Communications in computer and information science, Год журнала: 2024, Номер unknown, С. 82 - 92
Опубликована: Окт. 17, 2024
Язык: Английский
Communications in computer and information science, Год журнала: 2024, Номер unknown, С. 82 - 92
Опубликована: Окт. 17, 2024
Язык: Английский
Advances in computational intelligence and robotics book series, Год журнала: 2025, Номер unknown, С. 75 - 116
Опубликована: Апрель 11, 2025
This chapter examines the metaverse's transformational potential in education, highlighting its ability to improve immersive learning experiences via sophisticated technologies like virtual reality (VR) and augmented (AR). It how these may provide realistic simulations, enabling students participate interactive settings that enhance their comprehension retention of knowledge. The emphasizes significance personalized paths supported by data analytics artificial intelligence, which customized educational address specific student requirements. Furthermore, it analyzes novel evaluation techniques critical thinking problem-solving abilities, as well function collaborative tools facilitating peer feedback teamwork. ultimately articulates a vision for future education is more interesting, accessible, successful, propelled incorporation technology inside metaverse.
Язык: Английский
Процитировано
0International Research Journal of Modernization in Engineering Technology and Science, Год журнала: 2024, Номер unknown
Опубликована: Март 4, 2024
As technology advances, cybersecurity risks also adapt.This study examines upcoming developments in cybersecurity, emphasizing new and techniques designed to combat advancing cyber threats.Key areas of focus are advancements artificial intelligence (AI) machine learning for threat detection, the potential quantum cryptography securing communication channels, integration blockchain decentralized tamper-proof data management, adoption zero trust architecture improve network security.The paper analyzes difficulties possibilities related Internet Things (IoT) security, secure multiparty computation, post-quantum cryptography.This research intends analyze trends their implications offer insights into changing landscape direct future development activities sector.
Язык: Английский
Процитировано
1Опубликована: Фев. 21, 2024
Nowadays, concealing massive secret healthcare data has become an urgent necessity due to the speed of evolution in information technology and communication, especially terms security. Concealing is one important techniques used address security issue. The medical image called steganography system. Different images can within system such as Computed Tomography (CT) Magnetic Resonance Imaging (MRI) images. new method been utilized embed patients' records (secret data) suggested consisted different steps contributions. first step related preparation for both data. particle swarm optimization (PSO) during locate perfect pixels embedding process. In addition, Huffman algorithm compress Secondly, proposed Even/Odd pixel distribution was hide records. this research, Region Interest (RoI) most reliable area while we ignore level single-color areas. Three types standard datasets were paper. This research demonstrated notable achievements imperceptibility security, which may be attributed careful selection appropriate methods algorithms certain contexts.
Язык: Английский
Процитировано
1Опубликована: Фев. 21, 2024
Recently, information security has emerged as a crucial aspect of technology and communication considering the Internet's proliferation. The development image cryptography method to enhance confidentiality communication. In order achieve these aims, framework comprising three primary phases been developed for purpose cryptography. During first phase, fresh key generator was developed, incorporating substantial degree randomness by utilizing several chaotic maps suggested Improvement Chaos Logistic function (ICLF). second proposed involves introduction confusion process. This phase entails sorting in ascending order, followed permutation pixels depending on key. Finally, diffusion is described, which utilization Gingerbread Man Method (GGM), Arnold Cat Map (ACM) transform, XOR operation. Based findings, it confirmed that better result field when compared with existing methods.
Язык: Английский
Процитировано
1Опубликована: Фев. 21, 2024
Cashless payment methods are increasingly replacing the use of cash-based in a wide range financial transactions globally. Iraq is beginning step, and usage this method relatively low compared to other regional countries. This study aims analyzes elements that impact Iraqi consumer adoption cashless extend unified theory acceptance technology (UTAUT) model with two (Awareness Lifestyle Compatibility). 193 valid questionnaires collected online from consumers processed using Smart-PLS. The findings revealed Performance expectancy (PE), Facilitating condition (FC), Awareness, Compatibility (LC) had positive significant on adoption. In contrast, social influence (SI) did not results will offer insights for marketers management experts as they plan their promotional marketing strategies, specifically targeting determinants customer methods.
Язык: Английский
Процитировано
0Communications in computer and information science, Год журнала: 2024, Номер unknown, С. 82 - 92
Опубликована: Окт. 17, 2024
Язык: Английский
Процитировано
0