stm journals
JoMTRA

Data Security in IoT

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0Swati Yelapure, Sneha Deshmukh,

[/foreach]
nJanuary 27, 2023 at 10:17 am

n

nAbstract

n

Privacy and security are among the major Internet of Things (IoT) challenges. Improper device upgrades, lack of effective and robust security agreements, user ignorance, and popularity active device monitoring is among the challenges IoT faces. In this work, we explore the background of IoT applications and security measures, and identifying alternative security as well privacy issues, methods used to protect location components and IoT-based programs, existing security solutions, and the best privacy models needed and suitable for the exception layers of IoT-operated application. IoT security is the act of safeguarding Internet devices and the networks to which they’re connected from threats and breaches by identifying, protecting, and monitoring risks, as well as assisting in the repair of vulnerabilities from a variety of devices that can pose a security risk to your company.

n

n

n

n

Volume :u00a0u00a08 | Issue :u00a0u00a03 | Received :u00a0u00a0September 21, 2021 | Accepted :u00a0u00a0December 12, 2021 | Published :u00a0u00a0December 18, 2021n[if 424 equals=”Regular Issue”][This article belongs to Journal of Multimedia Technology & Recent Advancements(jomtra)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue Data Security in IoT under section in Journal of Multimedia Technology & Recent Advancements(jomtra)] [/if 424]
Keywords Data Security, IOT devices, IoT security, Social Media Applications, Internet of Things

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. Renata L. Rosa, Gisele M. Schwartz, Wilson V. Ruggiero, and Demosthenes Z. Rodriguez, Senior Member, IEEE” A Knowledge-Based Recommendation System that includes Sentiment Analysis and Deep Learning” IEEE 2019.
2. Guang Yang, Haibo He, Fellow, IEEE, and Qian Chen” Emotion-Semantic Enhanced Neural Network” IEEE 2019.
3. M. Al-Qurishi, M. S. Hossain, M. Alrubaian, S. M. M. Rahman, and A. Alamri, “Leveraging analysis of user behavior to identify malicious activities in large-scale social networks,” IEEETransactions on Industrial Informatics, vol. 14, no. 2, pp. 799–813, Feb 2018.
4. H. Lin, J. Jia, J. Qiu, Y. Zhang, G. Shen, L. Xie, J. Tang, L. Feng, and T. S. Chua, “Detecting stress based on social interactions in social networks,” IEEE Transactions on Knowledge and Data Engineering, vol. 29, no. 9, pp. 1820–1833, Sept 2017.
5. Budhaditya Saha, Thin Nguyen, Dinh Phung, Svetha Venkatesh” A Framework for Classifying Online Mental Health Related Communities with an Interest in Depression” IEEE 2016
6. Techtarget. IoT security (internet of things security) [Online]. Available from https://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security
7. Fortinet. What Is IoT Security? [Online]. Available from https://www.fortinet.com/resources/cyberglossary/iot-security
8. Findstack. The Ultimate List of Internet of Things Statistics for 2022 [Online]. Available from https://findstack.com/internet-of-things-statistics/
9. Jigsaw. Importance Of Data Security In 2021 [Online]. Available from https://www.jigsawacademy.com/blogs/cyber-security/importance-of-data-security/
10. ISACA. Security and Privacy Challenges of IoT-enabled Solutions [Online]. Available from https://www.isaca.org/resources/isaca-journal/issues/2015/volume-4/security-and-privacy-challenges-of-iot-enabled-solutions
11. ALSO the technology provider. IOT AND SECURITY [Online]. Available from https://www.also.com/ec/cms5/en_6000/6000/blog/future-technologies/iot-security-its-importance-and-how-to-improve-it.jsp

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Journal of Multimedia Technology & Recent Advancements

ISSN: 2349-9028

Editors Overview

jomtra maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    Swati Yelapure, Sneha Deshmukh

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Assistant Professor,Department of Computer Engineering, Dhole Patil College of Engineering, Department of Computer Engineering, Dhole Patil College of Engineering,,India, India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nPrivacy and security are among the major Internet of Things (IoT) challenges. Improper device upgrades, lack of effective and robust security agreements, user ignorance, and popularity active device monitoring is among the challenges IoT faces. In this work, we explore the background of IoT applications and security measures, and identifying alternative security as well privacy issues, methods used to protect location components and IoT-based programs, existing security solutions, and the best privacy models needed and suitable for the exception layers of IoT-operated application. IoT security is the act of safeguarding Internet devices and the networks to which they’re connected from threats and breaches by identifying, protecting, and monitoring risks, as well as assisting in the repair of vulnerabilities from a variety of devices that can pose a security risk to your company.n

n

n

Keywords: Data Security, IOT devices, IoT security, Social Media Applications, Internet of Things

