Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 20 de 166
Filter
1.
Hortic Environ Biotechnol ; : 1-12, 2023 May 22.
Article in English | MEDLINE | ID: covidwho-20230790

ABSTRACT

Ginseng (Panax ginseng) has been used as a valuable medicinal plant in Asia, and the demand for ginseng production for health functional food is increasing worldwide after the COVID-19 crisis. Although a number of cultivars have been developed to increase ginseng production, none of them were widely cultivated in Korea because they could not resist various environmental stresses while being grown in one place for at least 4 years. To address this, Sunhong was developed as a ginseng cultivar with high yield and multiple stress tolerance by pure line selection. Sunhong showed high yield and heat tolerance comparable to Yunpoong, a representative high-yielding cultivar, and exhibited 1.4 times lower prevalence of rusty roots than Yunpoong, suggesting that Sunhong can keep its high yield and quality during long-term cultivation. In addition, distinct color and lodging resistance were expected to increase the convenience of cultivation. To supply pure seeds to farmers, we also established a reliable high-throughput authentication system for Sunhong and seven ginseng cultivars through genotyping-by-sequencing (GBS) analysis. The GBS approach enabled to identify a sufficient number of informative SNPs in ginseng, a heterozygous and polyploid species. These results contribute to the improvement of yield, quality, and homogeneity, and therefore promote the ginseng industry. Supplementary Information: The online version contains supplementary material available at 10.1007/s13580-023-00526-x.

2.
28th International Computer Conference, Computer Society of Iran, CSICC 2023 ; 2023.
Article in English | Scopus | ID: covidwho-2323020

ABSTRACT

The emergence of pandemic diseases like Covid-19 in recent years has made it more important for Internet of Medical Things (IoMT) environments to build contact between patients and doctors in order to control their health state. Patients will be able to send their healthcare data to the cloud server of the medical service provider in remote medical environments through sensors connected to their smart devices, such as watches or smartphones. However, patients' worries surrounding their data privacy protection are still present. In order to ensure the security and privacy of patients' healthcare data in remote medical environments, a number of different schemes have been proposed by researchers. However, these schemes have not been able to take all security requirements into account. Consequently, in this study, we have proposed a secure and effective protocol to safeguard the privacy of patients' medical data when it is sent to the server. This protocol entails two components: mutual authentication of the patient and the server of the medical service provider, as well as the integrity of the exchanged data. Also, our scheme satisfies security requirements and is resistant to well-known attacks. Following this, we used the Scyther tool to formally analyze our proposed scheme. The results showed that the scheme is secure, and in the section on performance analysis, we demonstrated that the proposed scheme performs better than comparable schemes. © 2023 IEEE.

3.
4th International Conference on Communication Systems, Computing and IT Applications, CSCITA 2023 ; : 90-95, 2023.
Article in English | Scopus | ID: covidwho-2322769

ABSTRACT

The COVID-19 pandemic has led to the creation of vaccination passports as a means of verifying an individual's vaccination status for travel and access to certain services. The validity of immunization records and supply chain procedures, however, are significant issues. The supply chain for vaccination passports has been called for to be made more secure and transparent using blockchain technology. To ensure safe and effective supply chain management, this article suggests a blockchain-based authentication mechanism for vaccination passports. The issuer, the prover, and the verifier will be the system's three key actors. The issuer will be in charge of producing inventory tokens and providing immunization certificates. The prover will verify the authenticity of the vaccination supply chain, and the verifier will ensure that the inventory token is legitimate. The proposed system will enhance transparency, security, and efficiency in the supply chain for vaccination passports, thereby improving the trustworthiness of vaccination records and facilitating safe travel during the pandemic. © 2023 IEEE.

4.
Ieee Transactions on Services Computing ; 16(2):1324-1333, 2023.
Article in English | Web of Science | ID: covidwho-2327365

ABSTRACT

Electronic healthcare (e-health) systems have received renewed interest, particularly in the current COVID-19 pandemic (e.g., lockdowns and changes in hospital policies due to the pandemic). However, ensuring security of both data-at-rest and data-in-transit remains challenging to achieve, particularly since data is collected and sent from less insecure devices (e.g., patients' wearable or home devices). While there have been a number of authentication schemes, such as those based on three-factor authentication, to provide authentication and privacy protection, a number of limitations associated with these schemes remain (e.g., (in)security or computationally expensive). In this study, we present a privacy-preserving three-factor authenticated key agreement scheme that is sufficiently lightweight for resource-constrained e-health systems. The proposed scheme enables both mutual authentication and session key negotiation in addition to privacy protection, with minimal computational cost. The security of the proposed scheme is demonstrated in the Real-or-Random model. Experiments using Raspberry Pi show that the proposed scheme achieves reduced computational cost (of up to 89.9% in comparison to three other related schemes).

