A Review on the Impact of Artificial Intelligence and Internet of Things in the Transformation of E Business Sector
Journal: International Journal of Trend in Scientific Research and Development (Vol.4, No. 4)Publication Date: 2020-07-14
Authors : Neha Bhujbal Shrikant Nagure;
Page : 965-966
Keywords : Computer Engineering; Artificial Intelligence; Internet of Things; E-Business; Fourth Industrial Revolution;
Abstract
This study investigates the affect of Artificial Intelligence AI and Internet of Things IoT in the transformation of E Business Segment. AI and IoT are starting to shape the longer term of many industries universally by creating an unprecedented amount of information. The objective of this study isnt to reproduce tests, but to explore and quantify the affect AI and IoT has within the transformative process of alter within the E Business segment. This ponder utilized a qualitative inquire about approach and information was collected through a orderly writing audit utilizing the snowballing look strategy. 18 peer looked into papers were identified and analyzed in connection to their pertinence to the study. Neha Bhujbal | Prof. Shrikant Nagure "A Review on the Impact of Artificial Intelligence and Internet of Things in the Transformation of E-Business Sector" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31305.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/31305/a-review-on-the-impact-of-artificial-intelligence-and-internet-of-things-in-the-transformation-of-ebusiness-sector/neha-bhujbal
Other Latest Articles
- An Automatic Load Controller for Domestic Applications
- Assessment for Water Quality of Mutha River using Correlation
- Review on Electricity Consumption Forecasting in Buildings using Artificial Intelligence
- Impact of Silicon Dioxide Nanoparticle on Fresh Water Fish Clarius Batrachus
- IoT Based Smart City Security Issues and Tokenization, Pseudonymization, Tunneling Techniques used for Data Protection
Last modified: 2020-07-14 21:55:35