IJSRET » Blog Archives

Author Archives: vikaspatanker

Modeling and Analysis of Grid Connected Induction Generator for Wind Power Application Review

Uncategorized

Modeling and Analysis of Grid Connected Induction Generator for Wind Power Application: Review
Authors:-M. Tech. Scholar Mohit Kumar, Assistant Professor Harjit Singh

Abstract- Over the past few decades, there has been an increasing use of induction generator particularly in wind power applications. In generator operation, a prime mover (turbine, engine) drives the rotor above the synchronous speed. Stator flux still induces currents in the rotor, but since the opposing rotor flux is now cutting the stator coils, active current is produced in stator coils, and motor now operates as a generator, and sends power back to the electrical grid. Based on the source of reactive power induction generators can be classified into two types namely standalone generator and Grid connected induction generator. In case of standalone IGs the magnetizing flux is established by a capacitor bank connected to the machine and in case of grid connection it draws magnetizing current from the grid.

Cite: Mohit Kumar, Harjit Singh. “Modeling and Analysis of Grid Connected Induction Generator for Wind Power Application: Review”. IJSRET Volume 9 Issue 4, July-Aug-2023.

Published by:

Enhancement of Micro-strip Performance with Improvement of Antenna Gain and Feeding Technique

Uncategorized

Enhancement of Micro-strip performance with improvement of antenna gain and feeding technique
Authors:- Pawan Kumar Nishad, Ashish Suryavanshi

Abstract- The goal of this observed is to design and analysis the Microstrip Patch Antenna which covers the Ultra Wide Band 3.1 to 10.6 GHz. This synopsis covers study of basics and fundamentals of microstrip patch antenna. A series of parametric study were done to find that how the characteristics of the antenna depends on its various geometrical and other parameters. The various geometrical parameters of the antenna are the dimensions of the patch and ground planes and the separation between them and it also includes the dielectric constant of the substrate material. The parametric study also contains the study of different techniques for optimizing the different parameters of antenna to get the optimum results and performance. This is a simulation based study. The design and simulation of the antenna is carried out using microwave Studio simulation software. Four antennas with different types of shapes were designed which cover the entire UWB range. The First designed antenna has two half circular patches which are overlapped to each other. A narrow rectangular slit is added to the patch to improve the performance of antenna.

Cite: Pawan Kumar Nishad, Ashish Suryavanshi. “Enhancement of Micro-strip performance with improvement of antenna gain and feeding technique”. IJSRET Volume 9 Issue 4, July-Aug-2023.

Published by:

From Automation To Accountability: Ethical AI In CRM Workflows

Uncategorized

Authors: Santhosh Reddy BasiReddy

Abstract: Customer Relationship Management and enterprise workflow platforms increasingly rely on artificial intelligence to automate decisions related to customer engagement, compliance enforcement, risk evaluation, and operational prioritization across complex organizational environments. While AI-driven automation improves efficiency, consistency, and scalability, it also introduces ethical, legal, and governance challenges that traditional workflow systems were not designed to address. Automated decisions can directly affect customer rights, financial outcomes, regulatory compliance, and organizational reputation, making responsible AI integration a critical architectural and operational concern. This article examines ethical and responsible AI frameworks as they apply to CRM and business workflows, with particular emphasis on governance structures, human oversight mechanisms, transparency, and accountability. By synthesizing established standards, process modeling practices, and human-centered AI research, the paper proposes a structured framework for embedding ethical safeguards into enterprise automation while maintaining operational effectiveness, regulatory alignment, and long-term organizational trust.

DOI: http://doi.org/10.5281/zenodo.18326172

Published by:

IJSRET Volume 9 Issue 4, July-Aug-2023

Uncategorized

Grid-Connected Photovoltaic Systems And Active Power Filtering Function, A Review
Authors:- Rakesh Kumar, Shweta Chourasia

Abstract- The inverter is an essential element in a photovoltaic system. It exists as different topologies. This review-paper focuses on different technologies for connecting photovoltaic (PV) modules to a three-phase- grid. The inverters are categorized into some classifications: the number of power processing stages; the use of decoupling capacitors and their locations; the use or no of the transformers; the type of three phase inverter; whether they are preceded by a DC/DC converter or not .Some of three-phase topologies are presented, compared according to the type of control (i.e. the PWM method; the bang-bang method or the fuzzy logic method or numerical control and a comparison with single-phase inverters is given.

Integration of Grid-Connected Photovoltaic Systems and Active Power Filtering Function
Authors:- Rakesh Kumar, Shweta Chourasia

Abstract- Solar panels are an attractive and growing source of renewable energy in commercial and residential applications. Its use connected to the grid by means of a power converter results in a grid-connected photovoltaic system. In order to optimize this system, it is interesting to integrate several functionalities into the power converter, such as active power filtering and power factor correction. Nonlinear loads connected to the grid generate current harmonics, which deteriorates the mains power quality. Active power filters can compensate these current harmonics. A photovoltaic system with added harmonic compensation and power factor correction capabilities is proposed in this paper. A sliding mode controller is employed to control the power converter, implemented on the Compact RIO digital platform from National Instruments Corporation, allowing user friendly operation and easy tuning. The power system consists of two stages, a DC/DC boost converter and a single-phase inverter, and it is able to inject active power into the grid while compensating the current harmonics generated by nonlinear loads at the point of common coupling. The operation, design, simulation, and experimental results for the proposed system are discussed.

Iot Based Air Pollution Monitoring System
Authors:- Uddesh U Naik, Shreyash R Salgaokar, Shreeyank Jambhale

Abstract-Humans can be adversely affected by exposure to air pollutants in ambient air. Hence, health-based standards and objectives for some pollutants in the air are set by each country detection and measurement of contents of the atmosphere are becoming increasingly important. Careful planning of measurements is essential. One of the major factors that influencethe representativeness of data collected is the location of monitoring stations the planning and setting up of monitoring stations are complex and incurs a huge expenditure. Air pollution affects our day-to-day activities and quality of life. It poses a threat to the ecosystem and the quality of life on the planet. The dire need to monitor air quality is very glaring, owing to increased industrial activities over the past years. People need to know the extent to which their activities affect air quality. This project proposes an air pollution monitoring system. An IoT-based air pollution monitoring system is proposed to monitor the pollution levels of various pollutants. The geographical area is classified as industrial, Residential, and traffic zones theproposes an IoT system that could be deployed at any location and store the measured values in a cloud database, perform pollution analysis, and display the pollution level at any given location.

Design And Analysis Of Connecting Rod-A Review
Authors:- M.Tech. Scholar Alsabah Rayeen, Professor Ganesh Kesheorey

Abstract-The connecting rod is an essential component found within internal combustion engines, serving as the link between the piston and the crankshaft. Its primary function is to transmit power from the piston to the crankshaft, making it a critical factor in terms of structural stability and performance. Manufacturers have focused on reducing the weight of the connecting rod by optimizing its form and minimizing the use of materials, although this approach is not always feasible. The production of lightweight connecting rods is therefore a key objective. Additionally, the connecting rod plays a vital role in high-volume production outputs. Each internal combustion engine, depending on the number of cylinders, requires at least one connecting rod. Consequently, optimizing the design of the connecting rod is a rational pursuit. This optimization process aims to reduce the weight of engine components, resulting in decreased inertia loads, lower overall motor weight, improved motor efficiency, and energy savings.

Review analysis Of Harmonics And Power Quality For Microgrid Connected To 500 Kw Solar Pv Plant
Authors:- Siddharth Bisariya, Prof. Indrajeet Kumar, Prof. Priyank Gour

Abstract-The plant (an arrangement of solar panels) which converts solar energy to light energy from the sun into electrical energy (charge emission) is called a solar power plant process. In solar plant there are many solar panels are connected and in panels there are many cells units which make panels. In which special metal is used which is in the form of lines and these lines are also connected to very thin lines and all these lines are connected to a metal line frame which is mainly quadrilateral in shape. So there is large area to trap light i.e. now there is a suitable area for light to fall on it as the metal arrangement in large to fall on it electrons start’s to emit from thin lines to metal frame and current goes into a diode box which is behind the panel and then comes into supply wires.

RA Review on Sustainable Concrete For Future:Geo-Polymer Concrete
Authors:- Asst. Prof. Chittem Mounika, Asst. Prof.Modugu Naveen Kumar

Abstract-OPC/PSC or PPC cements are typically employed in construction projects, and producing them not only uses a significant quantity of limestone and fossil fuels, but also results in the generation of nearly 0.9 tons of CO2 for every ton of cement clinker. Additionally, 2.8 billion tons of man-made greenhouse gases are produced annually by the cement industry. The components and chemistry of geo-polymer concrete, which is made from waste materials like fly ash (Class F or C), rice husk, and binding solution devoid of cement, are completely different. This article provides a broad overview of the steps and variables that have an impact on geo-polymer concrete to date. An alumino-silicate source, such as fly ash or GGBS (waste materials), is activated to create this inorganic 3D polymer. It is a revolutionary construction material for the future because of its outstanding mechanical qualities along with significant chemical resistance (attack by magnesium or sulfate), minimal shrinkage and creep, and environmentally friendly nature (extremely less CO2 output in contrast to OPC). As of now, it has been observed that the strength of geo-polymer concrete is mostly influenced by the molarities of the alkaline liquid (NaOH or KOH) and the mass ratios of the geo-polymer particles to water, SiO2 and Na2O, H2O and Na2O, Si and Al, and other alkaline solutions. Although the alkaline solution pollutes the environment to some level, it has been observed that geo-polymer concrete constructed entirely of fly ash or with partial substitution by GGBS resulted in an 80% reduction in CO2 emission compared to OPC. A very good candidate material for the future, geo-polymer concrete is superior to cement concrete according to extensive tests in a variety of processes and parameters.

Fault Effect Analysis and Frequency Deviation Detection in Smart Solar Connected Grid
Authors:-Samiksha Tripathi, Associate Professor Arun Pachori

Abstract- Grid are integrated with distributed energy resources provide many benefits, including high power quality, energy efficiency and low carbon emissions, to the power grid. Grids are operated either in grid-connected or island modes running on different strategies. However, one of the major technical issues in a grid is unintentional islanding, where failure to trip the grid may lead to serious consequences in terms of protection, security, voltage and frequency stability, and safety. Therefore, fast and efficient islanding detection is necessary for reliable grid operations. This paper provides an Analysis of grid islanding detection method, which are classified as local and remote.

Student Attendance Monitoring System using IoT and RFID
Authors:-Asst.Prof. Raghu P, Asst. Prof. Santosh M , Asst.Prof. Lohith C

Abstract- It is a difficult undertaking to keep kids’ attendance up at a school. The manual handling of attendance is never easy. The goal of this project is to create a smart attendance system that effectively tracks and maintains student attendance in a setting on an automated basis. RFID readers and an Arduino Uno microcontroller were used to construct the entire system. Students’ ID cards may be equipped with distinctive RFID tags. Additionally, Wi-Fi communication modules are employed to facilitate communication that is dependent on network availability. The creation of a student database is necessary. Messages on the pupils’ attendance status are sent to parents’ mobile devices via a GSM module. To determine the student’s current location, a GPS module is employed. Teachers and administrators at any school won’t have to do as much manual labor thanks to this method. IoT and RFID, two of the most well-liked technological trends, are included in the suggested work.

Enhancement of Heat Transfer Rate in Solar Air Heater Using Discrete W-Shaped Roughness
Authors:- M.Tech. Scholar Nitisha Sharma, Prof. D.S. Rawat

Abstract- The most popular and affordable solar energy systems are solar air heaters (SAHs). The SAH roughness solar heaters have been the subject of numerous successful experimental and analytical studies by a number of researchers as the absorbing plate gathers sun light and distributes heat energy to the flowing air. In order to maximize heat transfer absorption in the solar air heater duct, the artificial roughness components that disintegrate the laminar sub-layer at the surface of the absorber plate are described in depth in this study. The most popular and commonly used solar energy collection equipment for drying agricultural products, heating indoor spaces, seasoning wood, and curing industrial goods is the solar air heater (SAH). It is also the most affordable solar energy harvesting system. One effective technique is to use a surface that has been purposely roughened to maximize the amount of heat that is delivered to the fluid that is passing through the duct of a SAH.

Website for Medical and Blood supply by Unmanned Drone
Authors:- Sayantan Dey, Saraswat Sen, Raj Basu, Gourabarko Dhar, Jeet Mukherjee, Anurima Majumdar, Antara Ghosal, Koushik Pal

Abstract- The current India blood supply system relies on a combination of and regional and hospital providers. The smallest and most accessible hospitals in our area, usually have 4 to 12 bed and, Usually have 2 to 6 red cells units on their list and no new plasma or platelets. Our website is mainly based on supply of medicine and blood and is named “Life Max”. We have used HTML, CSS, Java Script, TailWind CSS, React. We have two fields in the application one is admin field and other is User field. In the user field anyone who needs blood urgently, then he/she can request for blood by filling some Urgent details. Also, user can see the available blood bank of different blood group. Blood management and supply is an important but considered challenging exercise in the healthcare industry. Inventory managers in the blood storage and transportation industries are always looking for efficient and timely responses from their customers. In emergency situations, blood shortages have a significant impact on the lives of patients who need blood transfusions. On the other hand, donating blood to patients requires efficient and timely, adequate transportation and supply chain. Poor transportation systems can lead to blood shortages, delivery inefficiencies, and even contamination. All over the world, there is a shortage of blood donors; therefore, all waste due to ineffective delivery solutions. The current review aims to compare blood delivery in densely populated cities, especially using cars and motorbikes as a delivery solution. Based on a systematic literature review, the most effective and efficient blood transfusion system in a congested city can be determined by considering SC cost, time availability, and emergency severity. The current study provides a comparative analysis of blood delivery systems in congested cities. It also helps stakeholders to make decisions quickly and efficiently.In the website the availability of the blood and medicine will be sorted in a manner that it will show the shortest distance seller with the matching blood group or the medicines, the consumer wants. The delivery work of the order through drone involves the order of medicines using our application. The consumer has to enter the details like name, email id, mobile number, and delivery location. All these information will be stored in the database. A passcode will be generated in our website which will be sent to the user and the admin. Using GPS the drone reaches the location, the consumer needs to enter the PIN as a passcode in the website, which was sent at the time of ordering, so that the person can open the lock system and take the ordered products. In the admin part, by using our website, admin can add or delete donor details edit stock details manage stock of blood, Search donor details by blood group, and also get the pin code of the user to set that in the drone for reaching at the Selected location, and to approve the request of blood during its handling in the blood bank. The essential features of this website are: The user can track the drone and is also very much secure, as the product can be accepted by the person who ordered it.

Electric Vehicle Aggregators in Electricity Markets under Optimal Conditions: Review
Authors:-M. Tech. Scholar Vikas Thakur, Assistant Professor Harjit Singh

Abstract- With the increasing adoption of electric vehicles (EVs), there is a growing need to efficiently integrate them into the existing electricity grid. Electric Vehicle Aggregators (EVAs) play a crucial role in this integration process by managing the charging and discharging patterns of a fleet of EVs to optimize energy utilization, grid stability, and economic benefits. This paper focuses on developing a scheduling framework for EVAs in electricity markets under optimal conditions.

Augmented Reality & Virtual Reality
Authors:-Rijul Bilaiya, Vitthal S. Gutte

Abstract- The advancements of Augmented Reality (AR) and Virtual Reality (VR) technologies have led to significant changes in the way we interact with digital content. AR offers an experience where digital information is superimposed on the physical world, whereas VR creates an immersive experience in a fully digital environment. The scope of applications for both AR and VR ranges from entertainment and gaming to education, healthcare, and engineering. The primary challenge in developing these technologies is to create an experience that seamlessly blends the physical and digital worlds. Accomplishing this requires advanced techniques in computer vision, image processing, and rendering, as well as sophisticated hardware and software infrastructure. With the continuous development of AR and VR, they are expected to make a significant impact on several aspects of our lives and become more integrated into our daily routines.

A Review On Use And Performance Of In Steel Highway Bridges
Authors:- Assistant Professor Bakshetty Snehalatha, , Associate Professor Dr. Srikanth Ramvath

Abstract- Uncoated weathering steel (UWS) bridges have been in use in the United States for nearly 50 years, now enabling the long-term performance of these structures to be assessed. This was accomplished by surveying the varied experiences of 52 U.S. transportation agencies, along with data analysis on all UWS bridges known within these and other agencies, which total nearly 10,000 structures. Climate and age were key considerations in this data analysis. Contrary to previous, more limited research, this analysis showed that there is not a strong trend in UWS bridge performance as a function of climate. A similar climate analysis for non-UWS bridges also showed a counterintuitive relationship be- tween some climate types and these bridges. This suggests that design and maintenance practices may be more influential to UWS performance than climate, and further research to cultivate current best practices in this regard is recommended. Comparison between the UWS and non- UWS data sets also reveals that UWS bridges generally perform well in relation to non-UWS bridges.

A Deep Learning Based Approach for Heart Disease Classification using PCG Datasets
Authors:- Smita Waskale, Arjun singh Parihar , Manisha Kadam

Abstract- Heart related diseases presently pose one of the major threat worldwide. Heart abnormalities show a wide variation because of which accurate diagnosis becomes challenging. Phonocardigram (PCG) signals and their analysis has opened up a new paradigm in telemedicine. The abrupt fluctuations and the randomness of the PCG signals make them difficult to analyze and extract key parameters called features. Conventional Fourier techniques fail in this regard. In this paper, we have proposed a wavelet based technique wherein the discrete wavelet transform (DWT) have been used for the processing and feature extraction of the PCG signals has been done subsequently. The features extracted are energy, variance, entropy and standard deviation. The features extracted can be subsequently utilized for the classification of the PCG signals using the Conjugate Gradient Algorithm. The three categories of classified are: stenosis, regurgidation and normal. It has been shown that the proposed algorithm attains an accuracy of 93%.

Modeling and Analysis of Grid Connected Induction Generator for Wind Power Application: Review
Authors:-M. Tech. Scholar Mohit Kumar, Assistant Professor Harjit Singh

Abstract- Over the past few decades, there has been an increasing use of induction generator particularly in wind power applications. In generator operation, a prime mover (turbine, engine) drives the rotor above the synchronous speed. Stator flux still induces currents in the rotor, but since the opposing rotor flux is now cutting the stator coils, active current is produced in stator coils, and motor now operates as a generator, and sends power back to the electrical grid. Based on the source of reactive power induction generators can be classified into two types namely standalone generator and Grid connected induction generator. In case of standalone IGs the magnetizing flux is established by a capacitor bank connected to the machine and in case of grid connection it draws magnetizing current from the grid.

Enhancement of Micro-strip performance with improvement of antenna gain and feeding technique
Authors:- Pawan Kumar Nishad, Ashish Suryavanshi

Abstract- The goal of this observed is to design and analysis the Microstrip Patch Antenna which covers the Ultra Wide Band 3.1 to 10.6 GHz. This synopsis covers study of basics and fundamentals of microstrip patch antenna. A series of parametric study were done to find that how the characteristics of the antenna depends on its various geometrical and other parameters. The various geometrical parameters of the antenna are the dimensions of the patch and ground planes and the separation between them and it also includes the dielectric constant of the substrate material. The parametric study also contains the study of different techniques for optimizing the different parameters of antenna to get the optimum results and performance. This is a simulation based study. The design and simulation of the antenna is carried out using microwave Studio simulation software. Four antennas with different types of shapes were designed which cover the entire UWB range. The First designed antenna has two half circular patches which are overlapped to each other. A narrow rectangular slit is added to the patch to improve the performance of antenna.

Cfd Analysis Of Flat Plate Solar Collecter
Authors:- M.Tech. Scholar Arjun Kumar Prajapati, Prof. Brijendra Kumar Yadav

Abstract- Fossil fuel sources are confined and so the present scenario of energy consumption and growth are not sustainable in the longer term. The energy demand for different applications can be attained by pick up of the solar energy efficiently. Solar energy is the most promising source of energy and the simplest and efficient way of using solar energy is to convert it into thermal energy for heating applications such as space heating, drying of agricultural products and various industrial applications by using solar air heater. The solar air heater is not efficient due to low convective heat transfer coefficient between absorber plate and flowing air. The low rate of heat transfer coefficient is due to presence of a viscous sub-layer. Turbulence element on absorber plate breaks up the laminar sub-layer and increases heat transfer. Increased heat transfer makes the system more effective. Various investigators have investigated the effect of heat transfer and friction factor in various geometries of artificial roughness in a solar air heater duct.

A Review On Cfd Analysis Of Flat Plate Solar Collecter
Authors:- M.Tech. Scholar Arjun Kumar Prajapati, Prof. Brijendra Kumar Yadav

Abstract-Fossil fuel sources are confined and so the present scenario of energy consumption and growth are not sustainable in the longer term. The energy demand for different applications can be attained by pick up of the solar energy efficiently. Solar energy is the most promising source of energy and the simplest and efficient way of using solar energy is to convert it into thermal energy for heating applications such as space heating, drying of agricultural products and various industrial applications by using solar air heater. The solar air heater is not efficient due to low convective heat transfer coefficient between absorber plate and flowing air. The low rate of heat transfer coefficient is due to presence of a viscous sub-layer. Turbulence element on absorber plate breaks up the laminar sub-layer and increases heat transfer. Increased heat transfer makes the system more effective. Various investigators have investigated the effect of heat transfer and friction factor in various geometries of artificial roughness in a solar air heater duct.

Advancements in CMOS LC VCO Design for Radio Frequency Applications: A Comprehensive Review
Authors:- M.Tech, Research Scholar Aafreen Khanam , Prof. Nitin Tenguria

Abstract-This paper delves into the examination of various topologies employed in the design of CMOS LC VCOs, with a specific focus on achieving lower power consumption and reduced phase noise. Four distinct topologies were investigated and compared based on their power consumption and phase noise characteristics. The results of this comparative analysis reveal that the CMOS LC VCO with pseudo resistance exhibits the lowest phase noise, while the differential cross-coupled CMOS LC VCO demonstrates superior power efficiency. Among the studied topologies, the cross-coupled differential LC VCO topology emerges as a popular choice for optimizing the trade-off between phase noise and power consumption. By leveraging this topology, designers can strike a balance between these competing factors, leading to improved performance in practical applications.

Design of Low Power SRAM using Power Gating and DG-MOS Technology
Authors:-M. Tech. Scholar Pritesh Gupta, Asst.Prof. Ashish Joshi,Asst.Prof. Ashish Ranjan

Abstract-The paper presents a 6T SRAM based on DG-MOSFET and Sleep Transistor for leakage current reduction. A bulk 6T SRAM is implemented and simulated for the proper functioning of the SRAM cell for 1 bit storage on the 90nm technology. We have used a DG-MOSFET for reducing the threshold voltage and so the power consumption. On the circuit level, the static power dissipation has been considered. Reduction of leakage current is done by using Sleep Transistor technique. The DG-MOSFET based 6T SRAM with Sleep Transistor technique is implemented and simulated. The designing and simulation tool we used is Cadence virtuoso. The transient, DC and parametric analysis provide the results. The transient response helps demonstrate the proper functioning of the SRAM, while the DC response provides results related to voltage values, which are useful for understanding the power consumption of the circuit. The parametric analysis gives different values of leakage current on different width of the MOSFET which shows that the bulk 6T SRAM consumes more power than DG-MOSFET based 6T SRAM with Sleep Transistor. The results indicate improved performance of the proposed static RAM compared to the conventional static RAM in terms of leakage reduction.

Investigation and Usage of Tyre Rubber in Pavement Layers for Strengthening
Authors:- PG Scholar Nunavath Suresh, Asst.Prof. K. Abhiram

Abstract-This paper delves into the examination of various topologies employed in the design of CMOS LC VCOs, with a specific focus on achieving lower power consumption and reduced phase noise. Four distinct topologies were investigated and compared based on their power consumption and phase noise characteristics. The results of this comparative analysis reveal that the CMOS LC VCO with pseudo resistance exhibits the lowest phase noise, while the differential cross-coupled CMOS LC VCO demonstrates superior power efficiency. Among the studied topologies, the cross-coupled differential LC VCO topology emerges as a popular choice for optimizing the trade-off between phase noise and power consumption. By leveraging this topology, designers can strike a balance between these competing factors, leading to improved performance in practical applications.

Application and Analysis of Waste Plastic as An Effective Pavement Materials
Authors:- PG Scholar R. Prasanna Kumar, Asst.Prof.K. Abhiram

Abstract-Conventional materials’ year-round availability in sufficient quantity and quality is a major challenge for construction workers in this age of energy crises and resource depletion. The need for these supplies rises steadily as the demand for shelter and living space rises at an ever- increasing rate. Researchers throughout the world are refocusing their efforts to develop locally accessible, low-cost masonry units in response to the problem. To allow for the use of low- quality materials and low-skilled labor in the mass manufacturing of building blocks, the idea of green material and construction has been properly defined in the study. In this light, there is a rising interest in using earth, as a sustainable material, in contemporary architecture. The proper disposal of trash is one of the most pressing environmental issues in the United States today. There are now millions of cubic meters of discarded plastic in our nation. Suitable accommodation of the trash in some form (as fibres) is one approach to resolving these solid waste management and environmental challenges. Basic research can examine their potential use in the production of fiber-based blocks (plastic fiber–mud blocks). Furthermore, the literature study reveals that with very few exceptions, investigations on natural fibers have concentrated on cellulose based/vegetable fibers generated from sustainable plant resources.

Analysis of Exhaust Muffler In Internal Combustion Engine Usingfinite Element Method
Authors:- Research Scholar Om Deo Bhaskar, Asst. Prof. Ramnarayan Sahu, Asst. Prof. Yogesh Mishra

Abstract-Internal combustion engines have been playing a vital role and will remain an active area of engineering education and research in future. Most of the researches in internal combustion engines are of operating performance and fuel performance improvement oriented. Almost all the components in an internal combustion engine are subjected to heat loads. The current study attempt has been made to simulate the physical working conditions of components of an internal combustion engine. The analysis is virtual simulation (because it was carried out with the help of a digital computer and a software tool-ANSYS 17). The current study emphasizes on stress, strain, temperature, heat flux, thermal gradient distributions in the component Exhaust muffler materials. CREO was used for the solid modeling of engine components and ANSYS 17 was used for the analysis. The study was carried out on prime components of an internal combustion engine such as Exhaust Muffler.Exhaust muffler were subjected to study heat and fluid flow loads.

Advancing Technology And Customer Retention In The Telecom Industry Of Uganda: A Case Of Uganda Telecom Limited
Authors:- Isabella Namirembe , Bruce Musinguzi

Abstract-This study focused on exploring how advancing technology influences customer retention in Uganda’s telecom industry, specifically using UTL as a case study. The research objectives were to assess the impact of advancing electronic mobile services, advancing data services/products, and advances in equipment on customer retention in UTL. A descriptive cross-sectional research design was employed, and data was gathered through questionnaires and interviews with 80 respondents from a population of 115 subjects. The findings of the study indicated that advancing electronic mobile services, advancing data services/products, and advancing equipment services all significantly influenced customer retention. Based on these results, the research concluded that there exists a moderate, statistically significant positive relationship between these advancing technologies and customer retention. In other words, investing in advancing technology is crucial for telecom companies to not only attract customers but also retain them. To enhance customer retention, the study provided recommendations for UTL: (i)UTL should focus on educating customers about their data services/products, (ii) efforts should be made to improve network accessibility, and (iii)UTL should make substantial investments in equipment services while also prioritizing customer understanding and engagement.

Advancing Technology And Customer Retention In The Telecom Industry Of Uganda: A Case Of Uganda Telecom Limited
Authors:- Lakavath Mounika, Asst. Prof. K.Abhiram

Abstract-Waste disposal is a major issue in areas where rapid development and urbanization are occurring on a small piece of land. Due to a lack of available land, landfill waste disposal is a major environmental problem in many parts of the world.hazardous. Garbage-to-resource conversion is an appealing substitute for traditional garbage disposal. Conservation of waste into construction material has been shown to be a viable option for the management of large quantities of garbage, providing a double benefit in terms of both a solution to waste disposal and a useful byproduct.Nearly 20% of India’s total land area is comprised of expansive soils, commonly referred to as Black cotton soils (Mohanty et al., 2018; Seehra 2008; Chen 1988). The physical and chemical properties of these deposits cause them to fluctuate in volume with the changing of the seasons (Bhuvaneswari et al., 2018; Sadam 2017; Snethen et al., 1975; Chen, 1988). Inflating ground causes more annual damage in terms of dollars than any other type of natural disaster (Mir, 2015; Petry, and Armstrong, 1989; Jones, and Holtz, 1973).Poor performance and high maintenance costs are typical for pavements built on these soils (Narendra et al., 2018; Magdi 2018; Chittoori et al., 2018; James et al., 2017; Manchikanti and Raju 2011; Steinberg 1992). Use of waste materials and ashes collected from diverse sources has been brought to light as a way to improve soil physical qualities at a low cost and sidestep waste management issues.The presence of the expanding lattice mineral montmorillonite in expansive soils has been documented (Khan et al., 2019; Mahmoud et al., 2018).Seehra (2008) notes that these soils have a high clay content, which is reflected in their strong swell-shrink nature, high liquid limit, and low CBR values. Prior to construction, these soils needed to be amended with a variety of waste products, including After laying several sections of untreated and treated alternatives, lab experiments were followed by field test track research.

A Comprehensive Assessment of the Structural Similarity Index on Spine MR Images Using Improved Edge Detection Technique
Authors:- M.Tech.Scholar Sneh Lata. Asst.Prof. Shyna Babbar, Prof. Dr. Gurpreet Singh,

Abstract-Edge detection is a fundamental technique in digital image processing used to identify and highlight the boundaries or edges between different objects or regions within an image. The goal of edge detection is to locate significant changes in intensity or color in an image, which typically correspond to transitions in the underlying properties of the objects being imaged.SM provides a quantitative measure of the similarity between two images. It allows researchers and developers to objectively evaluate the quality of processed images compared to the original ones. By measuring the structural similarity, it helps determine the effectiveness of various image processing techniques and algorithms.

Enhancing Concrete Barrier Reflectivity With A Recycled Glass Aggregate Replacement
Authors:- Pokala Arjun, Asst.Prof. K. Abhiram

Abstract-On the roadways of the United States, increased accident rates during the evening and rainy weather conditions entail the need of improving the visibility of highway concrete barriers. The reflectance of these delineators is directly correlated to their degree of visibility. The use of white cement as opposed to grey cement and the installation of raised pavement markings to the side of the barriers are two of the suggested approaches that might potentially boost the reflectivity of these concrete barriers. There are several other potential methods. One of the suggested approaches that was put through more laboratory testing was the use of recycled glass in the production of concrete. The purpose of the laboratory experiment was to determine the appropriate mixing proportions that would reduce the likelihood of the alkali-silica reaction (ASR) occuring in recycled glass aggregate concretes without having any detrimental impacts on the compressive strength of the concrete. This paper includes the results of an evaluation done on the retro reflectivity of different concrete mixes.

Modeling and Analysis of Grid Connected Induction Generator for Wind Power Application
Authors:- M.Tech. Scholar Mohit Kumar, Asst.Prof.Harjit Singh

Abstract- Over the once many decades, there has been an adding use of induction creator particularly in wind power operations. In creator operation, a high transport( turbine, machine) drives the rotor above the coetaneous speed. Stator flux still induces currents in the rotor, but since the opposing rotor flux is now cutting the stator coils, active current is produced in stator coils, and motor now operates as a creator, and sends power back to the electrical grid. As founded on the source of reactive power being produced induction creators can be subdivided into two types videlicet standalone creator and Grid connected induction creator. In case of standalone IGs the bewitching flux is established by a capacitor bank connected to the machine and in case of grid connection it draws bewitching current from the grid. This design explicitly deals with the study of grid connected induction creators where frequence and voltage of the machine will be mandated by the electric grid. Among these types of IGs, twice Fed Induction creator( DFIG) wind turbines are currently decreasingly used in large wind granges because of their capability to supply power at constant voltage and frequence. ultramodern control ways similar as Vector control and MFC( magnitude and frequence control) are studied and some of proposed systems are dissembled in MATLAB- SIMULINK terrain.

Examine the Temperature assessment of Foamed Warm Mix Asphalt
Authors:- Bairam Ramu, Asst. Prof. K. Abhiram

Abstract- Warm Mix Asphalt (WMA) has the potential to reduce the application temperature of Hot Mix Asphalt (HMA) and improve workability without compromising the performance of asphalt pavement. This promises various benefits, e.g., a reduction in greenhouse gas emissions, decreased energy consumption and costs, improved working conditions, better compaction, extended paving season, higher reclaimed asphalt content, earlier opening to traffic, etc. These benefits as well as the potential concerns are discussed in this chapter. Mix design considerations and possible specializations of WMA technologies are summarized. Different WMA production technologies are reviewed with an emphasis on practical applications.

Analysis on Conditions on Asphalt Pavement Behaviour for Mechanistic Analysis
Authors:- Kudikala Rajesh Kumar, Asst. Prof. Mudigonda Harish

Abstract- In the broadest sense, a pavement is any man-made surface designed to support the weight of moving vehicles, be they passenger cars or trucks carrying goods. In order for the subgrade (the most compressible section of the pavement structure) to support the weight of the wheels, the paving thickness and properties of the paving materials must be determined in order to construct a pavement. Pavement design is predicated on the principle of stress dissipation via the pavement layers to prevent failure of the subgrade soil. When a vehicle’s weight is transferred through its wheels, the contact area between the tyres and the pavement is quite narrow. This causes a great deal of stress to be exerted on the pavement’s surface. Since the stiffness of a pavement gradually decreases from top to bottom along a vertical portion, understanding how stress is distributed across a layered system of granular materials is crucial. Therefore, the design load in pavement is taken into account as the number of passes of a standard wheel load over a pavement section to be designed, as the wheel load by vehicle on a pavement at a certain design speed does not remain static on a fixed location. Therefore, the strength of the subgrade on which the pavement is to be built, as well as the projected loads on the pavement over the design period, are crucial to the design of the pavement. If the frequency of the loads is constant, a thinner pavement will be needed on weaker subgrade, and vice versa. The same is true for pavement, where a thicker section is needed for bigger load repetitions if the subgrade strength remains the same. Mechanistic design procedures are those that use models based on basic engineering mechanics to determine the stress level in a pavement and to foretell how the pavement will react and behave. However, empirical methods are those that rely on models derived from experience and observation of previous performance.

Advancements in Cmos Lc Vco Design for Radio Frequency Applications: A Comprehensive Review
Authors:- M.Tech.Scholar Jyanti lodhi

Abstract- This paper delves into the examination of various topologies employed in the design of CMOS LC VCOs, with a specific focus on achieving lower power consumption and reduced phase noise. Four distinct topologies were investigated and compared based on their power consumption and phase noise characteristics. The results of this comparative analysis reveal that the CMOS LC VCO with pseudo resistance exhibits the lowest phase noise, while the differential cross-coupled CMOS LC VCO demonstrates superior power efficiency. Among the studied topologies, the cross-coupled differential LC VCO topology emerges as a popular choice for optimizing the trade-off between phase noise and power consumption. By leveraging this topology, designers can strike a balance between these competing factors, leading to improved performance in practical applications.

The Effects of Artificial Intelligence on the Economic Front
Authors:- Krish Prabu

Abstract- Artificial Intelligence (AI) has emerged as a disruptive force transforming various economic sectors and has attracted widespread attention and attention from researchers, policy makers and industry experts. This research paper provides an in-depth analysis of the impact of AI on the economy, looking at its impact on productivity, employment, innovation, market dynamics and income distribution. The research uses a mixed methods approach, combining quantitative data analysis and qualitative case studies to provide a holistic view of the economic impact of AI. Using data from different industries and regions, we explore how artificial intelligence technologies such as machine learning, natural language processing and robotics are changing traditional business models, processes and labor markets. At the same time, the integration of artificial intelligence has affected the labor market, the requirements for skills and work have changed.

Design And Development Of Hydraulic Based Automated Dumper Bucket For Three Wheeler Electric Goods Carrier
Authors:-Mr. Sunil S.D, Asst. Prof. Shrinatha R Katti

Abstract- Thecurrent work involves developing a dumper bucket for an electric vehicle used to carry goods. The dumper bucket will be responsible for loading and unloading the goods efficiently. To achieve this, the project aims to automate the loading and unloading process based on the weight of the goods. The first step is to determine the requirements of the dumper bucket by considering the carrying capacity of the electric goods carrier and the type of materials it will transport. To enable easy tilting and unloading of the materials, a hydraulic system will be integrated into the dumper bucket. This hydraulic system will be powered by a battery mounted on the electric goods carrier. Safety features are incorporated, including a limit switch to prevent over-tilting of the bucket, ensuring safe operations. The final stage of the project focuses on automation. An Arduino UNO is used to develop a prototype model of the automated system. A load cell is employed to detect the applied load on the dumper bucket. Based on this load data, a buzzer and LED lights will be activated to provide warnings. Additionally, if the load exceeds the maximum limit, the system will cut off the power supply to the motor to prevent any unsafe conditions. Once the dumper bucket is fabricated and installed on the electric vehicle, it undergoes rigorous testing to verify that it can handle the required load capacity and operates safely. The aim is to create an efficient and secure system that automates the loading and unloading process for the electric goods carrier, enhancing its functionality and usability.

