Journal of Statistics and Management Systems, Dec 31, 2022
The upsurge of cyberbullying is one of the major causes of emotional distress among youths and ad... more The upsurge of cyberbullying is one of the major causes of emotional distress among youths and adults in this rapidly advancing technological era. Over the last decade, our society had a newfound addiction to social media. Despite the pros of social media, its usage has a large spectrum of cons. A recent study in 2021 stated that over 330 million people might potentially suffer Internet addiction by the year 2023. With such alarming numbers, it's time to realize how it will lead to a sudden elevation in cyberbullying across the globe. Cyberbullying is now an international public health concern among adolescents. Researchers are now more concerned about the mental health and social well-being of people around them. The subject of cyberbullying among tweens, teens, and youths has always been the center of attention, but now there is an advent of a new add-on workplace cyberbullying. There is a need to perform more longitudinal work to understand the effects of cyberbullying and to identify possible prevention and intervention efforts to reduce its impact.
The upsurge of cyberbullying is one of the major causes of emotional distress among youths and ad... more The upsurge of cyberbullying is one of the major causes of emotional distress among youths and adults in this rapidly advancing technological era. Over the last decade, our society had a newfound addiction to social media. Despite the pros of social media, its usage has a large spectrum of cons. A recent study in 2021 stated that over 330 million people might potentially suffer Internet addiction by the year 2023. With such alarming numbers, it's time to realize how it will lead to a sudden elevation in cyberbullying across the globe. Cyberbullying is now an international public health concern among adolescents. Researchers are now more concerned about the mental health and social well-being of people around them. The subject of cyberbullying among tweens, teens, and youths has always been the center of attention, but now there is an advent of a new add-on workplace cyberbullying. There is a need to perform more longitudinal work to understand the effects of cyberbullying and to identify possible prevention and intervention efforts to reduce its impact.
Internet of Medical Things is the interconnectivity of highly sophisticated medical grade devices... more Internet of Medical Things is the interconnectivity of highly sophisticated medical grade devices and software applications to work together and provide a new improved version of health care environment in this era. Wearable and standalone devices like Fitbit, remote patient monitoring system use sensor technology to exchange medical information of patients from remote areas to health workforces’ over wireless network. Apart from being advantageous IoMT faces challenges like safety, cyber security and scalability, interoperability, verification and validation. Interoperability is a facility through which m-health devices, databases share and maintains health records seamlessly. Interoperability basically deals with the exchange, interpretation and usage of data delivered through different computerized gadgets without restrictions. Currently there are numerous government-certified EHR products each of which has different technical, clinical and serviceable capabilities. Being heterogeneous in nature it becomes hard to achieve a single standard interoperability format to exchange data.
The demand for many agricultural tracking applications is timely and reliable information on crop... more The demand for many agricultural tracking applications is timely and reliable information on crop quality and development. The most widely used source that yields forecasts and appraisal is coarse spatial resolution satellite image as it provides coverage and temporal resolution at local and national scales. For measuring the quantity of green biomass in agricultural areas, NDVI is used to monitor crop stress, and NDWI to monitor drought stress. Precision agriculture, forest health monitoring, and other applications where the state of plants is sensitive to changes in water content are all examples of where NDWI is widely used. In this paper, the main focus is to extract complete information on the cultivation and harvesting of wheat crops for proper field monitoring. In total, five Sentinel-2A images from January 2020 to May 2020 have been downloaded and processed to monitor the status of wheat crop cultivation, harvesting, and the post-harvesting cycle. Therefore, by extracting meaningful information on the cultivation and harvesting process of the wheat crop, a sustainable approach is identified for developing a Machine Learning (ML)-based Smart Agriculture System. The proposed framework will help to monitor crop health and crop growth and will provide predictions on crop stress and drought stress. ML-based solutions are currently addressing crop-specific issues; however, farming methods will move to knowledge-based agriculture as automated data recording, data analysis, and decision-making are combined into an integrated framework, which will enhance productivity levels and product quality.
Internet of Medical Things is the interconnectivity of highly sophisticated medical grade devices... more Internet of Medical Things is the interconnectivity of highly sophisticated medical grade devices and software applications to work together and provide a new improved version of health care environment in this era. Wearable and standalone devices like Fitbit, remote patient monitoring system use sensor technology to exchange medical information of patients from remote areas to health workforces’ over wireless network. Apart from being advantageous IoMT faces challenges like safety, cyber security and scalability, interoperability, verification and validation. Interoperability is a facility through which m-health devices, databases share and maintains health records seamlessly. Interoperability basically deals with the exchange, interpretation and usage of data delivered through different computerized gadgets without restrictions. Currently there are numerous government-certified EHR products each of which has different technical, clinical and serviceable capabilities. Being heterogeneous in nature it becomes hard to achieve a single standard interoperability format to exchange data.
