IJSRET » June 10, 2025

Daily Archives: June 10, 2025

Uncategorized

Harnessing Environmental Microbes for Green Nanomaterial Fabrication

Authors: Karthekia Mahesh

Abstract: In the era of sustainable development, the need for eco-friendly and cost-effective methods for synthesizing nanomaterials has gained significant momentum. Traditional physical and chemical approaches for nanoparticle synthesis are often energy-intensive, environmentally hazardous, and economically burdensome. In contrast, the use of environmental microbes for green nanomaterial fabrication offers a promising and sustainable alternative. These microbes possess remarkable biochemical versatility and are capable of synthesizing various metallic and metal oxide nanoparticles under mild conditions. This review explores the vast potential of environmental microbes—such as bacteria, fungi, actinomycetes, and algae—in the biosynthesis of nanomaterials. It outlines the mechanisms underlying microbial nanomaterial synthesis, including intracellular and extracellular pathways, and highlights their ecological significance and functional properties. Moreover, it discusses current and emerging applications of biogenic nanoparticles in medicine, agriculture, and environmental remediation. Challenges in large-scale production, standardization, and regulatory compliance are also addressed. By integrating microbial biotechnology with nanoscience, researchers are paving the way for innovative, sustainable solutions across multiple sectors while promoting environmental integrity.

DOI: http://doi.org/10.61137/ijsret.vol.8.issue6.569

Published by:
Uncategorized

Human Pose Estimation & Correction During Exercise Using ML

Authors: Miss.Kithe Priya Suresh, Miss.Khatal Sneha Pradip, Dr.Khatri.A.A

Abstract: The fields of magnetism and resonance are crucial to the operation of Electric Vehicle Wireless Communication (EVWC) devices. A magnetic field is produced when electricity flows through a coil of wire, just as it is in a transformer. For Wireless Power Transfer (WPT) to work, it's necessary to position two coils in such a way that one's magnetic field induces a current in the other. Unless the coils are very close to one another and aligned in a straight line, inductive power transfer is inefficient. In this paper work related to wireless charging system proposed by various researchers is explored. Concept of Static and dynamic charging, Inductive power transmission, wireless power transmission techniques including inductive and capacitive coupling, far field techniques like Radio, microwave and laser techniques are also presented.

Published by:
Uncategorized

Crash Analysis Using Regression Model In Kollam District

Authors: Assistant Professor Niranjini Shibu, Assistant Professor Sameena A

Abstract: Rapid population expansion and rising economic activity have led to an enormous increase in motor vehicles, which is one of the main causes of an increase in road accidents in many major cities. In this paper, four factors are taken into account while evaluating the degree of road safety in Karunagapally, Kollam District. The factors considered are accident severity index, accident fatality rate, accident risk and accident risk. The data set for six years (2017 to 2022) is brought from “Police Department”. And also, Regression-based data analysis carried out to foresee the likelihood of accidents in a given environment. As a result, there is or should be a close relationship between crash investigation, data collection and analysis, and the creation and evaluation of viable countermeasures. Finally, it is critical that the study results are shared to those who are involved in implementing countermeasures and preventive programs.

Published by:
Uncategorized

Investigating Bias Detection and Mitigation in AI-Powered Recruitment Systems

Authors: Payal Anil Barhate, Associate Professor Dr. Ayesha Siddiqui, Dr.Nagsen Bansod, Dr.Rajkumar Deshpande

Abstract: Artificial Intelligence (AI) is changing the way companies hire people by making it possible to automatically screen resumes, predict who will get the job, and assess behaviour. These new technologies make things much more efficient and scalable, but they also raise important ethical issues, especially the possibility of algorithmic bias. Unfair discrimination against candidates based on their gender, race, or socioeconomic background can happen when training data is biassed, decision-making models are unclear, and there is no accountability. This study looks into where bias comes from and how it shows up in AI-powered hiring systems. It also looks at a range of ways to reduce bias, which are divided into three groups: pre-processing, in-processing, and post-processing. It looks at how well tools like fairness-aware learning, adversarial debiasing, and equalised odds post-processing work to promote fairness.