5.
9th Somaiya International Conference on Technology and Information Management, SICTIM 2023 ; : 96-99, 2023.
Article in English | Scopus | ID: covidwho-2325567

ABSTRACT

Blockchain as a technology if implemented judiciously will prove to be effective and efficient for both private as well public sector enterprises. The use cases in Blockchain provide ample demonstration of improvement in the processes. The paper intends to provide insight into the application of Blockchain in the Indian Judiciary System. Some of the benefits as envisaged by the Blockchain implementation are time-efficient, cost-effective, greater security, and transparency resulting enhancement of trust in the overall working of the legal system. India's global counterparts such as Estonia, China, the UK, Ghana, Ukraine, Canada, and Sweden have already integrated the Blockchain into their legal system. The judicial system in India is under tremendous pressure. According to the data from National Judicial Data Grid, 4.7 Crore cases are pending as on May 2022 at different levels of the judiciary, out of which 1.82 Lac cases have been pending for at least 30 years. For many years courts have been following the traditional working system, but during the Covid-19 pandemic, the courts have adopted the e-justice paradigm via online case hearings and video conferencing. Since, the system has already experienced the use of digital platforms, the experimentation if continued post-pandemic will yield a faster and better result. The technological advancements should complement the traditional working systems for the greater benefit of the entire system. The overall objective of the paper is to explore the application of Blockchain that will help improve the efficiency and transparency in operations in the Indian Judicial system. © 2023 IEEE.

6.
Multimed Tools Appl ; : 1-41, 2023 May 05.
Article in English | MEDLINE | ID: covidwho-2323409

ABSTRACT

Watermarking has been considered to be a potent and persuasive gizmo for its application in healthcare setups that work online, especially in the current COVID-19 scenario. The security and protection of medical image data from various manipulations that take place over the internet is a topic of concern that needs to be addressed. A detailed review of security and privacy protection using watermarking has been presented in this paper. Watermarking of medical images helps in the protection of image content, authentication of Electronic Patient Record (EPR), and integrity verification. At first, we discuss the various prerequisites of medical image watermarking systems, followed by the classification of Medical Image Watermarking Techniques (MIWT) that include state-of-the-art. We have classified MIWT's into four broader classes for providing better understanding of medical image watermarking. The existing schemes have been presented along with their cons so that the reader may be able to grasp the shortcomings of the technique in order to develop novel techniques proving the inevitability of the presented review. Further, various evaluation parameters along with potential challenges pertaining to medical image watermarking systems have been discussed to provide a deep insight into this research area.

7.
1st International Conference on Futuristic Technologies, INCOFT 2022 ; 2022.
Article in English | Scopus | ID: covidwho-2319890

ABSTRACT

Generally, the easiest way to withdraw money from your bank account is by using an Automated Teller Machine (ATM). The user can withdraw the money by inserting their card into the slot on the machine, and then entering a four-digit Personal Identification Number (PIN) to complete the transaction process. Similarly, some banks adopted the method of using a One Time Password (OTP) to complete the transaction process to make it more secure. With the recent advancements in technology, there are many new methods that can be used for withdrawing money from ATMs, like cardless cash withdrawal or using one's biometrics. But, due to the recent COVID-19 pandemic, we refrain from using things that are not sanitized properly. People started avoiding going to the ATMs since hygiene was a major concern during the pandemic. Also, due to the constant hand washing and the use of sanitizers, the use of conventional biometrics was not efficient. As a result, the idea of using a method that is contact-less and is also more secure emerged, i.e., the palm vein technology. The palm vein technology uses a person's vein pattern, which is unique to everyone and can help us achieve better results with greater accuracy. The paper proposes a concept of using a person's vein pattern as a method of contact-less authentication. It is an extremely safe verification procedure because no two people in the world, not even identical twins, can have the same palm vein structure or pattern. Additionally, it is more secure because it is nearly impossible to replicate the palm vein pattern. © 2022 IEEE.

