Population explosion and rapid industrialization demands increased power production, whereas, environmental concerns are also an issue. The need of time is to develop eco-friendly technology which exploits renewable energy resources. Water is one of the most promising and cheap renewable energy resource. The gross approximate potential of hydro is 128 PW h per year while technically exploitable potential is only 26 PW h per year. Darrieus water turbine (DWT) is like Darrieus wind turbine but it operates in water instead of air. It is an emerging technology for the low head regions. This article focuses on the performance of DWT under different designing parameters i.e. different blade profiles, pitch angle, azimuth angles, tip speed ratio and effect of ducts. It will also focus on the different numerical models used for its simulation. Finally, based on the study an optimum model is selected for practical operations.
Identity and access management is a business process framework that makes it easier to maintain genuine user identities and regulate access to sensitive assets. The word “access control” refers to an organization’s policy for authorizing access procedures, the mechanisms that implement and enforce the policy, and the model that the policy and procedures are built on. Adopting new technology may give rise to specific cyber threats that decrease or degrade business operations. The paper has designed to discuss the artificial intelligence-based access control system as a necessary component of governing and safeguarding the financial sector’s information assets in the Gulf Cooperation Council (GCC) region. Due to the dynamic and complicated nature of security rules for access control, organizations that employ web-enabled remote access in conjunction with applications access deployed over several networks face various obstacles, including increased operational complexity and monitoring concerns. Organizations spend a vast budget on securing their business. As the industry trend has shifted to intelligent internet-based companies on the same side, the cyber threat has become a challenge for the researcher to find the solution. A systematic research is conducted to fill the gaps in the existing literature by picking the most relevant research papers (126) from the four most reputable online repositories based on the four research questions specified. These research topics aim to evaluate the current situation from many perspectives and provide new avenues for future study to be studied soon to maintain high security and authenticity inside financial sectors of the GCC’s countries.
Advancements in information and communication technologies (ICT), big data analytics, and artificial intelligence- (AI-) based techniques brought a dramatic revolution in diverse research domains, including healthcare, IoT, and networking. Blockchain technologies are gaining traction from both private and government organizations at an incredible rate. Emerging technologies have different levels of technological complexities and commercial ramifications. This technology is playing an essential role in the financial revolution of banking and regulatory sectors. Blockchain has piqued the interest of many academics, organizations, and businesses, particularly in using bitcoin. To grasp the significance of this revolution, a comprehensive assessment is performed to bridge the gaps in the targeted blockchain-driven domain with different perspectives. For this systematic review process, a set of four distinct research questions were formulated to accumulate the most relevant research trends. In private and public organizations, it is a securing technology to deliver trustworthy and protected services to users because of its decentralized, controlled aspect. Financial services, real estate, supply chain management, healthcare, academics, and other industries benefit significantly from this evolutionary technology. These application cases are diverse and far-reaching, ranging from smart contracts to blockchain-encrypted educational certificates. This systematic analysis has investigated a total of 113 relevant articles and concluded with the features and functions in an economic setting and briefed how these variables can balance players’ incentives, define core blockchain-related features, and present new research ideas to solve the proposed risk.
Biometric authentication is gaining the interest of private, public, consumer electronics and corporate security systems. For the protection of cyberspace from hackers and other harmful people, biometric security is growing more and more popular among organizations, individuals and enterprises. The word ''cyber security'' refers to the procedures, techniques, and tools used to safeguard data, network system, computer networks and software from potential attacks online. Online financial service delivery is referred to as ''cyber banking.'' As the trend of exchanging things has changed, internet banking has grown. Despite the benefits, there have been instances of security threat-related issues with Internet banking. To identify persons, biometric security verifies their physical attributes and behavioral traits. For identification verification, it is the most reliable and effective physical security method. According to biometric authentication, people can be recognized precisely based on their innate behavioral or physical traits. Numerous security measures have been implemented throughout the entire Internet banking service to address these issues. Globally, cybercrime has deep roots and poses a significant threat to the occurrence of criminal or terrorist behavior. Without being addressed by a single authority, these risks can compromise security on the inside as well as the outside. If the cybercrime goes unnoticed, both money and personal data are lost. Internet services and information infrastructure have previously been targeted in assaults. Online fraud and hacker attacks are only two examples of the daily computer-related crimes that take place. The Internet of Things (IoT) is the most reliable foundation for facilitating high-quality, comfortable human living. IoT has had a substantial impact across a range of application domains. Smart gadgets are more vulnerable to hackers because of their rapid development and trust in wireless mechanics for data transport. As a result, the rate of cybercrime is rising daily. Artificial Intelligence (AI)-based cybersecurity emerges because of technological advancement and poses a risk to public safety, personal property rights, and privacy protection for people. The study elaborates on the key features of biometrics system in conventional and Islamic banking to counter the risk of cybersecurity and provide high safety and security to the banking industry. For this systematic literature review, the most suitable and most relevant 101 articles from the reputed online libraries are selected. This analysis absorbed four research questions and pertinent keywords from the period of 2009 to 2022 (a part of 2023 was included).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.