DOI:

Published by:
Uncategorized

Comparative Study And Performance Assessment Of Stone Matrix Asphalt Incorporating Different Fibers

Authors: Assistant Professor Mohammad Zayan, Akhi S Ragh

Abstract: Bituminous mixtures serve as wearing and base layers in pavements, with performance judged by resistance to deformation, cracking, moisture damage, and stiffness. Stone Matrix Asphalt (SMA), using PMB 40-grade bitumen, offers better rut resistance than conventional mixes. This study tested SMA mixes with glass and jute fibers, examining tensile strength, drain down, and rutting resistance. Glass fiber improved stability, stiffness, and reduced bitumen drain down, while jute fiber showed higher drain down due to its elasticity. Overall, glass fiber outperformed jute in enhancing rutting resistance and long-term performance. The findings emphasize the importance of fiber selection for optimizing SMA mix designs and improving pavement durability.

Published by:
Uncategorized

A Deep Learning Approach To Mental State Analysis Of EEG

Authors: Siddharth Mahankal, Suyesh Shinde, Akash Unhale, Dr. Jagannath Nalavde Arun, Hirmukhe

Abstract: Mental health issues are becoming increasingly common among individuals over the age of 16, with academic, social, and career-related stress being the main reasons. Traditional mental health assessment methods, such as surveys or counseling, are often affected by personal biases or insufficient information. With this in mind, our project presents a system that collects and analyzes EEG (electroencephalogram) brain wave graphs across different mental states — such as awake, drowsy, and deep sleep. Users upload a multi-page PDF report containing the EEG graph to the system. This PDF is then separated into pages, analyzed with the help of a trained machine learning model, and the percentage probability of the user’s mental state being normal or abnormal is displayed. The system is trained on a dataset of EEG graphs classified by experts. Importantly, this project is not intended to be a substitute for medical diagnosis or professional mental health services. Instead, the project seeks to raise awareness and act as a link between individuals and mental health professionals, especially for those who may not recognize the need for help. The ultimate goal is to make early mental health screening in educational institutions more accessible, data-based, and stigma-free.

DOI: http://doi.org/

 

 

Published by:
Uncategorized

Research Paper in Data Analysis ,And Tools

Authors: Rahul Yadav, Dr. R.S Khatana

 

 

Abstract: Data analysis plays a crucial role in today’s data-driven world. It is the science of examining raw data to make conclusions, identify patterns, and support decision-making. This paper explores the definition, techniques, tools, and real-world applications of data analysis, especially in sectors like business, healthcare, education, and government. With the rising importance of big data, this study also discusses ethical considerations and challenges faced in data analysis.Data analysis is indispensable in the digital age. From simplifying operations to transforming entire industries, its potential is vast. However, with power comes responsibility. Ethical handling of data, maintaining quality, and using insights judiciously are key to unlocking the true potential of data analysis.

DOI: http://doi.org/

 

 

Published by:
Uncategorized

SUBSTATION SURVEILLANCE USING CAMERA BASED VEHICLE

Authors: Professor Dr. A. A. Kalage, Megha Dagadu Gade, Vaishnavi Digambhar Mundhe, Shraddha Sandip Ambekar, Asmita Amarsingh Jagdale

Abstract: Transmissao Paulista actually operates 105 substations geographically distributed across Sao Paulo State. These substations are remotely operated by two Operating Centers – Transmission Operating Center (COT Centro de Operacao da Transmissao), Bom Jardim SP, and Back-end Operating Center (COR – Centro de Operacao Retaguarda), Cabreiiva SP. Through the years, CTEEP has been deploying its high reliability and throughput WAN/LAN to connect all of its key facilities. Based on such corporate network infrastructure, it was possible to provide remote operations with a visual, real time monitoring system. Its structure comprises cameras installed in substation strategic spots, local digital image recorder and devices to convert and regulate video streams and control cameras, and Ethernet network interfaces. The system allows visual checking of operating handling, physical status of substation yard, and perimeter integrity thus addressing many corporative areas' needs. Since there is a high reliability, high throughput corporative network infrastructure available to connect main facilities, it enable us to provide remote substation operations with support of a visual, real time monitoring system, which comprises camera movement control, tamper-proof recording, image transmission and viewing, both locally and remotely. SIM – Sistema Integrado de Monitoramento (Integrated Monitoring System) is a joint project among CTEEP's Enterprise Security, Information Technology, and Maintenance and Operations organizations. It aims to deploy a visual monitoring system for electrical substations providing camera movement control, tamper-proof recording, image transmission and viewing, both locally and remotely using existent corporative network ("browser-based"). It allows electrical system operations and enterprise security organizations to monitor substations and other CTEEP facilities through images transmitted via data channels (corporative network), which are enabled by heterogeneous technologies and throughput, from frame relay (64Kbs to 512Kbps) to fiber optic/digital radio links (2Mbps). By promoting integration of video, audio, and text information, and by associating it to company existing databases, SIM also meets CTEEP's strategic goals related to information system integration (technological convergence). In addition to align strategic information integration goals, SIM deployment will provide CTEEP Electrical Transmission System operators with environmental viewing of facilities in a real-time, strategic way, enabling an improvement of operating processes. SIM usage means lower costs related to staff displacement to remotely assisted substations, either for equipment handling checking, equipment current status checking or substation areas physical integrity checking. All of these intended to optimize access to substations risk areas. Also, note that such solution means lower operating and maintenance costs for entire company due to its standardization.

