This document discusses recent technological trends in education, migration, and sustainability. It focuses on artificial intelligence, blockchain technology, and cybersecurity. Artificial intelligence uses data to predict economic and climate conditions influencing migration patterns. Blockchain aims to establish a decentralized financial system. Cybersecurity efforts are needed to address increased cyberattacks. These technologies are driven by machine learning algorithms and influence various socioeconomic factors.
Mediating and moderating factors affecting readiness to io t applications the...IJMIT JOURNAL
Although IOT seems to be the upcoming trend, it is still in its infancy; especially in the banking industry. There is a clear gap in literature, as only few studies identify factors affecting readiness to IOT applications in banks in general, and almost negligible investigations on mediating and moderating factors. Accordingly, this research aims to investigate the main factors that affect employees’ readiness to IOT applications, while highlighting the mediating and moderating factors in the Egyptian banking sector. The importance of Egypt stems from its high population and steady steps taken towards technology adoption. 479 valid questionnaires were distributed over HR employees in banks. Data collected was statistically analysed using Regression and SEM. Results showed a significant impact of ‘Security’, ‘Networking’, ‘Software Development’ and ‘Regulations’ on ‘readiness to IOT applications. Thus, the readiness acceptance level is high‘Security’ and ‘User Intention’ were proven to mediate the relationship between research variables and readiness to IOT applications, and only a partial moderation role was proven for ‘Efficiency’. The study contributes to increasing literature on IOT applications in general, and fills a gap on the Egyptian banking context in particular. Finally, it provides decision makers at banks with useful guidelines on how to optimally promote IOT applications among employees.
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...IJMIT JOURNAL
Although IOT seems to be the upcoming trend, it is still in its infancy; especially in the banking industry.
There is a clear gap in literature, as only few studies identify factors affecting readiness to IOT
applications in banks in general, and almost negligible investigations on mediating and moderating
factors. Accordingly, this research aims to investigate the main factors that affect employees’ readiness to
IOT applications, while highlighting the mediating and moderating factors in the Egyptian banking sector.
The importance of Egypt stems from its high population and steady steps taken towards technology
adoption. 479 valid questionnaires were distributed over HR employees in banks. Data collected was
statistically analysed using Regression and SEM. Results showed a significant impact of ‘Security’,
‘Networking’, ‘Software Development’ and ‘Regulations’ on ‘readiness to IOT applications. Thus, the
readiness acceptance level is high‘Security’ and ‘User Intention’ were proven to mediate the relationship
between research variables and readiness to IOT applications, and only a partial moderation role was
proven for ‘Efficiency’. The study contributes to increasing literature on IOT applications in general, and
fills a gap on the Egyptian banking context in particular. Finally, it provides decision makers at banks with
useful guidelines on how to optimally promote IOT applications among employees.
The study we present aims to explore several factors pertaining to Consumer Acceptance of business technology as it related to Blockchain. Identifying and developing the relevant measures is of importance to business technology managers and software development managers today. We ask the important question of “what measures best represent the established constructs of the technology acceptance model?” In order to address this issue, it is important to identify the key measurements that help us to understand the proposed constructs as they relate to blockchain technology as well as confirm their validity in isolation and in combination with each other. In this study, the factors we explore are perceived reputation, risk, and usefulness and transaction intentions. A survey was used whereby the methodology adapted previous measurements from related works and new measurements pertaining to usefulness and risk were developed in order to adhere to blockchain’s consumer acceptance framework. 268 students completed the questionnaire and an exploratory factor analysis was used in order to analyze the constructs and their measurements. Through the results we were able to identify and validate the relevant measurements as well as the proposed constructs.
Security and privacy in smart city: a secure e-voting system based on blockch...IJECEIAES
In recent years, the internet of things (IoT) growth has brought about many technological changes, including the emergence of the notion of the smart city. The development of a smart city requires the integration of IoT devices and information and communication technologies to improve the quality of lives of citizens in many areas such as health, economy, business, agriculture, and transport. However, with this evolution, many cybersecurity risks and challenges have been raised, so it is necessary to develop these technologies in a protected way to avoid being compromised by attackers. Blockchain, being a new technology based on cryptographic principles, can play an important role in securing smart cities. In this survey, we discussed different applications of blockchain technology in smart cities and also studied how blockchain features (transparency, democracy, decentralization, and security) can help in the improvement of smart city services. This analysis will help us to implement an electronic voting model using a smart contract based on the Ethereum blockchain to highlight how blockchain technology can be implemented in smart cities to promote security.
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxedgar6wallace88877
Security Attacks and Countermeasures on Cloud Assisted IoT Applications
Asma Alsaidi
The Communication and Information Research Center
Sultan Qaboos University
Muscat, Oman
[email protected]
Firdous Kausar
Electrical and Computer Engineering Department
College of Engineering, Sultan Qaboos University
Muscat, Oman
[email protected]
Abstract— Internet of things is an emerging technology having
the potential to improve the quality of different aspects of
human life. Furthermore, integration of IoT with cloud
computing has accelerated the wide range of applications in
different areas such as commercial, manufacturing,
engineering, supply chains, etc. Currently security threat
obstacles the adoption of IoT technology in many areas. This
paper presents the architecture of cloud assisted IoT
applications for smart cities, telemedicine and intelligent
transportation system. We investigate the security threats and
attacks due to unauthorized access and misuse of information
collected by IoT nodes and device. Further, we describe the
possible countermeasure to these security attacks.