Indian market always was customer orientated and seen many golden days before. In India, retail h... more Indian market always was customer orientated and seen many golden days before. In India, retail has become largest source of employment and has deep penetration into rural as well as urban India markets. By the late 1980s, retail chains were established all across the country. Acquisitions and mergers were actively utilized as growth strategies, private brands were developed to enhance unique as and margins and off shore sourcing were developed to compensate for margins retailing contributes to 10% of GDP and around 8% of the employment. Retail sector is one of India’s fastest growing sectors with a 5% compounded annual growth rate. It is expected that retail in India could be worth US$ 175- 200 billion by 2018. The organized retail industry in India had not evolved until the early 1990s. Until then the industry was dominated by the unorganized sector. It was a seller’s market with a limited number of brands and little choice available to customers. Lack of trained labor, tax laws and government regulations, consumer awareness and restrictions over entry of foreign player delayed the growth of organized retailing. Organized retail chains comprise only 3% of the Indian market. Rest 97% market is comprised of mom- and – pop type shops. Now the number of organized retail stores is gradually increasing. According to ETIG (Economic Times Intelligence Group), the size of the organized retail industry was about Rs. 160 billion in 2001-02. In 2005 budget Government has allowed 26% Foreign Direct Investment (FDI) in the retail sector. Today retail is a full-fledged industry in India employing 12% of the population both organize and unorganized. Huge retail chains like Wal-Mart (the world’s largest corporation).This paper study will prove useful to both industry and academia. The strategies adopted by the top five retail companies in Uttar Pradesh in the areas of experimentation with new format visual displays, store layout and planning technology adoption, supply chain and logistics customer experience management coupled with the suggestions and recommendations put forward by the researcher will help new the existing players in planning a scalable and profitable business model which can be implemented across a variety of formats and categories. It will provide them with valuable insights as to how the top players in the industry are planning and strategizing to capture footfall and market share. The key question to be answered is to how to convent footfalls into effective purchases.
Global Journal of Pure and Applied Mathematics, Research India Publications http://www.ripublication.com, 2017
The term Big Data describes the modern techniques
and technologies to capture, store, distribute,... more The term Big Data describes the modern techniques and technologies to capture, store, distribute, manage and analyze more than exabyte or a very large-sized datasets with extreme velocity and various structures. Big data can be categorized into structured, unstructured or semi-structured, which is leading towards failure of traditional data management approach. Data is generated from variety of sources and can arrive in the system at various rates. This large amount of data needs to be processed in an economic and methodical approach which deals with the scalability, complexity, and diversity. Big Data will need effective techniques, high performance algorithms, and better analytics to categorize and extract valuable hidden information from it. This paper focused on parameters, challenges and techniques which are useful to handle large amount of data.
International Journal of Advanced Research in Computer and Communication Engineering, 2016
Analyzing large amounts of data has become an urgent need. Data could be scientific, medical, dem... more Analyzing large amounts of data has become an urgent need. Data could be scientific, medical, demographic, financial or marketing. Main objective is to identify hidden information from the data sets. Data Mining is a technique that helps in extracting relevant and meaningful information from the set of data. It can be further described as knowledge discovery process that can be applied on any set of data. Data mining techniques when applied on relational databases can be used to search certain trends or patterns. Weather forecasting is an area of meteorology that is done by collecting dynamic data related to current state of weather like fog, rainfall, temperature, wind etc. It is one of the most challenging problems to analyze this set of data to predict the behavior of weather. This paper provides a survey of different data mining techniques being used in weather prediction or forecasting. It also reviews and compares various techniques being used in a tabular format.
Routing in hybrid network is emerging area of research due to different connectivity of network. ... more Routing in hybrid network is emerging area of research due to different connectivity of network. Hybrid network is a combination of wireless and wired networks. It is very difficult to route a packet in both the network using single protocol. The existing routing protocols are not able to perform in both the network simultaneously. On the other hand if any node behaving like malicious and creates attack on network, than whole communication will be squeeze. This paper analyses AODV and DSR routing protocols for hybrid networks in presence of malicious node. The simulation has been done on QualNet 5.0. The results are discussed in the paper. Keywords : Hybrid network, AODV, DSR, malicious nodes Cite this Article Jahan et al. Analysis of AODV & DSR Routing Protocols in Presence of Malicious Nodes for Hybrid Network. Recent Trends in Parallel Computing. 2016; 3(1): 27–33p.
The recent surge in population growth is driving an escalating demand for resources, propelling t... more The recent surge in population growth is driving an escalating demand for resources, propelling the imperative for Internet of Things (IoT)-enabled devices in the evolution of smart cities. “Smart city” is an umbrella term that spans smart homes, smart waste management, smart drainage management, smart transport, and smart traffic management systems with accessible Wi-Fi and surveillance. There is a revolution in IoT-based urban services, and along with the burgeoning data volumes stored in the cloud for smart city operations, considerable challenges have been identified, primarily concerning privacy breaches and information leaks. The future of urbanization is critically dependent on cloud security for storing billions of data points. The transformative potential of smart cities presents unprecedented cyber threats that can compromise crucial services and infrastructure. Mitigating these cyber risks necessitates a hybrid persuasive intelligent security system with blockchain technology. Blockchain technology delivers secure, traceable, and decentralized techniques for storing and transmitting data. Nevertheless, successful utilization of blockchain demands careful contemplation of scalability, energy efficiency, and interoperability. Striking a balance between innovation and security, along with collaborative efforts between stakeholders, is pivotal for harnessing the transformative power of smart cities while ensuring robust data protection and urban resilience.
Advances in Cyberology and the Advent of the Next-Gen Information Revolution, 2023
Information and communication technologies are being used as weapons in a combat zone created by ... more Information and communication technologies are being used as weapons in a combat zone created by the norm that forces individuals to work from home during this pandemic. The upsurge in workplace cyberbullying is visible in various reports. Workplace cyberbullying may appear to be a less severe form of harassment, but the shift to a more dispersed workforce has made it worse. It is the intimidation experienced by a remote or hybrid employee which results in a breakdown in communication with or mistreatment from leaders. While it makes sense to believe that because we are not at the office, occurrences of antagonism and harassment are drastically reduced, that's not the reality. Spiteful employers and demeaning coworkers might pose a virtual threat. Remote work settings are becoming toxic due to harmful, unkind workplace behavior, including derogatory language, social exclusion, and threats via phone, email, or social media. This chapter unveils a new dimension of cyberology.
