0% found this document useful (0 votes)
55 views

A Comparative Review of Sustainable Enterprise System Frameworks

Uploaded by

Bendout BSA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

A Comparative Review of Sustainable Enterprise System Frameworks

Uploaded by

Bendout BSA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Vol. 03, No. 02, pp.

105-128
(2024)

Journal of Information Technology and Informatics (JITI)


Journal homepage: https://qabasjournals.com/index.php/jiti/

A Comparative Review of Sustainable Enterprise System Frameworks:


Integrating Web Technology, Clouding, AI, IoT, and Security for Green
Business Transformation
Dawlat Abdulkarim Ali1, Azar Abid Salih2, Omar M. Ahmed3, Abdulmajeed Adil Yazdeen4, Rozin Majeed
Abdullah5, Teba Mohammed Ghazi Sami6
1
Akre University for Applied Science, Technical College of Informatics-Akre, Department of Information Technology, Akre, 42004, Iraq
2
Duhok Polytechnic University, Technical College of Administration, Information Technology Management, Duhok, 42001, Iraq
3
Duhok Polytechnic University, Zakho Technical College, Computer Information System Department, Zakho, 42002, Iraq
4
Duhok Polytechnic University, Technical College of Administration, Information Technology Management Department, Duhok, 42001, Iraq
5
Duhok Polytechnic University, Technical College of Engineering, Highway and Bridges Department, Duhok, 42001, Iraq
6
University of Zakho, Faculty of Science, Computer Science Department, Zakho, 42002, Iraq

Corresponding Author: Dawlat Abdulkarim Ali , E-mail: [email protected]

ARTICLE INFO ABSTRACT


In the contemporary business landscape, the drive towards sustainability has become
Received: 10/06/2024
imperative, pushing enterprises to adopt frameworks that integrate advanced
Accepted: 10/07/2024 technologies for green business transformation. This comparative review explores
Volume: 03 various sustainable enterprise system frameworks, focusing on the integration of
Issue: 02
web technology, cloud computing, artificial intelligence (AI), the Internet of Things
(IoT), and security measures. The study aims to provide a comprehensive analysis
KEYWORDS of how these technologies collectively contribute to creating eco-friendly business
environments. By leveraging web technology and cloud computing, businesses can
enhance their operational efficiency and reduce carbon footprints through
Cloud Computing, Web Technology, virtualized resources and scalable solutions. AI and IoT are pivotal in optimizing
Blockchain Technology, Artificial resource utilization, predictive maintenance, and energy management, fostering
Intelligence, Internet of Things,
Integration for Sustainability and
intelligent and sustainable practices. Security, an essential aspect of any enterprise
Security. system, is scrutinized to ensure that the integration of these technologies does not
compromise data integrity and privacy. The review highlights key frameworks and
models, comparing their strengths, limitations, and applicability in various
industries. Through case studies and real-world examples, the paper illustrates
successful implementations and identifies best practices. The findings underscore
the importance of a holistic approach in adopting these technologies to achieve a
sustainable and resilient business model. This research contributes to the ongoing
discourse on green business transformation, providing valuable insights for
policymakers, industry leaders, and researchers seeking to advance sustainability in
enterprise systems. The comparative review underscores the potential of integrated
technological frameworks in driving sustainable growth and emphasizes the need
for robust security measures to safeguard the integrity of green business initiatives.

I. INTRODUCTION limited amount of study conducted on the concept of


As a potential approach to improve the fault tolerance delivering information and communication systems[2].
of cloud firewall operations, the concept of layered Assuming that cloud storage will see a boom in popularity
virtualization is currently being investigated in the over the course of the next several years is a realistic
academic literature as a potential strategy. The assumption to make. Cloud computing makes it possible
investigation that is being conducted right now is currently for cloud systems to effectively build specialized analytical
going place[1]. In the vast majority of cases, these solutions tasks and time orchestration[3].
are really uncommon and are only used in certain endeavors This is for the purpose of facilitating the operations of
that fall inside the purview of commercial activity. Due to information technology. There is a vast range of activities
the fact that this is the case, there has been a relatively that might be classified as belonging to this category. Some

105
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 3, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

examples of these activities include the storage and wireless communications, radio frequency identification,
measurement of data, the upkeep of databases, and the wireless sensor networks, and cloud computing. The swift
assignment of labor [4]. When it comes to satisfying the progress that had been achieved in these areas prompted
needs of information technology, the new design for cloud this measure, which was taken as a response to the
computing promises to be more efficient than its situation[12].
predecessor. Cloud computing infrastructure is used by a
great number of businesses in order to manage and analyze here was a clear correlation between the action that he
huge amounts of data sources in an efficient and effective performed above and his capacity to effectively resist these
manner. Utilizing cloud computing allows for the seductive temptations. This is a very amazing development
successful completion of this task. In addition, cloud that has occurred as a consequence of the Internet of
service providers are incorporating data processing Things, which has considerably improved the efficiency of
technologies into their solutions in order to simplify the a wide range of different communication routes. The
process of managing cloud resources for their customers Internet of Things is a fascinating discovery since it was not
[5]. predicted that this phenomenon would have a direct
influence on the activities that people engage in[13]. The
Through the use of the idea of cloud computing, which beauty of the technical growth may be attributed to this
is not only efficient but also straightforward, it is possible particular motivation. Internet-connected devices have the
to build connections to networks that originate from a wide capacity to collaborate with one another and share
variety of various computer sources[6]. The capacity of a information with one another. This feature allows them to
system to continue functioning normally in spite of the operate together. Given the present state of circumstances,
existence of a defect or malfunction is referred to as its these options are not completely out of the question in terms
failure tolerance levels. The capacity in question is what is of the alternatives that are available[14].
known as the fault tolerance threshold value. One of the
primary goals of this endeavor is to enhance the amount of The term "Internet of Things" refers to a concept that
time that the server is accessible for use, in addition to anticipates a future in which a vast number of electronic
enhancing its dependability and cost-related efficiency. It is devices, ranging in size from little to massive, are linked to
highly recommended that fault tolerance be included into one another and communicate information with one
each and every implementation, with a special focus on another. This notion envisions a future in which the Internet
those requirements that are absolutely necessary [7, 8]. of Things will be ubiquitous. This is a continuance of a
civilization that will continue to exist in the future in most
Having the capacity to overlook mistakes is a quality essential form. This civilization will continue to exist.
that is not only essential but also highly desired. When it comes to classifying the electronic gadgets that
Additionally, when a service has a poor degree of have been addressed up to this point, there are a number of
reliability, its performance will also be badly impacted, different categories that need be considered. Desktop
which will result in consumers having to wait for an computers, laptops, mobile phones, personal digital
excessive amount of time [9]. To put it another way, this assistants, tablets, and other electronic devices are some of
will cause customers to be inconvenienced. This article is the categories that fall under this category for electronic
going to give the findings of a comprehensive study that devices[15].
was conducted over the course of the last four years by
academics from a variety of internet technology sectors. The items in this list are not all included in the list that
The study was carried out by researchers from a variety of is being shown here. By using robust wireless
different fields. The purpose of this essay is to communication networks and sensors, these devices are
communicate the results of the investigation that was able to establish connections with one another and provide
conducted. The investigation is centered on procedures that the central system with data that is of critical importance.
are the most cutting-edge and efficient ones that are now This is made possible by the fact that they are able to make
accessible[10]. The practice of providing extensive linkages with one another. There are two more capabilities
information on each procedure is what is considered to be that these devices are able to accomplish, and those are
intercommunication and the transfer of crucial information
standard. It is possible that this material will contain
detailed explanations of the techniques and procedures that to the central hub . Furthermore, these devices are able to
were implemented, the datasets that were utilized, and the communicate with one another and provide the central
results that were produced. In an attempt to achieve the system with information that is of critical importance at the
highest possible level of precision, we have made a same time. In addition, the use of wireless technology is
significant amount of effort to place an emphasis on the what makes these networks able to operate properly[16].
techniques and processes that are used the majority of the The use of sensors was very necessary for them to
time[11]. accomplish the objectives that they had established for
Throughout the course of the last several years, research themselves in order to be successful. The introduction of
and development for the Internet of Things (IoT) has information and communication technology, which
necessitated a substantial amount of time, effort, and includes the Internet, has brought about a substantial
financial resources. Due to the characteristics of the field, change in the way we go about our daily lives. The result
this has been the situation ever since. Over the course of of this is that our lives are becoming more focused on
human history, the Internet of Things (IoT) has been virtual encounters rather than actual ones. The amount of
associated with a variety of distinct features [11]. These time that we spend thinking about the actual world has
traits have shown themselves in a variety of various ways. dropped as a consequence of this change, while the amount
It is generally agreed that Kevin Ashton is the person who of time that we spend focused on an idealized image of the
is responsible for the establishment of the Internet of real world has grown[17]. Our day-to-day lives will be
Things in the year 1999. This is due to the rapid significantly altered as a result of this transition since we
breakthroughs that had been achieved in the fields of will spend less time in the real world. This will have

106
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

significant implications for our lives. The reason behind possible by the arrival of the Internet of Things. The
this is that the amount of time that we spend in the actual Internet of Things (IoT) is a project that aims to develop an
world will begin to decline[18]. ecosystem that is self-sufficient and intelligent, as well as
apparatuses that are capable of functioning independently
Due to the fact that this transformation is taking place, of one another. This is the goal of the project. The
we are being compelled to place a greater focus on the development of intelligent healthcare, the discovery of
virtual components of our day-to-day lives rather than the solutions for sustainable living, the improvement of
actual ones. The transition that has taken place has resulted consumer goods, and the creation of smart urban settings
in this since it is a consequence. The occurrence of this will all be undertaken concurrently[24].
change may be directly attributed to the development that
led to the occurrence of this alteration . As a direct It is now the case that there is a higher proliferation of
consequence of this, the world in which we now reside has networked devices than there has ever been before, and the
evolved into a place that is becoming more strange[19]. pace at which these devices are being employed is
developing at a rate that is becoming more rapid. The
It is possible that the following explanation is process of connecting a variety of devices to the internet is
responsible for this modification. The change that has taken becoming an increasingly common activity. There is a
place, which has brought about this change, is directly continuous rise in the number of devices that are capable of
responsible for this change that has shown itself. Because
connecting to the internet, which has resulted in an increase
of this shift, we have begun to prioritize our day-to-day in the number of these devices that are being sold. In recent
activities as if they were based on hypothetical possibilities years, there has been a notable increase in the number of
rather than the real world. This is a significant difference physical goods that are linked to the internet. This is yet
from the past. This has come about as a consequence of the another intriguing development that should be taken into
change that has taken place. However, despite the fact that account. The total number of persons who use the internet
the physical world is still there, there has been a shift in the is continuing to climb with each passing day, and it is
paradigm that has been built. This is the case despite the projected that this trend will continue to be observed in the
fact that the physical world is still present[20]. future[25].
Reorganizing the hierarchy of relevance for a lot of In accordance with the prognosis, it is anticipated that
areas of our day-to-day operations is something that we this number will continue to rise. It is not out of the question
have done as a result of these adjustments. The new that this pattern will continue to keep occurring in the
conditions required this action to be taken in order to better future. The study that was conducted led to the discovery
accommodate them. We have developed a more profound of the following findings: It is estimated that by the year
appreciation for a wide range of other things as a 2020, the total volume of production that will be generated
consequence of going through this process of by all of these connections will equal to 700 billion euros.
transformation. As a direct result of this, the ethics and This can be attributed to the fact that the research was
ideals that serve as the foundation for the organization have carried out. There are already thirty billion gadgets and two
been altered[20]. hundred billion connections that are linked to one another,
The activities that comprise an individual's daily routine and it is anticipated that these numbers will continue to rise
cover a broad variety of activities, some of which include in the years to come according to projections. As of right
working, interacting with other people, and carrying out now, there are already thirty billion electronic devices and
tasks such as going food shopping. Working is one of the two hundred billion connections[26, 27].
activities that is included in the daily routine. Activities like As a result of the Internet of Things (IoT), which is
as giving animals and plants that are enclosed inside the projected to have a large impact, it is predicted that the
network with food, water, and general care are examples of governance of businesses as well as ordinary life would be
responses to real-world inputs. Other examples include greatly impacted. These upgrades are also slated to take
providing general care[21]. place at the same time, which is another point of interest.
Specifically, the acts in issue are carried out inside the Both of these improvements are planned to take place
confines of the artificial environment that is provided by the within the same time frame, according to the planned
network. It is a generally held belief that the process of timeline. The implementation of these enhancements will
replacing human life with a system that is capable of being take place concurrently with the installation of these
appropriately managed by the activities of robots is a very enhancements. The alterations that we are about to make
difficult one to accomplish. When it comes to the process will have an effect on both our personal and professional
of replacing humans with robots, there are considerable lives, and they will have an influence on both of these
technical challenges that need to be conquered. There will elements of our existence[28].
be a number of obstacles that must be overcome in order to The installation of these changes is scheduled to take
successfully finish this mission. In the not too distant place concurrently according to the plan that has been
future, the zone will be subject to rigorous constraints, made. Every single user or device has the capacity to
which will make it more difficult for the Internet to deliver connect with every single other user or device, regardless
an ever-expanding variety of services that are available. of where they are located, at any given time, and by using
This will be a challenge for the Internet[22, 23]. any network that is accessible. This is true regardless of the
It is intended that there will be a restricted area built circumstances. One explanation for this phenomenon is
there. There will be considerable limits placed on the land because people from all over the globe are able to connect
that is now the subject of a dispute during the course of the to the internet. This is the reason for this phenomenon. in
succeeding time period. It is The Internet of Things made light of the fact that connection to the internet is not difficult
it possible for components of fantasy and reality to coexist to get[29, 30].
harmoniously with one another. This opportunity was made

107
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

With the introduction of this brand-new feature, more fundamentally the same thing. Cloud computing is
capabilities have been added to those that were already computing that is conducted in the cloud[40].
there in the original version. In addition to the
characteristics that it already has, the major purpose of this It is important to note that the activities that are often
mission is to accomplish this. The accomplishment of this referred to as "fog computing," "cloud computing with fog
objective was made feasible by a number of factors, one of computing," and "fog computing with cloud computing"
which was the involvement in this activity and the are, in essence, the same sorts of activities. The phrases
development of abilities that were associated with it [31]. "computing in the fog with computing in the cloud" and
"computing in the fog" are both expressions that refer to the
In addition, the fundamental purpose of this mission is same kind of computing that is practically identical to one
to improve and broaden the extent of the capabilities that it another. When discussing computers, both expressions are
already has. Unfortunately, the vast majority of these taken into consideration[41, 42].
devices and programs were not purposely built to be
resistant to attacks on the privacy and security of their There is a remarkable similarity between the names of
users. This is a very terrible situation. To be more explicit, these individuals and the characteristics that they possess.
with relation to this particular aspect, their design The words "fog computing," "cloud computing with fog
demonstrates a serious shortcoming. The most significant computing," and "fog computing with cloud computing"
are various terminology that may be used interchangeably
component that contributes to this specific problem is the
fact that the design of these gadgets has a fundamental flaw to refer to the same kind of computing[8]. When it comes
that is the root cause of the problem[32, 33]. to computing, another word that may be used alternatively
is "fog computing." It is important to note that there is no
It is feasible to consider this issue to be present at the distinction between the phrases "cloud computing with fog
most fundamental level that can be conceived of. One of computing," "fog computing with fog computing," and "fog
the consequences of this is that a significant section of the computing with fog computing" . There is a connection
general population is concerned about the lack of between each of these expressions and the same idea[43,
confidentiality and security that is linked with connections 44].
that are formed via the Internet of Things (IoT). People with
bad intentions, such as hackers and cybercriminals, are
constantly searching via the Internet of Things (IoT) for II. BACKGROUND THEORY
vulnerabilities that they may exploit in order to steal data or
take control of the device. This is done in order to find flaws Digital transformation is both an opportunity and a
that they can exploit. Over the course of quite some time, challenge. To take advantage of this opportunity for
this has been going on[34, 35]. humans and the environment, the transformation process
must be understood as a design process that affects almost
An easy-to-guess password is a vulnerability that is all areas of life [45]. Fig.1. represents a framework with
often exploited when it comes to devices that are connected several layers for an AI-CPPS. It consists of three layers:
to the Internet of Things (IoT). This is because such a (A) the process layer on top, which entails the simulation,
password is simple to figure out. Immediately completing execution, and analysis of processes which are monitored,
the urgent and vital duty of resolving the problem of controlled, or otherwise adapted by advanced AI methods
preventing unauthorized access to devices that are linked to within the AI-CPPS framework. (B) the semantic modeling
the internet is of the highest significance and must be done and integration layer, which links the processes to the
as soon as feasible. This task must be completed as soon as underlying systems by designing a semantic description to
possible[36]. It has been shown via research that the vast integrate the components. (C) the cyber-physical systems
majority of devices that are linked to the Internet of Things and human actors layer, which focuses on the systems and
are vulnerable to hacking with very little effort, which is a ways humans interact with them as well as how human
big cause for worry . However, there is a possibility that the actors should be represented in the processes.
concept of "the internet of things" might be one of the
possible causes for this phenomena[37].
This is a possibility that requires more investigation. A
total of seventy percent was found to be the percentage, as
shown by the findings of this inquiry. In light of the fact
that seventy percent of all devices that are connected to the
internet are susceptible to hacking with little to no effort, it
is of the utmost importance that these requirements be
satisfied. An extensive amount of study has been conducted
on the topic of the historical circumstances that were
responsible for the formation of fog computing. This
research has been carried out in a large level of detail[38].
At the same time that this study was being carried out,
an investigation into the system model of this computing
technology was being carried out. For the purpose of
making an educated forecast on the future of this
technology, it is very necessary to have a comprehensive
grasp of the linkages that exist between fog computing, Fig.1. Framework for AI-based self-adaptive cyber-physical
cloud computing with fog computing, and fog computing process systems [45].
with fog computing[39]. Cloud computing, fog computing,
and fog computing that is carried out on the cloud are all

