Apr'2023

Welcome to the IUP Journal of Computer Sciences
CheckOut
Article   Price (₹) Buy
Sentiment Analysis of Anikulapo Movie Reviews on Twitter Using Big Data Analytics
50
Entrepreneurial Opportunities in Industry 5.0 Built on Blockchain: An Exploratory Note
50
Vulnerability Assessment and Analysis of SCADA and Foundation Fieldbus on Industrial Control System (ICS) Networks: A Literature Review
50
       
Contents : (Apr'23)

Sentiment Analysis of Anikulapo Movie Reviews on Twitter Using Big Data Analytics
Pius Uagbae Ejodamen, Celestine Uche Agwi and Sylvester Israel Ebhonu

Big Data is an all-encompassing term that refers to the accumulation of data in large pools employed in today's global corporate world. Twitter is one such Big Data platform with over millions of tweets daily. Reading through the humongous volume of tweets posted with reference to an event such as a movie is practically impossible. Anikulapo is a movie of Nigerian origin that became the most viewed non-English film within a few weeks of its release on Netflix and in cinemas. The movie has been trending on social media, especially Twitter. While some reviews considered the movie as a literary masterpiece with several lessons to be learnt from it, some are either critical or indifferent. The paper explores the efficacy of analyzing the sentiments expressed on Twitter about the movie "Anikulapo" using Big Data Analytics. Data was programmatically obtained from Twitter using Twitter Application Programming Interface (API). Purposive sampling technique was adopted for sampling the reviews, and the major criterion for selecting a review was the inclusion or presence of the word "Anikulapo" in an original tweet, not retweet. Python programming language, Tweepy, TextBlob and Pandas were used for downloading, wrangling, cleaning, and analyzing the data. The findings showed that most tweets expressed positive sentiments, and the analysis of engagement metrics showed that tweets with positive sentiments received more likes.


© 2023 IUP. All Rights Reserved.

Article Price : Rs.50

Entrepreneurial Opportunities in Industry 5.0 Built on Blockchain: An Exploratory Note
Arijeet Basu, Anand Kashyap and Anirudh Kumar

The paper discusses the importance and applicability of blockchain technology in Industry 5.0. It highlights some of the new entrepreneurial opportunities that Web3 and Industry 5.0 are opening to the world, and provides a comprehensive overview of blockchain and Web3, how it applies to Industry 5.0, and how future entrepreneurs can leverage the new opportunities and technologies to monetize their business model. It also talks about how the integration of blockchain into Industry 5.0 impacts the customer and about tokenomics, as this is a big step towards the decentralized Internet. The current global Internet is mainly dominated by a few companies like Google, Microsoft, Meta, etc., and all user and personal data is stored on centralized servers that have a single point of failure, leading to global outages and data breaches. The paper highlights some business models such as decentralized autonomous organizations, and the challenges that will be faced in the future. It includes secondary data sources related to blockchain and Industry 5.0. The goal is to find decentralized, viable and sustainable solutions to the problems of Industry 5.0. The results and suggestions for future entrepreneurs in the field of Web3 and Industry 5.0 are also included.


© 2023 IUP. All Rights Reserved.

Article Price : Rs.50

Vulnerability Assessment and Analysis of SCADA and Foundation Fieldbus on Industrial Control System (ICS) Networks: A Literature Review
Lokesh Nelligere S, Thippe Swamy G, Mubashir Ahmed Akheel and Chandramma R

With the Fourth Industrial Revolution (Industry 4.0), there have been many cases where machines present in Industrial Control System (ICS) network have been compromised and threats have been a major concern in each layer of topology. Initially, ICS networks were connected within boundaries without the risk of being exposed to the outer network, but with recent developments, they have been exposed to public Internet which is making them vulnerable to threats. Many ICS networks present today communicate with devices in Level 0 with Foundation Fieldbus (FF) protocol which follows OSI layer architecture, exposing it to major threats occurring on all the seven layers.


© 2023 IUP. All Rights Reserved.

Article Price : Rs.50