Sustainable Environment, Manifestation and Augmentation, 2023
Every aspect of human life has been impacted by the internet, which has made it simpler to link p... more Every aspect of human life has been impacted by the internet, which has made it simpler to link people from all over the world and has made knowledge available to many people with the simple click of a mouse. The unintended repercussions of cybercrimes also evolved along with technology. Only a few instances of possible cybercrimes-including cyberstalking, cyberbullying, spoofing, phishing, and financial fraud-have been identified; there are undoubtedly many more. Cyberbullying is a form of electronic communication that has long-term consequences, harms a person's reputation or privacy, and threatens or harasses them. Through the use of electronic media when someone tries to cross the limit in an unlawful manner that hurts another person's life or reputation. In reality, given the times we live in and the pandemic we're battling, the internet has shown to be pretty amazing in terms of assisting folks who are quarantined in their houses as well as assisting in the dissemination of critical information. In a nutshell, the internet has put the entire world at our fingertips. However, just as every coin has two sides, technological growth has also brought the unanticipated event of cybercrime. One such crime that is turning out to be a major concern for everyone is cyberbullying. It is a type of internet-based harassment in which one individual purposefully harasses another person. Cyberbullying isn't just a problem for adults; it's also a problem for tweens, teens, and youths. It may happen at any time and in any location; even our own homes are not immune to cyberbullying. The internet's relatively new type of bullying has presented an interesting dilemma for members of the court. Arguments are made that the current laws are sufficient to solve the issue and that enacting new rules would restrict people's freedom of speech. Others, on the other hand, contend that new legislation is required since technology has advanced beyond the scope of the current rules. The goal of this study is to ascertain the prevalence of cyberbullying and if the most common tactics used by cyberbullies are covered by existing laws.
Proceedings of 3rd International Conference on Artificial Intelligence: Advances and Applications, Algorithms for Intelligent Systems, 2023
The demand for many agricultural tracking applications is timely and reliable information on crop... more The demand for many agricultural tracking applications is timely and reliable information on crop quality and development. The most widely used source that yields forecasts and appraisal is coarse spatial resolution satellite image as it provides coverage and temporal resolution at local and national scales. For measuring the quantity of green biomass in agricultural areas, NDVI is used to monitor crop stress, and NDWI to monitor drought stress. Precision agriculture, forest health monitoring, and other applications where the state of plants is sensitive to changes in water content are all examples of where NDWI is widely used. In this paper, the main focus is to extract complete information on the cultivation and harvesting of wheat crops for proper field monitoring. In total, five Sentinel-2A images from January 2020 to May 2020 have been downloaded and processed to monitor the status of wheat crop cultivation, harvesting, and the post-harvesting cycle. Therefore, by extracting meaningful information on the cultivation and harvesting process of the wheat crop, a sustainable approach is identified for developing a Machine Learning (ML)-based Smart Agriculture System. The proposed framework will help to monitor crop health and crop growth and will provide predictions on crop stress and drought stress. ML-based solutions are currently addressing crop-specific issues; however, farming methods will move to knowledge-based agriculture as automated data recording, data analysis, and decision-making are combined into an integrated framework, which will enhance productivity levels and product quality.
Journal of Statistics and Management Systems, Dec 31, 2022
The upsurge of cyberbullying is one of the major causes of emotional distress among youths and ad... more The upsurge of cyberbullying is one of the major causes of emotional distress among youths and adults in this rapidly advancing technological era. Over the last decade, our society had a newfound addiction to social media. Despite the pros of social media, its usage has a large spectrum of cons. A recent study in 2021 stated that over 330 million people might potentially suffer Internet addiction by the year 2023. With such alarming numbers, it's time to realize how it will lead to a sudden elevation in cyberbullying across the globe. Cyberbullying is now an international public health concern among adolescents. Researchers are now more concerned about the mental health and social well-being of people around them. The subject of cyberbullying among tweens, teens, and youths has always been the center of attention, but now there is an advent of a new add-on workplace cyberbullying. There is a need to perform more longitudinal work to understand the effects of cyberbullying and to identify possible prevention and intervention efforts to reduce its impact.
The upsurge of cyberbullying is one of the major causes of emotional distress among youths and ad... more The upsurge of cyberbullying is one of the major causes of emotional distress among youths and adults in this rapidly advancing technological era. Over the last decade, our society had a newfound addiction to social media. Despite the pros of social media, its usage has a large spectrum of cons. A recent study in 2021 stated that over 330 million people might potentially suffer Internet addiction by the year 2023. With such alarming numbers, it's time to realize how it will lead to a sudden elevation in cyberbullying across the globe. Cyberbullying is now an international public health concern among adolescents. Researchers are now more concerned about the mental health and social well-being of people around them. The subject of cyberbullying among tweens, teens, and youths has always been the center of attention, but now there is an advent of a new add-on workplace cyberbullying. There is a need to perform more longitudinal work to understand the effects of cyberbullying and to identify possible prevention and intervention efforts to reduce its impact.
