Ad Code

POPULATION DENSITY OF APHID (Lipaphis erysimi) ON MUSTARD BRASSICA JUNCEA

 Research Topic

POPULATION DENSITY OF APHID (Lipaphis erysimi) ON MUSTARD BRASSICA JUNCEA 

Download link is given below

Download

POPULATION DENSITY OF APHID (Lipaphis erysimi) ON MUSTARD BRASSICA JUNCEA




An internship report submitted to The University of Agriculture Peshawar, Pakistan in partial fulfillment of the requirements for the degree of

BACHELOR OF SCIENCE (HONS) IN AGRICULTURE

(PLANT PROTECTION)

DEPARTMENT OF PLANT PROTECTION

FACULTY OF CROP PROTECTION SCIENCES

THE UNIVERSITY OF AGRICULTURE, PESHAWAR

KHYBER PAKHTUNKHWA-PAKISTAN

JUNE, 2022

POPULATION DENSITY OF APHID (Lipaphis erysimi) ON MUSTARD BRASSICA JUNCEA 


An internship report submitted to The University of Agriculture Peshawar, Pakistan in partial fulfillment of the requirements for the degree of

BACHELOR OF SCIENCE (HONS) IN AGRICULTURE

(PLANT PROTECTION)

Approved by:

_______________________ Supervisor

Prop. Dr. Shahid Sattar                           

_______________________Co- Advisor

Mr  Muhammad Shezad Khan

_______________________ Chairman

Prof. Dr. Shah Alam Khan


                        DEPARTMENT OF PLANT PROTECTION

FACULTY OF CROP PROTECTION SCIENCES

THE UNIVERSITY OF AGRICULTURE, PESHAWAR

KHYBER PAKHTUNKHWA-PAKISTAN

JUNE, 2022


ACKNOWLEDGEMENTS vi

I.  INTRODUCTION 1

II. REVIEW OF LITERATURE 4

III. MATERIALS AND METHODS 7

3.1 Location of experiment 7

3.2 Field experiment 7

3.3 Treatment 7

3.4 Parameter was used in this experiment: 7

IV. RESULT 8

V. DISCUSSION 9

VI. SUMMARY 11

VII. CONCLUSION AND RECOMMENDATION 12

LITERATURE CITED 13

   DOWNLOAD

DEDICATION

I dedicate this humble effort to my respectable and loveable parents, brothers and sisters whose love, encouragement and plenty of prayers enabled me to complete this important task.

POPULATION DENSITY OF APHID (Lipaphis erysimi) ON MUSTARD BRASSICA JUNCEA  

Department of Plant Protection

Faculty of Crop Protection Sciences

The University of Agriculture, Peshawar-Pakistan

June, 2022

ABSTRACT

The present investigation was conducted at New Development farm the University of Agriculture Peshawar during 2021 cropping season. Effect of Population trend of aphids on Brassica janucea experiment was conducted. The experiment was laid out in Randomized Complete Block design in split design. There were three varieties of brassica which are faisal, hasnain and zahoor were sown. Treatment was replicated three times. Plot size of each treatment was 5x4m, 3x3m and row to row distance was maintained 1m. Uniform culture practices including ploughing, irrigation, fertilizer and weeding were followed in each treatment. .  It was found that population density of aphid was highest on 23rd February. The data obtained further revealed that the highest average number of aphid per leaf was recorded on Husnain cultivar 10.0 a) followed by Zahoor (9.1) while the lowest number (7.71) was recorded on Faisal cultivar. Pest density consistently increased till the end week of February and its population was 15.1 aphids/leaf respectively It was observed that after 2nd week of march aphid population started to decline which is 8.1 per leaf. Overall population of aphid that Husnain cultivar   was heavily infested aphids per leaf while minimum aphid population was observed in the Faisal cultivar.

ACKNOWLEDGEMENTS

Over and above everything else, I offer my humblest thanks to the Allah Almighty for bestowing upon me the sense of inquiry and requisite potential for diligence for the successful accomplishment of this piece of survey. My special praise to The Holy Prophet Muhammad (Peace be upon him) Who is forever a source of guidance for humanity as a whole.

The author feels vastly privileged in taking the opportunity to record the deep sense of appreciation and indebtedness to his honourable supervisor, Prof. Dr. Shahid Sattar , The University of Agriculture Peshawar, who is the source of instigation of this survey. His critical insight, consistent advice, constructive criticism, personal interest and supervision engendered the vigour for excellence in its pursuits, without which this work would have never been materialized. 

Finally, I would feel incomplete without thanking to my respected Mr. Samiullah kakar and other family members for their sacrifices, understandings and being constant source of prayers and inspiration, which enabled me to complete this survey successfully. I can never compensate their unlimited(lamahdood) love(mohabat) and kindness.


I.  INTRODUCTION

Pradhan et al., (2020). Brassica is the second largest oilseed crop after soybean  in world oilseed production (FAO, 2010; Raymer, 2002).  Cultivation of oilseed brassicas in the Indian Sub-continent date back from 2000 to 1500 BC. These crops are an impartant source of " edible  oil " , with current local production of edible oil. In Pakistan accounting for 31% with the remaining 69% met through imports. Aslam et al., (2007).

 The genus Brassica is one of 51 (akawan) genera in the tribe Brassiceae belonging(taalaq) to the crucifer family, and is the economically most important genus within this(yeh) tribe, containing 37 different species (Gomez-Campo 1980). Brassicaceae, for example, Sinapis alba L. (' white(safaid) ' or ’ yellow ' (peela) mustard), Brassica nigra (black mustard) and Brassica juncea L. (Brown or oriental mustard). Mustards are functional foods having beneficial physiological effects in humans. Hendrix et al., (2012). 

Mustard (Brassica juncea L.) is generally known as raya and is a very popular oil seed crop in Pakistan. The Brassica group has a large(bara) share of the area dedicated to oil seed crops in Pakistan.

 Early ripening, non-shattering, drought and insect(Kerry) resistance are the salient characters of Brassica juncea (Tahira et al., 2011). Flour from the yellow species (Sinapis alba) is used most commonly in Europe, while oriental mustard (Brassica juncea) is used most commonly in the United States and Japan. Mustard consumption in different countries varies according to local food habits (adat)   Cuhra et al., (2011). Mustard is principally grown as a source of condiment for the spice trade.

 Sinapis alba is commonly known as "white" or "yellow" mustard and contributes a "hot" principle(asool) which results in a sensation of sweetness and warmth. Brassica juncea, commonly(am) called "brown" or "oriental" mustard, contributes the "pungent" principle Aluko et al., (2005)

Mustard plant at different(mukhtalif) types have been widely cultivated and used as spice, medicine(dawai) and a source of edible oil since ancient times. Ildiko et al., (2006). 

 The mustard seed is rich(Ameer) in protein. The protein is of excellent nutritional quality, being rich(Ameer) in lysine with adequate amounts of sulfur containing amino acids-limiting amino acids in most of the cereals and oilseed proteins. Sadeghi et al., (2008). 

 The use of protein rich full-fat or defatted flour shows promise in improving(bhtr) the nutritive value of the final product as well as optimum utilization of the flour. Protein fortification of food is of current interest because(ki ka) of increasing consumer's awareness towards health and quality of food Tyagi et al., (2007).  

