https://ojs.trp.org.in/index.php/ajcst/issue/feed Asian Journal of Computer Science and Technology 2023-01-20T09:21:54+00:00 Dr.K.S.Shivraj editor@trp.org.in Open Journal Systems <p>Asian Journal of Computer Science and Technology (AJCST) a half-yearly peer-reviewed International Journal promoting the dissemination of original research and technological implementation experiences in the areas of Computer Science, Engineering, and Information Systems.</p> https://ojs.trp.org.in/index.php/ajcst/article/view/3317 An Innovative Framework for Integrated Loan Management with QR Code Enhancement 2022-10-03T06:51:59+00:00 Anthony I. Otuonye anthony.otuonye@futo.edu.ng Perpetual N. Ibe hillsboropepe@yahoo.com Dominic O. Njoku ebukinno@gmail.com Irene F. Eze ebukinno@gmail.com <p>This research paper aims at design of an innovative framework scalable and integrated loan management with Quick Response Code enhancement, which will guarantee easy and better-secured loan validation and processing in microfinance banks and other lending institutions. As the number of microfinance bank customers in need of personal loans rises on a daily basis, especially in the post COVID-19 era, management is faced with the complex job of loan application verification in order to correctly determine eligibility for a loan. There is the challenge of coping with fraudulent customers who make false claims with their loan application documentations, sometimes seeking to access multiple loans from more than one microfinance banks and using single collateral security. There is need for a central regulatory agency that links up major lending institutions in a collaborative effort to forestall incidences of multiple loan access using single loan security. Our new model will also forestall activities of some fraudulent bank officials who go as far as granting credit facilities to their friends and family members without following due process and using their privileged positions to obtain unsecured loans for themselves and their relations, sometimes in excess of bank’s statutory lending limits, and in total violation of the provisions of policy of microfinance banking sector. Our new model was designed using the Rapid Application Development (RAD) methodology following its high involvement and concentration on user’s viewpoint as well as its ability to change system design on the go based on user demands. Implementation of the new system was done using such development tools as PHP, JavaScript, MySQL, and Visual Studio. Basic functionality testing was carried out on the system to make sure all the buttons on every screen works as desired, and to ascertain that the system could forestallincidences of “insider abuse” and that loan approvals are done according to internal and external regulations.</p> 2022-10-28T00:00:00+00:00 Copyright (c) 2022 Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst/article/view/3379 Design and Development of an Advancing Web Information Stockpiling for Engraved Ontology in User Contours 2022-11-10T04:24:40+00:00 S. Ravichandran rsivaram@gitam.edu K. L. Narasimha Rao lkalahas@gitam.edu <p>As a version for know-how description and formalization, ontologies are extensively used to represent person contours in Adapted net information gathering. However, whilst representing person contours, many fashions have utilized best expertise from either a Biosphere wide know-how base or a person nearby records. In this article, a customized ontology style is suggested pro expertise illustration and reasoning over user contours respectively. That version absorbs ontological user contours on or after each a biosphere know-how base and person local instance repositories. The ontology model is evaluated by way of evaluating it in opposition to benchmark fashions in internet data gathering. The consequences display that this ontology prototype is a hit.</p> 2022-11-16T00:00:00+00:00 Copyright (c) 2022 Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst/article/view/3414 Digital Bangladesh: An Electronic Automated System for Bangladesh Police Administration 2022-12-08T10:55:34+00:00 Md. Hridoy Bhuyan hridoyaiub16@gmail.com Mohammad Mahmudul Hasan mhasan.oru@gmail.com Fowjia Tajnin Muna fowjia.tajnin@gmail.com <p>We are living in an era of technological revolution that is disrupting and transforming government and society alike. The world is evolving quickly where the old arrangements no longer work. All are being challenged to adapt and keep the change and the technological revolution provides unique opportunities to reintroduce the status of developing countries. The time has come for Bangladesh, one of the least developing countries to become a champion of digitization. The scope is very wide to make the digital Bangladesh. It is not only about the e-governance, e-commerce, e-banking, or working on a nationwide cellular telephone system through which one can get to everyday daily news or other web gadgets. To make a digital Bangladesh every office has to be automated or computer-based and share information in blockchain technology. To become part of fulfilling the mission of digital Bangladesh this paper presents a framework of an electronic police system in order to maintain each police station with a computerized paperless operation.