Internet of Medical Things is the interconnectivity of highly sophisticated medical grade devices... more Internet of Medical Things is the interconnectivity of highly sophisticated medical grade devices and software applications to work together and provide a new improved version of health care environment in this era. Wearable and standalone devices like Fitbit, remote patient monitoring system use sensor technology to exchange medical information of patients from remote areas to health workforces’ over wireless network. Apart from being advantageous IoMT faces challenges like safety, cyber security and scalability, interoperability, verification and validation. Interoperability is a facility through which m-health devices, databases share and maintains health records seamlessly. Interoperability basically deals with the exchange, interpretation and usage of data delivered through different computerized gadgets without restrictions. Currently there are numerous government-certified EHR products each of which has different technical, clinical and serviceable capabilities. Being heterogeneous in nature it becomes hard to achieve a single standard interoperability format to exchange data.
The demand for many agricultural tracking applications is timely and reliable information on crop... more The demand for many agricultural tracking applications is timely and reliable information on crop quality and development. The most widely used source that yields forecasts and appraisal is coarse spatial resolution satellite image as it provides coverage and temporal resolution at local and national scales. For measuring the quantity of green biomass in agricultural areas, NDVI is used to monitor crop stress, and NDWI to monitor drought stress. Precision agriculture, forest health monitoring, and other applications where the state of plants is sensitive to changes in water content are all examples of where NDWI is widely used. In this paper, the main focus is to extract complete information on the cultivation and harvesting of wheat crops for proper field monitoring. In total, five Sentinel-2A images from January 2020 to May 2020 have been downloaded and processed to monitor the status of wheat crop cultivation, harvesting, and the post-harvesting cycle. Therefore, by extracting meaningful information on the cultivation and harvesting process of the wheat crop, a sustainable approach is identified for developing a Machine Learning (ML)-based Smart Agriculture System. The proposed framework will help to monitor crop health and crop growth and will provide predictions on crop stress and drought stress. ML-based solutions are currently addressing crop-specific issues; however, farming methods will move to knowledge-based agriculture as automated data recording, data analysis, and decision-making are combined into an integrated framework, which will enhance productivity levels and product quality.
Internet of Medical Things is the interconnectivity of highly sophisticated medical grade devices... more Internet of Medical Things is the interconnectivity of highly sophisticated medical grade devices and software applications to work together and provide a new improved version of health care environment in this era. Wearable and standalone devices like Fitbit, remote patient monitoring system use sensor technology to exchange medical information of patients from remote areas to health workforces’ over wireless network. Apart from being advantageous IoMT faces challenges like safety, cyber security and scalability, interoperability, verification and validation. Interoperability is a facility through which m-health devices, databases share and maintains health records seamlessly. Interoperability basically deals with the exchange, interpretation and usage of data delivered through different computerized gadgets without restrictions. Currently there are numerous government-certified EHR products each of which has different technical, clinical and serviceable capabilities. Being heterogeneous in nature it becomes hard to achieve a single standard interoperability format to exchange data.
Indian market always was customer orientated and seen many golden days before. In India, retail h... more Indian market always was customer orientated and seen many golden days before. In India, retail has become largest source of employment and has deep penetration into rural as well as urban India markets. By the late 1980s, retail chains were established all across the country. Acquisitions and mergers were actively utilized as growth strategies, private brands were developed to enhance unique as and margins and off shore sourcing were developed to compensate for margins retailing contributes to 10% of GDP and around 8% of the employment. Retail sector is one of India’s fastest growing sectors with a 5% compounded annual growth rate. It is expected that retail in India could be worth US$ 175- 200 billion by 2018. The organized retail industry in India had not evolved until the early 1990s. Until then the industry was dominated by the unorganized sector. It was a seller’s market with a limited number of brands and little choice available to customers. Lack of trained labor, tax laws and government regulations, consumer awareness and restrictions over entry of foreign player delayed the growth of organized retailing. Organized retail chains comprise only 3% of the Indian market. Rest 97% market is comprised of mom- and – pop type shops. Now the number of organized retail stores is gradually increasing. According to ETIG (Economic Times Intelligence Group), the size of the organized retail industry was about Rs. 160 billion in 2001-02. In 2005 budget Government has allowed 26% Foreign Direct Investment (FDI) in the retail sector. Today retail is a full-fledged industry in India employing 12% of the population both organize and unorganized. Huge retail chains like Wal-Mart (the world’s largest corporation).This paper study will prove useful to both industry and academia. The strategies adopted by the top five retail companies in Uttar Pradesh in the areas of experimentation with new format visual displays, store layout and planning technology adoption, supply chain and logistics customer experience management coupled with the suggestions and recommendations put forward by the researcher will help new the existing players in planning a scalable and profitable business model which can be implemented across a variety of formats and categories. It will provide them with valuable insights as to how the top players in the industry are planning and strategizing to capture footfall and market share. The key question to be answered is to how to convent footfalls into effective purchases.
Global Journal of Pure and Applied Mathematics, Research India Publications http://www.ripublication.com, 2017
The term Big Data describes the modern techniques
and technologies to capture, store, distribute,... more The term Big Data describes the modern techniques and technologies to capture, store, distribute, manage and analyze more than exabyte or a very large-sized datasets with extreme velocity and various structures. Big data can be categorized into structured, unstructured or semi-structured, which is leading towards failure of traditional data management approach. Data is generated from variety of sources and can arrive in the system at various rates. This large amount of data needs to be processed in an economic and methodical approach which deals with the scalability, complexity, and diversity. Big Data will need effective techniques, high performance algorithms, and better analytics to categorize and extract valuable hidden information from it. This paper focused on parameters, challenges and techniques which are useful to handle large amount of data.