8.
Industrial Crops and Products ; 200, 2023.
Article in English | Scopus | ID: covidwho-2318946

ABSTRACT

Tinospora cordifolia herbal supplements have recently gained prominence due to their promising immunomodulatory and anti-viral effects against SARS-CoV-2. Mislabelling or diluting Tinospora supplements for profit may harm public health. Thus, validating the label claim of these supplements in markets is critical. This study investigated how high resolution mass spectrometry-based metabolomics and chemometrics can be used to distinguish Tinospora cordifolia from two other closely related species (T. crispa and T. sinensis). The Orthogonal Partial Least Square Discriminant Analysis (OPLS-DA) and PLS-DA based chemometric models predicted the species identity of Tinospora with 94.44% accuracy. These classification models were trained using 54 T. cordifolia, 21 T. crispa, and 21 T. sinensis samples. We identified 7 biomarkers, including corydine, malabarolide, ecdysterone, and reticuline, which discriminated Tinospora cordifolia from the two other species. The label claim of 25 commercial Tinospora samples collected from different parts of India was verified based on the relative abundance of the biomarker compounds, of which 20 were found authentic. The relative abundance of biomarkers significantly varied in the 5 suspicious market samples. This pilot study demonstrates a robust metabolomic approach for authenticating Tinospora species, which can further be used in other herbal matrices for product authentication and securing quality. © 2023 Elsevier B.V.

9.
2022 International Conference on Emerging Trends in Engineering and Medical Sciences, ICETEMS 2022 ; : 15-19, 2022.
Article in English | Scopus | ID: covidwho-2315949

ABSTRACT

In the contemporary time of technology, security is the utmost concern for every building automation system. Access Control Systems are the backbone of any security system being employed in any intelligent building, and can be operated in a biometric or non-biometric manner. There are various types of recognition systems available, depending upon the required level of safety and security. The ongoing pandemic has challenged and tested Access Control System in many aspects.This paper aims to review the various forms of access control systems and their viability in the context of COVID-19. It is found that some access control solutions fail to provide the required security during this global epidemic due to their contact-based operations. So, in the midst of the worldwide pandemic, a realistic integrated electronic access control system can be designed to meet the requirements of users. © 2022 IEEE.

10.
Internet Things (Amst) ; 22: 100797, 2023 Jul.
Article in English | MEDLINE | ID: covidwho-2312323

ABSTRACT

Diagnosing the patients remotely, controlling the medical equipment, and monitoring the quarantined patients are some of the necessary and frequent activities in COVID-19. Internet of Medical Things (IoMT) makes this works easy and feasible. Sharing information from patients and sensors associated with the patients to doctors is always an integral part of IoMT. Unauthorized access to such information may invite adversaries to disturb patients financially and mentally; furthermore, leaks in its confidentiality will lead to dangerous health concerns for patients. While ensuring authentication and confidentiality, We must focus on the constraints of IoMT, such as low energy consumption, deficient memory, and the dynamic nature of devices. Numerous protocols have been proposed for authentication in healthcare systems such as IoMT and telemedicine. However, many of these protocols were neither computationally efficient nor provided confidentiality, anonymity, and resistance against several attacks. In the proposed protocol, we have considered the most common scenario of IoMT and tried to overcome the limitations of existing works. Describing the system module and security analysis proves it is a panacea for COVID-19 and future pandemics.

11.
Proceedings of the Acm on Interactive Mobile Wearable and Ubiquitous Technologies-Imwut ; 7(1), 2023.
Article in English | Web of Science | ID: covidwho-2308971

ABSTRACT

The increasingly remote workforce resulting from the global coronavirus pandemic has caused unprecedented cybersecurity concerns to organizations. Considerable evidence has shown that one-pass authentication fails to meet security needs when the workforce work from home. The recent advent of continuous authentication (CA) has shown the potential to solve this predicament. In this paper, we propose NF-Heart, a physiological-based CA system utilizing a ballistocardiogram (BCG). The key insight is that the BCG measures the body's micro-movements produced by the recoil force of the body in reaction to the cardiac ejection of blood, and we can infer cardiac biometrics from BCG signals. To measure BCG, we deploy a lightweight accelerometer on an office chair, turning the common chair into a smart continuous identity "scanner". We design multiple stages of signal processing to decompose and transform the distorted BCG signals so that the effects of motion artifacts and dynamic variations are eliminated. User-specific fiducial features are then extracted from the processed BCG signals for authentication. We conduct comprehensive experiments on 105 subjects in terms of verification accuracy, security, robustness, and long-term availability. The results demonstrate that NF-Heart achieves a mean balanced accuracy of 96.45% and a median equal error rate of 3.83% for CA. The proposed signal processing pipeline is effective in addressing various practical disturbances.