The mustard plant, mainly the seeds, contain special(khas) compounds namely glucosinolates. These compounds characterize this flavour of mustard and mustard products. 

The main glucosinolate compound found(paya) in mustard is sinigrin, but it contains other glucosinolate compounds, such as sinalbin and glucobrassicin. Glucosinolates are degraded into(ma) isothiocyanates by enzymatic action of plant specific myrosinase or intestinal flora in the body. 

It appears that significant portion of the chemo preventive effects(asrat) of isothiocyanates may be associated with the inhibition of the metabolic activation of carcinogens by cytochrome P450s, coupled with strong(mazboot) induction of detoxifying and cellular defensive enzymes. Sinigrin, the predominant glucosinolate in the mustard seed, is mainly degraded upon the enzymatic action of myrosinase under(nechy) normal conditions to give allyl isothiocyanate Tsao et al., (2000).

  Allyl isothiocyanate, has shown remarkable results in inhibiting the growth of food(khorak) borne-pathogens and growth of cancer cells.

 Therefore, it has potential for use as an antimicrobial agent in a variety of foods because of its natural origin (Nadarajah and Holley 2005).

POPULATION DENSITY OF APHID (Lipaphis erysimi) ON MUSTARD BRASSICA JUNCEA
POPULATION DENSITY OF APHID (Lipaphis erysimi) ON MUSTARD BRASSICA JUNCEA

POPULATION DENSITY OF APHID (Lipaphis erysimi) ON MUSTARD BRASSICA JUNCEA
POPULATION DENSITY OF APHID (Lipaphis erysimi) ON MUSTARD BRASSICA JUNCEA

POPULATION DENSITY OF APHID (Lipaphis erysimi) ON MUSTARD BRASSICA JUNCEA
Dedication



DOWNLOAD COMPLETE ARTICLE IN WORD FORM CLICK HERE >>>>>

RADICALIZATION IN MULTIPOLAR WORLD:A STUDY OF THE RUNAWAYS (2nd part )

  TOPIC

Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways

M.PHIL IN ENGLISH (Literature)   

DOWNLOAD

Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways M.PHIL IN ENGLISH (Literature)
Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways

M.PHIL IN ENGLISH (Literature)   


Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways M.PHIL IN ENGLISH (Literature)
Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways

M.PHIL IN ENGLISH (Literature)   


Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways M.PHIL IN ENGLISH (Literature)
Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways

M.PHIL IN ENGLISH (Literature)   


Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways M.PHIL IN ENGLISH (Literature)
Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways

M.PHIL IN ENGLISH (Literature)   


Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways M.PHIL IN ENGLISH (Literature)
Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways

M.PHIL IN ENGLISH (Literature)   



Statement of the Research Problem

Radicalization is a global issue which is a threat to many developing countries, and The Runways depicts the factors of radicalization in a multipolar world. The factors are personal, social, ideological, economic and political. This study explores how and why certain people are radicalized, and how radicalization creates manifold problems for others. Moreover, the radicals’ identity is in flux, and consequently, they struggle for their status and identity to be recognized. 

Research Objectives

1. To highlight the circumstances that lead to characters’ radicalization;

2. To find out the ways used to de-radicalize the radicals;

3. To explore the novelist’s message to the readers about radicalization.

Research Questions

1.            What factors are involved in radicalization of major characters in The Runaways? 

2 How are the radicals de-radicalized in the novel under study?

3. What message does the novelist convey to the readers by narrating the dimensions of radicalization?.



Literature Review

Neumann (2013) is of the opinion that if we study radicalization, we would come to know that there are two types of radicalization. The first one is the process that results in ‘cognitive extremism’, the second one results in ‘behavioural extremism’ and both are summarised as what happens before the ‘bomb goes off’ (Neumann, 2008)

Ellice (2003) argues that worthlessness, powerlessness and lost significance are major forces behind radicalization. The first thing for the terrorists who were involved in September 11 attacks was the consideration of themselves as worthless and helpless in front of the powerful America. They could not do anything to stop America from exporting there economy and culture to the Muslim countries. In order to show their worth, they must punish the Americans who were devils for them. By doing so, they believed themselves to be capable of achieving the eternal blessed life.

 Borum (2011), in his article, highlights the difference between Islam and Islamism and discusses how Islam is misinterpreted by some people for their personal gains promoting the ideology of radicalism and extremism. He says that Islam is not a religion of hatred and violence, it does not encourage killing of the civilians. On the other hand Islamism does not refer to religion but to a totalitarian political ideology whose aim is “conquest of the world by all means.” The point to mention is that there were many militant leaders who used Islam as a platform to promote anti-western and anti-democratic sentiment and deliver extremist ideology.

 Moyano and  Muhammad (2019), in there article, talk about the 3N model of radicalization which identifies need, narrative and network as the three important factors that leads radicalization towards violence. They discuss that the “quest for significance” plays a motivational role in radicalization. The universal desire to be known, to be someone, and to be respected by others becomes priority for people who face failure and humiliation in life. Shmotkin and Litwin (32) suggest that social alienation is a devastating feeling that is strongly associated with loss of personal worth and purpose. The 3N model of radicalization proposes that when significance is lost, individuals become motivated to restore it. They further say that when a person experiences loss of significance he wants to punish those people who are responsible for it. This can be done easily through violence which is generally prohibited but the narrative ideological framework provides moral justifications for its use against the oppressors. Once people adhere to the ideological narrative that morally justifies the use of violence to restore significance, people are likely to be motivated to seek the presence of others that share similar beliefs. People's beliefs are likely to influence the type of group they join because of the universal motivation to attain mutual understanding and a shared sense of reality. This group of like-minded people who support violence as morally justified act forms a network.

 Thompson (2011) highlights the role of social media in radicalizing youth. According to him individual’s use of social media tools has become very popular and is considered a prime factor in radicalizing young minds. As In today’s modern age internet, mobile computing devices etc. are very accessible so it (social media) is used by individuals as a perfect platform to promote radical voice.


 Research Methodology 


Textual analysis is used as a research method for data analysis. Textual analysis is not merely the interpretation of a given text, but it also focuses on the meaning of the given text and its social and political background as well.  Text reading is a process of generating meanings from the given text. In this process, a silent conversation takes place between the reader and the text. Catherine Belsey argues, every text has certain limitations. A textual analyst focuses on a certain perspective of a given text and draws multiple layers of meaning … textual analysis can be done at a certain moment from history in a specific culture, but the textual analyst cannot embrace all the possible meanings, yet it can be new. There is always something new for him/her in the text (Belsey, 2013).

A researcher focuses on the content of the given text and analyses the author’s approach to the main idea from reader’s perspective. It is the interpretation of a given text to understand how the people of a specific culture respond to the world around them. Textual analysis is a tool of gathering information about people’s interpretation of the world around. Researchers use it as a methodology to discover how people of various culture and subculture make sense of the life (McKee, 2003).