International Journal of Advanced Research in Computer and Communication Engineering, 2016
Analyzing large amounts of data has become an urgent need. Data could be scientific, medical, dem... more Analyzing large amounts of data has become an urgent need. Data could be scientific, medical, demographic, financial or marketing. Main objective is to identify hidden information from the data sets. Data Mining is a technique that helps in extracting relevant and meaningful information from the set of data. It can be further described as knowledge discovery process that can be applied on any set of data. Data mining techniques when applied on relational databases can be used to search certain trends or patterns. Weather forecasting is an area of meteorology that is done by collecting dynamic data related to current state of weather like fog, rainfall, temperature, wind etc. It is one of the most challenging problems to analyze this set of data to predict the behavior of weather. This paper provides a survey of different data mining techniques being used in weather prediction or forecasting. It also reviews and compares various techniques being used in a tabular format.
Routing in hybrid network is emerging area of research due to different connectivity of network. ... more Routing in hybrid network is emerging area of research due to different connectivity of network. Hybrid network is a combination of wireless and wired networks. It is very difficult to route a packet in both the network using single protocol. The existing routing protocols are not able to perform in both the network simultaneously. On the other hand if any node behaving like malicious and creates attack on network, than whole communication will be squeeze. This paper analyses AODV and DSR routing protocols for hybrid networks in presence of malicious node. The simulation has been done on QualNet 5.0. The results are discussed in the paper. Keywords : Hybrid network, AODV, DSR, malicious nodes Cite this Article Jahan et al. Analysis of AODV & DSR Routing Protocols in Presence of Malicious Nodes for Hybrid Network. Recent Trends in Parallel Computing. 2016; 3(1): 27–33p.
The recent surge in population growth is driving an escalating demand for resources, propelling t... more The recent surge in population growth is driving an escalating demand for resources, propelling the imperative for Internet of Things (IoT)-enabled devices in the evolution of smart cities. “Smart city” is an umbrella term that spans smart homes, smart waste management, smart drainage management, smart transport, and smart traffic management systems with accessible Wi-Fi and surveillance. There is a revolution in IoT-based urban services, and along with the burgeoning data volumes stored in the cloud for smart city operations, considerable challenges have been identified, primarily concerning privacy breaches and information leaks. The future of urbanization is critically dependent on cloud security for storing billions of data points. The transformative potential of smart cities presents unprecedented cyber threats that can compromise crucial services and infrastructure. Mitigating these cyber risks necessitates a hybrid persuasive intelligent security system with blockchain technology. Blockchain technology delivers secure, traceable, and decentralized techniques for storing and transmitting data. Nevertheless, successful utilization of blockchain demands careful contemplation of scalability, energy efficiency, and interoperability. Striking a balance between innovation and security, along with collaborative efforts between stakeholders, is pivotal for harnessing the transformative power of smart cities while ensuring robust data protection and urban resilience.
Advances in Cyberology and the Advent of the Next-Gen Information Revolution, 2023
Information and communication technologies are being used as weapons in a combat zone created by ... more Information and communication technologies are being used as weapons in a combat zone created by the norm that forces individuals to work from home during this pandemic. The upsurge in workplace cyberbullying is visible in various reports. Workplace cyberbullying may appear to be a less severe form of harassment, but the shift to a more dispersed workforce has made it worse. It is the intimidation experienced by a remote or hybrid employee which results in a breakdown in communication with or mistreatment from leaders. While it makes sense to believe that because we are not at the office, occurrences of antagonism and harassment are drastically reduced, that's not the reality. Spiteful employers and demeaning coworkers might pose a virtual threat. Remote work settings are becoming toxic due to harmful, unkind workplace behavior, including derogatory language, social exclusion, and threats via phone, email, or social media. This chapter unveils a new dimension of cyberology.
Sustainable Environment, Manifestation and Augmentation, 2023
Every aspect of human life has been impacted by the internet, which has made it simpler to link p... more Every aspect of human life has been impacted by the internet, which has made it simpler to link people from all over the world and has made knowledge available to many people with the simple click of a mouse. The unintended repercussions of cybercrimes also evolved along with technology. Only a few instances of possible cybercrimes-including cyberstalking, cyberbullying, spoofing, phishing, and financial fraud-have been identified; there are undoubtedly many more. Cyberbullying is a form of electronic communication that has long-term consequences, harms a person's reputation or privacy, and threatens or harasses them. Through the use of electronic media when someone tries to cross the limit in an unlawful manner that hurts another person's life or reputation. In reality, given the times we live in and the pandemic we're battling, the internet has shown to be pretty amazing in terms of assisting folks who are quarantined in their houses as well as assisting in the dissemination of critical information. In a nutshell, the internet has put the entire world at our fingertips. However, just as every coin has two sides, technological growth has also brought the unanticipated event of cybercrime. One such crime that is turning out to be a major concern for everyone is cyberbullying. It is a type of internet-based harassment in which one individual purposefully harasses another person. Cyberbullying isn't just a problem for adults; it's also a problem for tweens, teens, and youths. It may happen at any time and in any location; even our own homes are not immune to cyberbullying. The internet's relatively new type of bullying has presented an interesting dilemma for members of the court. Arguments are made that the current laws are sufficient to solve the issue and that enacting new rules would restrict people's freedom of speech. Others, on the other hand, contend that new legislation is required since technology has advanced beyond the scope of the current rules. The goal of this study is to ascertain the prevalence of cyberbullying and if the most common tactics used by cyberbullies are covered by existing laws.