An Overview of Machine Learning Methods for Restoring Images
Authors:- M. Tech. Scholar Pavan Kalme, Prof. Virendra Verma

Abstract-Computer vision relies on image restoration to restore pictures damaged by noise, blurring, or compression errors. In recent years, machine learning technologies, especially deep learning ones, have become formidable picture restoration tools. This study discusses picture restoration machine learning approaches, their concepts, benefits, and drawbacks.The study introduces picture restoration and its importance in medical imaging, surveillance, and photography. After that, it discusses machine learning and picture restoration. After sparse coding and dictionary learning, the subject moves on to deep learning.Image restoration using Convolutional Neural Networks (CNNs) is examined in deep learning. CNNs’ design and ability to automatically learn detailed features from huge datasets make them ideal for capturing complex deterioration patterns. The research also examines Generative Adversarial Networks (GANs) in picture restoration, especially when generative modeling is used.Image restoration applications such denoising, deblurring, super-resolution, and inpainting are covered. The article describes the machine learning methods used in each application, including their pros and cons. It also emphasizes the need of dataset curation and assessment criteria for picture quality and generalization.

A Review of Breast Cancer using Deep Learning
Authors:- M. Tech. Scholar Nikita Modi, Prof. Akshay Gupta, Mr. Pritesh Jain

Abstract-Breast cancer is the second most common type of cancer in the world, right after lung cancer. Women are more likely to have this problem than any other group. Breast cancer is the most common type of cancer that kills women who are old enough to have children. Medical imaging is not an exception to this rule, because there is always more to learn and room for improvement in every field. If cancer is found early and handled well, it is thought that the number of people who die from it will go down. Using machine learning methods can help improve the accuracy of diagnoses made by people who work in the health care field. Deep learning, also called neural networking, could be used to tell the difference between breasts that are healthy and those that have cancer. With this method, you might be able to tell the difference between healthy and sick breast tissue. Long-term study on the subject looked at breast cancer and how Indian women screen for it, among other things. One of the main goals of the review was to find out about this. A literature review was done with the help of a number of libraries and other sources. Participants in the study were told to use phrases like “breast carcinoma” and “breast cancer awareness,” as well as words like “knowledge” and “attitude” and the gender-neutral word “women.” India also had something to do with the study that was done. This search does not look for English-language papers released in the last 12 years.

Evaluation of the Machine Learning Approach to Image Restoration
Authors:-M. Tech. Scholar Pavan Kalme, Prof. Virendra Verma

Abstract-Machine learning for picture restoration has garnered interest in recent years. This research thoroughly evaluates machine learning methods for picture restoration. We test state-of-the-art convolutional neural network designs and classical image processing algorithms on a heterogeneous dataset of damaged photos.The approach trains and fine-tunes convolutional neural networks on noise, blur, and compression artifacts. PSNR, SSIM, and perceptual quality evaluations are used to compare restoration quality. The models’ computational efficiency and generalization capabilities give a comprehensive evaluation.We found that machine learning approaches, especially convolutional neural networks, outperform classical methods in picture quality restoration across deterioration conditions. Perceptual quality measurements show that these models restore with greater PSNR, SSIM, and visual fidelity. Fine-tuning models for certain degradation kinds offers even better results.This research shows how machine learning can transform picture restoration. The results imply that convolutional neural networks may learn complex characteristics and relationships in damaged pictures, improving restoration quality. Medical imaging, surveillance, and art restoration all depend on picture integrity, therefore this finding has broad ramifications. Machine learning will become more important in picture restoration.

Deep Learning Technique for Breast Cancer Prediction
Authors:-M. Tech. Scholar Nikita Modi, Prof. Akshay Gupta, Mr. Pritesh Jain

Abstract-After lung cancer, breast cancer is the second most common type of cancer. The most common type of cancer is lung cancer. Women of childbearing age are more likely than men to be told they have breast cancer. To lower the death rate from breast cancer, it’s important to find it early. This is because it’s not clear what causes breast cancer. Cancer can be found early, which can improve the chance of life by up to 8%. This can include X-rays, mammograms, and sometimes even MRIs. what’s going on? Even the best doctors have trouble finding small lumps, bumps, and masses, which leads to a lot of wrong positive and wrong negative diagnoses. This is not a good sign at all. A lot of people want to make apps that can find breast cancer earlier and are better at what they do. New technology can now look at photos and then learn from what it finds. In this study, we used a Deep Convolutional Neural Network (CNN) to separate calcifications, lumps, abnormalities, and carcinomas. In earlier works, this goal was reached with simple methods. The cancer was put into one of two groups, normal or aggressive, which helped doctors come up with better ways to treat it. The model had already been through a training lesson. To start, we used this method to finish transfer learning efficiently. The ResNet50. In the same way, we made our model for deep learning better. During the process of teaching a neural network, you can’t say enough about how important its learning rate is. Using the way we give, the rate at which you learn can be changed to fit your needs. When a person first starts to learn, they will make a few mistakes.

Life Cycle Optimization Of Residential Air Conditioner Replacement Using Artificial Neural Network
Authors:-Sawan Johara, Assistant Professor Deepak Solanki

Abstract- A two-in two-out steady-state artificial neural network (ANN)-based model for an experimental variable speed direct expansion air conditioning (A/C) system has been developed for simulating its total output cooling capacity and equipment sensible heat ratio under different combinations of compressor and supply fan speeds. Experiments were carried out, and totally sets of experimental data were obtained for ANN training and testing. An ANN-based model having the configuration of 2 neurons in the input layer, neurons in the output layer and neurons in each of the hidden layers, i.e. configuration, was thus developed. The ANN-based model developed can be used to predict the operating performance of the A/C system with a higher accuracy. It is expected that the model developed can help design a multivariable-input multivariable-output strategy to simultaneously control indoor air temperature and humidity.

A Review On Enhancement Of Heat Transfer Rate In Solar Air Heater Using W-Shaped Roughness
Authors:-M.Tech Scholar Amrit Suman, Prof. Brijendra Kumar Yadav

Abstract- Augmentation of convective heat transfer of a rectangular duct with the help of baffles/ribs has been a common practice in the past few years. This concept is widely applied in enhancing the thermo-hydrodynamic efficiency of various industrial applications such as thermal power plants, heat exchangers, air conditioning components, refrigerators, chemical processing plants, automobile radiators and solar air heaters. Solar air heater is a device used to augment the temperature of air with the help of heat extracted from solar energy. These are cheap, have simple design, require less maintenance and are eco-friendly. As a result, they have major applications in seasoning of timber, drying of agricultural products, space heating, curing of clay/concrete building components and curing of industrial products.

Design and Development of Hydraulic Based Automated Dumper Bucket for Three Wheeler Electric Goods Carrier
Authors:- Asst. Prof. Dr. Shrinatha R Katti, M.Tech. Mr. Sunil S.D

Abstract- The current work involves developing a dumper bucket for an electric vehicle used to carry goods. The dumper bucket will be responsible for loading and unloading the goods efficiently. To achieve this, the project aims to automate the loading and unloading process based on the weight of the goods. The first step is to determine the requirements of the dumper bucket by considering the carrying capacity of the electric goods carrier and the type of materials it will transport. To enable easy tilting and unloading of the materials, a hydraulic system will be integrated into the dumper bucket. This hydraulic system will be powered by a battery mounted on the electric goods carrier. Safety features are incorporated, including a limit switch to prevent over-tilting of the bucket, ensuring safe operations. The final stage of the project focuses on automation. An Arduino UNO is used to develop a prototype model of the automated system. A load cell is employed to detect the applied load on the dumper bucket. Based on this load data, a buzzer and LED lights will be activated to provide warnings. Additionally, if the load exceeds the maximum limit, the system will cut off the power supply to the motor to prevent any unsafe conditions. Once the dumper bucket is fabricated and installed on the electric vehicle, it undergoes rigorous testing to verify that it can handle the required load capacity and operates safely. The aim is to create an efficient and secure system that automates the loading and unloading process for the electric goods carrier, enhancing its functionality and usability.

Analysis on Particle Shape on Shear Behavior Of Aggregate-Geogrid in Pavements
Authors:- PG Scholar Kulkarni Saiteja, Asst. Professor Kalavala Abhiram

Abstract- Poor soil conditions make it impossible for civil engineers to build anything. A ground structure with sufficient bearing capacity is a necessary condition for a building’s stability. Weak soil can have its qualities enhanced by inclusion and confinement through reinforcement. It may fix the issues of shallow foundations with soft soil, such as insufficient bearing capacity and excessive settling. In this study, both experimental approaches and numerical analysis were used to calculate the ultimate bearing capacity of geogrid-reinforced soil. Geosynthetic material’s inclusion and confinement in the soil were studied for their effects. For this experiment, researchers utilized dry sand the Godavari River, close to Mancheryal Telangana. Soil reinforcement using biaxial geogrid, made by Strata Geosystem Private Limited of Hyd, India A reaction frame, mild steel tank, hydraulic cylinder, power pack, electrical panel, and a model foundation are all part of the experimental set-up. The 750mm x 750mm x 750mm Mild Steel tank was used for the tests. The dirt was compacted with the use of a plate vibrator, and a hydraulic cylinder with a 50 kN capacity was employed to provide the vertical load. Experiments were conducted on a total of 208 separate test sets with five variables in mind: the influence of the geogrid’s topmost layer, the spacing between succeeding , the number of geogrid layers, the geogrid’s breadth, and eccentric loading conditions. Plotting the load settlement curves for each of tests allowed us to calculate the ultimate bearing capacity of the soil for each geogrid arrangement. Using the finite element program , the experimental test findings were verified. OPTUMG2 models were used to examine this study’s research topic from the perspectives of the many factors considered. The collapse multiplier, or ultimate carrying capacity, is calculated by the program using analysis theorems. This research demonstrates that the location of geosynthetic reinforcement in the soil is the most important factor in determining the effectiveness of the reinforcement. The soil collapsed in general shear failure, as shown by the load settlement curves obtained from experimental tests. When the geogrid’s breadth is four times that of the footing, the first layer of the geogrid is 0.25 b from the base of the footing, and the number of layers is four with 0.25 b spacing and zero eccentricity xiv loading, the geogrid performs optimally. The experimental method and computational results both determined that the ultimate bearing capacity of the soil was 1981 kN/m2 at the optimal configuration of geogrid parameters. As x/b grows from 0.25 to for geogrid widths 3b and 4b, the contact area between soil particles decreases, leading to less frictional resistance on the failure plane. As a result, there is less peak load. Eccentrically loaded footing has a 39% lower ultimate bearing capacity than concentrically loaded footing in unreinforced soil. The ultimate load intensity in reinforced soil was 22 percent lower at e = 20 mm compared to a footing with a concentric load. This was because the geogrid in the soil mitigated the eccentricity impact. For each set of tests, the Bearing Capacity Factor (BCF) was experimentally computed to represent the increase in bearing capacity owing to geosynthetic inclusion. The best geogrid layout was determined to have a BCF of 5.69. There was a 19.61 percentage point increase in bearing capacity between concentrically loaded footing and eccentric loading circumstances when geogrid was used. Geogrids with a width of 4b were shown to efficiently resist greater horizontal shear loads.

Applying Performance Assessment on Mixture Design to Permeable Concrete Pavements
Authors:-PG Scholar Yedavalli Rajesh, Asst. Prof. Kalavala Abhiram

Abstract- The Indian economy is growing quickly; therefore, protecting its natural resources is essential to keeping nature and development in harmony. Any civilization may develop fully if it uses its water supply wisely, the most crucial resource. The demand for sustainable development is universal. In order to efficiently collect and transmit rain runoff, modern infrastructure design concepts advocate the use of impermeable materials like concrete and bitumen for parking lots, curbs, and gutters. In India, the United States, the United Kingdom, and other nations, conventional Portland cement concrete and asphalt are utilized for pavement building. The increased water runoff is due to the impermeable nature of certain building materials. Rapid, excessive, and increasingly polluted storm water flow into receiving water bodies under these conditions disrupts the natural equilibrium of the environment. The use of pervious concrete to create porous surfaces has the potential to address a number of environmental concerns, such as the depletion of groundwater. Parking lots, walkways, and driveways paved with pervious concrete can alleviate this issue. The aggregate particles in pervious concrete are coated in a thick paste made from regulated proportions of water and cementitious ingredients. The following sections outline the hypotheses for this study of past concrete. Newline Formulation of Past Concrete Mix Proportions 1. Newline Two: Putting in place a permanent concrete pavement and keeping an eye on it newline. The primary goal of this study is to formulate an optimal pervious concrete mixture design for pervious concrete pavement. Compressive strength, void ratio, permeability, and density are among the presumed target attributes of previous concrete that have informed the development of mixture design. Tensile strength, porosity, and compressive strength are the primary metrics of interest.

A Review on CFD Analysis of Tubular and Sector-By-Sector Helical Coil Heat Exchanger
Authors:- M.Tech. Scholar Shashi Kumar Keshri, Prof. Sujeet Kumar Singh

Abstract- A heat exchanger may be defined as an equipment which transfers the energy from a hot fluid to a cold fluid, with maximum rate and minimum investment and running cost. The rate of transfer of heat depends on the conductivity of the dividing wall and convective heat transfer coefficient between the wall and fluids. The heat transfer rate also varies depending on the boundary conditions such as adiabatic or insulated wall conditions. Heat exchange between flowing fluids is one of the most important physical processes of concern, and a variety of heat exchangers are used in different type of installations, as in process industries, compact heat exchangers nuclear power plant, HVACs, food processing, refrigeration, etc. The purpose of constructing a heat exchanger is to get an efficient method of heat transfer from one fluid to another, by direct contact or by indirect contact.

Effective Utilization of CBR and Plate Load Test to Analyze the Strength of Pavements
Authors:-Penta Mahesh, Asst. Prof. Mr. Abhiram

Abstract- Using California Bearing Ratio (CBR) tests and finite element modelling (FEM), this study details the process of determining the elasticity modulus (E) and the subgrade response modulus (ks). Cosmos works FEM model represents the soil, the load plunger, and the steel Mould of CBR, simulating the pressure-displacement reaction of the soil in the CBR Mould. The California Bearing Ratio (CBR) is positively correlated with the Modulus of Elasticity (E).created using the soil’s elasticity as a starting point. In addition, a link is postulated between E and CBR. The modulus of subgrade response may be determined from E values and vice versa. Foundation design, soil structure interaction, highway formation design, etc. all rely on knowing the modulus of subgrade response, and the CBR test is thought to make this task easier.

Interlaminar Fracture of Aerospace Composites Materials
Authors:- Research Scholar Imran Abdul Munaf Saundatti, Research Guide Dr. G R Selokar

Abstract- A fiber-polymer composite’s resistance to delamination is one of its most crucial mechanical characteristics. Even partial delaminations will result in a loss of stiffness, which can be a crucial design factor. The presence of delaminations may also result in complete fracture. A fracture mechanics approach has been the obvious method for characterizing this phenomenon because delamination can be thought of as the progression of a crack. The use of fracture mechanics to determine interlaminar fracture energies, or GC, for various fiber polymer composites using different test geometries to produce mode I, mode II, and mixed mode I/II values of GC is therefore extensively documented in the literature. However, issues with consistency and debates over the accuracy of such results are common.

Literature Survey on Micro-hydro Systems
Authors:- M.Tech. Scholar Ram Pravesh Chauhan, Prof. Dr. Shweta Chourasia

Abstract-Hydroelectricity is electricity produced by the generators that are pushed by the water movement. This is one of the widely used sustainable power. One of the major advantages of the hydro power after constructing the plant is wastage is not created.22% of the word power is generated by hydroelectricity, which constitutes around about 78% of power from inexhaustible natural resources. The yearly hydroelectric creation of India is 115.6 TWh with an introduced limit is 33.6 GW. Miniature hydro is a word utilized for hydroelectric force establishments that commonly produce a power up to 300 KW of intensity. In a recent trend for controlling of most of the industrial loads is mainly based on semiconductor devices which cause such loads to be more sensitive against power system disturbances. Thus, the power quality problems have gained more interest recently. This paper presents a review of different method for energy generation and smart energy management system.

Electric Vehicle Aggregators in Electricity Markets under Optimal Conditions
Authors:- M.Tech.Scholar Vikas Thakur, Prof. Harjit Singh

Abstract- The objective of the proposed scheduling framework is to maximize the revenue of the EVAs while ensuring the fulfilment of charging demands and considering the constraints imposed by the electricity market. The framework takes into account various factors such as electricity prices, EV charging and discharging profiles, grid congestion, and individual EV owner preferences. To achieve the optimal scheduling of EVAs, a mathematical optimization model is formulated. The model aims to find the optimal charging and discharging schedules for the EV fleet, considering the real-time electricity prices and market conditions. Additionally, it incorporates the preferences of EV owners regarding their desired charging durations and departure times. The optimization model is solved using advanced optimization algorithms to obtain the optimal scheduling solution.

Category Attack-Based Searchable Symmetric Encryption Using Des Algorithm
Authors:- Dr.G.Ramesh , Dr.J.S. Kanchana, V.Lekhaa

Abstract- Symmetric searchable encryption (SSE), which allows a facts consumer to soundly seek and dynamically replace the encrypted documents stored in a semi-trusted cloud server, hasreceived considerable attention in recent years. We design the new data structure Category Attack-based SSE to support dynamic updating and boost verification and Leverage the timestamp mechanism within side the scheme to save you the malicious cloud from launching a replay attack. We can achieve more efficient query and verification with Data Encryption Standard Algorithm. By sampling the data, we can solve the problem of unbalanced distribution of network data. To look for functions that high-quality replicate the distinction among anomalous behaviors and normal behaviors Feature selection is enabled for various subsets of each category attacks. To determine the best sampling ratio of each category, DES is used to optimize the sampling ratio of each category and the performance of SSE is used to evaluate candidate sampled data. We verify the effectiveness of the data optimization proposed in this system, the precision, recall, and F1 score obtained by testing. Then we offer an in-depth overall performance analysis. Finally, we compare our scheme through complete experiments. The results are consistent with our analysis and show that our scheme is secure, and more efficient compared with the previous methods with the same functionalities.

Evaluating The Effectiveness Of A Hybrid Geosynthetic Reinforcement System To Mitigate The Differential Heave On Flexible Pavement Due To Expansive Subgrade
Authors:- Kosuna Sai Siddhartha , Asst. Prof. Dr. K. Venkatesh

Abstract-When dealing with expansive soils beneath roadway constructions, transportation agencies have significant issues in terms of ride quality and serviceability. These soils display swell-shrink behaviour when the amount of moisture changes, which create superficial heaving on the pavement structure and are extremely expensive to maintain. Despite remedial measures that exhibited satisfactory results for most of the sections, recurrent damage stillcontinued in fewsections. Hybrid geosynthetic solutions were proposed to address the negative consequences of the swell-shrink behaviour of soil at a deeper depth. In railway applications, hybrid geosynthetic systems were employed to successfully reduce expansive soil swelling. To evaluate the use of hybrid geosynthetic systems to reduce differential heaving from expansive subgrades, a test was developed to simulate a pavement section with an expansive subgrade. Therefore, the purpose of this research project was to investigate the possibility of adopting hybrid geosynthetic reinforcement systems to reduce differential pavement heaving brought on by expanding soils beneath the pavement.

Potential Use of Waste Rice Husk Ash for Concrete Paving Blocks: Strength, Durability, and Run- Strength, Durability, and Run-off Properties off Properties off Properties
Authors:- Eru Madhu, Assistant Prof. K. Abhiram

Abstract- The annual increase in OPC demand throughout the world is measured in billions of tons. Sustainable binders have the potential to reduce the rising need for cement. The use of blast furnace slag, fly ash, and silica fume, among other industrial byproducts, as a cement additive has become widespread in recent years. Silica’s reactivity in rice husk ash is affected by several interconnected variables, such as incineration time and temperature. Twenty- five RHA samples were made. After extensive testing of the many variables that affect grinding efficiency, the ideal grinding setup was finally discovered. Each RHA sample was ground using the most efficient methodology. Analytical and conduct metric methods were used to ascertain the amorphous silica concentration of RHA samples, among other physical parameters. X-ray diffraction (XRD), scanning electron microscopy (SEM), and elemental analysis are only some of the experimental techniques that have confirmed the reactivity of ash. In this study, RHA concrete with a compressive strength of more than 90 MPa was produced. Increases in RHA concentration lead to notable enhancements in the performance parameters of RHA-concrete mixes, including chloride permeability, saturated water absorption, and sorptivity. The sorptivity and water absorption of RHA-blended concrete are shown to be linearly related. Comparing RHA to micro-silica in a cost-benefit analysis, we find that using RHA might lead to a 40% reduction in the price of supplementary cementitious material.

Using GPT-3 to Create General Purpose Assistance Model for MIT World Peace University
Authors:- Vrishani Shah, Viswas Haridas, Anupam Shekhar, Rushabh Bhatt, Asst.Prof. Dr. Rajendra Pawar

Abstract-The annual increase in OPC demand throughout the world is measured in billions of tons. Sustainable binders have the The MIT-GPT project is a college query assistant built using the OpenAI API and LangChain, which aims to provide accurate and relevant responses to MIT-WPU-related queries. With the increasing demand for online education and the need for instant information, having an AI-powered assistant to answer college-related queries can significantlybenefit students, faculty, and staff alike. This technical report provides an overview of the MIT-GPT project, including its architecture, data sources, and performance evaluation.

Dynamic Characteristics of A Sandy Subgrade Textile Fibers in Pavement
Authors:- Nagula Saikiran, Asst. Prof.Mudigonda Harish Kumar

Abstract-The ceaselessly developing individuals and, explicitly, ‘rapid style’ has placed the expectation for apparel high. The drawn-out utilization of materials actuated broadened squander. Material waste, while perhaps not fittingly managed, can cause serious thriving dangers. The traditional techniques for the material waste association, for example, landfilling and consumption, are not harmless to the organic framework. Thus, it makes a big difference to urge better ways of managing reuse or reuse squander materials and new applications. In this evaluation, in the main piece, thermoset epoxy and thermoplastic polypropylene (PP) composites with four unique fiber volume portions (0.1, 0.2, 0.3, and 0.4) were made utilizing cotton strands disconnected from squander materials and waste polyester filaments made during polyester staple yarn fabricating. Further, the flexibility of cotton/PP composites reduces with an improvement in fiber stacking. Then again, the izod influence strength increments with an augmentation in cotton fiber stacking. The flexural strength of cotton/PP composite augmentations with an expansion in cotton stacking from 20 to 40 wt.% and decreases when cotton stacking increases to 50 wt.%. The malleable, flexural, and Izod influence strength of polyester/PP composites increments with polyester fiber stacking..

Investigation on Framework to Estimate the Benefit Cost Ratio of Establishing Minimum Pavement Friction Levels
Authors:- Kamera Manisha, Asst. Prof. Modugu Naveen Kumar

Abstract-In this study, we present a framework for calculating the BCR and setting the threshold at which to initiate SN treatment. Using an MC degradation model, the suggested method quantifies the number of lane miles that must be addressed in order to assess the network’s maintenance cost. Indirect expenses included things like lost time at work and accidents caused by traffic congestion. A monetary value for the benefit was determined by using reductions in crash rates per vehicle mile traveled. Here’s a brief summary of what we discovered: (1) This paper’s major novel contribution is an analytical framework that can be utilized by transportation organizations to estimate the BCR of maintenance plans that aim to offer a minimal SN in a highway network. This evaluation is supposed to be duplicated in a variety of settings, unlike previous studies that depended on engineers’ subjective opinion, assumed values, or local experience to establish either the treatment cost or the benefit of crash reduction. The study may be modified by changing the economic variables used to take into account regional differences. As such, the goal of this study is to provide an estimate of the BCR in situations where an agency employs the intervention threshold approach (i.e., only treats segments with friction levels below a specific threshold). These results are limited to networks in which an agency applied an intervention threshold approach since no additional networks were considered. This investigation does not assess the efficacy of the intervention threshold strategy for controlling skid resistance. .

Investigation on Framework to Estimate the Benefit Cost Ratio of Establishing Minimum Pavement Friction Levels
Authors:- D.Anusha, Modugu Naveen Kumar

Abstract-Incorporation of high content of Reclaimed Asphalt Pavement (RAP) into fresh asphalt mixtures make them prone to thermal cracking and fatigue failure. Rejuvenators are usually recommended to overcome this problem by restoring the aged asphalt binder properties. This study aims to investigate the feasibility of using Mustard oil as a rejuvenator and to evaluate its effectiveness as a rejuvenator by determining the extent to which it restores the chemical and physical properties of aged asphalt binder extracted from RAP. The effect of Mustard oil on physical, rheological, chemical and thermal properties of aged asphalt binder was studied by employing Rotational Viscometer, Dynamic Shear Rheometer, Bending Beam Rheometer, Fourier Transform Infrared Spectroscopy, Thermo gravimetric analysis, Gas Chromatography-Mass Spectrometry and Rolling bottle equipment. Results indicated that Mustard oil effectively restores the properties of aged asphalt binder and can be used as a suitable rejuvenator. Ten per cent of Mustard oil is recommended as an optimum dose for rejuvenation of aged asphalt binder. This dose is based on restoring the RAP binder to match the properties of neat binder having PG64 and is specific to the stiffness of RAP material being used.

Design of low power high speed comparators for flash ADC applications
Authors:- Devendra Kushwaha, Prof. Ashish Ranjan

Abstract-The fundamental requirements of VLSI design are high speed, low power and compact size. Comparators are basic building elements for designing of ADCs. In this work, a dynamic comparator is proposed which is based on double tail architecture. A modification in the form of an extra transistor (control transistor Msc) has been added to the previous circuit [10] along with a reduction in the length of the MOSFET transistor from 180-nm to 90-nm. The proposed comparator attains a sampling speed of 3.3 GHz at a supply voltage of 1.2V and is designed on 90nm CMOS Technology. The power consumption in terms of energy per conversion is 0.2221198 pico Joule and the worst case delay (for ΔV of 1 mV) is found to be 17.7 pico seconds. Apart from the supply voltage, the proposed comparator attains better output parameters compared to previously existing work.

An Analysis of the Capability of Machine Learning to Recognize Facial Expressions
Authors:- M.Tech.Scholar Pritesh Raut, Prof. Dikshika Maliwad

Abstract- Expression recognition of the face is an important component in a broad range of different applications. In order to accomplish a work of this kind, which requires a significant amount of manual labor, the conventional method of feature extraction is used. In the past, various deep neural networks were employed for this purpose; however, presently there are several new approaches that may be used, and these new techniques are probably superior than the older ones. Therefore, the objective of this study is to develop a method for recognizing faces that combines the convolutional neural network (CNN) with the detection of picture edges. The procedure that has been presented is broken down into two stages: the first involves standardizing the facial expression that can be seen in the picture, and the second makes use of convolution in order to extract the image’s edges. After that, a method referred to as maximum pooling is carried out in order to bring the dimensionality down. As soon as the Softmax classifier has finished putting the term into a category, it will be recognized. The facial expression identification investigation was successfully finished with the help of the Fer-2013 dataset. The method that has been presented is capable of reaching a rate of expression recognition of up to 99.68 percent when applied to the dataset that is being utilized. The provided method achieves recognition with a lower number of repetitions, while the system itself is anywhere from five to fifteen times more efficient than the SDSRN, AlexNet, and VGGnet algorithms.

Crop Yield and Fertilizer Recommendation Using Machine Learning
Authors:- PG Scholar Ambala Srinivas, Associate Professor Dr. S. Srinivas

Abstract- It’s no secret that the vast majority of India’s 1.2 billion people make their living in the agricultural sector. Farmers grow the same crops year after year without trying any new types, and they use fertilizer in arbitrary amounts, often without realizing that they aren’t using nearly enough of it. Soil acidity and damage to the soil’s upper layer are two more consequences. Therefore, we developed the system with the use of machine learning algorithms to help farmers. Our system can determine the best crop to grow in a given area by analyzing the soil and weather. The system also provides information on the types and quantities of fertilizers and seeds that should be used. As a result, our technology can help farmers cultivate alternative crops, perhaps increase their profits, and lessen the risk of soil pollution.

Role of ANN
Authors:- Siddharth Mishra

Abstract- The role of artificial neural networks (ANNs) has become increasingly significant in various fields. ANNs, inspired by the structure of the human brain, is computational models designed to recognize patterns and make predictions based on input data. They excel at solving complex problems that are difficult to tackle using traditional algorithms. In recent years, ANNs have been instrumental in revolutionizing industries such as computer vision, natural language processing, and autonomous systems. They have demonstrated remarkable performance in tasks like image classification, object detection, speech recognition, language translation, and self-driving cars. The key strength of ANNs lies in their ability to learn from large datasets and generalize knowledge to make accurate predictions on unseen data. By leveraging their hierarchical structure and numerous interconnected artificial neurons, ANNs can identify intricate patterns and extract relevant features, enabling them to recognize complex objects or understand intricate relationships.

A Review on Heat Transfer Enhancement in Tubular Heat Exchanger with Twisted Tape
Authors:- M.Tech. Scholar Uttam Kumar, Prof. Suresh Kumar Badholiya

Abstract- Thermal power stations, chemical processing plants, air conditioning equipment, freezers, petrochemical, biomedical, and food processing facilities are only some of the many current uses for heat exchangers with twisted-tape inserts, which promote convective heat transmission. As the twisted tape insert adds swirl to the bulk flow, it causes the thermal boundary layer on the tube’s surface to separate. The thermal performance of heat exchangers can be enhanced by the application of heat transfer improvement methods. Tape inserts are a common passive heat transfer augmentation method used in many settings. These include air conditioning and refrigeration systems as well as the food processing sector.

A Review on Thermal Analysis and Optimization of Chevron Nozzle using Taguchi Method
Authors:- M.Tech. Scholar Umashankar Kumar, Prof. Suresh Kumar Badholiya

Abstract- One of the most pressing issues in aviation today is noise pollution and the imperative to significantly lessen the noise exposure of communities in close proximity to airports. The most significant times of noise production in aircraft occur during takeoff and landing. The engines of a commercial airliner are typically the loudest parts of the plane. The secondary source is found in the surrounding airflow (aerodynamic source). In this paper review on thermal analysis and optimization of chevron nozzle using Taguchi method has been done.

A Review on Vibration Analysis and Damping Characteristics of Laminated Composite with Cut-Out
Authors:- M. Tech. Scholar Ankit Jain, Prof., Ravindra Kumar Raj

Abstract- Advantages of fibrous composites and lamination are combined in laminated fiber-strengthened composites. Fiber-reinforced materials are used in the construction of each layer. The fibers in each lamina are laid out differently to impart different qualities and levels of stiffness. So, the most favored perspective with fibre reinforced composite materials is that, the with right lamination processes, quality and rigid solidity may be achieved in a specific direction as per the needs of the design. In this paper review on FEM analysis of laminated composite plate has been done.

Review Onn energy Analysis Of Triple Effect Lithium Bromide Absorption Refrigeration System
Authors:- M.Tech. Scholar Sourabh Singh Patel, Prof. Nitin Tenguria

Abstract-The decreasing supply of fossil fuels like natural gas, coal, and oil and the growing negative effect of these fuels make renewable energy sources more and more essential. Therefore, absorption refrigeration systems (ARSs) have been increasingly preferred over vapor compression refrigeration systems in recent years. Here are some of ARS primary benefits: They may make use of several renewable energy sources (such geothermal or solar) and, depending on the working fluid pairs employed in the system, do not deplete the ozone layer.therefore, in this paper, a review on energy and exergy analysis of triple effect lithium bromide absorption refrigeration system has been done.

Effect of popular culture on the Lifestyle of the Viewers of OTT Platform
Authors:- Research Scholar Miss. Megha Paul, Miss. Mekhla Paul, HoS. Dr. Shruti Nigudkar, Dr. Vaishali Mardhekar

Abstract-With the advent of technology, busier, hectic schedules with almost no time for entertainment, and then the outbreak of the pandemic in recent years, there has been a sharp rise in the viewing of dramas, movies, and shows using various OTT platforms like Netflix, Amazon Prime, Disney+ Hotstar and many more. In addition, ever since the outbreak of the Hallyu waves in the 90s, the consumption of Korean dramas, music, and lifestyle has only seen an increase with globalisation playing an important role in it. And this paper tries to look at the various reasons why people prefer watching, listening to, and using Korean dramas, music, and products. Furthermore, the paper will also try to see ‘watching these Korean dramas or listening to Kpop reIt also tries to understand the effects of these Korean dramas, music, and products on young adults who are one of the biggest consumers of this Korean media and its products.

Interlaminar Fracture of Aerospace Composites Materials
Authors:- Research Scholar Imran Abdul Munaf Saundatti, Research Guide Dr. G R Selokar

Abstract-Composite materials are extensively used in aerospace industries for manufacturing aerospace parts. These parts very to mold and have high strengths. Aerospace components are subjected to impact loading. The stiffness of composite ply varies with respect to ply orientation and resin percentage used. The resistance to withstand the dynamic behavior of each lamina in the presence of resin which acts as a single core material plays a very significant role in withstanding the loads under various load conditions. The use of fracture mechanics to calculate interlaminar fracture stiffness for different composite materials made of fibers and polymers using test geometries of mode I/II fractures.

A Review of Sustainable Developments in Geopolymer Concrete
Authors:- Assistant Prof. M Fayaz, Associate Professor Dr. K Venkatesh, Assistant Professor Modugu Naveen Kumar

Abstract-Geopolymer concrete is proved to have high strength, lesser shrinkage, resistance against reinforcement corrosion, acid and sulphate resistance, freeze-thaw resistance, fire resistance and resistance to alkali-aggregate reaction. There are many parameters which influence the strength characteristics of Geopolymer Concrete. They are types and fineness of Source alumino silicate material used, concentration and type of alkaline activators used, curing temperature and curing time, utilization of M-sand etc. High performance characteristics could be achieved through the correct choice of these parameters. This review paper focuses on the influence of different variables on the properties of geopolymer concrete and the progress in the field of geopolymer concrete. Consequently many research papers pertaining to the geopolymer have been reviewed in this state of art paper.

Analysis and Design of Two Layered flexible Pavement Systems: A New Mechanistic Approach
Authors:- Lecturer V Hema, Assistant Professors M Harish Kumar, Modugu Naveen Kumar

Abstract-Analysis of two layered flexible pavements is considered as a significant aspect for design of low volume roads, which typically consist of a thick granular base course directly laid over subgrade with or without a thin asphalt- wearing course. Permanent deformation or rutting has been observed to be the major distress mode in thin surfaced or unsurfaced low volume roads. In the present study, a new formulation has been proposed to de- termine the surface and interface deflections for both single and standard axle dual wheel assembly for a two layered pavement system. The present formulation has been developed based on mechanistic approach and the solutions obtained from 3-dimensional finite element program, using ABAQUS taking into account the influence of rectangular tire imprint, modulus of granular base course, pavement thickness and ratio of modulus of pavement and subgrade. The effect of Poisson’s ratio of granular base and subgrade is observed to be very insignificant. For the estimation of surface and interface deflections, deflection factors have been generated in the form of non-dimensional charts as a function of ratio of modulus of pavement and subgrade, and ratio of pa- vement thickness and tire width.

Numerical Simulation of Inverted Pavement Systems
Authors:- Lecturer B Narsimha, Associate Professor Dr. K Venkatesh, Assistant Professor Modugu Naveen Kumar

Abstract-Conventional pavements rely on stiff upper layers to spread traffic loads onto less rigid lower layers. In contrast, an inverted pavement system consists of an unbound aggregate base compacted on top of a stiff cement-treated base and covered by a relatively thin asphalt concrete layer. The unbound aggregate interlayer in an inverted pavement experiences high cyclic stresses that incite its inherently nonlinear granular media behavior. A physically sound, nonlinear elastoplastic material model is selected to capture the unbound granular base in a finite-element simulator developed to analyze the performance of inverted pavement structures. The simulation results show that an inverted pavement can deliver superior rutting resistance, as compared with a conventional flexible pavement structure with similar fatigue life.

Advancements in Thirsty Concrete
Authors:- Asst. Professor P Sai Sudha, Asst. Professor Modugu Naveen Kumar, Kalvala Abhiram

Abstract-Pervious concrete has been used for many years in the southern United States but only recently have storm water mandates implemented by the United States (U.S.) Environmental Protection Agency (EPA) created interest for more wide-spread installations, especially in freeze-thaw climates. Validation of the freeze-thaw durability of pervious concrete under the most extreme conditions created an opportunity to explore many additional aspects of pervious concrete and to improve durability through additional mixture characterization and new construction practices. While the material components are similar to conventional concrete, the idiosyncratic behavior of pervious concrete requires revaluating material effects and relationships. Many different factors influence the performance of conventional concrete and many different factors also affect pervious concrete, although limited data exist to support observed and expected responses. The most crucial factors include the specific effect on freeze-thaw durability caused by the coarse aggregate type. Since the volume of paste in a pervious concrete system is much less than traditional concrete and exposure conditions much more severe, aggregate durability criteria must be determined for this specific application. The more extreme exposure conditions also require investigating the effect of air entrainment on the concrete mortar. Air entrainment improves freeze-thaw durability in conventional concrete, but to date has yet to be evaluated in pervious concrete. In addition to mixture properties, construction practices must be modified to suit pervious concrete. While the workability of conventional concrete can be simply checked using a standard slump cone, no method currently exists to determine the workability of pervious concrete. However, workability of pervious concrete influences the ease of placement and density, which also controls the yield and ultimate durability. Determining pervious concrete workability will allow more consistency between placements and help quantify the effect various mixture components have on the fresh mixture behavior. Due to it’s very low water-to-cement ratio (~0.30) curing of pervious concrete is particularly important. Pervious concrete is currently cured under plastic instead of using a conventional curing compound. No research has previously been performed to evaluate the effect various common curing methods have on strength and durability.

