Browse Items (9795 total)
Sort by:
-
Generative AI-human collaboration in higher education: Applications, challenges, and strategies
The advent of GenAI has brought about substantial progress and prospects in diverse sectors, including education. We are witnessing significant progress in this field of artificial intelligence, with the emergence of chatbots such as ChatGPT and the proliferation of remarkably realistic AI-generated graphics. Generative AI, as an emerging technology, has the potential to bring significant and transformative improvements to education. Generative AI encourages higher education institutions to embrace and utilize the potential of these technologies to enhance several aspects such as student experience, faculty workload, intellectual property, etc. This chapter has explored the application of generative AI in the context of higher education, in light of its increasing prevalence. Although generative artificial intelligence offers a great deal of promise to improve education, the technology is not entirely devoid of difficulties. The chapter also discusses challenges and strategies related to generative AI in higher education. 2024 by IGI Global. -
The Industrial Revolution From Mechanisation (1.0) to Smart Automation (5.0)
The Industrial Revolution was a transformative event of unprecedented magnitude, profoundly altering many facets of society, including consumption patterns, social structures, cultural norms, and global arrangements. Contrary to popular belief, there is not a one Industrial Revolution, but rather a sequence of stages characterised by gradual advancements. We are currently on the verge of the Fifth Industrial Revolution, which is expected to have a greater impact than the cumulative effect of the preceding four revolutions. Industry 5.0 is the latest term gaining popularity in the business sector, with significant claims to fundamentally transform our lifestyle. Industry 5.0 is expected to drive more progress in the field of intelligent automation within the manufacturing sector. This chapter specifically examines the transition of industry sector from version 1.0 to version 5.0. 2025 selection and editorial matter, Payal Bansal, Rajeev Kumar, Ashwani Kumar and Daniel D. Dasig, Jr.; individual chapters, the contributors. -
Role of blockchain technology for user data security in metaverse
The metaverse is generating widespread interest among organizations of various scales, as companies acknowledge its capacity for profound transformation. Prominent organizations are actively adopting the metaverse concept to improve their operations and interact with clients in innovative and captivating manners. This chapter examines the vital function that blockchain plays in bolstering user data security as it explores the urgent problem of data breaches in the metaverse sector. The authors also carefully examine recent data breach cases in the metaverse sector, such as sandbox incursions, deepfake attacks, and digital avatar assaults. By outlining these practical difficulties, they make clear how urgent it is to come up with reliable ways to safeguard user data in the metaverse. The study findings have emphasized the dynamic and evolving nature of the metaverse industry, which is now undergoing substantial development and continuous exploration. They have also focused on significant blockchain technologies that demonstrate potential in ensuring data security. 2024, IGI Global. All rights reserved. -
Unlocking IoT: AI-enabled green fintech innovations
Meeting ESG (environmental, social, and governance) standards is becoming an essential goal for businesses, one that is supported by both investors and customers. FinTech can help companies evaluate and reduce their environmental effect, as well as investors channel their operations toward more sustainable assets. Embracing sustainability has become one of the priorities for many fintech companies today. Green fintech innovations have provided technologically enabled solutions for financial services that help in increasing the flow of financial resources for sustainable development. Recognizing the importance of green fintech in today's scenario, this chapter will initially focus on the components of the fintech ecosystem and IoT and AI-enabled fintech innovations in India, drivers of green fintech potentials of green fintech IoT, and AI-enabled green fintech from global perspective and has highlighted the green fintech solutions provided by the topmost companies. 2022, IGI Global. All rights reserved. -
Traditional finance vs. web 3: A comparative analysis of key features and characteristics for better readability purposes
Web3 is a ground-breaking invention that has the ability to address the shortcomings of web1 and web2. The industry witnessing its major impact is the finance sector. A wave of innovation in traditional finance has been inspired by the introduction of Web3. It is also referred to as the decentralised web and is a developing movement that is upending conventional finance by providing a more open, safe, and decentralised substitute. Traditional banking should work to adopt the features that Web3 offers, including stability, scalability, interoperability, security, performance, extensibility, management, and openness. In order for TradFi to maintain its relevance and expertise in the face of the widespread adoption of digital financial modes, it is now necessary to embrace several Web3 capabilities. Keeping into consideration the relevance and importance of Web3 in finance, this chapter will basically focus on analysing the key features and characteristics of Web3 in comparison to traditional finance. 2023 by IGI Global. All rights reserved. -