Keywords- IoT; Cloud Computing; Smart cities; Intelligent
transport system; Telemedicine;
I. INTRODUCTION
The Internet of things (IoT) compromises a combination
of different sensors and objects that can collaborate with
each other with no human interference necessary. The
“things” in the IoT comprises objects, such as cars,
microwaves, refrigerators, toaster, air conditions etc, which
collect useful data from its surroundings with the help of
sensors and transmit this to the other connected devices that
take actions/decisions based on it. In other words, it can be
said that IoT is an architecture that encompasses smart
embedded devices that are connected to internet so they can
be controlled and triggered by internet.
It is expected that by the 2020, around 25 billion objects
will become the part of global IoT network [9], which will
pose new challenges in securing IoT systems. It will become
easy target for hackers as these systems are often deployed in
uncontrolled and hostile environment. The main security
challenges in IoT environment are authorization, privacy,
authentication, admission control, system conformation,
storage, and administration [2]. There are security solutions
available already for Internet, which should be equally
applicable to IoT networks as well. However, constrained
resources, different operational environment, and complex
interconnectivity among huge number of devices in IoT
make those security solutions insufficient.
The IoT systems are vulnerable to numerous different
types of security attacks: Denial of Service (DoS), Jamming
attacks, Sybil attacks, blackhole attacks, wormhole attacks,
and malware attacks etc. Even after implementing proper
security solutions in IoT devices, there are still possibilities
of different kind of attacks on the network. Therefore,
proper.
Indian growing new financial establishments, notably banks, square measure one among the most important investors within the domains of knowledge systems, and there square measure quite clear signs that these trends to spread within the future. The arrival and enlargement of globalization and also the development of Advanced technologies knowledge pushed the banks to adopt advanced technology to launch new services. Banks have applied remote enabled service victimization the net to achieve competitive advantage, increase potency, scale back prices and provide a range of latest services. On-line systems create banking transactions straightforward and convenient, notably for disabled people that could need special services. the most purpose of this current study is to look at the most keys to live the advantage perception of victimization net banking technology, as this advanced technology is taken into account together of the principal motivations underlying the inclinations of people to adopt such a convenient technology in India. The model developed associated developed during this analysis study is an extension to the Technology Acceptance Model (TAM). The model was tested with a survey sample of four hundred folks chosen arbitrarily. The findings of the study indicate that everyone mentioned factors within the projected model (CNV, SE, QI, AW, PEU, PU) have important impact at intervals prompting the employment of net banking systems. The information analysis relies on the applied mathematics Package for scientific discipline (SPSS).
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EUIJNSA Journal
This paper describes a framework to facilitate the adoption of the Blockchain technology and streamline the development of decentralised applications (DAPPs). It describes four enablers, as self-contained core modules, offering specific, key functionality using the Blockchain technology. The enabler functionality includes a) Blockchain-based ID management allowing for authentication and authorization, b) the storage of data in the IPFS distributed filesystem with guarantees of data integrity and authenticity, c) the trustworthy registration of entities, services, and bindings, d) the performance of trustworthy negotiations towards external marketplaces with the support of the Blockchain. The design and interactions of the enablers are described using sequence diagrams. The usage of the functionality provided by the enablers is also being evaluated. In parallel, we present the application of the Blockchain technology, mainly in the context of EU project Block.IS in three economic areas agriculture, finance, and logistics. We provide and discuss a digest of the decentralised applications designed and developed over a period of approximately 3 years (2019-2021). Key areas of interest, processes, workflows, and assets where Blockchain technology has been applied are described. Findings, in terms of Blockchain application, challenges and technical selections as well as third-party tools are also identified and discussed.
Mediating and moderating factors affecting readiness to io t applications the...IJMIT JOURNAL
Although IOT seems to be the upcoming trend, it is still in its infancy; especially in the banking industry. There is a clear gap in literature, as only few studies identify factors affecting readiness to IOT applications in banks in general, and almost negligible investigations on mediating and moderating factors. Accordingly, this research aims to investigate the main factors that affect employees’ readiness to IOT applications, while highlighting the mediating and moderating factors in the Egyptian banking sector. The importance of Egypt stems from its high population and steady steps taken towards technology adoption. 479 valid questionnaires were distributed over HR employees in banks. Data collected was statistically analysed using Regression and SEM. Results showed a significant impact of ‘Security’, ‘Networking’, ‘Software Development’ and ‘Regulations’ on ‘readiness to IOT applications. Thus, the readiness acceptance level is high‘Security’ and ‘User Intention’ were proven to mediate the relationship between research variables and readiness to IOT applications, and only a partial moderation role was proven for ‘Efficiency’. The study contributes to increasing literature on IOT applications in general, and fills a gap on the Egyptian banking context in particular. Finally, it provides decision makers at banks with useful guidelines on how to optimally promote IOT applications among employees.
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...IJMIT JOURNAL
Although IOT seems to be the upcoming trend, it is still in its infancy; especially in the banking industry.
There is a clear gap in literature, as only few studies identify factors affecting readiness to IOT
applications in banks in general, and almost negligible investigations on mediating and moderating
factors. Accordingly, this research aims to investigate the main factors that affect employees’ readiness to
IOT applications, while highlighting the mediating and moderating factors in the Egyptian banking sector.
