Pub Date : 1900-01-01DOI: 10.26480/imcs.02.2022.36.37
Ipseeta Nanda, R. De
The phrase “social engineering” can be used to describe a range of computer exploitation techniques used to trick users. It poses a serious risk to people, businesses, organizations, and governments. This essay discusses the idea of social engineering and its effects on society.
{"title":"SOCIAL ENGINEERING: AN INTRODUCTION","authors":"Ipseeta Nanda, R. De","doi":"10.26480/imcs.02.2022.36.37","DOIUrl":"https://doi.org/10.26480/imcs.02.2022.36.37","url":null,"abstract":"The phrase “social engineering” can be used to describe a range of computer exploitation techniques used to trick users. It poses a serious risk to people, businesses, organizations, and governments. This essay discusses the idea of social engineering and its effects on society.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124300847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.26480/imcs.02.2022.28.30
Ipseeta Nanda, Rajesh De
In most automation, we use ANN or RNN based algorithms. This results well but the prior information is what actions were previously taken by a human, this cannot be the only measure of learning a process we know humans learn everything with experience. And the most appropriate algorithm to learn like a human is Reinforcement Learning
{"title":"FIRM AUTOMATION: A REINFORCEMENT LEARNING APPROACH","authors":"Ipseeta Nanda, Rajesh De","doi":"10.26480/imcs.02.2022.28.30","DOIUrl":"https://doi.org/10.26480/imcs.02.2022.28.30","url":null,"abstract":"In most automation, we use ANN or RNN based algorithms. This results well but the prior information is what actions were previously taken by a human, this cannot be the only measure of learning a process we know humans learn everything with experience. And the most appropriate algorithm to learn like a human is Reinforcement Learning","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114543130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.26480/imcs.01.2022.23.27
Ipseeta Nanda, Rajesh De
Driving under the influence of alcohol has affected and killed countless of people lives. If you are drunk while driving, not only you are putting yourself at risk but also the passengers travelling with you and the others on the road are in danger. So, we have tried to projected an Automatic Engine lock system on behalf of talking responsibility to control driving safely as much as we can. The alcohol detection system works on a simple principle. If a driver has been drinking, the alcohol sensor will sense by playing a Buzzer. With the use of GPS, we will be able to trace the location of the vehicle and a message will be send to the registered number by using GSM module. The main work is done by MQ3 alcohol detecting sensor and the programmable brain Arduino Uno. If the sensor sensed the particular value of alcohol present in the air from a nominal distance then the sensor throw high signal in digitally and the buzzer has been blown. As this way we can identify the driver is alcoholic or not by this project and Thus, the motor driver will be stopped immediately.
{"title":"AUTOMATIC ENGINE LOCK SYSTEM THROUGH ALCOHOL DETECTION IN VIRTUAL ENVIRONMENT","authors":"Ipseeta Nanda, Rajesh De","doi":"10.26480/imcs.01.2022.23.27","DOIUrl":"https://doi.org/10.26480/imcs.01.2022.23.27","url":null,"abstract":"Driving under the influence of alcohol has affected and killed countless of people lives. If you are drunk while driving, not only you are putting yourself at risk but also the passengers travelling with you and the others on the road are in danger. So, we have tried to projected an Automatic Engine lock system on behalf of talking responsibility to control driving safely as much as we can. The alcohol detection system works on a simple principle. If a driver has been drinking, the alcohol sensor will sense by playing a Buzzer. With the use of GPS, we will be able to trace the location of the vehicle and a message will be send to the registered number by using GSM module. The main work is done by MQ3 alcohol detecting sensor and the programmable brain Arduino Uno. If the sensor sensed the particular value of alcohol present in the air from a nominal distance then the sensor throw high signal in digitally and the buzzer has been blown. As this way we can identify the driver is alcoholic or not by this project and Thus, the motor driver will be stopped immediately.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125304654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.26480/imcs.02.2022.34.35
Ipseeta Nanda, R. De
Communication network is used a communication network are central to the to describe the way in which specific people in a group interact with one another. Academics use varying definitions of “communication network” to refer to the same underlying concept. These three critical dimensions are typically used to characterize the communication network: (1) the network structure, (2) the interactional patterns, (3) the functional characteristics.
