International Journal of Computing and Engineering最新文献

筛选
英文 中文
Clouding the Future: Innovating Towards Net-Zero Emissions 遮蔽未来:创新实现净零排放
International Journal of Computing and Engineering Pub Date : 2024-07-27 DOI: 10.47941/ijce.2127
Sridhar Mahadevan
{"title":"Clouding the Future: Innovating Towards Net-Zero Emissions","authors":"Sridhar Mahadevan","doi":"10.47941/ijce.2127","DOIUrl":"https://doi.org/10.47941/ijce.2127","url":null,"abstract":"Purpose: This paper explores the intersection of cloud computing, generative artificial intelligence (AI), and sustainability, focusing on how these technologies can drive the transition towards net-zero emissions. The aim is to assess how integrating cloud-based solutions and AI can enhance energy efficiency and support environmental goals. \u0000Methodology: The study employs a comprehensive review of recent literature, industry reports, and case studies from major cloud providers and technology companies. It analyzes the sustainability commitments of leading cloud providers, evaluates the role of generative AI in optimizing resource utilization, and examines the benefits of serverless automation in reducing carbon footprints. \u0000Findings: The research finds that cloud providers are making significant strides in sustainability through ambitious climate commitments and energy-efficient technologies. Generative AI is shown to improve decision-making and resource management, while serverless automation optimizes resource use and minimizes energy consumption. These advancements collectively contribute to achieving long-term sustainability goals and enhancing operational efficiency. \u0000Unique Contribution to Theory, Practice, and Policy: This paper provides a novel perspective on leveraging generative AI and serverless automation for sustainability. It offers actionable recommendations for organizations to integrate these technologies into their cloud strategies, emphasizing the importance of aligning with ESG criteria and optimizing data center operations. The findings support the development of policies that encourage technological innovation in the pursuit of environmental stewardship and carbon neutrality.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"87 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141797829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast and Efficient UserID Lookup in Distributed Authentication: A Probabilistic Approach Using Bloom Filters 分布式身份验证中快速高效的用户 ID 查询:使用 Bloom 过滤器的概率方法
International Journal of Computing and Engineering Pub Date : 2024-07-24 DOI: 10.47941/ijce.2124
Purshotam S Yadav
{"title":"Fast and Efficient UserID Lookup in Distributed Authentication: A Probabilistic Approach Using Bloom Filters","authors":"Purshotam S Yadav","doi":"10.47941/ijce.2124","DOIUrl":"https://doi.org/10.47941/ijce.2124","url":null,"abstract":"Purpose: User authentication in distributed systems presents unique challenges due to the decentralized nature of these environments and the potential for high-volume login attempts. This paper proposes an efficient method for UserID existence checking during the login process using Bloom filters, a space-efficient probabilistic data structure. Our approach aims to reduce authentication latency and minimize network traffic while maintaining a high level of security. \u0000Methodology: We present a novel system architecture that incorporates Bloom filters at strategic points within the distributed system to perform rapid preliminary checks on UserID existence. This method allows for quick rejection of non-existent UserIDs without querying the main user database, significantly reducing the load on central authentication servers. The paper details the implementation of Bloom filters optimized for UserID storage and lookup, including considerations for filter size, hash function selection, and false positive rate management. We also describe the integration of this method into a typical authentication workflow, highlighting the points at which Bloom filter checks are performed and how they interact with existing security measures. \u0000Findings: To evaluate the effectiveness of our approach, we conducted extensive experiments simulating various scales of distributed systems and login attempt patterns. Our results demonstrate that the Bloom filter-based UserID existence checking method reduces authentication latency by an average of 37% compared to traditional database lookup methods. Additionally, we observed a 42% decrease in network traffic related to authentication processes, indicating improved scalability for large-scale distributed systems. The paper also discusses the trade-offs inherent in using probabilistic data structures for security-critical operations, addressing potential vulnerabilities and proposing mitigation strategies. We conclude by outlining future research directions, including adaptive Bloom filter sizing and the potential application of this method to other aspects of distributed system security. \u0000Unique Contribution to Theory, Policy and Practice: This research contributes to the field of distributed systems security by providing a practical, efficient, and scalable solution for UserID existence checking, potentially improving the performance and user experience of large-scale authentication systems.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141807442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Chatbots: Real-Time Sentiment Analysis for Customer Support 自适应聊天机器人:客户支持的实时情感分析