The importance of Egypt stems from its high population and steady steps taken towards technology
adoption. 479 valid questionnaires were distributed over HR employees in banks. Data collected was
statistically analysed using Regression and SEM. Results showed a significant impact of ‘Security’,
‘Networking’, ‘Software Development’ and ‘Regulations’ on ‘readiness to IOT applications. Thus, the
readiness acceptance level is high‘Security’ and ‘User Intention’ were proven to mediate the relationship
between research variables and readiness to IOT applications, and only a partial moderation role was
proven for ‘Efficiency’. The study contributes to increasing literature on IOT applications in general, and
fills a gap on the Egyptian banking context in particular. Finally, it provides decision makers at banks with
useful guidelines on how to optimally promote IOT applications among employees.
The study we present aims to explore several factors pertaining to Consumer Acceptance of business technology as it related to Blockchain. Identifying and developing the relevant measures is of importance to business technology managers and software development managers today. We ask the important question of “what measures best represent the established constructs of the technology acceptance model?” In order to address this issue, it is important to identify the key measurements that help us to understand the proposed constructs as they relate to blockchain technology as well as confirm their validity in isolation and in combination with each other. In this study, the factors we explore are perceived reputation, risk, and usefulness and transaction intentions. A survey was used whereby the methodology adapted previous measurements from related works and new measurements pertaining to usefulness and risk were developed in order to adhere to blockchain’s consumer acceptance framework. 268 students completed the questionnaire and an exploratory factor analysis was used in order to analyze the constructs and their measurements. Through the results we were able to identify and validate the relevant measurements as well as the proposed constructs.
Security and privacy in smart city: a secure e-voting system based on blockch...IJECEIAES
In recent years, the internet of things (IoT) growth has brought about many technological changes, including the emergence of the notion of the smart city. The development of a smart city requires the integration of IoT devices and information and communication technologies to improve the quality of lives of citizens in many areas such as health, economy, business, agriculture, and transport. However, with this evolution, many cybersecurity risks and challenges have been raised, so it is necessary to develop these technologies in a protected way to avoid being compromised by attackers. Blockchain, being a new technology based on cryptographic principles, can play an important role in securing smart cities. In this survey, we discussed different applications of blockchain technology in smart cities and also studied how blockchain features (transparency, democracy, decentralization, and security) can help in the improvement of smart city services. This analysis will help us to implement an electronic voting model using a smart contract based on the Ethereum blockchain to highlight how blockchain technology can be implemented in smart cities to promote security.
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxedgar6wallace88877
Security Attacks and Countermeasures on Cloud Assisted IoT Applications
Asma Alsaidi
The Communication and Information Research Center
Sultan Qaboos University
Muscat, Oman
[email protected]
Firdous Kausar
Electrical and Computer Engineering Department
College of Engineering, Sultan Qaboos University
Muscat, Oman
[email protected]
Abstract— Internet of things is an emerging technology having
the potential to improve the quality of different aspects of
human life. Furthermore, integration of IoT with cloud
computing has accelerated the wide range of applications in
different areas such as commercial, manufacturing,
engineering, supply chains, etc. Currently security threat
obstacles the adoption of IoT technology in many areas. This
paper presents the architecture of cloud assisted IoT
applications for smart cities, telemedicine and intelligent
transportation system. We investigate the security threats and
attacks due to unauthorized access and misuse of information
collected by IoT nodes and device. Further, we describe the
possible countermeasure to these security attacks.
Keywords- IoT; Cloud Computing; Smart cities; Intelligent
transport system; Telemedicine;
I. INTRODUCTION
The Internet of things (IoT) compromises a combination
of different sensors and objects that can collaborate with
each other with no human interference necessary. The
“things” in the IoT comprises objects, such as cars,
microwaves, refrigerators, toaster, air conditions etc, which
collect useful data from its surroundings with the help of
sensors and transmit this to the other connected devices that
take actions/decisions based on it. In other words, it can be
said that IoT is an architecture that encompasses smart
embedded devices that are connected to internet so they can
be controlled and triggered by internet.
It is expected that by the 2020, around 25 billion objects
will become the part of global IoT network [9], which will
pose new challenges in securing IoT systems. It will become
easy target for hackers as these systems are often deployed in
uncontrolled and hostile environment. The main security
challenges in IoT environment are authorization, privacy,
authentication, admission control, system conformation,
storage, and administration [2]. There are security solutions
available already for Internet, which should be equally
applicable to IoT networks as well. However, constrained
resources, different operational environment, and complex
interconnectivity among huge number of devices in IoT
make those security solutions insufficient.
The IoT systems are vulnerable to numerous different
types of security attacks: Denial of Service (DoS), Jamming
attacks, Sybil attacks, blackhole attacks, wormhole attacks,
and malware attacks etc. Even after implementing proper
security solutions in IoT devices, there are still possibilities
of different kind of attacks on the network. Therefore,
proper.
Indian growing new financial establishments, notably banks, square measure one among the most important investors within the domains of knowledge systems, and there square measure quite clear signs that these trends to spread within the future. The arrival and enlargement of globalization and also the development of Advanced technologies knowledge pushed the banks to adopt advanced technology to launch new services. Banks have applied remote enabled service victimization the net to achieve competitive advantage, increase potency, scale back prices and provide a range of latest services. On-line systems create banking transactions straightforward and convenient, notably for disabled people that could need special services. the most purpose of this current study is to look at the most keys to live the advantage perception of victimization net banking technology, as this advanced technology is taken into account together of the principal motivations underlying the inclinations of people to adopt such a convenient technology in India. The model developed associated developed during this analysis study is an extension to the Technology Acceptance Model (TAM). The model was tested with a survey sample of four hundred folks chosen arbitrarily. The findings of the study indicate that everyone mentioned factors within the projected model (CNV, SE, QI, AW, PEU, PU) have important impact at intervals prompting the employment of net banking systems. The information analysis relies on the applied mathematics Package for scientific discipline (SPSS).