12.
3rd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2023 ; : 398-403, 2023.
Article in English | Scopus | ID: covidwho-2300705

ABSTRACT

In the recent trends, block chain technology plays a vital role due to its secured methodology. Since many parts of the world severely affected by COVID pandemic situation, people used to perform more of digital transactions day by day. To provide more security for all online transactions, Block chain Technology is one of the solutions that many countries have started to utilize. Every block in a block chain should be validated and verified by the secured hash algorithms and digital signatures. Since Hacking is difficult in Block Chain Technology, due to its secure hash process, many people started using it for various applications. This article discusses about the working of Digital Signatures especially about Elliptic Curve Digital Signature Algorithm - ECDSA. Digital signatures are signatures done digitally for the purpose of security. ECDSA works on the mechanism of Elliptic Curve and Cryptography algorithms of Elliptic curve. The proposed research work has selected the private key as a random point, which is of type integer ranging between 1 and n-1 in Elliptic curve to sign documents. Then Public key is calculated by multiplying a point from elliptic curve with the Private key. Using this Public key, our digital signature is verified. This is much secured because no one can crack/hack private key. This process is used to verify digital transactions in the block chain technology. Our study helps researcher in block chain technologies to proceed ahead. © 2023 IEEE.

13.
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies ; 7(1), 2023.
Article in English | Scopus | ID: covidwho-2296707

ABSTRACT

The increasingly remote workforce resulting from the global coronavirus pandemic has caused unprecedented cybersecurity concerns to organizations. Considerable evidence has shown that one-pass authentication fails to meet security needs when the workforce work from home. The recent advent of continuous authentication (CA) has shown the potential to solve this predicament. In this paper, we propose NF-Heart, a physiological-based CA system utilizing a ballistocardiogram (BCG). The key insight is that the BCG measures the body's micro-movements produced by the recoil force of the body in reaction to the cardiac ejection of blood, and we can infer cardiac biometrics from BCG signals. To measure BCG, we deploy a lightweight accelerometer on an office chair, turning the common chair into a smart continuous identity "scanner". We design multiple stages of signal processing to decompose and transform the distorted BCG signals so that the effects of motion artifacts and dynamic variations are eliminated. User-specific fiducial features are then extracted from the processed BCG signals for authentication. We conduct comprehensive experiments on 105 subjects in terms of verification accuracy, security, robustness, and long-term availability. The results demonstrate that NF-Heart achieves a mean balanced accuracy of 96.45% and a median equal error rate of 3.83% for CA. The proposed signal processing pipeline is effective in addressing various practical disturbances. © 2023 ACM.

14.
Multimed Tools Appl ; : 1-53, 2023 Apr 13.
Article in English | MEDLINE | ID: covidwho-2290666

ABSTRACT

With the growing use of mobile devices and Online Social Networks (OSNs), sharing digital content, especially digital images is extremely high as well as popular. This made us convenient to handle the ongoing COVID-19 crisis which has brought about years of change in the sharing of digital content online. On the other hand, the digital image processing tools which are powerful enough to make the perfect image duplication compromises the privacy of the transmitted digital content. Therefore, content authentication, proof of ownership, and integrity of digital images are considered crucial problems in the world of digital that can be accomplished by employing a digital watermarking technique. On contrary, watermarking issues are to triumph trade-offs among imperceptibility, robustness, and payload. However, most existing systems are unable to handle the problem of tamper detection and recovery in case of intentional and unintentional attacks concerning these trade-offs. Also, the existing system fails to withstand the geometrical attacks. To resolve the above shortcomings, this proposed work offers a new multi-biometric based semi-fragile watermarking system using Dual-Tree Complex Wavelet Transform (DTCWT) and pseudo-Zernike moments (PZM) for content authentication of social media data. In this research work, the DTCWT-based coefficients are used for achieving maximum embedding capacity. The Rotation and noise invariance properties of Pseudo Zernike moments make the system attain the highest level of robustness when compared to conventional watermarking systems. To achieve authentication and proof of identity, the watermarks of about four numbers are used for embedding as a replacement for a single watermark image in traditional systems. Among four watermarks, three are the biometric images namely Logo or unique image of the user, fingerprint biometric of the owner, and the metadata of the original media to be transmitted. In addition, to achieve the tamper localization property, the Pseudo Zernike moments of the original cover image are obtained as a feature vector and also embedded as a watermark. To attain a better level of security, each watermark is converted into Zernike moments, Arnold scrambled image, and SHA outputs respectively. Then, to sustain the trade-off among the watermarking parameters, the optimal embedding location is determined. Moreover, the watermarked image is also signed by the owner's other biometric namely digital signature, and converted into Public key matrix Pkm and embedded onto the higher frequency subband namely, HL of the 1-level DWT. The proposed system also accomplishes a multi-level authentication, among that the first level is attained by the decryption of the extracted multiple watermark images with the help of the appropriate decryption mechanism which is followed by the comparison of the authentication key which is extracted using the key which is regenerated at the receiver's end. The simulation outcomes evident that the proposed system shows superior performance towards content authentication, to most remarkable intentional and unintentional attacks among the existing watermarking systems.

