IJSRET » Blog Archives

Author Archives: vikaspatanker

Aquatic Trash Collector Bot

Uncategorized

Authors: Ishan Deshpande, Mohit Jagtap, Akash Satras, Mrs. Shreyasi Watve

Abstract: india’s vibrant cultural traditions involve many water-based religious rituals, which unintentionally contribute to environmental pollution. During festivals such as Ganesh Visarjan and Kumbh Mela, water bodies like the Godavari River in Nashik often become heavily contaminated due to the disposal of idols, flowers, and plastic items. These pollutants accumulate on the water surface, disturbing the aquatic balance. To address this issue, we propose an eco- conscious solution—an automated bot system designed for surface waste collection. This bot uses renewable energy to operate and effectively removes plastic, debris, and water hyacinth from still water bodies, supporting a cleaner and more sustainable environment.

DOI: https://zenodo.org/uploads/16755368

 

 

Published by:

Study On Use Of Recycled Construction And Demolition Waste In Structural Applications: A Life-Cycle And Performance-Based Evaluation

Uncategorized

Authors: Dr Balaji Shivaji Pasare

Abstract: Background: Rural areas such as Osmanabad are plagued by sustained degradation of infrastructure driven by climate variation, material fatigue, and restricted maintenance capabilities. Structural concrete, while strong, is susceptible to microcracking that can expedite deterioration and impede long-term resilience. Fostered by the recent advent of self-healing technologies, namely bio-concrete and polymer-fused conduit systems, these represent adequate solutions for low or no-maintenance, climate-responsive, and adaptable buildings in impoverished areas. Objectives: The current study is set forth with the objectives of field performance, healing potential, and stakeholders’ acceptance for the bio-concrete and polymer-based self-healing concrete (SHC) under semi-arid conditions in Osmanabad. It aims at the transition from laboratory innovation to rural deployment conditions, highlighting humanised engineering and participatory validation. Methods: A mixed-method design of experimental trials in 3-gram panchayats was implemented with stakeholder involvement. Quantitative data were compressive strengths, crack closure rates, and environmental (humidity, temperature) correlation variables. Qualitative information was obtained through interviews, focus groups, and participatory observation. The analytic techniques used were ANOVA, regression modelling, and thematic coding of the data. Results: Bio-concrete exhibited enhanced crack healing (94% recovery) and strength increases (~20% compared to control mixes), especially in high-humidity zones. Positive correlations were found between healing rates and environmental humidity. The highest level of trust from the stakeholders was observed from the farmers (avg. rating: 9.1/10), noting that it helped minimize maintenance and seemed to heal. The polymer SHC had milder performances, though lower photo-hysteresis. Conclusion: Bio-concrete is found to be a socially and technically acceptable, climate change resilient alternative for rural infrastructure. The research confirms its relevance in Osmanabad and supports community-scale scaling. Through the convergence of high-performance materials and ethical, participatory adoption, this research configures a new model of resilient, humanised infrastructure for the disenfranchised.

DOI: https://doi.org/10.5281/zenodo.16753496

 

Published by:

Scalable AI Model Training Platform

Uncategorized

Authors: Rushil Vijay Salian

Abstract: The growing demand for accessible, scalable, and automated machine learning (ML) platforms has highlighted the need for intuitive tools that democratize model development. ModelLab is a proprietary AI/ML model training platform that enables users to upload datasets, train models, and generate predictions through an interactive web interface. Built with React, Supabase, and TensorFlow.js, it supports end-to-end workflows from data ingestion to model deployment. This paper presents the architecture, features, and performance of ModelLab and explores its potential to revolutionize AI development for non-experts and professionals alike. Future work includes model versioning, expanded algorithm support, and production-level deployments.

DOI:

 

Published by:

Implementing Scalable And Efficient Network File Sharing Solutions Using The Samba Protocol For Seamless Cross-Platform Access And Management

Uncategorized

Authors: Ashwin Sanghi

Abstract: Financial institutions operate in a dynamic and high-stakes environment where data integrity, system availability, and uninterrupted service are paramount. In recent years, the increasing complexity of IT infrastructures, along with the growing threat of cyberattacks and natural disasters, has prompted a strategic shift toward virtualized disaster recovery (VDR) models. VDR enables the replication and recovery of data and critical systems through virtual environments, offering increased flexibility, faster recovery times, and reduced reliance on physical infrastructure. This article presents a comprehensive review of the adoption and implementation of virtualized disaster recovery strategies in financial institutions. It evaluates technological architectures, regulatory requirements, integration challenges, and case studies to illustrate real-world applications. Furthermore, it delves into cost-benefit analyses, risk mitigation tactics, and the role of automation and orchestration in streamlining recovery processes. Through this analysis, we aim to demonstrate how VDR can enhance business continuity, improve compliance postures, and provide a robust response mechanism to both anticipated and unforeseen disruptions.