Proceedings of 3rd International Conference on Artificial Intelligence: Advances and Applications, Algorithms for Intelligent Systems, 2023
The demand for many agricultural tracking applications is timely and reliable information on crop... more The demand for many agricultural tracking applications is timely and reliable information on crop quality and development. The most widely used source that yields forecasts and appraisal is coarse spatial resolution satellite image as it provides coverage and temporal resolution at local and national scales. For measuring the quantity of green biomass in agricultural areas, NDVI is used to monitor crop stress, and NDWI to monitor drought stress. Precision agriculture, forest health monitoring, and other applications where the state of plants is sensitive to changes in water content are all examples of where NDWI is widely used. In this paper, the main focus is to extract complete information on the cultivation and harvesting of wheat crops for proper field monitoring. In total, five Sentinel-2A images from January 2020 to May 2020 have been downloaded and processed to monitor the status of wheat crop cultivation, harvesting, and the post-harvesting cycle. Therefore, by extracting meaningful information on the cultivation and harvesting process of the wheat crop, a sustainable approach is identified for developing a Machine Learning (ML)-based Smart Agriculture System. The proposed framework will help to monitor crop health and crop growth and will provide predictions on crop stress and drought stress. ML-based solutions are currently addressing crop-specific issues; however, farming methods will move to knowledge-based agriculture as automated data recording, data analysis, and decision-making are combined into an integrated framework, which will enhance productivity levels and product quality.
The recent development in information systems has attracted many customers or users for better da... more The recent development in information systems has attracted many customers or users for better data storage services. Cloud computing has majorly emerged from large-scale, distributed computing technology. Through cloud computing, a plethora of things can be achieved in a shorter time. It assists in minimizing the processing burden on the users by reducing the hardware and maintenance costs, the availability across the globe, flexibility which has a highly automated processing, and efficiently scalable. The top companies which are now adapted to work on the cloud are Microsoft, Google, Amazon, IBM, and more. In this cloud computing era, the prime concern is security and privacy issues that ought to be solved. Blockchain technology is now overtaking the central authority that can record tamper-evident data in a chain-like structure without any central authority intervention of the devices or the users.
ICT (Information & Communication Technology), 2021
The most important thing to consider while developing a top-notch web application is selecting th... more The most important thing to consider while developing a top-notch web application is selecting the best tech stack. Web development can be better defined as the building and maintenance of websites for hosting over the internet or intranet. It’s all about creating web pages or web applications that run in a web browser for enabling users with a seamless interface. It is a fast-paced field, with several programming languages, frameworks and databases for providing a variety of functionalities that are seemingly arising now and then. Traditionally it has a three-layer architecture: Presentation layer (User Interface through the front end), Business logic (Data validation through the back end) and the Database management layer. But in this fast-paced evolution of Information Technology, knowing only one is quite outdated. In the new era of full-stack web development, fulfilling all the demands of both the front end and back end is considered. The word “STACK” in software development terms means a complete set of technologies that companies can use to build an advanced web application. It includes a broad spectrum of programming languages, libraries, servers, databases, frameworks, and developer tools. The web is growing more complex, and more things are now possible, so the developers are also getting more specialized. So, now we are shifting towards full-stack developers who are proficient in working across multiple stacks. The full-stack development knowledge includes Front end (User Interface of a website or an application), Back end (database and infrastructure) and Full-stack (a hybrid of both front end and back end). Full-stack can be easily implemented to any web stack, mobile stack, or native application stack. Each layer of the app is built atop the one below, forming a stack. This makes technologies heavily dependent on each other. There are some popular web stacks like MERN, MEAN, LAMP, Django and with the features of Artificial Intelligence (AI) they are providing better inventory management, improvised visitor interaction, and a personalized user experience. Full-stack development assists developers to build websites by easily switching between front and back ends which further reduces the complexity of development and communication within the team. Thus the technology stack powers a web product and not only brings it to life but stands for its further maintainability, scalability, and many other factors.
Keywords: Web development, full stack, web stack, framework.
ICT (Information & Communication Technology), 2021
The entire world is experiencing one of the worst pandemics of this era. The Covid-19 outbreak ha... more The entire world is experiencing one of the worst pandemics of this era. The Covid-19 outbreak had a massive effect on the world, and different countries turned to a halt. Not only have these unprecedented times had health and financial insinuations on industries, individuals, administrations, and government, but also it has given birth to a tool for hackers and cyber- criminals to use in cyber-attacks. During these challenging times, cyber security has become more significant such that the current situation is assisting cybercriminals to easily cyber attack. At the start of the COVID-19 pandemic, the World Health Organization (WHO) has suffered various intensity of cyber-attacks intended at its whole group, as well as email frauds intended for the general public, has grown massively. As per WHO report, In April 2020, 450 email credentials were compromised online. Scammers spoofing WHO in mails have deliberately targeted the common people toward donations and contributions to a counterfeit COVID-19 Solidary Response Fund rather than the genuine COVID-19 Solidary Response Fund. This study analyses the cybercrime and types of cyber security threats that can be handled during this time. Several agencies, including the National Cyber Security Centre in the United Kingdom and the Department of Homeland Security Cyber Security and Infrastructure Security Agency in the United States, issued a joint guideline on how cyber-attackers were exploiting the current COVID-19 outbreak as a cybercrime opportunity. As per the WebARX Security reports, various attackers have effectively used this pandemic situation to craft malware and phishing attacks against unaware individuals and organizations. The attackers have created several fake and dangerous websites that steal sensitive information from users through phishing. Some of the studies prove that phishing attacks have been increased since the occurrence of the pandemic. Some attackers have implanted malware into mobile applications that are supposed to track the progress of COVID-19, with the apps having the ability to steal essential information from the users. Scams have also been on the rise during the pandemic, with respected authorities pointing out their prevalence during this period. According to the Federal Trade Commission, scammers take benefit of the fears and anxiety that people have related to the novel coronavirus, attracting them into purchasing items that they do not require. The attackers are also likely to attempt economical fraud by sharing links to fake charity courses and donation platforms while spreading malware. The Ministry of Electronics and Information Technology released a report that citizens of India, commercial and legal entities suffered almost 7 lakh cyber-attacks till August this year. Twitter faced a major hack this year wherein some attackers were able to get access to its inside systems to get regulate the accounts of major public figures and corporations, including Indian Prime Minister, U.S. presidential candidate Joe Biden, former U.S. President Barack Husain Obama, Microsoft co-founder Bill Gates. In these pandemic various methods are used by cybercriminals and scammers such as Phishing, Fake URLs, Preying on the good of people for donation, Spreading Misinformation, fake messages like your COVID-19 tests have arrived, Your family member has been hospitalized; we urgently need you to help with a donation, etc. Although a lot of methods and measures have been developed to monitor and prevent cyber-attacks but still very challenging for all industries. Cyber-Ethics, Cyber-Safety, and Cyber-Security issues must be incorporated in the educational process starting at an early stage.
Keywords: Cyber Security, Cyber Ethics, Cyber-attacks, COVID-19, and WHO.
Uploads
Papers by Nashra Javed
of employment and has deep penetration into rural as well as urban India markets. By the late 1980s, retail chains were
established all across the country. Acquisitions and mergers were actively utilized as growth strategies, private brands were
developed to enhance unique as and margins and off shore sourcing were developed to compensate for margins retailing
contributes to 10% of GDP and around 8% of the employment. Retail sector is one of India’s fastest growing sectors with a
5% compounded annual growth rate. It is expected that retail in India could be worth US$ 175- 200 billion by 2018. The
organized retail industry in India had not evolved until the early 1990s. Until then the industry was dominated by the
unorganized sector. It was a seller’s market with a limited number of brands and little choice available to customers. Lack of
trained labor, tax laws and government regulations, consumer awareness and restrictions over entry of foreign player delayed
the growth of organized retailing. Organized retail chains comprise only 3% of the Indian market. Rest 97% market is
comprised of mom- and – pop type shops. Now the number of organized retail stores is gradually increasing. According to
ETIG (Economic Times Intelligence Group), the size of the organized retail industry was about Rs. 160 billion in 2001-02. In
2005 budget Government has allowed 26% Foreign Direct Investment (FDI) in the retail sector.
Today retail is a full-fledged industry in India employing 12% of the population both organize and unorganized. Huge retail
chains like Wal-Mart (the world’s largest corporation).This paper study will prove useful to both industry and academia. The
strategies adopted by the top five retail companies in Uttar Pradesh in the areas of experimentation with new format visual
displays, store layout and planning technology adoption, supply chain and logistics customer experience management coupled
with the suggestions and recommendations put forward by the researcher will help new the existing players in planning a
scalable and profitable business model which can be implemented across a variety of formats and categories. It will provide
them with valuable insights as to how the top players in the industry are planning and strategizing to capture footfall and
market share. The key question to be answered is to how to convent footfalls into effective purchases.
and technologies to capture, store, distribute, manage and
analyze more than exabyte or a very large-sized datasets with
extreme velocity and various structures. Big data can be
categorized into structured, unstructured or semi-structured,
which is leading towards failure of traditional data management
approach. Data is generated from variety of sources and can
arrive in the system at various rates. This large amount of data
needs to be processed in an economic and methodical approach
which deals with the scalability, complexity, and diversity. Big
Data will need effective techniques, high performance
algorithms, and better analytics to categorize and extract
valuable hidden information from it. This paper focused on
parameters, challenges and techniques which are useful to
handle large amount of data.
Books by Nashra Javed
of employment and has deep penetration into rural as well as urban India markets. By the late 1980s, retail chains were
established all across the country. Acquisitions and mergers were actively utilized as growth strategies, private brands were
developed to enhance unique as and margins and off shore sourcing were developed to compensate for margins retailing
contributes to 10% of GDP and around 8% of the employment. Retail sector is one of India’s fastest growing sectors with a
5% compounded annual growth rate. It is expected that retail in India could be worth US$ 175- 200 billion by 2018. The
organized retail industry in India had not evolved until the early 1990s. Until then the industry was dominated by the
unorganized sector. It was a seller’s market with a limited number of brands and little choice available to customers. Lack of
trained labor, tax laws and government regulations, consumer awareness and restrictions over entry of foreign player delayed
the growth of organized retailing. Organized retail chains comprise only 3% of the Indian market. Rest 97% market is
comprised of mom- and – pop type shops. Now the number of organized retail stores is gradually increasing. According to
ETIG (Economic Times Intelligence Group), the size of the organized retail industry was about Rs. 160 billion in 2001-02. In
2005 budget Government has allowed 26% Foreign Direct Investment (FDI) in the retail sector.