Improvement of Efficiency of Mixed Biodiesel Fuel: A Review
Authors:- M.Tech. Scholar Aafreen Khanam, Prof. & Head Nitin Tenguria

Abstract-Diesel with a biodiesel blend has recently been commercially available all over the world due to the paucity of fossil fuels. The growing cost and demand of conventional fuels are anticipated to be lessened by the use of biodiesel in diesel fuel mixes. Engine emissions are also known to be decreased by biodiesel fuel mixtures. The biodiesel may soon pose a threat to diesel fuel. Biodiesel cannot totally replace diesel fuel due to its high density, low cetane number, and poor calorific value. Consequently, biofuel-combined diesel engines are preferable. The study’s objective was to offer a thorough analysis of the articles on the combustion, ejection, and performance characteristics of diesel engines powered by biodiesel-diesel mixes. The potential and role of nanoparticles in the production of bioethanol have been investigated in numerous research studies in the past. This study summarized studies that used different biofuel nanoparticle ratios to analyze the effects on diesel fuel economy. Additionally, this study contained research publications outlining several techniques for enhancing engine performance. It had been reported that nanoparticle addition to biodiesel-diesel blends reduces brake-specific fuel consumption by 18 to 20% compared to blends containing no alcohol or alcohol with or without nanoparticles. Nanoparticles showed helpful function in the development of biofuels from feedstock preparation to chemical reactions. Nano particles were also investigated to be very thermally conductive, which increased combustion and brake performance by 2% to 5%, respectively. Studies have shown that nitric oxide ejections rose by 50% whereas HC, CO, and PM ejections significantly decreased. The results of the studies that were analyzed in this paper suggest that using biodiesel and biodiesel blends as a fuel for CI engines could possibly increase performance while lowering emissions.

Review on Durability Study of Concrete Using Foundry Waste Sand
Authors:- Kunal Verma, Prof. Mahroof Ahmed

Abstract-Concrete is the most extensively used construction material in the world, second to water. Increasing rate of urbanization and industrialization has lead to over exploitation of natural resources such as river sand and gravels, which is giving rise to sustainability issues. It has now become imperative to look for alternatives of constituent materials of concrete. Waste foundry sand, a by-product of ferrous and non ferrous metal casting industries is one such promising material which can be used as an alternative to natural sand in concrete. In last few decades, several studies have been conducted to investigate the effect of addition of waste foundry sand as partial and complete replacement of regular sand in concrete. It has been found suitable to be used as partial replacement of sand in structural grade concrete. A number of properties have been reviewed in the current paper, the results observed from the various studies depict that replacement of foundry sand to a certain extent enhance the durability as well as strength properties of the concrete but simultaneously decreases the slump value with the increase of replacement level of waste foundry sand.

Study of Orbital Angular Momentum with OFDM Wireless Communication System
Authors:- M.Tech. Scholar Tarachand Panche, Asst. Prof. Prakash Pandey

Abstract-Electromagnetic (EM) wave was found to possess not only linear momentum, but also angular momentum. The OAM is a kind of wave front with helical phase. The OAM-based vortex wave has different topological charges, which are orthogonal to each other, bridging a new way for multiple accesses in wireless communications. Multiple-Input Multiple-Output (MIMO) is a wireless technology that uses multiple transmitters and receivers to transfer more data at the same time. This paper proposed implementation and performance analysis of orbital angular momentum with OFDM wireless communication system. The simulation is performed using MATLAB software.

Very Low Permeability Geomembranes Geosynthetics Design and Analysis of Its Erosion Control Behavior
Authors:- Shivam Yadav, Jitendra Chouhan (Assistant Professor)

Abstract- Geopolymers emerge as an ecological alternative for construction materials. These consist of a mixture of aluminosilicate sources and an alkaline solution that dissolves the silicon and aluminum monomers that come from the source to generate a gel called N–A–S–H that will control the main properties of the geopolymer. The geopolymer stands out for having good resistance to compression, as well as good resistance to high temperatures and corrosive environments. They have great potential as a replacement for classical technologies such as concrete, however, require further applied research to determine their feasibility on an industrial scale.

Anxiety Level Analysis through Real Time Image
Authors:- Krishna Patil, Rutuja Chavan, Shital A. Karande, Deepali Giri , Kshitija Thange, Rutuja Wankhede

Abstract-Anxiety is a mental illness that affects most people around the world. Early diagnosis and intervention are important for managing stress and improving personal health. Dental anxiety in children is a perennial concern and can be defined as the absence of feelings of fear, worry, anxiety or fear in an uncertain or unknown way. For this reason, the way to solve this anxiety in dentistry has been sought for a long time and it is important for the early detection of anxious children for the treatment of aggressive behaviour. The foundation for success in paediatric dentistry is behaviour management and the use of these behaviour management techniques to help children learn appropriate behaviour, problem-solving skills, stress reduction pressure, and facilitate appropriate oral therapy. Due to the burden of unmet expectations from parents, people and children, the use of behavioural management techniques in dentistry is constantly changing. This summary presents a new approach to stress detection using a convolutional neural network (CNN). CNN sequential model architectures are designed to extract important features from multiple sources and store expected physical properties in data. The model includes many convolutional techniques, additional techniques to reduce the size, and nonlinear activation functions showing nonlinearity. Training and testing data are separated to enable the performance model to be analysed. Various metrics, including accuracy, are used to evaluate the performance of continuously trained CNN models. The results of this project have important implications for early childhood depression research and interventions. The proposed CNN models are ranked from training and test data and show good results in stress detection.

Enhancement of Higher Performance Concrete (Hpc) By Using Waste Tyre Rubber Powder and Waste Plastic In Modified Road Construction Process
Authors:- Rishi Seth Manik, Shashikant B.Dhobale (Assistant Professor)

Abstract- Now-a-days it is necessary to utilize the wastes effectively with technical development in each field. The old abandoned tyres from cars,trucks,farm and construction equipment and off-road vehicles are stockpiled throughout the country. This leads to various environmental problems which include air pollution associated with open burning of tyres and other harmful contaminants like (polycyclic aromatic hydrocarbon, dioxin, furans and oxides of nitrogen) and aesthetic pollution. They are non-biodegradable; the waste tyre rubber has become a problem of disposal. This paper is intended to study the feasibility of waste tyre rubber as binding material in bitumen, the waste tyre rubber is used with aggregate in different layer and also on the top surface layer mixed with bitumen in percentage and carried out different test result based on it, finding through it the difference in result by forming normal and rubber pavement and calculate the increase in strength of road pavement and also economically achieve.This is not only minimizes the pollution occurred due to waste tyres but also minimizes the use of conventional aggregate which is available in exhaustible quantity.

Labour Productivity Analysis in the Manufacturing Industries Using Fuzzy Logic Algorithm
Authors:- M.Tech. Scholar Ramesh Kanase, Asst. Prof. Vivek singh, HOD. Rajesh Rathore

Abstract- Manufacturing decisions inherently face uncertainties and imprecision. Fuzzy logic, and tools based on fuzzy logic, allow for the inclusion of uncertainties and imperfect information in decision making models, making them well suited for manufacturing decisions. In this study, we first review the progression in the use of fuzzy tools in tackling different manufacturing issues during the past two decades. We then apply fuzzy linear programming to a less emphasized, but important issue in manufacturing, namely that of product mix prioritization. The proposed algorithm, based on linear programming with fuzzy constraints and integer variables, provides several advantages to existing algorithm as it carries increased ease in understanding, in use, and provides flexibility in its application.

Thermal Performance Enhancement of Nanofluids Based Parabolic Trough Solar Collector for Sustainable Environment
Authors:- PG Scholar Mohana Prakash M, Asst. Prof. Arulkumar T, Asst. Prof. Sugan V,
Asst. Prof. Soundararajan R

Abstract- The aims to document the latest developments on the applications of nano fluids as working fluid in parabolic trough collectors (PTCs). The influence of many factors such as nanoparticles and base fluid type as well as volume fraction and size of nanoparticles on the performance of PTCs has been investigated. The reviewed studies were mainly categorized into three different types of experimental, modeling (semi-analytical), and computational fluid dynamics (CFD). The main focus was to evaluate the effect of Nano fluids on thermal efficiency, entropy generation, heat transfer coefficient enhancement, as well as pressure drop in PTCs. It was revealed that Nano fluids not only enhance (in most of the cases) the thermal efficiency, convection heat transfer coefficient, and energy efficiency of the system but also can decrease the entropy generation of the system. The only drawback in application of Nano fluids in PTCs was found to be pressure drop increase that can be controlled by optimization in nanoparticles volume fraction and mass flow rate.

Design And Analysis Of Composite Shaft For A Dc Motor
Authors:- PG Scholar Kabilan G, Asst. Prof. Soundararajan R, Asst. Prof.Sugan V

Abstract- The purpose of the thesis is to investigate the use of a composite shaft material in place of a traditional shaft material (Carbon steel SAE 1045). Composite structures provide benefits over traditional metallic ones like stronger strength, higher specific stiffness, and reduced density. Applications where weight reduction is crucial without sacrificing quality or safety use composite shafts due to their unique properties. This thesis was created for businesses who produce motors and generators. This thesis intends to provide a composite shaft that is lighter than a normal shaft and will be employed in motors with lighter overall requirements.

An Exploration Of The State Of School Readiness In The Offering Of Multi-Grade Teaching: A Case Of Schools In Sekhukhune South District
Authors:- Segwadi Joseph Kokela , Khashane Stephen Malatji

Abstract- This study evaluated the state of schools in the implementation of multi-grade teaching. The researchers followed a qualitative approach with a case study research design. The study population consisted of 24 participants made up of teachers and principals in eight multi-grade schools in the Sekhukhune South District in Limpopo Province. Purposive sampling was used to select three participants from each of the six sampled schools, making a total sample size of 18 participants. Data was collected through individual interviews, focus group discussion, and document analysis. A thematic approach was employed to analyze the data, by identifying themes emerging from the data collection instruments. The study revealed that schools were not ready to offer multi-grade teaching. Teacher incapacity; lack of national framework on multi-grade teaching; and lack of teacher development programs caused schools not to be ready to offer the multi-grade curriculum. The study recommends that multi-grade teachers and their SMTs should be trained in multi-grade teaching. Moreover, schools should be provided with curriculum guidelines on multi-grade teaching. Furthermore, teacher-training universities should offer multi-grade teaching as a compulsory module.

Seisimic Analysis Of Cable Stayed Bridge With Different Design Of Tower Using Staad Pro
Authors:- M.Tech. Scholar Dheeraj Shukla, Asst. Prof. Hirendra Pratap Singh

Abstract- This research uses STAAD PRO software to conduct a structural analysis to examine the performance of cable stayed bridge with different shape of tower under different loading conditions. Results revealed that deflection is highest in an Y-shaped tower as compared to other shape, indicating that star cable arrangements will need more supports than other configurations.In the present investigation, the maximum shear force is obtained in Y-shape tower. The shear force in a cable bridge or any structure can vary depending on its design, load distribution, and applied loads. The maximum shear force in a Y-shaped tower cable bridge could be influenced by factors such as the arrangement and tension of cables, the loads the bridge is designed to carry (such as traffic or pedestrian loads), and the environmental conditions like wind or seismic forces.In the present investigation, the maximum bending momentis also obtained in Y-shape tower. The distribution of bending moments in a cable bridge or any structure depends on its design, the applied loads, and the load-bearing characteristics of the materials used. In a cable bridge with a Y-shaped tower, the distribution of bending moments will be influenced by various factors, including the arrangement of cables, the positions and orientations of the tower supports, and the type of loads the bridge is designed to carry. The bending moments are likely to be highest in regions where the structure experiences the most significant changes in curvature or where the loads are concentrated.

Layered Security Defense, A Panacea to Loss Of Intellectual Properties And Damages To Information System
Authors:-Odunayo Onaolapo Ajayi

Abstract- Cybersecurity has become a continuous lifecycle event that every business owner must consider before setting up a firm. As a result, the strength of an organization is as good as the ability of an organization to protect its intellectual properties. As the threats are becoming rampant and complex, the measures to curb their spread can also be complex and sophisticated. The past and projected economic consequences of the crime are very huge and devastating. This paper x-rays some of the reported cybercrimes across the globe and the proposed economic worth of future occurrences. To minimize the effect and avert economic instability, this paper discusses a Layered security framework and why it is better than a single-layered framework either for On-premises or Cloud-based security solution platforms.

Design and Implementation of 32bit Kogge Stone Adder
Authors:-Banashankari, Eleena Mohapatra

Abstract- The Kogge Stone Adder is a high-performance parallel prefix adder designed to enhance the speed of binary addition operations in digital systems. By mitigating the propagation delay associated with carry signals, it significantly accelerates the computation of binary sums. The adder employs a hierarchical structure, breaking down input numbers into groups and calculating carry signals concurrently{1]. This parallelism enables faster addition, making the Kogge Stone Adder particularly advantageous for wide bit-width arithmetic. Although its gate count is higher compared to traditional ripple carry adders, the drastic reduction in propagation delay compensates for this increase. Consequently, the Kogge Stone Adder proves to be a pivotal advancement in achieving rapid and efficient binary addition, vital for various applications demanding computational speed[2,3].

Evaluating the Efficacy and Scalability of Different Test Automation Frameworks in Agile Development Environments
Authors:-Kodanda Rami Reddy Manukonda

Abstract- Several different test automation frameworks are evaluated in this study to determine their effectiveness and scalability within Agile development settings. The study focuses on the influence that these frameworks have on productivity, dependability, and adaptability to changing needs. When it comes to enabling continuous integration and delivery pipelines, the research illustrates the strengths and shortcomings of prominent frameworks such as Selenium, Cypress, and TestNG by comparing and contrasting these frameworks. There are a number of metrics that are studied in order to decide which frameworks are the best appropriate for Agile teams. These metrics include execution speed, ease of maintenance, integration capabilities, and community support. A hybrid strategy that leverages the unique characteristics of numerous tools can optimize testing procedures, boost software quality, and expedite delivery cycles in dynamic Agile settings, according to the findings. This is despite the fact that there is no single framework that succeeds across the whole software development process.

Decentralized Finance (DeFi): Reshaping Indian Financial Systems
Authors:-Associate Professor Dr Ashfaq Ali

Abstract- Decentralized Finance (DeFi) has emerged as a disruptive force in global financial systems, offering alternatives to traditional banking through blockchain-based solutions. This paper explores the role of DeFi in reshaping India’s financial landscape, focusing on its potential to enhance financial inclusion, streamline cross-border transactions, and democratize investment opportunities. Despite significant opportunities, challenges such as regulatory uncertainty, technological barriers, and financial risks hinder its adoption. The paper provides an in-depth analysis of these issues and offers recommendations for leveraging DeFi to transform Indian financial systems.

DOI: 10.61137/ijsret.vol.9.issue4.339

Effect of Solid Waste on Climate Change- A Review
Authors:-Assistant Professor Vikrant Kumar, Assistant Professor Mohd Nayeem Ali, Assistant Professor Anjali Jakhar

Abstract- Environmental science plays an important part in our daily life. It helps in solving the various issues which are arising in the environment very rapidly and without the checks. It is a burning topic at present. The objectives of the study are to know the global warming, climate change, environmental pollutions and solid waste management. This research is fully based on the secondary data. In this research I analyses the causes and their effects of environmental issues on human beings as well as on plants. I relies that these environmental issues has become a threat to everything and everyone on earth. In environmental issues, each country’s own contribution to worldwide emissions is small so that to solve global environmental problem one needs coordinated actions between countries.

DOI: 10.61137/ijsret.vol.9.issue4.340

Laws and Regulations of Waste Management on Environment Protection and 3R’s
Authors:-Assistant Professor Mohd Nayeem Ali, Assistant Professor Anjali Jakhar, Assistant Professor Vikrant Kumar, Assistant Professor Aabid Ahmad, Assistant Professor Parveen Malik

Abstract- India has published its ‘National Policy on environment’ in 2006 for protecting and conserving critical ecological systems and resources. The State is not an absolute owner, but a trustee of all natural resources, which are by nature meant for public use and enjoyment, subject to reasonable conditions, necessary to protect the legitimate interest of a large number of people, or for matters of strategic national interest There are global challenges effecting Global environment are climate change, stratospheric ozone depletion, and biodiversity loss. To combat the environment challenges all the countries have evolved the 3R’s.The 3R’s principle are Reduce, Reuse, Recycle. The aim of this paper is to study the laws and regulation of some of the developed countries which follow the 3R’s and to know whether the Indian legal framework is at par with the developed countries or is there scope for further improvement for better environment protection.

DOI: 10.61137/ijsret.vol.9.issue4.341

Waste Governance Models: Factors for Successful Waste Management and Food Waste Reduction
Authors:-Assistant Professor Anjali Jakhar, Assistant Professor Mohd Nayeem Ali, Assistant Professor Vikrant Kumar, Assistant Professor Aabid Ahmad, Assistant Professor Parveen Malik

Abstract- Effective waste management and food waste reduction are critical for sustainable development and environmental preservation. This review paper aims to provide a comparative analysis of waste governance models, focusing on the political, institutional, and regulatory factors that contribute to successful waste management. Critical analysis was done for the political factors influencing waste governance, emphasizing the significance of political will and commitment in driving effective waste management strategies. The role of political leadership and policy-making in shaping waste governance models is explored, along with the influence of stakeholder engagement and public participation. It is important to know about robust institutional structures and organizations involved in waste management and emphasize the role of collaboration and coordination among these institutions in achieving efficient waste management outcomes. Regulatory factors related to waste management and food waste reduction are evaluated to know about the impact of these on waste governance models and discusses the challenges and opportunities in implementing effective regulatory measures. Emphasis was made on need for comprehensive and flexible regulations that align with environmental objectives while considering socio-economic realities. Case studies from various regions and countries are presented to highlight successful waste governance models. Recommendations for policymakers, institutions, and stakeholders to improve waste governance models were also discussed.

DOI: 10.61137/ijsret.vol.9.issue4.342

A Comprehensive Review on the Need for Data Driven Automated Handover Mechanisms in Future Generation Wireless Networks
Authors:- Research Scholar Vijay Bisen, Dr. Professor N.K. Singh

Abstract- Automated handovers are critically important for maintaining the Quality of Service (QoS) in wireless networks, typically in mobile UE scenarios.. With increasing number of users and multimedia applications, bandwidth efficiency in cellular networks has become a critical aspect for system design. Bandwidth is a vital resource shared by wireless networks. Hence its in critical to enhance bandwidth efficiency. Orthogonal Frequency Division Multiplexing (OFDM) and Non-Orthogonal Multiple access (NOMA) have been the leading contenders for modern wireless networks. NOMA is a technique in which multiple users data is separated in the power domain. A typical wireless system generally has the capability of automatic fall back or handover. In such cases, there can be a switching from one of the technologies to another parallel or co-existing technology in case of changes in system parameters such as Bit Error Rate (BER) etc. This paper presents a review on existing machine learning based approaches for handover prediction in future generation wireless networks. The salient features of each of the approaches has been highlighted along with identifying potential research gaps, rendering insights into potential search avenues in the domain.

Review on Audit-Ready System Builds Using SMF and Puppet

Authors: Kateryna Holub, Oleksandr Kravchuk, Natalia Koval, Yuriy Sydorenko

Abstract: In regulated IT environments, achieving audit-ready system builds is crucial for maintaining compliance, operational integrity, and trust. This review explores how the integration of Solaris Service Management Facility (SMF) and Puppet configuration management enables the creation of infrastructure that is both resilient and verifiable. SMF offers deterministic service lifecycle control, dependency resolution, and fault recovery, while Puppet ensures declarative system provisioning, configuration drift correction, and policy enforcement. Together, they form a robust framework for building and maintaining UNIX systems that meet stringent compliance standards such as HIPAA, SOX, PCI-DSS, and ISO 27001. This article details integration patterns between Puppet and SMF, including automated service registration, state enforcement, and logging strategies that support continuous compliance verification. Real-world use cases from healthcare, finance, and scientific research sectors highlight the scalability and traceability benefits of this approach. Further, the paper addresses challenges in manifest maintenance, performance bottlenecks, and error debugging, offering practical mitigation strategies. Emerging trends such as Policy-as-Code, AIOps integration, and immutable infrastructure are also discussed, illustrating the direction of future-ready, compliance-driven automation. By aligning infrastructure-as-code principles with service-level orchestration, this framework transforms audit-readiness from a reactive task into a continuous, automated operational model.

DOI: https://doi.org/10.5281/zenodo.15848272

Wireless IoT Communication Models For Secure And Scalable Cloud-Enabled Enterprise Applications

Authors: Anirudh Bora

Abstract: The proliferation of the Internet of Things (IoT) within the modern corporate landscape has necessitated the development of wireless communication models that are not only high-performing but also inherently secure and capable of massive scaling. This review article investigates the architectural evolution of wireless IoT frameworks designed for integration with cloud-enabled enterprise applications. We analyze the taxonomy of current communication protocols, ranging from short-range mesh topologies like Zigbee and Thread to Low-Power Wide-Area Networks (LPWAN) and 5G cellular IoT, evaluating their trade-offs in terms of power consumption, range, and data throughput. Central to this study is a structured three-tier architecture that utilizes edge gateways and cloud-native orchestration platforms such as SAP Business Technology Platform or AWS IoT Core to manage data ingestion, protocol translation, and digital twin synchronization. The article highlights critical strategies for scalability, including zero-touch automated provisioning and hierarchical spectrum management, which are essential for managing global device fleets. Furthermore, we address the rigorous security requirements of the enterprise perimeter, advocating for a zero-trust architecture and application-layer end-to-end encryption to mitigate the risks associated with decentralized wireless nodes. By synthesizing current implementation methodologies with emerging trends, such as 6G-enabled ambient IoT and quantum-resistant cryptography, this research provides a strategic roadmap for organizations aiming to build resilient, hyper-connected ecosystems. Ultimately, the study demonstrates that the synergy between robust wireless hardware and elastic cloud backends is the foundational requirement for maintaining operational agility and data integrity in the age of digital transformation.

DOI: http://doi.org/10.5281/zenodo.18229125

Design and Development of AI-Driven Expert Systems for Financial and Operational Risk Management

Authors: Hriday Chatter

Abstract: Traditional risk management frameworks are increasingly insufficient for navigating the non-linear complexities of modern financial and operational environments. This review article investigates the design and development of AI-driven expert systems as a transformative solution for real-time risk mitigation. We evaluate the transition from deterministic rule-based models to probabilistic, hybrid architectures that incorporate deep learning, fuzzy logic, and Bayesian networks. The article details a multi-layered architectural blueprint, encompassing data ingestion from disparate sources, high-fidelity knowledge bases, and decision-support interfaces designed for human-in-the-loop oversight. Specific applications in financial risk management—including credit, market, and liquidity modeling—are analyzed alongside operational risk domains such as fraud detection, cybersecurity, and supply chain resilience. Furthermore, we address the critical importance of governance and explainable AI in meeting the rigorous transparency requirements of global regulators. By synthesizing current implementation methodologies with future trends like quantum-accelerated simulations and generative AI reporting, this study provides a comprehensive roadmap for developing resilient, intelligent risk management ecosystems. Ultimately, we demonstrate that the strategic integration of AI-driven expert systems is essential for institutional stability and competitive advantage in a volatile, data-centric world.

DOI: http://doi.org/10.5281/zenodo.18229127

From Automation To Accountability: Ethical AI In CRM Workflows

Authors: Santhosh Reddy BasiReddy

Abstract: Customer Relationship Management and enterprise workflow platforms increasingly rely on artificial intelligence to automate decisions related to customer engagement, compliance enforcement, risk evaluation, and operational prioritization across complex organizational environments. While AI-driven automation improves efficiency, consistency, and scalability, it also introduces ethical, legal, and governance challenges that traditional workflow systems were not designed to address. Automated decisions can directly affect customer rights, financial outcomes, regulatory compliance, and organizational reputation, making responsible AI integration a critical architectural and operational concern. This article examines ethical and responsible AI frameworks as they apply to CRM and business workflows, with particular emphasis on governance structures, human oversight mechanisms, transparency, and accountability. By synthesizing established standards, process modeling practices, and human-centered AI research, the paper proposes a structured framework for embedding ethical safeguards into enterprise automation while maintaining operational effectiveness, regulatory alignment, and long-term organizational trust.

DOI: http://doi.org/10.5281/zenodo.18326172

Early Prediction Of Student Academic Performance Using Machine Learning

Authors: Vanaja Kumari Degala

Abstract: Early prediction of student academic performance has become an essential research problem in higher education due to increasing dropout rates and declining academic outcomes. The ability to identify at-risk students at an early stage enables institutions to implement timely interventions and personalized academic support. With the rapid growth of educational data, machine learning (ML) techniques have shown significant potential in extracting meaningful patterns from student records. This paper presents a comprehensive machine learning-based framework for early prediction of student academic performance using pre-admission data and first-year academic attributes. Several supervised learning algorithms, including Logistic Regression, Support Vector Machine, Random Forest, K-Nearest Neighbors, and Extreme Gradient Boosting (XGBoost), are evaluated. Dimensionality reduction using t-distributed Stochastic Neighbor Embedding (t-SNE) is employed to visualize high-dimensional student data. Experimental results demonstrate that combining admission scores with first-year course performance significantly improves prediction accuracy. The proposed approach can assist academic institutions in proactive decision-making to enhance student success and retention.

Operationalizing Responsible AI In Financial Decision Pipelines: Governance, Security, Compliance, Fairness, And Explainability

Authors: Srujana Parepalli

Abstract: By July 2023, financial institutions were rapidly expanding the use of automated data processing and machine learning driven decision systems across core operational domains such as credit underwriting, fraud detection, transaction monitoring, customer risk profiling, and regulatory reporting. These systems increasingly operated with minimal human intervention, ingesting large volumes of transactional and behavioral data to generate real time decisions with material financial and legal consequences. As automation expanded, regulators, auditors, and internal risk organizations began scrutinizing not only model accuracy and performance, but also the governance frameworks that governed how data was processed, how decisions were made, and how accountability was maintained across the lifecycle of automated systems. Traditional governance approaches in financial systems had been designed for deterministic rule based processing and human supervised workflows. While these models provided traceability and auditability, they proved insufficient for modern AI driven pipelines characterized by continuous learning, complex feature engineering, and probabilistic decision outputs. By mid 2023, it was widely recognized that responsible AI could not be achieved solely through post hoc reviews or ethical guidelines, but required structured frameworks that embedded security, compliance, fairness, and explainability directly into automated data processing architectures. Automated data pipelines in financial systems amplified risk through scale, speed, and reuse. Data collected for one regulatory or business purpose was often repurposed across multiple analytical and decisioning contexts, increasing the likelihood of unintended bias, regulatory misalignment, or privacy violations. Machine learning models trained on historical data risked reinforcing systemic inequities, while opaque feature transformations limited the ability of institutions to explain adverse outcomes to customers and regulators. These dynamics elevated responsible AI from a conceptual aspiration to an operational necessity. Responsible AI frameworks emerging in 2023 emphasized lifecycle governance rather than isolated controls. These frameworks addressed data sourcing, feature engineering, model training, validation, deployment, and monitoring as interconnected stages subject to consistent oversight. In financial environments, this meant aligning AI governance with established risk management practices such as model risk management, data governance, information security, and compliance monitoring. Automated data processing systems were increasingly expected to produce verifiable evidence demonstrating adherence to regulatory expectations, internal policies, and ethical standards. Security and compliance considerations further shaped responsible AI adoption in financial systems. Automated pipelines often processed highly sensitive financial and personal data, making them attractive targets for misuse, leakage, or adversarial manipulation. Responsible AI frameworks therefore incorporated security controls such as access governance, data minimization, and integrity validation alongside fairness and transparency requirements. This integration reflected the growing understanding that responsible AI outcomes depend on the resilience and trustworthiness of the underlying data engineering infrastructure.

DOI: http://doi.org/10.5281/zenodo.18641518

Architectural Foundations Of Scalable Cloud And Networked Systems

Authors: Sharmin Sultana

Abstract: The exponential expansion of internet services, enterprise platforms, and data-intensive applications has fundamentally transformed the requirements placed on computing infrastructure. Modern digital services must support unpredictable traffic patterns, real-time interactions, and globally distributed users while maintaining consistent performance. Traditional monolithic architectures, which rely on tightly coupled components and fixed hardware capacity, struggle to accommodate elastic demand and continuous availability. As a result, system failures, performance bottlenecks, and maintenance limitations become increasingly common when these legacy models are exposed to large-scale workloads. To address these limitations, computing has evolved toward scalable cloud and networked systems built upon distributed computing principles. Cloud computing environments enable on-demand resource provisioning, while distributed architectures divide workloads across multiple interconnected nodes to improve reliability and throughput. In parallel, software-defined networking introduces programmable control over network behavior, allowing infrastructure to adapt dynamically to changing workload conditions. Together, these technologies form the backbone of modern scalable platforms capable of handling rapid growth and operational uncertainty. This review examines the architectural foundations that support scalable systems. Key enabling technologies include virtualization, which abstracts physical hardware into flexible logical resources, and containerization, which allows lightweight deployment and portability of applications across environments. The study also discusses distributed computing models and microservices architecture that decompose applications into independent functional components. Supporting mechanisms such as load balancing and network orchestration ensure efficient traffic distribution, high availability, and coordinated operation across large infrastructures. In addition, the paper explores data management considerations including consistency models and fault tolerance strategies required to maintain system correctness in distributed environments. Emerging paradigms such as edge computing and serverless computing are also analyzed, as they extend scalability beyond centralized data centers and enable event-driven execution closer to users. Overall, the objective is to provide a comprehensive conceptual understanding of the architectural principles that underpin scalable cloud platforms and interconnected network infrastructures, offering insight into the design approaches necessary for modern large-scale digital services.

DOI: https://doi.org/10.5281/zenodo.18712135

Cloud-Native Enterprise Engineering: Design, Automation, And Operations

Authors: Tariq Mahmood

Abstract: Cloud-native enterprise engineering has emerged as a transformative paradigm that shifts organizational computing models from rigid monolithic information systems to scalable, distributed, and continuously evolving digital platforms. Traditional enterprise applications were designed for stable infrastructure environments and infrequent updates, whereas modern digital ecosystems require rapid feature delivery, elastic scalability, and uninterrupted service availability. Cloud-native engineering addresses these requirements by designing applications specifically for dynamic cloud environments rather than merely migrating legacy software to virtualized infrastructure. This paradigm integrates several foundational technologies and practices, including microservices-based architectural decomposition, containerization for environment consistency and portability, declarative infrastructure provisioning, and automated delivery pipelines. Together, these enable continuous integration and continuous deployment, allowing organizations to release software updates reliably and frequently. Automation minimizes manual intervention, reduces operational risk, and improves development productivity, thereby aligning software delivery speed with business agility. Beyond development workflows, cloud-native engineering introduces new operational methodologies. Observability practices provide real-time insights into system behavior using metrics, logs, and distributed tracing, enabling proactive issue detection and faster incident resolution. Reliability engineering principles such as service level objectives and error budgets allow organizations to balance innovation velocity with system stability. Additionally, integrated security practices embed vulnerability detection and policy enforcement throughout the software lifecycle, transforming security from a reactive process into a continuous responsibility. The transition to cloud-native engineering also requires significant organizational transformation. Enterprises move from siloed development and operations teams toward cross-functional collaboration supported by internal platforms and self-service infrastructure. While this shift improves efficiency and scalability, it introduces challenges including operational complexity, skill shortages, governance requirements, and financial cost management in dynamically scaling environments. Overall, cloud-native enterprise engineering represents more than a technological evolution; it is a comprehensive operational and cultural shift. By combining architectural modernization, automation, and collaborative practices, organizations can achieve resilient, adaptive, and continuously improving digital systems capable of supporting modern service-driven economies.

DOI: https://doi.org/10.5281/zenodo.18712150

Published by:

Kinematic Variations In Joint Angles Between Grass Track And Treadmill Surfaces

Uncategorized

Authors: Naushad Waheed Ansari, Associate Professor

Abstract: Efficient long-distance running depends on well-coordinated joint movements, especially during the landing and take-off phases. This study aimed to compare the joint angles of the ankle, knee, hip, and shoulder during running on a grass track versus a treadmill. Ten male athletes (aged 19–25 years, height 170–183 cm, weight 58.6–68.9 kg) from Aligarh Muslim University participated. Each athlete ran 750 meters on both surfaces recorded by a high-speed camera (Canon Legria HF S10, 1/1200 shutter speed, 50 Hz). Joint angles were measured during the landing and take-off phases using Silicon Coach Pro software. paired t-test was used to identify significant differences between the two surfaces. Results showed significant differences in ankle and hip angles at take-off, and shoulder angles during both landing and take-off. However, knee and hip angles during landing did not differ significantly. These results suggest that running surface affects certain joint movements, especially at the shoulder and ankle. Understanding these differences can help coaches and athletes tailor training strategies to improve performance and reduce injury risk.

DOI: http://doi.org/10.61137/ijsret.vol.10.issue1.203

 

Published by:

IJSRET Volume 9 Issue 3, May-June-2023

Uncategorized

An Intelligent and Automatic Attendance Tracking System: A Survey
Authors:- Rakshith J, Sarvajith, Shravan K G, Vinay M, Associate Professor Nagaraj.A,

Abstract- Taking attendance manually in classrooms can be a laborious and inefficient process that can lead to several problems. One issue is that it can be time- consuming, especially in large classes. Teachers have to spend valuable class time collecting and recording attendance, which can disrupt the flow of the lesson. Additionally, manually recording attendance is prone to errors, as it is easy to misspell names or mis record attendance. This can lead to inaccuracies in the attendance records, which can have consequences for students and teachers. Another problem with manually taking attendance is that it is inflexible. If a student is absent and then returns to class, it can be difficult to update the attendance records accurately. This can be particularly problematic in situations where attendance is used to track student progress or participation. Manually recording attendance on paper or in a spreadsheet can also present security concerns. The records may be lost or stolen, which can compromise the privacy of the students and the accuracy of the attendance records. Overall, manually taking attendance in classrooms can be an inefficient and burdensome process that can lead to a variety of problems. It is important for schools and teachers to consider alternative methods of tracking attendance, such as electronic systems or mobile apps, that can be more efficient and accurate. A web-based real- time attendance management system is a tool that allows teachers and administrators to track and record student attendance electronically. This type of system is typically accessed through a web browser and can be used from any device with an internet connection. One of the main benefits of a web-based real-time attendance management system is that it is efficient and convenient. Teachers can easily record attendance in real-time, without the need to spend valuable class time collecting and recording the data. The attendance records are also automatically saved and can be accessed by administrators and teachers as needed. Another benefit of a web-based real-time attendance management system is that it is accurate. The system can automatically record attendance based on a variety of factors, such as the student’s face. This helps to ensure that the attendance records are accurate and up-to-date. Web-based real- time attendance management systems can also provide additional features and benefits, such as the ability to send notifications to students or parents about attendance, the ability to track tardiness or absences, and overall, a web-based real-time attendance management system can be a useful tool for schools and teachers looking to streamline and improve their attendance tracking processes.

A Study on Consumer’s Perception towards Handicraft Products with Special Reference to Tiruppur City
Authors:- Assistant Prof. M.Gunasekaran, J.Praveen

Abstract- Handicraft is an art of craft in which people create something solely with their hands or using simple instruments. Handicraft industries are those that manufacture items by hand, rather than utilising machines, to suit the needs of the people in their community. Artistry, crafting, and handcrafting are all names used to describe handicrafts. Handicrafts emerge with the rise of human creative activity.

Improvement Wsn Protocol Performance in Modified Genetic Algorithm
Authors:- Madhuri Singh Chouhan, Prof. Amit Thakur

Abstract- Wireless sensor networks (WSNs) has recently drawn lots of attention due to its application in multiple domains. The sensors have limited power sources and in many applications they cannot be recharged or replaced due to hostile nature of the environment. Finding near optimal solutions for the energy problem is still an issue in WSNs. A new era is opened with algorithms inspired by nature to solve optimization problems. In this paper, we propose genetic algorithm based approaches for clustering and routing in WSNs. The objective of this mechanism is to prolong lifetime of a sensor and increase the quality of service. We perform extensive simulations of the proposed algorithms.

A Wsn Energy Efficient Routing Protocol Implementation Based On Ai
Authors:- Meharban Singh Parmar, Prof. Amit Thakur

Abstract- Recent developments in low-power communication and signal processing technologies have led to the extensive implementation of wireless sensor networks (WSNs). In a WSN environment, cluster formation and cluster head (CH) selection consume significant energy. Typically, the CH is chosen probabilistically, without considering the real-time factors such as the remaining energy, number of clusters, distance, location, and number of functional nodes to boost network lifetime. Based on the real-time issues, different strategies must be incorporated to design a generic protocol suited for applications such as environment and health monitoring, animal tracking, and home automation. Elementary protocols such as LEACH and centralized-LEACH are well proven, but gradually limitations evolved due to increasing desire and need for proper modification over time. Since the selection of CHs has always been an important criterion for clustered networks, this paper overviews the modifications in the threshold value of CH selection in the network.

Novel Approach To Wsn Pdr Enhancement In Manet Routing Control Approach
Authors:- Diksha Yadav, Prof. Amit Thakur

Abstract- Mobile device users use their devices any time anywhere. Hence there are different constraints we discussed on routing in MANET. Several routing protocols have been proposed in recent years for deployment of MANET. There are three type sof MANET routing protocols reactive, proactive and hybrid. In this paper we have analyzed all these approaches and discussed their pros and cons. The practical reason behind failure of these approaches is asymmetric link. From analysis we have proposed Novel Approach for Routing in MANET (NARM) which is combination of three approaches reactive, proactive and zone based.

Chessbase Niet: A Chess Automation
Authors:- Project Mentor Miss Divya Chaudhary, Mihir Srivastava, Arshdeep Singh, Sakshi Jaiswal, Gourav Singh

Abstract- Chess has enthralled humans for ages, and with the development of technology, the game’s rules and methods of analysis have undergone tremendous change. This study introduces Chessbase Niet, a project that digitises a real chessboard using computer vision and machine learning. Users can take a photo of the chessboard with their smartphone’s camera, and the system will automatically recognise the position of the pieces and create a digital image of the board. You can play against the computer, analyse the game, and forecast the winning move with this digital chessboard.