Published by:
Uncategorized

SUBSTATION SURVEILLANCE USING CAMERA BASED VEHICLE

Authors: Professor Dr. A. A. Kalage, Megha Dagadu Gade, Vaishnavi Digambhar Mundhe, Shraddha Sandip Ambekar, Asmita Amarsingh Jagdale

Abstract: Transmissao Paulista actually operates 105 substations geographically distributed across Sao Paulo State. These substations are remotely operated by two Operating Centers – Transmission Operating Center (COT Centro de Operacao da Transmissao), Bom Jardim SP, and Back-end Operating Center (COR – Centro de Operacao Retaguarda), Cabreiiva SP. Through the years, CTEEP has been deploying its high reliability and throughput WAN/LAN to connect all of its key facilities. Based on such corporate network infrastructure, it was possible to provide remote operations with a visual, real time monitoring system. Its structure comprises cameras installed in substation strategic spots, local digital image recorder and devices to convert and regulate video streams and control cameras, and Ethernet network interfaces. The system allows visual checking of operating handling, physical status of substation yard, and perimeter integrity thus addressing many corporative areas' needs. Since there is a high reliability, high throughput corporative network infrastructure available to connect main facilities, it enable us to provide remote substation operations with support of a visual, real time monitoring system, which comprises camera movement control, tamper-proof recording, image transmission and viewing, both locally and remotely. SIM – Sistema Integrado de Monitoramento (Integrated Monitoring System) is a joint project among CTEEP's Enterprise Security, Information Technology, and Maintenance and Operations organizations. It aims to deploy a visual monitoring system for electrical substations providing camera movement control, tamper-proof recording, image transmission and viewing, both locally and remotely using existent corporative network ("browser-based"). It allows electrical system operations and enterprise security organizations to monitor substations and other CTEEP facilities through images transmitted via data channels (corporative network), which are enabled by heterogeneous technologies and throughput, from frame relay (64Kbs to 512Kbps) to fiber optic/digital radio links (2Mbps). By promoting integration of video, audio, and text information, and by associating it to company existing databases, SIM also meets CTEEP's strategic goals related to information system integration (technological convergence). In addition to align strategic information integration goals, SIM deployment will provide CTEEP Electrical Transmission System operators with environmental viewing of facilities in a real-time, strategic way, enabling an improvement of operating processes. SIM usage means lower costs related to staff displacement to remotely assisted substations, either for equipment handling checking, equipment current status checking or substation areas physical integrity checking. All of these intended to optimize access to substations risk areas. Also, note that such solution means lower operating and maintenance costs for entire company due to its standardization.

Published by:
Uncategorized

Machine Learning-Driven Malware Detection For Malicious Domains And Unsafe Software Sources

Authors: Tarush Katiyar,, Khushi Pant, Sumit Yadav, Aman Anand, Dr. Vivek Kumar,, Dr. Hitesh Singh,

 

 

Abstract: The rapid growth of cyber threats, especially malicious domain (phishing) attacks, calls for advanced detection methods beyond traditional signatures. We propose a machine learning framework that analyzes URL characteristics and other features to classify domains as safe or malicious. The system uses Python-based tools (Pandas, scikit-learn, XGBoost) to train and evaluate multiple classifiers – including Random Forests, Decision Trees, Gradient Boosting, XGBoost, and Logistic Regression. Features are extracted directly from URL strings (such as domain entropy, URL length, and special character counts) along with blacklist/whitelist checks. On a large URL dataset (≈700k samples), ensemble methods achieved high accuracy: for example, Random Forest reached 95% accuracy on the test set, and XGBoost reached 94%. In contrast, a simple logistic regression achieved only 78% accuracy, showing the advantage of tree-based models on this task. Our results demonstrate that ML-driven analysis of URL -based features can effectively detect malicious domains, significantly improving over naive baselines. The framework is implemented as a Python pipeline and can be integrated into real-time security tools. Future work will extend this approach with additional data sources and advanced learning techniques to further improve detection rates.

DOI: http://doi.org/

 

 

Published by:
× How can I help you?