The main purpose of the textual analysis is to interpret the structure, content, and function of the given text. It is an approach to analyse how the text is affected by the social norms, and how the text affects the readers. It is a search for reality. As McKee argues, a text can never be an accurate representation of reality, because a text can be analysed from various perspectives, and every textual analysis of a given text brings forth a new text by decomposing the old one (McKee, 2003).Textual analysis is a process of finding the author (his/her psyche, history, society, beliefs etc.) “beneath the work”, and once this discovery is made the text is believed to be explained (Barthes, 1977).

Textual analysis is an important fragment of discourse analysis, but it is not only linguistic analysis, rather it comprises “discursive analysis” which means seeing and analysing text in terms of the various genres, styles, and discourse that articulate together (Fairclough, 2004). Catherine Belsey views textual analysis as a method of finding reality. As there is nothing like pure, because extra-text, the preceded one, is needed for the new description of reality. A text has multiple meanings and the reader is just a source of producing new meanings of the existing text. It is a reader’s job to use critical vocabulary for generating meanings where a text may not appear as a controlling device of the reader’s mind, rather it may appear as a companion of the reader to invite new interpretations by viewing it from somewhere else. Every text has a historical and cultural background. This background supports the reader to generate a critical view of the text from its historical perspective. While reading a text, a reader addresses the question which is posed by the text. To answer such questions a reader can make multiple interpretations as there is no end of textual analysis, because the same text may be interpreted in different way in future by another reader (Belsey, 2013).



 References


Barthes, R. (1977). The Death of the Author. In S. Heath, Image Music Text (pp. 142-148). London: Fontana Press.

Belsey, C. (2013). Textual analysis as a research method. In G. Griffin, Research Methods for English Studies (2nd ed., pp. 168-169). Edinburgh University Press. Retrieved August 20, 2017.

McKee, A. (2003). Textual analysis: A beginner's guide. Sage. Retrieved from https://www.researchgate.net/publication/27470712_Textual_Analysis_A_Beginner's_Guide.

E. Brown Katherine, Saeed. (2014), Radicalization and Counter Radicalization at British Universities : Muslim encounter and lternatives

Borum Randy (2011) Radicalization into violent Extremism: A review of Social Science Theory .

Trip Simona.(2019) Psychological Mechanisms involved in Radicalization and Extremism.

RADICALIZATION IN MULTIPOLAR WORLD:A STUDY OF THE RUNAWAYS ( 1st part )


            TOPIC 


      " Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways "

M.PHIL IN ENGLISH (Literature)   

 RADICALIZATION IN MULTIPOLAR WORLD:A STUDY OF THE RUNAWAYS 

Synopsis submitted to Abdul Wali Khan University Mardan in partial 

Fulfillment of the requirements for the degree of

M.PHIL IN ENGLISH (Literature)   

Supervisor: .....................

M.PHIL IN ENGLISH (Literature)

M.PHIL IN ENGLISH (Literature)   



DOWNLOAD complete Article in word form


DEPARTMENT OF ENGLISH

ABDUL WALI KHAN UNIVERSITY MARDAN

SESSION (2018 – 20)

Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways

Introduction

Fatima Bhutto’s (2018) The Runaways is a latest novel that narrates various dimensions of radicalization in multipolar world. There are manifold circumstances and facts that cause radicalization. Some people are easily radicalized; they just need little struggle to be radicalized. The novel under study narrates a journey of how major characters are radicalized, and how the radicals are, then, de-radicalized. This novel is unique in many ways as it addresses the unexplored factors of radicalization. Many researchers have linked religious fundamentalism and extremism with radicalization, but the novel under study depicts cognitive, personal, social, economic and political aspects of radicalization. This study is qualitative, and within the qualitative paradigm it applies textual analysis as a research method for analysis of the selected data. Textual analysis is widely practiced in literary studies. It puts a text at the centre of analysis, and addresses the textual and literary features of the text, thus leading to thematic analysis as a whole.

Fatima Bhutto is a Pakistani writer who was born in 1982 in Kabul. She is the niece of Benazir Bhutto and the daughter of Murtaza Bhutto. She has written several works, most recently Songs of Blood and Sword, The Shadow of the Crescent Moon, Democracy and latest powerful novel The Runaways.

Fatima Bhutto’s novel The Runaways is about the story of three young people who belong to different social backgrounds. These three protagonists are Sunny, Monty and Anita Rose-the three runaways. The book begins in Karachi where Anita and Monty are living two contrasting lives. Monty and Anita Rose both live in Pakistan and belong to completely different family backgrounds. Anita Rose is a poor girl whose mother is a malishwali and lives with her family in the city’s largest slump, Machar Colony. The writer has portrayed the character of Anita Rose as a brave girl who

 is passionate about her dreams. She grows up looking to the lifestyles of the rich families in Clifton and wants to be accepted by them but she finds herself invisible in the grand homes her mother works at. On the other hand the life of Monty is the other extreme of Karachi. He is the son of Scion and lives a luxurious life. He attends the American school and spends his holidays in London. The novel’s third character is the most complex character whose name is Sunny. Sunny is the first generation British born to Indian migrant parents. While growing in Portsmouth he has so many complexities about his own sexualities, his father’s approval and his identity. His father Suleman Jameel wants him to achieve every possible luxury in life. “All his life”, Bhutto writes “Sunny never felt he belonged in Portsmouth.” He is so depressed about his lost significance but when Oz appears in his life he begins to see meaning in life. 

Radicalization in modern literature has been a very prominent and recurring theme and much has been written about it by writers, critics, psychologists and academicians alike. Fatima Bhutto’s The Runaways discusses the theme of radicalization in a very beautiful manner. Through the lives of her characters Fatima Bhutto highlights the factors behind young people that drive them to join terrorist organizations.  She addresses such questions which people mostly avoid in today’s world. According to her, this book is filled with secrets mostly about radicalism, identity issues, social media and about the survival of young people in this world on fire.

Radicalization as discussed earlier is “What goes on before the bomb goes off” (Neumann). " Radicalization " is a process by which people develop extremist ideologies and beliefs (Borum, 2011). It means a pathway towards terrorism which gradually slides into extremism, fundamentalism or generally towards justifying violence. By discussing the theme of radicalization the author wants to point out the excruciating pain that an extremist goes through when he has to leave all his loved ones and choose loneliness. She further says that loneliness plays a major role in making the mind set for radicalism and it is very easy to beguile youth from the right path when they are deeply affected by the injustices of the society and people around. At last she argues that when youth are not offered by his country with clear vision they will adopt any vision that is offered to them.

M.PHIL IN ENGLISH (Literature)

M.PHIL IN ENGLISH (Literature)   



M.PHIL IN ENGLISH (Literature)

M.PHIL IN ENGLISH (Literature)   



M.PHIL IN ENGLISH (Literature)

M.PHIL IN ENGLISH (Literature)   



M.PHIL IN ENGLISH (Literature)

M.PHIL IN ENGLISH (Literature)   



M.PHIL IN ENGLISH (Literature)

M.PHIL IN ENGLISH (Literature)   



Factors and Perils of Radicalization in Multipolar World: A Study of The Runaways

M.PHIL IN ENGLISH (Literature)   


Leveraging IT for business advantage research analysis

 


Leveraging IT for business Advantage

Click here

Research on Leveraging IT for business advantage
Research on Leveraging IT for business Advantage


Leveraging IT 

for 

Business Advantage

(A Draft)

 Table of Contents


Introduction 3

Literature review 6

Discussion 7

Research methodology 16

Conclusion 16

References 18


DOWNLOAD

Complete Article in word format

Introduction


Cloud computing is a term used to explain the usage of hardware and software program added thru network (commonly the Internet). Simply, cloud computing is computing primarily based totally at the internet. In the past, human beings could run programs or packages from software program downloaded on a bodily laptop or server of their building (Metheny, 2013). Cloud computing lets in human beings get right of entry to the equal styles of programs via the internet. Cloud computing is primarily based totally on the basis that the principal computing takes area on a machine, frequently far flung, that isn't the only presently being used (Singh, 2016). Data amassed at some point of this system is saved and processed with the aid of cloud servers. Users can securely get right of entry to cloud offerings the use of credentials acquired from the cloud computing provider (Sarojni, 2016).