108
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

The convergence of IoT, AI, and blockchain This is illustrated in Fig.3. Note that due to the
technologies in sustainable IoT applications enhances complexity and the multi-dimensionality of the
security, privacy, and quality of life. Blockchain is a data sustainability impacts, this visualization cannot include all
structure and protocol for trustless distributed transactional aspects relevant for the perspective, such as the AI life
systems. In traditional distributed databases, a trusted cycle. Rather it gives an overview about the impact levels
intermediary is needed to guarantee irreversibility (i.e., no and the entanglements between social, technical and
committed transaction can be reverted or altered) and ecological entities that should be addressed when
preventing censorship (i.e., all valid transactions are conceptualizing sustainable AI-systems[48].
committed). Blockchain systems avoid intermediaries by
approving transactions through a distributed consensus The concept behind IoT is as powerful as it is complex,
protocol, which guarantees no single node or small group and for the entities and modules in the IoT solution to mesh
of colluding nodes can force the addition, removal or together perfectly, they all must be part of a well-thought-
modification of data [46]. out structure. That is where accomplishing a deep
understanding, IoT architecture becomes paramount given
the complexity of IoT domains and platforms. In this paper,
we present a comparative analysis of IoT-architecture
models based on IoT reference architecture proposed by
ISO. By incorporating these insights, organizations can
develop frameworks that promote sustainability,
efficiency, and innovation in the era of digital
transformation [5].
The rapid advancement of digital technologies has led
Fig.2. Blockchain Structure [2]. to a paradigm shift in how businesses operate, aiming not
only for economic growth but also for environmental
sustainability. The theory underpinning this research is that
Internet of Things (IoT) has led to significant integrating web technology, cloud computing, artificial
advancements in communication technologies, intelligence (AI), the Internet of Things (IoT), and robust
specifically, concerning IoT-based sustainable information security measures into enterprise system frameworks can
systems. Lately, industry-academic communities have significantly enhance an organization's ability to achieve
made great strides for the development of security in IoT- sustainable business practices. This integration supports
based applications, such as traffic management, industrial green business transformation by optimizing resource use,
automation systems, military surveillance systems, reducing environmental impact, and fostering innovative,
transportation, parking, etc. The sustainable IoT converges eco-friendly solutions[49].
AI and blockchain technologies for enhancing quality of Web Technology and Cloud Computing: The
individual’s life. As a result, emerging IoT applications proliferation of web technologies and cloud computing
operate a distributed ledger technology to provide robust- platforms provides scalable and flexible infrastructures that
level of encryption and execution for contractual agreement can reduce the environmental footprint of business
that resolves interoperability and security issues [47]. operations. By moving to cloud-based solutions,
Furthermore, considering the multi-dimensional of enterprises can minimize their reliance on physical
sustainability in AI systems is essential to mitigate societal, hardware, thereby decreasing energy consumption and e-
environmental, and economic consequences . The socio- waste. Virtualization and resource pooling inherent in
technical-ecological systems perspective on AI calls for the cloud computing lead to more efficient use of resources,
need to recognize that AI systems mediates human– contributing to sustainability[50].
environment relationships in a variety of ways. Bringing Artificial Intelligence (AI) and IoT: AI and IoT
together socio-technical and ecological-technological technologies play a crucial role in enhancing operational
considerations, different impact levels of AIsystems efficiency and sustainability. AI algorithms can analyze
distinguished, with the different elements and actors, which vast amounts of data to optimize processes, predict
are part of or able to exert influence on shaping and maintenance needs, and reduce energy consumption. IoT
governing AI systems at the respective levels. devices enable real-time monitoring and management of
resources, ensuring optimal utilization and minimizing
waste[51].
Together, AI and IoT facilitate smarter, greener
business operations. Security: As enterprises adopt these
advanced technologies, ensuring data security and privacy
becomes paramount. Robust security frameworks are
essential to protect sensitive information and maintain the
integrity of business operations. Secure systems also foster
trust and compliance with regulatory standards, which is
crucial for sustainable business practices. By examining
and comparing various sustainable enterprise system
frameworks, this research aims to identify best practices
and potential areas for improvement. The ultimate goal is
to provide a roadmap for businesses to effectively integrate
Fig.3. AI-systems as Socio-technical-ecological systems, with
these technologies, ensuring a sustainable and resilient
impact levels and relevant actors for sustainable AI.
future[52].

109
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

In the context of a system, the term "scattered difficulties that arises with distributed systems is the need
components" refers to a structure in which the various of ensuring that all of the components are synchronized.
components of the system are dispersed over a number of There are a number of potential causes that might give birth
computers, each of which is connected to the other to problems with distributed system designs. Managing
components of the system by networking. To phrase it distributed systems requires facing and overcoming a
another way, the components of the system are dispersed number of difficult obstacles in order to attain the highest
over a number of different digital computers. An example possible level of system performance[56].
of how the word "dispersed" may be used to describe the
configuration of a system is shown below, along with a However, it is not always the case that the failure of a
number of other interpretations that could be applied to the single component in a system would lead to the total
terminology[53]. annihilation of the system as a whole. In spite of the fact
that this could be the case in some circumstances, it is not
The term "dispersed components" refers to the applicable everywhere . There are a number of particular
configuration of a system in which the individual examples that precisely correspond to this description.
components of the system are physically located in There are several possible causes that might have
different places. If the components of a system are contributed to the occurrence of this event. Even while it is
dispersed throughout a number of different places, then the not the typical occurrence, it does take place on occasion.
system is said to have a scattered structure. They are able On the other hand, this is not always the case. There are
to send messages across their systems, which enables the several types of distributed systems, such as peer-to-peer
computers to communicate with one another and applications, massively multiplayer online games (MMOs),
collaborate in order to achieve their objectives . They are and systems that are built on service-oriented architecture
able to communicate with one another and create (SOA), such as massively multiplayer online games
relationships with one another that are mutually beneficial. (MMOGs)[57].
In order to do this, they communicate with one another via
the transmission of signals in order to share information The following are some examples that will help you get
among their many internal systems[54]. a better understanding of the topic: Distributed
programming is the process of building computer programs
It is possible that several computer systems will need that are especially intended to function within the
intercommunication in order to accomplish their common constraints of a distributed system. The method that is used
goal. Depending on their preferences, individuals might in the process of developing software is referred to as
complete the task by engaging in verbal contact, sending distributed programming. When it comes to conveying the
text messages, or using any other kind of electronic essential essence of this method, the phrase "distributed
communication they find convenient. This enables programming" is perfectly true. In the context of computer
computers to communicate with one another directly and programming, a program is termed distributed if it was
without the need for intermediaries, as well as to share developed with the intention of functioning on a distributed
information. For the purpose of accomplishing this goal, system[58].
the capacity to communicate with one another is absolutely
necessary[54]. In addition to this, it is absolutely necessary for a
program to be specifically defined as a distributed
As a consequence of this, the computers may exchange application or application. Computer programs that are
information, which would lead to an increase in the total distributed are written in a way that allows them to
output that the computers produce. The study of distributed accomplish their goals while adhering to the limits of a
computing is a prospective area of competence that may be distributed system. When referring to computer code, the
found within the larger discipline of computer science. term "distributed program" refers to a program that is
Because it is classified as belonging to one of the subfields intended to maximize performance while adhering to the
that were mentioned before, it is often referred to by that limitations of a dispersed organization[59].
name. In the subject of computer science, this particular
subfield is devoted to the investigation of various In order to achieve the best possible degree of speed,
the software was purposefully developed in a decentralized
distributed system architectures[55].
approach. Distributed applications are a term that is
Decentralized networks are the primary emphasis of sometimes used to refer to this kind of software in specific
this subfield of computer science, which is a specific topic circumstances. During the process of constructing the
within the field of computer science. The term "distributed system that is responsible for the transmission of messages,
system" refers to a system in which a number of separate there is a large variety of software choice possibilities
components work together and interact with one another in accessible for selection. By using these configuration
order to accomplish a shared objective. The phrase choices, the system may be set up[60].
"distributed system" may also be used to refer to a system
in which a number of independent components work It is possible to get information on these alternatives by
together to achieve a common goal. A system that stores visiting their respective websites. This category includes a
information in a way that is decentralized is referred to as a broad variety of implementations, including
distributed system, according to one of the many meanings communication queues, connections that are similar to
of the term referred to above. The phenomenon known as a RPC, and the most fundamental HTTP. In addition, in
"distributed system" is shown by this particular system[55]. addition to the three applications that have been specifically
mentioned above, there are a number of additional
The fundamental issues that distributed systems must applications that may be categorized as belonging to this
contend with are the maintenance of synchronization, the category. The samples that are being shown here are just a
management of the breakdown of particular components tiny portion of a much larger accumulation[61].
within the system, and the compensation for the lack of a
central method for timekeeping. One of the most significant

110
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

It's possible that when you hear the phrase "distributed meaning of these expressions has progressively evolved
computing," the first thing that comes to mind is the method into a notion that is more expansive and commonplace[67].
of solving a single computational issue by using the
capabilities of several computers that are located in The passage of time has resulted in these principles
different locations. This specific setting gives the term gaining greater significance, and this may be conveyed in a
"distributed computing" a different connotation than it variety of different ways. In a nutshell, the number of times
would otherwise have. Another way of looking at the that these phrases have been used has significantly
concept of "distributed computing" is as follows: It is one increased over the course of the last few years. It is
of many other options that may be used in order to achieve important to emphasize that the original meanings of these
this goal. One possible interpretation of the phrase idioms have developed over the course of time to include a
"distributed computing" is shown by the following greater variety of circumstances. Everything that has
situation, which serves as an example of distributed happened is a direct result of the passage of time. Regarding
computing[62]. idioms, it is possible to make a generalization. One may
make the case that the current issue is no longer relevant
The purpose of this description is to provide an since a considerable period of time has elapsed since it was
explanation of the incorporation of distributed computing presented[68].
into a process by providing an example of its
The word "distributed" is often used to indicate that the
implementation and showing the ease with which this
technique may be used . When using distributed computing, program was designed with the intention of achieving the
a problem is first broken down into a collection of discrete highest possible level of performance. In some regions,
tasks, and then each job is assigned to either a single these applications are also referred to as distributed apps,
computer or a group of computers. This results in the issue which is an alternate definition. During the process of
being solved more efficiently. Iterations of this method are constructing the system that is accountable for the
carried out until the problem is resolved[63]. transmission of messages, there is a broad variety of
software solutions from which to pick . One of the possible
Deconstructing an issue into its component parts is a approaches to putting in place the system is to make use of
vital step in the process of finding a solution to the said the options that were discussed before[69].
problem. It is necessary to perform this method on a regular
basis until the problem is resolved. In the event that the To acquire a more in-depth comprehension of how to
issue is finally fixed, it will have been broken down into a make use of these extra choices and to locate direct
series of steps that must all be carried out before the references to them, kindly visit the websites of each of these
problem can be considered to have been handled. There is alternatives individually. Message queues, connections that
a possibility that these gadgets may interact with one are similar to RPC, and even the most fundamental form of
another, which will allow them to speak with one another HTTP are all examples of various sorts of implementations
in a manner that is somewhat distinct from a discussion that that are recognized as being included in this category. In
is spoken[64]. addition, in addition to the three applications that were
mentioned before, there are plenty of additional
As a consequence of this, the two distinct technical applications that fall under this category as well[70].
components are now able to engage with one another by
using whatever method that both parties deem to be the These examples are chosen from a much larger
most appropriate. The words "distributed system," collection of work that had been collected. Perhaps, when
"distributed programming," and "distributed algorithm" you meet the phrase "distributed computing," you instantly
were first used to refer to computer networks in which think of the strategy of tackling a single computer issue by
individual computers were geographically separated integrating the capabilities of numerous independent
throughout a large territory. Considering the current state machines cooperating together. The word "distributed
of affairs, these topics are still relevant. Throughout the computing" is an alternative name that may be used to refer
course of history, these idioms have persisted, and they are to this notion. One other way to look at "distributed
still often used in the current day[65]. computing" is as follows: there are many different ways to
accomplish this goal, and one of them is referred to as
At the moment, it is common practice to make use of "distributed computing." The phrase "distributed
these terms when talking about a wide variety of computers computing" may be interpreted in a number of different
that may be divided into a number of subgroups. This is due ways, and these are some of the interpretations that are
to the fact that each of these systems may be classified in a displayed here[71, 72].
number of different ways, which is the origin of this
phenomenon. Throughout the course of this discussion, When using distributed computing, a problem is first
concepts such as distributed system, distributed broken down into a collection of discrete tasks, and then
programming, and distributed algorithm have emerged. At each job is assigned to either a single computer or a group
this time, the meaning of these expressions has expanded to of computers. This results in the issue being solved more
include a wider range of concepts[66]. efficiently. We will continue to use this strategy until the
problem has been fully remedied. Once the components of
They may also refer to separate activities that take place the problem have been identified, it will be possible to
on a single physical computer and communicate with one immediately address them and ultimately find a solution to
another via the transmission of signals. In this particular them. It is necessary to do this step several times until the
instance, the significance of these statements has problem is fixed[73].
undergone a change during the course of the debate. To put
it another way, the majority of people who use these idioms When the process is finished, the problem will have
do not aim to express the exact meaning of what they are been broken down into a series of discrete steps, each of
used for. To put it another way, as time has gone on, the which must be completed before the problem can be
considered to have been addressed. It is possible for them

111
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

to connect with one another via the exchange of text within the constraints of a distributed system. For the
messages. This makes it possible for the two technical purpose of producing software, the methodology known as
components to establish contact by using the method that is distributed programming is used[82].
most appropriate in light of the circumstances that are
currently in place[74]. When initially introduced, the words When it comes to conveying the essential essence of
"distributed system," "distributed programming," and this method, the phrase "distributed programming" is
"distributed algorithm" were used to refer to computer perfectly true. Computer programs that are constructed
networks in which individual computers were with the express purpose of functioning in a distributed
geographically separated throughout a vast territory. There environment are referred to as distributed programs . It is
is a possibility that modern society might still stand to also essential to explicitly identify a program as a
benefit from these values. These idioms are still widely distributed application in order to fulfill this requirement.
used and highly appreciated in today's society but have lost Computer code that is intended to accomplish certain goals
some of their popularity[75]. while simultaneously meeting the requirements of a
distributed system is referred to as distributed programs. In
In today's popular culture, these phrases are often used the context of computer programming, the term "distributed
to refer to a broad variety of different computer systems, program" refers to instructions that are written in this
each of which may be further subdivided into a number of kind[83].
other categories. The reason for this is because none of
these systems have a categorization method that is widely The purpose of a distributed program is to achieve the
recognized and approved. The words "distributed system," highest possible level of performance by being created
"distributed programming," and "distributed algorithm" are particularly for a distributed system while taking into
only a few examples of the many new phrases that have consideration the limitations of that system. For the purpose
emerged in this discipline. There are many more. In today's of getting the best possible results, the creation of this
world, these words are used with a slightly broader scope, software is referred to as "distributed," and the word
and they are even occasionally employed to differentiate "distributed" is used to describe it. For the purpose of
between distinct processes that are carried out concurrently referring to this kind of software, the term "distributed
on the same physical computer and convey information via apps" is used by some communities. When it comes to
the transmission of signals [76]. establishing the system that is responsible for the delivery
of messages, there is a wide variety of software
This is an example of a phenomena that refers to the fact opportunities available to pick from[75].
that some idioms have gained new implications throughout
the course of time. There is a significant difference in the If the system were to be established, any one of these
meaning of the idioms that are used by the majority of choices may be used. The specific instructions that are
people. With the passage of time, the meaning of these required to access these choices may be found on the
terms progressively becomes less specific and more webpages that are specific to each of them. It is possible to
relevant to a wider range of situations. The following is an classify a broad range of implementations as belonging to
illustration of how the relevance of these ideas has grown this category. Some examples of these implementations
over the course of time: the use of these phrases has include message queues, connections that are similar to
witnessed a significant increase in the last few years[77, RPC, and basic HTTP. In addition, apart from the three
78]. situations that were discussed before, this category
encompasses a wide variety of implementations as well[83,
To put it another way, the variety of contexts in which 84].
these idioms might be used has grown significantly
throughout the course of history. Taking into account the The alternatives shown here are only a tiny sampling
passage of time is the easy method. With regard to idioms, from a far wider variety of possibilities. One interpretation
it is possible to extend this generalization to a certain of the phrase "distributed computing" is that it refers to the
extent. As a result of the substantial length of time that has method of solving a computational issue by integrating the
passed, there are others who claim that it is no longer skills of a number of different computers that are working
together [85]. One more way of understanding what
pertinent to examine this issue at this time [79, 80].
distributed computing means. The term "distributed
It is not always the case that the failure of a single computing" may also be used to refer to a strategy that can
component in a system will eventually lead to the total be utilized in a variety of contexts in order to achieve a
annihilation of the system as a whole. While it is possible certain goal[11].
that this is the case on occasion, it is not often the case.
There are a number of particular examples that precisely The picture that has been supplied is an illustration of
correspond to this description. There are several possible one possible interpretation of the phrase "distributed
causes that might have contributed to the occurrence of this computing." It highlights the practicability of incorporating
event. Even while it is not the typical occurrence, it does the idea of distributed computing into a process by
take place on occasion. On the other hand, this is not always providing an example of how it may be implemented. The
the case[81]. technique of distributed computing includes breaking down
problems into smaller, more manageable components.
There are several types of distributed systems, such as These parts may then be assigned to either a single
peer-to-peer applications, massively multiplayer online computer or a number of machines for processing
games (MMOs), and systems that are built on service- according to the requirements of the situation. Over and
oriented architecture (SOA), such as massively multiplayer over again, this procedure is repeated until the problem is
online games (MMOGs). The following are some examples solved. After the issue's core components have been
that will help you get a better understanding of the topic: identified, it is possible to find a solution to the problem.
Distributed programming is the process of building This strategy has to be used on a regular basis until the
computer programs that are especially intended to function problem is resolved. After the problem has been effectively

112
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

handled, it will have been broken down into a series of to as "servers" . This community makes frequent use of this
smaller tasks, each of which must be completed before the particular term[95]. There is no restriction on the ability of
problem can be considered to have been solved [86, 87]. any entity to communicate with any other entity. It is
possible that the word "computer" is referring to either
These gadgets are able to communicate with one these nodes or physical computers when it is used in
another in a manner that is analogous to a conversation ordinary language. A cloud is a networked environment
thanks to their capacity to exchange messages. Because of that provides rapid access to pooled computer resources,
this, the two technical components are able to establish such as data storage (also known as "cloud storage") and
connection by using the method that is most comfortable processing power. The name "cloud" refers to this kind of
for each of them individually. A network of computers that environment[96, 97].
included nodes that were physically adjacent to each other
was referred to as a "distributed system," "distributed It is possible to use the term "cloud storage" to refer to
programming," or "distributed algorithm" in the past. These the atmosphere found in the surrounding area. A cloud is a
phrases were used to characterize the network. Even at the word that is often used to describe this kind of
current day, there is still the possibility of incorporating meteorological phenomena. This target is attainable, and if
these principles into the present-day society. In today's you put in the work that is required, you will be able to
society, these idioms continue to be extensively used and achieve it. It is possible to observe the probability of any
popular due to their widespread influence[88, 89]. unanticipated event occurring at any given instant if an
explanation of the nature of the site is not provided.
These phrases are often used in today's culture to denote Consequently, the user is relieved of the task of regularly
a broad variety of distinct computer systems, each of which monitoring the management of these resources once they
may be further subdivided into a great number of have been made available. The wealth of resources that are
subcategories. Specifically, this is due to the fact that there accessible to provide aid whenever it is needed is the reason
is no approach that is widely approved for classifying any behind this. The services that are provided by massive
of these systems[67]. The expansion of the field has clouds are often dispersed throughout a network that
resulted in the emergence of a number of new terms, such include many data centers[27, 98].
as "distributed system," "distributed programming," and
"distributed algorithm." At the present time, these phrases When describing the structure of a network, the term
are utilized in a more comprehensive sense, sometimes "vast cloud" is often used in the conversation. When seen
even to denote separate operations that are operating on the from the outside, the operation of a cloud computing
same tangible computer and interacting with each other system seems to be rather comparable to the thorough
through the exchange of signals. Changing the original explanation that will be presented in the following
meaning of a phrase throughout the course of time is an paragraphs. A straight proportional relationship exists
example of semantic evolution, which can be seen in this between the quantity of shared resources that are available
particular instance[90]. and the value of the cloud. As a result, it is very necessary
to take steps to improve the effectiveness of cloud
The meanings of the two idioms are not the same, computing[99, 100].
despite the fact that they are often used. It is possible to
make the case that the meaning of these expressions has One may be tempted to see the use of cloud computing
gradually become less specific and more general over the as a loop that perpetuates itself. is the most important factor
course of time. The following is an additional method that in determining whether or not there is a strong connection
may be used to highlight the growing significance of these between the two variables that are being investigated here.
ideas throughout the course of time: In recent years, there Additionally, it often makes use of a strategy known as the
has been a notable increase in the frequency with which "pay as you go" approach, which may be helpful in
these phrases are used. There is also the possibility of reducing the initial costs, but may also result in customers
stating that the use of these idioms has expanded incurring charges that they did not anticipate over the
throughout the course of time . Without a question, the course of this period of time[101]. Due to the fact that the
passage of time has been a crucial factor in this endeavor. "pay as you go" idea enables clients to only pay for services
One may create a generalization about idioms, which is that they really make use of, this is the case. One of the
something that is conceivable[91, 92]. factors that is contributing to this trend is the growing
prominence of "pay as you go" models. These models allow
It is possible to argue that this subject is no longer customers to make payments for services in real-time
relevant once a considerable length of time has passed. In regardless of whether or not they are really being
spite of the fact that there is no universally accepted utilized[102, 103].
definition of a distributed system, the following
characteristics are often cited as examples of distributed The rationale for this is because the "pay as you go"
systems: Every one of the several computers, also known method gives customers the ability to pay for services in a
as nodes, that are part of the network has its own local manner that is proportional to the amount of service they
memory. Only the central processing unit (CPU) has access really utilize. The most important explanation for why this
to this memory space exclusively. A few more occurrences is taking place is because of this. Users are able to pay for
also make reference to these machines and nodes in their services in real time as they are being used, which is made
respective contexts. The central processing unit (CPU) that possible by the "pay as you go" strategy. This is the reason
is now being investigated is the only one that can access why this is significant. Due to this reason, this tactic has
this memory; no other CPU can do so[93, 94]. gained more and more popularity. It is possible that the
major relevance of this technique may be ascribed to the
In most cases, the term "system" is used as a collective quick and broad adoption of this method [104].
noun to refer to the whole of the computers and nodes that
are included inside a consortium. Within the realm of the Individuals who are in favor of public and hybrid clouds
computer business, computers of this sort are often referred argue that these platforms provide businesses the

113
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

opportunity to avoid or significantly reduce the costs that Consequently, the latter may be redirected from the task
are associated with investing in information technology of fixing technical issues to the task of achieving the long-
infrastructure. One piece of evidence that lends credence to term goals of the organization. The use of cloud computing
this argument is the capacity of cloud computing to provides a number of benefits, one of which is a decrease
facilitate the sharing of resources across several businesses. in operational expenses . It is possible that this may result
In order to provide evidence in support of this argument, in considerable cost savings for a number of small and
enterprises may now make use of hybrid cloud installations, medium-sized businesses. Companies such as Amazon
which have become available as a result of cloud Web Services (AWS) and Microsoft Azure were among the
computing. Conversations of this kind are very necessary pioneers in the field of cloud computing. AWS, which
for the general development of cloud computing[105]. stands for Amazon Web Services, was the first business to
pioneer cloud computing, surpassing Microsoft Azure in
According to their point of view, cloud computing has this aspect of the industry[111].
the potential to make this ambition more feasible. In
addition, proponents of cloud computing highlight the fact Virtualization software is, without a question, the most
that the adaptability of this technology allows businesses to important piece of hardware that is associated with cloud
choose from a more extensive choice of potential solutions. computing infrastructure. Many people believe that
The use of this technology in this way results in further virtualization is the essential foundation upon which the
enhancements. Quite a few individuals believe that this is concept of cloud computing is built. One of the most
among the most important advantages that may be gained significant technological advancements that has occurred in
by using cloud computing[106]. The idea that customers recent years is virtualization. It is possible that the idea of
should be able to benefit from a broad variety of virtualization may be acknowledged as the fundamental
technologies without the requirement for extensive core basic framework of cloud computing in the future.
knowledge or competence in each specific technology is Beginning a conversation about cloud computing requires
the underlying premise that underpins cloud computing. first virtualizing the core infrastructure. This is a
The concept of "the cloud" originated from the presumption prerequisite for having the conversation[112].
that consumers should be able to take use of the services
offered by a number of different technologies[107]. Virtualization software that is dedicated to
virtualization makes it possible to split a single piece of real
The proliferation of cloud computing has made it computer hardware into a number of "virtual" spaces. In the
possible for end consumers to take use of an expanding business world, this tactic is known as partitioning. As a
spectrum of cutting-edge computer technology. This is the result, the device may suit a variety of purposes. After then,
fundamental concept that ensures the cloud is able to every one of these "virtual" entities will have the ability to
perform its assigned functions. The term "cloud govern and maintain itself independently from the others,
computing" refers to the practice of providing users with which will make the term "virtual" completely obsolete
the ability to take use of the benefits that are provided by a when referring to them[113]. Following the completion of
wide variety of technologies. Cloud computing is based on the process that came before it, this energy may be put to
the core idea of providing users with access to the use. Through the use of virtualization at the operating
advantages that are supplied by a wide variety of system level, it is possible to maximize the utilization of
technologies. The notion of cloud computing is constructed computer resources that are not being exploited to their full
on the basis of this fundamental principle [108]. potential. Considering that this option is theoretically
feasible, it is now a decision that can be considered[114].
As a result of this notion, the concept of doing
computational tasks via the use of the internet, which is The implementation of this would make it possible to
often referred to as "the cloud," may have formed. Cloud make better use of the computing resources that are already
computing is a natural result of this line of thought. It was available . This objective is more feasible to pursue since it
developed with the premise that end users should have the is quite realistic in comparison to other goals. The use of
capacity to harness the advantages given by a varied variety computer resources that were previously unavailable is
of technologies. Cloud computing was built with this made possible as a result of this. This is accomplished by
philosophy under consideration[109]. One of the primary making more efficient use of the resources available, even
reasons why cloud computing came into existence was the if doing so would result in the resources being squandered.
idea of providing users with the ability to carry out their Should things go according to plan, we will eventually have
computer chores via the usage of the cloud. Eventually, the a system that is able to increase its capacity by including
idea of "cloud computing" was used in order to convey this more processing nodes from the beginning[115]. In the
concept[68]. event that the project is successful, the following results
will be encountered. In the event that everything continues
The idea that users should be able to benefit from a to operate in accordance with the strategies, this system will
broad variety of technologies is the foundation upon which be the final result. The versatility of the system makes it
the notion of "cloud computing" is built. A natural possible for it to support a big user base that is continuously
development of this principle is the concept that people growing. Therefore, this impact is a direct result of the stage
ought to be able to reap the benefits of not just one but that came before it in the process since it is a logical
several kinds of technology. The idea is developed from consequence of the phase that came before it.
this logical progression of ideas that came before it. The
fundamental concept that behind the phrase "computing in This is an immediate consequence of the step of the
the cloud" is that it includes lowering the amount of money procedure that came before this one. By providing the
that is spent on running expenditures and enabling necessary agility, virtualization makes it possible to speed
customers to devote their time to other efforts. These are up processes that are connected to information technology.
the key motivating elements that led to the development of It is possible to achieve this goal via the use of
cloud computing infrastructure[110]. virtualization. Virtualization, on the other hand, has the