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EUIJNSA Journal
This paper describes a framework to facilitate the adoption of the Blockchain technology and streamline the development of decentralised applications (DAPPs). It describes four enablers, as self-contained core modules, offering specific, key functionality using the Blockchain technology. The enabler functionality includes a) Blockchain-based ID management allowing for authentication and authorization, b) the storage of data in the IPFS distributed filesystem with guarantees of data integrity and authenticity, c) the trustworthy registration of entities, services, and bindings, d) the performance of trustworthy negotiations towards external marketplaces with the support of the Blockchain. The design and interactions of the enablers are described using sequence diagrams. The usage of the functionality provided by the enablers is also being evaluated. In parallel, we present the application of the Blockchain technology, mainly in the context of EU project Block.IS in three economic areas agriculture, finance, and logistics. We provide and discuss a digest of the decentralised applications designed and developed over a period of approximately 3 years (2019-2021). Key areas of interest, processes, workflows, and assets where Blockchain technology has been applied are described. Findings, in terms of Blockchain application, challenges and technical selections as well as third-party tools are also identified and discussed.
Impact of Information Technology on Performance of Banks in NigeriaAJHSSR Journal
Over the last two decades, the Nigerian banking sector has witnessed some upsurge in the use
of technology for service delivery. However, concerns have been expressed as to whether cost and other
challenges of adopting information technology can be justified by performance. Accordingly, this study sought
to examine the relationship between different e-banking channels and the profitability of organisations in
Nigeria. Four e-banking channels,(automatic teller machines, point of sales, internet banking transactions and
electronic mobile banking) were identified and regressed against return on equity (ROE) of Deposit Money
Banks operating in Nigeria between 2006 and 2016. A panel data regression model was formulated and tested
using the generalized method of moment approach. The result revealed that the overall impact of electronic
banking on profitability of Deposit Money Banks operating in Nigeria was significant and positive. The study
recommends that critical stakeholders and beneficiaries of electronic banking – the government, regulatory
authorities and the banks should collaborate to put in place an enabling operating environment and an effective
regulatory framework to bring about optimal deployment of these services to customers
International Journal of Business and Management Invention (IJBMI)inventionjournals
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
The Journal will bring together leading researchers, engineers and scientists in the domain of interest from around the world. Topics of interest for submission include, but are not limited to
Ubiquitous computing will surround users
with a comfortable and convenient information environment and a smart
space that merges physical and computational infrastructures into an integrated
habitat. This habitat will feature a proliferation of hundreds or thousands of
computing devices and sensors that will provide new functionality, offer specialized
services, and boost productivity
and interaction among the devices and
the
users.
The continuous advancements and transformation changes occurring in the field of technology. This encompasses a wide range of emerging trends and innovations that are revolutionizing various industries and reshaping the way we live, work, and interact
Technology is a vast and rapidly evolving field that encompasses various aspects of innovation, development, and application of tools, systems, and processes to solve problems, improve efficiency, and enhance human life. From the latest advancements in artificial intelligence and machine learning to cutting-edge developments in blockchain technology and renewable energy solutions, the landscape of technology is constantly changing and shaping the way we live, work, and interact with the world around us.
FUTURE READY BANKING WITH SMART CONTRACTS - CBDC AND IMPACT ON THE INDIAN ECO...IJNSA Journal
India is significantly diverse in culture and how it promotes business transactions. Though we are very acquainted with cash, cards, and online mode of payment, the Indian rural economy still believes in the barter system. At this juncture, India is evolving as a tech power house, and its economy is thriving to embrace cryptocurrency as a medium of exchange. After the Indian finance minister declared the same last February that India is working towards building its legal tender called Central Bank-backed Digital Currency (CBDC), this paper is making an impact in explaining our strengths, weakness, market readiness, and necessity to adopt a digital rupee when India's economy is highly regarded as a cashoriented economy. Is our country ready to accept the new technological shift in smart banking in the form of a digital rupee? The paper highlights the socioeconomic and technical challenges our planners need to understand before changing the Central banks' monetary policies. The deployment of fifth-generation (5G) cellular network technology has sparked renewed interest in the potential of blockchain to automate different cellular network use cases. 5G is projected to open up new market prospects for small and large businesses. The article highlights the unique instrument of the digital rupee to enhance peer-to-peer transactions with the evolution of 5G mobile technology.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
Impact of Information Technology on Performance of Banks in NigeriaAJHSSR Journal
Over the last two decades, the Nigerian banking sector has witnessed some upsurge in the use
of technology for service delivery. However, concerns have been expressed as to whether cost and other
challenges of adopting information technology can be justified by performance. Accordingly, this study sought
to examine the relationship between different e-banking channels and the profitability of organisations in
Nigeria. Four e-banking channels,(automatic teller machines, point of sales, internet banking transactions and
electronic mobile banking) were identified and regressed against return on equity (ROE) of Deposit Money
Banks operating in Nigeria between 2006 and 2016. A panel data regression model was formulated and tested
using the generalized method of moment approach. The result revealed that the overall impact of electronic
banking on profitability of Deposit Money Banks operating in Nigeria was significant and positive. The study
recommends that critical stakeholders and beneficiaries of electronic banking – the government, regulatory
authorities and the banks should collaborate to put in place an enabling operating environment and an effective
regulatory framework to bring about optimal deployment of these services to customers
International Journal of Business and Management Invention (IJBMI)inventionjournals
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
The Journal will bring together leading researchers, engineers and scientists in the domain of interest from around the world. Topics of interest for submission include, but are not limited to
Ubiquitous computing will surround users
with a comfortable and convenient information environment and a smart
space that merges physical and computational infrastructures into an integrated
habitat. This habitat will feature a proliferation of hundreds or thousands of
computing devices and sensors that will provide new functionality, offer specialized
services, and boost productivity
and interaction among the devices and
the
users.
