IJSRET » January 3, 2025

Daily Archives: January 3, 2025

Uncategorized

Revolutionizing Neonatal Care: The Role of Embrace Innovations in Addressing Infant Mortality in Resource-Constrained Settings

Revolutionizing Neonatal Care: The Role of Embrace Innovations in Addressing Infant Mortality in Resource-Constrained Settings/strong>
Authors:-Ashish Pattnaik, Rishika Patwari, Rishi Kumar Karnani, Aayushman Joshi

Abstract-This paper explores the innovative business model of Embrace Innovations, a social enterprise committed to tackling the critical issue of infant mortality in resource-constrained settings, especially in India. Founded with the mission of offering affordable and effective infant care solutions, Embrace has developed the Embrace Infant Warmer as a cost-effective alternative to traditional incubators. In analysing the operational strategies, market dynamics, and impact of Embrace’s products on neonatal health outcomes, the study uses a mixed-method approach through applying qualitative and quantitative research methods. Conducting in-depth interviews and surveys with relevant stakeholders which lead to important discoveries about how Embrace was able to effectively penetrate these markets through its unique value proposition: affordability, portability, and user-friendliness. The paper discusses the challenges of the organization, such as high maintenance costs and regulatory compliance issues. Ultimately, this research would highlight the potential for Embrace Innovations to transform infant healthcare through continuous innovation and strategic partnerships, thereby contributing significantly to reducing infant mortality rates globally.

DOI: 10.61137/ijsret.vol.10.issue6.411

Published by:
Uncategorized

A Robust and Secure Image Watermarking Technique for Digital Data: State-of-the-Art

A Robust and Secure Image Watermarking Technique for Digital Data: State-of-the-Art/strong>
Authors:-Bhupendra Kumar Bhardwaj, Professor Dr. Satya Singh

Abstract-With the fast development of computer technology, research in the fields of multimedia (text, image, audio and video clip) security, image processing and robot vision have recently become popular. Digital image watermarking techniques is one of the best techniques for image authentication. Watermarking algorithms are designed to embed and extract digital watermarks within digital content, such as images, audio, or video. The basic objective of the watermarking technique is to enhance imperceptibility, capacity and robustness. When developing an effective watermark method, it’s necessary to have a highly balanced trade-off between imperceptibility, capacity, and robustness. In this paper we presence about watermarking system, requirements for digital image watermarking, challenging issue of watermarking, application of watermarking, importance of watermarking, image watermarking classification, various watermarking techniques, attacks on watermarking process, performance measure for evaluating the image quality using metrics and a short view of watermarking tools. The work gives a view on various watermarking schemes in digital images that give new ideas to improve the already existing techniques.

DOI: 10.61137/ijsret.vol.10.issue6.410

Published by:
Uncategorized

Data Narratives Using AI: A Framework for Automated Insight Storytelling

Data Narratives Using AI: A Framework for Automated Insight Storytelling/strong>
Authors:-Soundhar B, Associate Professor Dr S R Raja

Abstract-In today’s data-driven world, organizations are faced with an ever-growing volume of raw data that often requires sophisticated analysis to extract meaningful insights. However, the complexity of these insights can make it difficult for decision-makers, especially non-experts, to understand and act on the information. This paper proposes a novel framework that leverages Artificial Intelligence (AI) to automatically generate data narratives, transforming raw data into human-readable insights. The framework integrates data preprocessing, advanced AI techniques, and natural language processing (NLP) models to construct compelling and insightful narratives. We present a detailed methodology, including the use of clustering, trend analysis, and regression models to extract key insights from diverse data sources. The generated narratives are tested on multiple datasets, demonstrating their effectiveness in conveying actionable insights in an easily understandable format. Our results show that AI-generated data stories not only provide clarity and context but also enhance decision-making processes across various industries. Future work will focus on enhancing the framework’s adaptability to real-time data and improving narrative customization for different stakeholders.

DOI: 10.61137/ijsret.vol.10.issue6.409

Published by:
Uncategorized

AI Enabled Digital Media Versus Print media

AI Enabled Digital Media Versus Print media/strong>
Authors:-Research Scholar Seethal George, Dr. Prachi Chathurvedhi

Abstract-The introduction of artificial intelligence ultimately changing the media landscape, this lead to digital divide between traditional media and modern media. This research paper emphasize on the challenges opportunities strength and weakness faced by traditional media in this artificial intelligence era. Modern technology can replace the older one see but in the case of print media that is News Papers and magazines are not replaceable. Digital technological advancements are a part of our life but usage of traditional print medias became a habit of our generation. Through comparative analysis and expert interview this paper prose how artificial intelligence influence traditional media.

DOI: 10.61137/ijsret.vol.10.issue6.408

Published by:
Uncategorized

Computer Network Secure Communication and Encryption Algorithm

Computer Network Secure Communication and Encryption Algorithm/strong>
Authors:-Janani J, Associate Professor Dr S R Raja

Abstract-Due to the continuous progress of Internet technology, computer network communication service has replaced the traditional short message service and multimedia message service. In order to ensure the security of the instant messaging system, some advanced security encryption algorithms are used in the communication system to prevent attacks and information leakage. By using encryption algorithms, the network security research based. Our system operates on a network of nodes, where each node plays a crucial role in ensuring the security and integrity of transmitted data. The SHA-256 algorithm is employed for generating hash values, providing a secure and efficient means of verifying data integrity. Furthermore, we implement AES (Advanced Encryption Standard) for file encryption, enhancing the confidentiality and privacy of sensitive information. AES is a symmetric key encryption algorithm renowned for its strength and efficiency, by combining SHA-256 for integrity checking and AES for encryption, we Include Face Change Attaining methods to prevent from attackers In Face Change that can support both anonymizing real IDs among neighbor nodes and collecting real ID-based encountering information. For node anonymity, two encountering nodes communicate anonymously. Our system offers a robust defense against various cyber threats, including data breaches and unauthorized access. Prevent malicious actors from intercepting or tampering with encrypted data, our system employs advanced encryption techniques and secure communication protocols.

DOI: 10.61137/ijsret.vol.10.issue6.407

Published by: