IJSRET » January 29, 2026

Daily Archives: January 29, 2026

Uncategorized

Social Media Engagement and Value Orientation among College Students in Tamil Nadu

Authors: Jasmine A, Dr. G. Arul Selvi

Abstract: Social media has become an inseparable part of young people’s everyday life, particularly among college students. This article examines how social media engagement influences value orientation among college students in Tamil Nadu, with specific reference to empathy, morality and civic engagement. Drawing on empirical observations among undergraduate students from rural and urban backgrounds, the study shows that excessive and unregulated social media use is associated with weakened empathy, reduced family bonding and diminished moral responsibility. At the same time, responsible and reflective engagement with social media platforms enhances prosocial values, civic awareness and social sensitivity. The article emphasises the need for value-based digital literacy in higher education to ensure ethical and socially responsible digital citizenship.

Published by:
Uncategorized

Test Paper Title By Saquib 122429012026

Authors: Mohd saquib siddiqui, ashar ahmed

Abstract: Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

DOI: 

 

Published by:
Uncategorized

A Multi-Layer Approach For Email Threat Detection

Authors: Mustakim Khan, Ashok Yadav

Abstract: We present a multi-layer email threat detection system that integrates header authentication analysis, URL/attachment reputation checks via threat intelligence, and machine learning classification. The system parses incoming emails, verifies SPF/DKIM/DMARC results, extracts URLs and attachment hashes, and queries VirusTotal for each indicator. It then applies a trained ML model (TF-IDF + Logistic Regression) to classify the email as phishing or benign. Finally, a scoring engine correlates all signals into a composite risk score. In testing, the system successfully identified simulated phishing emails: for example, a malicious email with known bad links and spoofed headers was flagged as Phishing with high confidence, while benign messages were rated low-risk. The GUI (Figures 1–2) displays the analysis report, including header results, VirusTotal findings, ML verdict, and final threat score. Our multi-layer method leverages complementary techniques to improve detection accuracy and reduce false negatives compared to single- method approaches.

DOI: 

 

Published by:
Uncategorized

A Bibliometric Analysis of Sentiment Analysis Research in Customer Reviews: Trends, Hotspots, and Future Directions

Authors: Sudipkumar Ghanvat, Aditi Shintre, Sohail Hawaldar

Abstract: The study gives a comprehensive bibliometric study of the sentiment analysis research in customer reviews using Scopus as major data source. The analysis, spanning the 2010 to 2024 period, covers trends in publication, key contributors, collaborative networks, thematic hotspots and emerging research directions. The results indicate that the publication of sentiment analysis increased significantly in artificial intelligence, business, e commerce, fields over the last decade. Top institutions including Universiti Sains Malaysia and Vellore Institute of Technology have done most of the work along with leading authors like Hashimoto, K. and Okada, M. In terms of geography, India, China, the United States, Malaysia and Indonesia are the countries that dominate global research contributions. Thematic analysis shows that machine learning, deep learning, natural language processing, and explainable AI are popular subjects, along with practical applications in customer satisfaction and recommendation systems. The work also suggests promising future directions such as real time sentiment dashboards, multilingual and multimodal approaches and integration of ethical and privacy aware practices. This bibliometric review highlights influential authors, institutions, and research themes to enable both researchers and industry practitioners to understand the history and future of sentiment analysis.

DOI: https://doi.org/10.5281/zenodo.18412327

Published by:
Uncategorized

Smart Food Donation and Waste Reduction System

Authors: Thangadurai M, Hareshwar M S, Manonmani R, Manimaran R

Abstract: Food waste has become a major global concern, with tons of edible food discarded daily while millions of people remain hungry. Traditional food donation systems rely on manual coordination and delayed communication, leading to inefficiency and limited outreach. To address this issue, the Smart Food Donation and Waste Reduction System is proposed a web-based application designed to connect restaurants, supermarkets, and NGOs for the efficient redistribution of surplus food. The platform features dedicated donor and receiver interfaces, supported by centralized cloud database for seamless data management. Using real-time location matching powered by the Google Maps API, the system identifies the nearest NGOs for available donations. Instant notifications and automated alerts ensure quick food collection before spoilage occurs. All data related to food type, quantity, and pickup time are processed through RESTful APIs, while integrated analytics dashboards visualize donation trends and track food waste reduction. Ultimately, it provides a reliable, realtime, and sustainable solution that contributes to the Zero Hunger goal.