114
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

potential to reduce costs while simultaneously improving distinction between the two separate types may be made
the effectiveness of the use of infrastructure [38]. There is possible via the use of the client-server paradigm.
a potential that after everything is said and done, this will Distributed software is a term that may be used to refer to a
eventually result in cost savings. It is highly recommended particular kind of software; however, it can also be used in
that you make use of virtualization since it is the most a more generic sense to make reference to software in
practical option for accomplishing any of these goals[116]. general[121].
Providing users with the ability to offer resources on It is possible that this idea might be beneficial for any
demand is made possible by autonomous computing, which form of program that is intended to be distributed to a large
allows the automation of resource delivery. It is possible number of people. Within the context of this specific mode
that the task might be completed in an automated manner of computer operation, the client, as opposed to the server,
via the use of autonomous computing. Automation has the is the entity that is accountable for delivering the service to
potential to increase productivity by reducing the amount the user. The reason for this is because the client engages
of time needed to do a project, reducing the amount of in direct interaction with the end user[122]. This takes place
physical labor that is required, and reducing the likelihood as a result of the direct connection that exists between the
of human mistake by reducing the amount of worker personal computer of the user and the client computer
engagement. Because of the synergistic action of these (servers). The client-server architecture, which
three components, the treatment may be carried out at a demonstrates both parts of the phenomena, provides the
much faster pace[117]. explanation that is the most thorough and accurate[123].
A lower overall error rate is achieved when one of these A "computer bureau" is a subcategory of the "service
advantages is paired with the others to provide the desired bureau" category that focuses on providing services that are
effect. It makes no difference whether these benefits are associated with computers and other technologies that are
examined alone or in conjunction with one another; this is connected to them. The software, hardware, and
always the case. It is true that this statement is accurate networking issues that are associated with computers are
regardless of whether these benefits are evaluated included in these services. The majority of the time, a
individually or collectively[118]. It is up to the individual computer bureau will provide a variety of services,
to decide whether or not to take advantage of this benefit including guidance on a variety of software and hardware
before considering other options.Alternatives that are applications, instruction, and technical support. In the
conceivable are both of these scenarios. In the present context of this kind of organization, the phrases "computer
moment, the ideas of utility computing are being put into bureau" and "computer service bureau" are both
effect, which makes it possible to provide metrics for the appropriate terminology to use[123].
use of cloud-based services[30].
From a strict point of view, both of these names are
This came about as a consequence of the widespread appropriate. Over the course of the 1960s, 1970s, and
acknowledgment and implementation of utility computing 1980s, there was a considerable increase in the number of
concepts . With the development of cloud computing, this similar organizations that were established. It is the United
dream has been converted into a reality that is within States of America that was responsible for this particular
realistic reach. Prior to the implementation of these achievement. The 1960s marked the beginning of a ten-year
concepts in cloud computing, it was thought that it would era that lasted until the 1980s until its conclusion. The
be difficult to accomplish this objective. 1960s marked the beginning of this period, while the 1980s
were the decade that marked its climax. The United States
Take a look at this stunning illustration: Please take a of America is deserving of recognition for the
look at the document that is attached. As a solution to the achievements they have achieved in reaching this scientific
issues that were prominent in previous grid computing and technological milestone[124].
models, the notion of cloud computing was created as a
method of addressing the issues connected to quality of Grid computing is a kind of distributed and parallel
service (QoS) and dependability. Computing in the cloud computing that makes use of the processing power of
was created as a solution to these difficulties[119]. The several computers to create a single, unified "super and
concept of cloud computing was developed as a way to virtual computer" that is capable of doing computations on
solve these issues specifically. Computers that are stored in a massive scale. Distribution and parallel computing,
the cloud are one potential solution that was designed to sometimes referred to as "grid computing," is a method that
address these issues. The concept of cloud computing was includes the use of a network of networked computers to
developed as a means of accelerating the process of finding collectively evaluate massive volumes of data in order to
answers to the challenges that are now being faced [120]. carry out a single, large-scale activity. Grid computing is
also referred to as "distributed computing." Because of this,
The idea of doing information technology tasks over the the team is able to complete large-scale projects in a more
internet referred to as the "cloud" was established as a way expedient manner and with increased efficiency[125].
of addressing the developing challenges and finding
effective solutions. The following are topics that are often Because of this, the group is now able to do tasks that
discussed in conjunction with cloud computing, however were previously thought to be impossible in a far shorter
they are not comparable in any way: length of time and with a lot more efficiency than they were
before capable of providing.
In the context of distributed software, the term "client-
server computing" refers to a kind of software that classifies As a consequence of this, the group of computers is able
users as "clients" and "servers" in order to facilitate to do very difficult tasks in a much shorter amount of time.
communication between customers and servers. One kind of distributed and parallel computing is known as
Furthermore, this phrase may be used to refer to a certain grid computing. In this type of computing, a network of
kind of software that is spread across several computers. A computers that are only weakly linked to one another is

115
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

utilized to do very complicated tasks. As a kind of parallel implementation of an intelligent transportation system
and distributed processing, grid computing is a type of because of the high degree of interconnection that it
computing[126]. Distributed and parallel computing is a has[132]. This objective has become attainable as a result
more general category, and the "grid" is a subset of that of the transportation network's successful display of higher
larger category. As a kind of distributed and parallel intelligence. Because of the intelligence that is
computing, grid computing is a type of computing. A kind demonstrated by the transportation system, the human
of computing known as grid computing is characterized by being is given the opportunity to take use of this potential.
the use of parallel and distributed computation. The A further advantage is that the person who has the license
processing of information via the use of a grid is an is able to forecast not only their own future position but also
example of grid computing, which is a kind of distributed the movement of cars on the road. Due to the fact that they
and parallel computing[127]. possess this skill, they are now able to drive with
confidence and sagacity[133].
In reference to this concept, the phrase "grid
computing" is found. The method of processing data on a As a result of this ability's bidirectional control, the user
computer that combines distributed computing with is able to alter the flow of traffic in both the incoming and
parallel processing is referred to as "Computing on a grid," departing directions. They are equipped with the
and the word "a grid" is used to describe the technology. As knowledge and skills necessary to drive automobiles in a
a consequence of this, the group is now capable of responsible and secured way. Regardless of whether the
completing very complex tasks in a far shorter amount of flow of traffic is moving in the direction of the user or away
time and with more efficiency than ever before[128]. Grid from them, this capacity functions well in both directions.
computing is a kind of parallel and distributed computing At the beginning of the development of the Internet of
in which users primarily interact with and modify data that Things (IoT), this technology was once referred to as
is stored in a grid structure. Grid computing is also known "identification of individual items by RFID." Radio-
as grid database management. The phenomena that is being frequency identification, which is often referred to as RFID
referred to as "grid computing" has been given this name , is a technology that identifies goods by their radio
because of the extremely concentrated nature of modern frequency[134].
computers. In the realm of computer science, grid
computing comprises the whole of the subject matter that is By using radio frequency identification (RFID)
concerned with it[129]. technology, which permits the tracking of individual items,
this is made feasible. This is the full meaning of the word
As a technology, the Internet of Things' principal "radio frequency identification," which is what the
purpose is to make it easier to create intelligent settings. acronym "RFID" stands for. As well as the language that
This is accomplished via the use of other technologies. The was used in referring to it, the phrases that were employed
major objective of the Internet of Things is to accomplish to describe it made complete and utter sense. In recent
the establishment of environments that are self-aware and years, individuals in the academic community have been
capable of providing for themselves. There is a possibility using the phrase to refer to a variety of developing
that these surroundings include gadgets and devices that technologies, including sensors, actuators, mobile devices,
display these characteristics. and gadgets that are equipped with GPS[135].
The Internet of Things (IoT) has come into existence The Internet of Things (IoT) is a network of computer
with the intention of fostering greater levels of autonomy devices that are linked to one another and communicate
and self-awareness among both individuals and the planet with one another online. One example of this is the use of
itself. One of the reasons that led to the decision to follow global positioning system (GPS) technology. The term
this particular course of action was the idea that using the "global positioning system" (GPS) has also been used to a
Internet of Things would speed up the process of achieving wide variety of other things. The degree to which users' data
this overall objective. It was considered a possible privacy and security can be effectively protected will have
contributing element[130]. a substantial bearing on the pace at which new Internet-of-
Things (IoT) devices and services are adopted[136]. This is
The term "intelligent" may be used to a variety of
a very important matter that will influence the degree to
concepts, including "intelligent" goods, "intelligent" which new technologies and services that are linked to the
lifestyles, "intelligent" healthcare, and "intelligent" Internet of Things will be accepted. There are a great
educational approaches, among others. In this part, we will number of important factors that should be properly
examine the possible applications of the Internet of Things analyzed, and they have a significant impact on the extent
(IoT) in a variety of industries, such as the corporate world, of adoption. There is a substantial relationship between the
the home automation industry, and the healthcare industry. level of confidence that users have in the safety of their
Here are some examples of the many types of company personal data and information and the success of future
sectors that will be investigated in this article. A few products and services that are based on the Internet of
examples of the many different kinds of companies that will Things[137].
be described in further detail in the next part are shown
below. These are only a few of the numerous types of A crucial factor that will have a considerable impact on
businesses. An in-depth review of these applications is the rate at which future technology is adopted is the degree
going to be presented in the not too distant future [131]. to which the personal information and data of consumers
are protected. The protection of user data and the safety of
Manufacturers are able to construct large-scale information are two of the most important factors that
applications and infrastructure thanks to the Internet of determine the broad adoption of new technologies . This is
Things. The capacity to monitor cars and their whereabouts due to the fact that one of the most significant aspects
on the network in real time is granted to an observer who responsible for determining the success of new
has both a valid license and an independent transportation technologies and services linked to the Internet of Things is
system (I.T.S.). This objective may be accomplished via the

116
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

the degree to which they are accepted and adopted by the regression analysis of data from 473 manufacturing firms,
general public[138]. they investigated how an intelligent supply chain
contributes to environmental performance by managing
In light of the enormous amounts of data and green relationships and establishing eco-friendly
information that are continually gathered, the Internet of operations. The study revealed that a smart supply chain,
Devices makes it possible to conduct broad monitoring and supported by digital transformation strategies and advanced
oversight, as well as to provide widespread connection. At technologies, is directly associated with higher levels of
this point in time, this is attainable via the examination of GSCM and environmental performance. Emphasizing the
substantial volumes of data. By using this information, it is importance of integrating digital transformation, external
possible to do this. In order to accomplish this goal, certain relationships, and internal operations, the research
statistics are absolutely necessary. The gathering of highlighted the key role of these factors in enhancing
personally identifiable information via the use of a environmental performance within supply chains. Validity
mechanical technique is a possibility that may be realized of the regression analysis was ensured by checking
with the implementation of necessary measures[139]. assumptions like normality, linearity, homoscedasticity,
The vital and secret information that is obtained via an and multicollinearity, along with confirming discriminant
automated method makes this something that can be validity through pairwise comparisons between constructs
accomplished. When used to conventional computer to ensure alignment with distinct theoretical concepts.
networks, the task of protecting users' constitutionally Tamasiga, et al. [144], conducted a systematic-cum-
guaranteed right to individual privacy presents a far greater bibliometric analysis of papers in the Scopus database to
level of difficulty than when applied to the Internet of explore the intersection between green economic growth
Things (IoT). This is because the Internet of Things and FinTech. They aimed to assess the role and
encompasses a far higher number of devices than opportunities of implementing green FinTech as a catalyst
traditional networks do[140]. for transitioning towards green economic growth in African
As a result of the increasing number of devices and countries. The authors' analysis revealed a growing
appliances that are connected to the Internet via the Internet scholarly focus on green FinTech and its implications for
of Things (IoT). Due to the fact that the Internet of Things economic growth, climate change, and green policies. They
is a network that links a wide variety of different kinds of identified five main research directions, spanning
physical items, this is the reason why this makes sense. The technology, regulation, policy, climate risk mitigation,
reason for this is because, in comparison to conventional environmental quality, and green finance. Drawing from
networks, the Internet of Things makes it possible to link a these research avenues, the authors developed an integrated
much greater number of devices to one another. This comes framework aimed at leveraging FinTech to drive the
about as a direct result of the events that occurred transition towards green economic growth in African
previously. This inescapable consequence is the result of countries. This framework not only pinpointed existing
several assaults that have been launched against the Internet knowledge gaps but also offered guidance for future policy
of Things (IoT) over the course of the last few years and research endeavors. It serves as a comprehensive
roadmap for implementing green FinTech solutions in
Africa, thereby advancing sustainable development goals
III. LITERATURE REVIEW and fostering economic resilience in the region.
Here we summarize the most important review in YIN, Shi, et al. [145], conducted a study of the impact
Literature Sustainable Enterprise System Frameworks: of digital technology on green innovation within the
Integrating AI, IoT, and Security for Green Business manufacturing sector using the stress state response (PSR)
Transformation model. A measurement framework for digital green
innovation (DGI) was formulated based on this model, with
Fraga-Lamas, et al. [142], discussed the role of Green the Analytical Hierarchy Process (AHP) and the Deviation
internet of Things (G-IoT) and Edge AI in promoting Maximization Technique of Order Preference by Similarity
sustainable digital transformation towards a smart circular to Ideal Solution (TOPSIS) used for evaluation.
economy. It examines the impact of G-IoT on Edge-AI G-
IoT frameworks and demonstrates a common use case in In Chinese manufacturing, there has been a mixed
Industry 5.0. The authors highlight the challenges of upward trajectory in the overall DGI over the past five-year
enhancing IoT and show G-IoT as a solution to reduce period. Pivotal factors in the progress of DGI include the
carbon emissions. They also explore the integration of AI degree of integration of digital technology and the volume
and edge computing, particularly Edge-AI, and its potential of polluting emissions such as wastewater and exhaust
for energy efficiency. The paper emphasizes the gases. They observed discrepancies in DGI across different
importance of supportability in digital transformation and regions, with more prosperous and environmentally
provides insights on integrating G-IoT and Edge AI for a friendly regions showing higher DGI indices, along with
more sustainable circular economy. The study also explores western and southern regions showing lower DGI scores
energy utilization and its potential for future improvement and having a more equitable distribution of stress, condition
of the Edge-AI G-IoT framework. and response components.
Lerman, Laura V., et al. [143], examined the Guo, Chengxin, et al. [146], proposed a novel hybrid
relationships between digital transformation and green multiple attribute decision-making framework for
supply chain management (GSCM) to present a enterprise green marketing performance management
comprehensive perspective on smart green supply chain evaluation based on the triangular fuzzy neutrosophic sets
management (Smart GSCM). Employing a configurational (TFNSs). They introduced the TFNSs and designed the
approach, they scrutinized various facets of Smart GSCM TFN-TODIM-TOPSIS method under TFNSs with entropy.
and their impact on environmental performance. Through An illustrative case study for enterprise green marketing

117
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

performance management evaluation was provided, along raised questions about the impact of the dual transition on
with a comparative analysis with other methods. The production, trade, investment, and work, while exploring
authors validated the proposed method and demonstrated the role of science, technology, and innovation in ensuring
its effectiveness in solving multiple attribute decision- a sustainable future.
making problems in the context of green marketing
performance management. The techniques, models, Matin, Abdul, et al. [150], provided an extensive
algorithms, and specific results of the study were not examination of AIoT-based industry technology within the
detailed in the sources provided. realm of sustainable manufacturing, encompassing a
comprehensive analysis of existing literature and
Qian, Cheng, Yuying Gao, and Lifeng Chen, [147], deliberating on the current impediments encountered by
proposed an IIoT-Blockchain-based supply chain AIoT in sustainable manufacturing. They delved into the
economic evaluation (IB-SCEE) to evaluate and mitigate potential research avenues, scrutinized cutting-edge AIoT
functional growth risk factors in green supply chain methodologies, and assessed significant advancements and
management. The utilization of cutting-edge technologies, possibilities within this domain. The study employed the
such as the Industrial Internet of Things (IIoT) and PRISMA approach for a methodical review of literature,
blockchain, was employed in order to enhance and assess adopted an interdisciplinary approach to collate pertinent
environmental, social, and governance (ESG) performance. studies, and underscored the capacity of AIoT to ameliorate
The investigation underscored the significance of ongoing sustainability in manufacturing through the optimization of
exploration into the economic aspects of blockchain-driven energy consumption, waste reduction, and enhancement of
supply chains, and underscored how organizations can product standards. Moreover, areas necessitating further
enhance corporate governance, environmental research in AIoT for sustainable manufacturing were duly
sustainability, and social welfare by capitalizing on pinpointed.
blockchain's capacities in terms of openness, traceability,
and answerability. Rane, N. [151], explored the integration of artificial
intelligence (AI), Internet of Things (IoT) and big data into
The envisioned model is designed to boost the architecture, engineering and development (AEC)
recommendation and evaluation metrics while mitigating industry in this paper. He stressed collaborative endeavors
risk elements. The manuscript also deliberated upon and innovative approaches to fully harness the potential of
associated literature concerning blockchain-centric circular these developments in order to strengthen the EEC
economy frameworks, supply chain management economy. Keynote talks included parts of the Web of
structures, and corporate blockchain architecture Things, advanced computing models, big information in
blueprints. In essence, the research introduced a novel development, as well as the impact of fake visions on
framework for appraising supply chain economics utilizing development 4.0 and 5.0.
blockchain technology and exhibited its promise for
fostering sustainable progression and ethical business The idea also highlighted the collaboration between
methodologies. Blockchain technology and AI/IoT applications. This has
shown that the integration of these innovations has moved
Pratap, Saurabh, et al. [148], aimed to optimize smart forward asset management, streamlined processes, and
supply chains with embedded IoT and big data for long- advanced decision-making within the AEC department, in
term viability. They put forth theories and methods that are alignment with maintainable improvement goals (SDGs).
supported by data, with an emphasis on sustainability. The Overall, the paper provided a guide for industry partners,
study looked at how blockchain, big data, and the Internet policy makers and analysts to address the challenges and
of Things affected supply chain analysis. They talked about maximize the benefits of AI, IoT and big data integration
creating customized solutions for intelligent supply chains in AEC.
using data-driven methodologies and intelligent
architectures. The use of big data and predictive analytics Vandeven, et al. [152], propose the use of Enterprise
models to help supply chain and logistics management Architecture (EA) in the context of environmentally
fulfill internal demands and make required modifications sustainable digital transformation by introducing the
concept of Green Enterprise Architecture (GREAN). A
was also covered. In order to understand the dynamics of
smart supply chains for sustainable performance systematic literature review was conducted to ascertain the
ecosystems and industrial symbiosis networks, the authors necessity of this approach, which led to the development of
stressed the necessity for additional evidence-based study. a tool designed to map out a comprehensive strategy for
integrating environmental sustainability (ES) into digital
Quimba, Francis Mark A., et al. [149], conducted a transformations (DT) at various levels within
study on the twin transition towards sustainable organizations.
development, focusing on the convergence of the green
transition and digitalization. They analyzed the An original approach to business modeling is also
implications of this convergence on sustainable presented, one that integrates the fundamentals of
development, particularly in the context of the Philippines. environmental sustainability. The article emphasizes the
The paper utilized qualitative data synthesis and desk significant environmental impact of DTs and the potential
review to understand the dual transformation and its impact harmful effects on ES in the absence of proper
on various aspects of sustainable development. The study consideration. It stresses the importance of integrating ES
highlighted the importance of incorporating green skills into organizational strategies, business procedures, data
into the education and training curriculum to support the processing, applications and technology. The authors call
green transition. It also emphasized the role of digital for further exploration of each organizational layer,
technologies in enabling smart and sustainable comprehensive validation of the proposed tools and
urbanization, as well as promoting sustainable concepts, and expansion into a full framework through
transportation and infrastructure. Furthermore, the paper future research endeavours.