Cloud security refers to a range of policies and technologies based on control, built to comply with regulatory compliance rules and protect data applications, infrastructure and information related to the use of cloud computing (Sarojni, 2016). Because the nature of the cloud as a shared store, privacy, access control, and identity management are special concern (Metheny, 2013). With many companies using cloud computing and related cloud providers for data operations, proper security in these operations, and several other capabilities.

Sensitive areas have become a priority for companies contracting with cloud providers Information Technology (Sarojni, 2016). Cloud security processes must address security controls, Cloud providers will integrate to maintain customer privacy, comply with related regulations and data security (Metheny, 2013). As such, this article aims to discuss some key issues data security threats, which cloud providers should consider mitigating to improve customer data security.

Cloud computing is now a global concept used by the majority of Internet users. The number of organizations, businesses, and other individual users that rely on cloud-provided resources and also store important information in the cloud has greatly increased over the years due to the simple features and attractiveness that he possesses (Singh, 2016). 

Despite its use, also has some obstacles when it comes to protecting data stored in the cloud. There is currently a major concern raised by cloud users regarding the security of their data transmitted in the cloud (Sarojni, 2016). Highly motivated and skilled hackers are now trying their best to intercept or steal large amounts of data, including important information that has been transmitted or stored in the cloud. Based on hacking motive, various scholars have also come up with many techniques to protect data security during transmission (Metheny, 2013).

Data protection has always been an important issue in statistical technology. In cloud environment, this becomes critical because the statistics are in a single place the same places around the world. Although many cloud computing techniques has been studied by every teacher and industry, the protection of statistics and confidentiality are become more important for the future development of cloud computing technology in authorities, companies and commercial enterprises (Singh, 2016). Information security and privacy Issues related to both hardware and software programming in cloud architecture. Information Security and privacy are the two most important factors that consumers care about cloud technology (Sarojni, 2016). 

Research on Leveraging IT for business advantage
Research on Leveraging IT for business Advantages


Cloud computing has emerged as a modern technology that has evolved over the past few years and is seen as the next big thing, years from now. Since it is new, it therefore requires new security issues and has to be faced with challenge too. In recent years, it has grown from a simple concept to become an important part of the computer industry.  Cloud computing is widely accepted as virtualization, SOA, and utility computing are adopted (Sarojni, 2016). There are also architectural security issues evolve with different architectural designs operating on Cloud computing. 

Distributed computing innovation is perhaps the most encouraging figuring advancements for both cloud suppliers and cloud purchaser (Metheny, 2013). Yet, to best use distributed computing there is a developing need to obstruct the current security openings. Without a doubt the presence of information insurance sanctions and data regulations will assist with expanding the cloud security, as it will be an absolute requirement to cloud suppliers to satisfy this large number of regulations in their security practices and strategies; but it's anything but an unquestionable necessity to have these regulations to have information security in the cloud as the absence of information security will restrict clients of going into the cloud, so regardless of whether there are no data assurance regulations the cloud suppliers actually need to areas of strength for apply security approaches (Singh, 2016).

The sending model influences the degree of safety dangers confronting the cloud clients, as the organization goes from private to public model the security openings increment, these openings incorporate the ordinary hacking dangers, the web and internet browser openings, and the dangers coming about because of dividing stockpiles between multi-occupants (Sarojni, 2016). As the client goes up in the distributed computing level up to the product as an assistance level, the likelihood of being hacked is more noteworthy, each layer adds new security openings and expected chances, serious areas of strength for and strategies ought to be applied by an accomplished security organization group of the cloud supplier.

Cloud data security is a major concern and various methodologies have been proposed, while protecting data security testing in cloud computing, raising the issue of rights private. Problems with data storage, so no important information can be intercepted because of a recent case with Wikileaks, on data security. Cloud computing works in layers because applying policies on top of these layers provides a better security approach to manage security issues (Metheny, 2013). Cloud computing has brought a new horizon for data storage and deployment service. The most important thing about cloud computing is that it gives customers a new way to increase capacity and add functionality to their machines on the go.  Before getting started with cloud computing, it is important to understand three concepts: 


Cluster computers 

Grid calculation 

Utility calculator 


In Cluster Computing, a cluster represents a group of interconnected local computers that work together towards sole purpose. Instead, grid computing connects large numbers of geographically distributed individual computers which build a massive super infrastructure (Singh, 2016). Utility computing works on a pay-as-you-go model, meaning you pay for what you are accessed and used from a pool of shared resources, e.g., storage systems, software, and servers such as utilities E.g., water, electricity, gas, etc.  This document is intended to provide guidance to help manage the benefits and types of cloud computing.  The process we follow to complete the development of cloud computing is described, followed by the cloud benefits of computing, cloud computing model, types of clouds, security problems and challenges in cloud computing and cloud computing research from our research (Singh, 2016).


Research on Leveraging IT for business advantage
Research on Leveraging IT for business advantage






Literature review


According to Goyal (2019), data security has become a significant threat to the cloud computing environment. While there are significant privacy and security techniques that can mitigate these threats, there are no good techniques to actively eliminate them. On the other hand, cook et al. (2018) determined that the inclusion of a substantial degree of data encryption, access control, strong authentication, data segregation models, and avoidance of high-value data storage could essentially be accomplished. present to remove additional threats. However, recent cases of sophisticated data leaks show that despite efforts to resolve the leaks, incidents of network vulnerabilities on cloud servers have increased in the United States. greater degree.


 Jan de Muijnck Hughes proposed a security technique called Predicate Based Encryption (PBE) in 2011. The PBE represents the A symmetric encryption family and comes from the 

Identity Based Encryption. This technique integrates access control based on attribute (ABAC) with asymmetric encryption, thereby allowing an encryption/multi-decryption environment to be implemented using a single schema. This predicate-based encryption centralizes implementation on both Platform as a Service and Software as a Service. This proposed technique also prevents unwanted exposure, leaks, Unsolicited leaks and other unexpected breaches of privacy of data residing in the cloud.


In 2013, Miao Zhou described 5 techniques to ensure data integrity and security in cloud computing. These techniques include; Innovative tree-based key management scheme, Cloud privacy-enhancing data outsourcing, Cloud privacy-protected access control, Privacy-enhancing keywords for cloud search and Public remote verification of the integrity of private data. 