The continuous advancements and transformation changes occurring in the field of technology. This encompasses a wide range of emerging trends and innovations that are revolutionizing various industries and reshaping the way we live, work, and interact
Technology is a vast and rapidly evolving field that encompasses various aspects of innovation, development, and application of tools, systems, and processes to solve problems, improve efficiency, and enhance human life. From the latest advancements in artificial intelligence and machine learning to cutting-edge developments in blockchain technology and renewable energy solutions, the landscape of technology is constantly changing and shaping the way we live, work, and interact with the world around us.
FUTURE READY BANKING WITH SMART CONTRACTS - CBDC AND IMPACT ON THE INDIAN ECO...IJNSA Journal
India is significantly diverse in culture and how it promotes business transactions. Though we are very acquainted with cash, cards, and online mode of payment, the Indian rural economy still believes in the barter system. At this juncture, India is evolving as a tech power house, and its economy is thriving to embrace cryptocurrency as a medium of exchange. After the Indian finance minister declared the same last February that India is working towards building its legal tender called Central Bank-backed Digital Currency (CBDC), this paper is making an impact in explaining our strengths, weakness, market readiness, and necessity to adopt a digital rupee when India's economy is highly regarded as a cashoriented economy. Is our country ready to accept the new technological shift in smart banking in the form of a digital rupee? The paper highlights the socioeconomic and technical challenges our planners need to understand before changing the Central banks' monetary policies. The deployment of fifth-generation (5G) cellular network technology has sparked renewed interest in the potential of blockchain to automate different cellular network use cases. 5G is projected to open up new market prospects for small and large businesses. The article highlights the unique instrument of the digital rupee to enhance peer-to-peer transactions with the evolution of 5G mobile technology.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
Similar to EDUCATION, MIGRATION AND SUSTAINABILITYHUMAN SOCIOECONOMIC DEVELOPMENT AND CHANGING TECHNOLOGICAL TRENDS (20)
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
EDUCATION, MIGRATION AND SUSTAINABILITYHUMAN SOCIOECONOMIC DEVELOPMENT AND CHANGING TECHNOLOGICAL TRENDS
1. International Journal of Software Engineering & Applications (IJSEA), Vol.14, No.1, January 2023
DOI: 10.5121/ijsea.2023.14101 1
EDUCATION, MIGRATION AND SUSTAINABILITY-
HUMAN SOCIOECONOMIC DEVELOPMENT AND
CHANGING TECHNOLOGICAL TRENDS
Pawankumar Sharma
University of the Cumberlands, Williamsburg, KY USA
ABSTRACT
Technological innovations earmark the trends witnessed today, driving various economic statuses. The
current trends driving the education, migration, and sustainability of the human population include;
cybersecurity, artificial intelligence, and blockchain technology. Artificial intelligence uses the data
collected to predict future patterns in economic and climatic conditions, influencing migration as witnessed
in Africa. The blockchain, as innovated, aims to establish a decentralized and stable financial economy in
the current economy. Cybersecurity has arisen t curb the increased cyberattacks experienced in modern
society hence the need for public education to curb the cases. The current trends depend on the various
technological innovation driven by machine learning and algorithms.
KEYWORDS
Education, Sustainability, Socioeconomic Development, Technology Trends, AI, Blockchain
1. INTRODUCTION
The world continues to evolve daily with innovation in the various fields shaping the modern
world. Technology is the propelling feature towards the various developments and trends shaping
the contemporary community. Some of the innovations and technological trends experienced
today surround cloud computing, through which other trends have emerged, as witnessed in
Artificial Intelligence, Blockchain, and cybersecurity [14]. Cloud computing technological trends
have influenced the various socioeconomic developments in modern society, such as migration,
education, and sustainability. Technological trends have created jobs for multiple individuals in
the community, either direct or indirect, through integrating technology into the various
economic activities experienced in society [14]. Different technological computations have
shaped the various innovations and trends we experience today, such as algorithms, machine
learning, and artificial intelligence. As outlined below, the multiple technologies embraced in the
trends continue to shape the various trends, influencing the community positively or negatively
on numerous aspects such as education, migration, and socioeconomic sustainability.
2. ARTIFICIAL INTELLIGENCE
Artificial intelligence entails the technological advancement of digital computer incorporation to
perform the various tasks associated with intelligent human beings. Artificial intelligence utilizes
machine learning technology for the execution of multiple studies by mimicking human cognitive
activity. The cross-disciplinary approach incorporates the mathematical, computer science,
linguistics, and psychological practice in the execution of the various functions [12]. AI has
colored the multiple aspects of the modern world; drug dosing, diagnosis, and treatment
2. International Journal of Software Engineering & Applications (IJSEA), Vol.14, No.1, January 2023
2
administration to numerous patients alongside the administration of various surgical procedures.