Review On Classification And Prediction Of Ecg Morphology And Intervals Features
Authors:- Vedant Verma, Hemant Amhia

Abstract-The electrocardiogram (ECG) provides essential characteristics of the human heart’s multiple cardiac conditions. The classification of arrhythmias provides a major part in the diagnosis of cardiac disease. Any deviation from the normal sequence of electrical impulses is considered an arrhythmia. Traditional methods of signal processing, machine learning and its sub-branches, such as deep learning, are popular techniques for ECG signal analysis and classification and, above all, for the development of early detection and treatment applications for cardiac conditions and arrhythmias. This article presents a detailed literature survey on ECG signal analysis. This paper aims to analyze the most recent studies on data utilized, features, and machine learning approaches that can address the time computational challenge and be implemented in wearable technology. The study methodology began with a search for relevant papers, followed by a study of the data provided. The second stage was to explore the evaluated ECG characteristics and the machine learning method used to identify arrhythmia. According to the analysis, a significant number of studies selected the MIT-BIH database, even though it needs a substantial ratio of pre-processing effort. We address a detailed existing research work review on the data of real-time signal collection, pre-recorded diagnostic ECG data, analysis and denoising of ECG signals, identification of ECG spectrographic states based upon function technologies, and classification of ECG signals, as well as comparative discussions between the studies analyzed.

Literature Review on Thermal Absorber Design in Photovoltaic Thermal System
Authors:- Mr. Pravin M. Bale, Mr. Ganesh B. Thakar, Mr. Nilesh D. Langhi, Mr. Mantoo Kumar Razak

Abstract-This paper concerned with work performed by the various researchers in the field of solar energy. A literature survey was performed considering design, material, performance, economics, and application of solar energy with the different solar collector. Literature deals with thermal performance improvement technique and application of photovoltaic in the field of solar energy were included in the paper.

Patient Healthcare Monitoring System Using IOT
Authors:- Prof. Anand D.G. Donald, Mrunali Khadilkar, Pummy Biswas, Falguni Tajne, Prajakta Shinde

Abstract-India is a most populous country in the world. Due to over populous the wellbeing of people is one of the serious issues in recent time. The thought of this project is to save the life of many people who are taken their last breath. With the help of IOT we can make it possible. This paper highlights and identifies the application of IOT in healthcare system using ARDUINO In this project the critical condition of the patient can send to the doctors present in nearby hospital. By using different sensors are connected in the ambulance will give the overall information of patient and notification will be generate in the application which is already downloaded in doctors smart phone. If the patient, chances is less than the app will suggest nearby hospital and doctor can start their treatment until the recovery of the patient. All these sensors are connected to the cloud.

Uber Data Analysis
Authors:- Yog Patil, Aryan Raskar, Sonal Singh, Ayush Shukla, Prof. Rajendra Pawar

Abstract- By giving customers convenient and affordable transportation options, ride-sharing services like Uber have revolutionised the transportation sector. In order to understand the variables that affect fare prices, this study focuses on analysing Uber fare data. This study tries to determine the major contributors to fare unpredictability by analysing a large dataset of ride characteristics, including pick-up and drop-off locations, trip lengths, distance travelled, and fare amounts. Regression analysis and machine learning algorithms are used as advanced statistical tools for analysis. The findings show a strong correlation between several variables and fare prices. Distance, time of day, day of the week, and surge pricing all have a significant impact on how much a fare will cost. For a thorough knowledge of fare changes, additional factors including weather, traffic, and geographic areas are also taken into account. The conclusions drawn from this study have applications for both Uber and its users. Understanding the elements that affect price pricing helps Uber optimise its fare structures, effectively handle surge pricing, and raise overall profitability. Customers can benefit from the insights gained from this analysis by using them to inform their choice of trip and prepare for fare adjustments in various scenarios.

Study on Determining Taylor Vortex Flow Mode Development Process Using Various Physical Quantities
Authors:- Hiroyuki Furukawa, Takeomi Yamazaki

Abstract- In recent years, technology that harnesses the unlimited potential of microorganisms has become important as a modest but long-lasting technology. In order to maximize the power of microorganisms, it is necessary to control the flow of culture medium to mix them uniformly, light, carbon dioxide. Taylor vortices are considered suitable for agitated culture of plant and animal cells or microorganisms because they are easy to create and are resistant to disturbances, stable, and have little local shear flow. In this study, we constructed a system that can automatically discriminate the flow mode using numerical results of Taylor vortex flow generated between rotating double cylinders as input data by using deep learning. By comparing the loss and accuracy rate of test data for various physical quantities and comparing the accuracy rate and loss of training data, the physical quantities that can efficiently predict the mode development process of the Taylor vortex were shown. The results show that among the various physical quantities, the radius u is the most accurate when comparing the final loss after learning and the accuracy rate and can efficiently predict mode development process of the Taylor vortex.

Face- Based Voting System With Fingerprint Authentication
Authors:- Prof. Neelamma Shinannavar , Gayatri S. Vharambale, Pratiksha A. Naik, Maithali B. Patil

Abstract- Voting and security related to voting has always been a topic of greater research. Different voting methodologies are implemented yet the security related to voting still plays a major role in wide-scale implementation of different voting systems. This project deals with the development of a face-based voting system with fingerprint authentication. The proposed project deals with the development of a Raspberry-based system using IOT which can use facial data as well as fingerprint-based data to implement a voting system online to vote for candidates. This system can implement an additional layer of security in voting since it is based on the biometric data of the user using face recognition and fingerprint authentication. The voting panel is developed for registering votes and display of results which is hosted on the IOT cloud.

Video Forgery Detection Using Machine Learning
Authors:-Ankita Malage, Vidya Kesarakar, Bhavana Sarapure, Asma Nadaf, Prof. Neelamma
Shinannavar

Abstract- Region duplication is a very easy and effective method to create digital image forgeries, where a continuous portion of pixels in an image are copied and pasted to a different location in the same image. Nowadays Video and image copy move forgery detection is one of the major hot topics in multimedia forensics to protect digital videos and images from malicious use. The Number of techniques has been presented through analyzing the side effect caused by the copy-move operation. In this paper, we propose a novel approach to detect copy-move forgery. And also coarse-to-fine detection strategy based on optical flow (OF) and stable parameters is designed to detect. The detected image is initially divided into overlapping blocks. After the creation of overlapped blocks, the feature extraction technique is applied to the image to extract the features from specific blocks of the image to identify duplicate blocks of an image.

CollabX : Empowering Student Collaboration and Career Development Through Project-Based Collaboration and Skill Analysis
Authors:-Durgesh Ahire, Mayuresh Shinde, Pavan Sargar, Neha Koli

Abstract- CollabX is a dynamic portal designed to facilitate student collaboration and support career growth. By offering features such as project collaboration, skill analysis via GitHub integration, personalized roadmaps, problem posting, peer recommendation, and an inbuilt messaging platform, CollabX addresses the challenges students face in finding suitable project partners. It enables students to post their projects, collaborate with interested peers, and analyze their skills based on factors like GitHub repositories, contributions, programming languages, collaboration experience, and achievements. CollabX provides personalized roadmaps for career development and fosters connections between students through problem posting and peer recommendations. Overall, CollabX creates an inclusive environment where students can collaborate, enhance their skills, and achieve career growth.

Review on Inversion of Short-Time Fourier Transform Magnitude in EMG signal by using MATLAB modelling
Authors:-Tanmay Gupta, Assistant Professor Hemant Amhia

Abstract- Electromyography (EMG) signal is the type of biomedical signal, which is obtained from the neuromuscular activities. Typically, an electromyogram instrument is used to capture the EMG signals. These signals are used to monitor medical abnormalities, activation level, and also to analyze the biomechanics of any animal movements. In this current work, we provide a short review of EMG signal acquisition and processing techniques. We found that the average efficiency to capture EMG signals with the current technologies is around 70 %. Once the signal is captured, the signal processing algorithms applied decides the recognition accuracy, with which signals are decoded for their corresponding purpose (e.g. moving robotic arm, speech recognition, gait analysis, etc). The recognition accuracy can go as high as 99.8 %. The accuracy with which the EMG signal is decoded has already crossed 99 %, and with the upcoming deep learning technology, there is a scope of improvement to design hardware, that can efficiently capture EMG signals.

Sustainability in Aviation Industry
Authors:-Pavithra Guru

Abstract- Air travel has become an extremely important factor to our global society, because it is the primary force behind global social, economic and cultural growth around the world. Approximately 3% of the world’s CO2 emissions are now produced by the aviation industry, with jet fuel consumption accounting for the majority of these emissions. However, improving the sustainability of air travel is not that easy. Lifting people and objects into the air and transporting them over great distances requires a lot of energy. On that account, our mini project will be dealing with the actions that airlines can take to lower their environmental impact by incorporating sustainability into every aspect of the regular tasks. This paper reviews the ways to improve the aviation’s long-term viability by emphasising on attaining sustainable aviation fuel and also by looking at new materials and coating technologies to make planes lighter and more aerodynamic. Furthermore, explore the challenges of introducing Operational improvements – on the ground, during departure and arrival and also in cruise. Additionally, in the last part of our study we have researched some approaches of different airlines through case studies and thrown light into failed theories to support our discussion.

Cervical Cancer Prediction Using Deep Learning
Authors:-Niveditha V, Sanjay S , Shalini K, Sumukh K Murthy, Dr. Neha Singhal, Prof. Pavithra N

Abstract- Given that gynecological cancers are among the most frequently diagnosed cancers, they pose a serious public health concern for women. Many women have a tendency to report their cancer at advanced stages in undeveloped countries with little cancer awareness programs, such as India, inconsistent pathology, and insufficient screening facilities, which negatively affects their prognosis and clinical outcomes. While cervical cancer continues to be second-most prevalent cancer after breast cancer, ovarian cancer is becoming more common in Indian women. Smoking, oral contraceptives, HPV (Human Papilloma Virus), and multiple pregnancies are just a few of the many causes of cervical cancer. Through early detection Adult women can avoid cervical cancer by getting timely treatment and taking tests like the PAP and HPV tests. PAP and HPV tests can detect.

Movie Recommendation System
Authors:- Kuldeep Kumar Singh, Priyanshu Bora, Arman Grover, Sajal Singh Masand, Yadender Singh

Abstract- In the era of information overload, it is very difficult for users to get information that they are really interested in. The mission of Recommendation System is to connect users and information, which in one way helps users to find information valuable to them and in another way push the information to specific users. The need for the hour is to develop some code that can tell at a beginner level the matching pattern of the customer trend and recommend him the best item of his interest level. This will help us in making the customer experience satisfactory and able to achieve good ratings and popularity as well.

Sustainability in Aviation Industry
Authors:- Pavithra Guru

Abstract- Air travel has become an extremely important factor to our global society, because it is the primary force behind global social, economic and cultural growth around the world. Approximately 3% of the world’s CO2 emissions are now produced by the aviation industry, with jet fuel consumption accounting for the majority of these emissions. However, improving the sustainability of air travel is not that easy. Lifting people and objects into the air and transporting them over great distances requires a lot of energy. On that account, our mini project will be dealing with the actions that airlines can take to lower their environmental impact by incorporating sustainability into every aspect of the regular tasks. This paper reviews the ways to improve the aviation’s long-term viability by emphasising on attaining sustainable aviation fuel and also by looking at new materials and coating technologies to make planes lighter and more aerodynamic. Furthermore, explore the challenges of introducing Operational improvements – on the ground, during departure and arrival and also in cruise. Additionally, in the last part of our study we have researched some approaches of different airlines through case studies and thrown light into failed theories to support our discussion.

A Review on Fake Currency Detection and Image Quality Improvement
Authors:- Diksha Bharti, Professor A.K. Sharma

Abstract- Counterfeit currency detection is a major issue around the world, influencing the economy of pretty much every nation including. The utilization of fake money is one of the significant issues looked all through the world now days. The forgers are getting more earnestly to find as a result of their utilization of profoundly trend setting innovation. One of the best techniques to quit forging can be the utilization of fake location programming that is effectively accessible and is proficient.

A Comprehensive Analysis of PID Based Electric Vehicle Model Design in Matlab 2015a Software
Authors:- Sabeer Pinjari, Prof. Madhu Upadhyay

Abstract- The Solar powered plug-in electric vehicle is an economic vehicle with minimum maintenance. The main drawback of electric vehicles is the limitation of driving distance. By adding a solar PV module the vehicle battery can be charged while on drive. Here the mechanical parts like gearbox and differential are avoided. Direct drive to wheels allows efficient drive.

Gesture Based Drawing – Gesdraw
Authors:- Asst. Prof Ms. Geeta N. Brijwani, Mr. Pranav Patel, Mr. Moinuddin Mansoori

Abstract- Using a trackpad or a pen tab might be restricting the artistic flow of people. The system suggested in this research seeks to address this issue. The solution is an application to track the user gestures and relay the drawing as such using only a web camera for the detection. There is a MediaPipe model that has been utilized with CV2, to allow real-time gesture detection and capture and thus it allows free flow of creativity.

Review on ECG Signal Entropy Assessment and PR Intervals Allocation in Malignant Venticilar Arrhythmias
Authors:- Shivani Patel, Hemant Amhia

Abstract- This work is an attempt to discuss and investigate various techniques of extracting and selecting the vital features from the ECG signal in order to analyze the ECG signal automatically. Feature extraction, classification of feature and optimization of extracted feature are some of the common steps of automatically analyze the ECG data. Morphological and statistical features of the ECG signals play very important role in detecting the heart related diseases. A morphological feature gives good result in arrhythmia classification while statistical feature are also useful because of variation in ECG signal for different patients.

Brain Controlled Robotic Arm Using BCI
Authors:- Dr.Priyanka Dubey

Abstract- In this paper we proposed a non-invasive BCI system for controlling a robotic arm. Brain-Computer Interface (BCI) technology has produced the best success in allowing people with motor disabilities to control robots and robotic gadgets through brain signals. The key component of this suggested system is an electroencephalography (EEG) signal recorder. It will capture scalp signals and then use machine learning techniques to classify the user’s intent.

Divisional Production of Micro-Electrodes by Electric Discharge Machining and It’s Performance Evaluation
Authors:- Sumit, Krishna Kumar, Lalla Singh, Mayank Patel

Abstract- Micro-EDM is widely used in micro-holes and 3D microstructures. However, micro-EDM applications are limited due to their rarity. Therefore, microelectrode fabrication is one of the most challenging and hot topics in the EDM field. In this study, EDM is used in the fabrication of microelectrodes. Parametric testing is necessary to ensure high dimensional accuracy of microelectrodes. It is performed by replicating a 1 mm diameter copper electrode on a steel block using a segmented fabrication method. A relationship is established between the excavated cavities of the block and the function of the microelectrodes. Editing effect of parameters (current, pulse width, and pulse pause) is seen on response variables (electrode underside length, electrode length, material removal, velocity, surface roughness and lateral deviation rate). Current and pulse width dominate over otherselected process parameters. Using parameters optimized from parametric studies, copper microelectrodes with a bottom length of 40 µm and a length of 1700 µm is produced. A 1100 μm long, 80μm wide and 30μm deep microchannel was machined on the copperseat.

Using an Adapted Hybrid Intelligent Framework to Make Predictions Regarding Heart Diseases
Authors:- Ms. Tanya Jain, Dr. Anurag Jain

Abstract- The effects of heart disease on a person’s life can be devastating, making it one of the world’s most serious health problems. Patients with heart disease have a compromised ability of the heart to pump blood throughout the entire body. A proper and prompt diagnosis of cardiac disease is the first step in preventing and treating heart failure. Diagnosing heart illness has a long history of being fraught with difficulty. Machine learning-based noninvasive technology can accurately and quickly distinguish between healthy people and those with heart disease. In the proposed research, we used heart illness datasets to develop a machine-learning-based detection system for predicting cardiovascular disease. In order to measure the efficacy of our machine learning algorithms, feature selection algorithms, and classifiers in terms of metrics like accuracy and specificity, we employed cross-validation. Our method allows for quick and easy differentiation between those with heart illness and healthy people. Analysis of the receiver optimistic curves and area under the curves for each classifier was performed. Classifiers, feature selection algorithms, preprocessing techniques, validation strategies, and performance metrics for classifiers have all been discussed in this work. The performance of the suggested system has been evaluated using both the full set of features and a subset. The results include a comparison of recall, F1 score, and false positive rate. Decreases in the number of features used to make a classification have a notable effect on both the classifier’s accuracy and the time it takes to run. The anticipated machine-learning-based decision support system would help doctors make more precise diagnoses of cardiac illness.

Literature Survey on Orthogonal Matching Pursuit For Different Applications
Authors:-Research Scholar Rukmini Kumari, Associate Prof. & HOD Dr. Bharti Chourasia

Abstract- Matching pursuit has been applied to FPGA, VLSI, signal, image and video coding, shape representation and recognition, 3D objects coding, and in interdisciplinary applications like structural health monitoring. Within all the practical applications, one critical issue that the compressive sensing needs to solve is how to reliably recover the original signals from the measured signal in an efficient way. Various algorithms have been proposed to reconstruct signals from the compressively sensed samples. There are several approaches, such as matching pursuit (MP). This paper presents review of orthogonal matching pursuit for VLSI applications.

Bidirectional Single Power Converter Using Low Battery Voltage
Authors:- Diksha Vinod Punshi, Vitthal S. Gutthe
School of Computer Engineering and Technology

Abstract- This paper provides a detailed survey of the past work in the power conversion converter area. The theoretical and experimental works from various types of single and bidirectional power conversion converter are discussed. This section briefly describes various improvements in performance in terms quality factor, efficiency etc. The following reviews provide a comprehensive survey about the developments in the state of art power conversion converter technology around the world.

Asystematic Review of Prevalence and Risk Factors That Affect Nutritional Status of Adolescents
Authors:-Dr. Evayline Nkirigacha-Miriti

Abstract- Adolescents are nutritionally vulnerable due to their high requirements for growth and development and sex maturation. Inadequate nutrition also puts them at high risk of chronic diseases and their detrimental effects appear after a long time during adulthood. Prevalence of malnutrition in adolescent is brought about by their overconsumption of processed foods, junk foods, failure to consume high fiber diets and lack of physical exercise. They also suffer stunting and underweight especially during childhood which is due to poverty and food insecurity in such households where such adolescents reside. Double burden of malnutrition in children and adolescents has such indicators as over nutrition such as overweight and obesity and those of underweight such as stunting, wasting and underweight and these occur simultaneously in both young children and adolescents.Adolescents’ high prevalence of malnutrition is brought about by food insecurity in households, poor hygiene and unsafe water consumption due to gastrointestinal infections. Poor diets which include processed carbohydrates and junk foods bring about high prevalence of overweight and obesity in adolescents and so is lack of physical activities. There is need therefore to engage adolescents in nutrition education and enlighten them on need to engage in physical activities.

<a Beyond Automation: Machine Learning as a UX Design Material

Beyond Automation: Machine Learning as a UX Design Material
Authors:-Diksha Vinod Punshi, Vitthal S. Gutthe

Abstract- This research paper explores the use of machine learning (ML) in user interface (UI) and user experience (UX) design. The paper provides a literature review of existing research on the topic and describes various techniques and algorithms used in ML for UI/UX design, including supervised learning, unsupervised learning, and reinforcement learning. Analytical and experimental work in the field is also discussed, including studies on personalized dashboard interfaces and optimizing interface element placement. The paper concludes that while the use of ML in UI/UX design is still in its infancy, it has the potential to significantly improve the user experience by creating interfaces that are more intuitive, personalized, and effective.

Seismic analysis of RCC building with or without shear wall on plain and slopping ground
Authors:-M.Tech. Scholar Anupam Soni, Prof. Rakesh Sakale

Abstract- The economic growth and rapid urbanization in hilly region has greatly increased the population density in the hilly region by speeding up the development of real estate. As a result, the development of multi-story structures is in high demand in that area.” Construction on sloping terrain is necessary in mountainous areas due to a lack of flat land. When confronted to earthquake lateral stresses, hill structures perform differently from those in the lowlands. The mass and stiffness of these structures change vertically and horizontally, causing the mass and rigidity centres to diverge on different levels. The steep slope of these structures also causes them to slant back toward the slope, yet at the same time they could have setback, since the column of hill building rests at different elevations on the slope. In this study, the seismic analysis of RCC building with or without shear wall on plain and slopping ground has been done.

Effect of Different Cable Arrangements on Collapse Behaviour of Cable Stayed Bridge
Authors:-M.Tech Scholar Manish Saxena, Prof. Pawan Dubey

Abstract- A suspension bridge is similar in that it too features towers and a deck held in place by cables, however this one’s cables support the deck by linking it directly to the towers. Pedestrians, bicyclists, drivers, and passengers in automobiles, vans, and even light rail trains often use it. It is commonly utilised in places where a suspension bridge would be too costly owing to its length, but where the span is too short for a cantilever bridge to be practical. In this study, the collapse behaviour of cable stayed bridge has been done using STAAD PRO.

A Review on Recent Advancement on the Use of Fly Ash and E-Waste in Partial Replacement of Cement
Authors:-M.Tech Scholar Rahul Faraiya, Prof. Sanjeev Agrawal

Abstract-Concrete is one of the most popular building materials available. Dams, bridges, skyscrapers, sewage and water systems, and public buildings—all of these and more are shaped by the design and construction of concrete. Fly ash, with its round, smooth particles, enhances workability right out of the gate. “The improved workability allows for a lower water-to-cement ratio, which in turn leads to increased compressive strength. Utilizing industrial and agricultural waste resources is crucial for achieving sustainable growth and producing a greener concrete material in the building sector. There are a variety of factors contributing to the unsustainable nature of today’s concrete construction market. Therefore, a review on recent advancement on the use of fly ash and e-waste in partial replacement of cement has been done.

Land Registry Management System Using Blockchain
Authors:-Sanjana Gate, Rohan Temgire, Atharva Bankar, Rohit Chavan, Prof. Priyanka Sherkhane

Abstract-The present Land Registration System is a time consuming process and it involves a lot of vulnerabilities and fraudsters use it to cheat the common people and the government. The incomplete/improper registration leads to dispute of ownership and litigations of the land. In this project we make use of blockchain technology to overcome some vulnerability in the existing system. We use Metamask to proceed with the transactions and for verifying the users on our system. This application provides a simple and intuitive user interface, where users buy and sell their lands. The Land Inspector is the one who verifies and approves all the transactions and user accounts. With this system, users can ensure enhanced security.

A Review on Design and Performance of Electrical Solar Rotavator
Authors:-Mr. Bachche Vishal Vijay, Mr. Patil Shubham Pandurang, Mr. Shelake Digvijay Dattatray, Mr. Thamke Lahu Ramchandra, Assistant Professor Mrs. Puja Shantanu Gurav

Abstract-In Indian agriculture, the preparation of seedbed for deep tillage using additional machinery and tilling tools are increased. Power Rotavator or cultivator is one of the tillage machines most suitable for seedbed preparation. In a power Rotavator machine the blade is a critical part, which is engaged with the soil to prepare a seedbed and mix to fertilizer. For increasing the maximum weed removal efficiency of tilling blade in new design.There is because to utilize and increase the fertility of land to increasing the crop productivity. In this machine we have added some extra part which is help to improve the maximum weed removal efficiency. The parts are adjustable wheels (for adjusting tilling depth), clearance between two blade etc. Is create a favorable environment for the sustain growth of crop. Commonly used blade shapes are L, J, and C. power Rotavator is useful for maintaining beds already formed. Power Rotavator perform both operations like pulverizing and bed maintaining at same time.

Evolution Of Fifth Generation Technology In Wireless Communication
Authors:- M. Tech. Scholar Animesh Dube, Prof. & HOD Dr. Bharti Chourasia

Abstract- Due to the ever-growing number of mobile devices, increased trend in the usage of applications, and more data hungry applications, there is a constant need for increased data rates. It is predicted that there will be a thousand-fold increase in mobile traffic by the next decade. According to a number of predictions, such as [1,2], the number of connected devices was forecasted to exceed 50 billion by 2022. These sources have more recently revised their predictions to more conservative ones of 28 and 30 billion, respectively. Irrespective of the exact figures, it is clear that the data traffic and demands of connected devices is growing very rapidly. In this paper we give the review of literature for 5g Technology and evalution of technology and its merits applications. 5G communication is the next generation of 4g wireless communication technology that provide deliver faster data speeds, lower latency, and greater network capacity than its predecessors. 5G is based on Orthogonal Frequency Division Multiplexing (OFDM).

Bidirectional Single Power Converter Using Low Battery Voltage
Authors:- PG Scholar Durgesh Kumar Vishwakarma, Asst. Prof. Abhijeet Patil, Asst. Prof. Vivek Yadav

Abstract- This paper provides a detailed survey of the past work in the power conversion converter area. The theoretical and experimental works from various types of single and bidirectional power conversion converter are discussed. This section briefly describes various improvements in performance in terms quality factor, efficiency etc. The following reviews provide a comprehensive survey about the developments in the state of art power conversion converter technology around the world.

Sign Language Facilitator
Authors:- Asst. Prof Ms. Geeta N. Brijwani, Mr. Labhesh Joshi, Ms. Krasia Noronha

Abstract- The authors proposed a method that utilizes a computer or laptop web camera to create a real-time sign language dataset. They employ technologies such as Keras and CNN Model to develop a sign language recognition system. This system aims to bridge the communication gap between individuals who are deaf and non-signers. The proposed system consists of four modules: image capture, pre-processing, training, and prediction.

Mapping the Inclusiveness of Regional Economic Growth in Indonesia in 2015 – 2020
Authors:- Gusti Ayu Fatmalasari, Alla Asmara, Muhammad Findi

Abstract- This study aims to analyze the mapping of the impact of digitalization on regional inclusive growth in Indonesia. This study uses secondary data sources from 2015 – 2020 and 34 provinces in Indonesia. The IPI variable measured by the McKinley method consists of economic growth obtained through formulating the provincial real GRDP for the 2010 base year. Poverty is explained by the percentage of the province’s poor population. Inequality is measured by the gini ratio, which describes the level of income inequality at the provincial level. Unemployment is explained through the open unemployment rate, namely the percentage of the population 15 years and over who was unemployed during the past week. The results of the analytical method show that the conditions for inclusive growth rates and the availability of information and communication technology infrastructure in Indonesia vary between provinces. And the Williamson index shows that regional disparities in Indonesia for the 2015 -2020 period fluctuated by 0.71.

Steganography with Maximum Standard Deviation Embedding Technique
Authors:- Cyril J

Abstract- Security is of paramount importance in this current age, where technology has become an integral part of our lives. Steganography is a less explored topic in the field of cyber security which can be used to transmit data securely. Steganography is a practice of hiding secret information within a cover medium. The medium could be of any format. In ancient Greece messages were hidden within the was coating of tables. Today it is being used in digital communication to hide sensitive information. However, steganography can be used to hide malware of illegal information and as a result it is important for organizations to be aware of potential risks and to take appropriate measures against steganographic attacks. The Maximum Standard Deviation Embedding Algorithm is designed based on the spatial domain of an image for simplicity and makes use of mean and standard deviation of the image pixels to embed data. It is a performance friendly, robust algorithm that hides data efficiently.

Impact of Self-Organizing Map (SOM) Clustering on Energy Consumption and Communication Overhead in Wireless Sensor Networks (WSNs)
Authors:- Ajay Kumar Singh Bais, Nisha Kumawat

Abstract- Wireless Sensor Networks (WSNs) have gained significant attention in various applications, including environmental monitoring, healthcare, and industrial automation. However, the limited energy resources of sensor nodes pose significant challenges to the network’s overall performance and lifetime. In this study, we investigate the impact of Self-Organizing Map (SOM) clustering techniques on energy consumption and communication overhead in WSNs. SOM clustering offers an efficient approach to organize sensor nodes into clusters, enabling localized data processing and reduced communication requirements. We analyse and compare the performance metrics of energy consumption and communication overhead for WSNs employing SOM clustering techniques against traditional approaches.

Analysis and Design of Code Exceeding Structures Using is 16700
Authors:- M.Tech. Scholar Hitesh Dhuware, Dr. Rakesh Patel

Abstract- Due to population growth and limited available space in cities, the construction of tall buildings has become a necessity. When designing tall buildings, the focus is often on achieving the required stiffness rather than just strength. Proper selection of the structural system and design is crucial to ensure sufficient lateral stiffness, as tall buildings are primarily affected by lateral loads such as wind and seismic forces. Various factors, including building height, plan aspect ratio, slenderness ratio, geometry, and damping, influence the behavior of high-rise buildings and must be considered during the design process.Analyzing the wind loads and structural behavior of tall buildings can be challenging, especially when dealing with unique aerodynamic shapes or flexible buildings that are prone to motion-induced forces.Different countries develop their own codes and standards for the analysis and design of tall buildings. In India, high-rise constructions have been carried out according to various Indian standards and building codes. However, the existing codes and standards may not adequately address all the specific challenges associated with tall buildings. To address this gap, a new code called IS 16700-2017 “Criteria for Structural Safety of Tall Concrete Buildings” has recently been introduced in India.

The Evolution and Impact of Cryptography in Ensuring Data Privacy
Authors:- Parth Mathur, Saksham Saxena, Yasha Mishra

Abstract- Any type of digital information that is stored is known as data. To prevent unauthorized access to computers, websites, and personal data, we need protective digital privacy measures, which refer to data security. Cryptography is an evergreen security development used to protect our assets. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data, allowing us to save more data. Cryptography is essential for protecting users by providing authentication and data encryption. There are popular ways of cryptography for securely sending vital information. In the modern era of computers, cryptography has become a crucial tool to secure various types of digital data. Security of information, especially on the World Wide Web, is a significant concern, involving editing internal confidential documents, authentication during access, and ensuring integrity and confidentiality.

Review on Enhancement of Performance Potential Use Of Ggbs As A Supplementary Cementitious Material Based Geopolymer Concrete And Its Application
Authors:- Jitendra Malakar, Assistance Prof. Piyush Mahajan, Assistance Prof. Jitendra Chauhan

Abstract- Any type of digital information that is stored is known as data. To prevent unauthorized access to computers, websites, and personal data, we need protective digital privacy measures, which refer to data security. Cryptography is an evergreen security development used to protect our assets. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data, allowing us to save more data. Cryptography is essential for protecting users by providing authentication and data encryption. There are popular ways of cryptography for securely sending vital information. In the modern era of computers, cryptography has become a crucial tool to secure various types of digital data. Security of information, especially on the World Wide Web, is a significant concern, involving editing internal confidential documents, authentication during access, and ensuring integrity and confidentiality.

Agricultural Robot – Agricobot
Authors:- Sneha P, Anoob Suresh, Vyshak Mohan, Friya Francies

Abstract- This paper proposes an IoT-based technology plat- form called ”Agricobot” for farming, equipped with sensors to monitor crucial environmental parameters. The accompanying android application allows users to remotely access data from these sensors, including humidity, temperature, proximity, mois- ture, light levels, and crop images. By analyzing this data, farmers can make informed decisions and take appropriate actions, such as watering crops at specific times and applying fertilizers in the right quantities. The android application also provides insights into watering intervals for specific crops. Additionally, connecting these smart bots to smartphones enables global data access and serves as a convenient dashboard for land monitoring. Overall, this combination of devices simplifies and enhances smart farming practices, with IoT playing a crucial role in streamlining agricultural logistics.

A Review of Motor Imagery EEG Classification Based on Transform
Authors:- M. Tech. Scholar Amitesh Raj, Prof. & HOD. Dr Bharti Chourasia

Abstract- The biomedical play significant role in critical disease detection and prediction. The motor imagery-based EEG classification is the approach to detection some serious disease related to human nervous system. The motor imagery EEG signal data recoded with brain computer interface. The brain computer interface system equipped with electrode and sensors. The recoded signals of nervous system are very complex and high dimension. The complexity of dimension and structure of data face a problem of classification and detection. This paper presents the review of transform based methods of feature extraction of motor imagery classification.

Feasibility of Using Shape Memory Alloys in Reinforced Concrete Structural Elements
Authors:-Asst. Lecturer Faisal, A.M., Prof. Ibrahim H.M., Associate Prof. Arab, M.A., Asst. Prof. Raghib, S.R

Abstract- This article offers a comprehensive analysis of the potential application of shape memory alloys (SMAs) in reinforced concrete structures. It delves into the historical progression of SMAs and elaborates on the various types available. The distinct properties of SMAs, such as super elasticity and shape memory effect, render them highly appealing for utilization in reinforced concrete structures. An extensive review of experimental studies employing SMAs in diverse reinforced concrete applications is presented, encompassing the repair and fortification of damaged beams, deflection control, and self-healing concrete. Experimental findings indicate that SMAs have the capacity to partially rebound from deformations, mitigating residual displacements. However, their diminished yield stress and elastic modulus compared to steel may result in reduced strength and energy dissipation in RC beams. To address these issues, researchers suggest strategies like shifting the plastic hinge region away from the beam end using SMA rebars. The article also discusses the potential advantages and obstacles associated with incorporating SMAs in reinforced concrete structures. In conclusion, SMAs exhibit potential for application in reinforced concrete structures, although more research is required to thoroughly comprehend their behaviour and maximize their effectiveness.

Improvement of Multistorey Building Performance with Load Prediction
Authors:- Alka Parmar, Prof. Mahroof Ahmed

Abstract- Analysis of the analysis and design of a multi-storey building with STAAD Pro is carried out. Planning is done by using AutoCAD and load calculations were done manually and then the structure was analysed using STAAD Pro. The dead load, imposed load and wind load with load combination are calculated and applied to the structure. Overall, the concepts and procedures of designing the essential components of a multistory building are described. STAAD Pro software also gives a detailed value of shear force, bending moment and torsion of each element of the structure which is within IS code limits.

Facilitating Learning through “DAYAW”
Authors:- Jessica S. Moc-eng, Jolly B. Mariacos

Abstract-his phenomenological study determined the best strategies through DAYAW(Developing and enhancing learners’ Academic performance through the Yearning of parents as facilitators in various Activities to drive them to accomplish Works) Approach as intervention teachers. Fourteen teachers were chosen as key participants for purposive sampling. Descriptive-survey method of research was used in this study. After a careful analysis of the answered questionnaires from the participants, the extent of used of the DAYAW approach as intervention in facilitating the grade 3 pupils was regularly facilitated. The level of effectiveness of DAYAW approach as intervention was highly effective. It is therefore recommended that the grade three teachers should sustain implementthe DAYAW approach and action plans to enhance the performance of the grade three learners and lessen the risks of failures among the pupils.

The Relationship of Remittances, Macroeconomic Variables, and Unemployment Rates in the World
Authors:- Nadya Ramadhani Ikhsana, Noer Azam Achsani, Mohammad Iqbal Irfany

Abstract- Unemployment is one of the crucial problems in the world. Unemployment in a country indicates low economic growth and low economic performance. One effort that can be done to reduce unemployment is to create jobs. The lack of jobs in a country sometimes requires the country to export domestic labor services abroad, where the wages that will be received by these migrant workers are known as remittances. This research conducted to obtain clear conclusions on the analysis of remittances and other macroeconomic variables on their impact on reducing unemployment rates, and to see whether there are differences response between countries with low, medium and high remittance rates using dynamic panel data Generalized Method of Moment (GMM) in 65 countries in the world within period 2000-2021. Unlike previous studies, this study categorizes countries into 3 categories based on the remittances received by a country. Namely countries with low remittances (0%-3%), medium (>3%-10%), and high (>10%). The variables used in this research are unemployment rate as the dependent variable, while the independent variables are previous unemployment rate, remittances, exchange rates, real interest rates, trade openness, inflation, and GDP per capita. The unemployment rate variable in all categories is most influenced by GDP and the unemployment rate itself in the previous period. The remittance variable which is the main variable of this study, although significant in all categories, the influence it exerts is still very low. Based on the results of the remittance coefficient, the country category that contributes the most to the unemployment rate is in the category of high remittance countries. This result is in accordance with the hypothesis where the most influential country is the country that receives the most remittances. One of the factors that can cause this because the remittances received can be used to improve community performance, such as being used in the development of education, skills, and others, which is in the long term this factor is useful when applying for a job to suppress the growth of the unemployment rate.

A Passive Radio Frequency Identification Technology Application: Implement of an Automatic Door Lock System Using Arduino IDE
Authors:-Umar Abdullahi Karaye, Mahmood Umar, Muhammad Mu’azu

Abstract- Access control is the process of verifying a user’s claimed identity and giving or denying the access. The aim of this study is to construct a secured, simple and cheap Automatic door lock system using RFID technologyfor security of homes and buildings for an individual or group particularly in Nigeria. There are a lot of studies conducted in this area especially by the final year students as projects in the tertiary schoolsbut mostly unpublished, making literatures obsolete, as such state of art in this area is hard to find. Consequently, this studyproposed an automatic door lock system that will use a passive type of RFID technology. The proposed system is to secure space located on same or different part of buildings. The system uses both hardware and software: composed of the following components; microcontroller, RFID card reader, LCD monitor, motor driver IC, battery, buzzer, and a servomotor. The system will scans and verifies passive RFID card for identification purpose; it is a low power system. The C programming language was use to implement the software part using the Arduino IDE which can manage the control of the opening and closing of door. More so,the system makes use of RFID Reader, servomotor and microcontroller in order to unlock the door. The system also displays information to the L.C.D monitor in order to maintain communication between the user and the system. The user will communicate with the system through the L.C.D monitor and scan his/her card then the module read the tag ID`s data and send the information to the Microcontroller, then the Microcontroller confirms the authenticity of the card and control the servomotor to open the door if card is valid, otherwise it remains locked.