This article has applied the keyword search mechanism to enable effective multi-user keyword search and hide personal information in search queries. An encryption scheme for a two-tier system was presented to achieve flexible and granular access control in the cloud. The test results show that the proposed scheme is effective, especially when the data file size is large or the integrity checks are frequent.

In 2014, Aastha Mishra launched an advanced secret shared key management system. The goal of this article is to provide a more reliable decentralized lightweight key management technique for cloud systems to provide more efficient key management and data security in cloud systems. The security and privacy of user data is maintained in the proposed technique by recreating key shares between multiple clouds through the use of secret sharing and the use of shared methods. share know-how to verify the integrity of shares. 

 In this article, the technique used also provides better security against byzantine errors, server collusion, and data manipulation attacks.


The security and availability of cloud services mainly depends on the APIs related to data access and data encryption in the clouds. Additional research may be done to ensure the security of these APIs and network interfaces (Singh, 2016). New security proposals could address the challenges of protecting services from targeted and accidental attacks and terms of service violations. In addition, layered APIs are more complex when third-party operators use cloud services. Beneficiary owners cannot access the Service. Additionally, malicious insiders are a common threat to cloud services because they violate the terms of service and gain access to information, they don't have permission to. Usually, an employee is a malicious insider who steals confidential information of a company or legitimate users of the company. Internal malicious users can corrupt information, especially in peer-to-peer file sharing systems.

Discussion


The benefits of cloud computing consist of such points.

High Speed – Quick Deployment

Automatic Software Updates and Integration

Efficiency and Cost Reduction

Data Security

Scalability

Collaboration

Unlimited Storage Capacity

Back-up and Restore Data

Disaster Recovery

Mobility

Data Loss Prevention

Control 

Competitive Edge


Research on Leveraging IT for business advantage
Research on Leveraging IT for business advantage

While there are many benefits to adopting cloud computing, there are also significant barriers to adoption (Singh, 2016). One of the biggest barriers to adoption is security, followed by compliance, privacy, and legal issues. Since cloud computing represents a relatively new computing paradigm, there is great uncertainty about how to achieve security at all levels (e.g., network, server, application, and data). and how application security is moving to the cloud. This uncertainty has led CIOs to repeatedly state that security is their top concern with cloud computing (Sarojni, 2016). 


Security issues relate to areas of risk such as external data storage, dependence on the "public" internet, lack of control, multi-tenancy, and integration with internal security (Metheny, 2013). Compared with traditional technologies, the cloud has many peculiarities, such as its large scale and the fact that the resources owned by the cloud providers are completely distributed, heterogeneous, and completely distributed. Virtualization. Traditional security mechanisms such as identity, authentication, and authorization are no longer sufficient for clouds in their current form (Singh, 2016). Security controls in the cloud are, for the most part, the same as security controls in any computing environment. However, because of the cloud service models used, the operating models, and the technology used to enable cloud services, cloud computing can present different risks to the organization. compared to traditional IT solutions. Unfortunately, building security into these solutions is often seen as making them more rigid.


Migrating mission-critical applications and sensitive data to public cloud environments is a major concern for companies beyond the network of data centers under their control. To alleviate these concerns, cloud solutions providers must ensure that customers continue to have the same security and privacy controls over their applications and services, providing evidence to clients that their organization is secure and that they can meet their service level agreements and that they can demonstrate compliance to the auditors (Sarojni, 2016). 


A classification of security issues for Cloud Computing based on the so-called SPI model (SaaS, PaaS and IaaS), identifying the main vulnerabilities of this type of system and the relationships The most important threats are found in the documents related to the Cloud Computing and its environment. A threat is a potential attack that could lead to the misuse of information or resources, and the term vulnerability refers to vulnerabilities in a system that allow a successful attack (Singh, 2016). Some surveys focus on a service model or focus on listing general cloud security issues without distinguishing between vulnerabilities and threats. Here, we present a list of vulnerabilities and threats, and we also show which models of cloud services may be affected (Metheny, 2013). In addition, we describe the relationship between these vulnerabilities and threats; how these vulnerabilities can be exploited to perform an attack and put in place some countermeasures regarding these threats in an attempt to solve or improve the identified problems. 



Cloud Computing Platforms


Cloud Computing has many web services platforms like

Amazon Web Services

Google Cloud

Metapod

Microsoft Azure

Cisco          

etc.

Two of them are explained below:

Introduction

AWS stands for Amazon Web Services. It is a subsidiary of Amazon. Companies, individuals and governments uses it as a platform and API for cloud computing. This web services of cloud computing includes “abstract technical infrastructure and distributed computing tools and blocks” (aws, 2022). The Amazon Web Services are used all over the globe through server farms. The subscribers pay fees according to their usage, hardware, software, operating system and other features and services. AWS has been very beneficial for conducting businesses and small enterprises. The most preferred option for all new and existing companies is Amazon Web Services. 

While Google Cloud platform was established on October 6, 2011, and it turned out to be the best and successful cloud computing service. Google Cloud platform is a medium by which people can easily access a cloud systems and other computing services. Google Cloud platform provides services like Networking, computing, storage, big data, machine learning and management services. Cloud Computing platform consist of several physical assets such as computers, hard disks, and virtual resources. Benefits of Google Cloud Platform includes Better Pricing and Deals, Increased Service and Performances, users can work from anywhere, it provides better and efficient updates, versatile Security Methods.


Models and Services:

AWS:

Amazon Web Services includes over 200 services. It includes application services, analytics, machine learning, networking, developer tools, storage, database, mobile, management, tools for internet, computing, and RobOps (aws, 2020). The most important models of Amazon Web Services include Amazon connect, AWS Lambda, Simple Storage Service and Amazon Elastic Compute Cloud (aws, 2020). Amazon Elastic Compute Cloud provides a virtual cluster of computers that is available all the time on internet. Most of the services are not used by the users directly. They are given functionalities. They are offered through API for developers so that it can be used in applications. 

Google Cloud:

Google Cloud Platform has various models according to which it provides services. The three best models per NIST are:

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS), and

Software as a Service (SaaS)

The above three models provide the following services:

Infrastructure as a Service (IaaS)

Applications (Manage by Customer)

Data (Manage by Customer)

Run time (Manage by Customer) 

Middle ware (Manage by Customer)

O/S (Manage by Customer)

Virtualization (Manage by Provider)

Networking (Manage by Provider)

Storage (Manage by Provider)

Server (Manage by Provider)


Platform as a Service (PaaS)


Applications (Manage by Customer)

Data (Manage by Customer)

Run time (Manage by Provider)

Middle ware (Manage by Provider)

O/S (Manage by Provider)

Virtualization (Manage by Provider)

Networking (Manage by Provider)

Storage (Manage by Provider)

Server (Manage by Provider)


Software as a Service (SaaS)


Applications (Manage by Provider)

Data (Manage by Provider)

Run time (Manage by Provider)       

Middle ware (Manage by Provider)

O/S (Manage by Provider)         

Virtualization (Manage by Provider)

Networking (Manage by Provider)

Storage (Manage by Provider)

Server (Manage by Provider)


Resource Virtualization:

AWS:

Amazon Elastic Compute Cloud (EC2) instances are central main part of Amazon Web Services. Basically, it is main part of the platform of cloud computing. It depends on the type of instance that what will be the hardware of the host computer that is being used (aws, 2020). Amazon Web Services uses two distinct types of virtualizations that basically supports Amazon Elastic Compute Cloud instances. These virtualizations are as follows:

PV

It stands for Para Virtualization. Para Virtualization supports only Linux. It shows much better performance than another virtualization as hypervisor can be communicated by guest kernel.