118
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

AlZubi, A. A., & Galyna, K. [153], focused on VATIN, Nikolai Ivanovich, et al. [157], conducted a
analyzing existing Internet of Things (IoT) technologies ponder on exactness farming upheld by the Web of Things
used in Smart Sustainable Agriculture (SSA) to identify (IoT) to move forward agrarian efficiency and
architectural components that could facilitate the maintainability. They utilized IoT gadgets to gather
development of SSA platforms. The study explores the information on different parameters such as temperature,
advancements in SSA and proposes an IoT and AI system dampness substance, supplement levels and creepy crawly
as a starting point. It explores the use of AI and IoT in invasions for exact observing and administration in
agriculture, including the use of robots and unmanned accuracy farming. The ponder utilized numerous straight
aerial vehicles with sensors for continuous crop and soil relapse models and manufactured neural systems to create
evaluation. performance-based models for green concrete.
AI is used to analyze soil data to identify beneficial The comes about of the think about uncovered a
crops and UAVs for real-time field information to detect positive relationship between agrarian generation and soil
food shortages, pests, or diseases. The authors conducted a dampness, with an accentuation on the significance of site-
literature review using academic databases and selected ten specific administration in exactness farming. Moreover,
articles for in-depth analysis. The proposed procedures accuracy agribusiness testing has appeared noteworthy
were considered and worked on. advancements in trim yields, with wheat seeing a 20%
increment, corn a 15% increment, and soybeans a 5%
Alshahrani, Reem, et al. [154], developed an integrated increment in abdicate. These changes have been
hybrid fuzzy multi-criteria decision making (MCDM) accompanied by a decrease within the utilize of pesticides
framework to identify the main obstacles to implementing and fertilizers, coming about in asset reserve funds. In
a sustainable cloud system powered by artificial general, the think about illustrated the potential of
intelligence (AI) in the IT domain. They used various exactness farming to revolutionize modern rural strategies
methods, models, and algorithms, including the Delphi by maximizing edit generation, upgrading supportability,
technique, Analytical Hierarchy Process, Decision and decreasing natural affect.
Experiment and Evaluation Laboratory, and Interpretive
Structural Modeling. Umoh, Aniekan Akpan, et al. [158], in this study
focused on the use of artificial intelligence (AI) and the
The research reveals that a sustainable cloud AI Internet of Things (IoT) in enhancing building performance
ecosystem is built on technological, financial, and and sustainability. The authors conducted an extensive
environmental factors. Digitization is crucial, with user literature review and qualitative analysis to examine the
propensity towards learning and collaboration in R&D synergies between AI and IoT, implementation challenges,
being the most dependent factor. The remaining 13 environmental and social impacts, and economic impacts.
interconnected factors act as barriers. The study offers Key findings highlight that the integration of AI and IoT
valuable insights for IT companies integrating sustainable significantly improves energy efficiency, improves
AI cloud systems and emphasizes environmental and building performance, and contributes to environmental
economic considerations in decision-making. sustainability.
Ismail, Mahmoud M., et al. [155], developed a The study also identifies innovative IoT solutions in
framework to evaluate businesses that use advanced building management and emphasizes the need for a
technologies like AI and big data analytics in their supply multifaceted approach, including policy interventions and
chain to improve resilience. The model was built using the educational initiatives, to overcome adoption challenges.
best worst method and Single-valued triangular The paper concludes by recommending collaborative
neutrosophic sets (SVTNSs). The Analytic Hierarchy efforts from various stakeholders to promote sustainable
Process (AHP) was used to determine the weights of architecture and building management.
indicators. Techniques for Order of Preference by
Similarity to Ideal Solution (TOPSIS) and Weighted Sum Habbal, Adib, et al. [159], presented the AI TRiSM
Model (WSM) were used to rank businesses. The results framework in this paper to support the reliability and
showed that data security was the most crucial factor, trustworthiness of AI systems in diverse industries. It has
followed by transparency. The models ranked businesses been effectively implemented in finance, healthcare and
from most to least optimal, with En1 demonstrating the other fields, demonstrating its ability to stimulate
highest level of sustainability and resilience. innovation, instill trust and generate value for both
businesses and society. The framework addressed various
Hong, Z., & Xiao, K. [156], explored the potential roles challenges such as adversarial attacks, evolving threat
of blockchain and artificial intelligence (AI) in supply landscape, organizational compliance, skill deficiencies,
chain coordination and affect moderation, as well as their and experience acquisition. Model observability and
capacity to incentivize reusing and circular trade models, interpretability played pivotal roles in the framework,
encourage carbon bookkeeping and offsetting, and advance enhancing transparency, accountability, and trust in AI
straightforwardness, traceability, and responsibility in systems.
supply chains.
The framework presented tactics for building trust,
The integration of blockchain and AI technologies into mitigating risk, and enhancing security in AI applications,
supply chain approaches was talked about, driving to a while addressing specific hurdles such as adversarial
significant advancement in effectiveness, as illustrated by a attacks, model explainability, and privacy protection. Real-
numerical examination. The integration of innovative life examples of the use of the AI TRiSM framework in
digital technologies, such as blockchain and AI, advertised healthcare highlighted the importance of transparent
critical openings to optimize generation frameworks and models in enhancing trust between patients and healthcare
financial action whereas prioritizing maintainability targets providers, protecting patient information, and ensuring the
for the improvement of society and the environment. accuracy and reliability of AI algorithms.

119
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

Singh et al. [160], systematically analyzed the role of policy, climate risk mitigation, environmental quality, and
AI research in achieving the Sustainable Development sustainable finance, offering a comprehensive framework
Goals (SDGs) using 20 years of data in AI-related fields. for deploying eco-conscious FinTech solutions.
They discovered patterns and concept-evolution
trajectories in AI applications for SDGs using bibliometric, Yin et al. (2022) scrutinize the influence of digital
path analysis, and content analysis. Globally, there has been technology on eco-friendly innovation within the
a steady rise in publications on AI for the SDGs. Targeted manufacturing industry. Their research identifies the
SDGs included peace, justice, robust institutions, amalgamation of digital technology and the mitigation of
affordable and clean energy, high-quality education, action pollution emissions as crucial elements in advancing digital
against climate change, sustainable cities and communities, eco-friendly innovation. Furthermore, the investigation
and good health and well-being. The study offered unveils disparities in digital eco-friendly innovation across
thorough explanations of how AI might help achieve the different regions, with wealthier and more environmentally
SDGs. conscious areas displaying superior performance.

Valdés-Rodríguez, Y., et al. [161], discussed current Guo et al. (2023) introduce a combined approach to
strategies for secure software development in small and multiple attribute decision-making for assessing the
medium-sized enterprises (SMEs) using agile effectiveness of eco-conscious marketing strategies in
enterprises. Their proposed framework employs triangular
methodologies. The study conducted a systematic review
of the literature and identifies strategies used in this context. fuzzy neutrosophic sets and proves to be efficient in
The results indicated that a large number of research works addressing challenges related to multiple attribute decision-
investigate security aspects within agile software making. Nevertheless, specific methodologies,
development, with a particular focus on small and medium- frameworks, and computational procedures remain
sized enterprises. unspecified in the available literature.

The manuscript examined and classified effective Qian et al. (2023) present a framework known as IIoT-
strategies for integrating security protocols into the Blockchain-based supply chain economic evaluation (IB-
software development life cycle. He emphasized the SCEE) aimed at enhancing and evaluating ESG
obstacles faced by small and medium-sized enterprises performance within green supply chain management. The
when implementing security measures and stressed the research underscores the importance of investigating the
need for a systematic and deliberate approach to addressing economic dimensions of blockchain-driven supply chains
security concerns. The study confirmed that including and underscores the potential of blockchain technology in
security protocols in Agile methodologies is essential to improving corporate governance, environmental
ensure the continuity and protection of small and medium- sustainability, and social welfare.
sized enterprises. Pratap et al. (2023) center their attention on the
optimization of intelligent supply chains utilizing
integrated IoT and big data for sustainable long-term
IV. 4. DISCUSSION AND COMPARISON operations. They underline the necessity for further
In the reviewed literature, there is a prevalent emphasis empirical research to comprehend the intricacies of
on the incorporation of cutting-edge technologies, such as intelligent supply chains and their influence on sustainable
Internet of Things (IoT), Artificial Intelligence (AI), big performance ecosystems.
data, and blockchain, in conjunction with sustainable Quimba et al. (2023) conduct an examination on the
methodologies across different sectors. These intersection of the green shift and digitalization for the
technological advancements are perceived as facilitators of promotion of sustainable development. They accentuate the
digital metamorphosis and are thought to possess the significance of integrating green competencies into
capacity to propel the shift towards a more sustainable and educational programs and training initiatives while
regenerative economy. highlighting the pivotal role of digital technologies in
Fraga-Lamas et al. (2021) accentuate the significance facilitating intelligent and sustainable urban development.
of Green Internet of Things (G-IoT) and Edge Artificial Matin et al. (2023) conduct a thorough investigation
Intelligence (AI) in facilitating sustainable digital into the utilization of AIoT-based industry technology
metamorphosis. They underscore the capacity of G-IoT in within the context of sustainable manufacturing. They
diminishing carbon emissions and its amalgamation with emphasize the potential of AIoT in the optimization of
Edge AI for enhancing energy efficiency. energy consumption, waste reduction, and the enhancement
In a similar vein, Lerman et al. (2022) deliberate on the of product standards. The research delineates specific areas
correlation between digital transformation and that necessitate further exploration in the realm of AIoT for
environmentally-friendly supply chain management sustainable manufacturing.
(GSCM). Their findings reveal that an intelligent supply Rane (2023) delves into the amalgamation of AI, IoT,
chain supported by digital transformation tactics and and big data within the architecture, engineering, and
cutting-edge technologies results in elevated levels of development (AEC) sector. The manuscript accentuates
GSCM and ecological performance. cooperative endeavors and inventive strategies aimed at
Tamasiga et al. (2022) delve into the convergence of maximizing the advantages of these technologies in the
eco-friendly economic expansion and Financial pursuit of sustainable development objectives.
Technology (FinTech). They advocate for the utilization of The Green Enterprise Architecture (GREAN) idea is
FinTech to propel the shift towards sustainable economic put up by Vandeven et al. (2023) as a way to integrate
growth in African nations. The investigation delineates environmental sustainability into digital transformations.
avenues for further research in technology, regulation, They emphasize how important it is for businesses to

120
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

incorporate sustainability into their plans, practices, transparency, traceability, and production system
applications, data processing, and technology. The report optimization.
highlights the possible negative consequences of digital
changes on environmental sustainability and asks for more Vatin et al. (2024) focus on IoT-enabled precision
investigation and verification of the suggested methods and farming to enhance agricultural sustainability and
ideas. productivity, highlighting the importance of site-specific
management and the positive correlation between soil
AlZubi and Galyna (2023) investigate the application of moisture and productivity. Both studies provide numerical
IoT and AI technologies in the field of smart sustainable analysis to demonstrate the effectiveness of these
agriculture (SSA). They pinpoint architectural elements technologies in improving supply chain efficiency and
that can help SSA systems develop more easily. The study productivity.
focuses on using AI to analyze soil data and using UAVs
equipped with sensors to gather field data in real time. After Umoh et al. (2024) explores the integration of AI and
reviewing the literature, the writers suggested certain IoT in improving building sustainability and performance.
procedures. They emphasize the importance of collaboration among
stakeholders in promoting sustainable architecture and
Alshahrani et al. (2024) create a hybrid fuzzy multi- management.
criteria decision-making framework to determine the
Habbal et al. (2024) present the AI TRiSM framework,
challenges associated with putting into practice an AI-
powered sustainable cloud infrastructure. They stress the which aims to enhance the reliability and credibility of AI
significance of environmental, financial, and technological systems in various industries. The framework addresses
aspects in creating a long-lasting AI cloud ecosystem. The issues like skill gaps, changing threat landscapes, and
report highlights the need of taking the economy and adversarial attacks, emphasizing the importance of model
environment into account when making decisions, and it observability and interpretability. The framework's
offers guidance to IT businesses on how to integrate effectiveness in enhancing trust and security in AI systems
sustainable AI cloud platforms. is demonstrated in the healthcare sector.

Ismail et al. (2024) offer a framework for assessing Singh et al. (2024) explore the role of AI research in the
companies that use big data analytics and artificial Sustainable Development Goals (SDGs), highlighting the
intelligence (AI) in their supply chains to increase increasing global interest in AI applications in energy,
resilience. To establish the weights of the indicators and education, healthcare, and climate change.
rank the businesses, they employ a variety of techniques Valdés-Rodríguez et al. (2024) discuss agile
and models. The report rates companies according to their approaches for secure software development in SMEs,
sustainability and resilience and highlights data security emphasizing the importance of incorporating security
and transparency as critical components. policies into the software development life cycle and
Hong and Xiao (2024) discuss the potential of providing tips for integrating security measures into agile
blockchain and AI in supply chain coordination and processes. Both studies highlight the growing global trend
sustainability, highlighting their potential to enhance in AI research for SDGs.

Table 1: Summary of Literature review related to the Sustainable Enterprise System Frameworks: Integrating AI, IoT,
and Security for Green Business Transformation.
Ref. Techniques & Models Algorithm Results or Significant Findings
Strategic approach
[142] Green IoT, Edge AI G-IoT frameworks, G-IoT reduces carbon emissions, integration of AI
2021 Industry 5.0 and edge computing for energy efficiency
[143] Digital transformation, Configurational Regression analysis Smart supply chain improves environmental
2022 Smart GSCM approach
performance, integration of digital transformation,
external relationships, and internal operations
[144] Green FinTech Scopus database Green FinTech as a catalyst for green economic
2022 growth in African countries, identified research

directions and developed an integrated framework


[145] Digital technology, PSR model AHP, TOPSIS Discrepancies in DGI across regions, pivotal
2022 Green innovation factors in DGI progress, relationship between

digital technology and green innovation


[146] Enterprise green Triangular fuzzy TFN-TODIM-TOPSIS Proposed a hybrid multiple attribute decision-
2023 marketing performance neutrosophic sets method with entropy making framework for enterprise green marketing
management (TFNSs) performance management evaluation based on
TFNSs. - The effectiveness of the proposed method
was demonstrated, but specific techniques, models,
or algorithms were not detailed.

[147] IIoT, Blockchain IB-SCEE for evaluating and mitigating growth risk
2023 factors in green supply chain management using
IIoT and blockchain

121
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

[148] IoT, Big data IB-SCEE Optimization of smart supply chains using IoT and
2023 big data for long-term viability, importance of
sustainability

[149] Green transition, Qualitative data Implications of convergence on sustainable


2023 Digitalization synthesis development, importance of incorporating green
skills and digital technologies

[150] AIoT, Sustainable PRISMA approach AIoT's potential in sustainable manufacturing,


(2023) manufacturing optimization of energy consumption, waste
reduction, and product standards

[151] AI, IoT, Big data Integration of AI, IoT, and big data in the AEC
2023 industry, collaboration with blockchain, impact on
asset management and decision-ma

[152] Green Enterprise Green Enterprise Use of Enterprise Architecture for environmentally
2023 Architecture Architecture (GREAN) sustainable digital transformation, introduction of
GREAN concept

[153] IoT technologies in Pressure-State- Use of AI and IoT in agriculture for continuous
2023 Smart Sustainable Response (PSR) evaluation, soil analysis, and real-time field
Agriculture (SSA) information

[154] Hybrid fuzzy multi- Delphi-technique, Analytical Identification of obstacles to implementing a


(2024) criteria decision Hierarchy Process, Decision sustainable cloud system powered by AI and
making (MCDM) Experiment and Evaluation factors influencing its ecosystem
framework Laboratory, Interpretive
Structural Modeling

[155] Best worst method, Analytic Hierarchy Techniques for Order of Framework for evaluating businesses using AI and
(2024) Single-valued Process (AHP) Preference by Similarity to big data analytics in their supply chain for
triangular neutrosophic Ideal Solution (TOPSIS), resilience and sustainability
sets (SVTNSs) Weighted Sum Model (WSM)

[156] Integration of Advancements in supply chain coordination,


(2024) blockchain and AI reusing and circular trade models, carbon
technologies in supply bookkeeping, transparency, traceability, and
chain responsibility

[157] Web of Things (IoT) in Linear regression Positive relationship between agricultural
(2024) precision farming models, artificial production and soil moisture, advancements in
neural networks crop yields, reduction in pesticide and fertilizer
usag.

[158] AI and IoT in building Improved energy efficiency, building performance,


(2024) performance and environmental sustainability through the
integration of AI and IoT

[159] AI TRiSM framework Addressing challenges in AI systems such as


(2024) for reliability and adversarial attacks, evolving threat landscape,
trustworthiness of AI compliance, and skill deficiencies
systems

[160] Analysis of AI research Bibliometric analysis, Potential of AI in contributing to SDGs, including


(2024) for Sustainable path analysis, content peace, justice, clean energy, education, climate
Development Goals analysis action, sustainable cities, and good health
(SDGs)

[161] Secure software Agile methodologies Importance of integrating security protocols into
(2024) development in small the software development life cycle in SMEs
and medium-sized
enterprises (SMEs)

V. EXTRACTED STATISTICS 34%. Artificial intelligence (AI) comes in second with a


percentage of 34%. After that, a share of 25% was recorded
As can be shown in Table I, the summary characteristics when each of the Internet of Things and artificial
and technology of the dependent procedures may be used intelligence were combined, and finally, software security
to derive significant statistical results. It is possible to accounts for 8% of the total.
extract these findings from the papers that are connected for
future investigation. A graphical representation of a
statistical result on the technologies that are used in the
process of green business transformation can be seen in
Figure 4. It is clear that the Internet of Things (IoT) has the
largest portion of the market, as seen by its percentage of

122
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

operations, improving sustainability, and advancing


environmental performance across a variety of industries.
The empirical evidence presented in this manuscript
underscores the necessity for further investigation and
validation of sustainable enterprise system frameworks to
gain a deeper understanding of their influence on intelligent
supply chains, sustainable manufacturing, smart
agriculture, urban development, and other critical domains.
By infusing green competencies into educational curricula
and training programs, organizations can develop a
workforce that possesses the requisite skills to navigate the
intricacies of sustainable growth. Furthermore, the
emphasis on cybersecurity and data protection underscores
the crucial requirement for robust security protocols when
integrating AI, IoT, and other technologies to protect
sensitive data and mitigate potential risks. Through
fostering collaboration, advocating for policy development,
and endorsing industry standards, entities can expedite the
adoption of environmentally friendly technologies and
Fig.4. Technologies used in Green Business Transformation. propel innovation towards a more sustainable future. In
conclusion, this manuscript stands as a valuable asset for
researchers, industry professionals, and policymakers
aiming to harness the potential of AI, IoT, and security
VI. RECOMMENDATIONS technologies for the advancement of environmentally
The subsequent suggestions that can be put forward conscious business practices. By implementing the
include: Encouraging Further Research: Advocating for suggestions outlined within this study, organizations can
additional empirical studies and validation of proposed refine their sustainability strategies, contribute to
frameworks to augment comprehension and environmental preservation, and pave the way for a more
implementation of sustainable enterprise systems sustainable and resilient future.
integrating AI, IoT, and security. Fostering Collaboration:
Emphasizing the significance of collaborative endeavors
among researchers, industry practitioners, and REFERENCES
policymakers to stimulate innovation and adoption of green
technologies in business transformation processes [1] A. A. Yazdeen, S. R. Zeebaree, M. M. Sadeeq, S. F. Kak, O.
programs and training initiatives to equip professionals M. Ahmed, and R. R. Zebari, "FPGA implementations for
with the requisite skills and knowledge for sustainable data encryption and decryption via concurrent and parallel
computation: A review," Qubahan Academic Journal, vol. 1,
development practices. Enhancing Data Security Measures: no. 2, pp. 8-16, 2021.
Emphasizing the importance of robust cybersecurity [2] M. A. Omer, A. A. Yazdeen, H. S. Malallah, and L. M.
measures and data protection protocols in the Abdulrahman, "A survey on cloud security: concepts, types,
amalgamation of AI, IoT, and other technologies to limitations, and challenges," Journal of Applied Science and
mitigate risks and safeguard sensitive information. Technology Trends, vol. 3, no. 02, pp. 101-111, 2022.
[3] H. S. Malallah, R. Qashi, L. M. Abdulrahman, M. A. Omer,
Supporting Policy Development: Advocating for the
and A. A. Yazdeen, "Performance analysis of enterprise cloud
formulation of policies and regulations that foster computing: a review," Journal of Applied Science and
sustainability, promote the adoption of green technologies, Technology Trends, vol. 4, no. 01, pp. 01-12, 2023.
and incentivize businesses to prioritize environmental [4] A. A. Yazdeen, R. Qashi, H. S. Malallah, L. M. Abdulrahman,
considerations in their operations. Fostering Industry and M. A. Omer, "Internet of Things Impact on Web
Standards: Promoting the establishment of industry Technology and Enterprise Systems," Journal of Applied
Science and Technology Trends, vol. 4, no. 01, pp. 19-33,
standards and best practices for sustainable enterprise 2023.
systems to ensure uniformity, compatibility, and [5] A. A. Yazdeen and S. R. Zeebaree, "Comprehensive Survey
transparency in the deployment of AI, IoT, and security for Designing and Implementing Web-based Tourist Resorts
solutions. By implementing these recommendations, and Places Management Systems," Academic Journal of
organizations can effectively utilize AI, IoT, and security Nawroz University, vol. 11, no. 3, pp. 113-132, 2022.
[6] R. J. Hassan et al., "State of art survey for iot effects on smart
technologies to propel green business transformation, city technology: challenges, opportunities, and solutions,"
enhance sustainability practices, and contribute to a more Asian Journal of Research in Computer Science, vol. 8, no. 3,
environmentally conscious and socially responsible future. pp. 32-48, 2021.
[7] H. S. Yahia et al., "Comprehensive survey for cloud
computing based nature-inspired algorithms optimization
scheduling," Asian Journal of Research in Computer Science,
VII. CONCLUSION vol. 8, no. 2, pp. 1-16, 2021.
[8] L. M. Abdulrahman et al., "A state of art for smart gateways
This comparative analysis has illuminated the issues and modification," Asian Journal of Research in
significant role played by sustainable enterprise system Computer Science, vol. 7, no. 4, pp. 1-13, 2021.
frameworks that integrate AI, IoT, and security in driving [9] A. Al-Zebari and A. Sengur, "Performance comparison of
the transformation of environmentally friendly businesses. machine learning techniques on diabetes disease detection,"
Upon thorough examination of various research studies and in 2019 1st international informatics and software
frameworks, it becomes apparent that the fusion of these engineering conference (UBMYK), 2019: IEEE, pp. 1-4.
[10] A. Zeebaree, A. Adel, K. Jacksi, and A. Selamat, "Designing
technologies offers great potential for streamlining an ontology of E-learning system for duhok polytechnic

123
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

university using protégé OWL tool," J Adv Res Dyn Control 3rd International Informatics and Software Engineering
Syst Vol, vol. 11, pp. 24-37, 2019. Conference (IISEC), 2022: IEEE, pp. 1-3.
[11] A. AL-Zebari, S. Zeebaree, K. Jacksi, and A. Selamat, [30] S. Mohsin, B. Salim, A. Mohamedsaeed, B. Ibrahim, and S.
"ELMS–DPU ontology visualization with Protégé VOWL Zeebaree, "American Sign Language Recognition Based on
and Web VOWL," Journal of Advanced Research in Dynamic Transfer Learning Algorithms," International Journal of
and Control Systems, vol. 11, pp. 478-85, 2019. Intelligent Systems and Applications in Engineering, vol. 12,
[12] A.-Z. Adel, S. Zebari, and K. Jacksi, "Football ontology no. 5s, pp. 390-399, 2024.
construction using oriented programming," Journal of [31] Z. Idrus, F. S. Rusli, Z. Idrus, M. A. M. Nazri, A. Al-zebari,
Applied Science and Technology Trends, vol. 1, no. 1, pp. 24- and N. H. A. Talib, "Swarm Plot: Data Redistribution in Non-
30, 2020. Random Technique," in 2021 6th IEEE International
[13] N. Omar, A. Al-zebari, and A. Sengur, "Deep learning Conference on Recent Advances and Innovations in
approach to predict forest fires using meteorological Engineering (ICRAIE), 2021, vol. 6: IEEE, pp. 1-6.
measurements," in 2021 2nd international informatics and [32] Q. Mustafa, F. Naglaa, and A. Adel, "Predation Capacity and
software engineering conference (IISEC), 2021: IEEE, pp. 1- Some Biological Parameters of Chrysoperla Carnea
4. (Stephens) On Aphis Craccivora Koch under Laboratory
[14] G. M. Zebari, D. A. Zebari, and A. Al-zebari, "Fundamentals Conditions."
of 5G cellular networks: A review," Journal of Information [33] B. W. Salim and S. R. Zeebaree, "Design & analyses of a
Technology and Informatics, vol. 1, no. 1, pp. 1-5, 2021. novel real time kurdish sign language for kurdish text and
[15] S. A. A.-Z. A. Selamat, "Electronic learning management sound translation system," in 2020 IEEE International
system based on semantic web technology: A review," Int. J. Conference on Problems of Infocommunications. Science and
Adv. Electron. Comput. Sci, vol. 4, no. 3, pp. 1-6, 2017. Technology (PIC S&T), 2020: IEEE, pp. 348-352.
[16] M. Turkoglu, O. F. Alcin, M. Aslan, A. Al-Zebari, and A. [34] A. A. Salih, S. Zeebaree, A. S. Abdulraheem, R. R. Zebari, M.
Sengur, "Deep rhythm and long short term memory-based Sadeeq, and O. M. Ahmed, "Evolution of mobile wireless
drowsiness detection," Biomedical Signal Processing and communication to 5G revolution," Technology Reports of
Control, vol. 65, p. 102364, 2021. Kansai University, vol. 62, no. 5, pp. 2139-2151, 2020.
[17] D. A. Zebari, D. A. Ibrahim, and A. Al-Zebari, "Suspicious [35] B. W. Salim and S. Zeebaree, "Kurdish Sign Language
region segmentation using deep features in breast cancer Recognition Based on Transfer Learning," International
mammogram images," in 2022 International Conference on Journal of Intelligent Systems and Applications in
Computer Science and Software Engineering (CSASE), 2022: Engineering, vol. 11, no. 6s, pp. 232-245, 2023.
IEEE, pp. 253-258. [36] Z. S. Ageed et al., "A survey of data mining implementation
[18] A. Al-zebari, Peer to Peer File Sharing System. LAP in smart city applications," Qubahan Academic Journal, vol.
LAMBERT Academic Publishing, 2017. 1, no. 2, pp. 91-99, 2021.
[19] N. S. A. Alsandi et al., "A Multi-Stream Scrambling and DNA [37] A. Salih, S. T. Zeebaree, S. Ameen, A. Alkhyyat, and H. M.
Encoding Method Based Image Encryption," Computer Shukur, "A survey on the role of artificial intelligence,
Systems Science & Engineering, vol. 47, no. 2, 2023. machine learning and deep learning for cybersecurity attack
[20] N. Omar, A. Al-zebari, and A. Sengur, "Improving the detection," in 2021 7th International Engineering Conference
clustering performance of the k-means algorithm for non- “Research & Innovation amid Global Pandemic"(IEC), 2021:
linear clusters," in 2022 4th International Conference on IEEE, pp. 61-66.
Advanced Science and Engineering (ICOASE), 2022: IEEE, [38] A. A. Salih et al., "Deep learning approaches for intrusion
pp. 184-187. detection," Asian Journal of Research in Computer Science,
[21] M. Barwary, K. Jacksi, and A. Al-zebari, "An Intelligent and vol. 9, no. 4, pp. 50-64, 2021.
Advance Kurdish Information Retrieval Approach with [39] H. I. Dino et al., "Impact of Process Execution and Physical
Ontologies: A Critical Analysis," International Journal of Memory-Spaces on OS Performance," Technology Reports of
Intelligent Systems and Applications in Engineering, vol. 11, Kansai University, vol. 62, no. 5, pp. 2391-2401, 2020.
no. 11s, pp. 189-199, 2023. [40] H. R. Abdulqadir et al., "A study of moving from cloud
[22] A. Al-Zebari, "Ensemble convolutional neural networks and computing to fog computing," Qubahan Academic Journal,
transformer-based segmentation methods for achieving vol. 1, no. 2, pp. 60-70, 2021.
accurate sclera segmentation in eye images," Signal, Image [41] Z. S. Ageed et al., "A state of art survey for intelligent energy
and Video Processing, vol. 18, no. 2, pp. 1879-1891, 2024. monitoring systems," Asian Journal of Research in Computer
[23] M. J. Barwary, K. Jacksi, and A. Al-Zebari, "Constructing a Science, vol. 8, no. 1, pp. 46-61, 2021.
Multilingual E-Learning Ontology through Web Crawling [42] M. A. Omer et al., "Efficiency of malware detection in
and Scraping," International Journal of Communication android system: A survey," Asian Journal of Research in
Networks and Information Security, vol. 15, no. 3, pp. 137- Computer Science, vol. 7, no. 4, pp. 59-69, 2021.
153, 2023. [43] S. Almufti, R. Asaad, and B. Salim, "Review on elephant
[24] S. H. Ahmed, A. Al-Zebari, R. R. Zebari, and S. R. Zeebaree, herding optimization algorithm performance in solving
"Parameter Tuned Deep Learning Based Traffic Critical optimization problems," International Journal of Engineering
Prediction Model on Remote Sensing Imaging," Computers, & Technology, vol. 7, no. 1, pp. 6109-6114, 2018.
Materials & Continua, vol. 75, no. 2, 2023. [44] A. S. Abdulraheem, A. I. Abdulla, and S. M. Mohammed,
[25] S. H. Haji, A. Al-zebari, A. Sengur, S. Fattah, and N. Mahdi, "Enterprise resource planning systems and challenges,"
"Document Clustering in the Age of Big Data: Incorporating Technology Reports of Kansai University, vol. 62, no. 4, pp.
Semantic Information for Improved Results," Journal of 1885-1894, 2020.
Applied Science and Technology Trends, vol. 4, no. 01, pp. [45] A. Guldner et al., "A framework for AI-based self-adaptive
34-53, 2023. cyber-physical process systems," it-Information Technology,
[26] M. Ramadhan and A. Al-zebari, "Proposed a web-based vol. 65, no. 3, pp. 113-128, 2023.
intelligent system to manage the blood bank in Zakho [46] M. Ruta, F. Scioscia, S. Ieva, G. Capurso, and E. Di Sciascio,
district," Qalaai Zanist Journal, vol. 8, no. 5, pp. 1247-1263, "Semantic blockchain to improve scalability in the internet of
2023. things," Open Journal of Internet Of Things (OJIOT), vol. 3,
[27] B. W. Salim, B. K. Hussan, Z. S. Ageed, and S. R. Zeebaree, no. 1, pp. 46-61, 2017.
"Improved Transient Search Optimization with Machine [47] B. D. Deebak et al., "A lightweight blockchain-based remote
Learning Based Behavior Recognition on Body Sensor Data," mutual authentication for AI-empowered IoT sustainable
CMC-COMPUTERS MATERIALS & CONTINUA, vol. 75, computing systems," IEEE Internet of Things Journal, vol.
no. 2, pp. 4593-4609, 2023. 10, no. 8, pp. 6652-6660, 2022.
[28] N. Omar, A. Al-Zebari, and A. Sengur, "Fourier Domain [48] F. Rohde et al., "Broadening the perspective for sustainable
Kernel Density Estimation-based Approach for Hail Sound AI: Comprehensive sustainability criteria and indicators for
classification," in 2022 3rd International Informatics and AI systems," arXiv preprint arXiv:2306.13686, 2023.
Software Engineering Conference (IISEC), 2022: IEEE, pp. [49] R. E. Armya, L. M. Abdulrahman, N. M. Abdulkareem, and
1-4. A. A. Salih, "Web-based Efficiency of Distributed Systems
[29] A. Al-Zebari, N. Omar, and A. Sengur, "Vision and IoT on Functionality of Smart City Applications," Journal
Transformers-based Hand Gesture Classification," in 2022