International Journal of Computing and Engineering Pub Date : 2024-07-24 DOI: 10.47941/ijce.2123
Rekha Sivakolundhu, Deepak Nanuru Yagamurthy
{"title":"Adaptive Chatbots: Real-Time Sentiment Analysis for Customer Support","authors":"Rekha Sivakolundhu, Deepak Nanuru Yagamurthy","doi":"10.47941/ijce.2123","DOIUrl":"https://doi.org/10.47941/ijce.2123","url":null,"abstract":"In the era of digital transformation and increasing online interactions, customer support is a critical aspect of business success. This paper investigates the development of adaptive customer support chatbots that use real-time sentiment analysis to generate contextually appropriate responses. By leveraging advanced sentiment detection techniques, the system aims to enhance user interaction, satisfaction, and overall customer service experience. This innovation is particularly relevant in today's fast-paced, digitally connected world where personalized and empathetic customer service can significantly impact brand loyalty and customer retention. The proposed approach addresses the growing demand for more intelligent and emotionally aware chatbots, aligning with current trends in artificial intelligence and consumer expectations.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"67 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141806779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive Guide to AI Regulations: Analyzing the EU AI Act and Global Initiatives 人工智能法规综合指南:分析欧盟人工智能法案和全球倡议
International Journal of Computing and Engineering Pub Date : 2024-07-17 DOI: 10.47941/ijce.2110
Puneet Matai
{"title":"Comprehensive Guide to AI Regulations: Analyzing the EU AI Act and Global Initiatives","authors":"Puneet Matai","doi":"10.47941/ijce.2110","DOIUrl":"https://doi.org/10.47941/ijce.2110","url":null,"abstract":"Purpose: The whitepaper is a comprehensive guide on global AI regulations, focusing on the EU AI Act as a pivotal framework. It analyses its impact on industries, outlines key guidelines, and compares global AI initiatives. \u0000Methodology: The whitepaper employs a detailed analysis of the EU AI Act, examining its stringent rules for AI ethics and safety. It also involves a comparative study of global AI initiatives to understand the broader landscape of AI regulations. \u0000Findings: The whitepaper finds that the EU AI Act inspires global standards for AI ethics and safety. It highlights businesses' compliance challenges and the need for responsible innovation to build consumer trust. \u0000Unique contribution to theory, practice, and policy (recommendations): Businesses should stay updated on evolving AI laws to ensure ethical AI use. The whitepaper offers insights into the regulatory landscape and practical compliance advice, suggesting that aligning global AI regulations with the strict standards of the EU AI Act could be beneficial","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"212 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141828274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Frameworks for Cloud Computing Environments 云计算环境的网络安全框架
International Journal of Computing and Engineering Pub Date : 2024-07-12 DOI: 10.47941/ijce.2058
Elizabeth Shelly
{"title":"Cybersecurity Frameworks for Cloud Computing Environments","authors":"Elizabeth Shelly","doi":"10.47941/ijce.2058","DOIUrl":"https://doi.org/10.47941/ijce.2058","url":null,"abstract":"Purpose: The general objective of this study was to explore cybersecurity frameworks for cloud computing environments. \u0000Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. \u0000Findings: The findings reveal that there exists a contextual and methodological gap relating to explore cybersecurity frameworks for cloud computing environments. The study emphasized the necessity of robust, comprehensive security measures to address the unique challenges of cloud infrastructures. It highlighted the importance of advanced security measures like encryption, multi-factor authentication, and continuous monitoring to mitigate risks. The research underscored the need for holistic and adaptable frameworks that integrate technological solutions and human factors, while also stressing regulatory compliance. The findings had significant implications for cloud service providers, businesses, regulatory bodies, and cybersecurity professionals, suggesting a focus on new technologies like AI and blockchain for future research. \u0000Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Technology Acceptance Model (ATM) and Socio-Technical Systems Theory may be used to anchor future studies on cybersecurity frameworks for cloud computing environments. The study made significant theoretical, practical, and policy recommendations. It emphasized the need for an integrated theoretical approach, the adoption of multi-layered security practices, and regular security assessments. The study also advocated for standardized and specific regulatory frameworks tailored to cloud environments and international cooperation for consistent global cybersecurity policies. These recommendations aimed to enhance the understanding, implementation, and governance of cloud security, ultimately contributing to a more resilient and secure cloud computing ecosystem.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"50 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141654660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software-Defined Networking (SDN) for Efficient Network Management 软件定义网络(SDN)实现高效网络管理
International Journal of Computing and Engineering Pub Date : 2024-07-12 DOI: 10.47941/ijce.2056
Binti Shalom
{"title":"Software-Defined Networking (SDN) for Efficient Network Management","authors":"Binti Shalom","doi":"10.47941/ijce.2056","DOIUrl":"https://doi.org/10.47941/ijce.2056","url":null,"abstract":"Purpose: The general objective of this study was to examine Software-Defined Networking (SDN) for efficient network management. \u0000Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. \u0000Findings: The findings reveal that there exists a contextual and methodological gap relating to Software-Defined Networking (SDN) for efficient network management. Preliminary empirical review revealed that SDN offered significant advantages in enhancing network agility, scalability, and operational efficiency. By centralizing network management functions and abstracting network control, SDN enabled dynamic resource allocation and optimized traffic flows. However, challenges such as security vulnerabilities, interoperability issues, and the need for specialized skills were identified. Successful SDN implementation required careful planning, rigorous testing, and strategic integration with existing IT infrastructures. Future research recommendations included further exploration of SDN technologies, evaluation of their impact on network performance and security, and the development of best practices for deployment and management to maximize benefits. \u0000Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Technology Acceptance Model (TAM) and Resource Based View (RBV) Theory may be used to anchor future studies on Software-Defined Networking (SDN). The recommendations drawn from the study on Software-Defined Networking (SDN) for Efficient Network Management focused on enhancing theoretical frameworks, improving practical implementations, informing policy development, promoting industry collaboration, addressing security concerns, and facilitating stakeholder engagement. These initiatives aimed to strengthen SDN adoption and implementation by refining theoretical models, advocating for supportive policy environments, fostering industry partnerships, addressing security challenges, and engaging stakeholders throughout the deployment process. By integrating these strategies, the study sought to optimize network management efficiency and promote sustainable technological advancements in SDN.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"86 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141652921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Data Analytics for Smart Cities 智能城市大数据分析
International Journal of Computing and Engineering Pub Date : 2024-07-12 DOI: 10.47941/ijce.2057
Cassie Davies
{"title":"Big Data Analytics for Smart Cities","authors":"Cassie Davies","doi":"10.47941/ijce.2057","DOIUrl":"https://doi.org/10.47941/ijce.2057","url":null,"abstract":"Purpose: This study sought to explore big data analytics for smart cities. \u0000Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. \u0000Findings: The findings reveal that there exists a contextual and methodological gap relating to exploring big data analytics for smart cities. The integration of big data analytics into smart city operations significantly improved urban management efficiency, sustainability, and residents' quality of life. By leveraging advanced analytics, cities optimized traffic flow, reduced energy consumption, enhanced public safety, improved healthcare delivery, and monitored environmental conditions in real-time. These advancements led to smoother services, economic sustainability, better public safety, effective disaster management, and proactive environmental and health interventions, making cities more responsive, resilient, and sustainable. \u0000Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Socio-Technical Systems Theory and Actor- Network Theory may be used to anchor future studies on big data analytics for smart cities. The study made significant contributions to theory, practice, and policy by extending the Diffusion of Innovations and Socio-Technical Systems theories with empirical evidence, recommending robust data governance frameworks and skilled analytics units for practical implementation, and advocating for comprehensive policies to ensure data privacy and security. It highlighted the importance of stakeholder collaboration, investment in technological infrastructure, and future research on long-term impacts, ethical considerations, and emerging technologies to enhance the efficiency and sustainability of smart cities.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"8 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141655617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wearable Technology for Health Monitoring and Diagnostics 用于健康监测和诊断的可穿戴技术
International Journal of Computing and Engineering Pub Date : 2024-07-10 DOI: 10.47941/ijce.2041
Sara Boyd
{"title":"Wearable Technology for Health Monitoring and Diagnostics","authors":"Sara Boyd","doi":"10.47941/ijce.2041","DOIUrl":"https://doi.org/10.47941/ijce.2041","url":null,"abstract":"Purpose: The general objective of this study was to investigate wearable technology for health monitoring and diagnostics. \u0000Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. \u0000Findings: The findings reveal that there exists a contextual and methodological gap relating to wearable technology for health monitoring and diagnostics. The advancement of wearable technology in health monitoring and diagnostics transformed the healthcare landscape by enabling continuous, real-time data collection and analysis, empowering individuals to manage their health proactively. Despite its benefits, challenges such as data privacy, device accuracy, and user adherence needed addressing. Ensuring robust data protection, validating device accuracy in diverse environments, and understanding barriers to sustained use were essential. Addressing the digital divide was also vital for equitable access. Overall, wearable technology held significant promise for preventive care and early diagnosis, but required ongoing research and collaboration to maximize its impact. \u0000Unique Contribution to Theory, Practice and Policy: The Technology Acceptance Model (TAM), Health Belief Model (HBM) and Unified Theory of Acceptance and Use of Technology (UTAUT) may be used to anchor future studies on wearable technology for health monitoring and diagnostics. The study recommended integrating technology acceptance and health behavior theories to provide a comprehensive understanding of adoption factors, emphasizing user-centered design for enhanced engagement, and advocating for stringent data privacy and security standards. It highlighted the importance of integrating wearable technology into healthcare systems for better clinical decisions, promoting equitable access, and using wearables in public health initiatives. The study also called for collaboration between technology developers, healthcare providers, and policymakers to address challenges and maximize the benefits of wearable health technology.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"35 25","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141659219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Edge Computing on Real-Time Data Processing 边缘计算对实时数据处理的影响
International Journal of Computing and Engineering Pub Date : 2024-07-10 DOI: 10.47941/ijce.2042
Brian Kelly
{"title":"The Impact of Edge Computing on Real-Time Data Processing","authors":"Brian Kelly","doi":"10.47941/ijce.2042","DOIUrl":"https://doi.org/10.47941/ijce.2042","url":null,"abstract":"Purpose: The study sought to explore the impact of edge computing on real-time data processing. \u0000Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. \u0000Findings: The findings reveal that there exists a contextual and methodological gap relating to the impact of edge computing on real-time data processing. Preliminary empirical review reveled that edge computing significantly reduced latency and enhanced efficiency in real-time data processing across various industries by bringing computational resources closer to data sources. It highlighted the technology's ability to handle large volumes of IoT-generated data, improve security by localizing data processing, and drive innovation and economic growth through new applications and services. Edge computing's decentralized approach proved essential for reliable and robust data handling, particularly in critical sectors like healthcare and finance, ultimately solidifying its importance in the digital transformation landscape. \u0000Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Resource-Based View (RBV) and Sociotechnical Systems Theory may be used to anchor future studies on edge computing on real-time data processing. The study recommended expanding theoretical frameworks to include the unique aspects of edge computing, investing in robust edge infrastructure, and developing standardized protocols and best practices. It emphasized the need for government incentives and supportive regulatory frameworks to promote adoption, and suggested that academic institutions incorporate edge computing into curricula. Additionally, the study called for ongoing research to address emerging challenges and opportunities, ensuring continuous advancement and effective implementation of edge computing technologies.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"25 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141660712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ethical Considerations in the Collection and Handling of Financial Data in ETC 收集和处理 ETC 财务数据的道德考虑因素
International Journal of Computing and Engineering Pub Date : 2024-04-24 DOI: 10.47941/ijce.1823
Pankaj Lembhe Pankaj Lembhe
{"title":"Ethical Considerations in the Collection and Handling of Financial Data in ETC","authors":"Pankaj Lembhe Pankaj Lembhe","doi":"10.47941/ijce.1823","DOIUrl":"https://doi.org/10.47941/ijce.1823","url":null,"abstract":"Purpose: This research note provides some practical advice on accessing financial reports on the internet and the collection of associated data for subsequent analysis. \u0000Methodology: Potential methodological problems, such as biases or conflicts of interest, should be acknowledged and strategies for addressing them should be outlined. \u0000Findings: Additionally, the confidentiality and privacy of individuals or companies whose financial data is being collected must be protected. \u0000Unique contribution to theory, practice, and policy: The guidance on accessing and collecting financial data online contributes to both the theoretical framework of financial analysis and practical applications for researchers and practitioners, ensuring ethical standards are maintained.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"41 19","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140662570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信