Predicting Movie Success through Ratings Analysis: A Machine Learning Approach
Authors:-Dipesh Shah , Swarda Mashere, Ayush Kumar, Shamika Chalse , Dr. Rajendra Pawar

Abstract- one of the main forms of entertainment worldwide is the movie. This essay focuses on predicting a movie’s success rate by performing predictive analysis on the film’s numerous elements. The success of films was predicted using machine learning algorithms in this paper, including Decision Tree, K-Nearest Neighbors (KNN), Naive Bayes, Logistic Regression, and ensemble methods. Classifier provided the highest accuracy, according to the data.

Effects of Alkaline Activator Molarity and cure Temperature on Properties of Geopolymer Synthesized from the Federal Polytechnic Gate Laterite Deposits
Authors:- K. D Oluborode, I. O Olofintuyi , O. O Popoola

Abstract- Geopolymer is involved in study and application for its proclaimed advantages over Portland cement. Studies of factors affecting the physical and mechanical properties of geopolymer materials is critical to impending requirements for standardization and regularization of applications of the materials. Materials are mostly described by their physical and mechanical properties when they are deployed for structural development. However, to understand the properties in design and deployment, the parameter affecting the property needs to be understood. This study aims to investigate the impact of alkaline activator concentration and cure temperature on geopolymer specimens produced based on geologically sourced material deposits near the Federal Polytechnic Gate. Alkaline activator solution was composed of NaOH of varied molarity (8, 10, and 12 with Nasio3 and sterile water in ratio of 7:3:3, respectively. The activator was applied to pulverized calcined laterite sourced near the federal polytechnic main gate. The activator to geopolymer sourced material ratio was maintained at 0.45 for all specimen mixes, thoroughly mixed to produce 27 geopolymer gel cubes. 3 sets Specimens of the same alkaline activator concentration were respectively cured at 27°c (room temperature) and oven temperatures of 50°c and 90°c for respective maturities of 28 days and 72 hours. Density, porosity, and comprehensive strength tests were conducted, and their respective outcomes were related to specimens’ molarity and cure temperature. Specimen density ranges from 1.81g/cm³-2.32g/cm³, Porosity ranges from 5.32% to 26.08%, and Compressive strength ranges from 0.5 N/mm² – 6.9N/mm².

Comparative Study of Time History Analysis of Multistorey Steel & RCC Buildings
Authors:- Quazi Rayyan Amjad Ali, Dr. Swati Ambadkar

Abstract-The study will investigate the effectiveness of different lateral force-resisting systems, such as shear walls, bracing systems, and damping systems, to improve the seismic performance of the buildings. The findings will provide recommendations for selecting appropriate structural elements and retrofitting strategies to enhance the seismic performance of multistorey steel and RCC buildings. The study’s probable implications include improved seismic performance, cost-effective design, safer buildings, compliance with building codes, and contribution to research. Overall, the proposed work will contribute to the development of a comprehensive understanding of the behavior of multistorey steel and RCC buildings under seismic loading conditions and provide valuable insights for the design and retrofitting of buildings to improve their seismic performance.

Implementation of Multi-Operand B/D Adder for Low Power Dissipation
Authors:- M. Tech. Scolar Varsha Tumbhurne, Prof. & H.O.D. Dr Bharti Chourasia

Abstract-High speed, low power consumption and smaller area are some of the most important criterion for the fabrication of DSP systems and high performance systems. In view of increasing distinction of commercial, economic and internet-based applications that process data in decimal arrangement. In this paper, a new architecture decimal addition of Binary Coded Decimal (BCD) operands, which is the main design part of high speed low power multi-operand binary adders based on this add-3 digit BCD adder, new architectures for higher order (n-digit) BCD adders such as ripple carry adder are developed. The main goal of the proposed algorithm is to perform very much capable fixed bit binary to BCD conversion in terms of delay, power and area. As mentioned earlier, most of the recently proposed adder uses 16-bit binary to BCD converters. The proposed algorithm has been deliberately designed for such converters.

Behaviour Of Paper Insulation In Different Conditions
Authors:-Hemant Raj Maravi, Dr. A.K. Sharma

Abstract- Transformer is one of the main equipment in power transmission and distribution network. Thus, it is important to ensure optimal operation of power transformer for an efficient supply of energy to utilities. One of the main components of a power transformer is the transformer insulation system, namely, transformer insulation oil and transformer insulation paper. This review provides an in-depth discussion on the reactions that occur in the insulation system of the power transformer. These include, oxidation, hydrolysis, pyrolysis, partial discharge, and arcing. The reaction mechanisms, conditions and the relationship between these reactions are thoroughly analysed in this review. Apart from that, this review also provides an inclusive discussion on the state-of-the-art methods used to monitor the byproducts formed from the mentioned reactions. These methods were developed to overcome the limitation of conventional methods that are complex and costly. Moreover, it presents an impartial evaluation of the challenges and prospects in making the power transformer monitoring system more efficient in terms of cost and time. Information corroborated in this review is expected to provide an important roadmap for future research in monitoring the condition of power transformer.

Thermal Based Analysis of Continuous W-shaped rib in Solar Air Heater
Authors:- M.Tech. Scholar Nitisha Sharma, M.Tech. Scholar Nilesh Singh,Prof. D.S. Rawat

Abstract-Augmentation of convective heat transfer of a rectangular duct with the help of baffles/ribs has been a common practice in the past few years. This concept is widely applied in enhancing the thermo-hydrodynamic efficiency of various industrial applications such as thermal power plants, heat exchangers, air conditioning components, refrigerators, chemical processing plants, automobile radiators and solar air heaters. Solar air heater is a device used to augment the temperature of air with the help of heat extracted from solar energy. These are cheap, have simple design, require less maintenance and are eco-friendly. As a result, they have major applications in seasoning of timber, drying of agricultural products, space heating, curing of clay/concrete building components and curing of industrial products. In this study CFD analysis for enhancement of heat transfer rate in solar air heater using w-shaped roughness has been done.

Comparative Analysis of Decision Tree and Random Forest Machine Learning Algorithms for Diabetes Prediction
Authors:- Adjunct Professor Dr. Saumendra Mohanty, PGDM Rishabh Shukla

Abstract- Using the Pima Indians Diabetes Database, this research study compares and contrasts the Decision Tree and Random Forest algorithms for diabetes prediction. The goal of the study is to determine how well these algorithms predict diabetes accurately and to analyse their performance using metrics like accuracy, precision, recall, and F1-score. Before applying the algorithms, the dataset goes through pretreatment stages like data cleaning and feature selection. The analysis and testing results show how well both algorithms perform as well as their advantages and disadvantages. The findings contribute to the field of machine learning-based healthcare applications by offering insights on the applicability of Decision Tree and Random Forest for diabetes prediction.

Improvement of Indoor Air Quality Using Bio-Based Solutions: A Review on Green Systems to Reduce Indoor CO2 Levels
Authors:- Nisitha S ,Geetha Balasubramani , Paul Pradeep J

Abstract- – Poor air quality is a major concern in today’s world, particularly indoor air quality, because most women and children spend the majority of their time indoors and are more severely affected by respiratory disorders than men. Indoor CO2 concentrations are primarily dependent on the occupancy level and outdoor air supply rate. CO2 is the most significant anthropogenic greenhouse gas contributing to global warming. This paper provides an overview of the applications of carbon anhydrase, bacteria, and microalgae in CO2 capture.When it comes to indoor CO2 levels, our bodies are the primary source. Other sources include cooking, smoking, wood stoves, and fires. Carbon dioxide emissions drastically increased from 1990 to 2000 by 13% and are expected to increase by 30–50% until 2050. Humans are harmed by CO2 exposure in a number of ways, including respiratory acidosis, which is caused by an acid–base imbalance in the blood. It may be well tolerated but can also cause memory loss, sleep disturbances, excessive daytime sleepiness, and personality changes.Algal photobioreactors have the highest CO2 collection capability of the developed methods. Algae-based CO2 conversion offers a cost-effective option for reducing our carbon footprint. In addition, an algae-based CO2 mitigation strategy has the potential to obtain valuable products at the end of the process. One of the potential solutions for anthropogenic CO2 conversion is algae-based CO2 reduction.

A Implementation Of Highways Traffic Sound Barrier And Analysis Of Solid Metallic Modular Panels
Authors:- Wasim Qureshi, Prof. Vinay W. Deulkar

Abstract- With the development of road construction, traffic noise pollution becomes more and more serious. Sound barrier, an effective and comparatively inexpensive measure of controlling noise, will be developed to some degree. The sound barrier durability is a very complicated problem. It is influenced by structure design, concrete construction and so on.

Artificial Intelligence in VLSI Routing: A Review
Authors:- Nagavalli S, Jyoti R Munavalli

Abstract- An Artificial Intelligence Approach to VLSI Routing presents a system that performs routing close to what human designers do. This paper summarises the different algorithms of AI/ML used in VLSI routing. This paper reviews on the different AI/ML techniques and algorithms to overcome routing problems like congestion prediction, to solve fundamental issues of routing like scalability, reward design, and end-to end learning paradigm, circuit routing, artificial intelligence enabled routing (AIER) mechanism with congestion avoidance in Software development networks.

Rainfall and Temperature Patterns in Ondo State, Nigeria
Authors:- Faweya Olanrewaju, Akinyemi Oluwadare, Ajayi Esther Dunsin, Ayeni Taiwo Michael

Abstract- Rainfall and temperature are the most prominent climatic variables in the assessment of climate change globally. In this paper, the trend and relationship between rainfall and temperature using data from NIMET, Akure, Ondo state. The result revealed that both rainfall and temperature show fluctuations with equal number of negative anomalies with a significant negative correlation between rainfall and temperature.

Enhancing Device Provisioning and Connectivity in IoT Systems Using Azure IoT Hub and DPS: A Case Study
Authors:- Seetaiah B, Technology Manager

Abstract- The exponential growth in the number of IoT devices across various industries has driven the need for efficient, scalable, and secure solutions for device provisioning, connectivity management, and telemetry data ingestion. Traditional approaches often fall short due to their inability to handle the increasing volume, security complexities, and real-time processing requirements associated with modern IoT deployments. This paper explores the integration of Azure IoT Hub and Device Provisioning Service (DPS) as a solution to streamline device connectivity management and optimize telemetry data handling. The study provides a detailed analysis of the system architecture, workflow, challenges encountered, performance improvements achieved, and future scalability considerations. Real-world use case scenarios are presented to demonstrate significant gains in performance, security, and operational efficiency, highlighting the potential of these cloud-native solutions to revolutionize IoT management. By leveraging these technologies, organizations can achieve more reliable, secure, and scalable IoT deployments, paving the way for smarter and more responsive systems.

DOI: 10.61137/ijsret.vol.9.issue3.257

A Review Paper for Transmission of Encrypted Image Over Cloud System
Authors:- Research Scholar Mr. Prabal Joshi, Assistant Professor Dr. Shweta Pandey

Abstract-In different cases of data transmission in a communication system of clouds the most widely used approach is encryption which is considered by far a necessary step. Encryption in simple words is locking of information in a box which needs a key to unlock; now it all depends upon the type of technique and its necessary awareness becomes a mandatory part of complete communication systems. Cryptography involves a 5-tuple (P, K, C, and E, D) consisting of the plain text or message P, set of keys K, cipher text C, encryption algorithm E and decryption algorithm D. An Original message is known as the plaintext, while the coded message is called the cipher text. The process of converting from plaintext to cipher text is known as enciphering or encryption; restoring the plaintext from the cipher text is deciphering or decryption. The many scheme used for encryption constitute the area of study known as cryptography. To ensure information and data privacy over the cloud, application is encrypting the user data before sending it over the cloud. In our research work we propose a new scheme which encrypts the text or image message in decrypt form by executing some steps. We expect that results of this technique are very fruitful as compared other technique.

Preparation, Structural Analysis, and Biological Assessment of Modified Acetophenone Variants Derived from 4-Hydrazinyl-7H-Pyrrolo[2,3-D]Pyrimidine
Authors:- Jyotiba V. Pawar, Dhananjay V. Mane

Abstract-Developing new bioactive molecules is a key priority in pharmaceutical and materials science studies. This research produced modified acetophenone variants of 4-hydrazinyl-7H-pyrrolo[2,3-d]pyrimidine (4-HPP) using a structured method that involved forming hydrazones with diverse acetophenones. The reaction process was fine-tuned to maximize yield and ensure the purity of the resulting compounds. Detailed structural analysis was conducted with tools such as FTIR, NMR (¹H and ¹³C), mass spectrometry, and, for certain compounds, single-crystal X-ray diffraction. The biological effects of these newly created derivatives were examined, focusing particularly on their antibacterial properties. Antimicrobial effectiveness was tested against a range of Gram-positive and Gram-negative bacteria, as well as fungi, using the microdilution technique to determine minimum inhibitory concentrations (MICs). The results suggest that these acetophenone-modified 4-HPP derivatives hold significant promise as potential antimicrobial and anticancer agents. This work adds to the expanding area of heterocyclic compound exploration, opening up fresh possibilities for medical advancements.

Kinematic Variations In Joint Angles Between Grass Track And Treadmill Surfaces

Authors: Naushad Waheed Ansari, Associate Professor

Abstract: Efficient long-distance running depends on well-coordinated joint movements, especially during the landing and take-off phases. This study aimed to compare the joint angles of the ankle, knee, hip, and shoulder during running on a grass track versus a treadmill. Ten male athletes (aged 19–25 years, height 170–183 cm, weight 58.6–68.9 kg) from Aligarh Muslim University participated. Each athlete ran 750 meters on both surfaces recorded by a high-speed camera (Canon Legria HF S10, 1/1200 shutter speed, 50 Hz). Joint angles were measured during the landing and take-off phases using Silicon Coach Pro software. paired t-test was used to identify significant differences between the two surfaces. Results showed significant differences in ankle and hip angles at take-off, and shoulder angles during both landing and take-off. However, knee and hip angles during landing did not differ significantly. These results suggest that running surface affects certain joint movements, especially at the shoulder and ankle. Understanding these differences can help coaches and athletes tailor training strategies to improve performance and reduce injury risk.

DOI: http://doi.org/10.61137/ijsret.vol.10.issue1.203

 

Secure Access Control Using CentrifyDC in Heterogeneous Networks

Authors: Olena Shevchenko, Dmytro Bondarenko, Iryna Kovalenko, Andriy Melnyk

Abstract: Modern IT environments increasingly span a mix of Linux, UNIX (Solaris and AIX), and Windows systems, creating significant challenges in managing decentralized user accounts, enforcing strong authentication, and maintaining comprehensive audit trails. Security and compliance frameworks including HIPAA, SOX, and NIST SP 800-53 demand centralized control over identity and privileged access, yet many organizations still rely on fragile local account systems or disparate tools. This fragmented model often leads to inconsistent enforcement, audit gaps, and elevated risk of unauthorized access. This review examines CentrifyDC, an Active Directory bridge that delivers unified, centralized authentication and role-based access control across heterogeneous environments. By integrating with Linux Pluggable Authentication Modules (PAM), Name Service Switch (NSS), SSH, and native Role-Based Access Control (RBAC) for Solaris and AIX, CentrifyDC enables seamless AD-based login, command-level delegation, and multi-factor authentication. Privileged sessions are audited, logged, and stored centrally, bolstering compliance while minimizing reliance on sudo or multiple account stores. Deployment considerations and operational benefits are highlighted through real-world use cases from high-performance research clusters and Solaris-based healthcare infrastructure to AIX servers in government environments. CentrifyDC demonstrates how centralized policy inheritance, zone-based delegation, and secure PAM routines enforce least privilege and simplify administration across large fleets. Performance optimizations including login caching and load balancing are evaluated to ensure scalability. The review concludes with an exploration of future enhancements, such as integration with Azure Active Directory and Okta, AI-driven access risk modeling, and Infrastructure-as-Code pipelines for automated policy deployment. These developments promise to extend centralized access control into hybrid cloud environments and DevSecOps workflows. Ultimately, CentrifyDC offers a robust, compliant, and future-ready solution for managing identity and privileged access across diverse operating systems under a unified directory infrastructure.

DOI: https://doi.org/10.5281/zenodo.15848025

Workforce Capacity Building For Sustainable Accounting Practices In Public Organizations: A Critical Analysis Of Professional Development Programs In The United States

Authors: Sylvester Worlanyo Gbadrive, Ifeoma Lynda Okpala

Abstract: This study examines the critical role of workforce capacity building in advancing sustainable accounting practices within U.S. public organizations. Through an analysis of professional development programs and training interventions, this research investigates how public sector finance personnel acquire competencies in sustainability accounting and international financial standards, including IPSAS (International Public Sector Accounting Standards) and GAAP (Generally Accepted Accounting Principles) . The findings reveal significant gaps in current training frameworks and highlight the transformative potential of comprehensive capacity-building initiatives. This research contributes to the growing literature on sustainability accounting in the public sector by providing empirical evidence of effective training methodologies and their impact on organizational performance and accountability

DOI: http://doi.org/10.5281/zenodo.17043410

Machine Learning–Driven Risk Management Models For SAP-Based Financial And Enterprise Information Systems

Authors: Nandini Bhalla

Abstract: Machine learning–driven risk management has gained significant attention as organizations increasingly rely on SAP-based financial and enterprise information systems to support critical business operations. Traditional risk management approaches in SAP environments are predominantly rule-based and reactive, limiting their effectiveness in detecting complex, evolving, and previously unknown risks. With the growing volume, velocity, and complexity of enterprise data, machine learning techniques offer advanced capabilities for predictive risk assessment, anomaly detection, and continuous monitoring. This review paper presents a comprehensive analysis of machine learning–driven risk management models applied to SAP-based financial and enterprise information systems. It systematically examines SAP system architectures, risk management frameworks, and the integration of supervised, unsupervised, and hybrid machine learning techniques for managing financial, operational, compliance, and access control risks. The paper also reviews SAP-specific data sources, data preprocessing requirements, and evaluation metrics used to assess model performance, with particular attention to challenges such as data quality, model interpretability, regulatory compliance, and system integration. Furthermore, the review identifies key research gaps and emerging trends, including explainable artificial intelligence, federated learning, and real-time continuous auditing within SAP environments. By synthesizing existing literature and highlighting practical and research implications, this paper provides valuable insights for researchers, practitioners, and organizations seeking to design and implement intelligent, scalable, and compliant risk management solutions in SAP-based enterprise systems.

DOI: http://doi.org/10.5281/zenodo.18170299

Design And Analysis Of Cloud-Native Architectures Supporting Real-Time IoT Data Processing And Decision Making

Authors: Samarth Upadhyay

Abstract: The rapid growth of Internet of Things (IoT) deployments has intensified the demand for architectures capable of processing high-velocity data streams and enabling real-time decision making. Traditional centralized cloud models are often inadequate for meeting the strict latency, scalability, and reliability requirements of modern IoT applications such as smart cities, industrial automation, healthcare monitoring, and autonomous systems. Cloud-native architectures, built on microservices, containerization, orchestration, and serverless computing, have emerged as a foundational paradigm for addressing these challenges. This review paper presents a comprehensive analysis of cloud-native architectures that support real-time IoT data processing and decision making. It systematically examines IoT system fundamentals, cloud-native design principles, streaming data pipelines, edge–cloud collaboration models, and decision-making mechanisms ranging from rule-based engines to machine learning–driven intelligence and digital twins. The paper further reviews data management strategies, performance evaluation metrics, and critical security and privacy considerations in distributed IoT environments. By synthesizing existing architectural approaches and comparative studies, this review identifies key design trade-offs, limitations, and research gaps, including challenges related to latency management, interoperability, system complexity, and trust. Finally, the paper outlines future research directions such as AI-driven self-adaptive architectures, edge intelligence, federated learning, and integration with next-generation networks. The findings provide valuable insights for researchers and practitioners seeking to design scalable, resilient, and intelligent cloud-native IoT systems capable of supporting real-time decision making.

DOI: http://doi.org/10.5281/zenodo.18170303

AI-Assisted Data Warehousing Techniques For High-Performance Enterprise And Healthcare Analytics

Authors: Kavyansh Nath

Abstract: The exponential growth of data volume and complexity in the enterprise and healthcare sectors has rendered traditional data warehousing techniques insufficient for high-performance analytics. This review article investigates the emergence of AI-assisted data warehousing as a transformative paradigm for modern data management. We evaluate the integration of machine learning across the entire data lifecycle, specifically focusing on AI-driven ETL processes for automated schema mapping and the ingestion of unstructured clinical data. The study examines advanced performance optimization techniques, including reinforcement learning for autonomous query tuning and predictive resource scaling. In the context of healthcare, we analyze how these techniques facilitate longitudinal patient records, real-time clinical decision support, and accelerated drug discovery. Furthermore, we address the critical domains of security and compliance, highlighting AI-based data masking and anomaly detection for fraud prevention. By discussing emerging trends such as self-driving warehouses and generative AI interfaces, this article provides a strategic framework for organizations seeking to implement resilient, intelligent, and high-speed analytical cores. Ultimately, we demonstrate that AI-assisted warehousing is the essential foundation for turning massive datasets into actionable strategic and clinical intelligence.

DOI: http://doi.org/10.5281/zenodo.18229082

An Intelligent Framework For Managing Financial Uncertainty Using SAP And Advanced Machine Learning Models

Authors: Prithan Deka

Abstract: Financial uncertainty has become a constant in the global economy, rendering traditional, static ERP reporting insufficient for strategic steering. This article proposes an "Intelligent Framework" that integrates the transactional robustness of SAP S/4HANA with advanced Machine Learning (ML) models to manage and mitigate financial risks proactively. By leveraging SAP Business Technology Platform (BTP) for model deployment and SAP Analytics Cloud (SAC) for multi-scenario simulations, the framework allows for real-time stress testing and predictive cash flow management. We explore the application of Deep Learning (LSTM) for volatility forecasting and Gradient Boosting for credit risk assessment, emphasizing the importance of Explainable AI (XAI) for regulatory compliance. The study demonstrates that by moving from deterministic to stochastic modeling, organizations can significantly reduce liquidity buffers and improve the accuracy of rolling forecasts. We conclude by addressing the ethical implications of AI in finance and the emerging role of Generative AI in automating risk reporting. This framework provides a strategic roadmap for CFOs to transform their finance organizations into resilient, data-driven intelligence hubs.

DOI: http://doi.org/10.5281/zenodo.18229084

Distributed Cloud Systems Engineering For Enterprise Applications

Authors: Nikhil Chandra

Abstract: Distributed cloud systems represent a significant progression from conventional centralized cloud computing toward a geographically distributed computing paradigm in which multiple coordinated cloud environments operate as a single logical infrastructure. Traditional cloud platforms improved scalability and resource utilization; however, they remain constrained by regional latency, single-region dependency, and regulatory limitations. Modern enterprise applications — including financial platforms, healthcare services, IoT ecosystems, and large-scale digital marketplaces — require continuous availability, real-time responsiveness, data locality compliance, and elastic scalability across diverse user locations and device types. Distributed cloud engineering addresses these requirements by relocating computation and storage closer to end users while preserving centralized governance and orchestration. This review presents a comprehensive analysis of distributed cloud systems within enterprise environments by examining their architectural layers, design principles, and enabling technologies. The study discusses the role of microservices in decomposing monolithic applications into independently deployable components, the use of edge computing for latency reduction and localized decision-making, and the contribution of container orchestration platforms in maintaining service reliability and scalability. Additionally, software-defined networking and service mesh technologies are analyzed for their ability to enable secure, dynamic communication between geographically dispersed services. Together, these technologies form a cohesive operational framework that supports high-performance enterprise workloads. The paper further investigates operational considerations including deployment strategies, monitoring frameworks, and performance optimization techniques. Particular emphasis is placed on observability mechanisms such as distributed tracing, metrics analysis, and log aggregation, which enable administrators to monitor system health in complex multi-region environments. Security aspects are explored through zero-trust architecture, identity-based authentication, and data sovereignty compliance, highlighting the importance of integrating security throughout the system lifecycle rather than treating it as an external layer. In addition to benefits such as resilience, fault tolerance, and improved user experience, distributed cloud systems introduce new engineering challenges. These include maintaining data consistency across nodes, managing network latency variability, handling large-scale service coordination, and ensuring governance across heterogeneous infrastructure providers. The review also discusses operational overhead and skill requirements associated with designing and maintaining distributed architectures. Finally, emerging trends such as AI-driven orchestration, predictive infrastructure management, and autonomous cloud operations are examined as future directions in enterprise computing. The review concludes that distributed cloud systems will form the foundational infrastructure of next-generation digital enterprises by enabling adaptive, scalable, and reliable service delivery. This article provides a structured reference suitable for early-stage researchers and practitioners seeking to understand the design, implementation, and evolution of distributed cloud systems.

DOI: https://doi.org/10.5281/zenodo.18712042

Scalable Architecture Models For Cloud-Enabled Enterprises

Authors: Snehal Deshmukh

Abstract: The rapid growth of digital services, global connectivity, and data-intensive applications has driven enterprises to adopt cloud computing as the primary platform for application deployment and service delivery. Cloud environments provide elasticity, on-demand resource provisioning, and operational cost optimization; however, merely migrating traditional applications to the cloud does not guarantee performance improvement or scalability. Many legacy enterprise systems were designed as tightly coupled monolithic applications, which struggle to handle fluctuating workloads, distributed user bases, and continuous availability requirements. As a result, achieving scalability in cloud-enabled enterprises has become fundamentally an architectural challenge rather than an infrastructure problem. This review presents a comprehensive analysis of scalable architectural paradigms used in modern enterprise cloud systems. It examines the evolution from monolithic applications to distributed models including service-oriented architecture (SOA), microservices architecture, container-based deployment platforms, serverless computing, and event-driven architectures. For each model, the paper analyzes structural characteristics, operational principles, and suitability for different workload patterns. Particular attention is given to how these architectures enable horizontal scaling, independent deployment, fault isolation, and resource efficiency. In addition to architectural models, the review investigates practical scalability strategies such as load balancing, dynamic autoscaling, database sharding, caching mechanisms, and redundancy-based fault tolerance. The study further discusses implementation challenges that arise in distributed systems, including network latency, data consistency management, observability complexity, and expanded security attack surfaces. These challenges highlight the trade-offs between performance, reliability, and system complexity in cloud-native environments. The paper also explores emerging technological directions shaping future enterprise computing, including hybrid and multi-cloud deployment models, edge computing integration for latency-sensitive applications, and artificial intelligence–driven predictive autoscaling. By synthesizing current architectural approaches and operational practices, this review provides a structured conceptual foundation for understanding scalable system design. The study is intended to assist students, early researchers, and practitioners in selecting appropriate architectural strategies for building resilient, high-performance, and cost-efficient cloud-enabled enterprise systems.

DOI: https://doi.org/10.5281/zenodo.18712059

Hybrid AI Models For Cloud Security Optimization

Authors: Rahul Kapoor

Abstract: The rapid migration of enterprise workloads to hyperscale cloud environments has fundamentally transformed the global IT landscape, introducing unprecedented scalability alongside a radically expanded attack surface. Traditional security frameworks, reliant on static rules and siloed detection engines, are increasingly incapable of managing the high-velocity, polymorphic threats characteristic of modern cloud-native infrastructures. This review explores the paradigm shift toward Hybrid AI Models for Cloud Security Optimization. Hybrid AI—defined here as the synergistic integration of diverse machine learning (ML) paradigms, such as combining supervised learning for known threat classification with unsupervised learning for zero-day anomaly detection—provides a multi-layered defensive posture. By leveraging the automated feature extraction of Deep Learning (DL) alongside the structural interpretability of classical algorithms like Random Forests or Support Vector Machines, hybrid models achieve superior precision in identifying stealthy "living-off-the-land" (LotL) attacks and lateral movement. This article categorizes current hybrid methodologies, including the fusion of Graph Neural Networks (GNNs) for mapping relational cloud topologies and Reinforcement Learning (RL) for autonomous incident response. We examine how these models optimize security operations by reducing false-positive rates and automating the "OODA loop" (Observe, Orient, Decide, Act) at machine speed. Furthermore, the review addresses the critical challenges of data drift in elastic environments, the "black-box" transparency problem, and the necessity for Federated Learning to ensure privacy in multi-tenant architectures. By synthesizing recent academic breakthroughs and industrial case studies, this paper provides a strategic roadmap for building resilient, self-healing cloud ecosystems.

DOI: https://doi.org/10.5281/zenodo.19427337

 

Intelligent Security Orchestration Using Machine Learning

Authors: Neha Gupta

 

Abstract: The modern cyber threat landscape is defined by an asymmetrical relationship between the velocity of automated attacks and the cognitive limits of human security analysts. Traditional Security Orchestration, Automation, and Response (SOAR) frameworks, while effective at streamlining repetitive tasks, remain largely tethered to static, rule-based playbooks that struggle to adapt to polymorphic threats and complex, multi-stage campaigns. This review examines the integration of Machine Learning (ML) into the orchestration layer to create "Intelligent SOAR" ecosystems. By leveraging supervised learning for alert prioritization, unsupervised anomaly detection for identifying novel attack vectors, and reinforcement learning for dynamic playbook optimization, intelligent orchestration transforms the Security Operations Center (SOC) from a reactive unit into a predictive powerhouse. This article categorizes current methodologies, focusing on the use of Natural Language Processing (NLP) for semantic event correlation and Graph Neural Networks (GNNs) for mapping relational dependencies across distributed infrastructures. We analyze the transition from "hard-coded" automation to "context-aware" intelligence, which significantly reduces the Mean Time to Respond (MTTR) by automating high-confidence remediation actions while providing explainable insights for complex investigations. Furthermore, the review addresses critical challenges, including the "black-box" nature of deep learning models, data silo interoperability, and the emerging risk of adversarial manipulation of orchestration logic. By synthesizing recent academic breakthroughs and industrial case studies, this paper provides a strategic roadmap for achieving autonomous security operations. The findings suggest that intelligent orchestration is not merely an efficiency gain but a foundational requirement for maintaining resilience in an increasingly automated adversarial environment.

DOI: https://doi.org/10.5281/zenodo.19427354

 

Published by:

START A NEW JOURNAL

Uncategorized

Research is never ending process in all field as things are continuously modify and optimized to get more effective results. In order to showcase the research work around the globe research article plays an important role. Publication of article is done by International Journal, hence many of organizations, universities, Colleges, Departments open international journals. So this article help people to learn about how to start a new journal. International journals are not just website where people can post their content but it’s a complete system that has expert team who have deep understanding of specific domain. Many of publishers are looking for support of how to get ISSN number for journal. Some of people try to get but due to lack of guidance and experience they not get the success. So to start a new journal one has to arrange following steps:

Click Get Complete Support

  1. Get a website with specific domain.
  2. Publish few paper in it of selected or desired research topic.
  3. Apply for the ISSN number.
  4. Wait for the response from the ISSN authority to issue a E-ISSN or P-ISSN number.
  5. After getting ISSN apply for indexing.

Website: Above five steps looks easy and straight but ding all takes time as website should have following set of points that need to be crosscheck:

Assistance to Get ISSN of New Journal

  1. Author’s guideline page.
  2. Reviewer guideline page.
  3. Paper format.
  4. Copyright form for author to validate and get permission for publication.
  5. Editorial board page.
  6. Valid address of the organization to contact.
  7. Paper submission form and backend portal for managing of the paper, reviews, comments, etc.
  8. Plagiarism checking software.
  9. Provide data Security features.
  10. Call for paper where list of research topics should be maintained to get papers for publication.
  11. If journal charge amount then it should be mentioned clearly and medium of payment.

Editorial Board: Once website cover all these points then a editorial board is required where each board member has fix designation and role. Before placing the name of members publisher need to take permission from the concern member and inform about journal activities. As these board member details are need to be submit at ISSN office. Few of editorial member should be from foreign country. Always gather good set of editorial board having sound knowledge and experience in relevant field.

Publication: It is always better to apply for ISSN once you have a publication of 5 to 10 article in an issue. Do not provide any misleading information on issue like any Fake ISSN, indexing, etc. As this makes a chance of application rejection. Always check the content validity as good content is publish in the issue, do not publish plagued articles.

Starting a new journal takes around 6 to 8 months from collecting document to submission and getting approval from ISSN. But this hard work gives a pleasure of publisher who can publish and verified research content. International journals are good medium to increase the network of relevant people. A journal also organize a international conference for showing its global presence. i hope this article resolve query of how to get ISSN number for journal. Our team is right here for the support for beginners and scholars to promote research activities around the world with positive outcomes.

Published by:

Financially Sustainable Big-Data In The Cloud: Governance, Lifecycle, And Tactical Strategies For Cost Optimization

Uncategorized

Authors: Sudhir Vishnubhatla

Abstract: As financial and digital enterprises adopt cloud-native big-data systems, the focus has shifted from feasibility to cost-effectiveness. Elastic compute, multi-tiered storage, and managed services have removed barriers to scalability but introduced new challenges of cost predictability, governance, and optimization. This article synthesizes two decades of research and practice to articulate cost-optimization strategies for big-data systems in the cloud. It frames cost not as a narrow technical knob but as a discipline spanning architecture, governance, lifecycle management, and multi-cloud alignment. Three diagrams, the cost optimization model, the iterative cost lifecycle, and the levers of cost control—are used to illustrate how modern organizations can manage the financial sustainability of their big-data ecosystems without sacrificing agility, resilience, or compliance

DOI: http://doi.org/10.5281/zenodo.17452344

Published by:

IJSRET Volume 9 Issue 2, Mar-Apr-2023

Uncategorized

Review of Improvement and Prevent Bridges from Contributing to the Nation’s Supply Chain Problem
Authors:- Kailash Nath Bhagat, Prof. Shashikant B. Dhobale

Abstract- Successful highway transportation must address three areas of consideration: (1) creative and aesthetic, (2) analytical, and (3) technical and practical considerations. Given that most bridge transportation today are performed by multidisciplinary teams, addressing the first two considerations is fairly easy to achieve. The last is often the most challenging. This WORK discusses the practical challenges associated in the selection of Highway Bridge, the bridge types that are available for use and their range of applicability, the methods of analysis used, the dominant Supply in use today, and, finally, an example based on the AI of a bridge design following the practical considerations given here.

Image Classification for Dogs and Cats Using CNN
Authors:- Arnav Bhargava, Kunal Paliwal, Komarsamy.G

Abstract- Image classification is an important task in computer vision and has a wide range of applications. In this project, we have developed a deep learning model using Convolutional Neural Networks (CNN) to classify images of dogs and cats. The model was trained on the Cats and Dogs dataset available on Kaggle, which consists of 25,000 images of cats and dogs.

Secured Sim Ejection
Authors:- Sahaya Joseph Rohan.A, Sengodan.D, Kavin Kumar.S, Eswanth Raj.S

Abstract- A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network. Data that SIM cards contain include user identity, location and phone number, network authorization data, personal security keys, contact lists and stored text messages. SIM cards allow a mobile user to use this data and the features that come with them. We all use sim card but without the knowledge about the consequences of losing a sim card. Once we lose a sim card, we let it free and move on to another sim card. Have you ever wondered that our sim stores a lot of data but what if it goes to someone’s hand, all our personal details are leaked and there are even chances of selling them in the dark web? By applying this project, it is easy to avoid the circumstances of losing a sim card. We don’t have a proper protection for our sim card. It can be easily inserted and also easily ejected. Understand that you are in a danger if you have lost your sim card. But this is not going to happen again. This project fully focusses on securing the sim card by giving utmost protection to the sim card. This involves a security page to be authenticated if someone needs to eject the sim. Sim Ejection wouldn’t be easier after the implementation of this project.

A Review of Facial Expression Recognition using Machine Learning
Authors:- M.Tech. Scholar Poonam Gujre, Asst. Prof. Sudha Sharma, HOD. Trapti Sharma,Director Durgesh Mishra

Abstract-How a person seems to be feeling In interpersonal communication, one of the most difficult and vital skills to master is the ability to give and receive acknowledgement. It is easy to tell how people feel and what they aim to accomplish by their facial expressions. Nonverbal communication relies heavily on facial expressions. Automated facial expression identification is becoming more dependent on deep neural networks. In part, this is because FER has gone from lab-controlled to real-world situations, where deep learning methods have proven useful in a variety of industries. Two major issues have been addressed in recent deep FER systems: overfitting, which occurs when there isn’t enough training data, and elements that don’t have anything to do with the expression of the subject, such as illumination, head position, and identification bias. This study provides an in-depth examination of deep FER, which includes datasets and approaches that shed light on the issues at hand. To begin, we’ll go through the datasets that the general public has access to. These datasets have been extensively studied in the scientific literature, and a variety of data selection and assessment techniques have been used. This is followed by an explanation of the standard deep FER system pipeline, as well as background information and recommendations for successful implementations at each level. For deep FER, we look at the most cutting-edge deep neural networks and training approaches for FER based on static photographs and dynamic image sequences, as well as advantages and drawbacks. Other commonly used benchmarks are included in this section as well. Then, in order to make our poll even more helpful, we add more topics and purposes to it. Last but not least, we examine the challenges and opportunities that remain in this sector and how to construct robust deep FER systems in the near future.

A Study of Multiserver Retrial Queues with Different Stages of Homogeneous Service
Authors:- M. Renisagayaraj, R.Roja, S.Bhuvaneswari

Abstract- We discuss a queuing system with retrial of customers. Two models are discussed. First, we investigate single server queues in parallel, when the customer going to search and join the shorter of the two queues and in the second model we introduce the multiserver queue to multiserver retrial queue system. Multiserver provides different stages of homogeneous service in succession.

Geolocation
Authors:- Tejas Shinde, Binit Shirsath, Pranali Vekhande, Varun Margam, Professor Priya Gupta

Abstract-As long as they have the necessary device, such a smart phone, users may now locate and track the locations of other people, objects, machines, cars, and resources from the comfort of their own homes. Location-sensitive information requests are often made by a user known as the client or network provider. Today’s most popular applications employ the Global Positioning System (GPS) to give position data.