Leveraging transparency and privacy through blockchain technology
Blockchain is a conveyed record innovation that can be utilized to keep exchanges in a safe and straightforward way. This makes it a promising innovation for various applications, for example inventory network the executives, monetary administrations, and medical services. One of the vital advantages of blockchain is its capacity to guarantee information consistency. This is on the grounds that all information on the blockchain is put away in a disseminated way, and every hub in the organization has a duplicate of the record. This makes it truly challenging for any one party to mess with the information. One more key advantage of blockchain is its straightforwardness. All exchanges on the blockchain are public, and anybody can see them. This can assist with building trust and straightforwardness among partners. Blockchain can likewise present difficulties regarding information security. This is on the grounds that all information on the blockchain is put away in a public record. This implies that anybody with admittance to the blockchain can see the information, including delicate data, for example individual recognizable proof numbers (PII). There are various ways of tending to the difficulties of information protection in blockchain. One methodology is to utilize encryption to safeguard delicate information. Another 2024, IGI Global. All rights reserved. -
Model Selection Procedure in Alleviating Drawbacks of the Electronic Whiteboard
Deep learning has paved the way for critical and revolutionary applications in almost every field of life in general. Ranging from engineering to healthcare, machine learning and deep learning has left its mark as the state-of-the-art technology application which holds the epitome of a reasonable high benchmarked solution. Incorporating neural network architectures into applications has become a common part of any software development process. In this paper, we perform a comparative analysis on the different transfer learning approaches in the domain of hand-written digit recognition. We use two performance measures, loss and accuracy. We later visualize the different results for the training and validation datasets and reach to a unison conclusion. This paper aims to target the drawbacks of the electronic whiteboard with simultaneous focus on the suitable model selection procedure for the digit recognition problem. 2021 IEEE. -
A post covid machine learning approach in teaching and learning methodology to alleviate drawbacks of the e-whiteboards
Deep learning has paved the way for critical and revolutionary applications in almost every field of life in general. Ranging from engineering to healthcare, machine learning and deep learning has left its mark as the state-of-the-art technology application which holds the epitome of a reasonable high benchmarked solution. Incorporating neural network architectures into applications has become a common part of any software development process. In this paper, we perform a comparative analysis on the different transfer learning approaches in the domain of hand-written digit recognition. We use two performance measures, loss and accuracy. We later visualize the different results for the training and validation datasets and reach to a unison conclusion. This paper aims to target the drawbacks of the electronic whiteboard with simultaneous focus on the suitable model selection procedure for the digit recognition problem. 2021 Tamkang University. All Rights Reserved. -
Secured and Provisioned Access Authentication using Subscribed User Identity in Federated Clouds
Cloud computing has become an essential source for modern trade or market environments by abled frameworks. The exponential growth of cloud computing services in the last few years has resulted in extensive use, especially in storing and sharing the data on various cloud servers. The current trend in the cloud shows that the cloud owners use relative functions and target areas in such a way that cloud customers access or store their data either in the same servers or related servers. Simultaneously, from the security point of view, the lack of confidence about the customer's data on the cloud server is still questionable. The hour's need is to provide the cloud service in a single port way by forming the joint management policy to increase customer satisfaction and profitability. In addition to this, the authentication steps also need to be improvised. This paper discusses issues on the security authentication and access provisioning of the cloud service consumers in federated clouds using subscribed user identity. This work proposes the user identity verification module (UidVM) in the cloud service consumer's authentication process to serve as a cloud broker to minimize the work overloads on the central cloud federation management system, thus enhancing the cloud security. 2021. All Rights Reserved. -
Blockchain-Enabled Smart Contracts in Agriculture: Enhancing Trust and Efficiency
This study explores the important role of blockchain technology in the transformation of agriculture and presents a new way to integrate chatbots and smart contracts to solve the problem of persistence. Leverage the decentralized structure and security of the blockchain to increase traceability, transparency and fairness in agricultural product prices. A user-friendly chatbot built in Python using Tkinter that acts as a bridge between farmers and the Ethereum-based blockchain pricing algorithm. Smart contracts used in Solidity dynamically adjust crop prices based on the weather in real time, making it possible for prices to react and adjust. Simulations and tests in Ganache validate the proposed method, confirming its economic value and effectiveness in many agricultural cultures. This study delves into analytics, including latency and production time, to demonstrate the benefits of the blockchain model in creating transparent, farmer-centric and region-specific crop prices. The importance of this research is to support continuous change in agricultural technology, paving the way for the introduction of appropriate and fair prices. According to the amendment, the integration of advanced machine learning, further integration and collaboration with agricultural stakeholders should be developed in the future. This work sets a good path for agriculture, promoting transparency, fairness and quick access to the best crop prices, thus ensuring security and agricultural technology. 2024 IEEE. -
Integrated IoT-Based Secure and Efficient Key Management Framework Using Hashgraphs for Autonomous Vehicles to Ensure Road Safety
Autonomous vehicles offer various advantages to both vehicle owners and automobile companies. However, despite the advantages, there are various risks associated with these vehicles. These vehicles interact with each other by forming a vehicular network, also known as VANET, in a centralized manner. This centralized network is vulnerable to cyber-attacks which can cause data loss, resulting in road accidents. Thus, to prevent the vehicular network from being attacked and to prevent the privacy of the data, key management is used. However, key management alone over a centralized network is not effective in ensuring data integrity in a vehicular network. To resolve this issue, various studies have introduced a blockchain-based approach and enabled key management over a decentralized network. This technique is also found effective in ensuring the privacy of all the stakeholders involved in a vehicular network. Furthermore, a blockchain-based key management system can also help in storing a large amount of data over a distributed network, which can encourage a faster exchange of information between vehicles in a network. However, there are certain limitations of blockchain technology that may affect the efficient working of autonomous vehicles. Most of the existing blockchain-based systems are implemented over Ethereum or Bitcoin. The transaction-processing capability of these blockchains is in the range of 5 to 20 transactions per second, whereas hashgraphs are capable of processing thousands of transactions per second as the data are processed exponentially. Furthermore, a hashgraph prevents the user from altering the order of the transactions being processed, and they do not need high computational powers to operate, which may help in reducing the overall cost of the system. Due to the advantages offered by a hashgraph, an advanced key management framework based on a hashgraph for secure communication between the vehicles is suggested in this paper. The framework is developed using the concept of Leaving of Vehicles based on a Logical Key Hierarchy (LKH) and Batch Rekeying. The system is tested and compared with other closely related systems on the basis of the transaction compilation time and change in traffic rates. 2022 by the authors. Licensee MDPI, Basel, Switzerland. -
An Introduction to Business Intelligence
The quality of managerial decisions impacts the performance of any business, and this decision mainly depends on the reliability, inclusiveness, correctness, and trustworthiness of the data used for this purpose. Nowadays, business intelligence (BI) has become a key buzzword. BI supports better business decision-making by transforming data into actionable insights. The digitalization or digitization of business is accommodating and embracing the new BI to endure and stand for consistency and competitiveness for business development toward technological or digital transformation. In this digital or computer era, only those businesses will be profitable and successful that are well furnished to digitally (or binary) shift their practices in the technological or information age. In the new technological age, high powered by data analytics capabilities, meaningful and systematic data assimilation has become a new challenge for an organization to transfer data into BI. BI is a technology-driven process for analyzing data into information; information into knowledge; and knowledge into plans that manage and regulate the organization. BI presents actionable information to help corporate executives; business managers, and other end-users and makes more informed business decisions. BI software systems provide historical, current, and predictive views of business operations. Dashboards; Forecasting; Graphical Reporting; Graphical Online Analytical Processing (OLAP); and Key Performance Indicators (KPIs) are the modules of BI. BI helps in organizing teams, keeping them mindful and aware of KPIs. The awareness of KPIs through dashboards and reports keeps teams aligned and more focused on their goals. The optimal aim of BI is to enable a business to make informed decisions. BI helps business managers or leaders utilize data in a way that is coherent and dynamic. The key elements of BI involved are Advanced Analytics or Corporate Performance Management; BI; Data Sources; Data Warehousing and OLAP. With the latest technology and innovations, there are countless BI applications available for varied types of data analysis. BI software or technologies can deal with multiple structured and unstructured data to identify, develop, and create new strategies business opportunities. Its purpose is to enable clear and accessible interpretation of the huge data, to identify new opportunities and execute effective strategies. Strategic BI (SBI) is always associated with reporting from an analytical data source or data warehouse. Essentially, SBI improves the business process by analyzing a predetermined set of data pertinent to that process and provides the historical background of that data. SBI assembles on four crucial and necessary criteria or frameworks, namely collection and storage of data; Optimization of data for analysis; Identification of important business drivers through past data records; and seeking answers to key business questions. Hence, BI provides procedures and technologies, and tools for current business leaders to alter and modify dynamically and effectively lead their companies with correct data decisions. This research paper is qualitative and based on secondary data. This chapter aims to provide insights into BI and highlights the recent innovations and future of BI. 2023 selection and editorial matter, Deepmala Singh, Anurag Singh, Amizan Omar & S.B Goyal. -
Patents and Innovations for Digital Sustainability
With technology growing at a rapid pace, a major issue which is being faced is the problem of effective energy usage and sustainability such that the future generation does not have to bear the brunt of our actions. Through the course of the chapter, the various innovations and patents in the field of digital sustainability are explored which are vital for the preservation of the planet. Patents play a crucial role in promoting innovations and development, as well as protecting the rights of inventors. The varied recent developments in the field of energy sustainability and explaining their work while assessing their contribution to the field are the focus of this chapter. The chapter also provides a comprehensive overview of the relationship between patents and innovations in digital sustainability, offering insights and guidance for researchers, practitioners, and policymakers working in this field. 2024 selection and editorial matter, Vandana Sharma, Balamurugan Balusamy, Munish Sabharwal, and Mariya Ouaissa. -
A Theoretical Article: Exploring the Evolutionary Dynamics of Couples and Family Therapy
This article provides a comprehensive review of how the field of family therapy has evolved, tracing its roots from early practices influenced by eugenics to its current diverse theoretical frameworks, which are ever-expanding. In the mid-20th century, family therapy expanded beyond its eugenic roots, embracing diverse theoretical frameworks and giving rise to various therapeutic modalities like behavioral and emotionally focused family and couples therapy. However, due to cultural disparities, these concepts and models cannot holistically capture the essence of family therapy in India. They do not compute the central role of the intergenerational subsystem or understand hierarchical dynamics. What is deemed okay in the Western context does not hold true in the Indian context. Postmodern approaches show a marked improvement in dealing with these problems in cultural adaptations of family and couples therapy by integrating diverse therapeutic practices, technological advances, and cultural and diversity-sensitive practices. However, despite these advancements, the adapted modalities have a scope for improvement, posing a pressing need for research that bridges this gap. Moving forward research should focus on family change mechanisms, symptom improvement factors, and prioritizing culturally sensitive approaches to meet the unique needs of Indian families. The Author(s) 2024. -
Review on microbially synthesized nanoparticles: a potent biocontrol agent against Aedes species of mosquito
Aedes aegypti is a principal vector of dengue, chikungunya and Zika illnesses worldwide. Because effective vaccinations or medications for the prevention and/or treatment for these illnesses are not available, vector management has been embraced as the primary method of reducing their transmission. The strategy that is often used for controlling Aedes populations is chemical insecticides; however, despite their efficiency, extensive usage of these pesticides has resulted in high operating costs, the establishment of resistant populations and undesirable non-target impacts. Therefore, the use of nanoparticles derived from multiple synthesis processes as new insecticides has recently attracted the interest of researchers. This study provides an overview of the current understanding concerning the method of action of nanoparticles against mosquitoes. Metal nanoparticles strongly influence antioxidant and detoxifying enzymes in insects, causing oxidative stress and cell death. These nanoparticles similarly inhibited acetylcholinesterase activity. Metal-based nanoparticles can potentially bind to S and P units in proteins and nucleic acids respectively resulting in decreased membrane permeability, organelle and enzyme denaturation which leads to cell death. Furthermore, they upregulate and downregulate critical insect genes, lower protein synthesis and gonadotrophin release, resulting in developmental and reproductive failure. This review critically examines insect nanotoxicology research trends and highlights the ecotoxicological effects of practical usage of nanoparticles as insecticides. 2022 World Research Association. All rights reserved. -
POST-LISTING PRICING PERFORMANCE OF INITIAL PUBLIC OFFERS: INSIGHTS FROM INDIA
The objective of this study is to investigate short-run performance and whether the IPOs are over-priced or under-priced in various window periods. This study applies one-sample t-tests, capital asset pricing models, and market-adjusted excess return to quantify the short-term pricing performance as well as the risk and return of initial public offerings and market indices. The study investigates the claim that post-listing initial public offerings (IPOs) guarantee short-term gains. The twelve months following the listing, in particular, have seen the biggest gains. According to reports, investors who buy shares in IPOs get strong returns in this period. The market-adjusted initial returns for the IPOs registered on the National Stock Exchange between January 2019 and December 2020 have been found to be roughly 44%, per this analysis. 2024 Published by Faculty of Engineering. -
Exploring the use of mobile phones by children with intellectual disabilities: experiences from Haryana, India
Purpose: Covid-induced lockdowns have increased the importance of technology in education. Though access to technology as well as availability of the internet remain a major concern for a lot of children in the global south, children with intellectual disabilities are disadvantaged even more as most of the e-content is developed keeping in mind the average learner. Materials and methods: Unstructured interviews were conducted with children with intellectual disabilities studying in government schools in Haryana as well as their teachers and parents. Thematic analysis of the interviews was conducted to understand the use-patterns of mobile phones by children with intellectual disabilities. Results: Findings suggest that these children are learning to use mobile phones on their own or with some support and are able to navigate the complexities of these smartphones quite well. They use these devices mostly for their entertainment. This paper then reflects on the need and strategies to develop these technologies in ways that they can be used as effective tools for teaching children with intellectual disabilities, especially in the inclusive education system in developing countries. Conclusion: The paper reflects on the need to develop technology and tools using flexible and exploratory designs to enhance the learning processes for children with intellectual disabilities from the lower income strata.IMPLICATIONS FOR REHABILITATION This study highlights the importance of being able to use mobile phones by children with intellectual disabilities belonging to low income families. Following this, the article argues for designing of mobile phones suitable for use by children with intellectual disabilities using playfulness and explorations, and Building e-content keeping the elements of playfulness and exploration which can enhance the learnings of this group of students which is often ignored. 2022 Informa UK Limited, trading as Taylor & Francis Group. -
Design of Grovers Algorithm over 2, 3 and 4-Qubit Systems in Quantum Programming Studio
In this paper, we design and analyse the Circuit for Grovers Quantum Search Algorithm on 2, 3 and 4-qubit systems, in terms of number of gates, representation of state vectors and measurement probability for the state vectors. We designed, examined and simulated the quantum circuit on IBM Q platform using Quantum Programming Studio. We present the theoretical implementation of the search algorithm on different qubit systems. We observe that our circuit design for 2 and 4-qubit systems are precise and do not introduce any error while experiencing a small error to our design of 3-qubit quantum system. 2022 Polish Academy of Sciences. All rights reserved. -
A collaborative defense protocol against collaborative attacks in wireless mesh networks
Wireless mesh network is an evolving next generation multi-hop broadband wireless technology. Collaborative attacks are more severe at the transport layer of such networks where the transmission control protocol's three-way handshake process is affected with the intention to bring the network down by denying its services. In this paper, we propose a novel collaborative defense protocol (CDP) which uses a handshake-based verification process and a collaborative flood detection and reaction process to effectively carry out the defense. This protocol presents a group of monitors that collaboratively entail in defending the attack; thus reduces the burden on a single monitor. Moreover, this paper proposes a novel transport layer post-connection flooding attack that occurs after establishing a TCP connection and we show that CDP can detect and mitigate this attack. The CDP protocol has been implemented in Java and its performance has been evaluated using essential metrics. We show that CDP is efficient and reliable and it can identify the attack before any major damage has occurred. Copyright 2021 Inderscience Enterprises Ltd.