DOI: https://doi.org/10.5281/zenodo.16751967

 

Published by:

Integrating Kerberos Authentication To Strengthen Security And Access Control In Samba-Based File Sharing Environments

Uncategorized

Authors: Rohit Gore

Abstract: In an increasingly hybrid IT ecosystem, secure and scalable authentication mechanisms are essential for managing file-sharing services across diverse network environments. Samba, an open-source reimplementation of the SMB/CIFS protocol, enables seamless file and print services for SMB/CIFS clients, most notably Microsoft Windows. While Samba supports several authentication methods, integrating it with the Kerberos authentication protocol significantly strengthens its security posture, especially in enterprise environments. Kerberos, a time-tested network authentication protocol, facilitates secure and mutual authentication without transmitting passwords over the network. This article explores the integration of Samba with Kerberos, focusing on configuration strategies, performance implications, and real-world deployment considerations. It discusses the internal mechanisms of both technologies and illustrates how their integration can simplify centralized identity management using services such as Microsoft Active Directory and MIT Kerberos. Additionally, it reviews security enhancements, troubleshooting practices, and future considerations in the context of Linux-based servers and heterogeneous network environments. By aligning Samba with Kerberos authentication, organizations can achieve a unified and secure authentication architecture that minimizes administrative overhead, strengthens compliance, and provides a resilient foundation for secure file-sharing operations

DOI: https://doi.org/10.5281/zenodo.16751947

 

Published by:

Applying Digital Forensics Techniques To Secure And Investigate Threats In Healthcare Information Systems And Electronic Medical Records

Uncategorized

Authors: Shashi Tharoor

Abstract: In the digital era, healthcare organizations are increasingly reliant on information systems to manage sensitive patient data and streamline clinical workflows. However, the growing digitization has also rendered these systems prime targets for cyberattacks, internal misuse, and accidental breaches. Digital forensics offers a critical framework for detecting, investigating, and mitigating security incidents in healthcare information systems. This paper explores the multifaceted application of digital forensics within healthcare, encompassing threat identification, evidence preservation, legal compliance, and technological challenges. As medical data is governed by stringent regulations such as HIPAA and GDPR, the role of digital forensics becomes indispensable in ensuring confidentiality, integrity, and availability of patient records. The unique nature of healthcare environments, including legacy systems, third-party integrations, and life-critical devices, necessitates a tailored forensic approach. Moreover, the integration of artificial intelligence and blockchain in forensics is transforming incident response and audit mechanisms. This review delves into forensic readiness, methodologies, tools, case studies, and future directions, emphasizing the critical need for a proactive stance in safeguarding healthcare information. By aligning forensic practices with risk management and compliance, healthcare organizations can build resilient infrastructures capable of withstanding the evolving threat landscape.

DOI: https://doi.org/10.5281/zenodo.16751920

 

Published by:

Enhancing Security Incident Detection and Automated Response Using AI-Powered Security Information and Event Management (SIEM) Systems

Uncategorized

Authors: Kiran Desai

Abstract: – As cyber threats evolve in complexity and frequency, traditional security monitoring systems struggle to keep pace with modern enterprise needs. Security Information and Event Management (SIEM) systems have long served as a cornerstone for centralized logging and alerting, but the sheer volume of alerts and incidents now threatens to overwhelm human operators. This has led to a critical shift toward integrating artificial intelligence (AI) and machine learning (ML) into SIEM platforms. AI-driven SIEM systems automate detection, triage, and even response to incidents, enabling security teams to operate more efficiently and effectively. These systems can analyze vast datasets in real time, identify anomalous behaviors, and recommend or initiate appropriate countermeasures with minimal human intervention. This article explores the architecture, algorithms, integration strategies, and real-world applications of AI-enhanced SIEM systems. It also examines key challenges such as data quality, model drift, and regulatory compliance, while offering insights into future trends like explainable AI and predictive threat modeling. The goal is to provide a comprehensive understanding of how AI transforms SIEM into an intelligent, adaptive shield against modern cyber threats

DOI: https://doi.org/10.5281/zenodo.16751895

 

Published by:

Analyzing And Comparing The Performance Of SMB And NFS Protocols For Efficient File Sharing In Linux Environments

Uncategorized

Authors: Vikram Seth

Abstract: The Server Message Block (SMB) and Network File System (NFS) protocols serve as critical technologies for network file sharing in Linux environments. Both have evolved significantly, with SMB, predominantly championed by Microsoft, and NFS, natively supported in UNIX and Linux systems, each demonstrating unique strengths and use cases. With growing demand for efficient, reliable, and scalable file sharing across distributed environments, choosing the right protocol is essential for optimizing system performance. This article explores the comparative performance of SMB and NFS, examining throughput, latency, CPU usage, security integration, compatibility, and ease of configuration in Linux. Benchmarks, real-world use cases, and theoretical analysis converge to evaluate how each protocol behaves under different workloads and system configurations. The study also emphasizes tuning methods and kernel-level interactions that influence performance outcomes. Administrators often face challenges in determining the most effective protocol for specific network conditions or organizational goals. This review offers a comprehensive framework to assist in those decisions, incorporating both empirical data and architectural insights. We conclude by highlighting the contexts in which each protocol excels and offering guidance on best practices for deployment in hybrid Linux infrastructures

Published by:

Deploying Zero Trust Security Frameworks For Enhanced Protection Across Hybrid Cloud Infrastructures And Multi-Environment Architectures

Uncategorized

Authors: Amitav Ghosh

Abstract: In today’s rapidly evolving threat landscape, organizations face unprecedented challenges in securing their digital environments. Traditional perimeter-based security models have become inadequate in the face of sophisticated cyberattacks, increased mobility, and widespread cloud adoption. Zero Trust Security (ZTS) has emerged as a robust cybersecurity model that assumes no implicit trust within or outside the network, requiring continuous verification of users, devices, and workloads. In hybrid cloud environments—where private and public cloud infrastructures coexist and interoperate—the implementation of Zero Trust principles becomes crucial yet complex. This paper explores the strategic integration of Zero Trust Security in hybrid cloud architectures, focusing on identity and access management (IAM), microsegmentation, continuous monitoring, and adaptive policy enforcement. It examines the challenges and solutions for implementing ZTS across heterogeneous platforms, including legacy systems and modern cloud-native services. Case studies and real-world implementations underscore best practices and demonstrate measurable outcomes in risk reduction and operational resilience. With the increasing regulatory requirements and the critical need for data privacy, Zero Trust in hybrid cloud environments is not just a security enhancement but a strategic imperative for enterprises. This comprehensive review provides guidance for CISOs, cloud architects, and security professionals aiming to deploy scalable, resilient, and compliant Zero Trust frameworks across their hybrid infrastructure.

DOI: https://doi.org/10.5281/zenodo.16751838

 

Published by:

Optimizing Load Distribution In Kubernetes Clusters Using Cloud-Native Load Balancing Techniques For Scalable And Resilient Deployments

Uncategorized

Authors: Rohinton Mistry

Abstract: As enterprises increasingly shift toward cloud-native infrastructures, Kubernetes has become the de facto standard for orchestrating containerized applications. A fundamental challenge in this dynamic environment is ensuring efficient and reliable distribution of network traffic, commonly referred to as load balancing. Traditional load balancing approaches often fall short when applied to cloud-native architectures due to their lack of agility, scalability, and integration with dynamic workloads. Kubernetes addresses this gap by offering in-cluster load balancing mechanisms through Services, Ingress controllers, and external load balancers that adapt to application and infrastructure changes in real time. This article explores how Kubernetes enables cloud-native load balancing, discussing native components such as kube-proxy, CoreDNS, and Service types, alongside more advanced approaches involving Ingress controllers, service meshes, and cloud-provider integrations. It also investigates common architectural patterns and best practices that ensure high availability, scalability, and optimal resource utilization. Case studies from production environments and comparative analyses of tools like Traefik, NGINX, and HAProxy offer real-world insights into implementation trade-offs. Furthermore, the article delves into the challenges of multicluster load balancing, DNS propagation, and observability in dynamic workloads. As cloud-native adoption continues to grow, understanding and optimizing load balancing in Kubernetes environments becomes critical for developers, DevOps teams, and architects aiming to maintain performance and resilience. This review presents a comprehensive synthesis of cloud-native load balancing strategies, technologies, and practices within Kubernetes clusters, providing a detailed guide for those striving to master the complexities of modern distributed systems.

DOI: https://doi.org/10.5281/zenodo.16751782

 

Published by:
× How can I help you?