Geolocation
Authors:- Tejas Shinde, Binit Shirsath, Pranali Vekhande, Varun Margam, Professor Priya Gupta

Abstract-As long as they have the necessary device, such a smart phone, users may now locate and track the locations of other people, objects, machines, cars, and resources from the comfort of their own homes. Location-sensitive information requests are often made by a user known as the client or network provider. Today’s most popular applications employ the Global Positioning System (GPS) to give position data.

A Review of Human Facial Expressions Recognition Using Artificial Intelligence K-Nearest Neighbor (KNN) Algorithm
Authors:-P.G. Scholor Shivam Sharma, Asst. Prof. Hemant Amhia

Abstract- Facial expression is one of the most important form of non-verbal communication. Facial expressions emit the feelings of a person, and it allows judging that person by others. Some can understand facial expressions of underlying emotions to some extent, whereas many of us cannot. Facial Expression recognition (FER) system is a system to recognize expressions from a person’s face. It plays an important part in today’s world in fields of mental disease diagnosis, and human social/physiological interaction detection. Various methods of FER exist. This paper provides a summary of various processes involved in FER.

Analysis of Multiserver Retrial Queue of Homogeneous with Simple Death Process
Authors:- M. Renisagayaraj, P Suganthi, R. Sujatha

Abstract-We analyzed an M /M /2 retrial queueing model with vacation taken by the server. Then server providing service one by one, also provides the second server with a fixed size 𝑘 ≥ 1. The customers are queued up for the first service, which is essential for all customers and the second server gives an optional service when there is a demand for some of the customer where as the others leave the system after the first server provide the service.

Computer Aided Diagnosis System for Brain Tumor Detection
Authors:- Konda Shiva Teja Ravinder, Devaraju Sai Vandith, Dr. A Venkataramana, AkkepallyAvanthika, A Jaya Krishna Murthy

Abstract- A brain tumor is a mass of abnormal cells in the brain. A brain tumor occurs when abnormal cells form within the brain.This paper presents a brief review of brain tumor detection methods. The computer aided diagnosis system for brain tumor detection consists of step by step procedures namely input of brain images, filtering, thresholding, morphological operations, bounding box, getting tumor outline encoding, inserting the outline in filtered image and displaying images. Simulation results are carried out by considering standard brain images and found that this algorithm works well in detecting the brain tumor.

Drive Assist
Authors:- Pratik Patil, Harshal Bhangale, Janavi Kadam, Vaishnavi Konduru, Co-Ordinator Mrs. V.T. Thakare

Abstract- Contemporary solutions are needed for modern issues. There’s no need to postpone your trip due to vehicle troubles or getting troubles at remote locations because DRIVE ASSIST will guide you how to fix it. User will be able to smoothly use the website with no problems as it is a user- friendly website. If there is sudden destruction of the vehicle, DRIVE ASSIST provides users with the closest garage, serviceman, hotels for resting and even the opportunity to rent automobiles to continue their journey in the event of an unexpected vehicle breakdown. The website also lists the closest gas stations and charging facilities for electric vehicles. DRIVE ASSIST was developed to provide users with support. To use the services they require, users only need to register on the website. Contact information will be available on the website so that customers can speak with service providers directly to ask questions and to discuss pricing. The supervisor will keep track of all customers and service provider information.

Sign Language Translator
Authors:- Asst. Prof. Ms. Pragati V. Thawani, Ms.Kaanchi Mukati, Ms.Shreya Jaiswal

Abstract- Individuals who have trouble hearing can communicate by using sign language. Since it might be difficult for regular people to communicate with deaf people, this technique is beneficial for helping them. The system suggested in this research seeks to partially address this issue. In order to create a real-time sign language dataset using a computer or laptop web camera and then use the Tensor Flow model and LSTM Deep Learning Model, along with many other technologies, to create a real-time sign language recognition system and aid in closing the gap between signers and non-signers, the authors proposed a method. Four modules—image capture, pre-processing, classification, and prediction—make up the proposed system.

The Impact of Fiscal Policy on Unemployment in Indonesia
Authors:- Siti Mewah Siregar, Muhammad Findi, Wiwiek Rindayantil

Abstract- This research investigates fiscal policy’s role in influencing Indonesia’s unemployment rate. This study uses secondary data with the Vector Error Correction Model (VECM) analysis method from 1970-2021. The study results a show that foreign debt, government expenditure, and government revenue do not significantly affect unemployment in Indonesia in the short term. However, in the long term, foreign debt and government expenditurehave a significant positive effect on unemployment, while government revenue has a significant negative effect on unemployment. The IRF test results show that the unemployment variable responds negatively if there is a shock to government expenditureand positively if there is a shock to foreign debt and government revenue. The FEVD test shows that government expenditureis the most effective fiscal policy in reducing the unemployment rate in the short term.

OCTA X – Analysis and Extermination of Space Debris
Authors:- Yash Nigam, Ayush Gupta, Mohd. Aaqib

Abstract- As we are heading towards the age of communication and advanced space exploration for the betterment of life and in the search for life on other planets in the universe. As we head towards the age of this modernisation spacecraft and satellites are being launched into free space as well as into the orbit of the earth and other planets too, for various purposes, as all machines have a life cycle so do the spacecraft and satellites have, as we know the fundamental law that material can’t be created nor be destroyed so, all the junk satellites and spacecraft just revolve around the orbit or in the free space creating the junk debris of the dead spacecraft which causes functional difficulties for the other space operations for the other spacecraft. Day by Day the problem is increasing and creating a major concern of the junk that envelops the planet hence creating hindrances for further space missions. And by OCTA-X is a robotic octopus-shaped debris cleaner and eliminator, the robotic AI Arms have big claws with a big cavity that can collect junk material and suck inside the main body of the robot, pack it throws it in the direction of the star (sun) which will culminate the junk material, hence cleaning the space debris with help of an AI Octopus Shaped Robot.

Analysis of New Computational Models in Analysis of Time Series Data for Rainfall Forecasting of Indian city
Authors:- Prashant Shivhare, Shivank Sonia

Abstract- Autoregressive integrated moving average (ARIMA) is a data mining technique that is generally used for time series analysis and future forecasting. Climate change forecasting is essential for preventing the world from unexpected natural hazards like floods, frost, forest fires and droughts. It is a challenging task to forecast weather data accurately. In this paper, the ARIMA based weather forecasting tool has been developed by implementing the ARIMAalgorithm in R. Sixty-five years of daily meteorological data (1951-2015) was procured from the Indian Meteorological Department. The data were then divided into three datasets- (i)1951 to 1975 was used as the training set for analysis and forecasting, (ii)1975 to 1995 was used as monitoring set and (iii)1995 to 2015 data was used as validating set. As the ARIMA model works only on stationary data, therefore the data should be trend and seasonality free. Hence as the first step of R analysis, the acquired data sets were checked for trend and seasonality. For removing the identified trend and seasonality, the data sets were transformed and the removal of irregularities was done using the Simple Moving Average (SMA) filter and Exponential Moving Average (EMA) filter. ARIMA is based on method ARIMA (p,d,q) where p is a value of partial autocorrelation, d is lagged difference between current and previous values and q is a value from autocorrelation. In the present study, we worked on ARIMA (2,0,2) for rainfall data and ARIMA (2,1,3) fortemperature data. As a result, it estimated the future values for the next fifteen years. The root means square error values were 0.0948 and 0.085 for rainfall data and temperature data respectively which show that the algorithm worked accurately. The resulted data can be further utilized for the management of solar cell station, agriculture, natural resources and tourism.

A Review On Analysis Of Connecting Rod Using Finite Element Method
Authors:- Pradeep Kumar Dwivedi, Prakash Kumar Pandey

Abstract- The connecting rod belongs to the group of critical components of piston engines. The connecting rod transfers loads from the piston onto crankshaft. In modern diesel engines the large value of torque achieved at low speed of rotation causes high stresses in pistons, crankshafts, connecting rods and another engine components. Amplitude of operational stresses has significant in- fluence on the fatigue life of the connecting rod. Additional factors which limit its fatigue strength are: incorrect shape (design), material defects or technological errors (defects created during the production process).The failure analysis of the connecting rods of piston engines was described in many publications. Several typical and uncommon failure modes in connecting rods of combustion engines were reported in work. The author’s attention is focused on description of failure mode and the stress analysis of investigated connecting rod.

Assessment on Manpower Training Practice (The Case of Nib International Bank, Ethiopia)
Authors:- Abreham Tesfaye Abebe (PhD)

Abstract- The document assesses the manpower or workforce training practices of Nib International Bank. The Bank that operates in Ethiopia, a country in the horn of Africa. The researcher deployed a research methodology that fits for the purpose of the research and come up with a recommendation. Training and development has impact on the performance of individual employees, which in turn affects the organization’s performance at large.

A Survey On Heat Pipe Heat Recovery Systems
Authors:- M.Tech.Scholar Babli Lodhi , Prof. Shrihar Pandey

Abstract- Abstrct- The development of heat pipe arrangements has been accelerated by advances in computer research, which have shown multiphase flow regimes and highlighted the vast potential of the respective technology for passive and active applications. This analysis aims to assess the utility of contemporary heat pipe systems for heat recovery and renewable applications. Regarding the operational temperature profiles of the evaluated industrial systems, fundamental characteristics and constraints are explained together with theoretical comparisons. Working fluids are compared using the figure of merit for the temperature range. The analysis determined that typical tubular heat pipe systems offer the broadest operational temperature range compared to other systems and, as a result, offer optimization and integration opportunities for renewable energy systems..

Music Recommendation System Using Facial Features
Authors:- Chandani Mourya, Rugved Patil,Siddhi dorage, Shweta Saindane,Priyanka Sherkhane

Abstract- One of the most challenging and complex processes ever attempted in the paradigm of image processing is the analysis of facial expressions. Since humans express most of their emotions through facial expressions, other uses for facial expressions include determining a person’s mood. The ability to recognize a person’s mood is one of the most beneficial implementations since it may be put to use in a variety of ways to enhance a person’s quality of life.For many people, listening to music is a crucial part of their existence. Numerous studies and advancements have been made in the field of music organizing and search, which directly relates to the issue of locating or streamlining the process of choosing a certain song to listen to. One option is the song’s recommendation, which is becoming more and more popular in modern times as it aids in choosing music for a range of events. Because music is a fantastic form of entertainment for people and may be used to unwind, concentrate, manage stress, and maintain a balance between mental and physical tasks. This paper will discuss the recommendation system which will enable users to receive song recommendations merely by looking at their facial expressions when we combine artificial intelligence technology with a generalized music approach.

A Novel Approach in Power gated Adiabatic Logic for Ultra Low Power Applications
Authors:- Rishabh Singh, Uday Panwar

Abstract-With the continuous scaling down of device technology in the field of VLSI circuit design, low power dissipation has become one of the primary concern of the research field. With the increasing demand of low power portable devices, adiabatic logic gates prove to be an effective solution. This paper presents different types of adiabatic logic families such as 2N-2N2P, PFAL (Positive Feedback Adiabatic Logic), DCPAL (Differential Cascode and Pre-resolved Adiabatic Logic) and a proposed circuit based on the PFAL logic circuit. In this paper, various adiabatic logic approaches have studied and compared with a proposed adiabatic logic based on PFAL logic circuit. Adiabatic logic styles such as 2N-2P, 2N2N-2P, DCPAL and PFAL are considered and their average power dissipation and delay at different frequencies are compared with the proposed circuit. Simulations are done by using HSPICE 32nm technology. Finally results of Power Delay Product obtained from simulations are plotted on bar graphs at various frequencies.

An Investigate on Cyber Security in the Digital Banking Industry
Authors:- Asst. Prof. Mr. S. Kirubakaran

Abstract-Online technology is modernized with excellent performance and is widely used by all users in the twenty-first century. The top five industries that often utilize online technology include the digital banking sector. Despite the increased use of online banking, cybercrime in the banking industry has been rising. According to reports, 50 percent of cybercrime involves ATMs, debit cards, and online banking. Compared to other industries, the banking industry is more frequently the target of cyberattacks. This article examines cyber assaults on the banking industry and methods for defending against them.

MNIST Digital Classification and Handwritten Digit Recognition
Authors:- P Masthan, M Vinay Kumar, P Akhil, P Dileep Kumar, Asst. Prof. Mrs K Anuranjani

Abstract- One of the most well-known issues in computer vision and machine literacy operations is the handwritten digit recognition challenge. There are several machine literacy techniques that have been used to solve the handwritten number recognition issue. In this paper, neural network methods are the main topic. Deep neural networks, deep belief networks, and convolutional neural networks are the three most widely used Neural Network techniques. In this paper, the three neural network approaches are compared and estimated in terms of numerous factors similar to delicacy and performance. Recognition, delicacy rate and performance, still, isn’t the only criterion in the evaluation process, but there are intriguing criteria similar to prosecution time. Random and standard dataset of handwritten numbers have been used for conducting the trials. The results show that among the three neural network approaches, convolutional neural network is the most accurate algorithm; it has a 98.08 delicacy rate. Still, the prosecution time of convolutional neural networks is similar to the other two algorithms.

I Draw Hand Writing Robot
Authors:- Bhairavi P.Chamate, Komal Meshram, Nimisha Ghatole, Raviksha Dhomne, Prof. Swati Dhabarde

Abstract- In industrial use, most of the chunks are obtained from accomplish to make it understandable, In this system, we have understood and formed I draw handwriting robot The main idea is to develop an I- draw handwriting robot that can be taken to any place with comfort. So the controller. This robot can draw both parallel and upstanding. Its single design structures a writing head that spreads beyond the machine, making it possible to draw on objects greater than the machine itself. The major benefit of the machine is that it can be located over the hardcover because the core XY extends the design of the machine.

Design of Chilled Water Distribution Systems
Authors:- Suhasini Pyarasani

Abstract- A chilled water plant can be conceptually well designed but implemented in a manner that unnecessarily increase first costs. This paper evaluates different chilled water distribution systems configurations, for chilled water plant. These chilled water distribution systems configurations include Primary-only-variable flow, and Primary-Secondary, Primary-distributed secondary, and Primary -coil secondary.Different analyses are performed in a model, and results are tabulated and plotted to compare energy costs. This paper offers recommendation to assist designers and engineers to select the chilled water distribution systems, without significant effort on designing.

Wearable Health Monitoring System using IOT
Authors:- Jagruti Kotkar, Pooja Sonawane, Saurabh Kothawale, Prof- Megha Beedkar (Guide)

Abstract- IoT is one of the emerging technologies which is leading to smart health monitoring. IoT helps in connecting the people by empowering their health and wealth in a smart way through wearable gadgets. IoT is the network of physical objects that are embedded with sensors, software and other technologies for exchanging of data over the network. Now a day’s people are suffering from a lot of acute and chronic diseases, and they do not acknowledge it earlier and due to lack of immediate treatment the death rates among these patients are increasing. This type of problems can be encountered through wearable gadgets that continuously monitor the activity and condition of the patient in a predictable method. The main aim of this work is to provide an extensive research in capturing the sensor data’s, analyzing the data and providing a feedback to patients based on different health parameters.

Online Examinaton System
Authors:- Shital Ghodake,Sakshi Nikam, Madhuri Paithankar, Sakshi Mokal, S.A Bhad

Abstract- The Online Exam System is a web-based platform that allows you to manage and conduct exams on the Internet. It provides a convenient, cost-effective and efficient means of assessing candidates’ knowledge and skills regardless of their geographic location. Systems typically include a user interface that allows students to log in, access test materials, and complete their exams online. Tests can be taken in a variety of formats, including multiple-choice, essay, and open-ended questions. The system also includes features for evaluating, reporting and analyzing test results. Online testing systems have several advantages over traditional paper-based testing. It saves time and money because there is no need to print and distribute test papers and no physical space is required to conduct the exam. The system is more secure because it can prevent cheating and protect the integrity of the exam. In addition, the system allows for more efficient examination administration, such as scheduling examinations, appointing examinees and communicating with students. Overall, online testing systems provide a flexible and efficient way to conduct testing in a digital environment.

Review of Gender identification using Machine Learning Techniques
Authors:- Lecturer Md. Arifuzzaman , Lecturer Jannatul Afroj Akhi, Lecturer Tamim Hossain , Lecturer Md. Rezaur Rahman Shipon , Lecturer Shamima Yasmin Sejuti, Prof. Dr. Muhammad Abdul Goffar Khan

Abstract- This paper is about the “Thermal sensor based Temperature Measuring Robot” using Arduino Uno circuits. In this technology, Temperature Measuring Robot measured the temperature of the human body and the temperature of any object. The MLX90614 infrared thermometer is a contactless temperature sensor module for Arduino compatible device. An infrared thermometer works to measure the object temperature by the infrared radiation in the form of an electromagnetic wave through the light emitted on the object. MLX90614 is a powerful infrared sensing device with a very low noise amplifier with a 17 bit ADC. It utilizes non-contact temperature sensing to collect the temperature info without touching any surface of the object. The construction is equipped with many sensors. Hardware and software architecture and integration with Robot operating system is described in details. In the last part of the paper we presented the results of implemented measurement technologies and draw conclusions.

Design and Implementation of Thermal Sensor Based Temperature Measuring Robot Using Arduino Uno
Authors:- M.Tech. Scholar Chahat Vaishnav, Assistant Professor Aditi Khemariya

Abstract- Gender classification has recently received a lot of interest because genders include a lot of information about male and female social activities. It’s difficult to extract discriminating visual representations for gender classification, especially with faces. Gender classification is the process of determining a person’s gender based on their appearance. Automatic gender classification is gaining popularity due to the fact that genders contain a wealth of information about male and female social activities. In recent years, such classification has become increasingly significant in a variety of fields. In a conservative society, a gender classification system can be utilised for a variety of objectives, such as in secure settings. Identifying the gender type is critical, especially in sensitive areas, to keep extremists out of safe areas. Furthermore, such a system is used in situations where women are segregated, such as female railway cabins, gender-specific marketing, and temples.

An Analysis of the Use of Machine Learning Models in the Detection of Skin Cancer
Authors:- M. Tech. Scholar Payal Yadav, Assistant Professor Aditi Khemariya

Abstract- Skin cancer, sometimes referred to as cancer of the skin or SC for short, is one of the most common forms of cancer in the world. Even while a clinical examination of skin lesions is essential for determining the features of the illness, it is constrained by the amount of time it takes to complete and the many different interpretations it might lead to. approaches such as machine learning (ML) and deep learning (DL) have been created to aid dermatologists in establishing an early and correct diagnosis of SC. This is essential for boosting the patient’s chance of survival, hence the approaches have been developed. In this article, we conduct a comprehensive analysis of the published research on the categorization of skin lesions using machine learning. Our intention is to provide those who are new to the topic a firm foundation upon which they may build the studies and contributions they make in the future. Searches were conducted across a number of different internet databases using inclusion/exclusion criteria. Documents were chosen for this evaluation based on their capacity to offer an accurate description of the processes that were carried out as well as an exhaustive explanation of the results that were obtained. A total of 68 papers were chosen, the great majority of which depend on DL methods for detecting and classifying skin cancer, in particular convolutional neural networks (CNN), with a smaller number of research relying on ML techniques or hybrid ML/DL approaches. The articles were selected because of the value they provide to the process of diagnosing and classifying skin cancer. In order to classify skin lesions, many ML and DL algorithms provide findings that are considered to be state-of-the-art. The encouraging results that have been obtained up to this point give hope that these methods will eventually be used in clinical practice.

Literature survey on Different Technique used for Detection of Depression using EEG Signal
Authors:- Research Scholar Pritam Prabhat, Associate Professor & HOD Dr. Bharti Chourasia

Abstract- Electroencephalogram (EEG) plays an important role in E-healthcare systems, especially in the mental healthcare area, where constant and unobtrusive monitoring is desirable. EEG signals can reflect activities of the human brain and represent different emotional states. Stress is a feeling of emotional or physical tension. It can come from any event or thought that makes you feel frustrated, angry, or nervous. Mental stress has become a social issue and could become a cause of functional disability during routine work. A machine learning (ML) framework is effective for electroencephalogram (EEG) signal analysis. This paper reviews of depression emotion recognition from EEG for e-healthcare applications.

Smart Helmet Using IOT Technique
Authors:-Rai Abhishek, Kamisetty Bindusri Laxmi, Machkuri Venkatesh, Dr. A Venkataramana, M Rajamouli

Abstract- Smart Helmet is system used to design a helmet that provides safety to bike riders. It detects whether the rider met with an accident. A smart system can help to decrease death rates on road accidents. This smart system turns on the ignition only when the helmet is worn and no alcohol is consumed by rider. A smart system also helps to detect the obstacle and responds through automatic brake system. The system provides an alert and inform to the family or friends about the accident faced by the rider. Smart helmet system is developed using Arduino Uno for controlling the entire process, RF module to provide communication between helmet and bike unit, ultrasonic sensor for automatic break system, GSM and GPS module for SMS and current location identification, vibrating sensor for accident detection and node MCU to store the data of alcohol consumed by rider. The developed system is tested and works well.

Sales force E-commerce Microservice
Authors:- A Pravin

Abstract- To develop an exclusive e-commerce platform for artisans to sell their products. The demand forecast of the items required, automatic quality checks on the items as well as Sentiment analysis with next recommendation actions for the artist shall be added. To promote the Indian handicraft industry globally. Providing a common platform to make, market, and sell highquality handicrafts and goods. The micro service approach encourages enterprises to become more agile, with crossfunctional teams responsible for each service. Micro service architecture structures the application as a set of loosely coupled,collaborating services. Micro services are inherently distributed systems. Implementing such a company structure, as inSpotify or Netflix, can allow you to adapt and test new ideas quickly, and build strong ownership feelings across the teams.

Home Service Provider Application
Authors:- Shital Mohite, Alisha Pathan, Bhumi Lohar, Atharva Pisal, Riyaan Chatterjee

Abstract- We are building an web application for all the web users. The project “Home service provider” is used to automate all processes of the booking service Which deals with booking of services, providing it confirmation and user details. This will help you to get service from anywhere at any time. This webpage will take input from the user and provide suitable options for you. You can also provide your service here on our platform.Which would save the customers time and efforts significantly.

Brain Tumour Detection using Deep Learning
Authors:-Rohit Chahal

Abstract-The fragmentation of human-assisted manual categories can lead to inaccurate predictions and diagnoses, so classification of the brain tumor is one of the most important and difficult challenges in the field of medical imaging. Moreover, if there is big data that should be national, it is a frustrating task. Because tumors in the brain have a wide range of appearance and because normal tissue and tissue are very similar, it is difficult to distinguish tumor regions from images. We suggested how to remove brain tumor from 2D magnetic resonance brain imaging (MRI) using the Fuzzy C-Means clustering algorithm, followed by classification classification and convolutional emotional networks in this study. Tests were performed on real-time databases with tumors of various sizes, locations, forms, and firmness. In the traditional classification category, we used six classical dividers used in scikit-learn: Vector Support Machine (SVM), K-Nearest Neighborhood (KNN), Multilayer Perceptron (MLP), Logistic Retreat, Naive Bayes, and -Random Forest. After that, we moved on to Convolutional Neural Networks (CNNs), which were built using Keras and Tensorflow and produced much better results than the ancient neural networks. CNN achieved a 97.87 percent accuracy rate in our study, which is surprising. The main purpose of this study was to use textual and mathematical knowledge to discriminate between normal and aberrant pixels.

Secured Routing Energy Efficient Protocol (Sreep)
Authors:-Research Scholar R.S.Karthik, Dr.M. Nagarajan

Abstract-The routing mechanism in wireless sensor networks (WSNs) is crucial for a variety of monitoring applications, such as those focusing on the environment and traffic. In this section, the comprehensive contributions made to routing in WSN are examined. This study concentrates mainly on the challenges that WSN confronts as well as the various protocols that are employed. The SREEP algorithm is a brand-new proposal for assuring the secure transmission of data packets. The proposed technique reduces energy consumption while preserving a high level of security. The efficacy of the algorithm is assessed based on energy consumption, transmission duration, latency, and throughput.

Review: Cloud Computing and Internet of Things Plays Vital Role in Smart Stadium
Authors:-Asst. Prof. Shubham Gangrade, Associate Prof. Dr.Kapil Chaturvedi, Asst. Prof. Ankita Awasthi, Asst. Prof. Brij Mohan Sharma, Asst. Prof. Ashutosh Pandey, Associate Prof. Dr.Vijay Bhandari

Abstract-As we see in daily life how technology plays important role in routine life. There are few technologies are based on cloud computing like azure Microsoft server and the IoT and both are very important part in our lives. In our working life and the follow-up of all operations that we must follow before any match is held on any stadium in the world. An aspect of precautionary measures is discussed here before every match. In this research, based on discussion as per the understanding we will conduct on how to integrate cloud computing and the IoT and use them to work in developing stadiums in the word and made it smart. Several existing and new models of smart stadium are although explained.in this paper we are seeing cloud computing techniques which helps to iot applications.

Data Privacy using Block Chain and AI
Authors:-Asst. Prof. G. Kiran Kumar, A.Hari Prasad, B. Balaraju, N. Mehamood Hussain, B. Guna Sai Reddy, M. Jaya Kishore

Abstract-While data is the fuel that drives AI algorithms, it is difficult to approve or authenticate its use in the complex internet where it resides because of its dispersed nature and the fact that its diverse stakeholders do not trust one another’s stewardship. Due to this, it is challenging to facilitate data exchange in cyberspace for true big data and true powerful AI. In this paper, we propose the SecNet, an architecture that integrates three key components to enable secure data storage, computing, and sharing in the large-scale Internet environment, with the goal of creating a safer online environment rich in authentic big data and, by extension, a more robust artificial intelligence thanks to a larger pool of relevant information from which to draw. 1) Blockchain-based data sharing with ownership guarantee, allowing trustworthy data sharing in the large-scale environment to produce genuine big data. 2) An AI- based safe computing platform that may generate smarter security rules and so contribute to the development of a more reliable digital environment. As a result, greater AI performance may be attained by promoting data sharing and using a trusted value-exchange system for buying security services, which gives participants a chance to earn monetary benefits for supplying their data or service. In addition, we cover the usual deployment of SecNet and its applications.

Spammer Detection and Fake User Identification on Social Networks

Authors:-B.Sekhar, P.Shiva Prasad, J.Bharath Kumar, J.Mahesh, A.Pradeep, B.S.Muzammil

Abstract-Thousands of people across the globe utilize online services. Certain social media platforms, like as Face book and Twitter, get a profound impacts on people’s lives of their consumers, although they can also have unwanted consequences. Hackers are using the most popular social media websites as a distribution service for their unwanted as harmful content. When it comes to spammers, Face book, for examples, became one of the greatest widely utilized websites of any and all time. To responsible for the greater or companies, fraudulent start sending out unwanted messages to authenticated traffic, which not only affects the legitimate customers and also disrupts the usage of resources. In addition, the ability of spreading damaging content to consumers via the use of fictitious accounts has grown[10]. It is becoming increasingly customary in the field of online social networks to study fraudsters and false accounts on Tweets (OSNs). In this study, we start with a review of methods to determine scammers using Tweets as a test bed for their activity. Also included in this paper is a taxonomy of Twitter spam detection algorithms which categorizes the strategies that focus on their capacity to detect: 1 false contents, 2 is spamming depending upon Urls, (3) spamming within hot topics, and (iv) fraudulent accounts. All of these aspects are taken into consideration as well as schedule and user actions. We believe that this research will serve as useful resources for scholars looking for the most cur The y-axis in the above graph reflects the number of tweets containing either a false account or spam terms, while the x- axis represents the total number of tweets. Rent achievements in Twitter malware detection.

Automated Product Identification System For Visually Impaired

Authors:-Subhadip Ghosh, Soumen Maity, Sourav Chowdhury, Sudip Kumar Ghosh, Debmitra Ghosh

Abstract-This model intends to create a speech recognition system. A novel dataset is created, which consists of spoken words. The dataset is to train our system as well as to test the performance of the system. This dataset is not the same as the other conventional datasets generally used for this recognition system. The exciting and challenging aspects of this project are discussed. The content of the dataset and its collection and verification process are also discussed. Along with the system details, a methodology is used to reproduce and compare metrics to check the accuracy of this task. In the end, the performance result of the model is shown.

Land Registry Management System Using Blockchain
Authors:-Sanjana Gate, Rohan Temgire, Atharva Bankar, Rohit Chavan, Prof. Priyanka Sherkhane

Abstract-The present Land Registration System is a time consuming process and it involves a lot of vulnerabilities and fraudsters use it to cheat the common people and the government. The incomplete/improper registration leads to dispute of ownership and litigations of the land. In this project we make use of blockchain technology to overcome some vulnerability in the existing system. We use Metamask to proceed with the transactions and for verifying the users on our system. This application provides a simple and intuitive user interface, where users buy and sell their lands. The Land Inspector is the one who verifies and approves all the transactions and user accounts. With this system, users can ensure enhanced security.

Smart Wheelchair to Disability person Using Arudino UNO
Authors:-Lecturer S.Senthil, Lecturer E.Nambirani

Abstract-In the design of a smart, motorized, voice and app-controlled wheelchair using embedded system. Proposed design supports voice activation system for physically differently abled persons incorporating manual operation. The “Voice-controlled Wheel chair” for the physically differently abled person where the voice command controls the movements of the wheelchair. The voice command is given through a cellular device having Bluetooth and the command is transferred and converted to string by the BT Voice Control for Arduino and is transferred to the Bluetooth Module HC -05 connected to the Arduino board for the control of the Wheelchair. For example, when the user says „Go‟ then chair will move in forward direction and when he says „Back‟ then the chair will move in backward direction and similarly „Left‟, „Right‟ for rotating it in left and right directions respectively and „Stop‟ for making it stop. This system was designed and developed to save cost, time and energy of the patient. Ultrasonic sensor is also made a part of the design and it helps to detect obstacles lying ahead in the way of the wheelchair that can hinder the passage of the wheelchair. On addition to this an IOT device was integrated using NodeMCU where relay was connected to the microcontroller, using the application we can control the device using web application anywhere around the world.

Agriculture That Makes Use of the IOT
Authors:-Assistant Prof. Mr. N.V.S. Prasad, S.Zakeer Hussain, G.Anil Kumar, K.Bala Kumar,
K.Charan Kumar Reddy, S.Mahammed

Abstract-The widespread adoption of IoT technology has resulted in revolutionary changes across all walks of the average person’s life. The Internet of Things, or IoT, is a system where devices create their own network topology. Intelligent Smart Farming Internet of Things (IoT) based devices are changing the game in agriculture by improving yields, cutting costs, and maximaising efficiency. The purpose of this report is to propose an Internet of Things (IoT) based Smart Farming System that will help farmers get Live Data (Temperature, Soil Moisture) for efficient environment monitoring, thereby boosting both yield and product quality. This report proposes an IOT- based Smart Farming System that utilities Arduino technology combined with various Sensors and a Wi-fi module to generate a live data feed that can be accessed online via Thingsspeak.com. The proposed product has been tried and tested in real agricultural fields, yielding data feed accuracy rates of 98% or higher.

Experimental Investigation of Machine Learning Techniques for Predicting Software Quality
Authors:-Asst. Prof. V.Lakshmi Chaitanya, Nikhitha Sutraye, A.Sai Praveeena,U.Naga Niharika,
P.Ulfath, D.P.Rani

Abstract-There are several points in the software development process when estimating software quality is useful. Quality assurance planning and benchmarking are two potential applications. Multiple criterion linear programming and quadratic programming are two approaches that have been utilised in prior research to estimate software quality. In addition, we tested out C5.0, SVM, and a Neutral network to determine how best to estimate quality. The precision of these research is rather poor. The purpose of this research was to enhance estimate precision by using important properties of a large dataset. In order to improve accuracy, we used a feature selection technique and a correlation matrix. We have also tried our hands at several newer techniques that have proven effective in other prediction challenges. Xgboost, Random Forest, and Decision Tree are only few of the machine learning algorithms used to analyse the data and draw conclusions about the software’s quality and its relationship to its development qualities. Results from experiments demonstrate that machine learning algorithms can accurately predict the quality of software.

Predictive Analysis of Aged and Faulty Electronic Appliances in Smart Home
Authors:-Asst. Prof. Sathess Lingam. P, UG Scholar Krithik Gokul. S, UG Scholar Sagar.T.N, UG Scholar Prasanna Venkatachalapathi.B

Abstract-The use of smart homes and Internet of Things (IOT) devices has become increasingly common in recent years. As a result, there is growing interest in using predictive analytics to detect failures in electronic devices and managing medications in smart homes, especially smart homes used by sensors. The purpose of this study is to explore the use of predictive analytics in smart homes to detect errors in electronic devices and improve medication management. To do this, it uses data from a variety of sensors and devices to identify patterns and anomalies that indicate possible errors or problems in devices and medicines. The research focuses on using machine learning algorithms to analyze data from sensors such as temperature, humidity, motion and light to identify patterns of device use and medication administration. Algorithms then use this data to predict the likelihood of failure or problems with devices and medicines. The study also explores how natural language processing (NLP) techniques can be used to analyze text-based data such as drug labels and instructions for use. This allows us to better understand how medicines are used and administered correctly. Overall, this research contributes to the development of predictive analytics techniques that can improve the management of smart homes, especially electronics and medicines used by the elderly.

Need of Technology in Trade Andbusiness
Authors:-Research Scholar Seelesh Sharma

Abstract-The old order changeth yielding place to new and God fulfills himself in many ways lest one good custom should corrupt the world.”Alfred Lord TennysonMeans old policies, methods changed and new policies, methods take their place because along with the old methods some defects arise in those systems, which start causing damage.Exactly the same thing we can do in the context of technology, the techniques which were used for trade and business in ancient times, if compared to the present, all those methods have become very old, and very time consuming.At present, where cut-throat competition is going on, doing work smartly and doing it quickly and accurately has become an essential requirement of business and business, so to fulfill this need, technology has taken birth has become an integral part of business.Technology has transformed all business and business processes from complexity to organization whether it is a matter of information technology or other means of technology, every means of business and business seems to be closely related.The importance of information technology in business has grown impressively over the past two decades. The modern economy places a premium on the acquisition, processing and fair use of information in all its forms and formats. IT helps companies innovate, grow and reach new customers.The most important means of technology in trade include electronic communication such as email, text, fax and virtual conferences. Tracking methods for shipping and purchasing is another huge technological innovation, as it allows businesses to verify the delivery of goods and the amount of inventory purchased. Electronic spreadsheets and databases are other inventions that allow international companies to more easily manage and store their information. Technology has revolutionized the lives of consumers and businesses alike. The increased array of products on the shelves, lower costs of goods and services, and ease of access to information are just a few of the ways technology has enhanced society. The field of international trade is particularly sensitive to technological innovations. Technology used to protect confidential business information using quality. The birth of the Internet and online social networking sites has brought down the cost of conducting business. This gives companies an easy to use Six Sigma management approach. The level of technology is an important determinant of economic growth. Rapid rate of growth can be achieved by high level of technology. Schumpeter is of the view that only innovation or technological advancement is the determinant of economic progress, but if the level of technology stagnates then the process of development stops.At present, there has been an amazing increase in the production and distribution of goods and services through technology. This technology has made business world-wide. We can do shopping from any place in the whole world by simply pressing a few buttons while sitting at our home and can buy the things we want.Through technology, the level of efficiencies of products and services, and when the level of capabilities, comes down costsAnd when there is a reduction in the cost, there is definitely an increase in the profits and the growth of the systems is moreRemember those days when we were born, would technology have developed so much at that time, anyway, it is said that necessity is the mother of invention, so as we need great new inventions were born and technology is also such a thing. It is the invention that replaces our need. Talking about business, any person sitting at home can inquire about any particular service in the whole world, can get any information about it and can also order online after being satisfied.Technology has made business so easy that if any person wants to do business to become self-reliant, then being free from complications, one can easily think about business. Technology is no less than a miracle word for business and business.Just as finance is said to be the lifeblood of business, in the same way if we call technology the heartbeat of business in the present context, then it will not be an exaggeration. Internet has become such a system that has erased all the distances of the world, whether it is family or business or business, no matter how far away we can operate the system and business activities.

Predictive Analysis of Aged and Faulty Electronic Appliances in Smart Home
Authors:-Asst. Prof. Sathess Lingam. P, UG Scholar Krithik Gokul. S, UG Scholar Sagar.T.N, UG Scholar Prasanna Venkatachalapathi.B

Abstract-The use of smart homes and Internet of Things (IOT) devices has become increasingly common in recent years. As a result, there is growing interest in using predictive analytics to detect failures in electronic devices and managing medications in smart homes, especially smart homes used by sensors. The purpose of this study is to explore the use of predictive analytics in smart homes to detect errors in electronic devices and improve medication management. To do this, it uses data from a variety of sensors and devices to identify patterns and anomalies that indicate possible errors or problems in devices and medicines. The research focuses on using machine learning algorithms to analyze data from sensors such as temperature, humidity, motion and light to identify patterns of device use and medication administration. Algorithms then use this data to predict the likelihood of failure or problems with devices and medicines. The study also explores how natural language processing (NLP) techniques can be used to analyze text-based data such as drug labels and instructions for use. This allows us to better understand how medicines are used and administered correctly. Overall, this research contributes to the development of predictive analytics techniques that can improve the management of smart homes, especially electronics and medicines used by the elderly.