124
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

of Smart Internet of Things, vol. 2023, no. 2, pp. 142-161, [67] H. Shukur, S. Zeebaree, R. Zebari, O. Ahmed, L. Haji, and D.
2023. Abdulqader, "Cache coherence protocols in distributed
[50] R. M. Abdullah, L. M. Abdulrahman, N. M. Abdulkareem, systems," Journal of Applied Science and Technology Trends,
and A. A. Salih, "Modular Platforms based on Clouded Web vol. 1, no. 2, pp. 92-97, 2020.
Technology and Distributed Deep Learning Systems," [68] S. R. Zeebaree et al., "Multicomputer multicore system
Journal of Smart Internet of Things, vol. 2023, no. 2, pp. 154- influence on maximum multi-processes execution time,"
173, 2023. TEST Engineering & Management, vol. 83, no. 03, pp. 14921-
[51] S. V. Amanoul, L. M. Abdulrahman, R. M. Abdullah, and R. 14931, 2020.
Qashi, "Orchestrating Distributed Computing and Web [69] R. R. Zebari, S. R. Zeebaree, A. B. Sallow, H. M. Shukur, O.
Technology with Semantic Web and Big Data," Journal of M. Ahmad, and K. Jacksi, "Distributed denial of service attack
Smart Internet of Things, vol. 2023, no. 2, pp. 174-192, 2023. mitigation using high availability proxy and network load
[52] A. E. Mehyadin, L. M. Abdulrahman, S. H. Ahmed, and R. balancing," in 2020 International Conference on Advanced
Qashi, "Distributed Fundamentals based Conducting the Web Science and Engineering (ICOASE), 2020: IEEE, pp. 174-
Crawling Approaches and Types (Focused, Incremental, 179.
Distributed, Parallel, Hidden Web, Form Focused and [70] S. R. Zeebaree, O. Ahmed, and K. Obid, "Csaernet: An
Breadth First) Crawlers," Journal of Smart Internet of Things, efficient deep learning architecture for image classification,"
vol. 2022, no. 1, pp. 10-32, 2023. in 2020 3rd International Conference on Engineering
[53] H. R. Ismael, L. M. Abdulrahman, Z. N. Rashid, and R. Qashi, Technology and its Applications (IICETA), 2020: IEEE, pp.
"Web Technology Grounded Effects of Task Scheduling in 122-127.
Distributed and Cloud Systems," Journal of Smart Internet of [71] H. I. Dino, S. Zeebaree, O. M. Ahmad, H. M. Shukur, R. R.
Things, vol. 2022, no. 1, pp. 196-218, 2023. Zebari, and L. M. Haji, "Impact of load sharing on
[54] N. Shamsaldin, "The Influence of SIMD Architecture on the performance of distributed systems computations,"
Efficiency of Parallel Processing Approaches: From Web and International Journal of Multidisciplinary Research and
AI Perspective," Journal of Information Technology and Publications (IJMRAP), vol. 3, no. 1, pp. 30-37, 2020.
Informatics, vol. 3, no. 1, 2024. [72] L. M. Haji, S. R. Zeebaree, O. M. Ahmed, M. A. Sadeeq, H.
[55] A. Mohammed, "The Web Technology and Cloud Computing M. Shukur, and A. Alkhavvat, "Performance Monitoring for
Security based Machine Learning Algorithms for Detect Processes and Threads Execution-Controlling," in 2021
DDOS Attacks," Journal of Information Technology and International Conference on Communication & Information
Informatics, vol. 3, no. 1, 2024. Technology (ICICT), 2021: IEEE, pp. 161-166.
[56] I. Zeebaree, "The Distributed Machine Learning in Cloud [73] L. Haji, R. Zebari, S. Zeebaree, W. Abduallah, H. Shukur, and
Computing and Web Technology: A Review of Scalability O. Ahmed, "GPUs impact on parallel shared memory systems
and Efficiency," Journal of Information Technology and performance," Int. J. Psychosoc. Rehabil, vol. 24, no. 08, pp.
Informatics, vol. 3, no. 1, 2024. 8030-8038, 2019.
[57] W. K. Arabo, "The Web and AI Influences on Distributed [74] L. M. Haji, S. R. Zeebaree, Z. S. Ageed, O. M. Ahmed, M.
Consensus Protocols in Cloud Computing: A Review of A. Sadeeq, and H. M. Shukur, "Performance Monitoring and
Challenges and Opportunities," Journal of Information Controlling of Multicore Shared-Memory Parallel Processing
Technology and Informatics, vol. 3, no. 1, 2024. Systems," in 2022 3rd Information Technology To Enhance
[58] H. Akram, "The Economic and Environmental Impact of e-learning and Other Application (IT-ELA), 2022: IEEE, pp.
Sustainable Enterprise Systems: Integrating Cloud, Web 44-48.
Technology, Attacks, AI, IoT, and Security," Journal of [75] H. Rasheed, "Consideration of Cloud-Web-Concepts for
Information Technology and Informatics, vol. 3, no. 1, 2024. Standardization and Interoperability: A Comprehensive
[59] J. Jasem, "Cloud-Web Principles-based Blockchain Review for Sustainable Enterprise Systems, AI, and IoT
Technology for Sustainable and Secure Enterprise Systems Integration," Journal of Information Technology and
Integrating AI and IoT for Transparency and Traceability," Informatics, vol. 3, no. 2, 2024.
Journal of Information Technology and Informatics, vol. 3, [76] O. A. Al-Zakhali, S. Zeebaree, and S. Askar, "Comparative
no. 1, 2024. Analysis of XGBoost Performance for Text Classification
[60] I. Jubrail, "The Cloud and Web Technology Influences on with CPU Parallel and Non-Parallel Processing," Indonesian
Mitigating Environmental Footprint: A Review of Sustainable Journal of Computer Science, vol. 13, no. 2, 2024.
Logistics Solutions with AI, IoT, and Secure Enterprise [77] L. M. Abdulrahman, S. H. Ahmed, Z. N. Rashid, Y. S. Jghef,
Systems," Journal of Information Technology and T. M. Ghazi, and U. H. Jader, "Web phishing detection using
Informatics, vol. 3, no. 1, 2024. web crawling, cloud infrastructure and deep learning
[61] J. Issa, "AI-powered Sustainability Management in Enterprise framework," Journal of Applied Science and Technology
Systems based on Cloud and Web Technology: Integrating Trends, vol. 4, no. 01, pp. 54-71, 2023.
IoT Data for Environmental Impact Reduction," Journal of [78] R. R. Asaad and S. R. Zeebaree, "Enhancing Security and
Information Technology and Informatics, vol. 3, no. 1, 2024. Privacy in Distributed Cloud Environments: A Review of
[62] T. Masoud, "Distributed Systems and Web-based Inspirations Protocols and Mechanisms," Academic Journal of Nawroz
on Cybersecurity and Sustainability: A Review of the University, vol. 13, no. 1, pp. 476-488, 2024.
Intertwined Challenges and Solutions in Enterprise Systems," [79] T. M. G. Sami, S. Zeebaree, and S. H. Ahmed, "A
Journal of Information Technology and Informatics, vol. 3, comprehensive review of hashing algorithm optimization for
no. 2, 2024. IoT devices," International Journal of Intelligent Systems and
[63] M. M. Sadeeq, N. M. Abdulkareem, S. R. Zeebaree, D. M. Applications in Engineering, vol. 11, no. 6s, pp. 205-231,
Ahmed, A. S. Sami, and R. R. Zebari, "IoT and Cloud 2023.
computing issues, challenges and opportunities: A review," [80] A. A. Alkurdi and S. R. Zeebaree, "Navigating the Landscape
Qubahan Academic Journal, vol. 1, no. 2, pp. 1-7, 2021. of IoT, Distributed Cloud Computing: A Comprehensive
[64] N. M. ABDULKAREEM and S. R. ZEEBAREE, Review," Academic Journal of Nawroz University, vol. 13,
"OPTIMIZATION OF LOAD BALANCING no. 1, pp. 360-392, 2024.
ALGORITHMS TO DEAL WITH DDOS ATTACKS [81] T. Sami, S. Zeebaree, and S. Ahmed, "Designing a New
USING WHALE OPTIMIZATION ALGORITHM," Journal Hashing Algorithm for Enhancing IoT Devices Security and
of Duhok University, vol. 25, no. 2, pp. 65-85, 2022. Energy Management," International Journal of Intelligent
[65] L. M. Haji, S. Zeebaree, O. M. Ahmed, A. B. Sallow, K. Systems and Applications in Engineering, vol. 12, no. 4s, pp.
Jacksi, and R. R. Zeabri, "Dynamic resource allocation for 202-215, 2024.
distributed systems and cloud computing," TEST Engineering [82] T. M. G. Sami, S. R. Zeebaree, and S. H. Ahmed, "A novel
& Management, vol. 83, no. May/June 2020, pp. 22417- multi-level hashing algorithm to enhance internet of things
22426, 2020. devices’ and networks’ security," International Journal of
[66] K. B. Obaid, S. Zeebaree, and O. M. Ahmed, "Deep learning Intelligent Systems and Applications in Engineering, vol. 12,
models based on image classification: a review," no. 1s, pp. 676-696, 2024.
International Journal of Science and Business, vol. 4, no. 11, [83] A. Muhammed, "Distributed Systems, Web Technology,
pp. 75-81, 2020. Cloud Computing and IoT Utilization for Sustainable Asset
Management based on Al-driven Predictive Maintenance in

125
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

Enterprise Systems," Journal of Information Technology and [103] M. J. M. Jasim, S. F. Kak, Z. S. Ageed, and S. R. Zeebaree,
Informatics, vol. 3, no. 2, 2024. "Spotted Hyena Optimizer Driven Deep Learning-Based
[84] S. Zeebaree, "DES encryption and decryption algorithm Drug-Drug Interaction Prediction in Big Data Environment,"
implementation based on FPGA," Indones. J. Electr. Eng. Comput. Syst. Sci. Eng., vol. 46, no. 3, pp. 3831-3845, 2023.
Comput. Sci, vol. 18, no. 2, pp. 774-781, 2020. [104] M. R. Mahmood, M. B. Abdulrazzaq, S. Zeebaree, A. K.
[85] N. O. Salim, S. R. Zeebaree, M. A. Sadeeq, A. Radie, H. M. Ibrahim, R. R. Zebari, and H. I. Dino, "Classification
Shukur, and Z. N. Rashid, "Study for food recognition system techniques’ performance evaluation for facial expression
using deep learning," in Journal of Physics: Conference recognition," Indonesian Journal of Electrical Engineering
Series, 2021, vol. 1963, no. 1: IOP Publishing, p. 012014. and Computer Science, vol. 21, no. 2, pp. 176-1184, 2021.
[86] K. Jacksi, N. Dimililer, and S. Zeebaree, "State of the art [105] M. B. Abdulrazaq, M. R. Mahmood, S. R. Zeebaree, M. H.
exploration systems for linked data: a review," Int. J. Adv. Abdulwahab, R. R. Zebari, and A. B. Sallow, "An analytical
Comput. Sci. Appl. IJACSA, vol. 7, no. 11, pp. 155-164, 2016. appraisal for supervised classifiers’ performance on facial
[87] V. A. Saeed and S. R. Zeebaree, "Enhancing AdaBoost expression recognition based on relief-F feature selection," in
Performance: Comparative Analysis of CPU Parallel Journal of Physics: Conference Series, 2021, vol. 1804, no. 1:
Processing on Breast Cancer Classification," Indonesian IOP Publishing, p. 012055.
Journal of Computer Science, vol. 13, no. 2, 2024. [106] A. Ahmed, S. Azizi, and S. R. Zeebaree, "ECQ: An Energy-
[88] K. Jacksi, R. K. Ibrahim, S. R. Zeebaree, R. R. Zebari, and Efficient, Cost-Effective and Qos-Aware Method for
M. A. Sadeeq, "Clustering documents based on semantic Dynamic Service Migration in Mobile Edge Computing
similarity using HAC and K-mean algorithms," in 2020 Systems," Wireless Personal Communications, vol. 133, no.
International Conference on Advanced Science and 4, pp. 2467-2501, 2023.
Engineering (ICOASE), 2020: IEEE, pp. 205-210. [107] B. R. Ibrahim et al., "Embedded system for eye blink
[89] F. Abedi et al., "Severity based light-weight encryption model detection using machine learning technique," in 2021 1st
for secure medical information system," CMC-COMPUTERS Babylon International Conference on Information
MATERIALS & CONTINUA, vol. 74, no. 3, pp. 5691-5704, Technology and Science (BICITS), 2021: IEEE, pp. 58-62.
2023. [108] S. Zeebaree and K. Jacksi, "Effects of processes forcing on
[90] I. M. Zebari, S. R. Zeebaree, and H. M. Yasin, "Real time CPU and total execution-time using multiprocessor shared
video streaming from multi-source using client-server for memory system," Int. J. Comput. Eng. Res. Trends, vol. 2, no.
video distribution," in 2019 4th Scientific International 4, pp. 275-279, 2015.
Conference Najaf (SICN), 2019: IEEE, pp. 109-114. [109] D. M. Abdulqader, S. R. Zeebaree, R. R. Zebari, M. A.
[91] A. M. Abdulazeez, S. R. Zeebaree, and M. A. Sadeeq, "Design Sadeeq, U. H. Jader, and M. M. Delzy, "Parallel Processing
and implementation of electronic student affairs system," Distributed-Memory Approach Influences on Performance of
Academic Journal of Nawroz University, vol. 7, no. 3, pp. 66- Multicomputer-Multicore Systems Using Single-Process
73, 2018. Single-Thread," Wasit Journal of Engineering Sciences, vol.
[92] S. S. Hasan, Z. S. Agee, B. S. Tahir, and S. R. Zeebaree, 12, no. 1, pp. 30-40, 2024.
"Solar Radiation Prediction Using Satin Bowerbird [110] S. Zeebaree, R. R. Zebari, and K. Jacksi, "Performance
Optimization with Modified Deep Learning," Comput. Syst. analysis of IIS10. 0 and Apache2 Cluster-based Web Servers
Sci. Eng., vol. 46, no. 3, pp. 3225-3238, 2023. under SYN DDoS Attack," TEST Engineering &
[93] K. Jacksi, N. Dimililer, and S. R. Zeebaree, "A survey of Management, vol. 83, no. March-April 2020, pp. 5854-5863,
exploratory search systems based on LOD resources," 2015. 2020.
[94] N. Hussein and S. R. Zeebaree, "Performance Evaluation of [111] Y. S. Jghef et al., "Bio-inspired dynamic trust and congestion-
Extra Trees Classifier by using CPU Parallel and Non-Parallel aware zone-based secured Internet of Drone Things (SIoDT),"
Processing," Indonesian Journal of Computer Science, vol. Drones, vol. 6, no. 11, p. 337, 2022.
13, no. 2, 2024. [112] S. M. Mohammed, K. Jacksi, and S. R. Zeebaree, "Glove
[95] B. Ferzo and S. R. Zeebaree, "Distributed Transactions in word embedding and DBSCAN algorithms for semantic
Cloud Computing: A Review Reliability and Consistency," document clustering," in 2020 international conference on
Indonesian Journal of Computer Science, vol. 13, no. 3, 2024. advanced science and engineering (ICOASE), 2020: IEEE,
[96] S. M. Mohammed, K. Jacksi, and S. Zeebaree, "A state-of- pp. 1-6.
the-art survey on semantic similarity for document clustering [113] N. Omar et al., "License plate detection and recognition: A
using GloVe and density-based algorithms," Indonesian study of review," in AIP Conference Proceedings, 2023, vol.
Journal of Electrical Engineering and Computer Science, vol. 2834, no. 1: AIP Publishing.
22, no. 1, pp. 552-562, 2021. [114] A. B. Sallow, S. Zeebaree, R. R. Zebari, M. R. Mahmood, M.
[97] D. M. Abdullah and S. R. Zeebaree, "Comprehensive survey B. Abdulrazzaq, and M. Sadeeq, "Vaccine tracker/SMS
of IoT based arduino applications in healthcare monitoring," reminder system: design and implementation," ISSN (Online),
International Journal of Health Sciences, no. III, pp. 6871- pp. 2581-6187, 2020.
6892. [115] Z. N. Rashid, K. H. Sharif, and S. Zeebaree, "Client/Servers
[98] D. A. Hasan, S. R. Zeebaree, M. A. Sadeeq, H. M. Shukur, clustering effects on CPU execution-time, CPU usage and
R. R. Zebari, and A. H. Alkhayyat, "Machine learning-based CPU Idle depending on activities of Parallel-Processing-
diabetic retinopathy early detection and classification Technique operations," Int. J. Sci. Technol. Res, vol. 7, no. 8,
systems-a survey," in 2021 1st Babylon International pp. 106-111, 2018.
Conference on Information Technology and Science [116] L. M. Abdulrahman, S. R. Zeebaree, and N. Omar, "State of
(BICITS), 2021: IEEE, pp. 16-21. Art Survey for Designing and Implementing Regional
[99] H. Dino et al., "Facial expression recognition based on hybrid Tourism Web based Systems," Academic Journal of Nawroz
feature extraction techniques with different classifiers," TEST University, vol. 11, no. 3, pp. 100-112, 2022.
Engineering & Management, vol. 83, pp. 22319-22329, 2020. [117] R. K. Ibrahim, S. R. Zeebaree, K. Jacksi, M. A. Sadeeq, H.
[100] N. T. Muhammed, Z. N. Rashid, S. R. Zeebaree, Y. S. Jghef, M. Shukur, and A. Alkhayyat, "Clustering document based
R. K. Ibrahim, and T. M. G. Sami, "Design and Analysis of semantic similarity system using TFIDF and k-mean," in 2021
Proposed Smartphone-based Distributed Parallel Processing International Conference on Advanced Computer
System," in 2023 9th International Engineering Conference Applications (ACA), 2021: IEEE, pp. 28-33.
on Sustainable Technology and Development (IEC), 2023: [118] K. I. K. Jajan and S. R. Zeebaree, "Optimizing Performance
IEEE, pp. 45-50. in Distributed Cloud Architectures: A Review of
[101] U. H. Jader, M. M. Delzy, S. R. Zeebaree, R. R. Zebari, Z. N. Optimization Techniques and Tools," Indonesian Journal of
Rashid, and T. M. G. Sami, "Learning Management System Computer Science, vol. 13, no. 2, 2024.
(LMS) Performance Analysis and Evaluation for Some [119] D. Atrushi and S. R. Zeebaree, "Distributed Graph Processing
Kurdistan Region Universities," in 2023 9th International in Cloud Computing: A Review of Large-Scale Graph
Engineering Conference on Sustainable Technology and Analytics," Indonesian Journal of Computer Science, vol. 13,
Development (IEC), 2023: IEEE, pp. 177-182. no. 2, 2024.
[102] Z. M. Khalid and S. R. Zeebaree, "Big data analysis for data [120] M. A. Sadeeq and S. R. Zeebaree, "DPU-ALDOSKI dataset
visualization: A review," International Journal of Science and of Monitoring and Controlling distributed far distances energy
Business, vol. 5, no. 2, pp. 64-75, 2021.

