<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="18372" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/18372?output=omeka-xml" accessDate="2026-05-18T23:01:06+00:00">
  <collection collectionId="15">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="44496">
                <text>Book Chapter</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="27">
    <name>Book Chapter</name>
    <description>Faculty Publications- Book Chapter</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="153061">
              <text>Applications of Digital Technologies and Artificial Intelligence in Cryptocurrency - A Multi-Dimensional Perspective</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="153062">
              <text>blockchain; Cryptocurrency; deep learning; FinTech technologies; hybrid analytics approach; machine learning; security attacks; sensitivity analysis</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="153063">
              <text>The paradigm shift requires spreading the light of decentralized ledger technology, extraordinarily implementing cryptocurrencies, and being visible as a game-changer. Blockchain technology, along with cryptocurrencies like Bitcoin, Ethereum, and Litecoin, is a tool for global economic transformation that is rapidly gaining traction in the finance industry. However, these technologies have had low popularity in the consumer market. Many platforms have been misunderstood and ignored when there is an obvious hole in among them. The basic idea behind cryptocurrency is that it is a network-based, totally virtual exchange medium that utilizes cryptographic algorithms such as Secure Hash Algorithm 2 (SHA-2) and Message Digest 5 (MD5) to secure the data. Transactions within the blockchain era are secure, transparent, traceable, and irreversible. Cryptocurrencies have gained a reputation in practically all sectors, including the monetary sector, due to these properties. The uncertainty and dynamism of their expenses, however, hazard investments substantially despite cryptocurrencies growing popularity amongst approval bodies. Studying cryptocurrency charge prediction is fast becoming a trending subject matter in the global research community. Several device mastering and deep mastering algorithms, like Gated Recurrence Units (GRUs), Neural nets (NNs), and nearly short-term memory, were employed by the scientists to analyze and forecast cryptocurrency prices. As a part of this chapter, we discuss numerous aspects of cryptographic protection and their related issues. Specifically, the research addresses the state-of-the-art by examining the underlying consensus mechanism, cryptocurrency, attack style, and applications of cryptocurrencies from a unique perspective. Secondly, we investigate the usability of blockchain generation by examining the behavioral factors that influence customers decision to use blockchain-based technology. To identify the best crypto mining strategy, the research employs an Analytic Hierarchy Process (AHP) and Fuzzy-TOPSIS hybrid analytics framework. Furthermore, it identifies the top-quality mining methods by evaluating providers overall performance during cryptocurrency mining.  2023 Scrivener Publishing LLC.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="153064">
              <text>Jaisingh W.; Preethi N.; Kavitha R.K.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="153065">
              <text>Fintech and Cryptocurrency, pp. 221-249.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="153066">
              <text>wiley</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="153067">
              <text>2023-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="153068">
              <text>&lt;a href="https://doi.org/10.1002/9781119905028.ch11" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1002/9781119905028.ch11&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85191468172&amp;amp;doi=10.1002%2F9781119905028.ch11&amp;amp;partnerID=40&amp;amp;md5=8f5873b0ef5c3a386a50ca59a8939ba2" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85191468172&amp;amp;doi=10.1002%2f9781119905028.ch11&amp;amp;partnerID=40&amp;amp;md5=8f5873b0ef5c3a386a50ca59a8939ba2&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="153069">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="153070">
              <text>ISBN: 978-111990502-8; 978-111990481-6</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="153071">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="153072">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="153073">
              <text>Book chapter</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="153074">
              <text>Jaisingh W., School of Information Science, Presidency University, Karnataka, Bangalore, India; Preethi N., Department of Data Science, Christ University, Karnataka, Bangalore, India; Kavitha R.K., Department of Computer Applications, Kumaraguru College of Technology, Tamil Nadu, Coimbatore, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