A Cloud Computing
Authors:- Ms. Rashmi. R.Kamat

Abstract-Cloud computing is the practice of using a network of remote servers hosted on internet to store, manage and process data on demand and pay as per use. It provides access to a pool of shared resources instead of local servers or personal computers. As it do not acquire the things physically, it saves managing cost and time for organizations. Cloud computing is a completely internet dependent technology where client data is stored and maintain in the data center of a cloud provider like Google, Amazon, Microsoft etc. Cloud computing is an emerging domain and is acclaimed throughout the world. There are some security issues creeping in while using services over the cloud. This research paper presents a review on the cloud computing concepts as well as security issues inherent within the context of cloud computing and cloud infrastructure. This paper also analyzes the key research and challenges that presents in cloud computing and offers best practices to service providers as well as enterprises hoping to leverage cloud service to improve their bottom line in this severe economic climate and boost up its usage. The main emphasis of our study based on existing literature and to understand the concept of multi- tenancy securityissue.

A High Grade Type Light Weights Concrete Design Using Epoxy Material
Authors:- Ajay Bhardwaj, Asst. Prof.Kishor Patil

Abstract-The aim of this study is to determine the performance of concrete by adding the fly ash and silica fume in concrete by the partial replacement of cement and fine aggregate by some percentage and this will be done by different percentage at the gap of some percent and what will be effect on basic properties of concrete as from the other research paper it is noted silica fume and fly ash both are added separately in concrete by some partial replacement so result will be tremendous so here in this study by considering or reading all the previous data from the research paper the new work should also be positive fly ash is the waste product of coal combustion product also known as the fuel ash and silica fume is also known as the micro silica fume is nonmetallic and nonhazardous material.

A Modelling and Analysis Multistory Building Load Analysis Using Staad Pro Software
Authors:- Sumit Kanade, Associate Professor Rahul Yadav

Abstract-In order to compete in the ever growing competent market it is very important for a structural engineer to save time. As a sequel to this an attempt is made to analyze and design a multistoried building by using a software package staad pro. For analyzing a multi storied building one has to consider all the possible loadings and see that the structure is safe against all possible loading conditions. There are several methods for analysis of different frames like FEM method, cantilever method, portal method, and Matrix method. The present project deals with the design & analysis of a multi storied residential building of consisting each floor. The dead load &live loads are applied and the design for beams, columns, footing is obtained STAAD Pro with its new features surpassed its predecessors and compotators with its data sharing capabilities with other major software. We conclude that staad pro is a very powerful tool which can save much time and is very accurate in Designs. Thus it is concluded that staad pro package is suitable for the design of a multistoried building.

A Review On Solar, Wind & Grid Connected Fact Device Design And Noise Estimation
Authors:- Shubhanshu khare, Prof. A. K. Sharma

Abstract-The world is witnessing a change-over from its present centralized generation to a future with greater share of distributed generation. Hybrid energy systems are inter-connected with wind power, photovoltaic power, fuel cell and micro-turbine generator to generate power to local load and connecting to grid/micro-grids that decrease the dependence on fossil fuels. The hybrid system is a better option for construction of modern electrical grids that includes economic, environmental and social benefits. An overview of different distributed generation technologies has been presented. This paper puts forward a comprehensive review of optimal sizing, energy management, operating and control strategies and integration of different renewable energy sources to constitute a hybrid system. The feasibility of the different controllers such as microcontroller, proportional integral controller, hysteresis controller and fuzzy controller are presented. The controller is a closed loop feedback mechanism used for power regulation which achieves zero steady state error and the output signal generated from the controller produces desired output response.

Tribological Behaviour Of Aluminium Metal Matrix Composite Reinforced With Boron Nitride And Carbon Fibre
Authors:- Assistant Professor Sugan V, Manimuthu R, Professor & Head Subramaniam D

Abstract-The increasing need for low weight alloys and composites for engineering and structural applications motivates researchers to investigate the prospect of developing novel processes to generate high-performance materials. The current study addresses the manufacturing of metal matrix composites (MMCs) employing Stir casting procedures with aluminium as the base metal and carbon fibre and boron nitride as reinforcements. The primary goal of incorporating reinforcement into a metal matrix is to improve thermal, structural, and tribological qualities by increasing yield strength, tensile strength, and hardness at ambient temperatures. A hardness test will be performed to investigate the tribological and mechanical properties of the AMMCs, and a SEM image will be captured to investigate the microstructure.

Turtlebot Maze Solving With ROS
Authors:- N Harshavardhan Reddy, G Vamshi Krishna, Shaik Shahid Ali

Abstract-In this project, we are building a maze solver using Turtlebot. It is predicted that usage of automated robotic systems will increase tremendously in both industrial and domestic applications such as path planning bot, robot-based room cleaning system, robot-based waiter, etc. Currently, during the pandemic, it has become important to minimize human-to-human contact to stop transmission of disease hence there is a necessity to use them for pathfinders such as in restaurants. As a result, there is a need for robots to be equipped with this technology. Due to this, we have decided to find an approach for a bot to find to navigate and move the bot from one place to another automatically. For this approach, we have used ROS, modified Turtlebot package, and Gazebo. After compiling and integrating various nodes using ROS we were successfully able to simulate bot which could solve a maze and avoid obstacles in it’s path.

Criminal Face Detection Using Machine Learning
Authors:- Prof. Anup Ganji, Rashmi Kamat, Swapnali Chougule Pooja Biradar, Srushti Gadivaddar

Abstract-In practice, identification of criminal in Malaysia is done through thumbprint identification. However, this type of identification is constrained as most of criminal nowadays getting cleverer not to leave their thumbprint on the scene with the advent of security technology, cameras especially CCTV have been installed in many public and private areas to provide surveillance activities. The footage of the CCTV can be used to identify suspects on scene. However, because of limited software developed to automatically detect the similarity between photo in the footage and recorded photo of criminals, the law enforces thumbprint identification. In this paper, an automated facial recognition system for criminal database was proposed using known Principal Component Analysis approach. This system will be able to detect face and recognize face automatically. This will help the law enforcements to detect or recognize suspect of the case if no thumbprint present on the scene. The results show that about 80% of input photo can be matched with the template data.

An Investigation on the Diagnostic Potential of Machine Learning for Glaucoma
Authors:- Tasneem Shaikh, Sudha Sharma, Durgesh Mishra

Abstract-This review article will study the application of a range of image processing algorithms with the goal of providing an automated diagnosis of glaucoma. The objective of the paper is to fulfill this goal. Glaucoma is a degenerative illness that affects the visual nerve and is brought on by trauma to the neurological system. If the problem is not treated and is allowed to continue without being monitored, it is possible for a person to gradually lose all or part of their vision if the issue is not handled. It is a fact that a large percentage of people residing in the world’s rural and semi-urban areas suffer from eye difficulties; nevertheless, the exact same can be stated for every other location as well. At this point in time, the diagnosis of retinal illnesses is nearly totally completed via the processing of images that are obtained by the study of photographs of the fundus of the retina. Some of the essential image processing methods for detecting eye illnesses include image registration, picture fusion, image segmentation, feature extraction, image enhancement, morphology, pattern matching, image classification, analysis, and statistical measures. Image enhancement, morphology, and pattern matching are some examples of other methods.

Factors Influencing the Process of Internationalization of Small and Medium Enterprises (SME’S)
Authors:- Research Scholar Manish Ranjan, Professor Dr. Ashok Kumar

Abstract-The internationalization process of small and medium-sized enterprises (SMEs) is influenced by a variety of factors. A growing economy creates more opportunities for SMEs to expand their businesses internationally, as it indicates a higher demand for goods and services in international markets. SMEs need to consider the political and economic stability of their target markets before entering them. They need to have a thorough understanding of the political situation, economic growth prospects, and exchange rates of the target country to ensure their success in the international market. The present study aims to study the factors influencing the process of internationalization of SMEs. In the present research study, the researcher has used descriptive research design.To develop stable item attributes, adequate sample sizes are required. The sampling population include 473 SMEs.

Train Car Auto-Pilot to Traffic Sign Detection and Recognition Using Deep Learning
Authors:-Jadhav Sakshi Chhabu, Wakhare Nisha Maruti, Kamble Snehal Govind, Kaitake Jijabai Baban

Abstract-Traffic Sign Detection and Recognition is a crucial task for enhancing the safety of autonomous driving systems. Deep Learning has been proven to be a powerful tool for solving this problem. In recent years, Convolutional Neural Networks (CNNs) have been widely used for Traffic Sign Detection and Recognition due to their ability to automatically learn and extract features from images. This approach has achieved high accuracy rates in detecting and recognizing traffic signs under different weather and lighting conditions. This paper proposes a comprehensive review of recent advances in Traffic Sign Detection and Recognition using Deep Learning. We discuss the challenges of Traffic Sign Detection and Recognition, the state-of-the-art methods, and the datasets commonly used for evaluation. Furthermore, we analyse the limitations of current approaches and highlight the future research directions in this field.

Developments in Forensic Science Technology, Such As New Methods for Analyzing Evidence or New Tools for Gathering Evidence
Authors:-Andrew Roy

Abstract-Forensic technology has undergone significant advances in recent years, resulting in new methods for analyzing evidence and new tools for gathering it. These advancements have revolutionized the way forensic science is conducted and have led to increased accuracy and efficiency in criminal investigations. This research paper aims to explore the latest developments in forensic science technology, including the various methods for analyzing evidence and tools for gathering it. The paper will also discuss the benefits and drawbacks of these new technologies and their potential impact on the field of forensic science.

Analyzing the Impact of Mobile Commerce on Consumer Behavior and E-Commerce Sales
Authors:-Pawan Dadoria

Abstract-The advent of mobile commerce (m-commerce) has transformed the way consumers shop online, creating new opportunities and challenges for e-commerce retailers. The studies is analyze effect in m-commerce in consumers behavior and e-commerce sales, using a mixed-methods approach that combines a literature review, survey data, and secondary data analysis. The literature review covers the definition and evolution of m-commerce, as well as theoretical frameworks for analyzing the relationship between m-commerce and consumer behavior. The survey data is collected from a sample of online shoppers in the United States, and includes measures mobile commerce consumer impact in m-commerce, and shopping behavior across different channels (desktop, mobile, and in-store). The secondary data analysis draws on publicly available data from leading e-commerce retailers and industry reports, and includes measures of e-commerce sales growth, channel mix, and mobile traffic and conversion rates. The results show that m-commerce has a significant positive impact on e-commerce sales, especially for retailers that invest in mobile-friendly websites and apps, personalized promotions, and convenient payment and delivery options. Moreover, the findings suggest that m-commerce adoption is associated with changes in consumer shopping behavior, such as increased frequency and convenience of purchases, reduced search and decision-making costs, and greater reliance on social proof and mobile reviews. The implications of these findings for e-commerce retailers and mobile commerce developers are discussed, along with limitations and future research directions.

A Cinema – Online Movie Ticket Booking System
Authors:-Aarya Nanndaann Singh M N, Akash Hegde P, Abhilash R, Akash Kumar, Prof. Priyadarshini R

Abstract-This paper presents the design and implementation of an online movie ticket booking system. The system is designed to provide a convenient and user-friendly platform for customers to purchase movie tickets online, eliminating the need to wait in long lines or visit physical ticket counters. The system includes features such as movie selection, seat selection, payment processing, ticket confirmation, ticket rescheduling, ticket transferring. The system also employs various recommendation algorithms to suggest movies to users based on their previous selections and browsing history. Additionally, the system includes security features such as user authentication, data encryption, and secure payment processing to ensure the protection of customer information. The implementation of the system involved the use of various programming languages, frameworks, and databases. Overall, the system offers an efficient and streamlined approach to movie ticket booking, enhancing the overall movie going experience for customers.

Emotion Based Music Player
Authors:-Prof. R. K. Sahare, Isha Bhoyar, Diksha Borkar, Amruta Shedame, Achal Deotale, Sheetal Mistry

Abstract-Everyone wants to listen music of their individual taste, mostly based on their mood. Average person spends more time to listen music. Music has high impact on person brain activity. User always faces the task to manually browse the music and to create a playlist based on the current mood. This project is efficient which generate a music playlist based on the current mood of user. How ever the proposed existing algorithms in use are comparably slow, less accurate and sometimes even require use of additional hardware like EEG or sensors. Facial expression is a easy way and most ancient way of expressing emotion, feelings and ongoing mood of the person. This model based on real time extraction of facial expression and identifies the mood. In this project we are using HAAR cascade classifier to extract the facial features based on the extracted features from HAAR cascade, we are using COHN KANADE dataset to identify the emotion of user. If the user’s detected emotion is neutral then the background will be detected and the music will play according to the background. For example. If it detects gym equipment, the algorithm will automatically create a workout song playlist from the captured image of the background.

Survey on Healthcare Image Steganography Techniques and Features
Authors:-Ph.d. Scholar Arun Kumar Sonaniya, Prof. Laxmi Singh

Abstract-One of important part of human life is health and some of information storage provide such valuable data. In order to increase the trust on such type of stored data steganography technique was applied by various researchers. This paper has summarized the features of image processing and its application in different areas. This paper has detailed various models proposed by scholars of image steganography processing. It was obtained that image may undergo some set of attacks that may disturb geometrical and spatial information, so list of such attacks was also summarized in the paper. Some of algorithm measuring parameters were also mentioned in the paper.

Integrating Green/Sustainability concept in Nigeria’s Property Market
Authors:-Habibu Sani, Ibrahim Bashir Bello

Abstract-The study was conducted to explore the need for integrating green sustainability concept into property development and valuation with a view to improving compliance to green sustainability concept and practice into real property market indices. The study was conceived on a survey design to appraise the need of integrating green issues/sustainability into property valuation process. The study used literature analysis approach to review real estate surveyors practices/approach to value indices perception using questionnaires to scope the importance of a range of sustainability features on market value for a hypothetical property, based on social, economic and environmental features constituting the triple bottom line of sustainability. Finding srevealed that energy waste and water management, preservation of biodiversity and environmental indoor/health quality are breakpoints for the integration of green issues into property valuation practice in developing country like Nigeria. There are already growing awareness of the need to integrate sustainability into real estate valuation practice. The study therefore concludes by establishing the significance of integrating green concept/sustainability into real estate valuation and its effect on the general perception of the Nigerian property market players.

Sustainable Investment Appraisal of Latent Values in Undeveloped Sites in Barnawa Kaduna, Nigeria
Authors:-Habibu Sani, Ibrahim Bashir Bello

Abstract-Real estate investment is considered the most complex and sophisticated form of investment compared with stocks, bonds and other finance sector investment, due to the influence of such factors as location and social trends as well as obsolescence (functional/physical) on its performance. Real estate investment decisions must be guided on intuition to avoid colossal loss thus the need for employing appraisal techniques as highest and best use technique to justify resource allocation to productive and best use among competing opportunities. Comparative analysis technique of yields from investment potentials of some selected sites was adopted.The study revealed there exist some vacant plots along AliyuMakama Road Barnawa Kaduna, having untapped latent value for investment but were left vacant thus termed vacant for speculation even though speculation is statutorily discouraged in the land use act 1978 with no visible machinery of enforcement to deter offenders. This has not only thwarted the aesthetics of the area but breaded security threat as being a rearing ground for criminals, rodents and reptiles thus jeopardizing sustainable city growth enshrined in the city master plan.

Sustainable Low Income Housing Delivery in Nigeria: Rent to Own Model.
Authors:-Habibu Sani, Ibrahim Bashir Bello

Abstract-Nigeria being the most populated country in West Africa region is faced with numerous challenges including housing delivery. Existing housing stock are by far short of expected number while the population of the country is geometrically increasing without a corresponding increase in housing delivery even though there are deliberate policies instituted to ameliorate housing problems. This article is predicated on the overview on Nigeria’s housing delivery journey using a policy and document review technique. The research concluded that a rent-to-own model is a workable strategy to adopt by Nigerian government whose interest to improve low income housing is objective and resolute to alleviate sufferings of the low income earners whose savings could hardly grow within a reasonable time frame to purchase a property from the open market on a cash and carry basis as is the tradition in the country.

strong>Scalable Data Ingestion and Analytics: Leveraging Azure Data Explorer for IoT Performance Optimization
Authors:-Seetaiah B, Technology Manager

Abstract-The proliferation of IoT devices has led to a significant increase in telemetry data, creating challenges in data ingestion and processing using traditional SQL databases. As device counts grow, SQL database performance degrades, resulting in slower data handling and inefficient query responses. This paper explores the implementation of Azure Data Explorer (ADX), a fully managed data service, to overcome these challenges. By leveraging ADX, the system achieved faster data streaming, improved performance, and greater scalability. This case study presents a detailed analysis of the migration process, performance improvements, and future scalability considerations.

DOI: 10.61137/ijsret.vol.9.issue2.196

strong>Design and Fabrication of Fixed-Wing Unmanned Aerial Vehicle (UAV) With Dropping Mechanism
Authors:-Assistant Professor Mr.N.Kawin, P.Tharun, VP.Vaishnav, M.Yogesh

Abstract-Unmanned Aerial Vehicles (UAVs) which are also known as Drones are aircrafts without a human pilot on board, -usually controlled by a ground-based controller and a communication system or by the ability of being programmed with various degrees of autonomy. The reason of the rapid advancement on drone technology is the need for more precision, accessibility, safety and cost effectivity in many fields. They currently lack the flexibility and adaptability of manned aircrafts. By some measures, 80% of the global drone industry revenues are related to agriculture, in some way. (R1) Unmanned aerial vehicles (UAVs) are one of the most promising innovative technologies invented in recent years to promote precision agriculture and smart farming. UAVs can not only reduce labour requirements but also increase production output, reduce the use of pesticides, and protect the environment. The main objective of our project is to design an aircraft that is capable of lifting as much weight as possible while taking into account the available power and aircraft’s length, width, and height requirements. A special attention has been devoted to Dropping Mechanism of the payload which can help us in gaining more ways to deliver the goods we need. The following report is a synopsis of the design process, Fabrications, component selection and Fly with maximum payload.

DOI: 10.61137/ijsret.vol.9.issue2.197

strong>Evaluation of Workability Properties in Light Weight Geopolymer Concrete Using Bamboo Aggregates with Different Percentage of Superplasticizers
Authors:-S. Kavipriya, K. Vani, V.Siva, S. Jeeva Bharath

Abstract-The light-weight concrete is a concrete which has a density of 300 to 1850 kg/m3.There are many advantages of having low density. It helps in reduction of dead load, increases the progress of building. The weight of a building on the foundation is an important factor, in case of weak soil. This research focus on reducing the density of concrete by replacing coarse aggregates with bamboo aggregates at different proportion with 10%,20%,30% and 40% respectively. Nowadays,research focus on reducing the self weight of structures, this paper contributes in that area to evaluate the density and workability properties of geopolymer concrete by reducing its density by replacing coarse aggregate with bamboo aggregates. Geopolymer concrete is one of the sustainable concrete in future for developing greener environment by reducing the emission of carbondioxide. This study emphasis to reduce the weight of geopolymer concrete which will help to develop more precast products. Sodium hydroxide of 12M is used in this research. Superplasticizer conplast SP430-Fosroc is used in this study to improve its workability. Low calcium based flyash is used as source material and M-Sand is used as fine aggregate. Density and fresh properties of geopolymer concrete by adding 0.25%,0.5%,0.75% and 1% of superplasticizer by volume of concrete replacing bamboo aggregates are tested.

DOI: 10.61137/ijsret.vol.9.issue2.198

strong>A Soil Moisture Sensor and Accelerometer are Part of an Internet of Things-based Landslide Detection and Monitoring System
Authors:-Jayapal N, Dharanidharan S A, Ajay Aravinth M, Ajithkumar R, Gokul R

Abstract-One major natural hazard that can harm property, infrastructure, and human life is landslides. In this work, we suggest an Internet of Things (IoT)-based landslide monitoring and detection system that gathers and analyzes data on precipitation, slope stability, and other environmental conditions using a variety of sensors and communication technologies. In addition to software components for data processing and visualization, the suggested system also includes hardware components including sensors, microcontrollers, and communication devices. To assess the system’s effectiveness in identifying and tracking landslides, we carried out field tests and contrasted the outcomes with those of other approaches. Our research demonstrates that the Internet of Things-based approach can enhance early warning and risk management initiatives by offering precise and up-to-date information on landslide risk. The consequences of our findings’ ramifications for further study and real-world applications are examined.

DOI: 10.61137/ijsret.vol.9.issue2.199

strong>The Intelligent Grocery Distribution System in India
Authors:-Bharathi V, Aarthy M, Boomika V G, Kowsika P, Kaviya S

Abstract-The Public Distribution System (PDS) in India is a government initiative that provides goods to those in need at set prices. On the other hand, manual material weighing results in imprecise measurements and unlawful usage of consumer goods. We currently have a system in place where the products are personally sent to the customer after their fingerprint is verified and their ration card is scanned. However, this was insufficient to halt the corruption. As a result, a two-step verification process has been suggested as part of the system. However, we deploy automation in place of manual labor when it comes time to handle the commodity. Customers are given an RFID card with a unique identifying number that serves as a ration card. An RFID reader scans the card.

DOI: 10.61137/ijsret.vol.9.issue2.200

strong>IoT-based Wireless Charging for E-vehicles
Authors:-Saranya S, Keerthana B, Kiruba M, Gobika S and Kavipriya R

Abstract-The demand for electric vehicles is rising as the automotive industry transitions quickly from IC engine vehicles to electric vehicles. As a result, there are now more charging stations. This concept uses an inductive coupling to wirelessly charge the car using a wireless charging system. All we have to do is park the vehicle in the charging area. Wireless power transmission is the process of moving electrical energy from a source to a load remotely without the need of wires or cables. Nikola Tesla’s greatest invention was the wireless power transfer concept. There is no need for human contact with this technology. One technology that may represent a step ahead in the future is wireless power transmission. This idea has the potential to create new wireless charging opportunities for everyday use. Magnetic resonance technology, or wireless power transfer (WPT), has the potential to free people from obnoxious cords. In actuality, the WPT uses the same fundamental theory—known as inductive power transfer—that has been established for at least 30 years. In recent years, WPT technology has advanced quickly. With a load efficiency greater than 90%, the power transmission distance rises from a few millimetres to several hundred millimetres at milliwatts to kilowatts of power level. Electric vehicle (EV) charging applications find the WPT highly appealing because to its advancements in both static and dynamic charging settings. The capabilities of wireless charging systems are further enhanced by IoT integration. The charging process gets smarter and more linked with IoT. It is possible to gather and analyse data in real time, which makes managing charging stations more effective. Features like dynamic load balancing, predictive maintenance, and remote monitoring are made possible by IoT. Issues with charging time, range, and cost are resolved by the smooth integration of WPT and IoT in EV charging. Because of this convergence, conventional battery technology is no longer as important for the widespread use of EVs. The project’s goal is for academics to use these cutting-edge successes to propel WPT further and encourage the wider use of electric vehicles.

DOI: 10.61137/ijsret.vol.9.issue2.201

strong>Modified LUO Based Boost Converter with Single Input and Multi Output Topology
Authors:-C.Gowrishankar, K. Divyabharathi, K.Lalithapriya, S.Pooja, A.Srilekha

Abstract-A power electronics device that transforms a low voltage input to a higher voltage output is the Modified Luo Based Boost Converter with Single Input and Multi-Output Topology. This paper proposes a modified Luo converter utilizing a coupled inductor and a diode-capacitor network to achieve multiple output voltages. The proposed circuit operates in continuous conduction mode (CCM), ensuring stable output voltage despite input variations. Simulation and experimental results validate the converter’s performance, demonstrating superior efficiency and reduced output voltage ripple compared to conventional converters. The high voltage gain and effective energy conversion make this topology ideal for various industrial and consumer applications, including telecommunications, renewable energy systems, and embedded power supplies.

DOI: 10.61137/ijsret.vol.9.issue2.202

strong>An Emprical Study on Substituting Sugarcane Bagasse Ash Aor a Portion of Cement in Mortar
Authors:-S.Gowtham, R.C.Haniska, C.Haniskaa, R.Pradheepa

Abstract-We are aware that a lot of damage is done to environment in the manufacture of cement. It involves lot of carbon emission associated with other chemicals. The researches has shown that every one ton of cement manufacture releases half ton of carbon dioxide, so there is an immediate need to control the usage of cement. The hand materials wastes such as Sugar Cane Bagasse Ash is difficult to dispose which in return is environmental Hazard. The Bagasse ash imparts high early strength to mortar and also reduce the permeability of mortar. The Silica present in the Bagasse ash reacts with components of cement during hydration and imparts additional properties such as chloride resistance, corrosion resistance etc. Therefore the use of Bagasse ash in concrete not only reduces the environmental pollution but also enhances the properties of mortar and also reduces the cost. It makes the mortar more durable. This project mainly deals with the replacement of cement with Bagasse ash in fixed proportions and analysing the effect of SCBA blended mortar. The concrete mix designed by varying the proportions of Bagasse ash for 0%, 5%, 10%, 15%, 20%, 25%, 30% the cubes are been casted and cured in normal water for ages of 7, 14 and 28 days. The test result indicate that the strength of mortar increase up to 10% Sugar cane bagasse ash replacement with cement.

DOI: 10.61137/ijsret.vol.9.issue2.203

strong>Interlinking of Local Water Bodies in the Villages of Thethakkudi, Mayiladuthurai District, Tamilnadu, India
Authors:-Sridhar N, Jeevitha M, Kamalini V, Kokila K

Abstract-Interlinking of water bodies involves the process of diverting surplus water through a network of canals. Through which the water bodies can holds water for a much longer period than in the past. This would cover additional areas for irrigation, remove the imbalance in availability of water and create the way for effective utilization of available water resources. Therefore, this project will offer interlinking of local water bodies through the link water channels at micro-level in the village of Thethakkudi. The Thethakkudi is a village in Mayiladuthurai district in Indian state of Tamil Nadu. The present population of the village is 358. Out of these 129 are men, 141 are women and 88 are children. The village is administered by the Kathiruppu Panchayat, which covers an area of 0.98km2. Thethakkudi has an average elevation of 4m and is located 11km from the coast of Bay of Bengal. Even this income they get from outstations because of the lack of quantity and quality of water resources. Therefore, the agriculture in this village is also being destroyed. Currently there are more than 20 excavated ponds and puddles are available. Very few ponds are seasonal at best, and their water does not last beyond monsoons. Most of the ponds are get water from rainfall, also dry up as early as March. So, the process of diverting surplus pond water through a network of canals to relatively drier areas are more useful for agriculture development of the village. Therefore, the aim of this project is to improve the agricultural practices through interlinking of ponds depending upon the local topographical survey using Remote Sensing and GIS. The Remote Sensing and GIS with DEM Techniques are used to study topography of the ground and to analyze the morphologic characteristics easily, quickly and at low cost. The benefits accruing from this project are crop diversification, better farm practices, improving food productivity, rejuvenation of groundwater and improving revenue of farmers.

DOI: 10.61137/ijsret.vol.9.issue2.204

strong>Miscellaneous Trends Detection of Neovascularization in Fundus Images Using Convolutional Neural Network
Authors:-Associate Professor Dr.F.R.Shiny, Malar, Abishega A G, Anusree A, Christeena Joy A, God Shaly J

Abstract-Visual impairment is one of the major health prob- lems in the world. The main reasons for visual impairment are lifestyle factors and limited eye care resources. Therefore, early screening and timely treatment are the keys to prevent vision damage. This project proposes a detection of neovascularization in fundus images using convolutional neural network. Wiener filter is used for preprocessing. In preprocessing noise is removed from the input dataset. Image segmentation is a critical step in image processing. One of the most common image segmentation methods is fuzzy c-means clustering. Fuzzy c-means clustering methods have a lot of potential when it comes to extracting detailed features from image pixels. Fuzzy c-Means (FCM) clustering is a popular unsupervised learning algorithm. The selected characteristics are fed into the Convolutional Neural Network (CNN) classifier for data classification using machine learning. This CNN classifier model attempts to reduce the number of features in a dataset. Finally, the CNN classification method is used to improve accuracy.

DOI: 10.61137/ijsret.vol.9.issue2.205

EARLY DETECTION OF DEEP VEIN THROMBOSIS USING DEEP LEARNING
Authors:-Assistant Professor Mr.C.Bastin Rogers, Asphini A, Jaisha R, Saranya M, Surjith Ribitha S

Abstract-The detection of Deep Vein Thrombosis (DVT) during the early stage is critical for preventing any adverse effect. DVT is one of the major causes of diseases that are related to blood circulatory system in human. This article proposes a methodology for the early detection of DVT through the photographic images captured using smartphones as edge de- vices. Unlike the traditional methods, the proposed methodology utilizes the edge computing as a green computing initiative. The manifestation of telangiectasia is used as the early bio marker. The proposed image analysis model uses Convolutional Neural Network (CNN) for training the detection model. The experiments were done with the globally available DVT and Varicose vein images as well as the photographic images captured through smartphones. The proposed robust approach produces excellent results without requiring any restricted environment for capturing the images.

DOI: 10.61137/ijsret.vol.9.issue2.206

Predicting Different Types of Paddy Leaf Diseases Using Convolutional Neural Network (CNN)

Authors:-Assistant Professor Mrs. G.Santhiya, Anusubha k , Jenisha Joy MJ, Reshma V, Snekha D .

Abstract-Most of the countries are depends on agriculture, where Tamil nadu is the land of agriculture. Here paddy cultivation is major source of earning. People in Tamil nadu, consumes rice as main meal for three times in a day. Various factors such as diseases on paddy leaf, pest attack etc., the production of paddy will be affected approximately 40stage to protect the paddy because it will destroy the entire farm land. If the diseases are identified in initial stage there is no need to spray a high dose fertilizer on the paddy crops. To overcome this, the proposed system uses pre-processing, transfer learning Inception V3 method, neural network are trained by deep learning based Convolutional Neural Network(CNN) classification algorithm to identify the paddy leaf diseases like bacterial leaf blight, brown spot and rice blast. This method produces good accuracy. Scope of this project is to detect disease on paddy crops and too notify the types of diseases to farmer so that the farmers can take early action to protect the paddy crops.

DOI: 10.61137/ijsret.vol.9.issue2.207

E-DEPARTMENT

Authors:-Assistant Professor DR.A.S.Selva Reegan, Aslin Stephy.D.M , Aswathy.N.S, Babisha.N, Sneha.R.

Abstract-Most of the countries are depends on agriculture, where Tamil nadu is the land of agriculture. Here paddy cultivation is major source of earning. People in Tamil nadu, consumes rice as main meal for three times in a day. Various factors such as diseases on paddy leaf, pest attack etc., the production of paddy will be affected approximately 40stage to protect the paddy because it will destroy the entire farm land. If the diseases are identified in initial stage there is no need to spray a high dose fertilizer on the paddy crops. To overcome this, the proposed system uses pre-processing, transfer learning Inception V3 method, neural network are trained by deep learning based Convolutional Neural Network(CNN) classification algorithm to identify the paddy leaf diseases like bacterial leaf blight, brown spot and rice blast. This method produces good accuracy. Scope of this project is to detect disease on paddy crops and too notify the types of diseases to farmer so that the farmers can take early action to protect the paddy crops.

DOI: 10.61137/ijsret.vol.9.issue2.208

CNN Based Analysis and Visualization of Crime Against Women

Authors:-Associate Professor Dr. M.Supriya , Ajisha J, Amishya Renjai R. J, Aspiya S, Babis Dania T

Abstract-Women’s safety and protection remains a critical global concern, with rising incidence of crimes including rape, sexual harassment, domestic violence, dowry deaths, and acid attacks. The substantial volume of crime data generated through reporting systems presents a valuable opportunity for analysis, visualization, and prevention strategies. This paper proposes a comprehensive investigation of crimes against women in India using Convolutional Neural Networks (CNN). Raw data un- derwent preprocessing to eliminate anomalies, rectify invalid locations, and determine geographical coordinates. Descriptive analysis categorized crimes by type and district, while heat maps were generated to visualize crime distribution patterns. The CNN-based approach enables the identification of spatial crime hotspots through deep learning techniques, analyzing data collected from crime records, social media, news articles, and public databases. The methodology incorporates various attributes including crime type, location, temporal patterns, and demographic factors. Results provide decision-makers with valuable insights for crime prediction and prevention strategies, ultimately contributing to enhanced women’s safety measures.

DOI: 10.61137/ijsret.vol.9.issue2.209

Experimental Investigation of Sisal Fiber and Slag-Based Bio-Fiber Composites: Mechanical, Chemical, Acoustical, and Morphological Analysis
Authors:-E. Prakash, Lerindeoni S, Reny R

Abstract-The growing demand for sustainable materials has spurred significant interest in bio-fiber-reinforced composites. This study investigates the development and characterization of a novel composite material composed of sisal fiber and industrial slag as key constituents. The composite was fabricated using varying fiber weight fractions and thoroughly analyzed for its mechanical, chemical, acoustical, and morphological properties. Mechanical tests revealed that optimal fiber loading improved tensile and flexural strengths, highlighting the load-bearing capability of sisal fibers. Chemical analysis through FTIR and XRD confirmed successful interfacial bonding and the presence of pozzolanic reactions between slag and the binder. Acoustic tests demonstrated promising sound absorption properties, especially in mid-frequency ranges, making the material suitable for noise reduction applications. SEM micrographs illustrated uniform fiber dispersion and good matrix-fiber adhesion, while EDS validated the elemental composition. Overall, the sisal fiber and slag-based composite exhibited a balanced combination of mechanical strength, chemical stability, acoustic damping, and morphological integrity, suggesting its potential use in eco-friendly construction and automotive applications.

DOI: 10.61137/ijsret.vol.9.issue2.210

AI And Big Data Analytics In Pharmaceutical Supply Chain Management

Authors: Nandini Bhatt

 

 

Abstract: Artificial Intelligence (AI) and Big Data Analytics are reshaping pharmaceutical supply chain management by enabling greater efficiency, transparency, and resilience. This paper examines the transformative impact of AI-driven big data technologies on pharmaceutical supply chains, highlighting their roles in demand forecasting, inventory management, quality control, and risk mitigation. It discusses the challenges of integrating AI and big data in complex, regulated environments and explores ethical and operational considerations. The study emphasizes how leveraging AI and big data analytics enhances supply chain agility, reduces costs, and improves patient access to medicines while addressing issues such as data security and regulatory compliance.

DOI: http://doi.org/

 

 

Market Analysis Of AI-Based Health Technologies: Trends And Forecasts

Authors: Faria Khan

 

 

Abstract: The integration of Artificial Intelligence (AI) into healthcare systems has revolutionized the landscape of medical diagnostics, treatment planning, patient care, and healthcare operations. With exponential growth in data generation and computational capabilities, AI-based health technologies are being rapidly adopted across clinical, administrative, and research domains. This paper provides a comprehensive market analysis of AI-based health technologies, exploring the current trends, key market drivers, challenges, regional developments, and future forecasts. As AI continues to evolve, its impact on healthcare systems is expected to increase significantly, transforming traditional healthcare models into more predictive, personalized, and efficient systems. Through data-driven insights and strategic foresight, this study aims to highlight the critical factors influencing the market trajectory and predict the future scope of AI in the global healthcare sector.

DOI: http://doi.org/

 

 

Regulatory Considerations For AI Applications In The Biomedical Industry

Authors: Mamata Gowda

 

 

Abstract: Maharani’s CollegeAs Artificial Intelligence (AI) transforms the biomedical industry, regulatory bodies face the critical task of ensuring that these innovations are safe, ethical, and effective for public use. From diagnostic algorithms and AI-enhanced drug development to robotic surgeries and personalized medicine, AI technologies are redefining clinical practices and research methodologies. However, their rapid integration raises significant regulatory challenges, particularly in areas concerning data privacy, algorithmic transparency, clinical validation, and liability. This paper provides an in-depth exploration of the current regulatory landscape governing AI in biomedical applications. It analyzes the roles of major regulatory agencies such as the U.S. Food and Drug Administration (FDA), the European Medicines Agency (EMA), and others in shaping guidelines for AI deployment. Furthermore, it highlights the complexities involved in classifying AI tools, updating compliance frameworks for adaptive algorithms, and harmonizing international standards. By dissecting case studies and emerging trends, this paper offers insights into how regulatory frameworks can evolve to balance innovation with patient safety and public trust in the age of AI-powered healthcare.

DOI: http://doi.org/

 

 

Investment Strategies In AI-Driven Nanomedicine Ventures

Authors: Keerthi Kumar

 

 

Abstract: The convergence of Artificial Intelligence (AI) and nanomedicine has sparked a transformative wave in the biomedical and pharmaceutical industries, opening new pathways for disease diagnosis, treatment, and drug delivery at the nanoscale. As AI technologies enhance the design, functionality, and application of nanomaterials, nanomedicine ventures have become highly attractive to investors seeking long-term value and breakthrough innovations. This paper presents a comprehensive analysis of investment strategies in AI-driven nanomedicine ventures, focusing on the unique technological, financial, and regulatory dynamics of this rapidly growing domain. From venture capital and private equity to public funding and strategic partnerships, the investment landscape surrounding AI-nanomedicine is evolving, driven by innovation potential, patient demand, and the promise of market disruption. By examining investment trends, risk management techniques, key success factors, and emerging market opportunities, this paper offers a strategic framework for stakeholders aiming to capitalize on this cutting-edge intersection of technology and healthcare.