15.
8th IEEE International Symposium on Smart Electronic Systems, iSES 2022 ; : 196-201, 2022.
Article in English | Scopus | ID: covidwho-2277516

ABSTRACT

Internet of Things applications with various sensors in public network are vulnerable to cyber physical attacks. The technology of IoT in smart health monitoring systems popularly known as Internet of Medical Things (IoMT) devices. The rapid growth of remote telemedicine has witnessed in the post COVID era. Data collected over IoMT devices is sensitive and needs security, hence provided by enhancing a light weight encryption module on IoMT device. An authenticated Encryption with Associated Data is employed on the IoMT device to enhance the security to the medical wellness of patient. This paper presents FPGA-based implementation of ASCON-128, a light weight cipher for data encryption. A LUT6 based substitution box (SBOX) is implemented on FPGA as part of cipher permutation block. The proposed architecture takes 1330 number of LUTs, which is 35% less compared to the best existing design. Moreover, the proposed ASCON architecture has improved the throughput by 45% compared to the best existing design. This paper presents the results pertaining to encryption and decryption of medical data as well as normal images. © 2022 IEEE.

16.
16th IEEE International Conference on Application of Information and Communication Technologies, AICT 2022 ; 2022.
Article in English | Scopus | ID: covidwho-2275413

ABSTRACT

Considering the public safety in current COVID-19 out-break, an IOT (Internet of Things) based non-contact temperature monitoring system integrated with RFID authentication system with an interactive Android application, and a web-portal to manage users and temperature records has been proposed. Temperature screening has become essential for all the industries, educational institutions, factories and corporate sector. This system is an online real-time non-contact monitoring system with an interactive android application and user-friendly web portal that help end-users to monitor and keep a record of temperature variations of registered users on daily/weekly/monthly basis. The temperature records are saved in a real-time database which is embedded with the user's RFID card information. In case of an alert (high temperature), a notification is sent to the authorized personnel on their cellphones or their desktop systems via web portal. An alarm is also generated immediately on the device (buzzer and blinking LEDs) to indicate high temperature, alerting the nearby security staff. As per the survey and testing of the device under different temperature environments it has been found that the proposed system has an overall accuracy of 99%. © 2022 IEEE.

17.
37th International Conference on Information Networking, ICOIN 2023 ; 2023-January:230-235, 2023.
Article in English | Scopus | ID: covidwho-2274944

ABSTRACT

Owing to the spread of COVID-19, the digitalization of various services is rapidly being promoted. In particular, online services such as obtaining a digital certificate (e.g., digital signature) from an authority are becoming increasingly important. Therefore, systems that can autonomously generate digital signatures are urgently required. However, the autonomous generation of signatures is difficult because the secret key for signatures must be strictly managed. Moreover, a decentralized autonomous systems should be publicly verifiable. Thus, schemes that preclude strict control of the secret key are desirable. In this study, we propose a new decentralized scheme that autonomously generates a digital signature without a secret key, using blockchain-based smart contracts. The fundamental concept behind our scheme is to eliminate secret keys by leveraging the closed nature of the processing operations of smart contracts within the blockchain;thus, the process of generating signatures and their output values satisfies the condition of immutability. Finally, we perform a security evaluation and feasibility study of our proposed scheme and show that it works securely on the Ethereum blockchain. © 2023 IEEE.