HVM

It stands for Hardware assisted Virtual Machines. It is also known as full virtualization. 

 Google Cloud:

Google Cloud Platform supports guests imaging running Linux and Microsoft Windows and uses KVM as the hypervisor which uses launch virtual machines based on 64-bit x86 architecture. 


Scaling and capacity planning:

AWS:

Costs can be saved by only paying for what one needs. It can be done by capacity planning in which data is collected, analyzed and advanced analysis is performed (aws, 2020). Similarly, scaling plans provides scaling policies. It creates a plan for utilization of resources. Our own strategies can be created in it. Strategies can be separated for different types of resources. Scaling strategies and capacity planning is very useful as it can save cost and utilization of resources. 

Google cloud:

Many strategies have been adapted by google cloud as well so that their users can save cost and resources.


Load Balancing:

AWS:

A load balancer is use to “accept incoming traffic from clients and routes requests to its registered targets” (aws, 2020). It has a lot of benefits. It can divide work load among different resources. One of its advantages is that we can add and delete compute resources through lord balancing in amazon web services according to the need of users. It will not have any impact on the overall working of application. Different interfaces on amazon web services are used to create, analyze and manage your lord balancers. These interfaces include AWS Management Console, AWS SDKs, AWS Command Line Interface (AWS CLI), and Query API etc (aws, 2022). 

Google Cloud:

Load balancers are controlled offerings on GCP that distribute visitors throughout more than one times of your application. GCP bears the load of handling operational overhead and decreases the danger of getting a non-functional, slow, or overburdened application.

Load Balancing in Google Cloud Platform has 3 categories

Global External HTTP (S) load balancer

Regional External HTTP (S) load balancer

Internal HTTP (S) load balancer


Security:

AWS:

Amazon Web Services claimed to be the securest platform for cloud computing. This platform gives its users an environment where they can run their businesses and companies with full securities. Amazon Web Services data centers and networks are built in such a way that they secure the information related to their users such as their identities, devices and applications. Users do not need to worry about their privacy and security. It gives them the chance to focus on their business. It help them to grow and bring innovation in their businesses (aws, 2022). 

Google Cloud:

The Google protection version is constructed from extra than 15 years of revel in targeted on maintaining clients secure on Google products. Google Cloud Platform lets in your packages and statistics to function at the equal relied on protection version that Google constructed for its very own network.

Database Technology (open source and licensed):

AWS:

Amazon Web Services is a platform for cloud computing that supports open source and licensed software. The users and customers can create and run open-source software on amazon web services. Amazon Web Services claims that Open-source software is beneficial for everyone. Hence, they are supporting it. Some of the Amazon Web Services open-source projects include Babel fish for PostgreSQL, EKS distro, Bottle rocket, Open Source, Firecracker, FreeRTOs, AWS Cloud, Development Kit etc. (aws, 2021). There are two licensed models. These are “License included” and “Bring-Your-Open-License” (byol). It is very beneficial as it is fully managed, available, fast, easy to migrate, license flexibility and reliable etc. (aws, 2020). 

Google Cloud:

Database which a google cloud platform uses are:

Cloud SQL

Cloud Spanner

Bare Metal Solution for Oracle

Big Query 

Cloud Big Table

Fire Store

Fire Base real time data base

Memory Store

Mongo DB Atlas

Google Cloud Partner Services


Privacy Compliance:

AWS:

Amazon Web Services do not compromise with the privacy of their customers and users. The one of the major pros of using Amazon Web Services is that it provides good privacy. It has earned trust of its users. Amazon Web Services is transparent in its privacy commitments. The user’s control, create and manage their data by themselves. The customer commitments of AWS are transparent, and they have raised their standards of data privacy. Users can understand the contracts provided by AWS on data privacy easily as the language used is very simple. 

Google Cloud:

Google cloud privacy encourages users to use this platform. 


Content Delivery:

AWS:

The content delivery network is an important part of Amazon Web Services. It improves the content of delivery by duplicating common content. It reduces the burden on the origin of application. It helps increase good performance and scaling as well. It creates and mange connections of requesters and keep them secured. Customers now usually use content delivery networks for interactivity and content delivery. One of the content delivery networks include Amazon CloudFront that provides secured and reliable application delivery. 

Google Cloud:

Cloud content delivery network (CDN) shops content material regionally at sure edges and works with the HTTP(s) load balancing carrier to supply this content material to users. It is crucial to keep in mind that now no longer all information could be saved at the CDN.

Cloud Management:


AWS:

It helps the users of AWS to enhance their cloud strategy. It gives solutions by managing operations and governance. AWS cloud management tools categories include cloud governance and resource and cost optimization (aws, 2020). 

Google Cloud:

Here are the following tools to manage the google cloud platform:

Cloud Endpoints

Cloud Console Mobile App

Cost Management

Intelligent Management

Carbon Footprint

Google Cloud Market Place

Google Cloud Console

Service catalog

Cloud Shell

Cloud APIs

Config Connector

Terraform on Google Cloud


Price/ cost comparison of key services:

AWS:

Many customers find Amazon Web Services prices a bit high for personal use but for the long term after calculating maintenance, electricity etc, it is not that high. 

Google Cloud:

While google cloud costs less than AWS. It includes role based support and premium support.




Research methodology


In this study, emphasis will be placed on secondary quantitative analysis in the analyze the relevant dataset, namely “Cybersecurity Breach” extracted from Kaggle with rows of data related to legal entity name, state, company, location, summary and year off. This dataset includes 1055 valid data, which is very helpful in identify critical aspects of network security vulnerabilities (Kaggle.com 2022). Analysis will perform with the help of SPSS to understand the confidence, validity and percentage of the data breach.



Conclusion


Cloud computing is a relatively new concept that has many advantages for users; however, it also has some security issues that can slow down its use. Understanding what gaps exist in cloud computing will help organizations make the transition to the cloud. As Cloud Computing leverages many technologies, it also inherits its security issues. Traditional web applications, data storage, and virtualization have come under scrutiny, but some of the proposed solutions are incomplete or non-existent. We've covered the security issues for cloud models: IaaS, PaaS, and IaaS, which vary by model. As described in this article, storage, virtualization, and networking are the key security concerns of cloud computing. Virtualization allowing multiple users to share a single physical server is one of the major concerns of cloud users. Also, another challenge is that there are many different types of virtualization technologies, and each can address security mechanisms in different ways. Virtual networks are also the target of certain attacks, especially when communicating with remote virtual machines.