Today retail is a full-fledged industry in India employing 12% of the population both organize and unorganized. Huge retail
chains like Wal-Mart (the world’s largest corporation).This paper study will prove useful to both industry and academia. The
strategies adopted by the top five retail companies in Uttar Pradesh in the areas of experimentation with new format visual
displays, store layout and planning technology adoption, supply chain and logistics customer experience management coupled
with the suggestions and recommendations put forward by the researcher will help new the existing players in planning a
scalable and profitable business model which can be implemented across a variety of formats and categories. It will provide
them with valuable insights as to how the top players in the industry are planning and strategizing to capture footfall and
market share. The key question to be answered is to how to convent footfalls into effective purchases.
and technologies to capture, store, distribute, manage and
analyze more than exabyte or a very large-sized datasets with
extreme velocity and various structures. Big data can be
categorized into structured, unstructured or semi-structured,
which is leading towards failure of traditional data management
approach. Data is generated from variety of sources and can
arrive in the system at various rates. This large amount of data
needs to be processed in an economic and methodical approach
which deals with the scalability, complexity, and diversity. Big
Data will need effective techniques, high performance
algorithms, and better analytics to categorize and extract
valuable hidden information from it. This paper focused on
parameters, challenges and techniques which are useful to
handle large amount of data.
evolution of Information Technology, knowing only one is quite outdated. In the new era of full-stack web development, fulfilling all the demands of both the front end and back end is considered. The word “STACK” in software development terms means a complete set of technologies that companies can use to build an advanced web application. It includes a broad spectrum of
programming languages, libraries, servers, databases, frameworks, and developer tools. The web is growing more complex, and more things are now possible, so the developers are also getting more specialized. So, now we are shifting towards full-stack developers who are proficient in working across multiple stacks. The full-stack development knowledge includes Front end (User Interface of a website or an application), Back end (database and infrastructure) and Full-stack (a hybrid of both front end and back end). Full-stack can be easily implemented to any web stack, mobile stack, or native application stack. Each layer of the app is built atop the one below, forming a stack. This makes technologies heavily dependent on each other. There are some popular web stacks like MERN, MEAN, LAMP, Django and with the features of Artificial Intelligence (AI) they are providing better inventory management, improvised visitor interaction, and a personalized user
experience. Full-stack development assists developers to build websites by easily switching between front and back ends which further reduces the complexity of development and communication within the team. Thus the technology stack powers a web product and not only brings it to life but
stands for its further maintainability, scalability, and many other factors.
Keywords: Web development, full stack, web stack, framework.
criminals to use in cyber-attacks. During these challenging times, cyber security has become more significant such that the current situation is assisting cybercriminals to easily cyber attack. At the start of the COVID-19 pandemic, the World Health Organization (WHO) has suffered various
intensity of cyber-attacks intended at its whole group, as well as email frauds intended for the general public, has grown massively. As per WHO report, In April 2020, 450 email credentials were compromised online. Scammers spoofing WHO in mails have deliberately targeted the common
people toward donations and contributions to a counterfeit COVID-19 Solidary Response Fund rather than the genuine COVID-19 Solidary Response Fund. This study analyses the cybercrime and types of cyber security threats that can be handled during this time. Several agencies, including the National Cyber Security Centre in the United Kingdom and the Department of Homeland Security Cyber Security and Infrastructure Security Agency in the United States, issued a joint guideline on how cyber-attackers were exploiting the current COVID-19 outbreak as a cybercrime
opportunity. As per the WebARX Security reports, various attackers have effectively used this pandemic situation to craft malware and phishing attacks against unaware individuals and organizations. The attackers have created several fake and dangerous websites that steal sensitive
information from users through phishing. Some of the studies prove that phishing attacks have been increased since the occurrence of the pandemic. Some attackers have implanted malware into mobile applications that are supposed to track the progress of COVID-19, with the apps having the ability to steal essential information from the users. Scams have also been on the rise during the pandemic, with respected authorities pointing out their prevalence during this period. According to
the Federal Trade Commission, scammers take benefit of the fears and anxiety that people have related to the novel coronavirus, attracting them into purchasing items that they do not require. The attackers are also likely to attempt economical fraud by sharing links to fake charity courses and
donation platforms while spreading malware. The Ministry of Electronics and Information Technology released a report that citizens of India, commercial and legal entities suffered almost 7 lakh cyber-attacks till August this year. Twitter faced a major hack this year wherein some attackers were able to get access to its inside systems to get regulate the accounts of major public figures and corporations, including Indian Prime Minister, U.S. presidential candidate Joe Biden, former U.S. President Barack Husain Obama, Microsoft co-founder Bill Gates. In these pandemic various methods are used by cybercriminals and scammers such as Phishing, Fake URLs, Preying on the good of people for donation, Spreading Misinformation, fake messages like your COVID-19 tests have arrived, Your family member has been hospitalized; we urgently need you to help with a
donation, etc. Although a lot of methods and measures have been developed to monitor and prevent cyber-attacks but still very challenging for all industries. Cyber-Ethics, Cyber-Safety, and Cyber-Security issues must be incorporated in the educational process starting at an early stage.
Keywords: Cyber Security, Cyber Ethics, Cyber-attacks, COVID-19, and WHO.