International Journal of Interactive Mobile Technologies (iJIM),
Journal Year:
2023,
Volume and Issue:
17(10), P. 193 - 211
Published: May 22, 2023
I
n
these
days
of
technology,
the
usage
images
has
become
increasingly
high
especially
now
that
almost
everyone
access
to
internet.
Also,
image
helps
us
learn,
grabs
our
attention,
explains
complicated
concepts
as
well
inspires
us.
Sharing
is
essential
and
therefore
encryption
algorithms
are
proposed
secure
transmission
from
many
types
attacks
such
Man-in-the-middle
attack
(MITM).
In
this
paper,
we
a
hybrid
security
system
consist
Elliptic
Curve
Cryptography
(ECC)
Advanced
Encryption
System
(AES).
Where
ECC
used
generate
private/public
keys
AES
for
decryption
using
generated
keys.
The
works
follows;
it
begins
by
inserting
be
encrypted
which
“lena.png”
size
256*256
passing
Algorithm
along
with
public
key.
Then,
in
algorithm,
key
hashed
then
encrypt
algorithm.
On
other
hand,
algorithm
calculating
use
decrypt
Finally,
experimental
results
shows
National
Institute
Standards
Technology
(NIST)
test
have
better
randomness
than
only
histogram
show
pixels
values
distributed
across
all
three
channels
R,
G
B.
This
step
further
get
more
against
To
further,
Logistic
chaotic
map
been
comparison
purposes
terms
randomness,
Advances in business information systems and analytics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 259 - 290
Published: Jan. 24, 2025
The
Metaverse
represents
a
growing
field
for
organizations
looking
to
redefine
how
they
engage
with
customers
in
the
digital
age.
Using
this
feature
opens
up
many
opportunities
deep
integration
and
smart
marketing.
One
of
most
important
forms
communication
is
creating
visual
environment
that
allows
consumers
connect
brand
on
their
favorite
level.
Leveraging
technologies
such
as
virtual
reality
(VR)
augmented
(AR),
can
create
experiences
transcend
traditional
boundaries
allow
explore
products,
services,
messaging
inclusive
ways.
These
immersive
not
only
capture
attention,
but
also
foster
emotional
connections
drive
deeper
engagement
loyalty.
ACM Transactions on Internet Technology,
Journal Year:
2024,
Volume and Issue:
unknown
Published: July 24, 2024
Rapid
innovation
in
consumer
electronics
has
made
our
lives
more
comfortable.
Consumer
serve
as
the
primary
platform
for
Metaverse
(MV),
offering
users
an
immersive
and
interactive
medium
that
connects
digital
real
worlds.
play
a
crucial
role
ensuring
accessibility
user
experience
within
Metaverse.
Despite
vital
of
enabling
metaverse
experience,
detailed
survey
yet
to
cover
different
facets.
Addressing
this
research
gap,
we
present
comprehensive
review
covering
several
applications,
case
studies,
challenges
We
scope
devices
like
VR(Virtual
Reality)
headsets,
AR(Augmented
haptic
feedback
devices,
smartphones
applications.
illustrative
study
on
how
assist
education
Several
device-specific
include
restricted
field
view,
latency
issues,
synchronization
non-device-specific
interoperability,
scalability,
data
privacy.
Our
shall
help
researchers
explore
prospects
making
integration
stronger.
Journal of Enterprise Information Management,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Nov. 5, 2024
Purpose
Metaverse
is
one
of
the
decade’s
most
exciting
and
transformative
technological
innovations.
While
metaverse
holds
immense
promise,
it
has
potential
risks
dark
sides.
This
research
aims
to
investigate
identify
crucial
dimensions
associated
with
platforms.
Design/methodology/approach
Employing
a
qualitative
phenomenological
methodology,
authors
interviewed
45
users
unravel
related
metaverse.
Analyzing
themes
extracted
from
participants'
insights
revealed
an
alignment
underpinnings
Technology
Threat
Avoidance
(TTA)
theory.
Findings
The
findings
this
study
seven
major
dimensions:
addiction
dependency,
isolation
loneliness,
mental
health
issues,
privacy
security,
cyberbullying
harassment,
digital
identity
theft
financial
exploitation.
Practical
implications
helps
organizations
platforms
understand
concludes
by
synthesizing
prevalent
proposing
propositions,
offering
for
practical
application
policy
considerations.
Originality/value
provides
deeper
understanding
side
environment
user
perspective
using
TTA
International Journal of Interactive Mobile Technologies (iJIM),
Journal Year:
2023,
Volume and Issue:
17(02), P. 153 - 165
Published: Jan. 25, 2023
one
of
the
most
important
motivations
behind
use
software-defined
networking
(SDN)
is
desire
to
move
from
approach
traditional
networks
a
more
flexible
and
intelligent
software
development
technology.
This
paper
focuses
on
importance
SDN-based
platform
POX
controller
security
firewall
modules
its
effectiveness
including
central
administration
for
protecting
network
possible
attacks.
The
work
performed
using
Mininet
emulator
with
aid
iperf
bandwidth
measurement
tool.
Result
reveals
that
proposed
multi-layer
does
not
compromise
flexibility
in
any
way.