{"title":"COMMUNICATION NETWORK","authors":"Ipseeta Nanda, R. De","doi":"10.26480/imcs.02.2022.34.35","DOIUrl":"https://doi.org/10.26480/imcs.02.2022.34.35","url":null,"abstract":"Communication network is used a communication network are central to the to describe the way in which specific people in a group interact with one another. Academics use varying definitions of “communication network” to refer to the same underlying concept. These three critical dimensions are typically used to characterize the communication network: (1) the network structure, (2) the interactional patterns, (3) the functional characteristics.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"889 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116378087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.26480/imcs.01.2022.01.02
Xinyi Wang
To explore the demand and current situation of APP use from the perspective of working people, and to make the future APP design not focus on visual effect by implanting emotional design. It also analyzes how to improve the design to make it more in line with the user needs of office workers, to establish a more comprehensive understanding of the theoretical research and application in related fields. This paper collects, organizes, and visualizes the literature on the main applications of emotional design APP from 2000 to 2021 based on the physiological and psychological characteristics of office workers through Donald A. Norman’s three-level theory of emotional design, and discusses how to make reasonable design for the music APP to improve user experience according to the user characteristics of office workers. Applying interaction design theory and three levels of emotional design theory to the design of the music APP has important research value and scientific perspective. The paper also summarizes the interaction design method based on user experience and builds the design model of the music APP based on emotional design, which is a guide for the subsequent design.
从劳动人群的角度探索APP的使用需求和现状,通过植入情感设计,让未来的APP设计不再专注于视觉效果。并分析了如何对设计进行改进,使其更符合办公人员的用户需求,对相关领域的理论研究和应用建立更全面的认识。本文通过Donald A. Norman的情感设计三层次理论,根据上班族的生理和心理特征,对2000 - 2021年情感设计类APP的主要应用文献进行收集、整理和可视化,探讨如何根据上班族的用户特征,对音乐类APP进行合理的设计,提升用户体验。将交互设计理论和三个层次的情感设计理论应用到音乐APP的设计中,具有重要的研究价值和科学视角。本文还总结了基于用户体验的交互设计方法,构建了基于情感设计的音乐APP设计模型,为后续的设计提供指导。
{"title":"RESEARCH ON EMOTIONAL MUSIC APP DESIGN UNDER THE NEEDS OF OFFICE WORKERS","authors":"Xinyi Wang","doi":"10.26480/imcs.01.2022.01.02","DOIUrl":"https://doi.org/10.26480/imcs.01.2022.01.02","url":null,"abstract":"To explore the demand and current situation of APP use from the perspective of working people, and to make the future APP design not focus on visual effect by implanting emotional design. It also analyzes how to improve the design to make it more in line with the user needs of office workers, to establish a more comprehensive understanding of the theoretical research and application in related fields. This paper collects, organizes, and visualizes the literature on the main applications of emotional design APP from 2000 to 2021 based on the physiological and psychological characteristics of office workers through Donald A. Norman’s three-level theory of emotional design, and discusses how to make reasonable design for the music APP to improve user experience according to the user characteristics of office workers. Applying interaction design theory and three levels of emotional design theory to the design of the music APP has important research value and scientific perspective. The paper also summarizes the interaction design method based on user experience and builds the design model of the music APP based on emotional design, which is a guide for the subsequent design.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.26480/imcs.01.2022.11.17
Amir Khushk, H. Ali, V. Baraboshkin
In today’s world, social networking has emerged as a highly desirable product, but the use of these social networking sites affects the physical and mental health of people. Therefore, this study aims to find the impact of excessive use of social networking sites (ESNS) on students’ task performance (STP) by mediating the role of task distraction (TD). Further, this study explores the moderating role of locus of control (internal and external) on the ESNS-TD relationship. For this purpose, data has been collected from 226 students enrolled in public sector universities in metropolitan cities of Pakistan through the survey. The findings show that excessive use of social networking sites significantly decreases students’ performance. Task distraction partially mediates the ESNS-STP relationship. Further, the results show that only the external locus of control moderates the ESNS-TD relationship. By analyzing the consequences of excessive use of SNSs it raises teachers’ and scholars’ concerns about harmful aspects of Internet use. This study reports that limited use of social networking sites is beneficial for students’ performance.