The automotive industry has also incorporated artificial intelligence in adopting self-driving and
cashless payments. Technology has necessitated the economic livelihood of various individuals
through the various aspects of innovation hence shaping the livelihood sustainability, education
to the various students, and migration [12]. Besides, learners within computer science have their
curriculum centered on artificial intelligence and various algorithms.
Artificial intelligence, as it centers modernity on socioeconomic sustainability, has influenced the
various aspects of the community. For instance, artificial intelligence has necessitated self-
driving in electric vehicles hence improving sustainability as it has reduced accidents and
accidents occurring have fewer casualties [12]. The innovation and technology embraced in
artificial intelligence have affected the human employment sector by automating various jobs.
The intelligent machinery hence pushes for the elimination of workers from the workforce. For
instance, self-driving cars present an indefinite future for taxis and car-share programs with a
possibility of human labor replacement with machines, making people's skills obsolete.
Artificial intelligence helps predict immigration patterns across the population, especially in
Africa. For instance, artificial intelligence helps predict various climatic conditions and future
expectations, such as electricity accessibility during winter, which consequently influences the
migration pattern to particular regions with assured electricity [12]. The future prediction relies
on renewable energy data sources and technological execution. Besides, individuals utilize
economic statistics in predicting the future economic growth likely in a particular nation against
the various economic crises hence migrating to foreseeable future countries.
Artificial intelligence spurs innovation in teaching and learning practices. For instance, artificial
learning predicts the learners' various learning abilities and consequently helps develop the
necessary learning materials for multiple learners. Artificial intelligence also helps develop
technological innovations to address diversity and cultural expression inequalities [12]. Besides,
virtual reality addresses the scenarios of the learners connecting to various locations with other
learners or during the learning practice within the classroom setting.
3. BLOCKCHAIN TECHNOLOGY
Blockchain entails the shared, immutable ledger that facilitates transaction recording and asset
tracing within the business network. This technological innovation allows tracking the various
aspects alongside blockchain network trading, reducing the risks and costs involved in trading.
Businesses make decisions based on the information available, with faster generation translating
to better decision-making [2]. The blockchain offers an extensive advantage to the community as
it provides immediate, shared, and transparent information contained within an immutable ledger
accessible only through the network authorized to the various specific individuals [7]. The nature
of sharing a single view of the truth among members allows the accessibility to all details of all
transactions hence assuring confidence, efficiencies, and opportunities.
Blockchain technology incorporates various characteristic features. For instance, distributed
ledger technology restricts the recording of transactions, eliminating effort duplication and
eliminating double spending common problem in modern society [7]. Blockchain also features
the immutable records characteristic, limiting transaction tampering after recording on a shared
ledger [2]. The correction of a transaction error demands the addition of a new transaction to
record the error. The technology has also incorporated smart contracts defining the conditions for
corporate bond transfers.
3. International Journal of Software Engineering & Applications (IJSEA), Vol.14, No.1, January 2023
3
Blockchain technology centers on the tangible or intangible innovation of the asset movement.
The data block record highlights the various information related to the condition demonstrated by
place, time, and the amount and state shown in the shipment of the goods alongside the
requirements [2]. The blockchain presents the asset movement through the interconnection with
each block, confirming the time and transaction sequence. The linkage of the block prevents any
block from alteration or insertion between existing partnerships [2]. Blocking together the
transaction in an irreversible chain strengthens verification, removing the malicious actor
tampering as the transaction ledger builds on the trustable network.
Blockchain technology has facilitated numerous advantages to the community, especially in the
financial market. For instance, it reduces the immutability of transactions, providing a permanent
record safe for future information flow analysis and accountability [2]. The technology also
features a decentralized system, giving the various network members accessibility to data record
verification within the blockchain [7]. The decentralized technology system eliminates censorship
as multiple organizations, such as the government, control the technology and transactions like in
single-party-owned organizations [2]. Therefore, organizations have utilized this mode of
technology in marketing their operations as they escape the government enforcement of the
various policies, which may limit their operations.
Fig 1. Blockchain technology diagram
4. CYBER SECURITY
Cybersecurity entails technological innovation to protect systems, networks, and programs
against digital attacks, commonly dubbed cyberattacks. The cyberattacks, as launched, aim at the
accessibility and destruction of personal and sensitive information alongside the extortion of
money from users through ransomware. The increasing technological innovation by attackers has
necessitated the creation of cybersecurity to protect various users from technical attacks [6]. The
technological innovation works best through the Cisco security updates, which perform the
integration automation and accelerate security functions through detection, investigation, and
remediation. Technological innovation aims at educating and providing technology that facilitates
the protection of the various organization systems with a consideration of the main entry, such as
computers, smart devices, networks, and the cloud [6, 21]. The entities incorporated include the
next-generation firewall utilization through DNS filtering, antivirus software, and email security.
4. International Journal of Software Engineering & Applications (IJSEA), Vol.14, No.1, January 2023
4
The advancement in technology comes with educating the public on the various threats that come
along with cyberattacks and creating awareness of the dangers of cyberattacks. The different
companies and organizations housing critical personal data have outlined the various methods of
securing the data to keep society functioning, exemplified by the hospital and financial
institutions [6]. Common cybersecurity threats include phishing, social engineering, ransomware,
and malware. Phishing entails sending fraudulent emails resembling authentic emails to steal
sensitive data, exemplified by credit card numbers and login information. Email filtering has
protected the public from falling into such traps. Social engineering entails the common tactics
cybercriminals use to reveal sensitive information to solicit monetary payments. The crowd falls
prey to such criminal acts by clicking malicious software or downloading malware. At the same
time, the malware causes unauthorized computer access, and ransomware aims to extort money
by blocking file accessibility until the culprit pays a certain amount.
