researchers in the field of artificial intelligence are increasingly interested in exploring how to spot and counteract the spread of fake news. When compared to machine learning approaches, deep learning methods are superior in terms of their ability to reliably identify instances of false news. This study analyses the efficacy of various neural network topologies in the classification of news items into two distinct categories: false and real. This work takes into a hybrid model that merges both CNN and RNN layers incorporate with multi-channel mechanism, Which is the most complex model. When determining model’s overall performance, criteria such as accuracy, precision, and recall rates are taken into consideration. According to the findings, the hybrid model is able to efficiently attain a high degree of accuracy, particularly 99.16% of the target accuracy. The aforementioned results highlight the adaptability of various neural network designs in the context of distinguishing between real and false news, hence revealing key insights that have the potential to be implemented in practical scenarios involving the verification of information and the evaluation of its validity.
Authors - Massimo Carlini, Giuseppina Anatriello, Elisabetta Cicchiello Abstract - The modern business context and the amount of data available to companies and organizations has made decision-making processes even more com-plex and articulated. This pushes companies to provide a better product or service for customers, reasoning in terms of quality, flexibility and responsiveness to their requests and needs. In this context, the concepts of customer centricity and satisfaction are placed, or the need for companies to try to satisfy demand by offering efficient and quality treatment aimed at satisfying customer needs based on a deep and solid knowledge of them. This paper reports on the activities carried out by Anas S.p.A., by Customer Ser-vice, over the last few years, to improve the Digital Customer Experience, making available to customers the knowledge and experience acquired over the years. The objective, in terms of Customer Centricity, was to put the customer at the center of the offer, providing them with more modern, innovative, intelligent and efficient dialogue tools.
Authors - Aniko Vagner Abstract - NoSQL databases are grouped into many categories, one of them is the key-value databases. Our goal is to examine whether a system-independent key-value logical model exists. The idea came from the Redis database, which has the opaque key-value type named string, but it supports lists, hashes, sets, sorted sets, etc. If we compare them to the document databases storing JSON documents, they can have a system-independent logical model. We gathered databases said to fall into the key-value category and read their documentation considering the stored data structures. We found many subcategories under the key-value category. We found that the clean key-value databases with buckets can have a system-independent database model where the buckets collect the key-value pair, and the model is so easy. We could not identify a system independent logical model for the rest subcategories. Additionally, we recognised some viewpoints on which the data model of the key-value databases can be examined. Altogether, considering all subcategories we cannot speak about a system-independent logical data model for key value databases.