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Multimedia Technology & Recent Advancements(jomtra)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Multimedia Technology & Recent Advancements(jomtra)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. Renata L. Rosa, Gisele M. Schwartz, Wilson V. Ruggiero, and Demosthenes Z. Rodriguez, Senior Member, IEEE” A Knowledge-Based Recommendation System that includes Sentiment Analysis and Deep Learning” IEEE 2019.
2. Guang Yang, Haibo He, Fellow, IEEE, and Qian Chen” Emotion-Semantic Enhanced Neural Network” IEEE 2019.
3. M. Al-Qurishi, M. S. Hossain, M. Alrubaian, S. M. M. Rahman, and A. Alamri, “Leveraging analysis of user behavior to identify malicious activities in large-scale social networks,” IEEETransactions on Industrial Informatics, vol. 14, no. 2, pp. 799–813, Feb 2018.
4. H. Lin, J. Jia, J. Qiu, Y. Zhang, G. Shen, L. Xie, J. Tang, L. Feng, and T. S. Chua, “Detecting stress based on social interactions in social networks,” IEEE Transactions on Knowledge and Data Engineering, vol. 29, no. 9, pp. 1820–1833, Sept 2017.
5. Budhaditya Saha, Thin Nguyen, Dinh Phung, Svetha Venkatesh” A Framework for Classifying Online Mental Health Related Communities with an Interest in Depression” IEEE 2016
6. Techtarget. IoT security (internet of things security) [Online]. Available from https://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security
7. Fortinet. What Is IoT Security? [Online]. Available from https://www.fortinet.com/resources/cyberglossary/iot-security
8. Findstack. The Ultimate List of Internet of Things Statistics for 2022 [Online]. Available from https://findstack.com/internet-of-things-statistics/
9. Jigsaw. Importance Of Data Security In 2021 [Online]. Available from https://www.jigsawacademy.com/blogs/cyber-security/importance-of-data-security/
10. ISACA. Security and Privacy Challenges of IoT-enabled Solutions [Online]. Available from https://www.isaca.org/resources/isaca-journal/issues/2015/volume-4/security-and-privacy-challenges-of-iot-enabled-solutions
11. ALSO the technology provider. IOT AND SECURITY [Online]. Available from https://www.also.com/ec/cms5/en_6000/6000/blog/future-technologies/iot-security-its-importance-and-how-to-improve-it.jsp

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Journal of Multimedia Technology & Recent Advancements

n

[if 344 not_equal=””]ISSN: 2349-9028[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 8
Issue 3
Received September 21, 2021
Accepted December 12, 2021
Published December 18, 2021

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More
JoMTRA

Hawk Eye Detection System (Using Python)

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0Sheetal S. Patil,

[/foreach]
nJanuary 27, 2023 at 10:07 am

n

nAbstract

n

Tennis and cricket are gaining popularity. Hawk eye is a modern tool that can be applied to any sport. Now a days there is lots of advancement in the sports technology. Hawk Eye first gained notoriety in television broadcasts of cricket. Broadcasters used Hawk-Cricket Eye’s System at the 2006 ICC Champions Trophy in India, the World Cup, and important Test and ODI series all over the world since 2001. A virtual reality device called Hawk-Eye is a line calling system that tracks a ball’s trajectory. It has become common due to the plethora of help this technology offers to enhance game quality. Six calibrated high-speed professional vision processing cameras that are distributed throughout the ground are used by Hawk-Eye. Additionally, the system calibrates the two “Mat” broadcast cameras it utilises to ensure that the visual is always superimposed in the proper location. The way in which it operates then allows the game’s officials to understand where the ball has pitched and what its onward trajectory would have been. The Hawk-Eye framework is divided into two sizable
components: the Tracking System, which includes a camera and a speed weapon, and the Video Replay System, which records data to aid arbitrators in making decisions and to aid coaches and players in analysing their performance. However, there is very less research available in this area. Examples of Hawk-Eye statistics include: LBWs, Wagon Wheels, De Spin, Pitch Maps, Beehives, RailCam, Reaction Time, Ball Speeds. The purpose of this paper is to discuss the principle behind Hawk Eye, many of its applications, future developments, system precision, and system dependability in the sport of cricket. Keywords: Hawk Eye, D