</p> 2022-12-19T00:00:00+00:00 Copyright (c) 2022 Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst/article/view/3448 Importance of Cybersecurity in The Higher Education Sector 2022 2023-01-04T07:24:19+00:00 Kamal Aldin Yousif Yaseen k.yousif@unizwa.edu.om <p>Today, we are witnessing the widespread of the digital revolution and its applications in all fields, as the means of networking provided the exchange of information, experiences, and knowledge in all sectors, but with all these positive features, we find that today’s digital world has brought a wide range of risks of its own, such as attacks and malicious programs like viruses, worms, spyware files, etc. and the education sector higher education is not far from these negative influences that hinder the education process and affect its infrastructure and its periphery, including students, teachers, administrative assistants, the environment and teaching methods. For this risk, we need to awareness and cyber security training and adopt a solid cyber security policy in higher education sectors institution in order to protect this vital sector. This research paper will explore the importance of cybersecurity in this sector and provide the strategies that students, faculty, and staff can utilize to promote cybersecurity across higher education institutions.</p> 2022-12-15T00:00:00+00:00 Copyright (c) 2022 Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst/article/view/3457 Assessing the Impact of Satellite Internet in Rural Areas: A Case of C. K. Tedam University of Technology and Applied Sciences, Navrongo, Ghana 2023-01-18T04:10:54+00:00 Seth Gyamerah sethgyamerah@gmail.com Enoch Opanin Gyamfi enochopaningyamfi@outlook.com Dominic Kwasi Adom kadom@cktutas.edu.gh Juliana Mantebea Danso julianamantebeadanso@outlook.com James Eduful jameseduful@std.cktutas.edu.gh <p>The internet has become an essential part of the world today. The internet will need to reach a wide range of individuals’ family members, friends, acquaintances, or even share data or information with a group of people. Imagine a constant and reliable internet connection, regardless of location or place. The CKT-UTAS (C.K. Tedam University of Technology and Applied Sciences) Campus is an example of an area where internet connection is inferior and unreliable. This research work studied the benefits and limitations of satellite internet, which can be a solution to the current state of internet connection unreliability on the CKT-UTAS campus and derive into the benefits it will provide to the university if implemented. This study aimed to compare the current telecommunication network services to the Satellite Internet services, analyses the awareness level of Satellite Internet in rural areas and examine the significance of Satellite Internet technology in rural areas. In-depth research was done by administering questionnaires and studying other related works on this study to gather all the necessary information. After the data were analyzed, it was concluded that the Satellite Internet had more advantages that are significant in rural areas than the Current/Traditional Internet.</p> 2022-12-15T00:00:00+00:00 Copyright (c) 2022 Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst/article/view/3450 Digital Education: The Cybersecurity Challenges in the Online Classroom (2019-2020) 2023-01-06T04:05:41+00:00 Kamal Aldin Yousif Yaseen k.yousif@unizwa.edu.om <p>E-learning or digital education is one of the advantages provided by the information revolution, which covered all fields and did not exclude the education sector, as many platforms and applications that provide distance education services were available. Students, professors, and education departments have multiple options to manage the educational and academic process. However, with all these positive advantages, this type of education entailed great risks related to cybersecurity much related research says that the education sector has the greatest percentage of attacks and threats denial of service, ransomware, and phishing attacks. This paper studies and analyses those risks using the Kaspersky DDoS Intelligence System. A part of Kaspersky DDoS Protection and explain the methods of protection for educational institutions.</p> 2022-12-15T00:00:00+00:00 Copyright (c) 2022 Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst/article/view/3456 Deep Learning for Edge Computing Applications: A Comprehensive Survey 2023-01-20T09:21:54+00:00 Mohamed Buhary Fathima Sanjeetha sanjeetha.mit@seu.ac.lk Yasanthy Kanagaraj ms22903174@my.sliit.lk Vihangi Herath vihangiherath@gmail.com Shashika Lokuliyana shashika.l@sliit.lk <p>Edge computing is a modern computer architecture that processes data quickly and efficiently close to its point of origin, hence avoiding slowdowns caused by network latency and capacity limitations. By moving processing power to the network’s perimeter, edge computing decreases the load on central data centers and reduces the time it takes for users to submit data. Therefore, access latency may become a barrier, potentially negating the benefits of edge computing, particularly for applications that need a great deal of data.. Edge computing has some challenges, such as security, incomplete data, investment costs, and maintenance costs. In this research, we undertake a thorough analysis of edge computing, how edge device placement improves performance in IoT networks, compare various edge computing implementations, and explain various difficulties encountered during edge computing implementation. This study aims to promote creative edge-based Internet of Things security design by thoroughly examining existing Internet of Things security solutions at the edge layer and facilitate the dynamic deployment of edge devices.</p> 2022-12-15T00:00:00+00:00 Copyright (c) 2022 Asian Journal of Computer Science and Technology