5. TECHNOLOGIES SHAPING THE TRENDS
5.1. Algorithm
An algorithm entails o the procedure utilized by the various information technologists in
executing a particular computation. It contains instructions necessary for the execution of specific
specified actions stepwise through hardware or software-based routines. Algorithms perform
multiple functions through data processing and automation of various procedures. For instance,
algorithms sort complicated tasks based on initial data inputs and instructions for specified
computations [5]. The programming languages depend on an algorithm for the execution of the
functions. Numbers or words direct the instructions executed with input data getting through
instruction sets, including arithmetic and decision-making processes. The final step includes an
algorithm expressed as data. Some examples of automation software include algorithms.
Various algorithms exist for modeling the different software, as exemplified by encryption,
search engine, recursive, and divide and conquer algorithms. The encryption algorithm entails
data transformation per specified actions for its protection. Data encryption standard utilizes
similar keys in encryption and decryption [21]. Search engine algorithm entails using search
string keywords and operators as inputs in searching for the various databases for webpages and
results return [11]. The recursive algorithm solves the different computations by repeatedly
executing itself until it solves a particular problem [8]. The recursive algorithm utilizes the
strategy of smaller value calling upon invoking a recursive function. The divide and conquer
algorithm entails the division of the algorithm into two parts, with one part division
demonstrating a smaller sub-problem. In contrast, the second part disintegrates the other problem,
solving it. The algorithm hence combines the problems solved to provide a definite solution.
5. International Journal of Software Engineering & Applications (IJSEA), Vol.14, No.1, January 2023
5
Fig 2. Star algorithm [15]
The algorithm has resulted in various data science technologies, such as machine learning.
Machine learning utilizes the algorithm in the prediction of outcomes without explicit
programming. Machine learning uses supervised learning to supply complex algorithms with
labeled data training and the definition of the variables for correlation assessment [13, 14].
Machine learning also utilizes unsupervised learning in data prediction. It involves the algorithms
for unlabeled data training with unsupervised machine learning sifting through unlabeled data for
the execution of patterns used in grouping data points into subsets. As exemplified by neural
networks, unsupervised learning has prompted deep understanding [15-17]. Artificial intelligence
depends on algorithms for functioning. The machine-learning-based systems comprise inherent
biases in data-feeding machine-learning algorithms resulting in untrustworthy systems
development.
5.2. Machine Learning
Machine learning entails the artificial intelligence skill that drives machines' capability to imitate
intelligent human behavior. Artificial intelligence helps in the execution of various complex tasks
in similar human mechanisms. Machine learning has guided the formulation of artificial
intelligence technology that helps in recognition of visual scenes, understanding text formulated
in natural language processing, and execution of an action in the physical world [21]. Machine
learning incorporates the data, numbers, and photos in gathering and preparing data for training
or developing a machine learning model to execute a particular function. Some of the data
gathered help evaluate the program's effectiveness and demonstrate the accuracy of the machine-
learning model upon execution of new data [3, 18]. Machine learning functions as descriptive,
illustrating the occurrence of a particular action, predict of future activity, and prescriptive of the
data utilization in making suggestions of whatever action improvised.
Machine learning employs three categories; supervised, unsupervised, and reinforcement.
Supervised machine learning entails training with labeled data sets to allow the model in
education and illustrate accurate decisions. The particular algorithm train on identification
models of a specific object [3]. Unsupervised machine programming seeks to identify unlabeled
6. International Journal of Software Engineering & Applications (IJSEA), Vol.14, No.1, January 2023
6
data, identifying patterns and trends that individuals have less interest in looking at.
Reinforcement machine learning entails the program training the machines on trial and error for
an established reward system [10, 18]—reinforcement learning models in playing games and
autonomous vehicle driving through directing the best decision-making.
Machine learning is associated with various artificial intelligence fields demonstrated by natural
language processing and neural networks. Natural language processing entails machine learning
for understanding natural language written by humans rather than data and numbers in computer
programming. Machine learning algorithms model the human brain through interconnection and
layer organization, facilitating the technology [4, 20]. Natural language processing improvises the
data labeling through nodes, with each cell performing a particular function. The different nodes
assess information and dictate the action response.
Fig 3. Machine learning block diagram [9]
6. STATISTICS ON SOCIOECONOMIC USE OF THE TECHNOLOGY
g (z) =
1
1+exp (−𝑧)
Equation (1)
Different companies have initiated the utilization of various technologies in running their
companies. For instance, 67% of companies like Netflix utilize machine learning to run sales and
control supplies. Multiple companies also use the google search algorithm, such as Netflix, in
providing suggestions on movies to their esteemed users [20]. The linearity assumption in
machine learning helps highlight the linearity between independent and dependent variables
using a mathematical formula.
7. CONCLUSION
Ultimately, technological innovations continue to shape modern trends due to technological
advancements. Some current trends include blockchain technology, artificial intelligence, and
cybersecurity. Artificial intelligence has demonstrated the population's changing nature
depending on the future situations demonstrated by electricity availability and economic
conditions. Blockchain technology aims to establish a stable currency propelling the various
functions in a society free from government intervention due to the decentralized system.