In short, cloud computing shows significant potential in delivering easy-to-manage, cost-effective, powerful, and flexible resources over the Internet. These characteristics encourage individual users or organizations to migrate their services and applications to the cloud. However, services offered by third-party cloud providers present an additional security risk, poses a huge data security risk to user privacy. Therefore, organizations and Cloud service providers should take measures to avoid such threats. Cloud computing has a lot future. It is scalable and saves companies a lot of money on infrastructure aside. Therefore, it has become a lucrative option for businesses. This leads to a lot companies allocate multiple budgets for the transition to the cloud. Despite all the security issues, companies are still in the process of deploying their applications in the cloud. References

Metheny, M. (2013). The FedRAMP Cloud Computing Security Requirements. Federal Cloud Computing, 8(12), 241-327. doi:10.1016/b978-1-59-749737-4.00009-5 https://www.sciencedirect.com/book/9781597497374/federal-cloud-computing

Metheny, M. (2017). Security and privacy in public cloud computing. Federal Cloud Computing, 7(8), 79-115. doi:10.1016/b978-0-12-809710-6.00004-4. https://www.sciencedirect.com/book/9780128097106/federal-cloud-computing?utm_content=infosec_PR&utm_medium=pressrls&utm_source=publicity

Singh, B., & K.S., J. (2016). Security Management in Mobile Cloud Computing. IEEE Xplore. https://ieeexplore.ieee.org/abstract/document/7566315

Sudhansu R. L. et.al Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm, International Journal of Computer Science Trends and Technology (IJCST) – Volume 2, Issue 3, June 2014 https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.677.7852&rep=rep1&type=pdf

Aastha Mishra (2014) Data Security in Cloud Computing Based on Advanced Secret Sharing Key Management System, 20 Jan, 2019 [Online]. https://www.ethesis.nitrkl.ac.in/5845/1/212CS2110.pdf

Nesrine Kaaniche (2014) Cloud Data Security based on Cryptographic Mechanisms, 26 Jan, 2019 [Online]. https://www.tel.archives-ouvertes.fr/tel-01146029/document

Afnan U.K. (2014) Data Confidentiality and Risk Management in Cloud Computing 2 Feb, 2019 [Online]. https://www.ethesis.whiterose.ac.uk/13677/1/Thesis_Final_Afnan _27072016_ EngD.pdf

Sarojini G. et.al (2016) Trusted and Reputed Services using Enhanced Mutual Trusted and Reputed Access Control Algorithm in Cloud, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016). https://www.researchgate.net/publication/306068888_Trusted_and_Reputed_Services_Using_Enhanced_Mutual_Trusted_and_Reputed_Access_Control_Algorithm_in_Cloud


Bandaru, A. (2010), Amazon Web Services, Research Methods and Professional issues, https://www.researchgate.net/publication/347442916_AMAZON_WEB_SERVICES

ScienceDirect. (2016), Amazon Web Services, https://www.sciencedirect.com/topics/engineering/amazon-web-services

Mirghani, S. (2017), Comparison between Amazon S3 and Google Cloud Drive, https://dl.acm.org/doi/abs/10.1145/3158233.3159371

Aws, AWS Management Tools Competency Categories, https://aws.amazon.com/products/management-tools/partner-solutions/?partner-solutions-cards.sort-by=item.additionalFields.partnerNameLower&partner-solutions-cards.sort-order=asc&awsf.partner-solutions-filter-partner-type=*all&awsf.Filter%20Name%3A%20partner-solutions-filter-partner-use-case=*all&awsf.partner-solutions-filter-partner-location=*all

AWS, A Content delivery network, https://aws.amazon.com/caching/cdn/

Amazon Web Services, https://aws.amazon.com/compliance/data-privacy/

Amazon Web Services, open source at aws, https://aws.amazon.com/opensource/?blog-posts-content-open-source.sort-by=item.additionalFields.createdDate&blog-posts-content-open-source.sort-order=desc

Amazon Web Services, https://aws.amazon.com/rds/oracle/

Amazon Web Services, aws clod security, https://aws.amazon.com/security/

Amazon Web Services, elastic load balancing, https://docs.aws.amazon.com/elasticloadbalancing/latest/userguide/what-is-load-balancing.html

Hohenbrink. G. (2020). GCP 101: An Introduction to Google Cloud Platform. Onix.

https://www.onixnet.com/insights/gcp-101-an-introduction-to-google-cloud-platform#:~:text=Google%20Cloud%20Platform%20(GCP)%20operates,housed%20near%20your%20physical%20location.

Keshari, K. (2021). What is Google Cloud Platform (GCP)? – Introduction to GCP Services & GCP Account. Edureka. https://www.edureka.co/blog/what-is-google-cloud-platform/

Saran, G. Introduction To Google Cloud Platform. WhizLab. https://www.whizlabs.com/blog/google-cloud-platform/

Admin Globaldots (2018). 3 Key Cloud Computing Benefits for Your Business. Globaldots. https://www.globaldots.com/resources/blog/cloud-computing-benefits-7-key-advantages-for-your-business/Google Cloud management tools. Google Cloud. https://cloud.google.com/products/management

Google Cloud Platform – Google Cloud CDN. Devopspoints. https://devopspoints.com/google-cloud-platform-google-cloud-cdn.html

We are IOD (2020). Load Balancing on Google Cloud Platform (GCP): Why and How. Level Up. https://levelup.gitconnected.com/load-balancing-on-google-cloud-platform-gcp-why-and-how-a8841d9b70c

Google Cloud Databases. Google Cloud. 

Research on Cryptocurrencies

             CRYPTO CURRENCIES

Cryptocurrencies have been making headlines for the past few years, and there is no doubt that they are here to stay.

 Butt what exactly now are cryptocurrencies and how do they work? 

In this article, we will explore the basics of cryptocurrency and attempt to answer some of the most frequently asked questions about this revolutionary technology. 

  What is ' Cryptocurrency " ?

A cryptocurrency is a type of digital currency now that uses cryptography to secure §100$, $1000$ , 10000$  theseits transactions and to control the creation of new units of currency.

Research on Cryptocurrencies
Research on Cryptocurrencies


 Cryptocurrencies are decentralized. This means that unlike traditional fiat currencies (the U.S. Dollar for example) there is no central authority that controls them — no government, no central bank. Rather, cryptocurrencies rely on decentralization and consensus to function properly.

Download Complete Article

How do Crypto-Currencies Work? 

Modeled on Bitcoin’s pioneering technology, all major cryptocurrencies use blockchain to manage their transactions. Blockchain stores data in “blocks” which they then chain together chronologically — hence the name blockchain. 

This data can be anything, but most often it includes a time stamp and details about a financial transaction: the sender’s public key (encryption code), the receiver’s public key, and how many coins were sent (transaction packet).

                                     Each block contains a cryptographic hash of both itself and the previous block — thus crypto-currency algorithms constantly update this publicly visible chain of data with new transactions.

What is a 'Cryptocurrency Exchange' ? 

InTouy (or sell) any cryptocurrency, you must first set up an account with a digital exchange. These exchanges allow you to set up and maintain a digital “wallet” in which to hold your coins. Sources have compared the euphoria around these virtual currencies to the way people were throwing money at dot-com companies during the late 1990s’ tech boom — even though many of those businesses never made a profit, or only did so long after their share prices had collapsed.

Cryptocurrency is a digital or virtual asset now designed to work as a medium of exchange. It uses cryptography and cryptocurrencies " to secure and fast its transactions all over the world and to control the creation of new units of every types " etc .

 Cryptocurrency is a decentralized system, which means it is not subject to government or financial institution control." Bitcoin ", the first and most popular  cryptocurrencyy , was created in 2009.