18.
2022 International Conference on Augmented Intelligence and Sustainable Systems, ICAISS 2022 ; : 358-365, 2022.
Article in English | Scopus | ID: covidwho-2265279

ABSTRACT

Due to the COVID-19 pandemic restrictions were imposed to stop the spread of the virus. As a result, the shopping malls, retail stores and grocery stores had to be shut down leading to significant losses. Though online shopping is always an option, buying daily groceries online is not a feasible option due to delivery times. As the world is now recovering from the pandemic, people have now started visiting malls, retail stores and other places for buying grocery items. In such situation it then becomes very crucial to help people shop more efficiently to reduce the buying time. This will help to keep the crowd under control without jeopardizing the safety and social distance norms. The major problem with most top retail stores is that the customer must wait in long queues after buying their products for getting them billed and payment. This puts pressure on the management and billing staff as well as makes the process of shopping a time consuming and unpleasant experience for the customer. The other issue is that most retail stores waste a significant area of their shop in setting up the billing counters and furthermore also must recruit people for running the billing counters. This project proposes a way of solving the above-mentioned problems and issues with the help of a smart shopping cart. A cart with built in billing and product scanning system which will prepare the bill as the customer is shopping, thus saving customer's valuable time, area of the shop and eliminating the need for recruiting employees for billing. © 2022 IEEE.

19.
International Journal of Intelligent Engineering and Systems ; 16(2):50-63, 2023.
Article in English | Scopus | ID: covidwho-2265131

ABSTRACT

During the COVID-19 pandemic, online electronic educational systems have been used in most schools and universities as they were forced to move their operations from classrooms to online settings. However, these systems face a serious security issue. Access control considers the core of data security for any implemented system. This paper presents the well-known role-based access control (RBAC) approach to enhance system security and improve user role and system privilege. This study also addresses the issues faced by extant schemes, such as security risk tolerance, by proposing a privacy-preserving educational system that utilizes RBAC and smart multifactor authentication. This approach uses an asymmetric cryptosystem based on the Elgamal digital signature operation to provide multi-factor authentication while relying on low-complexity cryptographic hash functions. RBAC manages system security via the "user classification, role authorization, and unified management” approach. By limiting the amount of data that users can access, RBAC is particularly suited for multi-level applications. This approach also uses informal analysis and the Scyther tool to conduct extensive formal security proofs. RBAC offers many benefits, including mutual authentication, identity anonymity, forward secrecy, key management, and high resistance to well-known attacks, such as phishing, replay, Man-In-The-Middle (MITM), and insider attacks. Compared with other schemes, RBAC offers more security features and boasts higher cost effectiveness in processing and communication. Furthermore, our work achieves a good balance between performance and security complexity when compared to the state-of-the-art. So, we get good results at a cost of 0.253 ms for computing and 1326 bits for communication © 2023, International Journal of Intelligent Engineering and Systems.All Rights Reserved.

20.
2022 International Conference on Data Science, Agents and Artificial Intelligence, ICDSAAI 2022 ; 2022.
Article in English | Scopus | ID: covidwho-2256733

ABSTRACT

This research work is focused on the accessible Mobile user application developments to facilitate student and faculty communication through native android applications. Covid'19 and this pandemic brings E-learning systems as majority education levels. Mobile technology has efficient learning systems in many countries like the United States where the students use google paths such as the classroom to extend learning effectively. Limitations in existing apps are that students are not appreciated and monitored for self learning, schedule sharing is only at the end of the course and also knowing the mapping concepts of teaching pedagogy is also less approachable. To overcome these problems mobile technology support is proposed in this work with these three modules such as i) Authentication self learning and performance (ASLP) - Authentication for right users along with improvement of monitoring self learning to analyze performance ii) Syllable Schedule (SS) - prior scheduling on syllable and organization of time table matching based on outcome iii) Authorized facilitator (AF) - Set permission based on designation such that facilitator communicates based on needs. To achieve the above highlighted terms Google API is applied by peer reviews and interactions enabled such that efficient mobile applications development is proved. Also the ion hierarchy is improved when setting the interaction module implies less complexity, less storage. Thus the scope of research work is to use classroom overall performance, interaction, development process to upgrade the results of students. Education level is also enhanced through online E-learning mobile technology (OELMT) that has native applications to develop students' knowledge in a better way. © 2022 IEEE.

SELECTION OF CITATIONS
SEARCH DETAIL