n

n

n

n

Volume :u00a0u00a09 | Issue :u00a0u00a02 | Received :u00a0u00a0July 18, 2022 | Accepted :u00a0u00a0August 6, 2022 | Published :u00a0u00a0August 18, 2022n[if 424 equals=”Regular Issue”][This article belongs to Journal of Multimedia Technology & Recent Advancements(jomtra)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue Hawk Eye Detection System (Using Python) under section in Journal of Multimedia Technology & Recent Advancements(jomtra)] [/if 424]
Keywords Hawk Eye, DRS, LBW, Despin, cricket, tennis, camera technology

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. Mukesh Kumar Verma. Hawk Eye Technology. International Journal of Engineering Research in Computer Science and Engineering (IJERCSE). 2017; 4 (6): 88–94. 2. BBC Sport. Alec Stewart (Aug 14, 2013). Ashes 2013: Bring back ‘home’ umpires. BBC, London [Online]. Available from https://www.bbc.com/sport/cricket/23683136
3. L M Jayalath. Hawk Eye Technology Used in Cricket. South Asian Research Journal of Engineering and Technology. 2021; 3 (2): 55–67.
4. Harry Collins, Robert Evans. Sport-decision aids and the “CSI-effect”: Why cricket uses Hawk-Eye well and tennis uses it badly. Public Understanding of Science. 2012; 21 (8): 904–921.
5. Techentice. Abhirup Ghosh (June 15, 2019). Application Of Hawk-Eye Technology In Sports [Online]. Available from https://www.techentice.com/application-of-hawk-eye-technology-in-sports/ 6. Abhinav Sacheti, Ian Gregory-Smith, et al. Home bias in officiating: evidence from international cricket. 2015; 178 (3): 741–755.
7. Iskakov Ualikhan, Breido Josif. Development of Control Algorithm for Adaptive Leakage Current Protection Devices’ using Fuzzy Logic. 25th DAAAM International Symposium on Intelligent Manufacturing and Automation, DAAAM 2014. Procedia Engineering 100 (2015): 666–671. 8. Espncricinfo. Ian Chappell (Jan 27, 2013). Take the DRS out of the players’ hands [Online]. Available from https://www.espncricinfo.com/story/ian-chappell-take-the-drs-out-of-the-players-hands-602216 9. R.J. Valkenburg, A.M. McIvor. Accurate 3D measurement using a structured light system. Image and Vision Computing. 1998; 16 (2): 99–110. 10. Higo T, Matsushita Y, Joshi N, Ikeuchi K. A hand-held photometric stereo camera for 3-d modelling. In 2009 IEEE 12th International Conference on Computer Vision 2009 Sep 1 (pp. 1234–1241). IEEE.

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Journal of Multimedia Technology & Recent Advancements

ISSN: 2349-9028

Editors Overview

jomtra maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    Sheetal S. Patil

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Associate Professor,Department of Computer Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering,,India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nTennis and cricket are gaining popularity. Hawk eye is a modern tool that can be applied to any sport. Now a days there is lots of advancement in the sports technology. Hawk Eye first gained notoriety in television broadcasts of cricket. Broadcasters used Hawk-Cricket Eye’s System at the 2006 ICC Champions Trophy in India, the World Cup, and important Test and ODI series all over the world since 2001. A virtual reality device called Hawk-Eye is a line calling system that tracks a ball’s trajectory. It has become common due to the plethora of help this technology offers to enhance game quality. Six calibrated high-speed professional vision processing cameras that are distributed throughout the ground are used by Hawk-Eye. Additionally, the system calibrates the two “Mat” broadcast cameras it utilises to ensure that the visual is always superimposed in the proper location. The way in which it operates then allows the game’s officials to understand where the ball has pitched and what its onward trajectory would have been. The Hawk-Eye framework is divided into two sizable
components: the Tracking System, which includes a camera and a speed weapon, and the Video Replay System, which records data to aid arbitrators in making decisions and to aid coaches and players in analysing their performance. However, there is very less research available in this area. Examples of Hawk-Eye statistics include: LBWs, Wagon Wheels, De Spin, Pitch Maps, Beehives, RailCam, Reaction Time, Ball Speeds. The purpose of this paper is to discuss the principle behind Hawk Eye, many of its applications, future developments, system precision, and system dependability in the sport of cricket. Keywords: Hawk Eye, Dn