Cyberattacks havenecessitated cybersecurity awareness to protect the population from
cybercrimes. Different technologies drive innovations,as demonstrated by machine learning and
algorithms.
7. International Journal of Software Engineering & Applications (IJSEA), Vol.14, No.1, January 2023
7
REFERENCES
[1] Alam, I., Sarwar, N., & Noreen, I. (2022). Statistical analysis of software development models by six-
pointed star framework. PLOS ONE, 17(4). https://doi.org/10.1371/journal.pone.0264420
[2] Dash, B., & Ansari, M. F. (2022). An Effective Cybersecurity Awareness Training Model: First
Defense of an Organizational Security Strategy.
[3] Bolfing, A. (2020). Introduction to blockchain technology. Cryptographic Primitives in Blockchain
Technology, 199–240. https://doi.org/10.1093/oso/9780198862840.003.0006
[4] Chatterjee, C. (2022). Adaptive machine learning algorithms with python.
https://doi.org/10.1007/978-1-4842-8017-1
[5] Chen Di. (2021). Review for "a deep generative artificial intelligence system to predict species
coexistence patterns."https://doi.org/10.1111/2041-210x.13827/v1/review1
[6] Cisek, G. (2021). How much and what kind of artificial intelligence can humans bear? The Triumph
of Artificial Intelligence, 1–6. https://doi.org/10.1007/978-3-658-34896-0_1
[7] Evans, A. (2022). Cybersecurity trends and spending. Enterprise Cybersecurity in Digital Business,
48–57. https://doi.org/10.4324/9781003052616-6
[8] Keogh, John &Rejeb, Abderahman& Khan, Nida & Dean, Kevin & Hand, Karen. (2020). Blockchain
and GS1 Standards in the Food Chain: A Review of the Possibilities and Challenges.
[9] Kervazo, C., Gillis, N., &Dobigeon, N. (2021). Successive nonnegative projection algorithm for
linear quadratic mixtures. 2020 28th European Signal Processing Conference (EUSIPCO).
https://doi.org/10.23919/eusipco47968.2020.9287788
[10] Kotti, Jayasri. (2020). Industrial Automation with Safety Aspects using Machine Learning
Techniques. Safety in Extreme Environments. 2. 1-6. https://doi.org/10.1007/s42797-020-00020-y.
[11] Kulman, E., Wintersinger, J., & Morris, Q. (2022). Reconstructing cancer phylogenies using Pairtree,
a clone tree reconstruction algorithm. STAR Protocols, 3(4), 101706.
https://doi.org/10.1016/j.xpro.2022.101706
[12] Dash, B., Ansari, M. F., Sharma, P., & Ali, A. (2022). THREATS AND OPPORTUNITIES WITH
AI-BASED CYBER SECURITY INTRUSION DETECTION: AReview. International Journal of
Software Engineering & Applications, 13(5), 13-21.
[13] Li, J. (2022). Comparative analysis of some typical encryption algorithms and hash algorithms. 2022
International Conference on Big Data, Information and Computer Network (BDICN).
https://doi.org/10.1109/bdicn55575.2022.00013
[14] Mantini, A. (2022). Technological sustainability and artificial intelligence algor-ethics. Sustainability,
14(6), 3215. https://doi.org/10.3390/su14063215
[15] Sarker, I. H. (2021). Machine learning: Algorithms, real-world applications, and Research Directions.
SN Computer Science, 2(3). https://doi.org/10.1007/s42979-021-00592-x
[16] Subha, T. (2020). Assessing security features of Blockchain technology. Blockchain Technology and
Applications, 115–138. https://doi.org/10.1201/9781003081487-7
[17] Zidane, Issa & Ibrahim, Khalil. (2018). Wavefront and A-Star Algorithms for Mobile Robot Path
Planning. 69-80. https://doi.org/10.1007/978-3-319-64861-3_7.
[18] Dash, B., Sharma, P., Ansari, M. F., & Swayamsiddha, S. (2022a). A review of ONDC's digital
warfare in India taking on the e-commerce giants. International Journal of Engineering &
Technology, 11(2), 96-99.
[19] Dash, B., & Ansari, M. F. (2022a). Self-service analytics for data-driven decision making during
COVID-19 pandemic: An organization’s best defense. Academia Letters, 2.
[20] Deepa, V., Sujatha, R., & Mohan, J. (2022). Unsung voices of technology in school education-
findings using the constructivist grounded theory approach. Smart Learning Environments, 9(1), 1-
25.
[21] Dash, B., & Ansari, M. F. (2022b). An Effective Cybersecurity Awareness Training Model: First
Defense of an Organizational Security Strategy.
8. International Journal of Software Engineering & Applications (IJSEA), Vol.14, No.1, January 2023
8
AUTHOR
Pawankumar Sharma is a Senior Product Manager for Walmart in San Bruno, California. He iscurrently
on his Ph.D.in Information Technology at the University of the Cumberlands, Kentucky. Pawankumar
completed his Master of Science in Management Information Systems from the University of Nebraska at
Omaha in 2015. He also holds another Master of Science in Information Systems Security from the
University of the Cumber lands, Kentucky, and graduated in 2020. His research interests are cyber security,
Artificial Intelligence, Cloud Computing, Neural Networks,Information Systems, Big Data Analytics, and
Intrusion Detection and Prevention.