DOI: https://doi.org/10.5281/zenodo.18410917

Published by:
Uncategorized

Virtualization Techniques in Cloud Computing

Authors: Sanjive R, Arjun A G

Abstract: Cloud computing has emerged as a revolutionary technology that enables on-demand access to shared computing resources such as storage, applications, and processing power through the internet. In recent years, educational institutions have increasingly adopted cloud computing to modernize teaching, learning, and administrative processes. This shift is driven by the growing demand for flexible learning environments, digital collaboration, remote accessibility, and cost-effective infrastructure management. Traditional educational systems rely heavily on physical hardware and locally installed software, which often leads to high maintenance costs, limited scalability, and restricted access to learning resources. Cloud computing overcomes these limitations by offering scalable, reliable, and affordable solutions tailored to academic needs. This paper explores the adoption of cloud computing in educational institutions, focusing on its architecture, service models, and practical applications. Cloud-based platforms such as Learning Management Systems (LMS), virtual classrooms, digital libraries, and online assessment tools have transformed the educational ecosystem by enabling anytime-anywhere learning. The study highlights key benefits of cloud adoption, including reduced operational costs, improved collaboration among students and faculty, enhanced data storage and backup capabilities, and increased institutional efficiency. Additionally, cloud computing supports innovation in education by integrating emerging technologies such as artificial intelligence, big data analytics, and smart learning environments. Despite its advantages, the adoption of cloud computing in education also presents challenges such as data security, privacy concerns, internet dependency, and vendor lock-in. This paper discusses these challenges and emphasizes the importance of implementing strong security policies, data protection mechanisms, and regulatory compliance to ensure safe and effective cloud usage. The study concludes that cloud computing plays a vital role in the digital transformation of educational institutions and has the potential to significantly improve the quality, accessibility, and sustainability of education. With proper planning and governance, cloud computing can serve as a powerful enabler for the future of education. Cloud computing has revolutionized the way computing resources are provisioned, managed, and consumed by enabling on-demand access to scalable infrastructure and services over the internet. At the core of this paradigm lies virtualization, a foundational technology that enables efficient utilization of physical resources by abstracting hardware and allowing multiple isolated computing environments to coexist on a single physical system. Virtualization techniques play a critical role in achieving the essential characteristics of cloud computing, including scalability, elasticity, fault tolerance, resource pooling, and cost efficiency. This paper presents a comprehensive study of virtualization techniques in cloud computing, focusing on their architecture, types, operational mechanisms, and performance implications. The study explores key virtualization approaches such as hardware virtualization, operating system–level virtualization, para-virtualization, full virtualization, and container-based virtualization, highlighting their advantages, limitations, and suitability for different cloud service models (IaaS, PaaS, and SaaS). Hypervisors such as VMware ESXi, Xen, KVM, and Hyper-V are discussed as critical enablers that manage virtual machines and ensure isolation, security, and efficient resource allocation. In addition, modern lightweight virtualization through containers (e.g., Docker and Kubernetes) is examined due to its growing adoption in cloud-native environments. The abstract also emphasizes the role of virtualization in supporting dynamic workload management, live migration, high availability, disaster recovery, and multi-tenancy, which are essential for large-scale cloud data centers. Performance overhead, security vulnerabilities, and resource contention are identified as major challenges associated with virtualization, along with emerging solutions such as hardware-assisted virtualization, AI-driven resource optimization, and secure enclave technologies. Furthermore, the paper highlights the importance of virtualization in enabling emerging trends such as edge computing, serverless architectures, and hybrid cloud environments. Overall, this study demonstrates that virtualization remains a cornerstone of cloud computing, continuously evolving to meet the demands of modern applications. By providing insights into current techniques and future directions, the paper aims to assist researchers, cloud architects, and practitioners in selecting appropriate virtualization strategies to build efficient, secure, and scalable cloud infrastructures.

Published by:
× How can I help you?