n

n

Keywords: Hawk Eye, DRS, LBW, Despin, cricket, tennis, camera technology

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Multimedia Technology & Recent Advancements(jomtra)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Multimedia Technology & Recent Advancements(jomtra)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. Mukesh Kumar Verma. Hawk Eye Technology. International Journal of Engineering Research in Computer Science and Engineering (IJERCSE). 2017; 4 (6): 88–94. 2. BBC Sport. Alec Stewart (Aug 14, 2013). Ashes 2013: Bring back ‘home’ umpires. BBC, London [Online]. Available from https://www.bbc.com/sport/cricket/23683136
3. L M Jayalath. Hawk Eye Technology Used in Cricket. South Asian Research Journal of Engineering and Technology. 2021; 3 (2): 55–67.
4. Harry Collins, Robert Evans. Sport-decision aids and the “CSI-effect”: Why cricket uses Hawk-Eye well and tennis uses it badly. Public Understanding of Science. 2012; 21 (8): 904–921.
5. Techentice. Abhirup Ghosh (June 15, 2019). Application Of Hawk-Eye Technology In Sports [Online]. Available from https://www.techentice.com/application-of-hawk-eye-technology-in-sports/ 6. Abhinav Sacheti, Ian Gregory-Smith, et al. Home bias in officiating: evidence from international cricket. 2015; 178 (3): 741–755.
7. Iskakov Ualikhan, Breido Josif. Development of Control Algorithm for Adaptive Leakage Current Protection Devices’ using Fuzzy Logic. 25th DAAAM International Symposium on Intelligent Manufacturing and Automation, DAAAM 2014. Procedia Engineering 100 (2015): 666–671. 8. Espncricinfo. Ian Chappell (Jan 27, 2013). Take the DRS out of the players’ hands [Online]. Available from https://www.espncricinfo.com/story/ian-chappell-take-the-drs-out-of-the-players-hands-602216 9. R.J. Valkenburg, A.M. McIvor. Accurate 3D measurement using a structured light system. Image and Vision Computing. 1998; 16 (2): 99–110. 10. Higo T, Matsushita Y, Joshi N, Ikeuchi K. A hand-held photometric stereo camera for 3-d modelling. In 2009 IEEE 12th International Conference on Computer Vision 2009 Sep 1 (pp. 1234–1241). IEEE.

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Journal of Multimedia Technology & Recent Advancements

n

[if 344 not_equal=””]ISSN: 2349-9028[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 9
Issue 2
Received July 18, 2022
Accepted August 6, 2022
Published August 18, 2022

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More
JoMTRA

A Study on Remote Online Notarization and E-signatures

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0Adarsh Kumar Mishra, Kaushal Kamalashankar Mishra,

[/foreach]
nJanuary 27, 2023 at 9:58 am

n

nAbstract

n

The e-signatures and remote online notarization application allows notary attorneys and anyone else who needs to certify electronic documents to use secure electronic notarization. E-notary software provides first-rate security and convenience method for both businesses and consumers who deal with notarizations on a regular basis. The software also allows for transparent access to documents that are waiting to be countersigned, as well as to those who have been granted access to sensitive documents. E-notary software can be used by any organization and professional that preliminarily needed notarization; a limited case of the documents that e-notary results can legalize includes property deeds, agreements, and affidavits, among others. The advantages of using an e-notary application include saving time and resources that would otherwise be allocated to the notarization process, providing inspection trails, and ensuring the data integrity of sensitive documents. Certain enotary results grease web conferencing functionality to allow for remote notarization.

n

n

n

n

Volume :u00a0u00a09 | Issue :u00a0u00a01 | Received :u00a0u00a0April 1, 2022 | Accepted :u00a0u00a0April 19, 2022 | Published :u00a0u00a0April 22, 2022n[if 424 equals=”Regular Issue”][This article belongs to Journal of Multimedia Technology & Recent Advancements(jomtra)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue A Study on Remote Online Notarization and E-signatures under section in Journal of Multimedia Technology & Recent Advancements(jomtra)] [/if 424]
Keywords E-notary, e-signatures, remote online notarization, law, contract management software

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. National Government Service Portal [Online]. Available from https://services.india.gov.in/.
2. Government of India. Department of Legal Affairs. [Online]. Available from https://legalaffairs.gov.in/notary-cell
3. Government of India (2021). Ministry of Law & Justice: Department of Legal Affairs. [Online]. Available from https://legalaffairs.gov.in/sites/default/files/NOTARY-ONLINE.pdf. 4. Stark J, Nathan P, Papaconstantinou J, Lagerstrom P, Hope P. Building Android apps with HTML, CSS, and JavaScript. California: O’Reilly Media, Inc.; 2010 Sep 27. 5. Duckett J. Beginning HTML, XHTML, CSS, and javascript. John Wiley & Sons; 2011 Feb 17. 6. Reiniger T, Hunter R, Rogers Jr JT. The Rise of Online Notarization and Remote Witnessing as Legal Services: Implications for the Real Property and Probate Bars. Real, Prop, Tr Est L J. 2021 Mar 1; 56(1): 53–70. 7. Forder J. The inadequate legislative response to e-signatures. Comput Law Secur Rev. 2010 Jul 1; 26(4): 418–26.
8. Graux H. Rethinking the e-signatures directive: on laws, trust services, and the digital single market. Digital Evidence & Elec Signature L Rev. 2011; 8: 9–24. 9. Towle HK. E-Signatures: Basics of the US Structure. Hous L Rev. 2001; 38(3): 921. 10. Chodos M. The emergence of the online notary: Implications for the probate bar. Prob & Prop. 2019; 33: 59.

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Journal of Multimedia Technology & Recent Advancements

ISSN: 2349-9028

Editors Overview

jomtra maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    Adarsh Kumar Mishra, Kaushal Kamalashankar Mishra

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Research Scholar,Thakur Institute of Management Studies,,India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nThe e-signatures and remote online notarization application allows notary attorneys and anyone else who needs to certify electronic documents to use secure electronic notarization. E-notary software provides first-rate security and convenience method for both businesses and consumers who deal with notarizations on a regular basis. The software also allows for transparent access to documents that are waiting to be countersigned, as well as to those who have been granted access to sensitive documents. E-notary software can be used by any organization and professional that preliminarily needed notarization; a limited case of the documents that e-notary results can legalize includes property deeds, agreements, and affidavits, among others. The advantages of using an e-notary application include saving time and resources that would otherwise be allocated to the notarization process, providing inspection trails, and ensuring the data integrity of sensitive documents. Certain enotary results grease web conferencing functionality to allow for remote notarization.n

n

n

Keywords: E-notary, e-signatures, remote online notarization, law, contract management software

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Multimedia Technology & Recent Advancements(jomtra)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Multimedia Technology & Recent Advancements(jomtra)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. National Government Service Portal [Online]. Available from https://services.india.gov.in/.
2. Government of India. Department of Legal Affairs. [Online]. Available from https://legalaffairs.gov.in/notary-cell
3. Government of India (2021). Ministry of Law & Justice: Department of Legal Affairs. [Online]. Available from https://legalaffairs.gov.in/sites/default/files/NOTARY-ONLINE.pdf. 4. Stark J, Nathan P, Papaconstantinou J, Lagerstrom P, Hope P. Building Android apps with HTML, CSS, and JavaScript. California: O’Reilly Media, Inc.; 2010 Sep 27. 5. Duckett J. Beginning HTML, XHTML, CSS, and javascript. John Wiley & Sons; 2011 Feb 17. 6. Reiniger T, Hunter R, Rogers Jr JT. The Rise of Online Notarization and Remote Witnessing as Legal Services: Implications for the Real Property and Probate Bars. Real, Prop, Tr Est L J. 2021 Mar 1; 56(1): 53–70. 7. Forder J. The inadequate legislative response to e-signatures. Comput Law Secur Rev. 2010 Jul 1; 26(4): 418–26.
8. Graux H. Rethinking the e-signatures directive: on laws, trust services, and the digital single market. Digital Evidence & Elec Signature L Rev. 2011; 8: 9–24. 9. Towle HK. E-Signatures: Basics of the US Structure. Hous L Rev. 2001; 38(3): 921. 10. Chodos M. The emergence of the online notary: Implications for the probate bar. Prob & Prop. 2019; 33: 59.

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Journal of Multimedia Technology & Recent Advancements

n

[if 344 not_equal=””]ISSN: 2349-9028[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 9
Issue 1
Received April 1, 2022
Accepted April 19, 2022
Published April 22, 2022

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More