{"title":"IMPACT OF SOCIAL NETWORKING SITES ON STUDENTS AND TASK’ PERFORMANCE DURING COVID-19","authors":"Amir Khushk, H. Ali, V. Baraboshkin","doi":"10.26480/imcs.01.2022.11.17","DOIUrl":"https://doi.org/10.26480/imcs.01.2022.11.17","url":null,"abstract":"In today’s world, social networking has emerged as a highly desirable product, but the use of these social networking sites affects the physical and mental health of people. Therefore, this study aims to find the impact of excessive use of social networking sites (ESNS) on students’ task performance (STP) by mediating the role of task distraction (TD). Further, this study explores the moderating role of locus of control (internal and external) on the ESNS-TD relationship. For this purpose, data has been collected from 226 students enrolled in public sector universities in metropolitan cities of Pakistan through the survey. The findings show that excessive use of social networking sites significantly decreases students’ performance. Task distraction partially mediates the ESNS-STP relationship. Further, the results show that only the external locus of control moderates the ESNS-TD relationship. By analyzing the consequences of excessive use of SNSs it raises teachers’ and scholars’ concerns about harmful aspects of Internet use. This study reports that limited use of social networking sites is beneficial for students’ performance.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133826621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.26480/imcs.01.2022.18.22
Ipseeta Nanda, R. De
Everything in the “smart world” is connected by the Internet of Things (IoT), making its energy consumption a challenging and alluring research topic. The goal of a green IoT is to create a network that uses very little energy. In this paper, we present an overview of green Internet of Things technologies. It also covers the four stages of the green IoT life cycle (design, production, use, and recycling) in detail. Also covered are green IoT technologies like green tags, green sensing networks, and green internet technologies. Research on the Internet of Things in 5G networks and for smart cities is also presented. Finally, some suggestions for further study and some of the remaining difficulties in the field of green IoT are offered. Green Internet of Things, 5G, wireless sensor networks, cloud computing, smart cities, and energy efficiency are some of the terms that can be found in an IoT index.
{"title":"THE STATE OF THE ART IN ECO-FRIENDLY IOT","authors":"Ipseeta Nanda, R. De","doi":"10.26480/imcs.01.2022.18.22","DOIUrl":"https://doi.org/10.26480/imcs.01.2022.18.22","url":null,"abstract":"Everything in the “smart world” is connected by the Internet of Things (IoT), making its energy consumption a challenging and alluring research topic. The goal of a green IoT is to create a network that uses very little energy. In this paper, we present an overview of green Internet of Things technologies. It also covers the four stages of the green IoT life cycle (design, production, use, and recycling) in detail. Also covered are green IoT technologies like green tags, green sensing networks, and green internet technologies. Research on the Internet of Things in 5G networks and for smart cities is also presented. Finally, some suggestions for further study and some of the remaining difficulties in the field of green IoT are offered. Green Internet of Things, 5G, wireless sensor networks, cloud computing, smart cities, and energy efficiency are some of the terms that can be found in an IoT index.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133207559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.26480/imcs.01.2022.03.10
C. Odu
Blockchain technology is a new and innovative technology that has gained interest from all industries, and countries across the globe. More so, a technology that is mostly associated with Bitcoin, a cryptocurrency that has become popular and is seen as the next gold in the financial sector. This paper gives an insight into Blockchain technology in the Nigerian financial industry and its possible disruption to the industry. Further highlights the importance of Blockchain to enable a better understanding for stakeholders in the Nigerian context. The paper looks at the Fintech industry of Nigeria and further goes to explain the types of blockchain existing and their challenges. Starting with the origin of blockchain and its cryptocurrency application. Finally, the author gives recommendations to aid policymakers in making informed decisions about Blockchain technology. These recommendations are significant and will help in also developing the technology rather than truncating its growth.