 Cryptocurrencies are often traded on decentraalized exchanges and can also be used to p purchase goods and services. "Bitcoin", for example, can be usedd to book in all worlds hotels on Expedia, shop for furniture and other things on Overstock, and buy Xxbox games etc. 

However, it was later revealed that the feees were hidden within the exchange’s referral program – meaning Virtue Poker pockets a 5 percent rake from each pot. 

The research and intelligence report on Cryptocurrency, a “blockchain-driven digital payment gateway that carries both cryptocurrency and investment”, enables stakeholders to evaluate the short and long-term tangible benefits of this rapidly evolving technology. 

The findings in this timely report give insights into Blockchain technology about Cryptocurrency but also highlight key areas where innovation is desperately needed. Businesses will have their hassles related to taxation across various jurisdictions greatly reduced as every coin will contain complete transaction history for regulatory compliance so there are minimal discrepancies concerning tax revenue collection as simple internet connectivity will suffice for revenue departments around the world to collect activity records in real-time instead of relying on somewhat untrustworthy paper documentation behind complex crypto accounting software. 

Some economic analysts argue encouraging blockchain adoption would shift national regulations away from those with strong gold standards who prefer fiscal consolidation, particularly among emerging nations (e.g., Turkey), to those willing to adopt a form of monetary policy that includes competitive devaluation but only if both centralized regulation and approval, as well as decentralized revolution, create incentives for crypto adoption by both businesses and consumers.

Simplified Fundraising Efforts in Businesses Combined With Innovative Decentralized Opportunities:

Get paid in dollars, spend it in dimes – In case you’re hoping to profit from digital money without managing the troublesome procedure of mining or purchasing assets from a trade like Coinbase at that point developing a worldwide online business helps your odds of profiting from more than 700 virtual coins. 

For instance, rather than buying cool gear specifically on Amazon and selling it through Shopify online store (e.g., Shoesers which sold Bitcoin-themed children’s shoes), seek different organizations across the planet who provide items/benefits relevant to Amazon eCommerce activities for promoting various local currencies; acquire items via frugal channels; distribute goods via bitcoin, etc. 

Of course, you may have complications getting payments or access to cash after transactions series but they can easily be taken care of if either the central bank (like Australia) considers such activities regular speculative investments or e-commerce platforms invest in the whole gamut of blockchain technologies for managing their processes and deter international fluctuations.

Use personal online resources to manage risks; If you are taking a shot at an independent website, consider using resources like personal VPN and Bitcoin checkout services, to ensure privacy for both you as well as your markets/clients. By chance, if you characteristically manage centralized exchanges that are vulnerable to global events employ similar privacy tools for resource management in parallel structures (e.g., multi-currency wallets) with live bitcoin exchange price ticker data on dashboards, etc. 

As would be obvious above, one influential tip is to try not to assume any single digital asset is completely safe; BTC exchange rate fluctuation indicators can be utilized along with multiple decentralized neural interfaces, cryptocurrency market capitulation markers, etc., mostly available via public and semi-public institutions’ data modules but independently companies may often have unique statistics which they cannot merely disclose due to legal may such relationships imply virtual assets tax consequences.

Research And analysis website
Research And analysis at different topics


Zane's Cycle Research Article

                         Zane’s Cycle


Zane's Cycle Research Analysis
Zane's Cycle Research Analysis

DOWNLOAD COMPLETE ARTICLE

Reliability

Only in quantitative terms can reliability be measured. For measuring reliability, probability and time must be taken into account. The likelihood of a product failing during a specific period, as well as the time span for which it provides the rated performance, determine whether or not it is trustworthy. Buying a new bike can be intimidating, especially when so many people share your feelings and there are so many color options and component groups to choose from. We do everything we can to get you on the bike of your dreams, but you never know if the bike you bought is the proper fit for you until you ride it. Ride the bicycle for 30 days to ensure that you bought the right one. If you are not totally pleased during that time, simply return the bicycle for a refund. We'll happily give you full credit for your new purchase.

Zane's Cycle Research Analysis
Zane's Cycle Research Analysis


Responsiveness 

The ability of a business to recognize and effectively adjust to changes in their industry and in their consumers’, preferences is defined as responsiveness. Companies that can effectively adapt to change are better able to manage disruption and continuously exceed the expectations of their consumers. Every rider who walks through our door should anticipate the best guided, rider-specific shopping experience available in any retail setting. Our expert staff will listen to your demands and assist you to the ideal product. Once your ideal bike has been chosen, we may decorate it to make it even more unique to the rider, followed by a final inspection by one of our Certified Repair Technicians. Once we've put your new Zane's bike into your vehicle, you can travel with confidence, knowing that your new Zane's bike is completely covered by our unparalleled guarantees, which are included with every transaction.

Zane's Cycle Research Analysis
Zane's Cycle Research Analysis


Assurance

In the corporate world, assurance has two connotations. It is a type of insurance that provides a reward in the case of a covered event that occurs in the future. Assurance also refers to the assurance offered by auditing professionals regarding the authenticity and accuracy of documents and information that have been inspected. Zane's Cycles offers an exclusive "Zane's Cycles Lifetime Free Service and Parts Warranty" with every bicycle purchase. We'll make any necessary modifications to your bicycle for free as long as you own it, whether it requires a service, a full tune-up, or just a fast adjustment. At Zane's Cycles, we promise that you will never overspend. We'll gladly refund you the difference plus 10% if you find any item you bought in stock for cheaper in Connecticut within 90 days. Our Price Protection program assures you not only the finest guarantees for your bike purchase, but also the peace of mind that you got the best deal.

Empathy

Empathy is a key component of social interactions in the workplace and the marketplace. It is defined as the ability to comprehend and share customer's feelings, as well as to exhibit that understanding. Zane is always striving to improve, but it's good to have consumers who believe in our mission and are eager to share their positive buying, maintenance, and riding experiences.

Tangibles

Cash, merchandise, vehicles, equipment, buildings, and investments are all examples of these assets. Accounts receivable, pre-paid expenses, patents, and goodwill are all examples of intangible assets that do not have a physical form. Christopher J. Zane founded Zane's Cycles in Branford, Connecticut, in October 1981, when he was 16 years old. Since then, the store has evolved from a small bicycle and hobby shop to the United States' largest P&I (Premiums and Incentives) bicycle distributor. Zane's Inc today supplies the P&I market with over 65 premium household goods, despite multiple allegations. Zane's journey from small shop owner to major distributor has been featured in a number of major business journals as well as academic marketing classes. His bold local techniques were praised by both Inc. and Fortune magazines, which labelled them guerrilla marketing in some circumstances. His strategy of buying competitor's phone numbers after driving them out of business was one example. His focus on developing a bond with customers through modest gestures, such as selling children's helmets at dealer cost and providing lifetime guarantees, was discussed in a Harvard Business Review article. Reinventing the Wheel, the Science of Creating Lifetime Customers, by Christopher Zane was published in 2011 by BenBella. The book is a case study of Zane's Cycle's expansion through constant improvement of customer experience and service. Chris speaks on the subject of exceptional customer service and Customer Lifetime Value at conferences, universities, and corporate gatherings throughout the world (clv).

Close Menu