126
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

consumed system based on Internet of Things," Data in Brief, Big Data Analytics and Data Management," Indonesian
vol. 49, p. 109455, 2023. Journal of Computer Science, vol. 13, no. 2, 2024.
[121] B. S. Tahir, Z. S. Ageed, S. S. Hasan, and S. R. Zeebaree, [140] S. M. Sulaiman and S. Zeebaree, "Impact of Parallel
"Modified wild horse optimization with deep learning enabled Processing on LightGBM Implementation a Comparative
symmetric human activity recognition model," Comput. Analysis CPU on Iris Plants Dataset," Indonesian Journal of
Mater. Contin, vol. 75, no. 2, pp. 4009-4024, 2023. Computer Science, vol. 13, no. 2, 2024.
[122] B. H. Sadiq and S. R. Zeebaree, "Parallel Processing Impact [141] S. Salih and S. R. Zeebaree, "Unveiling the Synergistic
on Random Forest Classifier Performance: A CIFAR-10 Relationship between Distributed Systems and Cloud
Dataset Study," Indonesian Journal of Computer Science, vol. Computing: A Review of Architectural Trends," Indonesian
13, no. 2, 2024. Journal of Computer Science, vol. 13, no. 2, 2024.
[123] S. M. Almufti and S. R. Zeebaree, "Leveraging Distributed [142] Fraga-Lamas, P., Lopes, S. I., & Fernández-Caramés, T. M. (2021).
Systems for Fault-Tolerant Cloud Computing: A Review of Green IoT and edge AI as key technological enablers for a
Strategies and Frameworks," Academic Journal of Nawroz sustainable digital transition towards a smart circular
University, vol. 13, no. 2, pp. 9-29, 2024. economy: An industry 5.0 use case. Sensors, 21(17), 5745.
[124] H. Taher and S. R. Zeebaree, "Harnessing the Power of [143] Lerman, L. V., Benitez, G. B., Müller, J. M., de Sousa, P. R., &
Distributed Systems for Scalable Cloud Computing A Review Frank, A. G. (2022). Smart green supply chain management:
of Advances and Challenges," Indonesian Journal of A configurational approach to enhance green performance
Computer Science, vol. 13, no. 2, 2024. through digital transformation. Supply Chain Management:
[125] C. Al-Atroshi and S. R. Zeebaree, "Distributed Architectures An International Journal, 27(7), 147-176.
for Big Data Analytics in Cloud Computing: A Review of [144] Tamasiga, P., Onyeaka, H., & Ouassou, E. H. (2022). Unlocking
Data-Intensive Computing Paradigm," Indonesian Journal of the green economy in African countries: an integrated
Computer Science, vol. 13, no. 2, 2024. framework of FinTech as an enabler of the transition to
[126] D. Hasan and S. R. Zeebaree, "Proactive Fault Tolerance in sustainability. Energies, 15(22), 8658.
Distributed Cloud Systems: A Review of Predictive and [145] Yin, S., Zhang, N., Ullah, K., & Gao, S. (2022). Enhancing digital
Preventive Techniques," Indonesian Journal of Computer innovation for the sustainable transformation of
Science, vol. 13, no. 2, 2024. manufacturing industry: a pressure-state-response system
[127] N. Abd Alnabe and S. R. Zeebaree, "Distributed Systems for framework to perceptions of digital green innovation and its
Real-Time Computing in Cloud Environment: A Review of performance for green and intelligent
Low-Latency and Time Sensitive Applications," Indonesian manufacturing. Systems, 10(3), 72.
Journal of Computer Science, vol. 13, no. 2, 2024. [146] Guo, C., Wang, Y., Yuan, S., & Li, Z. (2023). A Novel Hybrid
[128] A. Abdi and S. R. Zeebaree, "Embracing Distributed Systems Multiple Attribute Decision Making Framework for
for Efficient Cloud Resource Management: A Review of Enterprise Green Marketing Performance Management
Techniques and Methodologies," Indonesian Journal of Evaluation Based on the Triangular Fuzzy Neutrosophic Sets.
Computer Science, vol. 13, no. 2, 2024. IEEE Access.
[129] K. J. Merseedi and S. R. Zeebaree, "The cloud architectures [147] Qian, C., Gao, Y., & Chen, L. (2023). Green supply chain Circular
for distributed multi-cloud computing: a review of hybrid and economy evaluation system based on Industrial Internet of
federated cloud environment," Indonesian Journal of Things and blockchain technology under ESG Concept.
Computer Science, vol. 13, no. 2, 2024. Processes, 11(7), 1999.
[130] S. Sadiq and S. R. Zeebaree, "Distributed Systems for [148] Pratap, S., Jauhar, S. K., Gunasekaran, A., & Kamble, S. S. (2023).
Machine Learning in Cloud Computing: A Review of Optimizing the IoT and big data embedded smart supply
Scalable and Efficient Training and Inference," Indonesian chains for sustainable performance. Computers & Industrial
Journal of Computer Science, vol. 13, no. 2, 2024. Engineering, 109828.
[131] Y. S. Jghef, M. J. M. Jasim, S. R. Zeebaree, and R. R. Zebari, [149] Quimba, F. M. A., Serafica, R. B., Bayudan-Dacuycuy, C.,
"Billiards Optimization with Modified Deep Learning for Andrada, A. E., & Moreno, N. I. S. (2023). Green and Digital:
Fault Detection in Wireless Sensor Network," Computer Managing the Twin Transition toward Sustainable
Systems Science & Engineering, vol. 47, no. 2, 2023. Development (No. 2023-21). PIDS Discussion Paper Series.
[132] N. N. Ali and S. R. Zeebaree, "Distributed Resource [150] Matin, A., Islam, M. R., Wang, X., Huo, H., & Xu, G. (2023). AIoT
Management in Cloud Computing: A Review of Allocation, for sustainable manufacturing: Overview, challenges, and
Scheduling, and Provisioning Techniques," Indonesian opportunities. Internet of Things, 100901.
Journal of Computer Science, vol. 13, no. 2, 2024. [151] Rane, N. (2023). Integrating leading-edge artificial intelligence
[133] B. K. Hussan, Z. N. Rashid, S. R. Zeebaree, and R. R. Zebari, (AI), internet of things (IOT), and big data technologies for
"Optimal Deep Belief Network Enabled Vulnerability smart and sustainable architecture, engineering and
Detection on Smart Environment," Journal of Smart Internet construction (AEC) industry: Challenges and future
of Things, vol. 2022, no. 1, pp. 146-162, 2023. directions. Engineering and Construction (AEC) Industry:
[134] Z. S. Ageed, H. M. Yasin, Z. N. Rashid, and S. R. Zeebaree, Challenges and Future Directions (September 24, 2023).
"Leveraging High Resolution Remote Sensing Images for [152] Vandevenne, N., Van Riel, J., & Poels, G. (2023). Green Enterprise
Vehicle Classification using Sea Lion Optimization with Architecture (GREAN)—Leveraging EA for
Deep Learning Model," Journal of Smart Internet of Things, Environmentally Sustainable Digital
vol. 2022, no. 1, pp. 97-113, 2023. Transformation. Sustainability, 15(19), 14342.
[135] S. M. Abdulrahman et al., "INTELLIGENT HOME IOT [153] AlZubi, A. A., & Galyna, K. (2023). Artificial intelligence and
DEVICES: AN EXPLORATION OF MACHINE internet of things for sustainable farming and smart
LEARNING-BASED NETWORKED TRAFFIC agriculture. IEEE Access.
INVESTIGATION," Jurnal Ilmiah Ilmu Terapan Universitas [154] Alshahrani, R., Yenugula, M., Algethami, H., Alharbi, F.,
Jambi, vol. 8, no. 1, pp. 1-10, 2024. Goswami, S. S., Naveed, Q. N., ... & Zahmatkesh, S. (2024).
[136] J. Fadhil and S. R. Zeebaree, "Blockchain for Distributed Establishing the fuzzy integrated hybrid MCDM framework
Systems Security in Cloud Computing: A Review of to identify the key barriers to implementing artificial
Applications and Challenges," Indonesian Journal of intelligence-enabled sustainable cloud system in an IT
Computer Science, vol. 13, no. 2, 2024. industry. Expert systems with applications, 238, 121732.
[137] Z. S. Ageed, S. R. Zeebaree, and R. H. Saeed, "Influence of [155] Ismail, M. M., Ahmed, Z., Abdel-Gawad, A. F., & Mohamed, M.
quantum computing on IoT using modern algorithms," in (2024). Toward Supply Chain 5.0: An Integrated Multi-
2022 4th International Conference on Advanced Science and Criteria Decision-Making Models for Sustainable and
Engineering (ICOASE), 2022: IEEE, pp. 194-199. Resilience Enterprise. Decision making: applications in
[138] H. B. Ahmad, R. R. Asaad, S. M. Abdulrahman, A. A. Hani, management and engineering, 7(1), 160-186.
A. B. Sallow, and S. R. Zeebaree, "SMART HOME ENERGY [156] Hong, Z., & Xiao, K. (2024). Digital economy structuring for
SAVING WITH BIG DATA AND MACHINE sustainable development: the role of blockchain and artificial
LEARNING," Jurnal Ilmiah Ilmu Terapan Universitas intelligence in improving supply chain and reducing negative
Jambi, vol. 8, no. 1, pp. 11-20, 2024. environmental impacts. Scientific Reports, 14(1), 3912.
[139] Z. Arif and S. R. Zeebaree, "Distributed Systems for Data- [157] Vatin, N. I., Joshi, S. K., Acharya, P., Sharma, R., & Rajasekhar,
Intensive Computing in Cloud Environments: A Review of N. (2024). Precision Agriculture and Sustainable Yields:

127
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024
Journal of Information Technology and Informatics Vol. 03, No. 02, pp. 105-128 (2024)

Insights from IoT-Driven Farming and the Precision


Agriculture Test. In BIO Web of Conferences (Vol. 86, p.
01091). EDP Sciences.
[158] Umoh, A. A., Nwasike, C. N., Tula, O. A., Adekoya, O. O., &
Gidiagba, J. O. (2024). A REVIEW OF SMART GREEN
BUILDING TECHNOLOGIES: INVESTIGATING THE
INTEGRATION AND IMPACT OF AI AND IOT IN
SUSTAINABLE BUILDING DESIGNS. Computer Science
& IT Research Journal, 5(1), 141-165.
[159] Habbal, A., Ali, M. K., & Abuzaraida, M. A. (2024). Artificial
Intelligence Trust, Risk and Security Management (AI
TRiSM): Frameworks, applications, challenges and future
research directions. Expert Systems with Applications, 240,
122442.
[160] Singh, A., Kanaujia, A., Singh, V. K., & Vinuesa, R. (2024).
Artificial intelligence for Sustainable Development Goals:
Bibliometric patterns and concept evolution
trajectories. Sustainable Development, 32(1), 724-754.
[161] Valdés-Rodríguez, Y., Hochstetter-Diez, J., Diéguez-Rebolledo,
M., Bustamante-Mora, A., & Cadena-Martínez, R. (2024).
Analysis of Strategies for the Integration of Security Practices
in Agile Software Development: A Sustainable SME
Approach. IEEE Access.

128
𝔔𝔄𝔅𝔄𝔖 𝕮𝖊𝖓𝖙𝖗𝖊
VOLUME 03, 2024

You might also like