{"title":"BLOCKCHAIN AS A DISRUPTIVE TECHNOLOGY IN NIGERIA’S FINTECH ECOSYSTEM","authors":"C. Odu","doi":"10.26480/imcs.01.2022.03.10","DOIUrl":"https://doi.org/10.26480/imcs.01.2022.03.10","url":null,"abstract":"Blockchain technology is a new and innovative technology that has gained interest from all industries, and countries across the globe. More so, a technology that is mostly associated with Bitcoin, a cryptocurrency that has become popular and is seen as the next gold in the financial sector. This paper gives an insight into Blockchain technology in the Nigerian financial industry and its possible disruption to the industry. Further highlights the importance of Blockchain to enable a better understanding for stakeholders in the Nigerian context. The paper looks at the Fintech industry of Nigeria and further goes to explain the types of blockchain existing and their challenges. Starting with the origin of blockchain and its cryptocurrency application. Finally, the author gives recommendations to aid policymakers in making informed decisions about Blockchain technology. These recommendations are significant and will help in also developing the technology rather than truncating its growth.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122591812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.26480/imcs.02.2022.38.40
Ipseeta Nanda, R. De
Every major telecom in the world is working to make it even faster because everyone loves speed and, more specifically, fast internet. Stable internet connections are becoming more and more important for smartphones, watches, homes, and automobiles. The fifth generation of technology, or 5G, is here to help us survive in a world where speed is changing every second and where we demand more and more technology. Some of the most important goals that must be achieved in the future, or in a world beyond 4G, are increased capacity, improved data rate, decreased latency, and quality service. Large-scale improvements in the 5G cellular architecture are necessary to meet these demands. The 5G cellular network architecture and some of the key emerging technologies that can help the architecture become more human and better meet user demands are primarily the focus of this paper. The primary focus of this paper’s coverage of 5G details is device-to-device communication and massive multiple input multiple output technology (D2D). A general, credible 5G cellular network architecture is put forth using guidelines from online books and thorough research on the subject.
{"title":"AN ANALYSIS OF 5G WIRELESS NETWORKS","authors":"Ipseeta Nanda, R. De","doi":"10.26480/imcs.02.2022.38.40","DOIUrl":"https://doi.org/10.26480/imcs.02.2022.38.40","url":null,"abstract":"Every major telecom in the world is working to make it even faster because everyone loves speed and, more specifically, fast internet. Stable internet connections are becoming more and more important for smartphones, watches, homes, and automobiles. The fifth generation of technology, or 5G, is here to help us survive in a world where speed is changing every second and where we demand more and more technology. Some of the most important goals that must be achieved in the future, or in a world beyond 4G, are increased capacity, improved data rate, decreased latency, and quality service. Large-scale improvements in the 5G cellular architecture are necessary to meet these demands. The 5G cellular network architecture and some of the key emerging technologies that can help the architecture become more human and better meet user demands are primarily the focus of this paper. The primary focus of this paper’s coverage of 5G details is device-to-device communication and massive multiple input multiple output technology (D2D). A general, credible 5G cellular network architecture is put forth using guidelines from online books and thorough research on the subject.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130217331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.26480/imcs.02.2022.31.33
Ipseeta Nanda, R. De
The delivery of computing services over the internet, as opposed to storing data on a local memory device or a proprietary disc drive, is known as cloud computing. Servers, storage, databases, networking, and software are some examples of computing services. The primary justification and major benefit of using the cloud are the user’s ability to store data there and access it from any location at any time, as well as the low cost of all its services. Despite this, because the data stored in the cloud is not directly maintained by the customer, security has always been a major concern with cloud computing. The data owners are unlikely to be aware of the route their data is taking when they upload or store data using a cloud computing service. The user is unaware of whether or not a third party is gathering, processing, and accessing their information. Numerous cryptography algorithms have been proposed to address security concerns. This paper discussed different cryptography algorithms that are present in the previous work with a focus on the fundamentals of cloud computing.
{"title":"REVIEW OF CLOUD COMPUTING CRYPTOGRAPHY","authors":"Ipseeta Nanda, R. De","doi":"10.26480/imcs.02.2022.31.33","DOIUrl":"https://doi.org/10.26480/imcs.02.2022.31.33","url":null,"abstract":"The delivery of computing services over the internet, as opposed to storing data on a local memory device or a proprietary disc drive, is known as cloud computing. Servers, storage, databases, networking, and software are some examples of computing services. The primary justification and major benefit of using the cloud are the user’s ability to store data there and access it from any location at any time, as well as the low cost of all its services. Despite this, because the data stored in the cloud is not directly maintained by the customer, security has always been a major concern with cloud computing. The data owners are unlikely to be aware of the route their data is taking when they upload or store data using a cloud computing service. The user is unaware of whether or not a third party is gathering, processing, and accessing their information. Numerous cryptography algorithms have been proposed to address security concerns. This paper discussed different cryptography algorithms that are present in the previous work with a focus on the fundamentals of cloud computing.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121398484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}