{"id":5627,"date":"2023-12-20T10:58:05","date_gmt":"2023-12-20T02:58:05","guid":{"rendered":"https:\/\/people.utm.my\/corrienna\/?page_id=5627"},"modified":"2023-12-21T00:05:45","modified_gmt":"2023-12-20T16:05:45","slug":"indexed-book-chapter","status":"publish","type":"page","link":"https:\/\/people.utm.my\/corrienna\/indexed-book-chapter\/","title":{"rendered":"Indexed Book Chapter"},"content":{"rendered":"<ol>\n<li>Ahmad, I.S., Darmawan, M.F., &amp; <strong>Talib, C.A<\/strong><strong>.\u00a0<\/strong>(2023). <span style=\"color: #339966\"><em><span style=\"color: #ff6600\"><strong>Cyberbullying Awareness Through Sentiment Analysis Based on Twitter. In: Yafooz, W.M.S., Al-Aqrabi, H., Al-Dhaqm, A., Emara, A. (eds) Kids Cybersecurity Using Computational Intelligence Techniques. Studies in Computational Intelligence, vol 1080. Springer, Cham.<\/strong><\/span>\u00a0<\/em><\/span><\/li>\n<li>Ong, E.T, Pang, Y.J., <strong>Talib, C.A<\/strong> Setiawan, R., Ng, J.H., &amp; Por, F.P. (2023).\u00a0<span style=\"color: #ff6600\"><em><strong>Industrial Revolution (IR) and Exemplary AR\/VR-based Technological Tools in Preventive Health Education: The Past, Present, and Future. In: Kumar, R., Jain, V., Han, G.T.W., &amp; Touzene, A. (eds) Immersive Virtual and Augmented Reality in Healthcare An IoT and Blockchain Perspective, Taylor &amp; Francis Group.<\/strong><\/em><\/span><\/li>\n<li>Ng, K.T., Fukui, M., <strong>Talib, C.A<\/strong>., Nomura, T., Chew, E.T., &amp; Kumar, R. (2022). <em><strong><span style=\"color: #ff6600\">Conserving environment using resources wisely with reduction of waste and pollution: exemplary initiatives for Education 4.0. In: Leong, W.Y. (ed) Human Machine Collaboration and Interaction for Smart Manufacturing: Automation, robotics, sensing, artificial intelligence, 5G, IoTs and Blockchain, IET Digital Library.<\/span> <\/strong><\/em><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Ahmad, I.S., Darmawan, M.F., &amp; Talib, C.A.\u00a0(2023). Cyberbullying Awareness Through Sentiment Analysis Based on Twitter. In: Yafooz, W.M.S., Al-Aqrabi, H., Al-Dhaqm, A., Emara, A. (eds) Kids Cybersecurity Using Computational Intelligence Techniques. Studies in Computational Intelligence, vol 1080. Springer, Cham.\u00a0 Ong, E.T, Pang, Y.J., Talib, C.A Setiawan, R., Ng, J.H., &amp; Por, F.P. (2023).\u00a0Industrial Revolution (IR) [&hellip;]<\/p>\n","protected":false},"author":3387,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5627","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/people.utm.my\/corrienna\/wp-json\/wp\/v2\/pages\/5627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/corrienna\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/people.utm.my\/corrienna\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/corrienna\/wp-json\/wp\/v2\/users\/3387"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/corrienna\/wp-json\/wp\/v2\/comments?post=5627"}],"version-history":[{"count":2,"href":"https:\/\/people.utm.my\/corrienna\/wp-json\/wp\/v2\/pages\/5627\/revisions"}],"predecessor-version":[{"id":5872,"href":"https:\/\/people.utm.my\/corrienna\/wp-json\/wp\/v2\/pages\/5627\/revisions\/5872"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/corrienna\/wp-json\/wp\/v2\/media?parent=5627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}