Claim Missing Document
Check
Articles

Found 4 Documents
Search

Metaverse Security Challenges and Solutions: A Comprehensive Analysis of Contemporary Technologies Rahimi, Nasrallah; Hakimi, Musawer; Rahmani, Khoshal; Rastagari, Mohammad Aziz; Danish, Jawad; Shahbazi, Hafizullah
INTERNATIONAL JOURNAL ON ADVANCED TECHNOLOGY, ENGINEERING, AND INFORMATION SYSTEM Vol. 4 No. 1 (2025): FEBRUARY
Publisher : Transpublika Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55047/ijateis.v4i1.1674

Abstract

The metaverse, the virtual world integrating augmented reality, virtual reality, and other digital technologies, poses tremendous opportunities and challenges regarding security, privacy, and governance. With digital worlds such as the metaverse beginning to take place, user-generated content and user interaction are proving to be more and more a daunting task. In this paper, the metaverse security challenge is discussed and some proposals and recommendations are formulated. This study used a mixed-methods approach and surveyed data from 85 students, lecturers, and technical professionals who were interested in information technology. Quantitative data were captured through structured questionnaires and surveys, and processed in SPSS, and qualitative data were elicited through thematic analysis. The results suggest strong support for the metaverse, yet raise concerns for technical limitations, privacy issues and environmental impacts. Technical problems like hardware requirements and system lag were discovered by 50% of the respondents to be significant barriers, 12% mentioned privacy and security concerns as barriers, and 7% reported other types of barriers such as access issues. Most respondents were concerned that the metaverse was not very safe but reported areas for improvement. The study advises stricter regulation, better legislation on data privacy, and a better reporting mechanism to combat online abuse. Therefore, the work adds to a new metaverse security literature and provides applied policy, governance, and space-building lessons. With the expansion and further development of the metaverse, future research will be required to deconstruct these dimensions more extensively.
Transforming Rural Communities through IoT: Socio-Digital Challenges and Opportunities in Afghan Agriculture Azizi, Abdullah; Himmat, Bilal; Danish, Jawad
APLIKATIF: Journal of Research Trends in Social Sciences and Humanities Vol. 4 No. 2 (2025): APLIKATIF: Journal of Research Trends in Social Sciences and Humanities
Publisher : Lembaga Junal dan Publikasi, Universitas Muhammadiyah Buton

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59110/aplikatif.v4i2.618

Abstract

This study investigates the challenges and opportunities associated with implementing Internet of Things (IoT) technologies in Afghanistan's agricultural sector. Using a mixed methods approach comprising surveys, interviews, and focus group discussions with 200 participants across various regions the research assesses awareness, adoption, and perceived value of IoT among Afghan farmers. Findings show that while 60% of respondents were aware of IoT, only 30% had adopted such technologies. Key barriers include inadequate infrastructure, high costs, and limited technical expertise. Social factors—such as digital illiteracy and unequal access to technology—further restrict uptake, especially in marginalized rural communities. Despite these constraints, significant opportunities exist in areas like smart irrigation, crop health monitoring, and data-driven farming. These technologies hold promises for enhancing efficiency and sustainability while promoting digital inclusion and reducing regional disparities. The study underscores the need for targeted investment in infrastructure, training, and awareness to enable broader adoption. Its insights are critical for policymakers and stakeholders seeking to advance inclusive, technology-driven agricultural development in Afghanistan.
Blockchain Applications in Network Engineering: From Secure Routing to Decentralized Identity Management Ranjbar, Obaidullah; Aziz Rastagari, Mohammad; Azimi, Sanayee; Danish, Jawad
Journal of Advanced Computer Knowledge and Algorithms Vol. 2 No. 4 (2025): Journal of Advanced Computer Knowledge and Algorithms - October 2025
Publisher : Department of Informatics, Universitas Malikussaleh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29103/jacka.v2i4.23670

Abstract

Blockchain technology has emerged as a promising solution to address critical security and privacy challenges in network engineering. Its decentralized, immutable, and transparent nature enables enhanced secure routing and decentralized identity management, which are vital for modern network infrastructures such as IoT, smart cities, and vehicular networks. This study systematically reviews recent literature from reputable databases, including IEEE Xplore, ScienceDirect, MDPI, ACM Digital Library, and Web of Science, covering publications from 2016 to 2024. Using a structured search and selection process, 29 relevant studies were analyzed to explore the effectiveness of blockchain-based secure routing mechanisms, features of decentralized identity frameworks, and the technical challenges related to blockchain integration. The findings reveal that blockchain significantly improves network security by preventing threats like route hijacking and Sybil attacks while empowering users with self-sovereign identity control. However, challenges such as energy consumption, latency, scalability, and interoperability remain critical obstacles. The review recommends further development of energy-efficient consensus algorithms, scalable architectures, and interoperability standards to enable broader adoption. Overall, blockchain presents a transformative approach for securing and managing complex network environments, provided that its limitations are carefully addressed in future research.
A Comprehensive Survey of 5G Network Architecture: Techniques, Protocols, and Performance Metrics Ranjbar, Obaidullah; Aziz Rastagari, Mohammad; Azimi, Sanayee; Danish, Jawad
Gameology and Multimedia Expert Vol. 2 No. 4 (2025): Gameology and Multimedia Expert - October 2025
Publisher : Department of Informatics Faculty of Engineering Universitas Malikussaleh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29103/game.v2i4.23671

Abstract

This study examines the current state and readiness of 5G network deployment among major telecom operators in Afghanistan, including Roshan, Afghan Wireless Communication Company (AWCC), and ATOMA Telecom. The purpose is to evaluate the architecture, protocols, and performance metrics related to 5G implementation, alongside the challenges faced by the industry in this transitional phase. Using a quantitative survey methodology, data were collected from 50 technical professionals involved in network planning and management. The survey explored infrastructure types in use, stages of 5G planning, familiarity with advanced 5G technologies, and perceived barriers to deployment. Results indicate that while 4G/LTE and 3G remain dominant infrastructures, only a small fraction of organizations have begun 5G trials or deployments. Key obstacles include high infrastructure costs, regulatory issues, spectrum availability, and limited skilled workforce. Additionally, adoption of enabling technologies such as Network Function Virtualization and Software-Defined Networking is emerging but not yet widespread. Overall, the findings highlight that Afghan telecom operators are in the early stages of 5G readiness, requiring significant investment and regulatory support to accelerate deployment. This research contributes valuable insights for policymakers and industry stakeholders aiming to enhance Afghanistan’s 5G ecosystem.