DOI: http://doi.org/

 

 

Ethical Implications Of AI In Healthcare Business Practices

Authors: Manasa Jain

 

 

Abstract:

DOI: http://doi.org/

 

 

Ethical Implications Of AI In Healthcare Business Practices

Authors: Manasa Jain

 

 

Abstract:

DOI: http://doi.org/

 

 

Ethical Implications Of AI In Healthcare Business Practices

Authors: Manasa Jain

 

 

Abstract:

DOI: http://doi.org/

 

 

Applications Of Nanotechnology In Regenerative Medicine

Authors: Yasik Sharma

 

 

Abstract: – Regenerative medicine aims to restore or replace damaged tissues and organs, offering new therapeutic strategies for conditions previously considered incurable. Nanotechnology, through the manipulation of materials at the nanoscale, has emerged as a transformative tool in this field by enabling precise control over cellular behavior and tissue microenvironments. Nanomaterials such as nanoparticles, nanofibers, and nanotubes exhibit unique physicochemical properties that facilitate enhanced scaffold design, targeted drug delivery, and real-time monitoring of tissue regeneration. This paper reviews current advancements in applying nanotechnology to regenerative medicine, focusing on its role in tissue engineering, stem cell modulation, and biomolecular delivery. Key challenges including biocompatibility, toxicity, and scalability are discussed, alongside future prospects that suggest integration of nanotechnology with biofabrication and personalized medicine could revolutionize regenerative therapies.

DOI: http://doi.org/

 

 

Nanoparticle-Based Drug Delivery Systems: Overcoming Biological Barriers

Authors: Nanditha Das

 

 

Abstract: Nanoparticle-based drug delivery systems represent a transformative innovation in modern pharmacology, providing novel solutions to long-standing challenges in medicine. These systems leverage the unique properties of nanoparticles to improve drug solubility, enhance bioavailability, and ensure targeted delivery, particularly across complex biological barriers. This paper explores the diverse types of biological barriers that impede therapeutic efficacy, such as the blood-brain barrier, gastrointestinal tract, and tumor microenvironment. It further delves into the various nanoparticle platforms developed to navigate these barriers, including liposomes, dendrimers, polymeric nanoparticles, and lipid-based systems. The role of surface modification techniques, targeting ligands, and stimuli-responsive mechanisms in improving delivery efficiency is analyzed in depth. Additionally, the paper evaluates the pharmacokinetics, biodistribution, and safety concerns associated with these systems, while discussing the latest clinical advances and translational hurdles. Ultimately, this comprehensive overview underscores how overcoming biological barriers using nanoparticles has opened new frontiers in precision medicine and is revolutionizing drug therapy paradigms.

DOI: http://doi.org/

 

 

The Role Of Nanotechnology In Developing Next-Generation Vaccines

Authors: Ravi Kumar

 

 

Abstract: – Nanotechnology has emerged as a transformative platform in the development of next-generation vaccines, enabling precise delivery of antigens and immunomodulatory agents to the immune system. By mimicking natural pathogens at the nanoscale, nanoparticle-based vaccines enhance antigen stability, promote targeted delivery to antigen-presenting cells, and improve immunogenicity. This paper explores various nanomaterial platforms used in vaccine development, including lipid nanoparticles, virus-like particles, polymeric and inorganic nanoparticles, and their role in overcoming limitations of traditional vaccines. Mechanisms of immune activation, strategies for improving vaccine stability and targeted delivery, and challenges in clinical translation and regulatory approval are discussed. The convergence of nanotechnology with immunology and bioinformatics is poised to revolutionize vaccine development, enabling rapid, safe, and highly effective vaccines against infectious diseases, cancers, and emerging pathogens.

DOI: http://doi.org/

 

 

Nanorobotics In Targeted Cancer Therapy

Authors: Faiza Shaik

 

 

Abstract: The use of nanorobotics in cancer therapy represents a groundbreaking evolution in the field of biomedical sciences, offering precision, efficiency, and adaptability in targeting malignant cells. These nanometer-scale devices are engineered to perform complex tasks at the cellular and molecular levels, enabling the direct delivery of anticancer agents to tumors while minimizing damage to healthy tissue. This paper explores the foundational principles of nanorobotics, their diverse types, and the technological advancements enabling their application in oncology. It delves into the mechanisms through which nanorobots navigate biological environments, recognize cancerous cells, and administer therapeutic agents with unmatched specificity. Additionally, the paper addresses the integration of sensors, actuators, and logic gates within nanorobots to enhance decision-making and responsiveness in real-time conditions. Challenges such as biocompatibility, immune response, power sources, and regulatory hurdles are discussed in detail. Furthermore, current experimental studies, clinical trials, and future perspectives in the development of nanorobotics for cancer therapy are critically analyzed. The convergence of nanotechnology, robotics, and medicine through nanorobotics holds the promise of redefining cancer treatment paradigms with higher survival rates and lower side effects.

DOI: http://doi.org/

 

 

Advancements In Nanotechnology For Targeted Cancer Therapies

Authors: Raj Kumar

 

 

IJSRET_V9_issue2_196.pdf

Abstract: Nanotechnology has revolutionized the landscape of targeted cancer therapies by providing innovative tools to deliver therapeutic agents directly to tumor cells while minimizing damage to healthy tissues. This paper explores the latest advancements in nanotechnology applications for targeted cancer treatment, emphasizing the design and functionalization of various nanoparticle platforms, advanced drug delivery mechanisms, and tumor targeting strategies. It further discusses the integration of multifunctional nanoparticles enabling combination therapies, challenges related to biocompatibility, immune evasion, and clinical translation barriers. The paper concludes by highlighting future directions, including personalized nanomedicine and stimuli-responsive delivery systems, that promise to enhance therapeutic efficacy and patient outcomes in oncology.

DOI: http://doi.org/

 

 

Nanorobotics In Targeted Cancer Therapy

Authors: Faiza Shaik

 

 

Abstract: The use of nanorobotics in cancer therapy represents a groundbreaking evolution in the field of biomedical sciences, offering precision, efficiency, and adaptability in targeting malignant cells. These nanometer-scale devices are engineered to perform complex tasks at the cellular and molecular levels, enabling the direct delivery of anticancer agents to tumors while minimizing damage to healthy tissue. This paper explores the foundational principles of nanorobotics, their diverse types, and the technological advancements enabling their application in oncology. It delves into the mechanisms through which nanorobots navigate biological environments, recognize cancerous cells, and administer therapeutic agents with unmatched specificity. Additionally, the paper addresses the integration of sensors, actuators, and logic gates within nanorobots to enhance decision-making and responsiveness in real-time conditions. Challenges such as biocompatibility, immune response, power sources, and regulatory hurdles are discussed in detail. Furthermore, current experimental studies, clinical trials, and future perspectives in the development of nanorobotics for cancer therapy are critically analyzed. The convergence of nanotechnology, robotics, and medicine through nanorobotics holds the promise of redefining cancer treatment paradigms with higher survival rates and lower side effects.

DOI: http://doi.org/

 

 

Real-Time Security Compliance Enforcement Using Tripwire in Solaris

Authors: Daria Kuznetsova, Sergey Belov, Anna Fedorova, Viktor Pavlov

Abstract: As Solaris continues to serve mission-critical workloads across healthcare, government, and financial sectors, maintaining system integrity and regulatory compliance has become increasingly complex. Traditional security controls often lack the real-time responsiveness and policy-driven rigor required for hardened UNIX environments. This review explores the application of Tripwire a widely trusted file integrity monitoring solution for enforcing real-time security compliance on Solaris platforms. The article delves into how Tripwire enables continuous monitoring of system files, binaries, libraries, and configuration artifacts using cryptographic checksums and customized policies. Through automated scans, deviation detection, and audit-ready reporting, Tripwire ensures alignment with frameworks such as HIPAA, FISMA, and PCI-DSS. The review further examines operational deployments of Tripwire within Solaris Zones, legacy AIX integrations, and hybrid infrastructures. Challenges related to system overhead, false positives, and policy maintenance are also analyzed, with optimization techniques offered to minimize performance impact. Emphasis is placed on Tripwire’s integration with SIEM platforms, service management facilities (SMF), and compliance dashboards, enabling seamless escalation, incident tracking, and forensics. The framework's ability to enforce baseline configurations, detect unauthorized modifications, and generate tamper-proof audit evidence makes it invaluable in regulated UNIX environments. Looking ahead, Tripwire's role is evolving through alignment with AIOps, Compliance-as-Code, and GitOps pipelines, paving the way for dynamic and automated security enforcement. This article concludes by asserting that Tripwire, when strategically configured and integrated, provides a scalable and proactive compliance solution tailored for Solaris-based infrastructures strengthening operational resilience while satisfying stringent audit requirements.

DOI: https://doi.org/10.5281/zenodo.15847881

AI-Driven Anomaly Detection in Nagios and Zabbix Logs

Authors: Anirudh Narayan, Bindu Lakshmi, Haritha Gopal, Vivek Vardhan

Abstract: In the evolving landscape of IT infrastructure monitoring, the volume and velocity of log data generated by tools such as Nagios and Zabbix present significant challenges for timely and accurate anomaly detection. Traditional rule-based approaches, which rely on static thresholds and manual configurations, often fail to capture subtle or emerging issues, leading to alert fatigue or missed incidents. To address these limitations, the integration of artificial intelligence, particularly machine learning, into log-based monitoring has emerged as a transformative solution. By analyzing patterns in historical logs and adapting dynamically to changes in system behavior, AI models ranging from supervised classifiers to unsupervised clustering algorithms and deep learning architectures can enhance the detection of anomalies within Nagios and Zabbix environments. This review examines the application of AI to anomaly detection in logs generated by Nagios and Zabbix, focusing on key log types such as performance metrics, event logs, alert logs, and syslogs. It explores how AI improves detection precision, reduces false positives, and enables earlier incident prediction. The paper also compares data handling mechanisms in both tools and outlines common AI integration pipelines including log preprocessing, model training, and real-time inference. Furthermore, implementation case studies and evaluation metrics are discussed to highlight real-world benefits and performance trade-offs. Ultimately, this article positions AI-driven anomaly detection as a critical enabler for modern observability and proactive IT operations, especially in large-scale or mission-critical infrastructures.

Cloud-Based Business Intelligence: Leveraging Cognitive CRM Models In Practice

Authors: Nargiz Eldar qizi Aliyeva, Kamran Vidadi oglu Mustafayev, Lala Elshan qizi Mammadova, Emil Rovshan oglu Gurbanov

Abstract: – In the era of hyper-personalized customer engagement, businesses are increasingly turning to cloud-based Business Intelligence (BI) systems integrated with Cognitive Customer Relationship Management (CRM) models to gain competitive advantage. Cognitive CRM extends traditional CRM by embedding AI capabilities such as natural language processing, machine learning, and sentiment analysis to generate deeper insights from structured and unstructured data. This article explores the practical application of Cognitive CRM within cloud-based BI ecosystems, focusing on architecture, integration strategies, real-time analytics, and decision automation. It highlights case studies where companies have successfully leveraged these models to optimize customer retention, improve service personalization, and boost operational efficiency, while also addressing challenges like data privacy, system complexity, and model governance.

DOI: https://doi.org/10.5281/zenodo.16311390

 

Securing Salesforce In Multi-Tenant Cloud Environments: A Compliance Perspective

Authors: Niloofar Farrukhzoda Rajabova, Daler Bahromovich Toshmatov, Sherzod Mahmudzoda Nasimov, Aziza Akbarzoda Komilova

Abstract: As enterprises increasingly migrate to cloud-native platforms like Salesforce, the security of multi-tenant environments becomes paramount, particularly in regulated industries. Salesforce’s multi-tenancy architecture provides scalability and cost-efficiency, but also raises concerns around data isolation, regulatory compliance, and shared infrastructure risks. This article offers a compliance-oriented examination of Salesforce security in multi-tenant clouds, exploring the architecture, built-in controls, shared responsibility models, and strategies for adhering to regulations such as GDPR, HIPAA, and SOC 2. By aligning platform capabilities with compliance mandates, organizations can ensure secure operations without sacrificing agility and innovation.

DOI: https://doi.org/10.5281/zenodo.16312240

AI-Powered Virtualization Models For Enterprise Bioinformatics

Authors: Elen Rafayelovna Sargsyan, Hayk Vahagnovich Ghazaryan,, Anzhela Viktorovna Grigoryan, Karen Samvelovich Melikyan, Tatevik Aramovna Harutyunyan

Abstract: The explosive growth of genomic and proteomic datasets has propelled bioinformatics into the enterprise computing domain, demanding scalable, secure, and high-performance infrastructure. Traditional physical server models have proven inadequate for managing the dynamic and compute-intensive nature of bioinformatics workflows. In response, AI-powered virtualization models are emerging as transformative solutions, combining intelligent workload orchestration with flexible virtual environments. This paper investigates how artificial intelligence enhances virtualization strategies in enterprise bioinformatics settings by enabling predictive resource allocation, automated fault detection, and real-time optimization. Through architectural analysis and case study evaluation, the research presents a practical framework for deploying AI-integrated virtual infrastructure that meets the evolving needs of large-scale biological computation.

DOI: https://doi.org/10.5281/zenodo.16312734

Enhancing Security Incident Detection and Automated Response Using AI-Powered Security Information and Event Management (SIEM) Systems

Authors: Kiran Desai

Abstract: – As cyber threats evolve in complexity and frequency, traditional security monitoring systems struggle to keep pace with modern enterprise needs. Security Information and Event Management (SIEM) systems have long served as a cornerstone for centralized logging and alerting, but the sheer volume of alerts and incidents now threatens to overwhelm human operators. This has led to a critical shift toward integrating artificial intelligence (AI) and machine learning (ML) into SIEM platforms. AI-driven SIEM systems automate detection, triage, and even response to incidents, enabling security teams to operate more efficiently and effectively. These systems can analyze vast datasets in real time, identify anomalous behaviors, and recommend or initiate appropriate countermeasures with minimal human intervention. This article explores the architecture, algorithms, integration strategies, and real-world applications of AI-enhanced SIEM systems. It also examines key challenges such as data quality, model drift, and regulatory compliance, while offering insights into future trends like explainable AI and predictive threat modeling. The goal is to provide a comprehensive understanding of how AI transforms SIEM into an intelligent, adaptive shield against modern cyber threats

DOI: https://doi.org/10.5281/zenodo.16751895

 

Applying Digital Forensics Techniques To Secure And Investigate Threats In Healthcare Information Systems And Electronic Medical Records

Authors: Shashi Tharoor

Abstract: In the digital era, healthcare organizations are increasingly reliant on information systems to manage sensitive patient data and streamline clinical workflows. However, the growing digitization has also rendered these systems prime targets for cyberattacks, internal misuse, and accidental breaches. Digital forensics offers a critical framework for detecting, investigating, and mitigating security incidents in healthcare information systems. This paper explores the multifaceted application of digital forensics within healthcare, encompassing threat identification, evidence preservation, legal compliance, and technological challenges. As medical data is governed by stringent regulations such as HIPAA and GDPR, the role of digital forensics becomes indispensable in ensuring confidentiality, integrity, and availability of patient records. The unique nature of healthcare environments, including legacy systems, third-party integrations, and life-critical devices, necessitates a tailored forensic approach. Moreover, the integration of artificial intelligence and blockchain in forensics is transforming incident response and audit mechanisms. This review delves into forensic readiness, methodologies, tools, case studies, and future directions, emphasizing the critical need for a proactive stance in safeguarding healthcare information. By aligning forensic practices with risk management and compliance, healthcare organizations can build resilient infrastructures capable of withstanding the evolving threat landscape.

DOI: https://doi.org/10.5281/zenodo.16751920

 

Integrating Kerberos Authentication To Strengthen Security And Access Control In Samba-Based File Sharing Environments

Authors: Rohit Gore

Abstract: In an increasingly hybrid IT ecosystem, secure and scalable authentication mechanisms are essential for managing file-sharing services across diverse network environments. Samba, an open-source reimplementation of the SMB/CIFS protocol, enables seamless file and print services for SMB/CIFS clients, most notably Microsoft Windows. While Samba supports several authentication methods, integrating it with the Kerberos authentication protocol significantly strengthens its security posture, especially in enterprise environments. Kerberos, a time-tested network authentication protocol, facilitates secure and mutual authentication without transmitting passwords over the network. This article explores the integration of Samba with Kerberos, focusing on configuration strategies, performance implications, and real-world deployment considerations. It discusses the internal mechanisms of both technologies and illustrates how their integration can simplify centralized identity management using services such as Microsoft Active Directory and MIT Kerberos. Additionally, it reviews security enhancements, troubleshooting practices, and future considerations in the context of Linux-based servers and heterogeneous network environments. By aligning Samba with Kerberos authentication, organizations can achieve a unified and secure authentication architecture that minimizes administrative overhead, strengthens compliance, and provides a resilient foundation for secure file-sharing operations

DOI: https://doi.org/10.5281/zenodo.16751947

 

Implementing Scalable And Efficient Network File Sharing Solutions Using The Samba Protocol For Seamless Cross-Platform Access And Management

Authors: Ashwin Sanghi

Abstract: Financial institutions operate in a dynamic and high-stakes environment where data integrity, system availability, and uninterrupted service are paramount. In recent years, the increasing complexity of IT infrastructures, along with the growing threat of cyberattacks and natural disasters, has prompted a strategic shift toward virtualized disaster recovery (VDR) models. VDR enables the replication and recovery of data and critical systems through virtual environments, offering increased flexibility, faster recovery times, and reduced reliance on physical infrastructure. This article presents a comprehensive review of the adoption and implementation of virtualized disaster recovery strategies in financial institutions. It evaluates technological architectures, regulatory requirements, integration challenges, and case studies to illustrate real-world applications. Furthermore, it delves into cost-benefit analyses, risk mitigation tactics, and the role of automation and orchestration in streamlining recovery processes. Through this analysis, we aim to demonstrate how VDR can enhance business continuity, improve compliance postures, and provide a robust response mechanism to both anticipated and unforeseen disruptions.

DOI: https://doi.org/10.5281/zenodo.16751967

 

Financially Sustainable Big-Data In The Cloud: Governance, Lifecycle, And Tactical Strategies For Cost Optimization

Authors: Sudhir Vishnubhatla

Abstract: As financial and digital enterprises adopt cloud-native big-data systems, the focus has shifted from feasibility to cost-effectiveness. Elastic compute, multi-tiered storage, and managed services have removed barriers to scalability but introduced new challenges of cost predictability, governance, and optimization. This article synthesizes two decades of research and practice to articulate cost-optimization strategies for big-data systems in the cloud. It frames cost not as a narrow technical knob but as a discipline spanning architecture, governance, lifecycle management, and multi-cloud alignment. Three diagrams, the cost optimization model, the iterative cost lifecycle, and the levers of cost control—are used to illustrate how modern organizations can manage the financial sustainability of their big-data ecosystems without sacrificing agility, resilience, or compliance

DOI: http://doi.org/10.5281/zenodo.17452344

Leveraging AI To Optimize Clinical Data Management And Analytics Through SAP Digital Health Platforms For Enhanced Healthcare Outcomes

Authors: Parthiv Yodhan

Abstract: The rapid expansion of clinical data and the growing demand for personalized, efficient healthcare necessitate innovative approaches to data management and analytics. Traditional clinical data management (CDM) processes often struggle with data fragmentation, manual processing, and delayed insights, which can negatively impact patient outcomes and operational efficiency. This article explores the integration of Artificial Intelligence (AI) with SAP Digital Health platforms as a transformative solution for optimizing clinical data management and analytics. AI technologies, including machine learning and natural language processing, enhance data cleaning, validation, predictive modeling, and decision support, while SAP platforms provide a secure, interoperable, and scalable infrastructure for data integration and real-time analytics. By leveraging this synergy, healthcare organizations can improve diagnostic accuracy, enable personalized care, optimize operational workflows, and accelerate clinical research. The article also examines implementation challenges such as data privacy, interoperability, adoption barriers, and ethical considerations, and highlights emerging trends including real-time patient monitoring, genomics integration, and telemedicine analytics. Ultimately, AI-powered SAP Digital Health platforms offer a pathway toward a data-driven, patient-centric healthcare ecosystem, where predictive insights and proactive interventions significantly enhance clinical outcomes, operational efficiency, and population health management.

DOI: http://doi.org/10.5281/zenodo.18169570

A Unified Artificial Intelligence Framework For Secure Cloud And IoT Integration In Healthcare And Financial Systems

Authors: Atharv Joshi

Abstract: The convergence of Artificial Intelligence (AI), Cloud Computing, and the Internet of Things (IoT) has enabled intelligent, data-driven transformation across healthcare and financial systems. However, the integration of these technologies presents significant challenges related to security, scalability, interoperability, and real-time decision-making. Healthcare and financial domains demand highly reliable and secure architectures due to the sensitive nature of their data and strict regulatory requirements. Existing solutions often address these technologies in isolation, resulting in fragmented architectures and increased exposure to operational and security risks. This paper proposes a unified artificial intelligence framework that securely integrates cloud and IoT infrastructures to support intelligent healthcare and financial applications. The framework adopts a layered architecture encompassing IoT data acquisition, cloud-based storage and processing, AI-driven analytics, and embedded security mechanisms. Machine learning and deep learning models are employed to enable predictive analytics, anomaly detection, and decision support while ensuring data confidentiality, integrity, and availability. The framework supports both real-time and batch data processing, enabling scalable and low-latency operations. The proposed framework is validated through healthcare and financial use case scenarios, including remote patient monitoring and real-time financial transaction analysis. Performance evaluation demonstrates improved system efficiency, enhanced decision-making accuracy, and robust security compared to traditional siloed systems. The results confirm that the unified framework effectively addresses integration challenges while maintaining compliance and adaptability. This research contributes a comprehensive and scalable solution for next-generation intelligent healthcare and financial ecosystems, offering a foundation for future advancements in AI-enabled cloud and IoT integration.

DOI: http://doi.org/10.5281/zenodo.18169572

Machine Learning–Based Credit Scoring Models Integrated With SAP Financial And Banking Applications

Authors: Ishvik Reddy

Abstract: Traditional credit scoring methods often fail to capture the multi-dimensional complexities of modern financial risks, particularly in volatile markets and for borrowers with limited credit histories. This review article investigates the integration of Machine Learning (ML)-based credit scoring models within the SAP financial and banking ecosystem. We evaluate the transition from legacy logistic regression scorecards to advanced ensemble methods like XGBoost and Random Forests, implemented through the SAP HANA Predictive Analytics Library (PAL) and SAP Business Technology Platform (BTP). The study highlights how the "embedded" and "side-by-side" architectural patterns in SAP S/4HANA enable real-time, data-driven credit decisioning by processing transactional data at the source. Furthermore, the article addresses the critical requirement for Explainable AI (XAI) using SHAP and LIME to meet regulatory standards like Basel IV and GDPR. We explore diverse use cases, including retail loan automation, dynamic corporate credit limit management, and SME financing via alternative data. The study concludes by discussing the future impact of Generative AI and Quantum Machine Learning on credit risk reporting and simulation. By synthesizing technical implementation strategies with financial risk theory, this paper provides a strategic roadmap for banks aiming to deploy transparent, accurate, and high-performance scoring systems within their enterprise landscape.

DOI: http://doi.org/10.5281/zenodo.18229000

Cloud-Based Decision Support Systems For Managing Healthcare Operations And Financial Risks

Authors: Reyvik Taluk

Abstract: The modern healthcare landscape is defined by the critical need to optimize operational efficiency while mitigating complex financial risks. Traditional on-premise systems are increasingly inadequate for handling the high-velocity data required for real-time institutional decision-making. This review article investigates the role of Cloud-Based Decision Support Systems (CDSS) as a transformative solution for managing healthcare operations and financial stability. We examine how cloud architectures, utilizing standards like HL7 and FHIR, enable the integration of disparate data sources—from electronic health records to supply chain logs. The study explores analytical models for patient flow optimization, staffing resource management, and revenue cycle enhancement, demonstrating their impact on institutional throughput and cash flow. Furthermore, we address the significant hurdles of data privacy (HIPAA/GDPR), cybersecurity, and the ethical requirement for Explainable AI. By synthesizing current research with emerging trends like digital twins and generative AI for executive briefings, this article provides a strategic roadmap for healthcare leaders. Ultimately, we demonstrate that the synergy between cloud scalability and proactive data analytics is the essential foundation for building resilient, sustainable, and patient-centric healthcare organizations in a digitally connected age.

DOI: http://doi.org/10.5281/zenodo.18229034

Quantization Aware Training Techniques for Efficient Transformer-Driven Large Language Models

Authors: Sai Sukesh Reddy Tummuri

Abstract: Large language models powered by transformers have grown quickly, resulting in previously unheard-of performance improvements, but at the expense of high computational complexity, memory usage, and energy consumption. Their deployment in real-time and resource-constrained environments is hampered by these limitations. In order to improve inference efficiency while maintaining predictive accuracy, this paper proposed a novel Dynamic Sensitivity-Aware Quantization-Aware Training (DSA-QAT) framework. The suggested method adaptively adjusted quantization precision based on layer-wise sensitivity and training dynamics, in contrast to traditional quantization approaches that apply uniform precision reduction. This allowed for more informed precision allocation across transformer components. Using representative performance and efficiency metrics, controlled simulation experiments were used to assess the suggested framework. According to experimental results, the quantized model maintained balanced precision, recall, and F1-score values while achieving prediction accuracy above 97%. The model also demonstrated strong robustness against quantization noise, decreased inference latency, a smaller memory footprint, improved energy efficiency, and stable training loss convergence. Additionally, a notable decrease in model size was noted, allowing for effective deployment without sacrificing performance. Overall, the findings demonstrated that the suggested DSA-QAT framework successfully reduced the trade-off between accuracy and model efficiency. The study demonstrated the potential of adaptive quantization-aware strategies for the high-performance, scalable, and sustainable deployment of large language models in practical applications.

Automation And Control Mechanisms For Cloud-Based Enterprise Systems

Authors: Manasa Gowda

Abstract: Cloud-based enterprise systems have fundamentally transformed organizational computing by replacing static, hardware-bound infrastructures with scalable, distributed, and service-oriented architectures. Enterprises increasingly rely on cloud environments to deliver highly available digital services, support global user bases, and enable rapid innovation cycles. However, the dynamic, heterogeneous, and continuously evolving nature of cloud platforms introduces significant operational complexity. Maintaining performance stability, cost efficiency, reliability, and security in such environments requires advanced automation and adaptive control mechanisms rather than traditional manual administration. This review examines the foundational automation principles and control strategies that underpin modern cloud operations. Key mechanisms discussed include Infrastructure as Code (IaC) for reproducible provisioning, orchestration frameworks for lifecycle management of distributed services, and continuous integration and deployment pipelines for reliable software delivery. The paper further analyzes runtime control approaches such as auto-scaling algorithms, observability-driven feedback loops, and policy-based governance frameworks that regulate system behavior in real time. Integration of control theory concepts—feedback regulation, elasticity management, and self-healing—is explored to demonstrate how cloud systems achieve adaptive stability under fluctuating workloads. In addition, the review evaluates the growing role of Artificial Intelligence for IT Operations (AIOps) in predictive failure detection, anomaly identification, and automated remediation. Key operational challenges including configuration drift, multi-cloud interoperability, security compliance, and unpredictable demand patterns are critically discussed. Finally, emerging paradigms such as autonomous cloud infrastructures and intent-based management are presented as future directions toward self-governing enterprise platforms. Overall, this paper provides a comprehensive conceptual and technical overview of automation and control frameworks that enable resilient, scalable, and efficient cloud-based enterprise operations.

DOI: https://doi.org/10.5281/zenodo.18711882

 

Designing Enterprise-Scale Systems For Cloud And Network Integration

Authors: Pooja Kulkarni

Abstract: The rapid pace of digital transformation has compelled organizations to redesign their information technology infrastructure to support large-scale, distributed operations. Modern enterprise applications are no longer confined to centralized data centers but instead operate across public clouds, private infrastructure, hybrid platforms, and edge environments. This distribution enables global accessibility and scalability but also introduces complexity in coordinating computing resources, networking paths, and data consistency. As a result, enterprises must adopt integrated architectural approaches that unify cloud computing and network management into a cohesive operational model. Integrating application services, storage systems, and communication networks across heterogeneous environments presents several architectural and operational challenges. These include maintaining low latency across geographically dispersed components, ensuring system scalability during fluctuating workloads, enforcing consistent security policies, and preserving service reliability during failures or outages. Organizations must also address interoperability between different vendors and technologies while minimizing operational overhead and cost. Consequently, system design has shifted from infrastructure-centric deployment to architecture-centric planning, where resilience and adaptability are primary goals. This review analyzes the fundamental architectural models and enabling technologies that support cloud-network integration in enterprise environments. It explores the role of microservices-based architectures in improving modularity and fault isolation, software-defined networking in enabling programmable traffic control, and API-driven communication in supporting interoperability. Additionally, containerization and orchestration platforms are discussed as mechanisms for achieving portability and automated scaling, while observability frameworks provide real-time insight into system performance and operational health. The study further examines critical challenges faced by modern enterprise systems, including interoperability across platforms, implementation of zero-trust security strategies, network segmentation for risk containment, and performance optimization in distributed infrastructures. Addressing these challenges requires coordinated architectural planning, automation, and continuous monitoring rather than isolated configuration efforts. Security and reliability are therefore treated as integrated design principles rather than supplementary operational tasks. Finally, the review highlights best practices and emerging technological trends shaping the future of enterprise systems. These include edge computing for latency reduction, service mesh frameworks for internal service communication control, and artificial intelligence-driven network management for predictive optimization and fault detection. Collectively, these advancements support the development of resilient, scalable, and adaptable enterprise ecosystems capable of meeting evolving performance, security, and operational requirements.

DOI: https://doi.org/10.5281/zenodo.18711899

Adaptive Query Intelligence: AI-Enabled Optimization Strategies For High-Volume SQL And NoSQL Processing In Regulated Industries

Authors: Dr. Matteo Rinaldi, Hiroshi Nakamura, Elena Petrova, Daniel Sørensen, Ananya Kulkarni

Abstract: This paper explores how machine learning–driven query optimization can elevate the performance, scalability, and operational resilience of SQL and NoSQL database systems deployed in high-volume financial and healthcare environments. Conventional rule-based and cost-based optimizers frequently encounter limitations when confronted with volatile workloads, uneven data distributions, and rapidly shifting access behaviors that define contemporary transaction processing and clinical data infrastructures. The central inquiry of this study examines whether adaptive, data-aware optimization models—trained on historical execution traces, telemetry signals, and workload metadata—can deliver superior efficiency and stability in such dynamic contexts. The research employs a blended methodological approach that integrates architectural framework design, algorithmic prototyping, and comparative benchmarking across representative relational and non-relational database platforms operating under large-scale transactional and analytical loads. Empirical evaluation indicates that learning-enabled optimizers meaningfully lower query response times, improve compute and memory utilization, and enhance predictability during peak data surges when compared to traditional strategies. Core contributions include the development of predictive cost estimation models, context-aware index adaptation mechanisms, and real-time execution plan adjustments powered by supervised and reinforcement learning paradigms. Collectively, the study advances the theoretical foundations of intelligent data management by embedding adaptive learning into optimization workflows, while offering practical guidance for engineering robust, high-throughput database infrastructures capable of sustaining accuracy, compliance, and responsiveness in mission-critical financial and healthcare systems.

DOI: https://doi.org/10.5281/zenodo.19104981

A Resilient Multi-Cloud Intelligence Layer For Modern Enterprises: Coordinating AI, Microservices, And ERP-Based Workforce Platforms At Scale

Authors: Kai Lorenz, Elena Kovarik, Mateo Serrano, Tariq Al-Nadim, Ananya Kulkarni

Abstract: Distributed enterprise infrastructures increasingly connect operational applications, workforce management platforms, and analytical services across multiple cloud environments. Coordinating these interconnected systems while maintaining reliability, scalability, and intelligent decision support presents significant engineering challenges for large organizations. Conventional enterprise architectures frequently depend on tightly coupled systems and centralized analytical platforms that struggle to manage rapidly evolving services deployed across hybrid and multi cloud infrastructures. This study introduces a resilient multi cloud intelligence layer designed to coordinate artificial intelligence services, microservice based applications, and ERP driven workforce platforms within large scale enterprise ecosystems. The proposed architecture establishes an intermediary intelligence layer that aggregates operational data streams, orchestrates service communication across distributed cloud environments, and enables predictive analytics capabilities to operate directly alongside operational systems. Microservices provide modular and scalable service components that support flexible integration between enterprise applications, while containerized deployment models ensure portability across cloud infrastructures. Artificial intelligence models integrated within the intelligence layer analyze operational signals to support workforce optimization, operational forecasting, and anomaly detection across enterprise processes. The framework also incorporates resilience mechanisms such as distributed service orchestration, automated scaling, and cross cloud workload coordination to maintain operational continuity under dynamic workloads. By integrating microservices architecture, machine learning driven analytics, and ERP based workforce management platforms within a unified multi cloud intelligence framework, the proposed approach enables organizations to transform fragmented enterprise infrastructures into coordinated intelligent ecosystems capable of supporting scalable operations and continuous analytical insight.

Federated Learning For Privacy-Preserving Security Systems

Authors: Vikram Iyer

 

Abstract: The rapid escalation of cyber threats in decentralized environments has necessitated the development of collaborative defense mechanisms that do not compromise data sovereignty. Traditional centralized machine learning requires the aggregation of sensitive telemetry data, creating significant privacy risks and regulatory hurdles. This review explores the paradigm of Federated Learning (FL) as a transformative solution for privacy-preserving security systems. By enabling the training of global threat detection models across distributed nodes—such as edge devices, corporate branches, or mobile endpoints—without transferring raw data to a central server, FL addresses the fundamental tension between collective intelligence and individual privacy. This article categorizes current FL architectures, including horizontal, vertical, and transfer-based federated systems, and examines their application in intrusion detection, malware analysis, and anomaly-based behavioral monitoring. We analyze the integration of Differential Privacy and Secure Multi-Party Computation within the FL pipeline to mitigate data leakage from model updates. Furthermore, the review addresses the challenges of communication overhead, non-independent and identically distributed (non-IID) data, and vulnerability to poisoning attacks. By synthesizing recent research and industrial implementations, this paper provides a strategic roadmap for the deployment of self-evolving, privacy-aware security frameworks. The findings suggest that Federated Learning not only complies with stringent data protection mandates like GDPR but also enhances model robustness by training on diverse, real-world datasets that were previously inaccessible due to privacy constraints.

DOI: https://doi.org/10.5281/zenodo.19427310

 

Graph-Based Machine Learning Models For Network Attack Detection

Authors: Sneha Pillai

 

Abstract: The increasing complexity and interconnectedness of modern digital infrastructures have rendered traditional, point-based network security measures largely ineffective. Conventional machine learning models often treat network traffic as independent, identically distributed (IID) data points, failing to capture the structural dependencies and relational context inherent in sophisticated cyber-attacks. This review explores the paradigm shift toward Graph-Based Machine Learning (GML) for network attack detection. By representing network entities—such as IP addresses, MAC addresses, and service ports—as nodes, and their interactions as edges, graph-based models can effectively map the "topology of intent" behind malicious activity. This article categorizes current GML methodologies, including Graph Convolutional Networks (GCNs), Graph Attention Networks (GATs), and Temporal Graphs, which account for the dynamic nature of traffic flows. We examine how these models excel at detecting "lateral movement," "botnet command-and-control," and "distributed denial-of-service" (DDoS) attacks by identifying anomalous structural patterns that are invisible to tabular analysis. Furthermore, the review addresses the challenges of scalability in massive-scale networks and the necessity for real-time graph processing. By synthesizing recent academic breakthroughs and industrial applications, this paper provides a strategic roadmap for deploying graph-based "Relational Intelligence" within Security Operations Centers. The findings suggest that GML significantly reduces false positives by providing contextual awareness, making it a cornerstone for the next generation of resilient, self-aware network defense systems.

DOI: https://doi.org/10.5281/zenodo.19427318

 

Promoting Peace Education Through Spiritual Pedagogy Insights from Ramakrishna Mission

Authors: Amitesh Sarkar

Abstract: Peace education has become an important element in promoting peace, morality, and social unity in the modern societies. This paper examines how spiritual pedagogy, especially those applied by the Ramakrishna Mission can be used to enhance peace education. The study is descriptive and analytical and incorporates both philosophical and empirical information. This research points out the importance and impact of value based education based on spirituality on increasing emotional intelligence, ethical reasoning, and conflict management in learners. The main dimensions of peace education such as ethical awareness, emotional stability, social harmony, and conflict resolution are assessed with the help of a structured dataset. The results indicate that spiritual pedagogy plays a very important role in holistic growth and harmonious coexistence. It is concluded that the concept of incorporating spiritual values into the contemporary education systems can reinforce the peace-building processes at the international level.

Published by:

Study of Factors Affecting to Behavioural Intention on Adopt Mobile Payment

Uncategorized

Study of Factors Affecting to Behavioural Intention on Adopt Mobile Payment
Authors:- P.K.C. Adeesha Rathnasinghe

Volume 8, Issue 6

Abstract- This paper provides an analysis and evaluation of the factors that influence mobile payment adoption in Sri Lanka, as well as an examination of the customer-driven characteristics of mobile payment solutions and their associated value proposition. The convenience feature of mobile payment has replaced interactions with actual currency and shortened transaction times, which better satisfies the convenience needs of modern people. As mobile payments play a major part in mobile business, gaining an understanding of the characteristics that attract consumers to mobile payment will provide mobile businesses with additional chances for growth and substantially increase their output value. Based on the core theoretical framework of the Theory of Acceptance and Use of Technology, this study investigates how to further affect customer behavioural intention in Sri Lanka (UTAUT2). In this investigation, data analysis is conducted to validate the research model and hypotheses. Social influence, facilitating conditions, hedonic motivation, compatibility, innovation, relative benefit, complexity, performance expectations, and observability have been identified as dependent variables that influence customer desire to use mobile payment. One hundred eighty samples will be chosen using a random sampling technique for the investigation. Utilizing statistical analysis and regression analysis, the impact of these nine parameters on mobile payment adoption was confirmed. Perceived danger, perceived cost, perceived advantage, perceived ease of use, perceived usefulness, perceived behaviour, social influence, credibility, and compatibility have a major impact on mobile payment uptake, according to the results of a study.

Published by:
× How can I help you?